Saving the Check Point source configuration file from VSX Gateway
When VSX feature is enabled and multiple Virtual Systems are part of the VSX gateway, FortiConverter supports migrating multiple Virtual Systems with one conversion.
1. Both Checkpoint Smart Center & VSX Gateways(VS) are in version R80.10 & Later
2. Both Checkpoint Smart Center & VSX Gateways(VS) with version before R80.10
1. Both Checkpoint Smart Center & VSX Gateways(VS) are in version R80.10 & Later
- Rule definitions – "*.csv" or "*.zip". The Policy and NAT CSV files can be exported from the Smart Console (refer screenshot below). Before exporting, please display all the columns of the rule tables to ensure that all necessary information is exported.
- Object definitions – "objects_5_0.C" (Check Point NG/NGX) or "objects.C" (Check Point 4.x) contains the firewall's object definitions.
- Route information (optional) – Helps FortiConverter to correctly interpret the network topology being converted. To get this data, enter the route print command (for example, "netstat -nr") on the firewall node and then copy and paste the output into a plain text file. Codes in the output indicate if the route is a directly connected interface, a host route, a network route, and so on. The output varies by the platform.
- User and user groups file (optional) – "fwauth.NDB"
If only one VSYS needs to be converted, or all VSYS’s share one policy package, input the CSV file exported from the policy package.
If multiple VSYSs need to be converted in one shot, and they use multiple policy packages, input a ZIP file which contains multiple CSV files, each one exported from a policy package. Please see Input multiple CSV files as multiple policy packages for more information.
File Path
File | File name |
Location |
Path or Command |
---|---|---|---|
Object definitions | objects_5_0.C (Checkpoint NG/NGX) |
SmartCenter |
—or—
|
objects.C (Checkpoint 4.x_) |
|
||
Policy and NAT files |
NA |
SmartConsole GUI |
|
User and user Group file | fwauth.NDB |
SmartCenter |
$FWDIR/conf/
—or—
|
Route | NA |
Gateway |
netstat -nr
|
Export Policy file (CSV Format):
Export Nat file (CSV Format)
Input multiple CSV files as multiple policy packages
When multiple Virtual Systems are converted in one shot, and they use multiple policy packages, we need multiple firewall rule CSV files and multiple NAT rule CSV files. To input multiple CSV files into FortiConverter, we need to archive the CSV files into ZIP files. Please follow the steps below to prepare the ZIP files:
Firewall rule ZIP file:
- Export the firewall rules in each package into a CSV file.
- Use the package name as the file name of each firewall rule CSV file.
- Archive all the firewall rule CSV files into a ZIP file as the policy file input.
NAT rule ZIP file:
- Similarly, export the NAT rules in each package into a CSV file.
- Use the package name as the file name of each NAT rule CSV file.
- Archive all the NAT rule CSV files into another ZIP file as the NAT file input.
For each firewall rule and NAT rule CSV file, FortiConverter uses its file name as the policy package name of the rules inside. Therefore, the firewall rule CSV file and NAT rule CSV file from the same policy package should use the same name. Although they are archived in two separate ZIP files, FortiConverter can recognize that they belong to the same package after parsing.
For example, if there is a file "package1.csv" in the firewall rule ZIP file, and there is also a file "package1.csv" in the NAT rule ZIP file, then FortiConverter would categorize those firewall rules and NAT rules into a package named "package1".
2. Both Checkpoint Smart Center & VSX Gateways(VS) with version before R80.10
- Object definitions – "objects_5_0.C" (Check Point NG/NGX) or "objects.C" (Check Point 4.x) contains the firewall's object definitions.
- Policy rulebases – "*.w" or "rulebases_5_0.fws". The file name is "<package name>.W" (default "Standard.W") or "rulebases_5_0.fws".
- Route information (optional) – Helps FortiConverter to correctly interpret the network topology being converted. To get this data, enter the route print command (for example, "netstat -nr") on the firewall node and then copy and paste the output into a plain text file. Codes in the output indicate if the route is a directly connected interface, a host route, a network route, and so on. The output varies by the platform.
- User and user groups file (optional) – "fwauth.NDB"
File paths:
File |
File name |
Location |
Path or Command |
---|---|---|---|
Object definitions |
objects_5_0.C (Checkpoint NG/NGX) objects.C (Checkpoint 4.x_) |
SmartCenter |
—or—
|
Policy rulebases |
rulebase_5_0.fws <package name>.W |
SmartCenter |
|
User and user Group file |
fwauth.NDB |
SmartCenter |
—or—
|
Route |
NA |
Gateway |
|