Hi!
KB "Keep the flash partition without it being overwritten (For rollback purposes)" seems useful, except, I think it's problematic. It basically, says, we can manipulate which into partition the new firmware image will be stored to keep (original firmware image in) the other partition from being overwritten during upgrade.
However, upgrade is not only about images, it's also about FortiOS configuration migration!!
As per KB, the partition into which the new firmware is one with "Active" is "No", but... (as I understand) the configuration used for FortiOS configuration migration will be sourced from partition with "Active" is "Yes".
So, in KB's step "Upgrade the firmware from 7.0.13 B0566 to 7.2.6 B1575:", the FortiOS configuration will be sourced from partition with the original "6.4.6" configuration, not the upgraded "7.0.13" configuration. And since that original FortiOS configuration was not migrated as per approved "Upgrade Path", we would end up with supposedly incorrect FortiOS configuration after the upgrade.
Is the above conclusion correct?
Thanks!
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Created on 12-18-2024 12:53 PM Edited on 12-18-2024 12:59 PM
> Unlike Cisco, FGTs always "write mem" every time you make changes and exit from the particular config section in CLI or GUI ...
No - as I wrote, "if system global's "cfg-save" is set to 'manual'" - in this case, "running-configuration" and "startup-configuration" will diverge, until "execute cfg save".
> into the active partition/flash.
So, are you implying that at every configuration change to "startup-configuration", the partition with 'Active' flag set to 'Yes' is updated by that configuration change?
Created on 12-18-2024 01:05 PM Edited on 12-18-2024 01:07 PM
If the "cfg-save" is NOT "manual". Again, you have to "exit" from the config context like
config system interface
...
end
Toshi
Created on 12-18-2024 01:08 PM Edited on 12-18-2024 01:09 PM
> So, are you implying that at every configuration change to "startup-configuration", the partition with 'Active' flag set to 'Yes' is updated by that configuration change?
Can you comment/answer?
see above.
If you get in the same FGT with two browser sessions or CLI sessions, then change config on one side then "show" the config on the other side to see when it would be written.
Toshi
Created on 12-18-2024 01:16 PM Edited on 12-18-2024 01:18 PM
> see above.
Hmm.. With respect - I think you're wavering, here. A simple "yes" / "no" would be definitive. I've never seen any KB referring to dynamic modification of partition with 'Active' flag set to 'Yes' (ie. outside of upgrade context, which isn't the case here - now, context is, regular configuration changes) so, this is a crucial point.
"What you see is what you get". Test it yourself. It's so simple thing.
Created on 12-18-2024 01:25 PM Edited on 12-18-2024 01:48 PM
> "What you see is what you get". Test it yourself. It's so simple thing.
not at all..., since I cannot see the content of a partition. I've compared "Used(KB)" from "diagnose sys flash list" before and after a configuration change and saw no difference.
Edit: actually, "since I cannot see the content of a partition" isn't quite true, "fnsysctl ls -l /data/config" does work, but it shows GZ files whose content I cannot see.
Created on 12-18-2024 05:06 PM Edited on 12-18-2024 05:08 PM
I meant for the behaviors of upgrades and partitions.
And, I wouldn't have any further answers it might satisfy you. So open a ticket at TAC and ask the TAC person for your questions.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1731 | |
1098 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.