<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Replacing HA Hardware in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1238002#M125137</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/272386"&gt;@ademo-user25&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To me your approach looks good. If you do not mind setting up new Firewall pair with new management interface IP addresses (The rest of the configuration can be identical with original Firewalls), you could save time during cut over on initial tasks like downloading licenses and forming HA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, you might have to clear ARP records in your Layer 3 switches during cut over to new Firewalls. This scenario would come when GARP does not work to update ARP entries with new IP/MAC mapping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Sep 2025 22:56:17 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2025-09-15T22:56:17Z</dc:date>
    <item>
      <title>Replacing HA Hardware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1237901#M125115</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;I need to replace 3220 in HA to 1420 in HA.&lt;/P&gt;
&lt;P&gt;- The 3220 running 11.1.3-h3&lt;/P&gt;
&lt;P&gt;- I installed 11.1.3-h3 on the new 1420s.&lt;/P&gt;
&lt;P&gt;- Installed the same version of the apps and threats.&lt;/P&gt;
&lt;P&gt;- exported the running config from the 3220&lt;/P&gt;
&lt;P&gt;- imported the config to the 1420 and ran a commit.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I read that i cannot run the HA with different platforms. Is there a way to do a 0 downtime or only hard cutover to the new HA?&lt;/P&gt;</description>
      <pubDate>Sat, 13 Sep 2025 19:28:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1237901#M125115</guid>
      <dc:creator>ademo-user25</dc:creator>
      <dc:date>2025-09-13T19:28:02Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing HA Hardware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1237909#M125118</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/272386"&gt;@ademo-user25&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To form HA both Firewalls must be the same HW models:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/high-availability/set-up-activepassive-ha/prerequisites-for-activepassive-ha" target="_self"&gt;Prerequisites for Active/Passive HA&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have done Data Center Firewall migration before with minimal downtime. Could you please refer to this thread:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/panorama-discussions/palo-alto-5020-migrate-to-5220-from-panorama/td-p/487516" target="_self"&gt;PALO ALTO 5020 migrate to 5220 from Panorama?&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can skip points No.1 and 2. Also, if you can include more details about your environment it would make it easier and more accurate to answer you.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Sep 2025 07:14:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1237909#M125118</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2025-09-14T07:14:16Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing HA Hardware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1237913#M125119</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;Thanks for the reply.&lt;/P&gt;
&lt;P&gt;We have very simple configuration of 2 firewalls in HA. We want to keep the same configuration, IP etc. just with the new hardware.&lt;/P&gt;
&lt;P&gt;No Panorama.&lt;/P&gt;
&lt;P&gt;We mounted the new firewalls next to the old firewalls.&lt;/P&gt;
&lt;P&gt;I've done it on other firewalls but this is the first time i replace palo alto hardware so i am not sure what behavior to expect.&lt;/P&gt;
&lt;P&gt;my plan is:&lt;/P&gt;
&lt;P&gt;1. disable preemptive&lt;/P&gt;
&lt;P&gt;2. move cables from old firewall2 to new firewall2: i am expecting the firewall to be able to see each other but not be a working HA&lt;/P&gt;
&lt;P&gt;3. allow new firewall2 to download and activate license from license center.&lt;/P&gt;
&lt;P&gt;3. make new firewall2 active. i am expecting to be able to just click for a failover but will disconnect old firewall1 if not.&lt;/P&gt;
&lt;P&gt;4. after sanity tests, move cables from old firewall1 to new firewall1.&lt;/P&gt;
&lt;P&gt;5. allow new firewall1 to download and activate license from license center.&lt;/P&gt;
&lt;P&gt;6. at this point im expecting to see a healthy ha pair.&lt;/P&gt;
&lt;P&gt;7. failover to new firewall1&lt;/P&gt;
&lt;P&gt;8. run sanity tests&lt;/P&gt;
&lt;P&gt;9. reactivate preemptive.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This way i am hoping to have no downtime during the replacement.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Sep 2025 09:47:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1237913#M125119</guid>
      <dc:creator>ademo-user25</dc:creator>
      <dc:date>2025-09-14T09:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: Replacing HA Hardware</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1238002#M125137</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/272386"&gt;@ademo-user25&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To me your approach looks good. If you do not mind setting up new Firewall pair with new management interface IP addresses (The rest of the configuration can be identical with original Firewalls), you could save time during cut over on initial tasks like downloading licenses and forming HA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, you might have to clear ARP records in your Layer 3 switches during cut over to new Firewalls. This scenario would come when GARP does not work to update ARP entries with new IP/MAC mapping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Sep 2025 22:56:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/replacing-ha-hardware/m-p/1238002#M125137</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2025-09-15T22:56:17Z</dc:date>
    </item>
  </channel>
</rss>

