: Migrate from an M-500 Appliance to an M-700 Appliance
Focus
Focus

Migrate from an M-500 Appliance to an M-700 Appliance

Table of Contents

Migrate from an M-500 Appliance to an M-700 Appliance

Migrate the Panorama™ management server configuration from an M-500 appliance to an M-600 appliance.
You can migrate the Panorama configurations, managed firewalls, and log collectors from an M-500 appliance to an M-700 appliance. You can migrate Panorama configurations between the appliances when both the appliances are running the same PAN-OS version. However, the M-500 appliance supports up to PAN-OS version 10.1, while the M-700 appliance requires at least PAN-OS version 10.2.
To migrate the Panorama configurations across appliances with different PAN-OS versions, you must use an intermediate virtual appliance that supports both versions, and perform the migration in the following two phases:
  • First, migrate the configurations from the M-500 appliance to the intermediate Panorama virtual appliance. For more information about migrating an M-Series appliance to a Panorama virtual appliance see, Migrate from an M-Series Appliance to a Panorama Virtual Appliance.
  • Next, upgrade the intermediate Panorama virtual appliance to a preferred PAN-OS version, and migrate the configurations from the intermediate Panorama virtual appliance to the M-700 appliance running the same preferred PAN-OS version. For more information about migrating a Panorama virtual appliance to an M-Series appliance, see Migrate from a Panorama Virtual Appliance to an M-Series Appliance.
Ensure that all the Log Collectors in the Collector Group are the same Panorama model. For example, if you want to add the local Log Collector on the new M-700 appliance to a Collector Group, the target Collector Group must contain only M-700 appliances. The same is true for the local Log Collector for an M-700 appliance.
This procedure assumes you are no longer using the M-500 appliance for device management or log collection. If you intend to continue using the M-500 appliance as a log collector, you must get a device management license for the M-500 appliance. Without a device management license, you cannot use the M-500 appliance as a log collector.
If you do not plan to use the M-500 appliance as a log collector, but the M-500 appliance contains log data that you must access at a later date, use the Panorama web interface to query and generate reports using the existing log data. Palo Alto Networks recommends reviewing the log retention policy before decommissioning the M-500 appliance.
Policy rule usage data is not preserved when you migrate to a different Panorama model. This indicates that all the existing policy rule usage data from the old Panorama model is no longer displayed after you migrate to a new Panorama model. After a successful migration, Panorama begins tracking policy rule usage data based on the date the migration was completed. For example, the
Created
date displays the date the migration was completed.
  1. Plan the migration.
    • Ensure that both the M-500 appliance and the intermediate Panorama virtual appliance are running the same PAN-OS version. Upgrade the M-700 appliance to a recommended supported PAN-OS version.
      In the second phase of the migration, before migrating the configurations from the Panorama Virtual appliance to the M-700 appliance, you must upgrade the Panorama virtual appliance to the same PAN-OS version that is running on the M-700 appliance. For important details about software versions, see Panorama, Log Collector, Firewall, and WildFire Version Compatibility.
    • Ensure that the M-500 appliance, the intermediate Panorama virtual appliance, and the M-700 appliance are on the same system mode.
    • Schedule a maintenance window for the migration. Firewalls can buffer logs after the M-500 appliance goes offline and then forward the logs after the M-700 appliance comes online. However, completing the migration during a maintenance window ensures that the logs do not exceed the buffer capacities and are not lost during the transition between the Panorama models.
  2. Purchase the new M-700 appliance, and migrate your subscriptions to the new appliance.
    1. Purchase the new M-700 appliance.
    2. Purchase the new support license and migration license.
    3. When purchasing the new M-700 appliance, provide your sales representative with the serial number and device management auth-code of the M-700 appliance that you are phasing out, and the date when you expect your migration. After you receive the M-700 appliance, register it and activate the device management and support licenses by using the migration and support auth-codes from Palo Alto Networks. On the migration date, the device management license on the M-500 will be decommissioned, preventing you from managing devices or collecting logs using the M-500 appliance. However, the support license is preserved and the Panorama appliance remains under support. You can complete the migration after the effective date, but you will not be able to commit any configuration changes on the decommissioned M-500 appliance. Palo Alto Networks allows up to a 90 day migration grace period when migrating between M-Series appliances. Contact your Palo Alto Networks sales representative for more information about your migration.
  3. Obtain and apply an evaluation or temporary license on the intermediate Panorama virtual appliance.
    1. Log in to the Palo Alto Networks Customer Support Portal.
    2. Select
      Assets
      Devices
      Register New Device
      .
    3. In the
      Device Type
      window, select
      Register device using Serial Number or Authorization Code
      , and click
      Next
      .
    4. To activate the Panorama software, enter the serial number you received in the
      Request for Software Evaluation Approved
      email.
    5. If you plan to use the Panorama software offline, select
      Device will be used Offline
      , and enter the required information.
    6. Review the EULA and Support Agreement.
    7. If you agree, click
      Agree
      and
      Submit
      .
    8. After successful registration, the Assets screen displays the newly registered and activated Eval Panorama.
  4. Perform the initial setup of the intermediate Panorama virtual appliance. For details, see Perform the initial setup of the Panorama virtual appliance.
  5. Edit the M-500 interface configuration to use only the management interface.
    The Panorama virtual appliance supports only the management interface for device management and log collection.
    1. Log in to the Panorama web interface of the M-Series appliance.
    2. Select
      Panorama
      Setup
      Management
      .
    3. Edit the
      General Settings
      , modify the
      Hostname
      , and click
      OK
      .
    4. Select
      Panorama
      Setup
      Interfaces
      Management interface
      , and enable the required services.
    5. Disable the services for the other interfaces.
    6. Select
      Commit
      Commit to Panorama
      .
  6. Export the Panorama configuration from the M-500 appliance.
    1. Log in to the Panorama web interface.
    2. Select
      Panorama
      Setup
      Operations
      .
    3. Click
      Save named Panorama configuration snapshot
      , enter a
      Name
      to identify the configuration, and click
      OK
      .
    4. Click
      Export named Panorama configuration snapshot
      , select the
      Name
      of the configuration you just saved, and click
      OK
      .
      Panorama exports the configuration to your client system as an XML file.
  7. Load the Panorama configuration snapshot that you exported from the M-500 appliance into the Panorama virtual appliance.
    The Panorama
    Policy
    rule
    Creation
    and
    Modified
    dates are updated to reflect the date you commit the imported Panorama configuration on the new Panorama. The universally unique identifier (UUID) for each policy rule persists when you migrate the Panorama configuration.
    The
    Creation
    and
    Modified
    for managed firewalls are not impacted when you monitor policy rule usage for a managed firewall because this data is stored locally on the managed firewall and not on Panorama.
    1. Log in to the Panorama web interface of the Panorama virtual appliance.
    2. Select
      Panorama
      Setup
      Operations
      .
    3. Click
      Import named Panorama configuration snapshot
      .
    4. Browse
      for the configuration file you exported from the M-500 appliance, and click
      OK
      .
    5. Click
      Load named Panorama configuration snapshot
      , and select the
      Name
      of the configuration you just imported.
    6. Select a
      Decryption Key
      (the master key for Panorama) and click
      OK
      .
    7. Panorama overwrites its current candidate configuration with the loaded configuration. Panorama displays any errors that occur when loading the configuration file. If errors occur, save the errors to a local file. Resolve each error to ensure the migrated configuration is valid.
  8. Log in to the Panorama web interface of the M-700 appliance, select
    Panorama
    Setup
    Interfaces
    , and verify that the IP address on the management interface is different from the IP address of the M-500 appliance.
    This is to ensure that the connectivity to the Panorama virtual appliance is not disrupted post commit.
  9. Select
    Commit
    Commit to Panorama
    Validate Commit
    to review and resolve any configuration issues. Commit the Panorama configuration.
  10. Export the Panorama configuration from the Panorama virtual appliance.
    1. Log in to the Panorama web interface of the Panorama virtual appliance.
    2. Select
      Panorama
      Setup
      Operations
      .
    3. Click
      Save named Panorama configuration snapshot
      , enter a
      Name
      to identify the configuration, and click
      OK
      .
    4. Click
      Export named Panorama configuration snapshot
      , select the
      Name
      of the configuration you just saved, and click
      OK
      .
      Panorama exports the configuration to your client system as an XML file.
  11. Perform the initial setup of the M-700 appliance. For details, see Perform the initial setup of the M-Series appliance.
  12. Load the Panorama configuration snapshot that you exported from the Panorama virtual appliance to the M-700 appliance.
    The Panorama
    Policy
    rule
    Creation
    and
    Modified
    dates are updated to reflect the date you commit the imported Panorama configuration on the new Panorama. The universally unique identifier (UUID) for each policy rule persists when you migrate the Panorama configuration.
    The
    Creation
    and
    Modified
    for managed firewalls are not impacted when you monitor policy rule usage for a managed firewall because this data is stored locally on the managed firewall and not on Panorama.
    1. Log in to the Panorama web interface of the Panorama virtual appliance.
    2. Select
      Panorama
      Setup
      Operations
      .
    3. Click
      Import named Panorama configuration snapshot
      .
    4. Browse
      for the configuration file you exported from the Panorama virtual appliance, and click
      OK
      .
    5. Click
      Load named Panorama configuration snapshot
      , and select the
      Name
      of the configuration you just imported.
    6. Select a
      Decryption Key
      (the master key for Panorama) and click
      OK
      .
    7. Panorama overwrites its current candidate configuration with the loaded configuration. Panorama displays any errors that occur when loading the configuration file. If errors occur, save the errors to a local file. Resolve each error to ensure the migrated configuration is valid.
  13. Review the network configuration on the M-700 appliance.
    1. (
      Optional
      ) Log in to the Panorama web interface of the M-500 appliance, select
      Panorama
      Setup
      Operations
      , and click
      Shutdown Panorama
      .
      Shut down the M-500 appliance if you plan to have the same IP address on both the M-500 and M-700 appliances.
    2. Log in to the Panorama web interface of the M-700 appliance, select
      Panorama
      Setup
      Interfaces
      , and verify the network configuration on the Management interface to ensure that the connectivity to the M-700 appliance is not disrupted post commit.
    3. Ensure that all the interface configurations are set up based on your requirements for the M-700 appliance.
  14. Select
    Commit
    Commit to Panorama
    Validate Commit
    to review and resolve any configuration issues. Commit the Panorama configuration.
  15. Generate a new device registration authentication key for managed device connectivity.
    1. In the Panorama web interface of the M-700 appliance, select
      Panorama
      Device Registration Auth Key
      and
      Add
      a new authentication key.
    2. Configure the authentication key.
      • Name
        —Enter a descriptive name for the authentication key.
      • Lifetime
        —Enter the key lifetime to specify the duration of the validity of the authentication key.
      • Count
        —Enter the number of devices that will use the authentication key for connecting to Panorama.
      • Device Type
        —Specify whether the authentication key may be used for
        Firewalls
        ,
        Log Collectors
        , or
        Any
        device.
    3. Click
      OK
      .
    4. Copy Auth Key
      and
      Close
      .
  16. After you complete the migration, connectivity to the managed firewalls is lost. Recover connectivity to the managed firewalls.
    1. Reset the secure connection state.
      This command resets the managed device connection to Panorama and is irreversible.
      admin> request sc3 reset
    2. Restart the management server on the managed device.
      admin> debug software restart process management-server
    3. (
      Optional
      ) If the IP address of the M-700 appliance is different from the M-500 appliance, update the panorama-server IP address.
      admin> configure admin# set deviceconfig system panorama local-panorama panorama-server <panorama-ip> [panorama-server-2 <panorama-ha-peer-ip>] admin# commit admin# exit
    4. Add the device registration authentication key you copied in Step 16.
      admin> request authkey set <auth_key>
    5. Verify the managed device connectivity to Panorama.
      admin> show panorama-status
      Verify that the IP address of the M-700 appliance appears and the Panorama server
      Connected
      status displays
      yes
      .
  17. After you complete the migration, connectivity to the managed log collectors is lost. Recover connectivity to the managed log collectors.
    1. Reset the secure connection state.
      This command resets the managed device connection to Panorama and is irreversible.
      admin> request sc3 reset
    2. Restart the management server on the managed device.
      admin> debug software restart process management-server
    3. (
      Optional
      ) If the IP address of the M-700 appliance is different from the M-500 appliance, update the panorama-server IP address.
      admin> configure admin # set deviceconfig system panorama-server <panorama-ip> [panorama-server-2 <panorama-ha-peer-ip>] admin# Commit admin# exit
    4. Add the device registration authentication key you copied in Step 16.
      admin> request authkey set <auth_key>
    5. Verify the managed device connectivity to Panorama.
      admin> show panorama-status
      Verify that the IP address of the M-700 appliance appears and the Panorama server
      Connected
      status displays
      yes
      .
  18. Select
    Commit
    Commit to Panorama
    Validate Commit
    to review and resolve any configuration issues. Commit the Panorama configuration.
  19. Synchronize the M-700 appliance with the managed devices.
    1. Select
      Commit
      Push to Devices
      and
      Edit Selections
      .
    2. Select all the devices under
      Device Groups
      ,
      Templates
      , and
      Collector Groups
      , and click
      OK
      .
    3. Push your changes.
    4. Select
      Panorama
      Managed Devices
      Summary
      , and verify that all the firewalls are connected. Also, verify that the shared policy and template configurations of the firewalls are
      In sync
      with Panorama.
    5. Select
      Panorama
      Managed Collectors
      , and verify that the configuration status is
      In Sync
      with Panorama, and the health status is
      Green
      for all the log collectors.

Recommended For You