Fortinet white logo
Fortinet white logo

Hyperscale Firewall Guide

Hyperscale firewall VDOM session timeouts

Hyperscale firewall VDOM session timeouts

Using the following command you can define session timeouts for a specific protocols and port ranges for a hyperscale firewall VDOM. These session timeouts apply to sessions processed by the current hyperscale firewall VDOM. You can set up different session timeouts for each hyperscale firewall VDOM.

config vdom

edit <hyperscale-firewall-vdom-name>

config system session-ttl

config port

edit 1

set protocol <protocol-number>

set timeout <timeout>

set refresh-direction {outgoing | incoming | both}

end

protocol <protocol-number> a protocol number in the range 0 to 255. Default 0.

timeout <timeout> the time in seconds after which a matching idle session is terminated. Range 1 to 2764800. Default 300.

refresh-direction {outgoing | incoming | both} control whether idle outgoing or incoming or both outgoing and incoming sessions are terminated when the timeout is reached.

Note

Global session timeouts apply to sessions in hyperscale firewall VDOMs that do not match config system session-ttl settings in individual hyperscale firewall VDOMs.

You can also override global and per-VDOM session timeouts by setting the tcp-timeout-pid and udp-timeout-pid options in individual hyperscale firewall policies. See Session timeouts for individual hyperscale policies.

Hyperscale firewall VDOM session timeouts

Hyperscale firewall VDOM session timeouts

Using the following command you can define session timeouts for a specific protocols and port ranges for a hyperscale firewall VDOM. These session timeouts apply to sessions processed by the current hyperscale firewall VDOM. You can set up different session timeouts for each hyperscale firewall VDOM.

config vdom

edit <hyperscale-firewall-vdom-name>

config system session-ttl

config port

edit 1

set protocol <protocol-number>

set timeout <timeout>

set refresh-direction {outgoing | incoming | both}

end

protocol <protocol-number> a protocol number in the range 0 to 255. Default 0.

timeout <timeout> the time in seconds after which a matching idle session is terminated. Range 1 to 2764800. Default 300.

refresh-direction {outgoing | incoming | both} control whether idle outgoing or incoming or both outgoing and incoming sessions are terminated when the timeout is reached.

Note

Global session timeouts apply to sessions in hyperscale firewall VDOMs that do not match config system session-ttl settings in individual hyperscale firewall VDOMs.

You can also override global and per-VDOM session timeouts by setting the tcp-timeout-pid and udp-timeout-pid options in individual hyperscale firewall policies. See Session timeouts for individual hyperscale policies.