You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/firewall/long-running-sessions.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,48 +5,46 @@ services: firewall
5
5
author: vhorne
6
6
ms.service: firewall
7
7
ms.topic: article
8
-
ms.date: 09/20/2022
8
+
ms.date: 09/21/2022
9
9
ms.author: victorh
10
10
---
11
11
12
12
# Long running TCP sessions with Azure Firewall
13
13
14
14
Azure Firewall is designed to be available and redundant. Every effort is made to avoid service disruptions. However, there are few scenarios where Azure Firewall can potentially drop long running TCP sessions.
15
15
16
-
## Disruption scenarios
16
+
## Scenarios impacting long running connections
17
17
18
18
The following scenarios can potentially drop long running TCP sessions:
19
19
- Scale down
20
20
- Firewall maintenance
21
21
- Idle timeout
22
22
- Auto-recovery
23
23
24
-
### Drops due to scale down
24
+
### Scale down
25
25
26
26
Azure Firewall scales up\down based on throughput and CPU usage. Scale down is performed by putting the VM instance in drain mode for 90 seconds before recycling the VM instance. Any long running connections remaining on the VM instance after 90 seconds will be disconnected.
27
27
28
-
### Drops during maintenance
28
+
### Firewall maintenance
29
29
30
30
The Azure Firewall engineering team updates the firewall on an as-needed basis (usually every month), generally during night time hours in the local time-zone for that region. Updates include security patches, bug fixes, and new feature roll outs that are applied by configuring the firewall in a [rolling update mode](https://azure.microsoft.com/blog/deployment-strategies-defined/). The firewall instances are put in a drain mode before reimaging them to give short-lived sessions time to drain. Long running sessions remaining on an instance after the drain period are dropped during the restart.
31
31
32
-
### Drops due to idle timeout
32
+
### Idle timeout
33
33
34
34
An idle timer is in place to recycle idle sessions. The default value is four minutes. Applications that maintain keep-alives don't idle out. If the application needs more than 4 minutes (typical of IOT devices), you can contact support to extend the time to 30 minutes in the backend.
35
35
36
-
### Drops due to auto-recovery
36
+
### Auto-recovery
37
37
38
38
Azure Firewall constantly monitors VM instances and recovers them automatically in case any instance goes unresponsive. In general, there is a 1 in 100 chance for a firewall instance to be auto-recovered over a 30 day period.
39
39
40
-
## Using applications sensitive to TCP session resets
40
+
## Applications sensitive to TCP session resets
41
41
42
42
Session disconnection isn’t an issue for resilient applications that can handle session reset gracefully. However, there are few applications (like traditional SAP GUI and SAP RFC based apps) which are sensitive to sessions resets. Secure such sensitive applications using Network Security Groups (NSGs).
43
43
44
44
## Network security groups
45
45
46
46
You can deploy [network security groups](../virtual-network/virtual-network-vnet-plan-design-arm.md#security) (NSGs) to protect against unsolicited traffic into Azure subnets. Network security groups are simple, stateful packet inspection devices that use the 5-tuple approach (source IP, source port, destination IP, destination port, and layer 4 protocol) to create allow/deny rules for network traffic. You allow or deny traffic to and from a single IP address, to and from multiple IP addresses, or to and from entire subnets. NSG flow logs help with auditing by logging information about IP traffic flowing through an NSG. To learn more about NSG flow logging, see [Introduction to flow logging for network security groups](../network-watcher/network-watcher-nsg-flow-logging-overview.md).
47
47
48
-
49
-
50
48
## Next steps
51
49
52
50
To learn more about Azure Firewall performance, see [Azure Firewall performance](firewall-performance.md).
0 commit comments