<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 6.3 IPSec tunnels and MSS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488748#M1055420</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sysopt connection tcpmss &lt;VALUE&gt;&lt;/VALUE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default &lt;VALUE&gt; is 1380.&lt;/VALUE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck - Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Mar 2006 14:49:53 GMT</pubDate>
    <dc:creator>scottvivian</dc:creator>
    <dc:date>2006-03-02T14:49:53Z</dc:date>
    <item>
      <title>PIX 6.3 IPSec tunnels and MSS</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488744#M1055407</link>
      <description>&lt;P&gt;I have been looking to see if PIX 6.3 has the same capabilites as listed in the following link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/tech/tk827/tk369/technologies_white_paper09186a00800d6979.shtml" target="_blank"&gt;http://www.cisco.com/en/US/customer/tech/tk827/tk369/technologies_white_paper09186a00800d6979.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically we deploy IPSec tunnels to various clients, on the routers we have found it is very effective to implment the following on our routers to account for the additional headers added by a tunnel...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Tunnel0&lt;/P&gt;&lt;P&gt;  ip tcp adjust-mss 1370&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This uses TCP to adjust the host MTU so I don't have worry about packets being fragmented to pass through the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering if anyone know if there is an equilivant command on a PIX running 6.3 to do the same or if the perform this type of correction by defualt.  I am only able to find this on the routers, nothing either way on the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488744#M1055407</guid>
      <dc:creator>pruhnke79</dc:creator>
      <dc:date>2020-02-21T08:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3 IPSec tunnels and MSS</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488745#M1055408</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To my knowledge , FragGuard and virtual reassembly is a feature that provides IP fragment protection. This feature performs full reassembly of all ICMP error messages and virtual reassembly of the remaining IP fragments that are routed through the PIX Firewall. Virtual reassembly is currently enabled by default. This feature uses syslog to log any fragment overlapping and small fragment offset anomalies, especially those caused by a teardrop attack. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172790.html" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_configuration_guide_chapter09186a0080172790.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Jan 2006 17:37:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488745#M1055408</guid>
      <dc:creator>mchin345</dc:creator>
      <dc:date>2006-01-31T17:37:05Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3 IPSec tunnels and MSS</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488746#M1055413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a sysopt command on the PIX that does this, its set to 1460 by default I think. Do `sh sysopt' all the options are listed there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2006 20:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488746#M1055413</guid>
      <dc:creator>aacole</dc:creator>
      <dc:date>2006-02-13T20:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3 IPSec tunnels and MSS</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488747#M1055416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you probably already found this, but to add my $0.02 to the table.  the command is "sysopt connection tcpmss 1370", and the default MSS value for the PIX is 1380.  i've only seen this useful in PPPoX VPN issues, unless there is an intermediate link MTU that could also be causing your problem.  you might also looking into using "transport" mode in place of "tunnel" mode (default) in your ipsec configs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/karpenko/&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Feb 2006 07:17:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488747#M1055416</guid>
      <dc:creator>jkarpenk</dc:creator>
      <dc:date>2006-02-19T07:17:35Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3 IPSec tunnels and MSS</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488748#M1055420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sysopt connection tcpmss &lt;VALUE&gt;&lt;/VALUE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default &lt;VALUE&gt; is 1380.&lt;/VALUE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck - Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Mar 2006 14:49:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488748#M1055420</guid>
      <dc:creator>scottvivian</dc:creator>
      <dc:date>2006-03-02T14:49:53Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3 IPSec tunnels and MSS</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488749#M1055423</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey thanks for helping us out.&lt;/P&gt;&lt;P&gt;Signed,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Goatboy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Mar 2006 14:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488749#M1055423</guid>
      <dc:creator>glenthms</dc:creator>
      <dc:date>2006-03-11T14:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 6.3 IPSec tunnels and MSS</title>
      <link>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488750#M1055425</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use  sysopt connection tcpmss &lt;BYTES&gt; command.&lt;/BYTES&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if you find this useful&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Rakesh &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Mar 2006 20:14:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-6-3-ipsec-tunnels-and-mss/m-p/488750#M1055425</guid>
      <dc:creator>hegderakesh</dc:creator>
      <dc:date>2006-03-17T20:14:31Z</dc:date>
    </item>
  </channel>
</rss>

