Infrastructure Scenario Tests

We test Corax against real-world infrastructure failures across every vendor, platform, and scenario. Browse the results below.

276
Total Tests
100.0%
Pass Rate
276
Passed
0
Failed

Client Onboarding Discovery Scan Failure — Incomplete Asset Inventory

PASS

During a new client onboarding, the automated network discovery scan fails to complete due to aggressive IDS/IPS rules on the client firewall. The scan times out after 4 hours with only 30% of the network discovered. The MSP has an incomplete view of the client infrastructure.

InfrastructurePattern: TIMEOUTSeverity: CRITICALConfidence: 85%Remote Hands25 correlated

NOC Monitoring Blind Spot — SNMP Community String Rotation

PASS

During a scheduled SNMP community string rotation across client infrastructure, 40% of devices fail to update to the new community string. The NOC monitoring platform can no longer poll these devices, creating a critical blind spot across 6 client networks.

InfrastructurePattern: SNMP_TRAP_ERRORSeverity: CRITICALConfidence: 85%Auto-Heal35 correlated

Managed Firewall Policy Push Failure — Client Exposed

PASS

A firewall policy update pushed to 8 client firewalls fails on 3 of them, leaving those clients with an incomplete ruleset that allows unrestricted outbound traffic. The policy push failure went unnoticed because the management platform showed a false success status.

SecurityPattern: FIREWALL_RULE_BLOCKSeverity: CRITICALConfidence: 85%Remote Hands36 correlated

Client VPN Credential Compromise — Unauthorized Access

PASS

A client's VPN credentials are found on a dark web dump. Unauthorized connections are detected from foreign IPs through the client's site-to-site VPN tunnel. The attacker is pivoting through the VPN to access internal resources. Immediate tunnel teardown and credential rotation required.

SecurityPattern: VPN_TUNNEL_DOWNSeverity: CRITICALConfidence: 90%Remote Hands42 correlated

PSA/Ticketing Platform Outage — Service Desk Paralyzed

PASS

The ConnectWise Manage PSA platform becomes completely unreachable after a database failover goes wrong. The MSP service desk cannot create, update, or view tickets. Automated ticket creation from monitoring alerts queues up and eventually starts dropping. SLA tracking is offline.

InfrastructurePattern: CONNECTION_REFUSEDSeverity: CRITICALConfidence: 85%Remote Hands42 correlated

Multi-Tenant Backup Failure — Cloud Repository Corruption

PASS

The shared cloud backup repository used for 15 MSP clients becomes corrupted after a storage controller firmware bug. Backup jobs for all tenants fail with integrity check errors. The most recent valid restore point for some clients is 72 hours old, violating SLA RPO requirements.

InfrastructurePattern: BACKUP_FAILURESeverity: CRITICALConfidence: 95%Remote Hands42 correlated

RMM Agent Mass Disconnect — Monitoring Blind Spot

PASS

A failed RMM platform update pushes a corrupt agent binary to all managed endpoints. The agent enters a crash loop on 400+ devices across 12 client organizations, leaving the MSP completely blind to endpoint health and unable to run remote management tasks.

InfrastructurePattern: PROCESS_CRASH_LOOPSeverity: CRITICALConfidence: 92%Remote Hands28 correlated

Captive Portal Failure — Guest Network Unusable

PASS

The captive portal web server crashes, preventing guests from completing the splash page authentication. Guest devices connect to WiFi but cannot access the internet because the portal redirect times out. The portal VM ran out of memory handling a spike in connections.

InfrastructurePattern: TIMEOUTSeverity: CRITICALConfidence: 85%Auto-Heal19 correlated

WiFi Channel Interference from Neighboring Tenant

PASS

A neighboring tenant in the shared office building installs high-power wireless equipment on overlapping channels, causing severe co-channel interference. Client devices experience packet loss, low throughput, and frequent disconnections across the entire 2.4GHz band and DFS channels on 5GHz.

InfrastructurePattern: WIFI_INTERFERENCESeverity: CRITICALConfidence: 90%Remote Hands21 correlated

802.1X RADIUS Certificate Mismatch — Enterprise WiFi Auth Failure

PASS

The RADIUS server certificate used for EAP-TLS authentication expires, causing all 802.1X wireless clients to fail authentication. Supplicants reject the expired certificate, and no clients can connect to the enterprise SSID. Guest network remains functional.

InfrastructurePattern: CERTIFICATE_EXPIRYSeverity: CRITICALConfidence: 95%Remote Hands21 correlated

High-Density Venue WiFi Saturation — Conference Event

PASS

A 500-person conference event overwhelms the venue WiFi infrastructure. The wireless controller reports channel utilization above 90% on all APs in the event hall. Client devices experience severe contention, with most unable to maintain stable connections.

InfrastructurePattern: WIFI_INTERFERENCESeverity: CRITICALConfidence: 85%Remote Hands22 correlated

Aruba AP Cluster Failure — Campus WiFi Outage

PASS

The Aruba wireless controller cluster loses sync after a firmware mismatch between the primary and standby controllers. All APs managed by the failed controller go into standalone mode with degraded functionality. Roaming between controller zones fails completely.

InfrastructurePattern: WIRELESS_CONTROLLERSeverity: CRITICALConfidence: 92%Remote Hands29 correlated

Network Segmentation Bypass — Unauthorized Cross-VLAN Traffic

PASS

A misconfigured ACL on the layer 3 switch allows traffic from the guest VLAN to reach the server VLAN, bypassing network segmentation. The IDS detects lateral scanning from a compromised guest device targeting internal servers.

NetworkPattern: FIREWALL_RULE_BLOCKSeverity: CRITICALConfidence: 85%Auto-Heal42 correlated

RADIUS Authentication Server Down — Network Access Blocked

PASS

Both RADIUS servers (backed by Active Directory) become unreachable after an AD domain controller crash. All 802.1X network authentication fails, preventing users from connecting to wired and wireless networks. Existing sessions remain active but no new authentications succeed.

NetworkPattern: ACTIVE_DIRECTORYSeverity: CRITICALConfidence: 92%Remote Hands42 correlated

DNS Zone Transfer Failure — Secondary DNS Serving Stale Records

PASS

The primary DNS server's zone transfer (AXFR) to the secondary fails due to a firewall rule change blocking TCP port 53. The secondary DNS server continues serving increasingly stale records, causing intermittent name resolution failures as TTLs expire.

NetworkPattern: DNS_FAILURESeverity: CRITICALConfidence: 90%Remote Hands42 correlated

Core Switch Power Supply Failure — Stack Degradation

PASS

The primary power supply in the core switch stack fails, causing the switch to reboot onto the secondary PSU. During the reboot, the switch stack ring breaks and a stack master re-election occurs, disrupting all traffic through the core for 90 seconds.

NetworkPattern: SWITCH_STACK_EVENTSeverity: CRITICALConfidence: 92%Remote Hands36 correlated

Network Monitoring Tool Failure — Nagios/PRTG Crash Loop

PASS

The primary network monitoring platform enters a crash loop after a database corruption event during a power fluctuation. All alerting stops, creating a blind spot where infrastructure failures go undetected. The secondary monitoring server was decommissioned last month.

NetworkPattern: PROCESS_CRASH_LOOPSeverity: CRITICALConfidence: 90%Remote Hands26 correlated

MTU Mismatch Causing Packet Fragmentation and Drops

PASS

After a firewall firmware upgrade, the MTU on the WAN interface drops from 1500 to 1400 without updating the MSS clamp. Jumbo frames from the server VLAN hit the firewall and get silently dropped, causing intermittent failures for large file transfers and database replication.

NetworkPattern: NIC_ERRORSSeverity: CRITICALConfidence: 85%Remote Hands36 correlated

VLAN Trunk Misconfiguration — Spanning Tree Reconvergence

PASS

A junior admin accidentally changes a trunk port to access mode on a distribution switch, pruning all VLANs except the native VLAN. The spanning tree topology reconverges, causing a 30-second outage across multiple VLANs and triggering TCN flooding.

NetworkPattern: STP_LOOPSeverity: CRITICALConfidence: 87%Remote Hands47 correlated

BGP Route Leak Causing Traffic Blackhole

PASS

A misconfigured route-map on the border router leaks internal BGP prefixes to the upstream ISP. The ISP begins routing external traffic into a blackhole. Customer-facing services become unreachable from the internet while internal connectivity remains functional.

NetworkPattern: CISCO_EVENTSeverity: CRITICALConfidence: 92%Remote Hands58 correlated
PreviousPage 10 of 14Next

Every scenario is tested against Corax's Neural Engine in a production environment with AI-powered root cause analysis.

Tests run continuously as new infrastructure patterns are added.