<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MTU Problem with Ipsec Tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633024#M1054812</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That should go on the remote side. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 11 Sep 2006 18:32:06 GMT</pubDate>
    <dc:creator>hadbihas</dc:creator>
    <dc:date>2006-09-11T18:32:06Z</dc:date>
    <item>
      <title>MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633022#M1054807</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a customer who finds random problems to be connected, through VPN IPSEC, to a remote web server. Below you can find router's log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.Sep 8 12:24:52: CRYPTO_ENGINE: locally-sourced pkt w/DF bit set is too big,ip-&amp;gt;tl=1443, mtu=1384&lt;/P&gt;&lt;P&gt;.Sep 8 12:24:52: ICMP: dst (x.x.x.x) frag. needed and DF set unreachable sent to x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is NAT overload with FastEth ip address. I think that the problem is MTU negotiation. ICMP unreachable is active on ours routers and firewalls and PMTUD is running on web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have read &lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk827/tk36...0d6979.shtml#t5" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk827/tk36...0d6979.shtml#t5&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The situation is that one described in "scenario 8".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you help me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:09:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633022#M1054807</guid>
      <dc:creator>sema-atos</dc:creator>
      <dc:date>2020-02-21T09:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633023#M1054810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try to set the tcp adjust-mss as well.  I would change/add the following to the FastEth interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip mtu 1435&lt;/P&gt;&lt;P&gt;ip tcp adjust-mss 1340&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if it works,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ihab&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Sep 2006 18:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633023#M1054810</guid>
      <dc:creator>hadbihas</dc:creator>
      <dc:date>2006-09-11T18:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633024#M1054812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That should go on the remote side. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Sep 2006 18:32:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633024#M1054812</guid>
      <dc:creator>hadbihas</dc:creator>
      <dc:date>2006-09-11T18:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633025#M1054816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have added the parameters to the port but the result is not changed: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.Sep 13 14:53:24: ICMP: echo reply sent, src x.x.x.x, dst x.x.x.x&lt;/P&gt;&lt;P&gt;.Sep 13 14:53:24: CRYPTO_ENGINE: locally-sourced pkt w/DF bit set is too big,ip-&lt;/P&gt;&lt;P&gt;&amp;gt;tl=1443, mtu=1326&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you think?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Sep 2006 12:22:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633025#M1054816</guid>
      <dc:creator>sema-atos</dc:creator>
      <dc:date>2006-09-13T12:22:51Z</dc:date>
    </item>
    <item>
      <title>Re: MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633026#M1054819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my case, the core has "Do not fragment prior to IPSec encapsulation; fragment prior to interface transmission" is set.  The same can be done using IOS.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remote side (client side), my above suggestion for the MTU and MSS should resolve the problem, however you'll have to keep trying by lowering the MTU and MSS values.  Refer to this link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a00804247fc.html" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a00804247fc.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another good way to find out the necessary MTU size is by installing "Dr. TCP" on the remote machine and keep changing the MTU size on the same machine while failing to access the web server until you find out what size works ok.. then you set it on the router (and maybe use the above document to factor in the MSS size).  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Sep 2006 14:56:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633026#M1054819</guid>
      <dc:creator>hadbihas</dc:creator>
      <dc:date>2006-09-13T14:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633027#M1054822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you try &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip tcp adjust-mss &lt;MAX-SEGMENT-SIZE&gt;&lt;/MAX-SEGMENT-SIZE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;option?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Sep 2006 16:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633027#M1054822</guid>
      <dc:creator>volkov</dc:creator>
      <dc:date>2006-09-13T16:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633028#M1054825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've had the same issue with our HQ VPN to foreign office, with the HQ VPN DF flag set like you described. If the web server is MS IIS try appling MS black hole detect reg edit. This resolved our issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Sep 2006 20:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633028#M1054825</guid>
      <dc:creator>smith.jonathan</dc:creator>
      <dc:date>2006-09-20T20:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633029#M1054826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the same problem ...our provider using Layer 3 switch that is directly attached to our VPN equipment ....so wher provider put ip mtu on switch interface we solve the problem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2006 07:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633029#M1054826</guid>
      <dc:creator>fisko</dc:creator>
      <dc:date>2006-11-29T07:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: MTU Problem with Ipsec Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633030#M1054827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is your VPN terminating device.&lt;/P&gt;&lt;P&gt;This is a fragmentation problem. The DF (Dont Fragment) bit is set to a high value. In cisco PIX, it is set by default to 24. i.e an interface with DF bit on will allow up to 24 fragmented packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just check the output of &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show fragment&lt;/P&gt;&lt;P&gt;You can disable fragmentation on any interace in pix by&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fragment chain 1 outside(or inside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2006 13:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-problem-with-ipsec-tunnel/m-p/633030#M1054827</guid>
      <dc:creator>zubairjalal</dc:creator>
      <dc:date>2006-11-29T13:39:10Z</dc:date>
    </item>
  </channel>
</rss>

