| Description | This article describes how FortiGate handles packets that are larger than the configured interface MTU. |
| Scope | FortiGate. |
| Solution |
Consider the following topology:
The LocalFortiGate interfaces are configured with the default MTU value of 1500.
LocalFortiGate # diagnose netlink interface list port2 if=port2 family=00 type=1 index=4 mtu=1500 link=0 master=0
LocalFortiGate # diagnose netlink interface list port3 if=port3 family=00 type=1 index=5 mtu=1500 link=0 master=0
The RemoteFortiGate has port2 configured with MTU 1300 and port3 with MTU 1500.
RemoteFortiGate # diagnose netlink interface list port2 if=port2 family=00 type=1 index=4 mtu=1300 link=0 master=0
RemoteFortiGate # diagnose netlink interface list port3 if=port3 family=00 type=1 index=5 mtu=1500 link=0 master=0
An ICMP ping is initiated from the LocalPC towards the RemotePC with a packet length of 1350 bytes. This size exceeds the MTU of the RemoteFortiGate port2 interface (1300 bytes).
ping 10.123.3.193 -l 1350 -n 1
Since the LocalFortiGate MTU (1500) is higher than the packet length (1350), the packet is processed as expected.
Packet captures taken from the port2 interface on the RemoteFortiGate display how the interface with a smaller MTU processes the larger packet.
A configured lower MTU on an interface does not prevent the firewall from receiving or accepting a larger packet. The interface MTU setting restricts the size of packets the firewall transmits (egress), resulting in fragmentation or a drop (if the 'Don't Fragment' flag is set) if the packet exceeds the MTU value. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.