Configure Session Settings
This topic describes various settings for sessions other than timeout values. Perform these tasks if you need to change the default settings.
- Change the session settings.Select DeviceSetupSession and edit the Session Settings.
- Specify whether to apply newly configured Security policy
rules to sessions that are in progress.Select Rematch all sessions on config policy change to apply newly configured Security policy rules to sessions that are already in progress. This capability is enabled by default. If you clear this check box, any policy rule changes you make apply only to sessions initiated after you commit the policy change.For example, if a Telnet session started while an associated policy rule was configured that allowed Telnet, and you subsequently committed a policy change to deny Telnet, the firewall applies the revised policy to the current session and blocks it.
- Configure IPv6 settings.
- ICMPv6 Token Bucket Size—Default: 100 tokens. See the section ICMPv6 Rate Limiting.
- ICMPv6 Error Packet Rate (per sec)—Default: 100. See the section ICMPv6 Rate Limiting.
- Enable IPv6 Firewalling—Enables firewall capabilities for IPv6. All IPv6-based configurations are ignored if IPv6 is not enabled. Even if IPv6 is enabled for an interface, the IPv6 Firewalling setting must also be enabled for IPv6 to function.
- Enable jumbo frames and set the MTU.
- Select Enable Jumbo Frame to enable jumbo frame support on Ethernet interfaces. Jumbo frames have a maximum transmission unit (MTU) of 9,216 bytes and are available on certain models.
- Set the Global MTU, depending
on whether or not you enabled jumbo frames:
If you enable jumbo frames and you have interfaces where the MTU is not specifically configured, those interfaces will automatically inherit the jumbo frame size. Therefore, before you enable jumbo frames, if you have any interface that you do not want to have jumbo frames, you must set the MTU for that interface to 1500 bytes or another value.
- If you did not enable jumbo frames, the Global MTU defaults to 1,500 bytes; the range is 576 to 1,500 bytes.
- If you enabled jumbo frames, the Global MTU defaults to 9,192 bytes; the range is 9,192 to 9,216 bytes.
- Tune NAT session settings.
- NAT64 IPv6 Minimum Network MTU—Sets the global MTU for IPv6 translated traffic. The default of 1,280 bytes is based on the standard minimum MTU for IPv6 traffic.
- NAT Oversubscription Rate—If NAT is configured to be Dynamic IP and Port (DIPP) translation, an oversubscription rate can be configured to multiply the number of times that the same translated IP address and port pair can be used concurrently. The rate is 1, 2, 4, or 8. The default setting is based on the firewall model.
Reducing the oversubscription rate decreases the number of source device translations, but provides higher NAT rule capacities.
- A rate of 1 means no oversubscription; each translated IP address and port pair can be used only once at a time.
- If the setting is Platform Default, user configuration of the rate is disabled and the default oversubscription rate for the model applies.
- Tune accelerated aging settings.Select Accelerated Aging to enable faster aging-out of idle sessions. You can also change the threshold (%) and scaling factor:
For example, if the scaling factor is 10, a session that would normally time out after 3600 seconds would time out 10 times faster (in 1/10 of the time), which is 360 seconds.
- Accelerated Aging Threshold—Percentage of the session table that is full when accelerated aging begins. The default is 80%. When the session table reaches this threshold (% full), PAN-OS applies the Accelerated Aging Scaling Factor to the aging calculations for all sessions.
- Accelerated Aging Scaling Factor—Scaling factor used in the accelerated aging calculations. The default scaling factor is 2, meaning that the accelerated aging occurs at a rate twice as fast as the configured idle time. The configured idle time divided by 2 results in a faster timeout of one-half the time. To calculate the session’s accelerated aging, PAN-OS divides the configured idle time (for that type of session) by the scaling factor to determine a shorter timeout.
- Enable packet buffer protection.
- Select Packet Buffer Protection to enable the firewall to take action against sessions that can overwhelm the its packet buffer and causes legitimate traffic to be dropped.
- If you enable packet buffer protection, you can tune
the thresholds and timers that dictate how the firewall responds
to packet buffer abuse.
Alert events are recorded in the system log. Events for dropped traffic, discarded sessions, and blocked IP address are recorded in the threat log.
- Alert (%): When packet buffer utilization exceeds this threshold, the firewall creates a log event. The threshold is set to 50% by default and the range is 0% to 99%. If the value is set to 0%, the firewall does not create a log event.
- Activate (%): When a packet buffer utilization exceeds this threshold, the firewall applies random early drop (RED) to abusive sessions. The threshold is set to 50% by default and the range is 0% to 99%. If the value is set to 0%, the firewall does not apply RED.
- Block Hold Time (sec): The amount of time a RED-mitigated session is allowed to continue before it is discarded. By default, the block hold time is 60 seconds. The range is 0 to 65,535 seconds. If the value is set to 0, the firewall does not discard sessions based on packet buffer protection.
- Block Duration (sec): This setting defines how long a session is discarded or an IP address is blocked. The default is 3,600 seconds with a range of 0 seconds to 15,999,999 seconds. If this value is set to 0, the firewall does not discard sessions or block IP addresses based on packet buffer protection.
- Enable buffering of multicast route setup packets.
- Select Multicast Route Setup Buffering to enable the firewall to preserve the first packet in a multicast session when the multicast route or forwarding information base (FIB) entry does not yet exist for the corresponding multicast group. By default, the firewall does not buffer the first multicast packet in a new session; instead, it uses the first packet to set up the multicast route. This is expected behavior for multicast traffic. You only need to enable multicast route setup buffering if your content servers are directly connected to the firewall and your custom application cannot withstand the first packet in the session being dropped. This option is disabled by default.
- If you enable buffering, you can also tune the Buffer
Size, which specifies the buffer size per flow. The firewall
can buffer a maximum of 5,000 packets.You can also tune the duration, in seconds, for which a multicast route remains in the routing table on the firewall after the session ends by configuring the multicast settings on the virtual router that handles your virtual router (set the Multicast Route Age Out Time (sec) on the MulticastAdvanced tab in the virtual router configuration.
- Save the session settings.Click OK.
- Tune the Maximum
Segment Size (MSS) adjustment size settings for a Layer 3
- Select NetworkInterfaces, select Ethernet, VLAN, or Loopback, and select a Layer 3 interface.
- Select AdvancedOther Info.
- Select Adjust TCP MSS and enter
a value for one or both of the following:
- IPv4 MSS Adjustment Size (range is 40 to 300 bytes; default is 40 bytes).
- IPv6 MSS Adjustment Size (range is 60 to 300 bytes; default is 60 bytes).
- Click OK.
- Commit your changes.Click Commit.
- Reboot the firewall after changing the jumbo frame configuration.
- Select DeviceSetupOperations.
- Click Reboot Device.
Session Settings The following table describes session settings. Session Settings Description Rematch Sessions Click Edit and select Rematch Sessions to cause the firewall to apply ...
View Settings and Statistics
View Settings and Statistics Use show commands to view configuration settings and statistics about the performance of the firewall or Panorama and about the traffic ...
Enable Jumbo Frames on the VM-Series Firewall
Enable Jumbo Frames on the VM-Series Firewall By default, the maximum transmission unit (MTU) size for packets sent on a Layer 3 interface is 1500 ...
Packet Buffer Protection
Protect the firewall’s packet buffers from single-session DoS attacks that attempt to take down the firewall. ...
Configure IP Multicast
Configure a virtual router on the firewall to receive and forward IP multicast traffic by configuring the interfaces: PIM on ingress and egress interfaces, and ...
Higher Performance for VM-Series on Azure using Azure Accelerated Networking (SR-IOV)
VM-Series 9.0 firewalls deployed on D/DSv2 and D/DSv3 class of Azure VMs include support for Accelerated Networking (SR-IOV), which you can deploy as an active/passive ...
Configure Packet Buffer Protection
Configure Packet Buffer Protection You configure Packet Buffer Protection Protect the firewall’s packet buffers from single-session DoS attacks that attempt to take down the firewall. ...
Deploy DoS and Zone Protection Using Best Practices
DoS and Zone Protection deployment best practices help to ensure a smooth rollout that protects your network and your most critical servers. ...
Customize the Firewall Template Before Launch (v2.0)
Lists the settings you can modify before you launch the template ...