Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Help_Desk_BPF
New Contributor

set auth-timeout

Good morning, I needed help, I have two FW and a fortimanager, and I see that users remain connected more than the 8 hours defined in the FW. I've read some posts but to no avail.

 

config vpn ssl settings
set status enable
set reqclientcert disable
set ssl-max-proto-ver tls1-3
set ssl-min-proto-ver tls1-2
unset banned-cipher
set ciphersuite TLS-AES-128-GCM-SHA256 TLS-AES-256-GCM-SHA384 TLS-CHACHA20-POLY1305-SHA256
set ssl-insert-empty-fragment enable
set https-redirect disable
set x-content-type-options enable
set ssl-client-renegotiation disable
set force-two-factor-auth disable
set servercert "Fortinet_Factory"
set algorithm high
set idle-timeout 300
set auth-timeout 28800
set login-attempt-limit 2

 

Nelson
Nelson
2 REPLIES 2
pminarik
Staff
Staff

auth-timeout is indeed the maximum session lifetime, after which the tunnel is torn down even if active. However, there is nothing stopping the client from immediately reconnecting, which raises the question: Are you claiming that you see a single, uninterrupted, session that lasts markedly longer than the set auth-timeout, or could it just be clients reconnecting?

[ corrections always welcome ]
Help_Desk_BPF
New Contributor

Yes, I have a connection here that has been connected for 20 hours straight without interruption. But this reconnection thing is well seen, it is difficult to control it.

Nelson
Nelson
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors