<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Marvin, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033462#M1016152</link>
    <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The issue her is i'm using a virtual FMC in my lab as recommended by cisco so will they accept supporting this virtual FMC.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Mar 2017 12:59:54 GMT</pubDate>
    <dc:creator>seegomaa</dc:creator>
    <dc:date>2017-03-28T12:59:54Z</dc:date>
    <item>
      <title>ASA to FTD migration tool</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033460#M1016149</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;I'm in trying to convert ASA configuration file to FTD but gettingbelow error on FMC virtual&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;Error&lt;/H2&gt;
&lt;P&gt;&lt;SPAN&gt;Invalid ASA configuration file! Please pass a valid file.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'm following Cisco&amp;nbsp;guide I installed&amp;nbsp;FMC virtual on VMWare and trying to upload the ASA configuration to convert it but stuck in the upload package step. ASA configuration file is .txt and ASA version is 9.2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:02:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033460#M1016149</guid>
      <dc:creator>seegomaa</dc:creator>
      <dc:date>2020-02-21T14:02:31Z</dc:date>
    </item>
    <item>
      <title>I've only heard of one or two</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033461#M1016150</link>
      <description>&lt;P&gt;I've only heard of one or two people trying out the migration tool and they were not happy with the experience.&lt;/P&gt;
&lt;P&gt;I doubt you will get much input on your issue on the forums - I'd suggest going straight to a TAC case to save time.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 12:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033461#M1016150</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-28T12:56:30Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033462#M1016152</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The issue her is i'm using a virtual FMC in my lab as recommended by cisco so will they accept supporting this virtual FMC.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 12:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033462#M1016152</guid>
      <dc:creator>seegomaa</dc:creator>
      <dc:date>2017-03-28T12:59:54Z</dc:date>
    </item>
    <item>
      <title>You're right - labs and NFR</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033463#M1016154</link>
      <description>&lt;P&gt;You're right - labs and NFR gear can be challenging in that respect.&lt;/P&gt;
&lt;P&gt;Do you have a target FTD device or FMC for this "migration" that's under support? That would work.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 13:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033463#M1016154</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-03-28T13:04:00Z</dc:date>
    </item>
    <item>
      <title>I have production FMC  under</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033464#M1016156</link>
      <description>&lt;P&gt;I have production FMC &amp;nbsp;under support.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2017 13:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033464#M1016156</guid>
      <dc:creator>seegomaa</dc:creator>
      <dc:date>2017-03-28T13:10:42Z</dc:date>
    </item>
    <item>
      <title>I found the issue. the line</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033465#M1016157</link>
      <description>&lt;P&gt;I found the issue. the line highlighted in blue was missing !!!. I don't understand why the tool gives error with such line.&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;: Saved&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;:&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;: Serial Number: *********&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;: Hardware: &amp;nbsp; ASA5585-SSP-20, 12288 MB RAM, CPU Xeon 5500 series 2133 MHz, 1 CPU (8 cores)&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2" color="#000099"&gt;&lt;B&gt;: Written by admin at 06:37:47.509 UTC Thu Jan 5 2017&lt;/B&gt;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;!&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;ASA Version 9.2(4)&amp;nbsp;&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;!&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;hostname&amp;nbsp;xxxxxx&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;domain-name xxx.xxx&lt;/FONT&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;!&lt;/FONT&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;FONT face="Verdana, Arial, Helvetica, sans-serif" size="2"&gt;!&lt;/FONT&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 28 Mar 2017 17:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033465#M1016157</guid>
      <dc:creator>seegomaa</dc:creator>
      <dc:date>2017-03-28T17:45:58Z</dc:date>
    </item>
    <item>
      <title>after importing configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033466#M1016158</link>
      <description>&lt;P&gt;after&amp;nbsp;importing configuration file to production FMC i don't understand interface groups. I used to assign one interface to a zone earlier. but interface group is new for me.&lt;/P&gt;
&lt;P&gt;can anyone explain what is interface groups vs zone.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2017 07:58:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033466#M1016158</guid>
      <dc:creator>seegomaa</dc:creator>
      <dc:date>2017-03-29T07:58:30Z</dc:date>
    </item>
    <item>
      <title>Are object which can be used</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033467#M1016159</link>
      <description>&lt;P&gt;Are object which can be used in ACP rules or wherever it requires to add an interface.&lt;/P&gt;</description>
      <pubDate>Sat, 01 Apr 2017 18:17:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033467#M1016159</guid>
      <dc:creator>Claudiu Cismaru</dc:creator>
      <dc:date>2017-04-01T18:17:01Z</dc:date>
    </item>
    <item>
      <title>Hey Mate,</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033468#M1016160</link>
      <description>&lt;P&gt;Hey Mate,&lt;/P&gt;
&lt;P&gt;did you get your migration worked well ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am in the process of same migration, can you able to share your experience &amp;nbsp;and any special consideration that I many to think about. I mostly have ACLs in .. how did you deal with interface group and zoning ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2017 07:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033468#M1016160</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-04-18T07:22:40Z</dc:date>
    </item>
    <item>
      <title>Hi Prashant,</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033469#M1016161</link>
      <description>&lt;P&gt;Hi Prashant,&lt;/P&gt;
&lt;P&gt;I didn't get any clear clarifications on zones vs interface groups so &amp;nbsp;I ignored interfaces groups. i used only zones and removed all interfaces from interface groups. All my ACL and NAT are mapped to security zones only. Last Friday we migrated to FTD and it worked perfectly.&lt;/P&gt;
&lt;P&gt;Please access cli and verify that the configuration is being pushed from FMC to FTD and you can take copy of the configuration also from the cli and compare it to your old ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please also try to use Packet trace in advanced troubleshooting tab to check which access rule and NAT rule your traffic will match before you migrate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure you assign the ACP and NAT to the device.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Still i have one question searching for answer. &amp;nbsp;In ASA to allow internal users to communicate with dmz servers we had to use NAT 0 or nat to the same ip. Do we still need to add such rules in the FTD ? all these rules already migrated and not sure what will happen if i remove them.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;all the best.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2017 10:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033469#M1016161</guid>
      <dc:creator>seegomaa</dc:creator>
      <dc:date>2017-04-18T10:55:06Z</dc:date>
    </item>
    <item>
      <title>An interface can only be</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033470#M1016162</link>
      <description>&lt;P&gt;An interface can only be assigned to a single zone but to multiple interface groups enabling much more flexibility.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2017 15:41:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033470#M1016162</guid>
      <dc:creator>Alexander Hartmaier</dc:creator>
      <dc:date>2017-04-18T15:41:55Z</dc:date>
    </item>
    <item>
      <title>Hello seegomaa. Thanks for</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033471#M1016163</link>
      <description>&lt;P&gt;&lt;G class="gr_ gr_20 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Punctuation only-ins replaceWithoutSep" id="20" data-gr-id="20"&gt;Hello&lt;/G&gt;&amp;nbsp;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A href="https://supportforums.cisco.com/users/seegomaa" title="View user profile." class="username" lang="" about="/users/seegomaa" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;&lt;G class="gr_ gr_19 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace" id="19" data-gr-id="19"&gt;seegomaa&lt;/G&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;. Thanks for your post, in a few days I have to work with same migration.&lt;/P&gt;
&lt;P&gt;Did you first convert ASA to FTD and then connected FTD to FMC?&lt;BR /&gt;How did you import ASA's configuration on the FTD?&lt;/P&gt;
&lt;P&gt;What guide did you use?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I would be grateful for any help you are able to provide.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2017 23:00:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033471#M1016163</guid>
      <dc:creator>#Mat</dc:creator>
      <dc:date>2017-04-18T23:00:38Z</dc:date>
    </item>
    <item>
      <title>You can use Virtual FMC to</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033472#M1016164</link>
      <description>&lt;P&gt;You can use Virtual FMC to convert ASA config to a format that can be directly uploaded into production FMC. However , for this your existing ASA should be running with the code 9.1 and above ( as per cisco docs).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You need to first connect FTD to your FMC in order to make any changes,HTH&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 01:41:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033472#M1016164</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-04-19T01:41:46Z</dc:date>
    </item>
    <item>
      <title>Security -zone is similar to</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033473#M1016165</link>
      <description>&lt;P&gt;Security -zone is similar to name-if, you need to apply ACL to a security zone, the same we have been doing to name-if ( inteface name).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, multiple interfaces can be the part of same security zone (&amp;nbsp; not sure if there is any limit) , this will ensure that same policies will be applied to all the interfaces participaiting in the same security-zone.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;However, when we migrate ASA to FTD, it make sense to have 1 to 1 mapping between your ASA interfaces ( name-if) and the security zones&amp;nbsp;. Let me know if anyone has other thought.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 01:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033473#M1016165</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-04-19T01:45:39Z</dc:date>
    </item>
    <item>
      <title>Hey Seegomma, thanks for your</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033474#M1016166</link>
      <description>&lt;P&gt;Hey Seegomma, thanks for your reply.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial','sans-serif'; font-size: 12pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial','sans-serif'; font-size: 12pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial','sans-serif'; font-size: 12pt;"&gt;So you used one security zone for each of interfaces on your existing ASA? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial','sans-serif'; font-size: 12pt;"&gt;Can you please confirm if you have applied new ACLs under pre-filter or access control policy? Do we also need to worry about security level as this is with existing devices that allows all traffic from higher to lower level? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial','sans-serif'; font-size: 12pt;"&gt;What command did you use to check the policies at the new FTD devices?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial','sans-serif'; font-size: 12pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial','sans-serif'; font-size: 12pt;"&gt;I don’t think there is auto-nat feature on FTD hence I Don’t see any need of configuring a NAT 0 or identity NAT for your traffic going from inside to DMZ segments. Your new FTD is running in cluster layer 2 mode ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0cm 0cm 7.5pt; line-height: 15pt;"&gt;&lt;SPAN style="color: #58585b; font-family: 'Arial','sans-serif'; font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 04:30:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033474#M1016166</guid>
      <dc:creator>prashant dwivedi</dc:creator>
      <dc:date>2017-04-19T04:30:20Z</dc:date>
    </item>
    <item>
      <title>Hi Prashant,</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033475#M1016167</link>
      <description>&lt;P&gt;Hi Prashant,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So you used one security zone for each of interfaces on your existing ASA?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Yes&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Can you please confirm if you have applied new ACLs under pre-filter or access control policy? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ACL is applied under ACP .&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There is no security levels in the FTD. if there is no ACL match, default action in the bottom will apply.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Your new FTD is running in cluster layer 2 mode ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;FTD is running in HA. Firewall is running routed mode. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;could you please clarify what do you mean by Layer 2 mode ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;this is my email you can contact me: &amp;nbsp;mohamed.gbm@gmail.com&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 04:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033475#M1016167</guid>
      <dc:creator>seegomaa</dc:creator>
      <dc:date>2017-04-19T04:30:21Z</dc:date>
    </item>
    <item>
      <title>Hi ortiz</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033476#M1016168</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/ortizmatias" title="View user profile." class="username" lang="" about="/users/ortizmatias" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;ortiz&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;As prashant mentioned, you need to use Lab virtual FMC. never use the production FMC for configuration conversion because &amp;nbsp;once you use it for conversion you can revert it back and disable the conversion tool ( anyone correct if mistaken please)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Did you first convert ASA to FTD and then connected FTD to FMC?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Please note that there are two different FMCs here, your production FMC which you will connect FTD to and lab FMC which will be used to convert ASA configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How did you import ASA's configuration on the FTD?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;I followed cisco &amp;nbsp;guide&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/firepower/620/asa2ftd-migration/asa2ftd-migration-guide-620/asa2ftd_intro.html&lt;/P&gt;
&lt;P&gt;simply take copy of ASA configuration then enable the tool on your lab FMC, then import ASA configuration. FMC will convert it then export it and import it to your production FMC&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 04:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033476#M1016168</guid>
      <dc:creator>seegomaa</dc:creator>
      <dc:date>2017-04-19T04:40:42Z</dc:date>
    </item>
    <item>
      <title>Thanks seegomaa and prashant</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033477#M1016170</link>
      <description>&lt;P&gt;&lt;G class="gr_ gr_4 gr-alert gr_gramm gr_inline_cards gr_run_anim Punctuation only-ins replaceWithoutSep" id="4" data-gr-id="4"&gt;Thanks&lt;/G&gt; &lt;A href="https://supportforums.cisco.com/users/seegomaa" title="View user profile." class="username" lang="" about="/users/seegomaa" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;&lt;G class="gr_ gr_5 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace" id="5" data-gr-id="5"&gt;seegomaa&lt;/G&gt;&lt;/A&gt; and &lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A href="https://supportforums.cisco.com/users/lnctsati1985" title="View user profile." class="username" lang="" about="/users/lnctsati1985" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;&lt;G class="gr_ gr_6 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace" id="6" data-gr-id="6"&gt;prashant&lt;/G&gt; &lt;G class="gr_ gr_12 gr-alert gr_gramm gr_inline_cards gr_run_anim Style multiReplace" id="12" data-gr-id="12"&gt;&lt;G class="gr_ gr_7 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del multiReplace" id="7" data-gr-id="7"&gt;dwivedi&lt;/G&gt;&lt;/G&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;G class="gr_ gr_12 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Style multiReplace" id="12" data-gr-id="12"&gt; &lt;/G&gt;&lt;/SPAN&gt;&lt;G class="gr_ gr_12 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Style multiReplace" id="12" data-gr-id="12"&gt;!&lt;/G&gt; You help me a lot with these notes.&lt;/P&gt;
&lt;P&gt;Kind Regards.-&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 00:32:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033477#M1016170</guid>
      <dc:creator>#Mat</dc:creator>
      <dc:date>2017-04-26T00:32:00Z</dc:date>
    </item>
    <item>
      <title>I just have the same issue. I</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033478#M1016172</link>
      <description>&lt;P&gt;I just have the same issue. I tried to add "&amp;nbsp;&lt;SPAN&gt; Written by admin at 06:37:47.509 UTC Thu Jan 5 2017 " at the exact same place in my config file as follows :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;: Saved&lt;/P&gt;
&lt;P&gt;: &lt;BR /&gt;: Serial Number:&amp;nbsp;&lt;BR /&gt;: Hardware: ASA5515, 8192 MB RAM, CPU Clarkdale 3058 MHz, 1 CPU (4 cores)&lt;BR /&gt;: Written by admin at 06:37:47.509 UTC Thu Jan 5 2017&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;ASA Version 9.5(3) &lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It still says invalid ASA configuration file. Please Advise!!!!!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;thanks in advance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 07:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033478#M1016172</guid>
      <dc:creator>karthik.b4055</dc:creator>
      <dc:date>2017-04-26T07:03:39Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033479#M1016174</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am uploading FWSM file to&amp;nbsp; FMC migration tool but its not accepting, dose anyone has migrate FWMS file here.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2017 11:21:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-ftd-migration-tool/m-p/3033479#M1016174</guid>
      <dc:creator>khanquisher</dc:creator>
      <dc:date>2017-04-26T11:21:37Z</dc:date>
    </item>
  </channel>
</rss>

