Vrrp
Examples for High Availability (VRRP)
VRRP With MD5 Authentication
Description
This scenario checks that two OSDx devices can use VRRP with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+nECTrtIvFcOxqKa/5S1wGJh/uwuEx5TU= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+HcYlsjCImvePTiAGmU5ihJ+3G+emryCM= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
MD5Show output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:00 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: MD5 Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+nECTrtIvFcOxqKa/5S1wGJh/uwuEx5TU= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5 set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
VRRP With Plaintext Password Authentication
Description
This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/h14NkWNOJ1OwOVkNHxgurxv00qEm7tc4= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19902nCxtyQjnehY+gORTUrfpYCV0WHffY= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
SIMPLE_PASSWORDShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:01 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: SIMPLE_PASSWORD Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/h14NkWNOJ1OwOVkNHxgurxv00qEm7tc4= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP With AH Authentication
Description
This scenario checks that two OSDx devices can use VRRP with AH authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19hVza/nL70wl3ushX5oR0+2Q/rYv4DDRQ= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18FbeSbpiubQfMpjFWV6nzkWwRNSCoPkDU= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 none
Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: MASTER Last Transition: 0:00:03 Priority: 200 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:
IPSEC_AHShow output
Interface: eth0 Group: 1 State: BACKUP Last Transition: 0:00:01 Master router: ff02::12 Master priority: 0 Priority: 100 Advertisement interval: 1 sec Authentication type: IPSEC_AH Preempt: disabled Sync-group: none VIP count: 1 192.168.10.1
Step 7: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19hVza/nL70wl3ushX5oR0+2Q/rYv4DDRQ= set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah set interfaces ethernet eth0 vrrp vrrp-group 1 disable set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 none
Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
VRRP RFC3768 Compatibility Configuration
Description
Check that a virtual interface is being created when this option is configured.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:
eth0v1\s*192.168.10.1/32Show output
------------------------------------------------------------------- Name IP Address Admin Oper Vrf Description ------------------------------------------------------------------- eth0 192.168.100.100/24 up up fe80::dcad:beff:feef:6c00/64 eth0v1 192.168.10.1/32 up up eth1 down down eth2 down down eth3 down down
Two VRRP Devices In Same Sync Group
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:01 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Two VRRP Devices In Same Sync Group With MD5 Authentication
Description
Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX19pFiwszhvmaM4u/10E4fWadSRpkQHADFM= set system vrrp sync-group MAIN0 authentication type md5
Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 MAIN0
Step 3: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX199m2CYx7WVFQl5oZIp4wMZsXmxSKeKOUI= set system vrrp sync-group MAIN1 authentication type md5
Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:
BACKUPShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:00 MAIN1
Step 5: Modify the following configuration lines in DUT0 :
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:
BACKUPShow output
Group: MAIN0 State: BACKUP Monitoring: Interface: eth0, Group: 1
Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:
MASTERShow output
Group: MAIN1 State: MASTER Monitoring: Interface: eth0, Group: 1
Test GARP Interval
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:05 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:50:35.795271122 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:50:35.895288858 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-05-04 18:50:36.351300871 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-05-04 18:50:36.607315218 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-05-04 18:50:36.634144159 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2026-05-04 18:50:36.726123840 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 7 2026-05-04 18:50:36.799318396 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 8 2026-05-04 18:50:37.010145990 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-05-04 18:50:37.266149292 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-05-04 18:50:37.490165911 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2026-05-04 18:50:37.631449125 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-05-04 18:50:37.643306516 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2026-05-04 18:50:37.851363387 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-05-04 18:50:38.367348493 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-05-04 18:50:38.514276813 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-05-04 18:50:38.526181408 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-05-04 18:50:38.654225294 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-05-04 18:50:39.105274569 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-05-04 18:50:39.105326086 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-05-04 18:50:39.105336255 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:50:39.105340451 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:50:39.105345536 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:50:39.105351165 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:50:39.410270920 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2026-05-04 18:50:40.105495463 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:50:41.105621434 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2026-05-04 18:50:44.715427301 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2026-05-04 18:50:44.715464459 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:50:45.715672508 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-05-04 18:50:46.715769597 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-05-04 18:50:47.715962651 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-05-04 18:50:48.715982299 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-05-04 18:50:49.715723421 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-05-04 18:50:49.716032224 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-05-04 18:50:50.716163508 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2026-05-04 18:50:51.716263368 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
44.71 49.71
Interval[0]: 5.0
Test GARP Interval Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp interval 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:50:59.476176796 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:50:59.560390331 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 3 2026-05-04 18:50:59.568094567 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-05-04 18:50:59.704116344 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-05-04 18:50:59.968160688 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-05-04 18:51:00.362975758 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-05-04 18:51:00.462974499 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-05-04 18:51:00.474980132 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-05-04 18:51:00.576278813 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-05-04 18:51:00.592130444 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-05-04 18:51:00.787012360 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-05-04 18:51:00.928176621 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2026-05-04 18:51:01.043012051 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 14 2026-05-04 18:51:01.344195270 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-05-04 18:51:02.067124512 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-05-04 18:51:02.079061690 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-05-04 18:51:02.115095567 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-05-04 18:51:02.777562749 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-05-04 18:51:02.777646647 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-05-04 18:51:02.777656542 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:51:02.777660240 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:51:02.777664868 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:51:02.777669879 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:51:02.835109123 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2026-05-04 18:51:06.387364346 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:51:06.387408089 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-05-04 18:51:07.387563743 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2026-05-04 18:51:08.387670301 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 29 2026-05-04 18:51:09.387761977 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-05-04 18:51:10.387874091 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-05-04 18:51:11.387673057 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-05-04 18:51:11.387920202 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-05-04 18:51:12.388037331 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-05-04 18:51:13.388260078 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
06.38 11.38
Interval[0]: 5.000000000000001
Test GARP Master Delay
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:51:21.700922007 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:51:21.812909092 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-05-04 18:51:22.272935596 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2026-05-04 18:51:22.368957996 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 5 2026-05-04 18:51:22.528955665 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-05-04 18:51:22.639781872 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-05-04 18:51:22.695801417 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 8 2026-05-04 18:51:22.747782641 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-05-04 18:51:22.783805797 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-05-04 18:51:23.393079463 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-05-04 18:51:23.404969464 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-05-04 18:51:23.475815525 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2026-05-04 18:51:23.480967123 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-05-04 18:51:23.699888107 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-05-04 18:51:23.711790904 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 16 2026-05-04 18:51:24.051819115 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 17 2026-05-04 18:51:24.161030743 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-05-04 18:51:24.595848332 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2026-05-04 18:51:25.023545962 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-05-04 18:51:25.023578253 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:51:25.023584708 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:51:25.023588195 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:51:25.023591671 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:51:25.023622751 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-05-04 18:51:28.633345392 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:51:28.633381498 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-05-04 18:51:28.633389568 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-05-04 18:51:28.633392720 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:51:28.633411234 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-05-04 18:51:28.633414328 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-05-04 18:51:29.633578232 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-05-04 18:51:30.633535497 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2026-05-04 18:51:30.633554625 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-05-04 18:51:30.633557999 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-05-04 18:51:30.633561567 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-05-04 18:51:30.633573673 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-05-04 18:51:30.633577425 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-05-04 18:51:31.633723804 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 39 2026-05-04 18:51:32.633815392 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2026-05-04 18:51:33.633912016 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-05-04 18:51:34.634034557 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-05-04 18:51:35.634127947 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
28.63 28.63 28.63 28.63 28.63 30.63 30.63 30.63 30.63 30.63
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Delay Global
Description
This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-delay 2
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:02 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:05 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:51:43.813742004 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:51:43.913713634 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 3 2026-05-04 18:51:43.921733275 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-05-04 18:51:44.061736680 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-05-04 18:51:44.193731420 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-05-04 18:51:44.664566295 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-05-04 18:51:44.760569662 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-05-04 18:51:44.929849740 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-05-04 18:51:44.941763588 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2026-05-04 18:51:45.268600118 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-05-04 18:51:45.281765352 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-05-04 18:51:45.332615875 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2026-05-04 18:51:45.633783549 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-05-04 18:51:45.716622999 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 15 2026-05-04 18:51:46.356672876 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-05-04 18:51:46.368657307 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-05-04 18:51:46.676670743 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-05-04 18:51:46.932659605 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-05-04 18:51:47.131796904 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-05-04 18:51:47.131826209 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:51:47.131832785 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:51:47.131836269 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:51:47.131852054 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:51:47.131855744 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-05-04 18:51:48.131996170 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:51:49.132111523 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2026-05-04 18:51:52.741946229 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 28 2026-05-04 18:51:52.741988537 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:51:52.741999027 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-05-04 18:51:52.742003264 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-05-04 18:51:52.742025164 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-05-04 18:51:52.742034657 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 33 2026-05-04 18:51:53.742171493 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-05-04 18:51:54.742136840 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-05-04 18:51:54.742163375 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-05-04 18:51:54.742167492 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-05-04 18:51:54.742171089 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-05-04 18:51:54.742187884 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-05-04 18:51:54.742218308 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 40 2026-05-04 18:51:55.742411030 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-05-04 18:51:56.742438291 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-05-04 18:51:57.742543159 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2026-05-04 18:51:58.742676733 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2026-05-04 18:51:59.742780165 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
GARP timestamps (in seconds with two decimals):
Show output
52.74 52.74 52.74 52.74 52.74 54.74 54.74 54.74 54.74 54.74
Note
The packages, by default, are sent in groups of five after transitioning to master
Master delay: 2.0
Test GARP Master Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:52:07.870561273 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:52:07.982565771 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-05-04 18:52:08.354596564 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-05-04 18:52:08.418588497 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-05-04 18:52:08.833476944 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2026-05-04 18:52:08.834609301 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 7 2026-05-04 18:52:08.921443417 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-05-04 18:52:09.081466967 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-05-04 18:52:09.109489393 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 10 2026-05-04 18:52:09.493466015 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 11 2026-05-04 18:52:09.858674523 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-05-04 18:52:09.870599705 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2026-05-04 18:52:10.133603474 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-05-04 18:52:10.145489967 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2026-05-04 18:52:10.338677672 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-05-04 18:52:10.421508257 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 17 2026-05-04 18:52:10.786669781 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-05-04 18:52:10.837530079 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2026-05-04 18:52:11.193234234 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-05-04 18:52:11.193259779 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:52:11.193268477 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:52:11.193271359 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:52:11.193287772 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:52:11.193290405 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-05-04 18:52:14.803005047 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:52:14.803041718 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-05-04 18:52:14.803051095 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-05-04 18:52:14.803056865 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:52:15.803217193 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-05-04 18:52:16.803311918 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-05-04 18:52:17.803407398 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-05-04 18:52:18.803505576 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-05-04 18:52:19.803314148 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-05-04 18:52:19.803339537 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-05-04 18:52:19.803355225 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-05-04 18:52:19.803542482 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2026-05-04 18:52:20.803671952 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-05-04 18:52:21.803782582 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:02 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:52:29.671351853 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:52:29.763347468 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-05-04 18:52:30.307384338 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 4 2026-05-04 18:52:30.582203116 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 5 2026-05-04 18:52:30.627389723 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-05-04 18:52:30.659379249 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 7 2026-05-04 18:52:30.706193769 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-05-04 18:52:30.706232538 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 9 2026-05-04 18:52:30.922236959 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2026-05-04 18:52:31.126256811 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-05-04 18:52:31.683808644 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-05-04 18:52:31.695431133 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2026-05-04 18:52:31.734368786 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-05-04 18:52:31.746240493 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 15 2026-05-04 18:52:31.859465803 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 16 2026-05-04 18:52:32.118276349 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 17 2026-05-04 18:52:32.374291888 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-05-04 18:52:32.707474105 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-05-04 18:52:32.972319784 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-05-04 18:52:32.972367031 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:52:32.972376767 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:52:32.972381013 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:52:32.972394146 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:52:32.972399447 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-05-04 18:52:36.582148297 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:52:36.582184352 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-05-04 18:52:36.582193986 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-05-04 18:52:36.582211240 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:52:37.582335791 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 30 2026-05-04 18:52:38.582437516 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 31 2026-05-04 18:52:39.582547954 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-05-04 18:52:40.582642303 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-05-04 18:52:41.582464769 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 34 2026-05-04 18:52:41.582487834 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 35 2026-05-04 18:52:41.582504064 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-05-04 18:52:41.582672801 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 37 2026-05-04 18:52:42.582814490 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 38 2026-05-04 18:52:43.582909546 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Number of packets sent at a time: 3
Test GARP Master Refresh
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:02 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:52:52.092214590 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:52:52.220164060 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-05-04 18:52:52.836205510 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-05-04 18:52:52.836242267 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-05-04 18:52:53.028208771 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2026-05-04 18:52:53.279025901 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-05-04 18:52:53.401669343 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 8 2026-05-04 18:52:53.411039582 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 9 2026-05-04 18:52:53.847149871 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 10 2026-05-04 18:52:54.052406847 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-05-04 18:52:54.064230676 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-05-04 18:52:54.359092717 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 13 2026-05-04 18:52:54.500260825 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 14 2026-05-04 18:52:54.660277740 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-05-04 18:52:54.871147865 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-05-04 18:52:54.883083858 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-05-04 18:52:55.429085821 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 18 2026-05-04 18:52:55.429325288 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 19 2026-05-04 18:52:55.429339203 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-05-04 18:52:55.429343098 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:52:55.429346649 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:52:55.429352310 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:52:55.479138812 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 24 2026-05-04 18:52:55.703151582 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 25 2026-05-04 18:52:56.429501749 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:53:00.039335928 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2026-05-04 18:53:00.039416653 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-05-04 18:53:00.039428762 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:53:00.039431752 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-05-04 18:53:00.039434697 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-05-04 18:53:00.039439403 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-05-04 18:53:01.039589299 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-05-04 18:53:02.039703513 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-05-04 18:53:03.039820649 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-05-04 18:53:04.039919857 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2026-05-04 18:53:05.039686227 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-05-04 18:53:05.039716332 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-05-04 18:53:05.039719588 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-05-04 18:53:05.039721955 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-05-04 18:53:05.039736813 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 41 2026-05-04 18:53:05.039983470 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-05-04 18:53:05.039996934 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2026-05-04 18:53:06.040107385 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2026-05-04 18:53:07.040224986 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-05-04 18:53:08.040335401 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-05-04 18:53:09.040452289 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-05-04 18:53:10.040664406 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2026-05-04 18:53:10.040747492 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 49 2026-05-04 18:53:11.040713332 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-05-04 18:53:12.040828189 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2026-05-04 18:53:13.040953408 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2026-05-04 18:53:14.041074865 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-05-04 18:53:15.041166247 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2026-05-04 18:53:15.041213575 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 55 2026-05-04 18:53:16.041280387 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2026-05-04 18:53:17.041355630 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
05.03 10.04 15.04
Interval[0]: 5.009999999999999
Interval[1]: 5.0
Test GARP Master Refresh Global
Description
This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:53:29.621494566 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:53:29.717517187 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-05-04 18:53:29.925528121 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2026-05-04 18:53:30.149550923 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-05-04 18:53:30.596627518 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 6 2026-05-04 18:53:30.597545080 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 7 2026-05-04 18:53:30.706385182 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-05-04 18:53:30.949690355 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-05-04 18:53:30.961567350 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 10 2026-05-04 18:53:31.033570738 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 11 2026-05-04 18:53:31.213586142 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 12 2026-05-04 18:53:31.416424850 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 13 2026-05-04 18:53:31.416465890 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-05-04 18:53:31.544408806 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 15 2026-05-04 18:53:32.440534142 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-05-04 18:53:32.452431397 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-05-04 18:53:32.468460596 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-05-04 18:53:32.680450421 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 19 2026-05-04 18:53:32.926365516 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-05-04 18:53:32.926398911 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:53:32.926408133 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:53:32.926411038 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:53:32.926413803 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:53:32.926426381 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-05-04 18:53:36.536205235 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:53:36.536241674 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-05-04 18:53:36.536252427 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-05-04 18:53:36.536256038 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:53:36.536273756 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-05-04 18:53:36.536277485 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-05-04 18:53:37.536377357 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-05-04 18:53:38.536480038 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-05-04 18:53:39.536581529 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-05-04 18:53:40.536681938 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-05-04 18:53:41.536515943 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-05-04 18:53:41.536542154 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-05-04 18:53:41.536545676 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-05-04 18:53:41.536548931 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-05-04 18:53:41.536563129 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-05-04 18:53:41.536730311 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-05-04 18:53:41.536749198 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2026-05-04 18:53:42.536855597 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 43 2026-05-04 18:53:43.536960006 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 44 2026-05-04 18:53:44.537070409 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-05-04 18:53:45.537200171 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-05-04 18:53:46.537275028 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-05-04 18:53:46.537310316 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 48 2026-05-04 18:53:47.537407892 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-05-04 18:53:48.537508081 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-05-04 18:53:49.537606561 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 51 2026-05-04 18:53:50.537716245 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 52 2026-05-04 18:53:51.537845474 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-05-04 18:53:51.537892118 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 54 2026-05-04 18:53:52.537951543 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-05-04 18:53:53.538045173 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Note
GARP timestamps (in seconds with two decimals):
Show output
41.53 46.53 51.53
Interval[0]: 5.0
Interval[1]: 5.0
Test GARP Master Refresh Repeat
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5 set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:00 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:54:01.610641345 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:54:01.702648901 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 3 2026-05-04 18:54:01.958670149 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 4 2026-05-04 18:54:02.470699918 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 5 2026-05-04 18:54:02.502707267 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 6 2026-05-04 18:54:02.605547395 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-05-04 18:54:02.709526304 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 8 2026-05-04 18:54:02.765530040 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 9 2026-05-04 18:54:02.982834661 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 10 2026-05-04 18:54:02.994676588 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 11 2026-05-04 18:54:03.202709084 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-05-04 18:54:03.609567019 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 13 2026-05-04 18:54:03.609620781 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 14 2026-05-04 18:54:03.769609325 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 15 2026-05-04 18:54:03.781519872 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 16 2026-05-04 18:54:03.814725954 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-05-04 18:54:03.877581618 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 18 2026-05-04 18:54:04.017596437 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 19 2026-05-04 18:54:04.913498268 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 20 2026-05-04 18:54:04.913533048 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:54:04.913541480 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:54:04.913544800 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:54:04.913548172 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:54:04.913551704 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 25 2026-05-04 18:54:08.523274811 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:54:08.523313334 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 27 2026-05-04 18:54:08.523323240 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-05-04 18:54:08.523326114 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:54:08.523329122 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-05-04 18:54:08.523333324 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-05-04 18:54:09.523505002 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 32 2026-05-04 18:54:10.523615648 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-05-04 18:54:11.523709049 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-05-04 18:54:12.523796599 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-05-04 18:54:13.523641765 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 36 2026-05-04 18:54:13.523665199 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-05-04 18:54:13.523667732 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-05-04 18:54:13.523669747 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-05-04 18:54:13.523682925 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-05-04 18:54:13.523856366 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 41 2026-05-04 18:54:13.523871443 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 42 2026-05-04 18:54:13.523877654 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2026-05-04 18:54:13.523883561 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2026-05-04 18:54:14.523974953 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 45 2026-05-04 18:54:15.524084835 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-05-04 18:54:16.524201917 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-05-04 18:54:17.524270286 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2026-05-04 18:54:18.524381021 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-05-04 18:54:18.524405647 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 50 2026-05-04 18:54:18.524412584 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2026-05-04 18:54:18.524423359 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2026-05-04 18:54:19.524540306 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 53 2026-05-04 18:54:20.524591915 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2026-05-04 18:54:21.524712491 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-05-04 18:54:22.524825346 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2026-05-04 18:54:23.524937711 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2026-05-04 18:54:23.524964615 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 58 2026-05-04 18:54:23.524977685 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2026-05-04 18:54:23.524990836 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2026-05-04 18:54:24.525039432 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 61 2026-05-04 18:54:25.525163115 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3
Test GARP Master Refresh Repeat Global
Description
This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.
Scenario
Step 1: Set the following configuration in DUT1 :
set interfaces ethernet eth0 address 192.168.100.101/24 set interfaces ethernet eth0 vrrp vrrp-group 1 preempt set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 192.168.100.100/24 set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100 set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1 set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0' set system vrrp global-parameters garp master-refresh 5 set system vrrp global-parameters garp master-refresh-repeat 3
Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 MASTER yes no 0:00:01 none
Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:
MASTERShow output
-------------------------------------------------------------------------------- Interface Group State RFC Compliant Addr Owner Last Transition Sync Group -------------------------------------------------------------------------------- eth0 1 BACKUP yes no 0:00:03 none
Note
In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).
Step 5: Modify the following configuration lines in DUT1 :
set interfaces ethernet eth0 disable
Note
Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).
Step 6: Get the MAC address of the eth0 interface:
admin@DUT0$ interfaces ethernet eth0 show detailedShow output
---------------------------------------------------------------------------------------------------------------- Name Idx IP Address Admin Oper Link MTU Vrf Upper Lower Type Phys addr ---------------------------------------------------------------------------------------------------------------- eth0 2 192.168.100.100/24 up up up 1500 ethernet de:ad:be:ef:6c:00 192.168.10.1/32 fe80::dcad:beff:feef:6c00/64
Note
Packets sent between DUT0 and DUT1:
Show output
1 2026-05-04 18:54:34.295838129 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 2 2026-05-04 18:54:34.447821323 :: → ff02::16 ICMPv6 130 Multicast Listener Report Message v2 3 2026-05-04 18:54:34.483824943 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 4 2026-05-04 18:54:34.515824793 192.168.100.101 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 5 2026-05-04 18:54:35.271895255 :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10 6 2026-05-04 18:54:36.295929491 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 7 2026-05-04 18:54:36.307903180 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 8 2026-05-04 18:54:36.314722041 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 9 2026-05-04 18:54:36.426741220 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 10 2026-05-04 18:54:36.435662846 :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00 11 2026-05-04 18:54:36.515898330 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 12 2026-05-04 18:54:36.807918746 fe80::dcad:beff:feef:6c10 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 13 2026-05-04 18:54:36.890750274 :: → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 14 2026-05-04 18:54:37.146750979 192.168.100.100 → 224.0.0.22 IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources 15 2026-05-04 18:54:37.466820984 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 16 2026-05-04 18:54:37.478733546 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 17 2026-05-04 18:54:37.686770937 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 90 Multicast Listener Report Message v2 18 2026-05-04 18:54:37.693079838 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 19 2026-05-04 18:54:37.693167534 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 20 2026-05-04 18:54:37.693177163 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 21 2026-05-04 18:54:37.693181545 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 22 2026-05-04 18:54:37.693184776 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 23 2026-05-04 18:54:37.693189412 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) 24 2026-05-04 18:54:37.786783044 fe80::dcad:beff:feef:6c00 → ff02::16 ICMPv6 150 Multicast Listener Report Message v2 25 2026-05-04 18:54:38.693310772 192.168.100.101 → 224.0.0.18 VRRP 54 Announcement (v2) 26 2026-05-04 18:54:42.303052003 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 27 2026-05-04 18:54:42.303079217 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 28 2026-05-04 18:54:42.303085984 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 29 2026-05-04 18:54:42.303088370 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 30 2026-05-04 18:54:42.303102803 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 31 2026-05-04 18:54:42.303105888 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 32 2026-05-04 18:54:43.303251962 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 33 2026-05-04 18:54:44.303366240 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 34 2026-05-04 18:54:45.303463267 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 35 2026-05-04 18:54:46.303559134 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 36 2026-05-04 18:54:47.303351741 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 37 2026-05-04 18:54:47.303369095 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 38 2026-05-04 18:54:47.303371979 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 39 2026-05-04 18:54:47.303373942 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 40 2026-05-04 18:54:47.303384978 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 41 2026-05-04 18:54:47.303605252 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 42 2026-05-04 18:54:47.303613324 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 43 2026-05-04 18:54:47.303615370 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 44 2026-05-04 18:54:47.303618973 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 45 2026-05-04 18:54:48.303749820 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 46 2026-05-04 18:54:49.303851451 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 47 2026-05-04 18:54:50.303950479 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 48 2026-05-04 18:54:51.304066101 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 49 2026-05-04 18:54:52.304164979 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 50 2026-05-04 18:54:52.304187102 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 51 2026-05-04 18:54:52.304194173 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 52 2026-05-04 18:54:52.304208131 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 53 2026-05-04 18:54:53.304281003 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 54 2026-05-04 18:54:54.304395171 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 55 2026-05-04 18:54:55.304520616 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 56 2026-05-04 18:54:56.304615274 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 57 2026-05-04 18:54:57.304719662 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 58 2026-05-04 18:54:57.304745406 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 59 2026-05-04 18:54:57.304752538 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 60 2026-05-04 18:54:57.304769448 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!) 61 2026-05-04 18:54:58.304827308 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2) 62 2026-05-04 18:54:59.304925137 192.168.100.100 → 224.0.0.18 VRRP 54 Announcement (v2)
Note
Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.
Number of packets sent at a time: 3