|
Security Cloud Control
|
Log in to your Security Cloud Control tenant, navigate , and click the blue plus button to start provisioning a new migration instance.
|
|
ASA CLI
|
(Optional) Obtain the ASA configuration file: To obtain the ASA config file from ASA CLI, see Obtain the ASA Configuration File. If you intend to select a Security Cloud Control-managed ASA device in the Select Source Configuration, skip to Step 3.
|
|
ASA CLI
|
(Optional) Export public key infrastructure (PKI) certificates from ASA CLI: This step is required only if you are planning
to migrate site-to site VPN and RAVPN configurations from ASA to threat defense. To export the PKI certificates from ASA CLI,
see Export PKI Certificate from ASA and Import into Management Center. If you do not have remote-access VPN configurations on your device or you are not planning to migrate site-to-site VPN and
remote-access VPN, skip to Step 7.
|
|
ASA CLI
|
(Optional) Export AnyConnect packages and profiles from ASA CLI: This step is required only if you are planning to migrate
remote-access VPN features from ASA to threat defense. To export AnyConnect packages and profiles from ASA CLI, see Retrieve AnyConnect Packages and Profiles.
|
|
Cloud-delivered Firewall Management Center
|
(Optional) Import the PKI certificates and AnyConnect packages to the management center: To import the PKI certificates to
management center, see Step 2 in Export PKI Certificate from ASA and Import into Management Center and Retrieve AnyConnect Packages and Profiles.
|
|
Security Cloud Control
|
Ensure that the status of the migration instance you created is Ready to Migrate and click Launch; the Secure Firewall Migration Tool opens in a new browser tab.
|
|
Secure Firewall Migration Tool
|
(Optional) Upload the ASA config file obtained from ASA CLI, see Upload the ASA Configuration File. If you are planning to migrate configuration from an ASA device managed by Security Cloud Control, skip to Step 8.
|
|
Secure Firewall Migration Tool
|
From the list of ASA devices shown, that are managed by your Security Cloud Control tenant, select the device whose configuration you want to migrate. If you have configured more than one security context
on your ASA device, select the context you wish to migrate or choose to merge all the contexts to a singe instance in the
Primary Context Selectiondrop-down. See Select the ASA Primary Security Context for more information.
|
|
Secure Firewall Migration Tool
|
On the Select Target page, the cloud-delivered Firewall Management Center provisioned on your Security Cloud Control tenant is selected by default.
|
|
Secure Firewall Migration Tool
|
Select a target device from the list of threat defense devices managed by your cloud-delivered Firewall Management Center
or choose Proceed without FTD and proceed.
|
|
Secure Firewall Migration Tool
|
Download the pre-migration report and review it for a detailed summary of the parsed configuration. For detailed steps, see
Review the Pre-Migration Report.
|
|
Secure Firewall Migration Tool
|
Map FTD Interface with the ASA configuration.
Because the names of physical and port channel interfaces on your ASA and threat defense devices are not always the same,
you can select to which interface in the target threat defense device you want an ASA interface to get mapped. For more information,
see Map ASA Configurations with Secure Firewall Device Manager Threat Defense Interfaces.
|
|
Secure Firewall Migration Tool
|
Map ASA interfaces to existing threat defense security zones and interface groups. See Map ASA Interfaces to Security Zones and Interface Groups for detailed steps.
|
|
Secure Firewall Migration Tool
|
Optimize, Review and Validate Configuration with caution and ensure ACLs, objects, NAT, interfaces, routes, site-to-site VPN, and remote-access VPN rules are configured
as intended for the destination threat defense device. See Optimize, Review and Validate the Configuration.
|
|
Secure Firewall Migration Tool
|
Once your configuration validation is a success, Push Configuration to the cloud-delivered Firewall Management Center. For more information, see Push the Migrated Configuration to Management Center.
|
|
Local Machine
|
Download the post-migration report and review it. To know more on what information the post-migration report contains, see
Review the Post-Migration Report and Complete the Migration.
|
|
Cloud-delivered Firewall Management Center
|
Deploy the newly migrated configuration to the threat defense device.
|