: Known Issues in SD-WAN Plugin 3.2
Focus
Focus

Known Issues in SD-WAN Plugin 3.2

Table of Contents

Known Issues in SD-WAN Plugin 3.2

Known issues in SD-WAN 3.2.
The following list includes all known issues that impact an SD-WAN 3.2 release. This list includes both outstanding issues and issues that are addressed, as well as known issues that apply more generally or that are not identified by a specific issue ID. Refer to PAN-OS Release Notes for additional known issues affecting SD-WAN Plugin 3.2.

PAN-248211

Description of PAN-248211.
If you have enabled the advanced routing feature on the Panorama, then the Panorama throws a commit failure after downgrading from PAN-OS 11.1.3 to PAN-OS 10.1.13 or the earlier 10.1 releases.

PAN-236767

Description of PAN-236767.
The web interface won't throw any warning or error if it encounters a failure in importing a certificate. Check the syslog and configd log files for more information.
Ensure the following before importing a certificate:
  • Certificate must be .PKCS12 format.
  • When you bulk import the certificates, the size of the archive(.tar) file should be less than 10MB.

PAN-220919

Description of PAN-220919.
Auto VPN creates a virtual SD-WAN interface named sdwan.901 for direct internet access (DIA) and creates a virtual SD-WAN interface named sdwan.9xx for VPN tunnels. When you enable Auto VPN, the SD-WAN plugin creates the SD-WAN interfaces automatically. Hence, it's not necessary for you to create SD-WAN interfaces manually. The SaaS quality profile works only with one DIA interface that is sdwan.901.
Auto VPN also creates its own default route that uses the sdwan.901 interface as its egress interface and uses a low metric of 5, so that the sdwan.901 interface is preferred over the default route you created.
There might be scenarios where you want to create an SD-WAN interface manually (other than what the SD-WAN plugin creates automatically) like the following:
  • Configuring SD-WAN direct internet access (DIA) links only and no VPN connections between the hub and branch locations
  • (Not recommended) Deploying SD-WAN manually between SD-WAN sites without Panorama management server
In such cases, you must configure the manually created SD-WAN interface outside of the SDWAN.9xx range containing a route with a metric higher than the default value.

PAN-215897

Description of PAN-215897.
In a Panorama high availability (HA) deployment, the SD-WAN interface goes down and all the tunnel interfaces disappear from the NetworkIPSec Tunnels tab when you push the configuration changes from the secondary Panorama.
Workaround: If you have set up a HA pair in Panorama, don't push the configuration from the secondary Panorama when the primary Panorama is active. Always push the configuration changes from the primary Panorama when it's active.

PLUG-16507

Description of PLUG-16507.
(HA deployments only) You may observe SD-WAN tunnel flapping and changes to the SD-WAN interfaces when you perform a commit operation after any of the following:
  • HA failover
  • PAN-OS upgrade or downgrade
  • Reboot the HA pair
This issue is addressed in SD-WAN plugin 3.3.2, 3.3.1 , 3.2.2, 3.0.8 , and 2.2.7.

PLUG-16141

Description of PLUG-16141.
The SD-WAN log files are overwritten and the critical events does not get captured in the system logs that cause difficulty in debugging the SD-WAN plugin-related issues.
This issue is addressed in SD-WAN plugin 2.2.7, 3.0.8 , 3.2.2, and 3.3.2. After the fix, the following critical events are added to the system logs.
  • PSK creation or PSK change for a VPN cluster
  • Tunnel name, IP address creation, or IP address change

PLUG-16048

Description of PLUG-16048.
(HA deployments only) Passive Panorama makes changes to the SD-WAN plugin database cache entries.
This issue is addressed in SD-WAN plugin 2.2.7, 3.0.8 , 3.2.2, and 3.3.2.

PLUG-16017

Description of PLUG-16017.
When you attempt to delete an existing VPN cluster that contains the autogenerated BGP security rules for an SD-WAN device, the commit all operation fails on the SD-WAN device in the VPN cluster.
Workaround: Delete the BGP Security policy and perform a commit and push operation. After the commit, delete the VPN cluster.

PLUG-15956

Description of PLUG-15956.
The commit all operation fails when you enable an advanced routing feature on the SD-WAN branch device with BGP secrets and Prisma cluster configuration.

PLUG-15823

Description of PLUG-15823.
(Full mesh topology only) The SD-WAN devices neither go out-of-sync nor show up in the commit scope when a new hub device gets added to the full mesh VPN cluster.
This issue is addressed in SD-WAN plugin 2.2.7, 3.0.7-h2, 3.0.8, 3.2.2, 3.3.1, and 3.3.2.

PLUG-15761

Description of PLUG-15761.
In some cases, after HA failover followed by a commit and commit push from the Panorama will result in the tunnel going down. It's because a new tunnel IP address gets generated for the firewall after a HA failover.
Workaround: After committing the configuration changes to Panorama, perform a commit and push on the all the SD-WAN devices in the SD-WAN VPN cluster even if the templates are in synchronization with the Panorama management server.
This issue is addressed in SD-WAN plugin 2.2.7, 3.0.8, 3.2.2, 3.3.1, and 3.3.2.

PLUG-15732

Description of PLUG-15732
The exported CSV files from SD-WAN devices won't have the Upstream NAT configurations. Hence, when you import the same CSV file, the Upstream NAT configurations would be missing.
This issue is addressed in SD-WAN plugin 3.3.1.

PLUG-15594

Description of PLUG-15594.
When new certificates are created using an old root certificate (generated before the upgrade) and linked to the SD-WAN device, the commit fails with the following error:
Failed to create sdwan cluster meta file: There is no ca certificate for certificate.
Workaround: First create the new root certificate and then create the new certificate signed by the new root certificate and link to SD-WAN devices.

PLUG-15525

Description of PLUG-15525.
It's not possible to revert to any of the earlier pre-shared keys except the current pre-shared key.
This issue is addressed in SD-WAN plugin 2.2.7, 3.0.8 , 3.2.2, and 3.3.2. After the fix, you can revert to any of the earlier pre-shared keys (if it's available).

PLUG-15415

Description of PLUG-15415.
(HA deployments only) The HA synchronization failure occurs on the passive Panorama when you either upgrade or downgrade the HA Panorama. The issue is caused due to HA failover between the active and passive SD-WAN devices.
This issue is addressed in SD-WAN plugin 2.2.7, 3.0.8, , 3.2.2, 3.3.1, and 3.3.2.

PLUG-15323

Description of PLUG-15323
The SD-WAN allows you to choose any device group irrespective of the device type (branch or hub) selected while adding the BGP Security policy. For example, even though you select the device type as branch, you will be able to choose the hub device group in addition to the branch device group while adding the BGP policy.
This issue is addressed in SD-WAN plugin 3.3.1.

PLUG-15276

Description of PLUG-15276
(Full mesh topology only) In the SD-WAN VPN cluster, an SD-WAN branch cannot create a VPN tunnel with another SD-WAN branch firewall if the branch firewall is configured behind the NAT device.
This issue is addressed in SD-WAN plugin 3.0.7-h2, 3.1.3 , 3.2.1, 3.3.0, and 3.3.1.

PLUG-15258

Description of PLUG-15258
The SD-WAN monitoring report generation takes more time than expected.
This issue is addressed in SD-WAN plugin 3.2.1 and 3.3.1.

PLUG-14986

Description of PLUG-14986.
(HA deployments only) The SD-WAN tunnel becomes inactive for some duration when the passive firewall is either suspended or rebooted during the HA upgrade process.
This issue is addressed in SD-WAN plugin 3.1.3 and 3.2.1.

PLUG-14953

Description of PLUG-14953.
(HA deployments only) After an HA failover, the Link Performance summary displays the previous active device (device that was active before the failover) as the hostname instead of the current active device.

PLUG-14580

Description of PLUG-14580.
(HA deployments only) During HA synchronization, the SD-WAN database cache synchronizes back from passive Panorama to active Panorama.
This issue is addressed in SD-WAN plugin 3.0.7 and 3.2.1. After this fix, the SD-WAN database cache synchronization from passive Panorama to active Panorama is disabled.

PLUG-14559

Description of PLUG-14559.
A commit failure occurs when you attempt to rename the vsys to a name other than vsys1 for a multi-vsys firewall with private link type (in an SD-WAN Interface Profile).
This issue is addressed in SD-WAN plugin 3.0.7, 3.1.3 , 3.2.1 , and 3.3.0.

PLUG-14499

Description of PLUG-14499
(Panorama HA deployments only) The firewalls managed by HA active and passive Panorama would go out of synchronization when you make any changes to an active Panorama SD-WAN configuration (such as modifying the VPN cluster name). After this, even when the SD-WAN configuration changes are pushed from active Panorama to the firewalls, the firewalls remains out of synchronization on passive Panorama. This issue does not occur when changing a non-SD-WAN related configuration.
Workaround: In a Panorama HA deployment, if you make any changes to an existing SD-WAN configuration:
  1. Commit the SD-WAN configuration changes on an active Panorama (where the HA synchronization happens on the passive Panorama automatically)
  2. Trigger manual synchronization from active Panorama to passive Panorama by executing the following CLI command:
    request high-availability sync-to-remote running-config
  3. Push to the firewalls from active Panorama
This issue is addressed in SD-WAN plugin 3.0.7, 3.1.3 , and 3.2.1. However, it is required to follow the workaround when you wish to modify the active Panorama SD-WAN configuration.

PLUG-14413

Description of PLUG-14413.
(HA Deployments only) If the HA environment is not configured correctly or when either of HA pair is not present, then no proper commit failure is displayed for troubleshooting.
This issue is addressed in SD-WAN plugin 2.2.7, 3.0.8, 3.2.2, and 3.3.2. After the fix, the improved failure message helps in identifying the missing HA device in the HA deployment.

PLUG-14402

Description of PLUG-14402
The return merchandise authentication (RMA) process won't be successful if you delete the replacement firewall without removing it from the SD-WAN plugin first.
This issue is addressed in SD-WAN plugin 2.2.6, 3.0.7, 3.2.1, and 3.3.0. Follow the instructions to replace an SD-WAN device.

PLUG-13536

Description of PLUG-13536.
When you disable Remove Private AS option ('remove-private-as') and attempt to push the configuration from SD-WAN plugin to the branch firewalls, the changes to the Remove Private AS option (SD-WANDevicesBranchBGPIPV4 BGP) does not take effect and remains enabled on the branch firewalls. This issue is seen after upgrading the Panorama management server to 11.0.2 release.
This issue is addressed in SD-WAN plugin 3.1.3, 3.2.1, and 3.3.0.

PLUG-13100

Description of PLUG-13100
On Prisma Access Onboarding tab, the aggregated interfaces don't get listed in the Interface drop-down.
This issue is addressed in SD-WAN plugin 3.0.5, 3.1.3, 3.2.1, and 3.3.0.

PLUG-12241

Description of PLUG-12241
You won't be able to push the configuration changes (like VPN cluster name) of an already configured VPN cluster to the Panorama management server.
This issue is addressed in SD-WAN plugin 3.1.3 , 3.2.1, and 3.3.0.

PLUG-12224

Description of PLUG-12224.
For an SD-WAN tunnel between a hub and a branch, the hub/branch tunnel interface should have the same IP address on the HA active and passive firewalls, but the hub/branch has different IP addresses on the HA active and passive firewalls.
This issue is addressed in SD-WAN plugin 2.2.4, 2.2.7, 3.0.4, 3.0.8, 3.1.0-h6 , 3.2.2, and 3.3.2. Tunnel ID changes will take effect from SD-WAN plugin 2.2.4. If you are running SD-WAN plugin 2.2.2 and upgrade to 2.2.4, you must regenerate the cluster configuration and push to devices to see those changes.

PLUG-12156

Description of PLUG-12156
On the Hub-Spoke VPN cluster type, if you make any changes to an existing cluster member configuration or add a new device to the cluster, the push gets enabled for all the VPN cluster members.
This issue is addressed in SD-WAN plugin 2.2.6 , 3.0.7-h2, 3.2.1 , and 3.3.0.

PLUG-11277

Description of PLUG-11277
In an SD-WAN hub-and-spoke topology, where Prisma Access compute nodes (CNs) are configured as a hub connecting to the PAN-OS firewalls, the session gets established on only one compute node when ECMP is disabled. When more than one compute nodes are connected to the PAN-OS firewalls, routes get added from one of the compute nodes only. Even though the branch firewalls learn the routes through BGP from both the Prisma Access compute nodes, the branch installs only one of the BGP routes based on the BGP route selection criteria. Therefore, when a traffic passes from the other compute node, the session does not get established.
This issue is addressed in SD-WAN plugin 2.2.6, 3.0.7, 3.1.3, and 3.2.1.

PLUG-11223

Description of PLUG-11223.
In a high availability (HA) deployment, the SD-WAN tunnel will go down due to a key ID mismatch when the following events occur in sequence:
  • An HA failover
  • The SD-WAN plugin cache removes the current HA pair relation from the database when debug plugins sd_wan drop-config-cache all command is executed
  • A commit and push fails on either the hub or a branch active node
In certain scenarios, replacing one of the HA devices during the RMA process can cause the SD-WAN tunnel to go down due to a key ID mismatch. For more details, refer to Replace an SD-WAN Device.
Workaround: Resolve the Key ID mismatch by ensuring that the Peer Identification of the hub firewall matches with the Local Identification of the branch firewall and the Local Identification of the hub firewall matches with the Peer Identification of the branch firewall.
  1. Log in to the hub or a branch firewall where the SD-WAN tunnel is down due to Key ID mismatch and select NetworkNetwork ProfilesIKE Gateways.
  2. Select the IKE gateway of the hub firewall and click Override at the bottom of the screen.
  3. Copy the Local Identification value from the hub firewall to the Peer Identification value in the branch firewall.
  4. Copy the Peer Identification value from the hub firewall to the Local Identification value in the branch firewall.
  5. Click OK and Commit your changes.
This issue is addressed in SD-WAN plugin 2.2.5 , 2.2.7, 3.0.8, 3.1.3 , 3.2.1, 3.2.2 , 3.3.0, and 3.3.2.
After this fix, the key ID may change after the Panorama commit. Therefore, you must ensure to commit and push to all the devices in the VPN cluster or clusters.