Please tell us what your local network host configuration and test is - i.e are you getting a DHCP address from the ASA, is the gateway being set to the ASA inside interface, what's your IP address and what test are you using to check Internet connectivity?
Thanks for your replay as per enclosed config on interface GigabitEthernet0/1 we connected directly to one system and given lan ip dhcp on systems dhcp ip is resolved from system we able to ping to ASA geteway ip but from system we are not getting internet.we are not configured any host .
We have fortigate firewall find the enclosed FG configure we want to replace FG to ASA5525-SSD120-K9 please suggest me how to configure on ASA.
When you say license file what type of license are you talking about?
There is an ASA feature license and an ASA CX Net Generation Firewall subscription license file.
The ASA feature license is delivered in the for of a Product Activation Key (PAK) which you use to get an activation-key for the ASA. You can go to http://www.cisco.com/go/license to obtain that activation-key.
If you have an NGFW license file you install and activate that using the PRSM interface.
On http://www.cisco.com/go/license i done the register licence for
Follow these steps to install your ASA-CX license file:
1. Select Administration > Licenses.
2. Select I want to > Upload License File.
3. In the Upload License File panel, click Browse and select the license file from your workstation or network drive.
4. Click Upload.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :