IPSec support

Here are the ordered product

2951 router
CISCO2951/K9 Cisco 2951 w/3 GE, 4 EHWIC, 3 DSP, 2 SM, CF 256 MB, 512 MB DRAM, IPB 2
S2951UK9 - 15201T UNIVERSAL IOS Cisco 2951 2
WIC-02:00-V2 2-port Analog Modem Interface Card 8
CAB - ACE Power cord AC (Europe), C13, FEC 7, 1.5 M 2
CAB-CONSOLE-USB Cable from the console 6 ft with Type USB A and mini-B 2
SRI-CCP-CD Cisco Config Professional on CD, CCP-Express on router Flash 2
PWR-2921-51-AC Power supply Cisco 2921/2951 2
MEM-2951-512 MB - DEF 512 MB DRAM (1 DIMM 512 MB) for Cisco 2951 SRI (default) 2
MEM - CF - 256 MB Compact Flash 256 MB for Cisco 1900, 2900, 3900 SRI 2
SL-29-IPB-K9 Basic IP for Cisco 2901-2951 license 2
CON-SNT-2951 SMARTNET Cisco 2951 w/3 GE 8X5XNBD 2

I'm confused if this will support IPSec or not because at one point, he said C2951UK9-1520IT that supports IPSec and on the other side he said SL-29-IBP-K9 which only supports basic configs.

A normal case would be something like

SL-19-IPB-K9 Basic IP for Cisco license 1900
SL-19-SEC-K9 License security for Cisco 1900

which means a base license and then added a license of security so that the work of crypto.

Hello Boy Communication

On older hardware (1800/2800 etc. and more) you need to select the software image containing the features that you need (e.g., advanced ip services) and you didn't need a license.

On the ISR G2 (1900/2900/3900), there is only a single ('universal') image that contains all the features, but some features (such as IPsec) are 'locked' and you need a permit to 'unlock'

So in your case the universal image (C2951UK9-1520IT) "supports" IPsec in the sense that the function is in the software, you don't need to order/download any other software image, however the IPsec have only be available if you enable a security licence (SL-29-SEC-K9 or SL-29-SEC-K9 = or L-SL-29-SEC-K9 =)

(Note that at the end you have cited references for 1900 licenses, not the 2900).

CFR.

http://www.Cisco.com/en/us/prod/collateral/routers/ps10616/white_paper_c11_556985.html

HTH

Herbert

Tags: Cisco Security

Similar Questions

  • Pix IPSec support

    Hello

    I'm trying to set up a tunnel to PIX-501 6.3 version. It's an old device that needs to be replaced soon, but unfortunately we have a tunnel now...

    I used this document as reference (6211): http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094761.shtml

    The remote end is a sonicwall.

    The problem seems to be that the pix never sees interesting traffic for the tunnel and never tries to establish a connection. I activated the ipsec encryption and debugs isakmp crypto, but no data is never displayed, even when you try to access a device on the remote side of the tunnel!

    Someone tried to implement this feature with some tunnels in the past, but never succeeded, so I think it can stay commands in the running-config causing problems...

    I'm grilled at this stage, so any help would be greatly appreciated. I will provide all necessary information as needed.

    Thank you very much.

    The issue is your inside interface/subnet has been configured as a 16 network and it duplicates the remote network.

    The inside interface: 172.21.25.254 (mask: 255.255.0.0), and network remote 172.21.19.0/24 also falls under the same subnet.

    Instead of routing the packet, inside host will try to proxyarp for the destination that they think they are in the same subnet, so does not.

    Try changing the inside interface with 24 subnet if you want to keep the same IP address and also change the mask of 24 inside your host.

    Otherwise, you need to configure NATing to a completely different subnet to the remote 172.21.19.0/24.

  • IPSEC tunnel and Routing Support protocols

    Hello world

    I read that IPSEC does not support routing with VPN's Site to the other protocols because both are Layer4.

    This means that if Site A must reach the B Site over a WAN link, we use static IP on the Site A and Site B router?

    In my lab at home I config Site to Site VPN systems and they work correctly using OSPF does that mean that IPSEC supports the routing protocol?

    IF someone can explain this please?

    OSPF config one side

    router ospf 1

    3.4.4.4 router ID

    Log-adjacency-changes

    area 10-link virtual 10.4.4.1

    passive-interface Vlan10

    passive-interface Vlan20

    3.4.4.4 to network 0.0.0.0 area 0

    network 192.168.4.0 0.0.0.255 area 10

    network 192.168.5.0 0.0.0.255 area 0

    network 192.168.10.0 0.0.0.255 area 0

    network 192.168.20.0 0.0.0.255 area 0

    network 192.168.30.0 0.0.0.255 area 0

    network 192.168.98.0 0.0.0.255 area 0

    network 192.168.99.0 0.0.0.255 area 0

    3550SMIA #sh ip route

    Code: C - connected, S - static, mobile R - RIP, M-, B - BGP

    D - EIGRP, OSPF, IA - external EIGRP, O - EX - OSPF inter zone

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    E1 - OSPF external type 1, E2 - external OSPF of type 2

    i - IS - Su - summary IS, L1 - IS - IS level 1, L2 - IS level - 2

    -IS inter area, * - candidate failure, U - static route by user

    o - ODR, P - periodic downloaded route static

    Gateway of last resort is 192.168.5.3 to network 0.0.0.0

    192.168.12.0/24 [13/110] through 192.168.5.3, 3d17h, FastEthernet0/11

    100.0.0.0/32 is divided into subnets, subnets 1

    O 100.100.100.100 [110/3] through 192.168.5.3, 3d17h, FastEthernet0/11

    3.0.0.0/8 is variably divided into subnets, 2 subnets, 2 masks

    O 3.3.3.3/32 [110/2] via 192.168.5.3, 3d17h, FastEthernet0/11

    C 3.4.4.0/24 is directly connected, Loopback0

    C 192.168.30.0/24 is directly connected, Vlan30

    64.0.0.0/32 is divided into subnets, subnets 1

    O E2 64.59.135.150 [110/300] through 192.168.5.3, 1d09h, FastEthernet0/11

    4.0.0.0/32 is divided into subnets, subnets 1

    O 4.4.4.4 [110/2] via 192.168.5.3, 3d17h, FastEthernet0/11

    C 192.168.10.0/24 is directly connected, Vlan10

    172.31.0.0/24 is divided into subnets, 4 subnets

    O E2 172.31.3.0 [110/300] through 192.168.5.3, 3d17h, FastEthernet0/11

    O E2 172.31.2.0 [110/300] through 192.168.5.3, 3d17h, FastEthernet0/11

    O E2 172.31.1.0 [110/300] through 192.168.5.3, 3d17h, FastEthernet0/11

    O E2 172.31.0.0 [110/300] through 192.168.5.3, 3d17h, FastEthernet0/11

    O 192.168.11.0/24 [110/3] through 192.168.5.3, 3d17h, FastEthernet0/11

    O 192.168.98.0/24 [110/2] via 192.168.99.1, 3d17h, FastEthernet0/8

    C 192.168.99.0/24 is directly connected, FastEthernet0/8

    192.168.20.0/24 C is directly connected, Vlan20

    192.168.5.0/31 is divided into subnets, subnets 1

    C 192.168.5.2 is directly connected, FastEthernet0/11

    C 10.0.0.0/8 is directly connected, Tunnel0

    192.168.6.0/31 is divided into subnets, subnets 1

    O 192.168.6.2 [110/2] via 192.168.5.3, 3d17h, FastEthernet0/11

    192.168.1.0/24 [13/110] through 192.168.5.3, 3d17h, FastEthernet0/11

    O * E2 0.0.0.0/0 [110/1] via 192.168.5.3, 1d09h, FastEthernet0/11

    B side Config

    Side A

    router ospf 1

    Log-adjacency-changes

    network 192.168.97.0 0.0.0.255 area 0

    network 192.168.98.0 0.0.0.255 area 0

    network 192.168.99.0 0.0.0.255 area 0

    1811w # sh ip route

    Code: C - connected, S - static, mobile R - RIP, M-, B - BGP

    D - EIGRP, OSPF, IA - external EIGRP, O - EX - OSPF inter zone

    N1 - type external OSPF NSSA 1, N2 - type external OSPF NSSA 2

    E1 - OSPF external type 1, E2 - external OSPF of type 2

    i - IS - Su - summary IS, L1 - IS - IS level 1, L2 - IS level - 2

    -IS inter area, * - candidate failure, U - static route by user

    o - ODR, P - periodic downloaded route static

    Gateway of last resort is 192.168.99.2 to network 0.0.0.0

    192.168.12.0/24 [110/14] through 192.168.99.2, 3d17h, FastEthernet0

    100.0.0.0/32 is divided into subnets, subnets 1

    O 100.100.100.100 [110/4] through 192.168.99.2, 3d17h, FastEthernet0

    3.0.0.0/32 is divided into subnets, 2 subnets

    O 3.3.3.3 [110/3] through 192.168.99.2, 3d17h, FastEthernet0

    O 3.4.4.4 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    O 192.168.30.0/24 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    64.0.0.0/32 is divided into subnets, subnets 1

    O E2 64.59.135.150 [110/300] through 192.168.99.2, 1d09h, FastEthernet0

    4.0.0.0/32 is divided into subnets, subnets 1

    O 4.4.4.4 [110/3] through 192.168.99.2, 3d17h, FastEthernet0

    O 192.168.10.0/24 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    172.31.0.0/24 is divided into subnets, 4 subnets

    O E2 172.31.3.0 [110/300] through 192.168.99.2, 3d17h, FastEthernet0

    O E2 172.31.2.0 [110/300] through 192.168.99.2, 3d17h, FastEthernet0

    O E2 172.31.1.0 [110/300] through 192.168.99.2, 3d17h, FastEthernet0

    O E2 172.31.0.0 [110/300] through 192.168.99.2, 3d17h, FastEthernet0

    O 192.168.11.0/24 [110/4] through 192.168.99.2, 3d17h, FastEthernet0

    C 192.168.98.0/24 is directly connected, BVI98

    C 192.168.99.0/24 is directly connected, FastEthernet0

    O 192.168.20.0/24 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    192.168.5.0/31 is divided into subnets, subnets 1

    O 192.168.5.2 [110/2] via 192.168.99.2, 3d17h, FastEthernet0

    192.168.6.0/31 is divided into subnets, subnets 1

    O 192.168.6.2 [110/3] through 192.168.99.2, 3d17h, FastEthernet0

    192.168.1.0/24 [110/14] through 192.168.99.2, 3d17h, FastEthernet0

    O * E2 0.0.0.0/0 [110/1] via 192.168.99.2, 1d09h, FastEthernet0

    Thank you

    Mahesh

    Mahesh.

    Indeed, solution based purely crypto-card are not compatible with a routing protocol.  Crypto card however is the legacy config we support on IOS. The best practice is to use the protection of tunnel. Any routing protocol would work then.

    for example

    https://learningnetwork.Cisco.com/docs/doc-2457

    It's the best solution we currenty have

  • If I config ISAKMP (phase 1) duration shorter than the life expectancy of IPsec (phase 2). What's going to happen.

    Since I couldn't find any document from Cisco (Cisco produces only that, the longer life ISAKMP, safer) of the directive.

    I was wondering if I config life ISAKMP (phase 1) shorter than the life expectancy of IPsec (phase 2). What happens when I still have the traffic through the VPN, the ISAKMP his timeout reachs tunnel. Phase 2 would also got laid off, and turn all the negotiation of Phase 1 VPN again?

    Any help will be appreciated.

    -Angela

    Angela:

    We probably need to consider the context of your use of the term "session".

    If you had to define an ACL crypto that consisted of a single access control entry (example: 192.168.1.0 ip allow 0.0.0.255 192.168.2.0 0.0.0.255), which would be generally * lead to the creation of an ISAKMP security association unique and two IPSec security associations. Lets call it a "session encryption.

    As you said, the implementation of the session "encryption" was triggered by a "session" (for example: TCP) between two hosts (each behind their respective ends of the tunnel). Additional meetings (for example: TCP) between different hosts on two sites, do not need other IPSec security associations. Security associations previously established IPSec supports all traffic defined by the ACE in the ACL crypto.

    For each extra ACE in your ACL crypto, you would see the creation of a pair of IPSec security associations (assuming traffic defined by the ACE triggers it) extra.

    If you need to set the layer 4 criteria (e.g.: TCP port 80) in an ACL crypto, that would be horrible. IPSec security associations are negotiated for each combination of source/target port used by a host. For example: A single host visiting a single web site (by the crypto tunnel), would open in general multiple TCP sessions (each with a different source port), and IPSec security associations are negotiated for each TCP session. This would quickly deplete resources on the cryptographic endpoints.

    We generally use P2P GRE or love with IPSec to swap info dynamic routing between sites. Because the traffic between sites is encapsulated in GRE, only a single proxy is needed.

    edg01 #show crypto ipsec his

    Interface: Tunnel0
    Tag crypto map: addr Tunnel0-head-0, local

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (/ 255.255.255.255/47/0)
    Remote ident (addr, mask, prot, port): (/ 255.255.255.255/47/0)

    In this case, a single proxy is used. IP addresses are external physical IP addresses of crypto tunnel endpoints. Mode of transportation (where the 255.255.255.255 masks). The '47' is the GRE protocol.

    * Note: Sometimes, each cryptographic peer begins negotiations with the other, causing two bidirectional redundant ISAKMP SAs.

    Best regards

    Mike

  • IPSEC and routing protocols

    Hello world

    I read that IPSEC does not support routing with VPN's Site to the other protocols because both are Layer4.

    This means that if Site A must reach the B Site over a WAN link, we use static IP on the Site A and Site B router?

    In my lab at home I config Site to Site VPN systems and they work correctly using OSPF does that mean that IPSEC supports the routing protocol?

    IF someone can explain this please?

    Thank you

    Mahesh

    There is no problem with the routing on IPsec protocol, there are limits to some implmentations.

    Our old (strives, but still popular) crypto maps where such implemtation.

    What you need to remember, is that to make routing protocols (more) on IPsec, you must ensure that multicast is allowed through, i.e. your traffic selectors should be postponed. Another thing is that some of these protocols do a check if Hellos were recived leave a subnet connected etc etc. Of course, this isn't a problem with BGP (or most of the problems can be overcome easily).

    New implementations - side Cisco using protections of tunnel - we can run protcols routing on IPsec with very few restrictions.

    M.

  • Event log issues...

    So im going through my event log to try to understand a blue screen I got recently, and I had a few questions about things I stumbled on in the case log...

    The first is what is IPSec and the IKE and AuthIP entered services modules strategy service agent?

    and on the other hand...

    "Security," it lists these "Audit success".

    In detail, it lists the user as "N/A"? Should I be worried?

    Hello

    Strategy IPSec IKE and AuthIP are all connected and used for internet security and computer security peer and authentication.
    The IKEEXT service hosts the Internet Key Exchange (IKE) and Authenticated Internet Protocol () AuthIP modules overlay. These input modules are used for authentication and key exchange in Internet Protocol security (IPsec). Stopping or disabling the IKEEXT service will disable IKE and AuthIP key with peer computers Exchange. IPsec is typically configured to use IKE and AuthIP; Therefore, stopping or disabling the IKEEXT service might cause IPsec to fail and compromise the security of the system. It is strongly recommended that you have the IKEEXT service operation.
    Internet Protocol security (IPsec) supports to the peer network level authentication, data origin authentication, data integrity, confidentiality (encryption) data and anti-replay protection.  This service apply IPsec policies created through the IP Security Policies snap-in or the command line tool "netsh ipsec '.  If you stop this service, you may experience network connectivity issues if your policy requires that connections use IPsec.  In addition, remote management of the firewall Windows is not available when the service is stopped.
    These two paragraphs were taken from descriptions of services of each of them.
    The system of audits to ensure that they work very well.
    You have run scans with your anti-virus or MSE?
    I hope this helps.
    Jim
  • 2821 software - AES 256

    Hello

    I'm trying to determine if this router is the AES 256 encryption.

    CISCO2821-HSEC/K9 2821 Bundle w/AIM-VPN/SSL-2, Adv. IP Serv, SSL 10 S28NAISK9 - 12409T Cisco 2800 ADVANCED IP SERVICES 1

    AIM-VPN/SSL-2 a / 3DES / AES / SSL VPN encryption/Compression 1

    Since the Locator functionality of software that I can't determine the level of AES only making AES, can anyone help.

    John,

    AES is part of the Ipsec standard, IOS Ipsec support K9 image should have AES that automatically supports encryption of bit 128,192,256 algorithm.

    To veryfy on router simply do:

    Router (config) #crypto isakmp policy 1

    Router (config-isakmp) #encryption aes?

    Here is a link, it is you want to play as a reference.

    http://www.Cisco.com/en/us/Partner/Tech/tk583/TK372/technologies_tech_note09186a0080094203.shtml#intro

    Rgds

    -Jorge

  • PIX 501 VPN

    Hi, I just got my PIX configured based on the clear capability statement, I got one of you this morning. Now, I'm trying to set up the VPN, I looked at the Cisco site (http://cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html#anchor14) but could not understand that we need to follow. Could you please send me the instruction or the link to configure vpn? Also, I don't have the vpn client to test my vpn, how what to do? As you can understand my question, I am new to cisco gear... Thank you.

    Hello

    I'm guessing that you need one of these two virtual private networks.

    -Remote access VPN: where remote allows the Cisco VPN client users to access the resources of the company

    -Site to site VPN: where two systems with IPSEC support establish a VPN tunnel, allowing the internal LAN from different termination points (offices) communicate.

    You can find these two examples on the url you gave.

    If the remote access, I'd watch

    http://Cisco.com/en/us/products/ps6120/products_configuration_example09186a0080702992.shtml

    And then also look at how to set up the split tunneling, then the home user can access the resources of the business AND Internet.

    For the site to site VPN, it depends if your device is a PIX / ASA or a router.

    It will be useful,

    Paulo

  • Unable to browse the internet for the VPN (ASA5505 running 8.3)

    We have improved our ASA 5505 to 8.3 firmware image (2) and we have a working VPN configuration (customer VPN in Windows can connect and browse the network of the company as well as their local networks [split tunnel seems to work in this regard]).  However, some time connected they are unable to also browse the internet.  In our configuration of 8.2 (1) we have done 'something' to allow remote users to browse the internet at the same time, but apparently this is not transferred in the upgrade.

    I'm sure it's a simple nat our order routing, but it can't know.  I've gotta hit the road now but will post our config this afternoon if no one knows the "secret" to do.  Ideally, internet traffic to remote users out of their internet connection and not be achieved through the office.  We understand the risks associated with it.

    Hi Scott,.

    To the best of my knowledge, I don't think that l2tp over IPSec supports split tunneling. If you use the Cisco VPN client, you should be able to get this working.

    What we can do in this case is to set up turn on the SAA for these vpn clients. Please add the commands to run below:

    permit same-security-traffic intra-interface

    network of the NETWORK_OBJ_10.0.0.0_27 object

    dynamic NAT interface (outdoors, outdoor)

    Let me know if it helps!

    See you soon,.

    Assia

  • CISCO ADAPTIVE SECURITY APPLIANCES ASA 5500 SERIES

    Hello

    I'm doing a comparison of the above with other offers from different providers.

    Can someone tell me if the firewall feature of this device actually runs the full version of PIX OS 7.0.

    Flipping through the manual, it does not mention PPTP with MPPE or L2TP with IPSEC support while I'm reasonably sure these two would be supported in a pix running OS 7.0

    Thank you

    Paddy

    The PIX and ASA are running the same code, no difference. The reason why you don't see PPTP and L2TP/IPSec mentioned is that these functions have been removed from code of v7.0 PIX / ASA, mainly because they used very little and they need space for the more 50 new features that have been added. It is detailed here:

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/PIX/pix_sw/v_70/70_rn/pix_70rn.htm#wp119169

    The ASA actually gives you some extra with 7.0 features that works on a PIX is not, like WebVPN (SSL VPN), load balancing VPN and support the onboard SSM (IDS/IPS).

  • Tunnels of router that support s multiple VPN IPsec AND SSL VPN

    I have a main office and an office, each with a RVL200 connected via the IPSec VPN tunnel. We grow faster than we thought and add 2 more branches. Is there a router that is similar to the RVL200 can I put in my main office in support of multiple IPSec tunnels connected to RVL200 in branches, but also keep the SSL VPN?

    It seems that the Cisco ASA 5505 will do.

  • Is availble for IPsec VPN FOS 6.3 support stateful failover

    Is availble for IPsec VPN FOS 6.3 support stateful failover

    SAJ

    Hello Saj,

    Unfortunately not... stateful failover replica information such as:

    Table of connection TCP, udp xlate table ports, h.323, PAT port allocation table...

    they replicate data such as:

    user authentication (uauth) table

    Table ISAKMP / IPSEC SA

    ARP table

    Routing information

    Therefore, in the case where the main breaks down, the IPSEC vpn will be reformed for the failover... Meanwhile, the user will not be able to access the applications...

    I hope this helps... all the best... the rate of responses if deemed useful...

    REDA

  • L2TP over IPSEC VPN is supported in Cisco SRP 521w?

    I now try to configure a Cisco Small Business Pro SRP 521w for a branch office router, I try to get the router to connect to a VPN L2TP server inside my data center, but it seems to me that the client VPN L2TP function is not supported within the SRP 521w router.

    Can Cisco implementing in the future in the firmware for the router in SRP 521w client VPN L2TP?

    Hello

    This is correct, without L2TP over IPSec tunnels.

    (L2TP only supported on the primary Ethernet WAN interfaces).

    Kind regards

    Andy

  • HW IKEV2/IPSEC algorithms supported in ISR G2 and G3 (43xx) new

    Hello

    I'm updating crypto for all our vpn routers.

    I'm picking the most documented algorithms in the NextGen encryption Guide

    http://www.Cisco.com/Web/about/security/intelligence/nextgen_crypto.html

    I would use the curve elliptical vs RSA when possible

    We use ASR1002x as hubs of line head and a mixture of 881, 891, 891F, 3925 (with the ISM code), 3945E and 4331

    The guide above warns some routers cannot handle some of the algorithms in HW, but provides no details.

    Does anyone have info on the algorithms to avoid on the 891 ISRG2, 3925, 3945E?

    My current config on the 891 s is

    proposal of ikev2 crypto flaw
    encryption aes-cbc-256
    integrity sha512
    Group 14

    rypto ikev2 profile test1

    match fvrf INET
    match certificate map1
    identity local dn
    sharing front of remote authentication
    authentication remote ecdsa-sig
    authentication local ecdsa-sig
    door-key local xxxx

    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac TRANSFORM1

    Crypto ipsec profile xxxxxx
    game of transformation-TRANSFORM1
    group14 Set pfs

    Thanks in advance

    Wes,

    Have a look here:

    http://www.Cisco.com/c/en/us/support/docs/security-VPN/IPSec-negotiation...

    or search the support suite-B.

    M.

  • PIX support IPsec over UDP or TCP

    Series 500 firewall Cisco PIX support IPsec over UDP or TCP so that the secure tunnel VPN IPsec can go through the PAT and NAT. If so, how to configure it? THX

    Concerning

    Jeffrey

    Hi Jeff,

    The tentative date is around end of March 2003.

    Kind regards

    Arul

Maybe you are looking for

  • Satellite Pro A100 - PSAAAE CPU upgrade

    Hi Toshiba, I have an old * Satellite Pro A100 * _PSAAAE-type_ and I would like to upgrade the processor. I have seen that is 479, and I found that there are the Core 2 Duo on this plug. The 945GM chipset supports Core 2 Duo, but I don't know if my l

  • bad customer service

  • Time Capsule of does not save?

    I have a problem of repetition with my TC do not back up? I recently moved house and thought it would be just a matter of "reconnect"? Nope; I did all that, exactly as it was, but not backup since. Been away for Christmas and I have come back to sort

  • I need to change the motherboard in my laptop. How to reactivate XP and Office?

    I need to change the motherboard on a Dell laptop because of the infamous video problem Nvidia. The laptop has XP Professional, Office 2003, and all my other programs on it. After I have change the motherboard, I guess I'll have to reactivate XP and

  • problem with photosmart 7280

    I have a photosmart 7280 I used with windows for a year, I just got an imac with osx 10.5.6 I installed it and everything works except print I can print a test page but of other prints just stop in the queue, I uninstalled and reinstalled, I have res