“ip ospf mtu-ignore” is a dangerous command
Two years ago I wrote about the problems caused by MTU mismatch between OSPF neighbors, and warned that the ip ospf mtu-ignore interface configuration command that supposedly solves the problem could cause significant headaches. Last week’s challenge was a simple illustration of what could happen if you force OSPF neighbors to establish a session even though their interface MTUs don’t match (the very first comment correctly identified the issue).
This is the router configuration I’ve used to generate the problem:
hostname A1 | hostname C1 |
The problem occurs when C1 drops the database description packet or a flooding packet sent by A1 exceeds because it exceeds the MTU size. The dropped packets appear as giants or overruns in the show interface printout.
And now for the really fun part:
- The problem is not completely reproducible. Sometimes the routers are willing to accept oversized packets, sometimes they drop them. This behavior is probably related to the IOS release and hardware platform used in the tests; it might also be triggered by a particular sequence of configuration commands.
- The problem appears (if at all) only when the OSPF database grows. Tests in a small lab might work fine, but the production network might crash.
- When the MTUs differ by only a few bytes, the setup might work for a long time until you happen to stumble across the correct combination of LSAs which generate the DBD or update packet of just the right size.
By definition, all hosts/routers connected to the same shared subnet must have the same MTU. Any workaround will eventually bite you.
Interface between two site is ethernet and Network in between is SP.
MTU configure on both side is 1542 but one thing I observe that I can't ping packet-size more then 1500 (with df bit or without df bit).
Kindly let me know, how I transparent SP issue for OSPF neighbor adjency.
I have also enter command ip ospf mtu-ignore but no use