<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall upgrades guidance in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/451499#M101165</link>
    <description>&lt;P&gt;Totally agreed…&lt;/P&gt;</description>
    <pubDate>Mon, 06 Dec 2021 08:55:12 GMT</pubDate>
    <dc:creator>d.spider</dc:creator>
    <dc:date>2021-12-06T08:55:12Z</dc:date>
    <item>
      <title>Firewall upgrades guidance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/450822#M101087</link>
      <description>&lt;OL&gt;&lt;LI&gt;Hello we have a customer with central location acting as Datacenter with PA 3000 series. The panorama also stays in same DC.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the other locations worldwide are connected to central DC over IPSEC tunnels.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of the firewalls running at remote sites are having 8.x version.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to upgrade all of them to 10.x . I checked hardware wise all models support 10.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some are Active active&amp;nbsp; and some are Active passive&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have to upgrade those firewalls over IPSEC. Our worry is&amp;nbsp; to plan so that tunnel always remain up .&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;Can anyone provide guidelines as we don't have a backdoor path to connect in case IPSEC does not come up .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Our DC firewalls are 9.1.11.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Or is it recommended to have local H&amp;amp;E support for each location ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 05:02:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/450822#M101087</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2021-12-02T05:02:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrades guidance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/450914#M101091</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133520"&gt;@FWPalolearner&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you have your firewalls in HA, then you can do the HA failover before upgrading any instance. Before upgrading HA pair, make sure Preemption is disabled on both firewalls which will avoid unexpected HA failovers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once failover is done, you can verify if gateway that is in passive state is accessible without any issues. If it is set then you can upgrade same. Once upgrade for passive firewall is done and it is stabilized, then you can failover all the traffic to this firewall to proceed for upgrading other firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Now when you are not local on the site and planning upgrade remotely, it is best practice to have local person at the site or have OOB/Console management connectivity to the firewalls. Otherwise you need to make sure you have access to the firewalls remotely all the time during upgrade.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So when you do not have either of the above said options, you need to have pre-upgrade checklist which will ensure HA failover is working as expected and you are able to connect to the firewalls post failover as you are accessing those firewalls via tunnel which is on the same firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;In case IPSEC goes down then you will not get access to the devices. So it’s better to have someone at site who will provide you console access.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can refer below KB article on Best Practices for PAN-OS Upgrade.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRrCAK#anchor4" target="_blank" rel="noopener"&gt;Ref. KB article&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;P.S. – One of my friend have also gone through the same situation where site was new and devices were connected. He wanted to connect that site over the IPSEC tunnel with main DC. At that time, he had managed to established management connectivity over the internet with restricting access to his specific source public IP only. So with this, without IPSEC tunnel, firewall was accessible using public IP for time being.&lt;FONT color="#FF0000"&gt; I don’t see this as a best practice but I just recalled this incident when saw your post. &lt;STRONG&gt;Again, I&amp;nbsp;would recommend you to have someone at site to give you console access.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 11:15:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/450914#M101091</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2021-12-02T11:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrades guidance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/450981#M101101</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/132521"&gt;@SutareMayur&lt;/a&gt;&amp;nbsp; very well explained ;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Glad to have people like you in the community .&lt;/P&gt;</description>
      <pubDate>Thu, 02 Dec 2021 15:38:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/450981#M101101</guid>
      <dc:creator>FWPalolearner</dc:creator>
      <dc:date>2021-12-02T15:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrades guidance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/451498#M101164</link>
      <description>&lt;P&gt;This is helpful to me also. Thank for sharing detailed thoughts.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 08:54:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/451498#M101164</guid>
      <dc:creator>d.spider</dc:creator>
      <dc:date>2021-12-06T08:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall upgrades guidance</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/451499#M101165</link>
      <description>&lt;P&gt;Totally agreed…&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 08:55:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-upgrades-guidance/m-p/451499#M101165</guid>
      <dc:creator>d.spider</dc:creator>
      <dc:date>2021-12-06T08:55:12Z</dc:date>
    </item>
  </channel>
</rss>

