Layer 3
Description | Test Case ID | PD | Topology |
---|---|---|---|
Verify that ping works over ECMP | test_ping_013 | No | |
Verify ip address can be configured in SVI. | test_IP_001 | No | |
Verify ip address can be configured over routed port. | test_IP_002 | No | |
Verify SVI and routed ports can be admin down or up | test_IP_005 | No | |
Verify connected route gets created for the SVI subnet in the ip route table. | test_IP_006 | No | |
Verify IP interface is operational for SVI with LACP portchannel members | test_IP_011 | No | |
Verify ip address can be configured over routed PCH. | test_IP_014 | No | |
Verify BGP AS configuration works properly | test_bgp_001 | No | |
Verify BGP peering happens with nodes in same AS and iBGP neighbor table gets updated properly | test_bgp_002 | No | |
Verify BGP peering happens with nodes in different AS and eBGP neighbor table gets updated properly | test_bgp_003 | No | |
Verify BGP route learning using eBGP with routes injected from IXIA | test_bgp_004 | No | |
Verify BGP route removal using eBGP with routes withdrawn from IXIA | test_bgp_005 | No | |
Verify BGP route relearn over different neighbor when interface is shutdown | test_bgp_006 | No | |
Verify unnumbered functionality with iBGP | test_qual_bgp_001 | Yes | |
Verify unnumbered functionality with eBGP | test_qual_bgp_002 | Yes | |
Verify BGP route redistribution in DUT | test_qual_bgp_003 | No | |
Verify BGP6 functionality | test_qual_bgp_004 | No | |
Verify BGP AS-PATH prepend functionality | test_qual_bgp_007 | No | |
Verify BGP route map match prefix list, access-list deny and permit functionality | test_qual_bgp_008 | No | |
Verify BGP route map match AS-PATH permit and deny functionality | test_qual_bgp_009 | No | |
Verify BGP route map match community list permit and deny functionality | test_qual_bgp_010 | No | |
Verify BGP max MED functionality | test_qual_bgp_011 | No | |
Verify BGP maximum prefix limit per peer functionality | test_qual_bgp_013 | No | |
Verify BGP communities functionality | test_qual_bgp_014 | No | |
Verify BGP regexp match single and multi AS permit & deny action using AS-path access lists | test_qual_bgp_015 | No | |
Verify BGP regexp match any AS permit and deny action using AS-path access lists | test_qual_bgp_016 | No | |
Verify BGP regexp match range of BGP communities functionality | test_qual_bgp_017 | No | |
Verify BGP peering working with BGP listen range | test_qual_bgp_019 | No | |
Verify VRF functionality | test_qual_vrf | Yes | |
Verify VLAN 1 support for Host connectivity | test_qual_vlan1 | Yes | |
Verify IPV6 neighbor discovery | test_qual_ipv6_neighbor | No | |
Verify L3 DROP ACL functionality with matching source IP and source port | test_acl_001 | No | |
Verify L3 DROP ACL functionality with matching destination IP and destination port | test_acl_002 | No | |
Verify L3 DROP ACL functionality with matching SIP, DIP, SPORT, DPORT | test_acl_003 | No | |
Verify L3 DROP ACL with ACL rule having subnet mask | test_acl_004 | No | |
Verify L3 DROP ACL est acl rule with protocol = TCP | test_acl_005 | No | |
Verify L3 DROP ACL - Test acl rule with protocol = UDP | test_acl_006 | No | |
Verify L3 PERMIT ACL functionality with matching source IP and source port | test_acl_007 | No | |
Verify L3 PERMIT ACL functionality with matching destination IP and destination port | test_acl_008 | No | |
Verify L3 PERMIT ACL functionality with matching SIP, DIP, SPORT, DPORT | test_acl_009 | No | |
Verify L3 PERMIT ACL with ACL rule having subnet mask | test_acl_010 | No | |
Verify L3 PERMIT ACL - Test acl rule with protocol = TCP | test_acl_011 | No | |
Verify L3 PERMIT ACL - Test acl rule with protocol = UDP | test_acl_012 | No | |
Verify Drop ACL (IPv6) for matching source IPv6/L4 address and source IPv6L4 port | test_qual_ip6_acl_001 | No | |
Verify Drop ACL (IPv6) for matching destination IPv6/L4 port and source IPv6L4 port | test_qual_ip6_acl_002 | No | |
Verify drop ACL - matching IPv6 params subnet, dst, src ports combined | test_qual_ip6_acl_003 | No | |
Verify PERMIT ACL (IPv6) for matching source IPv6/L4 address and source IPv6L4 port | test_qual_ip6_acl_004 | No | |
Verify Permit ACL (IPv6) for matching destination IPv6/L4 port and source IPv6L4 port | test_qual_ip6_acl_005 | No | |
Verify drop ACL - matching IPv6 params subnet, dst, src ports combined | test_qual_ip6_acl_006 | No | |
Verify whether static ARP entry can be configured | test_arp_003 | No | |
Verify that the DUT will respond to an ARP Request for the SVI interface | test_arp_007 | No | |
Verify whether clear ARP entries works properly | test_arp_011 | No | |
Verify whether ARP entries are flushed after some time | test_arp_012 | Yes |
PD(Platform dependent) means that FTAS is designed to work with specific hardware and software configurations and may not be compatible with other platforms.
Last updated