<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NGFW 1400 Series LACP / Failover issue (11.1.5) in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1086345#M5400</link>
    <description>&lt;P&gt;Hi , Thanks for sharing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looks like for us its LACP issue (we encountered an issue where the firewall was unable to learn the MAC address from the core switch and all the services found unreachable after upgrading from &lt;SPAN&gt;11.0.3-h10 to&amp;nbsp;11.1.2-h15&amp;nbsp;&lt;/SPAN&gt;)&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jan 2025 06:44:27 GMT</pubDate>
    <dc:creator>SanilHande</dc:creator>
    <dc:date>2025-01-16T06:44:27Z</dc:date>
    <item>
      <title>NGFW 1400 Series LACP / Failover issue (11.1.5)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1000563#M5347</link>
      <description>&lt;P&gt;&lt;BR /&gt;This is a notification for anyone running 1420 boxes in a high-availability (HA) configuration in their environments &amp;gt;11.1.4. We recently encountered significant issues with our NGFW operating in HA mode. Specifically, the HA setup failed on the active firewall, and the failover did not occur as expected to the secondary (standby) device. I had to manually suspend the active firewall to enable the secondary to take over, resulting in a brief but severe outage.&lt;/P&gt;
&lt;P&gt;A ticket has been opened with TAC, and it appears we are among the first customers to report this issue. TAC has confirmed it to be an LACP-related bug that originated in version 11.1.4. Unfortunately, even downgrading to the preferred version 11.1.4-h7 does not resolve the problem. According to TAC, this issue is still under internal investigation and has not yet been made public. Their senior engineers are actively working on it.&lt;/P&gt;
&lt;P&gt;As a temporary workaround, I configured LACP to passive mode between the firewall and the core switch. So far, this adjustment has stabilized the HA setup, with both firewalls operating in Active/Standby mode without errors.&lt;/P&gt;
&lt;P&gt;If you encounter a similar issue, provide TAC with the following reference issue: PAN-275888.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 12:58:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1000563#M5347</guid>
      <dc:creator>Z.Boussaid</dc:creator>
      <dc:date>2025-01-08T12:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1400 Series LACP / Failover issue (11.1.5)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1066235#M5376</link>
      <description>&lt;P&gt;TAC confirmed they introduced a new feature to help with performance in conditions where the packet rate is low, however this "feature" has an impact when packets spiked causing the data plane to crash. they recommend upgrading to 11.1.6 (not preferred) to fix issue PAN-263208.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Jan 2025 20:38:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1066235#M5376</guid>
      <dc:creator>Z.Boussaid</dc:creator>
      <dc:date>2025-01-13T20:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1400 Series LACP / Failover issue (11.1.5)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1086345#M5400</link>
      <description>&lt;P&gt;Hi , Thanks for sharing&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looks like for us its LACP issue (we encountered an issue where the firewall was unable to learn the MAC address from the core switch and all the services found unreachable after upgrading from &lt;SPAN&gt;11.0.3-h10 to&amp;nbsp;11.1.2-h15&amp;nbsp;&lt;/SPAN&gt;)&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 06:44:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1086345#M5400</guid>
      <dc:creator>SanilHande</dc:creator>
      <dc:date>2025-01-16T06:44:27Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1400 Series LACP / Failover issue (11.1.5)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1220454#M5538</link>
      <description>&lt;P&gt;we had multiple interface failures, so even after upgrading to 11.1.6 and RMA the box, we just had another similar crash 02-13. all interfaces (OOB, Inside and DMZ) went down, causing of course the OSPF to fail and therefore no internet for all users. the failover didn't happen, even though the HA is enabled. we upgraded the ticket to critical and TAC are still trying to figure out this garbage.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2025 14:46:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1220454#M5538</guid>
      <dc:creator>Z.Boussaid</dc:creator>
      <dc:date>2025-02-14T14:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1400 Series LACP / Failover issue (11.1.5)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1220582#M5542</link>
      <description>&lt;P&gt;We had the same issue this morning.&amp;nbsp; Lacp had failed from core cisco 9500 switch to palo 1420 to primary firewall.&amp;nbsp; The ha firewall never failed over and I had to reboot the firewall get all layer 3 connectivity back up.&amp;nbsp; I have a case open with tac and they are researching tsf.&amp;nbsp; On preferred code version 11.1.4h7.&amp;nbsp; Waiting for an update and wondering if this same potential bug can effect our 5260 firewalls to cause lacp failure.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Feb 2025 23:44:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1220582#M5542</guid>
      <dc:creator>aaronbennett</dc:creator>
      <dc:date>2025-02-16T23:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1400 Series LACP / Failover issue (11.1.5)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1220648#M5551</link>
      <description>&lt;P&gt;There is a lot common for this LACP issue 1420 model , We got below recommendation for PA TAC for upgrade issue ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;************************************************************************************************************&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Root&amp;nbsp;Cause:&lt;BR /&gt;The&amp;nbsp;issue&amp;nbsp;is&amp;nbsp;triggered&amp;nbsp;when&amp;nbsp;the&amp;nbsp;HA&amp;nbsp;device&amp;nbsp;has&amp;nbsp;a&amp;nbsp;ha_group_id&amp;nbsp;set&amp;nbsp;to&amp;nbsp;nonzero,&amp;nbsp;causing&amp;nbsp;both&amp;nbsp;devices&amp;nbsp;to&amp;nbsp;have&amp;nbsp;the&amp;nbsp;same&amp;nbsp;system&amp;nbsp;MAC&amp;nbsp;address,&amp;nbsp;regardless&amp;nbsp;of&amp;nbsp;whether&amp;nbsp;the&amp;nbsp;configuration&amp;nbsp;option&amp;nbsp;"Same&amp;nbsp;System&amp;nbsp;MAC&amp;nbsp;Address&amp;nbsp;for&amp;nbsp;Active-Passive&amp;nbsp;HA"&amp;nbsp;is&amp;nbsp;disabled&amp;nbsp;or&amp;nbsp;not.&lt;BR /&gt;&lt;BR /&gt;Conditions&amp;nbsp;to&amp;nbsp;trigger&amp;nbsp;the&amp;nbsp;issue:&amp;nbsp;HA&amp;nbsp;A/P&amp;nbsp;is&amp;nbsp;enabled,&amp;nbsp;LACP&amp;nbsp;is&amp;nbsp;enabled&amp;nbsp;on&amp;nbsp;AE&amp;nbsp;interfaces&amp;nbsp;with&amp;nbsp;Enable&amp;nbsp;in&amp;nbsp;HA&amp;nbsp;Passive&amp;nbsp;State'&amp;nbsp;is&amp;nbsp;enabled&amp;nbsp;and&amp;nbsp;'Same&amp;nbsp;System&amp;nbsp;MAC&amp;nbsp;Address&amp;nbsp;for&amp;nbsp;Active-Passive&amp;nbsp;HA'&amp;nbsp;is&amp;nbsp;disabled&lt;BR /&gt;&lt;BR /&gt;To&amp;nbsp;verify&amp;nbsp;this,&amp;nbsp;you&amp;nbsp;can&amp;nbsp;run&amp;nbsp;the&amp;nbsp;command:&lt;BR /&gt;show&amp;nbsp;lacp&amp;nbsp;aggregate-ethernet&amp;nbsp;all&lt;BR /&gt;&lt;BR /&gt;If&amp;nbsp;the&amp;nbsp;System&amp;nbsp;MAC&amp;nbsp;address&amp;nbsp;appears&amp;nbsp;the&amp;nbsp;same&amp;nbsp;on&amp;nbsp;both&amp;nbsp;devices,&amp;nbsp;this&amp;nbsp;confirms&amp;nbsp;the&amp;nbsp;issue.&amp;nbsp;We&amp;nbsp;have&amp;nbsp;also&amp;nbsp;successfully&amp;nbsp;reproduced&amp;nbsp;this&amp;nbsp;in&amp;nbsp;our&amp;nbsp;lab&amp;nbsp;environment.&lt;BR /&gt;&lt;BR /&gt;Issue&amp;nbsp;Details&amp;nbsp;&amp;amp;&amp;nbsp;Fix&amp;nbsp;Versions:&lt;BR /&gt;Issue&amp;nbsp;ID:&amp;nbsp;PAN-278296&lt;BR /&gt;Fix&amp;nbsp;Versions:&lt;BR /&gt;11.1.8&amp;nbsp;–&amp;nbsp;March&amp;nbsp;6,&amp;nbsp;2025&lt;BR /&gt;11.2.8&amp;nbsp;–&amp;nbsp;May&amp;nbsp;5,&amp;nbsp;2025&lt;BR /&gt;11.1.11&amp;nbsp;–&amp;nbsp;June&amp;nbsp;6,&amp;nbsp;2025&lt;BR /&gt;12.1.2&amp;nbsp;–&amp;nbsp;(Date&amp;nbsp;TBD)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 09:10:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1220648#M5551</guid>
      <dc:creator>SanilHande</dc:creator>
      <dc:date>2025-02-17T09:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1400 Series LACP / Failover issue (11.1.5)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1220667#M5552</link>
      <description>&lt;P&gt;We recently encountered the same issue even after replacing the device through an RMA. As a result, we escalated the support case to a Critical priority, prompting involvement from Palo Alto Engineering, as the problem began impacting production during peak hours. The most recent incident occurred on February 13, 2025.&lt;/P&gt;
&lt;P&gt;Following their investigation, TAC confirmed that the root cause of the PA crash is related to processing a DNS over HTTPS (DoH) packet. This feature was introduced in PAN-OS 11.0 and is enabled by default in PAN-OS 11.0.x. This explanation aligns with our environment, as we run DNS Security on our Edge PA but not on our SD-WAN PA, despite both operating on the same software version.&lt;/P&gt;
&lt;P&gt;According to TAC, this issue was expected to be resolved in PAN-OS 11.1.6, which we upgraded to in January. However, the problem persists. If you are running the DNS Security license on your firewalls, it is recommended to execute the specified command on both devices in an HA pair until the release of the PAN-OS 11.1.8 fix, scheduled for the first week of March. Ensure you save your configuration as a precaution and verify with TAC whether DNS Security is enabled in your environment before proceeding.&lt;/P&gt;
&lt;P&gt;Additionally, regarding the failover issue, TAC confirmed that it did not occur because the system MAC address remains the same on both devices, as previously discussed in this thread. You can run the second command to verify this. This issue is also expected to be addressed in PAN-OS 11.1.8.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;set deviceconfig setting dns-over-https enable no&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;show&amp;nbsp;lacp&amp;nbsp;aggregate-ethernet&amp;nbsp;all&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 13:02:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1220667#M5552</guid>
      <dc:creator>Z.Boussaid</dc:creator>
      <dc:date>2025-02-17T13:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: NGFW 1400 Series LACP / Failover issue (11.1.5)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1242530#M6480</link>
      <description>&lt;P&gt;I'm running PA1420 Active/Passive HA with LACP interface. The firmware is 11.2.4h. FW2 is active and FW1 is passive. When failover to FW1, the LACP is not working and connection is not established. After reverted to FW2 active firewall, all are working fine. The FW1 system log show as below.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just curious that anyone have the same issue like mine. Please share your opinion for this.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;''&lt;/P&gt;
&lt;P&gt;2025/11/24 19:42:57 high ha state-change 0 HA Group 1: Moved from state Passive to state Active&lt;BR /&gt;2025/11/24 19:42:57 info routing routed-fib-sync-sel 0 FIB HA sync started when local device becomes master.&lt;BR /&gt;&amp;#27;[7mmore&amp;#27;[27m&amp;#27;[K&lt;BR /&gt;&amp;#27;[K2025/11/24 19:42:58 info iot icd-ha-status 0 Icd HA state is changed from 0 to 1 time: 2025-11-24 19:42:59&lt;BR /&gt;2025/11/24 19:42:58 info iot icd-ha-status 0 Icd HA better state is changed from 2450 to 3344 time: 2025-11-24 19:42:59&lt;BR /&gt;2025/11/24 19:42:58 info userid dsc-ha-status 0 dsc HA state is changed from 0 to 1 time: 2025-11-24 19:42:59&lt;BR /&gt;2025/11/24 19:42:58 info userid 10.1.3 connect-ldap-sever 0 ldap cfg LDAP-Group-Mapping connected to server 10.1.30.148:389, initiated by: 10.1.30.201&lt;BR /&gt;2025/11/24 19:43:17 info ctd-agent ctd-agent-connectio 0 Connection to ADNS service is disconnected&lt;BR /&gt;2025/11/24 19:43:29 info ctd-agent ctd-agent-connectio 0 Connection to AdnsTelemetry service is disconnected&lt;BR /&gt;2025/11/24 19:43:29 info ras rasmgr-ha-full-sync 0 RASMGR daemon sync all user info to HA peer started.&lt;BR /&gt;2025/11/24 19:43:29 info vpn keymgr-ha-full-sync 0 KEYMGR sync all IPSec SA to HA peer started.&lt;BR /&gt;2025/11/24 19:43:29 info satd satd-ha-full-sync-s 0 SATD daemon sync all gateway infos to HA peer started.&lt;BR /&gt;2025/11/24 19:43:29 info routing routed-fib-sync-pee 0 FIB HA sync started when peer device becomes passive.&lt;BR /&gt;2025/11/24 19:43:29 info ras rasmgr-ha-full-sync 0 RASMGR daemon sync all user info to HA peer exit.&lt;BR /&gt;2025/11/24 19:43:30 info iot icd-ha-status 0 Icd HA better state is changed from 3344 to 3345 time: 2025-11-24 19:43:31&lt;BR /&gt;2025/11/24 19:43:30 info userid 10.1.3 connect-ldap-sever 0 ldap cfg LDAP-Group-Mapping connected to server 10.1.30.148:389, initiated by: 10.1.30.201&lt;BR /&gt;2025/11/24 19:43:30 info vpn keymgr-ha-full-sync 0 KEYMGR sync all IPSec SA to HA peer exit.&lt;BR /&gt;2025/11/24 19:43:32 medium wildfire wildfire-conn-faile 0 Failed to resolve host wildfire.paloaltonetworks.com&lt;BR /&gt;2025/11/24 19:44:21 critical lacp ethern unresponsive 0 LACP interface ethernet1/7 moved out of AE-group ae8(peer is not responding to new LACP connection)&lt;BR /&gt;2025/11/24 19:44:22 critical lacp ethern unresponsive 0 LACP interface ethernet1/10 moved out of AE-group ae8(peer is not responding to new LACP connection)&lt;BR /&gt;2025/11/24 19:44:22 critical lacp ethern unresponsive 0 LACP interface ethernet1/8 moved out of AE-group ae8(peer is not responding to new LACP connection)&lt;BR /&gt;2025/11/24 19:44:22 critical lacp ethern unresponsive 0 LACP interface ethernet1/9 moved out of AE-group ae8(peer is not responding to new LACP connection)&lt;BR /&gt;2025/11/24 19:44:25 critical lacp ethern unresponsive 0 LACP interface ethernet1/5 moved out of AE-group ae8(peer is not responding to new LACP connection)&lt;BR /&gt;2025/11/24 19:44:25 critical lacp ethern unresponsive 0 LACP interface ethernet1/6 moved out of AE-group ae8(peer is not responding to new LACP connection)&lt;BR /&gt;2025/11/24 19:44:31 critical lacp ethern unresponsive 0 LACP interface ethernet1/17 moved out of AE-group ae1(peer is not responding to new LACP connection)&lt;BR /&gt;2025/11/24 19:44:32 critical lacp ethern unresponsive 0 LACP interface ethernet1/18 moved out of AE-group ae1(peer is not responding to new LACP connection)&lt;/P&gt;
&lt;P&gt;"&lt;/P&gt;</description>
      <pubDate>Tue, 25 Nov 2025 06:53:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ngfw-1400-series-lacp-failover-issue-11-1-5/m-p/1242530#M6480</guid>
      <dc:creator>J.LowZheTing</dc:creator>
      <dc:date>2025-11-25T06:53:46Z</dc:date>
    </item>
  </channel>
</rss>

