CDRouter Support

CDRouter Storage Test Summaries (Full)

test-summary version 13.3

Test Case Descriptions

  • Modules: 10
  • Test Cases: 174

Below is a full description of the testcases in each module


smb.tcl

SMB IPv4 storage tests

Test Module Name Synopsis
Verify SMB server responds to a service lookup smb.tcl smb_1 Verify SMB server responds to a service lookup


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to log in to the SMB server and
            perform a service lookup
    step 4. Verify that the SMB server responds to the service lookup request


Test Module Name Synopsis
Verify SMB server allows directory listing smb.tcl smb_2 Verify SMB server allows directory listing


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to log in to the SMB server and
            perform a directory listing
    step 4. Verify that the SMB server responds to the directory listing

    NOTE: CDRouter's SMB client will perform a directory listing on the folder
    specified by the testvars share and folder for the applicable smbuser


Test Module Name Synopsis
Verify SMB server allows file copy to server smb.tcl smb_10 Verify SMB server allows file copy to server


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to copy a file to the
            specified share location on the SMB server
    step 4. Verify that the SMB client is able to delete the file copied in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify SMB server allows file copy from server smb.tcl smb_11 Verify SMB server allows file copy from server


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to copy a file to the
            specified share location on the SMB server
    step 4. Verify that the SMB client is able to copy the file created
            in step 3 from the server back to the local system
    step 5. Verify that the SMB client is able to delete the file copied in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify SMB server allows creation and deletion of new folders smb.tcl smb_12 Verify SMB server allows creation and deletion of new folders


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to create a new folder within the
            specified share location on the SMB server
    step 4. Verify that the SMB client is able to copy a file to the new folder
            created in step 3
    step 5. Verify that the SMB client is able to delete the file copied in
            step 4
    step 6. Verify that the SMB client is able to delete the folder created in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify SMB server allows files to be renamed smb.tcl smb_13 Verify SMB server allows files to be renamed


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to copy a file to the
            specified share location on the SMB server
    step 4. Verify that the SMB client is able to rename the file copied in
            step 3
    step 5. Verify that the SMB client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify SMB server allows folders to be renamed smb.tcl smb_14 Verify SMB server allows folders to be renamed


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to create a new folder within the
            specified share location on the SMB server
    step 4. Verify that the SMB client is able to copy a file to the new folder
            created in step 3
    step 5. Rename the folder created in step 3
    step 6. Verify that the SMB client is able to delete the file copied in
            step 4
    step 7. Verify that the SMB client is able to delete the folder renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Perform SMB read-after-write test to verify file integrity smb.tcl smb_20 Perform SMB read-after-write test to verify file integrity


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to copy a file to the
            specified share location on the SMB server
    step 4. Verify the SMB client is able to copy the file generated in step 3
            from the SMB server back to the local system
    step 5. Perform an MD5 checksum on the original file copied to the SMB
            server in step 3 and from the SMB server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the SMB client is able to delete the file copied in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify SMB server rejects clients with invalid password smb.tcl smb_30 Verify SMB server rejects clients with invalid password


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is not able to log in to the SMB server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's SMB client will perform a directory listing on the folder
    specified by the testvars share and folder for the applicable smbuser using
    an invalid password


Test Module Name Synopsis
Verify SMB server rejects unknown clients smb.tcl smb_31 Verify SMB server rejects unknown clients


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is not able to log in to the SMB server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's SMB client will perform a directory listing on the folder
    specified by the testvars share and folder using an unknown username


Test Module Name Synopsis
Verify SMB server does not allow file copy for ReadOnly clients smb.tcl smb_40 Verify SMB server does not allow file copy for ReadOnly clients


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is not able to copy a file to the
            specified share location on the SMB server
    step 4. Verify that the ReadOnly SMB client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the smbuser being tested.


Test Module Name Synopsis
Verify SMB server does not allow folder creation for ReadOnly clients smb.tcl smb_41 Verify SMB server does not allow folder creation for ReadOnly clients


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is not able to create a new folder in the
            specified share location on the SMB server

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadOnly" for the smbuser being tested.


Test Module Name Synopsis
Verify SMB server supports simultaneous access from two clients smb.tcl smb_50 Verify SMB server supports simultaneous access from two clients


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Repeat step 2 to create a second instance of the SMB client on the
            same LAN DHCP host
    step 4. Verify that both SMB clients are able to copy a file to the
            specified share location simultaneously
    step 5. Verify that both SMB clients are able to copy the files
            generated in step 4 from the specified share location simultaneously
    step 6. Verify that both SMB clients are able to delete the files copied in
            step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the SMB server
    allows simultaneous access from two instances of the same SMB client on the
    same LAN DHCP host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify all configured SMB shares and users smb.tcl smb_51 Verify all configured SMB shares and users


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Start a new SMB client on the LAN
    step 3. Verify that the SMB client is able to copy a file to the specified
            share location
    step 4. Verify that the SMB client is able to copy the file generated in
            step 3 from the specified share location
    step 5. Verify that the SMB client is able to delete the file copied in
            step 3 from the SMB server
    step 6. Repeat steps 3 through 5 for all configured smbusers

    NOTE: This scaling test is designed to verify that all of the SMB client
    configurations, defined as "smbuser" testvar_groups, work as expected.

    NOTE: Up to 20 SMB client configurations can be created. Each SMB client
    configuration will be created and verified sequentially on the same LAN DHCP
    host.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    SMB client configuration, only a directory listing will be performed as part
    of this test.


Test Module Name Synopsis
Verify the maximum number of SMB sessions smb.tcl smb_52 Verify the maximum number of SMB sessions


    step 1. Resolve the SMB server name using DNS or NetBIOS
    step 2. Create a new DHCP client on the LAN and verify that the client
            receives an IP address from the DUT's LAN DHCP server
    step 3. Repeat step 1 until the entire DHCP pool on the DUT is exhausted or
            the maximum number of SMB sessions, as defined by the testvar
            storageSmbMaxSessions, is reached
    step 4. Start a new SMB client using the LAN host 1
    step 5. Verify that the SMB client is able to copy a file to the specified
            share location
    step 6. Verify that the SMB client is able to copy the file generated in
            step 5 from the specified share location
    step 7. Verify that the SMB client is able to delete the file copied in
            step 5 from the SMB server
    step 8. Repeat steps 4 through 7 for all LAN DHCP clients created in step 3

    NOTE: This scaling test is designed to verify the maximum number of SMB
    client connections. Each SMB client connection will use the same SMB user
    and will be created on a unique LAN DHCP host.

    NOTE: The maximum number of SMB client connections created is specified by
    the testvar storageSmbMaxSessions, which defaults to 20. If the DHCP pool
    is smaller than the storageSmbMaxSessions value, only enough clients to
    exhaust the DHCP pool will be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    SMB user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" SMB users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".



ftp.tcl

FTP IPv4 storage tests

Test Module Name Synopsis
Verify FTP server allows directory listing ftp.tcl ftp_2 Verify FTP server allows directory listing


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to log in to the FTP server and
            perform a directory listing
    step 4. Verify that the FTP server responds to the directory listing

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows name list command ftp.tcl ftp_3 Verify FTP server allows name list command


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to log in to the FTP server and
            perform a name list command
    step 4. Verify that the FTP server responds to the name list

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows file upload ftp.tcl ftp_10 Verify FTP server allows file upload


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows file download ftp.tcl ftp_11 Verify FTP server allows file download


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify that the FTP client is able to download the file uploaded
            in step 3 back to the local system
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows creation and deletion of new directories ftp.tcl ftp_12 Verify FTP server allows creation and deletion of new directories


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to create a new directory within
            the specified share location on the FTP server
    step 4. Verify that the FTP client is able to upload a file to the new
            directory created in step 3
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 4
    step 6. Verify that the FTP client is able to delete the directory created
            in step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows files to be renamed ftp.tcl ftp_13 Verify FTP server allows files to be renamed


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified share location on the FTP server
    step 4. Verify that the FTP client is able to rename the file uploaded in
            step 3
    step 5. Verify that the FTP client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows directories to be renamed ftp.tcl ftp_14 Verify FTP server allows directories to be renamed


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to create a new folder within the
            specified share location on the FTP server
    step 4. Verify that the FTP client is able to upload a file to the new
            directory created in step 3
    step 5. Rename the directory created in step 3
    step 6. Verify that the FTP client is able to delete the file uploaded in
            step 4
    step 7. Verify that the FTP client is able to delete the directory renamed
            in step 5

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity ftp.tcl ftp_20 Perform FTP read-after-write test to verify file integrity


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using active mode ftp.tcl ftp_21 Perform FTP read-after-write test to verify file integrity using active mode


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using an active mode
            connection
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using an active
            mode connection
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using active mode with EPRT disabled ftp.tcl ftp_22 Perform FTP read-after-write test to verify file integrity using active mode with EPRT disabled


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using an active mode
            connection with the EPRT command disabled
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using an active
            mode connection with the EPRT command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using passive mode with EPSV disabled ftp.tcl ftp_23 Perform FTP read-after-write test to verify file integrity using passive mode with EPSV disabled


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using a passive mode
            connection with the EPSV command disabled
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using a passive
            mode connection with the EPSV command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server rejects clients with invalid password ftp.tcl ftp_30 Verify FTP server rejects clients with invalid password


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is not able to log in to the FTP server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser using
    an invalid password


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server rejects unknown clients ftp.tcl ftp_31 Verify FTP server rejects unknown clients


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is not able to log in to the FTP server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's FTP client will perform a directory listing on the
    path specified by the testvar path using an unknown username


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server does not allow file upload for ReadOnly clients ftp.tcl ftp_40 Verify FTP server does not allow file upload for ReadOnly clients


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is not able to upload a file to the
            specified path on the FTP server
    step 4. Verify that the ReadOnly FTP client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server does not allow directory creation for ReadOnly clients ftp.tcl ftp_41 Verify FTP server does not allow directory creation for ReadOnly clients


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is not able to create a new directory in
            the specified path on the FTP server

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server supports simultaneous access from two clients ftp.tcl ftp_50 Verify FTP server supports simultaneous access from two clients


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Start a second FTP client on the same LAN DHCP host with the same
            FTP user
    step 4. Verify that both FTP clients are able to upload a file to the
            specified path on the FTP server simultaneously
    step 5. Verify that both FTP clients are able to download the files
            generated in step 4 from the specified directory to the local system
            simultaneously
    step 6. Verify that both FTP clients are able to delete the files uploaded
            in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the FTP server
    allows simultaneous access from two instances of the same FTP client on the
    same LAN DHCP host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify all configured FTP users ftp.tcl ftp_51 Verify all configured FTP users


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified path on the FTP server
    step 4. Verify that the FTP client is able to download the file generated in
            step 3 from the specified directory to the local system
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 3
    step 6. Repeat steps 2 through 3 for all configured ftpusers

    NOTE: This scaling test is designed to verify that all of the FTP client
    configurations, defined as "ftpuser" testvar_groups, work as expected.

    NOTE: Up to 20 FTP client configurations can be created. Each FTP client
    configuration will be created and verified sequentially on the same LAN DHCP
    host.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTP client configuration, only a directory listing will be performed as part
    of this test.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify the maximum number of FTP sessions ftp.tcl ftp_52 Verify the maximum number of FTP sessions


    step 1. Resolve the FTP server name using DNS or NetBIOS
    step 2. Create a new DHCP client on the LAN and verify that the client
            receives an IP address from the DUT's LAN DHCP server
    step 3. Repeat step 1 until the entire DHCP pool on the DUT is exhausted or
            the maximum number of FTP sessions, as defined by the testvar
            storageFtpMaxSessions, is reached
    step 4. Start a new FTP client using the LAN host 1
    step 5. Verify that the FTP client is able to upload a file to the specified
            directory
    step 6. Verify that the FTP client is able to download the file generated in
            step 5 from the specified directory to the local system
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 5 from the FTP server
    step 8. Repeat steps 4 through 7 for all LAN DHCP clients created in step 3

    NOTE: This scaling test is designed to verify the maximum number of FTP
    client connections. Each FTP client connection will use the same FTP user
    and will be created on a unique LAN DHCP host.

    NOTE: The maximum number of FTP client connections created is specified by
    the testvar storageFtpMaxSessions, which defaults to 20. If the DHCP pool
    is smaller than the storageFtpMaxSessions value, only enough clients to
    exhaust the DHCP pool will be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTP user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" FTP users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959


ftps.tcl

FTPS IPv4 storage tests

Test Module Name Synopsis
Verify FTPS server allows directory listing ftps.tcl ftps_2 Verify FTPS server allows directory listing


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to log in to the FTPS server and
            perform a directory listing
    step 4. Verify that the FTPS server responds to the directory listing

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows name list command ftps.tcl ftps_3 Verify FTPS server allows name list command


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to log in to the FTPS server and
            perform a name list command
    step 4. Verify that the FTPS server responds to the name list

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows file upload ftps.tcl ftps_10 Verify FTPS server allows file upload


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows file download ftps.tcl ftps_11 Verify FTPS server allows file download


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify that the FTPS client is able to download the file uploaded
            in step 3 back to the local system
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows creation and deletion of new directories ftps.tcl ftps_12 Verify FTPS server allows creation and deletion of new directories


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to create a new directory within
            the specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to upload a file to the new
            directory created in step 3
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 4
    step 6. Verify that the FTPS client is able to delete the directory created
            in step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows files to be renamed ftps.tcl ftps_13 Verify FTPS server allows files to be renamed


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to rename the file uploaded in
            step 3
    step 5. Verify that the FTPS client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows directories to be renamed ftps.tcl ftps_14 Verify FTPS server allows directories to be renamed


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to create a new folder within the
            specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to upload a file to the new
            directory created in step 3
    step 5. Rename the directory created in step 3
    step 6. Verify that the FTPS client is able to delete the file uploaded in
            step 4
    step 7. Verify that the FTPS client is able to delete the directory renamed
            in step 5

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity ftps.tcl ftps_20 Perform FTPS read-after-write test to verify file integrity


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using active mode ftps.tcl ftps_21 Perform FTPS read-after-write test to verify file integrity using active mode


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using an active mode
            connection
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using an active
            mode connection
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using active mode with EPRT disabled ftps.tcl ftps_22 Perform FTPS read-after-write test to verify file integrity using active mode with EPRT disabled


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using an active mode
            connection with the EPRT command disabled
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using an active
            mode connection with the EPRT command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using passive mode with EPSV disabled ftps.tcl ftps_23 Perform FTPS read-after-write test to verify file integrity using passive mode with EPSV disabled


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using a passive mode
            connection with the EPSV command disabled
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using a passive
            mode connection with the EPSV command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server rejects clients with invalid password ftps.tcl ftps_30 Verify FTPS server rejects clients with invalid password


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is not able to log in to the FTPS server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser using
    an invalid password


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server rejects unknown clients ftps.tcl ftps_31 Verify FTPS server rejects unknown clients


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is not able to log in to the FTPS server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    path specified by the testvar path using an unknown username


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server does not allow file upload for ReadOnly clients ftps.tcl ftps_40 Verify FTPS server does not allow file upload for ReadOnly clients


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is not able to upload a file to the
            specified path on the FTPS server
    step 4. Verify that the ReadOnly FTPS client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server does not allow directory creation for ReadOnly clients ftps.tcl ftps_41 Verify FTPS server does not allow directory creation for ReadOnly clients


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is not able to create a new directory in
            the specified path on the FTPS server

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server supports simultaneous access from two clients ftps.tcl ftps_50 Verify FTPS server supports simultaneous access from two clients


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Start a second FTPS client on the same LAN DHCP host with the same
            FTPS user
    step 4. Verify that both FTPS clients are able to upload a file to the
            specified path on the FTPS server simultaneously
    step 5. Verify that both FTPS clients are able to download the files
            generated in step 4 from the specified directory to the local system
            simultaneously
    step 6. Verify that both FTPS clients are able to delete the files uploaded
            in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the FTPS server
    allows simultaneous access from two instances of the same FTPS client on the
    same LAN DHCP host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify all configured FTPS users ftps.tcl ftps_51 Verify all configured FTPS users


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified path on the FTPS server
    step 4. Verify that the FTPS client is able to download the file generated in
            step 3 from the specified directory to the local system
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 3
    step 6. Repeat steps 2 through 3 for all configured ftpusers

    NOTE: This scaling test is designed to verify that all of the FTPS client
    configurations, defined as "ftpuser" testvar_groups, work as expected.

    NOTE: Up to 20 FTPS client configurations can be created. Each FTPS client
    configuration will be created and verified sequentially on the same LAN DHCP
    host.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTPS client configuration, only a directory listing will be performed as part
    of this test.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify the maximum number of FTPS sessions ftps.tcl ftps_52 Verify the maximum number of FTPS sessions


    step 1. Resolve the FTPS server name using DNS or NetBIOS
    step 2. Create a new DHCP client on the LAN and verify that the client
            receives an IP address from the DUT's LAN DHCP server
    step 3. Repeat step 1 until the entire DHCP pool on the DUT is exhausted or
            the maximum number of FTPS sessions, as defined by the testvar
            storageFtpMaxSessions, is reached
    step 4. Start a new FTPS client using the LAN host 1
    step 5. Verify that the FTPS client is able to upload a file to the specified
            directory
    step 6. Verify that the FTPS client is able to download the file generated in
            step 5 from the specified directory to the local system
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 5 from the FTPS server
    step 8. Repeat steps 4 through 7 for all LAN DHCP clients created in step 3

    NOTE: This scaling test is designed to verify the maximum number of FTP
    client connections. Each FTPS client connection will use the same FTPS user
    and will be created on a unique LAN DHCP host.

    NOTE: The maximum number of FTPS client connections created is specified by
    the testvar storageFtpMaxSessions, which defaults to 20. If the DHCP pool
    is smaller than the storageFtpMaxSessions value, only enough clients to
    exhaust the DHCP pool will be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTPS user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" FTPS users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228


ftp-wan.tcl

WAN FTP IPv4 storage tests

Test Module Name Synopsis
Verify FTP server allows directory listing ftp-wan.tcl ftp_wan_2 Verify FTP server allows directory listing


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to log in to the FTP server and
            perform a directory listing
    step 4. Verify that the FTP server responds to the directory listing

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows name list command ftp-wan.tcl ftp_wan_3 Verify FTP server allows name list command


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to log in to the FTP server and
            perform a name list command
    step 4. Verify that the FTP server responds to the name list

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows file upload ftp-wan.tcl ftp_wan_10 Verify FTP server allows file upload


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows file download ftp-wan.tcl ftp_wan_11 Verify FTP server allows file download


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify that the FTP client is able to download the file uploaded
            in step 3 back to the local system
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows creation and deletion of new directories ftp-wan.tcl ftp_wan_12 Verify FTP server allows creation and deletion of new directories


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to create a new directory within
            the specified share location on the FTP server
    step 4. Verify that the FTP client is able to upload a file to the new
            directory created in step 3
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 4
    step 6. Verify that the FTP client is able to delete the directory created
            in step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows files to be renamed ftp-wan.tcl ftp_wan_13 Verify FTP server allows files to be renamed


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified share location on the FTP server
    step 4. Verify that the FTP client is able to rename the file uploaded in
            step 3
    step 5. Verify that the FTP client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows directories to be renamed ftp-wan.tcl ftp_wan_14 Verify FTP server allows directories to be renamed


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to create a new folder within the
            specified share location on the FTP server
    step 4. Verify that the FTP client is able to upload a file to the new
            directory created in step 3
    step 5. Rename the directory created in step 3
    step 6. Verify that the FTP client is able to delete the file uploaded in
            step 4
    step 7. Verify that the FTP client is able to delete the directory renamed
            in step 5

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity ftp-wan.tcl ftp_wan_20 Perform FTP read-after-write test to verify file integrity


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using active mode ftp-wan.tcl ftp_wan_21 Perform FTP read-after-write test to verify file integrity using active mode


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using an active mode
            connection
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using an active
            mode connection
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using active mode with EPRT disabled ftp-wan.tcl ftp_wan_22 Perform FTP read-after-write test to verify file integrity using active mode with EPRT disabled


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using an active mode
            connection with the EPRT command disabled
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using an active
            mode connection with the EPRT command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using passive mode with EPSV disabled ftp-wan.tcl ftp_wan_23 Perform FTP read-after-write test to verify file integrity using passive mode with EPSV disabled


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using a passive mode
            connection with the EPSV command disabled
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using a passive
            mode connection with the EPSV command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server rejects clients with invalid password ftp-wan.tcl ftp_wan_30 Verify FTP server rejects clients with invalid password


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is not able to log in to the FTP server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser using
    an invalid password


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server rejects unknown clients ftp-wan.tcl ftp_wan_31 Verify FTP server rejects unknown clients


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is not able to log in to the FTP server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's FTP client will perform a directory listing on the
    path specified by the testvar path using an unknown username


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server does not allow file upload for ReadOnly clients ftp-wan.tcl ftp_wan_40 Verify FTP server does not allow file upload for ReadOnly clients


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is not able to upload a file to the
            specified path on the FTP server
    step 4. Verify that the ReadOnly FTP client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server does not allow directory creation for ReadOnly clients ftp-wan.tcl ftp_wan_41 Verify FTP server does not allow directory creation for ReadOnly clients


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is not able to create a new directory in
            the specified path on the FTP server

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server supports simultaneous access from two clients ftp-wan.tcl ftp_wan_50 Verify FTP server supports simultaneous access from two clients


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Start a second FTP client on the same WAN host with the same
            FTP user
    step 4. Verify that both FTP clients are able to upload a file to the
            specified path on the FTP server simultaneously
    step 5. Verify that both FTP clients are able to download the files
            generated in step 4 from the specified directory to the local system
            simultaneously
    step 6. Verify that both FTP clients are able to delete the files uploaded
            in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the FTP server
    allows simultaneous access from two instances of the same FTP client on the
    same WAN host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify all configured FTP users ftp-wan.tcl ftp_wan_51 Verify all configured FTP users


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified path on the FTP server
    step 4. Verify that the FTP client is able to download the file generated in
            step 3 from the specified directory to the local system
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 3
    step 6. Repeat steps 2 through 3 for all configured ftpusers

    NOTE: This scaling test is designed to verify that all of the FTP client
    configurations, defined as "ftpuser" testvar_groups, work as expected.

    NOTE: Up to 20 FTP client configurations can be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTP client configuration, only a directory listing will be performed as part
    of this test.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify the maximum number of FTP sessions ftp-wan.tcl ftp_wan_52 Verify the maximum number of FTP sessions


    step 1. Determine the WAN side FTP server address
    step 2. Create new WAN side FTP clients
    step 3. Start a new FTP client using the WAN client 1
    step 4. Verify that the FTP client is able to upload a file to the specified
            directory
    step 5. Verify that the FTP client is able to download the file generated in
            step 5 from the specified directory to the local system
    step 6. Verify that the FTP client is able to delete the file uploaded in
            step 5 from the FTP server
    step 7. Repeat steps 4 through 7 for all WAN clients created in step 2

    NOTE: This scaling test is designed to verify the maximum number of FTP
    client connections. Each FTP client connection will use the same FTP user
    and will be created on a unique WAN host.

    NOTE: The maximum number of FTP client connections created is specified by
    the testvar storageFtpMaxSessions, which defaults to 20.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTP user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" FTP users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959


ftps-wan.tcl

WAN FTPS IPv4 storage tests

Test Module Name Synopsis
Verify FTPS server allows directory listing ftps-wan.tcl ftps_wan_2 Verify FTPS server allows directory listing


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to log in to the FTPS server and
            perform a directory listing
    step 4. Verify that the FTPS server responds to the directory listing

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows name list command ftps-wan.tcl ftps_wan_3 Verify FTPS server allows name list command


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to log in to the FTPS server and
            perform a name list command
    step 4. Verify that the FTPS server responds to the name list

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows file upload ftps-wan.tcl ftps_wan_10 Verify FTPS server allows file upload


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows file download ftps-wan.tcl ftps_wan_11 Verify FTPS server allows file download


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify that the FTPS client is able to download the file uploaded
            in step 3 back to the local system
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows creation and deletion of new directories ftps-wan.tcl ftps_wan_12 Verify FTPS server allows creation and deletion of new directories


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to create a new directory within
            the specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to upload a file to the new
            directory created in step 3
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 4
    step 6. Verify that the FTPS client is able to delete the directory created
            in step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows files to be renamed ftps-wan.tcl ftps_wan_13 Verify FTPS server allows files to be renamed


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to rename the file uploaded in
            step 3
    step 5. Verify that the FTPS client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows directories to be renamed ftps-wan.tcl ftps_wan_14 Verify FTPS server allows directories to be renamed


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to create a new folder within the
            specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to upload a file to the new
            directory created in step 3
    step 5. Rename the directory created in step 3
    step 6. Verify that the FTPS client is able to delete the file uploaded in
            step 4
    step 7. Verify that the FTPS client is able to delete the directory renamed
            in step 5

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity ftps-wan.tcl ftps_wan_20 Perform FTPS read-after-write test to verify file integrity


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using active mode ftps-wan.tcl ftps_wan_21 Perform FTPS read-after-write test to verify file integrity using active mode


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using an active mode
            connection
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using an active
            mode connection
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using active mode with EPRT disabled ftps-wan.tcl ftps_wan_22 Perform FTPS read-after-write test to verify file integrity using active mode with EPRT disabled


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using an active mode
            connection with the EPRT command disabled
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using an active
            mode connection with the EPRT command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using passive mode with EPSV disabled ftps-wan.tcl ftps_wan_23 Perform FTPS read-after-write test to verify file integrity using passive mode with EPSV disabled


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using a passive mode
            connection with the EPSV command disabled
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using a passive
            mode connection with the EPSV command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server rejects clients with invalid password ftps-wan.tcl ftps_wan_30 Verify FTPS server rejects clients with invalid password


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is not able to log in to the FTPS server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser using
    an invalid password


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server rejects unknown clients ftps-wan.tcl ftps_wan_31 Verify FTPS server rejects unknown clients


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is not able to log in to the FTPS server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    path specified by the testvar path using an unknown username


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server does not allow file upload for ReadOnly clients ftps-wan.tcl ftps_wan_40 Verify FTPS server does not allow file upload for ReadOnly clients


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is not able to upload a file to the
            specified path on the FTPS server
    step 4. Verify that the ReadOnly FTPS client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server does not allow directory creation for ReadOnly clients ftps-wan.tcl ftps_wan_41 Verify FTPS server does not allow directory creation for ReadOnly clients


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is not able to create a new directory in
            the specified path on the FTPS server

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server supports simultaneous access from two clients ftps-wan.tcl ftps_wan_50 Verify FTPS server supports simultaneous access from two clients


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Start a second FTPS client on the same WAN host with the same
            FTPS user
    step 4. Verify that both FTPS clients are able to upload a file to the
            specified path on the FTPS server simultaneously
    step 5. Verify that both FTPS clients are able to download the files
            generated in step 4 from the specified directory to the local system
            simultaneously
    step 6. Verify that both FTPS clients are able to delete the files uploaded
            in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the FTPS server
    allows simultaneous access from two instances of the same FTPS client on the
    same WAN host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify all configured FTPS users ftps-wan.tcl ftps_wan_51 Verify all configured FTPS users


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified path on the FTPS server
    step 4. Verify that the FTPS client is able to download the file generated in
            step 3 from the specified directory to the local system
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 3
    step 6. Repeat steps 2 through 3 for all configured ftpusers

    NOTE: This scaling test is designed to verify that all of the FTPS client
    configurations, defined as "ftpuser" testvar_groups, work as expected.

    NOTE: Up to 20 FTPS client configurations can be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTPS client configuration, only a directory listing will be performed as part
    of this test.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify the maximum number of FTPS sessions ftps-wan.tcl ftps_wan_52 Verify the maximum number of FTPS sessions


    step 1. Determine the WAN side FTPS server address
    step 2. Create new WAN side FTPS clients
    step 3. Start a new FTPS client using the WAN client 1
    step 4. Verify that the FTPS client is able to upload a file to the specified
            directory
    step 5. Verify that the FTPS client is able to download the file generated in
            step 5 from the specified directory to the local system
    step 6. Verify that the FTPS client is able to delete the file uploaded in
            step 5 from the FTPS server
    step 7. Repeat steps 4 through 7 for all WAN clients created in step 2

    NOTE: This scaling test is designed to verify the maximum number of FTP
    client connections. Each FTPS client connection will use the same FTPS user
    and will be created on a unique WAN host.

    NOTE: The maximum number of FTPS client connections created is specified by
    the testvar storageFtpMaxSessions, which defaults to 20.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTPS user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" FTPS users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228


smb-v6.tcl

SMB IPv6 storage tests

Test Module Name Synopsis
Verify IPv6 SMB server responds to a service lookup smb-v6.tcl ipv6_smb_1 Verify IPv6 SMB server responds to a service lookup


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to log in to the IPv6 SMB
            server and perform a service lookup
    step 4. Verify that the IPv6 SMB server responds to the service lookup
            request


Test Module Name Synopsis
Verify IPv6 SMB server allows directory listing smb-v6.tcl ipv6_smb_2 Verify IPv6 SMB server allows directory listing


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to log in to the IPv6 SMB
            server and perform a directory listing
    step 4. Verify that the IPv6 SMB server responds to the directory listing

    NOTE: CDRouter's IPv6 SMB client will perform a directory listing on the
    directory specified by the testvars "share" and "folder" for the applicable
    smbuser


Test Module Name Synopsis
Verify IPv6 SMB server allows file copy to server smb-v6.tcl ipv6_smb_10 Verify IPv6 SMB server allows file copy to server


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to copy a file to the
            specified share location on the IPv6 SMB server
    step 4. Verify that the IPv6 SMB client is able to delete the file copied in
            step 3

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify IPv6 SMB server allows file copy from server smb-v6.tcl ipv6_smb_11 Verify IPv6 SMB server allows file copy from server


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to copy a file to the
            specified share location on the IPv6 SMB server
    step 4. Verify that the IPv6 SMB clientis able to copy the file created
            in step 3 from the server back to the local system
    step 5. Verify that the IPv6 SMB client is able to delete the file copied in
            step 3

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify IPv6 SMB server allows creation and deletion of new folders smb-v6.tcl ipv6_smb_12 Verify IPv6 SMB server allows creation and deletion of new folders


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to create a new folder
            within the specified share location on the IPv6 SMB server
    step 4. Verify that the IPv6 SMB client is able to copy a file to the new folder
            created in step 3
    step 5. Verify that the IPv6 SMB client is able to delete the file copied in
            step 4
    step 6. Verify that the IPv6 SMB client is able to delete the folder created in
            step 3

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify IPv6 SMB server allows files to be renamed smb-v6.tcl ipv6_smb_13 Verify IPv6 SMB server allows files to be renamed


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to copy a file to the
            specified share location on the IPv6 SMB server
    step 4. Verify that the IPv6 SMB client is able to rename the file copied in
            step 3
    step 5. Verify that the IPv6 SMB client is able to delete the file renamed
            in step 4

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify IPv6 SMB server allows folders to be renamed smb-v6.tcl ipv6_smb_14 Verify IPv6 SMB server allows folders to be renamed


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to create a new folder
            within the specified share location on the IPv6 SMB server
    step 4. Verify that the IPv6 SMB client is able to copy a file to the new folder
            created in step 3
    step 5. Rename the folder created in step 3
    step 6. Verify that the IPv6 SMB client is able to delete the file copied in
            step 4
    step 7. Verify that the IPv6 SMB client is able to delete the folder renamed in
            step 4

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Perform IPv6 SMB read-after-write test to verify file integrity smb-v6.tcl ipv6_smb_20 Perform IPv6 SMB read-after-write test to verify file integrity


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to copy a file to the
            specified share location on the IPv6 SMB server
    step 4. Verify the IPv6 SMB client is able to copy the file generated in
            step 3 from the IPv6 SMB server back to the local system
    step 5. Perform an MD5 checksum on the original file copied to the SMB
            server in step 3 and from the IPv6 SMB server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the IPv6 SMB client is able to delete the file copied in
            step 3

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify IPv6 SMB server rejects clients with invalid password smb-v6.tcl ipv6_smb_30 Verify IPv6 SMB server rejects clients with invalid password


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is not able to log in to the IPv6
            SMB server and perform a directory listing using an invalid password

    NOTE: CDRouter's IPv6 SMB client will perform a directory listing on the
    directory specified by the testvars "share" and "folder" for the applicable
    smbuser using an invalid password


Test Module Name Synopsis
Verify IPv6 SMB server rejects unknown clients smb-v6.tcl ipv6_smb_31 Verify IPv6 SMB server rejects unknown clients


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is not able to log in to the IPv6
            SMB server and perform a directory listing using an unknown username

    NOTE: CDRouter's IPv6 SMB client will perform a directory listing on the
    directory specified by the testvars "share" and "folder" using an unknown
    username


Test Module Name Synopsis
Verify IPv6 SMB server does not allow file copy for ReadOnly clients smb-v6.tcl ipv6_smb_40 Verify IPv6 SMB server does not allow file copy for ReadOnly clients


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is not able to copy a file to the
            specified share location on the IPv6 SMB server
    step 4. Verify that the ReadOnly IPv6 SMB client is able to perform a
            directory listing

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadOnly" for the smbuser being tested.


Test Module Name Synopsis
Verify IPv6 SMB server does not allow folder creation for ReadOnly clients smb-v6.tcl ipv6_smb_41 Verify IPv6 SMB server does not allow folder creation for ReadOnly clients


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is not able to create a new folder
            in the specified share location on the IPv6 SMB server

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadOnly" for the smbuser being tested.


Test Module Name Synopsis
Verify IPv6 SMB server supports simultaneous access from two clients smb-v6.tcl ipv6_smb_50 Verify IPv6 SMB server supports simultaneous access from two clients


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Repeat step 2 to create a second instance of the IPv6 SMB client on
            the same LAN DHCP host
    step 4. Verify that both IPv6 SMB clients are able to copy a file to the
            specified share location simultaneously
    step 5. Verify that both IPv6 SMB clients are able to copy the files
            generated in step 4 from the specified share location simultaneously
    step 6. Verify that both IPv6 SMB clients are able to delete the files
            copied in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the IPv6 SMB
    server allows simultaneous access from two instances of the same IPv6 SMB
    client on the same LAN DHCP host:

    NOTE: This test is only performed if the testvar "permission" is set to
    "ReadWrite" for the smbuser being tested.


Test Module Name Synopsis
Verify all configured IPv6 SMB shares and users smb-v6.tcl ipv6_smb_51 Verify all configured IPv6 SMB shares and users


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Start a new IPv6 SMB client on the LAN
    step 3. Verify that the IPv6 SMB client is able to copy a file to the
            specified share location
    step 4. Verify that the IPv6 SMB client is able to copy the file generated
            in step 3 from the specified share location
    step 5. Verify that the IPv6 SMB client is able to delete the file copied in
            step 3 from the IPv6 SMB server
    step 6. Repeat steps 3 through 5 for all configured smbusers

    NOTE: This scaling test is designed to verify that all of the IPv6 SMB
    client configurations, defined as "smbuser" testvar_groups, work as
    expected.

    NOTE: Up to 20 IPv6 SMB client configurations can be created. Each IPv6 SMB
    client configuration will be created and verified sequentially on the same
    LAN DHCP host.

    NOTE: If the testvar "permission" is set to "ReadOnly" for a particular
    IPv6 SMB client configuration, only a directory listing will be performed as
    part of this test.


Test Module Name Synopsis
Verify the maximum number of IPv6 SMB sessions smb-v6.tcl ipv6_smb_52 Verify the maximum number of IPv6 SMB sessions


    step 1. Resolve the IPv6 SMB server name using DNS or NetBIOS
    step 2. Create a new DHCP client on the LAN and verify that the client
            receives an IP address from the DUT's LAN DHCP server
    step 3. Repeat step 1 until the entire DHCP pool on the DUT is exhausted or
            the maximum number of IPv6 SMB sessions, as defined by the testvar
            "storageSmbMaxSessions", is reached
    step 4. Start a new IPv6 SMB client using the LAN host 1
    step 5. Verify that the IPv6 SMB client is able to copy a file to the
            specified share location
    step 6. Verify that the IPv6 SMB client is able to copy the file generated
            in step 5 from the specified share location
    step 7. Verify that the IPv6 SMB client is able to delete the file copied in
            step 5 from the IPv6 SMB server
    step 8. Repeat steps 4 through 7 for all LAN DHCP clients created in step 3

    NOTE: This scaling test is designed to verify the maximum number of IPv6 SMB
    client connections. Each IPv6 SMB client connection will use the same IPv6
    SMB user and will be created on a unique LAN DHCP host.

    NOTE: The maximum number of IPv6 SMB client connections created is specified
    by the testvar "storageSmbMaxSessions", which defaults to 20. If the DHCP
    pool is smaller than the "storageSmbMaxSessions" value, only enough clients
    to exhaust the DHCP pool will be created.

    NOTE: If the testvar "permission" is set to "ReadOnly" for a particular
    IPv6 SMB user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" IPv6 SMB users over "ReadOnly"
    users. However, it will still run if all users configured as "ReadOnly".



ftp-v6.tcl

FTP IPv6 storage tests

Test Module Name Synopsis
Verify IPv6 FTP server allows directory listing ftp-v6.tcl ipv6_ftp_2 Verify IPv6 FTP server allows directory listing


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to log in to the IPv6 FTP server and
            perform a directory listing
    step 4. Verify that the IPv6 FTP server responds to the directory listing

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server allows name list command ftp-v6.tcl ipv6_ftp_3 Verify IPv6 FTP server allows name list command


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to log in to the IPv6 FTP server and
            perform a name list command
    step 4. Verify that the IPv6 FTP server responds to the name list

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server allows file upload ftp-v6.tcl ipv6_ftp_10 Verify IPv6 FTP server allows file upload


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the IPv6 FTP server
    step 4. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server allows file download ftp-v6.tcl ipv6_ftp_11 Verify IPv6 FTP server allows file download


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the IPv6 FTP server
    step 4. Verify that the FTP client is able to download the file uploaded
            in step 3 back to the local system
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server allows creation and deletion of new directories ftp-v6.tcl ipv6_ftp_12 Verify IPv6 FTP server allows creation and deletion of new directories


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to create a new directory within
            the specified share location on the IPv6 FTP server
    step 4. Verify that the FTP client is able to upload a file to the new
            directory created in step 3
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 4
    step 6. Verify that the FTP client is able to delete the directory created
            in step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server allows files to be renamed ftp-v6.tcl ipv6_ftp_13 Verify IPv6 FTP server allows files to be renamed


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified share location on the IPv6 FTP server
    step 4. Verify that the FTP client is able to rename the file uploaded in
            step 3
    step 5. Verify that the FTP client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server allows directories to be renamed ftp-v6.tcl ipv6_ftp_14 Verify IPv6 FTP server allows directories to be renamed


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to create a new folder within the
            specified share location on the IPv6 FTP server
    step 4. Verify that the FTP client is able to upload a file to the new
            directory created in step 3
    step 5. Rename the directory created in step 3
    step 6. Verify that the FTP client is able to delete the file uploaded in
            step 4
    step 7. Verify that the FTP client is able to delete the directory renamed
            in step 5

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity ftp-v6.tcl ipv6_ftp_20 Perform FTP read-after-write test to verify file integrity


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the IPv6 FTP server
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the IPv6 FTP server back to the local system
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the IPv6 FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using active mode ftp-v6.tcl ipv6_ftp_21 Perform FTP read-after-write test to verify file integrity using active mode


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the IPv6 FTP server using an active mode
            connection
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the IPv6 FTP server back to the local system using an active
            mode connection
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the IPv6 FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using active mode with EPRT disabled ftp-v6.tcl ipv6_ftp_22 Perform FTP read-after-write test to verify file integrity using active mode with EPRT disabled


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the IPv6 FTP server using an active mode
            connection with the EPRT command disabled
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the IPv6 FTP server back to the local system using an active
            mode connection with the EPRT command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the IPv6 FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using passive mode with EPSV disabled ftp-v6.tcl ipv6_ftp_23 Perform FTP read-after-write test to verify file integrity using passive mode with EPSV disabled


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the IPv6 FTP server using a passive mode
            connection with the EPSV command disabled
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the IPv6 FTP server back to the local system using a passive
            mode connection with the EPSV command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the IPv6 FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server rejects clients with invalid password ftp-v6.tcl ipv6_ftp_30 Verify IPv6 FTP server rejects clients with invalid password


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is not able to log in to the IPv6 FTP server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser using
    an invalid password


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server rejects unknown clients ftp-v6.tcl ipv6_ftp_31 Verify IPv6 FTP server rejects unknown clients


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is not able to log in to the IPv6 FTP server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's FTP client will perform a directory listing on the
    path specified by the testvar path using an unknown username


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server does not allow file upload for ReadOnly clients ftp-v6.tcl ipv6_ftp_40 Verify IPv6 FTP server does not allow file upload for ReadOnly clients


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is not able to upload a file to the
            specified path on the IPv6 FTP server
    step 4. Verify that the ReadOnly FTP client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server does not allow directory creation for ReadOnly clients ftp-v6.tcl ipv6_ftp_41 Verify IPv6 FTP server does not allow directory creation for ReadOnly clients


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is not able to create a new directory in
            the specified path on the IPv6 FTP server

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify IPv6 FTP server supports simultaneous access from two clients ftp-v6.tcl ipv6_ftp_50 Verify IPv6 FTP server supports simultaneous access from two clients


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Start a second FTP client on the same LAN DHCP host with the same
            FTP user
    step 4. Verify that both FTP clients are able to upload a file to the
            specified path on the IPv6 FTP server simultaneously
    step 5. Verify that both FTP clients are able to download the files
            generated in step 4 from the specified directory to the local system
            simultaneously
    step 6. Verify that both FTP clients are able to delete the files uploaded
            in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the IPv6 FTP server
    allows simultaneous access from two instances of the same FTP client on the
    same LAN DHCP host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify all configured FTP users ftp-v6.tcl ipv6_ftp_51 Verify all configured FTP users


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Start a new FTP client on the LAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified path on the IPv6 FTP server
    step 4. Verify that the FTP client is able to download the file generated in
            step 3 from the specified directory to the local system
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 3
    step 6. Repeat steps 2 through 3 for all configured ftpusers

    NOTE: This scaling test is designed to verify that all of the FTP client
    configurations, defined as "ftpuser" testvar_groups, work as expected.

    NOTE: Up to 20 FTP client configurations can be created. Each FTP client
    configuration will be created and verified sequentially on the same LAN DHCP
    host.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTP client configuration, only a directory listing will be performed as part
    of this test.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify the maximum number of FTP sessions ftp-v6.tcl ipv6_ftp_52 Verify the maximum number of FTP sessions


    step 1. Resolve the IPv6 FTP server name using DNS or NetBIOS
    step 2. Create a new DHCP client on the LAN and verify that the client
            receives an IP address from the DUT's LAN DHCP server
    step 3. Repeat step 1 until the entire DHCP pool on the DUT is exhausted or
            the maximum number of FTP sessions, as defined by the testvar
            storageFtpMaxSessions, is reached
    step 4. Start a new FTP client using the LAN host 1
    step 5. Verify that the FTP client is able to upload a file to the specified
            directory
    step 6. Verify that the FTP client is able to download the file generated in
            step 5 from the specified directory to the local system
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 5 from the IPv6 FTP server
    step 8. Repeat steps 4 through 7 for all LAN DHCP clients created in step 3

    NOTE: This scaling test is designed to verify the maximum number of FTP
    client connections. Each FTP client connection will use the same FTP user
    and will be created on a unique LAN DHCP host.

    NOTE: The maximum number of FTP client connections created is specified by
    the testvar storageFtpMaxSessions, which defaults to 20. If the DHCP pool
    is smaller than the storageFtpMaxSessions value, only enough clients to
    exhaust the DHCP pool will be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTP user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" FTP users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959


ftps-v6.tcl

FTPS IPv6 storage tests

Test Module Name Synopsis
Verify IPv6 FTPS server allows directory listing ftps-v6.tcl ipv6_ftps_2 Verify IPv6 FTPS server allows directory listing


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to log in to the IPv6 FTPS server and
            perform a directory listing
    step 4. Verify that the IPv6 FTPS server responds to the directory listing

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server allows name list command ftps-v6.tcl ipv6_ftps_3 Verify IPv6 FTPS server allows name list command


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to log in to the IPv6 FTPS server and
            perform a name list command
    step 4. Verify that the IPv6 FTPS server responds to the name list

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server allows file upload ftps-v6.tcl ipv6_ftps_10 Verify IPv6 FTPS server allows file upload


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the IPv6 FTPS server
    step 4. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server allows file download ftps-v6.tcl ipv6_ftps_11 Verify IPv6 FTPS server allows file download


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the IPv6 FTPS server
    step 4. Verify that the FTPS client is able to download the file uploaded
            in step 3 back to the local system
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server allows creation and deletion of new directories ftps-v6.tcl ipv6_ftps_12 Verify IPv6 FTPS server allows creation and deletion of new directories


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to create a new directory within
            the specified share location on the IPv6 FTPS server
    step 4. Verify that the FTPS client is able to upload a file to the new
            directory created in step 3
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 4
    step 6. Verify that the FTPS client is able to delete the directory created
            in step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server allows files to be renamed ftps-v6.tcl ipv6_ftps_13 Verify IPv6 FTPS server allows files to be renamed


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified share location on the IPv6 FTPS server
    step 4. Verify that the FTPS client is able to rename the file uploaded in
            step 3
    step 5. Verify that the FTPS client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server allows directories to be renamed ftps-v6.tcl ipv6_ftps_14 Verify IPv6 FTPS server allows directories to be renamed


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to create a new folder within the
            specified share location on the IPv6 FTPS server
    step 4. Verify that the FTPS client is able to upload a file to the new
            directory created in step 3
    step 5. Rename the directory created in step 3
    step 6. Verify that the FTPS client is able to delete the file uploaded in
            step 4
    step 7. Verify that the FTPS client is able to delete the directory renamed
            in step 5

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity ftps-v6.tcl ipv6_ftps_20 Perform FTPS read-after-write test to verify file integrity


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the IPv6 FTPS server
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the IPv6 FTPS server back to the local system
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the IPv6 FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using active mode ftps-v6.tcl ipv6_ftps_21 Perform FTPS read-after-write test to verify file integrity using active mode


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the IPv6 FTPS server using an active mode
            connection
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the IPv6 FTPS server back to the local system using an active
            mode connection
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the IPv6 FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using active mode with EPRT disabled ftps-v6.tcl ipv6_ftps_22 Perform FTPS read-after-write test to verify file integrity using active mode with EPRT disabled


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the IPv6 FTPS server using an active mode
            connection with the EPRT command disabled
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the IPv6 FTPS server back to the local system using an active
            mode connection with the EPRT command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the IPv6 FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using passive mode with EPSV disabled ftps-v6.tcl ipv6_ftps_23 Perform FTPS read-after-write test to verify file integrity using passive mode with EPSV disabled


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the IPv6 FTPS server using a passive mode
            connection with the EPSV command disabled
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the IPv6 FTPS server back to the local system using a passive
            mode connection with the EPSV command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the IPv6 FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server rejects clients with invalid password ftps-v6.tcl ipv6_ftps_30 Verify IPv6 FTPS server rejects clients with invalid password


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is not able to log in to the IPv6 FTPS server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser using
    an invalid password


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server rejects unknown clients ftps-v6.tcl ipv6_ftps_31 Verify IPv6 FTPS server rejects unknown clients


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is not able to log in to the IPv6 FTPS server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    path specified by the testvar path using an unknown username


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server does not allow file upload for ReadOnly clients ftps-v6.tcl ipv6_ftps_40 Verify IPv6 FTPS server does not allow file upload for ReadOnly clients


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is not able to upload a file to the
            specified path on the IPv6 FTPS server
    step 4. Verify that the ReadOnly FTPS client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server does not allow directory creation for ReadOnly clients ftps-v6.tcl ipv6_ftps_41 Verify IPv6 FTPS server does not allow directory creation for ReadOnly clients


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is not able to create a new directory in
            the specified path on the IPv6 FTPS server

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify IPv6 FTPS server supports simultaneous access from two clients ftps-v6.tcl ipv6_ftps_50 Verify IPv6 FTPS server supports simultaneous access from two clients


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Start a second FTPS client on the same LAN DHCP host with the same
            FTPS user
    step 4. Verify that both FTPS clients are able to upload a file to the
            specified path on the IPv6 FTPS server simultaneously
    step 5. Verify that both FTPS clients are able to download the files
            generated in step 4 from the specified directory to the local system
            simultaneously
    step 6. Verify that both FTPS clients are able to delete the files uploaded
            in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the IPv6 FTPS server
    allows simultaneous access from two instances of the same FTPS client on the
    same LAN DHCP host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify all configured FTPS users ftps-v6.tcl ipv6_ftps_51 Verify all configured FTPS users


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Start a new FTPS client on the LAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified path on the IPv6 FTPS server
    step 4. Verify that the FTPS client is able to download the file generated in
            step 3 from the specified directory to the local system
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 3
    step 6. Repeat steps 2 through 3 for all configured ftpusers

    NOTE: This scaling test is designed to verify that all of the FTPS client
    configurations, defined as "ftpuser" testvar_groups, work as expected.

    NOTE: Up to 20 FTPS client configurations can be created. Each FTPS client
    configuration will be created and verified sequentially on the same LAN DHCP
    host.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTPS client configuration, only a directory listing will be performed as part
    of this test.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify the maximum number of FTPS sessions ftps-v6.tcl ipv6_ftps_52 Verify the maximum number of FTPS sessions


    step 1. Resolve the IPv6 FTPS server name using DNS or NetBIOS
    step 2. Create a new DHCP client on the LAN and verify that the client
            receives an IP address from the DUT's LAN DHCP server
    step 3. Repeat step 1 until the entire DHCP pool on the DUT is exhausted or
            the maximum number of FTPS sessions, as defined by the testvar
            storageFtpMaxSessions, is reached
    step 4. Start a new FTPS client using the LAN host 1
    step 5. Verify that the FTPS client is able to upload a file to the specified
            directory
    step 6. Verify that the FTPS client is able to download the file generated in
            step 5 from the specified directory to the local system
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 5 from the IPv6 FTPS server
    step 8. Repeat steps 4 through 7 for all LAN DHCP clients created in step 3

    NOTE: This scaling test is designed to verify the maximum number of FTP
    client connections. Each FTPS client connection will use the same FTPS user
    and will be created on a unique LAN DHCP host.

    NOTE: The maximum number of FTPS client connections created is specified by
    the testvar storageFtpMaxSessions, which defaults to 20. If the DHCP pool
    is smaller than the storageFtpMaxSessions value, only enough clients to
    exhaust the DHCP pool will be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTPS user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" FTPS users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228


ftp-wan-v6.tcl

WAN FTP IPv6 storage tests

Test Module Name Synopsis
Verify FTP server allows directory listing ftp-wan-v6.tcl ipv6_ftp_wan_2 Verify FTP server allows directory listing


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to log in to the FTP server and
            perform a directory listing
    step 4. Verify that the FTP server responds to the directory listing

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows name list command ftp-wan-v6.tcl ipv6_ftp_wan_3 Verify FTP server allows name list command


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to log in to the FTP server and
            perform a name list command
    step 4. Verify that the FTP server responds to the name list

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows file upload ftp-wan-v6.tcl ipv6_ftp_wan_10 Verify FTP server allows file upload


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows file download ftp-wan-v6.tcl ipv6_ftp_wan_11 Verify FTP server allows file download


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify that the FTP client is able to download the file uploaded
            in step 3 back to the local system
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows creation and deletion of new directories ftp-wan-v6.tcl ipv6_ftp_wan_12 Verify FTP server allows creation and deletion of new directories


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to create a new directory within
            the specified share location on the FTP server
    step 4. Verify that the FTP client is able to upload a file to the new
            directory created in step 3
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 4
    step 6. Verify that the FTP client is able to delete the directory created
            in step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows files to be renamed ftp-wan-v6.tcl ipv6_ftp_wan_13 Verify FTP server allows files to be renamed


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified share location on the FTP server
    step 4. Verify that the FTP client is able to rename the file uploaded in
            step 3
    step 5. Verify that the FTP client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server allows directories to be renamed ftp-wan-v6.tcl ipv6_ftp_wan_14 Verify FTP server allows directories to be renamed


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to create a new folder within the
            specified share location on the FTP server
    step 4. Verify that the FTP client is able to upload a file to the new
            directory created in step 3
    step 5. Rename the directory created in step 3
    step 6. Verify that the FTP client is able to delete the file uploaded in
            step 4
    step 7. Verify that the FTP client is able to delete the directory renamed
            in step 5

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity ftp-wan-v6.tcl ipv6_ftp_wan_20 Perform FTP read-after-write test to verify file integrity


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using active mode ftp-wan-v6.tcl ipv6_ftp_wan_21 Perform FTP read-after-write test to verify file integrity using active mode


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using an active mode
            connection
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using an active
            mode connection
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using active mode with EPRT disabled ftp-wan-v6.tcl ipv6_ftp_wan_22 Perform FTP read-after-write test to verify file integrity using active mode with EPRT disabled


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using an active mode
            connection with the EPRT command disabled
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using an active
            mode connection with the EPRT command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Perform FTP read-after-write test to verify file integrity using passive mode with EPSV disabled ftp-wan-v6.tcl ipv6_ftp_wan_23 Perform FTP read-after-write test to verify file integrity using passive mode with EPSV disabled


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified directory on the FTP server using a passive mode
            connection with the EPSV command disabled
    step 4. Verify the FTP client is able to download the file generated in
            step 3 from the FTP server back to the local system using a passive
            mode connection with the EPSV command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTP server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTP client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server rejects clients with invalid password ftp-wan-v6.tcl ipv6_ftp_wan_30 Verify FTP server rejects clients with invalid password


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is not able to log in to the FTP server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's FTP client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser using
    an invalid password


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server rejects unknown clients ftp-wan-v6.tcl ipv6_ftp_wan_31 Verify FTP server rejects unknown clients


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is not able to log in to the FTP server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's FTP client will perform a directory listing on the
    path specified by the testvar path using an unknown username


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server does not allow file upload for ReadOnly clients ftp-wan-v6.tcl ipv6_ftp_wan_40 Verify FTP server does not allow file upload for ReadOnly clients


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is not able to upload a file to the
            specified path on the FTP server
    step 4. Verify that the ReadOnly FTP client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server does not allow directory creation for ReadOnly clients ftp-wan-v6.tcl ipv6_ftp_wan_41 Verify FTP server does not allow directory creation for ReadOnly clients


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is not able to create a new directory in
            the specified path on the FTP server

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify FTP server supports simultaneous access from two clients ftp-wan-v6.tcl ipv6_ftp_wan_50 Verify FTP server supports simultaneous access from two clients


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Start a second FTP client on the same WAN host with the same
            FTP user
    step 4. Verify that both FTP clients are able to upload a file to the
            specified path on the FTP server simultaneously
    step 5. Verify that both FTP clients are able to download the files
            generated in step 4 from the specified directory to the local system
            simultaneously
    step 6. Verify that both FTP clients are able to delete the files uploaded
            in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the FTP server
    allows simultaneous access from two instances of the same FTP client on the
    same WAN host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify all configured FTP users ftp-wan-v6.tcl ipv6_ftp_wan_51 Verify all configured FTP users


    step 1. Determine the WAN side FTP server address
    step 2. Start a new FTP client on the WAN
    step 3. Verify that the FTP client is able to upload a file to the
            specified path on the FTP server
    step 4. Verify that the FTP client is able to download the file generated in
            step 3 from the specified directory to the local system
    step 5. Verify that the FTP client is able to delete the file uploaded in
            step 3
    step 6. Repeat steps 2 through 3 for all configured ftpusers

    NOTE: This scaling test is designed to verify that all of the FTP client
    configurations, defined as "ftpuser" testvar_groups, work as expected.

    NOTE: Up to 20 FTP client configurations can be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTP client configuration, only a directory listing will be performed as part
    of this test.


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959

Test Module Name Synopsis
Verify the maximum number of FTP sessions ftp-wan-v6.tcl ipv6_ftp_wan_52 Verify the maximum number of FTP sessions


    step 1. Determine the WAN side FTP server address
    step 2. Create new WAN side FTP clients
    step 3. Start a new FTP client using the WAN client 1
    step 4. Verify that the FTP client is able to upload a file to the specified
            directory
    step 5. Verify that the FTP client is able to download the file generated in
            step 5 from the specified directory to the local system
    step 6. Verify that the FTP client is able to delete the file uploaded in
            step 5 from the FTP server
    step 7. Repeat steps 4 through 7 for all WAN clients created in step 2

    NOTE: This scaling test is designed to verify the maximum number of FTP
    client connections. Each FTP client connection will use the same FTP user
    and will be created on a unique WAN host.

    NOTE: The maximum number of FTP client connections created is specified by
    the testvar storageFtpMaxSessions, which defaults to 20.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTP user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" FTP users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".


    References:

    IETF RFC 959 "FILE TRANSFER PROTOCOL (FTP)"

    https://tools.ietf.org/html/rfc959


ftps-wan-v6.tcl

WAN FTPS IPv6 storage tests

Test Module Name Synopsis
Verify FTPS server allows directory listing ftps-wan-v6.tcl ipv6_ftps_wan_2 Verify FTPS server allows directory listing


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to log in to the FTPS server and
            perform a directory listing
    step 4. Verify that the FTPS server responds to the directory listing

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows name list command ftps-wan-v6.tcl ipv6_ftps_wan_3 Verify FTPS server allows name list command


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to log in to the FTPS server and
            perform a name list command
    step 4. Verify that the FTPS server responds to the name list

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows file upload ftps-wan-v6.tcl ipv6_ftps_wan_10 Verify FTPS server allows file upload


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows file download ftps-wan-v6.tcl ipv6_ftps_wan_11 Verify FTPS server allows file download


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify that the FTPS client is able to download the file uploaded
            in step 3 back to the local system
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows creation and deletion of new directories ftps-wan-v6.tcl ipv6_ftps_wan_12 Verify FTPS server allows creation and deletion of new directories


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to create a new directory within
            the specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to upload a file to the new
            directory created in step 3
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 4
    step 6. Verify that the FTPS client is able to delete the directory created
            in step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows files to be renamed ftps-wan-v6.tcl ipv6_ftps_wan_13 Verify FTPS server allows files to be renamed


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to rename the file uploaded in
            step 3
    step 5. Verify that the FTPS client is able to delete the file renamed in
            step 4

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server allows directories to be renamed ftps-wan-v6.tcl ipv6_ftps_wan_14 Verify FTPS server allows directories to be renamed


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to create a new folder within the
            specified share location on the FTPS server
    step 4. Verify that the FTPS client is able to upload a file to the new
            directory created in step 3
    step 5. Rename the directory created in step 3
    step 6. Verify that the FTPS client is able to delete the file uploaded in
            step 4
    step 7. Verify that the FTPS client is able to delete the directory renamed
            in step 5

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity ftps-wan-v6.tcl ipv6_ftps_wan_20 Perform FTPS read-after-write test to verify file integrity


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using active mode ftps-wan-v6.tcl ipv6_ftps_wan_21 Perform FTPS read-after-write test to verify file integrity using active mode


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using an active mode
            connection
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using an active
            mode connection
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using active mode with EPRT disabled ftps-wan-v6.tcl ipv6_ftps_wan_22 Perform FTPS read-after-write test to verify file integrity using active mode with EPRT disabled


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using an active mode
            connection with the EPRT command disabled
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using an active
            mode connection with the EPRT command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Perform FTPS read-after-write test to verify file integrity using passive mode with EPSV disabled ftps-wan-v6.tcl ipv6_ftps_wan_23 Perform FTPS read-after-write test to verify file integrity using passive mode with EPSV disabled


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified directory on the FTPS server using a passive mode
            connection with the EPSV command disabled
    step 4. Verify the FTPS client is able to download the file generated in
            step 3 from the FTPS server back to the local system using a passive
            mode connection with the EPSV command disabled
    step 5. Perform an MD5 checksum on the original file uploaded to the FTP
            server in step 3 and downloaded from the FTPS server in step 4
    step 6. Verify that the MD5 checksums in step 5 are the same
    step 7. Verify that the FTPS client is able to delete the file uploaded in
            step 3

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server rejects clients with invalid password ftps-wan-v6.tcl ipv6_ftps_wan_30 Verify FTPS server rejects clients with invalid password


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is not able to log in to the FTPS server
            and perform a directory listing using an invalid password

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    directory specified by the testvar path for the applicable ftpuser using
    an invalid password


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server rejects unknown clients ftps-wan-v6.tcl ipv6_ftps_wan_31 Verify FTPS server rejects unknown clients


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is not able to log in to the FTPS server
            and perform a directory listing using an unknown username

    NOTE: CDRouter's FTPS client will perform a directory listing on the
    path specified by the testvar path using an unknown username


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server does not allow file upload for ReadOnly clients ftps-wan-v6.tcl ipv6_ftps_wan_40 Verify FTPS server does not allow file upload for ReadOnly clients


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is not able to upload a file to the
            specified path on the FTPS server
    step 4. Verify that the ReadOnly FTPS client is able to perform a directory
            listing

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server does not allow directory creation for ReadOnly clients ftps-wan-v6.tcl ipv6_ftps_wan_41 Verify FTPS server does not allow directory creation for ReadOnly clients


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is not able to create a new directory in
            the specified path on the FTPS server

    NOTE: This test is only performed if the testvar permission is set to
    "ReadOnly" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify FTPS server supports simultaneous access from two clients ftps-wan-v6.tcl ipv6_ftps_wan_50 Verify FTPS server supports simultaneous access from two clients


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Start a second FTPS client on the same WAN host with the same
            FTPS user
    step 4. Verify that both FTPS clients are able to upload a file to the
            specified path on the FTPS server simultaneously
    step 5. Verify that both FTPS clients are able to download the files
            generated in step 4 from the specified directory to the local system
            simultaneously
    step 6. Verify that both FTPS clients are able to delete the files uploaded
            in step 3 simultaneously

    NOTE: This is a basic scaling test designed to verify that the FTPS server
    allows simultaneous access from two instances of the same FTPS client on the
    same WAN host.

    NOTE: This test is only performed if the testvar permission is set to
    "ReadWrite" for the ftpuser being tested.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify all configured FTPS users ftps-wan-v6.tcl ipv6_ftps_wan_51 Verify all configured FTPS users


    step 1. Determine the WAN side FTPS server address
    step 2. Start a new FTPS client on the WAN
    step 3. Verify that the FTPS client is able to upload a file to the
            specified path on the FTPS server
    step 4. Verify that the FTPS client is able to download the file generated in
            step 3 from the specified directory to the local system
    step 5. Verify that the FTPS client is able to delete the file uploaded in
            step 3
    step 6. Repeat steps 2 through 3 for all configured ftpusers

    NOTE: This scaling test is designed to verify that all of the FTPS client
    configurations, defined as "ftpuser" testvar_groups, work as expected.

    NOTE: Up to 20 FTPS client configurations can be created.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTPS client configuration, only a directory listing will be performed as part
    of this test.


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Test Module Name Synopsis
Verify the maximum number of FTPS sessions ftps-wan-v6.tcl ipv6_ftps_wan_52 Verify the maximum number of FTPS sessions


    step 1. Determine the WAN side FTPS server address
    step 2. Create new WAN side FTPS clients
    step 3. Start a new FTPS client using the WAN client 1
    step 4. Verify that the FTPS client is able to upload a file to the specified
            directory
    step 5. Verify that the FTPS client is able to download the file generated in
            step 5 from the specified directory to the local system
    step 6. Verify that the FTPS client is able to delete the file uploaded in
            step 5 from the FTPS server
    step 7. Repeat steps 4 through 7 for all WAN clients created in step 2

    NOTE: This scaling test is designed to verify the maximum number of FTP
    client connections. Each FTPS client connection will use the same FTPS user
    and will be created on a unique WAN host.

    NOTE: The maximum number of FTPS client connections created is specified by
    the testvar storageFtpMaxSessions, which defaults to 20.

    NOTE: If the testvar permission is set to "ReadOnly" for a particular
    FTPS user, only a directory listing will be performed.

    NOTE: This test will prefer "ReadWrite" FTPS users over "ReadOnly" users.
    However, it will still run if all users configured as "ReadOnly".


    References:

    IETF RFC 2228 "FTP Security Extensions"

    https://tools.ietf.org/html/rfc2228

Contents

×

About CDRouter

QA Cafe CDRouter is a comprehensive and powerful test automation solution focused on feature, security, and performance testing for broadband and enterprise edge gateways, Wi-Fi and mesh systems, and other CPE.

Get in touch via our Contact page or by following us on your favorite service: