PAN-OS 11.1.10-h21 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
PAN-OS 11.1.10-h21 Addressed Issues
PAN-OSĀ® 11.1.10-h21 addressed issues.
Issue ID | Description |
|---|---|
|
PAN-316911
|
(VM-Series firewalls on Amazon Web Services (AWS) environments
only) Fixed an issue where a newly bootstrapped firewall
required a management server restart, relicensing, or license push
from Panorama to invoke the device certificate.
|
|
PAN-315176
|
Added an enable and disable CLI command to address an issue where the
firewall experienced increased packet drops and slower performance
after an upgrade due to high burst traffic.
|
|
PAN-314319
|
Fixed an issue where the firewall experienced increased packet drops
and slower performance after an upgrade due to high burst
traffic.
|
|
PAN-314142
|
Fixed an issue where establishing log forwarding connections to the
Strata Logging Service (SLS) took longer than expected, which
resulted in delayed log visibility on SLS.
|
|
PAN-314061
|
Fixed an issue where traffic was disrupted during IPSec rekey
operations due to a 2 second delay in sending the DELETE message for
the previous Security Association (SA) to the peer gateway after a
new SA was negotiated.
|
|
PAN-313850
|
(PA-1400 Series firewalls in HA configurations only) Fixed
an issue where a split-brain condition occurred and HA1/HA2 links
went down while upgrading when the HA configuration used dataplane
interfaces for HA1 and a combination of HSCI and Ethernet interfaces
for HA2.
|
PAN-313623 | Fixed an issue where the /opt/pancfg/mgmt/ssl/private/ directory on Palo Alto Networks devices with TPM support became 100% utilized due to an accumulation of undeleted .pub_pem files. This occurred because executing the show device-certificate status CLI command initiated a process that generated these files but failed to remove them, which prevented the fetching of new device certificates.
|
|
PAN-313572
|
(VM-Series firewalls only) Fixed an issue where the
dataplane restarted due to a segmentation fault.
|
|
PAN-312706
|
Fixed an issue where the firewalls restarted due to a function
lacking a NULL-pointer sanity check.
|
|
PAN-311285
|
(Firewalls in HA conditions only) Fixed an issue where a
memory leak occurred related to the ospfd process,
which caused RAM usage to continuously increase on active devices in
an HA cluster until the device stopped responding, even after an HA
failover.
|
|
PAN-311250
|
(Panorama appliances and Log Collectors only) Fixed an issue
where logs from multiple devices were not visible on Panorama even
though the Elasticsearch health status on the dedicated Log
Collectors appeared green.
|
|
PAN-311073
|
(Panorama managed firewalls in HA configurations only) Fixed
an issue where firewalls incorrectly updated the modified date and
MD5 hash of policy rules during an HA sync commit job or a
subsequent local commit, even when no changes were made to the
policy rules.
|
|
PAN-309300
|
Fixed an issue where management plane system resources configuration
size exceeded 28 MB for over 4 hours, and the following error
message was displayed: Configuration size reaching
device capacity limit.
|
|
PAN-308786
|
(Panorama appliances only) Fixed an issue where traffic log
queries using the device_name filter
returned no results, and complex log queries that included negation
operators produced incorrect outputs.
|
|
PAN-308654
|
Fixed an issue where the Elasticsearch Close Indices process closed
more indices than expected and dropped the number of open shards
below the minimum of 800 per Elasticsearch instance. This occurred
because the process did not correctly account for the number of
Elasticsearch instances when calculating the maximum number of
allowed open shards.
|
|
PAN-308507
|
(Panorama managed firewalls only) Fixed an issue where the
firewall intermittently failed to maintain active log forwarding
streams to Cortex Data Lake even when duplicate logging and enhanced
application logging were enabled.
|
|
PAN-307702
|
(Firewalls in HA configurations only) Fixed an issue where
traffic passing through AE layer 2 interfaces was interrupted during
HA failovers.
|
|
PAN-307597
|
Fixed an issue where BGP peering sessions between a hub firewall and
a satellite firewall over GlobalProtect LSVPN failed to connect.
|
|
PAN-306555
|
Fixed an issue where the firewall stopped responding, which led to
service outages.
|
|
PAN-305700
|
Fixed an issue where a reboot loop occurred when OSPF interfaces were
configured with a link type of
point-to-point.
|
|
PAN-305552
|
Fixed an issue where DLP logs displayed an incorrect file type when
the firewall did not set the file type field.
|
|
PAN-304718
|
Fixed an issue where OSPF and BGP outages occurred due to an
all_task process restart during clientless VPN
content rewrite processing.
|
|
PAN-304696
|
Fixed an issue where the Cloud User-ID connection timed out because
the firewall took too long to process the OCSP response.
|
|
PAN-304576
|
Fixed an issue where the firewall entered a non-functional state due
to segmentation fault within the all_pktproc process
that was caused by a session that involved http2 cleartext
traffic.
|
|
PAN-304205
|
Fixed an issue on Panorama where, after upgrading to an affected
release, a partial commit via the API did not push configuration
changes to managed firewalls, and a full commit was required to
synchronize the configuration.
|
|
PAN-303959
|
Fixed an issue where traffic was incorrectly identified as
unknown-tcp/unknown-udp due to App-ID resource leak and eventually
dropped.
|
|
PAN-303745
|
Fixed an issue where inter-dataplane forwarding did not work for
sessions ingressing on Slot 2, which resulted in intermittent ping
failures to interfaces on Network Card 2 when traffic was forwarded
to Slot 3.
Note: With this fix, after a slot restart, the global counter
will still show dot1q errors for a short period.
|
|
PAN-303722
|
Fixed an issue on the firewall where configuring spyware and
vulnerability profiles in Security policy rules caused a memory leak
in the devsrvr process with each configuration
commit.
|
|
PAN-302654
|
(Firewalls in active/passive HA configurations only) Fixed
an issue where, when the HA configuration had multiple logical
routers, static or connected routes redistributed into OSPF aged out
in the LSDB, which caused the routes to be removed on peer OSPF
neighbors.
|
|
PAN-301731
|
Fixed an issue where, when the firewall was unable to establish an
SCM connection due to the discovery service returning a 404 error
when the device was not yet known to the service, the firewall did
not retry the attempt as expected.
|
|
PAN-300671
|
Fixed an issue where traffic reports that were generated with
destination/source and destination/source hostnames were not
displayed in IPv4 format.
|
|
PAN-300664
|
Fixed an issue on the Panorama and firewall web interface where
Applications pages became unresponsive after activating the SaaS
Inline license.
|
|
PAN-300423
|
Fixed an issue where Data Processing Cards (DPCs) installed in slots
5 and 6 remained stuck in a starting state with the error
Signal detected for port xeS5-DP0 but Link
Down alerts, which resulted in device
instability.
|
|
PAN-299705
|
Fixed an issue where API calls to commit changes on Panorama
intermittently failed when using the XML API with refresh=no, which
caused changes to not be applied to the partial-commit
configuration.
|
|
PAN-299495
|
Fixed an issue where the show system setting
ssl-decrypt certificate CLI command did not
display certificates when XML output was enabled.
|
|
PAN-298945
|
Fixed an issue where OSCP HTTP POST requests were not formatted
correctly, which caused failures with strict responders.
|
|
PAN-298617
|
Optimized the commit workflow to reduce the size of the effective
configuration, resulting in lower memory consumption.
|
|
PAN-296694
|
Fixed an issue where the firewall rebooted due to the
useridd process repeatedly restarting during an
IP-port data type writes to the redis from multiple sources such as
TSA or XML in a scale environment.
|
|
PAN-295803
|
Addressed a memory leak issue under sc3 and automatic commit recovery
(ACR) code path.
|
|
PAN-295802
|
Fixed an issue where a memory leak related to the
configd process occurred.
|
PAN-296202 | (Firewalls in active/active HA configurations only) Added a log enhancement to capture an issue where, when a commit operation was in progress, newly deployed IP address tags that used the XML API were not immediately reflected in address group resolution, which delayed IP address mapping to address groups and caused traffic to be incorrectly allowed or denied.
|
|
PAN-294379
|
Fixed an issue where, when all interfaces configured for SD-WAN SaaS
Application path monitoring failed, the firewall stopped forwarding
traffic even if the ISP links and default gateway probing were still
active.
|
|
PAN-292306
|
Fixed an issue where the authd process stopped handling
RADIUS authentication requests and required a restart.
|
|
PAN-291094
|
Fixed an issue the firewall experienced packet descriptor on chip and
buffer spikes, which led to dropped traffic due to an unidentified
traffic pattern.
|
|
PAN-290938
|
Fixed an issue where multiple memory leaks occurred related to the
configd process.
|
|
PAN-288175
|
Addressed a stack buffer overflow memory leak under plugin management
code path.
|
|
PAN-287392
|
Fixed the issue on the web interface where ACC
graphs displayed No data to display when a
filter was applied to Source IP or
Destination IP.
|
|
PAN-287159
|
Fixed an issue where file uploads to Dropbox stalled when using a
PA-CPT device with MLC2 and DLP Mirror mode enabled for HTTP2
traffic. This occurred because the proxy was unable to decrement
packet counts properly when the queue was large, resulting in a
receive window size of 0 for the parent session.
|
|
PAN-283237
|
Fixed an issue where traffic logs incorrectly displayed the action as
allow for traffic matching a Security
policy rule configured with the action set to
deny. This issue occurred due to the
child session being used for policy rule lookup when a configuration
update triggered a rematch if the FTP-data application was not in
the rule.
|
|
PAN-279364
|
(VM-Series firewalls with multiple NICs only) Fixed an issue
were the queue count in the task dump displayed an incorrect number
of queues for SR-IOV interfaces due to the queue mapping logic
incorrectly using a non-multi-NIC function.
|
|
PAN-279209
|
Fixed an issue where changes made to the management interface
permitted IP address list in a global template were not pushed to
the template stack or firewalls.
|
|
PAN-278688
|
Fixed an issue where DNS Security threat logs were not displayed on
the firewall when packet capture was enabled and the domain name
length was 62 characters.
|
|
PAN-278628
|
(Firewalls in HA configurations only) Fixed an issue where
the configd process restarted during a configuration
push from Panorama, which caused the active firewall to lose
management access for 20-30 minutes.
|
|
PAN-277987
|
(VM-Series firewalls in AWS environments only) Fixed an
issue where HA failover mode incorrectly changed from
interface move to secondary IP
move after a reboot.
|
|
PAN-274742
|
(VM-Series firewalls only) Fixed an issue where the
task-queue dump CLI command
returned incorrect information in multi-nic mode.
|
|
PAN-273487
|
Fixed an issue where the distributord process restarted
on firewalls in multi-vsys environments with User-ID configured and
Panorama as a redistribution client. This occurred when a large
volume of IP address-to-user mappings were learned.
|
|
PAN-273158
|
(PA-7000 Series firewalls only) Fixed an issue where an
incorrect ASIC configuration caused silent packet drops or
application slowness when receiving a mix of jumbo and non-jumbo
packets.
|
|
PAN-262353
|
Fixed an issue where, when Panorama was upgraded but log collectors
were on an earlier version, logs from a log collector group were not
viewable on a Panorama.
|
|
PAN-259785
|
Fixed an issue where the devsrvr process restarted and
created a core dump because two threads did not terminate
correctly.
|
|
PAN-245686
|
Fixed an issue where memory leaks occurred when checking for,
downloading, or installing dynamic updates.
|
|
PAN-243507
|
Fixed an issue on the firewall web interface where Logical
Router did not load after an FRR stack upgrade.
|