On Tue, 2004-11-16 at 13:29, Peter Marshall wrote: > Hello everyone. > > I am getting the following in my logs (scrolls faster than I can read) when > ever anyone trys to do windows file transfers over my vpn. The vpn is ipsec > and it is a constant connection between our office and our sister office. > My vpn server is in our dmz between 2 firewalls. The remote vpnserver is > installed on their internal firewall. When a client on the remote side goes > to copy a file using windows networking to a server on my side, it works, > however I get the messages below ... Please help. I am not sure why I am > getting this. It looks like the reply is getting blocked, however, as my > rules show below, I allow established and related connections. > > Nov 16 13:59:16 radium kernel: FORWARD REJECT IN=eth1 OUT=eth0 SRC=x.x.x.33 > DST=192.168.200.3 LEN=576 TOS=0x00 PREC=0xC0 TTL=63 ID=12528 PROTO=ICMP > TYPE=3 CODE=4 [SRC=192.168.200.3 DST=192.168.127.15 LEN=1500 TOS=0x00 > PREC=0x00 TTL=126 ID=19304 DF PROTO=TCP SPT=445 DPT=1915 WINDOW=64968 > RES=0x00 ACK URGP=0 ] MTU=1443 From: http://www.iana.org/assignments/icmp-parameters ICMP Type 3 Code 4 == Fragmentation Needed and Don't Fragment was Set On the remote VPN server either lower the MTU or MSS of packets destined for your local VPN, or clear the DF bit. a netfilter example: iptables -A FORWARD -p tcp --syn -s 192.168.127.0/24 \ -d 192.168.200.0/21 -j TCPMSS --set-mss 1400 i picked 1400, as MSS = MTU - 40, and the MTU listed in your log entry is 1443. -j -- "Lisa, Vampires are make-believe, like elves, gremlins, and Eskimos." --The Simpsons