PAN-OS 11.1.10-h7 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
PAN-OS 11.1.10-h7 Addressed Issues
PAN-OSĀ® 11.1.10-h7 addressed issues.
|
Issue ID
|
Description
|
|---|---|
|
PAN-303737
|
Fixed an issue where XML API commands failed with a
Method not found (policy_xml) error
in dagger.log. The issue was due to session-distribution commands in
dagger files handling.
|
|
PAN-300906
|
Fixed an issue where XML API commands failed with a
Method not found (policy_xml) error
in dagger.log. The issue was due to missing XML-related functions
for inline-cloud-proxy and session-distribution commands in dagger
files handling.
|
|
PAN-300096
|
Fixed an issue where a local commit on a firewall breaks template
stack overrides, preventing the enabling of LACP (Link Aggregation
Control Protocol). After a local commit, the LACP enable check was
unexpectedly unchecked, causing an outage. Attempting to re-enable
LACP through the web interface was unsuccessful, requiring manual
removal of the LACP configuration from the Panorama CLI.
|
|
PAN-299815
|
Fixed an issue on multi-vsys firewalls where a host was not removed
from the quarantine list after receiving a redistribution message
from Panorama. This occurred when Panorama was configured to
redistribute quarantine messages to a firewall cluster, and the
GlobalProtect configuration and redistribution were built out in a
vsys other than vsys1.
|
|
PAN-299785
|
(PA-7500 and PA-5450 firewalls in FIPS-CC mode) Fixed an
issue where the affected firewalls would boot into maintenance mode
when a reboot was initiated from the web interface. This was due to
a device reboot triggering a power down to all slots, leading to
maintenance mode. A hard reboot would allow the firewall to boot
normally.
|
|
PAN-299772
|
(VM-Series firewalls in active/passive configurations only)
Fixed an issue where, after an HA failover event, the newly active
firewall DHCP client interfaces failed to obtain IP addresses
automatically. This occurred because the DHCP client processes did
not initiate the necessary DHCP discover or renew requests
|
|
PAN-299615
|
Fixed an issue where, when the Network Packet Broker feature was
enabled, forward TLS (non-decrypted) traffic was not working as
expected when there were segmented client hellos and a no-decrypt
rule existed. This issue occurred when Zone Protection profiles were
configured for trust/untrust zones but not attached to NPB zones.
|
|
PAN-298654
|
Fixed an issue where the firewall generate false positive threat logs
during updates to a large domain list (EDL) when a DNS lookup for a
domain being added or removed occurred during the update process.
This resulted in a threat log being generated for a different,
unrelated domain that remained on the list.
|
|
PAN-298505
|
Fixed an issue where, after upgrading an HA pair of PA-7050
firewalls, the vsys ID changed in sequence, causing autocommit
failures with validation errors. This occurred when the multi-vsys
firewall had virtual systems created and pushed from Panorama, and
the vsys ID was not in a correct sequence because the unused vsys
was deleted from Panorama and pushed to devices.
|
|
PAN-297972
|
Fixed an issue where a dataplane crash occurred when traffic matched
Inline Cloud Analysis pre-filtering signatures, even when Inline
Cloud Analysis features were not enabled.
|
|
PAN-297797
|
Fixed an issue where, during a refresh of a large External Dynamic
List (EDL), traffic that matched a domain on the list was
incorrectly identified as a different domain, which resulted in
false positive threat logs.
|
|
PAN-297782
|
Fixed an issue on Panorama where reassociating a vsys from one device
group to another in a multi-vsys environment resulted in another
vsys from the same firewall being removed from the original device
group. This resulted in the device being moved into the
no device groups attached group, a
superuser was required to manually reattach the device.
|
|
PAN-297775
|
Fixed an issue where, after upgrading to an affected PAN-OS release,
the Visible Virtual Systems field started to
reference the vsys name instead of the vsys ID, which caused
inter-vsys routing to fail. This occurred when a vsys display name
matched one of the vsys IDs.
|
|
PAN-296752
|
Fixed an issue where the firewall experienced high management CPU
usage and repeatedly rebooted when attempting to retrieve SMART
data.
|
|
PAN-295221
|
Fixed an issue where, after upgrading Panorama and Log Collectors,
Traffic and Threat logs were not forwarded to a Splunk server over
UDP.
|
|
PAN-293848
|
Fixed an issue where Panorama failed to push the default value of
None for the secondary NTP server address
to managed firewalls, resulting in a commit validation error. This
occurred even when configuring the secondary NTP server address as
None in Panorama's web interface, and
affected both newly deployed and long-standing production firewalls
after upgrading.
|
|
PAN-293847
|
Fixed an issue where EAL logs for traffic matching the
intrazone-default Security policy rule were not forwarded to the IoT
Security portal.
|
|
PAN-297240
|
Fixed an issue where attempting to generate reports in a WildFire
FIPS Private Cloud or WF-500 deployment returned 401 errors.
|
|
PAN-296490
|
(FIPS CC mode enabled only) Fixed an issue where Panorama on
GCP rebooted every hour after upgrading to an affected release.
|
|
PAN-296453
|
Fixed an issue where decryption exclusion lists were not working for
untrusted certificates, and SSL sessions were still being decrypted
even after adding them to the exclusion list. This occurred because
the firewall was not adding sessions to the exclude cache until
after receiving a non-RFC alert (BadCertificate) from the server.
The fix ensures that the first session is added to the exclude
cache, allowing subsequent sessions to skip decryption. This issue
affects firewalls configured as clients in server-client
communication.
|
|
PAN-295944
|
Fixed an issue where static routes remained active in the FIB and RIB
even when the associated physical port interface was down, which
resulted in traffic being incorrectly routed through a
non-operational interface.
|
|
PAN-295560
|
Fixed an issue where, after upgrading Panorama and Log Collectors,
tunnel logs were not visible in Panorama or Splunk even though
traffic and threat logs were received.
|
|
PAN-295484
|
Fixed an issue where SD-WAN did not generate system logs with
timestamps and reasons for degradation of Direct Internet Access
paths.
|
|
PAN-295470
|
Fixed an issue on the firewall where the useridd process
continuously increased its memory consumption, which resulted in an
OOM condition that caused the firewall to restart.
|
|
PAN-295257
|
Fixed an issue where, after onboarding a firewall to Panorama, IPsec
tunnels displayed IKEv2 in Panorama, even though the tunnels were
configured with IKEv1 locally on the firewall.
|
|
PAN-294893
|
Fixed an issue where firewalls with the Send handshake
messages to CTD for inspection setting enabled
caused incorrect security policy rules to be matched. Specifically,
traffic not identified as openai-base or openai-chatgpt applications
was incorrectly matched by the ALLOW-OPEN-AI-FULL-ACCESS-URLS-ALERTS
rule. Additionally, the expected response page for blocked URLs was
not displayed.
|
|
PAN-294770
|
(Firewalls in active/passive HA configurations) Fixed an
issue on firewalls where, after failover, certain subnets were
missing from the Link State Database, which prevented OSPF routes
from being immediately learned due to a Type-7 to Type-5 LSA
translation conflict in the ABR when the same LSA was advertised by
two peers in the NSSA area.
|
|
PAN-294524
|
Fixed an issue where firewalls and Panorama management servers were
unable to view or download WildFire reports from a WF-500 appliance,
resulting in a 401 error in the report tab.
|
|
PAN-292393
|
Fixed an issue where TFTP file transfers intermittently timed out in
active-active HA pairs when the TFTP control channel was processed
by one firewall and the data channel was processed by the other.
This occurred because the firewall receiving the data channel failed
to match the predicted session due to asynchronous processing of HA
messages.
|
|
PAN-292261
|
Fixed an issue where the firewall repeatedly reported an unreachable
syslog server as back online when the
server remained unavailable. This resulted in misleading alternating
connection status messages in the system logs.
|
|
PAN-291716
|
Fixed an issue where PA-460 firewalls experienced out-of-memory (OOM)
conditions, leading to device crashes and reboots.
|
|
PAN-291661
|
Fixed an issue on Panorama appliances and Log Collectors where, after
an upgrade, Elasticsearch intermittently entered into a Red state
before automatically recovering.
|
|
PAN-291653
|
Fixed an issue where the GlobalProtect host ID field was
intermittently blank in traffic logs on Prisma Access, even when the
user was connected and had the correct host ID information. This
occurred when the IP address to host ID entry expired and the entry
was re-insterted without the dataplane flag being set.
|
|
PAN-291288
|
Fixed an issue where the firewall rebooted unexpectedly due to a
pan_task process restart related to page allocation
failures.
|
|
PAN-290453
|
(PA-7500 firewalls only) Fixed an issue where PA-7500
firewalls experienced silent traffic drops. During migration from
PA-7050 to PA-7500 firewalls connected in series, intermittent
connection losses occurred for some applications. Traffic leaving
the PA-7050 was not received or processed by the PA-7500, even with
direct connections and replaced cables/SFPs. Global counters did not
indicate any drops on the PA-7500.
|
|
PAN-289859
|
(Panorama virtual appliances only) Fixed an issue where
Panorama failed to mount logging disks larger than 2TB due to a
partitioning error.
|
|
PAN-289405
|
(VM-Series firewalls only) Added the CLI command
no-refresh-discard-session to
address an issue where the discarded session time to live (TTL) did
not refresh at the default value.
|
|
PAN-289249
|
Fixed an issue where a memory leak occurred on the
reportd process when a WildFire update was
initiated while device telemetry data collection was in progress.
This resulted in an OOM condition.
|
|
PAN-289067
|
Fixed an issue where, after upgrading Panorama in a High Availability
(HA) pair, the configuration logs stopped synchronizing from the
primary Panorama to the secondary Panorama. This issue occurred
because the log forwarding flag was permanently disabled due to the
connection state not being active when the
log-fwd-ctrl message was received.
|
|
PAN-288761
|
Fixed an issue on the firewall where the logrcvr process
stopped responding.
|
|
PAN-288388
|
Fixed an issue where, after an EDL certificate update or repository
migration, authentication failures caused the firewall to not fall
back to the last successfully cached EDL entries, which led to
policy rules that referenced the EDL to not be enforced.
|
|
PAN-287803
|
Fixed an issue where, after upgrading the firewall, certain websites
weren't accessible when the accumulation proxy was enabled. The
proxy did not use the same DF bit state as the original traffic,
causing it to be fragmented and dropped elsewhere in the
network.
|
|
PAN-287782
|
Fixed an issue where firewalls configured in vwire mode modified DSCP
values from AF11 to CS0 on traffic passing through the firewall,
even when QoS policy rules and DSCP rewrite settings were not
configured.
|
|
PAN-287693
|
Fixed an issue where Panorama did not use the configured proxy
settings to check WildFire private cloud content and instead
connected directly to the WildFire device using the management
interface. This occurred even when Use Proxy Settings for
Private Cloud was enabled.
|
|
PAN-287622
|
Fixed an issue where IPv6 traffic was affected after upgrading the
firewall.With SSL decryption enabled and a decryption policy
configured for the traffic, the firewall dropped packets due to
receiving a Packet Too Big ICMP
message. This occurred because the PathMTU information update was
incorrect for the TCB (pan-server) when the firewall was acting as a
server. Additionally, the flow label under the IPv6 header was set
to zero while the packet was being transmitted out of the
firewall.
|
|
PAN-287423
|
Fixed an issue where content loading issues occurred on IPv6 websites
due to the firewall incorrectly setting the IPv6 header flow label
to 0.
|
|
PAN-287314
|
Fixed an issue with firewalls in active/passive HA configurations
where an OOM condition occurred and caused a failover due to a
memory leak associated with the logrcvr process.
|
|
PAN-285648
|
Fixed an issue where the log receiver process crashed on PA-7050
firewalls due to system log processing threads becoming blocked when
the queue was full. This resulted in a heartbeat failure.
|
|
PAN-285169
|
Fixed an issue on Panorama where Kerberos superusers were unable to
edit policy rules because the target device tab was grayed out.
|
|
PAN-284872
|
Fixed an issue where ENA (Elastic Network Adapter) extended
statistics (conntrack allowance metric) were unavailable in DPDK
22.11.x. This metric is now available through AWS Cloudwatch.
|
|
PAN-283053
|
Fixed an issue where the firewall experienced high disk space
utilization, which caused the firewall to become non-functional.
|
|
PAN-282093
|
Enhanced the CLI command request legacy
reset to delete the legacy certificate files that
were being used to connect with the secondary Panorama
appliance.
|
|
PAN-281797
|
Fixed an issue where firewalls became unstable and stopped
responding, which resulted in an OOM condition.
|
|
PAN-278322
|
(VM-Series firewalls on Amazon Web Services (AWS) Gateway Load
Balancer (GWLB) deployments only) Fixed an issue where the
firewall did not display the correct source user in traffic logs and
session details.
|
|
PAN-277682
|
Fixed an issue where moving an address object from a device group to
shared and renaming it did not reflect in
the address group, which caused commits to fail.
|
|
PAN-277034
|
Fixed an issue where WildFire reports were not fully displayed and
were not downloadable due to static resources not being found.
|
|
PAN-276525
|
Resolved multiple issues affecting IPSec tunnels using NAT Traversal
(NAT-T) when a Dynamic NAT policy was configured (including Dynamic
NAT or DIPP). During rekey events, tunnels could go down or flap due
to incorrect session handling. This issue impacted both cluster and
standalone deployments.
|
|
PAN-272539
|
(Panorama appliances on Microsoft Azure environments only)
Fixed an issue where user to IP address mapping was missing for some
users connected to specific Prisma Access gateways, which caused the
collection layer Azure firewall to not form the mapping.
|
|
PAN-271507
|
(PA-5450 firewalls only) Fixed an issue where the DPC on
slot 3 intermittently stopped responding due an
all_pktproc restart.
|
|
PAN-267704
|
Fixed an issue where the firewall did not send an ICMP error packet
to Envoy when the MSS was exceeded.
|
|
PAN-267450
|
Fixed an issue where the reported process stopped
responding with a SIGSEGV at
schedule_report_es_response.
|
|
PAN-262444
|
Fixed an issue where the firewall did not refresh the external
dynamic list due to the first entry in the list being removed from
the global external list and breaking out of the loop.
|
|
PAN-260185
|
Fixed an issue where a dataplane crash occurred in Inline Cloud
Analysis action lookup because there were no vulnerability or
antispyware profiles in the security policy rule.
|
|
PAN-258039
|
Fixed an issue where the firewall displayed the incorrect rule name
when a threat log was generated for Inline Cloud Analyzed CMD
Injection Traffic Detection.
|
|
PAN-255253
|
Fixed an issue where the firewall did not establish a syslog
connection to the probe VM syslog server in ADEM Regressions.
|
|
PAN-253963
|
(Panorama appliances in Panorama mode and Log Collector mode
only) Fixed an issue where autocommits took longer than
expected to complete.
|
|
PAN-251715
|
Fixed an issue where the firewall closed the SSL connection to the
user ID agent.
|
|
PAN-251646
|
Fixed an issue where commits failed with the error message
Error: Error unserializing profile
objects. This occurred due to memory allocation
issues when a large number of scan profiles were configured.
|