Vrrp
Examples for High Availability (VRRP)
VRRP With MD5 Authentication
Description
This scenario checks that two OSDx devices can use VRRP with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/1sv2JSpE5U4hVVnFtEzb3hpbjWilghfQ= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/qBPSZRr5WwYv6DxKB//46jO8MAEIh2iQ= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:02 Priority: 200 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:00 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/1sv2JSpE5U4hVVnFtEzb3hpbjWilghfQ= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP With Plaintext Password Authentication
Description
This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18/iIBDTwa6/KP3PJKDPoDoAytljvMia40= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX196JPh8UnS3SIigr8j3aQmOjPvB7g3FA30= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:01 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18/iIBDTwa6/KP3PJKDPoDoAytljvMia40= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP With AH Authentication
Description
This scenario checks that two OSDx devices can use VRRP with AH authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1852Zrkx2Hzg0gAq/yV8gvP8ONjHBl4h7g= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18hXyxqjk4QByoHFQMGVYt/yNGe62ih+3M= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:02 Priority: 200 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:01 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1852Zrkx2Hzg0gAq/yV8gvP8ONjHBl4h7g= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
VRRP RFC3768 Compatibility Configuration
Description
Check that a virtual interface is being created when this option is configured.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:
eth0v1\s*192.168.10.1/32Show output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- eth0 192.168.100.100/24 up up fe80::dcad:beff:feef:6c00/64 eth0v1 192.168.10.1/32 up up eth1 down down eth2 down down eth3 down down
Two VRRP Devices In Same Sync Group
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Two VRRP Devices In Same Sync Group With MD5 Authentication
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX18nJP4JO6i6jDE7OGWu5zHhZnCvsOXnN7w= set system vrrp sync-group MAIN0 authentication type md5
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX1/NlR2+ykjPgrCezG7hj3RmR6N/JR8Sn58= set system vrrp sync-group MAIN1 authentication type md5
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Test GARP Interval
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:06:25.495943112 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:06:25.587943390 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:06:25.691990012 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2026-02-12 21:06:25.831977704 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-02-12 21:06:26.195973315 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2026-02-12 21:06:26.373449115 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:06:26.477453541 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-02-12 21:06:26.708057956 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-02-12 21:06:26.719972825 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2026-02-12 21:06:26.755999821 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-02-12 21:06:26.865462932 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 12 2026-02-12 21:06:27.089485410 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2026-02-12 21:06:27.124012110 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-02-12 21:06:27.185493015 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:06:28.113581016 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:06:28.125509927 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:06:28.253549359 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-02-12 21:06:28.401539546 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2026-02-12 21:06:28.794561132 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-02-12 21:06:28.794612677 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:06:28.794623516 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:06:28.794629024 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:06:28.794643514 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-02-12 21:06:28.794652461 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-02-12 21:06:32.410279556 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:06:32.410339956 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-02-12 21:06:33.410483797 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2026-02-12 21:06:34.410581244 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 29 2026-02-12 21:06:35.410697328 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-02-12 21:06:36.410797983 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-02-12 21:06:37.410576530 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-02-12 21:06:37.410826829 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-02-12 21:06:38.410959194 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-02-12 21:06:39.411074220 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
32.41 37.41
Interval[0]: 5.0
Test GARP Interval Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp interval 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:02 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:06:48.824817953 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:06:48.932830956 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:06:49.012840029 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2026-02-12 21:06:49.052840223 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-02-12 21:06:49.172861491 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2026-02-12 21:06:49.898360132 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:06:50.006348023 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-02-12 21:06:50.086334575 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 9 2026-02-12 21:06:50.200917946 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-02-12 21:06:50.212856782 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-02-12 21:06:50.348895361 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-02-12 21:06:50.418349385 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-02-12 21:06:50.706354458 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 14 2026-02-12 21:06:51.090440794 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:06:51.092891534 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 16 2026-02-12 21:06:51.102341327 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:06:51.442404801 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-02-12 21:06:52.082456148 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2026-02-12 21:06:52.141077134 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-02-12 21:06:52.141132494 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:06:52.141147721 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:06:52.141154875 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:06:52.141175363 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-02-12 21:06:52.141182323 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-02-12 21:06:55.751008126 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:06:55.751058720 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-02-12 21:06:56.751177137 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2026-02-12 21:06:57.751288509 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 29 2026-02-12 21:06:58.751413076 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-02-12 21:06:59.751501782 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-02-12 21:07:00.751296967 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-02-12 21:07:00.751534899 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-02-12 21:07:01.751651314 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-02-12 21:07:02.751759514 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
55.75 00.75
Interval[0]: 5.0
Test GARP Master Delay
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:07:11.725684942 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:07:11.833692080 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:07:12.005688310 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-02-12 21:07:12.117740797 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-02-12 21:07:12.181706521 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-02-12 21:07:12.771207754 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:07:12.875198472 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 8 2026-02-12 21:07:12.883199260 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-02-12 21:07:13.141795111 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-02-12 21:07:13.153712496 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-02-12 21:07:13.203217329 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 12 2026-02-12 21:07:13.779243783 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-02-12 21:07:13.813762960 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-02-12 21:07:13.907308247 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:07:13.909777756 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:07:13.919207354 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:07:14.579281507 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-02-12 21:07:14.803276328 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-02-12 21:07:15.041772673 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-02-12 21:07:15.041816017 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:07:15.041829682 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:07:15.041835322 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:07:15.041849749 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-02-12 21:07:15.041856660 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-02-12 21:07:18.651612464 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:07:18.651663461 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-02-12 21:07:18.651675337 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-02-12 21:07:18.651681996 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-02-12 21:07:18.651709039 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-02-12 21:07:18.651717504 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-02-12 21:07:19.651818228 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-02-12 21:07:20.651823198 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2026-02-12 21:07:20.651860124 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-02-12 21:07:20.651868015 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-02-12 21:07:20.651874102 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-02-12 21:07:20.651888733 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-02-12 21:07:20.651894908 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-02-12 21:07:21.651967646 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2026-02-12 21:07:22.652063246 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2026-02-12 21:07:23.652169560 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-02-12 21:07:24.652266455 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-02-12 21:07:25.652431843 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
18.65 18.65 18.65 18.65 18.65 20.65 20.65 20.65 20.65 20.65
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Delay Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-delay 2
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:07:34.598997177 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:07:34.682534371 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:07:35.126560237 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2026-02-12 21:07:35.222557444 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-02-12 21:07:35.414611036 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-02-12 21:07:35.488035150 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:07:35.588047467 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-02-12 21:07:35.764049172 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-02-12 21:07:35.828048766 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 10 2026-02-12 21:07:36.150713854 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-02-12 21:07:36.162563066 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-02-12 21:07:36.308082413 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2026-02-12 21:07:36.438632421 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-02-12 21:07:36.726623285 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:07:36.852206861 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:07:36.864057844 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:07:37.068094852 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-02-12 21:07:37.556128801 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2026-02-12 21:07:37.892202234 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-02-12 21:07:37.892235909 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:07:37.892244078 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:07:37.892247782 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:07:37.892260358 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-02-12 21:07:37.892264133 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-02-12 21:07:41.502030255 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:07:41.502082922 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-02-12 21:07:41.502097354 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-02-12 21:07:41.502103217 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-02-12 21:07:41.502119054 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-02-12 21:07:41.502127273 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-02-12 21:07:42.502323156 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-02-12 21:07:43.502243210 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2026-02-12 21:07:43.502278744 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-02-12 21:07:43.502282967 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-02-12 21:07:43.502288180 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-02-12 21:07:43.502306046 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-02-12 21:07:43.502335227 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-02-12 21:07:44.502461287 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2026-02-12 21:07:45.502582940 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2026-02-12 21:07:46.502681813 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-02-12 21:07:47.502793887 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-02-12 21:07:48.502899272 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
41.50 41.50 41.50 41.50 41.50 43.50 43.50 43.50 43.50 43.50
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:07:56.923401083 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:07:57.031370698 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:07:57.107389650 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-02-12 21:07:57.623384976 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-02-12 21:07:57.815429263 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-02-12 21:07:57.856853784 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:07:57.952866694 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-02-12 21:07:58.260886971 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-02-12 21:07:58.452909842 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-02-12 21:07:58.548903525 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2026-02-12 21:07:58.647504274 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-02-12 21:07:58.659451222 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2026-02-12 21:07:58.999447291 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-02-12 21:07:59.447477545 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2026-02-12 21:07:59.572993626 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:07:59.584911682 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:07:59.636937843 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-02-12 21:08:00.116968714 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-02-12 21:08:00.237850574 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-02-12 21:08:00.237886390 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:08:00.237895417 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:08:00.237899188 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:08:00.237911951 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-02-12 21:08:00.237916506 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-02-12 21:08:03.847674290 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:08:03.847730639 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-02-12 21:08:03.847757321 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-02-12 21:08:03.847785214 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-02-12 21:08:04.847904876 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-02-12 21:08:05.847999389 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-02-12 21:08:06.848114531 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-02-12 21:08:07.848217626 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-02-12 21:08:08.848036781 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-02-12 21:08:08.848075905 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-02-12 21:08:08.848094854 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-02-12 21:08:08.848254634 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2026-02-12 21:08:09.848402560 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-02-12 21:08:10.848520194 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:08:18.988204141 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:08:18.996199289 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 3 2026-02-12 21:08:19.084211152 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-02-12 21:08:19.512232589 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-02-12 21:08:19.928247072 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-02-12 21:08:20.017710662 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:08:20.024297606 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 8 2026-02-12 21:08:20.036257704 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 9 2026-02-12 21:08:20.060268493 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2026-02-12 21:08:20.137718593 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 11 2026-02-12 21:08:20.181800327 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 12 2026-02-12 21:08:20.309747054 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-02-12 21:08:20.501728928 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 14 2026-02-12 21:08:20.888256693 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:08:21.525841815 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:08:21.537734543 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:08:21.761797495 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-02-12 21:08:22.165792758 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2026-02-12 21:08:22.294405226 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-02-12 21:08:22.294460085 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:08:22.294470958 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:08:22.294476807 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:08:22.294492515 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-02-12 21:08:22.294498925 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-02-12 21:08:25.904259322 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:08:25.904306629 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-02-12 21:08:25.904318690 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-02-12 21:08:25.904334632 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-02-12 21:08:26.904446473 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-02-12 21:08:27.904528137 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-02-12 21:08:28.904633469 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-02-12 21:08:29.904734436 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-02-12 21:08:30.904569413 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-02-12 21:08:30.904605578 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-02-12 21:08:30.904622188 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-02-12 21:08:30.904762719 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2026-02-12 21:08:31.904903451 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-02-12 21:08:32.905020552 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Refresh
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:08:42.173074684 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:08:42.281060637 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:08:42.553081821 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2026-02-12 21:08:42.713090548 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-02-12 21:08:42.905093246 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-02-12 21:08:43.094563398 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:08:43.222571974 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-02-12 21:08:43.702595437 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-02-12 21:08:43.737212457 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-02-12 21:08:43.749114630 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-02-12 21:08:43.773108344 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-02-12 21:08:43.830610069 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2026-02-12 21:08:43.990609771 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-02-12 21:08:44.761173030 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:08:44.854730988 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:08:44.866636489 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:08:45.484576855 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2026-02-12 21:08:45.484619516 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2026-02-12 21:08:45.484628909 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-02-12 21:08:45.484633825 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:08:45.484648629 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:08:45.484654037 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:08:45.494641129 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 24 2026-02-12 21:08:45.814676579 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2026-02-12 21:08:49.094412258 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:08:49.094452675 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-02-12 21:08:49.094464337 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-02-12 21:08:49.094469764 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-02-12 21:08:49.094483262 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-02-12 21:08:49.094490371 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-02-12 21:08:50.094615200 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-02-12 21:08:51.094708076 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-02-12 21:08:52.094830955 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-02-12 21:08:53.094943598 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-02-12 21:08:54.094731999 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-02-12 21:08:54.094776225 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-02-12 21:08:54.094782456 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-02-12 21:08:54.094788044 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-02-12 21:08:54.094803354 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-02-12 21:08:54.094986560 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-02-12 21:08:54.095006225 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2026-02-12 21:08:55.095125852 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2026-02-12 21:08:56.095235545 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2026-02-12 21:08:57.095356513 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-02-12 21:08:58.095472705 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-02-12 21:08:59.095566100 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-02-12 21:08:59.095613137 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 48 2026-02-12 21:09:00.095671334 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-02-12 21:09:01.095781237 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-02-12 21:09:02.095886129 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2026-02-12 21:09:03.095973269 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2026-02-12 21:09:04.096071434 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-02-12 21:09:04.096120967 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 54 2026-02-12 21:09:05.096170550 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-02-12 21:09:06.096282529 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
54.09 59.09 04.09
Interval[0]: 5.0
Interval[1]: 5.0
Test GARP Master Refresh Global
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:09:15.322285667 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:09:15.454304612 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:09:15.706342811 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2026-02-12 21:09:15.962329035 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-02-12 21:09:16.122365682 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-02-12 21:09:16.435822631 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:09:16.555817108 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-02-12 21:09:16.734401916 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-02-12 21:09:16.750338243 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2026-02-12 21:09:17.015840801 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2026-02-12 21:09:17.271851242 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-02-12 21:09:17.367858428 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2026-02-12 21:09:17.562419022 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-02-12 21:09:17.690415352 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:09:18.039991846 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:09:18.051868586 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:09:18.423915852 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-02-12 21:09:18.455905282 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-02-12 21:09:18.663115705 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-02-12 21:09:18.663163004 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:09:18.663177021 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:09:18.663184937 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:09:18.663204707 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-02-12 21:09:18.663213376 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-02-12 21:09:19.663286371 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:09:23.273076203 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2026-02-12 21:09:23.273125652 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-02-12 21:09:23.273140118 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-02-12 21:09:23.273145330 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-02-12 21:09:23.273160838 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-02-12 21:09:23.273166259 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-02-12 21:09:24.273239024 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-02-12 21:09:25.280539618 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-02-12 21:09:26.277387767 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-02-12 21:09:27.277629922 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2026-02-12 21:09:28.273376912 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-02-12 21:09:28.273407351 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-02-12 21:09:28.273413643 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-02-12 21:09:28.273419013 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-02-12 21:09:28.273431771 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 41 2026-02-12 21:09:28.277696145 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-02-12 21:09:28.277740501 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2026-02-12 21:09:29.277800059 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2026-02-12 21:09:30.277905785 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-02-12 21:09:31.278012429 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-02-12 21:09:32.278140674 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-02-12 21:09:33.278229447 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2026-02-12 21:09:33.278279620 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 49 2026-02-12 21:09:34.278347904 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-02-12 21:09:35.278453456 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2026-02-12 21:09:36.278574593 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2026-02-12 21:09:37.278672843 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-02-12 21:09:38.278768881 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2026-02-12 21:09:38.278822198 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 55 2026-02-12 21:09:39.278881485 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
28.27 33.27 38.27
Interval[0]: 5.0000000000000036
Interval[1]: 5.0
Test GARP Master Refresh Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:09:48.127504019 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:09:48.239531164 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:09:48.539569116 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2026-02-12 21:09:48.635569603 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-02-12 21:09:48.767550477 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-02-12 21:09:49.149029914 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:09:49.257034385 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-02-12 21:09:49.563652090 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-02-12 21:09:49.575574638 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2026-02-12 21:09:49.625055764 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-02-12 21:09:49.753055341 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 12 2026-02-12 21:09:49.817041008 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2026-02-12 21:09:49.831623571 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-02-12 21:09:49.851689007 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:09:50.841147645 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:09:50.853056692 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:09:51.446789792 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2026-02-12 21:09:51.446827936 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2026-02-12 21:09:51.446837200 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-02-12 21:09:51.446841103 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:09:51.446856122 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:09:51.446860459 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:09:51.449089826 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 24 2026-02-12 21:09:51.865121743 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2026-02-12 21:09:55.056613692 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:09:55.056660125 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-02-12 21:09:55.056672980 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-02-12 21:09:55.056680660 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-02-12 21:09:55.056695253 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-02-12 21:09:55.056700859 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-02-12 21:09:56.056812008 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-02-12 21:09:57.056905906 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-02-12 21:09:58.057017281 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-02-12 21:09:59.057147515 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-02-12 21:10:00.056946770 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-02-12 21:10:00.056983667 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-02-12 21:10:00.056988024 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-02-12 21:10:00.056992653 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-02-12 21:10:00.057008487 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-02-12 21:10:00.057163150 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-02-12 21:10:00.057176823 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2026-02-12 21:10:00.057182386 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2026-02-12 21:10:00.057190398 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2026-02-12 21:10:01.057310837 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-02-12 21:10:02.057430383 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-02-12 21:10:03.057557276 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-02-12 21:10:04.057644713 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2026-02-12 21:10:05.057747847 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-02-12 21:10:05.057789921 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 50 2026-02-12 21:10:05.057801302 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2026-02-12 21:10:05.057817135 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2026-02-12 21:10:06.057845097 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-02-12 21:10:07.057947702 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2026-02-12 21:10:08.058045591 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-02-12 21:10:09.058146174 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2026-02-12 21:10:10.058301454 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2026-02-12 21:10:10.058339290 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 58 2026-02-12 21:10:10.058349063 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2026-02-12 21:10:10.058364327 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2026-02-12 21:10:11.058387563 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 61 2026-02-12 21:10:12.058445746 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3
Test GARP Master Refresh Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5 set system vrrp global-parameters garp master-refresh-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-02-12 21:10:21.236777463 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-02-12 21:10:21.340771381 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-02-12 21:10:21.532777335 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2026-02-12 21:10:21.884798227 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-02-12 21:10:22.012797088 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-02-12 21:10:22.382377897 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-02-12 21:10:22.542275639 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-02-12 21:10:22.716557768 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-02-12 21:10:22.726356003 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2026-02-12 21:10:22.908911604 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-02-12 21:10:22.920822122 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-02-12 21:10:23.034320731 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2026-02-12 21:10:23.644893526 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-02-12 21:10:23.676888080 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-02-12 21:10:24.058408539 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-02-12 21:10:24.070301559 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-02-12 21:10:24.282347483 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-02-12 21:10:24.474376875 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-02-12 21:10:24.550349113 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-02-12 21:10:24.550393422 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-02-12 21:10:24.550404817 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-02-12 21:10:24.550409444 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-02-12 21:10:24.550422861 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-02-12 21:10:24.550428147 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-02-12 21:10:25.551739391 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-02-12 21:10:29.164024846 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2026-02-12 21:10:29.164080546 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-02-12 21:10:29.164094236 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-02-12 21:10:29.164099735 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-02-12 21:10:29.164117036 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-02-12 21:10:29.164122967 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-02-12 21:10:30.164223005 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-02-12 21:10:31.164346209 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-02-12 21:10:32.164421054 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-02-12 21:10:33.164539230 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2026-02-12 21:10:34.164348252 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-02-12 21:10:34.164382584 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-02-12 21:10:34.164386683 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-02-12 21:10:34.164390603 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-02-12 21:10:34.164407573 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 41 2026-02-12 21:10:34.164575769 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-02-12 21:10:34.164587851 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2026-02-12 21:10:34.164592821 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2026-02-12 21:10:34.164597672 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 45 2026-02-12 21:10:35.164711292 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-02-12 21:10:36.164812767 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-02-12 21:10:37.164896806 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2026-02-12 21:10:38.165016673 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-02-12 21:10:39.165122430 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-02-12 21:10:39.165170635 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2026-02-12 21:10:39.165178825 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2026-02-12 21:10:39.165194618 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 53 2026-02-12 21:10:40.165215404 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2026-02-12 21:10:41.165315881 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-02-12 21:10:42.165412108 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2026-02-12 21:10:43.165520743 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2026-02-12 21:10:44.165633121 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 58 2026-02-12 21:10:44.165676481 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2026-02-12 21:10:44.165689521 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2026-02-12 21:10:44.165707762 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 61 2026-02-12 21:10:45.165747091 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3