<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197997#M58816</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/49049"&gt;@BrianRa&lt;/a&gt;&amp;nbsp;thanks for that information, I'll definitely move to 7.1.15 first.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Out of curiousity, what security bug did they reocmmend moving to 8.0.7 for?&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jan 2018 19:06:06 GMT</pubDate>
    <dc:creator>jsalmans</dc:creator>
    <dc:date>2018-01-31T19:06:06Z</dc:date>
    <item>
      <title>Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197729#M58763</link>
      <description>&lt;P&gt;Greetings all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Title pretty much says it all but we're wanting to move to 8.0.6 since it is a Palo Alto support recommended version.&amp;nbsp; We're currently running 7.1.4 I believe with both of our active/active firewalls.&amp;nbsp; Panorama is already on the 8.0.x track.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My normal update procedure is to apply the update to one firewall, let it reboot and come back online and start passing traffic and then do the same to the other one.&amp;nbsp; Usually only results in 5 to 10 seconds of dropped traffic when each firewall goes down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I figured there is probably no difference in the actual upgrade procedure but I wanted to check to see if anyone has run into any gotchas or any settings that need to be modified once the new version is online that might result in a longer outage otherwise?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2018 22:33:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197729#M58763</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2018-01-30T22:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197743#M58765</link>
      <description>&lt;P&gt;I don't have a lot to add but we looked into this as well as we are A/P with ours HA pair.&amp;nbsp; The firewalls in 7.1.x and 8.0.x will still synchronize after one is upgraded and rebooted, anything older (7.0.x etc) will not synchronize.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2018 23:37:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197743#M58765</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-01-30T23:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197965#M58800</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39461"&gt;@jsalmans&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I would recommend following the&amp;nbsp;recommendation detailed in this document &lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/newfeaturesguide/upgrade-to-pan-os-80/upgrade-the-firewall-to-pan-os-80/upgrade-an-ha-firewall-pair-to-pan-os-80#idab14f5f2-f662-4e5c-ba5b-2cc35993e2ec" target="_blank"&gt;HERE&lt;/A&gt;. Also keep in mind that 8.0 does some interesting things with the logs, so that takes a few&amp;nbsp;minutes to get everything working correctly.&lt;/P&gt;&lt;P&gt;Keep in mind that the upgrade procedure best practices recently changed later last year to the following.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Old Method:&lt;/P&gt;&lt;P&gt;Upgrading to a new major version for another with maintenance releases already available was simply to download the base image&amp;nbsp;&lt;EM&gt;and&lt;/EM&gt; the maintenance release, and only install the maintenance release.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;New Method:&lt;/P&gt;&lt;P&gt;Upgrade to the latest maintenance release within your current major version; then install the base 8.0.0 and restart before proceeding to 8.0.6.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why:&lt;/P&gt;&lt;P&gt;The old method worked perfectly fine because the firewall is able to explode the base image&amp;nbsp;&lt;EM&gt;and&lt;/EM&gt; the maintenance image installer packages to pick apart all of the pieces and parts required to form an installer image for a direct upgrade to 8.0.6. However with the larger file sizes of the new releases PA started to see some issues with firewalls with limit storage, primarly the PA-200/220, PA-500, PA-2000, and the PA-4000.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your not running an effected platform and you&amp;nbsp;&lt;STRONG&gt;know&lt;/STRONG&gt; that you have plenty of system space to explode the images you&amp;nbsp;&lt;EM&gt;can&lt;/EM&gt; still use the old upgrade recommendation to keep downtime to a minimal. Just know that you wouldn't be following the best practices as recommended and it can cause issues if you don't actually have the disk space required to perform this action.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 16:37:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197965#M58800</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-01-31T16:37:25Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197992#M58815</link>
      <description>&lt;P&gt;Another note.&amp;nbsp; We upgraded our Panorama to 8.0.7 and did not&amp;nbsp; have any problems.&amp;nbsp; We did this based on a security release that was fixed in 8.0.7 and was recommended by our SEs.&lt;BR /&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os-release-notes/pan-os-8-0-7-addressed-issues#_49938" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os-release-notes/pan-os-8-0-7-addressed-issues#_49938&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Another thing we are finding out right now based on a support ticket is that from our current 7.1.10 there is a bug going to 8.0.x that Panorama will blow out the VPN configurations unless your firewalls are on 7.1.15.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 18:49:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197992#M58815</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-01-31T18:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197997#M58816</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/49049"&gt;@BrianRa&lt;/a&gt;&amp;nbsp;thanks for that information, I'll definitely move to 7.1.15 first.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Out of curiousity, what security bug did they reocmmend moving to 8.0.7 for?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 19:06:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197997#M58816</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2018-01-31T19:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197999#M58817</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;thanks for the info.&amp;nbsp; Panorama is already at 8.0.6 and we switched it to the new logging.&amp;nbsp; Does anything have to be done on the firewalls themselves for the logging change or does it do it automatically?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My current plan for upgrading is:&lt;/P&gt;&lt;P&gt;7.1.14(current)-&amp;gt;7.1.15-&amp;gt;8.0.0-&amp;gt;8.0.6&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 19:18:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/197999#M58817</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2018-01-31T19:18:05Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198013#M58820</link>
      <description>&lt;P&gt;Based on what support is saying and what we have been reading that install order looks correct.&amp;nbsp; That is what we will be doing next week when we upgrade our first PA-3020 (only to the 8.0.7).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the email we received.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;FONT size="5"&gt;PAN-SA-2017-0030 - Cross Site Scripting in PAN-OS GlobalProtect&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* Medium Severity&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* Fixed in PAN-OS 6.1.19, PAN-OS 7.0.19, PAN-OS 7.1.14, PAN-OS 8.0.6-h3&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* Affects PAN-OS GlobalProtect portal and gateway&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* CVE-2017-15941&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;FONT size="5"&gt;PAN-SA-2017-0031 - Cross Site Scripting in PAN-OS Captive Portal&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* Medium Severity&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* Fixed in PAN-OS 8.0.7&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* Affects PAN-OS captive portal&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* CVE-2017-16878&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff"&gt;&lt;SPAN&gt;&lt;STRONG&gt;&lt;FONT size="5"&gt;PAN-SA-2017-0032 - ROBOT attack against PAN-OS&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* High Severity&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* Fixed in 8.0.7&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* Affects PAN-OS SSL/Decryption and GlobalProtect portal and gateway&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#0000ff" face="Times New Roman" size="3"&gt;* CVE-2017-17841&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 20:17:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198013#M58820</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-01-31T20:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198014#M58821</link>
      <description>&lt;P&gt;Is 8.0.7 still in review phase?&amp;nbsp; I don't mind upgrading to that to fix security issues but I don't necessarily want to land on a version not currently recommended by Palo Alto after upgrading between major versions.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 20:21:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198014#M58821</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2018-01-31T20:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198019#M58823</link>
      <description>&lt;P&gt;It is production, our SEs and support did not have any concerns with it when we have talked to them about it.&amp;nbsp; Panorama has run fine.&amp;nbsp; Remember we haven't done a firewall yet but I haven't been able to find any negatives posted.&amp;nbsp; If we do ours first before you I will update with anything we noticed.&amp;nbsp; This will be a remote site, we didn't want to tackle the VPN possible problems and the major revision update at the same time first as we have this option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 20:31:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198019#M58823</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-01-31T20:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198023#M58825</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39461"&gt;@jsalmans&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Can confirm that most of my firewalls are now running 8.0.7 without any issues.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2018 20:46:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198023#M58825</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-01-31T20:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198867#M58999</link>
      <description>&lt;P&gt;Thanks for the info.&amp;nbsp; I think I'll move to 8.0.7 for security since it seems like it might be close to being recommended anyways.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2018 19:28:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/198867#M58999</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2018-02-05T19:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/199871#M59174</link>
      <description>&lt;P&gt;Ok, as promised we did do some firewall upgrades this week and here are our thoughts.&lt;/P&gt;&lt;P&gt;First we updated one of our remote sites from 7.1.10 to 8.0.7 (PA-3020).&amp;nbsp; We did this by upgrading to 8.0.0 then rebooting and upgrading to 8.0.7.&amp;nbsp; We have not found any problems with.&amp;nbsp; Both before and after Panorama pushed without problems.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This site has: MPLS, IPSEC VPNs, LDAP, Security/NAT/PBF rules, virtual and physical interfaces.&lt;/P&gt;&lt;P&gt;This site does not have Global Protect configured or HA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We later upgraded our passive HA firewall to 8.0.7 (PA-3020).&amp;nbsp; As this was a secondary firewall we upgraded directly to 8.0.7 (not recommended for some firewall versions but the PA-3000 series was not in that list so we tested it).&amp;nbsp; It upgraded fine and we were able to push configs from Panorama after the upgrade without problems.&amp;nbsp; After confirming everything was still present and correct we failed over from our Primary HA 7.1.10 to the Secondary HA 8.0.7 without problems.&lt;/P&gt;&lt;P&gt;This site has: MPLS, IPSEC VPNs, LDAP, Security/NAT/PBF rules, HA (active/passive), GP Portal/Gateway, virtual and physical interfaces.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We learned two things but only one of them I think will apply to anyone else.&lt;/P&gt;&lt;P&gt;There is a setting that specifically relates to AD users prefix while using LDAP lookups (we think this only affected GP connections but are not 100% sure).&lt;/P&gt;&lt;P&gt;Device -&amp;gt; Authentication Profile -&amp;gt; &amp;lt;Auth_Profile&amp;gt; -&amp;gt; User Domain = &amp;lt;domain&amp;gt;&lt;/P&gt;&lt;P&gt;In this field we had previously entered the DOMAIN.local the new value must just be DOMAIN in the sense that you would type DOMAIN\USER.&amp;nbsp; The problem we found is that in 7.1 (and older) the user would authenticate and the DOMAIN would be added, no problems here everything was happy.&amp;nbsp; After upgrading to 8.0 we found that the system had now changed to take the literal prefix and was now showing users as DOMAIN.local\USER.&amp;nbsp; They would still connet through GP however every rule in the firewall that had a user based restriction/requirement would now reject these users.&amp;nbsp; DOMAIN.local\USER was not valid anywhere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2018 00:39:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/199871#M59174</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-02-10T00:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/199872#M59175</link>
      <description>&lt;P&gt;The second thing has to do with an odd internally built HA active/passive system we are using that we had to shoe horn into doing what we want.&amp;nbsp; The bottom line "I think" is that when we failed over from Primary to Secondary and did not fail back this system lost connectivity.&amp;nbsp; Not because the failover caused the session to become invalid but "we think" the system is doing more than checking session state.&amp;nbsp; I don't have details yet but "I think" it is doing not only a session state check but also a physical check on the path it is taking between active/passive devices.&amp;nbsp; It is checking something on the physical side (MAC or something else) and if this changes the "we think" the session is no longer considered valid.&amp;nbsp; Where this became a problem is that historically we have done reboots and Primary failed to Secondary then after the reboot Secondary failed to Primary as Secondary was then updated and rebooted in turn.&amp;nbsp; This process meant that the Secondary firewall was only the active one for 5-6 minutes.&amp;nbsp; We believe the failover state of the system we are working with is closer to 10 minutes so when we made this change and did not fail back over to Primary the system did not see a recovery of the session in time (no hardware match??) and failed over to the passive remote system.&amp;nbsp; "We think" the system either did not create a new session as the old session was invalid or the time out for creating a new session does not match the failover timeout.&amp;nbsp;&lt;/P&gt;&lt;P&gt;We will clearly need to do more testing.&amp;nbsp; As a network engineer I don't really have any involvement in this system (till it breaks, lol) or in how it was built.&amp;nbsp; I may or may not have an update on this, I'm not sure if it matters to other organizations as this was internally built.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2018 00:42:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/199872#M59175</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-02-10T00:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/200897#M59392</link>
      <description>&lt;P&gt;I sucessfully upgraded over the weekend.&amp;nbsp; Only issue I had was that I updated one all the way up to 8.0.7 (kept suspending it before it became active after every reboot to minimize traffic interruptions) and, when it tried to come online, saw the large version difference between it and the already active peer.&amp;nbsp; I ended up suspending the active peer and the upgrade box came online.&amp;nbsp; This was going to happen anyways so not a big deal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far I did not see any issues with the VPN configs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wildfire started going crazy after the upgrade and enabled me to immediately detect a problem on our network.&amp;nbsp; I found this interesting since, presumably, the previous software was using the same Wildfire content so, unless an update came out during my upgrade window, it seems like some improvements were made to the Wildfire engine that allowed it to detect something it couldn't previously.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Overall it went really well and pretty much to plan.&amp;nbsp; Naturally, 8.0.8 released within a week after and includes some fixes for A/A setups so I'll have to watch our 8.0.7 deployments to see if they encounter any issues until 8.0.8 becomes recommended.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again everyone for the responses!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 15:17:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/200897#M59392</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2018-02-16T15:17:28Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/200991#M59438</link>
      <description>&lt;P&gt;Glad to hear it went well for you &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/39461"&gt;@jsalmans&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;Yeah, we were warned about them not being able to sync more than one major revision apart.&amp;nbsp; Did you notice any session drops when you forced the fail over from 8.0 to 7.0?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 22:54:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/200991#M59438</guid>
      <dc:creator>BrianRa</dc:creator>
      <dc:date>2018-02-16T22:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: Any special instructions to move A/A firewalls from 7.1.x to 8.0.6 via Panorama?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/200993#M59439</link>
      <description>&lt;P&gt;I didn't get any complaints but I was doing it between 6 am and 8 am on a Saturday morning which is a low traffic time for us.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I expect there was since one firewall was told to stop responding and the other was not already operating as an active.&amp;nbsp; Generally I see some traffic drops when I put one in standby due to a combination of OSPF convergence and the really unfortunate way I'm having to do traffic routing via Policy-Based Routing and ping watchdogs (I keep running into issues with "set ip next-hop recursive" and the hardware I'm using).&lt;/P&gt;</description>
      <pubDate>Fri, 16 Feb 2018 22:59:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/any-special-instructions-to-move-a-a-firewalls-from-7-1-x-to-8-0/m-p/200993#M59439</guid>
      <dc:creator>jsalmans</dc:creator>
      <dc:date>2018-02-16T22:59:35Z</dc:date>
    </item>
  </channel>
</rss>

