Pan Os Release Notes
Pan Os Release Notes
Pan Os Release Notes
11.0.2-h1
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2022-2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
August 17, 2023
Limitations..........................................................................................................27
Limitations in PAN-OS 11.0................................................................................................... 28
Related Documentation................................................................................. 85
5
Features Introduced in PAN-OS 11.0
Networking Features
New Networking Feature Description
LSVPN Cookie Expiry Extension You can now configure the cookie expiration period
from 1 to 5 years, while the default remains as 6
(PAN-OS 11.0.1 and later 11.0
months. The encrypted cookie stored on an Large Scale
releases)
VPN (LSVPN) satellite expires after every 6 months.
This causes the VPN tunnels associated with the
satellite to go down, causing an outage until the satellite
is re-authenticated to the LSVPN portal or gateway and
a new cookie is generated. A re-authentication every
six months causes administrative overhead, affecting
productivity, network stability, and resources of the
company.
To reduce administrative overhead, we’ve extended the
cookie expiration period from 6 months to 5 years.
PPPoE Client Support on a The firewall extends PPPoE IPv4 client support to a
Subinterface subinterface so that the firewall can connect to an
ISP that uses an IEEE 802.1Q VLAN tag on its PPPoE
(PAN-OS 11.0.1 and later 11.0
connections. The firewall as a PPPoE client receives its
releases)
IPv4 address and other information from the PPPoE
server. The firewall encapsulates PPPoE packets from
a host in an 802.1Q frame before sending them to the
ISP, and decapsulates PPPoE packets from the 802.1Q
frame before sending them to the host.
Increased Maximum Number of (PA-3400 Series firewalls only) The maximum number
Security Zones for PA-3400 Series of security zones supported on the PA-3410 and
Firewalls PA-3420 firewalls has increased from 40 to 200. The
maximum number of security zones supported on the
(PAN-OS 11.0.1 and later 11.0
PA-3430 firewall has increased from 100 to 200.
releases)
Poll Timeout Improvement for The PA-3400 and PA-5400 Series firewalls have
PA-3400 and PA-5400 Series improved latency when operating under low load.
Firewalls
(PAN-OS 11.0.1 and later 11.0
releases)
DHCPv6 Client with Prefix The firewall now supports a stateful DHCPv6 Client
Delegation to obtain IPv6 addresses and other parameters. This
feature also supports Prefix Delegation by assigning
prefixes received from the DHCP server to configured
pools. A prefix from the pool is distributed using SLAAC
to a host-facing (inherited) interface.
IPSec Transport Mode In addition to the default tunnel mode, you can now
configure IPSec tunnels to use Transport Mode when
encrypting host-to-host communications. Transport
mode encrypts only the payload while retaining the
original IP header. You can use Transport mode to
encrypt the management traffic with the most secure
protocols.
Multicast Source Discovery The Advanced Routing Engine adds support for MSDP.
Protocol on Advanced Routing MSDP interconnects multiple IPv4 PIM Sparse-Mode
Engine (PIM-SM) domains, enables the discovery of multicast
sources in other PIM-SM domains, and reduces the
complexity of interconnecting multiple PIM-SM
domains by allowing PIM-SM domains to use an
interdomain source tree.
IPv4 and IPv6 Address Families On the Advanced Routing Engine, BGP peer groups
Supported over a Single BGP and peers now support both an IPv4 address family
Peering on Advanced Routing (AFI profile) for unicast SAFI and an IPv6 AFI profile
Engine for unicast SAFI over a single peering. This means that,
regardless of whether the BGP local address and peer
address are IPv4 or IPv6, the peering supports both
IPv4 and IPv6 unicast routes being carried over a single
BGP session that uses IPv4 or IPv6.
Power Over Ethernet (PoE) PoE enables you to transfer electrical power from
a supported firewall to a powered device. Using
Persistent NAT for DIPP Some applications, such as VoIP and video, use DIPP
source NAT and may require STUN. DIPP NAT uses
symmetric NAT, which may have compatibility issues
with STUN. To alleviate those issues, persistent NAT for
DIPP provides additional support for connectivity with
such applications. When you enable persistent NAT for
DIPP, the binding of a private source IP address and
port to a specific public (translated) source IP address
and port persists for subsequent sessions that arrive
having that same original source IP address and port.
Panorama Features
New Panorama Feature Description
Zero Touch Provisioning 2.0.3 The Zero Touch Provisioning (ZTP) Plugin 2.0.3 release
includes minor bug and performance fixes.
PAN-OS 11.0.1 and later releases
Admin-Level Commit with Policy You can perform admin-level commits even when
Reordering there are pending changes that affect the order of a
policy rulebase from other admins. This simplifies your
PAN-OS 11.0.1 and later releases
configuration workflow because you don't have to
coordinate commits with other administrators when
your changes are unrelated to theirs and no longer
requires you to wait for a Superuser admin to be
available to do a full commit on Panorama.
Proactive BPA using AIOps for The configuration commit processes on Panorama
NGFW have been seamlessly integrated with the on-demand
dynamic scale cloud plugin to perform BPA at the time
of a commit and block it for your chosen set of checks.
This allows you to fix any BPA violations in real-time
and proceed with a clean bill of health. This smarter
workflow eliminates any exposure that a compromised
security posture could create.
Static Security Group Tag (SGT) for The Panorama plugin for Cisco TrustSec now provides
TrustSec plugin support for static SGT (Security Group Tags) retrieved
from the Cisco ISE server. The static SGTs are used
in the same way dynamic SGTs are currently used; IP
addresses and tags are extracted and forwarded to
the Panorama plugin framework, which then pushes
them to the firewalls. Static SGTs can improve security
posture when an endpoint does not authenticate
through Cisco ISE.
Management Features
New Management Feature Description
Skip Software Version Upgrade You can now upgrade and downgrade standalone and
Panorama managed devices running 10.1 or later more
efficiently by skipping up to three software versions.
You can skip either two major releases and one minor
release, or one major release and two minor releases.
The ability to skip multiple software releases during
an upgrade or downgrade shortens the time needed
for the maintenance window and enables you to take
advantage of the latest PAN-OS innovations more
quickly. This feature also enhances the capabilities
of the multi-image download option and pre-install
validation check, which reduces the number of steps in
the process.
Multi-Vsys Capability for the Multiple virtual systems featuring shared gateway
PA-400 Series Firewalls support are now available for most PA-400 Series
firewalls with a multi-vsys license. PA-440 firewalls
support up to two virtual systems. PA-450 and PA-460
firewalls support up to five virtual systems.
Support for OCSP Verification through HTTP If your network deployment includes a web
Proxy proxy, you can now use the Online Certificate
Status Protocol (OCSP) to check the validity
of SSL/TLS certificates. The firewall forwards
OCSP requests to your proxy server instead
of directly to the OCSP responder. You'll need
to configure an OCSP responder and specify
OCSP as your certificate revocation status
method.
User Context for the Cloud User Context for the Cloud Identity Engine provides
Identity Engine unparalleled visibility into your user identification and
device information (such as tags, quarantine lists, and
mappings, which now includes IP-address-to-port number
mappings from Terminal Server agents) and provides a
simple yet precise way to redistribute that information to
other firewalls and devices within your network through
segmentation (for example, by region or use case).
By enabling the service on your firewall and defining
information distribution for your network segments
in the Cloud Identity Engine, you can quickly locate
critical information and ensure consistent user-based
policy enforcement across your network. User Context
represents the next expansion of User-ID in a unified
interface on the Cloud Identity Engine and presents
actionable user identity information at a glance.
IoT Security for Isolated Network You can deploy one or more Palo Alto Networks next-
Segments generation firewalls as hardened security telemetry
gateways to logically connect firewalls in isolated
(PAN-OS 11.0.2 and later 11.0
network segments with Palo Alto Networks cloud-
releases)
delivered security solutions. The security telemetry
gateways block any attempted inbound internet
connections to the isolated firewalls using either
a single gateway or multiple gateways in a chain
depending on your needs and the design of your
network architecture.
®
IoT Security Policy Rule New PAN-OS and IoT Security configuration
Recommendation Enhancements workflows make it easier to scale and manage policy
rule recommendations. The names of recommended
policy rules are now automatically generated. IoT
Security automatically pushes activated policy rule sets
to Panorama and next-generation firewalls. Panorama
lets you import multiple rules at a time into multiple
device groups, and firewalls let you import multiple
rules at a time into your policy rulebase.
Improved DHCP Traffic Visibility By extending DHCP traffic visibility further into your
for IoT Security network, you can now discover and monitor even
more devices than ever. IoT Security employs multiple
methods to detect and monitor network activity and
correlate it to individual devices. A particularly useful
method is the examination of DHCP traffic, which
allows IoT Security to associate dynamically assigned
IP addresses with device MAC addresses and then add
these devices to its inventory and track their network
behavior. When it’s difficult to route DHCP traffic in
certain areas of the network to or through a firewall,
there can be gaps in the coverage that IoT Security
provides. To improve visibility into DHCP traffic that
otherwise wouldn't reach the firewall, you can configure
DHCP servers to send the firewall their server logs as
syslog messages. The firewall then forwards the logs
through the logging service to IoT Security.
5G RADIUS Support for Intelligent Intelligent Security with RADIUS provides consistent
Security information and identification for all subscribers,
equipment, applications, and data based on context
and subscriber activity. To correlate user equipment
(UE) information with more types of 4G/5G traffic, the
firewall can now inspect RADIUS traffic for enforcement
of subscriber-level and equipment-level security policy.
Intelligent Security with RADIUS allows enterprises to
expand their zero-trust architecture to subscribers and
equipment on 5G networks.
User Equipment (UE) to IP Address Control and user plane separation (CUPS) architecture
Correlation with PFCP for 5G is a common configuration for networks undergoing
Migration transition from 4G/LTE to 5G; however, traffic
inspection for both planes must be performed by the
same firewall. User Equipment (UE) to IP Address
Correlation with PFCP allows the firewall to extract user
information and correlate it with the equipment ID or
subscriber ID. It enables you to create granular security
policies based on subscriber or equipment ID, as well
as enhanced visibility through logging and reporting
for applications and threats based on subscriber or
equipment ID.
SD-WAN IPv6 Basic Connectivity The legacy routing engine now supports SD-
WAN in a dual stack using IPv6 BGP loopback
(PAN-OS 11.0.2 and later 11.0 releases)
addresses for BGP peering; thus, you can
establish IPv6 connectivity from the branch to
the hub over an IPv4 SD-WAN tunnel. (IPv6
connectivity over DIA isn't supported.)
SD-WAN Plugin Support for Advanced We have enhanced the SD-WAN plugin 3.1.0
Routing Engine to support logical routers for branches and
hubs that use advanced routing engines. With
SD-WAN plugin 3.1.0 configured with an
advanced routing option, all SD-WAN related
objects are automatically generated in logical
routers rather than virtual routers. SD-WAN
plugin 3.1.0 running PAN-OS 11.0 offers
an advanced routing engine that relies on
industry-standard configuration methodology,
which facilitates the administrator tasks. It
allows the creation of profiles that are used
for different functions (such as, filtering,
redistribution, and metric changes), all of
which can be used across logical routers.
These profiles provide finer granularity to
filter routes for each dynamic routing protocol
and improve route redistribution across
multiple protocols.
Virtualization Features
New Virtualization Feature Description
Hyperscale Security Fabric (HSF) With CN-Series Hyperscale Security Fabric (HSF) 1.0,
1.0 on CN-Series you can now create a cluster of containerized next-gen
firewalls that deliver a highly scalable and resilient next-
gen firewall solution, eliminating the dependency on
external load balancers for Mobile Service Providers
deploying 5G networks.
Advanced Routing Engine Support The Advanced Routing Engine is now supported on the
on CN-Series CN-Series.
Key Management Service (KMS) This release enables cloud native key managers,
Support for VM-Series Azure Key Vault and AWS Secrets Manager, to store
certificates for VM-Series firewalls.
Hold Mode for WildFire Real Time You can now configure the firewall to hold packets
Signature Lookup for unknown files when performing WildFire real time
signature lookups to prevent the first transfer of known
(Available in PAN-OS 11.0.2 and
malware.
later)
GlobalProtect Features
The following table describes new GlobalProtect features introduced in PAN-OS 11.0. For
features related to the GlobalProtect app, see the GlobalProtect App 6.1 Release Notes.
End-user Notification You can now enable and customize end-user notifications about expiry
about GlobalProtect of GlobalProtect app sessions on the gateway. These notifications
Session Logout inform the end users in advance when their app sessions are about
to expire due to inactivity or expiry of the login lifetime and lets
them know how much time is left before the app gets disconnected,
preventing unexpected and abrupt app logout.
Hardware Features
New Hardware Feature Description
PA-415 and PA-445 Firewalls The PA-415 and PA-445 firewalls offer an improved
price to performance ratio with features such as Power
Over Ethernet (PoE) capability, fiber ports, higher
scalability, and enhanced boot times.
PA-1400 Series Firewalls The PA-1410 and PA-1420 are intended for
distributed enterprises, branches, and small to mid-
sized businesses. These models feature Power Over
Ethernet (PoE) capability, power redundancy, and
Multi-Gig ports.
File Type Include or Exclude Enterprise Data Loss Prevention (E-DLP) now supports
List for Data Filtering Profiles creating a file type include or exclude list for data filtering
profiles configured for file-based inspection. This allows you
Requires PAN-OS 11.0.2 and
to select one of two modes:
DLP plugin 4.0.1
• Inclusion Mode—Allow only specified file types be
scanned by Enterprise DLP.
• Exclusion Mode—Allow all supported files to be scanned
by Enterprise DLP by default but excluding the file types
you specify.
Exclusion Mode includes True File Type Support and does
not rely on file extensions to determine file types.
Enterprise DLP Plugin Upgrade Upgrade to Enterprise DLP Plugin 4.0 is required to upgrade
to PAN-OS 11.0. The minimum supported PAN-OS version is
Requires DLP plugin 4.0.0
PAN-OS 11.0. You must download the Enterprise DLP Plugin
4.0 prior to install of PAN-OS 11.0 to successfully upgrade.
23
Changes to Default Behavior
Feature Change
Minimum System Memory Requirement Palo Alto Networks has increased the
for the Panorama Virtual Appliance recommended Panorama virtual appliance
memory requirement to a minimum of 64GB,
up from 32GB. This impacts Panorama virtual
appliances in Panorama and Log Collector
mode to avoid any logging, management, and
operational performance issues related to an
under-provisioned Panorama virtual appliance.
For new Panorama virtual appliance deployments,
Palo Alto Networks recommends deploying the
virtual machine with a minimum of 64GB. For
existing Panroama virtual appliance deployments,
See Increase the CPUs and Memory of the
Panorama Virtual Appliance to increase the
memory for an existing Panorama virtual
appliance after successful upgrade to PAN-OS
11.0.
Test SCP Server Connection To test the SCP server connection when you
schedule a configuration export (Panorama >
Schedule Config Export) or log export (Device >
Scheduled Log Export), a new pop-up window is
displayed requiring you to enter the SCP server
clear textPassword and Confirm Password to test
the SCP server connection and enable the secure
transfer of data.
Feature Change
You must also enter the clear text SCP server
Password and Confirm Password when you test
the SCP server connection from the firewall or
Panorama CLI.
admin>test scp-server-connection
initiate <ip> username <username>
password <clear-text-password>
27
Limitations
Issue ID Description
Issue ID Description
(Network > Interface). This may result in log loss if
the volume of delayed logs exceeds the logging buffer
available on the firewall.
The following firewalls are impacted:
• PA-400 Series Firewalls
• PA-800 Series Firewalls
• PA-1400 Series Firewalls
• PA-3200 Series Firewalls
• PA-3400 Series Firewalls
Issue ID Description
31
Associated Content and Software Versions
Palo Alto Networks Software or Minimum Compatible Version with PAN-OS 11.0
Content Release Version
Panorama 11.0
PAN-OS SD-WAN Plugin If you have installed the PAN-OS SD-WAN plugin, PAN-OS
11.0.1 requires the 3.1.1 plugin.
• * This WildFire guest VM image comes preinstalled and is not available on the Palo Alto
Networks Support Portal for download.
• ** This WildFire analysis environment is not selectable through the WildFire appliance
CLI.
35
PAN-OS 11.0.2 Known and Addressed Issues
Issue ID Description
PAN-221126 Email server profiles (Device > Server Profiles > Email and
Panorama > Server Profiles > Email) to forward logs as email
notifications are not forwarded in a readable format.
Workaround: Use a Custom Log Format to forward logs as
email notifications in a readable format.
Issue ID Description
The disconnect occurs after the application's default session
timeout value is exceeded. This behavior affects only PAN-
OS 10.1.9 and 10.1.9-h1. If you are on PAN-OS 10.1.9 and
10.1.9-h1, please use the following workaround. If you have
already upgraded or downgraded to another PAN-OS version,
use the following workaround in that version.
Workaround: Run the CLI command debug
dataplane internal pdt fe100 csr
wr_sem_ctrl_ctr_scan_dis value 0 to set the value
to zero (0).
PAN-207770 Data filtering logs (Monitor > Logs > Data Filtering)
incorrectly display the traffic Direction as server-to-
client instead of client-to-server for upload traffic
that matches Enterprise data loss prevention (DLP) data
patterns (Objects > DLP > Data Filtering Patterns) in an
Enterprise DLP data filtering profile (Objects > DLP > Data
Filtering Profiles).
Issue ID Description
stuck in BOUND state with an IPv6 address having lease time
0 on the Passive firewall.
Issue ID Description
connectivity to Panorama despite the managed collector
connection Status (Panorama > Managed Collector)
displaying connected and the managed colletor Health
status displaying as healthy.
This results in the local Panorama config and system logs not
being forwarded to the Dedicated Log Collector. Firewall log
forwarding to the disconnected Dedicated Log Collector is
not impacted.
Workaround: Restart the mgmtsrvr process on the
Dedicated Log Collector.
1. Log in to the Dedicated Log Collector CLI.
2. Confirm the Dedicated Log Collector is disconnected from
Panorama.
Issue ID Description
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
Issue ID Description
selected before PoE was configured, the error message will
include the interface name.
PAN-192282 (PA-415 and PA-445 firewalls only) In 1G mode, the MGT and
Ethernet 1/1 port LEDs glow amber instead of green.
Issue ID Description
PAN-184708 Scheduled report emails (Monitor > PDF Reports > Email
Scheduler) are not emailed if:
• A scheduled report email contains a Report Group
(Monitor > PDF Reports > Report Group) which includes a
SaaS Application Usage report.
• A scheduled report contains only a SaaS Application Usage
Report.
Workaround: To receive a scheduled report email for all other
PDF report types:
1. Select Monitor > PDF Reports > Report Groups and
remove all SaaS Application Usage reports from all Report
Groups.
2. Select Monitor > PDF Reports > Email Scheduler and
edit the scheduled report email that contains only a SaaS
Application Usage report. For the Recurrence, select
Disable and click OK.
Repeat this step for all scheduled report emails that
contain only a SaaS Application Usage report.
3. Commit.
(Panorama managed firewalls) Select Commit > Commit
and Push
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-225184 Fixed an issue where disk space utilization was higher than expected
due to excessive logging for a KNI: Out of memory event under a
specific traffic load condition.
PAN-222712 (PA-5450 firewalls only) Fixed a low frequency DPC restart issue.
PAN-220921 Fixed an issue where return tunnel traffic was dropped with the
counter flow_tunnel_encap_err when Enforce Symmetric
Return was enabled in a Policy Based Forwarding rule.
PAN-221519 (VM-Series firewalls only) Fixed an issue where the all_task process
stopped responding due to DPDK driver compatibility issues.
PAN-219686 Fixed an issue where a device group push operation from Panorama
failed with the following error on managed firewalls.
vsys -> vsys1 -> plugins unexpected here
vsys is invalid
Commit failed
PAN-218644 Fixed an issue where the firewall generated incorrect VSA attribute
codes when radius was configured with EAP based authentication
protocols.
PAN-218335 Fixed an issue with hardware destination MAC filtering on the Log
Processing Card (LPC) that caused the logging card interface to be
susceptible to unicast flooding.
PAN-218264 (PA-3400 and PA-1400 Series firewalls only) Fixed an issue where
packet drops occurred due to slow servicing of internal hardware
queries.
PAN-217681 Fixed an issue caused by out of order TCP segments where the
FIN flag and TCP data was truncated in a packet, which resulted in
retransmission failure.
PAN-217581 Fixed an issue where the firewall did not initiate scheduled log uploads
to the FTP server.
PAN-217493 Fixed an issue where superusers with read-only privileges were unable
to view SCEP object configurations.
PAN-217484 Fixed an issue where the rasmgr process used 100% CPU due
to a maximum duration timer not being set, which caused the
GlobalProtect gateway to be unavailable.
Issue ID Description
PAN-217477 Fixed an issue where the drop counter was incremented incorrectly.
Drop counter calculations did not account for failures to send out logs
from logrcvr/logd to syslog-ng.
PAN-217284 Fixed an intermittent issue where LACP flap occurred when the LACP
transmission rate was set to Fast.
PAN-216821 Fixed an issue where the reportd process stopped responding after
upgrading an M-200 appliance to PAN-OS 11.0.1.
PAN-215911 Fixed an issue that resulted in a race condition, which caused the
configd process to stop responding.
PAN-215857 Fixed an issue where the option to reboot the entire firewall was
visible to vsys admins.
PAN-215808 Fixed an issue where after upgrading to PAN-OS 10.1, the log-
forwarding rate towards the Syslog server was reduced. The overall
log-forwarding rate has also been improved.
PAN-215780 Fixed an issue where, changes to Zone Protection profiles made via
XML API were not reflected in the Zone Protection configuration.
PAN-215778 Fixed an issue where API Get requests for /config timed out due to
insufficient buffer size.
Issue ID Description
PAN-215503 Fixed a memory related issue where the MEMORY_POOL address was
mapped incorrectly.
PAN-215496 Fixed an issue where 100G ports did not come up with BIDI QSFP
modules.
PAN-215324 (PA-5400 Series firewalls with Jumbo Frames enabled only) Fixed an
issue with CPU throttling and buffer depletion.
PAN-215315 Fixed an issue where the dataplane stopped responding due to ager
and inline packet processing occurring concurrently on different cores
for the same session.
PAN-215125 Fixed an issue where false negatives occurred for some script samples.
PAN-214889 Fixed an issue where commits took longer than expected due to
application dependency checks.
PAN-214847 Fixed an issue where, when certificate authentication for admin user
authentication was enabled, vulnerability scans that used usernames or
passwords against the management interface reported a vulnerability
due to a missing HSTS header in the Access Denied response page.
PAN-214187 Fixed an issue where superreaders were able to execute the request
restart system CLI command.
PAN-214100 Fixed an issue where selecting a threat name under Threat Monitor
displayed the threat ID instead of the threat name.
Issue ID Description
PAN-213942 (PA-400 Series firewalls) Fixed an issue where the firewall required an
explicit allow rule to forward broadcast traffic.
PAN-213932 Fixed an issue where, when an incorrect log filter was configured, the
commit did not fail.
PAN-212726 Fixed an issue where RTP/RTCP packets were dropped for SIP calls
by SIP ALG when the source NAT translation type was persistent
Dynamic IP And Port.
PAN-212530 Fixed an issue on log collectors where root partition reached 100%
utilization.
PAN-212409 Fixed an issue where there were duplicate IPSec Security Associations
(SAs) for the same tunnel, gateway, or proxy ID.
PAN-211997 Fixed an issue where large OSPF control packets were fragmented,
which caused the neighborship to fail.
PAN-211843 Fixed an issue where renaming a Zone Protection profile failed with
the error message Obj does not exist.
PAN-211602 Fixed an issue where, when viewing a WildFire Analysis Report via the
web interface, the detailed log view was not accessible if the browser
window was resized.
PAN-211519 Fixed an issue where RTP/RTCP packets were dropped for SIP calls
by SIP ALG when the source NAT translation type was persistent
Dynamic IP And Port.
Issue ID Description
PAN-211242 Fixed an issue where missed heartbeats caused the Data Processing
Card (DPC) and its corresponding Network Processing Card (NPC) to
restart due to internal packet path monitoring failure.
PAN-210875 Fixed an issue where the pan_task process stopped responding due to
software packet buffer 3 trailer corruption, which caused the firewall
to restart.
PAN-210736 Fixed an issue where configuration changes related to the SSH service
profile were not reflected when pushed from Panorama. With this
fix, the deletion of ciphers, MAC, and kex fields of SSH server profiles
and HA profiles won't clear the values under template stacks and will
retain the values configured from templates.
PAN-210661 Fixed an issue where firewalls disconnected from Cortex Data Lake
after renewing the device certificate.
PAN-210563 Fixed an issue on Panorama where Security policy rules with a Tag
target did not appear in the pre-rule list of a dynamic address group
that was part of the tag.
PAN-209898 Fixed an issue where the logrcvr process stopped due to memory
corruption.
PAN-209696 Fixed an issue where link-local address communication for IPv6, BFD,
and OSPFv3 neighbors was dropped when IP address spoofing check
was enabled in a Zone Protection profile.
Issue ID Description
PAN-209021 Fixed an issue where packets were fragmented when SD-WAN VPN
tunnel was configured on aggregate ethernet interfaces and sub-
interfaces.
PAN-208877 Fixed an issue where the all_task process stopped responding when
freeing the HTTP2 stream, which caused the dataplane to go down.
PAN-208325 (PA-5400 Series, PA-3400 Series, and PA-400 Series only) Fixed an
issue where the firewall was unable to automatically renew the device
certificate.
PAN-208201 Fixed an issue on the firewall where the modified date and time was
incorrectly updated after a commit operation, PAN-OS upgrade, or
reboot.
PAN-207842 Fixed an issue where WildFire Analysis Reports were not visible when
the WF-500 appliance was on private cloud.
PAN-207741 Fixed an issue where Large Scale VPN (LSVPN) Portal authentication
failed with the error invalid http response. return
error(Authentication failed; Retry authentication
when the satellite connected to more than one portal.
PAN-207700 Fixed an issue where the show system info and show system
ztp status CLI commands displayed a different Zero Touch
Provisioning (ZTP) status if a firewall upgrade was initiated from
Panorama before the initial commit push succeeded.
PAN-207562 Fixed an issue where the shard count displayed by the show log-
collector-es-cluster health CLI command was higher than
the recommended limit. The recommended limit can be calculated with
the formula 20* heap-memory * no-of-data-nodes.
Issue ID Description
PAN-206396 Fixed an issue where HIP report flip and HIP checks failed when a user
was part of multiple user groups with different domains.
PAN-206253 (PA-1400 Series and PA-3400 Series firewalls only) Fixed an issue
where the default log rate was too low and the maximum configurable
log rate was incorrectly capped, which caused the firewall to not
generate logs at more than 6826 logs per second.
PAN-205955 Fixed an issue where RAID rebuilds occurred even with healthy disks
and a clean shutdown.
PAN-205513 Fixed an issue where the stats dump file generated by Panorama for
a device firewall differed from the stats dump file generated by the
managed device.
PAN-205086 Fixed an issue where DNS Security categories were able to be deleted
from Spyware profiles.
PAN-204838 Fixed an issue where the dot1q VLAN tag was missing in ARP reply
packets.
PAN-204718 (PA-5200 Series firewalls only) Fixed an issue where, after upgrading
to PAN-OS 10.1.6-h3, a TACACS user login displayed the following
error message during the first login attempt: Could not chdir to
home directory /opt/pancfg/home/user: Permission
denied.
PAN-204238 Fixed an issue where, when View Rulebase as Groups was enabled,
the Tags field did not display a scroll down arrow for navigation.
PAN-203330 Fixed an issue where the certificate for an External Dynamic List (EDL)
incorrectly changed from invalid to valid, which caused the EDL file to
be removed.
PAN-202963 Fixed an issue where the system log message dsc HA state is
changed from 1 to 0 was generated with the severity High. With
this fix, the severity was changed to Info.
PAN-202795 Fixed an issue where file identification failed with a large HTTP
header.
Issue ID Description
PAN-200019 Fixed an issue on Panorama where Virtual Routers (Network > Virtual
Routers) was not available when configuring a custom Panorama
admin role (Panorama > Admin Roles).
PAN-199557 Fixed an issue on Panorama where virtual memory usage exceeded the
set limit, which caused the configd process to restart.
PAN-197339 Fixed an issue where template configuration for the User-ID agent was
not reflected on the template stack on Panorama appliances on PAN-
OS 10.2.1.
PAN-197121 Fixed an issue where incorrect user details were displayed under the
USER DETAIL drop-down (ACC > Network activity > User activity).
PAN-195788 Fixed an issue where zip files did not download when applying Security
inspection and the following error message displayed: resources-
unavailable.
PAN-195695 Fixed an issue where the AppScope Summary report and PDF report
export function did not work as expected.
PAN-192456 Fixed an issue where GlobalProtect SSL VPN processing during a high
traffic load caused the dataplane to stop responding.
PAN-187763 Fixed an issue where DNS Security logs did not display a threat
category, threat name, or threat ID when domain names contained 64
or more characters.
PAN-187279 Fixed an issue where not all quarantined devices were displayed as
expected.
PAN-184630 Fixed an issue where TLS clients, such as those using OpenSSL 3.0,
enforced the TLS renegotiation extension (RFC 5746).
53
PAN-OS 11.0.1 Known and Addressed Issues
Issue ID Description
PAN-221126 Email server profiles (Device > Server Profiles > Email and
Panorama > Server Profiles > Email) to forward logs as email
notifications are not forwarded in a readable format.
Workaround: Use a Custom Log Format to forward logs as
email notifications in a readable format.
Issue ID Description
This issue is now resolved. See
PAN-OS 11.0.2 Addressed
Issues.
Issue ID Description
This issue is now resolved. See certificate (Device > Setup > Management or Panorama >
PAN-OS 11.0.2 Addressed Setup > Management).
Issues.
• M-300 and M-700
• PA-410 Firewall
• PA-415 and PA-445 Firewalls
• PA-440, PA-450, and PA-460 Firewalls
• PA-1400 Series
• PA-3400 Series
• PA-5410, PA-5420, and PA-5430 Firewalls
• PA-5440 Firewall
• PA-5450 Firewall
Workaround: Log in to the firewall CLI or Panorama CLI and
fetch the device certificate.
PAN-207770 Data filtering logs (Monitor > Logs > Data Filtering)
incorrectly display the traffic Direction as server-to-
client instead of client-to-server for upload traffic
that matches Enterprise data loss prevention (DLP) data
patterns (Objects > DLP > Data Filtering Patterns) in an
Enterprise DLP data filtering profile (Objects > DLP > Data
Filtering Profiles).
Issue ID Description
Workaround: Select and then unselect the managed firewalls
for which you created a new tag.
Issue ID Description
Workaround: Restart the mgmtsrvr process on the
Dedicated Log Collector.
1. Log in to the Dedicated Log Collector CLI.
2. Confirm the Dedicated Log Collector is disconnected from
Panorama.
Issue ID Description
• Allow User to Uninstall GlobalProtect App > Allow with
Password
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
Issue ID Description
selected before PoE was configured, the error message will
include the interface name.
PAN-192282 (PA-415 and PA-445 firewalls only) In 1G mode, the MGT and
Ethernet 1/1 port LEDs glow amber instead of green.
Issue ID Description
PAN-184708 Scheduled report emails (Monitor > PDF Reports > Email
Scheduler) are not emailed if:
• A scheduled report email contains a Report Group
(Monitor > PDF Reports > Report Group) which includes a
SaaS Application Usage report.
• A scheduled report contains only a SaaS Application Usage
Report.
Workaround: To receive a scheduled report email for all other
PDF report types:
1. Select Monitor > PDF Reports > Report Groups and
remove all SaaS Application Usage reports from all Report
Groups.
2. Select Monitor > PDF Reports > Email Scheduler and
edit the scheduled report email that contains only a SaaS
Application Usage report. For the Recurrence, select
Disable and click OK.
Repeat this step for all scheduled report emails that
contain only a SaaS Application Usage report.
3. Commit.
(Panorama managed firewalls) Select Commit > Commit
and Push
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
Issue ID Description
PAN-217431 (PA-5400 Series firewalls with DPC (Data Processing Cards) only)
Fixed an issue with slot 2 DPCs where URL filtering did not work as
expected after upgrading to PAN-OS 10.1.9.
PAN-215496 Fixed an issue where 100G ports did not come up with BIDI QSFP
modules.
PAN-215461 Fixed an issue where the packet descriptor leaked over time with GRE
tunnels and keepalives.
PAN-211870 Fixed an issue where path monitoring failure occurred, which caused
high availability failover.
PAN-211519 Fixed an issue where RTP/RTCP packets were dropped for SIP calls
by SIP ALG when the source NAT translation type was persistent
Dynamic IP And Port.
PAN-208189 Fixed an issue when traffic failed to match and reach all destinations
if a Security policy rule includes FQDN objects that resolve to two or
more IP addresses.
PAN-216656 Fixed an issue where the firewall was unable to fully process the user
list from a child group when the child group contained more than
1,500 users.
PAN-215911 Fixed an issue that resulted in a race condition, which caused the
configd process to stop responding.
PAN-215488 Fixed an issue where an expired Trusted Root CA was used to sign the
forward proxy leaf certificate during SSL Decryption.
PAN-210561 Fixed an issue where the all_task process repeatedly restarted due to
missed heartbeats.
PAN-210513 Fixed an issue where Captive Portal authentication via SAML did not
work.
PAN-210481 Fixed an issue where botnet reports were not generated on the
firewall.
PAN-210449 Fixed an issue where the value for shared objects used in policy
rules were not displayed on multi-vsys firewalls when pushed from
Panorama.
PAN-210331 Fixed an issue where the firewall did not send device telemetry files to
Cortex Data Lake with the error message send the file to CDL
receiver failed.
PAN-210237 Fixed an issue where system logs generated by Panorama for commit
operations showed the severity as High instead of Informational.
PAN-210080 Fixed an issue where the useridd process stopped responding when
add and delete member parameters in an incremental sync query were
empty.
PAN-209799 Fixed an issue where logging was not disabled on passive nodes, which
caused the logrcvr to stop responding.
Issue ID Description
PAN-209491 Fixed an issue on the web interface where the Session Expire Time
displayed a past date if the device time was in December.
PAN-209036 Fixed an issue where the dataplane restarted, which led to slot failures
occurring and a core file being generated.
PAN-208987 (PA-5400 Series only) Fixed an issue where packets were not
transmitted from the firewall if its fragments were received on
different slots. This occurred when aggregate ethernet (AE) members
in an AE interface were placed on a different slot.
PAN-208902 Fixed an issue where, when a client sent a TCP/FIN packet, the
firewall displayed the end reason as aged-out instead of tcp-fin.
PAN-208724 Fixed an issue where port pause frame settings did not work as
expected and incorrect pause frames occurred.
PAN-208711 (PA-5200 Series firewalls only) The CLI command debug dataplane
set pow no-desched yes/no was added to address an issue
where the all_pktproc process stopped responding and caused traffic
issues.
PAN-208525 Fixed an issue where Security policy rules with user groups did not
match when Kerberos authentication was configured for explicit
proxy.
PAN-208485 Fixed an issue where NAT policies were not visible on the CLI if they
contained more than 32 characters.
Issue ID Description
PAN-208343 Fixed an issue where telemetry regions were not visible on Panorama.
PAN-208157 Fixed an issue where malformed hints sent from the firewall caused
the logd process to stop responding on Panorama, which caused a
system reboot into maintenance mode.
PAN-207940 Fixed an issue where platforms with RAID disk checks were performed
weekly, which caused logs to incorrectly state that RAID was
rebuilding.
PAN-207740 Fixed an issue that resulted in a race condition, which caused the
configd process to stop responding.
PAN-207663 Fixed a Clientless VPN issue where JSON stringify caused issues with
the application rewrite.
PAN-207610 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue
where Log Admin Activity was not visible on the web interface.
PAN-207601 Fixed an issue where URL cloud connections were unable to resolve
the proxy server hostname.
PAN-207426 Fixed an issue where a selective push did not include the Share
Unused Address and Service Objects with Devices option on
Panorama, which caused the firewall to not receive the objects during
the configuration push.
PAN-207260 A commit option was enabled for Device Group and Template
administrators after a password change.
Issue ID Description
PAN-206963 (M-700 Appliances only) A CLI command was added to check the
status of each physical port of a bond1 interface.
PAN-206858 Fixed an issue where a segmentation fault occurred due to the useridd
process being restarted.
PAN-206684 (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only)
Fixed an issue where, after upgrading the firewall from a PAN-OS 10.0
release to a PAN-OS 10.1 release, the firewall did not duplicate logs
to local log collectors or to Cortex Data Lake when a device certificate
was already installed.
PAN-206658 Fixed a timeout issue in the Intel ixgbe driver that resulted in internal
path monitoring failure.
PAN-206466 Fixed an issue where the push scope was displaying duplicate shared
objects for each device group that were listed under the shared-object
group.
PAN-206251 (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only)
Fixed an issue where the logrcvr process did not send the system-
start SNMP trap during startup.
PAN-206233 Fixed an issue where the pan_comm process stopped responding when
a content update and a cloud application update occurred at the same
time.
PAN-206069 Fixed an issue where the firewall was unable to boot up on older Intel
CPUs.
Issue ID Description
PAN-206005 (PA-1400 Series, PA-3400 Series, and PA-5440 firewalls only) Fixed
an issue where the l7_misc memory pool was undersized and caused
connectivity loss when the limit was reached.
PAN-205877 (PA-5450 firewalls only) Added debug commands for an issue where
a MAC address flap occurred on a neighbor firewall when connecting
both MGT-A and MGT-B interfaces.
PAN-205829 Fixed an issue where logs did not display Host-ID details for
GlobalProtect users despite having a quarantine Security policy rule.
This occurred due to a missed local cache lookup.
PAN-205729 (PA-3200 Series and PA-7000 Series firewalls only) Fixed an issue
where the CPLD watchdog timeout caused the firewall to reboot
unexpectedly.
PAN-205699 Fixed an issue where the cloud plugin configuration was automatically
deleted from Panorama after a reboot or a configd process restart.
PAN-205590 Fixed an issue where the fan tray fault LED light was on even though
no alarm was reported in the system environment.
PAN-205453 Fixed an issue where running reports or queries under a user group
caused the reportd process to stop responding.
PAN-205396 Fixed an issue where SD-WAN adaptive SaaS path monitoring did not
work correctly during a next hop link down failure.
PAN-205260 Fixed an issue where there was an IP address conflict after a reboot
due to a transaction ID collision.
PAN-205255 Fixed a rare issue that caused the dataplane to restart unexpectedly.
Issue ID Description
PAN-205211 Fixed an issue where the reportd process stopped responding while
querying logs (Monitor > Logs > <logtype>).
PAN-205096 Fixed an issue where promoted sessions were not synced with all
cluster members in an HA cluster.
PAN-204749 Fixed an issue where sudden, large bursts of traffic destined for an
interface that was down caused packet buffers to fill, which stalled
path monitor heartbeat packets.
PAN-204581 Fixed an issue where, when accessing a web application via the
GlobalProtect Clientless VPN, the web application landing page
continuously reloaded.
PAN-204575 (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only)
Fixed an issue where the firewall did not forward logs to the log
collector.
PAN-204572 Fixed an issue where python scripts were not working as expected.
PAN-204456 Fixed an issue related to the logd process that caused high memory
consumption.
PAN-203964 (Firewalls in FIPS-CC mode only) Fixed an issue where the firewall
went into maintenance mode due to downloading a corrupted
software image, which resulted in the error message FIPS-CC
failure. Image File Authentication Error.
PAN-203453 Fixed an issue on Panorama where the log query failed due to a high
number of User-ID redistribution messages.
Issue ID Description
PAN-203430 Fixed an issue where, when the User-ID agent had collector
name/secret configured, the configuration was mandatory on clients
on PAN-OS 10.0 and later releases.
PAN-203339 Fixed an issue where services failed due to the RAID rebuild not being
completed on time.
PAN-203147 (Firewalls in FIPS-CC mode only) Fixed an issue where the firewall
unexpectedly rebooted when downloading a new PAN-OS software
image.
PAN-203137 (PA-5450 firewalls only) Fixed an issue where HSCI ports did not come
up when QSFP DAC cables were used.
PAN-202248 Fixed an issue where, due to a tunnel content inspection (TCI) policy
match, IPSec traffic did not pass through the firewall when NAT was
performed on the traffic.
PAN-201701 Fixed an issue where the firewall generated system log alerts if the raid
for a system or log disk was corrupted.
PAN-201580 Fixed an issue where the useridd process stopped responding due to
an invalid vsys_id request.
PAN-200160 Fixed a memory leak issue on Panorama related to the logd process
that caused an out-of-memory (OOM) condition.
PAN-199965 Fixed an issue where the reportd process stopped responding on log
collectors during query and report operations due to a race condition
between request handling threads.
PAN-199807 Fixed an issue where the dataplane frequently restarted due to high
memory usage on wifclient.
PAN-196597 Fixed an issue where the dnsproxyd process stopped responding due to
corruption.
Issue ID Description
PAN-198306 Fixed an issue where the useridd process stopped responding when
booting up the firewall.
PAN-198266 Fixed an issue where, when predicts for UDP packets were created,
a configuration change occurred that triggered a new policy lookup,
which caused the dataplane stopped responding when converting the
predict. This resulted in a dataplane restart.
PAN-197872 Fixed an issue where the useridd process generated false positive
critical errors.
PAN-197298 Fixed an issue where the audit comment archive for Security rule
changes output had overlapping formats.
PAN-196410 Fixed an issue where you were unable to customize the risk value in
Risk-of-app.
PAN-195756 Fixed an issue that caused an API request timeout when parsing
requests using large header buffers.
PAN-194068 (PA-5200 Series firewalls only) Fixed an issue where the firewall
unexpectedly rebooted with the log message Heartbeat failed
previously.
PAN-192513 Fixed an issue where log migration did not work when converting a
Legacy mode Panorama appliance to Log Collector mode.
PAN-191222 Fixed an issue where Panorama became inaccessible when after a push
to the collector group.
PAN-190502 Fixed an issue where the Policy filter and Policy optimizer filter were
required to have the exact same syntax, including nested conditions
with rules that contained more than one tag when filtering via the neq
operator.
PAN-189335 Fixed an issue where the varrcvr process restarted repeatedly, which
caused the firewall to restart.
PAN-189200 Fixed an issue where sinkholes did not occur for AWS Gateway Load
Balancer dig queries.
Issue ID Description
PAN-186412 Fixed an issue where invalid packet-ptr was seen in work entries.
PAN-186270 Fixed an issue where, when HA was enabled and a dynamic update
schedule was configured, the configd process unexpectedly stopped
responding during configuration commits.
PAN-183375 Fixed an issue where traffic arriving on a tunnel with a bad IP address
header checksum was not dropped.
PAN-180948 Fixed an issue where an external dynamic list fetch failed with the
error message Unable to fetch external dynamic list.
Couldn't resolve host name. Using old copy for
refresh.
PAN-179174 Fixed an issue where exported PDF report of the ACC was the
incorrect color after upgrading from a PAN-OS 10.1 or later release.
PAN-178594 Fixed an issue where the descriptions of options under the set
syslogng ssl-conn-validation CLI command were not
accurate.
73
PAN-OS 11.0.0 Known and Addressed Issues
Issue ID Description
Issue ID Description
Monitor (Monitor > App Scope > Threat Monitor) and ACC.
This results in the ACC displaying no data to display
when you are redirected to the ACC after clicking a threat
name in the Threat Monitor and filtering the same threat
name in the Global Filters.
PAN-207770 Data filtering logs (Monitor > Logs > Data Filtering)
incorrectly display the traffic Direction as server-to-
Issue ID Description
client instead of client-to-server for upload traffic
that matches Enterprise data loss prevention (DLP) data
patterns (Objects > DLP > Data Filtering Patterns) in an
Enterprise DLP data filtering profile (Objects > DLP > Data
Filtering Profiles).
Issue ID Description
forwarding to the disconnected Dedicated Log Collector is
not impacted.
Workaround: Restart the mgmtsrvr process on the
Dedicated Log Collector.
1. Log in to the Dedicated Log Collector CLI.
2. Confirm the Dedicated Log Collector is disconnected from
Panorama.
Issue ID Description
Workaround: Disable HTTP2 by enabling Strip ALPN in the
decryption profile or avoid usage of the I7_misc memory pool.
Issue ID Description
with Block Private Key Export setting enabled in templates A
and B.
Workaround: After cloning a template, delete and re-import
the corrupted certificates.
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
Issue ID Description
PAN-192282 (PA-415 and PA-445 firewalls only) In 1G mode, the MGT and
Ethernet 1/1 port LEDs glow amber instead of green.
Issue ID Description
Workaround: Use Commit > Push to Devices to synchronize
the templates.
PAN-184708 Scheduled report emails (Monitor > PDF Reports > Email
Scheduler) are not emailed if:
• A scheduled report email contains a Report Group
(Monitor > PDF Reports > Report Group) which includes a
SaaS Application Usage report.
• A scheduled report contains only a SaaS Application Usage
Report.
Workaround: To receive a scheduled report email for all other
PDF report types:
1. Select Monitor > PDF Reports > Report Groups and
remove all SaaS Application Usage reports from all Report
Groups.
2. Select Monitor > PDF Reports > Email Scheduler and
edit the scheduled report email that contains only a SaaS
Application Usage report. For the Recurrence, select
Disable and click OK.
Repeat this step for all scheduled report emails that
contain only a SaaS Application Usage report.
3. Commit.
(Panorama managed firewalls) Select Commit > Commit
and Push
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
Issue ID Description
PAN-207505 Fixed an issue where Email schedules (Monitor > PDF Reports > Email
Scheduler) were not supported for SaaS Application Usage (Monitor >
PDF Reports > SaaS Application Usage) reports.
PAN-204615 Fixed an issue where BGP sessions could flap even when an unrelated
configuration was committed. This resulted in the BGP session going
down and getting established again. As a result, BGP routes were
exchanged again, which could lead to momentary traffic disruption if
BGP routes were in use for establishing traffic.
PAN-202783 (PA-7000 Series firewalls with 100G NPC (Network Processing Cards)
only) Fixed an issue where sudden, large bursts of traffic destined for
an interface that was down caused packet buffers to fill, which stalled
path monitor heartbeat packets.
PAN-202535 Fixed an issue where the Device Telemetry configuration for a region
was unable to be set or edited via the web interface.
PAN-199654 Fixed an issue where ACC reports did not work for custom RBAC
users when more than 12 access domains were associated with the
username.
PAN-198244 Fixed an issue where using the load config partial CLI
command to x-paths removed address object entries from address
groups.
PAN-197383 Fixed an issue where, after upgrading to PAN-OS 10.2 release, the
firewall ran a RAID rebuild for the log disk after ever every reboot.
PAN-197341 Fixed an issue on Panorama where, when you created multiple device
group objects with the same name in the shared device group and
any additional device groups (Panorama > Device Groups) under the
same device group hierarchy that were used in one or more policies,
renaming the object with a shared name in any device group caused
Issue ID Description
the object name to change in the policies that it was used in. This issue
occurred with device group objects that were referenced in a Security
policy rule.
PAN-196558 Fixed an issue where IP address tag policy updates were delayed.
PAN-196398 (PA-7000 Series SMC-B firewalls only) Fixed an issue where the
firewall did not capture data when the active management interface
was MGT-B.
PAN-194615 Fixed an issue where the packet broker session timeout value did not
match the master sessions timeout value after the firewall received a
TCP FIN or RST packet. The fix ensures that Broker session times out
within 1 second after the master session timed out.
PAN-189270 Fixed an issue that caused a memory leak on the reportd process.
PAN-171714 Fixed an issue where, when NetBIOS format (domain\user) was used
for the IP address-to-username mapping and the firewall received
the group mapping information from the Cloud Identity Engine, the
firewall did not match the user to the correct group.
85
Related Documentation