Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
New Contributor

set auth-timeout

Good morning, I needed help, I have two FW and a fortimanager, and I see that users remain connected more than the 8 hours defined in the FW. I've read some posts but to no avail.


config vpn ssl settings
set status enable
set reqclientcert disable
set ssl-max-proto-ver tls1-3
set ssl-min-proto-ver tls1-2
unset banned-cipher
set ciphersuite TLS-AES-128-GCM-SHA256 TLS-AES-256-GCM-SHA384 TLS-CHACHA20-POLY1305-SHA256
set ssl-insert-empty-fragment enable
set https-redirect disable
set x-content-type-options enable
set ssl-client-renegotiation disable
set force-two-factor-auth disable
set servercert "Fortinet_Factory"
set algorithm high
set idle-timeout 300
set auth-timeout 28800
set login-attempt-limit 2



auth-timeout is indeed the maximum session lifetime, after which the tunnel is torn down even if active. However, there is nothing stopping the client from immediately reconnecting, which raises the question: Are you claiming that you see a single, uninterrupted, session that lasts markedly longer than the set auth-timeout, or could it just be clients reconnecting?

[ corrections always welcome ]
New Contributor

Yes, I have a connection here that has been connected for 20 hours straight without interruption. But this reconnection thing is well seen, it is difficult to control it.