PAN-OS 8.1.2 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- Cloud Management of NGFWs
-
- Management Interfaces
-
- Launch the Web Interface
- Use the Administrator Login Activity Indicators to Detect Account Misuse
- Manage and Monitor Administrative Tasks
- Commit, Validate, and Preview Firewall Configuration Changes
- Commit Selective Configuration Changes
- Export Configuration Table Data
- Use Global Find to Search the Firewall or Panorama Management Server
- Manage Locks for Restricting Configuration Changes
-
-
- Define Access to the Web Interface Tabs
- Provide Granular Access to the Monitor Tab
- Provide Granular Access to the Policy Tab
- Provide Granular Access to the Objects Tab
- Provide Granular Access to the Network Tab
- Provide Granular Access to the Device Tab
- Define User Privacy Settings in the Admin Role Profile
- Restrict Administrator Access to Commit and Validate Functions
- Provide Granular Access to Global Settings
- Provide Granular Access to the Panorama Tab
- Provide Granular Access to Operations Settings
- Panorama Web Interface Access Privileges
-
- Reset the Firewall to Factory Default Settings
-
- Plan Your Authentication Deployment
- Pre-Logon for SAML Authentication
- Configure SAML Authentication
- Configure Kerberos Single Sign-On
- Configure Kerberos Server Authentication
- Configure TACACS+ Authentication
- Configure TACACS Accounting
- Configure RADIUS Authentication
- Configure LDAP Authentication
- Configure Local Database Authentication
- Configure an Authentication Profile and Sequence
- Test Authentication Server Connectivity
- Troubleshoot Authentication Issues
-
- Keys and Certificates
- Default Trusted Certificate Authorities (CAs)
- Certificate Deployment
- Configure the Master Key
- Export a Certificate and Private Key
- Configure a Certificate Profile
- Configure an SSL/TLS Service Profile
- Configure an SSH Service Profile
- Replace the Certificate for Inbound Management Traffic
- Configure the Key Size for SSL Forward Proxy Server Certificates
-
- HA Overview
-
- Prerequisites for Active/Active HA
- Configure Active/Active HA
-
- Use Case: Configure Active/Active HA with Route-Based Redundancy
- Use Case: Configure Active/Active HA with Floating IP Addresses
- Use Case: Configure Active/Active HA with ARP Load-Sharing
- Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall
- Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
- Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3
- HA Clustering Overview
- HA Clustering Best Practices and Provisioning
- Configure HA Clustering
- Refresh HA1 SSH Keys and Configure Key Options
- HA Firewall States
- Reference: HA Synchronization
-
- Use the Dashboard
- Monitor Applications and Threats
- Monitor Block List
-
- Report Types
- View Reports
- Configure the Expiration Period and Run Time for Reports
- Disable Predefined Reports
- Custom Reports
- Generate Custom Reports
- Generate the SaaS Application Usage Report
- Manage PDF Summary Reports
- Generate User/Group Activity Reports
- Manage Report Groups
- Schedule Reports for Email Delivery
- Manage Report Storage Capacity
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
-
- Configure Syslog Monitoring
-
- Traffic Log Fields
- Threat Log Fields
- URL Filtering Log Fields
- Data Filtering Log Fields
- HIP Match Log Fields
- GlobalProtect Log Fields
- IP-Tag Log Fields
- User-ID Log Fields
- Decryption Log Fields
- Tunnel Inspection Log Fields
- SCTP Log Fields
- Authentication Log Fields
- Config Log Fields
- System Log Fields
- Correlated Events Log Fields
- GTP Log Fields
- Audit Log Fields
- Syslog Severity
- Custom Log/Event Format
- Escape Sequences
- Forward Logs to an HTTP/S Destination
- Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
- Monitor Transceivers
-
- User-ID Overview
- Enable User-ID
- Map Users to Groups
- Enable User- and Group-Based Policy
- Enable Policy for Users with Multiple Accounts
- Verify the User-ID Configuration
-
- App-ID Overview
- App-ID and HTTP/2 Inspection
- Manage Custom or Unknown Applications
- Safely Enable Applications on Default Ports
- Applications with Implicit Support
-
- Prepare to Deploy App-ID Cloud Engine
- Enable or Disable the App-ID Cloud Engine
- App-ID Cloud Engine Processing and Policy Usage
- New App Viewer (Policy Optimizer)
- Add Apps to an Application Filter with Policy Optimizer
- Add Apps to an Application Group with Policy Optimizer
- Add Apps Directly to a Rule with Policy Optimizer
- Replace an RMA Firewall (ACE)
- Impact of License Expiration or Disabling ACE
- Commit Failure Due to Cloud Content Rollback
- Troubleshoot App-ID Cloud Engine
- Application Level Gateways
- Disable the SIP Application-level Gateway (ALG)
- Maintain Custom Timeouts for Data Center Applications
-
- Decryption Overview
-
- Keys and Certificates for Decryption Policies
- SSL Forward Proxy
- SSL Forward Proxy Decryption Profile
- SSL Inbound Inspection
- SSL Inbound Inspection Decryption Profile
- SSL Protocol Settings Decryption Profile
- SSH Proxy
- SSH Proxy Decryption Profile
- Profile for No Decryption
- SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
- Perfect Forward Secrecy (PFS) Support for SSL Decryption
- SSL Decryption and Subject Alternative Names (SANs)
- TLSv1.3 Decryption
- High Availability Not Supported for Decrypted Sessions
- Decryption Mirroring
- Configure SSL Forward Proxy
- Configure SSL Inbound Inspection
- Configure SSH Proxy
- Configure Server Certificate Verification for Undecrypted Traffic
- Post-Quantum Cryptography Detection and Control
- Enable Users to Opt Out of SSL Decryption
- Temporarily Disable SSL Decryption
- Configure Decryption Port Mirroring
- Verify Decryption
- Activate Free Licenses for Decryption Features
-
- Policy Types
- Policy Objects
- Track Rules Within a Rulebase
- Enforce Policy Rule Description, Tag, and Audit Comment
- Move or Clone a Policy Rule or Object to a Different Virtual System
-
- External Dynamic List
- Built-in External Dynamic Lists
- Configure the Firewall to Access an External Dynamic List
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Exclude Entries from an External Dynamic List
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Register IP Addresses and Tags Dynamically
- Use Dynamic User Groups in Policy
- Use Auto-Tagging to Automate Security Actions
- CLI Commands for Dynamic IP Addresses and Tags
- Application Override Policy
- Test Policy Rules
-
- Network Segmentation Using Zones
- How Do Zones Protect the Network?
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
PAN-OS 8.1 (EoL)
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
-
-
- App-ID Changes in PAN-OS 8.1
- Authentication Changes in PAN-OS 8.1
- Content Inspection Changes in PAN-OS 8.1
- GlobalProtect Changes in PAN-OS 8.1
- User-ID Changes in PAN-OS 8.1
- Panorama Changes in PAN-OS 8.1
- Networking Changes in PAN-OS 8.1
- Virtualization Changes in PAN-OS 8.1
- Appliance Changes in PAN-OS 8.1
- Associated Software and Content Versions
- Limitations
-
- PAN-OS 8.1.26-h1 Addressed Issues
- PAN-OS 8.1.26 Addressed Issues
- PAN-OS 8.1.25-h3 Addressed Issues
- PAN-OS 8.1.25-h2 Addressed Issues
- PAN-OS 8.1.25-h1 Addressed Issues
- PAN-OS 8.1.25 Addressed Issues
- PAN-OS 8.1.24-h2 Addressed Issues
- PAN-OS 8.1.24-h1 Addressed Issues
- PAN-OS 8.1.24 Addressed Issues
- PAN-OS 8.1.23-h1 Addressed Issues
- PAN-OS 8.1.23 Addressed Issues
- PAN-OS 8.1.22 Addressed Issues
- PAN-OS 8.1.21-h3 Addressed Issues
- PAN-OS 8.1.21-h2 Addressed Issues
- PAN-OS 8.1.21-h1 Addressed Issues
- PAN-OS 8.1.21 Addressed Issues
- PAN-OS 8.1.20-h1 Addressed Issues
- PAN-OS 8.1.20 Addressed Issues
- PAN-OS 8.1.19 Addressed Issues
- PAN-OS 8.1.18 Addressed Issues
- PAN-OS 8.1.17 Addressed Issues
- PAN-OS 8.1.16 Addressed Issues
- PAN-OS 8.1.15-h3 Addressed Issues
- PAN-OS 8.1.15 Addressed Issues
- PAN-OS 8.1.14-h2 Addressed Issues
- PAN-OS 8.1.14 Addressed Issues
- PAN-OS 8.1.13 Addressed Issues
- PAN-OS 8.1.12 Addressed Issues
- PAN-OS 8.1.11 Addressed Issues
- PAN-OS 8.1.10 Addressed Issues
- PAN-OS 8.1.9-h4 Addressed Issues
- PAN-OS 8.1.9 Addressed Issues
- PAN-OS 8.1.8-h5 Addressed Issues
- PAN-OS 8.1.8 Addressed Issues
- PAN-OS 8.1.7 Addressed Issues
- PAN-OS 8.1.6-h2 Addressed Issues
- PAN-OS 8.1.6 Addressed Issues
- PAN-OS 8.1.5 Addressed Issues
- PAN-OS 8.1.4-h2 Addressed Issues
- PAN-OS 8.1.4 Addressed Issues
- PAN-OS 8.1.3 Addressed Issues
- PAN-OS 8.1.2 Addressed Issues
- PAN-OS 8.1.1 Addressed Issues
- PAN-OS 8.1.0 Addressed Issues
End-of-Life (EoL)
PAN-OS 8.1.2 Addressed Issues
PAN-OS® 8.1.2 addressed issues
Issue ID | Description |
---|---|
WF500-4625 | Fixed an issue where the WF-500 appliance
provided no option to configure the master key. With this fix, you
can use the request master-key new-master-key <key> lifetime <lifetime> CLI
command to configure the master key. |
PAN-97531 | Fixed an issue on PA-3200 Series firewalls
where powering down a copper interface disrupted the operations
of other interfaces that were grouped with it at the hardware level. |
PAN-97283 | Fixed an issue on PA-3200 Series firewalls
where SFP/SFP+ ports intermittently failed to come up after a reboot. |
PAN-97003 | Fixed an issue on offline VM-Series firewalls
where the web interface and CLI did not display license information
after you activated licenses. |
PAN-96938 | Fixed an issue with dataplane restarts when
the mix of network traffic included a high ratio of RTP and RTP
Control Protocol (RTCP) traffic. |
PAN-96734 | Fixed an issue where a process (configd)
stopped responding during a partial revert operation when reverting
an interface configuration. |
PAN-96622 | Fixed an issue where the GlobalProtect™
portal landing page did not return the HTTP Strict Transport Security
(HSTS) header in the error response page when sending the response
to an endpoint. |
PAN-96587 | Fixed an issue where PA-7000 Series and
PA-5200 Series firewalls intermittently failed to forward logs to
Log Collectors or the Logging Service due to DNS resolution failure
for the FQDNs of those log receivers. |
PAN-96572 | Fixed an issue where, after end users successfully
authenticated for access to a service or application, their web
browsers briefly displayed a page indicating authentication completed
and then they were redirected to an unknown URL that the user did
not specify. |
PAN-96490 | Fixed an issue where syslog servers misrepresented
HIP Match, Authentication, and User-ID™ logs received from the firewall
because the order changed in the first seven syslog fields for those
log types. With this fix, the first seven syslog fields are the
same for all log types. |
PAN-96102 | Fixed an issue on the Panorama™ management
server where partial revert operations failed with the following
error after you used the PAN-OS® XML API to create template stacks: template-stack-> is missing 'settings' template-stack is invalid. |
PAN-96088 | Fixed an issue where the active firewall
in a high availability (HA) configuration did not synchronize the
GlobalProtect data file to the passive firewall. |
PAN-95895 | Fixed an issue on firewalls that collect
port-to-username mappings from Terminal Services agents where the
firewalls didn't enforce user-based policies correctly because the
dataplane had incorrect primary-to-alternative-username mappings
even after you cleared the User-ID cache. |
PAN-95736 | Fixed an issue where the mprelay process stopped
responding when a commit occurred while the firewall was identifying
flows that needed a NetFlow update. |
PAN-95683 | Fixed an issue where, after you upgraded
the firewall to PAN-OS 8.1, a 500 Internal Server error occurred
for traffic that matched a Security policy rule with a URL Filtering profile
that specified a continue action (ObjectsSecurity ProfilesURL Filtering) because the
firewall did not correctly apply AES encryption or synchronize the
associated API key between the management plane and dataplane. |
PAN-95513 | Fixed an issue on the Panorama management
server where selecting additional target firewalls for a shared
policy rule cleared any existing firewall selections for that rule (PanoramaPolicies<policy_type>{Pre
Rules | Post Rules | Default Rules}Target). |
PAN-95486 | Fixed an issue with VM-Series firewalls
on Azure where dynamic updates failed for the GlobalProtect Data
File when you scheduled the updates using the management interface. |
PAN-95445 This fix requires
the VMware NSX 2.0.4 or a later plugin. | Fixed an issue where VM-Series firewalls
for NSX and firewalls in an NSX notify group (PanoramaVMware NSXNotify Group)
briefly dropped traffic while receiving dynamic address updates
after the primary Panorama in a high availability (HA) configuration
failed over. |
PAN-95443 | Fixed an issue where a VM-Series firewall
on KVM in DPDK mode didn't receive traffic after you configured
it to use the i40e single-root input/output virtualization (SR-IOV)
virtual function (VF). This fix requires that you install i40e driver
version 2.1.16 or later, and that you set the VF to be trusted by
running the following CLI command on the KVM host: ip link set dev eth0 vf 1 trust on |
PAN-95197 | Fixed an issue where mobile endpoints that
used GPRS Tunneling Protocol (GTP) lost traffic and had to reconnect
because the firewall dropped the response message that a Gateway
GPRS support node (GGSN) sent for a second Packet Data Protocol
(PDP) context update. |
PAN-95163 | Fixed an issue where, after you added group
mapping configurations, an out-of-memory condition developed that
intermittently caused the User-ID process (useridd)
to restart and temporarily prevented the firewall from receiving
updates to user mappings and group mappings. |
PAN-95130 | Fixed an issue on the firewall and Panorama management server where you could not assign tags that contained a colon ( : ) to service or service group objects. |
PAN-95124 | Fixed an issue where the firewall did not
correctly modify the Configuration XML file (by removing ctd skip-block-http-range)
when you upgraded from PAN-OS 8.0 to PAN-OS 8.1. |
PAN-95056 | Fixed an issue on the Panorama management
server where the configd process restarted when an
external health monitoring script (such as GoldenGate) executed
against Panorama, which became unusable until configd finished restarting. |
PAN-94917 | Fixed an issue on Panorama Log Collectors
where the show system masterkey-properties CLI command
did not display the master key lifetime and reminder settings. |
PAN-94912 | Fixed an issue where PA-5200 Series and
PA-3200 Series firewalls in an active/active high availability (HA)
configuration sent packets in the wrong direction in a virtual wire
deployment. |
PAN-94853 | Fixed an issue where mobile endpoints that
use GPRS Tunneling Protocol (GTP) lose GTP-U traffic because the
firewall dropped all GTP-U packets as packets without sessions after
receiving two GTP requests with the same tunnel endpoint identifiers
(TEIDs) and IP addresses. |
PAN-94697 | Fixed an issue where commit failures occurred
after you configured a DHCP-enabled subinterface as the local Interface
for an IKE gateway configuration (NetworkNetwork ProfilesIKE Gateways<IKE_gateway>General). |
PAN-94586 | Fixed an issue where the Panorama management
server exported reports slowly or not at all due to DNS resolution
failures. |
PAN-94582 | Fixed an issue where the firewall did not
correctly re-learn a User-ID mapping after that mapping was temporarily
lost and recovered through successful WMI probing. |
PAN-94578 | Fixed an issue where WildFire submissions
with a filename that contained %20n or a subject
that contained %n caused the management server (mgmtsrvr)
process to stop responding. |
PAN-94575 | Fixed an issue where a Panorama management
server running PAN-OS 8.1 failed to push host information profile
(HIP) objects that specified Encrypted Locations with State values
to firewalls running PAN-OS 8.0 or an earlier release (ObjectsGlobalProtectHIP Objects<HIP_object>Disk EncryptionCriteria<encrypted_location>). |
PAN-94516 | Fixed an issue on PA-500, PA-220, PA-220-R,
and PA-200 firewalls where commits failed after the Panorama management
server pushed a Decryption profile that you configured to Block
sessions if HSM not available to firewalls that did
not support a hardware security module (HSM). |
PAN-94510 | Fixed an issue where the total log storage
utilization that the firewall displayed did not account for IP
Tag storage that was set to less than two per cent (DeviceSetupManagementLogging and Reporting SettingsLog Storage). |
PAN-94450 | Fixed an issue where QSFP+ interfaces (13
and 14) on a PA-7000-20GQ-NPC Network Processing Card (NPC) unexpectedly
flapped when the card was booting up. |
PAN-94413 | Fixed an issue on Panorama M-Series and
virtual appliances where the hash of the shared policy was incorrectly
calculated, which caused an in-sync shared policy status to display
as out-of-sync. |
PAN-94382 | Fixed an issue on the Panorama management
server where the Task Manager displayed Completed status
immediately after you initiated a push operation to firewalls (Commit
all job) even though the push operation was still in
progress. |
PAN-94318 | Fixed an issue where the VM-Series firewall
for Azure intermittently failed to resolve URLs and generated the
following error because Azure prematurely timed out the connection
to the PAN-DB cloud after four minutes: Failed tosend Update Request to the Cloud. |
PAN-94278 | Fixed an issue where a Panorama Collector
Group forwarded Threat and WildFire® Submission logs to the wrong
external server after you configured match list profiles with the
same name for both log types (PanoramaCollector Groups<Collector_Group>Collector Log Forwarding{Threat
| WildFire}<match_list_profile>). |
PAN-94239 | Fixed an issue where the firewall routed
Open Shortest Path First (OSPF) unicast hello messages (P2MP non-broadcast)
using a forwarding information base (FIB) instead of sending the
messages over the interface to which the OSPF neighbor connected. |
PAN-94187 | Fixed an issue where the firewall did not
apply tag-based matching rules for dynamic address groups unless
you enclosed the tag names with single quotes ('<tag_name>')
in the matching rules (ObjectsAddress Groups<address_group>). |
PAN-94167 | Fixed an issue where a firewall forwarded
a deleted or expired IP address-to-username mapping to another firewall
through User-ID Redistribution but the receiving firewall still
displayed the mapping as an active IP address-to-username mapping. |
PAN-94165 | Fixed an issue where the firewall used an
incorrect next hop in the Border Gateway Protocol (BGP) route that
it advertised to External BGP (eBGP) peers in the BGP peer group. |
PAN-94163 | Fixed an issue on firewalls deployed in
virtual wire mode where SSL decryption failed due to a memory pool
allocation failure. |
PAN-94122 | Fixed an issue where firewalls intermittently
blocked SSL traffic due to a certificate timeout error after you
enabled SSL Forward Proxy decryption and configured the firewall
to Block sessions on certificate status check timeout (ObjectsDecryptionDecryption Profile<Decryption_profile>SSL DecryptionSSL Forward Proxy). |
PAN-94070 | Fixed an issue where Bidirectional Forwarding
Detection (BFD) sessions were active in only one virtual router
when two or more virtual routers had active BGP sessions (with BFD
enabled) using the same peer IP address. |
PAN-94058 | (GlobalProtect configurations only)
Fixed an issue where a configured Layer 3 interface erroneously
opened ports 28869/tcp and 28870/tcp on the IP address assigned
to that Layer 3 interface. |
PAN-94023 | Fixed an issue where the request system external-list show type ip name <EDL_name> CLI
command did not display external dynamic list entries after you
restarted the management server (mgmtsrvr) process. |
PAN-93937 | Fixed an issue where the management server (mgmtsrvr)
process on the firewall restarted when you pushed configurations
from the Panorama management server. |
PAN-93889 | Fixed an issue where the Panorama management
server generated high-severity System logs with the Syslogconnection established to server message
after you configured Traps log ingestion (PanoramaLog Ingestion Profile) for
forwarding to a syslog server (PanoramaServer ProfilesSyslog)
and committed configuration changes (CommitCommit to Panorama). |
PAN-93755 | Fixed an issue where SSL decrypted traffic
failed after you configured the firewall to Enforce Symmetric Return in
Policy Based Forwarding (PBF) policy rules (PoliciesPolicy Based Forwarding). |
PAN-93722 | Fixed an issue where the firewall failed
to perform decryption because endpoints tried to resume decrypted
inbound perfect forward secrecy (PFS) sessions. |
PAN-93715 | In certain customer environments, enhancements
in PAN-OS 8.1.2 to change fan speeds may help reduce rare cases
of drive communication failure in PA-5200 Series firewalls. |
PAN-93705 | Fixed an issue where configuring additional
interfaces (such as ethernet1/1 or ethernet1/2) on the Panorama
management server in Management Only mode caused an attempt to create
a local Log Collector when you committed the configuration (PanoramaSetupInterfaces),
which caused the commit to fail because a local Log Collector is
not supported on a Panorama management sever in Management Only
mode. |
PAN-93522 | Fixed an issue on firewalls in a high availability
(HA) configuration where traffic was disrupted because the dataplane
restarted unexpectedly when the firewall concurrently processed
HA messages and packets for the same session. This issue occurred
on all firewall models except the PA-200 and VM-50 firewalls. |
PAN-93412 | Fixed an issue where the Security policy
rules pushed from Panorama to a firewall did not display in the
list of available rules in the global filters list in the Application
Command Center (ACC). |
PAN-93411 | Fixed an issue on VM-Series firewalls for
KVM where applications that relied on multicasting failed because
the firewalls filtered multicast traffic by the physical function
(PF) after you configured them to use single root I/O virtualization
(SR-IOV) virtual function (VF) devices. |
PAN-93410 | Fixed an issue where PA-5200 Series firewalls
sent logs to the passive or suspended Panorama virtual appliance
in Legacy mode in a high availability (HA) configuration. With this
fix, the firewalls send logs only to the active Panorama. |
PAN-93318 | Fixed an issue where firewall CPU usage reached 100 per cent due to SNMP polling for logical interfaces based on updates to the Link Layer Discovery Protocol (LLDP) MIB (LLDP-V2-MIB.my). |
PAN-93244 | A security-related fix was made to prevent a Cross-Site Scripting (XSS) attack through the PAN-OS session browser (CVE-2018-9335). |
PAN-93242 | A security-related fix was made to prevent a Cross-Site Scripting (XSS) vulnerability in a PAN-OS web interface administration page (CVE-2018-9337). |
PAN-93233 | Fixed an issue where PA-7000 Series firewalls caused slow traffic over IPSec VPN tunnels because the firewalls reordered TCP segments during IPSec encryption when the tunnel session and inner traffic session were on different dataplanes. |
PAN-93207 | Fixed an issue where the firewall reported the incorrect hostname when responding to SNMP get requests. |
PAN-93046 | Fixed an issue where administrators whose roles have the Privacy privilege disabled (DeviceAdmin Roles<role>Web UI) can view details about source IP addresses and usernames in the PDF reports exported from the firewall. |
PAN-92958 | Fixed an issue where disk utilization increased unnecessarily because the firewall did not archive and rotate the /var/on file, which therefore grew to over 40MB. |
PAN-92892 | (VM-50 Lite firewalls only) Fixed
an intermittent issue where Failed to back up PAN-DB errors
were reported in the system log due to management plane out-of-memory
errors when a process (devsrvr) attempted to run an
md5 checksum. |
PAN-92821 | Fixed an issue where WildFire Submission
logs did not correctly display the subject fields of emails because
the firewall did not remove white spaces between encoded chunks
in those fields. |
PAN-92676 | Fixed an issue where an administrator whose
Admin Role profile had the Command Line privileges
set to superuser (DeviceAdmin Roles<role>Command Line) could not request tech-support dump from
the CLI. |
PAN-92569 | Fixed an issue where the firewall displayed
a continue-and-override response page when users tried to access
a URL that the firewall incorrectly categorized as unknown because
it learned the URL field as an IP address. |
PAN-92456 | Fixed an issue on the Panorama management
server where administrators couldn't log in to the web interface
because disk space utilization reached 100 per cent due to the continuous
growth of cmserror log files. |
PAN-92366 | Fixed an issue where PA-5200 Series firewalls
in an active/passive high availability (HA) configuration dropped
Bidirectional Forwarding Detection (BFD) sessions when the passive
firewall was in an initialization state after you rebooted it. |
PAN-92149 | Fixed an issue on PA-3250 and PA-3260 firewalls
where the hardware signature match engine was disabled and the PAN-OS
software performed signature matching instead, resulting in a ten
percent degradation in threat detection performance. |
PAN-91689 | Fixed an issue where the Panorama management
server removed address objects and—in the Network tab settings
and NAT policy rules—used the associated IP address values without
reference to the address objects before pushing configurations to firewalls. |
PAN-91421 | Fixed an issue where the firewall dataplane
restarted and resulted in temporary traffic loss when any process
stopped responding while system resource usage was running high. |
PAN-91238 | Fixed an issue where an Aggregate Ethernet
(AE) interface with Link Aggregation Control Protocol (LACP) enabled
on the firewall went down after a cisco-nexus primary virtual port
channel (vPC) switch LACP peer rebooted and came back up. |
PAN-91088 | Fixed an issue on PA-7000 Series firewalls
in a high availability (HA) configuration where the HA3 link did
not come up after you upgraded to PAN-OS 8.1.0 or a later PAN-OS
8.1 release. |
PAN-90920 | Fixed an issue on PA-5200 Series firewalls
where the dataplane restarted due to an internal path monitoring
failure. |
PAN-90692 | Fixed an issue where PA-5200 Series firewalls
dropped offloaded traffic after you enabled session offloading (enabled
by default), configured subinterfaces on the second aggregate Ethernet
(AE) interface group (ae2), and configured QoS on a
non-AE interface. |
PAN-90690 | Fixed an issue where Panorama appliances
ignored the time-zone offset in logs sent from the Traps Endpoint
Security Manager (ESM). |
PAN-90623 | Fixed an issue where the Panorama management
server displayed template configurations as Out of Sync for
firewalls with multiple virtual systems even though the template configurations
were in sync. |
PAN-90418 | Fixed an issue where PA-7000 Series, PA-5200
Series, PA-5000 Series, PA-3200 Series, and PA-3000 Series firewalls
dropped packets because their dataplanes restarted due to QoS queue
corruption. |
PAN-89988 | Fixed an issue where the firewall dataplane
intermittently restarted, causing traffic loss, after you attached
a NetFlow server profile to an interface for which the firewall
assigned an invalid identifier. |
PAN-89794 | Fixed an issue on PA-3050, PA-3060, PA-5000
Series, PA-5200 Series, and PA-7000 Series firewalls in a high availability
(HA) configuration where multicast sessions intermittently stopped
forwarding traffic after HA failover on firewalls with hardware
offloading enabled (default). |
PAN-88674 | Fixed an issue on the Panorama management
server where administrators with the superuser read-only role could
view the Password Hash used to access
a Log Collector CLI after another superuser used browser developer
tools to modify the input type for that field (PanoramaManaged Collectors<Log_Collector>Authentication). |
PAN-88428 | Fixed an issue where the VM-Series firewall
incorrectly displayed network interfaces as having a Link Speed of 1000 and
a Link Duplex set to half when
the actual values were different (NetworkInterfaces<interface>Advanced). |
PAN-87265 | Fixed an issue where the Panorama management
server displayed no output for the User Activity Report (MonitorPDF ReportsUser Activity Report). |
PAN-87079 | (PA-3060, PA-3050, PA-5000 Series, PA-5200 Series, and PA-7000 Series firewalls only) Fixed an issue where Threat logs displayed an Other IP Flood message instead of identifying the threat name of the correct protocol (such as TCP Flood) when traffic reached the configured SYN flood max-rate threshold (ObjectsSecurity ProfilesDoS Protection<DoS_Protection_profile>Flood ProtectionSYN Flood). |
PAN-86672 | Fixed an issue where in rare cases a commit
caused the disk to become full due to an incorrect disk quota size
value, and as a result the firewall behaved unpredictably (for example,
the web interface and CLI became unresponsive). |
PAN-86647 | Fixed an issue on the Panorama management
server where editing the Description of a
shared policy rule and clicking OK caused
the Target setting to revert to Any firewalls
instead of the selected firewalls. |
PAN-84647 | Fixed an issue with scheduled log exports
that prevented firewalls running in FIPS-CC mode from successfully
exporting the logs using Secure Copy (SCP). |
PAN-84238 | Fixed an issue where the Panorama management
server failed to push configurations to firewalls running a PAN-OS
7.1 release and displayed the following error: wins-server-> primary is invalid |
PAN-80922 | Fixed an issue where the firewall failed
to parse the merged configuration file after you changed the master
key; it parsed only the running configuration file. With this fix,
the firewall parses both files as expected after you change the
master key. |
PAN-68256 | Fixed an issue on PA-7000 Series firewalls
in a high availability (HA) configuration where the HA data link
(HSCI) interfaces intermittently failed to initialize properly during
bootup. |
PAN-48553 | Fixed an issue where, after pushing the
high availability (HA) Group ID from a Panorama management server
to a firewall and overriding the value on the firewall (DeviceHigh AvailabilityGeneralSetup),
the following error displayed even though the value was within the
permitted range: deviceconfig -> high-availability-> group -> should be equal to or between 1 and 63. |