03-06-2023 01:02 AM
what's the best method to migrate all config, certificates from ASA 55xx device to Cisco firepower 3000 series.
Would backup and restore work?
As there are too many policies and configurations, it's not practical to manually config the new firewall. There is no FMC, only firepower FDM.
Solved! Go to Solution.
03-07-2023 07:42 AM
@manvik well that is different then. You are using firepower hardware running the ASA image, so yes you can mostly copy and paste configuration.
Physical Interfaces may change, you'll have to export and import certificates (if used) and use more system:running-config to get the plaintext pre-shared-key (if using). Bear in mind, depending on which ASA version you are using on the new hardware older insecure crypto algorthims have been depreciated, so you may need to reconfigure VPNs.
03-06-2023 01:09 AM
@manvik unfortunately the Firepower Migration Tool is for migrating from ASA to FTD with FMC management not FDM.
Perhaps you could get a CDO evaluation, then migrate the configuration from ASA to the FDM.
03-06-2023 01:54 AM
Any other methods other that CDO? is it possible to import running-config from ASA to firepower.
03-06-2023 02:00 AM
@manvik no, the FMT (Firepower Migration Tool) would be the best tool, but that is for FMC migrations only. A Virtual FMC is very cheap if that is an option.
Else, create some custom python scripts to import the ASA objects etc in bulk.
03-06-2023 04:31 AM
so i think we are stuck. no FMC, no python scripts.
Even if we had Firepower Migration Tool, would it migrate site-site VPN connections.
03-06-2023 04:34 AM
@manvik yes you can migrate VPN settings. The following link provides a list of configuration settings migrated using FMT.
03-06-2023 05:12 AM
Then money spent on a small 2-device license of FMC (or even cloud-delivered FMC for CDO management) is much less than the cost of the hours (and potential for human error) involved in manually migrating a configuration line-by-line.
Managing anything other than an extremely simple single firewall configuration with FDM is a recipe for frustration and headaches. Believe me, I've tried it and I have decades of hands-on experience with firewalls.
03-07-2023 07:36 AM
there's a mistake in what i mentioned. the destination device is cisco firepower ASA. This means ASA backup& restore would work?
Cisco FPR3130-ASA-K9 means the one with FXOS?
03-07-2023 07:42 AM
@manvik well that is different then. You are using firepower hardware running the ASA image, so yes you can mostly copy and paste configuration.
Physical Interfaces may change, you'll have to export and import certificates (if used) and use more system:running-config to get the plaintext pre-shared-key (if using). Bear in mind, depending on which ASA version you are using on the new hardware older insecure crypto algorthims have been depreciated, so you may need to reconfigure VPNs.
03-07-2023 10:07 PM
Thank you @Rob Ingram and @Marvin Rhoads
Cisco FPR3130-ASA-K9 means the one with FXOS?
03-08-2023 12:15 AM
@manvik FXOS is the underlying operating system of the FPR3100 (and 2100/4100/9300 etc), where you configure the hardware/chassis related settings. On top of FXOS you run either ASA or FTD firewall image.
03-08-2023 12:28 AM
Adding to what @Rob Ingram noted, the Firepower 3100 series (as well as 1010, 1100 and 2100 series) all have the underlying FX-OS (Firepower eXtensible Operating System) bundled in with the ASA or FTD software image. So you do not download and upgrade it separately.
The Getting Started Guide is a good place to start!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide