🎯 Welcome to ASA to FTD Migration Lab
💡 Key Learning Objective
Master the migration from traditional ASA high availability pairs to next-generation FTD firewalls while maintaining ICS security compliance and zero-downtime operations.
🎓 What You'll Learn
- Design and implement FTD high availability clusters for ICS environments
- Migrate security policies from ASA to FTD with minimal service disruption
- Configure Purdue security model zones and access controls on FTD
- Implement advanced threat protection and intrusion prevention
- Establish monitoring and logging for industrial security compliance
- Validate security posture and performance post-migration
- Troubleshoot common migration challenges and FTD configuration issues
🏭 Lab Environment Overview
This lab simulates a typical industrial control system (ICS) environment following the Purdue security model with three critical security zones requiring high availability firewall protection. You'll work with existing ASA HA pairs protecting Level 2 (Control), Level 3 (Operations), and Level 4 (Enterprise) networks, migrating them to modern FTD platforms while maintaining operational continuity.
🚀 Ready to Begin?
Click through the tabs above to progress through the migration journey. Each section builds upon the previous, so complete them in order for the best learning experience.
🏗️ Network Topology & Architecture
📐 Current ASA Deployment
Internet | [Edge Router] | ┌─────────────────────┐ │ ASA Pair #1 (HA) │ ← Level 4 (Enterprise DMZ) │ Primary: 10.1.1.2 │ │ Secondary: 10.1.1.3 │ └─────────────────────┘ | ┌─────────────────────┐ │ ASA Pair #2 (HA) │ ← Level 3 (Operations) │ Primary: 10.2.1.2 │ │ Secondary: 10.2.1.3 │ └─────────────────────┘ | ┌─────────────────────┐ │ ASA Pair #3 (HA) │ ← Level 2 (Control) │ Primary: 10.3.1.2 │ │ Secondary: 10.3.1.3 │ └─────────────────────┘ | [PLC/HMI/SCADA Networks]
🎯 Target FTD Deployment
Internet | [Edge Router] | ┌─────────────────────┐ │ FTD Pair #1 (HA) │ ← Level 4 (Enterprise DMZ) │ Primary: 10.1.1.4 │ + Advanced Threat Protection │ Secondary: 10.1.1.5 │ + IPS/Malware Detection └─────────────────────┘ + File Analysis | ┌─────────────────────┐ │ FTD Pair #2 (HA) │ ← Level 3 (Operations) │ Primary: 10.2.1.4 │ + Industrial Protocol Inspection │ Secondary: 10.2.1.5 │ + Anomaly Detection └─────────────────────┘ + Asset Discovery | ┌─────────────────────┐ │ FTD Pair #3 (HA) │ ← Level 2 (Control) │ Primary: 10.3.1.4 │ + Strict Access Control │ Secondary: 10.3.1.5 │ + Protocol Validation └─────────────────────┘ + Real-time Monitoring | [PLC/HMI/SCADA Networks]
🔴 Current ASA Limitations
- Basic stateful inspection only
- Limited application awareness
- No advanced threat protection
- Manual policy management
- Limited industrial protocol support
🟢 FTD Advantages
- Next-generation firewall capabilities
- Advanced malware protection
- Industrial protocol inspection
- Centralized management via FMC
- Real-time threat intelligence
💡 Architecture Key Points
The Purdue model's layered approach requires different security policies at each level. Level 2 (Control) needs the strictest controls with protocol validation, Level 3 (Operations) requires industrial protocol awareness, and Level 4 (Enterprise) needs advanced threat protection for business systems integration.
📋 Prerequisites & Requirements
🔧 Hardware Requirements
FTD Hardware Specifications
- Level 4 (Enterprise): FTD 2120 or higher (2Gbps throughput)
- Level 3 (Operations): FTD 1140 or higher (1Gbps throughput)
- Level 2 (Control): FTD 1120 or higher (750Mbps throughput)
- Management: FMC 1000v or physical FMC appliance
📚 Knowledge Prerequisites
- Understanding of Cisco ASA configuration and management
- Familiarity with high availability concepts and failover mechanisms
- Knowledge of industrial control systems and operational technology
- Understanding of the Purdue security model and zone segmentation
- Basic knowledge of SCADA, PLC, and HMI systems
- Network security principles and access control concepts
- Experience with Cisco CLI and configuration management
🛠️ Software Requirements
Software Versions
- Current ASA: Firmware 9.2.10 (as specified)
- Target FTD: Version 7.2.0 or later
- FMC: Version 7.2.0 or later
- Migration Tools: Cisco ASA to FTD Migration Tool 2.1
🔑 Access Requirements
Administrative Access
- Administrative access to all ASA devices
- Console access to FTD devices
- FMC administrator credentials
- Network change approval and maintenance window
- Backup and rollback procedures documented
📊 Migration Planning & Strategy
🗓️ Migration Approach
Parallel Migration Strategy (Recommended)
Deploy FTD pairs alongside existing ASA pairs, allowing for thorough testing and gradual traffic cutover. This approach minimizes risk and allows for quick rollback if issues arise.
🔄 Migration Phases
- Phase 1: Deploy and configure FTD Level 4 (Enterprise)
- Phase 2: Deploy and configure FTD Level 3 (Operations)
- Phase 3: Deploy and configure FTD Level 2 (Control)
- Phase 4: Parallel testing and validation
- Phase 5: Traffic cutover and ASA decommission
Sequential Migration Strategy
Replace ASA pairs one at a time, starting from the enterprise level and working down to control level. Higher risk but uses fewer resources during migration.
Staged Migration Strategy
Migrate specific services and VLANs gradually while maintaining ASA pairs for critical operations. Longest timeline but lowest operational risk.
📋 Pre-Migration Assessment
Current State Analysis
Before beginning migration, conduct a thorough analysis of your current ASA configurations:
🔍 Migration Readiness Checklist
- Network topology documented and validated
- Current ASA configurations exported and analyzed
- FTD hardware procured and racked
- FMC deployed and accessible
- IP addressing scheme planned for FTD devices
- Maintenance window scheduled and approved
- Rollback procedures documented and tested
- Stakeholder communication plan in place
💡 Planning Best Practice
Always start with the least critical systems first to gain experience with the migration process. However, in ICS environments, Level 2 (Control) is often the most critical, so extensive testing at Level 4 (Enterprise) is essential before proceeding.
⚙️ Implementation Steps
🎛️ FMC Initial Setup
Configure Firewall Management Center
Start by setting up the FMC with proper licensing and initial configuration:
🔥 FTD Device Registration
Register FTD Devices with FMC
Register each FTD device with the management center. This example shows Level 4 (Enterprise) pair registration:
🔗 High Availability Configuration
Configure FTD HA Clustering
Set up high availability between FTD pairs for each Purdue level:
🛡️ Security Policy Migration
Migrate Access Control Policies
Convert ASA access-lists to FTD access control policies with enhanced capabilities:
🏭 Industrial Protocol Configuration
Configure ICS Protocol Inspection
Enable deep packet inspection for industrial protocols:
🔍 Intrusion Prevention Tuning
Configure ICS-Specific IPS Policies
Create intrusion prevention policies tailored for industrial environments:
📈 Traffic Cutover Process
Coordinated Traffic Migration
Execute the actual traffic cutover from ASA to FTD:
🔄 Rollback Procedures
Emergency Rollback Process
If issues arise, quickly rollback to ASA configuration:
- Immediately notify operations team
- Revert upstream routing to ASA addresses
- Verify ASA HA pair is still operational
- Test critical SCADA communications
- Document issues for post-mortem analysis
💡 Implementation Success Factor
Success depends on thorough pre-testing and having experienced ICS personnel monitoring critical systems during cutover. Never rush the migration timeline for convenience - industrial safety must always be the priority.
🔧 Troubleshooting Guide
🚨 Common Migration Issues
Registration Failures
Issue: FTD device fails to register with FMC
Solution:
HA Failover Issues
Issue: FTD HA pair not establishing proper synchronization
Industrial Protocol Inspection Problems
Issue: SCADA communications blocked after FTD deployment
🔍 Performance Troubleshooting
Latency and Throughput Issues
Industrial systems are sensitive to latency changes. Monitor and optimize:
Policy Conflicts and Overlaps
Issue: Conflicting access control rules causing unexpected behavior
💡 Troubleshooting Best Practice
Always test with non-critical traffic first. Use packet captures to compare ASA vs FTD behavior for identical traffic flows. Keep detailed logs of all changes and their impacts on industrial systems.
✅ Verification & Testing
🔍 Connectivity Verification
Basic Connectivity Tests
Verify basic network connectivity across all Purdue levels:
🏭 Industrial Protocol Testing
SCADA/HMI Functionality Verification
Test critical industrial communication protocols:
Modbus TCP Testing (Port 502)
DNP3 Testing (Port 20000)
📊 Performance Validation
Latency and Throughput Testing
Validate that FTD performance meets ICS requirements:
🛡️ Security Function Verification
Advanced Threat Protection Testing
Verify advanced security features are working correctly:
🔄 Failover Testing
HA Failover Validation
Test high availability failover scenarios:
🧠 Knowledge Check
Test your understanding of ASA to FTD migration concepts and best practices: