steveredman
IS-IT--Management
Hello,
I have set up a VPN tunnel from my company to another. We have a Cisco 1801 and they have a Watchguard Firebox. The VPN is up fine, able to ping and laptop users can log on to their domain from here and vice versa.
The only thing that does not want to work over the VPN (that I've found so far) is SMTP. I can telnet from my mail server (on the Cisco side) to the other (on the Watchguard side) but not the other way. I noticed that when doing a large ping I can get bigger packets from the cisco to the watchguard than I can the other way without them needing to be fragmanted. ie:-
From server on cisco side:-
ping 192.168.1.9 -f -l 1417
Pinging 192.168.1.9 with 1417 bytes of data:
Reply from 192.168.1.9: bytes=1417 time=92ms TTL=127
Reply from 192.168.1.9: bytes=1417 time=90ms TTL=127
Reply from 192.168.1.9: bytes=1417 time=89ms TTL=127
Reply from 192.168.1.9: bytes=1417 time=68ms TTL=127
From server on watchguard side:-
ping 10.0.0.6 -f -l 1417
Pinging 10.0.0.6 with 1417 bytes of data:
Reply from 192.168.1.253: Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Is there a way to drop the MTU from the cisco side (just for the VPN) to 1416 to match the watchguard? Is this likely to solve the problem?
Thanks
Stephen
I have set up a VPN tunnel from my company to another. We have a Cisco 1801 and they have a Watchguard Firebox. The VPN is up fine, able to ping and laptop users can log on to their domain from here and vice versa.
The only thing that does not want to work over the VPN (that I've found so far) is SMTP. I can telnet from my mail server (on the Cisco side) to the other (on the Watchguard side) but not the other way. I noticed that when doing a large ping I can get bigger packets from the cisco to the watchguard than I can the other way without them needing to be fragmanted. ie:-
From server on cisco side:-
ping 192.168.1.9 -f -l 1417
Pinging 192.168.1.9 with 1417 bytes of data:
Reply from 192.168.1.9: bytes=1417 time=92ms TTL=127
Reply from 192.168.1.9: bytes=1417 time=90ms TTL=127
Reply from 192.168.1.9: bytes=1417 time=89ms TTL=127
Reply from 192.168.1.9: bytes=1417 time=68ms TTL=127
From server on watchguard side:-
ping 10.0.0.6 -f -l 1417
Pinging 10.0.0.6 with 1417 bytes of data:
Reply from 192.168.1.253: Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Is there a way to drop the MTU from the cisco side (just for the VPN) to 1416 to match the watchguard? Is this likely to solve the problem?
Thanks
Stephen