Migrate network
AWS Transform migrates VMware networks to AWS by translating your source environment configuration into AWS-equivalent network resources. AWS Transform analyzes your source network data and creates VPCs, subnets, security groups, NAT gateways, transit gateways, elastic IPs, routes, and route tables as needed. You can review and modify the generated network configuration before deployment. For deployment, you can either have AWS Transform deploy the configuration for you and analyze deployed network connectivity, or choose self-deployment—in which case AWS Transform generates Infrastructure as Code (IaC) in your preferred format: AWS Cloud Development Kit (AWS CDK) (AWS CDK), Landing Zone Accelerator (LZA), or HashiCorp Terraform.
To migrate your network, follow these steps:
Upload your source network file
Upload additional configuration files (optional, for RVTools environments)
Select a network topology
Select security groups mapping strategy
Review the generated VPC configurations
Generate a network diagram (optional)
Tag your network resources (optional)
Deploy your network
Note
For multi-account deployments, you must configure cross-account IAM roles and trusted access for AWS Organizations before starting the network migration. For more information, see Migration to multiple target accounts.
Step 1: Source network mapping
The network mapping process requires uploading a configuration file from your source environment. The tool you choose depends on your source network type:
-
Software Defined Networks (SDN): Import/Export for VMware NSX network virtualization or Cisco ACI config for Cisco Application Centric Infrastructure.
-
VMware vSphere networks: RVTools
. When using RVTools files, AWS Transform generates Amazon VPC configurations only. Security group configurations require additional input from firewall or software-defined network files. See Additional configuration files for more details. -
Networks based on firewall configuration data: Export files from Palo Alto Networks Firewall, Fortinet FortiGate Firewall, or Cisco ACI. For supported versions and extraction instructions, see Configuration file extraction.
-
Hybrid networks running both VMware and non-VMware workloads: Application mapping tools - modelizeIT.
-
Other file types: If your configuration file is not one of the supported formats listed above, AWS Transform will attempt to automatically convert it to a format that can be processed by the service. This conversion can take up to two hours depending on the file size and complexity.
Warning
The official RVTools site is https://www.dell.com/en-us/shop/vmware/sl/rvtools
AWS Transform creates VPCs from all source network segments, with each detected segment becoming its own distinct VPC. Network segmentation varies by source type:
-
vNetwork: AWS Transform groups VMs by vSwitch and VLAN. VLANs can appear under multiple vSwitches (except VLAN 0).
-
NSX networks: AWS Transform segments the network based on Tier-1 routers, grouping the routers and collecting their segments.
Step 2: Additional configuration files
For RVTools source environments, you can optionally upload additional configuration files to enable security group generation. Without additional configuration, no security groups will be generated for RVTools-based migrations.
AWS Transform supports the following additional configuration file types. Only one configuration file from one platform can be uploaded.
-
Cisco Application Centric Infrastructure (ACI): Network policy configurations
-
Palo Alto Networks: Firewall security policies
-
Fortinet FortiGate: Firewall security policies
When you upload a firewall or Cisco ACI file, AWS Transform generates network infrastructure and security groups. When you upload an RVTools file alone, AWS Transform generates network infrastructure only.
For supported versions and extraction instructions, see Configuration file extraction.
Step 3: Network topologies
During the network definition step, you select a network topology. You can choose the Isolated VPCs topology or the Hub and Spoke topology.
Important
For both topologies, AWS Transform does not open the communication to the internet. You must open it manually after taking appropriate security precautions.
Isolated VPCs
These are independent network environments that operate as separate units within AWS. VPCs maintain complete network isolation, with no built-in communication pathways between them. This separation provides the highest level of network boundary protection. You can connect the VPCs through specific networking configurations if needed.
Hub and Spoke
In this model, an AWS Transit Gateway created by AWS Transform acts as the hub that connects to multiple workload VPCs (the spokes). During network convergence, AWS Transform creates a spoke VPC for each detected source network segment.
AWS Transform creates three specialized VPCs for traffic management and security:
Inspection VPC: Where you establish the firewall that inspects the traffic. You can create firewall rule configurations here to modify VPC connections.
Inbound VPC: For all traffic from the public internet (north-south). Includes an internet gateway.
Outbound VPC: For all traffic to the public internet. Has an internet gateway, a Network Address Translation (NAT) gateway and an elastic IP address.
AWS Transform automatically associates all spoke VPCs with the default association route table and propagates routes from all spoke VPCs to the default propagation route table. This automation creates routing paths without manual configuration, though traffic flow remains subject to security group permissions.
If you want fine-grained control over the communication between the VPCs, choose the Isolated VPCs option and modify the generated network to create the specific communication paths you require.
Step 4: Security group mapping
AWS Transform creates security groups based on your source environment configurations. AWS Transform converts security policies, security policy rules, gateway policies, and gateway policy rules to security groups.
Important
AWS Transform makes a best effort to create security groups that match your source environment. Review and modify the generated security groups to ensure that they meet your company's needs and security policies.
Choose one of the following security group mapping strategies:
-
MAP: Translate rules from your source environment. Only static IP assignment is supported with this strategy (see IP migration approaches below).
-
SKIP: Do not translate rules from your source environment. No security groups are generated. Both static and dynamic (DHCP) IP assignment are available. For RVTools source environments without additional configuration files, AWS Transform automatically uses SKIP.
IP migration approaches
The system offers two key network configuration choices for your migration:
Network range selection:
-
Keep Existing Ranges (IP Address Ranges Retention): Keep original IP address ranges during migration. Ideal for lift-and-shift scenarios with legacy applications that have hard-coded IP dependencies or existing firewall rules.
-
Update to new IP ranges (CIDR update): You can modify each VPC CIDR range during migration, and AWS Transform automatically propagates changes to subnets, route tables, and security groups.
IP addresses assignment:
-
Fixed IP addresses (Static): The system assigns static IPs based on the CIDR. This is best for applications requiring predictable network behavior, DNS management, or IP-based access control. IPs persist across instance restarts using Elastic Network Interfaces (ENIs).
-
Dynamic IP assignment (AWS DHCP): Automatically assign IPs from subnet pools at instance launch. Optimal for cloud-native applications and auto-scaling workloads. Reduces operational overhead but requires applications to use DNS or service discovery.
You can combine either range selection with either IP assignment method.
Note
IP addresses assignment strategy is set at the wave level. You can assign different strategies to specific servers by customizing the wave file. For example, if you chose a static IP address approach for the wave but want to assign a dynamic approach to a specific server, you would use [RESET_VALUE] as described in Editing your configuration in the Application Migration Service user guide.
Step 5: Review VPC configurations
After AWS Transform generates Amazon VPC configurations, it displays the generated VPC networks. You can either use the current configuration or modify VPC CIDRs.
For single-account deployments, you can edit VPC CIDRs only. For multi-account deployments, you can also edit the target accounts for each VPC network.
Note
You cannot modify the prefix length (the value after the "/").
To modify VPC CIDRs:
In the Generated VPCs list, provide your modified CIDRs.
Choose Submit to apply the changes and rerun the mapping process.
Review the results, then either continue or repeat the modification steps.
Step 6: Network diagram
After reviewing the generated VPC configurations, you can optionally generate a network diagram to visualize your network topology. AWS Transform supports the following diagram formats:
Mermaid code (.mmd): A text-based diagram definition file that can be rendered using Mermaid-compatible tools.
Image (.png): A rendered image of your network topology.
Step 7: Tag your network resources (optional)
AWS Transform automatically tags all generated resources with "CreatedBy": "AWSTransform" along with definition and execution IDs for tracking purposes. You can also add custom tags to network resources during migration.
If your migration is part of the AWS Migration Acceleration Program (MAP 2.0), AWS Transform applies a MAP tag to your resources. If you provided your MPE ID earlier in the migration process, the tag is applied automatically. Otherwise, AWS Transform asks whether you have a MAP agreement and prompts you to provide your MPE ID — a 10-character code using uppercase letters and digits (for example, ABCDE12345). The applied tag uses the format:
-
Key:
map-migratedValue:migMPE_ID
You can apply custom tags at two levels:
Job-level tags: Applied to all resources created during the migration job, including VPCs, subnets, security groups, and route tables.
VPC-level tags: Applied to specific VPC resources and their associated components. Tags automatically cascade to all VPC resources.
Note
Maximum 40 tags per request. Each tag requires a key and value. AWS tagging conventions apply.
AWS Transform applies these tags during network deployment.
To use existing AWS network resources not created by AWS Transform, you must tag the resources (including VPCs and subnets) with the following tags:
Key:
CreatedForValue:AWSTransformKey:
ATWorkspaceValue:workspace-id
Find your workspace ID in the AWS Transform web app URL: https://... /workspace/workspace-id/job/job-id
Step 8: Deploy network
After tagging, select your deployment strategy:
-
AWS Transform-managed deployment: AWS Transform uses CloudFormation templates to deploy your network and runs Reachability Analyzer to check connectivity between subnets across multiple VPCs and within the same VPC.
Note
Network deployment requests require explicit approval before execution. See the deployment approvals process below.
-
Self-deployment: AWS Transform generates Infrastructure as Code (IaC) templates. CloudFormation templates are generated by default. You can also select additional output formats:
AWS CDK: TypeScript project for programmatic infrastructure deployment
HashiCorp Terraform: HCL templates for managing network resources
Landing Zone Accelerator (LZA): A network-config.yaml file for LZA network configuration
Note
When deploying via the Landing Zone Accelerator (LZA) pipeline, ensure that your AWS Transform account and LZA installation are in the same AWS Organization. Deployment will fail if there is a mismatch between the Organizations IDs.
For self-deployment, use the link provided to download a zip file containing the generated templates. The zip folder includes a README.md file that explains how to use the generated templates.
To verify the downloaded file hasn't been corrupted or tampered with, generate and download a checksum, then compare it to a locally generated hash using openssl dgst -sha256 -binary <file.zip> | base64 command.
Deployment approvals process
Network deployment requests require explicit approval before execution. When you submit a deployment request, it automatically routes to authorized approvers through the AWS Transform Approvals tab. Approvers validate both CloudFormation templates and network configurations to ensure compliance with security standards and architectural requirements. Each submission triggers a new review cycle, and deployments proceed only after receiving confirmation. If an approver denies your request, contact them directly to discuss necessary modifications. The system tracks all approval decisions for audit purposes and maintains deployment history.
Network deletion
After deployment, you can delete the deployed network resources. Deletion is available immediately after deployment completes. If you modify the deployed network resources after deployment, AWS Transform cannot delete them.
-
AWS Transform-managed deployments: AWS Transform removes all CloudFormation stacks that were created during deployment. This action requires approval through the AWS Transform Approvals tab.
-
Self-deployments: You must manually delete the deployed resources through the AWS Management Console or AWS CLI.
Configuration file extraction
You can use Cisco ACI, Palo Alto Networks, and Fortinet FortiGate configuration files as standalone source files to generate network infrastructure and security groups, or as complementary files alongside an RVTools upload to add security group generation. The extraction process is the same in both cases.
To extract configuration files from your firewall and network environments, follow these procedures. Consult vendor documentation for the latest information.
Fortinet FortiGate
Firmware: v7.0 and up
Requirements:
super_adminorsuper_admin_readonlyprivileges on global levelSteps:
Connect to the firewall via SSH or built-in CLI client
Run:
show | grep ""(| grep ""disables pagination)Save all output to a file starting from the
showcommand
Palo Alto Networks
Firmware: 10.1 and up
Requirements: superadmin role
Steps: Connect via SSH, run the commands below, and save the outputs:
set cli pager off set cli config-output-format set configure show # Save as palo-conf.txt show predefined # Save as palo-default.txt
Cisco ACI
Firmware: 6.0 and up
Requirements: Admin role with all privileges; SCP/SFTP/FTP destination configured
Steps:
Connect to APIC controller via browser
Go to Admin >> Config Rollbacks
In "Take a snapshot" select remote location and choose "Create a snapshot now"
After receiving "Transfer successful" message, connect to the remote location server and retrieve the latest snapshot file (.gz file)