Forticonverter 6.0.1 Admin Guide
Forticonverter 6.0.1 Admin Guide
Version 6.0.1
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://fortiguard.com/
FEEDBACK
Email: techdoc@fortinet.com
July 1, 2020
FortiConverter 6.0.1 Admin Guide
00-400-000000-20181031
TABLE OF CONTENTS
About FortiConverter 7
Supported vendors & configuration objects 7
General limitations 13
Licensing 13
What's new 15
Installation 16
System requirements 19
Activating the license 20
Enabling remote connections 22
Run FortiConverter on different Windows users 22
FortiGate Configuration Migration 23
Fortinet Offline Mode Conversion Wizard 23
Caveats 23
Fortinet Start Options 24
Config Information 25
Fortinet interface mapping 25
Fortinet Conversion Result 26
Fortinet Device Mode Conversion Wizard 27
Caveats 27
Fortinet Start options 28
Config information 29
Fortinet interface mapping 30
Fortinet conversion result 31
FortiGate Configuration Import and Backup 31
Reasons that may cause import failure 40
Fortinet Bulk Conversion 41
The Start Page 42
The Interface Mapping page 43
The Bulk Conversion Summary page 45
FortiGate Configuration Obfuscator Tool 47
3rd Part Security Vendors Conversion 50
Alcatel-Lucent Conversion 50
Alcatel-Lucent differences 50
Saving the Alcatel-Lucent source configuration file 53
Alcatel-Lucent conversion wizard 56
Bluecoat Conversion 60
Bluecoat Network Differences 60
Saving the Bluecoat source configuration files 60
Bluecoat conversion wizard 61
Bluecoat start options 61
Bluecoat conversion result 61
Check Point Conversions 62
Check Point differences 62
About FortiConverter
FortiConverter can translate configurations from the following vendors and models.
l In some cases, FortiConverter can't translate some parts of the configuration because of dependencies or
unsupported syntax and you must manually convert them.
l If the number of objects exceeds the maximum valid length for FortiGate or FortiManager, FortiConverter
trims them.
l FortiConverter comes with two different applications, each capable of a different set of conversions. The
Converter Application column shows which FortiConverter application to use for each conversion.
Unless noted as an exception below, conversions only support IPv4 unicast policy.
l NAT
l Negate Cell
l Policies
(rulebases.fws/*.csv)
l RADIUS, TACACS+,
LDAP
l Rules
Provider-1 NGX R65 to R80 (rulebases.fws/*.csv)
l Schedules
l Services & Service
Groups
l Static Routes
l VPN communities
(IPSec site-to-site)
l Interfaces
l IP Pools
l Policies
l Services & Service
Groups
l Static Routes
site)
l SSLVPN
Exception
General limitations
FortiConverter is a migration tool, not a migration service. It’s designed to be used as part of a properly planned
migration process.
FortiConverter supports conversions from other vendors to FortiOS 6.0, 6.2 and 6.4 only.
While FortiConverter significantly shortens the conversion process, a final, useable configuration requires you
to review and audit the FortiConverter output conversion. The FortiConverter tuning capability can help with the
review and audit process.
While you can use the FortiConverter tuning capability to review and fix errors in the conversion, it isn't
designed to perform significant reconfiguration.
In some cases, not all routing information that FortiConverter requires to make a decision about a policy
interface is available. In these cases, it uses the any interface.
Double NAT
For Check Point conversions, the FortiConverter conversion engine uses a manual rule to convert
configurations that apply source NAT and destination NAT to the same policy (called double NAT).
For all other conversions, FortiConverter NAT merge doesn't support double NAT. Instead, FortiConverter
applies source NAT in the conversion and you complete the configuration by using the tuning page to manually
apply destination NAT.
IPsec support
FortiConverter converts IPsec configurations to route-based or policy-based IPsec depending on which one the
source configuration is closest to. Users can enable Route-based IPSec for Cisco ASA, PIX,FWSM, Juniper and
Check Point conversions.
Licensing
The trial version of FortiConverter, allows you to complete a conversion and view the results in the Tuning
page. CLI output is disabled, but is available in the fully-licensed version.
When you purchase a license, FortiConverter is unlocked and full functionality is enabled for all supported
vendors. Your paid license entitles you to any new versions of FortiConverter that Fortinet releases until the
license expires, as well as direct engineering support.
FortiConverter requires an Internet connection to verify its license. You can use the software for up to 30 days
without validating the license online.
What's new
Installation
Download the FortiConverter installer from the Fortinet Technical Support website:
https://support.fortinet.com
Uninstalling FortiConverter application from Windows only removes the application itself, it does not remove
the conversion data or database. If you re-install the application later, the data can still be accessed.
6. Open the newly created service record, right-click the database "djangodb", and select Delete/Drop.
7. Click OK.
8. If you receive the error message: "there is 1 other session xxx", terminate all other existing external
connections, except for the connection from pgAdmin 4.
a. Make sure FortiConverter has been stopped.
b. Click the "djangodb" database.
c. Go to Tools > Query Tool, then enter the following PSQL script.
SELECT
pg_terminate_backend(pid)
FROM
pg_stat_activity
WHERE--
don't kill my own connection!
pid <> pg_backend_pid()
-- don't kill the connections to other databases
AND datname = 'djangodb';
d. Click Execute.
12. Delete all existing conversion folders to avoid a name conflict.Conversions are, by default, stored at
C:\Users\<UserName>\AppData\Roaming\Fortinet\FortiConverte
r\conversions.
13. Uninstall the program.
14. Delete all remaining files and folders in the FortiConverter folder, located at C:\Program
Files\Fortinet\FortiConverter.
System requirements
l Microsoft Windows 10
l Microsoft Windows 8
l Microsoft Windows 7
l Microsoft Windows Server 2019
l Microsoft Windows Server 2016
l Microsoft Windows Server 2012
Also, FortiConverter requires .NET Framework 4.0 or above. If it isn't already installed on your computer, the
FortiConverter installer prompts you to download and install it.
A web browser is required.
An Internet connection is required to periodically verify the software license.
For any questions not covered in this content, contact FortiConverter customer support at fconvert_
feedback@fortinet.com.
By default, FortiConverter is installed with a limited trial license. If you have purchased a full license, download
it to unlock the complete feature set.
To purchase a license, use your usual Fortinet sales channel. For other licensing issues, see Licensing for more
information.
If you have already activated a license for the legacy FortiConverter application on
your device, the new application automatically uses that license when it’s installed.
6. Enter the Hardware ID you copied earlier, an optional description, and choose your Fortinet partner from
the list.
7. After you agree to the license terms, the final page of the wizard allows you to download the license file
(.lic file).
8. In FortiConverter, from the License tab, click the icon next to License File, then navigate and select the
.lic file.
9. Click Activate.
FortiConverter validates the license file and changes your Activation Status from Trial to Activate. Your
license is valid for all FortiConverter software updates released until the date specified by License Expiry
Date.After the license is activated, the expiry information is under the License tab.
FortiConverter is designed as a web application. The application (FortiConverter.py) should be run with
Administrator privileges because it reads and writes data from/to high privilege directories. For security
concerns, the default configuration only allows connections from users on the localhost.
1. Run notepad as an administrator and open the start.bat file located in the directory C:\Program
Files\Fortinet\FortiConverter\.
2. Append string 0.0.0.0:<port_num> after the keyword runserver. The port number used by default
is 8000.
For example:
call "%install_dir%\Python36\python.exe" manage.py runserver 0.0.0.0:8000
--insecure
3. Run notepad.exe as an administrator and open C:\Program
Files\Fortinet\FortiConverter\converter\backend\mysite\mysite\settings.py
4. Add the wildcard IP address '*' (match ANY) into allowed ALLOWED_HOSTS.
For example:
ALLOWED_HOSTS = [
'localhost','127.0.0.1','*',
]
In FortiConverter v6.0.1, you are able to run the FortiConverter as different Windows users of the same host.
Each user has an individual conversion list.
As long as a user with administrator privileges on the host installs the FortiConverter tool, all users including the
standard users can run FortiConverter.
In the latest FortiConverter v6.0.1, we add back the legacy Fortinet offline conversion. Now, the Fortinet
conversion has two modes, Device and Offline mode.
For the device mode which first introduced in v5.6.3, adopts REST-API to install the converted configuration
onto the device directly. It’s also the preferred method to perform Fortinet configuration migration.
The old version offline mode, you have to provide two input configurations, the source, and the default target
device configuration. After running the conversion and proceed to the summary page, you can download the
converted configuration and upload it to the device manually.
1. Start the FortiConverter. When the start-up is complete, a browser window automatically opens to
http://127.0.0.1:8000.
2. At the top-right corner of the window, click New Conversion.
3. Enter the name for the conversion configuration.
4. Select Fortinet block from the below and also choose Offline mode.
5. Click OK.
The page turns to the Start page.
Caveats
Configurations that may block device-accessing can be removed by FortiConverter, you might need to
configure these settings manually after the configuration restoration. The settings you should check on are:
l The administrator password
l The IP of interface "mgmt"
l The "accprofile" setting of administrators
l The "trusthost" setting of administrators
For FortiGate conversion, the default admin account settings may be overwritten after the configuration
restoration. For example, if the old FortiGate set the default admin access to disabled, you should temporarily
enable this admin access before the restoration.
Setting Description
Profile
Input
Target Device Default FortiConverter needs the default configuration of the target device to
Configuration extract interface or other information of the target device. The default
configuration should contain the same VDOM as those in the source
config.
So if the source device contains multiple VDOMs, users should also create
VDOMs with the same name on the target device before back up the
default configuration.
Config Information
Setting Description
Information of The device model name and the firmware build information of the source
Configurations and target devices are shown in this table.
Configuration file names are shown in the table as a link. Click the link to
see the content. The file won’t show if it’s too large.
Detect Messages Some warning or error message detected in the parser would be shown in
this table. If an error message occurs, users would be blocked to process
the conversion further.
Users should fix the problem manually and restart a new conversion.
Source Configuration The number of each type of objects are shown in the preview table.
Preview
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration
Setting Description
Source Interface Shows each interface name on the source FortiGate device.
FortiGate Interface Shows the corresponding FortiGate interface. Click to assign a port for each
interface.
Setting Description
To download your finished conversion, click Download Configurations, located in the top-right corner. Your
download conversion is a configuration file.
1. Start the FortiConverter. When the start-up is complete, a browser window automatically opens to
http://127.0.0.1:8000.
2. At the Devices page, click New device to create a connection to the target device.
3. At the top-right corner of the window, click New Conversion.
4. Enter the name for the conversion configuration.
5. Select Fortinet block from the below and also choose Device mode.
6. Click OK.
The page turns to the Start page.
Caveats
FortiGate Device mode migration requires connection through a FortiGate device to perform the REST-API
install. Users can import the converted configuration directly to the target device from the import wizard page.
The configuration that may block the connection to the device can be replaced or removed by FortiConverter
and marked with warning label on the import wizard. You need to configure these settings after the
configuration import.
n set admin-port
n set admin-server-cert
n set admin-maintainer
There are known issues in the RESTAPI of the FortiGate side. It may cause the import configuration to be
incomplete but still shows that the import was successful, especially the profile configurations.
For example:
l config webfilter profile.
l config voip profile
l config firewall profile-protocol-options
One suggestion is to review them by CLI Comparison and manually upload to the
device.
After the import, review, and manually adjust, the restorable configuration which can be established by
"Backup config". It downloads the configuration from the device and can restore it to another device.
Setting Description
Profile
Input
Target Device (The FortiConverter needs to extract interface or other information of the target device
device needs to be for conversion and import. If the source configuration has VDOM enabled,
added in advance) FortiConverter will enable the VDOM on the target device as well.
Bulk Conversion If there are many devices to be converted where all of them are the same model
and sharing the same interface in conversion, then the bulk conversion can convert
all of them at once.
Switch to the bulk conversion mode, add each input configuration, and select a
target device to perform the bulk conversion.
Config information
Setting Description
Target Device Switch Interface If the virtual switch interface is detected, FortiConverter can
help to detach the interface before the interface mapping
page.
Please note, in FortiConverter, this is an irreversible
operation, if you want to add the detached interface back, you
have to go to the device to configure manually.
Detect Messages Some warning or error messages detected in the parser would
be shown in this table. If an error message occurs, users
would be blocked from processing the conversion further.
Users should fix the problem manually and restart a new
conversion.
Source Configuration Preview The number of type of objects are shown in the preview table.
Setting Description
Source Interface Shows each interface name on the source FortiGate device.
FortiGate Interface Shows the corresponding FortiGate interface. Click to assign a port for each
interface.
1. FortiConverter locks the target device interface which is connected to ensure the communication between
the FortiConverter tool and the device to not get disconnected. The connected device interface is
highlighted.
When the conversion is completed, it will turn into Fortinet import wizard page.
1. Click the Import Config button from top-right corner to start the import process.
2. During the import process, there is an progress bar and import status for each cli category.
3. After imported, please review the import status for every cli category which can be labeled by either one of
these tags: Success, Warning, Error, Ignored, Not installed, and Altered.
4. For cli objects labeled as "Error", please manually update the CLI commands and then perform selective
import by clicking the Import Partial button.
5. To review or edit the CLI configuration, please use the CLI Viewer to see the difference between source
and target FGT configurations.
6. Use the Difference tab from CLI Viewer to see the differences between source and target configurations.
7. Use the CLI Tries tab from CLI Viewer to edit the configurations and then re-import to FortiGate. Use
the drop down list to switch among VDOMs, double click to edit CLI commands, use "+" or "-" to add or
delete new lines.
8. Use the CLI Notepad tab from CLI Viewer to edit the configurations in text editor mode and then re-
import to FortiGate.
9. Use the label "Altered" to filter out all the CLI objects which had been manually updated after the import.
10. The "Reviewed" icon represents the CLI object’s review status, simply click the icon to reflect the review
status.
11. For objects labeled with "Warning" or "Ignored", the tool provides a short mouse over message to indicate
the reason of the failure.
12. The following table explains the supported functions from the config import page.
Tags
Warning There are some commands to be removed or modified in the CLI by the
tool not disconnected yet from the device. You can review the item tooltip
by moving mouse cursor over the item.
Error The CLI failed to import the device. You may want to edit the CLI or
manually input to the device.
Functionality
Export CLI command Export the CLI commands according to the configuration filtered in search.
Export encrypted password Export the CLIs with the original encrypted password string, such as users,
CLI VPN, Wifi. It could be uploaded to the device directly.
CLI Viewer Compare the configuration to the target device or edit CLI and push it.
Usability
Partial select Select items and import partially.
Review check Mark the configuration whether it has been reviewed or not.
After the import, review and manually adjust, you can choose to get a restorable configuration from the target
device and restore it to others.
1. Click the Backup Config in the top-right corner of the import wizard.
l Make sure every command relative to the interface is loaded successfully onto the device.
l Warning Tag
l The tunnel interfaces are skipped.
l The config system admin (super admin) will need to import manually. It’s recommended to config at
the end.
l FortiConverter won’t import confidential information such as Certificate, FortiToken, and password.
etc.
l Error Tag
l Error -651 (Input value error): The CLI command is incorrect, this may be triggered by the FortiOS
upgrade and the command is no longer supported. Please kindly send a mail to fconvert_
feedback@fortinet.com to notify us.
l Error -3 (Entry not found): The given value hasn’t been configured on the device. Please review other
error-tags to see if the entry is configured correctly.
The errors are mostly triggered by improper interface settings (error code -3). We suggest reviewing the
interface first. After the interface settings are manually fixed, the rest of the error configurations can be pushed
onto the device individually.
Alternatively, you can choose to export all or specific configurations and upload them to the device.
You will see the line of code which causes the object to fail to import. In many cases, one failed object leads to
many other lines of failure.
The Fortinet bulk conversion is primarily implemented through REST API install.
It’s necessary to have a target device connected to perform batch conversions from similar FortiGate models to
one target model.
Please note,
1. Before starting, users have to prepare a clean target device for processing the bulk conversion with
REST API install, FortiConverter will establish the restorable configurations for each migration.
2. Fortinet bulk conversion is only supported in Device mode.
5. Once all the sub-conversions are added, click Next to start the bulk conversion.
The interface mapping page is similar to the single conversion, input the proper interface mapping table for
each sub-conversion.
1. Users can switch the interface mapping table between each sub-conversion.
The highlighted row is unable to make adjustment since the source interface wan1 is used for
communicating with the target device.
2. If the interface mapping of each conversion is similar, you can click "Apply mapping to all" option to
apply the current mapping to all sub-conversions.
At this stage, FortiConverter converts the configuration, imports into the target device, stores them, and
restores the target device to the original state before proceeding to the next sub-conversion.
All steps will be performed automatically. Please make sure the device is connected as usual, and wait until all
steps are completed.
1. FortiConverter is installing the configurations onto the target device.
2.
3. The target device is restored to the default state before processing the next import.
4.
5. The next sub-conversion continues the process until all the tasks are finished.
Please note that the device performs restore and restart the device between each sub-
conversion, and each takes 1-2 minutes.
Review the status of the conversion and download all restorable configurations.
1. Click the download button to obtain the restorable configuration for that conversion.
2. Enter the import wizard of the sub-conversion by clicking the edit icon.
3. At this page, users can review the status of the import. It’s the import status of the configuration you got
from step1.
Please note that you should not try to import any configuration or edit the page before restoring
configuration onto the device.
4. Load the restorable configuration you got from step1 onto the device if it needs to be fixed.
This feature can be used to obfuscate IP addresses, object's names, and confidential information for the case
when the configurations cannot be sent without scrubbing.
2. 2. Select the types you want to obfuscate. Note that if the object name is unselected, the second row will
be disabled.
4. Options description
Type
IPv4 Global find IPv4 addresses include the unicast, multicast, private network,
and address range pattern and substitute.
Password, Global find ENC *** pattern and substitute with the string "012345678".
Pre-Shared key
Object Name Global find object names according to the selected object name categories
.
Object Name
Interface Find object names under the config system interface and substitute with
INTERFACE_INDEX. It won't change the default FortiGate interface
name like "wan1", "port2", "dmz," etc.
Zone Find object names under the config system zone and substitute with
ZONE_ INDEX.
Address Find object names under the config firewall address and substitute with
ADDR_ INDEX.
It won't change the name like "all", "any", etc.
Address Group Find object names under the config firewall addrgrp and substitute with
ADDRGrp_ INDEX.
IPPool Find object names under the config firewall ippool and substitute with
IPPool_ INDEX.
VIP Find object names under the config firewall vip and substitute with VIP_
INDEX.
VIP Group Find object names under the config firewall vipgrp and substitute with
VIPGrp_ INDEX.
Service Find object names under the config firewall service custom and
substitute with SERV_ INDEX.
It won't change the name like "all", "any", etc.
Service Group Find object names under the config firewall service group and substitute
with SERVGrp_ INDEX.
Object Name
config vpn ipsec phase1, config vpn ipsec phase2 config vpn ipsec
phase1-interface, config vpn ipsec phase2-interface and substitute
with VPN_ INDEX or VPN_INTF_ INDEX.
Policy Find "set name" under the config firewall policy and substitute with
POLICY_ INDEX.
IP Address > SSID > (substitute object name with the following order) > VPN > Interface > Zone > address and
group > ippool > vip > vip and group > service and group
According to the substitution order above, if the object name contains an address string (commonly used in
IPPool and VIP), it won’t be replaced with the name IPPool_INDEX or VIP_INDEX because the IP address has
higher order.
For example, in the case below, the output replaces the IP string in the object name instead of using IPPool_
INDEX while other objects such as VIP remains the same.
Alcatel-Lucent Conversion
Alcatel-Lucent differences
Conversion support
Interface configuration
Policy configuration
Lucent Brick Zone Rulesets operate at the zone level, which has no direct equivalent in FortiGate. Zone
rulesets need to be translated into equivalent FortiGate policies.
FortiConverter translates Lucent Brick rules by separating traffic into two categories: inter-partition and intra-
partition.
l Inter-partition traffic behaves like inter-VDOM traffic, and is simple to convert to FortiGate policies.
l Intra-partition traffic is more complicated to convert because multiple zone rules can be applied.
FortiConverter handles the inter-partition traffic by creating a general policy for each rule.
FortiConverter handles the intra-partition traffic by looking for all matches between two zone rulesets.
FortiConverter looks at 3 fields: source, destination, and service. All 3 fields must overlap for the rules to
match. FortiConverter creates a policy for each match using the intersection of each field.
The action of the rules determines the action of the converted policy, as shown in the following table:
Inter-partition Deny policies have higher priority than intra-partition policies, while inter-partition Accept policies
have lower priority than intra-partition policies.
Lucent default ruleset "firewall" is currently unsupported.
VDOM configuration
Example conversion
The following block diagram and tables illustrates a Lucent configuration with 2 partitions and 3 zones.
This Lucent configuration creates the following FortiGate configuration. Inter-partition rules are in bold.
Overview
This document provides a step-by-step guide for extracting your Lucent Brick configuration. Fortinet provides a
Perl script, extractConfig.pl that will read the Brick configuration and extract it into a data format that the
FortiConverter can use. FortiConverter can then convert the Brick configuration into its FortiGate equivalent.
Prerequisites
Example Procedure
1. In this example, the target configuration is in the "lab" group, as shown in the SMS GUI tool screenshot
below. FortiConverter needs configuration information from the Brick Devices, the Brick Zone Rulesets,
the Host Groups, and the Service Groups.
3. Log on to an SMS administrator account that has access to the target group.
In the command line, type: lsmslogon <admin> <outputDirectory>.
In this example, the admin account is "dunxingzhang". The output directory is
C:\users\dunxingzhang\.
4. Run the Perl script in the command line by typing: perl extractConfig.pl <systemGroup> all
In this example, the target group is "lab", and the script has been copied to the admin’s home directory,
C:\Documents and Settings\dunxingzhang.
The script will show its progress as it extracts each object and ruleset
5. When it is completed, the output will be saved in the output directory designated in step 3. A directory is
created for each category, and each object in a category is saved to its own text file.
Congratulations!
You have successfully extracted your Lucent Brick configuration.
6. Compress all the directories as a zip file.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Output format Select the appropriate output for your target Fortinet device.
FOS version FortiOS 6.0 and 6.2 have different configuration syntaxes. Select the
version that corresponds to the FortiOS version on the target.
Source Configuration Select the input file (.zip). Ensure the input configuration is in .zip format.
See Saving the Alcatel-Lucent source configuration file on page 53
Discard unreferenced Specifies whether addresses, schedules, and services that aren't
firewall objects referenced by a policy are saved and added to the output.
This option can be useful if your target device has table size limitations.
You can view the unreferenced objects that FortiConverter removed on the
Tuning page.
Enable host behind zone Specifies whether FortiConverter restricts the destination or source IP
attribute addresses in the firewall policy it generates to the ones specified by the
"host behind zone" settings in the source configuration.
When this option is disabled, FortiConverter ignores the "host behind zone"
settings, and it uses the destination or source IP address specified by the
source rule in the output policy.
Convert Administrative Specifies whether FortiConverter includes the default "administrative zone"
Zone ruleset ruleset in the output configuration.
The "administrative zone" ruleset is designed for device management, in
most cases, it isn't required in the output configuration.
Increase Address and You can customize the maximum table sizes that FortiConverter uses
Service Table Sizes for when "Adjust table sizes" is selected. For more information, see Adjusting
High-End Models table sizes on page 163.
Setting Description
Enable intra-partition zone Specifies whether FortiConverter creates FortiGate policies for traffic
rule set merge within a partition that the source configuration applies the multiple zone
rulesets to.
For more information on how FortiConverter converts intra-partition zone
rulesets to a FortiGate policy, see Alcatel-Lucent Conversion on page 50.
Include input configuration Specifies whether FortiConverter includes the input configuration lines
lines for each output policy used for each FortiGate policy in the FortiGate configuration as a policy
comment.
Address comment Specifies whether FortiConverter copies the address comment from source
configuration to the converted FortiGate address.
Interface comment Specifies whether FortiConverter copies the interface comment from the
source configuration to the mapped FortiGate interface.
Service comment Specifies whether FortiConverter copies the service comment from the
source configuration to converted FortiGate service.
Device selection
Setting Description
Source Configuration The numbers of each type of firewall object are shown in the preview table.
Preview Click the object number to see detailed information on each object. In each
type of object, click the button Export CSV to export the current object
info as CSV file.
Setting Description
Select all partitions Select to select all partitions or clear it to de-select all partitions
Partition selection Select the partition to include the partition to the conversion. Include
the individual zone rules within a partition.
Zone rule selection Select or de-select the zone rule to include in the conversion.
l To edit other values, double-click the proper column. Use the toolbar icon on the right to show and hide
columns. You can also use the Tuning page to create mappings after the conversion is complete.
l To import a set of interface mappings from a file, click Import.
l To download the current set of interface mappings, click Export.
l To delete an interface, select the entry and click Delete Selected. It is useful if your target FortiGate has
fewer interfaces than the source configuration.
For the VLAN and Loopback interface, FortiConverter automatically applies the interface name.
It doesn’t show on the page, if required, you can utilize the tuning page to modify the logical interface and
zones. See .
Setting Description
FortiGate Interface Show the corresponding FortiGate interface. Click to assign a FortiGate
port for each interface.
Mode/IP-Netmask Show the interface mode or the IP address and netmask of the connection.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Tab Description
VDOM Information It shows how VDMS were mapped from the source device to the new
device.
Interface Mapping It shows how interfaces were mapped for each VDOM from the source
device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Bluecoat Conversion
Conversion support
Before starting the conversion wizard, save a copy of your Bluecoat configuration file to the computer where
FortiConverter is installed.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output
Options
Output Select the appropriate output for your target Fortinet device.
Format
FOS Version FortiOS 6.0 and 6.2 have different configuration syntaxes. Select the version that
corresponds to the FortiOS version on the target.
Input
Tab Description
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
General
l The FortiGate set allowaccess command for interfaces doesn’t exist on Check Point. Because
FortiGate requires this setting, FortiConverter enables all services for interfaces by default.
l The interface Lead to Internet is a default static route on FortiGate.
l FortiConverter supports Traditional Mode and Simplified Mode IPSec.
Schedule configuration
FortiConverter converts "Day in month" time schedules to FortiGate one-time schedules. It converts "Day in
week" and "None" schedules to recurring schedules.
You assign a year range for the "Day in month" schedule. If the specified day doesn't exist for a certain month,
FortiConverter doesn't generate the one-time schedule for that month.
VPN configuration
Check Point doesn't configure VPN within a firewall rule. When FortiConverter converts the configuration to
FortiGate, it generates several VPN policies from non-"Lead to Internet" interfaces to the "Lead to Internet"
(default route) interface.
After FortiConverter converts the VPN configuration, the VPN policy destination interface refers to the "Lead to
Internet" interface.If you changed the default route egress interface, you may need to update the VPN/Policy
configuration manually.
FortiConverter can support VPN IPSec policies configured in both Traditional Mode and Simplified Mode.
However, FortiConverter can only convert one mode at a time. If encrypted rules are detected, FortiConverter
defaults to Traditional Mode conversion.
To convert Traditional Mode policies to Simplified Mode policies, use the Check Point Security Policy Converter
Wizard. This can be found by clicking Policy > Convert to > Simplified VPN from the Check Point
SmartDashboard.
FortiConverter can detect and convert meshed and star VPN topologies in Simplified form.
Service objects
Unlike FortiGate service objects, Check Point service objects have a protocol type attribute. FortiGate uses a
session helper object to provide the same functionality as the service objects with a protocol type attribute.
Before starting the conversion wizard, save a copy of your Check Point configuration file to the computer where
FortiConverter is installed.
To acquire the configuration, please download the following files from the management system, ensure the
configuration is in a text format. FortiConverter can't take binary files.
l Object definitions – "objects_5_0.C" (Check Point NG/NGX) or "objects.C" (Check Point 4.x) contains the
firewall's object definitions.
l Policy rulebases – "*.w" or "rulebases_5_0.fws". The file name is "<package name>.W" (default
"Standard.W") or "rulebases_5_0.fws".
l Route information (optional) – Helps FortiConverter to correctly interpret the network topology being
converted. To get this data, enter the route print command (for example, "netstat -nr") on the firewall node
and then copy and paste the output into a plain text file. Codes in the output indicate if the route is a
directly connected interface, a host route, a network route, and so on. The output varies by the platform.
l User and user groups file (optional) – "fwauth.NDB"
File paths of the input files.
l Policy and rule definitions – "*.csv". The Policy and NAT CSV files can be exported from the
SmartConsole.
l Object definitions/ Route information/ User and user groups file – use the same file(s) as
mentioned above for conversions before R80.10.
Uploader Icons used in conversions after R80.10:
For Provider-1
The pages that the Check Point conversion wizard shows depend on whether your source configuration is
SmartCenter or Provider-1.
Because Provider-1 uses global and device-level virtual domains that are similar to FortiManager ADOMs, you
convert Provider-1 configurations to policy packages and objects for your source firewalls in the FortiManager
Policy & Objects database. You can only select FortiManager as the output format on the Start options page.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
SmartCenter Input
Object Definition File Select the object definition file. This file should
(objects_5_0.C) include the definition of firewalls, interfaces
and firewall objects.
Policy Information File Select the policy information file. This file
(Standard.W or rulebases_5_0.fws) should include the information of policies and
manual NAT rules in each policy package.
[Optional] User & User Group File(fwauth.NDB) Select the user and user group file.
Provider-1 Input
MDS Definition File (mdss.c) Select the MDS definition file. This file should
include the MDS hierarchy.
MDS Object File (objects_5_0.c) Select the MDS object definition file.
Global Policy Object File (objects_5_0.c) Select the global object definition file. This file
should include the definition of global objects.
Global Policy Rulebase File (rulebases_5_0.fws) Select the global policy information file. This
file should include the information of policies
and manual NAT rules in each global policy
package.
Conversion Options
Discard unreferenced firewall objects This option can be useful if your target device
has table size limitations.
Increase Address and Service Table Sizes for High- You can customize the maximum table sizes
End Models that FortiConverter uses when Adjust table
sizes is selected. For more information, see
Adjusting table sizes on page 163.
Number of year-long schedules from day in month Specifies how many years of one-time
schedules schedules to generate. The wizard converts
Check Point "day in month" schedules into
equivalent one-time FortiGate schedules.
Comment Options
Policy comment - Add policy package name and rule Include policy package name, policy number
number and NAT rule number in the comment of
output policy.
Policy comment - Preserve the original comment Include the original comment in source file in
the comment of the output policy.
Generate global objects in a separate file FortiConverter can distinguish global objects in
the configuration and output the converted
global objects into a separated file.
Ignore firewall policies with all or any addresses Specifies whether FortiConverter ignores
when processing NAT rules firewall policies with an "all" or "any" address
when it merges a NAT rule and a firewall policy
to create a FortiGate NAT policy.
FortiConverter creates new policies in the
output configuration based on where NAT
rules to firewall policies intersect. Because
firewall policies that use "all" or "any" as the
address create many intersections, Fortinet
recommends that you ignore them.
Setting Description
Setting Description
A Provider-1 configuration contains multiple domains. Input the object definition, policy package information,
and user file in this page.
Ensure the configuration is in a text format. FortiConverter can't use binary files.
See Saving the Check Point source configuration file on page 63
Setting Description
Browse Click to navigate to the domain source configuration file. See Saving the
Check Point source configuration file on page 63.
Setting Description
(firewall item) Select one or more firewalls to convert from the domain
source configuration.
Information of Configurations Source configuration file names are shown in the table.
Click the file name to see the content. But if the file size
is too large, the file can't be shown.
Source Configuration Preview The numbers of each kind of firewall objects are shown
in the table above. By clicking the object number, the
detailed information of each object is listed in the table
below. In each type of object, click the button Export
CSV to export the current object info as CSV file.
Policy collection
Setting Description
(Route file name field) If you selected Auto generate policy interfaces on the Start
options page, enter the path and file name of a file that
contains route information, or click Browse to select it. For
example, the file can contain routing tables you obtained using
the netstat -nr command.
Policy packages viewer Select the policy package name and the detail of each policy in
the package listed in the table.
l To select the appropriate FortiGate interface, click the value in the FortiGate Interface column, and then
select a value or enter a custom interface name.
l To edit other values, double-click the proper column. Use the toolbar icon on the right to show and hide
columns. You can also use the Tuning page to create mappings after the conversion is complete.
l To import a set of interface mappings from a file, click Import.
l To download the current set of interface mappings, click Export.
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
VDOM Mapping Shows how VDOMs were mapped from the source device to the new device.
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
For more information on how handles NAT merges, see NAT merge options on page 163.
It also has a firewall rule that matches the object to source addresses.
FortiConverter generates the following policy, for which NAT is enabled (set nat enable). However,
because it doesn't specify an IP pool, the source address uses the interface IP address to perform NAT:
edit 10002
set srcintf "port2"
set dstintf "port1"
set srcaddr "Host_172.21.84.202_Hide_Gateway"
set dstaddr "Host_Destination"
set service "http" "https"set schedule "always"
set logtraffic allset status enableset action acceptset comments "Example of address
hides behind gateway."
set global-label "FW1"
set nat enable
next
When a policy has NAT enabled, it attempts to match a source address to a VIP object. If it finds a match, it
performs static NAT using the VIP object. If it doesn't find a match, it uses the interface IP address. (See the
next section for an example with a VIP object.)
It also has a firewall rule that matches the object to source addresses.
edit 10003
set srcintf "port2"
set dstintf "port1"
set srcaddr "Host_172.21.84.203_Static"
set dstaddr "Host_Destination"
set service "http" "https"set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of address with static NAT in source address."
set global-label "FW1"
set nat enable
next
When a policy has NAT enabled, it attempts to match a source address to a VIP object. If it finds a match, it
performs static NAT using the VIP object. If it doesn't find a match, it uses the interface IP address. (See Host
address hides behind gateway for an example without a VIP object.)
FortiConverter generates the following VIP object and policy. The policy replaces the destination address with
the VIP object:
edit "vip-Host_172.21.84.203_Static"
set extip 210.61.82.160
set mappedip 172.21.84.203
set extintf port1
set nat-source-vip enable
next
edit 10004
set srcintf "port1"
set dstintf "port2"
set srcaddr "Host_Source"
set dstaddr "vip-Host_172.21.84.203_Static"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of address with static NAT in destination address."
set global-label "FW1"
next
Manual NAT rule matches policy source address with one-to-one mapping
A source configuration has a manual NAT rule that translates a source address:
This configuration is a one-to-one mapping because both the original address and translated address are host
addresses.
FortiConverter generates the following IP address pool and policy. NAT is enabled for the policy and it uses the
pool to perform NAT:
edit "ippool-210.61.82.160"
set endip 210.61.82.160
set startip 210.61.82.160
set type overload
next
edit 10005
set srcintf "port2"
set dstintf "port1"
set srcaddr "Host_172.21.84.204"
set dstaddr "Host_Destination"
set service "http" "https"
edit 10007
set srcintf "port1"
set dstintf "port2"
set srcaddr "Host_Source"
set dstaddr "Host_172.21.84.204"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of one to one destination NAT rule ."
set global-label "FW1"
next
The translated address is used as the destination address because it is in internal network.
NAT rule and policy addresses don't match: Destination address of the policy
contains the NAT object
A source configuration has a host address object Host_172.21.84.203_Static that Static NAT translates to
210.61.82.160.
edit 110009
set srcintf "port1"
set dstintf "port2"
set srcaddr "Host_Source"
set dstaddr "vip-Host_172.21.84.203_Static"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set global-label "FW1"
next
edit 10009
set srcintf "port1"
set dstintf "port2"
set srcaddr "Host_Source"
set dstaddr "AddressGroup_Destination"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of name overlap in destination address."
set global-label "FW1"
next
FortiConverter converts policy 10009 directly from the original firewall rule. Policy 11009 is a copy of policy
10009 with the destination address field changed to vip-Host_172.21.84.203_Static to reflect the
static NAT object conversion.
This type of policy enables the source static NAT mapping by capturing all the VIP objects that other policies
don't reference.
In some conversions, FortiConverter generates more than one of this kind of policy – one for each external
interface that is referenced by an unreferenced VIP object.
From FOS v6.0.0 release, the central NAT feature was enhanced. You don’t need to add a "set nat enable"
clause into each firewall policy command view. This makes the central NAT module run as a separated
functional part.
It also has a firewall rule that matches the object to source addresses.
FortiConverter also creates a central NAT object that uses the IP pool:
edit 3
set srcintf "port2" (generated from route information)
set dstintf "port1" (generated from route information)
set orig-addr "Host_172.21.84.201_Hide_IP"
set dst-addr "all"
set nat-ippool "ippool-210.61.82.139"
next
FortiConverter converts the Check Point firewall rule into the following policy:
edit 10001
set srcintf "port2" (generated from route information)
set dstintf "port1" (generated from route information)
set srcaddr "Host_172.21.84.201_Hide_IP"
set dstaddr "Host_Destination"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of address hides behind IP."
set global-label "FW1"
next
Manual NAT rule matches policy source address with many-to-one mapping
A source configuration has a manual NAT rule that translates a source address:
edit 2
set srcintf "port2"
set dstintf "port1"
set orig-addr "Net_172.21.84.0"
set dst-addr "Host_Destination"
set nat-ippool "ippool-210.61.82.130"
next
edit 10006
set srcintf "port2"
set dstintf "port1"
set srcaddr "Net_172.21.84.0"
set dstaddr "Host_Destination"
set service "http" "https"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "Example of one to many source NAT."
set global-label "FW1"
next
Cisco Conversions
Cisco differences
General
l FortiGate’s set allowaccess command for interfaces doesn't exist on Cisco firewalls. Because
FortiGate requires this setting, FortiConverter enables all services for interfaces by default.
l The postfix "_conflict" used for services prevents a service and a service group from having the same
name. It is recommended that you rename these objects.
l On Cisco IPSec VPNs, Phase 1 (ISAKMP) supports more than two types of authentication methods.
FortiGate supports only two types: pre-share and rsa-sig. Therefore, you must assign methods for
each VPN connection. The wizard converts Cisco EZVPN configuration to FortiGate VPN policies with the
srcintf "<tunnel-interface-name>" (i.e. phase1-interface object name) and dstintf "any".
l FortiConverter doesn't support the following Cisco configuration elements:
l Wild card netmasks for access-list and object- group objects
NAT support
Before starting the conversion wizard: Cisco, save a copy of your configuration file to the computer where
FortiConverter is installed.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output format for your FortiGate
device.
Input
Security Context Conversion Enable this option to convert configurations with multiple
security contexts.
Source Configuration Select the input file or files. This option only appears if
Security Context Conversion is disabled.
System Configuration Select the system configuration file. This file should include
interfaces and config file names for each security context.
This option only appears if Security Context Conversion is
enabled.
Bulk Conversion If there are many devices to be converted where all of them
are the same model, sharing the same interface mapping
relationship in conversion, then bulk conversion can convert
all of them at once. Collect all the configuration files to be
converted, compress them into a ZIP file and use the ZIP file
as the input.
Context Configuration(.zip) Select the .zip file containing all the config files. The file name
for each context should match the name given in the system
configuration file. This option only appears if Security Context
Conversion is enabled. Please see example below in Input
and naming for context configuration file on page 84.
Route File (Optional) Select a route file that FortiConverter uses to determine the
interfaces used in output policies, in addition to routes it
detects in the source configuration. Because Cisco devices
apply access-lists to source interfaces, FortiConverter can
determine the source interfaces for output policies, but not
the destination interfaces. When you specify a route file,
FortiConverter uses the information in the file to determine
the destination interface.
Target device(Optional)
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses, schedules, and services that
aren't referenced by a policy are saved and added to the
output. This option can be useful if your target device has
table size limitations. You can view the unreferenced objects
that FortiConverter removed on the Tuning page.
Increase Address and Service Table You can customize the maximum table sizes that
Sizes for High-End Models FortiConverter uses when Increase Address and Service
Suppress auto grouped items from When an ACL contains multiple objects in its source address,
Cisco ASDM/CSM destination address or service field, Cisco ASDM and CSM
may automatically group them in to a group object because
Cisco ASA only allows single object in each field. This option
expands the grouped objects after conversion.
Combine expanded multi-object When an ACL contains multiple objects in its source address,
policies destination address or service field, Cisco CSM may expand
the ACL into equivalent multiple ACLs because Cisco ASA
only allows single object in each field. This option combines
those ACLs into the original one automatically.
Combine policies generated by NAT FortiConverter may generate multiple NAT policies after
merge merging NAT rules into ACLs. This option combines and
simplifies the output policies.
Split Address group From VPN Phase2 If the remote side of VPN is not a FortiGate but a device of
selector other vendor, setting an address group in the VPN phase2
quick selector does not work. When this option is enabled, a
VPN phase2 object with an address group in the selector
would be split into multiple objects with subnet or a range in
selector.
Comment Options
Include input configuration lines for Specifies whether FortiConverter includes the input
each output policy configuration lines used for each FortiGate policyin the
FortiGate configuration as a policy comment.
Ignore firewall policies with all or any Specifies whether FortiConverter ignores firewall policies with
addresses when processing NAT rules an "all" or "any" address when it merges a NAT rule and a
firewall policy to create a FortiGate NAT policy.
FortiConverter creates new policies in the output
configuration based on where NAT rules to firewall policies
intersect. Because firewall policies that use "all" or "any" as
the address create many intersections, Fortinet recommends
that you ignore them.
Convert Static NATs into VIP/Central When this option is enabled (in central NAT mode only), a
NAT pairs static NAT rule would be converted into a central SNAT rule
and an unidirectional VIP object. Otherwise it would be
converted into a bidirectional VIP object
NAT exemption Specifies which types of NAT FortiConverter merges with the
output firewall policies, or whether FortiConverter performs
NAT merge based on object names or values.
Dynamic NAT
l Object Name Match – FortiConverter performs
NAT merge based on matching address names in firewall
Static NAT policies and NAT rules.
l Object Content Overlap – FortiConverter performs
Dynamic ACL NAT NAT merge based on matching address values in firewall
policies and NAT rules. It generates the most accurate
matching of NAT rules and policies, but in most cases, it
Static ACL NAT also generates more NAT policies.
Because it can take FortiConverter several hours to complete
Object Dynamic NAT a conversion that include a large number of NAT rules,
Fortinet recommends that you turn off or limit NAT merge for
your initial conversion. Then, resolve any issues with the
Object Static NAT conversion before you run it again with NAT merge enabled.
For more information, including sample matches, see NAT
Twice Dynamic NAT merge options on page 163.
Here is an example on inputting context configuration file and naming convention, please note that the file
name should match the root:
Suppose the root config (Security Context.txt) contains the following context information:
Then ExampleConfigs.zip should contain config files named "admin.cfg", "test_second.cfg", "third.cfg".
(i.e. the file names should match the filename following the slash in config-url )
Context selection
Setting Description
Removed vdom Select a removed VDOM and click Add to add it back into
VDOM list.
Information of Configurations Source configuration file names are shown in the table as a
link. Click the link to see the content. The file won’t show if it’s
too large.
Target Device Switch Interface - If there are virtual switches in the selected target device,
Interface/Port FortiConverter will list the member ports of the virtual
switches. If an interface in the list is going to be used in the
configuration, it should first be detached from the virtual
switch. Click "X" on the interface to detach it. Please note that
a detached interface cannot be re-added later by
FortiConverter.
Source Configuration Preview The numbers of each type of firewall object are shown in the
preview table. Click the object number to see detailed
information on each object. In each type of object, click the
button Export CSV to export the current object info as CSV
file.
l To select the appropriate FortiGate interface, click the value in the FortiGate Interface column, and then
select a value or enter a custom interface name.
l To edit other values, double-click the proper column. Use the toolbar icon on the right to show and hide
columns. You can also use the Tuning page to create mappings after the conversion is complete.
l To import a set of interface mappings from a file, click Import.
l To download the current set of interface mappings, click Export.
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
VDOM Mapping Shows how VDOMs were mapped from the source device to the new device.
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
For more information about how FortiConverter handles NAT merges, see NAT merge options on page 163
For ASA, these examples are valid only for source configurations
created using software versions 8.2.x and earlier.
Identity NAT
Dynamic NAT with ID 0 is the identity NAT and specifies that the address doesn't need to be translated. For
example:
nat (inside) 0 172.17.3.68 255.255.255.255
Currently, because FortiConverter doesn't merge this kind of NAT, it ignores the settings when it converts the
configuration.
FortiConverter doesn't support this kind of static NAT and it ignores the settings when it converts the
configuration.
FortiConverter generates the following IP pool and NAT policy from the source configuration:
edit "ippool-172.31.242.69"
set endip 172.31.242.69
set startip 172.31.242.69
set type one-to-one
next
edit 10001
set srcintf "port1" (corresponds to the interface "inside")
set dstintf "port2" (corresponds to the interface "outside")
set srcaddr "h_172.17.3.120"
set dstaddr "Group_Destination"
set service "HTTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
set poolname "ippool-172.31.242.69"
next
The interface and address of the dynamic NAT matches the firewall rule, so FortiConverter inserts the IP pool
into policy 10001.
FortiConverter generates the following NAT policy from the source configuration:
edit 10002
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-172.17.40.73"
set dstaddr "Group_Destination"
set service "HTTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
next
The interface and address of the dynamic NAT matches the firewall rule. NAT is enabled for policy 10002, but
because there is no IP pool specified, the source address uses the interface IP address to perform NAT.
edit 10003
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-172.17.40.70"
set dstaddr "h-200.185.36.43"
set service "HTTP"
The converted configuration is similar to when the source configuration specifies dynamic NAT with a NAT IP
address.
FortiConverter converts the IP pool based on the dynamic NAT.
FortiConverter converts the static NAT rule to a VIP object and generates a NAT policy:
edit "vip-200.251.129.95"
set extip 200.251.129.95
set mappedip 172.17.60.85
set extintf port2
set nat-source-vip enable
next
edit 10004
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-172.17.60.85"
set dstaddr "Group_Destination"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
next
The NAT-enabled policy tries to match the source address to a VIP object. If it finds a match, it performs static
NAT as the VIP object specifies. Otherwise, it uses the interface IP for NAT.
FortiConverter creates the same VIP object it does for the source address example, and the following NAT
policy, which uses the VIP object as a destination address:
edit "vip-200.251.129.95"
set extip 200.251.129.95
set mappedip 172.17.60.85
set extintf port2
set nat-source-vip enable
next
edit 10005
set srcintf "port2"
set dstintf "port1"
set srcaddr "all"
set dstaddr "vip-200.251.129.95"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
Static NAT that uses access list matches policy source address
A source configuration has the following settings, which define static NAT using an access list:
static (inside,outside) 172.31.242.69 access-list inside_nat_static
access-list inside_nat_static extended permit ip host 10.100.128.97 object-
group Group_Destination
FortiConverter converts the static NAT settings to the following VIP object and policies:
edit "vip-172.31.242.69_ip"
set extip 172.31.242.69
set mappedip 10.100.128.97
set extintf port2
set nat-source-vip enable
next
edit 10006
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-10.100.128.97"
set dstaddr "Group_Destination"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
next
The NAT-enabled policy tries to match the source address to a VIP object. If it finds a match, it performs static
NAT as the VIP object specifies. Otherwise, it uses the interface IP for NAT.
It also has the following firewall rule, which matches the NAT in source address:
access-list acl_outside extended permit ip object-group Group_Destination host 172.31.242.69
access-group acl_outside in interface outside
FortiConverter creates the same VIP object it does for the source address example, and the following NAT
policy, which uses the VIP object as a destination address:
edit "vip-172.31.242.69_ip"
set extip 172.31.242.69
set mappedip 10.100.128.97
set extintf port2
set nat-source-vip enable
next
edit 110007
set srcintf "por2"
set dstintf "port1"
set srcaddr "Group_Destination"
set dstaddr "vip-172.31.242.69_ip"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action acceptnext edit 10007
set srcintf "port2"
set dstintf "any"
set srcaddr "Group_Destination"
set dstaddr "h-172.31.242.69"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
When a NAT rule address doesn't match a policy address exactly, FortiConverter calculates where the
addresses intersect (overlap) and uses the result as the address for the NAT policy it generates.
edit 10001
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-10.1.2.1"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
set poolname "ippool-193.205.32.10"
next
The source address of rule 10001 is the intersection of the NAT rule and original rule, which is "h-
10.1.2.1".
The firewall rule source address 10.1.0.0 255.255.0.0 contains the NAT rule address 10.1.2.0
255.255.255.0.
FortiConverter converts the source NAT and firewall rules to the following IP pool and policies:
edit "ippool-193.205.32.0-193.205.32.255"
set endip 193.205.32.10
edit 110002
set srcintf "port1"
set dstintf "port2"
set srcaddr "n-10.1.2.0_24"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
set poolname "ippool-193.205.32.10"
next
edit 10002
set srcintf "port1"
set dstintf "any"
set srcaddr "n-10.1.2.0_16"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
The policy 00110002 source address "n-10.1.2.0_24" is the intersection of NAT rule and firewall rule 10002.
edit 10003
set srcintf "port1"
set dstintf "any"
set srcaddr "all"
set dstaddr "h-193.205.23.66"
set service "SMTP"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
The policy 110003 source address "n-10.1.2.0_24" is the intersection of NAT and firewall rules.
edit 110004
set srcintf "port2"
set dstintf "port1"
set srcaddr "Group_Destination"
set dstaddr "vip-172.31.242.69_ip"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
next
edit 10004
The source configuration also has a firewall rule that matches the static NAT rule and its destination is a
member of the group Group_Destination.
access-list acl_inside extended permit ip host 10.100.128.97 10.255.253.0 255.255.255.0
access-group acl_inside in interface inside
FortiConverter generates the following NAT policy, which has the destination address 10.255.253.0
255.255.255.0.
edit 10009
set srcintf "port1"
set dstintf "port2"
set srcaddr "h-10.100.128.97"
set dstaddr "n-10.255.253.0_24"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
next
NAT exemption
NAT exemption is a dynamic policy NAT with ID 0. In most cases, you use NAT exemption to do one of the
following:
l Exempt from NAT an address that is located in a NAT rule address range.
l In environments that use NAT control to block traffic to which no NAT rule applies, to permit this type of
traffic.
Exempt an address from a NAT rule
A source configuration has the following NAT exemption configuration:
Both the NAT exemption and the dynamic NAT rule match the following firewall rule:
access-list acl_inside extended permit ip 172.13.100.0 255.255.255.0 object-group Group_
Destination
access-group acl_inside in interface inside
edit 10001
set srcintf "port1"
set dstintf "port2"
set srcaddr "n-172.13.100.0_24"
set dstaddr "Group_Destination"
set service "ALL"
set schedule "always"
set logtraffic disable
set status enable
set action accept
set nat enable
set ippool enable
set poolname "ippool-172.80.80.8"
next
The NAT exemption configuration generates policy 110001 with no NAT behavior. The dynamic NAT
configuration generates policy 10001, which references an IP pool. Because 00110001 comes first in the
configuration, it applies to address "h-172.13.100.88" before the policy used for address "n-172.13.100.0_24"
(which applies dynamic NAT) is applied.
edit 10002
set srcintf "port1"
set dstintf "port2"
set srcaddr "n-172.14.100.0_24"
set dstaddr "Group_Destination"
set service "ALL"
set schedule "always"
set logtraffic disable
set status disable
set action accept
set comments "This policy is disabled as not allowed by NAT-Control."
next
The source interface of the firewall rule is "inside"(port1), which has security level 100. The destination interface
of this firewall rule is calculated to be "outside"(port2), which has security level 0. Since "inside" has a higher
security level than "outside", traffic from "n-172.14.100.0_24" to "Group_Destination" isn't allowed if NAT isn't
configured (even if the firewall rule allows it). Only traffic from "h-172.14.100.88" to "Group_Destination" is
allowed because a NAT exemption is configured for it. Since other traffic isn't allowed, FortiConverter disables
policy 10002, and adds a comment to show the reason.
In some cases, the final policy in an output configuration is one that FortiConverter generates from VIP objects
that aren't used as a destination address in at least one policy. For example:
edit 001
This type of policy enables the source static NAT mapping by capturing all VIP objects that other policies don't
reference.
In some conversions, FortiConverter generates more than one of this kind of policy – one for each external
interface that is referenced by an unreferenced VIP object.
VPNs
Conversion support
Before starting the conversion wizard, save a copy of your Forcepoint Stonesoft configuration file (XML format)
to the computer where FortiConverter is installed.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet
device.
FOS Version FortiOS 6.0 and 6.2 have different configuration syntaxes.
Select the version that corresponds to the FortiOS version
on the target.
Input
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses and services that aren't
referenced by a policy are saved and added to the output.
This option can be useful if your target device has table
size limitations. You can view the unreferenced objects
that FortiConverter removed on the Tuning page.
Increase Address and Service Table Sizes You can customize the maximum table sizes that
for High-End Models FortiConverter uses when Adjust table sizes is selected.
For more information, see Adjusting table sizes on page
163.
Ignore firewall policies with all or any Specifies whether FortiConverter ignores firewall policies
addresses when processing NAT rules with an "all" or "any" address when it merges a NAT rule
and a firewall policy to create a FortiGate NAT policy.
FortiConverter creates new policies in the output
configuration based on where NAT rules to firewall policies
intersect. Because firewall policies that use "all" or "any" as
the address create many intersections, Fortinet
recommends that you ignore them.
Source Preview
Setting Description
Information of Configurations Source configuration file names are shown in the table as a
link. Click the link to see the content. The file won’t show if
it’s too large.
Target Device Switch Interface - If there are virtual switches in the selected target device,
Interface/Port FortiConverter will list the member ports of the virtual
switches. If an interface in the list is going to be used in the
configuration, it should first be detached from the virtual
switch. Click "X" on the interface to detach it. Please note
that a detached interface cannot be re-added later by
FortiConverter.
Source Configuration Preview The numbers of each type of firewall object are shown in the
Because a single Stonesoft config could contain multiple configurations for multiple devices, an explicit info of
mapping from firewall names (e.g. <fw_cluster> or <fw_single> or <virtual_fw>) to policy package names (<fw_
policy>) is required. Otherwise, policy packages that are missing mapping information will fail to apply.
There are two ways to specify the mapping:
1. 1. Before the conversion, for each firewall-policy pair, manually modify the config by adding <granted_
policy_ref> tag with the following format to the end of the config.
2. If <granted_policy_ref> tags are not found while parsing, it is possible to select them from the dropdown
list in VDOM mapping page. (For <master_engine> tag, just choose "Master Engine" from the dropdown
list.)
Setting Description
FortiConverter creates static routes in the output using the static routes it detects from the source configuration
as well as routing information you provided.
Double-click an item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces were mapped for each VDOM from the source
device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Conversion support
Before starting the conversion wizard, save a copy of your Huawei configuration file to the computer where
FortiConverter is installed.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet
device.
Input
Setting Description
Root Configuration Select the system configuration file. This file should
include interfaces and config file names for each
security context. This option only appears if Virtual
System Conversion is enabled.
Vsys Configuration (.zip) Select the .zip file containing all the config files. The
file name for each context should match the name
given in the root configuration file. This option only
appears if Virtual System Conversion is enabled.
Please see example in Input and naming for vsys file on
page 107.
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses and services that aren't
referenced by a policy are saved and added to the
output. This option can be useful if your target device
has table size limitations. You can view the
unreferenced objects that FortiConverter removed on
the Tuning page.
Increase Address and Service Table Sizes for You can customize the maximum table sizes that
High-End Models FortiConverter uses when "Adjust table sizes" is
selected. For more information, see Adjusting table
sizes on page 163.
Comment Options
Include input configuration lines for each Specifies whether FortiConverter includes the input
output policy configuration lines used for each FortiGate policy in the
FortiGate configuration as a policy comment.
Setting Description
Here is an example on inputting vsys file and naming convention, please note that the file name should match
the root:
Suppose the root config (test-FW-01) contains the following vsys information:
The files should not have a filename extension (for example .txt), otherwise the
filename-vsys matching would fail.
VPN Instance
Map the VPN instances in the source configuration to VDOMs in the output configuration.
By default, all VPN instances are mapped to VDOMs with the same name. You can modify this default
mapping as required by renaming VDOMs and removing VPN instances from the conversion.
Setting Description
Removed vdom Select a removed VDOM and click Add to add it back into
VDOM list.
Information of Configurations Source configuration file names are shown in the table as a
link. Click the link to see the content. The file won’t show if it’s
too large.
Target Device Switch Interface - If there are virtual switches in the selected target device,
Interface/Port FortiConverter will list the member ports of the virtual
switches. If an interface in the list is going to be used in the
configuration, it should first be detached from the virtual
switch. Click "X" on the interface to detach it. Please note that
a detached interface cannot be re-added later by
FortiConverter.
Source Configuration Preview The numbers of each type of firewall object are shown in the
preview table. Click the object number to see detailed
information on each object. In each type of object, click the
button Export CSV to export the current object info as CSV
file.
To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate has
fewer interfaces than the source configuration.
Setting Description
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Juniper Conversions
VLAN logical interfaces
Service objects
Junos OS service objects support MS-RPS and SUN-RPC, where program-numbers (SUN) and UUID (MS) are
used instead of ports.
FortiOS supports this configuration using Application Control with an application override.
edit 10012
set srcintf "trust"
set dstintf "mgn"
set srcaddr "MEI-Novi-172.24.81.0-24" "MEI-Novi-172.24.80.0-24" "MEI-Novi-
172.24.252.112-28"
set dstaddr "MEI-WAN"
set service "MS-ActiveDirectory"
set schedule "always"
set logtraffic all
set status enable
set action accept
set comments "95"
set application-list "MS-ActiveDirectory"
next
NAT support
For SRX Series gateways, supports the FortiConverter conversion of the following NAT types:
l Destination NAT
l Source NAT
l Static NAT
In ScreenOS, source NAT is implicitly enabled when: the destination zone is in the untrust-vr, the source zone
is trust zone and the destination zone is untrust zone, and both belong to the trust-vr.
Before starting the conversion wizard, save a copy of your Juniper configuration file to the computer where
FortiConverter is installed.
To get the configuration, for both ScreenOS and Junos, in the web UI, go to Configuration> Update
> ConfigFile.
Alternatively, for ScreenOS only, you can use the get conf CLI command and paste the output into a plain
text file.
For Junos, FortiConverter requires the structural configuration file as a valid input. For example:
show configuration
## Last commit: 2013-06-05 11:28:53 CST by master
version 10.2S7;
groups {
node0 {
system {
host-name SRX3400-Active;
backup-router 172.16.1.254 destination 0.0.0.0/0;
}
interfaces {
fxp0 {
unit 0 {
family inet {
address 172.16.1.1/24;
}
}
}
}
}
............
............
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Description Enter a description of the configuration.
Output Options
Output Format Select the appropriate output for your target Fortinet
device.
Input
Bulk Conversion If there are many devices to be converted where all of them
are the same model, sharing the same interface mapping
relationship in conversion, then bulk conversion can
convert all of them at once. Collect all the configuration
files to be converted, compress them into a ZIP file and
use the ZIP file as the input.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses, schedules, and services that
aren't referenced by a policy are saved and added to the
output. This option can be useful if your target device has
table size limitations. You can view the unreferenced
objects that FortiConverter removed on the Tuning page.
Increase Address and Service Table Sizes You can customize the maximum table sizes that
for High-End Models FortiConverter uses when Adjust table sizes is selected.
For more information, see Adjusting table sizes on page
163
Convert virtual router into FOS virtual FortiOS doesn’t have a corresponding feature to the virtual
domain router in Juniper SRX, but it is an approach to convert a
virtual router into an independent VDOM in FortiOS. When
this option is enabled, each virtual router would be
converted into a VDOM.
Enable consolidated policy mode Enable consolidated mode in FortiOS and convert security
rules into consolidated policies which are able to reference
both IPv4 and IPv6 addresses in a single policy.
Use Zone name instead of number to Juniper SRX may have multiple address objects with the
distinguish duplicate address names same name but tied to different zones. When this option is
(SRX only) enabled, duplicate address name will be converted to
origname_zonename. When disabled, they will be
converted to origname_1, origname_2 … etc.
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Comment Options
Include input configuration lines for each Specifies whether FortiConverter includes the input
output policy configuration lines used for each FortiGate policy in the
FortiGate configuration as a policy comment.
Rule comment (SSG and MX) Specifies whether FortiConverter copies the security rule
comment from the source configuration to converted
FortiGate policies.
Rule annotated comment (SRX only) Specifies whether FortiConverter copies the annotated
lines in rules from the source configuration to converted
FortiGate policies.
Ignore firewall policies with all or any Specifies whether FortiConverter ignores firewall policies
addresses when processing NAT rules with an "all" or "any" address when it merges a NAT rule
(SRX only) and a firewall policy to create a FortiGate NAT policy.
FortiConverter creates new policies in the output
configuration based on where NAT rules to firewall policies
intersect. Because firewall policies that use "all" or "any" as
the address create many intersections, Fortinet
recommends that you ignore them.
Map the logical or virtual systems in the source configuration to VDOMs in the output configuration.
By default, all logical or virtual systems are mapped to VDOMs with the same name. You can modify this
default mapping as required by renaming VDOMs and removing logical or virtual systems from the conversion.
Setting Description
Removed vdom Select a removed VDOM and click Add to add it back into
VDOM list.
Information of Configurations Source configuration file names are shown in the table as a
link. Click the link to see the content. The file won’t show if it’s
too large.
Target Device Switch Interface - If there are virtual switches in the selected target device,
Interface/Port FortiConverter will list the member ports of the virtual
switches. If an interface in the list is going to be used in the
configuration, it should first be detached from the virtual
switch. Click "X" on the interface to detach it. Please note that
a detached interface cannot be re-added later by
FortiConverter.
Source Configuration Preview The numbers of each type of firewall object are shown in the
preview table. Click the object number to see detailed
information on each object. In each type of object, click the
button Export CSV to export the current object info as CSV
file.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
VDOM Mapping Shows how VDMS were mapped from the source device to the new device.
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
This section covers conversions for McAfee Sidewinder (McAfee Firewall Enterprise). For Forcepoint
Stonesoft conversion, please see Forcepoint Stonesoft Conversion on page 99.
Before starting the conversion wizard: McAfee, save a copy of your configuration file to the computer where
FortiConverter is installed.
The following is for McAfee Firewall Enterprise 8. The config is binary therefore the output of the following
commands must be saved to a text file for FortiConverter.
l Interface and Zone (cf interface|zone|zonegroup query)
l Address object and address group object (cf domain|ipaddr|iprange|subnet|netgroup
query)
l Service object and service group object (cf application|appgroup query)
l Admin users and firewall users & user groups (cf adminuser query, cf udb query, cf
usergroup query)
l Static routes (cf route query)
l Firewall Policy (cf policy query)
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS 6.0 and 6.2 have different configuration syntaxes. Select the
version that corresponds to the FortiOS version on the target.
Input
Setting Description
Bulk conversion If there are many devices to be converted where all of them are the same
model, sharing the same interface mapping relationship in conversion,
then bulk conversion can convert all of them at once. Collect all the
configuration files to be converted, compress them into a ZIP file and use
the ZIP file as the input.
Conversion Options
Discard unreferenced Specifies whether addresses and services that aren't referenced
firewall objects by a policy are saved and added to the output. This option can be useful if
your target device has table size limitations. You can view the unreferenced
objects that FortiConverter removed on the Tuning page.
Increase Address and You can customize the maximum table sizes that FortiConverter uses
Service Table Sizes for when Adjust table sizes is selected. For more information, see Adjusting
High-End Models table sizes on page 163.
Source Preview
Setting Description
Information of Source configuration file names are shown in the table as a link. Click the
Configurations link to see the content. The file won’t show if it’s too large.
Source Configuration The numbers of each type of firewall object are shown in the preview table.
Preview Click the object number to see detailed information on each object. In each
type of object, click the download icon to export the current object info as
CSV file.
Setting Description
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces were mapped for each VDOM from the
source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Conversion support
Before starting the conversion wizard: Palo Alto, save a copy of your configuration file to the computer where
FortiConverter is installed.
In the web UI, go to Device > Setup > Operations, then click Export named configuration snapshot.
If the configuration is managed using Panorama shared policy configuration, you should disable shared
configuration before exporting.
3. Do one of the following to import the configuration from Panorama into the firewall local configuration:
l If you clicked Disable Panorama Policy and Object, in the edit dialog box, select Import
Panorama Policy and Objects before disabling and then click OK.
l If you clicked Disable Device and Network Template, select Import Device and Network
Template before disabling and then click OK.
4. Log in to the device that was removed from Panorama and go to Device > Setup > Operations > Save
> Save named configuration snapshot.
5. Enter a name that helps to identify the configuration. In this example, it is pan2fg.
6. Go to Device > Setup > Operations > Export > Export the named configuration snapshot.
7. Click OK.
Select the exported file on the Source Configuration page of the Palo Alto conversion wizard.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet
device.
Input
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses and services that aren't
Increase Address and Service Table Sizes You can customize the maximum table sizes that
for High-End Models FortiConverter uses when Adjust table sizes is selected.
For more information, see Adjusting table sizes on page
163.
Comment Options
Include input configuration lines for each Specifies whether FortiConverter includes the input
output policy configuration lines used for each FortiGate policy in the
FortiGate configuration as a policy comment.
Source Preview
Setting Description
Target Device Switch Interface - Interface/Port If there are virtual switches in the selected
target device, FortiConverter will list the
member ports of the virtual switches. If an
interface in the list is going to be used in the
configuration, it should first be detached from
the virtual switch. Click "X" on the interface to
detach it. Please note that a detached interface
cannot be re-added later by FortiConverter.
Source Configuration Preview The numbers of each type of firewall object are
shown in the preview table. Click the object
number to see detailed information on each
object. In each type of object, click the button
Export CSV to export the current object info
as CSV file.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
SonicWall Conversion
SonicWall differences
Special characters
FortiGate reserves '#' (hash sign), '(', and ')' (open and close curved brackets) as special characters. You can't
use them in the configuration unless an escape sequence precedes them. FortiConverter replaces these
characters with the characters: '*' (star), '[' and ']' (open and close square brackets).
Examples:
l The address book "SNWL #1" becomes "SNWL *1".
l The service book "Citrix TCP (Session Reliability)" becomes "Citrix TCP [Session Reliability]".
l On FortiGate address objects don't support MAC addresses. Therefore, the wizard doesn't migrate
SonicWall MAC addresses.
l FortiConverter generates two extra address book entries: "Any" and "_Address_Null".
l "Any" is added because it is a default address book in SonicWall.
l FortiConverter generates "_Address_Null" because FortiGate address groups don't allow a group without
any members. Only empty address groups can refer to "_Address_Null".
FortiConverter doesn't migrate SonicWall service objects that are predefined on FortiGate. For example, HTTP
port 80 and HTTPS port 443.
Schedule configuration
l A SonicWall schedule group can contain only one "one-time" schedule and multiple "recur" schedules. The
"one-time" schedule is an implicit object that you can embed in the schedule group. Because FortiGate
defines each schedule group explicitly, FortiConverter automatically generates "one-time" schedules for
the SonicWall implicit schedules.
l FortiGate time schedule configuration doesn't support "24:00" (equal to the next day’s 00:00). It uses
"00:00" instead. When FortiConverter converts a SonicWall "recur" time schedule such as "M 00:00 to
24:00", it sets the end time to "00:00".
l Because FortiConverter can't parse the local user’s password string, it sets all passwords to "123456".
l Unlike FortiConverter, SonicWall allows you to nest user groups.
For example, in SonicWall, usergroup1 can be a member of usergroup1. FortiConverter removes any nested
configurations.
Route configuration
l FortiConverter doesn't convert automatically generated routes like connected route and host route.
Before starting the conversion wizard: SonicWall, save a copy of your configuration file to the computer where
FortiConverter is installed.
In the web UI, go to System > Settings > Export Settings to export the settings file.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS 6.0 and 6.2 have different configuration syntaxes.
Select the version that corresponds to the FortiOS version on
the target.
Input
Bulk Conversion If there are many devices to be converted where all of them
are the same model, sharing the same interface mapping
relationship in conversion, then bulk conversion can convert
all of them at once. Collect all the configuration files to be
converted, compress them into a ZIP file and use the ZIP file
as the input.
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses, schedules, and services that
aren't referenced by a policy are saved and added to the
output.
This option can be useful if your target device has table size
limitations. You can view the unreferenced objects that
FortiConverter removed on the Tuning page.
Increase Address and Service Table You can customize the maximum table sizes that
Sizes for High-End Models FortiConverter uses when Adjust table sizes is selected. For
more information, see Adjusting table sizes on page 163.
Expand zones into lists of interfaces When this option is enabled, FortiConverter discards all zone
objects in SonicWALL and directly use interfaces as the
source and destination interface of firewall policies.
Comment Options
Include input configuration lines for Specifics whether FortiConverter uses SW_RULE_ID as
each output policy policy comment for each FortiGate policy or the original
comment from rules in SonicWall configuration.
Ignore firewall policies with all or any Specifies whether FortiConverter ignores firewall policies
addresses with an "all" or "any" address when it merges a NAT rule and a
firewall policy to create a FortiGate NAT policy.
FortiConverter creates new policies in the output
configuration based on where NAT rules to firewall policies
intersect. Because firewall policies that use "all" or "any" as
the address create many intersections, Fortinet recommends
that you ignore them.
Enable Central NAT merge Specifies whether FortiConverter converts NATs to FortiGate
central NATs instead of policy-based NATs
Identical NAT Specifies which types of NAT FortiConverter merges with the
Source NAT output firewall policies, or whether FortiConverter performs
Destination NAT NAT merge based on object names or values.
Source Preview
Setting Description
Target Device Switch Interface - Interface/Port If there are virtual switches in the selected target
device, FortiConverter will list the member ports of the
virtual switches. If an interface in the list is going to be
used in the configuration, it should first be detached
from the virtual switch. Click "X" on the interface to
detach it. Please note that a detached interface
cannot be re-added later by FortiConverter.
Source Configuration Preview The number of each type of firewall object are shown
in the preview table. Click the object number to see
detailed information about each object. In each type
of object, click the button Export CSV to export the
current object info as CSV file.
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
VDOM Mapping Shows how VDMS were mapped from the source device to the new device.
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Sophos Conversion
Conversion support
Before starting the conversion wizard, save a copy of your Sophos configuration file to the computer where
FortiConverter is installed.
Please note that the Sophos backups are no longer xml format, it is
encrypted now. This minor security enhancement was introduced since v17.5
MR4, April 2019.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS 6.0 and 6.2 have different configuration syntaxes.
Select the version that corresponds to the FortiOS version on
the target.
Input
Bulk Conversion If there are many devices to be converted where all of them
are the same model, sharing the same interface mapping
relationship in conversion, then bulk conversion can convert
all of them at once. Collect all the configuration files to be
converted, compress them into a ZIP file and use the ZIP file
as the input.
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses and services that aren't
referenced by a policy are saved and added to the output.
This option can be useful if your target device has table size
limitations. You can view the unreferenced objects that
FortiConverter removed on the Tuning page.
Increase Address and Service Table You can customize the maximum table sizes that
Sizes for High-End Models FortiConverter uses when Adjust table sizes is selected. For
more information, see Adjusting table sizes on page 163.
Comment Options
Service Group Comment Specifies whether FortiConverter copies the service group
comment from the source configuration to the FortiGate
service group.
Source preview
Setting Description
Information of Configurations Source configuration file names are shown in the table as a
link. Click the link to see the content. The file won’t show if
it’s too large.
Target Device Switch Interface - If there are virtual switches in the selected target device,
Interface/Port FortiConverter will list the member ports of the virtual
switches. If an interface in the list is going to be used in the
configuration, it should first be detached from the virtual
switch. Click "X" on the interface to detach it. Please note
that a detached interface cannot be re-added later by
FortiConverter.
Source Configuration Preview The number of each type of firewall object are shown in the
preview table. Click the object number to see detailed
information about each object. In each type of object, click
the button Export CSV to export the current object info as
CSV file.
l To delete an interface, select the entry and click Delete Selected. This is useful if your target FortiGate
has fewer interfaces than the source configuration.
Setting Description
VDOM Shows the virtual domains used in the conversion. ("root" by default)
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces are mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Source interfaces and destination interfaces are set to "any" after conversion.
Schedules are set to "always" in all policies after conversion.
Action Set
If "Block" or "Drop" appears in an action set, the FortiGate policy strAction is set to "deny". Otherwise,
the policy is set to "accept".
If "rsyslog" is found in an action set, the FortiGate policy strLogTraffic is set to "enable". Otherwise,
it is disabled.
Ignored fields
Before starting the conversion wizard: Tipping Point, save a copy of your configuration file to the computer
where FortiConverter is installed.
Please copy and paste all the text format definitions into a one plain text file.
Make sure the file contents are arranged by the order of "Addresses and Address groups", "Services and
Service groups" and "Policies".
You can use text editor such as Notepad or Notepad++, and only use plain text file as input file for
FortiConverter Tool.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet device.
Setting Description
Input
Bulk Conversion If there are many devices to be converted where all of them are the same
model, sharing the same interface mapping relationship in conversion,
then bulk conversion can convert all of them at once. Collect all the
configuration files to be converted, compress them into a ZIP file and use
the ZIP file as the input.
Target device Select the model of the target device, or select a device connected to
FortiConverter.
Conversion Options
Discard unreferenced Specifies whether addresses, schedules, and services that are not
firewall objects referenced by a policy are saved and added to the output. This option can
be useful if your target device has table size limitations. You can view the
unreferenced objects that FortiConverter removed in the Tuning page.
Increase Address and You can customize the maximum table sizes that
Service Table Sizes for FortiConverter uses when Adjust table sizes is selected. For more
High-End Models information, see Adjusting table sizes on page 163
Comment Options
Include input configuration Specifies whether FortiConverter includes the input configuration lines
lines for each output policy used for each FortiGate policy in the FortiGate configuration as a policy
comment.
VSYS selection
Map the virtual systems in the source configuration to VDOMs in the output configuration.
You can select multiple items from the list:
l To select multiple items, use Ctrl + click.
l To select contiguous items, use Shift + click.
Setting Description
Enable VDOM Select to enable VDOMs (add config global and config vdom
syntax) to the output config.
Add Click to add a mapping item after you have deleted one.
Setting Description
Information of Configurations Source configuration file names are shown in the table as a
link. Click the link to see the content. The file won’t show if
it’s too large.
Target Device Switch Interface - If there are virtual switches in the selected target device,
Interface/Port FortiConverter will list the member ports of the virtual
switches. If an interface in the list is going to be used in the
configuration, it should first be detached from the virtual
switch. Click "X" on the interface to detach it. Please note
that a detached interface cannot be re-added later by
FortiConverter.
Source Configuration Preview The number of each type of firewall object are shown in the
preview table. Click the object number to see detailed
information about each object. In each type of object, click
the button Export CSV to export the current object info as
CSV file.
Setting Description
VDOM Shows the virtual domains used in the conversion. ("root" by default)
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces are mapped for each VDOM from the source device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Conversion support
l Interface
l Zone
l Address group
l Service group
l Policy
l Route
NAT and VPN conversions are not currently supported.
Configuration notes
Vyatta does not provide outgoing interface in static route configuration. FortiConverter uses the next-hop
address and the network of each interface to determine the outgoing interface. However, since VPN
conversions are not supported, and tunnel interfaces are not converted, routes to tunnel interfaces cannot be
calculated. The interface fields of those kind of routes are empty in the output field and require you to fill them
manually before the config is imported.
Before starting the conversion wizard, save a copy of your Vyatta configuration file to the computer where
FortiConverter is installed.
1. Use an SSH terminal and connect to the device.
2. Input command "set terminal length 0".
3. Input "show configuration all" and save the output configuration.
Please note that FortiConverter requires the structural configuration file as a valid input. For example:
firewall {
all-ping enable
broadcast-ping disable
config-trap disable
group {
address-group ADDR_GRP1 {
address 10.58.14.15
address 10.58.14.16
address 10.58.14.17
}
address-group ADDR_GRP2 {
address 10.58.186.41
address 10.58.186.52
}
............
............
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
Setting Description
Profile
Description Enter a description of the configuration.
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS 6.0 and 6.2 have different configuration syntaxes.
Select the version that corresponds to the FortiOS version on
the target.
Input
Bulk Conversion If there are many devices to be converted where all of them
are the same model, sharing the same interface mapping
relationship in conversion, then bulk conversion can convert
all of them at once. Collect all the configuration files to be
converted, compress them into a ZIP file and use the ZIP file
as the input.
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses and services that aren't
referenced by a policy are saved and added to the output.
This option can be useful if your target device has table size
limitations. You can view the unreferenced objects that
FortiConverter removed on the Tuning page.
Increase Address and Service Table You can customize the maximum table sizes that
Sizes for High-End Models FortiConverter uses when Adjust table sizes is selected. For
more information, see Adjusting table sizes on page 163.
Comment Options
Include input configuration lines for Specifies whether FortiConverter includes the input
each output policy configuration lines used for each FortiGate policy in the
FortiGate configuration as a policy comment.
Source preview
Setting Description
Information of Configurations Source configuration file names are shown in the table as
links. Click the link to see file contents. Files that are too large
are not shown.
Target Device Switch Interface - If there are virtual switches in the selected target device,
Interface/Port FortiConverter will list the member ports of the virtual
switches. If an interface in the list is going to be used in the
configuration, it should first be detached from the virtual
switch. Click "X" on the interface to detach it. Please note that
a detached interface cannot be re-added later by
FortiConverter.
Source Configuration Preview The number of each type of firewall object are shown in the
preview table. Click the object number to see detailed
information about each object. In each type of object, click the
button Export CSV to export the current object info as CSV
file.
Setting Description
FortiGate Shows the corresponding FortiGate interface. Click to assign a FortiGate port for each
Interface interface.
FortiConverter creates static routes in the output by using the static routes it detects in the source
configuration, and any routing information you provide.
Double-click item to edit it.
Setting Description
Tab Description
Interface Mapping Shows how interfaces were mapped for each VDOM from the source device.
WatchGaurd Conversion
Conversion support
Before starting the conversion wizard, save a copy of your WatchGuard configuration file (in XML format) to the
computer where FortiConverter is installed.
1. Start FortiConverter.
2. When start-up is complete, a browser window automatically opens to http://127.0.0.1:8000.
The configuration page opens to the Start page, and you can input your settings.
Setting Description
Profile
Output Options
Output Format Select the appropriate output for your target Fortinet device.
FOS Version FortiOS 6.0 and 6.2 have different configuration syntaxes.
Select the version that corresponds to the FortiOS version on
the target.
Input
Bulk Conversion If there are many devices to be converted where all of them
are the same model, sharing the same interface mapping
relationship in conversion, then bulk conversion can convert
all of them at once. Collect all the configuration files to be
converted, compress them into a ZIP file and use the ZIP file
as the input.
Target device Select the model of the target device, or select a device
connected to FortiConverter.
Conversion Options
Discard unreferenced firewall objects Specifies whether addresses and services that aren't
referenced
by a policy are saved and added to the output. This option
can be useful if your target device has table size limitations.
You can view the unreferenced objects that FortiConverter
removed on the Tuning page.
Increase Address and Service Table You can customize the maximum table sizes that
Sizes for High-End Models FortiConverter uses when Adjust table sizes is selected. For
more information, see Adjusting table sizes on page 163.
Source Preview
Setting Description
Information of Configurations Source configuration file names are shown in the table as a link.
Click the link to see the content. The file won’t show if it’s too
large.
Target Device Switch Interface - If there are virtual switches in the selected target device,
Interface/Port FortiConverter will list the member ports of the virtual switches.
If an interface in the list is going to be used in the configuration,
it should first be detached from the virtual switch. Click "X" on
the interface to detach it. Please note that a detached interface
cannot be re-added later by FortiConverter.
Source Configuration The numbers of each type of firewall object are shown in the
Preview preview table. Click the object number to see detailed
information on each object. In each type of object, click the
button Export CSV to export the current object info as CSV file.
Setting Description
FortiConverter creates static routes in the output using the static routes it detects in the source configuration
and any routing information you provide.
Double-click an item to edit it.
Setting Description
Tag Description
Interface Mapping Shows how interfaces were mapped for each VDOM from the source
device.
FortiConverter includes error and warning messages into the conversion when an error
occurs.
Review the config-all.txt file after each conversion for errors. These errors and
warning messages might cause the import process to fail, if not corrected. See for
more details.
Supported Keywords
Unsupported Keywords
Unsupported Keywords
virtualSensor
checkName
ignore
xpu
eventThrottling
Unsupported Keywords
checkDate
defaultQuarantine
isUserOverride
noDelete
xpu
securityEventID
issueID
bo
capwap
dcerpc
dhcp
dnp3
dns
ftgd
ftp
ftps
h323
http
https
icmp
iec104
im
imap
imaps
ldap
misc
modbus
mssql
nbss
nntp
other
p2p
pop3
pop3s
radius
rawtcp
rdt
rpc
rtcp
rtp
rtsp
sccp
sip
smtp
smtps
snmp
ssh
ssl
tcp
telnet
tfn
udp
Rule Overview
Click the "Export CSV" button to export the current object info as CSV file.
IBM IPS Sensor Shows the parsed IBM IPS sensors, separated into two tables based on
whether the protocol is supported by Fortigate.
Fortigate IPS Sensor Shows only the supported FGT IPS sensors and the conversion results.
"action" field
Supported keyword
alert
Unsupported keyword
log
"protocol" field
Supported keyword
tcp/udp/ip/icmp/HTTP/FTP/POP3/SMTP/TELNET/SSH/IMAP/SNMP/RADIUS
HTTP/FTP/POP3/SMTP/TELNET/SSH/IMAP ->; tcp
SNMP/RADIUS ->; udp
Supported keyword
Either "any" or "$xxxx" variable
Supported keywords
threshold threshold:type limit, track by_src, count 1, --track SRC_IP; --rate 1,60;
seconds 60;
msg msg:"Bad Stuff detected within field"; et comment "Bad Stuff detected within
field"
detection_ detection_filter:track by_src, count 30, seconds --rate 30,60; --track SRC_IP;
filter 60;
Unsupported keywords:
replace
stream_reassemble
stream_size
cvs
ftpbounce
asn1
fragbits
fragoffset
base64_decode
base64_data
sip_method
sip_stat_code
gtp_type
gtp_info
gtp_version
ssl_state
reference
classtype
priority
gid
fast_pattern
logto
session
resp
react
tag
activites
activites_by
http_encode
count
dce_iface
dce_opnum
dce_stub_data
metadata
protected_content
hash
length
modbus_func
dnp3_ind
Setting Description
Profile
Input
Snort Variable Definition Select the file that defines IPS and port files. Undefined variables
(optional) will be converted into "any".
Conversion Options
Add extra backslash "\" for FortiConverter adds an extra back slash for special characters in the
special characters conversion.
Convert annotated rules as status Select to disable rules that are annotated in the source
disable configuration.
Convert Snort rule's "msg" field Preserve "msg" fields as comment in rules.
to comment
Source Preview
Setting Description
IP Variables The definitions of IP variables parsed from the variable definition file.
Port Variables The definitions of port variables parsed from the variable definition file.
Snort IPS Signature IPS signatures parsed from the input Snort rule files.
Tab Description
Snort IPS Signature Shows variable definitions and Snort IPS signature contents.
Conversion General
This feature can be used to compare two similar conversions from the same vendor/model and show the
differences between them.
1. Select exactly two conversions to be compared and press the Diff Conversions button.
2. By default, the converter assumes the older conversion is the base conversion and the newer one is the
updated conversion. This means that objects that only exists in the updated conversion will be displayed
as Added and the objects that only exists in the older conversion will be displayed as Deleted. Clicking on
3. Press Confirm to start the calculation of differences between the two conversions.
4. The diff result would then be generated. A firewall object being marked as Changed means the object
have the same name in both conversions, but its actual content differs. However, for Policy, Central NAT
and static routes, Changed means they have the same relative order to other unchanged (Policy/Central
NAT/static routes), with their actual content differs.
5. You may select the object(s) you want to generate CLI with the Checkbox on the left. After that, press
Generate Config Button to download the desired CLI as .zip file. If no specific object is selected, all
objects' CLI will be generated.
Bulk Conversion
The bulk conversion feature can convert more than one configurations in a single conversion. If there are many
devices to be converted where all of them are the same model, and share the same interface mapping
relationship in conversion, then bulk conversion can convert all of them at once.
Bulk conversion is supported in conversions for Cisco, Juniper, Palo Alto, SonicWall, McAfee, Sophos,
Vyatta, WatchGuard and FortiGate.
Collect all the configuration files to be converted, and compress them into a ZIP file.
Note: All the configuration files should have the same physical interfaces, and share the same interface
mapping relationship.
FortiGate: For FortiGate migration, all the input configuration files should be migrated to the same model. So
the default configuration of the model should be input in "Target Device Default Configuration", and all the
source configurations should apply to the same target configuration.
Click the option Bulk Conversion in the start page would enable bulk conversion.
FortiConverter arbitrarily select one of the configuration files and extract physical interface name lists from it.
The list is expected to be common to all the configuration files. Input interface mapping relationships and click
Next.
VDOM mapping, route and IPSec VPN pages are skipped in the bulk conversion mode.
FortiConverter would convert all the configuration files one by one, using the same interface mapping
relationship input previously. When all the conversions are completed, the summary page of the bulk
conversion would be shown:
All the single conversions would be listed in the right hand side. For those conversions completed successfully,
you can double click a conversion to open the tuning page or click the download icon to download the output
FGT configuration. For failed conversions, you can click the question mark to see the error log. To download all
the output FGT configurations of all the conversions at once, click Download All at the upper-right corner.
The conversion wizard Start options page allows you to specify whether FortiConverter allows larger table sizes
and group membership than default in the output configuration.
This is useful when, for example, the source configuration has a large address group and the target
configuration can accommodate the larger group. Otherwise, FortiConverter converts the large address group
into two or more smaller address groups for a single policy.
For example, FortiConverter uses the following default maximum table sizes by default:
l Address groups – 2500
l Addresses per group – 300
l Custom service objects – 1024
When this option is selected, FortiConverter uses the following maximum table sizes:
l Address groups – 20000
l Addresses per group – 1500
l Custom service objects – 4096
For Check Point and Cisco PIX conversions, you can select which types of NAT configuration FortiConverter
uses to generate output firewall policies, or whether FortiConverter derives its NAT-based policies based on
object names or object values.
Because it can take FortiConverter several hours to complete a conversion that includes a large number of NAT
rules, Fortinet recommends that you turn off NAT merge for all types of NAT for your initial conversion. Then,
after you resolve any issues with the conversion, run it again at a convenient time with NAT merge enabled.
The FortiConverter NAT merge feature compares the firewall policy source and destination address with
addresses in NAT rules. When these addresses overlap, FortiConverter uses the NAT rules to generate
additional policies in the output configuration.
If a policy has an address with a large range, it can overlap with many NAT rules, which generates many NAT
policies. Because output that includes a large number of NAT policies can be hard to review, FortiConverter
provides NAT merge depth options that can reduce the number of NAT policies.
The merge depth policies control both the type of NAT to merge and the scope of the merge:
l When you select Off for a type of NAT, FortiConverter doesn't perform NAT merge using NAT rules of that
type. If it’s turned off for all types, the output conversion contains the converted source configuration
policies only.
l When you select Object Names, FortiConverter generates policies based on NAT rules only where the
address name the rules use is found in a policy. For Cisco PIX, this option can also match NAT rules and
policies if they contain addresses that match exactly. For example, a source configuration NAT rule
dynamically translates the object "address1"(IP 10.10.10.10) to "200.200.200.200". The source
configuration also has three polices:
l policy1: source address is "address1"
l policy2: source address is "10.10.10.0-10.10.10.255"
l policy3: source address is "all"
Only policy1 matches the NAT rule, because it shares the address object name, and policy2 and policy3
don't match
because they don't reference the name "address1".
Cisco PIX allows you to use an IP address to configure a NAT rule instead of a name. For example, the
NAT rule 10.10.10.10 to 200.200.200.200. When Object Names is selected, this NAT rule matches a
policy with source address 10.10.10.10, even though it doesn't refer to a object name because they have
the exactly the same IP range. This is a useful option if you make use of supernet addresses that would
match many address objects.
l When you select Object Values, FortiConverter generates policies based on NAT rules that have address
values that fall anywhere in the range specified by a policy (overlap).
For the example above, when Object Values is selected, the NAT rule that translates the object
"address1"(IP 10.10.10.10) to "200.200.200.200" matches both policy2 and policy3.
Object Values generates the most accurate matching of NAT rules and policies, but in most cases, it also
generates more NAT policies.
The FortiConverter application allows you to create separate folders for your conversions.
To add a folder
1. Click the New Folder option from the menu on the left.
2. Enter a name for your new folder and press OK.
1. Select a conversion.
2. Click the Change Folder button, located at the bottom.
3. Select a folder for your conversion and press OK.
Error Messages
If an error occurs, FortiConverter inserts error messages and warnings into the conversion output file config-
all.txt.
These warnings aren't inserted in any configuration branch files.
Undefined objects
Interface
This warning means the physical interface of a vlan interface isn't specified.
Zone
Service
Service group
User
VIP
VPN phase1
This error occurs when the source configuration provides an address name for the remote-gw field. The remote-
gw field should be an IP address.
# Warning: Please reset the pre-shared key.
All pre-shared keys are set to "123456" in the converted VPN object, if the password in source config is
encrypted. Users should reset the pre-shared keys.
VPN phase2
Policy
This error means there are multiple items in the application list. There should be only one item in the
application list. If there are multiple items given in the source configuration, reset the items.
# Warning: Removed self traffic object <NAME> from address list
# Warning: Comment out self traffic policy - object name <NAME>
Check Point policies may contain "self traffic" policies, but those policies aren't needed in FortiOS.
# Warning: Comment out default drop all policy
There may be a "drop all" policy in the end of the policy list for some vendors. But FortiOS has its own "drop all"
policy by default, so the one in source configuration should be commented out.
Route static
# Warning: Please input field <device>
FortiOS requires the "device" (interface) route field.
Snmp sysinfo
# Warning: Community <NAME> has <NUMBER> hosts, beyond the limitation <NUMBER>.
The number of hosts in a community exceeds the maximum number supported by the FortiGate selected
model.
Other warnings
Name length
Route BGP
Route OSPF
Introduction
Although FortiConverter automatically converts as much of the source configuration as possible, in some
cases, your input is required to complete the conversion. The Tuning page automatically opens when the
conversion is complete. (Currently this feature is available only in the conversion of 3rd party
vendors.)
From the Tuning page, you can:
l View Conversion Summary on page 169
The Conversion Summary page displays a summary of the conversion, including VDOM mapping and Interface
mapping, as well as a device summary.
l To fine-tune the conversion, click FortiGate Configuration from the menu on the left, then select an
option.
l To download the final, converted configuration files, click Download Configurations, located on the
right.
l To download any configurations, from the home page, click Download.
The Tuning page has several features enabling you to view, add, edit, and delete your various firewall objects.
A list of object categories loads in the menu bar, and a table of interface is displayed.
2. Select the object category you want to review.
A table containing information about that object category loads.
In the address, address group, service, and service group tables, some object rows are highlighted in
yellow. Highlighted rows indicate objects that were automatically created by the FortiConverter tool during
the conversion process. You cannot find the definition for these kinds of objects from the original inputted
configuration files.
To add an object
At the bottom of every object category table is a button that enables you to add a new object. The button's
name is dependent on which object category you want to add to. The directions below outline the steps to add
a new address.
1. At the bottom of the object table, click New Address.
A window loads, enabling you input information about the object you want to add.
2. Complete the fields as needed.
3. Click OK to save your changes.
To delete an object
1. In the VDOM information section, toggle the Enable VDOM wrapper switch.
Note: In order to enable the VDOM wrapper, the output requires at least two VDOMs. If the original
configuration only has one VDOM, you can manually add a new VDOM.
2. From the table of objects, select the object(s) you want to copy to another VDOM.
3. Right-click to view the context menu.
1. From the list of objects, select the object that you want to copy the CLI from.
2. Right-click to view the context menu.
You can output unreferenced objects from the address, address group, service, and service group categories.
To do so, you must move unreferenced objects from the unreferenced table to the converted objects table.
If you enable the "Discard unreferenced objects" option in the start page, FortiConverter scans each object and
checks whether it is referenced by policies, central NAT rules or other objects.
Rename an object
FortiOS sets different maximum characters length for object names. Object names that exceed the character
limit are known as overlengthed, and must be renamed before they can be uploaded to a FortiGate device. The
tuning summary table displays overlengthed objects numbers in red.
There are two ways see which objects are marked as overlengthed. You can:
This feature helps you to find out duplicate addresses, services, groups which have the same content, and
merge them into a single object.
To merge duplicate objects:
1. Click Find Duplicate in the tuning page. This feature is available for addresses, address groups, services
and service groups.
2. Duplicate objects would be shown in the pop-out window.
5. There is a droplist in the bottom of the window. Users can either select one of the name of the duplicate
objects, or type a new name in the box.
6. Click Merge, and all the duplicate objects would be unified into the specified name.
7. After the merging is complete, the detail window would be closed and back to the duplicate table window.
The record of this merging would be created and all the merging records would be shown in the merging
history at the bottom.
There are 2 modes to show policies in FortiOS: "Interface Pair View" and "By Sequence".
"Interface Pair View" categorizes policies by their source and destination interfaces, so it is more straight
forward to manage.
However, "Interface Pair View" can only be used when all the policies contain only one interface in both source
and destination interface fields. If there are multiple interfaces in a converted policy, "Interface Pair View Split"
can split the policy into equivalent policies with single interface.
Import Configuration
Before REST API imports, FortiConverter needs to connect to FortiGate devices first. The connected devices
can be used as the source devices of FortiGate migration or the target devices of REST API imports. Please
follow the steps below to connect your devices to FortiConverter.
Please note that the devices with FortiOS v5.2 or older are not valid devices for REST API feature because less
REST API are supported in those FortiOS versions.
1. Go to the FortiConverter dashboard and click the tab Device in the left side.
4. Click Test Connection to see if the device can be connected and logged in successfully. Click OK to save
the device information.
FortiConverter can use REST API provided by FortiOS to import the converted objects from 3rd party vendors
into your FortiGate.
Start Installation
1. In the tuning page of the conversion, click Install Config at the top-right corner. This button would exist
only when there is at least one connectable device saved in FortiConverter.
2. Select the device to be imported and click Connect.
3. Click One-Click Install to start importing.
Multiple VDOM: If there are multiple VDOMs in the converted configuration, users can select the VDOM
to be imported. When selecting to import "All VDOMs", all VDOMs would be created in the connected
device, and all objects would be imported.
Single VDOM: When users select a single VDOM, an option "Import To Root" would show up. When this
option is enabled, the objects in the VDOM would be imported to the root VDOM of the connected device.
Otherwise, the VDOM would be created.
Root VDOM: If the converted result has only the root VDOM, the options above would not show up.
Special Case: In Snort conversion, FortiConverter would detect the VDOM in the connected device
automatically, and users can select the IPS custom rules are imported to which VDOM.
4. View the installation logs and wait for the importing to be completed.
5. To interrupt the installation, click Stop Importing to stop the installation.
6. Download Logs can be clicked to download the log file of importing. The CLI of failed objects would be
printed in the file, and user can copy and paste the CLI into the terminal of the device to see what error
occurs.
When the REST API import is finished, the statistic of imported objects would be shown in the table of
conversion summary page.
By clicking the number in the Import Failed column, the failed objects would be listed in a table. In the table of
each kind of object, the import result would be shown in the right column.
Fortinet also recommends you not to import the file config-all.txt directly, but import each divided
configuration such as config-system-interface.txt and config-firewall-address.txt
separately instead. This makes troubleshooting easier if an error occurs.
Because you can't successfully import a section of configuration that references an object that doesn't already
exist in the configuration, ensure that you import the configuration sections in their original order. For example,
you typically import polices last because they reference interfaces, addresses, users, services, IPsec phase1s,
security policies, and so on. If these objects are missing, FortiGate doesn't accept the policy.
CLI debugging
To make troubleshooting easier when there are import errors, before you import sections, enable CLI
debugging.
By default, CLI debugging is level 3. This is the level to use under normal conditions.
You can use this command to view the current debug level:
# diagnose debug info
For the configuration importing process, the appropriate debug level is 8. Use this command to change the
debug level:
diag debug enable
diag debug CLI 8
When the import process is complete, use this command to return the debug level to the default (3):
diag debug reset
Importing process
Import the sections of the conversion output systematically. For each section you import, check for import
failures in the web UI Script Execution History. Use CLI debugging to diagnose and fix any errors. When the
import is successful, continue with to next section of the configuration.
When you save this configuration as a file and import it, the Failure status indicator shows:
0: next
0: end
0: config firewall addrgrp
0: edit "Test-Addresses"
-3: set member "Test1" "Test2" "Test3"
1: next
0: endwrite config file success, prepare to save in flash
The error code -3 indicates that FortiGate did not find the object and the return code 1 indicates that an error
occurred.
Notice that FortiGate creates the address objects Test1 and Test2. The failure status only relates to the
address group.
When you fix the script by adding the missing Test3 object and import it again, the Success status indicator
shows.
When the configuration is fixed, all return codes in the CLI debugging are 0, indicating no errors.
0: config firewall address
0: edit "Test1"
0: set subnet 1.1.1.1 255.255.255.255
0: next
0: edit "Test2"
0: set subnet 1.1.1.2 255.255.255.255
0: next
0: edit "Test3"
0: set subnet 1.1.1.3 255.255.255.255
0: next
0: end
0: config firewall addrgrp
0: edit "Test-Addresses"
0: set member "Test1" "Test2" "Test3"
0: next
0: endwrite config file success, prepare to save in flash
The example in the procedures uses FortiManager 5.2 and global policies and objects. The procedures are
similar for environments that don't use the global feature.
To configure FortiManager
On FortiManager, enable the ADOM feature and create an ADOM for each source domain that you want to
migrate.Ensure that all the ADOMs (including the global ADOM) use the same version of FortiOS.
Running scripts
With the exception of config-system-session-helper, you run all scripts using the Policy Package,
ADOM Database script target.
You run the config-system-session-helper script on the device database to set device-level settings.
If the global folder contains a config-system-session-helper script, review its contents. In most
cases, it isn't required because the global policies and objects configuration doesn't contain devices. You can
add any configuration in this script to session helper scripts for each domain that uses the global objects.
However, in most cases, the domain-level script also contains these settings.
9. When you have imported all the objects, use the same procedures to import and run the policy scripts
using the firewall policy configuration files located in the Global\FMGR\Policy folder, which contains a
folder for each policy package. don't import the config-all file.
10. When the policy package is correct, assign it to your ADOM. By default, FortiManager assigns the selected
policy package to all policy packages in the ADOM.
11. To complete the ADOM assignment, on the Assignment tab, click Assign.
12. When the process of assigning the polices and objects is complete, on the Policies & Objects tab, select
the ADOM to review the policies.
13. To import the domain-level polices and objects into your ADOM, on the Device Manager tab, select the
ADOM, and then go to Scripts > Script.
14. Repeat the procedure for importing the object and policy scripts with the contents of the <domain_
name>\FMGR\FWObject and <domain_name>\FMGR\Policy folders. Import the objects first, but
don't import the config-system-session-helpers script. For the script target, select Policy
Package, ADOM Database.
Ensure you check for error messages that FortiConverter inserted as comments and make any required
corrections. For more information, see To troubleshoot script import and execution errors on page 192.
15. Run each imported object script. For Run script on, select Policy Package, ADOM Database. Correct
any errors that prevent the script from executing. For more information, see To troubleshoot script import
and execution errors on page 192.
If there are many address objects, you import several scripts because the address file is indexed to keep
the files at a manageable size.
16. Before you run the policy scripts, create new policy packages that correspond to each policy package folder
in <domain_name>\FMGR\Policy. On the Policy & Objects tab, right-click on the default policy
package and choose Policy Package Create New.
Clear the Clone Policy Package option.
Because global polices and objects were assigned to all policy packages in this ADOM, they are
automatically part of each new policy package. The next import task adds the domain-level policies.
17. On the Device Manager tab, run each imported policy script. For Run script on, select Policy Package,
ADOM Database. When you are prompted for a policy package, select the name of the appropriate
package, which you created earlier.
Correct any errors that prevent the script from executing. For more information, see To troubleshoot script
import and execution errors on page 192.
To troubleshoot script import and execution errors
FortiConverter inserts any error messages in output scripts as comments.
In some cases, the script can't run unless you edit it to correct the errors. Double-click the name of the script in
the list of scripts to edit it.
In the following example, the address objects that generate the errors are assigned using the global objects
and can be ignored.
If an error occurs during script execution, go to System Settings > Task Monitor to view the error message
and identify the error. Look for "Failed to commit to DB" in the task information.
Unlike a FortiGate import, which creates an object up to the point of failure, FortiManager creates no objects or
policies if the script execution fails.
If you identify the cause, correct it in your script.
For example, the following error was generated by a firewall policy that contained both IPv4 and IPv6 objects,
which FortiOS doesn't support and FortiConverter did not correct.
To resolve the error, determine which object precedes the error, locate it in the script, and correct any
configuration errors. In this example, the configuration doesn't specify the subnet. If an object you don't want to
use generates the error, you can delete it from the script or use # (hash) at the start of the appropriate lines to
convert them to comments. Then, try to run the script again. Repeat the troubleshooting process until the script
execution is successful.
If there is no obvious error in the output, try dividing the script into two smaller scripts. If only one script runs
successfully, you have narrowed the focus of your troubleshooting to the content of the failed script. To divide a
script, right-click it and select Clone. Using the policy numbers to determine and keep track of which policies
you delete, edit the files so that they each contain a different section of the script. Then, run both scripts.
Dividing scripts into two or more smaller scripts is also useful if you suspect the length of a script is causing the
execution to fail. Scripts that are too long fail without generating an error message.
In some cases, if a script fails, Fortinet recommends that you create a new script instead of editing or deleting
it, because sometimes files can remain after you delete it. If you preserve the failed script, you can review it
and the error it generates later. In the following example, the following config user server objects took
several attempts to run successfully.
In some cases, output files are split into smaller, indexed files to make it easier to import them.
If a configuration contains nested groups, script execution can fail because groups defined in one file are
dependent on groups defined in another file.
If a script fails because of a missing dependency, remove the object that causes the failure. When you have
finished importing the scripts for the object type, delete the script you edited and import it again. Then, run the
script without editing it. Because the dependency is now included in the imported configuration, the unedited
script can execute successfully.
Troubleshooting
For any questions not covered in this content, contact FortiConverter customer support at fconvert_
feedback@fortinet.com.
Licensing Issues
FortiConverter is a single-user application. Using more than one user account may invalidate the Hardware ID.
If multiple users require the application, Fortinet recommends that you install it using a single, shared account,
on a remotely accessible host.
l A hardware layer change generates a new hardware identifier. For a physical host, this could occur when
installing the application on a new laptop, or installing a memory extension or a new network card. For a
virtual host, such as VMware, the hardware identified may change because of an update in the
virtualization software, or because of a change to the virtual hardware configuration for that virtual host.
l Windows updates might affect the hardware ID, particularly .Net framework updates.
l If your license does change, contact customer services, cs@fortinet.com, include your serial number,
previous hardware identifier, and new hardware identifier. Customer services can update your FortiCare
records and you can then download the replacement license from the support portal.
In most cases, when FortiConverter has an internal problem, the application displays a message in the web UI
and adds an error message to a log file.
The logs capture all the conversion steps, including initialization, parsing (two logs), conversion, and reporting.
If the log indicates that FortiConverter encountered an internal error, or for help resolving other errors, contact
the FortiConverter team at fconvert_feedback@fortinet.com.
Conversion Logs
Log location
The log of FortiConverter is stored at the following location ("AppData" is a hidden folder):
C:\Users\<Windows user name>\AppData\Roaming\Fortinet\FortiConverter
Log file "syslog.txt" is the log file of the application.
In many cases, disabling NAT merge options can resolve an application crash that occurs during a conversion.
For example, for a Cisco PIX conversion, on the wizard Start Option page, click More, and then for each type of
NAT, select Off.
See the FortiConverter logs for detailed information about the cause of a crash. See Accessing conversion logs
on page 195.