Solved

Pix 515E setup

Posted on 2014-09-16
12
289 Views
Last Modified: 2014-09-16
Hello EE,

I configured an inside interface for a new vlan, I set the interface as 192.168.50.1 ,  when I plug into the vlan and set the gateway as 192.168.50.1 on a pc nic ip 192.168.50.2 , I can ping the gateway 192.168.50.1 . How do I then route http etc traffic out to the outside interface 142.x.x.x . The inside interface is set as security level 90 and the outside interface is 0 . The inside interface has a access rule for 'source any, destination outside network', 'service ip' , 'permit ' .

The outside interface is already serving traffic from another inside interface 192.168. 32.3 and pcs on that subnet are good to browse outside.
0
Comment
Question by:davesnb
  • 7
  • 5
12 Comments
 
LVL 28

Expert Comment

by:asavener
ID: 40325778
You have to configure a NAT rule.  What version of the operating system are you running on the PIX?

Can you post the NAT rules you have for the existing subnets?
0
 

Author Comment

by:davesnb
ID: 40325903
PIX Version 8.0(4)

192.168.50.0 = tenant


nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 192.168.32.0 255.255.255.0
nat (iasbu) 1 172.16.90.0 255.255.255.0
nat (iasdmzbu) 1 10.10.10.0 255.255.255.0
static (iasdmzbu,outside) tcp 142.X.X.386 https 10.10.10.33 https netmask 255.255.255.255
static (iasdmzbu,outside) tcp 142.X.X.386 www 10.10.10.33 www netmask 255.255.255.255
static (iasdmzbu,outside) tcp 142.X.X.387 www 10.10.10.27 www netmask 255.255.255.255
static (iasdmzbu,outside) tcp 142.X.X.387 https 10.10.10.27 https netmask 255.255.255.255
static (iasdmzbu,outside) tcp 142.X.X.388 https 10.10.10.28 https netmask 255.255.255.255
static (iasdmzbu,outside) tcp 142.X.X.388 www 10.10.10.28 www netmask 255.255.255.255
static (iasdmzbu,outside) tcp 142.X.X.391 www 10.10.10.34 www netmask 255.255.255.255
static (iasdmzbu,outside) tcp 142.X.X.391 https 10.10.10.34 https netmask 255.255.255.255
static (iasdmzbu,outside) tcp 142.X.X.393 www 10.10.10.32 www netmask 255.255.255.255
static (iasdmzbu,iasbu) tcp 142.X.X.393 https 10.10.10.32 https netmask 255.255.255.255
static (iasbu,inside) tcp 192.168.32.23 citrix-ica 172.16.90.50 citrix-ica netmask 255.255.255.255
static (iasbu,outside) tcp 142.X.X.384 www 172.16.90.11 www netmask 255.255.255.255
static (iasbu,outside) tcp 142.X.X.384 citrix-ica 172.16.90.51 citrix-ica netmask 255.255.255.255
static (iasbu,outside) tcp 142.X.X.384 8080 172.16.90.51 8080 netmask 255.255.255.255
static (iasbu,outside) tcp 142.X.X.385 citrix-ica 172.16.90.52 citrix-ica netmask 255.255.255.255
static (iasbu,outside) tcp 142.X.X.385 8080 172.16.90.52 8080 netmask 255.255.255.255
static (iasbu,outside) tcp 142.X.X.386 citrix-ica 172.16.90.53 citrix-ica netmask 255.255.255.255
static (iasbu,outside) tcp 142.X.X.386 8080 172.16.90.53 8080 netmask 255.255.255.255
static (inside,outside) tcp interface pop3 iasmail pop3 netmask 255.255.255.255
static (inside,outside) tcp interface smtp iasmail smtp netmask 255.255.255.255
static (inside,outside) tcp interface https 192.168.32.35 https netmask 255.255.255.255
static (inside,outside) tcp interface www 192.168.32.35 www netmask 255.255.255.255
static (inside,outside) tcp interface 8080 192.168.32.35 8080 netmask 255.255.255.255
static (inside,outside) tcp interface citrix-ica 192.168.32.35 citrix-ica netmask 255.255.255.255
static (inside,outside) tcp interface 3389 192.168.32.35 3389 netmask 255.255.255.255
static (inside,outside) tcp interface ftp 192.168.32.206 ftp netmask 255.255.255.255
static (inside,outside) tcp interface ftp-data 192.168.32.206 ftp-data netmask 255.255.255.255
static (inside,outside) tcp interface ssh 192.168.32.206 ssh netmask 255.255.255.255
static (inside,outside) tcp interface 990 192.168.32.206 990 netmask 255.255.255.255
static (inside,outside) tcp interface 8731 192.168.32.38 8731 netmask 255.255.255.255
static (inside,outside) tcp interface 6690 192.168.32.152 6690 netmask 255.255.255.255
static (inside,outside) tcp 142.x.x.x https 192.168.32.199 https netmask 255.255.255.255
static (inside,outside) tcp 142.x.x.x www 192.168.32.199 www netmask 255.255.255.255
static (inside,outside) udp 142.X.X.386 9301 192.168.32.210 9300 netmask 255.255.255.255
static (inside,outside) tcp 142.X.X.389 https 192.168.32.206 https netmask 255.255.255.255
static (inside,outside) tcp 142.X.X.389 www 192.168.32.206 www netmask 255.255.255.255
static (inside,outside) tcp 142.X.X.390 https 192.168.32.91 https netmask 255.255.255.255
static (inside,outside) tcp interface 1414 192.168.32.165 1414 netmask 255.255.255.255
static (inside,outside) tcp 142.X.X.389 6690 192.168.32.125 6690 netmask 255.255.255.255
static (inside,iasbu) 192.168.32.0 192.168.32.0 netmask 255.255.255.0
access-group outside_access_in in interface outside
access-group iasbu_access_in in interface iasbu
access-group iasdmzbu_access_in in interface iasdmzbu
access-group Tenant_access_in in interface Tenant
route outside 0.0.0.0 0.0.0.0 142.X.X.381 1
0
 
LVL 28

Accepted Solution

by:
asavener earned 500 total points
ID: 40325941
OK, add this line:

nat (Tenant) 1 192.168.50.0 255.255.255.0
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:davesnb
ID: 40326057
I added that line and saved, but still can only ping the gateway 192.168.50.1 and not an internet ip , example 4.2.2.2
0
 
LVL 28

Expert Comment

by:asavener
ID: 40326066
Try running "clear xlate".
0
 

Author Comment

by:davesnb
ID: 40326124
same issue;


here is the config

PIX Version 8.0(4)
!
hostname bluebird
domain-name somedomain.ca
enable password x encrypted
passwd x encrypted
names
name 192.168.32.48 iasmail
name 192.168.32.22 iasmf
name 192.168.32.29 iaswebdocs
name 192.168.32.19 iaswiki
name 192.168.32.202 iasweb1
name 64.37.231.0 TKS1
name 204.13.200.0 TKS2
name 92.x..x.254 x description x
name 92.x..x.50 x description x
name 92.x..x.52 x description x
!
interface Ethernet0
 speed 100
 duplex full
 nameif outside
 security-level 0
 ip address142.x.x.82 255.255.255.240 standby142.x.x.94
!
interface Ethernet1
 nameif inside
 security-level 100
 ip address 192.168.32.3 255.255.255.0 standby 192.168.32.2
!
interface Ethernet2
 nameif iasbu
 security-level 90
 ip address 172.16.90.1 255.255.255.0 standby 172.16.90.2
!
interface Ethernet3
 nameif iasdmzbu
 security-level 40
 ip address 10.10.10.1 255.255.255.0 standby 10.10.10.2
!
interface Ethernet4
 description STATE Failover Interface
!
interface Ethernet5
 nameif Tenant
 security-level 90
 ip address 192.168.50.1 255.255.255.0
!
boot system flash:/pix804.bin
ftp mode passive
clock timezone AST -4
clock summer-time ADT recurring
dns server-group DefaultDNS
 domain-name somedomain.ca
object-group icmp-type icmp-outside-in
 icmp-object echo-reply
 icmp-object time-exceeded
 icmp-object unreachable
object-group service webports tcp
 description webports 80 and 443
 port-object eq www
 port-object eq https
object-group service citrixports tcp
 port-object eq 8080
 port-object eq citrix-ica
object-group service mailports tcp
 port-object eq pop3
 port-object eq smtp
object-group network arincips
 description MQ ips
 network-object host 144.x.x.x
 network-object host 57.x.x.x
 network-object host 57.x.x.x
 network-object host 204.x.x.x
 network-object host Hahnx
 network-object host Hahnx
 network-object host Hahnx
object-group service xports tcp
 port-object eq 1414
object-group network websvcipallowed
 network-object host 202.x.x.x
 network-object host 202.x.x.x
 network-object host 204.x.x.x
object-group protocol TCPUDP
 protocol-object udp
 protocol-object tcp
object-group service FTPPorts
 description FTPPorts
 service-object tcp eq 990
 service-object tcp eq ftp
object-group service FTPP tcp
 description FTP Ports
 port-object eq ftp
 port-object eq ftp-data
 port-object eq ssh
 port-object eq 990
object-group service Remedy tcp
 description Remedy
 port-object eq 3001
object-group network bps
 network-object host 192.168.32.203
 network-object host 192.168.32.42
 network-object host 192.168.32.16
 network-object host 192.168.32.44
 network-object host 192.168.32.206
object-group service bpsport tcp
 port-object eq 3001
object-group service bpsportgroup
 service-object tcp-udp eq 3001
object-group service RDP tcp
 port-object eq 3389
object-group service gmail tcp
 port-object eq 993
access-list outside_access_in extended permit tcp object-group arincips host142.x.x.82 object-group xports
access-list outside_access_in extended permit tcp any host142.x.x.82 eq ssh
access-list outside_access_in extended permit tcp any host142.x.x.82 eq 6690
access-list outside_access_in extended permit tcp any host142.x.x.83 object-group mailports inactive
access-list outside_access_in extended permit tcp any host142.x.x.82 object-group webports inactive
access-list outside_access_in extended permit tcp any host142.x.x.83 eq https
access-list outside_access_in extended permit tcp any host142.x.x.83 eq www
access-list outside_access_in extended permit tcp any host142.x.x.82 object-group citrixports inactive
access-list outside_access_in extended permit tcp any host142.x.x.82 object-group RDP
access-list outside_access_in extended permit tcp any host142.x.x.82 eq 8731 inactive
access-list outside_access_in extended permit tcp any host142.x.x.84 object-group citrixports inactive
access-list outside_access_in extended permit tcp any host142.x.x.84 object-group webports
access-list outside_access_in extended permit tcp any host142.x.x.85 object-group webports inactive
access-list outside_access_in extended permit tcp any host142.x.x.85 object-group citrixports inactive
access-list outside_access_in extended permit tcp any host142.x.x.86 object-group webports inactive
access-list outside_access_in extended permit object-group TCPUDP host 142.x.x.x host142.x.x.86 eq sip inactive
access-list outside_access_in extended permit tcp any host142.x.x.87 object-group webports inactive
access-list outside_access_in extended permit tcp any host142.x.x.88 object-group webports inactive
access-list outside_access_in extended permit tcp any host142.x.x.89 object-group webports
access-list outside_access_in extended permit tcp any host142.x.x.90 eq https inactive
access-list outside_access_in extended permit tcp any host142.x.x.91 object-group webports inactive
access-list outside_access_in extended permit tcp any host142.x.x.93 object-group webports inactive
access-list outside_access_in extended permit icmp any any inactive
access-list outside_access_in extended permit tcp any host142.x.x.82 object-group gmail inactive
access-list outside_access_in extended permit tcp any host142.x.x.82 eq pptp inactive
access-list outside_access_in extended permit gre any host142.x.x.82 inactive
access-list inside_nat0_outbound extended permit ip 192.168.32.0 255.255.255.0 172.16.32.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.32.0 255.255.255.0 172.16.32.192 255.255.255.192
access-list inside_nat0_outbound extended permit ip object-group bps host 172.19.160.27
access-list inside_nat0_outbound extended permit ip 192.168.32.0 255.255.255.0 192.168.90.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.32.0 255.255.255.0 192.168.50.0 255.255.255.0
access-list outside_1_cryptomap extended permit ip 192.168.32.0 255.255.255.0 192.168.90.0 255.255.255.0
access-list IASVPN_splitTunnelAcl standard permit 192.168.32.0 255.255.255.0
access-list iasdmzbu_access_in extended permit tcp any 172.16.90.0 255.255.255.0 eq www inactive
access-list iasdmzbu_access_in extended permit object-group TCPUDP any 172.16.90.0 255.255.255.0 eq domain
access-list iasdmzbu_access_in extended permit tcp any 172.16.90.0 255.255.255.0 eq 135
access-list iasdmzbu_access_in extended permit udp any 172.16.90.0 255.255.255.0 eq netbios-ns
access-list iasdmzbu_access_in extended permit tcp any 172.16.90.0 255.255.255.0 range 3500 3600 inactive
access-list iasdmzbu_access_in extended permit tcp any 172.16.90.0 255.255.255.0 range 3800 3900 inactive
access-list iasdmzbu_access_in extended permit tcp any 172.16.90.0 255.255.255.0 eq https inactive
access-list iasdmzbu_access_in extended permit tcp any 172.16.90.0 255.255.255.0 eq citrix-ica inactive
access-list iasdmzbu_access_in extended permit tcp 10.10.10.0 255.255.255.0 192.168.32.0 255.255.255.0 eq 1433
access-list iasdmzbu_access_in extended deny ip 10.10.10.0 255.255.255.0 172.16.90.0 255.255.255.0 inactive
access-list iasdmzbu_access_in extended permit ip 10.10.10.0 255.255.255.0 any
access-list dptvpn_splitTunnelAcl standard permit host 192.168.32.210
access-list dpt_splitTunnelAcl standard permit host 192.168.32.210
access-list iasbu_access_in extended permit tcp any 192.168.32.0 255.255.255.0 eq 1433
access-list iasbu_access_in extended permit tcp any 192.168.32.0 255.255.255.0 eq www
access-list iasbu_access_in extended permit tcp any 192.168.32.0 255.255.255.0 eq 445
access-list iasbu_access_in extended permit tcp any 192.168.32.0 255.255.255.0 eq 1434
access-list iasbu_access_in extended permit tcp any 192.168.32.0 255.255.255.0 eq 135
access-list iasbu_access_in extended deny ip 172.16.90.0 255.255.255.0 192.168.32.0 255.255.255.0
access-list iasbu_access_in extended permit ip 172.16.90.0 255.255.255.0 any
access-list extended extended permit ip host142.x.x.82 host 72.x.x.x
access-list acl-amzn extended permit ip any host 169.x.x.x
access-list Tenant_access_in extended permit ip any 142.x.x.80 255.255.255.240
pager lines 24
logging enable
logging list All level informational
logging trap notifications
logging asdm notifications
logging mail errors
logging from-address bluebird@somedomain.ca
logging recipient-address somedude@somedomain.ca level alerts
logging host inside 192.168.32.180
mtu outside 1500
mtu inside 1500
mtu iasbu 1500
mtu iasdmzbu 1500
mtu Tenant 1500
ip local pool rapool 172.16.32.216-172.16.32.240 mask 255.255.255.0
ip verify reverse-path interface outside
ip audit name outsidepol attack action alarm
ip audit interface outside outsidepol
ip audit interface iasbu outsidepol
ip audit interface iasdmzbu outsidepol
failover
failover lan unit secondary
failover replication http
failover link state Ethernet4
failover interface ip state 10.100.100.10 255.255.255.128 standby 10.100.100.11
icmp unreachable rate-limit 1 burst-size 1
asdm image flash:/asdm-615.bin
asdm location 172.19.160.27 255.255.255.255 inside
asdm location Hx 255.255.255.255 inside
asdm location 192.168.32.152 255.255.255.255 inside
asdm location 192.168.32.125 255.255.255.255 inside
asdm location 192.168.32.3 255.255.255.255 inside
no asdm history enable
arp timeout 14400
global (outside) 1 interface
global (iasbu) 1 interface
global (iasdmzbu) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 192.168.32.0 255.255.255.0
nat (iasbu) 1 172.16.90.0 255.255.255.0
nat (iasdmzbu) 1 10.10.10.0 255.255.255.0
nat (Tenant) 1 192.168.50.0 255.255.255.0
static (iasdmzbu,outside) tcp142.x.x.86 https 10.10.10.33 https netmask 255.255.255.255
static (iasdmzbu,outside) tcp142.x.x.86 www 10.10.10.33 www netmask 255.255.255.255
static (iasdmzbu,outside) tcp142.x.x.87 www 10.10.10.27 www netmask 255.255.255.255
static (iasdmzbu,outside) tcp142.x.x.87 https 10.10.10.27 https netmask 255.255.255.255
static (iasdmzbu,outside) tcp142.x.x.88 https 10.10.10.28 https netmask 255.255.255.255
static (iasdmzbu,outside) tcp142.x.x.88 www 10.10.10.28 www netmask 255.255.255.255
static (iasdmzbu,outside) tcp142.x.x.91 www 10.10.10.34 www netmask 255.255.255.255
static (iasdmzbu,outside) tcp142.x.x.91 https 10.10.10.34 https netmask 255.255.255.255
static (iasdmzbu,outside) tcp142.x.x.93 www 10.10.10.32 www netmask 255.255.255.255
static (iasdmzbu,iasbu) tcp142.x.x.93 https 10.10.10.32 https netmask 255.255.255.255
static (iasbu,inside) tcp 192.168.32.23 citrix-ica 172.16.90.50 citrix-ica netmask 255.255.255.255
static (iasbu,outside) tcp142.x.x.84 www 172.16.90.11 www netmask 255.255.255.255
static (iasbu,outside) tcp142.x.x.84 citrix-ica 172.16.90.51 citrix-ica netmask 255.255.255.255
static (iasbu,outside) tcp142.x.x.84 8080 172.16.90.51 8080 netmask 255.255.255.255
static (iasbu,outside) tcp142.x.x.85 citrix-ica 172.16.90.52 citrix-ica netmask 255.255.255.255
static (iasbu,outside) tcp142.x.x.85 8080 172.16.90.52 8080 netmask 255.255.255.255
static (iasbu,outside) tcp142.x.x.86 citrix-ica 172.16.90.53 citrix-ica netmask 255.255.255.255
static (iasbu,outside) tcp142.x.x.86 8080 172.16.90.53 8080 netmask 255.255.255.255
static (inside,outside) tcp interface pop3 iasmail pop3 netmask 255.255.255.255
static (inside,outside) tcp interface smtp iasmail smtp netmask 255.255.255.255
static (inside,outside) tcp interface https 192.168.32.35 https netmask 255.255.255.255
static (inside,outside) tcp interface www 192.168.32.35 www netmask 255.255.255.255
static (inside,outside) tcp interface 8080 192.168.32.35 8080 netmask 255.255.255.255
static (inside,outside) tcp interface citrix-ica 192.168.32.35 citrix-ica netmask 255.255.255.255
static (inside,outside) tcp interface 3389 192.168.32.35 3389 netmask 255.255.255.255
static (inside,outside) tcp interface ftp 192.168.32.206 ftp netmask 255.255.255.255
static (inside,outside) tcp interface ftp-data 192.168.32.206 ftp-data netmask 255.255.255.255
static (inside,outside) tcp interface ssh 192.168.32.206 ssh netmask 255.255.255.255
static (inside,outside) tcp interface 990 192.168.32.206 990 netmask 255.255.255.255
static (inside,outside) tcp interface 8731 192.168.32.38 8731 netmask 255.255.255.255
static (inside,outside) tcp interface 6690 192.168.32.152 6690 netmask 255.255.255.255
static (inside,outside) tcp142.x.x.83 https 192.168.32.199 https netmask 255.255.255.255
static (inside,outside) tcp142.x.x.83 www 192.168.32.199 www netmask 255.255.255.255
static (inside,outside) udp142.x.x.86 9301 192.168.32.210 9300 netmask 255.255.255.255
static (inside,outside) tcp142.x.x.89 https 192.168.32.206 https netmask 255.255.255.255
static (inside,outside) tcp142.x.x.89 www 192.168.32.206 www netmask 255.255.255.255
static (inside,outside) tcp142.x.x.90 https 192.168.32.91 https netmask 255.255.255.255
static (inside,outside) tcp interface 1414 192.168.32.165 1414 netmask 255.255.255.255
static (inside,outside) tcp142.x.x.89 6690 192.168.32.125 6690 netmask 255.255.255.255
static (inside,iasbu) 192.168.32.0 192.168.32.0 netmask 255.255.255.0
access-group outside_access_in in interface outside
access-group iasbu_access_in in interface iasbu
access-group iasdmzbu_access_in in interface iasdmzbu
access-group Tenant_access_in in interface Tenant
route outside 0.0.0.0 0.0.0.0142.x.x.81 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.32.0 255.255.255.0 inside
snmp-server host inside 192.168.32.95 community YQMPR
no snmp-server location
no snmp-server contact
snmp-server community YQMPR
snmp-server enable traps snmp authentication linkup linkdown coldstar
0
 
LVL 28

Expert Comment

by:asavener
ID: 40326269
Are you able to ping that address from the other subnet?
0
 
LVL 28

Expert Comment

by:asavener
ID: 40326284
Looks like you're blocking inbound ICMP on your outside interface.

access-list outside_access_in extended permit icmp any any inactive
0
 
LVL 28

Expert Comment

by:asavener
ID: 40326292
You would want some lines like:

access-list outside_access_in extended permit icmp any any time-exceeded
access-list outside_access_in extended permit icmp any any echo-reply
0
 

Author Comment

by:davesnb
ID: 40326386
Ok , I added the "any, any ip , permit " to tenant interface as an acl and I am able to access the internet now . However, I am able to still ping and rdp to servers on the other inside network 192.168.32.0 ( which i do not want). I have set another rule as "tenant-network/24 , inside-netowork/24 , ip, deny" as another rule and still able to ping ..and connect from a pc on tenant to a pc on inside network.. So I wondering if the vlan is not setup correctly as the vlanid1 ( inside network) and vlanid2 ( tenant ) are both in the same switch but different vlanid port groups
0
 
LVL 28

Assisted Solution

by:asavener
asavener earned 500 total points
ID: 40326399
You should be able to just remove the access list from the interface.

By default, traffic is allowed from higher-security interfaces to lower-security interfaces.  So traffic entering TENANT will be able to get through to OUTSIDE, but TENANT, with an interface with 90 will not be able to access an interface of 100.  (Of course, traffic entering your INSIDE interface will be able to get to the TENANT subnet(s).)

An additional caveat is that interfaces within 10 points of each other are considered to be the same security zone.  95 could access 100.
0
 

Author Closing Comment

by:davesnb
ID: 40326412
Many thanks, all set correctly
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is about downgrading PIX Version 8.0(4) & ASDM 6.1(5) to PIX 7.2(4) and ASDM 5.2(4) but with only 64MB RAM and 16MB flash. Background: You have a Cisco Pix 515E which was running on PIX 7.2(4) and its supporting ASDM 5.2(4) without any i…
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

860 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question