Last active
January 26, 2016 00:46
-
-
Save ionosphere80/4e1389a34fd3a628b294 to your computer and use it in GitHub Desktop.
MTU experiments with Open vSwitch - capture of ping with 8922 payload and DF=1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Neutron public network router interface (gateway), IPv4: | |
17:09:06.741464 00:1a:64:f1:e8:39 > fa:16:3e:70:09:54, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 10.100.52.102: ICMP echo request, id 4859, seq 1, length 8930 | |
17:09:06.741542 fa:16:3e:70:09:54 > 00:1a:64:f1:e8:39, ethertype IPv4 (0x0800), length 590: (tos 0xc0, ttl 64, id 64195, offset 0, flags [none], proto ICMP (1), length 576) | |
10.100.52.102 > 10.100.52.45: ICMP 10.100.52.102 unreachable - need to frag (mtu 1500), length 556 | |
(tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 10.100.52.102: ICMP echo request, id 4859, seq 1, length 8930 | |
Neutron public network router interface (gateway), IPv6: | |
17:10:19.654987 00:1a:64:f1:e8:39 > fa:16:3e:70:09:54, ethertype IPv6 (0x86dd), length 8964: (hlim 64, next-header ICMPv6 (58) payload length: 8910) fd00:100:52::45 > fd00:100:52:1:f816:3eff:feea:223a: [icmp6 sum ok] ICMP6, echo request, seq 1 | |
17:10:19.655045 fa:16:3e:70:09:54 > 00:1a:64:f1:e8:39, ethertype IPv6 (0x86dd), length 1294: (hlim 64, next-header ICMPv6 (58) payload length: 1240) fd00:100:52::101 > fd00:100:52::45: [icmp6 sum ok] ICMP6, packet too big, mtu 1500 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment