<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active/passive failover validation was performed using Azure HA configuration getting failed due to Azure token failed with exception &amp;lt;urlopen in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-failover-validation-was-performed-using-azure-ha/m-p/598666#M3796</link>
    <description>&lt;P&gt;Hello Roberto,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After adding the ms-office365-base app to the security policy rules and the session end reason became "threat".&lt;BR /&gt;We then identified that the URL security profile was blocking login.microsoftonline.com, so we added the URL to the custom URL category used.&lt;BR /&gt;The issue is now resolved and the root cause was that the app identification related to the traffic to the Azure API server (login.microsoftonline.com) changed from ssl to ms-office365-base when upgrading from PAN-OS 10.1 to 10.2.&lt;/P&gt;</description>
    <pubDate>Tue, 24 Sep 2024 17:01:17 GMT</pubDate>
    <dc:creator>SunilduttJ</dc:creator>
    <dc:date>2024-09-24T17:01:17Z</dc:date>
    <item>
      <title>Active/passive failover validation was performed using Azure HA configuration getting failed due to Azure token failed with exception &lt;urlopen</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-failover-validation-was-performed-using-azure-ha/m-p/577258#M2652</link>
      <description>&lt;P&gt;I have a palo alto VM- 300 firewall(active/passive) with version 10.1.11-h4.which is hosted in France central azure region 2 availability zone and the azure environment.&lt;/P&gt;
&lt;P&gt;While doing Azure HA failover validation on active/passive firewalls and validation passed.&lt;/P&gt;
&lt;P&gt;When we upgrade the panos version 10.2.8 for both active passive firewalls. But hear we are getting validation getting failed.&lt;/P&gt;
&lt;P&gt;We have raised the case with tac and engineering team. We have already had multiple sessions with Engineering and palo alto , whereby they have tested several code modifications but still they are not able to fix the issue. Please find below screenshot for reference.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PAN-OS :- 10.1.11-h4 :-&amp;nbsp;&lt;SPAN&gt;Azure authentication test is passed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PANOS-10.1.11-h4.png" style="width: 636px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57628iBB7D9E08FFE8AD61/image-dimensions/636x224/is-moderation-mode/true?v=v2" width="636" height="224" role="button" title="PANOS-10.1.11-h4.png" alt="PANOS-10.1.11-h4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;PAN-OS :- 10.2.8 :-&amp;nbsp;&lt;SPAN&gt;Azure authentication test is Failed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PANOS-10.2.8.png" style="width: 649px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57629iDE5C90F0C31787CC/image-dimensions/649x135/is-moderation-mode/true?v=v2" width="649" height="135" role="button" title="PANOS-10.2.8.png" alt="PANOS-10.2.8.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;If the same kind of problem is occurring in your PRD environment. which you or the TAC engineering team fixed it .&amp;nbsp;&lt;SPAN&gt;Request you please assist us.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2024 15:56:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-failover-validation-was-performed-using-azure-ha/m-p/577258#M2652</guid>
      <dc:creator>SunilduttJ</dc:creator>
      <dc:date>2024-02-14T15:56:38Z</dc:date>
    </item>
    <item>
      <title>Re: Active/passive failover validation was performed using Azure HA configuration getting failed due to Azure token failed with exception &lt;urlopen</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-failover-validation-was-performed-using-azure-ha/m-p/598662#M3794</link>
      <description>&lt;P&gt;Hi, I have the same problem.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you resolve the issue?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 15:40:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-failover-validation-was-performed-using-azure-ha/m-p/598662#M3794</guid>
      <dc:creator>Roberto.Parra</dc:creator>
      <dc:date>2024-09-24T15:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: Active/passive failover validation was performed using Azure HA configuration getting failed due to Azure token failed with exception &lt;urlopen</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-failover-validation-was-performed-using-azure-ha/m-p/598666#M3796</link>
      <description>&lt;P&gt;Hello Roberto,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After adding the ms-office365-base app to the security policy rules and the session end reason became "threat".&lt;BR /&gt;We then identified that the URL security profile was blocking login.microsoftonline.com, so we added the URL to the custom URL category used.&lt;BR /&gt;The issue is now resolved and the root cause was that the app identification related to the traffic to the Azure API server (login.microsoftonline.com) changed from ssl to ms-office365-base when upgrading from PAN-OS 10.1 to 10.2.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2024 17:01:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-failover-validation-was-performed-using-azure-ha/m-p/598666#M3796</guid>
      <dc:creator>SunilduttJ</dc:creator>
      <dc:date>2024-09-24T17:01:17Z</dc:date>
    </item>
  </channel>
</rss>

