03-26-2015 05:37 AM
I have opened this with TAC a while ago but I continue having issues with Layer 3 not passing through the untrust/internet interface at random times. I have had this happen 5 to 10 times on different PA-200's. Some have repeated. I was hoping a firmware upgrade to 6.1.3 would finally fix this but yesterday one of my first 6.1.3 units locked up. Layer 2 is fine. I look in my router and the ARP entry for the PAN is in there. I clear ARP table and it repopulates with MAC/IP as the PAN responds correctly.
Rebooting the router doesn't do anything for the PAN to pass Layer 3 again. The only way to get PAN to pass Layer 3 again is a reboot of the PAN itself. We are running LSVPN on all spoke sites for VPN and the only curveball is that my hubs are on older 6.0.5h3 code. Just throwing this out there for discussion in case others have seen it.
03-30-2015 10:51 AM
Hi
I had same issue like You, but more often I have issue related to out os system resources on my PA200. In my case its started on 11.2014 when I moved to 6.1.0 and after on 6.1.1 and 6.1.2
Now I'm on 6.1.3 since 2 two days. Is too early to tell is something changed.
According to support this issue will be fixed in 6.1.4 (I have case opened for this bug)
Regards
SLawek
04-08-2015 02:29 PM
hi dusk2dusk
Do you mind posting more details regarding instability on 6.1.2? We are planning to go from 6.0.3 to 6.1.2, may be 6.1.3, but not sure how stable these two have been so far.
what model of firewall are you using?
Thanks
04-08-2015 04:26 PM
Specifically, we use GlobalProtect LSVPN to connect all 55 current remote sites, going to 70 shortly. Under 6.1.2 on remote sites and 6.0.5h3 at hubs in datacenter we would see intermittent issues where routes to remote sites are not installed in RIB on the hub so tunnel is declared active on both sides but no traffic passing between remote and hub. Also, on satellite remote sites we would see dataplane full lockup on layer 3. So no routing of traffic until reboot of dataplane or entire firewall on remote sites. Layer 2 and management are fine but that's not worth much. .
6.1.3 on hubs and remote sites seems a great combination so far after the past week. If you're considering 6.1.2 I would say either hold off or go to 6.1.3. The "gold standard" is currently 6.0.8 but with LSVPN and versions we had already in production 6.1.3 was the right choice. I'd say at this point at least 90% improvement over prior versions of code with 6.1.3.
04-08-2015 04:29 PM
Thank you very much; we are not using VPNs, yet, on PaloAlto devices.
04-08-2015 04:33 PM
I would say that the typical manual IPsec VPNs tend to work fine without issue so it is limited to GlobalProtect prior to 6.1.3 but at this point we're solid on this version.
Keep in mind that there are A LOT of bug fixes in 6.1.3 over 6.1.2 and I would scour the list to make sure whatever way you are utilizing the PANs you are checking off the list in 6.1.3 in case there's a bug.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!