Solved

Checkpoint R65 to Cisco ASA5510 Migration

Posted on 2013-01-24
6
140 Views
Last Modified: 2015-05-22
Hello Team.

I'm working on a project wherein I'm migrating the existing Checkpoint Cluster firewalls (UTM boxes) running on R65 to Cisco ASA 5510..

Looking for a simple and detailed procedure to achieve this with minimum downtime to the business.

Any help on this is highly appreciable!!


-Sai26
0
Comment
Question by:Sai26
  • 2
6 Comments
 
LVL 20

Expert Comment

by:rauenpc
Comment Utility
I'd love to know if there's a simple way as well...

Cisco has tools to migrate from PIX to ASA as well as going between versions, but, as far as I'm aware, when going from one manufacturer to another, it is up to you to manually go through the rules, policies, and features on the existing firewall and create the rules on the ASA. Your attention to detail and thorough knowledge of both devices will be the key to reducing downtime.
0
 

Author Comment

by:Sai26
Comment Utility
Thanks for the response!!

Well, there are only around 60 rules on the Checkpoint fw...so I can manually replicate the rules..what I was lookin for  a plan which can reduce the overall downtime to the business :)
0
 
LVL 20

Accepted Solution

by:
rauenpc earned 250 total points
Comment Utility
Aside from double checking the new config and maybe testing it, when switching brands you're more or less limited to a hard to cutover where you swap cables as quickly as possible followed by testing. One thing to watch for are arp tables. There is a good chance you will need to power cycle your isp equipment, and maybe your inside router/l3 switch connected to the firewall.

One of the best things you can plan out is how to test your rules after the cut.
0
 
LVL 17

Assisted Solution

by:MAG03
MAG03 earned 250 total points
Comment Utility
I would agree with rauenpc, however if you are not "married" to your internal IP plan, you might be able to run the two firewalls side by side during your migration...depending on your setup.
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
Read about achieving the basic levels of HRIS security in the workplace.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now