Next-Generation Firewall
Configure Session Settings
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
Configure Session Settings
Configure session settings such as IPv6 error packet rate, NAT session settings,
accelerated aging settings, or enable packet buffer protection, enable jumbo frames, and
more.
Where Can I Use This? | What Do I Need? |
---|---|
|
One of these licenses when using Strata Cloud Manager:
|
Session management is a critical component of network security that determines how
your NGFWs handle, track, and maintain network connections. Proper session
configuration ensures optimal performance, security, and resource utilization across
your network infrastructure.
Session settings control how your firewalls process and manage network flows, from
initial connection establishment through termination. This topic describes various
settings for sessions other than timeout and VPN values. Perform these tasks if you
need to change the default settings.
Configure Session Settings (PAN-OS)
Procedure for configuring session settings in PAN-OS and Panorama.
- Change the session settings.Select DeviceSetupSession and edit the Session Settings.Specify whether to apply newly configured Security policy rules to sessions that are in progress.Select Rematch all sessions on config policy change to apply newly configured Security policy rules to sessions that are already in progress. This capability is enabled by default. If you clear this check box, any policy rule changes you make apply only to sessions initiated after you commit the policy change.For example, if a Telnet session started while an associated policy rule was configured that allowed Telnet, and you subsequently committed a policy change to deny Telnet, the firewall applies the revised policy to the current session and blocks it.Configure IPv6 settings.
- ICMPv6 Token Bucket Size—Default: 100 tokens. See the section ICMPv6 Rate Limiting.
- ICMPv6 Error Packet Rate (per sec)—Default: 100. See the section ICMPv6 Rate Limiting.
- Enable IPv6 Firewalling—Enables firewall capabilities for IPv6. All IPv6-based configurations are ignored if IPv6 is not enabled. Even if IPv6 is enabled for an interface, the IPv6 Firewalling setting must also be enabled for IPv6 to function.
Enable jumbo frames and set the MTU.- Select Enable Jumbo Frame to enable jumbo frame support on Ethernet interfaces. Jumbo frames have a maximum transmission unit (MTU) of 9,216 bytes and are available on certain models.Set the Global MTU, depending on whether or not you enabled jumbo frames:
- If you did not enable jumbo frames, the Global MTU defaults to 1,500 bytes; the range is 576 to 1,500 bytes.
- If you enabled jumbo frames, the Global MTU defaults to 9,192 bytes; the range is 9,192 to 9,216 bytes.Jumbo Frames can take up to five times more memory compared to normal packets and can reduce the number of available packet-buffers by 20%. This reduces the queue sizes dedicated for out of order, application identification, and other such packet processing tasks. As of PAN-OS 8.1, if you enable the jumbo frame global MTU configuration and reboot your firewall, packet buffers are then redistributed to process jumbo frames more efficiently.
If you enable jumbo frames and you have interfaces where the MTU is not specifically configured, those interfaces will automatically inherit the jumbo frame size. Therefore, before you enable jumbo frames, if you have any interface that you do not want to have jumbo frames, you must set the MTU for that interface to 1500 bytes or another value.If you import (DeviceSetupOperationsImport) and load a configuration that has Jumbo Frame enabled, and then commit to a firewall that does not already have Jumbo Frame enabled, the Enable Jumbo Frame setting is not committed to the configuration. You should first Enable Jumbo Frame, reboot, and then import, load and commit the configuration.Tune NAT session settings.- NAT64 IPv6 Minimum Network MTU—Sets the global MTU for IPv6 translated traffic. The default of 1,280 bytes is based on the standard minimum MTU for IPv6 traffic.
- NAT Oversubscription Rate—If NAT is configured to be Dynamic IP and Port (DIPP) translation, an oversubscription rate can be configured to multiply the number of times that the same translated IP address and port pair can be used concurrently. The rate is 1, 2, 4, or 8. The default setting is based on the firewall model.
- A rate of 1 means no oversubscription; each translated IP address and port pair can be used only once at a time.
- If the setting is Platform Default, user configuration of the rate is disabled and the default oversubscription rate for the model applies.
Reducing the oversubscription rate decreases the number of source device translations, but provides higher NAT rule capacities.Tune accelerated aging settings.Select Accelerated Aging to enable faster aging-out of idle sessions. You can also change the threshold (%) and scaling factor:- Accelerated Aging Threshold—Percentage of the session table that is full when accelerated aging begins. The default is 80%. When the session table reaches this threshold (% full), PAN-OS applies the Accelerated Aging Scaling Factor to the aging calculations for all sessions.
- Accelerated Aging Scaling Factor—Scaling factor used in the accelerated aging calculations. The default scaling factor is 2, meaning that the accelerated aging occurs at a rate twice as fast as the configured idle time. The configured idle time divided by 2 results in a faster timeout of one-half the time. To calculate the session’s accelerated aging, PAN-OS divides the configured idle time (for that type of session) by the scaling factor to determine a shorter timeout.
For example, if the scaling factor is 10, a session that would normally time out after 3600 seconds would time out 10 times faster (in 1/10 of the time), which is 360 seconds.Enable packet buffer protection.- Select Packet Buffer Protection to enable the firewall to take action against sessions that can overwhelm the its packet buffer and causes legitimate traffic to be dropped; enabled by default.If you enable packet buffer protection, you can tune the thresholds and timers that dictate how the firewall responds to packet buffer abuse.
- Alert (%): When packet buffer utilization exceeds this threshold, the firewall creates a log event. The threshold is set to 50% by default and the range is 0% to 99%. If the value is set to 0%, the firewall does not create a log event.
- Activate (%): When a packet buffer utilization exceeds this threshold, the firewall applies random early drop (RED) to abusive sessions. The threshold is set to 80% by default and the range is 0% to 99%. If the value is set to 0%, the firewall does not apply RED.
Alert events are recorded in the system log. Events for dropped traffic, discarded sessions, and blocked IP address are recorded in the threat log.- Block Hold Time (sec): The amount of time a RED-mitigated session is allowed to continue before it is discarded. By default, the block hold time is 60 seconds. The range is 0 to 65,535 seconds. If the value is set to 0, the firewall does not discard sessions based on packet buffer protection.
- Block Duration (sec): This setting defines how long a session is discarded or an IP address is blocked. The default is 3,600 seconds with a range of 0 seconds to 15,999,999 seconds. If this value is set to 0, the firewall does not discard sessions or block IP addresses based on packet buffer protection.
Enable buffering of multicast route setup packets.- Select Multicast Route Setup Buffering to enable the firewall to preserve the first packet in a multicast session when the multicast route or forwarding information base (FIB) entry does not yet exist for the corresponding multicast group. By default, the firewall does not buffer the first multicast packet in a new session; instead, it uses the first packet to set up the multicast route. This is expected behavior for multicast traffic. You only need to enable multicast route setup buffering if your content servers are directly connected to the firewall and your custom application cannot withstand the first packet in the session being dropped. This option is disabled by default.If you enable buffering, you can also tune the Buffer Size, which specifies the buffer size per flow. The firewall can buffer a maximum of 5,000 packets.You can also tune the duration, in seconds, for which a multicast route remains in the routing table on the firewall after the session ends by configuring the multicast settings on the virtual router that handles your virtual router (set the Multicast Route Age Out Time (sec) on the MulticastAdvanced tab in the virtual router configuration.Save the session settings.Click OK.Tune the Maximum Segment Size (MSS) adjustment size settings for a Layer 3 interface.
- Select NetworkInterfaces, select Ethernet, VLAN, or Loopback, and select a Layer 3 interface.Select AdvancedOther Info.Select Adjust TCP MSS and enter a value for one or both of the following:
- IPv4 MSS Adjustment Size (range is 40 to 300 bytes; default is 40 bytes).
- IPv6 MSS Adjustment Size (range is 60 to 300 bytes; default is 60 bytes).
Click OK.Commit your changes.Click Commit.Reboot the firewall after changing the jumbo frame configuration.- Select DeviceSetupOperations.Click Reboot Device.
Configure Session Settings (SCM)
Procedure for configuring session settings in Strata Cloud Manager.- Log in to Strata Cloud Manager.Select ManageConfigurationNGFW and Prisma AccessDevice SettingsDevice SetupSessionConfigurationNGFW and Prisma AccessDevice SettingsDevice SetupSession and select the Configuration Scope where you want to configure the session settings.You can select a folder or firewall from your Folders or select Snippets to configure the session settings in a snippet.Click the cog wheel to edit the Session Settings and Customize.If you modified the Session Settings for a nested folder or individual device, you can Revert to Inherited to revert the Session Settings configuration from the Customized configuration to that inherited from the parent folder of the nester folder or that inherited from the folder the firewall is associated with.Check (enable) Rematch all sessions on config policy change to apply newly configured Security policy rules to sessions that are already in progress.This capability is enabled by default. If you clear this check box, any policy rule changes you make apply only to sessions initiated after you commit the policy rule change.Configure IPv6 settings.
- ICMPv6 Token Bucket Size—Default: 100 tokens. See the section ICMPv6 Rate Limiting.
- ICMPv6 Error Packet Rate (per sec)—Default: 100. See the section ICMPv6 Rate Limiting.
Enable IPv6 Firewalling—Enables firewall capabilities for IPv6. All IPv6-based configurations are ignored if IPv6 is not enabled. Even if IPv6 is enabled for an interface, the IPv6 Firewalling setting must also be enabled for IPv6 to function.Enable ESPRAN support— Enable the firewall to terminate Generic Routing Encapsulation (GRE) tunnels and decapsulate Encapsulated Remote Switched Port Analyzer (ERSPAN) data. This is useful for Security services like IoT Security. Network switches mirror network traffic and use ERSPAN to send it to the firewall through GRE tunnels. After decapsulating the data, the firewall inspects it similar to how it inspects traffic received on a TAP port. It then creates enhanced application logs (EALs) and traffic, threat, WildFire, URL, data, GTP (when GTP is enabled), SCTP (when SCTP is enabled), tunnel, auth, and decryption logs. The firewall forwards these logs to the logging service where IoT Security accesses and analyzes the data.Set the Global MTU depending on whether or not you enabled jumbo frames.- If you didn’t enable jumbo frames, the Global MTU defaults to 1,500 bytes; the range is 576 to 1,500 bytes.
- If you enabled jumbo frames, the Global MTU defaults to 9,192 bytes; the range is 9,192 to 9,216 bytes.
Jumbo frames must be enabled locally on the firewall. If you enable jumbo frames and you have interfaces where the MTU isn’t configured, those interfaces will automatically inherit the jumbo frame size. Therefore, before you enable jumbo frames, if you have any interface that you don’t want to have jumbo frames, you must set the MTU for that interface to 1,500 bytes or another value.Check (enable) Enable DHCP Broadcast Session if your firewall acts as DHCP server to enable session logs for DHCP broadcast packets.This setting enables generation of Enhanced Application logs (EAL logs) for DHCP for use by IoT Security and other services. If you don’t enable this setting, the firewall forwards the packets without creating logs for the DHCP broadcast packets.NAT64 IPv6 Minimum Network MTU—Sets the global MTU for IPv6 translated traffic. The default of 1,280 bytes is based on the standard minimum MTU for IPv6 traffic.Set the NAT Oversubscription Rate to multiply the number of times that the same translated IP address and port pair can be used correctly when NAT is configured to be Dynamic IP and Port (DIPP) translation.The rate is 1, 2, 4, or 8. A rate of one (1) means no oversubscription; each translated IP address and port pair can be used only once at a time. Reducing the oversubscription rate decreases the number of source device translations, but provides higher NAT rule capacities.Tune the Accelerated Aging settings to enable faster aging-out of idle sessions.This setting is enabled by default.- Accelerated Aging Threshold—Percentage of the session table that is full when accelerated aging begins. The default is 80%. When the session table reaches this threshold (% full), the firewall applies the Accelerated Aging Scaling Factor to the aging calculations for all sessions.
- Accelerated Aging Scaling Factor—Scaling factor used in the accelerated aging calculations. The default scaling factor is 2, meaning that the accelerated aging occurs at a rate twice as fast as the configured idle time. The configured idle time divided by two (2) results in a faster timeout of one-half the time. To calculate the session’s accelerated aging, the firewall divides the configured idle time (for that type of session) by the scaling factor to determine a shorter timeout.
Tune the Packet Buffer Protection settings to enable the firewall to take action against sessions that can overwhelm its packet buffer and cause legitimate traffic to be dropped.This setting is enabled by default.- Alert %—When packet buffer utilization exceeds this threshold, the firewall creates a log event. The threshold is set to 50% by default and the range is 0% to 99%. If the value is set to 0%, the firewall doesn’t create a log event.
- Activate %—When a packet buffer utilization exceeds this threshold, the firewall applies Random Early Detection (RED) to abusive sessions. The threshold is set to 80% by default and the range is 0% to 99%. If the value is set to 0%, the firewall doesn’t apply RED.
- Block Hold Time (sec)—The amount of time a RED-mitigated session is allowed to continue before it’s discarded. By default, the block hold time is 60 seconds.Range is 0 to 65,535 seconds. If the value is set to 0, the firewall doesn’t discard sessions based on packet buffer protection
- Block Duration (sec)—This setting defines how long a session is discarded or an IP address is blocked.Default is 3,600 seconds. Range of 0 seconds to 15,999,999 seconds. If this value is set to 0, the firewall doesn’t discard sessions or block IP addresses based on packet buffer protection.
Tune the Multicast Route Setup Buffering setting to enable the firewall to preserve the first packet in a multicast session when the multicast route or forwarding information base (FIB) entry doesn’t yet exist for the corresponding multicast group.By default, the firewall doesn’t buffer the first multicast packet in a new session; instead, it uses the first packet to set up the multicast route. This is expected behavior for multicast traffic. You only need to enable multicast route setup buffering if your content servers are directly connected to the firewall and your custom application can’t withstand the first packet in the session being dropped. This option is disabled by default.Tune the Buffer Size to specify the buffer size per flow. Maximum is 5,000 packets.Save.(Optional) Configure the remaining firewall session settings.Push Config to push your configuration changes.