<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PMTU-D packet 1420 bytes greater than effective mtu 1396, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487122#M662001</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply but have not had any success when I configured it with what you have suggested.&amp;nbsp; I previously had an entry in there and did some changes to the value but still had issues accessing other web sites.&amp;nbsp; I will attempt to try it again tonight and see how far I get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Jul 2010 01:21:45 GMT</pubDate>
    <dc:creator>Joe Montes</dc:creator>
    <dc:date>2010-07-13T01:21:45Z</dc:date>
    <item>
      <title>PMTU-D packet 1420 bytes greater than effective mtu 1396,</title>
      <link>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487120#M661978</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Recently received an ASA5510 for testing and just installed it on my home dsl service.&amp;nbsp; I can go to certain web sites but on certain sites I can not.&amp;nbsp; I've followed some of the postings and also this one, &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00804c8b9f.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a00804c8b9f.shtml&lt;/A&gt;&lt;SPAN&gt;. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a SonicWALL and a Netscreen firewal before and both of them just worked fine.&amp;nbsp; I'm no ASA expert so apologies in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.3(1) &lt;BR /&gt;!&lt;BR /&gt;hostname asa&lt;BR /&gt;domain-name montes.com.au&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; description external interface&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group tpg&lt;BR /&gt; ip address pppoe setroute &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description DV Network&lt;BR /&gt; speed 1000&lt;BR /&gt; duplex full&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.28.8.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description Cisco Virtual Office&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif work&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.28.7.33 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; description lab &amp;amp; test network&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif lab&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.28.7.30 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; speed 100&lt;BR /&gt; duplex full&lt;BR /&gt; nameif mgmt&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.28.7.129 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST 10&lt;BR /&gt;clock summer-time EDT recurring last Sun Oct 2:00 last Sun Mar 3:00&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name montes.com.au&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network L3_WLAN &lt;BR /&gt; subnet 172.28.7.160 255.255.255.224&lt;BR /&gt; description L3 WLAN&amp;nbsp; &lt;BR /&gt;object network L1_WLAN &lt;BR /&gt; subnet 172.28.7.64 255.255.255.224&lt;BR /&gt; description L1 WLAN &lt;BR /&gt;object-group network DVNET_Network&lt;BR /&gt; network-object 172.28.7.0 255.255.255.224&lt;BR /&gt; network-object 172.28.7.128 255.255.255.224&lt;BR /&gt; network-object 172.28.7.32 255.255.255.224&lt;BR /&gt; network-object 172.28.8.0 255.255.255.0&lt;BR /&gt; network-object object L1_WLAN&lt;BR /&gt; network-object object L3_WLAN&lt;BR /&gt;access-list http-list2 extended permit tcp any any log &lt;BR /&gt;access-list 101 extended permit icmp any any unreachable &lt;BR /&gt;access-list 101 extended permit icmp any any time-exceeded &lt;BR /&gt;access-list 101 extended deny icmp any any &lt;BR /&gt;access-list 101 extended permit ip any any &lt;BR /&gt;!&lt;BR /&gt;tcp-map mss-map&lt;BR /&gt;!&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging debug-trace&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu work 1400&lt;BR /&gt;mtu lab 1400&lt;BR /&gt;mtu mgmt 1400&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (lab,outside) source dynamic any interface&lt;BR /&gt;nat (work,outside) source dynamic any interface&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;nat (inside,outside) source dynamic L1_WLAN interface dns&lt;BR /&gt;nat (inside,outside) source dynamic L3_WLAN interface dns&lt;BR /&gt;access-group 101 in interface outside&lt;BR /&gt;route inside 172.28.7.64 255.255.255.224 172.28.8.66 1&lt;BR /&gt;route inside 172.28.7.160 255.255.255.224 172.28.8.161 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 172.28.8.98 255.255.255.255 inside&lt;BR /&gt;http 172.28.7.0 255.255.255.224 lab&lt;BR /&gt;http 172.28.7.128 255.255.255.224 mgmt&lt;BR /&gt;http 172.28.7.32 255.255.255.224 work&lt;BR /&gt;http 172.28.8.0 255.255.255.0 inside&lt;BR /&gt;http redirect lab 80&lt;BR /&gt;http redirect work 80&lt;BR /&gt;http redirect mgmt 80&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;sysopt connection tcpmss 0&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto ipsec df-bit clear-df outside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group tpg request dialout pppoe&lt;BR /&gt;vpdn group tpg localname jmontes&lt;BR /&gt;vpdn group tpg ppp authentication pap&lt;BR /&gt;vpdn username jmontes password ***** &lt;BR /&gt;dhcpd address 172.28.8.159-172.28.8.171 inside&lt;BR /&gt;dhcpd dns 203.12.160.35 203.12.160.36 interface inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.28.7.40-172.28.7.41 work&lt;BR /&gt;dhcpd dns 203.12.160.35 203.12.160.36 interface work&lt;BR /&gt;dhcpd enable work&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.28.7.5-172.28.7.6 lab&lt;BR /&gt;dhcpd dns 203.12.160.35 203.12.160.36 interface lab&lt;BR /&gt;dhcpd enable lab&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 172.28.7.135-172.28.7.136 mgmt&lt;BR /&gt;dhcpd dns 203.12.160.35 203.12.160.36 interface mgmt&lt;BR /&gt;dhcpd enable mgmt&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;dynamic-filter updater-client enable&lt;BR /&gt;dynamic-filter use-database&lt;BR /&gt;webvpn&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map http-map1&lt;BR /&gt; match access-list http-list2&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;policy-map http-map1&lt;BR /&gt; class http-map1&lt;BR /&gt;&amp;nbsp; set connection advanced-options mss-map&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy http-map1 interface outside&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:079b0329cbbeff90893706973fbb3369&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:08:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487120#M661978</guid>
      <dc:creator>Joe Montes</dc:creator>
      <dc:date>2019-03-11T18:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: PMTU-D packet 1420 bytes greater than effective mtu 1396,</title>
      <link>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487121#M661988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;add - sysopt connection tcpmss 1300&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should get things going for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Jul 2010 20:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487121#M661988</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2010-07-08T20:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: PMTU-D packet 1420 bytes greater than effective mtu 1396,</title>
      <link>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487122#M662001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply but have not had any success when I configured it with what you have suggested.&amp;nbsp; I previously had an entry in there and did some changes to the value but still had issues accessing other web sites.&amp;nbsp; I will attempt to try it again tonight and see how far I get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jul 2010 01:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487122#M662001</guid>
      <dc:creator>Joe Montes</dc:creator>
      <dc:date>2010-07-13T01:21:45Z</dc:date>
    </item>
    <item>
      <title>PMTU-D packet 1420 bytes greater than effective mtu 1396,</title>
      <link>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487123#M662015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Andrew -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was having the same problem and the fix you recommended worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;add - sysopt connection tcpmss 1300&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GF&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2013 18:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pmtu-d-packet-1420-bytes-greater-than-effective-mtu-1396/m-p/1487123#M662015</guid>
      <dc:creator>Gregory.Fields</dc:creator>
      <dc:date>2013-10-23T18:10:03Z</dc:date>
    </item>
  </channel>
</rss>

