This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
sfc_brahmaputra_testing [2015/11/30 17:07] Brady Johnson |
sfc_brahmaputra_testing [2016/03/09 15:41] Al Morton [Table] |
||
---|---|---|---|
Line 20: | Line 20: | ||
===== Test Cases ===== | ===== Test Cases ===== | ||
- | TC1 - Verify that only 2 VMs are created for Service Chains Chain1 and Chain2 | + | ==== Test Case: TC1 - VM Creation ==== |
- | TC2 - Verify that Client1 can not do HTTP traffic, but can do SSH traffic | + | |
- | TC3 - Verify that Client2 can not do SSH traffic, but can do HTTP traffic | + | |
+ | | Yardstick Id | Name | Description | Jira | | ||
+ | | TC029 | VM Creation | Verify that only 2 Service Function VMs are created for Service Chains Chain1 and Chain2 | https://jira.opnfv.org/browse/YARDSTICK-189 | | ||
+ | |||
+ | |||
+ | |||
+ | The Service Function VMs will be created by Tacker when the Service Chains Chain1 and Chain2 are created. This test verifies that the VMs are indeed created, but only 2. | ||
+ | |||
+ | ==== Test Case TC2 - Block HTTP ==== | ||
+ | |||
+ | | Yardstick Id | Name | Description | Jira | | ||
+ | | TC030 | Block HTTP | Verify that Client1 can not do HTTP traffic, but can do SSH traffic | https://jira.opnfv.org/browse/YARDSTICK-190 | | ||
+ | |||
+ | |||
+ | Client1 should be using Chain1, which will only send traffic through Service Function SF1 before sending the traffic on o the server. SF1 is a firewall configured to block all HTTP traffic, but let everything else pass through. | ||
+ | |||
+ | ==== Test Case TC3 - Block SSH ==== | ||
+ | |||
+ | | Yardstick Id | Name | Description | Jira | | ||
+ | | TC031 | Block SSH | Verify that Client2 can not do SSH traffic, but can do HTTP traffic | https://jira.opnfv.org/browse/YARDSTICK-191 | | ||
+ | |||
+ | |||
+ | Client2 should be using Chain2, which will only send traffic through Service Function SF2 before sending the traffic on o the server. SF2 is a firewall configured to block all SSH traffic, but let everything else pass through. | ||