We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAllison Bradley
Modified about 1 year ago
A. Peter Anderson Overview of IOS 15 Licensing and Process Associate Professor August 4, 2013
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Permanent Licenses Evaluation Licenses Feature Licenses: Software Activation Feature Licenses Right to Use Feature Licenses Subscription Licenses Counted Licenses
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 A Permanent License never expires. Once a permanent license is installed on a router, it is good for that particular feature set for the life of the router even across IOS versions. For example, once a UC, Security or Data license is installed on a router, the subsequent features for that license will be active even if the router is upgraded to a new IOS release. A permanent license is the most common license type used when a feature set is purchased for a device.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 A Evaluation License is good for a limited amount of time. ISR G2 includes a full set of 60 day Evaluation License(s) for the Data, UC and Security feature sets. These can be activated and deactivated at any time to evaluate a feature set before making the decision to convert to a Permanent License. They also provide a mechanism that gives the user some flexibility before upgrading to a Permanent License. Only the time a Evaluation License is active counts against the 60 day allotted time. Once an Evaluation License expires, it cannot be extended.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Software Activation Feature Licenses Typically upgrades to one or more technology Package Licenses (Data, UC or Security) Can be delivered with new router or upgraded at a later time. Licenses are enforced through Cisco Software Licensing framework Right to Use Feature Licenses Does not require software activation (honor system) Can be ordered with new router or upgraded at a later time.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 May be Software Activation or Right-to-Use Feature Licenses Subscription Licenses Time-based licenses Software Activation Feature Licenses - Intrusion Prevention, Content Filtering Counted Licenses Enable a defined number of users Software Activation Feature Licenses – SSLVPN, CUE Right-to-Use Feature Licenses – VXML, CME, SRST, CUBE
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Technology Package Licenses (Permanent/Evaluation) IP Base (Permanent Only) Security Data Unified Communication
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Security Technology Package License activated: Additional Software Activation Feature Licenses Intrusion Prevention (Subscription) Content Filtering (Subscription) SSL VPN (Counted)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Data Technology Package License activated: Additional Software Activation Feature License SNA (Systems Network Architecture) Switching
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 Unified Communication Technology Package License activated: Additional Software Activation Feature Licenses Gatekeeper CUE (Counted) Additional Right to Use Feature Licenses Land Mobile Radio VXML Gateway (Counted) CME (Counted) SRST (Counted) CUBE (Counted)
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Step 1: Purchase the Software Package or Feature to Install A Product Authorization Key (PAK) will be provided upon payment Acts as a Receipt Used to obtain a license Step 2: Obtain A License file Option 1 -Cisco License Manager, which is a free software application available at http://www.cisco.com/go/clm.http://www.cisco.com/go/clm Option 2 -Cisco License Registration Portal: www.cisco.com/go/licensewww.cisco.com/go/license An e-mail containing the license information that you can use to install the license is received Step 3: Install the License Copy the license file received to the appropriate file system on the device
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introduction to IOS.
Understanding the ISR G2 Devices and IOS Release 15 Dwight Hughes Network Technology Department Head / Professor Clark College.
A. Peter Anderson Introduction to IOS 15 CLI Licensing Commands Associate Professor August 4, 2013.
A. Peter Anderson Introduction to IOS 15 Trains, Numbering, and System Image Packaging Associate Professor August 4, 2013.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—1 Implementing Cisco Unified Communications IP Telephony Part 1.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
© 2002, Cisco Systems, Inc. All rights reserved..
Meraki Mobile Device Management. Meraki System Manager Capabilities 1. Centrally Manage Mobile Devices, Macs, and PCs Unify management and control of.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
SSL VPN. Module Objectives By the end of this module participants will be able to: Identify the VPN technologies available on the FortiGate device Identify.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Introduction Tripwire For Servers Tripwire Manager Tripwire For Network Devices Working Of Tripwire Advantages Conclusion.
Vantage Report 3.0 Product Sales Guide Yvonne Wu Product Marketing & Management Network Security & Application Division ZyXEL Communications Corp. Sept.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
1 © 2005 Cisco Systems, Inc. All rights reserved. Session Number 11911_11_2005 Managing Cisco Unified Communications Reducing costs and improving resilience.
CCNA Security v2.0 Chapter 5: Implementing Intrusion Prevention.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using the Cisco SDM.
© 2005 Cisco Systems, Inc. All rights reserved. BGP v3.2—3-1 Route Selection Using Policy Controls Implementing Changes in BGP Policy.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 4: Dynamic Host Configuration Protocol.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Three steps to sell Office Always ask every customer the following questions to get them interested in buying Office: Did you know that Office.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
1 Pertemuan 3 Operating Cisco IOS Software. Discussion Topics The purpose of Cisco IOS software Router user interface Router user interface modes Cisco.
Georgia Tech Information Security Campus Architecture for ECE6612 November 2, 2005 Peter N. Wan Senior Information Security Engineer Office of Information.
1 © 2003 Cisco Systems, Inc. All rights reserved. Cisco IOS Packaging, 10/03 CISCO IOS PACKAGING: SIMPLIFICATION, CONSOLIDATION, CONSISTENCY.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 Cisco 7500 to Cisco 7200 Technical Migration Program PROMOTION December 2006.
PLANNING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE Chapter 2.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 2 Introduction to Routers.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential C Cisco Unified Communications 9 and 3 Upgrade Offer.
© 2010 Cisco Systems, Inc. All rights reserved. 1 Academy Conference 2010 Introduction to SSL-VPNs August 2010 Angel Cardenas Santa Barbara City College.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential Unified Communications 8/16/ Competing with the Cisco Unified Communications Architecture.
Check Point Virtual Gateway Protects Microsoft Azure Cloud Infrastructure with a Full Range of Security Defenses and Threat Prevention Solutions MICROSOFT.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Migration Considerations and Techniques to MPLS-TP based Networks and Services Nurit Sprecher / Nokia Siemens Networks Yaacov Weingarten / Nokia Siemens.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
© 2017 SlidePlayer.com Inc. All rights reserved.