diff --git a/data/templates/dns-dynamic/ddclient.conf.j2 b/data/templates/dns-dynamic/ddclient.conf.j2
index b61c8b78d..3446a9d1b 100644
--- a/data/templates/dns-dynamic/ddclient.conf.j2
+++ b/data/templates/dns-dynamic/ddclient.conf.j2
@@ -1,75 +1,75 @@
 {% macro render_config(host, address, web_options, ip_suffixes=['']) %}
 {# Address: use=if, if=ethX, usev6=ifv6, ifv6=ethX, usev6=webv6, webv6=https://v6.example.com #}
 {% for ipv in ip_suffixes %}
 use{{ ipv }}={{ address if address == 'web' else 'if' }}{{ ipv }}, \
 {%     if address == 'web' %}
 {%         if web_options.url is vyos_defined %}
 web{{ ipv }}={{ web_options.url }}, \
 {%         endif %}
 {%         if web_options.skip is vyos_defined %}
 web-skip{{ ipv }}='{{ web_options.skip }}', \
 {%         endif %}
 {%     else %}
 if{{ ipv }}={{ address }}, \
 {%     endif %}
 {% endfor %}
 {# Other service options #}
 {% for k,v in kwargs.items() %}
 {%     if v is vyos_defined %}
 {{ k }}={{ v }}{{ ',' if not loop.last }} \
 {%     endif %}
 {% endfor %}
 {# Actual hostname for the service #}
 {{ host }}
 {% endmacro %}
 ### Autogenerated by dns_dynamic.py ###
-daemon=5m
+daemon={{ timeout }}
 syslog=yes
 ssl=yes
 pid={{ config_file | replace('.conf', '.pid') }}
 cache={{ config_file | replace('.conf', '.cache') }}
 {# Explicitly override global options for reliability #}
 web=googledomains {# ddclient default ('dyndns') doesn't support ssl and results in process lockup #}
 use=no            {# ddclient default ('ip') results in confusing warning message in log #}
 
 {% if address is vyos_defined %}
 {%     for address, service_cfg in address.items() %}
 {%         if service_cfg.rfc2136 is vyos_defined %}
 {%             for name, config in service_cfg.rfc2136.items() %}
 {%                 if config.description is vyos_defined %}
 # {{ config.description }}
 
 {%                 endif %}
 {%                 for host in config.host_name if config.host_name is vyos_defined %}
 # RFC2136 dynamic DNS configuration for {{ name }}: [{{ config.zone }}, {{ host }}]
 {# Don't append 'new-style' compliant suffix ('usev4', 'usev6', 'ifv4', 'ifv6' etc.)
    to the properties since 'nsupdate' doesn't support that yet. #}
 {{ render_config(host, address, service_cfg.web_options,
                  protocol='nsupdate', server=config.server, zone=config.zone,
                  password=config.key, ttl=config.ttl) }}
 
 {%                 endfor %}
 {%             endfor %}
 {%         endif %}
 {%         if service_cfg.service is vyos_defined %}
 {%             for name, config in service_cfg.service.items() %}
 {%                 if config.description is vyos_defined %}
 # {{ config.description }}
 
 {%                 endif %}
 {%                 for host in config.host_name if config.host_name is vyos_defined %}
 {%                     set ip_suffixes = ['v4', 'v6'] if config.ip_version == 'both'
                                                       else (['v6'] if config.ip_version == 'ipv6' else ['']) %}
 # Web service dynamic DNS configuration for {{ name }}: [{{ config.protocol }}, {{ host }}]
 {# For ipv4 only setup or legacy ipv6 setup, don't append 'new-style' compliant suffix
    ('usev4', 'ifv4', 'webv4' etc.) to the properties and instead live through the
    deprecation warnings for better compatibility with most ddclient protocols. #}
 {{ render_config(host, address, service_cfg.web_options, ip_suffixes,
                  protocol=config.protocol, server=config.server, zone=config.zone,
                  login=config.username, password=config.password) }}
 
 {%                 endfor %}
 {%             endfor %}
 {%         endif %}
 {%     endfor %}
 {% endif %}
diff --git a/interface-definitions/dns-dynamic.xml.in b/interface-definitions/dns-dynamic.xml.in
index c7b45b8f7..a0720f3aa 100644
--- a/interface-definitions/dns-dynamic.xml.in
+++ b/interface-definitions/dns-dynamic.xml.in
@@ -1,159 +1,173 @@
 <?xml version="1.0"?>
 <interfaceDefinition>
   <node name="service">
     <children>
       <node name="dns">
         <properties>
           <help>Domain Name System (DNS) related services</help>
         </properties>
         <children>
           <node name="dynamic" owner="${vyos_conf_scripts_dir}/dns_dynamic.py">
             <properties>
               <help>Dynamic DNS</help>
             </properties>
             <children>
               <tagNode name="address">
                 <properties>
                   <help>Obtain IP address to send Dynamic DNS update for</help>
                   <valueHelp>
                     <format>txt</format>
                     <description>Use interface to obtain the IP address</description>
                   </valueHelp>
                   <valueHelp>
                     <format>web</format>
                     <description>Use HTTP(S) web request to obtain the IP address</description>
                   </valueHelp>
                   <completionHelp>
                     <script>${vyos_completion_dir}/list_interfaces</script>
                     <list>web</list>
                   </completionHelp>
                   <constraint>
                     #include <include/constraint/interface-name.xml.i>
                     <regex>web</regex>
                   </constraint>
                 </properties>
                 <children>
                   <node name="web-options">
                     <properties>
                       <help>Options when using HTTP(S) web request to obtain the IP address</help>
                     </properties>
                     <children>
                       #include <include/url.xml.i>
                       <leafNode name="skip">
                         <properties>
                           <help>Pattern to skip from the HTTP(S) respose</help>
                           <valueHelp>
                             <format>txt</format>
                             <description>Pattern to skip from the HTTP(S) respose to extract the external IP address</description>
                           </valueHelp>
                         </properties>
                       </leafNode>
                     </children>
                   </node>
                   <tagNode name="rfc2136">
                     <properties>
                       <help>RFC2136 nsupdate configuration</help>
                       <valueHelp>
                         <format>txt</format>
                         <description>RFC2136 nsupdate service name</description>
                       </valueHelp>
                     </properties>
                     <children>
                       #include <include/generic-description.xml.i>
                       #include <include/dns/dynamic-service-host-name-server.xml.i>
                       <leafNode name="key">
                         <properties>
                           <help>File containing the TSIG secret key shared with remote DNS server</help>
                           <valueHelp>
                             <format>filename</format>
                             <description>File in /config/auth directory</description>
                           </valueHelp>
                           <constraint>
                             <validator name="file-path" argument="--strict --parent-dir /config/auth"/>
                           </constraint>
                         </properties>
                       </leafNode>
                       #include <include/dns/time-to-live.xml.i>
                       <leafNode name="zone">
                         <properties>
                           <help>Forwarding zone to be updated</help>
                           <valueHelp>
                             <format>txt</format>
                             <description>RFC2136 Zone to be updated</description>
                           </valueHelp>
                           <constraint>
                             <validator name="fqdn"/>
                           </constraint>
                         </properties>
                       </leafNode>
                     </children>
                   </tagNode>
                   <tagNode name="service">
                     <properties>
                       <help>Dynamic DNS configuration</help>
                       <valueHelp>
                         <format>txt</format>
                         <description>Dynamic DNS service name</description>
                       </valueHelp>
                     </properties>
                     <children>
                       #include <include/generic-description.xml.i>
                       #include <include/dns/dynamic-service-host-name-server.xml.i>
                       #include <include/generic-username.xml.i>
                       #include <include/generic-password.xml.i>
                       <leafNode name="protocol">
                         <properties>
                           <help>ddclient protocol used for Dynamic DNS service</help>
                           <completionHelp>
                             <script>${vyos_completion_dir}/list_ddclient_protocols.sh</script>
                           </completionHelp>
                           <constraint>
                             <validator name="ddclient-protocol"/>
                           </constraint>
                         </properties>
                       </leafNode>
                       <leafNode name="zone">
                         <properties>
                           <help>DNS zone to update (not used by all protocols)</help>
                           <valueHelp>
                             <format>txt</format>
                             <description>Name of DNS zone</description>
                           </valueHelp>
                         </properties>
                       </leafNode>
                       <leafNode name="ip-version">
                         <properties>
                           <help>IP address version to use</help>
                           <valueHelp>
                             <format>_ipv4</format>
                             <description>Use only IPv4 address</description>
                           </valueHelp>
                           <valueHelp>
                             <format>_ipv6</format>
                             <description>Use only IPv6 address</description>
                           </valueHelp>
                           <valueHelp>
                             <format>both</format>
                             <description>Use both IPv4 and IPv6 address</description>
                           </valueHelp>
                           <completionHelp>
                             <list>ipv4 ipv6 both</list>
                           </completionHelp>
                           <constraint>
                             <regex>(ipv[46]|both)</regex>
                           </constraint>
                           <constraintErrorMessage>IP Version must be literal 'ipv4', 'ipv6' or 'both'</constraintErrorMessage>
                         </properties>
                         <defaultValue>ipv4</defaultValue>
                       </leafNode>
                     </children>
                   </tagNode>
                 </children>
               </tagNode>
+              <leafNode name="timeout">
+                <properties>
+                  <help>Time in seconds to wait between DNS updates</help>
+                  <valueHelp>
+                    <format>u32:60-3600</format>
+                    <description>Time in seconds</description>
+                  </valueHelp>
+                  <constraint>
+                    <validator name="numeric" argument="--range 60-3600"/>
+                  </constraint>
+                  <constraintErrorMessage>Timeout must be between 60 and 3600 seconds</constraintErrorMessage>
+                </properties>
+                <defaultValue>300</defaultValue>
+              </leafNode>
             </children>
           </node>
         </children>
       </node>
     </children>
   </node>
 </interfaceDefinition>
diff --git a/smoketest/scripts/cli/test_service_dns_dynamic.py b/smoketest/scripts/cli/test_service_dns_dynamic.py
index f6c42e8c9..ee8a07b37 100755
--- a/smoketest/scripts/cli/test_service_dns_dynamic.py
+++ b/smoketest/scripts/cli/test_service_dns_dynamic.py
@@ -1,183 +1,192 @@
 #!/usr/bin/env python3
 #
 # Copyright (C) 2019-2023 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
 # published by the Free Software Foundation.
 #
 # This program is distributed in the hope that it will be useful,
 # but WITHOUT ANY WARRANTY; without even the implied warranty of
 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 # GNU General Public License for more details.
 #
 # You should have received a copy of the GNU General Public License
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
-import re
 import os
 import unittest
 import tempfile
 
 from base_vyostest_shim import VyOSUnitTestSHIM
 
 from vyos.configsession import ConfigSessionError
 from vyos.utils.process import cmd
 from vyos.utils.process import process_running
 
 DDCLIENT_CONF = '/run/ddclient/ddclient.conf'
 DDCLIENT_PID = '/run/ddclient/ddclient.pid'
 
 base_path = ['service', 'dns', 'dynamic']
 hostname = 'test.ddns.vyos.io'
 zone = 'vyos.io'
 password = 'paSS_@4ord'
 interface = 'eth0'
 
-
-def get_config_value(key):
-    tmp = cmd(f'sudo cat {DDCLIENT_CONF}')
-    vals = re.findall(r'\n?{}=([.-@_A-Za-z0-9]+),? \\'.format(key), tmp)
-    return vals[0] if vals else ''
-
-
 class TestServiceDDNS(VyOSUnitTestSHIM.TestCase):
     def tearDown(self):
         # Check for running process
         self.assertTrue(process_running(DDCLIENT_PID))
 
         # Delete DDNS configuration
         self.cli_delete(base_path)
         self.cli_commit()
 
         # PID file must no londer exist after process exited
         self.assertFalse(os.path.exists(DDCLIENT_PID))
 
     # IPv4 standard DDNS service configuration
-    def test_dyndns_service_standard(self):
+    def test_01_dyndns_service_standard(self):
         ddns = ['address', interface, 'service']
         services = {'cloudflare': {'protocol': 'cloudflare'},
                     'freedns': {'protocol': 'freedns', 'username': 'vyos_user'},
                     'zoneedit': {'protocol': 'zoneedit1', 'username': 'vyos_user'}}
 
         for svc, details in services.items():
+            # Always start with a clean CLI instance
             self.cli_delete(base_path)
+
             self.cli_set(base_path + ddns + [svc, 'host-name', hostname])
-            for opt, value in details.items():
-                self.cli_set(base_path + ddns + [svc, opt, value])
             self.cli_set(base_path + ddns + [svc, 'password', password])
             self.cli_set(base_path + ddns + [svc, 'zone', zone])
+            for opt, value in details.items():
+                self.cli_set(base_path + ddns + [svc, opt, value])
 
             # commit changes
             if details['protocol'] == 'cloudflare':
-                self.cli_commit()
+                pass
             else:
                 # zone option does not work on all protocols, an exception is
                 # raised for all others
                 with self.assertRaises(ConfigSessionError):
                     self.cli_commit()
                 self.cli_delete(base_path + ddns + [svc, 'zone', zone])
-                # commit changes again - now it should work
-                self.cli_commit()
+
+            # commit changes
+            self.cli_commit()
 
             # Check the generating config parameters
-            self.assertEqual(get_config_value('use'), 'if')
-            self.assertEqual(get_config_value('if'), interface)
-            self.assertEqual(get_config_value('password'), password)
+            ddclient_conf = cmd(f'sudo cat {DDCLIENT_CONF}')
+            # default value 300 seconds
+            self.assertIn(f'daemon=300', ddclient_conf)
+            self.assertIn(f'use=if', ddclient_conf)
+            self.assertIn(f'if={interface}', ddclient_conf)
+            self.assertIn(f'password={password}', ddclient_conf)
 
             for opt in details.keys():
                 if opt == 'username':
-                    self.assertEqual(get_config_value('login'), details[opt])
+                    login = details[opt]
+                    self.assertIn(f'login={login}', ddclient_conf)
                 else:
-                    self.assertEqual(get_config_value(opt), details[opt])
+                    tmp = details[opt]
+                    self.assertIn(f'{opt}={tmp}', ddclient_conf)
 
     # IPv6 only DDNS service configuration
-    def test_dyndns_service_ipv6(self):
+    def test_02_dyndns_service_ipv6(self):
+        timeout = '60'
         ddns = ['address', interface, 'service', 'dynv6']
         proto = 'dyndns2'
         user = 'none'
         password = 'paSS_4ord'
         srv = 'ddns.vyos.io'
         ip_version = 'ipv6'
 
+        self.cli_set(base_path + ['timeout', timeout])
         self.cli_set(base_path + ddns + ['ip-version', ip_version])
         self.cli_set(base_path + ddns + ['protocol', proto])
         self.cli_set(base_path + ddns + ['server', srv])
         self.cli_set(base_path + ddns + ['username', user])
         self.cli_set(base_path + ddns + ['password', password])
         self.cli_set(base_path + ddns + ['host-name', hostname])
 
         # commit changes
         self.cli_commit()
 
         # Check the generating config parameters
-        self.assertEqual(get_config_value('usev6'), 'ifv6')
-        self.assertEqual(get_config_value('ifv6'), interface)
-        self.assertEqual(get_config_value('protocol'), proto)
-        self.assertEqual(get_config_value('server'), srv)
-        self.assertEqual(get_config_value('login'), user)
-        self.assertEqual(get_config_value('password'), password)
+        ddclient_conf = cmd(f'sudo cat {DDCLIENT_CONF}')
+        self.assertIn(f'daemon={timeout}', ddclient_conf)
+        self.assertIn(f'usev6=ifv6', ddclient_conf)
+        self.assertIn(f'ifv6={interface}', ddclient_conf)
+        self.assertIn(f'protocol={proto}', ddclient_conf)
+        self.assertIn(f'server={srv}', ddclient_conf)
+        self.assertIn(f'login={user}', ddclient_conf)
+        self.assertIn(f'password={password}', ddclient_conf)
 
     # IPv4+IPv6 dual DDNS service configuration
-    def test_dyndns_service_dual_stack(self):
+    def test_03_dyndns_service_dual_stack(self):
         ddns = ['address', interface, 'service']
         services = {'cloudflare': {'protocol': 'cloudflare', 'zone': 'vyos.io'},
                     'freedns': {'protocol': 'freedns', 'username': 'vyos_user'}}
         password = 'vyos_pass'
         ip_version = 'both'
 
         for svc, details in services.items():
+            # Always start with a clean CLI instance
             self.cli_delete(base_path)
+
             self.cli_set(base_path + ddns + [svc, 'host-name', hostname])
-            for opt, value in details.items():
-                self.cli_set(base_path + ddns + [svc, opt, value])
             self.cli_set(base_path + ddns + [svc, 'password', password])
             self.cli_set(base_path + ddns + [svc, 'ip-version', ip_version])
+            for opt, value in details.items():
+                self.cli_set(base_path + ddns + [svc, opt, value])
 
             # commit changes
             self.cli_commit()
 
             # Check the generating config parameters
-            self.assertEqual(get_config_value('usev4'), 'ifv4')
-            self.assertEqual(get_config_value('usev6'), 'ifv6')
-            self.assertEqual(get_config_value('ifv4'), interface)
-            self.assertEqual(get_config_value('ifv6'), interface)
-            self.assertEqual(get_config_value('password'), password)
+            ddclient_conf = cmd(f'sudo cat {DDCLIENT_CONF}')
+            self.assertIn(f'usev4=ifv4', ddclient_conf)
+            self.assertIn(f'usev6=ifv6', ddclient_conf)
+            self.assertIn(f'ifv4={interface}', ddclient_conf)
+            self.assertIn(f'ifv6={interface}', ddclient_conf)
+            self.assertIn(f'password={password}', ddclient_conf)
 
             for opt in details.keys():
                 if opt == 'username':
-                    self.assertEqual(get_config_value('login'), details[opt])
+                    login = details[opt]
+                    self.assertIn(f'login={login}', ddclient_conf)
                 else:
-                    self.assertEqual(get_config_value(opt), details[opt])
+                    tmp = details[opt]
+                    self.assertIn(f'{opt}={tmp}', ddclient_conf)
 
-    def test_dyndns_rfc2136(self):
+    def test_04_dyndns_rfc2136(self):
         # Check if DDNS service can be configured and runs
         ddns = ['address', interface, 'rfc2136', 'vyos']
         srv = 'ns1.vyos.io'
         zone = 'vyos.io'
         ttl = '300'
 
         with tempfile.NamedTemporaryFile(prefix='/config/auth/') as key_file:
             key_file.write(b'S3cretKey')
 
             self.cli_set(base_path + ddns + ['server', srv])
             self.cli_set(base_path + ddns + ['zone', zone])
             self.cli_set(base_path + ddns + ['key', key_file.name])
             self.cli_set(base_path + ddns + ['ttl', ttl])
             self.cli_set(base_path + ddns + ['host-name', hostname])
 
             # commit changes
             self.cli_commit()
 
             # Check some generating config parameters
-            self.assertEqual(get_config_value('use'), 'if')
-            self.assertEqual(get_config_value('if'), interface)
-            self.assertEqual(get_config_value('protocol'), 'nsupdate')
-            self.assertEqual(get_config_value('server'), srv)
-            self.assertEqual(get_config_value('zone'), zone)
-            self.assertEqual(get_config_value('password'), key_file.name)
-            self.assertEqual(get_config_value('ttl'), ttl)
-
+            ddclient_conf = cmd(f'sudo cat {DDCLIENT_CONF}')
+            self.assertIn(f'use=if', ddclient_conf)
+            self.assertIn(f'if={interface}', ddclient_conf)
+            self.assertIn(f'protocol=nsupdate', ddclient_conf)
+            self.assertIn(f'server={srv}', ddclient_conf)
+            self.assertIn(f'zone={zone}', ddclient_conf)
+            self.assertIn(f'password={key_file.name}', ddclient_conf)
+            self.assertIn(f'ttl={ttl}', ddclient_conf)
 
 if __name__ == '__main__':
     unittest.main(verbosity=2)