Upgrade Panorama with an Internet Connection
Table of Contents
11.0
Expand all | Collapse all
-
-
- Upgrade Panorama with an Internet Connection
- Upgrade Panorama Without an Internet Connection
- Install Content Updates Automatically for Panorama without an Internet Connection
- Upgrade Panorama in an HA Configuration
- Migrate Panorama Logs to the New Log Format
- Upgrade Panorama for Increased Device Management Capacity
- Upgrade Panorama and Managed Devices in FIPS-CC Mode
- Downgrade from Panorama 11.0
- Troubleshoot Your Panorama Upgrade
-
- What Updates Can Panorama Push to Other Devices?
- Schedule a Content Update Using Panorama
- Panorama, Log Collector, Firewall, and WildFire Version Compatibility
- Upgrade Log Collectors When Panorama Is Internet-Connected
- Upgrade Log Collectors When Panorama Is Not Internet-Connected
- Upgrade a WildFire Cluster from Panorama with an Internet Connection
- Upgrade a WildFire Cluster from Panorama without an Internet Connection
- Upgrade Firewalls When Panorama Is Internet-Connected
- Upgrade Firewalls When Panorama Is Not Internet-Connected
- Upgrade a ZTP Firewall
- Revert Content Updates from Panorama
-
Upgrade Panorama with an Internet Connection
If Panorama™ has a direct connection to the internet, perform the following steps to install
Panorama software and content updates as needed. If Panorama is running in a high
availability (HA) configuration, upgrade the Panorama software on each peer (see
Upgrade Panorama in an HA Configuration). If you are upgrading Panorama and
managed devices in FIPS-CC mode to PAN-OS® 11.0 from PAN-OS 10.2 or earlier release,
you must take the additional steps of resetting the secure connection status of the
devices in FIPS-CC mode if added to Panorama management while running a PAN-OS 10.2
release. See Upgrade Panorama and Managed Devices in FIPS-CC Mode for more details on upgrading Panorama
and FIPS-CC devices in FIPS-CC mode.
Upgrading
the software on the Panorama virtual appliance does not change the system
mode; switching to Panorama mode or Management Only mode is a manual task
that requires additional settings as described when you Set Up the Panorama Virtual Appliance
with a Local Log Collector.
Palo Alto Networks introduced new log data formats at different points in your
upgrade path depending on the PAN-OS version you are upgrading from.
- Upgrade from PAN-OS 8.1 to PAN-OS 9.0—PAN-OS 9.0 introduced a new log data format for local and Dedicated Log Collectors. On your upgrade path to PAN-OS 11.0, existing log data is automatically migrated to the new format when you upgrade from PAN-OS 8.1 to PAN-OS 9.0.
- Upgrade from PAN-OS 10.0 to PAN-OS 10.1—PAN-OS 10.1 introduced a new log format for local and Dedicated Log Collectors. On your upgrade path to PAN-OS 11.0, logs generated in PAN-OS 8.1 or earlier are no longer available. This includes logs migrated as part of the upgrade to PAN-OS 9.0. After upgrade to PAN-OS 10.1, you have the option to recover and migrate these logs to the PAN-OS 10.1 log format.
You
must upgrade all Log Collectors in a collector group at the same
time to avoid losing log data loss. No log forwarding or log collection
occurs if the Log Collectors in a collector group are not all running
the same PAN-OS version. Additionally, the log data for the Log
Collectors in the collector group is not visible in the ACC or Monitor tabs
until all Log Collectors are running the same PAN-OS version. For
example, if you have three Log Collectors in a collector group and
you upgrade two of the Log Collectors, then no logs are forwarded
to any Log Collectors in the collector group.
Before upgrading Panorama, refer to the Release Notes for the minimum content
release version required for PAN-OS® 11.0.
- Verify that the updates you plan to install are appropriate for your Panorama deployment.Palo Alto Networks highly recommends that Panorama, Log Collectors, and all managed firewalls run the same content release version.
- Refer to the Release Notes for the minimum content release version required for a Panorama software release. If you intend to upgrade Log Collectors and firewalls to a particular release, you must first upgrade Panorama to that (or a later) release.
- For a Panorama virtual appliance that runs on a hypervisor, ensure that the instance meets the Setup Prerequisites for the Panorama Virtual Appliance.
Determine the Upgrade Path to PAN-OS 11.0.Review PAN-OS Upgrade Checklist, the known issues and changes to default behavior in the Release Notes and Upgrade/Downgrade Considerations for each release through which you pass as part of your upgrade path.(Panorama Interconnect plugin only) Synchronize the Panorama Node with the Panorama Controller.Before you begin upgrading a Panorama Node, you must synchronize the Panorama Controller and Panorama Node configuration. This is required to successfully push the common Panorama Controller configuration to your Panorama Node after successful upgrade.Save a backup of the current Panorama configuration file that you can use to restore the configuration if you have problems with the upgrade.Although Panorama automatically creates a backup of the configuration, best practice is to create and externally store a backup before you upgrade.- Log in to the Panorama web interface.Save named Panorama configuration snapshot (PanoramaSetupOperations), enter a Name for the configuration, and click OK.Export named Panorama configuration snapshot, select the Name of the configuration you just saved, click OK, and save the exported file to a location that is external to Panorama.(Best Practices) If you are leveraging Strata Logging Service, install the Panorama device certificate.Panorama automatically switches to using the device certificate for authentication with CDL ingestion and query endpoints on upgrade to PAN-OS 11.0.If you do not install the device certificate prior to upgrade to PAN-OS 11.0, Panorama continues to use the existing logging service certificate for authentication.Install the latest content updates.If Panorama is not running the minimum content versions required for the Panorama release to which you intend to upgrade, you must update content versions to the minimum (or later) versions before you install the software updates. Refer to Release Notes for minimum content release version for a Panorama release.Palo Alto Networks® highly recommends that Panorama, Log Collectors, and all managed firewalls run the same content release version. Additionally, we recommend that you schedule automatic, recurring updates so that you are always running the latest content versions (refer to 15).
- Select PanoramaDynamic Updates and Check Now for the latest updates. If the value in the Action column is Download, an update is available.Ensure that Panorama is running the same but not a later content release version than is running on managed firewalls and Log Collectors.(Before you update the content release version on Panorama, be sure to Upgrade the Firewall to PAN-OS 11.0 from Panorama and then Log Collectors (see Upgrade Log Collectors When Panorama Is Internet-Connected) to the same (or a later) content release version.If you do not need to install content updates at this time, then skip ahead to the next step.Install remaining content updates, as needed. When installed, the Currently Installed column displays a check mark.
- Download and Install the Applications or Applications and Threats update. Regardless of your subscription, Panorama installs and needs only the Applications content update, not the Threats content. For details, see Panorama, Log Collector, Firewall, and WildFire Version Compatibility.
- Download and Install other updates (Antivirus, WildFire®, or URL Filtering) as needed, one at a time, and in any sequence.
Select PanoramaPlugins and Download the plugin version supported on PAN-OS 11.0 for all plugins currently installed on Panorama.See the Compatibility Matrix for the Panorama plugin version supported for your target PAN-OS 11.0 release.This is required to successfully upgrade Panorama from PAN-OS 10.2 to PAN-OS 11.0. Upgrade to PAN-OS 11.0 is blocked if the supported plugin version is not downloaded.The downloaded plugins required to upgrade to PAN-OS 11.0 automatically install after Panorama successfully upgrades to PAN-OS 11.0. If a downloaded plugin does not automatically install, you must manually install the impacted plugin after upgrade to PAN-OS 11.0.Upgrade Panorama to PAN-OS 11.0.- Check Now (PanoramaSoftware) for the latest releases. If a software release is available, the Action column displays Download.(PAN-OS 11.0.5 and later 11.0 releases) By default, the preferred releases and the corresponding base releases are displayed. To view the preferred releases only, disable (clear) the Base Releases checkbox. Similarly, to view the base releases only, disable (clear) the Preferred Releases checkbox.Locate and validate the PAN-OS 11.0 image.
- Click PanoramaSoftwareActionValidate.
- Select the required dependencies, and click Download.
Install the downloaded image and then reboot.- Install the image.
- After the installation completes successfully, reboot using one of the following methods:
- If prompted to reboot, click Yes. If you see a CMS Login prompt, press Enter without typing a username or password. When the Panorama login prompt appears, enter the username and password you specified during initial configuration.
- If you are not prompted to reboot, Reboot Panorama from the Device Operations section (PanoramaSetupOperations).
After Panorama reboots, verify that your Panorama plugin versions are supported PAN-OS 11.0.You must verify and install Panorama plugin version supported on PAN-OS 11.0 after you successfully upgrade Panorama. See the Compatibility Matrix for more information about supported Panorama plugins supported on PAN-OS 11.0.- Log in to the Panorama web interface and review the General Information widget in the Dashboard to verify the PAN-OS 11.0 compatible plugin versions successfully installed.You can also log in to the Panorama CLI and enter the command show plugins installed to view the list of currently installed plugins.Select PanoramaPlugins and search for the plugin that did not install.Install the plugin version supported on PAN-OS 11.0.Repeat the steps above until all plugins installed on Panorama are running the version supported on PAN-OS 11.0.(If local Log Collector is in a Collector Group) Upgrade the remaining Log Collectors in the Collector Group.(Panorama and managed devices in FIPS-CC mode) Upgrade Panorama and Managed Devices in FIPS-CC Mode.Upgrading Panorama and managed devices in FIPS-CC mode requires you to reset the secure connection status of the devices in FIPS-CC mode if added to Panorama management while running a PAN-OS 11.0 release. You need to re-onboard the following managed devices to Panorama management:
- Managed devices in FIPS-CC mode added to Panorama using the device registration authentication key.
- Managed devices in the normal operational mode added to Panorama using the device registration authentication key
Regenerate or re-import all certificates to adhere to OpenSSL Security Level 2.This step is required if you upgrade from PAN-OS 10.1 or earlier release to PAN-OS 11.0. Skip this step if you upgrade from PAN-OS 10.2 and have already regenerated or re-imported your certificates.It is required that all certificates meet the following minimum requirements:- RSA 2048 bits or greater, or ECDSA 256 bits or greater
- Digest of SHA256 or greater
See the PAN-OS Administrator's Guide or Panorama Administrator's Guide for more information on regenerating or re-importing your certificates.(Recommended for Panorama mode) Increase the memory of the Panorama virtual appliance to 64GB.After you successfully upgrade the Panorama virtual appliance in Panorama mode to PAN-OS 11.0, Palo Alto Networks recommends increasing the memory of the Panorama virtual appliance to 64GB to meet the increased system requirements to avoid any logging, management, and operational performance issues related to an under-provisioned Panorama virtual appliance.Select CommitCommit and Push and Commit and Push the Panorama managed configuration to all managed devices.After you successfully upgrade Panorama and managed devices to PAN-OS 11.0, a full commit and push of the Panorama managed configuration is required before you can push selective configuration to your managed devices and leverage the improved shared configuration object management for multi-vsys firewalls managed by Panorama.(Best Practice) Schedule recurring, automatic content updates.Panorama does not synchronize content update schedules across HA peers. You must perform this task on both the active and passive Panorama.In the header row for each update type (PanoramaDynamic Updates), the Schedule is initially set to None. Perform the following steps for each update type.- Click None and select the update frequency (Recurrence). The frequency options depend on the update type.Select the schedule action:
- Download And Install (Best Practice)—Panorama automatically installs updates after downloading them.Download Only—You must manually install updates after Panorama downloads them.
Based on the best practices for the security posture of your organization, configure a delay (Threshold) after an update becomes available before Panorama downloads the update.Click OK to save your changes.Select CommitCommit to Panorama and Commit your changes.(Enterprise DLP only) Edit the Enterprise DLP data filtering settings to reduce the Max File Size to 20MB or less.This is required when upgrading from Panorama plugin for Enterprise DLP 3.0.3 or later releases to Enterprise DLP 4.0.0 as this plugin version does not support large file size inspection.