<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Migrate from ASA to X-Series Next Generation Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335389#M343818</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A sample of my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group LAYHIN-VPNACCESS type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group LAYHIN-VPNACCESS general-attributes&lt;/P&gt;&lt;P&gt; address-pool layhin-ippool&lt;/P&gt;&lt;P&gt; authentication-server-group AASERVER&lt;/P&gt;&lt;P&gt; default-group-policy LAYHIN-VPNACCESS&lt;/P&gt;&lt;P&gt;tunnel-group LAYHIN-VPNACCESS ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Every vpn user has their own tunnel-group. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Aug 2013 07:22:36 GMT</pubDate>
    <dc:creator>limlayhin</dc:creator>
    <dc:date>2013-08-29T07:22:36Z</dc:date>
    <item>
      <title>Migrate from ASA to X-Series Next Generation Firewall</title>
      <link>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335387#M343816</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have firewall running on ASA 5520 Firewall. There is a need to do Tech Refresh to X-Series as the model is EOS and going to be EOL soon. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have hundreds of VPN accounts, running on IKEv1, using Cisco IPSec VPN Clients. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any migration tools that can help me converting my current configuration to the new firewall configuration? &lt;/P&gt;&lt;P&gt;Current ASA 5520 version is 8.3. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New X-Series will be running on 9.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried copy and paste configuration from ASA5520 to X-Series (I have a testing X-Series ASA now), but the preshared password is not the same. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't want to reset all my hundreds over users preshared key, there must be other smarter way to do that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is much appreciated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance. &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:31:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335387#M343816</guid>
      <dc:creator>limlayhin</dc:creator>
      <dc:date>2019-03-12T02:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: Migrate from ASA to X-Series Next Generation Firewall</title>
      <link>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335388#M343817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding as your ASA is already running 8.3 software level the format changes to the configuration would be minor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN related problem you might be running into is that (if I remember correctly) 8.3 software still didnt have the &lt;STRONG&gt;"ikev1"&lt;/STRONG&gt; keyword in the VPN configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example commands like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ipsec ikev1 transform-set &lt;TRANSFORM set="" configurations=""&gt;&lt;/TRANSFORM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ikev1 pre-shared-key &lt;KEY&gt;&lt;/KEY&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ikev1 policy 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ikev1 enable &lt;INTERFACE&gt;&lt;/INTERFACE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map &lt;MAP name=""&gt; &lt;ORDER number=""&gt; set ikev1 transform-set &lt;SET name=""&gt;&lt;/SET&gt;&lt;/ORDER&gt;&lt;/MAP&gt;&lt;/STRONG&gt;&lt;MAP name=""&gt;&lt;/MAP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And there might be others also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to make those kind of modifications to the configuration before inserting it to the new ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You naturally also have the option to upgrade the current ASA to some 8.4 software level which would be almost identical to the 9.1 configuration format. (9.1 introduced some modifications related to ACL whre &lt;STRONG&gt;"any"&lt;/STRONG&gt; refers to both IPv4/IPv6 and &lt;STRONG&gt;"any4"&lt;/STRONG&gt; IPv4 only and &lt;STRONG&gt;"any6"&lt;/STRONG&gt; IPv6 only if I dont remember wrong)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what you mean by the PSK / Pre-Shared-Key thing. Are you saying that you can't get the current PSKs and dont want to change them for all the connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To determine the PSKs (that now show up as *********) you can use this command on the current ASA to view the actual PSKs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;more system:running-config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will let you see all the PSKs (among other things)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 07:11:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335388#M343817</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T07:11:29Z</dc:date>
    </item>
    <item>
      <title>Migrate from ASA to X-Series Next Generation Firewall</title>
      <link>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335389#M343818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A sample of my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group LAYHIN-VPNACCESS type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group LAYHIN-VPNACCESS general-attributes&lt;/P&gt;&lt;P&gt; address-pool layhin-ippool&lt;/P&gt;&lt;P&gt; authentication-server-group AASERVER&lt;/P&gt;&lt;P&gt; default-group-policy LAYHIN-VPNACCESS&lt;/P&gt;&lt;P&gt;tunnel-group LAYHIN-VPNACCESS ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Every vpn user has their own tunnel-group. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 07:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335389#M343818</guid>
      <dc:creator>limlayhin</dc:creator>
      <dc:date>2013-08-29T07:22:36Z</dc:date>
    </item>
    <item>
      <title>Migrate from ASA to X-Series Next Generation Firewall</title>
      <link>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335390#M343819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the actual problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Was it&amp;nbsp; getting the actual PSKs from the current 8.3 running firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command I mentioned above should list the PSKs in clear text in the configuration when you run it in the device that is currently in production use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;more system:running-config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have just used the &lt;STRONG&gt;"show run"&lt;/STRONG&gt; command to get the current configuration from the production firewall and inserted that to the new firewall then that means that you have inserted all the PSKs as ******** rather than the actual real PSK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you need to determine the actual PSK for each Tunnel Group then do this&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Issue the "more system:running-config" on the production firewall to get the configuration with the actual PSKs&lt;/LI&gt;&lt;LI&gt;Then use that configuration on the test firewall so that the PSKs are migrated correctly&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 07:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335390#M343819</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T07:55:12Z</dc:date>
    </item>
    <item>
      <title>Migrate from ASA to X-Series Next Generation Firewall</title>
      <link>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335391#M343820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right, using "&lt;STRONG&gt;more system:running-config" &lt;/STRONG&gt;allow me to see the pre-shared key of my vpn users. &lt;/P&gt;&lt;P&gt;It solve half of my problem, at least I don't need to tell my users that their password will be reset. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nevertheless, I will have to configure all my 300 users password one by one. &lt;/P&gt;&lt;P&gt;I was trying to see whether there is any other better way &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 08:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335391#M343820</guid>
      <dc:creator>limlayhin</dc:creator>
      <dc:date>2013-08-29T08:04:32Z</dc:date>
    </item>
    <item>
      <title>Migrate from ASA to X-Series Next Generation Firewall</title>
      <link>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335392#M343821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You sould be able to insert the same username/password configurations from the current ASA to the new ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you mean the below configuration lines from the current ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;username &lt;USERNAME&gt; password &lt;ENCRYPTED password=""&gt; encrypted privilege &lt;PRIVILEGE&gt; &lt;/PRIVILEGE&gt;&lt;/ENCRYPTED&gt;&lt;/USERNAME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 08:11:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335392#M343821</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-29T08:11:50Z</dc:date>
    </item>
    <item>
      <title>Migrate from ASA to X-Series Next Generation Firewall</title>
      <link>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335393#M343822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I catch the idea. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks you for your patience. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Aug 2013 08:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/migrate-from-asa-to-x-series-next-generation-firewall/m-p/2335393#M343822</guid>
      <dc:creator>limlayhin</dc:creator>
      <dc:date>2013-08-29T08:13:53Z</dc:date>
    </item>
  </channel>
</rss>

