L2l tunnel with 2 other ASA5505 IOS
Anyone know if it is possible to construct a tunnel using a wizzard software asdm between two tunnel asa if the ASA two run two other IOS (7,22 and 8.0.4?)
Yes it is possible.
Hope that helps.
Tags: Cisco Security
Similar Questions
-
2 separated on same ASA VPN tunnels can communicate with each other
Here's the scenario that I have a VPN tunnel with one of my remote locations. I also have a VPN Tunnel with a provider that supports the equipment for my organization. I need to have my supplier able to communicate with equipment that live in my other VPN tunnel. The two Tunnels are on the same ASA5540.
1 is it Possible?
2 How set it up?
Thank you
Follow this link for example. Enhanced spoke-to-spoke VPN, allows the two tunnels ending to your asa5540 to connect, using parameter permit intra-interface with configuration accless-list permits traffic of each endpoint of the tunnel.
-
ASA - Tunnel all traffic, allow rays to communicate with each other
Well, I hope someone can help me with this headache! Switching to employ a PIX and VPN 3005 concentrator Office at home in an ASA5510 for firewall and IPSEC tunnels. It is pretty much a
- VPN on a stick, multiple rays.
- All traffic sent by tunnel
- Internet access through main office (using the web filter) of
- VOIP to VOIP between rays
- All departments are using the clients VPN 3005 HW or ASA 5505 s
HEADQUARTERS: 10.0.0.0/24
Speaks 1: 192.168.11.0 / 24
Speaks 2: 192.168.12.0 / 24
Speaks 3: 192.168.13.0 / 24
-continues to 192.168.31.0 / 24
Spoke with the current configuration, 1 can communicate with all the resources in the home, office and Internet integrated properly checked by a tracert. However, the rays cannot communicate with each other. This is required for VOIP traffic, when all TALK TALK calls are made (sites).
Logging information when talk of talks initiated icmp:
- No group of translation found for icmp src, dst outside: 192.168.31.1 inside: 192.168.11.1 (type 8, code 0)
If I remove the nat (outside) 1 192.168.0.0 255.255.00 - rays will begin to respond to each other, but then the rays cannot tunnel through the Home Office Internet traffic. My brain is so scrambled after the cramming of VPN configurations for these days, so I hope someone has an idea. I've always used concentrators 3005, so it's a little different! In the search for documentation for this configuration, I was surprised that this isn't a most common topology. It seems that this article would (http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805734ae.shtml), but there is no rays! In any case, I'm sure this has something to do with NAT rules and perhaps who need access for traffic list speaks of talking.
=============================================
ASA Version 8.2 (1)
!
hostname asa5510interface Ethernet0/0
Speed 100
full duplex
nameif outside
security-level 0
IP address 97.65.x.x 255.255.255.224interface Ethernet0/1
Speed 100
full duplex
nameif inside
security-level 100
IP 10.0.0.40 255.255.0.0permit same-security-traffic inter-interface
permit same-security-traffic intra-interface
the DM_INLINE_NETWORK_1 object-group network
object-network 10.0.0.0 255.255.0.0object-network 192.168.0.0 255.255.0.0
access-list sheep extended ip 10.0.0.0 allow 255.255.0.0 192.168.0.0 255.255.0.0
Allow Access-list extended wccp servers ip host 10.0.0.83 a
Redirect traffic extended access-list deny ip any object-group DM_INLINE_NETWORK_1
Redirect traffic scope permitted any one ip access-list
Global 1 interface (outside)
NAT (outside) 1 192.168.0.0 255.255.0.0
NAT (inside) 0 access-list sheep
NAT (inside) 1 10.0.0.0 255.255.0.0Route outside 0.0.0.0 0.0.0.0 97.65.x.x 1
Route inside 192.168.0.0 255.255.255.0 10.0.0.1 1
Route inside 192.168.2.0 255.255.255.0 10.0.0.1 1
Route inside 192.168.3.0 255.255.255.0 10.0.0.1 1Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
Crypto ipsec df - bit clear-df outdoorsCrypto-map dynamic dynmap 1 transform-set RIGHT
map mymap 65535-isakmp ipsec crypto dynamic dynmap
mymap outside crypto map interface
crypto isakmp identity address
crypto ISAKMP allow outside
crypto ISAKMP policy 5
preshared authentication
3des encryption
sha hash
Group 2
life 86400crypto ISAKMP policy 10
preshared authentication
3des encryption
md5 hash
Group 2
life 86400crypto ISAKMP ipsec-over-tcp port 10000
management-access inside
a basic threat threat detection
no statistical access list - a threat detection
no statistical threat detection tcp-interceptionWCCP web cache redirect-list Redirect-traffic group-list password xxxxxxx wccp-servers
WCCP 90 redirect-list traffic Redirect wccp servers group-list password xxxxxxxWebVPN
internal MJHIvpn group strategy
attributes of Group Policy MJHIvpn
value of server WINS 10.0.10.1 10.0.10.2
value of 10.0.10.1 DNS server 10.0.10.2
allow password-storage
Split-tunnel-policy tunnelall
mjhi.local value by default-field
allow to NEMusername field-3002 SjfS1Pq2xZGxHicx encrypted password
attributes of username field-3002
VPN-access-hour no
VPN - 250 simultaneous connections
VPN-idle-timeout no
VPN-session-timeout no
Protocol-tunnel-VPN IPSec
allow password-storage
type of remote access serviceremote access to field tunnel-group type
General-field tunnel-group attributes
Group Policy - by default-MJHIvpnIPSec-attributes of tunnel-group field
pre-shared-key *.class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
inspect the they
inspect the icmp
!
global service-policy global_policyHello Ala,
In Act got to be with the Nat configuration.
So basically you want to tunnel the traffic on the rays to communicate with each other.
OK, it would be with a nat 0 with the access list with the corresponding traffic outside.
Also on the crypto ACL for each site configuration, you must add an entry for the traffic of other offices.
I hope that I have explained myself.
Have a good
Julio
Note all useful posts!
-
Making the NAT for VPN through L2L tunnel clients
Hi.I has the following situation in my network. We need for users who log on our site with the VPN clients to connect to another site via a tunnel L2L. The problem is that I need NAT addresses from the pool of VPN client in another beach before going on the L2L tunnel because on the other side, we have duplication of networks.
I tried to do NAT with little success as follows:
ACL for pool NAT of VPN:
Extended list ip 192.168.253.0 access TEST allow 255.255.255.0 192.168.0.0 255.255.255.0
Extended list ip 192.168.253.0 access TEST allow 255.255.255.0 192.168.5.0 255.255.255.0
NAT:
Global 172.20.105.1 - 172.20.105.254 15 (outdoor)
NAT (inside) 15 TEST access-list
CRYPTO ACL:
allowed ro access list extended LAN ip 255.255.0.0 192.168.0.0 255.255.255.0
allowed ro access list extended LAN ip 255.255.0.0 192.168.5.0 255.255.255.0
IP 172.20.105.0 RO allow extended access list 255.255.255.0 192.168.0.0 255.255.255.0
IP 172.20.105.0 RO allow extended access list 255.255.255.0 192.168.5.0 255.255.255.0
permit same-security-traffic intra-interface
Am I missing something here? Something like this is possible at all?
Thanks in advance for any help.
We use the ASA 5510 with software version 8.0 (3) 6.
You need nat to the outside, not the inside.
NAT (outside) 15 TEST access-list
-
I get the error message on debugging ipsec-l2l tunnel
Hello
Can someone help me understand the debug message?
I get the error message on debugging ipsec-l2l tunnelI tried to configure an ASA5520 with an ipsec-l2l to ios router 1721
= 1721 router =.
Cisco 1721 (flash: c1700-k9o3sy7 - mz.123 - 2.XC2.bin)
80.89.47.102 outside
inside 10.100.110.1 255.255.255.0Debug crypto ipsec
Debug crypto ISAKMP-config-
crypto ISAKMP policy 1
BA 3des
md5 hash
preshared authentication
Group 2
0 1234567890 128.39.189.10 crypto isakmp key address
!
!
Crypto ipsec transform-set esp-3des pix-series
!
ASA 10 ipsec-isakmp crypto map
defined by peer 128.39.189.10
transform-set pix - Set
match address 101
!
!
interface FastEthernet0Outside-interface description
IP 80.89.47.102 255.255.255.252
NAT outside IP
card crypto asa
!
interface Vlan10
Inside description
IP 10.100.110.1 255.255.255.0
IP nat inside!
!
IP nat inside source overload map route interface FastEthernet0 sheep
!
access-list 101 permit ip 10.100.110.0 0.0.0.255 10.100.4.0 0.0.3.255
!
access-list 110 deny ip 10.100.110.0 0.0.0.255 10.100.4.0 0.0.3.255
access-list 110 permit ip 10.100.110.0 0.0.0.255 any
!
sheep allowed 10 route map
corresponds to the IP 110
!= Config ASA =.
Cisco 5520 ASA Version 8.2 (1)
128.39.189.10 outside
inside 10.100.4.255 255.255.252.0Debug crypto ipsec
Debug crypto ISAKMP-Config-
!
Allow Access-list extended sheep 255.255.252.0 IP 10.100.4.0 10.100.110.0 255.255.255.0
!
access extensive list ip 10.100.4.0 outside110 allow 255.255.252.0 10.100.110.0 255.255.255.0
!Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
86400 seconds, duration of life crypto ipsec security association
Crypto ipsec kilobytes of life - safety 4608000 association
card crypto outside_map 11 match address outside110
peer set card crypto outside_map 11 80.89.47.102
card crypto outside_map 11 game of transformation-ESP-3DES-MD5
outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
md5 hash
Group 2
life 86400!
attributes of Group Policy DfltGrpPolicy
VPN-idle-timeout no
Protocol-tunnel-VPN IPSec!
tunnel-group 80.89.47.102 type ipsec-l2l
IPSec-attributes tunnel-group 80.89.47.102
pre-shared key 1234567890Concerning
TorYou have a transformation defined on the SAA named ESP-3DES-MD5? Your crypto card refers to that but I don't see it listed in the config you have posted. I don't have much experience with routers, but is MD5 hashing algoritm (and why it is not)?
James
-
Dynamic L2L Tunnel - the Tunnel is up, will not pass the LAN traffic
Hello everyone. I am repurposing an ASA for my business at a remote site and must use a dynamic Configuration of L2L with Split tunneling active. We used these in the past and they work a lot, and I've referenced Cisco official documentation for the implementation. Currently, I am having a problem where I am unable to pass traffic on the local remote network over the VPN tunnel (it does even not raise the tunnel of form). However, if I run the following command in the ASA remote:
Ping inside the 192.168.9.1
I receive the ICMP responses. In addition, this traffic causes the VPN Tunnel to be created as indicated by show ISA SA:
1 peer IKE: xx.xx.xx.xx
Type: L2L role: initiator
Generate a new key: no State: MM_ACTIVE
Here is the IP addressing scheme:
Network remotely (with the ASA problem): 192.168.12.0/24
Basic network (Hub): 192.168.9.0/24
Other rays: 192.168.0.0/16
Config:
ASA Version 8.2 (1)
!
hostname xxxxxxxxx
domain xxxxxxxxxxx.local
activate the xxxxxxxx password
passwd xxxxxxxxx
names of
!
interface Vlan1
nameif inside
security-level 100
192.168.12.1 IP address 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
IP address dhcp setroute
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passive FTP mode
clock timezone CST - 6
clock to summer time recurring CDT
DNS server-group DefaultDNS
domain xxxxxxxx.local
permit same-security-traffic intra-interface
to_hq to access extended list ip 192.168.12.0 allow 255.255.255.0 192.168.0.0 255.255.0.0
inside_nat0_outbound to access extended list ip 192.168.12.0 allow 255.255.255.0 192.168.0.0 255.255.0.0
pager lines 24
Within 1500 MTU
Outside 1500 MTU
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 1 0.0.0.0 0.0.0.0
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
Enable http server
http 192.168.0.0 255.255.0.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
card crypto outside_map 10 correspondence address to_hq
crypto outside_map 10 card game CORE peers. ASA. WAN. INTELLECTUAL PROPERTY
outside_map crypto 10 card value transform-set ESP-3DES-SHA
outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
crypto ISAKMP policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet 192.168.0.0 255.255.0.0 inside
Telnet timeout 5
SSH timeout 5
Console timeout 0
management-access inside
dhcpd 192.168.9.2 dns 208.67.222.222
!
dhcpd address 192.168.12.101 - 192.168.12.131 inside
rental contract interface 86400 dhcpd inside
dhcpd xxxxxxxxx.local area inside interface
dhcpd ip interface 192.168.9.50 option 66 inside
dhcpd allow inside
!a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
tunnel-group basis. ASA. WAN. Type of IP ipsec-l2l
tunnel-group basis. ASA. WAN. IPSec-attributes of intellectual property
pre-shared key xxxxxxxxxxxx
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
inspect the icmp
!
global service-policy global_policy
context of prompt hostnameOnce the tunnel is in place, LAN to the Remote Site traffic won't pass through the VPN Tunnel any upward. On the side of ASA Core, I was able to Telnet in the ASA distance very well, but could not ping the Remote Access Point.
Someone at - it a glimpse of my problem?
Hello
Add:
NAT (inside) 0-list of access inside_nat0_outbound
-
Hi all!
I have a question about L2L VPN and NAT.
Can I set up the VPN tunnel between two ASAs or routers using the NAT translation from within the private IP addresses to a single public IP address outside the interface and then implement interesting crypto with the source of the public IP address and the destination of the remote private network on the other end (also ASA). For example, I want to translate a private network to the public ip address at one end and use the VPN tunnel with a public IP address as the source. Policy-NAT is not an option, because we really do not want to provide any IP address to the remote end, and IP addresses of the remote end can overlap with our end.
Thank you!
Hello
You can definitely set up an IPSec tunnel between two devices in the translation of your subnet in a single public IP address. You just create the translation and as you mentioned define interesting traffic using the public IP address.
This is exactly what we call political NAT, I don't understand why you say that NAT policy is not an option. Perhapps you misunderstood concept NAT policy or I misunderstood your question.
For example, assuming that the LAN private at your side is 172.16.1.0/24, the remote subnet is 192.168.150.0/24, and that the public IP address that you want to use is 200.200.200.200 your NAT config should look like this:
access-list 199 permit ip 172.16.1.0 255.255.252.0 192.168.150.0 255.255.255.0
Global (outside) 6 200.200.200.200
NAT (inside) 6 access-L199
Which would be NAT traffic to the public IP address only when the traffic matches the ACL.
Your ACL crypto should then be something like
cryptomap list of allowed access host ip 200.200.200.200 192.168.150.0 255.255.255.0
That would hide your address real and all they see is the public IP address you give them. Note that since the NAT takes place on your side your side will be able to raise the tunnel.
I hope this helps.
Raga
-
OK, here's the deal. I have a friend who is interested in working on musical ideas through GarageBand. He has an iPad Pro (not sure 1st or 2nd gen). and I use my 6 + or 1 Air iPad iPhone or a MacBook Pro. didn't matter that the one that I use because it can't open them with the iPad Pro, even if he sent it to me first. I am only able to open what it sends to my MacBook, although...
Is this possible? Very convenient to add titles and the return device to added again and so on? One might think that these devices would be able to work this way with each other.
Thank you
GarageBand on an iOS device cannot open GarageBand for Mac projects, but a mac can open GarageBand compatible for iPhone/iPad projects.
So, you might send your friend only mixed audio files. Your friend should add the sound to the Music.app on the iPad Pro and then add the new joint audio tracks in GarageBand. It is quite complicated, because you need to merge the titles added your friend in your original on the Mac project.
-
L2l Tunnel between 2POIGNEES: general query on ACL sheep/crypto
Hi all
For the L2L tunnel between 2POIGNEES work very well, we configure normally same network to network - sheep & cryptos ACL on both ends of the SAA. My question is...
It will work without any problem, if on one end of the ASA, the ACL sheep & crypto are combined to form the group object (to limit the ASA configs) and on the other end address net net address ACL sheep & crypto still exists (not consolidated in the Group of objects)... ? If it works, it works even if the tunnel is between ASA--> router.
Thanks in advance
MS
MS, it will work if the other side does not use the same scenario of acl consolidated using groups of objects. ACLs and groups of objects are significant locally on the device.
You can consolidate the ACLs on the ASA/PIX using TCP or UDP-groups of objects or groups of objects network and that your acl to the respective object-group, they always have the same effect as when they have been configured individually line by line.
This works even if the tunnel is between ASA--> router
Yes
HTH
Jorge
-
Hi all
I'm quite inexperienced in this subject and would appreciate advice on this
I need to create a VPN tunnel between our site and a remote site.
On our site, we are a network 192.168.0.X our external ip address is 12.53.150.100
We need to connect to the site is 69.144.38.48
We need to move from host to host meaning 192.168.0.97--> 69.144.38.50 and they want our ip to translate to 10.9.250.1
Thanks in advance
Jason
Are you familiar with the establishment of a regular L2L tunnel? In addition to this, you just create a nat policy:
access-list extended 100 permit ip host 192.168.0.97 69.144.38.50
public static 10.9.250.1 (inside, outside) - access list 100
When you define your ACL crypto, you specify 10.9.250.1 as the source instead of 192.168.0.97.
Let me know if you need help most.
-
VPN tunnel with only one authorized service
Hello
has got a pix 520 with V 6.22. Now, I created a VPN Tunnel from our server to a
annother company server and I only want to have ssh connection. If it works
pretty good - but the other host, it is possible to connect on our host by
ICMP, ftp, telnet... How can I manage configured my pix to refuse all this
services?
Here is my configuration:
name 10.x.x.x ffmz1_is
name 212.x.x.x conliner_os
conliner_ssh name 192.168.0.250
object-group network conliner
object-network 192.168.0.0 255.255.255.0
access list on the inside to allow icmp host ffmz1_is a
access-list inside permit TCP host ffmz1_is any ftp eq
access-list inside allow host ffmz1_is udp any eq smtp
access-list inside allow host ffmz1_is host conliner_ssh eq ssh tcp
no_nat list of allowed access host ip conliner object-group ffmz1_is
access-list allowed conliner host ip conliner object-group ffmz1_is
...
crypto VPN 30 card matches the address conliner
card crypto VPN 30 set peer conliner_os
...
Thank you very much
The sole purpose of "ipsec sysopt connection permit" is to allow traffic through a tunnel to bypass access-groups. It is not necessary to use it, but then you must explicitly allow traffic you want through your access list.
The command is very useful when you need to establish a vpn using the cisco customer remotely. Because you must use dynamic crypto maps and you don't know the IP address of the peer, if you didn't have the sysopt command, you will need to allow traffic from an source.
And you don't have to open all ports for the PIX to be able to establish the tunnel with its ipsec peer.
You need to allow udp 500 and protocol 50-51 when ipsec traffic through your firewall. Let's say you have another PIX inside who wants to establish a vpn on your main PIX with a third PIX on the outside, you must open the ports in your main PIX.
-
AnyConnect Clients cannot communicate with each other
I have a problem that I've been pulling my hair out... my teleworkers connect to our network of Corp. via a connection AnyConnect VPN (version 3.1) to a Cisco ASA5520. I have not split tunneling enabled for this profile, so that all traffic should pass through the tunnel and all guests are in the same subnet L3... as far as their IP VPN address goes. The problem is the teleworker PCs cannot communicate with each other (pings/RDP/etc.). When I look at the newspaper I see traffic from one to another, have denied anything, but they do not communicate. My Network Corp., I can communicate with the two PCs Anyconnect very well. When I go to monitoring. ASDM itineraries I see each host that is connected to the ASA via Anyconnect, and the gateway for each is the default gateway of the SAA.
Am I missing some setting in the VPN profile that prevents the access between these hosts? I think that something come in the newspaper...
Have you enabled crossed and also a free NAT between AnyConnect users?
permit same-security-traffic intra-interface
network of the AnyConnect_users object
subnet
public static AnyConnect_users AnyConnect_users destination NAT (outside, outside) static source AnyConnect_users AnyConnect_users
If this does not resolve your problem, please post a sanitized complete configuration of your ASA.
-
PS CC saved JPEG cannot display on other devices (iOS + Windows)
Hey guys,.
in case I save a JPEG/PNG (those are the two I tested) out of the new version of Photoshop CC (settings normal nothing has changed) cannot display JPEG format on other devices (iOS + Windows7). I also tried the profiles made different intentions/color (sRGB, Adobe RGB + Apple RGB)
Can someone help me with this problem?
I use the latest version of Photoshop on MAC OS El Capitan CC.Sample image: https://www.dropbox.com/s/29de2xrvlm8bvb3/Unbenannt-1?dl=0
Best regards and thanks a lot for your support
Steffen
Have you tried the correct suffix (".jpg")?
-
VZW iPhone is unlocked?
Means it can be used anywhere in the world with any other SIM card from another provider, including in the USA?
Yes, only bought it for full price directly from Apple.
Buy from anywhere else or under contract with Verizon means that he will probably be locked.
-
Why gesture to turn on my trackpad behaves not as before for switching between tabs when it works the same with all other programs besides Firefox?
I changed the subject: config to make the rotation gesture to move between tabs and it worked great for well over a year. It now behaves properly, as described here:
https://Bugzilla.Mozilla.org/show_bug.cgi?id=877598
It used to be very controllable move a tab on, now it is erratic and moves quickly and the unexpected tabs regardless of the slowness, I do the gesture of rotation. It's the main reason I use Firefox on Chrome and I will continue to do so unless there is no solution for this.
Just put the browser.gesture.twist.threshold to something around 15-25.
Maybe you are looking for
-
Vista and all applications of Toshiba on the recovery disk?
Hello everyone I have problem with recovery disk on my laptop.When I had formatted my HDD I lost my recovery and I can't return it.That is why I need order of Toshiba backup recovery, but I have a question about it. Could you please give me some info
-
I have a signal Arinc I decoded in each of its inputs/outputs digital. Since I was more than 150 e / s, I needed a way to sort and make a quick report on them. I have three categories. 1. remained = 1 throughout the test 2 sleep = 0 throughout the t
-
rounded buttons by default? How to make square and flat buttons?
I'm creating a mobile application on Dreamweaver CS6. Each type of button, I tried all the rounded corners and drop shadow default. I want to make buttons square and flat. I tried all of the following methods:< input type = "button" / >< button > < /
-
Automatic updates apply McAfee?
I would like to use automatic updates, but I don't want McAfee. I can it exclude permanently?
-
Dreamweaver has a plan APP to display the outline of my HTML page?
Hi, I'm doing a course on the CSS and the guy uses Aptana studio and it has a screen that displays the html page plan. Dreamweaver has it.Thank you.