Looks Like there spell check miss this typo ( check TCP::max_send_size Description)
msf exploit(ms08_067_netapi) > show evasion
Module evasion options:
Name : DCERPC::fake_bind_multi
Current Setting: true
Description : Use multi-context bind calls
Name : DCERPC::fake_bind_multi_append
Current Setting: 0
Description : Set the number of UUIDs to append the target
Name : DCERPC::fake_bind_multi_prepend
Current Setting: 0
Description : Set the number of UUIDs to prepend before the target
Name : DCERPC::max_frag_size
Current Setting: 4096
Description : Set the DCERPC packet fragmentation size
Name : DCERPC::smb_pipeio
Current Setting: rw
Description : Use a different delivery method for accessing named pipes
(accepted: rw, trans)
Name : SMB::obscure_trans_pipe_level
Current Setting: 0
Description : Obscure PIPE string in TransNamedPipe (level 0-3)
Name : SMB::pad_data_level
Current Setting: 0
Description : Place extra padding between headers and data (level 0-3)
Name : SMB::pad_file_level
Current Setting: 0
Description : Obscure path names used in open/create (level 0-3)
Name : SMB::pipe_evasion
Current Setting: False
Description : Enable segmented read/writes for SMB Pipes
Name : SMB::pipe_read_max_size
Current Setting: 1024
Description : Maximum buffer size for pipe reads
Name : SMB::pipe_read_min_size
Current Setting: 1
Description : Minimum buffer size for pipe reads
Name : SMB::pipe_write_max_size
Current Setting: 1024
Description : Maximum buffer size for pipe writes
Name : SMB::pipe_write_min_size
Current Setting: 1
Description : Minimum buffer size for pipe writes
Name : TCP::max_send_size
Current Setting: 0
Description : Maxiumum tcp segment size. (0 = disable)
Name : TCP::send_delay
Current Setting: 0
Description : Delays inserted before every send. (0 = disable)