PAN-OS 10.2.16 Known Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
PAN-OS 10.2.16 Known Issues
PAN-OSĀ® 10.2.16 known issues.
The following list includes only outstanding known issues specific to PAN-OSĀ®
10.2.16. This list includes issues specific to Panoramaā¢, GlobalProtectā¢, VM-Series
plugins, and WildFireĀ®, as well as known issues that apply more generally or that are
not identified by an issue ID.
Issue ID | Description |
|---|---|
WF500-5854 | The WildFire analysis report on the firewall log
viewer (MonitoringWildFire Submissions) does not display the following data fields: File
Type, SHA-256, MD-5, and File Size". Workaround:
Download and open the WildFire analysis report in the PDF format
using the link in the upper right-hand corner of the
Detailed Log View. |
WF500-5843 | In a WildFire appliance cluster, issuing the
show cluster-all peers CLI command when a
node within the cluster is being rebooted generates the following
error: Server error : An error
occured. |
WF500-5840 | The sample analysis statistics that are returned when
issuing the show wildfire local statistics
CLI command in WildFire appliance cluster deployments may not
accurately reflect the number of samples that have been
processed. |
WF500-5823 | The following WildFire appliance CLI command does not
return a signature generation status as expected: show
wildfire global signature-status. This does not
corrupt or otherwise prevent the WildFire appliance from analyzing a
sample. |
WF500-5781 | The WildFire appliance might erroneously generate and
log the following device certification error: Device
certificate is missing or invalid. It cannot be
renewed. |
WF500-5754 | In WildFire appliance clusters, issuing the
show cluster controller CLI command
generates an error when an IPv6 address is configured for the
management interface but not for the cluster
interface. Workaround: Ensure all WildFire
appliance interfaces that are enabled use matching protocols (all
IPv4 or all IPv6). |
WF500-5632 | The number of registered WildFire appliances reported
in Panorama (PanoramaManaged WildFire AppliancesFirewalls ConnectedView) does not accurately reflect the current status of
connected WildFire appliances. |
|
PAN-303959
|
Traffic that is incorrectly identified as
unknown-tcp/unknown-udp
eventually drops due to an App-ID resource limitation issue.
|
|
PAN-297775
|
The wrong vsys is referenced under Visible Virtual System after every
local firewall commit (auto-commit, commit, content install) if the
display name of the vsys matches another vsys ID (for example, the
vsys2 display name is vsys1). The incorrect vsys reference causes
inter-vsys routing to fail.
Workaround: Change the vsys display name so that it doesn't
reference an existing vsys ID.
|
|
PAN-295255
|
Palo Alto Networks next-generation firewalls may experience service
disruptions due to all_task process crashes when
deployed in environments having non-uniform MTU and are terminating
IPSec tunnels.
|
|
PAN-293673
This issue is now resolved. See PAN-OS 10.2.16-h4 Addressed Issues
|
When the firewall generates a high volume of logs and attempts to
export these logs to an FTP server, it may consume excessive memory
leading to all PAN-OS processes crashing.
|
|
PAN-292344
|
When upgrading from PAN-OS 10.2.9-h1 to PAN-OS 10.2.13-h5, the
firewall reboots repeatedly and enters maintenance mode.
|
|
PAN-291716
This issue is now resolved. See PAN-OS 10.2.17 Addressed Issues.
|
During a commit, the firewall experiences an out-of-memory (OOM)
condition due to a memory leak and displays an error message. This
issue causes the device to crash and reboot unexpectedly.
|
|
PAN-291288
|
An active firewall might unexpectedly reboot due to a
pan_task crash caused by a page allocation
failure. This issue is observed after a period of runtime with
traffic and telemetry collection.
|
|
PAN-290996
This issue is now resolved. See PAN-OS 10.2.16-h1 Addressed Issues
|
When performing an SNMP walk, the Connections Per Second (CPS)
counters incorrectly return a value of 0 for each virtual system
(VSYS), despite the firewall actively processing connections.
|
|
PAN-290088
|
When pushing configurations from Panorama to a firewall, a memory
leak might occur in the firewall's configd process,
particularly when the configurations contain shared policies. Each
configuration push causes the configd process to
consume additional memory that is not released after the commit
completes.
|
|
PAN-288097
This issue is now resolved. See PAN-OS 10.2.18 Addressed Issues
|
(Firewalls in HA configurations only) Routed process may
stop responding after changing MTU or any link parameters when OSPF
and PIM are enabled on the same interface.
|
|
PAN-287803
|
Users might be unable to access some URLs due to issues involving the
accumulation proxy and the Path Maximum Transmission Unit (MTU).
To address this issue, use one of the following workarounds:
|
|
PAN-287056
This issue is now resolved. See PAN-OS 10.2.16-h1 Addressed Issues
|
A BGP export policy rule that matches on a next hop fails to block
the advertisement of static routes, and the firewall incorrectly
matches the egress interface IP address instead of the original
next-hop IP address of the static route, which causes the deny rule
to fail.
|
|
PAN-286306
This issue is now resolved. See PAN-OS 10.2.16-h1 Addressed Issues
|
When getting transceiver information from ESCC for SFP 25G modules,
the transceiver code incorrectly displays
Unknown instead of
25GBase-SR.
|
|
PAN-286231
|
When performing a partial Commit and Push on Panorama, there
is a risk that unintended configuration changes might be pushed to a
firewall.
This issue is more likely to occur in the following scenarios:
Workaround: Perform one of the following steps:
|
|
PAN-284073
|
The firewall web interface becomes inaccessible and commits fail.
|
|
PAN-284067
|
A cumulative memory leak in the devsrvr
process gets progressively worse whenever the CLI command
show running application statistics is
issued. This memory leak will gradually consume system memory and
produce an out-of-memory (OOM) condition, leading to an eventual
firewall reboot.
Workaround: Avoid using the CLI command: show
running application statistics.
|
|
PAN-281370
|
The Advanced WildFire Inline ML models OOXML
and Mach-O erroneously display as being
available from the CLI; however, they are only available on PAN-OS
11.1.3 and later releases.
|
|
PAN-279901
(PAN-OS 10.2.16 and PAN-OS 10.2.16-h1)
|
When decryption is enabled, segmented Client Hello packets can cause
website access issues and memory leaks under the following
conditions:
|
|
PAN-237106
| LSVPN satellite certificates may be generated with
serial numbers exceeding 40 hexadecimal characters. This causes
certificate revocation and deletion operations to fail with the
following error messages:
To resolve this issue, use the following CLI
commands with the LSVPN satellite serial number to manually delete
or revoke the affected certificates: Delete certificate
information:delete sslmgr-store certificate-info
portal name <name> serialno
<satellite_serial> Revoke
satellite certificates:delete sslmgr-store
satellite-info-revoke-certificate portal
<name> serialno
<list_of_satellite_serials> |
|
PAN-221775
|
A Malformed Request error is displayed
when you Test Connection for an email server
profile (DeviceServer ProfilesEmail) using SMTP over TLS and the
Password includes an ampersand
(&).
|
|
PAN-213119
|
PA-5410 and PA-5420 firewalls display the following error when you
view the Block IP list (MonitorBlock IP):
show -> dis-block-table is
unexpected
|
PAN-211531 | On the Panorama management server, admins can still perform a selective push to managed firewalls when Push All Changes and Push for Other Admins are disabled in the admin role profile (PanoramaAdmin Roles). |
PAN-196758 | On the Panorama management server, pushing a
configuration change to firewalls leveraging SD-WAN erroneously show
the auto-provisioned BGP configurations for SD-WAN as being edited
or deleted despite no edits or deletions being made when you
Preview Changes (CommitPush to DevicesEdit Selections or CommitCommit and PushEdit Selections). |
PAN-194996 | When using a 10.2.2 Panorama to manage a Panorama
Managed Prisma Access 3.1.2 deployment, allocating bandwidth for a
remote network deployment fails (the OK button is grayed
out). Workaround: Retry the operation. |
PAN-194519 | (PA-5450 firewall only) Trying to configure a
custom payload format under DeviceServer ProfilesHTTP yields a Javascript error. |
PAN-194515 | (PA-5450 firewall only) The Panorama web
interface does not display any predefined template stack variables
in the dropdown menu under DeviceSetupLog InterfaceIP Address. Workaround: Configure the log interface
IP address on the individual firewall web interface instead of on
Panorama. |
PAN-194424 | (PA-5450 firewall only) Upgrading to PAN-OS
10.2.2 while having a log interface configured can cause both the
log interface and the management interface to remain connected to
the log collector. Workaround: Restart the log receiver
service by running the following CLI command:
|
PAN-194202 | (PA-5450 firewall only) If the management
interface and logging interface are configured on the same
subnetwork, the firewall conducts log forwarding using the
management interface instead of the logging interface. |
PAN-190727 | (PA-5450 firewall only) Documentation for
configuring the log interface is unavailable on the web interface
and in the PAN-OS Administratorās Guide. |
PAN-189076 | On a firewall with Advanced Routing enabled, OSPFv3
peers using a broadcast link and a designated router (DR) priority
of 0 (zero) are stuck in a two-way state after HA
failover. Workaround: Configure at least one OSPFv3
neighbor with a non-zero priority setting in the same broadcast
domain. |
PAN-187685 | On the Panorama management server, the Template Status
displays no synchronization status (PanoramaManaged DevicesSummary) after a bootstrapped firewall is successfully added
to Panorama. Workaround: After the bootstrapped
firewall is successfully added to Panorama, log in to the Panorama web
interface and select CommitPush to Devices. |
PAN-187643 | If you enable SCTP security using a Panorama template
when SCTP INIT Flood Protection is enabled in
the Zone Protection profile using Panorama and you commit all
changes, the commit is successful but the SCTP
INIT option is not available in the Zone Protection
profile. Workaround: Log out of the firewall and log in
again to make the SCIT INIT option available
on the web interface. |
PAN-187407 | The configured Advanced Threat Prevention inline cloud
analysis action for a given model might not be honored under the
following condition: If the firewall is set to Hold
client request for category lookup and the action
set to Reset-Both and the URL cache has been
cleared, the first request for inline cloud analysis will be
bypassed. |
PAN-187370 | On a firewall with Advanced Routing enabled, if there
is also a logical router instance that uses the default
configuration and has no interfaces assigned to it, this will result
in terminating the management daemon and main routing daemon in the
firewall during commit. Workaround: Do not use a
logical router instance with no interfaces bound to it. |
PAN-186283 | Templates appear out-of-sync on Panorama after
successfully deploying the CFT stack using the Panorama plugin for
AWS. Workaround: Use CommitPush to Devices to synchronize the templates. |
PAN-186282 | On HA deployments on AWS and Azure, Panorama fails to
populate match criteria automatically when adding dynamic address
groups. Workaround: Reboot the Panorama HA
pair. |
PAN-184406 | Using the CLI to add a RAID disk pair to an M-700
appliance causes the dmdb process to crash. Workaround:
Contact customer support to stop the dmdb process before adding a
RAID disk pair to a M-700 appliance. |
PAN-183404 | Static IP addresses are not recognized when "and"
operators are used with IP CIDR range. |
PAN-181933 | If you use multiple log forwarding cards (LFCs) on the
PA-7000 series, all of the cards may not receive all of the updates
and the mappings for the clients may become out of sync, which
causes the firewall to not correctly populate the Source User column
in the session logs. |
PAN-181823 | On a PA-5400 Series firewall (minus the PA-5450),
setting the peer port to forced 10M or 100M speed causes any
multi-gigabit RJ-45 ports on the firewall to go down if they are set
to Auto. |
PAN-180661 | On the Panorama management server, pushing an
unsupported Minimum Password Complexity (DeviceSetupManagement) to a managed firewall erroneously displays
commit time out as the reason the
commit failed. |
PAN-180104 | When upgrading a CN-Series as a DaemonSet
deployment to PAN-OS 10.2, CN-NGFW pods fail to connect to CN-MGMT
pod if the Kubernetes cluster previously had a CN-Series as a
DaemonSet deployment running PAN-OS 10.0 or
10.1. Workaround: Reboot the worker nodes before
upgrading to PAN-OS 10.2. |
PAN-178194 | A user interface issue in PAN-OS renders the contents
of the Inline ML tab in the URL
Filtering Profile inaccessible on firewalls licensed
for Advanced URL Filtering. Additionally, a message indicating that
a License required for URL filtering to
function is unavailable displays at the bottom of
the UI. These errors do not affect the operation of Advanced URL
Filtering or URL Filtering Inline ML. Workaround:
Configuration settings for URL Filtering Inline ML must be applied
through the CLI. The following configuration commands are
available:
|
PAN-175915 | When the firewall is deployed on N3 and N11 interfaces
in 5G networks and 5G-HTTP/2 traffic inspection is enabled in the
Mobile Network Protection Profile, the traffic logs do not display
network slice SST and SD values. |
PAN-171938 | No results are displayed when you Show
Application Filter for a Security policy rule (PoliciesSecurityApplicationValueShow Application Filter). |