2024-10-15 14:54:11 +0000 | received badge | ● Famous Question (source) |
2024-07-15 13:11:05 +0000 | received badge | ● Editor (source) |
2024-07-15 13:11:05 +0000 | edited question | How are these packets handled? How is these packets handled? Hello :-) I have a web server that often sending packets that are greater than MTU, while |
2024-07-15 13:06:29 +0000 | received badge | ● Notable Question (source) |
2024-07-15 13:06:29 +0000 | received badge | ● Popular Question (source) |
2022-04-13 09:29:52 +0000 | marked best answer | How are these packets handled? Hello :-) I have a web server that often sending packets that are greater than MTU, while having the DF flag (Don't Fragment) set. This seemingly works 99% of the time, but I cannot understand how this functions underneath. See screenshot from wireshark here: https://1drv.ms/u/s!Ar2R-UAQbAAomyFZu... Question is how is this handled? The packet capture was done on the server itself and I was suspecting "Large Segment Offloading" to silently split these packet into MTU size ones. But is it allowed to do so with DF set? or will the NIC simply drop the packet even before it reaches the network. Bonus info: This machine is located on a network where ICMP has been disabled, and I suspect this is why I never hear "Packet needs to be fragmented but DF set" back. Yet, like said, it seems to work almost all the time Environment: Windows 10 |
2022-04-13 09:29:52 +0000 | received badge | ● Scholar (source) |
2022-04-13 09:29:14 +0000 | received badge | ● Rapid Responder |
2022-04-13 09:29:14 +0000 | answered a question | How are these packets handled? Thank you very much fellas, for your quick responses. It is much appreciated. |
2022-04-13 07:52:19 +0000 | asked a question | How are these packets handled? How is these packets handled? Hello :-) I have a web server that often sending packets that are greater than MTU, while |