<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall not connecting to Panorama in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470420#M784</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/209649"&gt;@AdamHP&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To be double sure that the firewall is the one sending the RST and not any intermediate device, I would take a simultaneous packet capture on Firewall and Panorama. An alternate way would be to compare the TTL value (in the IP Header) of the RST with the SYN packet (if both are sent from the same host, TTL will be the same).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Fri, 04 Mar 2022 03:42:51 GMT</pubDate>
    <dc:creator>ahandoo</dc:creator>
    <dc:date>2022-03-04T03:42:51Z</dc:date>
    <item>
      <title>Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469247#M762</link>
      <description>&lt;P&gt;Hello I have new deployed Panorama and new PA-440 Firewall.&lt;/P&gt;
&lt;P&gt;I setup Panorama with all basic settings like IP address/netmask, default GW, DNS, it has license assigned.&lt;/P&gt;
&lt;P&gt;Next I generated AuthKey for the firewalls with validity for 10 days and without SN specified.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PA-440 is in remote location and has a basic WAN setup and IPSec VPN to my datacenter where panorama is.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It has a vlan interface setup in my internal zone and set as source for every service.&lt;/P&gt;
&lt;P&gt;I am able to ping Panorama from the PA-440 so network over VPN is working.&lt;/P&gt;
&lt;P&gt;When I setup Panorama IP with Auth Key on the firewall and add Firewall on panorama by the Serial Number I still see PA-440 in panorama as Disconnected.&lt;/P&gt;
&lt;P&gt;I checked the DataCenter firewall where IPSec is terminated and I can''t see in logs any blocked traffic in between these two.&lt;/P&gt;
&lt;P&gt;Port 3978 for Panorama&amp;nbsp; is enabled in security rules and I can see some ssl traffic is passing in Datacenter over this port.&lt;/P&gt;
&lt;P&gt;Is there something else I forgott to setup or something else I need to check in order to be able to manage this Firewall by Panorama?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 14:44:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469247#M762</guid>
      <dc:creator>AdamHP</dc:creator>
      <dc:date>2022-02-28T14:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469304#M764</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you these given ports as per your connectivity between FWs and Panorama. And same time can you check the logs&lt;/P&gt;
&lt;P&gt;in &amp;gt;monitor&amp;gt;loigs&amp;gt;system level&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/firewall-administration/reference-port-number-usage/ports-used-for-panorama.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/firewall-administration/reference-port-number-usage/ports-used-for-panorama.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;example"&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Mudhireddy_0-1646073396693.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39387i85E7DED04E585EF3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Mudhireddy_0-1646073396693.png" alt="Mudhireddy_0-1646073396693.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;On Firewall:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show panorama status&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;On Panorama:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show devices all&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;verify both commands.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Panorama APP-ID:&lt;/STRONG&gt; When the managed firewall communicates with Panorama, by default this traffic is sent over the MGT interface. Because traffic leaving the MGT interface of the firewall is not subject to a Security policy check, no additional Security policy rule configuration is necessary.&lt;/P&gt;
&lt;P&gt;However, in some deployments, the administrator might choose to send management traffic through one of the data-plane interfaces of the firewall. In this case, remember to create a Security policy rule to allow the Panorama application. Otherwise, the firewall denies communications with Panorama.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Mudhireddy_1-1646073541341.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39388iA566C3A1A73D464C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Mudhireddy_1-1646073541341.png" alt="Mudhireddy_1-1646073541341.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and try to see reachability:&lt;/P&gt;
&lt;P&gt;Use &lt;STRONG&gt;ping&lt;/STRONG&gt; from the firewall or Panorama command line&amp;nbsp;&lt;STRONG&gt;ping count &amp;lt;integer&amp;gt; source &amp;lt;IP-address&amp;gt; host &amp;lt;IP-address&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and try pcap on mgmt using tcpdump&lt;/P&gt;
&lt;P&gt;•Run &lt;STRONG&gt;tcpdump&lt;/STRONG&gt; from the command line of Panorama or the firewall to capture the traffic. When you have enough data, press &lt;STRONG&gt;Ctrl+C&lt;/STRONG&gt; to stop the capture.&lt;/P&gt;
&lt;P&gt;Example: tcpdump filter “host 10.1.10.10&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Feb 2022 18:45:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469304#M764</guid>
      <dc:creator>Mudhireddy</dc:creator>
      <dc:date>2022-02-28T18:45:47Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469575#M766</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am using dataplane port instead of Management as the connection to panorama is anyway over the IPSec VPN connection.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The coresponding Firewall rules are applied on both Firewalls and they are passing the traffic on this ports. Also ping works fine.&lt;/P&gt;
&lt;P&gt;From Firewall: show panorama-status&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Panorama Server 1 : 192.168.1.20
    Connected     : no
    HA state      : disconnected&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From Panorama: show devices all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;Serial                   Hostname        IPv4            IPv6                             Connected
--------------------------------------------------------------------------
00000000XXXX                                                                                     no
Wildfire Real-time Stream Disabled  VPN Disable Mode: no
  Operational Mode: normal
  Certificate Status:
  Certificate subject Name:
  Certificate expiry at:
  Connected at:
  Custom certificate Used:
  Last masterkey push status: Unknown
  Last masterkey push timestamp:  none
  Express mode: no
 Device cert present :
 Device cert expiry date : N/A
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I run also a PCAP and I can see on panorama and also on Firewall traffic from the oposite side.&lt;/P&gt;
&lt;P&gt;I also check all this from this checklist:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AdamHP_0-1646164422919.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39402iCA3EA5714F2A6CF3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AdamHP_0-1646164422919.png" alt="AdamHP_0-1646164422919.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;1. IP connectivity is there&lt;/P&gt;
&lt;P&gt;2. Port 3978 and also others required for panorama are open&lt;/P&gt;
&lt;P&gt;3. DeviceCert on Panorama installed&lt;/P&gt;
&lt;P&gt;4.&amp;nbsp; Serial number of device is correct&lt;/P&gt;
&lt;P&gt;5. Management profile set up on this interface used for communication&lt;/P&gt;
&lt;P&gt;6. Panorama is on version 10.2, Firewall 10.1.4&lt;/P&gt;
&lt;P&gt;7. MTU on tunnel interface lowered&lt;/P&gt;
&lt;P&gt;8.Time synchronized using NTP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What else I can check?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 09:35:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469575#M766</guid>
      <dc:creator>AdamHP</dc:creator>
      <dc:date>2022-03-04T09:35:45Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469766#M768</link>
      <description>&lt;P&gt;Thank you for supplying additional information&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/209649"&gt;@AdamHP&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you check from Panorama's CLI whether TCP connection is established by:&amp;nbsp;&lt;STRONG&gt;show netstat numeric yes | match 3978&lt;/STRONG&gt; ?&lt;/P&gt;
&lt;P&gt;Could you check status of Panorama's certificate from browser:&amp;nbsp;&lt;STRONG&gt;https://&amp;lt;panorama ip&amp;gt;:3978&lt;/STRONG&gt; ?&lt;/P&gt;
&lt;P&gt;Could you also check log on Panorama side from CLI:&amp;nbsp;&lt;STRONG&gt;tail lines 500 mp-log configd.log&lt;/STRONG&gt; ? Search events corresponding with Firewall's Serial Number.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 12:19:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469766#M768</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-03-02T12:19:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469898#M770</link>
      <description>&lt;P&gt;Hello Pavel,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. netstat is showing no match, so no TCP connection on this port is established.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. When I access panorama IP on port 3978 I will get window to select which certificate I want use to authenticate myself&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AdamHP_0-1646253059854.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39414i7469EACA1E1B6CFF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AdamHP_0-1646253059854.png" alt="AdamHP_0-1646253059854.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;After I click on OK, I see that panorama is using self-signed cert issued to localhost&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. In log only entry like this was found with the serial of the FW&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;2022-03-02 15:22:45.032 +0100 String is &amp;lt;devices&amp;gt;
  &amp;lt;entry name="000000000001"/&amp;gt;
  &amp;lt;entry name="000000000000"/&amp;gt;
&amp;lt;/devices&amp;gt;
2022-03-02 15:22:45.032 +0100 After str: &amp;lt;devices&amp;gt;
  &amp;lt;entry name="000000000001"/&amp;gt;
  &amp;lt;entry name="000000000000"/&amp;gt;
&amp;lt;/devices&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 20:36:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469898#M770</guid>
      <dc:creator>AdamHP</dc:creator>
      <dc:date>2022-03-02T20:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469925#M771</link>
      <description>&lt;P&gt;Thank you for reply&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/209649"&gt;@AdamHP&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If TCP connection is not established, it seems it is failing during initial connection setup. Would it be possible to take packet capture on Panorama side:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CleECAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CleECAS&lt;/A&gt;&amp;nbsp;to see at what phase it is failing and whether any of the side is sending RST?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 21:55:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469925#M771</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-03-02T21:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469936#M772</link>
      <description>&lt;P&gt;Hello Pavel,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sample output of TCP dump is here(it is looping this same sequence all the time from what I saw in TCP dump)&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;23:08:44.614213 IP Firewall.54198 &amp;gt; Panorama.pan-panorama: Flags [S], seq 4083635727, win 29200, options [mss 1260,sackOK,TS val 4055216138 ecr 0,nop,wscale 7], length 0
23:08:44.614259 IP Panorama.pan-panorama &amp;gt; Firewall.54198: Flags [S.], seq 4178576975, ack 4083635728, win 24960, options [mss 1260,sackOK,TS val 2636905311 ecr 4055216138,nop,wscale 7], length 0
23:08:44.641051 IP Firewall.54198 &amp;gt; Panorama.pan-panorama: Flags [.], ack 1, win 229, options [nop,nop,TS val 4055216165 ecr 2636905311], length 0
23:08:44.641107 IP Firewall.54198 &amp;gt; Panorama.pan-panorama: Flags [R.], seq 1, ack 1, win 229, length 0
23:08:44.993054 IP Firewall.54204 &amp;gt; Panorama.pan-panorama: Flags [S], seq 177465872, win 29200, options [mss 1260,sackOK,TS val 4055216517 ecr 0,nop,wscale 7], length 0
23:08:44.993100 IP Panorama.pan-panorama &amp;gt; Firewall.54204: Flags [S.], seq 1639741662, ack 177465873, win 24960, options [mss 1260,sackOK,TS val 2636905690 ecr 4055216517,nop,wscale 7], length 0
23:08:45.018435 IP Firewall.54204 &amp;gt; Panorama.pan-panorama: Flags [.], ack 1, win 229, options [nop,nop,TS val 4055216543 ecr 2636905690], length 0
23:08:45.031530 IP Firewall.54204 &amp;gt; Panorama.pan-panorama: Flags [R.], seq 1, ack 1, win 229, length 0
&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 02 Mar 2022 22:32:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/469936#M772</guid>
      <dc:creator>AdamHP</dc:creator>
      <dc:date>2022-03-02T22:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470358#M780</link>
      <description>&lt;P&gt;Thank you for getting packet capture&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/209649"&gt;@AdamHP&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Based on packet capture, the Firewall is resetting the connection by setting RST flag. Based on all information that you supplied, I am not clear why this is happening. Would it be possible to look into logs on Firewall to see it can provide more details:&amp;nbsp;&lt;STRONG&gt;tail lines 1000 mp-log ms.log&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 00:57:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470358#M780</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-03-04T00:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470420#M784</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/209649"&gt;@AdamHP&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To be double sure that the firewall is the one sending the RST and not any intermediate device, I would take a simultaneous packet capture on Firewall and Panorama. An alternate way would be to compare the TTL value (in the IP Header) of the RST with the SYN packet (if both are sent from the same host, TTL will be the same).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 03:42:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470420#M784</guid>
      <dc:creator>ahandoo</dc:creator>
      <dc:date>2022-03-04T03:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470476#M785</link>
      <description>&lt;P&gt;Hi Pavel,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this look like the interesting part from this log as it is looping there.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;2022-03-04 09:35:18.328 +0100 COMM: connection established. sock=29 remote ip=PANORAMA_IP port=3978 local port=35712
2022-03-04 09:35:18.328 +0100 cms agent: Pre. send buffer limit=46080. s=29
2022-03-04 09:35:18.328 +0100 cms agent: Post. send buffer limit=425984. s=29
2022-03-04 09:35:18.328 +0100 Error:  cs_load_certs_ex(cs_common.c:654): keyfile not exists
2022-03-04 09:35:18.328 +0100 Error:  pan_cmsa_tcp_channel_setup(src_panos/cms_agent.c:876): cms agent: cs_load_certs_ex failed
2022-03-04 09:35:18.328 +0100 cmsa: client will use default context
2022-03-04 09:35:18.331 +0100 Error:  sc3_ca_exists(sc3_certs.c:221): SC3: Failed to get the current CA name.
2022-03-04 09:35:18.331 +0100 Warning:  sc3_init_sc3(sc3_utils.c:351): SC3: Failed to get the Current CC name
2022-03-04 09:35:18.331 +0100 SC3: CA: '', CC/CSR: '9469a205-8e13-46ed-879c-13d45a0ae772'
2022-03-04 09:35:18.332 +0100 Warning:  sc3_get_current_sc3(sc3_utils.c:179): SC3: failed to get SNI
2022-03-04 09:35:18.332 +0100 Warning:  sc3_get_current_sc3(sc3_utils.c:182): SC3: failed to get CCN
2022-03-04 09:35:18.341 +0100 Warning:  sc3_init_sctx(sc3_ctx.c:323): SC3: not set, skip cert loading
2022-03-04 09:35:18.341 +0100 SC3A: using SNI (from AK): 75220d86-f64a-4a64-b542-1b81b8cae893
2022-03-04 09:35:18.341 +0100 SC3A: using sc3 ctx with no cert
2022-03-04 09:35:18.342 +0100 Error:  pan_cmsa_tcp_channel_setup(src_panos/cms_agent.c:1196): panorama agent: SSL connect error. sock=29 err=5&lt;/LI-CODE&gt;
&lt;P&gt;It look like it can connect which is the traffic I can see in the Datacenter Firewall and the problem is with SSL?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2022 09:40:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470476#M785</guid>
      <dc:creator>AdamHP</dc:creator>
      <dc:date>2022-03-04T09:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470733#M787</link>
      <description>&lt;P&gt;Thank you for reply and getting logs&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/209649"&gt;@AdamHP&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Error 5 is&amp;nbsp;"SSL verification failure". Unless you configured mutual SSL authentication, only Panorama has to present a certificate:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/panorama/10-2/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates/how-are-ssltls-connections-mutually-authenticated.html" target="_blank"&gt;https://docs.paloaltonetworks.com/panorama/10-2/panorama-admin/set-up-panorama/set-up-authentication-using-custom-certificates/how-are-ssltls-connections-mutually-authenticated.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would it be possible one more time to check the certificate on Panorama? The certificate is self signed, however could you confirm: valid to, issuer, subject,...?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2022 22:36:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470733#M787</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-03-05T22:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470836#M789</link>
      <description>&lt;P&gt;Hi Pavel,&lt;/P&gt;
&lt;P&gt;if you mean cert on https port 3978, I am getting this.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AdamHP_0-1646646144612.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/39503i411839C9EEDDA857/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AdamHP_0-1646646144612.png" alt="AdamHP_0-1646646144612.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;It is issued to my panorama IP address.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 09:43:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/470836#M789</guid>
      <dc:creator>AdamHP</dc:creator>
      <dc:date>2022-03-07T09:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/472025#M793</link>
      <description>&lt;P&gt;Check under Monitor -&amp;gt; Session Browser under each firewall it flows through, even the source firewall.&lt;/P&gt;
&lt;P&gt;Had the same problem and it turns out Panorama traffic won't match a catch all, it must specifically be application Panorama.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 15:52:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/472025#M793</guid>
      <dc:creator>shaggy63</dc:creator>
      <dc:date>2022-03-10T15:52:03Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/472399#M796</link>
      <description>&lt;P&gt;Thank you all for help, it turns out that on source firewall PA-440 I allow traffic for Panorama Application on its default port 3978, but in firewall monitor I found that the flow is recognized as ssl on port 3978 and this was blocked.&amp;nbsp;&lt;BR /&gt;I was thinking that once there is Panorama app it will be match and didn't check this, but I was wrong. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;I had simmilar issue today on another firewall in Data Center where we had rule for WinRM (microsoft-remote-management), which was working fine before but now after some updates it is recognized as web-browsing on the WinRM port 5985.&lt;BR /&gt;So the solution is to not trust the Palo Alto application matching and always check the flows.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 16:31:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/472399#M796</guid>
      <dc:creator>AdamHP</dc:creator>
      <dc:date>2022-03-11T16:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/477057#M826</link>
      <description>&lt;P&gt;I have also PA-440 on 10.2 and Panorama on 10.2. And same issue, FW disconnecting. I think this is a bug with 10.2&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 22:09:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/477057#M826</guid>
      <dc:creator>AriKukkonen</dc:creator>
      <dc:date>2022-03-30T22:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/486930#M900</link>
      <description>&lt;P&gt;We recently experienced the same problem and only saw it on devices 10.1 and up. Last week or two we added devices that were 9.1.0-h3 and traffic matched on Panorama / SSL w/application default no problem. This week with 10.1 we had to add a specific match for SSL on service port 3978 to get them to connect.&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2022 00:18:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/486930#M900</guid>
      <dc:creator>JasonCoen</dc:creator>
      <dc:date>2022-05-13T00:18:31Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/488129#M909</link>
      <description>&lt;P&gt;I faced similar issue recently. Backup firewall looked disconnected on Panorama v10.2. And traffic should be flow over active firewall's IPsec. If you see "TCP session closed via injecting RST" on Palo Alto counter, try to change your security rule with any application and tcp/3978 on service and no security profile. I hope it will solve your problem. It was worked for me.&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2022 08:31:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/488129#M909</guid>
      <dc:creator>YEmreSeven</dc:creator>
      <dc:date>2022-05-18T08:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/510320#M1047</link>
      <description>&lt;P&gt;I had a similar issue although I am just using the MGMT interface to connect to Panorama. I had the problem on a PA-820 I got as an RMA, and also on Palo VMs. This problem is caused by the new Panorama Device Registration Auth Key. We're running PAN-OS 10.1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;.&lt;BR /&gt;&lt;STRONG&gt;tail follow yes mp-log ms.log&lt;/STRONG&gt;&amp;nbsp;on Panorama shows a bunch of SC3 errors like "keyfile not exists", "bad certificate", "Failed to get the current CA name", "Failed to get the Current CC name", "failed to get SNI", "failed to get CCN".&lt;/P&gt;
&lt;P style="line-height: 1.71429; font-family: Lato, 'Helvetica Neue', Helvetica, Arial, sans-serif;"&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;tcpdump filter "port 3978"&lt;/STRONG&gt; on the firewall followed by&amp;nbsp;&lt;STRONG&gt;view-pcap&lt;/STRONG&gt;&amp;nbsp;&lt;STRONG&gt;mgmt-pcap mgmt.pcap&lt;/STRONG&gt; shows the device communicating with Panorama but the device sends a RST.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;Our solution was to reset sc3.&lt;/P&gt;
&lt;P&gt;We had to do it both on the device and on Panorama to get things to work.&lt;/P&gt;
&lt;P&gt;Palo doesn't recommend doing it on Panorama but we couldn't get it working until we did that.&lt;/P&gt;
&lt;P&gt;.&lt;BR /&gt;Start by resetting sc3 on the device as shown in the three steps below.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;1. On the cli of the firewall&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show system info&lt;/STRONG&gt;&amp;nbsp; (copy the s/n for step 2)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;request sc3 reset&lt;/STRONG&gt;&amp;nbsp; &amp;nbsp;(reply &lt;STRONG&gt;y&lt;/STRONG&gt; to the prompt)&lt;BR /&gt;&lt;STRONG&gt;debug software restart process management-server&lt;/STRONG&gt;&lt;BR /&gt;(wait for the management-server process to come back up)&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;2. On Panorama cli:&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;clear device-status deviceid&lt;/STRONG&gt; &amp;lt;device s/n&amp;gt;&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;3. Reconnect to the firewall cli and do:&lt;BR /&gt;&lt;STRONG&gt;request authkey set&lt;/STRONG&gt; &amp;lt;authkey&amp;gt;&lt;BR /&gt;(the authkey is on Panorama, Panorama tab, on the left pane near the bottom, "Device Registration Auth Key". If no key appears, click Add to create a new one. (I just gave it a name and specfied 1 day lifetime.) Then copy/paste it into the command above.&lt;/P&gt;
&lt;P&gt;.&lt;/P&gt;
&lt;P&gt;It may take a minute or so and in some cases these steps may need to be done twice. But, if this does not work you may need to do the "&lt;STRONG&gt;request sc3 reset&lt;/STRONG&gt;" and "&lt;STRONG&gt;debug software restart management-server&lt;/STRONG&gt;" on Panorama (not recommended). Once the management-server process is back up, log into the Panorama UI,&amp;nbsp;delete any device reg auth key and generate a new one. Then repeat the 3 steps above using the new Device Auth Reg Key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 18:35:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/510320#M1047</guid>
      <dc:creator>alterioc</dc:creator>
      <dc:date>2022-07-29T18:35:36Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/512100#M1068</link>
      <description>&lt;P&gt;Thanks for your post.&amp;nbsp; I performed this similar fix on a firewall/Panorama and it resolved the issue.&amp;nbsp; I was seeing the SC3 and bad certificate errors as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 17 Aug 2022 12:14:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/512100#M1068</guid>
      <dc:creator>RonCarmack</dc:creator>
      <dc:date>2022-08-17T12:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall not connecting to Panorama</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/517064#M1132</link>
      <description>&lt;P&gt;did you find a fix for this issue? I am having the same issue&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2022 04:59:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/firewall-not-connecting-to-panorama/m-p/517064#M1132</guid>
      <dc:creator>walter2020</dc:creator>
      <dc:date>2022-10-07T04:59:25Z</dc:date>
    </item>
  </channel>
</rss>

