I have an ASA whereby the show ver command gives the following output:
Licensed features for this platform: <snip> GTP/GPRS : Disabled perpetual AnyConnect Premium Peers : 2 perpetual AnyConnect Essentials : Disabled perpetual Other VPN Peers : 750 perpetual Total VPN Peers : 750 perpetual Shared License : Disabled perpetual AnyConnect for Mobile : Disabled perpetual AnyConnect for Cisco VPN Phone : Disabled perpetual Advanced Endpoint Assessment : Disabled perpetual UC Phone Proxy Sessions : 2 perpetual Total UC Proxy Sessions : 2 perpetual Botnet Traffic Filter : Disabled perpetual Intercompany Media Engine : Disabled perpetual IPS Module : Enabled perpetual <<<<<<<<<<<<<<<<<<<<< Cluster : Disabled perpetual
This leads me to believe we have all the IPS licensing that we need. However we cannot access any IPS settings from within ADSM.
In an attempt to get the correct licensing key, we attempt to go through CIsco's online process to the get key based on the PAK code. However when we do so we get the following response:
Not allowed downgrade/update Sku(s) 'ASA5525-IPS-SSP' for 'ASA5525' : Device contains following licenses 'ASA5525-IPS-SSP,ASA5500-ENCR-K9' Serial Number =XXXXXXXXXX We're sorry, but we cannot process your request. If you would like any assistance in the resolution of this issue, please open a Service Request using the TAC Service Request Tool at
"The 5500-X platform requires two different license keys. The first is the IPS feature license key which you have already installed on the ASA. This will allow you to redirect traffic to the IPS instance. As others have stated above, you will need a Cisco Services for IPS contract which will entitle you to a signature update license key for the IPS itself."
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :