I currently purchased, Cisco 1941/K9 with 2 onboard GE, 2 EHWIC slots, 1 ISM slot, 256MB CF default, 512MB DRAM default, IP Base.
Questions
1. With IP Base License, will I be able to run Frame Relay? I really need reference on what works and what doesn't between these different technology package licenses ? Actually frame relay is running on it right now, hope it doesn't suddenly stop after 60 days...
2. As I understand in order to run MPLS, I will need to upgrade to Data License "SL-19-DATA-K9". Since, I already have a Cisco 1941 to upgrade it, I need to order a spare license / paper PAK?
3. Does the IP Base License support site to site IPSEC VPN or do I need to purchase a security license "SL-19-SEC-K9"
4. Can I have both security and data license activated on the same device ?
5. If I do activate security or data license will I be able to use the IP Base features at the same time?
6. If I purchase a new Cisco 1941 with Data or Security License do I need to purchase the IP Base License then upgrade the license?
7. Is the 1941 suited for voice application routing ?
We are trying to migrate WCS base license to NCS 1.1 .We have procured the migration license .In the licensing guide , it is mentioned as "L-WCS-NCS1-M-K9 License first, before adding the licenses migrated from your WCS installation"
1)Whether we need to add this migration license in WCS before genrating XML file or
2)Before adding XML file in NCS we need to add this in NCS ..
We have purchased an ASA 5510 with CSC module. Unfortunatelly, white envelope with PAK for activation a Base License was lost before we managed to register it.
I am working on ASA 5505 with Base License that uses 3 VLAN's.
-My VLAN 1 is for used for my home network. -VLAN 2 is connected to the public Internet and my IP gets assigned by ISP dynamically. -VLAN 3 is DMZ where I will have few VM's that would need access to and from the Internet.
I am looking to work with following:
1) 172.16.0.2 that sits on DMZ will need to access public Internet over port 80 2) Permit access from the Internet over port 3389 to 172.16.0.2 3) Permit any host on private VLAN (192.168.0.0 network) to access 172.16.0.2 over the port 3389 4) Permit second VM on the DMZ VLAN let say 172.16.0.3 to access public Internet on all ports. Access in to this host is not permitted. 5) For some reason DHCP hosts are NOT getting DNS (8.8.8.8) entry when IP hets assigned or renew. I have a statements below but it is not working.
Also, if ACL rules for VoIP are written correctly. The goal is to permit these ports (SIP related) to access VoIP router. [code]
I'm tring to setup a DMZ for a guest wireless off of a 5505. So this device has a base license. It has vlan1 and vlan 2 for inside and outside.Another vlan is configured to be a failover for the currently active wan connection. It is using the "no forward interface" command.Can I add another vlan as a DMZ if I use the "no forward interface" command? [code]
I have ASA 5505 with base licence. I configured NATing and VPN(site to site). All are working fine.My ASA is base license so i created 2 VLANS, one is inside and outside.Inside i am using 10.91.40.0/24 serie IP addresses.Below are the new requirements that i need to configre:
1. First 30 IP addresses only needs internet directly.( Servers and Management)
2. If remaining IPs likes to use web then traffic needs to forward one proxy server( where he gives user authentiation)
My ASA 5505 base license allows for three VLANs, the third one can only initiate traffic to one other VLAN (as specified by no forward interface vlan <number> on the third VLAN). This doesn't mean it can't "access" the other VLAN, it just can't initiate traffic to it. A lot of people get that wrong.Let's say you've got three VLANs, one is OUTSIDE, two is DMZ, and three is INSIDE. On the second VLAN would I enter the no forward interface as vlan 3, then set the name via the nameif command and everything will work just fine. The DMZ will not be able to initiate traffic to the INSIDE, but will to the outside, and assuming you have your ACLs and NAT set up properly, it will be able to respond to traffic from the INSIDE.
Would that be best practice or would I enter the "no forward" interface as in VLAN 1, thus is being able to respond to traffic from the outside as opposed to the inside.
I had a DMZ set up but since there was an intrusion into my network, I am building it again.
I have a couple of 5505's with base licenses. One of the two has a limited output when running the sho version command, as it has a restricted license. What license I would need to buy in order to bring it up to "normal" base license ?
I am having a ws-3750x-12s-s switch . I want to upgrade it from ipbase to ip service. after installing ip service liciense file, when i gave command " show license detail" i found there 3 index . one is for ip base -active (permanent) ..2nd is for ip service-active(permanent) 3rd is again ip service but inactive( period 8weeks 2days) , then i cleared 1st one by giving command "clear ipbase" and reboot. but still 2 index .both for ipservice one is permanent-active another is inactive . so my question is how can i remove 2nd index which one is inactive and time period for 8weeks and 2days..?? becasue i don't need it. and it will make any problem in future ?
Well, I tried using the cisco configuration for ASA 5505 for blocking P2P: url...but this configuration only is usefull with programs like Kazaa, so I try this configuration to block ARES but the problem is that ARES try to make downloads from different ports, ¿How do I block ARES if there are sereveral ports ?
we have a cisco ASA5505 with base license and 3 interface configured. Internal 192.168.1.1/24 DMZ 172.16.0.1/24 Outside 20.20.20.20/24 The DMZ is configured to allow the traffic pass to the outside interface only (base license allow only traffic to one interface) in order to let clients on this network to browse internet. On the outside interface there's a nat configuration that let the port 443 to be natted to an in internal server. Is it possible to let the clients in DMZ to access to the internal server on port 443 from the outside interface?
I am bringing up a 3750x and a 2911 to replace a 3745 router with switchport module. I was plannng on moving all the VLAN interfaces off the 3745 onto the 3750x and turning up EIGRP. I discoved the 3750 has the LAN Base license, so I can't run eigrp off of it. My question or worry now is, will the LAN base license prevent the switch from doing interface VLAN routing between the different VLAN's configured on it or will I have keep all the VLAN interfaces on the new router and just have a router on a stick setup?
I have a base 5505 and would like to get AnyConnect working. To do that, would I have to first purchase either an essentials or premium license and then purchase the AnyConnect Mobile license?
we have a customer with a ASA 5510 with a CSC module in it. The device tells us the Base license has expired. The new license has been renewed - after - the grace period. The Trendmicro site tells us the Base license is valid until 21 october 2013 but the CSC refuses to acknowledge this. The module is able to fetch updates form the Internet so it does not look like a connection problem to me (it also has a plus license which is also valid till far into 2013 and that one works).Is it possible that the current license key is "dead" and the CSC expects a new license key because the grace period was expired?
I have recently purchased 2 x 1941 routers with 2 L-SL-19-SEC-K9= and 2 L-FL-SSLVPN10-K9= licenses. I've installed the licenses through Cisco Configuration Pro ver 2.5 and installation did not generate any errors. After saving config and reloading the device, on the License dashboard, the deploy status for the SSL VPN is "Not deployed" and I have no way of deploying it. The state also says "Active, Not in use". I have tried reinstalling the license via command line but get error "license duplicate - already installed" suggesting the installation was OK. The sec license deployed without any issues. Is there any way to manually deploy this SSL_VPN license?
The model WS-C3750X-24T-L is only Lan Base. We need this switch to use EIGRP Protocol. Does it exist a License for supportting IP Base o IP Services Feature Set?
We want to buy a ISE-3315-K9 for 500 end-devices.In the price-list I found the ISE-3315-K9 but cannot find the base license: L-ISE-BSE-500=. (I think I need this license)Will the shipment of the ISE-3315-K9 includes a 3000 end-points base license (maximum support of the ISE-3315) or do I need to order the base 500 license seperately?
Getting the following alarm from my ISE:Cause:Base License Enforcement Details: Base concurrent users exceed license allowable count.Currently only using 1656 out of 2000 base licenses so I'm not sure what the issue is. Running 1.1.2.145 patch 3.
we recently purchased L3 daughter cards (N55-D160L3-V2) for our 5548UPs along with the LAN Enterprise Services licenses (N55-LAN1K9).
I installed the cards and Ent Svcs lic this past weekend and everything went well excep that I couldn't enable the EIGRP feature .. apparently EIGRP requires the LAN Base (N55-BAS1K9-BUN) license even when you have the Enterprise lic installed, so I was able to dig up that license eventually (which comes with the L3 daughter card, incidentally). Another side effect of not installing the Lan Base lic is that the L3 card/module will be in an "offline" state until the Lan Base lic is installed. Either way, everything was working normally in L2 mode at this time.
So, here I was thinking I was ready to proceed with enabling L3 - this morning I installed the LAN Base license on one of the 5548s which apparently triggered the L3 Daughter card module to go active and triggered a switch reboot. Ok, not that big of a deal, knew that was probably coming. I expected the switch to come back up normally .. NOPE. The switch went into a continual reboot cycle where the console prompt would appear, then about 30 seconds later, would reboot again.
I finally ended up re-installing the original L2 card and the switch came right up. I see that LAN Base and LAN Enterprise are both still installed as well.
What have I done wrong here? Why did the switch go into a continuous reboot cycle once I installed the LAN Base license?
I have a cisco router 1941 and i have uploaded before evaluation license , now i have already bought cisco security license .I have already installed on cisco router , but the problem the router is still using the evaluation license not the new license .
I have 1941, 2901 ISR routers. I will use 3G backup when primary link (metro ethernet / G.SHDSL) goes down. Do I have to use Data License (SL-19-DATA-K9 / SL-29-DATA-K9) in order to switch back to 3G when primary link is not reachable) ?
I have a Cisco 1941 router... ipbasek9. I want to use this at home for my primar LAN->WAN interface. So i need the Security license enabled.I have enabled the Security temp/eval license but can not find a way to manage it.I have tried downloading the Cisco Configuation Assitant, but this errors with "Unsupported Device type"
License output and config outbout below (no WAN interface on 10.0.x is just internal testing WAN IP. This device is not yet directly connected to the internet.
cisco1941#show lic Index 1 Feature: ipbasek9 Period left: Life time License Type: Permanent License State: Active, In Use License Count: Non-Counted
I have a WS-C3750X-12S-S (IP Services) that I THINK I'd like to downgrade to LAN Base so I can stack it with a WS-C3750X-48T-L that is already LAN Base..
What's the difference between VPN Plus license and Security Plus license. I have new 5520 shipped with VPN Plus license.Also does it require a seperate license for Anyconnect for Mobile and AnyConnect Essentials.
I’m stuck in some problem with installation of LMS4.0 in customer site.
- we purchase a LMS4.0(CWLMS-4.0-100-K9) but couldn’t install it on Windows server 2008 R2 64bit because those things don’t support each other. - I need to upgrade the LMS4.0 to LMS4.2 that is supporting Windows server 2008 R2 64bit. - So, I ordered following items via product update tool (url...) [code]
- In this status, how to install LMS4.2 with license for 100 devices? If I install R-PI12-BASE-K9 first, can i enter a licese for 100 devices for CWLMS-4.0-100-K9 into PI1.2?
I'm planning to use 2 3560X (access switch) on two different locations connected over two 2921 routers in small ring. 3560Xs are directly connected via fiber. Each 3560X is conected to its own 2921, and 2921s are connected together with GRE over IPSec. So they are creating ring.I'm planning to use small area 0 in this scenario. There are less then 200 routes in the network. Will 12.2(55) IP Base on 3560X support this scenario or I will need IP Services image? "OSPF for routed access" is still little vague to me, there are only tipical case study scenarios.