CISCO Defense Orchestrator User Guide

June 1, 2024
Cisco

Defense Orchestrator

“`html

Specifications

  • Product: Firewall Migration Tool in Cisco Defense
    Orchestrator

  • First Published: 2023-02-21

  • Last Modified: 2024-01-25

  • Manufacturer: Cisco Systems, Inc.

  • Website: http://www.cisco.com

  • Headquarters: 170 West Tasman Drive San Jose, CA 95134-1706
    USA

  • Contact Tel: 408 526-4000, Fax: 408 527-0883

Product Usage Instructions

Overview

The Firewall Migration Tool in Cisco Defense Orchestrator is
designed to assist users in migrating existing firewall
configurations to a Secure Firewall Threat Defense device managed
by the cloud-delivered Firewall Management Center on their CDO
tenant.

Step 1: Accessing the Tool

Log in to your Cisco Defense Orchestrator (CDO) account. Locate
and access the cloud version of the Cisco Secure Firewall migration
tool within the CDO interface.

Step 2: Initiating Migration

Follow the on-screen instructions within the migration tool to
initiate the migration process. You may need to provide details
about your existing firewall configurations.

Step 3: Configuration Mapping

Map your current firewall settings to the corresponding
configurations on the Secure Firewall Threat Defense device. Ensure
that all necessary rules and policies are correctly mapped for a
seamless transition.

Step 4: Validation and Testing

Validate the migrated configurations and perform testing to
ensure that the firewall rules are functioning as expected on the
new device. Make any necessary adjustments if discrepancies are
found.

Step 5: Finalizing Migration

Once you are satisfied with the migrated configurations and
testing results, finalize the migration process. Your existing
firewall configurations should now be successfully transferred to
the Secure Firewall Threat Defense device.

FAQ

Q: Can I use the Firewall Migration Tool for other firewall

brands?

A: The Firewall Migration Tool in Cisco Defense Orchestrator is
specifically designed for migrating configurations to Secure
Firewall Threat Defense devices managed by CDO. It may not be
compatible with firewalls from other brands.

Q: How long does the migration process typically take?

A: The duration of the migration process can vary depending on
the complexity of your existing firewall configurations. It is
recommended to allocate sufficient time for configuration mapping,
validation, and testing.

Q: Is there a risk of data loss during migration?

A: While every effort is made to ensure a smooth migration
process, it is advisable to back up your firewall configurations
before initiating migration to mitigate any potential risks of data
loss.

“`

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator
First Published: 2023-02-21 Last Modified: 2024-01-25
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387) Fax: 408 527-0883

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE- NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1721R)
© 2023 Cisco Systems, Inc. All rights reserved.

CONTENTS

CHAPTER 1

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 1 Is This Guide for You? 1 Getting Started with the Firewall Migration Tool in Cisco Defense Orchestrator 2 Supported Configurations 2 Licenses 4 Initialize a New Migration Instance 5 Delete a Migration Instance 5 Using the Demo Mode in the Secure Firewall Migration Tool 5 Migrate Secure Firewall ASA to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator 6 Migrate an FDM-Managed Device to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator 9 Migrating Check Point Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator 12 Migrating Fortinet Firewall with the Firewall Migration Tool in Cisco Defense Orchestrator 15 Migrating Palo Alto Networks Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator 17 Related Documentation 19

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator iii

Contents
Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator iv

1 C H A P T E R
Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator
This document assists you in using the cloud version of the Cisco Secure Firewall migration tool hosted on Cisco Defense Orchestrator (CDO). CDO hosts a cloud version of the Cisco Secure Firewall migration tool that you can use to migrate your existing firewall configurations to a Secure Firewall Threat Defense device managed by the cloud-delivered Firewall Management Center that is deployed on your CDO tenant.
· Is This Guide for You?, on page 1 · Getting Started with the Firewall Migration Tool in Cisco Defense Orchestrator, on page 2 · Migrate Secure Firewall ASA to Secure Firewall Threat Defense with the Firewall Migration Tool in
Cisco Defense Orchestrator, on page 6 · Migrate an FDM-Managed Device to Secure Firewall Threat Defense with the Firewall Migration Tool
in Cisco Defense Orchestrator, on page 9 · Migrating Check Point Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in
Cisco Defense Orchestrator, on page 12 · Migrating Fortinet Firewall with the Firewall Migration Tool in Cisco Defense Orchestrator, on page
15 · Migrating Palo Alto Networks Firewall to Secure Firewall Threat Defense with the Firewall Migration
Tool in Cisco Defense Orchestrator, on page 17 · Related Documentation, on page 19
Is This Guide for You?
This guide is for you if you use CDO to manage your Secure Firewall ASA devices and FDM-managed threat defense devices or you use third-party firewalls such as Palo Alto Networks, Check Point, and Fortinet firewalls and you want to move into the Cisco Secure Firewall Threat Defense. You can migrate all your existing firewall configurations to a threat defense device managed by your cloud-delivered Firewall Management Center using the Secure Firewall migration tool in CDO. This document describes what you need to do to migrate your configurations.
Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 1

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Getting Started with the Firewall Migration Tool in Cisco Defense Orchestrator
Getting Started with the Firewall Migration Tool in Cisco Defense Orchestrator
The migration tool in CDO extracts the device configurations from the source device that you select or from a configuration file that you upload and migrates them to the cloud-delivered Firewall Management Center provisioned on your CDO tenant, after you validate the configurations. The migration tool supports most configurations; unsupported configurations must be manually configured in the cloud-delivered Firewall Management Center. See Supported Configurations, on page 2. When you initialize a new migration in Tools & Services > Firewall Migration Tool and Launch it, a cloud instance of the migration tool opens in a new browser tab and enables you to perform your migration tasks using a guided workflow. The migration tool in CDO eliminates the need for you to download and maintain the desktop version of the Secure Firewall migration tool.
You can migrate the following Cisco and third-party firewall configurations to Secure Firewall Threat Defense devices using the migration tool hosted on CDO:
· Cisco Secure Firewall ASA · Secure Firewall Threat Defense managed by Firewall Device Manager · Check Point firewall · Palo Alto Networks firewall · Fortinet firewall
Important You need an admin or a super admin user role in CDO to be able to use the Firewall migration tool.
Supported Configurations
The migration tool supports the following configurations:
Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 2

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator

Supported Configurations

· Network objects and groups · Service objects, except those configured for a source and destination · Referenced ACL and NAT rules · Service object groups
Note Nested service object group contents are broken down to individual objects before being migrated, because the cloud-delivered management center does not support nesting.
· IPv4 and IPv6 FQDN objects and groups · IPv6 conversion (interface, static routes, objects, ACL, and NAT) · Access rules applied to ingress interfaces · Global ACLs · Auto NAT, manual NAT, and object NAT · Static routes, equal-cost multipath (ECMP) routes, and policy-based routing (PBR) · Physical interfaces · Sub-interfaces · Port channels · Virtual tunnel interface · Bridge groups in transparent mode · IP SLA objects – the migration tool creates them, maps them with static routes, and migrates them · Time-based objects · Site-to-site VPN
· Site-to-Site VPN–When the Firewall migration tool detects crypto-map configuration in the source ASA, FDM-managed device, Palo Alto Networks firewall, or Fortinet firewall, the Secure Firewall migration tool migrates it as a point-to-point topology to the management center VPN
· Crypto-map (static/dynamic)-based VPN from ASA, FDM-managed devices, Palo Alto Networks firewall, and Fortinet firewall
· Route-based (VTI) ASA and FDM VPN · Certificate-based VPN migration from ASA, FDM-managed device, Palo Alto Networks firewall,
Fortinet firewall
Important If you have site-to-site VPN configurations in your source ASA, FDM- managed device, Palo Alto Networks firewall, or Forinet firewall, ensure that their device trustpoint or certificates are configured manually in the cloud- delivered FMC.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 3

Licenses

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator

· Remote-access VPN · SSL and IKEv2 protocols · Authentication methods–AAA only, client certificate only, SAML, AAA, and client certificate · AAA–Radius, local, LDAP, and AD · Connection profiles, group policy, dynamic access policy, LDAP attribute map, and certificate map · Standard and extended ACL · Custom attributes and VPN load balancing
Important If you have configured remote-access VPN in your source firewall, ensure the following tasks are performed: · Configure the ASA,FDM-managed device, Palo Alto Networks, and Fortinet firewall trustpoints manually on the management center as PKI objects · Retrieve AnyConnect packages, Hostscan files (dap.xml, data.xml, hostscan package), external browser package, and AnyConnect profiles from the source ASA and FDM-managed device · Upload all AnyConnect packages and profiles to the management center
· Dynamic route objects, BGP, and EIGRP · Policy list · Prefix list · Community list · Autonomous system (AS) path · Route map

Note The migration tool analyzes all objects and object groups based on both their name and configuration, and reuses objects that have the same name and configuration; however, XML profiles in remote access VPN configurations are validated only using their name.
Refer to Cisco Secure Firewall Migration Tool Compatibility Guide for more information.

Licenses

The Secure Firewall migration tool does not require any additional license to be accessed from CDO.
However, you need to have a CDO base subscription and licenses for the threat defense features you want to migrate.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 4

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator

Initialize a New Migration Instance

Initialize a New Migration Instance

Step 1 Step 2 Step 3
Step 4 Step 5 Step 6

Log in to your CDO tenant. Choose Tools & Services > Firewall Migration Tool.

Click the blue plus button to initialize a new migration instance.

Note

The Firewall migration tool enables you to create up to 10 migrations and launch all of them

concurrently–each migration instance opens up in a new browser tab. However, if there are several users

provisioned on your tenant, note that you can launch only migrations that you created.

If you want to initialize a new migration instance when you already have 10 migrations, delete one of the existing migration instances.

CDO generates a name for your migration automatically; you can use the auto- generated name or change it to suit your needs.
Click OK and wait until you see the status change from Initializing to Ready to Migrate. CDO also notifies you with a new announcement on the Notifications pane when your migration is ready.
On the new migration, click Launch.

The migration tool opens in a new browser tab and does not require any authentication.

Note

Migrations in CDO are valid for seven days from the date of being created, after which they are automatically

deprovisioned. This ensures that CDO resources are freed up from time to time. You can check the dates in

the Created Date and Deprovisioning Date columns.

CDO displays the status of all the migrations in the Status column; you can filter out the migrations based on the their statuses. You can also select a migration to see migration details, such as date and time of creation, date and time of start, source and destination device names, and created by on the right pane. Note that when several users are provisioned on your CDO tenant, you can only launch migrations you created.

Delete a Migration Instance
Follow the steps below if you intend to deprovision your migration manually before CDO automatically deprovisions it. For example, you can delete a migration after your migration tasks are finished.

Step 1 Step 2 Step 3

Choose Tools & Services > Firewall Migration Tool. On the migration you want to delete, click Delete under the Actions pane. Confirm your action by clicking Delete.

Using the Demo Mode in the Secure Firewall Migration Tool
When you launch the Secure Firewall Migration tool and are on the Select Source Configuration page, you can choose to start performing a migration using Start Migration or enter the Demo Mode.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 5

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrate Secure Firewall ASA to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
The demo mode provides an opportunity to perform a demo migration using dummy devices and visualize how an actual migration flow would look like. The migration tool triggers the demo mode based on the selection you make in the Source Firewall Vendor drop-down; you can also upload a configuration file or connect to a live device and continue with the migration. You can proceed performing the demo migration by selecting demo source and target devices such as demo FMC and demo FTD devices.
Caution Choosing Demo Mode erases existing migration workflows, if any. If you use the demo mode while you have an active migration in Resume Migration, your active migration is lost and needs to be restarted from first, after you use the demo mode.
You can also download and verify the pre-migration report, map interfaces, map security zones, map interface groups, and perform all other actions like you would in an actual migration workflow. However, you can only perform a demo migration up to validation of the configurations. You cannot push the configurations to the demo target devices you selected because this is only a demo mode. You can verify the validation status and the summary and click Exit Demo Mode to go the Select Source Configuration page again to start your actual migration.
Note The demo mode lets you leverage the whole feature set of the Secure Firewall Migration Tool, except pushing of configurations, and do a trial run of the end-to-end migration procedure before performing your actual migration.
Migrate Secure Firewall ASA to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
The Secure Firewall migration tool in CDO lets you to migrate configurations from live ASA devices that are managed by CDO or using a configuration file extracted from an ASA device. To read more about the Secure Firewall ASA configurations supported for migration, see ASA Configuration Support in the Migrating Cisco Secure Firewall ASA to Cisco Secure Firewall Threat Defense with the Migration Tool book. Select Source Configuration After launching your migration instance from CDO, choose Cisco ASA in Select Source Configuration and click Start Migration. You can either manually upload an ASA configuration file or choose any one of the CDO-managed ASA devices listed on the Connect to ASA pane. If you are trying to select a CDO-managed device, note that devices having Configuration Status as Synced are only listed by the migration tool; if you do not see the device you want to migrate in the list, check if the device configuration changes are up-to-date and synced with CDO. Note that one ASA device can be selected as the source device by more than one user at the same time and the confuguration extraction takes place seamlessly. If you have one or more security contexts configured on your ASA device, the migration tool allows you to choose which context you want to migrate; you can also merge all your contexts to a single instance and then migrate them. Refer Select the ASA Primary Security Context for more information. The migration tool parses the device configuration and displays a summary containing the parsed configurations. Click Next. Select Target
Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 6

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrate Secure Firewall ASA to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
In the Select Target page, the cloud-delivered Firewall Management Center provisioned on your CDO tenant is selected by default, and the threat defense devices managed by that management center are listed. You can choose the threat defense device you wish to migrate your ASA configuration to or choose to Proceed without FTD. Note that the threat defense devices listed are displayed either as In Use or Available based on whether the device is being used in another migration instance. However, you can perform an override by clicking Change Device Status, selecting the device from the In Use list, and clicking Continue, which will make the device available for being selected as the target.
Caution Changing the device status from In Use to Available impacts the ongoing migration instance that is using the device already. We recommend that you exercise caution when doing this.
Choosing Proceed without FTD pushes only NAT objects, ACLs, and port objects to the cloud-delivered Firewall Management Center. For more information about the commonly used ASA features and their equivalent threat defense features, see Cisco Secure Firewall ASA to Threat Defense Feature Mapping guide. The flowchart that follows illustrates the step-by-step procedure for migrating an ASA to threat defense using the Firewall migration tool in CDO.
Figure 1: End-to-End Procedure for ASA to FTD Migration with Firewall Migration Tool in CDO

To perform the procedure with more detailed steps, continue to Obtain the ASA Configuration File in the Migrating Cisco Secure Firewall ASA to Threat Defense with the Migration Tool guide.

Workspace

Steps

CDO

Log in to your CDO tenant, navigate Tools & Services > Firewall Migration

Tool, and click the blue plus instance.

button to start provisioning a new migration

ASA CLI

(Optional) Obtain the ASA configuration file: To obtain the ASA config file from ASA CLI, see Obtain the ASA Configuration File. If you intend to select a CDO-managed ASA device in the Select Source Configuration, skip to Step 3.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 7

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrate Secure Firewall ASA to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator

Workspace

Steps

ASA CLI

(Optional) Export public key infrastructure (PKI) certificates from ASA CLI: This step is required only if you are planning to migrate site-to site VPN and RAVPN configurations from ASA to threat defense. To export the PKI certificates from ASA CLI, see Export PKI Certificate from ASA and Import into Management Center. If you do not have remote-access VPN configurations on your device or you are not planning to migrate site-to-site VPN and remote-access VPN, skip to Step 7.

ASA CLI

(Optional) Export AnyConnect packages and profiles from ASA CLI: This step is required only if you are planning to migrate remote-access VPN features from ASA to threat defense. To export AnyConnect packages and profiles from ASA CLI, see Retrieve AnyConnect Packages and Profiles.

Cloud-delivered (Optional) Import the PKI certificates and AnyConnect packages to the

Firewall

management center: To import the PKI certificates to management center,

Management Center see Step 2 in Export PKI Certificate from ASA and Import into Management

Center and Retrieve AnyConnect Packages and Profiles.

CDO

Ensure that the status of the migration instance you created is Ready to Migrate and click Launch; the Secure Firewall Migration Tool opens in a new browser tab.

Secure Firewall Migration Tool

(Optional) Upload the ASA config file obtained from ASA CLI, see Upload the ASA Configuration File. If you are planning to migrate configuration from an ASA device managed by CDO, skip to Step 8.

Secure Firewall Migration Tool

From the list of ASA devices shown, that are managed by your CDO tenant, select the device whose configuration you want to migrate. If you have configured more than one security context on your ASA device, select the context you wish to migrate or choose to merge all the contexts to a singe instance in the Primary Context Selectiondrop-down. See Select the ASA Primary Security Context for more information.

Secure Firewall Migration Tool

On the Select Target page, the cloud-delivered Firewall Management Center provisioned on your CDO tenant is selected by default.

Secure Firewall Migration Tool

Select a target device from the list of threat defense devices managed by your cloud-delivered Firewall Management Center or choose Proceed without FTD and proceed.

Secure Firewall Migration Tool

Download the pre-migration report and review it for a detailed summary of the parsed configuration. For detailed steps, see Review the Pre-Migration Report.

Secure Firewall Migration Tool

Map FTD Interface with the ASA configuration.
Because the names of physical and port channel interfaces on your ASA and threat defense devices are not always the same, you can select to which interface in the target threat defense device you want an ASA interface to get mapped. For more information, see Map ASA Configurations with Secure Firewall Device Manager Threat Defense Interfaces.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 8

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrate an FDM-Managed Device to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator

Workspace

Steps

Secure Firewall Migration Tool

Map ASA interfaces to existing threat defense security zones and interface groups. See Map ASA Interfaces to Security Zones and Interface Groups for detailed steps.

Secure Firewall Migration Tool

Optimize, Review and Validate Configuration with caution and ensure ACLs, objects, NAT, interfaces, routes, site-to-site VPN, and remote-access VPN rules are configured as intended for the destination threat defense device. See Optimize, Review and Validate the Configuration.

Secure Firewall Migration Tool

Once your configuration validation is a success, Push Configuration to the cloud-delivered Firewall Management Center. For more information, see Push the Migrated Configuration to Management Center.

Local Machine

Download the post-migration report and review it. To know more on what information the post-migration report contains, see Review the Post-Migration Report and Complete the Migration.

Cloud-delivered Deploy the newly migrated configuration to the threat defense device. Firewall Management Center

Migrate an FDM-Managed Device to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
You can migrate FDM-managed device configurations using configuration files or by simply selecting the FDM-managed devices that are onboarded to CDO. To read more about the FDM-managed device configurations supported for migration, see FDM-Managed Device Configuration Support in Migrating an FDM-Managed Device to Secure Firewall Threat Defense with the Migration Tool book.
Select Source Configuration
After launching your migration instance from CDO, choose Cisco Secure Firewall Device Manager in Select Source Configuration and choose from of the following options:
· Migrate Firepower Device Manager (Shared Configurations Only)
· Migrate Firepower Device Manager (Includes Device & Shared Configurations)
· Migrate Firepower Device Manager (Includes Device & Shared Configurations) to FTD Device (New Hardware)
On clicking Continue, the migration tool enables you to either manually upload an FDM-managed device configuration file or choose any one of the FDM-managed devices onboarded to CDO, which are listed on the Connect to FDM pane and click Next.
Select Target

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 9

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrate an FDM-Managed Device to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
In the Select Target page, the cloud-delivered Firewall Management Center provisioned on your CDO tenant is selected by default, and the threat defense devices managed by that management center are listed. You can choose the threat defense device you wish to migrate the configuration to, and proceed with the migration. Note that the threat defense devices listed are displayed either as In Use or Available based on whether the device is being used in another migration instance. However, you can perform an override by clicking Change Device Status, selecting the device from the In Use list, and clicking Continue, which will make the device available for being selected as the target.
Caution Changing the device status from In Use to Available impacts the ongoing migration instance that is using the device already. We recommend that you exercise caution when doing this.
The flowchart that follows illustrates the step-by-step procedure for migrating an FDM-managed device using the Firewall migration tool in CDO.
Figure 2: End-to-End Procedure for FDM-Managed Devices to FTD Migration with the Firewall Migration Tool in CDO

To perform the procedure with more detailed steps, continue to Obtain the FDM- managed Device Configuration File in the Migrating an FDM-managed Device to Secure Firewall Threat Defense with the Migration Tool guide.

Workspace

Steps

CDO

Log in to your CDO tenant, navigate Tools & Services > Firewall Migration

Tool, and click the blue plus instance.

button to start provisioning a new migration

Device Manager CLI (Optional) Obtain the FDM-managed device configuration file: To obtain the FDM-managed device config file from device manager CLI, see Obtain the FDM-Managed Device Configuration File. If you intend to select a CDO-managed FDM device in the Select Source Configuration, skip to Step 3.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 10

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrate an FDM-Managed Device to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator

Workspace

Steps

Device Manager CLI (Optional) Export PKI certificates and AnyConnect packages and profiles: This step is required only if you are planning to migrate site- to site VPN and remote-access VPN features from an FDM-managed device to threat defense. To export the PKI certificates from device manager CLI, see Step 1 in Export PKI Certificate from and Import into Firewall Management Center. To export AnyConnect packages and profiles from device manager CLI, see Step 1 in Retrieve AnyConnect Packages and Profiles. If you are not planning to migrate site-to-site VPN and remote-access VPN configurations, skip to Step 7.

Cloud-delivered (Optional) Import the PKI certificates and AnyConnect packages to

Firewall

management center: To import the PKI certificates to management center,

Management Center see Step 2 in Export PKI Certificate from and Import into Firewall

Management Center and Retrieve AnyConnect Packages and Profiles.

CDO

Ensure that the status of the migration instance you created is Ready and click Launch; the Secure Firewall Migration Tool opens in a new browser tab.

Secure Firewall Migration Tool

To select the source configuration firewall and migration option, see Select the Source Configuration Firewall and Migration.

Secure Firewall Migration Tool

(Optional) Upload the FDM-managed device config file obtained from device manager CLI, see Upload the FDM-Managed Device Configuration File. If you are migrating configuration from an FDM-managed device onboarded to CDO, skip to Step 8.

Secure Firewall Migration Tool

From the list of FDM-managed devices shown, that are managed by your CDO tenant, select the device whose configuration you want to migrate.

Secure Firewall Migration Tool

On the Select Target page, the cloud-delivered Firewall Management Center provisioned on your CDO tenant is selected by default.

Secure Firewall Migration Tool

Select a target device from the list of threat defense devices managed by your cloud-delivered Firewall Management Center or choose Proceed without FTD and proceed.

Secure Firewall Migration Tool

Download the pre-migration report and review it for a detailed summary of the parsed configuration. For detailed steps, see Review the Pre-Migration Report.

Secure Firewall Migration Tool

Map FTD Interface with the FDM-managed device configuration.
Because the names of physical and port channel interfaces on your FDM and threat defense devices are not always the same, you can select to which interface in the target threat defense device you want an FDM-managed device interface to get mapped. For more information, see Map FDM-managed Device Configurations with Secure Firewall Device Manager Threat Defense Interfaces.

Secure Firewall Migration Tool

Map FDM-managed device interfaces to existing threat defense security zones and interface groups. See Map FDM-managed Interfaces to Security Zones and Interface Groups for detailed steps.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 11

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrating Check Point Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator

Workspace

Steps

Secure Firewall Migration Tool

Optimize, Review and Validate Configuration with caution and ensure ACLs, objects, NAT, interfaces, routes, site-to-site VPN, and remote-access VPN rules are configured as intended for the destination threat defense device. See Optimize, Review and Validate the Configuration.

Secure Firewall Migration Tool

Once your configuration validation is a success, Push Configuration to the cloud-delivered Firewall Management Center. For more information, see Push the Migrated Configuration to Management Center.

Local Machine

Download the post-migration report and review it. To know more on what information the post-migration report contains, see Review the Post-Migration Report and Complete the Migration.

Cloud-delivered Deploy the newly migrated configuration to the threat defense device. Firewall Management Center

Resume Migration
If you have started a migration from CDO and wish to continue later, you can simply close the Firewall migration tool tab. When you want to continue with the migration, you can log in to CDO and in Firewall Migration Tool click Launch on the migration you want to continue. The migration tool detects that you were migrating and lets you continue from where you left off. However, for the migration tool to detect that you have an ongoing migration, you must at least perform up to parsing of the source configuration. If you leave off a migration before performing this step, you can still launch the same migration from CDO but you must start the migration from the first.

Migrating Check Point Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
You can migrate your Check Point Firewall configurations to threat defense either by manually extracting the configuration from your firewall or using the configuration extractor that comes inbuilt with the migration tool. To know the Check Point configurations that are supported, see Check Point Configuration Support.
Select Source Configuration
In the Source Firewall Vendor drop-down, choose Check Point (r80-r81) or Check Point (r75-r77) based on the firewall version you want to migrate. You can manually upload an extracted firewall configuration using Manual Configuration Upload or use the Live Connect option to connect to the Check Point Security Gateway to export the configuration file.

Note You can use Live Connect only when you have selected Check Point (r80-81) and Configuration Extractor only when you have selected Check Point (r75-r77).

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 12

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrating Check Point Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
Select Target In the Select Target page, the cloud-delivered Firewall Management Center provisioned on your CDO tenant is selected by default, and the threat defense devices managed by that management center are listed. You can choose the threat defense device you wish to migrate the configuration to, and proceed with the migration. Note that the threat defense devices listed are displayed either as In Use or Available based on whether the device is being used in another migration instance. However, you can perform an override by clicking Change Device Status, selecting the device from the In Use list, and clicking Continue, which will make the device available for being selected as the target. Choosing Proceed without FTD pushes only NAT objects, ACLs, and port objects to the cloud-delivered Firewall Management Center. For more information about the commonly used ASA features and their equivalent threat defense features, see Cisco Secure Firewall ASA to Threat Defense Feature Mapping guide.
Caution Changing the device status from In Use to Available impacts the ongoing migration instance that is using the device already. We recommend that you exercise caution when doing this.

To perform the migration with more detailed steps, continue to Export the Check Point Configuration Files in Migrating Check Point Firewall to Secure Firewall Threat Defense with the Migration Tool book.

Workspace

Steps

Cisco Defense Orchestrator

Log in to your CDO tenant, navigate Tools & Services > Firewall Migration

Tool, and click the blue plus instance.

button to start provisioning a new migration

Cisco Defense Orchestrator

Launch your migration instance from CDO and choose Check Point (r75­r77) or Check Point (r80­r81) in the Source Firewall Vendor drop-down, based on your requirement.

Check Point Web Visualization Tool

(Optional) Export the Check Point configuration file for r77: To export the Check Point configuration files for r77, see Export the Check Point Configuration Files for r77. If you intend to export configuration files for r80 using Secure Firewall migration tool live connect feature, skip to step 6.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 13

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrating Check Point Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator

Workspace

Steps

Secure Firewall Migration Tool

(Optional) Connect to live Check Point (r80) and export the config file: To export the Check Point configuration files for r80 using live connect feature, see Export the Check Point Configuration Files for r80.

Local Machine

(Optional) Zip the exported files: select all the exported configuration files for r77 and compress them to a zip file. For detailed steps, see Zip the Exported Files.

Local Machine

Pre-stage the Check Point (r80) devices for config extraction: You must configure the credentials on Check Point (r80) devices before using Live Connect. For pre-staging credentials on Check Point (r80) devices, see Pre- Stage the Check Point Devices for Configuration Extraction Using Live Connect. This step is required only if you are planning to migrate configuration files for r80 devices.

Secure Firewall Migration Tool

(Optional) Upload the Check Point config file.

Secure Firewall Migration Tool

Specify the destination parameters for the Secure Firewall Migration Tool.

Secure Firewall Migration Tool

Navigate to where you downloaded the pre-migration report and review the report.

Secure Firewall Migration Tool

The Secure Firewall migration tool allows you to map the Check Point configuration with threat defense interfaces. For detailed steps, see Map Check Point Configurations with Secure Firewall Device Manager Threat Defense Interfaces.

Secure Firewall Migration Tool

To ensure that the Check Point configuration is migrated correctly, map the Check Point interfaces to the appropriate threat defense interface objects, security zones, and interface groups. For more information, see Map Check Point Interfaces to Security Zones and Interface Groups.

Secure Firewall Migration Tool

Optimize and review the configuration carefully and validate that it is correct and matches how you want to configure the threat defense device. For detailed steps, see Optimize, Review and Validate the Configuration to be Migrated.

Secure Firewall Migration Tool

This step in the migration process sends the migrated configuration to the cloud-delivered Firewall Management Center and allows you to download the post-migration report.

Local Machine

Navigate to where you downloaded the post migration report and review the report. For detailed steps, see Review the Post-Migration Report and Complete the Migration.

Cloud-Delivered Deploy the migrated configuration from the cloud-delivered firewall

Firewall

management center to threat defense.

Management Center

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 14

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrating Fortinet Firewall with the Firewall Migration Tool in Cisco Defense Orchestrator
Migrating Fortinet Firewall with the Firewall Migration Tool in Cisco Defense Orchestrator
The Firewall migration tool in CDO allows migrating configurations from Fortinet firewall to threat defense devices managed by your cloud-delivered Firewall Management Center. You can manually derive the configuration file from your Fortinet firewall and upload it to the migration tool to begin with your migration. To learn about supported Fortinet firewall configurations, see Fortinet Configuration Support. Select Source Configuration On the Select Source Configuration page, choose Fortinet (5.0+) and click Start Migration. Click Upload to choose the Fortinet configuration file and click Next. Select Target In the Select Target page, the cloud-delivered Firewall Management Center provisioned on your CDO tenant is selected by default, and the threat defense devices managed by that management center are listed. You can choose the threat defense device you wish to migrate the configuration to, and proceed with the migration. Note that the threat defense devices listed are displayed either as In Use or Available based on whether the device is being used in another migration instance. However, you can perform an override by clicking Change Device Status, selecting the device from the In Use list, and clicking Continue, which will make the device available for being selected as the target. Choosing Proceed without FTD pushes only NAT objects, ACLs, and port objects to the cloud-delivered Firewall Management Center. For more information about the commonly used ASA features and their equivalent threat defense features, see Cisco Secure Firewall ASA to Threat Defense Feature Mapping guide.
Caution Changing the device status from In Use to Available impacts the ongoing migration instance that is using the device already. We recommend that you exercise caution when doing this.
The flowchart that follows illustrates the step-by-step procedure for migration Fortinet firewall configurations to threat defense devices: To perform the procedure with more detailed steps, continue to Export Fortinet Firewall Configuration from Fortinet Firewall GUI in Migrating Fortinet Firewall to Secure Firewall Threat Defense with the Migration Tool guide.
Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 15

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrating Fortinet Firewall with the Firewall Migration Tool in Cisco Defense Orchestrator

Workspace Cisco Defense Orchestrator
Cisco Defense Orchestrator Fortinet Firewall
Secure Firewall Migration Tool Secure Firewall Migration Tool
Secure Firewall Migration Tool Secure Firewall Migration Tool

Steps

Log in to your CDO tenant, navigate Tools & Services > Firewall Migration

Tool, and click the blue plus instance.

button to start provisioning a new migration

After your migration instance is ready, click Launch and choose Fortinet (5.0+).

Export the Fortinet configuration to the local system. To export the configuration from Fortinet firewall, see Export the Configuration from Fortinet Firewall.

Upload the Fortinet config file exported from Fortinet firewall, see Upload the Fortinet Configuration File.

In this step, you can specify the destination parameters for the migration. For detailed steps, see Specify Destination Parameters for the Secure Firewall Migration Tool.
.

Navigate to where you downloaded the pre migration report and review the report. For detailed steps, see Review the Pre-Migration Report.

To ensure that the Fortinet configuration is migrated correctly, map the Fortinet interfaces to the appropriate threat defense interface objects, security zones, and interface groups. For detailed steps, see Map Fortinet Firewall Configurations with Secure Firewall Device Manager Threat Defense Interfaces.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 16

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrating Palo Alto Networks Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator

Workspace

Steps

Secure Firewall Migration Tool

Map the Fortinet interfaces to the appropriate security zones, see Map Fortinet Interfaces to Security Zones for detailed steps.

Secure Firewall Migration Tool

Optimize and review the configuration carefully and validate that it is correct and matches how you want to configure the threat defense device. For detailed steps, see Optimize, Review and Validate the Configuration to be migrated.

Secure Firewall Migration Tool

This step in the migration process sends the migrated configuration to the cloud-delivered Firewall Management Center and allows you to download the post-migration report. For detailed steps, see Push the Migrated Configuration to Management Center.

Local Machine

Navigate to where you downloaded the post migration report and review the report. For detailed steps, see Review the Post-Migration Report and Complete the Migration.

Management Center Deploy the migrated configuration from the cloud-delivered Firewall Management Center to threat defense.

Migrating Palo Alto Networks Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
Select Source Configuration
You can migrate configurations from your Palo Alto Networks firewall by choosing Palo Alto Networks (6.1+) in the Source Firewall Vendor drop-down and manually uploading the derived configuration file to Firewall Migration Tool. To read about the Palo Alto Networks firewall configurations that are supported for migration and the limitations around them, see Guidelines and Limitations in the Migrating Palo Alto Networks Firewall to Secure Firewall Threat Defense with the Migration Tool book.
Select Target
In the Select Target page, the cloud-delivered Firewall Management Center provisioned on your CDO tenant is selected by default, and the threat defense devices managed by that management center are listed. You can choose the threat defense device you wish to migrate the configuration to, and proceed with the migration.
Note that the threat defense devices listed are displayed either as In Use or Available based on whether the device is being used in another migration instance. However, you can perform an override by clicking Change Device Status, selecting the device from the In Use list, and clicking Continue, which will make the device available for being selected as the target. Choosing Proceed without FTD pushes only NAT objects, ACLs, and port objects to the cloud-delivered Firewall Management Center. For more information about the commonly used ASA features and their equivalent threat defense features, see Cisco Secure Firewall ASA to Threat Defense Feature Mapping guide.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 17

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator Migrating Palo Alto Networks Firewall to Secure Firewall Threat Defense with the Firewall Migration Tool in Cisco Defense Orchestrator
Caution Changing the device status from In Use to Available impacts the ongoing migration instance that is using the device already. We recommend that you exercise caution when doing this.

To perform the migration with more detailed steps, continue to Export the Check Point Configuration Files in Migrating Check Point Firewall to Secure Firewall Threat Defense with the Migration Tool book.

Workspace

Steps

Cisco Defense Orchestrator

Log in to your CDO tenant, navigate Tools & Services > Firewall Migration

Tool, and click the blue plus instance.

button to start provisioning a new migration

Cisco Defense Orchestrator

Launch the migration instance from CDO and choose Palo Alto Networks (6.1+).

Palo Alto Networks Export the Configuration File: To export the configuration from Palo Alto

Firewall

Networks Firewall, see Export the Configuration from Palo Alto Networks.

Secure Firewall Migration Tool

Specify the destination parameters for the migration.

Secure Firewall Migration Tool

Navigate to where you downloaded the pre migration report and review the report. For detailed steps, see Review the Pre-Migration Report.

Secure Firewall Migration Tool

To ensure that the PAN configuration is migrated correctly, map the PAN interfaces to the appropriate threat defense interface objects, security zones, and interface groups. For detailed steps, see Map PAN Firewall Configurations with Secure Firewall Management Center Threat Defense Interfaces.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 18

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator

Related Documentation

Workspace

Steps

Secure Firewall Migration Tool

Map the PAN interfaces to the appropriate security zones, see Map PAN interfaces to security zones for detailed steps.

Secure Firewall Migration Tool

You can map PAN configuration to the corresponding target applications; see Map Configurations with Applications for detailed steps.

Secure Firewall Migration Tool

Optimize and review the configuration carefully and validate that it is correct and matches how you want to configure the threat defense device. For detailed steps, see Optimize, Review and Validate the Configuration to be Migrated.

Secure Firewall Migration Tool

This step in the migration process sends the migrated configuration to management center and allows you to download the post-migration report. For detailed steps, see Push the Migrated Configuration to Cloud-Delivered Firewall Management Center.

Local Machine

Navigate to where you downloaded the post migration report and review the report. For detailed steps, see Review the Post-Migration Report and Complete the Migration.

Cloud-Delivered Deploy the migrated configuration from the management center to threat

Firewall

defense.

Management Center

Related Documentation
To know more about migrating third-party firewalls using the Secure Firewall migration tool in CDO, see the following documents based on your requirement:
· To know about the latest features and release-specific information around the Firewall migration tool, see Cisco Secure Firewall Migration Tool Release Notes.

Note Cisco Defense Orchestrator hosts the latest version of the Secure Firewall migration tool.
· To migrate configurations from a Check Point firewall to threat defense, start from Export the Check Point Configuration Files in Migrating a Check Point Firewall to Threat Defense guide.
· To migrate configurations from a Palo Alto Networks firewall to threat defense, start from Export the Configuration from Palo Alto Networks Firewall in Migrating a Palo Alto Networks Firewall to Threat Defense guide.
· To migrate configurations from a Fortinet firewall to threat defense, start from Export the Configuration from Fortinet Firewall in Migrating a Fortinet Firewall to Threat Defense guide.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 19

Related Documentation

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator

Important Unlike ASA and FDM-managed device migrations, you can only upload a manually extracted configuration file for migrating a third-party firewall configuration to threat defense.
If you wish to read overall information about the Secure Firewall migration tool and all related documentation, see Cisco Secure Firewall Migration Tool.

Migrating Firewalls with the Firewall Migration Tool in Cisco Defense Orchestrator 20

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals