ASA - 5540 used for IPSec VPN only - I can do away with Nat 0?
I'll use an ASA 5540 as our head of VPN endpoint only - and not as a firewall.
Also, we have a class for our company internal address space routable B address, so we don't need NAT. I would like to disable the function NAT 0 if I can so I always add NAT 0 to ensure that the 5540 does not NAT.
Y at - it an easy way to disable the need using NAT 0?
Are there any of the draw to do that?
You can disable the use of nat 0 disabling the nat control.
To achieve this, go to the global configuration mode and use this command:
no nat control
To check whether you have it turned on, you can check it with:
SH run nat-control
See you soon!
-Butterfly
Tags: Cisco Security
Similar Questions
-
Is availble for IPsec VPN FOS 6.3 support stateful failover
Is availble for IPsec VPN FOS 6.3 support stateful failover
SAJ
Hello Saj,
Unfortunately not... stateful failover replica information such as:
Table of connection TCP, udp xlate table ports, h.323, PAT port allocation table...
they replicate data such as:
user authentication (uauth) table
Table ISAKMP / IPSEC SA
ARP table
Routing information
Therefore, in the case where the main breaks down, the IPSEC vpn will be reformed for the failover... Meanwhile, the user will not be able to access the applications...
I hope this helps... all the best... the rate of responses if deemed useful...
REDA
-
9.0 can a dynamic nat be used via ipsec vpn?
9.0 can a dynamic nat be used via ipsec vpn?
We have a vpn and work between asa and when we run traffic through a static nat rule traffic goes over the vpn. When we use a dynamic nat traffic does not get picked up by the ACL vpn.
We disable the nat rules to switch back and just so, even when we use the same destination to source the result is the same.
Am I missing something with 9.0 versions of code? If I disable all the nats and pass traffic it goes via the vpn.
So, it seems that when you use the dynamic nat statement, it pushes traffic to the external interface without looking at the acl of vpn. Please let me know if I'm crazy, I'm a newb on 8.3 zip code.
Thank you
Have you included in the ACL crytop natted ip address or range?
You allowed natted ip address or range to the other end of the tunnel?
-
How can I know if an external drive has been used for Time Machine and what computer it came with too?
I have several laptops and iMacs. I spent the relocation of the year and only used the MacBook Pro.
Now I'm trying to figure out which drive goes with which computer
I connected just a disk seagate 1.5 t and the first thing he did was to ask if I wanted to use it as a Time Machine drive.
(1) if it is the TM disk accompanying this computer don't would not it have just started upward automatically?
(2) what happens if I would have said yes?
(3) I don't even know if it's been activated for TM. Is there a way to tell? It may hold just for iMovie files and other programs associated with a computer from my past.
All readers of backup Time Machine contains a folder named: Backups.backupdb. If you open this folder, you'll find another folder with the name of the computer that has been saved. If several computers have been saved on the same disk, you will have several folders.
-
Hello
I set up a lab for RA VPN with a version of the ASA5510 8.2 and VPN Client 5 software using digital certificates with Microsoft CA on a Windows 2003 server. I did the configuration based on this document from Cisco's Web site:
Now, the vpn works fine, but now I need to configure a tunnel-different groups so I can provide different services to different users. The problem I have now is that I don't know how to set it up for the certificate is the name of tunnel-group. If I do an ASA debug crypto isakmp I get this error message:
% ASA-713906 7: IP = 165.98.139.12, trying to find the group through OR...
% 3 ASA-713020: IP = 165.98.139.12, no group found by matching well payload ID: unknown
% ASA-713906 7: IP = 165.98.139.12, trying to find the group via IKE ID...
% 3 ASA-713020: IP = 165.98.139.12, no group found by matching well payload ID: unknown
% ASA-713906 7: IP = 165.98.139.12, trying to find the group via IP ADDR...
% ASA-713906 7: IP = 165.98.139.12, trying to find the group using default group...
% ASA-713906 7: IP = 165.98.139.12, connection landed on tunnel_group DefaultRAGroupSo, basically, when using certificates I connect always VPN RA only with the group default DefaultRAGroup. Do I have to use a model of different web registration for application for a certificate instead of the user model? How can I determine the OU on the user certificate so that match tunnel-group?
Please help me!
Kind regards
Fernando Aguirre
You can use the group certificate mapping feature to map to a specific group.
This is the configuration for your reference guide:
http://www.Cisco.com/en/us/partner/docs/security/ASA/asa82/configuration/guide/IKE.html#wp1053978
And here is the command for "map of crypto ca certificate": reference
http://www.Cisco.com/en/us/docs/security/ASA/asa80/command/reference/C5.html#wp2186685
Hope that helps.
-
ASA static IP Addressing for IPSec VPN Client
Hello guys.
I use a Cisco ASA 5540 with version 8.4.I need to assign a static IP address to a VPN client. I saw in the documentation Cisco that this can be done to validate the user against the local ASA and in the user account database, you assign a dedicated IP address, or using the vpn-framed-ip-address CLI command.The problem is that the customer never gets this address and it always gets one of the pool in the political group. If I delete this pool, the client can't get any address.No idea on how to fix this or how can I give this static IP address to a specific VPN client?Thank you.Your welcome please check the response as correct and mark.
See you soon
-
AnyConnect VPN client can be used for IPSec remote access VPN connection?
I think I heard it somewhere that AnyConnect VPN can be used for connections SSLvpn IPSec VPN. Is this possible? Thank you!
No, the Anyconnect software cannot be used to establish the framework for a VPN IPSEC IKE.
-
"ITS creation failed" problem for IPSec VPN
An ASA 5100 is used to provide VPN access for my business. The configuration was made by a permeable man who has been missing for some time, and the configuration used to be OK until this morning. This morning, some users reported that their VPN would have fallen once got connected. I checked the ASA and ASDM, I see every time when user deletes, it IPSec tunnel is always action. Furthermore, I faked the problem and got the newspaper of errors such as:
1 11:14:45.898 12/06/07 Sev = WARNING/3 IKE/0xE3000065 could not find an IKE SA for 10.2.1.8. Abandoned KEY_REQ.
2 11:14:45.898 12/06/07 Sev = WARNING/2 IKE/0xE3000099 could not open the P2 generate a new key: error detected(Initiate:176)
3 11:14:45.898 12/06/07 Sev = WARNING/2 IKE/0xE3000099 cannot open the QM (IKE_MAIN:458)
On the side of the AS I did "debug crypto isakmp" and 'debug crypto ipsec' and I got the following errors:
iscoasa # ERROR IPSEC: expiration of the timer of the asynchronous operation, SPI: 0x114CA5B6, user: roeladmin, peer: 202.x.x.70, time: 2 seconds, ctm_ipsec_create_sa:856
IPSEC ERROR: Material outside ITS create command failed, SPI: 0x114CA5B6, error code: 0 x 17
IPSEC ERROR: Asynchronous Operation timeout expired, SPI: 0x61BE2022, user: roeladmin, peer: 202.x.x.70, time: 2 seconds, ctm_ipsec_create_sa:856
IPSEC ERROR: Cannot add a user auth, SPI input: 0x61BE2022, user: roeladmin, peer: 202.172.62.70
IPSEC ERROR: Cannot create an inbound SA SPI: 0x61BE2022 document
IPSEC ERROR: Unable to complete the command of IKE UPDATE
12 June at 14:25:13 [IKEv1]: Group = LANWORKS, Username = roeladmin, IP = 202.172.62.70, error QM WSF (P2 struct & 0 x 4699058, mess id 0xf37ec6f4).
12 June at 14:25:13 [IKEv1]: Group = LANWORKS, Username = roeladmin, IP = 202.172.62.70, peer table correlator Removing failed, no match!
IPSEC ERROR: Material Inbound ITS create command failed, SPI: 0x61BE2022, error code: 0 x 17
It shows that ITS creation has failed. But I can't find the problem with the configuration. Can someone help me on this? Thank you
Outgoing material ITS create command failed, SPI: 0x114CA5B6, error code: 0 x 17
It is a hardware problem, reset the firewall and it will work, I saw 4 times in different ASAs
Please hate the post if help.
-
I'm tryilng for answering an ad on craigslist. I could never do it because when I try to answer the ad, I am sent to Windows Outlook Wizard. I wonder for an incoming mail server. (POP, HTTP IMAPor) and an SMTP server for mail out. Where can I get these from?
Sorry, but I don't know a thing about dam on computers. I use it a lot... What is an ISP?
ISP = Internet service provider. Anyone who buys a PC and want to get online purchases this connectivity with an Internet service provider. A lot of people get their Internet service from their cable company, like Comcast or Charter. Some use AT & T. Some use Verizon.
Most (all?) Internet service providers also has mail services, assigning to customers who want one, an e-mail address. AT & T, for example, provides e-mail ending addresses by @att.net. People can also use independent e-mail like Google Mail providers, Hotmail/Live or Yahoo, which do not depend on any of particular Internet Service provider.
Clearly if you try to answer message from Craig's list, you must have a messaging services provider and an e-mail address for this vendor. Trying to repond to a message by clicking on a MailTo URL in a web page (i.e., mailto:*** address email is removed from the privacy *) usually, you need a mail client - a program that allows to send and receive mail - on your computer. If you use an e-mail service such as Hotmail or Google Mail, accessed through a web browser, online then you can not send mail by clicking on the link email in a web page or a message without changing your Windows registry database, something not to be taken lightly by anyone who is a self-proclaimed computer naive. Some providers of online, like Yahoo Messenger, provide toolbars that integrate with your web browser to provide a part of the functionality of a complete email client, for example the activation of the option click MailTo URLS on web pages.
-
VPN Cisco ASA 5540 L2L - one-way traffic only for the pair to a network
Hello
I'm a little confused as to which is the problem. This is the premise for the problem I have face.
One of our big clients has a Cisco ASA5540 (8.2 (2)) failover (active / standby). Early last year, we have configured a VPN from Lan to Lan to a 3rd party site (a device of control point on their end). He worked until early this week when suddenly the connection problems.
Only 1 of the 3 networks the / guests can access a remote network on the other side. 2 others have suddenly stopped working. We do not know of any change on our side and the remote end also insists that their end configurations are correct (and what information they sent me it seems to be correct)
So essentially the encryption field is configured as follows:
access-list
line 1 permit extended ip 10.238.57.21 host 10.82.0.202 (hitcnt = 2)
access-listline 2 extended permit ip 10.207.0.0 255.255.0.0 10.82.0.200 255.255.255.252 (hitcnt = 198)
access-listline 3 extended permit ip 10.231.191.0 255.255.255.0 10.82.0.200 255.255.255.252 (hitcnt = 173) Free NAT has been configured as follows (names modified interfaces):
NAT (interface1) 0-list of access to the INTERIOR-VPN-SHEEP
the INTERIOR-VPN-SHEEP line 1 permit access list extended ip 10.231.191.0 255.255.255.0 10.82.0.200 255.255.255.252
permit for Access-list SHEEP-VPN-INSIDE line lengthened 2 ip host 10.238.57.21 10.82.0.202NAT (interface2) 0-list of access VPN-SHEEP
VPN-SHEEP line 1 permit access list extended ip 10.207.0.0 255.255.0.0 10.82.0.200 255.255.255.252
After the problem started only 10.207.0.0/16 network connections worked for the site remote 10.82.0.200/30. All other connections do not work.
There has been no change made on our side and on the side remote also insists there has been no change. I also checked how long the ASAs have been upward and how long the same device has been active in the failover. Both have been at the same time (about a year)
The main problem is that users of the 10.231.191.0/24 cant access remote network network. However, the remote user can initiate and implement the VPN on their side but usually get any return traffic. Ive also checked that the routes are configured correctly in the routers in core for the return of their connections traffic should go back to the firewall.
Also used of "packet - trace" event raising the VPN tunnel (even if it passes the phases VPN). For my understanding "packet - trace" alone with the IP source and destination addresses must activate the VPN connection (even if it generates no traffic to the current tunnel).
This is printing to the following command: "packet - trace entry interface1 tcp 10.231.191.100 1025 10.82.0.203 80.
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit rule
Additional information:
MAC access listPhase: 2
Type: FLOW-SEARCH
Subtype:
Result: ALLOW
Config:
Additional information:
Not found no corresponding stream, creating a new streamPhase: 3
Type:-ROUTE SEARCH
Subtype: entry
Result: ALLOW
Config:
Additional information:
in 10.82.0.200 255.255.255.252 outsidePhase: 4
Type: ACCESS-LIST
Subtype: Journal
Result: ALLOW
Config:Access-group interface interface1
access-list extendedallow ip 10.231.191.0 255.255.255.0 10.82.0.200 255.255.255.252
Additional information:Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional information:Phase: 6
Type: INSPECT
Subtype: np - inspect
Result: ALLOW
Config:
class-map inspection_default
match default-inspection-traffic
Policy-map global_policy
class inspection_default
inspect the http
global service-policy global_policy
Additional information:Phase: 7
Type: FOVER
Subtype: Eve-updated
Result: ALLOW
Config:
Additional information:Phase: 8
Type: NAT-FREE
Subtype:
Result: ALLOW
Config:
NAT-control
is the intellectual property inside 10.231.191.0 255.255.255.0 outside 10.82.0.200 255.255.255.252
Exempt from NAT
translate_hits = 32, untranslate_hits = 35251
Additional information:-Phase 9 is a static nat of the problem to another network interface. Don't know why his watch to print.
Phase: 9
Type: NAT
Subtype: host-limits
Result: ALLOW
Config:
static (interface1, interface3) 10.231.0.0 10.231.0.0 255.255.0.0 subnet mask
NAT-control
is the intellectual property inside 10.231.0.0 255.255.0.0 interface3 all
static translation at 10.231.0.0
translate_hits = 153954, untranslate_hits = 88
Additional information:-Phase 10 seems to be the default NAT for the local network configuration when traffic is to the Internet
Phase: 10
Type: NAT
Subtype:
Result: ALLOW
Config:
NAT (interface1) 5 10.231.191.0 255.255.255.0
NAT-control
is the intellectual property inside 10.231.191.0 255.255.255.0 outside of any
dynamic translation of hen 5 (y.y.y.y)
translate_hits = 3048900, untranslate_hits = 77195
Additional information:Phase: 11
Type: VPN
Subtype: encrypt
Result: ALLOW
Config:
Additional information:Phase: 12
Type: VPN
Subtype: ipsec-tunnel-flow
Result: ALLOW
Config:
Additional information:Phase: 13
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional information:Phase: 14
Type: CREATING STREAMS
Subtype:
Result: ALLOW
Config:
Additional information:
New workflow created with the 1047981896 id, package sent to the next moduleResult:
input interface: interface1
entry status: to the top
entry-line-status: to the top
output interface: outside
the status of the output: to the top
output-line-status: to the top
Action: allowSo, basically, the connection should properly go to connect VPN L2L but yet is not. I tried to generate customer traffic of base (with the source IP address of the client network and I see the connection on the firewall, but yet there is absolutely no encapsulated packets when I check "crypto ipsec to show his" regarding this connection VPN L2L.) Its almost as if the firewall only transfers the packets on the external interface instead of encapsulating for VPN?
And as I said, at the same time the remote end can activate the connection between these 2 networks very well, but just won't get any traffic back to their echo ICMP messages.
access-list extended
allow ip 10.231.191.0 255.255.255.0 10.82.0.200 255.255.255.252
local ident (addr, mask, prot, port): (10.231.191.0/255.255.255.0/0/0)
Remote ident (addr, mask, prot, port): (10.82.0.200/255.255.255.252/0/0)
current_peer: y.y.y.y#pkts program: encrypt 0, #pkts: 0, #pkts digest: 0
#pkts decaps: 131, #pkts decrypt: 131, #pkts check: 131
compressed #pkts: 0, unzipped #pkts: 0
#pkts uncompressed: 0, comp #pkts failed: 0, #pkts Dang failed: 0
success #frag before: 0, failures before #frag: 0, #fragments created: 0
Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0
#send errors: 0, #recv errors: 0If it was just a routing problem it would be a simple thing to fix, but it is not because I can see the connection I have to confirm it by the router base on the firewall, but they don't just get passed on to the VPN connection.
Could this happen due to a bug in the Software ASA? Would this be something with Checkpoint VPN device? (I have absolutely no experience with devices of control point)
If there is any essential information that I can give, please ask.
-Jouni
Jouni,
8.2.4.1 is the minimum - 8.2.4 had some issues (including TCP proxy).
If this does not resolve the problem - I suggest open TAC box to get to the bottom of this ;-)
Marcin
-
Certificates for IPSEC vpn in ASA 8.0 clients
Hello!
I have configured MS CA and I have setup client vpn and ASA 7.0 make tunnel with certificates.
Same configuration does not work with ASA 8.0 I get the error
CRYPTO_PKI: Check whether an identical cert is
already in the database...
CRYPTO_PKI: looking for cert = d4bb2888, digest = handle
B8 74 97 f3 bf 25 1 c e5 2nd e5 21 3rd d1 93 15 d6 |... t...%...! >....
CRYPTO_PKI: Recording of Cert not found, return E_NOT_FOUND
CRYPTO_PKI: Cert not found in the database.
CRYPTO_PKI: Looking for suitable trustpoints...
CRYPTO_PKI: Found a suitable trustpoint authenticated A1.
CRYPTO_PKI (make trustedCerts list) CRYPTO_PKI:check_key_usage: KeyUsage Incorrect
(40)
CRYPTO_PKI: Validation of certificate: State failure: 1873. Any attempt of recovery
If necessary revocation status
ERROR: Certificate validation failed. Peer certificate's key usage is not valid, ser
Number of the IAL: 250F3ECE0000000009AF, name of the object: cn = xxxxx, unit of organization = xxxx, o = xxxxx, c =
XX
CRYPTO_PKI: Certificate not validated
Why the use of the key is invalid? What model of certificate must be used in MS in order to get a regular use of the key?
The schooling of CA's Terminal.
Thank you!
The cert needs to have defined Digital Signature key usage.
Don't know what models are available on MS, but it should be something like "User Ipsec" I guess.
Make 8 ASA behave like ASA 7 (i.e. disable th control on the use of the key of the cert), configure:
Crypto ca trustpoint
ignore-ipsec-keyusage
-
Ask/dissemination of certificates for IPSEC VPN user
Hi all
I have therefore an ASA established the connection to an LDAP, an SSL certificate signed for the cert of the device and use IPSEC IKEv2 VPN connections that are authenticated by the LDAP username and password and X.509 certificates.
I have a CA server root of Microsoft Windows server 2012 (State in offline mode) and a Windows server 2012 subordinate certification authority server. Both are 10-year Certification authorities.
To generate certificates VPN I'm going to the AC Sub, go to certificates (local computer) > personal > right click on the white space > all tasks > advanced operations > ask personalized.
I have set up my cert accordingly and enable private key export.
I submit new request to the CERT service. authority on the CA of Sub (same machine as before). I issue the certificate, and then export the certificate with the private key. I send this to my user, then they install this certificate in the personal certificates store and access the VPN access using this cert more username and password they have been assigned (no there is no possibility for them to ask their own PC)
Question 1: Is there an easier way to do this? Command line? Script? preconfigured with the certificate settings .ini file?
Question 2: These certificates are only 1 year. How can I generate certificates that are longer than that. I'm jumping for 3 years.
Thank you!
BROKEN
Well it's quite simple setup-wise when you chose to go down the path of the client certificate. It is generally easier to use SCEP (Simple Certificate Enrollment Protocol) Protocol to manually deploy certificates. There is an example of a configuration Definition here.
There is also a good presentation (or several) of Cisco Live. I recommend that you take a look at this one from 2012: Practice of PKI for VPN.
In this presentation, he you (slide 39) specifically shows how to create a new certificate template and set the validity period for the value by default 1 years.
-
Unique remote IP for IPSec VPN router to router
Hi, I am setting up a virtual private network to another company, and they provided a routable IP address to be peers and their local internal system we need access to. Can I use the address of the remote peer in the crypto ACL? I think that they need to provide a second IP NAT for their internal system, if not for their peers IPSec traffic will hit the ACL crypto. What do you think? Thank you!
As long as only 1 end of the peer uses the peer IPSec (destination ip address) in the ACL crypto, it's OK. You can't have two ends as being the ACL crypto.
-
Dynamic dns using for IPSec on PIX tunnel
We have a pair of PIX running 6.3 (5), and a separate company must be connected to us. Remote society has a dynamic IP address on the firewall, but it is registered with dyndns.com. As far as I know, the PIX does not have a DNS server, so this configuration will not work unless manually change us the entry of 'name' on our firewall. Is this correct? Thank you
Hello
Sorry for the delay.
The idea is that your dynamic peers land on dynamic crypto map (not you can always match within the dynamic crypto map)
bsns-asa5505-19(config)# crypto dynamic-map DYNMAP 10 match address ?
configure mode commands/options:
WORD Access-list nameHere's how you can make them land on different map entries.
With regard to the game by the peers. I did check the behavir in the laboratory and what you say is true, you can for example use DNS.
IOS is the keyword 'dynamic' for the router to do name resolution when initiaitng tunnel.
Improving on the side of the ASA has never been fulfilled:{{class=fontblue}}
Marcin
-
Need help for IPSEC VPN configuration.
Hello
I'm trying to implement a VPN IPSEC connection in my GNS3 lab and all show commands and debugs does not seem to give me clues of what is wrong or missing... can someone please help me in my troubleshooting VPN config. Here is the config for Router 1
R1 #sh run
crypto ISAKMP policy 1
preshared authentication
Group 2
ISAKMP crypto key 6 cisco123 address 200.20.1.1
!
!
Crypto ipsec transform-set esp - esp-sha-hmac CISCO_SET
!
map VPN_map 10 ipsec-isakmp crypto
! Incomplete
defined by peer 200.20.1.1
Set security-association second life 190
game of transformation-CISCO_SET
match address INT_TRAFFIC
!
!
interface Loopback1
IP 172.16.1.1 255.255.255.255
!
interface Loopback2
172.16.1.2 IP address 255.255.255.255
!
interface FastEthernet0/0
IP 200.11.1.1 255.255.255.252
IP ospf 1 zone 0
automatic duplex
automatic speed
card crypto VPN_map
!
router ospf 1
Log-adjacency-changes
network 172.16.0.0 0.0.255.255 area 0
!
router bgp 65001
no synchronization
The log-neighbor BGP-changes
200.11.1.0 netmask 255.255.255.252
neighbour 200.11.1.2 distance - as 65030
No Auto-resume
!
IP forward-Protocol ND
!
!
IP http server
no ip http secure server
!
INT_TRAFFFIC extended IP access list
IP address 172.16.0.0 allow 0.0.255.255 192.168.0.0 0.0.255.255
IP address 172.16.0.0 allow 0.0.255.255 192.168.0.0 0.0.255.255 connect
end
R1 #sh crypto isakmp his
IPv4 Crypto ISAKMP Security Association
status of DST CBC State conn-id slot
IPv6 Crypto ISAKMP Security Association
R1 ipsec crypto #show her
Nill...
R1 #sh debugging
Encryption subsystem:
Crypto ISAKMP debug is on
Engine debug crypto is on
Crypto IPSEC debugging is on
Regulation:
memory tracking is enabled
R1 #sh ip route
Gateway of last resort is not set
200.20.1.0/30 is divided into subnets, subnets 1
B 200.20.1.0 [20/0] via 200.11.1.2, 01:28:21
200.11.1.0/30 is divided into subnets, subnets 1
C 200.11.1.0 is directly connected, FastEthernet0/0
172.16.0.0/32 is divided into subnets, 2 subnets
C 172.16.1.1 is directly connected, Loopback1
C 172.16.1.2 is directly connected, Loopback2
R1 #ping 200.20.1.1
Type to abort escape sequence.
Send 5, echoes ICMP 100 bytes to 200.20.1.1, wait time is 2 seconds:
!!!!!
See you soon,.
Fabio
Nice Catch. The key word 'Incomplete!' should have reported it.
Please close the issue as resolved - user error
Thank you
Brian
Maybe you are looking for
-
registration iPhone 7 with Server 5.2
Hello My Server 5.2 (same problem with 5.1.7 or 5.2 beta) cannot register for any iPhone Plus 7/7: -Installation of works 'Profile Trust' (signed and verified) -Installation of the "Remote Management" profile "has failed." -Display message is: 'profi
-
Hi I'm new with labview, I made an application with release of vi express tool called "show msg" and when I run the program in 'performance continuously', do not close the message window when I press 'ok' I want to know if there is a way to disable t
-
How reset you your passward 8.1 on windows, because it is a new computer, I have no recollection of losing. I hoped to reset to factory settings, I can not get the uefi to boot from my USB drive, I am not computer savy
-
Windows Time __VISTA & Date remain TOGETHER?
Windows Vista - usually stay together, I change at the right time and he won't run right and be same time that when I turned off the last time - no recent male spy or virus to my knowledge problems, same restoration is a not correct this?
-
Classes in two files .java talk
Hello, if you have A class in a separate from your main application class in the main .java file source .java file, you can do something like this: File main .javaClass myapp. {ClassA joe = new ClassA();Joe.doThis ();Public int doThat() {...} in the