Configure Session Settings
This topic describes various settings for sessions other than timeout values. Perform these tasks if you need to change the default settings.
- Change the session settings.Selectand edit the Session Settings.DeviceSetupSession
- Specify whether to apply newly configured Security policy rules to sessions that are in progress.SelectRematch all sessions on config policy changeto apply newly configured Security policy rules to sessions that are already in progress. This capability is enabled by default. If you clear this check box, any policy rule changes you make apply only to sessions initiated after you commit the policy change.For example, if a Telnet session started while an associated policy rule was configured that allowed Telnet, and you subsequently committed a policy change to deny Telnet, the firewall applies the revised policy to the current session and blocks it.
- Configure IPv6 settings.
- ICMPv6 Token Bucket Size—Default: 100 tokens. See the section ICMPv6 Rate Limiting.
- ICMPv6 Error Packet Rate (per sec)—Default: 100. See the section ICMPv6 Rate Limiting.
- Enable IPv6 Firewalling—Enables firewall capabilities for IPv6. All IPv6-based configurations are ignored if IPv6 is not enabled. Even if IPv6 is enabled for an interface, theIPv6 Firewallingsetting must also be enabled for IPv6 to function.
- Enable jumbo frames and set the MTU.
- SelectEnable Jumbo Frameto enable jumbo frame support on Ethernet interfaces. Jumbo frames have a maximum transmission unit (MTU) of 9,216 bytes and are available on certain models.
- Set theGlobal MTU, depending on whether or not you enabled jumbo frames:
If you enable jumbo frames and you have interfaces where the MTU is not specifically configured, those interfaces will automatically inherit the jumbo frame size. Therefore, before you enable jumbo frames, if you have any interface that you do not want to have jumbo frames, you must set the MTU for that interface to 1500 bytes or another value.If you import () and load a configuration that has Jumbo Frame enabled, and then commit to a firewall that does not already have Jumbo Frame enabled, theDeviceSetupOperationsImportEnable Jumbo Framesetting is not committed to the configuration. You should firstEnable Jumbo Frame, reboot, and then import, load and commit the configuration.
- If you did not enable jumbo frames, theGlobal MTUdefaults to 1,500 bytes; the range is 576 to 1,500 bytes.
- If you enabled jumbo frames, theGlobal MTUdefaults to 9,192 bytes; the range is 9,192 to 9,216 bytes.Jumbo Frames can take up to five times more memory compared to normal packets and can reduce the number of available packet-buffers by 20%. This reduces the queue sizes dedicated for out of order, application identification, and other such packet processing tasks. As of PAN-OS 8.1, if you enable the jumbo frame global MTU configuration and reboot your firewall, packet buffers are then redistributed to process jumbo frames more efficiently.
- Tune NAT session settings.
- NAT64 IPv6 Minimum Network MTU—Sets the global MTU for IPv6 translated traffic. The default of 1,280 bytes is based on the standard minimum MTU for IPv6 traffic.
- NAT Oversubscription Rate—If NAT is configured to be Dynamic IP and Port (DIPP) translation, an oversubscription rate can be configured to multiply the number of times that the same translated IP address and port pair can be used concurrently. The rate is 1, 2, 4, or 8. The default setting is based on the firewall model.
Reducing the oversubscription rate decreases the number of source device translations, but provides higher NAT rule capacities.
- A rate of 1 means no oversubscription; each translated IP address and port pair can be used only once at a time.
- If the setting isPlatform Default, user configuration of the rate is disabled and the default oversubscription rate for the model applies.
- Tune accelerated aging settings.SelectAccelerated Agingto enable faster aging-out of idle sessions. You can also change the threshold (%) and scaling factor:
For example, if the scaling factor is 10, a session that would normally time out after 3600 seconds would time out 10 times faster (in 1/10 of the time), which is 360 seconds.
- Accelerated Aging Threshold—Percentage of the session table that is full when accelerated aging begins. The default is 80%. When the session table reaches this threshold (% full), PAN-OS applies the Accelerated Aging Scaling Factor to the aging calculations for all sessions.
- Accelerated Aging Scaling Factor—Scaling factor used in the accelerated aging calculations. The default scaling factor is 2, meaning that the accelerated aging occurs at a rate twice as fast as the configured idle time. The configured idle time divided by 2 results in a faster timeout of one-half the time. To calculate the session’s accelerated aging, PAN-OS divides the configured idle time (for that type of session) by the scaling factor to determine a shorter timeout.
- Enable packet buffer protection.
- SelectPacket Buffer Protectionto enable the firewall to take action against sessions that can overwhelm the its packet buffer and causes legitimate traffic to be dropped; enabled by default.
- If you enable packet buffer protection, you can tune the thresholds and timers that dictate how the firewall responds to packet buffer abuse.
Alert events are recorded in the system log. Events for dropped traffic, discarded sessions, and blocked IP address are recorded in the threat log.
- Alert (%): When packet buffer utilization exceeds this threshold, the firewall creates a log event. The threshold is set to 50% by default and the range is 0% to 99%. If the value is set to 0%, the firewall does not create a log event.
- Activate (%): When a packet buffer utilization exceeds this threshold, the firewall applies random early drop (RED) to abusive sessions. The threshold is set to 80% by default and the range is 0% to 99%. If the value is set to 0%, the firewall does not apply RED.
- Block Hold Time (sec): The amount of time a RED-mitigated session is allowed to continue before it is discarded. By default, the block hold time is 60 seconds. The range is 0 to 65,535 seconds. If the value is set to 0, the firewall does not discard sessions based on packet buffer protection.
- Block Duration (sec): This setting defines how long a session is discarded or an IP address is blocked. The default is 3,600 seconds with a range of 0 seconds to 15,999,999 seconds. If this value is set to 0, the firewall does not discard sessions or block IP addresses based on packet buffer protection.
- Enable buffering of multicast route setup packets.
- SelectMulticast Route Setup Bufferingto enable the firewall to preserve the first packet in a multicast session when the multicast route or forwarding information base (FIB) entry does not yet exist for the corresponding multicast group. By default, the firewall does not buffer the first multicast packet in a new session; instead, it uses the first packet to set up the multicast route. This is expected behavior for multicast traffic. You only need to enable multicast route setup buffering if your content servers are directly connected to the firewall and your custom application cannot withstand the first packet in the session being dropped. This option is disabled by default.
- If you enable buffering, you can also tune theBuffer Size, which specifies the buffer size per flow. The firewall can buffer a maximum of 5,000 packets.You can also tune the duration, in seconds, for which a multicast route remains in the routing table on the firewall after the session ends by configuring the multicast settings on the virtual router that handles your virtual router (set theMulticast Route Age Out Time (sec)on thetab in the virtual router configuration.MulticastAdvanced
- Save the session settings.ClickOK.
- Tune the Maximum Segment Size (MSS) adjustment size settings for a Layer 3 interface.
- Select, selectNetworkInterfacesEthernet,VLAN, orLoopback, and select a Layer 3 interface.
- Select.AdvancedOther Info
- SelectAdjust TCP MSSand enter a value for one or both of the following:
- IPv4 MSS Adjustment Size(range is 40 to 300 bytes; default is 40 bytes).
- IPv6 MSS Adjustment Size(range is 60 to 300 bytes; default is 60 bytes).
- Commit your changes.ClickCommit.
- Reboot the firewall after changing the jumbo frame configuration.
- ClickReboot Device.
Recommended For You
Recommended videos not found.