Example: Accommodating End-to-End TCP Communication for J Series Services Routers
This example shows how to change the maximum segment size (MSS) for TCP packets to be sent or received over GRE and IPsec tunnels.
Requirements
Before you begin, review TCP packets and security checks. See Junos OS Feature Support Reference for SRX Series and J Series Devices.
Overview
End-to-end TCP communication in a customer network might not work for large packets approaching 1500 bytes because of GRE or IPsec tunneling encapsulation. You can configure sessions to accommodate other systems and segment sizes.
Configuration
CLI Quick Configuration
To quickly change the MSS for TCP packets to be sent or received over GRE and IPsec tunnels, copy the following commands and paste them into the CLI:
set security flow tcp-mss ipsec-vpn mss 1400
set security flow tcp-mss gre-in mss 1364
set security flow tcp-mss gre-out mss 1364
set security flow tcp-mss all-tcp 1400
set security flow allow-dns-reply
set security flow route-change-timeout 62
set security flow syn-flood-protection-mode syn-proxy
Step-by-Step Procedure
The following example requires you to navigate various levels in the configuration hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration Mode.
To change the MSS for TCP packets to be sent or received over GRE and IPsec tunnels:
- Set the tunnel sessions.[edit security flow]
user@host# set tcp-mss ipsec-vpn mss 1400
user@host# set tcp-mss gre-in mss 1364
user@host# set tcp-mss gre-out mss 1364 - Configure TCP MSS for all TCP sessions.[edit security flow]
user@host# set tcp-mss all-tcp 1400 - Allow an unmatched incoming DNS reply
packet.[edit security flow]
user@host# set allow-dns-reply - Set the timeout value for route change
to nonexistent route.[edit security flow]
user@host# set route-change-timeout 62 - Enable TCP SYN flood protection mode.[edit security flow]
user@host# set syn-flood-protection-mode syn-proxy
Results
From configuration mode, confirm your configuration by entering the show security flow command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.
[edit]
user@host# show security flowallow-dns-reply;
route-change-timeout 62;
syn-flood-protection-mode syn-proxy;
tcp-mss {
all-tcp {
mss 1400;
}
ipsec-vpn {
mss 1400;
}
gre-in {
mss 1364;
}
gre-out {
mss 1364;
}
}
If you are done configuring the device, enter commit from configuration mode.
Verification
To confirm that the configuration is working properly, perform this task:
Troubleshooting with Logs
Purpose
Use these logs to identify any issues.
Action
From operational mode, enter the show log messages command and the show log dcd command.
Related Topics
- Junos OS Feature Support Reference for SRX Series and J Series Devices
- Example: Disabling TCP Packet Security Checks for J Series Services Routers
- Example: Controlling Session Termination for J Series Services Routers
- Understanding Session Characteristics for J Series Services Routers
Hide Navigation Pane
Show Navigation Pane
Download
SHA1