Should I apply the tcp mss / tcp sender or receiver commands to the interface or policy or both?
What is best practice?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
What are you trying to accomplish?
I'm trying to limit packet fragmentation (TCP and UDP) for traffic originating from behind the FW and for the VPNs (SSL and IPSEC) logically connecting to it. I'm not sure whether its best to apply the TSP MSS size adjustment on the FW interfaces or Policies or both and whether lowering the WAN/VPN Tunnel interfaces to a lower MTU with PMTU discovery enabled on the FW.
So you need to determine why you are getting fragmentation in the first place and address it in the correct spot. If all traffic is fragmented you likely need a more global setting like on your WAN interface. If it's just VPN traffic then setting mtu and mss on the VPN interfaces would be ideal and all you need to do. Setting it at the policy level works but doesn't work when people forget to set it when creating new policies, for example. It also only works for mss and not mtu (so non-TCP traffic may still get fragmented).
Some more reading here: https://docs.fortinet.com/document/fortigate/7.2.3/administration-guide/596096/interface-mtu-packet-...
The true area of concern is the IPSEC VPN. Do you recommend setting both TCP MSS to 1360 and MTU to 1400 at the virtual interface and the appropriate policies? This way all the tunnel and all UDP or TCP traffic within it are not fragmented? Leave the WAN interface at MTU 1500 and all other MSS as normal for all other traffic?
Indeed. If you are having issues with fragmentation over the IPSec VPN only then manually set the IPSec interface MTU to 1400 and TCP MSS to 1360 and that should be all you need to do. You do not need to edit the policies as the interface settings will take precedence.
Additional question.... SSL VPN. Does the MTU or MSS need to be adjusted for it?
That's a good question. Intuitively I will say no unless you are having issues with TCP/IP fragmentation out of your WAN interface. i.e. if regular HTTPS traffic is being fragmented then you probably need to set your MTU/MSS on your WAN interface as well.
I know this topic is old, but I have a question regarding applying MSS to a physical interface of an MPLS link. Is it necessary to disable and enable the interface after applying the MSS, or should it take effect automatically? Version 6.4.13.
Thanks!
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1731 | |
1105 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.