Pan Os Release Notes
Pan Os Release Notes
10.2.12
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2021-2024 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
October 1, 2024
Limitations..........................................................................................................35
Limitations in PAN-OS 10.2................................................................................................... 36
7
Features Introduced in PAN-OS 10.2
Inline Deep Learning Analysis for The Advanced URL Filtering cloud now leverages a new
Advanced URL Filtering inline deep learning engine that analyzes suspicious
web page content to protect users against zero-day
web attacks. By employing cloud-based inline web page
payload analysis, Advanced URL Filtering is capable
of detecting and preventing advanced and targeted
phishing attacks, and other web-based attacks that use
advanced evasion techniques such as cloaking, multi-
step attacks, CAPTCHA challenges, and previously
unseen one-time-use URLs.
HTTP Header Expansion HTTP header insertion has been enhanced to support
header values up to 16K bytes. You can now specify
more tenants to which you restrict access and better
manage access to applications with longer header
values in a single HTTP header insertion entry.
Panorama Features
New Panorama Feature Description
Zero Touch Provisioning 2.0.3 The Zero Touch Provisioning (ZTP) Plugin 2.0.3 release
includes minor bug and performance fixes.
PAN-OS 10.2.4 and later releases
Automatic Content Push for VM- Eliminate the operational overhead required to
Series and CN-Series Firewalls regenerate your VM-Series and CN-Series firewall
images with the latest content updates. Enable this
feature to automatically push content updates when
onboarding new VM-Series and CN-Series firewalls to
the Panorama management server. When leveraging
Auto Scale, you can maintain existing dynamic content
(such as for policy rules using App-ID) in the image
configurations.
Log Collector Health Monitoring on PAN-OS 10.2 introduces the ability to monitor
Panorama health metrics for your managed Log Collectors from
a centralized location. This helps you assess the
operational performance of a Log Collector to easily
identify and resolve any issues as soon as they arise.
Networking Features
New Networking Feature Description
Authenticate LSVPN Satellite with You can now onboard a remote satellite using the
Serial Number and IP Method combination of serial number and IP address in
addition to the username/password and satellite cookie
(PAN-OS 10.2.8 and later 10.2
authentication method. This authentication method
releases)
reduces the complexity by enabling you to perform
software upgrade and deploy new firewalls without
manual intervention.
Improved Throughput with Lockless The Palo Alto Networks QoS implementation now
QoS supports a new QoS mode called lockless QoS for
PA-3410, PA-3420, PA-3430, PA-3440, PA-5410,
(PAN-OS 10.2.5 and later 10.2
PA-5420, and PA-5430 firewalls. For firewalls with
releases)
higher bandwidth QoS requirements, the lockless QoS
dedicates CPU cores to the QoS function that improves
QoS performance, resulting in improved throughput and
latency.
Software Cut-Through Support for The PA-5410, PA-5420, PA-5430, and PA-3400 Series
PA-5410, PA-5420, PA-5430, and firewalls have significantly improved latency.
PA-3400 Series Firewalls
(PAN-OS 10.2.5 and later 10.2
releases)
LSVPN Cookie Expiry Extension You can now configure the cookie expiration period
from 1 to 5 years, while the default remains as 6
(PAN-OS 10.2.4 and later 10.2
months. The encrypted cookie stored on an Large Scale
releases)
VPN (LSVPN) satellite expires after every 6 months.
This causes the VPN tunnels associated with the
satellite to go down, causing an outage until the satellite
is re-authenticated to the LSVPN portal or gateway and
a new cookie is generated. A re-authentication every
six months causes administrative overhead, affecting
productivity, network stability, and resources of the
company.
To reduce administrative overhead, we’ve extended the
cookie expiration period from 6 months to 5 years.
Increased Maximum Number of (PA-3400 Series firewalls only) The maximum number
Security Zones for PA-3400 Series of security zones supported on the PA-3410 and
Firewalls PA-3420 firewalls has increased from 40 to 200. The
maximum number of security zones supported on the
(PAN-OS 10.2.4 and later 10.2
PA-3430 firewall has increased from 100 to 200.
releases)
Poll Timeout Improvement for The PA-3400 and PA-5400 Series firewalls have
PA-3400 and PA-5400 Series improved latency when operating under low load.
Firewalls
(PAN-OS 10.2.4 and later 10.2
releases)
Persistent NAT for DIPP One type of source NAT is Dynamic IP and Port (DIPP).
Some applications, such as VoIP, video, and others,
(PAN-OS 10.2.4 and later 10.2
use DIPP and may require Session Traversal Utilities
releases)
for NAT (STUN) protocol. DIPP NAT uses symmetric
NAT, which may have compatibility issues with STUN.
To alleviate those issues, persistent NAT for DIPP
provides additional support for connectivity with such
applications. When you enable persistent NAT for DIPP,
the binding of a private source IP address and port to a
specific public (translated) source IP address and port
persists for subsequent sessions that arrive having that
same original source IP address and port.
IPv4 Multicast for Advanced The Advanced Routing Engine supports IPv4 multicast
Routing Engine on logical routers. This engine supports PIM sparse
mode (PIM-SM), PIM source-specific mode (PIM-SSM),
(PAN-OS 10.2.2 and later 10.2
and Internet Group Management Protocol (IGMP)
releases)
on NGFW interfaces. You can also configure static
routes over which to reverse-path forward (RPF)
from the NGFW to the source. In line with the other
routing protocols, multicast routing relies on profiles to
parameterize PIM and IGMP. Unlike the legacy routing
engine, which supports IGMPv1, the Advanced Routing
Engine instead supports IGMP static joins for devices
that do not support IGMPv2 or IGMPv3.
Security Policy Rule Top-Down When a packet with an IP address matches prefixes
Order When Wildcard Masks in Security policy rules that have overlapping wildcard
Overlap masks, you can have the firewall choose the first fully
matching rule in top-down order (rather than match
(PAN-OS 10.2.1 and later 10.2
the rule with the longest prefix in the mask). Thus,
releases)
more than one rule has the potential to be enforced on
different packets.
Advanced Routing Engine PAN-OS 10.2 offers an advanced routing engine that
uses an industry-standard configuration methodology
to reduce your learning curve. It allows the creation
of profile-based filtering lists and conditional route
maps, all of which can be used across logical routers.
These profiles provide finer granularity to filter routes
for each dynamic routing protocol and improve route
redistribution across multiple protocols.
New BGP Capabilities The Advanced Routing Engine provides new BGP
capabilities:
• Suppress/unsuppress map
• BGP backdoor
• Fast failover
• Advanced filtering
• Replace AS, allow AS, and no-prepend support for
import rules
• Increased character limit to 64 in the AS Path regular
expression field for BGP Export rule
• Enhanced community support
• Ability to select Exact in conditional advertising
• Conditional advertisements based on learned routes
• More granular filter on the prefix match in export/
import rules
New OSPFv3 and OSPFv2 The Advanced Routing Engine provides new OSPFv3
Capabilities and OSPFv2 capabilities:
• Granular administrative distance
• Advanced inter-area filtering to limit what is
imported to and exported from an OSPF area
• Redistribution using a route map
• New action on range command to substitute a route
• Redistribute only default route from OSPF to RIP
• MTU-ignore for OSPF interfaces
GlobalProtect Features
New GlobalProtect Feature Description
SAML/CAS ACS Landing Page You can now customize the SAML/CAS ACS landing
Customization page displayed on the default browser when you
are using the SAML/CAS authentication method
to authenticate to the GlobalProtect app. You can
configure to rebrand or debrand the SAML/CAS ACS
landing page on the default browser by using command-
line interface (CLI) commands. By default, the feature is
not enabled for the app.
Management Features
New Management Feature Description
Policy Rulebase Management Using Tags allows you the ability to visually group your policy
the Tag Browser rulebase. PAN-OS 10.2.5 introduces the Tag Browser
which allows you to manage your policy rulebase using
PAN-OS 10.2.5 and later releases
the applied tags, and thereby simplifies policy rulebase
management.
AIOps for NGFW Streamline your firewall operations with AIOps for
NGFW, a new product offered on the hub. AIOps
for NGFW leverages PAN-OS device telemetry and
best practice assessments to give you up-to-date
information about device health and security posture.
This information includes alerts, interactive dashboards,
remediation recommendations, and more.
Strata Cloud Manager Command The Strata Cloud Manager Command Center is your
Center new NetSec homepage; it is your first stop to assess
the health, security, and efficiency of your network.
In a single view, the command center shows you all
users and IoT devices accessing the internet, SaaS
applications, and private apps, and how Prisma Access,
your NGFWs, and your security services are protecting
them.
View Preferred and Base Releases The Panorama web interface now displays the preferred
of PAN-OS Software releases and the corresponding base releases of PAN-
OS software. Before you upgrade or downgrade
PAN-OS 10.2.10 and later 10.2
Panorama or PAN-OS, you can view the list of preferred
releases
and base releases and choose your preferred target
PAN-OS release. Preferred releases offer the latest and
the most advanced features and ensure stability and
performance. When there are no preferred releases
available, the corresponding base version is not
displayed. If necessary, you can choose to view either
preferred releases or base releases.
Decryption Features
New Decryption Feature Description
Multiple Certificate Support for SSL SSL Inbound Inspection has been improved to prevent
Inbound Inspection traffic disruption and strengthen network security while
you update your internal servers and firewalls with new
server certificates. You no longer need to disable the
decryption of inbound SSL traffic to reduce downtime
during the replacement process. You can now add
multiple certificates to an SSL Inbound Inspection
decryption policy rule to ensure a valid certificate is
always available.
App-ID Features
New App-ID Feature Description
Simplified IoT Onboarding When onboarding IoT Security, you can now select
a predefined Log Forwarding profile and apply it
to multiple Security policy rules. This simplifies the
previous onboarding process where you had to create a
Log Forwarding profile and apply it individually to each
Security policy rule.
Data Collection for IoT Security You can now collect data for devices whose traffic
doesn’t pass through a firewall by mirroring their
traffic on network switches and sending it to the
firewall through an Encapsulated Remote Switched
Port Analyzer (ERSPAN) tunnel. After the firewall
decapsulates the traffic, PAN-OS logs the traffic the
same as if it had terminated on a TAP port. The firewall
then sends the logs to the logging service where IoT
Security accesses and analyzes it.
New Deployment Option for GTP The new deployment option for GTP security provides
Security in 3G/4G Networks subscriber-level and equipment-level visibility and
security policy control for combined 3G and 4G/LTE
networks and supports GTP stateful inspection and
IMSI/IMEI correlation in network topologies with a
combo node of combined serving gateway (SGW)
and packet data network gateway (PGW). To ensure
continuous traffic security for users during handovers
between 3G and 4G/LTE in these network topologies,
this feature now supports the Gn [mobility management
entity (MME)-serving GPRS support node (SGSN)]
interface in addition to the existing GTP security options.
Mobile Network Security Support As more enterprises adopt private 5G networks and
on New Mid-Range Hardware multi-access edge computing (MEC), this transition
Platforms provides new opportunities for attacks. To secure these
new environments, you can now use the industry's
only 5G-native security to deploy a Zero Trust-based
architecture. Palo Alto Networks now supports mobile
network security features such as 5G Subscriber ID
Security, 5G Equipment ID Security, 5G MEC Security,
and 4G/ LTE Security features in a new range of next-
generation firewalls: the PA-3440, PA-3430, PA-5430,
PA-5420 and PA-5410 (in addition to the PA-5200
series, the PA-5450, and the PA-7000 series).
Authentication Features
New Authentication Feature Description
Virtualization Features
New Virtualization Feature Description
CN-Series Firewall as a Kubernetes You can now deploy the Palo Alto Networks Container
CNF Native Firewalls (CN-Series) as a Container Network
Function (CNF) to protect containerized as well as non-
containerized workloads. This is a new deployment mode
for the CN-Series firewall that augments the previously
released CN-Series-as-a-daemonset and CN-Series-
as-a-kubernetes service deployment modes, limited to
protecting only container workloads.
Deploying the CN-Series-as-a-Kubernetes-CNF allows
customers to run CN-Series in Layer-3 mode. This
enables customers to steer the traffic to CN-Series from
even non containerized sources. You can build resilient
network security by deploying CN-Series in an HA pair.
In the CNF mode of deployment, you can take advantage
of I/O acceleration techniques such as DPDK and SR-
IOV to boost the firewall performance.
High Availability Support for CN- You can now deploy the CN-Series as a kubernetes CNF
Series Firewall as a Kubernetes in High Availability (HA) mode. This deployment mode
CNF currently supports active/passive HA with session and
configuration synchronization.
DPDK support for CN-Series The Kubernetes CNF mode of CN-Series now supports
Firewall Data Plane Development Kit (DPDK) and allows the
application pods to use DPDK. DPDK provides a simple
framework for fast packet processing in dataplane
applications.
You can set up DPDK on on-premises worker nodes and
AWS EKS cluster.
Daemonset(vwire) IPv6 Support Using the Daemonset mode, you can now secure the
interfaces of application pods having IPv6 IP addresses.
L3 IPv4 Support for CN-Series With the Kubernetes CNF, CN-Series now supports L3
Policy Based Routing (PBR) with IPv4 IP addresses. The
IP addresses to the interfaces in K8s environment are
typically programmed through the CNI using DHCP.
IPv6 DAG Plugin Support With the Kubernetes 3.0.0 plugin, you can now validate
(Kubernetes 3.0.0 Plugin) Service account files, view detailed dashboards, push IP
addresses for tags used in Security Policies (Tag Pruning),
and retrieve IPv6 addresses that can be used in a Multus
CNI setup.
47 Dataplane Cores Support for Starting with PAN-10.2, the VM-Series and CN-Series
VM-Series and CN-Series Firewalls firewalls support a maximum of 47 dataplane cores; an
increase from the previous maximum of 31.
Elastic Memory Profile Beginning with PAN-OS 10.2, the maximum number of
sessions and capacity supported on an individual VM-
Series firewall scales with the increase in the amount of
memory allocated to the VM-Series instance.
Hardware Features
New Hardware Feature Description
PA-5410, PA-5420, and PA-5430 The new PA-5400 Series models provide the highest
Firewalls fixed form-factor firewalls in the Palo Alto Networks
NGFW portfolio. These firewalls offer comprehensive
security capabilities and high capacity interfaces for
use cases that include large enterprise data centers,
Internet gateways, and large campus environments.
M-300 and M-700 Appliances These new M-Series models are multi-functional
appliances that you can configure to run in
Panorama™ Management mode, Panorama
Management-only mode, Panorama Log Collector
mode, or PAN-DB Private Cloud mode. These models
include the following main features when compared to
the M-200 and M-600 appliances:
• Improved responsiveness with faster CPU and more
memory
• Increased log ingestion rate
• Support for larger configuration sizes
New Application Support Enterprise DLP now supports the following new applications.
Requires DLP plugin 3.0.4 or Firewalls leveraging Enterprise DLP must be running PAN-
later release OS 10.2.4 or later release and have Apps & Threats content
version 8684-7912 installed.
• Google Drive Web
• Microsoft OneDrive Desktop - Business
Expanded Download Support Enterprise DLP now supports download inspection for the
for Existing Applications following applications.
Requires DLP plugin 3.0.4 or Requires DLP plugin 3.0.4 or later release and have Apps &
later release Threats content version 8684-7912 installed.
• Box Desktop - Business
• Microsoft SharePoint Desktop
• Microsoft SharePoint Web
• Naver Mail Web
• Salesforce Web
Expanded File Size Support for Enterprise DLP now supports large file inspection for the
Existing Applications following applications.
Requires DLP plugin 3.0.4 or Firewalls leveraging Enterprise DLP must be running PAN-
later release OS 10.2.4 or later release and have Apps & Threats content
version 8684-7912 installed.
• Microsoft OneDrive Desktop - Personal
Large File Inspection for Box Enterprise DLP now supports upload inspection of files up
and Web Browsing to 100MB in size for the Box Web App and Web Browsing
applications.
Requires DLP plugin 3.0.3 or
later release
Proxy Support for Enterprise Enterprise DLP now supports connectivity to the DLP cloud
DLP service when the Panorama management server uses a Proxy
for its outbound internet connection.
Requires DLP plugin 3.0.3 or
later release
Support for HTTP/2 Traffic Enterprise DLP now supports inspection of file and non-file
Inspection based HTTP/2 traffic.
Web Form Data Inspection More data is being exchanged in non-file formats that
for Enterprise Data Loss leverage collaboration applications, web forms, Cloud
Prevention applications, and social media. PAN-OS 10.2 supports
inspection of non-file format traffic to strengthen your
Requires DLP plugin 3.0.1 or
security posture and prevent exfiltration of sensitive data.
later release
29
Changes to Default Behavior
Feature Change
Managed Device Traffic to Panorama PAN-OS 10.2 uses TLS version 1.3 to encrypt
the service certificate and handshake messages
between Panorama, managed firewalls, and
Dedicated Log Collectors. As a result, the App-
ID traffic between Panorama, managed firewalls,
and Dedicated Log Collectors is reclassified from
panorama to ssl.
As a result, a Security policy rule is required to
allow the ssl application. This allows Panorama,
managed firewalls, and Dedicated Log Collectors
to continue communication after successful
upgrade to PAN-OS 10.2. Review the Ports
Used for Panorama for more information on the
destination ports required for managed device
communication with Panorama.
Feature Change
display the error <object-name> is already
in use.
The following configurations cannot be added to
the Shared Panorama location and are replicated
to the Panorama location of each vsys of a multi-
vsys firewall.
• Pre and Post Rules
• External Dynamic Lists (EDL)
• Security Profile Groups
• HIP objects and profiles
• Custom objects
• Decryption profiles
• SD-WAN Link Management Profiles
Advanced Routing Engine and BFD On a firewall with Advanced Routing enabled,
BFD session establishment for iBGP peers is
changed. Any iBGP peers over a loopback address
are not considered to be directly connected and
therefore should enable the multihop option in
Feature Change
the BFD profile and specify Minimum Rx TTL
accordingly.
Auto Web Interface Refresh for XML API When making successful XML API calls on a
firewall, the web interface will refresh after an
PAN-OS 10.2.5 and later releases
interval of 10 seconds.
Selective Push for Prisma Access Pushing selective configuration changes to Prisma
(Panorama Managed) Access in Panorama Managed Prisma Access
deployments is no longer supported.
PAN-OS 10.2.2 and later releases
To push selective configuration changes to Prisma
Access:
1. Commit > Commit to Panorama and select
only the configuration changes you want to
push.
2. Push your configuration changes to Prisma
Access.
Scheduled Log Export Scheduled log exports (Device > Log Export) may
not export logs as scheduled if multiple logs are
scheduled to export at the same time.
Workaround: When scheduling your log exports,
maintain at least 6 hours between each scheduled
log export.
Test SCP Server Connection To test the SCP server connection when you
schedule a configuration export (Panorama >
PAN-OS 10.2.4 and later releases
Schedule Config Export) or log export (Device >
Scheduled Log Export), a new pop-up window is
displayed requiring you to enter the SCP server
clear textPassword and Confirm Password to test
the SCP server connection and enable the secure
transfer of data.
You must also enter the clear text SCP server
Password and Confirm Password when you test
the SCP server connection from the firewall or
Panorama CLI.
admin>test scp-server-connection
initiate <ip> username <username>
password <clear-text-password>
Enterprise data loss prevention (DLP) After successful upgrade to PAN-OS 10.2.4 with
Predefined Data Filtering Profiles Panorama plugin for Enterprise DLP 3.0.4 or later
release installed, the default File Direction for
Feature Change
predefined data filtering profiles (Objects > DLP >
Data Filtering Profiles) is Both.
Authentication for SAML and client In PAN-OS 9.1 and earlier versions, if you
certificate configured client certificate authentication, the
firewall applied the policy rule using the domain
of the certificate.
In PAN-OS 10.2 and later versions, if you
configure both SAML authentication and client
certificate authentication, the firewall applies the
policy rule using the SAML domain.
If you do not configure the SAML domain
when using both SAML and client certificate
authentication, the firewall may not be able to
authenticate users successfully.
If the SAML username differs from the certificate
username, delete the username from the client
certificate profile and commit the changes;
otherwise, authentication is not successful.
35
Limitations
Issue ID Description
PAN-240517 Enter any random username and password (or just press
enter) in the pop-up dialog on the satellite to retrigger
the authentication process in the following cases:
• A scenario where the portal is running PAN-OS
10.2.8 and the satellite is running version earlier to
10.2.8, and the satellite cookie has expired. In this
case, when you attempt to enable the serial number
and IP address authentication method without
adding the satellite IP address in the IP allow list on
the portal, satellite authentication fails. The failure is
due to a missing IP address in the IP allow list.
• A scenario where the portal is running PAN-OS
10.2.8 and the satellite is running version earlier to
10.2.8, if the satellite cookie expires before enabling
the serial number and IP address authentication
method on the portal, satellite authentication will fail
due to satellite cookie expiration.
Issue ID Description
• PA-410, PA-440, PA-450, and PA-460 firewalls
• PA-1400 Series firewalls
• PA-3400 Series firewalls
• PA-5410, PA-5420, and PA-5430 firewalls
• PA-5450 firewall
To disable, log in to the firewall CLI or Panorama CLI
and enter the following command:
Issue ID Description
This issue is now resolved. See management interface. Configuring both interfaces in
PAN-OS 10.2.2 Addressed Issues. the same subnetwork can cause connectivity issues
and result in the wrong interface being used for log
forwarding.
admin> configure
admin# commit
39
Associated Content and Software Versions
Palo Alto Networks Software or Minimum Compatible Version with PAN-OS 10.2
Content Release Version
Panorama 10.2
• Each upgraded Panorama plugin supports both existing firewalls and PAN OS 10.2
firewalls.
• The VM-Series plugin is required only for Azure deployments and not for any other
Panorama plugins.
Plugin Name Upgrade/ Base PAN-OS Base Plugin Target PAN- Target Plugin
Downgrade Version OS Version
AWS
Plugin
2.x.x
should
be
upgraded
to
3.0.x
in
PAN
OS
10.1.x
before
upgrading
to
PAN
OS
10.2.0
Plugin Name Upgrade/ Base PAN-OS Base Plugin Target PAN- Target Plugin
Downgrade Version OS Version
Downgrading
is
not
possible
until
the
Azure
Plugin
3.2.x
is
released.
Plugin Name Upgrade/ Base PAN-OS Base Plugin Target PAN- Target Plugin
Downgrade Version OS Version
If
you
have
a
custom
certificate
size
greater
than
32k,
the
auto
commit
(which
happens
after
downgrade)
will
fail.
To
avoid
this,
you
can
save
the
config
file,
add
a
dummy
value
in
the
custom
certificate
which
is
less
than
16K
and
then
downgrade
to
2.0.x(k8s
plugin
cannot
contact
the
PAN-OS Release Notes 10.2.12 44 ©2024 Palo Alto Networks, Inc.
API
server).
You
Associated Content and Software Versions
Plugin Name Upgrade/ Base PAN-OS Base Plugin Target PAN- Target Plugin
Downgrade Version OS Version
• * This WildFire guest VM image comes preinstalled and is not available on the Palo Alto
Networks Support Portal for download.
• ** This WildFire analysis environment is not selectable through the WildFire appliance
CLI.
47
PAN-OS 10.2.12 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
Issue ID Description
Issue ID Description
• Allow user to disconnect GlobalProtect App > Allow with
Passcode
• Allow user to Disable GlobalProtect App > Allow with
Passcode
• Allow User to Uninstall GlobalProtect AppAllow with
Password
Issue ID Description
Issue ID Description
• Downgrade Panorama to PAN-OS 10.1 and downgrade
the Enterprise DLP plugin to version 1.0.
Workaround: Log in to the Panorama CLI and reset the DLP
plugin.
admin > request plugins dlp reset
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
Issue ID Description
Issue ID Description
maintenance mode. HA Pairs of Active-Passive and Active-
Active firewalls are not affected.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-264680 (PA-220 firewalls only) Fixed an issue where Device > Setup was not
displayed on the web interface.
PAN-263226 Fixed an issue where, when SSL decryption was enabled and Client
Hello messages spanned multiple TCP segments, some SSL decrypted
sessions failed.
PAN-262593 Fixed an issue where traffic to websites failed on the Google Chrome
web browser on Secure Web Gateway (SWG) nodes.
PAN-261991 Fixed an issue where traffic that did not match a decryption policy
rule, or matched a no-decrypt policy rule, failed when accumulation
proxy was enabled and a Zone Protection profile was configured with
syn-cookies enabled.
PAN-261917 Fixed an issue where websites with a no-decrypt policy rule were
decrypted in traffic log when using a Google Chrome browser with
PQC enabled.
PAN-261484 Fixed an issue on the firewall where DPDK allocated twice the amount
of memory as requested for pre-allocation.
PAN-260738 Fixed an issue on the Panorama web interface where the progress bar
did not complete when importing a vulnerability profile configuration
through an XML file.
PAN-260149 Fixed an issue where the management plane DNS cache size was
lower than expected.
Issue ID Description
PAN-259883 Fixed an issue where the firewalls behind an Amazon Web Services
(AWS) Gateway Load Balancer (GWLB) stopped responding when
processing GENEVE packets with the reserved bit set.
PAN-257994 (CN-Series firewalls only) Fixed an issue where commits failed with the
error failed to handle CONFIG_UPDATE_START due to cfgdb
files for the container not being symbolically linked to the cfgdb files
on the virtual machine.
PAN-257652 Fixed an issue where Internal Host Detection for IPv6 did not work
after upgrading to a PAN-OS 10.2 release.
PAN-255611 Fixed an issue on the firewall where newly added routes were not
automatically sorted based on subnets when added to a redistribution
profile.
PAN-255509 (PA-5450 firewalls only) Fixed an issue where BFD sessions flapped
intermittently.
PAN-255323 (PA-7050 firewalls only) Fixed an issue where the Network Processing
Card (NPC), Data Processing Card (DPC), and Log Forwarding Card
(LFC) remained in a starting state after an unexpected power cycle.
PAN-252974 (PA-450 firewalls only) Fixed an issue where specific routes were not
advertised when BGP Aggregate was configured with the advertise
filter.
PAN-252669 Fixed an issue where the ikemgr process stopped responding with a
SIGSEGV error.
PAN-251446 Fixed an issue where a critical system log was generated for a SAML
authenticated user whose username length was greater than 32
characters.
PAN-250394 Fixed an issue where a large amount of group data caused serialization
errors and prevented synchronization.
PAN-239246 Fixed an issue where the CLI command debug user-id dump
hip-based-profile-database-entry returned an incorrect
value in the output for the total size of hip reports.
Issue ID Description
PAN-227543 Fixed an issue where the firewall did not match traffic to FQDN
objects if the FQDN object contained uppercase characters.
PAN-221127 Fixed an issue where a large number of core files were generated,
which caused the root partition to become full and the firewall to
move into a non-functional state.
PAN-203231 Fixed an issue where Software Version in the device summary report
exported from Panorama included HTML tags.
59
PAN-OS 10.2.11 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-257957 If you enable FIPS-CC mode and use the PAP or CHAP
authentication methods for your RADIUS server, the authd
This issue is now resolved. See
process may restart unexpectedly. To avoid this issue, use one
PAN-OS 10.2.12 Addressed
of the following workarounds:
Issues.Affects 10.2.11-h1 and
later 10.2 releases. • If you use PAN-OS 10.2.10-h3, 10.2.11, or an earlier
version, configure the RADIUS server so that it does not
send the message authenticator back to client.
• Use other protocols, such as LDAP, Kerberos, TACACS+,
SAML, RADIUS EAP, instead of RADIUS PAP or CHAP.
Issue ID Description
• Change from FIPS mode to normal mode.
Issue ID Description
Issue ID Description
deletions being made when you Preview Changes (Commit >
Push to Devices > Edit Selections or Commit > Commit and
Push > Edit Selections).
Issue ID Description
Issue ID Description
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to an M-700
appliance.
Issue ID Description
pod if the Kubernetes cluster previously had a CN-Series as a
DaemonSet deployment running PAN-OS 10.0 or 10.1.
Workaround: Reboot the worker nodes before upgrading to
PAN-OS 10.2.
PAN-172274 When you activate the Advanced URL Filtering license, your
license entitlements for PAN-DB and Advanced URL Filtering
Issue ID Description
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-264680 (PA-220 firewalls only) Fixed an issue where Device > Setup was not
displayed on the web interface.
PAN-262340 Fixed an issue where FQDN resolution failed for address objects, and
all FQDN traffic was denied by the interzone-default policy rule.
PAN-188312 Fixed an issue where processing heavy traffic with jumbo frames
enabled caused the all_task to stop responding.
PAN-265438 Fixed an issue where the firewall did not update the Nicafe firmware
from 2.110 to 2.111.
PAN-260512 Fixed an issue where accessing the IP address of the device address
group objects from the user interface caused the configd process to
stop responding.
PAN-263226 Fixed an issue where decryption based traffic failed on Explicit Proxy
nodes.
PAN-261917 Fixed an issue where websites with a no-decrypt policy rule were
decrypted in traffic log when using a Google Chrome browser with
PQC enabled.
PAN-259997 (PA-3410, PA-3420, and PA-3430 firewalls only) Fixed an issue where
the install failed when upgrading from PAN-OS 10.2.3-h3 and later
10.2 releases to PAN-OS 10.2.10 due to the number of configured
vsys zones exceeding the zone limit in PAN-OS 10.2.10.
PAN-259480 Fixed an issue where the varrcvr process stopped responding after
running out of memory due to how the process queued and dequeued
files for WildFire file forwarding when a WildFire Analysis Security
Profile was enabled.
PAN-259473 (PA-5450 firewalls only) Fixed an issue where the chassis shut down
when FAN1 was removed.
PAN-257925 (CN-Series firewalls only) Fixed an issue where the CLI command show
system setting ctd state did not work as expected.
PAN-257601 (PA-5450 firewalls only) Fixed an issue where Networking Cards (NC)
experienced an internal link fault which caused path monitoring failure
on the Dataplane Processing Card (DPC).
PAN-257515 Fixed an issue where Possible Domain Fronting Detection for HTTP/2
generated false positives. With this change, domain fronting is limited
to HTTP/1.
PAN-257355 Fixed an issue where a false positive HTTP/TLS evasion alert was
generated when the domain had DNS load balance.
PAN-257462 Fixed an issue related to the varrcvr process where the management
plane CPU was higher than expected during WildFire updates.
PAN-257021 "Fixed an issue on the web interface where Match Evidence log details
for Monitor > Correlated events did not populate."
PAN-256939 Fixed an issue on the firewall where disk space was low in /opt/
pancfg/, which caused dynamic content installation to fail.
Issue ID Description
PAN-256666 Fixed an issue where the configd process stopped responding when
Commit and Push operations were performed on multiple device
groups.
PAN-256223 Fixed an issue where device telemetry log collection filled the root
partition.
PAN-255163 (CN-Series firewalls only) Fixed an issue where the system database
key that stored the configuration status of the dataplane pod was not
updated frequently.
PAN-254373 Fixed an issue where the firewall did not handle error code 500
responses from the WildFire cloud correctly.
PAN-253085 Fixed an issue where the firewall restarted when the parsing of the
cross-pkt http origin header failed when processing a translator
website.
PAN-252411 Fixed an issue where, when log files were purged from the rollup
summary logs, the summary report still used the rollup summary data,
which resulted in the summary report displaying less data.
PAN-251929 Fixed an issue where inbound decryption did not work when FIPS self-
tests were turned on.
PAN-251847 Fixed an issue on log collectors where the incoming log rate was lower
than expected.
PAN-251656 Fixed an issue where enabling lockless QoS caused traffic disruptions.
PAN-250371 Fixed an issue where the logrcvr process stopped responding, which
caused commits to fail with the error message Management server
failed to send phase 1 to client logrcvr.
PAN-250062 Fixed an issue where device telemetry failed after upgrading due to
bundle generation failure.
Issue ID Description
PAN-248975 Fixed an issue on the Panorama web interface where no content was
displayed after logging in.
PAN-247257 Fixed an issue where the useridd process stopped responding, which
caused the firewall to reboot.
PAN-247099 Fixed an issue where the firewall decrypted traffic unexpectedly when
the client hello was spread across multiple packets.
PAN-246707 Fixed an issue where failover was not triggered when multiple
processes stopped responding.
PAN-246420 (PA-5450 Series firewalls only) Fixed an issue where the firewall
rebooted unexpectedly during an upgrade.
PAN-244894 Fixed an issue where turning off mprelay logging caused mprelay
heartbeat failure.
PAN-244227 Fixed an issue where inconsistent FIB entries across the dataplane
were not detected.
PAN-242601 Fixed an issue where the all-task process stopped responding with
DNS traffic due to an incorrect cleanup by pan_free.
PAN-242519 Fixed an issue where scheduled email reports failed if the @ symbol
before the mail client was missing.
PAN-242146 Fixed an issue where the DHCP was unable to find the interface,
which resulted in the DHCP process and all connected DHCP services
to stop responding.
PAN-240993 Fixed an issue where you were unable to revert a sort in the task
manager in the Admin column.
Issue ID Description
PAN-240251 Fixed an issue where the vldmgr process incorrectly restarted during
an Elasticsearch restart.
PAN-239575 Fixed an issue where the TCP window size of the server-to-client
flow for HTTP/2 connection sessions decremented if HTTP/2 stream
sessions were closed due to a Security Profile or a Security policy rule.
This caused the connection session to have a TCP window of 0.
PAN-239337 Fixed an issue where the log_index was suspended and corrupted BDX
files flooded the index_log.
PAN-239271 Fixed an issue where changing the firewall's DNS servers could lead to
connectivity to the hostname-configured User-ID agent.
PAN-238508 Fixed an issue where the routed process created excessive logs in the
log file.
PAN-238355 Fixed an issue where, when a device group was not successfully
renamed, unexpected configuration changes to the device group
structure occurred.
PAN-238249 Fixed an issue where static route path monitor packets from a
multislot chassis were intercepted by the firewall performing Static
NAT (SNAT).
PAN-237582 Fixed an issue where logs were intermittently missing on the log
collector due to missing aliases for some indices.
PAN-237562 Fixed an issue where firewalls generated link-change system logs for
SFP ports even when no cable was connected to the ports.
Issue ID Description
PAN-237478 Fixed an issue where the Traffic log displayed 0 bytes for denied
sessions.
PAN-237369 (PA-1420 firewalls only) Fixed an issue where the all_task process
stopped responding, which caused the firewall to become
unresponsive.
PAN-236497 Fixed an issue where the firewall was unable to purge expired GTP-U
sessions that remained as allocated sessions even after the TTL was
expired.
PAN-236261 Fixed an issue where a proxy server was used for external dynamic
list communication even when the dataplane interface was configured
through service routes.
PAN-235336 Fixed an issue where the character limit for dgname exceeded the
supported number of characters (31), which caused device group
names to be partially displayed during a validate operation.
PAN-235081 (VM-Series firewalls only) Fixed an issue where the firewall sent
packets to its own interface after configuring NAT64.
PAN-234560 Fixed an issue where the daily summary report displayed IPv6
addresses instead of IPv4 addresses.
PAN-234459 Fixed an issue with the firewall web interface where local SSL
decryption exclusion cache entries were not visible.
PAN-233689 (PA-7000 Series firewalls only) Fixed an issue where the Log
Forwarding Card (LFC) disk quota usage was reported as 0 MB for all
log types.
PAN-233541 Fixed an issue where device group and template administrators with
access to a specific virtual system were able to see logs for all virtual
systems via Context Switch.
PAN-233366 Fixed an issue where the DHCP server sent DHCP ACK messages as
broadcasts instead of unicasts when responding to DHCP INFORM
messages.
PAN-233129 Fixed an issue where the firewall sent duplicate logs to syslog server
when the log forwarding profile was configured with Shared enabled
and was used in a Security policy rule.
Issue ID Description
PAN-232368 Fixed an issue where commits failed with the error message
Error: Max. user groups used in policy 1389 exceed
capacity (1000).
PAN-231802 Fixed an issue where an Advanced Routing BGP session flapped with
commits when BGP peer authentication was enabled.
PAN-230326 Fixed an issue where the Network Packet Broker (NPB) user interface
was incorrectly displayed on unsupported platforms.
PAN-229606 Fixed an issue where the brdagent process stopped responding after an
upgrade due to initialization failure.
PAN-227939 Fixed an issue where the all_task process stopped responding due to
high wifclient memory usage, which caused the firewall to reboot.
PAN-225213 Fixed an issue where Push All Changes displayed changes that were
already committed in the push scope for another device group after
performing a selective commit and selective push to the first device
group.
PAN-224938 Fixed an issue where the CLI command settings for set system
setting logging max-log-rate did not persist after a mgmtsrvr
process restart.
PAN-224584 Fixed an issue on Panorama where generating UAR reports for 30 days
or more was slower than expected, and reports showed the same logs
repeatedly in a loop.
PAN-221711 Fixed an issue on the firewall that caused the LFC to stop responding,
which impacted logging capability.
PAN-221571 Fixed an issue on the web interface where the Security policy rule
hit count remained at 0 for some rules even though the traffic logs
showed live hits.
Issue ID Description
PAN-220881 Fixed an issue where the CLI command show logging-status did
not correctly display the last log created and forwarded timestamps.
PAN-220500 (PA-5450 and PA-400 firewalls only) Fixed an issue where the
request shutdown system CLI command did not completely shut
down the system.
PAN-217307 Fixed an issue where the log-start and log-end policy rule filters
did not return reliable results when set to no or yes.
PAN-215670 Fixed an issue where local reports and scheduled reports displayed
different data.
PAN-214100 Fixed an issue where selecting a threat name under Threat Monitor
displayed the threat ID instead of the threat name.
PAN-209542 (PA-5450 firewalls only) Fixed an issue where, when a log interface
was configured, the log interface and the management interface
remained connected to the log collector when upgrading to PAN-OS
10.2.2.
PAN-198622 Fixed an issue where username fields under Policies were marked with
the same color as the first tag associated to that rule.
PAN-196395 (PA-5450 firewalls only) Fixed an issue where the firewall accepted
12 Aggregate Ethernet interfaces, but you were unable to configure
interfaces 9-12 via the web interface.
PAN-194968 Fixed an issue on the web interface where Antivirus updates were not
able to be downloaded and installed unless Apps and Threads updates
were downloaded and installed first, and the Antivirus content list
displayed as blank. The resulting error message from the update server
was also not reflected in the web interface.
PAN-191632 Fixed an issue where console sessions were not cleared after the set
idle timeout value.
79
PAN-OS 10.2.10 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-263226 (PAN-OS When SSL decryption is enabled and Client Hello messages
10.2.10-h2 and 10.2.10-h3 span multiple TCP segments, elements from the proxy_l2info
only) memory pool may not be freed properly. Memory leaks in this
pool cause some SSL decryption sessions to fail.
Workaround: Disable Client Hello accumulation using the
debug dataplane set ssl-decrypt accumulate-
client-hello disable yes CLI command.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-257957 If you enable FIPS-CC mode and use the PAP or CHAP
authentication methods for your RADIUS server, the authd
This issue is now resolved. See
process may restart unexpectedly. To avoid this issue, use one
PAN-OS 10.2.12 Addressed
of the following workarounds:
Issues.Affects 10.2.10-h3 and
later 10.2 releases. • If you use PAN-OS 10.2.10-h3, 10.2.11, or an earlier
version, configure the RADIUS server so that it does not
send the message authenticator back to client.
• Use other protocols, such as LDAP, Kerberos, TACACS+,
SAML, RADIUS EAP, instead of RADIUS PAP or CHAP.
Issue ID Description
• Change from FIPS mode to normal mode.
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
Issue ID Description
Profile) Hostkey configured in a Template from the Template
Stack.
Issue ID Description
erroneously show the auto-provisioned BGP configurations
for SD-WAN as being edited or deleted despite no edits or
deletions being made when you Preview Changes (Commit >
Push to Devices > Edit Selections or Commit > Commit and
Push > Edit Selections).
Issue ID Description
Issue ID Description
request for category lookup and the action set to Reset-Both
and the URL cache has been cleared, the first request for
inline cloud analysis will be bypassed.
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
Issue ID Description
Issue ID Description
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-263226 Fixed an issue where decryption based traffic failed on Explicit Proxy
nodes.
PAN-261917 Fixed an issue where websites with a no-decrypt policy rule were
decrypted in traffic log when using a Google Chrome browser with
PQC enabled
PAN-261270 Fixed an issue where the firewall decremented the TTL/Hop limit for
BGPv6 packets by 1 after IPSec decryption.
PAN-260662 Fixed an issue where large file downloads were slower than expected
when private IP address visibility was enabled.
PAN-258442 Fixed an issue where changes made to the split tunnel configuration
on the Prisma Access gateway were not reflected on the GlobalProtect
client.
PAN-257563 Fixed an issue where the logrcvr component for SASE and MCW
displayed incorrect zones in the traffic flow.
PAN-255619 Fixed an intermittent issue where file downloads from websites failed.
PAN-254826 Fixed an issue where the firewall stopped responding when processing
traffic.
Issue ID Description
PAN-250371 Fixed an issue where the logrcvr process stopped responding, which
caused commits to fail with the error message Management server
failed to send phase 1 to client logrcvr.
PAN-247257 Fixed an issue where the useridd process stopped responding, which
caused the firewall to reboot.
PAN-218873 Fixed an issue where a HIP mask was reused when an existing IP
address user mapping was updated by a new IP address user mapping
that had a different username but the same IP address.
PAN-259997 (PA-3410, PA-3420, and PA-3430 firewalls only) Fixed an issue where
the install failed when upgrading from PAN-OS 10.2.3-h3 and later
10.2 releases to PAN-OS 10.2.10 due to the number of configured
vsys zones exceeding the zone limit in PAN-OS 10.2.10.
PAN-259480 Fixed an issue where the varrcvr process stopped responding after
running out of memory due to how the process queued and dequeued
files for WildFire file forwarding when a WildFire Analysis Security
profile was enabled.
PAN-257462 Fixed an issue related to the varrcvr process where the management
plane CPU was higher than expected during WildFire updates.
PAN-256939 Fixed an issue on the firewall where disk space was low in /opt/
pancfg/, which caused dynamic content installation to fail.
PAN-254373 Fixed an issue where the firewall did not handle error code 500
responses from the WildFire cloud correctly.
PAN-234560 Fixed an issue where the daily summary report displayed IPv6
addresses instead of IPv4 addresses.
PAN-259733 Fixed an issue where a custom report was not deleted on Panorama
when expected.
PAN-258941 Fixed an issue where some URLs were not accessible when connected
to Prisma Access explicit proxy.
PAN-249266 Fixed an issue where the config process virtual memory was exceeded
due to delays in post-commit processing.
PAN-247099 Fixed an issue where the firewall decrypted traffic unexpectedly when
the client hello was spread across multiple packets.
PAN-225087 Fixed an issue where the dataplane logs were corrupted with
unexpected IPv6 addresses.
PAN-257197 Fixed an issue where ifType and ifSpeed were not populated in
asynchronous mode of SNMP operations.
PAN-256181 Fixed an issue where the management interface and front panel port
interface statistics were not populated in asynchronous mode of
SNMP operations.
PAN-255868 (PA-3400 Series firewalls only) Fixed an issue where the firewall
entered maintenance mode after enabling kernel data collection during
the silent reboot.
PAN-255396 Fixed an issue where, when using serial number and IP address
authentication, and multiple gateways were configured, the portal
returned the last gateway in the list and disregarded the satellite
assignment by serial number.
PAN-253546 Fixed an issue where a TLS client hello was split into multiple packets
and arrived out of order, so the packets were dropped and the session
terminated.
PAN-252730 Fixed an issue where the Elasticsearch status for a log collector group
changed to red or yellow after performing a collector group push.
PAN-251895 Fixed an issue where enabling inline Cloud Analysis features caused
a slow packet buffer leak, which resulted in performance issues and
dropped traffic.
PAN-251639 Fixed an issue where an out of memory condition might occur due to
a memory leak in the varrcvr process when a Wildfire Analysis security
profile is enabled.
Issue ID Description
PAN-251013 Fixed an issue on the web interface where the Virtual Router and
Virtual System configurations for the template incorrectly showed as
none.
PAN-250020 Fixed an issue where MLC2 verdict retrieval failed due to a regression
in loopback data flag handling.
PAN-248130 Fixed an issue where the AND operation under a Dynamic Address
Group comparison did not work after upgrading the AWS plugin to
3.0.1.
PAN-248105 Fixed an issue where the GlobalProtect SSL VPN tunnel immediately
disconnected due to a keep-alive timeout.
PAN-246960 Fixed an issue where firewalls failed to fetch content updates from the
WildFire private cloud due to an Unsupported protocol error.
PAN-245842 Fixed an issue with the syn-cookie option where traffic unexpectedly
stopped during packet exchange.
PAN-244907 Fixed an issue where ports did not go down when moving from an
active state to a suspended state.
Issue ID Description
PAN-244648 (PA-5200 Series only) Fixed an issue where the firewall did not boot
up after a factory reset, and, with FIPS mode enabled, the firewall
rebooted into maintenance mode.
PAN-244622 Fixed an issue where FIB repush did not work with Advanced Routing
enabled.
PAN-244013 Fixed an issue where the web interface did not display newly added
antispyware signatures or Vulnerability signatures.
PAN-243240 Fixed an issue where the using QoS caused packet buffer utilization to
increase exponentially and the PKI POOL DFLT pool depleted until a
reboot was performed.
PAN-242309 Fixed an issue where a higher byte count (s2c) was observed for DNS-
Base application.
PAN-241230 Fixed an issue where the SNMP get request status value for Panorama
connections was incorrect.
PAN-240347 Fixed an issue with the web interface where the Dashboard and a
Device Group policy rule took longer than expected to load.
PAN-239662 Fixed an issue where the NSSA default route from the firewall was not
generated to advertise even though the backbone area default route
was advertised during a graceful restart.
Issue ID Description
PAN-238625 Fixed an issue where, when the physical interface went down, the SD-
WAN Ethernet connection state still showed UP/path-monitor due
to the Active URL SaaS monitor connection state remaining UP/path-
monitor.
PAN-236133 Fixed an issue where SSL traffic was impacted when SSL Command
and Control detector for Incline Cloud Analysis was set to reset-both,
reset-client, reset-server, or drop.
PAN-231642 Fixed an issue on the Panorama web interface where users who were
logged in through multiple sessions were able to see an active lock on
only one session.
PAN-229115 Fixed an issue on the web interface where the screen was blank after
logging in to Panorama.
PAN-226108 Fixed an issue where the masterd process was unable to start or stop
the sysd process.
PAN-225394 Fixed an issue on the firewall where SNMP incorrectly reported high
packet descriptor usage.
PAN-223418 Fixed an issue where heartbeats to the brdagent process were lost,
resulting in the process not responding, which caused the firewall to
reboot.
PAN-221041 Fixed an issue where the following error message was seen
frequently in the system logs: Clearing snmpd.log due to log
overflow.
Issue ID Description
99
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
PAN-OS Release Notes 10.2.12 100 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-263226 (PAN-OS When SSL decryption is enabled and Client Hello messages
10.2.9-h9 only) span multiple TCP segments, elements from the proxy_l2info
memory pool may not be freed properly. Memory leaks in this
pool cause some SSL decryption sessions to fail.
Workaround: Disable Client Hello accumulation using the
debug dataplane set ssl-decrypt accumulate-
client-hello disable yes CLI command.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-251895 When Inline Cloud Analysis features are enabled, the firewall
experiences a slow packet buffer leak, resulting in poor
This issue is now resolved. See
performance and dropped traffic.
PAN-OS 10.2.10 Addressed
Issues. Workaround: Disable WildFire Inline Cloud Analysis and
Advanced Threat Prevention Inline Cloud Analysis on the
firewall.
PAN-OS Release Notes 10.2.12 101 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
Workaround: On your upgrade path to PAN-OS 10.2.5, first
upgrade to PAN-OS 10.2.4 and then upgrade to PAN-OS
10.2.5.
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
PAN-OS Release Notes 10.2.12 102 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
Administrators) from Superuser to a Role-Based custom
admin, or vice versa, does not modify the access privileges of
the administrator.
PAN-OS Release Notes 10.2.12 103 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 104 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
Managed Devices > Summary) after a bootstrapped firewall is
successfully added to Panorama.
Workaround: After the bootstrapped firewall is successfully
added to Panorama, log in to the Panorama web interface and
select Commit > Push to Devices.
PAN-OS Release Notes 10.2.12 105 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
Workaround: Use Commit > Push to Devices to synchronize
the templates.
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 106 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
Workaround: Configuration settings for URL Filtering
Inline ML must be applied through the CLI. The following
configuration commands are available:
• Define URL exceptions for specific web sites—
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 107 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See configured to Check for updates every 5 minutes due to the
PAN-OS 10.2.10 Addressed commit and EDL fetch processes overlapping. This is more
Issues. likely to occur when multiple EDLs are configured to check
for updates every 5 minutes.
PAN-OS Release Notes 10.2.12 108 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
PAN-263226 Fixed an issue where decryption based traffic failed on Explicit Proxy
nodes.
PAN-261917 Fixed an issue where websites with a no-decrypt policy rule were
decrypted in traffic log when using a Google Chrome browser with
PQC enabled
PAN-260662 Fixed an issue where large file downloads were slower than expected
when private IP address visibility was enabled.
PAN-260218 Fixed an issue where BGP Aggregate Advertise filters did not work
as expected when the summary option was enabled, and only
summarized routes were advertised.
PAN-258996 Fixed an issue where the firewall displayed the SFP ports as
PowerDown when the SFP transceiver was removed and reinserted or
the port was shut down and brought back up on the peer device.
PAN-233191 (PA-5450 firewalls only) Fixed an issue where the Data Processing
Card (DPC) restarted due to path monitor failure after QSFP28
disconnected from the Network Processing Card (NPC).
PAN-226768 Fixed an issue where, when the GlobalProtect app was installed on
iOS endpoints and the gateway was configured to accept cookies, the
app remained in the Connecting stage after authentication, and the
GlobalProtect log displayed the error message User is not in
allow list. This occurred when the app was restarted or when the
app attempted to reconnect after disconnection.
PAN-OS Release Notes 10.2.12 109 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
PAN-259480 Fixed an issue where the varrcvr process stopped responding after
running out of memory due to how the process queued and dequeued
files for WildFire file forwarding when a WildFire Analysis Security
profile was enabled.
PAN-258941 Fixed an issue where some URLs were not accessible when connected
to Prisma Access explicit proxy.
PAN-258442 Fixed an issue where changes made to the split tunnel configuration
on the Prisma Access gateway were not reflected on the GlobalProtect
client.
PAN-257919 Fixed an issue where, when using explicit proxy with SAML
authentication, initiating SAML authentication with a non-GET request
resulted in a 302 redirect response instead of the expected 200 ok
response.
PAN-257515 Fixed an issue where Possible Domain Fronting Detection for HTTP/2
generated false positives. With this change, domain fronting is limited
to HTTP/1.
PAN-257355 Fixed an issue where a false positive HTTP/TLS evasion alert was
generated when the domain had DNS load balance.
PAN-257197 Fixed an issue where ifType and ifSpeed were not populated in
asynchronous mode of SNMP operations.
PAN-256181 Fixed an issue where the management interface and front panel port
interface statistics were not populated in asynchronous mode of
SNMP operations.
PAN-254422 Fixed an issue where the firewall required a restart when an SD-WAN
policy rule was pushed from Panorama.
PAN-254241 Fixed an issue where the firewall stopped responding due to a high
number of SD-WAN probes being sent.
PAN-OS Release Notes 10.2.12 110 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
PAN-251013 Fixed an issue on the web interface where the Virtual Router and
Virtual System configurations for the template incorrectly showed as
none.
PAN-250062 Fixed an issue where device telemetry failed after upgrading due to
bundle generation failure.
PAN-247099 Fixed an issue where the firewall decrypted traffic unexpectedly when
the client hello was spread across multiple packets.
PAN-246960 Fixed an issue where firewalls failed to fetch content updates from the
Wildfire Private Cloud due to an Unsupported protocol error.
PAN-244013 Fixed an issue where the web interface did not display newly added
Anti-Spyware signatures or Vulnerability Signatures until you
refreshed the browser or logged out or in via the web interface.
PAN-242309 Fixed an issue where a higher byte count (s2c) was observed for DNS-
Base application.
PAN-239143 Fixed an issue with accessing websites when URL filtering profiles
were configured with the block-continue action and the server used
HTTP/2.
PAN-236909 Fixed an issue where, when you committed the first configuration
change after booting up the firewall, the external dynamic list file
PAN-OS Release Notes 10.2.12 111 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
download failed until the list was refreshed. This occurred when the
configuration was pushed with a certificate profile.
PAN-223418 Fixed an issue where heartbeats to the brdagent process were lost,
resultng in the process not responding, which caused the firewall to
reboot.
PAN-OS Release Notes 10.2.12 112 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 113 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
PAN-250686 Fixed an issue where selective push operations did not work when
more than one admin user simultaneously performed changes and
partial commits on Panorama.
PAN-247403 (VM-Series firewalls only) Fixed an issue where the push scope CLI
command took longer than expected, which caused the web interface
to be slow.
PAN-245701 Fixed an issue where the returned values to SNMP requests for data
port statistics were incorrect.
PAN-244836 A knob was introduced to toggle the default behavior of BGP in the
Advanced Routing stack to not suppress duplicate updates. By default,
the prefix updates are suppressed for optimization.
PAN-240066 Fixed a duplicate MAC address issue where an ethernet interface sent
out Gratuitous ARP (GARP) messages for an IP address that was not
configured on it.
PAN-OS Release Notes 10.2.12 114 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
Issue ID Description
PAN-239722 Fixed an issue where SNMP scans to the firewall took longer than
expected and intermittently timed out.
PAN-238643 Fixed an issue where a memory leak caused multiple processes to stop
responding when VM Information Sources was configured.
PAN-237991 Fixed an issue where the log collector sent fewer logs than expected
to the syslog server.
PAN-233692 Fixed an issue on Panorama where the configd process stopped, which
caused performance issues.
PAN-231439 Fixed an issue where, when a VoIP call using dynamic IP and NAT was
put on hold, the audio became one-way due to early termination of
NAT ports.
PAN-230746 Fixed an issue on the web interface where device groups with a large
number of managed firewalls displayed the Policy page more slowly
than expected.
PAN-228515 Fixed an issue where the Elasticsearch cluster health status displayed
as yellow or red due to Elasticsearch SSH tunnel flaps.
PAN-224500 Fixed an issue where IPv6 addresses in XFF were displayed in Traffic
logs.
PAN-215430 Fixed an issue where dynamic IP address NAT with SIP intermittently
failed to convert RTP Predict sessions.
PAN-212553 Fixed an issue where the ikemgr process stopped responding due to
memory corruption, which caused VPN tunnels to go down.
PAN-207092 Fixed an issue where logging in using default credentials after changing
to FIPS-CC for NSX-T firewalls did not work.
PAN-OS Release Notes 10.2.12 115 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.9 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 116 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.8.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.8 Known Issues
• PAN-OS 10.2.8-h10 Addressed Issues
• PAN-OS 10.2.8-h4 Addressed Issues
• PAN-OS 10.2.8-h3 Addressed Issues
• PAN-OS 10.2.8 Addressed Issues
117
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
PAN-OS Release Notes 10.2.12 118 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-251895 When Inline Cloud Analysis features are enabled, the firewall
experiences a slow packet buffer leak, resulting in poor
This issue is now resolved. See
performance and dropped traffic.
PAN-OS 10.2.10 Addressed
Issues. Workaround: Disable WildFire Inline Cloud Analysis and
Advanced Threat Prevention Inline Cloud Analysis on the
firewall.
PAN-OS Release Notes 10.2.12 119 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 120 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
PAN-OS Release Notes 10.2.12 121 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 122 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
Workaround: Restart the log receiver service by running the
following CLI command:
PAN-OS Release Notes 10.2.12 123 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 124 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 125 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 126 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
PAN-263226 Fixed an issue where decryption based traffic failed on Explicit Proxy
nodes.
PAN-261917 Fixed an issue where websites with a no-decrypt policy rule were
decrypted in traffic logs when using a Google Chrome browser with
PQC enabled.
PAN-254826 Fixed an issue where the firewall stopped responding when processing
traffic.
PAN-253546 Fixed an issue where a TLS client hello was split into multiple packets
and arrived out of order, so the packets were dropped and the session
terminated.
PAN-247099 Fixed an issue where the firewall decrypted traffic unexpectedly when
the client hello was spread across multiple packets.
PAN-224195 Fixed an issue where Authentication Portal redirects failed with a 500
Internal error when the Authentication Portal token was disabled.
PAN-OS Release Notes 10.2.12 127 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
PAN-251895 Fixed an issue where enabling Inline Cloud Analysis features caused
a slow packet buffer leak, which resulted in performance issues and
dropped traffic.
PAN-251013 Fixed an issue on the web interface where the Virtual Router and
Virtual System configurations for the template incorrectly showed as
none.
PAN-250020 Fixed an issue where MLC2 verdict retrieval failed due to a regression
in loopback data flag handling.
PAN-248105 Fixed an issue where the GlobalProtect SSL VPN tunnel immediately
disconnected due to a keep-alive timeout.
PAN-246976 Fixed an issue with unbalanced NAT session distribution with multi-
dataplane firewalls when persistent-dipp was enabled.
PAN-244648 Fixed an issue where, when FIPS was enabled in maintenance mode,
the firewall rebooted and returned to maintenance mode.
PAN-244622 Fixed an issue where FIB re-push did not work with Advanced Routing
enabled.
PAN-242309 Fixed an issue where a higher byte count (s2c) was observed for DNS-
Base application.
PAN-240308 Fixed an issue where ElasticSearch did not work as expected when
raid-mounts were not fully ready after a reboot.
PAN-OS Release Notes 10.2.12 128 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-236133 Fixed an issue where SSL traffic was impacted when SSL Command
and Control detector or Incline Cloud Analysis was set to reset-both,
reset-client, reset-server, or drop.
PAN-225394 Fixed an issue on the firewall where SNMP incorrectly reported high
packet descriptor usage.
PAN-203981 Fixed an issue where usernames with only numeric characters were
not valid.
PAN-OS Release Notes 10.2.12 129 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 130 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
PAN-240174 Fixed an issue where, when LSVPN serial numbers and IP address
authentication were enabled, IPv6 address ranges and complete IPv6
addresses that were manually added to the IP address allow or exclude
list were not usable after a restart of the gp_broker process or the
firewall.
PAN-239241 Extended the root certificate for WildFire appliances to December 31,
2032.
PAN-239144 Fixed an issue where the web interface was slower than expected
when logging in, committing, and pushing changes after upgrading to
PAN-OS 10.2.7.
PAN-236244 Fixed an issue where you were unable to select authentication profiles
via the web interface.
PAN-236233 Fixed an issue where SNMP reports displayed incorrect values for SSL
Proxy sessions and SSL Proxy utilization.
PAN-235741 Fixed an issue where DNS resolution failed for Panorama and firewall
plugins if the DNS Server IP address was obtained through DHCP.
PAN-OS Release Notes 10.2.12 131 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-235737 Fixed an issue where the brdagent process stopped responding due to
a sudden increase in logging to the bcm.log.
PAN-235628 Fixed an issue where you weren’t prompted for login credentials when
you disconnected and connected back to the GlobalProtect portal
when SAML authentication was selected along with single sign-on
(SSO) and Single Log Out (SLO).
PAN-234852 Fixed an issue where DLP logs for the Salesforce application had a
report ID of 0 and did not include missing information such as file type,
file hash, and the reason for data filtering.
PAN-234279 Fixed an issue where the ikemgr process crashed due to an IKEv1
timing issue, which caused commits to fail with the following error
message: Client ikemgr requesting last config in
the middle of a commit/validate, aborting current
commit.
PAN-233954 Fixed an issue where the firewall was unable to retrieve correct groups
from the LDAP server.
PAN-233207 Fixed an issue where the configd process stopped responding when a
partial configuration revert operation was performed.
PAN-233191 (PA-5450 firewalls only) Fixed an issue where the Data Processing
Card (DPC) restarted due to path monitor failure after QSFP28
disconnected from the Network Processing Card (NPC).
PAN-232377 Fixed an issue where the AddrObjRefresh job failed when the
useridd process restarted.
PAN-232250 Fixed an issue where, when SSH service profiles for management
access was set to None, the reported output was incorrect.
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-OS Release Notes 10.2.12 132 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-231698 Fixed an issue where you were unable to set the Dynamic Updates
schedule threshold to an empty value.
PAN-231658 Fixed an issue where DNS resolution failed when interfaces were
configured as DHCP and a DNS server was provided via DHCP while
also statically configured with DNS servers.
PAN-231552 Fixed an issue where traffic returning from a third-party Security chain
was dropped.
PAN-231459 (PA-5450 firewalls only) Fixed an issue where a large number of invalid
source MAC addresses were shown in drop-stage packet captures.
PAN-231422 Fixed an issue where you were unable to configure more than 256
scheduled objects on the firewall.
PAN-231329 Fixed an issue where the logrcvr process stopped responding due to a
corrupt log in the forwarding pipeline.
PAN-230813 Fixed an issue where flex memory leak caused decryption failure and
commit failure with the error message Error preparing global
objects failed to handle CONFIG_UPDATE_START.
PAN-230362 Fixed an issue where the firewall truncated the payload of a TCP Out
of Order segment with a FIN flag.
PAN-230106 Fixed an issue where the firewall was unable to retrieve the most
current external dynamic list information from the server due to
hostname resolution failure.
PAN-230092 Fixed an issue where the routed process stopped responding when
committing routing-related changes if Advanced Routing was enabled.
PAN-OS Release Notes 10.2.12 133 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-229952 Fixed an issue where the the print PDF option did not work (Panorama
> Managed Devices > Health).
PAN-229315 Fixed an issue where Octets in NetFlow records were always reported
to be 0 despite having a non-zero packet count.
PAN-229307 Fixed an issue where half closed SSL decryption sessions stayed active,
which caused software packet buffer depletion.
PAN-229080 Fixed an issue where the new management IP address on the interface
did not take effect.
PAN-229069 Fixed an issue where clientless VPN portal users were unable to access
clientless applications due to an SSL renegotiation being triggered.
PAN-227804 Fixed an issue where memory corruption caused the comm process to
stop responding.
PAN-227774 Fixed an issue where commits failed with the error message
Management server failed to send phase 1 to client
logrcvr.
PAN-OS Release Notes 10.2.12 134 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-227641 Fixed an issue where Preview Changes and Change Summary when
saving changes did not open a new window when clicked.
PAN-227522 Fixed an issue where shared application filters that had application
object overrides were overwritten by predefined applications.
PAN-227058 Fixed an issue where traffic did not match Security policy rules with
the destination as FQDN and instead hit the default deny rule.
PAN-226768 Fixed an issue where, when the GlobalProtect app was installed on
iOS endpoints and the gateway was configured to accept cookies,
the app remained in the Connecting stage after authentication, and
the GlobalProtect log displayed the error message `User is not in
allow list`. This occurred when the app was restarted or when the app
attempted to reconnect after disconnection.
PAN-226260 Fixed an issue where support for CBC ciphers with some
authentication algorithms was only available in FIPS mode.
PAN-225920 Fixed an issue where duplicate predict sessions did not release NAT
resources.
PAN-225228 Fixed an issue where filtering Threat logs using any value under
THREAT ID/NAME displayed the error Invalid term.
PAN-OS Release Notes 10.2.12 135 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-225169 Added a CLI command to view Strata Logging Service queue usage.
PAN-225013 (PA-5450 firewalls only) Fixed an issue where the firewall rebooted
unexpectedly when a Network Card was on Slot 2 instead of a DPC.
PAN-224955 Fixed an issue where the devsrvr process stopped responding when
zone protection had more than 255 profiles.
PAN-224772 Fixed a high memory usage issue with the mongodb process that
caused an OOM condition.
PAN-224656 Fixed an issue where the devsrvr process caused delays when Dynamic
Address Groups with large entry lists were being processed during a
commit, which caused commits to take longer than expected.
PAN-224354 Fixed an issue where a memory leak related to the distributord process
occurred when connections flapped for IP address-to-username
mapping redistribution.
PAN-224036 (PA-5450 firewalls only) Fixed an issue where a firewall with QoS
configured wasn't able to send packets out of its interfaces after a
reboot.
PAN-223855 Fixed an issue where the show running ippool CLI command
output displayed incorrect used and available NAT IP address pools on
DIPP NAT policy rules in multidataplane firewalls.
PAN-OS Release Notes 10.2.12 136 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-223741 Fixed an issue where the mprelay process stopped responding, which
caused a slot restart when another slot rebooted.
PAN-223481 (PA-5450 firewalls only) Fixed an issue where the all_pktproc process
stopped responding when the firewall was on PAN-OS 10.1.9-h3 or a
later release.
PAN-223457 Fixed an issue where, if the number of group queries exceeded the
Okta rate limit threshold, the firewall cleared the cache for the groups.
PAN-223271 Fixed an issue where the file transfer of large zipped and compressed
files had the App-ID unknown-tcp.
PAN-223263 Fixed an issue on the web interface where the system clock for
Mexico_city was displayed in CDT instead of CST on the management
dashboard.
PAN-223259 Fixed an issue where selective pushes failed with the error Failed
to generate selective push configuration. Unable to
retrieve last in-sync configuration for the device,
either a push was never done or version is too old.
Please try a full push.
PAN-223094 Fixed an issue where fragmented TCP traffic was dropped due to an IP
address ID conflict over the SD-WAN tunnel.
PAN-222941 Fixed an issue where viewing the latest logs took longer than expected
due to log indexer failures.
PAN-OS Release Notes 10.2.12 137 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-222089 Fixed an issue where you were unable to context switch from
Panorama to the managed device.
PAN-221938 Fixed an issue with network packet broker sessions where the broker
session and primary session timeouts were out of sync, which caused
traffic drops if the broker session timed out when the primary session
was still active.
PAN-221857 Fixed an issue where users were unable to log in to the GlobalProtect
app using SAML authentication after upgrading to PAN-OS 10.2.3-
h4, and the GlobalProtect logs displayed the following error message:
Username from SAML SSO response is different from
the input.
PAN-221763 Fixed an issue on the web interface where text overlapped when
editing address and prefix values using Firefox.
PAN-221577 Fixed an issue where a static route for a branch or hub over the
respective virtual interface wasn't installed in the routing table even
when the tunnel to the branch or hub was active.
PAN-221208 Fixed an issue where the tunnel monitor was unable to remain up
when zone protection with Strict IP was enabled and NAT Traversal
was applied.
PAN-220790 Fixed an issue where the reportd process stopped responding, which
caused Panorama to restart.
PAN-220659 Fixed an issue on the firewall where scheduled antivirus updates failed
when external dynamic lists were configured on the firewall.
PAN-220640 (PA-220 firewalls only) Fixed an issue where the firewall CPU
percentage was miscalculated, and the values that were displayed
were incorrect.
PAN-220180 Fixed an issue where configured botnet reports (Monitor > Botnet)
weren’t generated.
PAN-OS Release Notes 10.2.12 138 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-219768 Fixed an issue where you were unable to filter data filtering logs with
Threat ID/NAME for custom data patterns created over Panorama.
PAN-219644 Fixed an issue where firewalls that forwarded logs to a syslog server
over TLS (Objects > Log Forwarding) used the default Palo Alto
Networks certificate instead of the configured custom certificate.
PAN-219585 Fixed an issue where enabling syslog-ng debugs from the root
caused 100% disk utilization.
PAN-219415 Fixed an issue where BGP routes were installed in the routing
table even when the option to install routes was disabled in the
configuration.
PAN-219300 Fixed an issue where the task manager displayed only limited data.
PAN-219241 Fixed an issue where web content for a failed SAML login had
readability and functionality issues for the GlobalProtect app.
PAN-219137 (CN-Series firewalls only) Fixed an issue where firewalls did not upload
files to the WildFire public cloud.
PAN-218928 Fixed an issue where the reportd process stopped responding after
querying logs or generating ACC reports with some filters.
PAN-218611 Fixed an issue where the device telemetry region wasn't updated on
the firewall when pushed from the Panorama template stack.
PAN-218555 Fixed an issue where the firewall did not receive dynamic address
updates pushed from Panorama during initial registration to Panorama.
PAN-218352 Fixed an issue where Panorama was slower than expected when
WildFire deployment was scheduled every minute to a large number of
devices.
PAN-OS Release Notes 10.2.12 139 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-218331 Fixed an issue where you were unable to export or download packet
captures from the firewall when context switching from Panorama.
PAN-218273 Fixed an issue where TCP keepalive packets from the client to the
server weren't forwarded when SSL decryption was enabled.
PAN-218238 Fixed an issue where you were unable to create a file exception
(Monitor > Threat Log > Detailed Log view > Create Exception), and
the following error message was displayed: no antivirus profile
corresponding to threat log.
PAN-218119 Fixed an issue where the firewall transmitted packets with an incorrect
source MAC address during commit operations.
PAN-217831 Fixed an issue memory leak issue related to the logd process that
occurred due to a sysd object not being released.
PAN-217541 Fixed an issue where the useridd process stopped responding after a
restart when HIP redistribution was enabled.
PAN-217493 Fixed an issue where superusers with read-only privileges were unable
to view SCEP object configurations.
PAN-217280 Fixed an issue where, when Advanced Routing was enabled, the routed
process stopped responding during booting up.
PAN-217241 Fixed an issue where predict session conversion failed for RTP and
RTCP traffic.
PAN-OS Release Notes 10.2.12 140 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-217064 Fixed an issue where commits took longer than expected when the
DLP plugin was configured.
PAN-217024 Fixed an issue where fetching device certificates failed for internal
DNS servers with the error message ERROR Error: Could not
resolve host: certificate.paloaltonetworks.com.
PAN-216647 Fixed an issue where the sysd node was updated at incorrect times.
PAN-216101 Fixed an issue where a memory leak related to a process and LLDP
packet processing caused an OOM condition on the firewall.
PAN-215857 Fixed an issue where the option to reboot the entire firewall was
visible to vsys admins.
PAN-215436 Fixed an issue with the web interface where the latest logs took longer
than expected to display under Monitor.
PAN-215082 (M-300 and M-700 appliances only) Fixed an issue where Panorama
generated erroneous system logs (Monitor > Logs > System) to alert
that the appliance memory usage limit was reached.
PAN-214987 Fixed an issue where Application Filter names weren’t random, and
they matched or included internal protocol names.
PAN-214942 Fixed an issue where SD-WAN UDP traffic failed over to a non-
member path after a flap of an SD-WAN virtual interface.
PAN-214847 Fixed an issue where, when certificate authentication for admin user
authentication was enabled, vulnerability scans that used usernames or
PAN-OS Release Notes 10.2.12 141 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
passwords against the management interface reported a vulnerability
due to a missing HSTS header in the Access Denied response page.
PAN-214773 Fixed an issue where RTP packets traversing intervsys were dropped
on the outgoing vsys.
PAN-214336 Fixed an issue where ICMPv6 unreachable messages were sent with
an unspecified source address ( :: ) for VLAN interfaces.
PAN-213956 Fixed an issue where the firewall interface did not go down even after
the peer link/switch port went down.
PAN-213491 Fixed an issue where the management CPU was high, which caused
the web interface to be slower than expected.
PAN-213173 Fixed an issue where Preview Changes under Scheduled Pushes did
not launch the Change Preview window.
PAN-213103 Fixed an issue where Clientless VPN access failed with the error
message temporarily unavailable when accessing the
Clientless VPN bookmarked application from the identity provider
application portal.
PAN-212932 Fixed an issue where the firewall went into a restart loop with
the following error message: failed to get mgt settings
candidate: configured traffic quota of 0 MB is less
than the minimum 32 MB.
PAN-212877 Fixed an issue where a race condition caused log flooding, which
caused the firewall to go into an unresponsive state.
PAN-212770 Fixed an issue on the firewall where the WildFire file size limit value
did not match on the web interface and the CLI.
PAN-212580 (PA-7050 firewalls only) Fixed an issue where disk space filled up
due to files under /opt/var/s8/lp/log/pan/ not being properly
deleted.
PAN-OS Release Notes 10.2.12 142 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-211945 Fixed an issue where URL Filtering system logs showed the error
message CURL ERROR: bind failed with errno 124:
Address family not supported by protocol even though
the PAN-DB cloud was connected.
PAN-211827 Fixed an issue where Dynamic Updates failed with the following error
message: CONFIG_UPDATE_INC: Incremental update to DP
failed please try to commit force the latest config.
PAN-211384 Fixed an issue where the size of the redisthost_1 in the Redis
database continuously increased, which caused an OOM condition.
PAN-210234 Fixed a REST API call to query the template stack configuration did not
return the template stack variables or device variables.
PAN-208085 Fixed an issue where the BFD peers were deleted during a commit
from Panorama. This occurred because the pan_comm thread became
deadlocked due to the same sysd object was handled during the
commit.
PAN-207577 Fixed an issue where Panorama > Setup > Interfaces wasn't accessible
for users with custom admin roles even when the interface option was
selected for the custom admin roles.
PAN-207003 Fixed an issue where the logrcvr process NetFlow buffer wasn't reset
which resulted in duplicate NetFlow records.
PAN-206325 Fixed an issue where a renamed object was still referenced with the
previous name in a Security policy rule, which caused commit failures
when using edit API to create the rule.
PAN-206041 (PA-7050 firewalls only) Fixed an issue where the ikemgr process
stopped responding.
PAN-OS Release Notes 10.2.12 143 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-204808 (PA-400 Series, PA-1400 Series, PA-3400 Series, and PA-5400 Series
firewalls only) Fixed an issue where executing the CLI command show
running resource-monitor ingress-backlogs displayed
the error message Server error : Dataplane is not up or
invalid target-dp(*.dp*)
PAN-204663 Fixed an issue on Panorama where you were unable to context switch
from one managed firewall to another.
PAN-202008 Fixed an issue where Traffic logs exported to CSV files contained
inaccuracies and weren’t complete.
PAN-201269 Fixed an issue where commits failed with the error message IPv6
addresses are not allowed because IPv6-firewalling
is disabled when Security policy rules had an address group with
more than 1000 FQDN address objects.
PAN-198190 (VM-Series firewalls only) Fixed an issue where the MTU on the
management interface couldn’t be configured to a value greater than
1500.
PAN-197189 Fixed an issue where the RST packet wasn't sent to the client when
decrypted HTTP/2 traffic was detected by custom vulnerability
signatures with action reset-both.
PAN-193484 Fixed an issue where DNS failed if the domain name started with a
period.
PAN-192318 Fixed an issue where executing the CLI command show rule-
hit-count device-group displayed the error message Server
error : show rule hit count op-command failed.
PAN-186957 Fixed an issue where, in SAML Metadata Export, a drop-down did not
appear in the input field when IP or Hostname was selected for Type.
PAN-181706 Fixed an issue where the logrcvr process stopped responding after
upgrading to PAN-OS 10.1.
PAN-OS Release Notes 10.2.12 144 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
Issue ID Description
PAN-179952 Fixed an issue on Panorama where not all categories were displayed
under Log settings.
PAN-179260 Fixed an issue where admins and other superusers were unable to
remove a commit lock that was taken by another admin user with the
format <domain/user>. As a result, deleting the commit lock failed.
PAN-175642 Fixed an issue where system logs to alert for support license expiry
weren’t generated.
PAN-98605 Fixed an issue where audit comments did not appear in the audit
comments archive.
PAN-OS Release Notes 10.2.12 145 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.8 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 146 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.7.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.7 Known Issues
• PAN-OS 10.2.7-h12 Addressed Issues
• PAN-OS 10.2.7-h8 Addressed Issues
• PAN-OS 10.2.7-h6 Addressed Issues
• PAN-OS 10.2.7-h3 Addressed Issues
• PAN-OS 10.2.7-h1 Addressed Issues
• PAN-OS 10.2.7 Addressed Issues
147
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
PAN-OS Release Notes 10.2.12 148 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-OS Release Notes 10.2.12 149 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
PAN-OS 10.2.7, 10.2.7-h1, Roles) with Push All Changes enabled are unable to push
and 10.2.7-h3 only configuration changes to managed firewalls when Managed
Devices and Push For Other Admins are disabled.
PAN-242837 Default login credentials and SSH fail after enabling FIPS-CC
Mode on a firewall or Panorama after converting through the
Maintenance Recovery Tool (MRT). The firewall or Panorama
becomes stuck and requires a factory reset to recover.
PAN-OS Release Notes 10.2.12 150 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
PAN-223457 If the number of group queries exceeds the Okta rate limit
threshold, the firewall clears the cache for the groups. To
This issue is now resolved. See
avoid encountering this issue, disable the Okta rate limit.
PAN-OS 10.2.8 Addressed
Issues.
PAN-OS Release Notes 10.2.12 151 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See rulebase by dragging and dropping individual policy rules and
PAN-OS 10.2.8 Addressed then moving the entire tag group.
Issues.
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
PAN-OS Release Notes 10.2.12 152 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
Profile) Hostkey configured in a Template from the Template
Stack.
PAN-OS Release Notes 10.2.12 153 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
erroneously show the auto-provisioned BGP configurations
for SD-WAN as being edited or deleted despite no edits or
deletions being made when you Preview Changes (Commit >
Push to Devices > Edit Selections or Commit > Commit and
Push > Edit Selections).
PAN-OS Release Notes 10.2.12 154 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 155 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
admin > request plugins dlp reset
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 156 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
sync, which causes the firewall to not correctly populate the
Source User column in the session logs.
PAN-OS Release Notes 10.2.12 157 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
As a result, the firewall fails to boot normally and enters
maintenance mode. HA Pairs of Active-Passive and Active-
Active firewalls are not affected.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 158 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
PAN-263226 Fixed an issue where decryption based traffic failed on Explicit Proxy
nodes.
PAN-261917 Fixed an issue where websites with a no-decrypt policy rule were
decrypted in traffic log when using a Google Chrome browser with
PQC enabled
PAN-258996 Fixed an issue where the firewall displayed the SFP ports as
PowerDown when the SFP transceiver was removed and reinserted or
the port was shut down and brought back up on the peer device.
PAN-255868 (PA-3400 Series firewalls only) Fixed an issue where the firewall
entered maintenance mode after enabling kernel data collection during
the silent reboot.
PAN-253546 Fixed an issue where a TLS client hello was split into multiple packets
and arrived out of order, so the packets were dropped and the session
terminated.
PAN-247257 Fixed an issue where the useridd process stopped responding, which
caused the firewall to reboot.
PAN-244648 Fixed an issue where, when FIPS was enabled in maintenance mode,
the firewall rebooted and returned to maintenance mode.
PAN-244013 Fixed an issue where the web interface did not display newly added
Anti-Spyware signatures or Vulnerability Signatures.
PAN-OS Release Notes 10.2.12 159 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
PAN-238625 Fixed an issue where, when the physical interface went down, the SD-
WAN ethernet connection state still showed UP/path-monitor due
to the Active URL SaaS monitor connection state remaining UP/path-
monitor.
PAN-233191 (PA-5450 firewalls only) Fixed an issue where the Data Processing
Card (DPC) restarted due to path monitor failure after QSFP28
disconnected from the Network Processing Card (NPC).
PAN-226768 Fixed an issue where, when the GlobalProtect app was installed on
iOS endpoints and the gateway was configured to accept cookies, the
app remained in the Connecting stage after authentication, and the
GlobalProtect log displayed the error message User is not in
allow list. This occurred when the app was restarted or when the
app attempted to reconnect after disconnection.
PAN-OS Release Notes 10.2.12 160 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 161 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
PAN-242910 Fixed an issue where a custom based non Superuser was unable to
push to firewalls.
This issue is resolved
in this hotfix but not
in PAN-OS 10.2.8.
PAN-242027 Fixed an issue where the all-task process repeatedly restarted during
memory allocation failures.
PAN-239367 Fixed an issue on the firewall where a memory leak associated with
the logrcvr process occurred.
PAN-238643 Fixed an issue where a memory leak caused multiple processes to stop
responding when VM Information Sources was configured.
This issue is resolved
in this hotfix but not
in PAN-OS 10.2.8.
PAN-237208 Fixed an issue where the reportd process stopped and the firewall
rebooted.
PAN-233789 Fixed an issue with commit and push and push operations where the
user was not correctly bound to the scope, which caused all device
groups to be selected for a selective push.
PAN-OS Release Notes 10.2.12 162 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
PAN-231148 Fixed an issue where no DHCP option list was defined when using
GlobalProtect.
PAN-229090 Fixed an issue where the logrcvr process stopped responding during
memory allocation failures.
PAN-228515 Fixed an issue where the Elasticsearch cluster health status displayed
as yellow or red due to Elasticsearch SSH tunnel flaps.
This issue is resolved
in this hotfix but not
in PAN-OS 10.2.8.
PAN-223259 Fixed an issue where selective pushes failed with the error message
Failed to generate selective push configuration.
Unable to retrieve last in-sync configuration for
the device, either a push was never done or version
is too old. Please try a full push.
PAN-217293 Fixed a rare issue where URLs were not accessible when the header
length was greater than 16,000 over HTTP/2.
PAN-199070 Fixed an issue where the all_task and pan_task processes stopped
responding, which impacted traffic.
PAN-OS Release Notes 10.2.12 163 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
PAN-239144 Fixed an issue where the web interface was slower than expected
when logging in, committing, and pushing changes after upgrading to
PAN-OS 10.2.7.
PAN-234929 Fixed an issue where tabs in the ACC such as Network Activity Threat
Activity and Blocked Activity did not display data when you applied
a Time filter of Last 15 Minutes, Last Hour, Last 6 Hours, or Last 12
Hours, and the data that was displayed with the Last 24 Hours filter
was not accurate. Reports that were run against summary logs also did
not display accurate results.
PAN-234279 Fixed an issue where the ikemgr process crashed due to an IKEv1
timing issue, which caused commits to fail with the following error
message: Client ikemgr requesting last config in
the middle of a commit/validate, aborting current
commit.
PAN-232377 Fixed an issue where the AddrObjRefresh job failed when the
useridd process restarted.
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-OS Release Notes 10.2.12 164 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
PAN-224067 Fixed an issue where cookie authentication did not work for
GlobalProtect when an authentication override domain was configured
in the SAML authentication profile.
PAN-224060 (PA-220 Series firewalls only) Fixed an issue where multiple dataplane
processes stopped responding after an upgrade.
PAN-223652 Fixed an issue where data was not thread safe and led to concurrent
read/write issues that caused GPSVC to stop working unexpectedly.
PAN-222002 Fixed an issue where content updates failed with the error message
Unable to get key pancontent-8.0.pass from cryptod.
Error -9.
PAN-218057 (PA-7000 Series firewalls only) Fixed an issue where internal path
monitoring failed due to a heartbeat miss.
PAN-OS Release Notes 10.2.12 165 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
PAN-202361 Fixed an issue where packets queued to the pan_task process were still
transmitted when the process was not responding.
PAN-181706 Fixed an issue where the logrcvr process stopped responding after
upgrading to PAN-OS 10.1.
PAN-OS Release Notes 10.2.12 166 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
PAN-236926 Fixed an issue where Elasticsearch shards failed if they were allocated
when tunnels were down, and shards that failed remained unallocated
when tunnels went back up.
PAN-OS Release Notes 10.2.12 167 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
PAN-236605 Fixed an issue where the configd process stopped responding due to a
deadlock related to rule-hit-count.
PAN-232800 Fixed an issue where critical disk usage for /opt/pancfg increased
continuously and the system logs displayed the following message:
Disk usage for /opt/pancfg exceeds limit, <value>
percent in use.
PAN-232132 Fixed an issue where DNS response packets were malformed when an
Anti-Spyware Security Profile was enabled.
PAN-231043 Fixed an issue where websites were not able to be opened via
GlobalProtect with SSL-VPN when software cut through was enabled.
PAN-228998 Fixed an issue where multiple license status checks caused an internal
process to stop responding.
PAN-228877 (PA-7050 firewalls only) Fixed an issue with OOM conditions that
caused slot restarts due to pan_cmd consuming more than 300 MB.
PAN-227539 Fixed an issue where excess WIF process memory use caused
processes to restart due to OOM conditions.
PAN-227368 Fixed an issue where the GlobalProtect app was unable to connect
to a portal or gateway and GlobalProtect Clientless VPN users were
unable to access applications if authentication took more than 20
seconds.
PAN-OS Release Notes 10.2.12 168 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
Issue ID Description
release, commits failed on the firewall when inbound inspection mode
was configured in the decryption policy rule.
PAN-223488 Fixed an issue where closed ElasticSearch shards were not deleted,
which resulted in shard purging not working as expected.
PAN-221190 (PA-800 Series firewalls only) Fixed an issue where the firewall
rebooted due to I2C errors when unsupported optics were inserted in
ports 5-8.
PAN-221126 Fixed an issue where Email server profiles (Device > Server Profiles >
Email and Panorama > Server Profiles > Email) to forward logs as email
notifications were not forwarded in a readable format.
PAN-218521 (M-600 Appliances in Log Collector mode only) Fixed an issue where
Panorama continuously rebooted and became unresponsive, which
consumed excessive logging disk space and prevented new log
ingestion.
PAN-215268 Fixed an issue where selective push did not work for firewalls on PAN-
OS 9.1 or an earlier release.
PAN-214186 Fixed an issue where category length was incorrect, which caused the
dataplane to restart.
PAN-OS Release Notes 10.2.12 169 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.7 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 170 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.6.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.6 Known Issues
• PAN-OS 10.2.6-h3 Addressed Issues
• PAN-OS 10.2.6-h1 Addressed Issues
• PAN-OS 10.2.6 Addressed Issues
171
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
PAN-OS Release Notes 10.2.12 172 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-OS Release Notes 10.2.12 173 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
3. Log in to the primary HA peer Panorama CLI and trigger a
manual synchronization between the active and secondary
HA peers.
request high-availability sync-to-remote running-config
4. Log back in to the active HA peer Panorama web interface
and select Commit > Push to Devices and Push.
PAN-OS Release Notes 10.2.12 174 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
3. Use the Shared configuration object with the reference
in a vsys-specific configuration. For example, reference
the Shared address group (SharedAG1) in a vsys-specific
policy rule.
Workaround: Select Panorama > Setup > Management and
edit the Panorama Settings to enable one of the following:
• Shared Unused Address and Service Objects with
Devices—This options pushes all Shared objects, along
with device group specific objects, to managed firewalls.
This is a global setting and applies to all managed firewalls,
and may result in pushing too many configuration objects
to your managed firewalls.
• Objects defined in ancestors will take higher precedence—
This option specifies that in the event of objects with
the same name, ancestor object take precedence over
descendent objects. In this case, the Shared objects take
precedence over the vsys-specific object.
This is a global setting and applies to all managed firewalls.
In the example above, if the IP address for the Shared
SharedAO1 object was 10.1.1.1 and the device group
specific SharedAO1 was 10.2.2.2, the 10.1.1.1 IP
address takes precedence.
Alternatively, you can remove the duplicate address objects
from the device group configuration to allow only the Shared
objects in your configuration.
PAN-OS Release Notes 10.2.12 175 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See GlobalProtect log displays the error message, User is not in
PAN-OS 10.2.8 Addressed allow list. This happens when the app is restarted or when the
Issues. app tries to reconnect after disconnection.
PAN-223457 If the number of group queries exceeds the Okta rate limit
threshold, the firewall clears the cache for the groups. To
This issue is now resolved. See
avoid encountering this issue, disable the Okta rate limit.
PAN-OS 10.2.8 Addressed
Issues.
PAN-OS Release Notes 10.2.12 176 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
PAN-221126 Email server profiles (Device > Server Profiles > Email and
Panorama > Server Profiles > Email) to forward logs as email
This issue is now resolved. See
notifications are not forwarded in a readable format.
PAN-OS 10.2.7 Addressed
Issues. Workaround: Use a Custom Log Format to forward logs as
email notifications in a readable format.
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
PAN-OS Release Notes 10.2.12 177 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See
PAN-OS 10.2.8 Addressed
Issues.
PAN-OS Release Notes 10.2.12 178 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
• Allow user to Disable GlobalProtect App > Allow with
Passcode
• Allow User to Uninstall GlobalProtect App > Allow with
Password
PAN-OS Release Notes 10.2.12 179 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
Workaround: Restart the log receiver service by running the
following CLI command:
PAN-OS Release Notes 10.2.12 180 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
Workaround: Log out of the firewall and log in again to make
the SCIT INIT option available on the web interface.
PAN-OS Release Notes 10.2.12 181 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 182 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
• Define URL exceptions for specific web sites—
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 183 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
likely to occur when multiple EDLs are configured to check
for updates every 5 minutes.
PAN-OS Release Notes 10.2.12 184 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 185 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-OS Release Notes 10.2.12 186 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
PAN-227376 Fixed an issue where a memory overrun caused the all_task process to
stop responding.
PAN-225240 Fixed an issue where the OSPF neighbor state remained in exstart
when the OSPF network had more than 40 routes.
PAN-221728 Fixed an issue where selective pushes did not work after upgrading to
PAN-OS 10.2.4.
PAN-214273 Fixed an issue where Elasticsearch logs were not cleared, which
caused the root partition to fill up.
PAN-205015 Fixed an issue where not all users were included in the user group
after an incremental sync between the firewall and the Cloud Identity
Engine.
PAN-OS Release Notes 10.2.12 187 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.6 Known and Addressed Issues
Issue ID Description
PAN-204868 Fixed an issue where disk utilization was continuously high due to the
log purger not sufficiently reducing the utilization level.
PAN-198509 Fixed an issue where commits failed due to insufficient CFG memory.
PAN-198043 Fixed a rare issue where aBuildXmlCache job failed on the firewall.
PAN-OS Release Notes 10.2.12 188 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.5.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.5 Known Issues
• PAN-OS 10.2.5-h6 Addressed Issues
• PAN-OS 10.2.5-h4 Addressed Issues
• PAN-OS 10.2.5-h1 Addressed Issues
• PAN-OS 10.2.5 Addressed Issues
189
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
PAN-OS Release Notes 10.2.12 190 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-OS Release Notes 10.2.12 191 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 192 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-223457 If the number of group queries exceeds the Okta rate limit
threshold, the firewall clears the cache for the groups. To
This issue is now resolved. See
avoid encountering this issue, disable the Okta rate limit.
PAN-OS 10.2.8 Addressed
Issues.
PAN-OS Release Notes 10.2.12 193 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-221126 Email server profiles (Device > Server Profiles > Email and
Panorama > Server Profiles > Email) to forward logs as email
This issue is now resolved. See
notifications are not forwarded in a readable format.
PAN-OS 10.2.7 Addressed
Issues. Workaround: Use a Custom Log Format to forward logs as
email notifications in a readable format.
PAN-OS Release Notes 10.2.12 194 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
PAN-OS Release Notes 10.2.12 195 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
when you are redirected to the ACC after clicking a threat
name in the Threat Monitor and filtering the same threat
name in the Global Filters.
PAN-OS Release Notes 10.2.12 196 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 197 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 198 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
admin > request plugins dlp reset
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 199 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
sync, which causes the firewall to not correctly populate the
Source User column in the session logs.
PAN-OS Release Notes 10.2.12 200 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
As a result, the firewall fails to boot normally and enters
maintenance mode. HA Pairs of Active-Passive and Active-
Active firewalls are not affected.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 201 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 202 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-OS Release Notes 10.2.12 203 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 204 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
PAN-227179 Fixed an issue where routes were not updated in the forwarding table.
PAN-225340 Fixed an issue where GlobalProtect users were unable to connect after
upgrading to PAN-OS 10.2.4 due to an incorrect client authentication
configuration being selected.
PAN-225183 Fixed an issue where SSH tunnels were unstable due to ciphers used
as part of the high availability SSH configuration.
PAN-224273 Fixed an issue where the debug dataplane pow status CLI
command did not display extended NIC statistics.
PAN-223501 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue
where diagnostic information for the dataplane in the dp-monitor.log
file was not complete.
PAN-223317 Fixed an issue where SSL traffic failed with the error message: Error:
General TLS protocol error.
PAN-222712 (PA-5450 firewalls only) Fixed a low frequency DPC restart issue.
PAN-221881 Fixed an issue where log ingestion to Panorama failed, which resulted
in missing logs under the Monitor tab.
PAN-221836 Fixed an issue where improper SNI detection caused incorrect URL
categorization.
PAN-221647 Fixed an issue where the Apps seen value was not reflected on
Panorama.
PAN-OS Release Notes 10.2.12 205 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-220899 Fixed an issue where you were unable to choose the manual
GlobalProtect gateway.
PAN-220747 Fixed an issue where logs were not visible after restarting the log
collector.
PAN-220626 Fixed an issue where system warning logs were written every 24
hours.
PAN-219686 Fixed an issue where a device group push operation from Panorama
failed with the following error on managed firewalls: vsys <vsys1>
plugins unexpected here vsys is invalid Commit
failed.
PAN-219659 Fixed an issue where root partition frequently filled up and the
following error message was displayed: Disk usage for /
exceeds limit, xx percent in use, cleaning
filesystem.
PAN-219573 Fixed an issue where tag names did not correctly display special
characters.
PAN-OS Release Notes 10.2.12 206 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-219498 Fixed an issue where the Threat ID/Name detail in Threat logs was not
included in syslog messages sent to Splunk.
PAN-219253 Fixed an issue where, after making changes in a template, the Commit
and Push option was grayed out.
PAN-218947 Fixed an issue where logs were not displayed in Elasticsearch under
ingestion load.
PAN-218644 Fixed an issue where the firewall generated incorrect VSA attribute
codes when radius was configured with EAP-based authentication
protocols.
PAN-218620 Fixed an issue where scheduled configuration exports and SCP server
connection testing failed.
PAN-218335 Fixed an issue with hardware destination MAC filtering on the Log
Processing Card (LPC) that caused the logging card interface to be
susceptible to unicast flooding.
PAN-218318 Fixed an issue where the firewall changed the time zone automatically
instead of retrieving the correct time zone from the NTP server.
PAN-218264 (PA-3400 and PA-1400 Series firewalls only) Fixed an issue where
packet drops occurred due to slow servicing of internal hardware
queries.
PAN-218151 Fixed an issue where a configuration push to a new firewall did not
work and displayed validation errors.
PAN-218107 Fixed an issue with ciphers used for SSH tunnels where packet lengths
were too large, which made the SSH tunnel unstable.
PAN-OS Release Notes 10.2.12 207 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-218001 (PA-400 Series firewalls only) Fixed an issue where shut down
commands rebooted the system instead of correctly triggering a
shutdown.
PAN-217681 Fixed an issue caused by out of order TCP segments where the TCP
retransmission failed when the TCP segment had the FIN flag and the
TCP data was truncated.
PAN-217581 Fixed an issue where the firewall did not initiate scheduled log uploads
to the FTP server.
PAN-217431 (PA-5400 Series firewalls with DPC (Data Processing Cards) only)
Fixed an issue with slot 2 DPCs where URL Filtering did not work as
expected after upgrading to PAN-OS 10.1.9.
PAN-217284 Fixed an intermittent issue where an LACP flap occurred when the
LACP transmission rate was set to Fast.
PAN-217169 Fixed an issue where the logrcvr stopped forwarding logs to the syslog
server after a restart or crash.
PAN-216996 Fixed an issue where multiple User-ID alerts were generated every 10
minutes.
PAN-216957 Fixed an issue where allow list checks in an authentication profile did
not work if the group Distinguished Name contains the ampersand
( & ) character.
PAN-OS Release Notes 10.2.12 208 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-216821 Fixed an issue where the reportd process stopped responding after
upgrading an M-200 appliance to PAN-OS 10.2.4.
PAN-216662 Fixed an issue where a custom Antispyware profile did not open
and displayed the following error message: The server is not
responding. Please wait and try your operation
again later.
PAN-216366 Fixed an issue where, when custom signatures used a certain syntax,
false positives were generated on devices on a PAN-OS 10.0 release.
PAN-216054 Fixed an issue that caused the firewall's fan speed to increase while it
was idle.
PAN-216048 Fixed an issue where, when upgrading from a PAN-OS 9.1 release to
a PAN-OS 10.0 release, commits failed with the error message: hip
profiles unexpected here.
PAN-215911 Fixed an issue that resulted in a race condition, which caused the
configd process to stop responding.
PAN-215808 Fixed an issue where, after upgrading to PAN-OS 10.1, the log
forwarding rate toward the syslog server was reduced. With this fix,
the overall log forwarding rate has also been improved.
PAN-215780 Fixed an issue where changes to Zone Protection profiles made via
XML API were not reflected in the zone protection configuration.
PAN-215778 Fixed an issue where API Get requests for /config timed out due to
insufficient buffer size.
PAN-215655 Fixed an issue where, after a multidynamic group push, Security policy
rules with the target device tag were added to a firewall that did not
have the tag.
PAN-OS Release Notes 10.2.12 209 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-215496 Fixed an issue where 100G ports did not come up with BIDI QSFP
modules.
PAN-215338 (PA-5400 Series firewalls only) Fixed an issue where the inner VLAN
tag for Q-in-Q traffic was stripped when forwarding.
PAN-215066 Fixed an issue on Panorama where push scope rendering caused the
Commit and Push or Push to Devices operation window to hang for
several minutes.
PAN-214990 Fixed an issue where firewall copper ports flapped intermittently when
device telemetry was enabled.
PAN-214815 Fixed an issue where SNMP queries were not replied to due to an
internal process timeout.
PAN-214727 Fixed an issue where a memory leak related to the useridd process
resulted in an OOM condition, which caused the process to stop
responding.
PAN-214669 Fixed an issue where FIN and RESET packets were sent in reverse
order.
PAN-214201 Fixed an issue where, after exporting custom reports to CSV format,
the letter b appeared at the beginning of each column.
PAN-214187 Fixed an issue where superreaders were able to execute the request
restart system CLI command.
PAN-OS Release Notes 10.2.12 210 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-213949 Fixed an issue where the VPN responder stopped responding when it
received a CREATE_CHILD message with no security association (SA)
payload.
PAN-213942 (PA-400 Series firewalls) Fixed an issue where the firewall required an
explicit allow rule to forward broadcast traffic.
PAN-213932 Fixed an issue where, when an incorrect log filter was configured, the
commit did not fail.
PAN-213931 Fixed an issue where the logrcvr process cache was not in sync with
the mapping on the firewall.
PAN-213296 Fixed an issue where Single Log-out (SLO) was not correctly triggered
from the firewall toward the client, which caused the client to not
initiate the SLO request toward the identity provider (IdP). This
resulted in the IdP not making the SLO callback to the firewall to
remove the user.
PAN-213162 Fixed an issue where an SD-WAN object was not displayed under a
child device group.
PAN-213077 Fixed an issue where the sysdagent process stopped responding, which
caused interfaces and the subsequent connections behind them to fail.
PAN-213060 Fixed an issue where Panorama did not show the target under the
Entities column.
PAN-212978 Fixed an issue where the firewall stopped responding when executing
an SD-WAN debug CLI command.
PAN-212889 Fixed an issue on Panorama where different threat names were used
when querying a threat under Threat Monitor (Monitor > App Scope)
and the ACC. This resulted in the ACC displaying no data after clicking
a threat name in Threat Monitor and filtering it in the global filters.
PAN-OS Release Notes 10.2.12 211 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-212726 Fixed an issue where RTP/RTCP packets were dropped for SIP calls
by SIP ALG when the source NAT translation type was persistent
Dynamic IP And Port.
PAN-212577 (PA-5200 Series and PA-7080 firewalls only) Fixed an issue where
commits took longer than expected when more than 45,000 Security
policy rules were configured.
PAN-212530 Fixed an issue on log collectors where root partition reached 100%
utilization.
PAN-212057 Fixed an issue where Advanced Threat Prevention caused SSL delays
when no URL licenses were present.
PAN-211997 Fixed an issue where large OSPF control packets were fragmented,
which caused the neighborship to fail.
PAN-211843 Fixed an issue where renaming a Zone Protection profile failed with
the error message Obj does not exist.
PAN-211602 Fixed an issue where, when viewing a WildFire Analysis report via the
web interface, the detailed log view was not accessible if the browser
window was resized.
PAN-211575 Fixed an issue where a local commit on Panorama remained at 99% for
longer than expected before completing.
PAN-OS Release Notes 10.2.12 212 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-211519 Fixed an issue where RTP/RTCP packets were dropped for SIP calls
by SIP ALG when the source NAT translation type was persistent
Dynamic IP And Port.
PAN-211441 Fixed a memory leak issue related to SSL crypto operations that
resulted in failed commits.
PAN-211191 Fixed an issue where the firewall restarted after initiating a mgmtsrvr
process restart.
PAN-210883 Fixed an issue where SSL proxy traffic was dropped when DoS zone
protection was enabled.
PAN-210736 Fixed an issue where configuration changes related to the SSH service
profile were not reflected when pushed from Panorama. With this
fix, the deletion of ciphers, MAC, and kex fields of SSH server profiles
and HA profiles won't clear the values under template stacks and will
retain the values configured from templates.
PAN-OS Release Notes 10.2.12 213 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-210563 Fixed an issue on Panorama where Security policy rules with a Tag
target did not appear in the pre-rule list of a Dynamic Address Group
that was part of the tag.
PAN-210502 Fixed an issue where Panorama was unable to convert to PAN-OS 9.1
syntax for WF-500 appliances.
PAN-210456 Fixed an issue where high latency occurred on PA-850-ZTP when SSL
decryption was enabled.
PAN-210452 Fixed an issue where application PCAP was not generated when
Security policy rules were used as a filter.
PAN-210451 Fixed an issue where the firewall did not send the source IP address
of the user to the RADIUS server with the set authentication
radius-vsa-on client-source-ip CLI command.
PAN-210429 (VM-Series firewalls only) Fixed an issue where the HTTP service
failed to come up on DHCP dataplane interfaces after rebooting the
firewall, which resulted in health-check failure on HTTP/80 with a 503
error code on the public load balancer.
PAN-210364 Fixed an issue where high latency was observed when accessing
internal web applications, which interrupted development activities
related to the web server.
PAN-210325 Fixed an issue on the firewall where the configuration log always
displayed commit-all operations as successful even when the commit
failed.
PAN-210216 A debug command was added to address an issue with firewalls in high
availability configurations.
PAN-210158 (CN-Series firewalls only) Fixed an issue where the dataplane stopped
responding after a container restart.
PAN-210000 Fixed an issue where, when traffic and Threat logs exceeded the
threshold of 90% total allowed size, alarms were not generated for
other log types.
PAN-OS Release Notes 10.2.12 214 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-209930 Fixed an issue where cloned rules pushed from Panorama were not
shown on the managed firewall.
PAN-209696 Fixed an issue where link-local address communication for IPv6, BFD,
and OSPFv3 neighbors was dropped when IP address spoofing check
was enabled in a Zone Protection profile.
PAN-209585 The Palo Alto Networks QoS implementation now supports a new QoS
mode called lockless QoS for PA-3400, PA-5410, PA-5420, PA-5430,
and PA-5440 firewalls. For firewalls with higher bandwidth QoS
requirements, the lockless QoS dedicates cores to the QoS function
that improves QoS performance, resulting in improved throughput and
latency.
PAN-209501 Fixed an issue where the GlobalProtect logdb quota was not
displayed in the show system logdb quota output.
PAN-209375 Fixed an issue on the firewall where log filtering did not work as
expected.
PAN-209172 Fixed an issue where the firewall was unable to handle GRE packets
for Point-to-Point Tunneling Protocol (PPTP) connections.
PAN-208902 Fixed an issue where, when a client sent a TCP/FIN packet, the
firewall displayed the end reason as aged-out instead of tcp-fin.
PAN-OS Release Notes 10.2.12 215 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-208792 Fixed an issue where authentication failed when the service route for
RADIUS traffic was configured as use default for IPv4 addresses and
included the dataplane interface as the destination route.
PAN-208567 Fixed an issue with email formatting where, when a scheduled email
contained two or more attachments, only one attachment was visible.
PAN-208343 Fixed an issue where telemetry regions were not visible on Panorama.
PAN-208325 (PA-5400 Series, PA-3400 Series, and PA-400 Series only) Fixed an
issue where the firewall was unable to automatically renew the device
certificate.
PAN-208201 Fixed an issue on the firewall where the modified date and time was
incorrectly updated after a commit operation, PAN-OS upgrade, or
reboot.
PAN-208187 Fixed an issue where REST API requests did not work for
GlobalProtect gateway tunnels.
PAN-208090 Fixed an issue where the ACC report did not display data when
querying the filter for the fields Source and Destination IP.
PAN-208039 (PA-7000 Series firewalls with SMC-B only) Fixed an issue where the
details of configuration changes were not included in configuration
logs on the syslog server.
PAN-207842 Fixed an issue where WildFire Analysis reports were not visible when
the WF-500 appliance was on private cloud.
PAN-207741 Fixed an issue where Large Scale VPN (LSVPN) Portal authentication
failed with the error invalid http response. return
error(Authentication failed; Retry authentication
when the satellite connected to more than one portal.
PAN-207700 Fixed an issue where the show system info and show system
ztp status CLI commands displayed a different Zero Touch
PAN-OS Release Notes 10.2.12 216 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
Provisioning (ZTP) status if a firewall upgrade was initiated from
Panorama before the initial commit push succeeded.
PAN-207604 Fixed an issue where system logs continuously generated the log
message Not enough space to load content to SHM.
PAN-207457 Fixed an issue where the MLAV allow list did not work for some types
of traffic.
PAN-206765 Fixed an issue where log forwarding filters involving negation did not
work.
PAN-206640 Fixed an issue where the ikemgr process stopped responding, which
caused IPSec tunnels to go down.
PAN-206396 Fixed an issue where HIP report flip and HIP check failed when a user
was part of multiple user groups with different domains.
PAN-206391 Fixed an issue where shared objects were seen under the push scope
with every configuration push.
PAN-206278 Fixed an issue where a critical system log was generated when the
boot drive for PA-7000 Series firewall Switch Management Cards
(SMCs) failed.
PAN-205513 Fixed an issue where the stats dump file generated by Panorama for
a device firewall differed from the stats dump file generated by the
managed device.
PAN-OS Release Notes 10.2.12 217 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-205086 Fixed an issue where DNS Security categories were able to be deleted
from spyware profiles.
PAN-204718 (PA-5200 Series firewalls only) Fixed an issue where, after upgrading
to PAN-OS 10.1.6-h3, a TACACS user login displayed the following
error message during the first login attempt: Could not chdir to
home directory /opt/pancfg/home/user: Permission
denied.
PAN-204683 Fixed an issue where logs were unable to be generated due to old logs
not getting purged and /opt/panlogs reaching over 100% usage.
PAN-204530 Fixed an issue where giving up FTP or SCP sessions for log export
took longer than expected after a failure to export the log when one
of the destination hosts designated in the scheduled log export was
unresponsive.
PAN-204233 Fixed an issue where, when the firewall received a 513 error from the
WildFire cloud, the firewall attempted to repeatedly send the same
file.
PAN-204215 (PA-7000 Series firewalls with Log Processing Cards (LPCs) only)
Fixed an issue where performing a commit operation resulted in the
following error messages: log forwarding is setup for data
but log-card interface is not setup or log forwarding
is setup for traffic but log-card interface is not
setup.
PAN-203791 (PA-3400 and PA-5400 Series firewalls only) Fixed an issue where
the log type correlation was not configurable and displayed as
$.Format.Correlation (Device > Server Profile > syslog ><Profile-
name> > Customer log format > log type).
PAN-203655 Fixed an issue where enabling event-specific traps (Device > Setup >
Operations > Miscellaneous > SNMP Setup), the new deviating device
system logs included incorrect information.
PAN-OS Release Notes 10.2.12 218 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-203611 Fixed an issue where URL categorization was not recognized for URLs
that contained more than 100 characters.
PAN-203222 Fixed an issue where commit-all operations took longer than expected
due to cURL failures and timeouts related to external dynamic list
retrieval.
PAN-203168 Fixed an issue where the WIF state was not cleaned up promptly
after usage, which caused allocation failure. This fix increased the
wif_state quota.
PAN-202981 Fixed an issue on Panorama where global find did not return results for
existing universally unique identifiers (UUID).
PAN-202963 Fixed an issue where the system log message dsc HA state is
changed from 1 to 0 was generated with the severity High. With
this fix, the severity was changed to Info.
PAN-202524 Fixed an issue where the session ID was missing in the session details
section of the ingress-backlogs XML API output.
PAN-201855 Fixed an issue where, after cloning a template, a certificate with the
block private key option enabled was corrupted.
PAN-201515 Fixed an issue with the web interface where the cursor disappeared
under the Policies and Objects tabs on the search bar if the cursor was
moved quickly.
PAN-200394 Fixed an issue where, after a push from Panorama to one or more
device groups in a multi-vsys environment, vulnerability profile
exceptions were not seen on all firewalls.
PAN-OS Release Notes 10.2.12 219 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-199687 Fixed an issue where content updates failed when using prelicensed
keys during the bootstrap process.
PAN-199557 Fixed an issue on Panorama where virtual memory usage exceeded the
set limit, which caused the configd process to restart.
PAN-198453 Fixed an issue where you were unable to resize the Description pop-
up window (Policies > Security > Prerules).
PAN-197493 Fixed an issue where having multiple terminal service agents with the
same hostname caused the firewall to reboot.
PAN-197388 Fixed an issue where, when the firewall forwarded Threat logs via
email, the email client truncated the sender and recipient email
addresses when they were put between angle brackets (<, >).
PAN-196956 Fixed an issue where URL Filtering logs did not display matching
entries when filtered by device name.
PAN-196923 Fixed an issue where the interface option did not have a source
address in the cURL command, which caused a DNS lookup error and
resulted in DNS lookup failing for device Telemetry.
PAN-196597 Fixed an issue where the dnsproxyd process stopped responding due to
corruption.
PAN-OS Release Notes 10.2.12 220 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-195788 Fixed an issue where zip files did not download when applying Security
inspection and the following error message displayed: resources-
unavailable.
PAN-195251 Fixed an issue where IPSec tunnel re-key generated the critical log
message tunnel-status-up.
PAN-193521 Fixed an issue where Panorama > Device > Deployment > Software
did not display software after running check now for managed devices.
PAN-190903 Fixed an issue where MAC addresses in threat capture were swapped
between the source MAC and destination MAC addresses.
PAN-190055 (VM-Series firewalls only) Fixed an issue where the firewall did not
follow the set Jumbo MTU value.
PAN-189328 Fixed an issue where traffic belonging to the same session was sent
out from different ECMP enabled interfaces.
PAN-187989 Fixed an issue where a user who did not have permissions of other
access domains were able to view the commit and configuration lock.
PAN-186956 Fixed an issue where SD-WAN DIA VIF did not become active if
default gateways for member interfaces did not respond to pings.
PAN-186182 Fixed an issue where software buffer 3 was depleted when URL proxy
was enabled and SSL sessions were decrypted to inject the block page.
This issue occurred when an HTTP/2 block page was displayed for a
large POST request.
PAN-OS Release Notes 10.2.12 221 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-185249 Fixed an issue where Template Stack overrides (Dynamic Updates >
App & Threats > Schedule) were not able to be reverted via the web
interface.
PAN-184630 Fixed an issue where TLS clients, such as those using OpenSSL 3.0,
enforced the TLS renegotiation extension (RFC 5746).
PAN-183297 Fixed an issue where, when the firewall received a large amount of
user information, the firewall was unable to output IP address-to-
username mapping information via XML API.
PAN-182960 Additional error logs were added for an issue where, when multiple
Panorama web interface sessions were opened, active lock did not
show up on the web interface for any session.
PAN-180082 Fixed an issue where errors in brdagent logs caused dataplane path
monitoring failure.
PAN-176412 Fixed an issue where changing the password of a local database user
did not work.
PAN-172977 Fixed an issue where session offloading did not occur on a tap
interface under a high packet load.
PAN-172600 Fixed an issue where the CLI command show rule-hit-count did
not provide all details of the rule from the device group.
PAN-169586 Fixed an issue where scheduled log view reports in emails didn't match
the monitor page query result for the same time interval.
PAN-168102 Fixed an issue where the API format to check heap usage of a node
showed a JSON error.
PAN-OS Release Notes 10.2.12 222 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
Issue ID Description
PAN-160633 (PA-3200 Series, PA-5200 Series, and PA-7000 Series firewalls only)
Fixed an issue where the dataplane restarted repeatedly due to an
internal path monitoring failure until a power cycle.
PAN-OS Release Notes 10.2.12 223 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.5 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 224 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.4.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.4 Known Issues
• PAN-OS 10.2.4-h16 Addressed Issues
• PAN-OS 10.2.4-h10 Addressed Issues
• PAN-OS 10.2.4-h4 Addressed Issues
• PAN-OS 10.2.4-h3 Addressed Issues
• PAN-OS 10.2.4-h2 Addressed Issues
• PAN-OS 10.2.4 Addressed Issues
225
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
PAN-OS Release Notes 10.2.12 226 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-OS Release Notes 10.2.12 227 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 228 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See shard purging to not work as expected, resulting in high disk
PAN-OS 10.2.7 Addressed usage.
Issues.
PAN-OS Release Notes 10.2.12 229 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
PAN-OS Release Notes 10.2.12 230 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
show -> dis-block-table is unexpected
PAN-OS Release Notes 10.2.12 231 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See • M-300 and M-700
PAN-OS 10.2.5 Addressed • PA-410 Firewall
Issues.
• PA-440, PA-450, and PA-460 Firewalls
• PA-3400 Series
• PA-5410, PA-5420, and PA-5430 Firewalls
• PA-5450 Firewall
Workaround: Log in to the firewall CLI or Panorama CLI and
fetch the device certificate.
PAN-OS Release Notes 10.2.12 232 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 233 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
Workaround: Restart the log receiver service by running the
following CLI command:
PAN-OS Release Notes 10.2.12 234 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
Workaround: Log out of the firewall and log in again to make
the SCIT INIT option available on the web interface.
PAN-OS Release Notes 10.2.12 235 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 236 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
Workaround: Configuration settings for URL Filtering
Inline ML must be applied through the CLI. The following
configuration commands are available:
• Define URL exceptions for specific web sites—
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 237 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See configured to Check for updates every 5 minutes due to the
PAN-OS 10.2.10 Addressed commit and EDL fetch processes overlapping. This is more
Issues. likely to occur when multiple EDLs are configured to check
for updates every 5 minutes.
PAN-OS Release Notes 10.2.12 238 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 239 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-OS Release Notes 10.2.12 240 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 241 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 242 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 243 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
INVALID_SPI, which resulted in temporary loss of traffic
over some proxy IDs.
PAN-OS Release Notes 10.2.12 244 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
PAN-217484 Fixed an issue where the rasmgr process used 100% CPU
due to a maximum duration timer not being set, which
caused the GlobalProtect gateway to be unavailable.
PAN-217431 Fixed an issue with slot 2 DPCs where URL Filtering did
not work as expected after upgrading to PAN-OS 10.1.9.
PAN-215496 Fixed an issue where 100G ports did not come up with
BIDI QSFP modules.
PAN-OS Release Notes 10.2.12 245 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 246 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
WF500-5976 (WF-500 appliances only) Fixed an issue where files were incorrectly
detected as malicious.
WF500-5953 Fixed an issue where testing the same file sample using a PowerShell
script returned different verdicts in Private Cloud and Public Cloud.
PAN-219686 Fixed an issue where a device group push operation from Panorama
failed with the following error on managed firewalls.
vsys -> vsys1 -> plugins unexpected here
vsys is invalid
Commit failed
PAN-216656 Fixed an issue where the firewall was unable to fully process the user
list from a child group when the child group contained more than
1,500 users.
PAN-216314 (PA-3200 Series firewalls only) Fixed an issue where, after upgrading
to or from PAN-OS 10.1.9 or PAN-OS 10.1.9-h1, offloaded application
traffic sessions disconnected even when a session was active. This
occurred due to the application default session timeout value being
exceeded.
PAN-215911 Fixed an issue that resulted in a race condition, which caused the
configd process to stop responding.
PAN-215488 Fixed an issue where an expired Trusted Root CA was used to sign the
forward proxy leaf certificate during SSL Decryption.
PAN-215461 Fixed an issue where the packet descriptor leaked over time with GRE
tunnels and keepalives.
PAN-OS Release Notes 10.2.12 247 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-215125 Fixed an issue where false negatives occurred for some script samples.
PAN-213973 Fixed an issue where the authd process stopped responding during a
cleanup of authentication server context.
PAN-212982 Fixed an issue where the logrcvr process stopped responding with
MICA HTTP2 traffic.
PAN-212409 Fixed an issue where there were duplicate IPSec Security Associations
(SAs) for the same tunnel, gateway, or proxy ID.
PAN-211242 Fixed an issue where missed heartbeats caused the Data Processing
Card (DPC) and its corresponding Network Processing Card (NPC) to
restart due to internal packet path monitoring failure.
PAN-210892 (M-600 and M-700 appliances only) Fixed an issue where the
Elasticsearch shard count grew continuously without limit.
PAN-210875 Fixed an issue where the pan_task process stopped responding due to
software packet buffer 3 trailer corruption, which caused the firewall
to restart.
PAN-OS Release Notes 10.2.12 248 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-210561 Fixed an issue where the all_task process repeatedly restarted due to
missed heartbeats.
PAN-210481 Fixed an issue where botnet reports were not generated on the
firewall.
PAN-210449 Fixed an issue where the value for shared objects used in policy
rules were not displayed on multi-vsys firewalls when pushed from
Panorama.
PAN-210331 Fixed an issue where the firewall did not send device telemetry files
to Strata Logging Service with the error message Send File to
Strata Logging Service Receiver Failed.
PAN-210237 Fixed an issue where system logs generated by Panorama for commit
operations showed the severity as High instead of Informational.
PAN-210080 Fixed an issue where the useridd process stopped responding when
add and delete member parameters in an incremental sync query were
empty.
PAN-209305 Fixed a memory space issue where the content and threat detection
(CTD) process flow cleanup during inline cloud analysis did not work.
PAN-209226 Fixed an issue where the feature bits function reused shared memory,
which resulted in a memory allocation error and caused the dataplane
to go down.
PAN-OS Release Notes 10.2.12 249 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-209021 Fixed an issue where packets were fragmented when SD-WAN VPN
tunnel was configured on aggregate ethernet interfaces and sub-
interfaces.
PAN-208987 (PA-5400 Series only) Fixed an issue where packets were not
transmitted from the firewall if its fragments were received on
different slots. This occurred when aggregate ethernet (AE) members
in an AE interface were placed on a different slot.
PAN-208877 Fixed an issue where the all_task process stopped responding when
freeing the HTTP2 stream, which caused the dataplane to go down.
PAN-208724 Fixed an issue where port pause frame settings did not work as
expected and incorrect pause frames occurred.
PAN-208711 (PA-5200 Series firewalls only) The CLI command debug dataplane
set pow no-desched yes/no was added to address an issue
where the all_pktproc process stopped responding and caused traffic
issues.
PAN-208485 Fixed an issue where NAT policies were not visible on the CLI if they
contained more than 32 characters.
PAN-208189 Fixed an issue when traffic failed to match and reach all destinations
if a Security policy rule includes FQDN objects that resolve to two or
more IP addresses.
PAN-OS Release Notes 10.2.12 250 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-208157 Fixed an issue where malformed hints sent from the firewall caused
the logd process to stop responding on Panorama, which caused a
system reboot into maintenance mode.
PAN-207940 Fixed an issue where platforms with RAID disk checks were performed
weekly, which caused logs to incorrectly state that RAID was
rebuilding.
PAN-207891 Fixed an issue on Panorama where log migration did not complete
after an upgrade.
PAN-207740 Fixed an issue that resulted in a race condition, which caused the
configd process to stop responding.
PAN-207663 Fixed a Clientless VPN issue where JSON stringify caused issues with
the application rewrite.
PAN-207629 Fixed an issue where a selective push to firewalls failed if the firewalls
were enabled with multiple vsys and the push scope contained shared
objects in device groups.
PAN-207623 Fixed an issue on Panorama where log migration did not complete as
expected.
PAN-207610 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue
where Log Admin Activity was not visible on the web interface.
PAN-207602 Fixed an issue where file streams were opened or closed twice due to
a race condition which caused Linux to stop responding.
PAN-207601 Fixed an issue where URL cloud connections were unable to resolve
the proxy server hostname.
PAN-OS Release Notes 10.2.12 251 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-207533 Fixed an issue with firewalls in HA configurations where ARP and IPv6
multicast packets were transmitted from the passive firewall.
PAN-207455 Fixed an issue where the pan_task process stopped responding when
processing client certificate requests from the server in TLS1.3.
PAN-207426 Fixed an issue where a selective push did not include the Share
Unused Address and Service Objects with Devices option on
Panorama, which caused the firewall to not receive the objects during
the configuration push.
PAN-207260 A commit option was enabled for Device Group and Template
administrators after a password change.
PAN-207043 Fixed an issue on PAN-OS 10.2.3 where ports 41-44 remained down
when the PAN-QSFP28-DAC-5M cable was connected.
PAN-206963 (M-700 Appliances only) A CLI command was added to check the
status of each physical port of a bond1 interface.
PAN-206858 Fixed an issue where a segmentation fault occurred due to the useridd
process being restarted.
PAN-206796 Fixed an issue where cfg.lcaas-region was not reset when it was
empty, which caused Strata Logging Service onboarding to fail.
PAN-206658 Fixed a timeout issue in the Intel ixgbe driver that resulted in internal
path monitoring failure.
PAN-OS Release Notes 10.2.12 252 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-206253 (PA-3400 Series firewalls only) Fixed an issue where the default log
rate value was too low, and the maximum configurable log rate was
capped incorrectly, which caused the firewall to not generate more
than 6826 logs per second.
PAN-206251 (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only)
Fixed an issue where the logrcvr process did not send the system-
start SNMP trap during startup.
PAN-206233 Fixed an issue where the pan_comm process stopped responding when
a content update and a cloud application update occurred at the same
time.
PAN-206069 Fixed an issue where the firewall was unable to boot up on older Intel
CPUs.
PAN-206005 (PA-3400 Series firewalls only) Fixed an issue where the l7_misc
memory pool was undersized and caused connectivity loss when the
limit was reached.
PAN-205995 Fixed an issue where logs from unaffected log collector groups were
not displayed when a log collector was down.
PAN-OS Release Notes 10.2.12 253 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-205955 Fixed an issue where RAID rebuilds occurred even with healthy disks
and a clean shutdown.
PAN-205877 (PA-5450 firewalls only) Added debug commands for an issue where
a MAC address flap occurred on a neighbor firewall when connecting
both MGT-A and MGT-B interfaces.
PAN-205829 Fixed an issue where logs did not display Host-ID details for
GlobalProtect users despite having a quarantine Security policy rule.
This occurred due to a missed local cache lookup.
PAN-205729 (PA-3200 Series and PA-7000 Series firewalls only) Fixed an issue
where the CPLD watchdog timeout caused the firewall to reboot
unexpectedly.
PAN-205699 Fixed an issue where the cloud plugin configuration was automatically
deleted from Panorama after a reboot or a configd process restart.
PAN-205590 Fixed an issue where the fan tray fault LED light was on even though
no alarm was reported in the system environment.
PAN-205453 Fixed an issue where running reports or queries under a user group
caused the reportd process to stop responding.
PAN-205451 Fixed an issue where the pan_com process stopped responding due to
aggressive commits.
PAN-205428 Fixed an issue where WildFire submissions failed if the file name
contained special characters.
PAN-205396 Fixed an issue where SD-WAN adaptive SaaS path monitoring did not
work correctly during a next hop link down failure.
PAN-205337 Fixed an issue in the Run Now section of custom reports where
Threat/Content Name displayed in hypertext, and hovering over the
text with the mouse displayed the message undefined.
PAN-205260 Fixed an issue where there was an IP address conflict after a reboot
due to a transaction ID collision.
PAN-OS Release Notes 10.2.12 254 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-205255 Fixed a rare issue that caused the dataplane to restart unexpectedly.
PAN-205222 Fixed an issue where you were unable to add a new application in a
selected policy rule.
PAN-205211 Fixed an issue where the reportd process stopped responding while
querying logs (Monitor > Logs > <logtype>).
PAN-205187 Fixed an issue where Elasticsearch did not start properly when a
newly installed Panorama virtual appliance powered on for the first
time, which caused the Panorama virtual appliance to not query logs
forwarded from the managed firewall to a Log Collector.
PAN-205096 Fixed an issue where promoted sessions were not synced with all
cluster members in an HA cluster.
PAN-205030 Fixed an issue where, when a session hit policy based forwarding with
symmetric return enabled was not offloaded, the firewall received
excessive return-mac update messages, which resulted in resource
contention and traffic disruption.
PAN-204892 Fixed an issue on Panorama where the web interface was not
accessible and displayed the error 504 Gateway Not Reachable
due to the mgmtsrvr process not responding.
PAN-204838 Fixed an issue where the dot1q VLAN tag was missing in ARP reply
packets.
PAN-204830 Fixed an issue where logging in via the web interface or CLI did not
work until an auto-commit was complete.
PAN-204749 Fixed an issue where sudden, large bursts of traffic destined for an
interface that was down caused packet buffers to fill, which stalled
path monitor heartbeat packets.
PAN-OS Release Notes 10.2.12 255 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-204663 Fixed an issue on Panorama where you were unable to context switch
from one managed firewall to another.
PAN-204582 Fixed an issue where, when a firewall acting as a DHCP client received
a new DHCP IP address, the firewall did not release old DHCP IP
addresses from the IP address stack.
PAN-204581 Fixed an issue where, when accessing a web application via the
GlobalProtect Clientless VPN, the web application landing page
continuously reloaded.
PAN-204575 (PA-7000 Series firewalls with Log Forwarding Cards (LFCs) only)
Fixed an issue where the firewall did not forward logs to the log
collector.
PAN-204482 Fixed an issue where searching threat logs (Monitor > Logs > Threat)
using the partial hash parameter did not work, which resulted in
an invalid operator error.
PAN-204456 Fixed an issue related to the logd process that caused high memory
consumption.
PAN-204271 Fixed an issue where the quarantine device list did not display due to
the maximum memory being reached.
PAN-204238 Fixed an issue where, when View Rulebase as Groups was enabled,
the Tags field did not display a scroll down arrow for navigation.
PAN-204216 Fixed an issue where URL categorization failed and the firewall
displayed the URL category as not-resolved for all traffic and
the following error message was displayed in the device server
logs Error(43): A libcurl function was given a bad
argument.
PAN-OS Release Notes 10.2.12 256 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-204118 Fixed an issue where browser sessions stopped responding for device
group template admin users with access domains that had many device
groups or templates.
PAN-203964 (Firewalls in FIPS-CC mode only) Fixed an issue where the firewall
went into maintenance mode due to downloading a corrupted
software image, which resulted in the error message FIPS-CC
failure. Image File Authentication Error.
PAN-203796 Fixed an issue where legitimate syn+ack packets were dropped after
an invalid syn+ack packet was ingressed.
PAN-203653 Fixed an issue where dynamic updates were completed even when
configuration commits failed, which caused the all_task process to stop
responding.
PAN-203430 Fixed an issue where, when the User-ID agent had collector
name/secret configured, the configuration was mandatory on clients
on PAN-OS 10.0 and later releases.
PAN-OS Release Notes 10.2.12 257 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-203362 Fixed an issue where the rasmgr process restarted due to a null
reference.
PAN-203339 Fixed an issue where services failed due to the RAID rebuild not being
completed on time.
PAN-203330 Fixed an issue where the certificate for an External Dynamic List (EDL)
incorrectly changed from invalid to valid, which caused the EDL file to
be removed.
PAN-203147 (Firewalls in FIPS-CC mode only) Fixed an issue where the firewall
unexpectedly rebooted when downloading a new PAN-OS software
image.
PAN-203137 (PA-5450 firewalls only) Fixed an issue where HSCI ports did not come
up when QSFP DAC cables were used.
PAN-202918 Fixed an issue where processing route-table entries did not work as
expected.
PAN-202872 Fixed an issue where an incorrect URL list limit displayed during a
commit.
PAN-202783 (PA-7000 Series firewalls with 100G NPC (Network Processing Cards)
only) Fixed an issue where sudden, large bursts of traffic destined for
an interface that was down caused packet buffers to fill, which stalled
path monitor heartbeat packets.
PAN-202722 Fixed an issue where the factor completion time for login events
learned through XML API displayed as 1969/12/31 19:00:00.
PAN-202593 Fixed an issue where expanding Global Find results displayed only the
top level and second level of a searched item.
PAN-202544 An enhancement was made to collect CPLD register data after a path
monitor failure.
PAN-OS Release Notes 10.2.12 258 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-202535 Fixed an issue where the Device Telemetry configuration for a region
was unable to be set or edited via the web interface.
PAN-202295 Fixed an issue where read-only superusers were unable to see the
Commit All job status, warnings, or errors for Panorama device groups.
PAN-202282 Fixed an issue where stats dump files did not display all necessary
reports.
PAN-202248 Fixed an issue where, due to a tunnel content inspection (TCI) policy
match, IPSec traffic did not pass through the firewall when NAT was
performed on the traffic.
PAN-202194 Fixed an SD-WAN link issue that occurred when Aggregate Ethernet
without a member interface was configured as an SD-WAN interface.
PAN-202140 Fixed an issue where the comm process stopped responding due to an
OOM condition.
PAN-202095 Fixed an issue on the web interface where the language setting is not
retained.
PAN-202040 (PA-220 firewalls only) Fixed an issue where ECDSA fingerprints were
not displayed.
PAN-202012 A debug command was introduced to control Gzip encoding for the
GlobalProtect Clientless VPN application.
PAN-OS Release Notes 10.2.12 259 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-201973 (PA-3400 Series firewalls only) Fixed an issue where the management
interface could not be assigned as an HA port.
PAN-201954 Fixed an issue where NAT policy rules were deleted on managed
devices after a successful push from Panorama to multiple device
groups. This occurred when NAT policy rules had device_tags selected
in the target section.
PAN-201910 Fixed an issue where some Security profiles consumed a large amount
of memory, which reduced the number of supported Security profiles
below the stated maximum for a platform.
PAN-201900 Fixed an internal path monitoring failure issue that caused the
dataplane to go down.
PAN-201860 Fixed an issue where the Device Quarantine list was not redistributed
or updated on Panorama and Prisma Access in a full mesh topology.
PAN-201839 Fixed an issue where GlobalProtect HIP match failed for Mac users
due to invalid characters being present in the subject alternative
attributes in the certificate on the HIP report.
PAN-201818 Fixed an issue where INIT SCTP packets were dropped after being
processed by the CTD, and silent drops occurred even with SCTP no-
drop function enabled.
PAN-201701 Fixed an issue where the firewall generated system log alerts if the raid
for a system or log disk was corrupted.
PAN-201639 Fixed an issue with Saas Application Usage reports where Applications
with Risky Characteristics displayed only two applications per section.
PAN-201601 Fixed an issue where the all_task process stopped responding after
adding customer hyperscan signatures.
PAN-201587 Fixed an issue where the App Pcaps directory size was incorrectly
detected which caused commit errors.
PAN-OS Release Notes 10.2.12 260 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-201580 Fixed an issue where the useridd process stopped responding due to
an invalid vsys_id request.
PAN-201561 Fixed an issue where LSVPN satellite authentication cookies were not
synced across high availability LSVPN portals.
PAN-201360 Fixed an issue with Panorama managed log collector statistics where
the oldest logs displayed on the primary Panorama appliance and the
secondary Panorama appliance did not match.
PAN-201357 The CLI command debug dataplane set pow no-desched yes
was added to address an issue where the all_pktproc process stopped
responding and caused traffic issues.
PAN-201136 Fixed an issue where IGMP packets were offloaded with frequent
IGMP Join and Leave messages from the client.
PAN-201085 (PA-5450 firewalls only) Fixed an issue where inserting the NPC and
DPC on slot2 created excessive logs in the bcm.log file.
PAN-200914 (PA-3440 firewalls only) Fixed an issue where the default NAT DIPP
pool oversubscription was set to 2 instead of 4.
PAN-200774 Fixed an issue where SCEP certificate import did not work on the
firewall when the certificate name contained a period ( . ).
PAN-200356 Fixed an issue where the Elapsed seconds field incorrectly displayed as
0 for DHCP packets coming from the firewall.
PAN-200354 Fixed an issue where the firewall did not initiate scheduled log reports.
PAN-OS Release Notes 10.2.12 261 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-200160 Fixed a memory leak issue on Panorama related to the logd process
that caused an out-of-memory (OOM) condition.
PAN-200103 Fixed an issue where decryption logs were not displayed under
Manage Custom Reports for custom Panorama admin users.
PAN-200035 Fixed an issue where the firewall reported General TLS Protocol
Error for TLSv1.3 when the firewall closed a TCP connection to the
server via a FIN packet without waiting for the handshake to complete.
PAN-200019 Fixed an issue on Panorama where Virtual Routers (Network > Virtual
Routers) was not available when configuring a custom Panorama
admin role (Panorama > Admin Roles).
PAN-199965 Fixed an issue where the reportd process stopped responding on log
collectors during query and report operations due to a race condition
between request handling threads.
PAN-199821 Fixed an issue where the Include/Exclude IPs filter under Data
Redistribution did not consistently filter IP addresses correctly.
PAN-199807 Fixed an issue where the dataplane frequently restarted due to high
memory usage on wifclient.
PAN-199570 Fixed an issue where uploading certificates using a custom admin role
did not work as expected after a context switch.
PAN-OS Release Notes 10.2.12 262 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-199543 Resolved failed authentication for Radius and TLS where shared secret
was striped for FIPS mode
PAN-199500 Fixed an issue where, when many NAT policy rules were configured,
the pan_comm process stopped responding after a configuration
commit due to a high number of debug messages.
PAN-199410 Fixed an issue where system logs for syslog activities were categorized
as general under Type and EVENT columns.
PAN-199141 Fixed an issue where renaming a device group and then performing
a partial commit led to the device group hierarchy being incorrectly
changed.
PAN-198889 Fixed an issue where the logd process stopped responding if some
devices in a collector group were on a PAN-OS 10.1 device and others
were on a PAN-OS 10.0 release. This issue affected the devices on a
PAN-OS 10.0 release.
PAN-198871 Fixed an issue when both URL and Advanced URL licenses were
installed, the expiry date was not correctly checked.
PAN-198693 Fixed an issue where decrypted SSH sessions were interrupted with a
decryption error.
PAN-198575 Fixed an issue where data did not load when filtering by Threat Name
(ACC > Threat Activity).
PAN-OS Release Notes 10.2.12 263 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-198333 Fixed an issue where the SaaS PDF report incorrectly displayed the
sanctioned application tag count as 1.
PAN-198306 Fixed an issue where the useridd process stopped responding when
booting up the firewall.
PAN-198174 Fixed an issue where, when viewing traffic or threat logs from the
Application Command Center (ACC) or Monitor tabs, performing a
reverse DNS lookup caused the dnsproxy process to restart if DNS
server settings were not configured.
PAN-197953 Fixed an issue where the logd process stopped responding due
to forwarded threat logs, which caused Panorama to reboot into
maintenance mode.
PAN-197935 Fixed an intermittent issue where XML API IP address tag registration
failed on firewalls in a multi-vsys environment.
PAN-197919 Fixed an issue where, when path monitoring for a static route was
configured with a new Ping Interval value, the value was not used as
intended.
PAN-197908 Fixed an issue where Strata Logging Service flaps occurred for long
durations which caused a memory leak related to the mgmtsrvr
process.
PAN-197872 Fixed an issue where the useridd process generated false positive
critical errors.
PAN-197737 Fixed an issue where the connection to the PAN-DB server failed with
following error message: Failed to send req type[3], curl
error: Couldn't resolve host name.
PAN-OS Release Notes 10.2.12 264 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-197678 Fixed an issue where the dataplane stopped responding, which caused
internal path monitoring failure.
PAN-197582 Fixed an issue where, after upgrading to PAN-OS 10.1.6, the firewall
reset SSL connections that used policy-based forwarding.
PAN-197563 Fixed an issue in the User Activity Report where output fields started
with the letter b.
PAN-197386 Fixed an issue where traffic that was subject to network packet broker
inspection entered a looping state due to incorrect session offload.
PAN-197339 Fixed an issue where template configuration for the User-ID agent was
not reflected on the template stack on Panorama appliances on PAN-
OS 10.2.1.
PAN-197298 Fixed an issue where the audit comment archive for Security rule
changes output had overlapping formats.
PAN-197121 Fixed an issue where incorrect user details were displayed under the
USER DETAIL drop-down (ACC > Network activity > User activity).
PAN-197115 Fixed an issue where, when the total number of in-used HIP profiles
was greater than 32, traffic from the GlobalProtect Agent did not hit
the expected Security policy rule configured with the HIP profile even
though a HIP match log was generated.
PAN-197097 Fixed an issue where LSVPN did not support IPv6 addresses on the
satellite firewall.
PAN-OS Release Notes 10.2.12 265 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-196874 Fixed an issue where, when the firewall accepted ICMP redirect
messages on the management interface, the firewall did not clear the
route from the cache.
PAN-196840 Fixed an issue where exporting a Security policy rule that contained
Korean language characters to CSV format resulted in the policy
description being in a non-readable format.
PAN-196811 Fixed an issue where logout events without a username caused high
CPU usage.
PAN-196715 Fixed an issue where you could not directly edit Services and Address
objects from the Policies tab.
PAN-196701 Fixed an issue where the firewall did not properly measure the
Panorama connection keepalive timer, which caused a Panorama HA
failover to take longer than expected.
PAN-196583 Fixed an issue where the Cisco TrustSEc plugin triggered a flood of
redundant register/unregister messages due to a failed IP address tag
database search.
PAN-196566 Fixed an issue where the useridd process restarted repeatedly which
let to an OOM condition.
PAN-196558 Fixed an issue where IP address tag policy updates were delayed.
PAN-196457 Fixed an issue where extraneous logs displayed in the Traffic log when
Security policy settings were changed.
PAN-196452 Fixed an issue where DNS queries failed from source port 4789 with a
NAT configuration.
PAN-OS Release Notes 10.2.12 266 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-196410 Fixed an issue where you were unable to customize the risk value in
Risk-of-app.
PAN-196131 Fixed an issue where the comm process stopped responding when a
show command was executed in two sessions.
PAN-196050 Fixed an issue on Panorama where logs did not populate when one log
collector in a log collector group was down.
PAN-196003 Fixed an issue where the Adjust Columns options for Panorama traffic
logs did not correctly auto-adjust the columns.
PAN-195893 Fixed an issue where daily PDF summary reports were not generated
when the Application Report was selected.
PAN-195869 Fixed an issue where scheduled custom reports based on firewall data
did not display any information.
PAN-195792 Fixed an issue where, when generating a stats dump file for a managed
device from Panorama (Panorama > Support > Stats Dump File), the
file did not display any data.
PAN-195790 Fixed an issue where syslog traffic that was sent from the
management interface to the syslog server even when a destination IP
address service route was configured.
PAN-195713 Fixed an issue where clientless VPN applications were not displayed in
the GlobalProtect portal page.
PAN-OS Release Notes 10.2.12 267 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-195695 Fixed an issue where the AppScope Summary report and PDF report
export function did not work as expected.
PAN-195526 Fixed an issue where the firewall system log received a large amount
of error messages when attempting a connection between the firewall
and Panorama.
PAN-195201 Fixed an issue where high volume DNS Security traffic caused the
firewall to reboot.
PAN-195200 Fixed an issue where Panorama did not attach and email scheduled
reports (Monitor > PDF > Reports > Email Scheduler) when the size of
the email attachments was large.
PAN-195114 Fixed an issue where proxy ARP responded on the wrong interface
when the same subnet was in two virtual routers.
PAN-195107 (PA-7000s Series firewalls with LFCs only) Fixed an issue where the IP
address of the LFC displayed as unknown.
PAN-195064 Fixed an issue where the log collector did not forward correlation logs
to the syslog server.
PAN-194912 Fixed an issue where the CLI command show applications list
did not return any outputs.
PAN-194812 Fixed an issue where generating reports via XML API failed when the
serial number was set as target in the query.
PAN-OS Release Notes 10.2.12 268 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-194737 Fixed an issue where path monitor displayed as deleted when it was
disabled, which caused a preview change in the summary for static
routes.
PAN-194704 Fixed an issue with SIP ALG where improper NAT was applied when
Destination NAT ran out of IP addresses.
PAN-194615 Fixed an issue where the packet broker session timeout value did not
match the master sessions timeout value after the firewall received a
TCP FIN or RST packet. The fix ensures that Broker session times out
within 1 second after the master session timed out.
PAN-194441 Fixed an issue where the dataplane CPU usage was higher than
expected due to packet looping in the broker session when the
network packet broker was enabled.
PAN-194068 (PA-5200 Series firewalls only) Fixed an issue where the firewall
unexpectedly rebooted with the log message Heartbeat failed
previously.
PAN-194043 Fixed an issue where Managed Devices > Summary did not reflect
new tag values after an update.
PAN-194031 (PA-220 Firewalls only) Fixed an issue where system log configurations
did not work as expected due to insufficient process timeout after a
logrcvr process restart.
PAN-194025 Fixed an issue where the ikemgr process stopped responding due to a
timing issue, which caused VPN tunnels to go down.
PAN-193879 Fixed an issue on Panorama where the push scope was delayed for
commit and push operations.
PAN-193831 Fixed an issue where internal routes were added to the routing table
even after disabling dynamic routing protocols.
PAN-193808 Fixed a memory leak issue in the mgmtsrvr process that resulted in an
OOM condition.
PAN-OS Release Notes 10.2.12 269 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-193619 Fixed an issue where air gapped firewalls and Panorama appliances
performed excessive validity checks to updates.paloaltonetworks.com,
which caused software installs to fail.
PAN-193558 Fixed an issue where log retention settings Multi Disk did not display
correct values on the firewall web interface when the settings were
configured using a Panorama template or template stack.
PAN-193396 Fixed an issue where the source user name was displayed in traffic
logs even when Show User Names In Logs and Reports was disabled
for a custom admin role.
PAN-193323 Fixed an issue where root partition utilization reached 100% due to
mdb old logs not being purged as expected.
PAN-193281 Fixed an issue where the logrcvr process stopped responding after a
content update on the firewall.
PAN-193245 Fixed an issue where, when using syslog-ng forwarding via SSL,
with a Base Common Name (CN) and multiple Subject Alternative
Names (SANs) were listed in the certificate.
PAN-193175 Fixed an issue where PBP Drops (8507) threat logs were
incorrectly logged as SCTP Init Flood (8506).
PAN-193043 Fixed an issue with the where firewalls in Google Cloud Platforms
(GCP) inserted the hostname as PA-VM in the syslog header instead of
the DHCP assigned hostname when logs were being sent to the syslog
server.
PAN-192681 Fixed an issue where HIP database storage on the firewall reached full
capacity due to the firewall not purging older HIP reports.
PAN-192513 Fixed an issue where log migration did not work when converting a
Legacy mode Panorama appliance to Log Collector mode.
PAN-192456 Fixed an issue where GlobalProtect SSL VPN processing during a high
traffic load caused the dataplane to stop responding.
PAN-OS Release Notes 10.2.12 270 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-192417 Fixed an issue where botnet reports were not generated on the
firewall.
PAN-192296 Fixed an issue where, when you saved a SaaS application report
as a PDF or sent it to print, the size of the report was smaller than
expected.
PAN-192244 Fixed an issue where scheduled log export jobs continued to run even
after being deleted.
PAN-192193 Fixed an issue where exporting a list of managed collectors via the
Panorama web interface failed with the following error message:
Export Error, Error while exporting
PAN-192188 (PA-5450 firewalls only) Fixed an issue where the show running
resource-monitor ingress-backlogs CLI command failed
with the following error message: Server error : Failed to
intepret the DP response.
PAN-192076 Added debug logs for visibility into an OpenSSL memory initialization
issue that caused unexpected failovers.
PAN-191997 Fixed an issue where log queries did not successfully filter the
unknown category.
PAN-191652 Fixed an issue with Prisma Cloud where a commit push failed due to
the error Error: failed to handle TDB_UPDATE_BLOCK.
PAN-191463 Fixed an issue where the firewall did not handle packets at Fastpath
when the interface pointer was null.
PAN-191408 Fixed an issue where the firewall did not correctly receive dynamic
address group information from Panorama after a reboot or initial
connection.
PAN-OS Release Notes 10.2.12 271 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-191352 Fixed an intermittent issue where high latency was observed on the
web interface and CLI due to high CPU usage related to the sadc
process.
PAN-190533 Fixed an issue where addresses and address groups were not displayed
for users in Security admin roles.
PAN-190502 Fixed an issue where the Policy filter and Policy optimizer filter were
required to have the exact same syntax, including nested conditions
with rules that contained more than one tag when filtering via the neq
operator.
PAN-190454 Fixed an issue where, while authenticating, the allow list check failed
for vsys users when a SAML authentication profile was configured
under shared location.
PAN-190409 (PA-5450 and PA-3200 Series firewalls that use an FE101 processor
only) Fixed an issue where packets in the same session were
forwarded through a different member of an aggregate ethernet
group when the session was offloaded. The fix is that you can use the
following CLI command to change the default tag setting to the tuple
setting:
admin@firewall> set session lag-flow-key-type ?
> tag tag
> tuple tuple
tag is the default behavior (tag based on the CPU, tuple based on the
FE).
tuple is the new behavior, where both CPU and FE use the same
selection algorithm.
Use the following command to display the algorithm:
admin@firewall> show session lag-flow-key-type
dp0: tuple based on fe100
dp1: tuple based on fe100
PAN-OS Release Notes 10.2.12 272 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-190266 Fixed an issue that stopped the all_task process to stop responding at
the pan_sdwan_qualify_if_ini function.
PAN-189960 Fixed an issue on Panorama where you were unable to view the last
address object moved to the shared template list.
PAN-189866 Fixed an issue with the web interface where group include lists used
server profiles instead of LDAP proxy.
PAN-189783 Fixed an issue where container resource limits were not enforced for
all processes when running inside a container.
PAN-189718 Fixed an issue where the number of sessions did not reach the
expected maximum value with Security profiles.
PAN-189643 Fixed an issue where, when QoS was enabled on an IPSec tunnel,
traffic failed due to applying the wrong tunnel QoS ID.
PAN-189518 Fixed an issue where incoming DNS packets with looped compression
pointers caused the dnsproxyd process to stop responding.
PAN-189379 Fixed an issue where FQDN based Security policy rules did not match
correctly.
PAN-189375 Fixed an issue where, when migrating the firewall, the firewall dropped
packets when trying to re-use the TCP session.
PAN-189335 Fixed an issue where the varrcvr process restarted repeatedly, which
caused the firewall to restart.
PAN-OS Release Notes 10.2.12 273 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
sync vm-auth-key when a VM authentication key was generated
on the active appliance.
PAN-189200 Fixed an issue where sinkholes did not occur for AWS Gateway Load
Balancer dig queries.
PAN-189027 Fixed an issue where the dataplane CPU utilization provided from the
web interface or via SNMP was incorrect.
PAN-188933 Fixed an issue where the UDP checksum wasn't correctly calculated
for VXLAN traffic after applying NAT.
PAN-188904 Fixed an issue where web pages and web page contents were not
properly loaded when cloud inline categorization was enabled.
PAN-188403 Fixed an issue on the web interface where the interzone-default rule
hit count was not displayed.
PAN-188291 Fixed an issue where, when using Global Find on the web interface
to search for a given Hostname Configuration (Device > Setup
> Management), clicking the search result directed you to the
appropriate Hostname configuration, but did not change the
respective Template field automatically.
PAN-188272 (PA-5200 Series and PA-7000 Series firewalls only) Fixed an issue
where Support UTF-8 For Log Output wasn't visible on the web
interface.
PAN-188118 Fixed an issue with firewalls in FIPS mode that prevented device
telemetry from connecting.
PAN-OS Release Notes 10.2.12 274 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-187763 Fixed an issue where DNS Security logs did not display a threat
category, threat name, or threat ID when domain names contained 64
or more characters.
PAN-187438 (PA-5400 Series firewalls only) Fixed an issue where HSCI interfaces
didn’t come up when using BiDi transceivers.
PAN-187279 Fixed an issue where not all quarantined devices were displayed as
expected.
PAN-186530 Fixed an issue where the current date was incorrectly printed as the
last license check date.
PAN-186471 Fixed an issue where, when exporting to CSV in Global Find, the
firewall truncated names of rules that contained over 40 characters.
PAN-186412 Fixed an issue where invalid packet-ptr was seen in work entries.
PAN-186294 Fixed an issue where commits from Panorama failed on the firewall
due to the virtual router name character limit.
PAN-186270 Fixed an issue where, when HA was enabled and a dynamic update
schedule was configured, the configd process unexpectedly stopped
responding during configuration commits.
PAN-185770 Fixed an issue where the firewall displayed the error message
Malformed Request when an email address included an ampersand
( & ) when configuring an email server profile.
PAN-185466 Fixed an issue where WildFire submission did not work as expected.
PAN-185394 (PA-7000 Series firewalls only) Fixed an issue where not all changes to
the template were reflected on the firewall.
PAN-185287 (PA-7050 firewalls with Network Processing Cards (NPCs) only) Debug
commands were added to address an issue where the firewall's NPC
Slot2 failed and multiple dataplane processes stopped responding.
PAN-185234 (VM-Series firewalls only) Fixed an issue where the packet buffer
utilization was displayed as high even when no traffic was traversing
the firewall.
PAN-OS Release Notes 10.2.12 275 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-184744 Fixed an issue where the firewall did not decrypt SSL traffic due to a
lack of internal resources allocated for decryption.
PAN-183524 Fixed an issue where GTPv2-c and GTP-U traffic was identified with
insufficient-data in the traffic logs.
PAN-183375 Fixed an issue where traffic arriving on a tunnel with a bad IP address
header checksum was not dropped.
PAN-183126 Fixed an issue on Panorama where you were able to attempt to push
a number of active schedules to the firewall that was greater than the
firewall's maximum capacity.
PAN-182875 Fixed an issue where certificate generation using SCEP did not take
more than one organizational unit (OU).
PAN-182732 Fixed an issue where the GlobalProtect gateway inactivity timer wasn't
refreshed even though traffic was passing through the tunnel.
PAN-182167 Removed a duplicate save filter Icon in the Audit Comment Archive for
Security Rule Audit Comments tab.
PAN-181334 Fixed an issue where users with custom admin roles and access
domains were unable to view address objects or edit Security rules.
PAN-180948 Fixed an issue where an external dynamic list fetch failed with the
error message Unable to fetch external dynamic list.
Couldn't resolve host name. Using old copy for
refresh.
PAN-OS Release Notes 10.2.12 276 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-179174 Fixed an issue where exported PDF report of the ACC was the
incorrect color after upgrading from a PAN-OS 10.1 or later release.
PAN-178951 Fixed an issue on the firewall where Agentless User-ID lost parent
Security group information after the Security group name of the
nested groups on Active Directory was changed.
PAN-178728 Fixed an issue where the dcsd process stopped responding when
attempting to read the config to update its redis database.
PAN-177942 Fixed an issue where, when grouping HA peers, access domains that
were configured using multi-vsys firewalls deselected devices or
virtual systems that were in other configured access domains.
PAN-177562 Fixed an issue where PDF reports were not translated to the
configured local language.
PAN-176989 Fixed an issue where the CLI command to show SD-WAN tunnel
members caused the firewall to stop responding.
PAN-176379 Fixed an issue where, when multiple routers were configured under a
Panorama template, you were only able to select its own virtual router
for next hop.
PAN-175061 Fixed an issue where filtering threat logs using any value under
THREAT ID/NAME displayed the error Invalid term.
PAN-174953 Fixed an issue where the firewall didn't update URL categories from
the management plane to the dataplane cache.
PAN-174781 Fixed an issue where the firewall did not send an SMTP 541 error
message to the email client after detecting a malicious file attachment.
PAN-OS Release Notes 10.2.12 277 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.4 Known and Addressed Issues
Issue ID Description
PAN-171927 Fixed an issue where incorrect results were displayed when filtering
logs in the Monitor tab.
PAN-157199 (PA-220 firewalls only) Fixed an issue where the GlobalProtect portal
was not reachable with IPv6 addresses.
PAN-142701 Fixed an issue where the firewall did not delete Stateless SCTP
sessions after receiving an SCTP Abort packet.
PAN-OS Release Notes 10.2.12 278 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.3.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.3 Known Issues
• PAN-OS 10.2.3-h13 Addressed Issues
• PAN-OS 10.2.3-h12 Addressed Issues
• PAN-OS 10.2.3-h11 Addressed Issues
• PAN-OS 10.2.3-h9 Addressed Issues
• PAN-OS 10.2.3-h4 Addressed Issues
• PAN-OS 10.2.3-h2 Addressed Issues
• PAN-OS 10.2.3 Addressed Issues
279
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
PAN-OS Release Notes 10.2.12 280 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-OS Release Notes 10.2.12 281 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See 1. Create a Shared and vsys-specific device group
PAN-OS 10.2.7 Addressed configuration object with an indentical name. For example,
Issues. a Shared address object called SharedAO1 and a vsys-
specific address object also called SharedAO1.
2. Reference the Shared object in another Shared
configuration. For example, reference the Shared address
object (SharedAO1) in a Shared address group called
SharedAG1.
3. Use the Shared configuration object with the reference
in a vsys-specific configuration. For example, reference
the Shared address group (SharedAG1) in a vsys-specific
policy rule.
Workaround: Select Panorama > Setup > Management and
edit the Panorama Settings to enable one of the following:
• Shared Unused Address and Service Objects with
Devices—This options pushes all Shared objects, along
with device group specific objects, to managed firewalls.
This is a global setting and applies to all managed firewalls,
and may result in pushing too many configuration objects
to your managed firewalls.
• Objects defined in ancestors will take higher precedence—
This option specifies that in the event of objects with
the same name, ancestor object take precedence over
descendent objects. In this case, the Shared objects take
precedence over the vsys-specific object.
This is a global setting and applies to all managed firewalls.
In the example above, if the IP address for the Shared
SharedAO1 object was 10.1.1.1 and the device group
specific SharedAO1 was 10.2.2.2, the 10.1.1.1 IP
address takes precedence.
Alternatively, you can remove the duplicate address objects
from the device group configuration to allow only the Shared
objects in your configuration.
PAN-OS Release Notes 10.2.12 282 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
Workaround: Log in to the Log Collector CLI and restart
ElasticSearch.
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
PAN-OS Release Notes 10.2.12 283 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See log-start eq no
PAN-OS 10.2.11 Addressed
log-end eq no
Issues.
log-end eq yes
PAN-OS Release Notes 10.2.12 284 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 285 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See multiple vsys and the Push Scope contains shared objects in
PAN-OS 10.2.4 Addressed device groups.
Issues.
PAN-206253 For PA-3400 Series firewalls, the default log rate is set too
low and the max configurable log rate is incorrectly capped
This issue is now resolved. See
resulting in the firewall not generating more than 6,826 logs
PAN-OS 10.2.4 Addressed
per second.
Issues.
PAN-OS Release Notes 10.2.12 286 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
results in managed firewalls experiencing issues wherever the
corrupted certificate is referenced.
For example, you have template A, B, and C where templates
A and B have certificates with the Block Private Key Export
setting enabled. Cloning template C corrupts the certificates
with Block Private Key Export setting enabled in templates A
and B.
Workaround: After cloning a template, delete and re-import
the corrupted certificates.
PAN-198174 When viewing traffic or threat logs from the firewall ACC
or Monitor, performing a reverse DNS lookup, for example,
This issue is now resolved. See
when resolving IP addresses to domain names using the
PAN-OS 10.2.4 Addressed
Resolve Hostname feature, can cause the appliance to crash
Issues.
and restart if DNS server settings have not been configured.
Workaround: Provide a DNS server setting for the firewall
(Device > DNS Setup > Services). If you cannot reference a
valid DNS server, you can add a dummy address.
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
This issue is now resolved. See
PAN-OS 10.2.4 Addressed
Issues.
PAN-OS Release Notes 10.2.12 287 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 288 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
interface and the management interface to remain connected
to the log collector.
Workaround: Restart the log receiver service by running the
following CLI command:
PAN-188904 Certain web pages and web page contents might not properly
load when cloud inline categorization is enabled on the
This issue is now resolved. See
firewall.
PAN-OS 10.2.4 Addressed
Issues.
PAN-OS Release Notes 10.2.12 289 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 290 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
Workaround: Do not use a logical router instance with no
interfaces bound to it.
PAN-184708 Scheduled report emails (Monitor > PDF Reports > Email
Scheduler) are not emailed if:
This issue is now resolved. See
PAN-OS 10.2.4 Addressed • A scheduled report email contains a Report Group
Issues. (Monitor > PDF Reports > Report Group) which includes a
SaaS Application Usage report.
• A scheduled report contains only a SaaS Application Usage
Report.
Workaround: To receive a scheduled report email for all other
PDF report types:
1. Select Monitor > PDF Reports > Report Groups and
remove all SaaS Application Usage reports from all Report
Groups.
2. Select Monitor > PDF Reports > Email Scheduler and
edit the scheduled report email that contains only a SaaS
Application Usage report. For the Recurrence, select
Disable and click OK.
Repeat this step for all scheduled report emails that
contain only a SaaS Application Usage report.
PAN-OS Release Notes 10.2.12 291 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
3. Commit.
(Panorama managed firewalls) Select Commit > Commit
and Push
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 292 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
maintenance mode. HA Pairs of Active-Passive and Active-
Active firewalls are not affected.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 293 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 294 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-OS Release Notes 10.2.12 295 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-OS Release Notes 10.2.12 296 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
PAN-198372 Fixed an issue where the root-cert was set to expire on December
31, 2023. With this fix, the expiration date has been extended.
PAN-OS Release Notes 10.2.12 297 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
PAN-210513 Fixed an issue where Captive Portal authentication via SAML did not
work.
PAN-207562 Fixed an issue where the shard count displayed by the show log-
collector-es-cluster health CLI command was higher than
the recommended limit. The recommended limit can be calculated with
the formula 20*heap-memory*no-of-data-nodes.
PAN-206963 (M-700 Appliances only) A CLI command was added to check the
status of each physical port of a bond1 interface.
PAN-206921 Fixed an issue where the GlobalProtect client pre-login was successful,
but the certificate authentication failed.
PAN-206466 Fixed an issue where the push scope was displaying duplicate shared
objects for each device group that were listed under the shared-object
group.
PAN-206069 Fixed an issue where the firewall was unable to boot up on older Intel
CPUs.
PAN-204892 Fixed an issue on Panorama where the web interface was not
accessible and displayed the error 504 Gateway Not Reachable due to
the mgmtsrvr process not responding.
PAN-204838 Fixed an issue where the dot1q VLAN tag in ARP reply packets were
not displayed.
PAN-204572 Fixed an issue where python scripts were not working as expected.
PAN-OS Release Notes 10.2.12 298 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-197339 Fixed an issue where template configuration for the User-ID agent was
not reflected on the template stack on Panorama appliances on PAN-
OS 10.2.1.
PAN-186270 Fixed an issue where, when high availability (HA) was enabled and
a dynamic update schedule was configured, the configd process
unexpectedly stopped responding during configuration commits.
PAN-OS Release Notes 10.2.12 299 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
PAN-205805 Fixed an issue where Generic routing encapsulation (GRE) traffic was
only allowed in one direction when tunnel content inspection (TCI) was
enabled.
PAN-202795 Fixed an issue where file identification failed for files with minimal data
with large headers.
PAN-202535 Fixed an issue where the Device Telemetry configuration for a region
was unable to be set or edited via the web interface.
PAN-201357 The CLI command debug dataplane set pow no-desched yes
was added to address an issue where the all_pktproc process stopped
responding and caused traffic issues.
PAN-196583 Fixed an issue where the Cisco TrustSEc plugin triggered a flood of
redundant register/unregister messages due to a failed IP address tag
database search.
PAN-195756 Fixed an issue that caused an API request timeout when parsing
requests using large header buffers.
PAN-OS Release Notes 10.2.12 300 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-195713 Fixed an issue where clientless VPN applications were not displayed in
the GlobalProtect portal page.
PAN-182732 Fixed an issue where the GlobalProtect gateway inactivity timer wasn't
refreshed even though traffic was passing through the tunnel.
PAN-OS Release Notes 10.2.12 301 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
PAN-200771 Fixed an issue where syslog-ng was unable to start due to a design
change in the syslog configuration file.
PAN-199654 Fixed an issue where ACC reports did not work for custom RBAC
users when more than 12 access domains were associated with the
username.
PAN-199311 Fixed an issue where the Log Forwarding Card (LFC) failed to forward
logs to the syslog server.
PAN-199099 Fixed an issue where, when decryption was enabled, Safari and Google
Chrome browsers on Apple Mac computers rejected the server
certificate created by the firewall because the Authority Key Identifier
was copied from the original server certificate and did not match the
Subject Key Identifier on the forward trust certificate.
PAN-198733 (PA-5450 firewalls only) Fixed an issue where dmin tcpdump was
hardcoded to eth0 instead of bond0.
PAN-198266 Fixed an issue where, when predicts for UDP packets were created,
a configuration change occurred that triggered a new policy lookup,
which caused the dataplane stopped responding when converting the
predict. This resulted in a dataplane restart.
PAN-198244 Fixed an issue where using the load config partial CLI
command to x-paths removed address object entries from address
groups.
PAN-OS Release Notes 10.2.12 302 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-197484 (PA-5400 Series firewalls) Fixed an issue where the firewall forwarded
packets to the incorrect aggregate ethernet interface when Policy
Based Forwarding (PBF) was used.
PAN-197383 Fixed an issue where, after upgrading to PAN-OS 10.2 release, the
firewall ran a RAID rebuild for the log disk after ever every reboot.
PAN-197244 Fixed an issue on firewalls with Forward Proxy enabled where the
all_pktproc process stopped responding due to missed heartbeats.
PAN-196953 (PA-5450 firewalls only) Fixed an issue where jumbo frames were
dropped.
PAN-196445 Fixed an issue where restarting the Network Processing Card (NPC)
or the Data Processing Card (DPC) did not bring up all the network
interfaces.
PAN-196398 (PA-7000 Series SMC-B firewalls only) Fixed an issue where the
firewall did not capture data when the active management interface
was MGT-B.
PAN-196227 Fixed an issue where the logd process stopped responding, which
caused Panorama to reboot into maintenance mode.
PAN-196005 (PA-3200 Series, PA-5200 Series, and PA-5400 Series firewalls only)
Fixed an issue where GlobalProtect IPSec tunnels disconnected at half
the inactivity logout timer value.
PAN-195689 Fixed an issue where WildFire submission logs did not load on the
firewall web interface.
PAN-195628 Fixed an issue that caused the pan_task process to miss heartbeats and
stop responding.
PAN-195625 Fixed an issue where authd frequently created SSL sessions, which
resulted in an OOM condition.
PAN-OS Release Notes 10.2.12 303 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-195223 Fixed an issue where the all_pktproc process restarted when receiving
a GTPv2 Modify Bearer Request packet if the Serving GPRS Support
Node (SGSN) used the same key as the Serving Gateway (SGW).
PAN-194826 (WF-500 and WF-500-B appliances only) Fixed an issue where log
system forwarding did not work over a TLS connection.
PAN-194708 Fixed an issue where URL filtering logs (Monitor > Logs > URL
Filtering) incorrectly truncated a 16KB Header value and did not
display the Header values that followed the truncated 16KB header.
PAN-194694 Fixed an issue where multiple SNMP requests being made to the
firewall caused in the pan_comm process to stop responding.
PAN-194601 Fixed an issue that caused the all_task process to stop responding.
PAN-194588 (PA-7000 Series firewalls with LFCs (Log Forwarding Cards), PA-7050
firewalls with SMC-B (Switch Management Cards), and PA-7080
firewalls only) Fixed an issue where the logrcvr_statistics
output was not recorded in mp-monitor.log.
PAN-194408 Fixed an issue where, when policy rules had the apps that implicitly
depended on web browsing configured with the service application
default, traffic did not match the rule correctly.
PAN-OS Release Notes 10.2.12 304 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-194406 Fixed an issue where the MTU from SD-WAN interfaces was
recalculated after a configuration push from Panorama or a local
commit, which caused traffic disruption.
PAN-194129 (PA-5450 firewalls only) Fixed an issue where slot 2 did not use all
features correctly if a DPC was used instead of an NPC.
PAN-193818 Fixed an issue where the firewall device server failed to resolve URL
cloud FQDNs, which interrupted URL category lookup.
PAN-193765 Fixed an issue where commits failed the following error displayed in
the configd log: Unable to populate ids into candidate
config: Error: Error populating id for 'sg2+DMZ to
FirstAM Scanner-1.
PAN-193763 Fixed an issue on the firewall where the dataplane CPU spiked, which
caused traffic to be affected during commits or content updates.
PAN-OS Release Notes 10.2.12 305 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-193744 (PA-3200 Series firewalls only) Fixed an issue where, when the HA2
HSCI connection was down, the system log displayed Port HA1-b:
down instead of Port HSCI: Down.
PAN-193732 (PA-5400 Series firewalls only) Fixed an issue where the firewall
incorrectly handled internal transactions.
PAN-193707 Fixed an issue where SAML authentication failed during commits with
the following error message: revocation status could not be
verified (reason: ).
PAN-193483 (VM-Series firewalls only) Fixed an issue where, during Layer-7 packet
inspection where traffic was being inspected for threat signature and
data patterns, multiple processes stopped responding.
PAN-193392 Fixed an issue where RTP packets dropped due to conflicting duplicate
flows.
PAN-193132 (PA-220 firewalls only) Fixed an issue where a commit and push from
Panorama caused high dataplane CPU utilization.
PAN-192944 Fixed an issue where the logrcvr process caused an OOM condition.
PAN-192739 Fixed an issue where the error message Machine Learning found
virus was displayed in threat CSV logs as Threat ID/Name when
WildFire Inline ML detected malware.
PAN-192726 Fixed an issue where the firewall dropped TCP traffic inside IPSec
tunnels.
PAN-192673 (PA-7050-SMC-B firewalls only) Fixed an issue where the LFC syslog-
ng service failed to start after an upgrade.
PAN-OS Release Notes 10.2.12 306 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-192551 (PA-5400 Series firewalls only) Fixed an issue where the firewall
incorrectly processed path monitoring packets.
PAN-192404 Fixed an issue where ARP broadcasts occurring in the same time
interval and network segment as HA path monitoring pings triggered
an ARP cache request, which prevented the firewall from sending
ICMP echo requests to the monitored destination IP address and
caused an HA path monitoring failover.
PAN-192052 Fixed an issue where, when next hop MAC address entries weren't
found on the offload processor for active traffic, update messages
flooded the firewall, which caused resource contention and traffic
disruption.
PAN-191874 Fixed an issue where monthly scheduled reports did not display
information after upgrading to PAN-OS 10.2.0.
PAN-191847 Fixed an issue where the Panorama appliance was unable to generate
scheduled custom reports due to the large number of files stored in
the opt/pancfg/mgmt/custom-reports directory.
PAN-191726 Fixed an issue where an SCP export of the device state from the
firewall added single quotes ( ' ) to the filename.
PAN-191558 Fixed an issue where, after an upgrade to PAN-OS 10.1.5, Global Find
did not display all results related to a searched item.
PAN-191269 Fixed an issue where the NAT pool leaked for passive mode FTP
predict sessions.
PAN-191222 Fixed an issue where Panorama became inaccessible when after a push
to the collector group.
PAN-191218 (PA-5400 Series firewalls only) Fixed an issue where the session log
storage quota could not be changed via the web interface.
PAN-191216 Fixed an issue where, on Apple iOS devices, SAML authentication did
not connect to the GlobalProtect portal.
PAN-OS Release Notes 10.2.12 307 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-190657 Fixed an issue where IPSec tunnels did not rekey due to the security
association being deleted too early.
PAN-190448 Fixed an issue in ACC reports where IPv6 addresses were displayed
instead of IPv4 addresses.
PAN-189894 Fixed an issue with the web interface where the template stack didn't
show inherited values of Template > Authentication Portal Settings.
PAN-189762 Fixed an issue where a predict session didn't match with the traffic
when both source NAT and destination NAT were enabled.
PAN-189723 Fixed an issue where you were unable to configure dynamic address
groups to use more than 64,000 IP addresses in a Security policy.
PAN-189414 Fixed an issue where TCP packets were dropped during the first zone
transfer when DNS security was enabled.
PAN-189304 Fixed an issue where the Panorama appliance didn't display logs or
generate reports for a device group containing MIPs platform that
forwarded logs to Strata Logging Service.
PAN-189270 Fixed an issue that caused a memory leak on the reportd process.
PAN-189225 Fixed an issue where BGP routes were lost or uninstalled after
disabling jumbo frames on the firewall.
PAN-189114 Fixed an issue where the dataplane went down, which caused an HA
failover.
PAN-188867 Fixed an issue where the firewall dropped packets when the session
payload was too large.
PAN-OS Release Notes 10.2.12 308 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-188338 Fixed an issue where canceling a commit caused the commit process
to remain at 70% and the firewall had to be rebooted.
PAN-188303 Fixed an issue where the serial number displayed as unknown after
running the show system state CLI command.
PAN-187985 Fixed an issue where you were unable to configure a QoS Profile as
percentage for Clear Text Traffic.
PAN-187890 Fixed an issue where the Strata Logging Service connection incorrectly
displayed as disconnected when a service route was in use.
PAN-187234 Fixed an intermittent issue where web pages submitted for analysis by
Advanced URL Filtering cloud inline categorization experienced high
latency.
PAN-186075 (VM-Series firewalls only) Fixed an issue where the firewall rebooted
after receiving large packets while in DPDK mode on Azure virtual
machines running CX4 (MLx5) drivers.
PAN-185787 Fixed an issue where logging in to the Panorama web interface did not
work and the following error message displayed: Timed out while
getting config lock. Please try again.
PAN-OS Release Notes 10.2.12 309 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-184702 (M-700 appliances in Log Collector mode only) Fixed an issue on the
Panorama management server where the Panorama appliance failed to
connect to Panorama when added as a managed log collector.
PAN-184068 (PA-5200 Series firewalls only) Fixed an issue where the firewall
generated pause frames, which caused network latency.
PAN-183788 Fixed an issue with SCEP certificate enrollment where the incorrect
Registration Authority (RA) certificate was chosen to encrypt the
enrollment request.
PAN-183166 Fixed an issue where system, configuration, and alarm logs were
queued up on the logrcvr process and were not forwarded out or
written to disk until an autocommit was passed.
PAN-179543 Fixed an issue where the flow_mgmt process stopped responding when
attempting to clear the session table, which caused the dataplane to
restart.
PAN-178243 Fixed an issue where Shared Gateway was not visible in the Virtual
System drop down when configuring a Layer3 aggregate subinterface.
PAN-OS Release Notes 10.2.12 310 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
Issue ID Description
PAN-178194 Fixed an issue with the web interface where, when only the Advanced
URL Filtering license was activated, the message License required
for URL filtering to function was incorrectly displayed and
the URL Filtering Profile > Inline ML section was disabled.
PAN-177482 Fixed an issue where ACC > App Scope > Threat Monitor showed NO
DATA TO DISPLAY.
PAN-172501 Fixed an issue where you were unable to revert HA mode settings to
the default values from the web interface.
PAN-171714 Fixed an issue where, when NetBIOS format (domain\user) was used
for the IP address-to-username mapping and the firewall received
the group mapping information from the Cloud Identity Engine, the
firewall did not match the user to the correct group.
PAN-157215 Fixed an issue that occurred when two FQDNs were resolved to the
same IP address and were configured as the same src/dst of the same
rule. If one FQDN was later resolved to a different IP address, the
IP address resolved for the second FQDN was also changed, which
caused traffic with the original IP address to hit the incorrect rule.
PAN-OS Release Notes 10.2.12 311 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.3 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 312 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.2.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.2 Known Issues
• PAN-OS 10.2.2-h5 Addressed Issues
• PAN-OS 10.2.2-h4 Addressed Issues
• PAN-OS 10.2.2-h2 Addressed Issues
• PAN-OS 10.2.2-h1 Addressed Issues
• PAN-OS 10.2.2 Addressed Issues
313
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
WF500-5840 The sample analysis statistics that are returned when issuing
the show wildfire local statistics CLI command
in WildFire appliance cluster deployments may not accurately
reflect the number of samples that have been processed.
PAN-OS Release Notes 10.2.12 314 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
Firewalls Connected > View) does not accurately reflect the
current status of connected WildFire appliances.
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-OS Release Notes 10.2.12 315 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
a Shared address object called SharedAO1 and a vsys-
specific address object also called SharedAO1.
2. Reference the Shared object in another Shared
configuration. For example, reference the Shared address
object (SharedAO1) in a Shared address group called
SharedAG1.
3. Use the Shared configuration object with the reference
in a vsys-specific configuration. For example, reference
the Shared address group (SharedAG1) in a vsys-specific
policy rule.
Workaround: Select Panorama > Setup > Management and
edit the Panorama Settings to enable one of the following:
• Shared Unused Address and Service Objects with
Devices—This options pushes all Shared objects, along
with device group specific objects, to managed firewalls.
This is a global setting and applies to all managed firewalls,
and may result in pushing too many configuration objects
to your managed firewalls.
• Objects defined in ancestors will take higher precedence—
This option specifies that in the event of objects with
the same name, ancestor object take precedence over
descendent objects. In this case, the Shared objects take
precedence over the vsys-specific object.
This is a global setting and applies to all managed firewalls.
In the example above, if the IP address for the Shared
SharedAO1 object was 10.1.1.1 and the device group
specific SharedAO1 was 10.2.2.2, the 10.1.1.1 IP
address takes precedence.
Alternatively, you can remove the duplicate address objects
from the device group configuration to allow only the Shared
objects in your configuration.
PAN-OS Release Notes 10.2.12 316 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
Workaround: Log in to the Log Collector CLI and restart
ElasticSearch.
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
PAN-OS Release Notes 10.2.12 317 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See log-start eq no
PAN-OS 10.2.11 Addressed
log-end eq no
Issues.
log-end eq yes
PAN-OS Release Notes 10.2.12 318 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
PAN-206253 For PA-3400 Series firewalls, the default log rate is set too
low and the max configurable log rate is incorrectly capped
This issue is now resolved. See
resulting in the firewall not generating more than 6,826 logs
PAN-OS 10.2.4 Addressed
per second.
Issues.
PAN-OS Release Notes 10.2.12 319 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See system log (Monitor > Logs > System) is generated each time
PAN-OS 10.2.4 Addressed the firewall reaches maximum disk usage capacity.
Issues.
PAN-OS Release Notes 10.2.12 320 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
Workaround: Manually reboot the Active Panorama HA
peer.
PAN-198174 When viewing traffic or threat logs from the firewall ACC
or Monitor, performing a reverse DNS lookup, for example,
This issue is now resolved. See
when resolving IP addresses to domain names using the
PAN-OS 10.2.4 Addressed
Resolve Hostname feature, can cause the appliance to crash
Issues.
and restart if DNS server settings have not been configured.
Workaround: Provide a DNS server setting for the firewall
(Device > DNS Setup > Services). If you cannot reference a
valid DNS server, you can add a dummy address.
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
This issue is now resolved. See
PAN-OS 10.2.4 Addressed
Issues.
PAN-OS Release Notes 10.2.12 321 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 322 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
when you hover over the Commit tab, even though there are
pending changes to commit.
Workaround: The status shown when hovering over the
Commit tab is a cosmetic issue. Commit the pending changes,
if required.
PAN-194708 URL filtering logs (Monitor > Logs > URL Filtering)
erroneously truncate a 16KB Header value and do not display
This issue is now resolved. See
the Header values that follow the truncated 16KB header.
PAN-OS 10.2.3 Addressed
Issues. For example, a URL filtering log has 5 Headers. The second
Header has a 16KB value. In the URL filtering log, the first
header and the value are displayed, second Header value is
truncated, and remaining three headers are not displayed.
PAN-OS Release Notes 10.2.12 323 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 324 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
PAN-188904 Certain web pages and web page contents might not properly
load when cloud inline categorization is enabled on the
This issue is now resolved. See
firewall.
PAN-OS 10.2.4 Addressed
Issues.
PAN-OS Release Notes 10.2.12 325 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 326 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
not push the committed configuration changes to managed
firewalls.
Workaround: Select Commit > Push to Devices to push the
committed configuration changes to your managed firewalls.
PAN-184708 Scheduled report emails (Monitor > PDF Reports > Email
Scheduler) are not emailed if:
This issue is now resolved. See
PAN-OS 10.2.4 Addressed • A scheduled report email contains a Report Group
Issues. (Monitor > PDF Reports > Report Group) which includes a
SaaS Application Usage report.
• A scheduled report contains only a SaaS Application Usage
Report.
Workaround: To receive a scheduled report email for all other
PDF report types:
1. Select Monitor > PDF Reports > Report Groups and
remove all SaaS Application Usage reports from all Report
Groups.
2. Select Monitor > PDF Reports > Email Scheduler and
edit the scheduled report email that contains only a SaaS
Application Usage report. For the Recurrence, select
Disable and click OK.
Repeat this step for all scheduled report emails that
contain only a SaaS Application Usage report.
3. Commit.
(Panorama managed firewalls) Select Commit > Commit
and Push
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 327 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 328 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
• Define URL exceptions for specific web sites—
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 329 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 330 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 331 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-198372 Fixed an issue where the root-cert was set to expire on December
31, 2023. With this fix, the expiration date has been extended.
PAN-OS Release Notes 10.2.12 332 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 333 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
PAN-194107 Fixed an issue where the expiry date for the Advanced Threat
Protection license was incorrect for BND3 payg VM-Series firewalls
on Amazon Web Services (AWS), Oracle Cloud Infrastructure (OCI),
Google Cloud Platform (GCP), and Microsoft Azure.
PAN-186075 (VM-Series firewalls only) Fixed an issue where the firewall rebooted
after receiving large packets while in DPDK mode on Azure virtual
machines running CX4 (MLx5) drivers.
PAN-OS Release Notes 10.2.12 334 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
PAN-193579 Fixed an issue where new logs viewed from the CLI (show log
<log_type>) and new syslogs forwarded to a syslog server contained
additional, erroneous entries.
PAN-192930 Fixed an issue where, when the default port was not TCP/443,
implicitly used SSL applications were blocked by the Security policy as
an SSL application and did not shift to the correct application.
PAN-192880 Fixed an issue where, when the firewall was configured for jumbo
frames, an internal interface was not set with the correct MTU, which
caused byte frames larger than 1500 to be dropped when a DF bit was
set.
PAN-192725 Fixed an issue where the firewall failed to forward logs to Panorama
when configured with IPv6 addressing only.
PAN-192089 Fixed an issue on the web interface where the IPSec tunnel did not
gray out after disabling it.
PAN-191629 (PA-5450 firewalls only) Fixed an issue where the hourly summary
log was limited to 100,001 lines when summarized, which resulted in
inconsistent report results when using summary logs.
PAN-191513 Fixed an issue on multi-vsys firewalls where the DLP cloud service
continued to exclude an application added to a shared application
group (Objects > Application Filters) from non-file traffic inspection.
This issue occurred when the application was removed from the
application group or filter that was added to the App Exclusion List
(Objects > DLP > Data Filtering Profiles).
PAN-191466 Fixed an issue where you were unable to use the web interface to
override IPsec tunnels pushed from Panorama
PAN-191288 Fixed an issue where the firewall restarted due to a dnsproxy process
crash.
PAN-OS Release Notes 10.2.12 335 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
PAN-190811 (PA-5450 firewalls only) Fixed an issue where logs were forwarded
through the management interface instead of the configured log
interface to be used for forwarding.
PAN-190675 Fixed an IoT cloud connectivity issue with the firewall dataplane when
the Data Services service route was used and the egress interface had
VLAN tagging.
PAN-190492 Fixed an issue where the Panorama log collector group level SSH
settings were not migrated to the new format when upgrading from a
PAN-OS 9.1 release to a PAN-OS 10.0 release.
PAN-189429 Fixed a memory leak that occurred when enabling XFF (x-forwarded-
for) logging in a Security policy.
PAN-189395 (PA-400 Series firewalls only) Fixed an issue where running a PAN-OS
10.2 release caused dataplane processes to restart unexpectedly.
PAN-188872 Fixed an OOM condition caused by a memory leak issue on the useridd
process.
PAN-188097 Fixed an issue where the firewall stopped allocating new sessions
with increments in the counter session_alloc_failure. This was caused
by GPRS tunneling protocol (GTP-U) tunnel session aging processing
issue.
PAN-187558 Fixed an issue where the following error message flooded the system
log: Incremental update to DP failed.
PAN-OS Release Notes 10.2.12 336 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
of a validate all operation. This issue occurred when multiple device
groups were included in the push.
PAN-185844 Fixed an issue where Decryption Log entries were associated with the
wrong Security policy rule.
PAN-185558 Fixed an issue where Panorama log migration failed when old logs
migrated to a newer format. This was due to older indices failing to
close.
PAN-184474 Fixed an issue where, when the firewall had Advanced Routing
enabled, a static route remained active after an interface went down.
PAN-183579 Fixed an issue where SD-WAN path monitoring failed over the
interface directly connected to the ISP due to an unsupported ICMP
probe format.
PAN-178450 Fixed an issue where icons weren't displayed for clientless VPN
applications.
PAN-177671 Fixed an issue where, when SIP traffic traversing the firewall was sent
with a high Quality of Service (QoS) differentiated service code (DSCP)
value, the DSCP value was reset to the default setting (CS0) for the
first data packet.
PAN-177455 (PA-7000 Series firewalls with HA clustering enabled and using HA4
communication links only) Fixed an issue where loading PAN-OS
10.2.0 on the firewall caused the PA-7000 100G NPC (Network
PAN-OS Release Notes 10.2.12 337 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.2 Known and Addressed Issues
Issue ID Description
Processing Card) to go offline. As a result, the firewall failed to boot
normally and entered maintenance.
PAN-OS Release Notes 10.2.12 338 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.1.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.1 Known Issues
• PAN-OS 10.2.1-h2 Addressed Issues
• PAN-OS 10.2.1-h1 Addressed Issues
• PAN-OS 10.2.1 Addressed Issues
339
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-OS Release Notes 10.2.12 340 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
2. Select Commit and Commit to Panorama the SD-WAN
configuration changes on the active HA peer.
On the passive HA peer, select Panorama > Managed
Devices > Summary and observe that the managed devices
are now out-of-sync.
3. Log in to the primary HA peer Panorama CLI and trigger a
manual synchronization between the active and secondary
HA peers.
request high-availability sync-to-remote running-config
4. Log back in to the active HA peer Panorama web interface
and select Commit > Push to Devices and Push.
PAN-OS Release Notes 10.2.12 341 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
• Shared Unused Address and Service Objects with
Devices—This options pushes all Shared objects, along
with device group specific objects, to managed firewalls.
This is a global setting and applies to all managed firewalls,
and may result in pushing too many configuration objects
to your managed firewalls.
• Objects defined in ancestors will take higher precedence—
This option specifies that in the event of objects with
the same name, ancestor object take precedence over
descendent objects. In this case, the Shared objects take
precedence over the vsys-specific object.
This is a global setting and applies to all managed firewalls.
In the example above, if the IP address for the Shared
SharedAO1 object was 10.1.1.1 and the device group
specific SharedAO1 was 10.2.2.2, the 10.1.1.1 IP
address takes precedence.
Alternatively, you can remove the duplicate address objects
from the device group configuration to allow only the Shared
objects in your configuration.
PAN-OS Release Notes 10.2.12 342 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
PAN-OS Release Notes 10.2.12 343 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 344 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
• PA-3400 Series
• PA-5410, PA-5420, and PA-5430 Firewalls
• PA-5450 Firewall
Workaround: Log in to the firewall CLI or Panorama CLI and
fetch the device certificate.
PAN-206253 For PA-3400 Series firewalls, the default log rate is set too
low and the max configurable log rate is incorrectly capped
This issue is now resolved. See
resulting in the firewall not generating more than 6,826 logs
PAN-OS 10.2.4 Addressed
per second.
Issues.
PAN-OS Release Notes 10.2.12 345 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
before you can continue to Context Switch to a different
managed firewall.
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
PAN-194708 URL filtering logs (Monitor > Logs > URL Filtering)
erroneously truncate a 16KB Header value and do not display
This issue is now resolved. See
the Header values that follow the truncated 16KB header.
PAN-OS 10.2.3 Addressed
Issues. For example, a URL filtering log has 5 Headers. The second
Header has a 16KB value. In the URL filtering log, the first
PAN-OS Release Notes 10.2.12 346 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
header and the value are displayed, second Header value is
truncated, and remaining three headers are not displayed.
PAN-OS Release Notes 10.2.12 347 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 348 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-188904 Certain web pages and web page contents might not properly
load when cloud inline categorization is enabled on the
This issue is now resolved. See
firewall.
PAN-OS 10.2.4 Addressed
Issues.
PAN-OS Release Notes 10.2.12 349 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
Workaround: Log in to the Panorama CLI and reset the DLP
plugin.
admin > request plugins dlp reset
PAN-OS Release Notes 10.2.12 350 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-184708 Scheduled report emails (Monitor > PDF Reports > Email
Scheduler) are not emailed if:
This issue is now resolved. See
PAN-OS 10.2.4 Addressed • A scheduled report email contains a Report Group
Issues. (Monitor > PDF Reports > Report Group) which includes a
SaaS Application Usage report.
• A scheduled report contains only a SaaS Application Usage
Report.
Workaround: To receive a scheduled report email for all other
PDF report types:
1. Select Monitor > PDF Reports > Report Groups and
remove all SaaS Application Usage reports from all Report
Groups.
PAN-OS Release Notes 10.2.12 351 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
2. Select Monitor > PDF Reports > Email Scheduler and
edit the scheduled report email that contains only a SaaS
Application Usage report. For the Recurrence, select
Disable and click OK.
Repeat this step for all scheduled report emails that
contain only a SaaS Application Usage report.
3. Commit.
(Panorama managed firewalls) Select Commit > Commit
and Push
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 352 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
gigabit RJ-45 ports on the firewall to go down if they are set
to Auto.
PAN-OS Release Notes 10.2.12 353 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 354 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 355 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
PAN-239241 Extended the root certificate for WildFire appliances to December 31,
2032.
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-198372 Fixed an issue where the root-cert was set to expire on December
31, 2023. With this fix, the expiration date has been extended.
PAN-OS Release Notes 10.2.12 356 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
PAN-190311 (PA-220 and PA-220R firewalls and PA-800 Series firewalls only) Fixed
an issue where management connectivity to the firewall was lost due
to the expiration of the DHCP lease, which caused the IP configuration
on the management port to be purged in PAN-OS 10.2.0. To upgrade,
download PAN-OS 10.2.0 (no installation), then download and install
PAN-OS 10.2.0-h1.
PAN-190175 and A fix was made to address an OpenSSL infinite loop vulnerability in the
PAN-190223 PAN-OS software (CVE-2022-0778).
PAN-189665 (FIPS-CC enabled firewalls only) Fixed an issue where the firewall was
unable to connect to log collectors after an upgrade due to missing
cipher suites.
PAN-189565 Fixed an issue after upgrading to PAN-OS 10.2 where the tund process
stopped responding on multiple GlobalProtect clients.
PAN-189468 Fixed an issue where the firewall onboard packet processor used
by the PAN-OS content-inspection (CTD) engine can generate
high dataplane resource usage when overwhelmed by a session
with an unusually high number of packets. This can result in
resource-unavailable messages due to the content inspection
queue filling up. Factors related to the likelihood of an occurrence
include enablement of content-inspection based features that are
configured in such a way that might process thousands of packets
in rapid succession (such as SMB file transfers). This can cause poor
performance for the affected session and other sessions using the
same packet processor. PA-3000 series and VM-Series firewalls are
not impacted.
PAN-189298 Fixed an issue where existing traffic sessions were not synced after
restarting the active dataplane when it became passive.
PAN-OS Release Notes 10.2.12 357 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-189230 (VM-Series firewalls only) Fixed an issue that caused the pan_task
process to stop responding with floating point exception (FPE) when
there was a module of 0 on the queue number.
PAN-189214 Fixed an issue that prevented antivirus signature update packages that
are normally available to install from displaying properly on the firewall
when the Advanced Threat Prevention license is present on a firewall
without a Threat Prevention license.
PAN-189206 Fixed an issue where Device Group and Template administrator roles
didn't support a context switch between the Panorama and firewall
web interfaces.
PAN-189094 Fixed an issue where, after upgrading a CN-Series firewall from a PAN-
OS 10.1 release to PAN-OS 10.2.0, show session commands did not
return output.
PAN-189032 Fixed an issue where, when Advanced Routing was enabled on the
firewall, an OSPFv3 interface configured with the p2mp link type
caused commits to fail.
PAN-188883 Fixed an issue where, when pre-generated license key files were
manually uploaded via the web interface, they weren't properly
recognized by PAN-OS and didn't display a serial number or initiate a
reboot.
PAN-188828 Fixed an intermittent issue where web pages and web page contents
did not properly load when cloud inline categorization was enabled.
PAN-OS Release Notes 10.2.12 358 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
20 or more versions older than the current local running configuration
on Panorama.
PAN-186785 Fixed an issue where, after logging in, Panorama displayed a 500 error
page after five minutes of logging for dynamic group template admin
types with access to approximately 115 managed devices or 120
dynamic groups.
PAN-186516 Fixed an issue where log queries that included WildFire submission
logs returned more slowly than expected.
PAN-186402 (PA-440 Series firewalls only) Fixed an issue where the firewall's
maximum tunnel limit was incorrect.
PAN-186137 (PA-3400 Series firewalls only) Fixed an issue where the firewall
management interface incorrectly displayed 10G port speed as
an option even though 10G speed is not supported and can't be
configured.
PAN-185616 Fixed an issue where the firewall sent fewer logs to the system log
server than expected. With this fix, the firewall accommodates a larger
send queue for syslog forwarding to TCP syslog receivers.
PAN-185164 Fixed an issue where processing corrupted IoT messages caused the
wificlient process to restart.
PAN-183826 Fixed an issue where, after clicking WildFire Analysis Report, the web
interface failed to display the report with the following error message:
refused to connect.
PAN-OS Release Notes 10.2.12 359 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-183567 Fixed an issue on Panorama where ZTP Plugin 2.0 was not available
for download before upgrading Panorama to PAN-OS 10.2.
PAN-182492 Fixed an issue where the WildFire analysis report was not viewable
from the firewall WildFire submission log entry page.
PAN-181039 Fixed an issue with DNS cache depletion that caused continuous DNS
retries.
PAN-181031 Fixed an issue where the CN-NGFW (DP) folder on the CN-MGMT
pod eventually consumed a large amount of space in the /var/log/pan
because the old registered stale next-generation firewall logs were not
being cleared.
PAN-180338 Fixed an issue where the CTD loop count wasn't accurately
incremented.
PAN-179966 Fixed an issue where, after upgrading to a PAN-OS 8.1 release, the
port on the firewall stayed up, but the port on the connected device
reported down. This occurred because, on force mode, autoneg was
disabled by default. With this fix, autoneg is enabled by default on
force mode.
PAN-178195 Fixed an issue where the URL filtering logs generated by traffic
analyzed by Advanced URL filtering cloud inline categorization didn't
display the URL name.
PAN-177072 Fixed an intermittent issue where Panorama did not show new logs
from firewalls.
PAN-OS Release Notes 10.2.12 360 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
Issue ID Description
PAN-176889 Fixed an issue where the log collector continuously disconnected from
Panorama due to high latency and a high number of packets in Send-
Q.
PAN-176693 (M-300 and M-700 appliances only) Fixed an issue where the Activity
(ACT) LEDs on the RJ-45 ports did not blink when processing network
traffic.
PAN-145833 (PA-3200 Series firewalls only) Fixed an issue where the firewall
stopped recording dataplane diagnostic data in dp-monitor.log after a
few hours of uptime.
PAN-OS Release Notes 10.2.12 361 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.1 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 362 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and
Addressed Issues
Review a list of known and addressed issues for PAN-OS 10.2.0.
For contacting support, for information on support programs, to manage your account or devices,
or to open a support case, go to https://support.paloaltonetworks.com.
• PAN-OS 10.2.0 Known Issues
• PAN-OS 10.2.0-h3 Addressed Issues
• PAN-OS 10.2.0-h2 Addressed Issues
• PAN-OS 10.2.0-h1 Addressed Issues
• PAN-OS 10.2.0 Addressed Issues
363
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
PAN-260851 From the NGFW or Panorama CLI, you can override the
existing application tag even if Disable Override is enabled for
the application (Objects > Applications) tag.
PAN-OS Release Notes 10.2.12 364 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
(Panorama > Managed Devices > Summary) display as
out-of-sync on the passive HA peer when configuration
changes are made to the SD-WAN (Panorama > SD-WAN)
configuration on the active HA peer.
Workaround: Manually synchronize the Panorama HA peers.
1. Log in to the Panorama web interface on the active HA
peer.
2. Select Commit and Commit to Panorama the SD-WAN
configuration changes on the active HA peer.
On the passive HA peer, select Panorama > Managed
Devices > Summary and observe that the managed devices
are now out-of-sync.
3. Log in to the primary HA peer Panorama CLI and trigger a
manual synchronization between the active and secondary
HA peers.
request high-availability sync-to-remote running-config
4. Log back in to the active HA peer Panorama web interface
and select Commit > Push to Devices and Push.
PAN-OS Release Notes 10.2.12 365 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
Workaround: Select Panorama > Setup > Management and
edit the Panorama Settings to enable one of the following:
• Shared Unused Address and Service Objects with
Devices—This options pushes all Shared objects, along
with device group specific objects, to managed firewalls.
This is a global setting and applies to all managed firewalls,
and may result in pushing too many configuration objects
to your managed firewalls.
• Objects defined in ancestors will take higher precedence—
This option specifies that in the event of objects with
the same name, ancestor object take precedence over
descendent objects. In this case, the Shared objects take
precedence over the vsys-specific object.
This is a global setting and applies to all managed firewalls.
In the example above, if the IP address for the Shared
SharedAO1 object was 10.1.1.1 and the device group
specific SharedAO1 was 10.2.2.2, the 10.1.1.1 IP
address takes precedence.
Alternatively, you can remove the duplicate address objects
from the device group configuration to allow only the Shared
objects in your configuration.
PAN-OS Release Notes 10.2.12 366 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See rulebase by dragging and dropping individual policy rules and
PAN-OS 10.2.8 Addressed then moving the entire tag group.
Issues.
PAN-217307 The following Security policy rule (Policies > Security) filters
return no results:
This issue is now resolved. See
PAN-OS 10.2.11 Addressed log-start eq no
Issues.
log-end eq no
log-end eq yes
PAN-OS Release Notes 10.2.12 367 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 368 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
• PA-410 Firewall
• PA-440, PA-450, and PA-460 Firewalls
• PA-3400 Series
• PA-5410, PA-5420, and PA-5430 Firewalls
• PA-5450 Firewall
Workaround: Log in to the firewall CLI or Panorama CLI and
fetch the device certificate.
PAN-OS Release Notes 10.2.12 369 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
Settings (Device > Setup > Management) as part of a
template or template stack configuration.
PAN-206253 For PA-3400 Series firewalls, the default log rate is set too
low and the max configurable log rate is incorrectly capped
This issue is now resolved. See
resulting in the firewall not generating more than 6,826 logs
PAN-OS 10.2.4 Addressed
per second.
Issues.
PAN-OS Release Notes 10.2.12 370 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
PAN-197097 Large Scale VPN (LSVPN) does not support IPv6 addresses on
the satellite firewall.
PAN-OS Release Notes 10.2.12 371 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
Workaround: Delete the CN-Series DP pods, MP pods, and
then the pan-cni yaml file in a sequential order.
PAN-OS Release Notes 10.2.12 372 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 373 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See signature update packages that are normally available to
PAN-OS 10.2.1 Addressed install under Device > Dynamic Updates are not displayed.
Issues.
Workaround: Use the request anti-virus upgrade
{info | download | install} CLI commands
to retrieve a list of available antivirus updates and the
download and installation status, download specific antivirus
packages, and to install antivirus packages.Optionally, you
can schedule recurring automatic updates using the following
CLI command: set deviceconfig system update-
schedule anti-virus recurring.
PAN-OS Release Notes 10.2.12 374 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 375 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
PAN-188904 Certain web pages and web page contents might not properly
load when cloud inline categorization is enabled on the
This issue is now resolved. See
firewall.
PAN-OS 10.2.4 Addressed
Issues.
PAN-OS Release Notes 10.2.12 376 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
PAN-OS Release Notes 10.2.12 377 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
Workaround: Do not use a logical router instance with no
interfaces bound to it.
PAN-OS Release Notes 10.2.12 378 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
Workaround: Reboot Panorama if it becomes unresponsive.
PAN-184708 Scheduled report emails (Monitor > PDF Reports > Email
Scheduler) are not emailed if:
This issue is now resolved. See
PAN-OS 10.2.4 Addressed • A scheduled report email contains a Report Group
Issues. (Monitor > PDF Reports > Report Group) which includes a
SaaS Application Usage report.
• A scheduled report contains only a SaaS Application Usage
Report.
Workaround: To receive a scheduled report email for all other
PDF report types:
1. Select Monitor > PDF Reports > Report Groups and
remove all SaaS Application Usage reports from all Report
Groups.
2. Select Monitor > PDF Reports > Email Scheduler and
edit the scheduled report email that contains only a SaaS
Application Usage report. For the Recurrence, select
Disable and click OK.
Repeat this step for all scheduled report emails that
contain only a SaaS Application Usage report.
PAN-OS Release Notes 10.2.12 379 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
3. Commit.
(Panorama managed firewalls) Select Commit > Commit
and Push
PAN-184406 Using the CLI to add a RAID disk pair to an M-700 appliance
causes the dmdb process to crash.
Workaround: Contact customer support to stop the dmdb
process before adding a RAID disk pair to a M-700 appliance.
PAN-OS Release Notes 10.2.12 380 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
This issue is now resolved. See Workaround: You can retrieve the Wildfire analysis reports
PAN-OS 10.2.1 Addressed through the WildFire API or the WildFire portal.
Issues.
PAN-OS Release Notes 10.2.12 381 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
maintenance mode. HA Pairs of Active-Passive and Active-
Active firewalls are not affected.
PAN-176693 The Activity (ACT) LEDs on the RJ-45 ports of the M-300
and M-700 appliances do not blink while processing network
This issue is now resolved. See
traffic.
PAN-OS 10.2.1 Addressed
Issues.
PAN-172274 When you activate the advanced URL filtering license, your
license entitlements for PAN-DB and advanced URL filtering
might not display correctly on the firewall — this is a display
anomaly, not a licensing issue, and does not affect access to
the services.
Workaround: Issue the following command to retrieve and
update the licenses: license request fetch.
PAN-OS Release Notes 10.2.12 382 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
Issue ID Description
Workaround: Before you upgrade your Panorama servers to
PAN-OS 10.1.0, configure HA (Panorama > High Availability),
add the local Log Collectors of the HA peers to the same
Collector Group, and upgrade to PAN 10.1.0.
PAN-OS Release Notes 10.2.12 383 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 384 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
PAN-231771 Fixed an issue where the firewall issued /box/getserv/ requests with
PAN-OS 7.1.0 and did not take device certificates.
PAN-198372 Fixed an issue where the root-cert was set to expire on December
31, 2023. With this fix, the expiration date has been extended.
PAN-OS Release Notes 10.2.12 385 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 386 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 387 ©2024 Palo Alto Networks, Inc.
PAN-OS 10.2.0 Known and Addressed Issues
PAN-OS Release Notes 10.2.12 388 ©2024 Palo Alto Networks, Inc.
Related Documentation
Review the related documentation for PAN-OS 10.2.
To provide feedback on the documentation, write to us at:
[email protected].
• Related Documentation for PAN-OS 10.2
389
Related Documentation
PAN-OS Release Notes 10.2.12 390 ©2024 Palo Alto Networks, Inc.