Vrrp

Examples for High Availability (VRRP)

VRRP With MD5 Authentication

Description

This scenario checks that two OSDx devices can use VRRP with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/D+9kFHy6hi9cax4GKgSwd1MiPf/SBqBw=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18v4sWaTwP7zDwqHK1zqqDCH20NmDBceg4=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:01

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/D+9kFHy6hi9cax4GKgSwd1MiPf/SBqBw=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

VRRP With Plaintext Password Authentication

Description

This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19fJjSqKgKeDf5bGLE4VO09Vl5v58kC4fo=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18vicd1szDsmN3TYUc9k/8LPlk7hHN3gB4=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:01

   Master router: 192.168.100.100
   Master priority: 200

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19fJjSqKgKeDf5bGLE4VO09Vl5v58kC4fo=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

VRRP With AH Authentication

Description

This scenario checks that two OSDx devices can use VRRP with AH authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/isipe8/MM4CNZwExSoYeU2kIyp2zcaHc=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX184t4EQVEipxpT3Out3/LVKwGzZKdS93bw=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:00

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/isipe8/MM4CNZwExSoYeU2kIyp2zcaHc=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

VRRP RFC3768 Compatibility Configuration

Description

Check that a virtual interface is being created when this option is configured.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:

eth0v1\s*192.168.10.1/32
Show output
-------------------------------------------------------------------
 Name            IP Address           Admin  Oper  Vrf  Description
-------------------------------------------------------------------
  eth0  192.168.100.100/24            up     up
        fe80::dcad:beff:feef:6c00/64
eth0v1  192.168.10.1/32               up     up
  eth1                                down   down
  eth2                                down   down
  eth3                                down   down

Two VRRP Devices In Same Sync Group

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Two VRRP Devices In Same Sync Group With MD5 Authentication

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX1+cAaxnk3nUe8dyCdIzc9Q7Sl6vegmMyzQ=
set system vrrp sync-group MAIN0 authentication type md5

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX18sbQYdB0IIuarUwSXerwkrJLqEe/gaztM=
set system vrrp sync-group MAIN1 authentication type md5

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Test GARP Interval

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:51:15.576491386           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:51:15.672465586 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-01-27 15:51:15.676467123           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 4 2026-01-27 15:51:15.956484980 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-01-27 15:51:16.430837690           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-01-27 15:51:16.436516012           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 7 2026-01-27 15:51:16.526796444 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-01-27 15:51:16.586816348           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2026-01-27 15:51:16.918836082 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-01-27 15:51:17.366845962           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-01-27 15:51:17.460580762 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-01-27 15:51:17.472572452 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-01-27 15:51:17.524530001 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-01-27 15:51:17.590914227 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-01-27 15:51:17.602819599 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-01-27 15:51:17.842854120 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-01-27 15:51:18.132578077 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-01-27 15:51:18.294894026 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-01-27 15:51:18.881630440 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-01-27 15:51:18.881674602 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:51:18.881686874 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:51:18.881693459 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:51:18.881707152 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:51:18.881713718 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-01-27 15:51:22.491431024 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:51:22.491489339 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-01-27 15:51:23.491594413 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-01-27 15:51:24.491693706 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
29 2026-01-27 15:51:25.491790628 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-01-27 15:51:26.491905213 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-01-27 15:51:27.491751481 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-01-27 15:51:27.491952206 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:51:28.492072601 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-01-27 15:51:29.492169655 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
22.49
27.49
Interval[0]: 5.0

Test GARP Interval Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp interval 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:05         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:51:37.705261121           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:51:37.797253618 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-01-27 15:51:38.165299443           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-01-27 15:51:38.165346004           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2026-01-27 15:51:38.579610782           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-01-27 15:51:38.687627016 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 7 2026-01-27 15:51:38.709310443 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-01-27 15:51:39.189383668 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-01-27 15:51:39.201316764 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2026-01-27 15:51:39.305355280 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-01-27 15:51:39.351645678           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-01-27 15:51:39.479651504           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
13 2026-01-27 15:51:39.575658088 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
14 2026-01-27 15:51:40.021378812 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-01-27 15:51:40.503749292 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-01-27 15:51:40.515652247 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-01-27 15:51:40.719690542 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-01-27 15:51:41.006809191 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-01-27 15:51:41.006848877 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-01-27 15:51:41.006858747 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:51:41.006862223 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:51:41.006873025 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:51:41.006878921 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:51:41.303734132 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2026-01-27 15:51:42.006947175 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:51:43.007108332 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-01-27 15:51:46.616951115 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-01-27 15:51:46.616995192 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:51:47.617184769 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-01-27 15:51:48.617291704 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-01-27 15:51:49.617380852 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-01-27 15:51:50.617498691 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:51:51.617245749 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-01-27 15:51:51.617525732 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-01-27 15:51:52.617659127 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
36 2026-01-27 15:51:53.617750377 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
46.61
51.61
Interval[0]: 5.0

Test GARP Master Delay

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:52:02.110166711           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:52:02.146306666           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 3 2026-01-27 15:52:02.214157134 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-01-27 15:52:02.838182157 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-01-27 15:52:03.024492527           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-01-27 15:52:03.120504052 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 7 2026-01-27 15:52:03.126225702           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 8 2026-01-27 15:52:03.132510023 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-01-27 15:52:03.158271559 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-01-27 15:52:03.170214861 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-01-27 15:52:03.228491116           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
12 2026-01-27 15:52:03.374199179 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-01-27 15:52:03.448547874           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-01-27 15:52:04.086247982 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-01-27 15:52:04.248604793 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-01-27 15:52:04.260510035 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-01-27 15:52:04.352542471 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-01-27 15:52:04.424570666 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-01-27 15:52:05.424576485 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-01-27 15:52:05.424622322 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:52:05.424637222 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:52:05.424642904 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:52:05.424657615 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:52:05.424665682 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-01-27 15:52:09.034348502 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:52:09.034385928 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-01-27 15:52:09.034397016 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-01-27 15:52:09.034402290 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:52:09.034416875 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-01-27 15:52:09.034422066 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-01-27 15:52:10.034530909 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-01-27 15:52:11.034609938 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:52:11.034646251 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-01-27 15:52:11.034655894 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-01-27 15:52:11.034660221 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-01-27 15:52:11.034672292 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-01-27 15:52:11.034677213 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-01-27 15:52:12.034722104 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-01-27 15:52:13.034813165 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-01-27 15:52:14.034907716 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-01-27 15:52:15.035009782 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-01-27 15:52:16.035189910 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
09.03
09.03
09.03
09.03
09.03
11.03
11.03
11.03
11.03
11.03

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Delay Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-delay 2

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:52:24.194952236           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:52:24.242972930           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 3 2026-01-27 15:52:24.286957098 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-01-27 15:52:24.598991973           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-01-27 15:52:24.790999846 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-01-27 15:52:25.233324890           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-01-27 15:52:25.271387763 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 8 2026-01-27 15:52:25.283020590 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
 9 2026-01-27 15:52:25.337299093 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-01-27 15:52:25.381317942           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
11 2026-01-27 15:52:25.623022783 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-01-27 15:52:25.721302064 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-01-27 15:52:25.753307851           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-01-27 15:52:25.879022928 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-01-27 15:52:26.393449861 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-01-27 15:52:26.405346389 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-01-27 15:52:26.873347037 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-01-27 15:52:27.417397753 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-01-27 15:52:27.496842616 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-01-27 15:52:27.496887647 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:52:27.496897105 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:52:27.496902040 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:52:27.496914805 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:52:27.496920389 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-01-27 15:52:28.497013673 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:52:32.106805596 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-01-27 15:52:32.106850893 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-01-27 15:52:32.106862484 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:52:32.106869362 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-01-27 15:52:32.106884387 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-01-27 15:52:32.106889142 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-01-27 15:52:33.107015102 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:52:34.107034643 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-01-27 15:52:34.107072026 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-01-27 15:52:34.107078079 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-01-27 15:52:34.107084477 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-01-27 15:52:34.107098937 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-01-27 15:52:34.107105314 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-01-27 15:52:35.107164665 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-01-27 15:52:36.107264274 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-01-27 15:52:37.107384878 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-01-27 15:52:38.107484680 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
32.10
32.10
32.10
32.10
32.10
34.10
34.10
34.10
34.10
34.10

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:52:46.579769417           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:52:46.663741206 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-01-27 15:52:46.783778863           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-01-27 15:52:47.223781818           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-01-27 15:52:47.383799354 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-01-27 15:52:47.502101360           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-01-27 15:52:47.610152414 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-01-27 15:52:47.799922661 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-01-27 15:52:47.811770108 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2026-01-27 15:52:47.866110901           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-01-27 15:52:47.898119902 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
12 2026-01-27 15:52:48.346144507           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
13 2026-01-27 15:52:48.631867263 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-01-27 15:52:48.695847917 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-01-27 15:52:49.370291368 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-01-27 15:52:49.382176566 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-01-27 15:52:49.574173214 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-01-27 15:52:49.873218181 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-01-27 15:52:49.873261949 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-01-27 15:52:49.873273943 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:52:49.873280537 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:52:49.873294394 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:52:49.873299617 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:52:49.914185412 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2026-01-27 15:52:53.483011347 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:52:53.483053524 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-01-27 15:52:53.483065402 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-01-27 15:52:53.483081346 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:52:54.483215457 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-01-27 15:52:55.483319684 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-01-27 15:52:56.483427525 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-01-27 15:52:57.483523901 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:52:58.483334428 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-01-27 15:52:58.483371395 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-01-27 15:52:58.483384513 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-01-27 15:52:58.483551529 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
37 2026-01-27 15:52:59.483694454 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-01-27 15:53:00.483792113 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:03         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:05         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:53:08.940594333           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:53:09.028565783 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-01-27 15:53:09.272603035           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-01-27 15:53:09.496600320 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-01-27 15:53:09.782910485           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-01-27 15:53:09.784585219           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 7 2026-01-27 15:53:09.886908974 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-01-27 15:53:10.138925848           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2026-01-27 15:53:10.202926110 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-01-27 15:53:10.202979124           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-01-27 15:53:10.808741672 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-01-27 15:53:10.820601491 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-01-27 15:53:11.163023033 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-01-27 15:53:11.174922468 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-01-27 15:53:11.230944295 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-01-27 15:53:11.330962963 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-01-27 15:53:11.576676512 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-01-27 15:53:11.800670618 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-01-27 15:53:12.238123775 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-01-27 15:53:12.238170110 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:53:12.238183686 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:53:12.238190276 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:53:12.238206042 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:53:12.238213071 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-01-27 15:53:13.238293270 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:53:14.238385409 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-01-27 15:53:17.848201889 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-01-27 15:53:17.848252167 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:53:17.848264053 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-01-27 15:53:17.848284044 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-01-27 15:53:18.848377627 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-01-27 15:53:19.848470747 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:53:20.848585233 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-01-27 15:53:21.848690345 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-01-27 15:53:22.848527653 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-01-27 15:53:22.848571871 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-01-27 15:53:22.848588842 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-01-27 15:53:22.848738959 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-01-27 15:53:23.848878084 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-01-27 15:53:24.848985569 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Refresh

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:53:33.193482192           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:53:33.281449625           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 3 2026-01-27 15:53:33.293445385 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-01-27 15:53:33.529468255 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-01-27 15:53:34.103783513           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-01-27 15:53:34.169492644           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 7 2026-01-27 15:53:34.195792303 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-01-27 15:53:34.297597660 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-01-27 15:53:34.309486494 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2026-01-27 15:53:34.513505124 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-01-27 15:53:34.651800603           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-01-27 15:53:34.811818577 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-01-27 15:53:35.003825010           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2026-01-27 15:53:35.225524555 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-01-27 15:53:36.027916396 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-01-27 15:53:36.039824624 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-01-27 15:53:36.251891603 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-01-27 15:53:36.503413310 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-01-27 15:53:36.503470288 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-01-27 15:53:36.503484470 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:53:36.503492305 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:53:36.503505307 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:53:36.503512594 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:53:36.667907268 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2026-01-27 15:53:40.113277358 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:53:40.113324745 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-01-27 15:53:40.113335888 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-01-27 15:53:40.113341460 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:53:40.113356699 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-01-27 15:53:40.113363153 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-01-27 15:53:41.113549606 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-01-27 15:53:42.113560756 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:53:43.113650842 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-01-27 15:53:44.113770149 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-01-27 15:53:45.113607733 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-01-27 15:53:45.113648456 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-01-27 15:53:45.113658395 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-01-27 15:53:45.113665547 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-01-27 15:53:45.113682906 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-01-27 15:53:45.113808245 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-01-27 15:53:45.113824925 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-01-27 15:53:46.113955172 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-01-27 15:53:47.114053085 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-01-27 15:53:48.114147259 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-01-27 15:53:49.114277490 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-01-27 15:53:50.114375598 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-01-27 15:53:50.114434179 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
48 2026-01-27 15:53:51.114484650 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-01-27 15:53:52.114589130 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-01-27 15:53:53.114671439 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2026-01-27 15:53:54.114766625 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2026-01-27 15:53:55.114874028 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-01-27 15:53:55.114933324 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
54 2026-01-27 15:53:56.114960906 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-01-27 15:53:57.115122349 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
45.11
50.11
55.11
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Global

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:54:05.386603017           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:54:05.518599623 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-01-27 15:54:05.538597840           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-01-27 15:54:05.978634942           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-01-27 15:54:06.266658751 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-01-27 15:54:06.384963367           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-01-27 15:54:06.500967632 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-01-27 15:54:06.555008579 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-01-27 15:54:06.566663869 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2026-01-27 15:54:06.748995109           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
11 2026-01-27 15:54:06.941093867           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-01-27 15:54:07.066683976 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2026-01-27 15:54:07.258691854 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-01-27 15:54:07.357002510 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
15 2026-01-27 15:54:07.773095131 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-01-27 15:54:07.785029401 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-01-27 15:54:08.189064739 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-01-27 15:54:08.221016565 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-01-27 15:54:08.722858430 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-01-27 15:54:08.722895284 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:54:08.722904156 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:54:08.722907722 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:54:08.722912039 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:54:08.722923293 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-01-27 15:54:12.332644340 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:54:12.332683170 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-01-27 15:54:12.332698835 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-01-27 15:54:12.332703683 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:54:12.332716708 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-01-27 15:54:12.332722484 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-01-27 15:54:13.332816544 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-01-27 15:54:14.332927559 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:54:15.333028094 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-01-27 15:54:16.333123401 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-01-27 15:54:17.332960844 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-01-27 15:54:17.333002892 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-01-27 15:54:17.333009595 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-01-27 15:54:17.333014911 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-01-27 15:54:17.333030594 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-01-27 15:54:17.333160096 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-01-27 15:54:17.333177214 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-01-27 15:54:18.333308145 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-01-27 15:54:19.333510959 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-01-27 15:54:20.333585854 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-01-27 15:54:21.333683165 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-01-27 15:54:22.333801255 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-01-27 15:54:22.333864062 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
48 2026-01-27 15:54:23.333887257 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-01-27 15:54:24.333987019 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-01-27 15:54:25.334078677 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2026-01-27 15:54:26.334183557 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2026-01-27 15:54:27.334349064 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-01-27 15:54:27.334403584 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
54 2026-01-27 15:54:28.334446256 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-01-27 15:54:29.334568736 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
17.33
22.33
27.33
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:54:38.415796611           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:54:38.523852289 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-01-27 15:54:39.071874696           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-01-27 15:54:39.163848320 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-01-27 15:54:39.195857495           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2026-01-27 15:54:39.578149359           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-01-27 15:54:39.646140849           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 8 2026-01-27 15:54:39.670152935 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-01-27 15:54:39.838161033           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2026-01-27 15:54:40.091918225 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-01-27 15:54:40.103853334 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-01-27 15:54:40.446160044 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-01-27 15:54:40.827895737 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-01-27 15:54:40.862243709 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-01-27 15:54:40.874162328 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-01-27 15:54:41.051922196 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
17 2026-01-27 15:54:41.374258559 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-01-27 15:54:41.470230727 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-01-27 15:54:41.734277861 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-01-27 15:54:41.734316492 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:54:41.734327183 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:54:41.734332791 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:54:41.734337515 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:54:41.734356003 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-01-27 15:54:45.344054770 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:54:45.344104039 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-01-27 15:54:45.344115273 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-01-27 15:54:45.344122954 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:54:45.344137771 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-01-27 15:54:45.344144035 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-01-27 15:54:46.344246848 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-01-27 15:54:47.344344351 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:54:48.344461428 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-01-27 15:54:49.344542273 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-01-27 15:54:50.344367549 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-01-27 15:54:50.344407912 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-01-27 15:54:50.344414659 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-01-27 15:54:50.344420182 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-01-27 15:54:50.344438670 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-01-27 15:54:50.344589233 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-01-27 15:54:50.344603089 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-01-27 15:54:50.344609173 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-01-27 15:54:50.344617418 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-01-27 15:54:51.344717361 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-01-27 15:54:52.344813192 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-01-27 15:54:53.344919415 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-01-27 15:54:54.345003685 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-01-27 15:54:55.345103311 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-01-27 15:54:55.345136668 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
50 2026-01-27 15:54:55.345146577 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2026-01-27 15:54:55.345159545 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2026-01-27 15:54:56.345230834 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-01-27 15:54:57.345320813 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-01-27 15:54:58.345449272 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-01-27 15:54:59.345583706 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-01-27 15:55:00.345709540 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-01-27 15:55:00.345746559 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
58 2026-01-27 15:55:00.345757638 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2026-01-27 15:55:00.345773481 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2026-01-27 15:55:01.345850670 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
61 2026-01-27 15:55:02.346137760 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3

Test GARP Master Refresh Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5
set system vrrp global-parameters garp master-refresh-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-01-27 15:55:10.785245595           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-01-27 15:55:10.877241235 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-01-27 15:55:11.389296192           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-01-27 15:55:11.581313648 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-01-27 15:55:11.581364307           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2026-01-27 15:55:11.687593165           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-01-27 15:55:11.799665640 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-01-27 15:55:11.879622838           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2026-01-27 15:55:12.351618551           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-01-27 15:55:12.413429084 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-01-27 15:55:12.425337894 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-01-27 15:55:12.543668723 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-01-27 15:55:12.765379417 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-01-27 15:55:12.895736522 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-01-27 15:55:12.907637767 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-01-27 15:55:12.959668309 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
17 2026-01-27 15:55:13.085399788 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-01-27 15:55:13.887746807 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-01-27 15:55:14.086696342 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-01-27 15:55:14.086736050 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-01-27 15:55:14.086745208 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-01-27 15:55:14.086748886 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-01-27 15:55:14.086758327 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-01-27 15:55:14.086762713 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-01-27 15:55:17.696557955 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-01-27 15:55:17.696601751 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-01-27 15:55:17.696614376 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-01-27 15:55:17.696619732 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-01-27 15:55:17.696637077 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-01-27 15:55:17.696642752 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-01-27 15:55:18.696746776 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-01-27 15:55:19.696863645 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-01-27 15:55:20.696960886 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-01-27 15:55:21.697097335 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-01-27 15:55:22.696960534 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-01-27 15:55:22.696992479 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-01-27 15:55:22.696996207 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-01-27 15:55:22.696999786 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-01-27 15:55:22.697011369 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-01-27 15:55:22.697146620 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-01-27 15:55:22.697157000 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-01-27 15:55:22.697160850 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-01-27 15:55:22.697166757 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-01-27 15:55:23.697294307 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-01-27 15:55:24.697432675 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-01-27 15:55:25.697533230 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-01-27 15:55:26.697669854 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-01-27 15:55:27.697777753 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-01-27 15:55:27.697817144 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
50 2026-01-27 15:55:27.697828228 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2026-01-27 15:55:27.697841750 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2026-01-27 15:55:28.697925813 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-01-27 15:55:29.698045146 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-01-27 15:55:30.698165922 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-01-27 15:55:31.698290581 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-01-27 15:55:32.698397202 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-01-27 15:55:32.698435171 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
58 2026-01-27 15:55:32.698446001 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2026-01-27 15:55:32.698458625 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2026-01-27 15:55:33.698515221 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
61 2026-01-27 15:55:34.698640250 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3