Vrrp
Examples for High Availability (VRRP)
VRRP With MD5 Authentication
Description
This scenario checks that two OSDx devices can use VRRP with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+/fJqXPLazgldhgVIXfAnkY/Mxq2bT1DA= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19DTxP9yiLiaKRE1lzxDMgNiFRJEPEkeq4= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:00 Master router: 192.168.100.100 Master priority: 200 Priority: 100 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+/fJqXPLazgldhgVIXfAnkY/Mxq2bT1DA= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
VRRP With Plaintext Password Authentication
Description
This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19xguyIn+ZW7TO/NobJRkokMMMVhgrjPEg= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19Q7hTrW+EX9y4JcEZ8Q6I6CFORjIKMBrI= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:00 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19xguyIn+ZW7TO/NobJRkokMMMVhgrjPEg= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP With AH Authentication
Description
This scenario checks that two OSDx devices can use VRRP with AH authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19UIAO5R+6M3Su671HWwouhVkF3wSXeM+s= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/csoYvx30X5n4ZA1vEsemOBA6kITTZlNk= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:01 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19UIAO5R+6M3Su671HWwouhVkF3wSXeM+s= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP RFC3768 Compatibility Configuration
Description
Check that a virtual interface is being created when this option is configured.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:
eth0v1\s*192.168.10.1/32Show output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- eth0 192.168.100.100/24 up up fe80::dcad:beff:feef:6c00/64 eth0v1 192.168.10.1/32 up up eth1 down down eth2 down down eth3 down down
Two VRRP Devices In Same Sync Group
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Two VRRP Devices In Same Sync Group With MD5 Authentication
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX18jYIgtoPrOoMLNITiojfMVo9g5BDMNsdg= set system vrrp sync-group MAIN0 authentication type md5
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX1/E0uJ4dqzaVQHkBt0do95Wk/5qfWQ258w= set system vrrp sync-group MAIN1 authentication type md5
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Test GARP Interval
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 18:58:26.246524268 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 18:58:26.346514443 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-03-05 18:58:26.486546400 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2026-03-05 18:58:26.534547147 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-03-05 18:58:26.882541350 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2026-03-05 18:58:27.260985900 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 18:58:27.289150580 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 8 2026-03-05 18:58:27.369151056 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-03-05 18:58:27.490617447 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-03-05 18:58:27.502557260 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-03-05 18:58:27.970564170 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-03-05 18:58:28.053144049 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2026-03-05 18:58:28.117145343 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 14 2026-03-05 18:58:28.194578747 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-03-05 18:58:29.141231602 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 18:58:29.153159833 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 18:58:29.429234773 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-03-05 18:58:29.556770378 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-03-05 18:58:29.556805282 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-03-05 18:58:29.556812565 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 18:58:29.556816259 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 18:58:29.556872250 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 18:58:29.556887699 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 18:58:29.781225694 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2026-03-05 18:58:33.166584029 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 18:58:33.166625257 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-03-05 18:58:34.166898934 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2026-03-05 18:58:35.166966496 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 29 2026-03-05 18:58:36.167072207 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-03-05 18:58:37.167191657 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-03-05 18:58:38.166943469 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-03-05 18:58:38.167234759 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-03-05 18:58:39.167375250 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-03-05 18:58:40.167521788 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
33.16 38.16
Interval[0]: 5.0
Test GARP Interval Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp interval 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:03 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:05 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 18:58:48.871516553 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 18:58:48.891569260 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 3 2026-03-05 18:58:48.975530006 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-03-05 18:58:49.251566601 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-03-05 18:58:49.731604152 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-03-05 18:58:49.754142043 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 18:58:49.774164012 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 8 2026-03-05 18:58:49.850152655 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-03-05 18:58:49.923621827 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-03-05 18:58:49.935568034 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-03-05 18:58:50.099585570 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-03-05 18:58:50.518191968 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2026-03-05 18:58:50.582186618 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-03-05 18:58:50.806246376 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-03-05 18:58:50.818172147 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 16 2026-03-05 18:58:50.851620605 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 18:58:51.022229321 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-03-05 18:58:51.766250918 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-03-05 18:58:52.181105952 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-03-05 18:58:52.181143061 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 18:58:52.181152030 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 18:58:52.181156311 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 18:58:52.181167358 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 18:58:52.181171529 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-03-05 18:58:53.181241324 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 18:58:54.181342180 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2026-03-05 18:58:57.791168872 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2026-03-05 18:58:57.791220573 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 18:58:58.791345397 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-03-05 18:58:59.791478906 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-03-05 18:59:00.791573371 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-03-05 18:59:01.791678369 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-03-05 18:59:02.791600961 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-03-05 18:59:02.791778535 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-03-05 18:59:03.791911057 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2026-03-05 18:59:04.792016313 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
57.79 02.79
Interval[0]: 5.0
Test GARP Master Delay
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 18:59:12.464644210 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 18:59:12.560614777 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-03-05 18:59:12.684624401 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2026-03-05 18:59:13.060680683 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-03-05 18:59:13.476676486 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-03-05 18:59:13.523260557 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 18:59:13.619236890 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-03-05 18:59:13.871245697 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-03-05 18:59:14.084801416 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-03-05 18:59:14.096722643 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-03-05 18:59:14.284697033 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-03-05 18:59:14.295274110 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-03-05 18:59:14.391305439 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 14 2026-03-05 18:59:14.628729677 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2026-03-05 18:59:15.415391861 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 18:59:15.427313149 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 18:59:15.651333995 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-03-05 18:59:15.769606482 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-03-05 18:59:15.769653921 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-03-05 18:59:15.769666617 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 18:59:15.769671213 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 18:59:15.769687241 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 18:59:15.769693018 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 18:59:15.831351125 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2026-03-05 18:59:19.379488633 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 18:59:19.379536752 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-03-05 18:59:19.379547373 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-03-05 18:59:19.379555065 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 18:59:19.379560073 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-03-05 18:59:19.379565201 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-03-05 18:59:20.379735237 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-03-05 18:59:21.379730390 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2026-03-05 18:59:21.379770024 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-03-05 18:59:21.379776768 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-03-05 18:59:21.379781190 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-03-05 18:59:21.379796590 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-03-05 18:59:21.379802224 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-03-05 18:59:22.379926937 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2026-03-05 18:59:23.380035520 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2026-03-05 18:59:24.380164357 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-03-05 18:59:25.380280802 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-03-05 18:59:26.380401916 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
19.37 19.37 19.37 19.37 19.37 21.37 21.37 21.37 21.37 21.37
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Delay Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-delay 2
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 18:59:34.453731851 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 18:59:34.557602579 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-03-05 18:59:34.653647067 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2026-03-05 18:59:34.725632656 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-03-05 18:59:35.269655506 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-03-05 18:59:35.324210631 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 18:59:35.420245358 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-03-05 18:59:35.544252710 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-03-05 18:59:35.608265612 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-03-05 18:59:35.749835795 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-03-05 18:59:35.761697900 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-03-05 18:59:35.765710305 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-03-05 18:59:35.853711789 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-03-05 18:59:36.152274641 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 15 2026-03-05 18:59:37.176401903 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 18:59:37.188293797 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 18:59:37.320325879 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-03-05 18:59:37.763512156 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-03-05 18:59:37.763558000 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-03-05 18:59:37.763570553 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 18:59:37.763576394 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 18:59:37.763592559 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 18:59:37.763598456 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 18:59:37.816363699 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2026-03-05 18:59:41.373364072 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 18:59:41.373403650 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-03-05 18:59:41.373416810 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-03-05 18:59:41.373421894 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 18:59:41.373427404 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-03-05 18:59:41.373485952 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-03-05 18:59:42.373653556 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-03-05 18:59:43.373665814 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2026-03-05 18:59:43.373701783 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-03-05 18:59:43.373707931 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-03-05 18:59:43.373713580 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-03-05 18:59:43.373730454 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-03-05 18:59:43.373736269 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-03-05 18:59:44.373851952 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2026-03-05 18:59:45.373965692 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2026-03-05 18:59:46.374072445 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-03-05 18:59:47.374178611 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-03-05 18:59:48.374292578 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
41.37 41.37 41.37 41.37 41.37 43.37 43.37 43.37 43.37 43.37
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 18:59:56.182650168 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 18:59:56.294591413 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-03-05 18:59:56.306588901 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-03-05 18:59:56.678684577 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-03-05 18:59:57.190646944 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-03-05 18:59:57.193196488 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 18:59:57.285195192 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-03-05 18:59:57.309207073 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-03-05 18:59:57.702769519 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-03-05 18:59:57.714631115 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-03-05 18:59:58.009257796 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 12 2026-03-05 18:59:58.137260637 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2026-03-05 18:59:58.342691345 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-03-05 18:59:58.662729802 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-03-05 18:59:59.033356059 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 18:59:59.045254148 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 18:59:59.385296565 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-03-05 18:59:59.501323901 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-03-05 18:59:59.501364514 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-03-05 18:59:59.501374741 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 18:59:59.501378571 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 18:59:59.501389438 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 18:59:59.501393878 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 18:59:59.609317395 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2026-03-05 19:00:03.111166876 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 19:00:03.111204189 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-03-05 19:00:03.111213082 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-03-05 19:00:03.111230587 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 19:00:04.111351251 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-03-05 19:00:05.111473853 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-03-05 19:00:06.111579216 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-03-05 19:00:07.111681273 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-03-05 19:00:08.111553630 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-03-05 19:00:08.111587688 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-03-05 19:00:08.111607920 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-03-05 19:00:08.111731183 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2026-03-05 19:00:09.111875857 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-03-05 19:00:10.112021596 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 19:00:18.231572593 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 19:00:18.331592647 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-03-05 19:00:18.631615342 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-03-05 19:00:18.791601872 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-03-05 19:00:19.047658653 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2026-03-05 19:00:19.198187726 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 19:00:19.334186216 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-03-05 19:00:19.582204704 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-03-05 19:00:19.642215285 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-03-05 19:00:20.058230622 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2026-03-05 19:00:20.071695682 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-03-05 19:00:20.083621136 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2026-03-05 19:00:20.195670742 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-03-05 19:00:20.999696994 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-03-05 19:00:21.082314766 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 19:00:21.094241104 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 19:00:21.541529390 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2026-03-05 19:00:21.541562200 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2026-03-05 19:00:21.541572903 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-03-05 19:00:21.541576563 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 19:00:21.541591921 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 19:00:21.541596188 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 19:00:21.850299526 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 24 2026-03-05 19:00:21.850399588 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2026-03-05 19:00:25.151352123 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 19:00:25.151393492 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-03-05 19:00:25.151405188 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-03-05 19:00:25.151424828 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 19:00:26.151528888 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-03-05 19:00:27.151640369 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-03-05 19:00:28.151740205 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-03-05 19:00:29.151923453 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-03-05 19:00:30.151700978 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-03-05 19:00:30.151730202 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-03-05 19:00:30.151744476 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-03-05 19:00:30.151940989 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2026-03-05 19:00:31.152105587 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-03-05 19:00:32.152277709 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Refresh
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 19:00:40.228566318 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 19:00:40.328539507 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-03-05 19:00:40.424555303 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-03-05 19:00:40.584589328 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-03-05 19:00:40.584649689 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2026-03-05 19:00:41.195217213 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 19:00:41.299347680 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-03-05 19:00:41.339189190 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-03-05 19:00:41.431184531 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 10 2026-03-05 19:00:41.608727005 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-03-05 19:00:41.620584586 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-03-05 19:00:41.684632532 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-03-05 19:00:41.915217318 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 14 2026-03-05 19:00:41.992637729 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2026-03-05 19:00:42.459279782 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 19:00:42.471204297 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 19:00:42.523247383 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-03-05 19:00:42.747259501 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2026-03-05 19:00:43.537607163 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-03-05 19:00:43.537783714 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 19:00:43.537803140 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 19:00:43.537807446 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 19:00:43.537812231 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 19:00:43.537824297 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-03-05 19:00:47.147464251 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 19:00:47.147508665 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-03-05 19:00:47.147520839 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-03-05 19:00:47.147524593 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 19:00:47.147546642 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-03-05 19:00:47.147550419 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-03-05 19:00:48.147637907 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-03-05 19:00:49.147748588 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-03-05 19:00:50.147857142 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-03-05 19:00:51.147976422 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-03-05 19:00:52.147839953 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-03-05 19:00:52.147877374 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-03-05 19:00:52.147886787 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-03-05 19:00:52.147891197 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-03-05 19:00:52.147906111 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-03-05 19:00:52.148018819 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-03-05 19:00:52.148033581 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2026-03-05 19:00:53.148157650 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2026-03-05 19:00:54.148284078 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2026-03-05 19:00:55.148401463 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-03-05 19:00:56.148530247 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-03-05 19:00:57.148640903 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-03-05 19:00:57.148695935 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 48 2026-03-05 19:00:58.148768567 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-03-05 19:00:59.148888311 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-03-05 19:01:00.149003375 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2026-03-05 19:01:01.149130224 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2026-03-05 19:01:02.149234563 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-03-05 19:01:02.149286255 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 54 2026-03-05 19:01:03.149349325 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-03-05 19:01:04.149460005 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
52.14 57.14 02.14
Interval[0]: 5.0
Interval[1]: 5.0
Test GARP Master Refresh Global
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 19:01:12.445963875 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 19:01:12.513986919 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 3 2026-03-05 19:01:12.541960160 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-03-05 19:01:12.789982761 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-03-05 19:01:12.938011806 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-03-05 19:01:13.364632417 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 19:01:13.460589389 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-03-05 19:01:13.546107343 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-03-05 19:01:13.558048683 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2026-03-05 19:01:13.586034326 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-03-05 19:01:13.852594428 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 12 2026-03-05 19:01:13.898022815 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-03-05 19:01:13.948610056 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 14 2026-03-05 19:01:14.012621578 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-03-05 19:01:14.972703142 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 19:01:14.984606026 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 19:01:15.676688319 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-03-05 19:01:15.750760125 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-03-05 19:01:15.750800769 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-03-05 19:01:15.750811585 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 19:01:15.750816169 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 19:01:15.750831428 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 19:01:15.750836705 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 19:01:15.836700324 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2026-03-05 19:01:19.360643572 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 19:01:19.360673055 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-03-05 19:01:19.360680980 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-03-05 19:01:19.360684318 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 19:01:19.360700270 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-03-05 19:01:19.360704537 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-03-05 19:01:20.360833451 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-03-05 19:01:21.361050133 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-03-05 19:01:22.361121529 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-03-05 19:01:23.361246993 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-03-05 19:01:24.360942644 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-03-05 19:01:24.360970344 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-03-05 19:01:24.360975117 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-03-05 19:01:24.360980428 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-03-05 19:01:24.360993644 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-03-05 19:01:24.361280212 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-03-05 19:01:24.361292373 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2026-03-05 19:01:25.361435452 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2026-03-05 19:01:26.361570532 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2026-03-05 19:01:27.361659024 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-03-05 19:01:28.361785594 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-03-05 19:01:29.361894303 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-03-05 19:01:29.361942963 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 48 2026-03-05 19:01:30.361996917 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-03-05 19:01:31.362209943 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-03-05 19:01:32.362294935 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2026-03-05 19:01:33.362390435 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2026-03-05 19:01:34.362499969 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-03-05 19:01:34.362548582 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 54 2026-03-05 19:01:35.362610891 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-03-05 19:01:36.362718069 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
24.36 29.36 34.36
Interval[0]: 5.0
Interval[1]: 5.0
Test GARP Master Refresh Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 19:01:44.707415635 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 19:01:44.827381642 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-03-05 19:01:44.847400243 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2026-03-05 19:01:45.099411506 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-03-05 19:01:45.419425973 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2026-03-05 19:01:45.694169120 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 19:01:45.789998113 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-03-05 19:01:46.078013046 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-03-05 19:01:46.110011151 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2026-03-05 19:01:46.443679869 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-03-05 19:01:46.455462112 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-03-05 19:01:46.590035061 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2026-03-05 19:01:46.923483498 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-03-05 19:01:47.403505337 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-03-05 19:01:47.614116763 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 19:01:47.626050761 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 19:01:47.810085620 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-03-05 19:01:48.037508828 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-03-05 19:01:48.037555474 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-03-05 19:01:48.037569248 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 19:01:48.037573469 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 19:01:48.037577749 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 19:01:48.037582285 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 19:01:48.542121490 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2026-03-05 19:01:51.647339805 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 19:01:51.647380132 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-03-05 19:01:51.647391826 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-03-05 19:01:51.647395533 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 19:01:51.647411037 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-03-05 19:01:51.647414844 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-03-05 19:01:52.647513098 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-03-05 19:01:53.647620327 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-03-05 19:01:54.647788146 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-03-05 19:01:55.647881803 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-03-05 19:01:56.647665085 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-03-05 19:01:56.647687939 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-03-05 19:01:56.647692133 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-03-05 19:01:56.647695209 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-03-05 19:01:56.647709617 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-03-05 19:01:56.647917065 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-03-05 19:01:56.647925407 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2026-03-05 19:01:56.647927905 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2026-03-05 19:01:56.647931823 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2026-03-05 19:01:57.648065383 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-03-05 19:01:58.648182044 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-03-05 19:01:59.648287731 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-03-05 19:02:00.648400363 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2026-03-05 19:02:01.648498798 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-03-05 19:02:01.648527802 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 50 2026-03-05 19:02:01.648535127 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2026-03-05 19:02:01.648551306 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2026-03-05 19:02:02.648612032 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-03-05 19:02:03.648716667 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2026-03-05 19:02:04.648834753 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-03-05 19:02:05.648938416 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2026-03-05 19:02:06.649072906 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2026-03-05 19:02:06.649111254 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 58 2026-03-05 19:02:06.649119139 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2026-03-05 19:02:06.649135101 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2026-03-05 19:02:07.649176880 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 61 2026-03-05 19:02:08.649322830 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3
Test GARP Master Refresh Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5 set system vrrp global-parameters garp master-refresh-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-03-05 19:02:16.712755482 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-03-05 19:02:16.808754086 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-03-05 19:02:16.892785210 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2026-03-05 19:02:17.100769404 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-03-05 19:02:17.388854679 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 6 2026-03-05 19:02:17.747375728 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-03-05 19:02:17.859372462 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-03-05 19:02:17.863370016 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 9 2026-03-05 19:02:17.900944977 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-03-05 19:02:17.912810677 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-03-05 19:02:18.284830257 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-03-05 19:02:18.367401770 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-03-05 19:02:18.476857263 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-03-05 19:02:18.623425451 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 15 2026-03-05 19:02:18.879471137 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-03-05 19:02:18.891405144 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-03-05 19:02:19.455458516 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-03-05 19:02:19.839468121 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-03-05 19:02:20.017602329 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-03-05 19:02:20.017636886 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-03-05 19:02:20.017645146 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-03-05 19:02:20.017649121 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-03-05 19:02:20.017665541 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-03-05 19:02:20.017672811 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-03-05 19:02:21.017780361 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-03-05 19:02:24.627591735 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2026-03-05 19:02:24.627634208 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-03-05 19:02:24.627645583 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-03-05 19:02:24.627649136 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-03-05 19:02:24.627652130 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-03-05 19:02:24.627668384 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-03-05 19:02:25.627821459 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-03-05 19:02:26.627919034 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-03-05 19:02:27.628027576 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-03-05 19:02:28.628151645 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2026-03-05 19:02:29.627986632 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-03-05 19:02:29.628019097 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-03-05 19:02:29.628025064 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-03-05 19:02:29.628030260 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-03-05 19:02:29.628047321 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 41 2026-03-05 19:02:29.628216836 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-03-05 19:02:29.628234213 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2026-03-05 19:02:29.628239511 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2026-03-05 19:02:29.628247889 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 45 2026-03-05 19:02:30.628351760 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-03-05 19:02:31.628450622 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-03-05 19:02:32.628556943 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2026-03-05 19:02:33.628660700 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-03-05 19:02:34.628792316 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-03-05 19:02:34.628826605 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2026-03-05 19:02:34.628838665 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2026-03-05 19:02:34.628852770 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 53 2026-03-05 19:02:35.628921636 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2026-03-05 19:02:36.629037866 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-03-05 19:02:37.629148929 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2026-03-05 19:02:38.629246417 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2026-03-05 19:02:39.629361209 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 58 2026-03-05 19:02:39.629391739 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2026-03-05 19:02:39.629399968 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2026-03-05 19:02:39.629412902 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 61 2026-03-05 19:02:40.629471954 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3