Created
January 18, 2016 02:24
-
-
Save ionosphere80/b44358b43af13de74f1f to your computer and use it in GitHub Desktop.
MTU experiments - capture of typical ping
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Neutron public network router interface (gateway): | |
20:08:05.126329 7e:27:12:8e:ab:89 > fa:16:3e:1b:0d:d3, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 51810, offset 0, flags [DF], proto ICMP (1), length 84) | |
10.4.31.1 > 10.4.31.102: ICMP echo request, id 2948, seq 1, length 64 | |
20:08:05.127928 fa:16:3e:1b:0d:d3 > 7e:27:12:8e:ab:89, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 9661, offset 0, flags [none], proto ICMP (1), length 84) | |
10.4.31.102 > 10.4.31.1: ICMP echo reply, id 2948, seq 1, length 64 | |
Neutron private network router interface, namespace end of veth pair: | |
20:08:05.126365 fa:16:3e:1d:d1:a3 > fa:16:3e:bd:bf:3f, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 51810, offset 0, flags [DF], proto ICMP (1), length 84) | |
10.4.31.1 > 172.16.1.3: ICMP echo request, id 2948, seq 1, length 64 | |
20:08:05.127910 fa:16:3e:bd:bf:3f > fa:16:3e:1d:d1:a3, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 9661, offset 0, flags [none], proto ICMP (1), length 84) | |
172.16.1.3 > 10.4.31.1: ICMP echo reply, id 2948, seq 1, length 64 | |
Neutron private network router interface, bridge end of veth pair: | |
20:08:05.126373 fa:16:3e:1d:d1:a3 > fa:16:3e:bd:bf:3f, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 51810, offset 0, flags [DF], proto ICMP (1), length 84) | |
10.4.31.1 > 172.16.1.3: ICMP echo request, id 2948, seq 1, length 64 | |
20:08:05.127903 fa:16:3e:bd:bf:3f > fa:16:3e:1d:d1:a3, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 9661, offset 0, flags [none], proto ICMP (1), length 84) | |
172.16.1.3 > 10.4.31.1: ICMP echo reply, id 2948, seq 1, length 64 | |
Neutron private network VXLAN interface, controller node end of overlay: | |
20:08:05.127020 fa:16:3e:1d:d1:a3 > fa:16:3e:bd:bf:3f, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 51810, offset 0, flags [DF], proto ICMP (1), length 84) | |
10.4.31.1 > 172.16.1.3: ICMP echo request, id 2948, seq 1, length 64 | |
20:08:05.127638 fa:16:3e:bd:bf:3f > fa:16:3e:1d:d1:a3, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 9661, offset 0, flags [none], proto ICMP (1), length 84) | |
172.16.1.3 > 10.4.31.1: ICMP echo reply, id 2948, seq 1, length 64 | |
Neutron private network VXLAN interface, compute node end of overlay: | |
20:08:05.127020 fa:16:3e:1d:d1:a3 (oui Unknown) > fa:16:3e:bd:bf:3f (oui Unknown), ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 51810, offset 0, flags [DF], proto ICMP (1), length 84) | |
10.4.31.1 > 172.16.1.3: ICMP echo request, id 2948, seq 1, length 64 | |
20:08:05.127638 fa:16:3e:bd:bf:3f (oui Unknown) > fa:16:3e:1d:d1:a3 (oui Unknown), ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 9661, offset 0, flags [none], proto ICMP (1), length 84) | |
172.16.1.3 > 10.4.31.1: ICMP echo reply, id 2948, seq 1, length 64 | |
VM, bridge end of tap interface: | |
20:08:05.127141 fa:16:3e:1d:d1:a3 > fa:16:3e:bd:bf:3f, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 63, id 51810, offset 0, flags [DF], proto ICMP (1), length 84) | |
10.4.31.1 > 172.16.1.3: ICMP echo request, id 2948, seq 1, length 64 | |
20:08:05.127615 fa:16:3e:bd:bf:3f > fa:16:3e:1d:d1:a3, ethertype IPv4 (0x0800), length 98: (tos 0x0, ttl 64, id 9661, offset 0, flags [none], proto ICMP (1), length 84) | |
172.16.1.3 > 10.4.31.1: ICMP echo reply, id 2948, seq 1, length 64 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment