Working with Jumbo Frames on Scalable Chassis
The Scalable Chassis 40000 / 60000 support Jumbo Frames with a total size of:
-
For the SSM440 - up to 9,000 bytes
-
For the SGM400 - up to 9,702 bytes
|
Note - Carefully calculate the MTU. For example: IPsec or GRE traffic adds bytes to the header and this leaves fewer bytes for the data payload. |
Configuring Support for Jumbo Frames in a Security Group in the Gateway mode
Description
You can configure support for Jumbo Frames for each applicable interface in a Security Group.
|
Notes:
|
Syntax in Gaia gClish
|
Parameters
Parameter |
Description |
---|---|
|
Interface name as defined in the Gaia operating system. |
|
Valid values to enable the support for Jumbo Frames:
Valid values to disable the support for Jumbo Frames on all SSM and SGM models:
|

[Expert@SG-s01-01:0]# gclish [Global] SG-s01-01 > set interface eth1-01 mtu 9000 1_02: Note: MTU changes are propagated to the SSMs. Use "asg_jumbo_conf show" to validate changes [Global] SG-s01-01 > |

[Expert@SG-s01-01:0]# gclish [Global] SG-s01-01 > set interface eth1-01 mtu 1500 1_02: Note: MTU changes are propagated to the SSMs. Use "asg_jumbo_conf show" to validate changes [Global] SG-s01-01 > |
Configuring Support for Jumbo Frames in a Security Group in the Traditional VSX mode
To enable the support for Jumbo Frames in a Security Group in the Traditional VSX mode:
Step |
Instructions |
---|---|
1 |
Connect with SmartConsole to the Management Server that manages the Legacy VSX Gateway, or the applicable Virtual Device. |
2 |
From the left navigation panel, click Gateways & Servers. |
3 |
Open the Legacy VSX Gateway object, or the applicable Virtual Device object. |
4 |
From the left tree, click Topology. |
5 |
Edit the applicable interface. |
6 |
On the General tab, set the MTU to 1501 or a greater value. Valid values to enable the support for Jumbo Frames:
|
7 |
Click OK. |
8 |
Install Access Control Policy on the Legacy VSX Gateway object, or the applicable Virtual Device object. |
To disable the support for Jumbo Frames in a Security Group in the Traditional VSX mode:
Step |
Instructions |
---|---|
1 |
Connect with SmartConsole to the Management Server that manages the Legacy VSX Gateway, or the applicable Virtual Device. |
2 |
From the left navigation panel, click Gateways & Servers. |
3 |
Open the Legacy VSX Gateway object, or the applicable Virtual Device object. |
4 |
From the left tree, click Topology. |
5 |
Edit the applicable interface. |
6 |
On the General tab, set the MTU to a value between 68 and 1500 bytes. |
7 |
Click OK. |
8 |
Install Access Control Policy on the Legacy VSX Gateway object, or the applicable Virtual Device object. |
Confirming Jumbo Frames Configuration on SSM440 (asg_chassis_ctrl)
To run the validation test on the SSM:
See asg_chassis_ctrl.
Step |
Instructions |
|
---|---|---|
1 |
Show the Jumbo Frames configuration on the specified SSM:
|
|
2 |
Show the configured MTU on the specified SSM port:
|

|
|
Confirming Jumbo Frames Configuration on SGMs and SGM Interfaces (asg_jumbo_conf show)
Description
You can confirm configuration of Jumbo Frames on SGMs and SGM interfaces.
Use the "asg_jumbo_conf show
" command in the Expert mode to:
-
Make sure that Jumbo Frames are enabled on the SGMs.
-
See the configured MTU values on SGM interfaces configured for Jumbo Frames.
Syntax
See asg_jumbo_conf.
|
Parameters
Parameter |
Description |
---|---|
|
Detailed report (verbose) |

|