Changes to Default Behavior
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- Cloud Management of NGFWs
-
- Management Interfaces
-
- Launch the Web Interface
- Use the Administrator Login Activity Indicators to Detect Account Misuse
- Manage and Monitor Administrative Tasks
- Commit, Validate, and Preview Firewall Configuration Changes
- Commit Selective Configuration Changes
- Export Configuration Table Data
- Use Global Find to Search the Firewall or Panorama Management Server
- Manage Locks for Restricting Configuration Changes
-
-
- Define Access to the Web Interface Tabs
- Provide Granular Access to the Monitor Tab
- Provide Granular Access to the Policy Tab
- Provide Granular Access to the Objects Tab
- Provide Granular Access to the Network Tab
- Provide Granular Access to the Device Tab
- Define User Privacy Settings in the Admin Role Profile
- Restrict Administrator Access to Commit and Validate Functions
- Provide Granular Access to Global Settings
- Provide Granular Access to the Panorama Tab
- Provide Granular Access to Operations Settings
- Panorama Web Interface Access Privileges
-
- Reset the Firewall to Factory Default Settings
-
- Plan Your Authentication Deployment
- Pre-Logon for SAML Authentication
- Configure SAML Authentication
- Configure Kerberos Single Sign-On
- Configure Kerberos Server Authentication
- Configure TACACS+ Authentication
- Configure TACACS Accounting
- Configure RADIUS Authentication
- Configure LDAP Authentication
- Configure Local Database Authentication
- Configure an Authentication Profile and Sequence
- Test Authentication Server Connectivity
- Troubleshoot Authentication Issues
-
- Keys and Certificates
- Default Trusted Certificate Authorities (CAs)
- Certificate Deployment
- Configure the Master Key
- Export a Certificate and Private Key
- Configure a Certificate Profile
- Configure an SSL/TLS Service Profile
- Configure an SSH Service Profile
- Replace the Certificate for Inbound Management Traffic
- Configure the Key Size for SSL Forward Proxy Server Certificates
-
- HA Overview
-
- Prerequisites for Active/Active HA
- Configure Active/Active HA
-
- Use Case: Configure Active/Active HA with Route-Based Redundancy
- Use Case: Configure Active/Active HA with Floating IP Addresses
- Use Case: Configure Active/Active HA with ARP Load-Sharing
- Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall
- Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
- Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT
- Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3
- HA Clustering Overview
- HA Clustering Best Practices and Provisioning
- Configure HA Clustering
- Refresh HA1 SSH Keys and Configure Key Options
- HA Firewall States
- Reference: HA Synchronization
-
- Use the Dashboard
- Monitor Applications and Threats
- Monitor Block List
-
- Report Types
- View Reports
- Configure the Expiration Period and Run Time for Reports
- Disable Predefined Reports
- Custom Reports
- Generate Custom Reports
- Generate the SaaS Application Usage Report
- Manage PDF Summary Reports
- Generate User/Group Activity Reports
- Manage Report Groups
- Schedule Reports for Email Delivery
- Manage Report Storage Capacity
- View Policy Rule Usage
- Use External Services for Monitoring
- Configure Log Forwarding
- Configure Email Alerts
-
- Configure Syslog Monitoring
-
- Traffic Log Fields
- Threat Log Fields
- URL Filtering Log Fields
- Data Filtering Log Fields
- HIP Match Log Fields
- GlobalProtect Log Fields
- IP-Tag Log Fields
- User-ID Log Fields
- Decryption Log Fields
- Tunnel Inspection Log Fields
- SCTP Log Fields
- Authentication Log Fields
- Config Log Fields
- System Log Fields
- Correlated Events Log Fields
- GTP Log Fields
- Audit Log Fields
- Syslog Severity
- Custom Log/Event Format
- Escape Sequences
- Forward Logs to an HTTP/S Destination
- Firewall Interface Identifiers in SNMP Managers and NetFlow Collectors
- Monitor Transceivers
-
- User-ID Overview
- Enable User-ID
- Map Users to Groups
- Enable User- and Group-Based Policy
- Enable Policy for Users with Multiple Accounts
- Verify the User-ID Configuration
-
- App-ID Overview
- App-ID and HTTP/2 Inspection
- Manage Custom or Unknown Applications
- Safely Enable Applications on Default Ports
- Applications with Implicit Support
-
- Prepare to Deploy App-ID Cloud Engine
- Enable or Disable the App-ID Cloud Engine
- App-ID Cloud Engine Processing and Policy Usage
- New App Viewer (Policy Optimizer)
- Add Apps to an Application Filter with Policy Optimizer
- Add Apps to an Application Group with Policy Optimizer
- Add Apps Directly to a Rule with Policy Optimizer
- Replace an RMA Firewall (ACE)
- Impact of License Expiration or Disabling ACE
- Commit Failure Due to Cloud Content Rollback
- Troubleshoot App-ID Cloud Engine
- Application Level Gateways
- Disable the SIP Application-level Gateway (ALG)
- Maintain Custom Timeouts for Data Center Applications
-
- Policy Types
- Policy Objects
- Track Rules Within a Rulebase
- Enforce Policy Rule Description, Tag, and Audit Comment
- Move or Clone a Policy Rule or Object to a Different Virtual System
-
- External Dynamic List
- Built-in External Dynamic Lists
- Configure the Firewall to Access an External Dynamic List
- Retrieve an External Dynamic List from the Web Server
- View External Dynamic List Entries
- Exclude Entries from an External Dynamic List
- Enforce Policy on an External Dynamic List
- Find External Dynamic Lists That Failed Authentication
- Disable Authentication for an External Dynamic List
- Register IP Addresses and Tags Dynamically
- Use Dynamic User Groups in Policy
- Use Auto-Tagging to Automate Security Actions
- CLI Commands for Dynamic IP Addresses and Tags
- Application Override Policy
- Test Policy Rules
-
- Network Segmentation Using Zones
- How Do Zones Protect the Network?
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
PAN-OS 9.0 (EoL)
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
-
- Changes to Default Behavior
- Associated Software and Content Versions
- Limitations
-
-
- PAN-OS 9.0.17 Known Issues
- PAN-OS 9.0.16 Known Issues
- PAN-OS 9.0.15 Known Issues
- PAN-OS 9.0.14 Known Issues
- PAN-OS 9.0.13 Known Issues
- PAN-OS 9.0.12 Known Issues
- PAN-OS 9.0.11 Known Issues
- PAN-OS 9.0.10 Known Issues
- PAN-OS 9.0.9 Known Issues
- PAN-OS 9.0.8 Known Issues
- PAN-OS 9.0.7 Known Issues
- PAN-OS 9.0.6 Known Issues
- PAN-OS 9.0.5 (and 9.0.5-h3) Known Issues
- PAN-OS 9.0.4 Known Issues
- PAN-OS 9.0.3 (and 9.0.3-h2 and 9.0.3-h3) Known Issues
- PAN-OS 9.0.2 (and 9.0.2-h4) Known Issues
- PAN-OS 9.0.1 Known Issues
- Known Issues Specific to the WildFire Appliance
-
-
- PAN-OS 9.0.17-h5 Addressed Issues
- PAN-OS 9.0.17-h4 Addressed Issues
- PAN-OS 9.0.17-h1 Addressed Issues
- PAN-OS 9.0.17 Addressed Issues
- PAN-OS 9.0.16-h7 Addressed Issues
- PAN-OS 9.0.16-h6 Addressed Issues
- PAN-OS 9.0.16-h5 Addressed Issues
- PAN-OS 9.0.16-h3 Addressed Issues
- PAN-OS 9.0.16-h2 Addressed Issues
- PAN-OS 9.0.16 Addressed Issues
- PAN-OS 9.0.15 Addressed Issues
- PAN-OS 9.0.14-h4 Addressed Issues
- PAN-OS 9.0.14-h3 Addressed Issues
- PAN-OS 9.0.14 Addressed Issues
- PAN-OS 9.0.13 Addressed Issues
- PAN-OS 9.0.12 Addressed Issues
- PAN-OS 9.0.11 Addressed Issues
- PAN-OS 9.0.10 Addressed Issues
- PAN-OS 9.0.9-h1 Addressed Issues
- PAN-OS 9.0.9 Addressed Issues
- PAN-OS 9.0.8 Addressed Issues
- PAN-OS 9.0.7 Addressed Issues
- PAN-OS 9.0.6 Addressed Issues
- PAN-OS 9.0.5-h3 Addressed Issues
- PAN-OS 9.0.5 Addressed Issues
- PAN-OS 9.0.4 Addressed Issues
- PAN-OS 9.0.3-h3 Addressed Issues
- PAN-OS 9.0.3-h2 Addressed Issues
- PAN-OS 9.0.3 Addressed Issues
- PAN-OS 9.0.2-h4 Addressed Issues
- PAN-OS 9.0.2 Addressed Issues
- PAN-OS 9.0.1 Addressed Issues
- PAN-OS 9.0.0 Addressed Issues
End-of-Life (EoL)
Changes to Default Behavior
Changes to the default behavior in PAN-OS® 9.0
The following table details the changes in default behavior
upon upgrade to PAN-OS® 9.0. You may also want to review
the CLI Changes in PAN-OS 9.0 and
the Upgrade/Downgrade Considerations before
upgrading to this release.
Feature | Change |
---|---|
API Key Lifetime | When you generate a new API key, the key
metadata includes a timestamp of the creation date which makes the
key size larger than those generated with PAN-OS version earlier
than 9.0. |
Default Administrator Password Requirements (PAN-OS
9.0.4 and later 9.0 releases) | Starting with PAN-OS 9.0.4, the firewall
enforces password complexity for the default admin account on the
first log in. If the current password doesn't meet the complexity
requirements, the device prompts you to change it. The new
password must have a minimum of eight characters and include a minimum
of one lowercase and one uppercase character, as well as one number or
special character. On a new installation, password complexity is
enabled with a minimum password length of eight characters. This
change does not affect other administrative users. |
HTTP/2 Inspection | The firewall now processes and inspects
HTTP/2 traffic by default. If you want to disable HTTP/2 inspection,
you can specify for the firewall to remove any value contained in
the Application-Layer Protocol Negotiation (ALPN) TLS extension:
select ObjectsDecryptionDecryption ProfileSSL DecryptionSSL Forward Proxy and then
select Strip ALPN. ALPN is used to secure
HTTP/2 connections—when there is no value specified for this TLS
extension, the firewall either downgrades HTTP/2 traffic to HTTP/1.1
or classifies it as unknown TCP traffic. |
Strict Default Ports for Decrypted Applications,
Including Web-Browsing | Application default—which enables you to
allow applications only on their most commonly-used ports—now enforces
standard port usage for certain applications that use a different
default port when encrypted: web-browsing, SMTP, FTP, LDAP, IMAP
and POP3. This means that, if you’re decrypting SSL traffic,
a security policy that allows web-browsing on the application default
ports now strictly enforces web-browsing on port 80 and SSL-tunneled web-browsing
on port 443. To enhance security, if you currently have a
security policy rule configured to allow web-browsing on service-HTTP and service-HTTPS,
you might consider updating the rule to instead allow web-browsing
on the application-default ports: ![]() |
Network Processing Card Session Capacity
Change (PA-7000-20G-NPC and PA-7000-20GQ-NPC) | The session capacity for these two 20Gbps
Network Processing Cards changed from 4 million sessions per NPC
to 3.2 million sessions per NPC on firewalls running a PAN-OS 9.0
or later release. |
PA-7000 Series Firewall Memory Limit
for the Management Server | As of PAN-OS 9.0.10, the PA-7000 Series
firewalls have new CLI commands to enable or disable resource control
groups and new CLI commands to set an upper memory limit of 8G on
a process (mgmtsrvr). To enable resource-control
groups, use: debug software resource-control enableTo
disable resource-control groups, use: debug software resource-control disableTo
set the memory limit, use: debug management-server limit-memory enableTo
remove the memory limit, use: debug management-server limit-memory disableReboot
the firewall to ensure the memory limit change takes effect. |
Refresh of Default Trusted CAs | The certificate authorities (CAs) that the
firewall trusts by default are updated; new trusted root CAs are
added and expired CAs are removed. To view and manage the lists
of CAs that the firewall trusts by default, select DeviceCertificate ManagementCertificatesDefault Trusted Certificate Authorities. |
VM-50 and VM-50 Lite Firewalls | The minimum memory requirement has changed from
4GB to 4.5GB for the VM-50 Lite and from 4.5GB to 5.5GB for the
VM-50 in PAN-OS 9.0. You cannot upgrade the
VM-50 Lite without allocating additional memory. If you upgrade
the VM-50 with less than 5.5GB memory, it will default to the system capacities
(number of sessions, rules, security zones, address objects, etc)
associated with the VM-50 Lite. See Upgrade/Downgrade Considerations for
more information. |
VM-Series Plugin | Beginning with PAN-OS 9.0, the built-in
VM-Series plugin manages interactions between the VM-Series firewalls
and the supported public and private cloud platforms. Also, the bootstrap package now
has an optional /plugins folder for upgrading
a plugin. To configure plugin integrations, select DeviceVM-Series. In
Panorama™ 9.0 the VM-Series plugin is available in PanoramaPlugins but
must be manually installed. |
VXLAN Tunnel Content Inspection | In PAN-OS 8.1 and earlier releases, the
firewall used the UDP Session key to create UDP sessions for all tunnel content inspection protocols.
It is a six-tuple key (zone, source IP, destination IP, protocol,
source port, and destination port), and it remains in use. PAN-OS
9.0 introduces the VNI Session key specifically for VXLAN tunnel content inspection.
The VNI Session key is a five-tuple key incorporating the zone,
source IP, destination IP, protocol, and the VXLAN Network Identifier
(VNI). By default, VXLAN tunnels now automatically use the VNI
Session key to create a VNI Session, which is visible in logs. If
you prefer to use the UDP Session key for VXLAN (as you did in previous
releases), you can define a custom application for
VXLAN and use an application override policy to
invoke your custom application. |
Panorama Commit and push operations |
|
Security Group Tag (SGT) Ethertype Support | If you're using Security Group Tags (SGTs)
to control user and device access in a Cisco Trustsec network, inline
firewalls in Layer 2 or Virtual Wire mode now inspect and provide
threat prevention for the tagged traffic by default. Before PAN-OS
9.0, a firewall in Layer 2 or virtual wire mode could allow SGT
traffic but did not process and inspect it. The firewall
does not enforce security policy based on SGTs. |
Authentication Policy | In PAN-OS 8.1 and earlier, administrators
needed to add a rule to decrypt TLS sessions to apply authentication
policy. In PAN-OS 9.0, the firewall applies the authentication policy
without needing to decrypt the session. |
IP Address Registration and Dynamic Address
Groups | In PAN-OS 8.1 and earlier, it could take
up to 60 seconds to register an IP address, and the associated tags,
and update the membership information for a dynamic address group
(DAG). In PAN-OS 9.0, IP address registration occurs in real time.
Any policy matches for updates on a registered IP address (IP-tag
mapping) are reflected only in new sessions. Any existing sessions
are reevaluated for a policy match when you perform a commit or
the App-ID™ on the session changes. |
URL Filtering Overrides | In earlier release versions, URL category
overrides received priority enforcement over custom URL categories.
However, override priority goes away in PAN-OS 9.0 with the conversion
of URL category overrides to custom URL categories. After you upgrade,
the firewall enforces the new custom URL category using the Security
policy rule with the strictest URL Filtering profile action. From
most to least strict, possible URL Filtering profile actions are: block,
override, continue, alert, and allow. As a result, overrides with
the allow action might be blocked after being converted to custom
URL categories. For more details on this, review PAN-OS 9.0 Upgrade and Downgrade
Considerations. Workaround:
The Overrides tab
objects are removed and Custom URL Category objects
are created for firewalls running PAN-OS 8.1 or earlier releases
when managed by a Panorama management server that is upgraded to
PAN-OS 9.0. |
CLI Commands for the Option to Hold Web
Requests During URL Category Lookup (PAN-OS 9.0.4
or later 9.0 releases) | The CLI commands for this feature are now the following:
|
URL Filtering CLI Change | You no longer need to download a predefined
set of URLs after activating a URL Filtering license, so the following
commands associated with that operation have been removed:
|
SAML Authentication (PAN-OS
9.0.9 and later 9.0 releases) | To ensure your users can continue to authenticate successfully
with SAML Authentication, you must:
|
SIP TCP Cleartext | The cleartext proxy is enabled by default for
SIP TCP sessions when a segmented SIP header is detected. This helps
with the correct reassembly and ordering of TCP segments for proper
ALG operation. You can disable this option if
SIP message sizes are generally smaller than the MSS and when the
SIP messages fit within a single segment, or if you need to ensure
TCP proxy resources are reserved for SSL forward proxy or HTTP/2. |
Resolution of FQDN Address Objects | Firewalls started using DNSProxy daemon
instead of Linux network stack to resolve FQDNs, and therefore there
is a difference in the ability of Panorama and firewalls to resolve
FQDNs. Both Panorama and firewalls require that when you create
an address object using an FQDN, you enter an FQDN and not just
a hostname. |
URL Filtering PAN-DB Updates | In PAN-OS 9.0 and later, firewalls no longer
download a PAN-DB seed database or incremental database updates;
instead, firewalls populate the cache as URL queries are made. In
an active/passive HA environment, as database updates are no longer applicable,
only the active firewall connects to PAN-DB to perform URL lookups.
Should a failure occur, the passive firewall transitions to an active state,
and will establish a connection to PAN-DB. |
Forwarded Emails for System Events | After a successful upgrade to PAN-OS 9.0,
the subject line for system events forwarded to an email address have
a maximum of 99 characters. This means that email subject lines
that exceed 95 characters are truncated with an ellipsis (...)
to indicate there is additional text to review. |
View Rulebase as Groups | On upgrade to PAN-OS 9.0, View
Rulebase as Groups replaces the Tag Browser in the Policies tab. In
this view, select the group tag to view the policy rules grouped
by the selected tag. |