Condition of authorization ISE
Hello
I have a requirement to configure ISE so that it makes a distinction between switches in a switch stack. Anyone know if there is an expression that I could use in a condition of authorization that allows to get the following:
If a device using MAB connects for 1 in the battery it will assign to VLAN 10.
If the same device connects for 2 in the same stack that will be assigned to VLAN 20.
Thank you
Terry
You can use the interface numbering as a condition, the switch sends information on the numbering of the battery. I don't remember the specific av pair, but you should be able to find it in the details of the live journal.
Tags: Cisco Security
Similar Questions
-
First successful authorization ISE and then failure (MAB)
Hello
ISE 1.1.1 and switch using 3650 12.2 (55) SE6.
I have a client (computer) that needs to be authenticated with MAB and then to the port of the switch must be asigned a DACL and VLAN 90 list. I get
'Authorization successful' but directly after it fails and I cannot understand why. ISE shows only the authentication successful under "Authenticaions Live".
As you can se the rating below 802. 1 x fails, as it should be, and then pass the MAB, conditioned the VLAN and then fails:
0002SWC002 (config) #int fa0/13
0002SWC002(Config-if) #shut
0002SWC002(Config-if) #.
7 jan 13:26:59.640: % LINK-5-CHANGED: Interface FastEthernet0/13, changed state down administratively
7 jan 13:27:00.647: % LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/13, changed state down
0002SWC002(Config-if) #no close
0002SWC002(Config-if) #.
7 jan 13:27:19.689: % LINK-3-UPDOWN: Interface FastEthernet0/13, changed State to down
7 jan 13:27:22.063: % LINK-3-UPDOWN: Interface FastEthernet0/13, changed State to
7 jan 13:27:22.776: % AUTHMGR-5-START: start "dot1x' for the client (f04d.a223.8f43) on the Interface Fa0/13 AuditSessionID 0A0005FC00000
020D7C192D1
7 jan 13:27:23.070: % LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/13, changed State to
7 jan 13:27:51.054: % DOT1X-5-FAIL: failure of authentication for the client (f04d.a223.8f43) on the Interface Fa0/13 AuditSessionID
7 jan 13:27:51.054: % AUTHMGR-7-RESULT: authentication result in 'no response' of 'dot1x' for the customer (f04d.a223.8f43) on the Interface
0/13 AuditSessionID 0A0005FC00000020D7C192D1
7 jan 13:27:51.054: % AUTHMGR-7-FAILOVER: failover "dot1x' for the client (f04d.a223.8f43) on the Interface Fa0/13 AuditSessionID 0
A0005FC00000020D7C192D1
7 jan 13:27:51.054: % AUTHMGR-5-START: start "mab" for the client (f04d.a223.8f43) on the Interface Fa0/13 AuditSessionID 0A0005FC0000002
0D7C192D1
7 jan 13:27:51.088: % MAB-5-SUCCESS: authentication successful for the client (f04d.a223.8f43) on the Interface Fa0/13 AuditSessionID A 0, 0005
FC00000020D7C192D1
7 jan 13:27:51.088: % AUTHMGR-7-RESULT: result of the authentication 'success' of 'mab' for the client (f04d.a223.8f43) on the Interface Fa0/13 AuditSessionID 0A0005FC00000020D7C192D1
7 jan 13:27:51.088: % AUTHMGR-5-VLANASSIGN: 90 VLAN assigned to the Interface Fa0/13 AuditSessionID 0A0005FC00000020D7C192D1
7 jan 13:27:51.096: % EMP-6-POLICY_REQ: IP 0.0.0.0. MAC f04d.a223.8f43 | AuditSessionID 0A0005FC00000020D7C192D1 | AUTHTYPE DOT1X | EVENTS APPLY
7 jan 13:27:51.096: % EMP-6-IPEVENT: IP 0.0.0.0. MAC f04d.a223.8f43 | AuditSessionID 0A0005FC00000020D7C192D1 | AUTHTYPE DOT1X | EVENT
IP-WAIT
7 jan 13:27:51.255: % AUTHMGR-5-SUCCESS: authorization succeeded for client (f04d.a223.8f43) on the Interface Fa0/13 AuditSessionID A 0, 00
05FC00000020D7C192D1
7 jan 13:27:52.027: % EMP-6-IPEVENT: IP 10.90.5.1 | MAC f04d.a223.8f43 | AuditSessionID 0A0005FC00000020D7C192D1 | AUTHTYPE DOT1X | ACE double entry of IP-ASSIGNMENTReplacing EVENT for the host 10.90.5.1
7 jan 13:27:52.036: % AUTHMGR-5-FAIL: failed authorization for customer (f04d.a223.8f43) on the Interface Fa0/13 AuditSessionID 0A0005FC00
000020D7C192D1
7 jan 13:27:52.036: % EMP-6-POLICY_REQ: IP 10.90.5.1 | MAC f04d.a223.8f43 | AuditSessionID 0A0005FC00000020D7C192D1 | AUTHTYPE DOT1X | REMOVAL OF THE EVENT
After that the process starts all over again.
It is the switch port configuration:
interface FastEthernet0/13
Description data/VoIP
switchport mode access
switchport voice vlan 20
switchport port-security
security violation restrict port switchport
IP access-group ACL-LEAVE in
SRR-queue bandwidth share 1 70 25 5
3 SRR-queue bandwidth shape 0 0 0
priority queue
authentication event fail following action method
action of death event authentication server allow voice
the host-mode multi-auth authentication
open authentication
authentication order dot1x mab
authentication priority dot1x mab
Auto control of the port of authentication
MAB
added mac-SNMP trap notification change
no link-status of snmp trap
dot1x EAP authenticator
dot1x tx-time 10
Storm-control broadcasts 2.00 1.00
Storm-control level multicast 2.00 1.00
stop storm-control action
Storm-control action trap
spanning tree portfast
service-policy input ax-qos_butnet
IP dhcp snooping limit 5 speed
end
Is there a problem with the client (computer) or ISE/switch?
No problem of Phillip,
Ultimately you want to leave the entries in the source for the dACL set with one, because the switch will replace those with the source ip address that he draws from the analysis of ip device.
Thank you
Tarik Admani
* Please note the useful messages *. -
ACS 5.2 - membership as a Condition of authorization group does not work
Hello
I try use "Identity groups" as 'composed Condition' in my article "Access Policy" permission :.
The result is simple attribute class Radius which must be sent to the SSL VPN router (the image is modified to be smaller):
Any group identity which must identify him as a member of a business unit has assigned to each user in my RADIUS database (we have used in this way with ACS 4.x - database user and groups has been migrated to 5.2 ACS it).
Unfortunately these authorization rules do not work as expected. If I stay for the purposes of testing a rule with operator 'not in' instead of 'in' this rule is used and corresponding to the result authorization profile is used.
So it seems composed condition can't match itself with group identity properly - is this a known BUG / unknown or I am missing something in my configuration? I am a newbie to 5.2 ACS is possible I forgot something.
Thanks for any help with this strange issue.
Please confirm that the identity of service access strategy uses internal data for authentication
To see the full details/steps to demand to go to:
-
Launch monitoring & report viewer
-Select authentication - RADIUS - today
-When you see the folder for a default application press the icon in the details of the position and you will see all the processing of the application
The details of authentication is the more relevant article
-
Types of plan Vs Condition of authorization
Can someone give me a world real pro/con on my decision to use one of them on the other?
Thank you
JeremyJeremy,
If a set of users should not have access to a part of your application, use the permissions. If you want to be able to show/hide/do something with the parts of your application based on the State of your data, terms of use.
They are used for quite different things, in order to give useful examples is difficult. But with permissions, you can block access to the part of an application to, say, your HR people. with conditions, we can say that no one has allowed to see someone of another wage information. (Of course, you can also use the SRM to the same sort of thing, but it was the first example that came to my mind.)
One area that I used the conditions so that you could not do with permissions is a search page that displays the results in another region on the same page. When you first load the page, the region of results does not show because there is nothing for him. When you enter a value in the field and send the the region of results page is loaded.
-David
-
Profiles of logics in ISE 1.2.1
I m having difficulties to understand the logic of the profiles.
What I understand from the User Guide: http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/user_guide/ise_use...
for those lazy to read:
You can use the profile of logic in a condition of authorization policy to help create a comprehensive policy of access network for a class of profiles. You can create a simple condition of authorization, which may be included in the authorization rule. The pair attribute / value that you can use in the condition of approval is the profile of logic (attribute) and the name of the logical profile (value), which is in the dictionary of systems of endpoints.
so I thought that meant that I can combine different profiles (Apple Iphone, Ipad, Ipod) into a logical group for example "BYOD_Idevice" and use this logical profile in the authorization.
But I can´t choose this newly created logical group in the Condition of approval. As, I have can´t choose this logical group ANYWHERE.
Leaning back and think about it - it is logical sort. In the authorization, Don t you choose profiles, you choose the identity settings. So what is the point on the profiles of logic? I expect lean/clean up to my rules for leave with them. But for what I would use them on the other?
Or is this a bug in 1.2.1 ise? Don't know if I should call tac to this topic, or if I m just don't get it :D
Thanks a lot for your help!
Nice username! :)
Then Yes, you are right, profiles of logic would allow you to group different types of devices dynamically profiled and then reference the profile in your authorization rules. However, you will not see these logical profiles under the heading "Details of group identity." You should leave this field blank. Instead, you should look in the 'second' status area: expression > Endpoint > LogicalProfile
I hope this helps!
Thank you for evaluating useful messages!
-
Cisco ISE 1.2 and the ad group
Hello
I have Cisco ISE installed on my EXSi server for my test pilot. I added several ad groups at ISE as well.
I created a condition of authorization policy, that is WIRELESS_DOT1X_USERS (see screenshot)
Basically, I just replicate the default Wireless_802.1X and added Network Access: EapAuthentication, Equals, EAP - TLS.My problem is, I have been unable to join the wireless network, if I added my ad group to the authorization strategy (see screenshot). The user I is a member of WLAN USERS. If I removed the authorization policy group, the use is able to join the wireless network.
I have attached the screenshot of ISE newspapers as well. I checked the ISE, AD/NPS, WLC, laptop computer time and date, and they are all in sync.
I also have the WLC added as NPS client on my network.
I checked the newspaper AD and I found it, it was the local management user WLCs trying to authenticate. It is supposed to be my wireless user Credential is not the WLC.
It's the paper I received from the AD/NPS
Access denied to user network policy server.
Contact the server administrator to strategy network for more information.
User:
Security ID: NULL SID
Account name: admin
Domain account: AAENG
Account name: AAENG\admin
Client computer:
Security ID: NULL SID
Account name: -.
Full account name: -.
OS version: -.
Called Station identifier: -.
Calling the Station identifier: -.
NAS:
NAS IPv4 address: 172.28.255.42
NAS IPv6 address: -.
NAS identifier: RK3W5508-01
NAS Port Type: -.
NAS Port: -
RADIUS client:
Friendly name of client: RK3W5508-01
The client IP address: 172.28.255.42
Information about authentication:
Connection request policy name: Windows authentication for all users use
The network policy name: -.
Authentication provider: Windows
Authentication server: WIN - RSTMIMB7F45.aaeng.local
Authentication type: PAP
EAP Type: -
Identifier for account: -.
Results of logging: Accounting Information was written in the local log file.
Reason code: 16
Reason: Authentication failed due to incompatibility of user credentials. The provided username is not mapped to an existing user account or the password is incorrect.
Hello
The problem is with what ISE name, it's choosing to search of the AD. If you look in the ISE newspapers down, you'll see the username that use ISE (firstname, lastname) to search for the AD.
In your certificate template see what attribute containst name AD (possibly the dns name or email or the name of principle of RFC 822 NT), go to your profile to authenticate cerificate and use this attribute for the user name.
Thank you
Tarik Admani
* Please note the useful messages *. -
How do I download the same application Mac - Pro: two hardrives
How to download an application even my Mac - Pro two different hardrives!
So, how to use precisely, export to assimilate new needs...
I think you are using the wrong terminology. It would be useful to know the application in question. Some applications have specific licenses to drive, some use the network adapter on the computer to monitor the conditions of authorization and some won't let you have two simultaneous copies running at the same time on two different computers. Upload is the term used to send a file from a client computer (for example, a user of an internet provider) to a server (for example an internet provider). If English is not your language, please indicate what it is.
-
Activation of Windows XP in VMWarePlayer
Hi all
I am trying to install 4 new PC Windows 7 (64 bit) for our company replace the old Windows XP boxes. Unfortunately, some of the old installed software does not work in the new environment (after installation attempts). My last resort is to use VMWarePlayer to run a copy of the old PC into a virtual machine, each time that he needed the old software. The problem is that Windows XP in the VM requires reactivation. I don't want to break the conditions of authorization and hesitate to acivate WinXP in the virtual machine. I believe that the original Windows XP licenses OEM as the PCs licenses are machines HP SFF supplied with Windows preinstalled (like new).
My question is: can I legally to reactivate the Windows XP VM licenses and use them instead of the old physical PC that is currently retired? Can I scrap the old PC or I should keep them (for the license)?
Kind regards
Walter
Hello Walter.
The answer to your question lies in the following Windows OEM Licensing FAQ:Q. my clients can transfer or sell their software OEM licenses?A. the software after an OEM license has been installed on a PC, the license can be installed on or transferred to another PC. However, all of your PCs can be transferred to another end user, as well as software license rights. When the PC to transfer to the new user of the end, the support of software, manuals (if any) and the certificate of Authenticity label must be included. It is also advisable to include the original purchase invoice or receipt. The final original user cannot keep all copies of the software.
-
y at - it a detailed explanation of the advanced options?
I was wondering if there is a document that details the options advanced. The default values are selected to reject, refuse, drop. However, if the user is not located and select continue instead to reject, what is the next step in authentication.
Here are my exact question:
If you select continue, where GBA seems next?
Look for the following rule in this access policy or does go to the next access policy?
Do not have a document but may try to explain in this post
There are three cases which can apply this configuration and for each case three options control the behavior of
The behavior of three options is:
-Reject: send a rejection of demand response
-Deposit: send no response on demand
-Continue: continue to assess the conditions of authorization policy
The three cases for which options can be configured are:
-Failed authentication: user name were found in ID store but a password is incorrect or the user is disabled
-Not found user: username was not found in one of the ID stores that have been assessed
-Process failed: couldn't get a response from the ID store
As I said, if continue is to select the continuous treatment to evaluate the permission policy for access service that was previously selected. No other service access is evaluated.
Note that in the authorization policy, there is an additional attribute that can be used to determine the special cases which occurred during authentication. The attribute is "Authentication status" and can take the values of 'AuthenicationPassed', 'AuthenticationFailed', 'ProcessError', 'UnknwonUser '.
So in the political authorization can define different results depending on the result of the "authentication status"; for example to set default VLAN
-
Using AD credentials for device management.
Hello
I try to put the source of the identity to use Active Directory are credentials as an authentication method.
Connection between AD and ACS has set up and connected.
Statement of the problem: -.
The moment I try to telnet from a remote location, I was able to move forward on the first authentication of username-password of state name, but once come to activate password, it ask me a failure of authentication even with the correct password.
Log errors for this case is "too high privilege level required 13029.
If I change the source of local identity it will not have this problem.
Platform for these cases is
-C6500 with IOS 12.2 (33) SXJ1
-ACS 5.2.0.26
Thus, GBA, I updated the identity store access policies > access_name > identity
For the peripheral administration > bomb the profile in use affecting the privilege of privilege and default maximum value 15. Sthe shell profile name is "full_privilege".
Here is my little piece of config switch:-
AAA server Ganymede group + TAC_PLUS
the AUTH server name
RADIUS server AUTH
ipv4 10.10.21.251 address
key xxxxxxxx
AAA TAC_PLUS authentication connection group Ganymede + local
Group AAA authentication enable default TAC_PLUS no
TAC_PLUS AAA authorization exec group Ganymede + authenticated if
AAA authorization commands 15 TAC_PLUS group Ganymede + local
AAA authorization network TAC_PLUS group Ganymede + local
accounting AAA periodic update 1
exec accounting AAA TAC_PLUS start-stop group Ganymede +.
network accounting AAA TAC_PLUS start-stop group Ganymede +.
connect accounting AAA TAC_PLUS start-stop group Ganymede +.
Please advice, thank you
Noel
Hello
As you mentioned it works very well for internal users of ACS, can you check the Condition of permission you have to return the Privilege Level 15 for users?
For example, if the internal ID users store works fine then the Condition of authorization points to an internal attribute ACS State as identity groups.
During the change of AD then the identity rule group could not be mapped, therefore, to go to the default rule denied access.
Please check for appropriate access authorization rules and confirm that a rule is valid is created for users of the AD as well in order to return the lever appropriate privilege.
I hope this helps.
Kind regards.
-
How to refer to the primary key column of newly inserted rows of tabular form
Hello
I use APEX 4.2.0.00.27 with Oracle DB 11.2.0.3.0.
I work with a tabular presentation wizard-created for insert and update a table using the integrated SRM process (sequence 10). I'm trying to use a process of anonymous block of PL/SQL (sequence 30) to make another manipulation of table after the records were inserted or updated. The manual process is associated with my tabular form and I use the variables of name of column binding in my program block.
My (rsn_test) table has 3 columns: test_id (number), test_nbr (number), test_id2 (number). Test_id column is identified as the primary key and the type of the source already exists a sequence rsn_test_seq. Column test_id2 gets its default value 0 to a hidden page element.
I would use my manual process for updating the value of the test_id2 column. If it's 0 then I want to put the value of the column test_id. If it is any other value, then it must remain at this value. My logic works very well for an existing line, but I'm running into a problem with the newly added lines. The new lines get inserted, but the test_id2 column remains the default value 0. I can tell the debugger that the SRM process is triggered first and inserts the line, then my manual dealing with fires. The problem seems to be that the connection variable: TEST_ID for the primary key column remains NULL after insertion. I don't know how to get the value of the column test_id of my newly created line to use in my PL/SQL block to my update.
Process of PL/SQL:
DECLARE BEGIN :P7_SHOW := NULL; :P7_SHOW := NVL(:TEST_ID2,555) || ' and ' || NVL(:TEST_ID,787) || ' and ' || NVL(:TEST_NBR,9999); IF :TEST_ID2 = 0 AND :TEST_ID IS NOT NULL THEN UPDATE rsn_test SET test_id2 = :TEST_ID WHERE test_id = :TEST_ID; ELSE :TEST_ID2 := :TEST_ID2; END IF; END;
Excerpt from the debugger:
0.01625 0.00010 Processes - point: ON_SUBMIT_BEFORE_COMPUTATION 0.01635 0.00008 Branch point: Before Computation 0.01643 0.00003 Process point: AFTER_SUBMIT 0.01646 0.00022 Tabs: Perform Branching for Tab Requests 0.01668 0.00008 Branch point: Before Validation 0.01676 0.00024 Validations: 0.01700 0.00135 Perform basic and predefined validations: 0.01835 0.00020 Perform custom validations: 0.01855 0.00049 ...Validation "TEST_NBR must be numeric" - Type: ITEM_IS_NUMERIC 0.01904 0.00007 ......Skip for row 1 because row hasn't changed 0.01911 0.00016 ......Skip for row 2 because row hasn't changed 0.01927 0.00012 ...Validation "TEST_ID2 must be numeric" - Type: ITEM_IS_NUMERIC 0.01939 0.00007 ......Skip for row 1 because row hasn't changed 0.01945 0.00018 ......Skip for row 2 because row hasn't changed 0.01964 0.00005 Branch point: Before Processing 0.01968 0.00004 Processes - point: AFTER_SUBMIT 0.01972 0.00588 ...Process "ApplyMRU" - Type: MULTI_ROW_UPDATE 0.02560 0.00154 ...Execute Statement: declare function x return varchar2 is begin begin for c1 in ( select "RSN_TEST_SEQ".nextval pk from sys.dual ) loop return c1.pk; end loop; end; return null; end; begin wwv_flow.g_value := x; end; 0.02714 0.00140 ......Row 3: insert into "APPPCSRSN"."RSN_TEST" ( "TEST_ID", "TEST_NBR", "TEST_ID2") values ( :b1, :b2, :b3) 0.02854 0.00011 ...Process "ApplyMRD" - Type: MULTI_ROW_DELETE 0.02865 0.00004 ......Skip because condition or authorization evaluates to FALSE 0.02869 0.00015 ...Process "Process Submit" - Type: PLSQL 0.02884 0.00007 ......Skip for row 1 because row hasn't changed 0.02891 0.00012 ......Skip for row 2 because row hasn't changed 0.02903 0.00012 ......Process row 3 0.02915 0.00429 ...Execute Statement: begin DECLARE BEGIN :P7_SHOW := NULL; :P7_SHOW := NVL(:TEST_ID2,555) || ' and ' || NVL(:TEST_ID,787) || ' and ' || NVL(:TEST_NBR,9999); IF :TEST_ID2 = 0 AND :TEST_ID IS NOT NULL THEN UPDATE rsn_test SET test_id2 = :TEST_NBR WHERE test_id = :TEST_ID; ELSE :TEST_ID2 := :TEST_ID2; END IF; END; end; 0.03344 0.00013 ...Session State: Saved Item "P7_SHOW" New Value="0 and 787 and 1300" 0.03356 0.00004 Branch point: After Processing 0.03360 0.00048 ...Evaluating Branch: "AFTER_PROCESSING" Type: REDIRECT_URL Button: (No Button Pressed) Condition: (Unconditional) 0.03407 0.00013 Redirecting to f?p=290:7:8717971109610:::::&success_msg=0%20row(s)%20updated%2C%201%20row(s)%20inserted.Success%2FEBD244168556408CBA714E3974918C09%2F 0.03420 0.00012 Stop APEX Engine detected 0.03432 0.00007 Stop APEX Engine detected 0.03439 - Final commit
Any suggestions?
I have run tests on
https://apex.Oracle.com/pls/apex/f?p=83488:1 demo/demo
to see your problem.
I have 2 solution for your problem.
I add trial NOT tabular just usual block of PL/SQLBEGIN I'm IN (SELECT TEST_ID FROM RSN_TEST WHERE TEST_ID2 = 0) LOOP UPDATE RSN_TEST SET test_id2 = TEST_ID WHERE test_id = i.TEST_ID; END LOOP; END; and works very well, you can see in the sample.
The other solution is to show new generated TEST_ID
Adding a sequence as a default value for a column in a table field
And to execute your procedure.
I get how is with the good luck of time.
By
-
ISE Cisco authorization with device OS
Hello
We want to allow access only to devices with Windows operating system. I tried to an allow rule with the condition "Session: Windows operating system device is equal to ' but it does not work. If I try to connect with a Windows 7 client, access is denied and the log shows "15039 rejected by authorization profile. What could be the problem?
We use the ISE with Version 1.1.3
Thank you
Marc
There is no problem with version 1.1.3 ISE, you are is later. Maybe the probes are not configured correctly.
Please check the help below link
-
Authorization of comments in ise 2.0
Hi all
I'll install 2.0 ise in one of the corporate network that has routed many branch, I have a few questions about the guest user permission policy.
If authorization profile is configured with dynamic ACLs where I can give details of identification vlan for guest users consider id vlan for guest users is different for each branch? How guest users will obtain the IP address of rite VLAN?
Hello
If the VLAN is different on each location, you can make local switching AP instead of central switching within the WLC. This mode is called Flexconnect.
In combination with ISE and Flexconnect CWA, you a few resources available on Cisco's Web site.
I here copy a link to a step by step config:
http://www.Cisco.com/c/en/us/support/docs/security/identity-services-Eng...
Hope this answer your question.
PS: Please do not forget to rate and score as good response if this solves your problem
-
Hi all
Can someone help me for ISE design approval users comments.
Requirement:
1. the various comments authorization need to user through ISE, each guest should have different access according to the requirement. Is this possible? If so, how do we achieve this? Base license is purchased.
Thank you
Kamlesh
Here you go:
http://www.Cisco.com/c/en/us/support/docs/wireless/5500-Series-Wireless-...
-Jousset
-
Authorization profile of ISE to grant limited access to wireless clients
Hello
I'm at the end sponsored building access as a guest for customers wireless in ISE running in software version 1.3.
I wonder if there is a way to keep the prompt on the vlan initial after a successful authentication and to grant Internet access only. I mean, I don't want to assign different VLANs and restrict its access by an ACL applied on the Vlan Interface Layer-3.
I could have done it of dACL, if the client connects through the wired network, but because wireless controller not accept DACL, I'm not aware of any way to do it without changing the vlan
Appreciate your idea.
Mike
Of course, simply create the ACL you wan't to use for your guests directly on your WLC and then reference the name of the ACL in your authorization profile in the option named 'Airespace ACL Name '.
Maybe you are looking for
-
How to unlock my touchpad, if I forgot the password
I need help in my hp touchpad webos because I forgot the password
-
I tried to uninstall the old and new Firefox versions and reinstall but get the same problem - multiple windows open with my home page. This slows down considerably. I can shut them down, but if I can go back to the homepage after browsing elsewhere,
-
7510 all-in-one: paper weight
I need to print on 80 lb. cover stock 212 gsm 10mil thick. The 7510 will support this? Thank you
-
Laptop of HP ENVY TS m7: keys brightness &; Graphics Card does not work
I've refreshed recently my PC in the last month, and after a recent update, my Windows computer has stopped responding to orders of brightness and is stuck at full intensity. In addition, it seems that a common measure of troubleshooting is to instal
-
I have an all-in-one C309a. I'm scanning with her all the time using PhotoImpact. Now when I scan and do a right-click on the scanned image, it shows the Web properties instead of just the properties. I don't know if the problem is in the scanner or