Wlan L1 Test 10 - Connect to a WPA2 PSK AES AP
This automated test creates a wireless profile using the values provided in the two parameters.
Test details
Associated requirements |
Device.Network.WLAN.Base.MeetScanAndConnReq Device.Network.WLAN.CSBBase.MeetScanAndConnReq |
Platforms |
Windows 7 (x64) Windows 7 (x86) Windows RT (ARM-based) Windows 8 (x64) Windows 8 (x86) Windows RT 8.1 Windows 8.1 x64 Windows 8.1 x86 |
Expected run time |
~5 minutes |
Categories |
Basic Certification |
Type |
Automated |
Running the test
Before you run the test, complete the test setup as described in the test requirements: Wireless LAN (802.11) Testing Prerequisites.
The test does the following:
Connect to the wireless network specified using the created profile.
If connection success message is not seen from the driver within six seconds, the test will fail.
If there is a connection failure, the test will fail.
Wait for 60 seconds for the Windows NLM to return network connected status (this waits for DHCP assignment).
Choose a target IPv4 address from either the DHCP server on the network or the default gateway (DHCP server has priority).
Send ICMP message to the target IPv4 address and expect success.
Connect to port 80 of the target address and expect either a HTTP 401 challenge or HTTP 200 success.
Failure to ping the target address or to connect to port 80 of the target address will result in a test failure.
Troubleshooting
For troubleshooting information, see Troubleshooting Wireless LAN (802.11) Tests.
Make sure that the following are true:
The specified SSID is within range of the device
The specified password is correct.
The target IP address can be pinged.
The target IP address is running a web server.
Most home routers (including routers that are specified in the Windows Hardware Certification Kit (Windows HCK)WLAN setup) will satisfy these requirements.
More information
Command syntax
Parameter | Description |
---|---|
WPA2_PSK_AES_SSID |
The SSID of a WPA2_PSK_AES network to connect to. |
WPA2_PSK_Password |
The password for the WPA2_PSK network. |