PAN-OS 8.1.12 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- Cloud Management of NGFWs
-
- Management Interfaces
-
- Launch the Web Interface
- Use the Administrator Login Activity Indicators to Detect Account Misuse
- Manage and Monitor Administrative Tasks
- Commit, Validate, and Preview Firewall Configuration Changes
- Commit Selective Configuration Changes
- Export Configuration Table Data
- Use Global Find to Search the Firewall or Panorama Management Server
- Manage Locks for Restricting Configuration Changes
-
-
- Define Access to the Web Interface Tabs
- Provide Granular Access to the Monitor Tab
- Provide Granular Access to the Policy Tab
- Provide Granular Access to the Objects Tab
- Provide Granular Access to the Network Tab
- Provide Granular Access to the Device Tab
- Define User Privacy Settings in the Admin Role Profile
- Restrict Administrator Access to Commit and Validate Functions
- Provide Granular Access to Global Settings
- Provide Granular Access to the Panorama Tab
- Provide Granular Access to Operations Settings
- Panorama Web Interface Access Privileges
-
- Reset the Firewall to Factory Default Settings
-
- Plan Your Authentication Deployment
- Pre-Logon for SAML Authentication
- Configure SAML Authentication
- Configure Kerberos Single Sign-On
- Configure Kerberos Server Authentication
- Configure TACACS+ Authentication
- Configure TACACS Accounting
- Configure RADIUS Authentication
- Configure LDAP Authentication
- Configure Local Database Authentication
- Configure an Authentication Profile and Sequence
- Test Authentication Server Connectivity
- Troubleshoot Authentication Issues
-
- Keys and Certificates
- Default Trusted Certificate Authorities (CAs)
- Certificate Deployment
- Configure the Master Key
- Export a Certificate and Private Key
- Configure a Certificate Profile
- Configure an SSL/TLS Service Profile
- Configure an SSH Service Profile
- Replace the Certificate for Inbound Management Traffic
- Configure the Key Size for SSL Forward Proxy Server Certificates
-
- HA Overview
-
- Prerequisites for Active/Active HA
- Configure Active/Active HA
-
- Use Case: Configure Active/Active HA with Route-Based Redundancy
- Use Case: Configure Active/Active HA with Floating IP Addresses
- Use Case: Configure Active/Active HA with ARP Load-Sharing
- Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall
- Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
- Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3
- HA Clustering Overview
- HA Clustering Best Practices and Provisioning
- Configure HA Clustering
- Refresh HA1 SSH Keys and Configure Key Options
- HA Firewall States
- Reference: HA Synchronization
-
- Use the Dashboard
- Monitor Applications and Threats
- Monitor Block List
-
- Report Types
- View Reports
- Configure the Expiration Period and Run Time for Reports
- Disable Predefined Reports
- Custom Reports
- Generate Custom Reports
- Generate the SaaS Application Usage Report
- Manage PDF Summary Reports
- Generate User/Group Activity Reports
- Manage Report Groups
- Schedule Reports for Email Delivery
- Manage Report Storage Capacity
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
-
- Configure Syslog Monitoring
-
- Traffic Log Fields
- Threat Log Fields
- URL Filtering Log Fields
- Data Filtering Log Fields
- HIP Match Log Fields
- GlobalProtect Log Fields
- IP-Tag Log Fields
- User-ID Log Fields
- Decryption Log Fields
- Tunnel Inspection Log Fields
- SCTP Log Fields
- Authentication Log Fields
- Config Log Fields
- System Log Fields
- Correlated Events Log Fields
- GTP Log Fields
- Audit Log Fields
- Syslog Severity
- Custom Log/Event Format
- Escape Sequences
- Forward Logs to an HTTP/S Destination
- Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
- Monitor Transceivers
-
- User-ID Overview
- Enable User-ID
- Map Users to Groups
- Enable User- and Group-Based Policy
- Enable Policy for Users with Multiple Accounts
- Verify the User-ID Configuration
-
- App-ID Overview
- App-ID and HTTP/2 Inspection
- Manage Custom or Unknown Applications
- Safely Enable Applications on Default Ports
- Applications with Implicit Support
-
- Prepare to Deploy App-ID Cloud Engine
- Enable or Disable the App-ID Cloud Engine
- App-ID Cloud Engine Processing and Policy Usage
- New App Viewer (Policy Optimizer)
- Add Apps to an Application Filter with Policy Optimizer
- Add Apps to an Application Group with Policy Optimizer
- Add Apps Directly to a Rule with Policy Optimizer
- Replace an RMA Firewall (ACE)
- Impact of License Expiration or Disabling ACE
- Commit Failure Due to Cloud Content Rollback
- Troubleshoot App-ID Cloud Engine
- Application Level Gateways
- Disable the SIP Application-level Gateway (ALG)
- Maintain Custom Timeouts for Data Center Applications
-
- Decryption Overview
-
- Keys and Certificates for Decryption Policies
- SSL Forward Proxy
- SSL Forward Proxy Decryption Profile
- SSL Inbound Inspection
- SSL Inbound Inspection Decryption Profile
- SSL Protocol Settings Decryption Profile
- SSH Proxy
- SSH Proxy Decryption Profile
- Profile for No Decryption
- SSL Decryption for Elliptical Curve Cryptography (ECC) Certificates
- Perfect Forward Secrecy (PFS) Support for SSL Decryption
- SSL Decryption and Subject Alternative Names (SANs)
- TLSv1.3 Decryption
- High Availability Not Supported for Decrypted Sessions
- Decryption Mirroring
- Configure SSL Forward Proxy
- Configure SSL Inbound Inspection
- Configure SSH Proxy
- Configure Server Certificate Verification for Undecrypted Traffic
- Post-Quantum Cryptography Detection and Control
- Enable Users to Opt Out of SSL Decryption
- Temporarily Disable SSL Decryption
- Configure Decryption Port Mirroring
- Verify Decryption
- Activate Free Licenses for Decryption Features
-
- Policy Types
- Policy Objects
- Track Rules Within a Rulebase
- Enforce Policy Rule Description, Tag, and Audit Comment
- Move or Clone a Policy Rule or Object to a Different Virtual System
-
- External Dynamic List
- Built-in External Dynamic Lists
- Configure the Firewall to Access an External Dynamic List
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Exclude Entries from an External Dynamic List
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Register IP Addresses and Tags Dynamically
- Use Dynamic User Groups in Policy
- Use Auto-Tagging to Automate Security Actions
- CLI Commands for Dynamic IP Addresses and Tags
- Application Override Policy
- Test Policy Rules
-
- Network Segmentation Using Zones
- How Do Zones Protect the Network?
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
PAN-OS 8.1 (EoL)
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
-
-
- App-ID Changes in PAN-OS 8.1
- Authentication Changes in PAN-OS 8.1
- Content Inspection Changes in PAN-OS 8.1
- GlobalProtect Changes in PAN-OS 8.1
- User-ID Changes in PAN-OS 8.1
- Panorama Changes in PAN-OS 8.1
- Networking Changes in PAN-OS 8.1
- Virtualization Changes in PAN-OS 8.1
- Appliance Changes in PAN-OS 8.1
- Associated Software and Content Versions
- Limitations
-
- PAN-OS 8.1.26-h1 Addressed Issues
- PAN-OS 8.1.26 Addressed Issues
- PAN-OS 8.1.25-h3 Addressed Issues
- PAN-OS 8.1.25-h2 Addressed Issues
- PAN-OS 8.1.25-h1 Addressed Issues
- PAN-OS 8.1.25 Addressed Issues
- PAN-OS 8.1.24-h2 Addressed Issues
- PAN-OS 8.1.24-h1 Addressed Issues
- PAN-OS 8.1.24 Addressed Issues
- PAN-OS 8.1.23-h1 Addressed Issues
- PAN-OS 8.1.23 Addressed Issues
- PAN-OS 8.1.22 Addressed Issues
- PAN-OS 8.1.21-h3 Addressed Issues
- PAN-OS 8.1.21-h2 Addressed Issues
- PAN-OS 8.1.21-h1 Addressed Issues
- PAN-OS 8.1.21 Addressed Issues
- PAN-OS 8.1.20-h1 Addressed Issues
- PAN-OS 8.1.20 Addressed Issues
- PAN-OS 8.1.19 Addressed Issues
- PAN-OS 8.1.18 Addressed Issues
- PAN-OS 8.1.17 Addressed Issues
- PAN-OS 8.1.16 Addressed Issues
- PAN-OS 8.1.15-h3 Addressed Issues
- PAN-OS 8.1.15 Addressed Issues
- PAN-OS 8.1.14-h2 Addressed Issues
- PAN-OS 8.1.14 Addressed Issues
- PAN-OS 8.1.13 Addressed Issues
- PAN-OS 8.1.12 Addressed Issues
- PAN-OS 8.1.11 Addressed Issues
- PAN-OS 8.1.10 Addressed Issues
- PAN-OS 8.1.9-h4 Addressed Issues
- PAN-OS 8.1.9 Addressed Issues
- PAN-OS 8.1.8-h5 Addressed Issues
- PAN-OS 8.1.8 Addressed Issues
- PAN-OS 8.1.7 Addressed Issues
- PAN-OS 8.1.6-h2 Addressed Issues
- PAN-OS 8.1.6 Addressed Issues
- PAN-OS 8.1.5 Addressed Issues
- PAN-OS 8.1.4-h2 Addressed Issues
- PAN-OS 8.1.4 Addressed Issues
- PAN-OS 8.1.3 Addressed Issues
- PAN-OS 8.1.2 Addressed Issues
- PAN-OS 8.1.1 Addressed Issues
- PAN-OS 8.1.0 Addressed Issues
End-of-Life (EoL)
PAN-OS 8.1.12 Addressed Issues
PAN-OS® 8.1.12 addressed issues
Issue ID | Description |
---|---|
PAN-133443 | Fixed an issue where an XML API call incorrectly
masked the response, which prevented role based administrators from
running the response. |
PAN-132501 | Fixed an issue where after you switched
the Context from Panorama™ to a firewall,
the DESTINATION ZONE (PoliciesSecurity<policy-name>Destination) incorrectly displayed none. |
PAN-132104 | Fixed an issue on Panorama M-Series and
virtual appliances where the <show><object><registered-ip></registered-ip></object></show> XML
API call did not retrieve more than 500 entries. |
PAN-131054 | Fixed an issue where the DNS packet parser
incorrectly processed DNS packet headers when the QD count was 0.
With this fix, the DNS packet parser aborts processing when QD!=
1. |
PAN-130073 | Fixed an issue where a large number (65,000)
of GlobalProtect™ user connections caused a process (sslvpn)
to stop responding after you upgraded from PAN-OS® 8.1.10 to PAN-OS 8.1.11. |
PAN-129504 | Fixed an issue where an incorrect commit
job in the queue caused the FQDN to display Not resolved after you
performed a commit. |
PAN-128324 | (PA-7000 Series firewalls only)
Fixed an issue where internal path monitoring failures occurred
due to either a buffer leak or buffer corruption. |
PAN-128269 | (PA-5250, PA-5260, and PA-5280 firewalls
with 100GB AOC cables only) Fixed an issue where after you
upgraded the first peer in a high availability (HA) configuration
to PAN-OS 8.1.9-h4 or a later] release, the High Speed Chassis Interconnect
(HSCI) port did not come up due to an FEC mismatch until after you
finished upgrading the second peer. |
PAN-127649 | Fixed an issue where a purge script stopped
responding, which caused a process (logrcvr) to discard
incoming logs. |
PAN-127089 | Fixed an intermittent issue where the default
route did not redistribute to an OSPF Not-So-Stubby Area (NSSA). |
PAN-127055 | Fixed an issue on a VM-Series firewall deployed
in Microsoft Azure where the CPU ID and serial number changed after
you upgraded from PAN-OS 8.0.13 to PAN-OS 8.1.9-h4. |
PAN-126921 | (PA-7000 Series firewalls only)
Fixed an issue where internal path monitoring failed when the firewall
processed corrupt packets. |
PAN-126627 | Fixed an issue where a process (all_pktproc) stopped
responding due to a NULL pointer exception while cleaning up SSL
proxy sessions previously configured for GlobalProtect. |
PAN-126534 | (PAN-OS 8.1.10 and later releases only)
Fixed an issue where the data from Security policies did not export
as expected. |
PAN-126283 | Fixed an intermittent issue where after
you configured Cache EDNS Responses (NetworkDNS Proxy<DNS Proxy-name>Advanced)
a process (dnsproxy) stopped responding. |
PAN-126159 | Fixed an issue where the firewall did not
match the Security policy when you configured the match condition
to a shared local group. |
PAN-125898 | Fixed an issue where a process (openssl)
caused higher than expected management CPU usage due to the incompletion
of the Online Certificate Status Protocol (OCSP) during the logging
service certificate validation. |
PAN-125833 | Fixed an issue on a firewall in an HA active/passive
configuration where a daemon (routed) did not receive
the updated interface status after an HA failover, which caused
routes to remain in the routing and FIB tables. |
PAN-125793 | Fixed an issue where multiple No valid URL filtering license warning
messages were generated during a commit due to an expired URL filtering
license. With this fix, the warning messages are grouped into a
single message per virtual system (vsys). |
PAN-125746 | Fixed an issue where commits failed and
displayed the following error message: priority is invalid when
you configured the GlobalProtect priority to None. |
PAN-125515 | Fixed an issue on VM-Series firewalls where
the firewall dropped all traffic traversing from the dataplane to
the management plane. |
PAN-125478 | Fixed an issue on a firewall in an HA active/passive
configuration where the route to the passive firewall dropped during
a failover. |
PAN-125302 | Fixed an issue where the real-time clock
(RTC) battery voltage exceeded the maximum threshold and triggered
alerts in the system log. |
PAN-125018 | Fixed an issue on Panorama M-Series and
virtual appliances where after you configure the firewall with an
API call commits took longer than expected. |
PAN-124890 | Fixed a configuration lock issue where you
were unable to log in after you upgraded from PAN-OS 8.1.6 to PAN-OS
8.1.9. |
PAN-124882 | Fixed an issue where traffic logs that contained
incorrect Security policies were generated during an active commit
process when the Security policies were being added or removed. |
PAN-124630 | Fixed an issue where new logs were not ingested
due to a buffer exhaustion condition caused by invalid messages
incorrectly handled by elastic search. |
PAN-124593 | A fix was made to address a missing XML
validation vulnerability in the PAN-OS web interface (CVE-2020-1975). |
PAN-124435 | Fixed an issue where the firewall dropped
pre-VLAN spanning tree (PVST+) packets from the virtual wire interface
when you executed the set session rewrite-pvst-pvid yes CLI command. |
PAN-123661 | A fix was made to address an authentication
bypass vulnerability in the Panorama context switching feature (CVE-2020-2018). |
PAN-123322 | (PA-3200 Series, PA-5200 Series, and
PA-7000 Series firewalls running PAN-OS 8.1.11 only) Fixed
an intermittent issue where a process (all_pktproc)
stopped responding due to a Work Query Entry (WQE) corruption that
was caused by duplicate child sessions. |
PAN-123306 | Fixed an issue where the Dashboard did not
display the release dates for Application Version, Threat Version,
and Antivirus Version. |
PAN-123220 | Fixed an issue on a firewall running snmpwalk
where 100GB interfaces were incorrectly displayed as 1GB. |
PAN-123190 | Fixed an issue on a firewall in an HA active/passive
configuration where a process (useridd) restarted multiple
times and caused the firewall to reboot. |
PAN-123167 | Fixed an issue where a process (mprelay) stopped
responding. |
PAN-122804 | Fixed an issue on Panorama M-Series and
virtual appliances where the firewall stopped forwarding logs to
Cortex Data Lake after you upgraded the cloud services plugin to
1.4. |
PAN-122788 | Fixed an issue where the firewall incorrectly
logged target filenames when an antivirus signature was triggered
over a Server Message Block (SMB) protocol. |
PAN-122779 | Fixed an issue where the firewall did not
respond to TCP DNS requests when the firewall acted as a DNS proxy. |
PAN-122455 | Fixed an issue where the DHCP server incorrectly
processed bootp unicast flag requests. |
PAN-122311 | Fixed an issue where parent sessions were
dropped while installing a duplicate predict session. |
PAN-122181 | (PA-3200 Series and PA-5200 Series firewalls
only) Fixed an issue where the firewall did not capture inbound
Encapsulating Security Payload (ESP) protocol 50 packets at the
receive stage. |
PAN-121917 | (PA-800 Series and PA-220 firewalls
only) Fixed an issue where the hrProcessorLoad.2 OID displayed
incorrect values. |
PAN-121609 | (PA-7000 Series firewalls using PA-7000-20G-NPC
cards only) Fixed an issue where the firewall restarted due
to an internal path monitoring heartbeat failure during periods
of more than expected traffic load. |
PAN-121484 | (PA-3200 Series, PA-5200 Series, and
PA-7000 Series firewalls only) Fixed an issue where the dataplane
sent positive acknowledgments to predict-status checks from FPP
when the corresponding predict was deleted, which caused SIP and
RTSP applications to perform less than the expected achievable performance. |
PAN-121481 | Fixed an issue where downloading the GlobalProtect
app software on your GlobalProtect portal took longer than expected. |
PAN-121472 | Fixed an intermittent issue where the dataplane
stopped responding when processing compressed traffic. |
PAN-120986 | Fixed an issue where a process (routed)
stopped responding when you configured virtual interfaces. |
PAN-120965 | Fixed an issue where certificate revocation
list (CRL) and Online Certificate Status Protocol (OCSP) checks
did not respond as expected when you configured Block
session if certificate status is unknown. |
PAN-120900 | Fixed an issue on a firewall in an HA active/passive
configuration where after you submitted a host information profile
(HIP) report a duplicate User-ID™ log was generated on the passive
firewall. |
PAN-120893 | Fixed an issue where the Security Parameter
Index (SPI) size was incorrectly set in the IKE Phase 2 packet when
you configured commit-bit on the neighboring
device, which caused IKE negotiations to fail on the neighboring
device. |
PAN-120701 | Fixed an issue where URL filtering blocked
web traffic by the security policy that did not have URL filtering
enabled. |
PAN-120545 | Fixed an issue on VM-Series firewalls where
the ager ran faster than expected, which prematurely caused the
master key to expire. |
PAN-120397 | A fix was made to address an external control
of path and data vulnerability in the Palo Alto Networks Panorama
XSLT processing logic (CVE-2020-2001). |
PAN-120351 | Fixed an issue where the firewall caused
unnecessary fragmentation when traffic and tunnel were content inspected,
which caused retransmission and slowed response time. |
PAN-120300 | Fixed an issue where you were unable to
view DHCP leases from the web interface or through the show dhcp server lease interface all CLI
command due to the request taking longer than expected, which resulted
in a time out. |
PAN-120106 | Fixed an issue where Panorama did not send
correlation events and logs to the syslog server after you upgraded
the firewall from PAN-OS 8.0.9 to PAN-OS 8.1.7. |
PAN-120005 | Fixed an issue where the firewall incorrectly
forwarded incomplete and corrupted files through the Server Message
Block (SMB) protocol to WildFire. |
PAN-119950 | Fixed an issue on a firewall in a high availability
(HA) active/passive configuration where a process (flow_ctrl)
received and restarted due to a malformed ICMPv6 neighbor advertisement packet. |
PAN-119822 | Fixed an issue where you were not redirected
to the application URL after authentication. |
PAN-119820 | Fixed an issue where the firewall incorrectly
calculated the TCP segment size when performing forward proxy decryption. |
PAN-119819 | Fixed an issue where Discover (DeviceUser IdentificationUser MappingServer Monitoring)
stopped responding after you configured a DNS proxy. |
PAN-119818 | Fixed an issue where corrupt logs caused
buffered log forwarding to stop responding. |
PAN-119550 | |
PAN-119452 | An enhancement was made to improve subsequent
loading times of device groups after the first load. |
PAN-119349 | Fixed an issue on Panorama M-Series and
virtual appliances where custom reports from the User-ID log displayed
the incorrect receive date. |
PAN-119343 | |
PAN-119185 | Fixed an issue where a process (panio)
caused more than expected CPU consumption. |
PAN-119047 | Fixed an issue where local user group names
that contained upper case characters were not converted to lower
case characters prior to encoding, which caused the firewall not
to load user groups names with upper case characters. |
PAN-118851 | Fixed an issue where the BGP Conditional
Advertisement suppress condition was not met, which caused the Conditional Adv (NetworkVirtual Routers<router-name>BGP)
not to apply the NEXT HOPS prefix range. |
PAN-118777 | Fixed an issue on a firewall in a high availability
(HA) active/active configuration where larger than expected packets
sizes were silently dropped when traversing through an HA3 link
in an asymmetric network. |
PAN-118762 | Fixed an issue where the GlobalProtect portal
used an outdated jQuery library. |
PAN-118436 | (PA-5200 Series firewalls only)
Fixed an issue where applications using the GlobalProtect Clientless
VPN did not respond when the Clientless VPN used a VLAN interface. |
PAN-118430 | Fixed an issue where pushed template configurations
were overridden when you made a configuration change in the Master
Key Lifetime (Device Master Key and DiagnosticEdit)
field. |
PAN-118413 | (PA-5200 Series firewalls only)
Fixed an issue where the show system logd-quota CLI
command did not display the Session log storage Quotas as expected. |
PAN-118259 | Fixed an issue where you were unable to
generate WildFire analysis reports in the WildFire Submissions log
when you configured Proxy Server (DeviceSetupServicesGlobal). |
PAN-118249 | Fixed an issue where traffic logs and URL
Filtering logs did not display the URL for decrypted traffic. |
PAN-118207 | Fixed an issue where the Security Assertion
Markup Language (SAML) for GlobalProtect did not respond as expected
when you configured the IdP certificate as None on
the SAML IdP server profile. |
PAN-118108 | Fixed an issue where an API call against
a Panorama management server, which triggered the request analyze-shared-policy command
caused Panorama to reboot after you executed the command. |
PAN-118090 | Fixed an issue on Panorama M-Series and
virtual appliances where User Activity Report (MonitorPDF Reports)
did not generate reports as expected. |
PAN-118050 | Fixed an issue where some packets had incorrect
timestamps in the transmit stage during packet capture. |
PAN-117987 | Fixed an issue where the firewall did not
exclude video traffic from the GlobalProtect tunnel when you configured Exclude video
traffic from the tunnel (Windows and macOS only) (NetworkGlobalProtectGateways<gateway-name>AgentVideo Traffic). |
PAN-117969 | An enhancement was made to enable administrators
to select signature and digest algorithms for outgoing Security
Assertion Markup Language (SAML) messages through a CLI command. |
PAN-117774 | Fixed an Issue where the dataplane stopped
responding due to an incorrect parsing of cookies for GlobalProtect
Clientless VPN applications. |
PAN-117736 | Fixed an issue on a firewall in an HA active/active
configuration where virtual MAC addresses pushed from Panorama were
overridden on the local firewall. |
PAN-117463 | Fixed an issue where the firewall did not
release the default DHCP route when a new IP address was obtained
on a DHCP configured interface. |
PAN-117446 | Fixed an issue where GlobalProtect authentication
failed when you used the domain in the group mapping and a User
Principle Name (UPN) format for authentication. |
PAN-117276 | Fixed an issue on a firewall in a high availability
(HA) active/active configuration where the names of the virtual
routers were pushed from the active-primary firewall to the active-secondary
firewall when you sync the configuration, which caused schema verification
to stop responding when you do a local commit on the active-secondary
firewall. |
PAN-117251 | Fixed an issue where vsysadmins were unable
to view the locks on all the virtual systems they were assigned
to. To view the locks in CLI run the new show commit-locks vsys and show config-locks vsys CLI commands. |
PAN-117167 | Fixed an issue where a process (configd) exceeded
the memory limit and stopped responding. |
PAN-117068 | Fixed an issue on Panorama M-Series and
virtual appliances where memory utilization increased more than
expected when you deleted several rules with an XML API delete command. |
PAN-116889 | Fixed an issue where you were unable to
establish an SSH session through a CLI command using a Diffie-Hellman
(DH) algorithm. |
PAN-116634 | Fixed an issue where the date in the GlobalProtect
HTTP header was incorrectly set to a random date instead of a zero
( 0 ), which negatively and falsely impacted security scorecard
ratings. |
PAN-116615 | Fixed an issue where authentication failed
for newly added groups in the authentication profile Allow List. |
PAN-116355 | (PA-5200 Series firewalls only)
Fixed an issue on a firewall in a high availability (HA) active/passive
configuration where an HA1 heartbeat backup connection flap occurred
and displayed the following error message: ha_ping_send/No buffer space available. |
PAN-116173 | (PA-7000 Series firewalls using PA-7000-20G-NPC
or PA-7000-20GQ-NPC cards only) Fixed an intermittent issue
on a firewall in an HA active/passive configuration where traffic
interruptions occurred until you triggered a manual failover. |
PAN-116100 | Fixed an issue where a process (mprelay) stopped
responding and invoked an out-of-memory (OOM) killer condition and
displayed the following error messages: tcam full and pan_plfm_fe_cp_arp_delete. |
PAN-116061 | Fixed an issue where traffic traversing
through an IPSec tunnel did not use the default maximum interface
bandwidth, which caused the traffic to traverse through the IPSec
tunnel with latency. |
PAN-115505 | Fixed an issue where more than expected
re-connection attempts to Cortex Data Lake caused the management
plane CPU to spike and caused a process (mgmtsrvr)
to stop responding. |
PAN-115238 | Fixed an issue where SSL renegotiation sessions
incorrectly identified URL categories. |
PAN-115110 | An enhancement was made to enable you to
configure syslog parameters through the CLI debug command. To view
the available parameters and change the configurations, run the debug syslogng-params settings CLI
command and perform a commit force to apply the edits. |
PAN-115018 | Fixed an issue where the firewall was unable
to access the CPU information and caused the CPU frequency to set
to 0, which resulted in a divide by zero error and caused a process
(devsrvr) to stop responding. |
PAN-114438 | Fixed an issue where the system log incorrectly
reported intermittent certificate revocation list (CRL) fetches
as successful even though the fetches were not successful. |
PAN-112145 | Fixed an intermittent issue where a process (useridd)
incorrectly reported successful Ops commands and did not download
Dynamic Address Group updates, which prevented virtual machines
from updating Dynamic Address Groups. |
PAN-111650 | |
PAN-111135 | Fixed an issue where Panorama displayed
incorrect device monitoring values (PanoramaManaged DevicesHealth)
for the firewall. |
PAN-109406 | Fixed an issue where the firewall restarted
when you unplugged the QSFP+ module from the High Speed Chassis
Interconnect (HSCI) port. |
PAN-108373 | Fixed an issue where an application dependency
warning incorrectly displayed when you configured negate-source yes on
a security rule to deny an application. |
PAN-108012 | Fixed an issue on Panorama M-Series and
virtual appliances where you could not add and generate a certificate
as expected. |
PAN-107864 | Fixed an issue where the Online Certificate
Status Protocol (OCSP) check stopped responding when the leaf certificate
was sent twice in the OCSP request. |
PAN-106029 | Fixed an issue where the firewall tried
to resolve deleted FQDN address objects after an FQDN refresh. |
PAN-105866 | Fixed an issue on a firewall in an HA active/active
configuration where ARP entries were removed from a floating IP
address on an Ethernet interface when you deleted another floating
IP address on the same Ethernet interface. |
PAN-105763 | An enhancement was made to enable you to
set the signing algorithm to sha-1 or sha-256 in
the Security Assertion Markup Language (SAML) message on the firewall. |
PAN-100946 | Fixed an issue where VM-Series firewalls
were unable to support the maximum number of tunnel interfaces due
to less than expected memory allocation. |
PAN-98603 | Fixed an issue on Panorama M-Series and
virtual appliances where logs sent by the Endpoint Security Manager
(ESM) server were incorrectly ingested. |