Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1846 lines
97 KiB

  1. /*++
  2. Copyright (c) 1996 Microsoft Corporation
  3. Module Name:
  4. ipmon.rc
  5. Abstract:
  6. IP Router Console Monitor Resources
  7. Author:
  8. Stefan Solomon 01/04/1996
  9. Revision History:
  10. --*/
  11. #include "strdefs.h"
  12. STRINGTABLE
  13. {
  14. MSG_NULL, ""
  15. HLP_RAS_HELP1, "Displays help.\n"
  16. HLP_RAS_HELP1_EX, "\
  17. \nUsage: %1!s!\n\
  18. \nRemarks: Displays help.\n\n"
  19. HLP_RAS_DUMP, "Dumps Remote Access configuration info in script form.\n"
  20. HLP_RAS_DUMP_EX "\
  21. \n%1!s! \
  22. \n \
  23. \n Dumps Remote Access configuration information in script form. \
  24. \n\n"
  25. HLP_SHOW_SERVERS, "Listens for Remote Access server advertisements.\n"
  26. HLP_SHOW_SERVERS_EX "\
  27. \n%1!s! \
  28. \n \
  29. \n Listens for Remote Access server advertisements. \
  30. \n\n"
  31. HLP_SHOW_CLIENT, "Shows Remote Access clients connected to this machine.\n"
  32. HLP_SHOW_CLIENT_EX, "\
  33. \n%1!s! \
  34. \n \
  35. \n Displays the Remote Access clients connected to this \
  36. \n machine. \
  37. \n\n"
  38. HLP_GROUP_ADD, "Adds items to a table.\n"
  39. HLP_GROUP_DEL, "Removes items from a table.\n"
  40. HLP_GROUP_SET, "Sets configuration information.\n"
  41. HLP_GROUP_SHOW, "Displays information.\n"
  42. HLP_GROUP_ENABLE, "Enables options.\n"
  43. HLP_GROUP_DISABLE, "Disables options.\n"
  44. HLP_RASFLAG_SHOW, "Displays the state of a Remote Access server flag.\n"
  45. HLP_RASFLAG_SET, "Sets or clears a Remote Access server flag.\n"
  46. HLP_RASUSER_SHOW, "Displays Remote Access properties for a user(s).\n"
  47. HLP_RASUSER_SET, "Sets the Remote Access properties of a user.\n"
  48. HLP_DOMAIN_REGISTER,"Registers the given Windows computer as a Remote Access server \
  49. \n in the Active Directory of the given domain.\n"
  50. HLP_DOMAIN_UNREGISTER,"Un-registers the given Windows computer as a \
  51. \n Remote Access server in the Active Directory of \
  52. \n the given domain. \n"
  53. HLP_DOMAIN_SHOWREG,"Displays whether a computer is registered as a \
  54. \n Remote Access server in the Active Directory of \
  55. \n the given domain. \n"
  56. HLP_RASFLAG_SHOW_EX, "\
  57. \n %1!s! [ [flag = ] flag ] \
  58. \n \
  59. \n Displays the state of the Remote Access server flag. If no flag is \
  60. \n given, the state of all flags will be displayed. \
  61. \n \
  62. \n flag - The server flag to show which can be one of the following: \
  63. \n \
  64. \n UseCallbackDelay: Delay before calling back a client. \
  65. \n UseSwCompression: Enable software compression. \
  66. \n NegotiateSPAP: Allow SPAP authentication. \
  67. \n RequireEncryption: Require clients to employ data encryption. \
  68. \n NegotiateMSCHAP: Allow MSCHAP authentication. \
  69. \n UseLcpExtensions: Use LCP extensions. \
  70. \n NegotiateMultilink: Allow multilinked calls. \
  71. \n AuthenticatePeer: Enable mutual auth. for router interfaces. \
  72. \n RequireStrongEncryption: Require clients to employ strong encryption. \
  73. \n NegotiateBacp: Allow BACP negotiation. \
  74. \n NegotiateEAP: Allow EAP authentication. \
  75. \n NegotiatePAP: Allow PAP authentication. \
  76. \n NegotiateMD5CHAP: Allow MD5CHAP authentication. \
  77. \n RequireIPSEC: Require IPSEC when L2TP call is requested. \
  78. \n DisableEncryption: Do not negotiate data encryption. \
  79. \n Require56BitEncryption: Require clients to employ 56 bit encryption. \
  80. \n UseLmPassword: Use LM password. \
  81. \n NegotiateStrongMSCHAP: Allow MSCHAP version 2 authentication. \
  82. \n NoCallback: Never callback \
  83. \n\n"
  84. HLP_RASFLAG_SET_EX, "\
  85. \n %1!s! [flag = ] flag [ [state = ] ENABLED|DISABLED ] \
  86. \n \
  87. \n Enables the Remote Access server flag. \
  88. \n \
  89. \n For a list of available flags, see the help for 'show rasflag' \
  90. \n command. \
  91. \n \
  92. \n If no state is provided, ENABLED is assumed. \
  93. \n"
  94. HLP_RASFLAG_AUTHMODE_SET, "Sets the authentication mode.\n"
  95. HLP_RASFLAG_AUTHMODE_SET_EX, "\
  96. \n%1!s! [mode = ] STANDARD|NODCC|BYPASS \
  97. \n \
  98. \n Sets the mode that determines whether and when dialin clients should\
  99. \n be authenticated. \
  100. \n \
  101. \n mode - The mode \
  102. \n STANDARD - All devices need to be authenticated. \
  103. \n NODCC - Direct-connect devices are not authenticated. \
  104. \n BYPASS - Authentication is not required for any device. \
  105. \n"
  106. HLP_RASFLAG_AUTHMODE_SHOW, "Shows the authentication mode.\n"
  107. HLP_RASFLAG_AUTHMODE_SHOW_EX, "\
  108. \n%1!s! \
  109. \n \
  110. \n Shows the authentication mode. \
  111. \n"
  112. HLP_RASFLAG_AUTHTYPE_ADD, "Adds types of authentication the Remote Access server will negotiate.\n"
  113. HLP_RASFLAG_AUTHTYPE_ADD_EX, "\
  114. \n%1!s! [type = ] PAP|SPAP|MD5CHAP|MSCHAP|MSCHAPv2|EAP \
  115. \n \
  116. \nSelects the types of authentication which this Remote Access server \
  117. \nwill attempt to negotiate. Negotiation will be in the order \
  118. \nmost-secure to least-secure. Once both client and server agree upon an\
  119. \nauthentication type, the PPP negotiation will follow the appropriate \
  120. \nRFCs. \
  121. \n \
  122. \n type - the type \
  123. \n PAP - Password Authentication Protocol (clear text). \
  124. \n SPAP - Shiva Password Authentication Protocol. \
  125. \n MD5CHAP - Challenge Handshake Authentication Protocol using \
  126. \n Message Digest 5 hashing scheme to encrypt the response.\
  127. \n MSCHAP - Microsoft Challenge-Handshake Authentication Protocol. \
  128. \n MSCHAPv2 - Version 2 of MSCHAP. \
  129. \n EAP - Extensible Authentication Protocol. \
  130. \n"
  131. HLP_RASFLAG_AUTHTYPE_DEL, "Deletes an authentication type from the Remote Access server.\n"
  132. HLP_RASFLAG_AUTHTYPE_DEL_EX, "\
  133. \n%1!s! [type = ] PAP|SPAP|MD5CHAP|MSCHAP|MSCHAPv2|EAP \
  134. \n \
  135. \n Deletes an authentication type from the list of types that the \
  136. \n Remote Access server will negotiate. \
  137. \n \
  138. \n type - the type \
  139. \n PAP - Password Authentication Protocol (clear text). \
  140. \n SPAP - Shiva Password Authentication Protocol. \
  141. \n MD5CHAP - Challenge Handshake Authentication Protocol using \
  142. \n Message Digest 5 hashing scheme to encrypt the response.\
  143. \n MSCHAP - Microsoft Challenge-Handshake Authentication Protocol. \
  144. \n MSCHAPv2 - Version 2 of MSCHAP. \
  145. \n EAP - Extensible Authentication Protocol. \
  146. \n"
  147. HLP_RASFLAG_AUTHTYPE_SHOW, "Displays the authentication types currently enabled.\n"
  148. HLP_RASFLAG_AUTHTYPE_SHOW_EX, "\
  149. \n%1!s! \
  150. \n \
  151. \n Displays the authentication type(s) currently enabled. \
  152. \n \
  153. \n"
  154. HLP_RASFLAG_LINK_ADD, "Adds to the list of link properties PPP will negotiate\n"
  155. HLP_RASFLAG_LINK_DEL, "Deletes from the list of link properties PPP will negotiate\n"
  156. HLP_RASFLAG_LINK_SHOW, "Shows the link properties PPP will negotiate\n"
  157. HLP_RASFLAG_MLINK_ADD, "Adds to the list of multilink types PPP will negotiate\n"
  158. HLP_RASFLAG_MLINK_DEL, "Deletes from the list of multilink types PPP will negotiate\n"
  159. HLP_RASFLAG_MLINK_SHOW, "Shows the multilink types PPP will negotiate\n"
  160. HLP_RASFLAG_LINK_ADD_EX, "\
  161. \n%1!s! [type = ] SWC|LCP \
  162. \n \
  163. \n Adds to the list of link properties PPP will negotiate. \
  164. \n \
  165. \n type - the type \
  166. \n SWC - Provides software compression (MPPC) \
  167. \n LCP - Provides Link Control Protocol extensions from the PPP suite\
  168. \n of protocols. \
  169. \n"
  170. HLP_RASFLAG_LINK_DEL_EX, "\
  171. \n%1!s! [type = ] SWC|LCP \
  172. \n \
  173. \n Deletes from the list of link properties PPP will negotiate. \
  174. \n \
  175. \n type - the type \
  176. \n SWC - Provides software compression (MPPC) \
  177. \n LCP - Provides Link Control Protocol extensions from the PPP suite\
  178. \n of protocols. \
  179. \n"
  180. HLP_RASFLAG_LINK_SHOW_EX, "\
  181. \n%1!s! \
  182. \n \
  183. \n Shows the link properties PPP will negotiate. \
  184. \n \
  185. \n"
  186. HLP_RASFLAG_MLINK_ADD_EX, "\
  187. \n%1!s! [type = ] MULTI|BACP \
  188. \n \
  189. \n Adds to the list of multilink types PPP will negotiate. \
  190. \n \
  191. \n type - the type \
  192. \n MULTI - Provides mutlilink PPP sessions. \
  193. \n BACP - Provides Bandwidth Allocation Control Protocol. \
  194. \n"
  195. HLP_RASFLAG_MLINK_DEL_EX, "\
  196. \n%1!s! [type = ] MULTI|BACP \
  197. \n \
  198. \n Deletes from the list of multilink types PPP will negotiate. \
  199. \n \
  200. \n type - the type \
  201. \n MULTI - Provides mutlilink PPP sessions. \
  202. \n BACP - Provides Bandwidth Allocation Control Protocol. \
  203. \n"
  204. HLP_RASFLAG_MLINK_SHOW_EX, "\
  205. \n%1!s! \
  206. \n \
  207. \n Shows the multilink types PPP will negotiate. \
  208. \n \
  209. \n"
  210. HLP_RASUSER_SHOW_EX, "\
  211. \n%1!s! [ [name = ] username \
  212. \n [mode = ] PERMIT|REPORT ] \
  213. \n \
  214. \n Displays user Remote Access properties. \
  215. \n \
  216. \n username - the user's logon name. If none is supplied, \
  217. \n all users will be displayed. \
  218. \n \
  219. \n mode - the mode for showing information. If no mode is \
  220. \n specified, REPORT is assumed. \
  221. \n REPORT - show all users. \
  222. \n PERMIT - show only users whose dial in permission is PERMIT \
  223. \n\n"
  224. HLP_RASUSER_SET_EX, "\
  225. \n%1!s! [name = ] username \
  226. \n [dialin = ] PERMIT|DENY|POLICY \
  227. \n [ [cbpolicy = ] NONE|CALLER|ADMIN \
  228. \n [cbnumber = ] callback number ] \
  229. \n \
  230. \n Sets user Remote Access properties. \
  231. \n \
  232. \n username - the user's logon name. \
  233. \n \
  234. \n dialin - whether the user will be allowed to dial in \
  235. \n PERMIT - allow the user to dial in. \
  236. \n DENY - do not allow the user to dial in. \
  237. \n POLICY - use remote access policies to determine dialin. \
  238. \n \
  239. \n cbpolicy - the callback policy of the user. The callback \
  240. \n feature is used to save the caller the cost of \
  241. \n the phone call. \
  242. \n NONE - callback is not allowed for the user \
  243. \n CALLER - user can specify callback number at call time \
  244. \n ADMIN - always call the user at the callback number \
  245. \n \
  246. \n cbnumber - the number to use when cbpolicy is ADMIN \
  247. \n \
  248. \n \
  249. \n NOTE: The 'POLICY' option is not available for users that belong \
  250. \n to a mixed-mode domain. For these users, 'POLICY' is \
  251. \n assumed to mean 'DENY'. \
  252. \n"
  253. HLP_DOMAIN_REGISTER_EX, "\
  254. \n%1!s! [ [domain = ] domain [server = ] server ] \
  255. \n \
  256. \n Registers the given Windows computer as a Remote Access server \
  257. \n in the Active Directory of the given domain. \
  258. \n \
  259. \n server - the computer name of the computer to be registered as \
  260. \n a Remote Access server. If no server is specified the \
  261. \n computer from which the command is issued is assumed. \
  262. \n \
  263. \n domain - the domain in which the given server should be \
  264. \n registered. If no domain is provided, the primary \
  265. \n domain of the computer from which the command is \
  266. \n issued is assumed. \
  267. \n\n"
  268. HLP_DOMAIN_UNREGISTER_EX, "\
  269. \n%1!s! [ [domain = ] domain [server = ] server ] \
  270. \n \
  271. \n Un-registers the given Windows computer as a Remote Access \
  272. \n server in the Active Directory of the given domain. \
  273. \n \
  274. \n server - the computer name of the computer to be unregistered as\
  275. \n a Remote Access server. If no server is specified the \
  276. \n computer from which the command is issued is assumed. \
  277. \n \
  278. \n domain - the domain in which the given server should be \
  279. \n unregistered. If no domain is provided, the primary \
  280. \n domain of the computer from which the command is \
  281. \n issued is assumed. \
  282. \n\n"
  283. HLP_DOMAIN_SHOWREG_EX, "\
  284. \n%1!s! [ [domain = ] domain [server = ] server ] \
  285. \n \
  286. \n Displays whether the given computer is registered as a Remote \
  287. \n Access server in the given domain. \
  288. \n \
  289. \n server - the computer name of the computer in question. \
  290. \n If no server is specified the computer from which the \
  291. \n command is issued is assumed. \
  292. \n \
  293. \n domain - the domain. If no domain is provided, the primary \
  294. \n domain of the computer from which the command is \
  295. \n issued is assumed. \
  296. \n\n"
  297. MSG_RAS_SCRIPTHEADER, "\
  298. \n \
  299. \n# ----------------------------------------- \
  300. \n# Remote Access Configuration \
  301. \n# ----------------------------------------- \
  302. \n"
  303. MSG_RAS_SCRIPTFOOTER, "\
  304. \n# End of Remote Access configuration. \
  305. \n \
  306. \n \
  307. \n"
  308. MSG_RAS_SHOW_SERVERS_HEADER, "\
  309. \nTimestamp Sender \
  310. \n------------------------ ----------------------------------\
  311. \n"
  312. MSG_RASFLAG_DUMP, "%1!s! %2!s! %3!s!\n"
  313. MSG_RASFLAG_DUMP2, "%1!s! %2!s!\n"
  314. MSG_RASFLAG_AUTHMODE_STANDARD, "authentication mode = standard\n"
  315. MSG_RASFLAG_AUTHMODE_NODCC, "authentication mode = nodcc\n"
  316. MSG_RASFLAG_AUTHMODE_BYPASS, "authentication mode = bypass\n"
  317. MSG_RASFLAG_AUTHTYPE_HEADER, "\
  318. \nEnabled Authentication Types: \
  319. \n \
  320. \nCode Meaning \
  321. \n------------------------------------------\
  322. \n"
  323. MSG_RASFLAG_AUTHTYPE_PAP, "\
  324. PAP Password Authentication Protocol.\n"
  325. MSG_RASFLAG_AUTHTYPE_SPAP, "\
  326. SPAP Shiva Password Authentication Protocol.\n"
  327. MSG_RASFLAG_AUTHTYPE_MD5CHAP, "\
  328. MD5CHAP Challenge Handshake Authentication Protocol (MD5).\n"
  329. MSG_RASFLAG_AUTHTYPE_MSCHAP, "\
  330. MSCHAP Microsoft Challenge-Handshake Authentication Protocol.\n"
  331. MSG_RASFLAG_AUTHTYPE_MSCHAP2, "\
  332. MSCHAPv2 Microsoft Challenge-Handshake Authentication Protocol version 2.\n"
  333. MSG_RASFLAG_AUTHTYPE_EAP, "\
  334. EAP Extensible Authentication Protocol.\n"
  335. MSG_RASFLAG_LINK_HEADER, "\
  336. \nEnabled Link Options: \
  337. \n \
  338. \nCode Meaning \
  339. \n------------------------------------------\
  340. \n"
  341. MSG_RASFLAG_LINK_SWC, "\
  342. SWC Provides software compression (MPPC).\n"
  343. MSG_RASFLAG_LINK_LCP, "\
  344. LCP Provides Link Control Protocol extensions from the PPP suite\
  345. \n of protocols.\n"
  346. MSG_RASFLAG_MLINK_HEADER, "\
  347. \nEnabled Multilink Options: \
  348. \n \
  349. \nCode Meaning \
  350. \n------------------------------------------\
  351. \n"
  352. MSG_RASFLAG_MLINK_MULTI, "\
  353. MULTI Provides mutlilink PPP sessions.\n"
  354. MSG_RASFLAG_MLINK_BACP, "\
  355. BACP Provides Bandwidth Allocation Control Protocol.\n"
  356. MSG_RASUSER_RASINFO, "\
  357. \nUser name: %1!s! \
  358. \nDialin: %2!s! \
  359. \nCallback policy: %3!s! \
  360. \nCallback number: %4!s! \
  361. \n"
  362. MSG_RASUSER_SET_CMD, "%1!s! %2!s! %3!s! %4!s! %5!s!\n"
  363. MSG_DOMAIN_REGISTER_SUCCESS, "\
  364. \nRegistration completed successfully: \
  365. \n Remote Access Server: %1!s! \
  366. \n Domain: %2!s! \
  367. \n \
  368. \n"
  369. MSG_DOMAIN_REGISTER_FAIL, "\
  370. \nRegistration FAILED: \
  371. \n Remote Access Server: %1!s! \
  372. \n Domain: %2!s! \
  373. \n \
  374. \n"
  375. MSG_DOMAIN_UNREGISTER_SUCCESS, "\
  376. \nUn-registration completed successfully: \
  377. \n Remote Access Server: %1!s! \
  378. \n Domain: %2!s! \
  379. \n \
  380. \n Since user accounts are cached by the 'IAS' and \
  381. \n 'Routing and Remote Access' services, this \
  382. \n un-registration will not take effect until these \
  383. \n services are restarted. \
  384. \n \
  385. \n"
  386. MSG_DOMAIN_UNREGISTER_FAIL, "\
  387. \nUn-registration FAILED: \
  388. \n Remote Access Server: %1!s! \
  389. \n Domain: %2!s! \
  390. \n \
  391. \n"
  392. MSG_DOMAIN_SHOW_REGISTERED, "\
  393. \nThe following Remote Access server is registered:\
  394. \n Remote Access Server: %1!s! \
  395. \n Domain: %2!s! \
  396. \n \
  397. \n"
  398. MSG_DOMAIN_SHOW_UNREGISTERED, "\
  399. \nThe following Remote Access server is not registered:\
  400. \n Remote Access Server: %1!s! \
  401. \n Domain: %2!s! \
  402. \n \
  403. \n"
  404. MSG_DOMAIN_SHOW_REGISTER_FAIL, "\
  405. \nUnable to determine the registration: \
  406. \n Remote Access Server: %1!s! \
  407. \n Domain: %2!s! \
  408. \n \
  409. \n"
  410. MSG_CLIENT_SHOW, "\
  411. \nUser: %1!s! \
  412. \nDomain: %2!s! \
  413. \nConnected from: %3!s! \
  414. \nDuration: %4!d! days %5!d! hours %6!d! mins %7!d! secs \
  415. \n"
  416. EMSG_UNABLE_TO_ENUM_CLIENTS, "\
  417. Unable to enumerate the Remote Access clients.\n\n"
  418. EMSG_CANT_FIND_EOPT, "\
  419. One or more essential parameters not specified\n"
  420. EMSG_BAD_OPTION_VALUE, "\
  421. %1!s! is not an acceptable value for %2!s!.\n"
  422. EMSG_UNABLE_TO_ENUM_USERS, "\
  423. Unable to enumerate the users:\n\n"
  424. EMSG_RASUSER_MUST_PROVIDE_CB_NUMBER, "\
  425. \nIn order to set administrative callback mode, either you must specify \
  426. \na callback number or the user must already have a callback number set.\
  427. \n\n"
  428. //
  429. // The following are specific to the 'ras ip' sub context
  430. //
  431. HLP_RASIP_HELP1, "Displays help.\n"
  432. HLP_RASIP_HELP1_EX, "\
  433. \nUsage: %1!s!\n\
  434. \n Displays help.\n\n"
  435. HLP_RASIP_DUMP, "Dumps Remote Access IP configuration info in script form.\n"
  436. HLP_RASIP_SHOW_CONFIG, "Displays current Remote Access IP configuration.\n"
  437. HLP_RASIP_SET_ASSIGNMENT, "Sets the method by which the Remote Access server\
  438. \n assigns IP addresses to its clients.\n"
  439. HLP_RASIP_SET_CALLERSPEC, "Sets whether clients can request their own IP addresses.\n"
  440. HLP_RASIP_SET_ACCESS, "Sets whether clients are given access beyond the remote\
  441. \n access server.\n"
  442. HLP_RASIP_SET_NEGOTIATION, "Sets whether IP is negotiated for client Remote Access connections.\n"
  443. HLP_RASIP_SET_NETBTBCAST, "Sets whether to enable or disable broadcast\
  444. \n name resolution using NetBIOS over TCP/IP.\n"
  445. HLP_RASIP_ADD_RANGE, "Adds a range to the static IP address pool.\n"
  446. HLP_RASIP_DEL_RANGE, "Deletes a range from the static IP address pool.\n"
  447. HLP_RASIP_DEL_POOL, "Deletes all ranges from the static IP address pool.\n"
  448. HLP_RASIP_DUMP_EX "\
  449. \n%1!s! \
  450. \n \
  451. \n Dumps Remote Access configuration information in script form. \
  452. \n\n"
  453. HLP_RASIP_SHOW_CONFIG_EX, "\
  454. \n%1!s! \
  455. \n \
  456. \n Displays current Remote Access IP configuration. \
  457. \n\n"
  458. HLP_RASIP_SET_NEGOTIATION_EX, "\
  459. \n%1!s! [mode = ] ALLOW|DENY \
  460. \n \
  461. \n Specifies whether the Remote Access server will allow IP to be \
  462. \n configured for any client connections it accepts. \
  463. \n \
  464. \n mode - the mode \
  465. \n ALLOW - permit IP over client connections. \
  466. \n DENY - do not permit IP over client connections. \
  467. \n\n"
  468. HLP_RASIP_SET_ACCESS_EX, "\
  469. \nUsage: %1!s! [mode = ] ALL|SERVERONLY \
  470. \n \
  471. \nParameters: \
  472. \n \
  473. \n mode - what type of access to grant \
  474. \n ALL - clients are able to reach the remote access server \
  475. \n and any networks to which it is connected. \
  476. \n SERVERONLY - clients are able to reach the remote access server \
  477. \n only. \
  478. \n \
  479. \nRemarks: Specifies whether IP network traffic from any client is \
  480. \n forwarded to the network(s) to which the remote access server \
  481. \n is connected. \
  482. \n\n"
  483. HLP_RASIP_SET_ASSIGNMENT_EX, "\
  484. \n%1!s! [method = ] AUTO|POOL \
  485. \n \
  486. \n Sets the method by which the Remote Access server assigns IP \
  487. \n addresses to its clients. \
  488. \n \
  489. \n method - the method to use \
  490. \n AUTO - automatically assigns IP addresses using DHCP. If no \
  491. \n DHCP server is available, a random, private address \
  492. \n is assigned. \
  493. \n POOL - assigns IP address from the Remote Access server's \
  494. \n pool. \
  495. \n\n"
  496. HLP_RASIP_ADD_RANGE_EX, "\
  497. \n%1!s! [from = ] from [to = ] to \
  498. \n \
  499. \n Adds a range to the static IP address pool that the Remote Access \
  500. \n server uses. \
  501. \n \
  502. \n from - the starting IP address in the range in the form 'x.x.x.x' \
  503. \n to - the ending IP address in the range in the form 'x.x.x.x' \
  504. \n\n"
  505. HLP_RASIP_DEL_RANGE_EX, "\
  506. \n%1!s! [from = ] from [to = ] to \
  507. \n \
  508. \n Deletes a range from the static IP address pool that the Remote \
  509. \n Access server uses. \
  510. \n \
  511. \n from - the starting IP address in the range in the form 'x.x.x.x' \
  512. \n to - the ending IP address in the range in the form 'x.x.x.x' \
  513. \n\n"
  514. HLP_RASIP_DEL_POOL_EX, "\
  515. \n%1!s! \
  516. \n \
  517. \n Deletes all ranges from the static IP address pool. \
  518. \n\n"
  519. HLP_RASIP_SET_CALLERSPEC_EX, "\
  520. \n%1!s! [mode = ] ALLOW|DENY \
  521. \n \
  522. \n Specifies whether dialin clients are permitted to request their own \
  523. \n IP addresses. \
  524. \n \
  525. \n mode - the mode \
  526. \n ALLOW - allow clients to request their own IP addresses. \
  527. \n DENY - don't allow clients to request their own IP addresses. \
  528. \n\n"
  529. HLP_RASIP_SET_NETBTBCAST_EX, "\
  530. \n%1!s! [mode = ] ENABLED|DISABLED \
  531. \n \
  532. \n Specifies whether to enable or disable broadcast name resolution \
  533. \n using NetBIOS over TCP/IP. \
  534. \n \
  535. \n mode - the mode \
  536. \n ENABLED - enables broadcast name resolution using NetBIOS over \
  537. \n TCP/IP. \
  538. \n DISABLED - disables broadcast name resolution using NetBIOS over \
  539. \n TCP/IP. \
  540. \n\n"
  541. MSG_RASIP_SERVERCONFIG, "\
  542. \nRAS IP config \
  543. \n \
  544. \n Negotiation mode: %2!s! \
  545. \n Access mode: %3!s! \
  546. \n Address request mode: %5!s! \
  547. \n Broadcast name resolution: %6!s! \
  548. \n Assignment method: %4!s! \
  549. \n Pool: \
  550. \n"
  551. MSG_RASIP_SHOW_POOL " %1!11s! to %2!11s!\n"
  552. MSG_RASIP_SET_CMD, "%1!s! %2!s!\n"
  553. MSG_RASIP_ADD_RANGE_CMD, "%1!s! %2!s! %3!s!\n"
  554. MSG_RASIP_SCRIPTHEADER, "\
  555. \n \
  556. \n# ----------------------------------------- \
  557. \n# Remote Access IP Configuration \
  558. \n# ----------------------------------------- \
  559. \n"
  560. MSG_RASIP_SCRIPTFOOTER, "\
  561. \n# End of Remote Access IP configuration. \
  562. \n \
  563. \n"
  564. EMSG_RASIP_INVALID_POOL, "\
  565. \nThe IP address range entered is invalid for the following reason: \
  566. \n \
  567. \n %1!s!\
  568. \n \
  569. \nThe following constraints apply to IP address ranges: \
  570. \n \
  571. \n 1. The addresses must be specified in standard dotted notation \
  572. \n and must lie between 1.0.0.0 and 224.0.0.0 \
  573. \n \
  574. \n 2. The addresses must not be in the form the form 127.x.x.x. \
  575. \n \
  576. \n 3. The 'from' IP address must be at least 1 address less than \
  577. \n the 'to' address. \
  578. \n \
  579. \n\n"
  580. EMSG_RASIP_BAD_ADDRESS, "An IP address entered was invalid."
  581. EMSG_RASIP_BAD_RANGE, "The range is not large enough."
  582. EMSG_RASIP_NETID_127, "An IP address entered was in the form 127.x.x.x"
  583. EMSG_RASIP_BAD_POOL_GENERIC "No reason given"
  584. EMSG_RASIP_NEED_VALID_POOL, "\
  585. \nBefore you can switch to pool assignment mode, you must specify a \
  586. \nvalid IP address pool using the '%1!s!' command. \
  587. \n\n"
  588. EMSG_RASIP_OVERLAPPING_RANGE, "\
  589. \nThe range you entered can not be assigned to the system since it overlaps\
  590. \nan existing range. \
  591. \n\n"
  592. //
  593. // The following are specific to the 'ras ipx' sub context
  594. //
  595. HLP_RASIPX_HELP1, "Displays help.\n"
  596. HLP_RASIPX_HELP1_EX, "\
  597. \nUsage: %1!s!\n\
  598. \n Displays help.\n\n"
  599. HLP_RASIPX_DUMP, "Dumps Remote Access IPX configuration info in script form.\n"
  600. HLP_RASIPX_SHOW_CONFIG, "Displays current Remote Access IPX configuration.\n"
  601. HLP_RASIPX_SET_NEGOTIATION, "Sets whether IPX is negotiated for client Remote Access connections.\n"
  602. HLP_RASIPX_SET_ACCESS, "Sets whether clients will be given access beyond the Remote Access\
  603. \nserver.\n"
  604. HLP_RASIPX_SET_ASSIGNMENT, "Sets the method by which the Remote Access server assigns IPX addresses\
  605. \nto its clients.\n"
  606. HLP_RASIPX_SET_POOL, "Sets the Remote Access IPX address pool.\n"
  607. HLP_RASIPX_SET_CALLERSPEC, "Sets whether clients can request their own IPX node numbers.\n"
  608. HLP_RASIPX_DUMP_EX "\
  609. \n%1!s! \
  610. \n \
  611. \n Dumps Remote Access IPX configuration information in script \
  612. \n form. \
  613. \n\n"
  614. HLP_RASIPX_SHOW_CONFIG_EX, "\
  615. \n%1!s! \
  616. \n \
  617. \n Displays current Remote Access IPX configuration. \
  618. \n\n"
  619. HLP_RASIPX_SET_NEGOTIATION_EX, "\
  620. \n%1!s! [mode = ] ALLOW|DENY \
  621. \n \
  622. \n Specifies whether the Remote Access server will allow IPX to be \
  623. \n configured for any client connections it accepts. \
  624. \n \
  625. \n mode - the mode \
  626. \n ALLOW - permit IPX over client connections. \
  627. \n DENY - do not permit IPX over client connections. \
  628. \n\n"
  629. HLP_RASIPX_SET_ACCESS_EX, "\
  630. \n%1!s! [mode = ] ALL|SERVERONLY \
  631. \n \
  632. \n Specifies whether IPX network traffic from any client will be \
  633. \n forwarded to the network(s) to which the Remote Access server is \
  634. \n connected. \
  635. \n \
  636. \n mode - what type of access to grant \
  637. \n ALL - clients will be able to reach the Remote Access \
  638. \n server and any networks to which it is connected. \
  639. \n SERVERONLY - clients will be able to reach the Remote Access \
  640. \n server only. \
  641. \n\n"
  642. HLP_RASIPX_SET_ASSIGNMENT_EX, "\
  643. \n%1!s! [method = ] AUTO|POOL|AUTOSAME|POOLSAME \
  644. \n \
  645. \n Sets the method by which the Remote Access server assigns IPX \
  646. \n addresses to its clients. \
  647. \n \
  648. \n method - the method to use \
  649. \n AUTO - assigns a different random IPX network number to all \
  650. \n clients. \
  651. \n POOL - assigns IPX addresses from the Remote Access server's \
  652. \n pool. \
  653. \n AUTOSAME - generates a random IPX network number as assigns it to \
  654. \n all clients. \
  655. \n POOLSAME - chooses a number from the Remote Access server's pool \
  656. \n and assigns it to all clients. \
  657. \n \
  658. \n Notes: \
  659. \n \
  660. \n For most configurations, either the AUTOSAME or POOLSAME method \
  661. \n is recommended as these conserve network numbers and reduce network\
  662. \n traffic. \
  663. \n \
  664. \n Before a network number is assigned to a client, it is verified \
  665. \n to not be in use on the Remote Access server's intranet. As a \
  666. \n result some addresses in the address pool may not be assigned. \
  667. \n\n"
  668. HLP_RASIPX_SET_POOL_EX, "\
  669. \n%1!s! [firstnet = ] address [size = ] size \
  670. \n \
  671. \n Sets Remote Access server's IPX address pool \
  672. \n \
  673. \n firstnet - the first IPX network number in the pool. (hexadecimal) \
  674. \n size - the total number of IPX addresses in the pool. If zero is \
  675. \n specified, then the pool will grow dynamically as needed. \
  676. \n (decimal) \
  677. \n\n"
  678. HLP_RASIPX_SET_CALLERSPEC_EX, "\
  679. \n%1!s! [mode = ] ALLOW|DENY \
  680. \n \
  681. \n Specifies whether dialin clients are permitted to request their own \
  682. \n IPX node numbers. \
  683. \n \
  684. \n mode - the mode \
  685. \n ALLOW - allow clients to request their own IPX node numbers. \
  686. \n DENY - don't allow clients to request their own IPX node numbers.\
  687. \n\n"
  688. MSG_RASIPX_SERVERCONFIG, "\
  689. \nRAS IPX config \
  690. \n \
  691. \n Negotiation mode: %2!s! \
  692. \n Access mode: %3!s! \
  693. \n Node number request mode: %5!s! \
  694. \n Assignment method: %4!s! \
  695. \n IPX address pool base: %6!s! \
  696. \n IPX address pool size: %7!s! \
  697. \n \
  698. \n\n"
  699. MSG_RASIPX_SET_CMD, "%1!s! %2!s!\n"
  700. MSG_RASIPX_SET_POOL_CMD, "%1!s! %2!s! %3!s!\n"
  701. MSG_RASIPX_SCRIPTHEADER, "\
  702. \n \
  703. \n# ----------------------------------------- \
  704. \n# Remote Access IPX Configuration \
  705. \n# ----------------------------------------- \
  706. \n"
  707. MSG_RASIPX_SCRIPTFOOTER, "\
  708. \n# End of Remote Access IPX configuration. \
  709. \n \
  710. \n \
  711. \n"
  712. EMSG_RASIPX_BAD_IPX, "\
  713. \nThe IPX network number is invalid. It must be specified as a string \
  714. \nwith at most ten characters representing a four-byte hexadecimal value.\
  715. \n \
  716. \nAlso, the values 0, 1, and 0xffffffff are not permitted. \
  717. \n \
  718. \n Examples: \
  719. \n ABCDEF \
  720. \n 0x1234 \
  721. \n 00A1C2E3 \
  722. \n \
  723. \n\n"
  724. EMSG_RASIPX_BAD_POOLSIZE, "\
  725. \nThe pool size is invalid. It can be at most 64000. If zero is \
  726. \nspecified, then the pool will dynamically grow as needed. \
  727. \n\n"
  728. //
  729. // The following are specific to the 'ras nbf' sub context
  730. //
  731. HLP_RASNBF_HELP1, "Displays help.\n"
  732. HLP_RASNBF_HELP1_EX, "\
  733. \nUsage: %1!s!\n\
  734. \n Displays help.\n\n"
  735. HLP_RASNBF_DUMP, "Dumps Remote Access NBF configuration info in script form.\n"
  736. HLP_RASNBF_SHOW_CONFIG, "Displays current Remote Access NBF configuration.\n"
  737. HLP_RASNBF_SET_NEGOTIATION, "Sets whether NBF is negotiated for client Remote Access connections.\n"
  738. HLP_RASNBF_SET_ACCESS, "Sets whether clients will be given access beyond the Remote Access server.\n"
  739. HLP_RASNBF_DUMP_EX "\
  740. \n%1!s! \
  741. \n \
  742. \n Dumps Remote Access NBF configuration information in script \
  743. \n form. \
  744. \n\n"
  745. HLP_RASNBF_SHOW_CONFIG_EX, "\
  746. \n%1!s! \
  747. \n \
  748. \n Displays current Remote Access NBF configuration. \
  749. \n\n"
  750. HLP_RASNBF_SET_NEGOTIATION_EX, "\
  751. \n%1!s! [mode = ] ALLOW|DENY \
  752. \n \
  753. \n Specifies whether the Remote Access server will allow NBF to be \
  754. \n configured for any client connections it accepts. \
  755. \n \
  756. \n mode - the mode \
  757. \n ALLOW - permit NBF over client connections. \
  758. \n DENY - do not permit NBF over client connections. \
  759. \n\n"
  760. HLP_RASNBF_SET_ACCESS_EX, "\
  761. \n%1!s! [mode = ] ALL|SERVERONLY \
  762. \n \
  763. \n Specifies whether NBF network traffic from any client will be \
  764. \n forwarded to the network(s) to which the Remote Access server is \
  765. \n connected. \
  766. \n \
  767. \n mode - what type of access to grant \
  768. \n ALL - clients will be able to reach the Remote Access \
  769. \n server and any networks to which it is connected. \
  770. \n SERVERONLY - clients will be able to reach the Remote Access \
  771. \n server only. \
  772. \n\n"
  773. MSG_RASNBF_SERVERCONFIG, "\
  774. \nRAS NBF config \
  775. \n \
  776. \n Negotiation mode: %2!s! \
  777. \n Access mode: %3!s! \
  778. \n \
  779. \n\n"
  780. MSG_RASNBF_SET_CMD, "%1!s! %2!s!\n"
  781. MSG_RASNBF_SCRIPTHEADER, "\
  782. \n \
  783. \n# ----------------------------------------- \
  784. \n# Remote Access NBF Configuration \
  785. \n# ----------------------------------------- \
  786. \n"
  787. MSG_RASNBF_SCRIPTFOOTER, "\
  788. \n# End of Remote Access NBF configuration. \
  789. \n \
  790. \n \
  791. \n"
  792. //
  793. // The following are specific to the 'ras at' sub context
  794. //
  795. HLP_RASAT_HELP1, "Displays help.\n"
  796. HLP_RASAT_HELP1_EX, "\
  797. \nUsage: %1!s!\n\
  798. \n Displays help.\n\n"
  799. HLP_RASAT_DUMP, "Dumps remote access AppleTalk configuration info in script form.\n"
  800. HLP_RASAT_SHOW_CONFIG, "Displays current remote access AppleTalk configuration.\n"
  801. HLP_RASAT_SET_NEGOTIATION, "Sets whether AppleTalk is negotiated for client remote\
  802. \n access connections.\n"
  803. HLP_RASAT_DUMP_EX "\
  804. \nUsage: %1!s! \
  805. \n \
  806. \nRemarks: Dumps remote access AppleTalk configuration information in \
  807. \n script form.\n\n"
  808. HLP_RASAT_SHOW_CONFIG_EX, "\
  809. \nUsage: %1!s! \
  810. \n \
  811. \nRemarks: Displays current remote access AppleTalk configuration. \
  812. \n\n"
  813. HLP_RASAT_SET_NEGOTIATION_EX, "\
  814. \nUsage: %1!s! [mode = ] ALLOW|DENY \
  815. \n \
  816. \nParameters: \
  817. \n \
  818. \n mode - the mode \
  819. \n ALLOW - permit AppleTalk over client connections. \
  820. \n DENY - do not permit AppleTalk over client connections. \
  821. \n \
  822. \nRemarks: Specifies whether the remote access server allows AppleTalk to be\
  823. \n configured for any client connections it accepts. \
  824. \n\n"
  825. MSG_RASAT_SERVERCONFIG, "\
  826. \nRemote Access AppleTalk config \
  827. \n \
  828. \n Negotiation mode: %2!s!\
  829. \n\n"
  830. MSG_RASAT_SET_CMD, "%1!s! %2!s!\n"
  831. MSG_RASAT_SCRIPTHEADER, "\
  832. \n \
  833. \n# ----------------------------------------- \
  834. \n# Remote Access AppleTalk Configuration \
  835. \n# ----------------------------------------- \
  836. \n"
  837. MSG_RASAT_SCRIPTFOOTER, "\
  838. \n# End of Remote Access AppleTalk Configuration. \
  839. \n\n"
  840. //
  841. // The following are specific to the 'ras aaaa' sub context
  842. //
  843. HLP_RASAAAA_ADD_AUTHSERV, "Adds a RADIUS authentication server.\n"
  844. HLP_RASAAAA_ADD_ACCTSERV, "Adds a RADIUS accounting server.\n"
  845. HLP_RASAAAA_DEL_AUTHSERV, "Deletes a RADIUS server.\n"
  846. HLP_RASAAAA_DEL_ACCTSERV, "Deletes a RADIUS accounting server.\n"
  847. HLP_RASAAAA_SET_AUTH, "Sets the authentication provider.\n"
  848. HLP_RASAAAA_SET_ACCT, "Sets the accounting provider.\n"
  849. HLP_RASAAAA_SET_AUTHSERV, "Sets properties of an authentication server.\n"
  850. HLP_RASAAAA_SET_ACCTSERV, "Sets properties of an accounting server.\n"
  851. HLP_RASAAAA_SHOW_AUTH, "Displays the current authentication provider.\n"
  852. HLP_RASAAAA_SHOW_ACCT, "Displays the current accounting provider.\n"
  853. HLP_RASAAAA_SHOW_AUTHSERV, "Displays the RADIUS server(s) used for authentication.\n"
  854. HLP_RASAAAA_SHOW_ACCTSERV, "Displays the RADIUS server(s) used for accounting.\n"
  855. HLP_RASAAAA_ADD_AUTHSERV_EX, "\
  856. \n%1!s! [ name = ] server \
  857. \n [ [secret =] secret \
  858. \n [init-score =] InitialScore \
  859. \n [port =] port \
  860. \n [timeout =] timeout \
  861. \n [signature = ] ENABLED|DISABLED ] \
  862. \n \
  863. \n Provides an IP address or name of a RADIUS server to pass authentication\
  864. \n requests. \
  865. \n \
  866. \n name The DNS name or IP address of the RADIUS server \
  867. \n secret The shared secret \
  868. \n init-score Initial score (server priority) \
  869. \n port Sets the port on which to send the authentication requests. \
  870. \n timeout The timeout period before the RADIUS server is marked \
  871. \n unavailable (seconds) \
  872. \n signature whether to use digital signatures \
  873. \n\n"
  874. HLP_RASAAAA_ADD_ACCTSERV_EX, "\
  875. \n%1!s! [ name = ] server \
  876. \n [ [secret =] secret \
  877. \n [init-score =] InitialScore \
  878. \n [port =] port \
  879. \n [timeout = ] timeout \
  880. \n [messages = ] ENABLED|DISABLED ] \
  881. \n \
  882. \n Provides an IP address or name of a RADIUS server to use for accounting.\
  883. \n \
  884. \n name The DNS name or IP address of the RADIUS server \
  885. \n secret The shared secret \
  886. \n init-score Initial score (server priority) \
  887. \n port Sets the port on which to send the authentication requests. \
  888. \n timeout The timeout period before the RADIUS server is marked \
  889. \n unavailable (seconds) \
  890. \n messages whether to send accounting on/off messages. \
  891. \n\n"
  892. HLP_RASAAAA_DEL_AUTHSERV_EX, "\
  893. \n%1!s! [name = ] server \
  894. \n \
  895. \n Deletes a RADIUS authentication server. \
  896. \n\n"
  897. HLP_RASAAAA_DEL_ACCTSERV_EX, "\
  898. \n%1!s! [ [name = ] server ] \
  899. \n \
  900. \n Deletes a RADIUS accounting server. \
  901. \n\n"
  902. HLP_RASAAAA_SET_AUTH_EX, "\
  903. \n%1!s! [provider =] WINDOWS|RADIUS \
  904. \n \
  905. \n Sets the authentication provider. \
  906. \n \
  907. \n windows Authentication via Windows security \
  908. \n radius Authentication against a RADIUS server \
  909. \n\n"
  910. HLP_RASAAAA_SET_ACCT_EX, "\
  911. \n%1!s! [provider =] WINDOWS|RADIUS|NONE \
  912. \n \
  913. \n Sets the accounting provider. \
  914. \n \
  915. \n windows Accounting via the Windows logging facility \
  916. \n radius Accounting via a RADIUS accounting server \
  917. \n none Do not perform accounting \
  918. \n\n"
  919. HLP_RASAAAA_SET_AUTHSERV_EX, "\
  920. \n%1!s! [ name = ] server \
  921. \n [ [secret =] secret \
  922. \n [init-score =] InitialScore \
  923. \n [port =] port \
  924. \n [timeout =] timeout \
  925. \n [signature = ] ENABLED|DISABLED ] \
  926. \n \
  927. \n Provides an IP address or name of a RADIUS server to pass authentication\
  928. \n requests. \
  929. \n \
  930. \n name The DNS name or IP address of the RADIUS server \
  931. \n secret The shared secret \
  932. \n init-score Initial score (server priority) \
  933. \n port Sets the port on which to send the authentication requests. \
  934. \n timeout The timeout period before the RADIUS server is marked \
  935. \n unavailable (seconds) \
  936. \n signature whether to use digital signatures \
  937. \n\n"
  938. HLP_RASAAAA_SET_ACCTSERV_EX, "\
  939. \n%1!s! [ name = ] server \
  940. \n [ [secret =] secret \
  941. \n [init-score =] InitialScore \
  942. \n [port =] port \
  943. \n [timeout = ] timeout \
  944. \n [messages = ] ENABLED|DISABLED ] \
  945. \n \
  946. \n Provides an IP address or name of a RADIUS server to use for accounting.\
  947. \n \
  948. \n name The DNS name or IP address of the RADIUS server \
  949. \n secret The shared secret \
  950. \n init-score Initial score (server priority) \
  951. \n port Sets the port on which to send the authentication requests. \
  952. \n timeout The timeout period before the RADIUS server is marked \
  953. \n unavailable (seconds) \
  954. \n messages whether to send accounting on/off messages. \
  955. \n\n"
  956. HLP_RASAAAA_SHOW_AUTH_EX, "\
  957. \n%1!s! \
  958. \n \
  959. \n Displays the authentication provider \
  960. \n\n"
  961. HLP_RASAAAA_SHOW_ACCT_EX, "\
  962. \n%1!s! \
  963. \n \
  964. \n Displays the accounting provider \
  965. \n\n"
  966. HLP_RASAAAA_SHOW_AUTHSERV_EX, "\
  967. \n%1!s! [ [name = ] server ] \
  968. \n \
  969. \n Displays detailed information about an authentication \
  970. \n server. \
  971. \n \
  972. \n name The DNS name or IP address of the RADIUS server \
  973. \n \
  974. \n If no server name is provided, all configured authentication\
  975. \n servers will be displayed. \
  976. \n\n"
  977. HLP_RASAAAA_SHOW_ACCTSERV_EX, "\
  978. \n%1!s! [ [name = ] server ] \
  979. \n \
  980. \n Displays detailed information about an accounting \
  981. \n server. \
  982. \n \
  983. \n name The DNS name or IP address of the RADIUS server \
  984. \n \
  985. \n If no server name is provided, all configured accounting \
  986. \n servers will be displayed. \
  987. \n\n"
  988. HLP_RASAAAA_HELP1, "Displays help.\n"
  989. HLP_RASAAAA_HELP1_EX, "\
  990. \nUsage: %1!s!\n\
  991. \n Displays help.\n\n"
  992. HLP_RASAAAA_DUMP, "Dumps Remote Access AAAA configuration info in script form.\n"
  993. HLP_RASAAAA_DUMP_EX "\
  994. \n%1!s! \
  995. \n \
  996. \n Dumps Remote Access AAAA configuration information in script \
  997. \n form. \
  998. \n\n"
  999. MSG_RASAAAA_SHOW_AUTH, "Remote Access authentication provider: %1!s!\n"
  1000. MSG_RASAAAA_SHOW_ACCT, "Remote Access accounting provider: %1!s!\n"
  1001. MSG_RASAAAA_SHOW_AUTHSERV_HDR, "\
  1002. \nName Address Port Score Timeout Signature\
  1003. \n-------------------------------------------------------------------------------\n"
  1004. MSG_RASAAAA_SHOW_AUTHSERV, "\
  1005. %1!-34s! %2!-14s! %3!-4d! %4!-5d! %5!-7d! %6!s!\n"
  1006. MSG_RASAAAA_SHOW_ACCTSERV_HDR, "\
  1007. \nName Address Port Score Timeout Messages\
  1008. \n-------------------------------------------------------------------------------\n"
  1009. MSG_RASAAAA_MUST_RESTART_SERVICES, "\
  1010. The RemoteAccess service must be restarted for changes to take effect.\n"
  1011. MSG_RASAAAA_SCRIPTHEADER, "\
  1012. \n \
  1013. \n# ----------------------------------------- \
  1014. \n# Remote Access AAAA Configuration \
  1015. \n# ----------------------------------------- \
  1016. \n"
  1017. MSG_RASAAAA_SCRIPTFOOTER, "\
  1018. \n# End of Remote Access AAAA configuration. \
  1019. \n \
  1020. \n \
  1021. \n"
  1022. MSG_RASAAAA_CMD1, "%1!s! %2!s!\n"
  1023. MSG_RASAAAA_CMD5, "%1!s! %2!s! %3!s! %4!s! %5!s! %6!s!\n"
  1024. //
  1025. // The following are specific to the 'ras diag' sub context
  1026. //
  1027. MSG_RASDIAG_SCRIPTHEADER, "\
  1028. \n \
  1029. \n# ----------------------------------------- \
  1030. \n# Remote Access Diagnostics Configuration \
  1031. \n# ----------------------------------------- \
  1032. \n"
  1033. MSG_RASDIAG_SCRIPTFOOTER, "\
  1034. \n# End of Remote Access Diagnostics Configuration.\
  1035. \n \
  1036. \n \
  1037. \n"
  1038. HLP_RASDIAG_SHOW_RASTRACE, "Shows whether extended tracing is enabled for components.\n"
  1039. HLP_RASDIAG_SHOW_RASTRACE_EX, "\
  1040. \n %1!s! [ [component = ] component ] \
  1041. \n \
  1042. \n Shows whether tracing for the given component is enabled. If no \
  1043. \n component is specified, shows the state of all components. \
  1044. \n \
  1045. \n component - the component \
  1046. \n\n"
  1047. HLP_TRACE_SHOW, "Shows whether extended tracing is enabled for components.\n"
  1048. HLP_TRACE_SHOW_EX, "\
  1049. \n %1!s! [ [component = ] component ] \
  1050. \n \
  1051. \n Shows whether tracing for the given component is enabled. If no \
  1052. \n component is specified, shows the state of all components. \
  1053. \n \
  1054. \n component - the component \
  1055. \n\n"
  1056. HLP_RASDIAG_SET_RASTRACE, "Enables/disables extended tracing for a component.\n"
  1057. HLP_RASDIAG_SET_RASTRACE_EX, "\
  1058. \n %1!s! [component = ] component [state = ] ENABLED|DISABLED \
  1059. \n \
  1060. \n Enables or disables extended tracing for the given component. \
  1061. \n \
  1062. \n component - the component (use '*' to denote all components) \
  1063. \n\n"
  1064. HLP_TRACE_SET, "Enables/disables extended tracing for a component.\n"
  1065. HLP_TRACE_SET_EX, "\
  1066. \n %1!s! [component = ] component [state = ] ENABLED|DISABLED \
  1067. \n \
  1068. \n Enables or disables extended tracing for the given component. \
  1069. \n \
  1070. \n component - the component (use '*' to denote all components) \
  1071. \n\n"
  1072. HLP_RASDIAG_SHOW_TRACEALL, "Shows whether extended tracing is enabled for all components.\n"
  1073. HLP_RASDIAG_SET_TRACEALL, "Enables/disables extended tracing for all components.\n"
  1074. HLP_RASDIAG_SHOW_TRACEALL_EX, "\
  1075. \nUsage: %1!s! \
  1076. \n \
  1077. \n Shows whether extended tracing is enabled for all components. \
  1078. \n \n"
  1079. HLP_RASDIAG_SET_TRACEALL_EX "\
  1080. \n %1!s! [ state = ] ENABLED|DISABLED|CLEAR \
  1081. \n \
  1082. \n Enables/disables extended tracing for all components. \
  1083. \n \
  1084. \n type - the type of component that is being installed \
  1085. \n ENABLED - enables all tracing. \
  1086. \n DISABLED - disables all tracing. \
  1087. \n CLEAR - clears all tracing log files. \
  1088. \n \n"
  1089. MSG_TRACE_DUMP, "%1!s! %2!s! %3!s!\n"
  1090. MSG_TRACE_DUMP2, "%1!s! %2!s!\n"
  1091. MSG_RASDIAG_CLEAR_TRACE_OK, "\
  1092. \n Successfully cleared Remote Access tracing log files. \
  1093. \n \n"
  1094. EMSG_RASDIAG_CLEAR_TRACE_FAIL, "\
  1095. \n Unable to clear Remote Access tracing log files or no log files were \
  1096. \n present to delete. \
  1097. \n \n"
  1098. MSG_RASDIAG_TRACEALL_RAS_OK, "\
  1099. \n Successfully set Remote Access tracing. \
  1100. \n \n"
  1101. EMSG_RASDIAG_TRACEALL_RAS_FAIL, "\
  1102. \n Unable to modify Remote Access tracing settings. \
  1103. \n \n"
  1104. MSG_TRACE_SHOW, "%1!-40s! %2!s!\n"
  1105. HLP_RASDIAG_SHOW_MODEMTRACE, "Shows whether modem tracing is enabled.\n"
  1106. HLP_RASDIAG_SET_MODEMTRACE, "Enables/disables modem tracing.\n"
  1107. HLP_RASDIAG_SHOW_MODEMTRACE_EX, "\
  1108. \nUsage: %1!s! \
  1109. \n \
  1110. \n Shows whether modem tracing is enabled. \
  1111. \n \n"
  1112. HLP_RASDIAG_SET_MODEMTRACE_EX "\
  1113. \n %1!s! [ state = ] ENABLED|DISABLED \
  1114. \n \
  1115. \n Enables/disables modem tracing. \
  1116. \n \
  1117. \n type - the type of component that is being installed \
  1118. \n ENABLED - enables modem tracing. \
  1119. \n DISABLED - disables modem tracing. \
  1120. \n \n"
  1121. MSG_RASDIAG_CLEAR_MODEMTRACE, "\
  1122. \n Successfully cleared the modem tracing log files. \
  1123. \n \n"
  1124. EMSG_RASDIAG_CLEAR_MODEMTRACE_FAIL, "\
  1125. \n Unable to clear modem tracing log files or no log files were present \
  1126. \n to delete. \
  1127. \n \n"
  1128. MSG_RASDIAG_SET_MODEMTRACE_OK, "\
  1129. \n Successfully set modem tracing. \
  1130. \n \n"
  1131. EMSG_RASDIAG_SET_MODEMTRACE_FAIL, "\
  1132. \n Unable to set modem tracing or no modems are currently installed. \
  1133. \n \n"
  1134. MSG_RASDIAG_SHOW_MODEMTRACE_ENABLED, "\
  1135. \n Modem tracing is enabled. \
  1136. \n \n"
  1137. EMSG_RASDIAG_SHOW_MODEMTRACE_DISABLED, "\
  1138. \n Modem tracing is disabled or no modems are currently installed. \
  1139. \n \n"
  1140. HLP_RASDIAG_SHOW_CMTRACE, "Shows whether Connection Manager logging is enabled.\n"
  1141. HLP_RASDIAG_SET_CMTRACE, "Enables/disables Connection Manager logging.\n"
  1142. HLP_RASDIAG_SHOW_CMTRACE_EX, "\
  1143. \nUsage: %1!s! \
  1144. \n \
  1145. \n Shows whether Connection Manager logging is enabled. \
  1146. \n \n"
  1147. HLP_RASDIAG_SET_CMTRACE_EX "\
  1148. \n %1!s! [ state = ] ENABLED|DISABLED \
  1149. \n \
  1150. \n Enables/disables Connection Manager logging. \
  1151. \n \
  1152. \n type - the type of component that is being installed \
  1153. \n ENABLED - enables logging for Connection Manager connections. \
  1154. \n DISABLED - disables logging for Connection Manager connections. \
  1155. \n \n"
  1156. MSG_RASDIAG_CLEAR_CMTRACE, "\
  1157. \n Successfully cleared Connection Manager log files. \
  1158. \n \n"
  1159. EMSG_RASDIAG_CLEAR_CMTRACE_FAIL, "\
  1160. \n Unable to clear Connection Manager logs files or no log files were \
  1161. \n present to delete. \
  1162. \n \n"
  1163. MSG_RASDIAG_SET_CMTRACE_OK, "\
  1164. \n Successfully set Connection Manager logging. \
  1165. \n \n"
  1166. EMSG_RASDIAG_SET_CMTRACE_FAIL, "\
  1167. \n Unable to set Connection Manager logging or no Connection Manager \
  1168. \n profiles are currently installed. \
  1169. \n \n"
  1170. MSG_RASDIAG_SHOW_CMTRACE_ENABLED, "\
  1171. \n Connection Manager logging is enabled. \
  1172. \n \n"
  1173. EMSG_RASDIAG_SHOW_CMTRACE_DISABLED, "\
  1174. \n Connection Manager logging is disabled or no Connection Manager \
  1175. \n profiles are currently installed. \
  1176. \n \n"
  1177. MSG_RASDIAG_SET_IPSEC_OK, "\
  1178. \n Successfully set IPSec tracing settings. \
  1179. \n \n"
  1180. EMSG_RASDIAG_SET_IPSEC_FAIL, "\
  1181. \n Unable to modify IPSec tracing settings. \
  1182. \n \n"
  1183. HLP_RASDIAG_SHOW_AUDITING, "Shows whether Security Event Logs are enabled.\n"
  1184. HLP_RASDIAG_SET_AUDITING, "Enables/disables the Security Event Logs.\n"
  1185. HLP_RASDIAG_SHOW_AUDITING_EX, "\
  1186. \nUsage: %1!s! \
  1187. \n \
  1188. \n Shows whether Security Event Logs are enabled. \
  1189. \n \n"
  1190. HLP_RASDIAG_SET_AUDITING_EX "\
  1191. \n %1!s! [ state = ] ENABLED|DISABLED \
  1192. \n \
  1193. \n Enables/disables the Security Event Logs. \
  1194. \n \
  1195. \n type - the type of component that is being installed \
  1196. \n ENABLED - enables the Security Event Logs. \
  1197. \n DISABLED - disables the Security Event Logs. \
  1198. \n \n"
  1199. MSG_RASDIAG_CLEAR_AUDITING, "\
  1200. \n Successfully cleared the Security Event Logs. \
  1201. \n \n"
  1202. EMSG_RASDIAG_CLEAR_AUDITING_FAIL, "\
  1203. \n Unable to clear the Security Event Logs. \
  1204. \n \n"
  1205. MSG_RASDIAG_SET_AUDITING_OK, "\
  1206. \n Successfully set the Security Event Logs. \
  1207. \n \n"
  1208. EMSG_RASDIAG_SET_AUDITING_FAIL, "\
  1209. \n Unable to set the Security Event Logs. \
  1210. \n \n"
  1211. MSG_RASDIAG_SHOW_AUDITING_ENABLED, "\
  1212. \n Security Event Logs are enabled. \
  1213. \n \n"
  1214. EMSG_RASDIAG_SHOW_AUDITING_DISABLED, "\
  1215. \n Security Event Logs are disabled. \
  1216. \n \n"
  1217. HLP_RASDIAG_SHOW_ALL, "Shows Remote Access Diag Report.\n"
  1218. HLP_RASDIAG_SHOW_ALL_EX, "\
  1219. \n%1!s! [ type = ] FILE|EMAIL \
  1220. \n [ destination = ] destination \
  1221. \n [ [ compression = ] ENABLED|DISABLED \
  1222. \n [ hours = ] hours \
  1223. \n [ verbose = ] ENABLED|DISABLED ] \
  1224. \n \
  1225. \n Shows the entire Remote Access Diagnostic Report. \
  1226. \n \
  1227. \n type - type of destination. \
  1228. \n FILE - save the diagnostic report to a file. \
  1229. \n EMAIL - send the diagnostic report to an email address. \
  1230. \n \
  1231. \n destination - the destination for the diagnostic report. Either a \
  1232. \n filename or an email address is a valid destination. \
  1233. \n \
  1234. \n compression - compress the diagnostic report into a CAB file. \
  1235. \n ENABLED - enables compression. Default setting for email \
  1236. \n destination. \
  1237. \n DISABLED - disables compression. Default setting for file \
  1238. \n destination. \
  1239. \n \
  1240. \n hours - only show log entries from this number of hours in the past. \
  1241. \n 1 - 24 is valid. If no time is specified, the entire log will\
  1242. \n be displayed. \
  1243. \n \
  1244. \n verbose - Amount of data to include in the diagnostic report. \
  1245. \n ENABLED - enables verbose information. \
  1246. \n DISABLED - disables verbose information. Default. \
  1247. \n \n"
  1248. HLP_RASDIAG_SHOW_LOGS, "Shows all logs.\n"
  1249. HLP_RASDIAG_SHOW_LOGS_EX, "\
  1250. \n%1!s! [ type = ] FILE|EMAIL \
  1251. \n [ destination = ] destination \
  1252. \n [ [ compression = ] ENABLED|DISABLED \
  1253. \n [ hours = ] hours \
  1254. \n [ verbose = ] ENABLED|DISABLED ] \
  1255. \n \
  1256. \n Shows all logs. \
  1257. \n \
  1258. \n type - type of destination. \
  1259. \n FILE - save the diagnostic report to a file. \
  1260. \n EMAIL - send the diagnostic report to an email address. \
  1261. \n \
  1262. \n destination - the destination for the diagnostic report. Either a \
  1263. \n filename or an email address is a valid destination. \
  1264. \n \
  1265. \n compression - compress the diagnostic report into a CAB file. \
  1266. \n ENABLED - enables compression. Default setting for email \
  1267. \n destination. \
  1268. \n DISABLED - disables compression. Default setting for file \
  1269. \n destination. \
  1270. \n \
  1271. \n hours - only show log entries from this number of hours in the past. \
  1272. \n 1 - 24 is valid. If no time is specified, the entire log will\
  1273. \n be displayed. \
  1274. \n \
  1275. \n verbose - Amount of data to include in the diagnostic report. \
  1276. \n ENABLED - enables verbose information. \
  1277. \n DISABLED - disables verbose information. Default. \
  1278. \n \n"
  1279. EMSG_RASDIAG_SHOW_TRACE_LOGS_FAIL, "\
  1280. \n Unable to show Remote Access tracing logs or no log files were \
  1281. \n present. \
  1282. \n \n"
  1283. EMSG_RASDIAG_SHOW_MODEMTRACE_LOGS_FAIL, "\
  1284. \n Unable to show modem tracing logs or no log files were present. \
  1285. \n \n"
  1286. EMSG_RASDIAG_SHOW_CM_LOGS_FAIL, "\
  1287. \n Unable to show Connection Manager logs or no log files were present. \
  1288. \n \n"
  1289. EMSG_RASDIAG_SHOW_IPSEC_LOGS_FAIL, "\
  1290. \n Unable to show IPSec tracing logs or no log files were present. \
  1291. \n \n"
  1292. HLP_RASDIAG_SHOW_RASCHK, "Installation Info.\n"
  1293. HLP_RASDIAG_SHOW_RASCHK_EX, "\
  1294. \n%1!s! [ type = ] FILE|EMAIL \
  1295. \n [ destination = ] destination \
  1296. \n [ [ compression = ] ENABLED|DISABLED \
  1297. \n [ hours = ] hours \
  1298. \n [ verbose = ] ENABLED|DISABLED ] \
  1299. \n \
  1300. \n Installation Info. \
  1301. \n \
  1302. \n type - type of destination. \
  1303. \n FILE - save the diagnostic report to a file. \
  1304. \n EMAIL - send the diagnostic report to an email address. \
  1305. \n \
  1306. \n destination - the destination for the diagnostic report. Either a \
  1307. \n filename or an email address is a valid destination. \
  1308. \n \
  1309. \n compression - compress the diagnostic report into a CAB file. \
  1310. \n ENABLED - enables compression. Default setting for email \
  1311. \n destination. \
  1312. \n DISABLED - disables compression. Default setting for file \
  1313. \n destination. \
  1314. \n \
  1315. \n hours - only show log entries from this number of hours in the past. \
  1316. \n 1 - 24 is valid. If no time is specified, the entire log will\
  1317. \n be displayed. \
  1318. \n \
  1319. \n verbose - Amount of data to include in the diagnostic report. \
  1320. \n ENABLED - enables verbose information. \
  1321. \n DISABLED - disables verbose information. Default. \
  1322. \n \n"
  1323. MSG_RASDIAG_SHOW_RASCHK_FILE, "\
  1324. \nFile Name : %1!s! \
  1325. \nLast Write Time : %2!0.2d!/%3!0.2d!/%4!0.4d! %5!0.2d!:%6!0.2d! \
  1326. \nCreation Time : %7!0.2d!/%8!0.2d!/%9!0.4d! %10!0.2d!:%11!0.2d! \
  1327. \nFile Size : %12!d! bytes \n"
  1328. EMSG_RASDIAG_SHOW_RASCHK_FILE, "\
  1329. \n Unable to show Remote Access INF Files. \
  1330. \n \n"
  1331. EMSG_RASDIAG_SHOW_RASCHK_RASCOMP, "\
  1332. \n Unable to validate installed Remote Access components. \
  1333. \n \n"
  1334. EMSG_RASDIAG_SHOW_RASCHK_NETCOMP, "\
  1335. \n Unable to validate installed networking components. \
  1336. \n \n"
  1337. MSG_RASDIAG_SHOW_RASCHK_NETCOMP, "%1!-41s! = "
  1338. MSG_RASDIAG_SHOW_RASCHK_OK, "OK.\n"
  1339. MSG_RASDIAG_SHOW_RASCHK_NOTOK, "Not Found.\n"
  1340. MSG_RASDIAG_SHOW_RASCHK_REG_NOT_FOUND, "The following registry keys were not found:\n"
  1341. HLP_RASDIAG_SHOW_CONFIG, "Configuration Info.\n"
  1342. HLP_RASDIAG_SHOW_CONFIG_EX, "\
  1343. \n%1!s! [ type = ] FILE|EMAIL \
  1344. \n [ destination = ] destination \
  1345. \n [ [ compression = ] ENABLED|DISABLED \
  1346. \n [ hours = ] hours \
  1347. \n [ verbose = ] ENABLED|DISABLED ] \
  1348. \n \
  1349. \n Configuration Info. \
  1350. \n \
  1351. \n type - type of destination. \
  1352. \n FILE - save the diagnostic report to a file. \
  1353. \n EMAIL - send the diagnostic report to an email address. \
  1354. \n \
  1355. \n destination - the destination for the diagnostic report. Either a \
  1356. \n filename or an email address is a valid destination. \
  1357. \n \
  1358. \n compression - compress the diagnostic report into a CAB file. \
  1359. \n ENABLED - enables compression. Default setting for email \
  1360. \n destination. \
  1361. \n DISABLED - disables compression. Default setting for file \
  1362. \n destination. \
  1363. \n \
  1364. \n hours - only show log entries from this number of hours in the past. \
  1365. \n 1 - 24 is valid. If no time is specified, the entire log will\
  1366. \n be displayed. \
  1367. \n \
  1368. \n verbose - Amount of data to include in the diagnostic report. \
  1369. \n ENABLED - enables verbose information. \
  1370. \n DISABLED - disables verbose information. Default. \
  1371. \n \n"
  1372. MSG_RASDIAG_SHOW_CONFIG_RASENUM, "%1!0.2d! %2!-45.45s! %3!-15.15s!\n"
  1373. EMSG_RASDIAG_SHOW_CONFIG_RASENUM, "\
  1374. \n Unable to show Remote Access device list. \
  1375. \n \n"
  1376. MSG_RASDIAG_SHOW_PROCESS, "%1!4d! %2!-16s!"
  1377. MSG_RASDIAG_SHOW_PROCESS_TITLE, "%1!s!: %2!s!"
  1378. MSG_RASDIAG_SHOW_PROCESS_SVCNAME, ",%1!s!"
  1379. EMSG_RASDIAG_SHOW_CONFIG_PROC, "\
  1380. \n Unable to show process information. \
  1381. \n \n"
  1382. MSG_RASDIAG_SHOW_EVENT_SUCCESS, "Success"
  1383. MSG_RASDIAG_SHOW_EVENT_ERROR, "Error"
  1384. MSG_RASDIAG_SHOW_EVENT_WARNING, "Warning"
  1385. MSG_RASDIAG_SHOW_EVENT_INFO, "Information"
  1386. MSG_RASDIAG_SHOW_EVENT_SAUDIT, "Success Audit"
  1387. MSG_RASDIAG_SHOW_EVENT_FAUDIT, "Failure Audit"
  1388. MSG_RASDIAG_SHOW_EVENT_NONE, "None"
  1389. MSG_RASDIAG_SHOW_EVENT_NA, "N/A"
  1390. MSG_RASDIAG_SHOW_EVENT_LOG_USER, "\
  1391. \nEvent Type: %1!s! \
  1392. \nEvent Source: %2!s! \
  1393. \nEvent Category: %3!s! \
  1394. \nEvent ID: %4!d! \
  1395. \nDate: %5!s! \
  1396. \nTime: %6!s! \
  1397. \nUser: %7!s! \
  1398. \nComputer: %8!s! \
  1399. \nDescription:\n%9!s! \
  1400. \n \n"
  1401. MSG_RASDIAG_SHOW_EVENT_LOG_USERDOM, "\
  1402. \nEvent Type: %1!s! \
  1403. \nEvent Source: %2!s! \
  1404. \nEvent Category: %3!s! \
  1405. \nEvent ID: %4!d! \
  1406. \nDate: %5!s! \
  1407. \nTime: %6!s! \
  1408. \nUser: %7!s!\\%8!s! \
  1409. \nComputer: %9!s! \
  1410. \nDescription:\n%10!s! \
  1411. \n \n"
  1412. EMSG_RASDIAG_SHOW_CONFIG_EVENTLOG, "\
  1413. \n Unable to show Remote Access event logs or no log entries were \
  1414. \n present. \
  1415. \n \n"
  1416. EMSG_RASDIAG_SHOW_CONFIG_SECEVENTLOG, "\
  1417. \n Unable to show security event logs or no log entries were present. \
  1418. \n \n"
  1419. EMSG_RASDIAG_SHOW_CONFIG_ALLPBK, "\
  1420. \n Unable to show the system Remote Access phone book or no Remote Access\
  1421. \n connections are present. \
  1422. \n \n"
  1423. EMSG_RASDIAG_SHOW_CONFIG_USERPBK, "\
  1424. \n Unable to show the user Remote Access phone book or no Remote Access \
  1425. \n connections are present. \
  1426. \n \n"
  1427. EMSG_RASDIAG_SHOW_CONFIG_CONSOLE_TIMOUT, "\
  1428. \n The console utility timed out and was terminated. \
  1429. \n \n"
  1430. EMSG_RASDIAG_SHOW_CONFIG_CONSOLE, "\
  1431. \n Unable to show the console utilities output. \
  1432. \n \n"
  1433. EMSG_RASDIAG_SHOW_CONFIG_WINMSD, "\
  1434. \n Unable to show the winmsd/msinfo32 report. \
  1435. \n \n"
  1436. MSG_RASDIAG_SHOW_NETCOMP, "%1!-20s! %2!s!\n"
  1437. MSG_RASDIAG_SHOW_NETCOMP_NET_HDR, "\
  1438. \nNetwork Adapters \
  1439. \n---------------- \n"
  1440. MSG_RASDIAG_SHOW_NETCOMP_NETTRANS_HDR, "\
  1441. \nNetwork Protocols \
  1442. \n----------------- \n"
  1443. MSG_RASDIAG_SHOW_NETCOMP_NETSERVICE_HDR, "\
  1444. \nNetwork Services \
  1445. \n---------------- \n"
  1446. MSG_RASDIAG_SHOW_NETCOMP_NETCLIENT_HDR, "\
  1447. \nNetwork Clients \
  1448. \n--------------- \n"
  1449. HLP_RASDIAG_REPAIR, "Repairs the installation of all Remote Access components.\n"
  1450. HLP_RASDIAG_REPAIR_EX, "\
  1451. \n%1!s! [ [ answerfile = ] answerfile ] \
  1452. \n \
  1453. \n Repairs the installation of all Remote Access components. \
  1454. \n \
  1455. \n answerfile - the answerfile name. If no answerfile is provided, the \
  1456. \n default system values are utilized. For more \
  1457. \n information on the syntax of the answerfile, please \
  1458. \n refer to the 'Preinstallation Reference' documentation. \
  1459. \n \n"
  1460. MSG_RASDIAG_REPAIR_SUCCESS_REBOOT, "\
  1461. \nRepair successful. You need to reboot your computer for this change \
  1462. \nto take effect. \
  1463. \n \n"
  1464. EMSG_RASDIAG_REPAIR_FAIL, "\
  1465. \nUnable to repair Remote Access. \
  1466. \n \n"
  1467. EMSG_RASDIAG_BAD_ANSWERFILE "\
  1468. \nThe answerfile is invalid. \
  1469. \n \n"
  1470. MSG_RASDIAG_REPORT_TITLE, "Remote Access Diagnostic Report"
  1471. MSG_RASDIAG_REPORT_HTMLTOC, "\
  1472. <tr><td>Report Version: </td><td>%1!d!.0</td></tr>\
  1473. <tr><td>Date and Time: </td><td>%2!s! %3!s!</td></tr>\
  1474. <tr><td>Username: </td><td>%4!s!</td></tr>\
  1475. <tr><td>Computer Name: </td><td>%5!s!</td></tr>\
  1476. <tr><td>Windows Directory: </td><td>%6!s!</td></tr>\
  1477. <tr><td>Windows Version: </td><td>%7!d!.%8!s!.%9!s!</td></tr>"
  1478. MSG_RASDIAG_REPORT_TOC, "Table Of Contents"
  1479. MSG_RASDIAG_REPORT_TRACEEVENT, "Tracing and Event Logs"
  1480. MSG_RASDIAG_REPORT_TRACE, "Tracing Logs"
  1481. MSG_RASDIAG_REPORT_TRACE_MODEM, "Modem Logs"
  1482. MSG_RASDIAG_REPORT_TRACE_CM, "Connection Manager Logs"
  1483. MSG_RASDIAG_REPORT_TRACE_IPSEC, "IP Security Log"
  1484. MSG_RASDIAG_REPORT_RASEVENT, "Remote Access Event Logs"
  1485. MSG_RASDIAG_REPORT_SECEVENT, "Security Event Logs"
  1486. MSG_RASDIAG_REPORT_INSTALL, "Installation Information"
  1487. MSG_RASDIAG_REPORT_RASINF, "Information Files"
  1488. MSG_RASDIAG_REPORT_RASCHK, "Installation Check"
  1489. MSG_RASDIAG_REPORT_NETINST, "Installed Networking Components"
  1490. MSG_RASDIAG_REPORT_RASREG, "Registry Check"
  1491. MSG_RASDIAG_REPORT_CONFIG, "Configuration Information"
  1492. MSG_RASDIAG_REPORT_RASENUM, "Installed Devices"
  1493. MSG_RASDIAG_REPORT_TLIST, "Process Information"
  1494. MSG_RASDIAG_REPORT_CONSOLE, "Command-Line Utilities"
  1495. MSG_RASDIAG_REPORT_WINMSD, "System Information Report"
  1496. MSG_RASDIAG_REPORT_RASPBK, "Phone Book Files"
  1497. MSG_RASDIAG_REPORT_OK, "\
  1498. \nSuccessfully created the Diagnostic Report: \
  1499. \n \
  1500. \n%1!s! \
  1501. \n \n"
  1502. MSG_RASDIAG_REPORT_EMAIL_OK, "\
  1503. \nSuccessfully sent the Diagnostic Report: \
  1504. \n \
  1505. \n%1!s! \
  1506. \n \n"
  1507. EMSG_RASDIAG_REPORT_FAIL, "\
  1508. \nUnable to create the Diagnostics Report: \
  1509. \n \
  1510. \n%1!s! \
  1511. \n \n"
  1512. EMSG_RASDIAG_REPORT_EMAIL_FAIL, "\
  1513. \nUnable to send the Diagnostic Report: \
  1514. \n \
  1515. \n%1!s! \
  1516. \n \n"
  1517. EMSG_RASDIAG_REPORT_CAB_FAIL, "\
  1518. \nUnable to compress the Diagnostic Report: \
  1519. \n \
  1520. \n%1!s! \
  1521. \n \n"
  1522. EMSG_RASDIAG_REPORT_DISPLAY_FAIL, "\
  1523. \nUnable to display the Diagnostic Report: \
  1524. \n \
  1525. \n%1!s! \
  1526. \n \n"
  1527. }
  1528. #include <windows.h>
  1529. #include <ntverp.h>
  1530. #define VER_FILETYPE VFT_DLL
  1531. #define VER_FILESUBTYPE VFT2_UNKNOWN
  1532. #define VER_FILEDESCRIPTION_STR "RAS Monitor DLL"
  1533. #define VER_INTERNALNAME_STR "rasmontr.dll"
  1534. #define VER_ORIGINALFILENAME_STR "rasmontr.dll"
  1535. #include "common.ver" // NT5.0 version file.