Hi Joe,

> > Ole
> 
> Tunnel fragments must be reassembled by the receiver - that’s a fundamental 
> point of the document. The mechanism used for fragmentation
> and reassembly happens on the packet being tunneled, not within that packet. 
> That is what outer fragmentation refers to - not necessarily
> fragmentation at the outermost IP layer.
> 
> I.e., yes, we can avoid use of IP fragmentation IF there are other protocol 
> layers available as part of tunnel encapsulation. But regardless of
> method used, the tunnel endpoint MUST do the reassembly.
> 
> That clarification can be added.

At least one tunneling protocol has a means of discarding spurious fragments 
before
admitting them into the reassembly cache. The draft should provide a 
recommendation
for filtering of spurious fragments.

Thank you - Fred
_______________________________________________
Int-area mailing list -- int-area@ietf.org
To unsubscribe send an email to int-area-le...@ietf.org

Reply via email to