You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: TCP Idle timeout behavior and long-running TCP sessions in Azure Firewall
2
+
title: Azure Firewall idle timeout and long-running TCP sessions
3
3
description: Understand TCP idle timeout behavior and scenarios where Azure Firewall can drop long-running TCP sessions.
4
4
services: firewall
5
5
author: sujamiya
@@ -11,11 +11,24 @@ ms.author: duau
11
11
12
12
# TCP idle timeout behavior and long-running TCP sessions in Azure Firewall
13
13
14
-
This article explains the TCP idle timeout settings and the behavior of long-running sessions in Azure Firewall. Understanding these settings is essential for maintaining network security, optimizing Azure Firewall resources, and ensuring uninterrupted connectivity for critical applications.
14
+
This article explains the TCP idle timeout and the behavior of long-running sessions in Azure Firewall. Understanding how these settings work is crucial for maintaining a secure and efficient network environment.
15
+
16
+
## Long-running TCP sessions
17
+
---
18
+
19
+
Azure Firewall is built for high availability and redundancy, aiming to minimize service disruptions. However, certain scenarios can still lead to the dropping of long-running TCP sessions. Long-running sessions are TCP connections that remain active for extended periods. These are commonly used in applications such as SSH, RDP, VPN tunnels, and database connections. To ensure these sessions remain connected, specific configurations are required.
20
+
21
+
The following Azure Firewall scenarios can potentially drop long-running TCP sessions:
22
+
23
+
-**Scale-in**: When Azure Firewall scales in, it puts the instance in drain mode for 90 seconds before recycling. Any long-running connections still active after this period are disconnected.
24
+
-**Firewall maintenance**: During maintenance updates, the firewall enters drain mode to allow short-lived sessions to complete. Long-running sessions that remain after the drain period are dropped during the restart.
25
+
-**Autorecovery**: If an Azure Firewall instance becomes unresponsive, it will automatically recovered. This process can result in the disconnection of long-running sessions.
26
+
-**Idle timeout**: Idle sessions are recycled based on the TCP idle timeout settings.
15
27
16
28
## Idle timeout settings
29
+
---
17
30
18
-
The TCP (Transmission Control Protocol) idle timeout specifies the duration a connection can stay inactive before the Azure Firewall terminates the connection. This setting helps optimize the Azure Firewall by closing inactive connections and maintaining overall network performance.
31
+
The TCP idle timeout specifies the duration a connection can stay inactive before the Azure Firewall terminates the connection. This setting helps optimize the Azure Firewall by closing inactive connections and maintaining overall network performance.
19
32
20
33
Configuring the TCP idle timeout properly can:
21
34
@@ -30,31 +43,19 @@ In the aspect of the Azure Firewall, **north-south** traffic refers to the traff
30
43
-**North-south**: The default TCP idle timeout is set to **4 minutes** to maintain active connections. You can increase the timeout to a maximum of **15 minutes** by submitting a support request through the Azure portal.
31
44
-**East-west**: There's a **5 minutes** TCP idle timeout on the Azure Firewall. This timeout isn't configurable.
32
45
33
-
## Long-running TCP sessions
34
-
35
-
Azure Firewall is built for high availability and redundancy, aiming to minimize service disruptions. However, certain scenarios can still lead to the dropping of long-running TCP sessions. Long-running sessions are TCP connections that remain active for extended periods. These are commonly used in applications such as SSH, RDP, VPN tunnels, and database connections. To ensure these sessions remain connected, specific configurations are required.
36
-
37
-
The following scenarios can potentially drop long-running TCP sessions:
46
+
## Applications sensitive to TCP session reset
38
47
39
-
-**Scale-in**: When Azure Firewall scales in, it puts the instance in drain mode for 90 seconds before recycling. Any long-running connections still active after this period are disconnected.
40
-
-**Firewall maintenance**: During maintenance updates, the firewall enters drain mode to allow short-lived sessions to complete. Long-running sessions that remain after the drain period are dropped during the restart.
41
-
-**Idle timeout**: Idle sessions are recycled based on the TCP idle timeout settings. For north-south traffic, you can request an increase in the timeout. For east-west traffic, the timeout is fixed at 5 minutes.
42
-
-**Autorecovery**: If an Azure Firewall instance becomes unresponsive, it's automatically recovered. This process can result in the disconnection of long-running sessions.
48
+
Some applications, such as traditional SAP GUI and SAP RFC (Remote Function Call) based apps, are sensitive to TCP session resets.
43
49
44
50
> [!TIP]
45
51
> To avoid connectivity issues, configure a keep-alive mechanism within your application that communicates through the Azure Firewall for east-west traffic. This ensures that long-running sessions remain active and aren't affected by the idle timeout settings.
46
52
47
-
## Applications sensitive to TCP session reset
48
-
49
-
Some applications, such as traditional SAP GUI and SAP RFC (Remote Function Call) based apps, are sensitive to TCP session resets and may not handle them gracefully. To protect these sensitive applications, use network security groups (NSGs).
50
-
51
-
For more information, see [How to secure a virtual network](../virtual-network/virtual-network-vnet-plan-design-arm.md#security) and [Network security groups](../virtual-network/network-security-groups-overview.md).
52
-
53
53
> [!IMPORTANT]
54
54
> -**North-south traffic**: The Azure Firewall sends a reset packet (RST) to both the source and destination when an idle timeout occurs.
55
55
> -**East-west traffic**: The Azure Firewall doesn't send a reset packet (RST) when an idle timeout occurs.
56
56
57
57
## Next steps
58
58
59
+
- To protect and monitor you applications, use [Network security groups](../virtual-network/network-security-groups-overview.md) and [How to secure a virtual network](../virtual-network/virtual-network-vnet-plan-design-arm.md#security).
59
60
- To learn more about Azure Firewall performance, see [Azure Firewall performance](firewall-performance.md).
60
61
- To learn more about NSG flow logging, see [Introduction to flow logging for network security groups](../network-watcher/network-watcher-nsg-flow-logging-overview.md).
0 commit comments