Next-Generation Firewall
Incidents in Strata Cloud Manager Reference
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
Next
Features Introduced in PAN-OS 12.1
Next
Features Introduced in PAN-OS 11.2
Next
Features Introduced in PAN-OS 11.1
Next
Features Introduced in PAN-OS 10.2
Next
Features Introduced in PAN-OS 10.1
Next
Features Introduced in PAN-OS 11.0
Next
Table of Contents
Next
Table of Contents
Next
Table of Contents
Next
Table of Contents
Incidents in Strata Cloud Manager Reference
This topic provides details of the NGFW incidents in Strata Cloud Manager.Incident: Approaching High Session Table Utilization
|
Incident Code
|
INC_NGFW_RESOURCES_SESSION_TABLE_USAGE
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
Approaching High Session Table Utilization
|
|
Raise Condition
|
When Session Table Utilization exceeds 85% of usage for 20 minutes
|
|
Clear Condition
|
When Session Table Utilization is less than 85% of usage for 2 hours
|
Incident: Approaching Max Capacity - Configuration Size
|
Incident Code
|
INC_NGFW_RESOURCES_CONFIG_SIZE_USAGE
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
This incident triggers when the configuration file size approaches the maximum
supported capacity, indicating that the device is nearing its configuration
storage limit.
|
|
Raise Condition
|
When the firewall configuration size reaches 90% of the device recommended
configuration size limit and sustains for 3 days staying at 90% or more
|
|
Clear Condition
|
When the firewall configuration size is less than 90% of the device recommended
configuration size limit for that respective model and stays less than 90% for 3
days
|
Incident: Approaching Max Capacity - Connections Per Second(CPS)
|
Incident Code
|
INC_NGFW_CAPACITY_CONNECTIONS_PER_SECOND
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
The firewall has anomalous values for connections per second (CPS).
|
|
Raise Condition
|
When Connections Per Second(CPS) usage exceed 90% of the capacity of that
respective firewall model and stays beyond 90% for five days in a week
|
|
Clear Condition
|
When Connections Per Second(CPS) usage falls below 90% of the capacity of that
respective firewall model and stays below 90% for 1 week
|
Incident: Approaching Max Capacity - Session Table Utilization
|
Incident Code
|
INC_NGFW_CAPACITY_SESSION_TABLE_UTILIZATION
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
Approaching MAX Capacity: High Session Table Utilization
|
|
Raise Condition
|
When Session Table Utilization exceed 90% of the capacity of that respective
firewall model and stays beyond 90% for five days over a week
|
|
Clear Condition
|
When Session Table Utilization falls below 90% of the capacity of that respective
firewall model and stays below 90% for two weeks
|
Incident: Approaching Max Capacity - System Throughput
|
Incident Code
|
INC_NGFW_CAPACITY_SYSTEM_THROUGHPUT
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
The firewall has anomalous values for throughput.
|
|
Raise Condition
|
When System Throughput usage exceed 90% of Threat Prevention throughput capacity
of that respective firewall model and stays beyond 90% for five days in a week
|
|
Clear Condition
|
When System Throughput usage falls below 90% of Threat Prevention throughput
capacity of that respective firewall model and stays below 90% for 1 week
|
Incident: Card Power Failure
|
Incident Code
|
INC_NGFW_CARD_POWER_FAIL
|
|
Category
|
Device
|
|
Subcategory
|
Hardware
|
|
Description
|
A card failure has been detected, suggesting a potential issue with the card or
its seating within the chassis.
|
|
Raise Condition
|
Card power failure has been detected.
|
|
Clear Condition
|
Card power failure is no longer detected.
|
Incident: Certificate Expiration
|
Incident Code
|
INC_NGFW_CERTIFICATE_EXPIRY_EXCEEDED_THRESHOLD
|
|
Category
|
Device
|
|
Subcategory
|
Management
|
|
Description
|
One or more certificate(s) on the firewall have been revoked or are expiring
soon.
|
|
Raise Condition
|
This incident is raised when the certificate in question has to be renewed in
less than 60 days
|
|
Clear Condition
|
The incident is cleared when the certificate's renewal data is above 60 days
(such as when the certificate is renewed)
|
Incident: Config Memory Usage Approaching Max Limits
|
Incident Code
|
INC_NGFW_CONFIG_MEMORY_USAGE
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
The firewall's configuration is approaching its maximum memory usage limit.
During commits, the firewall's total config memory must accommodate two copies:
the current 'in-use' configuration and the new 'to-be-used' configuration. If the
allocated memory per configuration exceeds 50%, the firewall reaches capacity,
resulting in commit failure.
|
|
Raise Condition
|
When configuration memory usage exceed 90% of the capacity of that respective
firewall model and stays beyond 90% for five days over a week.
|
|
Clear Condition
|
When configuration memory usage falls below 90% of the capacity of that
respective firewall model and stays below 90% for two weeks.
|
Incident: Device in HA Pair Transitioned to Unhealthy State
|
Incident Code
|
INC_NGFW_HA_STATE_TRANSITIONED_UNHEALTHY
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
This incident triggers when a firewall or Panorama in a high availability (HA)
pair transitions to an unhealthy state, such as Initial, Suspended,
Non-Functional, or Tentative. These states indicate that the device may be unable
to perform normal operations, maintain HA synchronization, or communicate
effectively with peers or management systems.
|
|
Raise Condition
|
An alert is triggered when a member of the HA pair transitions into a
non-operational state ( Suspended, Non-Functional).
|
|
Clear Condition
|
The alert is cleared when the HA member transitions to a healthy state (Passive,
Active, Active-Primary, or Active-Secondary).
|
|
Probable Root Cause Incident
|
"INC_NGFW_HA_NON_FUNCTIONAL_DU_TO_LINK_DOWN",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_BRDAGENT_EXITING",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_DEVICE_ID_OVERLAP",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_DP_DOWN",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_DP_DOWN_BRDAGENT_EXISTING",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_DRIVE_ERROR",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_HA1_AP_MISMATCH",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_MULTI_VSYS_MISMATCH",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_PEER_VERSION_OLD",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_POLICY_PUSH_FAIL_TO_DP",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_PREEMPTION_LOOP",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_STATE_SYNC_MISMATCH",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_VENDOR_URL_MISMATCH",
"INC_NGFW_HA_NON_FUNCTIONAL_DUE_TO_WAITING_POLICY_PUSH_TO_DP",
"INC_NGFW_HA_NON_FUNCTIONAL_STATE_DUE_TO_PATH_DOWN"
|
Incident: Firewall HA Failover
|
Incident Code
|
INC_NGFW_HA_FAILOVER
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
This incident triggers when a device in an HA pair undergoes a failover, causing
the secondary device to assume the active role. This may indicate a disruption in
the primary device or a configuration or environmental issue that triggered the HA
state transition.
|
|
Raise Condition
|
When a device (NGFW or Panorama) unexpectedly fails over.
|
|
Clear Condition
|
Monitor for 3 days to clear the incident if there is no other High availability
failover event in this duration. If in this 3 days if another HA failover event
occurs then the 3 day timer begins again.
|
Incident: Firewall losing logs
|
Incident Code
|
INC_NGFW_LOG_LOSS
|
|
Category
|
Network Services
|
|
Subcategory
|
Logging
|
|
Description
|
This alert indicates that DP logs (such as traffic, threat, URL, Netflow,
User-ID, GP, Decryption, EAL, etc.) that are supposed to be generated based on
inspected traffic and logging configurations are being lost. When logs are
generated in the DP, they are moved into logging queues, which are then handed
over to the logrcvr in the Management Plane (DP to MP). To prevent the DP-to-MP
channel from being overwhelmed, a rate-limiting mechanism was implemented to
control the transfer of logs from the Data Plane to the Management Plane. This
mechanism regulates either the logging count rate (logs/sec) or bandwidth usage
(KB/sec). The control is in place to ensure that other services such as packet
capture and any requests from DP to the cloud (e.g., URL, Wildfire, etc.), are not
dropped due to excessive logging bandwidth consumption.
|
|
Raise Condition
|
Firewall is losing logs at dataplane and logs losing rate is greater than 50 logs
per second at least for an hour. OR Dataplane(DP) to Management plane(MP) logs
overflow and logs are lost due to rate-limiting between DP and MP.
|
|
Clear Condition
|
When the logs are being generated, retained and are not lost for 24 hr
duration.
|
| Probable Root Cause Incident |
"INC_NGFW_FAILED_TO_SCHEDULE_A_LOG_FWD_CONTROL_JOB_FOR_DEVICE",
"INC_NGFW_FSM_INIT_FAILED",
"INC_NGFW_HIGH_LOG_RATE",
"INC_NGFW_INTER_LOG_COLLECTOR_DISCONNECT",
"INC_NGFW_LICENSE_NOT_PROVISIONED_LCAAS",
"INC_NGFW_LOG_CERT_MISMATCH",
"INC_NGFW_PAN_LC_DISCONNECTED_FROM_GROUP",
"INC_NGFW_SYSLOG_CONN_LOST",
"INC_NGFW_TCP_CONN_SYSLOG",
"INC_NGFW_DROPPING_LOGS_FWD_QUEUE_FAIL"
|
Incident: HA Backup
|
Incident Code
|
INC_NGFW_BACK_UP_LINK_NOT_CONFIGURED
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
The HA Backup link(s) are not currently configured.
|
|
Raise Condition
|
When either the HA1-backup or HA2-backup links are not configured
|
|
Clear Condition
|
When HA1-backup and HA2-backup links are configured
|
Incident: HA Link Issue Detected
|
Incident Code
|
INC_NGFW_HA_LINK_ISSUE
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
This incident triggers when a change is detected in the status of one or more
HA(High Availability) links between firewall peers. These links are critical for
synchronizing session information, configuration, and state data. A status change
may indicate that one or more HA links are down or unstable.
|
|
Raise Condition
|
When HA link status goes down. HA links are links that are configured for HA
functionality ( HA1, HA1-backup HA2, HA2-backup, HA3)
|
|
Clear Condition
|
When the HA link has come back up and stays in up state atleast for 2 hours
|
|
Probable Root Cause Incident
|
"INC_NGFW_HA_OR_HA1_BACKUP_LINK_CONNECTION_FAILURE",
"INC_NGFW_HA_OR_HA2_BACKUP_KEEP_ALIVES_DOWN"
|
Incident: HA Peer Connection Status
|
Incident Code
|
INC_NGFW_HA_PEER_STATUS
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
One of the firewalls in the HA pair is in a non-healthy state.
|
|
Raise Condition
|
If the connection status for peer is down
|
|
Clear Condition
|
If connection status for peer is healthy
|
Incident: High Dataplane CPU Activity Detected
|
Incident Code
|
INC_NGFW_DP_CPU_USAGE_EXCEEDED_THRESHOLD
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
High Dataplane CPU Activity Detected
|
|
Raise Condition
|
MAX DP CPU exceeds 95% for 15 minutes OR AVG DP CPU exceeds 85% for 1 hour
|
|
Clear Condition
|
Clears when MAX DP CPU stays below 95% and AVG DP CPU stays below 85%
continuously for at least 2 hours.
|
Incident: High Disk Space Usage - Pancfg Partition
|
Incident Code
|
INC_NGFW_DISK_RESOURCES_USAGE_PANCFG_PARTITION
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
This incident triggers when the disk space usage in the pancfg partition exceeds
the defined threshold, indicating that the partition is running low on available
storage capacity.
|
|
Raise Condition
|
If pancfg partition usage reaches 90% and stays there for at least 2 hours
|
|
Clear Condition
|
If pancfg partition usage is less than 90% and stays there for at least 12
hours
|
Incident: High Disk Space Usage - Panlogs Partition
|
Incident Code
|
INC_NGFW_DISK_RESOURCES_USAGE_PANLOGS_PARTITION
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
This incident triggers when the disk space usage in the panlogs partition exceeds
the defined threshold, indicating that the partition is running low on available
storage capacity.
|
|
Raise Condition
|
If it reaches 97% usage and stays there for at least 6 hours.
|
|
Clear Condition
|
Less than 97% usage and stays there for at least 12 hours
|
Incident: High Disk Space Usage on Root Partition
|
Incident Code
|
INC_NGFW_DISK_RESOURCES_ROOT_PARTITION_USAGE
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
This incident triggers when the disk space usage in the root partition exceeds
the defined threshold, indicating that the partition is running low on available
storage capacity.
|
|
Raise Condition
|
If the root partition in the disk exceeds 95% usage and stays there for at least
2 hours
|
|
Clear Condition
|
If the root partition is less than 95% usage and stays there for at least 12
hours
|
Incident: High Management Plane CPU Activity Detected
|
Incident Code
|
INC_NGFW_MP_CPU_USAGE_EXCEEDED_THRESHOLD
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
High Management Plane CPU Activity Detected
|
|
Raise Condition
|
If the MP CPU usage goes beyond 95% and stays there for at least 15 minutes
|
|
Clear Condition
|
If the MP CPU usage is below 95% for at least 2 hours
|
Incident: High Management Plane Memory Usage
|
Incident Code
|
INC_NGFW_MP_MEMORY_USAGE_EXCEEDED_THRESHOLD
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
High Management Plane memory usage has been detected.
|
|
Raise Condition
|
If the MP Memory usage goes beyond 95% and stays there for at least 20
minutes
|
|
Clear Condition
|
If the MP Memory usage is below 95% and stays there for at least 2 hours
|
Incident: High Traffic Volume Detected - Connections Per Second
|
Incident Code
|
INC_NGFW_SYSTEM_CONNECTIONS_PER_SECOND
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
The firewall has anomalous values for connections per second (CPS).
|
|
Raise Condition
|
Based on Firewall model type if the Connections per second(CPS) is above 95% of
what is possible on that model for 15mins
|
|
Clear Condition
|
Based on Firewall model type if the Connections per second(CPS) is less than 95%
of what is possible on that model for 2 hours
|
Incident: High Traffic Volume Detected - System Throughput
|
Incident Code
|
INC_NGFW_SYSTEM_THROUGHPUT
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
The firewall has anomalous values for throughput.
|
|
Raise Condition
|
Based on Firewall model type if the firewall Throughput is above 95% of Threat
prevention thorughput of what is possible on that model for 15mins
|
|
Clear Condition
|
Based on Firewall model type if the Throughput is less than 95% of Threat
prevention thorughput of what is possible on that model for 2 hours
|
Incident: Increased Traffic Latency - Packet Descriptor
|
Incident Code
|
INC_NGFW_PACKET_DESCRIPTORS_USAGE_EXCEEDED_THRESHOLD
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
Packet Descriptor resources are running low on the device.
|
|
Raise Condition
|
If the Packet Descriptors usage exceeds 90% usage and stays there for 10
minutes
|
|
Clear Condition
|
If the Packet Descriptors usage is less than 90% usage for at least 4 hours
|
Incident: Irregular Input Power
|
Incident Code
|
INC_NGFW_POWER_RAIL_FAILURE
|
|
Category
|
Device
|
|
Subcategory
|
Hardware
|
|
Description
|
Device power levels are outside of the normal range.
|
|
Raise Condition
|
In the output of "show system environmentals" CLI, the alarm flag is True for 4
hours
|
|
Clear Condition
|
If the alarm flag is false for 24 hours
|
Incident: License Expiration
|
Incident Code
|
INC_NGFW_LICENSE_EXPIRY_EXCEEDED_THRESHOLD
|
|
Category
|
Device
|
|
Subcategory
|
Management
|
|
Description
|
One or more of your licenses are nearing or have reached expiration.
|
|
Raise Condition
|
This incident is raised when a software or feature license is nearing its
expiration date. By default, this incident is generated if the license is due to
expire within 90 days.
|
|
Clear Condition
|
This incident will be automatically cleared once the license has been
successfully renewed or updated. The condition is met when the system verifies
that the new license expiration date is more than 90 days in the future.
|
Incident: MP Process Memory Depletion
|
Incident Code
|
INC_NGFW_MP_PROCESS_MEMORY_DEPLETION
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
This incident triggers when a Management Plane (MP) process on the firewall
consumes excessive memory without releasing it, which may indicate a memory leak
or abnormal behavior.
|
|
Raise Condition
|
Triggers when leak conditions are detected in more than 75% of the last 4
hours.
|
|
Clear Condition
|
Clears when the average MP system memory usage of the last 10 hours is below 60%,
or when non-leak conditions occur in more than 75% of the last 4 hours.
|
Incident: NAT Allocation Failure
|
Incident Code
|
INC_NGFW_NAT_ALLOCATION_FAILED
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
This alert triggers when at least one NAT rule is unable to allocate enough
resources for translation.
|
|
Raise Condition
|
This incident is raised if the rate of change for the
'flow_fpp_nat_dipp_max_retries' counter OR the 'flow_policy_nat' counter exceeds
the configured threshold persistently for a duration of 1 hour.
|
|
Clear Condition
|
This incident will be cleared only if the rate of change for the triggering
counter remains continuously below the defined threshold for a full 4-hour
period.
|
Incident: NAT Pool Usage
|
Incident Code
|
INC_NGFW_NAT_POOL_USAGE
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
This alert triggers when one or more NAT rules have high resource usage.
|
|
Raise Condition
|
When any NAT Policy pool usage exceeds 85% of its max limit for at least 1 hour
and is recurring at least 2 times in the past ( so in total 3 such occurrences
)
|
|
Clear Condition
|
When any NAT Policy pool usage is less than 85% of its max limit for at least 4
hour
|
Incident: Out Of Sync HA Peers - Configuration
|
Incident Code
|
INC_NGFW_OUT_OF_SYNC_PEERS_CONFIGURATION
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
This incident indicates a configuration discrepancy between High Availability
(HA) peers, primarily due to the "Enable Config Sync" option being disabled in the
High Availability General settings.
|
|
Raise Condition
|
Running config file between the HA pair of devices is not synchronized for 2
hours
|
|
Clear Condition
|
If the running configuration is in sync with the peer device for at least 4
hours.
|
Incident: Out of Sync Peers - Dynamic Content
|
Incident Code
|
INC_NGFW_OUT_OF_SYNC_PEERS_DYNAMIC_CONTENT
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
This incident triggers when dynamic content, such as Applications, Threats, or
Antivirus versions, is not synchronized between firewalls in a high-availability
(HA) pair.
|
|
Raise Condition
|
If Dynamic Content ( Anti virus, Apps and Threat) is Out of Sync between HA Peers
for 1 week.
|
|
Clear Condition
|
If the Dynamic content between the HA peers are not outdated for 1 week.
|
Incident: Out of Sync Peers - Sessions
|
Incident Code
|
INC_NGFW_OUT_OF_SYNC_SESSIONS
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
Sessions are not matching or up to date between the High availability Peers.
|
|
Raise Condition
|
When HA2 data link interface (dedicated HA communication interface) is not
configured
|
|
Clear Condition
|
When HA2 data link interface (dedicated HA communication interface) is
configured
|
Incident: Out of Sync Peers - Software
|
Incident Code
|
INC_NGFW_OUT_OF_SYNC_PEERS_SW
|
|
Category
|
Device
|
|
Subcategory
|
High Availability
|
|
Description
|
The PAN-OS software versions on the high availability peers do not match.
|
|
Raise Condition
|
When the PAN-OS software versions on the High Availability (HA) peers do not
match.
|
|
Clear Condition
|
When the PAN-OS software versions on the High Availability (HA) peers match.
|
Incident: Outdated Dynamic Content - Antivirus
|
Incident Code
|
INC_NGFW_OUTDATED_DYNAMIC_CONTENT_ANTIVIRUS
|
|
Category
|
Device
|
|
Subcategory
|
Management
|
|
Description
|
The dynamic content installed on your device is outdated compared to the latest
version available on the update server. This means your device isn't leveraging
the most current security intelligence.
|
|
Raise Condition
|
This incident is raised when the system fails to update its Antivirus dynamic
content. The failure can occur during either the download process from the update
server or during the subsequent installation of the downloaded content. The device
may not have the latest threat intelligence protections provided by the Antivirus
package.
|
|
Clear Condition
|
This incident will clear automatically once the Antivirus dynamic content has
been successfully downloaded and installed on the system. When the device confirms
a successful update, the incident will be resolved, indicating that threat
intelligence is current.
|
Incident: Outdated Dynamic Content - Apps and Threats
|
Incident Code
|
INC_NGFW_OUTDATED_DYNAMIC_CONTENT_APPSANDTHREATS
|
|
Category
|
Device
|
|
Subcategory
|
Management
|
|
Description
|
The dynamic content installed on your device is outdated compared to the latest
version available on the update server. This means your device isn't leveraging
the most current security intelligence.
|
|
Raise Condition
|
This incident is raised when the system fails to update its Apps and Threat
dynamic content. The failure can occur during either the download process from the
update server or during the subsequent installation of the downloaded content. The
device may not have the latest threat intelligence protections provided by the
Apps and Threat content package.
|
|
Clear Condition
|
This incident will clear automatically once the Apps and Threat dynamic content
has been successfully downloaded and installed on the system. When the device
confirms a successful update, the incident will be resolved, indicating that
threat intelligence is current.
|
Incident: Outdated Dynamic Content - Wildfire
|
Incident Code
|
INC_NGFW_OUTDATED_DYNAMIC_CONTENT_WILDFIRE
|
|
Category
|
Device
|
|
Subcategory
|
Management
|
|
Description
|
The dynamic content installed on your device is outdated compared to the latest
version available on the update server. This means your device isn't leveraging
the most current security intelligence.
|
|
Raise Condition
|
This incident is raised when the system fails to update its WildFire dynamic
content. The failure can occur during either the download process from the update
server or during the subsequent installation of the downloaded content. The device
may not have the latest threat intelligence protections provided by the WildFire
package.
|
|
Clear Condition
|
This incident will clear automatically once the WildFire dynamic content has been
successfully downloaded and installed on the system. When the device confirms a
successful update, the incident will be resolved, indicating that threat
intelligence is current.
|
Incident: PAN-OS End-of-Life
|
Incident Code
|
INC_NGFW_END_OF_LIFE_SOFTWARE
|
|
Category
|
Device
|
|
Subcategory
|
EOL/EOS
|
|
Description
|
Your current version of PAN-OS is no longer supported.
|
|
Raise Condition
|
When End of life for software is less than 90 days
|
|
Clear Condition
|
When End of life for software is more than 90 days
|
Incident: PAN-OS Known Vulnerability
|
Incident Code
|
INC_NGFW_PANOS_KNOWN_VULNERABILITY_EXCEEDED_VALUE
|
|
Category
|
Device
|
|
Subcategory
|
Vulnerability
|
|
Description
|
Your current version of PAN-OS has known vulnerabilities.
|
|
Raise Condition
|
If the Firewall SW version is part of the CVE Affected versions based on CVE
severity score greater than or equal to 7. Ex: CVE reference and link -
https://security.paloaltonetworks.com/CVE-2024-5913"
|
|
Clear Condition
|
If the CVEs have the CVE severity score less than 7
|
Incident: PAN-OS integrated User-ID Agent Monitored Server Disconnected
|
Incident Code
|
INC_NGFW_USER_ID_AGENT_DISCONNECTION
|
|
Category
|
Network Services
|
|
Subcategory
|
User-ID
|
|
Description
|
This alert is triggered when the server, monitored by the PAN-OS integrated
User-ID Agent (Agentless User-ID), loses connection with the firewall. This
monitored server is a critical component for mapping user identities to network
activities.
|
|
Raise Condition
|
When the User ID agent is disconnected
|
|
Clear Condition
|
When all User ID agents are connected
|
Incident: Path Monitor Failure - Card
|
Incident Code
|
INC_NGFW_PATH_MON_FAIL_CARD
|
|
Category
|
Device
|
|
Subcategory
|
Hardware
|
|
Description
|
A path monitoring failure has been detected on a card located within the
firewall's slots.
|
|
Raise Condition
|
Path monitor failure detected
|
|
Clear Condition
|
Path monitor failure cleared
|
Incident: Reduced Log Forwarding Detected
|
Incident Code
|
INC_NGFW_REDUCED_LOG_FORWARDING
|
|
Category
|
Network Services
|
|
Subcategory
|
Logging
|
|
Description
|
This alert triggers when the NGFW's log-receiver fills up, causing it to drop
logs. This issue can stem from several factors, including: • A network
connectivity problem to an external logging service (like a Log collector, syslog,
SNMP, email server). • An issue with the external logging service itself, such as
it being offline or unable to process incoming logs. • A resource constraint on
the NGFW or the external logging service, such as high CPU or memory utilization.
When this occurs, a significant portion of the NGFW's log data isn't forwarded to
its intended destination.
|
|
Raise Condition
|
When logs fail to get forwarded to its respective destination for 1 hours
|
|
Clear Condition
|
When the logs are getting forwarded and there is no delay or loss in log
forwarding for at least 4 hours
|
| Probable Root Cause Incident |
"INC_NGFW_DISK_HINT_OVERFLOW_LOG_FWD_FAIL",
"INC_NGFW_LOG_FORWARDING_DISABLED_DUE_TO_SNMP_SERVER_UNRESOLVED_HOSTNAME",
"INC_NGFW_LOG_FWD_MISSING_COLLECTOR_PREF",
"INC_NGFW_LOG_FWD_DELAY"
|
Incident: Redundant Power Supply Failure
|
Incident Code
|
INC_NGFW_POWER_SUPPLY_FAILED
|
|
Category
|
Device
|
|
Subcategory
|
Hardware
|
|
Description
|
This incident triggers when a firewall has insufficient power supplies installed
to meet redundancy requirements.
|
|
Raise Condition
|
Redundancy requirements are not met because the firewall has fewer operational
power supplies than required for full power redundancy.
|
|
Clear Condition
|
Power redundancy requirements are fully met, with the required number of
operational power supplies installed and functioning.
|
Incident: Thermal Issues
|
Incident Code
|
INC_NGFW_ENV_THERMAL_ISSUE
|
|
Category
|
Device
|
|
Subcategory
|
Hardware
|
|
Description
|
This incident triggers when the device temperature exceeds the defined
operational range.
|
|
Raise Condition
|
When the Temperature exceeds the optimal operating range for any component and
stays above the range for at least 2 hours
|
|
Clear Condition
|
When the Temperature comes back to the optimal operating range and stays there
for at least 2 hours for any components
|
Incident: URLs or IPs with EDLs Approaching Max Limits
|
Incident Code
|
INC_NGFW_CONFIG_EDL_USAGE
|
|
Category
|
Device
|
|
Subcategory
|
System Resources
|
|
Description
|
The number of URLs, IPs, or Domains within the configured EDL(s) used in policy
on this firewall is approaching the maximum capacity that the firewall can
support.
|
|
Raise Condition
|
When URL or IP EDL usages exceed 95% of the capacity for that firewall model and
remain above 95% for five days within a week.
|
|
Clear Condition
|
When URL or IP EDL usages fall below 95% of the capacity for that firewall model
and stay below 95% for two weeks.
|
Next
Features Introduced in PAN-OS 12.1
Next
Features Introduced in PAN-OS 11.2
Next
Features Introduced in PAN-OS 11.1
Next
Features Introduced in PAN-OS 10.2
Next
Features Introduced in PAN-OS 10.1
Next
Features Introduced in PAN-OS 11.0
Next
Table of Contents
Next
Table of Contents
Next
Table of Contents
Next
Table of Contents