Working with Jumbo Frames on Scalable Chassis

The Scalable Chassis 40000 / 60000 support Jumbo Frames with a total size of:

  • For the SSM440 - up to 9,000 bytes

  • For the SGM400 - up to 9,702 bytes

Note - Carefully calculate the MTU. For example: IPsec or GRE traffic adds bytes to the header and this leaves fewer bytes for the data payload.

Configuring Support for Jumbo Frames in a Security Group in the Gateway mode

Description

You can configure support for Jumbo Frames for each applicable interface in a Security Group.

Notes:

  • This command can take several seconds to work.

  • In a Dual Chassis environment, this command configures support for Jumbo Frames on both Chassis.

Syntax in Gaia gClish

set interface <Name of Interface> mtu <MTU Size>

Parameters

Parameter

Description

<Name of Interface>

Interface name as defined in the Gaia operating system.

<MTU Size>

Valid values to enable the support for Jumbo Frames:

  • For SSM440 - from 1501 to 9,000 bytes

  • For SGM400 - from 1501 to 9,702 bytes

Valid values to disable the support for Jumbo Frames on all SSM and SGM models:

  • from 68 to 1500 bytes

Configuring Support for Jumbo Frames in a Security Group in the Traditional VSX mode

To enable the support for Jumbo Frames in a Security Group in the Traditional VSX mode:

Step

Instructions

1

Connect with SmartConsole to the Management Server that manages the Legacy VSX Gateway, or the applicable Virtual Device.

2

From the left navigation panel, click Gateways & Servers.

3

Open the Legacy VSX Gateway object, or the applicable Virtual Device object.

4

From the left tree, click Topology.

5

Edit the applicable interface.

6

On the General tab, set the MTU to 1501 or a greater value.

Valid values to enable the support for Jumbo Frames:

  • For SSM440 - from 1501 to 9,0 bytes

  • For SGM400 - from 1501 to 9,702 bytes

7

Click OK.

8

Install Access Control Policy on the Legacy VSX Gateway object, or the applicable Virtual Device object.

To disable the support for Jumbo Frames in a Security Group in the Traditional VSX mode:

Step

Instructions

1

Connect with SmartConsole to the Management Server that manages the Legacy VSX Gateway, or the applicable Virtual Device.

2

From the left navigation panel, click Gateways & Servers.

3

Open the Legacy VSX Gateway object, or the applicable Virtual Device object.

4

From the left tree, click Topology.

5

Edit the applicable interface.

6

On the General tab, set the MTU to a value between 68 and 1500 bytes.

7

Click OK.

8

Install Access Control Policy on the Legacy VSX Gateway object, or the applicable Virtual Device object.

Confirming Jumbo Frames Configuration on SSM440 (asg_chassis_ctrl)

To run the validation test on the SSM:

See asg_chassis_ctrl.

Step

Instructions

1

Show the Jumbo Frames configuration on the specified SSM:

asg_chassis_ctrl jumbo_frames show <SSM ID>

2

Show the configured MTU on the specified SSM port:

asg_chassis_ctrl get_port_mtu <SSM ID> <Port ID>

Confirming Jumbo Frames Configuration on SGMs and SGM Interfaces (asg_jumbo_conf show)

Description

You can confirm configuration of Jumbo Frames on SGMs and SGM interfaces.

Use the "asg_jumbo_conf show" command in the Expert mode to:

  • Make sure that Jumbo Frames are enabled on the SGMs.

  • See the configured MTU values on SGM interfaces configured for Jumbo Frames.

Syntax

See asg_jumbo_conf.

asg_jumbo_conf show [-v]

Parameters

Parameter

Description

-v

Detailed report (verbose)