Limitations in PAN-OS 10.1
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- Cloud Management of NGFWs
-
- Management Interfaces
-
- Launch the Web Interface
- Use the Administrator Login Activity Indicators to Detect Account Misuse
- Manage and Monitor Administrative Tasks
- Commit, Validate, and Preview Firewall Configuration Changes
- Commit Selective Configuration Changes
- Export Configuration Table Data
- Use Global Find to Search the Firewall or Panorama Management Server
- Manage Locks for Restricting Configuration Changes
-
-
- Define Access to the Web Interface Tabs
- Provide Granular Access to the Monitor Tab
- Provide Granular Access to the Policy Tab
- Provide Granular Access to the Objects Tab
- Provide Granular Access to the Network Tab
- Provide Granular Access to the Device Tab
- Define User Privacy Settings in the Admin Role Profile
- Restrict Administrator Access to Commit and Validate Functions
- Provide Granular Access to Global Settings
- Provide Granular Access to the Panorama Tab
- Provide Granular Access to Operations Settings
- Panorama Web Interface Access Privileges
-
- Reset the Firewall to Factory Default Settings
-
- Plan Your Authentication Deployment
- Pre-Logon for SAML Authentication
- Configure SAML Authentication
- Configure Kerberos Single Sign-On
- Configure Kerberos Server Authentication
- Configure TACACS+ Authentication
- Configure TACACS Accounting
- Configure RADIUS Authentication
- Configure LDAP Authentication
- Configure Local Database Authentication
- Configure an Authentication Profile and Sequence
- Test Authentication Server Connectivity
- Troubleshoot Authentication Issues
-
- Keys and Certificates
- Default Trusted Certificate Authorities (CAs)
- Certificate Deployment
- Configure the Master Key
- Export a Certificate and Private Key
- Configure a Certificate Profile
- Configure an SSL/TLS Service Profile
- Configure an SSH Service Profile
- Replace the Certificate for Inbound Management Traffic
- Configure the Key Size for SSL Forward Proxy Server Certificates
-
- HA Overview
-
- Prerequisites for Active/Active HA
- Configure Active/Active HA
-
- Use Case: Configure Active/Active HA with Route-Based Redundancy
- Use Case: Configure Active/Active HA with Floating IP Addresses
- Use Case: Configure Active/Active HA with ARP Load-Sharing
- Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall
- Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
- Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3
- HA Clustering Overview
- HA Clustering Best Practices and Provisioning
- Configure HA Clustering
- Refresh HA1 SSH Keys and Configure Key Options
- HA Firewall States
- Reference: HA Synchronization
-
- Use the Dashboard
- Monitor Applications and Threats
- Monitor Block List
-
- Report Types
- View Reports
- Configure the Expiration Period and Run Time for Reports
- Disable Predefined Reports
- Custom Reports
- Generate Custom Reports
- Generate the SaaS Application Usage Report
- Manage PDF Summary Reports
- Generate User/Group Activity Reports
- Manage Report Groups
- Schedule Reports for Email Delivery
- Manage Report Storage Capacity
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
-
- Configure Syslog Monitoring
-
- Traffic Log Fields
- Threat Log Fields
- URL Filtering Log Fields
- Data Filtering Log Fields
- HIP Match Log Fields
- GlobalProtect Log Fields
- IP-Tag Log Fields
- User-ID Log Fields
- Decryption Log Fields
- Tunnel Inspection Log Fields
- SCTP Log Fields
- Authentication Log Fields
- Config Log Fields
- System Log Fields
- Correlated Events Log Fields
- GTP Log Fields
- Audit Log Fields
- Syslog Severity
- Custom Log/Event Format
- Escape Sequences
- Forward Logs to an HTTP/S Destination
- Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
- Monitor Transceivers
-
- User-ID Overview
- Enable User-ID
- Map Users to Groups
- Enable User- and Group-Based Policy
- Enable Policy for Users with Multiple Accounts
- Verify the User-ID Configuration
-
- App-ID Overview
- App-ID and HTTP/2 Inspection
- Manage Custom or Unknown Applications
- Safely Enable Applications on Default Ports
- Applications with Implicit Support
-
- Prepare to Deploy App-ID Cloud Engine
- Enable or Disable the App-ID Cloud Engine
- App-ID Cloud Engine Processing and Policy Usage
- New App Viewer (Policy Optimizer)
- Add Apps to an Application Filter with Policy Optimizer
- Add Apps to an Application Group with Policy Optimizer
- Add Apps Directly to a Rule with Policy Optimizer
- Replace an RMA Firewall (ACE)
- Impact of License Expiration or Disabling ACE
- Commit Failure Due to Cloud Content Rollback
- Troubleshoot App-ID Cloud Engine
- Application Level Gateways
- Disable the SIP Application-level Gateway (ALG)
- Maintain Custom Timeouts for Data Center Applications
-
- Decryption Overview
-
- Keys and Certificates for Decryption Policies
- SSL Forward Proxy
- SSL Forward Proxy Decryption Profile
- SSL Inbound Inspection
- SSL Inbound Inspection Decryption Profile
- SSL Protocol Settings Decryption Profile
- SSH Proxy
- SSH Proxy Decryption Profile
- Profile for No Decryption
- SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
- Perfect Forward Secrecy (PFS) Support for SSL Decryption
- SSL Decryption and Subject Alternative Names (SANs)
- TLSv1.3 Decryption
- High Availability Not Supported for Decrypted Sessions
- Decryption Mirroring
- Configure SSL Forward Proxy
- Configure SSL Inbound Inspection
- Configure SSH Proxy
- Configure Server Certificate Verification for Undecrypted Traffic
- Post-Quantum Cryptography Detection and Control
- Enable Users to Opt Out of SSL Decryption
- Temporarily Disable SSL Decryption
- Configure Decryption Port Mirroring
- Verify Decryption
- Activate Free Licenses for Decryption Features
-
- Policy Types
- Policy Objects
- Track Rules Within a Rulebase
- Enforce Policy Rule Description, Tag, and Audit Comment
- Move or Clone a Policy Rule or Object to a Different Virtual System
-
- External Dynamic List
- Built-in External Dynamic Lists
- Configure the Firewall to Access an External Dynamic List
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Exclude Entries from an External Dynamic List
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Register IP Addresses and Tags Dynamically
- Use Dynamic User Groups in Policy
- Use Auto-Tagging to Automate Security Actions
- CLI Commands for Dynamic IP Addresses and Tags
- Application Override Policy
- Test Policy Rules
-
- Network Segmentation Using Zones
- How Do Zones Protect the Network?
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
PAN-OS 10.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
-
- PAN-OS 10.1.14 Known Issues
- PAN-OS 10.1.14-h11 Addressed Issues
- PAN-OS 10.1.14-h10 Addressed Issues
- PAN-OS 10.1.14-h9 Addressed Issues
- PAN-OS 10.1.14-h8 Addressed Issues
- PAN-OS 10.1.14-h6 Addressed Issues
- PAN-OS 10.1.14-h4 Addressed Issues
- PAN-OS 10.1.14-h2 Addressed Issues
- PAN-OS 10.1.14 Addressed Issues
Limitations in PAN-OS 10.1
What are the limitations related to PAN-OS 10.1 releases?
The following are limitations
associated with PAN-OS 10.1.
Issue ID | Description |
---|---|
PAN-246825
|
ECMP is not supported for equal-cost routes where one or more of
those routes has a virtual router as the next hop. None of the
equal-cost routes will be installed in the Forwarding Information
Base (FIB).
|
PAN-216214
|
For Panorama-managed firewalls in an Active/Active High Availability
(HA) configuration where you configure the firewall HA settings (DeviceHigh Availability) in a template or template stack (PanoramaTemplates), performing a local commit on one of the HA
firewalls triggers an HA config sync on the peer firewall. This
causes the HA settings to display as overridden despite no config
override occurring.
|
PAN-218372
|
Commits on Panorama and configuration pushes from Panorama to managed
firewalls fail because the auto-commit process gets stuck at
55%.
Workaround: Reset the impacted firewall to the factory default
settings and push the configuration changes to the managed firewall.
To reset the firewall to factory defaults, perform the following
steps:
|
PAN-218067
|
By default, Next Generation firewalls attempt to fetch the device certificate with
each commit even when the firewall is not using any Palo Alto Networks cloud
service.
You can prevent the firewall from attempting to fetch the device
certificate for the following firewalls:
To disable, log in to the firewall CLI
and enter the following command:
|
PAN-215869
|
PAN-OS logs (MonitorLogs) experience a significant delay before they are
displayed if NetFlow (DeviceServer ProfilesNetFlow) is enabled on an interface (NetworkInterface). This may result in log loss if the volume of
delayed logs exceeds the logging buffer available on the
firewall.
The following firewalls are impacted:
|
PAN-205166
|
(PA-440, PA-450, and PA-460 firewalls only) The CLI does not
display system information about the power supply when entering the
show system environmentals command.
As a result, the CLI cannot be used to view the current status of
the power adapter.
Workaround: To manually interpret the status of the firewall's
power adapter, verify that your power cable connections are secure
and that the LED on the power adapter is on. If the LED is not
illuminated even though the power cable connections are secure, your
power adapter has failed.
|
PAN-190727 | (PA-5450 only) Log interfaces must
be configured to ensure they are not in the same subnetwork as the
management interface. Configuring both interfaces in the same subnetwork
can cause connectivity issues and result in the wrong interface being
used for log forwarding. |
PAN-187615 | SSL/TLS session resumption fails on PA firewalls using
TLSv1.3 with an x25519 ECDSA key. Workaround:
|
PAN-186061 | On the Panorama management server, pushing
a configuration change to managed firewalls fails if a HIP Profile (ObjectsGlobalProtectHIP Profiles) is associated
with a Security (PoliciesSecurity) or Authentication (PoliciesAuthentication)
policy rule. This applies to:
Workaround: Remove any
HIP Profiles associated with a Security or Authentication policy
rule from the Panorama CLI.
|
Alternatively, upgrade to PAN-OS 10.1.5
or later release to avoid needing to remove HIP Profile association
from your Security and Authentication policy rules.
Workaround: Load
the running configuration.
| |
PAN-182912 | Due to a change in default root partition
threshold, PAN-OS may print a critical log on a PA-7050 stating
that disk usage has exceeded the limit. Workaround: Replace
the first-generation PA-7050 SMC (Switch Management Card) with the
second-generation SMC-B. |
PAN-175545 | (PAN-OS 10.1.2 and later versions)
The PA-410 does not write session logs locally. As a result, the PAN-OS
Web Interface does not display any logs in the Monitor tab. |
PAN-174817 | When an external dynamic list is added to
an Anti-Spyware Profile and configured as an allow list, the EDL
policy action of allow does not have precedence over the domain
policy action specified under DNS Security. As a result, when there
is a domain match to an entry in the EDL and a DNS Security domain
category, the action specified under DNS Security is still applied,
even when the EDL is explicitly configured with an action of Allow. Workaround:
Configure the EDL with an Alert action. This generates threat logs
on the firewall but will apply the EDL action instead of DNS Security action.
Alternatively, add DNS domain exceptions to the DNS Domain/FQDN
Allow List located in the DNS Exceptions tab
in your Anti-Spyware Profile. |
PAN-174784 | Up to 100,000 daily summary logs can be processed
for Scheduled and Run Now custom reports (MonitorManage Custom Reports) when
configured for the last calendar day. This can result in the generated report
not displaying all relevant log data generated in the last calendar
day. |
PAN-174442 | When a Certificate Profile (Device > Certificate
Management > Certificate Profile) is configured to Block
session if certificate status cannot be retrieved within timeout,
the firewall allows client certificate validation to go through even
if the CRL Distribution Point or OCSP Responder is unreachable. Workaround: You
must also enable Block session if certificate status is unknown to
ensure Block session if certificate status cannot be retrieved
within timeout is effective. |
PAN-174038 | In an SD-WAN configuration, when a GlobalProtect Gateway
is terminated on a loopback interface, if the tunnel protocol is
udp-encapsulated ESP (IPSec), the return traffic from the Gateway
toward the client is load-balanced across all of the SD-WAN member interfaces
and cannot be subjected to an SD-WAN policy. |
PAN-172401 | The PA-400 Series data port drops traffic
when the local link speed is forced to 10Mbs/100Mbs while the remote
peer link speed is set to autonegotiate. |
PAN-172383 | When the App-ID Cloud Engine (ACE) is enabled
on Panorama and you downgrade from PAN-OS 10.1 to PAN-OS 10.0, it
takes a longer time than expected for the software installation
to complete. The amount of time depends on the size of the ACE configuration
(how many ACE App-IDs are used in Security policy, either directly
or through an Application Filter or an Application Group). The
extra time is required to check for cloud application references,
including processing time to check references for applications,
application containers, application types, and application tags
across the entire configuration. It also takes extra time to check
for redundancy between predefined (content-provided) and cloud applications,
and after all checks are complete, to produce a list of ACE applications
that you must remove from Security policy before the downgrade can succeed. |
PAN-172302 | (PAN-OS 10.1.0 and 10.1.1) The
PA-400 Series management port link goes down when a remote peer
link speed is set to Auto OFF or forced to 100Mbs. |
PAN-171283 | When you run the App-ID Cloud Engine (ACE) service
on firewalls in an HA cluster, after a cluster failover, the sessions
based on ACE App-IDs move to the failover firewall. However, as
with other applications, on failover some session information is
not retained. For ACE App-IDs, the operational command admin@pan-os-fw> show session id <session> shows
the application as being 0 instead
of showing the name of the application. This does not affect Security
policy enforcement after the failover. |
PAN-171057 | PoliciesSecurityPolicy OptimizerNew App Viewer displays rules
that do not have new applications if the functional applications are
in an app container. For example, a Security policy allow
rule includes an app container for the “exampleapp” application.
The firewall sees the functional application “exampleapp-post” for
the first time. Because the allow rule includes the new app’s container,
the firewall should not see it as a new application. However, the New
App Viewer shows the rule as having seen a new application
even though the app container includes it in the rule. |
PAN-168234 | The Cisco TrustSec, Zero Touch Provisioning
(ZTP), and Enterprise Data Loss Prevention (DLP) plugins are not
supported on a Panorama™ management server in FIPS-CC mode and cause
a commit failure if installed on Panorama in FIPS-CC mode. |
PAN-167996 | When the firewall downloads App-IDs from
the App-ID Cloud Engine, if the App-ID of a cloud-delivered application
is the same as a the App-ID of a custom application that already
exists on the firewall, the commit fails. (Two applications cannot
have the same App-ID.) Workaround: Rename the custom application
to remove the conflict with the cloud-delivered App-ID, or if the
custom application and cloud-delivered application are the same
application, you can delete the custom application and use the cloud-delivered application. |
PAN-167335 | Only packets within the first client-to-server HTTP/1.0
and HTTP/1.1 transaction header sections are matched against cloud-based
App-ID signatures. This means that after the first transaction,
functional apps are identified as base applications. |
PAN-165116 | When you Commit changes
on the firewall, if you configure a Security policy rule with an
application that has application dependencies (the application depends
on other applications to work) and you did not add the application
dependencies to the rule, a warning appears that shows the application dependencies
to add to the rule. For example, if you configure a rule with the
“google-surveys-base” application but do not add the application
dependency “google-base” to the rule, the commit warning appears. For
App-ID Cloud Engine (ACE) applications, the application dependency
warning only appears if you add the ACE application to the rule
directly or using an Application Group. If you add ACE applications
to the rule using an Application Filter, then commit actions don’t warn
you if application dependencies are missing. |
PAN-159293 | Certification Revocation List (CRL) in
Distinguished Encoding Rules (DER) format may erroneously return
errors for VM-Series firewalls despite being able to successfully
pull the CRL to verify that the syslog server certificate is still
valid. |
PAN-152433 | When you have an active/passive HA pair
of PA-3200 Series firewalls running PAN-OS 10.0.0 with NAT configured,
if you upgrade one firewall to PAN-OS 10.0.1, the firewall goes
to non-functional state due to a NAT oversubscription mismatch between
the HA peers. The same non-functional state results if both HA peers
are running PAN-OS 10.0.1 and you downgrade one to PAN-OS 10.00.
The upgraded or downgraded firewall goes to non-functional state
because PAN-OS 10.0.0 and 10.0.1 have different default NAT oversubscription rates. Workaround:
After an upgrade or downgrade, modify the NAT oversubscription rate
on one firewall so that the rates on the HA pair match. |
PAN-146573 | PA-7000 Series firewalls configured with
a large number of interfaces experience impacted performance and
possible timeouts when performing SNMP queries. |
PAN-121678 | (PA-7000b Series only) The following error
during secure boot has no impact and can be ignored: [ 0.672461] Device 'efifb.0' does not have a release() function, it is broken and must be fixed.[ 2.026107] EFI: Problem loading in-kernel X.509 certificate (-65)Maintenance Mode filesystem size: 2.0G |
PAN-106675 | After upgrading the Panorama management
server to PAN-OS 8.1 or a later release, predefined reports do not
display a list of top attackers. Workaround: Create
new threat summary reports (MonitorPDF ReportsManage PDF Summary) containing
the top attackers to mimic the predefined reports. |
PAN-99845 | After an HA firewall fails
over to its HA peer, sessions established before the failover might
not undergo the following actions in a reliable manner:
|
PAN-41558 | When you use a firewall loopback interface
as a GlobalProtect gateway interface, traffic is not routed correctly
for third-party IPSec clients, such as strongSwan. Workaround: Use
a physical firewall interface instead of a loopback firewall interface
as the GlobalProtect gateway interface for third-party IPSec clients.
Alternatively, configure the loopback interface that is used as
the GlobalProtect gateway to be in the same zone as the physical
ingress interface for third-party IPSec traffic. |