I do have an issue with not being able to browse all sites and my provider says it's an MTU of 1622 on the interface but is not sure about VLAN2020 and L2TP tunnel. I am assuming I am having an MTU issue so how can I go about proving this is the issue and setting the proper MTU?
Torontobob, MTU can be troubleshot with the ping command line utility. You set a size along with the DF bit set.
ping -4 -f -n 2 -l 1472 8.8.8.8
This will test for MTU 1500 to 8.8.8.8. It's 20 bytes for the IP header and 8 bytes for the ICMP header and 1472 bytes of good ole spam data.
You'll either get replies back that all is good like:
Pinging 8.8.8.8 with 1472 bytes of data:
Reply from 8.8.8.8: bytes=64 (sent 1472) time=31ms TTL=46
Reply from 8.8.8.8: bytes=64 (sent 1472) time=30ms TTL=46
Ping statistics for 8.8.8.8:
Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 30ms, Maximum = 31ms, Average = 30ms
... or waa waa waa:
Pinging 8.8.8.8 with 1482 bytes of data:
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Ping statistics for 8.8.8.8:
Packets: Sent = 2, Received = 0, Lost = 2 (100% loss),
Alternatively, you might just get a failed messaged back.
You can use ping commands to test each hop and see what the MTU looks like along your path.
Regardless, MTU sizing shouldn't cause a negative experience unless it's less than 1280 in IPv6 and 576 in IPv4. Managing MTU related tasks like path MTU discovery is a key feature of ICMP. A major reason why certain messages shouldn't be blocked under any circumstance in both ICMP for IPv4 or IPv6. The subject of MTU management, remember where and who is responsible for fragmentaiton. In IPv4 the routers are and in IPv6 the hosts are. This can be seen in IPv6 pretty clearly by the "Packet Too Big" message.