- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello i was wondering if its possible to lower the mtu on the remote access client endpoint vpn or the gw?
In my homelab i have built this MPLS network (in the cloud) that is the connection between my home + and summer house. It runs wireguard + gre in the bottom so the maximum mtu of a packet cannot go over 1380 mtu and with ipsec on top of that i think the mtu has to go down to like 1280-1300 on that ipsec tunnel is it possible to configure that on a Checkpoint? Cant find anything on it.
Best regards,
BW
Hello sorry late reply it seemed it was never a mtu problem (im doing mtu mss outside checkpoint) i had to open up ports 500 and 4500 but its wierd it always worked from my iphone which also says its using ipsec. Or does the iphone do it over 443?
Everything works fine now doing ipsec on top of wireguard + gre 🙂 however im just thinking of route leak ipsec traffic outside wireguard between the sites.
You can adjust the MTU of VPN traffic by setting the MSS size for VPN traffic.
See: https://support.checkpoint.com/results/sk/sk101219
You can change MTU on relevant interface from clich -> set interface ethxx mtu and then whatever size needed.
Then save config to save the setting.
Andy
Hello sorry late reply it seemed it was never a mtu problem (im doing mtu mss outside checkpoint) i had to open up ports 500 and 4500 but its wierd it always worked from my iphone which also says its using ipsec. Or does the iphone do it over 443?
Everything works fine now doing ipsec on top of wireguard + gre 🙂
Our VPN clients require a connection over HTTPS (TCP/443) to start the connection.
In some cases, this will also be used for the actual VPN transport (so called "Visitor Mode").
Hello sorry late reply it seemed it was never a mtu problem (im doing mtu mss outside checkpoint) i had to open up ports 500 and 4500 but its wierd it always worked from my iphone which also says its using ipsec. Or does the iphone do it over 443?
Everything works fine now doing ipsec on top of wireguard + gre 🙂 however im just thinking of route leak ipsec traffic outside wireguard between the sites.
Port 443 is always needed for remote access. Check out below post about it.
Andy
Yes but why is it working without opening 4500/500 when coming from Iphone vs mac/windows?
I believe iphone would need only udp port 500, not udp 4500.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
9 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY