<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Need info on setting MSS frame size on an S4 BGP router in End of Service Products</title>
    <link>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25234#M638</link>
    <description>I was afraid of that Erik... Time for this one to move to a Brocade  ... Seems to be a new specific feature we may need to figure out solutions for as more folks will start using a cloud based scrubbing solution for DDOS protection.  I am including the detail from the cloud DDOS vendor.  These are things we need solutions for if we are going to continue to play in the outbound side of internet routing.  This must be done at the edge router not upstream core routers.  &lt;BR /&gt;
&lt;BR /&gt;
Direct info from vendor below if anyone wants to research and understand this better.  &lt;BR /&gt;
&lt;BR /&gt;
""Let me elaborate. xxxx ISD has purchased a DDoS protection  solution that is a hybrid of an on premise appliance and a cloud scrubbing  service for volumetric attacks. The mechanism to gain attack traffic to the  cloud for scrubbing is to divert the customer traffic over to our scrubbing  center via BGP announcements (shortest path) and return clean traffic back to  xxxx over GRE tunnels. It must be returned over GRE since the scrubbing  center is advertising xxxx AS there is no way to dynamically route back to  them. While under diversion xxxx traffic will be asymmetrical with outbound  traffic passing out the normal path and inbound through our scrubbing center  and over GRE back to customer&lt;BR /&gt;
&lt;BR /&gt;
      Due to the nature of GRE (the extra overhead due to the  encapsulation) any packet that is already at 1500MTU will need to be fragmented  once the GRE overhead is added to keep it from being a jumbo frame. The problem  is when an application has the DF (don’t frag) flag set in the TCP header.  Since it cannot be fragmented it gets dropped as a jumbo. The workaround to  this is to insure the max size of a TCP packet is under 1500 (we recommend  1360) to allow for GRE overhead without fragmenting. This is normally  accomplished in the customers internet router. Depending on the make of the  router it could be called MSS clamping or TCP adjust. Any packet that contains  an initial TCP header flowing through your router will be examined against the  MSS in the router. The MSS in the header will be lowered to this amount if the  setting is lower than what is in the header. If the header value is already  lower, it will flow through unmodified. The end hosts will use the lower  setting of the two hosts. For example, in a Cisco router the command will look  like "ip tcp adjust-mss 1360". &lt;BR /&gt;
&lt;BR /&gt;
      The goal is to insure TCP sessions between two hosts  negotiate to 1360MTU so that there will be no jumbo frames once GRE  encapsulation is added.""&lt;BR /&gt;</description>
    <pubDate>Sat, 16 Dec 2017 00:51:00 GMT</pubDate>
    <dc:creator>EtherMAN</dc:creator>
    <dc:date>2017-12-16T00:51:00Z</dc:date>
    <item>
      <title>Need info on setting MSS frame size on an S4 BGP router</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25232#M636</link>
      <description>I have a customer that is using a remote cloud scrubbing device and needs to change their S4 router MSS values on outbound TCP connections to 1360.  Most other routers have a command for this.  I have no S4 expertise so I am hopping one of you can help out.  Here is what i get from LLDP about their router.&lt;BR /&gt;
&lt;BR /&gt;
System Description: "Extreme Networks, Inc. Bonded S4 Chassis Rev 08.4\&lt;BR /&gt;
                           2.02.0012H3 03/14/2016--15:50 ofc"&lt;BR /&gt;</description>
      <pubDate>Fri, 15 Dec 2017 00:12:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25232#M636</guid>
      <dc:creator>EtherMAN</dc:creator>
      <dc:date>2017-12-15T00:12:00Z</dc:date>
    </item>
    <item>
      <title>RE: Need info on setting MSS frame size on an S4 BGP router</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25233#M637</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
I am not sure if this can be configured directly on an S-Series.&lt;BR /&gt;
&lt;BR /&gt;
But you can try to enable PMTUD with the command &lt;I&gt;set mtu enable&lt;/I&gt; and use a network that send ICMP Packet Too Big messages. But since PMTUD is default on the S-Series this probably does not help, and the network either does not generate Packet Too Big or it is filtered somewhere.&lt;BR /&gt;
&lt;BR /&gt;
As far as I know the IP MTU cannot be controlled directly on the S-Series, the port MTU cannot be reduced below 1518 B (for Ethernet), and the S-Series will not create IP packets larger than 1500 B (but transport them if jumbo frames are enabled, including layer 3 forwarding).&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Sat, 16 Dec 2017 00:32:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25233#M637</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-12-16T00:32:00Z</dc:date>
    </item>
    <item>
      <title>RE: Need info on setting MSS frame size on an S4 BGP router</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25234#M638</link>
      <description>I was afraid of that Erik... Time for this one to move to a Brocade  ... Seems to be a new specific feature we may need to figure out solutions for as more folks will start using a cloud based scrubbing solution for DDOS protection.  I am including the detail from the cloud DDOS vendor.  These are things we need solutions for if we are going to continue to play in the outbound side of internet routing.  This must be done at the edge router not upstream core routers.  &lt;BR /&gt;
&lt;BR /&gt;
Direct info from vendor below if anyone wants to research and understand this better.  &lt;BR /&gt;
&lt;BR /&gt;
""Let me elaborate. xxxx ISD has purchased a DDoS protection  solution that is a hybrid of an on premise appliance and a cloud scrubbing  service for volumetric attacks. The mechanism to gain attack traffic to the  cloud for scrubbing is to divert the customer traffic over to our scrubbing  center via BGP announcements (shortest path) and return clean traffic back to  xxxx over GRE tunnels. It must be returned over GRE since the scrubbing  center is advertising xxxx AS there is no way to dynamically route back to  them. While under diversion xxxx traffic will be asymmetrical with outbound  traffic passing out the normal path and inbound through our scrubbing center  and over GRE back to customer&lt;BR /&gt;
&lt;BR /&gt;
      Due to the nature of GRE (the extra overhead due to the  encapsulation) any packet that is already at 1500MTU will need to be fragmented  once the GRE overhead is added to keep it from being a jumbo frame. The problem  is when an application has the DF (don’t frag) flag set in the TCP header.  Since it cannot be fragmented it gets dropped as a jumbo. The workaround to  this is to insure the max size of a TCP packet is under 1500 (we recommend  1360) to allow for GRE overhead without fragmenting. This is normally  accomplished in the customers internet router. Depending on the make of the  router it could be called MSS clamping or TCP adjust. Any packet that contains  an initial TCP header flowing through your router will be examined against the  MSS in the router. The MSS in the header will be lowered to this amount if the  setting is lower than what is in the header. If the header value is already  lower, it will flow through unmodified. The end hosts will use the lower  setting of the two hosts. For example, in a Cisco router the command will look  like "ip tcp adjust-mss 1360". &lt;BR /&gt;
&lt;BR /&gt;
      The goal is to insure TCP sessions between two hosts  negotiate to 1360MTU so that there will be no jumbo frames once GRE  encapsulation is added.""&lt;BR /&gt;</description>
      <pubDate>Sat, 16 Dec 2017 00:51:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25234#M638</guid>
      <dc:creator>EtherMAN</dc:creator>
      <dc:date>2017-12-16T00:51:00Z</dc:date>
    </item>
    <item>
      <title>RE: Need info on setting MSS frame size on an S4 BGP router</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25235#M639</link>
      <description>Hi EtherMAN,&lt;BR /&gt;
&lt;BR /&gt;
I am not sure I understand your question completely. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;
&lt;BR /&gt;
As I understood your question you asked for a way to change the MSS used by the TCP connection the BGP peering is based upon. But that is not what a DDoS scrubbing service would need.&lt;BR /&gt;
&lt;BR /&gt;
As long as no cloud scrubbing is happening, no encapsulation overhead is added by the DDoS mitigation service. That was the simple part. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;BR /&gt;
&lt;BR /&gt;
For cloud based scrubbing, the data is diverted to the cloud, scrubbed, and the clean traffic sent GRE encapsulated to the customer. As I understand it that should affect traffic &lt;I&gt;through&lt;/I&gt; the BGP router, but not (all) traffic &lt;I&gt;to&lt;/I&gt; the BGP router, especially the BGP sessions.&lt;BR /&gt;
&lt;BR /&gt;
Thus it is needed to reduce the IP MTU, not just the TCP MSS, for all through traffic (there is still UDP traffic that can fill 1500B, e.g. DNSSEC or QUIC or DTLS, that might need to pass through the scrubber).&lt;BR /&gt;
&lt;BR /&gt;
As written above I do not know of a way to implement this with the S-Series. As far as I know this is not possible with EXOS either (&lt;I&gt;configure ip-mtu&lt;/I&gt; accepts values of 1500 and bigger only).&lt;BR /&gt;
&lt;BR /&gt;
To my knowledge adjusting the IP MTU (or even the TCP MSS) to lower values is not usually found in multi-layer switches, but rather in routers and firewalls.&lt;BR /&gt;
&lt;BR /&gt;
As you hinted at, the Brocade router platforms might provide this feature, but I do not know this.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Sat, 16 Dec 2017 02:10:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25235#M639</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-12-16T02:10:00Z</dc:date>
    </item>
    <item>
      <title>RE: Need info on setting MSS frame size on an S4 BGP router</title>
      <link>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25236#M640</link>
      <description>You have it Erik and thanks.  Going to be interesting for all of us as more folks have to have a cloud based solution to keep the volumetric attacks from taking down critical services.  Even if you have ten gig pipes to a ISP a refection attack can be bought that can hit speeds greater than ten gigs and render your internet connection and any black box IDS or firewall useless.  I hope they go with the Brocade solution for sure.  It does seem the Brocade has a way to do this from what I have found&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="http://www.brocade.com/content/html/en/command-reference-guide/netiron-05900-cliguide/GUID-80EBEEE0-46E6-4D19-9E47-09D90F34B8E1.html" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.brocade.com/content/html/en/command-reference-guide/netiron-05900-cliguide/GUID-80EBEEE0-...&lt;/A&gt; &lt;BR /&gt;</description>
      <pubDate>Sat, 16 Dec 2017 03:06:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/end-of-service-products/need-info-on-setting-mss-frame-size-on-an-s4-bgp-router/m-p/25236#M640</guid>
      <dc:creator>EtherMAN</dc:creator>
      <dc:date>2017-12-16T03:06:00Z</dc:date>
    </item>
  </channel>
</rss>

