Skip to content

Commit e4e0572

Browse files
Merge pull request #212162 from vhorne/fw-long-run
change heading
2 parents f9eabe8 + b4ce661 commit e4e0572

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/firewall/long-running-sessions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ services: firewall
55
author: vhorne
66
ms.service: firewall
77
ms.topic: article
8-
ms.date: 09/21/2022
8+
ms.date: 09/22/2022
99
ms.author: victorh
1010
---
1111

1212
# Long running TCP sessions with Azure Firewall
1313

1414
Azure Firewall is designed to be available and redundant. Every effort is made to avoid service disruptions. However, there are few scenarios where Azure Firewall can potentially drop long running TCP sessions.
1515

16-
## Scenarios impacting long running connections
16+
## Scenarios that impact long running TCP sessions
1717

1818
The following scenarios can potentially drop long running TCP sessions:
1919
- Scale down
@@ -39,7 +39,7 @@ Azure Firewall constantly monitors VM instances and recovers them automatically
3939

4040
## Applications sensitive to TCP session resets
4141

42-
Session disconnection isn’t an issue for resilient applications that can handle session reset gracefully. However, there are few applications (like traditional SAP GUI and SAP RFC based apps) which are sensitive to sessions resets. Secure such sensitive applications with Network Security Groups (NSGs).
42+
Session disconnection isn’t an issue for resilient applications that can handle session reset gracefully. However, there are a few applications (like traditional SAP GUI and SAP RFC based apps) which are sensitive to sessions resets. Secure sensitive applications with Network Security Groups (NSGs).
4343

4444
## Network security groups
4545

0 commit comments

Comments
 (0)