I'm not entirely sure I understand your query. If you're asking, "How do I enable my AIP-SSM-10 sensor to receive automatic IPS signature updates?", then first and foremost you will need to have a valid IPS services license applied to your sensor. The sensor can function fully without a license, but it cannot receive signature updates without a license.
All you should need to obtain an IPS license key is a valid IPS support contact and the serial number of the AIP-SSM-10 sensor. You can login at http://www.cisco.com/go/license and follow the instructions there to obtain a license key. Alternatively, you can email email@example.com and provide the IPS device serial number and this will create an automatic ticket with the Cisco licensing team, who can then generate and email a license key to you.
Once you have a valid license key applied to the sensor, you can automatically apply signature updates by one of two methods. Method #1 is half manual, half automatic, and method #2 is fully automatic.
Manually download the signature updates and place them on an FTP, SCP, or HTTP/HTTPS server accessible by the sensor, and then point the sensor at the download server to check on a scheduled basis for newly found updates.
Configure the sensor to download the signature update directly from cisco.com and apply it automatically. For this to work, the sensor needs unfettered HTTP (tcp/80) and HTTPS (tcp/443) access to Cisco's website.
More information on automatic upgrades from Cisco IPS CLI User Guide:
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :