Vrrp

Examples for High Availability (VRRP)

VRRP With MD5 Authentication

Description

This scenario checks that two OSDx devices can use VRRP with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+A00Sobhc8H3Ebil7hLV95txf8OZoSMvo=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX184oILcuK4C8auOtXAcRRkSPlkqCJdeGvQ=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:00

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+A00Sobhc8H3Ebil7hLV95txf8OZoSMvo=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

VRRP With Plaintext Password Authentication

Description

This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18QXaP1kGM1p3KSQmURPrw5Zrbo/YXCVH8=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+6aQs1/wdDhvpe50es76koYmFy+lSnGOI=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:02

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:00

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18QXaP1kGM1p3KSQmURPrw5Zrbo/YXCVH8=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

VRRP With AH Authentication

Description

This scenario checks that two OSDx devices can use VRRP with AH authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/qpXJkKb4sHM/wa4WYpsvJdgTIx8Xiv20=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+WtcxXh0gKkSBeHzMmb/3SbdvciA6w8sk=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:02

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:00

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/qpXJkKb4sHM/wa4WYpsvJdgTIx8Xiv20=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

VRRP RFC3768 Compatibility Configuration

Description

Check that a virtual interface is being created when this option is configured.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:

eth0v1\s*192.168.10.1/32
Show output
-------------------------------------------------------------------
 Name            IP Address           Admin  Oper  Vrf  Description
-------------------------------------------------------------------
  eth0  192.168.100.100/24            up     up
        fe80::dcad:beff:feef:6c00/64
eth0v1  192.168.10.1/32               up     up
  eth1                                down   down
  eth2                                down   down
  eth3                                down   down

Two VRRP Devices In Same Sync Group

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Two VRRP Devices In Same Sync Group With MD5 Authentication

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX18G4zCo+qp8bkDAUgIACAVCvTRuaP7m56o=
set system vrrp sync-group MAIN0 authentication type md5

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX1+ZAKdOXNWnKXaEyBl0Aafp9N/ix4SFGcw=
set system vrrp sync-group MAIN1 authentication type md5

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Test GARP Interval

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 09:57:13.477221486           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 09:57:13.577229763 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 09:57:14.001241496           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 4 2026-03-20 09:57:14.129246326 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-20 09:57:14.353278586           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2026-03-20 09:57:14.446427444           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-20 09:57:14.542437048 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 09:57:14.874492155           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-03-20 09:57:15.290472016           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2026-03-20 09:57:15.377369336 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-03-20 09:57:15.389283184 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-03-20 09:57:15.418482255 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-03-20 09:57:15.953292670 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-20 09:57:16.241329727 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-03-20 09:57:16.314562576 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-20 09:57:16.326565685 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-20 09:57:16.346464870 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-20 09:57:16.730526940 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-03-20 09:57:16.785503965 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-20 09:57:16.785531786 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 09:57:16.785540743 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 09:57:16.785544169 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 09:57:16.785558413 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-20 09:57:16.785563712 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-20 09:57:20.395291394 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 09:57:20.395330333 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-20 09:57:21.395464256 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-03-20 09:57:22.395569019 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
29 2026-03-20 09:57:23.395671089 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-03-20 09:57:24.395768929 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-03-20 09:57:25.395596262 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-03-20 09:57:25.395801964 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-20 09:57:26.395934782 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 09:57:27.396042973 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
20.39
25.39
Interval[0]: 5.0

Test GARP Interval Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp interval 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 09:57:35.993965594           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 09:57:36.077961676 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 09:57:36.305998887           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-03-20 09:57:36.402002582           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2026-03-20 09:57:36.562010997 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-03-20 09:57:36.895271403           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-20 09:57:37.015205938 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 09:57:37.207258641 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-03-20 09:57:37.426152676 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-20 09:57:37.438004436 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-20 09:57:37.499247079           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
12 2026-03-20 09:57:37.578071390 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-03-20 09:57:37.819299597           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-20 09:57:37.970055055 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-20 09:57:38.523338343 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-20 09:57:38.535236737 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-20 09:57:38.715274714 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-20 09:57:39.131281993 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-03-20 09:57:39.287466847 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-20 09:57:39.287503580 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 09:57:39.287513231 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 09:57:39.287517270 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 09:57:39.287534572 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-20 09:57:39.287538633 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-20 09:57:42.897264493 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 09:57:42.897302301 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-20 09:57:43.897452636 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-03-20 09:57:44.897523018 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
29 2026-03-20 09:57:45.897614076 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-03-20 09:57:46.897728389 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-03-20 09:57:47.897546010 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-03-20 09:57:47.897758448 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-20 09:57:48.897893481 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 09:57:49.897983239 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
42.89
47.89
Interval[0]: 5.0

Test GARP Master Delay

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:04         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 09:57:57.366698252           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 09:57:57.458701961 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 09:57:57.938740047 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-03-20 09:57:57.970718875           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-03-20 09:57:58.199949273           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-03-20 09:57:58.258755116           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 7 2026-03-20 09:57:58.307937654 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 09:57:58.683970913           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2026-03-20 09:57:58.971992877 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-03-20 09:57:59.195979344           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-03-20 09:57:59.282860980 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-20 09:57:59.294778883 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-03-20 09:57:59.410770057 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-20 09:57:59.698825179 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-03-20 09:57:59.708032348 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-20 09:57:59.719963766 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-20 09:57:59.748020308 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-03-20 09:58:00.508030315 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-03-20 09:58:00.664277573 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-20 09:58:00.664310001 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 09:58:00.664320283 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 09:58:00.664323379 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 09:58:00.664336514 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-20 09:58:00.664339100 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-20 09:58:01.664437329 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 09:58:02.664531455 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-03-20 09:58:06.274292869 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-03-20 09:58:06.274326960 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-20 09:58:06.274335562 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-20 09:58:06.274338468 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-20 09:58:06.274355399 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-03-20 09:58:06.274359630 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
33 2026-03-20 09:58:07.274463241 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 09:58:08.274496186 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-03-20 09:58:08.274520924 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-20 09:58:08.274526390 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-20 09:58:08.274532244 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-20 09:58:08.274546639 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-20 09:58:08.274552947 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-03-20 09:58:09.274620223 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-20 09:58:10.274706616 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-03-20 09:58:11.274848697 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-03-20 09:58:12.274928482 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-03-20 09:58:13.275023675 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
06.27
06.27
06.27
06.27
06.27
08.27
08.27
08.27
08.27
08.27

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Delay Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-delay 2

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 09:58:21.363519843           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 09:58:21.439536515 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 09:58:21.507548159           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-03-20 09:58:22.195569912 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-20 09:58:22.252761725           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-03-20 09:58:22.268771315           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-20 09:58:22.352759283 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 09:58:22.355581284           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 9 2026-03-20 09:58:22.436772950           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2026-03-20 09:58:22.519630419 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-03-20 09:58:22.531562125 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-03-20 09:58:22.600781083 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-03-20 09:58:23.155621603 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-20 09:58:23.452875395 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-20 09:58:23.464799127 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-03-20 09:58:23.539626992 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-20 09:58:24.124832780 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-20 09:58:24.156807413 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-03-20 09:58:24.648865082 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-20 09:58:24.648892287 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 09:58:24.648901306 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 09:58:24.648907245 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 09:58:24.648910074 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-20 09:58:24.648923247 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-20 09:58:28.258651500 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 09:58:28.258703784 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-20 09:58:28.258715035 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-20 09:58:28.258718389 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-20 09:58:28.258721518 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-20 09:58:28.258725467 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-20 09:58:29.258836113 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-20 09:58:30.258933440 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
33 2026-03-20 09:58:30.258977065 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-03-20 09:58:30.258990756 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-03-20 09:58:30.259000501 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-20 09:58:30.259031069 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-20 09:58:30.259042255 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-03-20 09:58:31.259058823 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-03-20 09:58:32.259157413 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-03-20 09:58:33.259350161 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-20 09:58:34.259407895 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-03-20 09:58:35.259511866 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
28.25
28.25
28.25
28.25
28.25
30.25
30.25
30.25
30.25
30.25

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:04         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 09:58:43.164269708           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 09:58:43.264271912 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 09:58:43.668309125           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-03-20 09:58:43.700310292 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-20 09:58:43.956344628           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2026-03-20 09:58:43.973511918           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-20 09:58:44.069518145 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 09:58:44.733559426           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2026-03-20 09:58:44.765556549 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-03-20 09:58:44.797552054           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-03-20 09:58:44.980455334 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-20 09:58:44.992327990 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-03-20 09:58:45.556421379 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-20 09:58:45.757832761 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-20 09:58:45.769587239 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-03-20 09:58:45.780383614 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-20 09:58:45.973573157 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-20 09:58:46.205594475 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-03-20 09:58:46.474361253 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-20 09:58:46.474391452 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 09:58:46.474399559 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 09:58:46.474404168 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 09:58:46.474419054 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-20 09:58:46.474423622 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-20 09:58:47.474543896 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 09:58:48.474642911 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-03-20 09:58:52.084388755 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-03-20 09:58:52.084415901 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-20 09:58:52.084427156 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-20 09:58:52.084444840 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-20 09:58:53.084600509 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-20 09:58:54.084706969 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-20 09:58:55.084805282 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 09:58:56.084906768 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-20 09:58:57.084668056 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-20 09:58:57.084691501 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-20 09:58:57.084702683 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-20 09:58:57.084931887 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-03-20 09:58:58.085055709 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-03-20 09:58:59.085177199 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:04         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 09:59:07.045112060           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 09:59:07.125105742 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 09:59:07.829161059           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-03-20 09:59:07.854332836           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 5 2026-03-20 09:59:07.934335520 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-03-20 09:59:07.957164534           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 7 2026-03-20 09:59:07.989156790 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 09:59:08.094355994           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-03-20 09:59:08.414351810           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2026-03-20 09:59:08.510355903 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
11 2026-03-20 09:59:08.981302228 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-20 09:59:08.993174368 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-03-20 09:59:09.438464948 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-20 09:59:09.450368530 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-03-20 09:59:09.717239285 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-20 09:59:09.726380735 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
17 2026-03-20 09:59:09.877313722 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-03-20 09:59:09.950414058 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-03-20 09:59:10.334680817 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-20 09:59:10.334712518 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 09:59:10.334723359 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 09:59:10.334726533 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 09:59:10.334761710 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-20 09:59:10.334767240 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-20 09:59:11.334931888 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 09:59:12.335020144 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-03-20 09:59:15.944767767 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-03-20 09:59:15.944796143 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-20 09:59:15.944803433 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-20 09:59:15.944814692 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-20 09:59:16.944926425 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-20 09:59:17.945033595 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-20 09:59:18.945143786 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 09:59:19.945236377 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-20 09:59:20.945056236 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-20 09:59:20.945082883 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-20 09:59:20.945097700 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-20 09:59:20.945286477 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-03-20 09:59:21.945401388 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-03-20 09:59:22.945484686 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Refresh

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 09:59:30.957965239           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 09:59:31.057921160 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 09:59:31.701971163 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-03-20 09:59:31.855189818           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 5 2026-03-20 09:59:31.926025314           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2026-03-20 09:59:31.926085374           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 7 2026-03-20 09:59:31.971187069 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 09:59:32.111190035 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-03-20 09:59:32.255208213           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-20 09:59:32.287211802           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
11 2026-03-20 09:59:32.950097307 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-20 09:59:32.961985436 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-03-20 09:59:33.311298161 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-20 09:59:33.323194266 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-03-20 09:59:33.599229456 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-20 09:59:33.622028844 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
17 2026-03-20 09:59:33.718053255 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-03-20 09:59:34.143267525 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-03-20 09:59:34.267419558 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-20 09:59:34.267461264 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 09:59:34.267474498 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 09:59:34.267480312 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 09:59:34.267484196 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-20 09:59:34.267489456 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-20 09:59:37.877239840 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 09:59:37.877288517 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-20 09:59:37.877301643 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-20 09:59:37.877311551 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-20 09:59:37.877316531 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-20 09:59:37.877321361 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-20 09:59:38.877426994 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-20 09:59:39.877533121 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-20 09:59:40.877631988 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 09:59:41.877725038 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-20 09:59:42.877574054 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-20 09:59:42.877602804 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-20 09:59:42.877608366 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-20 09:59:42.877613124 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-20 09:59:42.877628621 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-03-20 09:59:42.877755838 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-20 09:59:42.877767548 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-03-20 09:59:43.877895041 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-03-20 09:59:44.878081233 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-03-20 09:59:45.878135198 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-03-20 09:59:46.878243307 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-03-20 09:59:47.878335070 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-03-20 09:59:47.878368774 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
48 2026-03-20 09:59:48.878517121 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-03-20 09:59:49.878631082 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-03-20 09:59:50.878784267 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2026-03-20 09:59:51.878835841 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2026-03-20 09:59:52.878928144 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-03-20 09:59:52.878959689 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
54 2026-03-20 09:59:53.879030330 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-03-20 09:59:54.879120492 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
42.87
47.87
52.87
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Global

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:05         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 10:00:02.815040606           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 10:00:02.915060381 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 10:00:03.011064060           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-03-20 10:00:03.055058179           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-03-20 10:00:03.287070322 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-03-20 10:00:03.660266513           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-20 10:00:03.756319910 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 10:00:03.940297757 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-03-20 10:00:04.023169873 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-20 10:00:04.035093000 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-20 10:00:04.091093092 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-20 10:00:04.256298755           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
13 2026-03-20 10:00:04.608338916           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-20 10:00:05.047135646 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-03-20 10:00:05.280419043 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-20 10:00:05.292322105 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-20 10:00:05.472365460 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-03-20 10:00:06.048406008 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-03-20 10:00:06.122273916 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-20 10:00:06.122302541 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 10:00:06.122312847 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 10:00:06.122316201 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 10:00:06.122329305 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-20 10:00:06.122332877 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-20 10:00:07.122439533 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 10:00:08.122536240 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-03-20 10:00:11.732277809 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-03-20 10:00:11.732367554 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-20 10:00:11.732380601 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-20 10:00:11.732386639 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-20 10:00:11.732389485 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-03-20 10:00:11.732394844 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
33 2026-03-20 10:00:12.732547417 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 10:00:13.732805229 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-20 10:00:14.732885174 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
36 2026-03-20 10:00:15.732982412 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
37 2026-03-20 10:00:16.732661915 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-20 10:00:16.732686339 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-20 10:00:16.732690296 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-03-20 10:00:16.732694063 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
41 2026-03-20 10:00:16.732707186 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-03-20 10:00:16.733035780 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-03-20 10:00:16.733050691 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-03-20 10:00:17.733171766 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-03-20 10:00:18.733258790 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-03-20 10:00:19.733354578 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-03-20 10:00:20.733452638 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-03-20 10:00:21.733625290 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-03-20 10:00:21.733692823 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
50 2026-03-20 10:00:22.733747604 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2026-03-20 10:00:23.733850396 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2026-03-20 10:00:24.733996146 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-03-20 10:00:25.734068774 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-03-20 10:00:26.734154051 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-03-20 10:00:26.734184310 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
56 2026-03-20 10:00:27.734273296 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-03-20 10:00:28.734381304 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
16.73
21.73
26.73
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 10:00:37.088275347           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 10:00:37.176254501           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 3 2026-03-20 10:00:37.188244214 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-03-20 10:00:37.912286505           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-03-20 10:00:38.072294307 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-03-20 10:00:38.189479676           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-20 10:00:38.200357198 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 8 2026-03-20 10:00:38.212294520 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
 9 2026-03-20 10:00:38.289485163 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-03-20 10:00:38.497521530           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-03-20 10:00:38.721507859 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
12 2026-03-20 10:00:38.936332798 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-03-20 10:00:39.009528561           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2026-03-20 10:00:39.096311463 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-20 10:00:40.033632684 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-20 10:00:40.045519245 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-20 10:00:40.399149873 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
18 2026-03-20 10:00:40.399191327 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
19 2026-03-20 10:00:40.399201796 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-20 10:00:40.399207871 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 10:00:40.399222650 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 10:00:40.399227051 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 10:00:40.801700452 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
24 2026-03-20 10:00:40.865595073 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2026-03-20 10:00:44.008963052 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 10:00:44.008992175 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-20 10:00:44.009000889 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-20 10:00:44.009004947 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-20 10:00:44.009022151 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-20 10:00:44.009025106 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-20 10:00:45.009206347 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-20 10:00:46.009219971 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-20 10:00:47.009332108 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 10:00:48.009422709 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-20 10:00:49.009269174 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-20 10:00:49.009294368 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-20 10:00:49.009297240 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-20 10:00:49.009299410 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-20 10:00:49.009315081 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-03-20 10:00:49.009460480 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-20 10:00:49.009469557 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-03-20 10:00:49.009471922 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-03-20 10:00:49.009475868 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-03-20 10:00:50.009607446 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-03-20 10:00:51.009793535 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-03-20 10:00:52.009864998 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-03-20 10:00:53.009960546 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-03-20 10:00:54.010061965 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-03-20 10:00:54.010094810 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
50 2026-03-20 10:00:54.010102850 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2026-03-20 10:00:54.010118141 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2026-03-20 10:00:55.010153301 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-03-20 10:00:56.010249865 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-03-20 10:00:57.010404717 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-03-20 10:00:58.010489430 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-03-20 10:00:59.010618882 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-03-20 10:00:59.010741538 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
58 2026-03-20 10:00:59.010758124 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2026-03-20 10:00:59.010768174 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2026-03-20 10:01:00.010866988 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
61 2026-03-20 10:01:01.010959460 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3

Test GARP Master Refresh Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5
set system vrrp global-parameters garp master-refresh-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-20 10:01:09.749402705           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-20 10:01:09.837385479 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-20 10:01:10.041419369           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-03-20 10:01:10.137458977 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-20 10:01:10.329466024           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2026-03-20 10:01:10.642602902           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-20 10:01:10.746635602 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-20 10:01:11.266641244           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-03-20 10:01:11.353506833 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-20 10:01:11.365405293 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-20 10:01:11.426641266           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
12 2026-03-20 10:01:11.426677919 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-03-20 10:01:11.993466428 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-03-20 10:01:12.121491514 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-20 10:01:12.450760380 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-20 10:01:12.462672146 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-20 10:01:13.047455147 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
18 2026-03-20 10:01:13.047489021 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
19 2026-03-20 10:01:13.047498337 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-20 10:01:13.047502512 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-20 10:01:13.047507036 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-20 10:01:13.047518953 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-20 10:01:13.250720104 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
24 2026-03-20 10:01:13.282709330 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2026-03-20 10:01:16.657272093 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-20 10:01:16.657306261 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-20 10:01:16.657314940 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-20 10:01:16.657317617 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-20 10:01:16.657320735 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-20 10:01:16.657323177 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-20 10:01:17.657463522 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-20 10:01:18.657582796 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-20 10:01:19.657667923 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-20 10:01:20.657744462 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-20 10:01:21.657587703 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-20 10:01:21.657608508 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-20 10:01:21.657611486 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-20 10:01:21.657614974 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-20 10:01:21.657628712 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-03-20 10:01:21.657797736 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-20 10:01:21.657807586 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-03-20 10:01:21.657813936 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-03-20 10:01:21.657819494 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-03-20 10:01:22.658028134 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-03-20 10:01:23.658088452 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-03-20 10:01:24.658179925 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-03-20 10:01:25.658277140 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-03-20 10:01:26.658372913 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-03-20 10:01:26.658402412 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
50 2026-03-20 10:01:26.658411077 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2026-03-20 10:01:26.658426138 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2026-03-20 10:01:27.658469592 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-03-20 10:01:28.658556971 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-03-20 10:01:29.658661098 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-03-20 10:01:30.658773261 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-03-20 10:01:31.658868350 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-03-20 10:01:31.658893017 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
58 2026-03-20 10:01:31.658897790 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2026-03-20 10:01:31.658912220 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2026-03-20 10:01:32.658974524 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
61 2026-03-20 10:01:33.659060370 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3