Hi,

On Mon, Nov 04, 2013 at 07:52:57AM -0500, Pietro Paolini wrote:
> I am working for an embedded Linux firmware running on a CPE and I am 
> using an IP4 over IPv6 tunnel configured as following:
> 
> ip -f inet6 tunnel add tun1 mode ipip6 remote XX:XX:XX local XX:XX:XX 
> dev eth0

By setting an appropriate MTU on the tun1 interface ("outer mtu minus
ipv6 header size") you should see the fragmentation happen only on
the IPv6 side of things.

What you are doing is telling the stack "yes, tun1 can take my 1500 byte
packets just fine!", and then the resulting packet will be too large for
the IPv4 path it takes (which is not necessarily so, you could have an
IPv4 MTU of 9000 bytes... who knows), so it needs to fragment IPv4,
but at that point in time, IPv6 is "just payload" so it can't do anything
about the IPv6 packet anymore (aka "send back ICMP PTB").

[..]
> Is there any options to disable the fragmentation on IPV4  ? 

In that case, you'd need to drop the IPv4 packet.  Gain?  Zero :-)

gert
-- 
USENET is *not* the non-clickable part of WWW!
                                                           //www.muc.de/~gert/
Gert Doering - Munich, Germany                             g...@greenie.muc.de
fax: +49-89-35655025                        g...@net.informatik.tu-muenchen.de

Attachment: pgpcLQWMPETFP.pgp
Description: PGP signature

_______________________________________________
openwrt-devel mailing list
openwrt-devel@lists.openwrt.org
https://lists.openwrt.org/cgi-bin/mailman/listinfo/openwrt-devel

Reply via email to