Vrrp

Examples for High Availability (VRRP)

VRRP With MD5 Authentication

Description

This scenario checks that two OSDx devices can use VRRP with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18p61HYHpKa5SJexDS1Guu0ciyCR2Tbtzg=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18+me6TlrvlomrAPMkaZrfn8Yn/I6lIlUE=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:01

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18p61HYHpKa5SJexDS1Guu0ciyCR2Tbtzg=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

VRRP With Plaintext Password Authentication

Description

This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18RCwIvUXTZgO6IdGwCexGhj2i5vHNVFVc=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19GpsqQHamrbXFfxRdbUftMmRWYFVtpGPU=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:02

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:01

   Master router: 192.168.100.100
   Master priority: 200

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18RCwIvUXTZgO6IdGwCexGhj2i5vHNVFVc=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

VRRP With AH Authentication

Description

This scenario checks that two OSDx devices can use VRRP with AH authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/L9PdkNijTq41vv2cTIgZRsy7sUycZFUU=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+OUhQYRme6ssItaerhFamhaU/3Rj3iOfc=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:01

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/L9PdkNijTq41vv2cTIgZRsy7sUycZFUU=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

VRRP RFC3768 Compatibility Configuration

Description

Check that a virtual interface is being created when this option is configured.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:

eth0v1\s*192.168.10.1/32
Show output
-------------------------------------------------------------------
 Name            IP Address           Admin  Oper  Vrf  Description
-------------------------------------------------------------------
  eth0  192.168.100.100/24            up     up
        fe80::dcad:beff:feef:6c00/64
eth0v1  192.168.10.1/32               up     up
  eth1                                down   down

Two VRRP Devices In Same Sync Group

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Two VRRP Devices In Same Sync Group With MD5 Authentication

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX1930+VJKmOlo2lqG6md6wjtUSDY+vYngrk=
set system vrrp sync-group MAIN0 authentication type md5

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX1/JgBWhUc9trH3Z88t8fFdNV3MnOyYZdSA=
set system vrrp sync-group MAIN1 authentication type md5

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Test GARP Interval

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:33:22.370945843           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:33:22.419378277           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 3 2025-12-17 18:33:22.478962225 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2025-12-17 18:33:22.734968582 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2025-12-17 18:33:22.843011257           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2025-12-17 18:33:23.374231579           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:33:23.486240793 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2025-12-17 18:33:23.534245576           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2025-12-17 18:33:23.726277732           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2025-12-17 18:33:23.867103799 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2025-12-17 18:33:23.879039549 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2025-12-17 18:33:24.078275258 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2025-12-17 18:33:24.443061878 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2025-12-17 18:33:24.750365421 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2025-12-17 18:33:24.762264836 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2025-12-17 18:33:24.859047342 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:33:25.550324094 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2025-12-17 18:33:25.550372287 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2025-12-17 18:33:25.687708195 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2025-12-17 18:33:25.687760076 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:33:25.687772180 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:33:25.687775813 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:33:25.687789083 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2025-12-17 18:33:25.687794783 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2025-12-17 18:33:29.297556621 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:33:29.297605630 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2025-12-17 18:33:30.297749581 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2025-12-17 18:33:31.297861910 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
29 2025-12-17 18:33:32.297988095 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2025-12-17 18:33:33.298110724 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2025-12-17 18:33:34.297881020 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2025-12-17 18:33:34.298166703 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:33:35.298317808 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2025-12-17 18:33:36.298448801 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
29.29
34.29
Interval[0]: 5.0

Test GARP Interval Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp interval 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:33:45.487788508           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:33:45.591770830 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2025-12-17 18:33:45.819796431           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2025-12-17 18:33:45.883986145 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2025-12-17 18:33:46.011822596           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2025-12-17 18:33:46.532330786           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:33:46.713017109 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2025-12-17 18:33:46.843916724 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2025-12-17 18:33:46.855971261 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2025-12-17 18:33:46.991084424 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
11 2025-12-17 18:33:47.151103414           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2025-12-17 18:33:47.471102805           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
13 2025-12-17 18:33:47.739898904 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2025-12-17 18:33:47.803899115 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2025-12-17 18:33:48.495182125 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2025-12-17 18:33:48.507085235 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:33:48.627129762 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2025-12-17 18:33:48.800094710 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2025-12-17 18:33:48.800133802 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2025-12-17 18:33:48.800142949 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:33:48.800168095 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:33:48.800172920 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:33:48.800177381 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2025-12-17 18:33:49.455169816 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2025-12-17 18:33:49.800355524 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:33:53.410255893 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2025-12-17 18:33:53.410310608 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:33:54.410438690 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
29 2025-12-17 18:33:55.410567306 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2025-12-17 18:33:56.410676976 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2025-12-17 18:33:57.410777816 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2025-12-17 18:33:58.410573287 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
33 2025-12-17 18:33:58.410825226 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2025-12-17 18:33:59.410969210 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
53.41
58.41
Interval[0]: 5.0

Test GARP Master Delay

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:34:08.732596289           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:34:08.876593744 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2025-12-17 18:34:09.116656131           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2025-12-17 18:34:09.340634883 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2025-12-17 18:34:09.660664586           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2025-12-17 18:34:09.835862146           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:34:09.947898411 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2025-12-17 18:34:09.967900282           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2025-12-17 18:34:10.027911404           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2025-12-17 18:34:10.607907584 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
11 2025-12-17 18:34:10.684732421 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2025-12-17 18:34:10.696649669 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2025-12-17 18:34:10.720660586 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2025-12-17 18:34:11.056005591 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2025-12-17 18:34:11.067871228 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2025-12-17 18:34:11.095898349 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:34:11.127917925 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2025-12-17 18:34:11.644707381 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2025-12-17 18:34:12.084601856 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2025-12-17 18:34:12.084648640 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:34:12.084660958 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:34:12.084664927 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:34:12.084679479 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2025-12-17 18:34:12.084683550 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2025-12-17 18:34:13.084936116 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:34:16.694726667 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2025-12-17 18:34:16.694854318 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:34:16.694897314 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2025-12-17 18:34:16.694960591 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2025-12-17 18:34:16.694972409 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2025-12-17 18:34:16.694978327 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2025-12-17 18:34:17.695125195 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:34:18.695140239 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2025-12-17 18:34:18.695172202 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2025-12-17 18:34:18.695176402 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2025-12-17 18:34:18.695180226 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2025-12-17 18:34:18.695199586 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2025-12-17 18:34:18.695205043 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2025-12-17 18:34:19.695314872 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2025-12-17 18:34:20.695438746 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2025-12-17 18:34:21.695547191 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2025-12-17 18:34:22.695668915 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
16.69
16.69
16.69
16.69
16.69
18.69
18.69
18.69
18.69
18.69

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Delay Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-delay 2

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:34:31.985422077           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:34:32.085412188 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2025-12-17 18:34:32.341448130 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2025-12-17 18:34:32.445464532           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2025-12-17 18:34:32.797449327           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2025-12-17 18:34:33.116707805           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:34:33.128808168           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 8 2025-12-17 18:34:33.228732258 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2025-12-17 18:34:33.488728100           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2025-12-17 18:34:33.821545242 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2025-12-17 18:34:33.833447767 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2025-12-17 18:34:33.917489593 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2025-12-17 18:34:33.936727629 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
14 2025-12-17 18:34:34.160816812 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2025-12-17 18:34:34.172703427 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2025-12-17 18:34:34.205491030 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:34:35.056784727 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2025-12-17 18:34:35.152798952 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2025-12-17 18:34:35.293276068 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2025-12-17 18:34:35.293321980 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:34:35.293333174 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:34:35.293339099 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:34:35.293353278 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2025-12-17 18:34:35.293360908 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2025-12-17 18:34:36.293486192 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:34:39.903289920 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2025-12-17 18:34:39.903337947 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:34:39.903349608 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2025-12-17 18:34:39.903353639 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2025-12-17 18:34:39.903359865 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2025-12-17 18:34:39.903363567 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2025-12-17 18:34:40.903529904 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:34:41.903528722 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2025-12-17 18:34:41.903560793 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2025-12-17 18:34:41.903565304 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2025-12-17 18:34:41.903569846 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2025-12-17 18:34:41.903585024 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2025-12-17 18:34:41.903591003 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2025-12-17 18:34:42.903723917 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2025-12-17 18:34:43.903825129 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2025-12-17 18:34:44.903943035 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2025-12-17 18:34:45.904054940 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
39.90
39.90
39.90
39.90
39.90
41.90
41.90
41.90
41.90
41.90

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:34:54.770234155           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:34:54.890203340 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2025-12-17 18:34:55.018234317 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2025-12-17 18:34:55.038252148           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2025-12-17 18:34:55.326273059           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2025-12-17 18:34:55.733510682           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:34:55.857544292 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2025-12-17 18:34:55.985524086           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2025-12-17 18:34:56.062341446 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2025-12-17 18:34:56.074273730 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2025-12-17 18:34:56.401538087 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
12 2025-12-17 18:34:56.465530927           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2025-12-17 18:34:56.542298135 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2025-12-17 18:34:57.009777306 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2025-12-17 18:34:57.021559802 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2025-12-17 18:34:57.086327100 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
17 2025-12-17 18:34:57.649568064 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2025-12-17 18:34:57.905596691 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2025-12-17 18:34:58.098332340 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2025-12-17 18:34:58.098383992 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:34:58.098396231 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:34:58.098400637 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:34:58.098416758 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2025-12-17 18:34:58.098424226 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2025-12-17 18:35:01.708166771 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:35:01.708217924 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2025-12-17 18:35:01.708229470 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:35:01.708234818 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2025-12-17 18:35:02.708377849 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2025-12-17 18:35:03.708481760 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2025-12-17 18:35:04.708610942 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2025-12-17 18:35:05.708737612 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:35:06.708500451 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2025-12-17 18:35:06.708529552 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2025-12-17 18:35:06.708549199 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2025-12-17 18:35:06.708769149 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
37 2025-12-17 18:35:07.708905876 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2025-12-17 18:35:08.709034181 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:35:17.715039311           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:35:17.831022517 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2025-12-17 18:35:18.111046220           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2025-12-17 18:35:18.207060047           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2025-12-17 18:35:18.634312424           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2025-12-17 18:35:18.687271073 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 7 2025-12-17 18:35:18.742306934 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2025-12-17 18:35:18.854314311           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2025-12-17 18:35:19.186353767           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2025-12-17 18:35:19.231213843 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2025-12-17 18:35:19.243112274 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2025-12-17 18:35:19.431110453 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2025-12-17 18:35:19.602349712 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
14 2025-12-17 18:35:20.063119722 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2025-12-17 18:35:20.210490061 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2025-12-17 18:35:20.222370568 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:35:20.274389560 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2025-12-17 18:35:20.530411770 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2025-12-17 18:35:21.035087395 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2025-12-17 18:35:21.035171575 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:35:21.035194863 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:35:21.035200026 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:35:21.035204372 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2025-12-17 18:35:21.035214358 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2025-12-17 18:35:24.644947525 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:35:24.645055529 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2025-12-17 18:35:24.645069491 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:35:24.645080244 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2025-12-17 18:35:25.645230300 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2025-12-17 18:35:26.645333551 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2025-12-17 18:35:27.645438418 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2025-12-17 18:35:28.645554070 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:35:29.645356631 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2025-12-17 18:35:29.645388502 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2025-12-17 18:35:29.645403978 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2025-12-17 18:35:29.645595686 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
37 2025-12-17 18:35:30.645741618 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2025-12-17 18:35:31.645845783 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Refresh

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:35:40.287821000           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 2 2025-12-17 18:35:40.287878617           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 3 2025-12-17 18:35:40.399825371 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2025-12-17 18:35:40.991867299 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2025-12-17 18:35:41.055878353           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2025-12-17 18:35:41.312134093 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:35:41.323893011 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
 8 2025-12-17 18:35:41.407106159           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2025-12-17 18:35:41.451896806 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2025-12-17 18:35:41.515126793 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
11 2025-12-17 18:35:41.715147614           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2025-12-17 18:35:41.855882185 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2025-12-17 18:35:42.067106196           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2025-12-17 18:35:42.387157960 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
15 2025-12-17 18:35:43.091260110 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2025-12-17 18:35:43.103177271 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:35:43.610188230 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
18 2025-12-17 18:35:43.610250000 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
19 2025-12-17 18:35:43.610261172 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2025-12-17 18:35:43.610265038 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:35:43.610269590 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:35:43.610277329 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:35:43.923194792 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
24 2025-12-17 18:35:43.987222308 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2025-12-17 18:35:47.219987816 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:35:47.220042227 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2025-12-17 18:35:47.220053733 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:35:47.220059358 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2025-12-17 18:35:47.220064930 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2025-12-17 18:35:47.220069650 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2025-12-17 18:35:48.220214040 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2025-12-17 18:35:49.220328574 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:35:50.220451325 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2025-12-17 18:35:51.220568516 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2025-12-17 18:35:52.220324423 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2025-12-17 18:35:52.220349806 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2025-12-17 18:35:52.220354592 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2025-12-17 18:35:52.220357315 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2025-12-17 18:35:52.220367903 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2025-12-17 18:35:52.220601377 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2025-12-17 18:35:52.220613758 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2025-12-17 18:35:53.220759377 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2025-12-17 18:35:54.220868025 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2025-12-17 18:35:55.220991791 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2025-12-17 18:35:56.221108970 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2025-12-17 18:35:57.221189076 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2025-12-17 18:35:57.221221289 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
48 2025-12-17 18:35:58.221319964 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2025-12-17 18:35:59.221417224 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2025-12-17 18:36:00.221523331 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2025-12-17 18:36:01.221629926 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2025-12-17 18:36:02.221749285 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2025-12-17 18:36:02.221787998 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
54 2025-12-17 18:36:03.221882407 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2025-12-17 18:36:04.221998953 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
52.22
57.22
02.22
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Global

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:36:13.452996205           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:36:13.552984063 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2025-12-17 18:36:13.729006996           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2025-12-17 18:36:14.017037030 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2025-12-17 18:36:14.305041466           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2025-12-17 18:36:14.316280948           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:36:14.428266901 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2025-12-17 18:36:14.753146598 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2025-12-17 18:36:14.765035344 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2025-12-17 18:36:14.964290284 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
11 2025-12-17 18:36:15.021068373 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2025-12-17 18:36:15.124297451           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2025-12-17 18:36:15.220314527           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2025-12-17 18:36:15.553069958 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2025-12-17 18:36:16.244438770 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2025-12-17 18:36:16.256350671 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:36:16.757238352 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
18 2025-12-17 18:36:16.757284379 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
19 2025-12-17 18:36:16.757295666 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2025-12-17 18:36:16.757306629 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:36:16.757311614 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:36:16.757317542 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:36:16.948485150 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
24 2025-12-17 18:36:17.204391486 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2025-12-17 18:36:20.367084461 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:36:20.367125745 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2025-12-17 18:36:20.367136718 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:36:20.367141463 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2025-12-17 18:36:20.367146598 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2025-12-17 18:36:20.367160726 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2025-12-17 18:36:21.367305106 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2025-12-17 18:36:22.367432489 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:36:23.367534762 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2025-12-17 18:36:24.367680003 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2025-12-17 18:36:25.367423140 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2025-12-17 18:36:25.367457031 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2025-12-17 18:36:25.367460938 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2025-12-17 18:36:25.367465158 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2025-12-17 18:36:25.367478328 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2025-12-17 18:36:25.367720151 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2025-12-17 18:36:25.367741002 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2025-12-17 18:36:26.367875741 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2025-12-17 18:36:27.368038081 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2025-12-17 18:36:28.368117051 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2025-12-17 18:36:29.368235648 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2025-12-17 18:36:30.368358699 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2025-12-17 18:36:30.368410031 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
48 2025-12-17 18:36:31.368484319 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2025-12-17 18:36:32.368620219 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2025-12-17 18:36:33.368724505 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2025-12-17 18:36:34.368839294 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2025-12-17 18:36:35.368953228 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2025-12-17 18:36:35.369004609 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
54 2025-12-17 18:36:36.369124783 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2025-12-17 18:36:37.369192751 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
25.36
30.36
35.36
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:36:46.658203716           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:36:46.762219725 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2025-12-17 18:36:46.978233151           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2025-12-17 18:36:47.074239947 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2025-12-17 18:36:47.394245651           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2025-12-17 18:36:47.813526851           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:36:47.949713507 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2025-12-17 18:36:48.117522578           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2025-12-17 18:36:48.245549056 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2025-12-17 18:36:48.418360586 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2025-12-17 18:36:48.430266958 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2025-12-17 18:36:48.565557912           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2025-12-17 18:36:48.578316266 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2025-12-17 18:36:49.141679948 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2025-12-17 18:36:49.153559732 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2025-12-17 18:36:49.282339054 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:36:49.285566528 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2025-12-17 18:36:49.909619337 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2025-12-17 18:36:49.973127182 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2025-12-17 18:36:49.973172087 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:36:49.973184190 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:36:49.973188119 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:36:49.973225402 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2025-12-17 18:36:49.973232289 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2025-12-17 18:36:50.973387563 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:36:54.583258719 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2025-12-17 18:36:54.583307890 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:36:54.583320448 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2025-12-17 18:36:54.583326577 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2025-12-17 18:36:54.583342554 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2025-12-17 18:36:54.583349440 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2025-12-17 18:36:55.583476381 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:36:56.583603118 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2025-12-17 18:36:57.583712847 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2025-12-17 18:36:58.583838212 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
36 2025-12-17 18:36:59.583632103 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2025-12-17 18:36:59.583676102 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2025-12-17 18:36:59.583681109 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2025-12-17 18:36:59.583685163 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2025-12-17 18:36:59.583699951 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
41 2025-12-17 18:36:59.583888383 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2025-12-17 18:36:59.583904620 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2025-12-17 18:36:59.583909338 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2025-12-17 18:36:59.583915697 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
45 2025-12-17 18:37:00.584049333 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2025-12-17 18:37:01.584154962 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2025-12-17 18:37:02.584285570 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2025-12-17 18:37:03.584390765 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2025-12-17 18:37:04.584510560 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2025-12-17 18:37:04.584546853 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2025-12-17 18:37:04.584558068 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2025-12-17 18:37:04.584578264 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
53 2025-12-17 18:37:05.584649393 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2025-12-17 18:37:06.584764820 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2025-12-17 18:37:07.584867012 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2025-12-17 18:37:08.584988386 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2025-12-17 18:37:09.585136253 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
58 2025-12-17 18:37:09.585174327 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2025-12-17 18:37:09.585185126 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2025-12-17 18:37:09.585204353 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
61 2025-12-17 18:37:10.585258137 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3

Test GARP Master Refresh Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5
set system vrrp global-parameters garp master-refresh-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2025-12-17 18:37:19.595680203           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2025-12-17 18:37:19.687687612 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2025-12-17 18:37:19.723694248           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2025-12-17 18:37:20.099710100 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2025-12-17 18:37:20.163727927           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2025-12-17 18:37:20.519091946           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2025-12-17 18:37:20.626985338 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2025-12-17 18:37:21.187811933 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2025-12-17 18:37:21.199725989 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2025-12-17 18:37:21.307758286 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2025-12-17 18:37:21.367014105 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
12 2025-12-17 18:37:21.463017475           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2025-12-17 18:37:21.494996179           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2025-12-17 18:37:21.731784771 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2025-12-17 18:37:22.519128668 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2025-12-17 18:37:22.531050890 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2025-12-17 18:37:22.898362014 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
18 2025-12-17 18:37:22.898400502 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
19 2025-12-17 18:37:22.898409721 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2025-12-17 18:37:22.898414101 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2025-12-17 18:37:22.898427173 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2025-12-17 18:37:22.898431674 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2025-12-17 18:37:22.903046680 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
24 2025-12-17 18:37:23.383122364 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2025-12-17 18:37:26.508227776 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2025-12-17 18:37:26.508278547 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2025-12-17 18:37:26.508288394 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2025-12-17 18:37:26.508291733 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2025-12-17 18:37:26.508295189 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2025-12-17 18:37:26.508298458 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2025-12-17 18:37:27.508478864 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2025-12-17 18:37:28.508579787 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2025-12-17 18:37:29.508729985 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2025-12-17 18:37:30.508802268 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2025-12-17 18:37:31.508611124 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2025-12-17 18:37:31.508636214 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2025-12-17 18:37:31.508640799 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2025-12-17 18:37:31.508645156 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2025-12-17 18:37:31.508659548 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2025-12-17 18:37:31.508858476 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2025-12-17 18:37:31.508871809 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2025-12-17 18:37:31.508877559 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2025-12-17 18:37:31.508885969 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2025-12-17 18:37:32.509020579 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2025-12-17 18:37:33.509149613 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2025-12-17 18:37:34.509278809 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2025-12-17 18:37:35.509413186 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2025-12-17 18:37:36.509551529 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2025-12-17 18:37:36.509627845 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
50 2025-12-17 18:37:36.509663211 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2025-12-17 18:37:36.509700783 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2025-12-17 18:37:37.509880140 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2025-12-17 18:37:38.510004825 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2025-12-17 18:37:39.510111022 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2025-12-17 18:37:40.510416264 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2025-12-17 18:37:41.510544234 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2025-12-17 18:37:41.510570418 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
58 2025-12-17 18:37:41.510579501 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2025-12-17 18:37:41.510594051 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2025-12-17 18:37:42.510676781 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
61 2025-12-17 18:37:43.510808323 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3