Last active
January 26, 2016 00:18
-
-
Save ionosphere80/dd9270aae23ad286d9cd to your computer and use it in GitHub Desktop.
MTU experiments with Open vSwitch - capture of ping with 8922 payload and DF=1, increasing qvb interface MTU to 8950
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Neutron private network VXLAN underlying interface, compute node end of overlay: | |
23:49:59.680515 00:1a:64:f1:e5:74 > 00:1a:64:f1:df:74, ethertype IPv4 (0x0800), length 9014: (tos 0x0, ttl 64, id 19312, offset 0, flags [DF], proto UDP (17), length 9000) | |
9.30.183.46.46263 > 9.30.183.47.4789: VXLAN, flags [I] (0x08), vni 144 | |
fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17172, seq 1, length 8930 | |
Security group bridge, Open vSwitch end of veth pair: | |
23:49:59.680939 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17172, seq 1, length 8930 | |
Security group bridge, Linux bridge end of veth pair: | |
23:49:59.680950 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950) | |
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17172, seq 1, length 8930 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment