Time Clock IPsec and Layer3 RoutingUnable to set up a static host route - “SIOCADDRT: No such process”How can I prevent OpenVPN from clobbering local route?RV082 Gateway-Gateway VPN Won't ConnectTraffic routing with unreliable connectionsOpenVPN not routing on DD-WRTExpose a machine on the far side of a VPNRouting between pfSense Subnets and IPSec VPNCan I set up a VoIP phone to connect to it's gateway over VPN with different subnets?OpenVPN setup help - routing or bridging?Routing between OpenVPN subnets in tunnel modes

Jesus' words on the Jews

Rounding a number extracted by jq to limit the decimal points

What are the components of a legend (in the sense of a tale, not a figure legend)?

CPLD based Pierce oscillator

Tikz draw contour without some edges, and fill

What are the holes in files created with fallocate?

Unexpected Netflix account registered to my Gmail address - any way it could be a hack attempt?

If current results hold, Man City would win PL title

How can a layman easily get the consensus view of what academia *thinks* about a subject?

How can dragons propel their breath attacks to a long distance

Entering the UK as a British citizen who is a Canadian permanent resident

correct spelling of "carruffel" (fuzz, hustle, all that jazz)

How exactly does artificial gravity work?

What is the largest number of identical satellites launched together?

Why did the metro bus stop at each railway crossing, despite no warning indicating a train was coming?

When a land becomes a creature, is it untapped?

What information do scammers need to withdraw money from an account?

Is there ever any indication in the MCU as to how Spider-Man got his powers?

Area under the curve - Integrals (Antiderivatives)

Anabelian geometry ~ higher category theory

Jumping frame contents with beamer and pgfplots

How can I answer high-school writing prompts without sounding weird and fake?

Is the expression "To think you would stoop so low" often misused?

Is there anything special about -1 (0xFFFFFFFF) regarding ADC?



Time Clock IPsec and Layer3 Routing


Unable to set up a static host route - “SIOCADDRT: No such process”How can I prevent OpenVPN from clobbering local route?RV082 Gateway-Gateway VPN Won't ConnectTraffic routing with unreliable connectionsOpenVPN not routing on DD-WRTExpose a machine on the far side of a VPNRouting between pfSense Subnets and IPSec VPNCan I set up a VoIP phone to connect to it's gateway over VPN with different subnets?OpenVPN setup help - routing or bridging?Routing between OpenVPN subnets in tunnel modes






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








0















Thank you for your time, I incorrectly asked this in Network Engineering so I'm moving it here.



I have a Remote Office and a Main Office linked via IPSec with the Main Office being 192.168.16.0/24 and the Remote being 192.168.1.0/24. I can ping all devices in the Main Office from the Remote Office and vice versa.



Below is a simplification of what our network looks like:



Simplistic Network Diagram



We are using TP-Link ER-6020 v2 routers with the latest firmware on both networks. Our ISP happens to use wireless connections as we are quite rural, though I don't think that really matters.



The Time Clock Server software is running on Windows Server 2012 (192.168.16.107) along with a few other applications. The Server Software can connect/discover Time Clocks on the 192.168.16.0/24 network with no problem but it cannot connect to the (192.168.1.105) Time Clock on the Remote Network even though it can be pinged. The Time Clocks use UDP 30303 and 30304 for communications. I have changed the Time Clock to eliminate a failing unit being the problem.



The Time Clock vendor has suggested that I set up some "Layer3 Management" rules or create some "Custom Routing Tables" but that seems to beyond my level of knowledge. Researching those has me thinking in circles with no end.



Please offer either a path towards solution or a Primer that might help me understand what the vendor is getting at so I can figure this out.










share|improve this question



















  • 1





    If you're happy to install Wireshark on the server, you can eliminate the router as a cause by seeing if the UDP traffic is reaching it. Fire it up and use a capture filter of udp and (port 30303 or port 30304). If you see UDP arriving, then the server or the application itself is dropping it; if not then it's something upstream, perhaps firewall rules on one of your routers.

    – SmallClanger
    May 2 at 19:10












  • I tried Wireshark and it's interesting to say the least. Now, I'm not smart on this bu here is my best try at describing what I am seeing. It seems the program sends out a 'Who's There' broadcast on UDP 30303 but only the clocks on 192.168.16.0/24 seem to respond. Would an IPsec connection normally pass on such broadcast queries to the 192.168.1.0/24 network?

    – BigMikeL
    May 3 at 12:33






  • 1





    Unless you're fully bridging the two networks (highly unlikely from your description) the broadcast discovery will never reach the clocks on the other side of your tunnel. Two ways to resolve this: Find a way to replay the broadcast on the far side of the tunnel (can be tricky) or configure the server application to use unicast or pre-populate it with the clock addresses (much easier but only if the app supports it)

    – SmallClanger
    May 3 at 15:12

















0















Thank you for your time, I incorrectly asked this in Network Engineering so I'm moving it here.



I have a Remote Office and a Main Office linked via IPSec with the Main Office being 192.168.16.0/24 and the Remote being 192.168.1.0/24. I can ping all devices in the Main Office from the Remote Office and vice versa.



Below is a simplification of what our network looks like:



Simplistic Network Diagram



We are using TP-Link ER-6020 v2 routers with the latest firmware on both networks. Our ISP happens to use wireless connections as we are quite rural, though I don't think that really matters.



The Time Clock Server software is running on Windows Server 2012 (192.168.16.107) along with a few other applications. The Server Software can connect/discover Time Clocks on the 192.168.16.0/24 network with no problem but it cannot connect to the (192.168.1.105) Time Clock on the Remote Network even though it can be pinged. The Time Clocks use UDP 30303 and 30304 for communications. I have changed the Time Clock to eliminate a failing unit being the problem.



The Time Clock vendor has suggested that I set up some "Layer3 Management" rules or create some "Custom Routing Tables" but that seems to beyond my level of knowledge. Researching those has me thinking in circles with no end.



Please offer either a path towards solution or a Primer that might help me understand what the vendor is getting at so I can figure this out.










share|improve this question



















  • 1





    If you're happy to install Wireshark on the server, you can eliminate the router as a cause by seeing if the UDP traffic is reaching it. Fire it up and use a capture filter of udp and (port 30303 or port 30304). If you see UDP arriving, then the server or the application itself is dropping it; if not then it's something upstream, perhaps firewall rules on one of your routers.

    – SmallClanger
    May 2 at 19:10












  • I tried Wireshark and it's interesting to say the least. Now, I'm not smart on this bu here is my best try at describing what I am seeing. It seems the program sends out a 'Who's There' broadcast on UDP 30303 but only the clocks on 192.168.16.0/24 seem to respond. Would an IPsec connection normally pass on such broadcast queries to the 192.168.1.0/24 network?

    – BigMikeL
    May 3 at 12:33






  • 1





    Unless you're fully bridging the two networks (highly unlikely from your description) the broadcast discovery will never reach the clocks on the other side of your tunnel. Two ways to resolve this: Find a way to replay the broadcast on the far side of the tunnel (can be tricky) or configure the server application to use unicast or pre-populate it with the clock addresses (much easier but only if the app supports it)

    – SmallClanger
    May 3 at 15:12













0












0








0








Thank you for your time, I incorrectly asked this in Network Engineering so I'm moving it here.



I have a Remote Office and a Main Office linked via IPSec with the Main Office being 192.168.16.0/24 and the Remote being 192.168.1.0/24. I can ping all devices in the Main Office from the Remote Office and vice versa.



Below is a simplification of what our network looks like:



Simplistic Network Diagram



We are using TP-Link ER-6020 v2 routers with the latest firmware on both networks. Our ISP happens to use wireless connections as we are quite rural, though I don't think that really matters.



The Time Clock Server software is running on Windows Server 2012 (192.168.16.107) along with a few other applications. The Server Software can connect/discover Time Clocks on the 192.168.16.0/24 network with no problem but it cannot connect to the (192.168.1.105) Time Clock on the Remote Network even though it can be pinged. The Time Clocks use UDP 30303 and 30304 for communications. I have changed the Time Clock to eliminate a failing unit being the problem.



The Time Clock vendor has suggested that I set up some "Layer3 Management" rules or create some "Custom Routing Tables" but that seems to beyond my level of knowledge. Researching those has me thinking in circles with no end.



Please offer either a path towards solution or a Primer that might help me understand what the vendor is getting at so I can figure this out.










share|improve this question
















Thank you for your time, I incorrectly asked this in Network Engineering so I'm moving it here.



I have a Remote Office and a Main Office linked via IPSec with the Main Office being 192.168.16.0/24 and the Remote being 192.168.1.0/24. I can ping all devices in the Main Office from the Remote Office and vice versa.



Below is a simplification of what our network looks like:



Simplistic Network Diagram



We are using TP-Link ER-6020 v2 routers with the latest firmware on both networks. Our ISP happens to use wireless connections as we are quite rural, though I don't think that really matters.



The Time Clock Server software is running on Windows Server 2012 (192.168.16.107) along with a few other applications. The Server Software can connect/discover Time Clocks on the 192.168.16.0/24 network with no problem but it cannot connect to the (192.168.1.105) Time Clock on the Remote Network even though it can be pinged. The Time Clocks use UDP 30303 and 30304 for communications. I have changed the Time Clock to eliminate a failing unit being the problem.



The Time Clock vendor has suggested that I set up some "Layer3 Management" rules or create some "Custom Routing Tables" but that seems to beyond my level of knowledge. Researching those has me thinking in circles with no end.



Please offer either a path towards solution or a Primer that might help me understand what the vendor is getting at so I can figure this out.







routing ipsec ip-routing






share|improve this question















share|improve this question













share|improve this question




share|improve this question








edited May 3 at 3:21









Appleoddity

2,2041317




2,2041317










asked May 2 at 18:49









BigMikeLBigMikeL

185




185







  • 1





    If you're happy to install Wireshark on the server, you can eliminate the router as a cause by seeing if the UDP traffic is reaching it. Fire it up and use a capture filter of udp and (port 30303 or port 30304). If you see UDP arriving, then the server or the application itself is dropping it; if not then it's something upstream, perhaps firewall rules on one of your routers.

    – SmallClanger
    May 2 at 19:10












  • I tried Wireshark and it's interesting to say the least. Now, I'm not smart on this bu here is my best try at describing what I am seeing. It seems the program sends out a 'Who's There' broadcast on UDP 30303 but only the clocks on 192.168.16.0/24 seem to respond. Would an IPsec connection normally pass on such broadcast queries to the 192.168.1.0/24 network?

    – BigMikeL
    May 3 at 12:33






  • 1





    Unless you're fully bridging the two networks (highly unlikely from your description) the broadcast discovery will never reach the clocks on the other side of your tunnel. Two ways to resolve this: Find a way to replay the broadcast on the far side of the tunnel (can be tricky) or configure the server application to use unicast or pre-populate it with the clock addresses (much easier but only if the app supports it)

    – SmallClanger
    May 3 at 15:12












  • 1





    If you're happy to install Wireshark on the server, you can eliminate the router as a cause by seeing if the UDP traffic is reaching it. Fire it up and use a capture filter of udp and (port 30303 or port 30304). If you see UDP arriving, then the server or the application itself is dropping it; if not then it's something upstream, perhaps firewall rules on one of your routers.

    – SmallClanger
    May 2 at 19:10












  • I tried Wireshark and it's interesting to say the least. Now, I'm not smart on this bu here is my best try at describing what I am seeing. It seems the program sends out a 'Who's There' broadcast on UDP 30303 but only the clocks on 192.168.16.0/24 seem to respond. Would an IPsec connection normally pass on such broadcast queries to the 192.168.1.0/24 network?

    – BigMikeL
    May 3 at 12:33






  • 1





    Unless you're fully bridging the two networks (highly unlikely from your description) the broadcast discovery will never reach the clocks on the other side of your tunnel. Two ways to resolve this: Find a way to replay the broadcast on the far side of the tunnel (can be tricky) or configure the server application to use unicast or pre-populate it with the clock addresses (much easier but only if the app supports it)

    – SmallClanger
    May 3 at 15:12







1




1





If you're happy to install Wireshark on the server, you can eliminate the router as a cause by seeing if the UDP traffic is reaching it. Fire it up and use a capture filter of udp and (port 30303 or port 30304). If you see UDP arriving, then the server or the application itself is dropping it; if not then it's something upstream, perhaps firewall rules on one of your routers.

– SmallClanger
May 2 at 19:10






If you're happy to install Wireshark on the server, you can eliminate the router as a cause by seeing if the UDP traffic is reaching it. Fire it up and use a capture filter of udp and (port 30303 or port 30304). If you see UDP arriving, then the server or the application itself is dropping it; if not then it's something upstream, perhaps firewall rules on one of your routers.

– SmallClanger
May 2 at 19:10














I tried Wireshark and it's interesting to say the least. Now, I'm not smart on this bu here is my best try at describing what I am seeing. It seems the program sends out a 'Who's There' broadcast on UDP 30303 but only the clocks on 192.168.16.0/24 seem to respond. Would an IPsec connection normally pass on such broadcast queries to the 192.168.1.0/24 network?

– BigMikeL
May 3 at 12:33





I tried Wireshark and it's interesting to say the least. Now, I'm not smart on this bu here is my best try at describing what I am seeing. It seems the program sends out a 'Who's There' broadcast on UDP 30303 but only the clocks on 192.168.16.0/24 seem to respond. Would an IPsec connection normally pass on such broadcast queries to the 192.168.1.0/24 network?

– BigMikeL
May 3 at 12:33




1




1





Unless you're fully bridging the two networks (highly unlikely from your description) the broadcast discovery will never reach the clocks on the other side of your tunnel. Two ways to resolve this: Find a way to replay the broadcast on the far side of the tunnel (can be tricky) or configure the server application to use unicast or pre-populate it with the clock addresses (much easier but only if the app supports it)

– SmallClanger
May 3 at 15:12





Unless you're fully bridging the two networks (highly unlikely from your description) the broadcast discovery will never reach the clocks on the other side of your tunnel. Two ways to resolve this: Find a way to replay the broadcast on the far side of the tunnel (can be tricky) or configure the server application to use unicast or pre-populate it with the clock addresses (much easier but only if the app supports it)

– SmallClanger
May 3 at 15:12










1 Answer
1






active

oldest

votes


















1














SmallClanger, you inspired me to look at it from a different angle. I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) and hand keyed the clock details, bypassing it's discovery process and after driving out to the remote site, it seems to have worked swimmingly. The software on the server still has a red alert dot showing that the clock is not connected but the communication is there. So the only failure was the discovery/detection of the clock via UDP and I can live with a red dot.






share|improve this answer























  • Seems to be an unwritten rule that software supporting physical security and time-clock devices is god-awful. Sometimes you can use that to your advantage :)

    – SmallClanger
    May 3 at 15:47











  • I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) - So you hacked the time clock vendors database with MS Access? How is this a Microsoft shortcoming?

    – joeqwerty
    May 3 at 15:48











  • It took the program about 2 seconds to discover the password of the .mdb file. I know Microsoft has improved it now but it's something that should have been more robust towards the beginning of the life of Access.

    – BigMikeL
    May 3 at 15:50











  • It's certainly convenient that I could crack the password but sad at the same time.

    – BigMikeL
    May 3 at 15:53











Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "2"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













draft saved

draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f965630%2ftime-clock-ipsec-and-layer3-routing%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









1














SmallClanger, you inspired me to look at it from a different angle. I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) and hand keyed the clock details, bypassing it's discovery process and after driving out to the remote site, it seems to have worked swimmingly. The software on the server still has a red alert dot showing that the clock is not connected but the communication is there. So the only failure was the discovery/detection of the clock via UDP and I can live with a red dot.






share|improve this answer























  • Seems to be an unwritten rule that software supporting physical security and time-clock devices is god-awful. Sometimes you can use that to your advantage :)

    – SmallClanger
    May 3 at 15:47











  • I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) - So you hacked the time clock vendors database with MS Access? How is this a Microsoft shortcoming?

    – joeqwerty
    May 3 at 15:48











  • It took the program about 2 seconds to discover the password of the .mdb file. I know Microsoft has improved it now but it's something that should have been more robust towards the beginning of the life of Access.

    – BigMikeL
    May 3 at 15:50











  • It's certainly convenient that I could crack the password but sad at the same time.

    – BigMikeL
    May 3 at 15:53















1














SmallClanger, you inspired me to look at it from a different angle. I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) and hand keyed the clock details, bypassing it's discovery process and after driving out to the remote site, it seems to have worked swimmingly. The software on the server still has a red alert dot showing that the clock is not connected but the communication is there. So the only failure was the discovery/detection of the clock via UDP and I can live with a red dot.






share|improve this answer























  • Seems to be an unwritten rule that software supporting physical security and time-clock devices is god-awful. Sometimes you can use that to your advantage :)

    – SmallClanger
    May 3 at 15:47











  • I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) - So you hacked the time clock vendors database with MS Access? How is this a Microsoft shortcoming?

    – joeqwerty
    May 3 at 15:48











  • It took the program about 2 seconds to discover the password of the .mdb file. I know Microsoft has improved it now but it's something that should have been more robust towards the beginning of the life of Access.

    – BigMikeL
    May 3 at 15:50











  • It's certainly convenient that I could crack the password but sad at the same time.

    – BigMikeL
    May 3 at 15:53













1












1








1







SmallClanger, you inspired me to look at it from a different angle. I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) and hand keyed the clock details, bypassing it's discovery process and after driving out to the remote site, it seems to have worked swimmingly. The software on the server still has a red alert dot showing that the clock is not connected but the communication is there. So the only failure was the discovery/detection of the clock via UDP and I can live with a red dot.






share|improve this answer













SmallClanger, you inspired me to look at it from a different angle. I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) and hand keyed the clock details, bypassing it's discovery process and after driving out to the remote site, it seems to have worked swimmingly. The software on the server still has a red alert dot showing that the clock is not connected but the communication is there. So the only failure was the discovery/detection of the clock via UDP and I can live with a red dot.







share|improve this answer












share|improve this answer



share|improve this answer










answered May 3 at 15:40









BigMikeLBigMikeL

185




185












  • Seems to be an unwritten rule that software supporting physical security and time-clock devices is god-awful. Sometimes you can use that to your advantage :)

    – SmallClanger
    May 3 at 15:47











  • I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) - So you hacked the time clock vendors database with MS Access? How is this a Microsoft shortcoming?

    – joeqwerty
    May 3 at 15:48











  • It took the program about 2 seconds to discover the password of the .mdb file. I know Microsoft has improved it now but it's something that should have been more robust towards the beginning of the life of Access.

    – BigMikeL
    May 3 at 15:50











  • It's certainly convenient that I could crack the password but sad at the same time.

    – BigMikeL
    May 3 at 15:53

















  • Seems to be an unwritten rule that software supporting physical security and time-clock devices is god-awful. Sometimes you can use that to your advantage :)

    – SmallClanger
    May 3 at 15:47











  • I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) - So you hacked the time clock vendors database with MS Access? How is this a Microsoft shortcoming?

    – joeqwerty
    May 3 at 15:48











  • It took the program about 2 seconds to discover the password of the .mdb file. I know Microsoft has improved it now but it's something that should have been more robust towards the beginning of the life of Access.

    – BigMikeL
    May 3 at 15:50











  • It's certainly convenient that I could crack the password but sad at the same time.

    – BigMikeL
    May 3 at 15:53
















Seems to be an unwritten rule that software supporting physical security and time-clock devices is god-awful. Sometimes you can use that to your advantage :)

– SmallClanger
May 3 at 15:47





Seems to be an unwritten rule that software supporting physical security and time-clock devices is god-awful. Sometimes you can use that to your advantage :)

– SmallClanger
May 3 at 15:47













I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) - So you hacked the time clock vendors database with MS Access? How is this a Microsoft shortcoming?

– joeqwerty
May 3 at 15:48





I hacked the database password that records discovered clocks (thanks to Microsoft Access poor security) - So you hacked the time clock vendors database with MS Access? How is this a Microsoft shortcoming?

– joeqwerty
May 3 at 15:48













It took the program about 2 seconds to discover the password of the .mdb file. I know Microsoft has improved it now but it's something that should have been more robust towards the beginning of the life of Access.

– BigMikeL
May 3 at 15:50





It took the program about 2 seconds to discover the password of the .mdb file. I know Microsoft has improved it now but it's something that should have been more robust towards the beginning of the life of Access.

– BigMikeL
May 3 at 15:50













It's certainly convenient that I could crack the password but sad at the same time.

– BigMikeL
May 3 at 15:53





It's certainly convenient that I could crack the password but sad at the same time.

– BigMikeL
May 3 at 15:53

















draft saved

draft discarded
















































Thanks for contributing an answer to Server Fault!


  • Please be sure to answer the question. Provide details and share your research!

But avoid


  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.

To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f965630%2ftime-clock-ipsec-and-layer3-routing%23new-answer', 'question_page');

);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020