Solved

Checkpoint R65 to Cisco ASA5510 Migration

Posted on 2013-01-24
6
160 Views
Last Modified: 2015-05-22
Hello Team.

I'm working on a project wherein I'm migrating the existing Checkpoint Cluster firewalls (UTM boxes) running on R65 to Cisco ASA 5510..

Looking for a simple and detailed procedure to achieve this with minimum downtime to the business.

Any help on this is highly appreciable!!


-Sai26
0
Comment
Question by:Sai26
  • 2
6 Comments
 
LVL 20

Expert Comment

by:rauenpc
ID: 38816073
I'd love to know if there's a simple way as well...

Cisco has tools to migrate from PIX to ASA as well as going between versions, but, as far as I'm aware, when going from one manufacturer to another, it is up to you to manually go through the rules, policies, and features on the existing firewall and create the rules on the ASA. Your attention to detail and thorough knowledge of both devices will be the key to reducing downtime.
0
 

Author Comment

by:Sai26
ID: 38816731
Thanks for the response!!

Well, there are only around 60 rules on the Checkpoint fw...so I can manually replicate the rules..what I was lookin for  a plan which can reduce the overall downtime to the business :)
0
 
LVL 20

Accepted Solution

by:
rauenpc earned 250 total points
ID: 38817184
Aside from double checking the new config and maybe testing it, when switching brands you're more or less limited to a hard to cutover where you swap cables as quickly as possible followed by testing. One thing to watch for are arp tables. There is a good chance you will need to power cycle your isp equipment, and maybe your inside router/l3 switch connected to the firewall.

One of the best things you can plan out is how to test your rules after the cut.
0
 
LVL 17

Assisted Solution

by:MAG03
MAG03 earned 250 total points
ID: 38825055
I would agree with rauenpc, however if you are not "married" to your internal IP plan, you might be able to run the two firewalls side by side during your migration...depending on your setup.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Some help with Network Design 4 44
ISP Change 14 45
route-map permit with a number 1 18
Cisco 5508 WLC software upgrade 2 28
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now