Configure Licensing - Cisco Firepower 2100 Getting Started Manual

Hide thumbs Also See for Firepower 2100:
Table of Contents

Advertisement

Configure Licensing

• https://192.168.1.1—Inside (Ethernet 1/2) interface IP address.
• https://management_ip—Management interface IP address assigned from DHCP.
The Cisco ASDM web page appears. You may see browser security warnings because the ASA does not have
a certificate installed; you can safely ignore these warnings and visit the web page.
Step 2
Click one of these available options: Install ASDM Launcher or Run ASDM.
Step 3
Follow the onscreen instructions to launch ASDM according to the option you chose.
The Cisco ASDM-IDM Launcher appears.
Step 4
Leave the username and password fields empty, and click OK.
The main ASDM window appears.
Configure Licensing
The ASA uses Cisco Smart Software Licensing. You can use regular Smart Software Licensing, which requires
internet access; or for offline management, you can configure Permanent License Reservation or a Satellite
server. For more information about these offline licensing methods, see
this guide applies to regular Smart Software Licensing.
When you register the chassis, the License Authority issues an ID certificate for communication between the
chassis and the License Authority. It also assigns the chassis to the appropriate virtual account. Until you
register with the License Authority, you will not be able to make configuration changes to features requiring
special licenses, but operation is otherwise unaffected. Licensed features include:
• Standard
• Security Contexts
• Strong Encryption (3DES/AES)
• AnyConnect—AnyConnect Plus, AnyConnect Apex, or AnyConnect VPN Only.
The ASA includes 3DES capability by default for management access only, so you can connect to the License
Authority and also use ASDM immediately. You can also use SSH and SCP if you later configure SSH access
on the ASA. Other features that require strong encryption (such as VPN) must have the Strong Encryption
license enabled, which requires you to first register to the License Authority.
Note
If you attempt to configure any features that can use strong encryption before you have the license—even if
you only configure weak encryption—then your HTTPS connection will be dropped on that interface, and
you cannot reconnect. The exception to this rule is if you are connected to a management-only interface, such
as Management 1/1. SSH is not affected. If you lose your HTTPS connection, you can connect to the console
port to reconfigure the ASA, connect to a management-only interface, or connect to an interface not configured
for a strong encryption feature.
When you request the registration token for the ASA from your Smart Software Licensing account, check the
Allow export-controlled functionality on the products registered with this token check box so that the
Cisco Firepower 2100 Getting Started Guide
104
ASA Appliance Mode Deployment with ASDM
Cisco ASA Series Feature
Licenses;

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents