PAN-OS 10.2.3 Addressed Issues
PAN-OS® 10.2.3 addressed issues.
Fixed an issue where ACC reports did not work for custom RBAC users when more than 12 access domains were associated with the username.
Fixed an issue where the Log Forwarding Card (LFC) failed to forward logs to the syslog server.
Fixed an issue where, when decryption was enabled, Safari and Google Chrome browsers on Apple Mac computers rejected the server certificate created by the firewall because the Authority Key Identifier was copied from the original server certificate and did not match the Subject Key Identifier on the forward trust certificate.
PA-5450 firewalls only) Fixed an issue where
dmin tcpdumpwas hardcoded to eth0 instead of bond0.
PA-5400 Series only) Fixed an issue where swapping Network Processing Cards (NPCs) caused high root partition use.
Fixed an issue where, when predicts for UDP packets were created, a configuration change occurred that triggered a new policy lookup, which caused the dataplane stopped responding when converting the predict. This resulted in a dataplane restart.
Fixed an issue where using the
load config partialCLI command to x-paths removed address object entries from address groups.
PA-5400 Series firewalls) Fixed an issue where the firewall forwarded packets to the incorrect aggregate ethernet interface when Policy Based Forwarding (PBF) was used.
Fixed an issue where, after upgrading to PAN-OS 10.2 release, the firewall ran a RAID rebuild for the log disk after ever every reboot.
PA-5450 firewalls only) Fixed an issue where jumbo frames were dropped.
Fixed an issue where restarting the Network Processing Card (NPC) or the Data Processing Card (DPC) did not bring up all the network interfaces.
PA-7000 Series SMC-B firewalls only) Fixed an issue where the firewall did not capture data when the active management interface was MGT-B.
PA-3200 Series, PA-5200 Series, and PA-5400 Series firewalls only) Fixed an issue where GlobalProtect IPSec tunnels disconnected at half the inactivity logout timer value.
Fixed an issue on Panorama appliances configured as log collectors where Panorama repeatedly rebooted into maintenance mode.
Fixed an issue where WildFire submission logs did not load on the firewall web interface.
Fixed an issue with firewalls in Microsoft Azure environments where BGP flapping occurred due to the firewall incorrectly treating capability from BGP peering as unsupported.
WF-500 and WF-500-B appliances only) Fixed an issue where log system forwarding did not work over a TLS connection.
Fixed an issue on Panorama where, if you added a new local or non-local administrator account or an admin user to a template, authentication profiles were incorrectly referenced.
Fixed an issue where URL filtering logs (
) incorrectly truncated a 16KB Header value and did not display the Header values that followed the truncated 16KB header.
PA-7000 Series firewalls with LFCs (Log Forwarding Cards), PA-7050 firewalls with SMC-B (Switch Management Cards), and PA-7080 firewalls only) Fixed an issue where the
logrcvr_statisticsoutput was not recorded in mp-monitor.log.
Fixed an issue in ESXi where the bootstrapped VM-Series firewalls with the Software Licensing Plugin had
:xxxappended to their hostnames.
Fixed an issue where the MTU from SD-WAN interfaces was recalculated after a configuration push from Panorama or a local commit, which caused traffic disruption.
Fixed an issue where the GlobalProtect application failed to connect when a user or group was configured under the portal
Config Selection Criteria.
PA-5410, PA-5420, PA-5430, and PA-5440 firewalls in HA configurations only) Fixed an issue where HA1-A and HA1-B port information didn't match to front panel mappings.
PA-5450 firewalls only) Fixed an issue where slot 2 did not use all features correctly if a DPC was used instead of an NPC.
Fixed an issue on firewalls in high availability (HA) active/passive configurations where
_ha_d_session_msgbufoverflowed on the passive firewall during an upgrade, which caused the firewall to enter a non-functional state.
VM-Series firewalls in Microsoft Azure environments only) Fixed an issue where the firewall stopped monitoring HA failure and floating IP addresses did not get moved to the newly active firewall.
Fixed an issue where advanced mode factory reset (
) was only compatible with PAN-OS 10.1.3 or later version images.
select a specific image
Fixed an issue where the firewall device server failed to resolve URL cloud FQDNs, which interrupted URL category lookup.
VM-Series firewalls only) Fixed an issue where the GlobalProtect portal was not accessible.
Fixed an issue on the firewall where the dataplane CPU spiked, which caused traffic to be affected during commits or content updates.
PA-3200 Series firewalls only) Fixed an issue where, when the HA2 HSCI connection was down, the system log displayed
Port HA1-b: downinstead of
Port HSCI: Down.
PA-5400 Series firewalls only) Fixed an issue where the firewall incorrectly handled internal transactions.
Fixed an issue where SAML authentication failed during commits with the following error message:
revocation status could not be verified (reason: ).
VM-Series firewalls only) Fixed an issue where, during Layer-7 packet inspection where traffic was being inspected for threat signature and data patterns, multiple processes stopped responding.
PA-220 firewalls only) Fixed an issue where the firewall reached the maximum disk usage capacity repeatedly in one day.
Fixed an issue where RTP packets dropped due to conflicting duplicate flows.
Fixed an issue where, when SAML was configured as the authentication method for GlobalProtect, the SAML page did not load when using a browser.
Fixed an issue where duplicate log entries were displayed on Panorama.
Fixed an issue where auto-commits failed after an upgrade if an imported certificate size was greater than the size of a buffer.
PA-220 firewalls only) Fixed an issue where a commit and push from Panorama caused high dataplane CPU utilization.
Fixed an issue where the error message
Machine Learning found viruswas displayed in threat CSV logs as
Threat ID/Namewhen WildFire Inline ML detected malware.
Fixed an issue where the firewall dropped TCP traffic inside IPSec tunnels.
PA-7050-SMC-B firewalls only) Fixed an issue where the LFC syslog-ng service failed to start after an upgrade.
VM-Series firewalls only) Fixed an issue where uploading certificates via API failed within the first 30 minutes of a bootstrap.
PA-5400 Series firewalls only) Fixed an issue where the firewall incorrectly processed path monitoring packets.
Fixed an issue where ARP broadcasts occurring in the same time interval and network segment as HA path monitoring pings triggered an ARP cache request, which prevented the firewall from sending ICMP echo requests to the monitored destination IP address and caused an HA path monitoring failover.
Bootstrapped VM-Series firewalls in Microsoft Azure environments only) Fixed an issue where the firewall did not automatically receive the Cortex Data Lake license.
Fixed an issue where, when next hop MAC address entries weren't found on the offload processor for active traffic, update messages flooded the firewall, which caused resource contention and traffic disruption.
Fixed an issue where monthly scheduled reports did not display information after upgrading to PAN-OS 10.2.0.
Fixed an issue where the Panorama appliance was unable to generate scheduled custom reports due to the large number of files stored in the
Fixed an issue where an SCP export of the device state from the firewall added single quotes ( ' ) to the filename.
Fixed an issue where, after an upgrade to PAN-OS 10.1.5, Global Find did not display all results related to a searched item.
Fixed an issue where the NAT pool leaked for passive mode FTP predict sessions.
Fixed an issue where Panorama became inaccessible when after a push to the collector group.
PA-5400 Series firewalls only) Fixed an issue where the session log storage quota could not be changed via the web interface.
Fixed an issue where, on Apple iOS devices, SAML authentication did not connect to the GlobalProtect portal.
Fixed an issue where the Elasticsearch process stopped responding, which caused an OOM condition.
Fixed an issue in ACC reports where IPv6 addresses were displayed instead of IPv4 addresses.
Fixed an issue with the web interface where the template stack didn't show inherited values of
Template > Authentication Portal Settings.
Fixed an issue where a predict session didn't match with the traffic when both source NAT and destination NAT were enabled.
Fixed an issue where you were unable to configure dynamic address groups to use more than 64,000 IP addresses in a Security policy.
Fixed an issue where TCP packets were dropped during the first zone transfer when DNS security was enabled.
Fixed an issue where the Panorama appliance didn't display logs or generate reports for a device group containing MIPs platform that forwarded logs to Cortex Data Lake.
Fixed an issue where BGP routes were lost or uninstalled after disabling jumbo frames on the firewall.
Fixed an issue where the dataplane went down, which caused an HA failover.
Fixed an issue where the firewall dropped packets when the session payload was too large.
Fixed an issue where canceling a commit caused the commit process to remain at 70% and the firewall had to be rebooted.
Fixed an issue where the serial number displayed as
unknownafter running the
show system stateCLI command.
VM-Series firewalls only) Fixed an issue where, on firewalls licensed with Software NGFW Credit (VM-FLEX-4 and higher), HA clustering was unable to be established.
Fixed an issue where you were unable to configure a QoS Profile as percentage for Clear Text Traffic.
Fixed an issue where the Cortex Data Lake connection incorrectly displayed as disconnected when a service route was in use.
Fixed an issue where, when hip-redistribution is enabled, Panorama doesn't display a part of HIP information.
Fixed an issue where NetFlow packets contained incorrect octet counts.
Fixed an issue where Panorama displayed a discrepancy in RAM configured on the VMware host.
Fixed an issue on Panorama where performing a commit and push intermittently failed to push the committed configuration to managed firewalls.
VM-Series firewalls only) Fixed an issue where the firewall rebooted after receiving large packets while in DPDK mode on Azure virtual machines running CX4 (MLx5) drivers.
Fixed an issue where logging in to the Panorama web interface did not work and the following error message displayed:
Timed out while getting config lock. Please try again.
Fixed an issue on Panorama where using the
name-of-threatid contains log4jfilter didn't produce expected results.
M-700 appliances in Log Collector mode only) Fixed an issue on the Panorama management server where the Panorama appliance failed to connect to Panorama when added as a managed log collector.
PA-5200 Series firewalls only) Fixed an issue where the firewall generated pause frames, which caused network latency.
Fixed an issue with SCEP certificate enrollment where the incorrect Registration Authority (RA) certificate was chosen to encrypt the enrollment request.
Fixed an issue where a bootstrapped firewall connected only to the first log collector in a log collector group.
Fixed an issue where enabling SSL decryption with a Hardware Security Model (HSM) caused a dataplane restart.
Fixed an issue with Panorama appliances in HA configurations where dedicated log collectors did not send local system or configuration logs to both Panorama appliances.
Fixed an issue where SNMP reported the
panVsysActiveUdpCpsvalue to be 0.
Fixed an issue where VPN tunnels in SD-WAN flapped due to duplicate tunnel IDs.
Fixed an issue where system disk migration failed.
Fixed an issue where
Shared Gatewaywas not visible in the
Virtual Systemdrop down when configuring a Layer3 aggregate subinterface.
Fixed an issue with the web interface where, when only the Advanced URL Filtering license was activated, the message
License required for URL filtering to functionwas incorrectly displayed and the
URL Filtering Profile > Inline MLsection was disabled.
Fixed an issue where
ACC > App Scope > Threat Monitorshowed
NO DATA TO DISPLAY.
Fixed an issue where you were unable to revert HA mode settings to the default values from the web interface.
Fixed an issue where, when NetBIOS format (domain\user) was used for the IP address-to-username mapping and the firewall received the group mapping information from the Cloud Identity Engine, the firewall did not match the user to the correct group.
Fixed an issue that occurred when two FQDNs were resolved to the same IP address and were configured as the same src/dst of the same rule. If one FQDN was later resolved to a different IP address, the IP address resolved for the second FQDN was also changed, which caused traffic with the original IP address to hit the incorrect rule.
Fixed an issue where packets were dropped unexpectedly due to errors parsing the IP version field.
Recommended For You
Recommended videos not found.