PIX 525 config and VPN configuration
Hello
I was asked to work on a customer request to replave sound no cisco FW with a pix 525 and also lead to a VPN solution using this PIX 525.
I'm not a FW as my main experience is with Routing/Switching, but I have read some documentation and had some hands on a client of vpn300 501 PIX and cisco. I managed to make it appear the vpn connection, even if all tests have failed (you need to solve any further).
Customer has its main site with an application that runs on a Web server that must be accessed only through the vpn to: 3rd party + a few remote users.
The solution, I want to propose to the client is:
option 1:
PIX 525 as a vpn server + Cisco vpn 3000 client on all PCs of remote users.
option 2:
PIX 525 as a vpn server + vpn client windows on all PCs of remote users
option 3:
PIX 525 as vpn + PIX 501 to 3 rd party server + vpn client windows on all PCs of remote users
First I want to confirm that these motions are feasible. So which option should I go for knowing that the remote users are only about 10.
Client doesn't no Ganymede or RADIUS should go for statis userid/pass set up on PIX525?
Any idea, advice, suggestion is welcome. Thanks in advance
Kind regards
ngtelecom
Hello
Option 1
In my opinion, is the best solution because the PIX 525 will act as a firewall and the VPN server.
Then, all the clients connect via VPN using Cisco's VPN IPsec client software.
Option 2
The advantage of this option is that you do not need to install VPN software on clients (not a problem, only 10 clients)
The problem is that it does not come with split tunneling and don't provide as good protection as Cisco software.
Option 3
This is also valid, and you can do an EasyVPN connection where the 525 is the server and the 501 to the customer.
Local authentication on the PIX 525 sounds great.
As a recommendation, the PIX are EoS and the replacement are the ASAs.
It will be useful.
Federico.
Tags: Cisco Security
Similar Questions
-
Hello friends...
I configured pix 525 for easy vpn. About 100 to 200 people will use this service. I don't have much knowledge about the radius and tacacas servers. Is enough local database for extended authentication or do I have to configure the server for it?
Kind regards.
Xauth is recommended and can be done with the local database or using RADIUS. All Win2k / 2 k 3/2008 server includes a RADIUS as part of the operating system as IAS server or the NPS server.
Just to add more security / flexibility and centralize data/configuration for all large organizations, it is necessary. If you think that the strength of users will not develop in the future, you can continue with the local database only.
Here is a document where you need to study more on this subject.
How to add authentication (Xauth) AAA PIX IPSec 5.2 and later versions
http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_tech_note09186a008010a206.shtml
Kind regards
Jatin kone
-Does the rate of useful messages- -
VPN site to site Pix 525 ver7.2 (2) and Pix 501 ver 6.3
Hello!!
I have problems to establish a vpn between two pix.
The first pix 525 a version 7.2 (2) an another Pix version 6.3 has this it is not run by myself.
The fixed phase 1 but send the associated messages
can help me
Thank you
I'm glad you got it working now :)
Please evaluate the useful messages.
Concerning
Farrukh
-
Problems with VPN PIX 525 Lan-to-Lan Cisco 2610XM
Hello world
I have a VPN with PIX 525 versi problems? n 7.2 (1) and Cisco 2610XM Version 12.3 (18). When start the PIX, all tunnels works well, but 6-7 days, some of the tunnels do not work properly. Traffic passes the tunnel with some networks, but not with all networks. Sometimes the tunnel descends and it is imposible to go upward.
Attach them files are the "debug crypto isakmp" in both devices.
Thank you and sorry for my bad English
If your configuration of the tunnel on router 7500 series, the tunnel interface are not supported for politicians to service in the tunnel interfaces on 7500
-
Router vpn site to site PIX and vpn client
I have two on one interface on the pix vpn connections that terminate VPN. client vpn and VPN site-to-site have passed phase one and two and decrypt and encrypt the packets. However as in another post I can not ping through the l2l vpn. I checked this isn't a nat problem a nd two NAT 0 on the pix and the NAT on the router access lists work correctly.
ISAKMP crypto RTR #show its
IPv4 Crypto ISAKMP Security Association
status of DST CBC State conn-id slot
66.x.x.x 89.x.x.x QM_IDLE 2001 0 ACTIVEIPv6 Crypto ISAKMP Security Association
local ident (addr, mask, prot, port): (192.168.2.0/255.255.255.0/0/0)
Remote ident (addr, mask, prot, port): (192.168.10.0/255.255.255.0/0/0)
current_peer 66.x.x.x port 500
LICENCE, flags is {origin_is_acl},
#pkts program: 23583, #pkts encrypt: 23583 #pkts digest: 23583
#pkts decaps: 18236, #pkts decrypt: 18236, #pkts check: 18236
compressed #pkts: 0, unzipped #pkts: 0
#pkts uncompressed: 0, #pkts compr. has failed: 0
#pkts not unpacked: 0, #pkts decompress failed: 0
#send 40, #recv errors 0local crypto endpt. : 89.x.x.x, remote Start crypto. : 66.x.x.x
Path mtu 1380, ip mtu 1380, ip mtu BID Dialer0
current outbound SPI: 0xC4BAC5E (206285918)SAS of the esp on arrival:
SPI: 0xD7848FB (225986811)
transform: aes - esp esp-sha-hmac.
running parameters = {Tunnel}
Conn ID: 3, flow_id: Motorola SEC 1.0:3, card crypto: PIX_MAP
calendar of his: service life remaining (k/s) key: (4573083/78319)
Size IV: 16 bytes
support for replay detection: Y
Status: ACTIVEthe arrival ah sas:
SAS of the CFP on arrival:
outgoing esp sas:
SPI: 0xC4BAC5E (206285918)
transform: aes - esp esp-sha-hmac.
running parameters = {Tunnel}
Conn ID: 4, flow_id: Motorola SEC 1.0:4, card crypto: PIX_MAP
calendar of his: service life remaining (k/s) key: (4572001/78319)
Size IV: 16 bytes
support for replay detection: Y
Status: ACTIVEoutgoing ah sas:
outgoing CFP sas:
Expand the IP NAT access list
10 deny ip 192.168.2.0 0.0.0.255 192.168.10.0 0.0.0.255 (21396 matches)
20 permit ip 192.168.2.0 0.0.0.255 everything (362 matches)
Expand the IP VPN_ACCESS access list
10 permit ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255 (39724 matches)I looked on the internet and that it points to a routing error when packets are being encrypted and decrypted, but you can't do a ping on the binding. However when I test the connection I did not enter any of the static routes that networks are connected directly on each side of the pix and the router. any help would be a preciated as I think there's maybe something is blocking the ping to reach the internal network at the end of pix with a configured access list.
is ping failure of the only thing between the site to site VPN? and assuming that all other traffic works fine since it decrypts and encrypts the packets.
If it's just ping, then activate pls what follows on the PIX:
If it is version 6.3 and below: fixup protocol icmp
If it is version 7.0 and higher: select "inspect icmp" under your political map of the world.
Config complete hand and on the other could help determine if it's a configuration problem or another problem.
-
Hello
I have configured the PIX to make connections VPN to VPN clients and customers can see the entire network. How to configure the VPN to see only 2 guests to my network and nothing else?
Concerning
Kim Loefqvist
You could do this is to change your
inside_outbound_nat0_acl access list to allow the vpn to the subnet traffic from these 2 hosts rather than "all".
HTH
-
Q for PIX-525 spec (failover FE) and the GBIC
Qestion for PIX-525 spec.
1 PIX-525-UR-GE-BUN(2GE + 2FE). I want to use 2GE as inside and outside interface and failover FE. I found a doc who must use the GE model 535 failover. Is it supports statefull failover FE model 525?
2 PIX-1GE-66 map PIX 525, is the built in card GBIC interface, or do I module GBIC order (ex, WS-G5484) to put into the card?
Thank you
1. the restriction on the use of a dynamic rollover interface that corresponds to the fastest interface on the PIX is the PIX 535. The PIX 525 cannot switch the line traffic GE rate if this restriction is lifted on the 525 platform. You can use a link FE on a PIX 525 as the dynamic link even if you have GE links as other interfaces.
2. the GE on the PIX interface card contains a multimode SC connector. No GBIC not necessary... just of cables.
I hope this helps.
Scott
-
Allowing ICMP and Telnet via a PIX 525
We are trying to build a new block of distribution to our backbone WAN. We are experiencing a problem when establishing ICMP and Telnet via the PIX. The following is known:
1 Ping and telnet to the 6509 and internal network works very well for the PIX.
2 Ping the 7206 for the PIX works just fine.
3 debug normal to see activity track ICMP for connections ICMP for the PIX of the network 6509 and internal; However, the debug shows nothing - no activity - during attempts to ping at a.b.5.18. (see below).
In short, all connections seem to be fine between the three devices, however, we can get ICMP and Telnet work correctly through the PIX.
The layout is:
6509 (MSFC) - PIX 525-7206
IP:a.b.5.1 - a.b.5.2 a.b.5.17 - a.b.5.18
255.255.255.0 255.255.255.240 255.255.255.240
(both)
networks: a.b.5.0 a.b.5.16
255.255.255.240 255.255.255.240
6509:
interface VlanX
Description newwan-bb
IP address a.b.5.1 255.255.255.0
no ip redirection
router ospf
Log-adjacency-changes
redistribute static subnets metric 50 metric-type 1
passive-interface default
no passive-interface Vlan9
((other networks omitted))
network a.b.5.0 0.0.0.255 area 0
default information are created
PIX 525:
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
nameif ethernet2 security10 failover
hostname XXXXXX
domain XXX.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 1720
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol 2000 skinny
names of
access ip-list 102 permit a whole
access-list 102 permit icmp any one
access-list 102 permit icmp any any echo
access-list 102 permit icmp any any echo response
access-list 102 permit icmp any any source-quench
access-list 102 permit everything all unreachable icmp
access-list 102 permit icmp any one time exceed
103 ip access list allow a whole
access-list 103 allow icmp a whole
access-list 103 permit icmp any any echo
access-list 103 permit icmp any any echo response
access-list 103 permit icmp any any source-quench
access-list 103 allow all unreachable icmp
access-list 103 allow icmp all once exceed
pager lines 24
opening of session
timestamp of the record
logging buffered stored notifications
interface ethernet0 100full
interface ethernet1 100full
interface ethernet2 100full
Outside 1500 MTU
Within 1500 MTU
failover of MTU 1500
IP address outside a.b.5.17 255.255.255.240
IP address inside a.b.5.2 255.255.255.240
failover from IP 192.168.230.1 255.255.255.252
alarm action IP verification of information
alarm action attack IP audit
history of PDM activate
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
Access-group 103 in external interface
Route outside 0.0.0.0 0.0.0.0 a.b.5.18 1
Route inside a.0.0.0 255.0.0.0 a.b.5.1 1
Inside a.b.0.0 255.240.0.0 route a.b.5.1 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0: 10:00 udp 0:02:00 CPP 0: h323 from 10:00 0:05:00 sip 0:30:00 sip_media 0:02:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
RADIUS Protocol RADIUS AAA server
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
No sysopt route dnat
Telnet a.0.0.0 255.0.0.0 outdoors
Telnet a.0.0.0 255.0.0.0 inside
Telnet a.b.0.0 255.240.0.0 inside
Telnet a.b.5.18 255.255.255.255 inside
Telnet timeout 5
SSH timeout 5
Terminal width 80
Recognizing any help on proper routing through a PIX 525, given that all this is for a network internal.
on the 6509, why the int has a 24 subnet mask, when everything has a 28? If you try the 6500 ping.18, he thinks that it is on a local network, and there no need to route through the pix
Your access lists are confusing.
access-list # ip allowed any one should let through, and so everything that follows are redundant statements.
for the test,.
alloweverything ip access list allow a whole
Access-group alloweverything in interface outside
should the pix act as a router - you are effectively disabling all firewall features.
-
Will there be improvements made to the features of VPN configuration and firewalls in the ACC?
Future versions of CCA will have the ability to set up the VPN site-to site on UC520s, UC540s and SR520s without having to use the Multisite Manager or CLI? With non-SBCS Cisco VPN products have a Cisco's GUI to configure site-to-site VPNs. The UC520, UC540 and SR520 are the only Cisco products (with the exception of products that have reached end of life status) who do not have this capability in a sort of Cisco's GUI (apart from the Multisite Manager of CCA 2.1 and later versions).
Future versions of CCA will allow you to modify the firewall on UC520s, UC540s and SR520s rules without having to resort to the CLI?
Almost all Cisco products, except for UC520, UC540 and SR520 series products, have a Cisco's GUI to configure these features. The SA520 and SA540, these features can be configured in the web GUI. The Cisco ISR, these features can be configured through SDM or CCP. CCA has always had the ability to fix UC520 unit, but he had not the possibility to fine-tune the settings of firewall and security, unlike the web interface SA500, SDM or CCP.
Reasons why having the skills to the CCA is important:
- These characteristics are indicated on the data of UC520, UC540 and SR520 sheets
- The opportunity to refine and verify access control lists in the ACC can accomplish the following:
- Ability to comply with HIPAA, Sarbanes-Oxley, PCI, etc.
- Improved troubleshooting
- Eliminates the need to use CLI to refine or verify the firewall settings
- VPN site to site can currently be configured via CLI or the CCA Multisite Manager
- Multisite Manager CCA can be used for virtual private networks between UC500 or SR520s placed in front of UC500 units units
- CCA Multisite Manager cannot be used for VPN between autonomous SR520 units, or between a unit UC500 and endpoint non-UC500 (with the exception of a placed in front of a UC500 unit SR520)
- All images IOS Supportepar UC520 units, UC540 and SR520 routers have firewalls and VPN capabilities described here
Hi John,.
The ACC is a configuration tool for platforms that are part of the SBCS solutions. Multisite manager is the approach we take to configure a VPN site. Enchancements in customization of the firewall and access lists is something we plan to put on the roadmap. We will continue to improve the CCA to meet these requirements. We will schedule to get these features added in the 2010 calendar.
Thank you
Saurabh
-
How to configure NAT for Hyper-V on laptop with wifi, wired and vpn connectivity
Me, as I suspect a lot of people, I have a laptop with WiFi connection, cable connection and VPN connection (Cisco AnyConnect), which
also uses a virtual adapter (activated when active). I searched for some time a way to be able to move to
Hyper-V in VirtualBox. Blocker full for me is the need for a lot of my virtual machines to be able to connect to the
Internet through 'the connection active' in the way that VirtualBox and VMWare Workstation/Player through their NAT feature.
I'm not a networking wait, but after looking around, can't seem to find something that is simple enough for me to configure,
with a minimum of resources, which allows me to connect a Hyper-V virtual network via a simple NAT device adapter
all three potential network connections - most seem to not assume that one connection out of the machine, which of course does not
me what I want.
Three questions:
1. is there a Windows application available that an adapter (like loopback) internal which acts as a real NAT device to one of the surfaces
external access via the active network connections and through the Windows Firewall and any other antivirus, components etc. for
the road to (i.e. behaves like a "normal app" inside Windows for internet access)? It would be the best option, because it would be
"always there" when I run virtual machines
2. display of my lack of knowledge around this feature, don't RRAS (and I know that this is not an option "minimum contact") allow you to
Connect an internal network adapter to several external network adapters?
3. on the Linux/OpenBSD various base/NAT routers, are everything that allow several external adapters and who are
relatively easy to set up (by an independent expert of the network)?
Really, we could do with this feature for Hyper-V on the desktop, but willing to work around him, if there is a way to at least the
use virtual machines, once it is easy to install.
Hello
The question is more suited in the TechNet forums. So I would say you mention the link and send the request in this forum for better support.
http://social.technet.Microsoft.com/forums/en-us/w8itpronetworking/threads
For any information related to Windows, feel free to get back to us. We will be happy to help you.
-
Card crypto controls lock-up PIX 525
Does anyone know why my PIX 525 crashes when I apply my a cryptomap both command line? I first apply the following ACL. But when I try to apply the first line of cryptomap my PIX locks and I have to restart... Any help would be greatly appreciated >
permit access ip xx.xx.0.0 255.192.0.0 list XXXXXtunnel xx.xx.18.0 255.255.255.0
access-list allowed sheep xx.xx.0.0 xx.xx.xx.0 255.255.255.0 xx.xx.0.0 ip
allowed to access-list acl-inner ip xx.xx.0.0 xx.xx.0.0 xx.xx.xx.0 xx.xx.xx.0
xxx_map 157 ipsec-isakmp crypto map
card crypto xxx_map 157 correspondence address xxx-tunnel
card crypto xxx_map 157 counterpart set xx.4.xx.xx
card crypto xxx_map 157 transform-set xxx_set
Hello
I came across this problem when there are other entries already exist under the same crypto map, and are already applied to an interface.
I found that by denying first crypto map interface command, change the config and re - apply the interface command then it will work very well.
So...
(1) no xxx_map interface card crypto outside
(2) place the lines of crypto map configuration
(3) interface xxx_map crypto map out
Of course, you will lose the existing tunnels if some already set up but then this happens if you reboot anyway!
It may be useful
-
With RW on PIX 525 SNMP community
I'm trying to configure SNMP on PIX 525 and Solarwinds use tool to download the config. When I try to download the config it tells me that the community string has read only rights. Y at - it give a way RW in PIX as in routers?
Thank you
Gilbert
For free, you can use Kiwi CatTools. You give names of username/password and it can connect to any Cisco device and upload the config. It can even create reports of diff on configs. Alternatively, you can provide a set of commands that you want to connect to devices provided and run it. It is in the same people doing the often preferred Kiwi Syslogd.
-
Inside Source NAT from the remote host and VPN from Site to Site
Hi all
I was in charge of the construction of a vpn tunnel with a firewall PIX of our business partner company and ASA of the other company of the firewall. Traffic will be A partner business users will access my company Citrix server. I want to source-pat the user traffic partner company to PIX of my business within the interface to its entry in my LAN to access my company Citrix server. The partner company will be PAT'ing their traffic from users to a single ip address - Let's say for discussion end is 65.99.100.101. There is the site to site vpn configuration, and configure nat be performed to allow this traffic in accordance with the above provisions.
I'm more concerned about the accuracy of the configuration of the domain encryption because NAT is involved in this whole upward. My goal is to NAT (of the other company company a) ip address to a routable ip address in my company network.
The fundamental question here is should I include the ip address of real source (65.99.100.101) of the company the user or IP natted (10.200.11.9) in the field of encryption.
In other words should the encryption field looks like this
OPTION A.
permit ip host 10.200.11.103 65.99.100.101
OR
OPTION B
permit ip host 10.200.11.103 10.200.11.9
I'm inclined to think it should look like OPTION A. Here's the part of MY complete SOCIETY of the VPN configuration. I've also attached a diagram illustrating this topology.
Thanks in advance,
Adil
CONFIG BELOW
------------------------------------------------
#################################################
Object-group Config:
#################################################
the COMPANY_A_NETWORK object-group network
Description company network access my company A firm Citrix
host of the object-Network 65.99.100.101
the MYCOMPANY_CITRIX_FARM object-group network
Description farm Citrix accessible Takata by Genpact
host of the object-Network 10.200.11.103
################################################
Config of encryption:
################################################
crypto ISAKMP policy 20
preshared authentication
3des encryption
sha hash
Group 2
life 86400
********************************
CRYPTO MAP
********************************
crypto Outside_map 561 card matches the address Outside_561_cryptomap
card crypto Outside_map 561 set peer 55.5.245.21
Outside_map 561 transform-set ESP-3DES-SHA crypto card game
********************************
TUNNEL GROUP
********************************
tunnel-group 55.5.245.21 type ipsec-l2l
IPSec-attributes tunnel-group 55.5.245.21
pre-shared-key * 55.5.245.21
*******************************
FIELD OF CRYPTO
*******************************
Outside_561_cryptomap list extended access permitted ip object-group MYCOMPANY_CITRIX_FARM-group of objects COMPANY_A_NETWORK
###########################################
NAT'ing
###########################################
Global (inside) 9 10.200.11.9
NAT (9 genpact_source_nat list of outdoor outdoor access)
genpact_source_nat list extended access permit ip host 65.99.100.101 all
genpact_source_nat list extended access permit ip host 65.99.100.102 all
! For not natting ip address of the Citrix server
Inside_nat0 list extended access permitted ip object-group MYCOMPANY_CITRIX_FARM-group of objects COMPANY_A_NETWORK
You must include pre - nat ip 65.99.x.x in your crypto-card, like you did.
For me, config you provided here looks good and meets your needs.
One thing, I do not see here the nat rule real 0, but there is the ACL that NAT. probably, you just forgot this rule.
65.99.100.101 #sthash.mQm0FIOM.dpuf
-
Unusual routing VPN configuration
Hi, I use a PIX 525 to our main site, and one of the remote sites using a router in 1721. The 1721 connects to the LAN. All traffic is forced to use a virtual private network between the remote sites and main. The intention was to force the internet traffic from the remote site through the filter of content on the main site, rather than use the split tunneling to leave straight out to the internet through their DSL connection.
The problem is that, of course, internet traffic this VPN comes back the PIX, Internet. Our content filter reflects the way of the switch connected to the internal interface of a PIX.
I need to find a way to route VPN traffic from the remote site to an ethernet on the PIX interface which will be connected to our switch stack. If I can do this without breaking the VPN, traffic should be filtered on the main façade and through VPN to the remote side.
Yes, you're pretty much toast unless:
you choose to configure a web proxy to Headquarters and set up remote PCs to use it. In this way, they use a proxy that is located behind the 8e6.
Same pix os 7 will not help, as all nat occurs on this topic - just remote communication will flow through the pix, never hit its physical interface or internal switch ports inside and so the 8e6.
-
LDAP AAA for VPN configuration
Preface: I'm all new to Cisco Configuration and learn as I go.
I'm at the stage of configuration LDAP to configure a VPN on ASA 5520, software release 8.3 (1). Previously the programme installation and RADIUS authentication successfully tested, I tried to use similar logic to implement the LDAP authentication/authorization. I have acquired a service account that queries the pub for the identification of the registered user information. My main resource was the following Manual: Cisco ASA 5500 Series Configuration Guide using the CLI Software Version 8.3. I did initially configurations by using ASDM, but could not get tests to succeed. So I amazed the ASDM configs and went to the CLI. Here is the configuration.
AAA-server AAA_LDAP protocol ldap
AAA-server host 10,20,30,40 (inside) AAA_LDAP
Server-port 636
LDAP-base-dn domain.ad
LDAP-scope subtree
LDAP-naming-attribute uid
LDAP-login-password 8 *.
LDAP-connection-dn cn = commonname, OU = ou01, or = ou02, dc = domain, dc = ad
enable LDAP over ssl
microsoft server type
LDAP-attribute-map LDAP_ATTRIB---
type tunnel-group ASA_DEFAULT remote access
attributes global-tunnel-group ASA_DEFAULT
authorization-server-group AAA_LDAP---
LDAP attribute-map LDAP_ATTRIB
name of the MemberOf IETF Radius-class card
map-value MemberOf "VPN users' asa_default---
I tested all the naming-attribute ldap alternatives listed with the same results.
When I test the authentication using this configuration, I get the following error: ERROR: authentication server does not: AAA Server has been deleted
When I test authorization using this Setup, I get the same error (except for the word permission instead of authentication).
I am at a total loss. Any help would be appreciated.
I would use ldp.exe to see if you can make sure that the sytnax of your ldap-connection-dn is just as you have in your config, it really helps just copy and paste.
The problem I see is the following:
[210] link as st_domadm
[210] authentication Simple running to st_domadm to 10.20.30.30
[210] simple authentication for st_domadm returned credenti invalid code (49) als
[210] impossible to link the administrator returned code-(1) can't contact LDAP erI suppose your ldap-connection-dn is st_domadm and you try to test with the administrator account?
Thank you
Tarik
Maybe you are looking for
-
Satellite M40-192 - Linux and network
English (but not perfect ;))):First I want to install Suse Linux 10.0 on my new laptop (Toshiba Satellite M40-192), but Installation did not work, and so I had to install linux in text mode. Now, there is another problem with Suse Linux... NETWORK. T
-
Unable to access facebook via the bing toolbar
"When I press on the facebook icon to the left of the toolbar bing, Iget' loading '... and then a message that can not connect, error of bing bar. Try again later. This was never a problem until this morning 01/08/12. Thank you.
-
Hello We use VBAI 2010 and a smart camera for a vision project. In VBAI we have programmed a programm with some States that are connected by transitions. Now, we have a question: If there are several state transitions which are true which will be tak
-
POWER VAULT NX200 E1810-SERVICE TAG: 96NR45J [GRO]
BUONGIORNO IF E' VERIFICATO A PROBLEMA KNEW QUESTO SERVER, SUL DISPLAY DEVICE QUESTA WRITTEN FORM: CLAIRE AND DRIVE HARD O FAULT EXAMINATION SALT PER FAVORE DITECI COSA FARE WE CAN. GRAZIE MILE. TPM Srl - Salvetti AdalgisaCed administrationBy Tonino
-
Parsing XML from a Variable String
I looked at the docs and spending the afternoon at the research on the web and can't understand this. It's a question of combination SAX parser and java.io. The SAX parser will be an InputStream or an InputSource, but I can't seem to find a way to