<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migration from Barracuda FW to Cisco FMC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256505#M1119313</link>
    <description>&lt;P&gt;Stare and compare and reconfigure manually.&amp;nbsp; A great time to clean up old/unused/unneeded rules.&lt;/P&gt;</description>
    <pubDate>Tue, 04 Feb 2025 12:17:46 GMT</pubDate>
    <dc:creator>ahollifield</dc:creator>
    <dc:date>2025-02-04T12:17:46Z</dc:date>
    <item>
      <title>Migration from Barracuda FW to Cisco FMC</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256044#M1119284</link>
      <description>&lt;P&gt;Hello Cisco Community,&lt;/P&gt;
&lt;P&gt;We are faced with the challenge of transferring the access rule list from an existing Barracuda firewall to Cisco FMC. On the Cisco side, two FTDs are connected to the FMC.&lt;/P&gt;
&lt;P&gt;When looking into the Barracuda Firewall, I noticed that, unlike in the Cisco world, the rules between ACL and NAT are not strictly separated. In addition, the export from the Barracuda is very individual, which further complicates matters.&lt;/P&gt;
&lt;P&gt;Therefore my question is there anyone who has already faced a similar challenge? How did they deal with this challenge?&lt;/P&gt;
&lt;P&gt;Is there possibly a publicly available open source project, e.g. on GitHub, that can be used to translate the rules for the FMC?&lt;/P&gt;
&lt;P&gt;I would be grateful for any advice.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2025 10:39:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256044#M1119284</guid>
      <dc:creator>oliver.mentel</dc:creator>
      <dc:date>2025-02-03T10:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from Barracuda FW to Cisco FMC</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256052#M1119285</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;The &lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;Cisco Secure Firewall Migration Tool&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt; supports migration from third-party firewalls (e.g., Check Point, Fortinet) to Cisco FTD. It allows selective migration of access control and NAT rules while removing redundant or shadowed rules. This tool could simplify the process if Barracuda configurations are supported or can be adapted for import &lt;A href="https://www.cisco.com/c/en/us/products/security/secure-firewall-migration-tool/index.html" target="_self"&gt;Link is here&lt;/A&gt; but I do not think Barracuda is in the tool migration.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Cisco provides APIs for FMC that can be used to automate rule creation and management. Here at this Community you may find scripts this can assist in merging or translating access control policies. For example&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;A Python script designed for merging access policies in FMC could be adapted to import rules from Barracuda exports &lt;A href="https://community.cisco.com/t5/security-knowledge-base/fmc-api-based-tool-merge-two-access-control-policy-s-rules-into/ta-p/4109405" target="_self"&gt;Here&lt;/A&gt; and &lt;A href="https://community.cisco.com/t5/network-security/fmc-copying-access-rules-from-an-acp-and-applying-those-copied/td-p/4067487" target="_self"&gt;Here&lt;/A&gt; this link may give you for insight and give your more kind of road mind how to appraoch this for your migration.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;I do not come across and doesn’t appear to be a specific open-source project for Barracuda-to-FMC migration, general-purpose firewall migration tools or custom scripts could be developed:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Parse the Barracuda export file to extract ACL and NAT rules.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Convert them into a format compatible with FMC (e.g., JSON for API imports)&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;These are the following step I shall take in scope of this migration hence they are not limited.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;H2&gt;&lt;FONT size="4"&gt;Steps for Migration&lt;/FONT&gt;&lt;/H2&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Export Rules from Barracuda&lt;SPAN&gt;: Use the Barracuda interface to export ACL and NAT configurations.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Analyze and Categorize Rules&lt;SPAN&gt;: Separate ACLs from NAT rules manually or using a script.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Prepare for FMC Import&lt;/FONT&gt;&lt;FONT size="4"&gt;, -&lt;/FONT&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Use the Cisco Secure Firewall Migration Tool if compatible. &lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;Alternatively, adapt an API-based script to create rules in FMC.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Test in a Lab Environment&lt;SPAN&gt;: Before deploying, test the imported rules on a non-production FMC setup with FTDs.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT size="4"&gt;Deploy and Monitor&lt;SPAN&gt;: Apply the configurations to live devices and monitor traffic to ensure correctness.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT size="4"&gt;&lt;SPAN&gt;worth reaching out to your cisco partner or cisco representative in your area.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2025 11:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256052#M1119285</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2025-02-03T11:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from Barracuda FW to Cisco FMC</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256505#M1119313</link>
      <description>&lt;P&gt;Stare and compare and reconfigure manually.&amp;nbsp; A great time to clean up old/unused/unneeded rules.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 12:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256505#M1119313</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-02-04T12:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Migration from Barracuda FW to Cisco FMC</title>
      <link>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256512#M1119314</link>
      <description>&lt;P&gt;You are absolutely right. In this case, it was the explicit wish that it should be adopted one-to-one as far as possible.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 12:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-from-barracuda-fw-to-cisco-fmc/m-p/5256512#M1119314</guid>
      <dc:creator>oliver.mentel</dc:creator>
      <dc:date>2025-02-04T12:22:24Z</dc:date>
    </item>
  </channel>
</rss>

