<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Licensing! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730378#M422334</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your first question Mark got it exactly, it is reporting what the license is capable of not reporting what you have configured it to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your second question, Cisco has adopted a somewhat different approach with the ASA code as compared to router code in which the feature set determines what capabilities are enabled. In the ASA I believe all the capabilities are included in the code but only features within your license are activated. If you were to upgrade the license I believe that you would get more features available without needing to change the code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Apr 2007 11:29:56 GMT</pubDate>
    <dc:creator>Richard Burts</dc:creator>
    <dc:date>2007-04-17T11:29:56Z</dc:date>
    <item>
      <title>ASA Licensing!</title>
      <link>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730376#M422332</link>
      <description>&lt;P&gt;I have 2 questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.I have 2xASA firewalls with different licenses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces : Unlimited &lt;/P&gt;&lt;P&gt;Maximum VLANs               : 150       &lt;/P&gt;&lt;P&gt;Inside Hosts                : Unlimited &lt;/P&gt;&lt;P&gt;Failover                    : Active/Active&lt;/P&gt;&lt;P&gt;VPN-DES                     : Enabled   &lt;/P&gt;&lt;P&gt;VPN-3DES-AES                : Enabled   &lt;/P&gt;&lt;P&gt;Security Contexts           : 2         &lt;/P&gt;&lt;P&gt;GTP/GPRS                    : Disabled  &lt;/P&gt;&lt;P&gt;VPN Peers                   : 750       &lt;/P&gt;&lt;P&gt;WebVPN Peers                : 2         &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This platform has an ASA 5520 VPN Plus license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Encryption hardware device : Cisco ASA-55x0 on-board accelerator (revision 0x0)&lt;/P&gt;&lt;P&gt;                             Boot microcode   : CNlite-MC-Boot-Cisco-1.2&lt;/P&gt;&lt;P&gt;                             SSL/IKE microcode: CNlite-MC-IPSEC-Admin-3.03&lt;/P&gt;&lt;P&gt;                             IPSec microcode  : CNlite-MC-IPSECm-MAIN-2.04&lt;/P&gt;&lt;P&gt; 0: Ext: Ethernet0/0         : address is 0018.195b.ccfa, irq 9&lt;/P&gt;&lt;P&gt; 1: Ext: Ethernet0/1         : address is 0018.195b.ccfb, irq 9&lt;/P&gt;&lt;P&gt; 2: Ext: Ethernet0/2         : address is 0018.195b.ccfc, irq 9&lt;/P&gt;&lt;P&gt; 3: Ext: Ethernet0/3         : address is 0018.195b.ccfd, irq 9&lt;/P&gt;&lt;P&gt; 4: Ext: Management0/0       : address is 0018.195b.ccf9, irq 11&lt;/P&gt;&lt;P&gt; 5: Int: Not used            : irq 11&lt;/P&gt;&lt;P&gt; 6: Int: Not used            : irq 5&lt;/P&gt;&lt;P&gt;              &lt;/P&gt;&lt;P&gt;Licensed features for this platform:&lt;/P&gt;&lt;P&gt;Maximum Physical Interfaces : Unlimited &lt;/P&gt;&lt;P&gt;Maximum VLANs               : 50        &lt;/P&gt;&lt;P&gt;Inside Hosts                : Unlimited &lt;/P&gt;&lt;P&gt;Failover                    : Disabled&lt;/P&gt;&lt;P&gt;VPN-DES                     : Enabled   &lt;/P&gt;&lt;P&gt;VPN-3DES-AES                : Enabled   &lt;/P&gt;&lt;P&gt;Security Contexts           : 0         &lt;/P&gt;&lt;P&gt;GTP/GPRS                    : Disabled  &lt;/P&gt;&lt;P&gt;VPN Peers                   : 250       &lt;/P&gt;&lt;P&gt;WebVPN Peers                : 2         &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This platform has a Base license.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. In first output you can see Active/Active failover, even i have configured Active/Standby. Why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. In first output you can see that paltform has VPN Plus license, but second one is base license. How it is related with system ASA IOS? Or it is not depends  on ASA IOS. Ant licenses are burned to the some chip on ASA, maybe? Can somebody give to me the link with more information about that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:29:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730376#M422332</guid>
      <dc:creator>Leo_Stobbe</dc:creator>
      <dc:date>2020-02-21T09:29:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Licensing!</title>
      <link>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730377#M422333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1 - Active/Active means the device is "capable" of partisipating in a cluster. It doesn't mean if is currently doing so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 - VPN plus determines the number of simulaneous VPN peers, 750 vs 250 on the standard.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 21:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730377#M422333</guid>
      <dc:creator>mark.hodge</dc:creator>
      <dc:date>2007-04-16T21:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Licensing!</title>
      <link>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730378#M422334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your first question Mark got it exactly, it is reporting what the license is capable of not reporting what you have configured it to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For your second question, Cisco has adopted a somewhat different approach with the ASA code as compared to router code in which the feature set determines what capabilities are enabled. In the ASA I believe all the capabilities are included in the code but only features within your license are activated. If you were to upgrade the license I believe that you would get more features available without needing to change the code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2007 11:29:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730378#M422334</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2007-04-17T11:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Licensing!</title>
      <link>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730379#M422335</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Leo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; As Rick says, there is only one version of PIX/ASA software for each release. Individual features are enabled by a licence key.  So what I meant to say was that the 1st device has a licence which gives the capability of 750 simultanious VPN connections, whilst the 2nd can only have 250.  The 2nd device also supports fewer VLANS and only one context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All these features can be upgraded with a new licence key and a reboot, no new software would be required.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Apr 2007 17:15:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-licensing/m-p/730379#M422335</guid>
      <dc:creator>mark.hodge</dc:creator>
      <dc:date>2007-04-17T17:15:03Z</dc:date>
    </item>
  </channel>
</rss>

