Forum Discussion

  • johnbor's avatar
    johnbor
    Connection Cadet
    djb14336 wrote:

    Just makes sense for it to be... if not something in their router, it would likely be the next link upstream.  I have their Askey model, and there are no accessible MTU settings there either.

    All my stuff is set to use path discovery, and their router is negotiating the tunnel.  It would be the first thing in the localized chain getting set that way by TMO... and my devices are using 1420.

    You can test from your clients to see what MTU gets through without fragmentation. Or just go to something like speedguide.net's TCP Analyzer.

    The reason I ask because I was getting a pause when requests go out and lower send speeds, but when I tested my packets to google they were fragmented and timing out until I adjusted the MTU on my computer down to 1392 +28  = 1420  Now they are not fragmented and up speed seems more stable and my pings are much better.

    This makes me think the router is set to 1500 and no way to adjust it other then per machine.

  • djb14336's avatar
    djb14336
    Bandwidth Buddy

    They have the Nokia locked down pretty tight.

    Besides, unless you wanted to reduce it for some reason, it should be left as is.  It is set to 1420 for a reason, likely tied to the 464XLAT "tunnel" they use (has a sort of VPN impact), or other security/stability concerns they have upstream.

    If you need to lower MTU to get a VPN working, then it should be done on the client side, ideally in that VPN's config.  Alternatively, could try forcing it through the OS or your own router if you are doing the double-NAT thing.  But the best place to do it is in the VPN config itself to avoid any potential fragmentation weirdness.

  • johnbor's avatar
    johnbor
    Connection Cadet
    djb14336 wrote:

    They have the Nokia locked down pretty tight.

    Besides, unless you wanted to reduce it for some reason, it should be left as is.  It is set to 1420 for a reason, likely tied to the 464XLAT "tunnel" they use (has a sort of VPN impact), or other security/stability concerns they have upstream.

    If you need to lower MTU to get a VPN working, then it should be done on the client side, ideally in that VPN's config.  Alternatively, could try forcing it through the OS or your own router if you are doing the double-NAT thing.  But the best place to do it is in the VPN config itself to avoid any potential fragmentation weirdness.

    How can you tell the MTU is set at 1420 on the router?

  • djb14336's avatar
    djb14336
    Bandwidth Buddy

    Just makes sense for it to be... if not something in their router, it would likely be the next link upstream.  I have their Askey model, and there are no accessible MTU settings there either.

    All my stuff is set to use path discovery, and their router is negotiating the tunnel.  It would be the first thing in the localized chain getting set that way by TMO... and my devices are using 1420.

    You can test from your clients to see what MTU gets through without fragmentation. Or just go to something like speedguide.net's TCP Analyzer.

  • djb14336's avatar
    djb14336
    Bandwidth Buddy

    If PMTU Discovery is not active(or working properly), it may be defaulting to the ethernet standard of 1500.

    My Windoze laptops and Asus router were   picking up 1420 through discovery, but my PS4 was set statically due to some issues with PSN years ago.  It started behaving much better after dropping it down.

    Just be mindful that dependingbon what all is going on, may need to set MSS to 1380.   May need extra room in the headers. (IP header 20 bytes, TCP header 20 bytes is kinda the "norm")

  • specifically for pulse secure, T-Mobile tech support identifies 1340 as the correct mtu value if you are having problems connecting to the VPN.

  • theguru00's avatar
    theguru00
    Roaming Rookie

    I don't think any of my clients are using anything less than 1500.  I could put another router in between to make them smaller, but obviously not ideal.