On the Restriction of the time to access list

Hello

Nice day

I know that when I assigned a security level of 0 on the external interface means that I'm welcome all types of traffic between the inside and outside at any time without ACL applied to the inside interface. However, I need to control some users inside my local network to access to certain destinations at the moment. This means I need to increase my security level to 50 on the external interface in order to apply an ACL slot inside the interface?

I'll appreciate your quick response.

Kind regards

Turbo

Hi Turbo,

With no ACLs in use the PIX will allow traffic flows through one interface to another providing the source, the interface is of a higher security than the destination.

You mentioned that you will need to create an ACL on the outside - you should only do this if you want to accept incoming connections that are made from the external interface. This has always been the case for you if your outside security level is 0.

To create your ACL with a time interval, make sure your PIX clock is set to the correct time since it is the clock that the ACL allows action against their time slot.

After that, the commands you indicated above should create the ACL allowing http to 192.168.3.0/24 throughout the hour and the date in your message.

Are there error messages indicating when you attempt the connection?

Ian

Tags: Cisco Security

Similar Questions

  • No not removed from the external interface access-list access list?

    PIX515

    customer wanted to modify the access list (add a new line)

    so he has first publish no access-list command can

    apply the change to the access list, but the access list has been

    removed from the interface outside

    is this a normal behavior? on routers access list stay connected

    for the event of the interface if you issue no access-list command

    Thanks in advance for any comments

    JYP

    Hi Thibault-

    No, it is not a normal behavior, sounds more like an error by the customer. It's always a good idea to copy the required ACL on a text editor (Notepad) do not forget to include "access-group command" i.e. "access-group interface inside inside' or 'access-group out in interface outside' - when copying the required ACL and then issues a 'no access-list inside' or 'no access-list outside' the first line in the ACL copied on your notebook before copy you it to the PIX , also make sure that you are using the config and make an "m wr" (write memory) after the ACL modified have been applied on the PIX.

    Hope this helps-

  • MicrosoftSolitaire on the screen all the time-cannot access the game daily when the days marked are under heading

    I play the daily Microsoft Solitaire game, all of a sudden I can't play the game bearing the title Microsoft Solitaire because is on the screen along with the circle of continuous movement, please advise, thanks in advance.

    I think the problem was with the game itself, all of a sudden the problems seem to have resolved itself, I wasn't the only one who had this situation according to the questions on the Internet, but thanks anyway, Anng.

  • the conversion of the outgoing state access list

    I'm in the middle of conversion "outgoing/apply" statements to the declarations of the ACL. However, I need to add some 'free' statements more production. I'm very uncomfortable with the ACL, but I never realized how effectively use ' outgoing/apply' statement.

    How to converting the instructionsuivante ACL to a statement "outgoing/applicable?

    inside_acl list of access permitted tcp 10.200.98.0 255.255.255.0 host 194.232.23.13 eq 80

    inside_acl access to the interface inside group

    Thank you

    Mike

    Oops... mike sorry a mistake... the application should be

    apply (inside) 1 outgoing_dest

    given that 194.232.23.13 is the ip address of your destination...

    If you want to block the source and target, as it appears in the ACL, you must set 2 statements inbounds / apply:

    inside_acl list of access permitted tcp 10.200.98.0 255.255.255.0 host 194.232.23.13 eq 80

    1 outgoing deny 0 0

    1 outgoing allow 194.232.23.13 255.255.255.255 tcp 80

    apply (inside) 1 outgoing_dest

    2 outgoing deny 0 0

    2 outgoing allow 10.200.98.0 255.255.255.0 tcp 80

    apply (inside) 1 outgoing_src

    10,200 as the source IP address

    It's really a confusing task... so stick on with ACL. the rate of responses if found useful

    REDA

  • Setting the time on a wrt160nl

    The status page of my wrt160nl currently appears as 'not available '. Since the timestamps on the storage, I guess that when I put in place last week it thought it was 00: 00 January 1, 2009. I have configured the zone but cannot find any mode of setting time (or date), and there is nothing in the manual. Anyone know how the weather is supposed to be put in place? I guess this is supposed to know the time, otherwise access restrictions do not work. Is it supposed to be looking for a server of time somewhere?

    Thanks for your help - I think I found the problem. I use the WRT160nl as a media server, switch 4 ports and wireless access; It seems that it seems that for the moment on its 'internet' port, not on the default gateway on the local network (which is where I had assumed he would go as he knows this is where the internet is in fact). So I have now done a messy reconfiguration that is the default gateway on the 'internet' port and he seems to have found as if by magic time. Is not ideal, but it seems to work. Life would be much easier if you could telnet on the thing and know what is really happening...

  • Question of access list for Cisco 1710 performing the 3DES VPN tunnel

    I have a question about the use of access lists in the configuration of a router Cisco 1710 that uses access lists to control traffic through the VPN tunnel.

    For example the following lines in a configuration on the remote router. My question is whether or not the traffic that matches the definition of list access-130 (something other than 192.168.100.0/24), cross the VPN tunnel or go directly to the Ethernet0 interface.

    My understanding is that traffic that matches the access list 120 would be encrypted and sent through the IPSec tunnel. If there was "ban" set out in the statements of 120 access-list, the traffic for those would be sent through the IPSec tunnel but not encrypted (if possible). And finally, given that the definition of crypto card reference only "adapt to 120", any traffic that matches 130 access list would be sent Ethernet0 but not associated with the card encryption and thus not sent through the IPSec tunnel. "

    Any input or assistance would be greatly appreciated.

    Map Test 11 ipsec-isakmp crypto

    ..

    match address 120

    Interface Ethernet0

    ..

    card crypto Test

    IP nat inside source overload map route sheep interface Ethernet0

    access-list 120 allow ip 192.168.100.0 0.0.0.255 10.10.0.0 0.0.255.255

    access-list 130 refuse ip 192.168.100.0 0.0.0.255 10.10.0.0 0.0.255.255

    access-list 130 allow ip 192.168.100.0 0.0.0.255 any

    sheep allowed 10 route map

    corresponds to the IP 130

    He would go through the interface e0 to the Internet in clear text without going above the tunnel

    Jean Marc

  • Access-list command not supported in the 2.2 FWSM (1)

    Hi Netpros

    I am facing a strange problem with one of my FWSM installed in my spare box 7609.

    I have a FWSM installed in live production network, in which the caught watch access list supported and I am able to set up their place, but in the alternative box, I am unable to do so when I have? to get the command supported, it doesn't either up the access-list command.

    The two boxes run upward with 2.2 (1) and on different 7609 boxes.

    Basically, I want to do the CLI or the tested features up to in my box of spare before you go and implement the same on the live production network.

    I have attached both the version of the show, but also the supporting documents.

    Pls do not help to find where I m lack somehting here :-(.

    regds

    Your spare module is configured in mode 'multiple context', where you can create up to 100 logical firewall within one FWSM. In this mode, when you the meeting into the FWSM, you enter in what we call the context of the system in which all you can do is set the other contexts. In the context of the system there is no notion of the lists of access or something like that, and that's why you can't see these commands you.

    You want to deliver the FWSM in unique context mode by running the command:

    simple mode

    Reboot and then when he comes back to the top you'll be good to go.

  • IOS VPN on 7200 12.3.1 and access-list problem

    I'm in IOS 12.3 (1) a 7200 and have configured it for VPN access. I use the Cisco VPN client. Wonder if someone has encountered the following problem, and if there is a fix.

    The external interface has the access-list standard applied that blocks incoming traffic. One of the rules is to block the IPs private, not routable, such as the 10.0.0.0 concern, for example.

    When I set my VPN connection, none of my packets get routed and I noticed that outside access list interface blocks the traffic. When I connect to the router through VPN, the router attributes to the client an IP address from a pool of the VPN as 10.1.1.0/24. But normal outside the access list denies this traffic as it should. But as soon as I have established a VPN connect, it seems that my encrypted VPN traffic must ignore the external interface access list.

    If I change my external access list to allow traffic from source address 10.1.1.0/24 my VPN traffic goes through correctly, but this goes against the application to have an outdoor access list that denies such traffic and have a VPN.

    Anyone else seen this problem or can recommend a software patch or version of IOS which works correctly?

    Thank you

    R

    That's how IOS has always worked, no way around it.

    The reasoning is to do with the internal routing on the router. Basically an encrypted packet inherits from the interface and initially past control of ACL as an encrypted packet. Then expelled the crypto engine and decrypted, so we now have this sitting pouch in the cryptographic engine part of the router. What do we with her now, keeping in mind users may want political route she is also, might want to exercise, qos, etc. etc. For this reason, the package is basically delivered on the external interface and running through everything, once again, this time as a decrypted packet. If the package hits the ACL twice, once encrypted and clear once.

    Your external ACL shall include the non encrypted and encrypted form of the package.

    Now, if you're afraid that people can then simply spoof packets to come from 10.1.1.0 and they will be allowed through your router, bzzzt, wrong. The first thing that the router checks when it receives a packet on an interface with a card encryption applied is that if the package needs to be encrypted, it is from his crypto ACL and its IP pools. If he receives a decrypted packet when it knows that it must have been encrypted, it will drop the package immediately and a flag a syslog something as "received the decrypted packet when it should have been."

    You can check on the old bug on this here:

    http://www.Cisco.com/cgi-bin/support/Bugtool/onebug.pl?BugID=CSCdz54626&submit=search

    and take note of the section of the security implications, you may need to slightly modify your configuration.

  • bug in iOS? startup-config + command access-list + an invalid entry detected

    I posted this yesterday in the newsgroup usenet comp.dcom.sys.cisco and received no nibbles. If I did something incredibly stupid, please do not hesitate to advise.

    Cisco 827

    IOS (TM) C820 software (C820-K9OSY6-M), Version 12.2 (8) T5, RELEASE

    SOFTWARE (fc1)

    I'm looking to use a host named in a more extended access list. The

    script I copy startup-config contains the following entries:

    ! the 2 following lines appear at the top of the script

    123.123.123.123 IP name-server 123.123.123.124

    IP domain-lookup

    ! the following line appears at the bottom of the script

    120 allow host passports - 01.mx.aol.com one ip access-list

    When I reboot the router, I saw the following message:

    Translation of "passports - 01.mx.aol.com"... the domain server (255.255.255.255)

    120 allow host passports - 01.mx.aol.com one ip access-list

    ^

    Invalid entry % detected at ' ^' marker.

    It seems as if the entrance to the server name of the router is not processed

    prior to the access list. I can not even check with

    router02 access lists 120 #sh

    makes the access list entry * not * exist.

    But when I manually type the entry in the router I see the

    Next:

    router02 (config) #access - list 120 permits Passport - 01.mx.aol.com ip host

    any

    Translation of "passports - 01.mx.aol.com"... the domain server (123.123.123.123)

    [OK]

    and I can confirm its creation:

    router02 access lists 120 #sh

    Extend the 120 IP access list

    allow the host ip 64.12.137.89 one

    I have to do something incredibly stupid. If necessary I can post the whole startup-config, although it is quite long. (I don't know if the same label/common sense if apply here as apply to newsgroups usenet. i.e. post us actual ip addresses in our configs or must they be edited?)

    Any help is very appreciated.

    Hello

    Currently IOS does not use DNS - names in the ACL for the saved configuration / running.

    When you type in a list of access with a domain name we he looks up and replaces it with the IP address. I remember seeing a bug No. recently request this feature but I don't remember one bug id # now.

    Router (config) #access - list 187 ip allow any host www.cisco.com

    Router (config) #^ Z

    router #show run | 187 Inc

    IP access-list 187 allow any host 198.133.219.25

    router #show worm | split 12

    IOS (TM) C800 Software (C800-K9NOSY6-MW), Version 12.2 (13) T, RELEASE

  • access lists

    I have a question... or two... :) on access lists.

    My current access list looks like the following:

    access-list acl_outbound allow icmp a whole

    acl_outbound list of access allowed tcp 192.168.50.0 255.255.255.0 any eq 80

    acl_outbound list of access allowed tcp 192.168.50.0 255.255.255.0 any eq 21

    acl_outbound list of access allowed tcp 192.168.50.0 255.255.255.0 any eq 22

    acl_outbound list of access allowed tcp 192.168.50.0 255.255.255.0 any eq 8080

    acl_outbound list of access allowed tcp 192.168.50.0 255.255.255.0 any eq 443

    acl_outbound ip access list allow a whole

    access-list acl_inbound allow icmp a whole

    inside_nat0_outbound 192.168.50.0 ip access list allow 255.255.255.0 host Bluff_Outside

    outside_cryptomap_9 192.168.50.0 ip access list allow 255.255.255.0 host Bluff_Outside

    1. I get no response to external IP addresses with my permit icmp echo. I have to specify what type of ICMP traffic as echo response on the end of the statement of license? I assumed not to put a specific function of what ICMP permit would allow all ICMP traffic, but I guess I was wrong.

    2. also suggestions on how to improve my access lists would be appreciated. Just because it might "work" does not mean that it is the best way.

    As I noticed that I had to have the ip permit any one to make it work, but am not sure exactly what is happening when I apply that statement to allow permit tcp statement work correctly.

    My goals are:

    allow hosts listed web traffic (including https and ftp)

    allow ICMP pings pass from the inside to the outside and the response

    allow VPN tunnels to establish

    Thank you all for your help. This forum was very informative and useful with previous posts, I'm sure it will be with this one as well.

    Dave

    The question is now that you have an incomplete encryption card on your PIX, which effectively blocks ALL outgoing traffic. Add the following line:

    > card crypto outside_map 9 match address outside_cryptomap_9

    to your PIX. This should get the traffic flowing again. Although passed by the hit counters your ACL, try to ping the host Bluff_Outside to test your ping? If so, then your config crypto says to encrypt all traffic as well, which probably won't work unless the Bluff is configured correctly. Better to make things as simple as possible while you are testing, then I recommend to take the crypto stuff for now with:

    > no outside_map interface card crypto outside

    Reading through your original post, when you access list only allowing certain protocols TCP, and you found that it did not work, was it web browsing that didn't work? If so, whether you have been reviewed by name rather than IP address, and depending on where your DNS servers, you probably also needed to enable DNS lookups via (udp port 53). MANY people forget this.

    In addition, in my humble OPINION, most of the clients that I have seen that initially only allow certain outgoing protocols, eventually find it's more pain than anything like their users say "I need to use this Protocol" and "I need to use this Protocol. Just be tired if you want to go down this road without a valid reason, you can cause a lot of extra work for yourself. What could be easier is just to make sure that your inside the subnet and only your home subnet, can get out by doing:

    > acl_outbound 192.168.50.0 ip access list allow 255.255.255.0 any

    This limited kind of all other connections rear door inside your network by your PIX and Internet connection, but still allows all your users go out and do what they want. Oh you obviously.

  • card crypto access lists / problem if more than one entry?

    Access list for IPSec enabled traffic.

    I've been recently setting up a VPN between two sites and I came across the following problem:

    I wanted to install a VPN that only 2 posts from site A to site B, a class C network

    So I created a list of access as follows:

    access-list 101 permit IP 192.168.0.1 host 192.168.1.0 0.0.0.255

    access-list 101 permit IP 192.168.0.2 host 192.168.1.0 0.0.0.255

    When I applied the access list above to map (match address 101) encryption, I quickly realized that only the first host (192.168.0.1) was successfully encrypted beeing while the other could not. I've been geeting on ipsec debugging errors saying that traffic to 192.168.0.2 denyed by the access list.

    When I changed the access list above with the following

    access-list 101 permit IP 192.168.0.1 0.0.0.255 192.168.1.0 0.0.0.255

    two items of work could successfully encrypted through IPSec tunnel.

    To look further into it, I realized that only the first entry of the IPsec access list has been really tested for the corresponding traffic!

    Is this a normal behavior or a known Bug? No work around for this problem?

    Kind regards.

    If you have ipsec-manual crypto map in crypto ACL, you can specify that an ACE. Check 12.2 docs:

    Access lists for labelled as ipsec-manual crypto map entries are limited to a single permit entry and the following entries are ignored. In other words, the security associations established by this particular entry card crypto are only for a single data stream. To be able to support several manually created security for different types of traffic associations, define multiple crypto access lists and then apply each a separate entrance card crypto ipsec-manual. Each access list should include a statement to define which traffic to protect.

  • Routing VPN access list

    Hello

    I have a PIX 525 to my main site and a 1721 router at a remote location. I used the PDM and the SDM to configure site-to-site IPSec VPN connection. In my private network, I use 10.1.0.0/16 for the main site and 10.x.0.0/16 (where x = 2-47) to remote sites.

    The remote site with the VPN connection uses 10.19.0.0/16. When I originally created this VPN, I configured the traffic to flow from the remote site to 10.1.0.0/16 only. This means that the remote site cannot speak to any other remote sites, just the main site.

    I need to modify the access list to solve this problem. The relevant part of the remote site access list is now:

    access-list 103 allow ip 10.1.0.0 0.0.255.255 10.19.0.0 0.0.255.255

    access-list 103 deny ip 10.19.0.0 0.0.255.255 everything

    Can I change the subnet mask in the first line and put the second line first?

    access-list 103 deny ip 10.19.0.0 0.0.255.255 everything

    access-list 103 allow ip 10.0.0.0 0.255.255.255 10.19.0.0 0.0.255.255

    Or should I let the deny at the end statement, and add a line for each of the other remote sites:

    access-list 103 allow ip 10.1.0.0 0.0.255.255 10.19.0.0 0.0.255.255

    access-list 103 allow ip 10.2.0.0 0.0.255.255 10.19.0.0 0.0.255.255

    access-list 103 allow ip 10.3.0.0 0.0.255.255 10.19.0.0 0.0.255.255

    access-list 103 allow ip 10.4.0.0 0.0.255.255 10.19.0.0 0.0.255.255

    ... (others)

    access-list 103 deny ip 10.19.0.0 0.0.255.255 everything

    Thank you.

    John

    John

    Help the additional configuration information that you have posted. There are still a few things which I hope could be clarified. It seems that you have 46 remote sites and only is connected via a VPN. How have the other connectivity? It is all over the links within your private network? Is there than any NAT involved in these other connections?

    In my previous answer, I assumed that there will be multiple VPN connections, revealing your additional information is not the case. So my comment about limitations in PIX for talk of talks is true but not applicable to your situation.

    Other remote sites are also coming via the VPN? If yes access list 100 which the 1721 uses to identify the IPSec traffic (and that was not in your posted material) will probably have to be changed.

    According to access list 103 is concerned, I guess that the deny ip 10.19.0.0 0.0.255.255 is an anti-spoofing measure? If so, I would probably advocate put it as the first entry in the access list. What about if you want to use ip 10.0.0.0 allow 0.255.255.255 10.19.0.0 0.0.255.255 or a series of individual licenses, according to me, a point to consider is that allowed 10.0.0.0 0.255.255.255 will allow any space of 10 addresses. It seems that you use 1 to 47. What happens if something came through 10.122.x.x? I suggest a compromise approach. You can use this:

    IP 10.0.0.0 allow 0.31.255.255 10.19.0.0 0.0.255.255

    ip licensing 10.32.0.0 0.15.255.255 10.19.0.0 0.0.255.255

    This would allow 1 to 47 but not others.

    HTH

    Rick

  • access-list [line-num]

    Too often, I see in the access list statement, there is a line number set to 1, like this:

    permit access-list id_test 1...

    Desc the doc said: "The line number to insert a note or an access control element (ACE)."

    I can understand his 'writing' but never 'really' understand. :)

    Someone could it explain by giving an example?

    Thank you for helping.

    Scott

    PIX (config) # access-list id_test sh

    id_test list of access; 5 elements

    id_test of access list row 1 will allow any host 1.1.1.1 (hitcnt = 0)

    id_test of access list row 2 allow accord any host 2.2.2.2 (hitcnt = 0)

    id_test of access list row 3 will allow any host 3.3.3.3 (hitcnt = 0)

    line 4 of the id_test of access list allow accord any host 4.4.4.4 (hitcnt = 0)

    access list id_test line 5 will allow any host 5.5.5.5 (hitcnt = 0)

    PIX (config) # access - list id_test line 2 Note Hello

    PIX (config) # access-list id_test sh

    id_test list of access; 5 elements

    id_test of access list row 1 will allow any host 1.1.1.1 (hitcnt = 0)

    Hello from note access-list id_test line 2

    id_test of access list row 3 will allow any host 2.2.2.2 (hitcnt = 0)

    line 4 of the id_test of access list allow accord any host 3.3.3.3 (hitcnt = 0)

    access list id_test line 5 will allow any host 4.4.4.4 (hitcnt = 0)

    id_test of access list line 6 will allow any host 5.5.5.5 (hitcnt = 0)

    allowed for pix (config) # access - list id_test line 1 icmp any host 1.1.1.1

    PIX (config) # access-list id_test sh

    id_test list of access; 6 items

    allowed to Access-list id_test line 1 icmp any host 1.1.1.1 (hitcnt = 0)

    id_test of access list row 2 allow accord any host 1.1.1.1 (hitcnt = 0)

    Note access-list id_test line 3 Hello

    line 4 of the id_test of access list allow accord any host 2.2.2.2 (hitcnt = 0)

    access list id_test line 5 will allow any host 3.3.3.3 (hitcnt = 0)

    id_test of access list line 6 will allow any host 4.4.4.4 (hitcnt = 0)

    access list id_test line 7 will allow any host 5.5.5.5 (hitcnt = 0)

    TRIS-NOC-FW1 (config) #.

    the golden rule of the acl, is that it works in order, from top to bottom. with the line number, you can precisely insert the new entry of acl or note everywhere where you want.

    for example, imagine you have a 200-entry acl, and now you want to allow one host before the other refuse registration. of course you don't want to interrupt the network by UN-apply and reapply the entire acl. in this case, the line number to save life.

  • How can I configure Time Capsule 3 to and Motorola NVG589 to access the Time Capsule backup drive?

    I have ATT Uverse service and am ok with the performance of the WiFi of the NVG589. I want to configure my Time Capsule 3 to extend the network and be able to access the drive for backups Time Machine. I think I am following the steps in Airport utility, but once installation is complete I can find is no longer the time Capsule.

    I want to configure my Time Capsule 3 to extend the network

    The time Capsule cannot "extend" the network Uverse using a wireless connection, if that's maybe what you're trying to do. The time Capsule can only wireless "extend" the signal of another router from Apple.

    The Capsule can be configured to extend the network to Uverse if it is connected permanently... anytime... to the Uverse router using a connection through wired Ethernet cable.

    Please specify on what you're trying to accomplish, so that we can provide the correct steps.

  • Can not access the site Web of John Lewis, get message server unexpectedly dropped the connection all the time

    Use the iMac with El Capitan 10.11.1 & Safari 9.0.1

    During the last week, I was unable to access the site Web of John Lewis and the message "Safari cannot open page www.johnlewis.com because the server dropped the connection unexpectedly. Sometimes this happens when the server is busy. Wait a few minutes and then try again"I retry but get the same message all the time. Can access all other sites ok.

    I emptied the cache, deleted the cookies and history. Enter the name of the site in its entirety is not helped either.

    Unable to access the Web by John Lewis site with my iPad either.

    Help!

    Try restarting/resetting the router.

    Try a reboot.

    Make a backup using Time Machine or a cloning program, to ensure that data files can be recovered. Two backups are better than one.

    Try to set up another admin user account to see if the same problem persists. If back to my Mac is enabled in system preferences, the guest account will not work. The intention is to see if it is specific to an account or a system wide problem. This account can be deleted later.

    Isolate a problem by using a different user account

    If the problem is still there, try to start safe mode using your usual account.  Disconnect all devices except those necessary for the test. Shut down the computer and then put it up after a 10 second wait. Immediately after hearing the startup chime, hold down the SHIFT key and continue to hold it until the gray Apple icon and a progress bar appear. Startup is considerably slower than normal. This will reset some caches, forces a check for directory and disables all start-up and connection, among other things. When you restart normally, the initial restart may be slower than normal. If the system is operating normally, there may be 3rd party applications that pose a problem. Try to delete/disable the third-party applications after a reboot using the UN-Installer. For each disable/remove, you need to restart if you do them all at once.

    Safe mode - on El Capitan

    Start Mode without failure-El Capitan.

Maybe you are looking for

  • Removal of Microsoft IntellIpoint

    I have a user who cannot remove Microsoft IntelliPoint, but I'm not able to. I used to have a Microsoft trackball which I installed IntelliPoint, but a year ago I had a Kensington trackball, which requires mouse work. There is not too long a story on

  • Widget API Help

    Hello Where can I get documentation on all the API availabale for widgets and how to use them? Thanls Davy

  • Is it possible to direct "log entry" for a syslog server-specific ACL?

    R1 (10.177.142.1)---f1/0 R2 f1/1---(192.168.1.3)R3 I want to apply a mild access list on R2 only in order to connectentries and let me evaluate and find out how many users helpTELNET, www, and 3389 (RDP thing) protocolsfrom R1 go to R3. I can't block

  • Selective deletion Email blackBerry smartphones

    Hi is possible, can I delete the selected e-mail? I mean like I want to only remove email no 1, 3, 7, 9 etc., as pressing ctrl + left click on the victory. I know that I can block and remove but seemed if I block, it will block all within the range a

  • the notebook & the snipping tool, I can't save anything in a program.

    Hi all! First time for me here! I have a weird problem where I can not save a Notepad file or tool captures on my PC (when I click on save or save as in a product nothing happens at all! don't even not a backup window opens). I also have another stra