Changes to Default Behavior in PAN-OS 10.2
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
Changes to Default Behavior in PAN-OS 10.2
What default behavior changes impact PAN-OS 10.2?
The following table details the changes
in default behavior upon upgrade to PAN-OSĀ® 10.2. You may also want
to review the Upgrade/Downgrade Considerations before upgrading
to this release.
Feature | Change |
---|---|
Managed Device Traffic to Panorama
|
PAN-OS 10.2 uses TLS version 1.3 to encrypt the service certificate
and handshake messages between Panorama, managed firewalls, and
Dedicated Log Collectors. As a result, the App-ID traffic between
Panorama, managed firewalls, and Dedicated Log Collectors is
reclassified from panorama to
ssl.
As a result, a Security policy rule is required to allow the
ssl application. This allows
Panorama, managed firewalls, and Dedicated Log Collectors to
continue communication after successful upgrade to PAN-OS 10.2.
Review the Ports Used for Panorama
for more information on the destination ports required for managed
device communication with Panorama.
|
Administrator Login | Usernames that contain all numbers are no longer
valid. For example, the username 12345678 does
not work. Usernames that include at least one alphabetical
or legal symbol character are valid, such as 1234_567, 1234a789_,
and c7897432. |
Masterd Rename | With PAN-OS 10.2 all instances of masterd
in the CLI were replaced with MD. |
Panorama Management of Multi-Vsys Firewalls | For multi-vsys firewalls managed
by a Panorama managed server, configuration objects in the Shared
device group are now pushed to a Panorama Shared configuration context
for all virtual systems rather than duplicating the shared configuration
to each virtual system to reduce the operational burden of scaling
configurations for multi-vsys firewalls.
As a result, you must delete or rename any locally configured
firewall Shared object that has an identical
name to an object in the Panorama Shared
configuration. Otherwise, configuration pushes from Panorama fail
after the upgrade and display the error
<object-name> is already in
use. The following configurations
cannot be added to the Shared Panorama location and are replicated to
the Panorama location of each vsys of a multi-vsys firewall.
|
Palo Alto Networks recommends that if a multi-vsys firewall is
managed by Panorama, then all vsys configurations should be managed
by Panorama.
This helps avoid commit failures on the
managed multi-vsys firewall and allows you to take advantage of
optimized shared object
pushes from Panorama.
| |
Certificates | On upgrade to PAN-OS 10.2, it is required that
all certificates meet the following minimum requirements:
See the PAN-OS Administrator's Guide or Panorama Administrator's Guide for
more information on regenerating or re-importing your certificates. |
Advanced Routing Engine | With Advanced Routing enabled, by default connected
peers prefer a link-local next-hop address over a global next-hop
address. |
Advanced Routing Engine and BFD | On a firewall with Advanced Routing enabled, BFD
session establishment for iBGP peers is changed. Any iBGP peers
over a loopback address are not considered to be directly connected
and therefore should enable the multihop option in the BFD profile
and specify Minimum Rx TTL accordingly. |
Auto Web Interface Refresh for XML API
PAN-OS 10.2.5 and later releases
| When making successful XML API calls on a firewall, the web interface will refresh after an interval of 10 seconds. |
Selective Push for Prisma Access (Panorama
Managed)
PAN-OS 10.2.2 and later releases | Pushing selective configuration
changes to Prisma Access in Panorama Managed Prisma
Access deployments is no longer supported. To push selective configuration
changes to Prisma Access:
|
Scheduled Log Export | Scheduled log exports (DeviceLog Export) may not export
logs as scheduled if multiple logs are scheduled to export at the
same time. Workaround: When scheduling your log exports,
maintain at least 6 hours between each scheduled log export. |
Test SCP Server Connection
PAN-OS 10.2.4 and later releases
|
To test the SCP server connection when you schedule a configuration
export (PanoramaSchedule Config Export) or log export (DeviceScheduled Log Export), a new pop-up window is displayed requiring you to
enter the SCP server clear textPassword and
Confirm Password to test the SCP server
connection and enable the secure transfer of data.
You must also enter the clear text SCP server
Password and Confirm
Password when you test the SCP server connection
from the firewall or Panorama
CLI.
|
Enterprise data loss prevention (DLP) Predefined Data Filtering
Profiles
|
After successful upgrade to PAN-OS 10.2.4 with Panorama plugin for
Enterprise DLP 3.0.4 or later release installed, the default
File Direction for predefined data
filtering profiles (ObjectsDLPData Filtering Profiles) is Both.
|
Authentication for SAML and client certificate
|
In PAN-OS 9.1 and earlier versions, if you configured client
certificate authentication, the firewall applied the policy rule
using the domain of the certificate.
In PAN-OS 10.2 and later versions, if you configure both SAML
authentication and client certificate authentication, the firewall
applies the policy rule using the SAML domain.
If you do not configure the SAML domain when using both SAML and
client certificate authentication, the firewall may not be able to
authenticate users successfully.
If the SAML username differs from the certificate username, delete
the username from the client certificate profile and commit the
changes; otherwise, authentication is not successful.
|
Domain Fronting Detection
PAN-OS 10.2.9-h8 and later releases
PAN-OS 10.2.11 and later releases
|
Domain Fronting Detection is a feature that was released in PAN-OS
10.2 that enabled detection of a TLS evasion technique that can
circumvent URL filtering database solutions and facilitate data
exfiltration, contained in HTTP request payloads using HTTP/1.x and
HTTP/2 protocols. Due to excessive false-positives generated by this
detection when inspecting HTTP/2 requests, the firewall no longer
generates threat logs alerts for HTTP/2 requests in PAN-OS 10.2.9h8
and later and PAN-OS 10.2.11 and later.
|
Default User-ID TLS Version | To improve security and reduce the risk of vulnerabilities, the default TLS version that the firewall uses is upgraded to TLS version 1.3 when you upgrade to PAN-OS 10.2 from a previous version. |
Name change for User-ID Application | The name of the application the firewall uses for User-ID changes from "paloalto-userid-agent" to "ssl" when you upgrade to PAN-OS 10.2 from a previous version. If you have any security policy rules to allow traffic for "paloalto-userid-agent" you must update them to allow traffic for "ssl" instead and commit the changes to the configuration. This change also applies to the traffic logs. |