PAN-OS 9.1.6 Addressed Issues
PAN-OS® 9.1.6 addressed issues.
VM-500 and later firewalls only) A new CLI command was added to increase the number of threads for handling incoming GlobalProtect connection requests when there is a high login rate and a slow authentication response from an external server.
A fix was made to address a vulnerability related to information exposure through log files in PAN-OS where secrets in PAN-OS XML API requests were logged in cleartext in the web server logs when the API was used incorrectly (CVE-2021-3036).
Fixed an issue where the IPSec encapsulation sequence was not properly synced to the dataplanes on a high availability (HA) active/passive cluster.
Fixed an issue where firewall forwarding logs to Cortex Data Lake displayed
Licenseas gray and device connectivity as
Logging Service Status.
Fixed an issue where the proxy configuration did not get honored, which caused certificate revocation list (CRL) checks from the firewall to fail.
Fixed an issue where traffic logs were not shown due to a thread timeout that was causing the reading of the logs from the dataplane to slow.
Fixed an issue where firewalls repeatedly connected and disconnected to Cortex Data Lake due to a probing issue.
Fixed an issue where packet buffer unavailability caused host-bound sessions to remain in an opening state in the dataplane.
Fixed an intermittent issue where Panorama did not retrieve firewall logs from Cortex Data Lake.
Fixed an issue where the syntax on GlobalProtect DNS suffixes was not validated.
Fixed an issue where the Destination NAT with
DNS Rewriteenabled and set to
forwarddid not work when the destination IP address was a single IP address instead of an IP range.
Fixed an issue with URL Filtering where websites that were previously in the malicious category but have since been cleared remained in the malicious category in the dataplane cache. These websites were moved to the benign category only after you manually cleared the cache.
Fixed an issue where a VM-Series firewall on Amazon Web Services (AWS) failed on first reboot after enabling FIPS mode
Fixed a permission issue where a Panorama administrator was unable to download or install dynamic updates (
Panorama > Device Deployment).
Fixed an issue where certificates, custom logos, and SAML metadata were unable to be uploaded from the web interface using a Chromium-based browser running version 84 or later.
Fixed an issue where the output for
show user ip-user-mapping-mp all, when called via XML API, was written to a file instead of returned via the API.
Fixed an issue where FIB entries were unexpectedly removed due to miscommunication between internal processes.
Fixed an intermittent issue where the GlobalProtect portal stopped responding with a 502 Bad Gateway response page when trying to access the portal URL using a web browser.
Fixed an issue where the Safe Search Block Page was visible for a few seconds when browsing HTTP2 websites, which resulted in latency when browsing.
Fixed an issue that prevented Panorama from pushing dynamic content to VM-Series firewalls configured with a pay-as-you-go (PAYG) license.
Fixed an issue where overridden TCP timeout values for service-based sessions did not take effect, and sessions timed out according to default application values.
Fixed an issue in Panorama where a commit-all to managed firewalls failed after renaming a device group.
Fixed an issue on VM-Series firewalls deployed on Google Cloud Platform (GCP) where traffic was backhauled after a reboot when the policy-based forwarding (PBF) enforced symmetric return with a next hop feature was enabled and interface IP addresses were learned via DHCP.
Fixed an issue where, when using certificate profiles configured under specific virtual systems (vsys), the GlobalProtect
Machine Certification Checkand
HIP Objectfail during a client certificate check.
Fixed an issue where required processes were not automatically restarted on the Log Processing Card (LPC) or the Log Forwarding Card (LFC).
Fixed an issue where traffic didn't hit the intended Security policy if SSL forward proxy was enabled and service was set to
Fixed an issue where
ValidateAlljobs were incorrectly logged as
CommitAllin the configuration log of the firewall.
PA-7050 and PA-7080 firewalls with 100G NPC only) Fixed an issue where jumbo frames brought down the Network Processing Card (NPC) when traffic traversed the firewall at a high rate.
Fixed an issue where user-to-IP address mapping that was redistributed between virtual systems (vsys) was not removed when the XML API unique identifier (UID) payload was set to
Fixed an issue where TCP connections got stuck between the firewall and the Log Collector if some packets were dropped on the path between the two appliances.
Fixed a configuration issue on a multi-vsys where the configured interface service route for email schedule reports was not being used.
FPP offload based hardware model only) Fixed an issue where, when UDP traffic that was received on a tunnel had back-to-back client-to-server packets, random packets dropped.
An update was made to change the following system log message:
DO NOT CHOOSE WMI in Active-Directory FOR YOUR USE CASE IF SEE THIS LOG AGAIN IN <number> SECONDSto
Please change server monitor(log server) Transport Protocol from WMI to WinRM for better performance. This update also reduces the severity from
Fixed an issue where
ACC > GlobalProtect Activityon Panorama in management only mode with a dedicated log collector did not display any reports.
Fixed an issue where the firewall sent Bidirectional Forwarding Detection (BFD) packets with the final bit always set to
on. With this fix, the final bit is cleared after the first response.
Fixed a rare issue where HTTP/2 sessions matched to an incorrect policy.
Fixed an issue on Panorama in PAN-DB mode where content updates did not successfully install, which caused the cloud state to degrade.
A new CLI command,
debug proxy fast-session-delete enable yes, was added to better handle SSL-decrypted sessions where TCP port numbers were reused before the TIME_WAIT period expired.
Debug logs were added to detect an out-of-memory (OOM) condition that caused the management server to restart.
PA-800 Series firewalls only) Fixed an issue where the deployment of the Master Key through the web interface failed.
Fixed an issue where service session timeout override was not used for custom applications and the default value was chosen instead.
Fixed an issue on the firewall where, with SSL forward proxy feature enabled, random file downloads over a decrypted session would stall or hang in the middle.
Fixed an issue where
URL Filteringlogs were misaligned when exported from the firewall due to the presence of a comma in the
User-Agentfield of the logs.
Fixed an issue where even after disabling
Tasksin the web interface of an
Admin Role Profile, the
Task Managerpanel appeared during a commit.
Fixed an issue where an improperly formatted GlobalProtect Portal from the CLI was able to be created, which prevented it from being seeing in the web interface.
Fixed an issue where the keyword
[Disabled]was missing from the disabled policies exported in CSV/PDF format.
Fixed an issue where the data for a botnet report was deleted before the botnet report was completed.
Fixed an issue where testing and confirming server connections from
Panorama > Server profiles > HTTP > Test Server Connectiondid not work.
PA-3200 Series and PA-800 Series firewalls only) Fixed an issue where you were unable to disable auto negotiation on small form-factor pluggable (SFP) ports.
Fixed an issue where
Templates > Network > QoS > QoS Interface > Clear Text Traffic) was not available when configuring QoS using the Panorama web interface.
Fixed an issue where region information was not called due to a mismatch in uppercase and lowercase letters in the region name.
Fixed an issue where pre-logon users failed authentication if the cookie was expired, instead of using certificate authentication.
Fixed an issue with the GlobalProtect portal where pre-logon authentication failed when agent Config Selection Critiera was configured on the firewall.
PA-7000 Series firewalls only) Fixed an issue where unplugging cables from Quad Small Form-factor Pluggable (QSFP) interfaces on 100G NPC causes path monitoring failures.
Fixed an issue where the
Logging Services Statuswas incorrect. This was caused by the namespace of the daemons that were running not being updated correctly.
Fixed an issue where an HA configuration went out of sync when the HA sync job was queued and processed during an ongoing content installation job on the passive firewall.
Added an enhancement to improve handling for firewall management web interface sessions that timeout so that the message
Your session has expireddoes not display. Now, the web interface will present a timeout page that presents a button to redirect back to the login page.
Fixed an issue where the dataplane sent positive acknowledgments to predict-status checks from FPP when the corresponding predict was deleted, which caused SIP and RTSP applications to perform less than the expected achievable performance.
Fixed an issue where a passive Panorama appliance reported that device groups were out of sync despite a successful HA sync from the active Panorama appliance. This issue occurred when the address objects defined in the device group were in use under the corresponding template.
Fixed an issue where BGP flapped continuously with Jumbo Frames enabled on the firewall.
Recommended For You
Recommended videos not found.