Question of VLAN native of UCS

All,

I have a problem that I can not just wrap my mind autour.  We have UCS setup in a lab with 2 interconnections connected to 2 nexus switches 5510.  The nexus switches are passed to the network via a Switch 4900 m.  All circuits are configured and tested as functional. All routing is configured and confirmed.  I have a problem in UCS, which is confusing to me.  In the lab, I kept the VLAN native to the vlan1.  I have the Setup VLAN 2-10 on all switches test and interconnections.  I created a service profile that contains 1 network card and placed it in the VLAN 7.  I installed Windows 2008 on a blade using this service profile.  In the operating system I statically IP'ed the NIC for the schema used in VLAN 7.  The OS, I cannot ping another device located in the vlan 7.  Also, I can't ping a host on a different VLAN.  If I place a check on the VLAN 1 as the vlan native I still cannot ping anything.  If I place the audit for vlan native to vlan 7 I can ping hosts in the same vlan, as well as outside of the vlan.  So why should I place vlan 7 as the vlan native when all my boxes are set up in the vlan 1 is the vlan native?

Thanks for any help,

Ken

Ken,

When you allow some VLANs on your Service vNIC profile you will need to set the VLAN native. This is because the way you have configured currently you are only "allowing VLAN 15', but you're not marking it.   It will work fine for ESX or Linux which allows to assign the dot1q tag to the host.  With Windows unless you have specific drivers doing the marking for you, you will need to do it at the level of the vNIC in UCS.

Two ways to see this in action.  When you create a service profile in the 'Basic' - not 'Expert' method, you will need to choose a single VLAN for your interfaces.  This will treat interfaces about like an "access Port".  Conversely, when you use the "Expert mode you select the vNIC as a trunk, in which you" will allow to "all VLAN you acceding them as to, like this is the method you did.»

For a Windows operating system, set the VLAN natively for the VLAN you want to access and you'll be gentle.  Unchecking this option button that "VLAN native" is allowing traffic to cross out of UCS on the VLAN native VLAN 1, your network - it is therefore MAC appears on other fabric under VLAN1

Kind regards

Robert

Tags: Cisco DataCenter

Similar Questions

  • Question of vlan native

    What is recommended for the vlan native?

    Please let me know if my interpretation of the vlan native is correct.  The vlan native exists only on the ports of junction and isn't the only one vlan tagged across this trunk where all other VLANS on that would be labelled.  No access port on the switch that do not belong to a vlan will have their traffic included in the vlan native and sent through the trunk unidentified.

    I know that the vlan native on a port that has been configured as a trunk by default is vlan 1.  What are the best practices and the reasons why the vlan native should be replaced by something other than vlan1?

    All access ports belong to a virtual local network even if it is only the vlan 1.

    By default the vlan native is also vlan 1, so I can see where you are coming.

    Except that you're right, that the vlan native should be replaced with something else on the switch, mainly because by default, all ports are in the vlan 1 and vlan 1 is also used for other things as well.

    Make the vlan native one vlan unused example. VLAN 999 is a common one.

    There should be no port end assigned in, any SVI (L3 of the interface vlan for it) and you do not need to enable through the trunk or a link.

    Jon

  • Question of VLAN by default and best practices

    Hi all

    I recently read on VMwares ESX Server 802. 1 q-paper Solutions of VLAN and came across the following article:

    Question of VLAN native (aka "VLAN1 Issues")

    "VLAN native is used to switch protocol management and control.  Native frames of VLAN is not VLAN ID tag in many types of switches, and in which case the trunk ports implicitly treat all frames not marked as frame VLAN native.

    VLAN 1 is the native VLAN ID by default for most Cisco switches.  However, in many enterprise networks, the VLAN is the VLAN 1 or 100, it could be any number depending on your configuration of switch type and running.

    It is common recommended to avoid using some VLAN native (often the VLAN 1) for any regular data traffic.  VMware recommends that you not associate any group native virutal server ESX VLAN VLAN ID switch port.  Also, so that you avoid them VLAN native for your groups of ports VLAN, no native VLAN related configuration is required on ESX Server systems. »

    That being said, I know a lot of people and more small to medium-sized networks leave light network VLAN by default.  If this is the case it would be better to change the entire network switching to one VLAN different and then put groups of ports on the same VLAN?  Or is the problem with the default VLAN really does not impact?

    Hello

    You have quite a few involved networks when you use virtualization and some I would classify as a virtualization host networks: the Service Console, VMotion, storage over IP.  They are more likely on separate networks of your VM network traffic... At least use VLAN to do this.

    See http://kensvirtualreality.wordpress.org for a good series of articles on virtual networks.

    Best regards
    Edward L. Haletky
    VMware communities user moderator, VMware vExpert 2009, Analyst of DABCC
    ====
    Now available on Rough Cuts: ' VMware vSphere (TM) and Virtual Infrastructure Security: ESX security and virtual environment '
    Also available "VMWare ESX Server in the enterprise"
    SearchVMware Pro| Blue gears. Top virtualization security links| Security Round Table Podcast virtualization

  • Question SG500 auto voice VLAN VLAN native

    I have install SG300 and SG500 switches and using the function of vlan automatic voice by simply changing vlan 100 and using voice of vlan 1 for data and the default value.  I normally put the L3 switch and make a porteach access for my IP PBX (vlan 100) and the other to connect to the existing data network (vlan 1). Then I do a static route in default gateway customers to route to vlan 100 and everything works well for most facilities.

    On my last install, I decided to try to change the vlan 1 default vlan 10 and go with 10 for data and 100 for the voice.  The problem that I ran was that the auto generated on my phone switchports config still serve of vlan 1 vlan native.  I am trying to find a way to always use auto vlan and get the vlan native desired without having to make manual configuration changes.

    Would this be possible?

    Thanks in advance.

    Hi Brandon, you must edit the macro of vlan native 1 to vlan 10.

    Check out this topic How change the macro

    https://supportforums.Cisco.com/thread/2177613

    -Tom
    Please mark replied messages useful

  • 6500 QinQ vlan native risks

    I have two questions:

    (1) 6500 (regardless of the SUP) do not support the standard 802.1ad correct?  "QinQ" features are not standard?

    (2) can someone help me understand why tagging vlan native is listed as a required step when configuring switchport dot1-tunnel mode?

    (http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2S...)

    I understand VLANs jump... etc but I do not understand how this relates to the creation of a tunnel port.  For me, a tunnel port puts all the data in the provider / S-VLAN defined on the port tunnel with "switchport mode access vlan x" This includes labeled and not marked traffic coming from the CE marking on the port tunnel.   I understand best practices for tagging vlan native on the base in general... switches but why the tunnel ports invites and it's necessary?

    I'm missing something basic here :)

    Thank you!

    Hello

    AD 2) here is an explanation, I think:

    http://www.Cisco.com/c/en/us/TD/docs/switches/Datacenter/SW/5_x/NX-OS/in...

    Best regards

    Milan

  • Change the order of VLAN native?

    Can someone refresh me please as to what the command is to change the VLAN native for the whole switch? (IE: not only on the trunk, I mean the default native for the whole switch). Thank you

    Can someone please refresh me as to what the command is to change the Native VLAN for the entire switch? (IE: not just on the trunk, I mean the default native for the entire switch). Thanks

    Hi Steve,.

    By default, there is only one VLAN for all ports. This VLAN is called by default. You can't rename or delete VLAN 1.

    If you're talking about a management VLAN is nothing else than a VIRTUAL local network that is used for managing in-band of the network switching devices.  To configure this on a switch, you must create a Switch Virtual Interface (SVI) that is mapped to this VLAN, and then assign this virtual interface an IP address.  On a Cisco switch, it would look like the following.

    Interface Vlan99
    IP 192.168.1.1 255.255.255.0
    No tap

    I also want to make something very clear.  Your management VLAN is not to be identical to your VLAN native.  Question, please make sure that they are different.  Your management VLAN must only carry the traffic of in-band management and should not be the default VLAN.  By in-band management traffic, I am referring to SSH or telnet (Although telnet is not recommended because it is not safe).  Traffic such as BPDUS, PagP, CDP, use the VLAN native who is the vlan 1. But if you change the vlan native then CDP, VTP/PagP will always use the vlan 1 but packages will be marked. Only DTP uses vlan native so if you have changed the vlan native then DTP would use the new VLAN to send images. With PVST + BPDUS of course run on all the VLANS.

    Hope to help!

    So useful note the position

    Ganesh.H

  • Management and Vlan native in different subnet?

    Can I have a management ip and vlan native in a different on AIR-1242 switch subnet and 2960?

    Native on switch = 1.

    The interface vlan 100 = 10.10.1.25X 24

    BVI ip to the vlan 100 = 10.10.1.25X 24

    -HM-

    Hello

    As far as I know, the management and the native will be the same... I guess... You have Vlan native as 1 on the switch and Int Vlan 100 on routing switch? Am I wrong? Let me know what are your needs... which will help me to help out you!

    for your question...

    Normally, we specify him vlan native on the switch and the AP so that communication happens... communication won't happen if there is a match of...

    Looking forward to hear from you!

    Let me know if that answers your question...

    Concerning
    Surendra
    ====
    Please do not forget to note positions that answered your question and mark as answer or was useful

  • WLC management port is another trunk that vlan native

    Hello

    I installed my first WLC 5508 with this topology:

    WLC connected trought distribution SFP 1 GB port to the port of switch configured as a Trunk port cut 3 Wireless VLAN:

    -Management WLC, wireless and wireless voice data Vlan (Vlan native is WLAN Management).

    -J' created 2 dynamic interface on WLC on my VLAN Wireless:

    10.7.1.0/24: default management Virtual Interface installing WLC +.

    10.7.6.0/24: Virtual Interface of voice and

    10.7.2.0/24: Wireless Data Interface virtual trought GUI.

    DHCP configured on each dynamic interface is the interface vlan L3 subent for SWITCH main technical IP DHCP Pool equal VLAN.

    WLC management interface IP address is: 10.7.1.10/24

    I create 2 WLAN SSID name with given ID 1, and ID2 voice.

    I create and AP group named APGRP1 that contains the AP recorded about WLC and using the two WLAN SSID.

    The two AP are connected to the switch acess port configured as native management WLC VLAN access port.

    I have to create 3 IP DHCP pool on main switch with the related L3 Interfaces for Inter VLAN routing.

    Problem: when I try to connect from mobile data SSID I get IP address of management WLC VLAN a VLAN data no.

    the same case of Wireless IP Phone configured with voice SSID.

    What I can likely that allows two devices to get the address IP of the correct VLAN?

    Thnks

    Hi Adil,

    T1 > coelio AP on the switch must be configured on a mode of access to the port or trunk mode?

    YEARS - the LWAPP / CAPWAP APs connected to the switchport should be an access port not trunk.

    Q2 > if the first case, the configuration of the port, on the same VLAN as WLC management VLAN support Vlans other WLANS (voice and data)?

    YEARS - Yes it supports, since traffic that involes the WLAN will be inside the tunnel of logic LWAPP/CAPWAP.

    Q3 > I will check the interface between WLAN and dynamic Interfaces map and I'll tell you.

    YEARS - I will wait for your answer!

    Let me know if that answers your question...

    Concerning
    Surendra
    ====
    Please do not forget to note positions that answered your question and mark as answer or was useful

  • Client VPN access to VLAN native only

    I have a router 2811 (config below) with VPN set up.  I can connect through the VPN devices and access on the VLAN native but I can't access the 10.77.5.0 (VLAN 5) network (I do not access the 10.77.10.0 - network VLAN 10).  This question has been plagueing me for quite a while.  I think it's a NAT device or ACL problem, but if someone could help me I would be grateful.  Client VPN IP pool is 192.168.77.1 - 192.168.77.10.  Thanks for the research!

    Current configuration: 5490 bytes

    !

    version 12.4

    horodateurs service debug datetime msec

    Log service timestamps datetime msec

    encryption password service

    !

    2811-Edge host name

    !

    boot-start-marker

    boot-end-marker

    !

    enable secret 5 XXXX

    !

    AAA new-model

    !

    AAA authentication login userauthen local

    AAA authorization groupauthor LAN

    !

    AAA - the id of the joint session

    !

    IP cef

    No dhcp use connected vrf ip

    DHCP excluded-address IP 10.77.5.1 10.77.5.49

    DHCP excluded-address IP 10.77.10.1 10.77.10.49

    !

    dhcp Lab-network IP pool

    import all

    Network 10.77.5.0 255.255.255.0

    router by default - 10.77.5.1

    !

    pool IP dhcp comments

    import all

    Network 10.77.10.0 255.255.255.0

    router by default - 10.77.10.1

    !

    domain IP HoogyNet.net

    inspect the IP router-traffic tcp name FW

    inspect the IP router traffic udp name FW

    inspect the IP router traffic icmp name FW

    inspect the IP dns name FW

    inspect the name FW ftp IP

    inspect the name FW tftp IP

    !

    Authenticated MultiLink bundle-name Panel

    !

    voice-card 0

    No dspfarm

    !

    session of crypto consignment

    !

    crypto ISAKMP policy 1

    BA aes 256

    preshared authentication

    Group 2

    life 7200

    !

    Configuration group customer isakmp crypto HomeVPN

    key XXXX

    HoogyNet.net field

    pool VPN_Pool

    ACL vpn

    Save-password

    Max-users 2

    Max-Connections 2

    Crypto isakmp HomeVPN profile

    match of group identity HomeVPN

    client authentication list userauthen

    ISAKMP authorization list groupauthor

    client configuration address respond

    !

    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac vpn

    !

    Crypto-map dynamic vpnclient 10

    Set transform-set vpn

    HomeVPN Set isakmp-profile

    market arriere-route

    !

    dynamic vpn 65535 vpnclient ipsec-isakmp crypto map

    !

    username secret privilege 15 5 XXXX XXXX

    username secret privilege 15 5 XXXX XXXX

    Archives

    The config log

    hidekeys

    !

    IP port ssh XXXX 1 rotary

    !

    interface Loopback0

    IP 172.17.1.10 255.255.255.248

    !

    interface FastEthernet0/0

    DHCP IP address

    IP access-group ENTERING

    NAT outside IP

    inspect the FW on IP

    no ip virtual-reassembly

    automatic duplex

    automatic speed

    No cdp enable

    vpn crypto card

    !

    interface FastEthernet0/1

    no ip address

    automatic duplex

    automatic speed

    No cdp enable

    !

    interface FastEthernet0/1.1

    encapsulation dot1Q 1 native

    IP 10.77.1.1 255.255.255.0

    IP nat inside

    IP virtual-reassembly

    !

    interface FastEthernet0/1.5

    encapsulation dot1Q 5

    IP 10.77.5.1 255.255.255.0

    IP nat inside

    IP virtual-reassembly

    !

    interface FastEthernet0/1.10

    encapsulation dot1Q 10

    IP 10.77.10.1 255.255.255.0

    IP access-group 100 to

    IP nat inside

    IP virtual-reassembly

    !

    interface FastEthernet0/0/0

    no ip address

    Shutdown

    automatic duplex

    automatic speed

    !

    interface FastEthernet0/1/0

    no ip address

    Shutdown

    automatic duplex

    automatic speed

    !

    router RIP

    version 2

    10.0.0.0 network

    network 172.17.0.0

    network 192.168.77.0

    No Auto-resume

    !

    IP pool local VPN_Pool 192.168.77.1 192.168.77.10

    no ip forward-Protocol nd

    !

    IP http server

    no ip http secure server

    overload of IP nat inside source list NAT interface FastEthernet0/0

    !

    IP extended INBOUND access list

    permit tcp any any eq 2277 newspaper

    permit any any icmp echo response

    allow all all unreachable icmp

    allow icmp all once exceed

    allow tcp any a Workbench

    allow udp any any eq isakmp

    permit any any eq non500-isakmp udp

    allow an esp

    allowed UDP any eq field all

    allow udp any eq bootps any eq bootpc

    NAT extended IP access list

    IP 10.77.5.0 allow 0.0.0.255 any

    IP 10.77.10.0 allow 0.0.0.255 any

    IP 192.168.77.0 allow 0.0.0.255 any

    list of IP - vpn access scope

    IP 10.77.1.0 allow 0.0.0.255 192.168.77.0 0.0.0.255

    IP 10.77.5.0 allow 0.0.0.255 192.168.77.0 0.0.0.255

    !

    access-list 100 permit udp any eq bootpc host 255.255.255.255 eq bootps

    access-list 100 permit udp host 0.0.0.0 eq bootpc host 10.77.5.1 eq bootps

    access-list 100 permit udp 10.77.10.0 0.0.0.255 eq bootpc host 10.77.5.1 eq bootps

    access-list 100 deny tcp 10.77.10.0 0.0.0.255 any eq telnet

    access-list 100 deny ip 10.77.10.0 0.0.0.255 10.77.5.0 0.0.0.255

    access-list 100 deny ip 10.77.10.0 0.0.0.255 10.77.1.0 0.0.0.255

    access ip-list 100 permit a whole

    !

    control plan

    !

    Line con 0

    session-timeout 30

    password 7 XXXX

    line to 0

    line vty 0 4

    Rotary 1

    transport input telnet ssh

    line vty 5 15

    Rotary 1

    transport input telnet ssh

    !

    Scheduler allocate 20000 1000

    !

    WebVPN cef

    !

    end

    If you want to say, that after the way nat rules which I have proposed, you lost the connection to the VLAN native, so yes, it's because the subnet VLANs native has not been included in this acl with Deny statement. So that the ACL should look like this:

    NAT extended IP access list

    deny ip 10.77.5.0 0.0.0.255 192.168.77.0 0.0.0.255

    deny ip 10.77.1.0 0.0.0.255 192.168.77.0 0.0.0.255 //This is not respected

    allow an ip

    In addition, if you want to go throug the other tunnel inside the subnet not listed above, then you should include that subnet to the NAT exemption rule with Deny statement.

  • Catch 22 - Port Trunk Configurations: how to combine identifiers VLAN native with DHCP (but allows traffic of VM)

    Catch 22 - Port Network Configurations: how to combine identifiers VLAN native with DHCP (but allow the virtual computer)

    I came across a Catch 22.  Maybe someone can restore the directly here.  I found a "witch hunt" for sure.

    It comes with the Ports of junction on the side of the switch of the ESX host network.

    Context:

    Ok. The Setup is a HP Blade C7000 enclosure.  I try to configure ports for switching to the blades.  ESX 3.5 U4 will be installed the BL460cs.  Installation is preferred method: revive unattended.  No problem with the syntax of Kick-Start,

    I am here, it's the side network.

    The problem:

    I find a major complication in that the switch ports must be configured for both traffic Service Console and VMkernel, more Virtual Machine since only two NICs by blade. Not best practices, but we have only two switches Cisco 3020 inside.  The two uplink physical NIC is paired in the same vSwitch.  (No iSCSI does fortunately).

    So the Catch 22 question is as follows:

    If the id VLAN native set up on the switch port, DHCP works of course and the VMware boot loader is able to grasp a binary / packets on the network (FTP Site) and install OK.  But after no installation, no communication with SC unless I set the VLAN id of the SC to '0 '.  The value "4" 0 does not communication, but "40" is the VLAN native.

    If id configuring VLAN native retired from the Switch port, DHCP will not work and host does not have IP address during the VMware boot process.  This is as expected as traffic without label is not assigned an eligible

    VLAN, so no comms.

    The Port of the Switch configuration:

    interface GigabitEthernet0/16

    SERVERNAME description

    switchport trunk encapsulation dot1q

    switchport trunk vlan native 40

    switchport trunk allowed vlan 40-254

    switchport mode trunk

    switchport nonegotiate

    Speed 1000

    No cdp enable

    spanning tree portfast trunk

    end

    Summary

    OK, let's summarize where things are and if possible please attach responses to their digital identity.

    (1) is there a way to delete the VLAN tagging altogether side ESX host? Not only the id '0 '. The problem is with clearly with the VLAN native defined as "40".  If "40" IDs specified on the Group of ports for the Service Console, no joy, no comms. If the id of '0' value, capable of ping gateway and communicate on the network.

    (2) what is the problem with the definition of VLAN native as "40" when the config for the switch port is set as VLAN native "40"?  Or if it was a problem?  Both parameters clearly do not work together.

    (3) a switch receiving a unmarked frame it will assign to the VLAN Trunk native. Ok. Trunking bases and why I need a VLAN specified on the port for DHCP native work.  But it seems that since the id VLAN is set manually even as VLAN native, closed communications and no traffic as possible.

    (4) executives made tag 802. 1 q VLAN native?  I think that it is not and this could well be the problem. Since the id VLAN "40" is not labeled, but try to score the side host vSwitch port group.

    Please let me know your thoughts, community and how in general, we are approaching 2 NIC ESX configurations.

    When trunking multiple VLANs, you either have a default VLAN is nothing is tagged, or you don't.  That's what the vlan native to you, it defines which VLAN would be used if no tag is visible on the packets traversing the network.  For servers, if you are marking, then everything has to tag, if you're not marking at the server level, then the port must be either an access port or a VLAN native or default must be set.  I also don't keep your service console the same network as your vm.  Keep this isolated for the security of the network.  If you isolate this VLAN, you can separate and use a single IP address for installation and one for post construction.

    Or, you can provide an IP address during the build.

    -KjB

    VMware vExpert

  • VLAN native on LRT214

    Hello

    the vlan native of my ports trunks is not the vlan by default 1. so, how do you define an id vlan different native then 1 on the LRT214 router?

    THX,

    Stef

    As far as I know, you can't. The VLAN native should be VLAN1.

  • If vlan native between Trunk ports not configured so what happens?

    I have a network where two ports of junction are allowed vlan 9 but not native VLANs configured. will be affect performance?

    by default the vlan1 is configure the vlan native to assign a vlan on the interface different native

    switchport trunk vlan native xxx

    HTH

    Richard

  • Incompatibility of VLAN native of CDP

    Hello, I have problems with incompatibility of VLAN native between two Cisco switches. I'm confused why other manufacturing going on works, but Cisco didn't. Can I blame CDP here and I hope that a solution for this? Thank you very much! Tomas

    Hello

    The vlan native must be the same for both switches. On the 3750 vlan native is 35 and on the 2960 vlan 1 native. Try to change 1 to 35 on the 2960 and test again.

    HTH

  • Can't change phone IP auto macro smartport vlan native on SG200

    We have a few SG200 switches and I try to configure the macros Automatic smartport for the IP phone and IP Phone + Office. Every time I have change the macro and change the VLAN native to what I want (the VLAN voice is OK but not the vlan native, I want desktop computers to connect to), I click on apply, but it automatically changes the VLAN default native VLAN (in our case 1 VLAN). I'm trying to change it to VLAN 2. Any ideas why it won't let me change the VLAN native? I can change the VLAN native on others, such as switches, routers, printers, comments, etc., but not the two above and the desktop as well. These three will not change for some reason any. Thank you!

    Hi Brademeyer29,

    what you see, unfortunately, this isn't a matter of configuration. This was reported to the engineering team and should be fixed in the next firmware version 1.4.1.

    For now, you will have to use the solution as not changing not VLAN native or not use smartport.

    Kind regards

    Aleksandra

  • How to set the vlan native on a virtual machine in vSphere when you use the 1000V?

    Using the General switch original vSphere, we put VLAN native by VM by setting the VLAN 0 d.

    How do we set VLAN native for a virtual machine, if the virtual computer is connected to a 1000V? I heard that is over, we can use VLAN ID 0?

    Same way as you would on any Cisco switch.

    Add this command to your profile of uplink port:

    switchport trunk vlan native X

    Keep in mind there is no VLAN 0.  VLAN '0' is just how vmware means the VLAN untagged.  There are valid in accordance with the standard 1-4095.

    Kind regards

    Robert

Maybe you are looking for

  • Easy transfer Windows - log file?

    Using Windows Easy transfer to move files from my old XP system to a new Win7 system. The transfer was to take 12 + hours, when he was about one hour left, I went out for several hours - when I came back, my new computer has been restarted (caused by

  • Looking all around the scanner to the computer to find problems everywhere?

    Hey guys, I am running windows 7 on a Sony vaio VGN-CS320J, and this is kind of screwed upward. I know not how, but firefox still crashes, I used to get the BSOD a week, not who suffer now fortunately. in any case, I'm looking for a program/software

  • Factory reset does not erase usb_1?

    It's maybe just me, but you wouldn't think that a 'Factory Reset' would be empty all the stuff non - factory? The reset is NOT clear the usb_1 out directory. Is it normal? Is there something else than below to erase it? https://supportforums.Cisco.co

  • Through a PIX VPN client

    Hello It seems to me having confused TAC with this question: I have a client who has two firewalls PIX 501. One in DC (pix - a) and one in San Diego (pix - b). They are both connected via a static IPSec VPN. Works fine, no problem. I also set up two

  • Account hacked MSN? Help please.

    Went to connect to Windows 8 on my computer and he pointed out that my password is incorrect. Tried several times, then tried with the on-screen keyboard, same result. Tried to login the My MSN account from my iPad in Safari. Same result. So having c