Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

169 lines
11 KiB

  1. /*++
  2. Copyright (c) 2002 Microsoft Corporation
  3. Module Name:
  4. ipsecprf.ini
  5. Abstract:
  6. This file contains the English Language counters and help text for
  7. IPSec.
  8. Created:
  9. Avnish Kumar Chhabra July 05 , 2002
  10. Revision History:
  11. --*/
  12. [info]
  13. driverName=IPSec
  14. symbolfile=ipsecnm.h
  15. [languages]
  16. 009=English
  17. [text]
  18. IPSECOBJ_009_NAME=IPSec v4 Driver
  19. IPSECOBJ_009_HELP=Displays IPSec driver counters.
  20. ACTIVESA_009_NAME=Active Security Associations
  21. ACTIVESA_009_HELP=The number of active IPSec quick mode security associations.
  22. OFFLOADEDSA_009_NAME=Offloaded Security Associations
  23. OFFLOADEDSA_009_HELP=The number of active IPSec quick mode security associations offloaded to hardware. Certain network adapters can accelerate IPSec processing by performing hardware offload of IPSec cryptographic functions.
  24. PENDINGKEYOPS_009_NAME=Pending Key Exchange Operations
  25. PENDINGKEYOPS_009_HELP=The number of IPSec key exchange operations that are in progress but are not yet completed.
  26. KEYADDITIONS_009_NAME=Total Keys Added
  27. KEYADDITIONS_009_HELP=The total number of successful key additions for IPSec quick mode security association negotiations since the computer was last started.
  28. KEYDELETIONS_009_NAME=Total Keys Deleted
  29. KEYDELETIONS_009_HELP=The total number of key deletions for IPSec quick mode security associations since the computer was last started.
  30. REKEYNUM_009_NAME=Total SA Rekeys
  31. REKEYNUM_009_HELP=The total number of successful rekey operations for IPSec quick mode security associations since the computer was last started.
  32. ACTIVETUNNEL_009_NAME=Active Tunnel SAs
  33. ACTIVETUNNEL_009_HELP=The number of active IPSec tunnels.
  34. BADSPIPKTS_009_NAME=Total Bad SPI Packets
  35. BADSPIPKTS_009_HELP=The total number of packets for which the Security Parameters Index (SPI) was incorrect since the computer was last started. A large number of packets with bad SPIs within a short amount of time might indicate a packet spoofing attack.
  36. PKTSNOTDECRYPTED_009_NAME=Total Packets Not Decrypted
  37. PKTSNOTDECRYPTED_009_HELP=The total number of packets that could not be decrypted since the computer was last started. A packet might not be decrypted if it fails a validation check.
  38. PKTSNOTAUTHENTICATED_009_NAME=Total Packets Not Authenticated
  39. PKTSNOTAUTHENTICATED_009_HELP=The total number of packets for which data could not be verified (for which the integrity hash verification failed) since the computer was last started. Increases in this counter might indicate an IPSec packet spoofing or modification attack, or packet corruption by network devices.
  40. PKTSFAILEDREPLAY_009_NAME=Total Packets Failing Replay Detection
  41. PKTSFAILEDREPLAY_009_HELP=The total number of packets that contained an invalid sequence number since the computer was last started. Increases in this counter might indicate a network problem or replay attack.
  42. CONFBYTESSENT_009_NAME=Total Confidential Bytes Sent
  43. CONFBYTESSENT_009_HELP=The total number of bytes sent using the Encapsulating Security Payload (ESP) protocol (excluding non-encrypted ESP) since the computer was last started.
  44. CONFBYTESRECV_009_NAME=Total Confidential Bytes Received
  45. CONFBYTESRECV_009_HELP=The total number of bytes received using the Encapsulating Security Payload (ESP) protocol (excluding non-encrypted ESP) since the computer was last started.
  46. AUTHBYTESSENT_009_NAME=Total Authenticated Bytes Sent
  47. AUTHBYTESSENT_009_HELP=The total number of authenticated bytes sent using either the Authentication Header (AH) protocol or the Encapsulating Security Payload (ESP) protocol since the computer was last started.
  48. AUTHBYTESRECV_009_NAME=Total Authenticated Bytes received
  49. AUTHBYTESRECV_009_HELP=The total number of authenticated bytes received using either the Authentication Header (AH) protocol or Encapsulating Security Payload (ESP) protocol since the computer was last started.
  50. TPTBYTESSENT_009_NAME=Total Transport Bytes Sent
  51. TPTBYTESSENT_009_HELP=The total number of bytes sent using IPSec transport mode since the computer was last started.
  52. TPTBYTESRECV_009_NAME=Total Transport Bytes Received
  53. TPTBYTESRECV_009_HELP=The total number of bytes received using IPSec transport mode since the computer was last started.
  54. TUNBYTESSENT_009_NAME=Total Bytes Sent In Tunnels
  55. TUNBYTESSENT_009_HELP=The total number of bytes sent using IPSec tunnel mode since the computer was last started.
  56. TUNBYTESRECV_009_NAME=Total Bytes Received In Tunnels
  57. TUNBYTESRECV_009_HELP=The total number of bytes received using IPSec tunnel mode since the computer was last started.
  58. OFFLOADBYTESSENT_009_NAME=Total Offloaded Bytes Sent
  59. OFFLOADBYTESSENT_009_HELP=The total number of bytes sent using IPSec hardware offload since the computer was last started. Certain network adapters can accelerate IPSec processing by performing hardware offload of IPSec cryptographic functions.
  60. OFFLOADBYTESRECV_009_NAME=Total Offloaded Bytes Received
  61. OFFLOADBYTESRECV_009_HELP=The total number of bytes received using IPSec hardware offload since the computer was last started. Certain network adapters can accelerate IPSec processing by performing hardware offload of IPSec cryptographic functions.
  62. IKEOBJ_009_NAME=IPSec v4 IKE
  63. IKEOBJ_009_HELP=Displays Internet Key Exchange (IKE) counters.
  64. ACTIVEACQUIRE_009_NAME=Active Acquires
  65. ACTIVEACQUIRE_009_HELP=The number of pending requests to initiate an Internet Key Exchange (IKE) negotiation in order to establish a security association between IPSec peers.
  66. ACTIVERECEIVE_009_NAME=Active Receives
  67. ACTIVERECEIVE_009_HELP=The number of Internet Key Exchange (IKE) messages received that are queued for processing.
  68. ACQUIREFAILURE_009_NAME=Total Acquire Failures
  69. ACQUIREFAILURE_009_HELP=The total number of acquire outbound requests that failed since the IPSec service was last started. Acquires are requests to establish security associations between IPSec peers.
  70. RECEIVEFAILURE_009_NAME=Total Receive Failures
  71. RECEIVEFAILURE_009_HELP=The total number of errors that have occurred in receiving Internet Key Exchange (IKE) messages since the IPSec service was last started.
  72. SENDFAILURE_009_NAME=Total Send Failures
  73. SENDFAILURE_009_HELP=The total number of errors that have occurred in sending Internet Key Exchange (IKE) messages since the IPSec service was last started.
  74. ACQUIREHEAPSIZE_009_NAME=Acquire Heap Size
  75. ACQUIREHEAPSIZE_009_HELP=The number of entries in the acquire heap. The acquire heap stores successful acquires. Acquires are outbound requests to establish security associations between IPSec peers.
  76. RECEIVEHEAPSIZE_009_NAME=Receive Heap Size
  77. RECEIVEHEAPSIZE_009_HELP=The number of entries in the Internet Key Exchange (IKE) receive buffers. The receive buffers are used to store incoming IKE messages.
  78. NEGFAILURE_009_NAME=Total Negotiation Failures
  79. NEGFAILURE_009_HELP=The total number of negotiation failures that occurred during main mode or quick mode negotiation since the IPSec service was last started.
  80. AUTHFAILURE_009_NAME=Total Authentication Failures
  81. AUTHFAILURE_009_HELP=The total number of identity authentication (Kerberos, certificate, and preshared key) failures that occurred during main mode negotiation since the IPSec service was last started.
  82. INVCOOKIE_009_NAME=Total Invalid Cookies Received
  83. INVCOOKIE_009_HELP=The total number of cookies received within Internet Key Exchange (IKE) messages that could not be matched with an active main mode security association (SA) since the IPSec service was last started. A cookie is a value contained in a received IKE message that is used to help identify the corresponding main mode SA.
  84. TOTACQUIRE_009_NAME=Total Acquires
  85. TOTACQUIRE_009_HELP=The total number of requests submitted to Internet Key Exchange (IKE) since the IPSec service was last started to establish a security association. This counter includes acquires that result in soft SAs.
  86. TOTGETSPI_009_NAME=Total SPI Requests
  87. TOTGETSPI_009_HELP=The total number of requests submitted by Internet Key Exchange (IKE) to the IPSec driver to obtain a unique Security Parameters Index (SPI) since the IPSec service was last started. The SPI is used to match inbound packets with security associations.
  88. IKEKEYSADD_009_NAME=Total Key Additions
  89. IKEKEYSADD_009_HELP=The total number of outbound quick mode security associations added by Internet Key Exchange (IKE) to the IPSec driver since the IPSec service was last started.
  90. IKEKEYSUPDT_009_NAME=Total Key Updates
  91. IKEKEYSUPDT_009_HELP=The total number of inbound quick mode security associations added by Internet Key Exchange (IKE) to the IPSec driver since the IPSec service was last started.
  92. GETSPIFAIL_009_NAME=Total SPI Request Failures
  93. GETSPIFAIL_009_HELP=The total number of failed requests submitted by Internet Key Exchange (IKE) to the IPSec driver to obtain a unique SPI since the IPSec service was last started.
  94. KEYADDFAIL_009_NAME=Total Key Addition Failures
  95. KEYADDFAIL_009_HELP=The total number of failed outbound quick mode security association addition requests submitted by Internet Key Exchange (IKE) to the IPSec driver since the IPSec service was last started.
  96. KEYUPDTFAIL_009_NAME=Total Key Update Failures
  97. KEYUPDTFAIL_009_HELP=The total number of failed inbound quick mode security association addition requests submitted by Internet Key Exchange (IKE) to the IPSec driver since the IPSec service was last started.
  98. ISADBSIZE_009_NAME=Main Mode SA List Entries
  99. ISADBSIZE_009_HELP=The number of main mode state entries. This counter includes successfully negotiated main modes, main mode negotiations in progress, and main mode negotiations that failed or expired and have not yet been deleted.
  100. CONNLSIZE_009_NAME=Quick Mode SA List Entries
  101. CONNLSIZE_009_HELP=The number of quick mode negotiations that are in progress.
  102. MMSA_009_NAME=Total Main Mode SAs
  103. MMSA_009_HELP=The total number of successful security associations created during main mode negotiations since the IPSec service was last started.
  104. QMSA_009_NAME=Total Quick Mode SAs
  105. QMSA_009_HELP=The total number of successful security associations created during quick mode negotiations since the IPSec service was last started.
  106. SOFTSA_009_NAME=Total Soft Associations
  107. SOFTSA_009_HELP=The total number of security associations (SAs) formed with computers that did not respond to main mode negotiation attempts (though IPSec policy allowed communications) since the IPSec service was last started. Packets that match soft SAs are not secured by IPSec.
  108. INVPKTSRCV_009_NAME=Total Invalid Packets Received
  109. INVPKTSRCV_009_HELP=The total number of received Internet Key Exchange (IKE) messages since the IPSec service was last started that are invalid. This counter includes IKE messages with invalid header fields, incorrect payload lengths, and incorrect values for the responder cookie. Invalid IKE messages are commonly caused by retransmitted IKE messages or an unmatched preshared key between the IPSec peers.