<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA To Panorama Partial Configuration question in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/578852#M4967</link>
    <description>&lt;P&gt;We currently use Panorama to manage multiple firewalls across our organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a Edge ASA Cluster we are needing to migrate over to an existing pair of Palo Alto Firewalls, managed by Panorama.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to only migrate over the Objects, Security Policies, and NAT rules, From the Cisco ASA config to the Panorama.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have imported my ASA config into Expedition, is it okay to delete the network interfaces, zones, etc that were imported with the ASA config? and only focus on the objects, security policies, and nat rules?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the Best Practice way of merging the ASA objects, Security policies, and NAT rules to our Panorama, by using the Load Partial Config commands in the cli of the panorama?&lt;/P&gt;</description>
    <pubDate>Thu, 29 Feb 2024 14:54:41 GMT</pubDate>
    <dc:creator>JRichardson2</dc:creator>
    <dc:date>2024-02-29T14:54:41Z</dc:date>
    <item>
      <title>Cisco ASA To Panorama Partial Configuration question</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/578852#M4967</link>
      <description>&lt;P&gt;We currently use Panorama to manage multiple firewalls across our organization.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a Edge ASA Cluster we are needing to migrate over to an existing pair of Palo Alto Firewalls, managed by Panorama.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to only migrate over the Objects, Security Policies, and NAT rules, From the Cisco ASA config to the Panorama.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have imported my ASA config into Expedition, is it okay to delete the network interfaces, zones, etc that were imported with the ASA config? and only focus on the objects, security policies, and nat rules?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is the Best Practice way of merging the ASA objects, Security policies, and NAT rules to our Panorama, by using the Load Partial Config commands in the cli of the panorama?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 14:54:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/578852#M4967</guid>
      <dc:creator>JRichardson2</dc:creator>
      <dc:date>2024-02-29T14:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA To Panorama Partial Configuration question</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/578860#M4968</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133189"&gt;@JRichardson2&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for reaching out.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Expedition, you can manage Objects and Policies, which should be sufficient. However, please note that if your rules reference specific "zones", these zones must be declared in your device (Panorama). Otherwise, you will not be able to push or commit your configuration. The same applies to tags and other objects used in your Objects or Policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To ensure best practices, please follow these guidelines:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;For network-related information such as interfaces and zones, use the "set" command on the CLI.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;For objects such as tags, addresses, address groups, services, service groups, applications, routes, security rules, and NAT rules, use the "load partial mode merge" command on the CLI.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you have any further questions, feel free to ask.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 16:19:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/578860#M4968</guid>
      <dc:creator>dpuigdomenec</dc:creator>
      <dc:date>2024-02-29T16:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA To Panorama Partial Configuration question</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/578884#M4969</link>
      <description>&lt;P&gt;Yes, the Zones on my Panorama managed firewalls are different than what was imported into Expedition from my ASA config.&lt;/P&gt;
&lt;P&gt;For clarification, I will need to change the Zones on my Expedition ASA config to match that of what I will be applying them to on the Palo Alto config?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example.&lt;/P&gt;
&lt;P&gt;ASA Config in Expedition&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JRichardson2_0-1709232748634.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57957i353BAFB4D79F7A23/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JRichardson2_0-1709232748634.png" alt="JRichardson2_0-1709232748634.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;On my Palo Alto managed firewalls, the zone name I will be applying these rules to is named "WEB_DMZ" for the dmz side, and "Outside" for the outside side.&amp;nbsp; Will it error out being that the Cisco outside interface is a lowercase o vs the Palo Alto side is a Capital O.?&amp;nbsp; Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Feb 2024 18:55:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/578884#M4969</guid>
      <dc:creator>JRichardson2</dc:creator>
      <dc:date>2024-02-29T18:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA To Panorama Partial Configuration question</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/579041#M4970</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/133189"&gt;@JRichardson2&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recommend that the security rules and NAT rules contain the correct names of your zones before pushing them to your device.&lt;/P&gt;
&lt;P&gt;You can do that by renaming your zones or by doing a bulk change on your security rules updating the field zone to and zone from.&lt;/P&gt;
&lt;P&gt;Let me know if I can help in anything else,&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;David&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 16:46:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-to-panorama-partial-configuration-question/m-p/579041#M4970</guid>
      <dc:creator>dpuigdomenec</dc:creator>
      <dc:date>2024-03-01T16:46:33Z</dc:date>
    </item>
  </channel>
</rss>

