QoS is supported on the Cisco PIX 501 or 506th?
Hello
There is no mention of QoS in technical for the PIX 501 and 506 records but nothing for the 515. PIX OS 7.x configuration guides do not mention specific material support.
Does anyone know if QoS is taken care of in the 501 or 506th - I need support lines expectations for VoIP over IPSec.
Thank you
Chris
QoS is supported in 7.x code, you would have to level 501/506 to 7.x code, but this is not supported on these two models, the next logical solution would be to upgrade your PIX 501/506 to asa5505s.
Rgds
Jorge
Tags: Cisco Security
Similar Questions
-
Connectivity random Cisco Pix 501
Hello. I'm having some trouble with my CISCO PIX 501 Setup.
A few months I started having random disconnects on my network (from inside to outside). The machines can ping the DC or the Pix, but impossible to surf the internet. The only way to make them go outside is a reboot of Pix.
My configuration is:
-----------
See the ACE - pix config (config) #.
: Saved
: Written by enable_15 at 09:23:07.033 UTC Tuesday, June 3, 2014
6.3 (3) version PIX
interface ethernet0 car
interface ethernet1 100full
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
activate 8Ry34retyt7RR564 encrypted password
2fvbbfgdI.2KUOU encrypted passwd
hostname as pix
domain as.local
fixup protocol dns-length maximum 512
fixup protocol esp-ike
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol pptp 1723
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol 2000 skinny
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names of
access-list acl_out permit icmp any one
ip access list acl_out permit a whole
access-list acl_out permit tcp any one
Allow Access-list outside_access_in esp a whole
outside_access_in list access permit udp any eq isakmp everything
outside_access_in list of access permit udp any eq 1701 all
outside_access_in list of access permit udp any eq 4500 all
outside_access_in ip access list allow a whole
pager lines 24
Outside 1500 MTU
Within 1500 MTU
outside 10.10.10.2 IP address 255.255.255.0
IP address inside 192.168.100.1 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
history of PDM activate
ARP timeout 14400
Global 1 10.10.10.8 - 10.10.10.254 (outside)
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
Access-group outside_access_in in interface outside
access to the interface inside group acl_out
Route outside 0.0.0.0 0.0.0.0 10.10.10.1 0
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
RADIUS Protocol RADIUS AAA server
AAA-server local LOCAL Protocol
Enable http server
http 192.168.10.2 255.255.255.255 inside
http 192.168.10.101 255.255.255.255 inside
http 192.168.100.2 255.255.255.255 inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
Permitted connection ipsec sysopt
ISAKMP nat-traversal 20
Telnet timeout 5
SSH 192.168.10.101 255.255.255.255 inside
SSH timeout 60
Console timeout 0
dhcpd dns 8.8.8.8 8.8.4.4
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd outside auto_config
Terminal width 80
Cryptochecksum:7f9bda5e534eaeb1328ab08a3c4d28a
------------Do you have any advice? I don't get what's wrong with my setup.
My DC is 192.168.100.2 and the network mask is 255.255.255.0
The network configuration is configured to set the IP of the gateway to 192.168.100.1 (i.e. the PIX 501).
I have about 50 + peers on the internal network.
Any help is apprecciate.
Hello
You have a license for 50 users +?
After the release of - Show version
RES
Paul
-
Cisco PIX 501 to Cisco 3005 concentrator via remote access
Hello people,
I need your help.
We got a Cisco PIX 501 in one place and this pix is configured for pppoe connection. The pix connects to internet via the pppoe client. an official ip address ping works well.
So what I want to do is to establish a tunnel von between this pix and a cisco 3005 concentrator.
But I failed to establish it.
Here are the pix config. the acl? s are only for the test and will be replaced if it works.
6.3 (4) version PIX
interface ethernet0 10baset
interface ethernet1 100full
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
activate the password xxx
passwd xxx
hostname PIX - to THE
domain araukraine.ua
fixup protocol dns-length maximum 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol they 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol 2000 skinny
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names of
outside ip access list allow a whole
inside_access_in ip access list allow a whole
pager lines 24
opening of session
Monitor logging warnings
logging warnings put in buffered memory
MTU outside 1456
MTU inside 1456
IP address outside pppoe setroute
IP address inside 192.168.x.x 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
PDM location 192.168.x.x 255.255.255.224 inside
forest warnings of PDM 500
history of PDM activate
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
outside access-group in external interface
inside_access_in access to the interface inside group
Timeout xlate 0:05:00
Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
AAA-server GANYMEDE + 3 max-failed-attempts
AAA-server GANYMEDE + deadtime 10
RADIUS Protocol RADIUS AAA server
AAA-server RADIUS 3 max-failed-attempts
AAA-RADIUS deadtime 10 Server
AAA-server local LOCAL Protocol
the ssh LOCAL console AAA authentication
Enable http server
255.255.x.x 192.168.x.x http inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
255.255.x.x telnet inside 192.168.x.x
Telnet timeout 5
SSH 194.39.97.0 255.255.255.0 outside
SSH timeout 5
management-access inside
Console timeout 0
VPDN group pppoe_group request dialout pppoe
VPDN group pppoe_group localname [email protected] / * /
VPDN group ppp authentication pap pppoe_group
VPDN username [email protected] / * / password *.
encrypted privilege 15
vpnclient Server 212.xx.xx.xx
vpnclient mode network-extension-mode
vpntest vpngroup vpnclient password *.
vpnclient username pixtest password *.
Terminal width 80
the hub, I created a user pixtest, a group vpntest and I? ve created the rules of the network for example to what server, users behind the pix will be able to access.
And that? s all.
I couldn't send you exit pix or hub because I don't have an error or a message that the tunnel will be established.
What can be wrong?
Thanks for the replies
This configuration example shows how to create an IPsec tunnel to a computer that is running the Client VPN Cisco's (4.x and later versions) to a Cisco VPN concentrator 3000 to allow the user to safely access the network inside the VPN concentrator.
-
I need to make a choice between pix 506 and pix 501.
I just need to know if I can use the access list in the pix to provide access to a public address 100.
The address that corresponds to the access list will have access to a service that I put behind the pix.
I'm not going to use virtual private networks, the only thing I want to do is guaranteed access to the service
what one do you advise me to use?
they are almost entirely functionally identical. Avoid any difference in their ability to withstand the ACLs. The 506e has a faster processor, among other benefits, so usually I recommend for those seeking also to a cisco pix 501 50 user.
-
Customer Cisco PIX 501 VPN connects but no connection to the local network
Hi all:
I am able to make a VPN connection to a PIX 501. The remote client is assigned an IP (192.168.2.1) also, but not able to access all the machines in the local network connected to the PIX.
I have attached the PIX configuration.
Advice will be greatly appreciated.
********************
6.3 (5) PIX version
interface ethernet0 car
interface ethernet1 100full
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
enable password xxxx
passwd xxxxx
pixfirewall hostname
domain ciscopix.com
fixup protocol dns-length maximum 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol 2000 skinny
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names of
access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list 102 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
pager lines 24
Outside 1500 MTU
Within 1500 MTU
IP address outside dhcp setroute
IP address inside 192.168.1.1 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
IP local pool ippool 192.168.2.1 - 192.168.2.5
location of PDM 192.168.2.0 255.255.255.0 outside
PDM logging 100 information
history of PDM activate
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) - 0 102 access list
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
Timeout xlate 0:05:00
Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
Sip timeout - disconnect 0:02:00 prompt Protocol sip-0: 03:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
AAA-server GANYMEDE + 3 max-failed-attempts
AAA-server GANYMEDE + deadtime 10
RADIUS Protocol RADIUS AAA server
AAA-server RADIUS 3 max-failed-attempts
AAA-RADIUS deadtime 10 Server
AAA-server local LOCAL Protocol
Enable http server
http 192.168.1.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
Permitted connection ipsec sysopt
Crypto ipsec transform-set esp - esp-md5-hmac RIGHT
Crypto-map dynamic dynmap 10 transform-set RIGHT
map mymap 10-isakmp ipsec crypto dynamic dynmap
mymap outside crypto map interface
ISAKMP allows outside
ISAKMP identity address
part of pre authentication ISAKMP policy 10
encryption of ISAKMP policy 10
ISAKMP policy 10 md5 hash
10 2 ISAKMP policy group
ISAKMP life duration strategy 10 86400
vpngroup vpn3000 ippool address pool
vpngroup vpn3000 Server dns 68.87.72.130
vpngroup vpn3000-wins 192.168.1.100 Server
vpngroup vpn3000 split tunnel 101
vpngroup vpn3000 downtime 1800
password vpngroup vpn3000 *.
Telnet timeout 5
SSH timeout 5
Console timeout 0
dhcpd address 192.168.1.2 - 192.168.1.33 inside
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd outside auto_config
dhcpd allow inside
Terminal width 80
Cryptochecksum:xxxx
****************
The DNS server is the one assigned to me by my ISP.
My internal network connected to the PIX is 192.168.1.1 - 192.168.1.33 and the VPN ip pool is 192.168.2.1 - 192.168.2.5
"isakmp nat-traversal 20" can do the trick.
-
Remote Desktop from Win7 not passing is not by the cisco pix firewall, but xp can.
our company lan remote office work like this:
Win7 for win7 ok
Win7 for xp ok
XP and win7 ok
XP to xp ok
Which leads me to believe that all the parameters and features of firewall and rdp pc work fine.
our remote users connect via the cisco through our cisco pix vpn client business and Remote Desktop works like this:
inside lan xp ouside xp OK
inside lan xp ouside win7 OK
Here's the problem:
inside to outside win7 win7 ==> does NOT connect to (rdp that is)
inside win7 for xp outdoor ==> does NOT connect to (rdp that is)
External clients CAN of course accept rdp because it works when initiated by the xp machine.
ONLY win7 machines cannot use rdp through the cisco firewall
Yes, the dns resolves properly throughout.
Yes, remote desktop IS active (Yes, some may ask me that...)
Ping is not allowed through the firewall, so it makes no difference.
the result is the same whether the win7 firewall is on or off.
all the necessary pc firewall settings are good, as demonstrated in the first part.
Why can you connect the NO Win7? but the XP machines?
Any help is appreciated, thanks.
I think that there are some weird setting in Win7 that didn't exist in winxp.
Hello
The question is more suited in the TechNet forums. So I would say you mention the link and send the request in this forum for better support.
http://social.technet.Microsoft.com/forums/en-us/category/w7itpro
For any information related to Windows, feel free to get back to us. We will be happy to help you.
-
HSRP support on the cisco SMB switches
Hello!
Just a question.
One of the Cisco Small Business L3 switches support the failover as HSRP, VRRP, and GLBP entry protocols?
Thanks in advance
Hi Dejan,
Oops, I overlooked the fact that you need L3 switches.
In this case, indeed the Catalyst 3560 would be the best choice.
Thank you for your trust to Cisco!
Best regards
Nico glacier
Senior Network Engineer - CCNA
PS: Could mark you it as answered? Thank you
-
I wonder and wonder, is it possible for a branch (2 vpn clients) to connect to the central location (cisco 501 pix) at the same time via the vpn client with a public address on each side. If this is not the case, what will be the way to make it work without additional equipment (another pix of cisco).
Yes you can, you should check your os 6.3 a pix and you enable nat-transapency: -.
ISAKMP nat-traversal 20
-
Supported on the Cisco RV042 router settings
Hello
Anyone know if these settings are supported on router CiscoRV042
shared secret - authentication-
-AES-256 / SHA1 encryption
-IKE: Diffie-Hellman (Group 2)
-Phase 1 IKE every 1440 minutes.
-The phase 2 (IPsec) all 3600 sec (every hour) of IKE
Thank you.
These are all very standard parts of IPSEC.
See page 45 of the
http://www.Cisco.com/en/us/docs/routers/CSBR/RV042/Admin/Guide/RV042_V10_UG_C-Web.PDF
Copied here
IPSec configuration
So that any encryption occur, both ends of a
VPN tunnel must agree on the encryption methods,
decryption and authentication. This is done by sharing
a key for the encryption code. Key management, the
default mode is IKE with pre-shared key.
Overlay Mode Select IKE with pre-shared key or manual.
Both ends of a VPN tunnel must use the same mode of
key management. After selecting the mode, the
settings available on this screen may change depending
on the selection you have made. Follow the instructions
for the mode you want to use. (Manual mode is available
for VPN tunnels only, no VPN group.)
IKE with preshared key
IKE is used to negotiate Internet Key Exchange Protocol
for Security Association (SA) key material. IKE use it
Pre-shared key for authentication to the remote peer of IKE.
The phase 1 DH group Phase 1 is used to create the SA. DH
(Diffie-Hellman) is a key exchange protocol used for
Phase 1 of the authentication before establishing process
pre-shared keys. There are three groups of different premium
length of the key. Group 1 is 768 bits, and group 2 is 1024 bits.
Group 5 is 1 536 bits. If the network speed is preferred, select
Group 1. If it is better to network security, select group 5.
The phase 1 encryption select an encryption method: SOME
(56-bit), 3DES (168-bit), AES-128 (128-bit), AES-192 (192-
ILO) or AES-256 (256-bit). The method determines the
length of the key used to encrypt or decrypt ESP packets
AES - 256 is recommended because it is the safest.
Make sure that both ends of the VPN tunnel using the same
encryption method.
The phase 1 authentication select a method of
authentication, MD5 or SHA. The authentication method
determines how the ESP packets are validated. MD5 is
a one-way hash algorithm that produces a 128-bit
Digest. SHA is a one-way hashing algorithm which produces
a 160-bit digest. SHA is recommended because it is more
Fix. Make sure that both ends of the VPN tunnels using the
same authentication method.
Phase 1 life time sets the duration of a VPN
tunnel is active in Phase 1. The default is 28800
seconds.
Perfect Forward Secrecy if the perfect forward secrecy
(PFS) is enabled, the IKE Phase 2 negotiation will be
generate new key material for encryption of IP traffic and
authentication, then pirates using brute force to break
encryption keys will not be able to obtain future IPSec
keys.
Phase 2 DH group if the functionality of perfect forward secrecy
is disabled, then no new key will be generated, so you don't have
no need to adjust the Phase 2 DH group (the key for Phase 2
will be the key in Phase 1).
There are three groups of different main key lengths.
Group 1 is 768 bits, and group 2 is 1024 bits. Group 5 is
1 536 bits. If the network speed is preferred, select group 1.
If it is better to network security, select group 5. You do
no need to use the same group of DH that you used for
Phase 1.
Encryption of the phase 2 Phase 2 is used to create an or
several IPSec security associations, which are then used to key IPSec sessions.
Select an encryption method: NULL, (56-bit), 3DES
(168 bit), AES-128 (128-bit), AES-192 (192-bit) or AES-
256 (256-bit). It determines the length of the key used to
encrypt or decrypt packets ESP. AES-256 is recommended
because it is the safest. Both ends of the VPN tunnel
must use the same encryption of Phase 2 setting.
The phase 2 authentication select a method of
authentication, NULL, MD5 or SHA. Authentication
method determines how the ESP packets are validated.
MD5 is a one-way hash algorithm that produces a
Digest of 128 bits. SHA is a one-way hashing algorithm that
produces a 160-bit "Digest". SHA is recommended because
It's safer. Both ends of the VPN tunnel must use
the same Phase 2 authentication setting.
Phase 2 HIS life time sets the duration of a VPN
tunnel is active in Phase 2. The default value is 3600 seconds.
Pre-shared key that specifies the pre-shared key used
to authenticate the remote peer of IKE. Enter a key of
keyboard and hexadecimal characters, for example, [email protected]/ * /.
or 4d795f40313233. This field allows a maximum of 30
characters and hexadecimal values. The two ends of the
the VPN tunnel must use the same pre-shared key. It's
We recommend that you change the pre-shared
Key periodically in order to maximize the VPN security.
-
Juniper Netscreen SSG20 is directly connected to the Cisco PIX 525.
Hi all, I have a third-party provider to put a Juniper SSG20 VPN device in our network. I want to connect directly to a PIX 525. Someone at - he tried the same thing? Any question, should I be careful?
I have attached a diagram of the proposed provision.
Thank you.
Dmitry
Should not be a problem as long as you know what protocol and ports Juniper use so you can open it on the PIX 525 ACL.
-
Does anyone know if the PIX 501 10 user license will limit the number of users can cross a site to site VPN that ends at the PIX?
Yes, it does, I encountered a problem with it myself in the past. The page at http://www.cisco.com/en/US/customer/products/hw/vpndevc/ps2030/products_data_sheet09186a0080091b18.html
It is said "the Cisco PIX 501 license 10 users supports up to 10 simultaneous source IP addresses for your internal network to browse the Cisco PIX 501.»
In my case what happened is that we had a VPN site-to-site created with a small office that adds a little more employees, everything was going well until the 11 IP address attempted to connect to a resource across the IPSec tunnel. We solved the problem by opting for a 50 user license.
-
is eazy customer vpn is supported only on the routers of the 800 pix 7.0 series iOS
I'm eazy vpn with pix 7.0.4 ios with a 3640 router. the 3640 router is like aeazy vpn client. and the pix as the eazy vpn server. the client connect and continues to ask the xauth parameter. I read in the release notes that requires this vpn eay 12.2 and especially sure ios for 806 routers. the pix also does support eaxy customer vpn routers fo 800 series only. urgent help required. If this true pix sucks big time. they force us to buy routers.they become like microsoft. pls help
Assane
According to this document
http://www.Cisco.com/en/us/products/sw/secursw/ps5299/index.html
Cisco Easy VPN remote is now available on Cisco 800, 1700, 1800, 2800, 3800 and series UBR900 routers, Cisco PIX 501 security equipment and 506th and Cisco VPN 3002 hardware Clients.
So no support to 3640...
M.
Hope that helps if it is
-
Cisco PIX VPN pass through (sorry, tricky!)
Hello
I'm having some problems with allowing IPSEC through a Cisco PIX 501. The configuration is the following:
Host (mail Client) (192.168.1.111)
|
PIX (NAT)
|
INTERNET
|
(Checkpoint) VPN server
The problem is, the PIX guard dropping my outgoing isakmp packets on its * internal * inetrface!
710005: request UDP and eliminated from 192.168.1.111/500 to inside:192.168.1.1/isakmp
710005: request UDP and eliminated from 192.168.1.111/500 to inside:192.168.1.1/isakmp
710005: request UDP and eliminated from 192.168.1.111/500 to inside:192.168.1.1/isakmp
710005: request UDP and eliminated from 192.168.1.111/500 to inside:192.168.1.1/isakmp
710005: request UDP and eliminated from 192.168.1.111/500 to inside:192.168.1.1/isakmp
710005: request UDP and eliminated from 192.168.1.111/500 to inside:192.168.1.1/isakmp
Does anyone know why it does this? Anyting to my in-house (security level 100) should go directly to my giving and external interface on the net. For some reason, is to treat the isakmp packets differently...
I have included my config as an attachment, can we see what I missed or have any ideas why it loses the isakmp packets?
Thanks for any help.
Nick Chettle
Check users. C and edit it with your favorite editor. Check if you have a private or public IP address!
I tried to find in the really safe base article I've seen a couple of months ago but I can't find any more.
https://SecureKnowledge.checkpoint.com/SK/public/intro.jsp
See also this FAQ:
http://www.phoneboy.com/bin/view.pl/FAQs/SecureClientFAQs
See CheckPoint VPN-1 Guide that is on the installation CD or go to the web site of checkpoints, BUT you need a valid account Center user to read and download the documentation. Start looking at page 119 and 211.
As usual, nothing is free at the checkpoint.
http://www.checkpoint.com/support/technical/documents/docs_r55.html
sincerely
Patrick
-
Cisco PIX 501, offered a license based on the connection: 10 or 100 users. What that means (e.g. for a 10 user license):
-a maximum of 10 xlates in the nat table?
-a maximum of 10 connections in the table conn?
If finally we're true, a user can establish 10 outbound connections (from an ip address). Currently, other users cannot establish a connection outboung?
Thank you
Edgar
"User" is defined as follows:
-a sent or received traffic via the PIX in the last xlate timeout seconds (five minutes with 501 default config).
-has a TCP or UDP connection
-a a NAT session
-a a session to authenticate user
It is certainly not the number of connections, but basically, the number of unique IP addresses internal that have any number of connections through the PIX. The 501 will support up to approximately 26000 connections, but only 10 internal IP addresses could use those.
You can make a "host local sho ' on the PIX to see all the current"users. "
-
Hello.. I am beginner in this kind of things cisco...
I'm trying to set up multiple VPN on a Cisco PIX 501 firewall with routers Linksys BEFVP41...
Since not very familiar with the CLI, I use the PDM utility and it was very easy for the first... Unfortunately, I get this error when I try to add the second VPN using the VPN Wizard:
Outside_map map (ERR) crypto set peer 200.20.10.3
WARNING: This encryption card is incomplete
To remedy the situation even and a list of valid to add this encryption card
Hi garcia
for each vpn/peer, you need to a separate instance of crypto card, the card will have the same name, but different sequence... numbers one map encryption can be attributed to an interface, but you can have several instance of cards inside a main...
for configuration, you can go through the URL below... It has all the details on IPSEC config:
http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/PIX/pix_sw/v_63/config/ipsecint.htm
I hope this helps... all the best... the rate of responses if deemed useful...
REDA
Maybe you are looking for
-
First HP: how to enter a number complex, using single quotes
Hello This is probably a stupid question, but how do you enter a charager apostrophe on the first HP RPN mode? I read the section in the guide of the user on enteringer a complex numbers in RPN mode. Using (3.4) works fine, but I'm curious to know
-
Offers updates firmware for NWZ-E354
I hope that Sony has not released the player NWZ-E354 and left users without updates. So would like to think that I came with some features I've seen available in other brands of media players that I'm sure that all the users of this model Walkman wo
-
What a piece of crap... My k910 start failure involved while I'm waiting for spare camera... Call speaker is ok, but the media here totally dead speaker... It's my problemfull phone I've ever had... My past a706 and my wife s920 are problemless...
-
slineline 400-034: upgrade of windows 8 for windows 8.1
I had to reformat my hard drive. which means that the computer is back to windows 8. my shadow copy on my external is 8.1. I just put on above windows 8 or should I actually go to 8.1 first. and windows 8 a as updates.would 140 windows I put t
-
How I WRITE VISA to 2 devices of a while loop?
Hello I have developed a fairly complex vi that reads data from two sensors and controls SERIES written to two engine controllers. The idea is to send the engine controls more or less "simultaneously", and they are generally not the same commands.