13.6. Length Limit Settings
This section contains information about the size limits imposed on the protocols directly under IP
level, such as TCP, UDP and ICMP.
The values specified here concern the IP data contained in packets. In the case of Ethernet, a single
packet can contain up to 1480 bytes of IP data without fragmentation. In addition to that, there is a
further 20 bytes of IP header and 14 bytes of Ethernet header, corresponding to the maximum media
transmission unit on Ethernet networks of 1514 bytes.
Max TCP Length
Specifies the maximum size of a TCP packet including the header. This value usually correlates
with the amount of IP data that can be accommodated in an unfragmented packet, since TCP usually
adapts the segments it sends to fit the maximum packet size. However, this value may need to be
increased by 20-50 bytes on some less common VPN systems.
Default: 1480
Max UDP Length
Specifies in bytes the maximum size of a UDP packet including the header. This value may well
need to be quite high, since many real-time applications use large, fragmented UDP packets. If no
such protocols are used, the size limit imposed on UDP packets can probably be lowered to 1480
bytes.
Default: 60000
Max ICMP Length
Specifies in bytes the maximum size of an ICMP packet. ICMP error messages should never exceed
600 bytes, although Ping packets can be larger if so requested. This value may be lowered to 1000
bytes if you do not wish to use large Ping packets.
Default: 10000
Max GRE Length
Specifies in bytes the maximum size of a GRE packet. GRE, Generic Routing Encapsulation, has
various uses, including the transportation of PPTP, Point to Point Tunneling Protocol, data. This
value should be set at the size of the largest packet allowed to pass through the VPN connections,
regardless of its original protocol, plus approx. 50 bytes.
Default: 2000
Max ESP Length
Specifies in bytes the maximum size of an ESP packet. ESP, Encapsulation Security Payload, is
used by IPsec where encryption is applied. This value should be set at the size of the largest packet
allowed to pass through the VPN connections, regardless of its original protocol, plus approx. 50
bytes.
Default: 2000
Max AH Length
13.6. Length Limit Settings
Chapter 13. Advanced Settings
441
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...