Check-Mac-Address
These scenarios show how the
check-mac-address
feature works for the DHCP server
Test Check MAC Address
Description
The check-mac-address
option filters packets if there are differences between the MAC address found at the ethernet header and the MAC address found in the DHCP packet.
To check this option, you should send packets with these differences and enable this option to see if warnings appear in your logs.
Also, this test checks how the server behaves under normal conditions.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.0.0.1/24 set service dhcp-server shared-network dhcp subnet 10.0.0.0/24 start 10.0.0.5 stop 10.0.0.5 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system journal show | tail
at DUT0
and check if output contains the following tokens:
DHCPDISCOVER from 10:00:00:00:00:02 via eth0Show output
Jun 20 14:54:18.608654 osdx cfgd[1460]: [304024]Completed change to active configuration Jun 20 14:54:18.610394 osdx dhcpd[328569]: Wrote 0 leases to leases file. Jun 20 14:54:18.619777 osdx OSDxCLI[304024]: User 'admin' committed the configuration. Jun 20 14:54:18.636613 osdx OSDxCLI[304024]: User 'admin' left the configuration menu. Jun 20 14:54:18.690519 osdx dhcpd[328569]: Server starting service. Jun 20 14:54:18.806687 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal show | tail'. Jun 20 14:54:19.314433 osdx dhcpd[328569]: DHCPDISCOVER from 10:00:00:00:00:02 via eth0 Jun 20 14:54:20.315351 osdx dhcpd[328569]: DHCPOFFER on 10.0.0.5 to 10:00:00:00:00:02 via eth0 Jun 20 14:54:20.382149 osdx dhcpd[328569]: DHCPDISCOVER from 10:00:00:00:00:02 via eth0 Jun 20 14:54:20.382172 osdx dhcpd[328569]: DHCPOFFER on 10.0.0.5 to 10:00:00:00:00:02 via eth0
Step 3: Modify the following configuration lines in DUT0
:
set service dhcp-server check-mac-address
Step 4: Run command system journal clear
at DUT0
.
Step 5: Run command system journal show | tail
at DUT0
and check if output does not contain the following tokens:
DHCPDISCOVER from 10:00:00:00:00:02 via eth0Show output
Jun 20 14:54:21.646693 osdx systemd-journald[210303]: Runtime Journal (/run/log/journal/a9538f26f6924eb58d28105803b55de8) is 2.1M, max 15.3M, 13.1M free. Jun 20 14:54:21.650424 osdx systemd-journald[210303]: Received client request to rotate journal, rotating. Jun 20 14:54:21.650498 osdx systemd-journald[210303]: Vacuuming done, freed 0B of archived journals from /run/log/journal/a9538f26f6924eb58d28105803b55de8. Jun 20 14:54:21.651139 osdx sudo[328633]: pam_limits(sudo:session): invalid line '@200:215 hard maxlogins ' - skipped Jun 20 14:54:21.659549 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal clear'.
Step 6: Run command system journal show | tail
at DUT0
and check if output contains the following tokens:
MAC received in DHCP packet (10:00:00:00:00:02) is different than source MAC in ethernet header (10:00:00:00:00:01)Show output
Jun 20 14:54:21.646693 osdx systemd-journald[210303]: Runtime Journal (/run/log/journal/a9538f26f6924eb58d28105803b55de8) is 2.1M, max 15.3M, 13.1M free. Jun 20 14:54:21.650424 osdx systemd-journald[210303]: Received client request to rotate journal, rotating. Jun 20 14:54:21.650498 osdx systemd-journald[210303]: Vacuuming done, freed 0B of archived journals from /run/log/journal/a9538f26f6924eb58d28105803b55de8. Jun 20 14:54:21.651139 osdx sudo[328633]: pam_limits(sudo:session): invalid line '@200:215 hard maxlogins ' - skipped Jun 20 14:54:21.659549 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal clear'. Jun 20 14:54:21.748673 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal show | tail'. Jun 20 14:54:21.821087 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal show | tail'. Jun 20 14:54:22.478260 osdx dhcpd[328625]: MAC received in DHCP packet (10:00:00:00:00:02) is different than source MAC in ethernet header (10:00:00:00:00:01) Jun 20 14:54:23.522298 osdx dhcpd[328625]: MAC received in DHCP packet (10:00:00:00:00:02) is different than source MAC in ethernet header (10:00:00:00:00:01)
Step 7: Set the following configuration in DUT1
:
set interfaces ethernet eth0 mac '10:00:00:00:00:05' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Modify the following configuration lines in DUT1
:
set interfaces ethernet eth0 address dhcp
Step 9: Run command interfaces ethernet eth0 show
at DUT1
and check if output contains the following tokens:
10.0.0.5
Show output
----------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ----------------------------------------------------------------- eth0 10.0.0.5/24 up up fe80::dcad:beff:feef:6c10/64
Step 10: Run command service dhcp-server show leases main | grep 10.0.0.5
at DUT0
and check if output contains the following tokens:
10:00:00:00:00:05Show output
10.0.0.5 10:00:00:00:00:05 2025/06/20 14:54:26 2025/06/21 02:54:26 2025/06/20 14:54:26
Test Check MAC Address VRF
Description
This scenario configures a DHCP server with VRF instead of regular interfaces and checks the check-mac-address
option.
To check this option, you will need to send packets with differences in the Source MAC for the link layer and the client MAC from the application layer.
Scenario
Step 1: Set the following configuration in DUT0
:
set interfaces ethernet eth0 address 10.0.0.1/24 set interfaces ethernet eth0 vrf VRF0 set service dhcp-server shared-network dhcp local-vrf VRF0 set service dhcp-server shared-network dhcp subnet 10.0.0.0/24 start 10.0.0.5 stop 10.0.0.6 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrf VRF0
Step 2: Run command system journal show | tail
at DUT0
and check if output contains the following tokens:
DHCPDISCOVER from 10:00:00:00:00:02 via eth0Show output
Jun 20 14:54:33.744025 osdx cfgd[1460]: [304024]Completed change to active configuration Jun 20 14:54:33.744887 osdx dhcpd[328971]: Wrote 0 leases to leases file. Jun 20 14:54:33.756062 osdx OSDxCLI[304024]: User 'admin' committed the configuration. Jun 20 14:54:33.776474 osdx OSDxCLI[304024]: User 'admin' left the configuration menu. Jun 20 14:54:33.790004 osdx dhcpd[328971]: Server starting service. Jun 20 14:54:33.913523 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal show | tail'. Jun 20 14:54:34.161162 osdx dhcpd[328971]: DHCPDISCOVER from 10:00:00:00:00:02 via eth0 Jun 20 14:54:35.161806 osdx dhcpd[328971]: DHCPOFFER on 10.0.0.5 to 10:00:00:00:00:02 via eth0 Jun 20 14:54:35.214345 osdx dhcpd[328971]: DHCPDISCOVER from 10:00:00:00:00:02 via eth0 Jun 20 14:54:35.214390 osdx dhcpd[328971]: DHCPOFFER on 10.0.0.5 to 10:00:00:00:00:02 via eth0
Step 3: Modify the following configuration lines in DUT0
:
set service dhcp-server check-mac-address
Step 4: Run command system journal clear
at DUT0
.
Step 5: Run command system journal show | tail
at DUT0
and check if output does not contain the following tokens:
DHCPDISCOVER from 10:00:00:00:00:02 via eth0Show output
Jun 20 14:54:36.683110 osdx systemd-journald[210303]: Runtime Journal (/run/log/journal/a9538f26f6924eb58d28105803b55de8) is 2.0M, max 15.3M, 13.3M free. Jun 20 14:54:36.685859 osdx systemd-journald[210303]: Received client request to rotate journal, rotating. Jun 20 14:54:36.685911 osdx systemd-journald[210303]: Vacuuming done, freed 0B of archived journals from /run/log/journal/a9538f26f6924eb58d28105803b55de8. Jun 20 14:54:36.686960 osdx sudo[329035]: pam_limits(sudo:session): invalid line '@200:215 hard maxlogins ' - skipped Jun 20 14:54:36.693049 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal clear'.
Step 6: Run command system journal show | tail
at DUT0
and check if output contains the following tokens:
MAC received in DHCP packet (10:00:00:00:00:02) is different than source MAC in ethernet header (10:00:00:00:00:01)Show output
Jun 20 14:54:36.683110 osdx systemd-journald[210303]: Runtime Journal (/run/log/journal/a9538f26f6924eb58d28105803b55de8) is 2.0M, max 15.3M, 13.3M free. Jun 20 14:54:36.685859 osdx systemd-journald[210303]: Received client request to rotate journal, rotating. Jun 20 14:54:36.685911 osdx systemd-journald[210303]: Vacuuming done, freed 0B of archived journals from /run/log/journal/a9538f26f6924eb58d28105803b55de8. Jun 20 14:54:36.686960 osdx sudo[329035]: pam_limits(sudo:session): invalid line '@200:215 hard maxlogins ' - skipped Jun 20 14:54:36.693049 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal clear'. Jun 20 14:54:36.758344 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal show | tail'. Jun 20 14:54:36.866810 osdx OSDxCLI[304024]: User 'admin' executed a new command: 'system journal show | tail'. Jun 20 14:54:37.313102 osdx dhcpd[329027]: MAC received in DHCP packet (10:00:00:00:00:02) is different than source MAC in ethernet header (10:00:00:00:00:01) Jun 20 14:54:38.365058 osdx dhcpd[329027]: MAC received in DHCP packet (10:00:00:00:00:02) is different than source MAC in ethernet header (10:00:00:00:00:01)
Step 7: Set the following configuration in DUT1
:
set interfaces ethernet eth0 mac '10:00:00:00:00:05' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Modify the following configuration lines in DUT1
:
set interfaces ethernet eth0 address dhcp
Step 9: Run command interfaces ethernet eth0 show
at DUT1
and check if output contains the following tokens:
10.0.0.5
Show output
----------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ----------------------------------------------------------------- eth0 10.0.0.5/24 up up fe80::dcad:beff:feef:6c10/64
Step 10: Run command service dhcp-server show leases VRF0 | grep 10.0.0.5
at DUT0
and check if output contains the following tokens:
10:00:00:00:00:05Show output
10.0.0.5 10:00:00:00:00:05 2025/06/20 14:54:41 2025/06/21 02:54:41 2025/06/20 14:54:41