Migrate model FW to virtualwith panorama for policies (recommended procedure)

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Migrate model FW to virtualwith panorama for policies (recommended procedure)

L4 Transporter

Hi,

 

We have to migrate a standalone PA-820 to a cluster VM500. The config will be the same except few interface changes. Only security policies are deployed from panorama (not template). So what is recommended way to do It?

 

Which option is better:
1) export existing device state fw to the VM FW?
2) export/import just the running config. Do some interfaces changes and add the devices in panorama and assing device goup

 

REcommended way?

1 REPLY 1

Community Team Member

Hi @BigPalo ,

 

In my opinion the best method—especially since you are moving to a different platform and integrating it with Panorama—is a modified version of option 2.

 

This would be my approach:

  1. Export the Running Configuration: Log into your standalone PA-820 and export the running-config.xml file. I would not export the device state, as it carries hardware-specific details that will break the VM-500's configuration.

  2. Manually Edit the XML: This is the most crucial step due to the hardware difference.

    • Use a text editor (like Notepad++) to manually Find/Replace the old PA-820 physical interface names (e.g., ethernet1/1, ethernet1/2) with the corresponding virtual interface names of the M-500 (e.g., the standard VMXNet3 interface names).

    • If you are moving to a cluster, you may need to adjust or remove the old HA configuration entries from the PA-820 configuration to prevent immediate conflicts.

  1. Basic VM Setup: Deploy the VM-500, ensure it's running the same or newer PAN-OS version as the PA-820, and retrieve its licenses. Configure only the management interface so you can access the GUI.

  2. Import Configuration: Import the edited running-config.xml file onto the VM-500 (Import named configuration snapshot).

  3. Local Commit and Clean-up: Load and commit the imported config on the VM-500. The commit will likely fail due to residual interface or HA discrepancies. Fix these errors locally on the VM-500 until a commit succeeds. This stabilizes the objects and NAT rules.

 

  1. Register to Panorama: Add the VM-500 serial number to Panorama's list of managed devices.

  2. Template Assignment: Assign the VM-500 to the correct Device Group (this pulls the Security Policies you already manage) and to a Template Stack designed for your VM-500 cluster (this will manage interfaces, zones, HA, etc.).

  3. Final Push: Perform a Force Push of the Device and Network Templates from Panorama. This final push overwrites all Network/Device settings you imported locally, ensuring the VM-500's identity is clean, standardized, and fully managed by Panorama.

 

In my opinion option 1 (Export Device State) is more suited for identical hardware replacement. Migrating a device state from a physical firewall to a virtual VM architecture often introduces hardware and system file mismatches that can lead to persistent, difficult-to-troubleshoot commit failures and instability on the VM-500.

 

Hopethis helps,

Kim.

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.
  • 84 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!