Password Recovery Cisco WLAN Controllers
Hi,
I would like to know the procedure for recoering passwords on Cisco 2000/ 4000 series contorllers.
Please Help!
Thanks and Regards,
Mohan
Sorry, you have to reset to factory defaults. Then reconfigure. Here's the TAC Case
Solution # K52826052
Title How to recover a password on the Cisco Wireless LAN Controller
Core Issue
Resolution
There is no password recovery option on the Wireless LAN Controller (WLC). You need to set the WLC to factory defaults and reconfigure it.
In order to set the WLC to factory defaults, power cycle the WLC, press ESC Key during the boot up process from the console and select last option(5) to clear the configuration and reboot the Wireless Lan Controller.
Note:The new default username and password is "admin".
Similar Messages
-
Root Password Recovery + Cisco IPICS 2.1
Hi all,
i forget the root password for the IPICS version 2.1. Please can someone help me how can i rest it ?
Thanks in advance
HichamHi Hicham,
Is this what you are looking for ?
http://www.cisco.com/en/US/docs/interoperability_systems/c_ipics/211/troubleshooting/guide/tgtools.html#wp1060745
Regards,
Christos -
Cisco ISE 1.2 vm cli admin password recovery
I'm having trouble getting this to work. I was under the impression by mounting the ISO (connect at power on) i could perform the password recovery like it states for the hardware appliance. However, if i mount the 1.2.0.899 iso image (connect at power) I don't seen to get any options in my vm console? At most, I have a <enter> at the very beginning that will take me to Grub or ADE boot menu... but I don't see anything about options to change the password?
Make sure you are following the steps in the following link:
http://www.cisco.com/c/en/us/td/docs/security/ise/1-2/installation_guide/ise_ig/ise_postins.html#38674
Also, make sure that the VM Guest is set to boot from DVD/CD first before trying the HDD.
Thank you for rating helpful posts! -
Enable password recovery in cisco 2950 with AAA
Hello friends,
I need to reccover switch enable password, i have already configured AAA also, when i am tryig to follow below proceedure finally saying Authorization failed. how can i recover enable password,
Regards,
Haris
If I try to recover password like this description says
http://www.cisco.com/en/US/docs/switches/lan/catalyst2960/software/release/12.2_25_see/configuration/guide/swtrbl.html#wp1090048
Step 1 Connect a terminal or PC with terminal-emulation software to the switch console port.
Step 2 Set the line speed on the emulation software to 9600 baud.
Step 3 Power off the switch. Reconnect the power cord to the switch and, within 15 seconds, press the Mode button while the System LED is still flashing green.
Base ethernet MAC Address: 00:0x:xx:xx:xx:xx
Xmodem file system is available.
The password-recovery mechanism is enabled.
The system has been interrupted prior to initializing the
flash filesystem. The following commands will initialize
the flash filesystem, and finish loading the operating
system software:
flash_init
load_helper
boot
switch:
Step 4 switch: flash_init
Initializing Flash...
flashfs[0]: 600 files, 19 directories
flashfs[0]: 0 orphaned files, 0 orphaned directories
flashfs[0]: Total bytes: 32514048
flashfs[0]: Bytes used: 7713792
flashfs[0]: Bytes available: 24800256
flashfs[0]: flashfs fsck took 10 seconds.
...done Initializing Flash.
Boot Sector Filesystem (bs) installed, fsid: 3
Setting console baud rate to 9600...
Step5 switch:load_helper
Step6 switch: dir flash:
Directory of flash:/
2 -rwx 916 <date> vlan.dat
5 drwx 192 <date> c2960-lanbase-mz.122-25.SEE1
620 -rwx 5488 <date> config.text
621 -rwx 5 <date> private-config.text
24800256 bytes available (7713792 bytes used)
Step7 switch: rename flash:config.text flash:config.text.old
Step8 switch: boot
Loading "flash:c2960-lanbase-mz.122-25.SEE1/c2960-lanbase-mz.122-25.SEE1.bin"...
Initializing flashfs...
flashfs[1]: 600 files, 19 directories
flashfs[1]: 0 orphaned files, 0 orphaned directories
flashfs[1]: Total bytes: 32514048
flashfs[1]: Bytes used: 7713792
flashfs[1]: Bytes available: 24800256
flashfs[1]: flashfs fsck took 1 seconds.
flashfs[1]: Initialization complete....done Initializing flashfs.
64K bytes of flash-simulated non-volatile configuration memory.
Base ethernet MAC Address : 00:0x:xx:xx:xx:xx
Motherboard assembly number : xxxxxxxxxx
Power supply part number : xxxxxxxxxxx
Motherboard serial number : xxxxxxxxxxx
Power supply serial number : xxxxxxxxxxx
Model revision number : B0
Motherboard revision number : B0
Model number : WS-C2960G-24TC-L
System serial number : xxxxxxxxxxxx
Top Assembly Part Number : xxxxxxxxxxxx
Top Assembly Revision Number : B0
Version ID : V02
CLEI Code Number : xxxxxxxxxxxxx
Hardware Board Revision Number : 0x01
Switch Ports Model SW Version SW Image
* 1 24 WS-C2960G-24TC-L 12.2(25)SEE1 C2960-LANBASE-M
Press RETURN to get started!
Step9 Hit <Enter>
Would you like to terminate autoinstall? [yes]: yes
Step10
--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]no
Switch>
Step11 Switch> enable
Step12 Switch# rename flash:config.text.old flash:config.text
Destination filename [config.text]? <Enter>
Step13 Switch# copy flash:config.text system:running-config
Destination filename [running-config]?<Enter>
5488 bytes copied in 0.940 secs (5838 bytes/sec)
Step14 NewSwitchName#conf t
% Authorization failed.
Doesn't this procedure work any more ?The password recovery worked, but you copied your problematic config back to the switch. Skip Step 13 and paste only the working part of the config to the switch.
You can see your renamed config with "more flash:config.text.old". -
Cisco NCS admin password recovery.
Hi All
In Cisco NCS shell I have incorrectly entered the following command in order to chang ethe admin password and saved it
username admin password hash <password> role admin
and hence lost the access to shell (ssh). Is there a way to retrieve or reset the admin password. Tried to log in as single user (as in any ohter Red Hat Distribution) but didn't work. In the worst case scenario I have rebuild the server (VM) from the .ova imange, however the licenses won't work.
Any advise would be greatly appreciated.
RegardsHello,
The only way to recover the admin password for NCS would be to use the recovery image (iso). The recovery image is not available for download from CCO. Please open a TAC case & they can special publish the image for you.
For the CLI admin password, the recovery method is the same as the physical appliance. Attach the recovery ISO, and reboot the machine. You may have to force the virtual machine to boot from the cd drive. Once it does, you will get the menu that contains the password recovery option.
Hope this helps.
Ram -
Password recovery on Cisco AP 1232
Hi all.
I have a Cisco 1232 AP at a remote location. It was configured by somebody no longer with the company and I have no passwords for it, no do I have a back up config.
It is using local authenticaiton.
Is there a way to do a password recovery without losing the current configuration?Check this out:
http://www.cisco.com/en/US/products/hw/wireless/ps430/products_password_recovery09186a00800949d0.shtml#resios
There is another similar post on this board for using a password cracker.
Here's a link to the thread:
http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&forum=Wireless%20-%20Mobility&topic=Getting%20Started%20with%20Wireless&CommCmd=MB%3Fcmd%3Dpass_through%26location%3Doutline%40%5E1%40%40.1dddb082/1#selected_message
Good Luck
Scott -
Hello,
How can I block any body to change the password using the Cisco Password recovery? because I am facing one problem that few of our clients rebootting the router and change the Conf registry and change the password.
Please give me few Suggestions.
ThanksTry the "no service password-recovery" in global config mode.
Please read the information contained in the follwoing URL before you use this command:
http://www.cisco.com/en/US/partner/products/sw/iosswrel/ps5413/products_feature_guide09186a00802a1e76.html
Hope this helps, -
Cisco ACS 4.x Password Recovery
I inherited a ACS server, but I don't have the admin password. Does anyone know of a password recovery technique ?
If it is running acs ver 4.0 on windows, then it is not possible. With ACS v4.0 all the configurations have been shifted from registry to a database file thus increasing the security in ACS. So as of now there is no way to recover the lost Admin password in ACS v4.0, cause no setting is in registry, all settings are in SQL database.
So need to reimage it ...
If it is acs windows 3.3.4 or below then you need to make registry change,
login to ACS machine as administrator..
Go to start ===> run ===> regedit
Click on HKEYLOCAL machine ===> software ===> cisco
===>CiscoAAAv3.2===>CSAdmin===> and delete all administrative users defined by
right clicking into the administraor folder.
Now login locally to ACS and it should not prompt you for password.
For a best practice make sure that you have Allow automatic login is checked
This will not prompt you for password if you are logging in locally from ACS mahcine.
If it is appliance then you need to use recovery cd to reset admin password.
Regards,
~JG
Do rate helpful posts -
No service password recovery command on cisco 2801 router
HI,
we have a cisco 2801 router in class which has a disabled pasword recovery. We tried almost everything, we cannot get into ROMmon and the break sequence dosent work in any program (hyper terminal, putty, teraterm pro). We dont have any idea how to solve this problem.
Here is the log from hyperterminal:
System Bootstrap, Version 12.3(8r)T9, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 2004 by cisco Systems, Inc.
PLD version 0x10
GIO ASIC version 0x127
c2801 processor with 131072 Kbytes of main memory
Main memory is configured to 64 bit mode with parity disabled
Readonly ROMMON initialized
PASSWORD RECOVERY FUNCTIONALITY IS DISABLED
program load complete, entry point: 0x8000f000, size: 0xc100
Initializing ATA monitor library.......
program load complete, entry point: 0x8000f000, size: 0xc100
Initializing ATA monitor library.......
program load complete, entry point: 0x8000f000, size: 0xd49718
Self decompressing the image : #################################################
######## [OK]
--- TRIED BREAK SEQUENCE HERE but nothing happens ---
Smart Init is enabled
smart init is sizing iomem
ID MEMORY_REQ TYPE
0X003AA110 public buffer pools
0X00211000 public particle pools
0X0013 0X00035000 Card in slot 1
0X000021B8 Onboard USB
If any of the above Memory Requirements are
"UNKNOWN", you may be using an unsupported
configuration or there is a software problem and
system operation may be compromised.
Allocating additional 7692663 bytes to IO Memory.
PMem allocated: 117440512 bytes; IOMem allocated: 16777216 bytes
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS Software, 2801 Software (C2801-IPBASE-M), Version 12.4(1c), RELEASE SO
FTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2005 by Cisco Systems, Inc.
Compiled Wed 26-Oct-05 08:42 by evmiller
Image text-base: 0x6007ECA0, data-base: 0x61480000
--- TRIED BREAK SEQUENCE HERE but nothing happens too ---
Port Statistics for unclassified packets is not turned on.
Cisco 2801 (revision 6.0) with 114688K/16384K bytes of memory.
Processor board ID FCZ102422KK
2 FastEthernet interfaces
2 Low-speed serial(sync/async) interfaces
DRAM configuration is 64 bits wide with parity disabled.
191K bytes of NVRAM.
62720K bytes of ATA CompactFlash (Read/Write)
Press RETURN to get started!
Thanks for help!I usually suffer from the same issue, but what works for me everytime is the other method that simulates break sequence. Can't find the documentation for it but this is how it goes:
Set the serial connection as follows in Putty:
Baud rate 1200
1 stop bit
8 data bits
no parity
no flow control
Turn off your router, then turn it back on and immediately press the spacebar for about 10-15 seconds. All you'll see is giberish. After that reset your console connection settings to the usual 9600 baud rate, and you'll find yourself in rommon mode. -
I observed two cisco 3945 routers lose IOS during password recovery. Router was rebooted, break sequence ctrl-break, then boot(instead of reset) issued. The router booted to its existing configuration or password recovery failed and router was power cycled again then ctrl-break issued. However this time the IOS was gone and all flash file systems were blank! It happened on two routers. Anyone know why such an anomaly would occur or has anyone witnessed such?
config register was set to confreg 0X2142 first time password recovery was attempted. It took but only after the power cycle(not when I simply typed boot) but by then the IOS images were gone. I found that very disturbing when it happened on two different routers and I never saw such a thing happen to a router before.
-
Ascom Wifi IP Phones with Cisco 4400 WLAN Controllers
hi,
i have 2 4400 WLAN Controllers in same Network , but Ascom IP Phones which is associated to theses defferent Controllers can reach via Network and can ring the phones but not able here the voice while they are associated to deffrent WLCs. There is no issues if both Phones are assoicated to same WLC.
any body can suggest me what will be the problem with this????
thanks,
Anvarsir,
both codes are 7.0.166.0
and both are in the same mobility group
plase find below output of show wlan command
Controller-1
(Cisco Controller) >show wlan 3
WLAN Identifier.................................. 3
Profile Name..................................... Voice-Vlan-Ground Floor
Network Name (SSID).............................. Minhalvoice
Status........................................... Enabled
MAC Filtering.................................... Enabled
Broadcast SSID................................... Disabled
AAA Policy Override.............................. Disabled
Network Admission Control
Radius-NAC State............................... Disabled
SNMP-NAC State................................. Disabled
Quarantine VLAN................................ 0
Maximum number of Associated Clients............. 0
Number of Active Clients......................... 4
Exclusionlist Timeout............................ 60 seconds
Session Timeout.................................. 1800 seconds
CHD per WLAN..................................... Disabled
Webauth DHCP exclusion........................... Disabled
Interface........................................ voicevlan-gr
Multicast Interface.............................. Not Configured
--More-- or (q)uit
WLAN ACL......................................... unconfigured
DHCP Server...................................... Default
DHCP Address Assignment Required................. Disabled
Static IP client tunneling....................... Disabled
Quality of Service............................... Platinum (voice)
Scan Defer Priority.............................. 4,5,6
Scan Defer Time.................................. 100 milliseconds
WMM.............................................. Allowed
WMM UAPSD Compliant Client Support............... Disabled
Media Stream Multicast-direct.................... Disabled
CCX - AironetIe Support.......................... Enabled
CCX - Gratuitous ProbeResponse (GPR)............. Disabled
CCX - Diagnostics Channel Capability............. Disabled
Dot11-Phone Mode (7920).......................... Disabled
Wired Protocol................................... None
IPv6 Support..................................... Disabled
Passive Client Feature........................... Disabled
Peer-to-Peer Blocking Action..................... Disabled
Radio Policy..................................... 802.11g only
DTIM period for 802.11a radio.................... 1
DTIM period for 802.11b radio.................... 1
Radius Servers
Authentication................................ Global Servers
--More-- or (q)uit
Accounting.................................... Global Servers
Dynamic Interface............................. Disabled
Local EAP Authentication......................... Disabled
Security
802.11 Authentication:........................ Open System
Static WEP Keys............................... Disabled
802.1X........................................ Disabled
Wi-Fi Protected Access (WPA/WPA2)............. Disabled
CKIP ......................................... Disabled
Web Based Authentication...................... Disabled
Web-Passthrough............................... Disabled
Conditional Web Redirect...................... Disabled
Splash-Page Web Redirect...................... Disabled
Auto Anchor................................... Disabled
H-REAP Local Switching........................ Disabled
H-REAP Local Authentication................... Disabled
H-REAP Learn IP Address....................... Enabled
Client MFP.................................... Optional but inactive (WPA2 not configured)
Tkip MIC Countermeasure Hold-down Timer....... 60
Call Snooping.................................... Disabled
Roamed Call Re-Anchor Policy..................... Disabled
SIP CAC Fail Send-486-Busy Policy................ Enabled
--More-- or (q)uit
SIP CAC Fail Send Dis-Association Policy......... Disabled
Band Select...................................... Disabled
Load Balancing................................... Disabled
Mobility Anchor List
WLAN ID IP Address Status
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Controller-2
(Cisco Controller) >show wlan 3
WLAN Identifier.................................. 3
Profile Name..................................... Voice-Vlan-Ground Floor
Network Name (SSID).............................. Minhalvoice
Status........................................... Enabled
MAC Filtering.................................... Enabled
Broadcast SSID................................... Disabled
AAA Policy Override.............................. Disabled
Network Admission Control
Radius-NAC State............................... Disabled
SNMP-NAC State................................. Disabled
Quarantine VLAN................................ 0
Maximum number of Associated Clients............. 0
Number of Active Clients......................... 15
Exclusionlist Timeout............................ 60 seconds
Session Timeout.................................. 1800 seconds
CHD per WLAN..................................... Disabled
Webauth DHCP exclusion........................... Disabled
Interface........................................ voicevlan-gr
Multicast Interface.............................. Not Configured
--More-- or (q)uit
WLAN ACL......................................... unconfigured
DHCP Server...................................... Default
DHCP Address Assignment Required................. Disabled
Static IP client tunneling....................... Disabled
Quality of Service............................... Platinum (voice)
Scan Defer Priority.............................. 4,5,6
Scan Defer Time.................................. 100 milliseconds
WMM.............................................. Allowed
WMM UAPSD Compliant Client Support............... Disabled
Media Stream Multicast-direct.................... Disabled
CCX - AironetIe Support.......................... Enabled
CCX - Gratuitous ProbeResponse (GPR)............. Disabled
CCX - Diagnostics Channel Capability............. Disabled
Dot11-Phone Mode (7920).......................... Disabled
Wired Protocol................................... None
IPv6 Support..................................... Disabled
Peer-to-Peer Blocking Action..................... Disabled
Radio Policy..................................... 802.11g only
DTIM period for 802.11a radio.................... 1
DTIM period for 802.11b radio.................... 1
Radius Servers
Authentication................................ Global Servers
Accounting.................................... Global Servers
--More-- or (q)uit
Dynamic Interface............................. Disabled
Local EAP Authentication......................... Disabled
Security
802.11 Authentication:........................ Open System
Static WEP Keys............................... Disabled
802.1X........................................ Disabled
Wi-Fi Protected Access (WPA/WPA2)............. Disabled
CKIP ......................................... Disabled
IP Security................................... Disabled
IP Security Passthru.......................... Disabled
Web Based Authentication...................... Disabled
Web-Passthrough............................... Disabled
Conditional Web Redirect...................... Disabled
Splash-Page Web Redirect...................... Disabled
Auto Anchor................................... Disabled
H-REAP Local Switching........................ Disabled
H-REAP Local Authentication................... Disabled
H-REAP Learn IP Address....................... Enabled
Client MFP.................................... Optional but inactive (WPA2 not configured)
Tkip MIC Countermeasure Hold-down Timer....... 60
Call Snooping.................................... Disabled
Roamed Call Re-Anchor Policy..................... Disabled
--More-- or (q)uit
SIP CAC Fail Send-486-Busy Policy................ Enabled
SIP CAC Fail Send Dis-Association Policy......... Disabled
Band Select...................................... Disabled
Load Balancing................................... Disabled
Mobility Anchor List
WLAN ID IP Address Status
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ -
I need to reset the admin password for Cisco Works. I've followed the online documentation and the different methods posted do not seem to work.
The first method I saw was to edit the cwpass file located at C:\Program Files\CSCOpx\lib\classpath\com\cisco\nm\cmf\servlet\cwpass and change the admin password back to the default.
You have to stop the Daemon, change the password back to defualt admin:0DPiKuNIrrVmD8IUCuw1hQxNqZc=::::F:: then restart the daemon.
After doing that I go to the url to access cisco works http://servername:1741/login.html where "servername" is the name of the server.
The new logon does not work.
I then found another doc that said to use the resetpasswd.exe file to reset the admin password. So. I stop the daemon, run the resetpasswd by issuing the command "resetpasswd admin". It prompts you to enter the new password twice. Then restart the daemon. I've checked the cwpass file and verified that the hash for the admin password changes when I reset it. But, I still can not logon.
Is there something else that needs to be restarted?You are probably still using external authentication. Try reverting to local mode first:
1. Stop daemons.
2. Go to NMSROOT\CSCOpx\bin\ in DOS.
3. Issue: perl ResetLoginModule.pl.
4. Restart daemons.
If you still cannot login, the original password file is located under NMSROOT\lib\classpath\com\cisco\nm\cmf\servlet\orig\. Try copying this one to the active file location: NMSROOT\lib\classpath\com\cisco\nm\cmf\servlet and then restarting daemons. -
WEP-WPA at the same time in WLAN Controllers
Hello
I'm about to migrate a wireless security method that is based in LEAP+WEP to PEAP+WPA, but the main challange is to make transparent the migration process to the end-users. Actually we have 1200 Series APs working in Autonomous mode. I know these APs can be configured to work with WEP and WPA at the same time. But I wish to use WLAN Controllers, is it posible to have WEP and WPA at the same time with the same SSID working with LWAPP?From what I have found out, WPA works by itself, no other protocol is used. Leap OTOH uses WEP and username Password. Peap uses a CA and WEP. What you are trying to do is either or, you would need top Vlan and run two SSIDs for that authentication. If you are looking to secure it using a Certificate server, then just use PEAP, forget the WPA, of course that limits you to what Client cards can be used. For the most security with a multitude of cards, WPA-PSK is what to use, most cards sold in the past 18 months should be WPA capable, but not all are Cisco Compatible.
-
User Name and Password for Cisco Prime Infrastructure 2.1
Hi all:
I am stuck at the login page of Cisco Prime Infrastructure 2.1.
I have tried using the user name root and its password (when log in with root at Vsphere Client) and also the login user name "before" get into the appliance infrastructure, all cannot work.
Anybody knows what is the default username or password or any way to set the username and password for this Cisco Prime Infrastructure 2.1 website?
Thanks!
tangsuanHi Tangsuan,
Following is the documented procedure for password recovery..
In order to modify the GUI root user password, you will need to login to the NCS CLI
as an admin user, and enter the command
"ncs password root password <new password>" (without the quotes)
This should set the web interface root user password :
http://www.cisco.com/en/US/docs/wireless/ncs/1.1/configuration/guide/manag.html#wp1268889
If you have lost your CLI password , try the default logging that is ,
CLI user is admin and not root, so please try logging in as admin with
the password that was set during setup. If that does not work , you need
the install disk that came with the appliance to recover that password.
Follow these steps:
Recovering a Lost Admin Password
If you lose or forget the admin password for NCS appliance, follow these steps.
Step 1 Reboot the NCS appliance with the ISO DVD inserted. The Cisco Prime Network Control
System Welcome screen appears:
ISOLINUX 3.11 2005-09-02 Copyright (C) 1994-2005 H. Peter Anvin
Welcome to Cisco Prime Network Control System
To boot from hard disk, press <Enter>.
Available boot options:
[1] Network Control System Installation (Keyboard/Monitor)
[2] Network Control System Installation (Serial Console)
[3] Recover administrator password. (Keyboard/Monitor)
[4] Recover administrator password. (Serial Console)
<Enter> Boot existing OS from Hard Disk.
Enter boot option and press <return>.
boot:
Step 2 Select the desired recovery option, 3 or 4, depending on how you
are connected to the appliance and then follow the prompts.
Thanks-
Afroz
***Ratings Encourages Contributors **** -
ONS 15454 Password Recovery Cable
Does anyone know the part number for the password recovery cable needed to connect a laptop to the TCC card to used to reset the password to Cisco defaults? I have attached the cisco PDF which explains the connection of this cable.
ThanksThe part number is 15454-EPC=
In the past, you couldn't order this item but had to call Cisco TAC and request one.
Hope this helps.
Maybe you are looking for
-
I'm looking for people that can verify if NikonScan version 4, a Nikon Scanner, and an Intel Mac can play nice together. Nikon says Intel Core Duo Macs are unsupported. What about the Core Solo? It's not mentioned. That doesn't mean it won't work on
-
UCCX limit duration of calls in Queue
Hi, How can I redirect a call to another queue after it stays in the first queue for X amount of time? This is to say to limit the duration of a call in the first queue to X amount and then once it reaches that target, it will be redirected to anothe
-
PO release strategy workflow based on plant
Hi Gurus, I am setting up PO release strategy workflow. We have purchasing at plant level. Fg. plant 1234's PO should be sent to the plant 1234's purchasing dept. Plant 5678's PO should be sent to the plant 5678's purchasing dept. In PR release s
-
HT1848 Menu Bar is hidden by default.
It would be helpful if this article stated that the you will have to hit CTRL+ B to show the menu bar that contains the "FILE" Menu button. (the menu bar is default hidden itunes when you update to the newest version)
-
HT3964 How to remove third party software?
How to remove third party software from the MacBook Pro 2011? I have software which is freezing my opening screen.