Sign in Get started

Fortinet FortiGate to Palo Alto Migration

Moving from FortiOS to PAN-OS? NetConverter's comprehensive multi-step pipeline automates the conversion of firewall policies, VIPs, address objects, and service definitions with 95%+ accuracy and confidence scoring.

Why FortiGate → Palo Alto Is Mostly About NAT

If you're moving from FortiOS 7.4 to Palo Alto PAN-OS 11.2, the security policy model translates cleanly — both vendors use zone-based policy with named address/service objects. The hard part is NAT. FortiGate supports two NAT modes: per-policy NAT (NAT enabled inside a firewall policy) and central NAT (separate config firewall central-snat-map table). Most production FortiGates use a hybrid — central SNAT + per-policy DNAT via VIP objects. Translating to Palo Alto requires unifying these into PAN-OS's flat NAT policy table while preserving evaluation order.

The other migration killer: FortiGate VIP objects with port-forwarding (config firewall vip with portforward enable) need to split into Palo Alto destination NAT + service object pair. A FortiGate VIP forwarding tcp/8443 → 10.0.0.10:443 becomes (1) a PAN-OS address object for the public IP, (2) a service object for the original tcp/8443, (3) a service object for the translated tcp/443, and (4) a NAT rule chaining them. NetConverter handles this VIP-to-DNAT split automatically and validates the result with a packet-tracer simulation.

The Challenge of FortiGate to Palo Alto Migration

Policy Structure Differences

FortiGate uses policy IDs and interface-pair based rules, while Palo Alto uses zone-based security policies with different matching logic.

VIP to NAT Translation

Fortinet's VIP objects must be decomposed into Palo Alto address objects and NAT rules - a tedious manual process.

Service Definition Mapping

Custom services and service groups have different syntax and need careful mapping to preserve port definitions.

Address Object Conversion

Address objects, address groups, and wildcards need to be converted to Palo Alto's address object format.

How NetConverter Solves It

Vendor-Neutral Translation

Our comprehensive multi-step pipeline normalizes configurations to a unified format, enabling accurate translation between any vendor pair.

Intelligent Policy Migration

Policies are converted with proper zone mapping, maintaining security intent while adapting to Palo Alto's model.

Automated VIP Conversion

VIPs are automatically converted to the appropriate address objects and NAT rules with correct mappings.

Service Migration

All service objects and groups are converted with port definitions and protocols preserved accurately.

Complete Object Migration

Address objects, groups, and wildcards are converted with naming conventions maintained.

4-Tier Validation System

Every translation undergoes comprehensive validation: syntax correctness, semantic accuracy, vendor best practices compliance, and AI-assisted review.

Confidence Scoring

Each conversion includes a confidence score indicating translation quality, helping you prioritize review efforts and ensuring production readiness.

See Quick Convert Output in Action

Representative Quick Convert run for this migration path, showing the live NetConverter interface and the converted output preview engineers review before deployment.

NetConverter Quick Convert interface with source and converted output panels
Fortinet FortiGate (Source)Start Free Migration
config firewall address edit "DB_SERVER" set subnet 10.50.1.25 255.255.255.255 set comment "Database Server" next edit "APP_NETWORK" set subnet 10.50.2.0 255.255.255.0 next end config firewall service custom edit "MSSQL" set tcp-portrange 1433 next edit "MYSQL" set tcp-portrange 3306 next end config firewall policy edit 10 set name "App-to-DB-Access" set srcintf "app-zone" set dstintf "db-zone" set srcaddr "APP_NETWORK" set dstaddr "DB_SERVER" set action accept set service "MSSQL" "MYSQL" set logtraffic all next end
Palo Alto PAN-OS (Target)Start Free Migration
<!-- Address Objects --> <address> <entry name="DB_SERVER"> <ip-netmask>10.50.1.25/32</ip-netmask> <description>Database Server</description> </entry> <entry name="APP_NETWORK"> <ip-netmask>10.50.2.0/24</ip-netmask> </entry> </address> <!-- Service Objects --> <service> <entry name="MSSQL"> <protocol><tcp><port>1433</port></tcp></protocol> </entry> <entry name="MYSQL"> <protocol><tcp><port>3306</port></tcp></protocol> </entry> </service> <!-- Security Policy --> <security><rules> <entry name="App-to-DB-Access"> <from><member>app-zone</member></from> <to><member>db-zone</member></to> <source><member>APP_NETWORK</member></source> <destination><member>DB_SERVER</member></destination> <service> <member>MSSQL</member> <member>MYSQL</member> </service> <action>allow</action> <log-end>yes</log-end> </entry> </rules></security>

Migration Results

95%+
Accuracy
40x
Faster
<2min
Per Config
$0
For Most

Need Custom Development or Complex Migration Support?

For large-scale enterprise migrations, custom protocol requirements, or dedicated engineering support, our team is here to help.

Ready to Migrate?

Convert your Fortinet FortiGate configuration to Palo Alto PAN-OS in minutes. No credit card required.

Start Free Migration

Frequently Asked Questions

How does FortiGate central NAT translate to Palo Alto?
FortiGate's central-snat-map entries become Palo Alto NAT policies in source-NAT mode. Each entry's srcaddr + dstaddr + orig-port + nat-ippool maps to a PAN-OS NAT rule with bidirectional translation flagged appropriately. NetConverter preserves entry ordering — central SNAT order matters in FortiOS — and surfaces any rule that depends on FortiOS-specific behaviors (e.g., poolname referring to a depleted pool) in the Manual Steps section.
What happens to FortiGate VIPs with port forwarding during migration?
FortiGate VIPs with portforward enable are split into a Palo Alto address object + service object pair + NAT rule. A VIP forwarding tcp/8443 → internal:443 becomes a PAN-OS address object, a service object for the external port (tcp/8443), a service object for the internal port (tcp/443), and a destination-NAT rule chaining them. The simulate_flow tool validates the resulting packet path post-migration.
Does NetConverter handle FortiGate UTM profiles (AV, IPS, web filter)?
UTM profiles are flagged as out-of-scope for the policy-translation pipeline — they map to Palo Alto Security Profiles (Antivirus, Vulnerability Protection, URL Filtering) which require separate licenses and configuration. NetConverter generates the policy + NAT + object + interface migration; UTM profile re-creation goes to the Manual Steps section with KB references for each FortiOS-to-PAN-OS mapping.
How does FortiGate VDOM-based config translate to Palo Alto?
FortiGate VDOMs (Virtual Domains) map to Palo Alto vsys (virtual systems) on Panorama-managed deployments, or to separate device-groups when the target is Panorama. NetConverter detects VDOM boundaries during parsing and either produces one PAN-OS config per VDOM (multi-vsys output) or a Panorama device-group/template hierarchy. The choice is set in the YAML v2 config preset.
What's the typical FortiGate-to-Palo migration size and timeline?
Mid-size FortiGate (3,000–5,000 policies, 100+ VIPs, 50+ VDOM-aware objects): NetConverter Quick Convert completes in 8–12 minutes with 94–96% accuracy. Larger deployments (15,000+ policies across multiple VDOMs) take 25–40 minutes. Compare to manual migration via FortiConverter or FortiGate Migration Tool (FMT) which typically takes 3–8 weeks per device, or vendor consultancy at $50K–$200K per engagement.