Next-Generation Firewall
Maintain Custom Timeouts for Data Center Applications
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
Maintain Custom Timeouts for Data Center Applications
Preserve custom timeouts when migrating from port to application-based policies using
service objects, maintaining app visibility without overriding App-ID or creating custom
configs.
Where Can I Use This? | What Do I Need? |
---|---|
|
This is a core Network Security feature for NGFWs and Prisma
Access; no prerequisites needed.
|
Easily maintain custom timeouts for applications as you move from a
port-based policy to an application-based policy. Use this method to maintain custom
timeouts instead of overriding App-ID (losing application visibility) or creating a
custom App-ID (expending time and research).
To get started, configure custom
timeout settings as part of a service object:

Then add the service object in a policy rule to apply the custom timeouts to
the application(s) the rule enforces.
The following steps describe how apply
custom timeouts to applications; to apply custom timeouts to user groups, you can follow
the same steps but just make sure to add the service object to the security policy rule
that enforces the users to whom you want the timeout to apply.- Select ObjectsServices to add or modify a service object.You can also create service objects as you are defining match criteria for a security policy rule: select PoliciesSecurityService/URL Category and Add a new Service object to apply to the application traffic the rule governs.Select the protocol for the service to use (TCP or UDP).Enter the destination port number or a range of port numbers used by the service.Define the session timeout for the service.
- Inherit from application (default)—No service-based timeouts are applied; instead, apply the application timeout.
- Override—Define a custom session timeout for the service.
If you chose to override the application timeout and define a custom session timeout, continue to:- Enter a TCP Timeout value to set the Maximum length of time in seconds that a TCP session can remain open after data transmission has started. When this time expires, the session closes. The value range is 1 - 604800, and the default value is 3600 seconds.
- Enter a TCP Half Closed value to set the maximum length of time in seconds that a session remains in the session table between receiving the first FIN packet and receiving the second FIN packet or RST packet. If the timer expires, the session closes. The value range is 1 - 604800, and the default value is 120 seconds.
- Enter a TCP Wait Time value to set the maximum length of time in seconds that a session remains in the session table after receiving the second FIN packet or a RST packet. When the timer expires, the session closes. The value range is 1 - 600, and the default value is 15 seconds.
Click OK to save the service object.Select PoliciesSecurity and Add or modify a policy rule to govern the application traffic you want to control.Select Service/URL Category and Add the service object you just created to the security policy rule.Click OK and Commit your changes.