After PAN-OS upgrade App/Threat/Anti-virus version unknown in HA info

After PAN-OS upgrade App/Threat/Anti-virus version unknown in HA info

4634
Created On 12/07/23 05:42 AM - Last Modified 08/13/24 18:11 PM


Symptom


After PAN-OS upgrade for the firewalls in an HA setup, the App/Threat/Anti-virus version info is showing unknown in the HA information widget.

Environment


  • NGFW
  • PAN-OS
  • HA is configured and enabled
  • Encryption is enabled for HA1 link


Cause


The issue is caused by the traffic over HA1 link is not encrypted and decrypted properly after the PAN-OS upgrade.

Resolution


Please follow the below Steps to export and import the RSA key for HA key:

1. Export key on PA1: 
From GUI:
image.png

From CLI:
> scp export high-availability-key from HA-key-XXXXXX to user@server_ip:/directory
2. Import key on PA2:
From GUI:
image.png
> scp import high-availability-key from user@server_ip:/directory/HA-key-XXXXXX

3. Repeat step 1 and 2 as above to export the HA key from PA2 and import it into PA1.

4. Enable the encryption and perform a commit on both devices.
image.png
 
5. To finalize the RSA key exchange between HA nodes, access the CLI from each node and SSH to the peer. When prompted to install the RSA token, type yes.
For example: 1.1.1.1 < HA Peer MGT Interface IP address. 
admin@PA-3050> ssh host 1.1.1.1

The authenticity of host '1.1.1.1 (1.1.1.1)' can't be established.

DSA key fingerprint is e9:de:76:fb:db:95:98:7d:c8:45:c4:83:dc:35:f1:2b.

Are you sure you want to continue connecting (yes/no)? yes   <==========

Warning: Permanently added '1.1.1.1' (DSA) to the list of known hosts.

admin@1.1.1.1's password:

 

 


Additional Information


If you have issues with the key or simply want to renew them, use the following CLI command.
Note: Please be aware that this command will cause the firewall to reboot automatically.
> debug system ssh-key-reset high-availability

Executing this command will reset the high-availability SSH keys and reboot the system. Do you want to continue? (y or n)

Broadcast message from root (Fri Mar 29 10:10:28 2013):

The system is going down for reboot NOW!
 
After running the command, it will be necessary to Resync the keys between the two devices by using the SCP export/import commands or through the GUI as previously explained once the device is rebooted.

To avoid the situation of split brain while enabling HA1 encryption on the firewall, please make sure the passive firewall is suspended.
In this way, enabling HA1 encryption and doing a commit on both firewalls won't result in split brain situation and HA1 encryption option is enabled on both HA pair of firewalls.

Reference KB - How to enable encryption on HA1 in high availability configurations


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008W8qCAE&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language