Conversion Examples
This section contains examples of ASA configurations and the Firepower Threat Defense rules and objects to which the migration tool converts them.
Examples
Access Rule Specifying Individual Networks
ASA configuration:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 5.6.7.0 255.255.255.0 access-group acp1 global
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/24 |
5.6.7.0/24 |
TCP(6) |
Any |
Permit equivalent |
True |
Access Rule with Network Object Groups
ASA configuration:
access-list acp1 extended permit ip object-group host1 object-group host2 access-group acp1 global
Converts to:
Name |
Domain |
Value (Network) |
Type |
Override |
---|---|---|---|---|
host1 |
None |
obj1 obj2 |
Group |
False |
host2 |
None |
obj3 obj4 |
Group |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
host1 |
host2 |
Any |
Any |
Permit equivalent |
True |
Access Rule Specifying Individual Networks and Ports
ASA access rule:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 eq 90 5.6.7.0 255.255.255.0 eq 80 access-group acp1 global
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/32 |
5.6.7.0/32 |
TCP(6)/90 |
TCP(6)/80 |
Permit equivalent |
True |
Access Rule with Service Object
ASA configuration:
object service servObj1 service tcp destination eq 78 access-list acp1 extended permit object servObj1 any any access-group acp1 in interface outside
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
servObj1 |
Object |
None |
TCP(6)/78 |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
Any |
servObj1 |
Permit equivalent |
True |
Access Rule with Service Object Group
ASA configuration:
object-group service legServGroup tcp port-object eq 78 access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 5.6.7.0 255.255.255.0 object-group legServGroup access-group acp1 global
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
legServGroup |
Object |
None |
TCP(6)/78 |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/24 |
5.6.7.0/24 |
TCP(6) |
legServGroup |
Permit equivalent |
True |
Access Rule with Nested Service Object Group
ASA configuration:
object-group service legServGroup1 tcp port-object eq 78 port-object eq 79 object-group service legServGroup2 tcp port-object eq 80 port-object eq 81 object-group service legacyServiceNestedGrp tcp group-object legServGroup1 group-object legServGroup2 access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 5.6.7.0 255.255.255.0 object-group legacyServiceNestedGrp access-group acp1 global
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
legServGroup1_1 |
Object |
None |
TCP(6)/78 |
False |
legServGroup1_2 |
Object |
None |
TCP(6)/79 |
False |
legServGroup2_1 |
Object |
None |
TCP(6)/80 |
False |
legServGroup2_2 |
Object |
None |
TCP(6)/81 |
False |
legServGroup1 |
Group |
None |
legServGroup1_1 legServGroup1_2 |
False |
legServGroup2 |
Group |
None |
legServGroup2_1 legServGroup2_2 |
False |
Note that the converted configuration does not contain an equivalent for the nested group, legacyServiceNestedGrp, because that group has been flattened.
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/24 |
5.6.7.0/24 |
TCP(6) |
legServGroup1 legServGroup2 |
Permit equivalent |
True |
Access Rule with Nested Extended Service Object Group
ASA configuration:
object service http service tcp source range 9000 12000 destination eq www object service http-proxy service tcp source range 9000 12000 destination eq 8080 object-group service all-http service-object object http service-object object http-proxy object-group service all-httpz group-object all-http service-object tcp destination eq 443 access-list acp1 extended permit object-group all-httpz any any access-group acp1 in interface inside
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
http_src |
Object |
None |
TCP(6)/9000-12000 |
False |
http_dst |
Object |
None |
TCP(6)/80 |
False |
http-proxy_src |
Object |
None |
TCP(6)/9000-12000 |
False |
http-proxy_dst |
Object |
None |
TCP(6)/8080 |
False |
all-httpz-dst |
Group |
None |
TCP(6)/443 |
False |
Note that the converted configuration does not contain an equivalent for the nested group, all-httpz, because that group has been flattened.
Name |
Source Zone |
Dest Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1_1 |
Any |
Any |
Any |
Any |
http_src |
http_dst |
Permit equivalent |
True |
acp1#1_2 |
Any |
Any |
Any |
Any |
http-proxy_src |
http-proxy_dst |
Permit equivalent |
True |
acp1#1_3 |
Any |
Any |
Any |
Any |
Any |
all-httpz-dst |
Permit equivalent |
True |
Access Rule with Service Object Using "gt" and "neq" Operators
ASA configuration:
object service testOperator service tcp source gt 100 destination neq 200 access-list acp1 extended permit object testOperator any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
testOperator_src |
Object |
None |
TCP(6)/101-65535 |
False |
testOperator_dst_1 |
Object |
None |
TCP(6)/1-199 |
False |
testOperator_dst_2 |
Object |
None |
TCP(6)/201-65535 |
False |
testOperator_dst |
Group |
None |
testOperator_dst_1, testOperator_dst_2 |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
testOperator_src |
testOperator_dst |
Permit equivalent |
True |
Access Rule with Security Objects Using "lt" and "gt" Operators
ASA configuration:
object service testOperator service tcp source gt 100 destination lt 200 access-list acp1 extended permit object testOperator any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
testOperator_src |
Object |
None |
TCP(6)/101-65535 |
False |
testOperator_dst |
Object |
None |
TCP(6)/1-199 |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
testOperator_src |
testOperator_dst |
Permit equivalent |
True |
Access Rule with TCP Service Object Using "eq" Operator and Port Literal Values
ASA configuration:
object service svcObj1 service tcp source eq telnet destination eq ssh access-list acp1 extended permit object testOperator any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
svcObj1_src |
Object |
None |
TCP(6)/21 |
False |
svcObj1_dst |
Object |
None |
TCP(6)/22 |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
svcObj1_src |
svcObj1_dst |
Permit equivalent |
True |
Access Rule with ICMP Service Object
ASA configuration:
object-group service icmpObj service-object icmp echo-reply 8 access-list acp1 extended permit object icmpObj any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
icmpObj |
Object |
None |
ICMP(1)/Echo reply |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
Any |
icmpObj |
Permit equivalent |
True |
Access Rule with protocol Service Object
ASA configuration:
object-group protocol testProtocol protocol-object tcp access-list acp1 extended permit object testProtocol any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
testProtocol |
Object |
None |
TCP(6) |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
Any |
testProtocol |
Permit equivalent |
True |
Access Rule with Extended Service Object (Source Only)
ASA configuration:
object service serviceObj service tcp source eq 300 service tcp source eq 800 access-list acp1 extended permit object serviceObj any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
serviceObj_src_1 |
Object |
None |
TCP(6)/300 |
False |
serviceObj_src_2 |
Object |
None |
TCP(6)/800 |
False |
serviceObj |
Group |
None |
serviceObj_src_1 serviceObj_src_2 |
False |
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
Any |
serviceObj |
Permit equivalent |
True |
Access Rule with Extended Service Object (Source and Destination)
ASA configuration:
object service serviceObj service tcp source eq 300 destination eq 400 access-list acp1 extended permit tcp object serviceObj any any
Converts to:
Name |
Type |
Domain |
Value (Protocol/Port) |
Override |
---|---|---|---|---|
serviceObj_src |
Object |
None |
TCP(6)/300 |
False |
serviceObj_dst |
Object |
None |
TCP(6)/400 |
False |
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
serviceObj_src |
serviceObj_dst |
Permit equivalent |
True |
Access Rule with Port Argument Operator "neq" in Source Port
ASA configuration:
access-list acp1 extended permit tcp any neq 300
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
Any |
Any |
1-299, 301-65535 |
Any |
Permit equivalent |
True |
Access Rule with Port Argument Operator "neq" in Source and Destination Ports
ASA configuration:
access-list acp1 extended permit tcp any neq 300 any neq 400
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1_1 |
Any |
Any |
Any |
Any |
1-299 |
1-399 |
Permit equivalent |
True |
acp1#1_2 |
Any |
Any |
Any |
Any |
301-65535 |
1-399 |
Permit equivalent |
True |
acp1#1_3 |
Any |
Any |
Any |
Any |
1-299 |
401-65535 |
Permit equivalent |
True |
acp1#1_4 |
Any |
Any |
Any |
Any |
301-65535 |
401-65535 |
Permit equivalent |
True |
Inactive Access Rule
ASA configuration:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 5.6.7.0 255.255.255.0 inactive access-group acp1 global
Converts to:
Name |
Source Zone |
Destination Zone |
Source Network |
Destination Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
Any |
Any |
3.4.5.0/24 |
5.6.7.0/24 |
TCP(6) |
Any |
Permit equivalent |
False |
Access Control List Applied to Inbound Traffic
ASA configuration:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 eq 90 any eq 80 access-group acp1 in inside
Converts to:
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
acp1_inside_in_zone |
Any |
3.4.5.0/24 |
Any |
TCP(6)/90 |
TCP(6)/80 |
Permit equivalent |
True |
Access Control List Applied to Outbound Traffic
ASA configuration:
access-list acp1 extended permit tcp 3.4.5.0 255.255.255.0 eq 90 any eq 80 access-group acp1 out outside
Converts to:
Name |
Source Zone |
Dest Zone |
Source Network |
Dest Network |
Source Port |
Destination Port |
Action |
Enabled |
---|---|---|---|---|---|---|---|---|
acp1#1 |
acp1_outside_out_zone |
Any |
3.4.5.0/24 |
Any |
TCP(6)/90 |
TCP(6)/80 |
Permit equivalent |
True |