Skip to content

Commit 2af0932

Browse files
Merge pull request #278966 from aybatra/patch-16
Add MSS Clamping details
2 parents fb691c0 + 8807b57 commit 2af0932

File tree

1 file changed

+7
-2
lines changed

1 file changed

+7
-2
lines changed

articles/vpn-gateway/vpn-gateway-about-vpn-devices.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -112,8 +112,6 @@ After you download the provided VPN device configuration sample, you’ll need t
112112

113113
The following tables contain the combinations of algorithms and parameters Azure VPN gateways use in default configuration (**Default policies**). For route-based VPN gateways created using the Azure Resource Management deployment model, you can specify a custom policy on each individual connection. Refer to [Configure IPsec/IKE policy](vpn-gateway-ipsecikepolicy-rm-powershell.md) for detailed instructions.
114114

115-
Additionally, you must clamp TCP **MSS** at **1350**. Or if your VPN devices don't support MSS clamping, you can alternatively set the **MTU** on the tunnel interface to **1400** bytes instead.
116-
117115
In the following tables:
118116

119117
* SA = Security Association
@@ -142,6 +140,13 @@ In the following tables:
142140
| Perfect Forward Secrecy (PFS) |No |[RouteBased QM SA Offers](#RouteBasedOffers) |
143141
| Dead Peer Detection (DPD) |Not supported |Supported |
144142

143+
### Azure VPN Gateway TCP MSS Clamping
144+
145+
MSS clamping is done bidirectionally on the Azure VPN Gateway. The following table lists the packet size under different scenarios.
146+
| **Packet Flow** |**IPv4** | **IPv6** |
147+
| Over Internet | 1340 bytes | 1360 bytes |
148+
| Over Express Route Gateway | 1250 bytes | 1250 bytes |
149+
145150

146151
### <a name ="RouteBasedOffers"></a>RouteBased VPN IPsec Security Association (IKE Quick Mode SA) Offers
147152

0 commit comments

Comments
 (0)