Skip to content

Instantly share code, notes, and snippets.

@ionosphere80
Created January 26, 2016 00:18
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save ionosphere80/05e02c7a753fad4b2964 to your computer and use it in GitHub Desktop.
Save ionosphere80/05e02c7a753fad4b2964 to your computer and use it in GitHub Desktop.
MTU experiments with Open vSwitch - capture of ping with 8922 payload and DF=1, increasing VM tap interface MTU to 8950
Neutron private network VXLAN underlying interface, compute node end of overlay:
23:51:03.854079 00:1a:64:f1:e5:74 > 00:1a:64:f1:df:74, ethertype IPv4 (0x0800), length 9014: (tos 0x0, ttl 64, id 24926, offset 0, flags [DF], proto UDP (17), length 9000)
9.30.183.46.46263 > 9.30.183.47.4789: VXLAN, flags [I] (0x08), vni 144
fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950)
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17174, seq 1, length 8930
23:51:03.854820 00:1a:64:f1:df:74 > 00:1a:64:f1:e5:74, ethertype IPv4 (0x0800), length 9014: (tos 0x0, ttl 64, id 33598, offset 0, flags [DF], proto UDP (17), length 9000)
9.30.183.47.46204 > 9.30.183.46.4789: VXLAN, flags [I] (0x08), vni 144
fa:16:3e:ea:22:3a > fa:16:3e:34:67:40, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 20224, offset 0, flags [none], proto ICMP (1), length 8950)
172.16.1.3 > 10.100.52.45: ICMP echo reply, id 17174, seq 1, length 8930
Security group bridge, Open vSwitch end of veth pair:
23:51:03.854359 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950)
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17174, seq 1, length 8930
23:51:03.854610 fa:16:3e:ea:22:3a > fa:16:3e:34:67:40, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 20224, offset 0, flags [none], proto ICMP (1), length 8950)
172.16.1.3 > 10.100.52.45: ICMP echo reply, id 17174, seq 1, length 8930
Security group bridge, Linux bridge end of veth pair:
23:51:03.854368 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950)
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17174, seq 1, length 8930
23:51:03.854604 fa:16:3e:ea:22:3a > fa:16:3e:34:67:40, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 20224, offset 0, flags [none], proto ICMP (1), length 8950)
172.16.1.3 > 10.100.52.45: ICMP echo reply, id 17174, seq 1, length 8930
VM tap interface:
3:51:03.854421 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950)
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17174, seq 1, length 8930
23:51:03.854573 fa:16:3e:ea:22:3a > fa:16:3e:34:67:40, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 20224, offset 0, flags [none], proto ICMP (1), length 8950)
172.16.1.3 > 10.100.52.45: ICMP echo reply, id 17174, seq 1, length 8930
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment