<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Disabling timeouts which affect SSH tunnels in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852395#M489401</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're sure you want to disable the timeout, suggestion 2 is the recommended method because it will only affect SSH traffic and not every TCP connection through the firewall (which will eventually consume all resources if conns don't gracefully close). To achieve an unlimited timeout, you set the idle timer to 0:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;set connection timeout idle 0&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another feature that you may want to look into, though, is dead connection detection ('set connection timeout dcd'). This is a better method than an infinite timeout because only connections that still have an active socket on both endpoints will be kept open by the firewall. You can read about this feature here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/conns_connlimits.html#wp1080752"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/conns_connlimits.html#wp1080752&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 05 Jan 2012 14:45:13 GMT</pubDate>
    <dc:creator>mirober2</dc:creator>
    <dc:date>2012-01-05T14:45:13Z</dc:date>
    <item>
      <title>Disabling timeouts which affect SSH tunnels</title>
      <link>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852394#M489399</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im running 8.3 on a 5505. We've got a few ssh tunnels originating from inside to some place on the internet. It seems these tunnels are closed &lt;/P&gt;&lt;P&gt;every n minutes. I've seen two recommendations for altering the timeout values, and &lt;STRONG&gt;what I am interested in is infinite timeout (0)&lt;/STRONG&gt; for these SSH tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Suggestion 1, alter timeout "conn". Default is 30 minutes, but I suspect this might have a negative impact because no inactive connections would be closed, ever. If it however is recommended to alter, how to set it to "0" (off/unlimited)?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Suggestion 2, enable a ssh class map which explicitely set the timeout for the ssh connection. Is this recommended? How would I achieve unlimited time? And what about random-sequence-number disabled as seen below, is that really recommended?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class CLASS_MAP_SSH&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; set connection&amp;nbsp; random-sequence-number disable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; set connection timeout idle&amp;nbsp; 48:00:00 reset &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; set connection decrement-ttl&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:10:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852394#M489399</guid>
      <dc:creator>3moloz123</dc:creator>
      <dc:date>2019-03-11T22:10:15Z</dc:date>
    </item>
    <item>
      <title>Disabling timeouts which affect SSH tunnels</title>
      <link>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852395#M489401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're sure you want to disable the timeout, suggestion 2 is the recommended method because it will only affect SSH traffic and not every TCP connection through the firewall (which will eventually consume all resources if conns don't gracefully close). To achieve an unlimited timeout, you set the idle timer to 0:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;set connection timeout idle 0&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another feature that you may want to look into, though, is dead connection detection ('set connection timeout dcd'). This is a better method than an infinite timeout because only connections that still have an active socket on both endpoints will be kept open by the firewall. You can read about this feature here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/conns_connlimits.html#wp1080752"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/conns_connlimits.html#wp1080752&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 14:45:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852395#M489401</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2012-01-05T14:45:13Z</dc:date>
    </item>
    <item>
      <title>Disabling timeouts which affect SSH tunnels</title>
      <link>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852396#M489402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the answer. I do however wonder if "CLASS_MAP_SSH" is a known value to the ASA (ie it knows to match tcp port 22), or must I within the class match ssh traffic (by matching a ACL)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 15:28:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852396#M489402</guid>
      <dc:creator>3moloz123</dc:creator>
      <dc:date>2012-01-05T15:28:37Z</dc:date>
    </item>
    <item>
      <title>Disabling timeouts which affect SSH tunnels</title>
      <link>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852397#M489403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not a built-in class-map so you'd have to define it. The full config would look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;class-map CLASS_MAP_SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match port tcp eq 22&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class CLASS_MAP_SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection timeout...&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list ssh permit tcp any any eq 22&lt;/P&gt;&lt;P&gt;class-map CLASS_MAP_SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; match access-list ssh&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; class CLASS_MAP_SSH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; set connection timeout...&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jan 2012 15:33:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/disabling-timeouts-which-affect-ssh-tunnels/m-p/1852397#M489403</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2012-01-05T15:33:29Z</dc:date>
    </item>
  </channel>
</rss>

