Skip to content

Commit ee6758d

Browse files
authored
Apply suggestions from code review
1 parent 9085fec commit ee6758d

File tree

1 file changed

+0
-2
lines changed

1 file changed

+0
-2
lines changed

articles/firewall/tcp-session-behavior.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@ ms.author: duau
1414
This article explains the behavior of long-running sessions and the TCP idle timeout for Azure Firewall. Understanding these concepts is crucial for maintaining network security, optimizing firewall resources, and ensuring uninterrupted connectivity for critical applications.
1515

1616
## Long-running TCP sessions
17-
---
1817

1918
Long-running sessions refer to TCP connections that stay active for extended durations. These long-running sessions are often utilized in applications like SSH, RDP, VPN tunnels, and database connections. To prevent unexpected disconnections, it's essential to configure these sessions appropriately. Understanding the factors that influence their stability is key to ensuring uninterrupted connectivity.
2019

@@ -31,7 +30,6 @@ The following scenarios in Azure Firewall can result in the termination of long-
3130
- **Idle timeout**: Connections that remain inactive for a duration exceeding the TCP idle timeout gets closed by the Azure Firewall.
3231

3332
## Idle timeout settings
34-
---
3533

3634
The TCP idle timeout specifies the duration a connection can stay inactive before the Azure Firewall terminates the connection. This setting helps optimize the Azure Firewall by closing inactive connections and maintaining overall network performance.
3735

0 commit comments

Comments
 (0)