Skip to content

Commit ba47006

Browse files
authored
Merge pull request #211786 from vhorne/fw-long-running
add long running session
2 parents ef45367 + fb1d1c2 commit ba47006

File tree

2 files changed

+52
-0
lines changed

2 files changed

+52
-0
lines changed
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
title: Long running TCP sessions with Azure Firewall
3+
description: There are few scenarios where Azure Firewall can potentially drop long running TCP sessions.
4+
services: firewall
5+
author: vhorne
6+
ms.service: firewall
7+
ms.topic: article
8+
ms.date: 09/21/2022
9+
ms.author: victorh
10+
---
11+
12+
# Long running TCP sessions with Azure Firewall
13+
14+
Azure Firewall is designed to be available and redundant. Every effort is made to avoid service disruptions. However, there are few scenarios where Azure Firewall can potentially drop long running TCP sessions.
15+
16+
## Scenarios impacting long running connections
17+
18+
The following scenarios can potentially drop long running TCP sessions:
19+
- Scale down
20+
- Firewall maintenance
21+
- Idle timeout
22+
- Auto-recovery
23+
24+
### Scale down
25+
26+
Azure Firewall scales up\down based on throughput and CPU usage. Scale down is performed by putting the VM instance in drain mode for 90 seconds before recycling the VM instance. Any long running connections remaining on the VM instance after 90 seconds will be disconnected.
27+
28+
### Firewall maintenance
29+
30+
The Azure Firewall engineering team updates the firewall on an as-needed basis (usually every month), generally during night time hours in the local time-zone for that region. Updates include security patches, bug fixes, and new feature roll outs that are applied by configuring the firewall in a [rolling update mode](https://azure.microsoft.com/blog/deployment-strategies-defined/). The firewall instances are put in a drain mode before reimaging them to give short-lived sessions time to drain. Long running sessions remaining on an instance after the drain period are dropped during the restart.
31+
32+
### Idle timeout
33+
34+
An idle timer is in place to recycle idle sessions. The default value is four minutes. Applications that maintain keepalives don't idle out. If the application needs more than 4 minutes (typical of IOT devices), you can contact support to extend the time to 30 minutes in the backend.
35+
36+
### Auto-recovery
37+
38+
Azure Firewall constantly monitors VM instances and recovers them automatically in case any instance goes unresponsive. In general, there's a 1 in 100 chance for a firewall instance to be auto-recovered over a 30 day period.
39+
40+
## Applications sensitive to TCP session resets
41+
42+
Session disconnection isn’t an issue for resilient applications that can handle session reset gracefully. However, there are few applications (like traditional SAP GUI and SAP RFC based apps) which are sensitive to sessions resets. Secure such sensitive applications with Network Security Groups (NSGs).
43+
44+
## Network security groups
45+
46+
You can deploy [network security groups](../virtual-network/virtual-network-vnet-plan-design-arm.md#security) (NSGs) to protect against unsolicited traffic into Azure subnets. Network security groups are simple, stateful packet inspection devices that use the 5-tuple approach (source IP, source port, destination IP, destination port, and layer 4 protocol) to create allow/deny rules for network traffic. You allow or deny traffic to and from a single IP address, to and from multiple IP addresses, or to and from entire subnets. NSG flow logs help with auditing by logging information about IP traffic flowing through an NSG. To learn more about NSG flow logging, see [Introduction to flow logging for network security groups](../network-watcher/network-watcher-nsg-flow-logging-overview.md).
47+
48+
## Next steps
49+
50+
To learn more about Azure Firewall performance, see [Azure Firewall performance](firewall-performance.md).

articles/firewall/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,8 @@ items:
9191
href: ftp-support.md
9292
- name: Performance
9393
href: firewall-performance.md
94+
- name: Long running TCP sessions
95+
href: long-running-sessions.md
9496
- name: How-to guides
9597
items:
9698
- name: Deploy and configure - classic

0 commit comments

Comments
 (0)