Created on
04-25-2025
06:39 AM
Edited on
04-25-2025
07:50 AM
By
Jean-Philippe_P
Description |
This article describes how to upgrade the secondary firewall from version x to version y and ensure minimum disruption to network traffic.
|
Scope | FortiGate. |
Solution |
Requirements.
Process steps: Stop Synchronization Between Firewalls. Run the following command on both the primary and secondary firewalls:
execute ha synchronize stop
Verify HA Functionality: Down an unused port on the secondary firewall. Check that this port is not down on the primary firewall. Make sure that config synchronization is not working.
config system interface edit xxx set status down next
Disable ports on the secondary firewall: First, disable the data ports on the secondary firewall using the CLI. Then, disable the HA ports on the secondary firewall using the CLI.
config system interface edit xxx set status down next edit ha set status down next end
Restart the secondary firewall: Restart the secondary firewall before starting the upgrade. Make sure that there are no error crashes after the restart by using the following command:
diagnose debug config-error-log read
Upgrade the secondary firewall: Upgrade the secondary firewall to the following version in order, from x to y.
After each upgrade step is successfully completed: check if there is any corruption in the config with the command 'diagnose debug config-error-log read'.
Re-enable Ports on Secondary Firewall: First, enable HA ports on the Secondary firewall. Then, enable data ports on the Secondary firewall. Verify that the Secondary firewall re-establishes the HA connection with the Primary firewall. Note: It is normal to see 'HA Out of Sync' on the GUI because synchronization is stopped.
Trigger Failover on Primary Firewall: Run the following command on the Primary firewall to redirect traffic to the Secondary firewall:
diagnose sys ha reset-uptime
Verify that traffic is successfully redirected to the Secondary firewall.
Testing and Validation: Verify network functionality and traffic flow by performing the necessary tests. Verify that the secondary firewall, currently the primary, is working properly on version y.
Preparing for Fallback: The primary firewall is at version x and its connections are fully operational, ready for a possible fallback scenario.
Notes:
Conclusion: After the upgrade is complete and all tests are successful, the network should work smoothly on the upgraded secondary firewall. The primary firewall is on standby at the old version to provide a fallback if necessary. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.