PAN-OS 11.2.5 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- Cloud Management of NGFWs
-
- Management Interfaces
-
- Launch the Web Interface
- Use the Administrator Login Activity Indicators to Detect Account Misuse
- Manage and Monitor Administrative Tasks
- Commit, Validate, and Preview Firewall Configuration Changes
- Commit Selective Configuration Changes
- Export Configuration Table Data
- Use Global Find to Search the Firewall or Panorama Management Server
- Manage Locks for Restricting Configuration Changes
-
-
- Define Access to the Web Interface Tabs
- Provide Granular Access to the Monitor Tab
- Provide Granular Access to the Policy Tab
- Provide Granular Access to the Objects Tab
- Provide Granular Access to the Network Tab
- Provide Granular Access to the Device Tab
- Define User Privacy Settings in the Admin Role Profile
- Restrict Administrator Access to Commit and Validate Functions
- Provide Granular Access to Global Settings
- Provide Granular Access to the Panorama Tab
- Provide Granular Access to Operations Settings
- Panorama Web Interface Access Privileges
-
- Reset the Firewall to Factory Default Settings
-
- Plan Your Authentication Deployment
- Pre-Logon for SAML Authentication
- Configure SAML Authentication
- Configure Kerberos Single Sign-On
- Configure Kerberos Server Authentication
- Configure TACACS+ Authentication
- Configure TACACS Accounting
- Configure RADIUS Authentication
- Configure LDAP Authentication
- Configure Local Database Authentication
- Configure an Authentication Profile and Sequence
- Test Authentication Server Connectivity
- Troubleshoot Authentication Issues
-
- Keys and Certificates
- Default Trusted Certificate Authorities (CAs)
- Certificate Deployment
- Configure the Master Key
- Export a Certificate and Private Key
- Configure a Certificate Profile
- Configure an SSL/TLS Service Profile
- Configure an SSH Service Profile
- Replace the Certificate for Inbound Management Traffic
- Configure the Key Size for SSL Forward Proxy Server Certificates
-
- HA Overview
-
- Prerequisites for Active/Active HA
- Configure Active/Active HA
-
- Use Case: Configure Active/Active HA with Route-Based Redundancy
- Use Case: Configure Active/Active HA with Floating IP Addresses
- Use Case: Configure Active/Active HA with ARP Load-Sharing
- Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall
- Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
- Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3
- HA Clustering Overview
- HA Clustering Best Practices and Provisioning
- Configure HA Clustering
- Refresh HA1 SSH Keys and Configure Key Options
- HA Firewall States
- Reference: HA Synchronization
-
- Use the Dashboard
- Monitor Applications and Threats
- Monitor Block List
-
- Report Types
- View Reports
- Configure the Expiration Period and Run Time for Reports
- Disable Predefined Reports
- Custom Reports
- Generate Custom Reports
- Generate the SaaS Application Usage Report
- Manage PDF Summary Reports
- Generate User/Group Activity Reports
- Manage Report Groups
- Schedule Reports for Email Delivery
- Manage Report Storage Capacity
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
-
- Configure Syslog Monitoring
-
- Traffic Log Fields
- Threat Log Fields
- URL Filtering Log Fields
- Data Filtering Log Fields
- HIP Match Log Fields
- GlobalProtect Log Fields
- IP-Tag Log Fields
- User-ID Log Fields
- Decryption Log Fields
- Tunnel Inspection Log Fields
- SCTP Log Fields
- Authentication Log Fields
- Config Log Fields
- System Log Fields
- Correlated Events Log Fields
- GTP Log Fields
- Audit Log Fields
- Syslog Severity
- Custom Log/Event Format
- Escape Sequences
- Forward Logs to an HTTP/S Destination
- Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
- Monitor Transceivers
-
- User-ID Overview
- Enable User-ID
- Map Users to Groups
- Enable User- and Group-Based Policy
- Enable Policy for Users with Multiple Accounts
- Verify the User-ID Configuration
-
- App-ID Overview
- App-ID and HTTP/2 Inspection
- Manage Custom or Unknown Applications
- Safely Enable Applications on Default Ports
- Applications with Implicit Support
-
- Prepare to Deploy App-ID Cloud Engine
- Enable or Disable the App-ID Cloud Engine
- App-ID Cloud Engine Processing and Policy Usage
- New App Viewer (Policy Optimizer)
- Add Apps to an Application Filter with Policy Optimizer
- Add Apps to an Application Group with Policy Optimizer
- Add Apps Directly to a Rule with Policy Optimizer
- Replace an RMA Firewall (ACE)
- Impact of License Expiration or Disabling ACE
- Commit Failure Due to Cloud Content Rollback
- Troubleshoot App-ID Cloud Engine
- Application Level Gateways
- Disable the SIP Application-level Gateway (ALG)
- Maintain Custom Timeouts for Data Center Applications
-
- Decryption Overview
-
- Keys and Certificates for Decryption Policies
- SSL Forward Proxy
- SSL Forward Proxy Decryption Profile
- SSL Inbound Inspection
- SSL Inbound Inspection Decryption Profile
- SSL Protocol Settings Decryption Profile
- SSH Proxy
- SSH Proxy Decryption Profile
- Profile for No Decryption
- SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
- Perfect Forward Secrecy (PFS) Support for SSL Decryption
- SSL Decryption and Subject Alternative Names (SANs)
- TLSv1.3 Decryption
- High Availability Not Supported for Decrypted Sessions
- Decryption Mirroring
- Configure SSL Forward Proxy
- Configure SSL Inbound Inspection
- Configure SSH Proxy
- Configure Server Certificate Verification for Undecrypted Traffic
- Post-Quantum Cryptography Detection and Control
- Enable Users to Opt Out of SSL Decryption
- Temporarily Disable SSL Decryption
- Configure Decryption Port Mirroring
- Verify Decryption
- Activate Free Licenses for Decryption Features
-
- Policy Types
- Policy Objects
- Track Rules Within a Rulebase
- Enforce Policy Rule Description, Tag, and Audit Comment
- Move or Clone a Policy Rule or Object to a Different Virtual System
-
- External Dynamic List
- Built-in External Dynamic Lists
- Configure the Firewall to Access an External Dynamic List
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Exclude Entries from an External Dynamic List
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Register IP Addresses and Tags Dynamically
- Use Dynamic User Groups in Policy
- Use Auto-Tagging to Automate Security Actions
- CLI Commands for Dynamic IP Addresses and Tags
- Application Override Policy
- Test Policy Rules
-
- Network Segmentation Using Zones
- How Do Zones Protect the Network?
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
PAN-OS 11.2
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
PAN-OS 11.2.5 Addressed Issues
PAN-OSĀ® 11.2.5 addressed issues.
Issue ID | Description |
---|---|
PAN-274029 | Fixed an issue where upgrading Panorama and pushing configurations to the firewall caused an IKE version mismatch, which resulted in IPSec tunnel failure with the peer device.
|
PAN-273215 | Fixed an issue where a syntax error in the index generation script caused a high management plane CPU load after upgrading.
|
PAN-273197 | Fixed an issue where the endpoint ID was not populated in logs when the least significant word of the Geneve header was 0.
|
PAN-272085
|
Fixed an issue where the firewall might crash and reboot when DoH is
enabled for DNS Security and multiple DoH transactions are sent in a
single HTTP/1 connection.
|
PAN-271913 | Fixed an issue on firewalls in HA configurations where, when using the Cloud Identity Engine (CIE), the firewall experienced consistent memory leaks on the active firewall, which caused unexpected failovers.
|
PAN-271613 | Fixed an issue where configuration pushes from Panorama to the firewall failed due to an OOXML commit error.
|
PAN-270569 | Fixed an issue where the userid process stopped responding due to memory was being reset to NULL when it was freed.
|
PAN-270549 | Fixed an issue where early TLS data was not handled correctly by the accumulation proxy.
|
PAN-270224 | Fixed an issue where indices were not opened after a query.
|
PAN-269899 | Fixed an issue where the Panorama web interface was slower than expected when querying for device tags.
|
PAN-269673 | Fixed an issue where ElasticSearch was not set up after an upgrade.
|
PAN-269539 | Fixed an issue where whitespace was added before the timestamp in syslog logs forwarded from Panorama.
|
PAN-269499 | Fixed an issue where the firewall stopped responding when receiving a high number of logs.
|
PAN-269106 |
Fixed an issue where the wifclient might
crash during server cert verification for MICA gRPC connections and
cause the dataplane to restart when using a cloud-based ML detection
engine (MICA). On certain platforms, this caused the firewall to
reboot periodically.
|
PAN-269000 | Fixed an issue where the firewall stopped responding due to a NULL pointer dereference when path monitoring failed.
|
PAN-268972 | Fixed an issue where Panorama was slower than expected when using a high number of device group tags in a non-shared context.
|
PAN-268909 | Fixed an issue where IP address tags were removed from firewalls after a management server or userid process restart. This occurred when a Panorama serial-number based configuration was used for User-ID redistribution.
|
PAN-268815
|
Fixed an issue that caused the firewall to reboot due to the
wifclient exiting multiple times
when using IoT Security.
|
PAN-268727 | Fixed an issue where traffic was dropped when the accumulation proxy was enabled and header insertion modified packets.
|
PAN-268501 | Fixed an issue where the firewall was unable to generate a TSF file due to a full root partition.
|
PAN-268474 | Fixed an issue on the firewall where the PAN-DB URL Filtering license displayed as Valid even when the firewall did not have the license, which caused traffic to drop.
|
PAN-268419 | Fixed an issue where Managed Devices > Summary displayed incorrect subcolumns.
|
PAN-268229 | Fixed an issue where the firewall stopped responding during session setup for ECMP hit-count updates.
|
PAN-268228 | Fixed an issue where Panorama administrators were unable to select Edit Selection when pushing changes to devices if they logged in using TACACS authentication.
|
PAN-268118 | Fixed an issue on firewalls in active/passive HA configurations where, after a failover, irrelevant routing FIB entries were seen in the routing table on the newly active firewall.
|
PAN-268002 | Fixed an issue where URL filtering response pages were not displayed for sites that were blocked as a result of SSL/TLS handshake inspection.
|
PAN-267934 | Fixed an issue where commits remained at 98%, which resulted in the BGP connection flapping.
|
PAN-267707 | Fixed an issue where BFD sessions did not come up even when BGP peering was established.
|
PAN-267660 | Fixed an issue where UserID stopped working when the show object registered user CLI command was used with start-point and limit options.
|
PAN-267535 | |
PAN-267285 | Fixed an issue where a port was able to be connected from outside the network. With this fix, the port is restricted to the local interface.
|
PAN-267091 | Fixed an issue on Panorama where Elasticsearch repeatedly restarted.
|
PAN-267001 | Fixed an issue where multicast streams were unstable with ECMP and dropped every 30 seconds.
|
PAN-266900 | Fixed an issue on the Panorama web interface where you were unable to click OK after selecting an install package type and file from the dropdown and selecting a firewall.
|
PAN-266704 | Fixed an issue where filtering BGP routes by peer name in Advanced Routing Engine (ARE) did not display the correct routes.
|
PAN-266695 | Fixed an issue on Panorama where a cyclic nested address group configuration caused the configd process to stop responding after a commit.
|
PAN-266653 | Fixed an issue where unexpected path monitor failures caused the firewall to stop responding.
|
PAN-266639 | Fixed an issue where administrators were unable to edit or add virtual router configurations when a filter was applied to the viewer.
|
PAN-266391 | Fixed an issue where the number of hints values were not updated even when there were no hint files on the system.
|
PAN-266354 | Fixed an issue where Hybrid-SWG explicit proxy connections failed when the number of destination domains exceeded 1024.
|
PAN-266312 | Fixed an issue where BFD sessions took longer than expected to establish after an HA failover due to BGP.
|
PAN-266167 | Fixed an issue where the restart option for IPSec tunnels was greyed out (Network > IPSec Tunnels > IKE Info).
|
PAN-266003 | Fixed an issue on the firewall where a configuration policy push caused both active and passive firewalls to go down when a high number of spyware profiles and vulnerability profiles were pushed to the dataplane.
|
PAN-265973 | Fixed an issue where administrator sessions were logged out with an ERR_CONNECTION_REFUSED error on the browser.
|
PAN-265963 | Fixed an issue where the escd process caused a memory leak when session resiliency was enabled on the firewall.
|
PAN-265931 | Fixed an issue where some URLs were not blocked when added to the URL Category.
|
PAN-265742 | Fixed an issue on the Panorama web interface where the OK button on the GlobalProtect gateway configuration dialog box was not clickable.
|
PAN-265621 | Fixed an issue where the restart option for IPSec tunnels was greyed out when you attempted to restart the tunnel from Network > IPSec Tunnels > IKE Info.
|
PAN-265462 | Fixed an issue where you were unable to download PDFs when connected via a Clientless VPN.
|
PAN-265434 | Fixed an issue where the flow process restarted with the error message SIGABRT __GI_raise __GI_abort __libc_message malloc_printer.
|
PAN-265399 | Fixed an issue where DNS queries for uppercase internal domain (SRV record) timed out when DNS Security was enabled.
|
PAN-265349 | Fixed an issue where multiple segments of HTTP proxy connect messages were not handled correctly by proxy.
|
PAN-265344 | Fixed an issue where Import GlobalProtect Client Package did not work after clicking OK after selecting a valid package under Device > GlobalProtect Client > Upload).
|
PAN-265179 | Fixed an issue where a kernel race condition caused the firewall to reboot with a kernel panic.
|
PAN-265160 | Fixed an issue where the firewall created multiple connections to a syslog server and remained in the FINWAIT1 state, which caused logs to drop while being forwarded to the syslog server.
|
PAN-264981 | Fixed an issue on the Panorama web interface where it took longer than expected to edit Security policy rules.
|
PAN-264871 | Fixed an issue on Panorama where the configd process stopped responding when viewing IP addresses on dynamic address groups with a large number of IP addresses.
|
PAN-264806 | (PA-3440 firewalls only) Fixed an issue where the firewall was unable to validate or commit a configuration when it was imported from another firewall model.
|
PAN-264794 | Fixed an issue where OSPF adjacencies failed to come up when using a subinterface ID with more than 3 digits on Ethernet ports 1/10 and higher.
|
PAN-264680 | (PA-220 firewalls only) Fixed an issue where Device > Setup was not displayed on the web interface.
|
PAN-264678 | Fixed an issue where Preview Changes did not display configuration changes in Commit and push > Push Scope.
|
PAN-264662 | Fixed an issue where HTTP POST requests were blocked for URLs that had the block-continue category configured.
|
PAN-264289 | Fixed an issue where the CLI and XML API values for the show system environment command did not match.
|
PAN-264169 | (PA-5400 Series firewalls only) Fixed an issue where the firewall sent correlated event logs to the syslog server using the management interface instead of the log interface.
|
PAN-263987 | Fixed an issue on the firewall where, when a NAT transversal IPSec tunnel was terminated, and the NAT rule that was applied to the NAT-T IPSec tunnel was on the same firewall, traffic flowing through the tunnel was not correctly translated.
|
PAN-263973 | Fixed an issue where log collectors had a low incoming log rate.
|
PAN-263956 | (PA-440 firewalls only) Fixed an issue where a firewall running PAN-OS 11.1.2-h3 only displayed the Auto option for the interface duplex setting.
|
PAN-263843 | (VM-Series firewalls only) Fixed an issue where the firewall received no-license packet buffers instead of memory based packet buffer numbers.
|
PAN-263749 | Fixed an issue where disk space that was used by file descriptors was not freed, which caused the root partition to become full and Panorama to be inaccessible.
|
PAN-263505 | (PA-850 firewalls only) Fixed an issue where the firewall stopped responding and rebooted after upgrading to PAN-OS 11.1.4.
|
PAN-263369 | Fixed an issue where commits from Panorama to Panorama virtual appliances failed with the error message Internal error during commit processing. Commit/Validate failed after upgrading Panorama.
|
PAN-263291 | Fixed an issue where Microsoft Outlook did not work as expected when the GlobalProtect clientless VPN was configured.
|
PAN-263278 | Fixed an issue where the management interface flapped when IPv6 was disabled and DHCPv6 was enabled.
|
PAN-263208 | (PA-5440 and PA-5445 firewalls only) Fixed an issue where interrupts were generated at a
certain packet rate, and dataplane processes missed heartbeats,
which caused the dataplane to go down.
|
PAN-263164 | Fixed an issue where Netflow User ID information was truncated to 31 characters.
|
PAN-263086 | (PA-455 firewalls in HA configurations only) Fixed an issue where the HA LED light on the front panel did not turn on even when HA was enabled.
|
PAN-263012 | Fixed an issue where commits failed from a Panorama appliance with a default master key to a firewall with a master key configured and a VM Information source configured.
|
PAN-262973 | Fixed an issue where changes made by a custom role Panorama administrator did not display in the push scope for other custom role administrators when a full commit was performed.
|
PAN-262902 | Fixed an issue on the web interface where cloning region objects did not work.
|
PAN-262511 | Fixed an issue on firewalls in HA configurations where OSPF neighbors were not established after an HA failover.
|
PAN-262415 | Fixed an issue where a partial configuration load failed for configuration files that contained regenerate-hostkeys.
|
PAN-261997 | Fixed an issue where the firewall displayed incorrect statistics for mac_transmit_err and send_deffered on PA-440 appliances running PAN-OS 10.1.9-h3.
|
PAN-261909 | Fixed an issue where the GlobalProtect client did not display the dialog box for an MFA verification code.
|
PAN-261831 | (Firewalls in HA configuration only) Fixed an issue where link-down events did not occur after an HA failover.
|
PAN-261673 | (VM-Series firewalls on Microsoft Azure environments only) Fixed an issue where, when Accelerated Networking was enabled, traffic was dropped because of the 'flow_parse_ip_hdr' counter related to an Nvidia driver issue.
|
PAN-261671 | Fixed an issue where GlobalProtect clients randomly fell back to the SSL tunnel as the gateway dropped the initial three keepalive packets.
|
PAN-261639 | Fixed an issue where the firewall incorrectly logged the XFF IP in threat logs when a single HTTP header was used.
|
PAN-261570 | (Firewalls in active/active HA configurations only) Fixed an issue where packet loss occurred when dataport was used for HA3 for asymmetrically routed traffic during commits and a virtual wire was configured .
|
PAN-261485 | Fixed an issue where the firewall dropped the Real Time Transport Protocol (RTP) session for the second SIP call on Persistent-DIPP connections when the source port of the client device was reset.
|
PAN-261484 | Fixed an issue on the firewall where DPDK allocated twice the amount of memory as requested for pre-allocation.
|
PAN-261371 | (PA-5410 firewalls in active/passive HA configurations only) Fixed an issue where the reportd process restarted, which caused the firewall to reboot.
|
PAN-261209 | (Firewalls in active/active HA configuration only) Fixed an issue where the firewall displayed the HA2 status as down when the HSCI port was used for both HA2 and HA3.
|
PAN-261174 | Fixed an issue on Panorama where importing a certificate for a template stack configuration incorrectly prompted for a passphrase as a required field.
|
PAN-261028 | Fixed an issue where the firewall did not autocommit after a reboot when the cellular interface was configured as a local interface for the IPSec Satellite and the IP address was allocated dynamically.
|
PAN-261001 | Fixed an issue where GlobalProtect users were unable to switch gateways after upgrading to GlobalProtect version 6.2.3.
|
PAN-260842 | A CLI command was introduced to address an issue where TCP packets were out of order.
|
PAN-260796 | Fixed an issue where servers were not accessible through an active SSL GlobalProtect VPN tunnel until a new connection was established or the session was cleared on the firewall.
|
PAN-260738 | Fixed an issue on the Panorama web interface where the progress bar did not complete when importing a vulnerability profile configuration through an XML file.
|
PAN-260633 | Fixed an issue where the firewall did not send a client certificate after a TLS Certificate Request when establishing a secure syslog connection.
|
PAN-260604 | Fixed an issue where the firewall displayed inaccurate throughput utilization stats in NetFlow analyzer tools.
|
PAN-260564 | Fixed an issue on firewalls in HA configurations where a network loop was detected by switches after suspending HA on the active firewall.
|
PAN-260549 | Fixed an issue where the management plane CPU usage was not calculated correctly on firewalls with integrated an dataplane and management plane.
|
PAN-260546 | (PA-440 firewalls only) Fixed an issue where the system clock reset to the epoch date and time after 8 to 12 weeks of shelf life or no power.
|
PAN-260417 | Fixed an issue on Panorama where UpdateLicDB was triggered every few minutes when firewalls with PAYG licenses were onboarded.
|
PAN-260358 | Fixed an issue where the firewall did not include the NAS-ID and NAS-IP attributes in the RADIUS Access-Request message when using PEAP-MSCHAPv2 authentication.
|
PAN-260290 | Fixed an issue for fixed model licenses to support new content size requirements by reducing the total sessions supported to be equivalent to their flex memory counterpart
|
PAN-260279 | Fixed an issue where selective push operations failed with the error message: Failed to generate selective push configuration. Schema validation failed. Please try a full push.
|
PAN-260218 | Fixed an issue where BGP Aggregate Advertise filters did not work as expected when the summary option was enabled, and only summarized routes were advertised.
|
PAN-260193 | Fixed an issue where GlobalProtect on macOS clients did not connect when using a client certificate and the X.509 policy was set to Use System Default.
|
PAN-260149 | Fixed an issue where the management plane DNS cache size was lower than expected.
|
PAN-260132 | Fixed an issue where secondary IP addresses with a /32 prefix configured on Layer 3 interfaces were not reachable in FRR mode.
|
PAN-260131 | Fixed an issue where the firewall consumed a large amount of memory when forwarding raw logs.
|
PAN-260114 | Fixed an issue where the firewall generated a devsrvr core file when processes were restarted.
|
PAN-259883 | Fixed an issue where the firewalls behind an Amazon Web Services (AWS) Gateway Load Balancer (GWLB) stopped responding when processing GENEVE packets with the reserved bit set.
|
PAN-259881 | Fixed an issue on Panorama where traffic log details were not displayed under detailed log view.
|
PAN-259870 | (PA-7000b firewalls only) Fixed an issue where Luna Network Hardware Security Modules (HSM) did not work after an upgrade or downgrade.
|
PAN-259802 | (Panorama appliances in HA clusters only) Fixed an issue where, after replacing a secondary Panorama appliance in a Panorama HA cluster, the ElasticSearch cluster was unable to establish SSL tunnels due to SSLHandshakeException errors.
|
PAN-259706 | Fixed an issue on Panorama where the web interface was slower than expected or unresponsive when monitoring definitions were added in the Kubernetes plugin.
|
PAN-259200 | Fixed an issue where the firewall displayed truncated zone names in the Block IP List log when a zone name contained more than 14 characters.
|
PAN-259078 | Fixed an issue where WildFire Analysis reports were not generated and the following error message was displayed: Error 500: Internal Server Error.
|
PAN-258996 | Fixed an issue where the firewall displayed the SFP ports as PowerDown when the SFP transceiver was removed and reinserted or the port was shut down and brought back up on the peer device.
|
PAN-258757 | Fixed an issue on Panorama where upgrades failed with validation errors.
|
PAN-258736 | Fixed an issue where policy rule configurations pushed from Panorama were not reflected on the firewall if the rule had 63 characters.
|
PAN-258734 | Fixed an issue where virtual wire ports did not go down when moving from an active state to a suspended state.
|
PAN-258576 | Fixed an issue on the Panorama web interface where products in HIP objects were not displayed correctly.
|
PAN-258570
|
Fixed an issue where the firewall might reboot unexpectedly due to
the varrcvr process progressively using more memory
when WildFire file forwarding is handling PE files.
|
PAN-258240 | (Firewalls in HA configurations only) Fixed an issue where HA path monitoring did not work as expected when using vwire.
|
PAN-258225 | Fixed an issue on the Panorama web interface where Security policy rules loaded more slowly than expected.
|
PAN-258188 | Fixed an issue on Panorama Template where the virtual wire subinterface page did not display all fields and the OK button did not work.
|
PAN-258149 | Fixed an issue where the firewall dropped the SYN-ACK when using the TCP Fast Open option.
|
PAN-257961 | Fixed an issue on Panorama where Test Security Policy Match failed when the From or To zone fields were populated.
|
PAN-257912 | Fixed an issue where the firewall stopped responding when it received RADIUS traffic and user equipment (UE) traffic at the same time on a Network Processing Card (NPC)
|
PAN-257660 | Fixed an issue where show commands were hidden for superusers in read-only roles.
|
PAN-257600 | Fixed an issue where the firewall returned a 404 error for all sites accessed through the clientless VPN portal.
|
PAN-257267 | (VM-Series firewalls only) Fixed an issue where observed warning message during commit completion & critical system log when configuration size exceeded the maximum recommended configuration size.
|
PAN-257117 | Fixed an issue where CSV or PDF exports of zones did not contain all zones.
|
PAN-257028 | (Firewalls in active/passive HA configurations only) Fixed an issue where firewalls entered a non-functional state and displayed the error message Dataplane down: path monitor failure during the fail-over.
|
PAN-257021 | "Fixed an issue on the web interface where Match Evidence log details for Monitor > Correlated events did not populate."
|
PAN-256960 | Fixed an issue where a custom portal login page was not displayed correctly in the GlobalProtect portal when using a customized portal landing page.
|
PAN-256725 | Fixed an issue on the Panorama interface where Traffic and Unified event details loaded more slowly than expected.
|
PAN-256669 | Fixed an issue where the memory usage reported by SNMP did not match the memory usage reported by the top command.
|
PAN-256518 | Fixed an issue where Panorama was unable to push firmware updates to a VM-Series firewall with a PAYG license.
|
PAN-256449 | Fixed an issue where DHCPv6 relay was not working in Advanced Routing mode when the firewall was configured as a DHCP relay agent.
|
PAN-256350 | Fixed an issue where, when you cloned an admin role or an LDAP server profile and then changed the name of the clone, the configuration change was not reflected on the managed firewall after pushing the configuration from Panorama.
|
PAN-256320 | (Firewalls in active/passive HA configurations only) Fixed an issue where GTP sessions remained as allocated sessions on the passive firewall even when there were no active sessions.
|
PAN-256115 | Fixed an issue where, after replacing a Panorama appliance or log collector, the secondary Panorama appliance or log collector displayed a disconnected status for the inter-log collector connection.
|
PAN-255930 | Fixed an issue where persistent DIPP NAT entries were deleted even when being used during an active session.
|
PAN-255915 | Fixed an issue where a memory leak in the sslmgr process caused the firewall to restart.
|
PAN-255747 | Fixed an issue on the firewall where CLI commands returned Server error: op command for client dagger timed out as client is not available.
|
PAN-255360 | Fixed an issue where the firewall booted into maintenance mode when there was no connectivity to the specified hardware security module (HSM).
|
PAN-254901 | Fixed an issue where GlobalProtect user-to-IP address mapping was removed even though the tunnel for the specific user was up and traffic was being passed.
|
PAN-254797 | (PA-5400 Series firewalls only) Fixed an issue where you were unable to use SNMP polling o monitor the status of power supply units.
|
PAN-254794 | Fixed an issue where the Panorama management server stopped responding.
|
PAN-254671 | Fixed an issue where excessive Timed out while getting config lock error messages were generated when making bulk changes via XML API.
|
PAN-254301 | Fixed an issue where GlobalProtect logs showed the public IPv4 address in the private IPv4 address field for logs generated during portal/gateway negotiation.
|
PAN-254124 | (PA-7050 firewalls with DPC and 100G NPCs only) Fixed an issue on the firewall where you were unable to change the flow key type from tag to tuple.
|
PAN-253626 | Fixed an issue on Panorama where unused objects were pushed to the firewall, which caused the push operations to intermittently fail.
|
PAN-253584 | Fixed an issue where ikemgr process unexpectedly stopped due to a memory mapping in an incorrect location.
|
PAN-253485 | (Firewalls in active/passive HA configurations only) Fixed an issue where dataplane packet capture filter configuration failed on the active firewall with the error op command for client dagger timed out as client is not available.
|
PAN-252816 | Fixed an issue where multiple SSHD process restarts triggered a firewall reboot when the login banner and SSH host keys were updated at the same time.
|
PAN-252801 | Fixed an issue where the LSVPN tunnel monitoring status displayed as No data available after re-key events.
|
PAN-252604 | Fixed an issue where the clientless VPN did not carry authentication to other tabs.
|
PAN-252370 | Fixed an issue where services with the reserved keyword application-default were allowed.
|
PAN-252300 | Fixed an issue where you were unable to select device groups in the push scope for user accounts.
|
PAN-252270 | Fixed an issue on the firewall where changes were incorrectly applied after a reboot or a restart of the configd process.
|
PAN-252224 | Fixed an issue where Panorama did not forward logs to a syslog server over an SSL connection using CRL as a revocation verification method.
|
PAN-252036 | Fixed an issue where, when the GlobalProtect portal was not configured, accessing the GlobalProtect gateway still loaded a portal malformed page.
|
PAN-252029 | Fixed an issue where the firewall stopped responding when processing authentication requests.
|
PAN-251484 | Fixed an issue where the firewall web interface displayed incorrect PPPoE configuration options under the subinterface of an Aggregate Ethernet interface.
|
PAN-250928 | (PA-5450 firewalls in active/active HA configurations only) Fixed an issue where firewall traffic was silently dropped when sent to the peer owner.
|
PAN-250703 | Fixed an issue where the task manager failed with a 504 error when a large number of previous jobs or tasks were present.
|
PAN-250443 | (VM-Series firewalls only) Fixed an issue where multiple processes exited due to an OOM condition and caused a network outage.
|
PAN-249581 | Fixed an issue where stale BGP routes were advertised to peers even when they were not present in the local RIB table.
|
PAN-249533 | Fixed an issue where an internal error message was displayed when you selected Exclude video traffic from the tunnel (Windows and macOS only).
|
PAN-249384 | Fixed an issue on Panorama where configuration locks were observed during a partial rulebase commit.
|
PAN-249072 | Fixed an issue where content upgrade installation failed with the error Error: can't find cert <cert> when using cloud interfaces.
|
PAN-247052 | Fixed an intermittent issue where the OSPF ABR option was disabled when a static route was added.
|
PAN-246567 | Fixed an issue where a firewall with a copper SFP transceiver (PAN-SFP-CG) flapped during a commit.
|
PAN-246304 | Fixed an issue on Panorama where commits failed due to a timeout in the sysd process during decryption.
|
PAN-245545 | Fixed an issue where, when you were connected to the VPN and enabled the client accelerator, you were disconnected from the VPN.
|
PAN-245058 | Fixed an issue on the Panorama web interface where tagging a new user failed the error message Tags addition failed.
|
PAN-244743 | Fixed an issue where intermittent 500 errors occurred when making API calls to the firewall.
|
PAN-244708 | Fixed an issue where the GlobalProtect VPN connection inactivity TTL value became negative, which caused the VPN to disconnect when the system time was changed back to the past time.
|
PAN-244039 | (PA-5450 firewalls only) Fixed an issue where the firewall dropped packets when attempting to reuse a TCP session.
|
PAN-243786 | Fixed an issue on Panorama where custom GlobalProtect reports displayed inaccurate values.
|
PAN-242991 | Fixed an issue where the web interface stopped responding when you searched for members in an address group that contained more than 500 members.
|
PAN-242957 | Fixed an issue where the Rule usage columns of overridden default policy rules on the Security policy page stopped responding.
|
PAN-242602 | Fixed an issue where GlobalProtect clients experienced slow SMB-V3 download throughput when passing through a Prisma IPSec tunnel and the firewall and the SMB-V3 session owner dataplane was the same as the IPSec-ESP tunnel on the multi-dataplane firewall.
|
PAN-238793 | (Panorama virtual appliances in Microsoft Azure environments only) Fixed an issue where a bootstrapped Panorama appliance did not automatically retrieve the CDL license, which resulted in the firewall not automatically sending logs to CDL.
|
PAN-238741 | Fixed an issue where, after a selective push of the configuration, a parent device group object with multiple child device groups was not shown in the device group's push scope.
|
PAN-221096 | Fixed an issue where IPSec transport mode failed when the firewall was the initiator.
|
PAN-216054 | Fixed an issue that caused the firewall's fan speed to increase while it was idle.
|
PAN-214430 | Fixed an issue where some commands did not have executable permissions.
|
PAN-212889 | Fixed an issue on Panorama where different threat names were used when querying a threat under Threat Monitor (Monitor > App Scope) and the ACC. This resulted in the ACC displaying no data after clicking a threat name in Threat Monitor and filtering it in the global filters.
|
PAN-199141 | Fixed an issue where renaming a device group and then performing a partial commit led to the device group hierarchy being incorrectly changed.
|
PAN-192176 | Fixed an issue where the management server access log file did not rotate, which caused the root partition to become full and led to system instability.
|
PAN-76904 | (PA-5410 firewalls only) Fixed an issue where the management interface went down and an error message displayed in the show interface management CLI command output.
|