Supported Configurations
The migration tool supports the following configurations:
-
Network objects and groups
-
Service objects, except those configured for a source and destination
-
Referenced ACL and NAT rules
-
Service object groups
NoteNested service object group contents are broken down to individual objects before being migrated, because the cloud-delivered management center does not support nesting.
-
IPv4 and IPv6 FQDN objects and groups
-
IPv6 conversion (interface, static routes, objects, ACL, and NAT)
-
Access rules applied to ingress interfaces
-
Global ACLs
-
Auto NAT, manual NAT, and object NAT
-
Static routes, equal-cost multipath (ECMP) routes, and policy-based routing (PBR)
-
Physical interfaces
-
Sub-interfaces
-
Port channels
-
Virtual tunnel interface
-
Bridge groups in transparent mode
-
IP SLA objects - the migration tool creates them, maps them with static routes, and migrates them
-
Time-based objects
-
Site-to-site VPN
-
Site-to-Site VPN—When the Firewall migration tool detects crypto-map configuration in the source ASA, FDM-managed device, Palo Alto Networks firewall, or Fortinet firewall, the Secure Firewall migration tool migrates it as a point-to-point topology to the management center VPN
-
Crypto-map (static/dynamic)-based VPN from ASA, FDM-managed devices, Palo Alto Networks firewall, and Fortinet firewall
-
Route-based (VTI) ASA and FDM VPN
-
Certificate-based VPN migration from ASA, FDM-managed device, Palo Alto Networks firewall, Fortinet firewall
ImportantIf you have site-to-site VPN configurations in your source ASA, FDM-managed device, Palo Alto Networks firewall, or Forinet firewall, ensure that their device trustpoint or certificates are configured manually in the cloud-delivered FMC.
-
-
Remote-access VPN
-
SSL and IKEv2 protocols
-
Authentication methods—AAA only, client certificate only, SAML, AAA, and client certificate
-
AAA—Radius, local, LDAP, and AD
-
Connection profiles, group policy, dynamic access policy, LDAP attribute map, and certificate map
-
Standard and extended ACL
-
Custom attributes and VPN load balancing
ImportantIf you have configured remote-access VPN in your source firewall, ensure the following tasks are performed:
-
Configure the ASA,FDM-managed device, Palo Alto Networks, and Fortinet firewall trustpoints manually on the management center as PKI objects
-
Retrieve AnyConnect packages, Hostscan files (dap.xml, data.xml, hostscan package), external browser package, and AnyConnect profiles from the source ASA and FDM-managed device
-
Upload all AnyConnect packages and profiles to the management center
-
-
Dynamic route objects, BGP, and EIGRP
-
Policy list
-
Prefix list
-
Community list
-
Autonomous system (AS) path
-
Route map
-
Note | The migration tool analyzes all objects and object groups based on both their name and configuration, and reuses objects that have the same name and configuration; however, XML profiles in remote access VPN configurations are validated only using their name. |
Refer to Cisco Secure Firewall Migration Tool Compatibility Guide for more information.