Vrrp

Examples for High Availability (VRRP)

VRRP With MD5 Authentication

Description

This scenario checks that two OSDx devices can use VRRP with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+nECTrtIvFcOxqKa/5S1wGJh/uwuEx5TU=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+HcYlsjCImvePTiAGmU5ihJ+3G+emryCM=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

MD5
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:00

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         MD5
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1+nECTrtIvFcOxqKa/5S1wGJh/uwuEx5TU=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type md5
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

VRRP With Plaintext Password Authentication

Description

This scenario checks that two OSDx devices can use VRRP with plaintext-password authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/h14NkWNOJ1OwOVkNHxgurxv00qEm7tc4=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19902nCxtyQjnehY+gORTUrfpYCV0WHffY=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

SIMPLE_PASSWORD
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:01

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         SIMPLE_PASSWORD
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX1/h14NkWNOJ1OwOVkNHxgurxv00qEm7tc4=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type plaintext-password
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

VRRP With AH Authentication

Description

This scenario checks that two OSDx devices can use VRRP with AH authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19hVza/nL70wl3ushX5oR0+2Q/rYv4DDRQ=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX18FbeSbpiubQfMpjFWV6nzkWwRNSCoPkDU=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01         none

Step 5: Run command system vrrp show detail at DUT0 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       MASTER
   Last Transition:             0:00:03

   Priority:                    200
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 6: Run command system vrrp show detail at DUT1 and check if output matches the following regular expressions:

IPSEC_AH
Show output
Interface: eth0
   Group: 1
   State:                       BACKUP
   Last Transition:             0:00:01

   Master router: ff02::12
   Master priority: 0

   Priority:                    100
   Advertisement interval:      1 sec
   Authentication type:         IPSEC_AH
   Preempt:                     disabled

   Sync-group:                  none

   VIP count:                   1
      192.168.10.1

Step 7: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication encrypted-password U2FsdGVkX19hVza/nL70wl3ushX5oR0+2Q/rYv4DDRQ=
set interfaces ethernet eth0 vrrp vrrp-group 1 authentication type ah
set interfaces ethernet eth0 vrrp vrrp-group 1 disable
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 8: Run command system vrrp show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00         none

Step 9: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

VRRP RFC3768 Compatibility Configuration

Description

Check that a virtual interface is being created when this option is configured.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 rfc3768-compatibility
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Run command interfaces show at DUT0 and check if output matches the following regular expressions:

eth0v1\s*192.168.10.1/32
Show output
-------------------------------------------------------------------
 Name            IP Address           Admin  Oper  Vrf  Description
-------------------------------------------------------------------
  eth0  192.168.100.100/24            up     up
        fe80::dcad:beff:feef:6c00/64
eth0v1  192.168.10.1/32               up     up
  eth1                                down   down
  eth2                                down   down
  eth3                                down   down

Two VRRP Devices In Same Sync Group

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:01        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Two VRRP Devices In Same Sync Group With MD5 Authentication

Description

Configure 2 DUTs in the same sync-group to check that they do communicate between each other, with MD5 authentication.

Scenario

Step 1: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN0
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN0 authentication encrypted-password U2FsdGVkX19pFiwszhvmaM4u/10E4fWadSRpkQHADFM=
set system vrrp sync-group MAIN0 authentication type md5

Step 2: Run command system vrrp show at DUT0 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01        MAIN0

Step 3: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 sync-group MAIN1
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp sync-group MAIN1 authentication encrypted-password U2FsdGVkX199m2CYx7WVFQl5oZIp4wMZsXmxSKeKOUI=
set system vrrp sync-group MAIN1 authentication type md5

Step 4: Run command system vrrp show at DUT1 and check if output contains the following tokens:

BACKUP
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:00        MAIN1

Step 5: Modify the following configuration lines in DUT0 :

set interfaces ethernet eth0 vrrp vrrp-group 1 disable

Step 6: Run command system vrrp sync-group MAIN0 show at DUT0 and check if output contains the following tokens:

BACKUP
Show output
Group: MAIN0
   State: BACKUP
   Monitoring:
      Interface: eth0, Group: 1

Step 7: Run command system vrrp sync-group MAIN1 show at DUT1 and check if output contains the following tokens:

MASTER
Show output
Group: MAIN1
   State: MASTER
   Monitoring:
      Interface: eth0, Group: 1

Test GARP Interval

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp interval 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:05         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:50:35.795271122           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:50:35.895288858 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-05-04 18:50:36.351300871 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-05-04 18:50:36.607315218           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2026-05-04 18:50:36.634144159           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-05-04 18:50:36.726123840 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 7 2026-05-04 18:50:36.799318396           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 8 2026-05-04 18:50:37.010145990 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-05-04 18:50:37.266149292           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-05-04 18:50:37.490165911           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
11 2026-05-04 18:50:37.631449125 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-05-04 18:50:37.643306516 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-05-04 18:50:37.851363387 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-05-04 18:50:38.367348493 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-05-04 18:50:38.514276813 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-05-04 18:50:38.526181408 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-05-04 18:50:38.654225294 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-05-04 18:50:39.105274569 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-05-04 18:50:39.105326086 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-05-04 18:50:39.105336255 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:50:39.105340451 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:50:39.105345536 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:50:39.105351165 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:50:39.410270920 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2026-05-04 18:50:40.105495463 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:50:41.105621434 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-05-04 18:50:44.715427301 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-05-04 18:50:44.715464459 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:50:45.715672508 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-05-04 18:50:46.715769597 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-05-04 18:50:47.715962651 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-05-04 18:50:48.715982299 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-05-04 18:50:49.715723421 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-05-04 18:50:49.716032224 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-05-04 18:50:50.716163508 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
36 2026-05-04 18:50:51.716263368 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
44.71
49.71
Interval[0]: 5.0

Test GARP Interval Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay between GARP packets sent on an interface globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp interval 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:50:59.476176796           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:50:59.560390331           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 3 2026-05-04 18:50:59.568094567 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-05-04 18:50:59.704116344           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-05-04 18:50:59.968160688 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-05-04 18:51:00.362975758           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-05-04 18:51:00.462974499 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-05-04 18:51:00.474980132 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-05-04 18:51:00.576278813 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-05-04 18:51:00.592130444 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-05-04 18:51:00.787012360           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-05-04 18:51:00.928176621 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-05-04 18:51:01.043012051           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
14 2026-05-04 18:51:01.344195270 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-05-04 18:51:02.067124512 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-05-04 18:51:02.079061690 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-05-04 18:51:02.115095567 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-05-04 18:51:02.777562749 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-05-04 18:51:02.777646647 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-05-04 18:51:02.777656542 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:51:02.777660240 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:51:02.777664868 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:51:02.777669879 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:51:02.835109123 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2026-05-04 18:51:06.387364346 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:51:06.387408089 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-05-04 18:51:07.387563743 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-05-04 18:51:08.387670301 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
29 2026-05-04 18:51:09.387761977 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-05-04 18:51:10.387874091 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-05-04 18:51:11.387673057 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-05-04 18:51:11.387920202 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-05-04 18:51:12.388037331 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-05-04 18:51:13.388260078 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
06.38
11.38
Interval[0]: 5.000000000000001

Test GARP Master Delay

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-delay 2
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:51:21.700922007           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:51:21.812909092 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-05-04 18:51:22.272935596           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-05-04 18:51:22.368957996           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 5 2026-05-04 18:51:22.528955665 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-05-04 18:51:22.639781872           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-05-04 18:51:22.695801417           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 8 2026-05-04 18:51:22.747782641 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-05-04 18:51:22.783805797           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-05-04 18:51:23.393079463 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-05-04 18:51:23.404969464 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-05-04 18:51:23.475815525 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-05-04 18:51:23.480967123 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-05-04 18:51:23.699888107 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-05-04 18:51:23.711790904 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-05-04 18:51:24.051819115 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
17 2026-05-04 18:51:24.161030743 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-05-04 18:51:24.595848332 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-05-04 18:51:25.023545962 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-05-04 18:51:25.023578253 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:51:25.023584708 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:51:25.023588195 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:51:25.023591671 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:51:25.023622751 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-05-04 18:51:28.633345392 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:51:28.633381498 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-05-04 18:51:28.633389568 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-05-04 18:51:28.633392720 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:51:28.633411234 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-05-04 18:51:28.633414328 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-05-04 18:51:29.633578232 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-05-04 18:51:30.633535497 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
33 2026-05-04 18:51:30.633554625 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-05-04 18:51:30.633557999 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-05-04 18:51:30.633561567 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-05-04 18:51:30.633573673 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-05-04 18:51:30.633577425 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-05-04 18:51:31.633723804 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
39 2026-05-04 18:51:32.633815392 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-05-04 18:51:33.633912016 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-05-04 18:51:34.634034557 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-05-04 18:51:35.634127947 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
28.63
28.63
28.63
28.63
28.63
30.63
30.63
30.63
30.63
30.63

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Delay Global

Description

This scenario checks that an OSDx device can use VRRP configuring the delay of the second set of garp packets sent after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-delay 2

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:02         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:05         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:51:43.813742004           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:51:43.913713634           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 3 2026-05-04 18:51:43.921733275 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-05-04 18:51:44.061736680           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-05-04 18:51:44.193731420 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-05-04 18:51:44.664566295           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-05-04 18:51:44.760569662 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-05-04 18:51:44.929849740 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-05-04 18:51:44.941763588 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2026-05-04 18:51:45.268600118           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-05-04 18:51:45.281765352 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-05-04 18:51:45.332615875           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
13 2026-05-04 18:51:45.633783549 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-05-04 18:51:45.716622999 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
15 2026-05-04 18:51:46.356672876 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-05-04 18:51:46.368657307 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-05-04 18:51:46.676670743 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-05-04 18:51:46.932659605 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-05-04 18:51:47.131796904 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-05-04 18:51:47.131826209 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:51:47.131832785 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:51:47.131836269 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:51:47.131852054 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:51:47.131855744 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-05-04 18:51:48.131996170 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:51:49.132111523 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-05-04 18:51:52.741946229 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
28 2026-05-04 18:51:52.741988537 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:51:52.741999027 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-05-04 18:51:52.742003264 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-05-04 18:51:52.742025164 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-05-04 18:51:52.742034657 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
33 2026-05-04 18:51:53.742171493 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-05-04 18:51:54.742136840 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-05-04 18:51:54.742163375 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-05-04 18:51:54.742167492 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-05-04 18:51:54.742171089 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-05-04 18:51:54.742187884 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-05-04 18:51:54.742218308 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
40 2026-05-04 18:51:55.742411030 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-05-04 18:51:56.742438291 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-05-04 18:51:57.742543159 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-05-04 18:51:58.742676733 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-05-04 18:51:59.742780165 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

GARP timestamps (in seconds with two decimals):

Show output
52.74
52.74
52.74
52.74
52.74
54.74
54.74
54.74
54.74
54.74

Note

The packages, by default, are sent in groups of five after transitioning to master

Master delay: 2.0

Test GARP Master Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:52:07.870561273           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:52:07.982565771 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-05-04 18:52:08.354596564 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-05-04 18:52:08.418588497           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-05-04 18:52:08.833476944           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-05-04 18:52:08.834609301           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 7 2026-05-04 18:52:08.921443417 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-05-04 18:52:09.081466967           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-05-04 18:52:09.109489393           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2026-05-04 18:52:09.493466015 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
11 2026-05-04 18:52:09.858674523 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-05-04 18:52:09.870599705 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-05-04 18:52:10.133603474 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-05-04 18:52:10.145489967 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-05-04 18:52:10.338677672 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-05-04 18:52:10.421508257 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
17 2026-05-04 18:52:10.786669781 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-05-04 18:52:10.837530079 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-05-04 18:52:11.193234234 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-05-04 18:52:11.193259779 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:52:11.193268477 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:52:11.193271359 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:52:11.193287772 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:52:11.193290405 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-05-04 18:52:14.803005047 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:52:14.803041718 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-05-04 18:52:14.803051095 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-05-04 18:52:14.803056865 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:52:15.803217193 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-05-04 18:52:16.803311918 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-05-04 18:52:17.803407398 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-05-04 18:52:18.803505576 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-05-04 18:52:19.803314148 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-05-04 18:52:19.803339537 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-05-04 18:52:19.803355225 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-05-04 18:52:19.803542482 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
37 2026-05-04 18:52:20.803671952 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-05-04 18:52:21.803782582 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time after transitioning to master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:52:29.671351853           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:52:29.763347468 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-05-04 18:52:30.307384338           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 4 2026-05-04 18:52:30.582203116           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 5 2026-05-04 18:52:30.627389723 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-05-04 18:52:30.659379249           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 7 2026-05-04 18:52:30.706193769 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-05-04 18:52:30.706232538           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2026-05-04 18:52:30.922236959 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-05-04 18:52:31.126256811           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-05-04 18:52:31.683808644 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-05-04 18:52:31.695431133 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-05-04 18:52:31.734368786 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-05-04 18:52:31.746240493 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
15 2026-05-04 18:52:31.859465803 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-05-04 18:52:32.118276349 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
17 2026-05-04 18:52:32.374291888 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-05-04 18:52:32.707474105 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-05-04 18:52:32.972319784 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-05-04 18:52:32.972367031 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:52:32.972376767 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:52:32.972381013 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:52:32.972394146 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:52:32.972399447 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-05-04 18:52:36.582148297 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:52:36.582184352 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-05-04 18:52:36.582193986 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-05-04 18:52:36.582211240 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:52:37.582335791 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
30 2026-05-04 18:52:38.582437516 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
31 2026-05-04 18:52:39.582547954 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-05-04 18:52:40.582642303 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-05-04 18:52:41.582464769 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
34 2026-05-04 18:52:41.582487834 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
35 2026-05-04 18:52:41.582504064 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-05-04 18:52:41.582672801 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
37 2026-05-04 18:52:42.582814490 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
38 2026-05-04 18:52:43.582909546 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
Number of packets sent at a time: 3

Test GARP Master Refresh

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:02         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:52:52.092214590           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:52:52.220164060 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-05-04 18:52:52.836205510 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-05-04 18:52:52.836242267           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-05-04 18:52:53.028208771           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2026-05-04 18:52:53.279025901           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-05-04 18:52:53.401669343           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 8 2026-05-04 18:52:53.411039582 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 9 2026-05-04 18:52:53.847149871           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
10 2026-05-04 18:52:54.052406847 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-05-04 18:52:54.064230676 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-05-04 18:52:54.359092717 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
13 2026-05-04 18:52:54.500260825 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
14 2026-05-04 18:52:54.660277740 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-05-04 18:52:54.871147865 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-05-04 18:52:54.883083858 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-05-04 18:52:55.429085821 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
18 2026-05-04 18:52:55.429325288 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
19 2026-05-04 18:52:55.429339203 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-05-04 18:52:55.429343098 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:52:55.429346649 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:52:55.429352310 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:52:55.479138812 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
24 2026-05-04 18:52:55.703151582 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
25 2026-05-04 18:52:56.429501749 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:53:00.039335928 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-05-04 18:53:00.039416653 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-05-04 18:53:00.039428762 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:53:00.039431752 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-05-04 18:53:00.039434697 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-05-04 18:53:00.039439403 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-05-04 18:53:01.039589299 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-05-04 18:53:02.039703513 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-05-04 18:53:03.039820649 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-05-04 18:53:04.039919857 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
36 2026-05-04 18:53:05.039686227 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-05-04 18:53:05.039716332 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-05-04 18:53:05.039719588 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-05-04 18:53:05.039721955 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-05-04 18:53:05.039736813 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
41 2026-05-04 18:53:05.039983470 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-05-04 18:53:05.039996934 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-05-04 18:53:06.040107385 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-05-04 18:53:07.040224986 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-05-04 18:53:08.040335401 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-05-04 18:53:09.040452289 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-05-04 18:53:10.040664406 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-05-04 18:53:10.040747492 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
49 2026-05-04 18:53:11.040713332 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-05-04 18:53:12.040828189 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2026-05-04 18:53:13.040953408 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2026-05-04 18:53:14.041074865 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-05-04 18:53:15.041166247 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-05-04 18:53:15.041213575 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
55 2026-05-04 18:53:16.041280387 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-05-04 18:53:17.041355630 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
05.03
10.04
15.04
Interval[0]: 5.009999999999999
Interval[1]: 5.0

Test GARP Master Refresh Global

Description

This scenario checks that an OSDx device can use VRRP configuring the minimum time interval for refreshing garp while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:53:29.621494566           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:53:29.717517187 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-05-04 18:53:29.925528121           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-05-04 18:53:30.149550923           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-05-04 18:53:30.596627518           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 6 2026-05-04 18:53:30.597545080 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 7 2026-05-04 18:53:30.706385182 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-05-04 18:53:30.949690355 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-05-04 18:53:30.961567350 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
10 2026-05-04 18:53:31.033570738 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
11 2026-05-04 18:53:31.213586142 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
12 2026-05-04 18:53:31.416424850           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
13 2026-05-04 18:53:31.416465890           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-05-04 18:53:31.544408806 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
15 2026-05-04 18:53:32.440534142 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-05-04 18:53:32.452431397 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-05-04 18:53:32.468460596 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-05-04 18:53:32.680450421 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
19 2026-05-04 18:53:32.926365516 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-05-04 18:53:32.926398911 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:53:32.926408133 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:53:32.926411038 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:53:32.926413803 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:53:32.926426381 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-05-04 18:53:36.536205235 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:53:36.536241674 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-05-04 18:53:36.536252427 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-05-04 18:53:36.536256038 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:53:36.536273756 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-05-04 18:53:36.536277485 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-05-04 18:53:37.536377357 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-05-04 18:53:38.536480038 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-05-04 18:53:39.536581529 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-05-04 18:53:40.536681938 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-05-04 18:53:41.536515943 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-05-04 18:53:41.536542154 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-05-04 18:53:41.536545676 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-05-04 18:53:41.536548931 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-05-04 18:53:41.536563129 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-05-04 18:53:41.536730311 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-05-04 18:53:41.536749198 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-05-04 18:53:42.536855597 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
43 2026-05-04 18:53:43.536960006 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
44 2026-05-04 18:53:44.537070409 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-05-04 18:53:45.537200171 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-05-04 18:53:46.537275028 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-05-04 18:53:46.537310316 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
48 2026-05-04 18:53:47.537407892 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-05-04 18:53:48.537508081 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-05-04 18:53:49.537606561 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
51 2026-05-04 18:53:50.537716245 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
52 2026-05-04 18:53:51.537845474 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-05-04 18:53:51.537892118 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
54 2026-05-04 18:53:52.537951543 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-05-04 18:53:53.538045173 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh parameter configures the minimum time interval for refreshing garp while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Note

GARP timestamps (in seconds with two decimals):

Show output
41.53
46.53
51.53
Interval[0]: 5.0
Interval[1]: 5.0

Test GARP Master Refresh Repeat

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master per VRRP group.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh 5
set interfaces ethernet eth0 vrrp vrrp-group 1 garp master-refresh-repeat 3
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:00         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:54:01.610641345           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:54:01.702648901 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 3 2026-05-04 18:54:01.958670149           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 4 2026-05-04 18:54:02.470699918           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 5 2026-05-04 18:54:02.502707267 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 6 2026-05-04 18:54:02.605547395           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-05-04 18:54:02.709526304 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 8 2026-05-04 18:54:02.765530040           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
 9 2026-05-04 18:54:02.982834661 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
10 2026-05-04 18:54:02.994676588 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
11 2026-05-04 18:54:03.202709084 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-05-04 18:54:03.609567019           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
13 2026-05-04 18:54:03.609620781 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
14 2026-05-04 18:54:03.769609325 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
15 2026-05-04 18:54:03.781519872 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
16 2026-05-04 18:54:03.814725954 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-05-04 18:54:03.877581618 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
18 2026-05-04 18:54:04.017596437 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
19 2026-05-04 18:54:04.913498268 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
20 2026-05-04 18:54:04.913533048 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:54:04.913541480 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:54:04.913544800 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:54:04.913548172 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:54:04.913551704 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
25 2026-05-04 18:54:08.523274811 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:54:08.523313334 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
27 2026-05-04 18:54:08.523323240 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-05-04 18:54:08.523326114 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:54:08.523329122 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-05-04 18:54:08.523333324 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-05-04 18:54:09.523505002 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
32 2026-05-04 18:54:10.523615648 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-05-04 18:54:11.523709049 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-05-04 18:54:12.523796599 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-05-04 18:54:13.523641765 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
36 2026-05-04 18:54:13.523665199 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-05-04 18:54:13.523667732 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-05-04 18:54:13.523669747 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-05-04 18:54:13.523682925 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-05-04 18:54:13.523856366 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
41 2026-05-04 18:54:13.523871443 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
42 2026-05-04 18:54:13.523877654 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-05-04 18:54:13.523883561 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-05-04 18:54:14.523974953 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
45 2026-05-04 18:54:15.524084835 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-05-04 18:54:16.524201917 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-05-04 18:54:17.524270286 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-05-04 18:54:18.524381021 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-05-04 18:54:18.524405647 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
50 2026-05-04 18:54:18.524412584 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2026-05-04 18:54:18.524423359 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2026-05-04 18:54:19.524540306 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
53 2026-05-04 18:54:20.524591915 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-05-04 18:54:21.524712491 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-05-04 18:54:22.524825346 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-05-04 18:54:23.524937711 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-05-04 18:54:23.524964615 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
58 2026-05-04 18:54:23.524977685 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2026-05-04 18:54:23.524990836 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2026-05-04 18:54:24.525039432 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
61 2026-05-04 18:54:25.525163115 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3

Test GARP Master Refresh Repeat Global

Description

This scenario checks that an OSDx device can use VRRP configuring the number of garp packets to send at a time while master globally.

Scenario

Step 1: Set the following configuration in DUT1 :

set interfaces ethernet eth0 address 192.168.100.101/24
set interfaces ethernet eth0 vrrp vrrp-group 1 preempt
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 200
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'

Step 2: Set the following configuration in DUT0 :

set interfaces ethernet eth0 address 192.168.100.100/24
set interfaces ethernet eth0 vrrp vrrp-group 1 priority 100
set interfaces ethernet eth0 vrrp vrrp-group 1 virtual-address 192.168.10.1
set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
set system vrrp global-parameters garp master-refresh 5
set system vrrp global-parameters garp master-refresh-repeat 3

Step 3: Run command system vrrp show at DUT1 and check if output contains the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    MASTER       yes           no          0:00:01         none

Step 4: Run command system vrrp show at DUT0 and check if output does not contain the following tokens:

MASTER
Show output
--------------------------------------------------------------------------------
Interface  Group  State   RFC Compliant  Addr Owner  Last Transition  Sync Group
--------------------------------------------------------------------------------
  eth0       1    BACKUP       yes           no          0:00:03         none

Note

In order to force DUT0 to become MASTER, interface eth0 in DUT1 must be disabled (GARP packets are sent after a device becomes MASTER).

Step 5: Modify the following configuration lines in DUT1 :

set interfaces ethernet eth0 disable

Note

Get DUT0’s MAC address to check that packets are sent from DUT0 (IP address is not showed).

Step 6: Get the MAC address of the eth0 interface:

admin@DUT0$ interfaces ethernet eth0 show detailed
Show output
----------------------------------------------------------------------------------------------------------------
Name  Idx           IP Address           Admin  Oper  Link  MTU   Vrf  Upper  Lower    Type        Phys addr
----------------------------------------------------------------------------------------------------------------
eth0  2    192.168.100.100/24            up     up    up    1500                     ethernet  de:ad:be:ef:6c:00
           192.168.10.1/32
           fe80::dcad:beff:feef:6c00/64

Note

Packets sent between DUT0 and DUT1:

Show output
 1 2026-05-04 18:54:34.295838129           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 2 2026-05-04 18:54:34.447821323           :: → ff02::16     ICMPv6 130 Multicast Listener Report Message v2
 3 2026-05-04 18:54:34.483824943 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 4 2026-05-04 18:54:34.515824793 192.168.100.101 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
 5 2026-05-04 18:54:35.271895255           :: → ff02::1:ffef:6c10 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c10
 6 2026-05-04 18:54:36.295929491 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 7 2026-05-04 18:54:36.307903180 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
 8 2026-05-04 18:54:36.314722041           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
 9 2026-05-04 18:54:36.426741220 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
10 2026-05-04 18:54:36.435662846           :: → ff02::1:ffef:6c00 ICMPv6 86 Neighbor Solicitation for fe80::dcad:beff:feef:6c00
11 2026-05-04 18:54:36.515898330 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
12 2026-05-04 18:54:36.807918746 fe80::dcad:beff:feef:6c10 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
13 2026-05-04 18:54:36.890750274           :: → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
14 2026-05-04 18:54:37.146750979 192.168.100.100 → 224.0.0.22   IGMPv3 54 Membership Report / Join group 224.0.0.18 for any sources
15 2026-05-04 18:54:37.466820984 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
16 2026-05-04 18:54:37.478733546 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
17 2026-05-04 18:54:37.686770937 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 90 Multicast Listener Report Message v2
18 2026-05-04 18:54:37.693079838 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
19 2026-05-04 18:54:37.693167534 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
20 2026-05-04 18:54:37.693177163 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
21 2026-05-04 18:54:37.693181545 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
22 2026-05-04 18:54:37.693184776 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
23 2026-05-04 18:54:37.693189412 de:ad:be:ef:6c:10 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request)
24 2026-05-04 18:54:37.786783044 fe80::dcad:beff:feef:6c00 → ff02::16     ICMPv6 150 Multicast Listener Report Message v2
25 2026-05-04 18:54:38.693310772 192.168.100.101 → 224.0.0.18   VRRP 54 Announcement (v2)
26 2026-05-04 18:54:42.303052003 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
27 2026-05-04 18:54:42.303079217 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
28 2026-05-04 18:54:42.303085984 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
29 2026-05-04 18:54:42.303088370 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
30 2026-05-04 18:54:42.303102803 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
31 2026-05-04 18:54:42.303105888 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
32 2026-05-04 18:54:43.303251962 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
33 2026-05-04 18:54:44.303366240 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
34 2026-05-04 18:54:45.303463267 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
35 2026-05-04 18:54:46.303559134 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
36 2026-05-04 18:54:47.303351741 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
37 2026-05-04 18:54:47.303369095 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
38 2026-05-04 18:54:47.303371979 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
39 2026-05-04 18:54:47.303373942 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
40 2026-05-04 18:54:47.303384978 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
41 2026-05-04 18:54:47.303605252 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
42 2026-05-04 18:54:47.303613324 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
43 2026-05-04 18:54:47.303615370 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
44 2026-05-04 18:54:47.303618973 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
45 2026-05-04 18:54:48.303749820 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
46 2026-05-04 18:54:49.303851451 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
47 2026-05-04 18:54:50.303950479 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
48 2026-05-04 18:54:51.304066101 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
49 2026-05-04 18:54:52.304164979 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
50 2026-05-04 18:54:52.304187102 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
51 2026-05-04 18:54:52.304194173 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
52 2026-05-04 18:54:52.304208131 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
53 2026-05-04 18:54:53.304281003 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
54 2026-05-04 18:54:54.304395171 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
55 2026-05-04 18:54:55.304520616 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
56 2026-05-04 18:54:56.304615274 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
57 2026-05-04 18:54:57.304719662 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
58 2026-05-04 18:54:57.304745406 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
59 2026-05-04 18:54:57.304752538 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
60 2026-05-04 18:54:57.304769448 de:ad:be:ef:6c:00 → ff:ff:ff:ff:ff:ff ARP 42 Gratuitous ARP for 192.168.10.1 (Request) (duplicate use of 192.168.10.1 detected!)
61 2026-05-04 18:54:58.304827308 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)
62 2026-05-04 18:54:59.304925137 192.168.100.100 → 224.0.0.18   VRRP 54 Announcement (v2)

Note

Two sets of GARP packets are sent in groups of five, by default, after transitioning to master. Since the master-refresh-repeat parameter configures the number of garp packets to send at a time while master, and not after transitioning to master, it affects the GARP packets sent by DUT0 after the first two sets of GARP packets.

Number of packets sent at a time: 3