Pan Os Release Notes
Pan Os Release Notes
Pan Os Release Notes
Version 9.0.10
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2019-2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
August 27, 2020
5
6 PAN-OS® RELEASE NOTES | PAN-OS 9.0 Release Information
© 2020 Palo Alto Networks, Inc.
Features Introduced in PAN-OS 9.0
The following topics describe the new features and new hardware introduced with the PAN-OS® 9.0
release, which requires content release version 8103 or a later version. For upgrade and downgrade
considerations and for specific information about the upgrade path for a firewall, refer to the PAN-OS 9.0
New Features Guide. The new features guide also provides additional information about how to use the
new features in this release.
• App-ID Features
• Virtualization Features
• Panorama Features
• Content Inspection Features
• GlobalProtect Features
• Management Features
• Networking Features
• User-ID Features
• WildFire Features
• Hardware Features
App-ID Features
New App-ID Feature Description
Policy Optimizer Policy Optimizer identifies all applications seen on any legacy
Security policy rule and provides an easy workflow for selecting
the applications you want to allow on that rule. Additionally, it
helps you remove unused applications from overprovisioned
application-based rules. This simplified workflow allows you to
migrate a legacy rule gradually and natively to an application-
based rule so you can safely enable applications in your
environment and improve your security posture.
®
(Beginning with PAN-OS 9.0.2) Policy Optimizer also gives you
the option to select applications in a legacy Security policy rule
and add applications to an existing rule so that you can leverage
pre-existing App-ID™ based rules and eliminate the need to
continually create new rules. You can also now choose between
container app and specific apps seen so that the web interface
clearly displays which applications have been seen on a rule and
which ones were added as part of the container but that have
not, yet, been seen on that rule.
HTTP/2 Inspection You can now safely enable applications running over HTTP/2,
without any additional configuration on the firewall. As more
websites continue to adopt HTTP/2, the firewall can enforce
security policy and detect and prevent threats on a per-stream
basis. This visibility into HTTP/2 traffic enables you to secure
web servers that provide services over HTTP/2, and allow your
users to benefit from the speed and resource efficiency gains
that HTTP/2 provides.
Strict Default Ports for Decrypted Application-default—which enables you to allow applications
Applications only on their most commonly-used ports—now enforces
strict default port usage strict standard port usage for certain
applications that use a different default port when they are
encrypted: web-browsing, SMTP, FTP, LDAP, POP3, and IMAP.
For example, with SSL decryption turned on, application-default
differentiates between cleartext and encrypted web-browsing
traffic and strictly enforces:
• cleartext web-browsing traffic (HTTP) on port 80
• and encrypted web-browsing traffic (HTTPS) on port 443.
Virtualization Features
New Virtualization Features Description
VM-Series firewall on KVM—VLAN Access In VLAN access mode with SR-IOV, when you deploy
Mode with SR-IOV the VM-Series firewall as a Virtual Network Function
® (VNF) on the KVM hypervisor, it can send and receive
Available starting with PAN-OS 9.0.4.
packets from SR-IOV virtual functions (VFs) without
VLAN tags. This capability enables you to apply
QoS policies on the access interface and provide
differentiated treatment of traffic in a multi-tenant
deployment.
VM-Series on AWS—Support for C5 and M5 The VM-Series firewall on AWS adds support for the
Instance Types with ENA C5 and M5 instance types that use the Elastic Network
Adapter (ENA). With the support for these instance
types, you can deploy the VM-Series firewall in all
regions that support C5/M5 instance types including
new AWS regions, such as AWS Paris that exclusively
use newer instance types.
Support for HA for VM-Series on Azure The VM-Series firewall on Azure now supports an
active/passive HA configuration. This capability is
delivered using the VM-Series plugin (see above).
Higher Performance for VM-Series on Azure To support higher throughput, VM-Series firewalls
using Azure Accelerated Networking (SR- deployed on D/DSv2 and D/DSv3 class of Azure VMs
IOV) include support for Accelerated Networking (SR-IOV).
You can now deploy this higher performance firewall as
an active/passive HA pair or in a scale-out deployment
with Azure load balancers.
The following Networking Features are also relevant for VM-Series deployments in
private or public cloud environments:
• Security Group Tag (SGT) EtherType Support
• FQDN Refresh Enhancement
• FQDN Support for Static Route Next Hop, PBF Next Hop, and BGP Peer
• Dynamic DNS Support for Firewall Interfaces
• Advanced Session Distribution Algorithms for Destination NAT
• VXLAN Tunnel Content Inspection
Panorama Features
Master Key When you need to change the default master key used to encrypt sensitive
Deployment from elements in the configuration, you can now deploy a master key to firewalls,
Panorama™ Log Collectors, and WildFire appliances from Panorama. In a large-scale
deployment, managing the master key centrally from Panorama ensures a
uniform master key deployment and provides visibility into the status of the
operation.
Device Management Scale up all your Panorama capabilities to manage up to 5,000 firewalls, using
Capacity Enhancement M-600 appliances or similarly resourced Panorama virtual appliances. This
enhancement allows you to leverage all the benefits of centralization while
utilizing the logging, reporting, device health monitoring, device deployment,
and configuration management capabilities of Panorama for a larger number
of firewalls. For example, if you are managing 3,500 firewalls using four
Panorama appliances, you can now consolidate to a single Panorama
appliance for managing your firewalls to ease the operational burden and
reduce your management footprint.
Granular Configuration In order to troubleshoot configuration errors, you can now perform
Management of Device operations such as export, revert, save, import, and load at a device group
Groups and Templates and template level. For example, this granularity allows you to independently
Streamlined Device Panorama enables simplified onboarding of new firewalls by allowing you to
Onboarding assign them to device groups, templates, collector groups, or Log Collectors
during the initial deployment. You can also elect to automatically push the
configuration to firewalls when the firewalls initially connect to Panorama.
Using this onboarding workflow, you can ensure that new firewalls are
immediately configured and ready to secure your network.
VM-Series Plugin The VM-Series plugin manages integration with public and private clouds,
allowing Palo Alto Networks to release bug fixes, new features, or new cloud
®
integrations, independent of a PAN-OS release.
Panorama 9.0 supports the VM-Series plugin and supplies the compatible
version, but does not install it automatically. Install the plugin if you have VM-
Series cloud integrations and you want to use Panorama to manage them
centrally.
DNS Security The firewall can now access the full database of Palo Alto
Networks DNS signatures through a new DNS Security service.
The DNS Security service also performs pro-active analysis of
DNS data to predict new malicious domains and to detect C2
evasion techniques—like domain generation algorithms and
DNS tunneling—that aim to bypass common protections.
New Security-Focused URL New Security-focused URL categories enable you to implement
Categories simple security and decryption policies based on website safety,
without requiring you to decide (or even know) what website is
likely to expose you to web-based threats:
• High risk, medium risk, and low risk—These categories
indicate the level of suspicious activity that a site displays.
All URLs—except those that are confirmed malware, C2, or
phishing sites—now include this risk rating.
• Newly-registered domains—This category identifies sites
that were registered within the last 32 days. New domains
are frequently used as tools in malicious campaigns.
These new categories help you to reduce your attack surface
by providing targeted decryption and enforcement for sites
that pose varying levels of risk but are not confirmed malicious.
Websites are classified with a Security-related category only
when they meet the criteria for that category; as site content
changes, policy enforcement dynamically adapts.
Multi-Category URL Filtering PAN-DB, the Palo Alto Networks URL database, now assigns
multiple categories to URLs that classify the content, purpose,
and safety of a site. Every URL now has up to four categories,
Built-In External Dynamic List for Because bulletproof hosting providers place few, if any,
Bulletproof Hosts restrictions on content, attackers frequently use these services
to host and distribute malicious, illegal, and unethical material.
The Threat Prevention subscription now includes a new built-
in external dynamic list (EDL) that you can use to block IP
addresses associated with bulletproof hosting providers.
EDL Capacity Increases External dynamic list (EDL) capacities are increased to better
accommodate the use of third-party intelligence feeds,
significantly expanding the number of threat indicators you can
leverage within your network Security policies. Additionally,
you can now prioritize EDLs to make sure lists containing
critical threat indicators are committed before capacity limits
are reached.
Support for New Predefined Data To identify and protect sensitive information from leaving your
Filtering Patterns network, the firewall provides 19 new predefined data filtering
patterns that identify specific (regulated) information from
different countries of the world, such as INSEE Identification
(France) and New Zealand Internal Revenue Department
®
Identification Numbers. PAN-OS software also performs a
checksum validation for all patterns to eliminate false positives.
Cellular IoT Security As your business moves to cellular IoT (CIoT) and the network
adopts 3GPP CIoT technologies, you need to secure CIoT traffic
to protect your network and CIoT from attacks. Cellular IoT
Security allows you to secure CIoT traffic and gain visibility into
CIoT and device-to-device communication over your network.
If you are a mobile network operator (MNO) or a mobile virtual
network operator (MVNO), such as a utility company focused
on oil, gas, or energy operating as an MVNO, you can now
secure CIoT traffic. CIoT security also allows you to protect
MNO infrastructure and CIoT devices from DoS attacks on
both Signaling/Control and Data layers, from attacks from
infected CIoTs, and from spying attacks; and it allows you to
detect and prevent malware, ransomware, and vulnerabilities.
Additionally, the firewall now supports Narrowband IoT (NB-
IoT) radio access technology (RAT), 3GPP TS 29.274 for GTPv2-
C up to Release 15.2.0, and 3GPP TS 29.060 for GTPv1-C up to
Release 15.1.0.
CIoT security is supported on VM-Series firewalls, PA-5200
Series firewalls, and PA-7000 Series firewalls that have all new
GTP Event Packet Capture Firewalls now support packet capture for a GTP event to make
troubleshooting easier. GTP packet capture is supported for
events such as GTP-in-GTP, end user IP address spoofing, and
abnormal GTPv1-C, GTPv2-C, and GTP-U messages that have
missing mandatory information elements (IE), invalid IE, invalid
header, out-of-order IE, or unsupported message type.
GTP event packet capture is supported on VM-Series firewalls,
PA-5200 Series firewalls, and PA-7000 Series firewalls that
have all new cards, including new 100G NPC, new second-
generation SMCs, and new Log Forwarding Card (LFC).
Graceful Enablement of GTP Stateful (PAN-OS 9.0.3 and later releases) You can now enable GTP
Inspection stateful inspection in the firewall gracefully with minimal
disruption to GTP traffic. You can allow GTPv2, GTPv1-C, and
GTP-U packets that fail GTP stateful inspection to pass through
a firewall. Although the firewall drops such packets by default
after GTP stateful inspection is enabled, allowing them to pass
minimizes disruption when you deploy a new firewall or when
you migrate GTP traffic.
Graceful Enablement of SCTP (PAN-OS 9.0.4 and later releases) You can now enable SCTP
Stateful Inspection stateful inspection in the firewall gracefully with minimal
disruption to SCTP traffic. You can allow SCTP packets
that fail SCTP stateful inspection to pass through a firewall.
Although the firewall drops such packets by default after SCTP
stateful inspection is enabled, allowing them to pass minimizes
disruption when you deploy a new firewall or when you migrate
SCTP traffic.
One of the new App-ID Features, HTTP/2 Inspection, enables you to enforce threat
prevention on a per-stream basis.
GlobalProtect Features
®
The following table describes new GlobalProtect™ features introduced in PAN-OS 9.0. For features related
to the GlobalProtect app, see the GlobalProtect App 5.0 Release Notes.
Simplified Deployment You can now reduce the number of GlobalProtect portals and gateways you
for GlobalProtect need to deploy and manage for GlobalProtect use cases by configuring the
Portals and Gateways following features on a single firewall:
• Endpoint Tunnel Configurations Based on Source Region or IP Address—
You can now assign tunnel configurations to users based on their source
IP address or region from a particular GlobalProtect gateway. For example,
HIP Report In data center environments, you can now use HIP report redistribution to
Redistribution ensure consistent policy enforcement across all endpoints and to simplify
policy configuration and management across internal and external gateways.
With HIP report redistribution, you use the same mechanism as User-ID™
redistribution to enable the GlobalProtect gateways to send the HIP reports
to a Dedicated Log Collector (DLC), firewall, or Panorama™. HIP report
redistribution eliminates the need for exception policies for external gateways
or internal gateways thereby simplifying HIP setup and configuration time for
your gateways and firewalls.
Tunnel Restoration and You can now enforce additional restrictions for enhanced security:
Authentication Cookie
• You can now choose to enable automatic restoration of VPN tunnels at
Usage Restrictions
the gateway level. For example, you can enable automatic restoration
of VPN tunnels for all gateways in the enterprise except for specific
gateways that you want to require authentication before a tunnel is
established.
• You can now choose whether to accept an authentication cookie when
the IP address attributes (IP address or IP address range) of the endpoint
change. If you choose to reject an authentication cookie when the
endpoint IP address attribute differs from the original value associated
with the authentication cookie, the user must authenticate again to
receive a new authentication cookie.
Pre-Logon Followed By The GlobalProtect app for Windows and Mac endpoints now supports pre-
Two-Factor and SAML logon followed by two-factor or SAML authentication for user login. After
Authentication the pre-logon tunnel is established, the user can log in to the endpoint and
authenticate using the configured authentication method. If authentication
is successful on Windows endpoints, the pre-logon tunnel is seamlessly
renamed to User tunnel and the GlobalProtect connection is established. If
authentication is successful on macOS endpoints, a new tunnel is created and
the GlobalProtect connection is established.
GlobalProtect Gateway To help users identify the geographic location of GlobalProtect gateways, you
and Portal Location can now configure a label for the physical location. By separating the location
Configuration into a dedicated label, you can also use location-independent names when
you configure your gateways.
The GlobalProtect app displays the label for the location of the gateway
to which a user is connected and the Clientless VPN portal landing page
displays the label for the location of the portal to which a Clientless VPN user
is logged in.
When end users experience unusual behavior, such as poor network
performance, they can provide this location information to their support or
Help Desk professionals to assist with troubleshooting. They can also use this
location information to determine their proximity to the Clientless VPN portal
or gateway. Based on their proximity, they can evaluate whether they need
to switch to a closer portal or gateway. However, auto-selected gateways are
still preferred.
Refer to the GlobalProtect App 5.0 Release Notes for more information on
gateway and portal location visibility for end users.
User Location Visibility For enhanced reporting and user activity analysis, you can now view the
on GlobalProtect source region of users that connect (or have previously connected) to
Gateways and Portals GlobalProtect portals and gateways. You can identify the source region of the
Clientless VPN users in the Remote Users section of the Portal configuration
and the source region of GlobalProtect users in the Remote Users section of
the Gateway configuration.
Concurrent Support You can now assign up to ten IPv4 and IPv6 DNS servers in the client settings
for IPv4 and IPv6 DNS provided to the endpoint by the GlobalProtect gateway. This enhancement
Servers enables you to simultaneously assign multiple IPv4 and IPv6 DNS servers
simultaneously to the endpoints that connect to the gateway.
Support for IPv6- GlobalProtect now supports IPv6-only deployments. With this enhancement,
Only GlobalProtect you can define an IP address pool that uses only IPv6 addresses when you
Deployments con-figure GlobalProtect gateways.
When you configure IPv6 pools, you must also enable split
tunneling to route any IPv4 traffic from the endpoint to the
internet.
Cortex™ Data Lake Palo Alto Networks Cortex Data Lake provides cloud-based, centralized log
Logging for Firewalls storage and aggregation for firewalls and services. With Cortex Data Lake,
without Panorama™ Palo Alto Networks takes care of the ongoing maintenance and monitoring of
your logging infrastructure so that you can focus on your business.
®
Until PAN-OS 9.0.3, Panorama was required to onboard firewalls to Cortex
Data Lake and to view logs stored in Cortex Data Lake. Now, with PAN-OS
9.0.3 and later releases, you can enable non-Panorama managed firewalls to
securely connect and send logs to Cortex Data Lake.
Enforcement of As your team creates and modifies rules, the rationale for creating or
Description, Tag and modifying rules are lost over time. To capture the reason for rule creation and
Audit Comment modification, you can now require a description, tag, or audit comment to
maintain rule revision history for auditing. For example, if you are creating a
new app-based security policy rule to replace a port-based rule, enforce these
rule creation elements to ensure that the rule is appropriately grouped, and
that the administrator describes the purpose of the rule.
Rule Changes Archive When you create or modify policy rules, you now have revision history to
audit changes. To track and analyze how your policy rules have evolved over
time, you can review the audit comment history and see differences between
two rule versions. Combined with the new Enforcement of Rule Description,
Tag and Audit Comment (see above), you can enforce audit comments with
every rule creation and modification to ensure that the audit comment history
is maintained for your policy rulebases.
Tag Based Rule Groups Visually group related rules using a new group tag to efficiently manage
large sets of related rules within any policy rulebase. You can use any tag
as a group tag to organize related rules so that you can easily move, clone,
or delete the rules in the selected group. This allows you to visually see the
organizational changes that are happening to your rulebase, and increase the
efficiency of managing large sets of rules.
Policy Match and Validate policy configuration changes of one or more firewalls directly from
Connectivity Tests the web interface to ensure network traffic matches the policy rules as
from the Web Interface expected. In addition to validating policy, you can also test that firewalls can
reach network resources. With the ability to run test commands on the web
interface, you can avoid over-provisioning administrator roles with CLI access
while still giving administrators a way to determine firewalls are configured
correctly.
Rule Usage Filtering When auditing your rulebase, you can now filter and quickly identify
unused rules to manage policy rules. Removing unused rules improves your
security posture by reducing the proliferation of rules. For example, when
transitioning from port-based rules to App-ID™ based rules, this information
enables you to assess whether your App-ID based rules are matched instead
of your port-based rules so that you can remove the unused rules.
Object Capacity To help you scale your deployment and ease the migration to Palo Alto
Improvements on Networks firewalls, the PA-5220 and the PA-3200 Series firewalls have
the PA-5220 and increased capacities for several objects, including increases in the number of
the PA-3200 Series address objects, address groups, service groups, service objects, zones, and
Firewalls policy rules.
API Key Lifetime If you are using the firewall or Panorama APIs to enable programmatic access,
you can now specify the API key lifetime to match the automation task
duration and control the validity period for an authenticated and secure
connection between the firewall/Panorama and the automation program or
service. Because each API call requires the API key, using a key with a limited
lifetime allows you to enforce key rotation at a regular cadence to safeguard
your network and adhere to compliance standards. You can also expire all API
keys simultaneously, if you suspect accidental exposure or a leak.
PAN-OS REST API In addition to the existing XML API, the firewalls and Panorama now support
for a Simplified a REST API for a more simplified API integration. With the REST API, the
Automation/ firewall is represented as a set of resources with URIs on which you can
Integration Experience perform operations that allow you to easily map firewall tasks to the API
interface. For example, Security policy is represented as a REST resource
with URI /restapi/9.0/Policies/SecurityRules and has a list of operations
that includes list, create, edit, delete, move, and rename. The REST API
provides the flexibility to use JSON and XML data formats in API requests
and responses, and supports versioning for backward compatibility with
future PAN-OS releases. The initial release of this API allows you to manage
the configuration of policies and objects on the firewall and Panorama and
provides reference documentation that is built in to the product.
Universally Unique To simplify auditing, searching, reporting, and tracking for configuration
Identifiers for Policy changes to rules, universally unique identifiers (UUIDs) are created for all
Rules policy rulebases that you create on the firewall or push from Panorama. If you
rename or delete the rule, the UUID ensures that the rule’s history of changes
is maintained. The UUID can pinpoint the rule across multiple rulebases
containing thousands of rules that may have similar or identical names, and
simplifies automation and integration for rules into third-party systems (such
as ticketing or orchestration) that do not support names.
Temporary Master Key You can now extend the lifetime of the master key directly from the firewall
Expiration Extension or from Panorama until your next available maintenance window. If the
master key is due to expire before your planned maintenance window, the
key extension allows the firewall to remain operational and continue securing
your network.
Real-Time Enforcement To enforce security policy for entities such as IoT devices, virtual workloads,
and Expanded and containers that have bursts of traffic or short lifecycles, the firewalls can
Capacities for Dynamic now update the list of registered IP addresses within a dynamic address group
Address Groups in real time. This enhancement enables the firewall to register IP addresses
that match the tags you have defined in dynamic address groups and instantly
apply policy as soon as the endpoint is online, and then unregister the IP
addresses automatically based on a time limit that you configure. And to make
it easier for you to monitor and troubleshoot these registered IP addresses,
Panorama and the firewall now include a new IP-Tag log. Lastly, to handle a
Networking Features
New Networking Feature Description
Security Group Tag (SGT) EtherType If you're using Security Group Tags (SGTs) in a Cisco TrustSec
Support network, inline firewalls in Layer 2 or Virtual Wire mode can
now inspect and enforce the tagged traffic. Layer 3 firewalls
in a Cisco TrustSec network can also inspect and enforce SGT
traffic when deployed between two SGT exchange protocol
(SXP) peers.
Processing of SGT traffic works by default and without any
configuration changes. Because the firewall does not use SGTs
as match criteria for security policy enforcement, you should
continue to define SGT-based policy in the same way you do
today.
FQDN Refresh Enhancement With cloud applications requiring frequent FQDN refresh rates
to ensure nonstop services, the FQDN refresh feature now
supports the ability to refresh cached entries based on the
DNS TTL value. You can set a minimum FQDN refresh time to
limit how frequently the firewall will refresh the FQDN cache
entries to avoid refreshing too frequently, and state how long
the firewall continues to use FQDN cached entries in the event
of a network failure where the DNS server is unreachable.
GRE Tunneling Support The firewall can now be a GRE tunnel endpoint, so you can
send traffic through a GRE tunnel to a point-to-point tunneling
peer, and the firewall will inspect and enforce policies as it
does for non-tunneling traffic. Cloud services and partner
networks often use GRE tunnels for point-to-point connectivity
to customer networks. The firewall also supports GRE over
IPSec to interoperate with other vendors’ implementations in
deployments that encrypt GRE within IPSec.
Wildcard Address Support in Security When you define private IPv4 addresses to internal devices,
Policy Rules you can use an IP addressing pattern that assigns special
meaning to certain bits in the IP address. For example, the first
three bits in the third octet of an IP address might signify the
device type. This structure helps you easily identify device
type, location, and other information, based on the IP address
of the device. You can also use your same address structure
in Security policy rules on the firewall for easier deployment.
Additionally, you can now build Security policy rules based on
sources and destinations that use a wildcard address and use
only specific bits in an IP address as a match. This means you
don’t need to manage an unnecessarily large number of address
objects to cover all the matching IP addressees or use less
Hostname Option Support for DHCP When your firewall interface is a DHCP client (a DHCP server
Clients assigns a dynamic IPv4 address to the interface), you can now
assign a hostname to the interface and send the hostname
(Option 12) to the DHCP server. The DHCP server can register
the hostname with the DNS server, which can automatically
manage hostname-to-dynamic IP address resolutions.
FQDN Support for Static Route Next You can now use an FQDN or FQDN address object in a static
Hop, PBF Next Hop, and BGP Peer route next hop, a PBF next hop, and a BGP peer address. Use
of FQDNs reduces configuration and management overhead.
Also, in order to simplify provisioning, you can use an FQDN
(instead of statically assigning IP addresses to these functions)
and the FQDN resolution can change from location to location.
You can map the FQDN to the IP address based on the location
and deployment requirements. For example, if you are a service
provider, you can provide FQDNs for accessing the services
and resolve these to the IP address of the closest server for
the client (based on the client’s geo-location), so that the same
FQDN can be used globally for the service connection.
Dynamic DNS Support for Firewall When you have services hosted behind the firewall or you
Interfaces need to provide remote access to the firewall, you can now
automatically register IPv4 and IPv6 address changes to a
Dynamic DNS (DDNS) provider whenever the IP address on
the firewall interface changes (for example, if the interface
is a DHCP client). The firewall registers the change with the
DDNS service, which automatically updates the DNS record
(IP address-to-hostname mappings). DDNS support helps avoid
using external mechanisms to keep the DNS records up to date.
The firewall currently supports five DDNS providers: DuckDNS,
DynDNS, FreeDNS Afraid.org, FreeDNS Afraid.org Dynamic
API, and No-IP.
HA1 SSH Key Refresh When you need to change your SSH key pairs to secure HA1
communications, you can now refresh the keys without needing
to restart the firewalls.
VXLAN Tunnel Content Inspection If you use VXLAN as a transport overlay you can use Tunnel
Content Inspection Policy to natively scan traffic within the
VXLAN tunnel. For example, if you use VXLAN as a transport
overlay to connect your geographically dispersed data centers
you can scan and control the individual flows within the tunnel.
With support for the VXLAN protocol in Tunnel Content
Inspection Policy, you have visibility into VXLAN traffic and can
enforce Security Policy rules to this traffic without terminating
the tunnel or implementing network changes.
LACP and LLDP Pre-Negotiation on An HA passive firewall can negotiate LACP and LLDP before it
an HA Passive Firewall becomes active. This pre-negotiation reduces failover times by
eliminating the delays incurred by LACP or LLDP negotiations.
This functionality, previously supported on several firewall
models, extends to PA-220, PA-220R, PA-820, PA-850,
PA-3200 Series, and PA-5280 firewalls.
DNS Rewrite for Destination NAT (Requires Applications and Threats content release version
® 8147 or a later version) You can configure a destination NAT
(Available with PAN-OS 9.0.2 and
policy rule for a static translation of an IPv4 address to also
later 9.0 releases)
translate the IPv4 address in a DNS response that matches the
rule. This DNS rewrite (translation) prevents the DNS server on
one side of the firewall from providing an internal IP address to
its client on the external side of the firewall or vice versa. Thus,
the IPv4 address in the DNS response undergoes NAT and the
firewall forwards the appropriate IPv4 address to the client to
reach the destination service.
Ignore DF (don’t fragment) Bit You can configure the firewall globally to fragment IPv4
packets when the DF (don't fragment) bit is set for packets that
(Available with PAN-OS 9.0.9 and
exceed the egress interface maximum transmission unit (MTU).
later 9.0 releases)
This feature is applied to Layer 3 and tunnel interfaces when
enabled through the CLI.
User-ID Features
New User-ID Feature Description
®
WinRM Support for To create User-ID™ mappings, the PAN-OS integrated User-ID agent can
Server Monitoring now connect to Microsoft Active Directory and Exchange servers using the
lightweight Windows Remote Management (WinRM) protocol. The WinRM
protocol greatly improves the speed and efficiency of collecting User-ID
mappings.
Shared User-ID To easily enforce user-based policy in a multi-vsys environment, you can
Mappings Across assign a virtual system as the User-ID hub to share mappings with other
Virtual Systems virtual systems. This reduces configuration complexity and maximizes the
number of mappings available to each virtual system.
User-ID Support for To consistently enforce user-based Security policy in environments with a
Large Numbers of large number of terminal servers, you can now monitor an increased number
Terminal Servers of terminal servers per firewall. This simplifies the complexity of network
design and firewall configuration, resulting in centralized visibility and policy
enforcement for all terminal server users.
WildFire Features
New WildFire Feature Description
®
WildFire Forwarding Support for You can now configure the Palo Alto Networks firewall
Script Files to automatically forward scripts (JScript, VBScript, and
PowerShell Script) for WildFire analysis.
WildFire Appliance Monitoring The WildFire appliance now features new CLI commands and
Enhancements logs additional system events for you to better monitor and
manage your appliance performance and resources, as well as
providing additional assistance when troubleshooting various
issues.
Increased WildFire File Forwarding The quantity and maximum size of files that a firewall can
Capacity forward to WildFire is increased to provide greater visibility
and detection of uncommonly large malicious samples.
WildFire Appliance Archive Support The WildFire appliance can now analyze and classify RAR and
7-Zip archives, which can be used by an adversary to covertly
deliver malicious payloads to users. When the WildFire
appliance determines that the file contents of an archive
are malicious, it generates a signature for the entire archive.
The appliance then provides the signature to all connected
firewalls to prevent future attacks.
PA-7000 100G The new 100G NPC provides more session capacity than in previous NPCs
Network Processing and improved performance. This new NPC provides the following main
Card (NPC) features:
• App-ID™ throughput (AppMix) of 72Gbps
• Threat throughput (AppMix) of 35Gbps
• Session capacity up to 32 million
• Four QSFP+/QSFP28 (40Gbps/100Gbps) ports
• Eight SFP/SFP+ (1Gbps/10Gbps) ports
• A new service LED that allows a remote administrator to illuminate the
SVC LED on a specific front-slot card so an on-site technician can locate
the card.
PA-7000 Log The new Log Forwarding Card (LFC) implements the high speed log
Forwarding Card (LFC) forwarding feature introduced in PAN-OS 8.0. The LFC includes the following
main features:
• High-speed log forwarding of all dataplane logs to an external log collector
(For example, Panorama™ or syslog servers)
• Supports up to 350,000 logs per second to Panorama
• QSFP/QSFP+ ports (port 1 at 10Gbps and port 9 at 40Gbps)
PA-7050 FANTRAY-L/ The new second-generation fan trays for the PA-7050 provide more cooling
R-A capacity than the first-generation fan trays and are required when you install
the second-generation hardware in a PA-7050 firewall.
PA-7080 EMI Filter This new EMI filter for existing PA-7080 firewalls reduces electromagnetic
interference and is required when you install the second-generation hardware
in a PA-7080 firewall. New chassis will have this new filter pre-installed.
Feature Change
API Key Lifetime When you generate a new API key, the key metadata
includes a timestamp of the creation date which makes
the key size larger than those generated with PAN-OS
version earlier than 9.0.
Default Administrator Password Starting with PAN-OS 9.0.4, the firewall enforces
Requirements password complexity for the default admin account on
the first log in. If the current password doesn't meet the
(PAN-OS 9.0.4 and later 9.0 releases)
complexity requirements, the device prompts you to
change it.
The new password must have a minimum of eight
characters and include a minimum of one lowercase
and one uppercase character, as well as one number
or special character. On a new installation, password
complexity is enabled with a minimum password length
of eight characters.
This change does not affect other administrative users.
HTTP/2 Inspection The firewall now processes and inspects HTTP/2 traffic
by default.
If you want to disable HTTP/2 inspection, you can
specify for the firewall to remove any value contained in
the Application-Layer Protocol Negotiation (ALPN) TLS
extension: select Objects > Decryption > Decryption
Profile > SSL Decryption > SSL Forward Proxy and
then select Strip ALPN. ALPN is used to secure HTTP/2
connections—when there is no value specified for this
TLS extension, the firewall either downgrades HTTP/2
traffic to HTTP/1.1 or classifies it as unknown TCP
traffic.
Strict Default Ports for Decrypted Application default—which enables you to allow
Applications, Including Web-Browsing applications only on their most commonly-used ports—
now enforces standard port usage for certain applications
that use a different default port when encrypted: web-
browsing, SMTP, FTP, LDAP, IMAP and POP3.
This means that, if you’re decrypting SSL traffic, a
security policy that allows web-browsing on the
application default ports now strictly enforces web-
browsing on port 80 and SSL-tunneled web-browsing on
port 443.
Network Processing Card Session The session capacity for these two 20Gbps Network
Capacity Change (PA-7000-20G-NPC and Processing Cards changed from 4 million sessions per
PA-7000-20GQ-NPC) NPC to 3.2 million sessions per NPC on firewalls running
a PAN-OS 9.0 or later release.
PA-7000 Series Firewall Memory Limit for As of PAN-OS 9.0.10, the PA-7000 Series firewalls have
the Management Server new CLI commands to enable or disable resource control
groups and new CLI commands to set an upper memory
limit of 8G on a process (mgmtsrvr).
To enable resource-control groups, use:
debug software resource-control enable
To disable resource-control groups, use:
debug software resource-control disable
To set the memory limit, use:
debug management-server limit-memory
enable
To remove the memory limit, use:
debug management-server limit-memory
disable
Reboot the firewall to ensure the memory limit change
takes effect.
Refresh of Default Trusted CAs The certificate authorities (CAs) that the firewall trusts by
default are updated; new trusted root CAs are added and
expired CAs are removed. To view and manage the lists
of CAs that the firewall trusts by default, select Device >
Certificate Management > Certificates > Default Trusted
Certificate Authorities.
VM-50 and VM-50 Lite Firewalls The minimum memory requirement has changed from
4GB to 4.5GB for the VM-50 Lite and from 4.5GB
to 5.5GB for the VM-50 in PAN-OS 9.0. You cannot
upgrade the VM-50 Lite without allocating additional
memory. If you upgrade the VM-50 with less than 5.5GB
memory, it will default to the system capacities (number
of sessions, rules, security zones, address objects, etc)
associated with the VM-50 Lite.
VXLAN Tunnel Content Inspection In PAN-OS 8.1 and earlier releases, the firewall used the
UDP Session key to create UDP sessions for all tunnel
content inspection protocols. It is a six-tuple key (zone,
source IP, destination IP, protocol, source port, and
destination port), and it remains in use.
PAN-OS 9.0 introduces the VNI Session key specifically
for VXLAN tunnel content inspection. The VNI Session
key is a five-tuple key incorporating the zone, source
IP, destination IP, protocol, and the VXLAN Network
Identifier (VNI).
By default, VXLAN tunnels now automatically use the
VNI Session key to create a VNI Session, which is visible
in logs.
If you prefer to use the UDP Session key for
VXLAN (as you did in previous releases), you can
define a custom application for VXLAN and use an
application override policy to invoke your custom
application.
Panorama Commit and push operations • Commit is unavailable (grayed out) when you
have no pending changes on Panorama and all
managed firewalls and Log Collectors are in sync with
Panorama (which means that you have successfully
pushed all changes you made on Panorama to all
managed firewalls and appliances).
• Commit displays as a green downward arrow ( )
when you have pending changes on Panorama that
must be committed and pushed to managed devices.
• Commit displays as a yellow sideways arrow ( )
when managed firewalls and Log Collectors are out
of sync, and you must push the committed Panorama
configuration.
• When you Commit and Push your configuration
changes on Panorama, you must Edit Selections to
specify the Push Scope to managed devices.
Security Group Tag (SGT) Ethertype If you're using Security Group Tags (SGTs) to control user
Support and device access in a Cisco Trustsec network, inline
firewalls in Layer 2 or Virtual Wire mode now inspect
IP Address Registration and Dynamic In PAN-OS 8.1 and earlier, it could take up to 60
Address Groups seconds to register an IP address, and the associated
tags, and update the membership information for a
dynamic address group (DAG). In PAN-OS 9.0, IP address
registration occurs in real time. Any policy matches for
updates on a registered IP address (IP-tag mapping) are
reflected only in new sessions. Any existing sessions
are reevaluated for a policy match when you perform a
commit or the App-ID™ on the session changes.
URL Filtering Overrides In earlier release versions, URL Filtering overrides had
priority enforcement ahead of custom URL categories.
As part of the upgrade to PAN-OS 9.0, URL category
overrides are converted to custom URL categories,
and no longer receive priority enforcement over other
custom URL categories. Instead of the action you defined
for the category override in previous release versions,
the new custom URL category is enforced by the security
policy rule with the strictest URL Filtering profile action.
From most strict to least strict, possible URL Filtering
profile actions are: block, override, continue, alert, and
allow. This means that, if you had URL category overrides
with the action allow, there’s a possibility the overrides
might be blocked after they are converted to custom URL
categories in PAN-OS 9.0.
Workaround:
1. Create a URL Filtering Profile that defines site access
for a custom URL category. Select Objects > Security
Profiles > URL Filtering > Categories, and set the
Site Access (like allow or block) for Custom URL
Categories that you want to exclude from a URL
category.
2. Create a new security policy rule to prioritize
enforcement for URL category exceptions. Attach
the URL Filtering profile you just created to that rule
(Policies > Security > Actions > Profile Setting >
Profiles). Because the firewall evaluates rules from
CLI Commands for the Option to Hold Web The CLI commands for this feature are now the
Requests During URL Category Lookup following:
(PAN-OS 9.0.4 or later 9.0 releases) 1. Enter configure to access Configuration Mode.
2. Enter set deviceconfig setting ctd hold-
client-request yes to enable the feature.
3. Commit your changes.
URL Filtering CLI Change You no longer need to download a predefined set of
URLs after activating a URL Filtering license, so the
following commands associated with that operation have
been removed:
• request url-filtering download
paloaltonetworks region <region>
• request url-filtering download status
vendor paloaltonetworks
Palo Alto Networks Software or Minimum Compatible Version with PAN-OS 9.0
Content Release Version
Panorama™ 9.0
Issue ID Description
PAN-107142 After adding a new virtual system from the CLI, you must log out and log back
in to see the new virtual system within the CLI.
PAN-102264 On Panorama™, the number of Apps Seen on a Security policy rule depends
on whether you created the rule in a Shared context or in the context of a
particular device group.
For rules created in the Shared context, Apps Seen displays the total number
of unique applications seen on each rule in all of the device groups in the
Shared context so a Shared context that includes two device groups—DG1
and DG2—displays the combined number of unique applications seen on the
rule in both groups. For example, if DG1 saw two unique applications on the
rule and DG2 saw eight unique applications on the rule, Apps Seen shows
ten applications seen on the rule, which is the aggregate number of unique
applications seen in both device groups; it does not show the number of
unique applications in each individual group.
For rules created in a specific device group context, Apps Seen displays the
total number of unique applications seen on each rule in that particular device
group. For example, if DG2 saw eight unique applications on a rule, Apps Seen
shows eight applications seen on the rule.
PAN-99845 After an HA firewall fails over to its HA peer, sessions established before the
failover might not undergo the following actions in a reliable manner:
• SIP call modifications (some examples include resuming a call that was on
hold, transferring a call, and picking up a parked call).
• Call tear-down.
PAN-99483 (Affects only PA-7000 Series firewalls that do not use second-generation
PA-7050-SMC-B or PA-7080-SMC-B Switch Management Cards) When
This issue is now
you deploy the firewall in a network that uses Dynamic IP and Port (DIPP)
resolved. See PAN-OS
NAT translation with PPTP, client systems are limited to using a translated
9.0.3 Addressed Issues
IP address-and-port pair for only one connection. This issue occurs because
.
the PPTP protocol uses a TCP signaling (control) protocol that exchanges data
using Generic Routing Encapsulation (GRE) version 1 and the hardware cannot
correlate the call-id in the GRE version 1 header with the correct dataplane
(the one that owns the predict session of GRE). This issue occurs even if you
configure the Dynamic IP and Port (DIPP) NAT Oversubscription Rate to allow
multiple connections (Device > Setup > Session > Session Settings > NAT
Oversubscription).
Workaround: Upgrade to a second-generation SMC-B card.
PAN-97821 The commit all job is executed from Panorama to the firewall only if the
newly added firewall is running PAN-OS 8.1 or a later release with Auto Push
on 1st Connect enabled.
PAN-85036 If you use the Panorama management server to manage the configuration of
firewalls in an HA active/active configuration, you must set the Device ID for
each firewall in the HA pair before you upgrade Panorama. If you upgrade
without setting the Device IDs (which determine which peer is the active-
primary peer), you cannot commit configuration changes to Panorama.
PAN-79669 The firewall blocks an HTTPS session when the hardware security module
(HSM) is down and a Decryption policy for inbound inspection uses the default
decryption profile for an ECDSA certificate.
For recent updates to known issues for a given PAN-OS release, refer to https://
knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm68CAC.
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
This issue is resolved after you
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-136701 (PA-7000b Series firewalls only) Packets for new sessions drop
when handling predict sessions.
Workaround: Use the following CLI command to bypass this
issue:
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-121449 (PAN-OS 9.0.3 and later releases only) The Remove Config
button on Panorama > Plugins does not remove the
This issue is now resolved. See PAN-
configuration for any plugins you have set up on Panorama.
OS 9.0.4 Addressed Issues .
Workaround: Manually remove the plugin configuration.
Manually delete the plugin configuration. Select your plugin
on Panorama, clear the values from all fields and Commit your
changes.
PAN-117918 The logs are not visible after you upgrade a Panorama
management server in an HA configuration from PAN-OS 8.1
to PAN-OS 9.0.
Workaround: After you complete the upgrade, log in to the
web interface of the primary Panorama HA peer and perform
a Collector Group push (Commit > Push to Devices > Edit
Selections) or log in to the CLI of the primary Panorama HA
peer and commit force the local configuration.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
This issue is now resolved. See PAN-
plugin on Panorama. When a newly launched firewall that is
OS 9.0.3 Addressed Issues .
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
> configure
# set
template <template_name> config
deviceconfig high-availability interface ha2
ip-address <IP_address>
PAN-84670 When you disable decryption for HTTPS traffic, end users who
don't have valid authentication timestamps can access HTTPS
This issue is now resolved. See PAN-
services and applications regardless of Authentication policy.
OS 9.0.4 Addressed Issues .
Workaround: Create a Security policy rule that blocks HTTPS
traffic that is not decrypted.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Workaround: Log in to each peer in HA, select Device >
Scheduled Log Export > <log_export_configuration>, and Test
SCP server connection to confirm the host key so that SCP log
forwarding continues to work after a failover.
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
This issue is resolved with VM-Series
plugin 1.0.3.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-136701 (PA-7000b Series firewalls only) Packets for new sessions drop
when handling predict sessions.
Workaround: Use the following CLI command to bypass this
issue:
• set session hwpredict disable yes
To enable hwpredict again set session hwpredict
disable no.
To verify the current settings, show session hwpredict
status.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Workaround: Log in to each peer in HA, select Device >
Scheduled Log Export > <log_export_configuration>, and Test
SCP server connection to confirm the host key so that SCP log
forwarding continues to work after a failover.
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-136701 (PA-7000b Series firewalls only) Packets for new sessions drop
when handling predict sessions.
Workaround: Use the following CLI command to bypass this
issue:
• set session hwpredict disable yes
To enable hwpredict again set session hwpredict
disable no.
To verify the current settings, show session hwpredict
status.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
This issue is resolved with VM-Series
plugin 1.0.3.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-136701 (PA-7000b Series firewalls only) Packets for new sessions drop
when handling predict sessions.
Workaround: Use the following CLI command to bypass this
issue:
• set session hwpredict disable yes
To enable hwpredict again set session hwpredict
disable no.
To verify the current settings, show session hwpredict
status.
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Workaround: Log in to each peer in HA, select Device >
Scheduled Log Export > <log_export_configuration>, and Test
SCP server connection to confirm the host key so that SCP log
forwarding continues to work after a failover.
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
This issue is resolved with VM-Series
plugin 1.0.3.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
This issue is resolved with VM-Series
plugin 1.0.3.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
This issue is resolved with VM-Series
plugin 1.0.3.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Workaround: Log in to each peer in HA, select Device >
Scheduled Log Export > <log_export_configuration>, and Test
SCP server connection to confirm the host key so that SCP log
forwarding continues to work after a failover.
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
This issue is resolved with VM-Series
plugin 1.0.3.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Workaround: Log in to each peer in HA, select Device >
Scheduled Log Export > <log_export_configuration>, and Test
SCP server connection to confirm the host key so that SCP log
forwarding continues to work after a failover.
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-121449 The Remove Config button on Panorama > Plugins does not
remove the configuration for any plugins you have set up on
Panorama.
Workaround: Manually remove the plugin configuration.
Manually delete the plugin configuration. Select your plugin
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-84670 When you disable decryption for HTTPS traffic, end users who
don't have valid authentication timestamps can access HTTPS
services and applications regardless of Authentication policy.
Workaround: Create a Security policy rule that blocks HTTPS
traffic that is not decrypted.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Workaround: Log in to each peer in HA, select Device >
Scheduled Log Export > <log_export_configuration>, and Test
SCP server connection to confirm the host key so that SCP log
forwarding continues to work after a failover.
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1854 (PAN-OS 9.0.2 and later releases on AWS and GCP only) You
cannot swap the management interface.
This issue is resolved with VM-Series
plugin 1.0.3.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-84670 When you disable decryption for HTTPS traffic, end users who
don't have valid authentication timestamps can access HTTPS
services and applications regardless of Authentication policy.
Workaround: Create a Security policy rule that blocks HTTPS
traffic that is not decrypted.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Workaround: Log in to each peer in HA, select Device >
Scheduled Log Export > <log_export_configuration>, and Test
SCP server connection to confirm the host key so that SCP log
forwarding continues to work after a failover.
Issue ID Description
WF500-4200 The Create Date shown when using the show wildfire
global sample-status sha256 equal<hash> or show
wildfire global sample-analysis CLI command
is two hours behind the actual time for WF-500 appliance
samples.
PLUG-1827 (Microsoft Azure only) The firewall drops packets due to larger
than expected packet sizes when Accelerated networking is
This issue is resolved after you
enabled on the firewall (Settings > Networking).
upgrade to VM-Series plugin 1.0.3 and
reboot the firewall.
PAN-131792 The Name log filter (Monitor > Logs > Traffic) is not
maintained when viewing the Log Viewer for a Security policy
This issue is now resolved. SeePAN-OS
rule (Policies > Security) from the drop-down menu.
9.0.9 Addressed Issues.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-113117 A newly launched firewall does not get its configuration from
Panorama when it first connects if you installed the VM-Series
plugin on Panorama. When a newly launched firewall that is
bootstrapped connects to Panorama, a process restart occurs
on Panorama. Upon restart, you are logged out of the user
interface and you need to log in and push the device group
and template configuration to the newly connected firewall.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-110794 DGA-based threats shown in the firewall threat log display the
same name for all such instances.
PAN-109526 The system log does not correctly display the URL for CRL
files; instead, the URLs are displayed with encoded characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction equal
<direction> <dst> | <src> in <object-name>
command on a managed firewall only returns address and
address group objects pushed form the Shared device group.
Workaround: Specify the vsys in the query string:
PAN-94093 HTTP Header Insertion does not work when jumbo frames are
received out of order.
PAN-84670 When you disable decryption for HTTPS traffic, end users who
don't have valid authentication timestamps can access HTTPS
services and applications regardless of Authentication policy.
Workaround: Create a Security policy rule that blocks HTTPS
traffic that is not decrypted.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
worker-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller
service-advertisement dns-service
enabled
no
PAN-71329 Local users and user groups in the Shared location (all virtual
systems) are not available to be part of the user-to-application
mapping for GlobalProtect Clientless VPN applications
(Network > GlobalProtect > Portals > <portal> > Clientless
VPN > Applications).
Workaround: Create users and user groups in specific virtual
systems on firewalls that have multiple virtual systems. For
single virtual systems (like VM-Series firewalls), users and user
groups are created under Shared and are not configurable for
Clientless VPN applications.
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-25046 Firewalls store SSH host keys used for SCP log exports in the
known hosts file. In an HA deployment, PAN-OS synchronizes
the SCP log export configuration between the firewall HA
peers (Device > Scheduled Log Export), but not the known
host file. When a failover occurs, the SCP log export fails.
Workaround: Log in to each peer in HA, select Device >
Scheduled Log Export > <log_export_configuration>, and Test
SCP server connection to confirm the host key so that SCP log
forwarding continues to work after a failover.
207
208 PAN-OS® RELEASE NOTES | PAN-OS 9.0 Addressed Issues
© 2020 Palo Alto Networks, Inc.
PAN-OS 9.0.10 Addressed Issues
Issue ID Description
PAN-152699 Fixed an issue where the firewall added a redundant 0\r\n packet while
processing Clientless VPN traffic.
PAN-149813 Fixed an issue where the reply to an XML API call from Panorama was in a
different format after upgrading to PAN-OS 8.1.14-h1 and later releases,
which caused automated systems to fail the API call.
PAN-149325 Fixed an issue on Panorama where the web interface took more time than
expected to load changes when the virtual router was large or when there
was a large configuration change request from the web interface.
PAN-149005 Fixed an issue where XML API failed to fetch logs larger than 10MB.
PAN-148676 Fixed an issue where the panlogs directory reached 100% utilization on the
firewall due to early calculation of the .size file.
PAN-148522 Fixed an issue for PAN-DB where certain situations caused performance
issues.
PAN-147424 Fixed an issue with internal buffer and file sizes where logs were discarded
due to slow log purging when the incoming log rate was high.
PAN-147399 Fixed an issue where Panorama in Legacy mode rebooted due to multiple
process (reportd) restarts.
PAN-147258 Fixed an issue with one-way audio for inbound voice calls due to incorrect
source port translation.
PAN-147203 Fixed an issue where API calls did not return the output for the operational
command for running configurations.
PAN-146624 Fixed an issue where exporting logs from the web interface did not generate a
system log entry.
PAN-145942 After upgrading to certain PAN-OS 8.1 and 9.0 versions, for certain
configurations using dynamic routing without graceful restart and with
Bidirectional Forwarding Detection (BFD) enabled, there was a longer traffic
hit after a high availability (HA) failover compared to previous versions. This
was due to BFD incorrectly timing admin-down messages for the failover
event.
PAN-145929 Fixed an issue where, after upgrading the passive firewall, the stream control
transmission protocol (SCTP) sessions synced from the active firewall did not
retain the rule information, and, after failover, SCTP stateful inspection did
not work.
PAN-145507 Fixed an issue on the firewalls where traffic originating from a GlobalProtect
user did not match host information profile (HIP) based Security policies using
the cached HIP report. Instead, the traffic was denied until the GlobalProtect
agent submitted a new HIP report about 20 seconds later.
PAN-145422 Fixed an issue where a process (all_pktproc) restarted while processing SSL
VPN sessions.
PAN-145305 Fixed an issue where an inconsistent PAN-DB cloud connection caused the
firewall to negotiate the incorrect version and decode the cloud responses
with the incorrect format.
PAN-145302 Fixed an issue where the HA peer device did not preserve its import
configuration when the mode was active/active and VR sync was disabled.
PAN-145142 Fixed an issue where Panorama running 9.0.8 allowed a user with the admin
role Device Group and Template to create templates and template stacks.
PAN-145041 Fixed an issue on the firewalls where a process (all_task) stopped responding.
PAN-144804 Fixed an issue where the firewall generated GPRS tunneling protocol
(GTP) logs for invalid GTP packets. This fix also implements a counter,
flow_gtp_invalid_ver, where the invalid packets are counted.
PAN-144670 Fixed an issue where the multi-factor authentication (MFA) timestamp was
not redistributed across the virtual system (vsys) when the IP address-to-user
mapping type was UIA.
PAN-144613 Fixed an issue where, when previewing device group configurations from
Panorama, the following error message was returned: Parameter device
group missing.
PAN-144492 Fixed an issue where traffic matched an incorrect URL filtering profile due to
a similarity in the MD5 hashes between the URL filtering profiles.
PAN-144232 Fixed an issue where, when any change was made to an authentication
profile, the LDAP server or local user database in a shared context removed
the user group mapping information from the firewall.
PAN-143686 Fixed an issue where a firewall running in FIPS mode was unable to download
the GlobalProtect datafile even when a GlobalProtect license was installed
and valid.
PAN-143644 Fixed an issue in multi-vsys firewalls where traffic did not match an FQDN
address group based policy.
PAN-143493 Fixed an memory issue associated with a process (mgmtsrvr) due to a large
number of ACK packets in logs on Panorama or the log collector.
PAN-143442 Fixed an issue where Amazon Web Services (AWS) Nitro System based VM-
Series firewalls unexpectedly rebooted due to input/output (I/O) errors
caused by improper NMVE I/O timeout settings.
PAN-142927 Fixed an issue where the locked users list grew too large, which caused 100%
CPU usage on a process (authd). With this fix, locked users will be purged
hourly if the lockout time for that user has expired.
PAN-142363 Fixed an issue where a process (*mprelay*) stopped responding and invoked
an out-of-memory (OOM) killer condition and displayed the following error
messages: `tcam full` and `pan_plfm_fe_cp_arp_delete`.
PAN-142302 Fixed an issue where the firewalls faced connection issues with Cortex Data
Lake.
PAN-141844 Fixed an issue where promiscuous VLAN mode did not work with the
new host drivers being used on the ESXi and single-root input/output
virtualization (SR-IOV) with VLAN tagging did not work as expected. Both
Data Plane Development Kit and packet mmap mode did not work.
PAN-141239 Fixed an issue where dataplane free memory was depleted, which affected
new GlobalProtect connections to the firewall.
PAN-141221 Fixed an issue where a commit or content update operation with an error was
not prevented from executing in the dataplane, which caused corruption in
the dataplane policy cache.
PAN-141099 Fixed an issue where the HTTP/2 stream method was no longer valid after
overloading the same pointer to point to either the HTTP/2 stream or the
proxy flow.
PAN-140982 (PA-7000 Series firewalls only) Fixed an issue where a process (mprelay) on
the control plane was restarted due to an internal heartbeat miss.
PAN-140747 Fixed an issue where the firewall failed to establish SFTP firewall-server
connections when SSH decryption was enabled.
PAN-140389 Fixed an issue on Panorama in Legacy mode where configuring Network File
System (NFS) log storage (Device > Setup > Operations) caused all plugin
installations to fail.
PAN-140375 Fixed an issue where a process (logrcvr) exited due to a race condition.
PAN-139264 Fixed an issue where the Elasticsearch cluster status displayed in yellow due
to a missing replica serial number.
PAN-139172 Fixed an issue where response pages generated from the firewall used the
SMAC and DMAC addresses from the original packet, which caused a MAC
flap on connected switches.
PAN-138584 Fixed an issue that prevented the addition of a secondary logging disk for a
VM-Series firewall deployed on AWS using Nitro server instance types.
PAN-138037 Fixed an issue where the host information profile (HIP) match message was
automatically enabled when modifying the GlobalProtect Agent settings.
PAN-138034 Fixed an issue where virtual machine (VM) information source Dynamic
Address Groups overrode static address groups, which caused traffic to hit
the wrong Security policy rule.
PAN-137656 Fixed an issue where the show config diff CLI command did not work
correctly and produced unexpected output.
PAN-136957 Fixed an issue where access was denied if a password contained more than
63 characters.
PAN-136950 Fixed an issue where, on a firewall managed by Panorama, the XML API based
IP tags were lost after a firewall reboot or process (useridd) restart.
PAN-136844 Fixed an issue for S11 traffic where if the Modify Bearer Request message
came after 30 seconds of Create Session Response message, the firewall
dropped the Modify Bearer Request packet. This fix increases this time to 90
seconds.
PAN-136726 Fixed an issue on the firewall where the dataplane pan-task process
(all_pktproc) stopped responding while inspecting Server Message Block
(SMB) traffic.
PAN-136623 Fixed an issue where a process (useridd) failed due to internal user groups
that were loading from the disk taking over the lock.
PAN-136304 Fixed an issue where clientless VPN rewrite failed due to incorrect parsing of
the HTML webpage.
PAN-135946 Fixed an intermittent issue where Panorama was unable to query logs from
the log collector due to large file sizes in es_cache_cron.log.
PAN-135418 Fixed an issue on the firewall where configuring uppercase User Domain
values in authentication profiles led to a failure in GlobalProtect Agent
configuration selection based on the domain user match condition.
PAN-135356 Fixed an issue where policies that contained objects did not display correctly
when exported to CSV or PDF format.
PAN-135354 Fixed an issue where the paths between the control plane and the dataplanes
in network processing cards (NPCs) stalled in the dataplane-to-control plane
direction due to the Ring Descriptor entries becoming out of sync on each
side. This produced unrecoverable data path monitoring failures, which
caused the chassis to become nonfunctional.
PAN-135321 Fixed an issue where all NAT rules using the same FQDN entries as translated
IP addresses were not updated when the IP addresses changed for those
FQDNs.
PAN-135158 Fixed an issue where setting an IPv6 destination filter for the packet-diag
option returned an error regarding a character limit.
PAN-134981 Fixed an issue with a memory leak in a process (user-id) due to failed LDAP
over SSL (LDAPS) requests.
PAN-134810 Fixed an issue where Resolve (Objects > Addresses > <Name>) in the
web interface did not work for FQDN address objects with more than 63
characters.
PAN-134799 Fixed an issue where packets of the same session were forwarded through a
different member of an Aggregate Ethernet (AE) group once the session was
offloaded.
PAN-134714 Fixed an issue where Safe Search was not enabled after an application
change.
PAN-134624 (VM-Series firewalls only) Fixed an issue where the VLAN interface failed to
obtain the MAC address when the interface was used as a DHCP relay agent.
PAN-134038 Fixed an issue where custom signatures did not properly detect the User-
Agent header when the Origin header was above the User-Agent header.
PAN-133915 Fixed an issue on Panorama where configuring a BGP import rule from
the CLI failed with the following error message: Server error :
permission denied for the command set.
PAN-133912 Fixed an issue where querying traffic logs based on address objects and
address groups did not work.
PAN-133673 Fixed an issue that caused a procses (ikemgr) to exit when site-to-site VPNs
experienced connectivity interruptions.
PAN-133609 Fixed an issue where the Authentication Portal did not work due to a large
number of HTTP requests with unsupported Authorization headers.
PAN-133285 Fixed an issue on the firewalls where configuring a default Online Certificate
Status Protocol (OCSP) URL in front of an intermediate certificate authority
(CA) in a certificate profile did not override the OCSP URL during the
validation of client certificates issued by the intermediate CA.
PAN-132922 Fixed an issue where service objects were unable to be deleted if they were
configured to exceed firewall limits.
PAN-132715 Fixed an issue where a child dynamic address group was not added as a
member of the parent group.
PAN-132697 Fixed an issue where the GlobalProtect portal did not generate certificate
signing requests (CSRs) due to failed Simple Certificate Enrollment Protocol
(SCEP) authentication cookie validation.
PAN-131814 Fixed an issue where the firewall did not recognize a device when the DHCP
contained a hostname with a trailing NULL.
PAN-131491 Fixed an issue where the ACC risk meter displayed as zero for long time
periods with a large amount of logs.
PAN-131045 Fixed an issue where a rare cleartext HTTP/2 application behavior caused
a resource leak. If jumbo frames were enabled, this leak caused the App-ID
queue to fill up quickly, which led to legitimate sessions being discarded.
PAN-130564 Fixed an issue where the session ID did not display correctly in the debug logs
related to the hardware security module (HSM).
PAN-130562 Fixed an issue where, in VM-Series firewalls deployed using init-cfg.txt in the
bootstrap process and set in an HA configuration, the configuration did not
display as synchronized due to the initcfg configuration.
PAN-129474 Fixed an issue where a process (mgmtsrvr) restarted due to race conditions
initialized by the mutex.
PAN-129461 Fixed an issue where excessive next hop FPGA exceptions occurred when an
ARP request or response was lost in the network in an ECMP configuration,
which blocked subsequent ARP learning due to a full queue.
PAN-129294 Fixed an issue on Panorama where the Policy Optimizer showed invalid data
for Rule Usage.
PAN-128650 Fixed an issue where selecting Preview Changes under a specific device
group resulted in the following error message: Parameter device group
missing.
PAN-128042 Fixed an issue where the dynamic address group failed due to a process
(devsrvr) not being synced with another process (useridd).
PAN-127691 Fixed an issue where the dataplane maintained the old category for the URL
even after changing or deleting that category from PAN-DB.
PAN-126938 Fixed an issue where multiple daemons restarted due to MP ARP overflow.
PAN-126353 Fixed an issue where the XML API used to retrieve hardware status
periodically failed with a 200 OK message and no data.
PAN-120530 Fixed an issue where a Panorama appliance running PAN-OS 10.0.0 observed
restarts in a process (reportd) while running a custom report when the log
collector or remote device was running a software version earlier than the
current version on Panorama.
PAN-120249 Fixed an issue where Elasticsearch failed to properly start up, which caused
issues with logging on Panorama or the Log Collector.
PAN-118468 (VM-Series firewalls on VMware ESXi only) Fixed an issue where the firewall
stays in a boot loop and enters maintenance mode after adding a 60GB disk.
PAN-118416 (Japanese language only) Fixed an issue where the WildFire Update Schedule
incorrectly displayed At as Atlantic.
PAN-116843 Fixed an issue on Panorama where, when navigating through Policies, the
following error message displayed: show rule hit count op-command
failed.
PAN-115954 Fixed an issue where commits failed with the following error: Error
unserializing profile objects failed to handle
CONFIG_UPDATE_START.
PAN-112539 Fixed an issue where the firewall stopped forwarding logs to the log collector
from the Log Processing Card (LPC) after a commit push from Panorama due
to a race condition.
PAN-112246 Fixed an issue on the firewalls where a process (mgmtsrvr) restarted after the
Panorama connection flapped.
WF500-5320 Fixed an issue where the WF-500 cluster did not synchronize verdicts after
successful verdict recheck queries with the WildFire global cloud.
PAN-148988 A fix was made to address a Security Assertion Markup Language (SAML)
authentication issue (CVE-2020-2021).
PAN-148068 Fixed an issue where SSL connections were blocked if you enabled decryption
with the option to block sessions that have expired certificates. This issue
included servers that sent an expired AddTrust certificate authority (CA) in
the certificate chain.
PAN-145026 Fixed an issue where Cortex Data Lake certificates on the firewall were not
automatically renewed after the certificates expired.
PAN-144882 Fixed an issue where the firewall generated critical system logs: Fsck
failed for Logging Raid Disk Pair after downgrading from PAN-
OS 9.0 to PAN-OS 8.1.
PAN-144646 Fixed an issue where a process (varrcvr) stopped responding on the PA-7000
Series Log Forwarding Card (LFC) when it received a verdict from the
WildFire cloud.
PAN-143957 Fixed an issue where, after loading a saved configuration snapshot by API, a
custom role-based administrator required Superuser privileges to perform a
full commit.
PAN-143648 (VM-Series firewalls in Azure environment only) Fixed an issue where a kernel
panic in a Linux Integration Services (LIS) driver caused the firewall to reboot
by itself.
PAN-141563 Fixed an issue where Slot 8 path monitoring failure occurred due to a memory
buildup in a process (logrcvr) that was caused by slow communication and
connection between log forwarding and Cortex Data Lake.
PAN-140846 Fixed an issue where the dataplane restarted during a commit when Netflow
was enabled.
PAN-140465 (VM-Series firewalls only) Fixed connection issues between IPv6 peers when
the IPv6 neighbor cache was synchronized in an HA cluster where, after
failover, the newly active firewall did not send multicast neighbor solicitation
from its global unicast address.
PAN-140386 Fixed an intermittent issue where the firewall used IP addresses instead of
domain names for URL category lookup after upgrading to 9.0.6.
PAN-139935 Fixed an issue in the URL process where a process (devsrvr) stopped
responding.
PAN-139718 Fixed an issue where the firewall failed stateful inspection for GTP forward
relocation requests greater than 1,500 bytes and could not parse Access
Point Name (APN) information in forward relocation requests.
PAN-139587 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue where
high and continuous CPU utilization was seen on dataplanes after IPSec
Encapsulating Security Payload (ESP) rekeying occurred for multiple tunnels.
PAN-139391 Fixed an issue where unique GlobalProtect portal profiles were not selected
in the correct order.
PAN-138870 Fixed an issue where a process (configd) restarted and administrators received
one of the following error messages: Timed out while getting config
lock. Please try again or Please wait while the server
reboots... due to a database error.
PAN-138813 Fixed a performance drop issue seen when using API to configure larger sets
of objects (more than 25 objects).
PAN-138476 Fixed an intermittent issue where logs were delayed or missing when
querying for logs by applying filters. To leverage this fix, you must upgrade
Panorama to 9.0.9 and the Cloud Services plugin to 1.6.0-h1.
PAN-137966 Fixed a configuration lock issue where Panorama timed out due to a process
(configd) being unable to read another process (mongod).
PAN-137902 (PA-7000 Series firewalls only) Fixed an issue where hot swapping a PA-7000
100G NPC with a PA-7000 20G NPC caused packet buffer leak and slot
restarts.
PAN-137867 (PA-7000 Series firewalls only, running with both a PA-7000 100G NPC and
a PA-7000 20G NPC) Fixed an issue where IPSec traffic caused dataplane
restarts.
PAN-137387 Fixed an issue where URL filtering used the IP address instead of the
hostname, which led to incorrect URL categorization.
PAN-136703 (PA-3000 Series and PA-800 Series firewalls only) Fixed an issue with
insufficient memory allocation for configurations to accommodate the PAN-
OS 9.0 Dynamic Address Group feature.
PAN-136649 Fixed an issue where PA-7000 20GXM and PA-7000 20GQXM Network
Processing Cards (NPCs) failed to process some sessions for Layer 7
inspection due to internal maximum threshold value that was not set.
PAN-136608 Fixed an issue in Panorama where the Security policy Target displayed the
serial number of the targeted device instead of the hostname.
PAN-136390 (PA-7000 Series with 100GB NPC only) Fixed an issue during firewall bootup
where the following error message: Bootloader upgrade failed, ret
255 appeared when small form-factor pluggable (SFP) modules were installed.
PAN-135865 Fixed an issue that prevented Panorama from being switched out of
management-only mode when deployed in Amazon Web Services (AWS)
instance types M5 and C5.
PAN-135684 Fixed an issue with log collectors on Panorama where large index sizes caused
higher CPU usage than expected when disk space usage was high.
PAN-135587 Fixed an issue where the GlobalProtect gateway was unable to parse a large
list of IP addresses assigned on a local machine.
PAN-135039 Fixed an issue in Panorama where a memory leak occurred during an HA sync
commit.
PAN-134309 Fixed an issue where a process (devsrvr) restarted when it hit the limit of the
number of custom patterns available in the allocated memory.
PAN-133731 Fixed an issue on the Panorama Virtual Appliance where the show
interface all CLI command did not list any output.
PAN-133727 Fixed an issue where Session Initiation Protocol (SIP) messages were not
parsed correctly when the packet was received in separate segments, which
caused the receiver to receive corrupted messages.
PAN-133614 Fixed an issue on the Panorama Virtual Appliance where SNMP Object IDs
(OIDs) were missing for interfaces other than the Management interface.
PAN-133495 Fixed an issue where the Terminal Server (TS) Agent disconnected on the
firewall after a failover or reboot.
PAN-133411 Fixed an issue where after making configuration changes and selecting
Preview Changes, a 500 Internal Server Error message displayed due to a
memory leak.
PAN-133211 Fixed an issue where the policy order was not maintained when moved to a
different device group.
PAN-132995 (PA-7000 Series and PA-3200 Series firewalls only) Fixed an issue where
when jumbo frames were enabled, the maximum transmission unit (MTU) size
limit was lower than expected.
PAN-132766 Fixed an issue in Panorama where custom region objects were not visible in
the GlobalProtect Portal External Gateway drop-down.
PAN-132712 Fixed an issue where scheduled reports did not run on a PA-7000 Series
firewall not managed by Panorama after upgrade to 8.1.10 or 9.0.4 and later
versions.
PAN-132476 Made improvements to the log storage for VM-Series for NSX Panorama.
PAN-131945 Fixed an issue where Device > VM-Series on the firewall web interface
showed a blank screen.
PAN-131792 Fixed an issue where the Name log filter (Monitor > Logs > Traffic) was not
maintained when viewing the Log Viewer for a Security policy rule (Policies >
Security) from the drop-down.
PAN-131501 Fixed an issue when configuring Clientless VPN and executing the portal-
getconfig CLI command where user groups were retrieved but were not
freed, which caused a memory leak on a process (sslvpn).
PAN-131290 Fixed an issue where reports from Panorama displayed the following
messages: Please wait... and Warning: Some of the devices
are in High Speed Log Forwarding Mode.
PAN-131038 Fixed an issue on the firewalls where the FIB lookup routing test did not
display all available paths on the web interface.
PAN-130870 Fixed an issue where the management plane CPU on the firewall was high
due to index generation on summary logs.
PAN-130776 Fixed an issue on Panorama where Applications and Threats content update
deployment failed due to the content version date check.
PAN-130558 Fixed an issue on the firewalls where SNMP queries for panZoneTable listed
details for only one zone when there were two zones with same names under
different virtual systems.
PAN-130121 Fixed an issue in Amazon Web Services (AWS) where Ethernet1/1 failed
DHCP renewal after the hour.
PAN-129281 Fixed an issue where a process (useridd) restarted due to a buffer overflow
when the time-to-live (TTL) and Idle Timeout values were set to Never, a
timing issue between user group context and a process (sysd) callback, and a
group mapping issue when multiple group mappings fetched the same groups
with different override domains.
PAN-128879 Fixed an issue where the PAN-OS XML API inject was not working for IP
address to user mappings or for the import of software, content, and plugins.
PAN-128393 Fixed an issue where User-ID running on port 5007 responded with the
default certificate and participated in mutual authentication after upgrading
to PAN-OS 9.0, which exposed the default certificate on the firewall to third-
party vulnerability scanners.
PAN-128155 Fixed an issue where system log entries misspelled "client version" as "lient
version", which made it difficult for syslog servers to find these entries.
PAN-128078 Fixed an issue where a process (mgmtsrvr) stopped responding and was
inaccessible through SSH or HTTPS until the firewall was power cycled.
PAN-127434 Fixed an issue where reports for URLs were not generating the correct data
output.
PAN-127375 Fixed an issue where a process (rasmgr) restarted multiple times, which
caused the firewall to reboot.
PAN-127260 Fixed an issue where the /opt/pancfg partition became full due to a large
amount of botnet reports that were not automatically deleted.
PAN-125524 Fixed an issue where the dataplane restarted when many NAT rules were
followed by successive commits.
PAN-125501 Fixed an issue where URL information in a URL Custom Report was blank
when the report contained flexible size fields (such as URL Category List).
PAN-125466 Fixed an issue where, during Antivirus or Threat Content update downloads
or install, some show commands in the CLI, API calls, and web interface pages
gave information output with significant delay (15-60 seconds).
PAN-123279 Fixed an issue where a process (configd) stopped responding after upgrading
Panorama to 8.1.9 from 8.0.16 due to 8.0 WildFire appliance register
requests.
PAN-123090 (PA-3000 Series firewalls only) Fixed an issue where a configuration commit
failed due to a memory allocation failure on the dataplane.
PAN-122226 Fixed an issue where traffic failed to match Security policies using wildcard
address objects.
PAN-120830 Fixed an issue in Panorama where certificate import failed with the following
error message: Certificate chain cannot be validated,
required CAs not found.
PAN-120614 Fixed an issue where a commit from a Panorama appliance running PAN-
OS 9.1 to a managed firewall running PAN-OS 9.0 or earlier failed with the
following error message in ms.log: error generating tranform ike-
pre-transform.xsl.
PAN-120454 Fixed an issue where the firewall did not fail over to the secondary LDAP
server when the primary LDAP server was not reachable and the configured
LDAP bind timeout was not properly honored when SSL protocol was used.
PAN-120113 Fixed an issue where the to, from, and subject fields did not populate in the
threat logs if the fields were out of order.
PAN-120105 Fixed an issue where email header information intermittently was not present
in threat logs.
PAN-119645 Fixed an issue where a process (panio) used unnecessary memory and caused
an out-of-memory (OOM) condition on the dataplane if the dataplane was
already low on memory.
PAN-119170 Fixed an issue where Panorama did not display managed devices when
selecting Revert Content (Panorama > Device Deployment > Dynamic
Updates).
PAN-119159 Fixed an issue where if one invalid FQDN object was configured, FQDN
resolution failed for all FQDN objects.
PAN-118098 Fixed an issue where a process (useridd) restarted while updating user groups.
This issue occurred when multiple group mapping profiles were used to fetch
the same group information while using different domain override settings.
PAN-117606 Fixed an issue where a process (configd) crashed while making configuration
changes on Panorama.
PAN-117075 Fixed an issue where the firewall did not process the TLS record in SSL
Inbound Inspection as expected, which introduced out-of-order packets in
the transmit stage packet capture and affected client performance while
accessing HTTP video applications.
PAN-116835 Fixed an issue with log reading performance when using WMI for server
monitoring with PAN-OS integrated User-ID agent.
PAN-115914 Fixed an issue where Static, Connected, and Host routes were missing on the
FIB table of the firewall in a passive state after 300 seconds of switch over.
PAN-112120 Fixed an issue where threat Name field of a threat Custom Report displayed
the threat ID instead of the threat name.
PAN-111379 Fixed an issue on the firewall where the Application Command Center (ACC)
Network Activity tab displayed the message In Progress and stopped
responding.
PAN-110457 Fixed an issue where Panorama ran out of memory due to high memory usage
on a process (configd).
PAN-106763 Fixed an issue where the dataplane crashed while freeing up memory due to a
corrupted or long certificate field in the handshake.
PAN-102202 Fixed an issue where the OSPF summary Link State Advertisement (LSA) for
the default 0.0.0.0/0 route were not advertised by the Area Border Router
(ABR).
PAN-140575 Fixed an issue where a process (masterd) did not restart another process
(logrcvr) on the Log Forwarding Card (LFC) after the process (logrcvr) crashed.
PAN-140509 Fixed an issue where performing private data resets during custom Amazon
Machine Image (AMI) creation removed CloudWatch directories and caused
the CloudWatch plugin to fail.
PAN-140043 (PA-7050 firewalls running on PA-7000 100G NPCs only) Fixed an issue
where the PA-7000 100G NPC Native Implemented Function (NIF)
initialization took longer than expected, which caused internal path
monitoring failure and sent the firewall into a non-functional state while
rebooting.
PAN-139555 Fixed an issue where after upgrading the passive firewall, the outer UDP
sessions synced from the active firewall did not retain the rule information
and after failover, GPRS tunneling protocol (GTP) inspection did not work.
PAN-137673 Fixed an issue where a memory leak associated with a process (devsrvr)
caused an out-of-memory (OOM) condition on the firewall.
PAN-136765 Fixed an issue where an FQDN update that resolved to the same IP address
of another FQDN across different policies caused the other FQDN to be
deleted due to missing FQDN aggregation.
PAN-136612 Fixed an issue where fragmented packets leaked, which caused the depletion
of Work Query Entry (WQE) pools.
PAN-136173 Fixed an issue where dataplane interfaces remained down after active firewall
bootup or a high availability (HA) failover.
PAN-134571 Fixed an issue where DNS security incorrectly set bits to zero on compressed
DNS packets, which caused DNS malformation.
PAN-134546 Fixed a rare issue on the firewall where a process (flow_mgmt) restarted due
to an invalid packet received through the GlobalProtect agent or clientless
VPN.
PAN-133289 Fixed an issue where improper parsing of the URL database caused high
device-server CPU usage.
PAN-132898 Fixed an intermittent issue where logs were missing with log_index debug
messages due to merging of the index.
PAN-132651 Fixed an issue where packet buffer use was at 99% and tunnel monitoring
failed, which caused tunnel flaps and LDAP authentication failures.
PAN-131922 Fixed an issue where the certificate was not automatically pushed to the
firewall until you manually fetched the certificate from the firewall.
PAN-131517 Fixed an issue with a memory corruption error that caused a process
(all_pktproc) to restart.
PAN-130750 Fixed an issue where commit failed on the firewall after disabling Pre-Defined
Reports from Panorama.
PAN-129328 Fixed an issue where packet descriptor (on-chip) usage reached 100% even
though buffers, throughput, and session counts were not elevated.
PAN-129289 Fixed an issue where export failed for a large running-config.xml file using the
XML API.
PAN-128568 Fixed a rare issue on the firewalls where a process (pan_task) restarted due to
NULL pointer exception.
PAN-128330 Fixed an issue where the response for the XML API call for the show
object registered-ip all operational CLI command included extra
appended content.
PAN-128195 Fixed an issue on Panorama where processes (vld) ran on high CPU when the
incoming system log rate was 0.
PAN-127614 Fixed an issue where SNMPv3 monitoring of the firewall failed from the
Zabbix server after a firewall reboot or SNMP daemon restart on the firewall.
PAN-127358 Fixed an issue with a memory leak in a process (configd) where virtual
memory exceeded the limit, which caused the process to restart.
PAN-127318 Fixed an issue where the firewall intermittently dropped DNS A or AAAA
queries received over IPSec tunnels due to a session installation failure.
PAN-127004 Fixed an issue where a process (sysd) restarted due to missing heartbeats.
PAN-126069 Fixed an issue in Panorama where logs couldn't be viewed when an additional
log collector was configured in the existing log collector group.
PAN-125794 Fixed an issue where a role-based administrator with CLI access was not able
to successfully execute the commit-partial CLI command to commit only
changes made by themselves.
PAN-125730 Fixed an issue where packets tagged with IP protocol 252 were incorrectly
treated as GPRS tunneling protocol (GTP) traffic, which caused the packet
processor to terminate.
PAN-125534 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue where
firewalls experienced high packet descriptor (on-chip) usage during uploads to
the WildFire Cloud or WF-500 appliance.
PAN-125410 Fixed an issue where a new GPRS tunneling protocol version 2 control plane
(GTPv2-C) session reused GTP-C tunnel parameters within two seconds
after deleting the old GTP-C session, which caused a session conflict on the
firewall.
PAN-124893 Fixed an issue where a race condition caused the FIB entry list to form a
circle, which in turn caused a process (mprelay) to infinitely loop.
PAN-124039 A fix was made to address an issue where the GlobalProtect Portal feature
in PAN-OS did not set a new session identifier after a successful user login
(CVE-2020-1993).
PAN-123637 (PA-3200 Series firewalls only) Fixed an issue where configuring 1G small
form-factor pluggable (SFP) ports on a firewall with forced speed mode (of
1G) enabled made the link unusable when forced speed mode (of 1G) was
also enabled on the peer firewall.
PAN-122408 (PA-7000b Series firewalls with LFC cards only) Fixed an issue where the
system logs would continuously report a failure to connect to the proxy for
WildFire even when the connectivity was working properly.
PAN-111611 Fixed an issue where the connection between the firewall and Cortex Data
Lake flapped if connections decreased.
PAN-88136 Fixed a rare issue where a URL update caused the dataplane to restart.
WF500-5185 (WF-500 Series only) Fixed an issue where high disk use was observed due to
an inadequate rotation of log files.
PAN-140090 Fixed an issue where HA links were down in VLAN access mode for KVM.
This fix is only applicable for KVM deployments that are configured in VLAN
access mode with SR-IOV.
PAN-137458 Fixed an issue where system logs with new event IDs caused a memory leak
in a process (mgmtsrvr).
PAN-136698 Fixed an issue where a process (all_pktproc) stopped responding and the
dataplane restarted when the firewall processed a malformed GPRS tunneling
protocol (GTP) packet.
PAN-136696 Fixed an issue where the dataplane restarted due to excessive logs from the
pan_comm process.
PAN-135703 (PA-7000 Series firewalls only) Fixed an issue where the switch ports
connected to Quad Small Form-factor Pluggable (QSFP+) interfaces were up
while Network Processing Cards (NPCs) were still rebooting.
PAN-135260 (PA-7000 Series firewalls running PAN-OS® 8.1.12 only) Fixed an intermittent
issue where the dataplane process (all_pktproc_X) on a Network Processing
Card (NPC) restarted when processing IPSec tunnel traffic.
PAN-135103 A fix was made to address a format string vulnerability on PA-7000 Series
firewalls with a Log Forwarding Card (LFC) (CVE-2020-1992).
PAN-135089 Fixed an issue where the CPU for a process (ikemgr) spiked when third-party
VPN clients connected to the GlobalProtect gateway with more than three
DNS servers configured.
PAN-134678 (PA-5200 Series firewalls only) Fixed an issue where the Quad Small Form-
factor Pluggable (QSFP) 28 ports 21 and 22 did not respond when plugged in
with a Finisar 100G AOC cable.
PAN-134370 Fixed an issue where a process (mp-relay) restarted due to missing routes or
next hops.
PAN-134244 Fixed an issue where connections proxied by the firewall (such as SSL
Decryption, GlobalProtect portal and gateway connections, and SIP over TCP)
failed due to insufficient buffer allocation. Some connections failed with the
following error message: proxy decrypt failure.
PAN-133582 Fixed an issue in the firewalls where some Dynamic Address Groups pushed
from Panorama were missing member IP addresses.
PAN-133440 Fixed an issue where fragmented traffic caused high dataplane use and
firewall performance issues.
PAN-133378 Fixed an issue in Panorama where a process (configd) restarted while doing a
commit using a RADIUS super admin role.
PAN-133048 (PA-5200 and PA-7000 Series firewalls only) Fixed an issue where firewalls
processed traffic asymmetrically when using Internet Protocol (IP) classifiers
on virtual wire (vwire) subinterfaces.
PAN-133042 (PA-5200 and PA-7000 Series firewalls only) Fixed an issue where firewalls
dropped certain GPRS tunneling protocol (GTP) traffic even when gtp
nodrop was enabled.
PAN-131993 Fixed an issue where a process (reportd) would crash while running a log
query.
PAN-131907 Fixed an issue where GPRS tunneling protocol (GTP) version 2 handling
was unable to handle fully qualified tunnel endpoint IDs (FTEID) received
in reverse order, which resulted in GTP-C and GTP-U flows with incorrect
IP addresses and tunnel endpoint IDs (TEID). This caused a GTP stateful
inspection failure for subsequent packets on the respective flows.
PAN-131486 Fixed an issue where autocommits failed due to invalid access routes after an
upgrade.
PAN-131193 Fixed an issue where firewalls dropped generic routing encapsulation (GRE)
packets with the following error message: Packet dropped, prepend
failure.
PAN-130573 Fixed an issue where the software pool for Regex results was depleted and
caused connection failures.
PAN-130447 Fixed an issue where the firewall dropped offloaded traffic every time there
was an explicit commit (Commit on the firewall locally or Commit All Changes
in Panorama) or an implicit commit (such as an Antivirus update, Dynamic
Update, or WildFire® update) on the firewall.
PAN-130361 A fix was made to address an external control of filename vulnerability in the
SD-WAN component of Palo Alto Networks Panorama (CVE-2020-2009).
PAN-130345 Fixed an issue where the Panorama VM rebooted while filtering for
configuration logs when the query value was not one of the predefined string
results.
PAN-130290 Fixed an issue in the web interface where traffic logs did not display the
destination zone (Monitor > Logs > Traffic > To Zone) for multicast sessions.
PAN-130262 Fixed an issue where firewalls dropped HTTP 200 OK messages during the
offload of traffic for App-ID™ inspection.
PAN-130229 Fixed an issue on Panorama appliances where you could not change maximum
transmission unit (MTU) values from the web interface; attempting to do so
caused the appliance to display the following error message: Malformed
Request.
PAN-129518 Fixed an issue where the firewall restarted due to an out-of-memory (OOM)
condition caused by a leak in a process (ikemgr).
PAN-129490 Fixed an issue where CRL/OCSP verifications failed due to requests routing
through the management interface even when service route was configured.
PAN-128908 If a user password was changed but no commit was performed afterward, the
new password did not persist after a reboot. Instead, the user could still use
the old password to log in, and the calculation of expiry days was incorrect
based on the password change timestamp in the database.
PAN-127616 Fixed an issue where you could not push FQDN Minimum Refresh Time from
Panorama to managed firewalls.
PAN-127219 Fixed an issue where you could not select existing certificates when creating
an authentication profile by using the Security Assertion Markup Language
(SAML) method on the template stack.
PAN-127118 A fix was made to address an OS command line injection vulnerability in the
PAN-OS management server where authenticated users were able to inject
arbitrary shell commands with root privileges (CVE-2020-2014).
PAN-127087 Fixed an issue where a push operation (Commit All Changes) from Panorama
failed on passive firewalls when pushing a large number of new Security
policy rules to both firewalls in a high availability (HA) pair.
PAN-126944 Fixed an issue where the Panorama Template did not allow for Ethernet
Interface Link Speed configurations greater than 1,000Mpbs.
PAN-126817 Fixed an issue where Security Assertion Markup Language (SAML) response
validation failed with a certificate mismatch error even if the firewall had the
same certificate on IdP.
PAN-126775 (PA-800 and PA-220 Series only) Fixed an issue where NTP sync failures
occurred when using NTP servers configured with IPv6.
PAN-126412 Fixed an issue where hardware security model (HSM) authentication from the
web interface failed if the password contained an ampersand (&).
PAN-126362 A fix was made to address a command injection vulnerability in the PAN-
OS management interface where an authenticated administrator was able to
execute arbitrary OS commands with root privileges (CVE-2020-2010).
PAN-126202 Fixed an issue where a process (routed) stopped responding when users
accessed the web interface to view the OSPF interface data (Network >
Virtual Routers > More Runtime Stats > OSPF > Interface) if OSPF MD5 was
configured in the OSPF Auth profile.
PAN-126017 Fixed an issue where the set application dump on rule CLI command
did not accept rule names with more than than 32 characters despite a stated
limit of 63 characters.
PAN-126014 Fixed an issue for GlobalProtect gateways where the Login At and Logout At
time fields in the Previous User PDF/CSV report for User Information used
the Epoch standard for displaying time.
PAN-125889 (PA-7000 Series firewalls only) Fixed an issue where auto-tagging in log
forwarding didn't work.
PAN-125546 Fixed an issue where a process failed to restart even when the system
logs displayed the following message: virtual memory exceeded,
restarting.
PAN-125527 Fixed an issue where a multilayer ZIP file inspection caused software buffer
corruption and the all_pktproc process to restart.
PAN-125306 Fixed an issue where a Transmission Control Protocol (TCP) connection reuse
was incorrectly handled by an HA active/active cluster with asymmetric
flows.
PAN-125194 Fixed an issue where system startup failed when the collector group was
configured with an incorrect serial number of invalid length.
PAN-125032 Fixed an issue where, when Minimum Password Complexity was Enabled
for all local administrators, the setting was also applied to plugin users.
This caused API calls from plugin users to fail (HTTP Error code 502)
PAN-124857 Fixed an issue where a Microsoft Access Database (MDB) file stopped and a
process (mgmtsrvr) stopped responding at the epoll_wait () system call
after the Panorama Virtual Appliance was stopped and started from Azure.
PAN-124802 Fixed an issue where LACP connectivity issues were observed due to high
CPU utilization when multiple dataplanes were used.
PAN-124628 Fixed an issue where REST API queries were unable to pull shared region
objects on Panorama.
PAN-124495 Fixed an issue on Panorama where the task manager showed locally executed
jobs but did not show tasks or jobs pushed to managed firewalls.
PAN-124087 Fixed an issue where GPRS tunneling protocol (GTP) v2 protocol handling
failed to handle the secondary Modify Bearer Request/Response in the GTP-
C session.
PAN-123858 Fixed an issue on firewalls where a process (userid) restarted while processing
incorrect IP address-to-username mappings that contained blank usernames
from User-ID agents.
PAN-123736 Fixed an issue where a Create Session Request message looped internally,
which caused continuous packet inspection that consumed firewall resources.
PAN-123724 Fixed an issue in Panorama where shared address objects were not
configurable as a destination in a static route configuration.
PAN-123391 A fix was made to address a predictable temporary file vulnerability in PAN-
OS (CVE-2020-1994).
PAN-123295 Fixed an issue where the dataplane restarted due to a race condition when a
configuration push and a Netflow update occurred simultaneously.
PAN-123135 Fixed an issue where user group membership lookup failed if the username
source (for example, Security Assertion Markup Language identity provider
(SAML IdP)) did not provide the user domain information. The issue occurred
even if you configured the firewall to Allow matching usernames without
domains (Device > User Identification > User Mapping > Palo Alto Networks
User-ID Agent Setup).
PAN-122909 Fixed an issue where enabling SSL Forward Proxy using the hardware
security module (HSM) led to intermittent failures when loading random
secure websites and displayed the following message: ERR_CERT_INVALID.
This issue was most closely associated with servers presenting ECDSA
certificates.
PAN-122872 Fixed an issue where the Aggregate Ethernet (AE) subinterface showed a
different status from the AE parent interface.
PAN-122147 Fixed an issue where the firewall dropped IPv6 Bidirectional Forwarding
Detection (BFD) packets due to a race condition with the Neighbor Discovery
Protocol (NDP).
PAN-121822 Fixed an issue with certificate authentication where only the topmost
certificate was used to validate the client certificate.
PAN-121654 (PA-3000 Series firewalls only) Fixed an issue where decrypting HTTP/2
traffic caused performance issues due to low memory conditions.
PAN-121626 (PA-3200 Series firewalls only) Fixed an intermittent issue where firewalls
dropped packets, which caused issues such as traffic latency, slow file
transfers, reduced throughput, internal path monitoring failures, and
application failures.
PAN-121598 Fixed an issue where the PAN-OS XML API packet capture (pcap) export
failed with the following error message: Missing value for parameter
device_name. Now, device_name and sessionid are no longer required
parameters.
PAN-121596 Fixed an issue where the OSPF protocol didn't choose the correct loopback
address for the forwarding address in the Not-So-Stubby Area (NSSA).
PAN-121483 Fixed an issue where Data Filtering profiles did not generate a packet capture
(pcap) for Server Message Block (SMB) when action was set to Alert.
PAN-121395 Fixed an issue where the bidirectional static NAT policy rule hit count did not
increase even when the policy was used.
PAN-121371 Fixed an issue where autocommit stopped at 99% if the firewall had an invalid
customer ID.
PAN-121319 A fix was made to address a stack-based buffer overflow vulnerability in the
management server component of PAN-OS (CVE-2020-1990).
PAN-121258 Fixed an issue where some SSLv3 session traffic logs showed an Allow action
even when the security rule policy had a Deny action when url-proxy was
enabled.
PAN-120726 Fixed an issue where the firewall incorrectly populated the username after
the user was served an Anti-Phishing Continue page due to credential
phishing detection.
PAN-120640 Fixed an issue where show routing bfd related commands triggered a
memory leak in a process (routed).
PAN-120350 Fixed an issue where an Address Resolution Protocol (ARP) broadcast storm
overloaded the Log Processing Card (LPC) and caused the device to reboot.
PAN-119810 A fix was made to address the improper restriction of the XML external entity
(XXE) vulnerability in the Palo Alto Networks Panorama management server
(CVE-2020-2012).
PAN-119442 Fixed an issue where Panorama did not display the drop-down for part of a
custom report after using Pick up Later (Monitor > Manage Custom Reports).
PAN-119173 (PA-5000 and PA-3000 Series firewalls only) Fixed an issue where the passive
device in a high availability (HA) pair started processing traffic, which resulted
in a packet buffer leak.
PAN-118226 A fix was made to address an improper input validation vulnerability in the
configuration daemon of Palo Alto Networks Panorama (CVE-2020-2011).
PAN-117480 A fix was made to upgrade Nginx software included with PAN-OS (PAN-
SA-2020-0006 / CVE-2016-4450 and CVE-2013-0337).
PAN-117108 Fixed an issue where user mappings populated by the XML API were lost
after a reboot.
PAN-117043 Fixed an issue where using special characters in the tag names of the Security
policy rules returned the following error message when committing or
pushing a configuration: group-tag is invalid.
PAN-116842 Fixed an issue where, after enabling a Cortex Data Lake license, the
management plane memory utilization would increase unexpectedly when
some connections between the firewall and Customer Support Portal server
were blocked, leading to multiple process restarts due to an out-of-memory
(OOM) condition.
PAN-116231 Fixed an issue where invalid packet header content drop counters
were seen in global counters when packets from the network or HA3
were hitting a stale flow. The following flow state verify error was seen:
flow_fpga_rcv_key_err - Packets dropped.
PAN-116061 Fixed an issue where traffic traversing through an IPSec tunnel used did not
use the default maximum interface bandwidth, which caused the traffic to
traverse through the IPSec tunnel with latency.
PAN-115562 Fixed an issue where superuser CLI permissions for role-based administrators
did not match superuser privileges.
PAN-115093 Fixed an issue where the firewall generated excessive logs for content
decoder (CTD) errors.
PAN-114648 (PA-3200 Series firewalls only) Fixed an issue where the HA1 hearbeat
backup connection flapped due to ping failures caused by unavailable buffer
space when Heartbeat Backup was configured (Device > High Availability >
Election Settings).
PAN-100734 A fix was made to address a buffer flow vulnerability in the PAN-OS
management interface where authenticated users were able to crash system
processes or execute arbitrary code with root privileges (CVE-2020-2015).
PAN-100415 A fix was made to address an external control of filename vulnerability in the
command processing of PAN-OS (CVE-2020-2003).
PAN-74442 Fixed an issue where, after enabling debugging on the dataplane, the debug
logs contained information about unrelated traffic.
WF500-5343 Fixed an issue on WF-500 that caused cloud queries to fail when the cloud
verdict did not match the local verdict.
PAN-135141 Fixed an issue where the Log Processing Card (LPC) did not come up
intermittently in a fully loaded PA-7000 Series.
PAN-134242 (PA-7000b Series firewalls with Log Forwarding Cards (LFC) only) A
security fix was made to restrict improper communications to the LFC
(CVE-2019-17440/PAN-SA-2019-0040).
PAN-133883 Fixed an issue where a race condition caused pan_task and pan_com to exit
unexpectedly.
PAN-133491 Fixed an issue where Internet Protocol (IP) to user mappings were not synced
from the HUB virtual system (vsys) to the non-hub vsys.
PAN-133448 Fixed an issue where the mprelay process could crash during commit if the
devsrvr process was restarted before or during the commit.
PAN-133443 Fixed an issue where an XML API call incorrectly masked the response, which
prevented role based administrators from running the response.
PAN-132501 Fixed an issue where after you switched the Context from Panorama™ to
a firewall, the DESTINATION ZONE (Policies > Security > <policy-name> >
Destination) incorrectly displayed none.
PAN-132104 Fixed an issue on Panorama M-Series and virtual appliances where the
<show><object><registered-ip></registered-ip></object></
show> XML API call did not retrieve more than 500 entries.
PAN-131939 Fixed an issue where DP crashed during file transfer due to one or more
content updates being installed.
PAN-130640 Fixed an issue where the management plane CPU on the firewall was high
due to index generation on summary logs.
PAN-130465 Fixed an issue where required fields were masked incorrectly in a XML API
call, which hid the response.
PAN-130069 Fixed an issue where the firewall incorrectly interpreted an external dynamic
list MineMeld instability error code as an empty external dynamic list.
PAN-129668 Fixed an issue on the firewalls where the dataplane restarted unexpectedly
when processing HTTP/2 traffic if packet-diag debugs were enabled.
PAN-129658 Fixed an issue where GTP inspection stopped functioning after unrelated
changes in policy and a commit followed by a high availability (HA) failover.
®
PAN-129441 Fixed an issue where the concurrent file limitation for WildFire submissions
didn't work when the firewall had many files waiting to be uploaded, which
caused /opt/panlogs/wildfire/tmpfile to become full and destabilize
the firewall (for example, the process crashed or system logs were not
written).
PAN-129327 Fixed a rare timing window that caused an Internal packet path monitoring
failure.
PAN-129127 Fixed an issue where log export from maintenance mode failed with the
following error message: no ip address configured, can't export
logs even though the management interface Internet Protocol (IP) address
was configured.
PAN-128856 Fixed an issue where the disk usage calculation was getting corrupted and
purging logs.
PAN-128269 (PA-5250, PA-5260, and PA-5280 firewalls with 100GB AOC cables only)
Fixed an issue where after you upgraded the first peer in a high availability
(HA) configuration to a PAN-OS 9.0 release, the High Speed Chassis
Interconnect (HSCI) port did not come up due to an FEC mismatch until after
you finished upgrading the second peer.
PAN-128248 A fix was made to address a vulnerability with a race condition due
to an insecure creation of a file in a temporary directory in PAN-OS
(CVE-2020-2016).
PAN-127649 Fixed an issue where a purge script stopped responding, which caused a
process (logrcvr) to discard incoming logs.
PAN-127089 Fixed an intermittent issue where the default route did not redistribute to an
OSPF Not-So-Stubby Area (NSSA).
PAN-126283 Fixed an intermittent issue where after you configured Cache EDNS
Responses (Network > DNS Proxy > <DNS Proxy-name> > Advanced) a
process (dnsproxy) stopped responding.
PAN-126159 Fixed an issue where the firewall did not match the Security policy when you
configured the match condition to a shared local group.
PAN-125996 Fixed an issue on Panorama M-Series and VM-Series where the configd
process would crash.
PAN-125898 Fixed an issue where a process (openssl) caused higher than expected
management CPU usage due to the incompletion of the Online Certificate
Status Protocol (OCSP) during the logging service certificate validation.
PAN-125594 Fixed an issue where the configd process on a Panorama appliance had a
memory leak during commit operations.
PAN-125302 Fixed an issue where the real-time clock (RTC) battery voltage exceeded the
maximum threshold and triggered alerts in the system log.
PAN-125157 Fixed an issue on the firewalls where the rasmgr process restarted
unexpectedly when using third-party VPN clients to connect to
GlobalProtect.
PAN-125018 Fixed an issue on Panorama M-Series and virtual appliances where after you
configure the firewall with an API call commits took longer than expected.
PAN-125017 (PA-7000b Series firewalls only) Fixed an issue where logs were unexpectedly
discarded.
PAN-124948 Fixed an issue where a null point (policy) dereference was causing a crash.
PAN-124882 Fixed an issue where traffic logs that contained incorrect Security policies
were generated during an active commit process when the Security policies
were being added or removed.
PAN-124858 Fixed an issue on PA-220, PA-820, and PA-850 firewalls where Custom
Signatures caused the CTD memory depletion (OOM), which led to a
dataplane crash.
PAN-124781 Fixed an issue in Panorama where the Policies > Security web interface
flashes and the selected security rule did not stay selected when making a
change to a rule that was part of device group that included more than 200
rules.
PAN-124593 A fix was made to address a missing XML validation vulnerability in the PAN-
OS web interface (CVE-2020-1975).
PAN-124565 Fixed an issue where an out of memory condition caused commits to fail with
the following error: Error unserializing profile objects failed
to handle CONFIG_UPDATE_START.
PAN-124435 Fixed an issue where the firewall dropped pre-VLAN spanning tree (PVST+)
packets from the virtual wire interface when you executed the set session
rewrite-pvst-pvid yes CLI command.
PAN-124428 Fixed an issue where Address Resolution Protocol (ARP) randomly failed on
one of the interfaces for a firewall deployed in the KVM/GCP/ESXi clouds.
PAN-123857 Fixed an issue where HTTP/2 traffic inspection caused a software buffer leak
over time and affected decryption traffic.
PAN-123843 Fixed an issue for Cloud/VM platforms where the tunnels between the log
collectors did not come up when a public IP was used for the log collectors
in an environment with a Panorama management server and two or more log
collectors.
PAN-123747 Fixed an issue where App-ID™ signatures failed to match when there were
more than 12 partial App-ID matches within the same session.
PAN-123667 Fixed an issue where the snmpd process was crashing when polling for global
counters.
PAN-123322 (PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls running
PAN-OS 9.0.5 only) Fixed an intermittent issue where a process (all_pktproc)
stopped responding due to a Work Query Entry (WQE) corruption that was
caused by duplicate child sessions.
PAN-123306 Fixed an issue where the Dashboard did not display the release dates for
Application Version, Threat Version, and Antivirus Version.
PAN-122788 Fixed an issue where the firewall incorrectly logged target filenames when
an antivirus signature was triggered over a Server Message Block (SMB)
protocol.
PAN-122779 Fixed an issue where the firewall did not respond to TCP DNS requests when
the firewall acted as a DNS proxy.
PAN-122778 Fixed an issue where the routing daemon restarted due to a deadlock on the
path monitoring heartbeat processing, leading to a SIGABRT.
PAN-122565 Fixed an issue where a log collector with a dynamically assigned IP address
could not establish communication between other log collectors.
PAN-122455 Fixed an issue where the DHCP server incorrectly processed bootp unicast
flag requests.
PAN-122311 Fixed an issue where parent sessions were dropped when you installed
duplicate predict session.
PAN-122181 (PA-3200 Series and PA-5200 Series firewalls only) Fixed an issue where
the firewall did not capture inbound Encapsulating Security Payload (ESP)
protocol 50 packets at the receive stage.
PAN-121917 (PA-800 Series and PA-220 firewalls only) Fixed an issue where the
hrProcessorLoad.2 OID displayed incorrect values.
PAN-121827 Fixed an issue where allow lists and auth profiles in multi-vsys systems would
not allow a user to be identified in user groups.Users would show as Not in
allow list because the multi-vsys (vsys1) was shown as vsys0.
PAN-121609 (PA-7000 Series firewalls using PA-7000-20G-NPC cards only) Fixed an issue
where the firewall restarted due to an internal path monitoring heartbeat
failure during periods of more than expected traffic load.
PAN-121484 (PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls only) Fixed an
issue where the dataplane sent positive acknowledgments to predict-status
checks from FPP when the corresponding predict was deleted, which caused
SIP and RTSP applications to perform less than the expected achievable
performance.
PAN-121481 Fixed an issue where downloading the GlobalProtect app software on your
GlobalProtect portal took longer than expected.
PAN-121472 Fixed an intermittent issue where the dataplane stopped responding when
processing compressed traffic.
PAN-121374 Fixed an issue where Internet Protocol (IP) tags with timeouts generated alert
messages.
PAN-121184 Fixed an issue where the varrcvr process crashed due to memory corruption
issues.
PAN-121058 A fix was made to address a DOM-based cross site scripting vulnerability in
the PAN-OS and Panorama management web interfaces (CVE-2020-2017).
PAN-121022 Fixed an issue involving unexpected behavior within the GlobalProtect app
where the Active viewed Template does not populate when clicking the
hyperlink to trigger a redirect to the Template area and list.
PAN-120986 Fixed an issue where a process (routed) stopped responding when you
configured virtual interfaces.
PAN-120965 Fixed an issue where certificate revocation list (CRL) and Online Certificate
Status Protocol (OCSP) checks did not respond as expected when you
configured Block session if certificate status is unknown.
PAN-120909 Fixed an issue to improve the validation of certain field inputs in the web
interface.
PAN-120893 Fixed an issue where the Security Parameter Index (SPI) size was incorrectly
set in the IKE Phase 2 packet when you configured commit-bit on the
neighboring device, which caused IKE negotiations to fail on the neighboring
device.
PAN-120730 Fixed an issue where pushing a config bundle from Panorama M-Series to a
firewall failed with the following error: log-card -> iptag unexpected
here.
PAN-120701 Fixed an issue where URL filtering blocked web traffic by the security policy
that did not have URL filtering enabled.
PAN-120665 (PA-800 Series) Fixed an issue where the deployment of the Master Key
through the web interface failed.
PAN-120545 Fixed an issue on VM-Series firewalls where the ager ran faster than
expected, which prematurely caused the master key to expire.
PAN-120420 Fixed an issue in Panorama where you could not see Certificate Profile in the
drop-down when adding an HTTP Server Profile.
PAN-120397 A fix was made to address an external control of path and data vulnerability in
the Palo Alto Networks Panorama XSLT processing logic (CVE-2020-2001).
PAN-120351 Fixed an issue where the firewall caused unnecessary fragmentation when
traffic and tunnel were content inspected, which caused retransmission and
slowed response time.
PAN-120300 Fixed an issue where you were unable to view DHCP leases from the web
interface or through the show dhcp server lease interface all CLI
command due to the request taking longer than expected, which resulted in a
time out.
PAN-120157 Fixed an issue where temporary files created on a firewall during an API call
execution were not properly cleaned up, leading to increased disk space
usage.
PAN-120106 Fixed an issue where Panorama did not send correlation events and logs to
the syslog server after you upgraded the firewall from PAN-OS 8.0.9 to PAN-
OS 8.1.7.
PAN-120005 Fixed an issue where the firewall incorrectly forwarded incomplete and
corrupted files through the Server Message Block (SMB) protocol to WildFire.
This fix requires content release version 8219 or a later version.
PAN-119922 Fixed an issue in Panorama where the show config diff command was
not working correctly and produced unexpected output.
PAN-119822 Fixed an issue where you were not redirected to the application URL after
authentication.
PAN-119820 Fixed an issue where the firewall incorrectly calculated the TCP segment size
when performing forward proxy decryption.
PAN-119819 Fixed an issue where Discover (Device > User Identification > User Mapping
> Server Monitoring) stopped responding after you configured a DNS proxy.
PAN-119818 Fixed an issue where corrupt logs caused buffered log forwarding to stop
responding.
PAN-119801 Fixed an issue where the firewall web interface did not display the BGP MED
attribute value in the BGP Rib-Out tab (Virtual Routers > More Runtime
Stats).
PAN-119545 Fixed an issue where updates (including WildFire, antivirus, and so on) were
intermittently failing.
PAN-119349 Fixed an issue on Panorama M-Series and virtual appliances where custom
reports from the User-ID log displayed the incorrect receive date.
PAN-119343 Fixed an issue where a daemon (dnsproxy) incorrectly handled TCP requests,
which caused the daemon (dnsproxy) to stop responding.
PAN-119047 Fixed an issue where local user group names that contained upper case
characters were not converted to lower case characters prior to encoding,
which caused the firewall not to load user groups names with upper case
characters.
PAN-119046 Fixed an issue where moving multiple rules in Panorama using the Move All
rules in Group and Move rules in group to different rule base group actions
caused the rules to move in a reversed order.
PAN-118991 Fixed an issue in Panorama where on a high availability (HA) pair working
in legacy mode, the following error message displayed in the system log:
Panorama has lost connection to its peer, no log will be
forwarded.
PAN-118851 Fixed an issue where the BGP Conditional Advertisement suppress condition
was not met, which caused the Conditional Adv (Network > Virtual Routers >
<router-name> > BGP) not to apply the NEXT HOPS prefix range.
PAN-118436 (PA-5200 Series firewalls only) Fixed an issue where applications using the
GlobalProtect Clientless VPN did not respond when the Clientless VPN used
a VLAN interface.
PAN-118413 (PA-5200 Series firewalls only) Fixed an issue where the show system
logd-quota CLI command did not display the Session log storage Quotas as
expected.
PAN-118259 Fixed an issue where you were unable to generate WildFire analysis reports
in the WildFire Submissions log when you configured Proxy Server (Device >
Setup > Services > Global).
PAN-118249 Fixed an issue where traffic logs and URL Filtering logs did not display the
URL for decrypted traffic.
PAN-118207 Fixed an issue where the Security Assertion Markup Language (SAML) for
GlobalProtect did not respond as expected when you configured the IdP
certificate as None on the SAML IdP server profile.
PAN-118108 Fixed an issue where an API call against a Panorama management server,
which triggered the request analyze-shared-policy command,
caused Panorama to reboot after you executed the command.
PAN-118091 Fixed an issue where application dependency warnings were displayed after
a commit when the policy rules containing the dependent applications used
different sources (one used user and the other used groups).
PAN-118090 Fixed an issue on Panorama M-Series and virtual appliances where User
Activity Report (Monitor > PDF Reports) did not generate reports as
expected.
PAN-118075 Fixed an issue where the BGP conditional advertisement did not respond as
expected, which caused the prefix in the Advertise Filters (Network > Virtual
Router > BGP > Conditional Adv) to be incorrectly advertised.
PAN-118050 Fixed an issue where some packets had incorrect timestamps in the transmit
stage during packet capture.
PAN-117987 Fixed an issue where the firewall did not exclude video traffic from the
GlobalProtect tunnel when you configured Exclude video traffic from the
tunnel (Windows and macOS only) (Network > GlobalProtect > Gateways >
<gateway-name> > Agent > Video Traffic).
PAN-117774 Fixed an Issue where the dataplane stopped responding due to an incorrect
parsing of cookies for GlobalProtect Clientless VPN applications.
PAN-117561 Fixed an issue in Panorama where Packet Capture was enabled with
extended-capture (Objects > Security Profiles > Anti-Spyware) for DNS
signatures, but the setting was not pushed to firewalls running PAN-OS 8.1.
PAN-117479 A fix was made to address a vulnerability with the Nginx web server included
with PAN-OS (CVE-2017-7529).
PAN-117463 Fixed an issue where the firewall did not release the default DHCP route
when a new IP address was obtained on a DHCP configured interface.
PAN-117446 Fixed an issue where GlobalProtect authentication failed when you used the
domain in the group mapping and a User Principle Name (UPN) format for
authentication.
PAN-117251 Fixed an issue where vsysadmins were unable to view the locks on all the
virtual systems they were assigned to. To view the locks in CLI run the
new show commit-locks vsys and show config-locks vsys CLI
commands.
PAN-117167 Fixed an issue where a process (configd) exceeded the memory limit and
stopped responding.
PAN-116889 Fixed an issue where you were unable to establish an SSH session through a
CLI command using a Diffie-Hellman (DH) algorithm.
PAN-116841 Fixed an issue where commits failed when address objects were used in static
route configurations.
PAN-116615 Fixed an issue where authentication failed for newly added groups in the
authentication profile Allow List.
PAN-116383 Fixed an issue with Panorama on AWS where the configuration of the high
availability (HA) pair became out of sync due to different plugin versions
being detected even though the same versions were installed on both peers.
PAN-116100 Fixed an issue where a process (mprelay) stopped responding and invoked
an out-of-memory (OOM) killer condition and displayed the following error
messages: tcam full and pan_plfm_fe_cp_arp_delete.
PAN-115875 Fixed an issue where a PA-7080b HA pair rebooted when large sized packet
traffic impacted the front panel ports of the Log Forwarding Card (LFC).
PAN-115238 Fixed an issue where SSL renegotiation sessions incorrectly identified URL
categories.
PAN-115018 Fixed an issue where the firewall was unable to access the CPU information
and caused the CPU frequency to set to 0, which resulted in a divide by zero
error and caused a process (devsrvr) to stop responding.
PAN-114966 Fixed an issue where trunk interfaces were not working on Hyper-V.
PAN-114784 Fixed an issue where a process (devsrvr) stopped responding after you
pushed a configuration from Panorama to a firewall.
PAN-114438 Fixed an issue where the system log incorrectly reported intermittent
certificate revocation list (CRL) fetches as successful even though the fetches
were not successful.
PAN-114197 Fixed an issue where a configured certificate profile was not visible from
the web interface in Network > Network Profiles > IKE Gateways > Add >
General > Certificate Profile.
PAN-113144 Fixed an issue where BGP peers were not enabled when transitioning from
Active/Passive to Active/Active or Active/Active to Active/Passive config on
both IPv4 and IPv6 peer groups.
PAN-111650 Fixed an issue where a process (mgmtsrvr) stopped responding when another
process (masterd) sent a signal interruption after you upgraded from a PAN-
OS 9.0 release to a PAN-OS 9.1 release.
PAN-111333 An enhancement was made to increase the pattern match limit to recognize
applications and threats accurately.
PAN-111135 Fixed an issue where Panorama displayed incorrect device monitoring values
(Panorama > Managed Devices > Health) for the firewall.
PAN-109528 Fixed an issue where an old GPRS tunneling protocol (GTP) event was
unexpectedly freed when an update message arrived, causing a crash.
PAN-109406 Fixed an issue where the firewall restarted when you unplugged the QSFP+
module from the High Speed Chassis Interconnect (HSCI) port.
PAN-107358 Fixed an issue where a firewall had a race condition in the error handling code
in the write thread, causing memory corruption in the sslmgr session cache
ring buffer.
PAN-105763 An enhancement was made to enable you to set the signing algorithm to
sha-1 or sha-256 in the Security Assertion Markup Language (SAML) message
on the firewall.
PAN-100946 Fixed an issue where VM-Series firewalls were unable to support the
maximum number of tunnel interfaces due to less than expected memory
allocation.
PAN-95651 (PA-3200 Series firewalls only) Fixed an issue where incomplete core dump
files were generated during dataplane process crashes, making the crash
analysis difficult.
PAN-71148 Fixed an issue on Panorama where the ACC tab would not show data for the
period before the daylight saving time (DST) change.
Issue ID Description
PAN-127932 Fixed an issue where the REST API reference did not display
the web browser documentation, which resulted in an error
when running a PAN-OS 9.0.4 release.
PAN-126534 (PAN-OS 8.1.10 and later releases only) Fixed an issue where
the data from Security policies did not export as expected.
PAN-126354 Fixed an issue where log in and commits took longer than
expected when you used XML API calls to create new address
objects.
PAN-125933 Fixed an issue where the receiving firewall deleted the host
information profile (HIP) report due to the report containing the
same IPv4 address in the IP and IP2 fields and caused a process
(useridd) to stop responding.
PAN-125452 Fixed an issue where the firewall did not list registered
addresses from the Dynamic Address Group when the same IP-
tag information was received from two sources, which caused
the traffic flow to stop responding as expected.
PAN-124890 Fixed a configuration lock issue where you were unable to log
in after you upgraded from PAN-OS 8.1.6 to PAN-OS 8.1.9.
PAN-124630 Fixed an issue where new logs were not ingested due to
a buffer exhaustion condition caused by invalid messages
incorrectly handled by elastic search.
PAN-123362 Fixed an issue where the firewall used more than expected
virtual memory when you decreased the maximum elastic
search heap size.
PAN-122601 Fixed a memory leak issue with a process (configd) when you
performed device group related operations.
PAN-121523 Fixed an issue where an API call triggered memory errors, which
caused a process (configd) to stop responding and triggered
SIGABRT logs.
PAN-121447 Fixed an issue where the BGP did not remove the IPv6 default
route from the forwarding table after the route was withdrawn.
PAN-119680 Fixed a rare issue where the show running CLI commands for
policy addresses caused file descriptor leaks.
PAN-118881 Fixed an issue where the user domain information was missing
from the user IP mapping entry when you configured Allow
Authentication with User Credentials or Client Certificate
to Yes while using a client certificate for GlobalProtect
authentication.
PAN-117907 Fixed an issue where the date and time provided for a request
license information output did not match the show clock output
provided by the NTP server.
PAN-117900 Fixed an issue where commits failed when you moved an object
referenced in a policy to a shared group.
PAN-117888 Fixed an issue where the firewall was unable to detect the
hardware security module (HSM), which caused the firewall to
drop SSL traffic.
PAN-116772 Fixed an issue where the firewall sent empty attributes in the
LDAP query when you did not configure Alternate Username 1
- 3 (Device > User Identification > Group Mapping Settings >
<group-name> > User and Group Attributes) in the User
Attributes web interface.
PAN-116611 Fixed an issue where an API call for correlated events did not
return any events.
PAN-116286 Fixed an issue where commits failed after you upgraded from
PAN-OS 8.0.16 to PAN-OS 8.1.6 due to an invalid encryption
state for a host information profile (HIP) object.
PAN-116189 Fixed an issue where Session Initiation Protocol (SIP) calls failed
and displayed the following error message: end-reason:
resources-unavailable.
PAN-115990 Fixed an issue where the FQDN address object (Policy >
Security > <address-object> > Value) displayed the following
unrelated error: <FQDN-name> Not used.
PAN-115959 Fixed an issue where DNS names with more than 63 characters
did not resolve FQDN address objects during an FQDN refresh.
PAN-115890 Fixed an issue where the show system info CLI command
incorrectly displayed VMware ESXi as VMWare ESXi.
PAN-115281 Fixed an issue where the firewall did not resolve an external
dynamic list server address when the DNS proxy configured it
as a static entry.
PAN-114540 Fixed an issue where renaming a template stack did not change
the value and reset to the original value after you commit the
change.
PAN-114456 Fixed an issue where extended packet capture (pcap) for threat
logs caused a process (mgmtsrvr) to stop responding.
PAN-114270 Fixed an issue where the firewall dropped TCP trace route
traffic after you upgraded to PAN-OS 8.1.5. To leverage this
fix, run the set session tcp-reject-diff-syn no CLI
command.
PAN-113261 (PA-5200 Series firewalls only) Fixed an issue where the total
entries for the URL filtering allow list, block list, and custom
categories were incorrectly set to an entry limit value other
than 100,000.
PAN-113162 Fixed an issue where you were unable to create shared URL
filtering profiles from the Panorama web interface.
PAN-112661 Fixed an issue where you were unable to access a firewall due
to a defective small form-factor pluggable (SFP)/SFP+ module
inserted into the firewall.
PAN-102195 Fixed an issue where the firewall did not detect all threat
sessions while the App and Threat content installation was
processed.
WF500-4785 Fixed a rare issue on WF-500 appliances where the firewall did
not respond after you upgraded the appliance from a PAN-OS®
8.0.1 release to a PAN-OS 8.0.10 or later release. With this fix,
you can run the new debug software raid fixup auto
CLI command to recover the RAID controller.
PAN-124658 Fixed an issue where the timer system call activated more
frequently than expected, which caused higher than expected
CPU usage.
®
PAN-123371 Fixed an issue where the Wildfire Analysis Report incorrectly
displayed the following error message: You are not
authorized to access this page on the web
interface.
PAN-122004 (PA-5200 Series firewalls only) Fixed an issue where the Quad
Small Form-factor Pluggable (QSFP) 28 ports 21 and 22 did not
respond when plugged in with a Finisar 100G AOC cable.
PAN-121449 Fixed an issue where Remove Config (Panorama > Plugins) did
not remove the configuration for any plugins you have set up
on Panorama.
PAN-120548 Fixed an issue where the Captive Portal request limit was
ignored when you configured the Captive Portal authentication
method to browser-challenge.
PAN-119257 Fixed an issue where the firewall could not establish an IKEv2
connection with SHA256 certificates.
PAN-119187 (Panorama only) Fixed an issue where a file lock was released
before the lock was taken, which triggered an erroneous
maximum connection timeout that prevented administrators
from logging in to and executing commands from the
command-line interface (CLI).
PAN-118411 Fixed an issue where ARP entries took longer than expected to
age out in a single run.
PAN-117921 Fixed an issue where you were unable to create GTP inner
sessions, which caused the firewall to drop GTP-U data packets
when the firewall was deployed on S1-U and S-11 interfaces.
PAN-115856 Fixed an issue where Dynamic IP and Port (DIPP) NAT pools did
not release used ports after all sessions were removed.
PAN-115794 Fixed an issue where, after you upgraded the firewall from
PAN-OS 8.1.5 to PAN-OS 9.0.0, the firewall displayed the
following validation error: plugins 'read-only' is not
an allowed keyword.
PAN-115792 Fixed an issue where after a refresh of the external dynamic list
values from the previous list were not retained, which caused
the list values to display 0.0.0.0 and displayed the following
error message: HTTP/1.1 500 Internal Server Error.
PAN-115738 Fixed an issue where data logs were generated but the firewall
did not forward the logs to the syslog server.
PAN-115287 Fixed an issue where commits failed and displayed the following
error message: Commit job was not queued. All
daemons are not available.
PAN-115186 Fixed an issue where SaaS reports were not generated due to
report definitions not getting pushed to the log collector.
PAN-114779 Fixed an issue where log purging took longer than expected,
which prevented the firewall from capturing traffic logs.
PAN-114533 Fixed an issue where traffic was blocked by the safe search
enforcement instead of the intended allow rule.
PAN-114427 Fixed an issue where an empty host name in the HTTP header
caused a web server process (websrvr) to stop responding when
you accessed the captive portal redirect page.
PAN-114160 Fixed an issue where you were unable to download ZIP files
greater than 3GB through a GlobalProtect Clientless VPN
application.
PAN-114002 Fixed an issue where you were unable to import variable CSV
files when variable names contained a character space.
PAN-113971 (PA-7000 Series firewalls only) Fixed an issue where the High
Speed Chassis Interconnect (HSCI) link flapped after you
rebooted the firewall.
PAN-113887 Fixed an issue where loading custom app tags did not complete
successfully, which prevented subsequent requests (such as
commits, content installs, and FQDN refreshes) from executing
as expected.
PAN-113767 Fixed an issue where the firewall silently dropped packets when
security profiles were attached and FPGA enabled AHO and
DFA.
PAN-113619 Fixed an issue where the GlobalProtect gateway did not assign
an IP address when the local IP address was a supernet of the
GlobalProtect pool.
PAN-112529 Fixed an issue where the firewall incorrectly sent several benign
critical content alerts daily.
PAN-110628 Fixed an issue where user groups were deleted from the Group
Include List ("Device > User identification > Group Mapping
Settings > <group-name> > Group Include List) if you changed
the LDAP server profile account password.
PAN-110168 Fixed an issue where the firewall and Panorama web interface
did not present HSTS headers to your web browser.
PAN-109759 Fixed an issue where the firewall did not generate a notification
for the GlobalProtect client when the firewall denied
unencrypted TLS sessions due to an authentication policy
match.
PAN-106628 Fixed an issue where the firewall did not generate a system log
when the firewall detected a RAM issue.
PAN-105286 Fixed an issue where the firewall did not record email header
information in Data Filtering logs when you triggered a test mail
that contained a data leak prevention (DLP) pattern.
PAN-103865 Fixed an issue where the firewall did not detect user credentials
when the number of users exceeded 60,000.
PAN-103847 Fixed a memory buffer allocation issue that caused the Session
Initiation Protocol (SIP) traffic NAT to stop responding.
PAN-118949 Fixed an issue where after you changed the filter configuration
in the user.src notin 'cns\proxy full profile, the
firewall displayed the following error message: Unknown user
group cns\Proxy Full.
PAN-118640 Fixed an issue where the GTP-U session did not match the
correct policy, which caused the IMSI and IMEI not to display in
the inner session traffic and threat logs.
PAN-117249 Fixed an issue where end users who don't have REST API
authentication roles were able to list and edit configuration
rules.
PAN-116579 Fixed an issue where the firewall sent truncated URLs to the
Captive Portal Redirect message when HTTPS traffic sent
through a proxy server was subjected to decryption.
PAN-116022 Fixed an issue where the NSX Manager passed a blank string to
Panorama, which added a null entry into the configuration and
caused commits to fail.
PAN-115379 Fixed an issue where you were unable to create a custom log
forwarding profile when you configured a filter with the "in"
and "not in" configurations (Objects > Log Forwarding > Add >
Add > Filter > Filter Builder) and resulted in the following error
message: Invalid filter policy-logging-cf-ent ->
match-list -> ITS_url_logs -> filteris invalid.
PAN-115339 Fixed a rare issue where a commit caused the firewall to stop
responding when you enabled flow debug and configured a
NAT policy.
PAN-115035 Fixed a rare issue where Threat log and URL log stopped
generating.
PAN-114642 Fixed an issue where firewall logs incorrectly included the end-
user IP address in GTP message logs when you configured PAA
IE with IPv4 and IPv6 dual stack in the Create Session Response
message.
PAN-114607 Fixed an issue where all the log collectors did not get queued
when you configured more than 32 collector groups.
PAN-114275 Fixed an issue where the firewall dropped GTPv1 DELETE PDP
response packets that had a termination endpoint ID (TEID)
value of 0.
PAN-112293 Fixed an issue where the connection between the firewall and
Log Collector flapped.
PAN-112167 Fixed an issue where IPv4 BGP routes were missing from the
routing table and FIB after a failover event.
PAN-112106 Fixed an issue where the firewall was unable to add IPv6
loopback IP address ::1 to the external dynamic list and
displayed the following error message: Invalid ips: ::1.
PAN-111976 Fixed an issue where you were unable to generate user activity
reports when the username included a colon ( : ), ampersand
( & ), single parenthesis ( ' ) character.
PAN-111708 (PA-3200 Series firewalls only) Fixed a rare software issue that
caused the dataplane to restart unexpectedly. To leverage this
fix, you must run the debug dataplane set pow no-
desched yes CLI command.
PAN-110883 Fixed an issue on a VM-Series firewall where all jobs did not
execute and returned the following error message: Error-
time out sending/receiving message.
PAN-110293 Fixed an issue where GTP-U traffic dropped when the GTP
tunnel endpoint ID (TEID) was not updated correctly during a
GTP-C update.
PAN-109575 Fixed an issue where you were unable to configure more than
one device certificate (Device > Certificate Management >
Certificates > <device certificate-name>) with Trusted Root
CA.
PAN-109101 Fixed an issue where you were unable to override IKE Gateway
configurations (Network > IKE Gateways > <template-name>)
in the template stack. However, with this fix, you still cannot
override template stacks when you configure any value with
none. Additionally, to override the Local Identification, select
Authentication in the pop-up dialogue.
PAN-109024 Fixed an issue where, after you upgrade the firewall from PAN-
OS 8.0 to PAN-OS 8.1, firewalls configured with the User-ID
agent and group mapping incorrectly mapped users to groups.
PAN-108878 Fixed an issue where host traffic ICMP packets larger than
9,180 bytes dropped when you configured a jumbo frame with
a maximum MTU value of 9,216 bytes and with the DF option
enabled.
PAN-108715 Fixed an issue where the firewall did not update the dataplane
DNS cache after the management plane (MP) DNS entries
expired, which caused evasion signatures to erroneously trigger
a Suspicious TLS/HTTP(S)Evasion Found event.
PAN-106861 Fixed an issue where stale route entries remained in the FIB
after the routes were removed from the routing table when you
used a redistribution rule without a profile.
PAN-106344 Fixed an issue where the log collector within a collector group
retained varying numbers of detailed firewall logs when you
enabled log redundancy.
PAN-104568 Fixed an issue where the firewall did not send emails when you
configured the email gateway with an FQDN.
PAN-101970 Fixed an issue where the decode filter was unable to detect
the end characters of a file name, which caused the firewall to
bypass the file blocking profile.
PAN-100773 (PA-7000 Series firewalls only) Fixed an issue where the Quad
Small Form-factor Pluggable (QSFP) port on a 20GQ NPC card
took longer than expected to respond.
PAN-99354 Fixed an issue where the firewall incorrectly denied URL access
when the URL filtering profile was configured to alert.
PAN-89820 Fixed an intermittent issue where the Data Filtering (Monitor >
Data Filtering) and Threat Log (Monitor > Threat) did not
display file names when you transferred multiple files into a
single session.
PAN-116658 Fixed a rare issue where the firewall sent HTTP/2 DATA
frames with incorrect padding byte lengths, which caused
software buffer corruption and a process (all_pktproc) to stop
responding.
PAN-116316 Fixed an issue where RTP and RTCP predict sessions failed,
which caused the firewall to stop processing RTSP-based video
streaming.
PAN-115591 Fixed an issue where the snmpd process was leaking memory
when polling for global counters.
PAN-114601 Fixed an issue where the Allow List (Device > Setup >
Authentication Setting > <authentication profile - name> >
Authentication) did not update after you added new users to a
group in the Active Directory.
PAN-113829 Fixed an issue where, after you upgraded the firewall to PAN-
OS® 9.0, a firewall configured from "none" to "allow" in the
custom URL category reverted to "none" after a commit.
PAN-112814 Fixed an issue where H.323-based calls lost audio because the
predicted H.245 session was not converted to Active status,
which caused the firewall to drop the H.245 traffic.
PAN-112626 Fixed an issue where a new DNS Security subscription was not
available on your VM-Series firewall after you upgraded to a
®
PAN-OS 9.0 release with a PAYG Bundle 2 license.
PAN-109344 Fixed an issue where service objects did not import into
Panorama when you configured them identically but with
different names.
PAN-112592 Fixed an issue on a firewall where the system log did not
generate an alert for AutoFocus™ license expiry.
PAN-112305 Fixed an issue where source (Object > Dynamic Lists <list-
name> > Create List) URLs, which contained double escape
characters caused external dynamic list entries to display
incorrect values in the policies.
PAN-111897 Fixed an issue where the tags were not set on OSPFv3 routes
redistributed to BGP-3.
PAN-111850 Fixed an issue where the firewall did not capture the number of
packets in the threat packet capture (pcap) as configured in the
extended packet capture length setting.
PAN-111638 Fixed an issue where the external dynamic list did not update
after a scheduled refresh of the list.
PAN-110341 Fixed an issue where the firewall sent RIP updates more
frequently than expected.
PAN-108620 Fixed an issue where Traps ESM logs were sent to the Log
Collector but did not display in the web interface (Monitor >
Traps ESM).
PAN-107006 Fixed an issue where you were unable to search for service
objects by destination port numbers.
PAN-106963 Fixed an issue where the firewall did not display the full URL
information in the URL Filtering log (Monitor > URL Filtering)
after a ( '\r' ) return character.
PAN-104263 Fixed an issue where the RTC battery reading exceeded the
maximum threshold value.
PAN-96827 Fixed an issue where BGP command output formats did not
display consistently across different PAN-OS releases.
PAN-109096 Fixed an issue where the firewall did not remove the 4 Byte AS
Format number when Remove Private AS is enabled.
PAN-107887 Fixed an issue where an API call did not return the details of the
security policy when you added a service group.
PAN-105737 Fixed an issue where AUX ports remained in Down state after
®
you upgraded to PAN-OS 8.1.7.
PAN-104616 Fixed an issue where certificate imports failed when you used a
backslash ( \ ) character in a password to export certificates.
PAN-103863 Fixed an issue where the IPSec tunnel restart (Network >
IPSec Tunnels > IKE Info) did not display properly on the web
interface.
PAN-103192 Fixed an issue on a firewall where the Global Find for IPSec
tunnels displayed incorrect search results.
PAN-103055 Fixed an issue where you were unable to filter Address Groups
(Objects > Address Groups) by an address object name.
PAN-101391 Fixed an issue where the scheduled nightly custom report was
not generated or emailed as expected.
PAN-101365 Fixed an intermittent issue where the session ID did not clear
when the session ID is set to 0.
PAN-100154 Fixed an issue where the default static route always became the
active route and took precedence over a DHCP auto-created
default route that was pointing to the same gateway regardless
of the metrics or order of installation. With this fix, the firewall
PAN-99945 Fixed an issue on Panorama where the progress bar in the web
interface stopped responding and did not display any status
after sending a commit or activating an auth code even though
the task completed successfully.
PAN-98005 Fixed an issue where adding more than eight Log Collectors to
a collector group caused the configuration (configd) process to
stop responding.
PAN-96344 Fixed an issue on a firewall where TCP reset packets were sent
even after you set the vulnerability profile action to drop the
packets.
PAN-95445 Fixed an issue where VM-Series firewalls for NSX and firewalls
in an NSX notify group (Panorama > VMware NSX > Notify
This fix requires the VMware NSX
Group) briefly dropped traffic while receiving dynamic address
2.0.4 or a later plugin.
updates after the primary Panorama in a high availability (HA)
configuration failed over.
PAN-94486 Fixed an issue where the dataplane did not get a dynamic IP
address assigned because the process (routed) did not release it.
PAN-82278 Fixed an issue where filtering did not work for Threat logs
when you filtered for threat names that contained certain
characters: single quotation (’), double quotation (”), back slash
(\), forward slash (/), backspace (\b), form feed (\f), new line
(\n), carriage return (\r), and tab (\t).
297
298 PAN-OS® RELEASE NOTES | Getting Help
© 2020 Palo Alto Networks, Inc.
Related Documentation
Refer to the PAN-OS® 9.0 documentation on the Technical Documentation portal for general information
on how to configure and use already-released features.
• PAN-OS 9.0 New Features Guide—Detailed information on configuring the features introduced in this
release.
• PAN-OS 9.0 Administrator’s Guide—Provides the concepts and solutions to get the most out of your
Palo Alto Networks next-generation firewalls. This includes taking you through the initial configuration
and basic set up on your Palo Alto Networks firewalls.
• Panorama 9.0 Administrator’s Guide—Provides the basic framework to quickly set up the Panorama™
virtual appliance or an M-Series appliance for centralized administration of the Palo Alto Networks
firewalls.
• WildFire 9.0 Administrator’s Guide—Provides steps to set up a Palo Alto Networks firewall to forward
samples for WildFire® Analysis, to deploy the WF-500 appliance to host a WildFire private or hybrid
cloud, and to monitor WildFire activity.
• VM-Series 9.0 Deployment Guide—Provides details on deploying and licensing the VM-Series firewall on
all supported hypervisors. It includes example of supported topologies on each hypervisor.
• GlobalProtect 9.0 Administrator’s Guide—Describes how to set up and manage GlobalProtect™ features.
• PAN-OS 9.0 Web Interface Help—Detailed, context-sensitive help system integrated with the firewall
and Panorama web interface.
• Palo Alto Networks Compatibility Matrix—Provides operating system and other compatibility
information for Palo Alto Networks next-generation firewalls, appliances, and agents.
• Open Source (OSS) Listings—OSS licenses used with Palo Alto Networks products and software:
• PAN-OS 9.0
• Panorama 9.0
• Wildfire 9.0
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
Palo Alto Networks, Inc.
www.paloaltonetworks.com