Layer 3

DescriptionTest Case IDPDTopology

Verify that ping works over ECMP

test_ping_013

No

Verify that IP address can be configured over SVI

test_IP_001

No

Verify that IP address can be configured over routed port

test_IP_002

No

Verify SVI and routed ports can be admin down or up

test_IP_005

No

Verify connected route gets created for the SVI subnet in the ip route table.

test_IP_006

No

Verify IP interface is operational for SVI with LACP portchannel members

test_IP_011

No

Verify ip address can be configured over routed PCH.

test_IP_014

No

Verify BGP AS configuration works properly

test_bgp_001

No

Verify BGP peering happens with nodes in same AS and iBGP neighbor table gets updated properly

test_bgp_002

No

Verify BGP peering happens with nodes in different AS and eBGP neighbor table gets updated properly

test_bgp_003

No

Verify BGP route learning using eBGP with routes injected from IXIA

test_bgp_004

No

Verify BGP route removal using eBGP with routes withdrawn from IXIA

test_bgp_005

No

Verify BGP route relearn over different neighbor when interface is shutdown

test_bgp_006

No

Verify unnumbered functionality with iBGP

test_qual_bgp_001

Yes

Verify unnumbered functionality with eBGP

test_qual_bgp_002

Yes

Verify BGP route redistribution in DUT

test_qual_bgp_003

No

Verify BGP6 functionality

test_qual_bgp_004

No

Verify BGP AS-PATH prepend functionality

test_qual_bgp_007

No

Verify BGP route map match prefix list, access-list deny and permit functionality

test_qual_bgp_008

No

Verify BGP route map match AS-PATH permit and deny functionality

test_qual_bgp_009

No

Verify BGP route map match community list permit and deny functionality

test_qual_bgp_010

No

Verify BGP max MED functionality

test_qual_bgp_011

No

Verify BGP maximum prefix limit per peer functionality

test_qual_bgp_013

No

Verify BGP communities functionality

test_qual_bgp_014

No

Verify BGP regexp match single and multi AS permit & deny action using AS-path access lists

test_qual_bgp_015

No

Verify BGP regexp match any AS permit and deny action using AS-path access lists

test_qual_bgp_016

No

Verify BGP regexp match range of BGP communities functionality

test_qual_bgp_017

No

Verify BGP peering working with BGP listen range

test_qual_bgp_019

No

Verify VRF functionality

test_qual_vrf

Yes

Verify VLAN 1 support for Host connectivity

test_qual_vlan1

Yes

Verify IPV6 neighbor discovery

test_qual_ipv6_neighbor

No

Verify L3 DROP ACL functionality with matching source IP and source port

test_acl_001

No

Verify L3 DROP ACL functionality with matching destination IP and destination port

test_acl_002

No

Verify L3 DROP ACL functionality with matching SIP, DIP, SPORT, DPORT

test_acl_003

No

Verify L3 DROP ACL with ACL rule having subnet mask

test_acl_004

No

Verify L3 DROP ACL est acl rule with protocol = TCP

test_acl_005

No

Verify L3 DROP ACL - Test acl rule with protocol = UDP

test_acl_006

No

Verify L3 PERMIT ACL functionality with matching source IP and source port

test_acl_007

No

Verify L3 PERMIT ACL functionality with matching destination IP and destination port

test_acl_008

No

Verify L3 PERMIT ACL functionality with matching SIP, DIP, SPORT, DPORT

test_acl_009

No

Verify L3 PERMIT ACL with ACL rule having subnet mask

test_acl_010

No

Verify L3 PERMIT ACL - Test acl rule with protocol = TCP

test_acl_011

No

Verify L3 PERMIT ACL - Test acl rule with protocol = UDP

test_acl_012

No

Verify Drop ACL (IPv6) for matching source IPv6/L4 address and source IPv6L4 port

test_qual_ip6_acl_001

No

Verify Drop ACL (IPv6) for matching destination IPv6/L4 port and source IPv6L4 port

test_qual_ip6_acl_002

No

Verify drop ACL - matching IPv6 params subnet, dst, src ports combined

test_qual_ip6_acl_003

No

Verify PERMIT ACL (IPv6) for matching source IPv6/L4 address and source IPv6L4 port

test_qual_ip6_acl_004

No

Verify Permit ACL (IPv6) for matching destination IPv6/L4 port and source IPv6L4 port

test_qual_ip6_acl_005

No

Verify drop ACL - matching IPv6 params subnet, dst, src ports combined

test_qual_ip6_acl_006

No

Verify whether static ARP entry can be configured

test_arp_003

No

Verify that the DUT will respond to an ARP Request for the SVI interface

test_arp_007

No

Verify whether clear ARP entries works properly

test_arp_011

No

Verify whether ARP entries are flushed after some time

test_arp_012

Yes

Verify eBGP multi-AS config, adjacency, route convergence and data path using router interface

test_bgp_netops_001

No

eBGP Multi-AS Route Convergence and data path using loopback

test_bgp_netops_002

No

BGP Node Drain - Add route-map to remove and restore SPINE node 1 and 2 using Community list

test_bgp_netops_003_004

No

Test Link drain - Apply Route-Map permit

test_bgp_netops_005_006

No

Node drain: with IPv6 Traffic Test Node Drain (Spine 1 and Spine 2) for IPv6 Traffic/Prefixes

test_bgp_netops_007

No

Link drain with IPv6 Traffic Test Link Drain for IPv6 Traffic/Prefixes

test_bgp_netops_008

No

Node drain using prefix-lists

test_bgp_netops_009

No

Test Link Drain with Prefix Lists

test_bgp_netops_010

No

Node drain/restore using AS path prepend list

test_bgp_netops_011_012

No

Link drain using AS path prepend

test_bgp_netops_014

No

MC-LAG L3 validation using port-channel configuration

test_mclag_layer3_steady_state

Yes

MC-LAG L3 validation, Bring down the member link of SPINE01

test_mclag_layer3_member_link_down

Yes

MC-LAG L3 keepalive link down

test_mclag_layer3_keepalive_link_down

Yes

MCLAG-L3 Active Reboot

test_mclag_layer3_active_reboot

Yes

MCLAG-L3 Standby Reboot

test_mclag_layer3_standby_reboot

Yes

Symmetric IRB with EVPN eBGP-RIF with s1_as_num=3000, s2_as_num=4000

test_bgp4_evpn_vxlan_009

Yes

Symmetric IRB with EVPN iBGP-RIF with s1_as_num=5000, s2_as_num=5000

test_bgp4_evpn_vxlan_010

Yes

Symmetric IRB with EVPN iBGP-SVI with s1_as_num=5000, s2_as_num=5000

test_bgp4_evpn_vxlan_012

Yes

Symmetric IRB with EVPN eBGP-RPCH with s1_as_num=3000, s2_as_num=4000

test_bgp4_evpn_vxlan_013

Yes

Symmetric IRB with EVPN iBGP-RPCH with s1_as_num=5000, s2_as_num=5000

test_bgp4_evpn_vxlan_014

Yes

PD(Platform dependent) means that FTAS is designed to work with specific hardware and software configurations and may not be compatible with other platforms.

Last updated