Cloud NGFW for Azure
Cloud NGFW for Azure Known Issues
Table of Contents
Expand All
|
Collapse All
Cloud NGFW for Azure Docs
Cloud NGFW for Azure Known Issues
Learn about Cloud NGFW for Azure known issues.
| Where Can I Use This? | What Do I Need? |
|---|---|
|
|
The following known issues have been identified in the Palo Alto Networks
Cloud NGFW for Azure.
| ID | Description |
|---|---|
|
DIT-55458
| New instances of CNGW Azure fail to
forward logs to a dedicated log collector post scale-out.
When a new firewall joins Panorama, its serial number is
added to the device list. However, unlike when Panorama acts as a
log collector, a dedicated log collector doesn't automatically
receive this new device information. Consequently, it rejects
connection requests from the new instances. Workaround: A
manual commit and push from Panorama to the Collector Group is required
which will update configuration including the new device's serial number
to the dedicated log-collector. Other workarounds are:
|
|
DIT-48634
|
In the Azure portal, health checks from an internal load balancer are
not received which causes the Cloud NGFW resource to reach an
unhealthy state; a gateway with a Deny All rule blocks communication
between the load balancer performing the health check to the
firewall. To resolve this issue, allow list the health probe IP
address.
|
|
DIT-40385
| After overriding the default intrazone
security policy from Panorama, the change may not apply correctly on
the Cloud NGFW. The firewall continues to use its local
intrazone-default deny policy, which takes precedence and results in
unexpected denial of same-zone traffic. Additionally, traffic logs
for this denied traffic are not visible. Workaround: To
allow intra-zone traffic, customers should create a specific security
policy rule for the desired behavior and place it in the pre-rule or
post-rule sections. This new rule will take precedence over the default
deny policy, ensuring traffic is handled as intended |
|
FWAAS-10519
|
When multilogging destination is enabled, the logs are seen
on Panorama and syslog server, but no logs are seen on the log
analytics workspace.
Workaround: If you want to use syslog along with log
analytics workspace, change the service route to destination based
instead of a service-based route.
For Destination Based Routing configuration, select the
destination, add your syslog server private IP, and then select
loopback.3 as the source interface.
|
|
FWAAS-9688
|
Default rules in Panorama are overridden by the Cloud NGFW resource.
Parameters such as Profile and
Action are not retained. For example, if
you configure an action to Allow, it reverts
to Deny; if you configure a logging profile,
it reverts to None.
|
|
FWAAS-7531
|
A self-signed certificate can erroneously be associated with a
rulestack, despite the absence of a resource name.
|
|
FWAAS-7542
|
Panorama does not always automatically push content and antivirus
updates to newly created Cloud NGFW for Azure resources.
|
|
FWAAS-7547
|
QoS Profiles (provided by a device template) are not removed when
displayed in the Panorama virtual appliance.
|
|
FWAAS-7956
|
A rulestack displays incorrect information when it shares the same
name as the firewall.
|
|
FWAAS-8642
|
Creating a large number of local rules can cause an HTTP error (503
Server Error: Service Unavailable).
|
|
FWAAS-9086
|
Deployment status information in the Azure portal is truncated
without displaying complete information.
|
|
FWAAS-10195
|
Firewall creation fails when you enable non-RFC 1918 addresses
without enabling a DNS Proxy.
|
|
PAN-217954
|
When a Cloud NGFW for Azure resource connects to Panorama for the
first time, the template stack associated with the resource's Cloud
Device Group is out of sync.
|
|
PAN-217459
|
Cloud NGFW resources managed by a Panorama HA pair might be listed in
the cloud device group by its serial number (instead of device name)
on the secondary Panorama. However, on the primary Panorama, the
Cloud NGFW resource is listed by its device name.
|
|
PAN-217966
|
Configured Dynamic Address Group tags and IP addresses are not listed
in child Cloud Device Groups when the parent device group does not
have a Dynamic Address Group configured.
|