Jump to:navigation, search
Wiki





notempty
Dieser Artikel bezieht sich auf eine nicht mehr aktuelle Version!

notempty
Der Artikel für die neueste Version steht hier

notempty
Zu diesem Artikel gibt es bereits eine neuere Version, die sich allerdings auf eine Reseller-Preview bezieht





















































De.png
En.png
Fr.png






Description of the update procedure for Securepoint NextGen UTM systems operating as a cluster
Last adaption: 12.4
New:
notempty
This article refers to a Resellerpreview

11.7



Requirements

Software

The systems must always be kept at the current release level. Unpredictable behaviour may occur when updating from an old release.

Only the current version includes the latest functions, security enhancements and bug fixes.

Changelog

Before performing an update, the changelog should be checked as there may be changes to the cluster functionality.
The changelog can be found at the following URL:
http://wiki.securepoint.de/index.php/UTM/Changelog

Flawlessness

Auf den UTM-Systemen sollten keine Fehler oder Störungen vorliegen.

There should be no errors or malfunctions on the UTM systems.

Test of the cluster function

Before the update is carried out on the cluster system, the functionality (see description "Test procedure") must be tested with the current version.
If the test is not successful, the update process may be disrupted.

Contact support for further error analysis.

Configuration backup

Before updating the UTM systems, it should be ensured that current configurations are available and that these can be imported in an emergency.


Implementation

The firmware of the UTMs in a cluster configuration must always be identical. The following instructions should therefore be observed.

Scenario 1: Online update

This scenario assumes that both systems have independently downloaded the latest firmware version.

Step 1
The update must be offered for activation on both UTM systems.
First, the update is activated on the spare UTM.
Die Installation zunächst auf der Spare ermöglicht z.B. eine Prüfung der Einstellungen und Hardware-Kompatibilität
  
Falls noch kein Update automatisch verteilt wurde, kann dieses über → Extras →Firmware Update Button Neueste Firmware herunterladen bezogen werden
New as of v12.4
Step 2

After the update has been installed on the Spare-UTM, the web interface of the Spare-UTM must be called up and checked whether the update has been installed correctly.

Firmware Übertragen: Clusterkonfiguration / Reiter Management
Die soeben installierte Firmware Version kann nun an die Master als Verfügbare Version übertragen werden:
Menü → Netzwerk →ClusterkonfigurationTab Management Schaltfläche Firmware synchronisieren
New as of v12.4
Step 3

Now the update can be installed on the master UTM. During the installation of the update, the master UTM is restarted in the meantime; the spare UTM should take on the role of the active UTM firewall in the cluster.

Step 4

As soon as the update has been successfully installed on the master UTM and it has booted up again, it should take on the role of the active UTM again.
Again, the web interface of the master UTM should be called up to check whether all functions are working properly.


Scenario 2: Offline update

This variant is used for systems without an active Internet connection.

Step 1
If the online update is not available, the update must be installed manually on the spare UTM.
Instructions for updating a UTM firewall can be found here.
The Interactive Installation image can be used for the update.

The images can always be found in the Securepoint Reseller Portal.
The Reseller Portal can be reached at the following URL https://my.securepoint.de:
Step 2
Screenshot 3.jpg

As you can read in the instructions, you should wait for the interaction. For the update, the option Upgrade must be selected.
After the update has been installed on the Spare-UTM, the web interface of the Spare-UTM is called up and checked whether the update has been installed correctly.

Step 3

After a successful check, the update can be carried out on the master UTM.
During the time of the update, the spare UTM takes over the cluster function.

Step 4

As soon as the update has been successfully installed on the master UTM and it has booted up again, it should take on the role of the active UTM again.
Again, the web interface of the master UTM should be called up to check whether all functions are working properly.


Test of the cluster functionality

After the update has been installed on the UTMs, the cluster functionality should still be tested in the event of a failure of the HA interfaces to ensure that the cluster behaves properly in the event of a failure.
If problems occur after the update, a rollback to the previous version can be performed!

Simulation: Failure of the master UTM

Test: The master UTM must be shut down properly via the interface.
Expected behaviour: The spare UTM takes over the function.

Simulation: Failure of an HA interface on the master UTM

Test: The network cable must be removed from an HA marked interface.
Expected behaviour: The spare UTM takes over the function.
Remark: This test should be carried out with each HA interface.

Synchronisation of the configuration

Test: After the successful test, the synchronisation of the configuration between the master and spare UTM must be tested.
Expected behaviour: The synchronisation of the configuration takes place without errors.