Port forwarding with PIX 501
I try to get my PIX 501 to forward traffic on port 1412 with TCP and UDP to use Direct Connect, and the problem I have is I can connect to a DC hub, but cannot establish connections with users.
I added the following to the default configuration from the factory with a partial success:
outside access list permit tcp any host 192.168.100.20 eq 1412
access-list outside permit udp any host 192.168.100.20 eq 1412
public static tcp (indoor, outdoor) interface 1412 192.168.100.20 1412 netmask 255.255.255.255 0 0
public static tcp (indoor, outdoor) interface 1412 192.168.100.20 1412 netmask 255.255.255.255 0 0
In the debug log set to the access list I rule this type of errors:
Deny tcp src outside other.users.ip.addr/3099 dst within the my.public.ip.addr/1412 by access-group "access_outside_in".
TCP request discarded outside my.public.ip.addr/45961 other.users.ip.addr/2362
I'm quite lost as to why it does not work when I think it should. I tried several ways, opening of port ranges and no chance for a transfer of the port sucsessful.
You can change you, outside the ACL to the following:
outside access list permit tcp any host eq 1412
access-list outside permit udp any host eq 1412
outside access-group in external interface
Save again with: write mem and also issue: clear xlate
I would like to know if it works.
Jay
Tags: Cisco Security
Similar Questions
-
Problem of recovery of password with pix 501
Hello
my organization uses a firewall 501 pix with version 6.2 of the software. After I lost the password I tried earasing using the faq provided on this site (using the file np62.bin through a TFTP server).
Unfortunately, I can not connect using the password default "cisco."
Thank you
Raphaël Cohen, University of Tel Aviv
Hello Raphael,.
You need to connect to the PIX via the port on the PIX console. If you deleted the passwords, then (as mentioned before), there is NO password to access privileged EXEC access just don't hit back, now, you will need to configure a password to "enable" with command > pix # enable password - the password is case-sensitive and can be a combination of characters and numbers the length of the password is limited to 16 characters.
You can now set access telnet as well i.e. config mode > pix (config) # telnet [masque_sous] [interface_name]
example: (in config mode) telnet 192.168.10.10 255.255.255.0 inside
Good idea to use the static IP address for the above, makesure to save your config with cmd: write memory
Hope this helps - Jay
PS. Thanks to vote this post if it helped you so that other members can use it if they have the same problem you have - that helps! Thank you.
-
Hi, I am trying set up port forwarding on a PIX 515 running version 6.3 (3) and nowhere fast.
The idea is to redirect the traffic from port 25 to port 2525 and the static command, I tried is as follows:-
static (inside, outside) tcp 25 X.X.X.X Y.Y.Y.Y 2525 netmask 255.255.255.255 0 100
Where X.X.X.X is a public address and Y.Y.Y.Y is a private address.
Also, I added a line of the access list to port 25 for incoming host X.X.X.X.
The redirect does not work. I even went as far as the test on a web server, forwarding port 80 to 8080, but traffic is sent to port 80, regardless of the static command.
Can someone please tell me what I'm doing wrong? My understanding is that the port redirects were possible with the later pix 6.0 or version software.
Thanks in advance,
Rick
No sweat. I almost always overlook the simplest things so when someone else has a problem, I start easy and move up. Usually solves the problem more quickly.
As for your other question, Yes, it is normal. Remember that static is bi-directional translations. Thus, when you added the port information in the static command to the SMTP server, the PIX only knows now to translate packets from TCP/2525 (I think that's how you had it). When your mail server tries to send outgoing mail, the source port will be an ephemeral port (IE not 2525 probably). So, I usually people do something like this:
static (inside, outside) tcp 1.1.1.1 25 10.1.1.1 2525 netmask 255.255.255.255
NAT (inside) 2 10.1.1.1 255.255.255.255
Global 2 1.1.1.1 (outside)
It takes care of everything in both directions of the 10.1.1.1 host (for example).
Hope that this helps explain the issues. Good luck.
Scott
-
Problem setting up Port Forwarding with two routers.
I can't set up by Linksys RT31P2 and routers port forwarding WRT160Nv3.
My setup is Webstar Modem = RT31P2 = WRT160N = Mac OS 10.6.5. (No configurable modem and ISP do not prevent port forwarding. It comes with two Linksys routers).
I had a Monty Python-going around with the support of Cisco cat; and follow up with telephone assistance in which the agent knew nothing about port forwarding and his supervisor expressed the view that it was not possible with two routers. Sigh.
If anyone can help me with step by step specific and simple instructions to configure routers. I know that the basic procedures. I'm not clear, what exactly changes on routers.
I read that portforward.com has to say and it does not work so I must be misunderstanding something.
The ip address of my computer is 192.168.1.103. Are the last three digits of this speech concluded the two routers in the area on the port forwarding page? What other changes should be done what router?
I know the port numbers that I use are OK because I can implement successfully if I connect to one or other of the routers (but not both), and my software of p2p shows port are open.
Any help and suggestions most welcome.
If you set up as I have suggested that you have only a single LAN that will be using in your addresses * 192.168.15 case. So in your case:
1. change the address LAN IP of 192.168.1.1 to 192.168.15.2 WRT.
2 disable the DHCP server.
3. connect the LAN of the WRT port to port LAN of the RT.That's all. Disable the DHCP server will not affect whatever it is that you're connected LAN - LAN and DHCP server on the RT is still operational.
After the change, previously the WRT computers may require a reboot to get a new address 192.168.15. *.
Your computer to which you are transferring must have an IP static and not dynamic (or variable). Check the current IP information on this computer. It must have an IP address like 192.168.15.103, mask 255.255.255.0, gateway 192.168.15.1 subnet and DNS 192.168.15.1 server or maybe two other IP addresses instead. Note DNS servers if you do not 192.168.15.1.
Then configure a static IP address on the computer. Use something like 192.168.15.10, 255.255.255.0 gateway 192.168.15.1 and the DNS servers you found before.
After this implement 192.168.15.10 port forwarding.
-
RVS4000, port forwarding - with - IP-based ACL
G ' Day!
I want to know if it is possible to enable port forwarding and paste an IP based ACL on the attacker.
Scenario:
I replaced my gateway linux with a RVS4000 and reinstalled my linux machine as a file server with sshd running (now residing on my network behind the RVS4000).
I have forwarded port 22 on the RVS4000 on my linux server - it works as expected. Now I want to restrict which IP addresses which may connect to port 22, that I can't go to work.
After I forward port 22 to the linux server I can't control it with IP based ACL. Even if I deny all traffic to port 22, it will leave borrowing at the server linux as long as the port is active.
I am doing something wrong or if this isn't just intended to work the way I want?
acl based port will not work with the port forwarding on the device. Once you transfer the port are all allowede to enter this port. the acl will not take effect. I think that what you want to do the port binding is not a feature of this device.
-
I would like to access my PC location xyz. How can I open port 22 access to my pc. I use pix 501.
Can anyone provide commands to open the port so that I can access my pc.
Thank you
totally agree because only 3 commands are needed.
list of allowed inbound tcp access any eq 22
public static tcp (indoor, outdoor) interface 22 22 netmask 255.255.255.255 0 0
clear xlate
However, all of these commands are missing in the config you have posted.
-
Problems with PIX 501 and Server MS Cert
Hi all
I have two problems with my PIX 501:
1. registration works well. The pix has a certificate and use it with SSL and VPN connections. But after a refill, the pix certificate is lost and it has regenerated again self-signed certificate!
Yes, I wrote mem and ca records all!
2. at the request of ca CRL
, I get the following debugging: Crypto CA thread wakes!
CRYPTO_PKI: Cannot be named County ava
CRYPTO_PKI: transaction GetCRL completed
Crypto CA thread sleeps!
CI thread wakes!
And the CRL is empty.
Does anyone have any idea?
Bert Koelewijn
Not sure about 1, but 2 is usually caused by the COP (Point of Distribution of CRL, basically the situation where the PIX can download the Revocation list from) listed in cert CA is in a format the PIX does not, generally an LDAP URL.
Check the following prayer:
Open the administration tool of CA (Certification Authority) then
(1) right click on the name of CA and choose 'properties '.
2) click on the tab "Policy Module".
3) click on the button "configure."
4) click on the tab "X.509 extensions".
> From there, it can display the list of the "CRL Distribution Points".
Turn off everything that isn't HTTP.
You need to reinstall the CERT in the PIX, I think, but then it should be able to download the CRL through HTTP instead of LDAP.
-
Limited number of ports forwarding with WAG54G2?
Hello, I have a simple question... I'm looking to buy a WAG54G2, I downloaded the manual to check if there was a limit of ports to send because I know that it was a limitation on previous models, but I've found no information about it.
Please can someone tell me if there is still such a restriction on this model (I think limit 10 ports on WAG54G)?
Thank you
Colin.
WAG54G2 have still 10 entries for Port Forwarding (see this ), however, you can give a range of ports if you have more than 10 entries... (for example: If you have 11, 36, 48, 1014, 5214, 6452, you can just give him a range say: 11-6452, it will cover all ports between 11 and 6452)...
-
Help!
I'm trying to set up VPN on my PIX 501. I have no experience of the PIX and have no idea where to start!
Any help will be greatly appreciated.
Thank you
Bennie
access list allow accord a
where is the name of the access list that you applied the entrants to your external interface. You may also allow accord coming out, if you have a list of incoming configured access to your inside interface.
-
Problem with PIX 501->; L2L 1721 VPN
I am setting up a site to site vpn according to the http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008051a69a.shtml.
I want to connect 192.168.105.0/24 and 192.168.106.0/24.
PIX01 is 192.168.106.1, with dynamic external IP (B.B.B.B)
RTR01 is 192.168.105.1, with dynamic external IP address (I'm just using DHCP current address of the ISP as A.A.A.A in the config of PIX01 - this is a temporary application, not critical where I can update the address if necessary)
It seems that the VPN tunnel is established but traffic does not return the router to the pix. I temporarily hosted all of the traffic on indoor/outdoor PIX interfaces (and icmp).
If I enable icmp debug I see ping requests from the client to 192.168.106.100 internal interface of the router (192.168.105.1), but no return icmp:
On PIX01:
180:-Interior ICMP echo request: 192.168.105.1 ID = 1 length = 40 seq = 298 192.168.106.100
181:-Interior ICMP echo request: 192.168.105.1 ID = 1 length = 40 seq = 299 192.168.106.100
182:-Interior ICMP echo request: 192.168.105.1 ID = 1 length = 40 seq = 300 192.168.106.100
183:-Interior ICMP echo request: 192.168.105.1 ID = 1 seq = length 301 = 40 192.168.106.100On RTR01:
* 03:40:46.885 22 dec: ICMP: echo responded, 192.168.105.1 src, dst 192.168.106.100
* 03:40:51.713 22 dec: ICMP: echo responded, 192.168.105.1 src, dst 192.168.106.100
* 03:40:56.713 22 dec: ICMP: echo responded, 192.168.105.1 src, dst 192.168.106.100
* 03:41:01.709 22 dec: ICMP: echo responded, 192.168.105.1 src, dst 192.168.106.100Output of running sh crypto isakmp his:
PIX01 (config) # sh crypto isakmp his
Total: 1
Embryonic: 0
Src DST in the meantime created State
A.A.A.A B.B.B.B 0 1 QM_IDLERTR01 #sh crypto isakmp his
status of DST CBC State conn-id slot
A.A.A.A B.B.B.B QM_IDLE 1 0 ACTIVEOut of HS crypto ipsec his:
PIX01 (config) # sh crypto ipsec his
Interface: outside
Crypto map tag: IPSEC, local addr. B.B.B.Blocal ident (addr, mask, prot, port): (192.168.106.0/255.255.255.0/0/0)
Remote ident (addr, mask, prot, port): (192.168.105.0/255.255.255.0/0/0)
current_peer: A.A.A.A:500
LICENCE, flags is {origin_is_acl},
#pkts program: 103, #pkts encrypt: collection of #pkts 103, 103
#pkts decaps: 0, #pkts decrypt: 0, #pkts check 0
compressed #pkts: 0, unzipped #pkts: 0
#pkts uncompressed: 0, #pkts compr. has failed: 0, #pkts decompress failed: 0
#send 12, #recv errors 0local crypto endpt. : B.B.B.B, remote Start crypto. : A.A.A.A
Path mtu 1500, overload ipsec 56, media, mtu 1500
current outbound SPI: 7cb75998SAS of the esp on arrival:
SPI: 0xb896f6c6 (3096901318)
transform: esp - esp-md5-hmac.
running parameters = {Tunnel}
slot: 0, conn id: 1, crypto card: IPSEC
calendar of his: service life remaining (k/s) key: (4608000/3151)
Size IV: 8 bytes
support for replay detection: Ythe arrival ah sas:
SAS of the CFP on arrival:
outgoing esp sas:
SPI: 0x7cb75998 (2092390808)
transform: esp - esp-md5-hmac.
running parameters = {Tunnel}
slot: 0, conn id: 2, crypto card: IPSEC
calendar of his: service life remaining (k/s) key: (4607999/3151)
Size IV: 8 bytes
support for replay detection: Youtgoing ah sas:
outgoing CFP sas:
RTR01 #sh crypto ipsec his
Interface: Vlan600
Crypto map tag: IPSEC, local addr A.A.A.Aprotégé of the vrf: (none)
local ident (addr, mask, prot, port): (192.168.105.0/255.255.255.0/0/0)
Remote ident (addr, mask, prot, port): (192.168.106.0/255.255.255.0/0/0)
current_peer B.B.B.B port 500
LICENCE, flags is {}
program #pkts: 10, #pkts encrypt: 10, #pkts digest: 10
decaps #pkts: 10, #pkts decrypt: 10, #pkts check: 10
compressed #pkts: 0, unzipped #pkts: 0
#pkts uncompressed: 0, #pkts compr. has failed: 0
#pkts not unpacked: 0, #pkts decompress failed: 0
Errors #send 0, #recv 0 errorslocal crypto endpt. : A.A.A.A, remote Start crypto. : B.B.B.B
Path mtu 1500, mtu 1500 ip, ip mtu BID Vlan600
current outbound SPI: 0xB896F6C6 (3096901318)SAS of the esp on arrival:
SPI: 0x7CB75998 (2092390808)
transform: esp - esp-md5-hmac.
running parameters = {Tunnel}
Conn ID: 2002, flow_id: SW:2, crypto card: IPSEC
calendar of his: service life remaining (k/s) key: (4556997/3076)
Size IV: 8 bytes
support for replay detection: Y
Status: ACTIVEthe arrival ah sas:
SAS of the CFP on arrival:
outgoing esp sas:
SPI: 0xB896F6C6 (3096901318)
transform: esp - esp-md5-hmac.
running parameters = {Tunnel}
Conn ID: 2001, flow_id: SW:1, crypto card: IPSEC
calendar of his: service life remaining (k/s) key: (4556997/3076)
Size IV: 8 bytes
support for replay detection: Y
Status: ACTIVEoutgoing ah sas:
outgoing CFP sas:
I can provide more information if necessary.
Thanks in advance for any help,
CJ
ISAKMP uses UDP/500 and it is true he helped through phase 1 being upwards (QM_IDLE).
IPSec uses ESP or UDP/4500, and this is what must be authorized by the FW.
-
Help the PIX 501 - cannot access startup.html
I'm new to the network and has received a job to configure the PIX 501 firewall.
The fact is:
We use IP table rules as a firewall on a linux machine. My pc is connected to a switch. So I use the yellow network cable to connect the port of the Pix 501 0 to the port in the switch. Then I disconnect my pc of swich cable and plug into the port of the Pix 501 1.
My pc is to use a static ip address before. I try to change to automatically get an IP address, but it will not work. So I changed the setting and use the IP address originally. Pop up message network connection icon says that the local connection is enabled. But when I try to ping 192.168.1.1, request time-out. Also I can't acess the https://192.168.1.1/startup.html.
I have a look at Books Online cisco and shootings of disorder, but most of them talk about the configuration or more advance features. I'm still on the very basic level to try to connect to the firewall.
I hope someone can help me. All ideas and questions are welcome. Thank you.
Your IP address should be fine. You do not want to have the PIX connected to your local network, even if you have the Linux firewall as well as this will cause a conflict. Keep the PIX the LAN for now. Your DNS configuration will have no effect because the url you are trying to reach is based on the IP address and not the domain name if your PC has nothing to look for.
You have to check the cable that you use - if your PIX has only an 'inside' interface, then you must use a crossover cable. If he has four so it's built in switch for a straight cable will be fine. Is what PIX model?
After checking the cable - see if you can console in the firewall - use the blue cable that came with the PIX and set up a connection (hyper terminal) terminal with the help of 9600, 8, no 1. If you can console and then you can stick in a basic configuration you can get.
-
I played with port forwarding with my two cams of linksys and other 3 g wireless network web pages on my local network I want to access from the outside world. I have one to configure them to use other port 8081, but after a few experiments see it as useless.
I have a router linksys WRT54GL running dd - wrt V23 SP2 firmware and ports 80,81 and 443 (all in the field "port of") transmitted to cam1, cam2 and Western Digital NAS drive respectively. I found that because I'm port forwarding in any case, the two cams can continue to use port 80 and I 80 and 81 in the ' port of "or side defined WAN port 8080 bothers me to my router gui.
There's the rub for me, it is, I cannot use 80,81 and 443 of the side ports WAN routers forward my port, if I use a different port, I can't access anything whatsoever that is served as a web page. I discovered this when I installed the Transmission torrent client on my NAS drive, it has a web interface as well and uses the port 9091, however when I port transfer it via my router I can't web interface from outside my local network. If I change the WAN or 'port' 80 or 81 and let the 'port' to 9091 I get fine, but I need to disable the port front of webcam that uses this port.
I was going to get a 3rd and 4th IP Cam but will have the same problem, because it seems that only I can use ports 80, 81 and 443, and they are already exhausted. (I use 443 for secure access to my NAS drive) Change the port number in settings/options to 1024 or anything else works that if I leave it on the side of port forwarding LAN, WAN-side must always be 80 or 81.
The only way I can see around this is to create a page that will reside on my router or my drive NAS I can show more out of a camera on it - something, I want to do in any case.
PS. I do not use TZO, but I use dyndns so my dns is myname.dyndns.org.
Finally understood that there is a problem with blocked ports from my place of work, which is where I tried to connect from. When I connected to the internet with my laptop computer and aircard, I was able to get to ok. My solution when I want to check on the torrents of the work is to connect to my router GUI work, changing the port 80 or 81 and disable the webcam on this address.
-
port forwarding TCP on pix 501
can you tell me how to port forward or open tcp 21 and 1024-2774 for the end user of a backup system remotely via the pix Manager or regular here is a copy of my config thanks my apologies if this is a little wave building configuration...
: Saved
:
6.2 (2) version PIX
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
activate the password
pixfirewall hostname
domain ciscopix.com
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol they 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol 2000 skinny
names of
list of access allow-permit tcp any any eq www
access list permits allow tcp everything any https eq
list of access allow-permit udp any any eq isakmp
list of access allow-permit udp any any eq field
list of access allow-permit tcp any any eq telnet
list of access allow-permit tcp any any eq ftp
access list permit to allow icmp a whole
access list allow allow an entire esp
list of access allow-permit tcp any any eq ssh
list of access allow-permit tcp any any eq - ica citrix
list of access allow-permit tcp any any eq pop3
list of access allow-permit tcp any any eq smtp
list of access allow-permit tcp any any eq aol
access list, allow-in allow an entire esp
access list allow component snap permit udp any any eq isakmp
access list, allow-in allow icmp a whole
access list allow component snap permit tcp any any eq ssh
pager lines 24
interface ethernet0 10baset
interface ethernet1 10full
Outside 1500 MTU
Within 1500 MTU
IP address outside x.x.x.226 255.255.255.240
IP address inside 192.168.1.1 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
location of PDM 192.168.1.3 255.255.255.255 inside
location of PDM 192.168.1.5 255.255.255.255 inside
location of PDM 192.168.1.6 255.255.255.255 inside
location of PDM 192.168.1.7 255.255.255.255 inside
location of PDM 192.168.1.8 255.255.255.255 inside
location of PDM 192.168.1.9 255.255.255.255 inside
PDM location x.x.x.88 255.255.255.255 outside
location of PDM 192.168.1.10 255.255.255.255 inside
location of PDM 192.168.1.11 255.255.255.255 inside
PDM logging 100 information
history of PDM activate
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
public static x.x.x.227 (Interior, exterior) 192.168.1.9 netmask
255.255.255.255 0 0
public static x.x.x.228 (Interior, exterior) 192.168.1.8 netmask
255.255.255.255 0 0
public static x.x.x.229 (Interior, exterior) 192.168.1.3 netmask
255.255.255.255 0 0
public static x.x.x.230 (Interior, exterior) 192.168.1.5 mask
255.255.255.255 0 0
public static x.x.x.231 (Interior, exterior) 192.168.1.7 netmask
255.255.255.255 0 0
public static x.x.x.232 (Interior, exterior) 192.168.1.6 netmask
255.255.255.255 0 0
Access - allows to group in the interface outside
allow-out access-group in the interface inside
Route outside 0.0.0.0 0.0.0.0 216.215.244.225 1
Timeout xlate 0:05:00
Timeout conn 0 half-closed 01:00:10: 00 udp 0: CPP 02:00 0:10:00 h323
0:05:00 sip 0:30:00 sip_media 0:02:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
RADIUS Protocol RADIUS AAA server
AAA-server local LOCAL Protocol
Enable http server
http 192.168.1.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
Permitted connection ipsec sysopt
No sysopt route dnat
Telnet 192.168.1.0 255.255.255.0 inside
Telnet timeout 5
SSH timeout 5
dhcpd address 192.168.1.2 - 192.168.1.33 inside
dhcpd dns 64.89.70.2 64.89.74.2
dhcpd lease 2000000
dhcpd ping_timeout 750
dhcpd outside auto_config
dhcpd allow inside
Terminal width 80
Cryptochecksum:XXXXX
: end
[OK]
Hello
Port forwarding is different to allow ports through the firewall. I guess you meant allow tcp/21 and 21 1024-2774, right port?
You need the following lines
access list allow component snap permit tcp any any eq ftp
access list allow component snap allowed tcp everything any 1024 2774 Beach
You can be more specific and can replace "any" with the actual IP addresses
Thank you
Nadeem
-
Is it possible to forward port 80 to internal ip on a PIX 501?
I have a PIX 501, which made PAT / internal DHCP for my network. I want to forward all queries [80] http to an internal web server.
Thank you
Sepyh...
You can use port forwarding to get there.
Here is an example configuration:
http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_tech_note09186a0080094aad.shtml#port
Hope this helps,
-Nairi
-
Need help with the port forwarding for a XBox remote Streaming
I have a router R6200v2 and need help with port forwarding.
I came across this set of instructions for setting up stream port forwarding XBox remotely from anywhere
http://kinkeadtech.com/2015/07/how-to-stream-Xbox-one-to-Windows-10-from-anywhere-with-Internet/
I have no idea when it comes to such things and I want to make sure I do it correctly without messing up my existing home network.
Port Forwarding and triggering Port pages setup look very different from what the guy uses. Can someone walk me through what I do to set up please?
Hi @varxtis,
You must enter them in the field for a start external Port and external completion Port. You will need to send individually except for the range of 49000-65000. The steps are as follows.
1. create a Service name (it could be something else that you cannot use the same service name twice. Ex. XBOX1, XBOX2 and so forth.)
2. Select the type of service (TCP, UDP or both)
3 entry 5050 times a start external Port and external endpoints.
4. Select the IP address of your XBOX.
5. Select apply.
6 do the same for other port numbers. To the beach, use 49000 for the external departure Port and for the external completion Port 65000.
Kind regards
Dexter
The community team
Maybe you are looking for
-
Photo backup not file photo library
I have a lot of pictures, all placed in my library of Photos under Photos OS X App folder. This file is supported by the Time Machine software and backup to CrashPlan. But I also want to save all my photos in the form of images - not inside a folder
-
Laser Jet 500 color M551: 49.38.07 LJ 500 device error
After a sever thunderstorm and lightening, I have a 49.38.07 error code of the unit on the screen. How to clear and / or solve the problem? Could not find info on the LJ 500 M551 color printer. Power supply? Access Control Panel? Thank you.
-
Downloaded this many times. He keeps reappearing even after a reboot.
-
Can someone tell me what does that kind of thing below? You guys need to know what it says. Right! Please give me an idea of what it tells me. Signature of the problem: Problem event name: BlueScreen The system version: 6.0.6002.2.2.0.768.3 Locale
-
Work stopped for blackBerry Smartphones
So I have a Torch 9800 and last night and randomly turned off and won't turn back on. My first instinct was to remove the battery, but it did not work. I then loaded, without the SIM card in as I passed on a new phone and he left all night. In the mo