<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Migrate FortiGate to Palo Alto NGFW - 2019 in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/459442#M3819</link>
    <description>&lt;P&gt;I'm experiencing the same issue with Achindah. May I know how to solve this?&lt;/P&gt;</description>
    <pubDate>Wed, 19 Jan 2022 05:00:41 GMT</pubDate>
    <dc:creator>Kris.Penaredondo</dc:creator>
    <dc:date>2022-01-19T05:00:41Z</dc:date>
    <item>
      <title>Migrate FortiGate to Palo Alto NGFW - 2019</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/293141#M2073</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;I wanted to start this new discussion as I am working thru the process of migrating off of an FortiNet Firewall and onto a Palo Alto Firewall and am working with the Palo Alto Expedition Tool.&amp;nbsp; I am hoping that this discussion can be referenced in the future for others who are going to be tackling a similar project and provide any help/insight that I can along the way.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 12:50:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/293141#M2073</guid>
      <dc:creator>RobWaters</dc:creator>
      <dc:date>2019-10-16T12:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: Migrate FortiGate to Palo Alto NGFW - 2019</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/293142#M2074</link>
      <description>&lt;P&gt;For my first question to the community:&lt;/P&gt;
&lt;P&gt;I have noticed that when I import the FortiNet configuration into expedition I need to do some clean up and the first thing that I am trying to work thru is an issue where my VPN Tunnels are being imported as an additional external interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example my ISP is connected to wan1 on my fortinet firewall and we have some IPSec VPN Tunnels configured thru the Internet service provider. I noticed that for each IPSec VPN Tunnel the import is creating an additional wan1 interface in expedition and creates a duplicate interface error.&amp;nbsp; I am not sure how to correctly clean this up inside of expedition without deleting other associations with the wan1 interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone else ran into this/what did you do to resolve or work thru this?&lt;/P&gt;
&lt;P&gt;Thank You&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 12:54:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/293142#M2074</guid>
      <dc:creator>RobWaters</dc:creator>
      <dc:date>2019-10-16T12:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Migrate FortiGate to Palo Alto NGFW - 2019</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/295144#M2089</link>
      <description>&lt;P&gt;Please, contact us at fwmigrate at paloaltonetworks dot com if this issue has not already been taken.&lt;/P&gt;
&lt;P&gt;Probably we need to explore the case in the FortiGate parser to handle this.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2019 08:15:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/295144#M2089</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2019-10-30T08:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: Migrate FortiGate to Palo Alto NGFW - 2019</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/363889#M3092</link>
      <description>&lt;P&gt;I'm experiencing a similar problem, in addition to Expedition not converting over the Fortinet/Fortigate NATs and rules, VDOMs and interfaces. There are way too many interfaces, rules, and VDOMs on our Fortigate&amp;nbsp; to manually enter this in. With any other firewall, such as the ASA or Netscreen/Juniper, this process is seamless&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Nov 2020 20:21:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/363889#M3092</guid>
      <dc:creator>achindah</dc:creator>
      <dc:date>2020-11-18T20:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Migrate FortiGate to Palo Alto NGFW - 2019</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/459442#M3819</link>
      <description>&lt;P&gt;I'm experiencing the same issue with Achindah. May I know how to solve this?&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 05:00:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/459442#M3819</guid>
      <dc:creator>Kris.Penaredondo</dc:creator>
      <dc:date>2022-01-19T05:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Migrate FortiGate to Palo Alto NGFW - 2019</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/459566#M3827</link>
      <description>&lt;P&gt;Hello Kris,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would want to remap these interfaces within the expedition tool to make this work. What fortinet considers a WAN interface is the interface facing the provider edge, which we could use as a zone interface but for IPSEC tunneling ideally you would use the tunnel interfaces provided within the PAN ( IPSEC set up is here &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK&lt;/A&gt; ) The pass through for these IPSEC VPN's would be your provider edge egress point and you could have multiple VPN's traversing this interface. So if you are going to just migrate over a single VPN from the interface WAN1 you would want remap it into a tunnel interface and the outgoing interface would be the publicly routable IP on an egress interface towards your provider but the tunnel interface will encapsulate the VPN packet across that interface.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jan 2022 16:12:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/migrate-fortigate-to-palo-alto-ngfw-2019/m-p/459566#M3827</guid>
      <dc:creator>azuniga</dc:creator>
      <dc:date>2022-01-19T16:12:58Z</dc:date>
    </item>
  </channel>
</rss>

