PAN-OS Release Notes
PAN-OS Release Notes
10.1.9-h1
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2020-2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
March 7, 2023
Limitations..........................................................................................................29
Limitations in PAN-OS 10.1................................................................................................... 30
5
Features Introduced in PAN-OS 10.1
App-ID Features
New App-ID Feature Description
App-ID Cloud Engine With App-ID Cloud Engine (ACE), which powers our SaaS
Security Inline subscription, you can now dramatically increase
visibility and control of over 15,000 SaaS applications and
their corresponding functions. Applications identified through
ACE integrate seamlessly with Policy Optimizer to streamline
incorporation of these new applications with the strongest
possible security posture. New applications become available
in PAN-OS as ACE defines them, with no need to wait for App-
ID signature development. New ACE applications don’t break
existing policy because the Security policy rules that previously
controlled the applications continue to control them until you
use ACE App-IDs in Security policy.
Management Features
New Management Feature Description
Audit Tracking for Administrator Activity PAN-OS 10.1 allows you to track administrator
activity in the web interface and command
line interface (CLI) to understand where
administrators navigated and what operational
and debug commands were performed to
maintain an audit history for compliance
purposes. An audit log is generated and
forwarded to your syslog server each time an
administrator activity occurs, enabling near real-
time reporting of activity.
Device Certificate for Cortex Data Lake To reduce the number of certificates you
need to install and manage to connect to Palo
Alto Networks cloud services, you can now
authenticate to Cortex Data Lake using a device
certificate. This enables you to authenticate to
Cortex Data Lake using the same certificate that
you would use to connect to Cortex XDR, IoT
Security, and Enterprise Data Loss Prevention.
Devices using a device certificate follow a
new process to onboard to Cortex Data Lake.
Make sure to follow the onboarding process
appropriate for your PAN-OS version and
deployment style.
Panorama Features
New Panorama Feature Description
Authentication Key for Secure To strengthen the security of onboarding new firewalls, Log
Onboarding Collectors, and WildFire appliances running PAN-OS 10.1.0
and later releases, a device registration authentication key is
required for mutual authentication between the Panorama
management server and the firewall, Log Collector, or
WildFire appliance on first connection. Each device
registration authentication key configured on Panorama is
unique and allows for customizable parameters such as the
key lifetime and the number of times the key can be used
before it becomes invalid.
Scheduled Configuration Push In PAN-OS 10.1, you can now schedule configuration pushes
to Managed Firewalls to ease your operational overhead for any size deployment
irrespective of location and maintenance window times. For
example, scheduling your configuration pushes improves the
efficiency of operations during short maintenance windows
by eliminating human delays as well as speeding up change
deployments to multi-vsys firewalls (with the optimization
for multiple virtual systems as described next). The flexibility
of scheduled configuration pushes allow you to create a
one-time push or schedule recurring pushes to provide you
with an automated way to deploy routine or pre-approved
changes to your managed firewalls.
Unique Master Key for a Configure a unique master key for each firewall managed
Managed Firewall by the Panorama management server to ensure the
configuration security of each firewall and ease the
operational burden of updating the managed firewall master
key. Configuring a unique master key for each managed
firewall limits exposure if a master key is compromised.
Networking Features
Networking features in PAN-OS 10.1.
LSVPN Cookie Expiry Extension You can now configure the cookie expiration period
from 1 to 5 years, while the default remains as 6
(PAN-OS 10.1.7 and later 10.1
months. The encrypted cookie stored on an Large Scale
Releases)
VPN (LSVPN) satellite expires after every 6 months.
This causes the VPN tunnels associated with the
satellite to go down, causing an outage until the satellite
is re-authenticated to the LSVPN portal or gateway and
a new cookie is generated. A re-authentication every
six months causes administrative overhead, affecting
productivity, network stability, and resources of the
company.
To reduce administrative overhead, we’ve extended the
cookie expiration period from 6 months to 5 years.
Persistent NAT for DIPP One type of source NAT is Dynamic IP and Port (DIPP).
Some applications, such as VoIP, video, and others,
(PAN-OS 10.1.6 and later 10.1
use DIPP and may require Session Traversal Utilities
Releases)
for NAT (STUN) protocol. DIPP NAT uses symmetric
NAT, which may have compatibility issues with STUN.
To alleviate those issues, persistent NAT for DIPP
provides additional support for connectivity with such
applications. When you enable persistent NAT for DIPP,
the binding of a private source IP address and port to a
specific public (translated) source IP address and port
persists for subsequent sessions that arrive having that
same original source IP address and port.
Network Packet Broker You can now not only decrypt but also broker all traffic
—decrypted TLS, non-decrypted TLS, and non-TLS—to
a suite of vendor-agnostic security tools such as IPS,
IDS, and SIEM devices for inspection. Network Packet
Broker eliminates the need to purchase and maintain
dedicated, single-function appliances to decrypt and
manage security chain devices. You can filter and
forward traffic to one chain or to multiple chains of
security devices based on application, user, IP address,
Support for Stronger SNMPv3 SNMPv3 now supports stronger hashing and encryption
Encryption algorithms to better meet your organizations internal
encryption policies. You can specify hashing algorithms
from SHA-224 to SHA-512 for the Authentication
Protocol, and encryption algorithms AES-192 and
AES-256 for the Privacy Protocol when configuring
SNMP or defining the SNMP Trap Server profile.
Identity Features
New Identity Feature Description
User-ID Features
New User-ID Feature Description
Group mapping centralization for You can now use virtual system User-ID hubs to
virtual system hubs share group mapping information in addition to IP
address-to-username mapping information, allowing
you to more consistently enforce group-based policy.
Configuring a virtual system as a hub allows you to use
your multi-vsys environment to maximize the number of
available mappings for each virtual system and simplify
configuration.
Advanced URL Filtering Security The Advanced URL Filtering security subscription
Subscription is a new, cloud-based ML-powered web security
engine that protects against today’s most evasive and
targeted web-based attacks. Advanced URL Filtering
performs ML-based inspection of web traffic in real-
time, reducing reliance on URL databases and out-of-
band web crawling to detect and prevent advanced,
file-less web-based attacks including targeted phishing,
web-delivered malware and exploits, command-and-
control, social engineering, and other types of web
attacks.
Additional Protections for Modern DNS Security now features almost three times the
DNS-layer Attacks number of protections against DNS-layer attacks as
before, including several industry-first protections for
attacks including ultra-slow DNS tunneling and dangling
DNS. Other protections include NSNX DDoS attacks,
fast-flux domains, dictionary DGA, DNS rebinding, and
predictive detection of newly registered domains.
Download the latest PAN-OS content release to take
advantage of the new protections.
Prisma Access Hub Support As more internet services move to the cloud, PAN-
OS Secure SD-WAN now offers security in the cloud
using Prisma Access, in addition to security on-premises
using PAN-OS firewalls. The SD-WAN hub-and-spoke
topology now supports a Prisma Access hub. You can
secure your internet traffic for specific applications at
the branch location or in the cloud with Prisma Access
and have this traffic fail over to any other VPN tunnel if
necessary.
SD-WAN Support for AE and SD-WAN now allows you to combine multiple ISP
Subinterfaces services into an Aggregated Ethernet (AE) interface
for link redundancy. The AE interface supports
subinterfaces that you tag for different ISP services
using Layer 3 VLAN tags to achieve end-to-end traffic
segmentation.
SD-WAN Support for Layer 3 SD-WAN now allows you to combine multiple ISP
Subinterfaces services into an Ethernet interface. The interface
supports subinterfaces that you tag for different ISP
services using Layer 3 VLAN tags to achieve end-to-end
traffic segmentation.
GlobalProtect Features
The following table describes new GlobalProtect features introduced in PAN-OS 10.1. For
features related to the GlobalProtect app, see the GlobalProtect App 5.2 Release Notes.
Security Policy You can now enforce a security policy rule to track traffic from
Enforcement endpoints while end users are connected to GlobalProtect and
for Inactive to quickly log out inactive GlobalProtect sessions. With this
GlobalProtect enhancement, you can now enforce a shorter inactivity logout period.
Sessions If a GlobalProtect session remains inactive during the configured time
period, the session is automatically logged out and the VPN tunnel is
terminated.
Support for Gzip Palo Alto Networks next generation firewall adds support for Gzip
Encoding in encoding to Clientless VPN deployments. This enables Clientless VPN
Clientless VPN users to access internal or SaaS applications that use Gzip encoding.
This enhancement also ensures that the Gzip-compressed web pages
(Available with PAN-
are displayed correctly when accessed through the Clientless VPN.
OS 10.1.2 and later
10.1 releases)
Virtualization Features
New Virtualization Feature Description
Intelligent Traffic Offload service Intelligent Traffic Offload service (ITO) is a Security
for VM-Series on KVM subscription that, when configured with the BlueField-2
SmartNIC, increases capacity throughput for the VM-
Series firewall. The ITO service inspects the first few
packets of a new flow to determine whether it benefits
from inspection. If not, the service offloads the flow to
the SmartNIC, decreasing the load on the VM-Series
firewall.
The VM-Series firewall and the SmartNIC must be
installed on the same x86 physical host, and the VM-
Series firewall must be deployed in virtual wire mode.
Active/Passive HA is supported.
Address Family eXpress Data Path To increase effective throughput, the CN-Series firewall
(AF-XDP) Support on CN-Series can now leverage AF XDP, an eBPF based socket that is
optimized for high performance packet processing suited
to cloud native services.
DPDK Support for Different NIC VM-Series firewalls now support multiple NIC types and
Types multiple queues. You can configure both SR-IOV and
DPDK for all hypervisors on cloud platforms that support
multiple NIC types. In addition, a single NIC type with
variable queues (available on some cloud platforms) is
also supported.
Please contact Technical Support if you want to use this
feature.
CN-Series Firewall as a Kubernetes You can now deploy the CN-Series firewall as a
Service Kubernetes service. In Kubernetes deployments with
smaller nodes with more stringent resource constraints,
deploying the CN-Series as a daemonset can be
difficult. The challenges associated with predicting
and provisioning the necessary resources can result in
firewalls consuming more resources than required to
support the traffic on the cluster. By deploying the CN-
Series as a service, you can start with the right amount
of resources and scale dynamically when necessary.
When deployed as a service, the CN-Series firewall
provides complete Layer 7 visibility, application-level
segmentation, and protection for traffic in your native
Kubernetes, OpenShift, AKS, EKS, or GKE environments
using native Kubernetes constructs.
IPVLAN CNI L2 Support on the You can now use IPVLAN in Layer 2 mode with your CN-
CN-Series Firewall on EKS Series deployment on EKS.
(Available with PAN-OS® 10.1.2
and later 10.1 releases)
5G Multi-access Edge Computing For enterprises and service providers that use Multi-
Security access Edge Computing (MEC) in 5G environments,
5G Multi-access Edge Computing Security not only
provides the same level of security already available at
the subscriber, equipment, and network slice level now
for 5G networks, but also secures traffic at the protocol
level through stateful inspection for Packet Forwarding
Control Protocol (PFCP) traffic. This new level of security
protects and secures devices and users that connect
to MEC, as well as applications hosted on MEC, from
attacks such as Denial of Service (DoS) and spoofing, as
well as other potential threats such as vulnerabilities,
malware, and viruses. 5G Multi-access Edge Computing
Security delivers granular visibility and control, as well as
context-based visibility into threats.
Hardware Features
Hardware features in PAN-OS 10.1.
23
Changes to Default Behavior
Feature Change
SSL Inbound Inspection The firewall now proxies all decrypted inbound
traffic to servers, so SSL Inbound Inspection
cannot decrypt some inbound sessions, such as
sessions with client authentication or pinned
certificates. In addition, the firewall does not
support High Availability sync for decrypted SSL
sessions.
Feature Change
running PAN-OS 10.1.0 and later releases.
The device registration authentication key is
used for mutual authentication between the
Panorama management server and the firewall,
Log Collector, or WildFire appliance on first
connection. See the PAN-OS 10.1 New Features
Guide for more information.
Device Group Push from Panorama to a One or more device group pushes from Panorama
Multi-VSYS Firewall. to multiple VSYS on a multi-VSYS firewall are
now bundled as a single commit job on the
managed firewall to reduce the overall commit job
completion time.
Software Next Generation Firewall In PAN-OS 10.1 you can use Software Next
Credits Generation Firewall credits to license VM-
Series firewalls deployed with up to 32 vCPUs.
Previously Software Next Generation Firewall
Credits could license no more than 16 vCPUs.
Log Forwarding on the PA-7000 Series Beginning with PAN-OS 10.1, the PA-7000
Firewall Series Firewall only uses the logging port and the
corresponding log card (LPC or LFC) to forward
system and configuration logs.
Feature Change
System and configuration logs are not forwarded
if the corresponding (LPC or LFC) is not
configured.
Window Size Customization Added to To allow you to customize the window size when
Replay Protection you Enable Replay Protection during IPSec tunnel
configuration, an Anti-Replay Window has been
added. You can select an anti-replay window size
of 64, 128, 256, 512, 1024, 2048, or 4096.
In addition, the default size of the anti-replay
window has been increased to 1024.
Scheduled Log Export Scheduled log exports (Device > Log Export) may
not export logs as scheduled if multiple logs are
(PAN-OS 10.1.5 and later releases)
scheduled to export at the same time.
Workaround: When scheduling your log exports,
maintain at least 6 hours between each scheduled
log export.
Add a Device to Panorama Management After you successfully add a managed firewall
or Dedicated Log Collector to Panorama
Feature Change
management using the device registration auth
key, the managed firewall or Dedicated Log
Collector automatically disconnects and then
reconnects to Panorama using the certificate
provided by Panorama.
After the managed firewall or Dedicated Log
Collector automatically reconnects to Panorama,
the connection Status (Panorama > Managed
Devices > Summary or Panorama > Managed
Collectors) reflects the connection status
accurately.
Test SCP Server Connection To test the SCP server connection when you
schedule a configuration export (Panorama >
(PAN-OS 10.1.9 and later releases)
Schedule Config Export) or log export (Device >
Scheduled Log Export), a new pop-up window is
displayed requiring you to enter the SCP server
clear textPassword and Confirm Pasword to test
the SCP server connection and enable the secure
transfer of data.
You must also enter the clear text SCP server
Password and Confirm Password when you test
the SCP server connection from the firewall or
Panoram CLI.
admin>test scp-server-connection
initiate <ip> username <username>
password <clear-text-password>
29
Limitations
Issue ID Description
Issue ID Description
2. Remove any HIP Profile associated with a policy rule.
admin> configure
3. Commit
admin# commit
admin> config
Issue ID Description
5. Load the running config.
admin> config
Issue ID Description
Block session if certificate status cannot be retrieved
within timeout, the firewall allows client certificate
validation to go through even if the CRL Distribution
Point or OCSP Responder is unreachable.
Workaround: You must also enable Block session if
certificate status is unknown to ensure Block session if
certificate status cannot be retrieved within timeout is
effective.
PAN-172401 The PA-400 Series data port drops traffic when the
local link speed is forced to 10Mbs/100Mbs while the
remote peer link speed is set to autonegotiate.
PAN-171283 When you run the App-ID Cloud Engine (ACE) service
on firewalls in an HA cluster, after a cluster failover, the
sessions based on ACE App-IDs move to the failover
Issue ID Description
firewall. However, as with other applications, on failover
some session information is not retained.
For ACE App-IDs, the operational command
admin@pan-os-fw> show session id
<session> shows the application as being 0 instead
of showing the name of the application. This does not
affect Security policy enforcement after the failover.
PAN-171057 Policies > Security > Policy Optimizer > New App
Viewer displays rules that do not have new applications
if the functional applications are in an app container.
For example, a Security policy allow rule includes an app
container for the “exampleapp” application. The firewall
sees the functional application “exampleapp-post” for
the first time. Because the allow rule includes the new
app’s container, the firewall should not see it as a new
application. However, the New App Viewer shows the
rule as having seen a new application even though the
app container includes it in the rule.
Issue ID Description
Issue ID Description
broken and must be fixed.[ 2.026107]
EFI: Problem loading in-kernel X.509
certificate (-65)Maintenance Mode
filesystem size: 2.0G
37
Associated Content and Software Versions
Palo Alto Networks Software or Minimum Compatible Version with PAN-OS 10.1
Content Release Version
Panorama 10.1
WFWin7_64Base_m-1.0.0.7_64base 8.0
• * This WildFire guest VM image comes preinstalled and is not available on the Palo Alto
Networks Support Portal for download.
• ** This WildFire analysis environment is not selectable through the WildFire appliance
CLI.
41
PAN-OS 10.1.9 Known and Addressed Issues
Issue ID Description
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
Issue ID Description
Workaround: Attach a serial console to the VM-Series
firewall before upgrade to PAN-OS 10.1.9.
Issue ID Description
Workaround: Restart the log receiver service by running the
following CLI command:
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
Issue ID Description
resulting job becomes unresponsive at 10% and does not
complete until you manually stop the job in the web interface.
Workaround:Change the vsys key to a valid device group,
commit your changes, and run the User Activity Report again.
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
Issue ID Description
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
Issue ID Description
Workaround: Remove the referenced zone from the interface
configuration to successfully configure a master key.
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
Issue ID Description
PAN-164618 The VM-Series firewall CLI and system logs display the license
name VM-SERIES-X, while the user interface displays VM-
FLEX-X (in both cases X is the number of vCPUs). In future
releases the user interface will use the VM-SERIES-X format.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
Issue ID Description
Override? and the video tutorial How to Configure an
Application Override Policy on the Palo Alto Networks
Firewall.
Issue ID Description
channel functionality is working by executing the command
debug dataplane pow status. It should now show
multiple channels being utilized.
Issue ID Description
PODamericas Collector Group jobs are still in a Running
state.
Issue ID Description
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
Issue ID Description
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
Issue ID Description
Workaround: Log out and log back in to the Panorama web
interface.
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
Issue ID Description
Private PAN-DB-URL connectivity only supports the
following format: 2001:DB9:85A3:0:0:8A2E:370:2.
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
Issue ID Description
you switch from DPDK packet mode to MMAP packet mode,
the firewall duplicates the ping packets.
Throughput traffic is not duplicated if you deploy the VM-
Series firewall using MMAP packet mode.
Issue ID Description
• Initiate a Commit to Panorama operation followed by a
Push to Devices operation for the modified device group
and template configurations.
• Manually select the devices that belong to the modified
device group and template configurations.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
Issue ID Description
Workaround: Log in to the CLI on the firewall and enter
the following command to unregister the IP address-to-tag
mappings: debug object registered-ip clear all.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
Issue ID Description
card (NIC), the show session info CLI command displays
an inaccurate throughput and packet rate.
Workaround: Disable DPDK by running the set system
setting dpdk-pkt-io off CLI command.
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
Issue ID Description
Issue ID Description
in the Kerberos server profile (Device > Server Profiles >
Kerberos).
Workaround: Replace the FQDN with the IP address in the
Kerberos server profile.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
Issue ID Description
• Configure a worker list on the cluster controller:
admin@wf500(active-controller)# set
deviceconfig cluster mode controller work
er-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
Issue ID Description
Issue ID Description
WIF-707 Fixed an issue where, when connections from the firewall to the cloud
took longer than expected, the connection timed out. With this fix, the
timeout was extended to accommodate slower networks.
PAN-210561 Fixed an issue where the all_task process repeatedly restarted due to
missed heartbeats.
PAN-210331 Fixed an issue where the firewall did not send device telemetry files to
Cortex Data Lake with the error message send the file to CDL
receiver failed.
PAN-210080 Fixed an issue where the useridd process stopped responding when
add and delete member parameters in an incremental sync query were
empty.
PAN-209226 Fixed an issue where the feature bits function reused shared memory,
which resulted in a memory allocation error and caused the dataplane
to go down.
PAN-209036 Fixed an issue where the dataplane restarted, which led to slot failures
occurring and a core file being generated.
PAN-208724 Fixed an issue where port pause frame settings did not work as
expected and incorrect pause frames occurred.
PAN-208343 Fixed an issue where telemetry regions were not visible on Panorama.
PAN-208157 Fixed an issue where malformed hints sent from the firewall caused
the logd process to stop responding on Panorama, which caused a
system reboot into maintenance mode.
Issue ID Description
PAN-208037 Fixed an issue where NAT64 traffic using the reserved prefix
64:ff9b::/96 was incorrectly dropped when strict-ip-check
was enabled under zone protection.
PAN-207940 Fixed an issue where platforms with RAID disk checks were performed
weekly, which caused logs to incorrectly state that RAID was
rebuilding.
PAN-207891 Fixed an issue on Panorama where log migration did not complete
after an upgrade.
PAN-207623 Fixed an issue on Panorama where log migration did not complete as
expected.
PAN-207610 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue
where Log Admin Activity was not visible on the web interface.
PAN-207601 Fixed an issue where URL cloud connections were unable to resolve
the proxy server hostname.
PAN-206858 Fixed an issue where a segmentation fault occurred due to the useridd
process being restarted.
Issue ID Description
PAN-206684 (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only)
Fixed an issue where, after upgrading the firewall from a PAN-OS 10.0
release to a PAN-OS 10.1 release, the firewall did not duplicate logs
to local log collectors or to Cortex Data Lake when a device certificate
was already installed.
PAN-206658 Fixed a timeout issue in the Intel ixgbe driver that resulted in internal
path monitoring failure.
PAN-206251 (PA-7000 Series firewalls with LFCs only) Fixed an issue where the
logrcvr process did not send the system-start SNMP trap during
startup.
PAN-206233 Fixed an issue where the pan_comm process stopped responding when
a content update and a cloud application update occurred at the same
time.
PAN-205877 (PA-5450 firewalls only) Added debug commands for an issue where
a MAC address flap occurred on a neighbor firewall when connecting
both MGT-A and MGT-B interfaces.
PAN-205805 Fixed an issue where Generic routing encapsulation (GRE) traffic was
only allowed in one direction when tunnel content inspection (TCI) was
enabled.
PAN-205729 (PA-3200 Series and PA-7000 Series firewalls only) Fixed an issue
where the CPLD watchdog timeout caused the firewall to reboot
unexpectedly.
PAN-205699 Fixed an issue where the cloud plugin configuration was automatically
deleted from Panorama after a reboot or a configd process restart.
Issue ID Description
PAN-205590 Fixed an issue where the fan tray fault LED light was on even though
no alarm was reported in the system environment.
PAN-205453 Fixed an issue where running reports or queries under a user group
caused the reportd process to stop responding.
PAN-205396 Fixed an issue where SD-WAN adaptive SaaS path monitoring did not
work correctly during a next hop link down failure.
PAN-205260 Fixed an issue where there was an IP address conflict after a reboot
due to a transaction ID collision.
PAN-205222 Fixed an issue where you were unable to add a new application in a
selected policy rule.
PAN-205211 Fixed an issue where the reportd process stopped responding while
querying logs (Monitor > Logs > <logtype>).
PAN-205123 Fixed an issue where the pan_task process stopped responding due to
a timing issue during ECDSA processing.
PAN-205096 Fixed an issue where promoted sessions were not synced with all
cluster members in an HA cluster.
PAN-205030 Fixed an issue where, when a session hit policy based forwarding with
symmetric return enabled was not offloaded, the firewall received
excessive return-mac update messages, which resulted in resource
contention and traffic disruption.
PAN-204892 Fixed an issue on Panorama where the web interface was not
accessible and displayed the error 504 Gateway Not Reachable
due to the mgmtsrvr process not responding.
PAN-204749 Fixed an issue where sudden, large bursts of traffic destined for an
interface that was down caused packet buffers to fill, which stalled
path monitor heartbeat packets.
Issue ID Description
PAN-204582 Fixed an issue where, when a firewall acting as a DHCP client received
a new DHCP IP address, the firewall did not release old DHCP IP
addresses from the IP address stack.
PAN-204581 Fixed an issue where, when accessing a web application via the
GlobalProtect Clientless VPN, the web application landing page
continuously reloaded.
PAN-204575 (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only)
Fixed an issue where the firewall did not forward logs to the log
collector.
PAN-204482 Fixed an issue where searching threat logs (Monitor > Logs > Threat)
using the partial hash parameter did not work, which resulted in
an invalid operator error.
PAN-204456 Fixed an issue related to the logd process that caused high memory
consumption.
PAN-204271 Fixed an issue where the quarantine device list did not display due to
the maximum memory being reached.
PAN-204238 Fixed an issue where, when View Rulebase as Groups was enabled,
the Tags field did not display a scroll down arrow for navigation.
PAN-204216 Fixed an issue where URL categorization failed and the firewall
displayed the URL category as not-resolved for all traffic and
the following error message was displayed in the device server
logs Error(43): A libcurl function was given a bad
argument.
PAN-204118 Fixed an issue where browser sessions stopped responding for device
group template admin users with access domains that had many device
groups or templates.
PAN-203984 Fixed an issue where the logrcvr process restarted after the firewall
was power cycled or rebooted.
PAN-203964 (Firewalls in FIPS-CC mode only) Fixed an issue where the firewall
went into maintenance mode due to downloading a corrupted
software image, which resulted in the error message FIPS-CC
failure. Image File Authentication Error.
Issue ID Description
PAN-203796 Fixed an issue where legitimate syn+ack packets were dropped after
an invalid syn+ack packet was ingressed.
PAN-203453 Fixed an issue on Panorama where the log query failed due to a high
number of User-ID redistribution messages.
PAN-203430 Fixed an issue where, when the User-ID agent had collector
name/secret configured, the configuration was mandatory on clients
on PAN-OS 10.0 and later releases.
PAN-203362 Fixed an issue where the rasmgr process restarted due to a null
reference.
PAN-203330 Fixed an issue where the certificate for an External Dynamic List (EDL)
incorrectly changed from invalid to valid, which caused the EDL file to
be removed.
PAN-203147 (Firewalls in FIPS-CC mode only) Fixed an issue where the firewall
unexpectedly rebooted when downloading a new PAN-OS software
image.
PAN-202918 Fixed an issue where processing route-table entries did not work as
expected.
Issue ID Description
PAN-202722 Fixed an issue where the factor completion time for login events
learned through XML API displayed as 1969/21/31 19:00:00.
PAN-202593 Fixed an issue where expanding Global Find results displayed only the
top level and second level of a searched item.
PAN-202544 An enhancement was made to collect CPLD register data after a path
monitor failure.
PAN-202361 Fixed an issue where packets queued to the pan_task process were still
transmitted when the process was not responding.
PAN-202295 Fixed an issue where read-only superusers were unable to see the
Commit All job status, warnings, or errors for Panorama device groups.
PAN-202282 Fixed an issue where stats dump files did not display all necessary
reports.
PAN-202248 Fixed an issue where, due to a tunnel content inspection (TCI) policy
match, IPSec traffic did not pass through the firewall when NAT was
performed on the traffic.
PAN-202208 Fixed an issue where high CPU was experienced when requests from
the dataplane to the management plane for username and User ID
timed out.
PAN-202194 Fixed an SD-WAN link issue that occurred when Aggregate Ethernet
without a member interface was configured as an SD-WAN interface.
PAN-202140 Fixed an issue where the comm process stopped responding due to an
OOM condition.
Issue ID Description
PAN-202040 (PA-220 firewalls only) Fixed an issue where ECDSA fingerprints were
not displayed.
PAN-202012 A debug command was introduced to control Gzip encoding for the
GlobalProtect Clientless VPN application.
PAN-201954 Fixed an issue where NAT policy rules were deleted on managed
devices after a successful push from Panorama to multiple device
groups. This occurred when NAT policy rules had device_tags selected
in the target section.
PAN-201900 Fixed an internal path monitoring failure issue that caused the
dataplane to go down.
PAN-201701 Fixed an issue where the firewall generated system log alerts if the raid
for a system or log disk was corrupted.
PAN-201639 Fixed an issue with Saas Application Usage reports where Applications
with Risky Characteristics displayed only two applications per section.
PAN-201587 Fixed an issue where the App Pcaps directory size was incorrectly
detected which caused commit errors.
PAN-201580 Fixed an issue where the useridd process stopped responding due to
an invalid vsys_id request.
PAN-201360 Fixed an issue with Panorama managed log collector statistics where
the oldest logs displayed on the primary Panorama appliance and the
secondary Panorama appliance did not match.
PAN-201189 Added the max-kb filter for the show session info CLI command
to troubleshoot instances when the firewall went down due to
software packet buffer depletion.
Issue ID Description
PAN-201136 Fixed an issue where IGMP packets were offloaded with frequent
IGMP Join and Leave messages from the client.
PAN-200822 Fixed an issue where reports were not generated in the docm file type.
PAN-200160 Fixed a memory leak issue on Panorama related to the logd process
that caused an out-of-memory (OOM) condition.
PAN-200095 Fixed an issue where Panorama troubleshooting tests for log collector
connectivity did not return results from log collectors running PAN-OS
10.1 releases.
PAN-200035 Fixed an issue where the firewall reported General TLS Protocol
Error for TLSv1.3 when the firewall closed a TCP connection to the
server via a FIN packet without waiting for the handshake to complete.
PAN-199807 Fixed an issue where the dataplane frequently restarted due to high
memory usage on wifclient.
Issue ID Description
which triggered PBP Alerts. This occurred when the driver name was
not compatible with new DPDK versions.
PAN-199500 Fixed an issue where, when many NAT policy rules were configured,
the pan_comm process stopped responding after a configuration
commit due to a high number of debug messages.
PAN-199410 Fixed an issue where system logs for syslog activities were categorized
as general under Type and EVENT columns.
PAN-199141 Fixed an issue where renaming a device group and then performing
a partial commit led to the device group hierarchy being incorrectly
changed.
PAN-199052 (PA-800 Series firewalls only) Fixed an issue where commit operations
took longer than expected. This fix improves the completion time for
commit operations.
PAN-198889 Fixed an issue where the logd process stopped responding if some
devices in a collector group were on a PAN-OS 10.1 device and others
were on a PAN-OS 10.0 release. This issue affected the devices on a
PAN-OS 10.0 release.
PAN-198575 Fixed an issue where data did not load when filtering by Threat Name
(ACC > Threat Activity).
PAN-198306 Fixed an issue where the useridd process stopped responding when
booting up the firewall.
Issue ID Description
PAN-198187 Fixed an issue where system logs (Monitor > System) did not display
the commit description after performing a commit and push to multiple
device groups from Panorama.
PAN-198174 Fixed an issue where, when viewing traffic or threat logs from the
Application Command Center (ACC) or Monitor tabs, performing a
reverse DNS lookup caused the dnsproxy process to restart if DNS
server settings were not configured.
PAN-197953 Fixed an issue where the logd process stopped responding due
to forwarded threat logs, which caused Panorama to reboot into
maintenance mode.
PAN-197935 Fixed an intermittent issue where XML API IP address tag registration
failed on firewalls in a multi-vsys environment.
PAN-197919 Fixed an issue where, when path monitoring for a static route was
configured with a new Ping Interval value, the value was not used as
intended.
PAN-197872 Fixed an issue where the useridd process generated false positive
critical errors.
PAN-197859 Fixed an issue where firewalls running LSVPN with tunnel monitoring
enabled where, after an upgrade to PAN-OS 9.1.14 or a later PAN-OS
release, LSVPN tunnels flapped.
PAN-197737 Fixed an issue where the connection to the PAN-DB server failed with
following error message: Failed to send req type[3], curl
error: Couldn't resolve host name.
Issue ID Description
PAN-197678 Fixed an issue where the dataplane stopped responding, which caused
internal path monitoring failure.
PAN-197649 Fixed an issue where failure logs for slot restarts caused by internal
path monitoring contained no debug logs.
PAN-197582 Fixed an issue where, after upgrading to PAN-OS 10.1.6, the firewall
reset SSL connections that used policy-based forwarding.
PAN-197383 Fixed an issue where, after upgrading to PAN-OS 10.2 release, the
firewall ran a RAID rebuild for the log disk after ever every reboot.
PAN-197298 Fixed an issue where the audit comment archive for Security rule
changes output had overlapping formats.
PAN-197219 Fixed an issue where the following error message was not sent from
multi-factor authentication PingID and did not display in the browser:
Your company has enhanced its VPN authentication
with PingID. Please install the PingID app for iOS
or Android, and use pairing key:<key>. To connect,
type "ok".
PAN-197121 Fixed an issue where incorrect user details were displayed under the
USER DETAIL drop-down (ACC > Network activity > User activity).
PAN-197097 Fixed an issue where LSVPN did not support IPv6 addresses on the
satellite firewall.
PAN-196895 Fixed a timing issue with updating the cache when upgrading from a
PAN-OS 10.0 release to a PAN-OS 10.1 release.
PAN-196874 Fixed an issue where, when the firewall accepted ICMP redirect
messages on the management interface, the firewall did not clear the
route from the cache.
Issue ID Description
PAN-196840 Fixed an issue where exporting a Security policy rule that contained
Korean language characters to CSV format resulted in the policy
description being in a non-readable format.
PAN-196811 Fixed an issue where logout events without a username caused high
CPU usage.
PAN-196701 Fixed an issue where the firewall did not properly measure the
Panorama connection keepalive timer, which caused a Panorama HA
failover to take longer than expected.
PAN-196566 Fixed an issue where the useridd process restarted repeatedly which
let to an OOM condition.
PAN-196457 Fixed an issue where extraneous logs displayed in the Traffic log when
Security policy settings were changed.
PAN-196452 Fixed an issue where DNS queries failed from source port 4789 with a
NAT configuration.
PAN-196410 Fixed an issue where you were unable to customize the risk value in
Risk-of-app.
PAN-196404 Fixed an issue where the firewall did not forward IPSec decrypted
traffic to a third-party security chain device when the network packet
broker feature was enabled.
Issue ID Description
PAN-196124 Fixed an issue where the log_index process ignored healthy logs and
caused system logs to go missing.
PAN-196050 Fixed an issue on Panorama where logs did not populate when one log
collector in a log collector group was down.
PAN-196001 Fixed an issue where the devsrvr process stopped responding, which
caused FQDN objects to not resolve, and, as a result, caused traffic to
hit the incorrect Security policy rule.
PAN-195869 Fixed an issue where scheduled custom reports based on firewall data
did not display any information.
PAN-195792 Fixed an issue where, when generating a stats dump file for a managed
device from Panorama (Panorama > Support > Stats Dump File), the
file did not display any data.
PAN-195790 Fixed an issue where syslog traffic that was sent from the
management interface to the syslog server even when a destination IP
address service route was configured.
PAN-195689 Fixed an issue where WildFire submission logs did not load on the
firewall web interface.
Issue ID Description
PAN-195526 Fixed an issue where the firewall system log received a large amount
of error messages when attempting a connection between the firewall
and Panorama.
PAN-195254 (PA-7000 Series firewalls only) Fixed an issue where log queries from
an M-Series Panorama appliance or Panorama virtual appliance in
Management Only mode to the firewall failed after updating the
firewall to a PAN-OS 10.1 release.
PAN-195201 Fixed an issue where high volume DNS Security traffic caused the
firewall to reboot.
PAN-195114 Fixed an issue where proxy ARP responded on the wrong interface
when the same subnet was in two virtual routers.
PAN-195064 Fixed an issue where the log collector did not forward correlation logs
to the syslog server.
PAN-194912 Fixed an issue where the CLI command show applications list
did not return any outputs.
PAN-194812 Fixed an issue where generating reports via XML API failed when the
serial number was set as target in the query.
PAN-194744 Fixed an issue with log corruption, which caused te log_index process
to continually restart.
PAN-194737 Fixed an issue where path monitor displayed as deleted when it was
disabled, which caused a preview change in the summary for static
routes.
PAN-194456 Fixed an issue where the sysd process disconnected from the pan_dha
process after an HA failover or reboot.
Issue ID Description
in a Security policy and Share Unused Address and Service Objects
with Devices was unchecked.
PAN-194092 Added a debug command to address an issue where adding a new log
collector to an existing collector group, the ACL was updated for the
new log collector but not the existing ones.
PAN-194068 (PA-5200 Series firewalls only) Fixed an issue where the firewall
unexpectedly rebooted with the log message Heartbeat failed
previously.
PAN-194043 Fixed an issue where Managed Devices > Summary did not reflect
new tag values after an update.
PAN-194031 (PA-220 Firewalls only) Fixed an issue where system log configurations
did not work as expected due to insufficient process timeout after a
logrcvr process restart.
PAN-194025 Fixed an issue where the ikemgr process stopped responding due to a
timing issue, which caused VPN tunnels to go down.
PAN-193928 Fixed an intermittent issue where GlobalProtect logs were not visible
under device groups (Mobile_User_Device_Group).
PAN-193831 Fixed an issue where internal routes were added to the routing table
even after disabling dynamic routing protocols.
PAN-193818 Fixed an issue where the firewall device server failed to resolve URL
cloud FQDNs, which interrupted URL category lookup.
PAN-193808 Fixed a memory leak issue in the mgmtsrvr process that resulted in an
OOM condition.
PAN-193744 (PA-3200 Series firewalls only) Fixed an issue where, when the HA2
HSCI connection was down, the system log displayed Port HA1-b:
down instead of Port HSCI: Down.
PAN-193619 Fixed an issue where air gapped firewalls and Panorama appliances
performed excessive validity checks to updates.paloaltonetworks.com,
which caused software installs to fail.
Issue ID Description
PAN-193558 Fixed an issue where log retention settings Multi Disk did not display
correct values on the firewall web interface when the settings were
configured using a Panorama template or template stack.
PAN-193452 (PA-220 firewalls only) Fixed an issue where the firewall reached the
maximum disk usage capacity repeatedly in one day.
PAN-193396 Fixed an issue where the source user name was displayed in traffic
logs even when Show User Names In Logs and Reports was disabled
for a custom admin role.
PAN-193323 Fixed an issue where root partition utilization reached 100% due to
mdb old logs not being purged as expected.
PAN-193281 Fixed an issue where the logrcvr process stopped responding after a
content update on the firewall.
PAN-193245 Fixed an issue where, when using syslog-ng forwarding via SSL,
with a Base Common Name (CN) and multiple Subject Alternative
Names (SANs) were listed in the certificate.
PAN-193043 Fixed an issue with the where firewalls in Google Cloud Platforms
(GCP) inserted the hostname as PA-VM in the syslog header instead of
the DHCP assigned hostname when logs were being sent to the syslog
server.
PAN-192456 Fixed an issue where GlobalProtect SSL VPN processing during a high
traffic load caused the dataplane to stop responding.
PAN-192431 Fixed an issue where unmanaged tags were set to NULL, which caused
unmanaged devices to match the HIP rule for managed devices.
As a result, you were unable to distinguish between managed and
unmanaged devices.
PAN-192296 Fixed an issue where, when you saved a SaaS application report as
a PDF or sent it to print, the size of contents were shrinked and was
smaller than expected.
PAN-192244 Fixed an issue where scheduled log export jobs continued to run even
after being deleted.
Issue ID Description
PAN-192193 Fixed an issue where exporting a list of managed collectors via the
Panorama web interface failed with the following error message:
Export Error, Error while exporting
PAN-192188 (PA-5450 firewalls only) Fixed an issue where the show running
resource-monitor ingress-backlogs CLI command failed
with the following error message: Server error : Failed to
intepret the DP response.
PAN-191997 Fixed an issue where log queries did not successfully filter the
unknown category.
PAN-191845 Fixed an issue where the firewall used a locally configured DNS server
instead of a DHCP provided one.
PAN-191652 Fixed an issue with Prisma Cloud where a commit push failed due to
the error Error: failed to handle TDB_UPDATE_BLOCK>.
PAN-191463 Fixed an issue where the firewall did not handle packets at Fastpath
when the interface pointer was null.
PAN-191048 Fixed an issue where Panorama did not push the password hash of the
local admin password to managed WildFire appliances.
Issue ID Description
PAN-190963 Fixed an issue on the firewall interface where Log Collector Status >
Device connectivity displayed as error.
PAN-190533 Fixed an issue where addresses and address groups were not displayed
for users in Security admin roles.
PAN-190502 Fixed an issue where the Policy filter and Policy optimizer filter were
required to have the exact same syntax, including nested conditions
with rules that contained more than one tag when filtering via the neq
operator.
PAN-190454 Fixed an issue where, while authenticating, the allow list check failed
for vsys users when a SAML authentication profile was configured
under shared location.
PAN-190266 Fixed an issue that stopped the all_task process to stop responding at
the pan_sdwan_qualify_if_ini function.
PAN-190055 (VM-Series firewalls only) Fixed an issue where the firewall did not
follow the set Jumbo MTU value.
PAN-189960 Fixed an issue on Panorama where you were unable to view the last
address object moved to the shared template list.
PAN-189866 Fixed an issue with the web interface where group include lists used
server profiles instead of LDAP proxy.
PAN-189783 Fixed an issue where container resource limits were not enforced for
all processes when running inside a container.
PAN-189755 Fixed an issue where the snmpd stopped responding which caused
SNMPv3 polling outages.
PAN-189723 Fixed an issue where you were unable to configure dynamic address
groups to use more than 64,000 IP addresses in a Security policy rule.
Issue ID Description
PAN-189718 Fixed an issue where the number of sessions did not reach the
expected maximum value with Security profiles.
PAN-189518 Fixed an issue where incoming DNS packets with looped compression
pointers caused the dnsproxyd process to stop responding.
PAN-189379 Fixed an issue where FQDN based Security policy rules did not match
correctly.
PAN-189335 Fixed an issue where the varrcvr process restarted repeatedly, which
caused the firewall to restart.
PAN-189298 Fixed an issue where existing traffic sessions were not synced after
restarting the active dataplane when it became passive.
PAN-189200 Fixed an issue where sinkholes did not occur for AWS Gateway Load
Balancer dig queries.
PAN-188933 Fixed an issue where the UDP checksum wasn't correctly calculated
for VXLAN traffic after applying NAT.
PAN-188602 Fixed an issue where the all_task process stopped responding, which
caused IPSec tunnels to peers to go down.
Issue ID Description
PAN-188291 Fixed an issue where, when using Global Find on the web interface
to search for a given Hostname Configuration (Device > Setup
> Management), clicking the search result directed you to the
appropriate Hostname configuration, but did not change the
respective Template field automatically.
PAN-188036 Fixed an issue where SIP TCP sequence numbers were calculated
incorrectly when SIP cleartext proxy was disabled.
PAN-188035 (Firewalls and Panorama appliances in FIPS mode only) Fixed an issue
where, even when region lists were disabled, the following error
message was displayed: Unable to retrieve region list
either region list has not been set or data format
is wrong.
PAN-187985 Fixed an issue where you were unable to configure a QoS Profile as
percentage for Clear Text Traffic.
PAN-187761 Fixed an issue where, during HA failover, the now passive firewall
continued to pass traffic after the active firewall had already taken
over.
PAN-187720 Fixed an issue where the firewall did not show master key validity
information after the master key was updated and the firewall was
restarted.
PAN-187476 Fixed an issue where, when HIP redistribution was enabled, Panorama
did not display part of the HIP information.
PAN-187342 Fixed an issue where the Schedules button (Device Deployment >
Dynamic updates) was grayed out for custom role-based admins.
PAN-187279 Fixed an issue where not all quarantined devices were displayed as
expected.
PAN-187096 Fixed an issue where you were unable to sort through Addresses
(Device Group > Objects).
Issue ID Description
PAN-186471 Fixed an issue where, when exporting to CSV in Global Find, the
firewall truncated names of rules that contained over 40 characters.
PAN-186447 Fixed an issue where Health (Panorama > Managed Devices) did not
display environmental tabs and fan and power supply status was not
visible.
PAN-186433 Fixed an intermittent issue where decryption failed for clients sending
TLSv1.3 Client Hello and CCS in two separate packets instead of one.
PAN-186270 Fixed an issue where, when HA was enabled and a dynamic update
schedule was configured, the configd process unexpectedly stopped
responding during configuration commits.
PAN-185928 Fixed an issue where external dynamic list auto refresh did not work
when destination service route was enabled.
PAN-185844 Fixed an issue where Decryption Log entries were associated with the
wrong Security policy rule.
PAN-185611 (PA-850 firewalls only) Fixed an issue where the maximum number of
aggregate interfaces was incorrectly set as 8 instead of 6.
PAN-185591 Fixed an issue where, in multi-vsys systems, some policy rules were
unable to be edited due to the Target field being unclickable.
PAN-185466 Fixed an issue where WildFire submission did not work as expected.
PAN-185394 (PA-7000 Series firewalls only) Fixed an issue where not all changes to
the template were reflected on the firewall.
PAN-185390 Fixed an issue where the Block IP list option was incorrectly displayed
on firewalls where it was not applicable.
PAN-185249 Fixed an issue where Template Stack overrides (Dynamic Updates >
Apps & Threats > Schedule) were not able to be reverted via the web
interface.
Issue ID Description
buffer utilization was displayed as high even when no traffic was
traversing the firewall.
PAN-184766 (PA-5450 firewalls only) Fixed an issue where the control packets for
BGP, OSPF, and Bidirectional Forwarding Detection (BFD) were not
assigned a QoS value of 5.
PAN-184744 Fixed an issue where the firewall did not decrypt SSL traffic due to a
lack of internal resources allocated for decryption.
PAN-184408 Fixed an issue where commits pushed from Panorama to the firewall
failed due to the application status for an application being incorrectly
considered an invalid reference.
PAN-184181 Fixed an ESP encapsulation issue where, when IPv6 address proxy
IDs were configured, encapsulation was handled incorrectly with a
different proxy ID SPI in the same tunnel when the source IP address
of the proxy was overlapped by the destination IP address.
PAN-183981 Fixed an issue on the firewall where, when the GlobalProtect portal
was not configured, the GlobalProtect landing page was still loaded
with the message GlobalProtect portal does not exist.
This issue occurred when using the exact GlobalProtect portal link:
https://x.x.x.x/global-protect/login.esp
PAN-183632 Fixed an issue where the firewall was unable to match HIP objects
with code versions over 4 digits long.
PAN-183524 Fixed an issue where GPRS tunneling protocol (GTPv2-c and GTP-U)
traffic was identified with insufficient-data in the traffic logs.
PAN-183375 Fixed an issue where traffic arriving on a tunnel with a bad IP header
checksum was not dropped.
Issue ID Description
PAN-183287 Fixed an issue where firewall commits failed due to the commit-
recovery connection check ending prematurely.
PAN-183154 Fixed an issue where DNS exception failed when DNS queries
contained a capital letter.
PAN-183126 Fixed an issue on Panorama where you were able to attempt to push
a number of active schedules to the firewall that was greater than the
firewall's maximum capacity.
PAN-182876 Fixed an issue where GlobalProtect connections failed via XML when
special characters (<), (&), and (>) were present in the GlobalProtect
portal configuration passcode.
PAN-182486 Fixed an issue on the web interface where the same IP address was
displayed for sub interfaces in a multi-vsys firewall.
PAN-182449 Fixed an issue where Apple iPad users were unable to authenticate
to the GlobalProtect portal using any browser, which resulted in
Clientless VPN access issues.
PAN-182167 Removed a duplicate save filter Icon in the Audit Comment Archive for
Security Rule Audit Comments tab.
PAN-181684 Fixed an issue where cluster definition for OpenShift was not able to
be added if a custom certificate was used for an API endpoint.
PAN-181376 Fixed an issue where the show session id CLI command displayed
a negative packet count.
Issue ID Description
PAN-181366 Fixed an issue where the firewall sent an incorrect IP address on ICMP
sessions in NetFlow packets when NAT was applied to the target
traffic.
PAN-181334 Fixed an issue where users with custom admin roles and access
domains were unable to view address objects or edit Security rules.
PAN-181324 Fixed a memory issue related to the lpmgrd process that caused the
firewall to enter a non-functional state.
PAN-181034 Fixed an issue where, after changing the Decryption mirroring setting
to Forwarded only in the decryption profile, Panorama did not save
the setting.
PAN-180948 Fixed an issue where an external dynamic list fetch failed with the
error message Unable to fetch external dynamic list.
Couldn't resolve host name. Using old copy for
refresh.
PAN-180030 Fixed an issue where hyperlinks to threatvault for threat logs with
DNS Security categories resulted in the following error message: No
data is found based on your search, please search
for something else.
PAN-179952 Fixed an issue on Panorama where not all categories were displayed
under Log settings.
PAN-179826 Fixed an issue where the firewall incorrectly displayed the license
error IoT Security license is required for feature to
function even when the IoT Security, Does not Require
Data Lake license was installed.
Issue ID Description
PAN-179467 Fixed an issue where Selective Audit (Device > Log settings) options
were visible to a group of admin users if the firewall was not in FIPS-
CC mode.
PAN-179395 Fixed an issue where the firewall still populated the domain map even
after clearing the domain map via the CLI after removing the group-
mapping setting configuration.
PAN-179152 Fixed an issue where partial commit failures did not display an error
message.
PAN-178951 Fixed an issue on the firewall where Agentless User-ID lost parent
Security group information after the Security group name of the
nested groups on Active Directory was changed.
PAN-178802 Increased the default virtual memory limit for the mgmtsrvr process
from 3.2GB to 16GB.
PAN-178800 Fixed an issue where the reportd process stopped responding when
URL Filtering Inline ML phishing logs were queried.
PAN-178728 Fixed an issue where the dcsd process stopped responding when
attempting to read the config to update its redis database.
PAN-178594 Fixed an issue where the descriptions of options under the set
syslogng ssl-conn-validation CLI command were not
accurate.
Issue ID Description
PAN-178363 Fixed an issue where a process (mgmtsrvr) wasn't restarted after the
virtual memory limit was exceeded.
PAN-178354 Fixed an issue where the error message You do not have
permission to reboot device was incorrectly displayed to a
TACAC user when attempting to install PAN-OS.
PAN-178349 Fixed an issue where log forwarding did not work when the filter size
was more than 1,024 characters in the log forwarding profile.
PAN-178248 Fixed an issue where, when exporting the Applications list on PDF or
CSV profile formats, the report displayed all tag values as undefined.
PAN-178186 Fixed a commit issue where, when replacing an old firewall with a new
firewall using the serial number, the change to the serial number was
not reflected in the Security policy rule.
PAN-177942 Fixed an issue where, when grouping HA peers, access domains that
were configured using multi-vsys firewalls deselected devices or
virtual systems that were in other configured access domains.
PAN-177939 Fixed an issue where a certificate without a private key was able to be
added to an SSL/TLS Service Profile, which caused the l3svc process to
stop responding.
PAN-177908 Fixed an issue where you were unable to configure region for source
or destination IP addresses in a Security policy rule.
PAN-177853 Fixed an issue where the logd process on Panorama and the logrcvr
process on the firewall stopped responding when a log forwarding
profile had a filter that included the field sender and subject.
PAN-177562 Fixed an issue where PDF reports were not translated to the
configured local language.
Issue ID Description
rule was still pushed to the firewall. With this fix, Panorama will show
a validation error when attempting to push a pre-defined external
dynamic list to a firewall on a PAN-OS 8.1 release.
PAN-176989 Fixed an issue where the CLI command to show SD-WAN tunnel
members caused the firewall to stop responding.
PAN-176379 Fixed an issue where, when multiple routers were configured under a
Panorama template, you were only able to select its own virtual router
for next hop.
PAN-175709 Fixed an issue where the dnsproxy process stopped responding when
a DNS signature lookup request was received before the process was
fully initialized.
PAN-175121 Fixed a rare issue where, when two nodes started IKE_SA negotiations
at the same time, which resulted in duplicate IKE SAs.
PAN-175069 Fixed an issue where commits failed when the IPv6 link-local address
was configured for BGP peering as local and peer address.
PAN-175061 Fixed an issue where filtering threat logs using any value under
THREAT ID/NAME displayed the error Invalid term.
PAN-174988 (PA-220 Series firewalls only) Fixed an issue where the runtime-
state parameter was missing in the CLI command request high-
availability sync-to-remote.
Issue ID Description
PAN-174953 Fixed an issue where the firewall didn't update URL categories from
the management plane to the dataplane cache.
PAN-174781 Fixed an issue where the firewall did not send an SMTP 541 error
message to the email client after detecting a malicious file attachment.
PAN-174592 Fixed an issue where the firewall did not check reserved fields
in GTPv1 and GTPv2 headers as expected from the latest 3GPP
Specifications.
PAN-174480 Fixed an issue where scheduled email reports were blocked by open-
source content filters due to a violation of rfc2046.
PAN-174462 Fixed an issue where the configd process stopped responding when
creating Application filters with tags and adding the filter to a Security
policy rule.
PAN-174102 Fixed an issue where, when MLAV feature found malicious content,
no action was applied even though it had increased the execution
counters, displayed the score and verdict in the log, and showed no
allow list hits,
PAN-174064 Fixed an issue where downloading a GlobalProtect data file did not
work and displayed a no global protect license error even
when a valid license was present.
Issue ID Description
PAN-173810 Fixed an issue where the debug user-id dump ts-agent user-
ids CLI command caused the useridd process to stop responding.
PAN-173437 Fixed an issue where the firewall did not detect that the management
port was down the first time after booting up the system.
PAN-173207 Fixed an issue where radius authentication timed out when logging in
due to the firewall sending authentication requests using a static IP
address instead of a DCHP assigned IP address.
PAN-173080 Fixed an issue where the User-ID connection limit was reached even
when only a few User-ID agents were connected to the service.
PAN-173031 Fixed an issue where users were promted twice for DUO SAML
Authentication when authentication override cookies were enabled.
PAN-172823 Fixed an issue where MD5 checksums were updated before the new
customer EDLs were pushed to the dataplane.
PAN-172780 Fixed an issue where user domain override was not reset when
deleted from group mapping.
PAN-172753 (PA-7000 Series firewalls only) Fixed an issue where link-local internal
packet handling between the management plane and the dataplane
caused an Network Processing Card (NPC) slot to go down.
PAN-172452 Fixed an issue where the log file did not include all logs.
PAN-172308 Fixed an issue where generating packet captures did not work when
the data filtering profile was configured to block HTML files via a
POST request.
PAN-172100 Fixed an issue with URL filtering where, after upgrading to a PAN-OS
9.1 release, the Continue button on a URL did not work and caused
the website to be inaccessible, even though the predefined category
of URL was configured to continue traffic. This occurred when URL
traffic hit a rule where the custom category was set to None.
Issue ID Description
PAN-171927 Fixed an issue where incorrect results were displayed when filtering
logs in the Monitor tab.
PAN-171569 Fixed an issue where HIP matches were not recognized in an SSL
decryption policy rule.
PAN-171337 Fixed an issue where connection per second (CPS) rates collected via
SNMP were not correct.
PAN-170989 Fixed an issue with memory usage consumption related to the useridd
process.
PAN-170936 Fixed an issue where the firewall egressed offloaded frames out of
order after an explicit commit (Commit on the firewall or Commit All
Changes on Panorama) or an implicit comment such as an Antivirus
update, Dynamic Update, or WildFire update.
Note This issue persists for a network-related configuration and
commit.
PAN-170798 Fixed an issue where OSPF flaps occurred when a Layer 3 interface
IPv4 was changed from DHCP Client to Static.
PAN-170531 Fixed an issue where the web interface icons for service objects and
service group objects were identical when used in a NAT policy rule.
PAN-169899 Fixed an issue on firewalls with offload processors where the ECMP
forced symmetric return feature didn't work for CRE traffic after the
session was offloaded.
PAN-169674 (Firewalls with Cavium Octeon processors only) Fixed an issue where
the all_pktproc process stopped responding when reassembling TCP
packets.
Issue ID Description
PAN-169308 Fixed a commit issue when comparing numbers of rules where the
bucket size of the application dependency hash table was too small.
PAN-169122 Fixed an issue where medium priority correlation events were not
generated when the irc-base repeat count value was greater than
10.
PAN-168480 Fixed an issue where the firewall did not switch to STP for multicast
groups when IGMP receivers were stopped and restarted for the same
set of groups within a short time period.
PAN-167087 Fixed an issue where the focus was not set on the free text field when
requesting a token code on the Authentication Portal.
PAN-166686 Fixed an issue where EDNS responses dropped when the original
request was DNS.
PAN-165951 (PA-3020 firewalls only) Fixed an issue on the firewall where disk
space was not cleared when multiple image files were present.
PAN-163713 Fixed an issue where the alternate name was not getting copied to
user-Fixed an issue where user-attributes for users in custom
groups were incorrect, which caused username formats to not match
the user.
PAN-163043 Fixed an issue where, when exporting logs via the CLI, only 65,535
rows were exported even when 1,000,000 rows were configured.
Issue ID Description
HA peer when you installed a content updated and enabled Sync to
HA peer.
PAN-157710 Fixed an issue where admin users with custom roles were unable to
create VLANs.
PAN-157199 (PA-220 firewalls only) Fixed an issue where the GlobalProtect portal
was not reachable with IPv6 addresses.
PAN-156700 Fixed an issue where DNS Security logs did not display threat names
or IDs when the domain name contained an uppercase letter.
PAN-155902 Fixed an issue where the auto MTU value was incorrect, which caused
unexpected latency issues for GlobalProtect users.
PAN-155467 (VM-Series firewalls only) Fixed an issue where IPSec decap dropped
packets when NAT was configured locally on the firewall.
PAN-154892 Fixed an issue on the firewall where Real Time Streaming Protocol
(RTSP) flows that were subjected to Dynamic IP and Port (DIPP) NAT
were not supported by the Application Layer Gateway (ALG).
PAN-153308 Fixed an issue which caused the mouse cursor to remove focus from
the search bar when hovering over a hyperlink inside of a cell menu
(e.g., source zone, source address, destination zone, destination
address, etc.).
PAN-151273 Fixed an issue where the commit event was not recorded in the config
logs during a Commit and Push on the Panorama management server.
PAN-123446 Fixed an issue where an administrator with a Superuser role could not
reset administrator credentials.
PAN-78762 Fixed an issue where you were unable to reset a VPN tunnel via the
firewall web interface (Network > IPSec Tunnels > Tunnel Info >
Restart).
PAN-OS Release Notes 10.1.9-h1 100 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.8.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
101
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 102 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-198174 When viewing traffic or threat logs from the firewall ACC
or Monitor, performing a reverse DNS lookup, for example,
when resolving IP addresses to domain names using the
Resolve Hostname feature, can cause the appliance to crash
and restart if DNS server settings have not been configured.
PAN-OS Release Notes 10.1.9-h1 103 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Workaround: Provide a DNS server setting for the firewall
(Device > DNS Setup > Services). If you cannot reference a
valid DNS server, you can add a dummy address.
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
This issue is now resolved. See
PAN-OS 10.1.9 Addressed
Issues.
PAN-OS Release Notes 10.1.9-h1 104 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 105 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Managed Devices > Summary) after a bootstrapped firewall is
successfully added to Panorama.
Workaround: After the bootstrapped firewall is successfully
added to Panorama, log in to the Panorama web interface and
select Commit > Push to Devices.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-OS Release Notes 10.1.9-h1 106 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-OS Release Notes 10.1.9-h1 107 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-OS Release Notes 10.1.9-h1 108 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-164618 The VM-Series firewall CLI and system logs display the license
name VM-SERIES-X, while the user interface displays VM-
FLEX-X (in both cases X is the number of vCPUs). In future
releases the user interface will use the VM-SERIES-X format.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
PAN-OS Release Notes 10.1.9-h1 109 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 110 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
not removed and cause commit errors for the downgraded
firewall if you do not uninstall the Enterprise DLP plugin
before downgrade.
Workaround: After you successfully downgrade a managed
firewall to PAN-OS 9.1, commit and push from Panorama to
remove the Enterprise DLP filtering settings and complete the
downgrade.
1. Downgrade your managed firewall to PAN-OS 9.1
2. Log in to the firewall web interface and view the Tasks
to verify all auto commits related to the downgrade have
completed successfully.
3. Log in to the Panorama web interface and Commit >
Commit and Push to your managed firewall downgraded to
PAN-OS 9.1.
PAN-OS Release Notes 10.1.9-h1 111 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Workaround: Use the CLI to update the combination
signature.
PAN-OS Release Notes 10.1.9-h1 112 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 113 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 114 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Workaround: When modifying the original subnet IP, or
adding a new subnet, push the template configuration
changes to your managed firewalls and Force Template
Values (Commit > Push to Devices > Edit Selections).
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-OS Release Notes 10.1.9-h1 115 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Groups) and duplicate services in service groups (Objects >
Service Groups) when created from the CLI.
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-OS Release Notes 10.1.9-h1 116 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Workaround: Update the PAN-DB-URL IP address on the
firewall using one of the methods below.
• Modify the PAN-DB Server IP address on the managed
firewall.
1. On the web interface, delete the PAN-DB Server IP
address (Device > Setup > Content ID > URL Filtering
settings).
2. Commit your changes.
3. Add the new M-500 Eth1/1 IP PAN-DB IP address.
4. Commit your changes.
• Restart the firewall (devsrvr) process.
1. Log in to the firewall CLI.
2. Restart the devsrvr process: debug software
restart process device-server
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 117 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
configure DDNS on an existing interface and then create a
new Certificate Profile, we also recommend that you choose
the Shared location instead of a specific virtual system.
Alternatively, you can select a preexisting certificate profile
instead of creating a new one.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-OS Release Notes 10.1.9-h1 118 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
PAN-OS Release Notes 10.1.9-h1 119 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 120 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 121 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Use the Task Manager to verify that you are not performing
memory intensive tasks such as installing dynamic updates,
committing changes or generating reports, at the same time,
on the firewall.
PAN-OS Release Notes 10.1.9-h1 122 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
use Panorama to configure the worker node as a controller
node by adding the HA and cluster controller configurations,
configure an existing controller node as a worker node by
removing the HA configuration, and then commit and push
the configuration. Attempts to change cluster node roles from
Panorama results in a validation error—the commit fails and
the cluster becomes unresponsive.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller work
er-list <worker-ip-address>
PAN-OS Release Notes 10.1.9-h1 123 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Panorama. The service advertisement can advertise that
DNS is or is not enabled.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 124 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
Workaround: To generate an on-demand report, click Run
Now when you configure the custom report.
PAN-OS Release Notes 10.1.9-h1 125 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
PAN-208724 Fixed an issue where port pause frame settings did not work as
expected and incorrect pause frames occurred.
PAN-206658 Fixed a timeout issue in the Intel ixgbe driver that resulted in internal
path monitoring failure.
PAN-206251 (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only)
Fixed an issue where the logrcvr process did not send the system-
start SNMP trap during startup.
PAN-205735 Fixed an issue where the mgmtsrvr process stopped responding, which
caused the Panorama web interface to become inaccessible and return
a 504 Gateway Not Reachable page.
PAN-205030 Fixed an issue where, when a session hit policy based forwarding with
symmetric return enabled was not offloaded, the firewall received
excessive return-mac update messages, which resulted in resource
contention and traffic disruption.
PAN-203653 Fixed an issue where dynamic updates were completed even when
configuration commits failed, which caused the all_task process to stop
responding.
PAN-203453 Fixed an issue on Panorama where the log query failed due to a high
number of User-ID redistribution messages.
PAN-202783 (PA-7000 Series firewalls with 100G NPC (Network Processing Cards)
only) Fixed an issue where sudden, large bursts of traffic destined for
PAN-OS Release Notes 10.1.9-h1 126 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
an interface that was down caused packet buffers to fill, which stalled
path monitor heartbeat packets.
PAN-202544 An enhancement was made to collect CPLD register data after a path
monitor failure.
PAN-202535 Fixed an issue where the Device Telemetry configuration for a region
was unable to be set or edited via the web interface.
PAN-202361 Fixed an issue where packets queued to the pan_task process were still
transmitted when the process was not responding.
PAN-202012 A debug command was introduced to control Gzip encoding for the
GlobalProtect Clientless VPN application.
PAN-201900 Fixed an internal path monitoring failure issue that caused the
dataplane to go down.
PAN-197582 Fixed an issue where, after upgrading to PAN-OS 10.1.6, the firewall
reset SSL connections that used policy-based forwarding.
PAN-196261 Fixed an issue where inter-lc disconnected once every minute in the
system logs.
PAN-194704 Fixed an issue with SIP ALG where improper NAT was applied when
Destination NAT ran out of IP addresses.
PAN-194068 (PA-5200 Series firewalls only) Fixed an issue where the firewall
unexpectedly rebooted with the log message Heartbeat failed
previously.
PAN-OS Release Notes 10.1.9-h1 127 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-193928 Fixed an intermittent issue where GlobalProtect logs were not visible
under device groups (Mobile_User_Device_Group).
PAN-192456 Fixed an issue where GlobalProtect SSL VPN processing during a high
traffic load caused the dataplane to stop responding.
PAN-191408 Fixed an issue where the firewall did not correctly receive dynamic
address group information from Panorama after a reboot or initial
connection.
PAN-184766 (PA-5450 firewalls only) Fixed an issue where the control packets for
BGP, OSPF, and Bidirectional Forwarding Detection (BFD) were not
assigned a QoS value of 5.
PAN-183757 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue
where uneven distribution of sessions caused packet latency.
PAN-172452 Fixed an issue where the log file did not include all logs.
PAN-171143 Fixed an issue where tech support files didn't collected DP3 logs.
PAN-167288 Fixed an issue with the pan_task process that caused the queue to
build up.
PAN-OS Release Notes 10.1.9-h1 128 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
PAN-204830 Fixed an issue where logging in via the web interface or CLI did not
work until an auto-commit was complete.
PAN-203598 Fixed an issue where, when tunnel content inspection was enabled for
VXLAN, ARP over VXLAN packets were dropped.
PAN-201818 Fixed an issue where INIT SCTP packets were dropped after being
processed by the CTD, and silent drops occurred even with SCTP no-
drop function enabled.
PAN-201357 The CLI command debug dataplane set pow no-desched yes
was added to address an issue where the all_pktproc process stopped
responding and caused traffic issues.
PAN-199570 Fixed an issue where uploading certificates using a custom admin role
did not work as expected after a context switch.
PAN-199099 Fixed an issue where, when decryption was enabled, Safari and Google
Chrome browsers on Apple Mac computers rejected the server
certificate created by the firewall because the Authority Key Identifier
was copied from the original server certificate and did not match the
Subject Key Identifier on the forward trust certificate.
PAN-198266 Fixed an issue where, when predicts for UDP packets were created,
a configuration change occurred that triggered a new policy lookup,
which caused the dataplane stopped responding when converting the
predict. This resulted in a dataplane restart.
PAN-OS Release Notes 10.1.9-h1 129 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-197386 Fixed an issue where traffic that was subject to network packet broker
inspection entered a looping state due to incorrect session offload.
PAN-196583 Fixed an issue where the Cisco TrustSEc plugin triggered a flood of
redundant register/unregister messages due to a failed IP address tag
database search.
PAN-196558 Fixed an issue where IP address tag policy updates were delayed.
PAN-196131 Fixed an issue where the comm process stopped responding when a
show command was executed in two sessions.
PAN-195107 (PA-7000s Series firewalls with LFCs only) Fixed an issue where the IP
address of the LFC displayed as unknown.
PAN-194615 Fixed an issue where the packet broker session timeout value did not
match the master sessions timeout value after the firewall received a
TCP FIN or RST packet. The fix ensures that Broker session times out
within 1 second after the master session timed out.
PAN-194441 Fixed an issue where the dataplane CPU usage was higher than
expected due to packet looping in the broker session when the
network packet broker was enabled.
PAN-189429 Fixed a memory leak that occurred when enabling XFF (x-forwarded-
for) logging in a Security policy.
PAN-189270 Fixed an issue that caused a memory leak on the reportd process.
PAN-188118 Fixed an issue with firewalls in FIPS mode that prevented device
telemetry from connecting.
PAN-OS Release Notes 10.1.9-h1 130 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
Issue ID Description
PAN-180039 Fixed an issue in 10.0.9, where executing the CLI command show
transceiver-detail all resulted in the following error message:
An error occurred. See dagger.log for information..
PAN-178613 (PA-400 Series firewalls only) Fixed an issue where multiple restarts
related to the all_task process occurred.
PAN-OS Release Notes 10.1.9-h1 131 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.8 Known and Addressed Issues
PAN-OS Release Notes 10.1.9-h1 132 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.7.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
133
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 134 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-OS Release Notes 10.1.9-h1 135 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See because the Authority Key Identifier (AKID) of the server
PAN-OS 10.1.8 Addressed certificates and the Subject Key Identifier (SKID) of the
Issues. forward trust certificate do not match.
Workaround: Use a forward trust certificate that does not
contain AKID or SKID extensions.
PAN-198174 When viewing traffic or threat logs from the firewall ACC
or Monitor, performing a reverse DNS lookup, for example,
when resolving IP addresses to domain names using the
Resolve Hostname feature, can cause the appliance to crash
and restart if DNS server settings have not been configured.
Workaround: Provide a DNS server setting for the firewall
(Device > DNS Setup > Services). If you cannot reference a
valid DNS server, you can add a dummy address.
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
This issue is now resolved. See
PAN-OS 10.1.9 Addressed
Issues.
PAN-OS Release Notes 10.1.9-h1 136 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 137 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
2. In the same browser you are logged into the Panorama
web interface, enter the following URL.
https://<panorama_ip>/debug
3. Uncheck (disable) Debug or Clear Debug.
4. (HA configuration) Repeat this step on each Panorama high
availability (HA) peer if Panorama is in a HA configuration.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.1.9-h1 138 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-OS Release Notes 10.1.9-h1 139 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
Workaround: Use the debug user-id clear domain-
map command to remove the existing group mappings from
the firewall.
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
PAN-OS Release Notes 10.1.9-h1 140 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
Workaround: Re-run the opof stats command after the
offload completes.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-164618 The VM-Series firewall CLI and system logs display the license
name VM-SERIES-X, while the user interface displays VM-
FLEX-X (in both cases X is the number of vCPUs). In future
releases the user interface will use the VM-SERIES-X format.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-OS Release Notes 10.1.9-h1 141 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 142 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-OS version 9.0 can inspect both inner and
outer VXLAN flows. If you want to inspect inner
flows, you must define a tunnel content inspection
(TCI) policy.
PAN-OS Release Notes 10.1.9-h1 143 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 144 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
PAN-OS Release Notes 10.1.9-h1 145 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 146 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
Workaround: Commit the Panorama configuration after the
CN-MGMT pod successfully registers with Panorama.
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-OS Release Notes 10.1.9-h1 147 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-OS Release Notes 10.1.9-h1 148 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 149 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
Throughput traffic is not duplicated if you deploy the VM-
Series firewall using MMAP packet mode.
PAN-OS Release Notes 10.1.9-h1 150 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
• Manually select the devices that belong to the modified
device group and template configurations.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-OS Release Notes 10.1.9-h1 151 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 152 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
Workaround: Disable DPDK by running the set system
setting dpdk-pkt-io off CLI command.
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 153 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
• Switch to the firewall Context on the Panorama
management server.
• Commit changes when a dynamic update is being installed.
• Generate a custom report when a dynamic update is being
installed.
• Generate custom reports during a commit.
Workaround: When the firewall performs slowly, or you see
a critical System log for memory utilization, wait for 5 minutes
and then manually reboot the firewall.
Use the Task Manager to verify that you are not performing
memory intensive tasks such as installing dynamic updates,
committing changes or generating reports, at the same time,
on the firewall.
PAN-OS Release Notes 10.1.9-h1 154 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
PAN-OS Release Notes 10.1.9-h1 155 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
deviceconfig cluster mode controller work
er-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 156 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 157 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
PAN-200771 Fixed an issue where syslog-ng was unable to start due to a design
change in the syslog configuration file.
PAN-199654 Fixed an issue where ACC reports did not work for custom RBAC
users when more than 12 access domains were associated with the
username.
PAN-199311 Fixed an issue where the Log Forwarding Card (LFC) failed to forward
logs to the syslog server.
PAN-198509 Fixed an issue where commits failed due to insufficient CFG memory.
PAN-198244 Fixed an issue where using the load config partial CLI
command to x-paths removed address object entries from address
groups.
PAN-197484 (PA-5400 Series firewalls) Fixed an issue where the firewall forwarded
packets to the incorrect aggregate ethernet interface when Policy
Based Forwarding (PBF) was used.
PAN-197244 Fixed an issue on firewalls with Forward Proxy enabled where the
all_pktproc process stopped responding due to missed heartbeats.
PAN-196953 (PA-5450 firewalls only) Fixed an issue where jumbo frames were
dropped.
PAN-196445 Fixed an issue where restarting the NPC or the Data Processing Card
(DPC) did not bring up all the network interfaces.
PAN-196227 Fixed an issue where the logd process stopped responding, which
caused Panorama to reboot into maintenance mode.
PAN-196005 (PA-3200 Series, PA-5200 Series, and PA-5400 Series firewalls only)
Fixed an issue where GlobalProtect IPSec tunnels disconnected at half
the inactivity logout timer value.
PAN-OS Release Notes 10.1.9-h1 158 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-195628 Fixed an issue that caused the pan_task process to miss heartbeats and
stop responding.
PAN-195625 Fixed an issue where authd frequently created SSL sessions, which
resulted in an out-of-memory (OOM) condition.
PAN-195223 Fixed an issue where the all_pktproc process restarted when receiving
a GTPv2 Modify Bearer Request packet if the Serving GPRS Support
Node (SGSN) used the same key as the Serving Gateway (SGW).
PAN-194958 Fixed an issue where using the show routing protocol bgp
loc-rib-detail CLI command caused the CLI to stop responding.
PAN-194826 (WF-500 and WF-500-B appliances only) Fixed an issue where log
system forwarding did not work over a TLS connection.
PAN-194601 Fixed an issue that caused the all_task process to stop responding.
PAN-194472 A CLI command was added to address an issue where packets were
discarded due to the QoS queue limit being reached. This command
enables you to modify the QoS queue size to accommodate more
users.
PAN-194408 Fixed an issue where, when policy rules had the apps that implicitly
depended on web browsing configured with the service application
default, traffic did not match the rule correctly.
PAN-OS Release Notes 10.1.9-h1 159 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-194406 Fixed an issue where the MTU from SD-WAN interfaces was
recalculated after a configuration push from Panorama or a local
commit, which caused traffic disruption.
PAN-193765 Fixed an issue where commits failed the following error displayed in
the configd log: Unable to populate ids into candidate
config: Error: Error populating id for ‘sg2+DMZ to
FirstAM Scanner-1‘.
PAN-193763 Fixed an issue on the firewall where the dataplane CPU spiked, which
caused traffic to be affected during commits or content updates.
PAN-193707 Fixed an issue where SAML authentication failed during commits with
the following error message: revocation status could not be
verified (reason: ).
PAN-193483 (VM-Series firewalls only) Fixed an issue where, during Layer-7 packet
inspection where traffic was being inspected for threat signature and
data patterns, multiple processes stopped responding.
PAN-193392 Fixed an issue where RTP packets dropped due to conflicting duplicate
flows.
PAN-193175 Fixed an issue where PBP Drops (8507) threat logs were
incorrectly logged as SCTP Init Flood (8506).
PAN-193132 (PA-220 firewalls only) Fixed an issue where a commit and push from
Panorama caused high dataplane CPU utilization.
PAN-192944 Fixed an issue where the logrcvr process caused an OOM condition.
PAN-192758 (PA-7000 Series firewalls only) Fixed an issue where files failed to
upload to the WildFire public cloud.
PAN-192726 Fixed an issue where the firewall dropped TCP traffic inside IPSec
tunnels.
PAN-192725 Fixed an issue where the firewall failed to forward logs to Panorama
when configured with IPv6 addressing only.
PAN-OS Release Notes 10.1.9-h1 160 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-192551 (PA-5400 Series firewalls only) Fixed an issue where the firewall
incorrectly processed path monitoring packets, which caused a slot
restart.
PAN-192404 Fixed an issue where ARP broadcasts occurring in the same time
interval and network segment as HA path monitoring pings triggered
an ARP cache request, which prevented the firewall from sending
ICMP echo requests to the monitored destination IP address and
caused an HA path monitoring failover.
PAN-192089 Fixed an issue on the web interface where the IPSec tunnel did not
gray out after disabling it.
PAN-191847 Fixed an issue where the Panorama appliance was unable to generate
scheduled custom reports due to the large number of files stored in
the opt/pancfg/mgmt/custom-reports directory.
PAN-191726 Fixed an issue where an SCP export of the device state from the
firewall added single quotes ( ' ) to the filename.
PAN-191558 Fixed an issue where, after an upgrade to PAN-OS 10.1.5, Global Find
did not display all results related to a searched item.
PAN-191381 Fixed an issue where multicast packets were dropped due to a large
timeout value in the multicast FIB.
PAN-191288 Fixed an issue where the firewall restarted due to a dnsproxy process
crash.
PAN-191269 Fixed an issue where the NAT pool leaked for passive mode FTP
predict sessions.
PAN-191218 (PA-5400 Series firewalls only) Fixed an issue where the session log
storage quota could not be changed via the web interface.
PAN-191163 Fixed an issue where the logrcvr process stopped responding when
processing threat logs with HTTP2 and data capture flagged.
PAN-OS Release Notes 10.1.9-h1 161 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-191022 Fixed an issue where a full routing table caused many dataplane
messages, which resulted in packet buffer congestion and packet
drops.
PAN-190811 (PA-5450 firewalls only) Fixed an issue where logs were forwarded
through the management interface instead of the configured log
interface to be used for forwarding.
PAN-190493 Fixed an issue where decrypted VLAN traffic on Virtual Wire (V-Wire)
changed to VLAN ID 0.
PAN-190492 Fixed an issue where the Panorama log collector group level SSH
settings were not migrated to the new format when upgrading from a
PAN-OS 9.1 release to a PAN-OS 10.0 release.
PAN-190448 Fixed an issue in ACC reports where IPv6 addresses were displayed
instead of IPv4 addresses.
PAN-190292 Fixed an issue where you could not configure a log interface as a
service route Device > Setup > Services > Service Route
PAN-189762 Fixed an issue where a predict session didn't match with the traffic
when both source NAT and destination NAT were enabled.
PAN-189414 Fixed an issue where TCP packets were dropped during the first zone
transfer when DNS security was enabled.
PAN-189304 Fixed an issue where the Panorama appliance didn't display logs or
generate reports for a device group containing MIPs platform that
forwarded logs to Cortex Data Lake.
PAN-OS Release Notes 10.1.9-h1 162 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-189225 Fixed an issue where BGP routes were lost or uninstalled after
disabling jumbo frames on the firewall.
PAN-189206 Fixed an issue where Device Group and Template administrator roles
didn't support a context switch between the Panorama and firewall
web interfaces.
PAN-189114 Fixed an issue where the dataplane went down, which caused an HA
failover.
PAN-188867 Fixed an issue where the firewall dropped packets when the session
payload was too large.
PAN-188338 Fixed an issue where canceling a commit caused the commit process
to remain at 70% and the firewall had to be rebooted.
PAN-187890 Fixed an issue where the Cortex Data Lake connection incorrectly
displayed as disconnected when a service route was in use.
PAN-187755 Fixed an issue where the maximum session timeout was not applied to
the administrator as expected.
PAN-186995 Fixed an issue where the command to show IP address tags for
Dynamic Address Groups displayed the error start-point should
be equal to or between 1 and 100000 even when the
maximum registered IP address limit was greater than 100,000. With
this fix, the show command will display IP address tags up to the
correct maximum limit.
PAN-186957 Fixed an issue where, in SAML Metadata Export, a drop-down did not
appear in the input field when IP or Hostname was selected for Type.
PAN-OS Release Notes 10.1.9-h1 163 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-186807 Fixed an issue where RAID rebuild occurred after a reboot due to the
RAID array not being populated during the firewall bootup.
PAN-186658 Fixed an issue where Panorama console sessions were not cleared on
the firewall after the idle-timeout value expired.
PAN-186584 Fixed an issue where SNMPv3 CPU use didn't match the firewall
output for show running resource-monitor on single dataplane
firewalls.
PAN-186075 (VM-Series firewalls only) Fixed an issue where the firewall rebooted
after receiving large packets while in DPDK mode on Azure virtual
machines running CX4 (MLx5) drivers.
PAN-185789 Fixed an issue where the show ntp CLI command resulted in a
Rejected status for NTP servers that used auto-key authentication.
PAN-185787 Fixed an issue where logging in to the Panorama web interface did not
work and the following error message displayed: Timed out while
getting config lock. Please try again.
PAN-184702 (M-700 appliances in Log Collector mode only) Fixed an issue on the
Panorama management server where the Panorama appliance failed to
connect to Panorama when added as a managed log collector.
PAN-OS Release Notes 10.1.9-h1 164 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-184342 Fixed an issue where the firewall dropped the second TCP packet as
non-syn TCP if it was SYN/ACK/PSH due to the incorrect expectation
that the second packet would be SYN/ACK.
PAN-184068 (PA-5200 series firewalls only) Fixed an issue where the firewall
generated pause frames, which caused network latency.
PAN-183949 Fixed an issue on the firewall where a script to send XML API queries
to update the block list caused the sslmgr process to restart.
PAN-183826 Fixed an issue where, after clicking WildFire Analysis Report, the web
interface failed to display the report with the following error message:
refused to connect.
PAN-183664 (VM-Series firewalls only) Fixed an issue where set core operations
failed during Software NGFW FLEX licensing.
PAN-183603 (M-200 and M-600 appliances in Log Collector mode only) Fixed
a disk issue that occurred after an upgrade to PAN-OS 10.2 which
prevented the ElasticSearch process from starting, which resulted in
the dedicated log collector being unable to write new logs to logging
disks.
PAN-183166 Fixed an issue where system, configuration, and alarm logs were
queued up on the logrcvr process and were not forwarded out or
written to disk until an autocommit was passed.
PAN-182951 Fixed an issue where commits remained at 98% for an hour and then
failed.
PAN-OS Release Notes 10.1.9-h1 165 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-180863 Fixed an issue where the authentication key was mandatory on the
firewall to remove Panorama server details.
PAN-179750 A CLI command was added to set the virtual memory limit in dedicated
log collectors.
PAN-179543 Fixed an issue where the flow_mgmt process stopped responding when
attempting to clear the session table, which caused the dataplane to
restart.
PAN-179295 Fixed an issue where report generation did not work as expected
due to missed parameters being passed during inter-daemon
communication.
PAN-178243 Fixed an issue where Shared Gateway was not visible in the Virtual
System drop down when configuring a Layer3 aggregate subinterface.
PAN-178194 Fixed an issue with the web interface where, when only the Advanced
URL Filtering license was activated, the message License required
for URL filtering to function was incorrectly displayed and
the URL Filtering Profile > Inline ML section was disabled.
PAN-177861 Fixed an issue with User ID redistribution where a system log with
severity of High was generated each time a commit was performed.
This issue occurred due to all UIA agent connections being reset after
each commit.
PAN-177482 Fixed an issue where ACC > App Scope > Threat Monitor showed NO
DATA TO DISPLAY.
PAN-176703 Fixed an issue that occurred after upgrading to a PAN-OS 9.0 or later
release where commits to the firewall configuration failed with the
following error message: statistics-service is invalid.
PAN-175236 Fixed an issue in the template stack where you were unable to add
routes under GlobalProtect > Gateway > Satellite > Network Settings.
PAN-OS Release Notes 10.1.9-h1 166 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-174489 Fixed a source user mismatch issue that occurred when the same
name was set as the actual domain for the overriding domain.
PAN-172834 Fixed a memory leak issue related to the useridd process that occurred
when processing IP-address-to-username mappings.
PAN-172501 Fixed an issue where you were unable to revert HA mode settings to
the default values from the web interface.
PAN-171714 Fixed an issue where, when NetBIOS format (domain\user) was used
for the IP address-to-username mapping and the firewall received
the group mapping information from the Cloud Identity Engine, the
firewall did not match the user to the correct group.
PAN-171497 Fixed an issue where, after a local user group was updated by adding
or removing users, the local user group was removed from groupdb.
PAN-169153 Fixed an issue where LDAP connections over TLS failed with untrusted
certificates error even though Verify Server Certificate for SSL
sessions option was not selected.
PAN-163828 Fixed an issue where path MTU discovery did not work when the MTU
was not configured manually on the tunnel interface.
PAN-OS Release Notes 10.1.9-h1 167 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.7 Known and Addressed Issues
Issue ID Description
PAN-163261 Fixed an intermittent issue where the firewall dropped GTPv2 Modify
Bearer Request packets with the following error message: Abnormal
GTPv2-C message with missing mandatory IE.
PAN-157215 Fixed an issue that occurred when two FQDNs were resolved to the
same IP address and were configured as the same src/dst of the same
rule. If one FQDN was later resolved to a different IP address, the
IP address resolved for the second FQDN was also changed, which
caused traffic with the original IP address to hit the incorrect rule.
PAN-OS Release Notes 10.1.9-h1 168 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.6.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
169
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 170 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-OS Release Notes 10.1.9-h1 171 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See Description if you push (Commit > Push to Devices) to
PAN-OS 10.1.9 Addressed multiple device groups from Panorama.
Issues.
PAN-198174 When viewing traffic or threat logs from the firewall ACC
or Monitor, performing a reverse DNS lookup, for example,
when resolving IP addresses to domain names using the
Resolve Hostname feature, can cause the appliance to crash
and restart if DNS server settings have not been configured.
Workaround: Provide a DNS server setting for the firewall
(Device > DNS Setup > Services). If you cannot reference a
valid DNS server, you can add a dummy address.
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
This issue is now resolved. See
PAN-OS 10.1.9 Addressed
Issues.
PAN-OS Release Notes 10.1.9-h1 172 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
for SD-WAN as being edited or deleted despite no edits or
deletions being made when you Preview Changes (Commit >
Push to Devices > Edit Selections or Commit > Commit and
Push > Edit Selections).
PAN-OS Release Notes 10.1.9-h1 173 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
1. Log in to the Panorama web interface.
2. In the same browser you are logged into the Panorama
web interface, enter the following URL.
https://<panorama_ip>/debug
3. Uncheck (disable) Debug or Clear Debug.
4. (HA configuration) Repeat this step on each Panorama high
availability (HA) peer if Panorama is in a HA configuration.
PAN-OS Release Notes 10.1.9-h1 174 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
• Configuration settings for each inline ML model—
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-OS Release Notes 10.1.9-h1 175 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
PAN-OS Release Notes 10.1.9-h1 176 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-OS Release Notes 10.1.9-h1 177 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See
PAN-OS 10.1.6-h6 Addressed
Issues.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-164618 The VM-Series firewall CLI and system logs display the license
name VM-SERIES-X, while the user interface displays VM-
FLEX-X (in both cases X is the number of vCPUs). In future
releases the user interface will use the VM-SERIES-X format.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-OS Release Notes 10.1.9-h1 178 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
the Source User Group filter query is applied, resulting in no
data being displayed for the filter when Directory Sync is
configured as the Source User for a policy rule.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 179 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-OS version 9.0 can inspect both inner and
outer VXLAN flows. If you want to inspect inner
flows, you must define a tunnel content inspection
(TCI) policy.
PAN-OS Release Notes 10.1.9-h1 180 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 181 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
PAN-OS Release Notes 10.1.9-h1 182 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 183 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
Workaround: Commit the Panorama configuration after the
CN-MGMT pod successfully registers with Panorama.
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-OS Release Notes 10.1.9-h1 184 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-OS Release Notes 10.1.9-h1 185 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 186 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
Throughput traffic is not duplicated if you deploy the VM-
Series firewall using MMAP packet mode.
PAN-OS Release Notes 10.1.9-h1 187 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
• Manually select the devices that belong to the modified
device group and template configurations.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-OS Release Notes 10.1.9-h1 188 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 189 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
Workaround: Disable DPDK by running the set system
setting dpdk-pkt-io off CLI command.
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 190 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
• Switch to the firewall Context on the Panorama
management server.
• Commit changes when a dynamic update is being installed.
• Generate a custom report when a dynamic update is being
installed.
• Generate custom reports during a commit.
Workaround: When the firewall performs slowly, or you see
a critical System log for memory utilization, wait for 5 minutes
and then manually reboot the firewall.
Use the Task Manager to verify that you are not performing
memory intensive tasks such as installing dynamic updates,
committing changes or generating reports, at the same time,
on the firewall.
PAN-OS Release Notes 10.1.9-h1 191 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
PAN-OS Release Notes 10.1.9-h1 192 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
deviceconfig cluster mode controller work
er-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 193 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 194 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
PAN-OS Release Notes 10.1.9-h1 195 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 196 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
PAN-194408 Fixed an issue where, when policy rules had the apps that
implicitly depended on web browsing configured with the
service application default, traffic did not match the rule
correctly.
PAN-OS Release Notes 10.1.9-h1 197 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-186024 Fixed an issue where URL category match did not work
for External Dynamic List URLS due to a leak related to
the devsrvr process.
PAN-OS Release Notes 10.1.9-h1 198 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
WF500-5509 (WF-500 appliance only) Fixed an issue where cloud inquiries were
logged under the SD-WAN subtype.
PAN-193579 Fixed an issue where new logs viewed from the CLI (show log
<log_type>) and new syslogs forwarded to a syslog server contained
additional, erroneous entries.
PAN-192930 Fixed an issue where, when the default port was not TCP/443,
implicitly used SSL applications were blocked by the Security policy as
an SSL application and did not shift to the correct application.
PAN-191629 (PA-5450 firewalls only) Fixed an issue where the hourly summary
log was limited to 100,001 lines when summarized, which resulted in
inconsistent report results when using summary logs.
PAN-191466 Fixed an issue where you were unable to use the web interface to
override IPsec tunnels pushed from Panorama
PAN-191222 Fixed an issue where Panorama became inaccessible when after a push
to the collector group.
PAN-190675 Fixed an IoT cloud connectivity issue with the firewall dataplane when
the Data Services service route was used and the egress interface had
VLAN tagging.
PAN-190660 Fixed an issue where the vld process stopped responding when
Elasticsearch had no data.
PAN-190644 Fixed an issue where Elasticsearch removed indices earlier than the
configured retention period.
PAN-190409 (PA-5450 and PA-3200 Series firewalls that use a FE101 processor
only) Fixed an issue where packets in the same session were
PAN-OS Release Notes 10.1.9-h1 199 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
forwarded through a different member of an aggregate ethernet group
when the session was offloaded.
PAN-189982 Fixed an issue where, when inputting tags, the scrollbar in the dialog
box for the tag field obscured the down arrow.
PAN-189643 Fixed an issue where, when Quality of Service (QoS) was enabled on
an IPSec tunnel, traffic failed due to applying the wrong tunnel QoS ID.
PAN-189182 Fixed an issue where the change summary didn't work after upgrading
the Panorama appliance.
PAN-188776 (PA-5450 firewalls only) Fixed an issue where the AUX-2 port required
a reboot to link up after factory resetting the firewall.
PAN-188336 Fixed an issue with the dnsproxyd process that caused the firewall to
unexpectedly reboot.
PAN-188303 Fixed an issue where the serial number displayed as unknown after
running the show system state CLI command.
PAN-188272 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue
where Support UTF-8 For Log Output wasn't visible on the web
interface.
PAN-188097 Fixed an issue where the firewall stopped allocating new sessions
with increments in the counter session_alloc_failure. This was caused
by GPRS tunneling protocol (GTP-U) tunnel session aging processing
issue.
PAN-188005 Fixed an issue where the var/off file consumed more space than
expected, which caused 100% root partition.
PAN-187829 Fixed an issue where the web_backend and httpd processes leaked
descriptors, which caused activities that depended on the processes,
such as logging in to the web interface, to fail.
PAN-OS Release Notes 10.1.9-h1 200 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-187558 Fixed an issue where the following error message flooded the system
log: Incremental update to DP failed.
PAN-186143 Fixed an issue where no local changes could be made on a Zero Touch
Provisioning (ZTP) enabled device after an upgrade to a PAN-OS 10.1
release.
PAN-185616 Fixed an issue where the firewall sent fewer logs to the system log
server than expected. With this fix, the firewall accommodates a larger
send queue for syslog forwarding to TCP syslog receivers.
PAN-185558 Fixed an issue where Panorama log migration failed when old logs
migrated to a newer format. This was due to older indices failing to
close.
PAN-185416 (PA-220 firewalls only) Fixed an issue where the firewall repeatedly
rebooted every few hours.
PAN-184291 Fixed an issue where the GlobalProtect portal generated a cookie with
a domain as NULL instead of empty-domain, which caused users to be
identified incorrectly.
PAN-OS Release Notes 10.1.9-h1 201 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-184071 Fixed an issue where tech support files were not generated.
PAN-183788 Fixed an issue with SCEP certificate enrollment where the incorrect
Registration Authority (RA) certificate was chosen to encrypt the
enrollment request.
PAN-183579 Fixed an issue where SD-WAN path monitoring failed over the
interface directly connected to the ISP due to an unsupported ICMP
probe format.
PAN-183529 (PA-5450 firewalls only) Fixed an issue where upgrading the firewall
caused corrupted log records to be created, which caused the logrcvr
process to fail. This resulted in the auto-commit process required
to bring up the firewall after a reboot to fail and, subsequently, the
firewall to become unresponsive.
PAN-183339 Fixed an issue where line breaks in a description were not visible.
PAN-181568 Fixed an issue where high dataplane CPU occurred when DNS Security
was enabled on a firewall with many DNS sessions but less overall
traffic.
PAN-181262 Fixed an issue where, when the data loss prevention (DLP) plugin was
installed, the Panorama web interface froze after previewing changes.
PAN-181245 Fixed an internal path monitoring failure issue that caused the
dataplane to go down.
PAN-181215 Fixed an issue where the authd process didn't receive authentication
requests due to internal socket errors.
PAN-181031 Fixed an issue where the CN-NGFW (DP) folder on the CN-MGMT
pod eventually consumed a large amount of space in the /var/log/pan
PAN-OS Release Notes 10.1.9-h1 202 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
because the old registered stale next-generation firewall logs were not
being cleared.
PAN-180338 Fixed an issue where the CTD loop count wasn't accurately
incremented.
PAN-180125 Fixed an issue where either Elasticsearch es-1 or es-2 didn't start after
rebooting the log collector.
PAN-178975 Fixed an issue where the local log collector was out of sync and
displayed a public IP address mismatch for the management interface.
PAN-178450 Fixed an issue where icons weren't displayed for clientless VPN
applications.
PAN-177762 Fixed an issue where wificlient in PAN-OS 10.0 and later releases
caused processing delays, on-chip descriptor spikes, and buffer usage.
PAN-177671 Fixed an issue where, when SIP traffic traversing the firewall was sent
with a high QoS differentiated service code (DSCP) value, the DSCP
value was reset to the default setting (CS0) for the first data packet.
PAN-177455 (PA-7000 Series firewalls with HA clustering enabled and using HA4
communication links only) Fixed an issue where loading PAN-OS
10.2.0 on the firewall caused the PA-7000 100G NPC (Network
PAN-OS Release Notes 10.1.9-h1 203 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
Processing Card) to go offline. As a result, the firewall failed to boot
normally and entered maintenance.
PAN-177409 Fixed an issue where, when the quarantine feature was enabled, every
hostid lookup created a new entry in the cache memory instead of
having a single cache entry for each IP address, which led to memory
exhaustion.
PAN-175022 Fixed an issue where the PAN-OS web interface table of contents did
not display or the help contents reloaded continuously.
PAN-175016 Fixed an issue where PDF summary reports were empty when they
were generated by a user in a custom admin role.
PAN-174660 Fixed an issue where the devsrvr process stopped responding after
a local or Panorama pushed commit. This occurred when a single NAT
policy contained more than 64 address objects.
PAN-172768 Fixed an issue where HIP report generation caused a memory leak on
a process (useridd).
PAN-OS Release Notes 10.1.9-h1 204 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
Issue ID Description
PAN-170462 Fixed an issue where Saas applications downloaded from the App-ID
Cloud Engine (ACE) didn't appear in daily application reports (Monitor
> Reports > Application Reports) or in the Application column of the
Application Usage widget in (ACC > Network Activity.
PAN-168400 Fixed an issue where, after installing Cloud Services plugin 10.2, the
Plugin cloud_services status (Dashboard > High Availability) displayed
as Mismatch.
PAN-162444 Fixed an issue where the system state reported incorrect or missing
capacity numbers for FQDN address objects.
PAN-159702 Fixed an issue where FQDN refresh did not work with the error No
name servers found!, and no subsequent retries occur.
PAN-155730 Fixed an issue where corrupted log index files were not automatically
removed.
PAN-142701 Fixed an issue where the firewall did not delete Stateless SCTP
sessions after receiving an SCTP Abort packet.
PAN-OS Release Notes 10.1.9-h1 205 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.6 Known and Addressed Issues
PAN-OS Release Notes 10.1.9-h1 206 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.5.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
207
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 208 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-OS Release Notes 10.1.9-h1 209 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
2. You create address objects called AddressObjA in
the Shared, DG-A and DG-B device groups and add
AddressObjA to a Security policy rule under DG-A and
DG-B.
3. Later, you change the AddressObjA name in the Shared
device group to AddressObjB.
Changing the name of the address object in the Shared
device group causes the references in the Policy rule to use
the renamed Shared object instead of the device group
object.
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
This issue is now resolved. See
PAN-OS 10.1.9 Addressed
Issues.
PAN-OS Release Notes 10.1.9-h1 210 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
interfaces in the same subnetwork can cause routing and
connectivity issues.
PAN-OS Release Notes 10.1.9-h1 211 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See > Management) to a managed firewall erroneously displays
PAN-OS 10.1.6 Addressed commit time out as the reason the commit failed.
Issues.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
PAN-OS Release Notes 10.1.9-h1 212 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-OS Release Notes 10.1.9-h1 213 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See the firewall does not successfully match the user to the
PAN-OS 10.1.7 Addressed correct group.
Issues.
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-OS Release Notes 10.1.9-h1 214 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-OS Release Notes 10.1.9-h1 215 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-164618 The VM-Series firewall CLI and system logs display the license
name VM-SERIES-X, while the user interface displays VM-
FLEX-X (in both cases X is the number of vCPUs). In future
releases the user interface will use the VM-SERIES-X format.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
PAN-OS Release Notes 10.1.9-h1 216 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 217 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-OS version 9.0 can inspect both inner and
outer VXLAN flows. If you want to inspect inner
flows, you must define a tunnel content inspection
(TCI) policy.
PAN-OS Release Notes 10.1.9-h1 218 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 219 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
PAN-OS Release Notes 10.1.9-h1 220 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 221 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
Workaround: Commit the Panorama configuration after the
CN-MGMT pod successfully registers with Panorama.
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-OS Release Notes 10.1.9-h1 222 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-OS Release Notes 10.1.9-h1 223 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 224 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
Throughput traffic is not duplicated if you deploy the VM-
Series firewall using MMAP packet mode.
PAN-OS Release Notes 10.1.9-h1 225 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
• Manually select the devices that belong to the modified
device group and template configurations.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-OS Release Notes 10.1.9-h1 226 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 227 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
Workaround: Disable DPDK by running the set system
setting dpdk-pkt-io off CLI command.
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 228 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
• Switch to the firewall Context on the Panorama
management server.
• Commit changes when a dynamic update is being installed.
• Generate a custom report when a dynamic update is being
installed.
• Generate custom reports during a commit.
Workaround: When the firewall performs slowly, or you see
a critical System log for memory utilization, wait for 5 minutes
and then manually reboot the firewall.
Use the Task Manager to verify that you are not performing
memory intensive tasks such as installing dynamic updates,
committing changes or generating reports, at the same time,
on the firewall.
PAN-OS Release Notes 10.1.9-h1 229 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
PAN-OS Release Notes 10.1.9-h1 230 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
deviceconfig cluster mode controller work
er-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 231 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 232 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
PAN-191629 (PA-5450 firewalls only) Fixed an issue where the hourly summary
log was limited to 100,001 lines when summarized, which resulted in
inconsistent report results when using summary logs.
PAN-190660 Fixed an issue where the vld process stopped responding when
Elasticsearch had no data.
PAN-190644 Fixed an issue where Elasticsearch removed indices earlier than the
configured retention period.
PAN-190409 (PA-5450 firewalls and PA-3200 Series firewalls that use a FE101
processor only) Fixed an issue where packets in the same session were
forwarded through a different member of an aggregate ethernet group
when the session was offloaded.
PAN-189375 Fixed an issue where, when migrating the firewall, the firewall dropped
packets when trying to re-use the TCP session.
PAN-188097 Fixed an issue where the firewall stopped allocating new sessions
with increments in the counter session_alloc_failure. This was caused
by GPRS tunneling protocol (GTP-U) tunnel session aging processing
issue.
PAN-183529 (PA-5450 firewalls only) Fixed an issue where upgrading the firewall
caused corrupted log records to be created, which caused the logrcvr
process to fail. This resulted in the auto-commit process required
to bring up the firewall after a reboot to fail and, subsequently, the
firewall to become unresponsive.
PAN-OS Release Notes 10.1.9-h1 233 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
PAN-190175 and A fix was made to address an OpenSSL infinite loop vulnerability in the
PAN-190223 PAN-OS software (CVE-2022-0778).
PAN-189643 Fixed an issue where, when QoS was enabled on an IPSec tunnel,
traffic failed due to applying the wrong tunnel QoS ID.
PAN-178450 and Fixed an issue where icons weren't displayed for clientless VPN
PAN-177905 applications.
PAN-OS Release Notes 10.1.9-h1 234 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
PAN-189665 (FIPS-CC enabled firewalls only) Fixed an issue where the firewall was
unable to connect to log collectors after an upgrade due to missing
cipher suites.
PAN-189468 Fixed an issue where the firewall onboard packet processor used
by the PAN-OS content-inspection (CTD) engine can generate
high dataplane resource usage when overwhelmed by a session
with an unusually high number of packets. This can result in
resource-unavailable messages due to the content inspection
queue filling up. Factors related to the likelihood of an occurrence
include enablement of content-inspection based features that are
configured in such a way that might process thousands of packets
in rapid succession (such as SMB file transfers). This can cause poor
performance for the affected session and other sessions using the
same packet processor. PA-3000 series and VM-Series firewalls are
not impacted.
PAN-189230 (VM-Series firewalls only) Fixed an issue that caused the pan_task
process to stop responding with floating point exception (FPE) when
there was a module of 0 on the queue number.
PAN-188883 Fixed an issue where, when pre-generated license key files were
manually uploaded via the web interface, they weren't properly
recognized by PAN-OS and didn't display a serial number or initiate a
reboot.
PAN-OS Release Notes 10.1.9-h1 235 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-187438 (PA-5400 Series firewalls only) Fixed an issue where HSCI interfaces
didn’t come up when using BiDi transceivers.
PAN-186785 Fixed an issue where, after logging in, Panorama displayed a 500 error
page after five minutes of logging for dynamic group template admin
types with access to approximately 115 managed devices or 120
dynamic groups.
PAN-186646 (PA-5400 Series firewalls only) Fixed an issue where traffic flow
through IKE NATT IPSec S2S tunnels broke on tunnel rekey with
multiple data processing cards (DPC).
PAN-186516 Fixed an issue where log queries that included WildFire submission
logs returned more slowly than expected.
PAN-186402 (PA-440 Series firewalls only) Fixed an issue where the firewall's
maximum tunnel limit was incorrect.
PAN-185726 Fixed an issue where the dataplane exited during IPSec encapsulation
and decapsulation offload operations.
PAN-185695 (PA-5400 Series firewalls only) Fixed an issue where up to 75% traffic
loss occurred on GlobalProtect tunnels with multiple DPCs.
PAN-185359 Fixed an issue where you were unable to reference shared address
objects as a BGP peer address (Virtual Router > BGP > Peer Group >
Peer Address).
PAN-185164 Fixed an issue where processing corrupted IoT messages caused the
wificlient process to restart.
PAN-185163 Fixed an issue where the distributord process hit the FD limit, which
caused User-ID redistribution to not function properly.
PAN-184445 Fixed an issue where, after upgrading the Panorama, tagged address
objects used in dynamic address groups were removed after a full
PAN-OS Release Notes 10.1.9-h1 236 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
commit and push. This issue occurred when the setting Share Unused
Address and Service Objects with Devices was left unchecked.
PAN-184432 Fixed an issue where the logrcvr process stopped responding due
to a heartbeat failure that was caused by sysd nodes being stuck on
logdb_writers for system, configuration, and alarm logs.
PAN-184076 Fixed an issue on the firewall web interface where logs were delayed
when querying for logs.
PAN-184047 Fixed an issue where Terminal Service agent (TS agent) connections
with a certificate profile and the certificate chain on the TS agent
failed. This occurred because common name validation and key usage
checks were being performed in the root or intermediate certificate.
PAN-183774 Fixed an memory leak issue in the mgmtsrvr process, which resulted in
an out-of-memory (OOM) condition and high availability (HA) failover.
PAN-183239 Fixed an issue where the firewall randomly disconnected from the
WildFire URL cloud.
PAN-183112 Fixed an issue where the threat log type ml-virus wasn't forwarded
to Panorama or to external servers.
PAN-182954 (PA-7000 Series firewalls with Log Processing Cards (LPC) only) Fixed
an issue where excessive threat ID lookups caused logs to be lost.
PAN-182903 Fixed an issue where SD-WAN failover on a hub or branch in full mesh
took longer than expected.
PAN-182732 Fixed an issue where the GlobalProtect gateway inactivity timer wasn't
refreshed even though traffic was passing through the tunnel.
PAN-182634 (PA-400 Series firewalls only) Fixed an issue where the firewall
detected a Power Supply Unit (PSU) failure for the opposite side
when disconnecting a PSU from the device. This issue occurred when
redundant PSUs were connected.
PAN-OS Release Notes 10.1.9-h1 237 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-181706 Fixed an issue where the logrcvr process stopped responding after
upgrading to PAN-OS 10.1.
PAN-181579 Fixed an issue with the GlobalProtect gateway where the time-
to-live (TTL) limit expired faster than real-time limit. As a result, a
reconnection was required before the expected lifetime expiration.
PAN-181558 Fixed an issue where the stats dump file was not generated properly.
PAN-181116 Fixed memory corruption issues in PAN-OS 10.1.3 and 10.1.4 that
caused the pan_comm process to stop responding and the dataplane to
restart. These issues also caused GlobalProtect tunnels to fall back to
SSL instead of IPSec due to the inadvertent encapsulation of the ICMP
keepalive response from the firewall.
PAN-181039 Fixed an issue with DNS cache depletion that caused continuous DNS
retries.
PAN-180916 Fixed an issue where DNS security caused the TTL value of the pointer
record (PTR) to be overwritten with a value of 30 seconds.
PAN-180760 Fixed an issue where users were unable to SSH to the firewall and
encountered the following error message: Could not chdir to
home directory /opt/pancfg/home/user: Permission
denied.
PAN-179976 Fixed an issue where the WildFire Inline Machine Learning (ML) did
not detect mlav-test-pe-file.exe when traffic was decrypted.
PAN-OS Release Notes 10.1.9-h1 238 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-179899 Fixed an issue where updating the master key did not update the SD-
WAN preshared key (PSK).
PAN-179886 Fixed an issue where new tunnels were unable to be established for
Elasticsearch due to faulty logic that prevented old tunnels to be
removed when a node went down.
PAN-179413 Fixed an issue where GRE tunnels flapped during commit jobs.
PAN-179260 Fixed an issue where admins and other Superusers were unable to
remove a commit lock that was taken by another admin user with the
format <domain/user>. As a result, deleting the commit lock failed.
PAN-179164 Fixed an issue where a web-proxy port number was added to the
destination URL when captive portal authentication was run.
PAN-179059 Fixed an issue where you were unable to delete dynamic address
groups one at a time using XML API.
PAN-178947 Fixed an issue where the useridd process stopped responding when a
NULL reference attempted to be dereferenced. This issue occurred to
IP address users being added.
PAN-178860 Fixed an issue where quarantined devices appeared in the CLI but not
the web interface.
PAN-177981 (PA-5450 firewalls only) Fixed an issue where High Speed Log
Forwarding was enabled when attempting to view local logs.
PAN-177956 Fixed an issue where the CLI output of show location ip <ip
address> returned unknown.
PAN-OS Release Notes 10.1.9-h1 239 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-177907 Fixed an issue where, after rebooting the firewall, FQDN address
objects referred in rules in a virtual system (vsys) did not resolve when
the vsys used a custom DNS proxy.
PAN-177363 Fixed an issue where, when system logs and configuration logs on
a dedicated log detector system were forwarded to a Panorama
management server in Management Only mode, the logs were not
ingested and were dropped. This caused the dedicated log detector
system to not be viewable on a Panorama appliance in Management
Only mode.
PAN-177187 Fixed an issue where reports using the decryption summary database
and Panorama as data sources returned no results.
PAN-177072 Fixed an intermittent issue where Panorama did not show new logs
from firewalls.
PAN-177060 Fixed an issue where, when the address object in the parent device
group was renamed, and the address object was overridden in the
child device group and called in a Security policy, the object in the
Security policy was renamed as well.
PAN-OS Release Notes 10.1.9-h1 240 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-177054 Fixed an issue where, when you disabled a NAT rule, the Destination
Translation value none displayed in blue and was still able to be
modified to a different value.
PAN-176997 Fixed an issue where log collectors generated Failed to check IoT
content upgrade system logs even when no IoT license was installed.
PAN-176889 Fixed an issue where the log collector continuously disconnected from
Panorama due to high latency and a high number of packets in Send-
Q.
PAN-176746 Fixed an intermittent issue where traffic was lost when performing a
failover in an HA active/passive setup.
PAN-176348 Fixed an issue where scheduled email alerts were not forwarded to all
recipients in the override list.
PAN-176280 Fixed an intermittent issue on Panorama where querying logs via the
web interface or API did not return results.
PAN-176262 Fixed an issue where the firewall didn't resolve specific domain names
with multiple nested Canonical Name (CNAME) records when caching
was enabled.
PAN-176116 Fixed an issue where the header did not match the correct policy when
IPv6 addresses were set in XFF header.
PAN-176030 Fixed an issue where alerts related to syslog connections were not
generated in the system logs.
PAN-175628 (PA-5200 Series firewalls only) Fixed an issue where the firewall was
unable to monitor AUX1 and AUX2 interfaces through SNMP.
PAN-OS Release Notes 10.1.9-h1 241 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-175570 Fixed an issue where log forwarding profiles did not show up in the
dropdown under Zones.
PAN-175403 (VM-Series firewalls only) Fixed an issue where the firewall did not
display any logs except for system logs.
PAN-175399 Fixed an issue where enabling Use proxy to fetch logs from
Cortex Data Lake caused Panorama to not show logs when
queried.
PAN-175307 Fixed an issue where Panorama commits were slower than expected
and the configd process stopped responding due to a memory leak.
PAN-175259 Fixed an issue where a Security policy configured with App-ID and set
to web-browsing and application-default service allowed clear-text
web-browsing on tcp/443.
PAN-175161 Fixed an issue where changing SSL connection validation settings for
system logs caused the mgmtsrvr process to stop responding.
PAN-174998 (M-200 and M-500 appliances only) Fixed a capacity issue that was
caused by high operational activity and large configurations. This fix
increases the virtual memory limit on the configd process to 32GB.
PAN-174894 Fixed an issue where, when the TTL value for symmetric MAC entries
weren't updated to other dataplanes and HA peers, timeouts occurred
for traffic using policy-based forwarding (PBF) with symmetric returns.
PAN-174709 Fixed an OOM condition that occurred due to multiple parallel jobs
being created by the scheduled log export feature.
PAN-OS Release Notes 10.1.9-h1 242 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-174604 Fixed an issue where the email subject of scheduled reports was
enclosed in single quotation marks.
PAN-174011 Fixed an issue where Panorama failed to update shared policies during
partial commits when a new device group was created but not yet
committed.
PAN-173893 Fixed a memory leak issue related to the (useridd) process that
occurred when group mapping was enabled.
PAN-173753 Fixed an issue where a bar or point on a Network Monitor graph had
to be clicked more than once to properly redirect to the corresponding
ACC report.
PAN-173689 Fixed an issue where the dataplane restarted due to running out of
memory in the policy cache.
PAN-173545 Fixed an issue where exporting a device summary to CSV failed and
displayed the following error message: Error while exporting.
PAN-OS Release Notes 10.1.9-h1 243 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
were unable to view the hardware ACL blocking setting and duration
in the CLI using the following commands:
• show system setting hardware-acl-blocking-
enable
PAN-172837 Fixed an intermittent issue where the firewall didn't generate block
URL logs for URLs even though the websites were blocked in the client
device.
PAN-172404 Fixed an issue where the semi-colon (;) was not recognized as token
separator while doing regex for URL category matching even though it
is mentioned in the documentation.
PAN-172316 Fixed an issue where the internal interface flow control that caused
the monitoring process to incorrectly determine the interface to be
malfunctioning.
PAN-172295 Fixed an issue where a HIP database cache loop caused high CPU
utilization on a process (useridd) and caused IP address-to-user
mapping redistribution failure.
PAN-172243 Fixed an issue where NetFlow traffic triggered a packet buffer leak.
PAN-172056 (VM-Series firewalls only) The logging rate limit was improved to
prevent log loss.
PAN-171869 Fixed an issue where HIP profile objects in security policies and
authentication policies were still visible in the CLI even after replacing
them with source HIP and destination HIP objects.
PAN-OS Release Notes 10.1.9-h1 244 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-171181 Fixed an issue where the IPSec tunnel configuration didn't load when
a double quotation mark was added to the comment section of the
IPSec tunnel General tab.
PAN-170952 Fixed script issues that caused diagnostic data to not be collected after
path monitor failure.
PAN-170595 Fixed an issue with Content and Threat Detection where traffic
patterns created a bus error, which caused the all_pktproc process to
stop responding and the dataplane to restart.
PAN-170297 Fixed an issue where ACC > Threat activity did not include the threat
name after upgrading to a PAN-OS 10.0 release.
PAN-169917 Fixed an issue on Panorama where AUX interface IP addresses did not
populate when configuring service routes.
PAN-169796 Fixed an issue where the high availability path group destination IP
address was removed after pushing a PAN-OS 10 release template
from Panorama to a firewall running a PAN-OS 9 release.
PAN-169433 Fixed an issue on Panorama where clicking Run Now for a custom
report with 32 or more filters in the Query Builder returned the
following message: No matching records.
PAN-OS Release Notes 10.1.9-h1 245 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-168635 Fixed an issue on the firewall where, when attempting to change the
master key, the existing master key was not validated first. As a result,
all firewall keys were corrupted.
PAN-168286 Fixed a memory leak issue in the mgmtsrvr process that was caused by
failed commit all operations.
PAN-168189 Fixed an issue where, even when there was active multicast traffic, the
firewall sent Protocol Independent Multicast (PIM) prune messages.
PAN-167858 Fixed an issue where a DNS Security inspection identified a TCP DNS
request that had two requests in one segment as a malformed packet
and dropped the packet.
PAN-167259 Fixed an issue where, after manually uploading WildFire images, the
dropdown did not display any available files to choose from.
PAN-166368 Fixed an issue on Panorama where long FQDN queries did not resolve
due to the character limit being 64 characters.
PAN-165147 Fixed an issue where, when there was a high volume of traffic for
sessions with Application Block Pages enabled, other regular packets
were dropped.
PAN-164631 Fixed an issue where the stats dump report was empty.
PAN-163831 Fixed an issue where IPv6 addresses were displayed instead of IPv4 in
custom reports.
PAN-161297 Fixed an interoperability issue with other vendors when IKEv2 used
SHA2-based certificate authentication.
PAN-OS Release Notes 10.1.9-h1 246 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-161111 Fixed an issue where TLS 1.3 Forward Proxy Decryption failed with
a malloc failure error. This issue was caused by the server certificate
being very large.
PAN-161031 Fixed an issue where authentication via LDAP server failed in FIPS-
CC mode when the LDAP server profile was configured with the root
certificate chain and Verify server certificate for SSL sessions options
enabled.
PAN-159835 Fixed an issue where, after an upgrade, the following error message
was displayed: Not enough space to load content to SHM.
PAN-158369 Fixed an issue where applications did not work via the Clientless VPN
when they were configured on a vlan interface
PAN-156289 Fixed an issue where the default severities for Content Update errors
were inaccurate.
PAN-151302 (PA-7000 Series firewalls with LFCs only) Fixed an issue where the
logging rate for the LFC was not displayed in Panorama > Managed
Devices > Health.
PAN-145833 (PA-3200 Series firewalls only) Fixed an issue where the firewall
stopped recording dataplane diagnostic data in dp-monitor.log after a
few hours of uptime.
PAN-OS Release Notes 10.1.9-h1 247 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.5 Known and Addressed Issues
Issue ID Description
PAN-141454 Fixed an issue where the output of the CLI command show running
resource-monitor ingress-backlogs displayed an incorrect
total utilization value.
PAN-OS Release Notes 10.1.9-h1 248 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.4.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
249
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 250 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-OS Release Notes 10.1.9-h1 251 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
2. You create address objects called AddressObjA in
the Shared, DG-A and DG-B device groups and add
AddressObjA to a Security policy rule under DG-A and
DG-B.
3. Later, you change the AddressObjA name in the Shared
device group to AddressObjB.
Changing the name of the address object in the Shared
device group causes the references in the Policy rule to use
the renamed Shared object instead of the device group
object.
PAN-OS Release Notes 10.1.9-h1 252 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
(Device > Scheduled Config Export), or the scp export
command in the CLI.
Workaround: Use RSA-based host keys on the destination
server.
PAN-OS Release Notes 10.1.9-h1 253 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
• Define URL exceptions for specific web sites—
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.1.9-h1 254 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
Workaround:Change the vsys key to a valid device group,
commit your changes, and run the User Activity Report again.
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-OS Release Notes 10.1.9-h1 255 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-OS Release Notes 10.1.9-h1 256 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
supported. Instead, use a data plane interface for the service
route (Prepare to Deploy App-ID Cloud Engine describes how
to do this.)
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-OS Release Notes 10.1.9-h1 257 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-164618 The VM-Series firewall CLI and system logs display the license
name VM-SERIES-X, while the user interface displays VM-
FLEX-X (in both cases X is the number of vCPUs). In future
releases the user interface will use the VM-SERIES-X format.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-OS Release Notes 10.1.9-h1 258 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 259 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
remove the Enterprise DLP filtering settings and complete the
downgrade.
1. Downgrade your managed firewall to PAN-OS 9.1
2. Log in to the firewall web interface and view the Tasks
to verify all auto commits related to the downgrade have
completed successfully.
3. Log in to the Panorama web interface and Commit >
Commit and Push to your managed firewall downgraded to
PAN-OS 9.1.
PAN-OS Release Notes 10.1.9-h1 260 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
if a custom report (Monitor > Manage Custom Reports) is
configured to Group By Session ID.
Workaround: After successful downgrade, reconfigure the
Group By setting in the custom report.
PAN-OS Release Notes 10.1.9-h1 261 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
the additional cache lookup that happens when HA cluster
participation is enabled.
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 262 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
might cause firewalls configured in the child DG to lose
IP tag mapping information received from the monitoring
definition. Only firewalls assigned to the parent DG receive IP
tag mapping updates.
Workaround: Perform a manual config sync on the device
group that lost the IP tag mapping information.
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
PAN-OS Release Notes 10.1.9-h1 263 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-OS Release Notes 10.1.9-h1 264 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-OS Release Notes 10.1.9-h1 265 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
• Modify the PAN-DB Server IP address on the managed
firewall.
1. On the web interface, delete the PAN-DB Server IP
address (Device > Setup > Content ID > URL Filtering
settings).
2. Commit your changes.
3. Add the new M-500 Eth1/1 IP PAN-DB IP address.
4. Commit your changes.
• Restart the firewall (devsrvr) process.
1. Log in to the firewall CLI.
2. Restart the devsrvr process: debug software
restart process device-server
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 266 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
the Shared location instead of a specific virtual system.
Alternatively, you can select a preexisting certificate profile
instead of creating a new one.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-OS Release Notes 10.1.9-h1 267 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
PAN-OS Release Notes 10.1.9-h1 268 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 269 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 270 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
Use the Task Manager to verify that you are not performing
memory intensive tasks such as installing dynamic updates,
committing changes or generating reports, at the same time,
on the firewall.
PAN-OS Release Notes 10.1.9-h1 271 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
use Panorama to configure the worker node as a controller
node by adding the HA and cluster controller configurations,
configure an existing controller node as a worker node by
removing the HA configuration, and then commit and push
the configuration. Attempts to change cluster node roles from
Panorama results in a validation error—the commit fails and
the cluster becomes unresponsive.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller work
er-list <worker-ip-address>
PAN-OS Release Notes 10.1.9-h1 272 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
Panorama. The service advertisement can advertise that
DNS is or is not enabled.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 273 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
Workaround: To generate an on-demand report, click Run
Now when you configure the custom report.
PAN-OS Release Notes 10.1.9-h1 274 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
PAN-187438 (PA-5400 Series firewalls only) Fixed an issue where HSCI interfaces
didn’t come up when using BiDi transceivers.
PAN-OS Release Notes 10.1.9-h1 275 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
PAN-184445 Fixed an issue where, after upgrading Panorama and enabling Share
Unused Address and Service Objects with Devices, address objects
using tags to dynamic address groups were removed after a full
commit.
PAN-178381 Fixed an issue on Panorama where logs didn't display under the
Monitor tab and the Elasticsearch process did not work after
upgrading to a PAN-OS 10.1 release.
PAN-OS Release Notes 10.1.9-h1 276 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
PAN-183274 (PA-400 Series firewalls only) Fixed a rare issue where abnormal
power downs occurred.
PAN-181309 Fixed an issue where Panorama was inaccessible due to the configd
process not responding.
PAN-180511 (PA-400 Series and PA-5400 Series firewalls only) Fixed an issue
where technical support file generation restarted the firewall.
PAN-178953 Fixed an issue with the GlobalProtect Clientless VPN where, when
an application sent a negative max age value on a cookie, part of
the cookie was retained by PAN-OS and used for the subsequent
connection on the user session.
PAN-178190 Fixed an issue where the firewall incorrectly set the disk quota
cfg.diskquota.traffic to 0 after upgrading to a PAN-OS 10.0
release. With this fix, the log disk quota will be retained correctly after
upgrade.
PAN-OS Release Notes 10.1.9-h1 277 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-176341 Fixed an issue where a delay to detect when an interface was down
after a cable pull caused traffic to be black-holed to the downed link
for 10 or more seconds.
PAN-176283 (PA-7000 Series firewalls with Data Processing Cards (DPCs) only)
Fixed an issue where packet loss occurred when quality of service was
enabled on an aggregate interface.
PAN-176054 Fixed an intermittent issue where users did not have access to
resources due to a HIP check failure that was caused by the HIP data
not being synced between the management plane and the dataplane.
PAN-173973 (PA-7000 Series firewalls only) Fixed an issue where flaps occurred
when Link State Pass Through was enabled.
PAN-173216 Fixed an issue where the firewall incorrectly handled HTML pages
when accessed via the GlobalProtect Clientless VPN.
PAN-172464 Fixed an issue where unicast DHCP discover or request packets were
silently dropped.
PAN-OS Release Notes 10.1.9-h1 278 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
during commits, commit and push operations, and high availability
Panorama syncs.
PAN-172179 (PA-7000b firewalls only) Fixed an issue where, when GTP-U tunnel
acceleration was enabled but Mobile Network Protection was not
enabled on the corresponding policy, GPRS tunneling protocol (GTP-U)
traffic was dropped.
PAN-171696 (PA-800 and PA-400 Series firewalls and PA-220 firewalls only) Fixed
an issue where the management plane CPU was incorrectly reported
to be high.
PAN-171174 Console debug output was enhanced to address issues that led to a
loss of SSH and web interface access.
PAN-171127 Fixed an issue on Panorama where custom reports (Monitor > Manage
Custom Reports) for Device Application Statistics and Device Traffic
Summary databases displayed null for the Application field.
PAN-170997 Fixed an issue where FQDN service routes were not installed after a
system reboot.
PAN-165235 Fixed an issue where the handover handling between LTE and 3G
on S5 and S8 to Gn/Gp was not working properly and led to stateful
inspection failures.
PAN-164450 Fixed an intermittent issue where the firewall dropped GTPv2 Create
Session Response packets with the cause Partially Accepted.
PAN-OS Release Notes 10.1.9-h1 279 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.4 Known and Addressed Issues
Issue ID Description
PAN-163692 Fixed an issue where the firewall did not create new GTP-C sessions
when a Create Session Request message was retransmitted and a
completely new Create Session Response message was returned.
PAN-163261 Fixed an intermittent issue where the firewall dropped GTPv2 Modify
Bearer Request packets with the following error message: Abnormal
GTPv2-C message with missing mandatory IE.
PAN-OS Release Notes 10.1.9-h1 280 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.3.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
281
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 282 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-OS Release Notes 10.1.9-h1 283 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
2. You create address objects called AddressObjA in
the Shared, DG-A and DG-B device groups and add
AddressObjA to a Security policy rule under DG-A and
DG-B.
3. Later, you change the AddressObjA name in the Shared
device group to AddressObjB.
Changing the name of the address object in the Shared
device group causes the references in the Policy rule to use
the renamed Shared object instead of the device group
object.
PAN-OS Release Notes 10.1.9-h1 284 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
(Device > Scheduled Config Export), or the scp export
command in the CLI.
Workaround: Use RSA-based host keys on the destination
server.
PAN-OS Release Notes 10.1.9-h1 285 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 286 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
Workaround: Add the device registration authentication key
from the firewall CLI.
1. Log in to the Panorama web interface.
2. Add a firewall to Panorama and configure the device
registration authentication key.
Do not add the device registration authentication key
created on Panorama when configuring the Panorama IP
settings on the firewall web interface.
3. Log in to the firewall CLI.
4. Add the device registration authentication key.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.1.9-h1 287 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-OS Release Notes 10.1.9-h1 288 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-OS Release Notes 10.1.9-h1 289 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-OS Release Notes 10.1.9-h1 290 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
likely to occur when multiple EDLs are configured to check
for updates every 5 minutes.
PAN-164618 The VM-Series firewall CLI and system logs display the license
name VM-SERIES-X, while the user interface displays VM-
FLEX-X (in both cases X is the number of vCPUs). In future
releases the user interface will use the VM-SERIES-X format.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-OS Release Notes 10.1.9-h1 291 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See Workaround: Load the configuration from running config
PAN-OS 10.1.6 Addressed (load config from running-config.xml) and perform a commit.
Issues.
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 292 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
firewall if you do not uninstall the Enterprise DLP plugin
before downgrade.
Workaround: After you successfully downgrade a managed
firewall to PAN-OS 9.1, commit and push from Panorama to
remove the Enterprise DLP filtering settings and complete the
downgrade.
1. Downgrade your managed firewall to PAN-OS 9.1
2. Log in to the firewall web interface and view the Tasks
to verify all auto commits related to the downgrade have
completed successfully.
3. Log in to the Panorama web interface and Commit >
Commit and Push to your managed firewall downgraded to
PAN-OS 9.1.
PAN-OS Release Notes 10.1.9-h1 293 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
Workaround: Use the CLI to update the combination
signature.
PAN-OS Release Notes 10.1.9-h1 294 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 295 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 296 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
after you successfully configure a tunnel IP subnet, for the
SD-WAN 1.0.2 plugin does not display the managed firewall
templates (Panorama > Managed Devices > Summary) as Out
of Sync.
Workaround: When modifying the original subnet IP, or
adding a new subnet, push the template configuration
changes to your managed firewalls and Force Template
Values (Commit > Push to Devices > Edit Selections).
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-OS Release Notes 10.1.9-h1 297 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-OS Release Notes 10.1.9-h1 298 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
on the M-500 Panorama management server, even when you
configured the Eth1/1 interface.
Workaround: Update the PAN-DB-URL IP address on the
firewall using one of the methods below.
• Modify the PAN-DB Server IP address on the managed
firewall.
1. On the web interface, delete the PAN-DB Server IP
address (Device > Setup > Content ID > URL Filtering
settings).
2. Commit your changes.
3. Add the new M-500 Eth1/1 IP PAN-DB IP address.
4. Commit your changes.
• Restart the firewall (devsrvr) process.
1. Log in to the firewall CLI.
2. Restart the devsrvr process: debug software
restart process device-server
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 299 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
vsys1 or another virtual system) and you then create a
New Certificate Profile from the drop-down, you must set
the location for the Certificate Profile to Shared. If you
configure DDNS on an existing interface and then create a
new Certificate Profile, we also recommend that you choose
the Shared location instead of a specific virtual system.
Alternatively, you can select a preexisting certificate profile
instead of creating a new one.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-OS Release Notes 10.1.9-h1 300 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
PAN-OS Release Notes 10.1.9-h1 301 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 302 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
accounts that you create in PAN-OS 8.0.9 or a later release
do not require you to change the passwords to apply
password profile settings.)
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 303 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
Workaround: When the firewall performs slowly, or you see
a critical System log for memory utilization, wait for 5 minutes
and then manually reboot the firewall.
Use the Task Manager to verify that you are not performing
memory intensive tasks such as installing dynamic updates,
committing changes or generating reports, at the same time,
on the firewall.
PAN-OS Release Notes 10.1.9-h1 304 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller work
er-list <worker-ip-address>
PAN-OS Release Notes 10.1.9-h1 305 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
• Configure service advertisement on the local CLI of the
cluster controller and then import the configuration into
Panorama. The service advertisement can advertise that
DNS is or is not enabled.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 306 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
scheduled reports; on-demand reports include all data within
the specified Time Frame.
Workaround: To generate an on-demand report, click Run
Now when you configure the custom report.
PAN-OS Release Notes 10.1.9-h1 307 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
PAN-OS Release Notes 10.1.9-h1 308 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
PAN-178190 Fixed an issue where the firewall incorrectly set the disk quota
cfg.diskquota.traffic to 0 after upgrading to a PAN-OS 10.0
release. With this fix, the log disk quota will be retained correctly after
upgrade.
PAN-177892 Fixed a memory leak issue where panio failed to start, which resulted
in dp-monitor failing to capture the complete panio output.
PAN-177881 Fixed an issue where VLAN tags were not properly processed in Layer
2 switching mode between interfaces with different tags.
PAN-176862 (VM-Series firewalls only) Fixed an issue where the firewall didn't
attempt to connect to a log collector when the management IP address
used DHCP.
PAN-OS Release Notes 10.1.9-h1 309 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-176433 Fixed an issue where the Zero Touch Provisioning (ZTP) plugin on
Panorama was unable to sync with the ZTP service and displayed the
following error message: Failed to fetch sync status.
PAN-175652 Fixed an issue where SSL decryption failed for websites when they
were accessed from Google Chrome version 92 or higher.
PAN-174587 Fixed an issue where, in the case of multiple AWS Partner Network
(APN) connections, the GPRS Tunneling Protocol (GTPv2) Create
Session Requests were sent to the firewall within a short interval,
which caused the firewall to create the GTP-sessions incorrectly.
PAN-174201 Fixed an issue where, when logs were in the burst list, the vldmgr
process stopped responding after upgrading to PAN-OS 10.1.0.
PAN-174200 Fixed an issue where a role-based admin user was unable to edit, add,
or view interfaces if dashboard permissions were disabled.
PAN-173157 Fixed an issue with the HA1 monitor hold timer where the configured
value was not assigned to the HA1 backup interface, which used
the default hold timer (3000 milliseconds), which resulted in failover
events taking longer than expected.
PAN-OS Release Notes 10.1.9-h1 310 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-173076 (Panorama appliances in FIPS mode only) Fixed an issue where the
FIPS Panorama / FIPS firewall schema didn't prune non-FIPS options
from the Clientless VPN.
PAN-172208 (PA-5450 firewalls only) Fixed a rare issue where the firewall reloaded
while handling high stress SSL traffic when CPU utilization reached
100% or the packet broker capacity exceeded 40%.
PAN-172091 Fixed an issue where, when you configured a virtual system (vsys) as
a User-ID hub, and a firewall that receives IP address-to-username
mapping from the hub had a Security policy that includes a QoS policy
rule, the firewall did not match the user to the QoS policy rule if the
traffic attempted to access a vsys that was not the hub.
PAN-170466 Fixed an memory reference issue related to the devsrvr process that
caused the process to stop responding.
PAN-169105 Fixed an issue on the Panorama web interface where a Network File
System (NFS) storage partition displayed the incorrect storage size.
PAN-168261 Fixed a cosmetic issue where the WildFire submission log displayed
the sha256 of the original email link.
PAN-OS Release Notes 10.1.9-h1 311 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.3 Known and Addressed Issues
Issue ID Description
PAN-166978 Fixed an issue where the URL-Filtering cloud connection failed with
the following error message: bind failed with errno 97.
PAN-165433 Fixed an intermittent issue where Cortex Data Lake failed to reconnect
after a disconnect if a management IP address used for logging had an
IP address assignment type of DHCP.
PAN-163448 Fixed an issue when using ixgb drivers with SR-IOV and DPDK that
caused OSPF multicast traffic to be filtered by the physical function
driver.
PAN-162374 Fixed an issue where the firewall rebooted unexpectedly and displayed
the following message: Reboot SYSTEM REBOOT Masterd
Initiated.
PAN-161940 Fixed an issue where the firewall did not honor the peer RX interval
timeout in a Bidirectional Forwarding Detection (BFD) INIT state.
PAN-157962 Fixed an issue where IPv6 prefixes were advertised via IPv4 BGP
peering when MP-BGP was not enabled.
PAN-OS Release Notes 10.1.9-h1 312 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.2.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
313
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 314 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-OS Release Notes 10.1.9-h1 315 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
2. You create address objects called AddressObjA in
the Shared, DG-A and DG-B device groups and add
AddressObjA to a Security policy rule under DG-A and
DG-B.
3. Later, you change the AddressObjA name in the Shared
device group to AddressObjB.
Changing the name of the address object in the Shared
device group causes the references in the Policy rule to use
the renamed Shared object instead of the device group
object.
PAN-OS Release Notes 10.1.9-h1 316 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
(Device > Scheduled Config Export), or the scp export
command in the CLI.
Workaround: Use RSA-based host keys on the destination
server.
PAN-OS Release Notes 10.1.9-h1 317 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
• Define URL exceptions for specific web sites—
PAN-178190 Traffic, threat, and URL logs are not viewable from the
firewall web interface (Monitor > Logs) and CLI after upgrade
to PAN-OS 10.1.2.
PAN-OS Release Notes 10.1.9-h1 318 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See to view the hardware ACL blocking setting and duration in the
PAN-OS 10.1.5 Addressed CLI using the commands:
Issues.
admin> show system setting hardware-acl-
blocking-enable
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.1.9-h1 319 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-OS Release Notes 10.1.9-h1 320 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-OS Release Notes 10.1.9-h1 321 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-OS Release Notes 10.1.9-h1 322 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
may fail when an EDL (Objects > External Dynamic Lists) is
configured to Check for updates every 5 minutes due to the
commit and EDL fetch processes overlapping. This is more
likely to occur when multiple EDLs are configured to check
for updates every 5 minutes.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-OS Release Notes 10.1.9-h1 323 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
Workaround: Load the configuration from running config
(load config from running-config.xml) and perform a commit.
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 324 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
Workaround: After you successfully downgrade a managed
firewall to PAN-OS 9.1, commit and push from Panorama to
remove the Enterprise DLP filtering settings and complete the
downgrade.
1. Downgrade your managed firewall to PAN-OS 9.1
2. Log in to the firewall web interface and view the Tasks
to verify all auto commits related to the downgrade have
completed successfully.
3. Log in to the Panorama web interface and Commit >
Commit and Push to your managed firewall downgraded to
PAN-OS 9.1.
PAN-OS Release Notes 10.1.9-h1 325 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 326 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
This behavior can be seen when the session is being set up
on a non-cache slot (for example, when a session distribution
policy is set to round-robin or session-load); it is caused by
the additional cache lookup that happens when HA cluster
participation is enabled.
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 327 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
Workaround: Panorama automatically restarts the VLD and
logd processes.
PAN-OS Release Notes 10.1.9-h1 328 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-OS Release Notes 10.1.9-h1 329 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
vsys traffic), the firewall cannot perform source NAT using
dynamic IP (DIP) address translation.
Workaround: Use source NAT with Dynamic IP and Port
(DIPP) translation on inter-vsys traffic.
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-OS Release Notes 10.1.9-h1 330 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
• Modify the PAN-DB Server IP address on the managed
firewall.
1. On the web interface, delete the PAN-DB Server IP
address (Device > Setup > Content ID > URL Filtering
settings).
2. Commit your changes.
3. Add the new M-500 Eth1/1 IP PAN-DB IP address.
4. Commit your changes.
• Restart the firewall (devsrvr) process.
1. Log in to the firewall CLI.
2. Restart the devsrvr process: debug software
restart process device-server
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 331 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
the Shared location instead of a specific virtual system.
Alternatively, you can select a preexisting certificate profile
instead of creating a new one.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-OS Release Notes 10.1.9-h1 332 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
PAN-OS Release Notes 10.1.9-h1 333 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 334 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 335 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
Use the Task Manager to verify that you are not performing
memory intensive tasks such as installing dynamic updates,
committing changes or generating reports, at the same time,
on the firewall.
PAN-OS Release Notes 10.1.9-h1 336 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
use Panorama to configure the worker node as a controller
node by adding the HA and cluster controller configurations,
configure an existing controller node as a worker node by
removing the HA configuration, and then commit and push
the configuration. Attempts to change cluster node roles from
Panorama results in a validation error—the commit fails and
the cluster becomes unresponsive.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller work
er-list <worker-ip-address>
PAN-OS Release Notes 10.1.9-h1 337 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
Panorama. The service advertisement can advertise that
DNS is or is not enabled.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 338 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
Workaround: To generate an on-demand report, click Run
Now when you configure the custom report.
PAN-OS Release Notes 10.1.9-h1 339 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
PAN-175685 (PA-7000 Series and PA-5450 firewalls only) Fixed an issue where
PAN-OS displayed the incorrect chassis serial number when an MPC
(Management Processor Card) or SMC (Switch Management Card) was
moved from one chassis to another.
PAN-174244 Fixed an issue where a sudden increase in URL data approached the
maximum cache capacity of the firewall.
PAN-174049 Fixed an issue where a process (authd) used old Thermite certificate
post renewals, which caused authentication failures when using the
Cloud Authentication service.
PAN-173903 Fixed an issue where clicking a hyperlink on a web page caused the
web browser to download a file instead.
PAN-172518 Fixed an issue where a race condition occurred and caused a process
(useridd) to restart.
PAN-172454 Fixed an issue where, when the firewall communicated with the Cloud
Identity Engine before the device certificate was installed on the
PAN-OS Release Notes 10.1.9-h1 340 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
firewall or Panorama, subsequent queries to the Cloud Identity Engine
failed.
PAN-172295 Fixed an issue where a HIP database cache loop caused high CPU
utilization on a process (useridd) and caused IP address-to-user
mapping redistribution failure.
PAN-171878 Fixed an issue with SD-WAN path selection logic that caused an
all_pktproc dataplane to stop responding.
PAN-171744 Fixed an issue where no data was displayed for the Forward
Error Correction (FEC) plot for SD-WAN application performance
(Panorama > SD-WAN > Monitoring).
PAN-170681 Fixed an issue where the data redistribution agent and the data
redistribution client failed to connect due to the agent not sending a
SSL Server hello response.
PAN-169566 Fixed an issue where configuration files were not exported using the
scheduled Secure Copy (SCP).
PAN-OS Release Notes 10.1.9-h1 341 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
subscription license, even though the gateway firewall had a
valid gateway license.
PAN-109759 Fixed an issue where the firewall did not generate a notification for
the GlobalProtect client when the firewall denied unencrypted TLS
sessions due to an authentication policy match.
PAN-161745 Fixed an issue where the time-to-live (TTL) value received from the
DNS server reset to 0 on DNS secure TCP transactions when anti-
spyware profiles were used, which caused DNS dynamic updates to
fail.
PAN-158958 Fixed an issue where the debug sslmgr view crl command failed
when an ampersand (&) character was included in the URL for the
certificate revocation list (CRL).
PAN-157518 Fixed an issue where using tags to target a device group in a Security
policy rule did not work, and the rule was displayed in all device groups
(Preview Rules).
PAN-157027 Fixed an issue where, when stateless GTP-U traffic hit a multi-
dataplane firewall, an inter-dataplane fragmentation loop occurred,
which caused high dataplane resource usage.
PAN-OS Release Notes 10.1.9-h1 342 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
Issue ID Description
PAN-136961 Fixed an issue where during QoS config generation the Aggregate
Ethernet (AE) subnets were incorrectly calculated cumulatively across
all AEs instead of calculating just the total subnets of an AE.
PAN-OS Release Notes 10.1.9-h1 343 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.2 Known and Addressed Issues
PAN-OS Release Notes 10.1.9-h1 344 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.1.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
345
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 346 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-OS Release Notes 10.1.9-h1 347 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
2. You create address objects called AddressObjA in
the Shared, DG-A and DG-B device groups and add
AddressObjA to a Security policy rule under DG-A and
DG-B.
3. Later, you change the AddressObjA name in the Shared
device group to AddressObjB.
Changing the name of the address object in the Shared
device group causes the references in the Policy rule to use
the renamed Shared object instead of the device group
object.
PAN-OS Release Notes 10.1.9-h1 348 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
(Device > Scheduled Config Export), or the scp export
command in the CLI.
Workaround: Use RSA-based host keys on the destination
server.
PAN-OS Release Notes 10.1.9-h1 349 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
• Define URL exceptions for specific web sites—
PAN-178190 Traffic, threat, and URL logs are not viewable from the
firewall web interface (Monitor > Logs) and CLI after upgrade
to PAN-OS 10.1.1.
PAN-175685 (PA-7000 Series and PA-5450 firewall only) When the MPC
(Management Processor Card) or SMC (Switch Management
This issue is now resolved. See
Card) is removed from one chassis and placed in another,
PAN-OS 10.1.2 Addressed
PAN-OS will incorrectly cache and display the chassis serial
Issues.
number of the former chassis.
PAN-OS Release Notes 10.1.9-h1 350 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-172492 You can create and commit a log forwarding profile (Objects
> Log Forwarding) with an invalid Filter.
This issue is now resolved. See
PAN-OS 10.1.2 Addressed
Issues.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.1.9-h1 351 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-172067 When you configure an HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-OS Release Notes 10.1.9-h1 352 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 353 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
of unique data objects is not generated when you click Run
Now.
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-OS Release Notes 10.1.9-h1 354 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-OS Release Notes 10.1.9-h1 355 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
Workaround: Log in to the Panorama web interface from
a web browser other than Safari to successfully activate a
license on managed firewalls in an HA configuration.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-OS Release Notes 10.1.9-h1 356 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 357 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
Workaround: Execute the command debug dataplane
pow status to view the number of channels being utilized
by the dataplane.
PAN-OS Release Notes 10.1.9-h1 358 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
Workaround: After successful downgrade to PAN-OS 9.1,
Remove Config (Panorama > Plugins) of the Panorama plugin
for Cisco TrustSec and then reconfigure the plugin.
PAN-OS Release Notes 10.1.9-h1 359 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
Workaround: Perform a force commit to push the attributes
in the content update to the firewall.
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 360 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
firewall does not cause the hub template stack to display as
out of sync, nor does modifying the BGP configuration on
the hub firewall cause the branch template stack as out of
sync.
Workaround: After performing a configuration change,
Commit and Push the configuration changes to all hub and
branch firewalls in the VPN cluster containing the firewall
with the modified configuration.
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-OS Release Notes 10.1.9-h1 361 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
management server resulting in a delay in a log query and
ingestion.
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-OS Release Notes 10.1.9-h1 362 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 363 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 364 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
Workaround: After you revert the Panorama configuration,
Commit (Commit > Commit to Panorama) the reverted
configuration to display the invalid configuration errors.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-OS Release Notes 10.1.9-h1 365 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
number because GlobalProtect gateways cannot identify the
serial numbers of these endpoints; these serial numbers do
not appear in the HIP report.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 366 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
Workaround: Disable GlobalProtect authentication cookies.
Alternatively, disable (clear) Retrieve user group from
RADIUS in the authentication profile and configure group
mapping from Active Directory (AD) through LDAP.
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 367 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
update or check the Palo Alto Networks Threat Vault to see
the minimum PAN-OS release version for a threat signature.
PAN-OS Release Notes 10.1.9-h1 368 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
Workaround: In PAN-OS 8.0.6 and later releases, you can
persistently disable session offload for only UDP traffic using
the set session udp-off load no CLI command.
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
PAN-OS Release Notes 10.1.9-h1 369 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
report their state as out-of-sync if either of the following
conditions exist:
• You did not configure a worker list to add at least one
worker node to the cluster. (In a two-node cluster, both
nodes are controller nodes configured as an HA pair.
Adding a worker node would make the cluster a three-
node cluster.)
• You did not configure a service advertisement (either by
enabling or not enabling advertising DNS service on the
controller nodes).
Workaround: There are three possible workarounds to sync
the controller nodes:
• After you import the two-node cluster into Panorama,
push the configuration from Panorama to the cluster. After
the push succeeds, Panorama reports that the controller
nodes are in sync.
• Configure a worker list on the cluster controller:
admin@wf500(active-controller)# set
deviceconfig cluster mode controller work
er-list <worker-ip-address>
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
PAN-OS Release Notes 10.1.9-h1 370 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 371 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
causing SSL functionality to be unavailable during the
delay.
• SafeNet Network—When losing connectivity to either
or both HSMs in an HA configuration, the display of
information from the show high-availability
state and show hsm info commands are blocked for
20 seconds.
PAN-OS Release Notes 10.1.9-h1 372 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
WF500-5568 Fixed an issue where a firewall in FIPS mode running PAN-OS 8.1.18
or a later version failed to connect with a WildFire appliance in normal
mode.
PAN-171898 (PA-5450 firewalls only) Fixed an issue where firewalls did not get full
10G throughput when traffic was sent from 100G or 40G interfaces to
10G interfaces.
PAN-171750 (PA-5450 firewalls only) Fixed an issue where the HSCI interface didn’t
recognize a hot-swapped 40G or 100G transceiver.
PAN-171703 Fixed an issue where GlobalProtect Activity did not display when a
device group was selected.
PAN-170936 Fixed an issue where the firewall egressed offloaded frames out of
order after an explicit commit (Commit on the firewall or Commit All
Changes on Panorama) or an implicit comment such as an Antivirus
update, Dynamic Update, or WildFire update.
Note This issue persists for a network-related configuration and
commit.
PAN-OS Release Notes 10.1.9-h1 373 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
PAN-170825 Fixed an issue where, when a partial Preview Change job failed, a
process (configd) stopped responding.
PAN-170610 Fixed an issue where SD-WAN SaaS monitoring traffic was incorrectly
dropped by a Security policy that included a deny rule.
PAN-170314 Fixed an issue where PAN-DB URL cloud updates failed because a
process (devsrvr) did not fetch serial numbers, which prevented the
PAN_DB URL cloud from connecting after first deployment.
PAN-169064 Fixed an issue where the management CPU remained at 100% due to
a large number of configured User-ID agents.
PAN-168920 (PA-5450 firewalls only) Fixed an issue where QoS didn’t honor the
guaranteed bandwidth for classes set to a Priority of real-time.
PAN-168418 Fixed an issue where, when an MLAV URL with an exception list was
configured and forward proxy was enabled, a process (all_pktproc)
repeatedly restarted, which resulted in the firewall rebooting.
PAN-167989 Fixed a timing issue between downloading and installing threads that
occurred when Panorama pushed content updates and the firewall
fetched content updates simultaneously.
PAN-166398 (PA-5450 firewalls only) Fixed an issue where, when you configured
path or latency monitoring on the Health Monitor tab in the packet
PAN-OS Release Notes 10.1.9-h1 374 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
Issue ID Description
broker profile (Objects > Packet Broker), the path health monitor was
disabled due to a configuration synchronization issue after a reboot.
PAN-165025 Fixed an issue where, when default interzone and intrazone Security
policy rules were overwritten, the rules did not display hit counts.
PAN-164707 (PA-7000 Series firewalls only) Fixed an issue where logs were not
viewable via the web interface in the Monitor tab or via the CLI.
PAN-158649 Fixed an issue where commits to the Prisma Access Remote networks
from Panorama were failing when the management server on the
cloud firewall failed to exit cleanly and reported the following error:
pan_check_cert_status(pan_crl_ocsp.c:284): sysd
write failed (TIMEOUT)
PAN-157715 Fixed an intermittent issue where SMB file transfer operations failed
due to packet drops that were caused by the Content and Threat
Detection (CTD) queue filling up quickly. This fix introduces a new CLI
command which, when enabled, prevent these failures: set system
setting ctd nonblocking-pattern-match-qsizecheck
[enable|disable].
PAN-154053 Fixed an issue where, when two or more PA-5450 fan assemblies
failed, the firewall shut down without providing a console or CLI error
message about the fan failure.
PAN-OS Release Notes 10.1.9-h1 375 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.1 Known and Addressed Issues
PAN-OS Release Notes 10.1.9-h1 376 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed
Issues
Review a list of known and addressed issues for PAN-OS 10.1.0.
For contacting support, for information on support programs, to manage your account
or devices, or to open a support case, go to https://support.paloaltonetworks.com.
377
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 378 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
APL-15000 When you move a firewall from one Cortex Data Lake
instance to another, it can take up to an hour for the firewall
to begin sending logs to the new instance.
APL-8269 For data retrieved from Cortex Data Lake, the Threat Name
column in Panorama > ACC > threat-activity appears blank.
WF500-5471 After using the firewall CLI to add a WildFire appliance with
an IPv6 address, the initial connection may fail.
Workaround: Retry connecting after you restart the web
server with the following command: debug software
restart process web-server.
PAN-OS Release Notes 10.1.9-h1 379 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
Workaround: Restart the mgmtsrvr process on the
Dedicated Log Collector.
1. Log in to the Dedicated Log Collector CLI.
2. Confirm the Dedicated Log Collector is disconnected from
Panorama.
PAN-OS Release Notes 10.1.9-h1 380 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 381 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
processes. The chances Panorama becomes unresponsive
increases the longer Panorama remains powered on.
Workaround: Reboot Panorama if it becomes unresponsive.
PAN-OS Release Notes 10.1.9-h1 382 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-175685 (PA-7000 Series and PA-5450 firewall only) When the MPC
(Management Processor Card) or SMC (Switch Management
This issue is now resolved. See
Card) is removed from one chassis and placed in another,
PAN-OS 10.1.2 Addressed
PAN-OS will incorrectly cache and display the chassis serial
Issues.
number of the former chassis.
PAN-175149 For the PA-220 firewall, and the PA-800 and PA-7000 Series
firewalls, the ACC and scheduled reports (Monitor > Manage
> Manage Custom Reports) erroneously display the IPv6
address instead of the IPv4 address.
PAN-OS Release Notes 10.1.9-h1 383 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See to view the hardware ACL blocking setting and duration in the
PAN-OS 10.1.5 Addressed CLI using the commands:
Issues.
admin> show system setting hardware-acl-
blocking-enable
PAN-172492 You can create and commit a log forwarding profile (Objects
> Log Forwarding) with an invalid Filter.
This issue is now resolved. See
PAN-OS 10.1.2 Addressed
Issues.
PAN-OS Release Notes 10.1.9-h1 384 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-172067 When you configure a HTTP server profile (Device > Server
Profiles > HTTP or Panorama > Server Profiles > HTTP), the
PAN-OS Release Notes 10.1.9-h1 385 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
Username and Password fields are always required regardless
of whether Tag Registration is enabled.
Workaround: When you configure an HTTP server profile,
always enter a username and password to successfully create
the HTTP server profile.
You must enter a username and password even if the HTTP
server does not require it. The HTTP server ignores the
username and password if they are not required for the
firewall to connect.
PAN-164707 For PA-7000 Series Legacy firewalls, you are unable to view
logs (Monitor) on the web interface or in the CLI (show log
This issue is now resolved. See
<logtype>)
PAN-OS 10.1.1 Addressed
Issues. Workaround: Log in to the firewall CLI and restart the vldmgr
process.
PAN-171898 PA-5450 firewalls may not get full 10G throughput when
traffic is sent from 100G/40G interfaces to 10G interfaces.
This issue has been resolved.
See PAN-OS 10.1.1
Addressed Issues.
PAN-OS Release Notes 10.1.9-h1 386 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.1.9-h1 387 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-171145 If you edit or remove the value for the mail attribute in
your on-premise Active Directory, the changes may not be
immediately reflected on the firewall after it syncs with the
Cloud Identity Engine.
PAN-170923 In Policies > Security > Policy Optimizer > New App Viewer,
when you select a Security policy rule in the bottom portion
of the screen, the application data in the application browser
(top portion of screen) does not match the Apps Seen on the
selected rule. In addition, filtering in the application browser
based on Apps Seen does not work.
PAN-OS Release Notes 10.1.9-h1 388 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-167847 If you issue the command opof stats, then clear the
results {opof stats -c}, the Active Sessions value is sometimes
invalid. For example, you might see a negative number or an
excessively large number.
Workaround: Re-run the opof stats command after the
offload completes.
PAN-OS Release Notes 10.1.9-h1 389 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-165669 If you configure a group that the firewall retrieves from the
Cloud Identity Engine as the user in value in a filter query,
Panorama is unable to retrieve the group membership and
as a result, is unable to display this data in logs and custom
reports.
PAN-OS Release Notes 10.1.9-h1 390 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
firewalls in a high availability (HA) configuration causes the
Safari web browser to become unresponsive.
Workaround: Log in to the Panorama web interface from
a web browser other than Safari to successfully activate a
license on managed firewalls in an HA configuration.
PAN-164586 If you use a value other than mail for the user or group
email attribute in the Cloud Identity Engine, it displays in
user@domain format in the CLI output.
PAN-162836 On the VM-Series firewall, if you select Device > Licenses >
Deactivate VM a popup window opens and you can choose
Subscriptions or Support and press Continue to remove
licenses and register the changes with the license server.
When the license removal is complete the Deactivate VM
window does not update its text to exclude deactivated
licenses or close the window.
Workaround: Wait until the license deactivation is complete,
and click Cancel to close the window.
PAN-OS Release Notes 10.1.9-h1 391 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See synchronized to the passive HA peer when you Install a
PAN-OS 10.1.9 Addressed content update and enable Sync to HA Peer.
Issues.
PAN-161451 If you issue the command opof stats, there are occasional
zero packet and byte counts coming from the DPDK
counters. This occurs when a session is in the tcp-reuse state,
and has no impact on the existing session.
PAN-OS Release Notes 10.1.9-h1 392 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
1. Downgrade your managed firewall to PAN-OS 9.1
2. Log in to the firewall web interface and view the Tasks
to verify all auto commits related to the downgrade have
completed successfully.
3. Log in to the Panorama web interface and Commit >
Commit and Push to your managed firewall downgraded to
PAN-OS 9.1.
PAN-OS Release Notes 10.1.9-h1 393 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
Workaround: After successful downgrade, reconfigure the
Group By setting in the custom report.
PAN-154053 If two or more PA-5450 fan assemblies fail, the firewall shuts
down without providing a console or CLI error message about
This issue has been resolved.
the fan failure.
See PAN-OS 10.1.1
Addressed Issues.
PAN-OS Release Notes 10.1.9-h1 394 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
This behavior can be seen when the session is being set up
on a non-cache slot (for example, when a session distribution
policy is set to round-robin or session-load); it is caused by
the additional cache lookup that happens when HA cluster
participation is enabled.
PAN-148971 If you enter a search term for Events that are related to IoT
in the System logs and apply the filter, the page displays an
Invalid term error.
Workaround: Specify iot as the Type Attribute to filter the
logs and use the search term as the Description Attribute. For
example: ( subtype eq iot ) and ( description
contains 'gRPC connection' ).
PAN-OS Release Notes 10.1.9-h1 395 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
Workaround: Panorama automatically restarts the VLD and
logd processes.
PAN-OS Release Notes 10.1.9-h1 396 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-143132 Fetching the device certificate from the Palo Alto Networks
Customer Support Portal (CSP) may fail and displays the
following error in the CLI:
ERROR Failed to process S1C msg: Error
Workaround: Retrying fetching the device certificate from
the Palo Alto Networks CSP.
PAN-134053 ACC does not filter WildFire logs from Dynamic User Groups.
PAN-OS Release Notes 10.1.9-h1 397 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
vsys traffic), the firewall cannot perform source NAT using
dynamic IP (DIP) address translation.
Workaround: Use source NAT with Dynamic IP and Port
(DIPP) translation on inter-vsys traffic.
PAN-127206 If you use the CLI to enable the cleartext option for the
Include Username in HTTP Header Insertion Entries feature,
the authentication request to the firewall may become
unresponsive or time out.
PAN-123277 Dynamic tags from other sources are accessible using the CLI
but do not display on the Panorama web interface.
PAN-120423 PAN-OS 10.0.0 does not support the XML API for
GlobalProtect logs.
PAN-OS Release Notes 10.1.9-h1 398 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
• Modify the PAN-DB Server IP address on the managed
firewall.
1. On the web interface, delete the PAN-DB Server IP
address (Device > Setup > Content ID > URL Filtering
settings).
2. Commit your changes.
3. Add the new M-500 Eth1/1 IP PAN-DB IP address.
4. Commit your changes.
• Restart the firewall (devsrvr) process.
1. Log in to the firewall CLI.
2. Restart the devsrvr process: debug software
restart process device-server
PAN-116017 (Google Cloud Platform (GCP) only) The firewall does not
accept the DNS value from the initial configuration (init-cfg)
file when you bootstrap the firewall.
Workaround: Add DNS value as part of the bootstrap.xml in
the bootstrap folder and complete the bootstrap process.
PAN-OS Release Notes 10.1.9-h1 399 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
the Shared location instead of a specific virtual system.
Alternatively, you can select a preexisting certificate profile
instead of creating a new one.
PAN-111729 If you disable DPDK mode and enable it again, you must
immediately reboot the firewall.
PAN-OS Release Notes 10.1.9-h1 400 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-109526 The system log does not correctly display the URL for
CRL files; instead, the URLs are displayed with encoded
characters.
PAN-101537 After you configure and push address and address group
objects in Shared and vsys-specific device groups from
the Panorama management server to managed firewalls,
executing the show log <log-type> direction
equal <direction> <dst> | <src> in <object-
name> command on a managed firewall only returns address
PAN-OS Release Notes 10.1.9-h1 401 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
and address group objects pushed form the Shared device
group.
Workaround: Specify the vsys in the query string:
admin> set system target-vsys <vsys-name>
admin> show log <log-type> direction equal
<direction> query equal ‘vsys eq <vsys-name>’
<dst> | <src> in <object-name>
PAN-OS Release Notes 10.1.9-h1 402 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
accounts that you create in PAN-OS 8.0.9 or a later release
do not require you to change the passwords to apply
password profile settings.)
PAN-94093 HTTP Header Insertion does not work when jumbo frames
are received out of order.
PAN-OS Release Notes 10.1.9-h1 403 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
Workaround: When the firewall performs slowly, or you see
a critical System log for memory utilization, wait for 5 minutes
and then manually reboot the firewall.
Use the Task Manager to verify that you are not performing
memory intensive tasks such as installing dynamic updates,
committing changes or generating reports, at the same time,
on the firewall.
PAN-OS Release Notes 10.1.9-h1 404 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
PAN-73530 The firewall does not generate a packet capture (pcap) when a
Data Filtering profile blocks files.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller work
er-list <worker-ip-address>
PAN-OS Release Notes 10.1.9-h1 405 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
• Configure service advertisement on the local CLI of the
cluster controller and then import the configuration into
Panorama. The service advertisement can advertise that
DNS is or is not enabled.
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
yes
or
admin@wf500(active-controller)# set
deviceconfig cluster mode controller serv
ice-advertisement dns-service
enabled
no
PAN-70906 If the PAN-OS web interface and the GlobalProtect portal are
enabled on the same IP address, then when a user logs out of
the GlobalProtect portal, the administrative user is also logged
out from the PAN-OS web interface.
Workaround: Use the IP address to access the PAN-OS web
interface and an FQDN to access the GlobalProtect portal.
PAN-OS Release Notes 10.1.9-h1 406 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
Issue ID Description
scheduled reports; on-demand reports include all data within
the specified Time Frame.
Workaround: To generate an on-demand report, click Run
Now when you configure the custom report.
PAN-OS Release Notes 10.1.9-h1 407 ©2023 Palo Alto Networks, Inc.
PAN-OS 10.1.0 Known and Addressed Issues
PAN-OS Release Notes 10.1.9-h1 408 ©2023 Palo Alto Networks, Inc.
Related Documentation
Review the related documentation for PAN-OS 10.1.
To provide feedback on the documentation, write to us at:
[email protected].
409
Related Documentation
PAN-OS Release Notes 10.1.9-h1 410 ©2023 Palo Alto Networks, Inc.