Software VMware 5.8 ACS and Base license

Hello

So, I bought ACS 5.8 VMware software and basic license recently. When the software arrived, I was surprised to find 3 discs (one was for one installation of 5.7, the other an upgrade to 5.8% and a disc of license). When I created a virtual machine and went to download the .iso image file I found that this software came with a .img image instead. My question is why Cisco would send me and old drive that I need to upgrade rather than send the downloadable version on their site? Now a task for five minutes only transformed into who know how long. Should I just get a third party software to convert the .img to a .iso to load in a virtual machine or should I contact Cisco and ask what gives? I'm just disappointed by the fact Cisco would send former software and wait for a customer to upgrade to 5.8.

You just download the iso of 5.8 ("ACS_v5.8.0.32.iso") directly from the download site and deploy your virtual machine using that. Then update the current level of Patch (Patch 5 at the moment). Both are available for download to users entitled to here:

https://software.Cisco.com/download/release.html?mdfid=286286338&flowid=...

Delivered support has a lot do with the logistics and distribution channel and not much to deliver the most common output directly to the end user.

I don't know that I've never deployed media, I received in the package, since I started working with Cisco equipment over 20 years ago.

Tags: Cisco Security

Similar Questions

  • Wplus WLC 5500 Base license

    Hi, I have a 5500 WLC with the Version of the software, 6.0.196.0, level Base license, according to the "Release Notes for Cisco Wireless LAN controllers' and Points of light access for broadcast 6.0.196.0, said that the base license includes all the features present in the license wplus. In the monitor of the WLC level license page say "basic" and when I go to the license Managment level, and I upgraded the license for 'wplus' a message say: wplus as next level adjustment has failed. Only with the version of the operating system, it is enough to have the functions of Wplus license, although license showing level base license, to the tracking of the WLC page.

    Thank you

    Cisco recommends that you stay away from the code 5.X and 6.X.  Upgrade to 7.X... and as a bonus, (useful if you have LWAP 1130 and 1140) OfficeExtend is now FREE!

    Please do not forget to messages useful rate.  Thank you.

  • ISE base license and importation of enddevices

    Hello

    Been through the intire internet (or so it seems) and most guides and advice are on the functionality that is included in the advanced license, profiling and so on.

    I am faced with a case where the base license should be sufficient. But I'm confused about the import of the endpoints.

    When using the basic license is the only way to import devices manually or via file or LDAP? ISE is unable to scan the network a collection of addresses MAC automaticly?

    We do not have LDAP and about 20,000 points endpoint, add them manually or in a CSV is too much work.

    Kind regards

    Philippe

    Phillip,

    You're right, these are the methods that 2 mac addresses of research, it is only two methods that ISE would apply only base licenses. If you choose to scan your network for devices ISE then that would be seen as "dynamic profiling" which is an advanced feature.

    Hope that helps,

    Tarik Admani
    * Please note the useful messages *.

  • ACS 5.2 Licenses

    Hi all

    I need help on my licenses

    Here's my situation:

    -Today, we have an ACS 5.2 VM with the base 500-device license and we must go beyond this threshold.

    -We will install a second ACS 5.2 VM for redundancy, but it's still a few months.

    -We bought new licenses: a new 500-unit basis for the second ACS license and important deployment license that will allow both over 500 devices.

    -We received a single PAK file with these two licenses: background and deployment

    -the second implementation of GBA is still a few months, but I need to install the new license of deployment as soon as possible.

    My questions are:

    Can I deploy existing GBA only the part important deployment of the PAK file I received and when the new ca is implemented, deploy the other half of the license file, with only the basic licence?

    Can I install the new license file PAK with these two background licenses and deployment on the existing server, and then delete the original base license so I can install it in the future when the new ca is implemented?

    I need to understand how to proceed.

    Thanks for your help.

    José Ribeiro

    Ideally, you want to install on your existing ACS deployment license and the other base on the new CAs license. When the new CAs joined the deployment with the large deployment license already installed, it will go get the grand license deployment of the configuration database.

    You said that you have received these two licenses in a single PAK file. If try to install both the existing GBA, I think he's going to complain that a base license is already installed. Not sure if this would avoid the important installed deployment license.

    However, if you look at the file, the two licences should be separate elements in the file each with their own separate data. It should be possible to duplicate the PAK file and then change each of the copies so that they only contain one of the licenses

  • When we sell our software we want to remove our volume licensing, the buyer can apply to their own license. This procedure is possible?

    * Original title: Volume License

    The company that I work uses several virtual machines of windows volume licenses.  When we sell our software we want to remove our volume licensing, the buyer can apply to their own license.  This procedure is possible?

    Yes, just remove the virtual machines.

    You can even uninstall the product key.

    Click Start, type: CMD
    Right-click on CMD
    Click on run as administrator
    At the command prompt, type: slmgr.vbs - upk

    Press enter, this will uninstall the product key of the computer and to the evaluation mode, you are now free to use it on another computer.

  • Unit of ACS and agent remote test

    Problems with unit ACS integration with Active Directory. Have installed the remote agent on a member server and the ACS unit can enumerate Active Directory groups correctly so there is at least some communication happening.

    Looking at newspapers in the remote agent whenever a request for ad groups comes through see you the corresponding journal entries. When a user tries to authenticate that there is no future logs through the remote agent. So maybe it is not sent to remote agent?

    In the authentication failed, connect GBA, the error is unknown user, it shows the correct username + domain name such as the person trying to authenticate.

    Windows Server is configured for a unknown user policy.

    Version of the ACS is 4.1.1.23, Remote Agent is the latest available version.

    Any ideas or things to check?

    Hello

    According to the guidelines of your last line, it seems that the ACS and RA worm are not even. Please note that ACS and RA device software worm must be same or it won't work.

    Kind regards

    ~ JG

  • ACS for Windows license

    If I have a Server Windows Installer 4.2 ACS, and I have another server for the sole purpose of failover. Can I use the same license on the failover server, or I need to purchase another license?

    Thank you

    You will need another license.

    Hope that helps

  • ISE license consumption and freeing licenses [RADIUS]

    Hi people EHT,.

    There are a lot of questions of ISE issued by me in the last time. And guess what - another here.

    I wonder how the ISE license consumption and freeing licenses actually works. At least I have not find any good document or post on it.

    From what I understand, a license (no matter if basic, plus, apex whatever) is consumed based on RADIUS accounting messages.

    Example:

    An endpoint is authenticating and allowed successfully with 802. 1 X without profiling or posture or whatever (simple). The ISE knows that this endpoint must use a base license and basic license consumption is increased by one.

    As soon as the client is disconnected from the network, the n (switch, WLC) sends an accounting stop message to the ISE and the ISE again releases the base license.

    (am I right so far?)

    Assuming that I am just using the example above:

    RADIUS is not say that really reliable. No matter that it uses UDP (which is unreliable), RAY has a mechanism of recognition built in (Accouting request / respone). But this mechanism gives up after a few attempts. Suppose that a client is disconnected, but the message of stop RADIUS is not received by the ISE.

    Fact the endpoint stay forever in the State of the current session and therefore to consume a license forever? (Assume that there is no timer of dot1x re-authentication).

    Or is it a mechanism of 'time-out' for endpoint licences?

    Kind of a side story here:

    I wrote a simple wrapper for the freeradius tool 'eapol_test '. Go Linux applications unique command line EAP (e.g., EAP - TLS) can be issued to a RADIUS server. If the Linux client acts as "supplicant" X 802.1 and authenticator. It's cool to quickly test the availability of the service of an authentication server.

    My simple wrapper for "eapol_test" performs a ping 'EAP' at the time of convergence of measurement and measurement of authentications per second in a lab environment. The wrapper can also change endpoint of each session of RAY MAC. When I do ping EAP in a laboratory of my number of licenses on the ISE exploded, because eapol_test does not deliver messages from accounting RADIUS to EHT :)

    Johannes has soon

    Hi Johannes-

    You're right about the consumption of license:

    Licenses are counted against concurrent, active sessions. An active session is one for which a RADIUS Accounting Start is received but RADIUS Accounting Stop has not yet been received.
    However, in addition to this:
    Note Sessions without RADIUS activity are automatically purged from Active Session list every 5 days or if the endpoint is deleted from the system. 
    This information used in the documentation of ISE 1.x, but for some reason, he is not :) in the 2.x here's the info from 1.2: http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_app_d_man_license.pdf I hope this helps! Thank you for the useful job evaluation!
  • Can it differentiate please vmware Sphere operation management and VMware vRealize Operations Manager 6.0?

    Hello

    We have a license for VMware vSphere 6 with operations management Enterprise Plus for 1 processor

    Can explain everything about the use of these products and differentiate? Also, do I need to buy VMware vRealize Operations Manager 6.0 license to use this VSOM?

    vSphere with operations management Enterprise Plus 1 processor 6 includes 1 processor for vSphere Enterprise 6, Plus and one license for vRealize Operations Manager Standard.  You don't need to purchase vRealize Operations Manager 6.0 to use vSOM, as it is included.

  • Mobile facility and teaching license

    Hello

    I'm looking to move from CS2 Premium to CS4 Design Premium. I'm struggling over whether to buy a commercial license, or go with the teaching license (which I think should qualify, since I'm a grad student). If I understand correctly, commercial use is fine and upgrade to the commercial versions will not be a problem in the next version, right?

    So, which leaves me with a question: if I understand correctly, the commercial license allows the software to install on his office and his laptop. Fix? Is this also possible with the teaching license? I have a trusty old PowerMac G5 that I want to keep up to date even if now I intend to spend my work mainly to my MacBook Pro.

    Oh, also I noticed in Adobe academic store, there is a $399 student edition and an edition $ 599 that says nothing to be a student edition. What is the difference between these two versions?

    Thanks for your help!

    -Tim

    In the United States there is not much difference between the student and academic license, but I THINK that the student permit cannot be installed on a single machine. Really, you should contact Adobe for clarification.

    Bob

  • My iTunes does not detect my iPad.  I use Windows 10, Norton 360 and the latest version of iTunes.  All software are up to date, and each says it works correctly.

    My iTunes does not detect my iPad.  I use Windows 10, Norton 360 and the latest version of iTunes.  All software are up to date, and each says it works correctly.

    Turn off or get rid of Norton.   I really don't see why you need it.

  • My itunes has been updated the software on my iphone 6 and then it crashed and now my iphone is showing the connect to itunes symbol - but now, it is not recognized by itunes?

    My itunes has been updated the software on my iphone 6 and then it crashed and now my iphone is showing the connect to itunes symbol - but now, it is not recognized by itunes?

    These can help:

    http://support.Apple.com/kb/HT1808

    For a Windows PC, try this http://support.apple.com/kb/TS1538

    For a Mac, try this http://support.apple.com/kb/TS1591

  • I've updated to the latest version of the software iOS overnight last night and now I can't access email on my iPad mini or Safari. When I go into the settings, click the software update that is displayed simply endless turns.

    I've updated to the latest version of the software iOS overnight last night and now I can't access email on my iPad mini or Safari. When I go into settings, a notice is displayed under the general rubric that there is 1 available software update, but when I click on the link for the software update, it runs just endlessly. I am not able to connect to the WiFi (nothing happens when I click on the WiFi button). Did not have this kind of problem before. Thanks for any idea.

    Hello

    Try a reboot press & hold the power button / stop & menu button

    Hold the two for up to 30 seconds until you see the apple logo.

    Then try update on your WiFi

    See you soon

    Brian

  • Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Is a necessary additional security, such as McAfee software on the new iMac and iPad?

    Mac users often ask if they should install "anti-virus" (AV) or software "anti-malware". The answer is 'no', but it can give the false impression that there is no threat of what is loosely called 'virus '. There is a threat.

    1. it is a comment on what you should - and should not-do to protect you from malicious software ("malware") that runs on the Internet and gets onto a computer as an unintended consequence of the user's actions.

    It does not apply to the software, such as keyloggers, which can be installed deliberately by an intruder who has convenient access to the computer, or who has been able to take control of it remotely. This threat is in a different category, and there is no easy way to defend against it. AV software is not intended to and does not, to defend against these attacks.

    The comment is long because the issue is complex. The essential points are in articles 5 and 11.

    OS X implements now three levels of integrated protection specifically against malware, not to mention the protections of runtime such as quarantine the file, execute disable, sandbox, protecting the integrity of system, System Library randomization and randomized address space layout , which can also prevent other kinds of exploits.

    2. all versions of Mac OS X 10.6.7 were able to detect the malware Mac known in downloaded files and block non-secure web plugins. This feature is transparent to the user. Apple calls internally it "XProtect."

    The malware used by XProtect recognition database is automatically updated. However, you should not count on it, because the attackers are still at least a day before the defenders.

    The following restrictions apply to XProtect:

    ☞ circumvented by some third-party network software, such as the BitTorrent clients and Java applets.

    ☞ It applies only to software downloaded on the network. Software installed from a CD or other media is not verified.

    As new versions of Mac OS X are available, it is not clear whether Apple will continue indefinitely maintain the older versions such as 10.6 XProtect database. Versions of obsolete systems security may eventually be affected. Updates to security for the code of obsolete systems will be stop being released at any given time, and which can leave them open to other types of attack in addition to malware.

    3. starting with the OS X 10.7.5, there was a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and installation packages downloaded from the network will be run only if they are digitally signed by a developer to a certificate issued by Apple. Certified software in this way has not been checked for safety by Apple, unless it comes to the App Store, but you can be reasonably sure that it has not been changed by someone other than the developer. His identity is known to Apple, so it could be held legally responsible if it distributes malicious software. Which may not mean much if the developer lives in a country with a weak legal system (see below).

    Access controller does not depend on a database of known malware. He has, however, the same limitations as XProtect and in addition the following:

    ☞ It can easily be turned off or overridden by the user.

    ☞ A malware attacker could find a way around it, or could take control of a certificate of signing of code under false pretenses or could simply ignore the consequences of the distribution of malware Tryggvason.

    ☞ Developer App store could find a way around the Apple control, or the control may fail due to human error.

    Apple took too long to revoke some known attackers codesigning certificates, thus diluting the value of the keeper and the program developer ID. These variances do not involve the App Store products, however.

    For the reasons given, App Store, and, to a lesser extent - other applications recognized by signed Gatekeeper, are safer than others, but they cannot be considered to be absolutely sure. "Sand" applications could make to access to private data, such as your contacts, or for access to the network. Think that before granting access. Security sandbox is based on user input. Never click through any application for leave without thinking.

    4. by starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background. He checks and removes, malware that corresponds to a database of recognition held by Apple. To ensure that MRT will be executed when the database is updated, the App Store tab in system preferences and check the box marked

    Install the system data files and security updates

    If it is not already done.

    As XProtect, MRT is effective against known threats, but not against strangers. It alerts you if it detects malware, but otherwise, it has no user interface.

    5. the built-in Mac OS x security features reduce the risk of malware attack, but they are not and will never be complete protection. Malware is a problem of human behavior, not a behavior machine, and none only of technological solution will solve. Software protect you from trust only will make you more vulnerable.

    The best defense is always going to be your own intelligence. Except perhaps feats of Java, all the known malware, circulating on the Internet wearing reached a completely setting installation to update to OS X 10.6 or later takes the form of so-called "Trojans", which may have no effect if the victim is deceived in their execution. The threat thus amounts to a battle of wits between you and cybercriminals. If you are better informed, they think you are, you win. In effect, it means that you always stay in the shelter of practical computing. How do you know when you leave the safe harbor? Here are a few signs warning of danger.

    Software from a reliable source

    ☞ Software with a brand, such as Adobe Flash Player, does not come directly from the Web site. Don't be fooled an alert of any website for updating Flash, or your browser, or other software. A real alert that Flash is outdated and blocked is shown on this support page. In this case, follow the instructions on the support page. Furthermore, assume that the alert is false and that someone is trying to rip you off to install malicious software. If you see these alerts on more than one Web site, ask for instructions.

    ☞ Software any is distributed via BitTorrent or Usenet, or on a Web site that distributes pirated music and movies.

    ☞ Rogue sites Web such as CNET Download MacUpdate, Soft32, Softonic and SourceForge distribute free applications that have been packaged in a superfluous "install".

    ☞ The software is advertised through spam or intrusive web ads. Any announcement, on any site, which includes a direct link to a download should be ignored.

    Software that is clearly illegal or doing something illegal

    Commercial software ☞ high-end such as Photoshop is "cracked" or "free."

    ☞ An application helps you violates copyright law, for example to circumvent the copy protection on a commercial software, or streamed media recording to be reused without permission. All the 'YouTube downloaders' are in this category, but not all are necessarily malicious.

    Conditional or unsolicited offer from strangers

    ☞ A phone calling or a web page you indicates that you have a "virus" and offers to remove. (Some reputable sites warned visitors who have been infected with the malware "DNSChanger" legitimately. The exception to this rule applies.)

    ☞ A web site offers a free content like music or video, but for use, you must install a "codec", 'plug-in', 'player' 'Downloader', 'extractor', or 'certificate' which comes from the same site, or a stranger.

    ☞ You win a prize in a competition that you are never entered.

    ☞ someone on a forum like this is eager to help you, but only if you download an application of your choice.

    ☞ a 'FREE WI - FI!' network presents itself in a public place like an airport, but is not provided by management.

    ☞ Online everything that you expect to pay is 'free '.

    Unexpected events

    ☞ a file is downloaded automatically when you visit a web page, without any further action on your part. delete any file without opening it.

    ☞ You open what you think, it is a document and you receive an alert that it is "an application downloaded from the Internet." Click Cancel and delete the file. Even if you don't get the alert, you must always remove any download that is not what you expected it to be.

    ☞ An application does something you don't expect, such as permission to access your contacts, your location or the Internet without obvious reason.

    ☞ Software is attached to the email you na not ask, even if it is (or seems to come) by a person of trust.

    I do not leave the safe harbour that once will necessarily lead to disasters, but make a habit of it will weaken your defenses against malicious software attacks. None of the above scenarios must, at the very least, make you uncomfortable.

    6. Java on the Web (not to be confused with JavaScript, to which it is not related, despite the similarity of names) is a weak point in the security of any system. Java is, among other things, a platform to run complex applications in a web page. That was always a bad idea, and Java developers have proved unable to apply it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been a type virus Windows affecting OS X. simply load a page with Java malicious content could be harmful.

    Fortunately, client-side Java on the Web is outdated and largely disappeared. Only a few outdated sites still use it. Try to accelerate the process of extinction by avoiding these sites, if you have a choice. Forget to play games or other uses not Java essentials.

    Java is not included in OS X 10.7 and later versions. Discrete Java installers are distributed by Apple and Oracle (the developer of Java). Do not use one unless you need it. Most of the people don't. If Java is installed, turn it off- not the JavaScript in your browser.

    Whatever the version, experience has shown that Java on the Web is not reliable. If you must use a Java applet for a job on a specific site, Enable Java only for the site in Safari. Never activate Java for a public Web site that carries the third-party advertising. Use only on websites that are well known, protected by login and secure without ads. In Safari 6 or later, you will see a padlock icon in the address bar when you visit a secure site.

    7. another perennial weak point is Adobe Flash Player. Like Java, Flash is declining well deserved, but content Flash is still much more widespread than the contents of Java on the Web. If you choose to install the Flash plugin, you can reduce your exposure to Flash by checking the box marked

    Stop the plug-ins to save energy

    in the Advanced tab of the preferences of Safari window, if not already done. Consider also installing an extension Safari as "ClickToFlash" or "ClickToPlugin." They will prevent the Flash content automatically load and are initially not Flash video is substituted for Flash on YouTube and perhaps a few other sites. I tested the extensions and found them safe, but you should always do your own research before you decide whether to trust any third party software.

    8. remain within the sphere of security, and you will be as safe from malware you can be practically. The rest of this comment is what you must do to protect you.

    Never install any AV or products 'Internet security' for Mac if you have a choice, because they are all worse than useless. If you are required by a (wrong) institutional policy to install some kind of AV, choose one of the free apps in the Mac App Store, nothing else.

    Why you should not use products AV?

    ☞ To recognize malware, software depends on a database of known threats, which is always at least one day to day. This technique is a proven failure, as a major supplier of AV software has admitted. Most of the attacks are "zero-day" - that is, previously unknown. Recognition-based AV does not defend against such attacks, and the enterprise IT industry comes to realize that the traditional AV software is worthless.

    ☞ design is based generally on the nonexistent threat that malware can be injected at any time, anywhere in the file system. Malware is downloaded from the network; He is not of the blue leaves. To meet this threat does not exist, a commercial AV software changes or low level functions of the operating system, which is a waste of resources and a frequent cause of instability, bugs, poor performance, and duplicates.

    ☞ changing the operating system, the software can also create weaknessesthat could be exploited by malicious attackers.

    ☞ especially, a false sense of security is dangerous. This fact relates to all AV software it will never be any changes elsewhere.

    9. a free AV product from the Mac App Store is safe as long as you don't let it delete or move files. Ignore all the warnings that it can give you on "heuristic" or "phishing." These warnings, if they are not simply false positives, see the text of e-mail messages or updates cached web pages, not malware.

    An AV application is not necessary and may not be invoked for protection against malware for OS X. It is useful, or even not at all, only to detect malware Windows and even for this use it is not really effective, because the new Windows malware makes its appearance much faster than OS X malware.

    Windows malware cannot hurt you directly (unless, of course, you use Windows). Just do not pass to someone else. A malicious link in the e-mail is usually easy to recognize by the name alone. A concrete example:

         London Terror Moovie.avi [124 spaces] Checked By Norton Antivirus.exe

    You don't need software to tell you it's a horse Trojan for Windows. Software may be able to tell what trojan is, but who cares? In practice, there is no reason to use a recognition software, unless an organizational strategy requires. Malware Windows is so widespread that you must assume that it is in each attachment until proof to the contrary. Nevertheless, a free AV product on the App Store can serve a purpose if it fulfills a misinformed network administrator that says you must have some sort of application AV. An App Store product will not change the operating system; in fact, it does nothing, unless you run it.

    If you are just curious to know if a file is considered malware by the AV engines, you can download it from the "VirusTotal" site, where it will be tested against most of them without charge. A negative result is evidence of what whether, for the reasons given above. I do not recommend doing this with a file that may contain private information.

    10. There seems to be a common belief that the firewall Application acts as a barrier to infection, or prevents operation of malware. He does not. It blocks incoming connections to some network services you are using, such as file sharing. It is disabled by default, and you should leave it like that if you're behind a router on a private home or office network. Activate only when you are on an untrusted network, for example a public Wi - Fi hotspot, where you do not want to provide services. Disable services that you don't use in the sharing preferences window. All are disabled by default.

    11. as a Mac user, you don't have to live in fear that your computer may be infected whenever you install the software, read emails, or visit a web page. But nor can you assume that you will always be free from exploitation, no matter what you do. Internet browsing, it's like walking the streets of a big city. It can be as safe or as dangerous that you choose to do so. The greatest harm done by software AV is precisely its selling point: it makes people feel safe. They can then feel sufficiently safe to take risks, which the software does not protect them. Nothing can reduce the need for safe computing practices.

  • The Epson Workforce 600 is connected via a usb cable, the other is a wireless network. I reinstalled the software of the printer (Epson) and it shows in printers and devices, but it does not list

    I have two printers installed on my laptop, only appears.  The Epson Workforce 600 is connected via a usb cable, the other is a wireless network.  I reinstalled the software of the printer (Epson) and it shows in printers and devices, but it is not the list when I go to print something.  When I select "Find a printer", it gives me a list of computer icons.

    Hello

    Check with Epson support, their documentatiion online and drivers. As it's Epson OEM
    responsible for the proper functioning of the printer and their drivers provided.

    Good luck, you need to update or reinstall the latest driver.

    Epson - Support us.
    http://www.Epson.com/cgi-bin/store/support/SupportIndex.jsp?BV_UseBVCookie=Yes

    Epson - support from Europe
    http://www.Epson.co.UK/support

    =============================================

    The main issue is probably the drivers, but these can help:

    Add or remove a printer
    http://Windows.Microsoft.com/en-us/Windows-Vista/add-or-remove-a-printer

    Solve printer problems
    http://Windows.Microsoft.com/en-us/Windows-Vista/troubleshoot-printer-problems

    Open the printer Troubleshooter
    http://Windows.Microsoft.com/en-us/Windows7/open-the-printer-Troubleshooter

    Find the manufacturer's Web site
    http://Windows.Microsoft.com/en-us/Windows-Vista/find-a-printer-manufacturers-website

    Find and install printer drivers in Windows 7
    http://Windows.Microsoft.com/en-us/Windows7/find-and-install-printer-drivers

    I hope this helps.

    Rob Brown - Microsoft MVP<- profile="" -="" windows="" expert="" -="" consumer="" :="" bicycle=""><- mark="" twain="" said="" it="">

Maybe you are looking for