VPN inside and on a PIX DMZ
Hello
I've got 2 PIx 515E with UR 1 and 4 Ethernet 1 506th both in 6.3.4.
I tried to make VPN between Toulon and Montreal.
In Toulon, I can communication of inside the demilitarized zone and inside the Montreal network
Montreal, I can communicate in Toulon inside the network.
But disclosure of the dmz of Toulon for of Montreal and Montreal to Toulon DMZ network.
I got a Syslog message saying that it is not possible...
How could I solve this problem?
Thank you very much
Charles
506th Montreal
IP address inside 192.168.20.1 255.255.255.0
access-list 102 permit ip 192.168.20.0 255.255.255.0 192.168.0.0 255.255.252.0
access-list 102 permit ip host 199.x.x.170 to 192.168.2.3 host
access-list 102 permit ip host 199.x.x.170 192.168.1.5 host
access-list 103 allow ip 192.168.20.0 255.255.255.0 192.168.0.0 255.255.252.0
NAT (inside) - 0 102 access list
Crypto ipsec transform-set esp - esp-md5-hmac confoptis
map ToToulon 10 ipsec-isakmp crypto
crypto ToToulon 10 card matches the address 103
card crypto ToToulon 10 set peer 195.x.x.2
card crypto ToToulon 10 the transform-set confoptis value
ToToulon interface card crypto outside
ISAKMP allows outside
ISAKMP key * address 195.x.x.2 netmask 255.255.255.255 No.-xauth-no-config-mode
ISAKMP identity address
part of pre authentication ISAKMP policy 10
encryption of ISAKMP policy 10
ISAKMP policy 10 md5 hash
10 2 ISAKMP policy group
ISAKMP life duration strategy 10 86400
515E Toulon
IP address inside 192.168.1.10 255.255.255.0
dmZ1 address IP 192.168.2.1 255.255.255.0
access-list 103 allow ip 192.168.0.0 255.255.252.0 192.168.20.0 255.255.255.0
access-list 104. allow ip 192.168.0.0 255.255.252.0 192.168.20.0 255.255.255.0
access-list 104. allow ip 192.168.0.0 255.255.252.0 192.168.30.0 255.255.255.0
access-list 104 allow 192.168.2.3 host ip 199.243.137.170
access-list 104 allow 192.168.1.5 ip host 199.243.137.170
NAT (inside) - 0 104 access list
Crypto ipsec transform-set esp - esp-md5-hmac optisconf
Crypto-map dynamic dynmap 30 transform-set optisconf
map ToMontreal 10 ipsec-isakmp crypto
crypto ToMontreal 10 card matches the address 103
card crypto ToMontreal 10 set peer 199.x.x.170
card crypto ToMontreal 10 the transform-set optisconf value
map ToMontreal 20-isakmp ipsec crypto dynamic dynmap
ToMontreal interface card crypto outside
ISAKMP allows outside
ISAKMP key * address 199.x.x.170 netmask 255.255.255.255 No.-xauth-no-config-mode
ISAKMP identity address
part of pre authentication ISAKMP policy 10
encryption of ISAKMP policy 10
ISAKMP policy 10 md5 hash
10 2 ISAKMP policy group
ISAKMP life duration strategy 10 86400
vpngroup address vpnaccess2 pool VPNallemagne
vpngroup dns 192.168.1.1 Server VPNallemagne
vpngroup wins 192.168.1.1 VPNallemagne-Server
vpngroup VPNallemagne by default-field OPTIS.local
vpngroup idle 1800 VPNallemagne-time
vpngroup password VPNallemagne *.
Syslog message:
% 305005-3-PIX: no outside group translation not found for icmp src: 192.168.20.2 dst dmZ1:192.168.2.3 (type 8, code 0)
% 305005-3-PIX: no group of translation not found for udp src outside:192.168.20.2/1180 dst dmZ1:192.168.2.3/53
If you want to be able to communicate hollow VPN connection to the DMZ, you should disable the NAT to the demilitarized zone. As already configured for the Interior. A set corresponding access list for the SHEEP!
Example:
NAT (dmz) 0 104 access list
sincerely
Patrick
Tags: Cisco Security
Similar Questions
-
Customer Pix unit inside and dmz networks
Are there problems that prohibit a client to the unit to start connections to hosts on pix dmz networks and pix inside at the same time?
You can provide a link that describes the side PIX of the two networks not only inside network access configuration?
Oops, yes sorry, brain fade from me, do not take into account my first email. Your configuration would look like this:
IP address inside 10.1.1.1 255.255.255.0
IP dmz 172.16.1.1 255.255.255.0
IP local pool vpnpool 192.168.1.1 - 192.168.1.254
NAT (inside) 0-list of access nonatinside
NAT (dmz) 0-list of access nonatdmz
permit the 10.1.1.0 ip access list nonatinside 255.255.255.0 192.168.1.0 255.255.255.0
permit ip 172.16.1.0 access list nonatdmz 255.255.255.0 192.168.1.0 255.255.255.0
Hope that helps.
-
L2l IPSec VPN 3000 and PIX 501
Hello
I have a remote site that has a broadband internet connection and uses a PIX 501. We wanted to connect them with our main office using our VPN 3000 via VPN site-to-site.
I followed the following documentation:
However the L2L session does not appear on the hub when I check the active sessions.
The network diagram, as well as the PIX config and the screenshots of the VPN configuration for the IPSec-L2L tunnel is attached.
Any help or advice are appreciated.
I just noticed that the PIX firewall, the phase 1 paramateres are not configured. You must configure the same PASE 1 and phase 2 settings on both ends of the tunnel.
For example, on CVPN 3000, you have configured settings Phase 1 as 3DES, pre-shared key etc... We have the same configuration on the PIX firewall too.
Here is an example of sample config
I hope this helps!
-
PIX, VPN, PAT and static
I want to activate an incoming and outgoing VPN on a PIX configured with PAT. I enabled ESP and UDP/500 on the appropriate access to the lists, but must provide a static for inbound traffic. I already use a static for incoming SMTP traffic, and I don't see how to do the same thing for udp/500, but how do I ESP traffic?
Any suggestions gratefully received.
If you are referring to a static port, you can create one for ESP since static port can only be created for TCP/UDP and ESP is located just above the intellectual property, it is NOT a TCP/UDP protocol. You will need to create a one-to-one static for this internal VPN server and have your clients to connect to this address. This will chew global IP address to another one, sorry.
-
A Site VPN PIX501 and CISCO router
Hello Experts,
I have an at home test lab, I set up a site to site vpn using a router Cisco PIX501 and CISCO2691, for configurations, I have just a few links on the internet, because my background on VPN configuration is not too good, for the configuration of routers, I followed this link:
www.Firewall.CX/Cisco-Technical-Knowledgebase/Cisco-Routers/867-Cisco-ro...
and for configuring pIX I just use the VPN Wizard of pix. All confgurations but ping failed. Hope you can help me with this, don't know what to do here (troubleshooting).
Joint here is the configuration of my router, topology, as well as the pix configuration. Hope you can help me with this. Thanks in advance.
Hi Mark,
I went in the Config of the ASA
I see that the dispensation of Nat is stil missing there
Please add the following
access-list allowed sheep ip 192.168.1.0 255.255.255.0 172.21.1.0 255.255.255.0
inside NAT) 0 access-list sheep
Then try it should work
Thank you
REDA
-
I have an intranet with 3 PIX 515 6.3 Firewall, exterior, Interior and DMZ interface.
I want to access DMZ w/o NAT inside and outside, but want NAT to inside.
the addresses are
domestic 192.168.10.XX
DMZ 197.28.10.xx
outdoor 197.28.8.XX
Need help.
Have Web, FTP, and DNS on DMZ servers that must be available for outside and inside.
Can you ping the web and ftp servers of either inside or outside? How does the PIX itself? Otherwise, I look at the routing configuration (i.e. the default gateway) on each one and check that you have all the IP addresses configured doubles. Check also for any software firewall on servers.
Looks like you're closer...
-
Convert the VPN Site-to-Site of PIX to ASA 8.2
I worked on the conversion of a config above a PIX an ASA 8.2 but I am running into trouble with the site to site vpn. The PIX has a VPN client and site to site. Given that some of the configs for the cross from site to site on the VPN client I'm confuse. Any help would be apperciated.
Below are excerpts from just the PIX VPN related orders.
permit access ip 192.168.0.0 list Remote_splitTunnelAcl 255.255.0.0 any
inside_outbound_nat0_acl ip access list allow any 192.168.0.160 255.255.255.240
inside_outbound_nat0_acl Zenoss_OS CNP 255.255.255.0 ip host allowed access list
inside_outbound_nat0_acl SilverBack NOC 255.255.255.0 ip host allowed access list
inside_outbound_nat0_acl allowed host NOC 255.255.255.0 enoss_Hardware ip access-list
outside_cryptomap_dyn_20 ip access list allow any 192.168.0.160 255.255.255.240
outside_cryptomap_20 Zenoss_OS CNP 255.255.255.0 ip host allowed access list
outside_cryptomap_20 SilverBack NOC 255.255.255.0 ip host allowed access list
outside_cryptomap_20 Zenoss_Hardware CNP 255.255.255.0 ip host allowed access list
IP pool local DHCP_Pool 192.168.0.161 - 192.168.0.174
NAT (inside) 0-list of access inside_outbound_nat0_acl
Sysopt connection permit VPN
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Dynamic crypto map outside_dyn_map 20 match address outside_cryptomap_dyn_20
Crypto-map dynamic outside_dyn_map 20 the transform-set ESP-DES-MD5 value
outside_map 20 ipsec-isakmp crypto map
card crypto outside_map 20 match address outside_cryptomap_20
card crypto outside_map 20 peers set 205.x.29.41
outside_map crypto 20 card value transform-set ESP-DES-SHA
map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map
client authentication card crypto outside_map LOCAL
outside_map interface card crypto outside
ISAKMP allows outside
ISAKMP key address 205.x.29.41 netmask 255.255.255.255 No.-xauth-config-mode no.
ISAKMP nat-traversal 180
part of pre authentication ISAKMP policy 20
encryption of ISAKMP policy 20
ISAKMP policy 20 md5 hash
20 2 ISAKMP policy group
ISAKMP duration strategy of life 20 86400
part of pre authentication ISAKMP policy 40
encryption of ISAKMP policy 40
ISAKMP policy 40 sha hash
40 2 ISAKMP policy group
ISAKMP duration strategy of life 40 86400
vpngroup address pool DHCP_Pool GHA_Remote
vpngroup dns 192.168.0.11 server GHA_Remote
vpngroup wins 192.168.0.11 GHA_Remote-Server
vpngroup GHA_Remote by default-field x.org
vpngroup split tunnel Remote_splitTunnelAcl GHA_Remote
vpngroup idle 1800 GHA_Remote-time
vpngroup password KEY GHA_Remote
I guess what I really wonder is if someone can convert the version of site to site of this VPN ASA 8.2 config so I can compare it to what I have. I need to have this, so I can just fall into place and work.
Also, it does appear that political isakmp 40 are used, correct?
On your ASA in Setup mode, simply type vpnsetup steps for remote access ipsec or vpnsetup site - not and it lists what it takes or you can download the PIX of the ASA migration tool.
-
Cisco VPN Client and Windows XP VPN Client IPSec to ASA
I configured ASA for IPSec VPN via Cisco VPN Client and XP VPN client communications. I can connect successfully with Cisco VPN Client, but I get an error when connecting with the XP client. Debugging said "misconfigured groups and transport/tunneling mode" I know, they use different methods of transport and tunneling, and I think that I have configured both. Take a look at the config.
PS a funny thing - when I connect with client VPN in Windows Server 2003, I have no error. The only difference is that client XP is behind an ADSL router and client server is directly connected to the Internet on one of its public IP of interfaces. NAT in the case of XP can cause problems?
Config is:
!
interface GigabitEthernet0/2.30
Description remote access
VLAN 30
nameif remote access
security-level 0
IP 85.*. *. 1 255.255.255.0
!
access-list 110 scope ip allow a whole
NAT list extended access permit tcp any host 10.254.17.10 eq ssh
NAT list extended access permit tcp any host 10.254.17.26 eq ssh
access-list extended ip allowed any one sheep
access list nat-ganja extended permit tcp any host 10.254.17.18 eq ssh
sheep-vpn access-list extended permits all ip 192.168.121.0 255.255.255.0
tunnel of splitting allowed access list standard 192.168.121.0 255.255.255.0
flow-export destination inside-Bct 192.168.1.27 9996
IP local pool raccess 192.168.121.60 - 192.168.121.120 mask 255.255.255.0
ARP timeout 14400
global (outside-Baku) 1 interface
global (outside-Ganja) interface 2
NAT (inside-Bct) 0 access-list sheep-vpn
NAT (inside-Bct) 1 access list nat
NAT (inside-Bct) 2-nat-ganja access list
Access-group rdp on interface outside-Ganja
!
Access remote 0.0.0.0 0.0.0.0 85.*. *. 1 2
Route outside Baku 10.254.17.24 255.255.255.248 10.254.17.10 1
Route outside Baku 192.1.1.0 255.255.255.0 10.254.17.10 1
Outside-Baku route 192.168.39.0 255.255.255.0 10.254.17.10 1
Route outside-Ganja 192.168.45.0 255.255.255.0 10.254.17.18 1
Route outside-Ganja 192.168.69.0 255.255.255.0 10.254.17.18 1
Route outside-Ganja 192.168.184.0 255.255.255.0 10.254.17.18 1
Route outside Baku 192.168.208.16 255.255.255.240 10.254.17.10 1
Route outside-Ganja 192.168.208.112 255.255.255.240 10.254.17.18 1
dynamic-access-policy-registration DfltAccessPolicy
Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT
Crypto ipsec transform-set newset aes - esp esp-md5-hmac
Crypto ipsec transform-set esp-3des esp-md5-hmac vpnclienttrans
Crypto ipsec transform-set vpnclienttrans transport mode
Crypto ipsec transform-set esp-3des esp-md5-hmac raccess
life crypto ipsec security association seconds 214748364
Crypto ipsec kilobytes of life security-association 214748364
raccess 1 set transform-set vpnclienttrans crypto dyn1 dynamic-map
vpnclientmap 30 card crypto ipsec-isakmp dynamic dyn1
card crypto interface for remote access vpnclientmap
crypto isakmp identity address
ISAKMP crypto enable vpntest
ISAKMP crypto enable outside-Baku
ISAKMP crypto enable outside-Ganja
crypto ISAKMP enable remote access
ISAKMP crypto enable Interior-Bct
crypto ISAKMP policy 30
preshared authentication
3des encryption
md5 hash
Group 2
life 86400
No encryption isakmp nat-traversal
No vpn-addr-assign aaa
Telnet timeout 5
SSH 192.168.1.0 255.255.255.192 outside Baku
SSH 10.254.17.26 255.255.255.255 outside Baku
SSH 10.254.17.18 255.255.255.255 outside Baku
SSH 10.254.17.10 255.255.255.255 outside Baku
SSH 10.254.17.26 255.255.255.255 outside-Ganja
SSH 10.254.17.18 255.255.255.255 outside-Ganja
SSH 10.254.17.10 255.255.255.255 outside-Ganja
SSH 192.168.1.0 255.255.255.192 Interior-Bct
internal vpn group policy
attributes of vpn group policy
value of DNS-server 192.168.1.3
Protocol-tunnel-VPN IPSec l2tp ipsec
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list value split tunnel
BCT.AZ value by default-field
attributes global-tunnel-group DefaultRAGroup
raccess address pool
Group-RADIUS authentication server
Group Policy - by default-vpn
IPSec-attributes tunnel-group DefaultRAGroup
pre-shared-key *.
Hello
For the Cisco VPN client, you would need a tunnel-group name configured on the ASA with a pre-shared key.
Please see configuration below:
http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00805734ae.shtml
or
Please see the section of tunnel-group config of the SAA.
There is a tunnel-group called "rtptacvpn" and a pre-shared key associated with it. This group name is used by the VPN Client Group name.
So, you would need a specific tunnel-group name configured with a pre-shared key and use it on the Cisco VPN Client.
Secondly, because you are behind a router ADSL, I'm sure that's configured for NAT. can you please activate NAT - T on your ASA.
"crypto isakmp nat-traversal.
Thirdly, change the transformation of the value
raccess 1 set transform-set vpnclienttrans crypto dyn1 dynamic-map
Let me know the result.
Thank you
Gilbert
-
NAT VPN tunnel and still access Internet traffic
Hello
Thank you in advance for any help you can provide.
I have a server with the IP 192.168.1.9 that needs to access a subnet remote from 192.168.50.0/24, through the Internet. However, before the server can access the remote subnet, the server IP must be NAT'ed to 10.1.0.1 because the VPN gateway remote (which is not under my control) allows access to other customers who have the same subnet address that we do on our local network.
We have a 2801 Cisco (running c2801-advsecurityk9 - mz.124 - 15.T9.bin) set up to make the NAT. It is the only gateway on our network.
I have configured the Cisco 2801 with the following statements of NAT and the relevant access lists:
access-list 106 allow host ip 192.168.1.9 192.168.50.0 0.0.0.255
NAT extended IP access list
refuse the host ip 192.168.1.9 192.168.50.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
ip permit 192.168.1.0 0.0.0.255 anyroute allowed ISP 10 map
corresponds to the IP NATIP nat EMDVPN 10.1.0.1 pool 10.1.0.1 netmask 255.255.255.0
IP nat inside source list 106 pool EMDVPN
IP nat inside source map route ISP interface FastEthernet0/1 overloadWhen the server (192.168.1.9) attempts to ping on the subnet of 192.168.50.0/24 devices, the VPN tunnel is established successfully. However, after that, the server is no longer able to access the Internet because the NAT translation for 192.168.1.9 has changed since the external IP address of the router (FastEthernet0/1) at 10.1.0.1.
The documentation I've seen on the site of Cisco says that this type of Setup allows only host subnet communication. Internet access is not possible. However, maybe I missed something, or one of you experts can help me. Is it possible to configure the NAT router traffic destined to the VPN tunnel and still access the Internet by using the dynamic NAT on FastEthernet0/1?
Once again, thank you for any help you can give.
Alex
Hello
Rather than use a pool for NAT
192.168.1.9 - 10.1.0.1 > 192.168.50.x
ACL 102 permit ip 192.168.1.9 host 192.168.50.0 0.0.0.255
RM-STATIC-NAT route map permit 10
corresponds to the IP 102IP nat inside source static 192.168.1.9 10.1.0.1 card expandable RM-STATIC-NAT route
ACL 101 deny host ip 192.168.1.9 192.168.50.0 0.0.0.255
ACL 101 by ip 192.168.1.0 0.0.0.255 any
overload of IP nat inside source list 101 interface FastEthernet0/1VPN access list will use the source as 10.1.0.1... *.
Let me know if it works.
Concerning
M
-
VPN client and contradictory static NAT entries
Hello, we have a VPN IPSEC implemented on a router for remote access. It works very well, for the most part. We have also a few PAT static entries to allow access to a web server, etc. from the outside. We deny NATting from the range of IP addresses for the range of VPN client and it works except for entries that also have PAT configurations.
So, for example, we have web server 10.0.0.1 and a PAT redirection port 10.0.0.1: 80 to the IP WAN port 80. If a VPN client tries to connect to 10.0.0.1: 80, the syn - ack packet back to the customer WAN IP VPN on the router! If the VPN client connects to the RDP server 10.0.0.2:3389, it works very well that this server is not a static entry PAT.
Is there a way to get around this?
Thank you!
There is a way to get around, use the same settings you have for your dynamic nat in your nat staitc entries, something like this:
Currently, it should show as:
IP nat inside source static XXXXX XXXX 80 80
you need to take it
IP nat inside source static 80 XXXX XXXX 80 map route AAAA
When your itinerary map YYY refers to something with an acl that you refuse traffic from inside your router for the pool of vpn
IP Access-list ext nonat
deny ip 10.0.0.0 0.0.0.255
Licensing ip 10.0.0.0 0.0.0.255 any
route allowed AAAA 10 map
match ip address sheep
You even need all the static PAT
HTH
Ivan
-
Client VPN gets incorrect SPI size Pix
Try to get a customer VPN connected with a pix515e. PIX is 6.3 (3) running. Customer is 4.0.4 we get same errors of dial-up, cable modems, etc.
The connection drops just during the negotiation. We thought it might be something MTU, but have you tried each MTU under the Sun, and the error remains the same for all connections regardless of MTU.
I have attached the config of the pix, the log of the VPN client and the pix debugging messages.
Thanks for any help someone can provide...
your proposal of IKE on the PIX is the following:
part of pre authentication ISAKMP policy 20
ISAKMP policy 20 aes-256 encryption
ISAKMP policy 20 chopping sha
20 5 ISAKMP policy group
But this (http://www.cisco.com/univercd/cc/td/doc/product/vpn/client/rel4_0/admin_gd/vcach6.htm#1157757) shows that the VPN client does not support this proposal. Change your group to 2, and then try again. 5 Diffie-Hellman group is supported only when you use digital certificates, which you're not.
-
VPN client behind ok asa pix but no asa
Hi all
I was faced with a newly installed asa5505 couple. We can use the vpnclient in devices, but not behind another asa. Behind the asa same we can vpn for previous installations of pix. But when we go to other asa installs, we get the regular creation of translation failed for protocol 50.
We have activated, isakmp, nat-traversal, udp 4500 and udp 10000. If the fault is at the other end, even if the error shows in this end?
Anyone who is willing to help me with this?
see you soon / Peter
You do not allow protocol 50 - ESP through the firewall. The remote end VPN are trying to create a VPN in mode 'Hand' is not "Aggressive" mode as VPN clients.
Add the below and test again: -.
permit for outside_access_in to access extensive list of 6 esp a whole line
HTH.
-
Client VPN Cisco and Cisco Secure
Cisco VPN client and the VPN from Cisco Secure client free to use with pix firewall software?
Thank you.
Hello
If you have a valid contract to Cisco and you can get the following link:
http://www.Cisco.com/Kobayashi/SW-Center/SW-VPN.shtml
with your CCO login, then you should be able to use these customers at no cost because they are already covered by the contract.
Thank you and best regards,
Abdelouahed
-=-=-
-
The remote VPN Clients and Internet access
I apologize in advance if this question has already been addressed. I am currently using a PIX Firewall Version 6.1 520 (2) running. I have several remote users that VPN for the PIX. Once the VPN tunnel is started, they are more able to connect to internet from their local computers. Is there a configuation on the PIX that allows remote users to have access to the internet when you are connected to the PIX.
TIA,
Jeff Gulick
The Pix does not allow traffic enter and exit on the same interface. Therefore, a VPN user cannot access the Internet through the tunnel. If you use the Cisco client, enable tunneling split so that all traffic through the tunnel.
If you use PPTP, you can turn off the option that makes the remote network, the default gateway. However, local routes should be added to these clients when they connect.
Or you can use an additional interface on the firewall. One that puts an end to VPN tunnels and another providing for Internet connectivity. In this way the traffic is not enter/leave on the same interface.
Of course, it is preferable if the customer Internet traffic does not go through the tunnel. It wastes your bandwidth and has security problems as well. I suggest you use the client to Cisco and the split tunneling.
-
Hi all
Could you someboy help me on that?
I have a network like this:
Internet Internet
| |
router VPN - 3005
|
Internal
I can set up Lan to Lan VPN 3005 and other PIX aside, but I can't ping internal network with the back of my internal network. I've already put the static route to the subnet of setbacks in the router and my subnet route internal VPN. What should I do? Thanks in advance.
Banlan
in fact the 3000 can do a ping will depend on your network-lists / lists access so that my not be a relevant question.
Maybe you are looking for
-
How can satellite 200 CD, I get my CDROM drive to work?
Hi there, hope someone can help me with this. I got this Toshiba 200CDS/810 under win 3.11. My problem is that I can't find out how to install my CDROM drive...CDROM drive: 6 X XM-1402 If you think you meet my emailadres is easier... Please do... ron
-
Report error LabSQL SQL database
Hi all, I want to ask about the error of LabSQL report, I made I followed machine 12-in-1 program to program, I did SQL database by LabSQL freeware in this case the database can function properly, Look on the date of database, he made 5 ranks (each p
-
can I use printer without window? can I program printer by fpga kit?
can I use printer without window? can I program printer by fpga kit?
-
How can I get captions on my computer?
I'm deaf, I hear all the tutoriala I need to learn how to use a certan, which have the CC Top symbol, but when I try to run it, it does not work. for example; COREL X 5 to DRW AND COREL PAINTER 12, can you help me solve this problem? I would apprecia
-
I have a Samsung Gravity Smart Phone how I use to connect to the internet on my computer at home
I want to use my cell phone to connect to internet on my home computer. My processor is an emachine T5086 desktop computer and my cell phen is a Samsung Gravity Smart