Skip to content

Commit e3b69f6

Browse files
committed
minor edits
1 parent 85740aa commit e3b69f6

File tree

1 file changed

+8
-6
lines changed

1 file changed

+8
-6
lines changed

articles/firewall/long-running-sessions.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This article explains the TCP idle timeout settings and the behavior of long-run
1515

1616
## Idle timeout settings
1717

18-
The TCP (Transmission Control Protocol) idle timeout specifies the duration a connection can stay inactive before being terminated by the Azure Firewall. This setting helps optimize the Azure Firewall by closing inactive connections and maintaining overall network performance.
18+
The TCP (Transmission Control Protocol) idle timeout specifies the duration a connection can stay inactive before the Azure Firewall terminates the connection. This setting helps optimize the Azure Firewall by closing inactive connections and maintaining overall network performance.
1919

2020
Configuring the TCP idle timeout properly can:
2121

@@ -28,7 +28,7 @@ Configuring the TCP idle timeout properly can:
2828
In the aspect of the Azure Firewall, **north-south** traffic refers to the traffic that flows between the Azure Firewall and the Internet, while **east-west** traffic refers to the traffic that flows between Azure resources within the same region or across regions. This also includes traffic between Azure resources and on-premises resources connected through Azure VPN, Azure ExpressRoute, and Virtual network peering. The TCP idle timeout behavior in Azure Firewall is different for north-south and east-west traffic.
2929

3030
- **North-south**: The default TCP idle timeout is set to **4 minutes** to maintain active connections. You can increase the timeout to a maximum of **15 minutes** by submitting a support request through the Azure portal.
31-
- **East-west**: There is a **5 minutes** TCP idle timeout on the Azure Firewall. This timeout isn't configurable.
31+
- **East-west**: There's a **5 minutes** TCP idle timeout on the Azure Firewall. This timeout isn't configurable.
3232

3333
## Long-running TCP sessions
3434

@@ -39,17 +39,19 @@ The following scenarios can potentially drop long-running TCP sessions:
3939
- **Scale-in**: When Azure Firewall scales in, it puts the instance in drain mode for 90 seconds before recycling. Any long-running connections still active after this period are disconnected.
4040
- **Firewall maintenance**: During maintenance updates, the firewall enters drain mode to allow short-lived sessions to complete. Long-running sessions that remain after the drain period are dropped during the restart.
4141
- **Idle timeout**: Idle sessions are recycled based on the TCP idle timeout settings. For north-south traffic, you can request an increase in the timeout. For east-west traffic, the timeout is fixed at 5 minutes.
42-
- **Autorecovery**: If an Azure Firewall instance becomes unresponsive, it is automatically recovered. This process can result in the disconnection of long-running sessions.
42+
- **Autorecovery**: If an Azure Firewall instance becomes unresponsive, it's automatically recovered. This process can result in the disconnection of long-running sessions.
4343

4444
> [!IMPORTANT]
45-
> To avoid connectivity issues, configure a keep-alive mechanism within your application that communicates through the Azure Firewall for east-west traffic. This ensures that long-running sessions remain active and are not affected by the idle timeout settings.
45+
> To avoid connectivity issues, configure a keep-alive mechanism within your application that communicates through the Azure Firewall for east-west traffic. This ensures that long-running sessions remain active and aren't affected by the idle timeout settings.
4646
4747
## Applications sensitive to TCP session reset
4848

49-
Some applications, such as traditional SAP GUI and SAP RFC (Remote Function Call) based apps, are sensitive to TCP session resets and may not handle them gracefully. To protect these sensitive applications, use network security groups (NSGs). For more information, see [How to secure a virtual network](../virtual-network/virtual-network-vnet-plan-design-arm.md#security) and [Network security groups](../virtual-network/network-security-groups-overview.md).
49+
Some applications, such as traditional SAP GUI and SAP RFC (Remote Function Call) based apps, are sensitive to TCP session resets and may not handle them gracefully. To protect these sensitive applications, use network security groups (NSGs).
50+
51+
For more information, see [How to secure a virtual network](../virtual-network/virtual-network-vnet-plan-design-arm.md#security) and [Network security groups](../virtual-network/network-security-groups-overview.md).
5052

5153
> [!NOTE]
52-
> For north-south traffic, an idle timeout results in a RST (reset) packet being sent in both directions. In contrast, for east-west traffic, no RST packet is sent when an idle timeout occurs.
54+
> For north-south traffic, an idle timeout results in a reset packet (RST) getting sent to both the source and destination. In contrast, for east-west traffic, a reset **isn't** sent when an idle timeout occurs.
5355
5456
## Next steps
5557

0 commit comments

Comments
 (0)