: Upgrade Panorama Without an Internet Connection
Focus
Focus

Upgrade Panorama Without an Internet Connection

Table of Contents

Upgrade Panorama Without an Internet Connection

If Panorama™ does not have a direct connection to the internet, perform the following steps to install Panorama software and content updates as needed. If Panorama is deployed in a high availability (HA) configuration, you must upgrade each peer (see Upgrade Panorama in an HA Configuration). If you are upgrading Panorama and managed devices in FIPS-CC mode to PAN-OS 11.1 from PAN-OS 10.2 or earlier release, you must take the additional steps of resetting the secure connection status of the devices in FIPS-CC mode if added to Panorama management while running a PAN-OS 10.2 release. See Upgrade Panorama and Managed Devices in FIPS-CC Mode for more details on upgrading Panorama and FIPS-CC devices in FIPS-CC mode.
Upgrading the software on the Panorama virtual appliance does not change the system mode; switching to Panorama mode or Management Only mode is a manual task that requires additional settings as described when you Set Up the Panorama Virtual Appliance with a Local Log Collector.
Palo Alto Networks introduced new log data formats at different points in your upgrade path depending on the PAN-OS version you are upgrading from.
  • Upgrade from PAN-OS 8.1 to PAN-OS 9.0
    —PAN-OS 9.0 introduced a new log data format for local and Dedicated Log Collectors. On your upgrade path to PAN-OS 11.1, existing log data is automatically migrated to the new format when you upgrade from PAN-OS 8.1 to PAN-OS 9.0.
  • Upgrade from PAN-OS 10.0 to PAN-OS 10.1
    —PAN-OS 10.1 introduced a new log format for local and Dedicated Log Collectors. On your upgrade path to PAN-OS 11.1, logs generated in PAN-OS 8.1 or earlier are no longer available. This includes logs migrated as part of the upgrade to PAN-OS 9.0. After upgrade to PAN-OS 10.1, you have the option to recover and migrate these logs to the PAN-OS 10.1 log format.
You must upgrade all Log Collectors in a collector group at the same time to avoid losing log data loss. No log forwarding or log collection occurs if the Log Collectors in a collector group are not all running the same PAN-OS version. Additionally, the log data for the Log Collectors in the collector group is not visible in the
ACC
or
Monitor
tabs until all Log Collectors are running the same PAN-OS version. For example, if you have three Log Collectors in a collector group and you upgrade two of the Log Collectors, then no logs are forwarded to any Log Collectors in the collector group.
Before you upgrade Panorama, refer to the Release Notes for the minimum content release version required for PAN-OS® 11.1.
  1. Verify that the updates you plan to install are appropriate for your Panorama deployment.
    Palo Alto Networks highly recommends that Panorama, Log Collectors, and all managed firewalls run the same content release version.
  2. You cannot skip the installation of any feature release versions in the path from the currently running PAN-OS version to PAN-OS 11.1.
    Review PAN-OS Upgrade Checklist, the known issues and changes to default behavior in the Release Notes and Upgrade/Downgrade Considerations for each release through which you pass as part of your upgrade path.
  3. Before you begin upgrading a Panorama Node, you must synchronize the Panorama Controller and Panorama Node configuration. This is required to successfully push the common Panorama Controller configuration to your Panorama Node after successful upgrade.
  4. Save a backup of the current Panorama configuration file that you can use to restore the configuration if you have problems with the upgrade.
    Although Panorama automatically creates a backup of the configuration, best practice is to create and externally store a backup before you upgrade.
    1. Save named Panorama configuration snapshot
      (
      Panorama
      Setup
      Operations
      ), enter a
      Name
      for the configuration, and click
      OK
      .
    2. Export named Panorama configuration snapshot
      , select the
      Name
      of the configuration you just saved, click
      OK
      , and save the exported file to a location that is external to Panorama.
  5. Download the latest content updates to a host that can connect and upload content to Panorama either over SCP or HTTPS.
    If you do not need to install content updates at this time, then skip ahead to 6.
    1. Use a host that has internet access to log in to the Palo Alto Networks Customer Support website.
    2. Download content updates as needed:
      1. Click
        Updates
        Dynamic Updates
        in the Resources section.
      2. Download
        the appropriate content updates and save the files to the host. Perform this step for each content type you need to update.
  6. Enable the following TCP ports on your network.
    These TCP ports must be enabled on your network to allow inter-Log Collector communication.
    • TCP/9300
    • TCP/9301
    • TCP/9302
  7. Install the latest content updates.
    You must install content updates before software updates and you must Upgrade the Firewall to PAN-OS 11.1 from Panorama first and then upgrade Log Collectors before you install them on the Panorama management server.
    Install the Applications or Applications and Threats update first, and then install any other updates (Antivirus, WildFire®, and URL Filtering), one at a time, and in any sequence.
    Regardless whether your subscription includes both Applications and Threats content, Panorama installs and needs only the Applications content. For details, see Panorama, Log Collector, Firewall, and WildFire Version Compatibility.
    Log in to the Panorama web interface and perform the following steps for each content type:
    1. Select
      Panorama
      Dynamic Updates
      .
    2. Click
      Upload
      , select the content
      Type
      ,
      Browse
      to the location on the host to which you downloaded the update, select the update, and click
      OK
      .
    3. Install From File
      , select the
      Package Type
      , and click
      OK
      .
  8. Upload the plugin version supported on PAN-OS 11.1 for all plugins currently installed on Panorama.
    See the Compatibility Matrix for the Panorama plugin version supported for your target PAN-OS 11.1 release.
    This is required to successfully upgrade Panorama from PAN-OS 11.0 to PAN-OS 11.1. Upgrade to PAN-OS 11.1 is blocked if the supported plugin version is not downloaded.
    The downloaded plugins required to upgrade to PAN-OS 11.1 automatically install after Panorama successfully upgrades to PAN-OS 11.1. If a downloaded plugin does not automatically install, you must manually install the impacted plugin after upgrade to PAN-OS 11.1
    1. Download the plugin version supported on PAN-OS 11.1.
      1. Select
        Updates
        Software Updates
        and select the plugin from the drop-down menu.
      2. Download
        the plugin version supported on PAN-OS 10.2.
      3. Repeat this step for all plugins currently installed on Panorama.
    2. Select
      Panorama
      Plugins
      and
      Upload
      the plugin version you downloaded in the previous step.
      Repeat this step for all plugins currently installed on Panorama.
  9. Upgrade Panorama to the PAN-OS releases along your upgrade path to PAN-OS 11.1.
    1. (
      Panorama in Legacy mode only
      )
      Download
      PAN-OS 10.0.0 and then
      Download
      and
      Install
      PAN-OS 10.0.8 or later release before you continue on your upgrade path.
      This is required to preserve all logs stored on the NFS storage partition. Some logs stored on the NFS storage partition of a Panorama in Legacy mode are deleted if you install PAN-OS 10.0.7 or earlier PAN-OS 10.0 release.
    2. PAN-OS 10.1 introduces a new log format. On upgrade from PAN-OS 10.0 to PAN-OS 10.1, you can choose to migrate logs generated in PAN-OS 8.1 or earlier release. Otherwise, these logs are automatically deleted on successful upgrade to PAN-OS 10.1. During migration, log data is not visible in the ACC or Monitor tabs. While the migration takes place, log data continues forwarding to the appropriate Log Collector but you may experience some impact to performance.
      (
      Panorama in Legacy mode only
      )
      Download
      PAN-OS 10.1.0 and then
      Download
      and
      Install
      PAN-OS 10.1.3 or later release.
      This is required to preserve all logs stored on the NFS storage partition. Some logs stored on the NFS storage partition of a Panorama in Legacy mode are deleted if you install PAN-OS 10.1.2 or earlier PAN-OS 10.1 release.
  10. Download the latest PAN-OS 11.1 release image to a host that can connect and upload content to Panorama either over SCP or HTTPS.
    1. Use a host with internet access to log in to the Palo Alto Networks Customer Support web site.
    2. Download software updates:
      1. On the main page of Palo Alto Networks Customer Support website, click
        Updates
        Software Updates
        .
      2. Locate the model-specific for the latest PAN-OS 11.1 release image. For example, to upgrade an M-Series appliance to Panorama 11.1.0, download the
        Panorama_m-11.1.0
        image; to upgrade a Panorama virtual appliance to Panorama 11.1.0, download the
        Panorama_pc-11.1.0
        image.
        You can quickly locate Panorama images by selecting
        Panorama M Images
        (M-Series appliances) or
        Panorama Updates
        (virtual appliances) from the
        Filter By
        drop-down.
      3. Click the filename and save the file to the host.
  11. Upgrade Panorama to PAN-OS 11.1.
    1. Select
      Panorama
      Software
      and
      Upload
      the PAN-OS 11.1 image you downloaded in the previous step.
    2. Browse
      to the location on the host to which you downloaded the update, select the update,
      Sync To Peer
      if Panorama is in an HA configuration (to push the software image to the secondary peer), and click
      OK
      .
    3. Install the software image and reboot.
      For an HA configuration, Upgrade Panorama in an HA Configuration; otherwise:
      1. Install
        the uploaded image.
      2. After you successfully complete the installation, reboot using one of the following methods:
        • If prompted to reboot, click
          Yes
          . If you see a CMS Login prompt, press Enter without typing a username or password. When the Panorama login prompt appears, enter the username and password you specified during initial configuration.
        • If you are not prompted to reboot,
          Reboot Panorama
          from the Device Operations section (
          Panorama
          Setup
          Operations
          ).
  12. After Panorama reboots, verify that your Panorama plugin versions are supported PAN-OS 11.1.
    You must verify and install Panorama plugin version supported on PAN-OS 11.1 after you successfully upgrade Panorama. See the Compatibility Matrix for more information about supported Panorama plugins supported on PAN-OS 11.1.
    1. Log in to the Panorama web interface and review the General Information widget in the
      Dashboard
      to verify the PAN-OS 11.1 compatible plugin versions successfully installed.
      You can also log in to the Panorama CLI and enter the command
      show plugins installed
      to view the list of currently installed plugins.
    2. Select
      Panorama
      Plugins
      and search for the plugin that did not install.
    3. Install
      the plugin version supported on PAN-OS 11.1.
    4. Repeat the steps above until all plugins installed on Panorama are running the version supported on PAN-OS 11.1.
  13. (
    If local Log Collector is in a Collector Group
    ) Upgrade the remaining Log Collectors in the Collector Group.
  14. (
    Recommended for Panorama mode
    ) Increase the memory of the Panorama virtual appliance to 64GB.
    After you successfully upgrade the Panorama virtual appliance in Panorama mode to PAN-OS 11.1, Palo Alto Networks recommends increasing the memory of the Panorama virtual appliance to 64GB to meet the increased system requirements to avoid any logging, management, and operational performance issues related to an under-provisioned Panorama virtual appliance.
  15. (
    Panorama and managed devices in FIPS-CC mode
    ) Upgrade Panorama and Managed Devices in FIPS-CC Mode.
    Upgrading Panorama and managed devices in FIPS-CC mode requires you to reset the secure connection status of the devices in FIPS-CC mode if added to Panorama management while running a PAN-OS 11.1 release. You need to re-onboard the following managed devices to Panorama management:
    • Managed devices in FIPS-CC mode added to Panorama using the device registration authentication key.
    • Managed devices in the normal operational mode added to Panorama using the device registration authentication key
    You do not need to re-onboard managed devices added to Panorama management while the managed device was running a PAN-OS 10.0 or earlier release.
  16. (
    PAN-OS 10.2 and later releases
    ) Regenerate or re-import all certificates to adhere to OpenSSL Security Level 2.
    This step is required if you upgrade from PAN-OS 10.1 or earlier release to PAN-OS 11.1. Skip this step if you upgrade from PAN-OS 10.2 and have already regenerated or re-imported your certificates.
    It is required that all certificates meet the following minimum requirements:
    • RSA 2048 bits or greater, or ECDSA 256 bits or greater
    • Digest of SHA256 or greater
    See the PAN-OS Administrator's Guide or Panorama Administrator's Guide for more information on regenerating or re-importing your certificates.
  17. Select
    Commit
    Commit and Push
    and
    Commit and Push
    the Panorama managed configuration to all managed devices.
    After you successfully upgrade Panorama and managed devices to PAN-OS 11.1, a full commit and push of the Panorama managed configuration is required before you can push selective configuration to your managed devices and leverage the improved shared configuration object management for multi-vsys firewalls managed by Panorama.

Recommended For You