Split of static traffic between the VPN and NAT

Hi all

We have a VPN from Site to Site that secures all traffic to and from 10.160.8.0/24 to/from 10.0.0.0/8.  It's for everything - including Internet traffic.  However, there is one exception (of course)...

The part that I can't make it work is if traffic comes from the VPN (10.0.0.0/8) of 10.160.8.5 (on 80 or 443), then the return traffic must go back through the VPN.  BUT, if traffic 80 or 443 comes from anywhere else (Internet via X.X.X.X which translates to 10.160.8.5), so there need to be translated réécrirait Internet via Gig2.

I have the following Setup (tried to have just the neccessarry lines)...

interface GigabitEthernet2

address IP Y.Y.Y.Y 255.255.255.0! the X.X.X.X and Y.Y.Y.Y are in the same subnet

address IP X.X.X.X 255.255.255.0 secondary

NAT outside IP

card crypto ipsec-map-S2S

interface GigabitEthernet4.2020

Description 2020

encapsulation dot1Q 2020

IP 10.160.8.1 255.255.255.0

IP nat inside

IP virtual-reassembly

IP nat inside source list interface NAT-output GigabitEthernet2 overload

IP nat inside source static tcp 10.160.8.5 80 80 X.X.X.X map route No. - NAT extensible

IP nat inside source static tcp 10.160.8.5 443 443 X.X.X.X map route No. - NAT extensible

NAT-outgoing extended IP access list

refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq www

refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq 443

permit tcp host 10.160.8.5 all eq www

permit tcp host 10.160.8.5 any eq 443

No. - NAT extended IP access list

refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq www

refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq 443

allow an ip

route No. - NAT allowed 10 map

corresponds to the IP no. - NAT

With the above configuration, we can get to the Internet 10.160.8.5, but cannot cross it over the VPN tunnel (from 10.200.0.0/16).  If I remove the two commands «ip nat inside source static...» ', then the opposite that happens - I can get then to 10.160.8.5 it VPN tunnel but I now can't get to it from the Internet.

How can I get both?  It seems that when I hit the first NAT instruction (overload Gig2) that 'decline' in the list of ACL-NAT-outgoing punts me out of this statement of NAT.  It can process the following statement of NAT (one of the 'ip nat inside source static... ") but does not seem to"deny"it in the NON - NAT ACL me punt out of this statement of NAT.  That's my theory anyway (maybe something is happening?)

If this work like that or I understand something correctly?  It's on a router Cisco's Cloud Services (CSR 1000v).

Thank you!

Your netmask is bad for your 10.0.0.0/8. I worry not about the port/protocol or since that can screw you up. A better way to do it would be to deny all IP vpn traffic.

NAT-outgoing extended IP access list

deny ip 10.160.8.0 0.0.0.0.255 10.0.0.0 0.255.255.255

...

No. - NAT extended IP access list

deny ip 10.160.8.0 0.0.0.0.255 10.0.0.0 0.255.255.255

allow an ip

Doc:

Router to router IPSec with NAT and Cisco Secure VPN Client overload

Thank you

Brendan

Tags: Cisco Network

Similar Questions

  • Problem with the VPN and NAT configuration

    Hi all

    I have a VPN tunnel and NATing participates at the remote site.

    I have the VPN tunnel from the absolutely perfect traffic from users, but I am struggling to manage the device via SNMP through the VPN tunnel.

    Remote subnet is 192.168.10.0/24

    That subnet gets PAT'd to 192.168.4.254/32

    The subnet to HQ is 10.0.16.0/24

    IP address of the ASA remote is 192.168.10.10

    Of course, as this subnet is NAT would have I created a static NAT so that the 192.168.4.253 translates 192.168.10.10.

    I can see that packets destined to the 192.168.4.253 device address comes to the end of the tunnel as long as the number of packets decrypted increases when you run a continuous ping to the device.

    However, the unit will not return these packages. The wristwatch that 0 packets encrypted.

    Please let me know if you need more information, or the output of the configuration complete.

    When I start a capture on the ASA remote, I don't see ICMP packets to reach the ASA REAL ip (192.168.10.10). Maybe I set my NAT evil?

    Also, there is no Interface inside, only an Interface outside. And the default route points to the next router ISP Hop on the external Interface.

    Hope that all of the senses.

    Thank you

    Mario Rosa

    No, unfortunately you can not NAT the ASA outside the IP of the interface itself.

  • Encrypted L3 Communications between the TOWER and WLC?

    Hi all

    I work with a client who wants to put the towers away to their WLC (a 4402). The problem is that communications between the TOWER and WLC must be secured, even through their private Wan! I have a few questions that result, if someone is able to help you;

    1. I can't know if and what method of encryption is (is it AES etc.?) used on connections between towers and the WLC and what are the steps?

      1. The terminology can be a problem here, it's not a wireless mesh, just classic LAP for WLC
    2. EXTENSIVE customer network is already encrypted (IPSec VPN via VPLS) in parts - what is the consequence of execution of AP<-->WLC with end to end (if possible) on a network encryption EXTENDED with IPSec, i.e. double encryption?

    Strange but true - pointers will be greatly appreciated... Phil.C

    With a controller of the 4400 series, the control traffic between the AP and the regulator is already encrypted AES.  The user traffic is not encrypted.  If you use a 5508 controller all traffic between the AP and the controller is encrypted AES.

    For what is running the traffic through a VPN, it should work.  The issue I see with this is with the MTU in general.  The controller will drop all packets with a payload of less than 32bytes data.  According to the MTU over the VPN I've seen packets getting fragmented and it is a question.  If you use one of the versions CAPWAP (5.2 or newer) discovery dynamic MTU is part of the Protocol and this MTU problem does not really exist.

  • authentication between the ACS and AD

    Hello

    I would like to know what kind of authentication mechanism ACS 5.1 use to speak with Active Directory. Does simply use MSCHAP, MSCHAPv2 or PAP. By default, it uses PAP to talk between the Cisco IOS and the AEC on the 5.1.

    If you llook at the default admin tab and click on allowed protocols---> he mentions PAP.

    Should I use a safe means of transport between the ACS and AD. IDF, so anyone can say the authentication mechanism?

    Thank you

    Any meeting of directors like telnet, ssh and comfort they always use PAP as an authentication method.

    Although communication pap can be captured and read in this case in clear text. However, since we have Ganymede in use, he always encrypt the whole package with shared secret defined on the IOS and ACS/GANYMEDE so if you capture traffic between the radius and the device you won't be able to decipher it without the key.

    In case you have Ray then using SSH (Putty) so that it can help you for a safe communication.

    ACS and AD support PAP, CHAP, MSCHAPv1 and MSCHAPv2.

    However, the administration does not work on another method of authentication except PAP.

    HTH

    Regds,

    Jousset

    Note the useful posts ~

  • Routing problem between the VPN Client and the router's Ethernet device

    Hello

    I have a Cisco 1721 in a test environment.

    A net 172.16.0.0/19 simulates the Internet and a net 192.168.1.0/24 simulates the net, the VPN tunnel must go to (intranet).

    The net 172.16.0.0 depends on the router 0 FastEthernet, Intranet (VPN) hangs on Ethernet 0.

    The configuration was inspired form the sample Configuration

    "Configuring the Client VPN Cisco 3.x for Windows to IOS using Local extended authentication"

    and the output of the ConfigMaker configuration.

    Authentication and logon works. Client receives an IP address from the pool. But there's a routing problem

    side of routers. Ping client-side - do not work (the VPN client statistics that count encrypt them packets, but not to decrypt).

    Ping the router works too, but decrypt and encrypt customer statistics in VPN packets count progressive

    (customer has a correct route and return ICMP packets to the router).

    The question now is:

    How to route packets between the Tunnel and an Ethernet device (Ethernet 0)?

    conf of the router is attached - hope that's not too...

    Thanks & cordially

    Thomas Schmidt

    -.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.- snipp .-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.

    !

    version 12.2

    horodateurs service debug uptime

    Log service timestamps uptime

    encryption password service

    !

    !

    host name * moderator edit *.

    !

    enable secret 5 * moderator edit *.

    !

    !

    AAA new-model

    AAA authentication login userauthen local

    AAA authorization groupauthor LAN

    !

    ! only for the test...

    !

    username cisco password 0 * moderator edit *.

    !

    IP subnet zero

    !

    audit of IP notify Journal

    Max-events of po verification IP 100

    !

    crypto ISAKMP policy 3

    3des encryption

    preshared authentication

    Group 2

    !

    ISAKMP crypto client configuration group 3000client

    key cisco123

    pool ippool

    !

    ! We do not want to divide the tunnel

    ! ACL 108

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT

    !

    Crypto-map dynamic dynmap 10

    Set transform-set RIGHT

    !

    map clientmap client to authenticate crypto list userauthen

    card crypto clientmap isakmp authorization list groupauthor

    client configuration address map clientmap crypto answer

    10 ipsec-isakmp crypto map clientmap Dynamics dynmap

    !

    interface Ethernet0

    no downtime

    Description connected to VPN

    IP 192.168.1.1 255.255.255.0

    full-duplex

    IP access-group 101 in

    IP access-group 101 out

    KeepAlive 10

    No cdp enable

    !

    interface Ethernet1

    no downtime

    address 192.168.3.1 IP 255.255.255.0

    IP access-group 101 in

    IP access-group 101 out

    full-duplex

    KeepAlive 10

    No cdp enable

    !

    interface FastEthernet0

    no downtime

    Description connected to the Internet

    IP 172.16.12.20 255.255.224.0

    automatic speed

    KeepAlive 10

    No cdp enable

    !

    ! This access group is also only for test cases!

    !

    no access list 101

    access list 101 ip allow a whole

    !

    local pool IP 192.168.10.1 ippool 192.168.10.10

    IP classless

    IP route 0.0.0.0 0.0.0.0 172.16.12.20

    enable IP pim Bennett

    !

    Line con 0

    exec-timeout 0 0

    password 7 * edit from moderator *.

    line to 0

    line vty 0 4

    !

    end

    ^-^-^-^-^-^-^-^-^-^-^-^-^- snapp ^-^-^-^-^-^-^-^-^-^-^-^-^-^-

    Thomas,

    Can't wait to show something that might be there, but I don't see here. You do not have the card encryption applied to one of the interfaces, perhaps it was not copied. Assuming your description you do it, or should it be, applied to the fa0 and you are connected. Try how you ping? Since the router or a device located on E0? If you ping the router, you will need to do an extended ping of E0 to the ip address of the client has been assigned. If your just ping the router without the extension, you will get sales and decrypts that you declare on the client. Have you tried to ping from the client to interface E0? Your default route on the router is pointing to fa0? You have a next hop to affect? You have several NIC on the client pc? Turn off your other network cards to check that you don't have a problem with routing on the client if you have more than one.

    Kurtis Durrett

  • Relationship between the list and ListField...

    Hey people of Java...

    I can't thank you enough for your answers because I'm really starting to "grok" the paradigm of Java.

    Another came today I'm having problems understanding I deconstruct this app MemoryDemo...

    In the screen of the demo is these two lines:

    Get and display the list of customers.
    _customerList = CustomerList.getInstance ();
    _customerListField = new MyListField (_customerList.getNumCustomerRecords ());

    Well, now I understand the first line perfectly. She develops an object with the contents of the customers it contains.

    The second line calls a custom ListField routine that I show below:

    the final private class MyListField extends ListField
    {
    public MyListField (int numEntries)
    {
    Super (numEntries);
    }

    }

    Here is the part that I don't understand:

    It seems to appeal to both the MyListField() and the super() is simply the NUMBER of elements required, but not * that * list to use.  Exactly how is MyListField() or super() knows how to use the list of customers?  I ask because this exact routine is used a few lines more later (in the part of the main screen) to do the same thing for a list of the records of the order - even once without any reference to which list to use.

    It doesn't seem to be an explicit connection or the relationship between the _customerList and ListField is building.  Is somehow deconstruct '_customerList.getNumCustomerRecords ()' to its root and use _customerList somehow?  I don't think that I changed the call to this:

    _customerListField = new MyListField (_customerList.getNumCustomerRecords ());
    _customerListField = new MyListField (PICK_A_NUMBER);

    Where the constant is: public private static final int PICK_A_NUMBER = 50;

    And he ALWAYS displays a list of customers (though now with only 50 files).  How to do know?

    Thanks in advance!

    -John

    "I guess that somewhere in the interior architecture of the ListField, he knows that he has to paint the whole - one at a time - when put on the screen - that's it."

    Fix.

    This is the great thing about ListField.  It attracts only those who are on the screen.  If you use ListField draw a list of 10,000 rows (I tested), and it will only extract and draw the 10 that he needs.

    "Again, I don't find any explicit loop where it is through each element and then calling drawListRow()."

    Good yet once, it is not there.

    "Maybe one day I'll be able to pay it back here."

    It would be great.

  • EIGRP running between the router and ASA by switch

    Hello

    Is that possible I can running an EIGRP between router and ASA by switch?

    Router and ASA connected to the switch with static route.

    Hi Tommy Chin.

    It is possible, we must advertise to the route between the router and ASA.

    Please provide your connectivity diagram to better explain.

    For example...

    interface GigabitEthernet0/0

    Description links to WAN router

    nameif OUTSIDE

    security-level 50

    IP 10.1.1.1 255.255.255.192 ensures 10.1.1.2

    Summary-address eigrp 100 10.1.0.0 255.255.0.0 1

    !

    Confiuration Protocol EIGRP

    standard access list eigrpACL_FR allow a

    !

    Router eigrp 100

    eigrpACL_FR distribute-list in the interface outside

    neighbor 10.1.1.3 OUTSIDE interface

    neighbor 10.1.1.2 OUTSIDE interface

    Network 10.1.1.0 255.255.255.192

    redistribute connected

    redistribute static

    !

    Kind regards

    Srinivas.

    Note: if it solves your problem it mark it as resolved.

  • Go simple traffic over the VPN tunnel

    Hi Pros,

    We have a problem with the traffic through the VPN. Specific subnets is not able to reach a specific HOST in the HQ, however, the host in the HQ can reach this subent on the remote database. Interresting to traffic to the vpn are mirrored on the other. Here is the partial config of the remote vpn router.

    crypto ISAKMP policy 10
    BA 3des
    preshared authentication
    Group 2
    ISAKMP crypto key mypubkey9 address 210.199x.2xx.xx
    !
    !
    Crypto ipsec transform-set esp-3des esp-sha-hmac vpn series
    !
    tunel_traffic 50 ipsec-isakmp crypto map
    the value of 210.199x.2xx.xx peer
    Set security-association second life 1440
    transform-set vpn - Set
    PFS group2 Set
    match address remote-int-traffic
    !
    !
    !
    !
    Null0 interface
    no ip unreachable
    !
    interface FastEthernet0/0
    IP 1.1.1.3 255.255.255.248
    IP virtual-reassembly
    route IP cache flow
    Speed 100
    full-duplex
    No mop enabled
    !
    interface FastEthernet0/1
    IP 10.25.24.2 255.255.255.0
    NAT outside IP
    inspect the SDM_LOW over IP
    IP virtual-reassembly
    Speed 100
    full-duplex
    No mop enabled
    tunel_traffic card crypto
    !
    IP route 0.0.0.0 0.0.0.0 10.25.24.2
    IP route 1.0.10.0 255.255.255.0 210.199x.2xx.xx (public IP address of the router vpn HQ)
    IP route 4.0.x.0 255.255.255.0 210.199x.2xx.xx
    IP route 4.0.15.11 255.255.255.255 210.199x.2xx.xx (cannot reach this hot HQ)
    IP route 10.254.0.0 255.255.255.0 210.199x.2xx.xx
    IP route 10.254.254.56 255.255.255.255 210.199x.2xx.xx
    !

    distance-int-traffic extended IP access list
    permit ip host 10.254.254.56 10.1x.200.0 0.0.3.255
    Licensing ip to 10.1x.200.0 0.0.3.255 host 10.254.254.56
    Licensing ip to 10.1x.20.0 0.0.3.255 host 10.254.254.5
    permit host ip 4.0.x.11 10.1x.200.0 0.0.3.255
    permit ip 10.1x.200.0 0.0.3.255 host 4.0.x.11
    !

    Thank you

    You really set one of the following routes, and it seems wrong that it should really be directed to the jump to next to the router. It should just route through the default route if you have configured listed routes. PLS, delete them if those are all you have configured and left the default route in the configuration.

    IP route 1.0.10.0 255.255.255.0 210.199x.2xx.xx (public IP address of the router vpn HQ)

    IP route 4.0.x.0 255.255.255.0 210.199x.2xx.xx

    IP route 4.0.15.11 255.255.255.255 210.199x.2xx.xx (cannot reach this hot HQ)

    IP route 10.254.0.0 255.255.255.0 210.199x.2xx.xx

    IP route 10.254.254.56 255.255.255.255 210.199x.2xx.xx

    Also, if it works in a way, it is more likely an access-list or a firewall that blocks traffic in one direction.

  • Is it posible to allow access between the host and virtal machine without wired network?

    I want to use my laptop to show him that I did in the virtual work to other people at my home.

    However, the laptop is ofen not allowed access to the network in their office.

    Is it posible to allow access between the host and virtal machine without wired network?

    VMware player

    My virtual machine is filled to the physical network adapter and use the static IP address.

    Brad

    Setting of the virtual machine: filled

    Change that to each host only (what Continuum called VMnet1) or NAT (VMnet8).  Both use a separate virtual NETWORK card to connect the physical computer virtual host, independent of any NETWORK adapter on the host.

    ... Since the machine host (win7) could not get IP, ping fail to VM (192.168.1.5)...

    Because the connection between the guest and the host is through a separate NETWORK card, you must use the 'other' IP address.  Access a prompt on the host computer and type IPCONFIG to view the IP address of VMnet1 and VMnet8 NIC.  Then use this IP address instead of 192.168.1.5.

    And when you have changed the network management modes (i.e. of bridged to host-only), Windows does not automatically renew its IP address.  The virtual NETWORK card uses a different subnet if you need to renew your DHCP lease or change your static IP address to work with the new subnet.

  • How place of content between the header and tabs?

    I have the header part which must be constant through the portal but below that I have 3 links
    as I AM an employee, employer, broker...

    which showed that in the homepage above the tabs...
    How can I do this...

    How place of content between the header and tabs...: () kindly help...

    Hey djo
    Try these approaches and see if it works.

    1. in the header Section, page footer you shell header and add a Portlet header. This JSP file associated header Portlet will be all static content in the upper part. In the lower part, add these 3 links say right. Show these links only based on certain properties of the query as isHome. Now for the main book House and another page associate a BackingFile. In this backup file in the lifecycle methods preRender or handlePostBack, get BookManager instance and all pages and see which page is active. For this page, see its page definition label which will be always unique. IF the page def label is like home_page_def (it is the wording of the page def you give to the homepage), then set the value of the key in the request as isHome = true property. The only doubt is after book backingfile is triggered, the header needs to be reloaded, because only then can he pick up the attributes of the request.

    2. create a new portlet as HomePageLinks portlet. Its title property is not Visible and other properties of the UI as NoBorder, etc. NoTheme. The associated JSP will be the 3 links you mentioned fixed right. You can use css styles to make it right. Now dropping this portlet in the header Shell box. You have already HeaderPortlet in the upper part, lower than that, you will have this portlet HomePageLinks. Now associate a backup file for this Portlet show, only if the current active page of books is the home page comparing the label def etc. as mentioned above.

    In both scenarios, only concern is when clicked on different Pages, the entire portal is to be made directly from the header at the top. Only then the backup file will be set the key and the portlet HomePageLinks can show or hide as a result.

    Try to raise an event when the user clicks on the homepage. This port listening for that event can be HomePageLinks Portlet. I guess the event mechanism should work regardless of where the portlet is placed. In the event listner, see if you can show/hide this portlet.

    The only challenge is reloaded must section header whenever you click on a tab.

    Start putting a few files of backup and System.out.printlns to see if the header section gets recharged on, click on the tabs.

    These are just my thoughts on the top of my head. Other users of the forum may have better alternatives or a different version of the above approaches.

    Thank you
    Ravi Jegga

  • synchronization between the iphone and windows 7

    Can I synchronize excel and word between iphone and windows 7?  How?  CAN I get excel and word or compatible programs (aps) on iphone?  Also - I have an old version of MS Outlook (2002, 10.6 V, SP3) I want to be able to sync with the calendar on the iphone.  What can I and how?

    Also - I do not trust "the cloud."  How can I synchronize and transfer stuff between the iphone and my computer (win 7) without putting them on the cloud?

    Don't have an iphone yet, this will be my first smart phone.  Being able to use the above programs and stay out of the cloud are my priorities.

    Thank you

    Word and Excel:

    https://iTunes.Apple.com/us/app/Microsoft-Excel/id586683407?Mt=8

    https://iTunes.Apple.com/us/app/Microsoft-Word/id586447913?Mt=8

    Yes, you can sync if you store your documents in the cloud, but you do not trust so the answer is, you cannot them synchronize the.

    lar136 wrote:

    Don't have an iphone yet, this will be my first smart phone.  Be able to use the above programs and stay out of the cloud is my priorities.

    Don't get an iPhone. I think the Android device is a better solution for you.

  • My speed has decreased between the router and the modem is not working properly, what can I do to increase the download speed with my Time Capsule 802.11n

    My speed has decreased between the router and the modem is not working properly, what can I do to increase the download speed with my Time Capsule 802.11n

    A variety of phenomena can affect the performance of its wireless network. You may be able to mitigate some negative effects.

    Solutions to any factors that may have an impact on your wireless network, read use the Diagnostics wireless for you help to solve the problems of Wi-Fi on your Mac - Apple Support.

  • In preferences, search option is missing between the general and the content.

    I use Firefox 40.0.3 on OSX and I tried to set the search parameters. When I go into Preferences, I don't see the search catgergory. If I remember correctly there used to be between the general and the content, but it just disappeared. I was wondering if there is a way to recover or if these options have been moved to another location in the new version.

    I restarted Firefox in safe mode to disable all addons. It is not yet here.

    You have disabled browser.search.showOneOffButtons [set this pref to false] in Subject: config?
    Enter about: config in the URL bar and press ENTER. then use the search box at top.

    Options > Search "tab" disappears when this pref is toggled to false. Search preferences back to the old system where the 'controls' are in the search bar - manage search... engines such as those used before Firefox 34.

  • Why my display of the date of the mailbox does not have a / between the year and the month?

    I'm talking here about how the date of different e-mails appear in my Inbox. I have a / between the month and the day, and a / after the day, but I did not / between the year and the month.

    TB uses the date format short, such that defined by your operating system, which, in the case of Windows, is located in the Panel control/region and language.

    http://KB.mozillazine.org/Date_display_format

    There are a few modules that might also be useful:

    https://addons.Mozilla.org/en-us/Thunderbird/addon/ConfigDate/

    https://addons.Mozilla.org/en-us/Thunderbird/addon/Super-date-format/

    http://chrisramsden.vfast.co.UK/3_How_to_install_Add-ons_in_Thunderbird.html

  • What is the difference between the password and access code

    I get all the IDs and passwords and none are accepted

    "I received message' iPad requires your password after restart", but it does not accept passwords

    What is the difference between the password and access code

    Standard codes which block the iPad are 4 or 6-digit. You can set a more difficult to decode, personalized access code / password in the settings using letter and numbers if you wish.

    A password is a series of numbers, symbols and letters that a user putting in place to protect the information in a frame, a web site, e-mail, etc. This may actually be a word or series of words, if you wanted to set up in this way.

    Your iPad is looking for this 4- or 6-digit code. If you can remember, you must restore the device so for free.

    If you have forgotten the password for your iPhone, iPad or iPod touch, or your device is disabled - Apple supports

Maybe you are looking for

  • Gray screen after update

    It gets frustrating after each update all the getting is a gray screen when the Apple appears, any suggestions

  • Fortran and Xcode

    Hello I'm a beginning student of the SCE and programming. We learned C++ and I used Xcode so far and it handles very well the C++. Now we move to Fortran and I would like to know if there is a way to use Xcode for this too - I guess there must be som

  • New Tiny M73 - graphics problem: 1920 x 1080 but display 1360 x 768

    Brand new with box. On Windows 7, noticed low resolution on screen Toshiba (has been used before on the other M73). Upgrading to W10 and put to update all software/drivers. Nada. Checked all the settings and tinkered with them to see if something mig

  • SX280 panoramic video

    During panning videos wiwth my SX280 I always try to be as smooth as possible.  However, the videos that result are slightly jerky.  The unit is set at 640 x 480.  Is it possible to get smoother videos?

  • Sansa Fuze wheel broken

    My Sansa Fuze wheel is broken. There it stuck and didn't budge (does not), so I can't navigate the menu. This makes it essentially useless.  Can it be easily solved? The "rocket" is only around the age of 7 months. Thank you.