Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    IPSec PMTU

    Scheduled Pinned Locked Moved IPsec
    24 Posts 10 Posters 10.9k Views 9 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R Offline
      rolytheflycatcher @carl2187
      last edited by

      @carl2187 It appears that using a route-based IPSec tunnel (VTI) resolves the PMTUD issue, without need for any other workarounds.

      1 Reply Last reply Reply Quote 1
      • L Offline
        ltctech
        last edited by

        I am bumping up against this exact same issue.

        We have a S2S IPsec tunnel between two pfSense routers. Running an iperf3 between the two sites only nets about half the bandwidth. However, if I reduce the MSS for TCP to 1406 or buffer length for UDP to 1418 it gives me 90% of line bandwidth:

        iperf3 -c testserver -R -M 1406
        iperf3 -c testserver -R -u -b 320M -l 1418
        

        Anything more gets fragmented into a full 1514 frame and a tiny 60 frame as verified with a packet capture on the WAN interface. This causes the bandwidth to be halved.

        MSS clamping at 1406 on pfSense does seem to help for both UDP and TCP traffic. Though it may not work for all sites for all types of traffic. That's why PMTU is so important.

        Are there any plans to fix this?

        R 1 Reply Last reply Reply Quote 0
        • R Offline
          rolytheflycatcher @ltctech
          last edited by

          @ltctech have you tried using a route-based IPSec tunnel?

          keyserK 1 Reply Last reply Reply Quote 1
          • keyserK Offline
            keyser Rebel Alliance @rolytheflycatcher
            last edited by

            @rolytheflycatcher Really interesting - or rather sad - that this bug/issue has been there for so many years.
            Suggests that FreeBSD is seeing less and less use in large installations/organisations - or that the FreeBSD community is starved for people with knowledge on how to fix core issues like this.

            Such a fundamental problem does not go unnoticed in bigger installations, so it would seem policy based IPsec tunneling sees very little use when based on FreeBSD.

            Love the no fuss of using the official appliances :-)

            1 Reply Last reply Reply Quote 2
            • First post
              Last post
            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.