Configuring IAG session limits and timeouts

Applies To: Intelligent Application Gateway (IAG)

This topic describes how to configure limits and timeouts for client endpoint sessions to a Whale Communications Intelligent Application Gateway (IAG) 2007 server.

Setting session limits and timeouts

Configure session limits and timeouts as follows:

To set session limits

  1. In the Configuration console, click the portal node.

  2. In Maximum Connections, specify the maximum number of simultaneous connections for a trunk. The default setting is 500.

  3. Next to Advanced Trunk Configuration, click Configure.

  4. In the Advanced Trunk Configuration dialog box, click the Session tab.

  5. In Max Concurrent Session, specify the maximum number of sessions that can be open simultaneously through the portal. The default limit is 10,000.

  6. In Concurrent Sessions Threshold, specify a concurrent session threshold limit. When the number of sessions reaches this limit, IAG sends a message alert to the Web Monitor whenever a new session is opened. The message is also sent to the Built-In reporter log file, if this type of logging is enabled. The default limit is 0, which indicates that no threshold is set, and no alert is sent.

  7. In Max Concurrent Unauthenticated Sessions, specify the maximum number of anonymous (unauthenticated) sessions that can be open simultaneously through the portal.

  8. In Concurrent Unauthenticated Sessions Threshold, specify a concurrent session threshold limit for unauthenticated sessions. When the number of unauthenticated sessions reaches this limit, IAG sends a message alert to the Web Monitor whenever a new unauthenticated session is opened.

  9. In Session Notifications Timeout, specify when client endpoints should be notified of session timeouts before the timeout actually occurs. For example, if you set the timeout to 60 seconds, clients will be notified 60 seconds before a scheduled session logoff that the logoff is about to occur. Note that to receive session notifications, client endpoint browsers must allow pop-ups from the portal site. For more information, see Applying endpoint policies for an IAG session.

  10. In Default Session Settings specify the maximum time a session can be inactive before it times out in Inactive Session Timeout (seconds).

  11. and Privileged Session Settings specify the maximum time a session can be inactive before it times out in Inactive Session Timeout (seconds).

Note

30 seconds before the session times out, client endpoints are prompted to renew the session. Otherwise the session is closed. If the browser sends another request, a new session is opened. If authentication is required, the user must reauthenticate. For Secure Sockets Layer (SSL) wrapper applications, the inactivity timeout is counted from the last mouse movement or keyboard stroke. For more information, see About the IAG SSL Wrapper component. For more information about configuring an inactivity timeout for customized portal home pages, see Creating a custom IAG portal home page.