diff --git a/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa2_enterprise/twog/test_dynamic_vlan_twog_wpa2.py b/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa2_enterprise/twog/test_dynamic_vlan_twog_wpa2.py index 5d3871939..f443275ee 100644 --- a/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa2_enterprise/twog/test_dynamic_vlan_twog_wpa2.py +++ b/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa2_enterprise/twog/test_dynamic_vlan_twog_wpa2.py @@ -45,119 +45,7 @@ setup_params_general = { scope="class" ) @pytest.mark.usefixtures("setup_configuration") -class TestDynamicVlan2GWpa2(object): - - @pytest.mark.absence_of_radius_vlan_identifier - @pytest.mark.wpa2_enterprise - @pytest.mark.twog - @pytest.mark.ow_sanity_lf - @allure.title("Verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers") - @allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-5704", name="WIFI-5704") - def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - - To verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers - Unique Marker: pytest -m " absence_of_radius_vlan_identifier and wpa2_enterprise and vlan" - - """ - - profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - mode = "VLAN" - security = "wpa2" - extra_secu = [] - band = "twog" - vlan = [100] - ttls_passwd = "passwordvlannotsentuser" - eap = "TTLS" - identity = "vlannotsentuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, - security=security, extra_securities=extra_secu, - vlan_id=vlan, mode=mode, band=band, eap=eap, - ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity, - num_sta=1, dut_data=setup_configuration) - - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}") - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - elif i == j: - val = True - if val: - assert True, result - elif not val: - assert False, result - - @pytest.mark.invalidradiusvlan - @pytest.mark.wpa2_enterprise - @pytest.mark.twog - @allure.testcase(name="test_dynamic_invalid_vlan", - url="https://telecominfraproject.atlassian.net/browse/WIFI-5706") - @allure.title("Test for invalid vlan identifier") - def test_dynamic_invalid_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - pytest -m "invalidradiusvlan and wpa2_enterprise and vlan and twog" - """ - - profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - mode = "VLAN" - security = "wpa2" - extra_secu = [] - band = "twog" - vlan = [100] - ttls_passwd = "passwordinvalidvlanuser" - eap = "TTLS" - identity = "invalidvlanuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - get_test_library.add_vlan(vlan_ids=[vlan]) - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid = ssid_name, - security = security, extra_securities = extra_secu, vlan_id = vlan, - mode = mode, band = band, eap = eap, ttls_passwd = ttls_passwd, - ieee80211w = 0, identity = identity, num_sta = 1, dut_data = setup_configuration) - - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - else: - val = True - if val: - assert True, result - elif not val: - assert False, result +class TestDynamicVlan2GWpa2SuiteA(object): @pytest.mark.periodic_reauthentication @pytest.mark.wpa2_enterprise @@ -230,59 +118,6 @@ class TestDynamicVlan2GWpa2(object): assert passes == "PASS", result - @pytest.mark.absenceofvlanid - @pytest.mark.wpa2_enterprise - @pytest.mark.twog - @allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan", - url="https://telecominfraproject.atlassian.net/browse/WIFI-5708") - @allure.title("test for ssid vlan used in absence of radius vlan") - def test_ssid_vlan_used_in_absence_of_radius_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - pytest -m "absenceofvlanid and wpa2_enterprise and vlan and twog" - """ - - profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - mode = "VLAN" - security = "wpa2" - extra_secu = [] - band = "twog" - vlan = [100] - ttls_passwd = "passwordvlannotsentuser" - eap = "TTLS" - identity = "vlannotsentuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security, - extra_securities=extra_secu, vlan_id=vlan, mode=mode, band=band, eap=eap, - d_vlan=False, ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity, - num_sta=1, dut_data=setup_configuration) - - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - else: - val = True - if val: - assert True, result - elif not val: - assert False, result - @pytest.mark.outofboundvlanid @pytest.mark.wpa2_enterprise @pytest.mark.twog @@ -497,3 +332,208 @@ class TestDynamicVlan2GWpa2(object): assert False, result assert passes == "PASS", result + + +setup_params_general = { + "mode": "VLAN", + "ssid_modes": { + "wpa2_enterprise": [ + {"ssid_name": "ssid_wpa2e_2g", "appliedRadios": ["2G"], + "security_key": "something", + "radius_auth_data": DYNAMIC_VLAN_RADIUS_SERVER_DATA, + "radius_acc_data": DYNAMIC_VLAN_RADIUS_ACCOUNTING_DATA, + "vlan": 300 + }]}, + "rf": {}, + "radius": True +} + + +# @allure.suite("regression") +@allure.parent_suite("Dynamic VLAN Test") +@allure.suite("WPA2 Enterprise Security") +@allure.sub_suite("2.4 GHz Band") +@allure.feature("Dynamic VLAN Test") +@pytest.mark.parametrize( + 'setup_configuration', + [setup_params_general], + indirect=True, + scope="class" +) +@pytest.mark.usefixtures("setup_configuration") +class TestDynamicVlan2GWpa2SuiteB(object): + + @pytest.mark.absence_of_radius_vlan_identifier + @pytest.mark.wpa2_enterprise + @pytest.mark.twog + @pytest.mark.ow_sanity_lf + @allure.title("Verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers") + @allure.testcase(url="https://telecominfraproject.atlassian.net/browse/WIFI-5704", name="WIFI-5704") + def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa2(self, get_test_library, + get_dut_logs_per_test_case, + get_test_device_logs, num_stations, + setup_configuration, check_connectivity): + """ + + To verify that SSID VLAN is used in the absence of radius VLAN tunnel type identifiers + Unique Marker: pytest -m " absence_of_radius_vlan_identifier and wpa2_enterprise and vlan" + + """ + + profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + mode = "VLAN" + security = "wpa2" + extra_secu = [] + band = "twog" + vlan = [300] + ttls_passwd = "passwordvlannotsentuser" + eap = "TTLS" + identity = "vlannotsentuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, + security=security, + extra_securities=extra_secu, + vlan_id=vlan, mode=mode, band=band, + eap=eap, + ttls_passwd=ttls_passwd, ieee80211w=0, + identity=identity, + num_sta=1, dut_data=setup_configuration) + + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}") + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + elif i == j: + val = True + if val: + assert True, result + elif not val: + assert False, result + + @pytest.mark.invalidradiusvlan + @pytest.mark.wpa2_enterprise + @pytest.mark.twog + @allure.testcase(name="test_dynamic_invalid_vlan", + url="https://telecominfraproject.atlassian.net/browse/WIFI-5706") + @allure.title("Test for invalid vlan identifier") + def test_dynamic_invalid_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case, + get_test_device_logs, num_stations, setup_configuration, check_connectivity): + """ + pytest -m "invalidradiusvlan and wpa2_enterprise and vlan and twog" + """ + + profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + mode = "VLAN" + security = "wpa2" + extra_secu = [] + band = "twog" + vlan = [300] + ttls_passwd = "passwordinvalidvlanuser" + eap = "TTLS" + identity = "invalidvlanuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + get_test_library.add_vlan(vlan_ids=[vlan]) + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, + security=security, + extra_securities=extra_secu, vlan_id=vlan, + mode=mode, band=band, eap=eap, + ttls_passwd=ttls_passwd, + ieee80211w=0, identity=identity, + num_sta=1, dut_data=setup_configuration) + + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + else: + val = True + if val: + assert True, result + elif not val: + assert False, result + + @pytest.mark.absenceofvlanid + @pytest.mark.wpa2_enterprise + @pytest.mark.twog + @allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan", + url="https://telecominfraproject.atlassian.net/browse/WIFI-5708") + @allure.title("test for ssid vlan used in absence of radius vlan") + def test_ssid_vlan_used_in_absence_of_radius_vlan_2g_wpa2(self, get_test_library, get_dut_logs_per_test_case, + get_test_device_logs, num_stations, setup_configuration, + check_connectivity): + """ + pytest -m "absenceofvlanid and wpa2_enterprise and vlan and twog" + """ + + profile_data = setup_params_general["ssid_modes"]["wpa2_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + mode = "VLAN" + security = "wpa2" + extra_secu = [] + band = "twog" + vlan = [300] + ttls_passwd = "passwordvlannotsentuser" + eap = "TTLS" + identity = "vlannotsentuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security, + extra_securities=extra_secu, vlan_id=vlan, + mode=mode, band=band, eap=eap, + d_vlan=False, ttls_passwd=ttls_passwd, + ieee80211w=0, identity=identity, + num_sta=1, dut_data=setup_configuration) + + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + else: + val = True + if val: + assert True, result + elif not val: + assert False, result \ No newline at end of file diff --git a/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa3_enterprise/fiveg/test_dynamic_vlan_fiveg_wpa3.py b/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa3_enterprise/fiveg/test_dynamic_vlan_fiveg_wpa3.py index 4b1e52a58..b5a9f37a7 100644 --- a/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa3_enterprise/fiveg/test_dynamic_vlan_fiveg_wpa3.py +++ b/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa3_enterprise/fiveg/test_dynamic_vlan_fiveg_wpa3.py @@ -44,116 +44,7 @@ setup_params_general = { scope="class" ) @pytest.mark.usefixtures("setup_configuration") -class TestDynamicVlan5GWpa3(object): - - @pytest.mark.absence_of_radius_vlan_identifier - @pytest.mark.wpa3_enterprise - @pytest.mark.fiveg - @allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier", - url="https://telecominfraproject.atlassian.net/browse/WIFI-6095") - @allure.title("Test for ssid vlan in the absence of radius vlan identifier") - def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - pytest -m " absence_of_radius_vlan_identifier and wpa3_enterprise and vlan and fiveg" - """ - - profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - security = "wpa3" - extra_secu = [] - band = "fiveg" - mode = "VLAN" - vlan = [100] - ttls_passwd = "passwordvlannotsentuser" - eap = "TTLS" - identity = "vlannotsentuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security, - extra_securities=extra_secu, vlan_id=vlan, - mode=mode, band=band, eap=eap, - ttls_passwd=ttls_passwd, ieee80211w=0, - identity=identity, num_sta=1, key_mgmt="WPA-EAP-SHA256", - dut_data=setup_configuration) - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}") - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - elif i == j: - val = True - if val: - assert True, result - elif not val: - assert False, result - - @pytest.mark.invalidradiusvlan - @pytest.mark.wpa3_enterprise - @pytest.mark.fiveg - @allure.testcase(name="test_dynamic_invalid_vlan", - url="https://telecominfraproject.atlassian.net/browse/WIFI-6097") - @allure.title("Test for invalid vlan identifier") - def test_dynamic_invalid_vlan_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - pytest -m "invalidradiusvlan and wpa3_enterprise and vlan and fiveg" - """ - - profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - security = "wpa3" - extra_secu = [] - band = "fiveg" - mode = "VLAN" - vlan = [100] - ttls_passwd = "passwordinvalidvlanuser" - eap = "TTLS" - identity = "invalidvlanuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - get_test_library.add_vlan(vlan_ids=[vlan]) - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid = ssid_name, key_mgmt="WPA-EAP-SHA256", - security = security, extra_securities = extra_secu, vlan_id = vlan, - mode = mode, band = band, eap = eap, ttls_passwd = ttls_passwd, - ieee80211w = 0, identity = identity, num_sta = 1, dut_data = setup_configuration) - - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - else: - val = True - if val: - assert True, result - elif not val: - assert False, result - +class TestDynamicVlan5GWpa3SuiteA(object): @pytest.mark.periodic_reauthentication @pytest.mark.wpa3_enterprise @pytest.mark.fiveg @@ -224,59 +115,6 @@ class TestDynamicVlan5GWpa3(object): assert passes == "PASS", result - @pytest.mark.absenceofvlanid - @pytest.mark.wpa3_enterprise - @pytest.mark.fiveg - @allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan", - url="https://telecominfraproject.atlassian.net/browse/WIFI-6100") - @allure.title("test for ssid vlan used in absence of radius vlan") - def test_ssid_vlan_used_in_absence_of_radius_vlan_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - pytest -m "absenceofvlanid and wpa3_enterprise and vlan and fiveg" - """ - - profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - security = "wpa3" - extra_secu = [] - band = "fiveg" - mode = "VLAN" - vlan = [100] - ttls_passwd = "passwordvlannotsentuser" - eap = "TTLS" - identity = "vlannotsentuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security, - extra_securities=extra_secu, vlan_id=vlan, mode=mode, band=band, eap=eap, - d_vlan=False, ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity, - num_sta=1, dut_data=setup_configuration, key_mgmt="WPA-EAP-SHA256") - - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - else: - val = True - if val: - assert True, result - elif not val: - assert False, result - @pytest.mark.outofboundvlanid @pytest.mark.wpa3_enterprise @pytest.mark.fiveg @@ -489,3 +327,197 @@ class TestDynamicVlan5GWpa3(object): assert False, result assert passes == "PASS", result + + +setup_params_general = { + "mode": "VLAN", + "ssid_modes": { + "wpa3_enterprise": [ + {"ssid_name": "ssid_wpa3e_5g", "appliedRadios": ["5G"], + "security_key": "something", + "radius_auth_data": DYNAMIC_VLAN_RADIUS_SERVER_DATA, + "radius_acc_data": DYNAMIC_VLAN_RADIUS_ACCOUNTING_DATA, + "vlan": 300 + }]}, + "rf": {}, + "radius": True +} + + +@allure.parent_suite("Dynamic VLAN Test") +@allure.suite("WPA3 Enterprise Security") +@allure.sub_suite("5 GHz Band") +@allure.feature("Dynamic VLAN Test") +@pytest.mark.parametrize( + 'setup_configuration', + [setup_params_general], + indirect=True, + scope="class" +) +@pytest.mark.usefixtures("setup_configuration") +class TestDynamicVlan5GWpa3SuiteB(object): + + @pytest.mark.absence_of_radius_vlan_identifier + @pytest.mark.wpa3_enterprise + @pytest.mark.fiveg + @allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier", + url="https://telecominfraproject.atlassian.net/browse/WIFI-6095") + @allure.title("Test for ssid vlan in the absence of radius vlan identifier") + def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case, + get_test_device_logs, num_stations, setup_configuration, check_connectivity): + """ + pytest -m " absence_of_radius_vlan_identifier and wpa3_enterprise and vlan and fiveg" + """ + + profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + security = "wpa3" + extra_secu = [] + band = "fiveg" + mode = "VLAN" + vlan = [300] + ttls_passwd = "passwordvlannotsentuser" + eap = "TTLS" + identity = "vlannotsentuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security, + extra_securities=extra_secu, vlan_id=vlan, + mode=mode, band=band, eap=eap, + ttls_passwd=ttls_passwd, ieee80211w=0, + identity=identity, num_sta=1, key_mgmt="WPA-EAP-SHA256", + dut_data=setup_configuration) + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}") + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + elif i == j: + val = True + if val: + assert True, result + elif not val: + assert False, result + + @pytest.mark.invalidradiusvlan + @pytest.mark.wpa3_enterprise + @pytest.mark.fiveg + @allure.testcase(name="test_dynamic_invalid_vlan", + url="https://telecominfraproject.atlassian.net/browse/WIFI-6097") + @allure.title("Test for invalid vlan identifier") + def test_dynamic_invalid_vlan_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case, + get_test_device_logs, num_stations, setup_configuration, check_connectivity): + """ + pytest -m "invalidradiusvlan and wpa3_enterprise and vlan and fiveg" + """ + + profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + security = "wpa3" + extra_secu = [] + band = "fiveg" + mode = "VLAN" + vlan = [300] + ttls_passwd = "passwordinvalidvlanuser" + eap = "TTLS" + identity = "invalidvlanuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + get_test_library.add_vlan(vlan_ids=[vlan]) + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid = ssid_name, key_mgmt="WPA-EAP-SHA256", + security = security, extra_securities = extra_secu, vlan_id = vlan, + mode = mode, band = band, eap = eap, ttls_passwd = ttls_passwd, + ieee80211w = 0, identity = identity, num_sta = 1, dut_data = setup_configuration) + + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + else: + val = True + if val: + assert True, result + elif not val: + assert False, result + + @pytest.mark.absenceofvlanid + @pytest.mark.wpa3_enterprise + @pytest.mark.fiveg + @allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan", + url="https://telecominfraproject.atlassian.net/browse/WIFI-6100") + @allure.title("test for ssid vlan used in absence of radius vlan") + def test_ssid_vlan_used_in_absence_of_radius_vlan_5g_wpa3(self, get_test_library, get_dut_logs_per_test_case, + get_test_device_logs, num_stations, setup_configuration, + check_connectivity): + """ + pytest -m "absenceofvlanid and wpa3_enterprise and vlan and fiveg" + """ + + profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + security = "wpa3" + extra_secu = [] + band = "fiveg" + mode = "VLAN" + vlan = [300] + ttls_passwd = "passwordvlannotsentuser" + eap = "TTLS" + identity = "vlannotsentuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security, + extra_securities=extra_secu, vlan_id=vlan, + mode=mode, band=band, eap=eap, + d_vlan=False, ttls_passwd=ttls_passwd, + ieee80211w=0, identity=identity, + num_sta=1, dut_data=setup_configuration, + key_mgmt="WPA-EAP-SHA256") + + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + else: + val = True + if val: + assert True, result + elif not val: + assert False, result diff --git a/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa3_enterprise/twog/test_dynamic_vlan_twog_wpa3.py b/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa3_enterprise/twog/test_dynamic_vlan_twog_wpa3.py index 1336cb2ea..c1f099d29 100644 --- a/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa3_enterprise/twog/test_dynamic_vlan_twog_wpa3.py +++ b/tests/e2e/basic/validation_of_operating_modes/vlan_mode/dynamic_vlan/wpa3_enterprise/twog/test_dynamic_vlan_twog_wpa3.py @@ -44,117 +44,7 @@ setup_params_general = { scope="class" ) @pytest.mark.usefixtures("setup_configuration") -class TestDynamicVlan2GWpa3(object): - - @pytest.mark.absence_of_radius_vlan_identifier - @pytest.mark.wpa3_enterprise - @pytest.mark.twog - @allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier", - url="https://telecominfraproject.atlassian.net/browse/WIFI-6095") - @allure.title("Test for ssid vlan in the absence of radius vlan identifier") - def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - pytest -m "absence_of_radius_vlan_identifier and wpa3_enterprise and vlan and twog" - """ - - profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - mode = "VLAN" - security = "wpa3" - extra_secu = [] - band = "twog" - vlan = [100] - ttls_passwd = "passwordvlannotsentuser" - eap = "TTLS" - identity = "vlannotsentuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, key_mgmt="WPA-EAP-SHA256", - security=security, extra_securities=extra_secu, - vlan_id=vlan, mode=mode, band=band, eap=eap, - ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity, - num_sta=1, dut_data=setup_configuration) - - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}") - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - elif i == j: - val = True - if val: - assert True, result - elif not val: - assert False, result - - @pytest.mark.invalidradiusvlan - @pytest.mark.wpa3_enterprise - @pytest.mark.twog - @allure.testcase(name="test_dynamic_invalid_vlan", - url="https://telecominfraproject.atlassian.net/browse/WIFI-6097") - @allure.title("Test for invalid vlan identifier") - def test_dynamic_invalid_vlan_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - pytest -m "invalidradiusvlan and wpa3_enterprise and vlan and twog" - """ - - profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - mode = "VLAN" - security = "wpa3" - extra_secu = [] - band = "twog" - vlan = [100] - ttls_passwd = "passwordinvalidvlanuser" - eap = "TTLS" - identity = "invalidvlanuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - get_test_library.add_vlan(vlan_ids=[vlan]) - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid = ssid_name, key_mgmt="WPA-EAP-SHA256", - security = security, extra_securities = extra_secu, vlan_id = vlan, - mode = mode, band = band, eap = eap, ttls_passwd = ttls_passwd, - ieee80211w = 0, identity = identity, num_sta = 1, dut_data = setup_configuration) - - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - else: - val = True - if val: - assert True, result - elif not val: - assert False, result - +class TestDynamicVlan2GWpa3SuiteA(object): @pytest.mark.periodic_reauthentication @pytest.mark.wpa3_enterprise @pytest.mark.twog @@ -225,59 +115,6 @@ class TestDynamicVlan2GWpa3(object): assert passes == "PASS", result - @pytest.mark.absenceofvlanid - @pytest.mark.wpa3_enterprise - @pytest.mark.twog - @allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan", - url="https://telecominfraproject.atlassian.net/browse/WIFI-6100") - @allure.title("test for ssid vlan used in absence of radius vlan") - def test_ssid_vlan_used_in_absence_of_radius_vlan_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case, - get_test_device_logs, num_stations, setup_configuration, check_connectivity): - """ - pytest -m "absenceofvlanid and wpa3_enterprise and vlan and twog" - """ - - profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] - ssid_name = profile_data[0]["ssid_name"] - mode = "VLAN" - security = "wpa3" - extra_secu = [] - band = "twog" - vlan = [100] - ttls_passwd = "passwordvlannotsentuser" - eap = "TTLS" - identity = "vlannotsentuser" - val = "" - port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') - - passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security, - extra_securities=extra_secu, vlan_id=vlan, mode=mode, band=band, eap=eap, - d_vlan=False, ttls_passwd=ttls_passwd, ieee80211w=0, identity=identity, - num_sta=1, dut_data=setup_configuration, key_mgmt="WPA-EAP-SHA256") - - station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] - eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] - eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + - "/" + port_resources[2])["interface"]["ip"] - - sta_ip_1 = station_ip.split('.') - eth_vlan_ip_1 = eth_vlan_ip.split('.') - if sta_ip_1[0] == "0": - assert False, result - elif eth_vlan_ip[0] == "0": - assert False, result - - for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): - if i != j: - val = False - else: - val = True - if val: - assert True, result - elif not val: - assert False, result - @pytest.mark.outofboundvlanid @pytest.mark.wpa3_enterprise @pytest.mark.twog @@ -492,3 +329,205 @@ class TestDynamicVlan2GWpa3(object): assert passes == "PASS", result + +setup_params_general = { + "mode": "VLAN", + "ssid_modes": { + "wpa3_enterprise": [ + {"ssid_name": "ssid_wpa3e_2g", "appliedRadios": ["2G"], + "security_key": "something", + "radius_auth_data": DYNAMIC_VLAN_RADIUS_SERVER_DATA, + "radius_acc_data": DYNAMIC_VLAN_RADIUS_ACCOUNTING_DATA, + "vlan": 300 + }]}, + "rf": {}, + "radius": True +} + + +@allure.parent_suite("Dynamic VLAN Test") +@allure.suite("WPA3 Enterprise Security") +@allure.sub_suite("2.4 GHz Band") +@allure.feature("Dynamic VLAN Test") +@pytest.mark.parametrize( + 'setup_configuration', + [setup_params_general], + indirect=True, + scope="class" +) +@pytest.mark.usefixtures("setup_configuration") +class TestDynamicVlan2GWpa3SuiteB(object): + + @pytest.mark.absence_of_radius_vlan_identifier + @pytest.mark.wpa3_enterprise + @pytest.mark.twog + @allure.testcase(name="test_ssid_vlan_in_the_absence_of_radius_vlan_identifier", + url="https://telecominfraproject.atlassian.net/browse/WIFI-6095") + @allure.title("Test for ssid vlan in the absence of radius vlan identifier") + def test_ssid_vlan_in_the_absence_of_radius_vlan_identifier_2g_wpa3(self, get_test_library, + get_dut_logs_per_test_case, + get_test_device_logs, num_stations, + setup_configuration, check_connectivity): + """ + pytest -m "absence_of_radius_vlan_identifier and wpa3_enterprise and vlan and twog" + """ + + profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + mode = "VLAN" + security = "wpa3" + extra_secu = [] + band = "twog" + vlan = [300] + ttls_passwd = "passwordvlannotsentuser" + eap = "TTLS" + identity = "vlannotsentuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, key_mgmt="WPA-EAP-SHA256", + security=security, + extra_securities=extra_secu, + vlan_id=vlan, mode=mode, band=band, + eap=eap, + ttls_passwd=ttls_passwd, ieee80211w=0, + identity=identity, + num_sta=1, dut_data=setup_configuration) + + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + logging.info(f"station ip...{sta_ip_1}\neth.{vlan[0]}...{eth_vlan_ip}\neth_upstream_ip...{eth_ip}") + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + elif i == j: + val = True + if val: + assert True, result + elif not val: + assert False, result + + @pytest.mark.invalidradiusvlan + @pytest.mark.wpa3_enterprise + @pytest.mark.twog + @allure.testcase(name="test_dynamic_invalid_vlan", + url="https://telecominfraproject.atlassian.net/browse/WIFI-6097") + @allure.title("Test for invalid vlan identifier") + def test_dynamic_invalid_vlan_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case, + get_test_device_logs, num_stations, setup_configuration, check_connectivity): + """ + pytest -m "invalidradiusvlan and wpa3_enterprise and vlan and twog" + """ + + profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + mode = "VLAN" + security = "wpa3" + extra_secu = [] + band = "twog" + vlan = [300] + ttls_passwd = "passwordinvalidvlanuser" + eap = "TTLS" + identity = "invalidvlanuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + get_test_library.add_vlan(vlan_ids=[vlan]) + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, key_mgmt="WPA-EAP-SHA256", + security=security, + extra_securities=extra_secu, vlan_id=vlan, + mode=mode, band=band, eap=eap, + ttls_passwd=ttls_passwd, + ieee80211w=0, identity=identity, + num_sta=1, dut_data=setup_configuration) + + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + else: + val = True + if val: + assert True, result + elif not val: + assert False, result + + @pytest.mark.absenceofvlanid + @pytest.mark.wpa3_enterprise + @pytest.mark.twog + @allure.testcase(name="test_ssid_vlan_used_in_absence_of_radius_vlan", + url="https://telecominfraproject.atlassian.net/browse/WIFI-6100") + @allure.title("test for ssid vlan used in absence of radius vlan") + def test_ssid_vlan_used_in_absence_of_radius_vlan_2g_wpa3(self, get_test_library, get_dut_logs_per_test_case, + get_test_device_logs, num_stations, setup_configuration, + check_connectivity): + """ + pytest -m "absenceofvlanid and wpa3_enterprise and vlan and twog" + """ + + profile_data = setup_params_general["ssid_modes"]["wpa3_enterprise"] + ssid_name = profile_data[0]["ssid_name"] + mode = "VLAN" + security = "wpa3" + extra_secu = [] + band = "twog" + vlan = [300] + ttls_passwd = "passwordvlannotsentuser" + eap = "TTLS" + identity = "vlannotsentuser" + val = "" + port_resources = list(get_test_library.lanforge_data['wan_ports'].keys())[0].split('.') + + passes, result = get_test_library.enterprise_client_connectivity_test(ssid=ssid_name, security=security, + extra_securities=extra_secu, vlan_id=vlan, + mode=mode, band=band, eap=eap, + d_vlan=False, ttls_passwd=ttls_passwd, + ieee80211w=0, identity=identity, + num_sta=1, dut_data=setup_configuration, + key_mgmt="WPA-EAP-SHA256") + + station_ip = get_test_library.station_data[list(get_test_library.station_data.keys())[0]]['ip'] + eth_vlan_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2] + "." + str(vlan[0]))["interface"]["ip"] + eth_ip = get_test_library.json_get("/port/" + port_resources[0] + "/" + port_resources[1] + + "/" + port_resources[2])["interface"]["ip"] + + sta_ip_1 = station_ip.split('.') + eth_vlan_ip_1 = eth_vlan_ip.split('.') + if sta_ip_1[0] == "0": + assert False, result + elif eth_vlan_ip[0] == "0": + assert False, result + + for i, j in zip(sta_ip_1[0:2], eth_vlan_ip_1[0:2]): + if i != j: + val = False + else: + val = True + if val: + assert True, result + elif not val: + assert False, result +