Cisco Pix Firewall SSH listening on port 2022

Hello

Is it possible to tell the pix to listen on port 2022 for ssh?

My ISP blocked port 22

Kind regards

Edwin Gerritsen

Well thought out but unfortunately, that this will not work. The only way we could do something like this would be to use a device (such as a router IOS) upstream to the port translation (similar to the idea above). Hit the device on port 2022 upstream and have this device translated the port of destination to 22 and send it down to the PIX.

There is no mechanism to change the listening port for SSH on the PIX.

Scott

Tags: Cisco Security

Similar Questions

  • Remote Desktop from Win7 not passing is not by the cisco pix firewall, but xp can.

    our company lan remote office work like this:

    Win7 for win7 ok

    Win7 for xp ok

    XP and win7 ok

    XP to xp ok

    Which leads me to believe that all the parameters and features of firewall and rdp pc work fine.

    our remote users connect via the cisco through our cisco pix vpn client business and Remote Desktop works like this:

    inside lan xp ouside xp OK

    inside lan xp ouside win7 OK

    Here's the problem:

    inside to outside win7 win7 ==> does NOT connect to (rdp that is)

    inside win7 for xp outdoor ==> does NOT connect to (rdp that is)

    External clients CAN of course accept rdp because it works when initiated by the xp machine.

    ONLY win7 machines cannot use rdp through the cisco firewall

    Yes, the dns resolves properly throughout.

    Yes, remote desktop IS active (Yes, some may ask me that...)

    Ping is not allowed through the firewall, so it makes no difference.

    the result is the same whether the win7 firewall is on or off.

    all the necessary pc firewall settings are good, as demonstrated in the first part.

    Why can you connect the NO Win7?  but the XP machines?

    Any help is appreciated, thanks.

    I think that there are some weird setting in Win7 that didn't exist in winxp.

    Hello

    The question is more suited in the TechNet forums. So I would say you mention the link and send the request in this forum for better support.

    http://social.technet.Microsoft.com/forums/en-us/category/w7itpro

    For any information related to Windows, feel free to get back to us. We will be happy to help you.

  • Cisco ACS and Pix Firewall

    I have configured the aaa authentication in the pix firewall to see the ACS RADIUS Server for verification of the user. If the ACS server becomes unavailable, then I could not connet the pix firewall.

    In the router, I have the configuration option

    AAA authentication login default group Ganymede + local

    that tells the router first looking for a radius server and if is not available connect through the local database.

    Is there an option in the Cisco pix firewall to connect using local information if ACS is not available?

    Thanks in advance

    Hello

    PIX back up method to entered the unit in the event of server failure aaa works on 6.3.4 code and above. In the codes plus late 6.3.4 If the RADIUS server fails it is impossible to get in unless password recovery. "However if we have not configured for console aaa authentication than user name: pix and password: cisco" works by default.

    Kind regards

    Mahmoud Singh

  • Active FTP problem between Checkpoint and Cisco PIX

    Hello

    I am facing a strange problem.

    Many of our customers have achieved a Checkpoint FW-1/VPN-1 4.1 SP6 (the last before NG). When they try to connect to an FTP server that is located behind a Cisco PIX firewall, they are not able to transfer data: the connection is established, the authentication to follow, but at the stage of the 'LIST' the connection 'freeze' and the user must close the FTP client.

    Users are facing this problem ONLY in Active mode: passive mode works very well. Turn passive mode FTP client isn't acceptable workaround for most of my clients.

    The problem seems to be related only to the firewall Cisco PIX and active FTP.

    Please, what is someone encountered the same problem?

    Could someone give me any help?

    Thank you in advance.

    Paolo

    Yes it is a (global) problem, even with the last checkpoint firewalls. What happens with Active FTP, it's that each command (get, list, etc.) causes another log on the client (source port) to the server on port 21. If you run netstat from the customer you can check this for yourself.

    What normally happens, with HTTP, FTP, telnet, which have are, it's that the client makes a connection to port 21, 23 etc then returns with a port source such as 1936, 1980, 3000, etc..

    Connect problem with statefull firewall is they do not allow multiple sessions control port number on a destination, as well as a source port can be bound to a destination port, in this case, 21 for FTP. I Don t see it changed, an extreme security risk any time soon, since it s, someone else might be hopping session and block this type of traffic, it's what the stateful firewall are all about and FTP servers are problably the machines more pirated on the planet.

    You´ve mentioned the workaround solution, unfortunately that s the only way, change your passive customers, I think that Unix/Linux customers have a problem with this, change your FTP server can also help, there are multiple servers that can be configured to disable Active FTP, I wouldn know exactly, I only network & firewall... maybe someone else can move on this...

  • Unable to ssh on alternative port

    Mini Mac OS X Server 10.11.6, CommuniGate Pro, no and almost no other stock OS X Server services.

    The server owner recently found on a network that has blocked ports for VPN and SSH connections, so we try to set up the server to allow a SSH tunnel through SOCKS proxy port 443, which is almost always open. (We have no plans on execution of web services via this port on this area.)

    Research indicates that this should be a two-step process: 1) Edit /Library/Server/Web/Config/Proxy/apache_serviceproxy.conf to remove the web listening on ports 80 and 443 ports; (2) edit/etc/ssh/ssh_config for add a SSH listener on port 443. then restart.

    After that, HTTP services are off on 80 and 443, but I can't connect to SSH on port 443. Works very well over 22 yet. Nmapping the server indicates that there is nothing open on port 443. Is there anything else I need to do for this open?

    A user on the stack Exchange responded to this question. Works a charm.

    http://Apple.StackExchange.com/questions/253332/unable-to-SSH-to-OS-x-server-Ove r-replacement-port

  • PIX firewall Image issue

    Hello

    I'm without a firewall PIX 7.0 to 6.3 decommissioning. I faced the problem during the restart of the PIX.

    The error given below,

    Start the first image in flash

    Image must be at least 7-0-0-0 error in the flash file: / pix635.bin

    No bootable Flash image. Please download an image from a network server

    in monitor mode

    CISCO PIX FIREWALL SYSTEMS

    BIOS version shipped 4.3.207 01/02/02 16:12:22.73

    Compiled by Manu

    128 MB OF RAM

    Did you follow the exact downgrade procedure indicated on this link... you point the image as shown 6.3.x

    downgrade tftp://tftpserverip/pix63x.bin

    PIX downgrade procedure 7.x to 6.3.x

    http://www.Cisco.com/en/us/docs/security/ASA/asa70/pix_upgrade/upgrade/guide/pixupgrd.html#wp1810347

    in any case, you can always redownload the 6.3.5 new code in monitor mode.

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_tech_note09186a0080094a5d.shtml#upbootormon

    Let us know how it works.

    Rgds

    Jorge

  • How to limit the ICMP on the PIX firewall.

    Guys good day!

    I have a dilemma with regard to limiting ICMP users browsing to other networks such as other demilitarized interns.

    I know that, to allow ICMP to pass through interfaces, you will need to create an ACL such as below:

    access-list DMZACL allow icmp a whole

    Users require this config ping a server on the DMZ, but it is a security risk.

    To minimize, I have a group of objects created in order to identify hosts and networks is allowed to have access to the echo-replies.

    Again, this is a problem since many host who extended pings just to monitor the connectivity server and its application.

    Do you have other ideas guys?

    As to limiting the echo answers on the PIX. As first 5 echo request succeed with 5 echo-replies and the rest would be removed.

    This could be done?

    Thank you

    Chris

    Hello.. I don't think you can do this by using an ACL on the PIX, however, you might be able to stop the ICMP sweeps by activating CODES signatures using the check ip command you... For more information see the link below

    Guidelines of use Cisco Intrusion Detection System (IDS Cisco) provides the following for IP-based systems:

    ? Audit of traffic. The application of signatures will be audited only as part of an active session.

    ? Apply to the verification of an interface.

    ? Supports different auditing policies. Traffic that matches a signature triggers a range of configurable

    actions.

    ? Disables signature verification.

    ? Always turns the shares of a class of signature and allows IDS (information, attack).

    The audit is performed by looking at IP packets to their arrival at an input interface, if a packet triggers

    a signature and the action configured does not have the package, and then the same package may trigger another

    signatures.

    Firewall PIX supports inbound and outbound audit.

    For a complete list signatures of Cisco IDS supported, their wording and whether they are attacking or

    informational messages, see Messages in Log System Cisco PIX Firewall.

    See the User Guide for the Cisco Secure Intrusion Detection System Version 2.2.1 for more information

    on each signature. You can view the? NSDB and Signatures? Chapter of this guide at the following

    website:

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/csids/csids1/csidsug/SIGs.htm

  • Username in the Pix Firewall

    When I do a command 'See logging' in my Cisco Pix Firewall (6.3), I am able to see the message below

    605005: x.x.x.x/33652 for eth1:y.y.y.y/telnet for the user authorized login «»

    In the message above, why the user name is not printed?

    your config has.

    Console telnet AAA authentication GANYMEDE + | RAY | LOCAL '?

  • Help with Cisco PIX 506th

    I need help setting up a Cisco PIX 506th Version 6.3 (5)

    I use the PDM to configure the device, because I don't know enough of CLI. I want to just the simplest of configurations.

    Here is what is happening, I set up then I hang the Interface 1 to my laptop and use DHCP to get an ip address, but I can't get out to the internet like that. Thanks PDM tools, I can ping outside the IPS very well.

    6.3 (5) PIX version
    interface ethernet0 car
    Auto interface ethernet1
    ethernet0 nameif outside security0
    nameif ethernet1 inside the security100
    activate the encrypted password of DkreNA9TaOYv27T8
    c4EBnG8v5uKhu.PA encrypted passwd
    hostname EWMS-PIX-630
    domain ciscopix.com
    fixup protocol dns-length maximum 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol 2000 skinny
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names of
    object-group service udp test
    port-object eq isakmp
    inside_access_in ip access list allow a whole
    access-list inside_access_in allow a tcp
    access-list inside_access_in allow icmp a whole
    Allow Access-list inside_access_in esp a whole
    inside_access_in tcp allowed access list all eq www everything
    inside_outbound_nat0_acl list of permitted access interface ip inside 10.10.10.96 255.255.255.240
    inside_outbound_nat0_acl ip access list allow any 10.10.10.192 255.255.255.224
    pager lines 24
    timestamp of the record
    recording of debug trap
    host of logging inside the 10.10.10.13
    Outside 1500 MTU
    Within 1500 MTU
    IP outdoor 75.146.94.109 255.255.255.248
    IP address inside 10.10.10.250 255.255.255.0
    alarm action IP verification of information
    alarm action attack IP audit
    location of PDM 10.10.10.1 255.255.255.255 inside
    location of PDM 10.10.10.13 255.255.255.255 inside
    location of PDM 10.10.10.253 255.255.255.255 inside
    location of PDM 75.146.94.105 255.255.255.255 inside
    location of PDM 75.146.94.106 255.255.255.255 inside
    location of PDM 10.10.10.96 255.255.255.240 outside
    location of PDM 10.10.10.192 255.255.255.224 outside
    PDM logging 100 information
    history of PDM activate
    ARP timeout 14400
    NAT (inside) 0-list of access inside_outbound_nat0_acl
    NAT (inside) 0 0.0.0.0 0.0.0.0 0 0
    inside_access_in access to the interface inside group
    Route outside 0.0.0.0 0.0.0.0 75.146.94.110 1
    Timeout xlate 0:05:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
    H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
    Sip timeout - disconnect 0:02:00 prompt Protocol sip-0: 03:00
    Timeout, uauth 0:05:00 absolute
    GANYMEDE + Protocol Ganymede + AAA-server
    AAA-server GANYMEDE + 3 max-failed-attempts
    AAA-server GANYMEDE + deadtime 10
    RADIUS Protocol RADIUS AAA server
    AAA-server RADIUS 3 max-failed-attempts
    AAA-RADIUS deadtime 10 Server
    AAA-RADIUS (inside) host 10.10.10.1 server timeout 10
    AAA-server local LOCAL Protocol
    Enable http server
    http 10.10.10.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    SNMP-Server Community public
    No trap to activate snmp Server
    enable floodguard
    Permitted connection ipsec sysopt
    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
    ISAKMP allows outside
    ISAKMP peer ip 206.196.18.227 No.-xauth No.-config-mode
    ISAKMP nat-traversal 20
    ISAKMP policy 20 authentication rsa - sig
    encryption of ISAKMP policy 20
    ISAKMP policy 20 md5 hash
    20 1 ISAKMP policy group
    ISAKMP duration strategy of life 20 86400
    part of pre authentication ISAKMP policy 40
    encryption of ISAKMP policy 40
    ISAKMP policy 40 md5 hash
    40 2 ISAKMP policy group
    ISAKMP duration strategy of life 40 86400
    ISAKMP policy 60 authentication rsa - sig
    encryption of ISAKMP policy 60
    ISAKMP policy 60 md5 hash
    60 2 ISAKMP policy group
    ISAKMP strategy life 60 86400
    Telnet 10.10.10.0 255.255.255.0 inside
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    dhcpd address 10.10.10.2 - 10.10.10.5 inside
    dhcpd dns 68.87.72.130
    dhcpd lease 3600
    dhcpd ping_timeout 750
    dhcpd allow inside
    btork encrypted Ww3clvi.ynWeGweE privilege 15 password username
    vpnclient Server 10.10.10.1
    vpnclient-mode client mode
    vpnclient GroupA vpngroup password *.
    vpnclient username btork password *.
    Terminal width 80
    Cryptochecksum:5ef06e69c17b6128e1778e988d1b9f5d
    : end
    [OK]

    any HEP would be appreciated.

    Brian

    Brian

    NAT is your problem, IE.

    NAT (inside) 0-list of access inside_outbound_nat0_acl
    NAT (inside) 0 0.0.0.0 0.0.0.0 0 0

    presumanly first NAT is fot your good VPN that acl looks a little funny, what exactly are you doing with that?

    The second NAT is the real problem but for outgoing internet access - the NAT statement, you said not NAT one of your addresses 10.10.10.x which is a problem as 10.x.x.x address is not routable on the Internet.

    You must change this setting IE. -

    (1) remove the second NAT statement IE. "no nat (inside) 0 0.0.0.0 0.0.0.0.

    (2) add a new statement of NAT - ' nat (inside) 1 0.0.0.0 0.0.0.0.

    (3) add a corresponding statement global - global (outside) 1 interface.

    This will be PAT all your 10.10.10.x to external IP addresses.

    Apologies, but these are some CLI commands that I don't use PDM.

    Jon

  • PIX 515E and Telnet to port 25

    When I telnet (in or out) on a mail server (using port 25) the answer is:

    220-*******************

    and all orders come back as "invalid command."

    When I put the old (no - pix) firewall, this does not happen (the responses are complete and commands work fine.)

    A lot of email is coming and going, but some mail servers cannot send email.

    This is common for misconfiguration and where should I look?

    Thank you

    Mark

    Delete the fixup protocol smtp 25!

    command to run:

    No fixup not protocol smtp

    Details about this:

    The order fixup protocol smtp active the function of guard of mail, which allows only mail servers receive the RFC 821, section 4.5.1 of the orders of HELO, MAIL, RCPT, DATA, RSET, NOOP, and QUIT. All other commands are translated into x which are refused by the internal server. The result is a message such as "500 unknown command: 'XXX'.» Incomplete orders are ignored.

    Note during a SMTP session interactive, different SMTP security rules may reject or hang with your Telnet session. These rules include the following: SMTP commands must be at least four characters; must end with the return cart and jump; of line and must wait for a response before issuing the next reply.

    From PIX Firewall software Version 5.1 and higher, the fixup protocol smtp command changes the characters of the SMTP banner asterisks except for the "2", "0", "0" characters. Return (CR) and linefeed (LF) characters are ignored.

    PIX Firewall software Version 4.4, all the characters in the SMTP banner are converted to asterisks.

    Reference:

    http://www.Cisco.com/en/us/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1067379

    sincerely

    Patrick

  • Connectivity random Cisco Pix 501

    Hello. I'm having some trouble with my CISCO PIX 501 Setup.

    A few months I started having random disconnects on my network (from inside to outside). The machines can ping the DC or the Pix, but impossible to surf the internet. The only way to make them go outside is a reboot of Pix.

    My configuration is:

    -----------

    See the ACE - pix config (config) #.
    : Saved
    : Written by enable_15 at 09:23:07.033 UTC Tuesday, June 3, 2014
    6.3 (3) version PIX
    interface ethernet0 car
    interface ethernet1 100full
    ethernet0 nameif outside security0
    nameif ethernet1 inside the security100
    activate 8Ry34retyt7RR564 encrypted password
    2fvbbfgdI.2KUOU encrypted passwd
    hostname as pix
    domain as.local
    fixup protocol dns-length maximum 512
    fixup protocol esp-ike
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol pptp 1723
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol 2000 skinny
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names of
    access-list acl_out permit icmp any one
    ip access list acl_out permit a whole
    access-list acl_out permit tcp any one
    Allow Access-list outside_access_in esp a whole
    outside_access_in list access permit udp any eq isakmp everything
    outside_access_in list of access permit udp any eq 1701 all
    outside_access_in list of access permit udp any eq 4500 all
    outside_access_in ip access list allow a whole
    pager lines 24
    Outside 1500 MTU
    Within 1500 MTU
    outside 10.10.10.2 IP address 255.255.255.0
    IP address inside 192.168.100.1 255.255.255.0
    alarm action IP verification of information
    alarm action attack IP audit
    history of PDM activate
    ARP timeout 14400
    Global 1 10.10.10.8 - 10.10.10.254 (outside)
    NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
    Access-group outside_access_in in interface outside
    access to the interface inside group acl_out
    Route outside 0.0.0.0 0.0.0.0 10.10.10.1 0
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
    H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
    Timeout, uauth 0:05:00 absolute
    GANYMEDE + Protocol Ganymede + AAA-server
    RADIUS Protocol RADIUS AAA server
    AAA-server local LOCAL Protocol
    Enable http server
    http 192.168.10.2 255.255.255.255 inside
    http 192.168.10.101 255.255.255.255 inside
    http 192.168.100.2 255.255.255.255 inside
    No snmp server location
    No snmp Server contact
    SNMP-Server Community public
    No trap to activate snmp Server
    enable floodguard
    Permitted connection ipsec sysopt
    ISAKMP nat-traversal 20
    Telnet timeout 5
    SSH 192.168.10.101 255.255.255.255 inside
    SSH timeout 60
    Console timeout 0
    dhcpd dns 8.8.8.8 8.8.4.4
    dhcpd lease 3600
    dhcpd ping_timeout 750
    dhcpd outside auto_config
    Terminal width 80
    Cryptochecksum:7f9bda5e534eaeb1328ab08a3c4d28a
    ------------

    Do you have any advice? I don't get what's wrong with my setup.

    My DC is 192.168.100.2 and the network mask is 255.255.255.0

    The network configuration is configured to set the IP of the gateway to 192.168.100.1 (i.e. the PIX 501).

    I have about 50 + peers on the internal network.

    Any help is apprecciate.

    Hello

    You have a license for 50 users +?

    After the release of - Show version

    RES

    Paul

  • Access PIX using SSH when connected remotely with VPN client

    Hello

    I think that this should be a fairly simple for someone to sort for me - I'm new to PIX configuration If Yes please excuse my stupidity!

    I changed the config on our PIX to allow only access via SSH (rather than via telnet as it was previously configured)

    Now, everything works fine when I'm in the office - I can connect to the PIX using SSH without any problem.

    However, if I work from home and connect to the office using my VPN client (IPSEC tunnel ends on the PIX firewall itself) I find that I can not connect to the PIX.

    I have configured the PIX to access ssh on the office LAN subnet and the client pool of IP addresses used for VPN connections by using the following commands:

    SSH 172.64.10.0 255.255.255.0 inside

    SSH 192.28.161.0 255.255.255.0 inside

    where the 1st line is reference to the office's LAN, which works very well, and the 2nd line denotes the IP address pool configured on the PIX for VPN access.

    Can someone tell me how to fix this? I have the feeling that its something pressing!

    Thank you

    Neil

    Try the command "management-access to the Interior.

  • PIX firewall software

    Hi guys,.

    I am looking to download IOS ver 4,0000 for PIX 515E, but can't seem to find anywhere in the downloads/security section. The only version they have is 8.0.4.

    Anyone know where I could find all earlier versions?

    Thank you very much

    Elena

    Elena, when you go to download box, choose any version 8.0, then window right side you will see a text saying previous software release click on this hyperlink and it will take you to all versions including 7.x

    http://tools.cisco.com/support/downloads/go/ImageList.x?relVer=8.0.4&mdfid=277072390&sftType=PIX+Firewall+Software&optPlat=&nodecount=2&edesignator=ED&modelName=Cisco+PIX+515E+Security+Appliance&treeMdfId=268438162&treeName=Security&modifmdfid=&imname=&hybrid=Y&imst=N&lr=Y

    but here's the direct link

    http://www.Cisco.com/cgi-bin/tablebuild.pl/PIX

    Concerning

  • How to access the CLI Mode in cisco sf 302 - 08 p 8-port 10/100 Managed switch

    Hello

    Can someone help me on how to access the CLI mode in cisco sf 302 - 08 p 8-port 10/100 Managed switch. I treid the each method they mentioned in the administration guide. I am not able to enter the command debug mode and comand menu after resetting the default password. Once connected, sound directly to guide me to switch main menu.

    Hello FAL, Mark,.

    Thank you for your participation in the community of support to small businesses. My name is Nico Muselle of Cisco Sofia HWC.

    To access the CLI, you must make sure that the version of the firmware on your switch is at least 1.1.0.73 or preferably higher. Then activate telnet or ssh on the switch and opening of these sessions or a console session you will see that you are in CLI mode. You can return to the console to function menu using the menucommand.

    I hope that answers your questions!

    Best regards

    Best regards

    Nico glacier

    Senior Network Engineer - CCNA - CCNA security

  • Allowing L2TP to pass through PIX Firewall

    Hi all

    Can someone help me on how to allow inbound l2tp connection on a pix? Behind the pix firewall, there is an ISA server as a vpn l2tp server. I can't allow l2tp on the pix.

    Thank you very much!

    Please use this doc as a guide-

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml

    Jon

Maybe you are looking for

  • Open the e-mail message does not open a tab, it opens a window

    To open an e-mail from the view pane (which has all options), it seems to open a new window rather than a tab. When I opened junk or trash it opens a tab with, answer, deleat, forwards, etc... Options.

  • HP pavilion g6 2304 tx: hp pavilion g6 administrator password bios reset

    I have hp laptop pavilion g6 model no 2304tx. whenever I try to enter the bios by pressing f10 it ask administrator password.  After some try it gives system code 63994447. kindly help me please... Thank you

  • Process of fitness

    Hi all! I currently have a version in early 2013 of the MacBook Pro 15 inch retina. I have the latest version of Mac OS X and recently found myself interesting in my entirely wiping system. Recently, I realized that my HD is striking close to capacit

  • How reocver Bitlocker encrypted Partition

    I typed by mistake in the Command Diskpart and I lost all my partitions. I think I lost the MBR table / parition. Now the drive is indicated not allocated. I tried to rebuild the partition table, all NTFS partitions are detected, but Bitlocker encryp

  • PC does not recognize the ipod when I plug in the USB cord.

    I have an ipod touch, and it will replace my old ipod.  When I plug the USB cord, nothing is recognized by the computer.  It is also not recognize my old ipod when I plug it now.  I have other devices that use a USB cord, and they work as they should