SSL Connection Error During Panorama-Orchestrated HA Upgrade

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

SSL Connection Error During Panorama-Orchestrated HA Upgrade

L0 Member

Hi all,

First time posting, so bear with me. We manage fairly large fleets of devices across multiple clients, so the new HA upgrade orchestration from Panorama looked like a big time-saver. We decided to test it with one client but ran into the issue shown in the screenshot: "Download error: SSL connection error".

Has anyone encountered this — either with orchestrated HA upgrades or standalone upgrades — and have an idea where to start troubleshooting?

Some additional context:

 

  • Both firewalls had  same PAN-OS base version downloaded on them
  • Both can reach the update server (updates.paloaltonetworks.com)
  • Device certificates are valid and up to date

Appreciate any insights or discussion.

1 accepted solution

Accepted Solutions

Community Team Member

Hi @M.Knabikas ,

 

Make sure that TCP port 28443 is open in this communication and no intermediate device is blocking traffic.

 

28443 TCP - Used for managed devices (firewalls and Log Collectors) to retrieve software and content updates from Panorama. 
Only devices that run PAN-OS 8.x and later releases retrieve updates from Panorama over this port. 

 

Source:

https://docs.paloaltonetworks.com/ngfw/administration/firewall-administration/reference-port-number-...

 

Hope this helps !

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

View solution in original post

2 REPLIES 2

Community Team Member

Hi @M.Knabikas ,

 

Make sure that TCP port 28443 is open in this communication and no intermediate device is blocking traffic.

 

28443 TCP - Used for managed devices (firewalls and Log Collectors) to retrieve software and content updates from Panorama. 
Only devices that run PAN-OS 8.x and later releases retrieve updates from Panorama over this port. 

 

Source:

https://docs.paloaltonetworks.com/ngfw/administration/firewall-administration/reference-port-number-...

 

Hope this helps !

LIVEcommunity team member, CISSP
Cheers,
Kiwi
Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

L0 Member

Hi,

 

Thanks for the follow-up!

 

Yes, opening TCP 28443 was the solution. Note that the direction matters — the port needs to be open from Panorama to the managed firewalls, not the other way around.

 

The feature works well overall. One minor issue we noticed: the update window would occasionally get stuck visually on a step (e.g., "upgrading second firewall") even after that firewall had already completed the upgrade. This appears to be a display/UI glitch only — functionality was not affected.

 

  • 1 accepted solution
  • 1017 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!