Migrating from Check Point to FortiGate: Step-by-Step Guide
- Mar 20
- 3 min read

requires careful planning due to differences in architecture, policies, and configuration styles. Below is a structured approach to ensure a smooth transition.
Step 1: Pre-Migration Planning
Assess the Current Check Point Configuration
Collect existing configurations:
Run the following command:
Export firewall policies, NAT rules, VPN settings, objects, and routes.
Use WinSCP to log in to Check Point and copy configuration files to the local PC.

Extract key configurations:
Object groups: Copy the required object groups.
To COPY Object group
Policies: Copy all user and identity policies.
To Copy policy -


Routes and interfaces:
Extract routing information:
Extract interface configuration:



Identify unused rules and objects to clean up before migration.

Determine FortiGate Requirements
Check hardware/software compatibility.
Decide on a GUI-based migration tool or a manual approach.
Verify license and subscription requirements (IPS, AV, Web Filtering, etc.).
Backup Check Point Configuration
Use Check Point CLI to save configurations:
Use Check Point CLI: clish -c "show configuration" > config.txt

Export full configuration and policy using Check Point SmartDashboard.
Step 2: Convert Check Point Configuration to FortiGate
Option 1: Using FortiConverter Tool (Recommended)
Download and install FortiConverter from Fortinet’s support site.
Download from this link- FortiConverter Service for Firewall Migration

Select Check Point as the source firewall.

Upload configuration files extracted via WinSCP.


Import the Check Point configuration files into FortiConverter.
Click on Next-

Review and validate the converted rules and objects, including:
Interfaces
NAT rules
Gateways
Cluster members
Objects
Policies


Map interfaces and verify policies.

Mapping interface as well if anything incorrect -

Export the FortiGate configuration.

Log into FortiGate and import the converted configuration.

Verify the applied configuration before deployment.

Option 2: Manual Migration (If FortiConverter is Not Available)
Objects and Address Groups
Convert objects:
Convert host, network, and group objects into FortiGate format: config firewall address
edit "Web_Server"
set subnet 192.168.1.10 255.255.255.255
next
Convert address groups:
Add address groups: config firewall addrgrp
edit "Web_Servers"
set member "Web_Server1" "Web_Server2"
Next
Firewall Policies
Translate access control rules:
Translate Check Point access control rules into FortiGate policies: config firewall policy
edit 1
set srcintf "port1"
set dstintf "port2"
set srcaddr "LAN_Network"
set dstaddr "ANY"
set action accept
set schedule "always"
set service "ALL"
next
NAT Configuration
Convert NAT rules:
Convert Check Point NAT rules: config firewall ippool
edit "Web_Server_NAT"
set startip 203.0.113.10
set endip 203.0.113.10
next
Apply NAT policies:
Apply NAT policy: config firewall policy
edit 2
set srcintf "wan1"
set dstintf "port1"
set srcaddr "ALL"
set dstaddr "Web_Server"
set action accept
set nat enable
set ippool enable
set poolname "Web_Server_NAT"
Next
VPN Migration
Extract VPN configurations from Check Point.
Configure IPSec VPN on FortiGate: config vpn ipsec phase1-interface
edit "Site-to-Site-VPN"
set interface "wan1"
set peertype any
set remote-gw 198.51.100.2
set psksecret mysecretkey
next
Configure IPSec VPN on FortiGate:
Configure phase 2 settings.
Route Migration
Export static routes from Check Point:
Export static routes from Check Point: netstat -rn
Configure static routes on FortiGate:
Configure on FortiGate: config router static
edit 1
set dst 10.10.10.0/24
set gateway 192.168.1.1
next
Step 3: Testing and Validation
Deploy the configuration in a test environment.
Validate firewall rules by simulating real-world traffic.
Check logs and debugging to confirm functionality:
Compare old and new behavior to ensure smooth traffic flow.
Step 4: Cutover and Go-Live
Schedule migration during maintenance hours.
Switch traffic to FortiGate and monitor for anomalies.
Ensure logging and monitoring tools are properly configured.
Optimize performance by enabling security features (IPS, Web Filtering, etc.).
Step 5: Post-Migration Activities
Monitor traffic logs for anomalies.
Fine-tune policies based on post-migration insights.
Conduct a security audit to ensure compliance.
Conclusion
Migrating from Check Point to FortiGate involves careful planning, configuration conversion, and validation. Using FortiConverter simplifies the process, but a manual approach is also feasible with attention to detail. Always test before going live to prevent disruptions.
Art last complete reading post take a quizz to check your knowledge
Which tool is recommended for automating the migration process from Check Point to FortiGate?
SmartDashboard
FortiAnalyzer
FortiConverter
WinSCP
Comments