<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD IPSec MSS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167515#M1115476</link>
    <description>&lt;P&gt;Hi, we are using crypto policy. The FMC is&amp;nbsp;&lt;SPAN&gt;7.0.6.2 and the FTD is 6.4.0.18&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
    <pubDate>Thu, 29 Aug 2024 08:31:05 GMT</pubDate>
    <dc:creator>JACQUES DU PLESSIS</dc:creator>
    <dc:date>2024-08-29T08:31:05Z</dc:date>
    <item>
      <title>FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167449#M1115471</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;We have a FTD terminating a few IPSec tunnels. One of them are having connectivity issues with larger packets so we suspect that there is a smaller MTU set somewhere towards the destination. As far as I know the FTD can overwrite the endpoint MSS values (in fact I think the default is 1380), so the idea is to make that smaller to make the packet sizes smaller. But I only want to do that for the specific tunnel, not all of them.&lt;/P&gt;&lt;P&gt;Is that possible from a FTD/FMC perspective to only influence the mss of a single tunnel?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Jacques&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 07:05:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167449#M1115471</guid>
      <dc:creator>JACQUES DU PLESSIS</dc:creator>
      <dc:date>2024-08-29T07:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167452#M1115472</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; - Check if you have :&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt; FMC -&amp;gt; Devices -&amp;gt; Device management -&amp;gt; Interface -&amp;gt; MTU&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; (for changing MTU)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; M.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 07:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167452#M1115472</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2024-08-29T07:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167509#M1115474</link>
      <description>&lt;P&gt;are you using crypto policy VPN or VTI route based VPN? and which software versions are you running?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 08:25:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167509#M1115474</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-29T08:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167515#M1115476</link>
      <description>&lt;P&gt;Hi, we are using crypto policy. The FMC is&amp;nbsp;&lt;SPAN&gt;7.0.6.2 and the FTD is 6.4.0.18&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 08:31:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167515#M1115476</guid>
      <dc:creator>JACQUES DU PLESSIS</dc:creator>
      <dc:date>2024-08-29T08:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167601#M1115480</link>
      <description>&lt;P&gt;VPN IPsec option &amp;gt;ESPv3 setting &amp;gt; enable dont fragments policy&amp;gt;Df bit clear&lt;/P&gt;
&lt;P&gt;This will make ftd clear df bit recieve if that what you looking for&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 11:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167601#M1115480</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-29T11:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167649#M1115482</link>
      <description>&lt;P&gt;DF bit is cleared by deafult, so I doubt that is the issue here.&lt;/P&gt;
&lt;P&gt;I do not believe you can set the MTU / MSS on a per tunnel basis.&amp;nbsp; it is a global configuration so that will affect all tunnels.&amp;nbsp; Also, the base MTU is determined by the physical interface that the VPN is terminated on (for both policy based and route based VPN), but if all VPNs are associated with the same interface then changing the MTU on the physical interface will also affect all associated VPNs.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 13:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167649#M1115482</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-08-29T13:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167657#M1115484</link>
      <description>&lt;P&gt;VPN advance &amp;gt; ipsec &amp;gt; ipsec setting&amp;nbsp; &amp;gt; PMTU&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let IKE use PMTU to adjust mss automatic&lt;/P&gt;
&lt;P&gt;These two options I share hop solve your issue&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 13:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167657#M1115484</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-29T13:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167660#M1115485</link>
      <description>&lt;P&gt;One more option (this need to use with df bit clear)&lt;/P&gt;
&lt;P&gt;Advanced &amp;gt;ipsec&amp;gt; ipsec setting&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Enable Fragment before encrypt&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This make your FTD clear df bit and fragment packet before encrypt it&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 29 Aug 2024 13:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167660#M1115485</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-08-29T13:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: FTD IPSec MSS</title>
      <link>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167948#M1115502</link>
      <description>&lt;P&gt;df-bit clear etc may not help as if the MSS is 1380 it will never exceed the ipsec sa mtu and will never get fragmented before encryption .. the PMTUD also may get blocked etc... also return direction will have issue if other side doesnt do the same ..&lt;/P&gt;
&lt;P&gt;I wish that you were using VTI and FTD had a option to set per interface MSS like IOS (:: wish wish &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;What I would suggest just lower the MTU to ~1300 or inbetween 1300 and 1380 or test where it breaks..&lt;/P&gt;
&lt;P&gt;you may want to set df-bit and ping across the VPN to see where it fails that will give you a better idea of where to set the MSS..&lt;/P&gt;
&lt;P&gt;1300-1380 is not going to kill stuff especially with high bandwidth internet link.. it will change for all vpns and all traffic going through the box...&lt;/P&gt;
&lt;P&gt;i suggest&amp;nbsp; you can test with ping with DFbit set across non working and working vpn to see if the non working is a bit off.. I dont think it will be off by more than a few bytes.. maybe 1360 MSS might work...&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 06:35:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-ipsec-mss/m-p/5167948#M1115502</guid>
      <dc:creator>ccieexpert</dc:creator>
      <dc:date>2024-08-30T06:35:53Z</dc:date>
    </item>
  </channel>
</rss>

