Skip to content

Commit a9a4985

Browse files
committed
rearrange content
1 parent bd43872 commit a9a4985

File tree

1 file changed

+19
-18
lines changed

1 file changed

+19
-18
lines changed
Lines changed: 19 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: TCP Idle timeout behavior and long-running TCP sessions in Azure Firewall
2+
title: Azure Firewall idle timeout and long-running TCP sessions
33
description: Understand TCP idle timeout behavior and scenarios where Azure Firewall can drop long-running TCP sessions.
44
services: firewall
55
author: sujamiya
@@ -11,11 +11,24 @@ ms.author: duau
1111

1212
# TCP idle timeout behavior and long-running TCP sessions in Azure Firewall
1313

14-
This article explains the TCP idle timeout settings and the behavior of long-running sessions in Azure Firewall. Understanding these settings is essential for maintaining network security, optimizing Azure Firewall resources, and ensuring uninterrupted connectivity for critical applications.
14+
This article explains the TCP idle timeout and the behavior of long-running sessions in Azure Firewall. Understanding how these settings work is crucial for maintaining a secure and efficient network environment.
15+
16+
## Long-running TCP sessions
17+
---
18+
19+
Azure Firewall is built for high availability and redundancy, aiming to minimize service disruptions. However, certain scenarios can still lead to the dropping of long-running TCP sessions. Long-running sessions are TCP connections that remain active for extended periods. These are commonly used in applications such as SSH, RDP, VPN tunnels, and database connections. To ensure these sessions remain connected, specific configurations are required.
20+
21+
The following Azure Firewall scenarios can potentially drop long-running TCP sessions:
22+
23+
- **Scale-in**: When Azure Firewall scales in, it puts the instance in drain mode for 90 seconds before recycling. Any long-running connections still active after this period are disconnected.
24+
- **Firewall maintenance**: During maintenance updates, the firewall enters drain mode to allow short-lived sessions to complete. Long-running sessions that remain after the drain period are dropped during the restart.
25+
- **Autorecovery**: If an Azure Firewall instance becomes unresponsive, it will automatically recovered. This process can result in the disconnection of long-running sessions.
26+
- **Idle timeout**: Idle sessions are recycled based on the TCP idle timeout settings.
1527

1628
## Idle timeout settings
29+
---
1730

18-
The TCP (Transmission Control Protocol) idle timeout specifies the duration a connection can stay inactive before the Azure Firewall terminates the connection. This setting helps optimize the Azure Firewall by closing inactive connections and maintaining overall network performance.
31+
The TCP idle timeout specifies the duration a connection can stay inactive before the Azure Firewall terminates the connection. This setting helps optimize the Azure Firewall by closing inactive connections and maintaining overall network performance.
1932

2033
Configuring the TCP idle timeout properly can:
2134

@@ -30,31 +43,19 @@ In the aspect of the Azure Firewall, **north-south** traffic refers to the traff
3043
- **North-south**: The default TCP idle timeout is set to **4 minutes** to maintain active connections. You can increase the timeout to a maximum of **15 minutes** by submitting a support request through the Azure portal.
3144
- **East-west**: There's a **5 minutes** TCP idle timeout on the Azure Firewall. This timeout isn't configurable.
3245

33-
## Long-running TCP sessions
34-
35-
Azure Firewall is built for high availability and redundancy, aiming to minimize service disruptions. However, certain scenarios can still lead to the dropping of long-running TCP sessions. Long-running sessions are TCP connections that remain active for extended periods. These are commonly used in applications such as SSH, RDP, VPN tunnels, and database connections. To ensure these sessions remain connected, specific configurations are required.
36-
37-
The following scenarios can potentially drop long-running TCP sessions:
46+
## Applications sensitive to TCP session reset
3847

39-
- **Scale-in**: When Azure Firewall scales in, it puts the instance in drain mode for 90 seconds before recycling. Any long-running connections still active after this period are disconnected.
40-
- **Firewall maintenance**: During maintenance updates, the firewall enters drain mode to allow short-lived sessions to complete. Long-running sessions that remain after the drain period are dropped during the restart.
41-
- **Idle timeout**: Idle sessions are recycled based on the TCP idle timeout settings. For north-south traffic, you can request an increase in the timeout. For east-west traffic, the timeout is fixed at 5 minutes.
42-
- **Autorecovery**: If an Azure Firewall instance becomes unresponsive, it's automatically recovered. This process can result in the disconnection of long-running sessions.
48+
Some applications, such as traditional SAP GUI and SAP RFC (Remote Function Call) based apps, are sensitive to TCP session resets.
4349

4450
> [!TIP]
4551
> To avoid connectivity issues, configure a keep-alive mechanism within your application that communicates through the Azure Firewall for east-west traffic. This ensures that long-running sessions remain active and aren't affected by the idle timeout settings.
4652
47-
## Applications sensitive to TCP session reset
48-
49-
Some applications, such as traditional SAP GUI and SAP RFC (Remote Function Call) based apps, are sensitive to TCP session resets and may not handle them gracefully. To protect these sensitive applications, use network security groups (NSGs).
50-
51-
For more information, see [How to secure a virtual network](../virtual-network/virtual-network-vnet-plan-design-arm.md#security) and [Network security groups](../virtual-network/network-security-groups-overview.md).
52-
5353
> [!IMPORTANT]
5454
> - **North-south traffic**: The Azure Firewall sends a reset packet (RST) to both the source and destination when an idle timeout occurs.
5555
> - **East-west traffic**: The Azure Firewall doesn't send a reset packet (RST) when an idle timeout occurs.
5656
5757
## Next steps
5858

59+
- To protect and monitor you applications, use [Network security groups](../virtual-network/network-security-groups-overview.md) and [How to secure a virtual network](../virtual-network/virtual-network-vnet-plan-design-arm.md#security).
5960
- To learn more about Azure Firewall performance, see [Azure Firewall performance](firewall-performance.md).
6061
- To learn more about NSG flow logging, see [Introduction to flow logging for network security groups](../network-watcher/network-watcher-nsg-flow-logging-overview.md).

0 commit comments

Comments
 (0)