<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Firepower Migraton for Palo Alto in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/576033#M4922</link>
    <description>&lt;P&gt;&lt;A href="https://github.com/jorlan72/FirePalo" target="_blank" rel="noopener"&gt;jorlan72/FirePalo: FirePalo helps you convert rules and objects from Cisco FirePower to Palo Alto (github.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;FirePalo (Windows GUI) helps you convert rules and objects from Cisco FirePower to Palo Alto&lt;/P&gt;
&lt;P&gt;(See the "Sceenshots from the application.docx")&lt;/P&gt;
&lt;P&gt;Run "show access-control-config" from the FTD device and save output to a textfile. Open the textfile in FirePalo.exe and it will create editable objects. Finally, "commit" the changes and create a configuration in SET format that can be pasted into a Palo Alto device or Panorama.&lt;/P&gt;
&lt;P&gt;This version will not convert device configuration like interfaces, routing or NAT. Some manual work needed for User-ID, URL Categories and Application filters.&lt;/P&gt;
&lt;P&gt;Download the PaloAppID.txt file and place it with the FirePalo.exe. It contains all the Palo Alto APP-ID's&lt;/P&gt;
&lt;P&gt;FirePalo also lets you export sections of the configuration to edit in preferred editor and than import the result back (great for search and replace). In addition you can easily lowercase or uppercase sections (or the entire configuration) and cut object names automatically to supported length. Further, you can convert services to applications (as not all services from FTD are supported as a service). Finally, you can add tags for objects, so that all rules using a certain object get the tag set.&lt;/P&gt;
&lt;P&gt;Easily select if this is a standalone or Panorama configuration to be created (so that device group get included in the configuration).&lt;/P&gt;
&lt;P&gt;FirePalo takes the output from the FTD and first turns it into a treeview. It then takes all the items in the treeview and creates objects you can edit, providing an unique ID for each object. This binds everything to the correct rules and all edits will be in place when you finally turn the objects into a treeview again ("commit"). You can then look through the result as a treeview and make more changes if needed (and then doing a new commit).&lt;/P&gt;
&lt;P&gt;When everything looks good, you can generate the final configuration in SET format and paste it into the Palo Alto device or Panorama CLI.&lt;/P&gt;</description>
    <pubDate>Mon, 05 Feb 2024 16:44:23 GMT</pubDate>
    <dc:creator>Jorgen_Lanesskog</dc:creator>
    <dc:date>2024-02-05T16:44:23Z</dc:date>
    <item>
      <title>Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379507#M3131</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;We want to migrate Cisco fire power 4000 series to Palo Alto NGFW. Could you please let me know the best way to do this migration?&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best Regards,&lt;/P&gt;
&lt;P&gt;Muzammel Haque&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 11:44:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379507#M3131</guid>
      <dc:creator>Muzammel</dc:creator>
      <dc:date>2021-01-13T11:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379561#M3132</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;you can use Palo Alto migration tool Expedition for details:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/products/secure-the-network/next-generation-firewall/migration-tool" target="_blank"&gt;https://www.paloaltonetworks.com/products/secure-the-network/next-generation-firewall/migration-tool&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 14:15:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379561#M3132</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2021-01-13T14:15:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379592#M3133</link>
      <description>&lt;P&gt;Hi Abdul-Fattah,&lt;/P&gt;
&lt;P&gt;Thank you for your prompt suggestions. I have downloaded following file&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;ExpeditionVM-1.1.10.ova and&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-&amp;nbsp;Expedition.tgz&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do I need both the files or ExpeditionVM-1.1.10ova is enough. May I request you for any doc's?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;/P&gt;
&lt;P&gt;Muzammel Haque&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 15:07:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379592#M3133</guid>
      <dc:creator>Muzammel</dc:creator>
      <dc:date>2021-01-13T15:07:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379606#M3134</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For installation there is a video created on the expedition forums demonstrating how to perform this function, you can watch the video here ( &lt;A href="https://live.paloaltonetworks.com/t5/expedition-migration-tool/ct-p/migration_tool" target="_blank"&gt;https://live.paloaltonetworks.com/t5/expedition-migration-tool/ct-p/migration_tool&lt;/A&gt; ), also there are guides listed from that link as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for the Cisco FirewPower migration the expedition tool will not migrate over the layer 7 policies but only the layer 3/4 policies so you will need to export the configuration with the asa format for conversion.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 15:51:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379606#M3134</guid>
      <dc:creator>azuniga</dc:creator>
      <dc:date>2021-01-13T15:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379752#M3135</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thanks for your reply. Someone told me there is a separate tools for migrating Cisco Fire Power to Palo Alto, but I am not sure. Is there any specific migration tools for fire power?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best Regards,&lt;/P&gt;
&lt;P&gt;Muzammel Haque&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2021 05:41:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379752#M3135</guid>
      <dc:creator>Muzammel</dc:creator>
      <dc:date>2021-01-14T05:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379957#M3136</link>
      <description>&lt;P&gt;For layer 7 migration policies we offer no tool. But for cisco ASA configurations the expedition tool will work fine.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2021 16:16:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/379957#M3136</guid>
      <dc:creator>azuniga</dc:creator>
      <dc:date>2021-01-14T16:16:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/381652#M3146</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i am also planning to migrate cisco firepower 2130 to palo alto 5500 series firewall&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when i download the migration tool in the ubuntu as per suggested document&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we are getting apache2 ubuntu default page&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can anyone help us how to solve this issue&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 17:19:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/381652#M3146</guid>
      <dc:creator>HemanthV</dc:creator>
      <dc:date>2021-01-22T17:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/381672#M3149</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84014"&gt;@HemanthV&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe I answered this on another thread, we will use that one for your answer.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 18:30:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/381672#M3149</guid>
      <dc:creator>azuniga</dc:creator>
      <dc:date>2021-01-22T18:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/576033#M4922</link>
      <description>&lt;P&gt;&lt;A href="https://github.com/jorlan72/FirePalo" target="_blank" rel="noopener"&gt;jorlan72/FirePalo: FirePalo helps you convert rules and objects from Cisco FirePower to Palo Alto (github.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;FirePalo (Windows GUI) helps you convert rules and objects from Cisco FirePower to Palo Alto&lt;/P&gt;
&lt;P&gt;(See the "Sceenshots from the application.docx")&lt;/P&gt;
&lt;P&gt;Run "show access-control-config" from the FTD device and save output to a textfile. Open the textfile in FirePalo.exe and it will create editable objects. Finally, "commit" the changes and create a configuration in SET format that can be pasted into a Palo Alto device or Panorama.&lt;/P&gt;
&lt;P&gt;This version will not convert device configuration like interfaces, routing or NAT. Some manual work needed for User-ID, URL Categories and Application filters.&lt;/P&gt;
&lt;P&gt;Download the PaloAppID.txt file and place it with the FirePalo.exe. It contains all the Palo Alto APP-ID's&lt;/P&gt;
&lt;P&gt;FirePalo also lets you export sections of the configuration to edit in preferred editor and than import the result back (great for search and replace). In addition you can easily lowercase or uppercase sections (or the entire configuration) and cut object names automatically to supported length. Further, you can convert services to applications (as not all services from FTD are supported as a service). Finally, you can add tags for objects, so that all rules using a certain object get the tag set.&lt;/P&gt;
&lt;P&gt;Easily select if this is a standalone or Panorama configuration to be created (so that device group get included in the configuration).&lt;/P&gt;
&lt;P&gt;FirePalo takes the output from the FTD and first turns it into a treeview. It then takes all the items in the treeview and creates objects you can edit, providing an unique ID for each object. This binds everything to the correct rules and all edits will be in place when you finally turn the objects into a treeview again ("commit"). You can then look through the result as a treeview and make more changes if needed (and then doing a new commit).&lt;/P&gt;
&lt;P&gt;When everything looks good, you can generate the final configuration in SET format and paste it into the Palo Alto device or Panorama CLI.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 16:44:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/576033#M4922</guid>
      <dc:creator>Jorgen_Lanesskog</dc:creator>
      <dc:date>2024-02-05T16:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/576670#M4937</link>
      <description>&lt;P&gt;I have done a couple of FTD to PANW migrations.&amp;nbsp; Expedition works very well for the CLI.&amp;nbsp; I developed a Python script to log into the FMC API and collect the ACP config.&amp;nbsp; (I also collected the objects, but they may all be in the CLI already.)&amp;nbsp; I then created Expedition CSV files to import into Expedition on top of the CLI config.&amp;nbsp; It works well!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Expedition currently does not support the import of URLs in security policy rules via CSV.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The FTD CLI config is just like the ASA except the security policy.&amp;nbsp; You can delete those except the ones created for IPsec tunnels.&amp;nbsp; As with all ASA migrations, you need to fix (1) dynamic routes, and (2) IKE Phase 1 algorithms.&amp;nbsp; Usually adding static routes for RFC1918 to the inside fixes the routes so Expedition will apply the correct destination zones.&amp;nbsp; In one case, I converted the dynamic route table text to CLI commands and imported, and it worked fine.&amp;nbsp; With regard to IPsec, the command "show vpn-sessiondb detailed l2l" will show you the algorithms in use so that you can manually configure them in Expedition.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 19:15:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/576670#M4937</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-02-08T19:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Migraton for Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/576725#M4939</link>
      <description>&lt;P&gt;Very cool tool!&lt;/P&gt;</description>
      <pubDate>Fri, 09 Feb 2024 00:36:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-firepower-migraton-for-palo-alto/m-p/576725#M4939</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-02-09T00:36:01Z</dc:date>
    </item>
  </channel>
</rss>

