<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues and Observations Upgrading to PAN-OS 7.1.7 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/142795#M48595</link>
    <description>&lt;P&gt;Thanks for the responses, it is greatly appreciated. The update URLs were in place from a previous firewall engineer. I am glad that was such an easy fix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As to the fourth point, yeah, that was a total miss on my part with regard to the change. But, I still wanted to get the info out there regarding the SQL Cluster behavior, in that the traffic classifies the same, but the ports will be different. Thanks again-&lt;/P&gt;</description>
    <pubDate>Mon, 13 Feb 2017 23:01:37 GMT</pubDate>
    <dc:creator>Scott_Sadlocha</dc:creator>
    <dc:date>2017-02-13T23:01:37Z</dc:date>
    <item>
      <title>Issues and Observations Upgrading to PAN-OS 7.1.7</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/141045#M48332</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;We are in the process of upgrading our firewalls to PAN-OS 7.1.7, and have come across a number of issues and oddities, and figured&lt;BR /&gt;it would be a good idea to create a community post to document them so that they might be a reference for others. Some items to note&lt;BR /&gt;follow.&lt;/P&gt;&lt;P&gt;We don't have a large firewall environment, only about 10 devices total. Most of our devices are 3000 series devices, with the&lt;BR /&gt;exception of one smaller PA-500. We are upgrading from 7.0.5-h2 to 7.1.7.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. The first issue had to do with the download of the pertinent files. On every firewall, I had to download two files twice due to a&lt;BR /&gt;strange issue. I would download 7.1.0 to the firewall and it would complete successfully. I would then download 7.1.7, and it would&lt;BR /&gt;fail, indicating that the base file (7.1.0) needed to be downloaded first. I would then refresh the Software screen, and all of a&lt;BR /&gt;sudden, 7.1.0 would be gone. I would then go through the process again, downloading 7.1.0 and then 7.1.7, and it would work the&lt;BR /&gt;second time. No other admins were working on the firewalls or anything else that might overwrite my work. I had to do this on every&lt;BR /&gt;firewall and the behavior was the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. The second issue has to do with a firewalls terminating either end of a DR tunnel. We have an ipsec tunnel to an offsite location.&lt;BR /&gt;The offsite location has 2 firewalls, one of which has been upgraded successfully (it does not terminate the tunnel). If I upgrade&lt;BR /&gt;the firewall on the far end of the tunnel, both of those firewalls stop communicating to Panorama. If I upgrade the firewall on the&lt;BR /&gt;near end of the tunnel, it communicates to Panorama, but both of the firewalls at the offsite location stop communicating to&lt;BR /&gt;Panorama. I have tried this several times, and end up having to downgrade each time. All other traffic traverses the tunnel! I can&lt;BR /&gt;log into the firewalls at the remote location, and all traffic is fine. The logs even show the traffic passing, with no blocks.&lt;BR /&gt;However, they show Disconnected in Panorama. I currently have a support case open on this issue, but so far, no luck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. The third issue had to do with Wildfire updates. As soon as the upgrade finishes on a Wildfire enabled firewall, Wildfire updates&lt;BR /&gt;started failing. They would download, but the install would fail. I could go to the PA support site, download the file to my&lt;BR /&gt;computer, and then install from file on the firewall, and Wildfire would update. However, any subsequent Wildfire content updates&lt;BR /&gt;would only download but not install. After troubleshooting and then finding an old forum post that indicated I might have to reinstall the OS, I opened a ticket with support. I got some tips and tried deleting content updates via CLI and several other things, but had no luck. Eventually, another community member posted that they had this issue and resolved it by changing the Update Server info. I changed our update server from staticupdates.paloaltonetworks.com to updates.paloaltonetworks.com and it resolved the issue for us! I would never guess something so simple would be the fix. Since the files were downloading and not installing, I had concentrated my efforts on the firewalls and not the download location. It seems that staticupdates.paloaltonetworks.com is serving up incorrect files or it may be something else I am not aware of.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. The fourth issue had to do with traffic blocks. Immediately after upgrade, we had mssql traffic getting blocked, even though the traffic did not change, and we had made no changes to the rules. After talking to support, we found that the way application-default is handled changed with 7.1. While this is documented, it can be a bit tricky. Any rule that uses an application of Any, will now enforce application-default ports. Our mssql rule was like this. The mssql traffic in the application description shows default ports of 1433/1434. However, if your MS SQL environment uses a cluster, those default ports will be different. The traffic will still classify as mssql, but will use ports in the 54000 range. This immediately caused issues with our traffic, though it wasn't showing as blocked in the firewall logs. It was very strange. Once I switched the port to "Any", it immediately started working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Well, there goes our major issues so far. We have seen some minor issues as well, but those haven't been too bad. These include column and log settings in the GUI not being retained, and a couple others. I have to say, after having no issues on previous upgrades, I may have been spoiled, but this is the most problematic upgrade I have had yet on Palo Alto firewalls. I am hoping to get the remaining two firewalls terminating the ipsec tunnel upgraded at some point, once I figure out what the problem is. In my last go-round, I took tech support package files before and after the upgrade, so I am hoping these offer some clue. I am hoping this info helps someone.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 21:00:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/141045#M48332</guid>
      <dc:creator>Scott_Sadlocha</dc:creator>
      <dc:date>2017-02-03T21:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Issues and Observations Upgrading to PAN-OS 7.1.7</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/141114#M48337</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cannot comment much on first 2 strange issues,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) For me its always should be FQDNs as below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="UP.PNG" style="width: 785px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/7635i498EFDE549B576C2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="UP.PNG" alt="UP.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;4) Expected behaviour as per article below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Articles/PAN-OS-7-1-Policy-behavior-change-application-default/ta-p/75664" target="_blank"&gt;https://live.paloaltonetworks.com/t5/PAN-OS-7-1-Articles/PAN-OS-7-1-Policy-behavior-change-application-default/ta-p/75664&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2017 10:57:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/141114#M48337</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-02-04T10:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Issues and Observations Upgrading to PAN-OS 7.1.7</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/141124#M48345</link>
      <description>&lt;P&gt;Same as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;; I've never seen anyone use staticupdates.paloaltonetworks.com, I've only ever seen it as update.paloaltonetworks.com or downloads.paloaltonetworks.com. Was this something that support did at one time for troubleshooting?&lt;/P&gt;&lt;P&gt;Again 4 is very much expected behavior and PAN did a pretty good job of trying to get the message across via the release notes, emails sent out on 7.1s release, and a few articles on here about the change. Unfortunately I'm not sure how they would accomplish getting the word out any better.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Feb 2017 13:36:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/141124#M48345</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-02-04T13:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: Issues and Observations Upgrading to PAN-OS 7.1.7</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/142795#M48595</link>
      <description>&lt;P&gt;Thanks for the responses, it is greatly appreciated. The update URLs were in place from a previous firewall engineer. I am glad that was such an easy fix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As to the fourth point, yeah, that was a total miss on my part with regard to the change. But, I still wanted to get the info out there regarding the SQL Cluster behavior, in that the traffic classifies the same, but the ports will be different. Thanks again-&lt;/P&gt;</description>
      <pubDate>Mon, 13 Feb 2017 23:01:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-and-observations-upgrading-to-pan-os-7-1-7/m-p/142795#M48595</guid>
      <dc:creator>Scott_Sadlocha</dc:creator>
      <dc:date>2017-02-13T23:01:37Z</dc:date>
    </item>
  </channel>
</rss>

