<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MSS clamping IPSEC tunnel -ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4757076#M1096941</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; This is very helpful. Thank you!! I believe the approach will be to make the MSS change from 1380 to 1356 using&lt;/P&gt;&lt;P&gt;"sysopt connection tcpmss 1356"&amp;nbsp; and then check the status of the l2l tunnels using "show crypto ipsec sa" and associated commands.&lt;/P&gt;&lt;P&gt;Are there any show commands that will show the default MSS is now changed or just check the running config?&lt;/P&gt;&lt;P&gt;Changing the MSS value will not require us to reload the FW correct?&lt;/P&gt;</description>
    <pubDate>Wed, 18 Jan 2023 22:38:42 GMT</pubDate>
    <dc:creator>Kevin Michael Pratt</dc:creator>
    <dc:date>2023-01-18T22:38:42Z</dc:date>
    <item>
      <title>MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756061#M1096878</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;We have a number of ipsec tunnels on our ASA&amp;nbsp; 5545 running software version 9.6.&lt;/P&gt;&lt;P&gt;We have deployed a cloud based DDOS solution using GRE tunnels for any inbound traffic ingressing into the network via the internet upstream of the ASAs. Hence the ASAs are downstream of our internet routers (ASR platform) that have traffic ingressing into them via the GRE tunnels from the DDOS provider. The physical connections to the ISP already have the TCP MSS adjust value configured. &amp;nbsp;&lt;/P&gt;&lt;P&gt;The vendor also recommends configuring MSS values&amp;nbsp; at the IPsec tunnels.&amp;nbsp; here is their recommendation :&lt;/P&gt;&lt;P&gt;&lt;EM&gt;If you are using IPsec inside GRE, set the MSS clamp at the IPsec tunnel interface and subtract 24 bytes from your current MSS value, which may be 1360 bytes or lower. This is because the physical interface will see IPsec-encrypted packets, not TCP packets, and MSS clamping will not apply to those.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;A few questions regarding this:&lt;/P&gt;&lt;P&gt;What or is there a&amp;nbsp; command that could be run on the ASA to see the current MSS value of the IPSEC tunnels?&lt;/P&gt;&lt;P&gt;Since our existing IPsec tunnels are up and passing traffic, will changing the MSS value cause an impact to traffic ?&lt;/P&gt;&lt;P&gt;Is there any links that show the proper configuration changes to make in order to adjust the MSS value for IPsec on an ASA?&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 15:04:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756061#M1096878</guid>
      <dc:creator>Kevin Michael Pratt</dc:creator>
      <dc:date>2023-01-17T15:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756139#M1096885</link>
      <description>&lt;PRE&gt;ciscoasa(config)# &lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt;
interface: outside2
    Crypto map tag: def, local addr: 10.132.0.17
      local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)
      remote ident (addr/mask/prot/port): (172.20.0.21/255.255.255.255/0/0)
      local ident (addr/mask/prot/port): (::/0/0/0)
      remote ident (addr/mask/prot/port): (3000::1/128/0/0)
      current_peer: 172.20.0.21
      dynamic allocated peer ip: 10.135.1.5
      dynamic allocated peer ip(ipv6): 3000::1
      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
      #pkts decaps: 1145, #pkts decrypt: 1145, #pkts verify: 1145
      #pkts compressed: 0, #pkts decompressed: 0
      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
      #pre-frag successes: 2, #pre-frag failures: 1, #fragments created: 10
      #PMTUs sent: 5, #PMTUs rcvd: 2, #decapstulated frags needing reassembly: 1
      #send errors: 0, #recv errors: 0
      local crypto endpt.: 10.132.0.17, remote crypto endpt.: 172.20.0.21
      &lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;path mtu 1500, ipsec overhead 60, media mtu 1500&lt;/STRONG&gt;&lt;/FONT&gt;
      current outbound spi: DC15BF68
    inbound esp sas:
      spi: 0x1E8246FC (511854332)
         transform: esp-3des esp-md5-hmac
         in use settings ={L2L, Transport, Manual key, (OSPFv3), }
         slot: 0, conn_id: 3, crypto-map: def
         sa timing: remaining key lifetime (sec): 548
         IV size: 8 bytes
         replay detection support: Y&lt;/PRE&gt;</description>
      <pubDate>Tue, 17 Jan 2023 18:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756139#M1096885</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-17T18:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756151#M1096887</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; Thanks very much for&amp;nbsp; the quick reply!&lt;/P&gt;&lt;P&gt;Could you please elaborate on the below, i looked at an existing connection on an ASA and noticed the following&lt;/P&gt;&lt;P&gt;path mtu 1500, ipsec overhead 74(44), media mtu 1500&lt;/P&gt;&lt;P&gt;Am i reading it correctly that the tunnel is using 74 bytes overhead? What is the meaning of the number in parenthesis - (44)?&lt;/P&gt;&lt;P&gt;Found the below link - &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/interface-mtu.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config/interface-mtu.html&lt;/A&gt; which states by default ASA is using an MSS value of 1380, and that the necessary configuration to modify the MSS value would be the command&amp;nbsp; "sysopt connection tcpmss 1356" say if we wanted to change the MSS from 1380 to 1356.&amp;nbsp; Am i on the correct path?&lt;/P&gt;&lt;P&gt;I am assuming that making the change will cause the tunnels to bounce correct?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 18:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756151#M1096887</guid>
      <dc:creator>Kevin Michael Pratt</dc:creator>
      <dc:date>2023-01-17T18:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756156#M1096888</link>
      <description>&lt;P&gt;I will run lab and config L2L VPN between two ASA and show the MTU values appear for each case I will test.&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jan 2023 18:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756156#M1096888</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-17T18:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756952#M1096931</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; I know your busy, curious if any progress was made with the lab for the L2L VPN and the different MSS/MTU scenarios? We are looking to complete implementation of this in the next two weeks and want to ensure that we have the steps correct. Appreciate your help with this.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 18:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4756952#M1096931</guid>
      <dc:creator>Kevin Michael Pratt</dc:creator>
      <dc:date>2023-01-18T18:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4757023#M1096939</link>
      <description>&lt;P&gt;in ASA&amp;nbsp;&lt;BR /&gt;show crypto ipsec sa&amp;nbsp;&lt;BR /&gt;give us some info. about the MTU use in IPsec and overhead,&amp;nbsp;&lt;BR /&gt;let start&amp;nbsp;&lt;BR /&gt;show crypto ipsec sa &amp;lt;&amp;lt;- without change the config of ASA OUT interface, so it default equal to media mtu = 1500&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (221).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/173710iF15FAC925413F7DB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (221).png" alt="Screenshot (221).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I change the MTU for ASA OUT interface to be 1450,&amp;nbsp;&lt;BR /&gt;now the path MTU will be 1450 BUT the media MTU still default equal to 1500 (media here is ethernet).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (222).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/173711i49AF0594D838F893/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (222).png" alt="Screenshot (222).png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;show crypto ipsec sa &amp;lt;&amp;lt;- also show us overhead, overhead is depend on the transform set you config&amp;nbsp;&lt;BR /&gt;the show crypto ipsec sa also show us what transform set we use in VPN, here in my lab I use&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;esp-ase-256 esp-sha-hmac&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (223).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/173712iA6A666A300644B1E/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (223).png" alt="Screenshot (223).png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;but he we can calculate it,&amp;nbsp;&lt;BR /&gt;the cisco have nice online calculator, you can use it to count the IPsec overhead (note it within range +- 4 bytes) but it very helpful&amp;nbsp;&lt;BR /&gt;&lt;A href="https://cway.cisco.com/ipsec-overhead-calculator/" target="_blank"&gt;IPsec Overhead Calculator (cisco.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 20:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4757023#M1096939</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-18T20:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4757076#M1096941</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; This is very helpful. Thank you!! I believe the approach will be to make the MSS change from 1380 to 1356 using&lt;/P&gt;&lt;P&gt;"sysopt connection tcpmss 1356"&amp;nbsp; and then check the status of the l2l tunnels using "show crypto ipsec sa" and associated commands.&lt;/P&gt;&lt;P&gt;Are there any show commands that will show the default MSS is now changed or just check the running config?&lt;/P&gt;&lt;P&gt;Changing the MSS value will not require us to reload the FW correct?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2023 22:38:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4757076#M1096941</guid>
      <dc:creator>Kevin Michael Pratt</dc:creator>
      <dc:date>2023-01-18T22:38:42Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4758901#M1097016</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; Any update regarding the following? Again thank you for your research and quick help!&lt;/P&gt;&lt;P&gt;Are there any show commands that will show the default MSS is now changed or just check the running config?&lt;/P&gt;&lt;P&gt;Changing the MSS value will not require us to reload the FW correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jan 2023 18:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4758901#M1097016</guid>
      <dc:creator>Kevin Michael Pratt</dc:creator>
      <dc:date>2023-01-20T18:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4759179#M1097050</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (229).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/173894i40A4C7D56A37ABAE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (229).png" alt="Screenshot (229).png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;if you change the TCP MSS with&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;sysopt connection tcpmss 1356 &amp;lt;&amp;lt;-&lt;BR /&gt;&lt;/SPAN&gt;you can see the new value via&amp;nbsp;&lt;BR /&gt;show run all sysopt&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;for the need if reload the ASA FW after change the TCP MSS, I run lab as you can see I change the TCP MSS to be 450 and I dont need to reload, the new tcp value was set to 450, automatic.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 21 Jan 2023 19:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4759179#M1097050</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-01-21T19:59:54Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4766916#M1097385</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp; I am sorry that I did not respond sooner to this, Thank&amp;nbsp; You very much for your diligent work! This is very helpful.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 17:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4766916#M1097385</guid>
      <dc:creator>Kevin Michael Pratt</dc:creator>
      <dc:date>2023-02-01T17:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: MSS clamping IPSEC tunnel -ASA</title>
      <link>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4766917#M1097386</link>
      <description>&lt;P&gt;You are so so welcome&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Feb 2023 17:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-clamping-ipsec-tunnel-asa/m-p/4766917#M1097386</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-01T17:25:07Z</dc:date>
    </item>
  </channel>
</rss>

