PAN-OS 9.0.5 Addressed Issues
PAN-OS® 9.0.5 addressed issues.
Fixed an issue where the
show wildfire global last-device-registration allCLI command incorrectly returned an error message:
Failed, even when you registered the firewall correctly.
Fixed an issue where a process (all_pktproc) stopped responding after you upgraded the firewall to PAN-OS® 9.0.4.
PA-7000 Series firewalls only) Fixed an issue where internal path monitoring failures occurred due to either a buffer leak or buffer corruption.
Fixed an issue where the REST API reference did not display the web browser documentation, which resulted in an error when running a PAN-OS 9.0.4 release.
Fixed an issue on Panorama™ M-Series and virtual appliances where a process (configd) stopped responding when you performed a commit to a large number of firewalls.
Fixed an issue where images displayed through the Clientless VPN were corrupted.
PA-7000 Series firewalls only) Fixed an issue where internal path monitoring failed when the firewall processed corrupt packets.
Fixed an HTTPD issue with PHP where it leaked memory.
Fixed an issue where a process (configd) stopped responding when an XML API call with
type=config&action=gettriggered during a commit.
PAN-OS 8.1.10 and later releases only) Fixed an issue where the data from Security policies did not export as expected.
Fixed an issue where log in and commits took longer than expected when you used XML API calls to create new address objects.
Fixed an issue where the receiving firewall deleted the host information profile (HIP) report due to the report containing the same IPv4 address in the IP and IP2 fields and caused a process (useridd) to stop responding.
Fixed an issue on a firewall in a high availability (HA) active/passive configuration where a daemon (routed) did not receive the updated interface status after an HA failover, which caused routes to remain in the routing and FIB tables.
Fixed an issue where Panorama management servers deployed using the C5 or M5 instance types on Amazon Web Services (AWS) caused the Panorama instance to stop responding in regions that supported these instance types.
An enhancement was made to improve firewall performance for stream control transmission protocol (SCTP) flows. To enable this enhancement, run the
set sctp fast-sack yesCLI command.
Fixed an issue on VM-Series firewalls where the firewall dropped all traffic traversing from the dataplane to the management plane.
Fixed an issue on a firewall in an HA active/passive configuration where the route to the passive firewall dropped during a failover.
Fixed an issue where the firewall did not list registered addresses from the Dynamic Address Group when the same IP-tag information was received from two sources, which caused the traffic flow to stop responding as expected.
An enhancement was made to enable you to configure IPv6 in the web interface and through a CLI command when you added IPv6 virtual addresses to a firewall in an HA active/active configuration.
VM-Series firewalls only) Fixed an issue where custom images did not function as expected for PAN-OS 9.0.
An enhancement was made to enable you to delete the GTP-C tunnel with all GTP-U tunnel sessions after the firewall received a Delete Bearer Response message where default bearer ID=5. To enable this enhancement, run the
set gtp ebi5-del-gtpc [yes/no]CLI command.
Fixed an issue where a GlobalProtect™ daemon (rasmgr) stopped responding when you connected with an overlapping IPv6 address, which caused subsequent GlobalProtect connections to fail.
Fixed a configuration lock issue where you were unable to log in after you upgraded from PAN-OS 8.1.6 to PAN-OS 8.1.9.
Fixed an issue where new logs were not ingested due to a buffer exhaustion condition caused by invalid messages incorrectly handled by elastic search.
Fixed an issue where the dataplane stopped responding when SMTP sessions were used.
Fixed an issue on VM-Series firewalls in an HA active/passive configuration where the active firewall leaked packet buffers when links were disconnected from the hypervisor.
PA-5200 and PA-7000 Series firewalls only) Fixed an issue where conflicting GTP sessions were installed in short interval, which caused the firewall to queue GTP packets and deplete packet buffers.
Fixed an issue where the firewall was unable to establish a connection to the DNS Security feature domain (dns.service.paloaltonetworks.com) when the firewall could not connect with the primary DNS server but could connect with the secondary DNS server.
Fixed an issue where an administrator with a Superuser role could not reset administrator credentials.
Fixed an issue where the firewall used more than expected virtual memory when you decreased the maximum elastic search heap size.
Fixed an issue on a firewall in an HA active/passive configuration where a process (useridd) restarted multiple times and caused the firewall to reboot.
PA-5260 firewalls only) Fixed an issue where a process (mpreplay) stopped responding after a commit when you configured the firewall with more than 200 virtual systems (vsys) running on PAN-OS 8.1.9.
Fixed a memory leak issue with a process (configd) when you performed device group related operations.
Fixed an issue where VM-Series firewalls on Microsoft Azure experienced traffic latency due to an incompatible driver.
Fixed an issue on Panorama M-Series and virtual appliances where after you deployed the firewall in Google Cloud the Panorama serial console stopped responding.
Fixed an issue where traffic incorrectly matched Security policies when configured static address groups and FQDN IP addresses on Security policies overlapped.
Fixed an issue where an API call triggered memory errors, which caused a process (configd) to stop responding and triggered
Fixed an issue where the BGP did not remove the IPv6 default route from the forwarding table after the route was withdrawn.
Fixed an issue on Panorama M-Series and virtual appliances where a validation job triggered a memory leak in a process (configd), which caused context switching between Panorama and the web interface to respond slower than expected.
Fixed an issue where the firewall only reported a maximum of two logs when you configured more than two hardware security modules (HSM).
Fixed an issue on Panorama M-Series and virtual appliances where partial commits did not apply configuration changes as expected.
Fixed an issue on Panorama M-Series and virtual appliances where objects were not compressed, which caused higher than expected CPU and memory usage.
Fixed an issue where the DNS packet parser incorrectly processed DNS packet headers when the QD count is 0. With this fix, the DNS packet parser aborts further processing when QD != 1.
Fixed an intermittent issue where the firewall dropped sessions that used a large number of predict sessions.
Fixed a rare issue where the
show runningCLI commands for policy addresses caused file descriptor leaks.
Fixed an issue on Panorama M-Series and virtual appliances where you were unable to query Cortex™ Data Lake by the serial number filter.
Fixed an issue where an inaccurate sequence number check for an RST packet caused the packet to drop.
Fixed an issue where the firewall incorrectly enforced URL category policies and erroneously triggered
Fixed an issue on Panorama M-Series and virtual appliances where a process (configd) experienced high memory utilization and a memory leak condition, which caused slower than expected performance.
Fixed an issue where the user domain information was missing from the user IP mapping entry when you configured
Allow Authentication with User Credentials or Client Certificateto
Yeswhile using a client certificate for GlobalProtect authentication.
Fixed an intermittent issue where a daemon (dnsproxy) stopped responding when you configured an HTTP proxy on the firewall.
Fixed an issue where the GlobalProtect portal used an outdated jQuery library.
Fixed an issue on a firewall in an HA active/active configuration where Oracle traffic SYN packets dropped intermittently with the
Fixed an issue where after you deployed Panorama in Azure, you were unable to log in to Panorama with the username and password that was provided during the deployment process.
Fixed a memory allocation issue that prevented URL filtering logs from displaying the full URL.
Fixed an issue where pushed template configurations were overridden when you made a configuration change in the Master Key
Master Key and Diagnostic
Fixed an issue where the firewall displayed incorrect application dependency warnings during commits when a Security policy used a wildcard address.
Fixed an issue where the firewall stopped responding due to a race condition.
Fixed an issue where a DNS Security signature response from a cloud service caused a daemon (dnsproxyd) to stop responding.
Fixed an issue where a process (dnsproxyd) stopped responding due to higher than expected CPU usage.
Fixed an issue on firewalls configured with authentication policies where UDP and ICMP packets matching an authentication policy did not generate traffic logs as defined in the Security policy when sessions were redirected or denied.
Fixed an issue on a firewall in an HA active/passive configuration where a process (all_pktproc) stopped responding and the dataplane restarted, which caused an internal path monitoring failure and an HA failover event.
Fixed an issue where administrators were unable to export Security Assertion Markup Language (SAML) metadata files from virtual system (vsys) specific authentication profiles.
Fixed an issue where LDAP authentication failed when you configured the authentication server with an FQDN.
Fixed an issue where the date and time provided for a request license information output did not match the show clock output provided by the NTP server.
Fixed an issue where commits failed when you moved an object referenced in a policy to a shared group.
Fixed an issue where the firewall was unable to detect the hardware security module (HSM), which caused the firewall to drop SSL traffic.
Fixed an issue where you were unable to add a service definition to the NSX manager and the following error message displayed:
Failed to create object service-definition. Ret code is 400.
Fixed an intermittent issue where a process (all_pktproc) stopped responding, which caused a heartbeat failure and the firewall to drop LACP and OSPF connections.
PA-3050 and PA-3060 firewalls only) Fixed an issue where a higher than expected number of
flow_fpga_flow_updatemessages occurred when you configured QoS.
Fixed an issue where job threads were deadlocked, which prevented log in attempts and displayed the following error message:
CONFIG_LOCK: write lock TIMEDOUT for cmd.
Fixed an issue on Panorama M-Series and virtual appliances where the connection between Panorama and managed firewalls timed out when you upgraded PAN-OS 9.0.0 to PAN-OS 9.0.1 and displayed the following error message:
Error - time out sending/receiving message.
Fixed an issue where the BGP aggregate prefix, which is advertised to multiple BGP peers was removed from RIB OUT when you disabled one of the BGP peers.
Fixed an issue on Panorama M-Series and virtual appliances where a process (configd) restarted due to virtual memory issues.
Fixed an issue where community attributes to BGP routes had a character limit of 31 characters, which caused expressions to take longer than expected to process.
Fixed an issue on Panorama M-Series and virtual appliances where memory utilization increased more than expected when you deleted several rules with an XML API delete command.
Fixed an issue on VM-Series firewalls where you could not upgrade to PAN-OS 9.0.1 or a later release with a pre-licensed firewall.
Fixed an issue on Panorama M-Series and virtual appliances where you were unable to configure
Enable X-Auth Support(
) at the Template-stack level.
Fixed an issue where the firewall sent empty attributes in the LDAP query when you did not configure
Alternate Username 1 - 3(
) in the User Attributes web interface.
Group Mapping Settings
User and Group Attributes
Fixed an issue where administrators were unable to export policies and objects in PDF format.
Fixed an issue where an API call for correlated events did not return any events.
Fixed an issue where the firewall logged URL categories configured for Allow in the URL filtering logs.
Fixed an issue where commits failed after you upgraded from PAN-OS 8.0.16 to PAN-OS 8.1.6 due to an invalid encryption state for a host information profile (HIP) object.
Fixed an issue where the firewall was unable to authenticate when you pushed a public key from Panorama.
Fixed an issue where Session Initiation Protocol (SIP) calls failed and displayed the following error message:
Fixed an issue where the FQDN address object (
) displayed the following unrelated error:
Fixed an issue where DNS names with more than 63 characters did not resolve FQDN address objects during an FQDN refresh.
Fixed an issue where the
show system infoCLI command incorrectly displayed
Fixed an issue on a firewall where a bypass switch sent heartbeat messages to the firewall, which triggered non-stop link status change interrupts through a Marvell switch.
Fixed an issue where predict sessions were incorrectly created with a
captive-portalzone, which caused the firewall to drop RTP traffic.
Fixed an issue where an incorrect predict session was created when a policy-based forwarding (PBF) policy was used without a NAT in the parent session, which caused the firewall to drop RTP and RTCP packets.
Fixed an issue where the Username Modifier
%USERDOMAIN%\%USERINPUT%enabled you to log in to a locked out user account.
Fixed an issue on a firewall in an HA active/passive configuration where the passive firewall experienced higher than expected dataplane CPU usage caused by HA IPSec messages bouncing between dataplanes.
Fixed an issue where temporary download files were deleted before a download job was completed, which caused the progress bar to remain at 0% and prevented a timeout when downloads fail.
Fixed an issue where the firewall did not resolve an external dynamic list server address when the DNS proxy configured it as a static entry.
An enhancement was made to enable you to configure syslog parameters through the CLI debug command. To view the available parameters and change the configurations, run the
debug syslogng-params settingsCLI command and perform a commit force to apply the edits.
Fixed an issue on Panorama M-Series and virtual appliances where scheduled uploading and installation of WildFire® content meta files to WF-500 appliances failed and displayed the following error message:
device not supported.
Fixed an issue where the
debug management-server summary-logs flush-options max-keysCLI command did not persist through a system reboot.
A change was made to limit debug log visibility to superusers only.
Fixed an issue on Panorama M-Series and virtual appliances where
) did not appear in the
Interfacedrop-down menu when you tried to configure a Decryption Profile.
Fixed an issue on a firewall in an HA active/passive configuration where a split-brain condition occurred after you upgraded from PAN-OS 8.1.3 to PAN-OS 8.1.6.
Fixed an issue where Panorama was unable to query logs forwarded from the firewall to the log collector.
Fixed an issue where renaming a template stack did not change the value and reset to the original value after you commit the change.
Fixed an issue where extended packet capture (pcap) for threat logs caused a process (mgmtsrvr) to stop responding.
Fixed an issue where the firewall dropped TCP trace route traffic after you upgraded to PAN-OS 8.1.5. To leverage this fix, run the
set session tcp-reject-diff-syn noCLI command.
Fixed an issue where a larger than expected number of
Could not find entry for interface ethernet1/<interface>.<subinterface> in CPS tablefilled the snmpd.log, which caused the log file to rotate more frequently than expected.
Fixed an issue where Panorama incorrectly deleted valid device group directories and was unable to generate reports.
Fixed an issue where the Throughput column (
) was incorrectly labeled.
PA-5200 Series firewalls only) Fixed an issue where the total entries for the URL filtering allow list, block list, and custom categories were incorrectly set to an entry limit value other than 100,000.
Fixed an issue where you were unable to create shared URL filtering profiles from the Panorama web interface.
Fixed an issue where you were unable to access a firewall due to a defective small form-factor pluggable (SFP)/SFP+ module inserted into the firewall.
Fixed an issue on Panorama M-Series and virtual appliances configured as log collectors where SSH did not respond after you enabled SSH on ethernet1/1.
Fixed a rare issue where an incorrect User-ID™ match to the respective LDAP group caused a security policy mismatch.
Fixed an issue on a firewall in an HA active/passive configuration where you were unable to synchronize configurations or dynamic updates between HA pairs.
Fixed a memory leak issue on a firewall during a commit, which prevented the firewall from generating GlobalProtect client configurations.
Fixed an issue where the firewall dropped Session Initiation Protocol (SIP) registration packets, which caused SIP sessions to fail.
Fixed an issue where an application dependency warning incorrectly displayed when you configured
negate-source yeson a security rule to deny an application.
Fixed an issue on Panorama M-Series and virtual appliances where you could not add and generate a certificate as expected.
Fixed an issue where a process (keymgr) stopped responding due to missed heartbeats, which caused IPSec tunnels to stop responding.
Fixed an issue where the firewall did not detect all threat sessions while the App and Threat content installation was processed.
VM-Series NSX edition firewalls only) Fixed an issue where the existing logs for dynamic address updates had insufficient information to debug the root cause of an issue and where the dynamic address update logs were larger than expected, which caused the file to roll over every five minutes and did not provide a sufficient log history to debug issues.
Recommended For You
Recommended videos not found.