On a Cisco isr 4451 with base image I need to check if IPSec is available. Is there an command to list available vpn features?
UPDATE The image name includes K9 (UNIVERSALK9-M) but the command failed as invalid input detected at isakmp. How can I enable IPSEC on K9 Image.
UPDATE
As mentioned here is the output of sh license
#sh license
Index 1 Feature: appxk9
Period left: Not Activated
Period Used: 0 minute 0 second
License Type: EvalRightToUse
License State: Active, Not in Use, EULA not accepted
License Count: Non-Counted
License Priority: None
Index 2 Feature: uck9
Period left: Not Activated
Period Used: 0 minute 0 second
License Type: EvalRightToUse
License State: Active, Not in Use, EULA not accepted
License Count: Non-Counted
License Priority: None
Index 3 Feature: securityk9
Period left: Not Activated
Period Used: 0 minute 0 second
License Type: EvalRightToUse
License State: Active, Not in Use, EULA not accepted
License Count: Non-Counted
License Priority: None
Index 4 Feature: ipbasek9
Period left: Life time
License Type: Permanent
License State: Active, In Use
License Count: Non-Counted
License Priority: Medium
Index 5 Feature: cme-srst
Period left: Not Activated
Period Used: 0 minute 0 second
License Type: EvalRightToUse
License State: Active, Not in Use, EULA not accepted
License Count: 0/0 (In-use/Violation)
License Priority: None
Index 6 Feature: hseck9
Index 7 Feature: throughput
Period left: Not Activated
Period Used: 0 minute 0 second
License Type: EvalRightToUse
License State: Active, Not in Use, EULA not accepted
License Count: Non-Counted
License Priority: None
Index 8 Feature: internal_service
Best Answer
Check your license boot:
show run | include boot
And if you don't see it there already, add it like this:
license boot level appxk9
*edit: in your case, you need
license boot level securityk9
After adding the boot level and reloading, you should be able to accept the EULA and gain access to ISAKMP/IKE commands.