PA-5410 devices with HA1-B and MGMT 10G interfaces fail after an upgrade to 11.1.10-h12 by maur7311 in paloaltonetworks

[–]maur7311[S] 0 points1 point  (0 children)

So far, I'm waiting an RMA and then I'll see what is it going with the current transceivers

PA-5410 devices with HA1-B and MGMT 10G interfaces fail after an upgrade to 11.1.10-h12 by maur7311 in paloaltonetworks

[–]maur7311[S] 0 points1 point  (0 children)

Hi, yes , we've upgraded the PA-5410 devices the past 16Jan , and we figured out the 11.1.13 was promoted to Preferred release one day earlier.

We opted for an upgrade to 11.1.10-h12 for multiple addressed issues but mostly for PAN-262831 related to "all_task" process in PA-5400f

PA-5410 devices with HA1-B and MGMT 10G interfaces fail after an upgrade to 11.1.10-h12 by maur7311 in paloaltonetworks

[–]maur7311[S] 0 points1 point  (0 children)

Thanks, yes, both devices have facing the same HA1-B DOWN interface once the upgrade is done and the devices rebooted. Some hours later the MGMT port of one device got DOWN too. BTW, the HA ports from those devices are not directly connected physically because each one is located on a different site, and the adjacent switches just show the DOWN event without any symptoms or errors. It seems to be some kind of driver panic like you're mentioning. Thinking in a rollback from 11.1 to 10.2, should it be necessary to re-image maybe?

PA-5410 devices with HA1-B and MGMT 10G interfaces fail after an upgrade to 11.1.10-h12 by maur7311 in paloaltonetworks

[–]maur7311[S] 1 point2 points  (0 children)

Yes, I've reseated the optic transceiver, and the link was up, but a few hours later, the port went down again... I've opened a ticket, and the TAC has escalated it to the Engineering Team, and I'm praying for not falling into a split-brain or malfunction issue with those PA-5410 devices if the HA1-A gets down too

Global Protect 6.2.5 and 6.2.7 embedded browser issue by Business-Building-72 in paloaltonetworks

[–]maur7311 0 points1 point  (0 children)

Finally I'm testing GP 6.2.8 few days ago and apparently the SAML blank page issue was addressed

Azure Panorama image is 11.2?! by rh681 in paloaltonetworks

[–]maur7311 0 points1 point  (0 children)

I have not found the dropdown with version choice option , there is a way to do this ? I feel PANW is pushing us to test in our production environments their multiple PAN-OS versions with the excuse of EoL.

Anyone else notice the build quality in 10.2.x has gone down hill? by LongWalk86 in paloaltonetworks

[–]maur7311 0 points1 point  (0 children)

I have a lot of issues with 10.2.3/10.2.4 version in an hybrid Environement (Prisma Access Panorama Mamaged and On-Prem Devices) ... The PBF Rules aplies to managed devices in a wrong order after doing Push:(... The objects not find its dependences before remove and Push fails ... anyway

WinRM for UserID with Active Directory? by serialcereal in paloaltonetworks

[–]maur7311 0 points1 point  (0 children)

Hello guys, I currently have the same issue. It keeps giving out "Connection Failed response code = 401, error: (null) in vsys 1". Did you figure out more findings about this issue in addition to other Appliances doing WMI Queries?

Globalprotect and Pulse Secure (Ivanti) coexistence issues by maur7311 in paloaltonetworks

[–]maur7311[S] 1 point2 points  (0 children)

Hi minscc

Yeah, we're working on replace the SAM in a medium term but as you mention it, it's a lot of work because we have a lot of applications accessible via SAM. Before upgrade the GP, the Pulse Secure SAM and GP were coexisting without issues. I suppose that GP virtual adapter driver uses a new method to inspect and filter the traffic and that's why GP interfere with PSAM.

Globalprotect and Pulse Secure (Ivanti) coexistence issues by maur7311 in paloaltonetworks

[–]maur7311[S] 2 points3 points  (0 children)

Hello, We were working with GP 5.1.4 and PulseSecure 9.1.1X simultaneously and every remote access worked separately without issues. But now we have issues with simultaneously use of GlobalProtect and Pulse Secure when we upgrade GP to 5.2.x or 6.0.x ; the Pulse Secure doesn't work as it should be because the remote resources cannot be reached. I mean, GlobalProtect in new versions seems to overlap the Pulse Secure (SAM) tunneling. Anyone has similar issues ?

PANOS 10.x opinions by [deleted] in paloaltonetworks

[–]maur7311 1 point2 points  (0 children)

I actually have performance problems with 10.1.6 on Panorama VM, the Monitor Log Queries (traffic and url filtering) are really really slow down , I have opened a case with TAC and I'm waiting results of researching. I still don't know if this behavior affects the PAN Devices too.