Vrrp

Examples for High Availability (VRRP)

VRRP With MD5 Authentication

Description

This scenario checks that two OSDx devices can use VRRP with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+/fJqXPLazgldhgVIXfAnkY/Mxq2bT1DA=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19DTxP9yiLiaKRE1lzxDMgNiFRJEPEkeq4=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:00

   Master router: 192.168.100.100
   Master priority: 200

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+/fJqXPLazgldhgVIXfAnkY/Mxq2bT1DA=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

VRRP With Plaintext Password Authentication

Description

This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19xguyIn+ZW7TO/NobJRkokMMMVhgrjPEg=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19Q7hTrW+EX9y4JcEZ8Q6I6CFORjIKMBrI=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:00

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19xguyIn+ZW7TO/NobJRkokMMMVhgrjPEg=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

VRRP With AH Authentication

Description

This scenario checks that two OSDx devices can use VRRP with AH authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19UIAO5R+6M3Su671HWwouhVkF3wSXeM+s=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/csoYvx30X5n4ZA1vEsemOBA6kITTZlNk=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:01

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19UIAO5R+6M3Su671HWwouhVkF3wSXeM+s=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

VRRP RFC3768 Compatibility Configuration

Description

Check that a virtual interface is being created when this option is configured.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:

eth0v1\s*192.168.10.1/32
Show output
-------------------------------------------------------------------
 Name            IP Address           Admin  Oper  Vrf  Description
-------------------------------------------------------------------
  eth0  192.168.100.100/24            up     up
        fe80::dcad:beff:feef:6c00/64
eth0v1  192.168.10.1/32               up     up
  eth1                                down   down
  eth2                                down   down
  eth3                                down   down

Two VRRP Devices In Same Sync Group

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Two VRRP Devices In Same Sync Group With MD5 Authentication

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX18jYIgtoPrOoMLNITiojfMVo9g5BDMNsdg=
set system vrrp sync-group MAIN0 authentication type md5

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX1/E0uJ4dqzaVQHkBt0do95Wk/5qfWQ258w=
set system vrrp sync-group MAIN1 authentication type md5

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Test GARP Interval

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 18:58:26.246524268           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 18:58:26.346514443 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-05 18:58:26.486546400           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-03-05 18:58:26.534547147 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-05 18:58:26.882541350           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-03-05 18:58:27.260985900           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 18:58:27.289150580           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 8 2026-03-05 18:58:27.369151056 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-03-05 18:58:27.490617447 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-05 18:58:27.502557260 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-05 18:58:27.970564170 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-03-05 18:58:28.053144049 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-03-05 18:58:28.117145343           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2026-03-05 18:58:28.194578747 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-05 18:58:29.141231602 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 18:58:29.153159833 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 18:58:29.429234773 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-05 18:58:29.556770378 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-03-05 18:58:29.556805282 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-05 18:58:29.556812565 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 18:58:29.556816259 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 18:58:29.556872250 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 18:58:29.556887699 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 18:58:29.781225694 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2026-03-05 18:58:33.166584029 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 18:58:33.166625257 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-05 18:58:34.166898934 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-03-05 18:58:35.166966496 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
29 2026-03-05 18:58:36.167072207 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-03-05 18:58:37.167191657 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-03-05 18:58:38.166943469 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-03-05 18:58:38.167234759 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-05 18:58:39.167375250 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-05 18:58:40.167521788 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
33.16
38.16
Interval[0]: 5.0

Test GARP Interval Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp interval 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:03         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:05         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 18:58:48.871516553           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 18:58:48.891569260           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 3 2026-03-05 18:58:48.975530006 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-03-05 18:58:49.251566601 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-05 18:58:49.731604152           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2026-03-05 18:58:49.754142043           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 18:58:49.774164012           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 8 2026-03-05 18:58:49.850152655 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-03-05 18:58:49.923621827 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-05 18:58:49.935568034 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-05 18:58:50.099585570 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-05 18:58:50.518191968 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-03-05 18:58:50.582186618           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-03-05 18:58:50.806246376 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-05 18:58:50.818172147 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-03-05 18:58:50.851620605 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 18:58:51.022229321 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-03-05 18:58:51.766250918 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-03-05 18:58:52.181105952 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-05 18:58:52.181143061 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 18:58:52.181152030 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 18:58:52.181156311 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 18:58:52.181167358 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 18:58:52.181171529 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-05 18:58:53.181241324 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 18:58:54.181342180 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-03-05 18:58:57.791168872 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-03-05 18:58:57.791220573 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 18:58:58.791345397 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-03-05 18:58:59.791478906 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-03-05 18:59:00.791573371 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-05 18:59:01.791678369 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-05 18:59:02.791600961 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-03-05 18:59:02.791778535 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-05 18:59:03.791911057 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
36 2026-03-05 18:59:04.792016313 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
57.79
02.79
Interval[0]: 5.0

Test GARP Master Delay

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 18:59:12.464644210           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 18:59:12.560614777 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-05 18:59:12.684624401           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-03-05 18:59:13.060680683           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2026-03-05 18:59:13.476676486 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-03-05 18:59:13.523260557           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 18:59:13.619236890 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-05 18:59:13.871245697 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-03-05 18:59:14.084801416 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-05 18:59:14.096722643 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-05 18:59:14.284697033 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-05 18:59:14.295274110           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2026-03-05 18:59:14.391305439           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2026-03-05 18:59:14.628729677 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-03-05 18:59:15.415391861 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 18:59:15.427313149 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 18:59:15.651333995 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-03-05 18:59:15.769606482 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-03-05 18:59:15.769653921 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-05 18:59:15.769666617 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 18:59:15.769671213 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 18:59:15.769687241 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 18:59:15.769693018 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 18:59:15.831351125 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2026-03-05 18:59:19.379488633 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 18:59:19.379536752 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-05 18:59:19.379547373 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-05 18:59:19.379555065 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 18:59:19.379560073 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-05 18:59:19.379565201 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-05 18:59:20.379735237 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-05 18:59:21.379730390 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
33 2026-03-05 18:59:21.379770024 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-03-05 18:59:21.379776768 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-03-05 18:59:21.379781190 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-05 18:59:21.379796590 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-05 18:59:21.379802224 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-03-05 18:59:22.379926937 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-03-05 18:59:23.380035520 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-03-05 18:59:24.380164357 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-05 18:59:25.380280802 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-03-05 18:59:26.380401916 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
19.37
19.37
19.37
19.37
19.37
21.37
21.37
21.37
21.37
21.37

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Delay Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-delay 2

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 18:59:34.453731851           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 18:59:34.557602579 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-05 18:59:34.653647067           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-03-05 18:59:34.725632656           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2026-03-05 18:59:35.269655506 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-03-05 18:59:35.324210631           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 18:59:35.420245358 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-05 18:59:35.544252710 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-03-05 18:59:35.608265612           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-05 18:59:35.749835795 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-03-05 18:59:35.761697900 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-03-05 18:59:35.765710305 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2026-03-05 18:59:35.853711789 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-03-05 18:59:36.152274641           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
15 2026-03-05 18:59:37.176401903 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 18:59:37.188293797 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 18:59:37.320325879 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-05 18:59:37.763512156 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-03-05 18:59:37.763558000 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-05 18:59:37.763570553 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 18:59:37.763576394 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 18:59:37.763592559 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 18:59:37.763598456 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 18:59:37.816363699 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2026-03-05 18:59:41.373364072 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 18:59:41.373403650 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-05 18:59:41.373416810 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-05 18:59:41.373421894 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 18:59:41.373427404 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-05 18:59:41.373485952 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-05 18:59:42.373653556 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-05 18:59:43.373665814 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
33 2026-03-05 18:59:43.373701783 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-03-05 18:59:43.373707931 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-03-05 18:59:43.373713580 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-05 18:59:43.373730454 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-05 18:59:43.373736269 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-03-05 18:59:44.373851952 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-03-05 18:59:45.373965692 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-03-05 18:59:46.374072445 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-05 18:59:47.374178611 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-03-05 18:59:48.374292578 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
41.37
41.37
41.37
41.37
41.37
43.37
43.37
43.37
43.37
43.37

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 18:59:56.182650168           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 18:59:56.294591413 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-05 18:59:56.306588901 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-03-05 18:59:56.678684577           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2026-03-05 18:59:57.190646944           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2026-03-05 18:59:57.193196488           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 18:59:57.285195192 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-05 18:59:57.309207073           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-03-05 18:59:57.702769519 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-05 18:59:57.714631115 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-05 18:59:58.009257796           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
12 2026-03-05 18:59:58.137260637 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-03-05 18:59:58.342691345 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-03-05 18:59:58.662729802 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-05 18:59:59.033356059 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 18:59:59.045254148 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 18:59:59.385296565 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-05 18:59:59.501323901 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-03-05 18:59:59.501364514 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-05 18:59:59.501374741 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 18:59:59.501378571 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 18:59:59.501389438 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 18:59:59.501393878 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 18:59:59.609317395 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2026-03-05 19:00:03.111166876 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 19:00:03.111204189 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-05 19:00:03.111213082 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-05 19:00:03.111230587 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 19:00:04.111351251 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-03-05 19:00:05.111473853 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-03-05 19:00:06.111579216 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-05 19:00:07.111681273 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-05 19:00:08.111553630 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-03-05 19:00:08.111587688 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-03-05 19:00:08.111607920 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-05 19:00:08.111731183 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
37 2026-03-05 19:00:09.111875857 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-03-05 19:00:10.112021596 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 19:00:18.231572593           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 19:00:18.331592647 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-05 19:00:18.631615342 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-03-05 19:00:18.791601872           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-03-05 19:00:19.047658653           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2026-03-05 19:00:19.198187726           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 19:00:19.334186216 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-05 19:00:19.582204704 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-03-05 19:00:19.642215285           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-05 19:00:20.058230622           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
11 2026-03-05 19:00:20.071695682 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-05 19:00:20.083621136 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-03-05 19:00:20.195670742 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-03-05 19:00:20.999696994 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-05 19:00:21.082314766 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 19:00:21.094241104 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 19:00:21.541529390 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
18 2026-03-05 19:00:21.541562200 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
19 2026-03-05 19:00:21.541572903 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-05 19:00:21.541576563 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 19:00:21.541591921 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 19:00:21.541596188 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 19:00:21.850299526 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
24 2026-03-05 19:00:21.850399588 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2026-03-05 19:00:25.151352123 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 19:00:25.151393492 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-05 19:00:25.151405188 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-05 19:00:25.151424828 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 19:00:26.151528888 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-03-05 19:00:27.151640369 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-03-05 19:00:28.151740205 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-05 19:00:29.151923453 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-05 19:00:30.151700978 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-03-05 19:00:30.151730202 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-03-05 19:00:30.151744476 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-05 19:00:30.151940989 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
37 2026-03-05 19:00:31.152105587 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-03-05 19:00:32.152277709 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Refresh

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 19:00:40.228566318           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 19:00:40.328539507 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-05 19:00:40.424555303 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-03-05 19:00:40.584589328           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-03-05 19:00:40.584649689           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2026-03-05 19:00:41.195217213           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 19:00:41.299347680 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-05 19:00:41.339189190           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-03-05 19:00:41.431184531           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2026-03-05 19:00:41.608727005 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-03-05 19:00:41.620584586 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-03-05 19:00:41.684632532 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2026-03-05 19:00:41.915217318 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
14 2026-03-05 19:00:41.992637729 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-03-05 19:00:42.459279782 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 19:00:42.471204297 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 19:00:42.523247383 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-05 19:00:42.747259501 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-03-05 19:00:43.537607163 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-05 19:00:43.537783714 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 19:00:43.537803140 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 19:00:43.537807446 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 19:00:43.537812231 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 19:00:43.537824297 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-05 19:00:47.147464251 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 19:00:47.147508665 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-05 19:00:47.147520839 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-05 19:00:47.147524593 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 19:00:47.147546642 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-05 19:00:47.147550419 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-05 19:00:48.147637907 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-05 19:00:49.147748588 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-05 19:00:50.147857142 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-05 19:00:51.147976422 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-05 19:00:52.147839953 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-05 19:00:52.147877374 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-05 19:00:52.147886787 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-05 19:00:52.147891197 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-05 19:00:52.147906111 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-03-05 19:00:52.148018819 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-05 19:00:52.148033581 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-03-05 19:00:53.148157650 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-03-05 19:00:54.148284078 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-03-05 19:00:55.148401463 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-03-05 19:00:56.148530247 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-03-05 19:00:57.148640903 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-03-05 19:00:57.148695935 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
48 2026-03-05 19:00:58.148768567 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-03-05 19:00:59.148888311 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-03-05 19:01:00.149003375 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2026-03-05 19:01:01.149130224 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2026-03-05 19:01:02.149234563 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-03-05 19:01:02.149286255 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
54 2026-03-05 19:01:03.149349325 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-03-05 19:01:04.149460005 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
52.14
57.14
02.14
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Global

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 19:01:12.445963875           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 19:01:12.513986919           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 3 2026-03-05 19:01:12.541960160 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-03-05 19:01:12.789982761 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-05 19:01:12.938011806           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2026-03-05 19:01:13.364632417           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 19:01:13.460589389 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-05 19:01:13.546107343 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-03-05 19:01:13.558048683 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2026-03-05 19:01:13.586034326 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-05 19:01:13.852594428 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
12 2026-03-05 19:01:13.898022815 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2026-03-05 19:01:13.948610056           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2026-03-05 19:01:14.012621578           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-05 19:01:14.972703142 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 19:01:14.984606026 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 19:01:15.676688319 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-03-05 19:01:15.750760125 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-03-05 19:01:15.750800769 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-05 19:01:15.750811585 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 19:01:15.750816169 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 19:01:15.750831428 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 19:01:15.750836705 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 19:01:15.836700324 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2026-03-05 19:01:19.360643572 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 19:01:19.360673055 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-05 19:01:19.360680980 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-05 19:01:19.360684318 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 19:01:19.360700270 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-05 19:01:19.360704537 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-05 19:01:20.360833451 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-05 19:01:21.361050133 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-05 19:01:22.361121529 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-05 19:01:23.361246993 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-05 19:01:24.360942644 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-05 19:01:24.360970344 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-05 19:01:24.360975117 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-05 19:01:24.360980428 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-05 19:01:24.360993644 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-03-05 19:01:24.361280212 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-05 19:01:24.361292373 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-03-05 19:01:25.361435452 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-03-05 19:01:26.361570532 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-03-05 19:01:27.361659024 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-03-05 19:01:28.361785594 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-03-05 19:01:29.361894303 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-03-05 19:01:29.361942963 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
48 2026-03-05 19:01:30.361996917 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-03-05 19:01:31.362209943 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-03-05 19:01:32.362294935 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2026-03-05 19:01:33.362390435 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2026-03-05 19:01:34.362499969 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-03-05 19:01:34.362548582 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
54 2026-03-05 19:01:35.362610891 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-03-05 19:01:36.362718069 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
24.36
29.36
34.36
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 19:01:44.707415635           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 19:01:44.827381642 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-05 19:01:44.847400243           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-03-05 19:01:45.099411506 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-05 19:01:45.419425973           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2026-03-05 19:01:45.694169120           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 19:01:45.789998113 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-05 19:01:46.078013046           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-03-05 19:01:46.110011151 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-03-05 19:01:46.443679869 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-03-05 19:01:46.455462112 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-03-05 19:01:46.590035061           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
13 2026-03-05 19:01:46.923483498 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-03-05 19:01:47.403505337 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-03-05 19:01:47.614116763 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 19:01:47.626050761 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 19:01:47.810085620 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-03-05 19:01:48.037508828 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-03-05 19:01:48.037555474 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-03-05 19:01:48.037569248 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 19:01:48.037573469 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 19:01:48.037577749 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 19:01:48.037582285 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 19:01:48.542121490 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2026-03-05 19:01:51.647339805 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 19:01:51.647380132 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-03-05 19:01:51.647391826 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-05 19:01:51.647395533 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 19:01:51.647411037 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-05 19:01:51.647414844 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-05 19:01:52.647513098 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-03-05 19:01:53.647620327 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-05 19:01:54.647788146 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-05 19:01:55.647881803 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-05 19:01:56.647665085 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-03-05 19:01:56.647687939 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-05 19:01:56.647692133 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-05 19:01:56.647695209 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-05 19:01:56.647709617 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-03-05 19:01:56.647917065 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-03-05 19:01:56.647925407 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-03-05 19:01:56.647927905 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-03-05 19:01:56.647931823 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-03-05 19:01:57.648065383 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-03-05 19:01:58.648182044 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-03-05 19:01:59.648287731 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-03-05 19:02:00.648400363 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-03-05 19:02:01.648498798 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-03-05 19:02:01.648527802 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
50 2026-03-05 19:02:01.648535127 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2026-03-05 19:02:01.648551306 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2026-03-05 19:02:02.648612032 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-03-05 19:02:03.648716667 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-03-05 19:02:04.648834753 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-03-05 19:02:05.648938416 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-03-05 19:02:06.649072906 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-03-05 19:02:06.649111254 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
58 2026-03-05 19:02:06.649119139 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2026-03-05 19:02:06.649135101 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2026-03-05 19:02:07.649176880 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
61 2026-03-05 19:02:08.649322830 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3

Test GARP Master Refresh Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5
set system vrrp global-parameters garp master-refresh-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-03-05 19:02:16.712755482           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-03-05 19:02:16.808754086 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-03-05 19:02:16.892785210           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-03-05 19:02:17.100769404 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-03-05 19:02:17.388854679           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 6 2026-03-05 19:02:17.747375728           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-03-05 19:02:17.859372462 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-03-05 19:02:17.863370016           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2026-03-05 19:02:17.900944977 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-03-05 19:02:17.912810677 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-03-05 19:02:18.284830257 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-03-05 19:02:18.367401770           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2026-03-05 19:02:18.476857263 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-03-05 19:02:18.623425451 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
15 2026-03-05 19:02:18.879471137 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-03-05 19:02:18.891405144 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-03-05 19:02:19.455458516 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-03-05 19:02:19.839468121 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-03-05 19:02:20.017602329 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-03-05 19:02:20.017636886 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-03-05 19:02:20.017645146 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-03-05 19:02:20.017649121 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-03-05 19:02:20.017665541 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-03-05 19:02:20.017672811 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-03-05 19:02:21.017780361 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-03-05 19:02:24.627591735 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-03-05 19:02:24.627634208 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-03-05 19:02:24.627645583 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-03-05 19:02:24.627649136 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-03-05 19:02:24.627652130 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-03-05 19:02:24.627668384 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-03-05 19:02:25.627821459 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-03-05 19:02:26.627919034 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-03-05 19:02:27.628027576 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-03-05 19:02:28.628151645 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
36 2026-03-05 19:02:29.627986632 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-03-05 19:02:29.628019097 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-03-05 19:02:29.628025064 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-03-05 19:02:29.628030260 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-03-05 19:02:29.628047321 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
41 2026-03-05 19:02:29.628216836 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-03-05 19:02:29.628234213 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-03-05 19:02:29.628239511 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-03-05 19:02:29.628247889 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
45 2026-03-05 19:02:30.628351760 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-03-05 19:02:31.628450622 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-03-05 19:02:32.628556943 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-03-05 19:02:33.628660700 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-03-05 19:02:34.628792316 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-03-05 19:02:34.628826605 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2026-03-05 19:02:34.628838665 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2026-03-05 19:02:34.628852770 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
53 2026-03-05 19:02:35.628921636 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-03-05 19:02:36.629037866 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-03-05 19:02:37.629148929 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-03-05 19:02:38.629246417 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-03-05 19:02:39.629361209 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
58 2026-03-05 19:02:39.629391739 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2026-03-05 19:02:39.629399968 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2026-03-05 19:02:39.629412902 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
61 2026-03-05 19:02:40.629471954 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3