02-13-2013 01:59 PM - edited 03-11-2019 06:00 PM
Hi
I have old ASA with 8.0 configuration that includes huge number of ACL, NAT , VPNs , we got a new ASA with 8.6 , and we are planning to move the configuration to the new box , I'm wondering what is the best approach to do this , I'm thinking of one of the following scenarios
1- downgrade the new ASA to 8.3 , the apply the config , remove the identity nat commands and names then upgrade to 8.6 and after that reconfigure the NAT rules and object groups .
2- convert the old config manually to 8.6 code including NAT , object-group ,ACL and apply it to the new ASA ( this is going to be huge task)
Any suggestion for better way of doing it ? What are the commands that I have to look at when I convert to 8.6 and will the VPN configuration be affected ?
Any idea will be helpful...
Thanks
Ali
Sent from Cisco Technical Support iPad App
Solved! Go to Solution.
02-13-2013 02:20 PM
Hi,
I guess you are getting a new ASA 5500-X series firewall since you mention the 8.6 software.
To my understanding 8.6 is the lowest software level for the new ASA5500-X series and cannot be downgraded to 8.3 or even lower.
Even though the conversion of the configurations manually might be a chore at the start I would still always recomend anyone to do the conversion by hand. You will get used to the new NAT and ACL configurations better and probably make less mistakes when the actual ASA is in production.
The amount of work you have to do is mostly upto the amount of NAT/ACL configurations and ALSO how well you have done them so far. If you for example have done alot of complicated NAT configurations you will naturally have more to take into consideration when writing the new configurations.
The main things for the new software when rewriting old configurations are
Here is link to a document on these forums that compares the Old and New NAT configuration formats
https://supportforums.cisco.com/docs/DOC-9129
- Jouni
02-13-2013 02:20 PM
Hi,
I guess you are getting a new ASA 5500-X series firewall since you mention the 8.6 software.
To my understanding 8.6 is the lowest software level for the new ASA5500-X series and cannot be downgraded to 8.3 or even lower.
Even though the conversion of the configurations manually might be a chore at the start I would still always recomend anyone to do the conversion by hand. You will get used to the new NAT and ACL configurations better and probably make less mistakes when the actual ASA is in production.
The amount of work you have to do is mostly upto the amount of NAT/ACL configurations and ALSO how well you have done them so far. If you for example have done alot of complicated NAT configurations you will naturally have more to take into consideration when writing the new configurations.
The main things for the new software when rewriting old configurations are
Here is link to a document on these forums that compares the Old and New NAT configuration formats
https://supportforums.cisco.com/docs/DOC-9129
- Jouni
02-14-2013 02:34 AM
Hi Jouni
Thanks for the advice ,
I have lots of ACL configured with names , shall I remove the names from old asa , then take the ACLs to the new ASA , then configure the object groups , I think this will make the ACLs config easier on the new ASA,
For the NAT , most of it are static , so I will convert it manually , but I'm worried about the NAT 0 used for VPN , the interesting traffic ACL includes many lines and as per the new code I have to make separate object group for each line , is there any better way of dealing with NAT 0 conversion ?
Appreciating your advice .
Sent from Cisco Technical Support iPad App
02-14-2013 03:06 AM
Hi,
You should be able to disable the use of "name" configurations on the ASA (while leaving the actual name/IP pairing configurations on the ASA) After that the ACL should show up only with object-groups and actual IP addresses/network addresses.
If you want to keep using the "name" configurations in the new software notice that atleast in the "outside" ACL your destination IP addresses (your local servers) will be with their private IP address. So there is bound to be changes to the "name" configurations if you have previously used the "name" configuration for a public IP address.
A question regarding the NAT0 configurations
I guess if you want you could copy/paste your NAT0 configurations (nat commands and ACLs) here and could take a look at them for you and help if I can.
- Jouni
02-15-2013 08:13 AM
Hi Jouni,
I have only the follwoing Nat configuration , in addition to many static NAT
global (outside) 1 interface
nat (inside) 1 172.16.1.80 255.255.255.255
nat (inside) 0 access-list no_nat_vpntraffic
nat (DMZ) 0 Ironmail 255.255.255.255
access-list no_nat_vpntraffic extended permit ip host Citrix object-group Citrix_India
.
.
.
(no_nat_vpntraffic ACL has around 25 lines)
any suggestion will help ..
Thanks ..
02-15-2013 08:31 AM
Hi,
I dont know what the setup is when you have only one "global" rule and only one host address defined in the "nat" statement
NAT/PAT Configuration
object network PAT-SOURCE
host 172.16.1.80
nat (inside,outside) after-auto source dynamic PAT-SOURCE interface
DMZ NAT Configuration
NAT0 / NAT Exempt Configuration
object network -SINGLE-SOURCE-FOR-NAT0
subnet
OR
host
object network SINGLE-DESTINATION-FOR-NAT0
subnet
OR
host
nat (source-interface,destination-interface) source static SINGLE-SOURCE-FOR-NAT0 SINGLE-SOURCE-FOR-NAT0 destination static SINGLE-DESTINATION-FOR-NAT0 SINGLE-DESTINATION-FOR-NAT0
Basic 1:1 Static NAT Configuration
object network STATIC
host
nat (source-interface,destination-interface) static
- Jouni
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide