PAN-OS 10.1.9 Addressed Issues
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
PAN-OS 10.1.9 Addressed Issues
PAN-OSĀ® 10.1.9 addressed issues.
Issue ID | Description |
---|---|
WIF-707 | Fixed an issue where, when connections from
the firewall to the cloud took longer than expected, the connection
timed out. With this fix, the timeout was extended to accommodate
slower networks. |
PAN-210561 | Fixed an issue where the all_task process repeatedly
restarted due to missed heartbeats. |
PAN-210331 |
Fixed an issue where the firewall did not send device telemetry files
to Cortex Data Lake with the error message Send File
to CDL Receiver Failed.
|
PAN-210080 | Fixed an issue where the useridd process stopped
responding when add and delete member parameters in an incremental
sync query were empty. |
PAN-209226 | Fixed an issue where the feature bits function
reused shared memory, which resulted in a memory allocation error
and caused the dataplane to go down. |
PAN-209036 | Fixed an issue where the dataplane restarted,
which led to slot failures occurring and a core file being generated. |
PAN-208724 | Fixed an issue where port pause frame settings
did not work as expected and incorrect pause frames occurred. |
PAN-208718 | Additional debug information was added to
capture internal details during traffic congestion. |
PAN-208711 | (PA-5200 Series firewalls only)The
CLI command debug dataplane set pow no-desched yes/no was
added to address an issue where the all_pktproc process
stopped responding and caused traffic issues. |
PAN-208537 | Fixed an issue where the licensed-device-capacity was reduced
when multiple device management license key files were present. |
PAN-208343 | Fixed an issue where telemetry regions were
not visible on Panorama. |
PAN-208157 | Fixed an issue where malformed hints sent
from the firewall caused the logd process to stop responding
on Panorama, which caused a system reboot into maintenance mode. |
PAN-208037 | Fixed an issue where NAT64 traffic using
the reserved prefix 64:ff9b::/96 was
incorrectly dropped when strict-ip-check was
enabled under zone protection. |
PAN-207983 | Fixed an issue on Panorama in Management
Only mode where the logdb database incorrectly collected traffic,
threat, GTP, decryption, and corresponding summary logs. |
PAN-207940 | Fixed an issue where platforms with RAID
disk checks were performed weekly, which caused logs to incorrectly
state that RAID was rebuilding. |
PAN-207891 | Fixed an issue on Panorama where log migration
did not complete after an upgrade. |
PAN-207738 | Fixed an issue where the ocsp-next-update-time CLI command
did not execute for leaf certificates with certificate chains that did
not specify OCSP or CRL URLs. As a result, the next update time
was 60 minutes even if a different time was set. |
PAN-207623 | Fixed an issue on Panorama where log migration
did not complete as expected. |
PAN-207610 | (PA-5200 Series and PA-7000 Series firewalls
only) Fixed an issue where Log Admin Activity was
not visible on the web interface. |
PAN-207601 | Fixed an issue where URL cloud connections
were unable to resolve the proxy server hostname. |
PAN-207390 | Fixed an issue where, even after disabling
Telemetry, Telemetry system logs were still generated. |
PAN-207260 | Fixed an issue where commit operations performed
by a Device Group and Template administrator reverted the passwords
of other users in the same role. |
PAN-207045 | (PA-800 Series firewalls only)
Fixed an issue where PAN-SFP-SX transceivers used on ports 5 to
8 did not renegotiate with peer ports after a reload. |
PAN-206858 | Fixed an issue where a segmentation fault
occurred due to the useridd process being restarted. |
PAN-206755 | Fixed an issue when a scheduled multi-device
group push occurred, the configd process stopped responding, which
caused the push to fail. |
PAN-206684 | (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only) Fixed an issue where,
after upgrading the firewall from a PAN-OS 10.0 release to a PAN-OS
10.1 release, the firewall did not duplicate logs to local log
collectors or to Strata Logging Service when a device
certificate was already installed. |
PAN-206658 | Fixed a timeout issue in the Intel ixgbe driver
that resulted in internal path monitoring failure. |
PAN-206629 | (VM-Series firewalls in AWS environments
only) Fixed an issue where a newly bootstrapped firewalls did
not forward logs to Panorama. |
PAN-206393 | (PA-5280 firewalls only) Fixed
an issue where memory allocation errors caused decryption failures
that disrupted traffic with SSL forward proxy enabled. |
PAN-206251 | (PA-7000 Series firewalls with LFCs
only) Fixed an issue where the logrcvr process
did not send the system-start SNMP
trap during startup. |
PAN-206233 | Fixed an issue where the pan_comm process stopped
responding when a content update and a cloud application update
occurred at the same time. |
PAN-206077 | Fixed an issue on firewalls in active/active
high availability (HA) configurations where, after upgrading to
PAN-OS 10.1.6-h6, the active primary firewall did not send HIP reports
to the active secondary firewall. |
PAN-206017 | Fixed an issue where the show dos-protection rule command
displayed a character limit error. |
PAN-205877 | (PA-5450 firewalls only) Added
debug commands for an issue where a MAC address flap occurred on
a neighbor firewall when connecting both MGT-A and MGT-B interfaces. |
PAN-205805 | Fixed an issue where Generic routing encapsulation
(GRE) traffic was only allowed in one direction when tunnel content
inspection (TCI) was enabled. |
PAN-205729 | (PA-3200 Series and PA-7000 Series firewalls
only) Fixed an issue where the CPLD watchdog timeout caused
the firewall to reboot unexpectedly. |
PAN-205699 | Fixed an issue where the cloud plugin configuration
was automatically deleted from Panorama after a reboot or a configd process
restart. |
PAN-205590 | Fixed an issue where the fan tray fault
LED light was on even though no alarm was reported in the system
environment. |
PAN-205453 | Fixed an issue where running reports or
queries under a user group caused the reportd process
to stop responding. |
PAN-205396 | Fixed an issue where SD-WAN adaptive SaaS
path monitoring did not work correctly during a next hop link down
failure. |
PAN-205260 | Fixed an issue where there was an IP address
conflict after a reboot due to a transaction ID collision. |
PAN-205231 | Fixed an issue where a commit operation
remained at 55% for longer than expected if more than 7,500 Security
policy rules were configured. |
PAN-205222 | Fixed an issue where you were unable to
add a new application in a selected policy rule. |
PAN-205211 | Fixed an issue where the reportd process stopped
responding while querying logs (Monitor > Logs > <logtype>). |
PAN-205123 | Fixed an issue where the pan_task process stopped
responding due to a timing issue during ECDSA processing. |
PAN-205096 | Fixed an issue where promoted sessions were
not synced with all cluster members in an HA cluster. |
PAN-205030 | Fixed an issue where, when a session hit
policy based forwarding with symmetric return enabled was not offloaded,
the firewall received excessive return-mac update messages, which
resulted in resource contention and traffic disruption. |
PAN-204952 | Fixed an issue where the GlobalProtect portal
continued to generate new authentication cookies even when a user
had already authenticated with a valid cookie. |
PAN-204892 | Fixed an issue on Panorama where the web
interface was not accessible and displayed the error 504 Gateway Not Reachable due
to the mgmtsrvr process not responding. |
PAN-204749 | Fixed an issue where sudden, large bursts
of traffic destined for an interface that was down caused packet
buffers to fill, which stalled path monitor heartbeat packets. |
PAN-204582 | Fixed an issue where, when a firewall acting
as a DHCP client received a new DHCP IP address, the firewall did
not release old DHCP IP addresses from the IP address stack. |
PAN-204581 | Fixed an issue where, when accessing a web
application via the GlobalProtect Clientless VPN, the web application
landing page continuously reloaded. |
PAN-204575 | (PA-7000 Series firewalls with Log Forwarding
Cards (LFCs) only) Fixed an issue where the firewall did not
forward logs to the log collector. |
PAN-204482 | Fixed an issue where searching threat logs
(Monitor > Logs > Threat) using the partial hash parameter
did not work, which resulted in an invalid operator error. |
PAN-204456 | Fixed an issue related to the logd process
that caused high memory consumption. |
PAN-204271 | Fixed an issue where the quarantine device
list did not display due to the maximum memory being reached. |
PAN-204238 | Fixed an issue where, when View
Rulebase as Groups was enabled, the Tags field
did not display a scroll down arrow for navigation. |
PAN-204216 | Fixed an issue where URL categorization
failed and the firewall displayed the URL category as not-resolved for
all traffic and the following error message was displayed in the
device server logs Error(43): A libcurl function was given a bad argument. |
PAN-204118 | Fixed an issue where browser sessions stopped
responding for device group template admin users with access domains
that had many device groups or templates. |
PAN-204068 | Fixed an issue where a newly created vsys
(virtual system) in a template was not able to be pushed from Panorama
to the firewall. |
PAN-203984 | Fixed an issue where the logrcvr process restarted
after the firewall was power cycled or rebooted. |
PAN-203964 | (Firewalls in FIPS-CC mode only)
Fixed an issue where the firewall went into maintenance mode due
to downloading a corrupted software image, which resulted in the
error message FIPS-CC failure. Image File Authentication Error. |
PAN-203851 | Fixed an issue with firewalls in HA configurations
where host information profile (HIP) sync did not work between peer
firewalls. |
PAN-203796 | Fixed an issue where legitimate syn+ack
packets were dropped after an invalid syn+ack packet was ingressed. |
PAN-203681 | (Panorama appliances in FIPS-CC mode
only) Fixed an issue where a leaf certificate was unable to
be imported into a template stack. |
PAN-203618 | Fixed an issue where, when SSL/TLS Handshake
Inspection was enabled, SSL/TLS sessions were incorrectly reset
if a Security policy rule with no Security profiles configured was
matched. |
PAN-203563 | Fixed an issue with Content and Threat Detection
allocation storage space where performing a commit failed with a CUSTOM_UPDATE_BLOCK error message. |
PAN-203453 | Fixed an issue on Panorama where the log
query failed due to a high number of User-ID redistribution messages. |
PAN-203430 | Fixed an issue where, when the User-ID agent
had collector name/secret configured, the
configuration was mandatory on clients on PAN-OS 10.0 and later releases. |
PAN-203362 | Fixed an issue where the rasmgr process restarted
due to a null reference. |
PAN-203330 | Fixed an issue where the certificate for
an External Dynamic List (EDL) incorrectly changed from invalid
to valid, which caused the EDL file to be removed. |
PAN-203320 | Fixed an issue where configuring the firewall
to connect with Panorama using an auth key and creating the auth
key without adding the managed firewall to Panorama first, the auth
key was incorrectly decreased incrementally. |
PAN-203244 | Fixed a path monitoring issue that caused
traffic degradation. |
PAN-203147 | (Firewalls in FIPS-CC mode only)
Fixed an issue where the firewall unexpectedly rebooted when downloading
a new PAN-OS software image. |
PAN-202918 | Fixed an issue where processing route-table
entries did not work as expected. |
PAN-202722 | Fixed an issue where the factor completion
time for login events learned through XML API displayed as 1969/21/31 19:00:00. |
PAN-202593 | Fixed an issue where expanding Global Find
results displayed only the top level and second level of a searched
item. |
PAN-202544 | An enhancement was made to collect CPLD
register data after a path monitor failure. |
PAN-202543 | An enhancement was made to improve path
monitor data collection by verifying the status of the control network. |
PAN-202361 | Fixed an issue where packets queued to the pan_task process
were still transmitted when the process was not responding. |
PAN-202339
|
(VM-Series firewalls on Amazon Web Services (AWS) only)
Fixed an issue where the firewall displayed reduced throughput of
SSL traffic.
|
PAN-202295 | Fixed an issue where read-only superusers
were unable to see the Commit All job status, warnings, or errors
for Panorama device groups. |
PAN-202282 | Fixed an issue where stats dump files did
not display all necessary reports. |
PAN-202264 | (VM-Series firewalls only) Fixed
an issue where an automatic site license activation for a PAYG license
did not register in the Customer Support Portal. |
PAN-202248 | Fixed an issue where, due to a tunnel content
inspection (TCI) policy match, IPSec traffic did not pass through
the firewall when NAT was performed on the traffic. |
PAN-202247 | Fixed an issue with firewalls in HA configurations
where the firewall dropped IKE SA connections if the peer firewall
received an INVALID_SPI message. This
occurred even though no IKE SA was associated with the SPI in the
received INVALID-SPI payload. |
PAN-202208 | Fixed an issue where high CPU was experienced
when requests from the dataplane to the management plane for username
and User ID timed out. |
PAN-202194 | Fixed an SD-WAN link issue that occurred
when Aggregate Ethernet without a member interface was configured
as an SD-WAN interface. |
PAN-202140 | Fixed an issue where the comm process
stopped responding due to an OOM condition. |
PAN-202101 | Fixed an issue where firewalls stopped responding
after an upgrade due to configuration corruption. |
PAN-202040 | (PA-220 firewalls only) Fixed an
issue where ECDSA fingerprints were not displayed. |
PAN-202012 | A debug command was introduced to control
Gzip encoding for the GlobalProtect Clientless VPN application. |
PAN-201954 | Fixed an issue where NAT policy rules were
deleted on managed devices after a successful push from Panorama
to multiple device groups. This occurred when NAT policy rules had device_tags selected
in the target section. |
PAN-201910 | PAN-OS security profiles might consume a
large amount of memory depending on the profile configuration and
quantity. In some cases, this might reduce the number of supported
security profiles below the stated maximum for a given platform. |
PAN-201900 | Fixed an internal path monitoring failure
issue that caused the dataplane to go down. |
PAN-201701 | Fixed an issue where the firewall generated
system log alerts if the raid for a system or log disk was corrupted. |
PAN-201639 | Fixed an issue with Saas Application Usage
reports where Applications with Risky Characteristics displayed
only two applications per section. |
PAN-201632 | Fixed an issue where the all_task stopped responding
with a segmentation fault due to an invalid interface port. |
PAN-201587 | Fixed an issue where the App Pcaps directory
size was incorrectly detected which caused commit errors. |
PAN-201580 | Fixed an issue where the useridd process stopped
responding due to an invalid vsys_id request. |
PAN-201360 | Fixed an issue with Panorama managed log
collector statistics where the oldest logs displayed on the primary
Panorama appliance and the secondary Panorama appliance did not
match. |
PAN-201189 | Added the max-kb filter
for the show session info CLI command
to troubleshoot instances when the firewall went down due to software packet
buffer depletion. |
PAN-201136 | Fixed an issue where IGMP packets were offloaded
with frequent IGMP Join and Leave messages from the client. |
PAN-200946 | Fixed an issue with firewalls in active/passive
HA configurations where GRE tunnels went down due to recursive routing
when the passive firewall was booting up. When the passive firewall
became active and no recursive routing was configured, the GRE tunnel
remained down. |
PAN-200845 | (M-600 Appliances in Management-only
mode only) Fixed an issue where XML API queries failed due
to the configuration size being larger than expected. |
PAN-200822 | Fixed an issue where reports were not generated
in the docm file type. |
PAN-200775 | (VM-Series firewalls only Microsoft
Azure environments only) Fixed an issue where negotiation and
speed were not displayed on Ethernet interfaces. |
PAN-200463 | Fixed an issue where disabling strict-username-check did
not apply to admin users authenticating with SAML. |
PAN-200160 | Fixed a memory leak issue on Panorama related
to the logd process that caused an out-of-memory (OOM) condition. |
PAN-200116 | Fixed an issue where Elasticsearch displayed RED due
to frequent tunnel check failures between HA clusters. |
PAN-200102 | Fixed an issue on the firewall web interface
that prevented applications from loading under any policy or in
any location where application IDs were able to be refreshed. |
PAN-200095 | Fixed an issue where Panorama troubleshooting
tests for log collector connectivity did not return results from
log collectors running PAN-OS 10.1 releases. |
PAN-200035 | Fixed an issue where the firewall reported General TLS Protocol Error for TLSv1.3
when the firewall closed a TCP connection to the server via a FIN
packet without waiting for the handshake to complete. |
PAN-199807 | Fixed an issue where the dataplane frequently
restarted due to high memory usage on wifclient. |
PAN-199661 | (VM-Series firewalls in ESXI environments
only) Fixed an issue where the number of used packet buffers
was not calculated properly, and packet buffers displayed as a higher
value than the correct value, which triggered PBP Alerts. This occurred
when the driver name was not compatible with new DPDK versions. |
PAN-199612 | Fixed a sync issue with firewalls in active/active
HA configurations. |
PAN-199500 | Fixed an issue where, when many NAT policy
rules were configured, the pan_comm process stopped responding
after a configuration commit due to a high number of debug messages. |
PAN-199410 | Fixed an issue where system logs for syslog activities
were categorized as general under Type and EVENT columns. |
PAN-199214 | Fixed an intermittent issue where downloading threat pcap via
XML API failed with the following error message: /opt/pancfg/session/pan/user_tmp/XXXXX/YYYYY.pcap does not exist. |
PAN-199141 | Fixed an issue where renaming a device group
and then performing a partial commit led to the device group hierarchy
being incorrectly changed. |
PAN-199052 | (PA-800 Series firewalls only)
Fixed an issue where commit operations took longer than expected.
This fix improves the completion time for commit operations. |
PAN-198920 | Fixed an issue where configuration changes
caused a previously valid interface ID to become invalid due to
HA switchovers delaying the configuration push. |
PAN-198889 | Fixed an issue where the logd process
stopped responding if some devices in a collector group were on
a PAN-OS 10.1 device and others were on a PAN-OS 10.0 release. This
issue affected the devices on a PAN-OS 10.0 release. |
PAN-198718 | (PA-5280 firewalls only) Fixed
an issue where memory allocation failures caused increased decryption
failures. |
PAN-198691 | Added an alternate health endpoint to direct
health probes on the firewall (https://firewall/unauth/php/health.php)
to address an issue where /php/login.php performance was
slow when large amounts of traffic were being processed. |
PAN-198575 | Fixed an issue where data did not load when
filtering by Threat Name (ACC
> Threat Activity). |
PAN-198306 | Fixed an issue where the useridd process stopped
responding when booting up the firewall. |
PAN-198187 | Fixed an issue where system logs (Monitor
> System) did not display the commit description after performing
a commit and push to multiple device groups from Panorama. |
PAN-198174 | Fixed an issue where, when viewing traffic
or threat logs from the Application Command Center (ACC)
or Monitor tabs, performing a reverse DNS lookup
caused the dnsproxy process to restart if DNS server
settings were not configured. |
PAN-198050 | Fixed an issue where Connection
to update server is successful messages displayed even
when connections failed. |
PAN-198038 | A CLI command was added to address an issue
where long-lived sessions were aging out even when there was ongoing
traffic. |
PAN-197953 | Fixed an issue where the logd process
stopped responding due to forwarded threat logs, which caused Panorama
to reboot into maintenance mode. |
PAN-197935 | Fixed an intermittent issue where XML API
IP address tag registration failed on firewalls in a multi-vsys
environment. |
PAN-197919 | Fixed an issue where, when path monitoring
for a static route was configured with a new Ping Interval value,
the value was not used as intended. |
PAN-197877 | Fixed an intermittent issue on Panorama
where the distributord process stopped responding. |
PAN-197872 | Fixed an issue where the useridd process generated
false positive critical errors. |
PAN-197859 | Fixed an issue where firewalls running LSVPN
with tunnel monitoring enabled where, after an upgrade to PAN-OS
9.1.14 or a later PAN-OS release, LSVPN tunnels flapped. |
PAN-197847 | Fixed an issue where disabling the enc-algo-aes-128-gcm cipher
did not work when using an SSL/TLS profile. |
PAN-197737 | Fixed an issue where the connection to the
PAN-DB server failed with following error message: Failed to send req type[3], curl error: Couldn't resolve host name. |
PAN-197729 | Fixed an issue where repeated configuration
pushes from Panorama resulted in a management server memory leak. |
PAN-197678 | Fixed an issue where the dataplane stopped
responding, which caused internal path monitoring failure. |
PAN-197649 | Fixed an issue where failure logs for slot
restarts caused by internal path monitoring contained no debug logs. |
PAN-197582 | Fixed an issue where, after upgrading to
PAN-OS 10.1.6, the firewall reset SSL connections that used policy-based
forwarding. |
PAN-197426 | Fixed an issue on Panorama where, when attempting
to view the Monitor page, the error invalid term was
displayed. |
PAN-197383 | Fixed an issue where, after upgrading to
PAN-OS 10.2 release, the firewall ran a RAID rebuild for the log
disk after ever every reboot. |
PAN-197298 | Fixed an issue where the audit comment archive
for Security rule changes output had overlapping formats. |
PAN-197219 | Fixed an issue where the following error
message was not sent from multi-factor authentication PingID and
did not display in the browser: Your company has enhanced its VPN authentication with PingID. Please install the PingID app for iOS or Android, and use pairing key:<key>. To connect, type "ok". |
PAN-197203 | Fixed an intermittent issue where, if SSL/TLS
Handshake Inspection was enabled, multiple processes stopped responding
when the firewall was processing packets. |
PAN-197121 | Fixed an issue where incorrect user details
were displayed under the USER DETAIL drop-down (ACC
> Network activity > User activity). |
PAN-197097 | Fixed an issue where LSVPN did not support
IPv6 addresses on the satellite firewall. |
PAN-196954 | Fixed a memory leak issue related to the distributord process. |
PAN-196895 | Fixed a timing issue with updating the cache
when upgrading from a PAN-OS 10.0 release to a PAN-OS 10.1 release. |
PAN-196874 | Fixed an issue where, when the firewall
accepted ICMP redirect messages on the management interface, the
firewall did not clear the route from the cache. |
PAN-196840 | Fixed an issue where exporting a Security
policy rule that contained Korean language characters to CSV format
resulted in the policy description being in a non-readable format. |
PAN-196811 | Fixed an issue where logout events without
a username caused high CPU usage. |
PAN-196701 | Fixed an issue where the firewall did not
properly measure the Panorama connection keepalive timer, which
caused a Panorama HA failover to take longer than expected. |
PAN-196566 | Fixed an issue where the useridd process restarted
repeatedly which let to an OOM condition. |
PAN-196559 | Fixed an issue where LSVPN satellites continued
to allow connections even when the certificate was revoked, the
serial number was removed from the GlobalProtect portal, and the
satellite was disconnected from the gateway. |
PAN-196474 | Fixed an issue where, when a decryption
profile was configured with TLSv1.2 or later, web pages utilizing
TLS1.0 were blocked with an incorrect ERR_TIME_OUT message instead
of an ERR_CONNECTION_RESET message. |
PAN-196467 | Fixed an issue where enabling strict IP
address checks in a Zone Protection profile caused GRE tunnel packets
to be dropped. |
PAN-196457 | Fixed an issue where extraneous logs displayed
in the Traffic log when Security policy settings were changed. |
PAN-196452 | Fixed an issue where DNS queries failed
from source port 4789 with a NAT configuration. |
PAN-196410 | Fixed an issue where you were unable to
customize the risk value in Risk-of-app. |
PAN-196404 | Fixed an issue where the firewall did not
forward IPSec decrypted traffic to a third-party security chain
device when the network packet broker feature was enabled. |
PAN-196398 | (PA-7000 Series firewalls with Switch
Management Cards (SMC-B) only) Fixed an issue where the firewall
did not capture data when the active management interface was MGT-B. |
PAN-196309 | (PA-5450 firewalls only) Fixed
an issue where a firewall configured with a Policy-Based Forwarding
policy flapped when a commit was performed, even when the next hop
was reachable. |
PAN-196261 | Fixed an issue where inter-lc disconnected messages
were logged once every minute. |
PAN-196124 | Fixed an issue where the log_index process ignored
healthy logs and caused system logs to go missing. |
PAN-196105 | Fixed an issue on the firewall where using
special characters in a password caused authentication to fail when
connecting to the GlobalProtect portal with GlobalProtect satellite
configured. |
PAN-196050 | Fixed an issue on Panorama where logs did
not populate when one log collector in a log collector group was
down. |
PAN-196001 | Fixed an issue where the devsrvr process stopped
responding, which caused FQDN objects to not resolve, and, as a
result, caused traffic to hit the incorrect Security policy rule. |
PAN-195869 | Fixed an issue where scheduled custom reports
based on firewall data did not display any information. |
PAN-195828 | Fixed an issue where SNMP reported the panVsysActiveTcpCps and panVsysActiveUdpCps value
to be 0. |
PAN-195792 | Fixed an issue where, when generating a
stats dump file for a managed device from Panorama (Panorama
> Support > Stats Dump File), the file did not display
any data. |
PAN-195790 | Fixed an issue where syslog traffic that
was sent from the management interface to the syslog server even
when a destination IP address service route was configured. |
PAN-195689 | Fixed an issue where WildFire submission
logs did not load on the firewall web interface. |
PAN-195669 | Fixed an issue with Panorama appliances
in HA configurations where a passive Panorama appliance generated CMS Redistribution Client is connected to global collector messages. |
PAN-195583 | Fixed an issue where, after renaming an
object, configuration pushes from Panorama failed with the commit
error object name is not an allowed keyword. |
PAN-195526 | Fixed an issue where the firewall system
log received a large amount of error messages when attempting a
connection between the firewall and Panorama. |
PAN-195374 | (Firewalls in active/passive HA configurations
only) Fixed an issue where, when redistribution agent connections
to the passive firewall failed, excessive system alerts for the
failed connection were generated. With this fix, system alerts are
logged every 5 hours instead of 10 minutes. |
PAN-195254 | (PA-7000 Series firewalls only)
Fixed an issue where log queries from an M-Series Panorama appliance
or Panorama virtual appliance in Management Only mode to the firewall
failed after updating the firewall to a PAN-OS 10.1 release. |
PAN-195201 | Fixed an issue where high volume DNS Security
traffic caused the firewall to reboot. |
PAN-195200
|
Fixed an issue where Panorama did not attach and email scheduled
reports (MonitorPDFReportsEmail Scheduler) when the size of the email attachments was
large.
|
PAN-195114 | Fixed an issue where proxy ARP responded
on the wrong interface when the same subnet was in two virtual routers. |
PAN-195064 | Fixed an issue where the log collector did
not forward correlation logs to the syslog server. |
PAN-194912 | Fixed an issue where the CLI command show applications list did
not return any outputs. |
PAN-194812 | Fixed an issue where generating reports
via XML API failed when the serial number was set as target in the
query. |
PAN-194744 | Fixed an issue with log corruption, which
caused te log_index process to continually restart. |
PAN-194737 | Fixed an issue where path monitor displayed
as deleted when it was disabled, which caused a preview change in
the summary for static routes. |
PAN-194588 | (PA-7000 Series firewalls with LFCs,
PA-7050 firewalls with SMC-Bs, and PA-7080 firewalls only)
Fixed an issue where the logrcvr_statistics output
was not recorded in mp-monitor.log. |
PAN-194175 | Fixed an issue on Panorama where a commit
push to managed firewalls failed when objects were added as source
address exclusions in a Security policy and Share Unused
Address and Service Objects with Devices was unchecked. |
PAN-194093 | Fixed an issue on the firewall where the
dataplane unexpectedly restarted due to an issue with the all_pktproc process. |
PAN-194092 | Added a debug command to address an issue
where adding a new log collector to an existing collector group,
the ACL was updated for the new log collector but not the existing
ones. |
PAN-194068 | (PA-5200 Series firewalls only)
Fixed an issue where the firewall unexpectedly rebooted with the
log message Heartbeat failed previously. |
PAN-194043 | Fixed an issue where Managed
Devices > Summary did not reflect new tag values after
an update. |
PAN-194031 | (PA-220 Firewalls only) Fixed an
issue where system log configurations did not work as expected due
to insufficient process timeout after a logrcvr process
restart. |
PAN-194025 | Fixed an issue where the ikemgr process stopped
responding due to a timing issue, which caused VPN tunnels to go
down. |
PAN-193928 | Fixed an intermittent issue where GlobalProtect
logs were not visible under device groups (Mobile_User_Device_Group). |
PAN-193831 | Fixed an issue where internal routes were
added to the routing table even after disabling dynamic routing
protocols. |
PAN-193818 | Fixed an issue where the firewall device
server failed to resolve URL cloud FQDNs, which interrupted URL
category lookup. |
PAN-193808 | Fixed a memory leak issue in the mgmtsrvr process
that resulted in an OOM condition. |
PAN-193744 | (PA-3200 Series firewalls only)
Fixed an issue where, when the HA2 HSCI connection was down, the
system log displayed Port HA1-b: down instead
of Port HSCI: Down. |
PAN-193733 | (Firewalls in multi-vsys environments
only) Fixed an issue where IP tag addresses were not synced
to all virtual systems (vsys) when they were pushed to the firewall
from Panorama via XML API. |
PAN-193619 | Fixed an issue where air gapped firewalls
and Panorama appliances performed excessive validity checks to updates.paloaltonetworks.com,
which caused software installs to fail. |
PAN-193558 | Fixed an issue where log retention settings Multi Disk did
not display correct values on the firewall web interface when the
settings were configured using a Panorama template or template stack. |
PAN-193396 | Fixed an issue where the source user name
was displayed in traffic logs even when Show User Names
In Logs and Reports was disabled for a custom admin
role. |
PAN-193323 | Fixed an issue where root partition utilization
reached 100% due to mdb old logs not being purged as expected. |
PAN-193281 | Fixed an issue where the logrcvr process stopped
responding after a content update on the firewall. |
PAN-193245 | Fixed an issue where, when using syslog-ng forwarding
via SSL, with a Base Common Name (CN) and multiple Subject Alternative
Names (SANs) were listed in the certificate. |
PAN-193235 | Fixed an issue where duplicate log entries
were displayed on Panorama. |
PAN-193043 | Fixed an issue with the where firewalls
in Google Cloud Platforms (GCP) inserted the hostname as PA-VM in
the syslog header instead of the DHCP assigned hostname when logs were
being sent to the syslog server. |
PAN-192456 | Fixed an issue where GlobalProtect SSL VPN
processing during a high traffic load caused the dataplane to stop
responding. |
PAN-192431 | Fixed an issue where unmanaged tags were
set to NULL, which caused unmanaged devices to match the HIP rule
for managed devices. As a result, you were unable to distinguish
between managed and unmanaged devices. |
PAN-192296 | Fixed an issue where, when you saved a SaaS
application report as a PDF or sent it to print, the size of contents
were shrinked and was smaller than expected. |
PAN-192244 | Fixed an issue where scheduled log export
jobs continued to run even after being deleted. |
PAN-192193 | Fixed an issue where exporting a list of
managed collectors via the Panorama web interface failed with the
following error message: Export Error, Error while exporting |
PAN-192188 | (PA-5450 firewalls only) Fixed
an issue where the show running resource-monitor ingress-backlogs CLI
command failed with the following error message: Server error : Failed to intepret the DP response. |
PAN-192130 | Fixed an issue where the GlobalProtect client
remained in a connecting state when GlobalProtect Client VPN and
SAML authentication were enabled. |
PAN-192092 | Fixed an issue with firewalls in active/passive
configurations only where the registered cookie from the satellite
firewall to the passive firewall did not sync, which caused authentication
between the satellite firewall and the GlobalProtect portal firewall
to fail after a failover event. |
PAN-192076 | Fixed an issue where OpenSSL memory initialization
caused unexpected failovers. |
PAN-191997 | Fixed an issue where log queries did not
successfully filter the unknown category. |
PAN-191845 | Fixed an issue where the firewall used a
locally configured DNS server instead of a DHCP provided one. |
PAN-191652 | Fixed an issue with Prisma Cloud where a
commit push failed due to the error Error: failed to handle TDB_UPDATE_BLOCK>. |
PAN-191463 | Fixed an issue where the firewall did not
handle packets at Fastpath when the interface pointer was null. |
PAN-191390 | (VM-Series firewalls only) Fixed
an issue where the management plane CPU was incorrectly calculated
as high when logged in the mp-monitor.log. |
PAN-191235 | Fixed an issue with firewalls in HA configurations
where the passive firewall attempted to connect to a hardware security
module (HSM) client when a service route was configured, which caused dynamic
updates and software updates to fail. |
PAN-191048 | Fixed an issue where Panorama did not push
the password hash of the local admin password to managed WildFire
appliances. |
PAN-191032 | Fixed an issue on Panorama where Managed Devices displayed Unknown. |
PAN-190963 | Fixed an issue on the firewall interface
where Log Collector Status > Device connectivity displayed
as error. |
PAN-190533 | Fixed an issue where addresses and address
groups were not displayed for users in Security admin roles. |
PAN-190502 | Fixed an issue where the Policy filter and
Policy optimizer filter were required to have the exact same syntax,
including nested conditions with rules that contained more than
one tag when filtering via the neq operator. |
PAN-190454 | Fixed an issue where, while authenticating,
the allow list check failed for vsys users when a SAML authentication
profile was configured under shared location. |
PAN-190286 | Fixed an issue in the web interface where
non-superusers with administrator privileges were unable to see
Log Processing Card (LPC) information. |
PAN-190266 | Fixed an issue that stopped the all_task process to
stop responding at the pan_sdwan_qualify_if_ini function. |
PAN-190055 | (VM-Series firewalls only) Fixed
an issue where the firewall did not follow the set Jumbo MTU value. |
PAN-189960 | Fixed an issue on Panorama where you were
unable to view the last address object moved to the shared template
list. |
PAN-189866 | Fixed an issue with the web interface where
group include lists used server profiles instead of LDAP proxy. |
PAN-189804 | Fixed an issue where editing Panorama settings
within a template or template stack an authentication was required,
but adding an authentication key displayed an error. |
PAN-189783 | Fixed an issue where container resource
limits were not enforced for all processes when running inside a
container. |
PAN-189755 | Fixed an issue where the snmpd stopped responding
which caused SNMPv3 polling outages. |
PAN-189723 | Fixed an issue where you were unable to
configure dynamic address groups to use more than 64,000 IP addresses
in a Security policy rule. |
PAN-189719 | Fixed an issue on Panorama where Test
Server Connection failed in an HTTP server profile with
the following error message: failed binding local connection end. |
PAN-189718 | Fixed an issue where the number of sessions
did not reach the expected maximum value with Security profiles. |
PAN-189518 | Fixed an issue where incoming DNS packets
with looped compression pointers caused the dnsproxyd process
to stop responding. |
PAN-189379 | Fixed an issue where FQDN based Security
policy rules did not match correctly. |
PAN-189335 | Fixed an issue where the varrcvr process restarted
repeatedly, which caused the firewall to restart. |
PAN-189300 | Fixed an issue where Panorama appliances
in active/passive HA configurations reported the false positive
system log Failed to sync vm-auth-key when
a VM authentication key was generated on the active appliance. |
PAN-189298 | Fixed an issue where existing traffic sessions
were not synced after restarting the active dataplane when it became
passive. |
PAN-189200 | Fixed an issue where sinkholes did not occur
for AWS Gateway Load Balancer dig queries. |
PAN-189027 | Fixed an issue where the dataplane CPU utilization provided from the web interface or via SNMP
was incorrect. This is observed across all platforms. |
PAN-188933 | Fixed an issue where the UDP checksum wasn't
correctly calculated for VXLAN traffic after applying NAT. |
PAN-188912 | Fixed an issue where authentication failed
due to a process responsible for handling authentication requests
going into an irrecoverable state. |
PAN-188602 | Fixed an issue where the all_task process stopped
responding, which caused IPSec tunnels to peers to go down. |
PAN-188519 | (VM-Series firewalls only) Fixed
an issue where, when manually deactivating the license, the admin
user did not receive the option to download the token file and upload
it to the Customer Support Portal (CSP) to deactivate the license. |
PAN-188506 | Fixed an issue where the ctd_dns_malicious_fwd counter incorrectly
increased incrementally. |
PAN-188348 | Fixed an issue where encapsulating Security
payload packets originating from the firewall were dropped when
strict IP address check was enabled in a zone protection profile. |
PAN-188291 | Fixed an issue where, when using Global
Find on the web interface to search for a given Hostname
Configuration (Device > Setup > Management), clicking
the search result directed you to the appropriate Hostname configuration,
but did not change the respective Template field
automatically. |
PAN-188036 | Fixed an issue where SIP TCP sequence numbers
were calculated incorrectly when SIP cleartext proxy was disabled. |
PAN-188035 | (Firewalls and Panorama appliances in
FIPS mode only) Fixed an issue where, even when region lists
were disabled, the following error message was displayed: Unable to retrieve region list either region list has not been set or data format is wrong. |
PAN-187985 | Fixed an issue where you were unable to
configure a QoS Profile as percentage for Clear Text Traffic. |
PAN-187761 | Fixed an issue where, during HA failover,
the now passive firewall continued to pass traffic after the active
firewall had already taken over. |
PAN-187720 | Fixed an issue where the firewall did not
show master key validity information after the master key was updated
and the firewall was restarted. |
PAN-187476 | Fixed an issue where, when HIP redistribution
was enabled, Panorama did not display part of the HIP information. |
PAN-187342 | Fixed an issue where the Schedules button
(Device Deployment > Dynamic updates) was
grayed out for custom role-based admins. |
PAN-187279 | Fixed an issue where not all quarantined
devices were displayed as expected. |
PAN-187096 | Fixed an issue where you were unable to
sort through Addresses (Device
Group > Objects). |
PAN-186487
|
Fixed an issue with snmpd.log overflow caused by continuous hourly
repeating errors.
|
PAN-186471 | Fixed an issue where, when exporting to
CSV in Global Find, the firewall truncated names of rules that contained
over 40 characters. |
PAN-186447 | Fixed an issue where Health (Panorama
> Managed Devices) did not display environmental tabs
and fan and power supply status was not visible. |
PAN-186433 | Fixed an intermittent issue where decryption
failed for clients sending TLSv1.3 Client Hello and CCS in two separate
packets instead of one. |
PAN-186270 | Fixed an issue where, when HA was enabled
and a dynamic update schedule was configured, the configd process unexpectedly
stopped responding during configuration commits. |
PAN-185928 | Fixed an issue where external dynamic list
auto refresh did not work when destination service route was enabled. |
PAN-185844 | Fixed an issue where Decryption Log entries
were associated with the wrong Security policy rule. |
PAN-185611 | (PA-850 firewalls only) Fixed an
issue where the maximum number of aggregate interfaces was incorrectly
set as 8 instead of 6. |
PAN-185591 | Fixed an issue where, in multi-vsys systems,
some policy rules were unable to be edited due to the Target field
being unclickable. |
PAN-185466 | Fixed an issue where WildFire submission
did not work as expected. |
PAN-185394 | (PA-7000 Series firewalls only)
Fixed an issue where not all changes to the template were reflected
on the firewall. |
PAN-185390 | Fixed an issue where the Block
IP list option was incorrectly displayed on firewalls
where it was not applicable. |
PAN-185283 | Fixed an issue on Panorama where using the name-of-threatid contains log4j filter
didn't produce expected results. |
PAN-185276 | Fixed an issue where a debug command displayed
different idmgr digest results. |
PAN-185249 | Fixed an issue where Template
Stack overrides (Dynamic UpdatesApps & ThreatsSchedule)
were not able to be reverted via the web interface. |
PAN-185234 | (VM-Series firewalls on Microsoft Azure
environments only) Fixed an issue where, when accelerated networking
was enabled, the packet buffer utilization was displayed as high
even when no traffic was traversing the firewall. |
PAN-185200 | Fixed an issue where the User-ID manager
assigned an ID to an object with a DELETE command. |
PAN-185135 | (VM-Series firewalls on Kernel-based
Virtual Machine (KVM) only) Fixed an issue where the physical
port counters (including SNMP) on the dataplane interfaces increased
when DPDK was enabled. |
PAN-184766 | (PA-5450 firewalls only) Fixed
an issue where the control packets for BGP, OSPF, and Bidirectional
Forwarding Detection (BFD) were not assigned a QoS value of 5. |
PAN-184744 | Fixed an issue where the firewall did not
decrypt SSL traffic due to a lack of internal resources allocated
for decryption. |
PAN-184537 | Fixed an issue where GlobalProtect requested
for passwords that contained non ASCII characters (ƶ) to be reentered
when refreshing the connection. |
PAN-184408 | Fixed an issue where commits pushed from
Panorama to the firewall failed due to the application status for
an application being incorrectly considered an invalid reference. |
PAN-184181 | Fixed an ESP encapsulation issue where,
when IPv6 address proxy IDs were configured, encapsulation was handled
incorrectly with a different proxy ID SPI in the same tunnel when
the source IP address of the proxy was overlapped by the destination
IP address. |
PAN-183981 | Fixed an issue on the firewall where, when
the GlobalProtect portal was not configured, the GlobalProtect landing
page was still loaded with the message GlobalProtect portal does not exist.
This issue occurred when using the exact GlobalProtect portal link:
https://x.x.x.x/global-protect/login.esp |
PAN-183632 | Fixed an issue where the firewall was unable
to match HIP objects with code versions over 4 digits long. |
PAN-183629 | Fixed an issue where Clientless-vpn max-users displayed
the limit as 20 instead of 200. |
PAN-183524 | Fixed an issue where GPRS tunneling protocol
(GTPv2-c and GTP-U) traffic was identified with insufficient-data in
the traffic logs. |
PAN-183375 | Fixed an issue where traffic arriving on
a tunnel with a bad IP header checksum was not dropped. |
PAN-183319 | Fixed an issue on Panorama where commits
remained at 99% due to multiple firewalls sending out CSR singing
requests every 10 minutes. |
PAN-183287 | Fixed an issue where firewall commits failed
due to the commit-recovery connection check ending prematurely. |
PAN-183154 | Fixed an issue where DNS exception failed
when DNS queries contained a capital letter. |
PAN-183126 | Fixed an issue on Panorama where you were
able to attempt to push a number of active schedules to the firewall
that was greater than the firewall's maximum capacity. |
PAN-182876 | Fixed an issue where GlobalProtect connections
failed via XML when special characters (<), (&), and (>)
were present in the GlobalProtect portal configuration passcode. |
PAN-182845 | Fixed an issue that caused devices to be
removed from Panorama when one device was added by one user, but
a Commit and Push operation was completed by a second user before
the first user completed a Commit of the added device change. |
PAN-182486 | Fixed an issue on the web interface where
the same IP address was displayed for sub interfaces in a multi-vsys
firewall. |
PAN-182449 | Fixed an issue where Apple iPad users were
unable to authenticate to the GlobalProtect portal using any browser,
which resulted in Clientless VPN access issues. |
PAN-182244 | Fixed an issue where Session Initiation
Protocol (SIP) REGISTER packets did not get transmitted when application-level
gateway (ALG) and SIP Proxy were enabled, which caused a SIP-registration
issue in environments where TCP retransmission occurred. |
PAN-182167 | Removed a duplicate save filter Icon in
the Audit Comment Archive for Security Rule Audit Comments tab. |
PAN-181968 | (PA-400 Series firewalls in active/passive
HA configurations only) Fixed an issue where, when HA failover
occurred, link up on all ports took longer than expected, which
caused traffic outages. |
PAN-181684 | Fixed an issue where cluster definition
for OpenShift was not able to be added if a custom certificate was
used for an API endpoint. |
PAN-181376 | Fixed an issue where the show session id CLI
command displayed a negative packet count. |
PAN-181366 | Fixed an issue where the firewall sent an
incorrect IP address on ICMP sessions in NetFlow packets when NAT
was applied to the target traffic. |
PAN-181334 | Fixed an issue where users with custom admin
roles and access domains were unable to view address objects or
edit Security rules. |
PAN-181324 | Fixed a memory issue related to the lpmgrd process
that caused the firewall to enter a non-functional state. |
PAN-181129 | Improved protection against unexpected packets
and error handling for traffic identified as SIP. |
PAN-181034 | Fixed an issue where, after changing the
Decryption mirroring setting to Forwarded only in
the decryption profile, Panorama did not save the setting. |
PAN-180948 | Fixed an issue where an external dynamic
list fetch failed with the error message Unable to fetch external dynamic list. Couldn't resolve host name. Using old copy for refresh. |
PAN-180690 | Fixed an issue where the firewall dropped
IPv6 Bi-Directional Forwarding (BFD) packets when IP Spoofing was
enabled in a Zone Protection Profile. |
PAN-180147 | Fixed an issue where the bcm.log and brdagent_stdout.log-<datestamp> files
filled up the root disk space. |
PAN-180030 | Fixed an issue where hyperlinks to threatvault
for threat logs with DNS Security categories resulted in the following
error message: No data is found based on your search, please search for something else. |
PAN-179952 | Fixed an issue on Panorama where not all
categories were displayed under Log settings. |
PAN-179826 | Fixed an issue where the firewall incorrectly
displayed the license error IoT Security license is required for feature to function even
when the IoT Security, Does not Require Data Lake license
was installed. |
PAN-179636 | Fixed an issue where Authentication Server
logs for various connections (including LDAP and Radius Server)
were not displayed in the syslog when connections were up. |
PAN-179624 | Fixed an issue where setting the password
complexity to Require Password Change on First Login caused
the user to be prompted with certificate authentication. |
PAN-179506 | (VM-Series firewalls on Microsoft Azure
environments only) Fixed an issue where Panorama was unable
to push software updates to the firewall. |
PAN-179467 | Fixed an issue where Selective
Audit (Device > Log settings)
options were visible to a group of admin users if the firewall was
not in FIPS-CC mode. |
PAN-179395 | Fixed an issue where the firewall still
populated the domain map even after clearing the domain map via
the CLI after removing the group-mapping setting configuration. |
PAN-179258 | Fixed an issue where system disk migration
failed. |
PAN-179212 | Fixed an issue where extraneous characters
displayed at the end of a CSV report. |
PAN-179152 | Fixed an issue where partial commit failures
did not display an error message. |
PAN-178961 | Fixed an issue where a process (authd)
stopped responding due to incorrect context handling. |
PAN-178959 | Fixed an issue where configuring BGP to
Aggregate with Suppress Filters using From Peers did
not work as expected. |
PAN-178951 | Fixed an issue on the firewall where Agentless
User-ID lost parent Security group information after the Security
group name of the nested groups on Active Directory was changed. |
PAN-178802 | Increased the default virtual memory limit
for the mgmtsrvr process from 3.2GB to 16GB. |
PAN-178800 | Fixed an issue where the reportd process stopped
responding when URL Filtering Inline ML phishing logs were queried. |
PAN-178728 | Fixed an issue where the dcsd process
stopped responding when attempting to read the config to update
its redis database. |
PAN-178594 | Fixed an issue where the descriptions of
options under the set syslogng ssl-conn-validation CLI
command were not accurate. |
PAN-178407 | Fixed an permissions issue where, when attempting
to troubleshoot the syslog over TCP via the CLI, the following error message
was displayed: Error: "/var/log/pan/syslog-ng.log: Permission denied. |
PAN-178363 | Fixed an issue where a process (mgmtsrvr) wasn't
restarted after the virtual memory limit was exceeded. |
PAN-178354 | Fixed an issue where the error message You do not have permission to reboot device was incorrectly
displayed to a TACAC user when attempting to install PAN-OS. |
PAN-178349 | Fixed an issue where log forwarding did
not work when the filter size was more than 1,024 characters in
the log forwarding profile. |
PAN-178248 | Fixed an issue where, when exporting the
Applications list on PDF or CSV profile formats, the report displayed
all tag values as undefined. |
PAN-178186 | Fixed a commit issue where, when replacing
an old firewall with a new firewall using the serial number, the
change to the serial number was not reflected in the Security policy
rule. |
PAN-177942 | Fixed an issue where, when grouping HA peers,
access domains that were configured using multi-vsys firewalls deselected
devices or virtual systems that were in other configured access
domains. |
PAN-177939 | Fixed an issue where a certificate without
a private key was able to be added to an SSL/TLS Service Profile,
which caused the l3svc process to stop responding. |
PAN-177908 | Fixed an issue where you were unable to
configure region for source or destination
IP addresses in a Security policy rule. |
PAN-177891 | Fixed an issue where group-mapping information
was not automatically refreshed at the refresh interval when LDAP
proxy was configured. |
PAN-177562 | Fixed an issue where PDF reports were not
translated to the configured local language. |
PAN-177201 | Fixed an issue where, when a Panorama appliance
on a PAN-OS 9.0 or later release pushed built-in external dynamic
lists to a firewall on a PAN-OS 8.1 release, the external dynamic
list was removed, but the rule was still pushed to the firewall.
With this fix, Panorama will show a validation error when attempting
to push a pre-defined external dynamic list to a firewall on a PAN-OS
8.1 release. |
PAN-177133 | (Firewalls in HA configurations only)
Fixed an issue where the HA1 heartbeat backup flapped with the following
error message: Unable to send icmp packet:(errno: 105) No buffer space available. |
PAN-176989 | Fixed an issue where the CLI command to
show SD-WAN tunnel members caused the firewall to stop responding. |
PAN-176471 | Fixed an issue where adding applications
without a description using XML API deleted the whole Panorama application
list. |
PAN-176461 | Fixed an issue where a process (mdb)
stopped responding after downgrading from a PAN-OS 9.1 release to
an earlier release due to discrepancies in the mongodb process version. Note:
To utilize this fix, first install a PAN-OS 9.0 release on the web
interface, and then, prior to reboot, run the following CLI command: debug mongo clear instance mdb. |
PAN-176379 | Fixed an issue where, when multiple routers
were configured under a Panorama template, you were only able to
select its own virtual router for next hop. |
PAN-175709 | Fixed an issue where the dnsproxy process stopped
responding when a DNS signature lookup request was received before
the process was fully initialized. |
PAN-175142 | Fixed an issue on Panorama where executing
a debug command caused the logrcvr process to stop
responding. |
PAN-175121 | Fixed a rare issue where, when two nodes
started IKE_SA negotiations at the same time, which resulted in
duplicate IKE SAs. |
PAN-175069 | Fixed an issue where commits failed when
the IPv6 link-local address was configured for BGP peering as local
and peer address. |
PAN-175061 | Fixed an issue where filtering threat logs
using any value under THREAT ID/NAME displayed
the error Invalid term. |
PAN-174988 | (PA-220 Series firewalls only)
Fixed an issue where the runtime-state parameter
was missing in the CLI command request high-availability sync-to-remote. |
PAN-174953 | Fixed an issue where the firewall didn't
update URL categories from the management plane to the dataplane
cache. |
PAN-174821 | (PA-3220 firewalls only) Fixed
an issue where auto-negotiation was not disabled with force mode
set to ON in the interface settings. |
PAN-174781 | Fixed an issue where the firewall did not
send an SMTP 541 error message to the email client after detecting
a malicious file attachment. |
PAN-174702 | Fixed an issue where Panorama pushed share-unused tagged
objects to the firewall, which caused the device address object
limit to be exceeded. |
PAN-174680 | Fixed an issue where, when adding new configurations,
Panorama didn't display a list of suggested template variables when
typing in a relevant field. |
PAN-174592 | Fixed an issue where the firewall did not
check reserved fields in GTPv1 and GTPv2 headers as expected from
the latest 3GPP Specifications. |
PAN-174525 | Fixed an issue where the sslvpn process restarted
repeatedly. |
PAN-174480 | Fixed an issue where scheduled email reports
were blocked by open-source content filters due to a violation of
rfc2046. |
PAN-174462 | Fixed an issue where the configd process stopped
responding when creating Application filters with tags and adding
the filter to a Security policy rule. |
PAN-174102 | Fixed an issue where, when MLAV feature
found malicious content, no action was applied even though it had
increased the execution counters, displayed the score and verdict
in the log, and showed no allow list hits, |
PAN-174064 | Fixed an issue where downloading a GlobalProtect
data file did not work and displayed a no global protect license error
even when a valid license was present. |
PAN-174027 | Fixed an issue on Panorama where attempting
to rename mapping for address options caused a push to fail with
the following error message: Error: Duplicate address name.. |
PAN-173813 | A debug command was added to disable automatic
implicit tail matching, which was the default. |
PAN-173810 | Fixed an issue where the debug user-id dump ts-agent user-ids CLI
command caused the useridd process to stop responding. |
PAN-173437 | Fixed an issue where the firewall did not
detect that the management port was down the first time after booting
up the system. |
PAN-173207 | Fixed an issue where radius authentication
timed out when logging in due to the firewall sending authentication
requests using a static IP address instead of a DCHP assigned IP
address. |
PAN-173080 | Fixed an issue where the User-ID connection
limit was reached even when only a few User-ID agents were connected
to the service. |
PAN-173031 | Fixed an issue where users were promted
twice for DUO SAML Authentication when authentication override cookies
were enabled. |
PAN-172823 | Fixed an issue where MD5 checksums were
updated before the new customer EDLs were pushed to the dataplane. |
PAN-172780 | Fixed an issue where user domain override
was not reset when deleted from group mapping. |
PAN-172753 | (PA-7000 Series firewalls only)
Fixed an issue where link-local internal packet handling between
the management plane and the dataplane caused an Network Processing
Card (NPC) slot to go down. |
PAN-172452 | Fixed an issue where the log file did not
include all logs. |
PAN-172357 | (VM-Series firewalls in Oracle Cloud
Infrastructure Government Cloud only) Fixed an issue with firewalls
in HA configurations where HA failover did not occur when firewalls
were in FIPS mode. |
PAN-172324 | Fixed an issue on the Panorama web interface
where custom vulnerability signature IDs weren't populated in the
drop-down when creating a custom combination signature. |
PAN-172308 | Fixed an issue where generating packet captures
did not work when the data filtering profile was configured to block
HTML files via a POST request. |
PAN-172100 | Fixed an issue with URL filtering where,
after upgrading to a PAN-OS 9.1 release, the Continue button
on a URL did not work and caused the website to be inaccessible,
even though the predefined category of URL was configured to continue traffic.
This occurred when URL traffic hit a rule where the custom category
was set to None. |
PAN-171927 | Fixed an issue where incorrect results were
displayed when filtering logs in the Monitor tab. |
PAN-171569 | Fixed an issue where HIP matches were not
recognized in an SSL decryption policy rule. |
PAN-171337 | Fixed an issue where connection per second
(CPS) rates collected via SNMP were not correct. |
PAN-171300 | Fixed an issue on Panorama where a password
change in a template did not reset an expired password flag on the
firewall, which caused the user to change their password when logging
in to a firewall. |
PAN-171066 | Fixed an issue with GlobalProtect where
cookie based authentication for Internal Gateway failed with the
following error messages: Invalid authentication cookie and Invalid User Name. |
PAN-170989 | Fixed an issue with memory usage consumption
related to the useridd process. |
PAN-170936 | Fixed an issue where the firewall egressed
offloaded frames out of order after an explicit commit (Commit on
the firewall or Commit All Changes on Panorama) or
an implicit comment such as an Antivirus update, Dynamic Update,
or WildFire update. Note This issue
persists for a network-related configuration and commit. |
PAN-170798 | Fixed an issue where OSPF flaps occurred
when a Layer 3 interface IPv4 was changed from DHCP Client to Static. |
PAN-170531 | Fixed an issue where the web interface icons
for service objects and service group objects were identical when
used in a NAT policy rule. |
PAN-169899 | Fixed an issue on firewalls with offload
processors where the ECMP forced symmetric return feature didn't
work for CRE traffic after the session was offloaded. |
PAN-169674 | (Firewalls with Cavium Octeon processors
only) Fixed an issue where the all_pktproc process
stopped responding when reassembling TCP packets. |
PAN-169521 | Fixed an issue where QoS tagging unexpectedly
behaved differently at different stages of packet processing. |
PAN-169456 | Fixed an issue where, after renaming an
authentication profile, system logs still showed the old profile
name. |
PAN-169308 | Fixed a commit issue when comparing numbers
of rules where the bucket size of the application dependency hash
table was too small. |
PAN-169122 | Fixed an issue where medium priority correlation
events were not generated when the irc-base repeat count
value was greater than 10. |
PAN-168514 | Fixed an issue where authentication failed
when the destination service route was used to reach the authentication
server. |
PAN-168480 | Fixed an issue where the firewall did not
switch to STP for multicast groups when IGMP receivers were stopped
and restarted for the same set of groups within a short time period. |
PAN-167918 | Fixed an issue where the GlobalProtect pre-log
on VPN failed to establish or match pre-log on policies due to the
domain name being prepended to pre-log on user. |
PAN-167850 | Fixed an issue with firewalls in active/active
HA configurations where IPSec packets were not forwarded to the
HA peer owner of the tunnel, which caused packets to be dropped. |
PAN-167805 | Fixed an intermittent issue where traffic
ingressing through a VPN tunnel failed to match predict session,
which resulted in child sessions failing. |
PAN-167087 | Fixed an issue where the focus was not set
on the free text field when requesting a token code on the Authentication
Portal. |
PAN-166686 | Fixed an issue where EDNS responses dropped
when the original request was DNS. |
PAN-165951 | (PA-3020 firewalls only) Fixed
an issue on the firewall where disk space was not cleared when multiple
image files were present. |
PAN-163713 | Fixed an issue where the alternate name
was not getting copied to user-Fixed an issue where user-attributes for
users in custom groups were incorrect, which caused username formats
to not match the user. |
PAN-163043 | Fixed an issue where, when exporting logs
via the CLI, only 65,535 rows were exported even when 1,000,000
rows were configured. |
PAN-162088 | (Panorama appliances in HA configurations
only$$) Fixed an issue where content updates (PanoramaDynamic Updates)
manually uploaded to the active HA peer were not synchronized to
the passive HA peer when you installed a content updated and enabled Sync
to HA peer. |
PAN-160419 | Fixed an issue where the following error
message displayed in the system log after restarting the firewall: dns-signature initialization from file storage failed, start with empty cache. |
PAN-157710 | Fixed an issue where admin users with custom
roles were unable to create VLANs. |
PAN-157199 | (PA-220 firewalls only) Fixed an
issue where the GlobalProtect portal was not reachable with IPv6
addresses. |
PAN-156700 | Fixed an issue where DNS Security logs did
not display threat names or IDs when the domain name contained an
uppercase letter. |
PAN-155902 | Fixed an issue where the auto MTU value
was incorrect, which caused unexpected latency issues for GlobalProtect
users. |
PAN-155467 | (VM-Series firewalls only) Fixed
an issue where IPSec decap dropped packets when NAT was configured
locally on the firewall. |
PAN-154892 | Fixed an issue on the firewall where Real
Time Streaming Protocol (RTSP) flows that were subjected to Dynamic
IP and Port (DIPP) NAT were not supported by the Application Layer
Gateway (ALG). |
PAN-153308 | Fixed an issue which caused the mouse cursor
to remove focus from the search bar when hovering over a hyperlink
inside of a cell menu (e.g., source zone, source address, destination
zone, destination address, etc.). |
PAN-151273 | Fixed an issue where the commit event was
not recorded in the config logs during a Commit and Push on
the Panorama management server. |
PAN-123446 | Fixed an issue where an administrator with
a Superuser role could not reset administrator credentials. |
PAN-78762 | Fixed an issue where you were unable to
reset a VPN tunnel via the firewall web interface (Network
> IPSec Tunnels > Tunnel Info > Restart). |