Hi Joe, > > Ole > > Tunnel fragments must be reassembled by the receiver - that’s a fundamental > point of the document. The mechanism used for fragmentation > and reassembly happens on the packet being tunneled, not within that packet. > That is what outer fragmentation refers to - not necessarily > fragmentation at the outermost IP layer. > > I.e., yes, we can avoid use of IP fragmentation IF there are other protocol > layers available as part of tunnel encapsulation. But regardless of > method used, the tunnel endpoint MUST do the reassembly. > > That clarification can be added.
At least one tunneling protocol has a means of discarding spurious fragments before admitting them into the reassembly cache. The draft should provide a recommendation for filtering of spurious fragments. Thank you - Fred _______________________________________________ Int-area mailing list -- int-area@ietf.org To unsubscribe send an email to int-area-le...@ietf.org