Cisco IOS server certificate - is it supported on routers 857/877

Please can someone confirm if the certificate of Cisco IOS server feature is supported on the Cisco 857 router. We have checked with the Software Advisor and no picture for the 857 when the server certificate of IOS feature is selected, but advancedIpservices image v 12.4 (11) T arrives to the 877.

The two 857/877 supports IOS server Certificate

to 857 you need the ADVANCED SECURITY feature set 12.3 (14) YT

http://Tools.Cisco.com/ITDIT/CFN/dispatch?Act=feature&ImageID=619356&platformFamily=306&featureSet=8&featureSelected=2208&availSoftwares=iOS

877 offers more IOSes with Certificate server supports when I chose the certificate server Cisco IOS feature with featured navigator I got a lot of IOSes supporting this feature

Go to navigator feature

http://Tools.Cisco.com/ITDIT/CFN/JSP/index.jsp

Select search by function and select element Cisco IOS Certificate Server, you can filter the results by platform (857/877)

M.

Tags: Cisco Security

Similar Questions

  • Cisco VCS - server certificate

    I get the warning "certificate unsecure: this cystem uses the default server certificate.". We recommend... "On my VCS' are

    1. is there something that I have to take into consideration related to endpoints or other VCS (this is a cluster) before you download a new certificate?

    2. communication between endpoints will affect?

    Hello

    If you are looking to get your certificates signed by yourself or a public certification authority I would first make sure that your servers have host names and configured DNS records. In addition, if you plan to use the edge of the collaboration (MRA) you should take a look at the additional without required for this:

    http://www.Cisco.com/c/dam/en/us/TD/docs/voice_ip_comm/Expressway/config...

    You shouldn't have issues with endpoints being affected, in my experience, the certificates have affected only edge of collaboration.

    Thank you, Simon

  • Cisco IOS Software Internet Key Exchange vulnerability Enquiry

    Products affected

    Cisco IOS devices are vulnerable when you run a software image of an affected version of the Cisco IOS software that does not support the IKE version 2 (IKEv2) and is configured to use IKE version 1 (IKEv1).

    Vulnerable products

    This vulnerability affects Cisco IOS 15.1GC, 15.1 T software version trains and 15.1XB. No other Cisco IOS software release trains are affected.

    Ref: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-ike

    If we use "not affected (for example; version". 12.4, 15.0 releases)"and configured with IKE version1?  Can it be affected by this vulnerability?

    Subsys router #sh | include ikev2

    ikev2_cli_registry registry 1.000.001

    Thank you best regards &,.

    Ye

    You are not affected by this vulnerability.

    As described in the notice - "There is no affected 12.4 based rejection" and «There is no rejection of base affected 15.0»

  • SHA version supported on Cisco IOS

    Guys,

    What is the SHA version that we support on the devices that support VPN from Cisco IOS? Just configuration options tell SHA...

    I do apreciate if you could point me to a cisco document to support your theory because client would require...

    Thanks in advance.

    hash (IKE policy)

    To specify the hashing algorithm in a policy of Internet Key Exchange, use the command hash policy Internet Security Association Key Management Protocol (ISAKMP) configuration mode. IKE policy define a set of parameters to use when the IKE negotiation. To reset the hash algorithm for the algorithm of hash-1 defaultsecure hash algorithm (SHA), don't use No form of this command.

    hash {sha | SHA256 . SHA384 | md5}

    no hash

    Description of the syntax

    SHA

    Specifies the hash algorithm SHA-1 (HMAC variant).

    SHA256

    Specifies the family of SHA-2 256 bits (HMAC variant) as the hashing algorithm.

    SHA384

    Specifies the family of SHA-2 384 bits (HMAC variant) as the hashing algorithm.

    MD5

    Specifies the MD5 (HMAC variant) as the hashing algorithm.

    Default values

    The SHA-1 hashing algorithm

    Control modes

    The ISAKMP policy configuration

    Order history

    Release
    Change

    11.3 T

    This command was introduced.

    12.4 (4) T

    IPv6 support has been added.

    12.2 (33) SRA

    This command was integrated into Cisco IOS version 12. (33) SRA.

    12.2SX

    This command is supported in the Cisco IOS release 12.2SX train. Support in a specific 12.2SX release this train is dependent on your hardware platform game and platform functionality.

    Cisco IOS XE version 2.1

    This command was introduced on the ASR 1000 series Cisco routers.

    15.1 (2) T

    This command was modified. Sha256 , sha384 , and keywords have been added.

    Of course, depends a bit on your IOS.
    HTH,
    Ian
  • Cisco IOS it helps 3rd party certificate

    Hello

    Can I use a 3rd party such as verisign, on Cisco IOS CA? All I can see on cisco.com is a self-signed certificate to the router.

    Thank you

    -santo-

    Santo,

    That's fair enough. A key piece of information to ensure that customers understand that a private PKI gateway is (for the purposes of deployment for example GETVPN) as secure as provided by the third party.

    Private PKI is not based on self-signed certificates free - only the root CA will take something like that :-)

    That being said, for reliability and flexibility I really suggest CA (ser, CRL, OCSP, public/private key backup) to store files on the external storage to the router.

    Takeway key which is a private PKI properly managed solution for deployments like DMVPN/GETVPN others is as secure as external 3rd party services (and often the time order of magnitude cheaper).

    M.

  • Cisco IOS DHCP Server + classless static routes on DHCP clients

    Hi, I tried to find if it is possible to add the ability for static routes to DHCP clients on the Cisco IOS DHCP configuration mode. I'm looking to add a parameters as defined in RFC 3442, like this one, located on the ISC DHCPd server:

    Global settings:

    121 = integer table 8 code option rfc3442-classless-static-routes;

    ms-classless-static-routes option code 249 = integer table 8;

    And for the subnet declaration:

    option rfc3442-classless-static-routes 24, 192, 168, 30, 192, 168, 10, 1;

    option 24 ms-classless-static-routes, 192, 168, 30, 92, 168, 10, 1;

    Is this possible?

    Thank you!

    Vitor

    Yes, the fun part it is to convert it into a format IOS will accept.  You can try:

    IP dhcp pool 0

    option 121 24.192.168.30 ip 192.168.10.1

    option 249 ip 24.192.168.30 92.168.10.1

    If this does not work, change the "intellectual property" for "hex" and each of your decimal byte converted to hexadecimal.

  • Configure Cisco IOS CA Server message

    When you create the CA IOS server, when the database url command has been added, I received the message (in blue below).

    QUESTION: What does this message mean and how do I send the declaration? How can I move the existing database to the new location? What is the location of the source? Advice would be good but would appreciate greatly accurate cli!

    Thanks again

    Frank

    R1 (config) #crypto key generate label eight-thousand General key rsa module exportable 1024
    R1 (config) #crypto export of eight-thousand pem url nvram rsa key: 3des Pr0tectM3
    R1 (config) #crypto pki Server eight-miles
    R1(CS-Server) #database complete level
    R1(CS-Server) #database url nvram
    % Of database server URL has been changed. You must move the
    % existing database to the new location.

    Hello

    If you specify what type of files are the NVRAM, the message disappears, for example, if you tell the router to save the CRL on the NVRAM the problem disappears.

    Router (cs-server) #database url pem nvram
    Router (cs-server) #database url nvram
    % Of database server URL has been changed. You must move the
    % existing database to the new location.
    Router(CS-Server) #.

    It may be useful

    Mike

  • Installation of on IOS SSL certificates

    Having a problem with an SSL certificate (DigiCert) on a Cisco 2811 running IOS 124 - 24.T4.

    I can get the certificates, intermediate and certificates of server installed fine unsing the a trustpoint created. Web ssl site works very well for IE browsers, and other types of browsers get errors. When I do a verification of the SSL certificate it shows that the "the server does not send the certificate requires intermediary" (see attachment). I feel that I have followed is available as well. Any suggestion is appreciated.

    It's the best information I could find to follow. They are specifically for Go-Daddy certs, but I think it would be the same process for all.

    http://bytesolutions.com/support/knowledgebase/KB_Viewer/Smid/622/articleid/21/reftab/195/t/installing-GoDaddy-SSL-certificates-on-a-Cisco-IOS-router-using-CLI.aspx

    Thank you

    BR

    Hello

    If you have several CA certificates, you must authenticate the trustpoint containing the CERT of identity using the immediate intermediate cert and then use other trustpoints to import the other CA certs one by one.

    So, basically, we need to follow the following configuration to import the CA 3 certificate and the certificate of identity on the router:


    1.  Create root trustpoint >> >> Crypto ca trustpoint root >> Enrollment terminal >> >> chain-validation stop >> >> revocation-check none >> >> Crypto ca authenticate root >> (this will prompt to paste in the PEM/base64 of the Root CA certificate) >> Quit after you paste the Root CA certificate. >> >> >> 2.  Create intermediate trustpoint for the primary intermediate certificate >> >> crypto ca trustpoint intermediate-primary >> enrollment terminal >> >> chain-validation continue root >> >> revocation-check none >> >> crypto ca authenticate intermediate-primary >> (this will prompt to paste in the PEM/base64 of the Primary Intermediate CA certificate) >> Quit after you paste the intermediate primary certificate. >> >> >> 3.  Create intermediate trustpoint for the secondary intermediate certificate >> >> crypto ca trustpoint intermediate-secondary >> enrollment terminal >> keypair >> chain-validation continue intermediate-primary >> >> crypto ca authenticate intermediate-secondary >> (this will prompt to paste in the PEM/base64 of the Secondary Intermediate CA certificate) >> Quit after you paste the intermediate secondary certificate. >> >> 4.  Import the IDentity certificate >> >> crypto ca import intermediate-secondary certificate >> (paste the ID certificate PEM/base64 here) 

  • Cisco IOS router 837 - configure DDNS / dynamic DNS

    I have an Internet, connected to my Cisco router link. The package that I subscribed comes with a dynamic IP address. I said me, if I need remote access in the Cisco router, I need to enable the DDNS function. Is this possible on a Cisco router? I have been informed that this feature is not supported. Please help me

    Hi Bro

    Yes, Cisco ASA and Cisco IOS router supported DDNS. Just make sure you have the right version of IOS, which you could refer to this URL of Cisco http://www.cisco.com/en/US/docs/ios/12_3/12_3y/12_3ya8/gt_ddns.html#wp1202953.

    Please refer to the config below made with dyndns.org.

    !

    hostname INT-RTR1
    !
    IP domain name dyndns.org
    8.8.8.8 IP name-server
    !
    IP ddns update DynDNS method
    HTTP
    Add http://ramraj: [email protected] / * //nic/update?system=dyndns&hostname=&myip=>
    maximum interval of 30 0 0 0
    minimum interval 30 0 0 0
    !
    interface Dialer1
    IP ddns update hostname INT - RTR1.dyndns.org
    IP ddns update DynDNS
    !

    Note: hostname = INT - RTR1.dyndns.org was the host added/registered in the dyndns.org site.

    Note: Press Ctrl + V, then just type the symbol? When to add the CLI adds http://___ above.

    Note: ramraj:cisco123 is simply an example of an IDs in dyndns.org.

    You can also refer to this URL for more details http://www.petri.co.il/csc_configuring_dynamic_dns_in_cisco_ios.htm

    P/S: If you cela this comment is useful, please rate well :-)

  • Cisco IOS CA

    Team,

    I use software Cisco IOS XE, Version 03.15.00.S - Standard Support version Cisco IOS software, software of CSR1000V (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.5 (2) S, (fc3) SOFTWARE VERSION to support my Cisco IOS CA.

    In short, I am trying to support a FlexVPN - client VPN Win7 according to document tac 115907 id

    In this document, he says that OpenSSL CA is used but a Cisco IOS CA can also be used. In tests I am at a point where my certificates do not match the example:

    The example document TAC:

    X509v3 extensions:
    X509v3 Key use: F0000000
    Digital signature

    Non-repudiation
    Encryption key

    Data encryption

    My version of laboratory:

    X509v3 extensions:
    X509v3 Key use: A0000000
    Digital signature
    Encryption key

    How can question - I get these replacement using the IOS Cisco CA extensions?

    Chris

    Chris,

    (Shameless Plug) take a look at IOS CA config I used:

    http://www.Cisco.com/c/en/us/support/docs/security/flexvpn/115014-flexvp...

    M.

  • Client VPN Cisco router Cisco, MSW CA + certificates

    Dear Sirs,
    Let me approach you on the following problem.

    I wanted to use a secure between the Cisco VPN client connection
    (Windows XP) and Cisco 2821 with certificate-based authentication.
    I used the Microsoft certification authority (Windows 2003 server).
    Cisco VPN client used eTokenPRO Aladdin as a certificate store.

    Certificate of MSW CA registration and implementation in eToken ran OK
    Customer VPN Cisco doesn't have a problem with the cooperation of eToken.
    Certificate of registration of Cisco2821 MSW ca ran okay too.

    Cisco 2821 configuration is standard. IOS version 12.4 (6).

    Attempt to connect to the client VPN Cisco on Cisco 2821 was
    last update of the error messages:

    ISAKMP: (1020): cannot get router cert or routerdoes do not have a cert: had to find DN!
    ISAKMP: (1020): ITS been RSA signature authentication more XAUTH using id ID_FQDN type
    ISAKMP (1020): payload ID
    next payload: 6
    type: 2
    FULL domain name: cisco - ca.firm.com
    Protocol: 17
    Port: 500
    Length: 25
    ISAKMP: (1020): the total payload length: 25
    ISAKMP (1020): no cert string to send to peers
    ISAKMP (1020): peer not specified not issuing and none found appropriate profile
    ISAKMP (1020): Action of WSF returned the error: 2
    ISAKMP: (1020): entry = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE
    ISAKMP: (1020): former State = new State IKE_R_MM5 = IKE_P1_COMPLETE

    Is there some refence where is possible to find some information on
    This problem? There is someone who knows how to understand these mistakes?
    Thank you very much for your help.

    Best regards
    P.Sonenberk

    PS Some useful information for people who are interested in the above problem.

    Address IP of Cisco 2821 10.1.1.220, client VPN IP address is 10.1.1.133.
    MSW's IP 10.1.1.50.
    Important parts of the Cisco 2821 configuration:

    !
    cisco-ca hostname
    !
    ................
    AAA new-model
    !
    AAA authentication login default local
    AAA authentication login sdm_vpn_xauth_ml_1 local
    AAA authorization exec default local
    AAA authorization sdm_vpn_group_ml_1 LAN
    !
    ...............
    IP domain name firm.com
    host IP company-cu 10.1.1.50
    host to IP cisco-vpn1 10.1.1.133
    name of the IP-server 10.1.1.33
    !
    Authenticated MultiLink bundle-name Panel
    !
    Crypto pki trustpoint TP-self-signed-4097309259
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 4097309259
    revocation checking no
    rsakeypair TP-self-signed-4097309259
    !
    Crypto pki trustpoint company-cu
    registration mode ra
    Enrollment url http://10.1.1.50:80/certsrv/mscep/mscep.dll
    use of ike
    Serial number no
    IP address no
    password 7 005C31272503535729701A1B5E40523647
    revocation checking no
    !
    TP-self-signed-4097309259 crypto pki certificate chain
    certificate self-signed 01
    30820249 308201B 2 A0030201 02020101 300 D 0609 2A 864886 F70D0101 04050030
    .............
    FEDDCCEA 8FD14836 24CDD736 34
    quit smoking
    company-cu pki encryption certificate chain
    certificate 1150A66F000100000013
    30820509 308203F1 A0030201 02020 HAS 11 092A 8648 01000000 13300 06 50A66F00
    ...............
    9E417C44 2062BFD5 F4FB9C0B AA
    quit smoking
    certificate ca 51BAC7C822D1F6A3469D1ADC32D0EB8C
    30820489 30820371 A0030201 BAC7C822 02021051 D1F6A346 9D1ADC32 D0EB8C30
    ...............
    C379F382 36E0A54E 0A6278A7 46
    quit smoking
    !
    ...................
    crypto ISAKMP policy 30
    BA 3des
    md5 hash
    authentication rsa-BA
    Group 2
    ISAKMP crypto identity hostname
    !
    Configuration group customer isakmp crypto Group159
    key Key159Key
    pool SDM_POOL_1
    ACL 100
    !
    the crypto isakmp client configuration group them
    domain firm.com
    pool SDM_POOL_1
    ACL 100
    !
    Crypto ipsec transform-set esp-3des esp-md5-hmac 3DES-MD5
    !
    crypto dynamic-map SDM_DYNMAP_1 1
    the transform-set 3DES-MD5 value
    market arriere-route
    !
    card crypto SDM_CMAP_1 client authentication list sdm_vpn_xauth_ml_1
    map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1 crypto
    client configuration address map SDM_CMAP_1 crypto answer
    map SDM_CMAP_1 65535-isakmp dynamic SDM_DYNMAP_1 ipsec crypto
    !
    ................
    !
    end

    status company-cu of Cisco-ca #show cryptographic pki trustpoints
    Trustpoint company-cu:
    Issuing CA certificate configured:
    Name of the object:
    CN = firm-cu, dc = company, dc = local
    Fingerprint MD5: 5026582F 8CF455F8 56151047 2FFAC0D6
    Fingerprint SHA1: 47B 74974 7C85EA48 760516DE AAC84C5D 4427E829
    Universal router configured certificate:
    Name of the object:
    host name = cisco - ca.firm.com
    Fingerprint MD5: E78702ED 47D5D36F B732CC4C BA97A4ED
    Fingerprint SHA1: 78DEAE7E ACC12F15 1DFB4EB8 7FC DC6F3B7E 00138
    State:
    Generated keys... Yes (general purpose, not exportable)
    Authenticated issuing certification authority... Yes
    Request certificate (s)... Yes

    Cisco-ca #sh crypto pubkey-door-key rsa
    Code: M - configured manually, C - excerpt from certificate

    Name of code use IP-address/VRF Keyring
    C Signature name of X.500 DN default:
    CN = firm-cu
    DC = company
    DC = local

    C signature by default cisco-vpn1

    IMPORTANT: I don't have a Cisco IOS Software: 12.4 (5), 12.3 (11) T08, 12.4 (4.7) PI03c,.
    12.4 (4.7) T - there is error in the cryptographic module.

    Hey guys, it's weird that the router is not find cert after IKE is the cert and validates, it is certainly not reason, but I would go ahead and set up the mapping of certificate on this router to force the client to associate with Group of IKE, for that matter, that you need to change your config a bit for use iskamp profiles :

    http://www.Cisco.com/en/us/docs/iOS/12_3t/12_3t8/feature/guide/gt_isakp.html

  • SNMP v3 & Cisco IOS

    I am trying to configure snmp v3 to monitor my cisco IOS devices
    I get the following error when I try to add configuration properties
    "The configuration has not been set for this resource due to: invalid configuration: error reported by Agent @ 10.101.11.56:2144: java.lang.UnsupportedOperationException: v3 snmp4j support not yet."
    The monitoring agent is the hyperic Server
    Server version: 3.0.2 under Windows 2003 SP1
    Agent version: 3.0.0
    What I am doing wrong?

    When HQ was opened last year to replace our client SNMP with SNMP4J library source.  Since that we've not seen the SNMP v3 support.

    http://JIRA.Hyperic.com/browse/HHQ-62

    It allows you to control your devices IOS using v1 or v2?

    -Ryan

  • Start the server wds with cisco dhcp server

    Salvation;

    I want to use the cisco dhcp server and I do not know which option I need to put my dhcp server

    Tanx

    You must contact Cisco support to help them with their product.

  • HSRP in Cisco IOS - XE

    Hi, just got our Cisco 3850 switch newly shipped with IOS - XE. Here is an example of the command 'show version '.

    Switch(Config-if) #do show worm
    Cisco IOS software, IOS - XE software, catalyst L3 Switch (CAT3K_CAA-UNIVERSALK9-M), Version 03.02.03.SE VERSION SOFTWARE (fc2)
    Technical support: http://www.cisco.com/techsupport
    Copyright (c) 1986-2013 by Cisco Systems, Inc.
    Last update Mon 23 - Sep - 13 18:24 by prod_rel_team

    Cisco IOS Software - XE, Copyright (c) 2005-2013 by cisco Systems, Inc.
    All rights reserved.  Some components of the Cisco IOS - XE software are
    distributed under the GNU General Public License ("GPL") Version 2.0.  The
    software licensed code GPL Version 2.0 is a free software that comes
    WITHOUT ANY WARRANTY.  You can redistribute it and/or modify it
    Code GPL under the terms of the GPL Version 2.0.
    (http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
    documentation or "Mention of license" file that accompanies the IOS - XE software.
    or the applicable URL listed on the brochure that accompanies the IOS - XE
    software.

    ROM: IOS - XE ROMMON
    BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) 1.18 Version, SOFTWARE VERSION (P)
             
    The availability of HK-CSW001 is 4 hours, 0 minutes
    Availability for this command processor is 4 hours, 3 minutes
    System return to the ROM to reload
    System image file is "flash: packages.conf.
    Reload last reason: reload the command

    This product contains cryptographic features and is under the United States
    States and local laws governing the import, export, transfer and
    use. Delivery of Cisco cryptographic products does not imply
    third party approval to import, export, distribute or use encryption.
    Importers, exporters, distributors and users are responsible for
    compliance with U.S. laws and local countries. By using this product you
    agree to comply with the regulations and laws in force. If you are unable
    to satisfy the United States and local laws, return the product.

    A summary of U.S. laws governing Cisco cryptographic products to:
    http://www.Cisco.com/WWL/export/crypto/tool/stqrg.html

    If you need assistance please contact us by mail at
    [email protected] / * /.

    License level: Ipbase
    License type: Permanent
    Then reload license level: Ipbase

    Cisco WS-C3850-24 t (MIPS) processor with K 4194304 bytes of physical memory.
    Card processor ID FOC2007U0YG
    2 virtual Ethernet interfaces
    28 gigabit Ethernet interfaces
    4 ten interfaces Ethernet Gigabit
    2048K bytes of non-volatile configuration memory.
    K 4194304 bytes of physical memory.
    250456K bytes of Crash crashinfo files:.
    1609272K bytes of Flash Flash:.
    0K bytes of Flash model to usbflash0:.
    0K bytes of to webui::.

    MAC Ethernet base address: 00:cc:fc:d1:55:80
    Motherboard Assembly number: 73-16297-04
    Motherboard serial number: FOC20061W6G
    Revision number of the model: Z0
    Motherboard revision number: B0
    Model number: WS-C3850-24 t
    System serial number: XXXXXXXXXXX

    My problem is, I tried to HSRP 1 before using a plotter package and thought since he succeeded, I could do it here in this new switch, but after reading a few articles 1 HSRP went and here HSRP 2 but after I typed in the

    "interface vlan XXX".

    "ip address subnet XXX.XXX.XXX.XXX.

    command "watch version 2" is not available or the day before ipXXX XX. is not available either.

    I'm stuck with this problem now, appreciate any help from you guys.

    Thank you

    The f

    Hello Jeff,.

    We were also quite surprised at the point where we realized, that our brand new 3850 did not support HSRP. This feature was introduced in a second version of the IOS - XE. Currently, we run 03.06.00.E on our WS-C3850-24 t and this version support HSRP.

    I don't understand absolutely, why Cisco released such a combo of software/switch isn't over.

    So, please try a newer version of the software.

    See you soon

    Ichnafi

    Supplement: Cisco Feature Navigator (http://tools.cisco.com/ITDIT/CFN/jsp/by-feature-technology.jsp) said: HSRP is supported since Version 3.3.0

  • Remove the ISE server certificate EAP

    I installed the GoDaddy server certificates on all my 1.1.1 ISE nodes, but customers are still getting the error and accept certificates.  I would just remove EAP certificate and not use any certificate for EAP.

    Explain the problem more in detail. You try to use the comments or 802. 1 x. There are many protocols of authentication you want to use EAP. TLS and PEAP require the use of the cert. What you are trying to accomplish and what are the issues?

    Jim Thomas
    Cisco Security course Director
    Global Knowledge
    CCIE Security #16674

Maybe you are looking for

  • HP envy 15-u110dx 360 x: prt sc - key

    OK, so I'm not sure how recent but my laptop has installed onedrive [I think they do but whatever] ok so when I press on touch prtsc screenshots be saved in onedrive photos screenshots of the file... Now here is the problem for some reason onedrive s

  • Registration of data error

    Hello Currently, I'm new to labview. I try to create a few record for PEAK through com data series. The data will save the potentiometer connected to the PEAK voltage. Apparently, sometimes I get just reading and sometimes I get unwanted data. I hope

  • Sigma 24 - 70 f/2.8

    Rent the Sigma 24 - 70 f/2.8 IQ not better than the Canon 18-55 kit. Why?

  • Is it possible to superimpose the music with the voice recording?

    IAM trying to record pomp and circumstance with superposition of speaking graduates

  • Pixelated photos after looking at the images of the explosion. Album 6.6.A.0.6

    My camera is a D5833 Compact Z3, and being a new device, I used it non-stop and take pictures and videos in all possible modes I, either for fun to test... I recently discovered a consistent bug that goes as follows: After a group of burst high speed