What are the limitations related to PAN-OS 10.0 releases?
The following are limitations associated with PAN-OS 10.0.
Issue ID
If you use a proxy to transmit logs between the firewall and Cortex Data Lake (CDL), you can only transmit session logs after you upgrade to PAN-OS 10.0.0; transmitting Enhanced Application Logs (EAL logs) with a proxy is not currently supported. If you want to upgrade to PAN-OS 10.0.0 and are unable or do not want to reconfigure your network without the proxy, you must disable EAL log forwarding globally and in the log forwarding profile because the new service route for EAL logs does not currently support proxies. If you choose this option, features for Cortex XDR and IoT Security are not fully functional because they require EAL logs in addition to session logs. Using proxies to transmit EAL logs between the firewall and CDL will be supported in a future PAN-OS version.
Firewalls and appliances perform a software integrity check periodically when they are running and when they reboot. If you simultaneously boot up multiple instances of a VM-Series firewall on a host or you enable CPU over-subscription on a VM-Series firewall, the firewall boots in to maintenance mode when a processing delay results in a response timeout during the integrity check. If your firewall goes in to maintenance mode, please check the error and warnings in the fips.log file.
A reboot always occurs during an upgrade so if you enabled CPU over-subscription on your VM-Series firewall, consider upgrading your firewall during a maintenance window.
PAN-OS 10.0.2 and later 10.0 releases
) If the number of SD-WAN policies is close to capacity, sometimes renaming a policy results in the following error:
SD-WAN policy capacity exceeded by editing rule ‘xxxxxx’. Delete the rule and add again to fix.
If deleting the rule and adding it again doesn’t work, take the following steps:
  1. Delete the renamed policy.
  2. Issue the CLI command:
    debug device-server reset id-manager type sdwan-rule
  3. Add the policy again.
Selected Zone
is supported for SaaS Application Usage reports (
PDF Reports
SaaS Application Usage
) generated from logs in the Cortex Data Lake (CDL).
On the Panorama management server, scheduled email PDF reports (
PDF Reports
) fail if a GIF image is used in the header of footer.
When using the Chrome browser on an Apple MAC laptop, firewalls managed by a Panorama management server running PAN-OS 10.0.1 may not display when you
Edit Selections
Commit and Push
Push to Devices
) when you push a configuration change to managed firewalls.
Log in to the Panorama web interface using the Safari browser or manually adjust the size of the Push Scope Selection window until the managed firewalls are displayed.
This limitation is now resolved. See PAN-OS 10.0.1 Addressed Issues.
Non-superuser administrators with all right enabled cannot
Review Policies
Review Apps
for downloaded or installed content versions.
If your multiple plugin deployment includes a device group that contains VM-Series firewalls deployed on VMware NSX and VM-Series firewalls deployed on another environment, such as AWS, Azure, or vCenter, pushing policy created for the VM-Series firewall on VMware NSX to non-NSX firewalls is not supported and returns the following error:
  • In VSYS vsys1 from zone <zone-name> of type unknown and to zone <zone-name> of type unknown are incompatible in security rule nsx-policy
  • Configuration is invalid
Before you push policy to the non-NSX firewalls in your device group, you must disable the NSX policy rules before pushing to your firewalls.
The Data Processing Card (DPC-A) is incompatible with a PA-7000 Series firewall using the default session distribution policy (ingress-slot).
Firewalls with hyperscan signatures configured do not support downgrade to PAN-OS 9.1 or earlier releases.
In an SD-WAN Hub-Spoke configuration, suppose Branch A and Branch B each have an MPLS link to the hub and all devices have
VPN Data Tunnel Support
disabled. For traffic from Branch A to Branch B, if Branch A selects a tunnel to go through the hub and the hub selects the MPLS link to reach Branch B, the traffic will fail because return traffic may go to Branch A directly through MPLS, without going through the hub. (The next packet from Branch A to Branch B is dropped at the hub because the TCP three-way handshake fails.)
The front panel “link” and “activity” LEDs for ports 5, 6, 11, and 12 will not work on the PAN-PA-7000-20GQ-NPC when a 1G module is installed.
On the PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls, which support more than eight aggregate Ethernet (AE) interface groups, QoS is supported on only the first eight AE interface groups.
On the Panorama management server, scheduled content updates (
Device Deployment
Dynamic Updates
) for managed VM-Series firewalls configured to
Download Only
cause commit failures for the VM-Series firewalls.
Configure scheduled content updates for VM-Series firewalls to
Download and Install
On the Panorama management server, Device Group and Template administrators can only view the system logs (
) for
device groups.
In an SD-WAN configuration, traffic does not flow unencrypted over an MPLS link; it will always be encrypted. When traffic is routed to a virtual SD-WAN interface of VPN tunnel links, if the MPLS link is selected, the firewall sends the traffic over the tunnel.
If you assign a parent device group with one or more child device groups in an access domain (
Access Domains
), the administrator can only view the configuration and system logs for the parent device group and not the child device group(s).
Enable access to both the parent and required child device group(s).
Configuring the timeout, retries, and ipsec-encryption parameters for communication between the management plane and the dataplane is not supported.
After adding a new virtual system from the CLI, you must log out and log back in to see the new virtual system within the CLI.
commit all
job is executed from Panorama to the firewall only if the newly added firewall is running PAN-OS 8.1 or a later release with
Auto Push on 1st Connect
When performing destination NAT to a translated address that is
Dynamic IP (with session distribution)
, the firewall does not remove duplicate IP addresses from the list of destination IP addresses before the firewall distributes sessions. The firewall distributes sessions to the duplicate addresses in the same way it distributes sessions to non-duplicate addresses.

Recommended For You