PAN OS Release Notes
PAN OS Release Notes
PAN OS Release Notes
1 Release Notes
Release 7.1.14
Revision Date: December 22, 2017
Review important information about Palo Alto Networks PAN‐OS 7.1 software, including new features
introduced, workarounds for open issues, and issues that are addressed in PAN‐OS 7.1 releases. For
installation, upgrade, and downgrade instructions, refer to the PAN‐OS 7.1 New Features Guide. For the
latest version of these release notes, refer to the Palo Alto Networks technical documentation portal.
PAN‐OS 7.1 Release Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Features Introduced in PAN‐OS 7.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
App‐ID Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Virtualization Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
WildFire Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Content Inspection Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
GlobalProtect Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
User‐ID Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Networking Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Decryption Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
VPN Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Panorama Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Hardware Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Changes to Default Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
App‐ID Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Authentication Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Decryption Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
GlobalProtect Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Networking Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
URL Filtering Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
User‐ID Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Virtualization Changes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
WildFire Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
CLI Changes in PAN‐OS 7.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
App‐ID CLI Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
GlobalProtect CLI Changes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Management CLI Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Monitoring CLI Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Networking CLI Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Threat Prevention CLI Changes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
URL Filtering CLI Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
User‐ID CLI Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
© Palo Alto Networks, Inc. PAN‐OS 7.1 Release Notes • 1
Table of Contents
XML API Changes in PAN‐OS 7.1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Associated Software Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Known Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
PAN‐OS 7.1.14 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .53
PAN‐OS 7.1.13 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
PAN‐OS 7.1.12 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
PAN‐OS 7.1.11 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .67
PAN‐OS 7.1.10 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
PAN‐OS 7.1.9‐h4 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79
PAN‐OS 7.1.9 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
PAN‐OS 7.1.8 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .87
PAN‐OS 7.1.7 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93
PAN‐OS 7.1.6 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
PAN‐OS 7.1.4‐h2 Addressed Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Getting Help. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Related Documentation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139
Requesting Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140
2 • PAN‐OS 7.1 Release Notes © Palo Alto Networks, Inc.
PAN‐OS 7.1 Release Information
Features Introduced in PAN‐OS 7.1
Changes to Default Behavior
CLI Changes in PAN‐OS 7.1
XML API Changes in PAN‐OS 7.1
Associated Software Versions
Limitations
Known Issues
PAN‐OS 7.1.14 Addressed Issues
PAN‐OS 7.1.13 Addressed Issues
PAN‐OS 7.1.12 Addressed Issues
PAN‐OS 7.1.11 Addressed Issues
PAN‐OS 7.1.10 Addressed Issues
PAN‐OS 7.1.9‐h4 Addressed Issues
PAN‐OS 7.1.9 Addressed Issues
PAN‐OS 7.1.8 Addressed Issues
PAN‐OS 7.1.7 Addressed Issues
PAN‐OS 7.1.6 Addressed Issues
PAN‐OS 7.1.5 Addressed Issues
PAN‐OS 7.1.4‐h2 Addressed Issues
PAN‐OS 7.1.4 Addressed Issues
PAN‐OS 7.1.3 Addressed Issues
PAN‐OS 7.1.2 Addressed Issues
PAN‐OS 7.1.1 Addressed Issues
PAN‐OS 7.1.0 Addressed Issues
Getting Help
© Palo Alto Networks, Inc. PAN‐OS 7.1 Release Notes • 3
Features Introduced in PAN‐OS 7.1 PAN‐OS 7.1 Release Information
Features Introduced in PAN‐OS 7.1
The following topics describe the new features introduced in PAN‐OS® 7.1 releases, which require content
release version 564 or a later version. For upgrade and downgrade considerations and for specific
information about the upgrade path for a firewall, refer to the Upgrade section of the PAN‐OS 7.1 New
Features Guide. The new features guide also provides additional information about how to use the new
features in this release.
Management Features
App‐ID Features
Virtualization Features
WildFire Features
Content Inspection Features
GlobalProtect Features
User‐ID Features
Networking Features
Decryption Features
VPN Features
Panorama Features
Hardware Features
4 • PAN‐OS 7.1 Release Notes © Palo Alto Networks, Inc.
PAN‐OS 7.1 Release Information Features Introduced in PAN‐OS 7.1
Management Features
New Management Description
Feature
Synchronization of When an event triggers SNMP trap generation (for example, an interface goes down), the
SNMP Trap and MIB firewall, Panorama virtual appliance, M‐Series appliance, and WF‐500 appliance now
Information update the corresponding SNMP object in response (for example, the interfaces MIB)
instead of waiting for the 10‐second timer to expire and allowing SNMP queries to receive
out‐of‐sync replies. This ensures that your network management system displays the
latest information when polling an object to confirm the event.
© Palo Alto Networks, Inc. PAN‐OS 7.1 Release Notes • 5
Features Introduced in PAN‐OS 7.1 PAN‐OS 7.1 Release Information
New Management Description
Feature
App‐ID Features
New App‐ID™ Feature Description
6 • PAN‐OS 7.1 Release Notes © Palo Alto Networks, Inc.
PAN‐OS 7.1 Release Information Features Introduced in PAN‐OS 7.1
Virtualization Features
New Virtualization Description
Feature
© Palo Alto Networks, Inc. PAN‐OS 7.1 Release Notes • 7
Features Introduced in PAN‐OS 7.1 PAN‐OS 7.1 Release Information
New Virtualization Description
Feature
WildFire Features
New WildFire Features Description
8 • PAN‐OS 7.1 Release Notes © Palo Alto Networks, Inc.
PAN‐OS 7.1 Release Information Features Introduced in PAN‐OS 7.1
Content Inspection Features
New Content Inspection Description
Features
© Palo Alto Networks, Inc. PAN‐OS 7.1 Release Notes • 9
Features Introduced in PAN‐OS 7.1 PAN‐OS 7.1 Release Information
GlobalProtect Features
New GlobalProtect Description
Feature
New GlobalProtect Description
Feature
Enhanced GlobalProtect for iOS and Android devices now supports two‐factor authentication
Authentication challenge as a one‐time password (OTP). When prompted, the user can now cancel the
Challenge Support for login to view the token password sent via SMS or using any other token retrieval app on
Android and iOS Devices the mobile device. The user must then return to the GlobalProtect app and log in with the
valid token password within 30 seconds. If the user does not successfully enter the
password within 30 seconds, the authentication challenge disappears and the user must
restart the GlobalProtect app to enter the password.
New GlobalProtect Description
Feature
GlobalProtect You can now suppress the bubble notification that GlobalProtect displays from the
Notification Suppression notification area (system tray). Each notification contains information about changes in the
agent status. Suppressing the bubble notification allows the GlobalProtect agent to run
more transparently and enables you to further customize the behavior of the
GlobalProtect agent that runs on Windows clients.
User‐ID Features
New User‐ID Feature Description
New User‐ID Feature Description
Networking Features
New Networking Feature Description
New Networking Feature Description
Decryption Features
New Decryption Features Description
VPN Features
New VPN Feature Description
Panorama Features
New Panorama Feature Description
Hardware Features
New Hardware Feature Description
Changes to Default Behavior
PAN‐OS 7.1 has the following changes in default behavior.
You can also see CLI Changes in PAN‐OS 7.1 and XML API Changes in PAN‐OS 7.1.
App‐ID Changes
Authentication Changes
Decryption Changes
GlobalProtect Changes
Networking Changes
URL Filtering Changes
User‐ID Changes
Virtualization Changes
WildFire Changes
App‐ID Changes
PAN‐OS 7.1 has the following change in default behavior for App‐ID features:
Feature Change
Authentication Changes
PAN‐OS 7.1 has the following change in default behavior for authentication features:
Feature Change
Decryption Changes
PAN‐OS 7.1 has the following changes in default behavior for Decryption features:
Feature Change
GlobalProtect Changes
PAN‐OS 7.1 has the following changes in default behavior for GlobalProtect features:
Feature Change
Networking Changes
PAN‐OS 7.1 has the following changes in default behavior for networking features:
Feature Change
Feature Change
BGP The BGP peer connection settings include Multi Hop, which is the TTL value in the IP
header. The default value of 0 means 2 for eBGP prior to PAN‐OS 7.1.9, and it means
1 beginning with PAN‐OS 7.1.9.
URL Filtering Changes
PAN‐OS 7.1 has the following changes in default behavior for URL Filtering features:
Feature Change
User‐ID Changes
PAN‐OS 7.1 has the following change in default behavior for User‐ID features:
Feature Change
Virtualization Changes
PAN‐OS 7.1 has the following changes in default behavior for virtualization features:
Feature Change
WildFire Changes
PAN‐OS 7.1 has the following change in default behavior for WildFire features:
Feature Change
CLI Changes in PAN‐OS 7.1
PAN‐OS 7.1 has the following CLI changes, which also affect corresponding PAN‐OS XML API requests. You
can use the CLI in debug mode to view the corresponding XML API syntax for CLI commands. For changes
that are specific to the XML API, see XML API Changes in PAN‐OS 7.1.
App‐ID CLI Changes
GlobalProtect CLI Changes
Management CLI Changes
Monitoring CLI Changes
Networking CLI Changes
Threat Prevention CLI Changes
URL Filtering CLI Changes
User‐ID CLI Changes
App‐ID CLI Changes
PAN‐OS 7.1 has the following CLI changes for App‐ID features:
Feature Change
GlobalProtect CLI Changes
PAN‐OS 7.1 has the following CLI changes for GlobalProtect features:
Feature Change
Management CLI Changes
PAN‐OS 7.1 has the following CLI changes for management features:
Feature Change
Feature Change
Monitoring CLI Changes
PAN‐OS 7.1 has the following CLI change for monitoring features:
Feature Change
Networking CLI Changes
PAN‐OS 7.1 has the following CLI changes for networking features:
Feature Change
VLANs (PAN‐OS 7.1.5 and later releases) A new command allows you to configure how the
firewall handles the Priority Code Point (PCP) value in the VLAN tag field when
forwarding the frame between different VLANs. By default, the firewall automatically
unsets the PCP value when forwarding between VLANs for greater security. To
address a requirement in a particular customer environment, you can configure the
firewall to pass through the PCP value so that it is preserved on frame forwarding.
Use the following command to configure this behavior, where the default value is no
to disable PCP pass‐through:
set session pass-through-1q-pcp <yes|no>
To view the PCP configuration, use the existing command to display VLANs:
show vlan all
The command output has the following updates associated with the PCP
pass‐through configuration:
pvst+ tag rewrite: enabled
pvst+ native vlan id: 1
drop stp: disabled
802.1Q PCP pass through: disabled
Feature Change
Interfaces • With the introduction of configurable maximum segment size (MSS) adjustment
sizes, the request format to enable MSS adjustment has changed:
• PAN‐OS 7.0 and earlier releases:
set network interface ethernet <name> layer3 adjust-tcp-mss
<yes|no>
set network interface ethernet <name> layer3 units <name>
adjust-tcp-mss <yes|no>
set network interface vlan adjust-tcp-mss <yes|no>
set network interface vlan units <name> adjust-tcp-mss
<yes|no>
set network interface loopback adjust-tcp-mss <yes|no>
set network interface loopback units <name> adjust-tcp-mss
<yes|no>
• PAN‐OS 7.1 and later releases:
set network interface ethernet <name> layer3 adjust-tcp-mss
enable <yes|no>
set network interface ethernet <name> layer3 units <name>
adjust-tcp-mss enable <yes|no>
set network interface vlan adjust-tcp-mss enable <yes|no>
set network interface vlan units <name> adjust-tcp-mss enable
<yes|no>
set network interface loopback adjust-tcp-mss enable <yes|no>
set network interface loopback units <name> adjust-tcp-mss
enable <yes|no>
• The netstat command has moved from the root level to within the request
command hierarchy:
• PAN‐OS 7.0 and earlier releases:
netstat programs yes interface yes
• PAN‐OS 7.1 and later releases:
request netstat programs yes interface yes
Additionally, use of the request netstat programs command option now
requires superuser or superreader permissions.
Threat Prevention CLI Changes
PAN‐OS 7.1 has the following CLI changes for threat prevention features:
Feature Change
URL Filtering CLI Changes
PAN‐OS 7.1 has the following CLI change for URL Filtering features:
Feature Change
User‐ID CLI Changes
PAN‐OS 7.1 has the following CLI changes for User‐ID features:
Feature Change
Username-to-group The following User‐ID configuration commands, used to retrieve the list of groups
mapping and the corresponding list of members from an LDAP server, now require you to
specify the virtual system to which the LDAP server profile belongs:
• PAN‐OS 7.0 and earlier releases:
show user group-mapping naming-context server <ip/netmask>|<value>
server-port <1-65535> use-ssl <yes|no> is-active-directory <yes|no>
proxy-agent <ip/netmask>|<value> proxy-agent-port <1-65535>
show user group-selection use-ssl <yes|no> base <value> bind-dn
<value> bind-password <value> name-attribute <value> group-object
<value> container-object <value> filter <value> search-scope
<one|subtree> proxy-agent <ip/netmask>|<value> proxy-agent-port
<1-65535> force <yes|no> server [ <server1> <server2>... ]
show user group-selection use-ssl <yes|no> base <value> bind-dn
<value> bind-password <value> name-attribute <value> group-object
<value> container-object <value> filter <value> search-scope
<one|subtree> proxy-agent <ip/netmask>|<value> proxy-agent-port
<1-65535> force <yes|no> server-port [ <server-port1>
<server-port2>... ]
• PAN‐OS 7.1 and later releases:
show user group-mapping naming-context server <ip/netmask>|<value>
sp_vsys_id <value> server-port <1-65535> use-ssl <yes|no>
is-active-directory <yes|no> proxy-agent <ip/netmask>|<value>
proxy-agent-port <1-65535>
show user group-selection sp_vsys_id <value> use-ssl <yes|no> base
<value> bind-dn <value> bind-password <value> name-attribute <value>
group-object <value> container-object <value> filter <value>
search-scope <one|subtree> proxy-agent <ip/netmask>|<value>
proxy-agent-port <1-65535> force <yes|no> server [ <server1>
<server2>... ]
show user group-selection sp_vsys_id <value> use-ssl <yes|no> base
<value> bind-dn <value> bind-password <value> name-attribute <value>
group-object <value> container-object <value> filter <value>
search-scope <one|subtree> proxy-agent <ip/netmask>|<value>
proxy-agent-port <1-65535> force <yes|no> server-port [
<server-port1> <server-port2>... ]
XML API Changes in PAN‐OS 7.1
The PAN‐OS 7.1 XML API has the following changes:
Feature Change
User-ID (PAN‐OS 7.1.5 and later releases) The firewall has the following changes in how it
times out IP address and user mapping information registered using the XML API.
Unless you explicitly specify a timeout value in the API request, the firewall inherits
the User‐ID timeout value configured on the firewall (the Enable User ID Timeout
value in Device > User Identification > User Mapping > Cache).
In releases earlier than PAN‐OS 7.1.5, when you did not specify a timeout value, the
firewall treated the value as 0, which meant that the IP address and user mapping
never expired. If you want to preserve the same behavior and ensure that the
mapping never expires, you must explicitly set the timeout value to 0 as shown in the
following API request:
<uid-message><version>1.0</version><type>update</type><payl
oad><login>
<entry name="domain\name2" ip="1.1.1.2" timeout="0"/>
</login></payload></uid-message>
Error codes Certain PAN‐OS XML API configuration requests now return a different API error
code to accurately indicate that the object specified by the XPath does not exist.
Affected requests include type=config with action=delete and type=config with
action=get.
• PAN‐OS 7.1 and later releases:
<response code="7" status="success"><msg>Object doesn't
exist</msg></response>
• PAN‐OS 7.0 and earlier releases (action=delete):
<response code="20" status="success"><msg>Object doesn't
exist</msg></response>
• PAN‐OS 7.0 and earlier releases (action=get):
<response code="19" status="success"><msg>Object doesn't
exist</msg></response>
Associated Software Versions
The following minimum software versions are supported with PAN‐OS 7.1. To see a list of the Palo Alto
Networks firewalls and appliances that support PAN‐OS 7.1, see the Palo Alto Networks® Compatibility
Matrix.
Palo Alto Networks Software Minimum Supported Version with PAN‐OS 7.1
Panorama 7.1.0
Limitations
The following table includes limitations associated with the PAN‐OS 7.1 release.
Issue ID Description
PAN-76757 If the firewall collects IP address‐to‐username mappings by monitoring numerous servers
at short intervals (Device > User Identification > User Mapping > Palo Alto Networks
User-ID Agent Setup > Server Monitor > Server Log Monitor Frequency) in networks
with high user log‐in rates, the best practice is to deploy Windows‐based User‐ID agents
instead of the PAN‐OS integrated User‐ID agent. Using Windows‐based User‐ID agents
avoids the risk of the firewall running out of memory while querying the servers.
Known Issues
The following list describes WildFire Known Issues, GlobalProtect Known Issues, and Firewall and Panorama
Known Issues in the PAN‐OS 7.1 release:
For recent updates to known issues for a given PAN‐OS release, refer to
https://live.paloaltonetworks.com/t5/Articles/Critical‐Issues‐Addressed‐in‐PAN‐OS‐Releases/ta‐p/52882.
Starting with PAN‐OS 7.1.5, these release notes identify all unresolved known issues using new issue ID
numbers that include a product‐specific prefix. Known issues for earlier releases use both their new issue IDs
and their original issue IDs (in parentheses).
Issue ID Description
Issue ID Description
PAN-86226 On PA‐5000 Series firewalls running PAN‐OS 7.1.12 or a later 7.0 release, insufficient
proxy memory causes decryption failures and prevents users from accessing the
GlobalProtect portal or gateway.
PAN-85938 PAN‐OS removes the IP address‐to‐username mappings of end users who log in to a
This issue is now resolved. GlobalProtect internal gateway within a second of logging out from it.
See PAN-OS 7.1.14
Addressed Issues.
PAN-85299 On firewalls in an active/passive high availability (HA) configuration with link or path
monitoring enabled, a failover resulting from a link or path failure intermittently causes
PAN‐OS to delete host, connected, static, and dynamic routes (both OSPF and BGP) from
the forwarding information base (FIB) on the firewall peer that becomes active. The link or
path failure also intermittently causes PAN‐OS to send unnecessary BGP withdrawal
messages to BGP peers.
PAN-84445 On occasion, the App‐ID for an application that is using SSL is identified incorrectly. This
issue occurs when a server hosts multiple applications on the same port, and the firewall
has identified traffic for an application using this port on the server and then inaccurately
records other applications on this server‐port combination as the previously identified
application.
PAN-82957 (PAN‐OS 7.1.11 and later PAN‐OS 7.1 releases) Firewalls do not send queries for updated
user mappings to User‐ID agents; instead, the firewalls wait until the agents learn and
forward new user mappings. In a deployment that includes Windows‐based User‐ID agent
7.0.7 or earlier agent releases, this delay in updating user mappings on the firewalls
disrupts user‐based policy enforcement because the firewalls prematurely remove user
mappings received from those agents (see WINAGENT‐53 in the User‐ID Agent 7.0.8
Addressed Issues list).
Workaround: Upgrade the Windows‐based User‐ID agents to User‐ID agent 7.0.8 or a
later release. Alternatively, run the debug user-id query-unknown-ip yes CLI
command on firewalls so that they will query the agents running an earlier User‐ID agent
release; however, if you use the alternate workaround, you must re‐run the debug
user-id command every time the firewall reboots.
PAN-82637 The Panorama management server stops responding after you use a PAN‐OS XML API call
to rename a policy rule or object and you accidentally use its old name as the new name.
Issue ID Description
PAN-82273 Blocking proxy sessions to enforce Decryption policy rules causes packet buffer depletion,
This issue is now resolved. which eventually results in packet loss.
See PAN-OS 7.1.14
Addressed Issues.
PAN-82117 PA‐5000 Series firewalls in an active/active high availability (HA) configuration
This issue is now resolved. intermittently drop packets due to a race condition that occurs when the session owner
See PAN-OS 7.1.14 and session setup are on different HA peers.
Addressed Issues.
PAN-82109 On VM‐Series firewalls, the session capacity drops to 1,248 after you activate a capacity
license.
PAN-82076 Traffic delays occur on PA‐7000 Series firewalls due to packet buffer congestion when the
This issue is now resolved. all_pktproc process stops responding due to an incorrect Policy Based Forwarding (PBF)
See PAN-OS 7.1.13 policy rule ID that references an invalid egress interface.
Addressed Issues.
PAN-81682 The firewall dataplane restarts while processing traffic after you enable SSL Inbound
Inspection but not SSL Forward Proxy decryption.
PAN-81585 On the Panorama management server, a commit error occurs after you rename an object
in a device group because policies in the child device groups still reference the object by
its old name.
PAN-81457 The firewall stops submitting samples to WildFire for analysis until you run the debug
wildfire reset dp-receiver CLI command.
PAN-81061 PA‐3000 Series firewalls intermittently drop long‐lived sessions that are active during a
This issue is now resolved. content update if you immediately follow the update with an Antivirus or WildFire update.
See PAN-OS 7.1.9-h4
Addressed Issues.
PAN-80564 The firewall mgmtsrvr process and other processes repeatedly restart due to abnormal
system memory usage when a connection failure occurs between the firewall and a syslog
server that use TCP over SSL/TLS to communicate.
Workaround: In PAN‐OS 7.1.11 and later 7.1 releases, you can stop the continuous
restarts by running the debug syslog-ng restart CLI command to restart the syslog‐ng
process. Alternatively, for all PAN‐OS 7.1 releases, you can use UDP for communication
between the firewall and syslog server.
PAN-79945 The Panorama management server cannot deploy antivirus or WildFire updates to
firewalls that already have later versions of the updates.
PAN-79423 Panorama cannot push address group objects from device groups to managed firewalls if
zones specify the objects in the User Identification ACL include or exclude lists (Network
> Zones) and if the Share Unused Address and Service Objects with Devices option is
disabled (Panorama > Setup > Management > Panorama Settings).
PAN-78718 A PA‐7000 Series firewall running PAN‐OS 7.1.12 or an earlier release stops saving and
This issue is now resolved. displaying new logs due to a memory leak after a Panorama management server running a
See PAN-OS 7.1.13 PAN‐OS 8.0 release pushes a predefined report that specifies a field that is unrecognized
Addressed Issues. by the firewall running the earlier PAN‐OS release (Monitor > Reports > Mobile Network
Reports).
Workaround: Disable GTP reports in Panorama 8.0.
Issue ID Description
PAN-77702 Dynamic address updates take several minutes to complete on Panorama in NSX
This issue is now resolved. deployments.
See PAN-OS 7.1.11
Addressed Issues.
PAN-77595 PA‐7000 Series firewalls forward a SIP INVITE based on route lookup instead of
This issue is now resolved. Policy‐Based Forwarding (PBF) policy.
See PAN-OS 7.1.10
Addressed Issues.
PAN-77326 In a high availability (HA) hardware security module (HSM) configuration, the crypto
process (cryptod) for the SafeNet resource library in SafeNet Client 6.2.2 stops responding
when the route to the HSM changes. This process also stops responding intermittently
when the cryptod process tries to close the HSM sessions.
PAN-77116 After bootup, the firewall displays error messages such as Error:
sysd_construct_sync_importer(sysd_sync.c:328): sysd_sync_register()
failed: (111) Unknown error code, even though the bootup is successful.
Workaround: Ignore the error messages; they do not affect the firewall operations.
PAN-77062 Administrators with a custom role cannot delete packet captures.
This issue is now resolved.
See PAN-OS 7.1.12
Addressed Issues.
PAN-76702 Several dataplane processes stop responding when the firewall processes VPN traffic with
This issue is now resolved. IP packet chains, which were usually triggered by IP fragmentation or SSL decryption
See PAN-OS 7.1.11 operations.
Addressed Issues.
PAN-76509 On firewalls with multiple virtual systems, custom spyware signatures work only on vsys1.
This issue is now resolved.
See PAN-OS 7.1.12
Addressed Issues.
PAN-76454 On PA‐7000 Series firewalls, Generic Routing Encapsulation (GRE) session creation fails
This issue is now resolved. when the firewalls receive GRE packets with a Point‐to‐Point Protocol (PPP) payload.
See PAN-OS 7.1.13
Addressed Issues.
PAN-76162 A Panorama management server running a PAN‐OS 8.0 release or PAN‐OS 7.1.8 or later
7.1 release does not display logs from PA‐7000 Series firewalls running a PAN‐OS 7.1 or
7.0 release.
Workaround: Run the debug skip-condor-reports no command and then the debug
software restart process reportd command on the Panorama management server
so that it can successfully query PA‐7000 Series firewalls running a PAN‐OS 7.1 release.
Do not use the debug skip-condor-reports no command to work around this
issue if you use Panorama running a PAN‐OS 8.0 release to manage a PA‐7000
Series firewall running a PAN‐OS 7.0 release (see PAN‐77033 in the PAN‐OS 7.0
or PAN‐OS 8.0 Release Notes).
Issue ID Description
PAN-76058 When migrating URL categories from BrightCloud to PAN‐DB, Panorama does not apply
This issue is now resolved the migration to pre‐rules and post‐rules.
(requires content release
version 718 or later). See
PAN-OS 7.1.11 Addressed
Issues.
PAN-75881 A regression introduced in PAN‐OS 7.1.9 causes the firewall dataplane to restart in certain
This issue is now resolved. cases when combined with content updates. For details, including the relevance of
See PAN-OS 7.1.9-h4 content release version 709, refer to the associated Customer Advisory.
Addressed Issues.
PAN-75358 Firewalls configured to use a SafeNet hardware security module (HSM) server successfully
create a support file when you export support file from the web interface but they
incorrectly return the following error message: op command for client cryptod time
out as client is not available. This issue also occurs when requesting the support
file using the request hsm support-info CLI command but you can confirm that the
support info file was created successfully by using a different HSM‐related command,
such as show hsm state, after you request the HSM support file.
PAN-75044 As of PAN‐OS 7.1.9, the PA‐200 firewalls no longer store the previous WildFire content
package after a WildFire content update. As a result, the option to revert to the previous
WildFire package is no longer available on the web interface. However, the CLI command
for this task (request wildfire downgrade install previous) was not removed and
now results in an error message (downgrade job failed).
PAN-75005 Loading a configuration other than running‐config.xml when downgrading from
This issue is now resolved. PAN‐OS 7.1.8 to a PAN‐OS 7.0 release removes authentication profiles from
See PAN-OS 7.1.9 GlobalProtect portals and gateways, which causes an auto‐commit failure.
Addressed Issues. Workaround: Select running‐config.xml when downgrading from PAN‐OS 7.1.8 to a
PAN‐OS 7.0 release.
PAN-74886 Panorama does not push a shared address object to firewalls when the object is part of a
This issue is now resolved. dynamic address group that uses a tag.
See PAN-OS 7.1.11
Addressed Issues.
PAN-74652 After a firewall successfully installs a content update received from Panorama, Panorama
This issue is now resolved. displays a failure message for the update if the associated job ID on the firewall is higher
See PAN-OS 7.1.11 than 65536.
Addressed Issues.
PAN-74632 The firewall does not clear IP address‐to‐username mappings or username‐to‐group
This issue is now resolved. mappings after reaching the limit for the number of user groups (100,000), which causes
See PAN-OS 7.1.11 commit failures with the errors user-id is not registerd and ser-ID manager was
reset. Commit is required to reinitialize User-ID.
Addressed Issues.
PAN-74293 The firewall drops sessions after only 30 seconds of idle traffic instead of after the session
This issue is now resolved. timeout associated with the application.
See PAN-OS 7.1.11
Addressed Issues.
Issue ID Description
PAN-74139 On the PA‐500 firewall, insufficient memory allocation causes SSL decryption errors that
This issue is now resolved. result in SSL session failures, and Traffic logs display the Session End Reason as
decrypt-error or decrypt-cert-validation.
See PAN-OS 7.1.11
Addressed Issues.
PAN-72342 End users who ignore the Duo V2 authentication prompt until it times out can still
This issue is now resolved. authenticate successfully to a GlobalProtect portal configured for two‐factor
See PAN-OS 7.1.11 authentication.
Addressed Issues.
PAN-71485 A firewall in FIPS‐CC mode reboots in maintenance mode after you download
This issue is now resolved. GlobalProtect Client software that is listed under Device > GlobalProtect Client but is
See PAN-OS 7.1.14 unavailable on the Palo Alto Networks Update Server.
Addressed Issues.
PAN-71217 The Panorama log collector does not support the server‐verification CLI configuration,
thereby preventing you from using the CLI to install content and software updates in a
secure manner.
Workaround: Use the log collector CLI command request license api-key delete and then
install content and software updates from Panorama.
PAN-71215 In PAN‐OS 7.1.7, when deactivating a VM‐Series firewall from Panorama, if Panorama has
This issue is now resolved. the Verify Update Server Identity setting enabled (Panorama > Setup > Services > Verify
See PAN-OS 7.1.8 Update Server Identity), but the firewall has the setting disabled (Device > Setup >
Addressed Issues. Services), deactivation on the firewall does not complete successfully and the firewall
becomes unreachable.
Workaround: Ensure Panorama and the VM‐Series firewall both have the Verify Update
Server Identity setting enabled before deactivating the firewall.
PAN-70323 Firewalls running in FIPS‐CC mode do not allow import of SHA‐1 CA certificates even
This issue is now resolved. when the private key is not included; instead, firewalls display the following error: Import
of <cert name> failed. Unsupported digest or keys used in FIPS-CC mode.
See PAN-OS 7.1.9
Addressed Issues.
PAN-69874 (PAN‐OS 7.1.5 and later releases only) When the PAN‐OS XML API sends user mappings
This issue is now resolved. with no timeout value to a firewall that has the Enable User Identification Timeout option
See PAN-OS 7.1.10 disabled, the firewall assigns the mappings a timeout of 60 minutes instead of never.
Addressed Issues.
Issue ID Description
PAN-69367 The firewall incorrectly generates packet diagnostic logs and captures packets for sessions
This issue is now resolved. that are not part of a packet filter (Monitor > Packet Capture).
See PAN-OS 7.1.11
Addressed Issues.
PAN-69340 When you use a license authorization code (capacity license or a bundle) to bootstrap a
This issue is now resolved. VM‐Series firewall, the capacity license is not applied. This issue occurs because the
See PAN-OS 7.1.8 firewall does not reboot after the license is applied.
Addressed Issues. Workaround: Use the request restart software CLI command or reboot the firewall
manually to activate the session capacity for the VM‐Series model.
PAN-68974 On PA‐3000 Series firewalls, you cannot configure a QoS Profile to have a maximum
This issue is now resolved. egress bandwidth (Egress Max) higher than 1Gbps for an aggregate group interface
See PAN-OS 7.1.11 (Network > Network Profiles > QoS Profile).
Addressed Issues.
PAN-67987 The GlobalProtect agent fails to connect using a client certificate if the intermediate CA is
signed using the ECDSA hash algorithm.
PAN-67544 When a Multicast Forwarding Information Base (MFIB) times out, the packet processing
This issue is now resolved. process (flow_ctrl) stops, which intermittently causes the firewall dataplane to restart.
See PAN-OS 7.1.11
Addressed Issues.
PAN-67079 In PAN‐OS 7.1.6, SSL sessions are discarded if the server certificate chain size exceeds
This issue is now resolved. 23KB. See Changes to Default Behavior for more information about this issue.
See PAN-OS 7.1.7 Workaround: Exclude the affected site from decryption. Refer to
Addressed Issues. live.paloaltonetworks.com/t5/Learning‐Articles/How‐to‐Exclude‐a‐Site‐from‐SSL‐Decry
ption/ta‐p/56738.
PAN-66997 On PA‐7000 Series and PA‐5000 Series firewalls, users who access applications over SSL
This issue is now resolved. VPN or IPSec tunnels through GlobalProtect experienced one‐directional traffic.
See PAN-OS 7.1.10
Addressed Issues.
PAN-64725 On PA‐7000 Series firewalls and Panorama Log Collectors, log collection processes
This issue is now resolved. consume excess memory and do not process logs as expected. This issue occurs when
See PAN-OS 7.1.10 DNS response times are slow and scheduled reports contain fields that require DNS
Addressed Issues. lookups.
Workaround: Use the debug management-server report-namelookup disable CLI
command to disable DNS lookups for reporting purposes.
PAN-63908 SSH sessions are incorrectly subjected to a URL category lookup even when SSH
decryption is not enabled. As a result, SSH traffic is blocked when you enable forward
proxy and configure a deny rule to match all traffic whose URL category is Unknown.
PAN-63905 Installing a content update or committing configuration changes on the firewall causes
This issue is now resolved. RTP sessions that were created from predict sessions to move from an active state to a
See PAN-OS 7.1.11 discard state.
Addressed Issues.
Issue ID Description
PAN-62453 Entering vSphere maintenance mode on a VM‐Series firewall without first shutting down
the Guest OS for the agent VMs causes the firewall to shut down abruptly, and results in
issues after the firewall is powered on again. Refer to Issue 1332563 in the VMware
release notes: www.vmware.com/support/pubs/nsx_pubs.html
Workaround: VM‐Series firewalls are Service Virtual Machines (SVMs) pinned to ESXi
hosts and should not be migrated. Before you enter vSphere maintenance mode, use the
VMware tools to ensure a graceful shutdown of the VM‐Series firewall.
PAN-61724 (101293) The Network Monitor report (Monitor > App Scope > Network Monitor) displays only
partial data when you select Source or Destination for a data set that includes a large
number of source or destination IP addresses and usernames. However, the report does
display all data as expected when you instead select Application or Application Category
for a large data set.
Issue ID Description
Issue ID Description
Issue ID Description
Issue ID Description
Issue ID Description
Issue ID Description
Issue ID Description
Issue ID Description
Issue ID Description
Issue ID Description
Issue ID Description
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
PAN-85938 Fixed an issue where PAN‐OS removed the IP address‐to‐username mappings of end
users who logged in to a GlobalProtect internal gateway within a second of logging
out from it.
PAN-84781 Fixed an issue on firewalls with Decryption policy enabled where intermittent packet
loss and decryption failures occurred because the firewall depleted its software
packet buffer pool.
PAN-84493 Fixed an issue where a VM‐Series firewall for NSX, after connecting to Panorama, ran
multiple dynamic address update jobs over a ten‐minute period instead of just one
update job.
PAN-82332 Fixed an issue where the firewall exported a configuration file of 0 bytes when you
used the firewall web interface to export a configuration file (Setup > Operations).
PAN-82273 Fixed an issue where blocking proxy sessions to enforce Decryption policy rules
caused packet buffer depletion, which eventually resulted in packet loss.
PAN-82117 Fixed an issue where PA‐5000 Series firewalls in an active/active high availability
(HA) configuration intermittently dropped packets due to a race condition that
occurred when the session owner and session setup were on different HA peers.
PAN-82095 Fixed an issue on PA‐3000 Series, PA‐500, PA‐200, and VM‐Series firewalls where
QoS throughput dropped on interfaces configured to use a QoS profile with an
Egress Max set to 0Mbps or more than 1142Mbps (Network > Network Profiles >
QoS Profile).
PAN-81892 A security‐related fix was made to prevent a command injection condition through
the firewall web interface (CVE‐2017‐15940).
PAN-81820 Fixed an issue on PA‐7000 Series firewalls where packet captures (pcaps) didn't
include packets that matched predict sessions.
PAN-81475 Fixed an issue where memory leaks occurred when you used a Panorama
management server running PAN‐OS 8.0 or 7.1 to push configurations to PA‐7000
Series firewalls running PAN‐OS 7.1 or 7.0.
PAN-80994 A security‐related fix was made to prevent remote code execution through the
firewall Management (MGT) interface (CVE‐2017‐15944).
Issue ID Description
PAN-80835 Fixed an issue where PA‐3020 firewalls intermittently dropped sessions and
displayed resources-unavailable in Traffic logs when a high volume of threat
traffic depleted memory. With this fix, PA‐3020 firewalls have more memory for
processing threat traffic.
PAN-80645 Fixed an issue where the VM‐Series firewall lost OSPF adjacency with a peer device
because the firewall dropped large OSPF link state packets.
PAN-80452 A security‐related fix was made to prevent inappropriate disclosure of information
through the firewall web interface (CVE‐2017‐15943).
PAN-80423 Fixed an issue where VM‐Series firewalls in an active/passive HA configuration
added a delay in traffic once every minute while sending Gratuitous Address
Resolution Protocol (GARP) packets after you set the Link State to down on a Layer
3 interface (Network > Interfaces > Ethernet > <interface> > Advanced).
PAN-79671 Fixed an issue where PA‐5000 Series firewalls ran out of disk space because they did
not purge logs quickly enough.
PAN-79569 Fixed an issue where a commit failed after an application name was moved to a
container application.
PAN-79441 Fixed an issue where GlobalProtect connections failed due to a memory leak in a
management‐plane process (sslvpn) that caused the process to restart with the
following error: virtual memory limit exceeded.
PAN-79067 Fixed an issue where the firewall treated an address object as a region object when
the address object had the same name as a deleted region object.
PAN-77974 Fixed an issue where the firewall could not establish BGP connections using a
loopback interface over a large‐scale VPN tunnel between a GlobalProtect satellite
and GlobalProtect gateway.
PAN-77800 Fixed an issue where the firewall failed to generate a Simple Certificate Enrollment
Protocol (SCEP) certificate when you selected a SCEP profile with the Subject
containing an email address attribute (Device > Certificate Management > SCEP).
PAN-77673 Fixed an issue where, when testing which policy rule applies to traffic between a
specified destination and source, the PAN‐OS XML API query does not display as
much information as the corresponding CLI command (test
security-policy-match).
PAN-73360 Fixed an issue on the Panorama management server in an HA configuration where
the passive HA peer displayed Shared Policy as Out of Sync (Panorama > Managed
Devices) even when the device group commit from the active peer succeeded.
PAN-71485 Fixed an issue where a firewall in FIPS‐CC mode rebooted in maintenance mode after
you downloaded GlobalProtect Client software that was listed under Device >
GlobalProtect Client but that was unavailable on the Palo Alto Networks Update
Server.
PAN-68256 Fixed an issue on PA‐7000 Series firewalls in an HA configuration where the HA data
link (HSCI) interfaces intermittently failed to initialize properly during bootup.
PAN-67950 Fixed an issue where the firewall dropped Encapsulating Security Payload (ESP)
packets because IPSec sessions were stuck in opening status when Extended
Authentication (X‐Auth) was enabled (Network > GlobalProtect > Gateways >
<gateway> > Agent > Tunnel Settings).
Issue ID Description
PAN-67713 Fixed an issue where the firewall didn't display the application groups you created
unless your administrative account was assigned an Admin Role profile with
privileges enabled for both application groups (full privileges) and application filters
(full or read‐only privileges). With this fix, only application group privileges are
required for viewing application groups.
PAN-66076 Fixed an issue where the GlobalProtect portal prompted end users to enter a
one‐time password (OTP) even after the users entered the OTP for the GlobalProtect
gateway with Authentication Override enabled (Network > GlobalProtect > Portals
> <portal-configuration> > Agent > <agent-configuration> > Authentication).
PAN-58581 Fixed an issue where a GlobalProtect satellite sent the wrong certificate chain after
you renewed the certificate authority (CA) certificates of GlobalProtect portals and
gateways.
PAN-55962 Fixed an issue on the Panorama management server where, when you used the
PAN‐OS XML API to request traffic logs, Panorama limited the response to 1,152
logs instead of the normal limit of 5,000 logs.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
PAN-84142 Fixed an issue where a process (vm_agent) on a VM‐Series firewall on Azure stopped
responding after upgrading to PAN‐OS 7.1.12 due to a bug in the Azure Linux Agent
library (waagentlib) package.
PAN-83754 Fixed an issue where a process (vm_agent) on a VM‐Series firewall on Azure stopped
responding after an update was applied on Azure.
PAN-82076 Fixed an issue on PA‐7000 Series firewalls where traffic delays occurred due to
packet buffer congestion when the all_pktproc process stopped responding. This
issue occurred when an incorrect Policy Based Forwarding (PBF) policy rule ID
referenced an invalid egress interface.
PAN-82046 Fixed an issue on VM‐Series firewalls for NSX where dynamic address groups had no
members.
PAN-81939 Fixed an issue where memory corruption caused the correlation engine process to
restart.
PAN-81661 Fixed an issue where PA‐7000 Series firewalls in a hairpin virtual wire deployment
dropped traffic when predict sessions were created. In a hairpin deployment, traffic
crosses a firewall twice, in both directions, across the same virtual wire(s) in the same
zones.
PAN-81321 Fixed an issue where IPSec tunnel phase 2 negotiations failed when attempting to
connect to a remote peer when /32 traffic selectors were included in the
configuration on the remote peer.
PAN-81118 Fixed an issue where client systems could use a translated IP address‐and‐port pair
for only one connection even if you configured the Dynamic IP and Port (DIPP) NAT
Oversubscription Rate to allow multiple connections (Device > Setup > Session >
Session Settings > NAT Oversubscription). This issue is fixed on all firewall models
except the PA‐7000 Series firewalls (see PAN‐84488).
PAN-80831 Fixed an issue where connections that the firewall handles as an Application Level
Gateway (ALG) service were disconnected when destination NAT and decryption
were enabled. This fix applies only when the ALG service does not change packet
lengths before and after NAT translation.
PAN-80660 Fixed an issue where the firewall flooded System logs with the following message:
Traffic and logging are resumed since
traffic-stop-on-logdb-full feature has been disabled.
Issue ID Description
PAN-80535 Fixed an issue on a firewall with multiple virtual systems where policy rules defined
for a specific virtual system could not access shared EDL objects.
PAN-80447 Fixed an issue where, after a PAN‐OS upgrade, packet buffer and descriptor
utilization spiked and caused latency in network traffic.
PAN-78718 Fixed an issue where a PA‐7000 Series firewall running PAN‐OS 7.1.12 or an earlier
release stopped saving and displaying new logs due to a memory leak after a
Panorama management server running a PAN‐OS 8.0 release pushed a predefined
report that specified a field that is unrecognized by the firewall running the earlier
PAN‐OS release (Monitor > Reports > Mobile Network Reports).
PAN-78342 Fixed an issue where Panorama failed to export a custom report if you set the
Database to Remote Device Data (Monitor > Manage Custom Reports).
PAN-78341 Fixed an issue where the root partition ran out of space during generation of a tech
support file when the output of the show user user-ids command was extremely
large. With this fix, the data saved to the tech support file is modified to show only
statistics instead of raw output, which prevents the output from this command from
being so large that it fills up all available disk space.
PAN-78127 A security‐related fix was made to prevent the firewall Management (MGT) interface
from becoming unavailable for legitimate use (CVE‐2017‐15942).
PAN-77939 Fixed an issue where the Panorama virtual appliance in Legacy mode purged older
Traffic logs even when space was available to store more logs.
PAN-77748 Added debug enhancements to capture more details about IKE when third-party
VPN clients use the X-AUTH feature.
PAN-77706 Fixed an issue on PA‐7000 Series firewalls where packet capture intermittently
failed.
PAN-77384 Fixed an issue where tunnel‐bound traffic was incorrectly routed through an ECMP
route instead of a PBF route as expected.
PAN-77292 Fixed an issue where firewalls in a high availability (HA) active/passive configuration
did not always synchronize sessions.
PAN-77063 Fixed an issue where SSL Forward Proxy decryption failed for SSL/TLS websites that
had unused certificate chains containing algorithms that PAN‐OS did not support.
With this fix, the firewall verifies only the certificate chains that the websites use.
PAN-77055 Fixed an issue where, after logging in to GlobalProtect, end users could access the
Firewall PAN‐OS XML API without additional authentication.
PAN-76565 Fixed an issue where dynamic content updates failed on the firewall when DNS
response times were slow.
PAN-76505 Fixed an issue where the mprelay process stopped responding when processing IPv6
neighbor discovery updates.
Issue ID Description
PAN-76454 Fixed an issue on PA‐7000 Series firewalls where Generic Routing Encapsulation
(GRE) session creation failed when the firewalls received GRE packets with a
Point‐to‐Point Protocol (PPP) payload.
PAN-76373 Fixed an issue on PA‐5000 Series firewalls where using the web interface to display
QoS Statistics (Network > QoS) resulted in a memory leak that caused the control
plane and dataplane to restart.
PAN-76263 Fixed an issue where the Panorama management server retained the Threshold
value for update schedules (Device > Dynamic Updates > <update_type_schedule>)
in a template stack even after you removed the value from templates in the stack.
PAN-76075 Fixed an issue where the User‐ID process stopped responding when an NTLM
request was received on a vsys where NTLM was not configured
PAN-75705 Fixed an issue where administrators were able to download tech support files even
when the administrators were not configured with this privilege.
PAN-75505 Fixed an issue where the firewall failed to export a report to PDF, XML, or CSV
format when the report job ID was higher than 65535.
PAN-74074 Fixed an issue where an HA sync resulted in an empty ethernet1/1 node on the
passive peer. This issue occurred when ethernet1/1 on the active HA peer was
configured as an Aggregated Ethernet (AE) interface while ethernet1/1 was not
configured in the local configuration for the passive peer.
PAN-73333 Fixed an issue where the firewall did not record the sender or recipient in WildFire
Submission logs for emails in which the header had no white space character
between the display name and the email address.
PAN-73196 Fixed an issue on VM‐Series firewalls that occurred when attempting to shut down
the firewall from the VCenter Client or from a Web Client due to a VM‐tools
integration issue.
PAN-72495 Fixed an issue where PA‐7000 Series firewalls intermittently dropped packets from
GlobalProtect end users if the GlobalProtect IKE gateway used a local interface that
was in a different security zone than the physical ingress interface.
PAN-71622 Fixed an issue where Panorama took longer than expected to generate reports.
PAN-71012 Fixed an issue where Panorama did not display log data in the Monitor or ACC tabs
and did not display custom reports.
PAN-66675 Fixed an issue where extended packet captures consumed excessive storage space in
/opt/panlogs.
PAN-64589 Fixed an issue where administrators with custom roles could not perform packet
captures or download and install software and content updates.
PAN-60414 Fixed an issue where the HL7 application was not correctly identified.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
PAN-81287 Fixed an issue where a firewall in FIPS/CC mode intermittently switched to
maintenance mode.
PAN-80433 Fixed an issue where Panorama did not display IP addresses for NSX dynamic address
groups even when the VM‐Series NSX edition firewall and NSX manager displayed
the IP addresses.
PAN-80155 Fixed an issue where firewalls that were deployed in an active/passive high
availability (HA) configuration and that acted as DHCP relay agents used physical
MAC addresses instead of HA virtual MAC addresses for DHCP packets.
PAN-80122 A security‐related fix was made to address a vulnerability that allowed XML External
Entity (XXE) attacks on the GlobalProtect external interface because PAN‐OS did not
properly parse XML input (CVE‐2017‐9458).
PAN-79844 Fixed an issue on Panorama where scheduled custom reports returned no data.
PAN-79804 Fixed an issue where VM‐Series firewalls for VMware NSX did not register on
Panorama if they belonged to a device group that contained applications from a
content release version that was newer than the version included with the PAN‐OS
software image for fresh installations.
PAN-79555 Fixed an issue on VM‐Series firewalls on Azure where dataplane interfaces did not
come up as expected because they did not successfully negotiate Layer 2 settings
during bootup.
PAN-79174 Fixed an issue where commits took longer to complete than expected on firewalls
with hundreds of policy rules that referenced application filters or application groups
that specified thousands of applications.
PAN-78854 Fixed an issue where a firewall dropped sessions for sites that used the supported
AES‐256‐GCM cipher when you configured SSL Forward Proxy Decryption and
defined a Decryption profile that blocked sessions using unsupported ciphers
(Objects > Decryption Profile > <decryption_profile> > SSL Forward Proxy).
PAN-78770 Fixed an issue on PA‐500 firewalls in a high availability (HA) configuration where the
HA1 interface went down due to a missed HA1 heartbeat.
Issue ID Description
PAN-78385 Fixed an issue where a Panorama management server running PAN‐OS 8.0 did not
display logs that were related to VPN tunnels or authentication and that were
collected from PA‐7000 Series firewalls running PAN‐OS 7.1 or an earlier release.
PAN-78044 Fixed an issue where the firewall dropped packets that were destined for IP address
FD00::/8 when you configured a Zone Protection profile with a Strict IP Address
Check (Network > Network Profiles > Zone Protection > Packet Based Attack
Protection > IP Drop). With this fix, FD00::/8 is no longer a reserved IP address.
PAN-77866 Fixed an issue where the authentication process (authd) stopped responding if a
third‐party device blocked the transmission of authentication packets between the
firewall and an LDAP server. With this fix, authentication fails without authd
becoming unresponsive if a third‐party device blocks LDAP authentication packets.
PAN-77652 Fixed an issue on PA‐7000 Series firewalls where the mprelay process stopped
responding due to a memory leak on the control plane.
PAN-77645 Fixed an issue where Dedicated Log Collectors did not forward logs to a syslog server
over TCP.
PAN-77520 Fixed an issue on PA‐7000 Series firewalls with AMC hard drives, model
ST1000NX0423, where the firewalls rebuilt Disk Pair B in the LPC card after a
reboot.
PAN-77062 Fixed an issue where administrators with a custom role could not delete packet
captures.
PAN-76997 Fixed an issue on the PA‐3020 firewall where SSL connections failed due to memory
allocation issues if you configured a Decryption profile with Key Exchange
Algorithms that included ECDHE (Objects > Decryption Profile >
<decryption_profile> > SSL Protocol Settings).
PAN-76831 Fixed an issue on PA‐7000 Series firewalls where committing configuration changes
caused the management server to stop responding and made the web interface and
CLI inaccessible.
PAN-76830 Fixed an issue on PA‐5000 Series firewalls where insufficient memory allocation
caused SSL decryption errors that resulted in SSL session failures, and the firewall
displayed the reason in Traffic logs as decrypt-error or
decrypt-cert-validation.
PAN-76160 Fixed an issue where a memory leak caused the firewall to create hundreds of LDAP
connections, which resulted in commit failures.
PAN-76155 Fixed an issue where the logs for the VM Monitoring Agent did not indicate the
reason for events that caused the agent to exit. With this fix, the agent logs display
debug‐level details when the agent exits.
PAN-76130 A security‐related fix was made to address OpenSSL vulnerabilities relating to the
Network Time Protocol (NTP) library (CVE‐2016‐9042/CVE‐2017‐6460).
PAN-76019 Fixed an issue where the dataplane restarted because the firewall used incorrect
zone identifiers for deleting flows when untagged subinterfaces had parent
interfaces with no zone assignment.
Issue ID Description
PAN-76003 A security‐related fix was made to prevent cross‐site scripting (XSS) attacks through
the GlobalProtect external interface (CVE‐2017‐12416).
PAN-75724 Fixed an issue where the PAN‐OS integrated User‐ID agent allowed weak ciphers for
SSL/TLS connections. With this fix, the User‐ID agent allows only the following
ciphers for SSL/TLS connections:
• ECDHE‐ECDSA‐AES256‐GCM‐SHA384
• ECDHE‐RSA‐AES256‐GCM‐SHA384
• ECDHE‐RSA‐AES128‐GCM‐SHA256
• ECDHE‐ECDSA‐AES256‐SHA384
• ECDHE‐ECDSA‐AES128‐SHA256
• DHE‐RSA‐AES256‐SHA256
• DHE‐RSA‐AES128‐SHA256
• ECDHE‐RSA‐AES256‐SHA
• ECDHE‐ECDSA‐AES256‐SHA
• ECDHE‐RSA‐AES128‐SHA
• ECDHE‐ECDSA‐AES128‐SHA
• DHE‐RSA‐AES256‐SHA
• DHE‐RSA‐AES128‐SHA
• AES256‐SHA256
• AES256‐SHA
• AES128‐SHA256
• AES128‐SHA
PAN-75571 Fixed an issue where the web interface did not display the full list of IPSec tunnels
(Network > IPSec Tunnels) after upgrading the firewall to PAN‐OS 7.1.7.
PAN-75371 Fixed an issue where firewalls configured to perform destination NAT misidentified
applications after incorrectly adding the public IP addresses of destination servers to
the App‐ID cache.
PAN-75337 Fixed an issue where CPU usage spiked on the firewall during Diffie‐Hellman (DHE)
or elliptical curve Diffie‐Hellman (ECDHE) key exchange for SSL decryption. With
this fix, the firewall has enhanced performance for DHE and ECDHE key exchange.
PAN-75132 Fixed an issue where certificates created locally on the firewall had duplicate serial
numbers because the firewall did not check the serial numbers of existing certificates
signed by the same CA when generating new certificates.
PAN-74880 Fixed an issue where retrieving threat packet captures took longer than expected
through the web interface (Monitor > Logs > Threat) or PAN‐OS XML API.
PAN-74366 Fixed an issue on the firewall and Panorama where the management server
(mgmtserver) process restarted after you tried to filter a Policies > <policy_type> list
based on specific strings such as 00 or 000.
PAN-74110 Fixed an issue where administrators could not log in to the firewall using LDAP
credentials after a PAN‐OS upgrade.
Issue ID Description
PAN-74067 Fixed an issue in large‐scale deployments where the User‐ID process (useridd)
stopped responding due to a loop condition because firewalls configured as User‐ID
agents repeatedly redistributed the same IP address‐to‐username mappings.
PAN-73919 Fixed an issue where you could not use the web interface or CLI to configure a
multicast IP address as the Source or Destination in packet filters (Monitor > Packet
Capture).
PAN-73711 Fixed an issue where firewalls configured as DHCP clients did not receive IP
addresses from the DHCP server because the firewalls did not set the gateway IP
address (giaddr) value to zero in DHCP client reply messages.
PAN-73270 Fixed an issue where the firewall rebooted if a Syslog Parse profile with the Type set
to Regex Identifier (Device > User Identification > User Mapping > Palo Alto
Networks User-ID Agent Setup > Syslog Filters) matched a null character in a syslog
message.
PAN-72831 Fixed an issue where rebooting the firewall caused it to generate a false critical alarm
that indicated LDAP servers were down.
PAN-72334 Fixed an issue where firewalls did not resume forwarding logs to Log Collectors after
Panorama management servers in a high availability (HA) configuration recovered
from a split‐brain condition.
PAN-71615 Fixed an issue where an intrazone block rule shadowed a universal rule that had
different source and destination zones.
PAN-71612 Fixed an issue where the logs that the firewall forwarded to a syslog server had syslog
header timestamps that did not match the times when the firewall generated the logs.
PAN-71392 Fixed an issue where the firewall did not connect to a SCEP server if the SCEP service
route used a loopback interface as the Source Interface (Device > Setup > Services
> Service Route Configuration).
PAN-71226 Fixed an issue where the firewall dataplane restarted because packet processing
processes stopped responding for HTTP traffic involving URL percent‐encoding.
PAN-71192 Fixed an issue where performing a log query or log export with a specific number of
logs caused the management server to stop responding. This occurred only when the
number of logs was a multiple of 64 plus 63. For example, 128 is a multiple of 64 and
if you add 63 to 128 that equals 191 logs. In this case, if you performed a log query
or export and there were 191 logs, the management server stopped responding.
PAN-69014 Fixed an issue where the Panorama management server did not display the logs
collected from PA‐7000 Series firewalls that were assigned to a device group that
was the child of the Device Group selected on the Monitor tab of the web interface.
PAN-68658 Fixed an issue where handling out‐of‐order TCP FIN packets resulted in dropped
packets due to TCP reassembly that was out‐of‐sync.
PAN-68580 Fixed an issue where VM‐Series firewalls in a high availability (HA) configuration
displayed the wrong link state after a link‐monitoring failure.
PAN-68363 Fixed an issue where logs exported in CSV format had columns that were not aligned
correctly.
Issue ID Description
PAN-66719 Fixed an issue where, when the session synchronization rate was very high, firewalls
in a high availability (HA) configuration dropped Backup keep-alive messages,
which caused flapping on the HA2 interface.
PAN-66552 Fixed an issue where the firewall web interface referred to external dynamic lists
(EDLs) as block lists in the Destination Address drop‐down of policy rules (Policies >
<policy_type> > <rule> > Destination). With this fix, the Destination Address lists
EDLs under the External Dynamic List header.
PAN-63528 Fixed an issue on the VM‐Series firewall on Hyper‐V where VLAN trunking did not
enable the firewall to process traffic on multiple subinterfaces using VLAN tags.
PAN-63333 Fixed an issue where adding more OSPF areas to a virtual router that had no
neighbors (Network > Virtual Routers > <virtual_router_configuration> > OSPF >
Areas) caused BFD sessions to flap on connections to existing OSPF neighbors.
PAN-61813 Fixed an issue on Panorama where a custom scheduled report configured for a device
group was empty when exported.
PAN-60863 Fixed an issue where a switch connected to firewalls in an active/passive high
availability (HA) configuration stopped learning MAC addresses after HA failover.
PAN-60535 Fixed an issue on PA‐7000 Series firewalls where NPC slots went down due to
missing hearbeats.
PAN-59895 Fixed an issue where firewalls in an active/active high availability (HA) configuration
did not perform an autocommit after rebooting (such as after a PAN‐OS upgrade),
which prevented the firewalls from applying policies.
PAN-57667 Fixed an issue where Panorama stopped the report generation process at 80% for a
SaaS Application Usage report for a Device Group that had a space in its name
(Panorama > Monitor > PDF Reports > SaaS Application Usage).
PAN-56041 Fixed an issue on firewalls with an IPv6 configuration where the mprelay process
stopped responding.
PAN-50081 Fixed an issue where CPU utilization stayed at 100% on the dataplanes of firewalls in
an active/active high availability (HA) configuration when the firewalls had multiple
virtual systems, used SSL Forward Proxy Decryption, and connected to third‐party
Layer 3 devices.
PAN-49363 Fixed an issue where an SNMP walk operation on an SNMP manager displayed a
discrepancy between the number of interfaces and interface descriptions because
the firewall did not decrease the number of SNMP interface indexes after you
removed logical interfaces from the configuration.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
WF500-4291 Fixed an issue where the WF‐500 appliance returned false positives for known,
benign Portable Executable (PE) files.
PAN-79436 Fixed an issue where PA‐7000 Series firewalls did not apply changes to the syslog
server profile configuration until you restarted the syslog‐ng process.
PAN-78501 Fixed an issue where users experienced slow network connectivity due to CPU
utilization spikes in the firewall Network Processing Cards (NPCs) when the URL
cache exceeded one million entries.
PAN-77702 Fixed an issue on Panorama in NSX deployments where dynamic address updates
took several minutes to complete.
PAN-77339 SafeNet Client 6.2.2 did not support the necessary MAC algorithm (HMAC‐SHA1) to
work with Palo Alto Networks firewalls running in FIPS‐CC mode.
PAN-77294 A security‐related fix was made to address a vulnerability that allowed cross‐site
scripting (XSS) attacks on the GlobalProtect external interface because PAN‐OS did
not properly validate specific request parameters (CVE‐2017‐9467).
PAN-77173 A security‐related fix was made to prevent remote code execution within the Linux
kernel that the firewall management plane uses (CVE‐2016‐10229).
PAN-77127 Fixed an issue where the firewall reduced the range of local and remote IKEv2 traffic
selectors in a way that disrupted traffic in a VPN tunnel that a Cisco Adaptive
Security Appliance (ASA) initiated.
PAN-76964 Fixed an issue where interfaces became unavailable due to a packet buffer overflow
condition that occurred after the firewall tried to close the connection to a client that
ignored the URL Filtering block page.
PAN-76746 Fixed an issue on the PA‐7080 firewall where authentication traffic from a wireless
controller to a RADIUS server failed due to buffer depletion on the firewall.
PAN-76702 Fixed an issue where several dataplane processes stopped responding when the
firewall processed VPN traffic with IP packet chains, which were typically triggered
by IP fragmentation or SSL decryption operations.
Issue ID Description
PAN-76650 Fixed an issue where renaming a shared object on Panorama that you previously
pushed to firewalls caused a commit failure if the firewalls referenced that object in
local policies.
PAN-76644 Fixed an issue where the firewall could not decrypt traffic for SSL inbound inspection
when the private key size was 3,072 or 4,096 bits and the firewall stored the key on
a hardware security module (HSM).
PAN-76158 Fixed an issue where the firewall allowed Psiphon application sessions to continue
without applying policy rules to them after the firewall ran out of resources (such as
while processing heavy traffic). With this fix, the firewall drops Psiphon sessions after
running out of resources.
PAN-76144 Fixed an issue where throughput was reduced on PA‐5000 Series firewalls that used
a single UDP session on one dataplane to process high rates of tunneled traffic. With
this fix, you can use the set session filter-ip-proc-cpu CLI command to use
multiple dataplanes to process traffic for up to 32 destination server IP addresses.
This setting persists after reboots and upgrades.
PAN-76058 Fixed an issue where Panorama failed to migrate URL categories from BrightCloud to
PAN‐DB in policy pre‐rules and post‐rules; this fix requires content release version
718 or a later version.
PAN-75977 Fixed an issue where users failed to authenticate through a Ucopia LDAP server.
PAN-75908 Fixed an issue where multicast packets with stale session IDs caused the firewall
dataplane to restart.
PAN-75769 Fixed an issue where the firewall enabled new applications associated with
Applications updates received from Panorama even when you chose to Disable new
apps in content update (Panorama > Device Deployment > Dynamic Updates).
PAN-75721 Fixed an issue where you could not set the authentication profile Type to None
(Device > Authentication Profile) on a firewall in FIPS mode.
PAN-75580 Fixed an issue where a PAN‐OS XML API query to fetch all dynamic address groups
failed with an Opening and ending tag mismatch error due to a command buffer
limitation.
PAN-75215 Fixed an issue where PA‐5000 Series firewalls kept sessions active for an hour
instead of discarding them after 90 seconds as expected when the sessions matched
a policy rule that was set to deny those sessions or when the sessions matched an
allow rule that triggered a block page.
PAN-75029 Fixed an issue where the PA‐5060 firewall randomly dropped packets and displayed
the reason in Traffic logs as resources unavailable.
PAN-74938 Fixed an issue on PA‐3000 Series firewalls where SSL sessions failed due to memory
depletion in the proxy memory pool; Traffic logs displayed the reason
decrypt-error.
PAN-74886 Fixed an issue where Panorama failed to push a shared address object to firewalls
when the object was part of a dynamic address group that used a tag.
Issue ID Description
PAN-74877 Fixed an issue where Panorama took longer than expected to push configurations
from multiple device groups to firewalls.
PAN-74865 Fixed an issue where Panorama could not push address objects to managed firewalls
when zones specified the objects in the User Identification ACL include or exclude
lists (Network > Zones) and you configured Panorama to not Share Unused Address
and Service Objects with Devices (Panorama > Setup > Management > Panorama
Settings).
PAN-74652 Fixed an issue where, after a firewall successfully installed a content update received
from Panorama, Panorama displayed a failure message for that update when the
associated job ID on the firewall was higher than 65536.
PAN-74639 Fixed an issue where the root partition on the firewall was low on disk space
(requiring you to run the debug dataplane packet-diag clear log log CLI
command to free disk space) because the pan_task process generated logs for H.225
sessions.
PAN-74632 Fixed an issue where the firewall did not clear IP address‐to‐username mappings or
username‐to‐group mappings after reaching the maximum supported number of user
groups, which caused commit failures with the following errors: user-id is not
registerd and ldmgr was reset. Commit is required to reinitialize
User-ID.
PAN-74293 Fixed an issue where the firewall dropped sessions after only 30 seconds of idle
traffic instead of after the session timeout associated with the application.
PAN-74139 Fixed an issue on the PA‐500 firewall where insufficient memory allocation caused
SSL decryption errors that resulted in SSL session failures, and Traffic logs displayed
the Session End Reason as decrypt-error or decrypt-cert-validation.
PAN-73995 Fixed an issue where firewall management interfaces that were configured through
DHCP released or renewed every time you pushed configurations from Panorama
instead of releasing or renewing when the DHCP leases expired.
PAN-73993 Fixed an issue where App‐ID signature matching did not work on the firewall, which
caused it to misidentify applications.
PAN-73710 Fixed an issue where the firewall did not commit changes to the NTP servers
configuration (Device > Setup > Services) when the firewall connected to the servers
through a service route and the management (MGT) interface was down.
PAN-73707 Fixed an issue where you could not generate a SCEP certificate if the SCEP
Challenge (password) had a semicolon (Device > Certificate Management > SCEP).
Issue ID Description
PAN-73556 Fixed an issue where the firewall did not delete multicast forwarding information
base (FIB) entries for multicast groups that stopped receiving traffic.
PAN-73381 Fixed an issue on firewalls with multiple virtual systems where end users could not
authenticate to a GlobalProtect portal or gateway that specified an authentication
profile for which the Allow List referenced user groups instead of usernames.
PAN-73056 Fixed an issue where GlobalProtect prompted end users for a certificate from
gp.paloaltonetworks.com because the default landing page for the GlobalProtect
portal referenced an image at gp.paloaltonetworks.com.
PAN-73053 Fixed an issue where incremental updates failed for registered IP addresses if the
firewall retrieved the updates through VM information sources (Device > VM
Information Sources).
PAN-72863 Fixed an issue where the User‐ID agent (PAN‐OS integrated or Windows‐based)
stopped responding because the firewall sent numerous queries for the IP
address‐to‐username mappings of unknown users. With this fix, the firewall no
longer queries User‐ID agents for unknown users unless you run the debug user-id
query-unknown-ip yes CLI command on the firewall (you must re‐run this command
whenever the firewall reboots). Palo Alto Networks highly recommends upgrading
your Windows‐based User‐ID agents to version 7.0.8 or a later version to avoid the
WINAGENT‐53 issue associated with this change in default behavior.
PAN-72753 Fixed an issue where you could not configure the 0.0.0.0/1 subnet as a Proxy ID for
IPSec VPN tunnels.
PAN-72726 Fixed an issue where the firewall did not mark BFD packets with appropriate
differentiated services code point (DSCP) values.
PAN-72342 Fixed an issue where end users ignored the Duo V2 authentication prompt until it
timed out but still authenticated successfully to a GlobalProtect portal configured for
two‐factor authentication.
PAN-72192 Fixed an issue where, just after rebooting, a PA‐7000 Series firewall failed to store
logs locally on the Log Processing Card (LPC).
PAN-71950 Fixed an issue on firewalls in FIPS mode where the all_task process stopped
responding when users accessed a web page that matched a policy rule with a URL
Filtering profile in which the Site Access was set to continue or override for the
category of that web page (Objects > Security Profiles > URL Filtering >
<URL‐filtering‐profile> > Categories).
PAN-71922 Fixed an issue where the firewall did not generate Threat logs for classified DoS
protection profiles that had an Action set to SYN Cookies (Objects > Security
Profiles > DoS Protection > Flood Protection > SYN Flood).
Issue ID Description
PAN-69761 Fixed an issue where the firewall allowed SSL sessions with unsupported ciphers
(DHE or ECDHE) without decrypting the sessions even if they matched a Decryption
policy rule with an Action set to Decrypt, a Type set to SSL Inbound Inspection, and
a Decryption Profile that was configured to block unsupported ciphers (Policies >
Decryption > <decryption‐rule> > Options).
PAN-69367 Fixed an issue where the firewall incorrectly generated packet diagnostic logs and
captured packets for sessions that were not part of a packet filter (Monitor > Packet
Capture).
PAN-68974 Fixed an issue on PA‐3000 Series firewalls where you could not configure a QoS
Profile to have a maximum egress bandwidth (Egress Max) higher than 1Gbps for an
aggregate group interface (Network > Network Profiles > QoS Profile).
PAN-68654 Fixed an issue where the firewall did not populate User‐ID mappings based on the
defined Syslog Parse profiles (Device > User Identification > User Mapping > Palo
Alto Networks User-ID Agent Setup > Syslog Filters).
PAN-68543 A security‐related fix was made to address OpenSSL vulnerabilities
(CVE‐2016‐8610).
PAN-67618 Fixed an issue where the Panorama XML API request to show all dynamic address
groups responded with improperly formatted XML.
PAN-67544 Fixed an issue where, when a multicast forwarding information base (FIB) timed out,
the process for packet processing (flow_ctrl) stopped responding, which
intermittently caused the firewall dataplane to restart.
PAN-66206 Fixed an issue where PA‐5000 Series firewalls did not correctly install DNS sessions
that originated from an interface configured for a DNS Proxy (Network > DNS Proxy)
and that were destined for a DNS server.
PAN-64928 Fixed an issue where PA‐3000 Series firewalls did not come up after the first reboot
following an upgrade; a second reboot was required.
PAN-64404 Fixed an issue where the commit validation process did not identify errors in content
update files or in content‐related configurations such as Data Pattern objects or
custom threat signatures.
PAN-63925 Fixed an issue where a firewall did not generate a log when a content update failed
or was interrupted.
PAN-63905 Fixed an issue where RTP sessions that were created from predict sessions went
from an active state to a discard state after you installed a content update or
committed configuration changes on the firewall.
PAN-63205 Fixed an issue on VM‐Series firewalls where commit operations failed after you
configured HA with the HA2 and HA3 interfaces.
PAN-62855 Fixed an issue where Panorama did not display the logs for Correlation events from
PA‐7000 Series firewalls.
Issue ID Description
PAN-61834 Fixed an issue where the firewall captured packets of IP addresses not included in the
packet filter (Monitor > Packet Capture).
PAN-60577 Fixed an issue where an application filter with no selected categories caused the
firewall to perform slowly because the filter defaulted to include all categories
(Objects > Application Filters). With this fix, you cannot configure an application
filter without selecting one or more categories.
PAN-58979 Fixed an issue where the dataplane restarted due to a memory leak in a process
(mprelay) that occurred if you did not disable LLDP when you disabled an interface
with LLDP enabled (Network > Interfaces > <interface> > Advanced > LLDP).
PAN-57142 Fixed an issue where PA‐7000 Series firewalls in an HA active/passive configuration
did not correctly enforce QoS limits on Aggregate Ethernet (AE) subinterfaces and did
not correctly forward traffic for offloaded sessions.
PAN-54688 Fixed an issue where heavy processing loads caused the firewall to fill the root
partition with unnecessary log_index_* and content_install_* files in the /tmp
directory. With this fix, the firewall no longer generates these unnecessary files.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
PAN-77595 Fixed an issue where PA‐7000 Series firewalls forwarded a SIP INVITE based on route
lookup instead of Policy‐Based Forwarding (PBF) policy.
PAN-77516 A security‐related fix was made to address a Remote Code Execution (RCE) vulnerability
when the PAN‐OS DNS Proxy service resolved FQDNs (CVE‐2017‐8390).
PAN-76890 Fixed an issue where traffic that included a ZIP file caused the all_task process to restart
and the firewall dropped packets while waiting for that process to resume.
PAN-76153 Fixed an issue where PA‐5000 Series firewalls dropped traffic because predict sessions
incorrectly matched Policy‐Based Forwarding (PBF) policy rules for non‐related sessions.
PAN-75413 Fixed an issue where DHCP servers did not assign IP addresses to new end users (DHCP
clients) because the firewall failed to process and relay DHCP messages between the
servers and clients after you configured a firewall interface as a DHCP relay agent.
PAN-75372 Fixed an issue where Panorama dropped all administrative users because the
management‐server process restarted.
PAN-61682 Fixed an issue where end users either did not see the Captive Portal web form or saw a
page displaying raw HTML code after requesting an application through a web proxy
because the HTTP body content length exceeded the specified size in the HTTP Header
Content‐Length.
PAN-75158 Fixed an issue with network outages on firewalls in a virtual wire HA configuration with
HA Preemptive failback enabled (Device > High Availability > General > Election
Settings) due to Layer 2 looping after failover events while the firewalls processed
broadcast traffic.
PAN-74655 Fixed an issue where users experienced slow network connectivity due to CPU utilization
spikes in the firewall Network Processing Cards (NPCs) when the URL cache exceeded one
million entries.
PAN-74548 Fixed an issue where the Export Named Configuration dialog did not let you filter
configuration snapshots by Name, which prevented you from selecting snapshots beyond
the first 500. With this fix, you can now enter a filter string in the Name field to display
any matching snapshots.
PAN-74403 Fixed an issue on Panorama where the web interface became unresponsive after you
selected Export to CSV for a custom report, which forced you to log in to the CLI and
reboot Panorama or restart the management server.
Issue ID Description
PAN-74368 Fixed an issue where commits failed due to configuration memory limits on firewalls that
had numerous Security policy rules that referenced many address objects. With this fix,
the number of address objects that a policy rule references does not impact configuration
memory.
PAN-74236 Fixed an issue where numerous non‐browser based requests from clients caused the
User‐ID process (useridd) to stop responding, which resulted in too many pan_errors disk
writes.
PAN-74188 Fixed an issue where conflicting next‐hop entries in the egress routing table caused the
firewall to incorrectly route traffic that matched Policy‐Based Forwarding (PBF) policy
rules configured to Enforce Symmetric Return.
PAN-74184 Fixed an issue where Panorama failed to properly create NSX service profile zones and
was out of sync with VMware Service Managers after you assigned VMware service
definitions to template stacks.
PAN-73914 A security‐related fix was made to address OpenSSL vulnerabilities (CVE‐2017‐3731).
PAN-73783 Fixed an issue where cookie‐based authentication for the GlobalProtect gateway failed
with the following error: Invalid user name.
PAN-73631 Fixed an issue where end user clients failed on their first attempt to authenticate when
you configured Captive Portal for certificate‐based authentication and the client
certificates exceeded 2,000 bytes.
PAN-73553 Fixed an issue where SSL Inbound Decryption failed when the private key was stored on
a hardware security module (HSM).
PAN-73502 Fixed an issue where the firewall did not purge expired IP address‐to‐username mappings,
which caused one of the root partitions to run out of free space.
PAN-73497 Fixed an issue on Panorama where the CSV file that you exported for a custom report
(Monitor > Manage Custom Reports) included all entries instead of the number of entries
specified in the Sort By drop‐down (such as Top 10).
PAN-73484 Fixed an issue where the firewall server process (devsrvr) restarted during URL updates.
PAN-73359 Fixed an issue where commits failed because an accumulation of delayed ACC summary
reports on Panorama and Log Collectors caused a memory leak in the reportd process.
PAN-73281 Fixed an issue where the firewall dropped multicast traffic on an egress VLAN interface
when the traffic was offloaded.
PAN-73191 Fixed an issue where OSPF adjacency flapping occurred between the firewall and an OSPF
peer due to a heavy processing load on the dataplane and queued OSPF hello packets.
PAN-73045 Fixed an issue where HA failover and fail‐back events terminated sessions that started
before the failover.
PAN-72697 Fixed an issue where, after a DoS attack ended, the firewall continued generating Threat
logs and incrementing the session drop counter.
Issue ID Description
PAN-72433 Fixed an issue where the PA‐7050 firewall displayed incorrect information for the packet
counts and number of bytes associated with traffic on subinterfaces. With this fix, the
firewall displays the correct information in the show interface CLI command output and
in other sources of information for subinterfaces (such as SNMP statistics and NetFlow
record exports).
PAN-72346 Fixed an issue where the firewall failed to export botnet reports and displayed the
following error: Missing report job id.
PAN-71627 Fixed an issue where the firewall failed to authenticate to a SafeNet hardware security
module (HSM). With this fix, the firewall supports multiple SafeNet HSM client versions;
you can use the request hsm client-version CLI command to select the version that
is compatible with your SafeNet HSM server.
PAN-71544 Fixed an issue where the VM‐Series firewall on a Microsoft Hyper‐V server stopped
receiving traffic on interfaces in Tap mode because the system clock went backward,
which caused the packet processor to stop responding.
PAN-71484 Fixed an issue where the firewall disrupted SIP traffic by discarding long‐lived SIP sessions
after a content update.
PAN-71400 Fixed an issue where the DNS Proxy feature did not work because the associated process
(dnsproxy) stopped running on a firewall that had an address object (Objects > Address)
with the same FQDN as one of the Static Entries in a DNS proxy configuration (Network
> DNS Proxy).
PAN-71312 Fixed an issue where custom reports did not display results for queries that specified the
Negate option, Contains operator, and a Value that included a period (.) character
preceding a filename extension.
PAN-71311 Fixed an issue where, after losing the connection to the Windows‐based User‐ID agent,
the firewall generated a System log with the wrong severity level (informational instead
of high) if you configured the User‐ID agent with an FQDN instead of an IP address
(Device > User Identification > User-ID Agents).
PAN-71133 Fixed an issue on where the dataplane rebooted after multiple dataplane processes
restarted due to memory corruption.
PAN-70928 Fixed an issue where the GlobalProtect gateway failed to verify the revocation status of a
client certificate using Online Certificate Status Protocol (OCSP).
PAN-70731 Fixed an issue where the firewall failed to authenticate to a SafeNet hardware security
module (HSM) if the Administrator Password (Device > Setup > HSM) contained special
characters.
PAN-70366 Fixed an issue where SMTP email servers did not receive PDF reports from the firewall
because the report emails used bare LF instead of CRLF line separators.
PAN-69874 Fixed an issue where, when the PAN‐OS XML API sent IP address‐to‐username mappings
with no timeout value to a firewall that had the Enable User Identification Timeout option
disabled, the firewall assigned the mappings a timeout of 60 minutes instead of never.
PAN-69801 Fixed an issue where the primary firewall peer in an HA active/active configuration was in
a tentative HA state and did not synchronize session update messages with the secondary
peer, which resulted in dropped packets after a session aged out (within 30 seconds).
Issue ID Description
PAN-69799 Fixed an issue where PA‐7050 firewalls did not correctly enforce log retention periods
(Device > Setup > Management, Logging and Reporting Settings section, Log Storage tab,
Max Days fields).
PAN-69585 Fixed an issue where the URL link included in the email for a SaaS Application Usage report
triggered third‐party spam filters.
PAN-69235 Fixed an issue where committing a configuration with 4,000 or more Layer 3 subinterfaces
caused the dataplane to stop responding.
PAN-68808 Fixed an issue on the PA‐7050 firewall where the mprelay process experienced a memory
leak and stopped responding, which caused slot failures and HA failover.
PAN-68795 Fixed an issue where the SaaS Application Usage report displayed upload and download
bandwidth usage numbers incorrectly in the Data Transfer by Application section.
PAN-68767 Fixed an issue where Panorama could not change the connection Status of an NSX
manager (Panorama > VMware NSX > Service Managers) from Unknown to Registered
due to a non‐existent null value entry in the NSX manager response.
PAN-68763 Fixed an issue where path monitoring failures did not produce enough information for
troubleshooting. With this fix, PAN‐OS supports additional debug commands and the tech
support file (click Generate Tech Support File under Device > Support) includes additional
registry values to troubleshoot path monitoring failures.
PAN-67699 Fixed an issue where enabling cookie authentication on the GlobalProtect portal (Network
> GlobalProtect > Portals) caused the sslvpn process to stop responding, which
disconnected end users who connected through an SSL VPN.
PAN-67692 Fixed an issue where Panorama only intermittently used the proxy server if you configured
it for connecting to VMware NSX service managers.
PAN-67600 Fixed an issue where firewall interfaces configured as DHCP clients renewed DHCP leases
at incorrect intervals.
PAN-67412 Fixed an issue on firewalls in an HA configuration where, when an end user accessed
applications over a GlobalProtect clientless VPN, the web browser became unresponsive
for about 30 seconds after a failover.
PAN-66997 Fixed an issue on PA‐7000 Series and PA‐5000 Series firewalls where end users who
accessed applications over SSL VPN or IPSec tunnels through GlobalProtect experienced
one‐directional traffic.
PAN-66873 Fixed an issue where PAN‐OS deleted critical content files when the management plane
ran out of memory, which caused commit failures until you updated or reinstalled the
content.
PAN-66215 Fixed an issue where the Panorama management server became unresponsive and
inaccessible through SSH or HTTPS for several hours.
Issue ID Description
PAN-65918 Fixed an issue on the Panorama virtual appliance where the third‐party backup software
BackupExec failed to back up a quiesced snapshot of Panorama (Panorama in a temporary
state where all write operations are flushed). With this fix, the VMware Tools bundled with
Panorama supports the quiescing option.
PAN-64884 Fixed an issue where firewalls in an HA configuration did not synchronize the Layer 2 MAC
table; after failover, the MAC table was rebuilt only on the peer that became active, which
caused excessive packet flooding.
PAN-64725 Fixed an issue where PA‐7000 Series firewalls and Panorama Log Collectors consumed
excess memory and didn't process logs as expected. This issue occurred when DNS
response times were slow and scheduled reports contained fields that required DNS
lookups.
PAN-64639 Fixed an issue where HA firewalls failed to synchronize the PAN‐DB URL database.
PAN-63969 Fixed an issue on PA‐7000 Series firewalls in an HA configuration where the NPC 40Gbps
(QSFP) Ethernet interfaces on the passive peer displayed link activity on a neighboring
device (such as a switch) to which they connected even though the interfaces were down
on the passive peer.
PAN-63612 Fixed an issue where User activity reports on Panorama did not include any entries when
there was a space in the Device Group name.
PAN-62937 Fixed an issue where establishing an LDAP connection over a slow or unstable connection
caused commits to fail when you enabled TLS. With this fix, if you enable TLS, the firewall
does not attempt to establish LDAP connections when you perform a commit.
PAN-62797 Fixed an issue where the cdb process intermittently restarted, which prevented jobs from
completing successfully.
PAN-62791 Fixed an issue where the firewall could not use the certificates in its certificate store
(Device > Certificate Managment > Certificates > Device Certificates) after a manual or
automatic commit, which caused certificate authentication to fail.
PAN-62500 A security‐related fix was made to prevent the inappropriate disclosure of information due
to a Linux Kernel vulnerability (CVE‐2016‐5696).
PAN-62436 Fixed an issue where, after you installed the GlobalProtect agent, it failed to connect with
the GlobalProtect portal to download the agent configuration because authentication
messages had special characters.
PAN-62159 Fixed an issue where the firewall did not generate WildFire Submission logs when the
number of cached logs exceeded storage resources on the firewall.
PAN-61409 Fixed an issue where the firewall failed to connect to an HTTP server using the HTTPS
protocol when the CA certificate that validated the firewall certificate was in a specific
virtual system instead of the Shared location.
Issue ID Description
PAN-60376 Fixed an issue where the authentication process (authd) stopped responding and caused
the firewall to reboot after the firewall received a stale response to an authentication
request before selecting CHAP or PAP as the protocol for authenticating to a RADIUS
server.
PAN-60101 Fixed an issue on the M‐500 and M‐100 appliances in Panorama mode where emailed
custom reports contained no data if you configured a report query that used an Operator
set to contains (Monitor > Manage Custom Reports).
PAN-59677 A security‐related fix was made to prevent firewall administrators logged in as root from
using GNU Wget to access remote servers and write to arbitrary files by redirecting a
request from HTTP to a crafted FTP resource (CVE 2016‐4971).
PAN-59676 Fixed an issue where firewall administrators with custom roles (Admin Role profiles) could
not download content or sofware updates.
PAN-57553 Fixed an issue where a QoS profile failed to work as expected when applied to a clear text
node configured with an Aggregate Ethernet (AE) source interface that included AE
subinterfaces.
PAN-56453 Fixed an issue where the Correlation logs that Panorama forwarded with a custom
Common Event Format (CEF) were incomplete and incorrectly formatted when sent as
syslogs.
PAN-56287 Fixed an issue where the firewall discarded VoIP sessions that had multicast destinations.
PAN-56015 Fixed an issue where the syslog format for Correlation logs differed from the format of
other log types, which prevented the firewall from integrating with some third‐party
syslog feeds.
PAN-55245 Fixed an issue on VM‐Series firewalls where application‐level gateway (ALG) H.245 traffic
failed due to a session prediction issue.
PAN-54531 Fixed an issue where the firewall stopped writing new Traffic and Threat logs to storage
because the Automated Correlation Engine used disk space in a way that prevented the
firewall from purging older logs.
PAN-49821 Fixed an issue where connections to the GlobalProtect portal failed when traffic came
from a shared gateway and there was no Security policy rule to allow TCP port 20077 for
the GlobalProtect portal IP address. With this fix, you need only allow access to TCP port
443 for the GlobalProtect portal even when traffic is coming from a shared gateway.
PAN-49660 Fixed an issue where several processes stopped on firewalls in an HA configuration that
received HA3 messages but didn't have configured HA3 interfaces (Device > High
Availability > Active/Active Config).
PAN-46374 Fixed an issue on PA‐7000 Series firewalls where you had to power cycle the Switch
Management Card (SMC) when it failed to come up after a soft reboot (such as after
upgrading the PAN‐OS software).
Issue ID Description
PAN-81061 Fixed an issue where PA‐3000 Series firewalls dropped long‐lived sessions that were
active during a content update followed immediately by an Antivirus or WildFire
update.
PAN-75881 Fixed an issue where a regression introduced in PAN‐OS 7.1.9 caused the firewall
dataplane to restart in certain cases when combined with content updates. For
details, including the relevance of content release version 709, refer to the associated
Customer Advisory.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
WF500-3605 Fixed an issue where the WF‐500 appliance created too many logs when generating PDF
reports.
PAN-76265 Fixed an issue where the firewall failed to retrieve user groups from an LDAP server
because the server response did not have a page control value.
PAN-75048 Fixed an issue where the firewall used the default route (instead of the next best available
route) when the eBGP next hop was unavailable, which resulted in dropped packets.
Additionally with this fix, the default time‐to‐live (TTL) value for a single hop eBGP peer is
changed to 1 (instead of 2).
PAN-75005 Fixed an issue where loading a configuration other than running‐config.xml when
downgrading from PAN‐OS 7.1.8 to a PAN‐OS 7.0 release removed authentication
profiles from GlobalProtect portals and gateways, which caused an auto‐commit failure.
PAN-74161 Fixed an issue where firewalls configured in a virtual wire deployment where Spanning
Tree Protocol (STP) bridge protocol data unit (BPDU) packets were dropped.
PAN-74128 Fixed an issue where a session caused the dataplane to restart if the session was active
during and after you installed a content update on the firewall and the update contained
a decoder change.
PAN-74048 Fixed an issue where numerous NSX dynamic address updates caused Panorama to
perform slower and to delay deployment of updates to firewalls. With this fix, you can use
the request partner vmware-service-manager dau-updater-time-interval
time-interval <time_interval_in_seconds> CLI command to set the interval at
which Panorama processes the NSX dynamic updates.
PAN-72779 Fixed an issue where the Panorama management server restarted after you installed the
latest content database.
PAN-72769 A security‐related fix was made to prevent brute‐force attacks on the GlobalProtect
external interface (CVE‐2017‐7945).
PAN-72350 Fixed an issue where high‐volume SSL traffic intermittently added latency to SSL sessions.
PAN-71530 Fixed an issue where LDAP authentication failed intermittently when the firewall tried to
connect to the LDAP server through a service route or after HA failover.
PAN-71455 Fixed an issue where users could not access a secure website if the certificate authority
that signed the web server certificate also signed multiple certificates with the same
subject name in the Default Trusted Certificate Authorities list on the firewall.
Issue ID Description
PAN-71319 Updated PAN‐OS to address NTP issues (CVE‐2016‐7433).
PAN-71284 Fixed an issue where Panorama failed to deploy BrightCloud URL filtering database
updates to firewalls.
PAN-71073 Fixed an issue where a commit associated with a dynamic update caused an HA failover
when the path‐monitoring target IP address aged out or when the first path‐monitoring
health check failed.
PAN-71004 Fixed an issue where, when the firewall killed a process (l3svc), the process produced child
processes that continued running. With this fix, the firewall cleans up the child processes
before respawning the l3svc process.
PAN-70620 Fixed an issue where an uninitialized general‐purpose I/O (GPIO) controller driver caused
the firewall to become unresponsive and require a reboot.
PAN-70541 A security‐related fix was made to address an information disclosure issue that was caused
by a firewall that did not properly validate certain permissions when administrators
accessed the web interface over the management (MGT) interface (CVE‐2017‐7644).
PAN-70483 Fixed an issue on M‐Series appliances in Panorama mode where Security policy rules did
not display shared service groups in the service drop‐down on the Service/URL Category
tab if the drop‐down had 5,000 or more entries.
PAN-70436 A security‐related fix was made to prevent tampering with files that are exported from the
firewall web interface (CVE‐2017‐7217).
PAN-70434 A security‐related fix was made to prevent inappropriate disclosure of information
through the firewall web interface (CVE‐2017‐721).
PAN-70426 A security‐related fix was made to prevent firewall administrators from performing actions
through the web interface that require higher privileges than their administrator roles
allow (CVE‐2017‐7218).
PAN-70345 Fixed an issue where the M‐Series appliances did not forward logs to a syslog server over
TCP ports.
PAN-70323 Fixed an issue where firewalls running in FIPS‐CC mode did not allow import of SHA‐1 CA
certificates even when the private key was not included; instead, firewalls displayed the
following error: Import of <cert name> failed. Unsupported digest or keys used
in FIPS-CC mode.
PAN-69882 Fixed an issue where firewalls that had multiple virtual systems and that were deployed in
an HA active/active configuration dropped TCP sessions.
PAN-69622 Fixed an issue where the firewall did not properly close a session after receiving a reset
(RST) message from the server when the SYN Cookies action was triggered.
PAN-68934 Fixed an issue where the SNMP object panSessionActiveSslProxyUtilization contained
inaccurate data.
PAN-68873 Fixed an issue where customizing the block duration for threat ID 40015 in a Vulnerability
Protection profile did not adhere to the defined block interval. For example, if you set the
Number of Hits (SSH hello messages) to 3 and per seconds to 60, after three consecutive
SSH hello messages from the client, the firewall failed to block the client for the full 60
seconds.
PAN-68520 Fixed an issue where having multiple IPSec IKE gateways configured to the same peer IP
address caused VPN tunnels to flap.
Issue ID Description
PAN-68431 Fixed an issue where firewalls and Panorama failed to send SNMPv3 traps if you
configured the service route to forward the traps over a dataplane interface.
PAN-68210 Fixed an issue where administrators with custom roles could not use the firewall CLI to
change the HA state or initiate HA synchronization for the firewall.
PAN-68185 Fixed an issue where the 7.1 SNMP traps MIB file (PAN‐TRAPS.my) had an incorrect
description for the panHostname attribute.
PAN-67629 Fixed an issue where existing users were removed from user‐group mappings when the
Active Directory (AD) did not return an LDAP Page Control in response to an LDAP
refresh, which resulted in the following User‐ID (useridd) logs:
debug: pan_ldap_search(pan_ldap.c:602): ldap_parse_result error code: 4
Error: pan_ldap_search(pan_ldap.c:637): Page Control NOT found
PAN-67599 In PAN‐OS 7.0 and 7.1 releases, a restriction was added to prevent an administrator from
configuring OSPF router ID 0.0.0.0. This restriction is removed in PAN‐OS 7.1.9.
PAN-67503 Fixed an issue where the firewall automatically rebooted when you ran a Correlated
Events query with more than 15 OR operators.
PAN-67029 Fixed an issue where the firewall stopped forwarding logs to external services (such as a
syslog server) after the firewall management server restarted unexpectedly.
PAN-66610 Fixed an issue where memory usage errors occurred if the PAN‐OS integrated User‐ID
agent was monitoring numerous servers for login events. With this fix, the User‐ID agent
queries five servers at a time to prevent the firewall from exhausting memory.
If you check Status (Device > User Identification > User Mapping > Server
Monitoring) during the initial attempt by the PAN‐OS integrated User‐ID agent to
learn IP address‐to‐username mappings (or relearn mappings after a User‐ID
process restart, HA failover, or firewall reboot), you will see Connected status
only for those servers for which the agent has already begun to learn mappings. All
servers will display as Connected when the agent begins to learn mappings for
the last set of servers.
PAN-66399 Fixed an issue where the active firewall in an HA active/passive configuration did not
synchronize GlobalProtect certificates with the passive firewall, which caused a commit
failure on the passive firewall.
PAN-66104 Fixed an issue where the firewall displayed shared response pages instead of the custom
response pages (Captive Portal, URL continue, and URL override) that were configured for
specific virtual systems.
PAN-65969 Fixed an issue on PA‐7000 Series firewalls where the Switch Management Card (SMC)
restarted due to false positive conditions (ATA errors) detected during a disk check.
PAN-65939 Fixed an issue where you could not download WildFire private cloud updates because the
firewall checked for the updates using a proxy server even when you configured the
firewall not to Use Proxy Settings for Private Cloud (Device > Setup > WildFire).
PAN-65669 Fixed an issue where the firewall did not apply a VLAN tag to BFD traffic on a VLAN
subinterface.
PAN-64436 Fixed an issue on PA‐7000 Series firewalls where creation of IGMP sessions failed
because they were stuck in an OPENING state or the wrong state.
PAN-64317 Fixed an issue where IPv6 neighbor discovery failed intermittently due to a corrupted
neighbor table.
Issue ID Description
PAN-63856 Fixed an issue where memory issues caused User‐ID processes to restart when multiple
firewalls redistributed a large number of IP address‐to‐username mappings.
PAN-63641 Fixed an issue where the firewall failed to establish connections from some virtual systems
to Windows‐based User‐ID agents and Terminal Services agents.
PAN-63520 Fixed an issue where the firewall used the wrong source zone when logging virtual
system‐to‐virtual system sessions.
PAN-63013 Fixed an issue where a commit validation error displayed when Panorama running a
PAN‐OS 7.1 or later release pushed a template configuration with a modified WildFire File
Size Limits setting (Device > Setup > WildFire) to a firewall running a PAN‐OS 7.1 or earlier
release.
PAN-62622 Fixed an issue where Traffic logs indicated a session was decrypted even though it
matched a Decryption policy rule that specifies no decryption and even though no
decryption occurred.
PAN-62338 Fixed an issue where the firewall performed NAT translation incorrectly on the passive IP
address in data packets when sending passive FTP connections over a proxy tunnel.
PAN-62015 Fixed an issue on PA‐7000 Series firewalls where, when creating the key for a GRE packet,
the firewall did not use the same default values for the source and destination ports in the
hardware and software, which slowed the firewall performance.
PAN-61439 Fixed an issue where a Panorama management server that was not connected to the
internet failed to deploy content updates to Log Collectors when you chose to Install
From File.
PAN-61300 Fixed an issue where removing and adding a large number of Security policy rules caused
Traffic logs to lose their rule name field, which resulted in a commit failure.
PAN-61252 Fixed an issue on firewalls in an HA active/active configuration where the floating IP
address was not active on the secondary firewall after the link went down on the primary
firewall.
PAN-60333 Fixed an issue where the firewall deployed in an HA active/active configuration with
asymmetric routing dropped packets in TCP, ICMP, and UDP traffic.
PAN-59654 Fixed an issue where commits failed on the firewall after upgrading from a PAN‐OS 6.1
release due to incorrect settings for the HexaTech VPN application on the firewall. With
this fix, upgrading from a PAN‐OS 6.1 release to PAN‐OS 7.1.9 (or a later release) does not
cause commit failures related to these settings.
PAN-59542 Fixed an issue on firewalls with multiple virtual systems where the web interface displayed
the Trusted Root CA option as disabled in certificates for which the option was actually
enabled.
PAN-59275 Fixed an issue where processing Oracle application traffic caused the firewall to reboot.
PAN-58382 Fixed an issue where users were matched to the incorrect security policies.
PAN-58212 Fixed an issue where the dataplane restarted unexpectedly when firewalls deployed in an
HA configuration missed heartbeats.
PAN-57888 Fixed an issue where the App Scope Traffic Map did not display the correct location of
Samoa.
Issue ID Description
PAN-57529 Fixed an issue where the firewall acted as a DHCP relay and no wireless devices on a
VLAN received a DHCP address (all other devices on the VLAN did receive a DHCP
address). With this fix, all devices on a VLAN receive a DHCP address when the firewall
acts as a DHCP relay.
PAN-57520 Fixed an issue where firewalls stopped connecting to Panorama when the root CA server
certificate on Panorama expired. With this fix, Panorama replaces the original certificate
with a new certificate that expires in 2024.
PAN-57440 Fixed an issue where OSPFv3 link‐state updates were sent with the incorrect OSPF
checksum when the OSPF packet needed to advertise more link‐state advertisements
(LSAs) than fit into a 1,500‐byte packet. With this fix, the firewall sends the correct OSPF
checksum to neighboring switches and routers even when the number of LSAs doesn’t fit
into a 1,500‐byte packet.
PAN-57349 Fixed an issue where numerous SSL sessions exhausted the memory pool that the firewall
required to insert new certificates in its certificate cache.
PAN-57155 Fixed an issue where custom reports did not display a value for Day Received when
running the report on demand (Run Now) while the web interface language was set to
Japanese. (This was not an issue when exporting the report as a PDF, CSV, or XML file.)
PAN-55536 Fixed an issue where commit failures caused by the firewall commit queue being full did
not display the correct error message.
PAN-55048 Fixed an issue where the firewall did not forward logs in the syslog format that you
selected.
PAN-52739 Fixed an issue where virtual system administrators saw commit warnings for virtual
systems that were outside the scope of their administrative role privileges.
PAN-49764 Fixed an issue where SNMP traps that the firewall generated did not include its system
name or hostname.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
PAN-73699 Fixed an issue where UDP IPv6 fragmented packets were dropped due to an
incorrect defrag packet attached to the session bind nack message.
PAN-73291 Fixed an issue where authentication failed for client certificates signed by a CA
certificate that was not listed first in the Certificate Profile configured with client
certificate authentication for GlobalProtect portals and gateways.
PAN-72952 Improved file‐type identification for Office Open XML (OOXML) files, which
improves the ability for WildFire to accurately classify OOXML files as benign or
malicious.
PAN-72616 Fixed an issue on PA‐7000 Series firewalls where sessions were dropped with the
flow_bind_pending_full message when using Ethernet IP (etherip) protocol 97,
which resulted in unstable connections and delayed responses.
PAN-71892 Fixed an issue where an LDAP profile did not use the configured port; the profile used
the default port, instead.
PAN-71829 Fixed an issue on PA‐5000 Series firewalls where the dataplane restarted due to
specific changes related to certificates or SSL profiles in a GlobalProtect
configuration—specifically, configuring a new gateway, changing a certificate linked
to GlobalProtect, or changing the minimum or maximum version of the TLS profile
linked to GlobalProtect.
PAN-71556 Fixed an issue where MAC address table entries with a time‐to‐live (TTL) value of 0
were not removed as expected, which caused the table to continually increase in size.
PAN-71384 Fixed an issue with the passive firewall in a high availability (HA) configuration that
had LACP pre‐negotiation enabled where the firewall stopped correctly processing
LACP BPDU packets through an interface that had previously physically flapped.
PAN-71215 Fixed an issue where deactivating a VM‐Series firewall from Panorama failed and
caused the firewall to become unreachable when the Verify Update Server Identity
setting was enabled in Panorama (Panorama > Setup > Services > Verify Update
Server Identity) but disabled on the firewall.
PAN-70969 Fixed an issue on a virtual wire where, if you enabled Link State Pass Through
(Network > Virtual Wires), there were significant delays in link‐state propagation or
even instances where an interface stayed down permanently even when ports were
re‐enabled on the neighbor device.
Issue ID Description
PAN-70923 Fixed an issue where the User‐ID process (userid) stopped responding when the
firewall was having connectivity issues with one of the LDAP servers.
PAN-70428 A security‐related fix was made to prevent inappropriate information disclosure to
authenticated users (CVE‐2017‐5583 / PAN‐SA‐2017‐0005).
PAN-70371 Fixed an issue where RADIUS challenge‐based authentication failed when user input
included uppercase characters.
PAN-69906 Fixed an issue where SNMP packets caused a decoder loop that resulted in high
dataplane CPU usage.
PAN-69479 Fixed an issue where renaming a template broke the configuration for any NSX
service profile zones within that template.
PAN-69340 Fixed an issue where the capacity license was not applied when you used a license
authorization code (capacity license or a bundle) to bootstrap a VM‐Series firewall
because the firewall did not reboot after the license was applied.
PAN-69194 Fixed an issue where performing a device group commit from a Panorama server
running version 7.1 to managed firewalls running PAN‐OS 6.1 failed to commit when
the custom spyware profile action was set to Drop. With this fix, Panorama translates
the action from Drop to Drop packets for firewalls running PAN‐OS 6.1, which allows
the device group commit to succeed.
PAN-68766 Fixed an issue where navigating to the IPSec tunnel configuration in a Panorama
template caused the Panorama management web interface to stop responding and
displayed a 502 Bad Gateway error.
PAN-68489 Fixed an issue where the management interface configured for DHCP caused FQDN
resolution to fail.
PAN-68074 A security‐related fix was made to address CVE‐2016‐5195 (PAN‐SA‐2017‐0003).
PAN-68072 Fixed an issue on VM‐Series firewalls where rebooting or configuring a new L3
interface caused the IP range configured on a disabled interface to be incorrectly
installed in the FIB and routing table if you disabled the interface from the vSwitch.
PAN-68062 Fixed an issue where the firewall failed to apply the correct action if the vulnerability
profile had a very long list of CVEs. With this fix, the firewall is able to support up to
64 CVEs per vulnerability rule. If the number of CVEs in the rule is more than 64, the
firewall displays a warning when you commit configuration changes.
PAN-68034 The netstat CLI command was removed in the 7.1 release for Panorama, Panorama
log collector, and WildFire. With this fix, the netstat command is reintroduced.
PAN-67944 Fixed an issue where a process (all_pktproc) stopped responding because a race
condition occurred when closing sessions.
PAN-67090 Fixed an issue where the web interface displayed an obsolete flag for the nation of
Myanmar.
PAN-67086 Fixed an issue on PA‐7000 Series firewalls where the PA‐7000‐20GQXM‐NPC and
PA‐7000‐20GQ‐NPC cards could not achieve more than 16Gbps throughput for
non‐offloaded traffic. With this fix, the cards can reach the maximum specified
throughput of 20Gbps.
PAN-66838 A security‐related fix was made to address a Cross Site‐Scripting (XSS) vulnerability
on the management web interface (CVE‐2017‐5584 / PAN‐SA‐2017‐0004).
Issue ID Description
PAN-66688 Fixed an issue with memory leaks associated with the routed process when allocated
memory was not released when no longer needed.
PAN-66436 Fixed an issue where a role‐based Panorama administrator could not perform a
configuration audit after context‐switching to a firewall.
PAN-64889 Fixed an issue on Panorama where attempting to configure dynamic IP objects using
the XML API failed, preventing the configuration from being pushed to the managed
firewalls.
PAN-64711 Fixed an issue where the predict session incorrectly used the policies of the parent
session.
PAN-64638 Fixed an issue where the firewall failed to send a RADIUS access request after
changing the IP address of the management interface.
PAN-64588 Fixed an issue where custom reports did not populate correctly when grouped by
source country.
PAN-64525 Fixed an issue where User‐ID failed to update the allow list for a group name that was
larger than 128 bytes.
PAN-64520 Fixed an issue where H.323‐based video calls failed when using source NAT (dynamic
or static) due to incorrect translation of the destCallSignalAddress payload in the
H.225 call setup.
PAN-64164 Fixed an issue on Panorama virtual appliances in an HA configuration where, if you
enabled log forwarding to syslog, both the active and passive peers sent logs. With
this fix, only the active peer sends logs when you enable log forwarding to syslog.
PAN-64081 Fixed an issue on PA‐5000 Series firewalls where the dataplane stopped responding
due to a race condition during hardware offload.
PAN-63798 Fixed an issue where usernames were displayed in logs and reports when privacy
settings in admin role was configured to prevent their display.
PAN-63204 Fixed an issue where the firewall incorrectly assigned an expired User‐ID IP mapping
for 30 seconds after the original mapping had expired.
PAN-63054 Fixed an issue on VM‐Series firewalls where enabling software QoS resulted in
dropped packets under heavy traffic conditions. With this fix, VM‐Series firewalls no
longer drop packets due to heavy loads with software QoS enabled and software
QoS performance in general is improved for all Palo Alto Networks firewalls.
PAN-62822 Fixed an issue where the firewall dropped RTP traffic matching a predict session
when a video call initiated from the external side of a shared gateway. With this fix,
when a predict session goes across a different vsys or a shared gateway, the firewall
uses the egress interface's vsys to lookup the destination zone instead of the
session's vsys.
PAN-62319 Fixed an issue where multicast entries were pointing to the wrong rendezvous point
(RP) IP address because a recycled interface ID allocated for PIM register
encapsulation retained an old tunnel interface that pointed to the wrong RP.
PAN-62074 Fixed an issue where the User‐ID agent incorrectly read the IP address in the security
logs for Kerberos login events.
Issue ID Description
PAN-62057 Fixed an issue where the GlobalProtect agent failed to authenticate using a client
certificate that had a signature algorithm that was not SHA1/SHA256. With this fix,
the firewall provides support for the SHA384 signature algorithm for client‐based
authentication.
PAN-62038 Fixed an issue where configurations committed from Panorama stalled at 99% and
failed to complete.
PAN-61837 Fixed an issue on PA‐3000 Series and PA‐5000 Series firewalls where the dataplane
stopped responding when a session crossed vsys boundaries and could not find the
correct egress port. This issue occurred when zone protection was enabled with a
SYN Cookies action (Network > Zone Protection > Flood Protection).
PAN-61304 Fixed an issue where certain Access Domain users (such as vsys administrators) were
not able to log in to the web interface on the firewall; instead, they received the
following error: Could not find role profile in running config.
PAN-60797 Fixed an issue where read‐only superusers were able to view threat packet captures
(pcaps) on the firewall but received an error (“File not found”) when they attempted
to export certain types of pcap files (threat, threat extpcap, app, and filtering).
PAN-60662 Fixed an issue on devices where commits failed due to issues with a process (authd).
PAN-60630 Fixed an issue where the server‐to‐client (s2c) flow for RTP predicted sessions were
not correctly matching a policy‐based forwarding (PBF) rule.
PAN-60591 Fixed an issue where a custom role administrator with commit privileges could not
commit configurations using the XML API.
PAN-60402 Fixed an issue where renaming an address object caused the commit to a Device
Group to fail.
PAN-59204 Fixed an issue where the firewall did not create an IPSec NAT‐T session after a tunnel
re‐key until it originated a tunnel keep‐alive. When this issue occurred, the firewall
dropped NAT‐T packets.
PAN-58496 Fixed an issue where custom reports using threat summary were not populated.
PAN-58411 Fixed an issue where PA‐7000 Series firewalls were sending report requests even
when the debug skip-condor reports CLI command was set to no.
PAN-57434 Fixed an issue where the firewall reset connections instead of sending an SMTP 5.4.1
error message when SMTP traffic was blocked after detecting a vulnerability
signature. With this fix, the firewall sends an SMTP 5.4.1 error message when SMTP
traffic is blocked due to a vulnerability signature.
PAN-57338 Fixed an issue where a slow file descriptor leak between two processes (mgmtsrvr and
pan_log_receiver) caused the log receiver to stop responding and degraded
management server performance. This issue occurred after a long device up time
(more than 380 days).
PAN-56839 Fixed an issue where the dataplane stopped responding when a change to the
Aggregate Ethernet (AE) link configuration was committed, resulting in an
unexpected path monitoring condition.
PAN-56700 Fixed an issue where the SNMP OID ifHCOutOctets did not contain the expected
data.
Issue ID Description
PAN-56684 Fixed an issue where DNS proxy static entries stopped working when there were
duplicate entries in the configuration.
PAN-56531 Fixed an issue where you could not select a configured decrypt interface (it did not
display) in the Decrypt Mirror drop‐down (Device Groups > Objects > Decryption
Profile) when the firewall or appliance was part of a template stack but not a
template.
PAN-55035 Fixed an issue where CSV exports of system logs from the web interface did not
enclose strings containing commas in quotes, which broke the formatting of the
entries. With this fix, strings containing commas are enclosed in double quotes.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
PAN-70349 Fixed an issue where external dynamic list (EDL) objects lost IP addresses and
returned 0.0.0.0 when two or more EDL objects used in a security policy referenced
the same source URL.
PAN-69546 Fixed an issue on firewalls in an HA active/passive configuration where, if you
enabled LACP pre‐negotiation, the egress interface on the passive firewall
transmitted packets that should have been filtered, which caused packet loss when
neighboring switches incorrectly forwarded traffic to the passive firewall. With this
fix, the passive firewall correctly filters egress traffic.
PAN-69485 Fixed an issue where User‐ID group mapping did not retain groups retrieved from
Active Directory (AD) servers if there were any invalid groups in the group‐mapping
include list.
PAN-68487 Fixed an issue where the web interface displayed 24 ports instead of 14 ports for the
PA‐7000‐20GQXM‐NPC network processing card.
PAN-68045 Fixed an issue on PA‐7000 Series firewalls where forwarding to WildFire failed due
to an incorrect calculation of file size.
PAN-67986 Fixed an issue where the dataplane restarted due to a corruption in the QoS queue
pointer.
PAN-67587 Fixed a rare condition where a dataplane process (all_pktproc) stopped responding.
PAN-67079 Fixed an issue in PAN‐OS 7.1.6 where SSL sessions were discarded if the server
certificate chain size exceeded 23KB.
PAN-66540 Fixed an issue where the management interface and HA interfaces flapped during
installation of a software upgrade, which caused HA failover or split brain.
PAN-65738 Fixed an issue on firewalls in active/active configuration where a newly created BFD
profile disappeared after you performed a commit operation on either of the peers.
PAN-64662 Fixed an issue where latency intermittently spiked over 3ms for IPSec traffic. With
this fix, the conditions that contributed to latency spikes are addressed.
PAN-64626 Fixed an issue where a memory leak occurred on a process (authd) after each commit,
which caused restarts of another process (mgmtsrvr) and affected access to the web
interface.
PAN-64435 Fixed an issue on Panorama virtual appliances where a process (configd) experienced
high memory usage and stopped responding, which caused commits to fail.
Issue ID Description
PAN-64321 Fixed an issue where Panorama did not update the names of log forwarding profiles
and zone protection profiles in a template stack after renaming, which caused failures
when pushing the configuration to devices.
PAN-63901 Fixed an issue where TCP sequence numbering shifted when the firewall performed
a decrypted session tear down in the case of a fatal alert.
PAN-63796 Fixed an issue on PA‐7000 Series firewalls where internal looping of tunnel creation
packets caused high dataplane CPU usage.
PAN-63038 Fixed an issue on Panorama where traffic logs retrieved by XML API query displayed
IP addresses with subnet notation instead of full IP addresses. This issue occurred
when the administrator using the query had a custom privacy configuration in the
web interface that had Show Full IP Addresses disabled.
PAN-63021 Fixed an issue where policy‐based forwarding (PBF) symmetric return traffic
enforcement failed intermittently because return MAC address entries aged‐out
prematurely. With this fix, the firewall enforces symmetric return even when PBF
return MAC entries age out.
PAN-62944 Fixed an issue where the management server process stopped responding when a
Commit All job was initiated from Panorama, which prevented managed devices
from reporting the commit job status back to Panorama. As a result, the commit job
appeared stalled in Panorama even after commits were successfully completed on
the managed devices.
PAN-62212 Fixed an issue where the Global Find window was grayed‐out and non‐functional if
you accessed it from the Browse link when configuring an address object in a security
policy.
PAN-62050 Fixed an issue where a User‐ID redistribution loop caused high management plane
CPU usage. This issue occurred when the User‐ID redistribution configuration
included three or more firewalls, and the firewall encountered the same IP address
and timestamp for different users.
PAN-61742 Fixed an issue where the firewall incorrectly identified BGP traffic as traceroute
traffic, causing the wrong policy to be applied to the traffic.
PAN-61643 Fixed an issue where locally created certificates had duplicate serial numbers
because the firewall did not check the serial numbers of existing certificates signed
by the same CA when generating new certificates.
PAN-61367 Fixed an issue where the firewall failed to send a TCP reset (RST) to the client‐side
and server‐side devices when an application had a reset-both deny action in its
security policy.
PAN-60222 Fixed an issue where Panorama allowed you to configure a decryption type on No
Decrypt policies. When Panorama pushed these policies to firewalls, it set the
decryption type to the default value SSL Forward Proxy. With this fix, when you
select No Decrypt as a policy rule action, Panorama disables configuration of the
decryption type.
PAN-60182 In response to an issue where LACP flapped intermittently due to negotiation
failures, priority for LACP processing is enhanced to mitigate flapping, and additional
debug options are added to help isolate negotiation failures.
Issue ID Description
PAN-59870 Fixed an issue where purged software packages appeared in the list of uploaded
software packages. With this fix, the software list will no longer display purged
software packages.
PAN-59669 Fixed an issue where Online Certificate Status Protocol (OCSP) verification failed
when using non‐CA certificates. With this fix, you can configure a non‐CA certificate
as an OCSP Verify certificate (Device > Certificate Management > Certificates
Profile > Add). Note that if you use a non‐CA certificate and then downgrade to a
PAN‐OS release that does not include this fix, auto‐commits will work, but manual
commits will fail.
PAN-58744 Fixed an issue where IPSec VPN tunnels failed to establish if you used dynamic VPNs
and mixed IKEv1 and IKEv2 on the static device.
PAN-58582 Fixed an issue where the hostname obtained from a Panorama template for a firewall
reverted to the default hostname. This issue occurred after the management server
process on the firewall (mgmtsrvr) restarted following an event such as a PAN‐OS
update or firewall restart.
PAN-57874 Fixed an issue where IPSec tunnels flapped randomly because a race condition
between two processes (mprelay and pan_task) caused duplicate tunnel monitoring
ICMP packets with the same sequence numbers to be sent, which disrupted IPSec
tunnel state.
PAN-57360 Fixed an issue where the management server process (mgmtsrvr) had an
out‐of‐memory condition and restarted, causing a loss of uncommitted changes.
PAN-57181 Fixed an issue on Panorama in an HA configuration where synchronization failed
after a commit with the message, Committing mgt settings failed. Could not
read merged running config from file. This issue occurred when WildFire
updates created a race condition with HA synchronization.
PAN-56569 Fixed an issue where the top half of text lines failed to display correctly in the PDF
version of the App Scope Threat Monitor Report (Monitor > App Scope > Threat
Monitor).
PAN-56189 Fixed an issue where a custom role administrator who had threat log viewing
privileges disabled could view threat logs in the Unified log view.
PAN-55747 Fixed an issue where websites failed to load properly if you enabled SSL decryption.
This issue occurred due to an error in the handling of URL block pages and captive
portal redirects.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
PAN-68586 Fixed an issue where adding, removing, or modifying the Import/Export rules in a
BGP configuration caused BFD and BGP neighbor state to flap.
PAN-67730 Fixed an issue where a process (l3svc) stopped responding multiple times with the
message l3scv: Exited 4 times, waiting xxxx seconds to retry. With this
fix, the failing process (l3svc) will no longer exit inadvertently.
PAN-67231 Fixed an issue on PA‐5000 Series and PA‐3000 Series firewalls where the dataplane
restarted when processing traffic that had an incorrectly set IPv4 Reserved Flag.
PAN-66991 Fixed an issue where, if the firewall received an empty SCEP authentication cookie
from a GlobalProtect agent, a process (ssl‐mgr) on the firewall restarted. With this fix,
the process does not restart when it receives an empty authentication cookie (the
cookies are transparent to the user and cannot be configured).
PAN-66677 Fixed an issue on PA‐5000 Series firewalls where traffic looped infinitely between
dataplanes, which caused a loss of the affected traffic and a spike in CPU
consumption.
PAN-66250 Fixed an issue on log collectors where a deadlock occurred for inter‐log collector
connections, which caused connectivity issues between log collectors and between
firewalls and log collectors. This issue also caused local buffering of logs on the
firewall. With this fix, log collector connection processing has been modified to
eliminate these issues.
PAN-66210 Fixed an issue where a dataplane process failed to restart due to a missing or corrupt
file, which caused the network processing card (NPC) to restart.
PAN-65996 Fixed an issue where, if a connection to the LDAP server failed, the authentication
process (authd) stopped processing GlobalProtect user authentication requests, and,
eventually, all subsequent successful authentication requests were dropped because
the retry‐interval flag was not set correctly. With this fix, authentication functions
normally after the retry interval.
PAN-64796 Fixed an issue where a process (logrcvr) consumed more memory than expected
when a WildFire update occurred if you enabled correlation objects (Monitor >
Automated Correlation Engine > Correlation Objects).
PAN-64727 Fixed an issue where the firewall changed the sequence numbers of forwarded TCP
keep‐alive packets.
Issue ID Description
PAN-64582 Fixed an issue where a memory leak prevented secure websites from loading
correctly if the URL filtering configuration blocked some objects on the page and a
decryption profile rule applied “No Decrypt” to the website.”
PAN-64368 Fixed an issue on PA‐7000 Series firewalls where, if you applied a Quality of Service
(QoS) profile to an Aggregated Ethernet (AE) interface, the QoS statistics reported a
maximum egress for the AE interface that differed from the sum of the egress values
of the individual interfaces in the aggregate. With this fix, QoS statistics correctly
report the configured QoS value of the AE interface.
PAN-64361 Fixed an issue where the DNS proxy failed for DNS traffic that used TCP as the
transportation protocol and DNS servers contained DNS records with a very large
number of entries (more than 100).
PAN-64360 Fixed an issue where the firewall failed to populate the email sender, recipient, and
subject information for WildFire reports.
PAN-64263 Fixed an issue where forward‐proxy decryption failed if the server certificate record
size exceeded 16KB.
PAN-63928 When a limited‐role user accessed the web interface on the firewall and made
changes from the Panorama context, the firewall applied an automated commit lock
that could not be removed from that user.
PAN-63818 Fixed an issue on Panorama where, after you added a zone to a template, the zone
failed to show up in the drop‐down when choosing the source in a security policy.
PAN-63800 Fixed an issue where, if you enabled decryption on the firewall with a decryption
profile that did not use Diffie‐Hellman (DHE) and Elliptic Curve Diffie‐Hellman
(ECDHE) ciphers, the firewall sent an elliptic curve extension in the Client Hello,
which caused the server to decline the connection.
PAN-63315 Fixed an issue where the custom response page for URL overrides failed to display.
PAN-63142 Fixed an issue where the dataplane restarted when processing IPv6 traffic that
matched a predict session.
PAN-63080 Fixed an issue where a process (websrvr) stopped responding, which caused the
captive portal to not function. This issue occurred when you had a custom response
page that used a large binary object.
PAN-63073 Security‐related fixes were made to prevent denial of service attacks against the web
management interface (PAN‐SA‐2016‐0035).
PAN-62782 Fixed an issue where an LDAP query that terminated before completion resulted in a
memory corruption.
PAN-62385 Fixed an issue where, if the firewall lost connectivity with an LDAP server or if you
applied an invalid query filter, and the disruption occurred during a User‐ID group
mapping update, the firewall deleted existing user‐group mappings. With this fix,
disruptions during a User‐ID group mapping update will cause the firewall to stop
adding new user‐group mappings, but does not delete existing user‐group mappings.
PAN-62261 Fixed an issue where the DNS proxy failed for DNS traffic that used TCP as the
transportation protocol.
PAN-62188 Fixed an issue where, if you configured a large number of FQDN objects, the firewall
required multiple commits to refresh the objects.
Issue ID Description
PAN-61554 Fixed an issue where a memory leak in a process (authd) caused all authentications to
the firewall to fail.
PAN-61547 Fixed an issue where a process (snmpd) had a memory leak that caused frequent
SNMP restarts.
PAN-61543 Fixed an issue where, after you committed a push from the Panorama web interface
to a device, the commit job appeared to stall at 0% complete even the Panorama
successfully pushed the configuration.
PAN-61468 A security‐related fix was made to address CVE‐2016‐6210 (PAN‐SA‐2016‐0036).
PAN-61436 Fixed an issue where SSL Forward Proxy decryption failed with the error
Unsupported Version if the server returned a very large certificate. With this fix,
decryption succeeds even for very large certificates.
PAN-61428 Fixed an issue where the firewall allowed a GlobalProtect client to connect without
validating the client certificate.
PAN-61104 A security-related fix was made to address a local privilege escalation issue
(PAN-SA-2016-0034).
PAN-60893 Fixed an issue where the API command show object registered-ip all option
count failed to produce the correct output where there were more than 500
registered entries. When this issue occurred, the command returned a file location
for a file that listed the IP addresses instead of returning a count. With this fix, the
API command functions correctly where there are more than 500 registered entries
and returns the same output as the equivalent CLI command.
PAN-60390 Fixed an issue on Panorama where, if a RADIUS user logged in and tried to commit a
configuration change, the commit window appeared and then disappeared before it
could be read by the user.
PAN-59715 Fixed an issue where the GlobalProtect agent disconnected from the GlobalProtect
gateway under high traffic loads. This issue occurred when the connections
employed SSL tunnels instead of IPSec tunnels.
PAN-59532 Fixed an issue where, if you imported a device configuration into Panorama, and then
pushed the configuration to a firewall, the commit failed with the error region
unexpected here.
PAN-59411 Fixed an issue where a process (logrcvr) stopped responding, which caused commit
and OSPF adjacency failures. With this fix, the process uses the correct buffer size to
prevent the fault.
PAN-58822 Fixed an issue where the firewall blocked a static route configuration for the IPv4
destination 0.0.0.0/1. With this fix, the firewall allows configuration of static route
entries in the range of 0.0.0.0/[0‐7].
Issue ID Description
PAN-58673 Fixed an issue where the firewall did not use a second LDAP server for authentication
if the first LDAP server was unreachable.
PAN-58618 Fixed an issue where the firewall dataplane restarted if you enabled data leak
prevention (DLP).
PAN-58602 Fixed an issue where a Panorama template commit to a firewall failed with the error
LDAP is missing 'ssl'. This issue occurred when the firewall operated in CCEAL4
mode.
PAN-58589 Fixed an issue where the dataplane restarted when an out‐of‐memory condition
occurred on a process (pan_comm).
PAN-58526 Fixed an issue where Kerberos authentication to the Captive Portal was unsuccessful
if the Kerberos token was larger than 8,000 bytes.
PAN-58516 Fixed an issue on PA‐500 and PA‐2000 Series firewalls where corruption of an
instruction cache caused the firewall to restart. This issue occurred after the firewall
was in continuous operation without a restart for hundreds of days.
PAN-58508 Fixed an issue where the firewall tried to create IP address‐to‐username mappings
for IP addresses in the zone exclude list if the addresses were configured as address
objects.
PAN-58413 Fixed an issue on firewalls and Panorama where, if you attempted to manually upload
a software image that was larger than 1GB from the web interface, the upload failed
with the error Upload file size exceeded system limit. With this fix, the firewall
and Panorama size limit on software image uploads is increased.
PAN-58410 Fixed an issue on VM‐Series firewalls in an HA configuration where an interface on
the active firewall displayed its status as ukn/ukn/down(autoneg) after a failover
occurred.
PAN-57946 Fixed an issue on the M‐100 appliance where a configuration for a subnet in the
permitted IP addresses of interface Eth1 or Eth2 failed to take effect.
PAN-57787 Fixed an issue on Panorama where, if you used the CLI replace command to replace
a device serial number, Panorama updated the managed device serial number but did
not update the serial number in the deployment schedule or in custom reports.
PAN-57593 Fixed an issue where a decryption policy stopped decrypting SSL traffic if you
enabled Wait for URL on SSL decryption.
PAN-57514 Fixed an issue where correlation logs forwarded from Panorama to an external syslog
server contained a dash (-) instead of the Panorama hostname.
PAN-57358 Fixed an issue on Panorama where, if you tried to import a device state bundle in the
device context (Device > Operation > Import), the import failed with the error
message Error in copying file. With this fix, device state import works as
expected.
Issue ID Description
PAN-57145 Fixed an issue where, if the firewall performed IP and port NAT in the path of a
GlobalProtect Large Scale VPN (LSVPN) IPSec tunnel, a re‐key caused the firewall
side to temporarily change back to the default port number for the new tunnel, and
the intermediate NAT device dropped traffic until the old tunnel timed out or was
deleted manually. With this fix, when a re‐key happens, the firewall searches and
applies the correct port number to the new tunnel immediately, which prevents
traffic drops.
PAN-57121 Fixed an issue where a VM‐Series firewall that was in FIPS‐CC mode could not
connect to a Panorama server that was in normal mode.
PAN-56969 Fixed an issue where the firewall did not record X‐Forwarded‐For (XFF), User‐Agent,
or Referral HTTP headers in the URL log if the traffic was blocked or reset by a
security profile even when HTTP header logging was enabled and the traffic
contained those fields. With this fix, the firewall correctly logs the HTTP Headers.
PAN-56831 Fixed an issue on PA‐7000 Series firewalls where, if the firewall processed UDP
packets using an inter‐vsys configuration, the packets looped repeatedly from one
dataplane to another and increased dataplane CPU consumption to nearly 100%.
With this fix, the firewall does not create a loop condition and processes the packets
correctly.
PAN-56775 Fixed an issue where a firewall configured to perform a monthly update of the
external dynamic list (EDL) initiated an EDL refresh job every second.
PAN-56438 Fixed an issue where the internal value for block time in the Denial of Service (DoS)
table exceeded the configured block time. This issue occurred on firewalls installed
in an HA configuration.
PAN-56257 Fixed an issue where reverse proxy key log entries did not contain Common Name
(CN) information when a certificate mismatch occurred.
PAN-56009 Fixed an issue on firewalls installed in an HA active/active configuration where
out‐of‐order jumbo packets caused the dataplane to restart, which resulted in a
failover.
PAN-55737 Fixed an issue on PA‐200 firewalls where, after the firewall rebooted and before NTP
synchronization occurred, the firewall reported a reboot time without a timezone
calculation to Panorama.
PAN-55474 Fixed an issue on firewalls in an HA active/passive configuration where, if you
configured the path monitor timers with an aggressive value, the firewalls entered an
unstable state with one node eventually becoming non‐functional.
PAN-55344 Fixed an issue where the web interface limited the high availability (HA) active/active
IPv6 virtual address field to 31 characters.
PAN-55237 A security‐related fix was made to address an XPath injection vulnerability in the web
interface (PAN‐SA‐2016‐0037).
PAN-55196 Fixed an issue where the firewall did not resolve the IPv4 addresses of configured
FQDN objects if you disabled firewalling for IPv6 addresses and you configured
FQDN objects with both IPv4 and IPv6 addresses.
PAN-55190 Fixed an issue where a firewall failed to resolved URLs on the dataplane. This issue
occurred when an out‐of‐memory error caused faults in the URL cache. With this fix,
firewalls handle out‐of‐memory errors correctly, allowing proper resolution of URLs.
Issue ID Description
PAN-54492 Fixed an issue on firewalls and Panorama where SaaS reporting failed and a process
(saas_report_wra) did not exit properly after the reporting failure.
PAN-54279 Fixed an issue where the FTP file transfer of a large number of small files failed
because the firewall did not install the FTP data‐channel session in a timely manner.
PAN-53860 Fixed an issue where SSL decryption did not occur if the SSL handshake was very
large.
PAN-52138 Fixed an issue on firewalls with destination NAT enabled where video calls from
outside the network failed because the firewall did not properly translate connect
packets.
PAN-51703 Fixed an issue where a firewall process (all_pktproc) stopped responding after
upgrading a firewall to a PAN‐OS 7.1 release,
PAN-39257 Fixed an issue where you could forge the URL filtering continue action by modifying
the User‐ID (uid) parameter in the URL presented by the firewall. This issue occurred
in a limited context where a malicious second user clicked on the Continue page alert
on behalf of the actual user.
Starting with PAN‐OS 7.1.5, all unresolved known issues and any newly addressed issues in these release
notes are identified using new issue ID numbers that include a product‐specific prefix. Issues addressed in
earlier releases and any associated known issue descriptions continue to use their original issue ID.
Issue ID Description
PAN-63171 Fixed an issue where, when using the GlobalProtect agent on a Mac OS X endpoint,
the connection from the agent to the GlobalProtect gateway failed and the agent
displayed the error Certificate error. Restart the service?.
PAN-63080 Fixed an issue where, if you had a custom response page that used a large binary
object, a process (websrvr) stopped responding, which caused the captive portal to
not function.
PAN-62803 Fixed an issue where, if you configured GlobalProtect to use certificate‐based
authentication, users on Chromebook endpoints received prompts to log on using
username and password.
PAN-62773 Fixed an issue on VM‐Series firewalls in an HA configuration where synchronization
traffic lead to a condition where the firewall stopped responding.
PAN-62589 Fixed an issue on Panorama where a stack configuration was incomplete and failed
with the error message Failed to create configuration for template, even
though the composing templates had configuration entries present.
PAN-62339 Fixed an issue where a process (websrvr) restarted repeatedly during captive portal
redirects because the redirect URL did not include required vsys and URL arguments.
PAN-61818 Fixed an issue where CPU utilization on the dataplane was higher than expected.
PAN-61815 Fixed a rare issue where VM‐Series firewalls stopped generating traffic, threat or URL
logs, or lost the ability to resolve the URL category.
PAN-61547 Fixed an issue where a process (snmpd) had a memory leak that caused frequent
SNMP restarts.
PAN-61521 Fixed an issue on Panorama where, if you added a User‐ID agent to a template in a
template stack, and one of the templates in the stack did not have a User‐ID agent
specified, you would lose User‐ID agents from templates in the stack.
PAN-61146 Fixed an issue where, if you changed or refreshed an FQDN configuration with a
large number of IP address entries (more than 32 IPV4 and IPV6 entries) in a single
FQDN object, the firewall or Panorama management server stopped responding.
PAN-61046 A security‐related fix was made to address a cross‐site request forgery issue
(PAN‐SA‐2016‐0032).
PAN-60872 Fixed an issue where WildFire falsely identified Microsoft Word files containing
macros as suspicious.
Issue ID Description
PAN-60830 Fixed an issue on firewalls in an HA active‐passive pair where HA configuration sync
failed. This issue occurred when configuration sync from the active firewall happened
while the passive firewall was in a state where a local commit failed. With this fix,
configuration sync from the active firewall overwrites the configuration on the
passive firewall, and configuration sync succeeds.
PAN-60828 Fixed an issue where a process (l3svc) restarted due to missing too many heartbeats,
which caused the Captive Portal to fail to trigger.
PAN-60819 Fixed an issue where the dataplane restarted while processing a chain of tunnel
packets.
PAN-60667 Fixed an issue where a process (devsrvr) restarted repeatedly due to a problem with
the internal URL cache structure.
PAN-60587 Fixed an issue where the firewall did not provide a blocked page response if you
accessed a blocked application over HTTPS.
PAN-60568 A security‐related change was made to address a version disclosure in GlobalProtect
(PAN‐SA‐2016‐0026).
PAN-60444 Fixed an issue where SCEP enrollment failed when parsing CA certificates sent by the
Aruba ClearPass server.
PAN-60002 Fixed an issue where, if you configured virtual routers with OSPF Type‐5 external
routes with non‐zero forward addresses, the routing tables of some virtual routers
did not contain the routes. With this fix, OSPF Type‐5 external routes install as
expected in the virtual routers.
PAN-59778 Fixed an issue where, in very rare cases, the firewall forwarded frames to incorrect
ports because duplicate MAC address entries were present in the offload processor
MAC table. With this fix, the offload processor will not have duplicate MAC address
entries in the MAC table.
PAN-59704 Fixed an issue on VM‐Series firewalls where, if path monitoring for HA used IPv6
addressing, the firewall used the wrong IPv6 address and path monitoring checking
failed.
PAN-59634 Fixed an issue in WildFire that led to a false negative detection on a malicious file.
With this fix, WildFire detects malicious files that launch via powershell.exe.
PAN-59565 Fixed an issue where exported log files did not correctly escape certain characters,
such as commas (,), backslashes (\), and equal‐to operators (=).
PAN-59470 Fixed an issue where the firewall brought down a tunnel that terminated at an IKE
gateway configured for dynamic IP addressing when the IP address of the gateway
changed. With this fix, the firewall does not bring down a tunnel if the IKE gateway
dynamic IP address changes.
PAN-59451 Fixed an issue where the captive portal response page did not display the user's IP
address as specified by the <user/> variable in the HTML code for the page.
PAN-59315 Fixed an issue where a delay occurred on HA failover following a control plane failure
on the active firewall.
Issue ID Description
PAN-59258 Fixed an issue on firewalls in an HA active/active configuration where session
98112 timeouts for some traffic were unexpectedly refreshed after a commit or HA sync
attempt. However, in PAN‐OS 7.1.4, this issue is fixed only for an HA pair where both
peers are running a PAN‐OS 7.1 release; this issue is not fixed in a configuration
where one firewall is running a PAN‐OS 7.1 release and the other is running a
PAN‐OS 7.0 or earlier release.
PAN-58885 Fixed an issue where dataplane CPU usage became excessive.
PAN-58816 Fixed an issue where, if you configured multiple virtual systems (Vsys) with
non‐consecutive identifying numbers, an SNMP poll of the panVsysActiveSessions
OID incorrectly showed zero session values for some virtual systems. With this fix,
SNMP polling output is correct and matches the equivalent CLI output of the same
data.
PAN-58657 Fixed an issue on PA‐7000 Series firewalls where a slot stopped responding due to a
memory condition.
PAN-58322 Fixed an issue where, if you monitored server status from the user interface, the
connection state appeared to toggle between the connected and disconnected states
even though the server remained connected. This issue occurred for servers with
agentless user mapping when you selected Enable Session in Device > User
Identification > User Mapping > Palo Alto Networks User-ID Agent Setup > Server
Monitor.
PAN-58086 Fixed an issue where a process (devsrvr) restarted if you committed a configuration
that used more than 64 vendor IDs in a single vulnerability protection rule. With this
fix, if you commit a configuration with more then 64 vendor IDs in a single rule, you
receive a warning that you have exceeded the maximum number of IDs, and the
process restart does not occur.
PAN-57659 A security‐related fix was made to address a cross‐site scripting (XSS) condition in the
web interface (PAN‐SA‐2016‐0031).
PAN-57464 Fixed an issue where end users experienced delays because the firewall sent an RST
packet without an ACK flag to the client. This issue occurred when the firewall
applied a security policy action of Reset Client or Reset Both.
PAN-57383 Fixed an issue where SSL decrypted traffic that used an unsupported RSA key size of
16384 caused the dataplane to restart.
PAN-57323 Fixed an issue where VPN traffic went into a discard state because the firewall
allowed packets to be sent through the tunnel prior to the completion of the IKE
Phase 2 re‐key process.
PAN-57200 Fixed an issue where you could not restart certain firewall processes from the CLI
without root access. With this fix, you can now restart these processes (bfd, cryptod,
dhcpd, ikemgr, keymgr, and pppoed) using the CLI command debug software
restart process. See CLI Changes in PAN‐OS 7.1 for more information.
PAN-57054 Fixed an issue where, if you redistributed User‐ID mapping information and the
mapping used a timeout value of NEVER, the firewall incorrectly changed the timeout
value to 3600.
Issue ID Description
PAN-56937 Fixed an issue where, if you viewed a configuration diff on the active Panorama
server in an HA pair, a process (configd) restarted on the passive Panorama server.
PAN-56924 Fixed an issue where Panorama incorrectly removed the LDAP domain field when it
pushed a template configuration to a firewall running a PAN‐OS 6.x release. This
issue occurred in a configuration where Panorama used a PAN‐OS 7.x release and
firewalls used a mixture of PAN‐OS 6.x and PAN‐OS 7.x releases.
PAN-56918 Fixed an issue where firewalls did not recognize malware that had been Base64
encoded in a zipped RTF file. This issue occurred during an SMTP session.
PAN-56650 Fixed an issue where a log collector failed to send the system log to the active
Panorama peer in an HA active/passive Panorama configuration after the active peer
restarted.
PAN-56580 Fixed an issue where throughput in an IPSec tunnel was lower than expected. With
this fix, the firewall defaults the DSCP field to 0 for ESP packets to improve
performance.
PAN-56456 Fixed an issue where, if you implemented an authorization profile for OSPF with
MD5 authentication on a firewall configured for FIPS‐CC mode, the dataplane
restarted.
PAN-56438 Fixed an issue where the internal value for block time in the Denial of Service (DoS)
table exceeded the configured block time. This issue occurred on firewalls installed
in an HA configuration.
PAN-56280 Fixed an issue where the firewall displayed the status of a 10G SFP+ virtual wire
interface as 10000/full/up when the configured state of the interface was
auto/auto/down. This issue occurred when Link State Pass Through in Network >
Virtual Wires was enabled.
PAN-56221 A security‐related fix was made to address a cross‐site scripting (XSS) condition in the
web interface (PAN‐SA‐2016‐0033).
PAN-56200 Fixed an issue where the firewall allowed access to the search engine's cached
version of a web page even though the page belonged to a URL category blocked by
a policy.
PAN-56034 Fixed an issue where WildFire platforms experienced nonresponsive processes and
sudden restarts under certain clients' traffic conditions.
PAN-55996 Fixed an issue where the dataplane restarted when processing SSL packets with an
oversized Layer 2 header.
PAN-55993 Fixed an issue where user authentication based on user groups stopped working after
you enabled the multiple virtual systems (multi‐vsys) feature.
PAN-55560 Fixed an issue where a memory condition caused the dataplane to restart with the
message Dataplane is down: too many dataplane processes exited.
PAN-55190 Fixed an issue where the firewall failed to resolved URLs on the dataplane. This issue
occurred when an out‐of‐memory error caused faults in the URL cache. With this fix,
the firewall handles out‐of‐memory errors correctly, allowing proper resolution of
URLs.
PAN-54696 Fixed an issue where incorrect handling of selective‐acknowledgment (SACK)
packets caused a decrease in download speeds on SSL‐decrypted traffic.
Issue ID Description
PAN-54196 Fixed an issue where the firewall did not increment the packet identifier of RADIUS
Access‐Request packets as required by the RFC standard.
PAN-52379 A security‐related fix was made to address CVE‐2015‐5364 and 2015‐5366
(PAN‐SA‐2016‐0025).
PAN-52202 Fixed an issue where Panorama, when configured with a log collector, showed logs
for a previous date and did not refresh the log display to show the latest logs.
PAN-49329 Fixed an issue where a firewall configured to block URL categories over HTTPS did
not send a FIN/ACK to the browser to close the connection after sending a block
page. This issue occurred for firewalls configured to perform NAT.
Issue ID Description
PAN-60681 Fixed an issue where Panorama did not correctly verify Device group objects when
99934 pushing configurations with a large number of objects to firewalls, which caused
commit failures with object validation errors.
97601 Fixed an issue where dataplane CPU usage became excessive.
Issue ID Description
99996 Fixed an issue where the GlobalProtect agent was unable to retrieve an SCEP‐issued
user certificate because the firewall sent an invalid response to the agent, which
caused the agent to stop responding. With this fix, the firewall sends responses that
can be handled by the agent.
PAN-59258 Fixed an issue on firewalls in an HA active/active configuration where session
98112 timeouts for some traffic were unexpectedly refreshed after a commit or HA sync
attempt. However, in PAN‐OS 7.1.4, this issue is fixed only for an HA pair where both
peers are running a PAN‐OS 7.1 release; this issue is not fixed in a configuration
where one firewall is running a PAN‐OS 7.1 release and the other is running a
PAN‐OS 7.0 or earlier release.
98164 Fixed an issue on firewalls where, if you deleted the proxy server configuration for
the AutoFocus service, the configuration remained.
97763 Fixed an issue where a PA‐200 firewall failed to download a PAN‐OS software
update due to an incorrect disk space calculation.
97734 Fixed an issue where the GlobalProtect pre‐logon VPN failed to establish because the
firewall prepended the domain name to pre‐logon user.
97689 Fixed an issue where firewalls stopped responding because dynamic IPSec peers sent
X509_SUBJECT in the Internet Key Exchange (IKE) payload during Phase 1
negotiation.
97625 Fixed an issue on VM‐Series firewalls running on Amazon Web Services (AWS) where
a process (devsrvr) stopped responding after activating the BrightCloud URL filtering
license.
97583 Fixed an issue where, with SSL Forward Proxy Decryption enabled, the firewall
displayed an expired certificate error page to end users even though the certificate
chain was valid because there was an expired certificate on the firewall that was not
part of the chain. With this fix, the firewall does not display the misleading error page.
97571 Fixed an issue where reusing previous port information (tcp‐reuse) for new sessions
caused traffic in those sessions to be dropped.
97549 Fixed an issue on PA‐7000 Series firewalls where the system log message Syslog
connection failed to server appeared repeatedly on the passive firewall of an
active/passive pair when the error condition was not present. With this fix, the
firewall does not display the log message under incorrect conditions.
97466 Fixed an issue where a TCP reassembly failure for a reused TCP session prevented
users from accessing Windows Server 2012 sites and applications.
Issue ID Description
97424 Fixed an issue where firewalls delayed SSL traffic when unable to resolve the URL
category because the Server Certificate Hostname contained a colon character that
the firewall interpreted as a delimiter for a port number.
97357 Fixed an issue where a process (l3svc) stopped responding while processing captive
portal requests that did not have query arguments.
97247 Fixed an issue where a PA‐200 firewall failed to download a content update due to
disk space issues after a failed antivirus update installation. With this fix, the firewall
will, as part of the update installation process, clean up all temporary files even if the
update installation fails.
97160 Fixed an issue where a firewall failed to upgrade to a PAN‐OS 7.1 release—or where
a firewall running a PAN‐OS 7.1 release failed to update to a new content release
version—and started rebooting repeatedly. This issue occurred when the firewall
configuration included an application risk override and the update or upgrade
changed that overridden application to a container (<application>-base). With this
fix, the upgrade or update is successful even if an update or upgrade changes an
overridden application to a container.
97099 Fixed an issue where, after importing the configuration from a Panorama M‐100
appliance to a Panorama M‐500 appliance, you could not select the existing security
profiles and log‐forwarding profiles.
97063 Fixed an issue where User ID group mapping stopped working due to a race
condition.
96937 Fixed an issue where Panorama could not sync to the NSX manager after a reboot or
a failover, which caused a service outage. With this fix, sync works as expected.
96757 Fixed an issue on Panorama where an administrator lost access after trying to commit
a Security policy rule that contained an empty address group.
96679 Fixed an issue where the active‐secondary firewall of an HA active/active pair
displayed the error message 502 Bad gateway instead of an expected URL override
page to end users.
96422 Fixed an issue where a Panorama administrator with custom rights configuration
could not access the commit window because the window flashed and disappeared
after the administrator clicked the Commit button. With this fix, when an
administrator does not have privileges to access a commit function, Panorama
displays an error message that indicates access is denied.
96415 Fixed an issue where the firewall failed to pass traffic in strongSwan and Azure IPSec
tunnels while using IKEv2 because it did not send a Delete payload during a Phase 2
Child SA re‐keying. With this fix, the firewall correctly sends a Delete payload during
re‐keying if it is the node that initiated the re‐keying.
96402 Fixed an issue where a newly active firewall in an HA active/passive pair lost the
ability to send TCP SYN messages to its BGP peers, which resulted in dropped traffic.
Issue ID Description
96184 Fixed an issue where the firewall stopped forwarding logs and discarded logs even
when incoming logging rate was low. With this fix, the processing of logs is optimized
to improve pre‐matching results, and CPU load is reduced to prevent the queue from
becoming full and discarding logs.
96155 Fixed an issue on VM‐Series firewalls where the passive firewall interface in an HA
pair went down, even with Passive Link State set to auto in the HA configuration.
96082 Fixed an issue where the firewall responded to Microsoft network load balancing
(MS‐NLB) multicast packets by incorrectly sending the multicast address as the
source address.
95978 Fixed an issue where firewall did not send all of the supported algorithms in the
signature algorithm extension of client hello when negotiating connections with
some SSL sites accessed from version 50 of the Chrome browser, which caused those
connection attempts to fail.
95864 Fixed an issue where the GlobalProtect portal did not negotiate encryption
algorithms correctly, which caused errors on recent releases of browsers with newly
available stricter checking enabled. After this fix, the portal negotiates the correct
algorithms to eliminate browser errors.
95846 Fixed an issue where deleting the default administrator account on the VM‐Series
firewall in AWS caused the firewall to go into maintenance mode. This occurred
because the firewall, to reboot successfully, required the SSH key associated with the
administrator account (the private key—ssh-key—used to provision the firewall in
AWS). With this fix, as long as you first create another superuser account on the
firewall, you can delete the default administrator account and the firewall will reboot
successfully.
95723 Fixed an issue where authentication failed when you used secure encrypted cookies
if you configured the GlobalProtect portal or gateway to authenticate using an
authentication sequence and then specified a domain\user in the User/User Group
settings of the agent configuration.
95622 Security‐related fixes were made to address issues identified in the May 3, 2016
OpenSSL security advisory (PAN‐SA‐2016‐0020).
95604 Fixed an issue where firewalls configured with OSPFv3 adjacency and AH
authentication header profiles failed to establish full adjacency because the
fragmented OSPFv3 packets failed the AH authentication check.
95591 Fixed an issue where management server would crash due to excessive printing of
debug messages caused by a large number of FQDN requests.
95568 Fixed an issue where configuration commits on firewalls failed because improper
handling of temporary files related to HA sync for registered IP addresses consumed
all available space in the target (pancfg) disk partition. With this fix the firewall
eventually deletes temporary files so they don't accumulate and consume disk space.
Issue ID Description
95466 Fixed an issue where Panorama displayed a false commit warning that indicated a
WildFire scheduled update time overlapped with content updates (Applications,
Threats, and Antivirus). With this fix, PAN‐OS correctly interprets the WildFire
schedule update time and prevents false commit warnings when scheduled update
times do not overlap.
95039 Fixed an issue on VM‐Series firewalls where traffic processing slowed down for two
to three minutes after firewall received a burst of packets on the HA2 data link.
94922 Fixed an issue where emails configured to use the per‐virtual system (vsys) SMTP
service route were sent using the global SMTP service route settings. With this fix,
emails use the configured virtual system SMTP service route.
94615 Fixed an issue on PA‐7000 Series firewalls where the designated Log Card interface
did not transmit a gratuitous ARP upon failover, which caused connectivity issues
with neighboring devices.
94582 Fixed an issue where, after you changed the application risk value to a non‐default
value, the web interface displayed the default value and you could only see the
configured value by selecting the application and viewing it manually. With this fix,
the firewall displays the configured value in the interface.
94372 Fixed an issue where the firewall truncated user‐group names when the name
exceeded 150 characters. With this fix, the firewall preserves the complete group
name even if the user‐group name exceeds 150 characters, up to a maximum of 255
characters.
94368 Fixed an issue where, if you configured an external dynamic lists file with comments
indicated by forward slashes (//), the firewall failed to load the file.
94166 Fixed an issue where, if you configured a NetFlow profile under a virtual system
(vsys), you could not assign the NetFlow profile to a sub‐interface part of same vsys.
93921 Fixed an issue where commits on Panorama failed because a process (cord) stopped
responding.
93909 Fixed an issue where, if the antivirus and anti‐spyware definition files for an
application were not present, the firewall validated host information profile (HIP)
reports with invalid dates.
93540 Fixed an issue where the read‐only superuser could not export a threat packet
capture (pcap) file from the web interface, which displayed a File not found
message.
93243 Fixed an issue where a Security policy rule pushed from Panorama could not be
cloned locally on the firewall.
92762 Fixed an issue where, regardless of the configured metric, OSPF preferred Type 2
external metrics over Type 1 external metrics.
Issue ID Description
92621 Fixed an issue where forwarded threat logs used inconsistent formatting between
the Request field and the PanOSReferer field. With this fix, the PanOSReferer field
uses double quotes for consistency with the Request field.
92527 Fixed an issue where SSL Inbound Inspection caused a packet buffer leak, leading to
degraded performance.
92523 Fixed an issue where, for firewalls in an HA active/active configuration, the predict
session for an Oracle redirect that synchronized to the peer device became stuck in
the Opening State because the parent session was not installed on the peer
device. With this fix, the firewall ensures the parent session is installed on the peer
device and the predict session for the Oracle redirect transitions to active state to
allow for successful Oracle client‐to‐server communication.
92472 Fixed an issue where, during the connection of a satellite to the GlobalProtect
gateway, the Online Certificate Status Protocol (OCSP) verification for the
GlobalProtect certificate failed because the OCSP response did not contain the
signature certificate.
92367 Fixed an issue on Panorama where you could not filter by device group when in the
firewall device context.
92106 A security‐related fix was made to address multiple NTP vulnerabilities
(PAN‐SA‐2016‐0019).
92008 Fixed an issue where, if you used SNMP to check the status of a tunnel interface, the
firewall provided incorrect information.
91886 A security‐related fix was made to address CVE‐2015‐7547 (PAN‐SA‐2016‐0021).
91885 Fixed an issue where the log filter you can create by clicking a value in the Destination
Country or Source Country column did not work when you chose a country name
because the filter string used the country name instead of the country code.
91767 Fixed an issue where adding objects such as tags to Panorama using the XML API
resulted in those objects not being visible under Policies, Addresses, or Services.
91492 Fixed an issue where SSL decryption on firewalls failed when the server presented a
certificate chain that did not have the expected extension in the root certificate even
though the firewall had the correct root certificate in its default trusted CA store.
91474 Fixed an issue that prevented a firewall in Common Criteria Evaluation Assurance
Level 4 (EAL4) mode from connecting to Panorama HA pair units in Common Criteria
(CC) mode.
90992 Fixed an intermittent issue where the initial GlobalProtect client connection to a
GlobalProtect portal or gateway failed with the error: Valid client certificate
is required. This occurred when the certificate profile used CRL/OCSP to check
certificate validity and was due to a problem with the certificate not being available
in the dataplane cache. Subsequent connections worked because the certificate was
added to the cache during the initial connection attempt.
90777 Fixed an issue where the firewall failed to make the CLI configuration set
authentication radius-vsa-on client-source-ip persistent across system
restart.
Issue ID Description
90677 Fixed an issue where the flow management (flow_mgmt) process stopped responding,
which caused the dataplane to restart.
89891 Fixed an issue where Threat logs forwarded from the firewall had an extra colon
when using TCP for the transport protocol. With this fix, the format of forwarded logs
over TCP and UDP is consistent.
88696 Fixed an issue where, under certain conditions, a process (mpreplay) frequently
restarted due to excessive internal messaging.
87032 Fixed an issue where firewalls and appliances running Panorama 7.0 or later releases
failed to display or download reports received from firewalls running PAN‐OS 6.1 or
earlier releases.
86916 Fixed an issue where traffic bursts entering a PA‐3000 Series firewall caused
short‐term packet loss even though the overall dataplane utilization remained low.
This issue was typically observed when two firewall interfaces on the same firewall
were connected to each other. With this fix, internal thresholds were modified to
prevent packet loss in these conditions.
85878 In response to an issue where DNS queries sometimes caused a Log Collector to run
too slowly and caused delays in log processing, the debug management-server
report-namelookup disable CLI command is added to disable DNS lookups for
reporting purposes.
85484 Fixed an intermittent issue where the GlobalProtect portal used the cookie instead
of the authentication information provided by the GlobalProtect client, which caused
authentication to fail. With this fix, if a client connects using a cookie, the
GlobalProtect portal ignores the cookie in favor of the authentication information
provided by the GlobalProtect client so that authentication is successful.
85361 Fixed an issue where, if you used the CLI to input more than 126 addresses in an
address group or 126 URLs in an allow‐list, the firewall did not apply the
configuration.
85160 Fixed an issue where a firewall lost members of a domain group after a failover from
the primary to the secondary LDAP server when the last modified timestamp for the
group was not the same on both servers.
84949 Fixed an issue where M‐100 appliances in an HA active/active configuration
forwarded logs only to one syslog server even though two syslog servers were
defined. This issue occurred only on the primary‐secondary appliance and was due to
an HA sync issue.
84711 Fixed an intermittent issue where some packets incorrectly matched Security policy
rules, which resulted in App‐ID™ policy lookup errors and discarding of packets.
84496 Fixed an issue on PA‐7000 Series firewalls where excessive or prolonged log queries
caused a memory leak on the Log Processing Card (LPC).
84373 Fixed an issue where Panorama generated an error when a WildFire update was
installed even though the download and install were successful.
Issue ID Description
84046 Fixed an issue where SSL decryption failed when a certificate was rejected due to a
missing or empty basicConstraints extension. With this fix, an exception is
added to allow a missing or empty basicConstraints extension for self‐signed
non‐CA certificates, and the following behaviors will be applied to CAs with regard
to basicConstraints extensions:
• If the CA has an extension basicConstraints=CA:TRUE, then allow the CA.
• If the CA has an extension basicConstraints=CA:FALSE, then block the CA,
but allow device‐trusted CAs, including default CAs and imported CAs.
• If the CA has does not have a basicConstraints extension, then block the CA,
but allow device‐trusted CAs, including default CAs and imported CAs, and allow
self‐signed CAs.
82138 Fixed an issue where WildFire reports were not displayed on the web interface when
proxy settings were configured for the management interface.
80628 Fixed an issue where WildFire content updates showed timestamps with future
dates.
77822 Fixed an issue where a VM‐Series NSX edition firewall sent Dynamic Address Group
information only to the primary virtual system (VSYS1) on the integrated physical
firewall at the data center perimeter. With this fix, a VM‐Series NSX edition firewall
configured to Notify Device Group sends Dynamic Address Group updates to all
virtual systems on a physical firewall running PAN‐OS 7.0.8 or a later PAN‐OS 7.0
release.
76197 Fixed an issue where firewall Traffic logs displayed unusually large byte counts for
http‐proxy and http‐video counters due to frequent application shifts between those
application‐type packets within a single proxy session.
Issue ID Description
98602 Fixed an issue where the Panorama management server had a memory increase due to
syncing of WildFire reports from Panorama to log collectors.
97313 Fixed an issue where the management plane of Panorama M‐100 and M‐500 appliances
stopped responding when renaming objects or Security policy rules due to memory
corruption.
96792 Fixed an issue where commits failed due to a memory leak related to HA sync of the
candidate configuration that caused the passive Panorama peer to stop responding.
96634 Fixed an issue where a certificate signing request (CSR) using Simple Certificate
Enrollment Protocol (SCEP) over SSL failed due to buffer limit (signing over non‐SSL
worked correctly).
96140 Fixed an issue where disabling and importing local copies of Panorama policies and objects
resulted in exclusion of Log Forwarding profile imports on multiple virtual systems
(multi‐vsys).
95747 VLAN tag translation is enhanced so that the firewall now preserves the Priority Code
Point value (802.1P) in the Layer 2 VLAN tag field when receiving a frame on one VLAN
Tag port and then forwarding it to another VLAN Tag port. See Changes to Default
Behavior for more information about this enhancement in PAN‐OS 7.1.3 and about
further enhancements in PAN‐OS 7.1.5.
95275 Fixed an issue where a role‐based administrator could view unified logs under the Monitor
tab but could not export these logs.
95133 Fixed an issue where firewall incorrectly applied Policy Based Forwarding (PBF) to
sessions created via prediction (such as ftp‐data sessions).
95047 Fixed an issue where PAN‐OS log integration with AutoFocus did not use proxy server
settings.
94930 Fixed an issue where firewall running on a VMware NSX edition firewall had incorrect
address‐group objects pushed via Panorama updates.
94914 Fixed an issue where a firewall running PAN‐OS 7.1 failed to block HTTP‐Video
applications.
94790 Fixed an issue where dataplane CPU usage became excessive after upgrading from
PAN‐OS 7.0 to PAN‐OS 7.1.
94765 Fixed an issue where NAT translation did not work as expected when the administrator
deleted a virtual system (vsys) from a firewall with multiple virtual systems (multi‐vsys) and
NAT rules configured without first deleting NAT rules associated with the vsys. With this
fix, when an administrator deletes a vsys, the firewall automatically deletes NAT rules
associated with that vsys.
Issue ID Description
94573 Fixed an issue where a firewall dropped incoming PSH+ACK segments from the server.
94570 Fixed an issue where role‐based Panorama administrators were unable to perform
commits because the Commit dialog opened and immediately closed without allowing
these administrators to modify, preview, or confirm their commit requests.
94533 Fixed an issue where Panorama pushed unused shared address objects to the firewall
when the name of the object matched another pushed address object from the device
group for that firewall even though the Share Unused Address and Service Objects with
Devices option was unchecked.
94435 Fixed an issue where a firewall failed to learn of OSPF neighbors that were on interfaces
configured with a maximum transmission unit (MTU) of 9216 because the OSPF database
exchange could fail for jumbo packets.
94282 Fixed an issue on PA‐7000 Series firewalls configured as HA pairs where, after the active
firewall failed over to become the passive firewall, the newly passive firewall restarted
with the error message: internal packet path monitoring failure. With this
fix, the firewall will not restart after becoming passive.
94165 Fixed an issue where the firewall generated WildFire Submissions logs with an incorrect
email subject and sender information when sending more than one email to a recipient in
a POP3 session.
94136 Fixed an issue where a PA‐200 firewall reported an antivirus update job as successful
when the update downloaded without installing. With this fix, a larger timeout value
allows the installation to complete.
94097 Fixed an issue where the firewall did not log email sender, receiver, or subject in WildFire
Submissions log.
93783 Fixed an issue where autocommit failed if an administrator configured an IPSec tunnel
using the manual‐key method.
93778 Fixed a rare issue where a bind request from the firewall to the LDAP server failed.
93770 Fixed an issue where the firewall interpreted a truncated external dynamic list IP address
(such as 8.8.8.8/) as 0.0.0.0/0 and blocked all traffic. With this fix, the firewall ignores
incorrectly formatted IP address entries.
93729 Fixed an issue where SSH decryption caused a dataplane memory leak and restart.
93667 Fixed an issue where the GlobalProtect endpoint incorrectly failed the Host Information
Profile (HIP) evaluation when there is an empty missing‐patch tag in the HIP Report and
the Check setting for patch management in HIP Objects criteria was set to has-all
(Objects > GlobalProtect > HIP Objects > Patch Management > Criteria).
93458 Fixed an issue where WildFire platforms experienced non‐responsive processes and
sudden restarts under certain customer‐specific traffic conditions.
93276 In PAN‐OS 7.1.3 and later releases, the Application Command Center (ACC) includes the
following usability enhancements:
• You can Jump to Unified logs from an ACC widget; previously you could jump to all log
types, except the Unified logs
• You can easily promote an IP address or a user as a global filter from a table within an
ACC widget. The context drop‐down that appears next to the value allows you to
promote the users or IP address as a global filter.
Issue ID Description
93218 Fixed an issue where an administrator who is not a superuser was unable to view detailed
configuration changes using Logs > Configuration. With this fix, administrators of all types
are able to view detailed configuration changes.
92934 Fixed an issue where a firewall configured for DHCP relay (with multiple DHCP relays or
in certain firewall virtual system configurations) rebroadcast a DHCP packet on the same
interface that received the packet, which caused a broadcast storm. With this fix, the
firewall drops duplicate broadcasts instead of retransmitting them.
92684 Fixed an issue where a process (l3svc) stopped responding when processing a large
number of user authentication requests.
92610 Fixed an issue on PA‐200 firewalls where the firewall stalled during boot‐up after an
upgrade from PAN‐OS 6.1.12 or an earlier PAN‐OS 6.1 release to a PAN‐OS 7.0 or later
release.
92467 Fixed an issue on Panorama where exporting the device state failed if a running‐config.xml
file already existed in the target location, which resulted in one or more Server error
messages. With this fix, the new device state file exports as expected.
91726 Fixed an issue where using the hold and resume features during a call resulted in one‐way
audio when the call manager or SIP proxy was in a different zone than either the called or
the calling party.
91497 Fixed an issue where stale next‐hop MAC entries persisted on the session offload
processor after you modified a subinterface configuration, which caused SSH connections
to fail. With this fix, the management plane cache no longer duplicates next‐hop MAC
entries, which prevents the stale entries that caused SSH connections to fail.
91269 Fixed an issue where the firewall restarted the dataplane after a process stopped
responding.
91202 Fixed a user interface issue on firewalls and Panorama where searches on Correlated
Events logs using classless subnets (for example, /21 instead of /24) failed to give the
correct results.
91171 Fixed the issue where, if the firewall processed a high volume of BFD sessions for routing
peers that use BGP, OSPF or RIP, and the firewall also processed a high volume of packets
belonging to existing sessions that were not offloaded, the BFD sessions to those peers
flapped when the firewall received a content update.
91086 Fixed an issue where PA‐7000 Series firewalls experienced BGP disconnections because
the firewall failed to send keepalive messages to neighbors within specified timers.
90691 Fixed an issue on firewalls running a PAN‐OS 7.0 or later release where the web interface
became inaccessible (502 bad gateway error) when sending a high rate of concurrent
User‐ID XML API POST requests.
90618 Fixed an issue on Panorama where creating an exemption for a threat name from the
Threat log caused the web interface to display the exemption multiple times depending on
the number of sub‐device groups. After the fix, the interface correctly displays only one
profile name.
Issue ID Description
90596 Fixed an issue on PA‐5000 Series firewalls where the FPGA did not initialize. With this fix,
the FPGA is automatically reprogrammed after an initialization failure so that it can
attempt to reinitialize (multiple times) before triggering a boot failure.
90560 Fixed an issue where the firewall did not authenticate a syslog server's certificate signed
by a trusted root certificate authority (CA) included in the predefined trusted root
certificate list, which caused connection issues with syslog forwarding over SSL. With this
fix, the firewall can authenticate the syslog server's certificate and can establish SSL
connections.
90508 A security‐related fix was made to address CVE‐2016‐0777 and CVE‐2016‐0778
(PAN‐SA‐2016‐0011).
90326 Fixed an issue on PA‐7000 Series firewalls where Botnet reports were not created
consistently due to a log cleanup job that ran just before the Botnet reports were
generated, which—on some days—resulted in empty or no Botnet reports. With this fix,
the botnet log cleanup job takes place after the daily generation of Botnet reports so that
daily reports are created and populated as expected.
90256 Fixed an issue where decrypted SSH sessions were not mirrored to the decrypt mirror
interface as expected.
89984 A security‐related fix was made to address a stack overflow condition
(PAN‐SA‐2016‐0024).
89551 Fixed an issue where User Activity Reports delivered via the Email Scheduler were empty
if the username contained German language‐specific characters.
89007 Fixed an issue where VM‐Series firewalls deployed in AWS firewalls used UDP port 24946
for HA2 keep‐alive packets instead of UDP port 29281.
88334 Fixed an issue where the firewall restarted unexpectedly when trying to delete a tunnel
interface configuration.
88307 Fixed an issue where the dataplane restarted and dataplane processes stopped responding
when passing SSH traffic using SSH decryption.
88029 Fixed an issue where, after an upgrade, the firewall did not use the previously configured
system‐wide proxy configuration (Device > Setup > Services) for accessing the WildFire
public cloud (PAN‐OS 7.0 introduced a separate WildFire proxy configuration Device >
Setup > WildFire). With this fix, the upgrade process automatically uses the previous
proxy configuration when creating the WildFire public cloud configuration.
84461 Fixed a Panorama issue where the virtual memory for a process (configd) exceeded its
allocation, which caused commit and HA sync attempts to fail.
83165 Fixed an issue where exporting custom reports to CSV, XML, and PDF failed.
(PAN‐49890)
83008 Fixed an issue where VM‐Series firewalls experienced packet loss. With this fix, an internal
buffer is increased in size to prevent the packet loss.
Issue ID Description
95120 Fixed an issue where authentication failed on the GlobalProtect gateway because the
client tried to authenticate using cookies with domain\user specified in the agent
configuration.
95021 Fixed an issue where the VLAN ID was added in the wrong location in the packet payload
in Layer 2 deployments, which caused some applications to fail.
94990 Fixed an issue where the User‐ID (useridd) process stopped responding when
encountering a custom URL category that included a space (" ") character in the category
name.
94939 Fixed an issue where strongSwan Linux VPN clients failed to connect to the GlobalProtect
gateway because the firewall presented a server certificate that did not include a Common
Name (CN) value.
94883 Fixed an issue on firewalls that were upgraded from a PAN‐OS 7.0 release to a PAN‐OS
7.1 release where GlobalProtect prevented third‐party IPSec (X‐Auth) clients from
connecting to the GlobalProtect gateway. With this fix, you can now upgrade from a
PAN‐OS 7.0 release to a PAN‐OS 7.1.2 or later release to prevent this issue.
If your GlobalProtect firewall is already running a PAN‐OS 7.1.0 or 7.1.1 release, you must
downgrade to a PAN‐OS 7.0 release before upgrading to a PAN‐OS 7.1.2 or later release
to prevent this issue from occurring after the upgrade.
94695 Fixed an issue where the firewall failed to connect to AutoFocus unless you manually
re‐entered the URL in the AutoFocus settings (Device > Setup > Management) even
though the URL was correctly pre‐configured. With this fix, the firewall connects to
AutoFocus as expected using the prepopulated AutoFocus URL.
94571 Fixed an issue where commits failed if you configured two proxy IDs on a single tunnel
using the same source, destination subnets, and protocol because the proxy IDs appeared
to be duplicates of each other even though they were configured with different ports.
With this fix, the firewall also uses the port value when determining whether proxy IDs are
unique or duplicates.
94493 Fixed an issue where Panorama™ Device Group and Template administrators were unable
to perform commits because the Commit dialog opened and immediately closed without
allowing administrators to modify, preview, or confirm their commit requests.
94437 Fixed an issue where configurations pushed from Panorama running a 7.1 release to a
firewall running PAN‐OS 7.0 or earlier release incorrectly deleted the gateway
configuration even when address objects were not included in the pushed configuration.
With this fix, the gateway configuration is deleted only when the pushed configuration
includes address objects.
94408 Fixed an issue where predefined URL categories were not populated in Security and
Decryption policy rules as expected when using BrightCloud as the URL database.
Issue ID Description
93961 Fixed an issue were a process (configd or mgmtsrvr) restarted due to the use of special
characters (such as a bracket character—" [ " or " ] "—in a search field (for example, in the
Address section).
93882 Fixed an issue where you were unable to deploy a VM‐Series firewall using a VHD
exported from an existing VM‐Series firewall in Azure.
93865 Fixed an issue on an M‐100 appliance in Log Collector mode where locally‐created proxy
configurations were lost when a commit was performed from Panorama. With this fix,
locally‐created proxy configurations persist after a Panorama commit.
93855 Fixed an issue where the DNS proxy template object that was pushed from Panorama did
not override that object on the firewall as expected.
93775 Fixed an issue where packet diagnostics failed due to an unnecessarily large debug log
related to HA3 packet forwarding.
93644 Fixed an issue on PA‐3000 Series firewalls where processing jumbo frames that were
larger than 7,000 bytes during a period of heavy traffic caused the FPGA to stop
responding. With this fix, the FPGA thresholds are adjusted to correctly handle up to 9KB
jumbo frames.
93612 A security‐related fix was made to address a privilege escalation issue
(PAN‐SA‐2016‐0015).
93526 Fixed an issue where the web interface and CLI reported that configurations were out of
sync between HA peers even when the peers were in sync. With this fix, sync status is
reported correctly.
93508 Fixed an issue where a process (logrcvr) stopped responding and restarted repeatedly after
an upgrade to content release version 571, which caused the firewall to reboot. Content
release version 572 mitigated this issue but this fix ensures that firewalls running PAN‐OS
7.1.2 or later releases will not be affected by this issue.
93449 Fixed an issue where the API browser displayed the incorrect XML API syntax for the
show arp all command.
93395 Fixed an issue on firewalls and Panorama running a 7.1.0 or 7.1.1 release where the
firewall mgmtsrvr or Panorama reportd process stopped responding and caused the
process to restart after displaying the following message: SYSTEM ALERT : critical :
mgmtsrvr (or reportd) - virtual memory limit exceeded, restarting. This issue
was caused by a memory leak that occurred when viewing logs of single log types (such as
Traffic or Threat).
93367 Fixed an issue where ACC logs did not resolve IP addresses to FQDN under destination IP
activity.
93333 Fixed an issue where the firewall did not properly process active FTP data sessions if the
FTP client reused—within a short period of time—the destination port number that was
negotiated in the FTP control session.
93240 PAN‐OS 7.1.2 and later releases are enhanced to prevent an issue where multiple SFP+
ports coming up at the same time resulted in a race condition that caused ports to enter a
re‐initialization phase that added several seconds delay before ports came up.
93228 Fixed an issue on PA‐7050 firewalls in an HA active/active configuration where jumbo
frames that included the DF (do not fragment) bit were dropped when crossing dedicated
HA3 ports.
Issue ID Description
92763 Fixed an issue where commits failed due to a validation error that occurred when
Panorama pushed Authentication Sequence profiles that included a virtual system that
was not migrated properly during an upgrade from a Panorama 6.1 release to a Panorama
7.0 or later release.
92677 Fixed an issue where the Comodo® RSA certificate authority (CA) was not included in the
default trusted root on the firewall, which caused SSL decryption to fail on sites using this
as their CA.
92642 Fixed an issue on Panorama (virtual and M‐Series appliances) where a process (configd)
stopped responding when triggering a commit very soon after a reboot and before a
database required for the commit process was ready for use. Additionally, administrators
received an error message (Administrator does not have access to any
device-group data) when they attempted to view Monitor > Logs information or ACC
information on the Panorama web interface before the database was ready. With this fix,
this database loads faster so that commits and attempts to view Monitor > Logs and ACC
information are successful even when attempted immediately following a reboot of
Panorama.
92413 A security‐related change was made to address a boundary check that caused a service
disruption of the captive portal (PAN‐SA‐2016‐0013).
92391 Fixed an issue where firewall Traffic logs displayed unusually large byte counts for
sessions passing through proxy servers.
92082 Fixed an issue where an administrator with read‐only privilege was unable to export
Correlated Events logs in CSV format.
92050 Fixed an issue on a PA‐3000 Series firewall running a PAN‐OS 7.0.1 or later release with
zone protection configured to drop fragmented traffic where outgoing OSPF DB
Description packets were fragmented and subsequently dropped, which caused the OSPF
neighbor status to get stuck in Exchange state.
91785 Fixed an issue where a Panorama process (configd) stopped responding when trying to add
tags to multiple firewalls at the same time.
91724 Fixed an issue where an autocommit of an incremental antivirus update failed after a
reload due to a corrupt virus signatures file and a failed incremental installation. With this
fix, incremental content installation has enhanced protections to prevent autocommit
failures, and will log additional information to assist with troubleshooting.
91395 Fixed an issue where the simultaneous transfer of large files from two different SMB
servers over a GlobalProtect connection from a Windows 8 client caused the connection
to fail. With this fix, you can enable heuristics on Windows 8 clients or set the tunnel
interface MTU size to 1,300 to avoid this issue.
91379 Fixed an issue where an out‐of‐sequence packet was passed through the firewall.
91156 Fixed an issue on Panorama where performing log queries and reports resulted in
incorrect reporting of multiple Panorama logged‐in administrators on PA‐7000 firewalls.
Issue ID Description
91079 Fixed an issue on a VM‐Series firewall where an ungraceful reboot caused Dynamic IP
address information to get out of sync.
90856 Fixed an issue where the dialog for creating certificates and the dialog for editing
certificates had different character limits for the certificate name. With this fix, the
certificate name field in both dialogs allows up to 63 characters.
90826 Fixed an issue where unused shared objects were calculated incorrectly during a commit
from Panorama due to address and service name overlaps.
90044 Fixed an issue where log forwarding in Panorama failed when using syslog over TCP.
90029 Fixed an issue where a GlobalProtect gateway rejected the same routes learned from
different LSVPN satellites when the routes were destined for a different virtual router.
89925 Fixed an issue where PAN‐OS 7.1 images failed to bootstrap a firewall if the bootstrapping
tarball package was created using a Mac OS (BSD‐based tar format). With this fix, you can
bootstrap firewalls with PAN‐OS 7.1.2 or later release images using a BSD‐based tarball
created using a Mac OS.
89620 Fixed an issue where SSL inbound decryption failed when a client sent a ClientHello with
TLS 1.2 while the server supported only TLS 1.0.
89264 Fixed an issue where DNS resolution failed when message compression was disabled on
the DNS server, which resulted in case mismatch between CNAME query and answer
values in DNS server replies. With this fix, the firewall ignores case in CNAME values so
that query and answer values match and DNS requests resolve successfully.
89261 Fixed an issue where you could not display interface QoS counters when the CLI output
mode was set to op-command-xml-output.
88157 Fixed an issue with reduced throughput for traffic originating on the firewall and
traversing a VPN tunnel.
86996 Fixed an issue where Traffic logs reported cumulative bytes for sessions with TCP port
reuse, which caused custom reports to incorrectly report the byte count.
86990 Fixed an issue on a firewall where a process (sslvpn) repeatedly restarted due to an internal
thread synchronization issue.
84641 Fixed an issue where some DNS requests were forwarded to the wrong DNS server—the
one previously but no longer configured on the firewall.
83722 Fixed an issue where destination‐based service routes did not work for RADIUS
authentication servers.
83569 Fixed an issue where multiple QoS changes while under a heavy load caused the dataplane
to restart.
83339 Fixed an issue with the web interface where uncommitted IPSec proxy ID details were
unexpectedly deleted prior to commit.
80177 Fixed an issue where the firewall did not present the URL block page as expected when
proxied request from client used CONNECT method.
77460 Fixed an issue on a firewall with an expired BrightCloud license where the specified
vendor was unexpectedly and automatically changed from BrightCloud to PAN‐DB when
any feature auth code was pushed from Panorama to the firewall.
Issue ID Description
76661 Fixed an issue where voltage alarms were triggered incorrectly (voltage was within the
appropriate range).
74443 A security‐related fix was made to address CVE‐2015‐0235.
40436 Fixed an issue where firewalls running PAN‐OS 7.0 and earlier releases did not update
FQDN entries unless you enabled the DNS proxy caching option (Network > DNS Proxy >
<DNS Proxy config> > Advanced).
Issue ID Description
93710 Fixed an issue where the Pay‐as‐you‐go (PAYG) hourly versions—Bundle 1 and Bundle 2
of the VM‐Series firewall in Azure—were not available in the Azure Marketplace. These
PAYG versions and solution templates are supported starting with PAN‐OS 7.1.1.
Issue ID Description
93072 A security‐related change was made to address an issue in the policy configuration dialog
(PAN‐SA‐2016‐0014).
92382 Fixed an issue where the firewall could not install PAN‐OS or GlobalProtect agent
software images on leap day (February 29). With this fix, the firewall can install these
images regardless of the date.
92293 A security‐related fix was made to address CVE‐2016‐1712 (PAN‐SA‐2016‐0012).
91900 Fixed an issue where a Panorama validate operation followed by an FQDN refresh caused
the validated configuration change to commit to the firewall.
91876 Fixed an issue where the passive firewall in a VM‐Series ESXi configuration was processing
and forwarding traffic.
91771 Fixed an issue where a firewall did not send TCP packets out during the transmit stage in
the same order as those packets were received.
91728 A security‐related fix was made to address a Denial of Service (DoS) condition related to
the PAN‐OS XML API (PAN‐SA‐2016‐0008).
91653 Fixed an issue where SSL decryption did not work as expected for resumed sessions.
91533 Fixed an issue where a firewall failed a commit after receiving a File Blocking profile from
Panorama that contained a space at the end of the profile name. This issue occurred when
the managed firewall was running an older version of PAN‐OS (when File Blocking and
WildFire™ Analysis profiles were merged into one profile) and Panorama pushed the
configuration to a device group.
91522 Fixed an issue where a cloned application name could not be edited after it was cloned
from a Shared/Device Group location to a Shared location. With this fix, the cloned
application names can be edited.
91336 Fixed an issue where the packet processor stopped responding when proxy packets were
switched to the fast path group on the dataplane.
91307 Fixed an issue where SSL decryption sessions failed for secure websites that used a
certificate issued by the Entrust.net Certification Authority (2048).
91234 Fixed an issue on PA‐7000 Series firewalls where a session was modified while in a state
that should not allow modification, which caused processes associated with the packet
processing daemon to stop responding.
Issue ID Description
91075 Fixed an issue where the LSVPN tunnel interface started flapping after upgrading the
firewall at one end of the tunnel (either the GlobalProtect gateway or satellite firewall) to
a PAN‐OS 7.0 or later release while the firewall at the other end of the tunnel was still
running a PAN‐OS 6.1 or earlier release. This issue occurred due to changes to encryption
algorithm names when introducing Suite B ciphers in PAN‐OS 7.0. With this fix, firewalls
running PAN‐OS 7.0.7 (or PAN‐OS 7.1) or later releases successfully recognize the old
names used in PAN‐OS 6.1 and earlier releases so that LSVPN tunnels are established and
stay up as expected.
91034 Fixed an issue on the WildFire platform where, if the snmp.log file is over 5MB, the snmpd
process cleared the log file and restarted.
90982 Fixed an issue where upgrading from a PAN‐OS 6.1 caused the GlobalProtect portal or
gateway and SSL decryption processes to stop responding. This issue occurred because
SSL/TLS Service Profiles (introduced in PAN‐OS 7.0) were not created successfully if you
did not enable multiple virtual system (multi‐vsys) functionality on the firewall. With this
fix, SSL/TLS Service profiles are now successfully created on non‐multi‐vsys platforms
when upgrading to PAN‐OS 7.1.0 and later releases.
90933 Fixed an issue where the firewall generated superfluous logs (for traffic that did not match
the configured filters) after you enabled dataplane debugging.
90857 Fixed an issue with a passive peer in an HA configuration where the web interface did not
allow you to configure dynamic updates.
90794 Fixed an issue where a log file (/var/log/wtmp) inflated and consumed the available disk
space. With this fix, PAN‐OS uses a log rotation function to prevent log files from
consuming more disk space than necessary.
90742 Fixed an issue where you could not add WF‐500 appliance signatures as exceptions in an
Antivirus profile when the signature names contained more than 32 characters.
90635 A security‐related fix was made to address a cross‐site scripting condition in the
Application Command Center (ACC) (PAN‐SA‐2016‐0009).
90553 Fixed an issue where Data Filtering and WildFire Submission logs for non‐NAT sessions
contained incorrect or invalid NAT information.
90501 Fixed an issue where the firewall could not connect to a GlobalProtect portal or gateway
after removing the LSVPN configuration.
90433 Fixed an issue where overrides of the default rules in the Shared policy took precedence
over the overrides of default rules in a device group. With this fix, override precedence
now behaves as designed (overrides of default rules in the lowest level device group take
precedence over those settings in the higher level device groups and Shared).
90411 Fixed an issue where a global counter (flow_dos_pf_noreplyneedfrag) related to the
suppress-icmp-needfrag Zone Protection profile displayed the action as drop even
when configured to allow ICMP Fragmentation. This fix introduces a new global counter
(Unsuprressed ICMP Need Fragmentation).
90260 Fixed an issue where a device administrator was unable to configure certain settings under
Device > Setup > Operations.
90249 Fixed an issue where upgrading from a PAN‐OS 6.1 or earlier release prevented
administrators from overriding LDAP group mappings that were pushed from Panorama.
Issue ID Description
90106 Fixed an issue where a process restarted unexpectedly due to the reuse of a process ID
(PID). The PID was associated with an old SSH session that the firewall intended to
terminate because the SSH session had timed out but was never closed properly, which
inadvertently resulted in a restart of the process currently associated with that PID.
90070 Fixed an issue where a memory leak associated with the authentication process (authd)
caused intermittent access and authentication issues.
89979 Fixed an issue where the Aggregate Ethernet (AE) interface port in virtual wire mode with
link state pass through enabled came up after a commit even though its peer AE interface
port was down. With this fix, the other AE interface port will come up after the commit
and is then brought down in approximately 10 seconds. This causes both AE interfaces to
stay down until the first AE interface recovers.
89910 Fixed an issue where all LLDP packets were sent with the source MAC address of the MGT
interface instead of the dataplane interface from which they were transmitted. With this
fix, LLDP packets are encapsulated with the source MAC address of the interface that
transmitted the packet.
89906 Fixed an issue where non‐superuser administrators were unable to see Exempt Profiles
and the Security policy rules in which the profiles are used when viewing a Threat log
(Monitor > Logs > Threat > <Threat Name>).
89761 Fixed an issue where a scheduled log export failed to export the logs if the password in the
configuration contained the dollar sign ("$") character.
89752 A security‐related fix was made to address a buffer overflow condition.
89750 A security‐related fix was made to address a stack underflow condition.
89743 Fixed an issue where commits failed due to processes (configd and mgmtsrvr) that stopped
responding. This issue was caused by memory corruption related to the WildFire
deployment schedule.
89723 Fixed an issue where IPSec tunnels using IKEv2 failed to establish a VPN if multiple remote
gateways were behind a port address translation (PAT) setup. With this fix, the firewall can
allow multiple devices behind PAT to set up security associations to the same IP gateway.
89717 A security‐related fix was made to ensure the appropriate response to special requests
received through the API interface.
89706 A security‐related fix was made to prevent some CLI commands from improperly
executing code.
89551 Fixed an issue where the User Activity Report did not show results for user names that
contained German characters.
89503 Fixed an issue where user‐group mappings were not properly populated into the
dataplane after a firewall reboot.
89467 Fixed an issue with exporting a botnet report where exporting to CSV returned the
Missing report job ID error.
Issue ID Description
89413 Fixed an issue where Panorama template commits failed when the names of several
certificates in the Default Trusted Certificate Authorities list changed. This occurred when
Panorama was running a PAN‐OS 7.0 release and pushed a template to a firewall running
a PAN‐OS 6.1 or earlier release.
89342 Fixed a rare condition where the root partition on a firewall or appliance ran out of space
during device state generation.
89296 Fixed an issue where a commit failed after renaming a Panorama shared object that was
already referenced in the rules on a local firewall.
89284 Fixed a reporting issue on the ACC and SaaS Application Usage Report on managed
firewalls. This issue occurred because the application information pushed from Panorama
did not populate in a way or location that allowed the information to be used for reports
generated on the firewalls.
88651 Fixed an issue where the User‐ID (useridd) process stopped responding when the
running‐config was missing the port number associations for the Terminal Services (TS)
Agent.
88585 Fixed an issue where DNS proxy rules didn't consistently match a domain name with the
correct primary IP addresses. With this fix, matching logic favors results that do not
include wildcards.
88561 Fixed an issue where the tunnel went down and began to renegotiate, causing traffic
destined for the tunnel during that time to be dropped. This issue occurred when the
configuration was pushed from Panorama to a firewall configured with IKEv2 preferred
mode and that was connected to a firewall configured to use IKEv1 in an IPSec connection.
88450 Fixed an issue where Layer 3 interfaces without defined IP addresses, zones, or virtual
routers dropped LLDP packets, which prevented the firewall from obtaining and displaying
neighbor information.
88421 Fixed an issue where WildFire reports were generated for files already blocked by the
Antivirus profile SMTP decoder.
88346 Fixed an issue where a firewall was sending BGP packets with the wrong MD5
authentication value.
88327 Fixed an issue where several valid country codes were missing in the Certificate Attributes
section when generating a certificate from the web interface.
88313 Fixed an issue where read‐only device administrators were unable to view logs on the ACC
tab.
88225 Fixed an issue where the firewall could not register with the WildFire public cloud due to
a problem with the log‐cache size becoming too large. With this fix, a limitation mechanism
is now in place to control the log‐cache size.
Issue ID Description
88191 A security‐related fix was made to address information leakage in system logs that
impacted the web interface (PAN‐SA‐2016‐0016).
88142 Fixed an issue with time calculation when displaying statistics for more than a single day
(Monitor > App Scope > Network Monitor) that caused data to be unexpectedly shifted
(calculation used 12:00 A.M. GMT instead of local time and data was shifted accordingly).
With this fix, graphs display data across multiple days as expected for the local time on the
firewall.
88141 Fixed an issue on Panorama where an administrator with an access‐domain name longer
than 31 characters received the following error when logging in: Login could not be
completed. Please contact the administrator. With this fix, administrators with
access‐domain names of up to 63 characters can log in.
88101 Fixed an issue where WildFire reports (web interface and PDF) were unable to display
digital signer information.
87911 Fixed an issue where scheduled dynamic updates to managed firewalls stopped
functioning after migrating the Panorama VM to an M‐500.
87880 Fixed an issue where the XML API request to test Security policy was not properly
targeted to a specified virtual system (vsys), which made the request applicable only to the
default vsys. With this fix, the XML API request to test Security policy is able to retrieve
results for any previously targeted vsys.
87871 Fixed an intermittent issue in an HA active/active configuration where packets passed
through a virtual wire were dropped due to a race condition that occurred when the
session owner and session setup were not on the same HA peer.
87870 Fixed an issue where an OSPF route with a lower administrative distance than the static
route should become the preferred route but was not installed and used as expected; the
firewall continued to use the static route instead.
87851 Fixed an issue where high rates of fragmented packets caused the firewall to experience
a spike in packet buffer, descriptor, and CPU usage.
87727 Fixed an issue where a virtual system custom role administrator could not add user to IP
mappings using the XML API.
87482 A security‐related change was made to management plane account restrictions to prevent
service disruption.
87207 Fixed an issue where the User‐ID process (useridd) stopped responding, which caused the
firewall to reboot.
87144 Fixed an issue where a change of an object name was not propagated in some parts of the
configuration where the object was referenced.
87094 Fixed an issue where committing a policy on Panorama that contained interfaces that were
manually defined generated an error: [interface name] is not an allowed keyword.
Issue ID Description
87066 Fixed an issue on Panorama virtual appliances and on M‐Series appliances in Panorama
mode where two correlation engine sub‐objects on the Web UI tab (Correlation Objects
and Correlated Events) were incorrectly excluded when adding or modifying an Admin
Role profile (Template > Device > Admin Roles).
86979 Fixed an issue where an incomplete IPSec tunnel configuration (one without an IKE
gateway specified) caused the firewall server process to stop responding.
86977 Fixed an issue where LDAP sessions on Panorama were kept open and not actively
refreshed. With this fix, a keep‐alive mechanism is added that is triggered after 15 minutes
of session inactivity and that allows a maximum of 5 failed probes before dropping a
connection (probes occur in 60‐second intervals).
86944 Fixed an issue on Panorama where a commit to a device group caused the Panorama job
to fail, but the job was successful on the managed device.
86725 Fixed an issue where the SSL Certificate Errors Notify Page did not display values of some
variables (such as certname, issuer, and reason) on web pages with expired certificates.
86717 Fixed an issue where QoS statistics for a specific interface were empty after a device
reboot.
86686 Security‐related fixes were made to address issues reported in the October 2015
NTP‐4.2.8p4 Security Vulnerability Announcement.
86623 Fixed an issue where a firewall in an HA active/passive configuration dropped FTP PORT
command packets after a failover.
86613 Fixed an issue where the General Settings dialog for Device > Setup > Management did
not resize correctly when the Login Banner contained a large amount of text.
86488 Fixed an issue where predefined Application Usage Risk Trend graphs (Monitor > Reports
> PDF Summary Reports) did not display lines between contiguous dots as expected.
86395 Fixed an issue where the administrator could not manually type the Ethernet interface
name in a NAT policy in Panorama.
86202 Fixed an issue where the management plane stopped responding if you modified an object
referenced in a large number of rules.
86189 Fixed an issue where the firewall did not send SNMPv3 traps that used an IPv6 server
address.
86122 Fixed an issue where an LACP Aggregate Ethernet (AE) interface using SFP copper ports
remained down after a dataplane restart.
85961 Fixed an issue that occurred when using the Panorama template stack where the
configuration (gear) icon displayed in the wrong location (next to Panorama servers in the
template stack).
85882 Fixed an issue where improperly formatted API calls to Panorama caused one of the
system daemons to stop responding.
85602 Enhanced logging for events where long CLI system commands would timeout. For
example, when generating a tech‐support file.
Issue ID Description
85426 Fixed a cosmetic issue where the log action for the interzone‐default Security policy rule
was incorrect in session detail (session to be logged at end) when the default log
action was overridden by the user.
85344 Fixed an issue where scheduled dynamic update installation caused the HA link to flap.
85320 Fixed an issue where a process (cryptod) stopped responding when attempting to use SSH
to access a firewall that rebooted into maintenance mode after the master key was
allowed to expire. With this fix, administrators can use SSH to access the firewall without
causing the cryptod process to fail even after a firewall reboots to maintenance mode after
the master key expires.
85265 Fixed an issue in the XML API that prevented a read‐only Superuser from downloading
custom packet captures.
84997 Fixed an issue on PA‐7000 Series firewalls where the first autocommit attempt failed.
84911 Fixed an issue where an error was displayed when saving the NFS partition configuration
on a Panorama virtual appliance.
84695 Fixed an issue where GlobalProtect was not appropriately indicated on the interface tab
when it is configured on a loopback interface.
84414 Fixed an issue on the PA‐7050 firewall where after deleting a HIP log forwarding profile a
false warning would appear during a commit.
84146 Fixed an issue in PAN‐OS 7.0 releases where the source and destination field was no
longer included as expected in error messages that were triggered when requests to delete
address objects failed. With this fix, the source and destination information is again
included in the error message.
84143 Enhancement made to allow administrators to include the application field and URL field
in custom response pages.
84115 Fixed an issue where virtual system administrators (full access or read‐only) were unable
to access settings under the Network tab (Panel for undefined not registered was
displayed, instead).
84046 Fixed an issue where SSL decryption failed when a certificate was rejected due to a
missing or empty basicConstraints extension. With this fix, an exception is added to
allow a missing or empty basicConstraints extension for self‐signed non‐CA
certificates, and the following behaviors will be applied to CAs with regard to
basicConstraints extensions:
• If the CA has an extension basicConstraints=CA:TRUE, then allow the CA.
• If the CA has an extension basicConstraints=CA:FALSE, then block the CA, but
allow device‐trusted CAs, including default CAs and imported CAs.
• If the CA has does not have a basicConstraints extension, then block the CA, but
allow device‐trusted CAs, including default CAs and imported CAs, and allow
self‐signed CAs.
84027 Fixed an issue where a firewall allowed some HTTP GET packets to pass through even
when the URL Filtering profile was configured to block packets in this URL category.
83239 Fixed an issue where inbound SSL decryption did not work as expected when you enabled
SYN cookies.
Issue ID Description
82918 Fixed an issue where re‐entering an LDAP bind password through the CLI using a hash
value (instead of a regular password) was rejected for having too many characters.
82493 Fixed an issue so that the firewall performs NAT translations on IP addresses in an SCCP
packet by doing a second NAT policy lookup instead of using a NAT policy for the current
session.
82322 Added an enhancement to the PAN‐OS routing engine for BGP routing protocol to
remove a varying AS number preceded by a static AS number in the AS_PATH attribute.
82106 Fixed an issue where repetitive logging of inconsequential debug messages caused the
snmpd.log file to reach its maximum file size and prevent further logging. With this fix,
these inconsequential debug messages are no longer written to the log file.
80953 Fixed an issue where packets were not adhering to the virtual wire forwarding path, which
caused MAC address flapping on neighboring devices. This occurred on a firewall in HA
active/active virtual wire mode.
80750 Fixed an issue where you could not select a template stack or a descendant device group
defined in a device group hierarchy on Panorama when specifying the device group and
template for the VM‐Series NSX edition firewall.
80336 Fixed an issue where Panorama custom report filenames that included a period (".")
character resulted in empty reports. With this fix, reports are generated as expected for
custom report filenames that include a period so long as the period is not the first
character in the filename.
77273 Fixed an issue where importing a certificate with the same subject name as an
existing certificate failed. With this fix, you can import a certificate that uses the
same subject name as an existing certificate.
64717 Fixed an issue where an HA configuration did not correctly synchronize between firewalls
when configured on Panorama and pushed to the firewalls.
42851 Fixed a performance issue with commit requests related to IKE configuration parsing. Also
fixed cosmetic IKE validation messages displayed during the commit process, such as
during a commit when the IKE gateway configuration was binded to an interface without
an IP address. With this fix, the correct error message is displayed (IKE gateway
<gw-name> used local interface <interface> which has no IP address.
Configuration is invalid.)
Related Documentation
Refer to the following 7.1 documentation on the Technical Documentation portal or search the
documentation for more information on our products:
New Features Guide—Detailed information on configuring the features introduced in this release.
PAN‐OS Administrator's Guide—Provides the concepts and solutions to get the most out of your Palo
Alto Networks next‐generation firewalls. This includes taking you through the initial configuration and
basic set up on your Palo Alto Networks firewalls.
Panorama Administrator's Guide—Provides the basic framework to quickly set up the Panorama™ virtual
appliance or an M‐Series appliance for centralized administration of the Palo Alto Networks firewalls.
WildFire Administrator's Guide—Provides steps to set up a Palo Alto Networks firewall to forward
samples for WildFire™ Analysis, to deploy the WF‐500 appliance to host a WildFire private or hybrid
cloud, and to monitor WildFire activity.
VM‐Series Deployment Guide—Provides details on deploying and licensing the VM‐Series firewall on all
supported hypervisors. It includes example of supported topologies on each hypervisor.
GlobalProtect Administrator's Guide—Describes how to set up and manage GlobalProtect™.
Online Help System—Detailed, context‐sensitive help system integrated with the firewall web interface.
Compatibility Matrix — Detailed reference to determine support for Palo Alto Networks firewalls,
appliances, agents, and OS releases.
Open Source Software (OSS) Listings—OSS licenses used with Palo Alto Networks products and
software:
– PAN‐OS 7.1
– Panorama 7.1
– WildFire 7.1
Requesting Support
For contacting support, for information on support programs, to manage your account or devices, or to open
a support case, refer to https://www.paloaltonetworks.com/support/tabs/overview.html.
To provide feedback on the documentation, please write to us at: documentation@paloaltonetworks.com.
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
https://www.paloaltonetworks.com/company/contact‐support
Revision Date: December 22, 2017