Licenses: Smart Software Licensing

Smart Software Licensing lets you purchase and manage a pool of licenses centrally. Unlike product authorization key (PAK) licenses, smart licenses are not tied to a specific serial number. You can easily deploy or retire ASAs without having to manage each unit’s license key. Smart Software Licensing also lets you see your license usage and needs at a glance.


Note


For more information about Smart Licensing features and behaviors per platform, see Smart Enabled Product Families.


About Smart Software Licensing

Cisco Smart Licensing is a flexible licensing model that provides you with an easier, faster, and more consistent way to purchase and manage software across the Cisco portfolio and across your organization. And it’s secure—you control what users can access. With Smart Licensing you get:

  • Easy Activation: Smart Licensing establishes a pool of software licenses that can be used across the entire organization—no more PAKs (Product Activation Keys).

  • Unified Management: My Cisco Entitlements (MCE) provides a complete view into all of your Cisco products and services in an easy-to-use portal, so you always know what you have and what you are using.

  • License Flexibility: Your software is not node-locked to your hardware, so you can easily use and transfer licenses as needed.

To use Smart Licensing, you must first set up a Smart Account on Cisco Software Central (software.cisco.com).

For a more detailed overview on Cisco Licensing, go to cisco.com/go/licensingguide

Smart Software Licensing for the ASA on the Firepower 4100/9300 Chassis

For the ASA on the Firepower 4100/9300 chassis, Smart Software Licensing configuration is split between the Firepower 4100/9300 chassis supervisor and the ASA.

  • Firepower 4100/9300 chassis—Configure all Smart Software Licensing infrastructure on the chassis, including parameters for communicating with the Smart Software Manager. The Firepower 4100/9300 chassis itself does not require any licenses to operate.


    Note


    Inter-chassis clustering requires that you enable the same Smart Licensing method on each chassis in the cluster.


  • ASA Application—Configure all license entitlements in the ASA.

Smart Software Manager and Accounts

When you purchase 1 or more licenses for the device, you manage them in the Cisco Smart Software Manager:

https://software.cisco.com/#module/SmartLicensing

The Smart Software Manager lets you create a master account for your organization.


Note


If you do not yet have an account, click the link to set up a new account. The Smart Software Manager lets you create a master account for your organization.


By default, your licenses are assigned to the Default Virtual Account under your master account. As the account administrator, you can optionally create additional virtual accounts; for example, you can create accounts for regions, departments, or subsidiaries. Multiple virtual accounts let you more easily manage large numbers of licenses and devices.

Offline Management

If your devices do not have internet access, and cannot register with the Smart Software Manager, you must configure offline licensing.

Permanent License Reservation

If your devices cannot access the internet for security reasons, you can optionally request permanent licenses for each ASA. Permanent licenses do not require periodic access to the Smart Software Manager. As with PAK licenses, you can purchase a license and install the license key for the ASA. Unlike a PAK license, you can obtain and manage the licenses with the Smart Software Manager. You can easily switch between regular smart licensing mode and permanent license reservation mode.


Note


ASA does not support Specific License Reservation (SLR). In SLR, specific feature entitlements are enabled permanently. ASA supports only PLR, where all the features are enabled permanently.


ASA Virtual Permanent License Reservation

Note


Permanent license reservation is supported only on VMware and KVM.


You can obtain a model-specific license that enables all of the following features:

  • Maximum throughput for your model

  • Essentials tier

  • Strong Encryption (3DES/AES) license, if you have enabled it in your Smart Licensing account

  • Secure Client capabilities enabled for the platform

    Use of Secure Client features is contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

When you deploy ASA virtual, the vCPU and memory that you choose determines the model license required. Unlike regular smart licensing with flexible vCPU and memory and throughput combinations, permanent license reservation is still tied to the vCPU/memory you use when you deploy ASA virtual.

vCPU and memory-to-license relationships are as follows:

  • 2 GB, 1 vCPU—ASAv5 (100 M) (You must run the license smart set_plr5 command; otherwise, the ASAv10 license is assigned to allow 1-G throughput.)


    Note


    In Version 9.13, the ASAv5 RAM requirements were increased to 2 GB. Because of this increase, the ASAv5 permanent license no longer worked because the ASA checked the memory assigned and determined that 2 GB of RAM was actually an ASAv10, not an ASAv5. To allow the ASAv5 permanent license to work, you must configure the ASA to recognize the extra memory for the model.


  • 2 GB, 1 vCPU—ASAv10 (1G)

  • 8 GB, 4 vCPUs —ASAv30 (2G)

  • 16 GB, 8 vCPUs—ASAv50 (10G)

  • 32 GB, 16 vCPUs—ASAv100 (20G)

  • 64 GB, 32 vCPU—ASAvU

  • 128 GB, 64 vCPU—ASAvU

Later, if you want to change the model level of a unit, you will have to return the current license and request a new license at the correct model level. To change the model of an already deployed ASA virtual, from the hypervisor you can change the vCPUs and DRAM settings to match the new model requirements. See the ASA virtual Virtual Getting Started Guide for these values.

If you stop using a license, you must return the license by generating a return code on ASA virtual and then enter that code into the Smart Software Manager. Make sure you follow the return process correctly to ensure that you do not pay for unused licenses.

Firepower 1010 Permanent License Reservation

You can obtain a license that enables all features:


Note


You also need to request the entitlements in the ASA configuration so that the ASA allows their use.


If you stop using a license, you must return the license by generating a return code on the ASA, and then entering that code into the Smart Software Manager. Make sure you follow the return process correctly so you do not pay for unused licenses.

Firepower 1100 Permanent License Reservation

You can obtain a license that enables all features:


Note


You also need to request the entitlements in the ASA configuration so that the ASA allows their use.


If you stop using a license, you must return the license by generating a return code on the ASA, and then entering that code into the Smart Software Manager. Make sure you follow the return process correctly so you do not pay for unused licenses.

Secure Firewall 1210/1220 Permanent License Reservation

You can obtain a license that enables all features:


Note


You also need to request the entitlements in the ASA configuration so that the ASA allows their use.


If you stop using a license, you must return the license by generating a return code on the ASA, and then entering that code into the Smart Software Manager. Make sure you follow the return process correctly so you do not pay for unused licenses.

Secure Firewall 3100/4200 Permanent License Reservation

You can obtain a license that enables all features:


Note


You also need to request the entitlements in the ASA configuration so that the ASA allows their use.


If you stop using a license, you must return the license by generating a return code on the ASA, and then entering that code into the Smart Software Manager. Make sure you follow the return process correctly so you do not pay for unused licenses.

Firepower 4100/9300 Chassis Permanent License Reservation

You can obtain a license that enables all features:


Note


The license is managed on the Firepower 4100/9300 chassis, but you also need to request the entitlements in the ASA configuration so that the ASA allows their use.


If you stop using a license, you must return the license by generating a return code on the Firepower 4100/9300 chassis, and then entering that code into the Smart Software Manager. Make sure you follow the return process correctly so you don't pay for unused licenses.


Note


When you reverse upgrade ASA Virtual version 9.20 to an earlier unlicensed version, the PLR token that is generated during the registration of ASA Virtual version 9.20 is returned to the smart license server. This PLR token is not compatible with the license installation of the unlicensed ASA Virtual (post upgrade).


Smart Software Manager On-Prem

If your devices cannot access the internet for security reasons, you can optionally install a local Smart Software Manager On-Prem (formerly known as "Smart Software Satellite Server") server as a virtual machine (VM). The Smart Software Manager On-Prem provides a subset of Smart Software Manager functionality, and allows you to provide essential licensing services for all your local devices. Only the Smart Software Manager On-Prem needs to connect periodically to the main Smart Software Manager to sync your license usage. You can sync on a schedule or you can sync manually.

You can perform the following functions on the Smart Software Manager On-Prem:

  • Activate or register a license

  • View your company's licenses

  • Transfer licenses between company entities

For more information, see Cisco Smart Software Manager On-Prem Data Sheet.

Licenses and Devices Managed per Virtual Account

Licenses and devices are managed per virtual account: only that virtual account’s devices can use the licenses assigned to the account. If you need additional licenses, you can transfer an unused license from another virtual account. You can also transfer devices between virtual accounts.

For the ASA on the Firepower 4100/9300 chassisOnly the chassis registers as a device, while the ASA applications in the chassis request their own licenses. For example, for a Firepower 9300 chassis with 3 security modules, the chassis counts as one device, but the modules use 3 separate licenses.

Evaluation License

ASA Virtual

The ASA virtual does not support an evaluation mode. Before the ASA virtual registers with the Smart Software Manager, it operates in a severely rate-limited state.

Firepower 1000

Before the Firepower 1000 registers with the Smart Software Manager, it operates for 90 days (total usage) in evaluation mode. Only default entitlements are enabled. When this period ends, the Firepower 1000 becomes out-of-compliance.


Note


You cannot receive an evaluation license for Strong Encryption (3DES/AES); you must register with the Smart Software Manager to receive the export-compliance token that enables the Strong Encryption (3DES/AES) license.


Firepower 2100

Before the Firepower 2100 registers with the Smart Software Manager, it operates for 90 days (total usage) in evaluation mode. Only default entitlements are enabled. When this period ends, the Firepower 2100 becomes out-of-compliance.


Note


You cannot receive an evaluation license for Strong Encryption (3DES/AES); you must register with the Smart Software Manager to receive the export-compliance token that enables the Strong Encryption (3DES/AES) license.


Secure Firewall 3100/4200

Before the Secure Firewall 3100/4200 registers with the Smart Software Manager, it operates for 90 days (total usage) in evaluation mode. Only default entitlements are enabled. When this period ends, the Secure Firewall 3100/4200 becomes out-of-compliance.


Note


You cannot receive an evaluation license for Strong Encryption (3DES/AES); you must register with the Smart Software Manager to receive the export-compliance token that enables the Strong Encryption (3DES/AES) license.


Firepower 4100/9300 Chassis

The Firepower 4100/9300 chassis supports two types of evaluation license:

  • Chassis-level evaluation mode—Before the Firepower 4100/9300 chassis registers with the Smart Software Manager, it operates for 90 days (total usage) in evaluation mode. The ASA cannot request specific entitlements in this mode; only default entitlements are enabled. When this period ends, the Firepower 4100/9300 chassis becomes out-of-compliance.

  • Entitlement-based evaluation mode—After the Firepower 4100/9300 chassis registers with the Smart Software Manager, you can obtain time-based evaluation licenses that can be assigned to the ASA. In the ASA, you request entitlements as usual. When the time-based license expires, you need to either renew the time-based license or obtain a permanent license.


Note


You cannot receive an evaluation license for Strong Encryption (3DES/AES); you must register with the Smart Software Manager and obtain a permanent license to receive the export-compliance token that enables the Strong Encryption (3DES/AES) license.


About Licenses by Type

The following sections include additional information about licenses by type.

Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses

Secure Client licenses are not applied directly to the ASA. However, you need to purchase licenses and add them to your Smart Account to guarantee the right to use the ASA as the Secure Client headend.

  • For the Secure Client Advantage and Secure Client Premier licenses, add up the number of peers you intend to use across all the ASAs in your Smart Account and purchase license(s) for that many peers.

  • For the Secure Client VPN Only, purchase one license per ASA. Unlike the other licenses that provide a pool of peers that can be shared by multiple ASAs, the Secure Client VPN Only license is per headend.

For more information, see:

Other VPN Peers

Other VPN peers include the following VPN types:

  • IPsec remote access VPN using IKEv1

  • IPsec site-to-site VPN using IKEv1

  • IPsec site-to-site VPN using IKEv2

This license is included in the Base license.

Total VPN Peers Combined, All Types

  • The Total VPN Peers is the maximum VPN peers allowed of both Secure Client and Other VPN peers combined. For example, if the total is 1000, you can allow 500 Secure Client and 500 Other VPN peers simultaneously; or 700 Secure Client and 300 Other VPN; or use all 1000 for Secure Client. If you exceed the total VPN peers, you can overload the ASA, so be sure to size your network appropriately.

Encryption License

Strong Encryption: ASA Virtual

Strong Encryption (3DES/AES) is available for management connections before you connect to the Smart Software Manager or Smart Software Manager On-Prem server, so you can launch ASDM and connect to the Smart Software Manager. For through-the-box traffic that requires strong encryption (such as VPN), throughput is severely limited until you connect to the Smart Software Manager and obtain the Strong Encryption license.

When you request the registration token for the ASA virtual from your Smart Software Licensing account, check the Allow export-controlled functionality on the products registered with this token check box so that the Strong Encryption (3DES/AES) license is applied (your account must be qualified for its use). If the ASA virtual becomes out-of-compliance later, as long as the export compliance token was successfully applied, the ASA virtual will retain the license and not revert to the rate-limited state. The license is removed if you re-register the ASA virtual, and export compliance is disabled, or if you restore the ASA virtual to factory default settings.

If you initially register the ASA virtual without strong encryption and later add strong encryption, then you must reload the ASA virtual for the new license to take effect.

For permanent license reservation licenses, the Strong Encryption (3DES/AES) license is enabled if your account qualifies for its use.

If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account.

Strong Encryption: Firepower 1000, Secure Firewall 1200/3100/4200

The ASA includes 3DES capability by default for management access only, so you can connect to the Smart Software Manager and also use ASDM immediately. You can also use SSH and SCP if you later configure SSH access on the ASA. Other features that require strong encryption (such as VPN) must have Strong Encryption enabled, which requires you to first register to the Smart Software Manager.


Note


If you attempt to configure any features that can use strong encryption before you register—even if you only configure weak encryption—then your HTTPS connection will be dropped on that interface, and you cannot reconnect. The exception to this rule is if you are connected to a management-only interface, such as Management 1/1. SSH is not affected. If you lose your HTTPS connection, you can connect to the console port to reconfigure the ASA, connect to a management-only interface, or connect to an interface not configured for a strong encryption feature.


When you request the registration token for the ASA from your Smart Software Licensing account, check the Allow export-controlled functionality on the products registered with this token check box so that the Strong Encryption (3DES/AES) license is applied (your account must be qualified for its use). If the ASA becomes out-of-compliance later, as long as the export compliance token was successfully applied, the ASA will continue to allow through the box traffic. Even if you re-register the ASA, and export compliance is disabled, the license remains enabled. The license is removed if you restore the ASA to factory default settings.

If you initially register the ASA without strong encryption and later add strong encryption, then you must reload the ASA for the new license to take effect.

For permanent license reservation licenses, the Strong Encryption (3DES/AES) license is enabled if your account qualifies for its use.

If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account.

Strong Encryption: Firepower 4100/9300 Chassis

When the ASA is deployed as a logical device, you can launch ASDM immediately. Through the box traffic that requires strong encryption (such as VPN) is not allowed until you connect and obtain the Strong Encryption license.

When you request the registration token for the chassis from your Smart Software Licensing account, check the Allow export-controlled functionality on the products registered with this token check box so that the Strong Encryption (3DES/AES) license is applied (your account must be qualified for its use).

If the ASA becomes out-of-compliance later, as long as the export compliance token was successfully applied, the ASA will continue to allow through the box traffic. The license is removed if you re-register the chassis, and export compliance is disabled, or if you restore the chassis to factory default settings.

If you initially register the chassis without strong encryption and later add strong encryption, then you must reload the ASA application for the new license to take effect.

For permanent license reservation licenses, the Strong Encryption (3DES/AES) license is enabled if your account qualifies for its use.

If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account.

DES: All Models

The DES license cannot be disabled. If you have the 3DES license installed, DES is still available. To prevent the use of DES when you want to only use strong encryption, be sure to configure any relevant commands to use only strong encryption.

Carrier License

The Carrier license enables the following inspection features:

  • Diameter—Diameter is an Authentication, Authorization, and Accounting (AAA) protocol used in next-generation mobile and fixed telecom networks such as EPS (Evolved Packet System) for LTE (Long Term Evolution) and IMS (IP Multimedia Subsystem). It replaces RADIUS and TACACS in these networks.

  • GTP/GPRS—GPRS Tunneling Protocol is used in GSM, UMTS and LTE networks for general packet radio service (GPRS) traffic. GTP provides a tunnel control and management protocol to provide GPRS network access for a mobile station by creating, modifying, and deleting tunnels. GTP also uses a tunneling mechanism for carrying user data packets.

  • M3UA—MTP3 User Adaptation (M3UA) is a client/server protocol that provides a gateway to the SS7 network for IP-based applications that interface with the SS7 Message Transfer Part 3 (MTP3) layer. M3UA makes it possible to run the SS7 User Parts (such as ISUP) over an IP network. M3UA is defined in RFC 4666.

  • SCTP—SCTP (Stream Control Transmission Protocol) is described in RFC 4960. The protocol supports the telephony signaling protocol SS7 over IP and is also a transport protocol for several interfaces in the 4G LTE mobile network architecture.

Total TLS Proxy Sessions

Each TLS proxy session for Encrypted Voice Inspection is counted against the TLS license limit.

Other applications that use TLS proxy sessions do not count toward the TLS limit, for example, Mobility Advantage Proxy (which does not require a license).

Some applications might use multiple sessions for a connection. For example, if you configure a phone with a primary and backup Cisco Unified Communications Manager, there are 2 TLS proxy connections.

You independently set the TLS proxy limit using the tls-proxy maximum-sessions command or in ASDM, using the Configuration > Firewall > Unified Communications > TLS Proxy pane. To view the limits of your model, enter the tls-proxy maximum-sessions ? command. When you apply a TLS proxy license that is higher than the default TLS proxy limit, the ASA automatically sets the TLS proxy limit to match the license. The TLS proxy limit takes precedence over the license limit; if you set the TLS proxy limit to be less than the license, then you cannot use all of the sessions in your license.


Note


For license part numbers ending in “K8” (for example, licenses under 250 users), TLS proxy sessions are limited to 1000. For license part numbers ending in “K9” (for example, licenses 250 users or larger), the TLS proxy limit depends on the configuration, up to the model limit. K8 and K9 refer to whether the license is restricted for export: K8 is unrestricted, and K9 is restricted.

If you clear the configuration (using the clear configure all command, for example), then the TLS proxy limit is set to the default for your model; if this default is lower than the license limit, then you see an error message to use the tls-proxy maximum-sessions command to raise the limit again (in ASDM, use the TLS Proxy pane). If you use failover and enter the write standby command or in ASDM, use File > Save Running Configuration to Standby Unit on the primary unit to force a configuration synchronization, the clear configure all command is generated on the secondary unit automatically, so you may see the warning message on the secondary unit. Because the configuration synchronization restores the TLS proxy limit set on the primary unit, you can ignore the warning.


You might also use SRTP encryption sessions for your connections:

  • For K8 licenses, SRTP sessions are limited to 250.

  • For K9 licenses, there is no limit.


Note


Only calls that require encryption/decryption for media are counted toward the SRTP limit; if passthrough is set for the call, even if both legs are SRTP, they do not count toward the limit.


VLANs, Maximum

For an interface to count against the VLAN limit, you must assign a VLAN to it. For example:


interface gigabitethernet 0/0.100
vlan 100

Botnet Traffic Filter License

Requires a Strong Encryption (3DES/AES) License to download the dynamic database.

Failover or ASA Cluster Licenses

Failover Licenses for the ASAv

The standby unit requires the same model license as the primary unit.

Failover Licenses for the Firepower 1010

Smart Software Manager Regular and On-Prem

Both Firepower 1010 units must be registered with the Smart Software Manager or Smart Software Manager On-Prem server. Both units require you to enable the Essentials license and the Security Plus license before you can configure failover.

Typically, you do not also need to enable the Strong Encryption (3DES/AES) feature license in the ASA, because both units should have obtained the Strong Encryption token when you registered the units. When using the registration token, both units must have the same encryption level.

If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. In this case, enable it on the active unit after you enable failover. The configuration is replicated to the standby unit, but the standby unit does not use the configuration; it remains in a cached state. Only the active unit requests the license from the server. The license is aggregated into a single failover license that is shared by the failover pair, and this aggregated license is also cached on the standby unit to be used if it becomes the active unit in the future. After a failover, the new active unit continues to use the aggregated license. It uses the cached license configuration to re-request the entitlement from the server. When the old active unit rejoins the pair as a standby unit, it releases the license entitlement. Before the standby unit releases the entitlement, the new active unit's license might be in a non-compliant state if there are no available licenses in the account. The failover pair can use the aggregated license for 30 days, but if it is still non-compliant after the grace period, and you are not using the Strong Encryption token, then you will not be able to make configuration changes to features requiring the Strong Encryption (3DES/AES) feature license; operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. If you disband the failover pair, then the active unit releases the entitlements, and both units retain the licensing configuration in a cached state. To re-activate licensing, you need to clear the configuration on each unit, and re-configure it.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure failover.

Failover Licenses for the Firepower 1100

Smart Software Manager Regular and On-Prem

Only the active unit requests licenses from the server. Licenses are aggregated into a single failover license that is shared by the failover pair. There is no extra cost for secondary units.

After you enable failover for Active/Standby failover, you can only configure smart licensing on the active unit. For Active/Active failover, you can only configure smart licensing on the unit with failover group 1 as active. The configuration is replicated to the standby unit, but the standby unit does not use the configuration; it remains in a cached state. The aggregated license is also cached on the standby unit to be used if it becomes the active unit in the future.


Note


Each ASA must have the same encryption license when forming a failover pair. When you register an ASA to the smart licensing server, the Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. Because of this requirement, you have two choices for licensing when you use the Strong Encryption token with failover:

  • Before you enable failover, register both units to the smart licensing server. In this case, both units will have strong encryption. Then, after you enable failover, continue configuring license entitlements on the active unit. If you enable encryption for the failover link, it will use AES/3DES (strong encryption).

  • Before you register the active unit to the smart licensing server, enable failover. In this case, both units will not yet have strong encryption. Then configure license entitlements and register the active unit to the smart licensing server; both units will get strong encryption from the aggregated license. Note that if you enabled encryption on the failover link, it will use DES (weak encryption) because the failover link was established before the units gained strong encryption. You must reload both units to use AES/3DES on the link. If you only reload one unit, then that unit will try to use AES/3DES while the original unit uses DES, which will result in both units becoming active (split brain).


Each add-on license type is managed as follows:

  • Essentials—Although only the active unit requests this license from the server, the standby unit has the Essentials license enabled by default; it does not need to register with the server to use it.

  • Context—Only the active unit requests this license. However, the Essentials license includes 2 contexts by default and is present on both units. The value from each unit’s Essentials license plus the value of the Context license on the active unit are combined up to the platform limit. For example:

    • Active/Standby: The Essentials license includes 2 contexts; for two Firepower 1120 units, these licenses add up to 4 contexts. You configure a 3-Context license on the active unit in an Active/Standby pair. Therefore, the aggregated failover license includes 7 contexts. However, because the platform limit for one unit is 5, the combined license allows a maximum of 5 contexts only. In this case, you might only configure the active Context license to be 1 context.

    • Active/Active: The Essentials license includes 2 contexts; for two Firepower 1140 units, these licenses add up to 4 contexts. You configure a 4-Context license on the primary unit in an Active/Active pair. Therefore, the aggregated failover license includes 8 contexts. One unit can use 5 contexts and the other unit can use 3 contexts, for example; but during a failure, one unit will use all 8. Because the platform limit for one unit is 10, the combined license allows a maximum of 10 contexts; the 8 contexts are within the limit.

  • Strong Encryption (3DES/AES)—If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

After a failover, the new active unit continues to use the aggregated license. It uses the cached license configuration to re-request the entitlement from the server. When the old active unit rejoins the pair as a standby unit, it releases the license entitlement. Before the standby unit releases the entitlement, the new active unit's license might be in a non-compliant state if there are no available licenses in the account. The failover pair can use the aggregated license for 30 days, but if it is still non-compliant after the grace period, you will not be able to make configuration changes to features requiring special licenses (i.e. add an extra context); operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. If you disband the failover pair, then the active unit releases the entitlements, and both units retain the licensing configuration in a cached state. To re-activate licensing, you need to clear the configuration on each unit, and re-configure it.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure failover.

Failover Licenses for the Secure Firewall 1210/1220

Smart Software Manager Regular and On-Prem

Each unit requires the Essentials license (enabled by default) and the same encryption license. We recommend licensing each unit with the licensing server before you enable failover to avoid licensing mismatch issues, and when using the Strong Encryption license, issues with failover link encryption.

The Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. For the optional Strong Encryption (3DES/AES) feature license enabled in the ASA configuration, see below.

In the ASA license configuration, the Essentials license is always enabled by default on both units. After you enable failover for Active/Standby failover, you can only configure smart licensing on the active unit. For Active/Active failover, you can only configure smart licensing on the unit with failover group 1 as active. The configuration is replicated to the standby unit, but the standby unit does not use the configuration; it remains in a cached state. The aggregated license is also cached on the standby unit to be used if it becomes the active unit in the future.

Each add-on license type is managed as follows:

  • Essentials—Each unit requests a Essentials license from the server.

  • Strong Encryption (3DES/AES)—If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

After a failover, the new active unit continues to use the aggregated license. It uses the cached license configuration to re-request the entitlement from the server. When the old active unit rejoins the pair as a standby unit, it releases the license entitlement. Before the standby unit releases the entitlement, the new active unit's license might be in a non-compliant state if there are no available licenses in the account. The failover pair can use the aggregated license for 30 days, but if it is still non-compliant after the grace period, you will not be able to make configuration changes to features requiring special licenses; operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. If you disband the failover pair, then the active unit releases the entitlements, and both units retain the licensing configuration in a cached state. To re-activate licensing, you need to clear the configuration on each unit, and re-configure it.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure failover.

Failover Licenses for the Secure Firewall 3100

Smart Software Manager Regular and On-Prem

Each unit requires the Essentials license (enabled by default) and the same encryption license. We recommend licensing each unit with the licensing server before you enable failover to avoid licensing mismatch issues, and when using the Strong Encryption license, issues with failover link encryption.

The failover feature itself does not require any licenses. There is no extra cost for the Context license on data units.

The Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. For the optional Strong Encryption (3DES/AES) feature license enabled in the ASA configuration, see below.

In the ASA license configuration, the Essentials license is always enabled by default on both units. After you enable failover for Active/Standby failover, you can only configure smart licensing on the active unit. For Active/Active failover, you can only configure smart licensing on the unit with failover group 1 as active. The configuration is replicated to the standby unit, but the standby unit does not use the configuration; it remains in a cached state. The aggregated license is also cached on the standby unit to be used if it becomes the active unit in the future.

Each add-on license type is managed as follows:

  • Essentials—Each unit requests a Essentials license from the server.

  • Context—Only the active unit requests this license. However, the Essentials license includes 2 contexts by default and is present on both units. The value from each unit’s Essentials license plus the value of the Context license on the active unit are combined up to the platform limit. For example:

    • Active/Standby: The Essentials license includes 2 contexts; for two Secure Firewall 3130 units, these licenses add up to 4 contexts. You configure a 100-Context license on the active unit in an Active/Standby pair. Therefore, the aggregated failover license includes 104 contexts. However, because the platform limit for one unit is 100, the combined license allows a maximum of 100 contexts only. In this case, you might only configure the active Context license to be 95 contexts.

    • Active/Active: The Essentials license includes 2 contexts; for two Secure Firewall 3130 units, these licenses add up to 4 contexts. You configure a 10-Context license on the primary unit in an Active/Active pair. Therefore, the aggregated failover license includes 14 contexts. One unit can use 9 contexts and the other unit can use 5 contexts, for example; but during a failure, one unit will use all 14. Because the platform limit for one unit is 100, the combined license allows a maximum of 100 contexts; the 14 contexts are within the limit.

  • Strong Encryption (3DES/AES)—If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

After a failover, the new active unit continues to use the aggregated license. It uses the cached license configuration to re-request the entitlement from the server. When the old active unit rejoins the pair as a standby unit, it releases the license entitlement. Before the standby unit releases the entitlement, the new active unit's license might be in a non-compliant state if there are no available licenses in the account. The failover pair can use the aggregated license for 30 days, but if it is still non-compliant after the grace period, you will not be able to make configuration changes to features requiring special licenses (i.e. add an extra context); operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. If you disband the failover pair, then the active unit releases the entitlements, and both units retain the licensing configuration in a cached state. To re-activate licensing, you need to clear the configuration on each unit, and re-configure it.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure failover.

Failover Licenses for the Secure Firewall 4200

Smart Software Manager Regular and On-Prem

Each unit requires the Essentials license (enabled by default) and the same encryption license. We recommend licensing each unit with the licensing server before you enable failover to avoid licensing mismatch issues, and when using the Strong Encryption license, issues with failover link encryption.

The failover feature itself does not require any licenses. There is no extra cost for the Context license on data units.

The Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. For the optional Strong Encryption (3DES/AES) feature license enabled in the ASA configuration, see below.

In the ASA license configuration, the Essentials license is always enabled by default on both units. After you enable failover for Active/Standby failover, you can only configure smart licensing on the active unit. For Active/Active failover, you can only configure smart licensing on the unit with failover group 1 as active. The configuration is replicated to the standby unit, but the standby unit does not use the configuration; it remains in a cached state. The aggregated license is also cached on the standby unit to be used if it becomes the active unit in the future.

Each add-on license type is managed as follows:

  • Essentials—Each unit requests a StEssentialsandard license from the server.

  • Context—Only the active unit requests this license. However, the Essentials license includes 2 contexts by default and is present on both units. The value from each unit’s Essentials license plus the value of the Context license on the active unit are combined up to the platform limit. For example:

    • Active/Standby: The Essentials license includes 2 contexts; for two Secure Firewall 4215 units, these licenses add up to 4 contexts. You configure a 250-Context license on the active unit in an Active/Standby pair. Therefore, the aggregated failover license includes 254 contexts. However, because the platform limit for one unit is 250, the combined license allows a maximum of 250 contexts only. In this case, you might only configure the active Context license to be 246 contexts.

    • Active/Active: The Essentials license includes 2 contexts; for two Secure Firewall 4215 units, these licenses add up to 4 contexts. You configure a 10-Context license on the primary unit in an Active/Active pair. Therefore, the aggregated failover license includes 14 contexts. One unit can use 9 contexts and the other unit can use 5 contexts, for example; but during a failure, one unit will use all 14. Because the platform limit for one unit is 250, the combined license allows a maximum of 250 contexts; the 14 contexts are within the limit.

  • Strong Encryption (3DES/AES)—If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

After a failover, the new active unit continues to use the aggregated license. It uses the cached license configuration to re-request the entitlement from the server. When the old active unit rejoins the pair as a standby unit, it releases the license entitlement. Before the standby unit releases the entitlement, the new active unit's license might be in a non-compliant state if there are no available licenses in the account. The failover pair can use the aggregated license for 30 days, but if it is still non-compliant after the grace period, you will not be able to make configuration changes to features requiring special licenses (i.e. add an extra context); operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. If you disband the failover pair, then the active unit releases the entitlements, and both units retain the licensing configuration in a cached state. To re-activate licensing, you need to clear the configuration on each unit, and re-configure it.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure failover.

Failover Licenses for the Firepower 4100/9300

Smart Software Manager Regular and On-Prem

Both Firepower 4100/9300 must be registered with the Smart Software Manager or Smart Software Manager On-Prem server before you configure failover. There is no extra cost for secondary units.

The Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. When using the token, each chassis must have the same encryption license. For the optional Strong Encryption (3DES/AES) feature license enabled in the ASA configuration, see below.

After you enable failover, for the ASA license configuration for Active/Standby failover, you can only configure smart licensing on the active unit. For Active/Active failover, you can only configure smart licensing on the unit with failover group 1 as active. The configuration is replicated to the standby unit, but the standby unit does not use the configuration; it remains in a cached state. Only the active unit requests the licenses from the server. The licenses are aggregated into a single failover license that is shared by the failover pair, and this aggregated license is also cached on the standby unit to be used if it becomes the active unit in the future. Each license type is managed as follows:

  • Essentials—Although only the active unit requests this license from the server, the standby unit has the Essentials license enabled by default; it does not need to register with the server to use it.

  • Context—Only the active unit requests this license. However, the Essentials license includes 10 contexts by default and is present on both units. The value from each unit’s Essentials license plus the value of the Context license on the active unit are combined up to the platform limit. For example:

    • Active/Standby: The Essentials license includes 10 contexts; for 2 units, these licenses add up to 20 contexts. You configure a 250-Context license on the active unit in an Active/Standby pair. Therefore, the aggregated failover license includes 270 contexts. However, because the platform limit for one unit is 250, the combined license allows a maximum of 250 contexts only. In this case, you should only configure the active Context license to be 230 contexts.

    • Active/Active: The Essentials license includes 10 contexts; for 2 units, these licenses add up to 20 contexts. You configure a 10-Context license on the primary unit in an Active/Active pair. Therefore, the aggregated failover license includes 30 contexts. One unit can use 17 contexts and the other unit can use 13 contexts, for example; but during a failure, one unit will use all 30. Because the platform limit for one unit is 250, the combined license allows a maximum of 250 contexts; the 30 contexts are within the limit.

  • Carrier—Only the active requests this license, and both units can use it due to license aggregation.

  • Strong Encryption (3DES)—If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

After a failover, the new active unit continues to use the aggregated license. It uses the cached license configuration to re-request the entitlement from the server. When the old active unit rejoins the pair as a standby unit, it releases the license entitlement. Before the standby unit releases the entitlement, the new active unit's license might be in a non-compliant state if there are no available licenses in the account. The failover pair can use the aggregated license for 30 days, but if it is still non-compliant after the grace period, you will not be able to make configuration changes to features requiring special licenses; operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. If you disband the failover pair, then the active unit releases the entitlements, and both units retain the licensing configuration in a cached state. To re-activate licensing, you need to clear the configuration on each unit, and re-configure it.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure failover.

ASA Cluster Licenses for the Secure Firewall 3100

Smart Software Manager Regular and On-Prem

Each unit requires the Essentials license (enabled by default) and the same encryption license. We recommend licensing each unit with the licensing server before you enable clustering to avoid licensing mismatch issues, and when using the Strong Encryption license, issues with cluster control link encryption.

The clustering feature itself does not require any licenses. There is no extra cost for the Context license on data units.

The Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. For the optional Strong Encryption (3DES/AES) feature license enabled in the ASA configuration, see below.

In the ASA license configuration, the Essentials license is always enabled by default on all units. You can only configure smart licensing on the control unit. The configuration is replicated to the data units, but for some licenses, they do not use the configuration; it remains in a cached state, and only the control unit requests the license. The licenses are aggregated into a single cluster license that is shared by the cluster units, and this aggregated license is also cached on the data units to be used if one of them becomes the control unit in the future. Each license type is managed as follows:

  • Essentials—Each unit requests a Essentials license from the server.

  • Context—Only the control unit requests the Context license from the server. The Essentials license includes 2 contexts by default and is present on all cluster members. The value from each unit’s Essentials license plus the value of the Context license on the control unit are combined up to the platform limit in an aggregated cluster license. For example:

    • You have 6 Secure Firewall 3100s in the cluster. The Essentials license includes 2 contexts; for 6 units, these licenses add up to 12 contexts. You configure an additional 20-Context license on the control unit. Therefore, the aggregated cluster license includes 32 contexts. Because the platform limit for one chassis is 100, the combined license allows a maximum of 100 contexts; the 32 contexts are within the limit. Therefore, you can configure up to 32 contexts on the control unit; each data unit will also have 32 contexts through configuration replication.

    • You have 3 Secure Firewall 3100s in the cluster. The Essentials license includes 2 contexts; for 3 units, these licenses add up to 6 contexts. You configure an additional 100-Context license on the control unit. Therefore, the aggregated cluster license includes 106 contexts. Because the platform limit for one unit is 100, the combined license allows a maximum of 100 contexts; the 106 contexts are over the limit. Therefore, you can only configure up to 100 contexts on the control unit; each data unit will also have 100 contexts through configuration replication. In this case, you should only configure the control unit Context license to be 94 contexts.

  • Strong Encryption (3DES)—If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the control unit requests this license, and all units can use it due to license aggregation.

If a new control unit is elected, the new control unit continues to use the aggregated license. It also uses the cached license configuration to re-request the control unit license. When the old control unit rejoins the cluster as a data unit, it releases the control unit license entitlement. Before the data unit releases the license, the control unit's license might be in a non-compliant state if there are no available licenses in the account. The retained license is valid for 30 days, but if it is still non-compliant after the grace period, you will not be able to make configuration changes to features requiring special licenses; operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. You should refrain from making configuration changes until the license requests are completely processed. If a unit leaves the cluster, the cached control configuration is removed, while the per-unit entitlements are retained. In particular, you would need to re-request the Context license on non-cluster units.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure clustering.

ASA Cluster Licenses for the Secure Firewall 4200

Smart Software Manager Regular and On-Prem

Each unit requires the Essentials license (enabled by default) and the same encryption license. We recommend licensing each unit with the licensing server before you enable clustering to avoid licensing mismatch issues, and when using the Strong Encryption license, issues with cluster control link encryption.

The clustering feature itself does not require any licenses. There is no extra cost for the Context license on data units.

The Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. For the optional Strong Encryption (3DES/AES) feature license enabled in the ASA configuration, see below.

In the ASA license configuration, the Essentials license is always enabled by default on all units. You can only configure smart licensing on the control unit. The configuration is replicated to the data units, but for some licenses, they do not use the configuration; it remains in a cached state, and only the control unit requests the license. The licenses are aggregated into a single cluster license that is shared by the cluster units, and this aggregated license is also cached on the data units to be used if one of them becomes the control unit in the future. Each license type is managed as follows:

  • Essentials—Each unit requests a Essentials license from the server.

  • Context—Only the control unit requests the Context license from the server. The Essentials license includes 2 contexts by default and is present on all cluster members. The value from each unit’s Essentials license plus the value of the Context license on the control unit are combined up to the platform limit in an aggregated cluster license. For example:

    • You have 6 Secure Firewall 4200s in the cluster. The Essentials license includes 2 contexts; for 6 units, these licenses add up to 12 contexts. You configure an additional 20-Context license on the control unit. Therefore, the aggregated cluster license includes 32 contexts. Because the platform limit for one chassis is 250, the combined license allows a maximum of 250 contexts; the 32 contexts are within the limit. Therefore, you can configure up to 32 contexts on the control unit; each data unit will also have 32 contexts through configuration replication.

    • You have 3 Secure Firewall 4200s in the cluster. The Essentials license includes 2 contexts; for 3 units, these licenses add up to 6 contexts. You configure an additional 250-Context license on the control unit. Therefore, the aggregated cluster license includes 256 contexts. Because the platform limit for one unit is 250, the combined license allows a maximum of 250 contexts; the 256 contexts are over the limit. Therefore, you can only configure up to 250 contexts on the control unit; each data unit will also have 250 contexts through configuration replication. In this case, you should only configure the control unit Context license to be 244 contexts.

  • Strong Encryption (3DES)—If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the control unit requests this license, and all units can use it due to license aggregation.

If a new control unit is elected, the new control unit continues to use the aggregated license. It also uses the cached license configuration to re-request the control unit license. When the old control unit rejoins the cluster as a data unit, it releases the control unit license entitlement. Before the data unit releases the license, the control unit's license might be in a non-compliant state if there are no available licenses in the account. The retained license is valid for 30 days, but if it is still non-compliant after the grace period, you will not be able to make configuration changes to features requiring special licenses; operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 35 seconds until the license is compliant. You should refrain from making configuration changes until the license requests are completely processed. If a unit leaves the cluster, the cached control configuration is removed, while the per-unit entitlements are retained. In particular, you would need to re-request the Context license on non-cluster units.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure clustering.

ASA Cluster Licenses for the ASAv

Smart Software Manager Regular and On-Prem

Each unit requires the same Throughput license and the same encryption license. We recommend licensing each unit with the licensing server before you enable clustering to avoid licensing mismatch issues, and when using the Strong Encryption license, issues with cluster control link encryption.

The clustering feature itself does not require any licenses.

The Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. For the optional Strong Encryption (3DES/AES) feature license enabled in the ASA configuration, see below.

In the ASA license configuration, you can only configure smart licensing on the control unit. The configuration is replicated to the data units, but for some licenses, they do not use the configuration; it remains in a cached state, and only the control unit requests the license. The licenses are aggregated into a single cluster license that is shared by the cluster units, and this aggregated license is also cached on the data units to be used if one of them becomes the control unit in the future. Each license type is managed as follows:

  • Essentials—Only the control unit requests the Essentials license from the server, and all units can use it due to license aggregation.

  • Throughput—Each unit requests its own Throughput license from the server.

  • Strong Encryption (3DES)—If your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the control unit requests this license, and all units can use it due to license aggregation.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each unit and enable the licenses before you configure clustering.

ASA Cluster Licenses for the Firepower 4100/9300

Smart Software Manager Regular and On-Prem

The clustering feature itself does not require any licenses. To use Strong Encryption and other optional licenses, each Firepower 4100/9300 chassis must be registered with the License Authority or Smart Software Manager Regular and On-Prem server. There is no extra cost for data units.

The Strong Encryption license is automatically enabled for qualified customers when you apply the registration token. When using the token, each chassis must have the same encryption license. For the optional Strong Encryption (3DES/AES) feature license enabled in the ASA configuration, see below.

In the ASA license configuration, you can only configure smart licensing on the control unit. The configuration is replicated to the data units, but for some licenses, they do not use the configuration; it remains in a cached state, and only the control unit requests the license. The licenses are aggregated into a single cluster license that is shared by the cluster units, and this aggregated license is also cached on the data units to be used if one of them becomes the control unit in the future. Each license type is managed as follows:

  • Essentials—Only the control unit requests the Essentials license from the server, and both units can use it due to license aggregation.

  • Context—Only the control unit requests the Context license from the server. The Essentials license includes 10 contexts by default and is present on all cluster members. The value from each unit’s Essentials license plus the value of the Context license on the control unit are combined up to the platform limit in an aggregated cluster license. For example:

    • You have 6 Firepower 9300 modules in the cluster. The Essentials license includes 10 contexts; for 6 units, these licenses add up to 60 contexts. You configure an additional 20-Context license on the control unit. Therefore, the aggregated cluster license includes 80 contexts. Because the platform limit for one module is 250, the combined license allows a maximum of 250 contexts; the 80 contexts are within the limit. Therefore, you can configure up to 80 contexts on the control unit; each data unit will also have 80 contexts through configuration replication.

    • You have 3 Firepower 4112 units in the cluster. The Essentials license includes 10 contexts; for 3 units, these licenses add up to 30 contexts. You configure an additional 250-Context license on the control unit. Therefore, the aggregated cluster license includes 280 contexts. Because the platform limit for one unit is 250, the combined license allows a maximum of 250 contexts; the 280 contexts are over the limit. Therefore, you can only configure up to 250 contexts on the control unit; each data unit will also have 250 contexts through configuration replication. In this case, you should only configure the control unit Context license to be 220 contexts.

  • Carrier—Required for Distributed S2S VPN. This license is a per-unit entitlement, and each unit requests its own license from the server.

  • Strong Encryption (3DES)—For pre-2.3.0 Cisco Smart Software Manager On-Prem deployment; or if your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. This license is a per-unit entitlement, and each unit requests its own license from the server.

If a new control unit is elected, the new control unit continues to use the aggregated license. It also uses the cached license configuration to re-request the control unit license. When the old control unit rejoins the cluster as a data unit, it releases the control unit license entitlement. Before the data unit releases the license, the control unit's license might be in a non-compliant state if there are no available licenses in the account. The retained license is valid for 30 days, but if it is still non-compliant after the grace period, you will not be able to make configuration changes to features requiring special licenses; operation is otherwise unaffected. The new active unit sends an entitlement authorization renewal request every 12 hours until the license is compliant. You should refrain from making configuration changes until the license requests are completely processed. If a unit leaves the cluster, the cached control configuration is removed, while the per-unit entitlements are retained. In particular, you would need to re-request the Context license on non-cluster units.

Permanent License Reservation

For permanent license reservation, you must purchase separate licenses for each chassis and enable the licenses before you configure clustering.

Prerequisites for Smart Software Licensing

Smart Software Manager Regular and On-Prem Prerequisites

Firepower 4100/9300

Configure the Smart Software Licensing infrastructure on the Firepower 4100/9300 chassis before you configure the ASA licensing entitlements.

All Other Models

  • Ensure internet access, or HTTP proxy access, or Smart Software Manager On-Prem server access from the device.

  • Configure a DNS server so the device can resolve the name of the Smart Software Manager.

  • Set the clock for the device.

  • Create an account on the Cisco Smart Software Manager:

    https://software.cisco.com/#module/SmartLicensing

    If you do not yet have an account, click the link to set up a new account. The Smart Software Manager lets you create an account for your organization.

Permanent License Reservation Prerequisites

  • Create a master account on the Cisco Smart Software Manager:

    https://software.cisco.com/#module/SmartLicensing

    If you do not yet have an account, click the link to set up a new account. The Smart Software Manager lets you create a master account for your organization. Even though the ASA does need internet connectivity to the Smart Licensing server for permanent license reservation, the Smart Software Manager is used to manage your permanent licenses.

  • Obtain support for permanent license reservation from the licensing team. You must provide a justification for using permanent license reservation. If your account is not approved, then you cannot purchase and apply permanent licenses.

  • Purchase special permanent licenses (see License PIDs Per Model). If you do not have the correct license in your account, then when you try to reserve a license on the ASA, you will see an error message similar to: "The licenses cannot be reserved because the Virtual Account does not contain a sufficient surplus of the following perpetual licenses: 1 - Firepower 4100 ASA PERM UNIV(perpetual)."

  • The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of an Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • ASA Virtual: Permanent license reservation is not supported for the Azure hypervisor.

Guidelines for Smart Software Licensing

  • Only Smart Software Licensing is supported. For older software on the ASA virtual, if you upgrade an existing PAK-licensed ASA virtual, then the previously installed activation key will be ignored, but retained on the device. If you downgrade the ASA virtual, the activation key will be reinstated.

  • For permanent license reservation, you must return the license before you decommission the device. If you do not officially return the license, the license remains in a used state and cannot be reused for a new device.

  • Because the Cisco Transport Gateway uses a certificate with a non-compliant country code, you cannot use HTTPS when using the ASA in conjunction with that product. You must use HTTP with Cisco Transport Gateway.

Defaults for Smart Software Licensing

Smart Transport

By default, all device models use Smart Transport for Smart Software License communication and use the following URL:


https://smartreceiver.cisco.com/licservice/license

For the Firepower 4100/9300, you must enable the Smart Software License communication at the chassis-level.

ASA Virtual

  • When you deploy the ASA virtual, you set the feature tier and throughput level. Only the Essentials level is available at this time. For permanent license reservation, you do not need to set these parameters. When you enable permanent license reservation, these commands are removed from the configuration.


    Note


    The Essentials license used to be known as the Standard license, and the CLI still uses the "standard" terminology.


    
    license smart
      feature tier standard
      throughput level {100M | 1G | 2G | 10G | 20G | unlimited}
    
    

    Note


    If you are using a 32 or 64 core deployment on VMware or KVM, only the unlimited option is available with the throughput level command.


ASA Virtual: Configure Smart Software Licensing

This section describes how to configure Smart Software Licensing for ASA Virtual. Choose one of the following methods:

ASA Virtual: Configure Regular Smart Software Licensing

When you deploy ASA virtual, you can pre-configure the device and include a registration token so it registers with the Smart Software Manager and enables Smart Software Licensing. If you need to change your HTTP proxy server, license entitlement, or register the ASA virtual (for example, if you did not include the ID token in the Day0 configuration), perform this task.


Note


You may have pre-configured the HTTP proxy and license entitlements when you deployed your ASA virtual. You may also have included the registration token with your Day0 configuration when you deployed the ASA virtual; if so, you do not need to re-register using this procedure.


Procedure


Step 1

(Cisco Smart Software Manager), request and copy a registration token for the virtual account to which you want to add this device.

  1. Click Inventory.

    Figure 1. Inventory
  2. On the General tab, click New Token.

    Figure 2. New Token
  3. On the Create Registration Token dialog box enter the following settings, and then click Create Token:

    • Description

    • Expire After—Cisco recommends 30 days.

    • Max. Number of Uses

    • Allow export-controlled functionaility on the products registered with this token—Enables the export-compliance flag.

    Figure 3. Create Registration Token

    The token is added to your inventory.

  4. Click the arrow icon to the right of the token to open the Token dialog box so you can copy the token ID to your clipboard. Keep this token ready for later in the procedure when you need to register the ASA.

    Figure 4. View Token
    Figure 5. Copy Token

Step 2

(Optional) On ASA virtual, specify the HTTP Proxy URL for Smart Transport.

license smart

transport proxy proxy_server_ip port port

To use Smart Call Home instead of Smart Transport, see Step 4.

Note

 
  • HTTP proxy with authentication is not supported.

  • When you configure the proxy server url, do not specify the protocol.

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)# transport proxy 10.1.1.1 port 10101

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)# transport proxy proxy.esl.cisco.com port 80

Step 3

Configure the license entitlements:

  1. Enter license smart configuration mode:

    license smart

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#
    
    
  2. Set the feature tier:

    feature tier standard

    Only the standard (essentials) tier is available, however, you need to enable it in the configuration. The Essentials license was formerly called the Standard license, and "standard" is still used in the CLI.

  3. Set the throughput level to determine the license requested from the Smart Software Manager:

    throughput level {100M | 1G | 2G | 10G | 20G | unlimited}

    Note

     

    If you are using a 32-core or 64-core deployment, only the unlimited option is available.

    See the following throughput/license relationship:

    • 100M—ASAv5

    • 1G—ASAv10

    • 2G—ASAv30

    • 10G—ASAv50

    • 20G—ASAv100

    • unlimited—ASAvU

    Example:

    
    ciscoasa(config-smart-lic)# throughput level 2G
    
    
  4. (Optional) Enable strong encryption.

    feature strong-encryption

    This license is not required if you receive the strong encryption token from the Smart Software Manager. However, if your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

    Example:

    
    ciscoasa(config-smart-lic)# feature strong-encryption
    
    
  1. Exit license smart mode to apply your changes:

    exit

    Your changes do not take effect until you exit the license smart configuration mode, either by explicitly exiting the mode (exit or end) or by entering any command that takes you to a different mode.

    Example:

    
    ciscoasa(config-smart-lic)# exit
    ciscoasa(config)#
    
    

Step 4

(Optional) Use Smart Call Home instead of the default Smart Transport for communication with the Smart Licensing server.

If you know you need to use Smart Call Home instead of Smart Transport, complete these steps. Otherwise, you should use the default Smart Transport.

  1. Set the transport type to Smart Call Home.

    license smart

    transport type callhome

    The configuration includes a Smart Call Home profile called License that specifies the URL for the Smart Software Manager.

    
    call-home
      profile License
        destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
    
    

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#transport type callhome
    
    
  2. (Optional) Specify the HTTP proxy URL.

    call-home

    http-proxy ip_address port port

    Note

     

    HTTP proxy with authentication is not supported.

    Example:

    
    ciscoasa(config)# call-home
    ciscoasa(cfg-call-home)# http-proxy 10.1.1.1 port 443
    
    

Step 5

Register the ASA virtual with the Smart Software Manager.

license smart register idtoken id_token [force]

The ASA virtual attempts to register with the Smart Software Manager and request authorization for the configured license entitlements.

When you register the ASA virtual, the Smart Software Manager issues an ID certificate for communication between the ASA virtual and the Smart Software Manager. It also assigns the ASA virtual to the appropriate virtual account. Normally, this procedure is a one-time instance. However, you might need to later re-register the ASA virtual if the ID certificate expires because of a communication problem, for example.

Use the force keyword to register the ASA virtual that is already registered, but that might be out of sync with the Smart Software Manager. For example, use force if the ASA virtual was accidentally removed from the Smart Software Manager.

Example:


ciscoasa# license smart register idtoken YjE3Njc5MzYtMGQzMi00OTA4
LWJhODItNzBhMGQ5NGRlYjUxLTE0MTQ5NDAy%0AODQzNzl8NXk2bzV3SDE0ZkgwQk
dYRmZ1NTNCNGlvRnBHUFpjcm02WTB4TU4w%0Ac2NnMD0%3D%0A

Step 6

Check the license status.

show license status or show running-config license

If communication with the Smart Software Manager fails, check that you have a DNS server configured as well as correct routing to reach the server.

Example:


asav1# show license status

Smart Licensing is ENABLED

Utility:
  Status: DISABLED

Data Privacy:
  Sending Hostname: yes
    Callhome hostname privacy: DISABLED
    Smart Licensing hostname privacy: DISABLED
  Version privacy: DISABLED

Transport:
  Type: Smart
  URL: https://smartreceiver.cisco.com/licservice/license
  Proxy:
    Not Supported
  VRF:
    Not Supported

Registration:
  Status: UNREGISTERED - REGISTRATION FAILED
  Export-Controlled Functionality: NOT ALLOWED
  Initial Registration: FAILED on Feb 27 2024 06:34:02 UTC
    Failure reason: {"token":["The token 'sgdgdsdg' is not valid."]}
              
License Authorization: 
  Status: No Licenses in Use
              
Export Authorization Key:
  Features Authorized:
    <none>    
              
Miscellaneous:
  Custom Id: <empty>
              
Device Telemetry Report Summary:
================================
Data Channel: NOT AVAILABLE
Reports on disk: 0

Example:


ciscoasa(config)# show running-config license
license smart
feature tier standard
throughput level 1G
transport proxy proxy.esl.cisco.com port 80

ASA Virtual: Configure Smart Software Manager On-Prem Licensing

This procedure applies for the ASA virtual using a Smart Software Manager On-Prem.

Before you begin

  • Download the Smart Software Manager On-Prem OVA file from Cisco.com and install and configure it on a VMwareESXi server. For more information, see the Cisco Smart Software Manager On-Prem Data Sheet.

  • Smart Transport was added to the Smart Software Manager On-Prem in Version 7.0. If you are using an older version, enable Smart Call Home on the ASA virtual according to this procedure.

  • Download the crypto CA trustpool before you place the device in an air-gapped network. This trustpool is normally downloaded automatically, but may be out of date in an air-gapped network:

    crypto ca trustpool import url http://www.cisco.com/security/pki/trs/ios_core.p7b

Procedure


Step 1

Request a registration token on the Smart Software Manager On-Prem.

Step 2

(Optional) On the ASA virtual, specify the HTTP Proxy URL for Smart Transport.

license smart

transport proxy proxy_server_ip port port

To use Smart Call Home instead of Smart Transport, see Step 5.

Note

 

HTTP proxy with authentication is not supported.

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)# transport proxy 10.1.1.1 port 10101

Step 3

Change the license server URL to go to the Smart Software Manager On-Prem.

license smart

transport url https://on-prem_ip_address/SmartTransport

To use Smart Call Home instead of Smart Transport, see Step 5.

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)# transport url https://10.1.5.5/SmartTransport

Step 4

Configure the license entitlements.

  1. Enter license smart configuration mode:

    license smart

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#
    
    
  2. Set the feature tier:

    feature tier standard

    Only the standard (essentials) tier is available, however, you need to enable it in the configuration. The Essentials license was formerly called the Standard license, and standard is still used in the CLI.

  3. Set the throughput level to determine the license requested from the Smart Software Manager:

    throughput level {100M | 1G | 2G | 10G | 20G | unlimited}

    Note

     

    If you are using a 32-core or 64-core deployment, only the unlimited option is available.

    See the following throughput/license relationship:

    • 100M—ASAv5

    • 1G—ASAv10

    • 2G—ASAv30

    • 10G—ASAv50

    • 20G—ASAv100

    • unlimited—ASAvU

    Example:

    
    ciscoasa(config-smart-lic)# throughput level 2G
    
    
  4. (Optional) Enable strong encryption.

    feature strong-encryption

    This license is not required if you receive the strong encryption token from the Smart Software Manager. However, if your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

    Example:

    
    ciscoasa(config-smart-lic)# feature strong-encryption
    
    
  1. Exit license smart mode to apply your changes:

    exit

    Your changes do not take effect until you exit the license smart configuration mode, either by explicitly exiting the mode (exit or end) or by entering any command that takes you to a different mode.

    Example:

    
    ciscoasa(config-smart-lic)# exit
    ciscoasa(config)#
    
    

Step 5

(Optional) Use Smart Call Home instead of the default Smart Transport for communication with the Smart Licensing server.

If you know you need to use Smart Call Home instead of Smart Transport, complete these steps. Otherwise, you should use the default Smart Transport.

  1. Set the transport type to Smart Call Home.

    license smart

    transport type callhome

    The configuration includes a Smart Call Home profile called License that specifies the URL for the Smart Software Manager.

    
    call-home
      profile License
        destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
    
    

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#transport type callhome
    
    
  2. (Optional) Specify the HTTP proxy URL.

    call-home

    http-proxy ip_address port port

    Note

     

    HTTP proxy with authentication is not supported.

    Example:

    
    ciscoasa(config)# call-home
    ciscoasa(cfg-call-home)# http-proxy 10.1.1.1 port 443
    
    
  3. Change the license server URL to go to the Smart Software Manager On-Prem:

    call-home

    profile License

    destination address http https://on-prem_ip_address/Transportgateway/services/DeviceRequestHandler

    Example:

    
    ciscoasa(config)# call-home
    ciscoasa(cfg-call-home)# profile License
    ciscoasa(cfg-call-home-profile)#destination address http https://10.1.5.5/Transportgateway/services/DeviceRequestHandler
    
    

Step 6

Register the ASA using the token you requested in Step 1:

license smart register idtoken id_token

The ASA registers with the Smart Software Manager On-Prem and requests authorization for the configured license entitlements. The Smart Software Manager On-Prem also applies the Strong Encryption (3DES/AES) license if your account allows.

When you register the ASA virtual, the Smart Software Manager On-Prem issues an ID certificate for communication between the ASA virtual and the Smart Software Manager. It also assigns the ASA virtual to the appropriate virtual account. Normally, this procedure is a one-time instance. However, you might need to later re-register the ASA virtual if the ID certificate expires because of a communication problem, for example.

Example:


ciscoasa# license smart register idtoken YjE3Njc5MzYtMGQzMi00OTA4
LWJhODItNzBhMGQ5NGRlYjUxLTE0MTQ5NDAy%0AODQzNzl8NXk2bzV3SDE0ZkgwQk
dYRmZ1NTNCNGlvRnBHUFpjcm02WTB4TU4w%0Ac2NnMD0%3D%0A

Step 7

Check the license status.

show license status

If communication with the Smart Software Manager fails, check that you have a DNS server configured as well as correct routing to reach the server.

Example:


asav1# show license status

Smart Licensing is ENABLED

Utility:
  Status: DISABLED

Data Privacy:
  Sending Hostname: yes
    Callhome hostname privacy: DISABLED
    Smart Licensing hostname privacy: DISABLED
  Version privacy: DISABLED

Transport:
  Type: Smart
  URL: https://10.1.5.5/SmartTransport
  Proxy:
    Not Supported
  VRF:
    Not Supported

Registration:
  Status: UNREGISTERED - REGISTRATION FAILED
  Export-Controlled Functionality: NOT ALLOWED
  Initial Registration: FAILED on Feb 27 2024 06:34:02 UTC
    Failure reason: {"token":["The token 'sgdgdsdg' is not valid."]}
              
License Authorization: 
  Status: No Licenses in Use
              
Export Authorization Key:
  Features Authorized:
    <none>    
              
Miscellaneous:
  Custom Id: <empty>
              
Device Telemetry Report Summary:
================================
Data Channel: NOT AVAILABLE
Reports on disk: 0

ASA Virtual: Configure Utility (MSLA) Smart Software Licensing

Utility Licensing for a Managed Service License Agreement (MSLA) lets you pay for the amount of time a license is in use rather than paying a one time charge for a license subscription or a perpetual license. In Utility Licensing mode, the ASA virtual keeps track of license usage in units of time (15-minute intervals). The ASA virtual sends license usage reports (known as RUM reports) to the Smart Software Manager every four hours. The usage reports are then forwarded to a billing server. With Utility Licensing, Smart Call Home is not used as the transport for licensing messages. Instead the messages are sent directly via HTTP/HTTPS using Smart Transport.

Before you begin

If you are using the Smart Software Manager On-Prem, download the Smart Software Manager On-Prem OVA file from Cisco.com and install and configure it on a VMware ESXi server. For more information, see the Cisco Smart Software Manager On-Prem Data Sheet.

Procedure


Step 1

In the Smart Software Manager (Cisco Smart Software Manager), request and copy a registration token for the virtual account to which you want to add this device.

  1. Click Inventory.

    Figure 6. Inventory
  2. On the General tab, click New Token.

    Figure 7. New Token
  3. On the Create Registration Token dialog box enter the following settings, and then click Create Token:

    • Description

    • Expire After—Cisco recommends 30 days.

    • Max. Number of Uses—The maximum number of uses of the token.

      The token expires either with the expiration date or with the maximum number of uses.

    Figure 8. Create Registration Token

    The token is added to your inventory.

  4. Click the arrow icon to the right of the token to open the Token dialog box so you can copy the token ID to your clipboard. Keep this token ready for later in the procedure when you need to register the ASA.

    Figure 9. View Token
    Figure 10. Copy Token

Step 2

On ASA virtual, configure Smart Licensing parameters.

  1. Enter license smart configuration mode.

    license smart

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)# 
    
    
  2. Enable Smart Transport.

    transport type smart

    Utility Licensing requires Smart Transport instead of Smart Call Home.

    Example:

    
    ciscoasa(config-smart-lic)# transport type smart
    
    
  3. (Optional) Specify the URL of the Smart Software Manager Regular or On-Prem. Optionally, you can specify an alternate destination for the license usage reports.

    transport url {transport_url | utility utility_url | default }

    If you do not set a URL, it uses the default for both Smart Transport and license usage reports, which is https://smartreceiver.cisco.com/licservice/license.

    Example:

    
    ciscoasa(config-smart-lic)# transport url http://server99.cisco.com/SmartTransport
    ciscoasa(config-smart-lic)# transport url utility http://server-utility.cisco.com/SmartTransport
  4. (Optional) If your network uses an HTTP proxy for internet access, configure the proxy address.

    transport proxy proxy-url port proxy-port-number

    Note

     

    HTTP proxy with authentication is not supported.

    Example:

    
    ciscoasa(config-smart-lic)# transport proxy 10.1.1.1 port 443
    
    
  5. Suppress the licensing device's hostname or Smart Agent version number in the licensing messages.

    privacy {all | hostname | version}

    Example:

    
    
    ciscoasa(config-smart-lic)# privacy all
    
    
  6. Set the feature tier:

    feature tier standard

    Only the standard (essentials) tier is available, however, you need to enable it in the configuration. The Essentials license was formerly called the Standard license, and standard is still used in the CLI.

  7. Set the throughput level to determine the license requested from the Smart Software Manager:

    throughput level {100M | 1G | 2G | 10G | 20G | unlimited}

    Note

     

    If you are using a 32-core or 64-core deployment, only the unlimited option is available.

    See the following throughput/license relationship:

    • 100M—ASAv5

    • 1G—ASAv10

    • 2G—ASAv30

    • 10G—ASAv50

    • 20G—ASAv100

    • unlimited—ASAvU

    Example:

    
    ciscoasa(config-smart-lic)# throughput level 2G
    
    
  8. (Optional) Enable strong encryption.

    feature strong-encryption

    This license is not required if you receive the strong encryption token from the Smart Software Manager. However, if your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

    Example:

    
    ciscoasa(config-smart-lic)# feature strong-encryption
    
    
  9. Exit license smart mode to apply your changes:

    exit

    Your changes do not take effect until you exit the license smart configuration mode, either by explicitly exiting the mode (exit or end) or by entering any command that takes you to a different mode.

    Example:

    
    ciscoasa(config-smart-lic)# exit
    ciscoasa(config)#
    
    

Step 3

Configure Utility Licensing.

  1. Enter utility configuration mode.

    utility

    Example:

    
    
    ciscoasa(config-smart-lic)# utility
    ciscoasa(config-smart-lic-util)#
    
    
  2. Create a unique customer identifier. This identifier is included in Utility Licensing usage report messages.

    custom-id custom-identifier

    Example:

    
    
    ciscoasa(config-smart-lic-util)# custom-id MyCustomID
    
    
  3. Create a unique customer profile. This information is included in Utility Licensing usage reports.

    customer-info {city | country | id | name | postalcode | state |street} value

    Example:

    
    ciscoasa(config-smart-lic-util)# customer-info city MyCity
    ciscoasa(config-smart-lic-util)# customer-info country MyCountry
    ciscoasa(config-smart-lic-util)# customer-info id MyID
    ciscoasa(config-smart-lic-util)# customer-info name MyName
    ciscoasa(config-smart-lic-util)# customer-info postalcode MyPostalCode
    ciscoasa(config-smart-lic-util)# customer-info state MyState
    ciscoasa(config-smart-lic-util)# customer-info street MyStreet
    
    
  4. Enable Utility Licensing.

    mode standard

    Example:

    
    ciscoasa(config-smart-lic-util)# mode standard
    
    

Step 4

Register the ASA using the token you requested in Step 1:

license smart register idtoken id_token

Example:


ciscoasa# license smart register idtoken YjE3Njc5MzYtMGQzMi00OTA4
LWJhODItNzBhMGQ5NGRlYjUxLTE0MTQ5NDAy%0AODQzNzl8NXk2bzV3SDE0ZkgwQk
dYRmZ1NTNCNGlvRnBHUFpjcm02WTB4TU4w%0Ac2NnMD0%3D%0A

Step 5

Check the license status.

show license status

If communication with the Smart Software Manager fails, check that you have a DNS server configured as well as correct routing to reach the server.

Example:


asav1# show license status 

Smart Licensing is ENABLED

Utility:
  Status: ENABLED
  Utility report:
    Last success: May 14 2018 21:37:25 UTC
    Last attempt: SUCCEEDED on May 14 2018 21:37:24 UTC
    Next attempt: May 15 2018 01:37:24 UTC

  Customer Information:
    Id: MyID
    Name: MyName
    Street: MyStreet
    City: MyCity
    State: MyState
    Country: MyCountry
    Postal Code: MyPostalCode

Data Privacy:
  Sending Hostname: no
    Callhome hostname privacy: DISABLED
    Smart Licensing hostname privacy: ENABLED
  Version privacy: ENABLED

Transport:
  Type: Smart
  Registration URL: http://server99.cisco.com/SmartTransport
  Utility URL: http://server-utility.cisco.com/SmartTransport

Registration:
  Status: REGISTERED
  Export-Controlled Functionality: Allowed
  Initial Registration: SUCCEEDED on May 14 2018 21:37:20 UTC
  Last Renewal Attempt: None
  Next Renewal Attempt: Sep 13 2018 13:34:40 UTC
  Registration Expires: May 14 2019 21:29:20 UTC

License Authorization: 
  Status: AUTHORIZED on May 14 2018 21:37:22 UTC
  Last Communication Attempt: NOT STARTED
    Failure reason: Device in Thirdparty Utility Mode
  Next Communication Attempt: None
  Communication Deadline: Aug 12 2018 21:37:24 UTC


ASA Virtual: Configure Permanent License Reservation

You can assign a permanent license to the ASA virtual. This section also describes how to return a license if you retire the ASA virtual or change model tiers and need a new license.

Procedure


Step 1

Install the ASA Virtual Permanent License

Step 2

(Optional) Return the ASA Virtual Permanent License


Install the ASA Virtual Permanent License

For ASA virtual's that do not have Internet access, you can request a permanent license from the Smart Software Manager.


Note


For permanent license reservation, you must return the license before you decommission the ASA virtual. If you do not officially return the license, the license remains in a used state and cannot be reused for a new ASA virtual. See (Optional) Return the ASA Virtual Permanent License.



Note


If you clear your configuration after you install the permanent license (for example using write erase ), then you only need to reenable permanent license reservation using the license smart reservation command without any arguments as shown in step 1; you do not need to complete the rest of this procedure.


Before you begin
  • Purchase permanent licenses so they are available in the Smart Software Manager. Not all accounts are approved for permanent license reservation. Make sure you have approval from Cisco for this feature before you attempt to configure it.

  • You must request a permanent license after the ASA virtual starts up; you cannot install a permanent license as part of the Day 0 configuration.

Procedure

Step 1

(ASAv5 only) Allow use of the ASAv5 permanent license when DRAM is 2GB (the minimum required in 9.13 and later).

license smart set_plr5

Step 2

At the ASA virtual CLI, enable permanent license reservation:

license smart reservation

Example:

ciscoasa (config)# license smart reservation
ciscoasa (config)# 

The following commands are removed:


license smart
  feature tier standard
  throughput level {100M | 1G | 2G | 10G | 20G| unlimited}

If you are using a 32 or 64 core deployment on VMware or KVM, only the unlimited option is available with the throughput level command.

To use regular smart licensing, use the no form of this command, and re-enter the above commands. Other licensing configuration remains intact but unused, so you do not need to re-enter those commands.

Step 3

Request the license code to enter in the Smart Software Manager:

license smart reservation request universal

Example:

ciscoasa# license smart reservation request universal
Enter this request code in the Cisco Smart Software Manager portal:
ABP:ASAv,S:9AU5ET6UQHD{A8ug5/1jRDaSp3w8uGlfeQ{53C13E
ciscoasa# 

When you deploy ASA virtual, the vCPU and memory that you choose determines the model license required. Unlike regular smart licensing with flexible vCPU/memory and throughput combinations, permanent license reservation is still tied to the vCPU/memory you use when you deploy the ASA virtual.

See the following vCPU/memory-to-license relationships:

  • 2 GB, 1 vCPU—ASAv5 (100M) (requires the license smart set_plr5 command; otherwise, this footprint will use the ASAv10 license and allow 1G throughput.)

  • 2 GB, 1 vCPU—ASAv10 (1G)

  • 8 GB, 4 vCPUs —ASAv30 (2G)

  • 16 GB, 8 vCPUs—ASAv50 (10G)

  • 32 GB, 16 vCPUs—ASAv100 (20G)

  • 64 GB, 32 vCPU—ASAvU

  • 128 GB, 64 vCPU—ASAvU

For this licensing model, if you later want to change the model level of a unit, you will have to return the current license and request a new license at the correct model level. To change the model of an already deployed ASA virtual, from the hypervisor you can change the vCPUs and DRAM settings to match the new model requirements; see the ASA virtual quick start guide for these values. To view your current model, use the show vm command.

If you re-enter this command, then the same code is displayed, even after a reload. If you have not yet entered this code into the Smart Software Manager and want to cancel the request, enter:

license smart reservation cancel

If you disable permanent license reservation, then any pending requests are canceled. If you already entered the code into the Smart Software Manager, then you must complete this procedure to apply the license to the ASA virtual, after which point you can return the license if desired. See (Optional) Return the ASA Virtual Permanent License.

Step 4

Go to the Smart Software Manager Inventory screen, and click the Licenses tab:

https://software.cisco.com/#SmartLicensing-Inventory

The Licenses tab displays all existing licenses related to your account, both regular and permanent.

Step 5

Click License Reservation, and type the ASA virtual code into the box. Click Reserve License.

The Smart Software Manager generates an authorization code. You can download the code or copy it to the clipboard. At this point, the license is now in use according to the Smart Software Manager.

If you do not see the License Reservation button, then your account is not authorized for permanent license reservation. In this case, you should disable permanent license reservation and re-enter the regular smart license commands.

Step 6

On the ASA virtual, enter the authorization code:

license smart reservation install code

Example:

ciscoasa# license smart reservation install AAu3431rGRS00Ig5HQl2vpzg{MEYCIQCBw$
ciscoasa# 

Your ASA virtual is now fully licensed.


(Optional) Return the ASA Virtual Permanent License

If you no longer need a permanent license (for example, you are retiring the ASA virtual or changing its model level so it needs a new license), you must officially return the license to the Smart Software Manager using this procedure. If you do not follow all steps, then the license stays in a used state and cannot easily be freed up for use elsewhere.

Procedure

Step 1

On the ASA virtual, generate a return code:

license smart reservation return

Example:

ciscoasa# license smart reservation return
Enter this return code in the Cisco Smart Software Manager portal:
Au3431rGRS00Ig5HQl2vpcg{uXiTRfVrp7M/zDpirLwYCaq8oSv60yZJuFDVBS2QliQ=

The ASA virtual immediately becomes unlicensed and moves to the Evaluation state. If you need to view this code again, re-enter this command. Note that if you request a new permanent license (license smart reservation request universal ) or change the ASA virtual model level (by powering down and changing the vCPUs/RAM), then you cannot re-display this code. Be sure to capture the code to complete the return.

Step 2

View the ASA virtual universal device identifier (UDI) so you can find this ASA virtual instance in the Smart Software Manager:

show license udi

Example:

ciscoasa# show license udi    
UDI: PID:ASAv,SN:9AHV3KJBEKE
ciscoasa#
 

Step 3

Go to the Smart Software Manager Inventory screen, and click the Product Instances tab:

https://software.cisco.com/#SmartLicensing-Inventory

The Product Instances tab displays all licensed products by the UDI.

Step 4

Find the ASA virtual you want to unlicense, choose Actions > Remove, and type the ASA virtual return code into the box. Click Remove Product Instance.

The permanent license is returned to the available pool.


(Optional) Deregister the ASA Virtual (Regular and On-Prem)

Deregistering the ASA virtual removes the ASA virtual from your account. All license entitlements and certificates on the ASA virtual are removed. You might want to deregister to free up a license for a new ASA virtual. Alternatively, you can remove the ASA virtual from the Smart Software Manager.


Note


If you deregister the ASA virtual, then it will revert to a severely rate-limited state after you reload the ASA virtual.


Procedure


Deregister the ASA virtual:

license smart deregister

The ASA virtual then reloads.


(Optional) Renew the ASA Virtual ID Certificate or License Entitlement (Regular and On-Prem)

By default, the ID certificate is automatically renewed every 6 months, and the license entitlement is renewed every 30 days. You might want to manually renew the registration for either of these items if you have a limited window for Internet access, or if you make any licensing changes in the Smart Software Manager, for example.

Procedure


Step 1

Renew the ID certificate:

license smart renew id

Step 2

Renew the license entitlement:

license smart renew auth


Firepower 1000, Secure Firewall 1200/3100/4200: Configure Smart Software Licensing

This section describes how to configure Smart Software Licensing for the Firepower 1000, Secure Firewall 1200/3100/4200. Choose one of the following methods:

Firepower 1000, Secure Firewall 1200/3100/4200: Configure Regular Smart Software Licensing

This procedure applies for an ASA using the Smart Software Manager.

Procedure


Step 1

In the Smart Software Manager (Cisco Smart Software Manager), request and copy a registration token for the virtual account to which you want to add this device.

  1. Click Inventory.

    Figure 11. Inventory
  2. On the General tab, click New Token.

    Figure 12. New Token
  3. On the Create Registration Token dialog box enter the following settings, and then click Create Token:

    • Description

    • Expire After—Cisco recommends 30 days.

    • Max. Number of Uses—The maximum number of uses of the token.

      The token expires either with the expiration date or with the maximum number of uses.

    • Allow export-controlled functionaility on the products registered with this token—Enables the export-compliance flag.

    Figure 13. Create Registration Token

    The token is added to your inventory.

  4. Click the arrow icon to the right of the token to open the Token dialog box so you can copy the token ID to your clipboard. Keep this token ready for later in the procedure when you need to register the ASA.

    Figure 14. View Token
    Figure 15. Copy Token

Step 2

(Optional) On the ASA, specify the HTTP Proxy URL for Smart Transport.

license smart

transport proxy proxy_server_ip port port

To use Smart Call Home instead of Smart Transport, see Step Step 4.

Note

 
  • HTTP proxy with authentication is not supported.

  • When you configure the proxy server url, do not specify the protocol.

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)# transport proxy 10.1.1.1 port 10101

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)# transport proxy proxy.esl.cisco.com port 80

Step 3

Request license entitlements on the ASA.

  1. Enter license smart configuration mode:

    license smart

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#
    
    
  2. (Firepower 1000) Set the feature tier:

    feature tier standard

    Only the standard (essentials) tier is available, however, you need to enable it in the configuration; a tier license is a prerequisite for adding other feature licenses.The Essentials license was formerly called the Standard license, and "standard" is still used in the CLI. For Secure Firewall models, the Essentials license is always enabled and cannot be disabled.

  3. Request the security context license.

    feature context number

    Note

     

    This license is not supported for the Firepower 1010 and Secure Firewall 1210/1220.

    By default, the ASA supports 2 contexts, so you should request the number of contexts you want minus the 2 default contexts. The maximum number of contexts depends on your model:

    • Firepower 1120—5 contexts

    • Firepower 1140—10 contexts

    • Firepower 1150—25 contexts

    • Secure Firewall 3100—100 contexts

    • Secure Firewall 4200—100 contexts

    For example, to use the maximum of 25 contexts on the Firepower 1150, enter 23 for the number of contexts; this value is added to the default of 2.

    Example:

    
    ciscoasa(config-smart-lic)# feature context 18
    
    
  4. (Optional) (Firepower 1010) Request the Security Plus license to enable failover.

    feature security-plus

    Example:

    
    ciscoasa(config-smart-lic)# feature security-plus
    
    
  5. (Optional) (Secure Firewall 3100/4200) Request the Carrier license for Diameter, GTP/GPRS, SCTP inspection.

    feature carrier

    Example:

    
    ciscoasa(config-smart-lic)# feature carrier
    
    
  6. (Optional) Enable strong encryption.

    feature strong-encryption

    This license is not required if you receive the strong encryption token from the Smart Software Manager. However, if your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

    Example:

    
    ciscoasa(config-smart-lic)# feature strong-encryption
    
    

Step 4

(Optional) Use Smart Call Home instead of the default Smart Transport for communication with the Smart Licensing server.

If you know you need to use Smart Call Home instead of Smart Transport, complete these steps. Otherwise, you should use the default Smart Transport.

  1. Set the transport type to Smart Call Home.

    license smart

    transport type callhome

    The configuration includes a Smart Call Home profile called License that specifies the URL for the Smart Software Manager.

    
    call-home
      profile License
        destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
    
    

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#transport type callhome
    
    
  2. (Optional) Specify the HTTP proxy URL.

    call-home

    http-proxy ip_address port port

    Note

     

    HTTP proxy with authentication is not supported.

    Example:

    
    ciscoasa(config)# call-home
    ciscoasa(cfg-call-home)# http-proxy 10.1.1.1 port 443
    
    

Step 5

Register the ASA using the token you copied in Step 1:

license smart register idtoken id_token

Example:


ciscoasa# license smart register idtoken YjE3Njc5MzYtMGQzMi00OTA4
LWJhODItNzBhMGQ5NGRlYjUxLTE0MTQ5NDAy%0AODQzNzl8NXk2bzV3SDE0ZkgwQk
dYRmZ1NTNCNGlvRnBHUFpjcm02WTB4TU4w%0Ac2NnMD0%3D%0A

The ASA registers with the Smart Software Manager and requests authorization for the configured license entitlements. The Smart Software Manager also applies the Strong Encryption (3DES/AES) license if your account allows. Use the show license summary or show running-config license command to check the license status and usage.

Example:


ciscoasa# show license summary

Smart Licensing is ENABLED

Registration:
  Status: REGISTERED
  Smart Account: Biz1
  Virtual Account: IT
  Export-Controlled Functionality: Allowed
  Last Renewal Attempt: None
  Next Renewal Attempt: Mar 19 20:26:29 2018 UTC

License Authorization: 
  Status: AUTHORIZED
  Last Communication Attempt: SUCCEEDED
  Next Communication Attempt: Oct 23 01:41:26 2017 UTC

License Usage:
  License                 Entitlement tag               Count Status
  -----------------------------------------------------------------------------
  regid.2014-08.com.ci... (FP1010-ASA-Std)                     1 AUTHORIZED

Example:


ciscoasa(config)# show running-config license
license smart
feature tier standard
throughput level 1G
transport proxy proxy.esl.cisco.com port 80

Firepower 1000, Secure Firewall 1200/3100/4200: Configure Smart Software Manager On-Prem Licensing

This procedure applies for an ASA using a Smart Software Manager On-Prem.

Before you begin

  • Download the Smart Software Manager On-Prem OVA file from Cisco.com and install and configure it on a VMwareESXi server. For more information, see the Cisco Smart Software Manager On-Prem Data Sheet.

  • Smart Transport was added to the Smart Software Manager On-Prem in Version 7.0. If you are using an older version, enable Smart Call Home on the ASA according to this procedure.

  • Download the crypto CA trustpool before you place the device in an air-gapped network. This trustpool is normally downloaded automatically, but may be out of date in an air-gapped network:

    crypto ca trustpool import url http://www.cisco.com/security/pki/trs/ios_core.p7b

Procedure


Step 1

Request a registration token on the Smart Software Manager On-Prem server.

Step 2

(Optional) On the ASA, specify the HTTP Proxy URL for Smart Transport.

license smart

transport proxy proxy_server_ip port port

To use Smart Call Home instead of Smart Transport, see Step Step 5.

Note

 

HTTP proxy with authentication is not supported.

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)# transport proxy 10.1.1.1 port 10101

Step 3

Change the license server URL to go to the Smart Software Manager On-Prem.

license smart

transport url https://on-prem_ip_address/SmartTransport

To use Smart Call Home instead of Smart Transport, see Step Step 5.

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)# transport url https://10.1.5.5/SmartTransport

Step 4

Request license entitlements on the ASA.

  1. Enter license smart configuration mode:

    license smart

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#
    
    
  2. (Firepower 1000) Set the feature tier:

    feature tier standard

    Only the standard (essentials) tier is available, however, you need to enable it in the configuration; a tier license is a prerequisite for adding other feature licenses.The Essentials license was formerly called the Standard license, and "standard" is still used in the CLI. For Secure Firewall models, the Essentials license is always enabled and cannot be disabled.

  3. (Optional) Request the security context license.

    feature context number

    Note

     

    This license is not supported for the Firepower 1010 and Secure Firewall 1210/1220.

    By default, the ASA supports 2 contexts, so you should request the number of contexts you want minus the 2 default contexts. The maximum number of contexts depends on your model:

    • Firepower 1120—5 contexts

    • Firepower 1140—10 contexts

    • Firepower 1150—25 contexts

    • Secure Firewall 3100—100 contexts

    • Secure Firewall 4200—100 contexts

    For example, to use the maximum of 25 contexts on the Firepower 1150, enter 23 for the number of contexts; this value is added to the default of 2.

    Example:

    
    ciscoasa(config-smart-lic)# feature context 18
    
    
  4. (Optional) (Firepower 1010) Request the Security Plus license to enable failover.

    feature security-plus

    Example:

    
    ciscoasa(config-smart-lic)# feature security-plus
    
    
  5. (Optional) (Secure Firewall 3100/4200) Request the Carrier license for Diameter, GTP/GPRS, SCTP inspection.

    feature carrier

    Example:

    
    ciscoasa(config-smart-lic)# feature carrier
    
    
  6. (Optional) Enable strong encryption.

    feature strong-encryption

    This license is not required if you receive the strong encryption token from the Smart Software Manager. However, if your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

    Example:

    
    ciscoasa(config-smart-lic)# feature strong-encryption
    
    

Step 5

(Optional) Use Smart Call Home instead of the default Smart Transport for communication with the Smart Licensing server.

If you know you need to use Smart Call Home instead of Smart Transport, complete these steps. Otherwise, you should use the default Smart Transport.

  1. Set the transport type to Smart Call Home.

    license smart

    transport type callhome

    The configuration includes a Smart Call Home profile called License that specifies the URL for the Smart Software Manager.

    
    call-home
      profile License
        destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
    
    

    Example:

    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#transport type callhome
    
    
  2. (Optional) Specify the HTTP proxy URL.

    call-home

    http-proxy ip_address port port

    Note

     

    HTTP proxy with authentication is not supported.

    Example:

    
    ciscoasa(config)# call-home
    ciscoasa(cfg-call-home)# http-proxy 10.1.1.1 port 443
    
    
  3. Change the license server URL to go to the Smart Software Manager On-Prem:

    call-home

    profile License

    destination address http https://on-prem_ip_address/Transportgateway/services/DeviceRequestHandler

    Example:

    
    ciscoasa(config)# call-home
    ciscoasa(cfg-call-home)# profile License
    ciscoasa(cfg-call-home-profile)#destination address http https://10.1.5.5/Transportgateway/services/DeviceRequestHandler
    
    

Step 6

Register the ASA using the token you requested in Step 1:

license smart register idtoken id_token

Example:


ciscoasa# license smart register idtoken YjE3Njc5MzYtMGQzMi00OTA4
LWJhODItNzBhMGQ5NGRlYjUxLTE0MTQ5NDAy%0AODQzNzl8NXk2bzV3SDE0ZkgwQk
dYRmZ1NTNCNGlvRnBHUFpjcm02WTB4TU4w%0Ac2NnMD0%3D%0A

The ASA registers with the Smart Software Manager On-Prem server and requests authorization for the configured license entitlements. The Smart Software Manager On-Prem server also applies the Strong Encryption (3DES/AES) license if your account allows. Use the show license summary command to check the license status and usage.

Example:


ciscoasa# show license summary

Smart Licensing is ENABLED

Registration:
  Status: REGISTERED
  Smart Account: Biz1
  Virtual Account: IT
  Export-Controlled Functionality: Allowed
  Last Renewal Attempt: None
  Next Renewal Attempt: Mar 19 20:26:29 2018 UTC

License Authorization: 
  Status: AUTHORIZED
  Last Communication Attempt: SUCCEEDED
  Next Communication Attempt: Oct 23 01:41:26 2017 UTC

License Usage:
  License                 Entitlement tag               Count Status
  -----------------------------------------------------------------------------
  regid.2014-08.com.ci... (FP1010-ASA-Std)                     1 AUTHORIZED


Firepower 1000, Secure Firewall 1200/3100/4200: Configure Permanent License Reservation

You can assign a permanent license to a Firepower 1000, Secure Firewall 1200/3100/4200. This section also describes how to return a license if you retire the ASA.

Procedure


Step 1

Install the Firepower 1000, Secure Firewall 1200/3100/4200 Permanent License.

Step 2

(Optional) Return the Firepower 1000, Secure Firewall 1200/3100/4200 Permanent License.


Install the Firepower 1000, Secure Firewall 1200/3100/4200 Permanent License

For ASAs that do not have internet access, you can request a permanent license from the Smart Software Manager. The permanent license enables all features: Essentials license with maximum Security Contexts.


Note


For permanent license reservation, you must return the license before you decommission the ASA. If you do not officially return the license, the license remains in a used state and cannot be reused for a new ASA. See (Optional) Return the Firepower 1000, Secure Firewall 1200/3100/4200 Permanent License.


Before you begin

Purchase permanent licenses so they are available in the Smart Software Manager. Not all accounts are approved for permanent license reservation. Make sure you have approval from Cisco for this feature before you attempt to configure it.

Procedure

Step 1

At the ASA CLI, enable permanent license reservation:

license smart reservation

Example:

ciscoasa (config)# license smart reservation
ciscoasa (config)# 

Step 2

Request the license code to enter in the Smart Software Manager:

license smart reservation request universal

Example:

ciscoasa# license smart reservation request universal
Enter this request code in the Cisco Smart Software Manager portal:
BB-ZFPR-2140:JAD200802RR-AzKmHcc71-2A
ciscoasa# 

If you re-enter this command, then the same code is displayed, even after a reload. If you have not yet entered this code into the Smart Software Manager and want to cancel the request, enter:

license smart reservation cancel

If you disable permanent license reservation, then any pending requests are canceled. If you already entered the code into the Smart Software Manager, then you must complete this procedure to apply the license to the ASA, after which point you can return the license if desired. See (Optional) Return the Firepower 1000, Secure Firewall 1200/3100/4200 Permanent License.

Step 3

Go to the Smart Software Manager Inventory screen, and click the Licenses tab:

https://software.cisco.com/#SmartLicensing-Inventory

The Licenses tab displays all existing licenses related to your account, both regular and permanent.

Step 4

Click License Reservation, and type the ASA code into the box. Click Reserve License.

The Smart Software Manager generates an authorization code. You can download the code or copy it to the clipboard. At this point, the license is now in use according to the Smart Software Manager.

If you do not see the License Reservation button, then your account is not authorized for permanent license reservation. In this case, you should disable permanent license reservation and re-enter the regular smart license commands.

Step 5

On the ASA, enter the authorization code:

license smart reservation install code

Example:

ciscoasa# license smart reservation install AAu3431rGRS00Ig5HQl2vpzg{MEYCIQCBw$
ciscoasa# 

Step 6

Request license entitlements on the ASA.

Note

 

Although the permanent license allows the full use of all of the licenses, you still need to turn on the entitlements in the ASA configuration so that the ASA knows it can use them.

  1. Enter license smart configuration mode:

    license smart

    Example:
    
    ciscoasa(config)# license smart
    ciscoasa(config-smart-lic)#
    
    
  2. (Firepower 1000) Set the feature tier:

    feature tier standard

    Only the standard (essentials) tier is available, however, you need to enable it in the configuration; a tier license is a prerequisite for adding other feature licenses.The Essentials license was formerly called the Standard license, and "standard" is still used in the CLI. For Secure Firewall models, the Essentials license is always enabled and cannot be disabled.

  3. (Optional) Enable the security context license.

    feature context number

    Note

     

    This license is not supported for the Firepower 1010 and Secure Firewall 1210/1220.

    By default, the ASA supports 2 contexts, so you should enable the number of contexts you want minus the 2 default contexts. Because the permanent license allows the maximum number, you can enable the maximum number for your model. The maximum number of contexts depends on your model:

    • Firepower 1120—5 contexts

    • Firepower 1140—10 contexts

    • Firepower 1150—25 contexts

    • Secure Firewall 3100—100 contexts

    • Secure Firewall 4200—100 contexts

    For example, to use the maximum of 25 contexts on the Firepower 1150, enter 23 for the number of contexts; this value is added to the default of 2.

    Example:
    
    ciscoasa(config-smart-lic)# feature context 18
    
    
  4. (Optional) (Firepower 1010) Enable the Security Plus license to enable failover.

    feature security-plus

    Example:
    
    ciscoasa(config-smart-lic)# feature security-plus
    
    
  5. (Optional) (Secure Firewall 3100/4200) Enable the Carrier license for Diameter, GTP/GPRS, SCTP inspection.

    feature carrier

    Example:
    
    ciscoasa(config-smart-lic)# feature carrier
    
    
  6. (Optional) Enable strong encryption.

    feature strong-encryption

    This license is not required if you receive the strong encryption token from the Smart Software Manager. However, if your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

    Example:
    
    ciscoasa(config-smart-lic)# feature strong-encryption
    
    

(Optional) Return the Firepower 1000, Secure Firewall 1200/3100/4200 Permanent License

If you no longer need a permanent license (for example, you are retiring an ASA), you must officially return the license to the Smart Software Manager using this procedure. If you do not follow all steps, then the license stays in a used state and cannot easily be freed up for use elsewhere.

Procedure

Step 1

On the ASA, generate a return code:

license smart reservation return

Example:

ciscoasa# license smart reservation return
Enter this return code in the Cisco Smart Software Manager portal:
Au3431rGRS00Ig5HQl2vpcg{uXiTRfVrp7M/zDpirLwYCaq8oSv60yZJuFDVBS2QliQ=

The ASA immediately becomes unlicensed and moves to the Evaluation state. If you need to view this code again, re-enter this command. Note that if you request a new permanent license (license smart reservation request universal ), then you cannot re-display this code. Be sure to capture the code to complete the return. If the evaluation period has expired, then the ASA moves into an expired state. For more information about out-of-compliance states, see Out-of-Compliance State.

Step 2

View the ASA universal device identifier (UDI) so you can find this ASA instance in the Smart Software Manager:

show license udi

Example:

ciscoasa# show license udi    
UDI: PID:FPR-2140,SN:JAD200802RR
ciscoasa#
 

Step 3

Go to the Smart Software Manager Inventory screen, and click the Product Instances tab:

https://software.cisco.com/#SmartLicensing-Inventory

The Product Instances tab displays all licensed products by the UDI.

Step 4

Find the ASA you want to unlicense, choose Actions > Remove, and type the ASA return code into the box. Click Remove Product Instance.

The permanent license is returned to the available pool.


(Optional) Deregister the Firepower 1000, Secure Firewall 1200/3100/4200 (Regular and On-Prem)

Deregistering the ASA removes the ASA from your account. All license entitlements and certificates on the ASA are removed. You might want to deregister to free up a license for a new ASA. Alternatively, you can remove the ASA from the Smart Software Manager.

Procedure


Deregister the ASA:

license smart deregister


(Optional) Renew the Firepower 1000, Secure Firewall 1200/3100/4200 ID Certificate or License Entitlement (Regular and On-Prem)

By default, the ID certificate is automatically renewed every 6 months, and the license entitlement is renewed every 30 days. You might want to manually renew the registration for either of these items if you have a limited window for internet access, or if you make any licensing changes in the Smart Software Manager, for example.

Procedure


Step 1

Renew the ID certificate:

license smart renew id

Step 2

Renew the license entitlement:

license smart renew auth


Firepower 4100/9300: Configure Smart Software Licensing

This procedure applies for a chassis using the Smart Software Manager, Smart Software Manager On-Prem, or for Permanent License Reservation; see the FXOS configuration guide to configure your method as a prerequisite.

For Permanent License Reservation, the license enables all features: Standard tier with maximum Security Contexts and the Carrier license. However, for the ASA to know to use these features, you need to enable them on the ASA.

Before you begin

For an ASA cluster, you need to access the control unit for configuration. Check the chassis manager to see which unit is the control unit. You can also check from the ASA CLI, as shown in this procedure.

Procedure


Step 1

Connect to the Firepower 4100/9300 chassis CLI (console or SSH), and then session to the ASA:


connect module slot console
connect asa

Example:


Firepower> connect module 1 console
Firepower-module1> connect asa

asa>

The next time you connect to the ASA console, you go directly to the ASA; you do not need to enter connect asa again.

For an ASA cluster, you only need to access the control unit for license configuration and other configuration. Typically, the control unit is in slot 1, so you should connect to that module first.

Step 2

At the ASA CLI, enter global configuration mode. By default, the enable password is blank unless you set it when you deployed the logical device, but you are prompted to change the password the first time you enter the enable command.


enable
configure terminal

Example:


asa> enable
Password:
The enable password is not set. Please set it now.
Enter Password: ******
Repeat Password: ******
asa# configure terminal
asa(config)# 

Step 3

If required, for an ASA cluster confirm that this unit is the control unit:

show cluster info

Example:


asa(config)# show cluster info
Cluster stbu: On
  This is "unit-1-1" in state SLAVE
    ID : 0
    Version : 9.5(2)
    Serial No.: P3000000025
    CCL IP : 127.2.1.1
    CCL MAC : 000b.fcf8.c192
    Last join : 17:08:59 UTC Sep 26 2015
    Last leave: N/A
Other members in the cluster:
  Unit "unit-1-2" in state SLAVE
    ID : 1
    Version : 9.5(2)
    Serial No.: P3000000001
    CCL IP : 127.2.1.2
    CCL MAC : 000b.fcf8.c162
    Last join : 19:13:11 UTC Sep 23 2015
    Last leave: N/A
  Unit "unit-1-3" in state MASTER
    ID : 2
    Version : 9.5(2)
    Serial No.: JAB0815R0JY
    CCL IP : 127.2.1.3
    CCL MAC : 000f.f775.541e
    Last join : 19:13:20 UTC Sep 23 2015
    Last leave: N/A

If a different unit is the control unit, exit the connection and connect to the correct unit. See below for information about exiting the connection.

Step 4

Enter license smart configuration mode:

license smart

Example:


ciscoasa(config)# license smart
ciscoasa(config-smart-lic)#

Step 5

Set the feature tier:

feature tier standard

Only the standard tier is available. A tier license is a prerequisite for adding other feature licenses. You must have sufficient tier licenses in your account. Otherwise, you cannot configure any other feature licenses or any features that require licenses.

Step 6

Request one or more of the following features:

  • Carrier (GTP/GPRS, Diameter, and SCTP inspection)

    feature carrier

  • Security Contexts

    feature context <1-248>

    For Permanent License Reservation, you can specify the maximum contexts (248).

  • Strong Encryption (3DES/AES)

    feature strong-encryption

    This license is not required if you receive the strong encryption token from the Smart Software Manager. However, if your Smart Account is not authorized for strong encryption, but Cisco has determined that you are allowed to use strong encryption, you can manually add a strong encryption license to your account. Only the active unit requests this license, and both units can use it due to license aggregation.

Example:


ciscoasa(config-smart-lic)# feature carrier
ciscoasa(config-smart-lic)# feature context 50

Step 7

To exit the ASA console, enter ~ at the prompt to exit to the Telnet application. Enter quit to exit back to the supervisor CLI.


Licenses Per Model

This section lists the license entitlements available for the ASAv and Firepower 4100/9300 chassis ASA security module.

ASA Virtual

When you set the throughput level in the ASA configuration using the throughput level command, it determines the license requested from the Smart Software Manager. See the following throughput level/license relationship:

  • 100M—ASAv5

  • 1G—ASAv10

  • 2G—ASAv30

  • 10G—ASAv50

  • 20G—ASAv100

  • Unlimited—ASAvU

The throughput level also determines the maximum Secure Client and TLS proxy sessions. However, a lower ASA virtual memory profile will cap your actual number of sessions, so to determine your sessions, you need to check both the throughput level and the memory installed.

The memory of your ASA virtual determines the maximum concurrent firewall connections and VLANs, and is not determined by the throughput level.

The following table shows the licensed features for the ASA virtual series.

Licenses

Description

Entitlement Licenses

Throughput Level

You set the throughput level in the ASA configuration using the throughput level command. This level determines the license you need.

100M: ASAv5

1G: ASAv10

2G: ASAv30

10G: ASAv50

20G: ASAv100

Unlimited: ASAvU

Firewall Licenses

Botnet Traffic Filter

Enabled

Firewall Connections, Concurrent

Firewall connections are determined by the ASA virtual memory.

2 GB to 7.9 GB: 100,000

8 GB to 15.9 GB: 500,000

16 GB to 31.9 GB: 2,000,000

32 GB to 64 GB: 4,000,000

ASAvU: If you are using ASAvU, which uses a minimum memory of 64 GB, the maximum number of firewall connections is 8,000,000.

Carrier

Enabled

Total TLS Proxy Sessions

TLS Proxy Sessions are determined by the throughput level and ASA virtual memory.

100M throughput + any memory: 500

1G throughput + any memory: 500

2G throughput:

  • 2 GB to 7.9 GB memory: 500

  • 8 GB+ memory: 1000

10G throughput:

  • 2 GB to 7.9 GB memory: 500

  • 8 GB to 15.9 GB memory: 1000

  • 16 GB+ memory: 10,000

20G throughput:

  • 2 GB to 7.9 GB memory: 500

  • 8 GB to 15.9 GB memory: 1000

  • 16 GB to 31.9 GB memory: 10,000

  • 32 GB+ memory: 20,000

Unlimited throughput: If you are using ASAvU, which uses a minimum memory of 64 GB, the maximum number of TLS proxy sessions is 40,000.

VPN Licenses

Secure Client peers

Unlicensed

Secure Client peers are determined by the throughput level and ASA virtual memory.

Optional Secure Client Advantage or Secure Client Premier license, Maximums:

100M throughput + any memory: 50

1G throughput + any memory: 250

2G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB+ memory: 750

10G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB to 15.9 GB memory: 750

  • 16 GB+ memory: 10,000

20G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB to 15.9 GB memory: 750

  • 16 GB to 31.9 GB: 10,000

  • 32 GB+ memory: 20,000

Unlimited throughput: If you are using ASAvU, which uses a minimum memory of 64 GB, the maximum number of Secure Client peers is 40,000.

Other VPN Peers

Note

 

Other VPN peers are determined by the throughput level and ASA virtual memory.

100M throughput + any memory: 50

1G throughput + any memory: 250

2G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB+ memory: 750

10G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB to 15.9 GB memory: 750

  • 16 GB+ memory: 10,000

20G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB to 15.9 GB memory: 750

  • 16 GB to 31.9 GB: 10,000

  • 32 GB+ memory: 20,000

Unlimited throughput: If you are using ASAvU, which uses a minimum memory of 64 GB, the maximum number of other VPN peers is 40,000.

Total VPN Peers, combined all types

Note

 

Total VPN peers are determined by the throughput level and ASA virtual memory.

100M throughput + any memory: 50

1G throughput + any memory: 250

2G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB+ memory: 750

10G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB to 15.9 GB memory: 750

  • 16 GB+ memory: 10,000

20G throughput:

  • 2 GB to 7.9 GB memory: 250

  • 8 GB to 15.9 GB memory: 750

  • 16 GB to 31.9 GB: 10,000

  • 32 GB+ memory: 20,000

Unlimited throughput: If you are using ASAvU, which uses a minimum memory of 64 GB, the maximum number of VPN peers is 40,000.

General Licenses

Encryption

Base (DES) or Strong (3DES/AES), depending on the account's export compliance setting

Failover

Active/Standby

Security Contexts

No support

Clustering

Enabled

VLANs, Maximum

VLANs are determined by the ASA virtual memory.

2 GB to 7.9 GB—50

8 GB to 15.9 GB—200

16 GB to 31.9 GB—1024

32 GB to 64 GB—1024

Firepower 1010

The following table shows the licensed features for the Firepower 1010.

Licenses

Essentials License

Firewall Licenses

Botnet Traffic Filter

No Support.

Firewall Conns, Concurrent

100,000

Carrier

No support. Although SCTP inspection maps are not supported, SCTP stateful inspection using ACLs is supported.

Total TLS Proxy Sessions

4,000

VPN Licenses

Secure Client peers

Unlicensed

Optional Secure Client Advantage,Secure Client Premier, or Secure Client VPN Only license, Maximum: 75

Other VPN Peers

75

Total VPN Peers, combined all types

75

General Licenses

Encryption

Base (DES) or Strong (3DES/AES), depending on the account's export compliance setting

Security Plus (failover, VPN Load Balancing)

Disabled

Optional

Security Contexts

No support.

Clustering

No support.

VLANs, Maximum

60

Firepower 1100 Series

The following table shows the licensed features for the Firepower 1100 series.

Licenses

Essentials License

Firewall Licenses

Botnet Traffic Filter

No Support.

Firewall Conns, Concurrent

Firepower 1120: 200,000

Firepower 1140: 400,000

Firepower 1150: 600,000

Carrier

No support. Although SCTP inspection maps are not supported, SCTP stateful inspection using ACLs is supported.

Total TLS Proxy Sessions

Firepower 1120: 4,000

Firepower 1140: 8,000

Firepower 1150: 8,000

VPN Licenses

Secure Client peers

Unlicensed

Optional Secure Client Advantage, Secure Client Premier, or Secure Client VPN Only license, Maximum:

Firepower 1120: 150

Firepower 1140: 400

Firepower 1150: 800

Other VPN Peers

Firepower 1120: 150

Firepower 1140: 400

Firepower 1150: 800

Total VPN Peers, combined all types

Firepower 1120: 150

Firepower 1140: 400

Firepower 1150: 800

General Licenses

Encryption

Base (DES) or Strong (3DES/AES), depending on the account's export compliance setting

Security Contexts

2

Optional License, Maximum:

Firepower 1120: 5

Firepower 1140: 10

Firepower 1150: 25

Clustering

No support.

VLANs, Maximum

1024

Secure Firewall 1210 and 1220

The following table shows the licensed features for the Secure Firewall 1210 and 1220.

Licenses

Essentials License

Firewall Licenses

Botnet Traffic Filter

No Support.

Firewall Conns, Concurrent

Secure Firewall 1210: 200,000

Secure Firewall 1220: 300,000

Carrier

No support. Although SCTP inspection maps are not supported, SCTP stateful inspection using ACLs is supported.

VPN Licenses

Secure Client peers

Unlicensed

Optional Secure Client Advantage,Secure Client Premier, or Secure Client VPN Only license, Maximum:

Secure Firewall 1210: 200

Secure Firewall 1220: 300

Other VPN Peers

Secure Firewall 1210: 200

Secure Firewall 1220: 300

Total VPN Peers, combined all types

Secure Firewall 1210: 200

Secure Firewall 1220: 300

General Licenses

Encryption

Base (DES) or Strong (3DES/AES), depending on the account's export compliance setting

Clustering

No support.

VLANs, Maximum

1024

Secure Firewall 3100 Series

The following table shows the licensed features for the Secure Firewall 3100 series.

Licenses

Essentials License

Firewall Licenses

Botnet Traffic Filter

No Support.

Firewall Conns, Concurrent

Secure Firewall 3105: 2,000,000

Secure Firewall 3110: 2,000,000

Secure Firewall 3120: 4,000,000

Secure Firewall 3130: 6,000,000

Secure Firewall 3140: 10,000,000

Carrier

Disabled

Optional License: Carrier

Total TLS Proxy Sessions

Secure Firewall 3105: 10,000

Secure Firewall 3110: 10,000

Secure Firewall 3120: 15,000

Secure Firewall 3130: 15,000

Secure Firewall 3140: 15,000

VPN Licenses

Secure Client peers

Unlicensed

Optional Secure Client Advantage, Secure Client Premier, or Secure Client VPN Only license, Maximum:

Secure Firewall 3105: 3000

Secure Firewall 3110: 3000

Secure Firewall 3120: 7000

Secure Firewall 3130: 15,000

Secure Firewall 3140: 20,000

Other VPN Peers

Secure Firewall 3105: 3000

Secure Firewall 3110: 3000

Secure Firewall 3120: 7000

Secure Firewall 3130: 15,000

Secure Firewall 3140: 20,000

Total VPN Peers, combined all types

Secure Firewall 3105: 3000

Secure Firewall 3110: 3000

Secure Firewall 3120: 7000

Secure Firewall 3130: 15,000

Secure Firewall 3140: 20,000

General Licenses

Encryption

Base (DES) or Strong (3DES/AES), depending on the account's export compliance setting

Security Contexts

2

Optional License, Maximum: 100

Clustering

Enabled

VLANs, Maximum

1024

Firepower 4100

The following table shows the licensed features for the Firepower 4100.

Licenses

Essentials License

Firewall Licenses

Botnet Traffic Filter

No Support.

Firewall Conns, Concurrent

Firepower 4112: 10,000,000

Firepower 4115: 15,000,000

Firepower 4125: 25,000,000

Firepower 4145: 40,000,000

Carrier

Disabled

Optional License: Carrier

Total TLS Proxy Sessions

15,000

VPN Licenses

Secure Client peers

Unlicensed

Optional Secure Client Advantage, Secure Client Premier, or Secure Client VPN Only license:

Firepower 4112: 10,000

Firepower 4115: 15,000

Firepower 4125: 20,000

Firepower 4145: 20,000

Other VPN Peers

Firepower 4112: 10,000

Firepower 4115: 15,000

Firepower 4125: 20,000

Firepower 4145: 20,000

Total VPN Peers, combined all types

Firepower 4112: 10,000

Firepower 4115: 15,000

Firepower 4125: 20,000

Firepower 4145: 20,000

General Licenses

Encryption

Base (DES) or Strong (3DES/AES), depending on the account's export compliance setting

Security Contexts

10

Optional License: Maximum of 250

Clustering

Enabled

VLANs, Maximum

1024

Secure Firewall 4200 Series

The following table shows the licensed features for the Secure Firewall 4200 series.

Licenses

Essentials License

Firewall Licenses

Botnet Traffic Filter

No Support.

Firewall Conns, Concurrent

Secure Firewall 4215: 40,000,000

Secure Firewall 4225: 80,000,000

Secure Firewall 4245: 80,000,000

Carrier

Disabled

Optional License: Carrier

Total TLS Proxy Sessions

15,000

VPN Licenses

Secure Client peers

Unlicensed

Optional Secure Client Advantage, Secure Client Premier, or Secure Client VPN Only license, Maximum:

Secure Firewall 4215: 20,000

Secure Firewall 4225: 25,000

Secure Firewall 4245: 30,000

Other VPN Peers

Secure Firewall 4215: 20,000

Secure Firewall 4225: 25,000

Secure Firewall 4245: 30,000

Total VPN Peers, combined all types

Secure Firewall 4215: 20,000

Secure Firewall 4225: 25,000

Secure Firewall 4245: 30,000

General Licenses

Encryption

Base (DES) or Strong (3DES/AES), depending on the account's export compliance setting

Security Contexts

10

Optional License, Maximum: 250

Clustering

Enabled

VLANs, Maximum

1024

Firepower 9300

The following table shows the licensed features for the Firepower 9300.

Licenses

Essentials License

Firewall Licenses

Botnet Traffic Filter

No Support.

Firewall Conns, Concurrent

Firepower 9300 SM-56: 60,000,000

Firepower 9300 SM-48: 60,000,000

Firepower 9300 SM-40: 55,000,000

Carrier

Disabled

Optional License: Carrier

Total TLS Proxy Sessions

15,000

VPN Licenses

Secure Client peers

Unlicensed

Optional Secure Client Advantage, Secure Client Premier, or Secure Client VPN Only license: 20,000 maximum

Other VPN Peers

20,000

Total VPN Peers, combined all types

20,000

General Licenses

Encryption

Base (DES) or Strong (3DES/AES), depending on the account's export compliance setting

Security Contexts

10

Optional License: Maximum of 250

Clustering

Enabled

VLANs, Maximum

1024

License PIDs Per Model

When you bought your device from Cisco or a reseller, your licenses should have been linked to your Smart Software License account. However, if you need to add licenses yourself, use the Search All field on the Cisco Commerce Workspace.

Figure 16. License Search
License Search

Choose Products & Services from the results.

Figure 17. Results
Results

ASA Virtual PIDs

ASA Virtual Smart Software Manager Regular and On-Prem PIDs:

  • ASAv5—L-ASAV5S-K9=

  • ASAv10—L-ASAV10S-K9=

  • ASAv30—L-ASAV30S-K9=

  • ASAv50—L-ASAV50S-K9=

  • ASAv100—L-ASAV100S-1Y=

  • ASAv100—L-ASAV100S-3Y=

  • ASAv100—L-ASAV100S-5Y=

  • ASAvU—L-ASA-V-U-K9=


Note


The ASAv100 is a subscription-based license, available in terms of 1 year, 3 years, or 5 years.


ASA Virtual Permanent License Reservation PIDs:

The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • ASAv5—L-ASAV5SR-K9=

  • ASAv10—L-ASAV10SR-K9=

  • ASAv30—L-ASAV30SR-K9=

  • ASAv50—L-ASAV50SR-K9=

  • ASAv100—L-ASAV100SR-K9=

  • ASAvU—ASA-V-U-ULR-K9=

Firepower 1010 PIDs

Firepower 1010 Smart Software Manager Regular and On-Prem PIDs:

  • Essentials license—L-FPR1000-ASA=. The Essentials license is free, but you still need to add it to your Smart Software Licensing account.

  • Security Plus license—L-FPR1010-SEC-PL=. The Security Plus license enables failover.

  • Strong Encryption (3DES/AES) license—L-FPR1K-ENC-K9=. Only required if your account is not authorized for strong encryption.

Firepower 1010 Permanent License Reservation PID:

The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • L-FPR1K-ASA-BPU=

Firepower 1100 PIDs

Firepower 1100 Smart Software Manager Regular and On-Prem PIDs:

  • Essentials license—L-FPR1000-ASA=. The Essentials license is free, but you still need to add it to your Smart Software Licensing account.

  • 5 context license—L-FPR1K-ASASC-5=. Context licenses are additive; buy multiple licenses to meet your needs.

  • 10 context license—L-FPR1K-ASASC-10=. Context licenses are additive; buy multiple licenses to meet your needs.

  • Strong Encryption (3DES/AES) license—L-FPR1K-ENC-K9=. Only required if your account is not authorized for strong encryption.

Firepower 1100 Permanent License Reservation PID:

The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • L-FPR1K-ASA-BPU=

Secure Firewall 1210/1220 PIDs

Secure Firewall 1210/1220 Smart Software Manager Regular and On-Prem PIDs:

  • Essentials—Included automatically.

  • Strong Encryption (3DES/AES)—L-CSF1200-ENCK9=. Only required if your account is not authorized for strong encryption.

Secure Firewall 1210/1220 Permanent License Reservation PID:

The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • L-CSF1200-ASA-BPU=

Secure Firewall 3100 PIDs

Secure Firewall 3100 Smart Software Manager Regular and On-Prem PIDs:

  • EssentialsIncluded automatically.

  • 5 context—L-FPR3K-ASASC-5=. Context licenses are additive; buy multiple licenses.

  • 10 context—L-FPR3K-ASASC-10=. Context licenses are additive; buy multiple licenses.

  • Carrier (Diameter, GTP/GPRS, M3UA, SCTP)—L-FPR3K-ASA-CAR=

  • Strong Encryption (3DES/AES)—L-FPR3K-ENC-K9=. Only required if your account is not authorized for strong encryption.

Firepower 3100 Permanent License Reservation PID:

The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • L-FPR3K-ASA-BPU=

Firepower 4100 PIDs

Firepower 4100 Smart Software Manager Regular and On-Prem PIDs:

  • Essentials license—L-FPR4100-ASA=. The Essentials license is free, but you still need to add it to your Smart Software Licensing account.

  • 10 context license—L-FPR4K-ASASC-10=. Context licenses are additive; buy multiple licenses to meet your needs.

  • 230 context license—L-FPR4K-ASASC-230=. Context licenses are additive; buy multiple licenses to meet your needs.

  • 250 context license—L-FPR4K-ASASC-250=. Context licenses are additive; buy multiple licenses to meet your needs.

  • Carrier (Diameter, GTP/GPRS, M3UA, SCTP)—L-FPR4K-ASA-CAR=

  • Strong Encryption (3DES/AES) license—L-FPR4K-ENC-K9=. Only required if your account is not authorized for strong encryption.

Firepower 4100 Permanent License Reservation PID:

The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • L-FPR4K-ASA-BPU=

Secure Firewall 4200 PIDs

Secure Firewall 4200 Smart Software Manager Regular and On-Prem PIDs:

  • Essentials—Included automatically.

  • 5 context—L-FPR4200-ASASC-5=. Context licenses are additive; buy multiple licenses.

  • 10 context—L-FPR4200-ASASC-10=. Context licenses are additive; buy multiple licenses.

  • Carrier (Diameter, GTP/GPRS, M3UA, SCTP)—L-FPR4200-ASA-CAR=

  • Strong Encryption (3DES/AES)—L-FPR4200-ENC-K9=. Only required if your account is not authorized for strong encryption.

Firepower 4200 Permanent License Reservation PID:

The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • L-FPR4200-ASA-BPU=

Firepower 9300 PIDs

Firepower 9300 Smart Software Manager Regular and On-Prem PIDs:

  • Essentials license—L-F9K-ASA=. The Essentials license is free, but you still need to add it to your Smart Software Licensing account.

  • 10 context license—L-F9K-ASA-SC-10=. Context licenses are additive; buy multiple licenses to meet your needs.

  • Carrier (Diameter, GTP/GPRS, M3UA, SCTP)—L-F9K-ASA-CAR=

  • Strong Encryption (3DES/AES) license—L-F9K-ASA-ENCR-K9=. Only required if your account is not authorized for strong encryption.

Firepower 9300 Permanent License Reservation PIDs:

The permanent license includes all available features, including the Strong Encryption (3DES/AES) license if your account qualifies. The Secure Client capabilities are also enabled to the platform maximum, contingent on your purchase of the Secure Client license that enables the right to use Secure Client (see Secure Client Advantage, Secure Client Premier, and Secure Client VPN Only Licenses).

  • L-FPR9K-ASA-BPU=

Monitoring Smart Software Licensing

You can monitor the license features, status, and certificate, as well as enable debug messages.

Viewing Your Current License

See the following commands for viewing your license:

  • show license features

    The following example shows the ASA virtual with only a Essentials license (no current license entitlement):

    
    Serial Number:  9AAHGX8514R
    
    ASAv Platform License State: Unlicensed
    No active entitlement: no feature tier configured
    
    Licensed features for this platform:
    Maximum Physical Interfaces       : 10             perpetual
    Maximum VLANs                     : 50             perpetual
    Inside Hosts                      : Unlimited      perpetual
    Failover                          : Active/Standby perpetual
    Encryption-DES                    : Enabled        perpetual
    Encryption-3DES-AES               : Enabled        perpetual
    Security Contexts                 : 0              perpetual
    GTP/GPRS                          : Disabled       perpetual
    AnyConnect Premium Peers          : 2              perpetual
    AnyConnect Essentials             : Disabled       perpetual
    Other VPN Peers                   : 250            perpetual
    Total VPN Peers                   : 250            perpetual
    Shared License                    : Disabled       perpetual
    AnyConnect for Mobile             : Disabled       perpetual
    AnyConnect for Cisco VPN Phone    : Disabled       perpetual
    Advanced Endpoint Assessment      : Disabled       perpetual
    UC Phone Proxy Sessions           : 2              perpetual
    Total UC Proxy Sessions           : 2              perpetual
    Botnet Traffic Filter             : Enabled        perpetual
    Intercompany Media Engine         : Disabled       perpetual
    Cluster                           : Disabled       perpetual
    

Viewing Smart License Status

See the following commands for viewing license status:

  • show license all

    Displays the state of Smart Software Licensing, Smart Agent version, UDI information, Smart Agent state, global compliance status, the entitlements status, licensing certificate information, and scheduled Smart Agent tasks.

    The following example shows an ASA virtual license:

    
    ciscoasa# show license all
    Smart Licensing Status
    ======================
    
    Smart Licensing is ENABLED
    
    Registration:
      Status: REGISTERED
      Smart Account: ASA
      Virtual Account: ASAv Internal Users
      Export-Controlled Functionality: Not Allowed
      Initial Registration: SUCCEEDED on Sep 21 20:26:29 2015 UTC
      Last Renewal Attempt: None
      Next Renewal Attempt: Mar 19 20:26:28 2016 UTC
      Registration Expires: Sep 20 20:23:25 2016 UTC
    
    License Authorization: 
      Status: AUTHORIZED on Sep 21 21:17:35 2015 UTC
      Last Communication Attempt: SUCCEEDED on Sep 21 21:17:35 2015 UTC
      Next Communication Attempt: Sep 24 00:44:10 2015 UTC
      Communication Deadline: Dec 20 21:14:33 2015 UTC
    
    License Usage
    ==============
                  
    regid.2014-08.com.cisco.ASAv-STD-1G,1.0_4fd3bdbd-29ae-4cce-ad82-45ad3db1070c (ASAv-STD-1G):
      Description: This entitlement tag was created via Alpha Extension application
      Count: 1
      Version: 1.0
      Status: AUTHORIZED
    
    Product Information
    ===================
    UDI: PID:ASAv,SN:9AHV3KJBEKE
    
    Agent Version
    =============
    Smart Agent for Licensing: 1.6_reservation/36
    
    
  • show license status

    Shows the smart license status.

    The following example shows the status for the ASA virtual using regular smart software licensing:

    
    ciscoasa# show license status      
    
    Smart Licensing is ENABLED
    
    Registration:
      Status: REGISTERED
      Smart Account: ASA
      Virtual Account: ASAv Internal Users
      Export-Controlled Functionality: Not Allowed
      Initial Registration: SUCCEEDED on Sep 21 20:26:29 2015 UTC
      Last Renewal Attempt: None
      Next Renewal Attempt: Mar 19 20:26:28 2016 UTC
      Registration Expires: Sep 20 20:23:25 2016 UTC
    
    License Authorization: 
      Status: AUTHORIZED on Sep 23 01:41:26 2015 UTC
      Last Communication Attempt: SUCCEEDED on Sep 23 01:41:26 2015 UTC
      Next Communication Attempt: Oct 23 01:41:26 2015 UTC
      Communication Deadline: Dec 22 01:38:25 2015 UTC
    
    

    The following example shows the status for the ASA virtual using permanent license reservation:

    
    ciscoasa# show license status      
    
    Smart Licensing is ENABLED
    License Reservation is ENABLED
    
    Registration:
      Status: REGISTERED - UNIVERSAL LICENSE RESERVATION
      Export-Controlled Functionality: Allowed
      Initial Registration: SUCCEEDED on Jan 28 16:42:45 2016 UTC
    
    License Authorization: 
      Status: AUTHORIZED - RESERVED on Jan 28 16:42:45 2016 UTC
    
    Licensing HA configuration error:
        No Reservation Ha config error
    
    
  • show license summary

    Shows a summary of smart license status and usage.

    The following example shows the summary for the ASA virtual using regular smart software licensing:

    
    ciscoasa# show license summary
    
    Smart Licensing is ENABLED
    
    Registration:
      Status: REGISTERED
      Smart Account: ASA
      Virtual Account: ASAv Internal Users
      Export-Controlled Functionality: Not Allowed
      Last Renewal Attempt: None
      Next Renewal Attempt: Mar 19 20:26:29 2016 UTC
    
    License Authorization: 
      Status: AUTHORIZED
      Last Communication Attempt: SUCCEEDED
      Next Communication Attempt: Oct 23 01:41:26 2015 UTC
    
    License Usage:
      License                 Entitlement tag               Count Status
      -----------------------------------------------------------------------------
      regid.2014-08.com.ci... (ASAv-STD-1G)                     1 AUTHORIZED
    
    

    The following example shows the summary for the ASA virtual using permanent license reservation:

    
    ciscoasa# show license summary      
    
    Smart Licensing is ENABLED
    
    Registration:
      Status: REGISTERED - UNIVERSAL LICENSE RESERVATION
      Export-Controlled Functionality: Allowed
    
    License Authorization: 
      Status: AUTHORIZED - RESERVED
    
    
  • show license usage

    Shows the smart license usage.

    The following example shows the usage for the ASA virtual:

    
    ciscoasa# show license usage
    
    License Authorization: 
      Status: AUTHORIZED on Sep 23 01:41:26 2015 UTC
    
    regid.2014-08.com.cisco.ASAv-STD-1G,1.0_4fd3bdbd-29ae-4cce-ad82-45ad3db1070c (ASAv-STD-1G):
      Description: This entitlement tag was created via Alpha Extension application
      Count: 1
      Version: 1.0
      Status: AUTHORIZED
    
    

Viewing the UDI

See the following command to view the universal product identifier (UDI):

show license udi

The following example shows the UDI for the ASAv:


ciscoasa# show license udi    
UDI: PID:ASAv,SN:9AHV3KJBEKE
ciscoasa#
 

Debugging Smart Software Licensing

See the following commands for debugging clustering:

  • debug license agent {error | trace | debug | all}

    Turns on debugging from the Smart Agent.

  • debug license level

    Turns on various levels of Smart Software Licensing Manager debugs.

Smart Software Manager Communication

This section describes how your device communicates with the Smart Software Manager.

Device Registration and Tokens

For each virtual account, you can create a registration token. This token is valid for 30 days by default. Enter this token ID plus entitlement levels when you deploy each device, or when you register an existing device. You can create a new token if an existing token is expired.


Note


Firepower 4100/9300 chassis—Device registration is configured in the chassis, not on the ASA logical device.


At startup after deployment, or after you manually configure these parameters on an existing device, the device registers with the Smart Software Manager. When the device registers with the token, the Smart Software Manager issues an ID certificate for communication between the device and the Smart Software Manager. This certificate is valid for 1 year, although it will be renewed every 6 months.

Periodic Communication with the Smart Software Manager

The device communicates with the Smart Software Manager every 30 days. If you make changes in the Smart Software Manager, you can refresh the authorization on the device so the change takes place immediately. Or you can wait for the device to communicate as scheduled.

You can optionally configure an HTTP proxy.

ASA Virtual

The ASA virtual must have internet access either directly or through an HTTP proxy at least every 90 days. Normal license communication occurs every 30 days, but with the grace period, your device will stay compliant for up to 90 days without calling home. After the grace period, you should contact the Smart Software Manager, or your ASA virtual will be out-of-compliance; operation is otherwise unaffected.

All Other Models

The ASA must have internet access either directly or through an HTTP proxy at least every 90 days. Normal license communication occurs every 30 days, but with the grace period, your device will operate for up to 90 days without calling home. After the grace period, you must contact the Smart Software Manager, or you will not be able to make configuration changes to features requiring special licenses; operation is otherwise unaffected.

Out-of-Compliance State

The device can become out of compliance in the following situations:

  • Over-utilization—When the device uses unavailable licenses.

  • License expiration—When a time-based license expires.

  • Lack of communication—When the device cannot reach the Licensing Authority for re-authorization.

To verify whether your account is in, or approaching, an Out-of-Compliance state, you must compare the entitlements currently in use by your device against those in your Smart Account.

In an out-of-compliance state, the device might be limited, depending on the model:

  • ASA Virtual—The ASA virtual is not affected.

  • All Other Models—You will not be able to make configuration changes to features requiring special licenses, but operation is otherwise unaffected. For example, existing contexts over the Essentials license limit can continue to run, and you can modify their configuration, but you will not be able to add a new context. If you do not have sufficient Essentials licenses when you first register, you cannot configure any licensed features, including strong encryption features.

Smart Call Home Infrastructure

By default, a Smart Call Home profile exists in the configuration that specifies the URL for the Smart Software Manager. You cannot remove this profile. Note that the only configurable option for the License profile is the destination address URL for the Smart Software Manager. Unless directed by Cisco TAC, you should not change the Smart Software Manager URL.


Note


For the Firepower 4100/9300 chassis, Smart Call Home for licensing is configured in the Firepower 4100/9300 chassis supervisor, not on the ASA.


You cannot disable Smart Call Home for Smart Software Licensing. For example, even if you disable Smart Call Home using the no service call-home command, Smart Software Licensing is not disabled.

Other Smart Call Home functions are not turned on unless you specifically configure them.

Smart License Certificate Management

The ASA automatically creates a trustpoint containing the certificate of the CA that issued the Smart Transport or Smart Call Home server certificate. To avoid service interruption if the issuing hierarchy of the server certificate changes, configure the auto-update command to enable the automatic update of the trustpool bundle at periodic intervals.

The server certificate received from a Smart License Server must contain "ServAuth" in the Extended Key Usage field. This check will be done on non self-signed certificates only; self-signed certificates do not provide any value in this field.

History for Smart Software Licensing

Feature Name

Platform Releases

Description

Smart Transport is the default transport mechanism to communicate with the CSSM server

9.22(1)

Smart Licensing uses Smart Transport as the default transport for all devices instead of Smart Call Home.

ASAvU license

9.22(1)

The ASAvU license achieves maximum throughput on deployments with 32-cores and 64-cores. This license is supported only on VMware and KVM.

New/Modified commands: throughput level unlimited

Increased connection limits for the Secure Firewall 4200

9.20(2)

Connection limits have been increased:

  • 4215: 15M → 40M

  • 4225: 30M → 80M

  • 4245: 60M → 80M

Secure Firewall 3100 support for the Carrier license

9.18(1)

The Carrier license enables Diameter, GTP/GPRS, SCTP inspection.

New/Modified commands: feature carrier

ASAv100 permanent license reservation

9.14(1.30)

The ASAv100 now supports permanent license reservation using product ID L-ASAV100SR-K9=. Note: Not all accounts are approved for permanent license reservation.

ASA Virtual MSLA Support

9.13(1)

The ASA virtual supports Cisco's Managed Service License Agreement (MSLA) program, which is a software licensing and consumption framework designed for Cisco customers and partners who offer managed software services to third parties.

MSLA is a new form of Smart Licensing where the licensing Smart Agent keeps track of the usage of licensing entitlements in units of time.

New/Modified commands: license smart , mode , utility , custom-id , custom-info , privacy , transport type , transport url , transport proxy

ASA Virtual Flexible Licensing

9.13(1)

Flexible Licensing is a new form of Smart Licensing where any ASA virtual license now can be used on any supported ASA virtual vCPU/memory configuration. Session limits for Secure Client and TLS proxy will be determined by the ASA virtual platform entitlement installed rather than a platform limit tied to a model type.

New/Modified commands: show version , show vm , show cpu , show license features

Licensing changes for failover pairs on the Firepower 4100/9300 chassis

9.7(1)

Only the active unit requests the license entitlements. Previously, both units requested license entitlements. Supported with FXOS 2.1.1.

Permanent License Reservation for the ASA virtual Short String enhancement

9.6(2)

Due to an update to the Smart Agent (to 1.6.4), the request and authorization codes now use shorter strings.

We did not modify any commands.

Satellite Server support for the ASA virtual

9.6(2)

If your devices cannot access the internet for security reasons, you can optionally install a local Smart Software Manager satellite server as a virtual machine (VM).

We did not modify any commands.

Permanent License Reservation for the ASA on the Firepower 4100/9300 chassis

9.6(2)

For highly secure environments where communication with the Cisco Smart Software Manager is not allowed, you can request a permanent license for the ASA on the Firepower 9300 and Firepower 4100. All available license entitlements are included in the permanent license, including the Standard Tier, Strong Encryption (if qualified), Security Contexts, and Carrier licenses. Requires FXOS 2.0.1.

All configuration is performed on the Firepower 4100/9300 chassis; no configuration is required on the ASA.

Permanent License Reservation for the ASA virtual

9.5(2.200)

9.6(2)

For highly secure environments where communication with the Cisco Smart Software Manager is not allowed, you can request a permanent license for the ASA virtual. In 9.6(2), we also added support for this feature for the ASA virtual on Amazon Web Services. This feature is not supported for Microsoft Azure.

We introduced the following commands: license smart reservation, license smart reservation cancel, license smart reservation install, license smart reservation request universal, license smart reservation return

Smart Agent Upgrade to v1.6

9.5(2.200)

9.6(2)

The smart agent was upgraded from Version 1.1 to Version 1.6. This upgrade supports permanent license reservation and also supports setting the Strong Encryption (3DES/AES) license entitlement according to the permission set in your license account.

Note

 

If you downgrade from Version 9.5(2.200), the ASA virtual does not retain the licensing registration state. You need to re-register with the license smart register idtoken id_token force command; obtain the ID token from the Smart Software Manager.

We introduced the following commands: show license status, show license summary, show license udi, show license usage

We modified the following commands: show license all, show tech-support license

We deprecated the following commands: show license cert, show license entitlement, show license pool, show license registration

Strong Encryption (3DES) license automatically applied for the ASA on the Firepower 9300

9.5(2.1)

For regular Cisco Smart Software Manager users, the Strong Encryption license is automatically enabled for qualified customers when you apply the registration token on the Firepower 9300.

Note

 

If you are using the Smart Software Manager satellite deployment, to use ASDM and other strong encryption features, after you deploy the ASA you must enable the Strong Encryption (3DES) license using the ASA CLI.

This feature requires FXOS 1.1.3.

We removed the following command for non-satellite configurations: feature strong-encryption

Validation of the Smart Call Home/Smart Licensing certificate if the issuing hierarchy of the server certificate changes

9.5(2)

Smart licensing uses the Smart Call Home infrastructure. When the ASA first configures Smart Call Home anonymous reporting in the background, it automatically creates a trustpoint containing the certificate of the CA that issued the Smart Call Home server certificate. The ASA now supports validation of the certificate if the issuing hierarchy of the server certificate changes; you can enable the automatic update of the trustpool bundle at periodic intervals.

We introduced the following command: auto-import

New Carrier license

9.5(2)

The new Carrier license replaces the existing GTP/GPRS license, and also includes support for SCTP and Diameter inspection. For the ASA on the Firepower 9300, the feature mobile-sp command will automatically migrate to the feature carrier command.

We introduced or modified the following commands: feature carrier, show activation-key, show license, show tech-support, show version

Cisco Smart Software Licensing for the ASA on the Firepower 9300

9.4(1.150)

We introduced Smart Software Licensing for the ASA on the Firepower 9300.

We introduced the following commands: feature strong-encryption, feature mobile-sp, feature context

Cisco Smart Software Licensing for the ASA virtual

9.3(2)

Smart Software Licensing lets you purchase and manage a pool of licenses. Unlike PAK licenses, smart licenses are not tied to a specific serial number. You can easily deploy or retire ASA virtual's without having to manage each unit’s license key. Smart Software Licensing also lets you see your license usage and needs at a glance.

We introduced the following commands: clear configure license, debug license agent, feature tier, http-proxy, license smart, license smart deregister, license smart register, license smart renew, show license, show running-config license, throughput level