Releases: CheckPointSW/SmartMove
SmartMove CLI support
Allow running SmartMove.exe from the CLI
-s | --source = Mandatory
-v | --vendor = Mandatory
SmartMove command usage:
SmartMove.exe [-s config_file_name] [-v vendor] [-t target_folder] [-d domain] [-n] [-l LDAP_Account_unit] [-k]
Options:
-s | --source full path to the vendor configuration file
-v | --vendor vendor for conversion (available options: CiscoASA, JuniperSRX, JuniperSSG, FortiNet, PaloAlto, Panorama)
-t | --target migration output folder
-d | --domain domain name (for CiscoASA, JuniperSRX, JuniperSSG only)
-n | --nat ("-n false" |" -n true" [default]) convert NAT configuration [enabled by default]
-l | --ldap LDAP Account unit for convert user configuration option (for FortiNet, PaloAlto, and Panorama only)
-k | --skip ("-k false" |" -k true" [default]) do not import unused objects (for FortiNet, PaloAlto and Panorama only) [enabled by default]
-f | --format format of the output file (JSON[default], TEXT)
Example:
SmartMove.exe -s "D:\SmartMove\Content\config.txt" -v CiscoASA - t "D:\SmartMove\Content" -n true -k false -f json
Cisco IPv6 support and SmartConnector improvements
- Cisco IPv6 support
- SmartConnector: (Python)
a. improve detection of sub-layers name duplications
b. improve group members list handling
c. improve networks with subnet-mask (IPv4 & IPv6)
d. Added support for Cisco Global rules support as shared sub-policy - Validate max packages number for processing according to sk154435 (Error code : 2000232 )
Panorama support and smartconnector support for ALL vendors
- Added Cisco Global rules support as shared sub-policy (supported only with Bash Scripts)
- Added Panorama support
- Added smartconnector support for ALL vendors
- Enhancement of Cisco NAT rules - validation of NAT duplication scenario
- Juniper time object support
- Bug fixes
SmartMove tool
Check Point SmartMove tool enables you to convert 3rd party database with firewall security policy and NAT to Check Point database.