473,416 Members | 1,543 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,416 software developers and data experts.

how can i access web mail through vpn client?

I have configured remote access VPN with local pool in ASA firewall however im accessing all the resources(my private network such as servers ) through Asa firewall after getting connected the VPN but i cant the mailing server through web mail(ports like 80).Please check the configs


Expand|Select|Wrap|Line Numbers
  1. PuTTY log 2010.10.13 13:11:53 
  2.  
  3.  
  4. User Access Verification
  5.  
  6. Password: 
  7. Type help or '?' for a list of available commands.
  8.  
  9. IFASA> en
  10. Password: **************
  11.  
  12. IFASA# sh run
  13. : Saved
  14. :
  15. ASA Version 7.1(2) 
  16. !
  17. hostname IFASA
  18. domain-name default.domain.invalid
  19. enable password 8pkSRCt/lliZt3SZ encrypted
  20. names
  21. !
  22. interface Ethernet0/0
  23.  description "Connected with internet router on port F0/0"
  24.  nameif outside
  25.  security-level 0
  26.  ip address 100.100.100.2 255.255.255.0 
  27. !
  28. interface Ethernet0/1
  29.  description "Connected with Core switch on port G0/1"
  30.  nameif inside
  31.  security-level 100
  32.  ip address 10.10.20.1 255.255.255.0 
  33. !
  34. interface Ethernet0/2
  35.  nameif dmz
  36.  security-level 50
  37.  ip address 10.10.30.1 255.255.255.0 
  38. <--- More --->
  39.  
  40. !
  41. interface Management0/0
  42.  description ##Management Port####
  43.  nameif mgm
  44.  security-level 90
  45.  no ip address
  46.  management-only
  47. !
  48. passwd 8pkSRCt/lliZt3SZ encrypted
  49. ftp mode passive
  50. dns server-group DefaultDNS
  51.  domain-name default.domain.invalid
  52. access-list outside_access_in extended permit icmp any any echo-reply 
  53. access-list outside_access_in extended permit icmp any any source-quench 
  54. access-list outside_access_in extended permit icmp any any unreachable 
  55. access-list outside_access_in extended permit icmp any any time-exceeded 
  56. access-list inside_nat0_outbound extended permit ip any 172.16.1.0 255.255.255.240 
  57. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 192.168.3.0 255.255.255.0 
  58. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 193.99.1.0 255.255.255.0 
  59. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 193.99.4.0 255.255.255.0 
  60. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 195.124.13.0 255.255.255.0 
  61. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 10.202.144.0 255.255.255.0 
  62. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 host 10.200.54.135 
  63. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 172.16.0.0 255.255.255.0 
  64. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 144.145.112.0 255.255.255.0 
  65. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 172.29.0.0 255.255.255.0 
  66. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 144.145.0.0 255.255.255.0 
  67. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 144.0.0.0 255.0.0.0 
  68. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 172.16.0.0 255.255.0.0 
  69. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 172.21.0.0 255.255.0.0 
  70. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 172.29.0.0 255.255.0.0 
  71. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 144.145.0.0 255.255.0.0 
  72. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 10.220.90.0 255.255.255.0 
  73. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 144.145.64.0 255.255.255.0 
  74. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 144.145.75.0 255.255.255.0 
  75. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 host 144.145.75.196 
  76. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 172.129.0.0 255.255.0.0 
  77. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 host 10.102.18.142 
  78. access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 10.102.0.0 255.255.255.0 
  79. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 10.0.0.0 255.0.0.0 
  80. access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 172.29.0.0 255.255.0.0 
  81. access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 host 172.29.4.93 
  82. access-list inside_nat0_outbound extended permit ip 192.0.0.0 255.0.0.0 172.0.0.0 255.0.0.0 
  83. access-list inside_nat0_outbound extended permit ip 172.29.4.0 255.255.255.0 192.168.100.0 255.255.255.0 
  84. access-list inside_nat0_outbound extended permit ip host 10.200.96.132 192.168.100.0 255.255.255.0 
  85. access-list inside_nat0_outbound extended permit ip host 192.168.100.65 host 10.200.96.132 
  86. access-list inside_nat0_outbound extended permit ip 192.0.0.0 255.0.0.0 host 10.200.96.132 
  87. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.192 172.16.1.0 255.255.255.240 
  88. access-list inside_nat0_outbound extended permit ip 192.168.100.64 255.255.255.192 172.16.1.0 255.255.255.240 
  89. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 10.0.0.0 255.255.255.0 
  90. access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.192 182.16.1.0 255.255.255.240 
  91. access-list inside_nat0_outbound extended permit ip 192.168.100.64 255.255.255.192 182.16.1.0 255.255.255.240 
  92. access-list inside_nat0_outbound extended permit ip any 182.16.1.0 255.255.255.240 
  93. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 192.168.3.0 255.255.255.0 
  94. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 193.99.1.0 255.255.255.0 
  95. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 193.99.4.0 255.255.255.0 
  96. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 195.124.13.0 255.255.255.0 
  97. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 10.202.144.0 255.255.255.0 
  98. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 host 10.200.54.135 
  99. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 172.16.0.0 255.255.255.0 
  100. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 144.145.112.0 255.255.255.0 
  101. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 172.129.0.0 255.255.0.0 
  102. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 144.145.0.0 255.255.255.0 
  103. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 172.21.0.0 255.255.0.0 
  104. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 10.220.90.0 255.255.255.0 
  105. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 144.145.75.0 255.255.255.0 
  106. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 144.0.0.0 255.0.0.0 
  107. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 host 10.220.90.38 
  108. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 10.200.105.0 255.255.255.0 
  109. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 10.0.0.0 255.0.0.0 
  110. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 host 10.102.18.42 
  111. access-list outside_cryptomap_20 extended permit ip 172.29.4.0 255.255.255.0 192.168.100.0 255.255.255.0 
  112. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 172.29.3.0 255.255.255.0 
  113. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 172.29.4.0 255.255.255.0 
  114. access-list outside_cryptomap_20 extended permit ip 192.168.100.0 255.255.255.0 10.200.112.0 255.255.255.0 
  115. access-list test extended permit ip host 10.10.20.101 host 4.2.2.2 
  116. access-list test extended permit ip host 4.2.2.2 host 10.10.20.101 
  117. access-list test extended permit ip host 100.100.100.3 host 4.2.2.2 
  118. access-list test extended permit ip host 4.2.2.2 host 100.100.100.3 
  119. access-list test extended permit ip host 10.10.20.101 host 66.102.13.104 
  120. access-list test extended permit ip host 66.102.13.104 host 10.10.20.101 
  121. access-list test extended permit ip host 100.100.100.3 host 66.102.13.104 
  122. access-list test extended permit ip host 66.102.13.104 host 100.100.100.3 
  123. access-list test extended permit ip host 100.100.100.1 host 66.102.13.104 
  124. access-list test extended permit ip host 66.102.13.104 host 100.100.100.1 
  125. access-list idea_splitTunnelAcl standard permit any 
  126. access-list dmz_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 10.220.90.0 255.255.255.0 
  127. access-list dmz_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 host 10.102.18.142 
  128. access-list dmz_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 10.102.18.0 255.255.255.0 
  129. access-list dmz_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 10.102.0.0 255.255.255.0 
  130. access-list dmz_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 10.102.0.0 255.255.255.0 
  131. access-list dmz_nat0_outbound extended permit ip 192.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0 
  132. access-list dmz_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 172.29.0.0 255.255.0.0 
  133. access-list dmz_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0 172.29.4.0 255.255.255.0 
  134. access-list dmz_nat0_outbound extended permit ip host 10.200.96.132 192.168.0.0 255.255.0.0 
  135. access-list unity_splitTunnelAcl standard permit 192.168.104.0 255.255.255.0 
  136. access-list unity_splitTunnelAcl standard permit host 192.168.100.67 
  137. access-list unity_splitTunnelAcl standard permit host 192.168.100.70 
  138. access-list unity_splitTunnelAcl standard permit host 192.168.100.71 
  139. access-list inside_access_in extended permit ip any any 
  140. pager lines 24
  141. logging enable
  142. logging asdm informational
  143. mtu outside 1500
  144. mtu inside 1500
  145. mtu dmz 1500
  146. mtu mgm 1500
  147. ip local pool ifdhcp 172.16.1.1-172.16.1.10 mask 255.255.255.0
  148. ip local pool nexttoidea 182.16.1.1-182.16.1.10 mask 255.255.255.0
  149. ip local pool ideavpnpool 172.28.1.100-172.28.1.199 mask 255.255.255.0
  150. asdm image disk0:/asdm.bin
  151. asdm history enable
  152. arp timeout 14400
  153. nat-control
  154. global (outside) 1 100.100.100.3
  155. global (outside) 2 100.100.100.4
  156. global (outside) 3 100.100.100.5
  157. global (outside) 5 interface
  158. nat (inside) 0 access-list inside_nat0_outbound
  159. nat (inside) 5 10.10.20.100 255.255.255.255
  160. nat (inside) 5 192.168.100.0 255.255.255.192
  161. nat (inside) 5 192.168.100.64 255.255.255.192
  162. nat (inside) 5 192.168.103.0 255.255.255.0
  163. nat (inside) 5 192.168.104.0 255.255.255.0
  164. nat (dmz) 0 access-list dmz_nat0_outbound
  165. nat (dmz) 5 10.10.30.0 255.255.255.0
  166. route outside 0.0.0.0 0.0.0.0 100.100.100.1 1
  167. route inside 192.168.103.0 255.255.255.0 10.10.20.2 1
  168. route inside 192.168.100.64 255.255.255.192 10.10.20.2 1
  169. route inside 192.168.100.0 255.255.255.192 10.10.20.2 1
  170. timeout xlate 3:00:00
  171. timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
  172. timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
  173. timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
  174. timeout uauth 0:05:00 absolute
  175. group-policy unity internal
  176. group-policy unity attributes
  177.  wins-server value 192.168.100.5
  178.  dns-server value 203.196.128.4 192.168.100.5
  179.  split-tunnel-policy tunnelspecified
  180.  split-tunnel-network-list value unity_splitTunnelAcl
  181.  default-domain value confidign
  182. group-policy nexttoideavpn internal
  183. group-policy nexttoideavpn attributes
  184. dns-server value 203.196.128.4 192.168.100.5
  185.  vpn-tunnel-protocol IPSec 
  186.  default-domain value confidign
  187. group-policy nextgenvpn internal
  188. group-policy nextgenvpn attributes
  189.  dns-server value 203.196.128.4 192.168.100.5
  190.  vpn-tunnel-protocol IPSec 
  191.  default-domain value confidign
  192. group-policy idea internal
  193. group-policy idea attributes
  194.  split-tunnel-policy tunnelspecified
  195.  split-tunnel-network-list value idea_splitTunnelAcl
  196. username testasa password xz64BOi0/q9vNlsO encrypted
  197. username BalamuruganJ password bC0quptZGNndczai encrypted privilege 0
  198. username BalamuruganJ attributes
  199.  vpn-group-policy unity
  200. username spice password eLlcIWZLnszxmfPc encrypted
  201. username remotevpn password 19ozm5I0mkO2G1Fj encrypted
  202. username karthik password spKyg06wKqb2qpG2 encrypted
  203. username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15
  204. username MadhavanG password TG5ToGaURcla8SES encrypted privilege 0
  205. username MadhavanG attributes
  206.  vpn-group-policy unity
  207. username idea1 password Cxl84giZLtfZKg8T encrypted
  208. username igidel password drlk5lzEa04hxmFa encrypted privilege 0
  209. username igidel attributes
  210.  vpn-group-policy idea
  211. aaa authentication ssh console LOCAL 
  212. aaa authentication http console LOCAL 
  213. http server enable
  214. http 0.0.0.0 0.0.0.0 outside
  215. http 192.168.100.0 255.255.255.0 inside
  216. http 192.168.101.0 255.255.255.0 inside
  217. http 192.168.102.0 255.255.255.0 inside
  218. http 0.0.0.0 0.0.0.0 inside
  219. http 192.168.100.0 255.255.255.192 inside
  220. http 10.10.20.1 255.255.255.255 inside
  221. http 192.168.100.100 255.255.255.255 inside
  222. http 192.168.200.0 255.255.255.0 mgm
  223. http 192.168.100.0 255.255.255.0 mgm
  224. snmp-server host inside 192.168.100.74 community gqmaps
  225. no snmp-server location
  226. no snmp-server contact
  227. snmp-server community gqmaps
  228. snmp-server enable traps snmp authentication linkup linkdown coldstart
  229. snmp-server enable traps syslog
  230. sysopt noproxyarp outside
  231. crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
  232. crypto dynamic-map outside_dyn_map 10 set transform-set ESP-3DES-SHA
  233. crypto dynamic-map outside_dyn_map 10 set security-association lifetime seconds 288000
  234. crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
  235. crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA
  236. crypto dynamic-map outside_dyn_map 40 set security-association lifetime seconds 288000
  237. crypto dynamic-map Outside_dyn_map 10 set reverse-route
  238. crypto dynamic-map Outside_dyn_map 40 set reverse-route
  239. crypto map outside_map 20 match address outside_cryptomap_20
  240. crypto map outside_map 20 set peer 193.96.192.33 
  241. crypto map outside_map 20 set transform-set ESP-3DES-SHA
  242. crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
  243. crypto map outside_map interface outside
  244. crypto map Outside_map 40 ipsec-isakmp dynamic Outside_dyn_map
  245. isakmp identity address 
  246. isakmp enable outside
  247. isakmp policy 1 authentication pre-share
  248. isakmp policy 1 encryption 3des
  249. isakmp policy 1 hash sha
  250. isakmp policy 1 group 2
  251. isakmp policy 1 lifetime 43200
  252. isakmp policy 10 authentication pre-share
  253. isakmp policy 10 encryption 3des
  254. isakmp policy 10 hash sha
  255. isakmp policy 10 group 2
  256. isakmp policy 10 lifetime 28800
  257. isakmp nat-traversal  20
  258. tunnel-group 193.96.192.33 type ipsec-l2l
  259. tunnel-group 193.96.192.33 ipsec-attributes
  260.  pre-shared-key *
  261. tunnel-group idea type ipsec-ra
  262. tunnel-group idea general-attributes
  263.  address-pool ifdhcp
  264. tunnel-group idea ipsec-attributes
  265.  pre-shared-key *
  266. tunnel-group nexttoideavpn type ipsec-ra
  267. tunnel-group nexttoideavpn general-attributes
  268.  address-pool nexttoidea
  269.  default-group-policy nexttoideavpn
  270. tunnel-group nexttoideavpn ipsec-attributes
  271.  pre-shared-key *
  272. tunnel-group nextgenvpn type ipsec-ra
  273. tunnel-group nextgenvpn general-attributes
  274.  address-pool ideavpnpool
  275.  default-group-policy nextgenvpn
  276. tunnel-group nextgenvpn ipsec-attributes
  277.  pre-shared-key *
  278. telnet 0.0.0.0 0.0.0.0 outside
  279. telnet 192.168.100.0 255.255.255.0 inside
  280. telnet 10.10.20.0 255.255.255.0 inside
  281. telnet 0.0.0.0 0.0.0.0 inside
  282. telnet 192.168.100.0 255.255.255.192 inside
  283. telnet 128.136.100.100 155.155.255.255 inside
  284. telnet 128.136.100.0 155.155.255.0 inside
  285. telnet 192.136.100.0 255.155.255.0 inside
  286. telnet 192.168.100.64 255.255.255.192 inside
  287. telnet 192.168.100.100 255.255.255.255 inside
  288. telnet timeout 60
  289. ssh 0.0.0.0 0.0.0.0 outside
  290. ssh 192.168.100.0 255.255.255.0 inside
  291. ssh 192.168.101.0 255.255.255.0 inside
  292. ssh 192.168.102.0 255.255.255.0 inside
  293. ssh 192.168.103.0 255.255.255.0 inside
  294. ssh timeout 5
  295. console timeout 0
  296. !
  297. class-map inspection_default
  298.  match default-inspection-traffic
  299. !
  300. !
  301. policy-map global_policy
  302.  class inspection_default
  303.   inspect dns maximum-length 51
  304.   inspect ftp 
  305.   inspect h323 h225 
  306.   inspect h323 ras 
  307.   inspect netbios 
  308.   inspect rsh 
  309.   inspect rtsp 
  310.   inspect skinny 
  311.   inspect esmtp 
  312.   inspect sqlnet 
  313.   inspect sunrpc 
  314.   inspect tftp 
  315.   inspect sip 
  316.   inspect xdmcp 
  317.   inspect icmp 
  318. !
  319. service-policy global_policy global
  320. Cryptochecksum:b5ff87410a5ca4bacd9ac2fbddf91aa8
  321. : end
  322.  
  323. IFASA#   
  324. IFASA# 
  325.  

Please help me.I really appreciate!...
Nov 14 '10 #1
2 3023
sicarie
4,677 Expert Mod 4TB
That's a huge ruleset, so I'm not going to be able to go through it line-by-line or apply it to a personal device to test.

I would recommend finding the line that allows access to your mail port, and disabling all the others, then testing your mail access. If that doesn't work, the rule is incorrect. If that does work, another rule is overriding that rule, and you should re-enable them one at a time until you find the one that's causing the issue.

Good luck!
Nov 14 '10 #2
hi....sicarie.

thanks,your response.

shall i put this command?..

Expand|Select|Wrap|Line Numbers
  1. access-list WEB permit tcp 182.16.1.0 255.255.255.240 192.168.100.0 255.255.255.0 eq 80
  2.  
  3. access-list TELNET permit tcp 182.16.1.0 255.255.255.240 192.168.100.0 255.255.255.0 eq 23
  4.  
  5. access-list smtp permit tcp 182.16.1.0 255.255.255.240 192.168.100.0 255.255.255.0 eq 25
  6.  
  7.  
  8. access-list pop3 permit tcp 182.16.1.0 255.255.255.240 192.168.100.0 255.255.255.0 eq 110
  9.  
Please advice me.
Nov 15 '10 #3

Sign in to post your reply or Sign up for a free account.

Similar topics

4
by: runningdog | last post by:
Hi Can someone point me to some documentation on how to create and send email from a win forms app using the defalt mail client TIA Steve
3
by: Gama Franco | last post by:
Hi, I'm working on a project based in Windows Forms, and I need to open the user's default e-mail client (a new e-mail) with some attachments ready to send. Since the destination of the e-mail...
1
by: vijaygparikh | last post by:
HI i am writting a code for open default mail client and it works fine. i want to attach a file with the default mail client but file is not attached with "mailto:" option. If any one has idea...
2
by: Robbie De Sutter | last post by:
Hello, How do I open a new, empty e-mail message from the default e-mail client whereby the sender is given and a file is attached? Currently I use the command (vb.net): ---...
9
by: John Lafrowda | last post by:
Hello experts, I'm coding a routine which should open a new mail form of the mail standard mail client installed on a system (e.g. outlook, outlook express, netscape mail, etc.) for support...
2
by: Landley | last post by:
Hello, Is there a way of creating an email, attaching a file and sending using the client's default mail client? I am looking for a none email client specific solution that does not involve...
6
by: Bernhard Straub | last post by:
Hi, using vb .NET 2003 I am trying to open the standard mail client. The mail window should open and the user should be able to choose the recipient, add some text to the mail etc. Using...
1
by: apasj06 | last post by:
hello everyone: I am trying to send email via php. I using window XP home edition. My mail client is outlook express. I configured mail client to send email via my aol email account. mail...
10
by: subhadip | last post by:
Hi, I want to generate New mail alert for any mail client at client side . I want to check if any new mail has arrived in my inbox or not . the mail client be anything . I want to do this for...
2
by: =?Utf-8?B?R2lkaQ==?= | last post by:
Hi, In my webform, I've a checkbox and when it's checked, i want to open the client's email program (outlook, mozila and so..), add the the "to" and "subject" to that mail. I tried this code:...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
0
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.