Skip to content

Instantly share code, notes, and snippets.

@ionosphere80
Last active January 26, 2016 00:18
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save ionosphere80/dd9270aae23ad286d9cd to your computer and use it in GitHub Desktop.
Save ionosphere80/dd9270aae23ad286d9cd to your computer and use it in GitHub Desktop.
MTU experiments with Open vSwitch - capture of ping with 8922 payload and DF=1, increasing qvb interface MTU to 8950
Neutron private network VXLAN underlying interface, compute node end of overlay:
23:49:59.680515 00:1a:64:f1:e5:74 > 00:1a:64:f1:df:74, ethertype IPv4 (0x0800), length 9014: (tos 0x0, ttl 64, id 19312, offset 0, flags [DF], proto UDP (17), length 9000)
9.30.183.46.46263 > 9.30.183.47.4789: VXLAN, flags [I] (0x08), vni 144
fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950)
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17172, seq 1, length 8930
Security group bridge, Open vSwitch end of veth pair:
23:49:59.680939 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950)
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17172, seq 1, length 8930
Security group bridge, Linux bridge end of veth pair:
23:49:59.680950 fa:16:3e:34:67:40 > fa:16:3e:ea:22:3a, ethertype IPv4 (0x0800), length 8964: (tos 0x0, ttl 63, id 0, offset 0, flags [DF], proto ICMP (1), length 8950)
10.100.52.45 > 172.16.1.3: ICMP echo request, id 17172, seq 1, length 8930
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment