

Here are examples : > set session timeout -udp 60 Timeout-tcpinit set session tcp initial timeout value in seconds Timeout-tcphandshake set session tcp handshake timeout value in seconds With unverified sequence number in seconds Timeout-tcp-unverified-rst set session tcp timeout value after receiving a RST Timeout-tcp-time-wait set session tcp half closed timeout value in seconds Timeout-tcp-half-closed set session tcp half closed timeout value in seconds Timeout-scan application trickling timeout value in seconds Timeout-discard-udp set timeout of udp session in discard state


Timeout-discard-tcp set timeout of tcp session in discard state Timeout-discard-default set timeout of non-tcp/udp session in discard state Timeout-default set session default timeout value in seconds Timeout-captive-portal set captive portal session timeout value in seconds Here is the same list with a comment about each timeout: > set session timeout-tcp-unverified-rst Following is the list of global timeout values as seen in operational mode: TCP: 90 secs, UDP: 60 secs, other IP protocols: 60 secs TCP session timeout for unverified RST: 30 secs TCP session timeout in TIME_WAIT: 15 secs TCP half-closed session timeout: 120 secs TCP session timeout before 3-way handshaking: 10 secs TCP session timeout before SYN-ACK received: 5 secs Notice the available options for the DNS application in the following example:Īlternatively, you can also use the CLI to view these timeouts: When configured, timeouts for an application override the global session timeouts. The firewall applies application timeouts to applications in an established state. In addition to the global settings, you can optionally define timeouts for an individual application in the Objects > Applications tab. Please refer to the following document for a more detailed explanation about each timeout: If you need to change the default values of the global session timeout settings for TCP, UDP, ICMP, Captive Portal authentication, or other types of sessions, click the 'Edit' icon: In the WebGUI, you'll find these settings at Device > Setup > Session: In other words, you might find yourself in a situation where you'd like to make some adjustments here and there. Setting a session timeout that's too high can delay failure detection. Setting a number too low can cause sensitivity to minor network delays and adversely affect connecting with the firewall. However, in some scenarios, these values might not work for your network needs. The Palo Alto Network devices offer optimal values for these timeouts.

All of these timeouts are global, meaning they apply to all of the sessions of that type on the firewall. The default timeout applies to any other type of session. On the firewall, you can define a number of timeouts for TCP, UDP, and ICMP sessions. By default, when the session timeout for the protocol expires, PAN-OS closes the session. It does not store any personal data.A session timeout defines how long PAN-OS maintains a session on the firewall after inactivity in the session. The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. The cookie is used to store the user consent for the cookies in the category "Performance". This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. The cookies is used to store the user consent for the cookies in the category "Necessary". The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". The cookie is used to store the user consent for the cookies in the category "Analytics". These cookies ensure basic functionalities and security features of the website, anonymously. Necessary cookies are absolutely essential for the website to function properly.
