Paloalto firewall upgrade procedure from any version. we live in a time where keeping your devices up to date is very essential for network security. In this article, we will demonstrate how to upgrade a Paloalto firewall to the latest version.
Pre-Upgrade activities
STEP 1 – Save a backup of the current configuration file (Take a backup of the configuration from both HA Peers)
Perform these steps on each firewall in the pair:
- Select Device > Setup Operations and click save named configuration snapshot (optional) or go to step 2
- Select Device > Setup > Operations and click Export named configuration snapshot.
- Select the XML file that contains your running configuration (for example, running-config.xml) and click OK to export the configuration file.
- Save the exported file to a location external to the firewall. You can use this backup to restore the configuration if you have problems with the upgrade.
- Select Device > Setup > Operations > Export Device State (For devices that are managed from panorama
STEP 2 – Verify HA Settings
- Priorities are set properly: Device > high-availability > Election Settings > Device priority
(Make sure active device has lower priority value)
- Verify Preemptive is disabled: Device > high-availability > Election Settings > Preemptive is unchecked
(This is to verify there is no sudden role change)
STEP 3 – Make sure each device running Content Release version 401 or later.
- Select Device > Dynamic Updates.
- Check the Applications and Threats or Applications section to determine what update is currently running.
- If the firewall is not running the required update or later, click Check Now to retrieve a list of available updates.
- Locate the desired update and click Download.
- After the download completes, click Install.
STEP 4 – Verify all are in sync (apps & threats, url db & running configs are in sync )
This can be done from the Firewall dashboard GUI-> High Availability
FW UPGRADE STEPS FROM PANORAMA
STEP 1 – Upgrade FW B (Standby/Passive) fw & Reboot – Upgrade to 7.0.19 (Usually Node B but Please check and see which node is Passive)
Login to Panorama and then go to the Secondary B Firewall that will be upgraded and do the following:
- Go to Device – Software
- Click Check Now to check for the latest updates.
- Locate the base and Target versions you want to upgrade to (7.0.1) and (7.0.19) then click Download for both.
- After the downloads complete, click Install on (7.0.19)
- After the install completes, reboot using one of the following methods:
- If you are prompted to reboot, click Yes.
- If you are not prompted to reboot, select Device > Setup > Operations and click Reboot Device in the Device Operations section. After the reboot, the device will not be functional until the active/active-primary device is suspended.
- Switch back to Panorama to check firewall reboot status by going to Panorama->Managed Devices-> look for your Firewall for status (If connected and what version its on)
STEP 2 – Make FW B active & A passive (Suspend FW A)
Fail traffic over from FW A to FW B and check traffic on B – Suspend the Primary firewall usually Node A (Here secondary fw will take over and be active so check traffic on the upgraded fw and Primary fw is passive ready for upgrade)
- Login FW A from Panorama, select Device > High Availability > Operational Commands.
- Click Suspend local device.
- Select the Dashboard and verify that the state of the passive device changes to active in the High Availability widget.
- Verify that the firewall that took over as active or active-primary (Secondary fw) is passing traffic by selecting Monitor > Session Browser.
- Revert the suspended mode on this firewall back to functional – Device-> high availability-> operational command-> Make device functional (now it will show suspend local device)
STEP 3 – Upgrade FW A (standby) fw & Reboot – Upgrade to 7.X.XX
- Go to Device – Software
- Click Check Now to check for the latest updates.
- Locate the base and Target versions you want to upgrade to (7.0.1) and (7.0.19) then click Download for both.
- After the downloads complete, click Install on (7.0.19)
- After the install completes, reboot using one of the following methods:
- If you are prompted to reboot, click Yes.
- If you are not prompted to reboot, select Device > Setup > Operations and click Reboot Device in the Device Operations section. After the reboot, the device will not be functional until the active (or active-primary) device is suspended.
- Switch back to Panorama to check firewall reboot status by going to Panorama->Managed Devices-> look for your Firewall for status. (If connected and what version its on)
STEP 4 – Make FW A active & B passive – (Suspend FW B)
Fail-over from FW B firewall to FW A (Suspend FW B) and check traffic on FW A
- Login FW B from Panorama, select Device > High Availability > Operational Commands.
- Click Suspend local device.
- Select Dashboard and verify that the state of the passive device changes to active in the High Availability widget.
- Login FW A & Verify that the firewall that took over as active or active-primary is passing traffic by selecting Monitor > Session Browser.
- Revert the suspended mode on this firewall back to functional – Device-> high availability-> operational command-> Make device functional (now it will show suspend local device)
STEP 5 – Upgrade FW B (standby) & Reboot – Upgrade to 7.1.14
- Go to Device – Software
- Click Check Now to check for the latest updates.
- Locate the base and Target versions you want to upgrade to (7.1.0) and (7.1.14) then click Download for both.
- After the download completes, click Install on (7.1.14).
- After the install completes, reboot using one of the following methods:
- If you are prompted to reboot, click Yes.
- If you are not prompted to reboot, select Device > Setup > Operations and click Reboot Device in the Device Operations section. After the reboot, the device will not be functional until the active (or active-primary) device is suspended.
- Switch back to Panorama to check firewall reboot status by going to Panorama->Managed Devices-> look for your Firewall for status. (If connected and what version it’s on)
STEP 6 – Make FW B active & A passive (Suspend FW A)
Fail traffic over from FW A to FW B and check traffic on B – Suspend the FW A.
- Login FW A from Panorama, select Device > High Availability > Operational Commands.
- Click Suspend local device.
- Select Dashboard and verify that the state of the passive device changes to active in the High Availability widget.
- Verify that the firewall that took over as active or active-primary (Secondary fw) is passing traffic by selecting Monitor > Session Browser.
STEP 7 – Upgrade FW A (Standby) & Reboot – Upgrade to 7.1.14
- Go to Device – Software
- Click Check Now to check for the latest updates.
- Locate the base and Target versions you want to upgrade to (7.1.0) and (7.1.14) then click Download for both.
- After the downloads complete, click Install on (7.1.14)
- After the install completes, reboot using one of the following methods:
- If you are prompted to reboot, click Yes.
- If you are not prompted to reboot, select Device > Setup > Operations and click Reboot Device in the Device Operations section. After the reboot, the device will not be functional until the active (or active-primary) device is suspended.
- Switch back to Panorama to check firewall reboot status by going to Panorama->Managed Devices-> look for your Firewall for status. (If connected and what version its on)
- If you configured the firewall to temporarily allow non-syn-tcp traffic in order to enable the firewall to rebuild the session table, revert back by running
Configure
set deviceconfig setting session tcp-reject-non-syn yes
commit
STEP 8 – Make FW A active & B passive – (Suspend FW B)
Fail-over from FW B firewall to FW A (Suspend FW B) and check traffic on FW A
- Login FW B from Panorama, select Device > High Availability > Operational Commands.
- Click Suspend local device.
- Select Dashboard and verify that the state of the passive device changes to active in the High Availability widget.
- Login FW A & Verify that the firewall that took over as active or active-primary is passing traffic by selecting Monitor > Session Browser.
- Revert the suspended mode on this firewall back to functional – Device-> high availability-> operational command-> Make device functional (now it will show suspend local device)
Post-Upgrade activities
STEP 1 – Verify that the devices are passing traffic as expected.
- (Active device(s) only) To verify that the upgrade succeeded and that active devices are passing traffic, run show session all , also from CLI can do-> show session info
- Go to the Monitor Tab and check for Live traffic-> session browser
- Check HA status and that all is synced.
Thanks for the article, it was really helpful