A. Peter Anderson Overview of IOS 15 Licensing and Process Associate Professor August 4, 2013.

Slides:



Advertisements
Similar presentations
Migration Considerations and Techniques to MPLS-TP based Networks and Services Nurit Sprecher / Nokia Siemens Networks Yaacov Weingarten / Nokia Siemens.
Advertisements

© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential C Cisco Unified Communications 9 and 3 Upgrade Offer.
© 2008 Cisco Systems, Inc. All rights reserved.CIPT1 v6.0—1 Implementing Cisco Unified Communications IP Telephony Part 1.
2 Copyright © 2005, Oracle. All rights reserved. Installing the Oracle Database Software.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 Cisco 7500 to Cisco 7200 Technical Migration Program PROMOTION December 2006.
TANDBERG Video Communication Server March TANDBERG Video Communication Server Background  SIP is the future protocol of video communication and.
Meraki Mobile Device Management
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Managing Your Network Environment © 2004 Cisco Systems, Inc. All rights reserved. Managing Cisco IOS Devices INTRO v2.0—9-1.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Catalyst Smart Operations Automates the trivial and repetitive tasks.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Using the Cisco SDM.
Citrix ® Secure Gateway Phil Montgomery Senior Product Manager Citrix Products and Services October 2001.
Unified Logs and Reporting for Hybrid Centralized Management
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
What’s New in WatchGuard XCS 10.0 Update 3 WatchGuard Training.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Implementing Standard and Extended Access Control List (ACL) in Cisco Routers.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
A. Peter Anderson Introduction to IOS 15 CLI Licensing Commands Associate Professor August 4, 2013.
Sybex ICND2/CCNA R/S Chapter 16: Cisco IOS Instructor & Todd Lammle.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 4: Dynamic Host Configuration Protocol.
Course 201 – Administration, Content Inspection and SSL VPN
Ch. 5 – Access Points. Overview Access Point Connection.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
Cyberoam - Unified Threat Management Unified Threat Management Cyberoam Cyberoam Upgrade Training v9.5.9.xx (Beta)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
1 © 2005 Cisco Systems, Inc. All rights reserved. Session Number 11911_11_2005 Managing Cisco Unified Communications Reducing costs and improving resilience.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 6 Switch Configuration.
Three steps to sell Office Always ask every customer the following questions to get them interested in buying Office: Did you know that Office.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Implementing Network Access Protection
Vantage Report 3.0 Product Sales Guide
1 SCO Update Service Kerri Wallach, SCO Services Product Manager April 16, 2003.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
1 © 2004 Cisco Systems, Inc. All rights reserved. Case Study: Cisco VPN Client Cisco Information Technology May 19, 2004.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Georgia Tech Information Security Campus Architecture for ECE6612 November 2, 2005 Peter N. Wan Senior Information Security Engineer Office of Information.
PLANNING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE Chapter 2.
A. Peter Anderson Introduction to IOS 15 Trains, Numbering, and System Image Packaging Associate Professor August 4, 2013.
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 8 City College.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential Unified Communications 8/16/ Competing with the Cisco Unified Communications Architecture.
Route Selection Using Policy Controls
 Introduction  Tripwire For Servers  Tripwire Manager  Tripwire For Network Devices  Working Of Tripwire  Advantages  Conclusion.
1 Pertemuan 3 Operating Cisco IOS Software. Discussion Topics The purpose of Cisco IOS software Router user interface Router user interface modes Cisco.
© 2002, Cisco Systems, Inc. All rights reserved..
Solaris 가상화 기술 이강산. What is a zone? A zone is a virtual operating system abstraction that provides a protected environment in which applications run.
Understanding the ISR G2 Devices and IOS Release 15 Dwight Hughes Network Technology Department Head / Professor Clark College.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introduction to IOS.
Cisco 2921/K9, Hot Required by Small to Enterprise Branch Offices.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
© 2001, Cisco Systems, Inc. CSPFA 2.0—16-1 Chapter 16 Cisco PIX Device Manager.
Industrial HiVision Network Management Software Version 7.0
Instructor & Todd Lammle
CCNA Routing and Switching Routing and Switching Essentials v6.0
Chapter 10: Device Discovery, Management, and Maintenance
CCNA Routing and Switching Routing and Switching Essentials v6.0
NAT , Device Discovery Chapter 9 , chapter 10.
Cisco Express Foundation for Systems Engineers Exam Name : practice-questions.html.
Cisco networking CNET-448
Chapter 10: Device Discovery, Management, and Maintenance
Chapter 9: IOS Images and Licensing
Cisco networking CNET-448
Introduction to IOS Presented By Dr. Waleed Alseat Mutah University.
Presentation transcript:

A. Peter Anderson Overview of IOS 15 Licensing and Process Associate Professor August 4, 2013

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Permanent Licenses Evaluation Licenses Feature Licenses: Software Activation Feature Licenses Right to Use Feature Licenses Subscription Licenses Counted Licenses

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 A Permanent License never expires. Once a permanent license is installed on a router, it is good for that particular feature set for the life of the router even across IOS versions. For example, once a UC, Security or Data license is installed on a router, the subsequent features for that license will be active even if the router is upgraded to a new IOS release. A permanent license is the most common license type used when a feature set is purchased for a device.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 A Evaluation License is good for a limited amount of time. ISR G2 includes a full set of 60 day Evaluation License(s) for the Data, UC and Security feature sets. These can be activated and deactivated at any time to evaluate a feature set before making the decision to convert to a Permanent License. They also provide a mechanism that gives the user some flexibility before upgrading to a Permanent License. Only the time a Evaluation License is active counts against the 60 day allotted time. Once an Evaluation License expires, it cannot be extended.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Software Activation Feature Licenses Typically upgrades to one or more technology Package Licenses (Data, UC or Security) Can be delivered with new router or upgraded at a later time. Licenses are enforced through Cisco Software Licensing framework Right to Use Feature Licenses Does not require software activation (honor system) Can be ordered with new router or upgraded at a later time.

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 May be Software Activation or Right-to-Use Feature Licenses Subscription Licenses Time-based licenses Software Activation Feature Licenses - Intrusion Prevention, Content Filtering Counted Licenses Enable a defined number of users Software Activation Feature Licenses – SSLVPN, CUE Right-to-Use Feature Licenses – VXML, CME, SRST, CUBE

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Technology Package Licenses (Permanent/Evaluation) IP Base (Permanent Only) Security Data Unified Communication

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Security Technology Package License activated: Additional Software Activation Feature Licenses Intrusion Prevention (Subscription) Content Filtering (Subscription) SSL VPN (Counted)

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Data Technology Package License activated: Additional Software Activation Feature License SNA (Systems Network Architecture) Switching

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 Unified Communication Technology Package License activated: Additional Software Activation Feature Licenses Gatekeeper CUE (Counted) Additional Right to Use Feature Licenses Land Mobile Radio VXML Gateway (Counted) CME (Counted) SRST (Counted) CUBE (Counted)

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Step 1: Purchase the Software Package or Feature to Install A Product Authorization Key (PAK) will be provided upon payment Acts as a Receipt Used to obtain a license Step 2: Obtain A License file Option 1 -Cisco License Manager, which is a free software application available at Option 2 -Cisco License Registration Portal: An containing the license information that you can use to install the license is received Step 3: Install the License Copy the license file received to the appropriate file system on the device

Thank you.