Created
January 26, 2016 00:18
-
-
Save ionosphere80/05e02c7a753fad4b2964 to your computer and use it in GitHub Desktop.
MTU experiments with Open vSwitch - capture of ping with 8922 payload and DF=1, increasing VM tap interface MTU to 8950
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Neutron private network VXLAN underlying interface, compute node end of overlay: | |
23:51:03.854079 00:1a:64:f1:e5:74 > 00:1a:64:f1:df:74, ethertype IPv4 (0x0800), length 9014: (tos 0x0, ttl 64, id 24926, offset 0, flags [DF], proto UDP (17), length 9000) | |
9.30.183.46.46263 > 9.30.183.47.4789: VXLAN, flags [I] (0x08), vni 144 | |
fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17174, seq 1, length 8930 | |
23:51:03.854820 00:1a:64:f1:df:74 > 00:1a:64:f1:e5:74, ethertype IPv4 (0x0800), length 9014: (tos 0x0, ttl 64, id 33598, offset 0, flags [DF], proto UDP (17), length 9000) | |
9.30.183.47.46204 > 9.30.183.46.4789: VXLAN, flags [I] (0x08), vni 144 | |
fa:16:3e:ea:22:3a > fa:16:3e:34:67:40, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 20224, offset 0, flags [none], proto ICMP (1), length 8950) | |
172.16.1.3 > 10.100.52.45: ICMP echo reply, id 17174, seq 1, length 8930 | |
Security group bridge, Open vSwitch end of veth pair: | |
23:51:03.854359 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17174, seq 1, length 8930 | |
23:51:03.854610 fa:16:3e:ea:22:3a > fa:16:3e:34:67:40, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 20224, offset 0, flags [none], proto ICMP (1), length 8950) | |
172.16.1.3 > 10.100.52.45: ICMP echo reply, id 17174, seq 1, length 8930 | |
Security group bridge, Linux bridge end of veth pair: | |
23:51:03.854368 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17174, seq 1, length 8930 | |
23:51:03.854604 fa:16:3e:ea:22:3a > fa:16:3e:34:67:40, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 20224, offset 0, flags [none], proto ICMP (1), length 8950) | |
172.16.1.3 > 10.100.52.45: ICMP echo reply, id 17174, seq 1, length 8930 | |
VM tap interface: | |
3:51:03.854421 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17174, seq 1, length 8930 | |
23:51:03.854573 fa:16:3e:ea:22:3a > fa:16:3e:34:67:40, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 20224, offset 0, flags [none], proto ICMP (1), length 8950) | |
172.16.1.3 > 10.100.52.45: ICMP echo reply, id 17174, seq 1, length 8930 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment