<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote access VPN WSL2 packet fragmentation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remote-access-VPN-WSL2-packet-fragmentation/m-p/101095#M10154</link>
    <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;we are facing an issue with remote access VPN and WSL2. The problem is in packet fragmentation. When a TCP packet is originated directly from the windows system it has the correct Maximum segment size value (1310). But when the packet is originated from WLS2 it has MSS 1460. The packet fragmentation does not work and for example, TSL session will fail.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="obrazek.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8764i3F1F40B1D674A3DC/image-size/large?v=v2&amp;amp;px=999" role="button" title="obrazek.png" alt="obrazek.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are fixing it with this workaround script in WSL.&lt;/P&gt;&lt;P&gt;#/bin/bash&lt;BR /&gt;ADVMSS=1310&lt;/P&gt;&lt;P&gt;DEFAULT_ROUTE=$(ip route | grep "default")&lt;BR /&gt;ip route del $DEFAULT_ROUTE&lt;BR /&gt;ip route add $DEFAULT_ROUTE advmss $ADVMSS&lt;BR /&gt;:&lt;BR /&gt;if ip route | grep -q "advmss $ADVMSS"; then&lt;BR /&gt;echo "MSS is ok"&lt;BR /&gt;else&lt;BR /&gt;echo "MSS is not ok"&lt;BR /&gt;fi&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Is anyone having the same issue? What is your solution?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Nov 2020 10:11:25 GMT</pubDate>
    <dc:creator>Honza</dc:creator>
    <dc:date>2020-11-04T10:11:25Z</dc:date>
    <item>
      <title>Remote access VPN WSL2 packet fragmentation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remote-access-VPN-WSL2-packet-fragmentation/m-p/101095#M10154</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;we are facing an issue with remote access VPN and WSL2. The problem is in packet fragmentation. When a TCP packet is originated directly from the windows system it has the correct Maximum segment size value (1310). But when the packet is originated from WLS2 it has MSS 1460. The packet fragmentation does not work and for example, TSL session will fail.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="obrazek.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/8764i3F1F40B1D674A3DC/image-size/large?v=v2&amp;amp;px=999" role="button" title="obrazek.png" alt="obrazek.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are fixing it with this workaround script in WSL.&lt;/P&gt;&lt;P&gt;#/bin/bash&lt;BR /&gt;ADVMSS=1310&lt;/P&gt;&lt;P&gt;DEFAULT_ROUTE=$(ip route | grep "default")&lt;BR /&gt;ip route del $DEFAULT_ROUTE&lt;BR /&gt;ip route add $DEFAULT_ROUTE advmss $ADVMSS&lt;BR /&gt;:&lt;BR /&gt;if ip route | grep -q "advmss $ADVMSS"; then&lt;BR /&gt;echo "MSS is ok"&lt;BR /&gt;else&lt;BR /&gt;echo "MSS is not ok"&lt;BR /&gt;fi&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Is anyone having the same issue? What is your solution?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2020 10:11:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remote-access-VPN-WSL2-packet-fragmentation/m-p/101095#M10154</guid>
      <dc:creator>Honza</dc:creator>
      <dc:date>2020-11-04T10:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN WSL2 packet fragmentation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remote-access-VPN-WSL2-packet-fragmentation/m-p/101113#M10155</link>
      <description>&lt;P&gt;Encrypted packets can hold less data because of the encryption, hence MTU of the packets sent to VPN tunnel should be reduced, to avoid fragmenting. You can find more details in&amp;nbsp;&lt;SPAN&gt;sk98074. IT is for S2S, but should be relevant for RAS as well, as far as i know.&lt;BR /&gt;&lt;BR /&gt;Limiting MTU on a network side is a solid approach&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2020 12:11:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remote-access-VPN-WSL2-packet-fragmentation/m-p/101113#M10155</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-11-04T12:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access VPN WSL2 packet fragmentation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remote-access-VPN-WSL2-packet-fragmentation/m-p/101235#M10156</link>
      <description>&lt;P&gt;I see. But I would expect the vpn client to mangle the TCP MSS value to correct value.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 15:42:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Remote-access-VPN-WSL2-packet-fragmentation/m-p/101235#M10156</guid>
      <dc:creator>Honza</dc:creator>
      <dc:date>2020-11-05T15:42:39Z</dc:date>
    </item>
  </channel>
</rss>

