Move a Configuration to a New Firebox

Applies To: Locally-managed Fireboxes

If you have a new locally-managed Firebox, trade up Firebox upgrade, or a replacement (RMA) Firebox, you can save the Firebox configuration settings from your existing Firebox to a local XML file and then migrate and save that configuration file to a new Firebox. Every Firebox uses an XML file to store configuration settings for recovery purposes, and you can use this XML file to configure a different Firebox.

The XML configuration file does not include Firebox-specific settings such as:

  • Feature key
  • Management user credentials
  • Certificates — The new Firebox uses different certificates than the original Firebox. For more information, go to Additional Migration Steps.

You cannot use a saved backup image (.fxi file) to migrate a configuration. A backup image includes device-specific information such as the serial number, certificates, and private keys. You will receive the error "import failed 400 invalid platform" if you try to use a backup image file. For more information on how to save your XML configuration file, go to Save the XML Configuration File from Original Firebox.

About WatchGuard Cloud

Before you move a locally-managed Firebox configuration to a new Firebox, consider migrating your new Firebox to cloud management with WatchGuard Cloud. WatchGuard Cloud provides a single user interface where you can monitor and configure all your WatchGuard products and services, and a multi-tier architecture that makes it easy to manage inventory across your accounts. For more information on how to migrate a locally-managed Firebox to WatchGuard Cloud, go to Migrate Fireboxes to WatchGuard Cloud.

Before You Begin

Before you begin, review the requirements, migration methods, and additional configuration steps that might be required to fully configure the new or replacement locally-managed Firebox.

Feature Keys

  • Make sure you have activated the new Firebox in your WatchGuard account and that you have downloaded a feature key for the device. For more information, go to Get the Feature Key for the New Firebox.
  • When you use Policy Manager to migrate a configuration to a new Firebox model that is different than the original model, you must import the feature key for the new Firebox model into the configuration and update the device name before you save the configuration to the new Firebox.

Firebox Model

  • Make sure you verify and update the device model in the configuration file before you save the configuration to the new Firebox. The Firebox Model information should match the model in the feature key of the new Firebox. The name is still the same as the original Firebox.
  • To verify or update the device model, name, and time zone, from Policy Manager, select Setup > System.

Fireware Version

  • If you use Policy Manager to migrate the Firebox configuration, note that some Firebox features are supported only in specific versions of Fireware or operate very differently in different versions of Fireware.
  • If the new Firebox runs a different Fireware version than your original Firebox, review and update the OS Compatibility setting in the configuration file to the OS version that the new Firebox uses. For more information, go to Configure Fireware OS Compatibility.

    If you have a brand new Firebox with factory-default settings, the version of Fireware that is installed on the Firebox is indicated on a sticker on the device.

Network Configuration

If you migrate and move a configuration to a different Firebox model with a different number or different types of network interfaces, make sure you verify your network configuration before you save the configuration to the new Firebox.

Make sure your internal and external networks and network interfaces are correctly configured for your network. An incorrect network configuration might result in the inability to connect to and administer the Firebox on the internal network or communicate with external networks. For more information, go to About Network Modes and Interfaces.

If the Fireboxes have different numbers of interfaces, you must use Policy Manager to migrate the configuration to the new Firebox. To use Fireware Web UI to migrate the configuration, the original and new Firebox must have the same number of interfaces.

  • If you migrate to a new Firebox model with fewer interfaces, take action to resolve potential issues such as the loss of a configured internal network or a VLAN that fails to pass traffic. From Policy Manager, open the configuration file, select Network > Configuration, and make sure the network configuration for each network interface is correct before you save the configuration to the new Firebox. For more information, go to About Network Modes and Interfaces.
  • If the new Firebox model has different types of interfaces (such as SFP ports) than the original Firebox, or if your original Firebox has an interface module installed, make sure you examine your network configuration to resolve any configuration issues with interface settings, such as external interfaces for SD-WAN, Multi-WAN, and failover functionality. From Policy Manager, open the configuration file, select Network > Configuration, and make sure the network configuration for each network interface is correct before you save the configuration to the new Firebox. For more information, go to About Network Modes and Interfaces.
  • For wireless Fireboxes, if you move the configuration from a Firebox with wireless capabilities to a Firebox model that does not have wireless interfaces, or from an older Firebox with a single radio configuration to a dual radio configuration, you must disable the wireless settings in the configuration before you save the configuration to the new Firebox. For more information on how to enable or disable wireless, go to Enable Wireless Connections.
  • If you move the configuration from a Firebox where your VPN Phase 2 proposals use traffic-based force key expiration to a new Firebox model that runs Fireware v2025.1.1 or higher, the default settings have changed to 1024 MB and a minimum value of 512 MB. Make sure you set an appropriate value based on the new default and minimum values to avoid frequent key expiration. Your current configuration values are preserved during a configuration migration from a previous Firebox model, but the new minimum values for traffic-based force key expiration will be enforced if you edit the VPN tunnel configuration and Phase 2 proposal settings. For more information, go to VPN Phase 2 proposal traffic-based force key expiration default setting changes in 2025.1.1 and higher in the WatchGuard Knowledge Base.

FireCluster

For a Firebox that is a FireCluster member:

Mobile VPN

  • If you use Mobile VPN with IKEv2 or Mobile VPN with SSL and the OpenVPN client, or the AuthPoint authentication server, you must complete additional steps after the migration so that VPN clients can connect to the new Firebox. For more information, go to Additional Migration Steps.

Certificates

  • The new Firebox uses different certificates than the original Firebox. If you use the default certificates, network clients do not automatically trust the certificate on the new Firebox.
  • If your original Firebox used a third-party certificate, and you want to use the third-party certificate on the new Firebox, go to Additional Migration Steps for instructions on how to import the third-party certificate.

Move Configuration to New Firebox

Follow these steps to migrate the configuration from the original Firebox to the new Firebox:

  1. Save a copy of the XML configuration file from the original Firebox
  2. Get the feature key for the new Firebox
  3. Migrate the XML configuration file to the new Firebox
  4. Perform additional migration steps

Save the XML Configuration File from Original Firebox

To save the configuration file from the original Firebox, you can use Policy Manager or Fireware Web UI.

Get JSON File for Firebox Cloud (AWS or Azure only)

For Firebox Cloud, you must also save a copy of the JSON file because it contains the interface information. Save the JSON file and the XML file in the same directory so that Policy Manager can open the configuration. For information about how to save a copy of the JSON file, go to Open the Configuration File for a Firebox Cloud Instance.

Get the Feature Key for the New Firebox

The feature key for the new Firebox is available for download after you activate the device in your WatchGuard account. For an RMA device, WatchGuard activates the new device. To get the feature key for the new device, use one of these methods:

Migrate the XML Configuration File to the New Firebox

To migrate a saved Firebox configuration to a new or replacement Firebox, you must review and update the XML configuration file from the original Firebox, and then save the configuration to the new Firebox.

  • You must use Policy Manager to migrate a configuration to a new Firebox model that has a different number of interfaces than your original Firebox, or migrate a configuration to a FireboxV virtual device or to Firebox Cloud.
  • To use Fireware Web UI to migrate the configuration, the original and new Firebox must have the same number of network interfaces.

You can use Policy Manager or Fireware Web UI to configure the new Firebox:

The new Firebox has a different MAC address than the original Firebox. Devices in your network that previously connected to the original Firebox might fail to communicate with the new Firebox until their old ARP entries for the Firebox IP address expire. This can take up to 60 minutes or require you to reboot the affected devices. If a device in your network has a static ARP entry configured for the Firebox IP address, you must change it on that device.

Additional Migration Steps

After you migrate the configuration to the new Firebox, you might have to make other configuration changes to the Firebox and network clients.

Related Topics

About Policy Manager

Administer the Firebox from Policy Manager

About Feature Keys