FortiConverter Admin Guide
FortiConverter Admin Guide
Version 5.6.1
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTINET COOKBOOK
https://cookbook.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://fortiguard.com/
FEEDBACK
Email: [email protected]
May 3, 2019
FortiConverter 5.6.1 Admin Guide
00-400-000000-20181031
TABLE OF CONTENTS
About FortiConverter 8
Supported versions and conversions 8
General limitations 11
Licensing 12
What's new 14
Installation 15
System requirements 18
Activating the license 19
Enabling remote connections—new application 21
Alcatel-Lucent conversion 22
Alcatel-Lucent differences 22
Conversion support 22
Address and address group configuration 22
Interface configuration 22
Service and Service Group configuration 22
Policy configuration 23
VDOM configuration 24
Example conversion 24
Saving the Alcatel-Lucent source configuration file 25
Alcatel-Lucent conversion wizard 26
Alcatel Start options 26
Alcatel-Lucent Source configuration 28
Device selection 28
Partition & Zone rule selection 28
Alcatel Interface mapping 28
VLAN and Loopback 29
Alcatel Route Information 29
Alcatel-Lucent Conversion result 30
Check Point conversions - new application 31
Check Point differences 31
General 31
Schedule configuration 31
NAT and policy configuration 31
VPN configuration 32
Service objects 32
Saving the Check Point source configuration file 32
Check Point conversion wizard 33
Check Point Start options 34
MDS selection (Provider-1 only) 37
Global policy collection (Provider-1) 37
Check Point Source Configuration (Provider-1) 37
Firewall selection (SmartCenter only) 38
Policy collection 38
Check Point Interface mapping - SmartCenter only 38
Firewall clusters 79
Saving the McAfee source configuration file 79
McAfee conversion wizard 80
McAfee Start options 80
McAfee Source Configuration 80
VSYS selection 81
McAfee Interface mapping 81
McAfee Route Information 82
McAfee Conversion result 82
Palo Alto Networks conversion - new application 84
Conversion support 84
Saving the PAN source configuration files 84
Palo Alto conversion wizard 87
Palo Alto Start options 88
PAN Source Configuration 89
Palo Alto Interface mapping 89
Palo Alto Route Information 90
Palo Alto Conversion result 90
Snort conversion - new application 91
Snort conversion wizard 91
Basic outline of a snort rule 91
Snort Start options 95
Source Preview 95
Snort Conversion result 96
SonicWall conversion - new application 97
SonicWall differences 97
Special characters 97
Address book configuration 97
97
Service book configuration 98
Schedule configuration 98
98
Local User and User Group 98
Route configuration 98
Saving the SonicWall source configuration file 98
SonicWall conversion wizard 99
SonicWall Start options 99
SonicWall Source Configuration 100
SonicWall Interface mapping 101
SonicWall Route Information 101
SonicWall Conversion result 102
Sophos conversion - new application 103
Sophos Networks differences 103
Conversion support 103
Saving the Sophos source configuration files 103
Sophos conversion wizard 103
About FortiConverter
FortiConverter can translate configurations from the following vendors and models.
l In some cases, FortiConverter can't translate some parts of the configuration because of dependencies or
unsupported syntax and you must manually convert them.
l If the number of objects exceeds the maximum valid length for FortiGate or FortiManager, FortiConverter
trims them.
l FortiConverter comes with two different applications, each capable of a different set of conversions. The
Converter Application column shows which FortiConverter application to use for each conversion.
Unless noted as an exception below, conversions only support IPv4 unicast policy.
Check SmartCenter New Application NG FP1 (4.0) to Addresses & Address Groups
Point NGX R80 Interfaces
Local Users & Groups
NAT Negate Cell
Policies (rulebases.fws)
Provider-1 New Application NGX R65 to RADIUS, TACACS+, & LDAP
R80 Rules
Schedules Services & Service Groups
SRX New Application Junos OS 10.x Addresses & Address Groups &
to 18.x FQDNs
McAfee Sidewinder Legacy 7.x, 8.x Addresses & Address Groups &
Application FQDNs
Interfaces
IP Pools
Policies
Services & Service Groups
Static Routes
Palo Alto PA New Application PAN-OS 1.x to Addresses & Address Groups &
Networks 8.x FQDNs
Interfaces
Local Users & Groups
NAT
Policies
Schedules
Static Routes
Services & Service Groups
Zones
SonicWall TZ Series New Application SonicOS 4.x, Addresses & Address Groups &
NSA Series 5.x, 6.x (Wildcard) FQDNs
DHCP Servers & Clients & Relays
Interfaces
Local Users & Groups
NAT
Policies
Schedules
Services & Service Groups
Groups
Static Routes
Zones
VPN (IPSEC site to site)
Exceptions
General limitations
FortiConverter is a migration tool, not a migration service. It’s designed to be used as part of a properly planned
migration process.
FortiConverter supports conversions from other vendors to FortiOS 5.6 and 6.0 only.
While FortiConverter significantly shortens the conversion process, a final, useable configuration requires you
to review and audit the FortiConverter output conversion. The FortiConverter tuning capability can help with the
review and audit process.
While you can use the FortiConverter tuning capability to review and fix errors in the conversion, it isn't
designed to perform significant reconfiguration.
In some cases, not all routing information that FortiConverter requires to make a decision about a policy
interface is available. In these cases, it uses the any interface.
Double NAT
For Check Point conversions, the FortiConverter conversion engine uses a manual rule to convert
configurations that apply source NAT and destination NAT to the same policy (called double NAT).
For all other conversions, FortiConverter NAT merge doesn't support double NAT. Instead, FortiConverter
applies source NAT in the conversion and you complete the configuration by using the tuning page to manually
apply destination NAT.
IPsec support
FortiConverter converts IPsec configurations to route-based or policy-based IPsec depending on which one the
source configuration is closest to. Users can enable Route-based IPSec for Cisco ASA, PIX,FWSM, Juniper and
Check Point conversions.
Licensing
The trial version of FortiConverter, allows you to complete a conversion and view the results in the Tuning
page. CLI output is disabled, but is available in the fully-licensed version.
When you purchase a license, FortiConverter is unlocked and full functionality is enabled for all supported
vendors. Your paid license entitles you to any new versions of FortiConverter that Fortinet releases until the
license expires, as well as direct engineering support.
FortiConverter 5.6.1 features a new browser/server based application in addition to the legacy application. Both
the new application and legacy application use the same license key and should be installed on the same host.
FortiConverter requires an Internet connection to verify its license. You can use the software for up to 30 days
without validating the license online, and you can configure FortiConverter to contact the licensing server via a
web proxy.
What's new
The following list contains new features and enhancements in FortiConverter 5.6.1.
FortiConverter 5.6.1
Installation
Download the FortiConverter installer from the Fortinet Technical Support website:
https://support.fortinet.com
Uninstalling the new FortiConverter application from Windows only removes the application itself, it does not
remove the conversion data or database. If you re-install the application later, the data can still be accessed.
6. Open the newly created service record, right-click the database "djangodb", and select Delete/Drop.
7. Click OK.
8. If you receive the error message: "there is 1 other session xxx", terminate all other existing external
connections, except for the connection from pgAdmin 4.
a. Make sure FortiConverter has been stopped.
b. Click the "djangodb" database.
c. Go to Tools > Query Tool, then enter the following PSQL script.
SELECT
pg_terminate_backend(pid)
FROM
pg_stat_activity
WHERE--
don't kill my own connection!
pid <> pg_backend_pid()
-- don't kill the connections to other databases
AND datname = 'djangodb';
d. Click Execute.
12. Delete all existing conversion folders to avoid a name conflict.Conversions are, by default, stored at
C:\Users\<UserName>\AppData\Roaming\Fortinet\FortiConverte
r\conversions.
13. Uninstall the program.
14. Delete all remaining files and folders in the FortiConverter folder, located at C:\Program
Files\Fortinet\FortiConverter.
System requirements
Also, FortiConverter requires .NET Framework 4.0 or above. If it isn't already installed on your computer, the
FortiConverter installer prompts you to download and install it.
A web browser is required.
An Internet connection is required to periodically verify the software license.
For any questions not covered in this content, contact FortiConverter customer support at fconvert_
[email protected].
By default, FortiConverter is installed with a limited trial license. If you have purchased a full license, download
it to unlock the complete feature set.
To purchase a license, use your usual Fortinet sales channel. For other licensing issues, see Licensing for more
information.
If you have already activated a license for the legacy FortiConverter application on
your device, the new application automatically uses that license when it’s installed.
Legacy application
6. Enter the Hardware ID you copied earlier, an optional description, and choose your Fortinet partner from
the list.
7. After you agree to the license terms, the final page of the wizard allows you to download the license file
(.lic file).
8. In FortiConverter, from the License tab, click Select , then navigate and select the .lic file.
9. Click Activate.
FortiConverter validates the license file and changes your Activation Status from Trial to Activate. Your
license is valid for all FortiConverter software updates released until the date specified by License Expiry
Date.After the license is activated, the expiry information is under the License tab.
New application
You can configure FortiConverter to use an explicit (non-transparent) web proxy server to connect to Fortinet
online licensing servers.
FortiConverter connects to the proxy using the HTTP CONNECT method, as described in RFC 2616.
1. Click About FortiConverter.
2. On the Proxy tab, select Enable Proxy and then specify the IP address and the port of the web proxy to
use.
3. Click Apply.
The new FortiConverter is designed as a web application. The application (FortiConverter.py) should be run
with Administrator privileges because it reads and writes data from/to high privilege directories. For security
concerns, the default configuration only allows connections from users on the localhost.
1. Run notepad as an administrator and open the start.bat file located in the directory C:\Program
Files\Fortinet\FortiConverter\.
2. Append string 0.0.0.0:<port_num> after the keyword runserver. The port number used by default
is 8000.
For example:
call "%install_dir%\Python36\python.exe" manage.py runserver 0.0.0.0:8000
--insecure
3. Run notepad.exe as an administrator and open C:\Program
Files\Fortinet\FortiConverter\converter\backend\mysite\mysite\settings.py
4. Add the wildcard IP address '*' (match ANY) into allowed ALLOWED_HOSTS.
For example:
ALLOWED_HOSTS = [
'localhost','127.0.0.1','*',
]
Alcatel-Lucent conversion
Alcatel-Lucent differences
Conversion support
Interface configuration
Policy configuration
Lucent Brick Zone Rulesets operate at the zone level, which has no direct equivalent in FortiGate. Zone
rulesets need to be translated into equivalent FortiGate policies.
FortiConverter translates Lucent Brick rules by separating traffic into two categories: inter-partition and intra-
partition.
l Inter-partition traffic behaves like inter-VDOM traffic, and is simple to convert to FortiGate policies.
l Intra-partition traffic is more complicated to convert because multiple zone rules can be applied.
FortiConverter handles the inter-partition traffic by creating a general policy for each rule.
FortiConverter handles the intra-partition traffic by looking for all matches between two zone rulesets.
FortiConverter looks at 3 fields: source, destination, and service. All 3 fields must overlap for the rules to
match. FortiConverter creates a policy for each match using the intersection of each field.
The action of the rules determines the action of the converted policy, as shown in the following table:
Inter-partition Deny policies have higher priority than intra-partition policies, while inter-partition Accept policies
have lower priority than intra-partition policies.
Lucent default ruleset “firewall” is currently unsupported.
VDOM configuration
Example conversion
The following block diagram and tables illustrates a Lucent configuration with 2 partitions and 3 zones.
This Lucent configuration creates the following FortiGate configuration. Inter-partition rules are in bold.
Before starting the conversion wizard, save a copy of your Alcatel-Lucent configuration file to the computer
where FortiConverter is installed.
FortiConverter provides a Perl script for downloading Alcatel-Lucent Brick configurations.
The Windows folder that contains the Perl script and the documentation for using it are displayed. Follow the
instructions to run the Perl script and output the source configuration as a set of directories.
Setting Description
Enable host behind zone attribute Specifies whether FortiConverter restricts the
destination or source IP addresses in the firewall
policy it generates to ones specified by the "host
behind zone" settings in the source configuration.
When this option is disabled, FortiConverter
ignores the "host behind zone" settings and it uses
the destination or source IP address specified by
the source rule in the output policy.
Convert Administrative Zone zone ruleset Specifies whether FortiConverter includes the
default “administrativezone” ruleset in the output
configuration.
Because the “administrativezone” ruleset is
designed for device management, in most cases, it
isn't required in the output configuration.
Include input configuration lines for each output Specifies whether FortiConverter includes the input
policy configuration lines used for each FortiGate policyin
the FortiGate configuration as a policy comment.
Enable intra-partition zone rule set merge Specifies whether FortiConverter creates FortiGate
policies for traffic within a partition that the source
configuration applies multiple zone rulesets to.
For more information on how FortiConverter
converts intra-partition zone rulesets to a FortiGate
policy, see Alcatel-Lucent conversion on page 22.
Adjust table sizesCP: check that option name You can customize the maximum table sizes that
changed FortiConverter uses when Adjust table sizes is
selected. For more information, see Adjusting
table sizes on page 155.
Ensure the configuration is in a text format. FortiConverter can't use binary files. See Saving the Alcatel-Lucent
source configuration file on page 25.
Setting Description
Device selection
Setting Description
Setting Description
Select all partitions Select to select all partitions and clear it to de-select all partitions.
Partition selection Use the check box to select a partition to include in the conversion.
Click the pair of arrows on the right to open or close the detailed
partition view, which shows the individual zone rules within a
partition.
Zone rule selection Use the check box to select a zone rule to include in the conversion.
l For example, you can create resources such as VLANs, LAGs, and inter-VDOM links on the target
FortiGate device before you import the conversion, and then reference those interfaces in the physical
interface mapping.
You can also use the Tuning page to create mappings, such as physical to VLAN, after the conversion is
complete.
To delete an interface, select the entry and click Delete. This is useful if your target FortiGate has fewer
interfaces than the source configuration.
Setting Description
Import from file Click to load a set of interface mappings from a text file.
Export current mappings Saves the current set of interface mappings to a text file.
Edit Click to edit additional properties for the selected mapping item.
This page displays the logical interfaces that FortiConverter detects in the source configuration and the
changes it makes to the associated physical interface and its naming.
You can't use this page to modify the logical interface settings.
If required, you can use the Tuning page to modify logical interfaces and zones. See Tuning the output on page
119
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Policies Detected & Policies Created Allows you to view and compare the number of objects
that FortiConverter detected in the source configuration
and the ones it created for the output configuration.
Messages & Warnings Allows you to review any objects that FortiConverter did
not include in the conversion.
If you enabled Discard unreferenced firewall
objects on the Start Page, this tab displays the objects
that FortiConverter removed.
Setting Description
Export Generates an HTML page of the conversion result.
Go to Tuning Opens the tuning page. See Tuning the output on page 119.
For more information, see Viewing the results of your automatic conversion on page 134.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
General
l The FortiGate set allowaccess command for interfaces doesn’t exist on Check Point. Because
FortiGate requires this setting, FortiConverter enables all services for interfaces by default.
l The interface Lead to Internet is a default static route on FortiGate.
l FortiConverter supports Traditional Mode and Simplified Mode IPSec.
Schedule configuration
FortiConverter converts "Day in month" time schedules to FortiGate one-time schedules. It converts "Day in
week" and "None" schedules to recurring schedules.
You assign a year range for the "Day in month" schedule. If the specified day doesn't exist for a certain month,
FortiConverter doesn't generate the one-time schedule for that month.
VPN configuration
Check Point doesn't configure VPN within a firewall rule. When FortiConverter converts the configuration to
FortiGate, it generates several VPN policies from non-"Lead to Internet" interfaces to the "Lead to Internet"
(default route) interface.
After FortiConverter converts the VPN configuration, the VPN policy destination interface refers to the "Lead to
Internet" interface.If you changed the default route egress interface, you may need to update the VPN/Policy
configuration manually.
FortiConverter can support VPN IPSec policies configured in both Traditional Mode and Simplified Mode.
However, FortiConverter can only convert one mode at a time. If encrypted rules are detected, FortiConverter
defaults to Traditional Mode conversion.
To convert Traditional Mode policies to Simplified Mode policies, use the Check Point Security Policy Converter
Wizard. This can be found by clicking Policy > Convert to > Simplified VPN from the Check Point
SmartDashboard.
FortiConverter can detect and convert meshed and star VPN topologies in Simplified form.
Service objects
Unlike FortiGate service objects, Check Point service objects have a protocol type attribute. FortiGate uses a
session helper object to provide the same functionality as the service objects with a protocol type attribute.
Before starting the conversion wizard, save a copy of your Check Point configuration file to the computer where
FortiConverter is installed.
To acquire the configuration, download the following files. In most cases, you download the object and policy
definitions from the management system:
l Object definitions—‘objects_5_0.C’ (Check Point NG/NGX) or 'objects.C' (Check Point 4.x) contain the
firewall’s object definitions. To convert from Provider-1, ‘mcss.C’ contains the MDS hierarchy files.
l Policy and rule definitions—‘*.w’ or ‘rulebases_5_0.fws’. The file name is <rule>.W (default
Standard.W). or rulebases_5_0.fws. They are located in the directory "[SmartCenter] : $FWDIR/conf".
l Route information (optional)—Helps FortiConverter to correctly interpret the network topology being
converted. To get this data, enter the route print command on the firewall node, and then copy and paste
the output into a plain text file. Codes in the output indicate if the route is a directly connected interface, a
host route, a network route, and so on. The output varies by the platform.
l User and user groups file (optional)—fwauth.NDBx
Ensure the configuration is in a text format (for example, in plain text or XML). FortiConverter can't use binary
files.
The pages that the Check Point conversion wizard shows depend on whether your source configuration is
SmartCenter or Provider-1.
Because Provider-1 uses global and device-level virtual domains that are similar to FortiManager ADOMs, you
convert Provider-1 configurations to policy packages and objects for your source firewalls in the FortiManager
Policy & Objects database. You can only select FortiManager as the output format on the Start options page.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
SmartCenter Input
Object Definition File Select the object definition file. This file should
(objects_5_0.C) include the definition of firewalls, interfaces
and firewall objects.
Policy Information File Select the policy information file. This file
(Standard.W or rulebases_5_0.fws) should include the information of policies and
manual NAT rules in each policy package.
[Optional] User & User Group File(fwauth.NDB) Select the user and user group file.
Provider-1 Input
MDS Definition File (mdss.c) Select the MDS definition file. This file should
include the MDS hierarchy.
MDS Object File (objects_5_0.c) Select the MDS object definition file.
Global Policy Object File (objects_5_0.c) Select the global object definition file. This file
should include the definition of global objects.
Global Policy Rulebase File (rulebases_5_0.fws) Select the global policy information file. This
file should include the information of policies
and manual NAT rules in each global policy
package.
Conversion Options
Discard unreferenced firewall objects This option can be useful if your target device
has table size limitations.
You can view the unreferenced objects that
FortiConverter removed on the Conversion
Result page.
Adjust Service Table Capacity Size You can customize the maximum table sizes
that FortiConverter uses when Adjust table
sizes is selected. For more information, see
Adjusting table sizes on page 155.
Number of year-long schedules from day in month Specifies how many years of one-time
schedules schedules to generate. The wizard converts
Check Point "day in month" schedules into
equivalent one-time FortiGate schedules.
Comment Options
Policy comment - Add policy package name and rule Include policy package name, policy number
number and NAT rule number in the comment of
output policy.
Policy comment - Preserve the original comment Include the original comment in source file in
the comment of the output policy.
Ignore firewall policies with all or any addresses when Specifies whether FortiConverter ignores
processing NAT rules firewall policies with an "all" or "any" address
when it merges a NAT rule and a firewall policy
to create a FortiGate NAT policy.
FortiConverter creates new policies in the
output configuration based on where NAT
rules to firewall policies intersect. Because
firewall policies that use "all" or "any" as the
address create many intersections, Fortinet
recommends that you ignore them.
Setting Description
Setting Description
A Provider-1 configuration contains multiple domains. Input the object definition, policy package information,
and user file in this page.
Ensure the configuration is in a text format. FortiConverter can't use binary files.
See Saving the Check Point source configuration file on page 32
Setting Description
Browse Click to navigate to the domain source configuration file. See Saving the
Check Point source configuration file on page 32.
Setting Description
(firewall item) Select one or more firewalls to convert from the domain
source configuration.
Information of Configurations Source configuration file names are shown in the table.
Click the file name to see the content. But if the file size
is too large, the file can't be shown.
Source Configuration Preview The numbers of each kind of firewall objects are shown
in the table above. By clicking the object number, the
detailed information of each object is listed in the table
below.
Policy collection
Setting Description
(Route file name field) If you selected Auto generate policy interfaces on the Start
options page, enter the path and file name of a file that
contains route information, or click Browse to select it. For
example, the file can contain routing tables you obtained using
the netstat -nr command.
Policy packages viewer Select the policy package name and the detail of each policy in
the package listed in the table.
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
VDOM Mapping Shows how VDOMs were mapped from the source device to the new device.
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
For more information, see Viewing the results of your automatic conversion on page 134
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
For more information on how handles NAT merges, see NAT merge options on page 156.
It also has a firewall rule that matches the object to source addresses.
FortiConverter generates the following policy, for which NAT is enabled (set nat enable). However,
because it doesn't specify an IP pool, the source address uses the interface IP address to perform NAT:
edit 10002
set srcintf "port2"
set dstintf "port1"
set srcaddr "Host_172.21.84.202_Hide_Gateway"
set dstaddr "Host_Destination"
set service "http" "https"set schedule "always"
set logtraffic allset status enableset action acceptset comments "Example of address
hides behind gateway."
set global-label "FW1"
set nat enable
next
When a policy has NAT enabled, it attempts to match a source address to a VIP object. If it finds a match, it
performs static NAT using the VIP object. If it doesn't find a match, it uses the interface IP address. (See the
next section for an example with a VIP object.)
It also has a firewall rule that matches the object to source addresses.
edit 10003
set srcintf "port2"
set dstintf "port1"
set srcaddr "Host_172.21.84.203_Static"
set dstaddr "Host_Destination"
set service "http" "https"set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of address with static NAT in source address."
set global-label "FW1"
set nat enable
next
When a policy has NAT enabled, it attempts to match a source address to a VIP object. If it finds a match, it
performs static NAT using the VIP object. If it doesn't find a match, it uses the interface IP address. (See Host
address hides behind gateway for an example without a VIP object.)
FortiConverter generates the following VIP object and policy. The policy replaces the destination address with
the VIP object:
edit "vip-Host_172.21.84.203_Static"
set extip 210.61.82.160
set mappedip 172.21.84.203
set extintf port1
edit 10004
set srcintf "port1"
set dstintf "port2"
set srcaddr "Host_Source"
set dstaddr "vip-Host_172.21.84.203_Static"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of address with static NAT in destination address."
set global-label "FW1"
next
Manual NAT rule matches policy source address with one-to-one mapping
A source configuration has a manual NAT rule that translates a source address:
This configuration is a one-to-one mapping because both the original address and translated address are host
addresses.
FortiConverter generates the following IP address pool and policy. NAT is enabled for the policy and it uses the
pool to perform NAT:
edit "ippool-210.61.82.160"
set endip 210.61.82.160
set startip 210.61.82.160
set type overload
next
edit 10005
set srcintf "port2"
set dstintf "port1"
set srcaddr "Host_172.21.84.204"
set dstaddr "Host_Destination"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of one to one source NAT rule ."
set global-label "FW1"
edit 10007
set srcintf "port1"
set dstintf "port2"
set srcaddr "Host_Source"
set dstaddr "Host_172.21.84.204"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of one to one destination NAT rule ."
set global-label "FW1"
next
The translated address is used as the destination address because it is in internal network.
NAT rule and policy addresses don't match: Destination address of the policy
contains the NAT object
A source configuration has a host address object Host_172.21.84.203_Static that Static NAT translates to
210.61.82.160.
edit 110009
set srcintf "port1"
set dstintf "port2"
set srcaddr "Host_Source"
set dstaddr "vip-Host_172.21.84.203_Static"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set global-label "FW1"
next
edit 10009
set srcintf "port1"
set dstintf "port2"
set srcaddr "Host_Source"
set dstaddr "AddressGroup_Destination"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of name overlap in destination address."
set global-label "FW1"
next
FortiConverter converts policy 10009 directly from the original firewall rule. Policy 11009 is a copy of policy
10009 with the destination address field changed to vip-Host_172.21.84.203_Static to reflect the
static NAT object conversion.
This type of policy enables the source static NAT mapping by capturing all the VIP objects that other policies
don't reference.
In some conversions, FortiConverter generates more than one of this kind of policy – one for each external
interface that is referenced by an unreferenced VIP object.
From FOS v6.0.0 release, the central NAT feature was enhanced. You don’t need to add a “set nat enable”
clause into each firewall policy command view. This makes the central NAT module run as a separated
functional part.
It also has a firewall rule that matches the object to source addresses.
FortiConverter also creates a central NAT object that uses the IP pool:
edit 3
set srcintf "port2" (generated from route information)
set dstintf "port1" (generated from route information)
set orig-addr "Host_172.21.84.201_Hide_IP"
set dst-addr "all"
set nat-ippool "ippool-210.61.82.139"
next
FortiConverter converts the Check Point firewall rule into the following policy:
edit 10001
set srcintf "port2" (generated from route information)
set dstintf "port1" (generated from route information)
edit 2
set srcintf "port2"
set dstintf "port1"
set orig-addr "Net_172.21.84.0"
set dst-addr "Host_Destination"
set nat-ippool "ippool-210.61.82.130"
next
edit 10006
set srcintf "port2"
set dstintf "port1"
set srcaddr "Net_172.21.84.0"
set dstaddr "Host_Destination"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of one to many source NAT."
set global-label "FW1"
next
This section covers conversion from the Cisco IOS, IOS XR, and Nexus models. For conversion of the Cisco
PIX, ASA, and FWSM models, see Cisco conversions—new application on page 54.
The conversions in this section use the FortiConverter legacy application.
General
l The FortiGate set allowaccess command for interfaces doesn't exist on Cisco firewalls. Because FortiGate
requires this setting, FortiConverter enables all services for interfaces by default.
l The postfix "_conflict" used for services prevents a service and a service group from having the same
name. It is recommended that you rename these objects.
l On Cisco IPSec VPNs, Phase 1 (ISAKMP) supports more than two types of authentication methods.
FortiGate supports only two types: pre-share and rsa-sig. Therefore, you must assign methods for
each VPN connection. The wizard converts Cisco EZVPN configuration to FortiGate VPN policies with the
srcintf "<tunnel-interface-name>" (i.e. phase1-interface object name) and dstintf "any".
l FortiConverter doesn't support the following Cisco configuration elements:
l Wild card netmasks for access-list and object- group objects
NAT support
Before running the conversion wizard, download your existing configuration to the computer where
FortiConverter is installed. To acquire the configuration, enter the show running-config command, then
paste the output into a plain text file.
Before starting the conversion wizard, save a copy of your Cisco configuration file to the computer where
FortiConverter is installed.
Setting Description
Output Format Select the appropriate output format for your FortiGate
device.
Output OS Version FortiOS 5.6 and 6.0 have different configuration syntaxes.
Select the version that corresponds to the FortiOS version on
the target.
Discard unreferenced firewall objects Specifies whether addresses, schedules, and services that
aren’t referenced by a policy are saved and added to the
output. This option is useful if your target device has table size
limitations. View the unreferenced objects that FortiConverter
removed on the Conversion Result page.
Adjust table sizes You can customize the maximum table sizes that
FortiConverter uses when Adjust table sizes is selected. For
more information, see Adjusting table sizes on page 155.
Include input configuration lines for Specifies whether FortiConverter includes the input
each output policy configuration lines used for each FortiGate policy in the
FortiGate configuration as a policy comment.
Ignore firewall policies with all or any Specifies whether FortiConverter ignores firewall policies with
addresses when processing NAT rules an "all" or "any" address when it merges a NAT rule and a
firewall policy to create a FortiGate NAT policy.
FortiConverter creates new policies in the output configuration
based on where NAT rules to firewall policies intersect.
Because firewall policies that use "all" or "any" as the address
create many intersections, Fortinet recommends that you
ignore them.
Output Directory Select the folder where the output configuration is saved.
Setting Description
Enable Route-based IPSec Specifies whether Route-based IPSec is used for this
conversion.
NAT Merge
Dynamic NAT merge depth Specifies which types of NAT FortiConverter merges with the
Static NAT merge depth output firewall policies, or whether FortiConverter performs
NAT merge based on object names or values.
l Off –FortiConverter converts firewall policies only and
doesn't perform NAT merge for this type of NAT. This is
useful for performing a quick, initial conversion to
discover any conversion issues.
l Object Names –FortiConverter performs NAT merge
based on matching address names in firewall policies
and NAT rules.
l Object Values –FortiConverter performs NAT merge
based on matching address values in firewall policies
and NAT rules. It generates the most accurate matching
of NAT rules and policies, but in most cases, it also
generates more NAT policies.
Ensure the configuration is in a text format. FortiConverter can't use binary files.
See Saving the Cisco source configuration file on page 48
Setting Description
Cisco Route File (Optional) Select a route file that FortiConverter uses to determine the
interfaces used in output policies, in addition to routes it
detects in the source configuration. Because Cisco devices
apply access-lists to source interfaces, FortiConverter can
determine the source interfaces for output policies, but not
the destination interfaces. When you specify a route file,
FortiConverter uses the information in the file to determine
the destination interface. Otherwise, it uses the "any"
interface.
Context selection
By default, all virtual contexts are mapped to VDOMs with the same name. You can modify this default
mapping as required by renaming VDOMs and removing virtual contexts from the conversion.
Map the virtual systems in the source configuration to VDOMs in the output configuration.
You can select multiple items from the list:
l To select multiple items, use Ctrl + click.
l To select contiguous items, use Shift + click.
Setting Description
Enable VDOM Select to enable VDOMs (add config global and config vdom
syntax) to the output config.
Add Click to add a mapping item after you have deleted one.
To select the appropriate FortiGate interface, click the value in the FortiGate Interface column, and then select
a value or enter a custom interface name.
To edit other values in the Interface Mapping dialog box, including changing the interface from physical to
aggregate or unspecified, double-click a column other than FortiGate Interface.
The Interface Mapping dialog box allows you to select the following interface types:
l aggregate – Select up to four aggregate interface members. If you need to add additional members, edit
the set members interface setting in the output configuration or use the FortiOS web UI to add
interfaces after you import the configuration.
l unspecified – FortiConverter uses the interface name in the conversion, but ignores the type and other
attributes, which provides a name-to-name mapping without interface configuration.
l For example, you can create resources such as VLANs, LAGs, and inter-VDOM links on the target
FortiGate device before you import the conversion, and then reference those interfaces in the physical
interface mapping.
You can also use the Tuning page to create mappings, such as physical to VLAN, after the conversion is
complete.
To delete an interface, select the entry and click Delete. This is useful if your target FortiGate has fewer
interfaces than the source configuration.
Setting Description
Import from file Click to load a set of interface mappings from a text file.
Export current mappings Saves the current set of interface mappings to a text file.
Edit Click to edit additional properties for the selected mapping item.
This page displays the logical interfaces that FortiConverter detects in the source configuration and the
changes it makes to the associated physical interface and its naming.
You can't use this page to modify the logical interface settings.
If required, you can use the Tuning page to modify logical interfaces and zones. See Tuning the output on page
119
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
VPN Phase2
Setting Description
IKE Phase1 Select an IKE Phase1 authentication method: pre-share (preshared keys) or rsa-sig (RSA
(table signatures).
column)
Tab Description
Policies Detected & Policies Created Allows you to view and compare the number of objects that
FortiConverter detected in the source configuration and
the ones it created for the output configuration.
Messages & Warnings Allows you to review any objects that FortiConverter did
not include in the conversion. If you enabled Discard
unreferenced firewall objects on the Start Page, this
tab displays the objects that FortiConverter removed.
Setting Description
Go to Tuning Opens the tuning page. See Tuning the output on page 119
Go to Report Opens a detailed conversion report that includes a list of converted objects and
policies and displays lines from the source configuration that FortiConverter did
not convert.
For more information, see Viewing the results of your automatic conversion on page 134
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
This section covers conversion from the Cisco ASA, PIX, and FWSM models. For conversion of the Cisco IOS,
IOS XR, and Nexus models, see Cisco conversions—legacy application on page 47.
The conversions in this section uses the new FortiConverter application.
For more information on new features available with the new application, see New application features on page
157
General
l FortiGate’s set allowaccess command for interfaces doesn't exist on Cisco firewalls. Because
FortiGate requires this setting, FortiConverter enables all services for interfaces by default.
l The postfix "_conflict" used for services prevents a service and a service group from having the same
name. It is recommended that you rename these objects.
l On Cisco IPSec VPNs, Phase 1 (ISAKMP) supports more than two types of authentication methods.
FortiGate supports only two types: pre-share and rsa-sig. Therefore, you must assign methods for
each VPN connection. The wizard converts Cisco EZVPN configuration to FortiGate VPN policies with the
srcintf "<tunnel-interface-name>" (i.e. phase1-interface object name) and dstintf "any".
l FortiConverter doesn't support the following Cisco configuration elements:
l Wild card netmasks for access-list and object- group objects
NAT support
Before starting the conversion wizard:Cisco ASA, save a copy of your configuration file to the computer where
FortiConverter is installed.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output format for your FortiGate
device.
Input
Security Context Conversion Enable this option to convert configurations with multiple
security contexts.
Source Configuration Select the input file or files. This option only appears if
Security Context Conversion is disabled.
System Configuration Select the system configuration file. This file should include
interfaces and config file names for each security context.
This option only appears if Security Context Conversion is
enabled.
Context Configuration(.zip) Select the .zip file containing all the config files. The file name
for each context should match the name given in the system
configuration file. This option only appears if Security Context
Conversion is enabled.
Route File (Optional) Select a route file that FortiConverter uses to determine the
interfaces used in output policies, in addition to routes it
detects in the source configuration. Because Cisco devices
apply access-lists to source interfaces, FortiConverter can
determine the source interfaces for output policies, but not
the destination interfaces. When you specify a route file,
FortiConverter uses the information in the file to determine
the destination interface.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses, schedules, and services that
aren't referenced by a policy are saved and added to the
output.
This option can be useful if your target device has table size
limitations.
Adjust Service Table Capacity Size You can customize the maximum table sizes that
FortiConverter uses when Adjust Service Table Capacity
Size is selected. For more information, see Adjusting table
sizes on page 155
Comment Options
Include input configuration lines for Specifies whether FortiConverter includes the input
each output policy configuration lines used for each FortiGate policyin the
FortiGate configuration as a policy comment.
FortiGate address.
Ignore firewall policies with all or any Specifies whether FortiConverter ignores firewall policies with
addresses when processing NAT rules an “all" or "any” address when it merges a NAT rule and a
firewall policy to create a FortiGate NAT policy.
FortiConverter creates new policies in the output
configuration based on where NAT rules to firewall policies
intersect. Because firewall policies that use "all" or "any" as
the address create many intersections, Fortinet recommends
that you ignore them.
NAT exemption Specifies which types of NAT FortiConverter merges with the
output firewall policies, or whether FortiConverter performs
NAT merge based on object names or values.
l Object Name Match – FortiConverter performs
Dynamic NAT NAT merge based on matching address names in firewall
policies and NAT rules.
l Object Content Overlap – FortiConverter performs
NAT merge based on matching address values in firewall
Static NAT
policies and NAT rules. It generates the most accurate
matching of NAT rules and policies, but in most cases, it
also generates more NAT policies.
Dynamic ACL NAT Because it can take FortiConverter several hours to complete
a conversion that include a large number of NAT rules,
Fortinet recommends that you turn off or limit NAT merge for
your initial conversion. Then, resolve any issues with the
Static ACL NAT conversion before you run it again with NAT merge enabled.
For more information, including sample matches, see NAT
merge options on page 156.
Context selection
Click an option under Source Configuration Preview to view it. Use the search bars to filter the search.
Setting Description
Enable VDOM Select to enable VDOMs (add config global and config vdom syntax) to the
output config.
Removed vdom Select a removed VDOM and click Add to add it back into VDOM list.
Information of Source configuration file names are shown in the table as a link. Click the link to see
Configurations the content. The file won’t show if it’s too large.
Source The numbers of each type of firewall object are shown in the previous table. Click the
Configuration object number to see detailed information on each object.
Preview
l To select the appropriate FortiGate interface, click the value in the FortiGate Interface column, and then
select a value or enter a custom interface name.
l To edit other values, double-click the proper column. Use the toolbar icon on the right to show and hide
columns. You can also use the Tuning page to create mappings after the conversion is complete.
l To import a set of interface mappings from a file, click Import.
l To download the current set of interface mappings, click Export.
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
VDOM Mapping Shows how VDOMs were mapped from the source device to the new device.
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
For more details on how to fine-tune your conversion, see New application tuning on page 124.
To download your finished conversion, click Download Configurations, located in the top-right corner. Your
downloaded conversion is a .zip file.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
For more information about how FortiConverter handles NAT merges, see NAT merge options on page 156
For ASA, these examples are valid only for source configurations
created using software versions 8.2.x and earlier.
Identity NAT
Dynamic NAT with ID 0 is the identity NAT and specifies that the address doesn't need to be translated. For
example:
nat (inside) 0 172.17.3.68 255.255.255.255
Currently, because FortiConverter doesn't merge this kind of NAT, it ignores the settings when it converts the
configuration.
FortiConverter doesn't support this kind of static NAT and it ignores the settings when it converts the
configuration.
FortiConverter generates the following IP pool and NAT policy from the source configuration:
edit "ippool-172.31.242.69"
set endip 172.31.242.69
set startip 172.31.242.69
set type one-to-one
next
edit 10001
set srcintf “port1" (corresponds to the interface “inside”)
set dstintf "port2" (corresponds to the interface “outside”)
set srcaddr "h_172.17.3.120"
set dstaddr "Group_Destination"
set service "HTTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
The interface and address of the dynamic NAT matches the firewall rule, so FortiConverter inserts the IP pool
into policy 10001.
FortiConverter generates the following NAT policy from the source configuration:
edit 10002
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-172.17.40.73"
set dstaddr "Group_Destination"
set service "HTTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
next
The interface and address of the dynamic NAT matches the firewall rule. NAT is enabled for policy 10002, but
because there is no IP pool specified, the source address uses the interface IP address to perform NAT.
edit 10003
The converted configuration is similar to when the source configuration specifies dynamic NAT with a NAT IP
address.
FortiConverter converts the IP pool based on the dynamic NAT.
FortiConverter converts the static NAT rule to a VIP object and generates a NAT policy:
edit "vip-200.251.129.95"
set extip 200.251.129.95
set mappedip 172.17.60.85
set extintf port2
set nat-source-vip enable
next
edit 10004
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-172.17.60.85"
set dstaddr "Group_Destination"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
next
The NAT-enabled policy tries to match the source address to a VIP object. If it finds a match, it performs static
NAT as the VIP object specifies. Otherwise, it uses the interface IP for NAT.
by source address):
static (inside,outside) 200.251.129.95 172.17.60.85 netmask 255.255.255.255
It also has the following firewall rule:
access-list acl_outside extended permit ip any host 200.251.129.95
access-group acl_outside in interface outside
FortiConverter creates the same VIP object it does for the source address example, and the following NAT
policy, which uses the VIP object as a destination address:
edit "vip-200.251.129.95"
set extip 200.251.129.95
set mappedip 172.17.60.85
set extintf port2
set nat-source-vip enable
next
edit 10005
set srcintf "port2"
set dstintf "port1"
set srcaddr "all"
set dstaddr "vip-200.251.129.95"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
Static NAT that uses access list matches policy source address
A source configuration has the following settings, which define static NAT using an access list:
static (inside,outside) 172.31.242.69 access-list inside_nat_static
access-list inside_nat_static extended permit ip host 10.100.128.97 object-
group Group_Destination
FortiConverter converts the static NAT settings to the following VIP object and policies:
edit "vip-172.31.242.69_ip"
set extip 172.31.242.69
set mappedip 10.100.128.97
set extintf port2
set nat-source-vip enable
next
edit 10006
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-10.100.128.97"
set dstaddr "Group_Destination”
The NAT-enabled policy tries to match the source address to a VIP object. If it finds a match, it performs static
NAT as the VIP object specifies. Otherwise, it uses the interface IP for NAT.
It also has the following firewall rule, which matches the NAT in source address:
access-list acl_outside extended permit ip object-group Group_Destination host 172.31.242.69
access-group acl_outside in interface outside
FortiConverter creates the same VIP object it does for the source address example, and the following NAT
policy, which uses the VIP object as a destination address:
edit "vip-172.31.242.69_ip"
set extip 172.31.242.69
set mappedip 10.100.128.97
set extintf port2
set nat-source-vip enable
next
edit 110007
set srcintf "por2"
set dstintf "port1"
set srcaddr "Group_Destination"
set dstaddr "vip-172.31.242.69_ip"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action acceptnext edit 10007
set srcintf "port2"
set dstintf "any"
set srcaddr "Group_Destination"
set dstaddr "h-172.31.242.69"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
When a NAT rule address doesn't match a policy address exactly, FortiConverter calculates where the
addresses intersect (overlap) and uses the result as the address for the NAT policy it generates.
edit 10001
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-10.1.2.1"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
set poolname "ippool-193.205.32.10"
next
The source address of rule 10001 is the intersection of the NAT rule and original rule, which is "h-
10.1.2.1".
The firewall rule source address 10.1.0.0 255.255.0.0 contains the NAT rule address 10.1.2.0
255.255.255.0.
FortiConverter converts the source NAT and firewall rules to the following IP pool and policies:
edit "ippool-193.205.32.0-193.205.32.255"
set endip 193.205.32.10
set startip 193.205.32.10
set type one-to-one
next
edit 110002
set srcintf "port1"
set dstintf "port2"
set srcaddr "n-10.1.2.0_24"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
set poolname "ippool-193.205.32.10"
next
edit 10002
set srcintf "port1"
set dstintf "any"
set srcaddr "n-10.1.2.0_16"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
The policy 00110002 source address "n-10.1.2.0_24" is the intersection of NAT rule and firewall rule 10002.
The source address field is "any", which contains the NAT rule.
FortiConverter converts the source NAT and firewall rules to the following IP pool and policies:
edit 110003
set srcintf "port1"
set dstintf "port2"
set srcaddr "n-10.1.2.0_24"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
set poolname "ippool-193.205.32.10"
next
edit 10003
set srcintf "port1"
set dstintf "any"
set srcaddr "all"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
The policy 110003 source address "n-10.1.2.0_24" is the intersection of NAT and firewall rules.
edit 110004
set srcintf "port2"
edit 10004
set srcintf "port2"
set dstintf "any"
set srcaddr "Group_Destination"
set dstaddr "n-172.31.242.0_24"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
Static NAT overlaps address group object
A source configuration has the following settings, which define a static NAT using an access list:
static (inside,outside) 172.31.242.69 access-list inside_nat_static
access-list inside_nat_static extended permit ip host 10.100.128.97 object-
group Group_Destination
The source configuration also has a firewall rule that matches the static NAT rule and its destination is a
member of the group Group_Destination.
access-list acl_inside extended permit ip host 10.100.128.97 10.255.253.0 255.255.255.0
access-group acl_inside in interface inside
FortiConverter generates the following NAT policy, which has the destination address 10.255.253.0
255.255.255.0.
edit 10009
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-10.100.128.97"
set dstaddr "n-10.255.253.0_24"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
next
NAT exemption
NAT exemption is a dynamic policy NAT with ID 0. In most cases, you use NAT exemption to do one of the
following:
l Exempt from NAT an address that is located in a NAT rule address range.
l In environments that use NAT control to block traffic to which no NAT rule applies, to permit this type of
traffic.
Exempt an address from a NAT rule
A source configuration has the following NAT exemption configuration:
nat (inside) 0 access-list inside_nat_exemption
access-list inside_nat_exemption extended permit ip host 172.13.100.88
object-group Group_Destination
Both the NAT exemption and the dynamic NAT rule match the following firewall rule:
access-list acl_inside extended permit ip 172.13.100.0 255.255.255.0 object-group Group_
Destination
access-group acl_inside in interface inside
edit 10001
set srcintf "port1"
set dstintf "port2"
set srcaddr "n-172.13.100.0_24"
set dstaddr "Group_Destination"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
set poolname "ippool-172.80.80.8"
next
The NAT exemption configuration generates policy 110001 with no NAT behavior. The dynamic NAT
configuration generates policy 10001, which references an IP pool. Because 00110001 comes first in the
configuration, it applies to address "h-172.13.100.88" before the policy used for address "n-172.13.100.0_24"
(which applies dynamic NAT) is applied.
edit 10002
set srcintf "port1"
set dstintf "port2"
set srcaddr "n-172.14.100.0_24"
set dstaddr "Group_Destination"
set service "ALL"
set schedule "always"
set logtraffic disable
set status disable
set action accept
set comments "This policy is disabled as not allowed by NAT-Control."
next
The source interface of the firewall rule is "inside"(port1), which has security level 100. The destination interface
of this firewall rule is calculated to be "outside"(port2), which has security level 0. Since "inside" has a higher
security level than "outside", traffic from "n-172.14.100.0_24" to "Group_Destination" isn't allowed if NAT isn't
configured (even if the firewall rule allows it). Only traffic from "h-172.14.100.88" to "Group_Destination" is
allowed because a NAT exemption is configured for it. Since other traffic isn't allowed, FortiConverter disables
policy 10002, and adds a comment to show the reason.
In some cases, the final policy in an output configuration is one that FortiConverter generates from VIP objects
that aren't used as a destination address in at least one policy. For example:
edit 001
set srcintf "port1"
set dstintf "any"
set srcaddr "all"
set dstaddr "vip- 172.21.84.24" " vip- 172.21.84.25" " vip- 172.21.84.26"
set service "ALL"
set schedule "always"
set logtraffic all
set status enable
set action deny
set comments "This policy is auto-generated by FortiConverter to activate static-NAT
VIPs that aren't referenced in other policies."
next
This type of policy enables the source static NAT mapping by capturing all VIP objects that other policies don't
reference.
In some conversions, FortiConverter generates more than one of this kind of policy – one for each external
interface that is referenced by an unreferenced VIP object.
Service objects
Junos OS service objects support MS-RPS and SUN-RPC, where program-numbers (SUN) and UUID (MS) are
used instead of ports.
FortiOS supports this configuration using Application Control with an application override.
edit 10012
set srcintf "trust"
NAT support
For SRX Series gateways, supports the FortiConverter conversion of the following NAT types:
l Destination NAT
l Source NAT
l Static NAT
In ScreenOS, source NAT is implicitly enabled when: the destination zone is in the untrust-vr, the source zone
is trust zone and the destination zone is untrust zone, and both belong to the trust-vr.
Before starting the conversion wizard, save a copy of your Juniper configuration file to the computer where
FortiConverter is installed.
To get the configuration, for both ScreenOS and Junos, in the web UI, go to Configuration> Update
> ConfigFile.
Alternatively, for ScreenOS only, you can use the get conf CLI command and paste the output into a plain
text file.
For Junos, FortiConverter requires the structural configuration file as a valid input. For example:
show configuration
## Last commit: 2013-06-05 11:28:53 CST by master
version 10.2S7;
groups {
node0 {
system {
host-name SRX3400-Active;
backup-router 172.16.1.254 destination 0.0.0.0/0;
}
interfaces {
fxp0 {
unit 0 {
family inet {
address 172.16.1.1/24;
}
}
}
}
}
............
............
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS5.6 and 6.0 have different configuration syntaxes. Select the
version that corresponds to the FortiOS version on the target.
Input
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses, schedules, and services that aren't
referenced by a policy are saved and added to the output. This
option can be useful if your target device has table size limitations.
You can view the unreferenced objects that FortiConverter removed
on the Conversion Result page.
Automatically generate policy Specifies whether FortiConverter generates policy interfaces using
interfaces route information.
Adjust Service Table Capacity Size You can customize the maximum table sizes that FortiConverter
uses when Adjust table sizes is selected. For more information, see
Adjusting table sizes on page 155
Route-based IPSec Specifies whether Route-based IPSec is used for this conversion.
Comment Options
Include input configuration lines for Specifies whether FortiConverter includes the input configuration
each output policy lines used for each FortiGate policy in the FortiGate configuration
as a policy comment.
Address Comment Specifies whether FortiConverter copies the address comment from
source configuration to the converted FortiGate address.
Service Comment Specifies whether FortiConverter copies the service comment from
the source configuration to converted FortiGate service.
Rule comment Specifies whether FortiConverter copies the security rule comment
from the source configuration to converted FortiGate service.
Ignore firewall policies with all or any Specifies whether FortiConverter ignores firewall policies with an
addresses when processing NAT "all" or "any" address when it merges a NAT rule and a firewall policy
rules to create a FortiGate NAT policy.
FortiConverter creates new policies in the output configuration
based on where NAT rules to firewall policies intersect. Because
firewall policies that use "all" or "any" as the address create many
intersections, Fortinet recommends that you ignore them.
Enable Central NAT merge(SRX only) Specifies whether FortiConverter converts NATs to FortiGate
central NATs instead of policy-based NATs.
SourceNAT Specifies which types of NAT FortiConverter merges with the output
firewall policies, or whether FortiConverter performs NAT merge
based on object names or values.
l Off – FortiConverter converts firewall policies only and doesn't
perform NAT merge for this type of NAT. This is useful for
performing a quick, initial conversion to discover any conversion
issues.
Static NAT l Object Names – FortiConverter performs NAT merge based on
matching address names in firewall policies and NAT rules.
l Object Values – FortiConverter performs NAT merge based on
matching address values in firewall policies and NAT rules. It
generates the most accurate matching of NAT rules and
policies, but in most cases, it also generates more NAT
policies.
Destination NAT Because it can take FortiConverter several hours to complete a
conversion that include a large number of NAT rules, Fortinet
recommends that you turn off or limit NAT merge for your initial
conversion. Then, resolve any issues with the conversion before you
run it again with NAT merge enabled. For more information,
including example matches, see NAT merge options on page 156.
Map the logical or virtual systems in the source configuration to VDOMs in the output configuration.
By default, all logical or virtual systems are mapped to VDOMs with the same name. You can modify this
default mapping as required by renaming VDOMs and removing logical or virtual systems from the conversion.
Setting Description
Enable VDOM Select to enable VDOMs (add config global and config vdom syntax) to the
output config.
Removed vdom Select a removed VDOM and click Add to add it back into VDOM list.
Information of Source configuration file names are shown in the table as a link. Click the link to see
Configurations the content. The file won’t show if it’s too large.
Source The numbers of each type of firewall object are shown in the previous table. Click the
Configuration object number to see detailed information on each object.
Preview
l To select the appropriate FortiGate interface, click the value in the FortiGate Interface column, and then
select a value or enter a custom interface name.
l To edit other values, double-click the proper column. Use the toolbar icon on the right to show and hide
columns. You can also use the Tuning page to create mappings after the conversion is complete.
l To import a set of interface mappings from a file, click Import.
l To download the current set of interface mappings, click Export.
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
VDOM Mapping Shows how VDMS were mapped from the source device to the new device.
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
McAfee conversion
StoneSoft differences
VPNs
Firewall clusters
Before starting the conversion wizard:McAfee, save a copy of your configuration file to the computer where
FortiConverter is installed.
The following is for McAfee Firewall Enterprise 7.0.1. The config is binary therefore the output of the
following commands must be saved to a text file for FortiConverter.
l Interface and Zone (cf interface|zone|zonegroup query)
l Address object and address group object (cf domain|ipaddr|iprange|subnet|netgroup
query)
l Service object and service group object (cf service|servicegroup query)
l Admin users and firewall users & user groups (cf adminuser query, cf udb query, cf
usergroup query)
l Static routes (cf static query)
l Firewall Policy (cf policy query)
Setting Description
Include input configuration lines for each Specifies whether FortiConverter includes the input
output policy configuration lines used for each FortiGate policyin
the FortiGate configuration as a policy comment.
Adjust table sizes You can customize the maximum table sizes that
FortiMonitor uses when Adjust table sizes is
selected. For more information, see Adjusting table
sizes on page 155.
Ensure the configuration is in a text format. FortiConverter can't use binary files.
Setting Description
VSYS selection
Map the virtual systems in the source configuration to VDOMs in the output configuration.
You can select multiple items from the list:
l To select multiple items, use Ctrl + click.
l To select contiguous items, use Shift + click.
Setting Description
Enable VDOM Select to enable VDOMs (add config global and config vdom
syntax) to the output config.
Add Click to add a mapping item after you have deleted one.
Setting Description
Import from file Click to load a set of interface mappings from a text file.
Export current mappings Saves the current set of interface mappings to a text file.
Edit Click to edit additional properties for the selected mapping item.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Policies Detected & Policies Created Allows you to view and compare the number of objects that
detected in the source configuration and the ones it created
for the output configuration.
Messages & Warnings Allows you to review any objects that FortiConverter did not
include in the conversion. If you enabled Discard
unreferenced firewall objects on the Start Page, this tab
displays the objects that removed.
Setting Description
Go to Tuning Opens the tuning page. See Tuning the output on page 119
Go to Report Opens a detailed conversion report that includes a list of converted objects and
policies and displays lines from the source configuration that FortiConverter did
not convert.
For more information, see Viewing the results of your automatic conversion on page 134
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Conversion support
Before starting the conversion wizard:Palo Alto, save a copy of your configuration file to the computer where
FortiConverter is installed.
In the web UI, go to Device > Setup > Operations, then click Export named configuration snapshot.
If the configuration is managed using Panorama shared policy configuration, you should disable shared
configuration before exporting.
3. Do one of the following to import the configuration from Panorama into the firewall local configuration:
l If you clicked Disable Panorama Policy and Object, in the edit dialog box, select Import
Panorama Policy and Objects before disabling and then click OK.
l If you clicked Disable Device and Network Template, select Import Device and Network
4. Log in to the device that was removed from Panorama and go to Device > Setup > Operations > Save
> Save named configuration snapshot.
5. Enter a name that helps to identify the configuration. In this example, it is pan2fg.
6. Go to Device > Setup > Operations > Export > Export the named configuration snapshot.
7. Click OK.
Select the exported file on the Source Configuration page of the Palo Alto conversion wizard.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet
device.
Input
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses and services that aren't
referenced by a policy are saved and added to the
output. This option can be useful if your target device
has table size limitations. You can view the
unreferenced objects that FortiConverter removed on
the Conversion Result page.
Adjust Service Table Capacity Size You can customize the maximum table sizes that
FortiConverter uses when Adjust table sizes is selected.
For more information, see Adjusting table sizes on page
155.
Comment Options
Include input configuration lines for each Specifies whether FortiConverter includes the input
output policy configuration lines used for each FortiGate policy in the
FortiGate configuration as a policy comment.
Ignore firewall policies with all or any Specifies whether FortiConverter ignores firewall
addresses when processing NAT rules policies with an "all" or "any" address when it merges a
NAT rule and a firewall policy to create a FortiGate NAT
policy. FortiConverter creates new policies in the output
configuration based on where NAT rules to firewall
policies intersect. Because firewall policies that use "all"
or "any" as the address create many intersections,
Fortinet recommends that you ignore them.
Source Preview
Setting Description
Source Configuration Preview The numbers of each type of firewall object are
shown in Palo Alto Start options on page 88.
Click the object number to see detailed
information on each object.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
"action" field
Supported keyword
alert
Unsupported keyword
log
"protocol" field
Supported keyword
tcp/udp/ip/icmp/HTTP/FTP/POP3/SMTP/TELNET/SSH/IMAP/SNMP/RADIUS
Supported keyword
Either "any" or "$xxxx" variable
Supported keywords
threshold threshold:type limit, track by_src, count 1, --track SRC_IP; --rate 1,60;
seconds 60;
msg msg:"Bad Stuff detected within field"; et comment "Bad Stuff detected within
field"
detection_ detection_filter:track by_src, count 30, seconds --rate 30,60; --track SRC_IP;
filter 60;
Unsupported keywords:
replace
stream_reassemble
stream_size
cvs
ftpbounce
asn1
fragbits
fragoffset
base64_decode
base64_data
sip_method
sip_stat_code
gtp_type
gtp_info
gtp_version
ssl_state
reference
classtype
priority
gid
fast_pattern
logto
session
resp
react
tag
activites
activites_by
http_encode
count
dce_iface
dce_opnum
dce_stub_data
metadata
protected_content
hash
length
modbus_func
dnp3_ind
Setting Description
Profile
Input
Snort Variable Definition Select the file that defines IPS and port files. Undefined variables
(optional) will be converted into "any".
Conversion Options
Add extra backslash "\" for FortiConverter adds an extra back slash for special characters in the
special characters conversion.
Convert annotated rules as status Select to disable rules that are annotated in the source
disable configuration.
Convert Snort rule's "msg" field Preserve "msg" fields as comment in rules.
to comment
Source Preview
Setting Description
IP Variables The definitions of IP variables parsed from the variable definition file.
Port Variables The definitions of port variables parsed from the variable definition file.
Snort IPS Signature IPS signatures parsed from the input Snort rule files.
Tab Description
Snort IPS Signature Shows variable definitions and Snort IPS signature contents.
SonicWall differences
Special characters
FortiGate reserves '#' (hash sign), '(', and ')' (open and close curved brackets) as special characters. You can't
use them in the configuration unless an escape sequence precedes them. FortiConverter replaces these
characters with the characters: '*' (star), '[' and ']' (open and close square brackets).
Examples:
l The address book "SNWL #1" becomes "SNWL *1".
l The service book "Citrix TCP (Session Reliability)" becomes "Citrix TCP [Session Reliability]".
l On FortiGate address objects don't support MAC addresses. Therefore, the wizard doesn't migrate
SonicWall MAC addresses.
l FortiConverter generates two extra address book entries: "Any" and "_Address_Null".
l "Any" is added because it is a default address book in SonicWall.
l FortiConverter generates "_Address_Null" because FortiGate address groups don't allow a group without
any members. Only empty address groups can refer to "_Address_Null".
FortiConverter doesn't migrate SonicWall service objects that are predefined on FortiGate. For example, HTTP
port 80 and HTTPS port 443.
Schedule configuration
l A SonicWall schedule group can contain only one "one-time" schedule and multiple "recur" schedules. The
"one-time" schedule is an implicit object that you can embed in the schedule group. Because FortiGate
defines each schedule group explicitly, FortiConverter automatically generates "one-time" schedules for
the SonicWall implicit schedules.
l FortiGate time schedule configuration doesn't support "24:00" (equal to the next day’s 00:00). It uses
"00:00" instead. When FortiConverter converts a SonicWall "recur" time schedule such as "M 00:00 to
24:00", it sets the end time to "00:00".
l Because FortiConverter can't parse the local user’s password string, it sets all passwords to "123456".
l Unlike FortiConverter, SonicWall allows you to nest user groups.
For example, in SonicWall, usergroup1 can be a member of usergroup1. FortiConverter removes any nested
configurations.
Route configuration
l FortiConverter doesn't convert automatically generated routes like connected route and host route.
Before starting the conversion wizard:SonicWall, save a copy of your configuration file to the computer where
FortiConverter is installed.
In the web UI, go to System > Settings > Export Settings to export the settings file.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS 5.6 and 6.0 have different configuration syntaxes. Select
the version that corresponds to the FortiOS version on the target.
Input
Conversion Options
Discard unreferenced firewall Specifies whether addresses, schedules, and services that aren't
objects referenced by a policy are saved and added to the output.
This option can be useful if your target device has table size
limitations. You can view the unreferenced objects that
FortiConverter removed on the Conversion Result page.
Adjust Service Table Capacity Size You can customize the maximum table sizes that FortiConverter
uses when Adjust table sizes is selected. For more information, see
Adjusting table sizes on page 155.
Comment Options
Include input configuration lines Specifics whether FortiConverter uses SW_RULE_ID as policy
for each output policy comment for each FortiGate policy or the original comment from
rules in SonicWall configuration.
Ignore firewall policies with all or Specifies whether FortiConverter ignores firewall policies with an
any addresses "all" or "any" address when it merges a NAT rule and a firewall policy
to create a FortiGate NAT policy. FortiConverter creates new
policies in the output configuration based on where NAT rules to
firewall policies intersect. Because firewall policies that use "all" or
"any" as the address create many intersections, Fortinet
recommends that you ignore them.
Enable Central NAT merge Specifies whether FortiConverter converts NATs to FortiGate
central NATs instead of policy-based NATs
Identical NAT Specifies which types of NAT FortiConverter merges with the
Source NAT output firewall policies, or whether FortiConverter performs NAT
Destination NAT merge based on object names or values.
l Off -FortiConverter converts firewall policies only and doesn't
Double NAT
perform NAT merge for this type of NAT. This is useful for
performing a quick, initial conversion to discover any
conversion issues.
l Object Names–FortiConverter performs NAT merge based on
matching address names in firewall policies and NAT rules.
l Object Values–FortiConverter performs NAT merge based on
matching address values in firewall policies and NAT rules. It
generates the most accurate matching of NAT rules and
policies, but in most cases, it also generates more NAT
policies.
Source Preview
Setting Description
Source Configuration Preview The number of each type of firewall object are
shown in the previous table. Click the object
number to see detailed information about each
object.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
VDOM Mapping Shows how VDMS were mapped from the source device to the new device.
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Conversion support
Before starting the conversion wizard, save a copy of your Sophos configuration file to the computer where
FortiConverter is installed.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS 5.6 and 6.0 have different configuration syntaxes. Select
the version that corresponds to the FortiOS version on the target.
Input
Conversion Options
Discard unreferenced firewall Specifies whether addresses and services that aren't referenced
objects by a policy are saved and added to the output. This option can be
useful if your target device has table size limitations. You can
view the unreferenced objects that FortiConverter removed on
the Conversion Result page.
Adjust Service Table Capacity Size You can customize the maximum table sizes that FortiConverter
uses when Adjust table sizes is selected. For more information,
see Adjusting table sizes on page 155.
Comment Options
Service Group Comment Specifies whether FortiConverter copies the service group
comment from the source configuration to the FortiGate service
group.
Source preview
Setting Description
Information of Configurations Source configuration file names are shown in the table as a
link. Click the link to see the content. The file won’t show if
it’s too large.
Source Configuration Preview The number of each type of firewall object are shown in
Sophos Start options on page 104 table. Click the object
number to see detailed information about each object.
Setting Description
VDOM Shows the virtual domains used in the conversion. ("root" by default)
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces are mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Source interfaces and destination interfaces are set to "any" after conversion.
Schedules are set to "always" in all policies after conversion.
Action Set
If "Block" or "Drop" appears in an action set, the FortiGate policy strAction is set to "deny". Otherwise,
the policy is set to "accept".
If "rsyslog" is found in an action set, the FortiGate policy strLogTraffic is set to "enable". Otherwise, it
is disabled.
Ignored fields
Before starting the conversion wizard:Tipping Point, save a copy of your configuration file to the computer
where FortiConverter is installed.
To download policies
Setting Description
Discard unreferenced firewall objects Specifies whether addresses, schedules, and services
that are not referenced by a policy are saved and
added to the output. This option can be useful if your
target device has table size limitations. You can view
the unreferenced objects that FortiConverter removed
on the Conversion Result page.
Include input configuration lines for each Specifies whether FortiConverter includes the input
output policy configuration lines used for each FortiGate policy in
the FortiGate configuration as a policy comment.
Adjust table sizes You can customize the maximum table sizes that
FortiMonitor uses when Adjust table sizes is
selected. For more information, see Adjusting table
sizes on page 155.
Ensure the configuration is in a text format. FortiConverter can't use binary files.
See Saving the Tipping Point source configuration file on page 107.
Setting Description
VSYS selection
Map the virtual systems in the source configuration to VDOMs in the output configuration.
You can select multiple items from the list:
l To select multiple items, use Ctrl + click.
l To select contiguous items, use Shift + click.
Setting Description
Enable VDOM Select to enable VDOMs (add config global and config vdom
Add Click to add a mapping item after you have deleted one.
To select the appropriate FortiGate interface, click the value in the FortiGate Interface column, and then select
a value or enter a custom interface name.
To edit other values in the Interface Mapping dialog box, including changing the interface from physical to
aggregate or unspecified, double-click a column other than FortiGate Interface.
The Interface Mapping dialog box allows you to select the following interface types:
l aggregate – Select up to four aggregate interface members. If you need to add additional members, edit
the set members interface setting in the output configuration or use the FortiOS web UI to add
interfaces after you import the configuration.
l unspecified – FortiConverter uses the interface name in the conversion, but ignores the type and other
attributes, which provides a name-to-name mapping without interface configuration.
l For example, you can create resources such as VLANs, LAGs, and inter-VDOM links on the target
FortiGate device before you import the conversion, and then reference those interfaces in the physical
interface mapping.
You can also use the Tuning page to create mappings, such as physical to VLAN, after the conversion is
complete.
To delete an interface, select the entry and click Delete. This is useful if your target FortiGate has fewer
interfaces than the source configuration.
Setting Description
Import from file Click to load a set of interface mappings from a text file.
Export current mappings Saves the current set of interface mappings to a text file.
Edit Click to edit additional properties for the selected mapping item.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Setting Description
Tab Description
Policies Detected & Policies Created Allows you to view and compare the number of objects
that FortiConverter detected in the source configuration
and the ones it created for the output configuration.
Messages & Warnings Allows you to review any objects that FortiConverter did
not include in the conversion.
Setting Description
Go to Tuning Opens the tuning page. See Tuning the output on page 119
Go to Report Opens a detailed conversion report that includes a list of converted objects and
policies and displays lines from the source configuration that FortiConverter did
not convert.
For more information, see Viewing the results of your automatic conversion on page 134
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Conversion support
Configuration notes
Vyatta does not provide outgoing interface in static route configuration. FortiConverter uses the next-hop
address and the network of each interface to determine the outgoing interface. However, since VPN
conversions are not supported, and tunnel interfaces are not converted, routes to tunnel interfaces cannot be
calculated. The interface fields of those kind of routes are empty in the output field and require you to fill them
manually before the config is imported.
Before starting the conversion wizard, save a copy of your Vyatta configuration file to the computer where
FortiConverter is installed.
1. Use an SSH terminal and connect to the device.
2. Input command "set terminal length 0".
3. Input "show configuration all" and save the output configuration.
Please note that FortiConverter requires the structural configuration file as a valid input. For example:
firewall {
all-ping enable
broadcast-ping disable
config-trap disable
group {
address-group ADDR_GRP1 {
address 10.58.14.15
address 10.58.14.16
address 10.58.14.17
}
address-group ADDR_GRP2 {
address 10.58.186.41
address 10.58.186.52
}
............
............
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Description Enter a description of the configuration.
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS 5.6 and 6.0 have different configuration syntaxes.
Select the version that corresponds to the FortiOS version on
the target.
Input
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses and services that aren't
referenced by a policy are saved and added to the output. This
Adjust Service Table Capacity Size You can customize the maximum table sizes that
FortiConverter uses when Adjust table sizes is selected. For
more information, see Adjusting table sizes on page 155.
Comment Options
Include input configuration lines for Specifies whether FortiConverter includes the input
each output policy configuration lines used for each FortiGate policy in the
FortiGate configuration as a policy comment.
Source preview
Setting Description
Information of Configurations Source configuration file names are shown in the table as links. Click
the link to see file contents. Files that are too large are not shown.
Source Configuration Preview The number of each type of firewall object are shown in the previous
table. Click the object number to see detailed information about each
object.
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output by using the static routes it detects in the source
configuration, and any routing information you provide.
Double-click item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
Configuration notes
Configurations that might block device-accessing might be removed by FortiConverter, you might need to
configure these settings manually after the configuration restoration. The settings you should check on are:
l The administrator password
l The IP of interface “mgmt”
l The “accprofile” setting of administrators
l The “trusthost” setting of administrators
For FortiGate conversion, the default maintainer account settings might be overwritten after the configuration
restoration. For example, if the old FortiGate set the default maintainer access to disabled, you should
temporarily enable this maintainer access before the restoration.
config system global
set admin-maintainer enable
end
Setting Description
Profile
Input
Target Device Default FortiConverter needs the default configuration of the target device
Configuration to extract interface or other information of the target device. The
default configuration should contain the same VDOM as those in the
source config. So if the source device contains multiple VDOMs,
users should also create VDOMs with the same name on the target
device before back up the default configuration.
Config information
Setting Description
Information of Configurations The device model name and the firmware build information of source
and target devices are shown in this table. Configuration file names are
shown in the table as a link. Click the link to see the content. The file
won’t show if it’s too large.
Detected Messages Some warning or error message detected in the parser would be shown
in this table. If error message occurs, users cannot go further to the next
step. Users should fix the problem in the config file and restart a new
conversion.
Source Configuration Preview The numbers of each type of object are shown in the previous table.
Setting Description
Source Interface Shows each interface name on the source FortiGate device.
FortiGate Interface Shows the corresponding FortiGate interface. Click to assign a port for each
interface.
Setting Description
Although FortiConverter attempts to automatically convert as much of the source configuration as possible, in
some cases, your input is required to complete the conversion. The Tuning page allows you to tune the results
for your environment. To access the Tuning page, on the Conversion Result page, click Go to Tuning.
When you navigate to the Tuning page for the first time, FortiConverter prompts you to save the current output
(the initial conversion). This backed-up conversion allows you to revert or refer to the initial conversion later, if
needed.
If you are running the trial license, you can use the Tuning page to review your conversion, which is helpful if
you are evaluating FortiConverter.
To quickly view a tuning "snapshot" (a configuration that you exported from the tuning
page earlier), open the wizard for the appropriate vendor, click Tuning on any page,
and then navigate to the snapshot file to import it.
You can add, modify, or delete firewall policies and objects, as well as interfaces and zones. FortiConverter
immediately applies your modifications.
Toolbar options
Item Description
Back Click to return to the Conversion Result page. FortiConverter preserves any
changes but doesn't save them in an output file. (Use Go to Report to save
changes to an output file.)
Backup Click to save the current configuration, including any modifications, to a text
file (a tuning "snapshot").
Export Policies Click to export policies as a comma-separated values (CSV) format file. This
can be helpful if you want to work in a spreadsheet application, share the
conversion with a team of reviewers, or import bulk changes.
Import Policies Click to import policies from a comma-separated values (CSV) format file.
FortiConverter replaces the current policies with the ones in the CSV file and
VDOM Select the VDOM in the output to display in the Tuning page.
Go to Output Click to view the files for the current configuration, including any
modifications.
The Policy Tuning tab allows you to review output policies and converted objects.
To review output policies, in the Policy navigation pane, select a package. The converted policies in the
package are displayed.
1. Right-click the policy where you want the numbering to restart, and then click ConfigPolicyIndex.
2. For Set Policy Index Start With, enter the initial policy number to use, and then click OK.
Item Description
Schedule Select schedule object.– select to enable NAT, and then select
to use Interface or IPPool Comments – modify the comments
for the policy Label – modify the label of the policy
Enable NAT Select to enable NAT, and then do one of the following:
l Select User Interface.
l Select Use IPPool and specify a pool.
3. To add a new object, scroll to the bottom of the list, click in an empty row, and then complete the fields as
required.
4. The PolicyRef column displays the number of policies that reference that firewall object.
Click the PolicyRef. column for the entry to display the specific policies in the Policy table above.
You can't delete objects that are referenced by any other part of the configuration.
You can filter every column that has the [filter mark] by a given option or custom expression.
Click the policy or object you want to delete to select it, and then press the Delete key on your keyboard.
You can't delete items that are used by another policy or group.
To reorder rows
To reorder rows, click the policy number and drag the row to the new position.
The Conversion Log tab displays warnings that FortiConverter generated during the conversion process.
Although FortiConverter automatically converts as much of the source configuration as possible, in some
cases, your input is required to complete the conversion. The Tuning page automatically opens when the
conversion is complete. (Currently this feature is available only in the conversion of 3rd party
vendors.)
From the Tuning page, you can:
l Manage your firewall objects
l Copy an object to another VDOM
l Copy an object’s CLI configurations
l Output an unreferenced object
l Shorten or change object names.
The Tuning page has several features enabling you to view, add, edit, and delete your various firewall objects.
A list of object categories loads in the menu bar, and a table of interface is displayed.
2. Select the object category you want to review.
A table containing information about that object category loads.
In the address, address group, service, and service group tables, some object rows are highlighted in
yellow. Highlighted rows indicate objects that were automatically created by the FortiConverter tool during
the conversion process. You cannot find the definition for these kinds of objects from the original inputted
configuration files.
To add an object
At the bottom of every object category table is a button that enables you to add a new object. The button's
name is dependent on which object category you want to add to. The directions below outline the steps to add
a new address.
1. At the bottom of the object table, click New Address.
A window loads, enabling you input information about the object you want to add.
2. Complete the fields as needed.
3. Click OK to save your changes.
To delete an object
1. In the VDOM information section, toggle the Enable VDOM wrapper switch.
Note: In order to enable the VDOM wrapper, the output requires at least two VDOMs. If the original
configuration only has one VDOM, you can manually add a new VDOM.
2. From the table of objects, select the object(s) you want to copy to another VDOM.
3. Right-click to view the context menu.
1. From the list of objects, select the object that you want to copy the CLI from.
2. Right-click to view the context menu.
You can output unreferenced objects from the address, address group, service, and service group categories.
To do so, you must move unreferenced objects from the unreferenced table to the converted objects table.
If you enable the “Discard unreferenced objects” option in the start page, FortiConverter scans each object and
checks whether it is referenced by policies, central NAT rules or other objects.
Rename an object
FortiOS sets different maximum characters length for object names. Object names that exceed the character
limit are known as overlengthed, and must be renamed before they can be uploaded to a FortiGate device. The
tuning summary table displays overlengthed objects numbers in red.
There are two ways see which objects are marked as overlengthed. You can:
1. Click the red number from Overlengthed column, or
2. Go to the table of the object, and click the button Name Overlength.
Overlengthed object names are identified with a red background color.
Once you located the overlengthed objects, there are two ways to rename the object: (1) manually, and (2)
automatically.
FortiConverter can use REST API provided by FortiOS to import the converted objects into your FortiGate.
Currently this feature is available only in the conversion of 3rd party vendors.
Before importing the objects into a device, the connection information of the device should be saved in
FortiConverter at first:
1. Go to the FortiConverter dashboard and click the tab Device in the left side.
4. Click Test Connection to see if the device can be connected and logged in successfully. Click OK to save
the device information.
Start Installation
1. In the tuning page of the conversion, click Install Config at the top-right corner. This button would exist
only when there is at least one connectable device saved in FortiConverter.
2. Select the device to be imported and click Connect.
3. Click One-Click Install to start importing.
4. View the installation logs and wait for the importing to be completed.
5. To interrupt the installation, click Stop Importing to stop the installation.
6. Download Logs can be clicked to download the log file of importing. The CLI of failed objects would be
printed in the file, and user can copy and paste the CLI into the terminal of the device to see what error
occurs.
When the REST API import is finished, the statistic of imported objects would be shown in the table of
conversion summary page.
By clicking the number in the Import Failed column, the failed objects would be listed in a table. In the table of
each kind of object, the import result would be shown in the right column.
Legacy application
The Conversion Result page displays general conversion information, statistics on of the number of converted
objects and policies, and a log of items that need further attention.
To see a summary of the conversion, click Go to Report.
An HTML page generated by FortiConverter is displayed in your web browser.
After your review and any tuning tasks are complete, click Go to Output to access the final, converted
configuration files.
New application
The Conversion Summary page displays a summary of the conversion, including VDOM mapping and Interface
mapping, as well as a device summary.
l To fine-tune the conversion, click FortiGate Configuration from the menu on the left, then select an
option.
l To download the final, converted configuration files, click Download Configurations, located on the
right.
l To download any configurations, from the home page, click Download.
Error messages
If an error occurs, FortiConverter inserts error messages and warnings into the conversion output file config-
all.txt.
These warnings aren't inserted in any configuration branch files.
Undefined objects
Interface
# Warning: Please input vlan interface
This warning means the physical interface of a vlan interface isn't specified.
Zone
Service
Service group
User
VIP
VPN phase1
VPN phase2
Policy
# set utm-status enable
# set application-list NAME1 NAME2
# Application-list support only one item, please recheck config file.
This error means there are multiple items in the application list. There should be only one item in the
application list. If there are multiple items given in the source configuration, reset the items.
# Warning: Removed self traffic object <NAME> from address list
# Warning: Comment out self traffic policy - object name <NAME>
Check Point policies may contain "self traffic" policies, but those policies aren't needed in FortiOS.
# Warning: Comment out default drop all policy
There may be a "drop all" policy in the end of the policy list for some vendors. But FortiOS has its own "drop all"
policy by default, so the one in source configuration should be commented out.
Route static
# Warning: Please input field <device>
FortiOS requires the "device" (interface) route field.
Snmp sysinfo
# Warning: Community <NAME> has <NUMBER> hosts, beyond the limitation <NUMBER>.
The number of hosts in a community exceeds the maximum number supported by the FortiGate selected
model.
Other warnings
Name length
Route BGP
Route OSPF
CLI debugging
To make troubleshooting easier when there are import errors, before you import sections, enable CLI
debugging.
By default, CLI debugging is level 3. This is the level to use under normal conditions.
You can use this command to view the current debug level:
# diagnose debug info
For the configuration importing process, the appropriate debug level is 8. Use this command to change the
debug level:
When the import process is complete, use this command to return the debug level to the default (3):
diag debug reset
Importing process
Import the sections of the conversion output systematically. For each section you import, check for import
failures in the web UI Script Execution History. Use CLI debugging to diagnose and fix any errors. When the
import is successful, continue with to next section of the configuration.
When you save this configuration as a file and import it, the Failure status indicator shows:
The following CLI output captures detailed information about the error:
0: config firewall address
0: edit "Test1"
0: set subnet 1.1.1.1 255.255.255.255
0: next
0: edit "Test2"
0: set subnet 1.1.1.2 255.255.255.255
0: next
0: end
0: config firewall addrgrp
0: edit "Test-Addresses"
-3: set member "Test1" "Test2" "Test3"
1: next
0: endwrite config file success, prepare to save in flash
The error code -3 indicates that FortiGate did not find the object and the return code 1 indicates that an error
occurred.
Notice that FortiGate creates the address objects Test1 and Test2. The failure status only relates to the
address group.
When you fix the script by adding the missing Test3 object and import it again, the Success status indicator
shows.
When the configuration is fixed, all return codes in the CLI debugging are 0, indicating no errors.
0: config firewall address
0: edit "Test1"
0: set subnet 1.1.1.1 255.255.255.255
0: next
0: edit "Test2"
0: set subnet 1.1.1.2 255.255.255.255
0: next
0: edit "Test3"
0: set subnet 1.1.1.3 255.255.255.255
0: next
0: end
0: config firewall addrgrp
0: edit "Test-Addresses"
0: set member "Test1" "Test2" "Test3"
0: next
0: endwrite config file success, prepare to save in flash
The example in the procedures uses FortiManager 5.2 and global policies and objects. The procedures are
similar for environments that don't use the global feature.
To configure FortiManager
On FortiManager, enable the ADOM feature and create an ADOM for each source domain that you want to
migrate.Ensure that all the ADOMs (including the global ADOM) use the same version of FortiOS.
Running scripts
With the exception of config-system-session-helper, you run all scripts using the Policy Package,
ADOM Database script target.
You run the config-system-session-helper script on the device database to set device-level settings.
If the global folder contains a config-system-session-helper script, review its contents. In most
cases, it isn't required because the global policies and objects configuration doesn't contain devices. You can
add any configuration in this script to session helper scripts for each domain that uses the global objects.
However, in most cases, the domain-level script also contains these settings.
2. To display the scripts in the Global Objects menu, on the Policy & Objects tab, go to Tools > Display
Options > All On.
3. Go to Global Objects > Advanced > Script.
9. When you have imported all the objects, use the same procedures to import and run the policy scripts
using the firewall policy configuration files located in the Global\FMGR\Policy folder, which contains a
folder for each policy package. don't import the config-all file.
10. When the policy package is correct, assign it to your ADOM. By default, FortiManager assigns the selected
policy package to all policy packages in the ADOM.
11. To complete the ADOM assignment, on the Assignment tab, click Assign.
12. When the process of assigning the polices and objects is complete, on the Policies & Objects tab, select
the ADOM to review the policies.
13. To import the domain-level polices and objects into your ADOM, on the Device Manager tab, select the
ADOM, and then go to Scripts > Script.
14. Repeat the procedure for importing the object and policy scripts with the contents of the <domain_
name>\FMGR\FWObject and <domain_name>\FMGR\Policy folders. Import the objects first, but
don't import the config-system-session-helpers script. For the script target, select Policy
Package, ADOM Database.
Ensure you check for error messages that FortiConverter inserted as comments and make any required
corrections. For more information, see To troubleshoot script import and execution errors on page 147.
15. Run each imported object script. For Run script on, select Policy Package, ADOM Database. Correct
any errors that prevent the script from executing. For more information, see To troubleshoot script import
and execution errors on page 147.
If there are many address objects, you import several scripts because the address file is indexed to keep
the files at a manageable size.
16. Before you run the policy scripts, create new policy packages that correspond to each policy package folder
in <domain_name>\FMGR\Policy. On the Policy & Objects tab, right-click on the default policy
package and choose Policy Package Create New.
Clear the Clone Policy Package option.
Because global polices and objects were assigned to all policy packages in this ADOM, they are
automatically part of each new policy package. The next import task adds the domain-level policies.
17. On the Device Manager tab, run each imported policy script. For Run script on, select Policy Package,
ADOM Database. When you are prompted for a policy package, select the name of the appropriate
package, which you created earlier.
Correct any errors that prevent the script from executing. For more information, see To troubleshoot script
import and execution errors on page 147.
To troubleshoot script import and execution errors
FortiConverter inserts any error messages in output scripts as comments.
In some cases, the script can't run unless you edit it to correct the errors. Double-click the name of the script in
the list of scripts to edit it.
In the following example, the address objects that generate the errors are assigned using the global objects
and can be ignored.
If an error occurs during script execution, go to System Settings > Task Monitor to view the error message
and identify the error. Look for "Failed to commit to DB" in the task information.
Unlike a FortiGate import, which creates an object up to the point of failure, FortiManager creates no objects or
policies if the script execution fails.
If you identify the cause, correct it in your script.
For example, the following error was generated by a firewall policy that contained both IPv4 and IPv6 objects,
which FortiOS doesn't support and FortiConverter did not correct.
To resolve the error, determine which object precedes the error, locate it in the script, and correct any
configuration errors. In this example, the configuration doesn't specify the subnet. If an object you don't want to
use generates the error, you can delete it from the script or use # (hash) at the start of the appropriate lines to
convert them to comments. Then, try to run the script again. Repeat the troubleshooting process until the script
execution is successful.
If there is no obvious error in the output, try dividing the script into two smaller scripts. If only one script runs
successfully, you have narrowed the focus of your troubleshooting to the content of the failed script. To divide a
script, right-click it and select Clone. Using the policy numbers to determine and keep track of which policies
you delete, edit the files so that they each contain a different section of the script. Then, run both scripts.
Dividing scripts into two or more smaller scripts is also useful if you suspect the length of a script is causing the
execution to fail. Scripts that are too long fail without generating an error message.
In some cases, if a script fails, Fortinet recommends that you create a new script instead of editing or deleting
it, because sometimes files can remain after you delete it. If you preserve the failed script, you can review it
and the error it generates later. In the following example, the following config user server objects took
several attempts to run successfully.
In some cases, output files are split into smaller, indexed files to make it easier to import them.
If a configuration contains nested groups, script execution can fail because groups defined in one file are
dependent on groups defined in another file.
If a script fails because of a missing dependency, remove the object that causes the failure. When you have
finished importing the scripts for the object type, delete the script you edited and import it again. Then, run the
script without editing it. Because the dependency is now included in the imported configuration, the unedited
script can execute successfully.
Troubleshooting
For any questions not covered in this content, contact FortiConverter customer support at fconvert_
[email protected].
Licensing Issues
FortiConverter is a single-user application. Using more than one user account may invalidate the Hardware ID.
If multiple users require the application, Fortinet recommends that you install it using a single, shared account,
on a remotely accessible host.
l A hardware layer change generates a new hardware identifier. For a physical host, this could occur when
installing the application on a new laptop, or installing a memory extension or a new network card. For a
virtual host, such as VMware, the hardware identified may change because of an update in the
virtualization software, or because of a change to the virtual hardware configuration for that virtual host.
l Windows updates might affect the hardware ID, particularly .Net framework updates.
l If your license does change, contact customer services, [email protected], include your serial number,
previous hardware identifier, and new hardware identifier. Customer services can update your FortiCare
records and you can then download the replacement license from the support portal.
In most cases, when FortiConverter has an internal problem, the application displays a message in the web UI
and adds an error message to a log file.
The logs capture all the conversion steps, including initialization, parsing (two logs), conversion, and reporting.
If the log indicates that FortiConverter encountered an internal error, or for help resolving other errors, contact
the FortiConverter team at [email protected].
Log location
The logs are stored at the following default location (ProgramData is a hidden folder):
C:\ProgramData\Fortinet\FortiConverter\logs\<date>
where <date> is the day the log was generated. For example, 2016-04-25.
Example logs
Logs are plain-text files. These examples have additional formatting to illustrate the different steps and
highlight errors.
Info:
2016-04-25 16:58:10.2853
MainWizardPanel.btnStart_Click => MainWizardPanelPresenter.Initialize =>
ConverterManager.MakeANewConversionJob
Start a New Conversion: Juniper
Info:
2016-04-25 16:58:17.6680
BackgroundWorker.OnDoWork => VdomWizardPresenter._vsysPhaseCallWorker_DoWork =>
VdomConvertJob.DoConvertForGetVDOM
Parse VDOM: C:\Users\user\Desktop\Test Case Base\ScreenOS\test_sos.txt
Info:
2016-04-25 16:58:18.8052
BackgroundWorker.OnDoWork => JuniperWizardPresenter._firstPhaseCallWorker_DoWork =>
ConvertJob.DoConvertForFirstPhase
Parse: C:\Users\user\Desktop\Test Case Base\ScreenOS\test_sos.txt
Info:
2016-04-25 16:58:22.7495
BackgroundWorker.OnDoWork => VdomWizardPresenter._secondPhaseCallWorker_DoWork =>
ConvertJob.DoConvertForSecondPhase
Convert
Info:
2016-04-25 16:58:23.6636
ConvertJob.DoConvertForSecondPhase => ConvertJob.DoConvertForThirdPhase =>
ConvertJob.DoConvertReportPartial
Report: FGT
The error message at the end of this example log indicates that FortiConverter encountered an internal error.
Info:
2016-03-29 18:59:33.8553
MainWizardPanel.btnStart_Click => MainWizardPanelPresenter.Initialize =>
ConverterManager.MakeANewConversionJob
Start a New Conversion: Cisco
Info:
2016-03-29 18:59:41.3151
BackgroundWorker.OnDoWork => VdomWizardPresenter._vsysPhaseCallWorker_DoWork =>
CiscoConvertJob.DoConvertForGetVDOM
Parse VDOM: C:\Users\user\Desktop\test_cisco.txt
Info:
2016-03-29 18:59:48.5378
BackgroundWorker.OnDoWork => CiscoWizardPresenter._firstPhaseCallWorker_DoWork =>
CiscoConvertJob.DoConvertForFirstPhase
Parse: C:\Users\user\Desktop\test_cisco.txt
Info:
2016-03-29 19:00:00.0919
BackgroundWorker.OnDoWork => MainWizardPanelPresenter._secondPhaseCallWorker_DoWork =>
ConvertJob.DoConvertForSecondPhase
Convert root
Error:
2016-03-29 19:00:38.1278
InterfaceALL.UpdatePolicyReference => InterfaceCollection.UpdatePolicyReference =>
PolicyOrg.HasReferencedInterface
Reference interface failed: Object reference not set to an instance of an object.
In many cases, disabling NAT merge options can resolve an application crash that occurs during a conversion.
For example, for a Cisco PIX conversion, on the wizard Start Option page, click More, and then for each type of
NAT, select Off.
See the FortiConverter logs for detailed information about the cause of a crash. See Accessing conversion logs
on page 151.
In the wizard, when you select Create a restorable config, FortiConverter creates a config file by appending
the converted source configuration to the target default configuration.
The output also includes any unconverted configuration items and errors, which you can review using the
config-error-log CLI command.
In many cases, one failed object causes many lines of output because the configuration uses it in multiple
places.
The error log provides a line number that helps you to locate a command associated with the problem. To help
you understand the problem, try entering the command in the CLI.
In the example, because of significant configuration changes since FortiOS 4.2, FortiConverter doesn't migrate
Data Leak Prevention (DLP) settings from 4.3 to 5.2 and instead records the errors.
Common errors include the following codes:
l -651 - Input value error. The CLI command is incorrect.
l -3 - Entry not found (see the illustration). The value given, such as a profile name, isn't configured..
Appendix
The conversion wizard Start options page allows you to specify whether FortiConverter allows larger table sizes
and group membership than default in the output configuration.
This is useful when, for example, the source configuration has a large address group and the target
configuration can accommodate the larger group. Otherwise, FortiConverter converts the large address group
into two or more smaller address groups for a single policy.
For example, FortiConverter uses the following default maximum table sizes by default:
l Address groups – 2500
l Addresses per group – 300
l Custom service objects – 1024
When this option is selected, FortiConverter uses the following maximum table sizes:
l Address groups – 20000
l Addresses per group – 1500
l Custom service objects – 4096
The following image shows the output has created address groups with a limit of 300 members, but the source
config has instances with over 500 members. In this case, you can increase the address group membership
limit if the target device supports the higher value.
When you select Adjust table sizes, FortiConverter uses the maximum table sizes in the file
TargetPlatformTablesizeSetting.txt, which is stored in the same folder as the FortiConverter executable file
(for example, using the default installation path, C:\Program Files
(x86)\Fortinet\FortiConverter\TargetPlatformTablesizeSetting.txt).
By default, the file contains the following values, which are suitable for high-end devices (for example,
FortiGate 1200D or higher):
Address groups: 20000
Addresses per group: 1500
Custom service objects: 4096
For Check Point and Cisco PIX conversions, you can select which types of NAT configuration FortiConverter
uses to generate output firewall policies, or whether FortiConverter derives its NAT-based policies based on
object names or object values.
Because it can take FortiConverter several hours to complete a conversion that includes a large number of NAT
rules, Fortinet recommends that you turn off NAT merge for all types of NAT for your initial conversion. Then,
after you resolve any issues with the conversion, run it again at a convenient time with NAT merge enabled.
The FortiConverter NAT merge feature compares the firewall policy source and destination address with
addresses in NAT rules. When these addresses overlap, FortiConverter uses the NAT rules to generate
additional policies in the output configuration.
If a policy has an address with a large range, it can overlap with many NAT rules, which generates many NAT
policies. Because output that includes a large number of NAT policies can be hard to review, FortiConverter
provides NAT merge depth options that can reduce the number of NAT policies.
The merge depth policies control both the type of NAT to merge and the scope of the merge:
l When you select Off for a type of NAT, FortiConverter doesn't perform NAT merge using NAT rules of that
type. If it’s turned off for all types, the output conversion contains the converted source configuration
policies only.
l When you select Object Names, FortiConverter generates policies based on NAT rules only where the
address name the rules use is found in a policy. For Cisco PIX, this option can also match NAT rules and
policies if they contain addresses that match exactly. For example, a source configuration NAT rule
dynamically translates the object "address1"(IP 10.10.10.10) to "200.200.200.200". The source
configuration also has three polices:
l policy1: source address is "address1"
l policy2: source address is "10.10.10.0-10.10.10.255"
l policy3: source address is "all"
Only policy1 matches the NAT rule, because it shares the address object name, and policy2 and policy3
don't match
because they don't reference the name "address1".
Cisco PIX allows you to use an IP address to configure a NAT rule instead of a name. For example, the
NAT rule 10.10.10.10 to 200.200.200.200. When Object Names is selected, this NAT rule matches a
policy with source address 10.10.10.10, even though it doesn't refer to a object name because they have
the exactly the same IP range. This is a useful option if you make use of supernet addresses that would
match many address objects.
l When you select Object Values, FortiConverter generates policies based on NAT rules that have address
values that fall anywhere in the range specified by a policy (overlap).
For the example above, when Object Values is selected, the NAT rule that translates the object
"address1"(IP 10.10.10.10) to "200.200.200.200" matches both policy2 and policy3.
Object Values generates the most accurate matching of NAT rules and policies, but in most cases, it also
generates more NAT policies.
Folders
The new FortiConverter application allows you to create separate folders for your conversions.
To add a folder
1. Click the New Folder option from the menu on the left.
2. Enter a name for your new folder and press OK.
Your new folder appears in the left menu.
1. Select a conversion.
2. Click the Change Folder button, located at the bottom.
3. Select a folder for your conversion and press OK.