05-17-2023 08:44 AM
An interesting issue came up for me. I have an ACL that allowed host A to Host B on port 636. The firewall have a tcp session timeout of 2 hours. Host A established a sesson with B did some transfer and went idle. It then tried to send data again after 3 hours without going through TCP handshake (reusing the same source port). Will the firewall allow it through even though it passed the session timeout ? Does the firewall just matches the source IP, dest IP and dest port without looking to see if it see handsake?
Thanks in advance.
Solved! Go to Solution.
05-17-2023 09:55 AM
NO, after idle timeout the session is delete from FW and both Host need new handshake
05-17-2023 09:55 AM
NO, after idle timeout the session is delete from FW and both Host need new handshake
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide