<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fragmentation needed ICMP Type 3 Code 4 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148168#M23643</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;It is a normal 1G ethernet internet connection.&lt;/P&gt;&lt;P&gt;These are Meraki wifi controllers located at our main site where the internet connection is, the access points tunnel traffic back to them and it breaks out locally on the lan, then goes to the internet from there.&lt;/P&gt;&lt;P&gt;The Gateways are on R80.20 Take 47.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 09 May 2022 07:42:00 GMT</pubDate>
    <dc:creator>carl_t</dc:creator>
    <dc:date>2022-05-09T07:42:00Z</dc:date>
    <item>
      <title>Fragmentation needed ICMP Type 3 Code 4</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148031#M23616</link>
      <description>&lt;P&gt;Hi Guys&lt;/P&gt;&lt;P&gt;We are having some issues with wifi calling over voip, we are seeing the below messages coming from the device in the drop logs&lt;/P&gt;&lt;P&gt;ICMP Fragmentation needed&lt;/P&gt;&lt;P&gt;ICMP Type 3&lt;/P&gt;&lt;P&gt;ICMP Code 4&lt;/P&gt;&lt;P&gt;Address spoofing&lt;/P&gt;&lt;P&gt;Anyone know how to fix this? I believe it could be related to accleration.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Carl&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2022 11:56:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148031#M23616</guid>
      <dc:creator>carl_t</dc:creator>
      <dc:date>2022-05-06T11:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: Fragmentation needed ICMP Type 3 Code 4</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148032#M23617</link>
      <description>&lt;P&gt;Does the traffic traverse a VPN and have you checked for MTU issues?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Meanwhile Anti-spoofing implies traffic is coming into an interface that the source address isn't expected from.&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2022 12:25:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148032#M23617</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-05-06T12:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: Fragmentation needed ICMP Type 3 Code 4</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148047#M23619</link>
      <description>&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;The interface it is coming in on is fine, It does not traverse a vpn, it is traffic just going out of the internet.&lt;/P&gt;</description>
      <pubDate>Fri, 06 May 2022 13:03:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148047#M23619</guid>
      <dc:creator>carl_t</dc:creator>
      <dc:date>2022-05-06T13:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Fragmentation needed ICMP Type 3 Code 4</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148161#M23640</link>
      <description>&lt;P&gt;Any ideas guys ?&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2022 07:09:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148161#M23640</guid>
      <dc:creator>carl_t</dc:creator>
      <dc:date>2022-05-09T07:09:01Z</dc:date>
    </item>
    <item>
      <title>Re: Fragmentation needed ICMP Type 3 Code 4</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148164#M23642</link>
      <description>&lt;P&gt;More information is likely required for us to be of much help here.&lt;/P&gt;
&lt;P&gt;- Is there anything special about the internet connection used: Satellite / LTE / PPPoE ?&lt;/P&gt;
&lt;P&gt;- Which version and jumbo hotfix is applied to the gateway?&lt;/P&gt;
&lt;P&gt;- What is the Wireless network topology&amp;nbsp; with respect to both the firewall &amp;amp; client device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Back in the day Wi-Fi environments utilizing CAPWAP or similar between an AP and WLC used to necessitate either the use of jumbo frames or adjust-mss in the intermediate network to address fragmentation issues.&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2022 07:25:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148164#M23642</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-05-09T07:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: Fragmentation needed ICMP Type 3 Code 4</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148168#M23643</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;It is a normal 1G ethernet internet connection.&lt;/P&gt;&lt;P&gt;These are Meraki wifi controllers located at our main site where the internet connection is, the access points tunnel traffic back to them and it breaks out locally on the lan, then goes to the internet from there.&lt;/P&gt;&lt;P&gt;The Gateways are on R80.20 Take 47.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2022 07:42:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148168#M23643</guid>
      <dc:creator>carl_t</dc:creator>
      <dc:date>2022-05-09T07:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Fragmentation needed ICMP Type 3 Code 4</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148188#M23649</link>
      <description>&lt;P&gt;if you can use a smal free program called TCPoptimizer you can try to find out what the end to end MTU setting is. It is always better to prevent fragmentation and when your internet connection is using pppoe it will take out 8 bytes of the standard packet size. Then you can setup MSS clamping to make sure this will be handled properly. (keep in mind MSS is 40 bytes lower than MTU)&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2022 11:18:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148188#M23649</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2022-05-09T11:18:41Z</dc:date>
    </item>
    <item>
      <title>Re: Fragmentation needed ICMP Type 3 Code 4</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148190#M23650</link>
      <description>&lt;P&gt;R80.20 will be out of support in September, GA Jumbo is 205, Ongoing Jumbo is 211 - installed&amp;nbsp;take 47 went GA on 25.3.2019...&lt;/P&gt;</description>
      <pubDate>Mon, 09 May 2022 11:34:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Fragmentation-needed-ICMP-Type-3-Code-4/m-p/148190#M23650</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-05-09T11:34:59Z</dc:date>
    </item>
  </channel>
</rss>

