Skip to content

Commit 17f4e71

Browse files
committed
Gopi tech review
1 parent 946a71b commit 17f4e71

File tree

1 file changed

+7
-9
lines changed

1 file changed

+7
-9
lines changed

articles/firewall/long-running-sessions.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -5,48 +5,46 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 09/20/2022
8+
ms.date: 09/21/2022
99
ms.author: victorh
1010
---
1111

1212
# Long running TCP sessions with Azure Firewall
1313

1414
Azure Firewall is designed to be available and redundant. Every effort is made to avoid service disruptions. However, there are few scenarios where Azure Firewall can potentially drop long running TCP sessions.
1515

16-
## Disruption scenarios
16+
## Scenarios impacting long running connections
1717

1818
The following scenarios can potentially drop long running TCP sessions:
1919
- Scale down
2020
- Firewall maintenance
2121
- Idle timeout
2222
- Auto-recovery
2323

24-
### Drops due to scale down
24+
### Scale down
2525

2626
Azure Firewall scales up\down based on throughput and CPU usage. Scale down is performed by putting the VM instance in drain mode for 90 seconds before recycling the VM instance. Any long running connections remaining on the VM instance after 90 seconds will be disconnected.
2727

28-
### Drops during maintenance
28+
### Firewall maintenance
2929

3030
The Azure Firewall engineering team updates the firewall on an as-needed basis (usually every month), generally during night time hours in the local time-zone for that region. Updates include security patches, bug fixes, and new feature roll outs that are applied by configuring the firewall in a [rolling update mode](https://azure.microsoft.com/blog/deployment-strategies-defined/). The firewall instances are put in a drain mode before reimaging them to give short-lived sessions time to drain. Long running sessions remaining on an instance after the drain period are dropped during the restart.
3131

32-
### Drops due to idle timeout
32+
### Idle timeout
3333

3434
An idle timer is in place to recycle idle sessions. The default value is four minutes. Applications that maintain keep-alives don't idle out. If the application needs more than 4 minutes (typical of IOT devices), you can contact support to extend the time to 30 minutes in the backend.
3535

36-
### Drops due to auto-recovery
36+
### Auto-recovery
3737

3838
Azure Firewall constantly monitors VM instances and recovers them automatically in case any instance goes unresponsive. In general, there is a 1 in 100 chance for a firewall instance to be auto-recovered over a 30 day period.
3939

40-
## Using applications sensitive to TCP session resets
40+
## Applications sensitive to TCP session resets
4141

4242
Session disconnection isn’t an issue for resilient applications that can handle session reset gracefully. However, there are few applications (like traditional SAP GUI and SAP RFC based apps) which are sensitive to sessions resets. Secure such sensitive applications using Network Security Groups (NSGs).
4343

4444
## Network security groups
4545

4646
You can deploy [network security groups](../virtual-network/virtual-network-vnet-plan-design-arm.md#security) (NSGs) to protect against unsolicited traffic into Azure subnets. Network security groups are simple, stateful packet inspection devices that use the 5-tuple approach (source IP, source port, destination IP, destination port, and layer 4 protocol) to create allow/deny rules for network traffic. You allow or deny traffic to and from a single IP address, to and from multiple IP addresses, or to and from entire subnets. NSG flow logs help with auditing by logging information about IP traffic flowing through an NSG. To learn more about NSG flow logging, see [Introduction to flow logging for network security groups](../network-watcher/network-watcher-nsg-flow-logging-overview.md).
4747

48-
49-
5048
## Next steps
5149

5250
To learn more about Azure Firewall performance, see [Azure Firewall performance](firewall-performance.md).

0 commit comments

Comments
 (0)