NAC Appliance with ASA (for remote user VPN)
I have a pair of firewall 5520 cisco which is used as a VPN gateway (for remote user VPN) and perimeter firewall Internet (to provide outbound internet connectivity).
We allow the NAC to remote VPN users. I have it will be deployed with active 3 layer inband.
The problem with this design is that how to ensure that outgoing internet traffic does not pass through the CASE?
I heard about couple of optioins:
-ACB (for send only IP subnet to VPN users remote to go through CASE)
-Version 8.x characteristic of ASA (Restrcit access to VLAN under Group Policy).
I intend to do with ASA firewall where I can set a new subinterface on the SAA (with a new tag VLAN) and under the group policy for remote user VPN, I select the option to "restrict access to the new VLAN.
My question is: is - it still works (even if the firewall have a route to the internal network by using the 'inside' interface and NOT the new interface of the NAC). If this does not work, please let me know what are the other options for this type of deployment.
Thanks in advance.
Hello
It should work. Please see the attached PDF for more clarity on this topic: https://supportforums.cisco.com/docs/DOC-9102
HTH,
Faisal
Tags: Cisco Security
Similar Questions
-
How to use ACS 5.2 to create a static ip address user for remote access VPN
Hi all
I have the problem. Please help me.
Initially, I use ACS 4.2 to create the static ip address for VPN remote access user, it's easy, configuration simply to the user defined > address assignment IP Client > assign the static IP address, but when I use ACS 5.2 I don't ' t know how to do.
I'm trying to add the IPv4 address attribute to the user to read "how to use 5.2 ACS", it says this:
1Ajouter step to attribute a static IP address to the user attribute dictionary internal:
Step 2select System Administration > Configuration > dictionaries > identity > internal users.
Step 3click create.
Static IP attribute by step 4Ajouter.
5selectionnez users and identity of the stage stores > internal identity stores > users.
6Click step create.
Step 7Edit static IP attribute of the user.
I just did, but this isn't a job. When I use EasyVPN client to connect to ASA 5520, user could the success of authentication but will not get the static IP I set up on internal users, so the tunnel put in place failed. I'm trying to configure a pool of IP on ASA for ACS users get the IP and customer EasyVPN allows you to connect with ASA, everything is OK, the user authenticates successed.but when I kill IP pool coufigurations and use the "add a static IP address to the user 'configurations, EzVPN are omitted.
so, what should I do, if anyboby knows how to use ACS 5.2 to create a user for ip address static for remote access VPN, to say please.
Wait for you answer, no question right or not, please answer, thank you.
There are a few extra steps to ensure that the static address defined for the user is returned in the Access-Accept. See the instuctions in the two slides attached
-
Hi all
I'm trying to assign the attribute DAP users VPN (Anyconnect 3.0 +) who fulfil certain conditions of registry. When setting up political DAP, while selecting the condition of the register, it is in error as "secure desktop cisco (CSD) is not enabled, CSD should be enabled to configure the registry endpoint attribute. But as I link percevied, to check the attribute registry "scan host' which is integrated in the module anyconnect 3.0 will be charged. So why he asks me to activate the CSD? CSD is really necessary to verify the registry attribute even if we use anyconenct 3.0 +? Any pointer
The end of the ASA must be activated and more bits based on AnyConnect.
Notes elsewhere in the link you quoted, it is said ' host Scan automatically identifies the operating systems and service packs on any remote device establishing a clientless SSL VPN and AnyConnect Cisco client session and when the host Scan/CSD or CSD is activated on the SAA. " (emphasis added).
FYI Cisco is to denigrate these features over time for the Posture of scanning at the ISE in conjunction with the new posture AnyConnect 4.0 module.
-
ASA to remote access VPN with external IP dynamic
Hi forum,
I was wondering if it was possible to set up an ASA to provide access to remote connections VPN (IPSEC or WebVPN/SSL) of the outside world, if the external IP address is dynamic (i.e. obtained through DHCP)? I understand how to use DynamicDNS to provide a host name for the VPN clients, I ask simply if the SAA can be configured to allow VPN connections from a DHCP interface addressed. I understand there are problems with the site to site VPN when both sides are addressed in a dynamic way, but it seems that the remote VPN access should work. Just hoping to confirm this before I go and I'm working on a config.
Thanks in advance...
The same configuration applies.
In my view, that the only difference is that with the external IP being dynamic:
interface e0/0
IP address dhcp setroute
crypto map
The only difference is that (the PCF file) VPN clients should have the VPN connection with a hostname (rather than an IP address) and the IP must be solved at the IPs of the SAA.
I'll try to find you an example configuration if you do not.
Federico.
-
How can I assign the static fixed IP for remote access VPN users
Hi team,
I have a requirement to assign a fixed static IP users VPN remote access in ASA, please help how I can achice this
Thanks in advance
Mikaelusername user1 attributes
VPN-framed-ip-address 10.200.115.78 255.255.0.0
-
ASA 5505 - remote access VPN to access various internal networks
Hi all
A customer has an ASA 5505 with a remote access vpn. They are moving their internal network to a new regime and that you would be the users who come on the vpn to access the existing and new networks. Currently can only access the existing. When users connect to access remote vpn, the asa gave them the address 192.168.199.x. The current internal network is 200.190.1.x and that they would reach their new network of 10.120.110.x.
Here is the config:
:
ASA Version 8.2 (5)
!
ciscoasa hostname
enable encrypted password xxx
XXX encrypted passwd
names of
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
IP 200.190.1.15 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
IP address 255.255.255.0 xxxxxxx
!
exec banner the ACCESS NOT AUTHORIZED IS STRICTLY PROHIBITED
connection of the banner the ACCESS NOT AUTHORIZED IS STRICTLY PROHIBITED
banner asdm the ACCESS NOT AUTHORIZED IS STRICTLY PROHIBITED
passive FTP mode
access extensive list ip 200.190.1.0 inside_access_in allow 255.255.255.0 any
outside_access_in list extended access permit icmp any external interface
access extensive list ip 192.168.199.0 outside_access_in allow 255.255.255.192 host 10.120.110.0
Standard access list MD_IPSEC_Tun_Gp_splitTunnelAcl allow 200.190.1.0 255.255.255.0
MD_IPSEC_Tun_Gp_splitTunnelAcl list standard access allowed host 10.120.110.0
access extensive list ip 200.190.1.0 inside_nat0_outbound allow 255.255.255.0 192.168.199.0 255.255.255.192
inside_nat0_outbound list extended access allowed host ip 10.120.110.0 192.168.199.0 255.255.255.192
pager lines 24
Enable logging
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
mask 192.168.199.10 - 192.168.199.50 255.255.255.0 IP local pool Remote_IPSEC_VPN_Pool
IP verify reverse path to the outside interface
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow any inside
ICMP allow all outside
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 0-list of access inside_nat0_outbound
NAT (inside) 1 200.190.1.0 255.255.255.0
inside_access_in access to the interface inside group
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 190.213.43.1 1
Route inside 10.120.110.0 255.255.255.0 200.190.1.50 1
Route inside 192.168.50.0 255.255.255.0 200.190.1.56 1
Route inside 192.168.60.0 255.255.255.0 200.190.1.56 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
http server enable 10443
http server idle-timeout 5
Server of http session-timeout 30
HTTP 200.190.1.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs
Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
Crypto ca trustpoint _SmartCallHome_ServerCA
Configure CRL
Crypto ca certificate chain _SmartCallHome_ServerCA
certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
(omitted)
quit smoking
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Crypto isakmp nat-traversal 3600
Telnet timeout 5
SSH 200.190.1.0 255.255.255.0 inside
SSH timeout 5
SSH version 2
Console timeout 5
dhcpd outside auto_config
!
a basic threat threat detection
scanning-threat shun threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
allow outside
internal MD_SSL_Gp_Pol group strategy
attributes of Group Policy MD_SSL_Gp_Pol
VPN-tunnel-Protocol webvpn
WebVPN
list of URLS no
disable the port forward
hidden actions no
disable file entry
exploration of the disable files
disable the input URL
internal MD_IPSEC_Tun_Gp group strategy
attributes of Group Policy MD_IPSEC_Tun_Gp
value of banner welcome to remote VPN
VPN - connections 1
VPN-idle-timeout 5
Protocol-tunnel-VPN IPSec webvpn
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list MD_IPSEC_Tun_Gp_splitTunnelAcl
the address value Remote_IPSEC_VPN_Pool pools
WebVPN
value of the RDP URL-list
attributes of username (omitted)
VPN-group-policy MD_IPSEC_Tun_Gp
type of remote access service
type tunnel-group MD_SSL_Profile remote access
attributes global-tunnel-group MD_SSL_Profile
Group Policy - by default-MD_SSL_Gp_Pol
type tunnel-group MD_IPSEC_Tun_Gp remote access
attributes global-tunnel-group MD_IPSEC_Tun_Gp
address pool Remote_IPSEC_VPN_Pool
Group Policy - by default-MD_IPSEC_Tun_Gp
IPSec-attributes tunnel-group MD_IPSEC_Tun_Gp
pre-shared key *.
!
!
context of prompt hostname
: end
The following ACL and NAT exemption ACL split tunnel is incorrect:
MD_IPSEC_Tun_Gp_splitTunnelAcl list standard access allowed host 10.120.110.0
inside_nat0_outbound list extended access allowed host ip 10.120.110.0 192.168.199.0 255.255.255.192
It should have been:
Standard access list MD_IPSEC_Tun_Gp_splitTunnelAcl allow 10.120.110.0 255.255.255.0
access extensive list ip 10.120.110.0 inside_nat0_outbound allow 255.255.255.0 192.168.199.0 255.255.255.192
Then 'clear xlate' and reconnect with the VPN Client.
Hope that helps.
-
Remote user VPN IPSec does not work
Hello
I'm trying to configure a remote IPsec VPN on a Cisco router user 1921 but it doesn't work for some reason I don't understand. Does anyone have an idea? I forgot something?
Thank you in advance for your help!
This is part of my configuration:
AAA new-model
!
local AuthentVPN AAA authentication login
local AuthorizVPN AAA authorization network
!
AAA - the id of the joint session
!
username password xxxxxx xxxxx 0 0 encrypted
!
crypto ISAKMP policy 1
BA aes 256
preshared authentication
Group 5
life 3600
!
ISAKMP crypto client configuration group vpnclient
key XXXXXXXXXXXXXXXXXXXXXXXX
DNS 192.168.0.254
GVA area. INTRA
pool IPPoolVPN
ACL 100
!
!
Crypto ipsec transform-set esp - aes esp-sha-hmac T1
tunnel mode
!
crypto dynamic-map 10 DynMap
game of transformation-T1
!
list of authentication of crypto client myMap AuthentVPN map
card crypto myMap AuthorizVPN isakmp authorization list
client configuration address map myMap crypto answer
card crypto myMap 100-isakmp dynamic ipsec DynMap
!
interface Dialer1
MTU 1492
the negotiated IP address
IP access-group RESTRICT_ENTRY_INTERNET in
NAT outside IP
IP virtual-reassembly in
encapsulation ppp
Dialer pool 1
Dialer-Group 1
PPP authentication pap callin
PPP chap hostname xxxxxxxxx
PPP chap password 0 xxxxxxxxx
PPP pap sent-name of user password 0 xxxxxxxxxxxx xxxxxxxxxxxxxx
crypto myMap map
!
IP pool local 192.168.10.0 IPPoolVPN 192.168.10.253
!
overload of IP nat inside source list 110 interface Dialer1
!
access-list 100 permit ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 110 deny ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255
The conflict will be terminated and should be avoided. It might work if you disable split-mining and road, all via the VPN client...
Ideally business networks should not use 192.168.0.0/24; 1 or 2 either since they are common in home routers... you can also have them change their home network easily
Patrick
-
Why firefox 3.0.19 segmentation fault during a regular users use, when a sudo user it dose not have it?
ID of the Crash
13233
User Agent
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; GTB6.4; .NET CLR 1.1.4322; .NET CLR 2.0.50727;. InfoPath.2 CLR 3.0.04506.648 .NET; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
Do you use Linux?
If so, then what distribution?
You posted with an IE 8 user agent.If you're on Linux, using a version of Firefox for your Linux distribution or the normal version of Firefox from the Mozilla site?
Have you checked that your configuration meets the requirements of Firefox?
http://www.mozilla.com/firefox/system-requirements-v3.html - Firefox 3 system requirements -
Usign PowerCLI to set Options to the Console computer virtual for remote users
I really miss onxy... Such a wonderful tool. I'm looking for a script to change the Options of Console of Virtual Machine for remote, as shown here:
Someone has any idea how to set these variables?
Thank you
J
The relevant virtual machine configuration settings are RemoteDisplay.maxConnections and tools.guest.desktop.autolock.
You can change these settings with the (get |) New | The value | (Remove) - AdvancedSetting cmdlets. For example, run:
Get - VM MyVM1 | New-AdvancedSetting - name "RemoteDisplay.maxConnections" - value 3 - confirm: $false - ForceGet - VM MyVM1 | New-AdvancedSetting - name 'tools.guest.desktop.autolock'-'true' value - confirm: $false - Force
-
Disable XAuth for remote access VPN
Hi guys,.
I would like to know if I can jump XAuth for access to remote VPN on a router.
Here's my config, all working beautifully, always on connection I do not see any window username & password after having clicked on the Vpn profile.
local VPNUSERSAUTH AAA authentication loginlocal AAA VPNUSERS authorization networkra-user privilege 0 1cannotTELu secret user namecrypto ISAKMP policy 7BA aessha hashpreshared authenticationGroup 2Configuration group customer crypto isakmp VPNUSERStheKEYallneedt0 keyVPN-poolACL ACL-SPLIT-VPNCrypto ipsec transform-set esp-3des esp-sha-hmac 3DES-SHAcrypto dynamic-map VPNDYNMAP 1game of transformation-ESP-AES128-SHAmarket arriere-routelist of authentication of card crypto map-OUTSIDE client VPNUSERSAUTHlist of crypto card authorization card-OUTSIDE isakmp VPNUSERSclient configuration address card crypto map-OUTSIDE meetcard crypto 6500 map-OUTSIDE-isakmp ipsec dynamic VPNDYNMAPlocal IP VPN-POOL 10.1.24.1 pool 10.1.24.25IP extended ACL-SPLIT-VPN access listip licensing 192.168.11.0 0.0.0.255 10.1.24.0 0.0.0.255Thank you very much!Hi Florin,
In the case of remote VPN access, the user must be authenticated by name of user and password or certificates.
You can deploy authentication certificate based as follows: -.
http://www.Cisco.com/c/en/us/support/docs/security-VPN/IPSec-negotiation-IKE-protocols/22520-unityclient-iOS.html#router-configThis will use the certificate for authentication of users and only requires name of user and password.
Kind regards
Dinesh MoudgilPS Please rate helpful messages.
-
Refuse the remote user VPN to access PC using VPN from Site users to partner Site
Hi Experts,
Installation program:
We have configured IPSEC Site - Site VPN between Cisco ASA 5510 and Sonicwall.
Tunnel is in place and working well, we are able to access the remote workstation to partner and Vis Versa.
Requirment: We want to deny remote VPN users, who are our partners access to the workstation.
Example:
Remote IP address range: 192.168.200.x/2r4
Local IP address range: 192.168.10.x/24
Deny traffic from 192.168.200.x/24 to 192.168.10.x/24
Thanks in advance
Kiran Kumar CH
Hi Kiran,
You want to deny certain IP addresses of the Remote LAN (of the L2L tunnel), to connect to your workstation?
Thus, if the remote network 192.168.200.0/24, want to deny some of these machines to connect to 192.168.10.x?
If this is the case, you can create ACL VPN (VPN filters) on the SAA to restrictive traffic through the tunnel from the IPs.
Please clarify if I have misunderstood.
Federico.
-
Disable the redirection of printer for remote users only
Hi we have a customer's requirement that when users connect to the view platform 5.2 internally (via PCoIP) they are able to get both printers mapped with GPO printing location and all locally connected usb printers. However, when a user is working from outside the LAN you must disable the printer redirection all - they don't want sensitive documents outside of the office printing.
What is the best way to achieve this?
In case anyone is interested, I managed to solve this problem using a vbs script, executed using the agent to view GPO RunOnConnect. He questions the volatile environmental variables for the name of the view server connection external access. and if it matches then verifies membership in a group. If not a member of the remote-printing-authorized group it disables services of thinprint.
strComputer = "." Set objNetwork = WScript.CreateObject("Wscript.Network") Set objSysInfo = CreateObject("ADSystemInfo" ) strUserDN = objSysInfo.userName Set objUser = GetObject("LDAP://" & strUserDN) Set objWMIService = GetObject("winmgmts:\\" & strComputer & "\root\cimv2") Set objShell = CreateObject("WScript.Shell") '-------------------------------------------------------- ' IsMember Function '-------------------------------------------------------- Function IsMember(strGroup) ' Function to test one user for group membership. ' objUser is the user object with global scope. ' strGroup is the NT Name of the group to test. ' objGroupList is a dictionary object with global scope. ' Returns True if the user is a member of the group. Dim objGroup If IsEmpty(objGroupList) Then Set objGroupList = CreateObject("Scripting.Dictionary" ) objGroupList.CompareMode = vbTextCompare For Each objGroup In objUser.Groups objGroupList(objGroup.sAMAccountName) = True Next End If IsMember = objGroupList.Exists(strGroup) End Function '-------------------------------------------------------- ' Check to see if client logged into external View Connection Servers ' Disable printing if not member of AD Group remote-printing-allowed '-------------------------------------------------------- If objShell.ExpandEnvironmentStrings("%ViewClient_Broker_DNS_Name%") = "GR1VCSV01.domain.net" _ Or objShell.ExpandEnvironmentStrings("%ViewClient_Broker_DNS_Name%") = "GR1VCSV02.domain.net" _ Then If IsMember("remote-printing-allowed") Then echo "Virtual Printing Enabled" Else Set colServiceList = objWMIService.ExecQuery _ ("Select * from Win32_Service where Name = 'TPAutoConnSvc' OR Name = 'TPVCGateway'") For Each objService in colServiceList If objService.State = "Running" Then objService.StopService() Wscript.Sleep 5000 End If errReturnCode = objService.ChangeStartMode("Disabled") end if end If
-
No Internet connectivity with ASA 5505 VPN remote access
Hello
I configured ASA 5505 for remote access VPN to allow a remote user to connect to the Remote LAN officce. VPN works well, users can access Office Resource of LAN with sahred etc., but once they have connected to the VPN, they are unable to browse the internet?
Internet navigation stop working as soon as their customer VPN connect with ASA 5505 t, once they are disconnected from VPN, once again they can browse the internet.
Not ASA 5505 blocking browsing the internet for users of VPN? Is there anything else that I need congfure to ensure that VPN users can browse the internet?
I have to configure Split Tunnleing, NATing or routing for VPN users? or something else.
Thank you very much for you help.
Concerning
Salman
Salman
What you run into is a default behavior of the ASA in which she will not route traffic back on the same interface on which he arrived. So if the VPN traffic arrived on the external interface the ASA does not want to send back on the external interface for Internet access.
You have at least 2 options:
-You can configure split tunneling, as you mention, and this would surf the Internet to continue during the use of VPN.
-You can set an option on the ASA to allow traffic back on the same interface (this is sometimes called crossed). Use the command
permit same-security-traffic intra-interface
HTH
Rick
-
How can I send parameters preconfigured VPN client to a remote user
Dear all,
I have an ASA 5510 using VPN IP - SEC for remote users. I want to send all settings pre-configured for the VPN client.
How can I save the configuration file and send to a remote user?
Concerning
Configure the vpn profile in your vpn client, and then send them the .pcf file located in the directory Program Files/Cisco Systems VPN/customer/profiles. Then all they have to do is import it into their client.
-
Reverse road injection for remote VPN Clients
Hello world
you will need to confirm if reverse road injection is used only for Site to site VPN?
Also to say that we have two sites using site-to-site vpn
Site A Site B
Private private IP IP
172.16.x.x 172.20.x.x
Now, as we VPN site to site, we can either activate the NAT - T option which will allow 172.16 IP reach site B as 172.16 only.
Do not change the IP address.
Option 2
IF we don't allow NAT - T and if we allow injection road Revese and we use say Protocol ospf on ASAs in site A and B.
In this case, we allow IPPS so that we can announce the private road 172.16. on the internet right of site B?
Concerning
MAhesh
Hello Mahesh,
"Reverse road injection (RRI) is used to fill in the routing table of an internal router that is running OSPF Open Shortest Path First () protocol or the RIP (Routing Information) protocol for Remote Clients VPN sessions or a local area network LAN."
As a result, allowed RRI ASA learn routing information for connected peers and advertising via RIP or OSPF.
NAT - T is automatically detected and used when the local or the remote peer is behind NAT.
To answer your question:
If NAT - T is required and enabled, then it will automatically be used peer VPN. Then, with IPP in place, remote network will be added to the routing as static routes table, so they can be advertised by OSPF.
HTH.
Please note all useful messages.
Maybe you are looking for
-
Anomaly of the Atrix car Dock recognition
I noticed a quirk in the behaviour of my Atrix intermittent when I put it in the Dock of the car. The scenarios and the results are as follows: If I place the Atrix in car dock before I start my car (which provides power to the USB plug), the phone d
-
Back table of outputs digital for all available hardware
Hi, I use an output digital on the USB-6008 box to toggle a switch to relay. The problem is that the State is initialized from the all the outputs for this device is high when the unit is first powered. So, I include in my code to set the digital l
-
same circuit design-different versions of multisim now fixed
again the circuit model 74LS244N, now the pattern16t file works in different versions of multisim. How do you pattern16t signs might be useful. This circuit is interfaced with gpib, scsi, usb computer interface circuits. It's everything. software mus
-
HP Officejet Pro 8620 can't sweep
I am willing to send this printer back and do with HP for good. I replaced my photosmart precedent with this printer because it would not scan. Now, I installed this new printer and it is not even scan. When I run HP doctor, difficulty of analysis, i
-
The question is all the details I can give.