<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Clear DF bit for VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/1225357#M123845</link>
    <description>&lt;P&gt;Will the change below persist after a reboot, or will it be lost?"&lt;/P&gt;
&lt;P&gt;debug dataplane set ip4-ignore-df yes&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 01 Apr 2025 18:05:22 GMT</pubDate>
    <dc:creator>M.Lampe</dc:creator>
    <dc:date>2025-04-01T18:05:22Z</dc:date>
    <item>
      <title>Clear DF bit for VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/149255#M49757</link>
      <description>&lt;P&gt;We have recently migrated our site-to-site VPN so it is now running between a PA-3020 &amp;gt; Cisco ASA 5510. &amp;nbsp;After the migration we discovered that one of our cross-site applications broke and the vendor determined it was because their application communicates in 1472 byte packets with the DF bit set. &amp;nbsp;On our old VPN this was not an issue because the devices cleared the DF bit, allowing the packets to be fragmented before crossing the tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have found the option on the ASA to clear the DF bit (&lt;EM&gt;crypto ipsec df-bit clear-df &amp;lt;interface&amp;gt;&lt;/EM&gt;), however I can't locate anything similar in the PA documentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can someone please point me in the right direction? &amp;nbsp;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2017 23:01:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/149255#M49757</guid>
      <dc:creator>winterfrost</dc:creator>
      <dc:date>2017-03-23T23:01:13Z</dc:date>
    </item>
    <item>
      <title>Re: Clear DF bit for VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/149290#M49762</link>
      <description>&lt;P&gt;Hi Winterfrost,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Welcome to the community forums!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as I know, there is no option to clear the df bit, on PA. However, you can adjust MSS/MTU under Network-&amp;gt;Interfaces.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anurag&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2017 05:26:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/149290#M49762</guid>
      <dc:creator>ansharma</dc:creator>
      <dc:date>2017-03-24T05:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: Clear DF bit for VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/150607#M49985</link>
      <description>&lt;P&gt;The connection is currently passing 1472-byte ping with the DF-bit set, but&amp;nbsp;I'm not entirely clear how this works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have 1500 MTU set on the physical external interface and on the tunnel interface on the PA. &amp;nbsp;At the remote site (Cisco ASA) we have the same MTU settings, but we had to turn on the option to clear the DF bit on the ASA to pass a DF-flagged&amp;nbsp;1472 byte ping. &amp;nbsp;I assumed we needed to do the same on the PA, but as soon as we enabled it on the Cisco side, the&amp;nbsp;pings started to go through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So 1472 data + 20 IP header + 8 ICMP header = 1500. &amp;nbsp;But this doesn't include IPSec overhead.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's my understanding that a VPN device will typically evaluate a packet's size against the MTU, including the size of the IPSec header, and determine if fragmentation is needed. &amp;nbsp;In the case of a packet flagged with the DF-bit, if this total size exceeds the MTU, the packet will be dropped... unless you tell the VPN device to ignore the DF-bit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the Cisco side this is what we did, so the packets are fragmented&amp;nbsp;despite the DF-bit and the communication works. &amp;nbsp;Is the&amp;nbsp;PA doing the same thing automatically? &amp;nbsp;Or (much more likely) am I completely misunderstanding something?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2017 15:43:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/150607#M49985</guid>
      <dc:creator>winterfrost</dc:creator>
      <dc:date>2017-03-31T15:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Clear DF bit for VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/574325#M115435</link>
      <description>&lt;P&gt;A) To check DF override status:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt; show system state | match ip4-ignore&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;sw.comm.s1.dp0.flow-data: { 'b_not_use_parent_policy': False, 'cclogmgmt-reject-all': False, 'combine-pkt-msg': True, 'cutthrough': True, 'distributed-sess-mgmt': False, 'dp-avg-load': 2, 'dp-cal-load': True, 'dp-load-level': 102, 'hw-ipv6': False, 'hw-mcast': False, 'hw-remove-req-cnt': 0, &lt;STRONG&gt;'ip4-ignore-df': False&lt;/STRONG&gt;, 'ip6-host-pmtu-exception-check': False, 'ip6-mcast-fwd-check': False, 'ip6-skip-1-routing-hdr-check': False, 'ip6-skip-ucast-mac-check': False, 'ipv6-firewalling': True, 'netflow-refresh-interval': 60, 'no-learning-return-mac': False, 'num-of-free-session': 1246, 'num-of-free-session-this-dp': 1246, 'process-cpu': 0, 'session-timeout-5gcdelete': 15, 'session-timeout-closing': 5, 'session-timeout-cp': 30, 'session-timeout-default': 30, 'session-timeout-discard_default': 60, 'session-timeout-discard_sctp': 30, 'session-timeout-discard_tcp': 90, 'session-timeout-discard_udp': 60, 'session-timeout-forward': 10, 'session-timeout-gtpc_request': 90, 'session-timeout-icmp': 6, 'session-timeout-opening': 5, 'session-timeout-scan': 10, 'session-timeout-sctp': 3600, 'session-timeout-sctpcookie': 60, 'session-timeout-sctpinit': 5, 'session-timeout-sctpshutdown': 60, 'session-timeout-tcp': 3600, 'session-timeout-tcp_unverif_rst': 30, 'session-timeout-tcphalfclosed': 120, 'session-timeout-tcphandshake': 10, 'session-timeout-tcpinit': 5, 'session-timeout-tcptimewait': 15, 'session-timeout-udp': 30, 'tcp-reject-nonsyn': True, }&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;B) To set DF override status:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;gt; debug dataplane set ip4-ignore-df yes&lt;/P&gt;
&lt;P&gt;&amp;gt; show system state | match ip4-ignore&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sw.comm.s1.dp0.flow-data: { 'b_not_use_parent_policy': False, 'cclogmgmt-reject-all': False, 'combine-pkt-msg': True, 'cutthrough': True, 'distributed-sess-mgmt': False, 'dp-avg-load': 2, 'dp-cal-load': True, 'dp-load-level': 102, 'hw-ipv6': False, 'hw-mcast': False, 'hw-remove-req-cnt': 0, &lt;STRONG&gt;'ip4-ignore-df': True&lt;/STRONG&gt;, 'ip6-host-pmtu-exception-check': False, 'ip6-mcast-fwd-check': False, 'ip6-skip-1-routing-hdr-check': False, 'ip6-skip-ucast-mac-check': False, 'ipv6-firewalling': True, 'netflow-refresh-interval': 60, 'no-learning-return-mac': False, 'num-of-free-session': 1246, 'num-of-free-session-this-dp': 1246, 'process-cpu': 0, 'session-timeout-5gcdelete': 15, 'session-timeout-closing': 5, 'session-timeout-cp': 30, 'session-timeout-default': 30, 'session-timeout-discard_default': 60, 'session-timeout-discard_sctp': 30, 'session-timeout-discard_tcp': 90, 'session-timeout-discard_udp': 60, 'session-timeout-forward': 10, 'session-timeout-gtpc_request': 90, 'session-timeout-icmp': 6, 'session-timeout-opening': 5, 'session-timeout-scan': 10, 'session-timeout-sctp': 3600, 'session-timeout-sctpcookie': 60, 'session-timeout-sctpinit': 5, 'session-timeout-sctpshutdown': 60, 'session-timeout-tcp': 3600, 'session-timeout-tcp_unverif_rst': 30, 'session-timeout-tcphalfclosed': 120, 'session-timeout-tcphandshake': 10, 'session-timeout-tcpinit': 5, 'session-timeout-tcptimewait': 15, 'session-timeout-udp': 30, 'tcp-reject-nonsyn': True, }&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 16:41:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/574325#M115435</guid>
      <dc:creator>amolm1</dc:creator>
      <dc:date>2024-01-24T16:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Clear DF bit for VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/1225357#M123845</link>
      <description>&lt;P&gt;Will the change below persist after a reboot, or will it be lost?"&lt;/P&gt;
&lt;P&gt;debug dataplane set ip4-ignore-df yes&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 18:05:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/1225357#M123845</guid>
      <dc:creator>M.Lampe</dc:creator>
      <dc:date>2025-04-01T18:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: Clear DF bit for VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/1225501#M123861</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Once you 'commit' the change, it is written to the config and will persist after reboots.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 02 Apr 2025 20:02:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/clear-df-bit-for-vpn/m-p/1225501#M123861</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-04-02T20:02:03Z</dc:date>
    </item>
  </channel>
</rss>

