Upgrade Palo Alto HA Pair (Active/Passive) with CLI

Upgrade Palo Alto HA Pair (Active/Passive) with CLI

I’m a big fan of CLI, I love to use it when I can, it always feels more complete and absolute. A while back I posted how to Upgrade Palo Alto Firewall HA Pair (Active/Passive) in that post I only covered the GUI method this post will detail how to complete everything with CLI only.

Here is step-by-step how to upgrade a Palo Alto Networks firewall in an Active/Passive High Availability Pair with CLI only.

In my example, I am running a Palo Alto Active/Passive HA pair. The firewall named DXT-FW-PA01 is the primary firewall and is the currently Active firewall. The firewall named DXT-FW-PA02 is the secondary and Passive firewall. Both are running PAN-OS 10.2 version 10.2.3. I will be upgrading them to PAN-OS 11.0 version 11.0.2-h2 which is the current preferred release for that version.

The Process

Confirm Upgrade Path

Review Release Notes

Review Upgrade/Downgrade Considerations

Upgrade Checklist

Check Content Updates

Pro tip: The newest one isn’t always the top one listed.

If you want to monitor the progress of the job run the following command with your job id show jobs id

HA Election Settings

This only needs to be done on the primary firewall and only if you have it enabled.

If preemptive is set to yes make a note of that. If it is set to no move on to the Export Running Config section.

Export Running Config

On each firewall, we need to export the running configuration. You will need some kind of TFTP server, you can use something like SolarWinds TFTP.

For me, that command will look like tftp export configuration from running-config.xml to 192.168.3.125

Export Tech Support File

On each firewall, we need to export the tech support file. I personally always prefer doing this with CLI as it is much more verbose and less of a feeling that the process is hung or something.

For me, that command will look like tftp export tech-support to 192.168.3.125

Download PAN-OS Software

In my setup, I will be going from 10.2.3 to 11.0.2-h2. I will need to download PAN-OS versions 11.0.0 and 11.0.2-h2.

Suspend HA on the Active Firewall

Install PAN-OS on the Passive Firewall

Now that DXT-FW-PA01 is the Passive firewall we can perform the install.

Your SSH prompt should no longer show as suspended, if you want to double-check that your firewall is no longer in HA Suspended mode and to view more details about the HA status run the following command show high-availability state

Secondary Firewall

Now that the primary firewall is all upgraded we need to upgrade our secondary firewall.

Suspending the HA on the secondary firewall will make the primary firewall the Active firewall again.

Enable HA Election

If you disabled HA election we need to turn that back on.

That’s all it takes to upgrade a Palo Alto Networks Firewall with CLI only in an Active/Passive High Availability configuration.

Palo Alto does have some basic documentation about performing a PAN-OS upgrade with CLI you can find that here.

Exit mobile version