Skip to main content

FORTIGATE ACTIVE PASSIVE UPGRADE

FORTIGATE ACTIVE PASSIVE UPGRADE :

This blog post shows the detailed procedures to follow and to upgrade the firmware in the Fortigate Firewall. This Post was supports for any platform or the Version you are going to upgrade in the Fortigate Firewall

This Post was divided into three parts : Pre-Upgrade Process Upgrade Process Post-Upgrade Process

PRE UPGRADE STEPS:


1   1)   Go to the below website and check the Upgrade Path
https://docs.fortinet.com/upgrade-tool



2)      Next Login to the Fortigate Console and check the HA Status ( it is to be In sync and higher Priority enabled for the required primary device)


3)      Login to the Console and give the command
Config global – get sys ha status

Also check session pickup is in enable to avoid session interruptions in failover.


4)      Download all the Firmware’s and the md5 files in the list and check with the software MD5sum.exe to avoid the download errors.
NOTE: Must and should configuration backup have to take for every version in the above steps because During an upgrade, there is a background process that takes the existing configuration file and changes any commands and settings to comply with the syntax of the new firmware. Skipping a firmware version that should have been part of the upgrade path means that the syntax of one or more commands didn’t get updated to work with the current firmware

5)      Get ready with the Console access for the Disaster recovery plan, ensure you are able to login through console before upgrade.

UPGRADE PROCESS: 

And click the Upgrade, Fortigate will upgrade the slave device first and make the slave reboot.
So there is no impact because the slave device is in the standby mode.
Once the slave device come up with the new firmware then the slave send an heartbeat message to make it as a primary and the old primary device upgrade itself and will automatically reboot.
Now the Primary is the Slave device
And the Secondary is the Old Primary device

We have enabled override and given the priority to the higher value for the old primary device(which is in the slave) so it automatically negotiates and become primary.

Check the get sys ha status command and check the sync status is in sync
Once it is in sync
Repeat the same process for all the versions until you get the required version 6.0.8 

     POST UPGRADE PROCESS: 

              1)  Check both the devices are in the sync and the required device is in the active state
        2)  Check both the devices are in the sync and the required device is in the active state                


            Backup once and  Check the traffic flow


REVERT BACK PROCESS IF ANY ISSUES:


Follow the Path the same in the reverse order to downgrade to the 5.4.7 as shown below
6.0.8 –  5.6.11 – 5.6.9– 5.4.9-5.4.7
Once you are in the 5.4.7 then upload the backup configuration file taken from the old 5.4.7 version

Or else install the 5.4.7 directly and perform factory reset then upload the configuration backup file of 5.4.7



NOTE: Must and should configuration backup have to take for every version in the above steps because During an upgrade, there is a background process that takes the existing configuration file and changes any commands and settings to comply with the syntax of the new firmware. Skipping a firmware version that should have been part of the upgrade path means that the syntax of one or more commands didn’t get updated to work with the current firmware



                                                                                                                                      Written By
                                                                                                                                     G Sudhakar
                                                                                                                                  Network Engineer

Popular posts from this blog

UPGRADING EOS in the ARISTA Switches

UPGRADING EOS in the ARISTA Switches: EOS is the Firmware for Arista Switches whereas IOS for Cisco. This blog post shows the detailed procedures to follow and to upgrade the EOS in the Arista Switches. This Post was supports for any platform or the Version you are going to upgrade in the Arista Switches. This Post was divided into three parts : Pre-Upgrade Process Upgrade Process Post-Upgrade Process PRE-UPGRADING-PROCESS: 1       1)        Check the Upgrade Path tool by clicking the below link. https://www.arista.com/en/support/mlag-portal/mlaglist and confirm it is in mlag issu compatible 2)       Check if the  STP agent is restartable by giving the command switch-1# show spanning-tree bridge detail | grep agent Stp agent restartable                      :            True NOTE :    A switch can continue supporting MLAG when its peer is offline if the STP agent is restartable. When one peer is offline, data traffic flows from the devices through the

VPC in Cisco Nexus and Failover scenarios.

Etherchannel is the technology that binds multiple physical links in to the single logical link in the switch which fools the spanning tree to be visible as a single port id instead of multiple physical ports id's this causes all the ports to be in the forward state to pass the traffic without creating the loops in the network. We can configure the etherchannel either through static or dynamic. Static ether channel works by manually binding the physical ports into one logical port, this is not recommended because it is not aware the state of the other end physical ports whereas LACP (Link aggregation control protocol) and PAGP (Port aggregation group protocol) are the two dynamic protocols. LACP is the IEEE standard and the PAGP is the Cisco proprietary protocol, LACP is the most commonly used protocol in the networks it works by negotiating with the other end of the ports and would form the portchannel once the set of parameters match on both ends. We can bind max 16 ports to a si