: Downgrade from Panorama 11.0
Focus
Focus

Downgrade from Panorama 11.0

Table of Contents
End-of-Life (EoL)

Downgrade from Panorama 11.0

Procedure on how to downgrade from Panorama 11.0 to Panorama 10.2.
PAN-OS® 11.0 introduces advanced threat prevention support for Zero-day exploit prevention that leverages inline deep learning, simplified software upgrade and downgrade for Panorama and managed devices to reduce the operational burden of upgrading managed devices across multiple PAN-OS releases, proactive Best Practice Assessment (BPA) using AIOps to further eliminate exposure from a compromised security posture, on-premises Web Proxy to help transition to the cloud without sacrificing security or efficiency, firewall support for a stateful DHCPv6 Client to obtain IPv6 addresses, enhanced visibility for user context for the Cloud Identity Engine (CIE), TLSv1.3 support for management access, and enhanced IoT security policy rule recommendations to make it easier to scale and manage policy rule recommendations. Use the following workflow to downgrade firewalls before you downgrade Log Collectors and Panorama running a Panorama 11.0 release to an earlier feature release. This procedure works both for Panorama when managing a local Log Collector and for Panorama when managing one or more Dedicated Log Collectors.
To downgrade from PAN-OS 11.0 to an earlier PAN-OS release, you must download and install the preferred PAN-OS 10.2 or later PAN-OS 10.2 release before you can continue on your downgrade path to your target PAN-OS release. Downgrade from PAN-OS 11.0 fails if you attempt to downgrade to PAN-OS 10.1 or earlier PAN-OS release.
Review the Palo Alto Networks Compatibility Matrix to confirm that the firewalls and appliances you intend to downgrade are compatible with the PAN-OS release to which you intend to downgrade. For the firewalls and appliances that you can downgrade, you should also review the Upgrade/Downgrade Considerations to ensure that you account for all features and configuration settings that will be different or unavailable after you downgrade.
  1. Save a backup of the configuration files for Panorama and managed devices.
    1. Export Panorama and device configuration snapshot (PanoramaSetupOperations).
    2. Save the exported .tgz file to a location external to Panorama, Log Collectors, and firewalls. You can use this backup to restore the configuration if you experience problems that cause you to start over.
  2. If you have configured authentication for a Dedicated Log Collector and removed the admin administrator, configure and push a new admin user to your Dedicated Log Collectors.
    Dedicated Log Collectors must have the admin user configured in order to downgrade to PAN-OS 9.1 and earlier releases.
  3. Select PanoramaPlugins and Download the plugin version supported on PAN-OS 10.2 for all plugins currently installed on Panorama.
    See the Panorama Plugins Compatibility Matrix for the Panorama plugin version supported on PAN-OS 10.2 and earlier releases.
    This is required to successfully downgrade Panorama from PAN-OS 11.0 to PAN-OS 10.2 and earlier releases. The downloaded plugin version is automatically installed during downgrade to PAN-OS 10.2. Downgrade to PAN-OS 10.2 is blocked if the supported plugin version is not downloaded.
    (ZTP plugin only) To successfully downgrade Panorama to PAN-OS 10.2, you must uninstall the ZTP plugin before you begin the downgrade process. After successful downgrade to PAN-OS 10.2, you must reinstall the ZTP plugin on Panorama.
  4. Downgrade each firewall running a PAN-OS 11.0 release.
    Downgrading from PAN-OS 11.0 to a previous feature release requires that you first downgrade to the preferred PAN-OS 10.2 release or later PAN-OS 10.2 release. After successfully downgrading to the preferred PAN-OS 10.2 or later PAN-OS 10.2 release, you can continue downgrading to your target PAN-OS version.
    If downgrading more than one firewall, streamline the process by having each firewall-specific PAN-OS 10.2 image downloaded to Panorama before you start downgrading. For example, to downgrade your PA-220 firewall to PAN-OS 10.2, download the PanOS_220-10.2.0 or PanOS_3000-10.2.0 images.
    Panorama requires that all firewalls are running the same or an earlier PAN-OS release. So before you downgrade Panorama, use and repeat the appropriate tasks below according to your environment to downgrade all managed firewalls as needed:
    1. Check Now for available images (PanoramaDevice DeploymentSoftware).
      (PAN-OS 11.0.5 and later 11.0 releases) By default, the preferred releases and the corresponding base releases are displayed. To view the preferred releases only, disable (clear) the Base Releases checkbox. Similarly, to view the base releases only, disable (clear) the Preferred Releases checkbox.
    2. Locate the PAN-OS 10.2 image for each model or series of firewalls you intend to downgrade. If the image is not already downloaded, then Download it.
    Non-HA Firewall
    Install (Action column) the appropriate PAN-OS 10.2 version, select all the firewalls you intend to downgrade, select Reboot device after install, and click OK.
    Active/Active HA Firewalls
    1. Click Install, disable (clear) Group HA Peers, select either of the HA peers, select Reboot device after install, and click OK. Wait for the firewall to finish rebooting before you proceed.
    2. Click Install, disable (clear) Group HA Peers, select the HA peer that you didn’t update in the previous step, select Reboot device after install, and click OK.
    Active/Passive HA Firewalls
    In this example, the active firewall is named fw1 and the passive firewall is named fw2:
    1. Install (Action column) the appropriate update, disable (clear) Group HA Peers, select fw2, select Reboot device after install, and click OK.
    2. After fw2 finishes rebooting, verify fw1 (DashboardHigh Availability widget) is still the active peer and that fw2 is still the passive peer (the Local firewall state is active and the Peer—fw2—is passive).
    3. Access fw1 and Suspend local device (DeviceHigh AvailabilityOperational Commands).
    4. Access fw2 (DashboardHigh Availability) and verify that the Local firewall state is active and the Peer firewall—fw1—is suspended.
    5. Access Panorama, select PanoramaDevice DeploymentSoftware, Install (Action column) the appropriate update, disable (clear) Group HA Peers, select fw1, select Reboot device after install, and click OK. Wait for fw1 to finish rebooting before you proceed.
    6. Access fw1 (DashboardHigh Availability widget) and verify that the Local firewall state is passive and the Peer—fw2—is active.
      If you enabled preemption in the Election settings (DeviceHigh AvailabilityGeneral), then fw1 will be reinstated as the active peer after reboot.
  5. Downgrade each Log Collector running Panorama 11.0.
    Downgrading from PAN-OS 11.0 to a previous feature release requires that you first downgrade to the preferred PAN-OS 10.2 or later PAN-OS 10.2 release. After successfully downgrading to the preferred PAN-OS 10.2 or later PAN-OS 10.2 release, you can continue downgrading to your target PAN-OS version.
    1. Check Now for available images (PanoramaDevice DeploymentSoftware).
      (PAN-OS 11.0.5 and later 11.0 releases) By default, the preferred releases and the corresponding base releases are displayed. To view the preferred releases only, disable (clear) the Base Releases checkbox. Similarly, to view the base releases only, disable (clear) the Preferred Releases checkbox.
    2. Locate the Panorama 10.2 image. If the image is not already downloaded, then Download it (Action column).
    3. After the download is complete, Install the image on each Log Collector running Panorama 10.2. Select Reboot device after install to automatically reboot the device when the upgrade is complete.
  6. Downgrade Panorama.
    Downgrading from PAN-OS 11.0 to a previous feature release requires that you first downgrade to the preferred PAN-OS 10.2 or later PAN-OS 10.2 release. After successfully downgrading to the preferred PAN-OS 10.2 or later PAN-OS 10.2 release, you can continue downgrading to your target PAN-OS version.
    1. Select PanoramaSoftware and Check Now for available images.
      (PAN-OS 11.0.5 and later 11.0 releases) By default, the preferred releases and the corresponding base releases are displayed. To view the preferred releases only, disable (clear) the Base Releases checkbox. Similarly, to view the base releases only, disable (clear) the Preferred Releases checkbox.
    2. Locate the Panorama 10.2 image. If the image is not already downloaded, then Download it.
    3. After the download is complete, Install the image on Panorama.
    4. Reboot Panorama as follows:
      • If you are prompted to reboot, click Yes. If you see a CMS Login prompt, press Enter without typing the username or password. When the Panorama login prompt appears, enter the username and password you set during initial configuration.
      • If you are not prompted to reboot, select PanoramaSetupOperations and click Reboot Panorama (Device Operations).
  7. (ZTP plugin only) Re-install the ZTP plugin.
    1. Select PanoramaZero Touch Provisioning and check (enable) ZTP.
  8. (Enterprise DLP only) Edit the Enterprise DLP data filtering settings to reduce the Max File Size to 20MB or less.
    This is required when downgrading from Panorama plugin for Enterprise DLP 4.0.1 or later release. Large file size inspection is supported on Enterprise DLP 4.0.1 and later releases.
  9. (Enterprise DLP only) Synchronize the Enterprise DLP data filtering profiles on Panorama with the DLP cloud service.
    This is required when downgrading Panorama from PAN-OS 11.0.2 and Enterprise DLP plugin 4.0.1 to PAN-OS 11.0.1 or earlier 11.0 release and Enterprise DLP plugin 4.0.0.
    1. Log in to the Panorama CLI.
    2. Push the Enterprise DLP configuration from Panorama to the DLP cloud service.
      admin> request plugins dlp push-dlp-config
    3. Reset the Enterprise DLP plugin.
      admin> request plugins dlp reset
    4. Commit on Panorama and push to managed firewalls using Enterprise DLP.
      1. Select CommitCommit to Panorama and Commit.
      2. Select CommitPush to Devices and Edit Selections.
      3. Select Device Groups and Include Device and Network Templates.
      4. Click OK.
      5. Push your configuration changes to your managed firewalls that are using Enterprise DLP.