I activated a PAK for a 2911 router to enable the securityk9 using cisco's license portal. I received a license via email. Initially when I installed the license using the command 'license install FGLxxxx', I received an error that says 'the license does not match any device'.
When I double checked the PID and SN entered, I noticed that 2 of the digits in the SN where interchanged, so it did not matched the hardware. Cisco licensing instructed to re-host the license and I did. I received another license, but when I tried to install it, I received this error '% Error: License installation failed with error: Unknown error 0' I tried searching the net for this error but most of the errors is about 'XML Parsing failed'. Nobody seems to have encountered an 'Unknown error 0'. I owould be tempted to try going to 15.4(3)M4, the latest in that maintenance train and a gold star release.
If you run 'show inventory' are you 100% certain the PID and serial number match? Cisco2911#show inv NAME: 'CISCO2911/K9', DESCR: 'CISCO2911/K9 chassis, Hw Serial#: FHK1421xxxx, Hw Revision: 1.0' PID: CISCO2911/K9, VID: V01, SN: FHK1421xxxx. So you put the licence file on a USB key, plugged it into the router, or copied it to the router somehow, and ran: license install flashx:xxx.lic.
Introduction: So what is ACS? ACS stands for Access Control System and is a product developed by Cisco. The primary features of ACS is to provide Remote Authentication Dial In User Service (RADIUS) and Terminal Access Controller Access-Control System Plus (TACACS+). These protocols are designed for use in Authentication, Authorization and Accounting (AAA) situations. They provide centralised access and control to resources. In the case of this post, we're using a Microsoft Active Directory server to store credentials. ACS provides the AAA services and a AAA client (in this case a router) accesses the AAA server in order to authenticate users.
In laymens terms it allows you to log into multiple boxes with a single set of credentials.
After we installed ACS SI, follow all the steps to activate license key from MyVigor, and click 'Login to ACS' to login, Sometimes we get an error message says that “Your license is invalid or expired, please go to license server to activate your license!!“, even when we are using a trial license key. If this keeps happening, please do the following for trouble-shooting. Check Password Settings This may caused by password mismatch between VigorACS and MySQL Database, please double check your password settings and try again. Check Server Log Please check the server syslog, it can be found in the following path. Windows: File VigorACS SI server defualt log server.log. Linux: tail -f /usr/loacl/vigoracs/VigorACS/server/default/log/server.log Below is an example log that the server is working. You are welcome to visit DrayTek website (hereinafter referred to as 'Site').
In order to make you feel comfortable using the services and information of this website, we would like to inform you of our privacy policy to protect you. Please read the following: The scope of application of privacy protection policy The content of the Privacy Policy, including how the Site handles personally identifiable information collected when you use the Site Services. The Privacy Policy does not apply to linked sites outside of the Site or to persons who are not authorized to participate or participate in the administration of this Site.
Personal data collection, processing and use When you visit this website or use the functional services provided on this website, we will ask your necessary personal information and use it within that specific purpose; without your agreement in writing this website will not use your personal data for any other purpose. When you use interactive features such as mailboxes and surveys, this site will retain your name, e-mail address, contact information and usage time. In normal browsing, the server will record the relevant actions, including the IP address of the device you are using, the time of use, the browser you are using, the browsing and data logging, etc., as a reference for our website services. This record for internal applications will not be announced. Statistics and analysis of collected questionnaires, statistics or descriptive text of the results will be provided for accurate service. In addition to internal research, statistical data and descriptive text will be published if it is necessary. The information published excludes information on specific individuals.
The protection of information The website hosts are equipped with firewall, anti-virus system and other related information security equipment and the necessary security measures to protect the site and your personal information with strict protection measures. Only authorized personnel can access your Personal data.
The relevant processing personnel are signed confidentiality contract, if there is breach of confidentiality obligations, will be subject to the relevant legal punishment. In the event that it is necessary to entrust other units to provide services for business purposes, the Site will strictly require compliance with the confidentiality obligations and take the necessary inspection procedures to ensure that it will comply. External links to the site The web pages of this website provide links to other websites.
You may also click through the links provided on this website to access other websites. But the linked site does not apply to this site's privacy policy. You must refer to the privacy policy of the linked site. The policy of sharing personal information with the third party This website will not provide, exchange, rent or sell any of your personal information to other individuals, groups, private enterprises or public agencies. However the legal basis or contractual obligations are excluded. The foregoing proviso includes, but not limited to:. You agree in writing.
The law states. To save your life, body, liberty or property from danger. In cooperation with an official or academic institution, the public interest is necessary for statistical or scholarly research, and the information is processed by the provider or collected in such a way that it does not identify a particular party. Disclosure of your personal data by the Site management unit for the purpose of identifying, contacting or taking legal action as a result of your site's conduct, breach of the Terms of Service or any damage or disruption to the Site or other user interests or damage to any person. Benefit your interests. When commissioned by the Company to assist in the collection, processing or use of your personal data, the Site will do its best to supervise the management of the subcontractor or individual.
The use of Cookie In order to provide you with the best possible service, we use cookies to improve the services of our website. The cookie is a file that contains a small amount of information stored on your computer or browsing devices. It collects relevant records such as browsing behavior and information, but does not contain Identification of your personal data, records.
This site uses only the necessary cookies to measure and provide you with better service. If you do not want to accept the cookie, you can set the privacy level to High in the browser function you use to reject cookies. However it may lead to certain features of the site not working properly. Amendment to the Privacy Policy The privacy policy of this site will be amended at any time in accordance with the needs. The revised terms will be published on the website.
Note: To open the installation PDFs, you must have Adobe Reader version 9.0 or higher installed. If you don't have the current version or if you have difficulty opening the installation PDFs, you can download and install the latest version of the Adobe Reader from the. Standard installations: For step-by-step instructions, see or watch the (approx. Terminal server environment installations: If you plan to install your Fixed Assets CS application in a terminal server environment, or if you plan to move the application from an existing local or network installation to a terminal server environment, as a critical first step please open and review. Setting up network installations If you purchased a network license for Fixed Assets CS and installed the application and license files on a network for the first time, consider performing the following steps. Desktop setup: on each workstation that will run Fixed Assets CS.
The desktop setup application ensures each workstation meets the minimum operating system requirements and confirms all required components are installed. Sharing client data among multiple users: The folder where your clients are stored can be shared by multiple Fixed Assets CS users. See for more information. Updating the application and licenses. Viewing details about application updates For descriptions of updates and changes to the version of Fixed Assets CS that you have installed, see. Troubleshooting installation and update issues. If you are licensed for UltraTax CS and the version of UltraTax CS you have installed is for a tax year that is newer than the installed version of Fixed Assets CS, you will receive an error message when you open Fixed Assets CS.
That message states that Fixed Assets CS should be integrated with the same version or earlier versions of UltraTax CS to maintain data integrity. To resolve the error, install the newest version of Fixed Assets CS. If you have difficulty using CS Connect to connect to our network of secure data centers, see. If you have difficulty applying application updates, see. Related topics. Share This.
Understanding My Workspace The Cisco Secure ACS web interface is designed to be viewed using Microsoft Internet Explorer and Mozilla Firefox browsers. For more information on supported browser versions, see. The web interface not only makes viewing and administering ACS possible, but it also allows you to monitor and report on any event in the network.
These reports track connection activity, show which users are currently logged in, list the failed authentication and authorization attempts, and so on. The My Workspace drawer contains:. Welcome Page The Welcome page appears when you start ACS, and it provides shortcuts to common ACS tasks and links to information.
You can return to the Welcome page at any time during your ACS session. To return to this page, choose My Workspace Welcome.
Table 5-1 Welcome Page Field Description Before You Begin Contains a link to a section that describes the ACS policy model and associated terminology. Getting Started Links in this section launch the ACS Task Guides, which provide step-by-step instructions on how to accomplish ACS tasks. Quick Start Opens the Task Guide for the Quick Start scenario. These steps guide you through a minimal system setup to get ACS going quickly in a lab, evaluation, or demonstration environment. Initial System Setup Opens the Task Guide for initial system setup. This scenario guides you through the steps that are required to set up ACS for operation as needed; many steps are optional. Policy Setup Steps Opens the Task Guide for policy setup.
This scenario guides you through the steps that are required to set up ACS policies. New in ACS 5 Options in this section link to topics in the ACS online help. Click an option to open the online help window, which displays information for the selected topic. Use the links in the online help topics and in the Contents pane of the online help to view more information about ACS features and tasks.
Tutorials & Other Resources Provides links to:. Introduction Overview video. Configuration guide that provides step-by-step instructions for common ACS scenarios. In ACS 5.6, you can also see a banner in the welcome page. You can customize this After Login banner text from the Login Banner page.
Task Guides From the My Workspace drawer, you can access Tasks Guides. When you click any of the tasks, a frame opens on the right side of the web interface. This frame contains step-by-step instructions, as well as links to additional information. ACS provides the following task guides:. Quick Start—Lists the minimal steps that are required to get ACS up and running quickly. Initial System Setup—Lists the required steps to set up ACS for basic operations, including information about optional steps.
Policy Setup Steps—Lists the required steps to define ACS access control policies. My Account Page Note Every ACS administrator account is assigned one or more administrative roles. Depending upon the roles assigned to your account, you may or may not be able to perform the operations or see the options described in certain procedures. See to configure the appropriate administrator privileges. Use the My Account page to update and change the administrator password for the administrator that is currently logged in to ACS.
To display this page, choose My Workspace My Account. Table 5-2 My Account Page Field Description General Read-only fields that display information about the currently logged-in administrator:. Administrator name. Description. E-mail address, if it is available Change Password Displays rules for password definition according to the password policy. To change your password: 1. In the Password field, enter your current password.
In the New Password field, enter a new password. In the Confirm Password field, enter your new password again. Assigned Roles Displays the roles that are assigned to the currently logged-in administrator. Related Topics.
Login Banner ACS 5.6 supports customizing of the login banner texts. You can set two sets of banner text; for instance, before logging you can display one banner text, and after logging in you can display another banner text.
You can do this customization from the Login Banner page. The copyright statement is default for both the banners. ACS 5.6 displays the role of ACS in the login banners. The role can be primary, primary log collector, secondary, or secondary log collector.
You can also configure login banners for ACS CLI. To display a banner text before and after logging in to ACS CLI, use the banner command in the EXEC mode.
The banners that are configured using the banner command from ACS CLI do not reflect in ACS web interface, whereas the banners that are configured in ACS web interface impacts the ACS CLI banner. For more information on banner command, see the Note ACS does not support ' and ' symbols in login banner text. To customize the login banner, choose My Workspace Login Banner. Table 5-3 Login Banner Page Field Description Before Login Enter the text that you want to display in the banner before login. After Login Enter the text that you want to display in the banner after login. Using the Web Interface You can configure and administer ACS through the ACS web interface, in which you can access pages, perform configuration tasks, and view interface configuration errors. This section describes:.
Accessing the Web Interface The ACS web interface is supported on HTTPS-enabled Microsoft Internet Explorer and Mozilla Firefox browsers. For more information on supported browser versions, see. This section contains:.
Logging In To log in to the ACS web interface for the first time after installation: Step 1 Enter the ACS URL in your browser, for example, acshost /acsadmin, IPv6 address /acsadmin, or address/acsadmin, where /acshost is the IP address or Domain Name System (DNS) hostname. The DNS hostname works for IPv6 when the given IP address is resolvable to both IPv4 and IPv6 formats. Note Launching the ACS web interface using IPv6 addresses is not supported in Mozilla Firefox versions 4.x or later. The login page appears. Step 2 Enter ACSAdmin in the Username field; the value is not case-sensitive.
Step 3 Enter default in the Password field; the value is case-sensitive. This password (default) is valid only when you log in for the first time after installation. Click Reset to clear the Username and Password fields and start over, if needed. Step 4 Click Login or press Enter. The login page reappears, prompting you to change your password. ACS prompts you to change your password the first time you log in to the web interface after installation and in other situations based on the authentication settings that is configured in ACS. Step 5 Enter default in the Old Password field, and enter a new password in the New Password and the Confirm Password fields.
If you forget your password, use the acs reset-password command to reset your password to default. See the CLI Reference Guide for Cisco Secure Access Control System, 5.6 for more information. Step 6 Click Login or press Enter. You are prompted to install a valid license: Note The license page only appears the first time that you log in to ACS.
Step 7 See to install a valid license. If your login is successful, the main page of the ACS web interface appears. If your login is unsuccessful, the following error message appears: Access Denied. Please contact your Security Administrator for assistance.
The Username and Password fields are cleared. Step 8 Re-enter the valid username and password, and click Login. Note When you use Internet Explorer to view the ACS web interface, if the Enhanced Security Configuration (ESC) is enabled, you would observe issues in displaying pages and pop-ups of the ACS web interface.
To overcome this issue, you must disable the ESC from the Internet Explorer settings. Logging Out Click Logout in the ACS web interface header to end your administrative session. A dialog box appears asking if you are sure you want to log out of ACS. Caution For security reasons, Cisco recommends that you log out of the ACS when you complete your administrative session. If you do not log out, the ACS web interface logs you out if your session remains inactive for a configurable period of time, and does not save any unsubmitted configuration data. See for configuring session idle timeout.
Understanding the Web Interface The following sections explain the ACS web interface:. Web Interface Design shows the overall design of the ACS web interface. Figure 5-1 ACS Web Interface The interface contains:. Header Use the header to:. Identify the current user (your username). Access the online help. Log out.
Access the About information, where you can find information about which ACS web interface version is installed. These items appear on the right side of the header (see ). Figure 5-2 Header Related Topics. Navigation Pane Use the navigation pane to navigate through the drawers of the web interface (see ). Figure 5-3 Navigation Pane describes the function of each drawer. Table 5-4 Navigation Pane Drawers Drawer Function My Workspace Access the Task Guide and Welcome page with shortcuts to common tasks and links to more information.
See for more information. Network Resources Configure network devices, AAA clients, and network device groups.
See for more information. Users and Identity Stores Configure internal users and identity stores. See for more information. Policy Elements Configure policy conditions and results. See for more information. Access Policies Configure access policies. See for more information.
Monitoring and Reports View log messages. See for more information. System Administration Administer and maintain your ACS. See for more information.
To open a drawer, click it. A list of options for that drawer appears. You can view the contents of only one drawer at a time. When you open a drawer, any previously open drawer automatically closes. Click an option to view the hierarchy of items and the current configuration, and perform configuration tasks associated with that option in the content area.
See for more information about the content area. To hide the navigation pane and expand the content area, click the collapse arrow, which is centered vertically between the navigation pane and content area. Click the collapse arrow again to reveal the navigation pane. The options listed beneath drawers in the navigation pane are organized in a tree structure, where appropriate. The options in the tree structure are dynamic and can change based on administrator actions. Creating, deleting, or renaming objects in the content area can change the option display in the navigation pane.
For example, beneath the Network Resources Network Device Groups option, there are two preconfigured network device groups (options)—Location and Device Type. Shows that the administrator has used the Network Device Groups option page to create an additional network device group called Business, which appears in the tree structure in the navigation pane. Figure 5-4 Navigation Pane—Dynamic Tree Structure Related Topics. Content Area Use the content area to view your current location in the interface, view your configuration, configure AAA services, and administer your ACS. The content area can contain:. Web Interface Location Your current location in the interface appears at the top of the content area. Shows that the location is the Policy Elements drawer and the Network Devices and AAA Clients page.
Using this location as an example, ACS documentation uses this convention to indicate interface locations— Policy Elements Policy Conditions Network Devices and AAA Clients Location. The remainder of the content area shows the content of the chosen page.
The interface location also displays the action that you are configuring. For example, if you are in the Users and Identity Stores Internal Identity Stores Users page and you attempt to duplicate a specific user, the interface location is stated as: Users and Identity Stores Internal Identity Stores Users Duplicate: username, where username is the name of the user you chose to duplicate. ACS documentation also uses this convention. List Pages List pages contain a list of items (see ). You can use list pages to delete one or more items from an option that you chose in the navigation pane. Figure 5-5 List Page describes the content area buttons and fields that list pages have in common.
Table 5-5 Common Content Area Buttons and Fields for List Pages Button or Field Description Rows per page Use the drop-down list to specify the number of items to display on this page. Options:. 10—Up to 10. 25—Up to 25. 50—Up to 50. 100—Up to 100.
Go Click to display the number of items you specify in the Rows per page field. Check box or radio button Chooses or does not choose items in a list, for edit, duplicate, or delete actions. Options:. Check (a check box) or click (a radio button)—Chooses an item. Check the check box in the header row to choose all items in the list. Check the individual check boxes to choose specific items in the list. Uncheck (a check box) or unclick (a radio button)—Does not choose an item.
List column A tabular or hierarchical view of items associated with a specific configuration task. Shows the list column as a list of configured network device names; the heading of this list column is Name.
Scroll bar Use the content area scroll bar to view all the data in a page, if needed. Create Click to create a new item.
A wizard or single page appears in the content area. When you click Create, any selections that you made in the content area are ignored and the content area displays an Edit page with page-specific default values, if any. Duplicate Click to duplicate a selected item. A single page or a tabbed page appears in the content area.
Edit Click to edit a selected item. A single page or a tabbed page appears in the content area. Delete Click to delete one or more selected items. A dialog box that queries Are you sure you want to delete item/items? Seetharama kalyanam old telugu movie mp3 songs free download.
Appears for the item, or items, you chose to delete. The confirmation dialog box contains OK and Cancel. Click:. OK —Deletes the selected item or items. The list page appears without the deleted item. Cancel —Cancels the delete operation. The list page appears with no changes.
You can only delete items that you can view on a page, including the content of a page that you can view by using the scroll bar. For tables that span more than one page, your selections of rows to delete for pages that you cannot view are ignored and those selections are not deleted. Page num of n Enter the number of the page you want to display in the content area of the list page, where num is the page you want to display, then click Go. Not available for tree table pages.
![]() Acs License File Installation Failed The License File Failed To Parse
Direction arrows Click the arrows on the lower right side of the content area to access the first page, previous page, next page, or last page. The arrows are active when required. Not available for tree table pages. Tree table pages are a variation of list pages (see ). You can perform the same operations on tree table pages that you can on list pages, except for paging. In addition, with tree table pages:.
A darker background color in a row indicates the top level of a tree. If the first folder of a tree contains fewer than 50 items, the first folder is expanded and all others are collapsed. You must use the expanding icon (+) to view the contents of the collapsed folders. If the first folder of a tree contains 50 or more items, all folders in the tree are collapsed.
You must click the expanding icon (+) to view the contents of the folders. If you check the check box for a folder (a parent), it chooses all children of that folder. If you check the check box of a folder (a parent), and then uncheck any of the children, the parent folder is unchecked automatically.
Figure 5-6 Tree Table Page Filtering Large lists in a content area window or a secondary window (see ) can be difficult to navigate through and select the data that you want. You can use the web interface to filter data in these windows to reduce the data that appears in a list, based on criteria and conditions that you choose. Describes the filtering options.
Note Not all filtering options are available in all fields. Table 5-6 Filtering in the Content Area Window and Secondary Windows Button or Field Description Filter (drop-down list box) Select the name of the column from the drop-down list box on which to filter. Match if (drop-down list box) Select the condition you want to apply to your filter action:. Contains.
Doesn’t Contain. Ends With.
Equals. Is Empty. Not Empty. Not Equals. Starts With The condition is applied to the column you select in the Filter drop-down list box. V (down arrow) Click to add an additional filter row on which to choose conditions to narrow or expand your filter action. The text And: precedes the additional filter row.
^ (up arrow) Click to remove an extraneous filter row. Go Click to execute your filter action. Clear Filter Click to clear any current filter options. OK Click to add the selected data to your configuration and close the secondary window. This button is only available in secondary windows (see ). Note For tree table pages, you can only perform filtering on a root node, the top-most parent.
Sorting Most nontree list pages support sorting by the Name column or the Description column, when available. You can sort pages in an ascending or descending manner. For pages that do not have a Name or Description column, the sorting mechanism may be supported in the left-most column of the page, or the Description column. Place your cursor over a column heading to determine if sorting is available for a column. If sorting is available, the cursor turns into a hand and the text Click to sort appears. When a table is sorted, the column heading text darkens and an up arrow or down arrow appears next to the text (see ). Click the arrow to resort in the opposing manner.
Figure 5-7 Sorting Example Secondary Windows The content area serves as the launching place for any secondary (popup) windows that you access by clicking Select (see ) from single, tabbed, or wizard pages. You use these secondary windows to filter and select data that you want to use in your configuration (see and ). You can select one or more items from a secondary window to include in your configuration, dependent upon the selection option. Items listed in a secondary window with radio buttons allow you to select one item to include in your configuration and items listed with check boxes allow you to select multiple items. Figure 5-8 Select Button—Accesses Secondary Windows Figure 5-9 Secondary Window In addition to selecting and filtering data, you can create a selectable object within a secondary window. For example, if you attempt to create a users internal identity store, and click Select to assign the store to an identity group (a selectable object), but the identity group you want to associate it with is not available for selection, you can click Create within the secondary window to create the object you want. After you have created the object and clicked Submit, the secondary window is refreshed with the newly created object, which you can then select for your configuration.
In this example, you can select the newly created identity group to assign it to the users internal identity store. Transfer Boxes Transfer boxes are a common element in content area pages (see ). You use these boxes to select and remove items for use in your configuration and order them according to your needs. 3com wireless infrastructure device manager download windows 7.
Shows the transfer box options. Describes the transfer box options. Figure 5-10 Transfer Box Table 5-7 Transfer Box Fields and Buttons Field or Button Description Available List of available items for selection. Selected Ordered list of selected items. Right arrow Click to move one selected item from the Available list to the Selected list. Left arrow Click to move all items from the Available list to the Selected list. Double left arrow (/m excluding a.b.c.d/32; wild cards (.,-).
![]()
IPv6: /n; wild cards (:,::). The exclude range is available only for IPv4 addresses. Support RADIUS (Required in create) Boolean. RADIUS secret (Optional) String.
Maximum length is 32 characters. CoaPort (Optional) Integer. SupportKeyWrap (Optional) Boolean. KeywrapKEK (Optional) String. Maximum length is 32 characters.
KeywrapMACK (Optional) String. Maximum length is 40 characters. KeywrapDisplayInHex (Optional) Boolean. Support TACACS (Required in create) Boolean. TACACS secret (Optional) String.
Maximum length is 32 characters. Single connect (Optional) Boolean. Legacy TACACS (Optional) Boolean. Support SGA (Required in create) Boolean. SGA Identity (Optional) String. Maximum length is 32 characters. SGA trusted (Optional) Boolean.
Password (Optional) String. Maximum length is 32 characters. SgACLTTL (Optional) Integer.
PeerAZNTTL (Optional) Integer. EnvDataTTL (Optional) Integer. Session timeout (Optional) Integer. List of NDG names (Optional) String. Location (Optional) String.
Matlab License File![]()
Maximum length is 32 characters. Device Type (Optional) String.
Maximum length is 32 characters. Object Type: Identity Group Name (Required in create, edit, delete) String. Maximum length is 64 characters. Description (Optional) String. Maximum length is 1024 characters. Object Type: NDG Name (Required in create, edit, delete) String. Maximum length is 64 characters.
Description (Optional) String. Maximum length is 1024 characters. Object Type: Downloadable ACLs Name (Required in create, edit, delete) String. Maximum length is 64 characters. Description (Optional) String. Maximum length is 1024 characters. Content (Required in create, edit, delete) String.
The ACL content is split into permit/deny statements separated by a semicolon (;). Maximum length for each statement is 256 characters.
There is no limit for ACL content. Object Type: Command Set Name (Required in create, edit, delete) String. Maximum length is 64 characters. Description (Optional) String. Maximum length is 1024 characters. Commands (in the form of grant: command: arguments) (Optional) String. This is a list with semi separators (:) between the values that you supply for grant.
Fields that are optional can be left empty and ACS substitutes the default values for those fields. For example, when fields that are related to a hierarchy are left blank, ACS assigns the value of the root node in the hierarchy. For network devices, if Security Group Access is enabled, all the related configuration fields are set to default values. Creating Import Files This section describes how to create the.csv file for performing bulk operations on ACS objects. You can download the appropriate template for each of the objects from the ACS web interface. This section contains the following:.
Downloading the Template from the Web Interface Before you can create the import file, you must download the import file templates from the ACS web interface. To download the import file templates for adding internal users: Step 1 Log into the ACS 5.6 web interface. Step 2 Choose Users and Identity Stores Internal Identity Stores Users. The Users page appears. Step 3 Click File Operations. The File Operations wizard appears.
Acs File Type
Step 4 Choose any one of the following:. Add—Adds users to the existing list. This option does not modify the existing list. Instead, it performs an append operation. Update—Updates the existing internal user list. Delete—Deletes the list of users in the import file from the internal identity store.
Step 5 Click Next. The Template page appears. Step 6 Click Download Add Template.
Step 7 Click Save to save the template to your local disk.
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |