Correct. Based on the message, you seem to have ASA with 10 user license and ran out of that license due to 10 local hosts (inside work stations). 'Show Version' command will tell you what license you have. You can check the hosts by using 'Show local-host' command. You may need to purchase additional license based on your requirements. Here is the link for available license options for ASA units.Check Table A-1.
Thanks for the reply. I am still bit confuse regarding host license means you are talking that it's related to host that how many user accessing cisco ASA firewall from remotely that showing "host limit was exceed"
This message relates to how many users/workstations accessing Internet through ASA (from your LAN). The commands I gave you give you which hosts accessing and what license you have. The link I gave you helps you in planning what license you need so that additional users will not get this message.
Depending on your requirements and the budget, contact the local Cisco sales for the pricing on the licenses.
Once you have the activation key, it is a peice of cake. I see your attachement and it looks like you are using ASDM. Use the following command on the CLI for activating the new key.
1) ASA#show activation-key <To see the present activation key> 2) ASA#conf t 3) ASA(config)#activation-key ******** <whatever key you got> The ASA will show you the difference between the present running key and the new key you have entered. It will ask to reload for new features to take effect. Once you have the time prepared for the reload, reload the ASA. 4) ASA(config)#exit 5) ASA#reload <confirm with..yes> 6) ASA#show activation-key <To see the new activation key after the reload>
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :