PAN-OS 11.1.2 Known Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
-
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
PAN-OS 11.1.2 Known Issues
PAN-OSĀ® 11.1.2 known issues.
The following list includes only outstanding known issues specific to PAN-OS
Ā®
11.1.2.
This list includes issues specific to Panoramaā¢, GlobalProtectā¢, VM-Series plugins, and
WildFireĀ®, as well as known issues that apply more generally or that are not identified
by an issue ID.Issue ID | Description |
---|---|
PAN-263987 | When a NAT traversal (NAT-T or UDP encapsulation) IPSec tunnel is
terminated on a Palo Alto Networks firewall and the NAT rule applied
to the NAT-T IPSec tunnel is also on the same firewall, then the
data traffic flowing through the NAT-T IPSec tunnel can't be NATed
correctly. |
PAN-262556 | The ElasticSearch cluster health status might continue to remain
yellow for an extended period after upgrading to PAN-OS 11.1.2. |
PAN-260851
| From the NGFW or Panorama CLI, you can override the existing
application tag even if Disable Override is enabled for the
application ( Objects Applications |
PAN-257615 | The Panorama web interface intermittently displays logs or fails to
display logs completely. |
PAN-255538 | On the PA-455 firewall, the LEDs indicating the link status of Ports
3 and 4 are swapped. |
PAN-252085 | The PA-450R, PA-450R-5G, and PA-455 firewalls can
experience an interruption of traffic when switching the combo port
connection from fiber to copper. Workaround: With the copper port connected, initiate a soft
reboot of the firewall using the CLI command request
restart system . After the reboot, the copper port
will be able to process traffic. |
PAN-250062
| Device telemetry might fail at configured intervals due to bundle generation issues. |
PAN-243951 | On the Panorama management sever in an active/passive High
Availability (HA) configuration, managed devices ( Panorama Managed Devices Summary out-of-sync
on the passive HA peer when configuration changes are made to the
SD-WAN (Panorama SD-WAN Workaround: Manually synchronize the Panorama HA peers.
|
PAN-241041 | On the Panorama management server exporting template or template
stack variables ( Panorama Templates |
PAN-224502 | The autocommit time of the VM-Series firewall running PAN-OS 11.1.0
might take longer than expected. |
PAN-223488 | On the M-600 appliance, closed ElasticSearch shards are not deleted
from the M-600 appliance. This causes the ElasticSearch shard
purging to not work as expected, resulting in high disk usage. |
PAN-222253 | On the Panorama management server, policy rulebase reordering when
you View Rulebase by Groups (Policy <policy-rulebase> |
PAN-221015 | On M-600 appliances in Panorama or Log Collector mode, the
es-1 and
es-2 ElasticSearch processes fail
to restart when the M-600 appliance is rebooted. The results in the
Managed Collector ES health status (Panorama Managed Collectors Health Status Workaround:
Log in to the Panorama or Log
Collector CLI experiencing degraded ElasticSearch health
and restart all ElasticSearch processes.
|
PAN-220180 | Configured botnet reports ( Monitor Botnet |
PAN-220176 | System process crashes might occur with VoIP traffic when NAT is
enabled with Persistent Dynamic IP and Port settings. |
PAN-219644 | Firewalls forwarding logs to a syslog server over TLS ( Objects Log Forwarding |
PAN-218521 | The ElasticSearch process on the M-600 appliance in Log Collector
mode may enter a continuous reboot cycle. This results in the M-600
appliance becoming unresponsive, consuming logging disk space, and
preventing new log ingestion. |
PAN-217307 | The following Security policy rule ( Policies Security log-start eq no log-end eq no log-end eq yes |
PAN-207733 | When a DHCPv6 client is configured on HA Active/Passive firewalls, if
the DHCPv6 server goes down, after the lease time expires, the
DHCPv6 client should enter SOLICIT state on both the Active and
Passive firewalls. Instead, the client is stuck in BOUND state with
an IPv6 address having lease time 0 on the Passive firewall. |
PAN-207611 | When a DHCPv6 client is configured on HA Active/Passive firewalls,
the Passive firewall sometimes crashes. |
PAN-207442 | For M-700 appliances in an active/passive high availability ( Panorama High Availability active-primary HA peer
configuration sync to the
secondary-passive HA peer may fail.
When the config sync fails, the job Results is
Successful
(Tasks ), however the sync status on the
Dashboard displays as Out
of Sync for both HA peers.Workaround : Perform a local commit on the
active-primary HA peer and then
synchronize the HA configuration.
|
PAN-207040 | If you disable Advanced Routing, remove logical routers, and
downgrade from PAN-OS 11.0.0 to a PAN-OS 10.2.x or 10.1.x release,
subsequent commits fail and SD-WAN devices on Panorama have no
Virtual Router name. |
PAN-206913 | When a DHCPv6 client is configured on HA Active/Passive firewalls,
releasing the IPv6 address from the client (using Release in the UI
or using the request dhcp client ipv6 release
all CLI command) releases the IPv6 address from
the Active firewall, but not the Passive firewall. |
PAN-206909 | The Dedicated Log Collector is unable to reconnect to the Panorama
management server if the configd
process crashes. This results in the Dedicated Log Collector losing
connectivity to Panorama despite the managed collector connection
Status (Panorama Managed Collector connected
and the managed colletor Health status
displaying as healthy.This results in the local Panorama config and system logs not being
forwarded to the Dedicated Log Collector. Firewall log forwarding to
the disconnected Dedicated Log Collector is not impacted. Workaround: Restart the mgmtsrvr
process on the Dedicated Log Collector.
|
PAN-204689 | Upon upgrade to PAN-OS 11.0.1, the following GlobalProtect settings
do not work:
|
PAN-197588 | The PAN-OS ACC (Application Command Center) does not display a widget
detailing statistics and data associated with vulnerability exploits
that have been detected using inline cloud analysis. |
PAN-197419 | ( PA-1400 Series firewalls only ) In Network Interface Ethernet Tag value. |
PAN-196758 | On the Panorama management server, pushing a configuration change to
firewalls leveraging SD-WAN erroneously show the auto-provisioned
BGP configurations for SD-WAN as being edited or deleted despite no
edits or deletions being made when you Preview
Changes (Commit Push to Devices Edit Selections Commit Commit and Push Edit Selections |
PAN-195968 | ( PA-1400 Series firewalls only ) When using the CLI to
configure power over Ethernet (PoE) on a non-PoE port, the CLI
prints an error depending on whether an interface type was selected
on the non-PoE port or not. If an interface type, such as tap, Layer
2, or virtual wire, was selected before PoE was configured, the
error message will not include the interface name (eg. ethernet1/4).
If an interface type was not selected before PoE was configured, the
error message will include the interface name. |
PAN-194978 | ( PA-1400 Series firewalls only ) In Network Interface Ethernet Link State icon does not display link
speed and link duplex details. |
PAN-187685 | On the Panorama management server, the Template Status displays no
synchronization status ( Panorama Managed Devices Summary Workaround: After the bootstrapped firewall is successfully
added to Panorama, log in to the Panorama web
interface and select Commit Push to Devices |
PAN-187407 | The configured Advanced Threat Prevention inline cloud analysis
action for a given model might not be honored under the following
condition: If the firewall is set to Hold client request
for category lookup and the action set to
Reset-Both and the URL cache has been
cleared, the first request for inline cloud analysis will be
bypassed. |
PAN-186283 | Templates appear out-of-sync on Panorama after successfully deploying
the CFT stack using the Panorama plugin for AWS. Workaround : Use Commit Push to Devices |
PAN-184708 | Scheduled report emails ( Monitor PDF Reports Email Scheduler
Workaround: To receive a scheduled report email for all other
PDF report types:
|
PAN-184406 | Using the CLI to add a RAID disk pair to an M-700 appliance causes
the dmdb process to crash. Workaround: Contact customer support to stop the dmdb process
before adding a RAID disk pair to a M-700 appliance. |
PAN-183404 | Static IP addresses are not recognized when "and" operators are used
with IP CIDR range. |
PAN-181933 | If you use multiple log forwarding cards (LFCs) on the PA-7000
series, all of the cards may not receive all of the updates and the
mappings for the clients may become out of sync, which causes the
firewall to not correctly populate the Source User column in the
session logs. |
PAN-164885 | On the Panorama management server, pushes to managed firewalls ( Commit Push to Devices Commit and Push ) may fail
when an EDL (Objects External Dynamic Lists Check for
updates every 5 minutes due to the commit and EDL
fetch processes overlapping. This is more likely to occur when
multiple EDLs are configured to check for updates every 5
minutes. |