Cloud NGFW for Azure Addressed Issues
Table of Contents
Expand all | Collapse all
-
- Cloud NGFW for Azure
- Cloud NGFW Components
- Cloud NGFW for Azure Supported Regions
- Cloud NGFW for Azure Limits and Quotas
- Cloud NGFW for Azure Pricing
- Cloud NGFW for Azure Free Trial
- Cloud NGFW Credit Distribution and Management
- Start with Cloud NGFW for Azure
- Manage Cloud NGFW Roles for Azure Users
- Integrate Single Sign-on
- Monitor Cloud NGFW Health
- Create a Support Case
- Register Your Cloud NGFW Tenant with a Palo Alto Networks Support Account
- Cloud NGFW for Azure Certifications
- Cloud NGFW For Azure Privacy and Data Protection
-
- About Rulestacks and Rules on Cloud NGFW for Azure
- Create a Rulestack on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Rule Objects
- Create a Prefix List on Cloud NGFW for Azure
- Create an FQDN List for Cloud NGFW on Azure
- Add a Certificate to Cloud NGFW for Azure
- Create Security Rules on Cloud NGFW for Azure
- Cloud NGFW for Azure Security Services
- Enable DNS Security on Cloud NGFW for Azure
- Set Up Outbound Decryption on Cloud NGFW for Azure
- Set Up Inbound Decryption on Cloud NGFW for Azure
-
- Panorama Integration
- Panorama Integration Prerequisites
- Link the Cloud NGFW to Palo Alto Networks Management
- Use Panorama for Cloud NGFW Policy Management
- Enable User-ID on the Cloud NGFW for Azure
- Configure Service Routes for On-Prem Services
- Use XFF IP Address Values in Policy
- View Cloud NGFW Logs and Activity in Panorama
- Strata Cloud Manager Policy Management
-
- Configure Logging for Cloud NGFW on Azure
- Cloud NGFW for Azure Traffic Log Fields
- Cloud NGFW for Azure Threat Log Fields
- Cloud NGFW for Azure Decryption Log Fields
- Enable Log Settings
- Disable Log Settings
- Enable Activity Logging on Cloud NGFW for Azure
- Multiple Logging Destinations on Cloud NGFW for Azure
- View the Logs
- View Audit Logs on a Firewall Resource
- View Audit Logs on Resource Groups
- What's New
- Cloud NGFW for Azure Known Issues
- Cloud NGFW for Azure Addressed Issues
Cloud NGFW for Azure Addressed Issues
Cloud NGFW for AWS addressed issues.
The following issues have been addressed at this release of Cloud NGFW for Azure.
ID | Description |
---|---|
FWAAS-3919
|
It is observed that invalid rule names could be generated in Local
Rulestacks that could cause commit failures.
|
FWAAS-4546
|
Rulehit counter DB entries are not deleted after deleting the rule,
resulting in old values if a rule is created again with the same
name.
|
FWAAS-4767
|
The DNS proxy does not update simultaneously on the firewall,
following a firewall update call.
|
FWAAS-4805
|
Firewall host names are erroneously displayed in logs.
|
FWAAS-7430
|
If you try to delete a new Cloud NGFW resource before the creation is
complete, the deletion fails.
|
FWAAS-7542
|
Panorama does not always automatically push content and antivirus
updates to newly created Cloud NGFW for Azure resources.
|
FWAAS-8696
|
Log forwarding to a Panorama virtual appliance may take a long time
to complete.
|
FWAAS-9041
|
Device server profiles (for example, LDAP, syslog) erroneously appear
disabled in Panorama templates used for CNGFW devices.
|
FWAAS-9050
|
In some cases, a license on a VM-Series firewall may be removed from
the Panorama virtual appliance.
|
FWAAS-9055
|
The CNGFW reaches an unhealthy state and loses connectivity to
Panorama when the Cloud Device Group name is changed.
|
PAN-217460
|
Cloud NGFW resources managed by a Panorama HA pair might show
disconnected on the secondary Panorama. However, on the primary
Panorama, the Cloud NGFW resource shows connected.
|