Quantcast
Channel: MikroTik
Viewing all articles
Browse latest Browse all 15434

General • Possible L2 MTU issues with EoIP Tunnel and Bridge

$
0
0
Hello all:

I am using a RBwAPGR-5HacD2HnD for my home internet router. Its fed on LTE. To get around all the LTE double-nat junk, I'm also using wireguard to VPN everything from the router out to a pfsense box I own with a full public IP. Life is great, everything works awesome, all websites work flawlessly, etc., etc.

Now I want to throw into the mix an HD HomeRun TV tuner located off site. Unfortunately, these tuners are notorious for many (most?) applications not working when there's an L3 hop in the mix; they're designed and intended to be on the same LAN as the device using it. I had a spare old Mikrotik router hanging around, so I figured I'd set up an EoIP tunnel between them (not worry about additional encryption -- the device is actually located on a "secure" physical lan off the pfsense box that's handling my wireguard, so all the parts of the network that might matter for encryption are already encrypted by the wireguard link). I built my EoIP tunnel, added it to my bridge with ether1 in it at the home end, and built a bridge for it on the remote mikrotik with just the ports for the HDHR in it.

I set it up, and the HDHR, plugged into the far mikrotik gets an IP from my home mikrotik dhcp server, and I can brows the web pages using an IP from my lan..looks promising, but not quite fully working (autodetection didn't work with Jellyfin, and I still get extremely regular pauses in video when viewing 1080p, but works great with less resolutions. The total bandwidth usage is consistent with 720p and 1080p I am NOT hitting bandwidth limits.)

The weird thing is some web pages on the internet at large are no longer working at home. Three specific examples I've pinpointed are bankofamerica.com, yahoo.com, and duckduckgo.com. If I remove the EoIP interface from the bridge at home, all starts working just fine, and so far, the rest of the internet I've tested works fine (some sites seem to load more slowly, but I don't have empirical data to support that), although other occupants at home said "the internet is being wierd" and weren't able to be more specific. Once I removed the EoIP from the bridge, all went back to normal immediately.

My first thought is to suspect MTU issues on this. This feels like large packets not making it through (especially how 1080p video steams coming through the EoIP tunnel hiccup so regularly that makes me think its a packet that just exceeded the MTU and was dropped). I've fought similar issues before, and this "feels" like an MTU issue, but I could be completely wrong. In any case, I did a bunch of MTU-focused troubleshooting.

I noticed that the EoIP interface reports an actual MTU of 1378. I noticed on the bridge, it has a few different MTUs reported: Actual MTU (which changes to 1378 when the EoIP tunnel is bridged, resets to 1500 when it isn't, and an L2 MTU of 1598. I tried manually specifying my MTU to match the smaller 1378, but it didn't make a difference.

I did some more testing, with manual MTU discovery using ping and DF, and discovered that the internet traffic is in fact limited to a 1420 MTU due to the wireguard. Interestingly enough, even though the EoIP link showed a 1378 MTU, I could ping the HDHR across the link with an effective MTU of 1500! Also, when the bridge actual MTU was 1378 (due to the EoIP link bridged in), I saw no change in MTU to 1.1.1.1.

So now, I'm confused about what's going on. I really did not expect to be able to ping the HDHR with an effective MTU of 1500...That is going through the EoIP AND wireguard link! Especially when going through the wireguard alone I have the 1420 MTU. I would also assume that websites (using TCP) would not set the DF frame and thus would be fragmented when necessary and just work.

I'm not really sure where to go from here. It seems like there should be a solution....And my test cases also seem to conflict. Any ideas how to address this? I know in the past I set up a VPN system with ubnt gear that used ipsec and I think openvpn in tap mode with some MSS clamping and something else to force fragmentation when needed, and through that I was able to get a multicast and UDP through correctly that was definitely suffering from MTU-related packet drops. I'm not sure how to do that here, or if that is "the right answer".

Thanks for your help!

Statistics: Posted by JimKusz — Tue Jan 30, 2024 1:35 am



Viewing all articles
Browse latest Browse all 15434

Trending Articles