Dear all, I'm Nolan. I'm seeking for you guys advice on this issue: Previous situation: MX64 (network: CRESCENT MALL) was running firmware version 14.x MX64 successfully established an IPSec Site-to-Site VPN tunnel to a VM hosted on FPT Cloud (Vietnam) On the MRs, we have configured WiFi authentication via RADIUS, pointing to the AD Server hosted on that VM Everything worked properly without any issues Current situation: After upgrading the MX64 to firmware version 18.x The IPSec VPN tunnel can still be established successfully However, WiFi users are no longer able to authenticate via RADIUS Using Wireshark, we noticed that the VPN packet size is larger than MTU allowed over the VPN, which may cause packet drops during AD authentication As I checked with Support Team → the non-Meraki site-to-site VPN's MTU is set to 1400 for this MX64... and to adjust the MTU, this requires MX19.1.11 or higher firmware → replacing the MX64 or reconfigure the AD Server (FPT VM) are currently not good options due to customer policy → I just wonder is the IPSec VPN MTU in firmware 14.x different from MTU in firmware 18.x? Thank you for your support! -- Nolan Nguyen (Mr.)
... View more