PAN-OS 10.2.4 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1 & Later
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0 (EoL)
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
PAN-OS 10.2.4 Addressed Issues
PAN-OSĀ® 10.2.4 addressed issues.
Issue ID | Description |
---|---|
WF500-5976 | (WF-500 appliances only) Fixed an issue where files were incorrectly detected as malicious.
|
WF500-5953 | Fixed an issue where testing the same file sample using a PowerShell script returned different verdicts in Private Cloud and Public Cloud.
|
WF500-5920 | Fixed an issue where an elink parser did not work.
|
PAN-231823
|
A fix was made to address CVE-2024-5916.
|
PAN-220741 | (Firewalls in active/passive HA configurations only) Fixed an issue where, when redistribution agent connections to the passive firewall failed, excessive system alerts for the failed connection were generated. With this fix, system alerts are logged every 5 hours instead of 10 minutes.
|
PAN-219686
|
Fixed an issue where a device group push operation from Panorama
failed with the following error on managed firewalls.
vsys -> vsys1 -> plugins unexpected
here
vsys is invalid
Commit failed
|
PAN-216656 | Fixed an issue where the firewall was unable to fully process the user list from a child group when the child group contained more than 1,500 users.
|
PAN-216314 |
(PA-3200 Series firewalls only) Fixed an issue where, after upgrading to or from PAN-OS
10.1.9 or PAN-OS 10.1.9-h1, offloaded application traffic sessions
disconnected even when a session was active. This occurred due to
the application default session timeout value being exceeded.
|
PAN-215911 | Fixed an issue that resulted in a race condition, which caused the configd process to stop responding.
|
PAN-215488 | Fixed an issue where an expired Trusted Root CA was used to sign the forward proxy leaf certificate during SSL Decryption.
|
PAN-215461 | Fixed an issue where the packet descriptor leaked over time with GRE tunnels and keepalives.
|
PAN-215125 | Fixed an issue where false negatives occurred for some script samples.
|
PAN-214634 | Fixed an issue where an elink parser did not work.
|
PAN-214624 | Fixed an issue where the logrcvr process stopped responding.
|
PAN-214337 | Fixed an issue on the firewall related to the gp_broker configuration transform that led to longer commit times.
|
PAN-214037 | (PA-5440, PA-5430, PA-5420, and PA-5410 firewalls only) Fixed an issue where firewalls in active/active HA configurations experienced packet drop when running asymmetric traffic.
|
PAN-213973 | Fixed an issue where the authd process stopped responding during a cleanup of authentication server context.
|
PAN-213661 | Fixed an issue where memory allocation failure caused dataplane processes to restart. This issue occurred when decryption was enabled and the device was under heavy L7 usage.
|
PAN-213011 | Fixed an issue where, when using multi-factor authentication (MFA) with RADIUS OTP, the challenge message Enter Your Microsoft verification code did not appear when accessing the GlobalProtect portal via browser.
|
PAN-212982 | Fixed an issue where the logrcvr process stopped responding with MICA HTTP2 traffic.
|
PAN-212409 | Fixed an issue where there were duplicate IPSec Security Associations (SAs) for the same tunnel, gateway, or proxy ID.
|
PAN-211242 | Fixed an issue where missed heartbeats caused the Data Processing Card (DPC) and its corresponding Network Processing Card (NPC) to restart due to internal packet path monitoring failure.
|
PAN-210919 | Fixed an issue where the Data Processing Card remained in a Starting state after a restart.
|
PAN-210892 | (M-600 and M-700 appliances only) Fixed an issue where the Elasticsearch shard count grew continuously without limit.
|
PAN-210875 | Fixed an issue where the pan_task process stopped responding due to software packet buffer 3 trailer corruption, which caused the firewall to restart.
|
PAN-210561 | Fixed an issue where the all_task process repeatedly restarted due to missed heartbeats.
|
PAN-210481 | Fixed an issue where botnet reports were not generated on the firewall.
|
PAN-210449 | Fixed an issue where the value for shared objects used in policy rules were not displayed on multi-vsys firewalls when pushed from Panorama.
|
PAN-210331 | Fixed an issue where the firewall did not send device telemetry files to Strata Logging Service with
the error message Send File to Strata Logging Service
Receiver Failed.
|
PAN-210327 | (PA-5200 Series firewalls only) Fixed an issue where upgrading to PAN-OS 10.1.7, an internal loop caused an increase in the packets received per second.
|
PAN-210237 | Fixed an issue where system logs generated by Panorama for commit operations showed the severity as High instead of Informational.
|
PAN-210080 | Fixed an issue where the useridd process stopped responding when add and delete member parameters in an incremental sync query were empty.
|
PAN-209660 | Fixed an issue where a selective push from Panorama to multiple firewalls failed due to a missing configuration file, which caused a communication error.
|
PAN-209346 | Fixed an issue where, after upgrading to PAN-OS 10.2.3, HA peers received conflicting ARP messages that indicated a duplicate IP address.
|
PAN-209305 | Fixed a memory space issue where the content and threat detection (CTD) process flow cleanup during inline cloud analysis did not work.
|
PAN-209226 | Fixed an issue where the feature bits function reused shared memory, which resulted in a memory allocation error and caused the dataplane to go down.
|
PAN-209069 | Fixed an issue where IP addresses in the X-Forwarded-For (XFF) field were not logged when the IP address contained an associated port number.
|
PAN-209021 | Fixed an issue where packets were fragmented when SD-WAN VPN tunnel was configured on aggregate ethernet interfaces and sub-interfaces.
|
PAN-208987 | (PA-5400 Series only) Fixed an issue where packets were not transmitted from the firewall if its fragments were received on different slots. This occurred when aggregate ethernet (AE) members in an AE interface were placed on a different slot.
|
PAN-208922
|
A fix was made to address an issue where an authenticated
administrator was able to commit a specifically created
configuration to read local files and resources from the system
(CVE-2023-38046).
|
PAN-208930 | (PA-7000 Series firewalls only) Fixed an issue where auto-tagging in log forwarding did not work.
|
PAN-208877 | Fixed an issue where the all_task process stopped responding when freeing the HTTP2 stream, which caused the dataplane to go down.
|
PAN-208737 | Fixed an issue where domain information wasn't populated in IP address-to-username matching after a successful GlobalProtect authentication using an authentication override cookie.
|
PAN-208724 | Fixed an issue where port pause frame settings did not work as expected and incorrect pause frames occurred.
|
PAN-208718 | Additional debug information was added to capture internal details during traffic congestion.
|
PAN-208711 | (PA-5200 Series firewalls only) The CLI command debug dataplane set pow no-desched yes/no was added to address an issue where the all_pktproc process stopped responding and caused traffic issues.
|
PAN-208537 | Fixed an issue where the licensed-device-capacity was reduced when multiple device management license key files were present.
|
PAN-208485 | Fixed an issue where NAT policies were not visible on the CLI if they contained more than 32 characters.
|
PAN-208189 | Fixed an issue when traffic failed to match and reach all destinations if a Security policy rule
includes FQDN objects that resolve to two or more IP addresses.
|
PAN-208157 | Fixed an issue where malformed hints sent from the firewall caused the logd process to stop responding on Panorama, which caused a system reboot into maintenance mode.
|
PAN-208079 | (VM-Series firewalls on Microsoft Azure environments only) Fixed an issue where the PAN-DB engine did not start when using a VM-Series firewall Flex based CPU.
|
PAN-207983 | Fixed an issue on Panorama in Management Only mode where the logdb database incorrectly collected traffic, threat, GTP, decryption, and corresponding summary logs.
|
PAN-207940 | Fixed an issue where platforms with RAID disk checks were performed weekly, which caused logs to incorrectly state that RAID was rebuilding.
|
PAN-207891 | Fixed an issue on Panorama where log migration did not complete after an upgrade.
|
PAN-207740 | Fixed an issue that resulted in a race condition, which caused the configd process to stop responding.
|
PAN-207738 | Fixed an issue where the ocsp-next-update-time CLI command did not execute for leaf certificates with certificate chains that did not specify OCSP or CRL URLs. As a result, the next update time was 60 minutes even if a different time was set.
|
PAN-207663 | Fixed a Clientless VPN issue where JSON stringify caused issues with the application rewrite.
|
PAN-207629 | Fixed an issue where a selective push to firewalls failed if the firewalls were enabled with multiple vsys and the push scope contained shared objects in device groups.
|
PAN-207623 | Fixed an issue on Panorama where log migration did not complete as expected.
|
PAN-207610 | (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue where Log Admin Activity was not visible on the web interface.
|
PAN-207602 | Fixed an issue where file streams were opened or closed twice due to a race condition which caused Linux to stop responding.
|
PAN-207601 | Fixed an issue where URL cloud connections were unable to resolve the proxy server hostname.
|
PAN-207533 | Fixed an issue with firewalls in HA configurations where ARP and IPv6 multicast packets were transmitted from the passive firewall.
|
PAN-207455 | Fixed an issue where the pan_task process stopped responding when processing client certificate requests from the server in TLS1.3.
|
PAN-207426 | Fixed an issue where a selective push did not include the Share Unused Address and Service Objects with Devices option on Panorama, which caused the firewall to not receive the objects during the configuration push.
|
PAN-207400 | Fixed an issue on Octeon based platforms where fragmented VLAN tagged packets dropped on an aggregate interface.
|
PAN-207390 | Fixed an issue where, even after disabling Telemetry, Telemetry system logs were still generated.
|
PAN-207260 | A commit option was enabled for Device Group and Template administrators after a password change.
|
PAN-207045 | (PA-800 Series firewalls only) Fixed an issue where PAN-SFP-SX transceivers used on ports 5 to 8 did not renegotiate with peer ports after a reload.
|
PAN-207043 | Fixed an issue on PAN-OS 10.2.3 where ports 41-44 remained down when the PAN-QSFP28-DAC-5M cable was connected.
|
PAN-206963 | (M-700 Appliances only) A CLI command was added to check the status of each physical port of a bond1 interface.
|
PAN-206921 | Fixed an issue where GlobalProtect client certificate authentication failed on a gateway when the gateway was placed behind a NAT.
|
PAN-206858 | Fixed an issue where a segmentation fault occurred due to the useridd process being restarted.
|
PAN-206796 | Fixed an issue where cfg.lcaas-region was not reset when it was empty, which caused Strata Logging Service onboarding to fail.
|
PAN-206755 | Fixed an issue when a scheduled multi-device group push occurred, the configd process stopped responding, which caused the push to fail.
|
PAN-206658 | Fixed a timeout issue in the Intel ixgbe driver that resulted in internal path monitoring failure.
|
PAN-206629 | (VM-Series firewalls in AWS environments only) Fixed an issue where a newly bootstrapped firewalls did not forward logs to Panorama.
|
PAN-206393 | (PA-5280 firewalls only) Fixed an issue where memory allocation errors caused decryption failures that disrupted traffic with SSL forward proxy enabled.
|
PAN-206382 | Fixed an issue where authentication sequences were not populated in the drop down when selecting authentication profiles during administrator creation in a template.
|
PAN-206253 |
(PA-3400 Series firewalls only) Fixed an issue where the default log rate value was too
low, and the maximum configurable log rate was capped incorrectly,
which caused the firewall to not generate more than 6826 logs per
second.
|
PAN-206251 | (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only) Fixed an issue where the logrcvr process did not send the system-start SNMP trap during startup.
|
PAN-206233 | Fixed an issue where the pan_comm process stopped responding when a content update and a cloud application update occurred at the same time.
|
PAN-206128 | (PA-7000 Series firewalls with NPCs (Network Processing Cards) only) Improved debugging capability for an issue where the firewall restarted due to heartbeat failures and then failed with the following error message: Power not OK.
|
PAN-206077 | Fixed an issue on firewalls in active/active HA configurations where, after upgrading to PAN-OS 10.1.6-h6, the active primary firewall did not send HIP reports to the active secondary firewall.
|
PAN-206069 | Fixed an issue where the firewall was unable to boot up on older Intel CPUs.
|
PAN-206017 | Fixed an issue where the show dos-protection rule command displayed a character limit error.
|
PAN-206005 | (PA-3400 Series firewalls only) Fixed an issue where the l7_misc memory pool was undersized and caused connectivity loss when the limit was reached.
|
PAN-205995 | Fixed an issue where logs from unaffected log collector groups were not displayed when a log collector was down.
|
PAN-205955 | Fixed an issue where RAID rebuilds occurred even with healthy disks and a clean shutdown.
|
PAN-205877 | (PA-5450 firewalls only) Added debug commands for an issue where a MAC address flap occurred on a neighbor firewall when connecting both MGT-A and MGT-B interfaces.
|
PAN-205829 | Fixed an issue where logs did not display Host-ID details for GlobalProtect users despite having a quarantine Security policy rule. This occurred due to a missed local cache lookup.
|
PAN-205804 | Fixed an issue on Panorama where a WildFire scheduled update for managed devices triggered multiple UploadInstall jobs per minute.
|
PAN-205729 | (PA-3200 Series and PA-7000 Series firewalls only) Fixed an issue where the CPLD watchdog timeout caused the firewall to reboot unexpectedly.
|
PAN-205699 | Fixed an issue where the cloud plugin configuration was automatically deleted from Panorama after a reboot or a configd process restart.
|
PAN-205590 | Fixed an issue where the fan tray fault LED light was on even though no alarm was reported in the system environment.
|
PAN-205473 | (VM-Series firewalls on Microsoft Hyper-V only) Fixed an issue where the firewall did not receive any traffic on Layer 3 sub-interfaces from the trunk port.
|
PAN-205453 | Fixed an issue where running reports or queries under a user group caused the reportd process to stop responding.
|
PAN-205451 | Fixed an issue where the pan_com process stopped responding due to aggressive commits.
|
PAN-205428 | Fixed an issue where WildFire submissions failed if the file name contained special characters.
|
PAN-205396 | Fixed an issue where SD-WAN adaptive SaaS path monitoring did not work correctly during a next hop link down failure.
|
PAN-205337 | Fixed an issue in the Run Now section of custom reports where Threat/Content Name displayed in hypertext, and hovering over the text with the mouse displayed the message undefined.
|
PAN-205260 | Fixed an issue where there was an IP address conflict after a reboot due to a transaction ID collision.
|
PAN-205255 | Fixed a rare issue that caused the dataplane to restart unexpectedly.
|
PAN-205231 | Fixed an issue where a commit operation remained at 55% for longer than expected if more than 7,500 Security policy rules were configured.
|
PAN-205222 | Fixed an issue where you were unable to add a new application in a selected policy rule.
|
PAN-205211 | Fixed an issue where the reportd process stopped responding while querying logs (Monitor > Logs > <logtype>).
|
PAN-205187 | Fixed an issue where Elasticsearch did not start properly when a newly installed Panorama virtual appliance powered on for the first time, which caused the Panorama virtual appliance to not query logs forwarded from the managed firewall to a Log Collector.
|
PAN-205096 | Fixed an issue where promoted sessions were not synced with all cluster members in an HA cluster.
|
PAN-205030 | Fixed an issue where, when a session hit policy based forwarding with symmetric return enabled was not offloaded, the firewall received excessive return-mac update messages, which resulted in resource contention and traffic disruption.
|
PAN-204892 | Fixed an issue on Panorama where the web interface was not accessible and displayed the error 504 Gateway Not Reachable due to the mgmtsrvr process not responding.
|
PAN-204851
|
Fixed an issue where, when performing an advanced factory reset from
maintenance mode on a firewall running PAN-OS 10.2.2 or an earlier
release and downgrading to PAN-OS 10.1.0 or an earlier release, the
firewall entered into maintenance mode after the reboot.
|
PAN-204838 | Fixed an issue where the dot1q VLAN tag was missing in ARP reply packets.
|
PAN-204830 | Fixed an issue where logging in via the web interface or CLI did not work until an auto-commit was complete.
|
PAN-204749 | Fixed an issue where sudden, large bursts of traffic destined for an interface that was down caused packet buffers to fill, which stalled path monitor heartbeat packets.
|
PAN-204690 | Fixed an issue where selective configuration pushes failed due to schema validation when both the device group and template stack had the same name.
|
PAN-204663 | Fixed an issue on Panorama where you were unable to context switch from one managed firewall to another.
|
PAN-204582 | Fixed an issue where, when a firewall acting as a DHCP client received a new DHCP IP address, the firewall did not release old DHCP IP addresses from the IP address stack.
|
PAN-204581 | Fixed an issue where, when accessing a web application via the GlobalProtect Clientless VPN, the web application landing page continuously reloaded.
|
PAN-204575 | (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only) Fixed an issue where the firewall did not forward logs to the log collector.
|
PAN-204482 | Fixed an issue where searching threat logs (Monitor > Logs > Threat) using the partial hash parameter did not work, which resulted in an invalid operator error.
|
PAN-204456 | Fixed an issue related to the logd process that caused high memory consumption.
|
PAN-204335 | Fixed an issue where Panorama became unresponsive, and when refreshed, the error 504 Gateway not Reachable was displayed.
|
PAN-204307 | (PA-5440, PA-5430, PA-5420 and PA-5410 firewalls only) Fixed an issue where, when moving interfaces from one aggregate group to another while the interface's link state was down, traffic was not properly routed through the aggregate group until after a second commit.
|
PAN-204271 | Fixed an issue where the quarantine device list did not display due to the maximum memory being reached.
|
PAN-204238 | Fixed an issue where, when View Rulebase as Groups was enabled, the Tags field did not display a scroll down arrow for navigation.
|
PAN-204216 | Fixed an issue where URL categorization failed and the firewall displayed the URL category as not-resolved for all traffic and the following error message was displayed in the device server logs Error(43): A libcurl function was given a bad argument.
|
PAN-204118 | Fixed an issue where browser sessions stopped responding for device group template admin users with access domains that had many device groups or templates.
|
PAN-204068 | Fixed an issue where a newly created vsys (virtual system) in a template was not able to be pushed from Panorama to the firewall.
|
PAN-203964 | (Firewalls in FIPS-CC mode only) Fixed an issue where the firewall went into maintenance mode due to downloading a corrupted software image, which resulted in the error message FIPS-CC failure. Image File Authentication Error.
|
PAN-203851 | Fixed an issue with firewalls in HA configurations where host information profile (HIP) sync did not work between peer firewalls.
|
PAN-203796 | Fixed an issue where legitimate syn+ack packets were dropped after an invalid syn+ack packet was ingressed.
|
PAN-203681 | (Panorama appliances in FIPS-CC mode only) Fixed an issue where a leaf certificate was unable to be imported into a template stack.
|
PAN-203663 | Fixed an issue where administrators were unable to change the password of a local database for users configured as a local admin user via an authentication profile.
|
PAN-203653 | Fixed an issue where dynamic updates were completed even when configuration commits failed, which caused the all_task process to stop responding.
|
PAN-203618 | Fixed an issue where, when SSL/TLS Handshake Inspection was enabled, SSL/TLS sessions were incorrectly reset if a Security policy rule with no Security profiles configured was matched.
|
PAN-203604 | Fixed an issue where GlobalProtect authentication failed for SAML username with a special character.
|
PAN-203563 | Fixed an issue with Content and Threat Detection allocation storage space where performing a commit failed with a CUSTOM_UPDATE_BLOCK error message.
|
PAN-203430 | Fixed an issue where, when the User-ID agent had collector name/secret configured, the configuration was mandatory on clients on PAN-OS 10.0 and later releases.
|
PAN-203402 | Fixed an intermittent issue where forward session installs were delayed, which resulted in latencies.
|
PAN-203362 | Fixed an issue where the rasmgr process restarted due to a null reference.
|
PAN-203339 | Fixed an issue where services failed due to the RAID rebuild not being completed on time.
|
PAN-203330 | Fixed an issue where the certificate for an External Dynamic List (EDL) incorrectly changed from invalid to valid, which caused the EDL file to be removed.
|
PAN-203320 | Fixed an issue where configuring the firewall to connect with Panorama using an auth key and creating the auth key without adding the managed firewall to Panorama first, the auth key was incorrectly decreased incrementally.
|
PAN-203147 | (Firewalls in FIPS-CC mode only) Fixed an issue where the firewall unexpectedly rebooted when downloading a new PAN-OS software image.
|
PAN-203137 | (PA-5450 firewalls only) Fixed an issue where HSCI ports did not come up when QSFP DAC cables were used.
|
PAN-202946 | Fixed an issue where the request high-availability session-reestablish command was not available for API.
|
PAN-202918 | Fixed an issue where processing route-table entries did not work as expected.
|
PAN-202872 | Fixed an issue where an incorrect URL list limit displayed during a commit.
|
PAN-202783 | (PA-7000 Series firewalls with 100G NPC (Network Processing Cards) only) Fixed an issue where sudden, large bursts of traffic destined for an interface that was down caused packet buffers to fill, which stalled path monitor heartbeat packets.
|
PAN-202722 | Fixed an issue where the factor completion time for login events learned through XML API displayed as 1969/12/31 19:00:00.
|
PAN-202593 | Fixed an issue where expanding Global Find results displayed only the top level and second level of a searched item.
|
PAN-202544 | An enhancement was made to collect CPLD register data after a path monitor failure.
|
PAN-202543 | An enhancement was made to improve path monitor data collection by verifying the status of the control network.
|
PAN-202535 | Fixed an issue where the Device Telemetry configuration for a region was unable to be set or edited via the web interface.
|
PAN-202451 | Fixed an issue where Retrieve Framed-IP-Address attribute from the authentication server fails generating GlobalProtect connection failure with the error Assign private IP address failed.
|
PAN-202450 | Fixed an issue where the device-client-cert was set to expire on December 31, 2023. With this fix, the expiration date has been extended.
|
PAN-202295 | Fixed an issue where read-only superusers were unable to see the Commit All job status, warnings, or errors for Panorama device groups.
|
PAN-202282 | Fixed an issue where stats dump files did not display all necessary reports.
|
PAN-202264 | (VM-Series firewalls only) Fixed an issue where an automatic site license activation for a PAYG license did not register in the Customer Support Portal.
|
PAN-202248 | Fixed an issue where, due to a tunnel content inspection (TCI) policy match, IPSec traffic did not pass through the firewall when NAT was performed on the traffic.
|
PAN-202194 | Fixed an SD-WAN link issue that occurred when Aggregate Ethernet without a member interface was configured as an SD-WAN interface.
|
PAN-202140 | Fixed an issue where the comm process stopped responding due to an OOM condition.
|
PAN-202101 | Fixed an issue where firewalls stopped responding after an upgrade due to configuration corruption.
|
PAN-202095 | Fixed an issue on the web interface where the language setting is not retained.
|
PAN-202040 | (PA-220 firewalls only) Fixed an issue where ECDSA fingerprints were not displayed.
|
PAN-202012 | A debug command was introduced to control Gzip encoding for the GlobalProtect Clientless VPN application.
|
PAN-201973 | (PA-3400 Series firewalls only) Fixed an issue where the management interface could not be assigned as an HA port.
|
PAN-201954 | Fixed an issue where NAT policy rules were deleted on managed devices after a successful push from Panorama to multiple device groups. This occurred when NAT policy rules had device_tags selected in the target section.
|
PAN-201910 | Fixed an issue where some Security profiles consumed a large amount of memory, which reduced the number of supported Security profiles below the stated maximum for a platform.
|
PAN-201900 | Fixed an internal path monitoring failure issue that caused the dataplane to go down.
|
PAN-201860 | Fixed an issue where the Device Quarantine list was not redistributed or updated on Panorama and Prisma Access in a full mesh topology.
|
PAN-201858 | Fixed an issue where the SD-WAN interface Maximum Transmission Unit (MTU) led to incorrect fragmentation of IPSec traffic.
|
PAN-201839 | Fixed an issue where GlobalProtect HIP match failed for Mac users due to invalid characters being present in the subject alternative attributes in the certificate on the HIP report.
|
PAN-201818 | Fixed an issue where INIT SCTP packets were dropped after being processed by the CTD, and silent drops occurred even with SCTP no-drop function enabled.
|
PAN-201714 | Fixed an issue with GlobalProtect where attempting to authenticate with the GlobalProtect gateway returned a 502 error code.
|
PAN-201701 | Fixed an issue where the firewall generated system log alerts if the raid for a system or log disk was corrupted.
|
PAN-201639 | Fixed an issue with Saas Application Usage reports where Applications with Risky Characteristics displayed only two applications per section.
|
PAN-201632 | Fixed an issue where the all_task stopped responding with a segmentation fault due to an invalid interface port.
|
PAN-201601 | Fixed an issue where the all_task process stopped responding after adding customer hyperscan signatures.
|
PAN-201587 | Fixed an issue where the App Pcaps directory size was incorrectly detected which caused commit errors.
|
PAN-201580 | Fixed an issue where the useridd process stopped responding due to an invalid vsys_id request.
|
PAN-201561 | Fixed an issue where LSVPN satellite authentication cookies were not synced across high availability LSVPN portals.
|
PAN-201360 | Fixed an issue with Panorama managed log collector statistics where the oldest logs displayed on the primary Panorama appliance and the secondary Panorama appliance did not match.
|
PAN-201357 | The CLI command debug dataplane set pow no-desched yes was added to address an issue where the all_pktproc process stopped responding and caused traffic issues.
|
PAN-201136 | Fixed an issue where IGMP packets were offloaded with frequent IGMP Join and Leave messages from the client.
|
PAN-201085
|
(PA-5450 firewalls only) Fixed an issue where inserting the
NPC and DPC on slot2 created excessive logs in the
bcm.log file.
|
PAN-200946 | Fixed an issue with firewalls in active/passive HA configurations where GRE tunnels went down due to recursive routing when the passive firewall was booting up. When the passive firewall became active and no recursive routing was configured, the GRE tunnel remained down.
|
PAN-200914 | (PA-3440 firewalls only) Fixed an issue where the default NAT DIPP pool oversubscription was set to 2 instead of 4.
|
PAN-200845 | (M-600 Appliances in Management-only mode only) Fixed an issue where XML API queries failed due to the configuration size being larger than expected.
|
PAN-200774 | Fixed an issue where SCEP certificate import did not work on the firewall when the certificate name contained a period ( . ).
|
PAN-200676 | Fixed an issue with firewalls in active/passive HA configurations where the user counts in the management plane were not synchronized between the active and the passive firewall.
|
PAN-200463 | Fixed an issue where disabling strict-username-check did not apply to admin users authenticating with SAML.
|
PAN-200356 | Fixed an issue where the Elapsed seconds field incorrectly displayed as 0 for DHCP packets coming from the firewall.
|
PAN-200354 | Fixed an issue where the firewall did not initiate scheduled log reports.
|
PAN-200160 | Fixed a memory leak issue on Panorama related to the logd process that caused an out-of-memory (OOM) condition.
|
PAN-200116 | Fixed an issue where Elasticsearch displayed red due to frequent tunnel check failures between HA clusters.
|
PAN-200103 | Fixed an issue where decryption logs were not displayed under Manage Custom Reports for custom Panorama admin users.
|
PAN-200102 | Fixed an issue on the firewall web interface that prevented applications from loading under any policy or in any location where application IDs were able to be refreshed.
|
PAN-200035 | Fixed an issue where the firewall reported General TLS Protocol Error for TLSv1.3 when the firewall closed a TCP connection to the server via a FIN packet without waiting for the handshake to complete.
|
PAN-200019 | Fixed an issue on Panorama where Virtual Routers (Network > Virtual Routers) was not available when configuring a custom Panorama admin role (Panorama > Admin Roles).
|
PAN-199965 | Fixed an issue where the reportd process stopped responding on log collectors during query and report operations due to a race condition between request handling threads.
|
PAN-199821 | Fixed an issue where the Include/Exclude IPs filter under Data Redistribution did not consistently filter IP addresses correctly.
|
PAN-199807 | Fixed an issue where the dataplane frequently restarted due to high memory usage on wifclient.
|
PAN-199726 | Fixed an issue with firewalls in HA configurations where both firewalls responded with gARP messages after a switchover.
|
PAN-199661 | (VM-Series firewalls in ESXI environments only) Fixed an issue where the number of used packet buffers was not calculated properly, and packet buffers displayed as a higher value than the correct value, which triggered PBP Alerts. This occurred when the driver name was not compatible with new DPDK versions.
|
PAN-199612 | Fixed a sync issue with firewalls in active/active HA configurations.
|
PAN-199570 | Fixed an issue where uploading certificates using a custom admin role did not work as expected after a context switch.
|
PAN-199543 | Resolved failed authentication for Radius and TLS where shared secret was striped for FIPS mode
|
PAN-199500 | Fixed an issue where, when many NAT policy rules were configured, the pan_comm process stopped responding after a configuration commit due to a high number of debug messages.
|
PAN-199410 | Fixed an issue where system logs for syslog activities were categorized as general under Type and EVENT columns.
|
PAN-199214 | Fixed an intermittent issue where downloading threat pcap via XML API failed with the following error message: /opt/pancfg/session/pan/user_tmp/XXXXX/YYYYY.pcap does not exist.
|
PAN-199141 | Fixed an issue where renaming a device group and then performing a partial commit led to the device group hierarchy being incorrectly changed.
|
PAN-198920 | Fixed an issue where configuration changes caused a previously valid interface ID to become invalid due to HA switchovers delaying the configuration push.
|
PAN-198889 | Fixed an issue where the logd process stopped responding if some devices in a collector group were on a PAN-OS 10.1 device and others were on a PAN-OS 10.0 release. This issue affected the devices on a PAN-OS 10.0 release.
|
PAN-198871 | Fixed an issue when both URL and Advanced URL licenses were installed, the expiry date was not correctly checked.
|
PAN-198718 | (PA-5280 firewalls only) Fixed an issue where memory allocation failures caused increased decryption failures.
|
PAN-198693 | Fixed an issue where decrypted SSH sessions were interrupted with a decryption error.
|
PAN-198691 | Added an alternate health endpoint to direct health probes on the firewall (https://firewall/unauth/php/health.php) to address an issue where /php/login.php performance was slow when large amounts of traffic were being processed.
|
PAN-198575 | Fixed an issue where data did not load when filtering by Threat Name (ACC > Threat Activity).
|
PAN-198333 | Fixed an issue where the SaaS PDF report incorrectly displayed the sanctioned application tag count as 1.
|
PAN-198306 | Fixed an issue where the useridd process stopped responding when booting up the firewall.
|
PAN-198174 | Fixed an issue where, when viewing traffic or threat logs from the Application Command Center (ACC) or Monitor tabs, performing a reverse DNS lookup caused the dnsproxy process to restart if DNS server settings were not configured.
|
PAN-198078 | Fixed an issue where VXLAN keepalive packets were dropped randomly.
|
PAN-198038 | A CLI command was added to address an issue where long-lived sessions were aging out even when there was ongoing traffic.
|
PAN-197953 | Fixed an issue where the logd process stopped responding due to forwarded threat logs, which caused Panorama to reboot into maintenance mode.
|
PAN-197935 | Fixed an intermittent issue where XML API IP address tag registration failed on firewalls in a multi-vsys environment.
|
PAN-197919 | Fixed an issue where, when path monitoring for a static route was configured with a new Ping Interval value, the value was not used as intended.
|
PAN-197908 | Fixed an issue where Strata Logging Service flaps occurred for long durations which caused a memory leak related to the mgmtsrvr process.
|
PAN-197877 | Fixed an intermittent issue on Panorama where the distributord process stopped responding.
|
PAN-197872 | Fixed an issue where the useridd process generated false positive critical errors.
|
PAN-197847 | Fixed an issue where disabling the enc-algo-aes-128-gcm cipher did not work when using an SSL/TLS profile.
|
PAN-197737 | Fixed an issue where the connection to the PAN-DB server failed with following error message: Failed to send req type[3], curl error: Couldn't resolve host name.
|
PAN-197729 | Fixed an issue where repeated configuration pushes from Panorama resulted in a management server memory leak.
|
PAN-197678 | Fixed an issue where the dataplane stopped responding, which caused internal path monitoring failure.
|
PAN-197582 | Fixed an issue where, after upgrading to PAN-OS 10.1.6, the firewall reset SSL connections that used policy-based forwarding.
|
PAN-197563 | Fixed an issue in the User Activity Report where output fields started with the letter b.
|
PAN-197549 | Fixed an issue where making GlobalProtect gateway configuration changes resulted in a HIP notification error.
|
PAN-197426 | Fixed an issue on Panorama where, when attempting to view the Monitor page, the error invalid term was displayed.
|
PAN-197386 | Fixed an issue where traffic that was subject to network packet broker inspection entered a looping state due to incorrect session offload.
|
PAN-197339 | Fixed an issue where template configuration for the User-ID agent was not reflected on the template stack on Panorama appliances on PAN-OS 10.2.1.
|
PAN-197298 | Fixed an issue where the audit comment archive for Security rule changes output had overlapping formats.
|
PAN-197203 | Fixed an intermittent issue where, if SSL/TLS Handshake Inspection was enabled, multiple processes stopped responding when the firewall was processing packets.
|
PAN-197121 | Fixed an issue where incorrect user details were displayed under the USER DETAIL drop-down (ACC > Network activity > User activity).
|
PAN-197115 | Fixed an issue where, when the total number of in-used HIP profiles was greater than 32, traffic from the GlobalProtect Agent did not hit the expected Security policy rule configured with the HIP profile even though a HIP match log was generated.
|
PAN-197097 | Fixed an issue where LSVPN did not support IPv6 addresses on the satellite firewall.
|
PAN-196954 | Fixed a memory leak issue related to the distributord process.
|
PAN-196874 | Fixed an issue where, when the firewall accepted ICMP redirect messages on the management interface, the firewall did not clear the route from the cache.
|
PAN-196840 | Fixed an issue where exporting a Security policy rule that contained Korean language characters to CSV format resulted in the policy description being in a non-readable format.
|
PAN-196811 | Fixed an issue where logout events without a username caused high CPU usage.
|
PAN-196715 | Fixed an issue where you could not directly edit Services and Address objects from the Policies tab.
|
PAN-196704 | Fixed an issue where Preview Changes on Panorama Push to Devices incorrectly displayed changes to encrypted entries.
|
PAN-196701 | Fixed an issue where the firewall did not properly measure the Panorama connection keepalive timer, which caused a Panorama HA failover to take longer than expected.
|
PAN-196671 | (PA-3400 Series firewalls and PA-5410, PA-5420, and PA-5430 firewalls only) Addressed an
issue to improve network latency,
|
PAN-196583 | Fixed an issue where the Cisco TrustSEc plugin triggered a flood of redundant register/unregister messages due to a failed IP address tag database search.
|
PAN-196566 | Fixed an issue where the useridd process restarted repeatedly which let to an OOM condition.
|
PAN-196558 | Fixed an issue where IP address tag policy updates were delayed.
|
PAN-196474 | Fixed an issue where, when a decryption profile was configured with TLSv1.2 or later, web pages utilizing TLS1.0 were blocked with an incorrect ERR_TIME_OUT message instead of an ERR_CONNECTION_RESET message.
|
PAN-196467 | Fixed an issue where enabling strict IP address checks in a Zone Protection profile caused GRE tunnel packets to be dropped.
|
PAN-196457 | Fixed an issue where extraneous logs displayed in the Traffic log when Security policy settings were changed.
|
PAN-196452 | Fixed an issue where DNS queries failed from source port 4789 with a NAT configuration.
|
PAN-196450 | Fixed an issue where certificates with whitespaces in the name or common name (CN) were not able to be imported.
|
PAN-196410 | Fixed an issue where you were unable to customize the risk value in Risk-of-app.
|
PAN-196309 | (PA-5450 firewalls only) Fixed an issue where a firewall configured with a Policy-Based Forwarding policy flapped when a commit was performed, even when the next hop was reachable.
|
PAN-196131 | Fixed an issue where the comm process stopped responding when a show command was executed in two sessions.
|
PAN-196105 | Fixed an issue on the firewall where using special characters in a password caused authentication to fail when connecting to the GlobalProtect portal with GlobalProtect satellite configured.
|
PAN-196050 | Fixed an issue on Panorama where logs did not populate when one log collector in a log collector group was down.
|
PAN-196003 | Fixed an issue where the Adjust Columns options for Panorama traffic logs did not correctly auto-adjust the columns.
|
PAN-195988 | Fixed an issue where commits failed when an AS path regular expression that included the ( _ ) character was specified in the virtual router BGP configuration export rule.
|
PAN-195893 | Fixed an issue where daily PDF summary reports were not generated when the Application Report was selected.
|
PAN-195869 | Fixed an issue where scheduled custom reports based on firewall data did not display any information.
|
PAN-195828 | Fixed an issue where SNMP reported the panVsysActiveTcpCps and panVsysActiveUdpCps value to be 0.
|
PAN-195792 | Fixed an issue where, when generating a stats dump file for a managed device from Panorama (Panorama > Support > Stats Dump File), the file did not display any data.
|
PAN-195790 | Fixed an issue where syslog traffic that was sent from the management interface to the syslog server even when a destination IP address service route was configured.
|
PAN-195713 | Fixed an issue where clientless VPN applications were not displayed in the GlobalProtect portal page.
|
PAN-195695 | Fixed an issue where the AppScope Summary report and PDF report export function did not work as expected.
|
PAN-195669 | Fixed an issue with Panorama appliances in HA configurations where a passive Panorama appliance generated CMS Redistribution Client is connected to global collector messages.
|
PAN-195659 | Fixed an issue with firewalls in HA configurations where ping responses from the target IP addresses were much delayed after a configuration push.
|
PAN-195583 | Fixed an issue where, after renaming an object, configuration pushes from Panorama failed with the commit error object name is not an allowed keyword.
|
PAN-195526 | Fixed an issue where the firewall system log received a large amount of error messages when attempting a connection between the firewall and Panorama.
|
PAN-195374 | (Firewalls in active/passive HA configurations only) Fixed an issue where, when redistribution agent connections to the passive firewall failed, excessive system alerts for the failed connection were generated. With this fix, system alerts are logged every 5 hours instead of 10 minutes.
|
PAN-195201 | Fixed an issue where high volume DNS Security traffic caused the firewall to reboot.
|
PAN-195200 | Fixed an issue where Panorama did not attach and email scheduled reports (Monitor > PDF > Reports > Email Scheduler) when the size of the email attachments was large.
|
PAN-195114 | Fixed an issue where proxy ARP responded on the wrong interface when the same subnet was in two virtual routers.
|
PAN-195107 | (PA-7000s Series firewalls with LFCs only) Fixed an issue where the IP address of the LFC displayed as unknown.
|
PAN-195064 | Fixed an issue where the log collector did not forward correlation logs to the syslog server.
|
PAN-194912 | Fixed an issue where the CLI command show applications list did not return any outputs.
|
PAN-194812 | Fixed an issue where generating reports via XML API failed when the serial number was set as target in the query.
|
PAN-194805 | Fixed an issue where scheduled configuration backups to the SCP server failed with error message No ECDSA host key is known.
|
PAN-194737 | Fixed an issue where path monitor displayed as deleted when it was disabled, which caused a preview change in the summary for static routes.
|
PAN-194704 | Fixed an issue with SIP ALG where improper NAT was applied when Destination NAT ran out of IP addresses.
|
PAN-194615 | Fixed an issue where the packet broker session timeout value did not match the master sessions timeout value after the firewall received a TCP FIN or RST packet. The fix ensures that Broker session times out within 1 second after the master session timed out.
|
PAN-194441 | Fixed an issue where the dataplane CPU usage was higher than expected due to packet looping in the broker session when the network packet broker was enabled.
|
PAN-194175 | Fixed an issue on Panorama where a commit push to managed firewalls failed when objects were added as source address exclusions in a Security policy and Share Unused Address and Service Objects with Devices was unchecked.
|
PAN-194068 | (PA-5200 Series firewalls only) Fixed an issue where the firewall unexpectedly rebooted with the log message Heartbeat failed previously.
|
PAN-194043 | Fixed an issue where Managed Devices > Summary did not reflect new tag values after an update.
|
PAN-194031 | (PA-220 Firewalls only) Fixed an issue where system log configurations did not work as expected due to insufficient process timeout after a logrcvr process restart.
|
PAN-194025 | Fixed an issue where the ikemgr process stopped responding due to a timing issue, which caused VPN tunnels to go down.
|
PAN-193879 | Fixed an issue on Panorama where the push scope was delayed for commit and push operations.
|
PAN-193831 | Fixed an issue where internal routes were added to the routing table even after disabling dynamic routing protocols.
|
PAN-193808 | Fixed a memory leak issue in the mgmtsrvr process that resulted in an OOM condition.
|
PAN-193733 | (Firewalls in multi-vsys environments only) Fixed an issue where IP tag addresses were not synced to all virtual systems (vsys) when they were pushed to the firewall from Panorama via XML API.
|
PAN-193619 | Fixed an issue where air gapped firewalls and Panorama appliances performed excessive validity checks to updates.paloaltonetworks.com, which caused software installs to fail.
|
PAN-193558 | Fixed an issue where log retention settings Multi Disk did not display correct values on the firewall web interface when the settings were configured using a Panorama template or template stack.
|
PAN-193396 | Fixed an issue where the source user name was displayed in traffic logs even when Show User Names In Logs and Reports was disabled for a custom admin role.
|
PAN-193323 | Fixed an issue where root partition utilization reached 100% due to mdb old logs not being purged as expected.
|
PAN-193281 | Fixed an issue where the logrcvr process stopped responding after a content update on the firewall.
|
PAN-193245 | Fixed an issue where, when using syslog-ng forwarding via SSL, with a Base Common Name (CN) and multiple Subject Alternative Names (SANs) were listed in the certificate.
|
PAN-193175 | Fixed an issue where PBP Drops (8507) threat logs were incorrectly logged as SCTP Init Flood (8506).
|
PAN-193043 | Fixed an issue with the where firewalls in Google Cloud Platforms (GCP) inserted the hostname as PA-VM in the syslog header instead of the DHCP assigned hostname when logs were being sent to the syslog server.
|
PAN-193026 | Fixed an issue where warning messages were generated during commits when configuration details of two profiles were identical.
|
PAN-192681 | Fixed an issue where HIP database storage on the firewall reached full capacity due to the firewall not purging older HIP reports.
|
PAN-192513 | Fixed an issue where log migration did not work when converting a Legacy mode Panorama appliance to Log Collector mode.
|
PAN-192456 | Fixed an issue where GlobalProtect SSL VPN processing during a high traffic load caused the dataplane to stop responding.
|
PAN-192417 | Fixed an issue where botnet reports were not generated on the firewall.
|
PAN-192296 | Fixed an issue where, when you saved a SaaS application report as a PDF or sent it to print, the size of the report was smaller than expected.
|
PAN-192244 | Fixed an issue where scheduled log export jobs continued to run even after being deleted.
|
PAN-192193 | Fixed an issue where exporting a list of managed collectors via the Panorama web interface failed with the following error message: Export Error, Error while exporting
|
PAN-192188 | (PA-5450 firewalls only) Fixed an issue where the show running resource-monitor ingress-backlogs CLI command failed with the following error message: Server error : Failed to intepret the DP response.
|
PAN-192092 | Fixed an issue with firewalls in active/passive configurations only where the registered cookie from the satellite firewall to the passive firewall did not sync, which caused authentication between the satellite firewall and the GlobalProtect portal firewall to fail after a failover event.
|
PAN-192076 | Added debug logs for visibility into an OpenSSL memory initialization issue that caused unexpected failovers.
|
PAN-191997 | Fixed an issue where log queries did not successfully filter the unknown category.
|
PAN-191652 | Fixed an issue with Prisma Cloud where a commit push failed due to the error Error: failed to handle TDB_UPDATE_BLOCK.
|
PAN-191463 | Fixed an issue where the firewall did not handle packets at Fastpath when the interface pointer was null.
|
PAN-191408 | Fixed an issue where the firewall did not correctly receive dynamic address group information from Panorama after a reboot or initial connection.
|
PAN-191390 | (VM-Series firewalls only) Fixed an issue where the management plane CPU was incorrectly calculated as high when logged in the mp-monitor.log.
|
PAN-191352 | Fixed an intermittent issue where high latency was observed on the web interface and CLI due to high CPU usage related to the sadc process.
|
PAN-191235 | Fixed an issue with firewalls in HA configurations where the passive firewall attempted to connect to a hardware security module (HSM) client when a service route was configured, which caused dynamic updates and software updates to fail.
|
PAN-191032 | Fixed an issue on Panorama where Managed Devices displayed Unknown.
|
PAN-190533 | Fixed an issue where addresses and address groups were not displayed for users in Security admin roles.
|
PAN-190502 | Fixed an issue where the Policy filter and Policy optimizer filter were required to have the exact same syntax, including nested conditions with rules that contained more than one tag when filtering via the neq operator.
|
PAN-190454 | Fixed an issue where, while authenticating, the allow list check failed for vsys users when a SAML authentication profile was configured under shared location.
|
PAN-190409
|
(PA-5450 and PA-3200 Series firewalls that use an FE101 processor
only) Fixed an issue where packets in the same session were
forwarded through a different member of an aggregate ethernet group
when the session was offloaded. The fix is that you can use the
following CLI command to change the default tag setting to the tuple
setting:
admin@firewall> set session lag-flow-key-type
?
> tag tag
> tuple tuple
tag is the default behavior (tag based
on the CPU, tuple based on the FE).
tuple is the new behavior, where both
CPU and FE use the same selection algorithm.
Use the following command to display the algorithm:
admin@firewall> show session
lag-flow-key-type
dp0: tuple based on fe100
dp1: tuple based on fe100
|
PAN-190266 | Fixed an issue that stopped the all_task process to stop responding at the pan_sdwan_qualify_if_ini function.
|
PAN-189960 | Fixed an issue on Panorama where you were unable to view the last address object moved to the shared template list.
|
PAN-189866 | Fixed an issue with the web interface where group include lists used server profiles instead of LDAP proxy.
|
PAN-189783 | Fixed an issue where container resource limits were not enforced for all processes when running inside a container.
|
PAN-189719 | Fixed an issue on Panorama where Test Server Connection failed in an HTTP server profile with the following error message: failed binding local connection end.
|
PAN-189718 | Fixed an issue where the number of sessions did not reach the expected maximum value with Security profiles.
|
PAN-189666 | Fixed an issue where GlobalProtect portal connections failed after random commits when multiple agent configurations were provisioned and configuration selection criteria using certificate profile was used.
|
PAN-189643 | Fixed an issue where, when QoS was enabled on an IPSec tunnel, traffic failed due to applying the wrong tunnel QoS ID.
|
PAN-189518 | Fixed an issue where incoming DNS packets with looped compression pointers caused the dnsproxyd process to stop responding.
|
PAN-189425 | Fixed an issue on Panorama where Export Panorama and devices config bundle (Panorama > Setup > Operations) failed with the following error message: Failed to redirect error to /var/log/pan/appweb3-panmodule.log (Permission denied).
|
PAN-189379 | Fixed an issue where FQDN based Security policy rules did not match correctly.
|
PAN-189375 | Fixed an issue where, when migrating the firewall, the firewall dropped packets when trying to re-use the TCP session.
|
PAN-189335 | Fixed an issue where the varrcvr process restarted repeatedly, which caused the firewall to restart.
|
PAN-189300 | Fixed an issue where Panorama appliances in active/passive HA configurations reported the false positive system log Failed to sync vm-auth-key when a VM authentication key was generated on the active appliance.
|
PAN-189200 | Fixed an issue where sinkholes did not occur for AWS Gateway Load Balancer dig queries.
|
PAN-189027 | Fixed an issue where the dataplane CPU utilization provided from the web interface or via SNMP was incorrect.
|
PAN-188933 | Fixed an issue where the UDP checksum wasn't correctly calculated for VXLAN traffic after applying NAT.
|
PAN-188912 | Fixed an issue where authentication failed due to a process responsible for handling authentication requests going into an irrecoverable state.
|
PAN-188519 | (VM-Series firewalls only) Fixed an issue where, when manually deactivating the license, the admin user did not receive the option to download the token file and upload it to the Customer Support Portal (CSP) to deactivate the license.
|
PAN-188904
|
Fixed an issue where web pages and web page contents were not
properly loaded when cloud inline categorization was enabled.
|
PAN-188506 | Fixed an issue where the ctd_dns_malicious_fwd counter incorrectly increased incrementally.
|
PAN-188403 | Fixed an issue on the web interface where the interzone-default rule hit count was not displayed.
|
PAN-188348 | Fixed an issue where encapsulating Security payload packets originating from the firewall were dropped when strict IP address check was enabled in a zone protection profile.
|
PAN-188291 | Fixed an issue where, when using Global Find on the web interface to search for a given Hostname Configuration (Device > Setup > Management), clicking the search result directed you to the appropriate Hostname configuration, but did not change the respective Template field automatically.
|
PAN-188272 | (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue where Support UTF-8 For Log Output wasn't visible on the web interface.
|
PAN-188118 | Fixed an issue with firewalls in FIPS mode that prevented device telemetry from connecting.
|
PAN-187763 | Fixed an issue where DNS Security logs did not display a threat category, threat name, or threat ID when domain names contained 64 or more characters.
|
PAN-187438 | (PA-5400 Series firewalls only) Fixed an issue where HSCI interfaces didnāt come up when using BiDi transceivers.
|
PAN-187279 | Fixed an issue where not all quarantined devices were displayed as expected.
|
PAN-186530 | Fixed an issue where the current date was incorrectly printed as the last license check date.
|
PAN-186471 | Fixed an issue where, when exporting to CSV in Global Find, the firewall truncated names of rules that contained over 40 characters.
|
PAN-186412 | Fixed an issue where invalid packet-ptr was seen in work entries.
|
PAN-186294 | Fixed an issue where commits from Panorama failed on the firewall due to the virtual router name character limit.
|
PAN-186270 | Fixed an issue where, when HA was enabled and a dynamic update schedule was configured, the configd process unexpectedly stopped responding during configuration commits.
|
PAN-185770 | Fixed an issue where the firewall displayed the error message Malformed Request when an email address included an ampersand ( & ) when configuring an email server profile.
|
PAN-185466 | Fixed an issue where WildFire submission did not work as expected.
|
PAN-185394 | (PA-7000 Series firewalls only) Fixed an issue where not all changes to the template were reflected on the firewall.
|
PAN-185360 | Fixed an issue where, when Captive Portal Authentication was configured, l3svc_ngx_error.log and l3svc_access.log did not roll over after exceeding 10 megabytes, which caused the root partition to reach full utilization.
|
PAN-185287 | (PA-7050 firewalls with Network Processing Cards (NPCs) only) Debug commands were added to address an issue where the firewall's NPC Slot2 failed and multiple dataplane processes stopped responding.
|
PAN-185234 | (VM-Series firewalls only) Fixed an issue where the packet buffer utilization was displayed as high even when no traffic was traversing the firewall.
|
PAN-184744 | Fixed an issue where the firewall did not decrypt SSL traffic due to a lack of internal resources allocated for decryption.
|
PAN-184708
|
Fixed an issue where scheduled report emails (Monitor>PDF
Reports>Email Scheduler) were not emailed as expected if
they included a SaaS Application Usage report.
|
PAN-183524 | Fixed an issue where GTPv2-c and GTP-U traffic was identified with insufficient-data in the traffic logs.
|
PAN-183375 | Fixed an issue where traffic arriving on a tunnel with a bad IP address header checksum was not dropped.
|
PAN-183126 | Fixed an issue on Panorama where you were able to attempt to push a number of active schedules to the firewall that was greater than the firewall's maximum capacity.
|
PAN-182875 | Fixed an issue where certificate generation using SCEP did not take more than one organizational unit (OU).
|
PAN-182732 | Fixed an issue where the GlobalProtect gateway inactivity timer wasn't refreshed even though traffic was passing through the tunnel.
|
PAN-182167 | Removed a duplicate save filter Icon in the Audit Comment Archive for Security Rule Audit Comments tab.
|
PAN-181968 | (PA-400 Series firewalls in active/passive HA configurations only) Fixed an issue where, when HA failover occurred, link up on all ports took longer than expected, which caused traffic outages.
|
PAN-181334 | Fixed an issue where users with custom admin roles and access domains were unable to view address objects or edit Security rules.
|
PAN-181129 | Improved protection against unexpected packets and error handling for traffic identified as SIP.
|
PAN-180948 | Fixed an issue where an external dynamic list fetch failed with the error message Unable to fetch external dynamic list. Couldn't resolve host name. Using old copy for refresh.
|
PAN-180690 | Fixed an issue where the firewall dropped IPv6 Bi-Directional Forwarding (BFD) packets when IP Spoofing was enabled in a Zone Protection Profile.
|
PAN-179174 | Fixed an issue where exported PDF report of the ACC was the incorrect color after upgrading from a PAN-OS 10.1 or later release.
|
PAN-178951 | Fixed an issue on the firewall where Agentless User-ID lost parent Security group information after the Security group name of the nested groups on Active Directory was changed.
|
PAN-178728 | Fixed an issue where the dcsd process stopped responding when attempting to read the config to update its redis database.
|
PAN-177942 | Fixed an issue where, when grouping HA peers, access domains that were configured using multi-vsys firewalls deselected devices or virtual systems that were in other configured access domains.
|
PAN-177562 | Fixed an issue where PDF reports were not translated to the configured local language.
|
PAN-177201 | Fixed an issue where, when a Panorama appliance on a PAN-OS 9.0 or later release pushed built-in external dynamic lists to a firewall on a PAN-OS 8.1 release, the external dynamic list was removed, but the rule was still pushed to the firewall. With this fix, Panorama will show a validation error when attempting to push a pre-defined external dynamic list to a firewall on a PAN-OS 8.1 release.
|
PAN-176989 | Fixed an issue where the CLI command to show SD-WAN tunnel members caused the firewall to stop responding.
|
PAN-176379 | Fixed an issue where, when multiple routers were configured under a Panorama template, you were only able to select its own virtual router for next hop.
|
PAN-175244 | Fixed an issue on Panorama where the configd process stopped responding when adding, deleting or listing an authentication key.
|
PAN-175142 | Fixed an issue on Panorama where executing a debug command caused the logrcvr process to stop responding.
|
PAN-175061 | Fixed an issue where filtering threat logs using any value under THREAT ID/NAME displayed the error Invalid term.
|
PAN-174953 | Fixed an issue where the firewall didn't update URL categories from the management plane to the dataplane cache.
|
PAN-174781 | Fixed an issue where the firewall did not send an SMTP 541 error message to the email client after detecting a malicious file attachment.
|
PAN-174680 | Fixed an issue where, when adding new configurations, Panorama didn't display a list of suggested template variables when typing in a relevant field.
|
PAN-174027 | Fixed an issue on Panorama where attempting to rename mapping for address options caused a push to fail with the following error message: Error: Duplicate address name..
|
PAN-171927 | Fixed an issue where incorrect results were displayed when filtering logs in the Monitor tab.
|
PAN-171300 | Fixed an issue on Panorama where a password change in a template did not reset an expired password flag on the firewall, which caused the user to change their password when logging in to a firewall.
|
PAN-170414 | Fixed an issue related to an OOM condition in the dataplane, which was caused by multiple panio commands using extra memory.
|
PAN-157199 | (PA-220 firewalls only) Fixed an issue where the GlobalProtect portal was not reachable with IPv6 addresses.
|
PAN-142701 | Fixed an issue where the firewall did not delete Stateless SCTP sessions after receiving an SCTP Abort packet.
|