7.0.1
|
This release includes the following new features and enhancements:
-
You can now migrate configurations from your Cisco firewalls such as ASA and FDM-managed devices and third-party firewalls
to Cisco Secure Firewall 1200 Series devices.
See: Cisco Secure Firewall 1200 Series
-
You can now update the preshared keys for more than one site-to-site VPN tunnel configuration at once. Export the site-to-site
VPN table in the Optimize, Review and Validate Configuration page to an Excel sheet, specify the preshared keys in the respective cells, and upload the sheet back. The migration tool
reads the preshared keys from the Excel and updates the table.
See: Optimize, Review, and Validate the Configuration
Supported migrations: All
-
You can now choose to ignore migration-hindering, incorrect configurations and still continue the final push of a migration.
Previously, the whole migration failed even if a single object's push failed because of errors. You also now have the control
to abort the migration manually to fix the error and retry migration.
See: Push the Migrated Configuration to Management Center
Supported migrations: All
-
The Secure Firewall migration tool now detects existing site-to-site VPN configurations in the target threat defense device
and prompts you to choose if you want them deleted, without having to log in to the management center. You could choose No and manually delete them from the management center to continue with the migration.
See: Optimize, Review, and Validate the Configuration
Supported migrations: All
-
If you have an existing hub and spoke topology configured on one of the threat defense devices managed by the target management
center, you could choose to add your target threat defense device as one of the spokes to the existing topology right from
the migration tool, without having to manually do it on the management center.
See: Optimize, Review, and Validate the Configuration
Supported migrations: Secure Firewall ASA
-
When migrating thrid-party firewalls, you can now select threat defense devices as target, which are part of a high availability
pair. Previously, you could only choose standalone threat defense devices as target devices.
Supported migrations: Palo Alto Networks, Check Point, and Fortinet firewall migrations
-
The Secure Firewall migration tool now provides a more enhanced, intuitive demo mode, with guided migration instructions at
every step. In addition, you can also see versions of target threat defense devices to choose and test based on your requirements.
Supported migrations: All
|
7.0 |
This release includes the following new features and enhancements:
Cisco Secure Firewall ASA to Cisco Secure Firewall Threat Defense Migration
-
You can now configure a threat defense high availability (HA) pair on the target management center and migrate configurations
from a Secure Firewall ASA HA pair to the management center. Choose Proceed with HA Pair Configuration on the Select Target page and choose an active and a standby device. When selecting the active threat defense device, ensure you have an identical
device on the management center for the HA pair configuration to be successful. See Specify Destination Parameters for the Secure Firewall Migration Tool in the Migrating Cisco Secure Firewall ASA to Cisco Secure Firewall Threat Defense with the Migration Tool book for more information.
-
You can now configure a site-to-site hub and spoke VPN topology using threat defense devices when migrating site-to-site VPN
configurations from an ASA device. Click Add Hub & Spoke Topology under Site-to-Site VPN Tunnels on the Optimize, Review and Validate Configuration page. See Optimize, Review, and Validate the Configuration in the Migrating Cisco Secure Firewall ASA to Cisco Secure Firewall Threat Defense with the Migration Tool book for more information.
Fortinet Firewall to Cisco Secure Firewall Threat Defense Migration
|
6.0.1
|
This release includes the following new features and enhancements:
Cisco Secure Firewall ASA to Cisco Secure Firewall Threat Defense Migration
-
You can now optimize network and port objects when you migrate configurations from Secure Firewall ASA to threat defense.
Review these objects in their respective tabs in the Optimize, Review and Validate Configuration page and click Optimize Objects and Groups to optimize your list of objects before migrating them to the target management center. The migration tool identifies objects
and groups that have the same value and prompts you to choose which to retain. See Optimize, Review, and Validate the Configuration for more information.
FDM-managed Device to Cisco Secure Firewall Threat Defense Migration
-
You can now migrate DHCP, DDNS, and SNMPv3 configurations from your FDM-managed device to a threat defense device. Ensure
you check the DHCP checkbox and Server, Relay, and DDNS checkboxes on the Select Features page. See Optimize, Review, and Validate the Configuration for more information.
Fortinet Firewall to Cisco Secure Firewall Threat Defense Migration
-
You can now migrate URL objects in addition to other object types from a Fortinet firewall to your threat defense device.
Review the URL Objects tab in the Objects window in Optimize, Review and Validate Configuration page during migration. See Optimize, Review, and Validate the Configuration for more information.
Palo Alto Networks Firewall to Cisco Secure Firewall Threat Defense Migration
-
You can now migrate URL objects in addition to other object types from a Palo Alto Networks firewall to your threat defense
device. Ensure you review the URL Objects tab in the Objects window in Optimize, Review and Validate Configuration page during migration. See Optimize, Review, and Validate the Configuration for more information.
Check Point Firewall to Cisco Secure Firewall Threat Defense Migration
-
You can now migrate port objects, FQDN objects, and object groups from a Check Point Firewall to your threat defense device.
Review the Objects window in Optimize, Review and Validate Configuration page during migration. See Optimize, Review, and Validate the Configuration for more information.
|
6.0
|
This release includes the following new features and enhancements:
Cisco Secure Firewall ASA to Cisco Secure Firewall Threat Defense Migration
-
You can now migrate WebVPN configurations on your Secure Firewall ASA to Zero Trust Access Policy configurations on a threat
defense device. Ensure that you check the WebVPN checkbox in Select Features page and review the new WebVPN tab in the Optimize, Review and Validate Configuration page. The threat defense device and the target management center must be running on Version 7.4 or later and must be operating
Snort3 as the detection engine.
-
You can now migrate Simple Network Management Protocol (SNMP) and Dynamic Host Configuration Protocol (DHCP) configurations
to a threat defense device. Make sure that you check the SNMP and DHCP checkboxes in the Select Features page. If you have configured DHCP on your Secure Firewall ASA, note that the DHCP server, or relay agent and DDNS configurations
can also be selected to be migrated.
-
You can now migrate the equal-cost multipath (ECMP) routing configurations when performing a multi-context ASA device to a
single-instance threat defense merged context migration. The Routes tile in the parsed summary now includes ECMP zones also, and you can validate the same under the Routes tab in the Optimize, Review and Validate Configuration page.
-
You can now migrate dynamic tunnels from the dynamic virtual tunnel interface (DVTI) configurations from your Secure Firewall
ASA to a threat defense device. You can map them in the Map ASA Interfaces to Security Zones, Interface Groups, and VRFs page. Ensure that your ASA Version is 9.19 (x) and later for this feature to be applicable.
FDM-managed Device to Cisco Secure Firewall Threat Defense Migration
-
You can now migrate the Layer 7 security policies including SNMP and HTTP, and malware and file policy configurations from
your FDM-managed device to a threat defense device. Ensure that the target management center Version is 7.4 or later and that
Platform Settings and File and Malware Policy checkboxes in Select Features page are checked.
Check Point Firewall to Cisco Secure Firewall Threat Defense Migration
-
You can now migrate the site-to-site VPN (policy-based) configurations on your Check Point firewall to a threat defense device.
Note that this feature applies to Check Point R80 or later versions, and management center and threat defense Version 6.7
or later. Ensure that the Site-to-Site VPN Tunnels checkbox is checked in the Select Features page. Note that, because this is a device-specific configuration, the migration tool does not display these configurations
if you choose to Proceed without FTD.
Fortinet Firewall to Cisco Secure Firewall Threat Defense Migration
-
You can now optimize your application access control lists (ACLs) when migrating configurations from a Fortinet firewall to
your threat defense device. Use the Optimize ACL button in the Optimize, Review and Validate Configuration page to see the list of redundant and shadow ACLs and also download the optimization report to see detailed ACL information.
|
5.0.1 |
This release includes the following new features and enhancements:
-
The Secure Firewall migration tool now supports migration of multiple transparent firewall-mode security contexts from Secure
Firewall ASA devices to threat defense devices. You can merge two or more transparent firewall-mode contexts that are in your
Secure Firewall ASA device to a transparent-mode instance and migrate them.
In a VPN-configured ASA deployment where one or more of your contexts have VPN configurations, you can choose only one context
whose VPN configuration you want to migrate to the target threat defense device. From the contexts that you have not selected,
only the VPN configuration is ignored and all other configurations are migrated.
See Select the ASA Security Context for more information.
-
You can now migrate site-to-site and remote access VPN configurations from your Fortinet and Palo Alto Networks firewalls
to threat defense using the Secure Firewall migration tool. From the Select Features pane, select the VPN features that you want to migrate. See the Specify Destination Parameters for the Secure Firewall Migration
Tool section in Migrating Palo Alto Networks Firewall to Secure Firewall Threat Defense with the Migration Tool and Migrating Fortinet Firewall to Secure Firewall Threat Defense with the Migration Tool guides.
-
You can now select one or more routed or transparent firewall-mode security contexts from your Secure Firewall ASA devices
and perform a single-context or multi-context migration using the Secure Firewall migration tool.
|
5.0 |
-
Secure Firewall migration tool now supports migration of multiple security contexts from Secure Firewall ASA to threat defense
devices. You can choose to migrate configurations from one of your contexts or merge the configurations from all your routed
firewall mode contexts and migrate them. Support for merging configurations from multiple transparent firewall mode contexts
will be available soon. See Select the ASA Primary Security Context for more information.
-
The migration tool now leverages the virtual routing and forwarding (VRF) funtionality to replicate the segregated traffic
flow observed in a multi-context ASA environment, which will be part of the new merged configuration. You can check the number
of contexts the migration tool has detected in a new Contexts tile and the same after parsing, in a new VRF tile in the Parsed Summary page. In addition, the migration tool displays the interfaces to which these VRFs are mapped, in the Map Interfaces to Security Zones and Interface Groups page.
-
You can now try the whole migration workflow using the new demo mode in Secure Firewall migration tool and visualize how your
actual migration looks like. See Using the Demo Mode in Firewall Migration Tool for more information.
-
With new enhancements and bug fixes in place, Secure Firewall migration tool now provides an improved, faster migration experience
for migrating Palo Alto Networks firewall to threat defense.
|
4.0.3 |
The Secure Firewall migration tool 4.0.3 includes bug fixes and the following new enhancements:
|
4.0.2
|
The Secure Firewall migration tool 4.0.2 includes the following new features and enhancements:
-
Secure Firewall migration tool now supports migration of site-to-site VPN filter configurations and the extended access list objects pertaining to those
configurations when the destination management center and threat defense versions are 7.1 and later. Earlier, site-to-site
VPN filter configurations were not migrated and had to be manually configured after migration.
-
The migration tool now has an always-on telemetry; however, you can now choose to send limited or extensive telemetry data.
Limited telemetry data inludes few data points, whereas extensive telemetry data sends a more detailed list of telemetry data.
You can change this setting from .
|
4.0.1
|
The Secure Firewall migration tool 4.0.1 includes the following new features and enhancements:
The Secure Firewall migration tool now analyzes all objects and object groups based on both their name and configuration,
and reuses objects that have the same name and configuration. Only network objects and network object groups were analyzed
based on their name and configuration before. Note that the XML profiles in remote access VPNs are still validated only using
their name.
|
4.0
|
Secure Firewall migration tool 4.0 supports:
-
Migration of Policy Based Routing (PBR) from ASA if the destination management center and threat defense version are 7.3 and
later.
Note
|
For PBR migration, the existing flex configuration must be removed from the management center before proceeding with the migration.
|
-
Migration of Remote Access VPN custom attributes and VPN load balancing from ASA if the destination management center is 7.3
or later.
You can perform Remote Access VPN migration with or without a firewall. However, if you chose to perform the migration with
a firewall, then the threat defense version must be 7.0 and later.
Note
|
To migrate Remote Access VPN with a targeted firewall, you must select the target firewall and add any one of the following
licenses to the targeted firewall:
-
AnyConnect Plus
-
AnyConnect Apex
-
AnyConnect VPN Only
|
-
Migration of Equal Cost Multi-Path (ECMP) routes from ASA if the destination management center is 7.1 and later and the threat
defense version is 6.5 and later.
|
3.0.2 |
The Secure Firewall Migration Tool 3.0.2 includes bug fixes for remote access VPN configuration migration from ASA
to Management Center versions 7.2 or higher.
|
3.0.1
|
Secure Firewall Migration Tool 3.0.1 supports:
-
Migration of Enhanced Interior Gateway Routing Protocol (EIGRP) from ASA if the destination management center is version 7.2
and later and the threat defense version is 7.0 and later.
Note
|
You cannot migrate EIGRP from ASA and ASA with FirePOWER Services without a threat defense device.
|
-
The Cisco Secure Firewall 3100 series is supported as a source or destination device for migrations from ASA.
|
3.0
|
The Secure Firewall migration tool 3.0 supports:
-
Remote Access VPN migration from ASA
if the destination management center is 7.2 or later. You can perform RA VPN migration with or without Secure Firewall Threat
Defense. If you select the migration with threat defense, then the threat defense version must be 7.0 or later.
-
Site-to-Site VPN pre-shared key automation from ASA.
-
The following must be performed as part of the pre-migration activity:
-
The ASA trustpoints must be manually migrated to the management center as PKI objects.
-
AnyConnect packages, Hostscan Files (Dap.xml, Data.xml, Hostscan Package), External Browser package, and AnyConnect profiles
must be retrieved from source ASA.
-
AnyConnect packages must be uploaded to the management center.
-
AnyConnect profiles must be directly uploaded to the management center or from the Secure Firewall migration tool.
-
The ssh scopy enable command must be enabled on the ASA to allow retrieval of profiles from the Live Connect ASA.
-
Migration to Cloud-delivered Firewall Management Center from ASA if the destination management center is 7.2 or later.
|
2.5.2
|
The Secure Firewall migration tool 2.5.2 provides support to identify and segregate ACLs that can be optimized (disabled or
deleted) from the firewall rule base without impacting the network functionality from
Firewalls.
The ACL Optimization supports the following ACL types:
-
Redundant ACL—When two ACLs have the same set of configurations and rules, then removing the non-base ACL will not impact
the network.
-
Shadow ACL—The first ACL completely shadows the configurations of the second ACL.
Note
|
Optimization is available for the ASA
only for ACP rule action.
|
The Secure Firewall migration tool 2.5.2 supports Border Gateway Protocol (BGP) and Dynamic-Route Objects migration if the
destination management center is 7.1 or later.
|
2.5.1
|
The Secure Firewall migration tool 2.5.1 supports Border Gateway Protocol (BGP) and Dynamic-Route Objects migration if the
destination management center is 7.1 or later.
|
2.5
|
The Secure Firewall migration tool 2.5 provides support to identify and segregate ACLs that can be optimized (disabled or
deleted) from the firewall rule base without impacting the network functionality.
The ACL Optimization supports the following ACL types:
-
Redundant ACL: When two ACLs have the same set of configurations and rules, then removing the non-base ACL will not impact
the network.
-
Shadow ACL: The first ACL completely shadows the configurations of the second ACL.
Note
|
Optimization is available for the Source ASA only for ACP rule action.
|
Discontinuous network mask (Wildcard mask) objects are supported if the destination management center version is 7.1 or later.
|
2.4
|
The following ASA VPN configuration migration to threat defense:
-
Crypto map (static/dynamic) based VPN from ASA
-
Route-based (VTI) based ASA VPN
-
Certificate-based VPN migration from ASA
Note
|
-
ASA trustpoint or certificates is migrated manually and part of pre-migration activity.
-
ASA trustpoint must be migrated as management center PKI objects. PKI objects are used in Secure Firewall migration tool while creating certificate-based VPN topologies.
|
|
2.3.5
|
The Secure Firewall migration tool supports the migration of the following Virtual Tunnel Interface (VTI) configurations to
threat defense if the target management center and threat defense is 6.7 or later:
-
VTI interface and the related static routes
-
Route-based (VTI) pre-shared key authentication type VPN configuration to management center and threat defense.
-
Create routed security zone, add VTI interfaces, and then define access control rules for the decrypted traffic control over
VTI tunnel.
|
2.3.4
|
The Secure Firewall migration tool allows you to migrate the following ASA VPN configuration elements to threat defense:
-
Supports migration of policy-based (crypto map) pre-shared key authentication type VPN configuration to the management center.
-
VPN Objects—Creates VPN Objects (IKEv1/IKEv2 Policy, IKEv1/IKEv2 IPsec-Proposal), maps the VPN objects with the specific Site-to-Site
VPN topologies, and migrates the objects to the management center.
Verify the VPN objects against the rules in the Review and Validate Configuration page.
-
Site-to-Site VPN Topology—The crypto map related configurations in source ASA config are migrated with respective VPN objects.
Policy-based (crypto map) VPN Topology are supported on management center version 6.6 and above.
Note
|
In this release, Secure Firewall migration tool supports migration of static crypto map only.
All supported ASA crypto map VPN will be migrated as management center point-to-point topology.
|
|
1.3
|
-
The Secure Firewall migration tool allows you to connect to an ASA using the admin credentials and Enable Password as configured on the ASA.
If ASA is not configured with Enable Password, you can leave the field blank on the Secure Firewall migration tool.
-
You can now configure the batch size limit for Bulk Push in the app_config file as follows:
-
For Objects, the batch size cannot exceed 500. The Secure Firewall migration tool resets the value to 50 and proceeds with
the bulk push.
-
For ACLs, Routes, and NAT, the batch size cannot exceed 1000 each. The Secure Firewall migration tool resets the value to
1000 and proceeds with the bulk push.
-
The Secure Firewall migration tool allows you to parse the CSM or ASDM managed configurations.
When you opt to clear the inline grouping or ASDM managed configurations, the predefined objects are replaced with the actual
object or member name.
If you do not clear the CSM or ASDM managed configurations, the predefined object names will be retained for migration.
-
Provides customer support to download log files, dB, and configuration files during a migration failure. You can also raise
a support case with the technical team through an email.
-
Support for migration of IPv6 configurations in Objects, Interfaces, ACL, NAT, and Routes.
-
The Secure Firewall migration tool allows you to map an ASA interface name to a physical interface on the threat defense object types—Physical interfaces, port channel, and subinterfaces. For example, you can map a port channel in ASA to a physical
interface in management center.
-
The Secure Firewall migration tool provides support to skip migration of the selected NAT rules and Route interfaces. The
previous versions of the Secure Firewall migration tool provided this option for Access Control rules only.
-
You can download the parsed Access Control, NAT, Network Objects, Port Objects, Interface, and Routes configuration items
from the Optimize, Review and Validate Configuration screen in an excel or CSV format.
Note
|
You cannot import a CSV file.
|
|
1.2
|
-
Supports migration to management center 6.3
-
Supports migration of IPv4 FQDN Objects and Groups
-
Supports the show tech-support command in the manual upload method for Multiple-Context ASA
-
Supports migration to the container type threat defense (MI) registered on management center.
-
Rule Action Mapping Support (Allow, Trust, Monitor, Block, or Block with Reset) on the migrated access control rules in the
Access Control table.
-
Version check for Secure Firewall migration tool to ensure that you are using the most recent version of the Secure Firewall
migration tool.
|
1.1
|
-
Bulk push for objects, NAT, static routes significantly reduce the time that is taken to push the configuration to a management center.
-
Extracting configuration from a production ASA
-
Selective feature migration (shared policy and device-specific policy)
-
Rule optimization
-
Map migrating ASA Access Control Rules to a list of configured Intrusion Prevention System and File Policies on the management center.
-
Migrate only those objects that are referenced in policies. This optimizes migration times and cleans out unused objects during
configuration.
-
Migration support for running-config or sh run from one of Data Contexts of ASA running in multiple-context mode.
-
Support on macOS version 10.13 and higher
-
Support to modify logging actions (enable or disable, logging at beginning or end) for migrated Access Control Rules.
-
Migration to threat defense devices configured within domains on the management center.
-
Bulk edits capability for object names.
-
Telemetry support with Cisco Success Network
|
1.0
|
-
Validation throughout the migration, including parse and push operations.
-
Object re-use capability
-
Object conflict resolution
-
Interface mapping
-
Autocreation or reuse of interface objects (ASA name if to the security zone and interface group mapping)
-
Support for a bulk migration of ACLs
|