End-to-End Procedure
The following flowchart illustrates the workflow for migrating an FDM-managed device to threat defense using the Secure Firewall migration tool.
Workspace |
Steps |
|
---|---|---|
Local Machine |
Download the latest version of Secure Firewall migration tool from Cisco.com. For detailed steps, see Download the Secure Firewall migration tool from Cisco.com. |
|
Device Manager CLI |
(Optional) Obtain the FDM-managed device configuration file: To obtain the FDM-managed device config file from device manager CLI, see Obtain the FDM-Managed Device configuration file. If you intend to connect the FDM-managed device from Secure Firewall migration tool, skip to step 3. |
|
Device Manager CLI |
(Optional) Export PKI certificates and AnyConnect packages and profiles: This step is required only if you are planning to migrate site-to site VPN and RA VPN features from FDM-managed device to threat defense. To export the PKI certificates from device manager CLI, see Export PKI Certificate from and Import into Firewall Management Center, step 1. To export AnyConnect packages and profiles from device manager CLI, see Retrieve AnyConnect Packages and Profiles, step 1. If you are not planning to migrate site-to-site VPN and RA VPN, skip to step 7. |
|
Management Center |
(Optional) Import the PKI certificates and AnyConnect packages to management center: To import the PKI certificates to management center, see Export PKI Certificate from and Import into Firewall Management Center, step 2 and Retrieve AnyConnect Packages and Profiles, step 2. |
|
Local Machine |
Launch the Secure Firewall migration tool on your local machine, see Launch the Secure Firewall Migration Tool. |
|
Secure Firewall Migration Tool |
To select the source configuration firewall and migration option, See Select the Source Configuration Firewall and Migration Option |
|
Secure Firewall Migration Tool |
(Optional) Upload the FDM-managed device config file obtained from device manager CLI, see Upload the FDM-Managed Device Configuration File. If you are planning to connect to live FDM-managed device, skip to step 8. |
|
Secure Firewall Migration Tool |
You can connect to live device manager directly from the Secure Firewall migration tool. For more information, see Connect to the FDM-Managed Device from the Secure Firewall Migration Tool. |
|
Secure Firewall Migration Tool |
During this step, you can specify the destination parameters for the migration. For detailed steps, see Specify Destination Parameters for the Secure Firewall Migration Tool. |
|
Security Cloud Control |
(Optional) This step is optional and only required if you have selected cloud-delivered Firewall Management Center as destination management center. For detailed steps, see Specify Destination Parameters for the Secure Firewall Migration Tool, Step 1. |
|
Secure Firewall Migration Tool |
Navigate to where you downloaded the pre migration report and review the report. For detailed steps, see Review the Pre-Migration Report. |
|
Secure Firewall Migration Tool |
The Secure Firewall migration tool allows you to map the FDM-managed device configuration with threat defense interfaces. For detailed steps, see Map FDM-Managed Device Configurations with Secure Firewall Threat Defense Interfaces. |
|
Secure Firewall Migration Tool |
To ensure that the FDM-managed device configuration is migrated correctly, map the FDM-managed device interfaces to the appropriate threat defense interface objects, security zones and interface groups. For detailed steps, see Map FDM-Managed Device Interfaces to Security Zones and Interface Groups. |
|
Secure Firewall Migration Tool |
Optimize and review the configuration carefully and validate that it is correct and matches how you want to configure the threat defense device. For detailed steps, see Optimize, Review and Validate the Configuration to be Migrated. |
|
Secure Firewall Migration Tool |
This step in the migration process sends the migrated configuration to management center and allows you to download the post-migration report. For detailed steps, see Push the Migrated Configuration to Management Center. |
|
Local Machine |
Navigate to where you downloaded the post migration report and review the report. For detailed steps, see Review the Post-Migration Report and Complete the Migration. |
|
Management Center |
Deploy the migrated configuration from the management center to threat defense. For detailed steps, see Review the Post-Migration Report and Complete the Migration. |