Thank you again for the quick reply ... I am not sure if your suggestion will work though ... my vpn server is not on my firewall .. it is between my internal and external ... so basically, the troubling packets will come in through my external firewall, hit the vpnserver, leave the vpnserver and head to my internal firewall. They are then supposed to pass through to the server that has the webpage I am trying to get to, and then return the page back accross the vpn link to the remote server .... I guess what I am getting at is there is no ipsec_if on the firewall ..as the vpn server is a standalone server .... Peter ----- Original Message ----- From: "Jason Opperisano" <opie@xxxxxxxxxxx> To: <netfilter@xxxxxxxxxxxxxxxxxxx> Sent: Friday, October 15, 2004 3:44 PM Subject: Re: ipsec troubles On Fri, Oct 15, 2004 at 03:30:13PM -0300, Peter Marshall wrote: > Thanks for the fast reply ... > > So you are saying I should use a value of 1440 for X ? > What rule do I apply it too ? (sorry to sound stupid .. brain is fried .. > have been working on this for a long time). > > Peter you would add a new rule that matches your outbound VPN traffic...something along the lines of (this is 2.4 and *swan biased): iptables -A FORWARD -i $INSIDE_IF -o $IPSEC_IF -p tcp --syn \ -j TCPMSS --set-mss 1440 from my own personal experience--i use lower values than 1440, but 1440 is the mathematical maximum you can use...so that's your starting point. -j -- Jason Opperisano <opie@xxxxxxxxxxx>