Known Issues in SD-WAN Plugin 3.3
Table of Contents
Expand all | Collapse all
-
-
-
-
- Features Introduced in Zero Touch Provisioning 2.0
- Known Issues in the Zero Touch Provisioning 2.0.4 Release
- Known Issues in the Zero Touch Provisioning 2.0.3 Release
- Known Issues in the Zero Touch Provisioning 2.0.2 Release
- Known Issues in the Zero Touch Provisioning 2.0.1 Release
- Known Issues in the Zero Touch Provisioning 2.0.0 Release
- Limitations
-
-
Known Issues in SD-WAN Plugin 3.3
Known issues in SD-WAN 3.3.
The following list includes all known issues that impact an SD-WAN 3.3
release. This list includes both outstanding issues and issues that are addressed, as
well as known issues that apply more generally or that are not identified by a specific
issue ID. Refer to PAN-OS Release Notes for additional known
issues affecting SD-WAN Plugin 3.3.
PAN-261971
Description of PAN-261971.
If the SD-WAN branch firewall is a multi-DP firewall (that is, a firewall model with
multiple data planes and/or multiple slots), it drops the traffic sent over the non-DIA
virtual interface when the multiple virtual routers are configured on the firewall.
PLUG-17378
Description of PLUG-17378.
When SD-WAN is configured with only cellular interface on the 4G/5G PAN-OS firewalls
along with Allow DIA VPN enabled, the SD-WAN hub virtual
interface (VIF) does not get listed in the DIA interface. Due to this, the DIA Anypath does not work properly that may
impact the DIA failover.
This issue is addressed in SD-WAN plugin 3.3.2.
PLUG-16507
Description of PLUG-16507.
(HA deployments only) You may observe SD-WAN tunnel flapping and changes to the
SD-WAN interfaces when you perform a commit operation after any of the following:
- HA failover
- PAN-OS upgrade or downgrade
- Reboot the HA pair
This issue is addressed in SD-WAN plugin 3.3.2,
3.3.1 , 3.2.2,
3.0.8
.
PLUG-16141
Description of PLUG-16141.
The SD-WAN log files are overwritten and the critical events does not get captured in the
system logs that cause difficulty in debugging the SD-WAN plugin-related issues.
This issue is addressed in SD-WAN plugin 3.0.8
, 3.2.2, and 3.3.2. After the fix, the following
critical events are added to the system logs.
- PSK creation or PSK change for a VPN cluster
- Tunnel name, IP address creation, or IP address change
PLUG-16048
Description of PLUG-16048.
(HA deployments only) Passive Panorama makes changes to the SD-WAN plugin
database cache entries.
This issue is addressed in SD-WAN plugin 3.0.8
, 3.2.2, and 3.3.2.
PLUG-15823
Description of PLUG-15823.
(Full mesh topology only) The SD-WAN devices neither go out-of-sync nor show up
in the commit scope when a new hub device gets added to the full mesh VPN cluster.
This issue is addressed in SD-WAN plugin 3.0.7-h2, 3.0.8, 3.2.2,
3.3.1, and 3.3.2.
PLUG-15764
Description of PLUG-15764
SD-WAN internal database-related activities will be impacted if you install the PAN-OS
version before an SD-WAN plugin version. We recommend you to install the compatible
SD-WAN plugin version first and then the corresponding PAN-OS version to avoid any
SD-WAN database-related issues.
Workaround: If you wish to install the PAN-OS version first followed by the
compatible SD-WAN plugin version, you must execute the following command to avoid any
SD-WAN database-related issues.
debug plugins sd_wan manage-visibility-data mode recap
PLUG-15761
Description of PLUG-15761.
In some cases, after HA failover followed by a commit and commit push from the Panorama
will result in the tunnel going down. It's because a new tunnel IP address gets
generated for the firewall after a HA failover.
Workaround: After committing the configuration changes to Panorama, perform a
commit and push on the all the SD-WAN devices in the SD-WAN VPN cluster even if the
templates are in synchronization with the Panorama management server.
This issue is addressed in SD-WAN plugin 3.0.8, 3.2.2, 3.3.1, and 3.3.2.
PLUG-15732
Description of PLUG-15732
The exported CSV files from SD-WAN devices won't have the Upstream
NAT configurations. Hence, when you import the same CSV file, the
Upstream NAT configurations would be missing.
This issue is addressed in SD-WAN plugin
3.3.1.
PLUG-15673
Description of PLUG-15673.
The link characteristics for an application (PanoramaSD-WANMonitoring) does not display bandwidth, jitter, packet loss for SaaS enabled
applications.
This issue is addressed in SD-WAN plugin 3.3.1.
PLUG-15526
Description of PLUG-15526.
The SD-WAN trend collection does not get recapped when you execute a command to recap the
collection.
This issue is addressed in SD-WAN plugin 3.0.7-h2 and 3.3.1.
PLUG-15525
Description of PLUG-15525.
It's not possible to revert to any of the earlier pre-shared keys except the current
pre-shared key.
This issue is addressed in SD-WAN plugin 3.0.8
, 3.2.2, and 3.3.2. After the fix, you can revert
to any of the earlier pre-shared keys (if it's available).
PLUG-15415
Description of PLUG-15415.
(HA deployments only) The HA synchronization failure occurs on the passive
Panorama when you either upgrade or downgrade the HA Panorama. The issue is caused due
to HA failover between the active and passive SD-WAN devices.
This issue is addressed in SD-WAN plugin 3.0.8,
, 3.2.2, 3.3.1, and 3.3.2.
PLUG-15323
Description of PLUG-15323
The SD-WAN allows you to choose any device group irrespective of the device type (branch
or hub) selected while adding the BGP Security policy. For example, even though you
select the device type as branch, you will be able to choose the hub device group in
addition to the branch device group while adding the BGP policy.
This issue is addressed in SD-WAN plugin
3.3.1.
PLUG-15276
Description of PLUG-15276
(Full mesh topology only) In the SD-WAN VPN cluster, an SD-WAN branch cannot
create a VPN tunnel with another SD-WAN branch firewall if the branch firewall is
configured behind the NAT device.
This issue is addressed in SD-WAN plugin 3.0.7-h2,
3.1.3 , 3.2.1,
3.3.0, and 3.3.1.
PLUG-15258
Description of PLUG-15258
The SD-WAN monitoring report generation takes more time than expected.
This issue is addressed in SD-WAN plugin 3.2.1 and 3.3.1.
PLUG-14953
Description of PLUG-14953.
(HA deployments only) After an HA failover, the Link Performance summary
displays the previous active device (device that was active before the failover) as the
hostname instead of the current active device.
PLUG-14559
Description of PLUG-14559.
A commit failure occurs when you attempt to rename the vsys to a name other than vsys1
for a multi-vsys firewall with private link type (in an SD-WAN Interface
Profile).
This issue is addressed in SD-WAN plugin 3.0.7,
3.1.3
, 3.2.1
, and 3.3.0.
PLUG-14413
Description of PLUG-14413.
(HA Deployments only) If the HA environment is not configured correctly or when
either of HA pair is not present, then no proper commit failure is displayed for
troubleshooting.
This issue is addressed in SD-WAN
plugin 3.0.8, 3.2.2,
and 3.3.2. After the fix, the improved failure message helps in identifying
the missing HA device in the HA deployment.
PLUG-14402
Description of PLUG-14402
The return merchandise authentication (RMA) process won't be successful if you delete the
replacement firewall without removing it from the SD-WAN plugin first.
This issue is addressed in SD-WAN plugin 2.2.6,
3.0.7, 3.2.1, and 3.3.0. Follow the instructions to replace an SD-WAN
device.
PLUG-13536
Description of PLUG-13536.
When you disable Remove Private AS option
('remove-private-as') and attempt to push the configuration
from SD-WAN plugin to the branch firewalls, the changes to the Remove Private
AS option (SD-WANDevicesBranchBGPIPV4 BGP) does not take effect and remains enabled on the branch firewalls. This
issue is seen after upgrading the Panorama management server to 11.0.2 release.
This issue is addressed in SD-WAN plugin 3.1.3,
3.2.1, and 3.3.0.
PLUG-13100
Description of PLUG-13100
On Prisma Access Onboarding tab, the aggregated interfaces don't
get listed in the Interface drop-down.
This issue is addressed in SD-WAN plugin 3.0.5,
3.1.3, 3.2.1, and 3.3.0.
PLUG-12241
Description of PLUG-12241
You won't be able to push the configuration changes (like VPN cluster name) of an already
configured VPN cluster to the Panorama management server.
This issue is addressed in SD-WAN plugin 3.1.3 ,
3.2.1, and 3.3.0.
PLUG-12224
Description of PLUG-12224.
For an SD-WAN tunnel between a hub and a branch, the hub/branch tunnel interface should
have the same IP address on the HA active and passive firewalls, but the hub/branch has
different IP addresses on the HA active and passive firewalls.
This issue is addressed in SD-WAN plugin 2.2.4, 3.0.4, 3.0.8, 3.1.0-h6
, 3.2.2, and 3.3.2. Tunnel ID changes will take
effect from SD-WAN plugin 2.2.4. If you are running SD-WAN plugin 2.2.2 and upgrade
to 2.2.4, you must regenerate the cluster configuration and push to devices to see
those changes.
PLUG-12156
Description of PLUG-12156
On the Hub-Spoke VPN cluster type, if you make any changes to an
existing cluster member configuration or add a new device to the cluster, the push gets
enabled for all the VPN cluster members.
This issue is addressed in SD-WAN plugin 2.2.6 ,
3.0.7-h2, 3.2.1
, and 3.3.0.
PLUG-11223
Description of PLUG-11223.
In a high availability (HA) deployment, the SD-WAN tunnel will go down due to a key ID
mismatch when the following events occur in sequence:
- An HA failover
- The SD-WAN plugin cache removes the current HA pair relation from the database when debug plugins sd_wan drop-config-cache all command is executed
- A commit and push fails on either the hub or a branch active node
In certain scenarios, replacing one of the HA devices during the RMA process can cause
the SD-WAN tunnel to go down due to a key ID mismatch. For more details, refer to Replace an SD-WAN Device.
Workaround: Resolve the Key ID mismatch by ensuring that the Peer
Identification of the hub firewall matches with the Local
Identification of the branch firewall and the Local
Identification of the hub firewall matches with the Peer
Identification of the branch firewall.
- Log in to the hub or a branch firewall where the SD-WAN tunnel is down due to Key ID mismatch and select NetworkNetwork ProfilesIKE Gateways.
- Select the IKE gateway of the hub firewall and click Override at the bottom of the screen.
- Copy the Local Identification value from the hub firewall to the Peer Identification value in the branch firewall.
- Copy the Peer Identification value from the hub firewall to the Local Identification value in the branch firewall.
- Click OK and Commit your changes.
This issue is addressed in SD-WAN plugin 2.2.5 , 3.0.8, 3.1.3
, 3.2.1,
3.2.2
, 3.3.0,
and 3.3.2.
After this fix, the key ID may
change after the Panorama commit. Therefore, you must ensure to commit and push to
all the devices in the VPN cluster or clusters.