<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA Config to Palo Alto in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-config-to-palo-alto/m-p/1245527#M5312</link>
    <description>&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Please note that Expedition performs migration strictly based on the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Cisco ASA CLI configuration provided&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. Due to fundamental architectural differences between &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Cisco ASA and Palo Alto Networks NGFW&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, most configurations are &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not migrated in a strict one-to-one manner&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, and certain policies or NAT rules may require &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;manual adjustment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; after migration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Specifically regarding NAT behavior:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;
&lt;P class="isSelectedEnd"&gt;&lt;STRONG&gt;&lt;SPAN&gt;One-to-One NAT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; migrated from Cisco ASA is shown in Expedition as a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;one-directional NAT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. If bidirectional behavior is required, the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Bi-Directional option can be enabled directly on the Palo Alto firewall&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="isSelectedEnd"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Many-to-One NAT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; does &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not support bi-directional NAT behavior&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; on Palo Alto Networks firewalls. This behavior is by design and aligns with Palo Alto NAT implementation. In such cases, the configuration must be &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;restructured accordingly&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, as documented in the KB below:&lt;/SPAN&gt;&lt;BR /&gt;&lt;A&gt;&lt;SPAN&gt;https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-many-mapping&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;This is &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not a limitation of Expedition&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. The tool reflects exactly what is detected from the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Cisco ASA CLI configuration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. Any discrepancies observed between Cisco CLI output and Cisco ASDM must be &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;validated on the Cisco side&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;It is also expected behavior that &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;certain configuration elements require manual intervention&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; post-migration. This has been reported by multiple users and is documented in the Expedition community KB below:&lt;/SPAN&gt;&lt;BR /&gt;&lt;A&gt;&lt;SPAN&gt;https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-asa-to-palo-alto/td-p/1235604&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Based on our review, the NAT configuration falls under these scenarios where &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;manual configuration on the Palo Alto firewall is required&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, rather than being an Expedition migration issue.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jan 2026 08:40:50 GMT</pubDate>
    <dc:creator>JSmith</dc:creator>
    <dc:date>2026-01-14T08:40:50Z</dc:date>
    <item>
      <title>Cisco ASA Config to Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-config-to-palo-alto/m-p/1245426#M5311</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just want to have discussion on the Cisco ASA config to Palo Alto Config.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a NAT issue when we migrate the configuration. For Many to One, Palo Alto can detect Many to One NAT. When we do the migration, we detect the Many to One NAT should have bi-directional NAT on the ASDM GUI. Is it expected like this that, Palo Alto cannot detect the bi-directional NAT for Many to One NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 07:05:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-config-to-palo-alto/m-p/1245426#M5311</guid>
      <dc:creator>Momoj</dc:creator>
      <dc:date>2026-01-13T07:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Config to Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-config-to-palo-alto/m-p/1245527#M5312</link>
      <description>&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Please note that Expedition performs migration strictly based on the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Cisco ASA CLI configuration provided&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. Due to fundamental architectural differences between &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Cisco ASA and Palo Alto Networks NGFW&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, most configurations are &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not migrated in a strict one-to-one manner&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, and certain policies or NAT rules may require &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;manual adjustment&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; after migration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;Specifically regarding NAT behavior:&lt;/SPAN&gt;&lt;/P&gt;
&lt;UL data-spread="false"&gt;
&lt;LI&gt;
&lt;P class="isSelectedEnd"&gt;&lt;STRONG&gt;&lt;SPAN&gt;One-to-One NAT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; migrated from Cisco ASA is shown in Expedition as a &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;one-directional NAT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. If bidirectional behavior is required, the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Bi-Directional option can be enabled directly on the Palo Alto firewall&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P class="isSelectedEnd"&gt;&lt;STRONG&gt;&lt;SPAN&gt;Many-to-One NAT&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; does &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not support bi-directional NAT behavior&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; on Palo Alto Networks firewalls. This behavior is by design and aligns with Palo Alto NAT implementation. In such cases, the configuration must be &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;restructured accordingly&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, as documented in the KB below:&lt;/SPAN&gt;&lt;BR /&gt;&lt;A&gt;&lt;SPAN&gt;https://docs.paloaltonetworks.com/ngfw/networking/nat/destination-nat-exampleone-to-many-mapping&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;This is &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;not a limitation of Expedition&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. The tool reflects exactly what is detected from the &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;Cisco ASA CLI configuration&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;. Any discrepancies observed between Cisco CLI output and Cisco ASDM must be &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;validated on the Cisco side&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="isSelectedEnd"&gt;&lt;SPAN&gt;It is also expected behavior that &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;certain configuration elements require manual intervention&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt; post-migration. This has been reported by multiple users and is documented in the Expedition community KB below:&lt;/SPAN&gt;&lt;BR /&gt;&lt;A&gt;&lt;SPAN&gt;https://live.paloaltonetworks.com/t5/expedition-discussions/migrating-asa-to-palo-alto/td-p/1235604&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Based on our review, the NAT configuration falls under these scenarios where &lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN&gt;manual configuration on the Palo Alto firewall is required&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;, rather than being an Expedition migration issue.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jan 2026 08:40:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/cisco-asa-config-to-palo-alto/m-p/1245527#M5312</guid>
      <dc:creator>JSmith</dc:creator>
      <dc:date>2026-01-14T08:40:50Z</dc:date>
    </item>
  </channel>
</rss>

