Vrrp
Examples for High Availability (VRRP)
VRRP With MD5 Authentication
Description
This scenario checks that two OSDx devices can use VRRP with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/y7ab/9RmCM7Muof/W+iB+6eG2kvg2feg= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19qJD/7xkmI8mLfTTZl4rGsM9FgG83uvL0= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:01 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/y7ab/9RmCM7Muof/W+iB+6eG2kvg2feg= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
VRRP With Plaintext Password Authentication
Description
This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/a43+LIMGr7LB8funwtS8PloQEeYcKSpI= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX195Jw14rfUY3zIIZ+IqyybQnxmHzIfMBTI= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:00 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/a43+LIMGr7LB8funwtS8PloQEeYcKSpI= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP With AH Authentication
Description
This scenario checks that two OSDx devices can use VRRP with AH authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/AfT+tlWRpCdwUqIIgFn3LDHQlmJdvpOo= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX180lgPeLOtZlqfYvVxXZNi+N+wrlmmHjEQ= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:01 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/AfT+tlWRpCdwUqIIgFn3LDHQlmJdvpOo= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP RFC3768 Compatibility Configuration
Description
Check that a virtual interface is being created when this option is configured.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:
eth0v1\s*192.168.10.1/32Show output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- eth0 192.168.100.100/24 up up fe80::dcad:beff:feef:6c00/64 eth0v1 192.168.10.1/32 up up eth1 down down
Two VRRP Devices In Same Sync Group
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Two VRRP Devices In Same Sync Group With MD5 Authentication
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX1/A+cy+Pdwy5bi+d11fJ5Mmc5Yd+qCPuYU= set system vrrp sync-group MAIN0 authentication type md5
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX18eoeq2DmyYQeCgL+9ptD0XS8uX9ki7q40= set system vrrp sync-group MAIN1 authentication type md5
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Test GARP Interval
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:05 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:28:10.300099812 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:28:10.400107563 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:28:10.732130979 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2025-11-12 12:28:11.148142111 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2025-11-12 12:28:11.153681565 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2025-11-12 12:28:11.212169420 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:28:11.257686624 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:28:11.321721492 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-11-12 12:28:11.369699201 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2025-11-12 12:28:11.756216163 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2025-11-12 12:28:11.768163303 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2025-11-12 12:28:12.001738844 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2025-11-12 12:28:12.716224049 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-11-12 12:28:12.716281357 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-11-12 12:28:13.025837180 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-11-12 12:28:13.037734407 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:28:13.345803661 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2025-11-12 12:28:13.609763884 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2025-11-12 12:28:13.609807141 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-11-12 12:28:13.609818461 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:28:13.609822594 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:28:13.609836635 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:28:13.609840540 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-11-12 12:28:13.766356526 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2025-11-12 12:28:14.609929164 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:28:15.610029570 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2025-11-12 12:28:19.219769356 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2025-11-12 12:28:19.219815806 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:28:20.219962262 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2025-11-12 12:28:21.220050334 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2025-11-12 12:28:22.220167125 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-11-12 12:28:23.220261503 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-11-12 12:28:24.220054139 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-11-12 12:28:24.220294434 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-11-12 12:28:25.220417507 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2025-11-12 12:28:26.220512738 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
19.21 24.22
Interval[0]: 5.009999999999998
Test GARP Interval Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp interval 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:02 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:28:34.212929977 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:28:34.308929334 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:28:34.316952258 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2025-11-12 12:28:34.376960121 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2025-11-12 12:28:35.052991968 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-11-12 12:28:35.078538686 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:28:35.162548663 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:28:35.345111909 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-11-12 12:28:35.360998940 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2025-11-12 12:28:35.394577037 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2025-11-12 12:28:35.458577507 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 12 2025-11-12 12:28:35.458626086 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2025-11-12 12:28:35.517043627 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2025-11-12 12:28:35.725038560 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2025-11-12 12:28:36.418767361 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-11-12 12:28:36.430569556 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:28:36.866620222 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2025-11-12 12:28:37.218635242 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2025-11-12 12:28:37.516423219 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2025-11-12 12:28:37.516464298 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:28:37.516475003 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:28:37.516479510 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:28:37.516496631 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-11-12 12:28:37.516500323 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2025-11-12 12:28:41.126319148 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:28:41.126375227 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-11-12 12:28:42.126505969 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2025-11-12 12:28:43.126621374 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 29 2025-11-12 12:28:44.126743254 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2025-11-12 12:28:45.126842503 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2025-11-12 12:28:46.126610832 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2025-11-12 12:28:46.126892833 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-11-12 12:28:47.127027276 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-11-12 12:28:48.127123061 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
41.12 46.12
Interval[0]: 5.0
Test GARP Master Delay
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:02 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:28:56.389730246 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:28:56.485721080 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:28:56.685792583 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2025-11-12 12:28:56.717750002 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2025-11-12 12:28:56.973777056 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-11-12 12:28:57.283340672 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:28:57.371338137 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:28:57.519378501 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-11-12 12:28:57.741848262 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-11-12 12:28:57.753792722 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2025-11-12 12:28:57.795350739 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 12 2025-11-12 12:28:57.797756338 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2025-11-12 12:28:58.147356141 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 14 2025-11-12 12:28:58.317924077 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2025-11-12 12:28:58.819464694 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-11-12 12:28:58.831382770 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:28:59.107394665 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2025-11-12 12:28:59.363427997 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2025-11-12 12:28:59.694940412 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2025-11-12 12:28:59.694975788 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:28:59.694986874 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:28:59.694991021 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:28:59.695004421 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-11-12 12:28:59.695008799 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2025-11-12 12:29:03.304754573 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:29:03.304797766 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-11-12 12:29:03.304808927 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-11-12 12:29:03.304816082 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:29:03.304819758 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-11-12 12:29:03.304823710 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-11-12 12:29:04.304957193 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-11-12 12:29:05.305058743 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2025-11-12 12:29:05.305088579 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-11-12 12:29:05.305091718 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2025-11-12 12:29:05.305098779 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-11-12 12:29:05.305110968 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-11-12 12:29:05.305114740 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2025-11-12 12:29:06.305105887 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2025-11-12 12:29:07.305213706 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2025-11-12 12:29:08.305319401 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-11-12 12:29:09.305413427 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2025-11-12 12:29:10.305527110 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
03.30 03.30 03.30 03.30 03.30 05.30 05.30 05.30 05.30 05.30
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Delay Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-delay 2
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:02 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:29:18.354504644 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:29:18.434500078 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:29:19.022520700 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2025-11-12 12:29:19.246549804 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2025-11-12 12:29:19.246593312 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2025-11-12 12:29:19.304859577 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:29:19.392105786 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:29:19.972131121 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-11-12 12:29:20.068123789 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2025-11-12 12:29:20.100109373 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2025-11-12 12:29:20.270637128 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-11-12 12:29:20.282560504 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2025-11-12 12:29:20.654592480 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-11-12 12:29:21.124247396 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-11-12 12:29:21.136151757 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 16 2025-11-12 12:29:21.196173798 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:29:21.198601635 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2025-11-12 12:29:21.644082658 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2025-11-12 12:29:21.644122689 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-11-12 12:29:21.644132102 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:29:21.644176017 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:29:21.644190102 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:29:21.644197264 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-11-12 12:29:22.020243746 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2025-11-12 12:29:25.253846757 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:29:25.253881823 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-11-12 12:29:25.253890150 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-11-12 12:29:25.253892965 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:29:25.253903751 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-11-12 12:29:25.253908318 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-11-12 12:29:26.254028090 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-11-12 12:29:27.254074538 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2025-11-12 12:29:27.254117546 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-11-12 12:29:27.254121949 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2025-11-12 12:29:27.254126028 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-11-12 12:29:27.254144340 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-11-12 12:29:27.254150359 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2025-11-12 12:29:28.254199066 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2025-11-12 12:29:29.254302033 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2025-11-12 12:29:30.254399180 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-11-12 12:29:31.254506809 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2025-11-12 12:29:32.254597165 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
25.25 25.25 25.25 25.25 25.25 27.25 27.25 27.25 27.25 27.25
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:29:40.443309672 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:29:40.535272507 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:29:40.751331052 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2025-11-12 12:29:41.327332169 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2025-11-12 12:29:41.423340083 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-11-12 12:29:41.444881502 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:29:41.536884216 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:29:42.116896072 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2025-11-12 12:29:42.244910311 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-11-12 12:29:42.340926440 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2025-11-12 12:29:42.351404200 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-11-12 12:29:42.363318101 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2025-11-12 12:29:42.671369751 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-11-12 12:29:42.735374375 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-11-12 12:29:43.365053191 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-11-12 12:29:43.376945877 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:29:43.585044342 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2025-11-12 12:29:43.604998425 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2025-11-12 12:29:43.742530723 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2025-11-12 12:29:43.742563200 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:29:43.742573259 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:29:43.742577420 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:29:43.742590597 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-11-12 12:29:43.742595092 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2025-11-12 12:29:47.352330252 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:29:47.352373209 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-11-12 12:29:47.352384835 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-11-12 12:29:47.352400439 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:29:48.352505200 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2025-11-12 12:29:49.352606586 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2025-11-12 12:29:50.352708965 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-11-12 12:29:51.352801767 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-11-12 12:29:52.352646715 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-11-12 12:29:52.352685122 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2025-11-12 12:29:52.352701603 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-11-12 12:29:52.352864058 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2025-11-12 12:29:53.352998732 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2025-11-12 12:29:54.353096811 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:30:02.172031572 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:30:02.224049564 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 3 2025-11-12 12:30:02.260027490 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2025-11-12 12:30:02.800073508 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2025-11-12 12:30:03.061649697 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2025-11-12 12:30:03.088127438 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 7 2025-11-12 12:30:03.161642026 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:30:03.749688978 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-11-12 12:30:04.005677926 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2025-11-12 12:30:04.037670440 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2025-11-12 12:30:04.112286726 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-11-12 12:30:04.124100885 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2025-11-12 12:30:04.180136400 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2025-11-12 12:30:04.752154409 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2025-11-12 12:30:05.061820774 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-11-12 12:30:05.073714992 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:30:05.445741588 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2025-11-12 12:30:05.469646175 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2025-11-12 12:30:05.469680348 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-11-12 12:30:05.469692355 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:30:05.469697590 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:30:05.469711661 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:30:05.469720473 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-11-12 12:30:05.893739763 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2025-11-12 12:30:09.079450268 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:30:09.079495493 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-11-12 12:30:09.079509486 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-11-12 12:30:09.079528878 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:30:10.079620268 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2025-11-12 12:30:11.079724636 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2025-11-12 12:30:12.079825637 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-11-12 12:30:13.079912818 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-11-12 12:30:14.079761966 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-11-12 12:30:14.079790857 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2025-11-12 12:30:14.079805037 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-11-12 12:30:14.079960252 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2025-11-12 12:30:15.080166189 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2025-11-12 12:30:16.080191693 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Refresh
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:30:23.928790179 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:30:24.028810836 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:30:24.400839675 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2025-11-12 12:30:24.432839227 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2025-11-12 12:30:24.882364119 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2025-11-12 12:30:24.890411594 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:30:24.994414659 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:30:25.042441374 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 9 2025-11-12 12:30:25.382433298 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-11-12 12:30:25.446421850 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 11 2025-11-12 12:30:25.904938492 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-11-12 12:30:25.916860613 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2025-11-12 12:30:26.054494207 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2025-11-12 12:30:26.066463391 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2025-11-12 12:30:26.342451626 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 16 2025-11-12 12:30:26.544923454 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:30:26.790472091 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2025-11-12 12:30:26.928921366 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2025-11-12 12:30:27.238730743 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2025-11-12 12:30:27.238813213 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:30:27.238841899 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:30:27.238856030 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:30:27.238888316 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-11-12 12:30:27.238913959 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2025-11-12 12:30:30.848728221 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:30:30.848769140 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-11-12 12:30:30.848780423 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-11-12 12:30:30.848784446 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:30:30.848788657 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-11-12 12:30:30.848801552 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-11-12 12:30:31.848913876 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-11-12 12:30:32.849012820 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-11-12 12:30:33.849128841 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-11-12 12:30:34.849236093 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-11-12 12:30:35.849051378 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-11-12 12:30:35.849076876 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-11-12 12:30:35.849080206 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2025-11-12 12:30:35.849082907 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2025-11-12 12:30:35.849094694 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2025-11-12 12:30:35.849274718 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-11-12 12:30:35.849296074 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2025-11-12 12:30:36.849480417 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2025-11-12 12:30:37.849503945 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2025-11-12 12:30:38.849611601 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2025-11-12 12:30:39.849698374 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2025-11-12 12:30:40.849811665 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2025-11-12 12:30:40.849856259 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 48 2025-11-12 12:30:41.849915312 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2025-11-12 12:30:42.850027131 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2025-11-12 12:30:43.850107490 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2025-11-12 12:30:44.850230790 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2025-11-12 12:30:45.850331387 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2025-11-12 12:30:45.850383932 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 54 2025-11-12 12:30:46.850448956 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2025-11-12 12:30:47.850626360 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
35.84 40.84 45.85
Interval[0]: 5.0
Interval[1]: 5.009999999999998
Test GARP Master Refresh Global
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:30:55.857941526 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:30:55.961924349 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:30:56.085929177 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2025-11-12 12:30:56.529960556 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2025-11-12 12:30:56.817969270 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2025-11-12 12:30:56.907521916 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:30:57.023524048 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:30:57.639559651 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-11-12 12:30:57.831555832 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2025-11-12 12:30:57.842048927 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2025-11-12 12:30:57.853966343 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2025-11-12 12:30:57.895552956 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2025-11-12 12:30:58.226016711 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-11-12 12:30:58.322011778 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-11-12 12:30:58.919659770 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-11-12 12:30:58.931595975 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:30:59.172111558 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2025-11-12 12:30:59.172145664 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2025-11-12 12:30:59.172155649 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-11-12 12:30:59.172159492 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:30:59.172174807 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:30:59.172180173 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:30:59.239624163 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 24 2025-11-12 12:30:59.431607668 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2025-11-12 12:31:02.781884159 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:31:02.781924647 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-11-12 12:31:02.781935807 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-11-12 12:31:02.781940096 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:31:02.781955252 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-11-12 12:31:02.781959428 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-11-12 12:31:03.782103734 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-11-12 12:31:04.782149010 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-11-12 12:31:05.782341273 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-11-12 12:31:06.782371947 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-11-12 12:31:07.782186724 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-11-12 12:31:07.782211083 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-11-12 12:31:07.782214374 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2025-11-12 12:31:07.782217174 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2025-11-12 12:31:07.782229395 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2025-11-12 12:31:07.782403655 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-11-12 12:31:07.782414734 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2025-11-12 12:31:08.782543480 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2025-11-12 12:31:09.782640864 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2025-11-12 12:31:10.782763145 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2025-11-12 12:31:11.782881812 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2025-11-12 12:31:12.783011884 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2025-11-12 12:31:12.783045257 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 48 2025-11-12 12:31:13.783136910 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2025-11-12 12:31:14.783273737 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2025-11-12 12:31:15.783392205 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2025-11-12 12:31:16.783516507 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2025-11-12 12:31:17.783642211 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2025-11-12 12:31:17.783677973 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 54 2025-11-12 12:31:18.783782484 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2025-11-12 12:31:19.783904444 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
07.78 12.78 17.78
Interval[0]: 4.999999999999999
Interval[1]: 5.000000000000002
Test GARP Master Refresh Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:05 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:31:27.991635140 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:31:28.079528679 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:31:28.307571838 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2025-11-12 12:31:28.403578195 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2025-11-12 12:31:28.837149805 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2025-11-12 12:31:28.917225592 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:31:28.941247647 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-11-12 12:31:28.997181196 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 9 2025-11-12 12:31:29.075630537 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2025-11-12 12:31:29.149193274 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 11 2025-11-12 12:31:29.331729623 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-11-12 12:31:29.343627073 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2025-11-12 12:31:29.619689027 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-11-12 12:31:29.619753909 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-11-12 12:31:30.025298628 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-11-12 12:31:30.037207963 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:31:30.089231924 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2025-11-12 12:31:30.729297758 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2025-11-12 12:31:31.289493256 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2025-11-12 12:31:31.289538447 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:31:31.289551363 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:31:31.289555642 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:31:31.289570977 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-11-12 12:31:31.289576110 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2025-11-12 12:31:32.289678923 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:31:33.289732875 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2025-11-12 12:31:36.899618002 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2025-11-12 12:31:36.899653158 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:31:36.899664692 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-11-12 12:31:36.899669714 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-11-12 12:31:36.899683217 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2025-11-12 12:31:36.899687803 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2025-11-12 12:31:37.899823998 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-11-12 12:31:38.900096992 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-11-12 12:31:39.900212793 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2025-11-12 12:31:40.900342124 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2025-11-12 12:31:41.900067496 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2025-11-12 12:31:41.900094030 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2025-11-12 12:31:41.900097883 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2025-11-12 12:31:41.900101231 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 41 2025-11-12 12:31:41.900113275 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2025-11-12 12:31:41.900392687 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2025-11-12 12:31:41.900406613 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2025-11-12 12:31:41.900410649 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 45 2025-11-12 12:31:41.900415781 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 46 2025-11-12 12:31:42.900554220 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2025-11-12 12:31:43.900681155 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2025-11-12 12:31:44.900801626 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2025-11-12 12:31:45.900926610 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2025-11-12 12:31:46.901069291 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2025-11-12 12:31:46.901106169 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2025-11-12 12:31:46.901115106 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 53 2025-11-12 12:31:46.901129350 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 54 2025-11-12 12:31:47.901181419 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2025-11-12 12:31:48.901317514 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2025-11-12 12:31:49.901513764 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2025-11-12 12:31:50.901540708 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 58 2025-11-12 12:31:51.901677576 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 59 2025-11-12 12:31:51.901716763 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2025-11-12 12:31:51.901728197 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 61 2025-11-12 12:31:51.901744759 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 62 2025-11-12 12:31:52.901802578 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 63 2025-11-12 12:31:53.901943918 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3
Test GARP Master Refresh Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5 set system vrrp global-parameters garp master-refresh-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-11-12 12:32:01.925614431 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-11-12 12:32:02.033644355 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-11-12 12:32:02.125641804 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2025-11-12 12:32:02.193664609 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2025-11-12 12:32:02.485678445 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2025-11-12 12:32:03.083527720 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-11-12 12:32:03.157781789 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 8 2025-11-12 12:32:03.169709292 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 9 2025-11-12 12:32:03.171231895 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2025-11-12 12:32:03.197714446 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2025-11-12 12:32:03.335303867 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-11-12 12:32:03.419286290 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2025-11-12 12:32:03.477743511 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-11-12 12:32:03.915310467 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 15 2025-11-12 12:32:04.939431172 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-11-12 12:32:04.951348454 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-11-12 12:32:05.243724215 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2025-11-12 12:32:05.243762209 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2025-11-12 12:32:05.243774713 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-11-12 12:32:05.243778853 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-11-12 12:32:05.243793576 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-11-12 12:32:05.243797233 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-11-12 12:32:05.579429183 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 24 2025-11-12 12:32:05.803423266 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2025-11-12 12:32:08.853605246 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-11-12 12:32:08.853651713 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-11-12 12:32:08.853664215 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-11-12 12:32:08.853668814 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-11-12 12:32:08.853685300 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-11-12 12:32:08.853688804 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-11-12 12:32:09.853800801 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-11-12 12:32:10.853933633 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-11-12 12:32:11.854053198 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-11-12 12:32:12.854175284 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-11-12 12:32:13.854132555 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-11-12 12:32:13.854174336 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-11-12 12:32:13.854182838 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2025-11-12 12:32:13.854191786 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2025-11-12 12:32:13.854219624 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2025-11-12 12:32:13.854316988 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-11-12 12:32:13.854343553 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2025-11-12 12:32:13.854352226 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2025-11-12 12:32:13.854365269 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2025-11-12 12:32:14.854481638 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2025-11-12 12:32:15.854600885 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2025-11-12 12:32:16.854723766 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2025-11-12 12:32:17.854869348 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2025-11-12 12:32:18.854991423 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2025-11-12 12:32:18.855023422 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 50 2025-11-12 12:32:18.855035695 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2025-11-12 12:32:18.855050274 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2025-11-12 12:32:19.855141399 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2025-11-12 12:32:20.855287108 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2025-11-12 12:32:21.855425515 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2025-11-12 12:32:22.855540919 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2025-11-12 12:32:23.855672532 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2025-11-12 12:32:23.855706323 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 58 2025-11-12 12:32:23.855716199 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2025-11-12 12:32:23.855732272 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2025-11-12 12:32:24.855784273 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 61 2025-11-12 12:32:25.855922356 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3