<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MTU issues with a VPN appliance connecting through FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248213#M1118872</link>
    <description>&lt;P&gt;Version 7.4.2.1 of FTD.&amp;nbsp; Running FMC version 7.4.2.1&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jan 2025 17:40:58 GMT</pubDate>
    <dc:creator>Ricky Sandhu</dc:creator>
    <dc:date>2025-01-16T17:40:58Z</dc:date>
    <item>
      <title>MTU issues with a VPN appliance connecting through FTD</title>
      <link>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248155#M1118865</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp; I have a client PC which occasionally needs to upload large amount of data to a server at another company who we have an IPSEC VPN tunnel with.&amp;nbsp; I have attached a rough drawing of this setup.&amp;nbsp; We recently upgraded from an ASA to Cisco FTD appliance.&amp;nbsp; Client is sitting on the internal network connected to E1/1 and the VPN appliance sits inside the DMZ.&amp;nbsp; I am running into issues with the MTU.&amp;nbsp; From the client, I can't ping the server with packets larger than 1379 bytes.&amp;nbsp; Smaller packets have no issues getting through.&lt;/P&gt;&lt;P&gt;I understand IPSEC adds additional overhead which should be taken into account.&amp;nbsp; In the past, on IOS routers, I have been able to configure things like path MTU, and even decreased TCP MSS down to 1360 bytes but I have no idea how to do this on the FTD.&amp;nbsp; I did refer to Cisco documents and configured Flex policy where I changed the default TCPMSS on the FTD to 1360 however client is still having issues.&amp;nbsp; What am I doing wrong?&amp;nbsp; Please advise.&amp;nbsp; Thank you for your support.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="MTL-VPN.png" style="width: 702px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/237735i6604370C23B8EB02/image-dimensions/702x445?v=v2" width="702" height="445" role="button" title="MTL-VPN.png" alt="MTL-VPN.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 15:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248155#M1118865</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2025-01-16T15:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: MTU issues with a VPN appliance connecting through FTD</title>
      <link>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248199#M1118871</link>
      <description>&lt;P&gt;Version?&amp;nbsp; Platform?&amp;nbsp; FMC or FDM?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 17:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248199#M1118871</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-01-16T17:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: MTU issues with a VPN appliance connecting through FTD</title>
      <link>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248213#M1118872</link>
      <description>&lt;P&gt;Version 7.4.2.1 of FTD.&amp;nbsp; Running FMC version 7.4.2.1&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 17:40:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248213#M1118872</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2025-01-16T17:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: MTU issues with a VPN appliance connecting through FTD</title>
      <link>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248959#M1118915</link>
      <description>&lt;H5 class="title sectiontitle"&gt;Each VPN have it PMTU to dynamically adjust the MTU&lt;BR /&gt;the config of PMTU you can find in IPsec setting&amp;nbsp;&amp;nbsp;&lt;/H5&gt;
&lt;H5 class="title sectiontitle"&gt;Advanced &amp;gt; IPsec &amp;gt; IPsec Settings&lt;/H5&gt;
&lt;DL class="dl"&gt;
&lt;DT class="dt dlterm"&gt;Enable Fragmentation Before Encryption&lt;/DT&gt;
&lt;DD class="dd"&gt;This option lets traffic travel across NAT devices that don’t support IP fragmentation. It doesn’t impede the operation of NAT devices that do support IP fragmentation.&lt;/DD&gt;
&lt;DT class="dt dlterm"&gt;Path Maximum Transmission Unit Aging&lt;/DT&gt;
&lt;DD class="dd"&gt;Check to enable Path Maximum Transmission Unit (PMTU) Aging, the interval to reset the PMTU of a Security Association (SA).&lt;/DD&gt;
&lt;DT class="dt dlterm"&gt;Value Reset Interval&lt;/DT&gt;
&lt;DD class="dd"&gt;Enter the number of minutes at which the PMTU value of an SA is reset to its original value. Valid range is 10 to 30 minutes, default is unlimited.&lt;/DD&gt;
&lt;/DL&gt;</description>
      <pubDate>Sat, 18 Jan 2025 13:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mtu-issues-with-a-vpn-appliance-connecting-through-ftd/m-p/5248959#M1118915</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-18T13:53:54Z</dc:date>
    </item>
  </channel>
</rss>

