<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migration Configuration From TWO ASA TO TWO FTD in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343383#M1123329</link>
    <description>&lt;P&gt;To manage the ASA and FTD in the same FMC you would need to upgrade the FMC to 7.0.x and most likely have the 3105 FTD delivered with 7.0.x or have to down grade it manually as they will most likely be shipped with version 7.6.2 if you do not request anything else.&amp;nbsp; &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;I DO NOT RECOMMEND DOING THIS&lt;/STRONG&gt;&lt;/FONT&gt;.&amp;nbsp; 7.0.x has a ton of bugs which can cause more problems that the actual migration.&lt;/P&gt;
&lt;P&gt;Depending on if the FMC is a physical device or virtual device, the course of action might change a little.&lt;/P&gt;
&lt;P&gt;If your FMC is a virtual device, your best course of action is to setup a new virtual FMC running a 90 day trial license and associate the new FTDs to this (just be sure the mgmt IPs are different and that the data interfaces are not connected to the network or at least in admin shutdown).&amp;nbsp; Then migrate the configuration, either manually or via script/API.&amp;nbsp; Depending on how much config is to be migrated might determine if you go for manual or script migration.&lt;/P&gt;
&lt;P&gt;From one point of view this migration comes with little risk, that is to say if something does not work during the cutover you can just move back to the old ASAs, fix the FTD config and try again (very little down time).&lt;/P&gt;
&lt;P&gt;Now, if this is a physical FMC this becomes a bit more risky.&amp;nbsp; In this case, unless you are replacing the FMC, you would need to disconnect the FMC from the production network so that the ASAs lose connectivity to the FMC (as if the FMC has failed).&amp;nbsp; That way the ASAs see the FMC as failed and will continue to operate as usual (DO NOT UNREGISTER / REMOVE THE ASAs FROM THE FMC).&amp;nbsp; Before continuing make sure you have screenshots / notes of the interface configuration, routing configuration, all VPN configuration, and NAT configuration (possibly).&amp;nbsp; Basically any configuration that references a physical interface name in case something goes wrong and all that configuration is removed.&lt;/P&gt;
&lt;P&gt;Then in a staging network, upgrade the FMC to v7.6.2+ or whichever version is running on the FTD3105s or higher and then register the FTDs to the FMC.&amp;nbsp; Now configure the interfaces, routing and VPNs, associate the interfaces to the relevant security zones and / or groups and you should be all set.&lt;/P&gt;</description>
    <pubDate>Thu, 30 Oct 2025 11:39:30 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2025-10-30T11:39:30Z</dc:date>
    <item>
      <title>Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343097#M1123318</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;
&lt;P&gt;I have FMC manage two ASA box , I need Migration All configuration from two ASA to a new two FTD model (3105 NGFW) , notes the same FMC manage anew FTD boxes and migration with the same IP MGMT .&lt;/P&gt;
&lt;P&gt;what is the best way to migration the same configuration to A new FTD boxes with the same IP MGMT at the same FMC ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 13:45:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343097#M1123318</guid>
      <dc:creator>foahmed</dc:creator>
      <dc:date>2025-10-29T13:45:56Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343226#M1123319</link>
      <description>&lt;P&gt;Have you explored the &lt;A href="https://www.cisco.com/site/us/en/products/security/firewalls/secure-firewall-migration-tool/index.html" target="_self"&gt;migration tool&lt;/A&gt;?&lt;/P&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 29 Oct 2025 19:32:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343226#M1123319</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2025-10-29T19:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343249#M1123320</link>
      <description>&lt;P&gt;FMC manages ASA (what code is running?)&lt;/P&gt;
&lt;P&gt;A migration tool can help you, but there are always limitations.&lt;/P&gt;
&lt;P&gt;If this is a small rule base, my suggestion is as follows: if&lt;/P&gt;
&lt;P&gt;you want to move the same management IP, it may not work; at some point in time, you need to take the ASA offline and bring the FTD online.&lt;/P&gt;
&lt;P&gt;So, it's better to choose a different Management IP for FTD, as it's a good option. And make a rule base (and you get a chance to remove all legacy stuff that's not carried forward).&lt;/P&gt;
&lt;P&gt;If ASA is in HA, and FTD is also going to be HA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Oct 2025 21:24:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343249#M1123320</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-10-29T21:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343332#M1123321</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;
&lt;P&gt;If use different MGMT IP and register anew FTD on the same FMC , when I need migration configuration like the same ip of the interface from ASA to FTD , Is effect or conflict occur or not ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 07:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343332#M1123321</guid>
      <dc:creator>foahmed</dc:creator>
      <dc:date>2025-10-30T07:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343337#M1123322</link>
      <description>&lt;P&gt;As mentioned, the best I can think of is that MGMT IP will be new, and you can migrate the rest of the configuration. (either using the Migration tool or Manual config - depends on your comfort.)&lt;/P&gt;
&lt;P&gt;Every migration is different, so you need to plan what works for you. I have mentioned two options; please decide which you want to go with.&lt;/P&gt;
&lt;P&gt;Even if you want to register FTD with FMC, you cannot use the same IP address for the Live ASA and the new FTD, right?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 07:59:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343337#M1123322</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-10-30T07:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343339#M1123323</link>
      <description>&lt;P&gt;Dear,&lt;/P&gt;
&lt;P&gt;I planning to use anew MGMT IP for FTD and register it on the same FMC , I need best way or steps to migrate all configuration Manual from ASA to FTD .&lt;/P&gt;
&lt;P&gt;If migrate the same ips of the interfaces from ASA to FTD when two devices register on the same fmc , Is face any effect or duplicate or conflict or not?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 08:06:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343339#M1123323</guid>
      <dc:creator>foahmed</dc:creator>
      <dc:date>2025-10-30T08:06:24Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343352#M1123324</link>
      <description>&lt;P&gt;you should be able to start configuring the FTD with the same IPs, as long as the FTD doesn't have those interface connected to anything that could cause a conflict.&lt;/P&gt;
&lt;P&gt;Migration-wise, the migration tool can be a good starting point, but it really comes down to how big and complex the your configuration is.&lt;BR /&gt;It's important to understand one big difference between ASA and FTD, with FTD being a zone-based firewall, and the ASA is not.&lt;BR /&gt;Because of this, the policy migration isn't always straightforward, so be sure to review the output from the migration tool.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 09:20:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343352#M1123324</guid>
      <dc:creator>Jonatan Jonasson</dc:creator>
      <dc:date>2025-10-30T09:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343375#M1123326</link>
      <description>&lt;P&gt;I decided use the new MGMT IP for New FTD Devices but you have misunderstanding I have FTD Version 6.6.7 running on&amp;nbsp; ASA Model 5525-X&amp;nbsp; , so I need migrate the all configuration from old boxes to new FTD Model 3105 ,so I need best steps to migrate manual ok.&lt;/P&gt;
&lt;P&gt;If I register New FTD on the same FMC manage old ASA device , and configure all interfaces on anew FTD devices by the same name and IP address , will face any conflict of ips or not?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 10:59:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343375#M1123326</guid>
      <dc:creator>foahmed</dc:creator>
      <dc:date>2025-10-30T10:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343383#M1123329</link>
      <description>&lt;P&gt;To manage the ASA and FTD in the same FMC you would need to upgrade the FMC to 7.0.x and most likely have the 3105 FTD delivered with 7.0.x or have to down grade it manually as they will most likely be shipped with version 7.6.2 if you do not request anything else.&amp;nbsp; &lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;I DO NOT RECOMMEND DOING THIS&lt;/STRONG&gt;&lt;/FONT&gt;.&amp;nbsp; 7.0.x has a ton of bugs which can cause more problems that the actual migration.&lt;/P&gt;
&lt;P&gt;Depending on if the FMC is a physical device or virtual device, the course of action might change a little.&lt;/P&gt;
&lt;P&gt;If your FMC is a virtual device, your best course of action is to setup a new virtual FMC running a 90 day trial license and associate the new FTDs to this (just be sure the mgmt IPs are different and that the data interfaces are not connected to the network or at least in admin shutdown).&amp;nbsp; Then migrate the configuration, either manually or via script/API.&amp;nbsp; Depending on how much config is to be migrated might determine if you go for manual or script migration.&lt;/P&gt;
&lt;P&gt;From one point of view this migration comes with little risk, that is to say if something does not work during the cutover you can just move back to the old ASAs, fix the FTD config and try again (very little down time).&lt;/P&gt;
&lt;P&gt;Now, if this is a physical FMC this becomes a bit more risky.&amp;nbsp; In this case, unless you are replacing the FMC, you would need to disconnect the FMC from the production network so that the ASAs lose connectivity to the FMC (as if the FMC has failed).&amp;nbsp; That way the ASAs see the FMC as failed and will continue to operate as usual (DO NOT UNREGISTER / REMOVE THE ASAs FROM THE FMC).&amp;nbsp; Before continuing make sure you have screenshots / notes of the interface configuration, routing configuration, all VPN configuration, and NAT configuration (possibly).&amp;nbsp; Basically any configuration that references a physical interface name in case something goes wrong and all that configuration is removed.&lt;/P&gt;
&lt;P&gt;Then in a staging network, upgrade the FMC to v7.6.2+ or whichever version is running on the FTD3105s or higher and then register the FTDs to the FMC.&amp;nbsp; Now configure the interfaces, routing and VPNs, associate the interfaces to the relevant security zones and / or groups and you should be all set.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 11:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343383#M1123329</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-10-30T11:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343386#M1123330</link>
      <description>&lt;P&gt;I dont need to deploy Anew FMC , I have already Virtual FMC ,SO I need register anew FTD on the same FMC and migrate configuration from old boxes ASA to Anew FTD .&lt;/P&gt;
&lt;P&gt;the question , when migrate the configuration like same name and ip for interface from old device to anew ftd , did face any conflict of ips or name or not?&amp;nbsp; note: The same fmc mange old devices and new ftd device&amp;nbsp; and migrate at the same time .&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 11:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343386#M1123330</guid>
      <dc:creator>foahmed</dc:creator>
      <dc:date>2025-10-30T11:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343415#M1123331</link>
      <description>&lt;P&gt;Once the new MGMT IP is configured on FTD and onboarded to FMC, the remaining configuration can be created as long as the interfaces are not connected to the Live network. This can be a Migration tool or manual work.&lt;/P&gt;
&lt;P&gt;Other post suggested here—make sure you have the same version of FTD running if you want to restore the config. Also, make sure FMC and FTD Are Upgraded to the latest code to mitigate many security breaches caused by the old code.&lt;/P&gt;
&lt;P&gt;Note : always read the release notes before upgrade, and take backups out of the box in case need to restore required.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 13:37:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343415#M1123331</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-10-30T13:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343420#M1123332</link>
      <description>&lt;P&gt;IPs can be the same so long as the interfaces on the new FTDs are in "shutdown".&amp;nbsp; As for the naming, you would need new names for the physical interfaces, temporarily, and then once the ASA5525s are removed from the FMC you can update the names accordingly if needed.&lt;/P&gt;
&lt;P&gt;Just keep in mind that the highest FMC version you can have is 7.2 to still be able to manage the ASAs running 6.6.7.&amp;nbsp; Depending on what image the FTD3105s have been shipped with, you might need to downgrade them for the migration.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 13:40:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343420#M1123332</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2025-10-30T13:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: Migration Configuration From TWO ASA TO TWO FTD</title>
      <link>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343455#M1123336</link>
      <description>&lt;P&gt;Are your ASAs actually running FTD image or just ASA base + Firepower service module?&lt;/P&gt;
&lt;P&gt;If it is #1 then I would recommend just manually building a new FMC with 7.6.3 and recreate the Access Control Policy, NAT, device configuration etc. manually on it.&lt;/P&gt;
&lt;P&gt;If it is #2 you can use the Firewall Migration Tool (FMT) as suggested by&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/274561"&gt;@nspasov&lt;/a&gt;&amp;nbsp;. I would still build a new FMC since an old 6.6.7 FMC is not very useful except to inspect any policies that need to be rebuilt on the new FMC.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Oct 2025 15:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migration-configuration-from-two-asa-to-two-ftd/m-p/5343455#M1123336</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-10-30T15:28:42Z</dc:date>
    </item>
  </channel>
</rss>

