<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FTD PAYG licensing in AWS to enable AES256 Encryption in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5293919#M1121147</link>
    <description>&lt;P&gt;I'm trying to test a FTD in AWS. I'm using the PAYG AMI (ami-04d7dfdc0d700e259). I assumed it would include the required licensing as it a PAYG. Fortinet, PAN, F5 etc include the licensing with their PAYG AMIs.&lt;/P&gt;&lt;P&gt;When I try to add a new IKEv2 policy using AES256, I get the following error: "Usable cryptography types are currently restricted by the licensing status of the device"&lt;BR /&gt;&lt;BR /&gt;How do I enable the full license for the PAYG instance? I need to test an IPSec scenario and only need the device for a few days. It's currently using an Evaluation license - how do I make it use the hourly PAYG license from AWS?&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-05-27 at 11.25.59 am.png" style="width: 541px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/245459i31972A57FB1A9B60/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-05-27 at 11.25.59 am.png" alt="Screenshot 2025-05-27 at 11.25.59 am.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-05-27 at 11.31.26 am.png" style="width: 316px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/245460i93653F252F2278CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-05-27 at 11.31.26 am.png" alt="Screenshot 2025-05-27 at 11.31.26 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 27 May 2025 01:33:55 GMT</pubDate>
    <dc:creator>smithy-au</dc:creator>
    <dc:date>2025-05-27T01:33:55Z</dc:date>
    <item>
      <title>FTD PAYG licensing in AWS to enable AES256 Encryption</title>
      <link>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5293919#M1121147</link>
      <description>&lt;P&gt;I'm trying to test a FTD in AWS. I'm using the PAYG AMI (ami-04d7dfdc0d700e259). I assumed it would include the required licensing as it a PAYG. Fortinet, PAN, F5 etc include the licensing with their PAYG AMIs.&lt;/P&gt;&lt;P&gt;When I try to add a new IKEv2 policy using AES256, I get the following error: "Usable cryptography types are currently restricted by the licensing status of the device"&lt;BR /&gt;&lt;BR /&gt;How do I enable the full license for the PAYG instance? I need to test an IPSec scenario and only need the device for a few days. It's currently using an Evaluation license - how do I make it use the hourly PAYG license from AWS?&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-05-27 at 11.25.59 am.png" style="width: 541px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/245459i31972A57FB1A9B60/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-05-27 at 11.25.59 am.png" alt="Screenshot 2025-05-27 at 11.25.59 am.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-05-27 at 11.31.26 am.png" style="width: 316px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/245460i93653F252F2278CB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-05-27 at 11.31.26 am.png" alt="Screenshot 2025-05-27 at 11.31.26 am.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 01:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5293919#M1121147</guid>
      <dc:creator>smithy-au</dc:creator>
      <dc:date>2025-05-27T01:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: FTD PAYG licensing in AWS to enable AES256 Encryption</title>
      <link>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294102#M1121155</link>
      <description>&lt;P&gt;You need to register the device to your Smart Account.&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 12:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294102#M1121155</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-05-27T12:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD PAYG licensing in AWS to enable AES256 Encryption</title>
      <link>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294345#M1121160</link>
      <description>&lt;P&gt;But I don't have one. I would have thought the PAYG would cover the license and the compute.&lt;/P&gt;&lt;P&gt;So I need to register for a Smart Account for testing a PAYG instance?&lt;/P&gt;&lt;P&gt;I'm using Terraform to build and automate - can the Smart License also be automated?&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 05:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294345#M1121160</guid>
      <dc:creator>smithy-au</dc:creator>
      <dc:date>2025-05-28T05:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: FTD PAYG licensing in AWS to enable AES256 Encryption</title>
      <link>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294385#M1121162</link>
      <description>&lt;P&gt;This is hopeless. I guess I'll stick with my Forti.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 07:31:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294385#M1121162</guid>
      <dc:creator>smithy-au</dc:creator>
      <dc:date>2025-05-28T07:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: FTD PAYG licensing in AWS to enable AES256 Encryption</title>
      <link>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294502#M1121168</link>
      <description>&lt;P&gt;No. But it's not about the license. It's about the export control features. Cisco must make sure you are a company who is able to and located in a geography that is allowed to use advanced encryption algorithms.&lt;/P&gt;</description>
      <pubDate>Wed, 28 May 2025 12:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294502#M1121168</guid>
      <dc:creator>ahollifield</dc:creator>
      <dc:date>2025-05-28T12:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: FTD PAYG licensing in AWS to enable AES256 Encryption</title>
      <link>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294806#M1121189</link>
      <description>&lt;P&gt;Just to add to what&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/199513"&gt;@ahollifield&lt;/a&gt;&amp;nbsp;mentioned, the actual licenses will be included in the PAYG subscription, for instance malware, URL filtering, etc will be included without having to buy any smart licenses. However, you still need a smart account to be activate it before you can register the device and it's actually a prerequisite as you can see in the link below:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/quick_start/consolidated_ftdv_gsg/ftdv-gsg/m_ftdv_aws_gsg.html#con_7759445" target="_blank"&gt;Cisco Secure Firewall Threat Defense Virtual Getting Started Guide, Version 7.2 and Earlier - Deploy the Threat Defense Virtual on AWS [Cisco Secure Firewall Threat Defense Virtual] - Cisco&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 May 2025 09:55:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-payg-licensing-in-aws-to-enable-aes256-encryption/m-p/5294806#M1121189</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-05-29T09:55:53Z</dc:date>
    </item>
  </channel>
</rss>

