<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN - Lost Packets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094572#M963197</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. Strangely the VPN tunnels that terminate off the Tunnel interfaces don't have a problem, it's just the non-GRE IPSEC tunnels. I've tried adjusting the mtu sizes on the physical outside interface using the above commands, however, I still have the same problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also tried using the 'mtu 1400' command on the physical interface, however I get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% Interface FastEthernet0/0 does not support user settable mtu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Nov 2008 14:44:41 GMT</pubDate>
    <dc:creator>alraycisco</dc:creator>
    <dc:date>2008-11-04T14:44:41Z</dc:date>
    <item>
      <title>VPN - Lost Packets</title>
      <link>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094570#M963190</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Cisco 2621XM router setup running IOS 12.4(21a), which provides internet connectivity via an ADSL line. The router also has several site to site VPN's and GRE/IPSec tunnels. Connectivity to the sites via the GRE/IPSEC tunnels work without a problem as does internet connectivity. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The site to site IPsec tunnels (non-GRE) to other client sites currently display th following: the VPN tunnels  come up and pass traffic, however, there seems to be pqacket loss. If I open a ping to a remote host I get reply, request timed out, reply etc. Also, RDP failes to work altogether and SSH is extremely slow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A constant ping to &lt;A class="jive-link-custom" href="http://www.google.com" target="_blank"&gt;http://www.google.com&lt;/A&gt; or to a host over the GRE/IPsec tunnel is constant and works fine. I have tried a different router in it's place and get the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help with this would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no aaa new-model&lt;/P&gt;&lt;P&gt;memory-size iomem 10&lt;/P&gt;&lt;P&gt;no network-clock-participate slot 1&lt;/P&gt;&lt;P&gt;no network-clock-participate wic 0&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip auth-proxy max-nodata-conns 3&lt;/P&gt;&lt;P&gt;ip admission max-nodata-conns 3&lt;/P&gt;&lt;P&gt;no ip dhcp use vrf connected&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key sitea address x.x.x.x&lt;/P&gt;&lt;P&gt;crypto isakmp key siteb address x.x.x.x&lt;/P&gt;&lt;P&gt;crypto isakmp key sitec address x.x.x.x&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt; mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt; mode transport&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map crypto_map 10 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer x.x.x.x&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt; set pfs group2&lt;/P&gt;&lt;P&gt; match address acl_gre_traffic_n1&lt;/P&gt;&lt;P&gt;crypto map crypto_map 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer x.x.x.x&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt; set pfs group2&lt;/P&gt;&lt;P&gt; match address acl_gre_traffic_n2&lt;/P&gt;&lt;P&gt;crypto map crypto_map 30 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer x.x.x.x&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt; match address acl_crypto_map30&lt;/P&gt;&lt;P&gt;crypto map crypto_map 40 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer x.x.x.x&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt; match address acl_crypto_map40&lt;/P&gt;&lt;P&gt;crypto map crypto_map 50 ipsec-isakmp&lt;/P&gt;&lt;P&gt; set peer x.x.x.x&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt; match address acl_crypto_map50&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Tunnel0&lt;/P&gt;&lt;P&gt; ip address 192.168.100.1 255.255.255.252&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; keepalive 10 3&lt;/P&gt;&lt;P&gt; tunnel source FastEthernet0/0&lt;/P&gt;&lt;P&gt; tunnel destination x.x.x.x&lt;/P&gt;&lt;P&gt; crypto map crypto_map&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Tunnel1&lt;/P&gt;&lt;P&gt; ip address 192.168.200.1 255.255.255.252&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; keepalive 10 3&lt;/P&gt;&lt;P&gt; tunnel source FastEthernet0/0&lt;/P&gt;&lt;P&gt; tunnel destination x.x.x.x&lt;/P&gt;&lt;P&gt; crypto map crypto_map&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;/P&gt;&lt;P&gt; description Outside Interface&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.248&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; crypto map crypto_map&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0/0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no fair-queue&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0/1&lt;/P&gt;&lt;P&gt; description Inside Interface&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip nat pool crypto_map30_pool x.x.x.x x.x.x.x netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip nat pool crypto_map40_pool x.x.x.x x.x.x.x netmask 255.255.255.192&lt;/P&gt;&lt;P&gt;ip nat inside source route-map route_map_nat interface FastEthernet0/0 overload&lt;/P&gt;&lt;P&gt;ip nat inside source route-map route_map_crypto_map30 pool crypto_map30_pool&lt;/P&gt;&lt;P&gt;ip nat inside source route-map route_map_crypto_map40 pool crypto_map40_pool&lt;/P&gt;&lt;P&gt;ip dns server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map route_map_nat permit 1&lt;/P&gt;&lt;P&gt; match ip address acl_nat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map route_map_crypto_map40 permit 1&lt;/P&gt;&lt;P&gt; match ip address acl_crypto_map40_nat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map route_map_crypto_map30 permit 1&lt;/P&gt;&lt;P&gt; match ip address acl_crypto_map30_nat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:04:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094570#M963190</guid>
      <dc:creator>alraycisco</dc:creator>
      <dc:date>2020-02-21T11:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Lost Packets</title>
      <link>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094571#M963193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is most probably an MTU issue, set the TCP MSS and MTU on your tunnel interface to something much lower than the default. E.g:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip mtu 1400&lt;/P&gt;&lt;P&gt;ip tcp adjust-mss 1360&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk827/tk369/technologies_white_paper09186a00800d6979.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk827/tk369/technologies_white_paper09186a00800d6979.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2008 11:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094571#M963193</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-04T11:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Lost Packets</title>
      <link>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094572#M963197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. Strangely the VPN tunnels that terminate off the Tunnel interfaces don't have a problem, it's just the non-GRE IPSEC tunnels. I've tried adjusting the mtu sizes on the physical outside interface using the above commands, however, I still have the same problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've also tried using the 'mtu 1400' command on the physical interface, however I get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% Interface FastEthernet0/0 does not support user settable mtu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2008 14:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094572#M963197</guid>
      <dc:creator>alraycisco</dc:creator>
      <dc:date>2008-11-04T14:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Lost Packets</title>
      <link>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094573#M963200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then please try adding the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec fragmentation before-encryption &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just make sure you reset the phase1/phase2 VPN connection after making the change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/ios/12_1/12_1e11/feature/guide/lookaheadfrag.html" target="_blank"&gt;http://www.cisco.com/en/US/docs/ios/12_1/12_1e11/feature/guide/lookaheadfrag.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2008 15:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094573#M963200</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-11-04T15:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Lost Packets</title>
      <link>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094574#M963203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again thanks for the response. I have tried the above, however, I am still experiencing the same problem, having brought the VPN tunnels down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the site pre-fragmentation should be on by default. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2008 15:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094574#M963203</guid>
      <dc:creator>alraycisco</dc:creator>
      <dc:date>2008-11-04T15:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Lost Packets</title>
      <link>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094575#M963204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just an update on this, as a test I've setup an additional IPsec tunnel to an ASA5505 (my home ASA). Connectivity over this VPN works without any problems. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I find it quite strange that 3 customer VPN's should display the same problems (dropped packets), yet an IPSec  VPN to my home firewall works without any problems. Is there anything I can get the customer to do at their end? Is the problem that their MTU values are considerably lower than my outside interface's MTU?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Nov 2008 13:44:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-lost-packets/m-p/1094575#M963204</guid>
      <dc:creator>alraycisco</dc:creator>
      <dc:date>2008-11-10T13:44:36Z</dc:date>
    </item>
  </channel>
</rss>

