PAN-OS 11.1.9 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
-
-
-
-
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
-
- PAN-OS 12.1
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 10.2
- PAN-OS 10.1
PAN-OS 11.1.9 Addressed Issues
PAN-OSĀ® 11.1.9 addressed issues.
Issue ID | Description |
---|---|
PAN-290996
This issue is now resolved. See PAN-OS 11.1.10-h1 Addressed Issues
|
When performing an SNMP walk, the Connections Per Second (CPS)
counters incorrectly return a value of 0 for each virtual system
(VSYS), despite the firewall actively processing connections.
|
PAN-286255 | Fixed an issue where, when the firewall received an unexpected termination request for SSL sessions, the dataplane experienced a slow buffer resource leak.
|
PAN-285941
|
Fixed an issue where high memory consumption occurred on the
logrcvr process.
|
PAN-284073 | Fixed an issue on the firewall that caused commits to fail and the web interface to become inaccessible.
|
PAN-283954 | Fixed an issue where the configd process stopped responding due to a circular reference between address groups.
|
PAN-283168 | Fixed an issue related to syslog forwarding that caused the logrcvr process stopped responding.
|
PAN-282697 | Fixed an issue where traffic was delayed significantly when it used No Authentication Explicit Proxy and matched a decryption policy rule.
|
PAN-282454 | Fixed an issue where, when you added the Virtual System Name column under Unified Logs, the column did not remain visible in the table if you closed and re-opened the tab.
|
PAN-282391 | Fixed an issue on Panorama where a memory leak occurred after cloning a template, resulting in an increase in memory use, which caused OOM errors.
|
PAN-282359 | Fixed an issue where the Panorama web interface was slower than expected.
|
PAN-282206 | Fixed an issue where configuring Secure Web Gateway (SWG) in no-auth mode led to latency when no decryption policy rules or No-decrypt policy rules were present.
|
PAN-282069 | Fixed an issue on Panorama where Security policy rules were removed from device groups when you cloned or edited Security policy rules that used more than 63 characters.
|
PAN-281885 | Fixed an issue where, when exporting and importing CSV files, the hash values of pre-shared key variables set at template and template stack levels changed inconsistently, which resulted in both variables displaying the same hash value.
|
PAN-281882 | Fixed an issue where OSPF was redistributing connected routes beyond the intended loopback IP.
|
PAN-281649 | Fixed an issue where the index size limit was incorrectly calculated and indices rolled over earlier than expected, which resulted in high memory and OOM errors.
|
PAN-281269 | (PA-5220, PA-5250, and PA-5420 firewalls) Fixed an issue where the firewall management server memory usage continuously increased.
|
PAN-280942 | Fixed an issue where the logrcvr process stopped responding.
|
PAN-280700 | Fixed an Issue where commits failed with the error invalid IPv6 x:x - must be global/link-local unicast when the management IPv6 address had a specific value.
|
PAN-280477 | Fixed an issue on the web interface were you were unable to scroll up or down to view source zones in a NAT policy rule.
|
PAN-279691 | (Firewalls in active/passive HA configurations only) Fixed an issue where the firewall didn't synchronize IPSec SAs (security associations) to the passive firewall if the tunnel was not initially established by the active firewall.
|
PAN-279647 | Fixed an issue where threat names were displayed differently on the web interface and the exported CSV file.
|
PAN-279621 | Fixed an issue where processes stopped responding when HTTPS Forward traffic was run.
|
PAN-279400 | Fixed an issue where, when Restrict Certificate Extensions was enabled on decryption profiles, the basic constraints extension was overwritten incorrectly.
|
PAN-279209 | Fixed an issue where changes made to the management interface permitted IP address list in a global template were not pushed to the template stack or firewalls.
|
PAN-279195 | Fixed an issue on Panorama where Device Health displayed the device memory as 0%.
|
PAN-279065 | Fixed an issue where the firewall sent logs with connection succeeded to the syslog server every time a connection was established, which resulted in excessive logs.
|
PAN-278190 | Fixed an issue on Panorama where a scheduled report with SLS data had an invalid translated-query.
|
PAN-277755 | Fixed an issue that caused the request system private-data-reset CLI command to fail.
|
PAN-277417 | Fixed an memory leak issue related to TLS inbound decryption.
|
PAN-277018 | Fixed an issue where FTP data connections did not work for EPRT with Source IP + Port translation enabled on the firewall.
|
PAN-276862 | Fixed an issue on Panorama where the logd process stopped responding unexpectedly.
|
PAN-276616 | Fixed an issue on the firewall where half-duplex settings on Ethernet was not visible.
|
PAN-276412 | Fixed an issue where you were unable to download XML files from Panorama > Summary > Backups.
|
PAN-274907 | Fixed an issue on Panorama where Config Audit Commit Date displayed the timestamp of the configuration edit instead of the commit time.
|
PAN-274750 | Fixed an issue where the detailed log view in Panorama did not display all packet details for traffic logs received from the cloud.
|
PAN-274726 | Fixed an issue where Wildfire signature generation was enabled on all nodes in a cluster instead of only the active node.
|
PAN-274569 | Fixed an issue where the QSPF transceiver interface displayed an incorrect range figure on the temperature alarm.
|
PAN-274314 | (PA-1400 Series firewalls, PA-3400 Series firewalls, and PA-5400 Series firewalls only)
Fixed an issue where, when the pan_task process
restarted, control plane packets were dropped, which could impact
LACP and pings to host interfaces.
|
PAN-273870 | Fixed an issue on the firewall where you were unable to local changes that were made via the web interface.
|
PAN-273422 | Fixed an issue where traffic failed when Inline cloud analysis (Advanced Threat Prevention) was enabled in the Anti-Spyware profile with the action set to anything other than allow or alert and the maximum latency condition was reached.
|
PAN-273141 | Fixed an issue where GlobalProtect clients experienced slow file transfer download throughput when passing through an IPSec tunnel.
|
PAN-271701 | Fixed an issue where Advanced Services, App-ID Cloud Engine (ACE), and Enhanced Application Log stopped working due to incorrect memory usage accounting, which caused memory usage to remain at 99% after an extended period of time.
|
PAN-271498 | (PA-7000 Series firewalls, PA-5200 firewalls, and PA-5400f firewalls in FIPS mode only) Fixed an issue where decrypted traffic repeatedly failed and frequent reboots were required.
|
PAN-271273 | Fixed an issue where dynamic update downloads failed when IPv6 firewalling was enabled on the firewall and both IPv4 and IPv6 were configured on the management interface.
|
PAN-271175 | Fixed an issue where the all_task process stopped responding with a SIGABRT.
|
PAN-271151 | Fixed an issue where the GlobalProtect client did not automatically initiate a Kerberos SSO connection after logging in to Windows.
|
PAN-270192 | Fixed an issue where Panorama did not display the management IP address of devices onboard via ZTP.
|
PAN-269404 | Fixed an issue where the firewall did not reset the maximum latency timer for hold mode.
|
PAN-268705 | Fixed an intermittent issue where the firewall failed to process FTP traffic after upgrading to PAN-OS 10.1.14.
|
PAN-268614 | Fixed an issue on the web interface where, when all rules were highlighted when a read-only admin user clicked the Highlight Unused Rules checkbox.
|
PAN-267936 | Fixed an issue where commits failed with a validation error when you changed the encryption level and re-encryption option on a Panorama managed firewall.
|
PAN-267444 | Fixed an issue where large file downloads or uploads failed or remained in an incomplete state when using DLP HTTP2 mirror mode.
|
PAN-266589 | Fixed an issue where the firewall was unable to generate a tech support file when management server debug was disabled.
|
PAN-263465 | Fixed an issue where the logrcvr process stopped responding due to a memory leak and buffer overrun.
|
PAN-263270 | Fixed an issue where, after a commit was performed from Strata Cloud Manager, the SD-WAN configuration containing BGP routes did not display on the hub firewall.
|
PAN-263052 | Fixed an issue where the request logdb migrate-to-panorama start end-time
<start-time> <type> CLI command did not
work as expected, and you were unable to resend logs from a firewall
to Panorama or a log collector.
|
PAN-260015 | Fixed an issue on the firewall where the dataplane restarted due to insufficient allocation of memory buffers.
|
PAN-259610 | Fixed an issue where Wildfire content installation failed for WF-500B clusters when deployed from Panorama using the deployment schedule.
|
PAN-255914 | (VM-Series firewalls on Amazon Web Services (AWS) environments only) Fixed an issue where a newly bootstrapped firewall required a management server restart, relicensing, or license push from Panorama to invoke the device certificate.
|
PAN-254524 | Fixed an issue on Panorama where, when the Commit and Push button was clicked during a selective Commit and Push operation, the window stopped responding, which caused the operation to be delayed.
|
PAN-253127 | Fixed an issue where, after upgrading to PAN-OS 11.0.2-h3, the hardware pool DFLT became highly utilized, and the packet buffer gradually increased.
|
PAN-249574 | Fixed an issue where selective pushes failed due to a missing log collector reference.
|
PAN-245064 | (Multi-vsys firewalls only) Fixed an issue where commits failed on the firewall after selecting Export or push device config bundle on Panorama and a force push was required.
|
PAN-238208 | Fixed an issue where the firewall API returned inconsistent responses to a failed call using a valid API key. With this fix, the firewall returns the error Session is invalid if the session is not available for the cookie.
|