PS: Here is the tcpdump:

:
09:38:32.605298 a4:d1:8c:e5:e8:50 > 80:ee:73:95:c1:0d, ethertype IPv6 (0x86dd), 
length 1510: (flowlabel 0xe21e2, hlim 64, next-header Fragment (44) payload 
length: 1456) 2001:db8:0:1:3dfa:f382:2017:d7f7 > 2001:db8:0:2::63: frag 
(0xd1710203:0|1448) 4500 > 4500
09:38:32.605305 a4:d1:8c:e5:e8:50 > 80:ee:73:95:c1:0d, ethertype IPv6 (0x86dd), 
length 1090: (flowlabel 0xe21e2, hlim 64, next-header Fragment (44) payload 
length: 1036) 2001:db8:0:1:3dfa:f382:2017:d7f7 > 2001:db8:0:2::63: frag 
(0xd1710203:1448|1028)
09:38:32.607411 80:ee:73:95:c1:0d > a4:d1:8c:e5:e8:50, ethertype IPv6 (0x86dd), 
length 1294: (hlim 64, next-header ICMPv6 (58) payload length: 1240) 
2001:db8:0:1::2 > 2001:db8:0:1:3dfa:f382:2017:d7f7: [icmp6 sum ok] ICMP6, 
packet too big, mtu 1280
09:38:32.700898 84:1b:5e:49:b9:64 > 01:80:c2:00:00:00, 802.3, length 52: LLC, 
dsap STP (0x42) Individual, ssap STP (0x42) Command, ctrl 0x03: STP 802.1d, 
Config, Flags [none], bridge-id 8000.84:1b:5e:49:b9:65.8003, length 35
:

Regards
Harri
_______________________________________________
Users mailing list
[email protected]
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to