+
+Verify GWMAC Entry On ODL
+ [Arguments] ${GWMAC_ADDRS}
+ [Documentation] get ODL GWMAC table entry
+ ${resp} = RequestsLibrary.Get Request session ${VPN_PORT_DATA_URL}
+ Log ${resp.content}
+ Should Be Equal As Strings ${resp.status_code} 200
+ : FOR ${macAdd} IN @{GWMAC_ADDRS}
+ \ Should Contain ${resp.content} ${macAdd}
+
+Verify GWMAC Flow Entry Removed From Flow Table
+ [Arguments] ${cnIp}
+ [Documentation] Verify the GWMAC Table, ARP Response table and Dispatcher table.
+ ${flow_output}= Run Command On Remote System And Log ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-flows br-int
+ Should Contain ${flow_output} table=${GWMAC_TABLE}
+ ${gwmac_table} = Get Lines Containing String ${flow_output} table=${GWMAC_TABLE}
+ Log ${gwmac_table}
+ #Verify GWMAC address present in table 19
+ : FOR ${macAdd} IN @{GWMAC_ADDRS}
+ \ Should Not Contain ${gwmac_table} dl_dst=${macAdd} actions=goto_table:${L3_TABLE}
+
+Verify ARP REQUEST in groupTable
+ [Arguments] ${group_output} ${Group-ID}
+ [Documentation] get flow dump for group ID
+ Should Contain ${group_output} group_id=${Group-ID}
+ ${arp_group} = Get Lines Containing String ${group_output} group_id=${Group-ID}
+ Log ${arp_group}
+ Should Match Regexp ${arp_group} ${ARP_REQUEST_GROUP_REGEX}
+
+Verify Tunnel Status as UP
+ [Documentation] Verify that the tunnels are UP
+ ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
+ Log ${output}
+ Should Contain ${output} ${STATE_UP}
+ Should Not Contain ${output} ${STATE_DOWN}
+ Should Not Contain ${output} ${STATE_UNKNOWN}
+
+Verify Tunnel Status as DOWN
+ [Documentation] Verify that the tunnels are DOWN
+ ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
+ Log ${output}
+ Should Contain ${output} ${STATE_DOWN}
+ Should Not Contain ${output} ${STATE_UP}
+ Should Not Contain ${output} ${STATE_UNKNOWN}
+
+Verify Tunnel Status as UNKNOWN
+ [Documentation] Verify that the tunnels are in Unknown state
+ ${output}= Issue Command On Karaf Console ${TEP_SHOW_STATE}
+ Log ${output}
+ Should Not Contain ${output} ${STATE_UP}
+ Should Not Contain ${output} ${STATE_DOWN}
+ Should Contain ${output} ${STATE_UNKNOWN}
+
+Verify VXLAN interface
+ [Documentation] Verify that the VXLAN interfaces are Enabled
+ ${output}= Issue Command On Karaf Console ${VXLAN_SHOW}
+ Log ${output}
+ Should Contain ${output} ${STATE_UP}
+ Should Contain ${output} ${STATE_ENABLE}
+ Should Not Contain ${output} ${STATE_DISABLE}
+
+Get Fib Entries
+ [Arguments] ${session}
+ [Documentation] Get Fib table entries from ODL session
+ ${resp} RequestsLibrary.Get Request ${session} ${FIB_ENTRIES_URL}
+ Log ${resp.content}
+ [Return] ${resp.content}
+
+Get Gateway MAC And IP Address
+ [Arguments] ${router_Name} ${ip_regex}=${IP_REGEX}
+ [Documentation] Get Gateway mac and IP Address
+ ${output} = Write Commands Until Prompt neutron router-port-list ${router_Name} 30s
+ @{MacAddr-list} = Get Regexp Matches ${output} ${MAC_REGEX}
+ @{IpAddr-list} = Get Regexp Matches ${output} ${ip_regex}
+ [Return] ${MacAddr-list} ${IpAddr-list}
+
+Test Teardown With Tcpdump Stop
+ [Arguments] ${conn_ids}=@{EMPTY}
+ OpenStackOperations.Stop Packet Capture On Nodes ${conn_ids}
+ Get Test Teardown Debugs
+
+Verify IPv4 GWMAC Flow Entry On Flow Table
+ [Arguments] ${group_output} ${group_id} ${flow_output}
+ Verify ARP REQUEST in groupTable ${group_output} ${groupID[1]}
+ #Verify ARP_RESPONSE_TABLE - 81
+ Should Contain ${flow_output} table=${ARP_RESPONSE_TABLE}
+ ${arpResponder_table} = Get Lines Containing String ${flow_output} table=${ARP_RESPONSE_TABLE}
+ Should Contain ${arpResponder_table} priority=0 actions=drop
+ : FOR ${macAdd} ${ipAdd} IN ZIP ${GWMAC_ADDRS} ${GWIP_ADDRS}
+ \ ${ARP_RESPONSE_IP_MAC_REGEX} = Set Variable arp_tpa=${ipAdd},arp_op=1 actions=.*,set_field:${macAdd}->eth_src
+ \ Should Match Regexp ${arpResponder_table} ${ARP_RESPONSE_IP_MAC_REGEX}
+
+Verify IPv6 GWMAC Flow Entry On Flow Table
+ [Arguments] ${flow_output}
+ Should Contain ${flow_output} table=${IPV6_TABLE}
+ ${icmp_ipv6_flows} = Get Lines Containing String ${flow_output} icmp_type=135
+ : FOR ${ip_addr} IN @{GWIP_ADDRS}
+ \ ${rule} = Set Variable icmp_type=135,icmp_code=0,nd_target=${ip_addr} actions=CONTROLLER:65535
+ \ Should Match Regexp ${icmp_ipv6_flows} ${rule}
+
+Verify GWMAC Flow Entry On Flow Table
+ [Arguments] ${cnIp} ${ipv}=ipv4
+ [Documentation] Verify the GWMAC Table, ARP Response table and Dispatcher table.
+ ${flow_output}= Run Command On Remote System ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-flows br-int
+ ${group_output}= Run Command On Remote System ${cnIp} sudo ovs-ofctl -O OpenFlow13 dump-groups br-int
+ Should Contain ${flow_output} table=${DISPATCHER_TABLE}
+ ${dispatcher_table} = Get Lines Containing String ${flow_output} table=${DISPATCHER_TABLE}
+ Should Contain ${dispatcher_table} goto_table:${GWMAC_TABLE}
+ Should Not Contain ${dispatcher_table} goto_table:${ARP_RESPONSE_TABLE}
+ Should Contain ${flow_output} table=${GWMAC_TABLE}
+ ${gwmac_table} = Get Lines Containing String ${flow_output} table=${GWMAC_TABLE}
+ #Verify GWMAC address present in table 19
+ : FOR ${macAdd} IN @{GWMAC_ADDRS}
+ \ Should Contain ${gwmac_table} dl_dst=${macAdd} actions=goto_table:${L3_TABLE}
+ #verify Miss entry
+ Should Contain ${gwmac_table} actions=resubmit(,17)
+ #Verify ARP_CHECK_TABLE - 43
+ #arp request and response
+ ${arpchk_table} = Get Lines Containing String ${flow_output} table=${ARP_CHECK_TABLE}
+ Should Match Regexp ${arpchk_table} ${ARP_RESPONSE_REGEX}
+ ${match} = Should Match Regexp ${arpchk_table} ${ARP_REQUEST_REGEX}
+ ${groupID} = Split String ${match} separator=:
+ BuiltIn.Run Keyword If '${ipv}' == 'ipv4' Verify IPv4 GWMAC Flow Entry On Flow Table ${group_output} ${group_id} ${flow_output}
+ ... ELSE Verify IPv6 GWMAC Flow Entry On Flow Table ${flow_output}
+
+Delete Multiple L3VPNs
+ [Arguments] @{vpns}
+ [Documentation] Delete three L3VPNs created using Multiple L3VPN Test
+ : FOR ${vpn} IN ${vpns}
+ \ VPN Delete L3VPN vpnid=${vpn}