ACS - host restriction
Hello
How to restrict access to a specific host when a user connects via the VPN.
user account is mapped to ACS as external database (Active Directory - Win3K)
Download ACL works only with the local ACS database.
Help, please.
Thanks Ganesh for your help.
I am not clear with your steps.
Local ACS database users DACL is working.
For Windows AD users what steps I need to restrict for specific host and port.
Hi John,.
Users Windows AD would receive some ip once they are authenticated if outside these ip address pool configuring trusted ip address that can access ACS outside windows authenticated AD users ip address.
Go to the link below will share the stage to restrict the access to ACS using the selected ip address.
Hope to help
Ganesh.H
Tags: Cisco Security
Similar Questions
-
WLC / ACS / AD - domain and laptops no - domain (802. 1 X / PEAP)
Hi all
I implement a solution based on 4404 WLC, 1113 ACS and Microsoft AD. What I want to achieve is to have two WIFI (SSID), that can be used by users on laptops of the domain, the other can be used by the users in the domain on personal laptops. Field portable computers will have full connectivity, but personal laptops will be restricted.
I created the two SSID using 802. 1 X by ACS / Remote Agent and can authenticate and connection OK.
I thought I should have user auth and auth machine for laptops of area but just user auth for personal laptops.
I have unauthenticated machines go to one group ACS or blocked, but I need to enable them in if they are on the SSID restricted. I can't quite understand how to have two SSID is authenticating with the same ACS / AD - one green and the other.
I'm on the right track?
Anyone done this before or have any bright ideas?
See you soon,.
John
With the use of WLAN access based on the SSID, users can be authenticated based on the SSID they use to connect to the WLAN. The Cisco Secure ACS server is used to authenticate users. Authentication happens in two stages on the Cisco Secure ACS:
1 authentication EAP
2 resulting SSID authentication of network (NARS) on Cisco Secure ACS Access Restrictions
For the new designation and configuraiton following URL can help you:
http://www.Cisco.com/en/us/Tech/tk722/tk809/technologies_configuration_example09186a00807669af.shtml
-
ACS 5.3 user authorization based on MAC address
Hi all
I hope someone can help me more.
A short background. Our company SSID is being migrated to use PEAPv0 to EAP - TLS. This limits access only to the books of the company. In addition, we have bar codes scanners used to inventory assets. These devices are not able to use EAP - TLS as they can not be integrated in the field and be unable to make the certificate-based authentication.
As a solution, we are planning to use a different SSID with access to the same network, but using PEAPv0 as authentication, basically the same SSID but with a different name. As this naturally allows anyone to access the corporate network with a name of user and password valid now, I wanted to add another step in the process of authentication - MAC of the device.
I know I can do the filtering on the WLAN controller, but as it has a database limited as well as the fact that it is difficult to keep the MAC list on all the controllers of I thought I can do this on our ACS system.
I am now trying to accomplish the following:
The user is authenticated via the store of internal users, that is successful. Now, I want to allow the user via the MAC address, which is stored in the internal of the ACS host store, whether access is allowed or not.
To do this, I created the following strategy:
Service selection policy-(result rule based selection)
--(NDG:Device Type dans tous les appareil type: sans fil et RAYON-IETF: Called-Station-ID contient
-Default | Result: DenyAccess
PEAP access service
Identity: Internal users-(selection of single result)
Authorization-(result rule based selection)
-Host: HostIdentityGroup internal in all groups: Valid_MACs
When I then try to access the wireless network I don't get authenticated. The error I get when I look in the logs:
15039 selected authorization profile is DenyAccess
Is it not possible to use an identity as "attribute based" store to the other identity store?
Kind regards
Patrick
This can use an end station filter
define the elements of policy > Session Conditions > network Conditions > end Station filters
Can define a list of MAC addresses; can be imported and exported from a file
To include in the policy authoirzation; customize the authorization policy to include the status of "End Station filter" and select the object end Station filter defined that you just set
-
RADIUS does not pray attribute filling 4 (NAS-IP-Address)
I'm trying to get a Cisco 3120 G configured for RADIUS authentication. I have a lot of other IOS devices with identical configuration of work lines, however, it gives me a hard time. The strategy of the RADIUS server is configured by NAS-IP-Address. The configuration of the AAA and RADIUS is as follows:
AAA new-model
AAA authentication login default local radius group
AAA authorization exec default local radius grouphost 10.x.x.x auth-port 1645 1646 RADIUS server acct-port
Server RADIUS ports source-1645-1646
Server RADIUS button 7 XXXXXXXXXXXXXXSee the Flash following debugging information:
indrc3120a #.
000284: 8 Feb 14:05:15.447 PST: RADIUS: Pick NAS IP for you = 0x5992EF4 = 0 cfg_addr = 0.0.0.0 tableid
000285: 8 Feb 14:05:15.447 PST: RADIUS: ustruct sharecount = 1
000286: Feb 8 14:05:15.447 PST: RADIUS: success radius_port_info() = 1 radius_nas_port = 1
000287: Feb 8 14:05:15.447 PST: RADIUS (00000000): send 10.x.x.x:1645 id 1645/8, len 84 access request
000288: Feb 8 14:05:15.447 PST: RADIUS: authenticator 12 5th 7th DF 01 B5 F1 D8 - 40 07 09 76 88 C1 A4 C5
000289: 8 Feb 14:05:15.447 PST: RADIUS: NAS-IP-Address [4] 6 0.0.0.0
000290: 8 Feb 14:05:15.447 PST: RADIUS: NAS-Port [5] 6 2
000291: Feb 8 14:05:15.447 PST: RADIUS: NAS-Port-Type [61] 6 virtual [5]
000292: 8 Feb 14:05:15.447 PST: RADIUS: username [1] 13 "admin_user '.
000293: 8 Feb 14:05:15.447 PST: RADIUS: Calling-Station-Id [31] 15 "10.y.y.y".
000294: 8 Feb 14:05:15.447 PST: RADIUS: User-Password [2] 18 *.
000295: 8 Feb 14:05:15.505 PST: RADIUS: receipt id 1645/8 10.x.x.x:1645, Access-Reject, len 20
000296: 8 Feb 14:05:15.505 PST: RADIUS: authenticator 4th EC 8F AB BB 8th F9 BB - 13 67 56 A3 5F F9 99 94
000297: Feb 8 14:05:15.505 PST: RADIUS: saved the data of permission for the user 5992EF4 to 0Note the NAS-IP-Address populated as 0.0.0.0 attribute
Another switch with an identical Setup returns the following:
tritc3120a #.
350554: 8 Feb 14:11:00.916 PST: RADIUS / ENCODE (000155BC): ask "" user name: ".
350555: 8 Feb 14:11:10.605 PST: RADIUS / ENCODE (000155BC): ask "" password: ".
350556: 8 Feb 14:11:14.480 PST: RADIUS/ENCODE (000155BC): orig. component type = EXEC
350557: 8 Feb 14:11:14.480 PST: RADIUS: AAA Attr not supported: interface [170] 4
350558: 8 Feb 14:11:14.480 PST: RADIUS: 74 74 [tt]
350559: 8 Feb 14:11:14.480 PST: RADIUS / ENCODE (000155BC): down the type of service, "radius attribute 6 sur-pour-login-auth server" is disabled
350560: 8 Feb 14:11:14.480 PST: RADIUS (000155BC): Config NAS IP: 0.0.0.0
350561: 8 Feb 14:11:14.480 PST: RADIUS / ENCODE (000155BC): acct_session_id: 87482
350562: 8 Feb 14:11:14.480 PST: RADIUS (000155BC): send
350563: 8 Feb 14:11:14.480 PST: RADIUS/ENCODE: Best 10.x.x.x address IP Local to the 10.y.y.y Radius Server
350564: 8 Feb 14:11:14.480 PST: RADIUS (000155BC): send 10.y.y.y:1645 id 1645/222, len 90 access request
350565: 8 Feb 14:11:14.480 PST: RADIUS: authenticator 5F B1 17 DF 72 4B 3D - B6 D8 5 85 66 B9 8 d 7 c A6
350566: 8 Feb 14:11:14.480 PST: RADIUS: username [1] 13 "admin_user '.
350567: 8 Feb 14:11:14.480 PST: RADIUS: User-Password [2] 18 *.
350568: 8 Feb 14:11:14.480 PST: RADIUS: NAS-Port [5] 6 2
350569: 8 Feb 14:11:14.480 PST: RADIUS: NAS-Port-Id [87] 6 'tty2 '.
350570: 8 Feb 14:11:14.480 PST: RADIUS: NAS-Port-Type [61] 6 virtual [5]
350571: 8 Feb 14:11:14.480 PST: RADIUS: Calling-Station-Id [31] 15 "10.z.z.z".
350572: 8 Feb 14:11:14.480 PST: RADIUS: NAS-IP-Address [4] 6 1.2.3.4
350573: 8 Feb 14:11:14.556 PST: RADIUS: receipt id 1645/222 10.y.y.y:1645, Access-Accept, len 83
350574: 8 Feb 14:11:14.556 PST: RADIUS: authenticator 24 D9 F9 E2 BB A3 66 F6 - 73 E8 5 42 8 A5 17 DA
350575: 8 Feb 14:11:14.556 PST: RADIUS: Type of Service [6] 6 Administrative [6]
350576: 8 Feb 14:11:14.556 PST: RADIUS: [25] in class 32
350577: 8 Feb 14:11:14.556 PST: RADIUS: 59 B1 6 06 00 00 01 37 00 01 0a 1st DC 18 01 CB C7 B8 D7 82 CA E2 00 00 00 00 00 00 00 0b [Ym7]
350578: 8 Feb 14:11:14.556 PST: RADIUS: seller, Cisco [26] 25
350579: 8 Feb 14:11:14.556 PST: RADIUS: Cisco-AVpair [1] 19 "shell: priv-lvl = 15.
350580: 8 Feb 14:11:14.556 PST: RADIUS (000155BC): receipt of id 1645/222Note that in the above example, the NAS-IP-Address is feeding properly (I just the changed for security reasons)
If anyone has any advice, it would be greatly appreciated. Does the switch need a restart? Blow RADIUS server process?
Thank you
CSCdx27019">."
Seems to be a bug,
CSCdx27019 Pkt sent by CSS access RADIUS request contains no information NAS
The feature of Cisco ACS NAR (restricted access network) with RADIUS does not work with CSS. This is because the radius NAS-IP-Address attribute is set to 0.0.0.0 in the Radius authentication request.
Rgds, jousset
Note the useful messages
-
ASA as a customer Radius in ACA
Hi all
I added ASA as Radius (version 8.0) client to the ACS (version 4.2) server. When I do "test the aaa authentication" on SAA and run 'debug RADIUS', I got this error message:
aaa authentication ACS host 10.1.2.25 test test passwo username $
INFO: Attempt to <10.1.2.25>IP address authentication test (timeout: 12 seconds)
Ray mkreq: 0x6cb
alloc_rip 0x29f79044
new application 0x6cb--> 221 (0x29f79044)
obtained the user 'test '.
has obtained the password
add_req 0x29f79044 0x6cb 221 session id
RADIUS_REQUEST
RADIUS.c: rad_mkpktRADIUS packet decode (authentication request)
--------------------------------------
Data of raw packets (length = 62)...
01 dd 00 3F 11 76 77 02 13 50 49 6f 7 c 4F 4 d e4 | ... > .vw. M... PINo |
05 5 a 8 b 68 01 06 74 65 73 74 02 12 11 ca 28 65 | . Z.h.. test... (e
A4 49 ee 8 a 76 46 29 10 3rd f9 3f 04 06 ac 1B 1f | . I have... FV). >. ? .....
FB 02 05 06 00 00 00 28 06 00 00 00 05 3d | ....... (=.....Packet analyzed data...
RADIUS: Code = 1 (0x01)
RADIUS: Identifier = 221 (0xDD)
RADIUS: Length = 62 (0x003E)
RADIUS: Vector: 117677E44D021350494E6F7C055A8B68
RADIUS: Type = 1 (0x01) - user name
RADIUS: Length = 6 (0x06)
RADIUS: Value (String) =
74 65 73 74 | test
RADIUS: Type = 2 (0x02) username-password
RADIUS: Length = 18 (0x12)
RADIUS: Value (String) =
11 ca 28 65 a4 49 ee 8 a 76 46 29 10 3rd f9 3f 1f | .. (EI. FV). >. ?.
RADIUS: Type = 4 NAS-IP-Address (0x04)
RADIUS: Length = 6 (0x06)
RADIUS: Value (IP address) = 172.27.251.2 (0xAC1BFB02)
RADIUS: Type = 5 (0x05) NAS-Port
RADIUS: Length = 6 (0x06)
RADIUS: Value (Hex) = 0 x 28
RADIUS: Type = 61 (0x3D) NAS-Port-Type
RADIUS: Length = 6 (0x06)
RADIUS: Value (Hex) = 0x5
Send 10.1.2.25/1645 pkt
RIP 0x29f79044 id State 7 221
rad_vrfy(): bad auth req
rad_procpkt: radvrfy failed
RADIUS_DELETE
remove_req 0x29f79044 0x6cb 221 session id
free_rip 0x29f79044
RADIUS: send empty queue
ERROR: Authentication server is unresponsive: failure of decoding AAA... secret server incompatibilityand I know not secret shared is the match between the ASA and ACS. any suggestions would be much appreciated.
Thank you
Alex
Hi Alex,
The ASA is defined in any NDG to GBA?
If so, please remove the secret shared the NDG and try once again to test authentication please.
Let me know how it goes.
Kind regards
Anisha
PS: Please mark this thread solved if you think that your query is answered.
10.1.2.25> -
Restrict calls remote modem with ACS
Hello..
Using ACS I try to limit the reverse telnet access to a modem which will later be used by TTYredirector. I want users to have access to the modem only. We are on 3.01 ACS (yes I know old)...
When to use access to the network with device restrictions: 2065: * (being the assigned line port 2065) subscribe to the denied service service = raccess tty65 in the journal of the attempts failed.
Do I need to add this service to the GANYMEDE + under Interface Config?... What is the params? I tried to just raccess in services which added a section under user/group that I chose but nothing else.
I have the router:
AAA for authorization Ganymede + default reverse-access group
Welcome tips, google has attracted so far zero.
Paul
Paul
It's not the NAR causing the problem-, this would result in a message 'filtered user' in the failed attempts.
Looks like the problem is that your group configuration is not allow the raccess service.
Because this isn't a standard service preset in ACS you config sys goto then Ganymede + (ACS) and define a service personalized Ganymede. Call it "raccess". In the settings group, you will then be to activate and define all the attributes you need.
Mounira
-
Machine access restrictions in ACS 3.3
Can someone tell me how to implement on a device ACS 3.3 Machine access restrictions?
Machine must be a member of the domain / company before access to the wireless local area network is permitted...
DRM
Remco
The configuration you have the GBA:
-Authentication verified machine
-MAR activated, i.e. you checked, 'group authentication successful without authentication card machine' to a group, generally «»
Configuration of the client/supplicant:
-Client configured to send authentication of the computer information.
You take a computer that is part of the AD and was introduced on the network. This is the first time.
Start the computer to the top (for the first time).
Computer is configured to send credentials to the Machine, so he sends to the switch, sends switch ACS, ACS verifies whether or not the machine is a valid machine.
If this is the case, put in cache 'Calling-Station-Id' for the interval configured in this section.
(End user still cannot do anything yet, because MAR is still in process)
Computer has completed the guest of GINA.
End user presses Ctrl + Alt + Delete.
Type username/password (first time).
Computer transmits the credentials of the user to switch, then switch to ACS, ACS gets it checked against AD.
If the user is a valid user, the user is mapped to an ACS group, according to the mapping and is in.
IF the user authentication fails, even if the computer authentication succeeded.
Now, it was one of the scenarios, other is,
Your machine is NOT part of the AD, so eventually Machine authentication will fail. Suppose that the user trying to connect in network has a name of user and password valid, but the computer using the the it is not a part of the AD.
Then, you will get an error during the machine on "supplicant" as authentication.
You cannot connect blah blah area...
But you will be allowed to provide your name of user and password combination.
Generally MAR is implemented to restrict this access, i.e. users trying to connect into the corporate network using non-active society, who are the majority of the infected by the virus at the time.
It is the point where this option comes into play,
"Group card for user authentication successful without authentication machine."
So even if the authenticated user successfully, but from the machine that is not part of the AD, the user will be mapped to the group according to the above option.
What 'Calling-Station-Id' caching.
Even if the authentication was successful. ACS will check if the Calling-Station-Id is cached for the machine from where comes the good name of username/password? If this isn't the case, you use a wrong machine to connect to the network.
HTH
Kind regards
Prem
-
Cisco ACS restrict a user to specific routers
Hello
We have ACS v3.2 in our network, I created a new user and added to a group, is it possible in this group to specify what routers / switches to the user is able to telnet, with some sort of ACL or something? I read something on:
Filter access network (NAF)
which is available in 4.0, should I upgrade to be able to do this?
I tried to put a group defined Network Access Restrictions, but this seems to be what network you are telenting from?
Sorry, please have patience, I'm new on ACS
Thank you!
Hello
I use ACS v4.2 so don't know if you'll get the same features, but you can select the NDG your routers reside in slot per group defined Network Access Restrictions > drop-down list AAA Client? If so simply select each NDG, you want this group to have access to the break-in * in the Port and * address. This will allow any IP address telnet/ssh power for devices in each NDG you enter.
If you wish you can control the IP addresses that access your routers by placing an access on each router list (stops messing around with that stuff, if you're not familiar with it).
I hope this helps...
Tony
-
Import of host internship ACS 5.0
Hi all!
I would like to import some hosts of GBA. I know, the ACS gives a model in a CSV file, but I do not download anything. Can you help me?
Model:
MACAddress:String (64): Required, description: String (1024), "enabled:Boolean(true,false):Required", HostIdentityGroup:String (256)
Regads,
Gyuri
This is the process for importing hosts in ACS 5.0
1) go to
Users and identity stores:... > internal identity stores > hosts, press "Import" and then "Download Template".
(2) open the model file. The first line should be left unchanged. Underneath, the records must be added with a record for each host
An example of the minimum value that must be set for a host is illustrated below:
11-22-33-44-55-66,,true, / / / group identity is left blank and the top-level node is assigned
Format of each line is,
Each record occupies a single line. Save the file
(3) once the documents are created, press "import." Select the file 'step 2', then press 'Start Import'. Import the host records should begin. All errors will be displayed in the progress window
Note that ACS 5.0 allows to add new rcords. the ACS 5.1, can also modify existing records and export. ACS 5.1
-
ACS network access Restriction does not. He denies it, but allow.
I have a problem with the restrictions of access to the network on the Group of ACS configuration.
I configured the NAR in a group field and set it to deny access besed on client AAA, a wireless LAN controller.
But users of this group is still able to connect wireless controller.
Newspapers in GBA shows that the fields are right. the right user in the right of the group in good AAA client, but does not deny.
Put in place DNIS also supports the restriction. This is how it should be configured,
-Procedure for the configuration of NAR:
(1) go to User Configuration---> select the user name that you want to restrict.
2) go into Restrictions on access network (OAN) option.
(3) by user defined network access Restrictions.
(4) check "define CLI/DNIS-based access restrictions.
(5) select "reject the call or Access Point.
(6) in the dropdown AAA client list - select the name of the device on which the user does not connect.
(7) for Port - Development *.
(8) in CLI - use *.
(9) for DNIS - development *.
(10) click on submit
Kind regards
~ JG
Note the useful messages
-
Hi team,
I have 2 camera which I am not able to remove a group of network devices home device.
When I try to remove the device after error is thrown
Impossible to edit INMUM-VPE-T1-3rdFloor-3750-S... Reason: The host no longer exists.
Running on Version: Cisco Secure ACS4.2.0.124
One would come in all of these issues. someone knows the solution.
Concerning
Vineeth
Hi Vineeth
Yes, you can do through GUI.
The GUI:
1 ACS gui > network configuration > click on 'Search', then click 'Search' again.
2. complete list of all network devices. On top, you will see an option "Download".
Download the complete file.
Let me know if it helps.
Thank you
Nelson Saha
-
Maximum 'Accounts internal hosts' on ACS 5.2
Is there a maximum number of 'Account of internal hosts' IDs which can manage the local database to an ACS 5.2?
Thank you...
Although I cannot point to any reference in the user documentation, I know that ACS 5.2 has been tested with 50000 endpoints or the internal hosts
-
Cisco Secure ACS 4.1 - blocking attempts to authenticate to a specific host
We use the application of RADIUS of ACS 4.1 for both wireless 802. 1 x and for our old PIX 515E authentication, as well as a few other features.
We try to migrate users off the PIX and want a method of disabling their ability to connect through the PIX once we have them migrated to the new method of remote access.
Authentication in ACS logs show the IP address of our PIX under "NAS-IP-Address" as the source of the authentication attempt.
Is there a relatively simple/easy way to block this IP address attempts (which causes these attempts fail) all by allowing wireless systems and others to proceed as usual on a per user basis?
Brian:
If I have understood correctly, you must allow users to connect to the wifi but prevent users to connect via PIX.
What you can do is to create a configuration of access network (OAN) Restriction under the config görüş (or under Configuration user if each user).
See this image:
If you don't see the network access restrictions config under the user and/or group config, you can activate the Interface-> advanced options configuration.
HTH
Amjad
Rating of useful answers is more useful to say "thank you".
-
ACS 5.3 use LDAP. for one SSID and use IS HOST. for a different SSID
I have 2 SSID on WLCs
I wish I had 1 point SSID to the radius of the acs using LDAP store and the 2nd point SSID to the radius of the acs using identity store of the host for mac filtering.
both scenarios are working, but not all.
If I set the order of the rule I can get an SSID, but then the other fails.
Authentication failed :
22056 object was not found in the identity of the point of sale.
Access matched Service selection rule:
Rule-1
Comparative political identity rule:
Rule-1
Some identity stores:
RBLDAP
Evaluate the politics of identity
15004 Matched rule
15013 selected identity store-
24031 sending request to the primary LDAP server
24017 Looking up host in LDAP - 04-xx-xx-xx-xx-xx Server
24009 host not found in the LDAP server
22056 object was not found in the identity of the point of sale.
22058 advanced option that is configured for a unknown user is used.
22061 the option 'Refuse' Advanced is set in the case of a request for authentication has failed.
11003 returned RADIUS Access-Reject
If I move the mac add rule before the rule of ldap, but then the ldap authentication fails
Request for access received RADIUS 11001
11017 RADIUS creates a new session
11027 detected host Lookup UseCase (Service-Type = check call (10))
Assess Service selection strategy
15004 Matched rule
Access to Selected 15012 - MAC filter network access service
Evaluate the politics of identity
15004 Matched rule
15013 selected identity Store - internal hosts
24209 Looking internal host IDStore host - 04-xx-xx-xx-xx-xx
24211 found internal host IDStore host
Authentication 22037 spent
I tried to install the following without result.
It seems to me that there should be a simple process to do what happens. I thought that if the rule does not match it would be to move on to the next rule etc...
I might be able to live with the first ldap control and if it does not pass to the db of the local host, but seemingly ineffective.
https://supportforums.Cisco.com/thread/2133704
You can create a sequence of identity store so that if the end point is not present in the ldap database, then it can check its database of the local host.
Or you can create a condition in your selection of service such as if rule called-station-id ends with (AIDS) then you can have it match the rule that uses the appropriate rule pointing to ldap, another rule when called-station-id ends with (ssidB) match the rule that points to the rule that uses the database of the local host.
Here is the section on the configuration of the sequence of identity store, don't forget to select continue if user not found.
http://www.Cisco.com/en/us/docs/net_mgmt/cisco_secure_access_control_sys...
Thank you
Sent by Cisco Support technique iPad App
-
ESXi on the host system with a physical restriction of the MAC
Hi all!
We have installed on a host system, located in the data center with restriction of MAC on a physical map of ESXi.
Earlier, we have VMWare Server 2 with bridged network, it was not a problem.
All virtual servers is accessible via port forwarding.
About ESXi I can't found any solution to create the bridged network.
Please give me a tip on how to solve this problem.
Create a vswitch with no physical cards. To connect VM to that (and a management vmkernel ESXi).
Next, install a virtual firewall as vyatta connected to the vswitch isolated and the default vswitch with the physical card. Then configure port forwarding rules as required.
Maybe you are looking for
-
See above. I 'refresh firefox' and lost my previous toolbars, that were in the text, not icons.
-
AverTV Hybrid AirExpress ExpressCard 34?
Aver TVI welcome you!Toshiba U400 17 - T Windows 7 SP1AverMedia Hybryd AirExpress 34mm Carddriver version 2.1.0.35AverTV 6.3.1.09072304 worm.Everything has been perfectly implemented and works, but it is necessary to restart with the card inserted, a
-
HP mini 110 of the bios password removal
Can I ask your help... my HP Mini 110 asks current password. After that 3 attempts he said... fatal error CNU928B30T someone help me please...
-
Pavilion DV6t - 6100 LM342AV: camera does not work after installing Win 8.1
Hello I have read a lot and looked for drivers every where my hand reaching up to. Since I reinstalled Windows 8.1 I can't use my camera. I downloaded all the drivers from HP Web site, including the Cyberlink YouCam software nesecery, and nothing wor
-
Cannot reply or create new email in Outlook Web Access due to the Red Cross!
Could you help me to solve the problem (only fix on my site, not on the server): when I press the answer or the new email button, the popup window will show Red Cross in the e-mail body and I can't change it. It's OK on IE6.I use: Windows 7 + IE8.Tha