Download PDF
Cloud NGFW for AWS
Migrate an AWS Network Firewall Policy to Cloud NGFW for AWS
Table of Contents
Expand All
|
Collapse All
Cloud NGFW for AWS Docs
Migrate an AWS Network Firewall Policy to Cloud NGFW for AWS
Migrate your AWS Network Firewall security policies to Cloud NGFW for AWS using the
Strata Cloud Manager policy migration workflow.
| Where Can I Use This? | What Do I Need? |
|---|---|
|
|
Cloud service provider (CSP) native firewall policy migration enables the automated
transfer of existing security policies from AWS Network Firewall to Cloud NGFW for
AWS through Strata™ Cloud Manager. The migration translates native cloud firewall
logic into next-generation firewall configurations so you can consolidate security
management without manually recreating rules.
The Policy Migration Engine processes your exported cloud configuration files and
converts them into reusable Strata Cloud Manager snippets. You associate these
snippets with folders linked to your Cloud NGFW resources, then push the
configuration to deploy the translated policy.
The following table outlines the AWS Network Firewall policy components supported for
automated migration to Strata Cloud Manager.
| Feature Category | Supported Components | Unsupported or Skipped Items |
|---|---|---|
| Rules |
| Suricata stateful rulegroups |
| Objects |
| — |
| Resource Groups | Rules referencing tag-based resources (such as EC2 instances and elastic network interfaces) via Dynamic Address Groups (DAG) | — |
- Verify that your Strata Cloud Manager instance operates in a supported region.
- In Strata Cloud Manager, go to the Overview page.In the General Information widget, locate the Region field.Confirm the region is one of the supported areas: Canada, India, United Kingdom, Singapore, or United States.Verify your user permissions in Strata Cloud Manager.
- Select Identity & Access Management from the Strata Cloud Manager menu.
Confirm your user role is Superuser, Network Administrator, or Security Administrator.Access the Migration Catalog.- Select ConfigurationOnboarding.In the Migration Catalog, select AWS Network Firewall.
Download the AWS export script.- In the AWS migration UI, click Download export scripts.
Follow the link to GitHub and download the Python script (for example, aws_network_policy.py).Save the file with a .py extension.Export the AWS Network Firewall policy.- Ensure Python 3 and the Boto3 library are installed on your local machine.In your AWS console, identify the AWS Network Firewall policy you want to migrate (for example, test-policy-1).Open a command-line interface and run the export script, providing your AWS profile, region, and policy name.
python3 aws_network_policy.py --profile your-aws-profile --region aws-region --policy your-policy-nameConfirm that a ZIP file containing the exported configuration is generated in your current directory.Upload and convert the AWS configuration in Strata Cloud Manager.- In the Strata Cloud Manager AWS migration UI, click Browse file and upload the generated ZIP file.
Click Analyze and convert.Review the summary of imported configuration objects, rule groups, and rules displayed in the UI.
Review and import the converted configuration.- Click Review converted configuration.Review the policy rules, address objects, and any skipped items with their reasons.
Review the Skipped Items list before completing your import. This section provides a breakdown of any rules or configurations that were not processed, along with the reason for each skip, such as unsupported syntax or duplicate entries. Reviewing skipped items ensures your security posture remains intact after migration.Enter a descriptive name in the Snippet Name field (for example, aws-demo-1).
Click Import to Strata Cloud Manager.
Review the migration summary and click Complete Migration.Strata Cloud Manager redirects you to the onboarding page. The migration has generated a snippet containing the security rule objects and address objects derived from your AWS Network Firewall policy.
Verify the migrated snippet.- Select ConfigurationNGFW and Prisma AccessSnippet.Locate and select your newly created snippet (for example, aws-demo-1).Review the Security Rules and Address Objects tabs to confirm the migration succeeded.Push the configuration to Cloud NGFW for AWS.
- For Configuration Scope, choose Folder.Select the folder associated with your Cloud NGFW for AWS instances.From the folder overview, click Add next to Snippets.Add your migrated snippet (for example, aws-demo-1) to the folder and adjust its priority as needed.Click Close.Click Push in the top-right corner.Enter a description and confirm the push to your Cloud NGFW resource.Monitor the job log to confirm the push succeeds.