Vrrp
Examples for High Availability (VRRP)
VRRP With MD5 Authentication
Description
This scenario checks that two OSDx devices can use VRRP with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/fgUJlC6azkEZi6d9SRVHyqsudxGKtHQo= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+z0/ML45yr4Tg7+bkJplRZfXyvqw3MA6w= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:02 Priority: 200 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:01 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/fgUJlC6azkEZi6d9SRVHyqsudxGKtHQo= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP With Plaintext Password Authentication
Description
This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+iZx/cBl7lhCUbblI5/3eKhQnLElMDOMw= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/E1OuvN7bVdIKG7QyjxsZkmMHcSYv1CTs= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:00 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+iZx/cBl7lhCUbblI5/3eKhQnLElMDOMw= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP With AH Authentication
Description
This scenario checks that two OSDx devices can use VRRP with AH authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/zsN/V1bH2JLkjlec8fXMHIEbWjuithi4= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX186jyTQYwIOGN8JPYwhuMtuyrLkdLOfLFY= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:00 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/zsN/V1bH2JLkjlec8fXMHIEbWjuithi4= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP RFC3768 Compatibility Configuration
Description
Check that a virtual interface is being created when this option is configured.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:
eth0v1\s*192.168.10.1/32Show output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- eth0 192.168.100.100/24 up up fe80::dcad:beff:feef:6c00/64 eth0v1 192.168.10.1/32 up up eth1 down down eth2 down down eth3 down down
Two VRRP Devices In Same Sync Group
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Two VRRP Devices In Same Sync Group With MD5 Authentication
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX19b/u1Hji/JQnm8Cjt6EVSyz9FNakTBbVI= set system vrrp sync-group MAIN0 authentication type md5
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX1+JqAQg/Vi9wpEM04AIjoPobOO8skCLi0Y= set system vrrp sync-group MAIN1 authentication type md5
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Test GARP Interval
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:42:01.178051268 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:42:01.266058964 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-12-11 13:42:01.650055723 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2025-12-11 13:42:02.070087297 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 5 2025-12-11 13:42:02.234490465 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2025-12-11 13:42:02.258140646 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 7 2025-12-11 13:42:02.342560426 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-12-11 13:42:02.466509240 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-12-11 13:42:02.674212355 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-12-11 13:42:02.686114124 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2025-12-11 13:42:02.782115922 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-12-11 13:42:03.002541132 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2025-12-11 13:42:03.130536332 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 14 2025-12-11 13:42:03.634127444 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2025-12-11 13:42:04.154677316 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:42:04.166551668 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:42:04.306574964 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2025-12-11 13:42:04.473705377 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2025-12-11 13:42:04.473737387 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-12-11 13:42:04.473745926 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:42:04.473750213 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:42:04.473762297 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:42:04.473764716 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-12-11 13:42:04.954610533 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2025-12-11 13:42:08.083528884 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:42:08.083575776 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-12-11 13:42:09.083726869 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2025-12-11 13:42:10.083826796 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 29 2025-12-11 13:42:11.083940499 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2025-12-11 13:42:12.084050075 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2025-12-11 13:42:13.083825719 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2025-12-11 13:42:13.084068173 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-12-11 13:42:14.084201895 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-12-11 13:42:15.084300854 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
08.08 13.08
Interval[0]: 5.0
Test GARP Interval Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp interval 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:42:23.818857290 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:42:23.882830050 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 3 2025-12-11 13:42:23.918834356 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2025-12-11 13:42:24.114845385 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2025-12-11 13:42:24.914917782 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2025-12-11 13:42:24.926870909 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 7 2025-12-11 13:42:24.946930538 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-12-11 13:42:24.995294536 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-12-11 13:42:25.127313908 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2025-12-11 13:42:25.175304485 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 11 2025-12-11 13:42:25.275319496 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-12-11 13:42:25.682885160 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2025-12-11 13:42:25.714864933 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-12-11 13:42:25.755311458 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 15 2025-12-11 13:42:26.779427564 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:42:26.791329237 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:42:26.927358994 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2025-12-11 13:42:27.125787014 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2025-12-11 13:42:27.125822402 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-12-11 13:42:27.125832162 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:42:27.125835770 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:42:27.125850058 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:42:27.125854647 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-12-11 13:42:27.579376597 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2025-12-11 13:42:28.125945900 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:42:31.735709400 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2025-12-11 13:42:31.735746585 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:42:32.735922089 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 29 2025-12-11 13:42:33.736020801 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2025-12-11 13:42:34.736143915 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2025-12-11 13:42:35.736264835 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-12-11 13:42:36.736019857 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2025-12-11 13:42:36.736301020 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-12-11 13:42:37.736421150 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
31.73 36.73
Interval[0]: 4.9999999999999964
Test GARP Master Delay
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:42:46.227622244 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:42:46.335618388 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-12-11 13:42:46.443611591 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2025-12-11 13:42:46.547638720 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2025-12-11 13:42:47.155647574 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2025-12-11 13:42:47.288069854 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-12-11 13:42:47.372116541 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-12-11 13:42:47.492087540 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2025-12-11 13:42:47.571709908 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-12-11 13:42:47.583617952 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2025-12-11 13:42:47.904077183 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-12-11 13:42:48.188095035 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2025-12-11 13:42:48.211688907 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-12-11 13:42:48.371689512 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-12-11 13:42:49.212225888 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:42:49.224117204 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:42:49.541816460 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2025-12-11 13:42:49.541858765 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2025-12-11 13:42:49.541871417 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-12-11 13:42:49.541876787 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:42:49.541890764 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:42:49.541895124 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:42:49.692174070 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 24 2025-12-11 13:42:49.788153342 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2025-12-11 13:42:53.151627522 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:42:53.151669267 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-12-11 13:42:53.151678714 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:42:53.151682299 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-12-11 13:42:53.151697106 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-12-11 13:42:53.151700410 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-12-11 13:42:54.151784225 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-12-11 13:42:55.151828074 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2025-12-11 13:42:55.151855234 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-12-11 13:42:55.151858491 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2025-12-11 13:42:55.151861002 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-12-11 13:42:55.151874788 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-12-11 13:42:55.151877642 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2025-12-11 13:42:56.151959475 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2025-12-11 13:42:57.152063970 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2025-12-11 13:42:58.152182606 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-12-11 13:42:59.152277818 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2025-12-11 13:43:00.152393313 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
53.15 53.15 53.15 53.15 53.15 55.15 55.15 55.15 55.15 55.15
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Delay Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-delay 2
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:43:08.468366181 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:43:08.572362152 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 3 2025-12-11 13:43:08.580367450 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2025-12-11 13:43:08.852489068 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2025-12-11 13:43:08.916403009 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-12-11 13:43:09.476828253 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-12-11 13:43:09.568807857 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-12-11 13:43:09.876478148 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-12-11 13:43:09.888411158 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2025-12-11 13:43:10.236871686 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 11 2025-12-11 13:43:10.300895248 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 12 2025-12-11 13:43:10.396866031 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2025-12-11 13:43:10.420473412 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2025-12-11 13:43:10.836499495 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2025-12-11 13:43:11.324952636 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:43:11.336893244 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:43:11.676913497 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2025-12-11 13:43:11.788055954 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2025-12-11 13:43:11.788098229 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-12-11 13:43:11.788109828 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:43:11.788113852 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:43:11.788131547 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:43:11.788136110 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-12-11 13:43:11.996935374 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2025-12-11 13:43:15.397869705 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:43:15.397909188 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-12-11 13:43:15.397918841 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:43:15.397924314 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-12-11 13:43:15.397939044 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-12-11 13:43:15.397942796 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-12-11 13:43:16.398053496 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-12-11 13:43:17.398095398 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2025-12-11 13:43:17.398140841 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-12-11 13:43:17.398145171 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2025-12-11 13:43:17.398149219 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-12-11 13:43:17.398168887 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-12-11 13:43:17.398174090 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2025-12-11 13:43:18.398260913 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2025-12-11 13:43:19.398370046 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2025-12-11 13:43:20.398477322 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-12-11 13:43:21.398572437 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2025-12-11 13:43:22.398660779 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
15.39 15.39 15.39 15.39 15.39 17.39 17.39 17.39 17.39 17.39
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:43:30.590353154 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:43:30.681132678 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-12-11 13:43:30.793141774 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2025-12-11 13:43:30.869154415 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2025-12-11 13:43:31.253167716 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-12-11 13:43:31.521608861 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-12-11 13:43:31.617585728 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-12-11 13:43:31.725601849 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-12-11 13:43:31.897214045 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-12-11 13:43:31.913142666 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2025-12-11 13:43:31.929142091 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2025-12-11 13:43:32.157646539 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2025-12-11 13:43:32.253661775 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 14 2025-12-11 13:43:32.469233352 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-12-11 13:43:33.277753451 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:43:33.289627073 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:43:33.891297264 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2025-12-11 13:43:33.891394282 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2025-12-11 13:43:33.891488060 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-12-11 13:43:33.891530704 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:43:33.891621334 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:43:33.891685796 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:43:34.178030500 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 24 2025-12-11 13:43:34.205703228 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2025-12-11 13:43:37.501164531 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:43:37.501197113 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-12-11 13:43:37.501207576 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:43:37.501220445 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-12-11 13:43:38.501415180 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2025-12-11 13:43:39.501531017 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2025-12-11 13:43:40.501660827 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-12-11 13:43:41.501776281 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-12-11 13:43:42.501473255 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-12-11 13:43:42.501497554 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2025-12-11 13:43:42.501509713 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-12-11 13:43:42.501839615 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2025-12-11 13:43:43.501948320 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2025-12-11 13:43:44.502077112 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:02 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:43:52.821890813 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:43:52.913921567 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-12-11 13:43:53.065945286 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2025-12-11 13:43:53.270035843 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2025-12-11 13:43:53.461936685 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-12-11 13:43:53.662353679 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-12-11 13:43:53.766375684 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-12-11 13:43:53.918373708 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 9 2025-12-11 13:43:54.294037899 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-12-11 13:43:54.305955630 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2025-12-11 13:43:54.345945379 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2025-12-11 13:43:54.494394181 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2025-12-11 13:43:54.646019211 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2025-12-11 13:43:54.718406190 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 15 2025-12-11 13:43:54.942471850 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:43:54.954388043 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:43:55.070406714 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2025-12-11 13:43:55.678434519 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2025-12-11 13:43:56.123267805 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2025-12-11 13:43:56.123300304 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:43:56.123310095 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:43:56.123314151 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:43:56.123317492 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-12-11 13:43:56.123330074 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2025-12-11 13:43:59.733063889 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:43:59.733099007 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-12-11 13:43:59.733108139 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:43:59.733112906 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-12-11 13:44:00.733258663 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2025-12-11 13:44:01.733372789 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2025-12-11 13:44:02.733602998 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-12-11 13:44:03.733779735 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-12-11 13:44:04.733364739 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2025-12-11 13:44:04.733388222 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2025-12-11 13:44:04.733403664 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-12-11 13:44:04.733734943 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2025-12-11 13:44:05.733872535 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2025-12-11 13:44:06.733965749 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Refresh
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:44:16.102723443 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:44:16.234721606 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-12-11 13:44:16.294747346 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2025-12-11 13:44:16.406746899 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2025-12-11 13:44:16.442742173 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-12-11 13:44:17.275198377 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-12-11 13:44:17.302851670 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 8 2025-12-11 13:44:17.314775878 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 9 2025-12-11 13:44:17.363204208 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2025-12-11 13:44:17.407291468 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2025-12-11 13:44:17.791213538 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 12 2025-12-11 13:44:18.198783575 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2025-12-11 13:44:18.207201876 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 14 2025-12-11 13:44:18.230786042 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2025-12-11 13:44:19.231348993 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:44:19.243318441 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:44:19.445387745 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2025-12-11 13:44:19.445426665 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2025-12-11 13:44:19.445437121 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-12-11 13:44:19.445441409 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:44:19.445444837 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:44:19.445449245 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:44:19.583274541 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 24 2025-12-11 13:44:19.967306601 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2025-12-11 13:44:20.445590484 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:44:24.055422175 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2025-12-11 13:44:24.055445915 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:44:24.055452662 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-12-11 13:44:24.055456177 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-12-11 13:44:24.055459402 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-12-11 13:44:24.055471539 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2025-12-11 13:44:25.055594042 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-12-11 13:44:26.055688988 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-12-11 13:44:27.055784281 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-12-11 13:44:28.055888727 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2025-12-11 13:44:29.055745967 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-12-11 13:44:29.055773641 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2025-12-11 13:44:29.055777263 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2025-12-11 13:44:29.055780276 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2025-12-11 13:44:29.055798226 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 41 2025-12-11 13:44:29.055921647 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2025-12-11 13:44:29.055935283 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2025-12-11 13:44:30.056058852 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2025-12-11 13:44:31.056139782 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2025-12-11 13:44:32.056252088 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2025-12-11 13:44:33.056366971 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2025-12-11 13:44:34.056490242 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2025-12-11 13:44:34.056520147 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 49 2025-12-11 13:44:35.056617125 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2025-12-11 13:44:36.056715372 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2025-12-11 13:44:37.056826713 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2025-12-11 13:44:38.056912085 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2025-12-11 13:44:39.057022059 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2025-12-11 13:44:39.057058655 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 55 2025-12-11 13:44:40.057130724 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
29.05 34.05 39.05
Interval[0]: 4.9999999999999964
Interval[1]: 5.0
Test GARP Master Refresh Global
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:44:49.663883891 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:44:49.775890597 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-12-11 13:44:50.391903924 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2025-12-11 13:44:50.548347425 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 5 2025-12-11 13:44:50.615931684 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-12-11 13:44:50.644348107 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 7 2025-12-11 13:44:50.647927095 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 8 2025-12-11 13:44:50.852372902 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2025-12-11 13:44:51.520470313 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-12-11 13:44:51.520526773 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2025-12-11 13:44:51.672008006 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2025-12-11 13:44:51.683921479 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2025-12-11 13:44:52.087977749 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-12-11 13:44:52.503999924 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-12-11 13:44:52.544509548 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:44:52.556405371 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:44:52.864427994 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2025-12-11 13:44:52.982097886 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2025-12-11 13:44:52.982142677 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-12-11 13:44:52.982152419 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:44:52.982157610 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:44:52.982172484 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:44:52.982176786 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-12-11 13:44:53.024427806 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2025-12-11 13:44:56.591938208 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:44:56.591968378 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-12-11 13:44:56.591977819 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:44:56.591982901 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-12-11 13:44:56.591986886 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-12-11 13:44:56.591999858 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-12-11 13:44:57.592139273 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-12-11 13:44:58.592237208 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-12-11 13:44:59.592333520 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-12-11 13:45:00.592533079 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-12-11 13:45:01.592275066 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-12-11 13:45:01.592304384 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-12-11 13:45:01.592308960 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2025-12-11 13:45:01.592311669 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2025-12-11 13:45:01.592331206 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2025-12-11 13:45:01.592582197 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-12-11 13:45:01.592603194 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2025-12-11 13:45:02.592981137 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2025-12-11 13:45:03.593079796 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2025-12-11 13:45:04.593244765 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2025-12-11 13:45:05.593269036 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2025-12-11 13:45:06.593372514 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2025-12-11 13:45:06.593408826 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 48 2025-12-11 13:45:07.593468253 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2025-12-11 13:45:08.593565812 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2025-12-11 13:45:09.593671396 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2025-12-11 13:45:10.593780247 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2025-12-11 13:45:11.593907418 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2025-12-11 13:45:11.593955526 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 54 2025-12-11 13:45:12.594000140 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2025-12-11 13:45:13.594121054 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
01.59 06.59 11.59
Interval[0]: 5.0
Interval[1]: 5.0
Test GARP Master Refresh Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:45:21.897016807 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:45:22.005013164 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-12-11 13:45:22.065010482 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2025-12-11 13:45:22.329017206 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2025-12-11 13:45:22.521044291 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2025-12-11 13:45:22.869475879 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-12-11 13:45:22.961480013 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-12-11 13:45:22.985477752 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2025-12-11 13:45:23.097129379 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2025-12-11 13:45:23.109060583 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2025-12-11 13:45:23.361486501 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 12 2025-12-11 13:45:23.457480460 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2025-12-11 13:45:23.577071851 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2025-12-11 13:45:23.801078024 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2025-12-11 13:45:24.385612233 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:45:24.397498966 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:45:24.993559301 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2025-12-11 13:45:25.025550162 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2025-12-11 13:45:25.214681851 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2025-12-11 13:45:25.214717932 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:45:25.214733201 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:45:25.214736210 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:45:25.214749491 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-12-11 13:45:25.214753567 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2025-12-11 13:45:28.824482039 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:45:28.824517482 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-12-11 13:45:28.824529241 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:45:28.824533547 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-12-11 13:45:28.824551864 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-12-11 13:45:28.824556047 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-12-11 13:45:29.824688666 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-12-11 13:45:30.824781923 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-12-11 13:45:31.824887875 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-12-11 13:45:32.824988160 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-12-11 13:45:33.824795049 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-12-11 13:45:33.824815618 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-12-11 13:45:33.824818485 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2025-12-11 13:45:33.824820681 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2025-12-11 13:45:33.824831588 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2025-12-11 13:45:33.825016264 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-12-11 13:45:33.825026217 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2025-12-11 13:45:33.825028847 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2025-12-11 13:45:33.825033533 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2025-12-11 13:45:34.825160997 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2025-12-11 13:45:35.825263743 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2025-12-11 13:45:36.825353116 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2025-12-11 13:45:37.825444363 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2025-12-11 13:45:38.825534102 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2025-12-11 13:45:38.825556327 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 50 2025-12-11 13:45:38.825564183 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2025-12-11 13:45:38.825574247 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2025-12-11 13:45:39.825644203 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2025-12-11 13:45:40.825742911 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2025-12-11 13:45:41.825874480 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2025-12-11 13:45:42.825967767 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2025-12-11 13:45:43.826070988 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2025-12-11 13:45:43.826104314 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 58 2025-12-11 13:45:43.826113420 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2025-12-11 13:45:43.826126652 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2025-12-11 13:45:44.826189109 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 61 2025-12-11 13:45:45.826294977 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3
Test GARP Master Refresh Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5 set system vrrp global-parameters garp master-refresh-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2025-12-11 13:45:53.846125426 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2025-12-11 13:45:53.942109829 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2025-12-11 13:45:54.006182557 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2025-12-11 13:45:54.090131443 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2025-12-11 13:45:54.586139871 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2025-12-11 13:45:54.786569707 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2025-12-11 13:45:54.882566124 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2025-12-11 13:45:55.170591089 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2025-12-11 13:45:55.554625245 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 10 2025-12-11 13:45:55.610258382 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2025-12-11 13:45:55.622184610 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2025-12-11 13:45:55.682612504 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2025-12-11 13:45:56.154207470 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2025-12-11 13:45:56.570225058 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2025-12-11 13:45:56.578702556 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2025-12-11 13:45:56.590625961 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2025-12-11 13:45:56.866669191 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2025-12-11 13:45:57.150128282 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2025-12-11 13:45:57.150243882 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2025-12-11 13:45:57.150258887 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2025-12-11 13:45:57.150262100 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2025-12-11 13:45:57.150264904 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2025-12-11 13:45:57.150272047 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2025-12-11 13:45:57.538694993 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2025-12-11 13:46:00.759920439 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2025-12-11 13:46:00.759949366 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2025-12-11 13:46:00.759959614 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2025-12-11 13:46:00.759963624 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2025-12-11 13:46:00.759967256 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2025-12-11 13:46:00.759979804 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2025-12-11 13:46:01.760106161 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2025-12-11 13:46:02.760209303 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2025-12-11 13:46:03.760296732 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2025-12-11 13:46:04.760406819 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2025-12-11 13:46:05.760238168 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2025-12-11 13:46:05.760261747 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2025-12-11 13:46:05.760265865 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2025-12-11 13:46:05.760270546 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2025-12-11 13:46:05.760284745 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2025-12-11 13:46:05.760442366 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2025-12-11 13:46:05.760454156 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2025-12-11 13:46:05.760458223 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2025-12-11 13:46:05.760464633 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2025-12-11 13:46:06.760576191 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2025-12-11 13:46:07.760668061 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2025-12-11 13:46:08.760777002 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2025-12-11 13:46:09.760869501 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2025-12-11 13:46:10.760962078 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2025-12-11 13:46:10.760982117 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 50 2025-12-11 13:46:10.760988424 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2025-12-11 13:46:10.760998783 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2025-12-11 13:46:11.761085077 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2025-12-11 13:46:12.761178916 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2025-12-11 13:46:13.761288980 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2025-12-11 13:46:14.761386876 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2025-12-11 13:46:15.761486479 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2025-12-11 13:46:15.761516517 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 58 2025-12-11 13:46:15.761525762 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2025-12-11 13:46:15.761540113 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2025-12-11 13:46:16.761592180 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 61 2025-12-11 13:46:17.761673928 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3