08-26-2020 02:39 PM - edited 08-26-2020 02:55 PM
This event had place on Thursday 20, August 2020 at 10hrs PDT
This event provides a brief introduction to Firepower Migration Tool and its capabilities. Cisco Firepower Migration Tool is a free software image used for migration from Adaptive Security Appliance (ASA) 8.4 or later, Check Point (r75-r77.30 & r80 and later), and Palo alto Network (6.1+) to Cisco Firepower Threat Defense (FTD). The session includes an interactive live demonstration.
You can download the slides of the presentation in PDF format here.
A:ASA version should be 8.4 and onwards.
A:It can be the VM or a physical appliance. The migration tool (FMT) is installable for windows or macOS. Your target FTD (Firepower Threat Defense) firewall can be either VM or a physical appliance.
A:The FMT tool uses the FMC rest API's to migrate a configuration to FMC.
A:You will need to upgrade the ASA images to 8.4 and onwards to use the FMT for migrating the firewall to FMC.
A:Earlier there has been a 'migration mode' where you would use an FMC to migrate (instead of an installable). This migration is not supported anymore, please use the currently presented FMT instead.
A:If FTD is added to FMC then policy deployment can be done only via FMC.
A:CCO is your Cisco.com login credentials.
A:Currently only one context can be migrated at a time. You can upload each context configuration and migrate it to an FTD instance. Alternatively, you can also connect to the ASA through 'Live Connect' and you will be able to select which context to migrate and will be able to select the next context.
A:FMT Support ASA 8.4 + you can upgrade to the available version in Portal. You can download it from the CCO, if the image is not present you can reach out to Cisco TAC and they will help you out on how to proceed.
A:You can download the FMT from the Cisco portal, no special rights are required.
A:It can be either the lab FMC or the actual production FMC as per the need you can leverage the scenario depending upon your choice.
A:In case the sensor is managed by the FMC, then there is absolutely no option. There is one box manager that is called as FDM, that is fire per device manager.
A:It is a free installable for Windows or macOS and does not require a license.
A:Yes, its support. The Fortigate is in the development phase, so the tool will support soon. We'll be sharing information on the beta testing program for you to get early access.
A:This is ASA feature called as Object group search to provide memory optimization. Please find additional detail in the release notes of FTD: https://www.cisco.com/c/en/us/td/docs/security/firepower/660/relnotes/firepower-release-notes-660/features.html.
A:There is two option one is via uploading the config to the tool, the other is via Live connection, where user can enter the credentials of CP firewall and the tool will automatically retrieve the config and migrate.
A:No, prefer to use a sperate credential of FMC on FMT.While working with the migration tool, you won't get any impact on production because the tool will push the configuration to FMC. Later you can deploy to FTD after verifying. We recommend doing the activity when there is minimal activity.
A:In the demo, you'll see that there is a 'Review & Validate' page where you can review all objects, ACLs, etc. that are to be migrated. (Nothing will be migrated until you click "Push").Once the configuration is pushed to FMC, you still have the option to not deploy it to the target device if you encounter any issues.
A:Yes, in two phases, one on the completion of the processing the config next is after the Push of the configuration.
A:Yes, it is similar.
A:Right now tool will mark the anti-spoofing setting as ignored and will not be migrated to FMC. The anti-spoofing section is unsupported and will be part of the Pre-migration report under "Unsupported Configurations for Objects".
A:You have to target FMC with FMT. Without targeting FMC FMT will not be able to perform any migration. An alternative to migrate to an FDM/API managed-FTD would be to migrate through CDO.
A:I hope what you meant for provider 1 is firewall manager, yes tool allows to connect via the tool.
A:Once you add FTD with FMC, the configuration has to be pushed from FMC.
A:As of now VPN, dynamic routing, HA. FMT will parse the config and generate a Pre-migration report, which will have Ignored and an unsupported section with details.
A:No. Tool will allow us to download the xl from the conversion standpoint to verify, but this xl can be used for verification to migrate, the user has to upload the config again from the scratch to migrate to FMC.
A: Unfortunately, no, FMC acts as a config manager for the FTD.
A:That is correct, we suggest to check the health and the connectivity between the FMC and the tool.
A: It supports Domain Objects. A typo error in the previous response, Correction - It Doesn't support Domain Objects.
A:Currently it is more of a manual effort, we are planning for integrating in the future with FMT.
A:You can select one Context at a time in the FMt migration process to one FTD. Toll can extract the multi-context ASA config and list down the extracted context one by one, user can select one and do the migration, after migrating the selected one tool will give the option to continue migrating the rest one by one.
A: Currently Unsupported.
A:Rule will be migrated as unsupported tag and in Disable state, where the Negate in either source / Destination or Service will replace with Any.
A:We have not planned with this session, but the steps are so similar for PAN as well.
A:It is installed locally, not on the cloud.Firepower 9300 Security Appliance Release 2.2.0: https://software.cisco.com/download/home/286287252/type/286321688/release/2.2.0
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: