Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
PCNSE
NSE
StrongSwan
have you looked at to ignore the df-bit in the l3 header of ip_packetshouldn' t he set this to ' disable' instead of ' enable' in action to ignore the df bits of the ip_packet? set honor-df disable -> set FGT to ignore DF bits of any ip_packet -> test it -> if ok: check source why they set df bit in ip_packets. regards
set honor-df disableNo you have it backward. You set the value to " disable" to not honor the df bits. If the df bits are toggle high ( 1 ) than any layer3 device will drop the packet if the packet is larger than the effective mtu. http://docs-legacy.fortinet.com/fos50hlp/52/index.html#page/FortiOS%25205.2%2520Help/system.004.34.html Other options ( cisco/juniper ) you can craft a policy to clear the DF-bit on all traffic before reaching the L3 device. i.e by using a route-map route-map cleardf permit 10 set ip df 0 and then apply it; ip policy route-map cleardf Other options for tcp is to set the tcp-mss, you can do this global for most routers and on a fortigate with firewall policys that are for tcp-traffic you can set it in the fwpolicies.
PCNSE
NSE
StrongSwan
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.