Add under "Setting up groups" RADIUS attributes ACS 4.2
Hi Security Experts,
I need to add RADIUS attributes to a custom under the 'Groups Configuration' page provider ACS 4.2. From now on, I see of Cisco Aironet RADIUS attributes.
IETF RADIUS attributes etc in the page "setting up groups. How can I ensure that the RADIUS attributes for a provider also appear on this page?
PS: I have the useful messages rate
Thank you
Boudou
Under the "Interface", you can set which you want to view the RADIUS attributes. It is probably just a missing check for your provider.
The Options for RADIUS are described here:
Tags: Cisco Security
Similar Questions
-
ACS 5.2 - Support for RADIUS attributes per user
Hi all
Does anyone know if it is possible to configure the RADIUS attributes on a per user in GBA 5.2 basis?
That was possible under ACS 4.x, however, that I can't seem to find reference if ACS5.2 supports.
Thank you
Leon
You can do this by setting by using attributes and then by substution attribute.
You can see an example of it to set an internal user attribute to use as the value for the field address-IP-box
This is just an example and can be applied also to any attribute RADIUS in which set an attribute of the user of the same type. Values can also be taken from an external identity as AD store
-
ACS 5.1 - profile of the authorization, the RADIUS attributes
Hello
I am setting up Radius AAA for cat6K switch.
For the authentication of its work and the user can connect to. But for the assignment of a privilege level, it does not work.
After loging in, I always get the privilege 1.I need your guide on how to Setup GBA 5.1, RADIUS attribute.
I followed the document to configure the cisco-av-pair to assign 15 privilege and privilege 5, but it does not work.
This format of the attribute has been shown in document is to define the privilege 15 "shell: priv-lvl = 15.
Please refer to my screen shot, it's the right way to set it up on ACS 5.1
Creation date: June 12, 2011 05:56 by: Damiano, Anisha A(ANDAMANI,279917) problem:
=========
Authorization does not not as expected
Resolution:
============
Adding a type of NAS-Prompt service
-
Try to set up authentication RADIUS on ASA5505 8.3
I set up my firewall with local authentication for a regular dynamic VPN put in place, but I need to change it to authenticate with the server. The server is configured and ready to go, but I want to make sure that the firewall will also be.
Here is my config:
ASA # sh run
: Saved
:
ASA Version 8.3 (1)ASA host name
mydomain.local domain name
activate the encrypted password of GmSL9emLLUC2J7jz
2KFQnbNIdI.2KYOU encrypted passwd
names ofinterface Vlan1
nameif inside
security-level 100
IP 192.168.1.1 255.255.255.0interface Vlan2
nameif outside
security-level 0
PPPoE client vpdn group pppoe_group
IP address pppoe setrouteinterface Ethernet0/0
switchport access vlan 2interface Ethernet0/1
interface Ethernet0/2
interface Ethernet0/3
interface Ethernet0/4
interface Ethernet0/5
interface Ethernet0/6
interface Ethernet0/7
boot system Disk0: / asa831 - k8.bin
passive FTP modeclock timezone CST - 6
clock to summer time recurring CDTDNS server-group DefaultDNS
mydomain.local domain namepermit same-security-traffic inter-interface
permit same-security-traffic intra-interfacenetwork obj_any object
subnet 0.0.0.0 0.0.0.0object obj-vpnPool network
192.168.101.0 subnet 255.255.255.0the SERVER01 object network
the host 192.168. *. *object obj-internal network - 192.168.1.0
subnet 192.168.1.0 255.255.255.0network of the SERVER02 object
the host 192.168. *. *network of the SERVER03 object
the host 192.168. *. *object obj-OutsideIP network
Home 74.164.148.6splittunnel list standard access allowed 192.168.1.0 255.255.255.0
access extensive list ip 192.168.101.0 outside_in allow 255.255.255.0 192.168.1.0 255.255.255.0
access extensive list ip 192.168.1.0 outside_in allow 255.255.255.0 192.168.101.0 255.255.255.0outside_in list extended access permit tcp any host 192.168. *. * eq www
outside_in list extended access permit tcp any host 192.168. *. * eq https
outside_in list extended access permit tcp any host 192.168. *. * eq smtppager lines 24
asdm of logging of informationWithin 1500 MTU
Outside 1500 MTUIP local pool vpnpool 192.168.101.50 - 192.168.101.100
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 524.bin
don't allow no asdm history
ARP timeout 14400NAT (inside, outside) source static obj-internal - 192.168.1.0 obj-internal - destination 192.168.1.0 static obj-vpnPool obj-vpnPool
network obj_any object
NAT dynamic interface (indoor, outdoor)the SERVER01 object network
NAT (inside, outside) interface static tcp smtp smtp servicenetwork of the SERVER02 object
NAT (inside, outside) interface static tcp www www servicenetwork of the SERVER03 object
NAT (inside, outside) interface static tcp https https serviceAccess-group outside_in in external interface
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00dynamic-access-policy-registration DfltAccessPolicy
the ssh LOCAL console AAA authentication
AAA authentication LOCAL telnet console
AAA authentication http LOCAL consoleEnable http server
http 192.168.1.0 255.255.255.0 inside
http 0.0.0.0 0.0.0.0 insideNo snmp server location
No snmp Server contactCommunity SNMP-server
Server enable SNMP traps snmp authentication linkup, linkdown cold startCrypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
Crypto dynamic-map-RA - VPN 1 set of transformation-ESP-3DES-MD5
Crypto dynamic-map-RA - VPN 1 set of security association lifetime seconds 28800
cryptographic kilobytes 4608000 life of the set - the association of security of VPN - RA 1 dynamic-map
Crypto than VPN-RA - dynamic-map 1jeu reverse-road
Crypto map 65535 ipsec-isakmp dynamic VPN - RA RA - VPN
RA - VPN interface card crypto outside
crypto isakmp identity address
crypto ISAKMP allow inside
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
md5 hash
Group 2
life 86400crypto ISAKMP policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400ISAKMP crypto 10 nat-traversal
crypto ISAKMP ipsec-over-tcp port 1000Telnet 0.0.0.0 0.0.0.0 inside
Telnet 0.0.0.0 0.0.0.0 outdoors
Telnet timeout 60SSH 0.0.0.0 0.0.0.0 inside
SSH 0.0.0.0 0.0.0.0 outdoors
SSH timeout 60Console timeout 0
management-access inside
VPDN group pppoe_group request dialout pppoe
VPDN group pppoe_group localname [email protected] / * /
VPDN group ppp authentication pap pppoe_group
VPDN username [email protected] / * / password *.dhcpd dns 192.168. *. * 4.2.2.2
dhcpd lease 8400
dhcpd ping_timeout 750
dhcpd mydomain.local domain
dhcpd outside auto_configdhcpd address 192.168.1.2 - 192.168.1.33 inside
dhcpd allow insidepriority queue inside
priority-queue outdoorsa basic threat threat detection
Statistics-list of access threat detectionno statistical threat detection tcp-interception
WebVPNinternal examplevpn group policy
attributes of the strategy of group examplevpn
value of server DNS 192.168. *. * 4.2.2.2
Protocol-tunnel-VPN IPSec
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list splittunnel
mydomain.local value by default-fieldvicky 9fO.vlLc77pAFoHp of encrypted privilege 15 password username
username otherusers encrypted password privilege 10 hhckff6QokyoRdar
examplevpn IKg0RMHfprF6Ya3u username encrypted passwordadmin DwCTJcBn.Q0dDe9z encrypted privilege 15 password username
attributes of user admin name
VPN-group-policy examplevpntype tunnel-group RA - VPN remote access
type tunnel-group examplevpn remote access
tunnel-group examplevpn General-attributes
address vpnpool pool
authorization-server-group (outside LOCAL)
Group Policy - by default-examplevpnexamplevpn group of tunnel ipsec-attributes
pre-shared key *.Global class-card class
match default-inspection-trafficclass-map class_sip_tcp
sip port tcp eq gameclass-map inspection_default
match default-inspection-traffictype of policy-card inspect dns preset_dns_map
parameters
message-length maximum 512Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect the skinny
inspect sqlnet
inspect the tftp
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the icmp
inspect the amp-ipsec
Review the ip options
class class_sip_tcp
inspect the sipglobal service-policy global_policy
context of prompt hostname
Cryptochecksum:3edb25d4a550f0394e8c1936ab3326adDid I all I have to add / is this correct?
RADIUS protocol AAA-server RADIUSvpn
Max - a attempts failed 5
AAA-server vpn (DMZ) host 172.16.1.1
interval before new attempt-1
timeout 30
key cisco123type tunnel-group RA - VPN remote access
General-attributes of RA - VPN Tunnel-group
address vpnpool pool
authentication-server-group RADIUSvpnI'm still relatively new to firewalls and find the overwhelming online help sometimes. Help, please
Vicky
Can you comapre the config with the doc and see if something may be missing?
http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00808c3c45.shtml
Use the troubleshooting area in the doc to find the DN, I think that you are missing a part of the DN string. Sorry for the late response
-
802. 1 x with dACL - prefix of an invalid attribute: "ACS."
Dear all,
I spent half an update to fix this problem without success, I hope you could help me.
I configured a simple solution of 802. 1 x on a PC driver who must authenticate through PEAP-MSCHAPv2 users against my user database internal GBA.
Version of the switch:
Model number: WS-C3750V2-48PS-S
Software: c3750-ipbasek9 - mz.122 - 52.SE.bin
ACS:
C1121 with version 5.3.0.40
The problem occurs when the ACS sends within the radius Authentication accept packet the following attribute:
Cisco-AV-pair=ACS:CiscoSecure-defined-ACL=#ACSACL#-IP-auth-4eb90704
On the side of the switch, I see the following debug log:
002558: 8 Nov 14:31:35.586: % AUTHMGR-5-START: start "dot1x' for the client (0022.680b.da7b) on the Interface Fa1/0/1 AuditSessionID AC1FFE4E0000003105BCDE19
002559: 14:31:35.703 8 Nov: AAA/ATTR: prefix of an invalid attribute: "ACS."
002560: 8 Nov 14:31:35.703: % DOT1X-5-FAIL: failure of authentication for the client (0022.680b.da7b) on the Interface Fa1/0/1 AuditSessionID AC1FFE4E0000003105BCDE19
002561: 8 Nov 14:31:35.703: % AUTHMGR-7-RESULT: result of the "dead server" authentication of 'dot1x' for the client (0022.680b.da7b) on the Interface Fa1/0/1 AuditSessionID AC1FFE4E0000003105BCDE19
802.1 x switch associated config:
GLOBAL:
Group AAA dot1x default authentication RADIUS
Group AAA authorization network default RADIUS
start-stop radius group AAA accounting dot1x default
RADIUS-server host 172.31.254.140 auth-port 1645 acct-port 1646
RADIUS-server host 172.31.254.141 auth-port 1645 acct-port 1646
RADIUS server key 7 123415ASFASFAS55512
RADIUS vsa server send accounting
RADIUS vsa server send authentication
analysis of IP device
IP access-list extended by DEFAULT, ALL
allow an ip
SPECIFIC PORT
interface FastEthernet1/0/1
Description model Port 802. 1 x
switchport access vlan 244
switchport mode access
IP access-group by DEFAULT, while
authentication event fail following action method
open authentication
authentication priority dot1x mab
Auto control of the port of authentication
periodic authentication
MAB
dot1x EAP authenticator
dot1x tx-time 10
end
Next to the ACS authentication ends successfully, but for some reason, the switch cannot understand attribute was sent by the ACS:
Why Authentication translates as 'server-dead?
Hereby, I have attached the authorization profile, the downloadable ACLs and the detail of the RADIUS authentication for the request...
Any idea?
Thank you very much!
Yes, I came across the same issue and ended up as a bug with the 3750
CSCtj28883 dACL attribute the parsing failed when debug "author of aaa" on
Description is
The DACL processing fails when the following debug settings are turned on.
1 debug aaa attr
2 debug aaa authorization
The same works very well when they are turned down. Set the switch of newspaper.
I believe has been resolved in version 3750-Build 12.2 (55) as to the next note, attached to the bug as proved to be irreparable on later constructions
The issuer has confirmed that the bug is not seen on the image of 55SE.
The issue is only seen in 53SE
can also try and switch debug off
-
IOS Easy VPN Server / Radius attributes
Hello
I made an easy VPN server installation with a running 12.2 2621XM router (15) output T5. VPN Clients/users are authenticated against Cisco ACS 3.2 by RADIUS.
It works fine, but there is a problem that I can't solve. Each user must have the same VPN assigned IP address whenever it is authenticated.
The ACS sends the right radius attribute (box-IP-Address) back to square of IOS, but this address is not assigned to the client. The customer always gets the next available IP address in the local set on the router.
How can I solve this problem?
You will find the relevant parts of the configuration and a RADIUS "deb" below.
Kind regards
Christian
AAA - password password:
AAA authentication calls username username:
RADIUS AAA authentication login local users group
RADIUS AAA authorization network default local group
crypto ISAKMP policy 1
Group 2
!
crypto ISAKMP policy 3
md5 hash
preshared authentication
Group 2
ISAKMP crypto identity hostname
!
ISAKMP crypto client configuration group kh_vpn
mypreshared key
pool mypool
!
Crypto ipsec transform-set esp-3des esp-sha-hmac shades
!
mode crypto dynamic-map 1
shades of transform-set Set
!
users list card crypto mode client authentication
card crypto isakmp authorization list by default mode
card crypto client mode configuration address respond
dynamic mode 1-isakmp ipsec crypto map mode
!
interface FastEthernet0/1
IP 192.168.100.41 255.255.255.248
crypto map mode
!
IP local pool mypool 172.16.0.2 172.16.0.10!
Server RADIUS attribute 8 include-in-access-req
RADIUS-server host 192.168.100.13 key auth-port 1645 acct-port 1646 XXXXXXXXXXXXXXXX
RADIUS server authorization allowed missing Type of service
deb RADIUS #.
00:03:28: RADIUS: Pick NAS IP for you = tableid 0x83547CDC = 0 cfg_addr = 0.0.0.0 best_a
DDR = 192.168.100.26
00:03:28: RADIUS: ustruct sharecount = 2
00:03:28: RADIUS: success of radius_port_info() = 0 radius_nas_port = 1
00:03:28: RADIUS (00000000): send request to access the id 192.168.100.13:1645 21645.
4, len 73
00:03:28: RADIUS: authenticator 89 EA 97 56 12 B1 C5 C2 - C0 66 59 47 F7 88 96
68
00:03:28: RADIUS: NAS-IP-Address [4] 6 192.168.100.26
00:03:28: RADIUS: NAS-Port-Type [61] Async 6 [0]
00:03:28: RADIUS: username [1] 10 "vpnuser1".
00:03:28: RADIUS: Calling-Station-Id [31] 13 "10.1.14.150".
00:03:28: RADIUS: User-Password [2] 18 *.
00:03:28: RADIUS: receipt of 192.168.100.13:1645, Access-Accept, id 21645/4 l
in 108
00:03:28: RADIUS: authenticator C1 7 29 56 50 89 35 B7 - 92 7 b 1 has 32 87 15 6
A4
00:03:28: RADIUS: Type of Service [6] 6 leavers [5]
00:03:28: RADIUS: connection-ip-addr-host [14] 6 255.255.255.255
00:03:28: RADIUS: Tunnel-Type [64] 6 01:ESP [9]
00:03:28: RADIUS: Tunnel-Password [69] 21 *.
00:03:28: RAY: box-IP-Netmask [9] 6 255.255.255.0
00:03:28: RADIUS: Framed-IP-Address [8] 6 172.16.0.5
00:03:28: RADIUS: [25] the class 37
00:03:28: RADIUS: 43 49 53 43 4F 41 43 53 3 A 30 30 30 30 30 31 30 [CISCOACS:0
000010]
00:03:28: RADIUS: 2F 33 63 30 61 38 36 34 31 61 76 70 75 73 [3/c0a8641a 6F 2F
/vpnus]
00:03:28: RADIUS: 65 72 31 [1]
00:03:28: RADIUS: saved the authorization for user 83547CDC to 83548430 data
00:03:29: RADIUS: authentication for data of the author
00:03:29: RADIUS: Pick NAS IP for you = tableid 0x82A279FC = 0 cfg_addr = 0.0.0.0 best_a
DDR = 192.168.100.26
00:03:29: RADIUS: ustruct sharecount = 3
00:03:29: RADIUS: success of radius_port_info() = 0 radius_nas_port = 1
00:03:29: RADIUS (00000000): send request to access the id 192.168.100.13:1645 21645.
5, len 77
00:03:29: RADIUS: authenticator 13 B2 A6 CE BF B5 DA 7th - 7B F0 F6 0b A2 35 60
E3
00:03:29: RADIUS: NAS-IP-Address [4] 6 192.168.100.26
00:03:29: RADIUS: NAS-Port-Type [61] Async 6 [0]
00:03:29: RADIUS: username [1] 8 'kh_vpn '.
00:03:29: RADIUS: Calling-Station-Id [31] 13 "10.1.14.150".
00:03:29: RADIUS: User-Password [2] 18 *.
00:03:29: RADIUS: Type of Service [6] 6 leavers [5]
00:03:29: RADIUS: receipt of 192.168.100.13:1645, Access-Accept, id 21645/5 l
in 94
00:03:29: RADIUS: authenticator C4 F5 2F C3 EE 56 DA C9 - 05 D6 F5 5 d EF 74 23
AF
00:03:29: RADIUS: Type of Service [6] 6 leavers [5]
00:03:29: RADIUS: connection-ip-addr-host [14] 6 255.255.255.255
00:03:29: RADIUS: Tunnel-Type [64] 6 01:ESP [9]
00:03:29: RADIUS: Tunnel-Password [69] 21 *.
00:03:29: RADIUS: [25] class 35
00:03:29: RADIUS: 43 49 53 43 4F 41 43 53 3 A 30 30 30 30 30 31 30 [CISCOACS:0
000010]
00:03:29: RADIUS: 2F 34 63 30 61 38 36 34 31 61 2F 6 b 5F 68 76 70 [4/c0a8641a
[/ kh_vp]
00:03:29: RADIUS: 6 [n]
00:03:29: RADIUS: saved the authorization for user 82A279FC to 82A27D3C data
Assignment of an IP address via a server Raidus is currently not supported, even if your Radius Server is through an IP address, the router will ignore it and just assign an IP address from the pool locla. In fact, the pool room is the only way to assign IP addresses currently.
On the only way to do what you want right now is to create different groups VPN, each reference to a local IP pool with an address in it. Then ask each user connect to the appropriate by their VPN client group.
Yes, messy, but just try to provide a solution for you.
-
ACS5.1 - AD and mapping of RADIUS attributes
Hello
I am trying to dynamically assign IP addresses for users of VPN of AD (without IAS service). Is it possible?
I know that there is a restriction that "Dial-in users are not taken in charge by announcement in ACS (note in 'acsuserguide51') but I'm not exacly sure, which may or may not do with it."
"Authorization profiles" RADIUS attributes tab I try manually add a specific attribute (box-IP-Address).
I have no problem (everything works fine) with the award of a static in a way as address below:
AD is already integrated with ACS and I managed to download the directory attributes particular msRADIUSFramedIPAddress
When I change the ' attribute value 'static to the dynamic type I see to select AD (but "Select" which should list all of the available attributes is empty).
Is it possible in this way or my concept wrong?
I know I can do it directly (ASA <->AD attribute mapping), but I want to ACS to make
best regards and thx for all help
Przemek
Your baisc approach is
fix. However, when you dynamically assign the IP address of type RADIUS attributes in an authorization profile you get only presented for the selection of attributes in the store identities (in this case AD) which are also a type IP address. In your example, it is of the type "integer64.
-> -
Add contacts to a group in Windows Live Mail
Groups set up in Vista Home Premium still exist after the installation of Windows 7. However, can't understand how to add another individual to groups now.
[Original title: Windows Live Mail]
Open WLM, click left down Contacts, click All Contacts at the top and drag the names to add to the group.
-
How to edit several groups in Secure ACS?
I have 20 or if groups of users with GBA and I want to edit a field in each of them (say I want to change the primary [3076\005] DNS domain in each of them having the same). Is there a way to do this only once (either through download a txt using csutils?), or I have to edit this group at the same time?
There is a Code of Action (163 - ADD_RADIUS_ ATTR) RDBMS, but it would change only the IETF RADIUS attributes.
I do not believe there is no option to accomplish what you are trying to do...
You must enter one by one each group and make the necessary changes.
-
Why do we establish oinstall under the main group of oracle and grid users?
IM and RDBMS version: 11.2.0.4
Platform: RHEL/OL 6.5
Why do we set oinstall under the main group for OS proprietary oracle software and grid?
I would say "The Central stock" is the watchword here.
orainstall is actually called the "oraInventory group." Member of (oracle and grid) users who belong to this group must read, write and execute privileges on the directory Central inventory which will serve as a catalogue of all oracle related software installed on the server. Whenever users put oracle or grid to level, the patches from the software they own, they should be able to update the respective news in this catalogue.
-
Groups of attributes in the guided Navigation
Hello
Is it possible to add other groups of attributes for the component of guided Navigation in addition to view basic attributes groups?
Thank you
Andrés
Hi Andres,
This looks like it. I also found this topic: Configure the behavior of guided Navigation to display basic attributes
Because this topic is only for display of Base attributes (and not the attributes of the other points of view), this suggests that only groups of the Base view attributes can be added to the guided Navigation.
-
ESBase Studio question - how to set up the dim attribute?
I installed Essbase Studio, but has not found a place to create the dimensions of the attribute and rather than associate the dimension attributes to standard dimension? Please notify. Any expert can tell me? JohnGoodwin? GlennS_2? CL?
Published by: user2571802 on January 9, 2010 20:10Hello
Create a hierarchy as usual and add your columns for your dimension attribute, overview make sure your hierarchy is correct.
Change the hierarchy you want to map the dimension attributes to add the mapping of attributes to the hierarchy. (then member of attribute maps to the dimension member)
(don't forget to do a relational ship between members of dimension for the attribute members in your source)
There is an example of adding the mapping to a hierarchy on page 126 of the user's guide of the Regional (multistring with Dimensions of the attribute hierarchy) service
In the dimension of some model > essbase properties > click the attribute member, and then select the attribute settings. (this will not appear until you have successfully added the mapping of the attributes in the hierarchy to set up)See you soon
John
http://John-Goodwin.blogspot.com/ -
How to stop the Radius/Ganymede ACS 5.2?
Hi, is it possible to stop the Radius/Ganymede ACS 5.2 from the GUI?
The command line, you can stop the ACS instance itself - but I don't think you can even components. It simulate an instance ACS failed.
I think that his:
request stop acs
or
judgment of the ACS
To start, it's the same thing with the start of keyword.
-
Radius on ACS 5.2 accounting command
order accounting for RADIUS supported ACS 5.2? status of implementation of radius of the provider supports this feature.
Well radius account management is supported on ACS so if your aaa client's accounting controls, they will appear on ACS without problem.
-
Is there a way to get all the names of collection under which an entity is attributed?
Is there a way to get all the names of collection under which an entity is attributed?
Hello
For a list of the collections which make reference to a specific entity, please refer to the following API request (see documentation of swagger producer-Service-entity ):
GET /publication/ {publicationID} / {entityType} / {entityName} / {referencingEntityType}
This request has been added to the content producer DPS2015 API examples, you can now use the getReferencing()function. Please see /article/get_referencing_entity.php for the complete example.
You can download the latest examples of producer API Content DPS2015 and swagger documentation from here, all the resources are in a file single zip.
-Mike
Maybe you are looking for
-
Double sims does not at the same time.
I live in the United Kingdom, has recently purchased the bike G XT1068 new dual sim. I've been on for ages from 3 mobile and get a very good reception where I live. So I chose 3 for the second sim card like I need separate work/personal numbers. Howe
-
Pavilion H8 1213c: upgrade my computer
I want to improve my computer GPU, but I don't know if she will be able to manipulate.I want to spend my GPU of a Nvidia GeForce GT of 620 to a GTX 750 TI.Any suggestions?Thank you
-
Hi all I have a very frustrating problem. The block diagram of my VI has become perhaps a bit too large (though I tried to keep it as small as possible, there is a lot of stuff going on there) and after my last diagram cleanup some objects have disap
-
Hello I'm trying to search for a string in a variable. He works to match the case when the string begins with the word you are looking for. Unfortunately his does not work through the complete chain. var title = "Hello World"; var value = "world"; va
-
Curve of defective 9380 of blackBerry Smartphones
I understand that my Blackberry curve 9380 comes with a 2 years manufacturer warranty. It does not work and I can't get it fixed, how I go back to Blackberry under the terms of the warranty? I posted the question here but not been successful in getti