This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

VPN timeout/key negotion after 8 hours

Hello,

 

I have a remote user using SSL vpn connect to our main office Sophos XG virtual appliance. After almost exactly 8 hours it seems that the VPN is re-negotiating keys but fails and the VPN connection dies. This is probably because we are using 2 factor authentication?

 

Is there a way to adjust or disable the re-negotiation of the keys so that this will not happen?

 

Regards

Jacob 



This thread was automatically locked due to age.
Parents Reply
  • Worth adding that we've just added 100 users to our Sophos XG using SSL VPN. Users getting disconnected after 8 hours. Changed the key lifetime in VPN settings to give 12 hours. Clients were disconnected and had to reconnect but the sessions now last 12 hours. SSL Client or config, as others say, doesn't need to be downloaded again.

Children
  • Hey, 

     

    Today I could verify the issue by myself. I've started the VPN at 9:10 am and get "disconnected" at 17:10 pm, exact 8 hours later. 

    The curious thing is, that my active RDP Connection has been disconnected but my vpn is still active? 

    Checked internet access --> ok , checked my public ip --> From the xg and not from my homeoffice, checked ICMP to recently connected server --> FAIL

     

    I remembered that I have a similar issue months ago, where our ssl vpn users has been kicked off after exactly 15 mins. 

    The VPN client still says connected, but no connection to our internal servers. I've discussed this issue several times with the support hotline, but they don't understand the problem, even with a Support Session in the same moment where the disconnect happens. I was angry as hell! 

    So I checked all possible "time" fields at the XG and noticed that I have set the "Maximum Session Timeout" at the Global Settings under Services to 15min. My thought was, that this settings only apply to the user portal and not to the ssl vpn itself. But after I set this to 8 hours, the issue was resolved. 

     

    Am I right assuming that the "Maximum Session Timout" could affect the ssl vpn with the otp token? 

    Because I already set the Key Lifetime to 10 hours and downloaded the ssl config once again. This is the only settings which make sense to me, after my story as described above. 

    I will try it tomorrow once again but I would appreciate a confirmation from the forum support. :) 

     

  • If the Client is already installed with a proper Certificate, it will receive the new Configuration in the process of building the new VPN tunnel. So you do not need to download the configuration again. 

    __________________________________________________________________________________________________________________

  • Hey  

    Yes, I noticed this. But as I described, I already changed the keytime from the ssl vpn to 10 hours but get kicked out again after 8 hours. Therefore I thought it has something to do with the global session timeout, according with my experience a few months ago.  

  • Ok, my guess with the global session timeout was correct. The VPN is still connected after 8 hours and I can reach all internal systems. 

    I assume that the setting only applies if you use the OTP Token for authentication and not just the normal username + password combination. 

    Maybe this info will help other customers and also the clueless sophos support. [:#]

  • Hey Jonnie,

    this seems legit.

     

    Anybody knows where I can set the setting on an Sophos SG?

     

    Best regards

  • I have the exact same issue, after 8 hours all VPN clients dropped connection.

    May anyone let me know the "Maximum session timeout" mean, coz by default the setting is tick to Unlimited, so why after 8 hours it stop SSL VPN with OTP authentication?

    Btw, may I know the best value for "Maximum session timeout" if I want VPN connection still keeping after 12hrs or even more?

  • Hung Ho said:

    I have the exact same issue, after 8 hours all VPN clients dropped connection.

    May anyone let me know the "Maximum session timeout" mean, coz by default the setting is tick to Unlimited, so why after 8 hours it stop SSL VPN with OTP authentication?

    Btw, may I know the best value for "Maximum session timeout" if I want VPN connection still keeping after 12hrs or even more?

     

     
    Hi Hung Ho, 
    Did you changed the key lifetime at the ssl vpn settings to 10 or more hours?
    Maybe the "unlimited" checkbox is inoperative, try to set your favourite timeout? 
  • Hi Jonnie,

     

    Did you changed the key lifetime at the ssl vpn settings to 10 or more hours? => No, I still keep it 8 hours. Is need to change to a higher value? Coz I heard the key lifetime is not related to VPN drop.
    Maybe the "unlimited" checkbox is inoperative, try to set your favourite timeout? => Currently, I set it to 12 hours.
  • Hey, 

    I've set both settings to 12 hours, which is working without any further issues. 

    Do you use the mfa or otp token for the ssl vpn? 

  • Hi,

    Yes, I used the OTP for SSL VPN. Ok, I will try to set both like you, let see what happen then.

    May I know your value of this section "Simultaneous logins" ?