ASTM UTM DSS: Direct datastore access

scenarios.astm.utm.dss.DatastoreAccess

Resources

KML visualization

Case Step Event ax_dss cal_dss utmverse_dss wing_dss zipline_dss
Setup Validate nodes are reachable 1 Node is reachable
2 Node is reachable
3 Node is reachable
4 Node is reachable
5 Node is reachable
6 Node is reachable
7 Node is reachable
8 Node is reachable
9 Node is reachable
10 Node is reachable
11 Node is reachable
12 Node is reachable
13 Node is reachable
14 Node is reachable
15 Node is reachable
16 Node is reachable
17 Node is reachable
18 Node is reachable
19 Node is reachable
20 Node is reachable
21 Node is reachable
22 Node is reachable
23 Node is reachable
24 Node is reachable
25 Node is reachable
26 Node is reachable
27 Node is reachable
28 Node is reachable
29 Node is reachable
30 Node is reachable
31 Node is reachable
32 Node is reachable
33 Node is reachable
34 Node is reachable
35 Node is reachable
36 Node is reachable
37 Node is reachable
38 Node is reachable
39 Node is reachable
40 Node is reachable
41 Node is reachable
42 Node is reachable
43 Node is reachable
44 Node is reachable
45 Node is reachable
46 Node is reachable
47 Node is reachable
48 Node is reachable
49 Node is reachable
50 Node is reachable
51 Node is reachable
52 Node is reachable
53 Node is reachable
54 Node is reachable
55 Node is reachable
56 Node is reachable
57 Node is reachable
58 Node is reachable
59 Node is reachable
60 Node is reachable
61 Node is reachable
62 Node is reachable
63 Node is reachable
64 Node is reachable
65 Node is reachable
66 Node is reachable
67 Node is reachable
68 Node is reachable
69 Node is reachable
70 Node is reachable
71 Node is reachable
72 Node is reachable
73 Node is reachable
74 Node is reachable
75 Node is reachable
Verify security interoperability Attempt to connect in insecure mode 76 Node runs in secure mode
77 Node runs in secure mode
78 Node runs in secure mode
79 Node runs in secure mode
80 Node runs in secure mode
81 Node runs in secure mode
82 Node runs in secure mode
83 Node runs in secure mode
84 Node runs in secure mode
85 Node runs in secure mode
86 Node runs in secure mode
87 Node runs in secure mode
88 Node runs in secure mode
89 Node runs in secure mode
90 Node runs in secure mode
91 Node runs in secure mode
92 Node runs in secure mode
93 Node runs in secure mode
94 Node runs in secure mode
95 Node runs in secure mode
96 Node runs in secure mode
97 Node runs in secure mode
98 Node runs in secure mode
99 Node runs in secure mode
100 Node runs in secure mode
101 Node runs in secure mode
102 Node runs in secure mode
103 Node runs in secure mode
104 Node runs in secure mode
105 Node runs in secure mode
106 Node runs in secure mode
107 Node runs in secure mode
108 Node runs in secure mode
109 Node runs in secure mode
110 Node runs in secure mode
111 Node runs in secure mode
112 Node runs in secure mode
113 Node runs in secure mode
114 Node runs in secure mode
115 Node runs in secure mode
116 Node runs in secure mode
117 Node runs in secure mode
118 Node runs in secure mode
119 Node runs in secure mode
120 Node runs in secure mode
121 Node runs in secure mode
122 Node runs in secure mode
123 Node runs in secure mode
124 Node runs in secure mode
125 Node runs in secure mode
126 Node runs in secure mode
127 Node runs in secure mode
128 Node runs in secure mode
129 Node runs in secure mode
130 Node runs in secure mode
131 Node runs in secure mode
132 Node runs in secure mode
133 Node runs in secure mode
134 Node runs in secure mode
135 Node runs in secure mode
136 Node runs in secure mode
137 Node runs in secure mode
138 Node runs in secure mode
139 Node runs in secure mode
140 Node runs in secure mode
141 Node runs in secure mode
142 Node runs in secure mode
143 Node runs in secure mode
144 Node runs in secure mode
145 Node runs in secure mode
146 Node runs in secure mode
147 Node runs in secure mode
148 Node runs in secure mode
149 Node runs in secure mode
150 Node runs in secure mode
Attempt to connect with legacy encryption protocol 151 Node rejects legacy encryption protocols
152 Node rejects legacy encryption protocols
153 Node rejects legacy encryption protocols
154 Node rejects legacy encryption protocols
155 Node rejects legacy encryption protocols
156 Node rejects legacy encryption protocols
157 Node rejects legacy encryption protocols
158 Node rejects legacy encryption protocols
159 Node rejects legacy encryption protocols
160 Node rejects legacy encryption protocols
161 Node rejects legacy encryption protocols
162 Node rejects legacy encryption protocols
163 Node rejects legacy encryption protocols
164 Node rejects legacy encryption protocols
165 Node rejects legacy encryption protocols
166 Node rejects legacy encryption protocols
167 Node rejects legacy encryption protocols
168 Node rejects legacy encryption protocols
169 Node rejects legacy encryption protocols
170 Node rejects legacy encryption protocols
171 Node rejects legacy encryption protocols
172 Node rejects legacy encryption protocols
173 Node rejects legacy encryption protocols
174 Node rejects legacy encryption protocols
175 Node rejects legacy encryption protocols
176 Node rejects legacy encryption protocols
177 Node rejects legacy encryption protocols
178 Node rejects legacy encryption protocols
179 Node rejects legacy encryption protocols
180 Node rejects legacy encryption protocols
181 Node rejects legacy encryption protocols
182 Node rejects legacy encryption protocols
183 Node rejects legacy encryption protocols
184 Node rejects legacy encryption protocols
185 Node rejects legacy encryption protocols
186 Node rejects legacy encryption protocols
187 Node rejects legacy encryption protocols
188 Node rejects legacy encryption protocols
189 Node rejects legacy encryption protocols
190 Node rejects legacy encryption protocols
191 Node rejects legacy encryption protocols
192 Node rejects legacy encryption protocols
193 Node rejects legacy encryption protocols
194 Node rejects legacy encryption protocols
195 Node rejects legacy encryption protocols
196 Node rejects legacy encryption protocols
197 Node rejects legacy encryption protocols
198 Node rejects legacy encryption protocols
199 Node rejects legacy encryption protocols
200 Node rejects legacy encryption protocols
201 Node rejects legacy encryption protocols
202 Node rejects legacy encryption protocols
203 Node rejects legacy encryption protocols
204 Node rejects legacy encryption protocols
205 Node rejects legacy encryption protocols
206 Node rejects legacy encryption protocols
207 Node rejects legacy encryption protocols
208 Node rejects legacy encryption protocols
209 Node rejects legacy encryption protocols
210 Node rejects legacy encryption protocols
211 Node rejects legacy encryption protocols
212 Node rejects legacy encryption protocols
213 Node rejects legacy encryption protocols
214 Node rejects legacy encryption protocols
215 Node rejects legacy encryption protocols
216 Node rejects legacy encryption protocols
217 Node rejects legacy encryption protocols
218 Node rejects legacy encryption protocols
219 Node rejects legacy encryption protocols
220 Node rejects legacy encryption protocols
221 Node rejects legacy encryption protocols
222 Node rejects legacy encryption protocols
223 Node rejects legacy encryption protocols
224 Node rejects legacy encryption protocols
225 Node rejects legacy encryption protocols