Last active
January 18, 2016 02:39
-
-
Save ionosphere80/8a7aa01db29679fbad22 to your computer and use it in GitHub Desktop.
MTU experiments - capture of ping with 1373 payload and DF=1
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# ping -c 1 -s 1373 -M do 10.4.31.102 | |
PING 10.4.31.102 (10.4.31.102) 1373(1401) bytes of data. | |
--- 10.4.31.102 ping statistics --- | |
1 packets transmitted, 0 received, 100% packet loss, time 0ms | |
Neutron public network router interface (gateway): | |
20:29:16.506797 7e:27:12:8e:ab:89 > fa:16:3e:1b:0d:d3, ethertype IPv4 (0x0800), length 1415: (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto ICMP (1), length 1401) | |
10.4.31.1 > 10.4.31.102: ICMP echo request, id 5967, seq 1, length 1381 | |
Neutron public network router interface (gateway): | |
20:29:16.506833 fa:16:3e:1d:d1:a3 > fa:16:3e:bd:bf:3f, ethertype IPv4 (0x0800), length 1415: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 1401) | |
10.4.31.1 > 172.16.1.3: ICMP echo request, id 5967, seq 1, length 1381 | |
Neutron private network router interface, bridge end of veth pair: | |
20:29:16.506841 fa:16:3e:1d:d1:a3 > fa:16:3e:bd:bf:3f, ethertype IPv4 (0x0800), length 1415: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 1401) | |
10.4.31.1 > 172.16.1.3: ICMP echo request, id 5967, seq 1, length 1381 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment