Palo Alto Firewall failed to Synchronize HA Peer

Situation: After configuring third party certificate on a Palo Alto Firewall HA, the client has a problem to Synchronize HA Peer,

Resolution 1: Export Certificate from the Active unit and import it into the Passive unit. Go to Device>Certificate Management>Certificates. Highlight the certificate and click the Export Certificate.

Resolution 2: If you can’t sync and Peer unit has been changed for some reasons, you may want to Revert to last Saved confirmation on Perr unit.

Resolution 3: You can also Export named configuration snapshot on Active unit and import it on Passive unit.

PA Support sumery.

1. We discussed the issue, which is about the issue HA pair out of sync.
2. We checked that the passive firewall is out of sync.
3. We tried to sync but as it’s due to a certificate we could not sync it.
4. We exported the certificate from the active firewall using the passphrase.
5. We then imported the certificate into the passive firewall using the passphrase.
6. We then checked the firewall which was out of sync.
7. We then tried to sync but were not syncing.
8. We tried with management restart but could not sync again.
9. We then took the Active firewall running configuration.
10. We then imported and loaded the running configuration of the active firewall in passive.
11. We then did the commit after that we can see that the HA pair are in sync.

 

 

 

Palo Alto Firewall: Other Administrators are holding device wide commit locks

Situation: When attempting to Synchronize in PA High Availability on PA Firewall, you may receive this message: Other Administrators are holding device wide commit locks.

Resolution 1: Click Locks icon to Remove the Lock. If you don’t see any one in the Locks, please check it on the Passive unit.

Resolution 2: You may run these command:

You can check to see the admins who have a commit lock via the UI or CLI:

> show commit-locks

Commit locks are designed to prevent any other logged in admins (even other superusers) from doing a commit until the lock is released. If you’re a superuser, and you see commit locks from the CLI command above, you can clear them with:

> request commit-lock remove

Self-assigned certificate for Paloalto Firewall VPN doesn’t work

Situation: The client just created a new self-assigned certificate for Paloalto Firewall VPN. But it doesn’t work.

Troubleshooting: You need to add the new certificate to Gloableprotect Portals. Go to Network>GloableProtect>Portals>

Select the VPN portal. Go to Agent.

Click Add under Trusted Root CA and then add the self-assigned certificate.

It looks like this.

New Certificate doesn’t work on Paloalto Firewall

Situation: The client has been using self-assigned certificate. They just imported third party certificate.

However, it doesn’t work. It still shows using self-assigned certificate.

Troubleshooting: You need to add the new certificate to SSL/TLS Service Profile. SSL/TLS Service Profile>SSL Profile.

In Certificate select the new certificate you just imported.

It should look like this:

PA  Support summery

1. We discussed the issue, which is about the issue of importing the certificate into the passive firewall.
2. We checked that the passive firewall is out of sync.
3. We tried to sync but as it’s due to a certificate we could not sync it.
4. We exported the certificate from the active firewall using the passphrase.
5. We then imported the certificate into the passive firewall using the passphrase.
6. We then checked the firewall which was out of sync.
7. We then tried to sync but were not syncing.
8. We tried with management restart but could not sync again.
9. We then took the Active firewall running configuration.
10. We then imported and loaded the running configuration of the active firewall in passive.
11. We then did the commit after that we can see that the HA pair are in sync.

 

Can’t take over ownership with ‘Failed to enumerate objects in the container. Access is denied’

Situation: The client is running Windows server 2019. When he tries to take over owner on one of the folders with “Replace all child object permissions entries with inheritable permission entries from this object.’ option checked, he gets this message: ‘Failed to enumerate objects in the container. Access is denied’

Resolution 1: Use takeown command, for example

takeown /f * /r /d y

  • means all folders and Fiels in the current directory. To see more options, run this command: takeown /?

Resolution 2: propagate the owner

propagate the owner, then close out of ALL dialogs, before you propagate the actual permissions.

I can’t really say how it got messed up, but this should fix it.  These steps are a bit involved, but just take it step-by-step (some users print them and mark off what step they’ve done).  If you get stuck, just let me know what step you’re on.

  1. Press Windows+R to show the Run box.
  2. Type (or copy/paste)  %userprofile% (including the percent signs) into the box and hit OK to open your user profile folder.
  3. Right-click the Documents folder and go to Properties.
  4. On the Security tab, click Advanced.
  5. At the top, make sure the “owner” is set to your account.  If it already is, please skip to step 6.
    • If the owner is not you, click Change.
    • Click Advanced
    • Click Find Now
    • Select (highlight) your account in the list (it may be a name or email address depending on your setup), then click OK to close the search box.
    • Click OK again to close the “select a user” box.
    • Turn ON checkbox for “replace owner on subcontainers and objects” (this makes sure you are the owner for everything under your documents folder also).
    • After the checkbox is on, click OK close the “advanced security” box.
    • Click OK again to close the Documents Properties box.  At this point, you should be back where you were after step 2 when you opened the User Profile folder.
    • Right-click the Documents folder again, and go back to properties,
    •  On the Security tab, click Advanced, then continue with step 6 below.
  6. Click “Add”
  7. Click “Select a principal”
  8. Click Advanced
  9. Click Find Now
  10. Select (highlight) your account in the list (it may be a name or email address depending on your setup), then click OK to close the search box.
  11. Click OK again to close the “select a user” box
  12. Turn on “Full Control” checkbox.
  13. Click OK to close the Permission Entry box.
  14. Click OK again to close the “Advanced Security” box.
  15. Click OK again to close the Documents Properties box.  At this point, you should be back to where you were after step 2 when you opened the User Profile folder.

Note: We find we need to run takeown /f * /r /d y on each level of the folder or each subfolders.