Categories
Welcome Center
Education & Development
Discussions
Certification Preparation
Recent Posts
Groups
Free Resources
Ebooks
Free Workshops
Trending Certifications Infographic
Infosec Training
IT & Security Training
Live Boot Camps
Security Awareness Training
About Infosec Institute
Home
Discussions
Off Topic
Fragmenting ESP traffic
_maurice
Hi there! My name is Maurice. I work level 3 tech support for SonicWALL. As you may imagine, we do LOTS of VPN troubleshooting. The topic of this thread is regarding fragmentation of outbound IP traffic on an interface of a router/firewall.
Let's say a router receives an inbound IP packet carrying ESP traffic, and the outbound interface has a lower MTU than the inbound interface. I understand that the router will fragment the ESP payload, the destination VPN endpoint will re-assemble the fragmented ESP payload, and calculate a correct checksum against the ESP payload.
This assumes 3 things:
1. That every intermediate router the packet flows through to reach its destination must also fragment packets larger than the outbound interface's MTU.
2. The added router processor overhead of fragmenting packets and accepting fragmented packets is acceptable.
3. The drop in bandwidth efficiency due to increased header overhead of fragmented packets is acceptable.
Now to the point...
My colleagues always jump to the conclusion that fragmentation is the reason why some network technologies don't work correctly. As a result, they set most computer/firewall/VPN concentrator interface MTU's to 1404 bytes. They believe that an MTU of 1404 is a "sweet spot" as it is not too small to cause much of a decrease in bandwidth efficiency, and not too big to ever be fragmented by 99% of router interfaces on the internet.
I would like to get some feedback from the community on IP fragmentation. Specifically, does fragmenting a packet larger than a router's outbound interface MTU cause problems with payloads that must pass checksum validation?
Find more posts tagged with
Save $250 on 2025 certification boot camps from Infosec!
Book now with code EOY2025
Button
Comments
Ahriakin
Checksums are recomputed before the packets are sent on from each intermediate IP device even without fragmentation. As long as all fragments reach the endpoint intact and within a reasonable time to allow the original packet to be reassembled (based on timeouts and buffer limits) the payload will be unaffected. The main issue is with the load fragmentation will place on any device having to perform fragmentation/defragmentation, for example on most Cisco routers this process is punted to the CPU so all those nice advancements in packet switching get bypassed. Also fragmentation is an effective way to attack most network devices (either directly through the recompiled packet engaging an exploit or simply by using them to attack your device control-plane), and/or evade IDS/IPS systems so it is undesirable regardless (many organizations will filter fragments as part of their security policies). Avoid whenever possible.
Quick Links
All Categories
Recent Posts
Activity
Unanswered
Groups
Best Of
INFOSEC Boot Camps
$250
OFF
Use code
EOY2025
to receive $250 off your 2025 certification boot camp!
BROWSE BOOT CAMPS