hi,
i need some help with ASA to FGT conversion. i used forticonverter but not confident of the output so i did this manually.
can someone confirm if below config conversion is correct? this is just a NAT between two internal networks.
!! ASA
interface Port-channel20.61
nameif outside
security-level 0
ip address 172.16.248.78 255.255.255.248
interface Port-channel20.60
nameif inside
security-level 100
ip address 172.16.248.70 255.255.255.248
object network obj-172.18.7.7
host 172.18.7.7
nat (outside,inside) static 172.29.13.1
route outside 172.18.7.0 255.255.255.0 172.16.248.77 1
route inside 172.29.0.0 255.255.0.0 172.16.248.69 1
-----
!! FGT
config firewall vip
edit "vip-172.29.13.1"
set extip 172.18.7.7
set mappedip "172.29.13.1"
set extintf "po20.60"
next
config firewall policy
edit 1
set srcintf "po20.61"
set dstintf "po20.60"
set srcaddr "all"
set dstaddr "vip-172.29.13.1"
set service "ALL"
set schedule "always"
set status enable
set action accept
set nat disable
Hello johnlloyd_13,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
Hello again,
The conversion from ASA to FortiGate using FortiConverter for a NAT between two internal networks appears mostly correct, but there are a few points to consider:
Hope it helps you, if not do not hesitate to tell us!
Created on ‎03-07-2025 03:19 AM Edited on ‎03-07-2025 03:19 AM
hi,
thanks for the feedback!
i guess i'll rely and tweak the forticonverter output and test it out.
Hi John
I'm not used to ASA, but according to some Cisco docs, in your case the external IP 172.29.13.1 on the external interface 20.61 should be mapped to host 172.18.7.7 on the internal interface 20.60. So the VIP should be defined as follows:
config firewall vip
edit "vip-172.29.13.1"
set extip 172.29.13.1
set mappedip 172.18.7.7
set extintf "po20.61"
next
end
The firewall rule looks fine.
hi,
just would like to confirm another thing.
i have a lot of 1-1 static NAT on the ASA that would need conversion to FGT VIP.
object network obj-172.18.7.7
host 172.18.7.7
nat (outside,inside) static 172.29.13.1
object network obj-172.18.7.8
host 172.18.7.8
nat (outside,inside) static 172.29.13.2
can i configure a VIP group instead so i only create a single FW policy? will this work?
config firewall policy
edit 1
set srcintf "po20.61"
set dstintf "po20.60"
set srcaddr "all"
set dstaddr "vip-group"
set service "ALL"
set schedule "always"
set status enable
set action accept
set nat disable
User | Count |
---|---|
2571 | |
1365 | |
796 | |
652 | |
455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.