PA-5200 Series Next-Gen Firewall
Hardware Reference
paloaltonetworks.com/documentation
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
About the Documentation
• For the most recent version of this guide or for access to related documentation, visit the Technical
Documentation portal www.paloaltonetworks.com/documentation.
• To search for a specific topic, go to our search page www.paloaltonetworks.com/documentation/
document-search.html.
• Have feedback or questions for us? Leave a comment on any page in the portal, or write to us at
2019-2019 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
April 8, 2019
2 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE |
Table of Contents
Before You Begin................................................................................................5
PA-5200 Series Firewall Overview.............................................................. 13
PA-5200 Front Panel............................................................................................................................... 15
PA-5200 Back Panel................................................................................................................................ 18
Install the PA-5200 Series Firewall in an Equipment Rack..................... 19
Install the PA-5200 Series Firewall in a 19-inch Equipment Rack................................................21
Install the Four-Post Rack Kit on a PA-5200 Series Firewall.........................................................22
Connect Power to a PA-5200 Series Firewall........................................... 25
Connect AC Power to a PA-5200 Series Firewall............................................................................ 27
Connect DC Power to a PA-5200 Series Firewall............................................................................28
Service the PA-5200 Series Firewall........................................................... 31
Interpret the LEDs on a PA-5200 Series Firewall............................................................................ 33
Replace the Air Intake Filters on a PA-5200 Series Firewall......................................................... 35
Replace a Fan Tray on a PA-5200 Series Firewall........................................................................... 37
Replace a Power Supply on a PA-5200 Series Firewall.................................................................. 38
Replace an AC Power Supply on a PA-5200 Series Firewall.............................................38
Replace a DC Power Supply on a PA-5200 Series Firewall...............................................39
Replace a Drive on a PA-5200 Series Firewall..................................................................................41
Replace a Log Drive on a PA-5200 Series Firewall............................................................. 41
Replace a System Drive on a PA-5200 Series Firewall.......................................................45
PA-5200 Series Firewall Specifications.......................................................51
PA-5200 Series Physical Specifications.............................................................................................. 53
PA-5200 Series Electrical Specifications.............................................................................................54
PA-5200 Series Environmental Specifications...................................................................................55
PA-5200 Series Miscellaneous Specifications................................................................................... 56
PA-5200 Series Firewall Compliance Statements Overview..................57
PA-5200 Series Firewall Compliance Statements............................................................................ 59
TABLE OF CONTENTS iii
iv TABLE OF CONTENTS
Before You Begin
Read the following topics before you install or service a Palo Alto Networks® next-generation
firewall or appliance. The following topics apply to all Palo Alto Networks firewalls and
appliances except where noted.
To ensure that products purchased from Palo Alto Networks were not tampered with during shipping, verify
the following upon receipt of each product:
• The tracking number provided to you electronically when ordering the product matches the tracking
number that is physically labeled on the box or crate.
• The integrity of the tamper-proof tape used to seal the box or crate is not compromised.
• The integrity of the warranty label on the firewall or appliance is not compromised.
(PA-7000 Series firewalls only) PA-7000 Series firewalls are modular systems and therefore
do not include a warranty label on the firewall.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Before You Begin 7
To avoid personal injury or death for yourself and others and to avoid damage to your Palo Alto Networks
hardware, be sure you understand and prepare for the following warnings before you install or service the
hardware. You will also see warning messages throughout the hardware reference where potential hazards
exist.
All Palo Alto Networks products with laser-based optical interfaces comply with 21 CFR
1040.10 and 1040.11.
The following safety warnings apply to all Palo Alto Networks firewalls and appliances, unless a specific
hardware model is specified.
• When installing or servicing a Palo Alto Networks firewall or appliance hardware component that has
exposed circuits, ensure that you wear an electrostatic discharge (ESD) strap. Before handling the
component, make sure the metal contact on the wrist strap is touching your skin and that the other end
of the strap is connected to earth ground.
French Translation: Lorsque vous installez ou que vous intervenez sur un composant matériel de
pare-feu ou de dispositif Palo Alto Networks qui présente des circuits exposés, veillez à porter un
bracelet antistatique. Avant de manipuler le composant, vérifiez que le contact métallique du bracelet
antistatique est en contact avec votre peau et que l’autre extrémité du bracelet est raccordée à la terre.
• Use grounded and shielded Ethernet cables to ensure agency compliance with electromagnetic
compliance (EMC) regulations.
French Translation: D es câbles Ethernet blindés reliés à la terre doivent être utilisés pour garantir la
conformité de l'organisme aux émissions électromagnétiques (CEM).
• (PA-220 firewalls only) The PA-220 firewall meets the requirements of IEC 61000-4-5 surge immunity
test. To prevent damage from electrical surges on Ethernet ports, we recommend that you use an
Ethernet surge protection device with the following specifications:
• Rated for Gigabit Ethernet up to category 5E and minimum 1Gbps.
• Protection provided on all eight signal leads.
• Both line-to-line and line-to-ground/shield are provided.
• Protection device must be connected to earth ground and use shielded category 5E or higher
Ethernet cable.
Technical Specifications:
• Protective circuit complies with IEC test classifications B2, C1, C2, C3, and D1.
• Normal discharge current (core to earth ground) is 2kA per signal pair.
• Normal discharge current (core to core) is 100A.
• Total discharge current is 10kA.
• French Translation: (PA-220 uniquement) Les pare-feux PA-220 sont conformes aux exigences du test
d’immunité aux surtensions IEC 61000-4-5. Pour éviter les dommages résultant de surtension électrique
sur les ports Ethernet, il est recommandé d’utiliser un dispositif de protection contre les surtensions aux
caractéristiques suivantes:
• Le circuit de protection est conforme aux classifications de test IEC B2, C1, C2, C3, et D1.
• Le courant de décharge normal (cœur vers terre) est de 2kA par paire de signal.
• Le courant de décharge normal (cœur vers cœur) est de 100 A.
• Le courant de décharge total est de 10kA.
• Do not connect a supply voltage that exceeds the input range of the firewall or appliance. For details
on the electrical range, refer to electrical specifications in the hardware reference for your firewall or
appliance.
French Translation: Veillez à ce que la tension d’alimentation ne dépasse pas la plage d’entrée du
pare-feu ou du dispositif. Pour plus d’informations sur la mesure électrique, consulter la rubrique des
caractéristiques électriques dans la documentation de votre matériel de pare-feu ou votre dispositif.
• Do not replace a battery with an incorrect battery type; doing so can cause the replacement battery to
explode. Dispose of used batteries according to local regulations.
French Translation: Ne remplacez pas la batterie par une batterie de type non adapté, cette dernière
risquerait d’exploser. Mettez au rebut les batteries usagées conformément aux instructions.
• (All firewalls with two or more power supplies) Disconnect all power cords (AC or DC) from the power
inputs to fully de-energize the hardware.
French Translation: (Tous les pare-feux avec au moins deux sources d’alimentation) Débranchez tous les
cordons d’alimentation (c.a. ou c.c.) des entrées d’alimentation et mettez le matériel hors tension.
• (PA-7000 Series firewalls only) When removing a fan tray from a PA-7000 Series firewall, first pull the
fan tray out about 1 inch (2.5cm) and then wait a minimum of 10 seconds before extracting the entire
fan tray. This allows the fans to stop spinning and helps you avoid serious injury when removing the
fan tray. You can replace a fan tray while the firewall is powered on but you must replace it within 45
seconds and you can only replace one fan tray at a time to prevent the thermal protection circuit from
shutting down the firewall.
French Translation: (Pare-feu PA-7000 uniquement) Lors du retrait d’un tiroir de ventilation d’un pare-
feu PA-7000, retirez tout d’abord le tiroir sur 2,5 cm, puis patientez au moins 10 secondes avant de
retirer complètement le tiroir de ventilation. Cela permet aux ventilateurs d’arrêter de tourner et permet
d’éviter des blessures graves lors du retrait du tiroir. Vous pouvez remplacer un tiroir de ventilation
lors de la mise sous tension du pare-feu. Toutefois, vous devez le faire dans les 45 secondes et vous ne
pouvez remplacer qu’un tiroir à la fois, sinon le circuit de protection thermique arrêtera le pare-feu.
• (All firewalls with two or more power supplies) Disconnect all power cords (AC or DC) from the power
inputs to fully de-energize the hardware.
French Translation: (Tous les pare-feux avec au moins deux sources d’alimentation) Débranchez tous les
cordons d’alimentation (c.a. ou c.c.) des entrées d’alimentation et mettez le matériel hors tension.
The following applies only to Palo Alto Networks firewalls that support a direct current (DC) power source:
French Translation: Les instructions suivantes s’appliquent uniquement aux pare-feux de Palo Alto
Networks prenant en charge une source d’alimentation en courant continu (c.c.):
• Do not connect or disconnect energized DC wires to the power supply.
French Translation: Ne raccordez ni débranchez de câbles c.c. sous tension à la source d’alimentation.
• The DC system must be earthed at a single (central) location.
French Translation: Le système c.c. doit être mis à la terre à un seul emplacement (central).
• The DC supply source must be located within the same premises as the firewall.
French Translation: La source d’alimentation c.c. doit se trouver dans les mêmes locaux que ce pare-feu.
• The DC battery return wiring on the firewall must be connected as an isolated DC (DC-I) return.
French Translation: Le câblage de retour de batterie c.c. sur le pare-feu doit être raccordé en tant que
retour c.c. isolé (CC-I).
10 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Before You Begin
• The firewall must be connected either directly to the DC supply system earthing electrode conductor
or to a bonding jumper from an earthing terminal bar or bus to which the DC supply system earthing
electrode conductor is connected.
French Translation: Ce pare-feu doit être branché directement sur le conducteur à électrode de mise à
la terre du système d’alimentation c.c. ou sur le connecteur d'une barrette/d'un bus à bornes de mise à la
terre auquel le conducteur à électrode de mise à la terre du système d'alimentation c.c. est raccordé.
• The firewall must be in the same immediate area (such as adjacent cabinets) as any other equipment that
has a connection between the earthing conductor of the DC supply circuit and the earthing of the DC
system.
French Translation: Le pare-feu doit se trouver dans la même zone immédiate (des armoires adjacentes
par exemple) que tout autre équipement doté d’un raccordement entre le conducteur de mise à la terre
du même circuit d’alimentation c.c. et la mise à la terre du système c.c.
• Do not disconnect the firewall in the earthed circuit conductor between the DC source and the point of
connection of the earthing electrode conductor.
French Translation: Ne débranchez pas le pare-feu du conducteur du circuit de mise à la terre entre la
source d'alimentation c.c. et le point de raccordement du conducteur à électrode de mise à la terre.
• Install all firewalls that use DC power in restricted access areas only. A restricted access area is where
access is granted only to craft (service) personnel using a special tool, lock and key, or other means of
security, and that is controlled by the authority responsible for the location.
French Translation: Tous les pare-feux utilisant une alimentation c.c. sont conçus pour être installés
dans des zones à accès limité uniquement. Une zone à accès limité correspond à une zone dans laquelle
l’accès n’est autorisé au personnel (de service) qu'à l'aide d'un outil spécial, cadenas ou clé, ou autre
dispositif de sécurité, et qui est contrôlée par l'autorité responsable du site.
• Install the firewall DC ground cable only as described in the power connection procedure for the firewall
that you are installing. You must use the American wire gauge (AWG) cable specified and torque all nuts
to the torque value specified in the installation procedure for your firewall.
French Translation: Installez le câble de mise à la terre c.c. du pare-feu comme indiqué dans la procédure
de raccordement à l’alimentation pour le pare-feu que vous installez. Utilisez le câble American wire
gauge (AWG) indiqué et serrez les écrous au couple indiqué dans la procédure d’installation de votre
pare-feu pare-feu.
• The firewall permits the connection of the earthed conductor of the DC supply circuit to the earthing
conductor at the equipment as described in the installation procedure for your firewall.
French Translation: Ce pare-feu permet de raccorder le conducteur de mise à la terre du circuit
d’alimentation c.c. au conducteur de mise à la terre de l’équipement comme indiqué dans la procédure
d’installation du pare-feu.
• A suitably-rated DC mains disconnect device must be provided as part of the building installation.
French Translation: Un interrupteur d'isolement suffisant doit être fourni pendant l'installation du
bâtiment.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Before You Begin 11
12 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Before You Begin
PA-5200 Series Firewall Overview
The Palo Alto Networks® PA-5200 Series next-generation firewalls are designed for data
center and internet gateway deployments. This series is comprised of the PA-5220, PA-5250,
PA-5260, and PA-5280 firewalls. These models provide flexibility in performance and
throughput levels to help you meet your deployment requirements. All models in this series
provide next-generation security features to help you secure your organization through
advanced visibility and control of applications, users, and content.
The PA-5280 firewall is identical to the PA-5260 firewall except that the
PA-5280 firewall has double the dataplane memory, which doubles the session
capacity.
The following topics describe the hardware features of the PA-5200 Series firewalls. To view
or compare performance and capacity information, refer to the Product Selection tool.
> PA-5200 Front Panel
> PA-5200 Back Panel
13
14 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall Overview
The following image shows the front panel of the PA-5200 Series firewall and the table describes each front
panel component. The only differences between the PA-5220 (shown), PA-5250, PA-5260, and PA-5280
panels is the model name and the Ethernet port speeds as described in the table.
ItemComponentDescription
1Ethernet ports 1 through 4Four RJ-45 100Mbps/1Gbps/10Gbps ports for
network traffic.
The link speed and link duplex are auto-negotiate
only.
2SFP ports 5 through 20Sixteen SFP/SFP+ ports for network traffic.
Each port can operate as either SFP (1Gbps) or SFP+
(10Gbps) based on the installed transceiver.
3QSFP+ ports 21 through 24These ports vary depending on your firewall model:
• PA-5220 firewall—Four 40Gbps QSFP+ ports as
defined by the IEEE 802.3ba standard.
• PA-5250, PA-5260, and PA-5280 firewalls—
Four 40Gbps QSFP+/100Gbps QSFP28 ports as
defined by the IEEE 802.3ba standard. The link
speed is based on the installed transceiver.
4HSCI portThese ports vary depending on your firewall model:
• PA-5220 firewall—One QSFP+ 40Gbps port
(supports only a 40Gbps (QSFP+) transceiver or
QSFP+ active optical cable).
• PA-5250, PA-5260, and PA-5280 firewalls—One
QSFP28 40/100Gbps port (supports 40Gbps
(QSFP+) or 100Gbps transceiver (QSFP28) or
equivalent active optical cables). The link speed is
based on the installed transceiver. Use this port
to connect two PA-5200 Series firewalls in a high
availability (HA) configuration as follows:
• In an active/passive configuration, this port is
for HA2 (data link).
• In an active/active configuration, you can
configure this port for HA2 and/or HA3.
HA3 is used for packet forwarding for
asymmetrically routed sessions that require
Layer 7 inspection for App-ID™ and ContentID™.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall Overview 15
The HSCI ports must be
connected directly between
the two firewalls in the HA
configuration (not between
a network switch or router).
When directly connecting
the HSCI ports between two
PA-5220 firewalls that are
physically located near each
other, Palo Alto Networks
recommends that you use a
40Gbps QSFP+ Active Optical
Cable (AOC). When directly
connecting two PA-5250,
PA-5260, or PA-5280 firewalls,
use either a 40Gbps QSFP+
Active Optical Cable (AOC)
or a 100Gbps QSFP28 Active
Optical Cable (AOC).
For installations where
the two firewalls are not
near each other and you
cannot use an AOC cable,
use a standard 40Gbps or
100Gbps transceivers and the
appropriate cable length.
5AUX 1 and AUX 2 portsUse these SFP+ ports for HA1, management
functions, or log forwarding to Panorama.
For information on configuring the port, refer to
the on-device Help content in Device > Setup >
Interfaces or refer to the PAN-OS 9.0 Web Interface
Reference.
6HA1-A and HA1-BTwo RJ-45 10/100/1000Mbps ports for high-
availability control (HA1).
7CONSOLE port
(RJ-45)
Use this port to connect a management computer to
the firewall using a 9-pin serial to RJ-45 cable and
terminal emulation software.
The console connection provides access to firewall
boot messages, the Maintenance Recovery Tool
(MRT), and the command line interface (CLI).
If your management computer does
not have a serial port, use a USB-toserial converter.
Serial Settings
Data rate: 9600
16 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall Overview
Bootstrapping enables you to provision the firewall
with a specific PAN-OS configuration and then
license it and make it operational on your network.
9MGT portUse this Ethernet 10/100/1000Mbps port to
access the management web interface and perform
administrative tasks. The firewall also uses this port
for management services, such as retrieving licenses
and updating the threat and application signatures.
10LED status indicatorsFive LEDs that indicate the status of the firewall
hardware components (see Interpret the LEDs on a
PA-5200 Series Firewall).
11Intake air filtersTwo filters for air entering the firewall.
Replace the Air Intake Filters on a PA-5200 Series
Firewall every six months.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall Overview 17
The following image shows the back panel of PA-5200 Series firewalls and the table describes each backpanel component. The only difference between PA-5200 Series firewall back panels is the power supply
type installed—they each can have two AC or two DC power supplies. The image shows a PA-5220 firewall
with AC power supplies. To view an image of the DC power supplies, see Connect DC Power to a PA-5200
Series Firewall.
ItemComponentDescription
1SYS 1 and SYS 2 drivesTwo hot-swappable 240GB solid-state drives (SSDs) in a
RAID-1 pair (240GBs total). The drives are used to store the
PAN-OS system files and system logs.
2LOG 1 and LOG 2 drivesTwo hot-swappable 2TB hard disk drives (HDDs) in a RAID-1
pair (2TBs total). The drives are used to store network traffic
logs.
3Exhaust fans traysTwo fan trays that provide ventilation and cooling for the
firewall. Each fan tray contains four fans and a status LED.
While facing the back of the firewall, fan tray 1 is on the left
and fan tray 2 is on the right.
Do not use the fan tray handles to lift or move
the firewall.
4PWR 1 and PWR2Use the power supply inputs (either AC or DC) to connect
power to the firewall.
While facing the back of the firewall, PWR 1 is on the left and
PWR 2 is on the right.
5Ground studUse the two-post ground stud to connect the firewall to earth
ground. The firewall ships with a 6AWG two-hole ground lug
attached to the ground studs, but does not include a ground
cable.
18 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall Overview
Install the PA-5200 Series Firewall in an
Equipment Rack
The PA-5200 Series next-generation firewall ships with two rack-mount brackets for
installation in a two-post or four-post 19” equipment rack. If you install the firewall in a fourpost rack, you can purchase and install the optional four-post rack kit to secure the firewall to
the back rack posts for additional support.
> Install the PA-5200 Series Firewall in a 19-inch Equipment Rack
> Install the Four-Post Rack Kit on a PA-5200 Series Firewall
19
20 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Install the PA-5200 Series Firewall in
Install the PA-5200 Series Firewall in a 19-inch
Equipment Rack
The following procedure describes how to install the PA-5200 Series firewall in a two-post or four-post
equipment rack.
When installing the firewall in a two-post equipment rack, ensure that the rack is properly
anchored and can support the weight of the installed equipment.
STEP 1 |
STEP 2 |
Attach one rack-mount bracket to each side of the firewall using nine #8-32 x 5/16” screws for
each bracket and torque to 15 in-lbs. For a two-post rack, we recommend you install the front
brackets in the mid-mount position as shown. You can also install the brackets in the frontmount position if you Install the Four-Post Rack Kit on a PA-5200 Series Firewall.
With help from two other people, hold the firewall in place in the rack and secure the rackmount brackets to the rack using four screws for each bracket. Use the appropriate screws
(#10-32 x 3/4” or #12-24 x 1/2”) for your rack and torque to 25 in-lbs. Use cage nuts (not
provided) to secure the screws if the rack has square holes.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Install the PA-5200 Series Firewall in an Equipment
Install the Four-Post Rack Kit on a PA-5200
Series Firewall
The following procedure describes how to install the optional four-post rack kit (PAN-PA-5200-RACK4) to
provide additional support to the back of the firewall. This kit supports rack depths from 23 to 32 inches
(measured between the inner-parts of the vertical rails).
STEP 1 |
STEP 2 |
Attach one rack-mount bracket to each side of the firewall in the front-mount position using
nine #8-32 x 5/16” screws for each bracket and torque to 15 in-lbs.
Attach one rack-mount rail to each side of the firewall using four #8-32 x 5/16” screws for
each bracket and torque to 15 in-lbs. The side brackets are universal but you must install them
with the beveled edge facing the firewall.
STEP 3 |
With help from two other people, hold the firewall in the rack and secure the rack-mount
brackets to the front rack posts using four screws for each bracket. Use the appropriate screws
(#10-32 x 3/4” or #12-24 x 1/2”) for your rack and torque to 25 in-lbs. Use cage nuts (not
provided) to secure the screws if the rack has square holes.
22 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Install the PA-5200 Series Firewall in
Slide one back rack-mount bracket onto each of the two previously installed side rack-mount
rails and secure the brackets to the back rack posts using four screws for each bracket (#10-32
x 3/4” or #12-24 x 1/2”) and torque to 25 in-lbs. Use cage nuts (not provided) to secure the
screws if the rack has square holes.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Install the PA-5200 Series Firewall in an Equipment
24 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Install the PA-5200 Series Firewall in
an Equipment Rack
Connect Power to a PA-5200 Series
Firewall
PA-5200 Series firewalls have either two AC or two DC power supplies (the second power
supply is for redundancy). The firewall requires a 100-240VAC (50-60 Hz) or -40 to -60VDC
power source, depending on the type of power supplies installed in the firewall (AC or DC).For
more details on power requirements and power consumption, see PA-5200 Series Electrical
Specifications.
The power configuration (AC or DC) can be changed in the field. However, you
cannot install both an AC and DC power supply in the same firewall.
> Connect AC Power to a PA-5200 Series Firewall
> Connect DC Power to a PA-5200 Series Firewall
25
26 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Connect Power to a PA-5200 Series
The following procedure describes how to connect AC power to a PA-5200 Series firewall with AC power
supplies.
To avoid injury to yourself or damage to your Palo Alto Networks® hardware or the data that
resides on the hardware, read the Product Safety Warnings.
STEP 1 |
STEP 2 |
STEP 3 |
Remove the two nuts and star washers from the ground studs on the back of the firewall and
then remove the two-hole ground lug.
Crimp a 6AWG ground cable (not included) to the two-hole 6AWG ground lug and then attach
the ground lug to the ground studs on the firewall. Replace the star washers and nuts and
torque to 25 in-lbs. Connect the other end of the cable to earth ground.
Connect the AC power cord to power input 1 (PWR 1) and connect a second power cord to
power input 2 (PWR 2).
STEP 4 |
STEP 5 |
Secure the power cords to the power supplies using the Velcro straps.
Connect the other end of the power cords to an AC power source. After the first power supply
is connected, the firewall powers on and the power LED on the power supply and the PWR
LED on the front of the firewall turns green.
Connect the second power cord through a different circuit breaker to provide power redundancy and to
allow for electrical circuit maintenance.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Connect Power to a PA-5200 Series Firewall 27
The following procedure describes how to connect DC power to a PA-5200 Series firewall with DC power
supplies.
To avoid injury to yourself or damage to your Palo Alto Networks® hardware or the data that
resides on the hardware, read the Product Safety Warnings.
STEP 1 |
STEP 2 |
STEP 3 |
STEP 4 |
Remove the two nuts and star washers from the ground studs on the back of the firewall and
then remove the two-hole ground lug.
Crimp a 6AWG ground cable (not included) to the two-hole 6AWG ground lug and then attach
the ground lug to the ground studs on the firewall. Replace the star washers and nuts and
torque to 25 in-lbs. Connect the other end of the cable to earth ground.
Power off the DC power source that you will connect to the firewall.
Attach the DC power cables (not included) from the DC power source to the DC power
supplies on the back of the firewall.
1. Remove the plastic DC power input cover from each of the two DC power supplies and then remove
the positive and negative terminal screws.
2. Crimp ring lugs to the ends of the DC cables. These lugs are used to connect the DC cables to the DC
inputs on the firewall.
3. Use the DC terminal screws to connect a positive (red) DC power cable to the positive terminal
on the first DC power supply and then connect a negative (black) DC power cable to the negative
terminal. Repeat this step for the second DC power supply using separate positive and negative
cables.
4. Replace the plastic covers over each DC power input.
5. Connect the two positive and two negative DC power cables to your power source, ensuring that you
observe the correct polarity (positive to positive and negative to negative).
28 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Connect Power to a PA-5200 Series
30 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Connect Power to a PA-5200 Series
Firewall
Service the PA-5200 Series Firewall
The following topics describe how to interpret the PA-5200 Series firewall status LEDs and
describes how to replace the serviceable components.
> Interpret the LEDs on a PA-5200 Series Firewall
> Replace the Air Intake Filters on a PA-5200 Series Firewall
> Replace a Fan Tray on a PA-5200 Series Firewall
> Replace a Power Supply on a PA-5200 Series Firewall
> Replace a Drive on a PA-5200 Series Firewall
31
32 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall
The following table describes how to interpret the status LEDs on a PA-5200 Series firewall.
LEDDescription
Front Panel LEDs
PWR (Power)Green—The firewall is powered on.
Off—The firewall is not powered on or an error occurred with the internal
power system (for example, power is not within tolerance levels).
STS (Status)Green—The firewall is operating normally.
Yellow—The firewall is booting.
HA (High Availability)Green—The firewall is the active peer in an active/passive configuration.
Yellow—The firewall is the passive peer in an active/passive configuration.
Off—High availability (HA) is not operational on this firewall.
In an active/active configuration, the HA LED only
indicates HA status for the local firewall and has two
possible states (green or off); it does not indicate HA
connectivity of the peer. Green indicates that the firewall is
either active-primary or active-secondary and off indicates
that the firewall is in any other state (For example, nonfunctional or suspended).
TMP (Temperature)Green—The firewall temperature is normal.
Yellow—The firewall temperature is outside tolerance levels.
See PA-5200 Series Environmental Specifications for the temperature
range.
FANSGreen—The fan trays and all fans are operating normally.
Red—One or more fans failed on one or both of the fan trays. To
determine which fan tray has a failure, check the system log or check the
LED on the fan trays.
PWR 1 and PWR 2 (Power)While facing the back of the firewall, power supply 1 (PWR 1) is on the left
and power supply 2 (PWR 2) is on the right.
Green—The power supply is functioning normally.
Red—Power supply is present but is not working.
ALM (Alarm)Red—A hardware component failed, such as a power supply failure, a
firewall failure that caused an HA failover, a drive failure, or hardware is
overheating and the temperature is above the high temperature threshold.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 33
Replace the Air Intake Filters on a PA-5200
Series Firewall
The air intake filters are a critical part of the firewall cooling system. These filters ensures that air entering
the firewall does not contain debris. We recommend that you replace both filters (top and bottom) every six
months or less, depending on the environment where the firewall is located, to prevent a scenario where
there is not enough air passing through the filters to keep the firewall from overheating.
The firewall does not generate a system log indicating that an air filter has been removed or
that it needs to be replaced. Therefore, in addition to replacing them every six months (or
as needed), you need to schedule regular inspections and ensure that the filters do not clog
sooner than when they are due to be replaced. Do not attempt to clean and reuse a filter.
You can purchase replacement air filters and air filter covers from Palo Alto Networks or an authorized
reseller. The following procedure can be performed with the firewall powered on but do not leave the
firewall without the filters installed for longer than it takes to replace the filters.
STEP 1 |
STEP 2 |
Turn the two air filter cover thumb screws counter-clockwise and remove the filter cover and
filter (top filter shown).
Lift each side of the filter upward to loosen it from the filter cover and then slide the filter out
of the filter cover.
STEP 3 |
Install a new filter into the filter cover ensuring that you slide it under the filter cover cross
bars. You can install the filter with either side facing up.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 35
PA-5200 Series firewalls have two fan trays and each fan tray contains four fans. If one fan on a fan tray
fails, the LED on the fan tray turns red. When this occurs, immediately replace the fan tray to avoid service
interruption. If two or more fans fail on one or both fan trays, the firewall will shut down and you must
replace the failed fan tray(s) to restore functionality.You can replace a fan tray while the firewall is powered
on but you must replace it within 45 seconds or the thermal protection circuit automatically shuts down the
firewall.
STEP 1 |
STEP 2 |
STEP 3 |
STEP 4 |
Remove the replacement fan tray from the packaging.
Identify the failed fan tray by viewing the LEDs.
During a failure condition, the fan tray LED on the failed fan tray and the FANS LED on the front of the
firewall show red.
Remove the failed fan tray.
1. Turn the two fan tray thumb screws counter-clockwise until the screws stop.
Earlier models will have four fan-tray thumb screws rather than two. The procedure for
both setups is the same.
2. Grasp the fan tray handle and pull the tray out of the firewall.
Slide the replacement fan tray into the empty fan-tray slot ensuring that the alignment grooves
on the fan tray and the fan-tray slot are aligned. Push the tray in until it seats and then turn the
four fan-tray thumb screws clockwise to secure the tray to the firewall.
The fan tray LED turns green and if there are no other failed fans, the FAN LED on the front of the
firewall turns green.
If the thermal protection circuit powered off the firewall due to overheating or fan failures, you need
to disconnect and reconnect power. On an AC model, disconnect both power cords, wait five seconds,
and then plug the cords back in. On a DC model, shut down the DC circuit that is providing power to the
firewall, wait five seconds, and then restore the power.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 37
Replace a Power Supply on a PA-5200 Series
Firewall
PA-5200 Series firewalls have either two AC or two DC power supplies (the second power supply is for
redundancy). If one power supply fails, you can replace it without service interruption as described in the
following procedures.
• Replace an AC Power Supply on a PA-5200 Series Firewall
• Replace a DC Power Supply on a PA-5200 Series Firewall
Replace an AC Power Supply on a PA-5200 Series Firewall
The following procedure describes how to replace an AC power supply.
To avoid injury to yourself or damage to your Palo Alto Networks® hardware or the data that
resides on the hardware, read the Product Safety Warnings.
STEP 1 |
STEP 2 |
STEP 3 |
STEP 4 |
Identify the failed power supply by viewing the power supply LED on the back of the firewall;
when there is a failure the FAIL LED turns solid yellow. For details on the power supply LEDS,
see Interpret the LEDs on a PA-5200 Series Firewall.
Remove the Velcro strap that secures the AC power cord to the power supply and remove the
power cord.
Grasp the handle on the failed power supply and then simultaneously press the release lever to
the left and then pull the power supply outward to remove it.
Remove the replacement power supply from the packaging and slide it into the empty power
supply slot. Push the power supply all the way in until the release lever clicks and secures the
power supply.
STEP 5 |
Connect the AC power cord to the power supply input and secure it to the power supply using
the Velcro strap.
38 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall
Connect the other end of the power cord to a grounded AC power source. The new power
supply automatically powers on, the OK LED turns green, the FAIL LED turns off, and the
power LED (PWR 1 or PWR 2) on the front of the firewall turns green.
Replace a DC Power Supply on a PA-5200 Series Firewall
The following procedure describes how to replace a DC power supply.
To avoid injury to yourself or damage to your Palo Alto Networks® hardware or the data that
resides on the hardware, read the Product Safety Warnings.
STEP 1 |
STEP 2 |
STEP 3 |
STEP 4 |
Identify the failed power supply by viewing the power supply LED on the back of the firewall;
when there is a failure, the FAIL LED on the failed power supply turns solid yellow. For more
details on the power supply LEDS, see Interpret the LEDs on a PA-5200 Series Firewall.
Power off the DC power source that is connected to the failed DC power supply.
Ensure that the power is off before continuing to the next step.
Remove the plastic cover that protects the DC input terminals and then use a Phillips-head
screwdriver to remove the screws holding the positive and negative DC cables to the DC input
terminals.
Grasp the handle on the failed power supply and then simultaneously press the release lever to
the left and pull the power supply outward to remove it.
STEP 5 |
Remove the replacement power supply from the packaging and slide it into the empty power
supply slot. Push the power supply all the way in until the release lever clicks and secures the
power supply.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 39
The PA-5200 Series firewalls have two solid-state drives (SSDs) used for system files and system logs and
two hard-disk drives (HDDs) used for network traffic log storage. Each drive pair is in a RAID 1 array so that
if a drive fails, you can replace the failed drive (using the same model drive) without service interruption.
The system drives are labeled SYS 1 and SYS 2 and the log drives are labeled LOG 1 and LOG 2.
When ordering a replacement drive from Palo Alto Networks or your reseller, you receive
two drives. This ensures that if the replacement drive is not the same model as the failed
drive, you can install two new matching drives. If the replacement drive model is the same as
the failed drive, you need only replace one failed drive and can store the second drive as a
spare. For firewalls in an HA pair, there is no requirement that the drive sizes match between
the paired systems.
The procedures to replace a system drive (SSD) and a log drive (HDD) are different.
• Replace a Log Drive on a PA-5200 Series Firewall
• Replace a System Drive on a PA-5200 Series Firewall
Replace a Log Drive on a PA-5200 Series Firewall
The following procedure describes how to replace a failed log drive. There are two scenarios: one where
the replacement drive is the same model as the failed drive and one where the replacement drive is not the
same model.
STEP 1 |
In a high availability (HA) configuration, if one log drive fails (or if both log drives fail) in the
active firewall, the firewall enters the non-functional HA state and fails over. If the firewall is
not in an HA configuration and one log drive fails, the firewall continues to operate. If both
log drives fail in a non-HA configuration, the firewall continues to operate but it does not log
network traffic and you cannot commit the configuration until there is at least one functioning
log drive.
Identify the failed drive and determine the drive model by running the following operational
command to view the status and model fields:
admin@PA-5020> show system raid detail
The following output shows that the Log1 drive failed and that the model number of that drive is
ST2000NX0253. The system log also shows an error that indicates which drive failed (Log1 or Log2).
Disk Pair Log Available
Status clean, degraded
Disk id Log1 Present
model : ST2000NX0253
size : 1907729 MB
status : failed
Disk id Log2 Present
model : ST2000NX0253
size : 1907729 MB
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 41
Remove the failed drive from the RAID 1 array configuration. In this example, run the following
command to remove the Log1 drive from the array:
admin@PA-5020> request system raid remove log1
Press the ejector button on the drive carrier to release the carrier handle and gently pull the
handle toward you to remove the carrier and drive.
The illustration shows how to remove a system (SYS) drive. The procedure to remove a log drive is the
same.
Remove the replacement drive from the packaging and determine the drive model. You will
compare this model number with the model number of the failed drive to determine which
replacement procedure to use in 7.
STEP 5 |
STEP 6 |
Install the replacement drive in the drive carrier.
1. Remove the replacement drive from the antistatic bag and place it on an antistatic surface. Place the
failed drive next to the replacement drive with the connectors facing the same direction.
2. Remove the four screws that hold the failed drive in the carrier and remove the drive from the
carrier.
3. Install the replacement drive in the carrier and secure it using the four screws you removed from the
failed drive.
The illustration shows an SSD system drive and an HDD log drive; the procedure to swap the drive is the
same for both.
Install the carrier with the replacement drive:
1. Ensure that the drive carrier lever is in the open position; if it is not, press the ejector button on the
drive carrier to release the lever and pull it out until it is fully open.
42 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall
2. Slide the carrier assembly into the empty drive bay until it is about 1/4” (.64cm) from being fully
inserted.
3. Before fully inserting the carrier, ensure that the lever attaches to the locking mechanism on the
firewall and then close the lever to seat the carrier.
STEP 7 |
STEP 8 |
Choose from the following two installation procedures based on your findings in 4:
• If the replacement drive is the same model number as the failed drive, continue to 8.
• If the replacement drive is a different model number than the failed drive, continue to 9.
Same model replacement drive only) Add the replacement drive (that is the same model as the
failed drive) to the RAID 1 array:
1. Add the replacement drive to the RAID 1 array. In this example, run the following command to add
the LOG 1 drive to the array:
admin@PA-5020> request system raid add log1
If the replacement drive was previously used in a different Palo Alto Networks firewall,
include the force option in this command to force the system to reformat the drive and
add it to the array. If you reboot the firewall after removing the failed drive from the
array, the force option is not required. This is because the system will recognize that
a drive was missing and it will automatically reformat the newly inserted drive and will
add it to the array.
2. Periodically view the RAID status until you see that Disk Pair Log shows Available, the status
shows clean, and the status for each drive shows active sync status. To view RAID status, run
the following command:
admin@PA-5020> show system raid detail
STEP 9 |
The following output shows that both log drives are in the active sync state:
Disk Pair Log Available
Status clean
Disk id Log1 Present
model : ST2000NX0253
size : 1907729 MB
status : active sync
Disk id Log2 Present
model : ST2000NX0253
size : 1907729 MB
status : active sync
Different model replacement drive only) Add the replacement drive (that is a different model
than the failed drive) to the RAID 1 array:
When you initiate the copy command as described in the following steps, logging stops
and you cannot view logs until the copy is complete and the disk pair shows Available.
1. (Optional) Suspend the firewall with the failed drive if it is the active firewall in an HA configuration.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 43
The firewall will fail over when the copy process in this procedures starts but you can
choose to Verify Failover or manually suspend the firewall with the failed drive before
you continue.
2. Copy the data from the other drive in the RAID 1 array to the replacement drive. In this example, run
the following command to copy the data from the Log2 drive to the Log1 drive:
admin@PA-5020> request system raid copy from log2 to log1
3. Run the following CLI command to view the status of the copy:
admin@PA-5020> show system raid detail
Periodically run this command until the copy is complete and the Disk Pair Log shows
Available.
At this point, the Log2 drive shows not in use because the drive models are not
the same.
Disk Pair Log Available
Status clean, degraded
Disk id Log1 Present
model : ST2000NX0999
size : 1907729 MB
status : active sync
Disk id Log2 Present
model : ST2000NX0253
size : 1907729 MB
status : not in use
4. Replace the other drive in the array so the drive models in the array are the same. In this example,
physically remove the Log2 drive, remove it from the carrier, and then install the second replacement
drive in the carrier. 9.e shows how to swap drives in a carrier.
5. Add the second replacement drive to the RAID 1 array. In this example, run the following command
to add the Log2 drive to the array:
admin@PA-5020> request system raid add log2
The system automatically starts to configure the new drive to mirror the other drive in the RAID 1
array.
6. Periodically view the RAID status until you see that the Disk Pair Log shows Available and
both drives show active sync status. To view RAID status, run the following command:
admin@PA-5020> show system raid detail
The following output shows that both drives are in the active sync state:
Disk Pair Log Available
Status clean
Disk id Log1 Present
model : ST2000NX0999
44 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall
Disk id Log2 Present
model : ST2000NX0999
size : 1907729 MB
status : active sync
Replace a System Drive on a PA-5200 Series Firewall
The following procedure describes how to replace a failed system drive. There are two scenarios: one where
the replacement drive is the same model as the failed drive and one where the replacement drive is not the
same model.
If you replace a system drive with a different model drive, you must boot the firewall into the
Maintenance Recovery Tool (MRT) to copy data between drives. In a high availability (HA)
configuration, suspend the firewall with the failed drive as described in this procedure.
In a high availability (HA) configuration, if one system drive fails (or if both system drives
fail) in the active firewall, the firewall enters the non-functional HA state and fails over. If
the firewall is not in an HA configuration and one system drive fails, the firewall continues
to operate. If both system drives fail in a non-HA configuration, you will need to replace the
systems drives and restore the firewall configuration from a recent configuration backup.
STEP 1 |
Identify the failed drive and determine the drive model.
When the system drives are functioning normally, all system drive partitions show both drives with the
status clean. If a system drive fails, the Overall System Drives RAID status shows degraded,
one or more failed partition array shows clean, degraded, and one of the drives will be missing (Sys1
or Sys2).In this example, the output from the show system raid detail command shows that the
drive model is MICRON_M510DC_MT, the panlogs partition shows the status clean, degraded, and
drive Sys1 is missing from the panlogs array; together, these indicate that you need to replace the Sys1
drive.
panlogs clean, degraded
Drive id Sys2 active sync
maint clean
Drive id Sys1 active sync
Drive id Sys2 active sync
sysroot0 clean
Drive id Sys1 active sync
Drive id Sys2 active sync
sysroot1 clean
Drive id Sys1 active sync
Drive id Sys2 active sync
pancfg clean
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 45
Drive id Sys1 active sync
Drive id Sys2 active sync
panrepo clean
Drive id Sys1 active sync
Drive id Sys2 active sync
swap clean
Drive id Sys1 active sync
Drive id Sys2 active sync
STEP 2 |
STEP 3 |
Remove the failed drive from the RAID 1 array. In this example, run the following command to
remove drive Sys1 from the array:
admin@PA-5020> request system raid remove sys1
Confirm that the failed drive is removed from all partitions. In the following output of the show
system raid detail, you see that drive id Sys1 is now missing from all partitions.
panlogs clean, degraded
Drive id Sys2 active sync
maint clean, degraded
Drive id Sys2 active sync
sysroot0 clean, degraded
Drive id Sys2 active sync
sysroot1 clean, degraded
Drive id Sys2 active sync
pancfg clean, degraded
Drive id Sys2 active sync
panrepo clean, degraded
Drive id Sys2 active sync
swap clean, degraded
Drive id Sys2 active sync
STEP 4 |
Press the ejector button on the drive carrier to release the carrier handle and gently pull the
handle toward you to remove the carrier and drive.
46 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall
Remove the replacement drive from the packaging, determine the drive model, and place it on
an antistatic surface. Then compare this model number with the model number of the failed
drive to determine which replacement procedure to use in 7.
STEP 6 |
STEP 7 |
Install the replacement drive in the drive carrier.
1. Place the failed drive next to the replacement drive with the connectors facing the same direction.
2. Remove the four screws that hold the failed drive in the carrier and remove the drive from the
carrier.
3. Install the replacement drive in the carrier and secure it using the four screws you removed from the
failed drive.
The illustration shows an SSD system drive and an HDD log drive; the procedure to swap the drive is
the same for both.
Install the replacement drive in the firewall.
1. Ensure that the drive carrier lever is in the open position; if it is not, press the ejector button on the
drive carrier to release the lever and pull it out until it is fully open.
2. Slide the replacement drive and carrier assembly into the empty drive bay until it is about 1/4” (.6cm)
from being fully inserted.
3. Before fully inserting the drive carrier, ensure that the lever attaches to the locking mechanism on the
firewall and then close the lever to seat the carrier.
STEP 8 |
STEP 9 |
Choose from the following two installation procedures based on your findings in 5:
• If the replacement drive is the same model number as the failed drive, continue to 9.
• If the replacement drive is a different model number than the failed drive, skip to 10.
Same model replacement drive only) Add the replacement drive (one that is the same model as
the failed drive) to the RAID 1 array:
1. Add the replacement drive to the RAID 1 array. In this example, run the following command to add
the SYS 1 drive to the array:
admin@PA-5020> request system raid add sys1
If the replacement drive was previously used in a different Palo Alto Networks firewall,
include the force option in this command to force the system to reformat the drive
and add it to the array. If you reboot the firewall after removing the failed drive from
the array, the force option is not required. Because the firewall recognizes that a drive
is missing and it will automatically reformat the newly inserted drive and adds it to the
array.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 47
2. Periodically view the RAID status until you see that the Overall System Drives RAID status
shows Good, all partitions show clean, and both drives show active sync. To view RAID status,
run the following command:
admin@PA-5020> show system raid detail
Do not reboot the firewall until all partitions are ready; otherwise, the system drives
may become out of sync and the firewall will not boot.
Overall System Drives RAID status Good
--------------------------------------------------------------------------Drive status
Disk id Sys1 Present (MICRON_M510DC_MT)
Disk id Sys2 Present (MICRON_M510DC_MT)
--------------------------------------------------------------------------Partition status
panlogs clean
Drive id Sys1 active sync
Drive id Sys2 active sync
maint clean
Drive id Sys1 active sync
Drive id Sys2 active sync
sysroot0 clean
Drive id Sys1 active sync
Drive id Sys2 active sync
sysroot1 clean
Drive id Sys1 active sync
Drive id Sys2 active sync
pancfg clean
Drive id Sys1 active sync
Drive id Sys2 active sync
panrepo clean
Drive id Sys1 active sync
Drive id Sys2 active sync
swap clean
Drive id Sys1 active sync
Drive id Sys2 active sync
STEP 10 |
Different model replacement drive only) Add the replacement drive (one that is a different
model than the failed drive) to the RAID 1 array:
1. Connect a serial cable from your computer to the Console port on the firewall and connect to the
firewall using terminal emulation software that is configured to use 9600-8-N-1 settings.
2. (Optional) Suspend the firewall with the failed drive if it is the active firewall in an HA configuration.
The firewall fails over when you boot into the Maintenance Recover Tool (MRT) as
described in the following step but you can choose to Verify Failover or manually
suspend the firewall that contains the failed drive.
3. Reboot the firewall with the failed drive into the MRT by running the following command:
admin@PA-5020> debug system maintenance-mode
4. Press Enter on CONTINUE and then navigate to RAID and press Enter again.
48 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall
5. Navigate to the Migrate Drive section and select the drive to migrate. In this example, select
Migrate drive Sys2 -> Sys1 to initiate the process of copying the system data from the Sys2
drive to the Sys1 replacement drive.
6. After migration is complete, remove the other system drive. In this example, remove the Sys2 drive.
7. Press Esc to go back to the main menu and then press Enter on Reboot.
8. After the firewall boots PAN-OS, replace the other drive in the array so the drives in the array are
the same model. In this example, first remove the Sys2 drive from the carrier and install the second
replacement drive (one that is the same model as Sys1) into the carrier (see 6). Then, install the
second replacement drive in slot Sys 2.
9. Add the second replacement drive to the RAID 1 array. In this example, run the following command
to add drive Sys2 to the array
admin@PA-5020> request system raid add sys2
If the replacement drive was previously used as a system drive in a different Palo
Alto Networks firewall, include the force option in this command to force the system
to reformat the drive and add it to the array. If you reboot the firewall after removing
the failed drive from the array, the force option is not required. Because the firewall
recognizes that a system drive is missing and automatically reformats the newly
inserted drive and adds it to the array.
The system automatically starts to configure the new drive to mirror the other drive in the RAID 1
array.
10.Periodically view the RAID status until you see that the Overall System Drives RAID status
shows Good, all partitions show clean, and both drives show active sync. To view RAID status,
run the following command:
admin@PA-5020> show system raid detail
Do not reboot the firewall until all partitions are ready; otherwise, the system drives
may become out of sync and the firewall will not boot.
Overall System Drives RAID status Good
--------------------------------------------------------------------------Drive status
Disk id Sys1 Present (MICRON_M510DC_MT)
Disk id Sys2 Present (MICRON_M510DC_MT)
--------------------------------------------------------------------------Partition status
panlogs clean
Drive id Sys1 active sync
Drive id Sys2 active sync
maint clean
Drive id Sys1 active sync
Drive id Sys2 active sync
sysroot0 clean
Drive id Sys1 active sync
Drive id Sys2 active sync
sysroot1 clean
Drive id Sys1 active sync
Drive id Sys2 active sync
pancfg clean
Drive id Sys1 active sync
Drive id Sys2 active sync
panrepo clean
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall 49
Drive id Sys1 active sync
Drive id Sys2 active sync
swap clean
Drive id Sys1 active sync
Drive id Sys2 active sync
50 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | Service the PA-5200 Series Firewall
PA-5200 Series Firewall Specifications
The following topics describe the PA-5200 Series firewall hardware specifications. For feature,
capacity, and performance information, refer to the PA-5200 Series firewall datasheet.
> PA-5200 Series Physical Specifications
> PA-5200 Series Electrical Specifications
> PA-5200 Series Environmental Specifications
> PA-5200 Series Miscellaneous Specifications
51
52 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall
The following table describes the PA-5200 Series firewall miscellaneous specifications.
SpecificationValue
Mean time between failures (MTBF)9 years
Sotrage Capacity• System file storage—240GB (Two 240GB solid-state
drives (SSDs) in a RAID-1 pair).
• Log storage—2TBs (Two 2TB hard disk drives (HDDs) in
a RAID-1 pair).
56 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall
Specifications
PA-5200 Series Firewall Compliance
Statements Overview
Palo Alto Networks obtains regulatory compliance certifications to comply with the laws and
regulations in each country where there are requirements applicable to our products. Our
products meet standards for product safety and electromagnetic compatibility when used for
their intended purpose.To view compliance statements for the PA-3200 Series firewalls, see
PA-5200 Series Firewall Compliance Statements.
57
58 PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall Compliance
The following lists the PA-5200 Series firewall hardware compliance statements:
• VCCI
This section provides the compliance statement for the Voluntary Control Council for Interference by
Information Technology Equipment (VCCI), which governs radio frequency emissions in Japan.
The following information is in accordance to VCCI Class A requirements:
Translation: This is a Class A product. In a domestic environment this product may cause radio
interference, in which case the user may be required to take corrective actions.
• NEBS Requirements
The following lists the Network Equipment Building System (NEBS) requirements for PA-5200 Series
firewalls.
• The firewall is intended to be installed in a Network Telecommunication Facility (Central Office) as
part of a Common Bonding Network (CBN) or Isolated Bonding Network (IBN). Bare conductors
must be coated with an appropriate antioxidant compound before crimp connections are made. All
unplated connectors, braided strap, and bus bars must be brought to a bright finish and then coated
with an antioxidant before they are connected.
Fastening hardware must be compatible with the materials being joined and must preclude loosening,
deterioration, and electrochemical corrosion of the hardware and the joined materials.
• The firewall is suitable for connection to the Central Office or Customer Premise Equipment (CPE).
• The DC battery return wiring on the firewall must be connected as an isolated DC return (DC-I).
The intra-building ports (RJ-45 Ethernet ports, AUX ports, HA ports, and the MGT
port) of the equipment or subassembly are suitable for connection to only intrabuilding or unexposed wiring or cabling. The intrabuilding port(s) of the equipment
or subassembly must not be metallically connected to interfaces that connect to the
Outside Plant (OSP) or its wiring. These interfaces are designed for use as intrabuilding interfaces only (Type 2 or Type 4 ports as described in GR-1089-CORE,
Issue 6) and require isolation from the exposed OSP cabling. The addition of primary
protectors is not sufficient protection to connect these interfaces metallically to OSP
wiring.The firewall must be connected to an external Special Protection Device (SPD)
when installed and connected to commercial AC power.
The firewall must be connected to an external Special Protection Device (SPD) when
installed and connected to commercial AC power.
• BSMI EMC Statement—User warning: This is a Class A product. When used in a residential environment
it may cause radio interference. In this case, the user will be required to take adequate measures.
• Manufacturer—Flextronics International.
• Country of Origin—Made in the USA with parts of domestic and foreign origin.
PA-5200 SERIES NEXT-GEN FIREWALL HARDWARE REFERENCE | PA-5200 Series Firewall Compliance Statements