PAN-OS 10.2.11 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- Cloud Management of NGFWs
-
- Management Interfaces
-
- Launch the Web Interface
- Use the Administrator Login Activity Indicators to Detect Account Misuse
- Manage and Monitor Administrative Tasks
- Commit, Validate, and Preview Firewall Configuration Changes
- Commit Selective Configuration Changes
- Export Configuration Table Data
- Use Global Find to Search the Firewall or Panorama Management Server
- Manage Locks for Restricting Configuration Changes
-
-
- Define Access to the Web Interface Tabs
- Provide Granular Access to the Monitor Tab
- Provide Granular Access to the Policy Tab
- Provide Granular Access to the Objects Tab
- Provide Granular Access to the Network Tab
- Provide Granular Access to the Device Tab
- Define User Privacy Settings in the Admin Role Profile
- Restrict Administrator Access to Commit and Validate Functions
- Provide Granular Access to Global Settings
- Provide Granular Access to the Panorama Tab
- Provide Granular Access to Operations Settings
- Panorama Web Interface Access Privileges
-
- Reset the Firewall to Factory Default Settings
-
- Plan Your Authentication Deployment
- Pre-Logon for SAML Authentication
- Configure SAML Authentication
- Configure Kerberos Single Sign-On
- Configure Kerberos Server Authentication
- Configure TACACS+ Authentication
- Configure TACACS Accounting
- Configure RADIUS Authentication
- Configure LDAP Authentication
- Configure Local Database Authentication
- Configure an Authentication Profile and Sequence
- Test Authentication Server Connectivity
- Troubleshoot Authentication Issues
-
- Keys and Certificates
- Default Trusted Certificate Authorities (CAs)
- Certificate Deployment
- Configure the Master Key
- Export a Certificate and Private Key
- Configure a Certificate Profile
- Configure an SSL/TLS Service Profile
- Configure an SSH Service Profile
- Replace the Certificate for Inbound Management Traffic
- Configure the Key Size for SSL Forward Proxy Server Certificates
-
- HA Overview
-
- Prerequisites for Active/Active HA
- Configure Active/Active HA
-
- Use Case: Configure Active/Active HA with Route-Based Redundancy
- Use Case: Configure Active/Active HA with Floating IP Addresses
- Use Case: Configure Active/Active HA with ARP Load-Sharing
- Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall
- Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
- Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3
- HA Clustering Overview
- HA Clustering Best Practices and Provisioning
- Configure HA Clustering
- Refresh HA1 SSH Keys and Configure Key Options
- HA Firewall States
- Reference: HA Synchronization
-
- Use the Dashboard
- Monitor Applications and Threats
- Monitor Block List
-
- Report Types
- View Reports
- Configure the Expiration Period and Run Time for Reports
- Disable Predefined Reports
- Custom Reports
- Generate Custom Reports
- Generate the SaaS Application Usage Report
- Manage PDF Summary Reports
- Generate User/Group Activity Reports
- Manage Report Groups
- Schedule Reports for Email Delivery
- Manage Report Storage Capacity
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
-
- Configure Syslog Monitoring
-
- Traffic Log Fields
- Threat Log Fields
- URL Filtering Log Fields
- Data Filtering Log Fields
- HIP Match Log Fields
- GlobalProtect Log Fields
- IP-Tag Log Fields
- User-ID Log Fields
- Decryption Log Fields
- Tunnel Inspection Log Fields
- SCTP Log Fields
- Authentication Log Fields
- Config Log Fields
- System Log Fields
- Correlated Events Log Fields
- GTP Log Fields
- Audit Log Fields
- Syslog Severity
- Custom Log/Event Format
- Escape Sequences
- Forward Logs to an HTTP/S Destination
- Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
- Monitor Transceivers
-
- User-ID Overview
- Enable User-ID
- Map Users to Groups
- Enable User- and Group-Based Policy
- Enable Policy for Users with Multiple Accounts
- Verify the User-ID Configuration
-
- App-ID Overview
- App-ID and HTTP/2 Inspection
- Manage Custom or Unknown Applications
- Safely Enable Applications on Default Ports
- Applications with Implicit Support
-
- Prepare to Deploy App-ID Cloud Engine
- Enable or Disable the App-ID Cloud Engine
- App-ID Cloud Engine Processing and Policy Usage
- New App Viewer (Policy Optimizer)
- Add Apps to an Application Filter with Policy Optimizer
- Add Apps to an Application Group with Policy Optimizer
- Add Apps Directly to a Rule with Policy Optimizer
- Replace an RMA Firewall (ACE)
- Impact of License Expiration or Disabling ACE
- Commit Failure Due to Cloud Content Rollback
- Troubleshoot App-ID Cloud Engine
- Application Level Gateways
- Disable the SIP Application-level Gateway (ALG)
- Maintain Custom Timeouts for Data Center Applications
-
- Decryption Overview
-
- Keys and Certificates for Decryption Policies
- SSL Forward Proxy
- SSL Forward Proxy Decryption Profile
- SSL Inbound Inspection
- SSL Inbound Inspection Decryption Profile
- SSL Protocol Settings Decryption Profile
- SSH Proxy
- SSH Proxy Decryption Profile
- Profile for No Decryption
- SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
- Perfect Forward Secrecy (PFS) Support for SSL Decryption
- SSL Decryption and Subject Alternative Names (SANs)
- TLSv1.3 Decryption
- High Availability Not Supported for Decrypted Sessions
- Decryption Mirroring
- Configure SSL Forward Proxy
- Configure SSL Inbound Inspection
- Configure SSH Proxy
- Configure Server Certificate Verification for Undecrypted Traffic
- Post-Quantum Cryptography Detection and Control
- Enable Users to Opt Out of SSL Decryption
- Temporarily Disable SSL Decryption
- Configure Decryption Port Mirroring
- Verify Decryption
- Activate Free Licenses for Decryption Features
-
- Policy Types
- Policy Objects
- Track Rules Within a Rulebase
- Enforce Policy Rule Description, Tag, and Audit Comment
- Move or Clone a Policy Rule or Object to a Different Virtual System
-
- External Dynamic List
- Built-in External Dynamic Lists
- Configure the Firewall to Access an External Dynamic List
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Exclude Entries from an External Dynamic List
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Register IP Addresses and Tags Dynamically
- Use Dynamic User Groups in Policy
- Use Auto-Tagging to Automate Security Actions
- CLI Commands for Dynamic IP Addresses and Tags
- Application Override Policy
- Test Policy Rules
-
- Network Segmentation Using Zones
- How Do Zones Protect the Network?
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
PAN-OS 10.2
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
-
- Content Inspection Features
- URL Filtering Features
- Panorama Features
- Networking Features
- GlobalProtect Features
- Management Features
- Decryption Features
- App-ID Features
- IoT Security Features
- Mobile Infrastructure Security Features
- Authentication Features
- Virtualization Features
- Hardware Features
- Enterprise Data Loss Prevention Features
-
- PAN-OS 10.2.11 Known Issues
- PAN-OS 10.2.11-h12 Addressed Issues
- PAN-OS 10.2.11-h10 Addressed Issues
- PAN-OS 10.2.11-h9 Addressed Issues
- PAN-OS 10.2.11-h6 Addressed Issues
- PAN-OS 10.2.11-h4 Addressed Issues
- PAN-OS 10.2.11-h3 Addressed Issues
- PAN-OS 10.2.11-h2 Addressed Issues
- PAN-OS 10.2.11-h1 Addressed Issues
- PAN-OS 10.2.11 Addressed Issues
-
- PAN-OS 10.2.10 Known Issues
- PAN-OS 10.2.10-h17 Addressed Issues
- PAN-OS 10.2.10-h14 Addressed Issues
- PAN-OS 10.2.10-h12 Addressed Issues
- PAN-OS 10.2.10-h10 Addressed Issues
- PAN-OS 10.2.10-h9 Addressed Issues
- PAN-OS 10.2.10-h7 Addressed Issues
- PAN-OS 10.2.10-h5 Addressed Issues
- PAN-OS 10.2.10-h4 Addressed Issues
- PAN-OS 10.2.10-h3 Addressed Issues
- PAN-OS 10.2.10-h2 Addressed Issues
- PAN-OS 10.2.10 Addressed Issues
-
- PAN-OS 10.2.9 Known Issues
- PAN-OS 10.2.9-h21 Addressed Issues
- PAN-OS 10.2.9-h19 Addressed Issues
- PAN-OS 10.2.9-h18 Addressed Issues
- PAN-OS 10.2.9-h16 Addressed Issues
- PAN-OS 10.2.9-h14 Addressed Issues
- PAN-OS 10.2.9-h11 Addressed Issues
- PAN-OS 10.2.9-h9 Addressed Issues
- PAN-OS 10.2.9-h1 Addressed Issues
- PAN-OS 10.2.9 Addressed Issues
-
- PAN-OS 10.2.8 Known Issues
- PAN-OS 10.2.8-h21 Addressed Issues
- PAN-OS 10.2.8-h19 Addressed Issues
- PAN-OS 10.2.8-h18 Addressed Issues
- PAN-OS 10.2.8-h15 Addressed Issues
- PAN-OS 10.2.8-h13 Addressed Issues
- PAN-OS 10.2.8-h10 Addressed Issues
- PAN-OS 10.2.8-h4 Addressed Issues
- PAN-OS 10.2.8-h3 Addressed Issues
- PAN-OS 10.2.8 Addressed Issues
-
- PAN-OS 10.2.7 Known Issues
- PAN-OS 10.2.7-h24 Addressed Issues
- PAN-OS 10.2.7-h21 Addressed Issues
- PAN-OS 10.2.7-h19 Addressed Issues
- PAN-OS 10.2.7-h18 Addressed Issues
- PAN-OS 10.2.7-h16 Addressed Issues
- PAN-OS 10.2.7-h12 Addressed Issues
- PAN-OS 10.2.7-h8 Addressed Issues
- PAN-OS 10.2.7-h6 Addressed Issues
- PAN-OS 10.2.7-h3 Addressed Issues
- PAN-OS 10.2.7-h1 Addressed Issues
- PAN-OS 10.2.7 Addressed Issues
PAN-OS 10.2.11 Addressed Issues
PAN-OS 10.2.11 addressed issues.
Issue ID | Description |
---|---|
PAN-259997 | (PA-3410, PA-3420, and PA-3430 firewalls only) Fixed an issue where the install failed when upgrading from PAN-OS 10.2.3-h3 and later 10.2 releases to PAN-OS 10.2.10 due to the number of configured vsys zones exceeding the zone limit in PAN-OS 10.2.10.
|
PAN-259480 |
Fixed an issue where the varrcvr process stopped responding after running out of
memory due to how the process queued and dequeued files for WildFire
file forwarding when a WildFire Analysis Security Profile was
enabled.
|
PAN-259473 | (PA-5450 firewalls only) Fixed an issue where the chassis shut down when FAN1 was removed.
|
PAN-259344 | Fixed an issue where performing a configuration commit on a firewall locally or from Panorama
caused a memory leak related to the configd process and
resulted in an out-of-memory (OOM) condition.
|
PAN-257925 | (CN-Series firewalls only) Fixed an issue where the CLI command show system setting ctd state did not work as expected.
|
PAN-257601
|
(PA-5450 firewalls only) Fixed an issue where Networking
Cards (NC) experienced an internal link fault which caused path
monitoring failure on the Dataplane Processing Card (DPC).
|
PAN-257515
|
Fixed an issue where Possible Domain Fronting Detection for HTTP/2
generated false positives. With this change, domain fronting is
limited to HTTP/1.
|
PAN-257355
|
Fixed an issue where a false positive HTTP/TLS evasion alert was
generated when the domain had DNS load balance.
|
PAN-257462 | Fixed an issue related to the varrcvr process where the management plane CPU was higher than expected during WildFire updates.
|
PAN-257432 | Fixed an issue on Panorama where the reportd process stopped responding, which caused a log query issue.
|
PAN-257021 | "Fixed an issue on the web interface where Match Evidence log details for Monitor > Correlated events did not populate."
|
PAN-256939 | Fixed an issue on the firewall where disk space was low in /opt/pancfg/, which caused dynamic content installation to fail.
|
PAN-256738 | (VM-Series firewalls in HA configurations only) Fixed an issue where BGP routes from the active firewall were lost when the passive firewall was rebooted.
|
PAN-256666 | Fixed an issue where the configd process stopped responding when Commit and Push operations were performed on multiple device groups.
|
PAN-256223
|
Fixed an issue where device telemetry log collection filled the root
partition.
|
PAN-255163 | (CN-Series firewalls only) Fixed an issue where the system database key that stored the configuration status of the dataplane pod was not updated frequently.
|
PAN-254373 |
Fixed an issue where the firewall did not handle error code 500 responses from the WildFire cloud correctly.
|
PAN-253085 | Fixed an issue where the firewall restarted when the parsing of the cross-pkt http origin header failed when processing a translator website.
|
PAN-252411
|
Fixed an issue where, when log files were purged from the rollup
summary logs, the summary report still used the rollup summary data,
which resulted in the summary report displaying less data.
|
PAN-251929 | Fixed an issue where inbound decryption did not work when FIPS self-tests were turned on.
|
PAN-251847 | Fixed an issue on log collectors where the incoming log rate was lower than expected.
|
PAN-251676 | Fixed an issue on Panorama appliances in large-scale deployments where configd process core files consumed more space in the /opt/panlogs partition than was available.
|
PAN-251656
|
Fixed an issue where enabling lockless QoS caused traffic
disruptions.
|
PAN-250371 | Fixed an issue where the logrcvr process stopped responding, which caused commits to fail with the error message Management server failed to send phase 1 to client logrcvr.
|
PAN-250062 | Fixed an issue where device telemetry failed after upgrading due to bundle generation failure.
|
PAN-249814
|
Fixed an issue where multiple all_task processes stopped
responding, which caused the dataplane to fail.
|
PAN-248975 | Fixed an issue on the Panorama web interface where no content was displayed after logging in.
|
PAN-248508 | (VM-Series firewalls on Amazon Web Services (AWS) environments only) Fixed an issue where the firewall did not perform MSS clamping when GWLB endpoints were mapped to static subinterfaces.
|
PAN-248211 |
Fixed an issue on Panorama where commits failed when Advanced Routing
was enabled.
|
PAN-247257 | Fixed an issue where the useridd process stopped responding, which caused the firewall to reboot.
|
PAN-247099 | Fixed an issue where the firewall decrypted traffic unexpectedly when the client hello was spread across multiple packets.
|
PAN-246707 | Fixed an issue where failover was not triggered when multiple processes stopped responding.
|
PAN-246420 | (PA-5450 Series firewalls only) Fixed an issue where the firewall rebooted unexpectedly during an upgrade.
|
PAN-245428
|
Fixed an issue where FIB entries aged out and were incorrectly
removed after an HA failover event.
|
PAN-245157 | (VM-Series firewalls in Microsoft Azure environments only) Fixed an issue where the firewall restarted after an HA failover when DPDK was enabled.
|
PAN-244894 | |
PAN-244227 | Fixed an issue where inconsistent FIB entries across the dataplane were not detected.
|
PAN-242601 | |
PAN-242519 | Fixed an issue where scheduled email reports failed if the @ symbol before the mail client was missing.
|
PAN-242414
|
Fixed an issue where the CLI command show
ntp displayed the NTP status as
error instead of
sync.
|
PAN-242146 | Fixed an issue where the DHCP was unable to find the interface, which resulted in the DHCP
process and all connected DHCP services to stop responding.
|
PAN-240993 | Fixed an issue where you were unable to revert a sort in the task manager in the Admin column.
|
PAN-240251 | Fixed an issue where the vldmgr process incorrectly restarted during an Elasticsearch restart.
|
PAN-239952 | (Firewalls in active/passive HA configurations only) Fixed an issue where HA sync messages from the active firewall took longer than expected to reach the passive firewall.
|
PAN-239575
|
Fixed an issue where the TCP window size of the server-to-client flow
for HTTP/2 connection sessions decremented if HTTP/2 stream sessions
were closed due to a Security Profile or a Security policy rule.
This caused the connection session to have a TCP window of 0.
|
PAN-239337 | Fixed an issue where the log_index was suspended and corrupted BDX files flooded the
index_log.
|
PAN-239271 | Fixed an issue where changing the firewall's DNS servers could lead to connectivity to the hostname-configured User-ID agent.
|
PAN-238705 | (PA-400 Series firewalls only) Fixed an issue where HA link-monitor did not work.
|
PAN-238562 | Fixed an issue where log collectors stopped responding when gathering reports from Panorama.
|
PAN-238508 | Fixed an issue where the routed process created excessive logs in the log file.
|
PAN-238355 | Fixed an issue where, when a device group was not successfully renamed, unexpected configuration changes to the device group structure occurred.
|
PAN-238249 | Fixed an issue where static route path monitor packets from a multislot chassis were intercepted
by the firewall performing Static NAT (SNAT).
|
PAN-237678 | Fixed an issue with firewalls in active/passive HA configurations where the passive firewall displayed the error message Unable to read QSFP Module ID when the passive link state was set to shutdown.
|
PAN-237582 | Fixed an issue where logs were intermittently missing on the log collector due to missing aliases for some indices.
|
PAN-237562 | Fixed an issue where firewalls generated link-change system logs for SFP ports even when no cable was connected to the ports.
|
PAN-237478 | Fixed an issue where the Traffic log displayed 0 bytes for denied sessions.
|
PAN-237369 | (PA-1420 firewalls only) Fixed an issue where the all_task process stopped responding, which caused the firewall to become unresponsive.
|
PAN-236497 | Fixed an issue where the firewall was unable to purge expired GTP-U sessions that remained as allocated sessions even after the TTL was expired.
|
PAN-236261 | Fixed an issue where a proxy server was used for external dynamic list communication even when
the dataplane interface was configured through service routes.
|
PAN-235877
|
Fixed an issue where the firewall failed to start up after upgrading
PAN-OS due to system file corruption.
|
PAN-235336 | Fixed an issue where the character limit for dgname exceeded the supported number of characters (31), which caused device group names to be partially displayed during a validate operation.
|
PAN-235081 | (VM-Series firewalls only) Fixed an issue where the firewall sent packets to its own interface after configuring NAT64.
|
PAN-234596 | Fixed an issue on firewalls in active/passive HA configurations where the passive firewall incorrectly became active after a reboot.
|
PAN-234560 | Fixed an issue where the daily summary report displayed IPv6 addresses instead of IPv4 addresses.
|
PAN-234459 | Fixed an issue with the firewall web interface where local SSL decryption exclusion cache entries were not visible.
|
PAN-233689 | (PA-7000 Series firewalls only) Fixed an issue where the Log Forwarding Card (LFC) disk quota usage was reported as 0 MB for all log types.
|
PAN-233541 | Fixed an issue where device group and template administrators with access to a specific virtual system were able to see logs for all virtual systems via Context Switch.
|
PAN-233366 | Fixed an issue where the DHCP server sent DHCP ACK messages as broadcasts instead of unicasts
when responding to DHCP INFORM messages.
|
PAN-233129
|
Fixed an issue where the firewall sent duplicate logs to syslog
server when the log forwarding profile was configured with
Shared enabled and was used in a Security
policy rule.
|
PAN-232368 | Fixed an issue where commits failed with the error message Error: Max. user groups used in policy 1389 exceed capacity (1000).
|
PAN-231802 | Fixed an issue where an Advanced Routing BGP session flapped with commits when BGP peer authentication was enabled.
|
PAN-230326 | Fixed an issue where the Network Packet Broker (NPB) user interface was incorrectly displayed on unsupported platforms.
|
PAN-229873 | (PA-7050 firewalls only) Fixed an issue related to brdagent process errors.
|
PAN-229606 | Fixed an issue where the brdagent process stopped responding after an upgrade due to initialization failure.
|
PAN-227939 | Fixed an issue where the all_task process stopped responding due to high wifclient memory usage, which caused the firewall to reboot.
|
PAN-227887 | Fixed an issue where IP address checksums were calculated incorrectly.
|
PAN-225213 | Fixed an issue where Push All Changes displayed changes that were already committed in the push scope for another device group after performing a selective commit and selective push to the first device group.
|
PAN-224938 | Fixed an issue where the CLI command settings for set system setting logging max-log-rate did not persist after a mgmtsrvr process restart.
|
PAN-224584 | Fixed an issue on Panorama where generating UAR reports for 30 days or more was slower than expected, and reports showed the same logs repeatedly in a loop.
|
PAN-224365 | Fixed an issue where excessive network path monitoring messages were generated in the system logs.
|
PAN-221711 | Fixed an issue on the firewall that caused the LFC to stop responding, which impacted logging
capability.
|
PAN-221571 | Fixed an issue on the web interface where the Security policy rule hit count remained at 0 for some rules even though the traffic logs showed live hits.
|
PAN-220881 | Fixed an issue where the CLI command show logging-status did not correctly display the last log created and forwarded timestamps.
|
PAN-220500 | (PA-5450 and PA-400 firewalls only) Fixed an issue where the request shutdown system CLI command did not completely shut down the system.
|
PAN-217307 | Fixed an issue where the log-start and log-end policy rule filters did not return reliable results when set to no or yes.
|
PAN-215670 | Fixed an issue where local reports and scheduled reports displayed different data.
|
PAN-215561 | Fixed an issue where GlobalProtect authentication failed when new users were added to an existing local database group user list.
|
PAN-214177 | Fixed an issue where template configurations were not properly pushed to the firewall during an export or push of the device configuration bundle.
|
PAN-214100 | Fixed an issue where selecting a threat name under Threat Monitor displayed the threat ID instead of the threat name.
|
PAN-209542 | (PA-5450 firewalls only) Fixed an issue where, when a log interface was configured, the
log interface and the management interface remained connected to the
log collector when upgrading to PAN-OS 10.2.2.
|
PAN-205482 | Fixed an issue related to the configd process where Panorama displayed the error
Server not responding when editing policy
rules.
|
PAN-198622 | Fixed an issue where username fields under Policies were marked with the same color as the first tag associated to that rule.
|
PAN-196395 | (PA-5450 firewalls only) Fixed an issue where the firewall accepted 12 Aggregate
Ethernet interfaces, but you were unable to configure interfaces
9-12 via the web interface.
|
PAN-194968 | Fixed an issue on the web interface where Antivirus updates were not able to be downloaded and installed unless Apps and Threads updates were downloaded and installed first, and the Antivirus content list displayed as blank. The resulting error message from the update server was also not reflected in the web interface.
|
PAN-191632 | Fixed an issue where console sessions were not cleared after the set idle timeout value.
|