<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dear Mr.Marvin Rhoads ,Thanks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461294#M238626</link>
    <description>&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Dear Mr.&lt;/SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/mrhoads-cco" style="font-size: 14px;" title="View user profile."&gt;Marvin Rhoads&lt;/A&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your replay&lt;/P&gt;&lt;P&gt;As per this command&amp;nbsp;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;nat (inside) 0 access-list&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;nonat applied from firewall i able to ping but trough vpn client connected we are not able to ping local server 192.168.215.4&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;(config)# ping 192.168.215.4&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.215.4, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;kunauto(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 18 May 2014 07:01:35 GMT</pubDate>
    <dc:creator>tnrs_tnrs</dc:creator>
    <dc:date>2014-05-18T07:01:35Z</dc:date>
    <item>
      <title>ASA5510-K8 device we required AES and 3DES license</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461282#M238606</link>
      <description>&lt;DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV style=""&gt;&lt;SPAN style="color: rgb(34, 34, 34); font-family: arial, helvetica, sans-serif; font-size: 18px; line-height: normal;"&gt;We have&amp;nbsp;ASA5510-K8 device have default DES only but we required AES and 3DES license &amp;nbsp;when i try to download trail version it is given part number&amp;nbsp;&lt;SPAN style="color: rgb(34, 34, 34); line-height: normal;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;B style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;ASA5500-ENCR-K9 &amp;nbsp;&lt;/B&gt;but &amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 18px; line-height: 20px; background-color: rgb(245, 245, 245); white-space: pre-wrap;"&gt;not more than ninety (90) days we need permanent licence for this we try to buy this license distributors tell us the &lt;/SPAN&gt;&lt;SPAN style="background-color: rgb(245, 245, 245);"&gt;&lt;FONT color="#1f497d" face="arial, helvetica, sans-serif" size="4"&gt;&lt;SPAN style="line-height: normal; white-space: pre-wrap;"&gt; part code is not get order able separately please suggest the part code for this &lt;/SPAN&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 18px; line-height: 20px; background-color: rgb(245, 245, 245); white-space: pre-wrap;"&gt; .&lt;/SPAN&gt;&lt;P style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV style="color: rgb(34, 34, 34); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="im" style="color: rgb(80, 0, 80); font-family: arial, sans-serif; font-size: 13px; line-height: normal;"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:10:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461282#M238606</guid>
      <dc:creator>tnrs_tnrs</dc:creator>
      <dc:date>2019-03-12T04:10:41Z</dc:date>
    </item>
    <item>
      <title>If you go to the Cisco self</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461283#M238607</link>
      <description>&lt;P&gt;If you go to the &lt;A href="https://tools.cisco.com/SWIFT/LicensingUI/Quickstart"&gt;Cisco self-service licensing portal&lt;/A&gt;, you can request the activation key for a permanent AES-3DES license.&lt;/P&gt;&lt;P&gt;On that page, choose "Get New &amp;gt; IPS, Crypto, Other Licenses". The select "Security Products" and then "Cisco ASA 3DES/AES License". enter your unit's serial number and click Next. After submitting you should receive the activation key via email within a few minutes.&lt;/P&gt;&lt;P&gt;Once received, simply log into the ASA and enter "activation-key &amp;lt;the provided alphanumeric key&amp;gt;".&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2014 12:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461283#M238607</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-05-09T12:00:07Z</dc:date>
    </item>
    <item>
      <title>Dear Sir,</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461284#M238609</link>
      <description>&lt;PRE style="color: rgb(34, 34, 34); line-height: normal; background-color: rgb(255, 255, 255);"&gt;
Dear Sir,

Thanks for your replay i downloaded new license and i getting key but it is also for 90 days only

Please see below details from Cisco.

Limited Warranty

Cisco warrants that commencing from the date of shipment to Customer (but in case of resale by an authorized Cisco reseller, commencing not more than ninety (90) days after original shipment by Cisco), and continuing for a period of the longer of (a) ninety (90) days or (b) the software warranty period (if any) set forth in the warranty card accompanying the Product (if any): (a) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (b) the Software substantially conforms to its published specifications.   The date of shipment of a Product by Cisco is set forth on the packaging material in which the Product is shipped.   Except for the foregoing, the Software is provided AS IS. This limited warranty extends only to the Customer who is the original licensee. Customer's sole and exclusive remedy and the entire liability of Cisco and its suppliers and licensors under this limited warranty will be, at Cisco's option, repair, replacement, or refund of the Software if reported (or, upon request, returned) to Cisco or the party supplying the Software to Customer, if different than Cisco. In no event does Cisco warrant that the Software is error free or that Customer will be able to operate the Software without problems or interruptions.   In addition, due to the continual development of new techniques for intruding upon and attacking networks, Cisco does not warrant that the Software or any equipment, system or network on which the Software is used will be free of vulnerability to intrusion or attack.

Restrictions. This warranty does not apply if the Software, Product or any other equipment upon which the Software is authorized to be used (a) has been altered, except by Cisco, (b) has not been installed, operated, repaired, or maintained in accordance with instructions supplied by Cisco, (c) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident; or (d) is licensed, for beta, evaluation, testing or demonstration purposes for which Cisco does not charge a purchase price or license fee.
&lt;/PRE&gt;</description>
      <pubDate>Fri, 09 May 2014 17:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461284#M238609</guid>
      <dc:creator>tnrs_tnrs</dc:creator>
      <dc:date>2014-05-09T17:35:10Z</dc:date>
    </item>
    <item>
      <title>The text you pasted in refers</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461285#M238610</link>
      <description>&lt;P&gt;The text you pasted in refers to the product (software) warranty.&lt;/P&gt;&lt;P&gt;The 3DES-AES license / activation-key does not expire - it is "perpetual". You can validate that by typing the following at the cli while in enable mode:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; show activation-key | i 3DES&lt;/P&gt;&lt;P&gt;You should see something like:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;VPN-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;perpetual&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2014 18:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461285#M238610</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-05-09T18:23:47Z</dc:date>
    </item>
    <item>
      <title>hi,marvin is right, the 3DES</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461286#M238612</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;marvin is right, the 3DES/AES license is free and its permanent.&lt;/P&gt;&lt;P&gt;could you also post the output of&lt;STRONG&gt; show version &lt;/STRONG&gt;to see if it's enabled and if you have other time-based licenses?&lt;/P&gt;</description>
      <pubDate>Sat, 10 May 2014 01:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461286#M238612</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2014-05-10T01:20:34Z</dc:date>
    </item>
    <item>
      <title>sh versionCisco Adaptive</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461287#M238613</link>
      <description>&lt;P&gt;sh version&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(2)&lt;/P&gt;&lt;P&gt;Device Manager Version 6.2(1)&lt;/P&gt;&lt;P&gt;Compiled on Mon 11-Jan-10 14:19 by builders&lt;BR /&gt;System image file is "disk0:/asa822-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;kunauto up 6 days 3 hours&lt;/P&gt;&lt;P&gt;Hardware: &amp;nbsp; ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;BR /&gt;Internal ATA Compact Flash, 256MB&lt;BR /&gt;BIOS Flash Firmware Hub @ 0xffe00000, 1024KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Boot microcode &amp;nbsp; : CN1000-MC-BOOT-2.00&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IPSec microcode &amp;nbsp;: CNlite-MC-IPSECm-MAIN-2.04&lt;BR /&gt;&amp;nbsp;0: Ext: Ethernet0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bcde, irq 9&lt;BR /&gt;&amp;nbsp;1: Ext: Ethernet0/1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bcdf, irq 9&lt;BR /&gt;&amp;nbsp;2: Ext: Ethernet0/2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bce0, irq 9&lt;BR /&gt;&amp;nbsp;3: Ext: Ethernet0/3 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bce1, irq 9&lt;BR /&gt;&amp;nbsp;4: Ext: Management0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bce2, irq 11&lt;BR /&gt;&amp;nbsp;5: Int: Not used &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: irq 11&lt;BR /&gt;&amp;nbsp;6: Int: Not used &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: irq 5&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp;: Unlimited&lt;BR /&gt;Maximum VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 50&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Unlimited&lt;BR /&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;VPN-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled&lt;BR /&gt;VPN-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled&lt;BR /&gt;Security Contexts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 0&lt;BR /&gt;GTP/GPRS &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;SSL VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Total VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 250&lt;BR /&gt;Shared License &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;AnyConnect for Mobile &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Disabled&lt;BR /&gt;AnyConnect Essentials &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;Advanced Endpoint Assessment &amp;nbsp; : Disabled&lt;BR /&gt;UC Phone Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Total UC Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Botnet Traffic Filter &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;/P&gt;&lt;P&gt;This platform has a Base license.&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2014 08:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461287#M238613</guid>
      <dc:creator>tnrs_tnrs</dc:creator>
      <dc:date>2014-05-16T08:52:28Z</dc:date>
    </item>
    <item>
      <title>sh versionCisco Adaptive</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461288#M238615</link>
      <description>&lt;P&gt;sh version&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(2)&lt;BR /&gt;Device Manager Version 6.2(1)&lt;/P&gt;&lt;P&gt;Compiled on Mon 11-Jan-10 14:19 by builders&lt;BR /&gt;System image file is "disk0:/asa822-k8.bin"&lt;BR /&gt;Config file at boot was "startup-config"&lt;/P&gt;&lt;P&gt;kunauto up 6 days 3 hours&lt;/P&gt;&lt;P&gt;Hardware: &amp;nbsp; ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;BR /&gt;Internal ATA Compact Flash, 256MB&lt;BR /&gt;BIOS Flash Firmware Hub @ 0xffe00000, 1024KB&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Boot microcode &amp;nbsp; : CN1000-MC-BOOT-2.00&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;SSL/IKE microcode: CNLite-MC-SSLm-PLUS-2.03&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;IPSec microcode &amp;nbsp;: CNlite-MC-IPSECm-MAIN-2.04&lt;BR /&gt;&amp;nbsp;0: Ext: Ethernet0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bcde, irq 9&lt;BR /&gt;&amp;nbsp;1: Ext: Ethernet0/1 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bcdf, irq 9&lt;BR /&gt;&amp;nbsp;2: Ext: Ethernet0/2 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bce0, irq 9&lt;BR /&gt;&amp;nbsp;3: Ext: Ethernet0/3 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bce1, irq 9&lt;BR /&gt;&amp;nbsp;4: Ext: Management0/0 &amp;nbsp; &amp;nbsp; &amp;nbsp; : address is f866.f2c4.bce2, irq 11&lt;BR /&gt;&amp;nbsp;5: Int: Not used &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: irq 11&lt;BR /&gt;&amp;nbsp;6: Int: Not used &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: irq 5&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;BR /&gt;Maximum Physical Interfaces &amp;nbsp; &amp;nbsp;: Unlimited&lt;BR /&gt;Maximum VLANs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 50&lt;BR /&gt;Inside Hosts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Unlimited&lt;BR /&gt;Failover &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;VPN-DES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Enabled&lt;BR /&gt;VPN-3DES-AES &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Enabled&lt;BR /&gt;Security Contexts &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 0&lt;BR /&gt;GTP/GPRS &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;SSL VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Total VPN Peers &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 250&lt;BR /&gt;Shared License &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; : Disabled&lt;BR /&gt;AnyConnect for Mobile &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;AnyConnect for Cisco VPN Phone : Disabled&lt;BR /&gt;AnyConnect Essentials &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;BR /&gt;Advanced Endpoint Assessment &amp;nbsp; : Disabled&lt;BR /&gt;UC Phone Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Total UC Proxy Sessions &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: 2&lt;BR /&gt;Botnet Traffic Filter &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;: Disabled&lt;/P&gt;&lt;P&gt;This platform has a Base license.&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2014 08:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461288#M238615</guid>
      <dc:creator>tnrs_tnrs</dc:creator>
      <dc:date>2014-05-16T08:53:39Z</dc:date>
    </item>
    <item>
      <title>As I noted above, "show</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461289#M238616</link>
      <description>&lt;P&gt;As I noted above, "show activation-key | i 3DES" will further indicate the license is perpetual.&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2014 10:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461289#M238616</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-05-16T10:42:52Z</dc:date>
    </item>
    <item>
      <title>Hi tnrs_tnrs, i see that you</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461290#M238617</link>
      <description>&lt;P&gt;&lt;SPAN style="color:#000000;"&gt;Hi&amp;nbsp;&lt;/SPAN&gt;&lt;A about="/users/tnrstnrs" class="username" datatype="" href="https://supportforums.cisco.com/users/tnrstnrs" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;&lt;SPAN style="color:#000000;"&gt;tnrs_tnrs&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN style="color:#000000;"&gt;, i see that you are looking at getting the AES/3DES license for your ASA5510-K8. Feel free to message me for options on how you can get the license. Hope to hear from you soon! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 May 2014 15:04:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461290#M238617</guid>
      <dc:creator>ageralde</dc:creator>
      <dc:date>2014-05-16T15:04:19Z</dc:date>
    </item>
    <item>
      <title># show activation-key | i</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461291#M238620</link>
      <description>&lt;P&gt;# show activation-key | i 3DES&lt;BR /&gt;VPN-3DES-AES&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 May 2014 14:19:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461291#M238620</guid>
      <dc:creator>tnrs_tnrs</dc:creator>
      <dc:date>2014-05-17T14:19:26Z</dc:date>
    </item>
    <item>
      <title>dear Mr.Marvin RhoadsAs per</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461292#M238622</link>
      <description>&lt;P style="font-size: 14px;"&gt;dear Mr.&lt;A about="/users/mrhoads-cco" class="username" datatype="" href="https://supportforums.cisco.com/users/mrhoads-cco" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;Marvin Rhoads&lt;/A&gt;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;As per below config&amp;nbsp;remote vpn and site to site vpn remote vpn users unable to access local network please suggest me any config required &amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;Local server ip 192.168.215.4 not able to ping this server remote vpn connectivity working fine but local network not able to ping from vpn users.&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;ASA Version 8.2(2)&lt;BR /&gt;!&lt;BR /&gt;hostname&amp;nbsp;&lt;BR /&gt;domain-name kunchevrolet&lt;BR /&gt;enable password r8xwsBuKsSP7kABz encrypted&lt;BR /&gt;passwd r8xwsBuKsSP7kABz encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;pppoe client vpdn group dataone&lt;BR /&gt;&amp;nbsp;ip address pppoe&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.215.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;nameif Internet&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone IST 5 30&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name kunchevrolet&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network GM-DC-VPN-Gateway&lt;BR /&gt;object-group network net-local&lt;BR /&gt;access-list sptnl extended permit ip 192.168.215.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list nonat extended permit ip 192.168.215.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list split-tunnel standard permit 192.168.215.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu Internet 1500&lt;BR /&gt;ip local pool vpn_users 192.168.2.1-192.168.2.250 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 59.90.214.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http x.x.x.x&amp;nbsp;255.255.255.252 outside&lt;BR /&gt;http 192.168.215.0 255.255.255.252 inside&lt;BR /&gt;http 192.168.215.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set myset esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map dynmap 65500 set transform-set myset&lt;BR /&gt;crypto map VPN 10 ipsec-isakmp dynamic dynmap&lt;BR /&gt;crypto map VPN interface outside&lt;BR /&gt;crypto map ASA-01 10 set peer 221.135.138.130&lt;BR /&gt;crypto map ASA-01 10 set transform-set myset&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 28800&lt;BR /&gt;telnet 192.168.215.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;vpdn group dataone request dialout pppoe&lt;BR /&gt;vpdn group dataone localname bb4027654187_scdrid&lt;BR /&gt;vpdn group dataone ppp authentication chap&lt;BR /&gt;vpdn username bb4027654187_scdrid password ***** store-local&lt;BR /&gt;dhcp-client client-id interface Internet&lt;BR /&gt;dhcpd dns 218.248.255.141 218.248.245.1&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.215.11-192.168.215.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption des-sha1&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;group-policy kun internal&lt;BR /&gt;group-policy kun attributes&lt;BR /&gt;&amp;nbsp;vpn-simultaneous-logins 8&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value split-tunnel&lt;BR /&gt;&amp;nbsp;default-domain value kunchevrolet&lt;BR /&gt;username test password P4ttSyrm33SV8TYp encrypted&lt;BR /&gt;username kunauto password bSHrKTGl8PUbvus/ encrypted privilege 15&lt;BR /&gt;username kunauto attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy kun&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec&lt;BR /&gt;tunnel-group vpngroup type remote-access&lt;BR /&gt;tunnel-group vpngroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpn_users&lt;BR /&gt;&amp;nbsp;default-group-policy kun&lt;BR /&gt;tunnel-group vpngroup webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias vpngroup enable&lt;BR /&gt;tunnel-group vpngroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *****&lt;BR /&gt;tunnel-group test type remote-access&lt;BR /&gt;tunnel-group x.x.x.x&amp;nbsp;type ipsec-l2l&lt;BR /&gt;tunnel-group x.x.x.x ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:0d2497e1280e41ab3875e77c6b184cf8&lt;BR /&gt;: end&lt;BR /&gt;kunauto#&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 17 May 2014 18:27:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461292#M238622</guid>
      <dc:creator>tnrs_tnrs</dc:creator>
      <dc:date>2014-05-17T18:27:25Z</dc:date>
    </item>
    <item>
      <title>You have an acess-lsit for</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461293#M238623</link>
      <description>&lt;P&gt;You have an access-list for your remote access VPN users' address pool but you also need to reference it with a NAT exemption.&lt;/P&gt;&lt;P&gt;Try:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;nat (inside) 0 access-list&amp;nbsp;&lt;/SPAN&gt;nonat&lt;/P&gt;&lt;P&gt;Here's &lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/81824-common-ipsec-trouble.html#solution14"&gt;a good reference&lt;/A&gt; to use.&lt;/P&gt;</description>
      <pubDate>Sun, 18 May 2014 00:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461293#M238623</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-05-18T00:07:24Z</dc:date>
    </item>
    <item>
      <title>Dear Mr.Marvin Rhoads ,Thanks</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461294#M238626</link>
      <description>&lt;P&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Dear Mr.&lt;/SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/mrhoads-cco" style="font-size: 14px;" title="View user profile."&gt;Marvin Rhoads&lt;/A&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Thanks for your replay&lt;/P&gt;&lt;P&gt;As per this command&amp;nbsp;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px; background-color: rgb(247, 247, 247);"&gt;nat (inside) 0 access-list&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: rgb(119, 119, 119); font-size: 14px;"&gt;nonat applied from firewall i able to ping but trough vpn client connected we are not able to ping local server 192.168.215.4&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;(config)# ping 192.168.215.4&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 192.168.215.4, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;kunauto(config)#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 May 2014 07:01:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461294#M238626</guid>
      <dc:creator>tnrs_tnrs</dc:creator>
      <dc:date>2014-05-18T07:01:35Z</dc:date>
    </item>
    <item>
      <title>I noticed your address pool</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461295#M238629</link>
      <description>&lt;P&gt;I noticed your address pool for VPN clients (192.168.215.1-250) overlaps your inside interface (192.168.215.2). Please adjust the pool range to exclude that and any other hosts addresses you have statically configured in that subnet. We typically recommend a unique subnet be used for VPN clients to minimize the potential for such confusion.&lt;/P&gt;&lt;P&gt;Can you run:&lt;/P&gt;&lt;P&gt;packet-tracer input outside icmp &amp;lt;your VPN client address&amp;gt; 0 0 192.168.215.4&lt;/P&gt;</description>
      <pubDate>Sun, 18 May 2014 13:56:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461295#M238629</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-05-18T13:56:08Z</dc:date>
    </item>
    <item>
      <title>Please find the below report</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461296#M238632</link>
      <description>&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Please find the below report&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;&amp;nbsp;show capture cap_test&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;20 packets captured&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp;1: 04:26:57.419274 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2: 04:27:01.932858 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3: 04:27:06.933347 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;4: 04:27:11.931897 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;5: 04:27:16.934064 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;6: 04:27:21.931378 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;7: 04:27:26.930371 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;8: 04:27:31.932370 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;9: 04:27:36.939023 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 10: 04:27:41.931882 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 11: 04:27:46.933850 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 12: 04:27:51.930142 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 13: 04:27:56.930615 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 14: 04:28:01.930142 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 15: 04:28:06.930860 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 16: 04:28:11.930844 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 17: 04:28:16.931561 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 18: 04:28:21.929105 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 19: 04:28:26.929593 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;&amp;nbsp; 20: 04:28:31.429497 192.168.2.2 &amp;gt; 192.168.215.4: icmp: echo request&lt;BR /&gt;20 packets shown&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;kunauto# packet-tracer input inside icmp 192.168.215.4 8 0 192.168.2.2&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 3&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 4&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 192.168.2.2 &amp;nbsp; &amp;nbsp; 255.255.255.255 outside&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 8&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 9&lt;BR /&gt;Type: NAT-EXEMPT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;nbsp; match ip inside 192.168.215.0 255.255.255.0 outside 192.168.2.0 255.255.255.0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; NAT exempt&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 1, untranslate_hits = 358&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;nbsp; match ip inside any outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 1 (59.90.214.144 [Interface PAT])&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 524205, untranslate_hits = 98146&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat-control&lt;BR /&gt;&amp;nbsp; match ip inside any outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; dynamic translation to pool 1 (59.90.214.144 [Interface PAT])&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 524205, untranslate_hits = 98146&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 12&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: encrypt&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 13&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 14&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 15&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Phase: 16&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 546896, packet dispatched to next module&lt;/P&gt;&lt;P style="color: rgb(119, 119, 119); font-size: 14px;"&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2014 14:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461296#M238632</guid>
      <dc:creator>tnrs_tnrs</dc:creator>
      <dc:date>2014-05-19T14:41:56Z</dc:date>
    </item>
    <item>
      <title>So your cap_test shows the</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461297#M238633</link>
      <description>&lt;P&gt;So your cap_test shows the packets from the VPN client at 192.168.2.2 to the server at 192.168.215.4. That's good.&lt;/P&gt;&lt;P&gt;Can you check if replies are coming back via the firewall? (i.e setup a different cap_test to look for the icmp echo replies). If they aren't you may have either a host firewall or routing issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 May 2014 15:24:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/2461297#M238633</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-05-19T15:24:01Z</dc:date>
    </item>
    <item>
      <title>Re: As I noted above, "show</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/4562290#M1087871</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;its too late reply in this thread but seems this thread is more relevant for my situation.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have ASA 1010.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco document says i need&amp;nbsp;&lt;SPAN&gt;—L-FPR1K-ENC-K9= if my account is not authorized for strong encryption (how do i know this)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Mar 2022 17:34:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/4562290#M1087871</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2022-03-02T17:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: As I noted above, "show</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/4562614#M1087876</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1230563"&gt;@SPoodari&lt;/a&gt; the first time you try to activate a license that requires strong encryption the licensing portal should prompt you to accept the terms and conditions to allow such downloads.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2022 02:06:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/4562614#M1087876</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2022-03-03T02:06:10Z</dc:date>
    </item>
    <item>
      <title>Re: Hi tnrs_tnrs, i see that you</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/4581649#M1088750</link>
      <description>&lt;P&gt;We placed order with Cisco, then Cisco added the licenes to our smart account.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then the ASA automatically got registered.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 06:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-k8-device-we-required-aes-and-3des-license/m-p/4581649#M1088750</guid>
      <dc:creator>SPoodari</dc:creator>
      <dc:date>2022-03-30T06:49:55Z</dc:date>
    </item>
  </channel>
</rss>

