<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MSS exceeded in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538355#M636155</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mitang,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can change the access-list as :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; "&gt;pixfirewall(config)#access-list http-list2 permit tcp host &lt;REMOTE location="" ip=""&gt; &lt;PORT&gt; host &lt;SERVER ip=""&gt; &lt;PORT&gt;.&lt;/PORT&gt;&lt;/SERVER&gt;&lt;/PORT&gt;&lt;/REMOTE&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; "&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;The following will help you understand the configuration :
&lt;/SPAN&gt;
&lt;STRONG&gt;MSS exceeded :&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; "&gt;To allow or drop packets whose data length exceeds the TCP maximum segment size set by the peer during a
three-way handshake, use the exceed-mss command in tcp-map configuration mode. &lt;/SPAN&gt;&lt;STRONG&gt;
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;set connection advanced-options :&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;To specify advanced TCP connection options within a policy-map for a traffic class, &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;use the set connection advanced-options command in class mode. &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;To remove advanced TCP connection options for a traffic class within a policy map, use the no form of this command.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;set connection advanced-options tcp-mapname no set connection advanced-options tcp-mapname&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do tell me if you need any further help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rahul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Sep 2010 12:59:15 GMT</pubDate>
    <dc:creator>rmavila</dc:creator>
    <dc:date>2010-09-28T12:59:15Z</dc:date>
    <item>
      <title>MSS exceeded</title>
      <link>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538352#M636064</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have asa 5540 and we are copy file from remote location to local server, we got Log on asa thats below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dropping TCP packet from outside: dest_ip to DMZ:Ip , reasone : MSS exceeded, MSS 1380, DATA 1480&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the reason of exceed ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are able to login sucessfully.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mitang R Prajapati.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538352#M636064</guid>
      <dc:creator>mitang.prajapati</dc:creator>
      <dc:date>2019-03-11T18:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: MSS exceeded</title>
      <link>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538353#M636084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mitang,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can please try the below :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="white-space: pre;"&gt;Configure access-list to match the traffic and apply it in a policy map as follows :&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;
pixfirewall(config)#access-list http-list2 permit tcp any any (or you can change the ACL to whatever traffic you want to allow the MSS for)
&lt;/SPAN&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;pixfirewall(config)#class-map http-map1
pixfirewall(config-cmap)#match access-list http-list2
pixfirewall(config-cmap)#exit
pixfirewall(config)#tcp-map mss-map
pixfirewall(config-tcp-map)#exceed-mss allow
pixfirewall(config-tcp-map)#exit
pixfirewall(config)#policy-map http-map1
pixfirewall(config-pmap)#class http-map1
pixfirewall(config-pmap-c)#set connection advanced-options mss-map
pixfirewall(config-pmap-c)#exit
pixfirewall(config-pmap)#exit
pixfirewall(config)#service-policy http-map1 interface outside&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do tell me how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Rahul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Sep 2010 11:22:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538353#M636084</guid>
      <dc:creator>rmavila</dc:creator>
      <dc:date>2010-09-27T11:22:09Z</dc:date>
    </item>
    <item>
      <title>Re: MSS exceeded</title>
      <link>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538354#M636127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello rahul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for support,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are not allowed on ASA 5540 firewall to permit any any .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could you tell me what purpose of this configuration ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mitang &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 03:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538354#M636127</guid>
      <dc:creator>mitang.prajapati</dc:creator>
      <dc:date>2010-09-28T03:21:18Z</dc:date>
    </item>
    <item>
      <title>Re: MSS exceeded</title>
      <link>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538355#M636155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mitang,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can change the access-list as :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; "&gt;pixfirewall(config)#access-list http-list2 permit tcp host &lt;REMOTE location="" ip=""&gt; &lt;PORT&gt; host &lt;SERVER ip=""&gt; &lt;PORT&gt;.&lt;/PORT&gt;&lt;/SERVER&gt;&lt;/PORT&gt;&lt;/REMOTE&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; "&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;The following will help you understand the configuration :
&lt;/SPAN&gt;
&lt;STRONG&gt;MSS exceeded :&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; "&gt;To allow or drop packets whose data length exceeds the TCP maximum segment size set by the peer during a
three-way handshake, use the exceed-mss command in tcp-map configuration mode. &lt;/SPAN&gt;&lt;STRONG&gt;
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;set connection advanced-options :&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;To specify advanced TCP connection options within a policy-map for a traffic class, &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;use the set connection advanced-options command in class mode. &lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;To remove advanced TCP connection options for a traffic class within a policy map, use the no form of this command.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;set connection advanced-options tcp-mapname no set connection advanced-options tcp-mapname&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;PRE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do tell me if you need any further help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Rahul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 12:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538355#M636155</guid>
      <dc:creator>rmavila</dc:creator>
      <dc:date>2010-09-28T12:59:15Z</dc:date>
    </item>
    <item>
      <title>Re: MSS exceeded</title>
      <link>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538356#M636186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just&amp;nbsp; another option, you can leverage the &lt;STRONG class="cCN_CmdName"&gt;&lt;EM&gt;sysopt connection tcpmss&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG class="cCN_CmdName"&gt; &lt;/STRONG&gt;&lt;SPAN class="cCN_CmdName"&gt;command to increase the maximum segment size on a global level if desired.&amp;nbsp; Cisco sets the MSS for ASA down to 1380 largely because of it's role as a flexible appliance (ex. for VPN reasons).&amp;nbsp; When I do deployments for non-VPN purposes, I always bump my MSS size up to allow for full 1500 MTU.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Christopher&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Sep 2010 22:53:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/mss-exceeded/m-p/1538356#M636186</guid>
      <dc:creator>Christopher.Hayre</dc:creator>
      <dc:date>2010-09-29T22:53:35Z</dc:date>
    </item>
  </channel>
</rss>

