You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2728 lines
136 KiB
2728 lines
136 KiB
///////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Header : nshipsec.rc
|
|
//
|
|
// Purpose : String Table definitions for commands,
|
|
// help and error codes.
|
|
//
|
|
// Developers Name : Bharat/Radhika
|
|
//
|
|
// History :
|
|
//
|
|
// Date Author Comments
|
|
// 06-06-2002 DBeder Major Overhaul
|
|
// 10-08-2001 Radhika Initial Version. V1.0
|
|
// 26-11-2001 Sai Updated to V1.1
|
|
// 07-12-2001 Sai Reduced HLP
|
|
////////////////////////////////////////////////////////////////////////
|
|
|
|
#include "resource.h"
|
|
|
|
STRINGTABLE
|
|
{
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Help strings for Static context
|
|
//
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
HLP_STATIC_GROUP_ADD "Creates new policies and related information.\n"
|
|
HLP_STATIC_GROUP_SET "Modifies existing policies and related information.\n"
|
|
HLP_STATIC_GROUP_DELETE "Deletes policies and related information.\n"
|
|
HLP_STATIC_GROUP_SHOW "Displays details of policies and related information.\n"
|
|
|
|
HLP_STATIC_EXPORTPOLICY "Exports all the policies from the policy store.\n"
|
|
HLP_STATIC_EXPORTPOLICY_EX "\
|
|
\nUsage:\
|
|
\n exportpolicy [ file = ] <string>\
|
|
\n\
|
|
\n Exports all the policies to a file.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the file into which the policies are exported.\
|
|
\n\
|
|
\nRemarks: .ipsec extension is by default added to the filename.\
|
|
\n\
|
|
\nExamples: exportpolicy Policy1\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_RESTOREDEFAULTS "Restores the default example policies.\n"
|
|
HLP_STATIC_RESTOREDEFAULTS_EX "\
|
|
\nUsage:\
|
|
\n restorepolicyexamples [release = ] (win2k | win2003)\
|
|
\n\
|
|
\n Restores the default policies.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n release -OS release type, for default policies examples.\
|
|
\n\
|
|
\nRemarks: This command is only valid for the local computer policy store.\
|
|
\n\
|
|
\nExamples: 1. restorepolicyexamples release=win2003\
|
|
\n 2. restorepolicyexamples release=win2k\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_IMPORTPOLICY "Imports the policies from a file to the policy store.\n"
|
|
HLP_STATIC_IMPORTPOLICY_EX "\
|
|
\nUsage:\
|
|
\n importpolicy [ file = ] <string>\
|
|
\n\
|
|
\n Imports policies from the specified file.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the file from which the policies are imported.\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExamples: importpolicy Policy1.ipsec\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_ADD_POLICY "Creates a policy with a default response rule.\n"
|
|
|
|
HLP_STATIC_ADD_POLICY_EX "\
|
|
\nUsage:\
|
|
\n policy [ name = ] <string>\
|
|
\n [ [ description = ] <string> ]\
|
|
\n [ [ mmpfs = ] (yes | no) ]\
|
|
\n [ [ qmpermm = ] <integer> ]\
|
|
\n [ [ mmlifetime = ] <integer> ]\
|
|
\n [ [ activatedefaultrule = ] (yes | no) ]\
|
|
\n [ [ pollinginterval = ] <integer> ]\
|
|
\n [ [ assign = ] (yes | no) ]\
|
|
\n [ [ mmsecmethods = ] (sec#1 sec#2 ... sec#n) ]\
|
|
\n\
|
|
\n Creates a policy with the specified name.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the policy.\
|
|
\n description -Brief information about the policy.\
|
|
\n mmpfs -Option to set master perfect forward secrecy.\
|
|
\n qmpermm -Number of quick mode sessions per main mode\
|
|
\n session of IKE.\
|
|
\n mmlifetime -Time in minutes to rekey for main mode of IKE.\
|
|
\n activatedefaultrule -Activates or deactivates the default response rule.\
|
|
\n pollinginterval -Polling Interval, time in minutes for policy agent\
|
|
\n to check for changes in policy store.\
|
|
\n assign -Assigns the policy as active or inactive. \
|
|
\n mmsecmethods -List of one or more space separated security\
|
|
\n methods in the form of ConfAlg-HashAlg-GroupNum,\
|
|
\n where ConfAlg can be DES or 3DES,\
|
|
\n HashAlg is MD5 or SHA1.\
|
|
\n GroupNum can be 1 (Low), 2 (Med), 3 (DH2048).\
|
|
\n\
|
|
\nRemarks: 1. If mmpfs is specified, qmpermm is set to 1.\
|
|
\n 2. If the store is 'domain' then ‘assign’ will have no effect.\
|
|
\n\
|
|
\nExamples: add policy Policy1 mmpfs= yes assign=yes\
|
|
\n mmsec=""3DES-SHA1-3 DES-MD5-3 3DES-MD5-2""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_ADD_FILTERLIST "Creates an empty filter list.\n"
|
|
HLP_STATIC_ADD_FILTERLIST_EX "\
|
|
\nUsage:\
|
|
\n filterlist [ name = ] <string>\
|
|
\n [ [ description = ] <string> ]\
|
|
\n\
|
|
\n Creates an empty filter list with the specified name.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the filter list.\
|
|
\n description -Brief information about the filter list.\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExamples: add filterlist Filter1\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_ADD_FILTER "Adds a filter to filter list.\n"
|
|
HLP_STATIC_ADD_FILTER_EX "\
|
|
\nUsage:\
|
|
\n filter [ filterlist = ] <string>\
|
|
\n [ srcaddr = ] (ip | dns | server)\
|
|
\n [ dstaddr = ] (ip | dns | server)\
|
|
\n [ [ description = ] <string> ]\
|
|
\n [ [ protocol = ] (ANY | ICMP | TCP | UDP | RAW | <integer>) ]\
|
|
\n [ [ mirrored = ] (yes | no) ]\
|
|
\n [ [ srcmask = ] (mask | prefix) ]\
|
|
\n [ [ dstmask = ] (mask | prefix) ]\
|
|
\n [ [ srcport = ] <port> ]\
|
|
\n [ [ dstport = ] <port> ]\
|
|
\n\
|
|
\n Adds a filter to the specified filter list.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n filterlist -Name of the filter list to which the filter is added.\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n description -Brief information about the filter.\
|
|
\n protocol -Can be ANY, ICMP, TCP, UDP, RAW, or an integer.\
|
|
\n mirrored -‘Yes’ creates two filters, one in each direction.\
|
|
\n srcmask -Source address mask or a prefix of 1 through 32.\
|
|
\n dstmask -Destination address mask or a prefix of 1 through 32.\
|
|
\n srcport -Source port of the packet. A value of 0 means any port.\
|
|
\n dstport -Destination port of the packet. A value of 0 means any port.\
|
|
\n\
|
|
\nRemarks: 1. If the filter list does not exist it will be created.\
|
|
\n 2. To specify the current computer address, set srcaddr/dstaddr=me\
|
|
\n To specify all computer addresses, set srcaddr/dstaddr=any\
|
|
\n 3. Server type can be WINS, DNS, DHCP or GATEWAY.\
|
|
\n 4. If source is a server type, then dest is 'me' and vice-versa.\
|
|
\n\
|
|
\nExamples: 1. add filter filterlist=Filter1 192.145.168.0 192.145.168.45\
|
|
\n srcmask=24 dstmask=32\
|
|
\n 2. add filter filterlist=Filter1 srcaddr=DHCP dstaddr=0.0.0.0\
|
|
\n protocol=ICMP srcmask=255.255.255.255 dstmask=255.255.255.255\
|
|
\n 3. add filter filterlist=Filter1 srcaddr=me dstaddr=any\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_ADD_FILTERACTIONS "Creates a filter action.\n"
|
|
HLP_STATIC_ADD_FILTERACTIONS_EX "\
|
|
\nUsage:\
|
|
\n filteraction [ name = ] <string>\
|
|
\n [ [ description = ] <string> ]\
|
|
\n [ [ qmpfs = ] (yes | no) ]\
|
|
\n [ [ inpass = ] (yes | no) ]\
|
|
\n [ [ soft = ] (yes | no) ]\
|
|
\n [ [ action = ] (permit | block | negotiate) ]\
|
|
\n [ [ qmsecmethods = ] (neg#1 neg#2 ... neg#n) ]\
|
|
\n\
|
|
\n Creates a filter action.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the filter action.\
|
|
\n description -Brief information about the type of filter action.\
|
|
\n qmpfs -Option to set quick mode perfect forward secrecy.\
|
|
\n inpass -Accept unsecured communication, but always respond\
|
|
\n using IPSec. This takes a value of either ‘yes’ or ‘no’.\
|
|
\n soft -Allow unsecured communication with non-IPSec-aware\
|
|
\n computers. This takes a value of either ‘yes’ or ‘no’.\
|
|
\n action -This takes permit, block or negotiate.\
|
|
\n qmsecmethods -IPSec offer in one of the following formats:\
|
|
\n ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n AH[HashAlg]:k/s\
|
|
\n AH[HashAlg]+ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n where ConfAlg can be DES or 3DES or None.\
|
|
\n where AuthAlg can be MD5 or SHA1 or None.\
|
|
\n where HashAlg is MD5 or SHA1.\
|
|
\n where k is Lifetime in kilobytes.\
|
|
\n where s is Lifetime in seconds.\
|
|
\n\
|
|
\nRemarks: Quick mode security methods are ignored if the action is not\
|
|
\n ‘negotiate’\
|
|
\nExamples: add filteraction name=FilterA qmpfs=yes soft=y action=negotiate\
|
|
\n qmsec=""AH[MD5]:204800k/300s ESP[DES,SHA1]:30000k/480s""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_ADD_RULE "Creates a rule for the specified policy.\n"
|
|
HLP_STATIC_ADD_RULE_EX "\
|
|
\nUsage:\
|
|
\n rule [ name = ] <string>\
|
|
\n [ policy = ] <string>\
|
|
\n [ filterlist = ] <string> \
|
|
\n [ filteraction = ] <string> \
|
|
\n [ [ tunnel = ] (ip | dns) ]\
|
|
\n [ [ conntype = ] (lan | dialup | all) ]\
|
|
\n [ [ activate = ] (yes | no) ]\
|
|
\n [ [ description = ] <string> ]\
|
|
\n [ [ kerberos = ] (yes | no) ]\
|
|
\n [ [ psk = ] <preshared key> ]\
|
|
\n [ [ rootca = ] ""<certificate> certmap:(yes | no) excludecaname:(yes | no)"" ]\
|
|
\n\
|
|
\n Creates a rule with the specified filter list and filter action.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the rule.\
|
|
\n policy -Name of the policy the rule belongs to.\
|
|
\n filterlist -Name of the filter list to be used.\
|
|
\n filteraction -Name of the filter action to be used.\
|
|
\n tunnel -Tunnel end point IP address.\
|
|
\n conntype -Connection type can be lan, dialup or ‘all’.\
|
|
\n activate -Activates the rule in the policy if ‘yes’ is specified.\
|
|
\n description -Brief information about the rule.\
|
|
\n kerberos -Provides Kerberos authentication if ‘yes’ is specified.\
|
|
\n psk -Provides authentication using a specified preshared key.\
|
|
\n rootca -Provides authentication using a specified root certificate,\
|
|
\n attempts to map the cert if certmap:Yes is specified,\
|
|
\n excludes the CA name if excludecaname:Yes is specified.\
|
|
\n\
|
|
\nRemarks: 1. Certificate, mapping, and CA name settings are all to be within\
|
|
\n quotes; embedded quotes are to be replaced with \'.\
|
|
\n 2. Certificate mapping is valid only for domain members.\
|
|
\n 3. Multiple certificates can be provided by using the rootca\
|
|
\n parameter multiple times.\
|
|
\n 4. The preference of each authentication method is determined by\
|
|
\n its order in the command.\
|
|
\n 5. If no auth methods are stated, dynamic defaults are used.\
|
|
\n 6. Excluding the root certification authority (CA) name prevents\
|
|
\n the name from being sent as part of the certificate request.\
|
|
\n\
|
|
\nExamples: add rule name=Rule policy=Policy filterlist=Filterlist\
|
|
\n filteraction=FilterAction kerberos=yes psk=""my key""\
|
|
\n rootca=""C=US,O=MSFT,CN=Microsoft Authenticode(tm) Root Authority""\
|
|
\n rootca=""C=US,O=MSFT,CN=\\’Microsoft North, South, East, and West Root\
|
|
\n Authority\\’ certmap:yes excludecaname:no""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SET_POLICY "Modifies a policy.\n"
|
|
HLP_STATIC_SET_POLICY_EX "\
|
|
\nUsage:\
|
|
\n policy [ name = ] <string> | [ guid = ] <guid>\
|
|
\n [ [ newname = ] <string> ]\
|
|
\n [ [ description = ] <string> ]\
|
|
\n [ [ mmpfs = ] (yes | no) ]\
|
|
\n [ [ qmpermm = ] <integer> ]\
|
|
\n [ [ mmlifetime = ] <integer> ]\
|
|
\n [ [ activatedefaultrule = ] ( yes | no) ]\
|
|
\n [ [ pollinginterval = ] <integer> ]\
|
|
\n [ [ assign = ] (yes | no) ]\
|
|
\n [ [ gponame = ] <string> ]\
|
|
\n [ [ mmsecmethods = ] (sec#1 sec#2 ... sec#n) ]\
|
|
\n\
|
|
\n Modifies a policy.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | guid -Name of the policy, or guid.\
|
|
\n newname -New name.\
|
|
\n description -Brief information.\
|
|
\n mmpfs -Sets master perfect forward secrecy.\
|
|
\n qmpermm -Number of quick modes per main mode.\
|
|
\n mmlifetime -Time in minutes to rekey.\
|
|
\n activatedefaultrule -Activates the default response rule.\
|
|
\n pollinginterval -Time in minutes to check for change in policy store.\
|
|
\n assign -Assigns the policy.\
|
|
\n gponame -Local AD group policy object name to which the policy\
|
|
\n can be assigned. Valid when the store is domain.\
|
|
\n mmsecmethods -List of one or more space separated security\
|
|
\n methods in the form of ConfAlg-HashAlg-GroupNum.\
|
|
\n\
|
|
\nRemarks: 1. If mmpfs is specified, qmpermm is set to 1.\
|
|
\n 2. A GPO name can only be specified if the store is set to domain.\
|
|
\n\
|
|
\nExamples: 1. set policy name=Policy mmpfs=y gpo=DomainPolicy assign=y\
|
|
\n 2. set policy guid={11E6E97E-0031-49f5-AC7D-5F2FE99BABAF}\
|
|
\n newname=NewName gpo=DefaultDomainPolicy assign=y\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SET_FILTERLIST "Modifies a filter list.\n"
|
|
|
|
HLP_STATIC_SET_FILTERLIST_EX "\
|
|
\nUsage:\
|
|
\n filterlist [ name = ] <string> | [ guid = ] <guid>\
|
|
\n [ [ newname = ] <string> ]\
|
|
\n [ [ description = ] <string> ]\
|
|
\n\
|
|
\n Modifies a filter list name and description.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | guid -Name of the filter list or guid.\
|
|
\n newname -New name of the filter list.\
|
|
\n description -Brief information about the filter list.\
|
|
\n\
|
|
\nExamples: 1. set filterlist Filter1 desc=NewFilter1\
|
|
\n 2. set filterlist guid={11E6E97E-0031-49f5-AC7D-5F2FE99BABAF}\
|
|
\n newname=FilterName\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SET_FILTERACTIONS "Modifies a filter action.\n"
|
|
HLP_STATIC_SET_FILTERACTIONS_EX "\
|
|
\nUsage:\
|
|
\n filteraction [ name = ] <string> | [ guid = ] <guid>\
|
|
\n [ [ newname = ] <string> ]\
|
|
\n [ [ description = ] <string> ]\
|
|
\n [ [ qmpfs = ] (yes | no) ]\
|
|
\n [ [ inpass = ] (yes | no) ]\
|
|
\n [ [ soft = ] (yes | no) ]\
|
|
\n [ [ action = ] (permit | block | negotiate) ]\
|
|
\n [ [ qmsecmethods = ] (neg#1 neg#2 ... neg#n) ]\
|
|
\n\
|
|
\n Modifies a filter action.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | guid -Name or guid of the filter action.\
|
|
\n newname -New name of the filter action.\
|
|
\n description -Brief information about the filter action.\
|
|
\n qmpfs -Option to set quick mode perfect forward secrecy.\
|
|
\n inpass -Accept unsecured communication, but always respond\
|
|
\n using IPSec. This takes a value of either ‘yes’ or ‘no’.\
|
|
\n soft -Allow unsecured communication with non-IPSec-aware computers.\
|
|
\n This takes a value of either ‘yes’ or ‘no’.\
|
|
\n action -This takes permit or block or negotiate.\
|
|
\n qmsecmethods -IPSec offer in one of the following formats:\
|
|
\n ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n AH[HashAlg]:k/s\
|
|
\n AH[HashAlg]+ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n where ConfAlg can be DES or 3DES or None.\
|
|
\n where AuthAlg can be MD5 or SHA1 or None.\
|
|
\n where HashAlg is MD5 or SHA1.\
|
|
\n where k is lifetime in kilobytes.\
|
|
\n where s is lifetime in seconds.\
|
|
\n\
|
|
\nExamples:1. set filteraction name=test qmsec=ESP[3DES,MD5]:100000k/2000s\
|
|
\n 2. set filteraction guid={11E6E97E-0031-49f5-AC7D-5F2FE99BABAF}\
|
|
\n inpass=y\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SET_RULE "Modifies a rule.\n"
|
|
HLP_STATIC_SET_RULE_EX "\
|
|
\nUsage:\
|
|
\n rule [ name = ] <string> | [id= ] <integer>\
|
|
\n [ policy = ] <string>\
|
|
\n [ [ newname = ] <string> ]\
|
|
\n [ [ description = ] <string> ]\
|
|
\n [ [ filterlist = ] <string> ]\
|
|
\n [ [ filteraction = ] <string> ]\
|
|
\n [ [ tunnel = ] (ip | dns) ]\
|
|
\n [ [ conntype = ] (lan | dialup | all) ]\
|
|
\n [ [ activate = ] (yes | no) ]\
|
|
\n [ [ kerberos = ] (yes | no) ]\
|
|
\n [ [ psk = ] <preshared key> ]\
|
|
\n [ [ rootca = ] ""<certificate> certmap:(yes | no) excludecaname:(yes | no)"" ]\
|
|
\n\
|
|
\n Modifies a rule in a policy.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | id -Name or ID of the rule.\
|
|
\n policy -Name of the policy, the rule belongs to.\
|
|
\n newname -New name of the rule.\
|
|
\n description -Brief information about the rule.\
|
|
\n filterlist -Name of the filter list to be used.\
|
|
\n filteraction -Name of the filter action to be used.\
|
|
\n tunnel -Tunnel ip address or dns name.\
|
|
\n conntype -Connection type can be ‘lan’, ‘dialup’ or ‘all’.\
|
|
\n activate -Activates the rule in the policy if ‘yes’ is specified.\
|
|
\n kerberos -Provides Kerberos authentication if ‘yes’ is specified.\
|
|
\n psk -Provides authentication using a specified preshared key.\
|
|
\n rootca -Provides authentication using a specified root certificate,\
|
|
\n attempts to map the cert if certmap:Yes is specified,\
|
|
\n excludes the CA name if excludecaname:Yes is specified.\
|
|
\n\
|
|
\nRemarks: 1. Certificate, mapping, and CA name settings are all to be within\
|
|
\n quotes; embedded quotes are to be replaced with \'.\
|
|
\n 2. Certificate mapping is valid only for domain members.\
|
|
\n 3. Multiple certificates can be provided by using the rootca\
|
|
\n parameter multiple times.\
|
|
\n 4. The preference of each authentication method is determined by\
|
|
\n its order in the command.\
|
|
\n 5. If no auth methods are stated, dynamic defaults are used.\
|
|
\n 6. All authentication methods are overwritten with the stated list.\
|
|
\n 7. Excluding the root certification authority (CA) name prevents\
|
|
\n the name from being sent as part of the certificate request.\
|
|
\n\
|
|
\nExamples: 1. set rule name=Rule policy=Policy activate=yes\
|
|
\n rootca=""C=US,O=MSFT,CN=\\’Microsoft North, South, East, and West\
|
|
\n Root Authority\\’ certmap:yes excludecaname:no""\
|
|
\n 2. set rule id=3 Policy newname=RuleNew tunnel=192.165.123.156\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SET_STORE "Sets the current policy store.\n"
|
|
HLP_STATIC_SET_STORE_EX "\
|
|
\nUsage:\
|
|
\n store [location = ] (local | persistent | domain)\
|
|
\n [ [ domain = ] <string> ]\
|
|
\n\
|
|
\nSets the current IPSec policy storage location.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n location Location of the IPSec policy store.\
|
|
\n domain Domain name (only applies to the domain location).\
|
|
\n\
|
|
\nRemarks: 1. The persistent store contains IPSec policies that can be\
|
|
\n assigned to secure this computer at start time. An assigned\
|
|
\n persistent policy remains active even after the local policy or\
|
|
\n domain policy is applied.\
|
|
\n 2. The local store contains IPSec policies that can be assigned to\
|
|
\n secure this computer. If a domain policy is available, the\
|
|
\n domain policy is applied instead of the local policy.\
|
|
\n 3. The domain store contains IPSec policies that can be assigned to\
|
|
\n secure groups of computers in a domain.\
|
|
\n 4. It is recommended that the persistent policy be the most\
|
|
\n restrictive of all policies. Domain policies and local policies\
|
|
\n should complement persistent policies.\
|
|
\n 5. Use the 'set machine' command to configure a remote computer.\
|
|
\n 6. The default store is Local. Changes to the store setting persist\
|
|
\n only as long as the current Netsh session. If you need to run\
|
|
\n multiple commands in the same store from a batch file, use the\
|
|
\n ‘Netsh Exec’ when executing your batch file.\
|
|
\n\
|
|
\nExamples: 1. set store location=local\
|
|
\n - uses the local store of the current computer.\
|
|
\n 2. set store location=persistent\
|
|
\n - uses the persistent store of the current computer.\
|
|
\n 3. set store location=domain domain=example.microsoft.com\
|
|
\n - uses the domain policy store for example.microsoft.com.\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SET_DEFAULTRULE "Modifies the default response rule of a policy.\n"
|
|
HLP_STATIC_SET_DEFAULTRULE_EX "\
|
|
\nUsage:\
|
|
\n defaultrule [ policy = ] <string>\
|
|
\n [ [ qmpfs = ] (yes | no) ]\
|
|
\n [ [ activate = ] (yes | no) ]\
|
|
\n [ [ qmsecmethods = ] (neg#1 neg#2 ... neg#n) ]\
|
|
\n [ [ kerberos = ] (yes | no) ]\
|
|
\n [ [ psk = ] <preshared key> ]\
|
|
\n [ [ rootca = ] ""<certificate> certmap:(yes | no) excludecaname:(yes | no)"" ]\
|
|
\n\
|
|
\n Modifies the default response rule of the specified policy.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n policy -Name of the policy for which the default response rule is\
|
|
\n to be modified.\
|
|
\n qmpfs -Option to set quick mode perfect forward secrecy.\
|
|
\n activate -Activates the rule in the policy if ‘yes’ is specified.\
|
|
\n qmsecmethods -IPSec offer in one of the following formats:\
|
|
\n ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n AH[HashAlg]:k/s\
|
|
\n AH[HashAlg]+ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n where ConfAlg can be DES, or 3DES or None.\
|
|
\n where AuthAlg can be MD5, or SHA1 or None.\
|
|
\n where HashAlg is MD5 or SHA1.\
|
|
\n where k is lifetime in kilobytes.\
|
|
\n where s is lifetime in seconds.\
|
|
\n kerberos -Provides Kerberos authentication if ‘yes’ is specified.\
|
|
\n psk -Provides authentication using a specified preshared key.\
|
|
\n rootca -Provides authentication using a specified root certificate,\
|
|
\n attempts to map the cert if certmap:Yes is specified,\
|
|
\n excludes the CA name if excludecaname:Yes is specified.\
|
|
\n\
|
|
\nRemarks: 1. Certificate, mapping, and CA name settings are all to be within\
|
|
\n quotes; embedded quotes are to be replaced with \'.\
|
|
\n 2. Certificate mapping is valid only for domain members.\
|
|
\n 3. Multiple certificates can be provided by using the rootca\
|
|
\n parameter multiple times.\
|
|
\n 4. The preference of each authentication method is determined by\
|
|
\n its order in the command.\
|
|
\n 5. If no auth methods are stated, dynamic defaults are used.\
|
|
\n\
|
|
\nExamples: set defaultrule Policy1 activate=y\
|
|
\n qmsec=""AH[MD5]+ESP[3DES,MD5]:100000k/2000s""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_DELETE_ALL "Deletes all policies, filter lists, and filter actions.\n"
|
|
HLP_STATIC_DELETE_ALL_EX "\
|
|
\nUsage:\
|
|
\n all\
|
|
\n\
|
|
\n Deletes all policies, filter lists, and filter actions.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExamples: delete all\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_DELETE_POLICY "Deletes a policy and its rules.\n"
|
|
HLP_STATIC_DELETE_POLICY_EX "\
|
|
\nUsage:\
|
|
\n policy [ name = ] <string> | [ all ]\
|
|
\n\
|
|
\n Deletes the policy and all its associated rules.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | all -Name of the policy or ‘all’.\
|
|
\n\
|
|
\nRemarks: If 'all' is specified, all policies are deleted.\
|
|
\n\
|
|
\nExamples: 1. delete policy all\
|
|
\n - deletes all policies.\
|
|
\n 2. delete policy name=Policy1\
|
|
\n - deletes the policy named Policy1.\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_DELETE_FILTERLIST "Deletes a filter list.\n"
|
|
HLP_STATIC_DELETE_FILTERLIST_EX "\
|
|
\nUsage:\
|
|
\n filterlist [name = ] <string> | [ all ]\
|
|
\n\
|
|
\n Deletes the filter list and all of its associated filters.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | all -Name of the filter list or ‘all’.\
|
|
\n\
|
|
\nRemarks: If 'all' is specified, all filter lists are deleted.\
|
|
\n\
|
|
\nExamples: delete filterlist all\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_DELETE_FILTER "Deletes a filter from a filter list.\n"
|
|
HLP_STATIC_DELETE_FILTER_EX "\
|
|
\nUsage:\
|
|
\n filter [ filterlist = ] <string>\
|
|
\n [ srcaddr = ] (ip | dns | server)\
|
|
\n [ dstaddr = ] (ip | dns | server)\
|
|
\n [ [ protocol = ] (ANY | ICMP | TCP | UDP | RAW | <integer>) ]\
|
|
\n [ [ srcmask = ] (mask | prefix) ]\
|
|
\n [ [ dstmask = ] (mask | prefix) ]\
|
|
\n [ [ srcport = ] <port> ]\
|
|
\n [ [ dstport = ] <port> ]\
|
|
\n [ [ mirrored = ] (yes | no) ]\
|
|
\n\
|
|
\n Deletes a filter from a filter list\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n filterlist -Name of the filter list to which the filter was added.\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n protocol -Can be ANY, ICMP, TCP, UDP, RAW, or an integer.\
|
|
\n srcmask -Source address mask or a prefix of 1 through 32.\
|
|
\n dstmask -Destination address mask or a prefix of 1 through 32.\
|
|
\n srcport -Source port of the packet. A value of 0 means any port\
|
|
\n dstport -Destination port of the packet. A value of 0 means any port.\
|
|
\n mirrored -‘Yes’ creates two filters, one in each direction.\
|
|
\n\
|
|
\nRemarks: 1. Deletes the exact match filter from the filter list.\
|
|
\n 2. To specify the current computer address, set srcaddr/dstaddr=me\
|
|
\n To specify all computer addresses, set srcaddr/dstaddr=any\
|
|
\n 3. Server type can be WINS, DNS, DHCP or GATEWAY.\
|
|
\n 4. If source is a server, then dest is set to 'me' and vice-versa.\
|
|
\n\
|
|
\nExamples: 1. delete filter FilterList1 src=fum.com dst=fum.com\
|
|
\n 2. delete filter Filter1 srcaddr=me dstaddr=any proto=TCP\
|
|
\n 3. delete filter Filter1 srcaddr=GATEWAY dstaddr=0.0.0.0 proto=TCP\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_DELETE_FILTERACTIONS "Deletes a filter action.\n"
|
|
HLP_STATIC_DELETE_FILTERACTIONS_EX "\
|
|
\nUsage:\
|
|
\n filteraction [ name = ] <string> | [ all ]\
|
|
\n\
|
|
\n Deletes a filter action.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | all -Name of the filter action or ‘all’.\
|
|
\n\
|
|
\nRemarks: If 'all' is specified, all filter actions are deleted.\
|
|
\n\
|
|
\nExamples: 1. delete filteraction FilterA\
|
|
\n 2. delete filteraction all\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_DELETE_RULE "Deletes a rule from a policy.\n"
|
|
HLP_STATIC_DELETE_RULE_EX "\
|
|
\nUsage:\
|
|
\n rule [ name = ] <string> | [ id = ] <integer> | [ all ]\
|
|
\n [ policy = ] <string>\
|
|
\n\
|
|
\n Deletes a rule from a policy.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | id | all -Name of the rule, ID of the rule, or ‘all’\
|
|
\n policy -Name of the policy.\
|
|
\n\
|
|
\nRemarks: 1. If 'all' is specified, deletes all rules from the policy except\
|
|
\n the default response rule.\
|
|
\n 2. The default response rule cannot be deleted.\
|
|
\n 3. The IDs will change with every delete.\
|
|
\n\
|
|
\nExamples: 1. delete rule id=1 Policy1\
|
|
\n -deletes the rule with id=1 from Policy1.\
|
|
\n 2. delete rule all Policy1\
|
|
\n -deletes all the rules from Policy1.\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SHOW_POLICY "Displays policy details.\n"
|
|
HLP_STATIC_SHOW_POLICY_EX "\
|
|
\nUsage:\
|
|
\n policy [ name = ] <string> | [ all ]\
|
|
\n [ [ level = ] (verbose | normal) ]\
|
|
\n [ [ format = ] (list | table) ]\
|
|
\n [ [ wide = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays the details of a policy\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | all -Name of the policy or ‘all’.\
|
|
\n level -Verbose or normal.\
|
|
\n format -Output in screen or tab-delimited format.\
|
|
\n wide -If set to ‘no’, the name and description are truncated\
|
|
\n to fit the screen width of 80 characters.\
|
|
\n\
|
|
\nRemarks: If 'all' is specified, all policy details are displayed.\
|
|
\n\
|
|
\nExamples: show policy Policy1 wide=yes format=table\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SHOW_FILTERLIST "Displays filter list details.\n"
|
|
HLP_STATIC_SHOW_FILTERLIST_EX "\
|
|
\nUsage:\
|
|
\n filterlist [ name = ] <string> | [ rule = ] <string> | [ all ]\
|
|
\n [ [ level = ] (verbose | normal) ]\
|
|
\n [ [ format = ] (list | table) ]\
|
|
\n [ [ resolvedns = ] (yes | no) ]\
|
|
\n [ [ wide = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays the details of a filter list\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | rule | all -Name of the filter list, rule name, or ‘all’.\
|
|
\n level -Verbose or normal.\
|
|
\n format -Output in screen or tab-delimited format.\
|
|
\n resolvedns -Value of ‘yes’ will force the verbose output to show\
|
|
\n the current dns mapping for ip addresses and dns\
|
|
\n names that are stored in the filter fields.\
|
|
\n wide -If set to ‘no’, the name and description are truncated\
|
|
\n to fit the screen width of 80 characters.\
|
|
\n\
|
|
\nRemarks: If 'all' is specified, all filter lists are displayed.\
|
|
\n\
|
|
\nExamples: show filterlist Filterlist=Filterlist1 resolvedns=yes wide=yes\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SHOW_FILTERACTIONS "Displays filter action details.\n"
|
|
HLP_STATIC_SHOW_FILTERACTIONS_EX "\
|
|
\nUsage:\
|
|
\n filteraction [ name = ] <string> | [ rule = ] <string> | [ all ]\
|
|
\n [ [ level = ] (verbose | normal) ]\
|
|
\n [ [ format = ] (list | table) ]\
|
|
\n [ [ wide = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays the details of a filter action\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | rule | all -Name of the filter action, rule name, or ‘all’.\
|
|
\n level -Verbose or normal.\
|
|
\n format -Output in screen or tab-delimited format\
|
|
\n wide -If set to ‘no’, the name and description are truncated\
|
|
\n to fit the screen width of 80 characters.\
|
|
\n\
|
|
\nRemarks: If 'all' is specified, all filter actions are displayed.\
|
|
\n\
|
|
\nExamples: 1. show filteraction FilterAction1\
|
|
\n - shows the details of the filter action named FilterAction1\
|
|
\n 2. show filteraction rule=Rule1\
|
|
\n - shows the filter action used by the rule named Rule1\
|
|
\n 3. show filteraction all\
|
|
\n - shows all filter actions\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SHOW_RULE "Displays rule details.\n"
|
|
HLP_STATIC_SHOW_RULE_EX "\
|
|
\nUsage:\
|
|
\n rule [ name = ] <string> | [ id = ] <integer> ] | [ all ] | [default]\
|
|
\n [ policy = ] <string> \
|
|
\n [ [ type = ] (tunnel | tranport) ]\
|
|
\n [ [ level = ] (verbose | normal) ]\
|
|
\n [ [ format = ] (list | table) ]\
|
|
\n [ [ wide = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays the details of rules for the policy.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | id | all | default -Name of the rule, its id, ‘all’, or ‘default’.\
|
|
\n policy -Name of the policy.\
|
|
\n type -Rule type is ‘transport’ or ‘tunnel’.\
|
|
\n level -Verbose or normal.\
|
|
\n format -Output in screen or tab-delimited format.\
|
|
\n wide -If set to ‘no’, the name and description are\
|
|
\n truncated to fit the screen width of 80\
|
|
\n characters.\
|
|
\n\
|
|
\nRemarks: 1. If ‘all’ is specified, all rules are displayed.\
|
|
\n 2. If the type parameter is specified, 'all' needs to be specified.\
|
|
\n\
|
|
\nExamples: 1. show rule all type=transport policy=Policy1\
|
|
\n - shows all the transport rules of the policy named Policy1.\
|
|
\n 2. show rule id=1 policy=Policy1\
|
|
\n - shows the first rule of the policy.\
|
|
\n 3. show rule default policy=Policy1\
|
|
\n - shows the details of the default response rule of Policy1.\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SHOW_GPOASSIGNEDPOLICY "Displays details of a group assigned policy.\n"
|
|
HLP_STATIC_SHOW_GPOASSIGNEDPOLICY_EX "\
|
|
\nUsage:\
|
|
\n gpoassignedpolicy [name = ] <string>\
|
|
\n\
|
|
\n Displays the details of the active policy for the specified GPO.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n Name -Local AD Group policy object name.\
|
|
\n\
|
|
\n\nRemarks: 1. if the current store is domain, the name parameter\
|
|
\n is required, otherwise it is not allowed\
|
|
\n\
|
|
\nExamples: 1. show gpoassignedpolicy name=GPO1\
|
|
\n - shows the assigned domain policy to GPO1.\
|
|
\n 2. show gpoassignedpolicy\
|
|
\n - shows currently assigned policy on this computer.\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SHOW_ALL "Displays details of all policies and related information.\n"
|
|
HLP_STATIC_SHOW_ALL_EX "\
|
|
\nUsage:\
|
|
\n all [ [ format = ] (list | table) ]\
|
|
\n [ [ wide = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays all policies, filter lists, and filter actions.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n format -Output in screen or tab-delimited format.\
|
|
\n wide -If set to ‘no’, the name and description are truncated\
|
|
\n to fit the screen width of 80 characters.\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExamples: show all\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_STATIC_SHOW_STORE "Displays the current policy store.\n"
|
|
HLP_STATIC_SHOW_STORE_EX "\
|
|
\nUsage:\
|
|
\n store\
|
|
\n\
|
|
\nExamples: show store\
|
|
\n\
|
|
\n"
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Help strings for Dynamic context
|
|
//
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
HLP_DYNAMIC_GROUP_ADD "Adds policy, filter, and actions to SPD.\n"
|
|
HLP_DYNAMIC_GROUP_SET "Modifies policy, filter, and actions in SPD.\n"
|
|
HLP_DYNAMIC_GROUP_DELETE "Deletes policy, filter, and actions from SPD.\n"
|
|
HLP_DYNAMIC_GROUP_SHOW "Displays policy, filter, and actions from SPD.\n"
|
|
|
|
HLP_DYNAMIC_ADD_MMPOLICY "Adds a main mode policy to SPD.\n"
|
|
HLP_DYNAMIC_ADD_QMPOLICY "Adds a quick mode policy to SPD.\n"
|
|
|
|
HLP_DYNAMIC_ADD_MMFILTER "Adds a main mode filter to SPD.\n"
|
|
HLP_DYNAMIC_ADD_QMFILTER "Adds a quick mode filter to SPD.\n"
|
|
HLP_DYNAMIC_ADD_RULE "Adds a rule and associated filters to SPD.\n"
|
|
|
|
HLP_DYNAMIC_ADD_MMPOLICY_EX "\
|
|
\nUsage:\
|
|
\n mmpolicy [ name = ] <string>\
|
|
\n [ [ qmpermm = ] <integer> ]\
|
|
\n [ [ mmlifetime = ] <integer> ]\
|
|
\n [ [ softsaexpirationtime = ] <integer> ]\
|
|
\n [ [ mmsecmethods = ] (sec#1 sec#2 ... sec#n) ]\
|
|
\n\
|
|
\n Adds a main mode policy to SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the main mode policy.\
|
|
\n qmpermm -Number of quick mode sessions per main mode session\
|
|
\n of IKE.\
|
|
\n mmlifetime -Time in minutes to rekey for main mode of IKE.\
|
|
\n softsaexpirationtime -Time in minutes for an unprotected SA to expire.\
|
|
\n mmsecmethods -List of one or more space separated security\
|
|
\n methods in the form of ConfAlg-HashAlg-GroupNum.\
|
|
\n where ConfAlg can be DES or 3DES\
|
|
\n where HashAlg can be MD5 or SHA1\
|
|
\n GroupNum can be 1 (Low) or 2 (Med) or 3 (DH2048).\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExamples: add mmp name=mmp qmpermm=10 mmlifetime=300 softsa=20\
|
|
\n mmsec=""3DES-SHA1-3 DES-SHA1-2 3DES-MD5-3""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_ADD_QMPOLICY_EX "\
|
|
\nUsage:\
|
|
\n qmpolicy [ name = ] <string>\
|
|
\n [ [ soft = ] (yes | no) ]\
|
|
\n [ [ pfsgroup = ] (GRP1 | GRP2 | GRP3 | GRPMM | NOPFS) ]\
|
|
\n [ [ qmsecmethods = ] (neg#1 neg#2 ... neg#n) ]\
|
|
\n\
|
|
\n Adds a quick mode policy to SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the quick mode policy.\
|
|
\n soft -Allow unsecured communication with non-IPSec-aware\
|
|
\n computers.\
|
|
\n This takes a value of either ‘yes’ or ‘no’.\
|
|
\n pfsgroup -GRP1,GRP2,GRP3,GRPMM,NOPFS(default).\
|
|
\n qmsecmethods -IPSec offer in one of the following formats:\
|
|
\n ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n AH[HashAlg]:k/s\
|
|
\n AH[HashAlg]+ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n where ConfAlg can be DES or 3DES or None.\
|
|
\n where AuthAlg can be MD5 or SHA1 or None.\
|
|
\n where HashAlg is MD5 or SHA1.\
|
|
\n where k is lifetime in kilobytes.\
|
|
\n where s is lifetime in seconds.\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExamples: add qmpolicy name=qmp\
|
|
\n qmsec=""AH[MD5]:10000k/24800s ESP[DES,SHA1]:30000k/300s""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_ADD_RULE_EX "\
|
|
\nUsage:\
|
|
\n rule [ srcaddr = ] (ip | dns | server)\
|
|
\n [ dstaddr = ] (ip | dns | server)\
|
|
\n [ mmpolicy = ] <string>\
|
|
\n [ [ qmpolicy = ] <string> ]\
|
|
\n [ [ protocol = ] (ANY | ICMP | TCP | UDP | RAW | <integer>) ]\
|
|
\n [ [ srcport = ] <port> ]\
|
|
\n [ [ dstport = ] <port> ]\
|
|
\n [ [ mirrored = ] (yes | no) ]\
|
|
\n [ [ conntype = ] (lan | dialup | all) ]\
|
|
\n [ [ actioninbound = ] (permit | block | negotiate) ]\
|
|
\n [ [ actionoutbound = ] (permit | block | negotiate) ]\
|
|
\n [ [ srcmask = ] (mask | prefix) ]\
|
|
\n [ [ dstmask = ] (mask | prefix) ]\
|
|
\n [ [ tunneldstaddress = ] (ip | dns) ]\
|
|
\n [ [ kerberos = ] (yes | no) ]\
|
|
\n [ [ psk = ] <preshared key> ]\
|
|
\n [ [ rootca = ] ""<certificate> certmap:(yes | no) excludecaname:(yes | no)"" ]\
|
|
\n\
|
|
\n Adds a Rule.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n mmpolicy -Main mode policy\
|
|
\n qmpolicy -Quick mode policy\
|
|
\n protocol -Can be ANY, ICMP, TCP, UDP, RAW, or an integer.\
|
|
\n srcport -Source port(0 means any port)\
|
|
\n dstport -Destination port(0 means any port)\
|
|
\n mirrored -‘Yes' creates two filters, one in each direction.\
|
|
\n conntype -Connection type\
|
|
\n actioninbound -Action for inbound packets\
|
|
\n actionoutbound -Action for outbound packets\
|
|
\n srcmask -Source address mask or a prefix of 1 through 32.\
|
|
\n dstmask -Destination address mask or a prefix of 1 through 32.\
|
|
\n tunneldstaddress -Tunnel destination ip address or dns name.\
|
|
\n kerberos -Provides kerberos authentication if ‘yes’ is specified.\
|
|
\n psk -Provides authentication using a specified preshared key.\
|
|
\n rootca -Provides authentication using a specified root certificate,\
|
|
\n attempts to map the cert if certmap:Yes is specified,\
|
|
\n excludes the CA name if excludecaname:Yes is specified.\
|
|
\n\
|
|
\nRemarks: 1. Port valid for TCP and UDP.\
|
|
\n 2. Server type can be WINS, DNS, DHCP or GATEWAY\
|
|
\n 3. Default for actioninbound and actionoutbound is ‘negotiate’.\
|
|
\n 4. For tunnel rules, mirrored must be set to 'no'.\
|
|
\n 5. Certificate, mapping, and CA name settings are all to be within\
|
|
\n quotes; embedded quotes are to be replaced with \'.\
|
|
\n 6. Certificate mapping is valid only for domain members.\
|
|
\n 7. Multiple certificates can be provided by using the rootca\
|
|
\n parameter multiple times.\
|
|
\n 8. The preference of each authentication method is determined by its\
|
|
\n order in the command.\
|
|
\n 9. If no auth methods are stated, dynamic defaults are used.\
|
|
\n 10. Excluding the root certification authority (CA) name prevents the\
|
|
\n name from being sent as part of the certificate request.\
|
|
\n\
|
|
\nExample: add rule srcaddr=192.168.145.110 dstaddr=192.168.145.215 mmpolicy=mmp\
|
|
\n qmpolicy=qmp mirrored=no srcmask=32 dstmask=255.255.255.255\
|
|
\n rootca=""C=US,O=MSFT,CN=Microsoft Authenticode(tm) Root Authority""\
|
|
\n rootca=""C=US,O=MSFT,CN=\\’Microsoft North, South, East, and West Root\
|
|
\n Authority\\’ certmap:yes excludecaname:no""\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SET_QMPOLICY "Modifies a quick mode policy in SPD.\n"
|
|
HLP_DYNAMIC_SET_MMPOLICY "Modifies a main mode policy in SPD.\n"
|
|
HLP_DYNAMIC_SET_QMFILTER "Modifies a quick mode filter in SPD.\n"
|
|
HLP_DYNAMIC_SET_MMFILTER "Modifies a main mode filter in SPD.\n"
|
|
HLP_DYNAMIC_SET_RULE "Modifies a rule and associated filters in SPD.\n"
|
|
HLP_DYNAMIC_SET_CONFIG "Sets the IPSec configuration and boot time behavior.\n"
|
|
|
|
HLP_DYNAMIC_SET_MMPOLICY_EX "\
|
|
\nUsage:\
|
|
\n mmpolicy [ name = ] <string>\
|
|
\n [ [ qmpermm = ] <integer> ]\
|
|
\n [ [ mmlifetime = ] <integer> ]\
|
|
\n [ [ softsaexpirationtime = ] <integer> ]\
|
|
\n [ [ mmsecmethods = ] (sec#1 sec#2 ... sec#n) ]\
|
|
\n\
|
|
\n Modifies a main mode policy with the new parameters in SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the main mode policy.\
|
|
\n qmpermm -Number of quick mode sessions per main mode session\
|
|
\n of IKE.\
|
|
\n mmlifetime -Time in minutes to rekey for main mode of IKE.\
|
|
\n softsaexpirationtime -Time in minutes for an unprotected SA to expire.\
|
|
\n mmsecmethods -List of one or more space separated security\
|
|
\n methods in the form of ConfAlg-HashAlg-GroupNum,\
|
|
\n where ConfAlg can be DES or 3DES,\
|
|
\n HashAlg is MD5 or SHA1,\
|
|
\n GroupNum can be 1 (Low) or 2 (Med) or 3 (DH2048).\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExample: set mmpolicy name=mmp qmpermm=10 mmlife=10 mmsecmethod=3DES-MD5-3\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SET_QMPOLICY_EX "\
|
|
\nUsage:\
|
|
\n qmpolicy [ name = ] <string>\
|
|
\n [ [ soft = ] (yes | no) ]\
|
|
\n [ [ pfsgroup = ] (GRP1 | GRP2 | GRP3 | GRPMM | NOPFS) ]\
|
|
\n [ [ qmsecmethods = ] (neg#1 neg#2 ... neg#n) ]\
|
|
\n\
|
|
\n Modifies a quick mode policy in SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the quick mode policy.\
|
|
\n soft -Allow unsecured communication with\
|
|
\n non-IPSec-aware computers.\
|
|
\n This takes a value of either 'yes' or 'no'.\
|
|
\n pfsgroup -GRP1,GRP2,GRP3,GRPMM,NOPFS(default).\
|
|
\n qmsecmethods -IPSec offer in one of the following formats:\
|
|
\n ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n AH[HashAlg]:k/s\
|
|
\n AH[HashAlg]+ESP[ConfAlg,AuthAlg]:k/s\
|
|
\n where ConfAlg can be DES, or 3DES or None.\
|
|
\n where AuthAlg can be MD5, or SHA1 or None.\
|
|
\n where HashAlg is MD5 or SHA1.\
|
|
\n where k is lifetime in kilobytes.\
|
|
\n where s is lifetime in seconds.\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExample: set qmpolicy name=qmp pfsg=grp3\
|
|
\n qmsec=""AH[MD5]:100000k/29999s+ESP[DES,SHA1]""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SET_RULE_EX "\
|
|
\nUsage:\
|
|
\n rule [ srcaddr = ] (ip | dns | server)\
|
|
\n [ dstaddr = ] (ip | dns | server)\
|
|
\n [ protocol = ] (ANY | ICMP | TCP | UDP | RAW | <integer>)\
|
|
\n [ srcport = ] <port>\
|
|
\n [ dstport = ] <port>\
|
|
\n [ mirrored = ] (yes | no)\
|
|
\n [ conntype = ] (lan | dialup | all)\
|
|
\n [ [ srcmask = ] (mask | prefix) ]\
|
|
\n [ [ dstmask = ] (mask | prefix) ]\
|
|
\n [ [ tunneldstaddress = ] (ip | dns) ]\
|
|
\n [ [ mmpolicy = ] <string> ]\
|
|
\n [ [ qmpolicy = ] <string> ]\
|
|
\n [ [ actioninbound = ] (permit | block | negotiate) ]\
|
|
\n [ [ actionoutbound = ] (permit | block | negotiate) ]\
|
|
\n [ [ kerberos = ] (yes | no) ]\
|
|
\n [ [ psk = ] <preshared key> ]\
|
|
\n [ [ rootca = ] ""<certificate> certmap:(yes | no) excludecaname:(yes | no)"" ]\
|
|
\n\
|
|
\n Modifies a rule and associated filters in SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n protocol -Can be ANY, ICMP, TCP, UDP, RAW, or an integer.\
|
|
\n srcport -Source port (0 means any port)\
|
|
\n dstport -Destination port (0 means any port)\
|
|
\n mirrored -'Yes' creates two filters, one in each direction.\
|
|
\n conntype -Connection type\
|
|
\n srcmask -Source address mask or a prefix of 1 through 32.\
|
|
\n dstmask -Destination address mask or a prefix of 1 through 32.\
|
|
\n tunneldstaddress -Tunnel destination ip address or dns name.\
|
|
\n mmpolicy -Main mode policy\
|
|
\n qmpolicy -Quick mode policy\
|
|
\n actioninbound -Action for inbound packets\
|
|
\n actionoutbound -Action for outbound packets\
|
|
\n kerberos -Provides kerberos authentication if ‘yes’ is specified\
|
|
\n psk -Provides authentication using a specified preshared key\
|
|
\n rootca -Provides authentication using a specified root certificate,\
|
|
\n attempts to map the cert if certmap:Yes is specified,\
|
|
\n excludes the CA name if excludecaname:Yes is specified.\
|
|
\n\
|
|
\nRemarks: 1. Mmpolicy, qmpolicy, actioninbound, actionoutbound\
|
|
\n and authmethods can be set; other fields are identifiers.\
|
|
\n 2. Server type can be WINS, DNS, DHCP or GATEWAY\
|
|
\n 3. Certificate, mapping, and CA name settings are all to be within\
|
|
\n quotes; embedded quotes are to be replaced with \'.\
|
|
\n 4. Certificate mapping is valid only for domain members.\
|
|
\n 5. Multiple certificates can be provided by using the rootca\
|
|
\n parameter multiple times.\
|
|
\n 6. The preference of each authentication method is determined by\
|
|
\n its order in the command.\
|
|
\n 7. If no auth methods are stated, dynamic defaults are used.\
|
|
\n 8. All authentication methods are overwritten with the stated list.\
|
|
\n 9. Excluding the root certification authority (CA) name prevents\
|
|
\n the name from being sent as part of the certificate request.\
|
|
\n\
|
|
\nExamples: 1. set rule srca=WINS dsta=0.0.0.0 srcmask=32 dstmask=32\
|
|
\n tunneldst=192.168.145.1\
|
|
\n proto=tcp srcport=80 dstport=80 mir=no con=lan\
|
|
\n qmp=qmp actionin=negotiate actionout=permit\
|
|
\n 2. set rule srcaddr=192.168.145.110 dstaddr=192.168.145.215\
|
|
\n mmpolicy=mmp qmpolicy=qmp mirrored=no srcmask=32\
|
|
\n rootca=""C=US,O=MSFT,CN=Microsoft Authenticode(tm) Root Authority""\
|
|
\n rootca=""C=US,O=MSFT,CN=\\’Microsoft North, South, East, and West\
|
|
\n Root Authority\\’ certmap:yes excludecaname:no""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SET_CONFIG_EX "\
|
|
\nUsage:\
|
|
\n config [ property = ] (ipsecdiagnostics | ipsecexempt | ipsecloginterval | \
|
|
\n ikelogging | strongcrlcheck | bootmode | bootexemptions) ]\
|
|
\n [ value = ] <integer> | <bootmode> | <bootexemptions> ]\
|
|
\n\
|
|
\n Configures the parameters for IPSec.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n property -Property name.\
|
|
\n value -Value that corresponds to the property.\
|
|
\n\
|
|
\nRemarks: 1. Valid values for the properties are:\
|
|
\n ipsecdiagnostics - 0, 1, 2, 3, 4, 5, 6, 7\
|
|
\n ikelogging - 0, 1\
|
|
\n strongcrlcheck - 0, 1, 2\
|
|
\n ipsecloginterval - 60 to 86400 sec\
|
|
\n ipsecexempt - 0, 1, 2, 3\
|
|
\n bootmode - stateful, block, permit\
|
|
\n bootexemptions - none, ""exemption#1 exemption#2 ... exemption#n""\
|
|
\n where the quoted string specifies a list of\
|
|
\n protocols and ports to always allow during\
|
|
\n boot mode in the following format:\
|
|
\n Protocol:SrcPort:DstPort:Direction\
|
|
\n where protocol is ICMP, TCP, UDP,\
|
|
\n RAW, or <integer>\
|
|
\n where direction is inbound or outbound\
|
|
\n 2. SrcPort and DstPort are only valid for TCP and UDP, with other\
|
|
\n protocols the format of the exemption is Protocol:Direction.\
|
|
\n 3. A port setting of 0 allows for traffic for any port.\
|
|
\n 4. ikelogging and strongcrlcheck are activated immediately;\
|
|
\n all other properties take effect on next boot.\
|
|
\n\
|
|
\nExamples: 1. set config property=ipsecdiagnostics value=0\
|
|
\n 2. set config property=bootmode value=stateful\
|
|
\n 3. set config property=bootexemptions value=none\
|
|
\n 4. set config property=bootexemptions\
|
|
\n value=""ICMP:inbound TCP:80:80:outbound""\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_DELETE_QMPOLICY "Deletes a quick mode policy from SPD.\n"
|
|
HLP_DYNAMIC_DELETE_MMPOLICY "Deletes a main mode policy from SPD.\n"
|
|
HLP_DYNAMIC_DELETE_RULE "Deletes a rule and associated filters from SPD.\n"
|
|
HLP_DYNAMIC_DELETE_ALL "Deletes all policies, filters, and actions from SPD.\n"
|
|
|
|
HLP_DYNAMIC_DELETE_MMPOLICY_EX "\
|
|
\nUsage:\
|
|
\n mmpolicy [ name = ] <string> | [ all ]\
|
|
\n\
|
|
\n Deletes a main mode policy from SPD.\
|
|
\n If 'all' is specified, all main mode policies are deleted.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the main mode policy.\
|
|
\n\
|
|
\nRemarks: To delete a main mode policy, any associated main mode filters must\
|
|
\n first be deleted.\
|
|
\n\
|
|
\nExamples: delete mmpolicy name=mmp\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_DELETE_QMPOLICY_EX "\
|
|
\nUsage:\
|
|
\n qmpolicy [ name = ] <string> | [ all ]\
|
|
\n\
|
|
\n Deletes a quick mode policy from SPD.\
|
|
\n If 'all' is specified, all quick mode policies are deleted.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the quick mode policy.\
|
|
\n\
|
|
\nRemarks: To delete a quick mode policy, any associated quick mode filters\
|
|
\n must first be deleted.\
|
|
\n\
|
|
\nExamples: delete qmpolicy name=qmp\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_DELETE_ALL_EX "\
|
|
\nUsage:\
|
|
\n all\
|
|
\n\
|
|
\n Deletes all policies, filters, and authentication methods from SPD.\
|
|
\n\
|
|
\nExample: delete all\
|
|
\n\
|
|
\n"
|
|
HLP_DYNAMIC_DELETE_RULE_EX "\
|
|
\nUsage:\
|
|
\n rule [ srcaddr = ] (ip | dns | server)\
|
|
\n [ dstaddr = ] (ip | dns | server)\
|
|
\n [ protocol = ] (ANY | ICMP | TCP | UDP | RAW | <integer>)\
|
|
\n [ srcport = ] <port>\
|
|
\n [ dstport = ] <port>\
|
|
\n [ mirrored = ] (yes | no)\
|
|
\n [ conntype = ] (lan | dialup | all)\
|
|
\n [ [ srcmask = ] (mask | prefix) ]\
|
|
\n [ [ dstmask = ] (mask | prefix) ]\
|
|
\n [ [ tunneldstaddress = ] (ip | dns) ]\
|
|
\n\
|
|
\n Deletes a rule from SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n protocol -Can be ANY, ICMP, TCP, UDP, RAW, or an integer.\
|
|
\n srcport -Source port. A value of 0 means any port.\
|
|
\n dstport -Destination port. A value of 0 means any port.\
|
|
\n mirrored -‘Yes’ creates two filters, one in each direction.\
|
|
\n conntype -Connection type can be lan, dialup or ‘all’.\
|
|
\n srcmask -Source address mask or a prefix of 1 through 32.\
|
|
\n dstmask -Destination address mask or a prefix of 1 through 32.\
|
|
\n tunneldstaddress -Tunnel destination ip address or dns name.\
|
|
\n\
|
|
\nRemarks: 1. To specify the current computer address, set srcaddr/dstaddr=me\
|
|
\n To specify all computer addresses, set srcaddr/dstaddr=any\
|
|
\n 2. Server type can be WINS, DNS, DHCP or GATEWAY\
|
|
\n\
|
|
\nExamples: delete rule srca=192.168.145.110 dsta=192.168.145.215\
|
|
\n tunneldsta=192.168.145.1\
|
|
\n proto=tcp srcport=80 dstport=80 mirror=no conntype=lan\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_ALL "Displays policies, filters, SAs, and statistics from SPD.\n"
|
|
HLP_DYNAMIC_SHOW_MMPOLICY "Displays main mode policy details from SPD.\n"
|
|
HLP_DYNAMIC_SHOW_QMPOLICY "Displays quick mode policy details from SPD.\n"
|
|
HLP_DYNAMIC_SHOW_MMFILTER "Displays main mode filter details from SPD.\n"
|
|
HLP_DYNAMIC_SHOW_QMFILTER "Displays quick mode filter details from SPD.\n"
|
|
HLP_DYNAMIC_SHOW_STATS "Displays IPSec and IKE statistics from SPD.\n"
|
|
HLP_DYNAMIC_SHOW_MMSAS "Displays main mode security associations from SPD.\n"
|
|
HLP_DYNAMIC_SHOW_QMSAS "Displays quick mode security associations from SPD.\n"
|
|
HLP_DYNAMIC_SHOW_REGKEYS "Displays IPSec configuration and boot time behavior.\n"
|
|
HLP_DYNAMIC_SHOW_RULE "Displays rule details from SPD.\n"
|
|
|
|
HLP_DYNAMIC_SHOW_ALL_EX "\
|
|
\nUsage:\
|
|
\n all [ [ resolvedns = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays details of all policies, filters, SAs, and statistics from SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n resolvedns -Value of 'yes' displays the resolved dns name.\
|
|
\n\
|
|
\nRemarks: Default value of resolvedns is ‘no’.\
|
|
\n\
|
|
\nExamples: show all yes\
|
|
\n - shows all information with dns resolution\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_MMPOLICY_EX "\
|
|
\nUsage:\
|
|
\n mmpolicy [ name = ] <string> | [ all ]\
|
|
\n\
|
|
\n Displays main mode policy details from SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the main mode policy.\
|
|
\n\
|
|
\nRemarks: If 'all' is specified, all main mode policies are displayed.\
|
|
\n\
|
|
\nExamples: 1. show mmpolicy name=mmp\
|
|
\n 2. show mmpolicy all\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_QMPOLICY_EX "\
|
|
\nUsage:\
|
|
\n qmpolicy [ name = ] <string> | [ all ]\
|
|
\n\
|
|
\n Displays quick mode policy details from SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the quick mode policy.\
|
|
\n\
|
|
\nRemarks: If 'all' is specified, all quick mode policies are displayed.\
|
|
\n\
|
|
\nExamples: 1. show qmpolicy name=qmp\
|
|
\n 2. show qmpolicy all\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_MMFILTER_EX "\
|
|
\nUsage:\
|
|
\n mmfilter [ name = ] <string> | [ all ]\
|
|
\n [ [ type = ] (generic | specific) ]\
|
|
\n [ [ srcaddr = ] (ip | dns | server) ]\
|
|
\n [ [ dstaddr = ] (ip | dns | server) ]\
|
|
\n [ [ srcmask = ] (mask | prefix) ]\
|
|
\n [ [ dstmask = ] (mask | prefix) ]\
|
|
\n [ [ resolvedns = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays main mode filter details from SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name | all -Name of the main mode filter or ‘all’.\
|
|
\n type -Type of filter to display, either specific or generic.\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n srcmask -Source address mask or a prefix of 1 through 32.\
|
|
\n dstmask -Destination address mask or a prefix of 1 through 32.\
|
|
\n resolvedns -Value of 'yes' displays the resolved dns name.\
|
|
\n\
|
|
\nRemarks: 1. Default for the type parameter is ‘generic’.\
|
|
\n 2. Server type can be WINS, DNS, DHCP or GATEWAY.\
|
|
\n 3. If 'all' is specified, all main mode filters are displayed.\
|
|
\n 4. If source address or destination address is specified,\
|
|
\n only filters associated with that address are displayed.\
|
|
\n\
|
|
\nExamples: 1. show mmfilter name=mmf\
|
|
\n 2. show mmfilter all srcaddr=wins dstaddr=192.168.145.112\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_QMFILTER_EX "\
|
|
\nUsage:\
|
|
\n qmfilter [ name = ] <string> | [ all ]\
|
|
\n [ [ type = ] (generic | specific) ]\
|
|
\n [ [ srcaddr = ] (ip | dns | server) ]\
|
|
\n [ [ dstaddr = ] (ip | dns | server) ]\
|
|
\n [ [ srcmask = ] (mask | prefix) ]\
|
|
\n [ [ dstmask = ] (mask | prefix) ]\
|
|
\n [ [ protocol = ] (ANY | ICMP | TCP | UDP | RAW | <integer>) ]\
|
|
\n [ [ srcport = ] <port> ]\
|
|
\n [ [ dstport = ] <port> ]\
|
|
\n [ [ actioninbound = ] (permit | block | negotiate) ]\
|
|
\n [ [ actionoutbound = ] (permit | block | negotiate) ]\
|
|
\n [ [ resolvedns = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays quick mode filter details from SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n name -Name of the quick mode filter.\
|
|
\n type -Type of filter to display, either specific or generic.\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n srcmask -Source address mask or a prefix of 1 through 32.\
|
|
\n dstmask -Destination address mask or a prefix of 1 through 32.\
|
|
\n protocol -Can be ANY, ICMP, TCP, UDP, RAW, or an integer.\
|
|
\n srcport -Source port. A value of 0 means any port.\
|
|
\n dstport -Destination port. A value of 0 means any port.\
|
|
\n actioninbound -Action for inbound packets.\
|
|
\n actionoutbound -Action for outbound packets.\
|
|
\n resolvedns -Value of 'yes' displays the resolved dns name.\
|
|
\n\
|
|
\nRemarks: 1. Default for the type parameter is ‘generic’.\
|
|
\n 2. Server type can be WINS, DNS, DHCP or GATEWAY.\
|
|
\n\
|
|
\nExamples: 1. show qmfilter name=qmf\
|
|
\n 2. show qmfilter all srcaddr=192.134.135.133 proto=TCP\
|
|
\n 3. If 'all' is specified, all quick mode filters are displayed.\
|
|
\n 4. If source or destination address name is specified,\
|
|
\n only filters associated with that address are displayed.\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_RULE_EX "\
|
|
\nUsage:\
|
|
\n rule [ [ type = ] (transport | tunnel) ]\
|
|
\n [ [ srcaddr = ] (ip | dns | server) ]\
|
|
\n [ [ dstaddr = ] (ip | dns | server) ]\
|
|
\n [ [ srcmask = ] (mask | prefix) ]\
|
|
\n [ [ dstmask = ] (mask | prefix) ]\
|
|
\n [ [ protocol = ] (ANY | ICMP | TCP | UDP | RAW | <integer>) ]\
|
|
\n [ [ srcport = ] <port> ]\
|
|
\n [ [ dstport = ] <port> ]\
|
|
\n [ [ actioninbound = ] (permit | block | negotiate) ]\
|
|
\n [ [ actionoutbound = ] (permit | block | negotiate) ]\
|
|
\n [ [ resolvedns = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays rule details from SPD.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n type -Type of rule to display, either transport or tunnel.\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n srcmask -Source address mask or a prefix of 1 through 32.\
|
|
\n dstmask -Destination address mask or a prefix of 1 through 32.\
|
|
\n protocol -Can be ANY, ICMP, TCP, UDP, RAW, or an integer.\
|
|
\n srcport -Source port. A value of 0 means any port.\
|
|
\n dstport -Destination port. A value of 0 means any port.\
|
|
\n actioninbound -Action for inbound packets.\
|
|
\n actionoutbound -Action for outbound packets.\
|
|
\n resolvedns -Value of 'yes' displays the resolved dns name.\
|
|
\n\
|
|
\nRemarks: 1. Default for the type parameter is ‘transport’.\
|
|
\n 2. Server type can be WINS, DNS, DHCP or GATEWAY.\
|
|
\n 3. If source or destination address name is specified,\
|
|
\n only rules associated with that address are displayed.\
|
|
\n\
|
|
\nExamples: 1. show rule\
|
|
\n - shows both transport and tunnel rules\
|
|
\n 2. show rule type=transport srcaddr=192.134.135.133 proto=TCP\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_STATS_EX "\
|
|
\nUsage:\
|
|
\n stats [ [type =] (all | ike | ipsec) ]\
|
|
\n\
|
|
\n Displays details of IPSec and IKE statistics.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n type -ipsec, ike, or all (which displays both ipsec and ike)\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExamples: 1. show stats all\
|
|
\n 2. show stats type=ipsec\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_MMSAS_EX "\
|
|
\nUsage:\
|
|
\n mmsas [ [ all ] ]\
|
|
\n [ [ srcaddr =] (ip | dns | server) ]\
|
|
\n [ [ dstaddr =] (ip | dns | server) ]\
|
|
\n [ [ format = ] (list | table) ]\
|
|
\n [ [ resolvedns = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays the main mode security associations for a specified address.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n all -Display all main mode security associations.\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n format -Output in screen or tab-delimited format.\
|
|
\n resolvedns -Value of 'yes' displays the resolved dns name.\
|
|
\n\
|
|
\nRemarks: Server type can be WINS, DNS, DHCP or GATEWAY.\
|
|
\n\
|
|
\nExamples: 1. show mmsas all\
|
|
\n 2. show mmsas srca=192.168.145.110 dsta=192.168.145.215\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_QMSAS_EX "\
|
|
\nUsage:\
|
|
\n qmsas [ [ all ] ]\
|
|
\n [ [ srcaddr =] (ip | dns | server) ]\
|
|
\n [ [ dstaddr =] (ip | dns | server) ]\
|
|
\n [ [ protocol = ] (ANY | ICMP | TCP | UDP | RAW | <integer>) ]\
|
|
\n [ [ format = ] (list | table) ]\
|
|
\n [ [ resolvedns = ] (yes | no) ]\
|
|
\n\
|
|
\n Displays the quick mode security associations for a specified address.\
|
|
\n\
|
|
\nParameters:\
|
|
\n\
|
|
\n Tag Value\
|
|
\n all -Displays all quick mode security associations.\
|
|
\n srcaddr -Source ip address, dns name, or server type.\
|
|
\n dstaddr -Destination ip address, dns name, or server type.\
|
|
\n protocol -Can be ANY, ICMP, TCP, UDP, RAW, or an integer.\
|
|
\n format -Output in screen or tab-delimited format.\
|
|
\n resolvedns -Value of 'yes' displays the resolved dns name.\
|
|
\n\
|
|
\nRemarks: Server type can be WINS, DNS, DHCP or GATEWAY.\
|
|
\n\
|
|
\nExamples: 1. show qmsas all\
|
|
\n 2. show qmsas srca=192.168.145.110 dsta=192.168.145.215\
|
|
\n\
|
|
\n"
|
|
|
|
HLP_DYNAMIC_SHOW_REGKEYS_EX "\
|
|
\nUsage:\
|
|
\n config\
|
|
\n\
|
|
\n Displays current settings of IPSec configuration parameters.\
|
|
\n\
|
|
\nRemarks:\
|
|
\n\
|
|
\nExample: show config\
|
|
\n\
|
|
\n"
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
// Legend
|
|
//
|
|
// /* L*/ This RC String is for Localization
|
|
//
|
|
// /*NL*/ This RC String need Not be Localized
|
|
//
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Strings for Dynamic Show
|
|
//
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
/* L*/ DYNAMIC_SHOW_POLNAME "\nIKE MM Policy Name : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_SOFTSA "\nIKE Soft SA Lifetime : %1!u! secs"
|
|
/*NL*/ DYNAMIC_SHOW_NEWLINE "\n"
|
|
/* L*/ DYNAMIC_SHOW_ICMP " ICMP "
|
|
/* L*/ DYNAMIC_SHOW_TCP " TCP "
|
|
/* L*/ DYNAMIC_SHOW_UDP " UDP "
|
|
/* L*/ DYNAMIC_SHOW_RAW " RAW "
|
|
/* L*/ DYNAMIC_SHOW_ANY " ANY "
|
|
|
|
/* L*/ DYNAMIC_SHOW_NO_MMP_ERROR_MSG "Mainmode Policies not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_SPECIFIED_MMP_NOT_FOUND_MSG "Specified Mainmode Policy not available\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_MMP_COLUMN_HEADING "\nEncryption Integrity DH Lifetime (Kb:secs) QM Limit Per MM"
|
|
/* L*/ DYNAMIC_SHOW_MMP_COLUMN_HEADING_UNDERLINE "\n---------- --------- ---- ------------------ ---------------"
|
|
|
|
/* L*/ DYNAMIC_SHOW_MMP_ESP_NONE_ALGO " NONE "
|
|
/* L*/ DYNAMIC_SHOW_MMP_ESP_DES_ALGO " DES "
|
|
/* L*/ DYNAMIC_SHOW_MMP_ESP_UNKNOWN_ALGO " UNKNOWN "
|
|
/* L*/ DYNAMIC_SHOW_MMP_ESP_3DES_ALGO " 3DES "
|
|
/* L*/ DYNAMIC_SHOW_MMP_AH_NONE_ALGO " NONE "
|
|
/* L*/ DYNAMIC_SHOW_MMP_AH_MD5_ALGO " MD5 "
|
|
/* L*/ DYNAMIC_SHOW_MMP_AH_SHA1_ALGO " SHA1 "
|
|
/*NL*/ DYNAMIC_SHOW_MMP_DH_LIFE_QMLIMIT " %1!-5lu! %2!lu!:%3!lu! %4!-10lu! "
|
|
/* L*/ DYNAMIC_SHOW_MMP_DH_LIFE_QMLIMIT_MMPFS " %1!-5lu! %2!lu!:%3!lu! 1 (MMPFS) "
|
|
|
|
/* L*/ DYNAMIC_SHOW_NO_QMP_ERROR_MSG "Quickmode Policies not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_SPECIFIED_QMP_NOT_FOUND_MSG "Specified Quickmode Policy not available\n"
|
|
/* L*/ DYNAMIC_SHOW_QMP_NEGOTIATION_NAME "\nQM Negotiation Policy Name : %1!s!"
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMP_COLUMN_HEADING "\n Security Methods Lifetime (Kb:secs) PFS DH Group"
|
|
/* L*/ DYNAMIC_SHOW_QMP_COLUMN_HEADING_UNDERLINE "\n------------------------- --------------------- ------------\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMP_AH_MD5_ALGO " AH[MD5] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_AH_SHA1_ALGO " AH[SHA1] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_AH_NONE_ALGO " AH[NONE] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_ESP_DES_ALGO " ESP[ DES,"
|
|
/* L*/ DYNAMIC_SHOW_QMP_ESP_ERR_ALGO " ESP[ ERR,"
|
|
/* L*/ DYNAMIC_SHOW_QMP_ESP_3DES_ALGO " ESP[3DES,"
|
|
/* L*/ DYNAMIC_SHOW_QMP_ESP_NONE_ALGO " ESP[NONE,"
|
|
/* L*/ DYNAMIC_SHOW_QMP_MD5_ALGO "MD5] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SHA1_ALGO "SHA1] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_NONE_ALGO "NONE] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_PFS_NONE " <Unassigned> "
|
|
/*NL*/ DYNAMIC_SHOW_QMP_LIFETIME " %1!10lu!:%2!-10lu!"
|
|
/* L*/ DYNAMIC_SHOW_QMP_MM_DH_GROUP " Main Mode Derived"
|
|
/* L*/ DYNAMIC_SHOW_QMP_DH_GROUP_LOW " Low (1) "
|
|
/* L*/ DYNAMIC_SHOW_QMP_DH_GROUP_MEDIUM " Medium (2) "
|
|
/* L*/ DYNAMIC_SHOW_QMP_DH_GROUP_HIGH " High (2048) "
|
|
/* L*/ DYNAMIC_SHOW_QMP_AH_ERR_SPACE " AH[ERR] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_ERR_SPACE "ERR] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_ERROR_ALGO " ERROR "
|
|
/* L*/ DYNAMIC_SHOW_QMP_AH_MD5 " AH[MD5] "
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMP_AH_SHA1 " AH[SHA1]"
|
|
/* L*/ DYNAMIC_SHOW_QMP_AH_NONE " AH[NONE]"
|
|
/* L*/ DYNAMIC_SHOW_QMP_AH_ERR " AH[ERR] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_MD5 "MD5] "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SHA1 "SHA1]"
|
|
/* L*/ DYNAMIC_SHOW_QMP_NONE "NONE]"
|
|
/* L*/ DYNAMIC_SHOW_QMP_ERR "ERR] "
|
|
/*NL*/ DYNAMIC_SHOW_QMP_PLUS "+"
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_MD5_NONE_NONE_ALGO " MD5(%1!02lu!/%2!-02lu!) None None "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_SHA1_NONE_NONE_ALGO "SHA1(%1!02lu!/%2!-02lu!) None None "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_NONE_NONE_NONE_ALGO " None None None "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_NONE_DES_ALGO " None DES (%1!02lu!/%2!-02lu!) "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_NONE_UNKNOWN_ALGO " None Unknown "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_NONE_3DES_ALGO " None 3DES(%1!02lu!/%2!-02lu!) "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_NONE_NONE_ALGO " None None "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_MD5_ALGO " MD5 "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_SHA1_ALGO " SHA1 "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_NONE_ALGO " None "
|
|
/* L*/ DYNAMIC_SHOW_QMP_SAS_NONE_SPACE_ALGO " None "
|
|
|
|
/* L*/ DYNAMIC_SHOW_MMF_NAME "\n\
|
|
\nFilter name : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_MMF_GENERIC_NOT_FOUND_MSG "Generic Mainmode Filters not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_MMF_SPECIFIC_NOT_FOUND_MSG "Specific Mainmode Filters not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_MMF_SPECIFIED_NOT_FOUND_MSG "Specified Mainmode Filter not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_MMF_SUB_HEADING "\nMain Mode Filters: "
|
|
/* L*/ DYNAMIC_SHOW_MMF_GENERIC_HEADING "Generic "
|
|
/*NL*/ DYNAMIC_SHOW_MMF_UNDERLINE "\n-------------------------------------------------------------------------------"
|
|
/* L*/ DYNAMIC_SHOW_MMF_SPECIFIC_HEADING "Specific "
|
|
/* L*/ DYNAMIC_SHOW_MMF_OUTBOUND_HEADING "Outbound "
|
|
/* L*/ DYNAMIC_SHOW_MMF_INBOUND_HEADING "Inbound "
|
|
/* L*/ DYNAMIC_SHOW_MMF_FILTER_WEIGHT "\nWeight : %1!d!"
|
|
/* L*/ DYNAMIC_SHOW_MMF_NO_OF_GENERIC_FILTERS "\n\
|
|
\n%1!d! Generic Filter(s)"
|
|
/* L*/ DYNAMIC_SHOW_MMF_NO_OF_SPECIFIC_OUTBOUND "\n\
|
|
\n%1!d! Specific Outbound Filter(s)"
|
|
/* L*/ DYNAMIC_SHOW_MMF_NO_OF_SPECIFIC_INBOUND "\n\
|
|
\n%1!d! Specific Inbound Filter(s)"
|
|
/* L*/ DYNAMIC_SHOW_MMF_CONN_ALL " ALL "
|
|
/* L*/ DYNAMIC_SHOW_MMF_CONN_LAN " LAN "
|
|
/* L*/ DYNAMIC_SHOW_MMF_CONN_DIALUP " DIALUP "
|
|
/* L*/ DYNAMIC_SHOW_MMF_CONN_UNKNOWN "UNKNOWN "
|
|
/* L*/ DYNAMIC_SHOW_MMF_UNKNOWN_CERT " Unknown"
|
|
/* L*/ DYNAMIC_SHOW_MMF_CONN_HEADING "\nConnection Type :"
|
|
/* L*/ DYNAMIC_SHOW_MMF_AUTH_HEADING "\nAuthentication Methods :"
|
|
/*NL*/ DYNAMIC_SHOW_MMF_PRE_KEY_HEADING "\n\tPreshared key"
|
|
/* L*/ DYNAMIC_SHOW_MMF_CERT_MAP_DISPLAY "certmap"
|
|
/* L*/ DYNAMIC_SHOW_MMF_CERT_CRP_DISPLAY "excludecaname"
|
|
/* L*/ DYNAMIC_SHOW_MMF_YES_DISPLAY "yes"
|
|
/* L*/ DYNAMIC_SHOW_MMF_NO_DISPLAY "no"
|
|
/* L*/ DYNAMIC_SHOW_MMF_KERB "\n\tKerberos"
|
|
/* L*/ DYNAMIC_SHOW_MMF_SEC_METHOD_HEADING "\nSecurity Methods : "
|
|
/*NL*/ DYNAMIC_SHOW_MMF_OFFER_CNT "%1!d!"
|
|
/* L*/ DYNAMIC_SHOW_MMF_DEFAULT_OFFER "(default)"
|
|
/* L*/ DYNAMIC_SHOW_MMF_OFFER_NONE_ALGO "\tNONE/"
|
|
/* L*/ DYNAMIC_SHOW_MMF_OFFER_DES_ALGO "\tDES/"
|
|
/* L*/ DYNAMIC_SHOW_MMF_OFFER_UNKNOWN_ALGO "\tUNKNOWN/"
|
|
/* L*/ DYNAMIC_SHOW_MMF_OFFER_3DES_ALGO "\t3DES/"
|
|
/* L*/ DYNAMIC_SHOW_MMF_OFFER_AH_NONE_ALGO "NONE/"
|
|
/* L*/ DYNAMIC_SHOW_MMF_OFFER_MD5_ALGO "MD5/"
|
|
/* L*/ DYNAMIC_SHOW_MMF_OFFER_SHA1_ALGO "SHA1/"
|
|
|
|
/* L*/ DYNAMIC_SHOW_MMF_DH_QMLIMIT "DH%1!lu!/%2!lu!/QMlimit=%3!lu! "
|
|
/*NL*/ DYNAMIC_SHOW_MMF_NEWLINE_TAB "\n\t"
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMF_GENERIC_NOT_FOUND_MSG "Generic Quickmode Filters not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_QMF_SPECIFIC_NOT_FOUND_MSG "Specific Quickmode Filters not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_QMF_SPECIFIED_NOT_FOUND_MSG "Specified Quickmode Filter not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_TRANSPORT_HEADING "\nQuick Mode Filters(Transport): "
|
|
/* L*/ DYNAMIC_SHOW_TRANSPORT_RULE_HEADING "\nTransport Rules "
|
|
/* L*/ DYNAMIC_SHOW_TUNNEL_RULE_HEADING "\nTunnel Rules "
|
|
|
|
/* L*/ DYNAMIC_SHOW_MMFILTER_NAME "\nMM Filter Name : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_QMF_NAME "\nQM Filter Name : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_MMP_NAME "\nMain Mode Policy : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_NO_OF_TRANSPORT_FILTERS "\n\
|
|
\n%1!d! Transport Filter(s)\n"
|
|
/* L*/ DYNAMIC_SHOW_NO_OF_TUNNEL_FILTERS "\n\
|
|
\n%1!d! Tunnel Filter(s)\n"
|
|
/* L*/ DYNAMIC_SHOW_TUNNEL_HEADING "\n\
|
|
\nQuick Mode Filters(Tunnel): "
|
|
|
|
/* L*/ DYNAMIC_SHOW_NO_RULES_ERROR_MSG "Rules not available.\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_INBOUND_PASSTHRU "\nInbound Action : Passthru"
|
|
/* L*/ DYNAMIC_SHOW_INBOUND_NEGOTIATE "\nInbound Action : Negotiate"
|
|
/* L*/ DYNAMIC_SHOW_INBOUND_BLOCK "\nInbound Action : Blocking"
|
|
/* L*/ DYNAMIC_SHOW_INBOUND_UNKNOWN "\nInbound Action : Unknown"
|
|
/* L*/ DYNAMIC_SHOW_OUTBOUND_PASSTHRU "\nOutbound Action : Passthru"
|
|
/* L*/ DYNAMIC_SHOW_OUTBOUND_NEGOTIATE "\nOutbound Action : Negotiate"
|
|
/* L*/ DYNAMIC_SHOW_OUTBOUND_BLOCK "\nOutbound Action : Blocking"
|
|
/* L*/ DYNAMIC_SHOW_OUTBOUND_UNKNOWN "\nOutbound Action : Unknown"
|
|
/*NL*/ DYNAMIC_SHOW_DEFAULT_PROTOCOL " %1!-5lu! "
|
|
/* L*/ DYNAMIC_SHOW_TUNNEL_SRC "\nTunnel Source : "
|
|
/* L*/ DYNAMIC_SHOW_TUNNEL_DST "\nTunnel Destination : "
|
|
/* L*/ DYNAMIC_SHOW_SRC_DST_PORT "Src Port: %1!-4lu! Dest Port: %2!-4lu! "
|
|
/* L*/ DYNAMIC_SHOW_MIRR_YES "\nMirrored : yes"
|
|
|
|
/* L*/ DYNAMIC_SHOW_MIRR_NO "\nMirrored : no"
|
|
/* L*/ DYNAMIC_SHOW_QMP_NAME "\nQuick Mode Policy : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_PROTO_HEADING "\nProtocol :"
|
|
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_NO_SA_FOUND_MSG "IPSec MainMode Security Associations not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_IKE_SA_HEADING "\nIKE Main Mode SAs at %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_NOT_FOUND_MSG "Specified MainMode Security Associations not available.\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_HEADING "\n\
|
|
\nQuick Mode SAs"
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_UNDERLINE "\n--------------\n"
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_NO_SA_FOUND_MSG "IPSec QuickMode Security Associations not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_NOT_FOUND_MSG "Specified QuickMode Security Associations not available.\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_COOKIE_PAIR "\nCookie Pair : "
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_COOKIE "%1!02x!"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_SEC_METHOD_HEADING "\nSec Methods : "
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_NONE_ALGO "NONE"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_DES_ALGO "DES"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_NO_SA_FOUND_MSGDES_ALGO "3DES"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_UNKNOWN_ALGO "UNKNOWN"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_MD5_ALGO "MD5"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_SHA1_ALGO "SHA1"
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_DH_LIFETIME "/%1!d!/%2!d!"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_AUTH_MODE_HEADING "\nAuth Mode : "
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_PRE_KEY "Preshared Key"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_DSS_SIGN "DSS Signature"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_RSA_SIGN "RSA Signature"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_RSA_ENCRYPT "RSA Encryption"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_KERBEROS "Kerberos"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_SRC_HEADING "\nSource : "
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_PORT ", port %1!d!"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_ID_HEADING "\nID : "
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_ID_VALUE "\nID : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_DST_HEADING "\nDestination : "
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_DST_SEC_HEADING "\nDestination SecurityMethods "
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_DATE_TIME_HEADING "\n Date/Time Created "
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_UNDERLINE "\n-------------------------------------------------------- ----------------------"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_KERB_ID " [ID:%1!-35s!] "
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_DNS "\nDNS: %1!-51S!"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_KERB_PEER_ID " [ID:%1!-35s!] "
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_ISSUE_CA "\nIssuing CA :%1!s!"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_THUMB_PRINT "\nThumbprint :"
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_THUMB_VALUE "%1!02x!"
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_COLON ":"
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_SLASH "/"
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_SPACE_ADJ " "
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_ROOTCA "\n Root CA : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_MMSAS_FILTER_ROOTCA "Root CA : %1!s!"
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_THUMBPRINT "%S"
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_HASH_OPEN_BRACKET "( "
|
|
/*NL*/ DYNAMIC_SHOW_MMSAS_HASH_CLOSE_BRACKET " )\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_TRANSPORT_FILTER_HEADING "\nTransport Filter\n"
|
|
/* L*/ DYNAMIC_SHOW_TUNNEL_FILTER_HEADING "\nTunnel Filter\n"
|
|
/* L*/ DYNAMIC_SHOW_UNKNOWN "\nUnknown\n"
|
|
/* L*/ DYNAMIC_SHOW_POL_NAME_HEADING "\nPolicy Name : %1!s!"
|
|
/* L*/ DYNAMIC_SHOW_SRC_ADDR_HEADING "\nSource Address : "
|
|
/* L*/ DYNAMIC_SHOW_DST_ADDR_HEADING "\nDestination Address : "
|
|
/* L*/ DYNAMIC_SHOW_PROTOCOL_HEADING "\nProtocol : %1!lu!"
|
|
/* L*/ DYNAMIC_SHOW_SRC_PORT "\nSource Port : %1!u!"
|
|
/* L*/ DYNAMIC_SHOW_DST_PORT "\nDestination Port : %1!u!"
|
|
/* L*/ DYNAMIC_SHOW_DIRECTION_INBOUND "\nDirection : Inbound"
|
|
/* L*/ DYNAMIC_SHOW_DIRECTION_OUTBOUND "\nDirection : Outbound"
|
|
/* L*/ DYNAMIC_SHOW_DIRECTION_ERR "\nDirection : Error"
|
|
/* L*/ DYNAMIC_SHOW_OFFER "\n\
|
|
\nOffer Used \n"
|
|
/* L*/ DYNAMIC_SHOW_PROTO_ICMP "\nProtocol : ICMP"
|
|
/* L*/ DYNAMIC_SHOW_PROTO_TCP "\nProtocol : TCP"
|
|
/* L*/ DYNAMIC_SHOW_PROTO_UDP "\nProtocol : UDP"
|
|
/* L*/ DYNAMIC_SHOW_PROTO_RAW "\nProtocol : RAW"
|
|
/* L*/ DYNAMIC_SHOW_PROTO_ANY "\nProtocol : ANY"
|
|
/*NL*/ DYNAMIC_SHOW_QMSAS_LEFTBRACKET " ("
|
|
/*NL*/ DYNAMIC_SHOW_QMSAS_RIGHTBRACKET ")"
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_COLUMN_HEADING "\n AH(b/r) ESP Con(b/r) ESP Int PFS DH Group"
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_COLUMN_UNDERLINE "\n---------- ------------- ------- ------------"
|
|
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_ENCAP_IKE "\nEncapsulation Type : IKE"
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_ENCAP_OTHER "\nEncapsulation Type : Other"
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_SRC_UDP_PORT "\nSource UDP Encap port : %1!u!"
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_DST_UDP_PORT "\nDest UDP Encap port : %1!u!"
|
|
/* L*/ DYNAMIC_SHOW_QMSAS_PEER_ADDR "\nPeer Private Addr : "
|
|
|
|
/* L*/ DYNAMIC_SHOW_PMYADD "<My IP Address> "
|
|
/* L*/ DYNAMIC_SHOW_PANYADD "<Any IP Address>"
|
|
/*NL*/ DYNAMIC_SHOW_PADD "%1!s!"
|
|
/*NL*/ DYNAMIC_SHOW_ADDR_STR " [%1!S!]"
|
|
/* L*/ NSHIPSEC_CHECK "The 'Netsh ipsec' context is not compatible with the target machine.\n"
|
|
/* L*/ DYNAMIC_SHOW_WINS "WINS SERVER "
|
|
/* L*/ DYNAMIC_SHOW_DHCP "DHCP SERVER "
|
|
/* L*/ DYNAMIC_SHOW_DNS "DNS SERVER "
|
|
/* L*/ DYNAMIC_SHOW_GATEWAY "DEFAULT GATEWAY "
|
|
|
|
/* L*/ DYNAMIC_SHOW_STATS_HEADING "\nIKE Statistics"
|
|
/* L*/ DYNAMIC_SHOW_STATS_IKE_HEADING_UNDERLINE "\n-------------- \n"
|
|
/* L*/ DYNAMIC_SHOW_STATS_NOT_FOUND_MSG "\nIKEStatistics not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_STATS_MAIN_MODE "\nMain Modes : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_QUICK_MODE "\nQuick Modes : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_SOFT_SA "\nSoft SAs : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_AUTH_FAIL "\nAuthentication Failures : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_ACTIVE_ACQUIRE "\nActive Acquire : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_ACTIVE_RECEIVE "\nActive Receive : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_ACQUIRE_FAIL "\nAcquire fail : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_RECEIVE_FAIL "\nReceive fail : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_SEND_FAIL "\nSend fail : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_ACQ_HEAP_SIZE "\nAcquire Heap size : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_RECEIVE_HEAP_SIZE "\nReceive Heap size : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_NEG_FAIL "\nNegotiation Failures : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_INVALID_COOKIE "\nInvalid Cookies Rcvd : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_TOTAL_ACQUIRE "\nTotal Acquire : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_TOT_GET_SPI "\nTotalGetSpi : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_TOT_KEY_ADD "\nTotalKeyAdd : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_TOT_KEY_UPDATE "\nTotalKeyUpdate : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_GET_SPI_FAIL "\nGetSpiFail : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_KEY_ADD_FAIL "\nKeyAddFail : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_KEY_UPDATE_FAIL "\nKeyUpdateFail : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_DB_LIST "\nIsadbListSize : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_CONN_LIST_SIZE "\nConnListSize : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_INVLD_PKTS "\nInvalid Packets Rcvd : %1!S!\n"
|
|
/* L*/ DYNAMIC_SHOW_STATS_IPSEC_HEADING "\n\
|
|
\nIPSec Statistics"
|
|
/* L*/ DYNAMIC_SHOW_STATS_IPSEC_HEADING_UNDERLINE "\n----------------\n"
|
|
/* L*/ DYNAMIC_SHOW_STATS_IPSEC_NOT_FOUND "\nIPSecStatistics not available.\n"
|
|
/* L*/ DYNAMIC_SHOW_STATS_ACTIVE_ASSOC "\nActive Assoc : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_OFFLOAD_SAS "\nOffload SAs : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_PEND_KEY "\nPending Key : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_KEY_ADDS "\nKey Adds : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_KEY_DELETES "\nKey Deletes : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_REKEYS "\nReKeys : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_ACT_TUNNEL "\nActive Tunnels : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_BAD_SPI "\nBad SPI Pkts : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_NOT_DECRYPT "\nPkts not Decrypted : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_NOT_AUTH "\nPkts not Authenticated : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_REPLAY "\nPkts with Replay Detection : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_CONF_BYTES_SENT "\nConfidential Bytes Sent : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_CONF_BYTES_RECV "\nConfidential Bytes Received : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_AUTH_BYTES_SENT "\nAuthenticated Bytes Sent : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_AUTH_BYTE_RECV "\nAuthenticated Bytes Received: %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_TRANSPORT_BYTES_SENT "\nTransport Bytes Sent : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_TRANSPORT_BYTES_RCVD "\nTransport Bytes Received : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_BYTES_SENT_TUNNEL "\nBytes Sent In Tunnels : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_BYTES_RECV_TUNNEL "\nBytes Received In Tunnels : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_OFFLOAD_BYTES_SENT "\nOffloaded Bytes Sent : %1!S!"
|
|
/* L*/ DYNAMIC_SHOW_STATS_OFFLOAD_BYTES_RECV "\nOffloaded Bytes Received : %1!S!\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_REG_HEADING "\nIPSec Configuration Parameters\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_HEADING_UNDERLINE "------------------------------\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_DIAG "IPSecDiagnostics : %1!d!\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_IKE_LOG "IKElogging : %1!d!\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_STRONG_CRL "StrongCRLCheck : %1!d!\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_LOG "IPSecloginterval : %1!d!\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_NLBS "NLBSFlags : %1!d!\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_FLAGS "Flags : %1!d!\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_EXEMPT "IPSecexempt : %1!d!\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_DH_GROUP "2048DHGroupId : %1!d!\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_DIAG_ERR_MSG "IPSec Diagnostic Level is out of range. Range is 0 - 7.\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_IKE_LOG_ERR_MSG "IKE Logging is out of range. Range is 0 - 2.\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_STRONG_CRL_ERR_MSG "Strong CRL Check Level is out of range. Range is 0 - 2.\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_LOG_ERR_MSG "IPSec Log Interval is out of range. Range is 60 - 86400.\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_EXEMPT_ERR_MSG "IPSec Exemption Level is out of range. Range is 0 - 3.\n"
|
|
/* L*/ DYNAMIC_SHOW_REG_PARAM_NOT_SET_MSG "(Some of the IPSec Configuration parameters are not set).\n"
|
|
|
|
/* L*/ DYNAMIC_SET_REG_TOO_MANY_EXEMPTIONS "A maximum of 1024 exemptions are allowed.\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE "Boot Mode : "
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE_STATEFUL "Stateful"
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE_BLOCK "Block"
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE_PERMIT "Permit"
|
|
|
|
/* L*/ DYNAMIC_SHOW_BOOTMODE_EXEMPTIONS_HEADER_1 "Boot Mode Exemptions :"
|
|
/* L*/ DYNAMIC_SHOW_BOOTMODE_EXEMPTIONS_HEADER_2 "Protocol Src Port Dst Port Direction\n"
|
|
/* L*/ DYNAMIC_SHOW_BOOTMODE_EXEMPTIONS_HEADER_3 "--------- --------- --------- ---------\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_BOOTMODE_EXEMPTIONS_NO_EXEMPTIONS " No bootmode exemptions\n"
|
|
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE_UDP "UDP "
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE_TCP "TCP "
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE_ICMP "ICMP "
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE_RAW "RAW "
|
|
/* L*/ DYNAMIC_SHOW_REG_IPSEC_BOOTMODE_ANY "ANY "
|
|
|
|
/* L*/ DYNAMIC_SHOW_BOOTMODE_EXEMPT_INTEGER "%1!3d! "
|
|
/* L*/ DYNAMIC_SHOW_BOOTMODE_EXEMPT_PORT "%1!5d! "
|
|
/* L*/ DYNAMIC_SHOW_BOOTMODE_EXEMPT_DIRECTION_IN "Inbound"
|
|
/* L*/ DYNAMIC_SHOW_BOOTMODE_EXEMPT_DIRECTION_OUT "Outbound"
|
|
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Strings for Static Show
|
|
//
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
|
|
// Function: HandleStaticShowPolicy()
|
|
/* L*/ SHW_STATIC_TAB_POLICY_COUNT "\n\
|
|
\nNo. of policies \t %1!d!\n"
|
|
/* L*/ SHW_STATIC_LIST_POLICY_COUNT "\n\
|
|
\nNo. of policies : %1!d!\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_RM_NAME "Store \t Local Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_LM_NAME "Store \t Local Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_RM_NAMEP "Store \t Persistent Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_LM_NAMEP "Store \t Persistent Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_RD_NAME "Store \t Domain Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_LD_NAME "Store \t Domain Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_LM "Store \t Local Store\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_LD "Store \t Domain Store\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_STORE_LP "Store \t Persistent Store\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_CERT_MAP_YES "Cert To Account Mapping\t YES\n"
|
|
/* L*/ SHW_STATIC_TAB_POLICY_CERT_MAP_NO "Cert To Account Mapping\t NO\n"
|
|
|
|
// Function: HandleStaticShowFilterList()
|
|
/* L*/ SHW_STATIC_TAB_FILTERLIST_POL_NAME_STR "\n\
|
|
\nPolicy Name \t %1!s!\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_FILTERLIST_RULE_NAME_STR "\n\
|
|
\nRule Name \t %1!s!\n"
|
|
|
|
// Function: HandleStaticShowRule()
|
|
/* L*/ SHW_STATIC_TAB_RULE_NO_POL_NAME "No Policy Name Specified\n"
|
|
/* L*/ SHW_STATIC_TAB_RULE_ID_GUID "\n\
|
|
\nRule ID \t %1!d!,\tGUID =\t%2!s!\n"
|
|
/*NL*/ SHW_STATIC_TAB_RULE_FORMAT23S "%1!-23s!\t"
|
|
|
|
// Function: PrintPolicy()
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_POL_NAME_STR "Policy Name \t %1!s!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_POL_DESC_STR "Description \t %1!s!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_POL_DESC_NONE "Description \t NONE\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_ASSIGNED_YES "Assigned \t YES\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_ASSIGNED_NO "Assigned \t NO\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_MMPFS_YES "Master PFS \t YES\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_MMPFS_NO "Master PFS \t NO\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_POLL_MIN "Polling Interval \t %1!d! minutes\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_RULE_COUNT "\n\
|
|
\nNo. of Rules \t %1!d! \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_RULE_TITLE "\n\t\t\t Rule Details\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_RULE_UNDERLINE "\t\t\t ------------\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_ASSIGNED_AD "Assigned \t YES but AD Policy Overrides\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_NONVERB_TITLE "\n\
|
|
\nPolicy Name \tRules\t LastModified \tAssign\n"
|
|
/*NL*/ SHW_STATIC_TAB_PRTPOLICY_FORMAT32S "%1!-32s!\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_AD_POL_OVERRIDES "YES but AD Policy Overrides\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_YES_STR " YES \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_NO_STR " NO \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_NONVERB_UNDERLINE "---------- \t-----\t ------------ \t------\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_DOMAIN_NONVERB_TITLE "Policy Name \tRules\t LastModified\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTPOLICY_DOMAIN_NONVERB_UNDERLINE "----------- \t-----\t ------------\n"
|
|
|
|
// Function: PrintRule()
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_RULE_NAME_STR "Rule Name \t %1!s!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_RULE_NAME_NONE "Rule Name \t NONE\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_AUTH_TITLE "Authentication Methods (%1!d!)\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_TRANS_NONVERB_TITLE "\nEnabled\t FilterList \t FilterAction \t Authentication"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_TRANS_NONVERB_UNDERLINE "\n-------\t ---------- \t ------------ \t --------------"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_TUNNEL_NONE "Tunnel Dest IP Address \t NONE\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_TUNNEL_IP "Tunnel Dest IP Address \t "
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_CONN_TYPE_ALL "Connection Type \t ALL\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_CONN_TYPE_LAN "Connection Type \t LAN\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_CONN_TYPE_DIALUP "Connection Type \t DIAL UP\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_CONN_TYPE_UNKNOWN "Connection Type \t UNKNOWN\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_FILTERLIST_TITLE "\nFilterList Details\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_FILTERLIST_UNDERLINE "------------------\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_FILTERACTION_TITLE "\nFilterAction Details\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_FILTERACTION_UNDERLINE "--------------------\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_ACTIVATED_YES "Activated \t YES\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_ACTIVATED_NO "Activated \t NO\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_RULE_NAME_NONE_STR "Rule Name \t NONE\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_YES_STR "\n YES \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_NO_STR "\n NO \t"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_NONE_STR " NONE \t"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_KERB " Kerb"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_CERT " Cert"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_PRE " Pre"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_TR_RULE_COUNT "\nNo of Transport rule(s)\t %1!d!"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_TN_RULE_COUNT "\n\
|
|
\nNo of Tunnel rule(s) \t %1!d!"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_TUN_NONVERB_TITLE "\nEnabled\t FilterList \t FilterAction \tTunnelEndPoint"
|
|
/* L*/ SHW_STATIC_TAB_PRTRULE_TUN_NONVERB_UNDERLINE "\n-------\t ---------- \t ------------ \t--------------"
|
|
|
|
// Function: PrintNegPolData()
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_FA_NAME_STR "FilterAction Name \t %1!s!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_FA_NAME_NONE "FilterAction Name \t NONE\n"
|
|
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_ACTION_PERMIT "Action \t PERMIT\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_ACTION_BLOCK "Action \t BLOCK\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_ACTION_NEGOTIATE "Action \t NEGOTIATE SECURITY\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_INPASS_YES "InBound PassThrough \t YES\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_INPASS_NO "InBound PassThrough \t NO\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_SOFT_YES "AllowUnSecure(Fallback)\t YES\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_SOFT_NO "AllowUnSecure(Fallback)\t NO\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_SEC_MTHD_TITLE "Security Methods \n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_ALGO_TITLE " AH \t ESP \tSeconds \t kBytes \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_ALGO_UNDERLINE " -- \t --- \t------- \t ------ \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_QMPFS_YES "QMPFS \t YES\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_QMPFS_NO "QMPFS \t NO \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_NONVERB_TITLE "FilterAction Name \tAction \t Last Modified\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_NONVERB_UNDERLINE "----------------- \t------ \t -------------\n"
|
|
/*NL*/ SHW_STATIC_TAB_PRTNEGPOL_FORMAT38S "%1!-38s!\t"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_NONE_STR " NONE \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_PERMIT_STR "PERMIT \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_BLOCK_STR "BLOCK \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_NEGOTIATE_STR "NEGOTIATE\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTNEGPOL_ACTION_NONE_STR "NONE \t"
|
|
/*NL*/ SHW_STATIC_TAB_PRTNEGPOL_FORMAT23SNEWLINE "%1!-23s!\n"
|
|
/*NL*/ SHW_STATIC_TAB_PRTNEGPOL_FORMAT23STAB "%1!-23s!\t"
|
|
|
|
// Function: PrintAlgoInfo()
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_MD5 "[MD5 ]\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_SHA1 "[SHA1]\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_NONE "[NONE]\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_NONE_NONE "[NONE , NONE]\t"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_MD5_COMMA "[MD5 ,"
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_SHA1_COMMA "[SHA1 ,"
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_NONE_COMMA "[NONE ,"
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_DES_TAB " DES ]\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_3DES_TAB " 3DES]\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTALGO_NONE_TAB " NONE]\t"
|
|
|
|
// Function: PrintLifeTime()
|
|
/*NL*/ SHW_STATIC_TAB_PRTLIFE_FORMAT "%1!6u! \t%2!10u! \n"
|
|
|
|
|
|
// Function: PrintAuthMethods()
|
|
/* L*/ SHW_STATIC_TAB_PRTAUTH_KERB "KERBEROS\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTAUTH_ROOTCA_FORMAT "ROOT CA \t %1!s!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTAUTH_PRE_FORMAT "PRESHARED Key \t %1!s!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTAUTH_NONE_AUTH_STR "NONE\n"
|
|
|
|
// Function: PrintFilterData()
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTERDATA_FL_NAME_STR "\nFilterList Name \t %1!s!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTERDATA_FL_NAME_NONE "\nFilterList Name \t NONE\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTERDATA_FILTERS_TITLE "Filter(s)\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTERDATA_NONVERB_TITLE "FilterList Name \tFilters\t Last Modified \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTERDATA_NONVERB_UNDERLINE "--------------- \t-------\t ------------- \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTERDATA_FL_GUID_STR "GUID \t %1!s!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTERDATA_FL_LASTMOD_STR "Last Modified \t %1!s!\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTERDATA_FILTER_COUNT "No. of Filters \t %1!d!\n"
|
|
|
|
// Function: PrintFilterSpec()
|
|
|
|
/*NL*/ SHW_STATIC_TAB_PRTFSPEC_FORMAT45S "%1!-45s!\t"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTFSPEC_NONE_STR "NONE\t"
|
|
/*NL*/ SHW_STATIC_TAB_PRTFSPEC_FORMATS "%1!s!\n"
|
|
|
|
/*NL*/ SHW_STATIC_TAB_PRTFSPEC_FORMAT5D " %1!5d! \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTFSPEC_NONE_TAB " NONE \t"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTFSPEC_YES_STR_TAB "YES \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTFSPEC_NO_STR_TAB "NO \t"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTFSPEC_FILTER_TITLE "Mir \t Source \t SrcMask \t Destination \t DstMask \t Proto \tSrcPort\tDstPort\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTFSPEC_FILTER_UNDERLINE "--- \t ------------- \t ------------- \t ------------- \t ------------- \t-------\t-------\t-------\n"
|
|
|
|
// Function: PrintFilter()
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTER_MY_IP_ADDR "< My IP Addr >\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTER_ANY_IP_ADDR "< Any IP Addr >\t"
|
|
|
|
/*NL*/ SHW_STATIC_TAB_PRTFILTER_IP_FORMAT_TAB " %1!3d!\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTER_ANY_STR_TAB " ANY \t"
|
|
/*NL*/ SHW_STATIC_TAB_PRTFILTER_IP_FORMAT_NEWLINE " %1!3d!\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTER_ANY_STR_NEWLINE " ANY \n"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTER_DNS_TAB " DNS SERVER \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTER_WINS_TAB " WINS SERVER \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTER_DHCP_TAB " DHCP SERVER \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTFILTER_DEFGATE_TAB "DEFAULT GATEWAY\t"
|
|
|
|
// Function: PrintProtocolName()
|
|
/* L*/ SHW_STATIC_TAB_PRTPROTOCOL_ICMP_TAB " ICMP \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTPROTOCOL_TCP_TAB " TCP \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTPROTOCOL_UDP_TAB " UDP \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTPROTOCOL_RAW_TAB " RAW \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTPROTOCOL_ANY_TAB " ANY \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTPROTOCOL_OTHER_TAB "OTHER\t"
|
|
|
|
// Function: PrintISAKMPData()
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMP_MMSEC_TITLE "Main Mode Security Method Order\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMP_MM_LIFE_FORMAT "MainMode LifeTime \t %1!d! minutes / %2!d! Quick mode sessions\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMP_MMSEC_MTD_TILE " Encryption\tIntegrity\tDH Group\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMP_MMSEC_MTD_UNDERLINE " ----------\t---------\t--------"
|
|
|
|
|
|
// Function: PrintISAKAMPSecurityMethods()
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMPSEC_DES_TAB "\n DES \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMPSEC_3DES_TAB "\n 3DES\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMPSEC_SHA1_TAB " SHA1\t"
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMPSEC_MD5_TAB " MD5 \t"
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMPSEC_DH_LOW " Low(1) "
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMPSEC_DH_MEDIUM " Medium(2)"
|
|
/* L*/ SHW_STATIC_TAB_PRTISAKMPSEC_DH_2048 " 2048 "
|
|
|
|
// Function: PrintStandAloneFAData()
|
|
/* L*/ SHW_STATIC_TAB_PRTSAFA_STAND_ALONE_FA_TITLE "\n\
|
|
\nStand Alone FilterAction(s)\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTSAFA_STAND_ALONE_FA_UNDERLINE "---------------------------\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTSAFA_STAND_ALONE_FA_COUNT "\nNo. of Standalone FilterActions \t %1!d!\n\
|
|
\n"
|
|
|
|
// Function: PrintStandAloneFLData()
|
|
/* L*/ SHW_STATIC_TAB_PRTSAFL_STAND_ALONE_FL_TITLE "\nStand Alone FilterList(s)\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTSAFL_STAND_ALONE_FL_UNDERLINE "-------------------------\n"
|
|
|
|
/* L*/ SHW_STATIC_TAB_PRTSAFL_STAND_ALONE_FL_COUNT "\nNo. of Standalone FilterLists \t %1!d!\n"
|
|
|
|
// Function: PrintAllFilterData()
|
|
/* L*/ SHW_STATIC_TAB_PRTALLFL_FL_COUNT_TAB "\nNo. of FilterLists \t %1!d!\n\
|
|
\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTALLFL_FL_COUNT_LIST "\nNo. of FilterLists : %1!d!\n\
|
|
\n"
|
|
|
|
// Function: PrintAllFilterActionData()
|
|
/* L*/ SHW_STATIC_TAB_PRTALLFA_FA_COUNT_TAB "\nNo. of FilterActions \t %1!d!\n\
|
|
\n"
|
|
/* L*/ SHW_STATIC_TAB_PRTALLFA_FA_COUNT_LIST "\nNo. of FilterActions : %1!d!\n\
|
|
\n"
|
|
|
|
//HandleStaticDeletePolicy
|
|
/* L*/ DEL_STATIC_POLICY_ACTIVE_POL_DEL_QUERY "The policy '%1!s!' is ACTIVE. Still would you like to delete? (Y/N) \n"
|
|
/* L*/ DEL_STATIC_POLICY_FA_FL_DEL_QUERY "Would you like to delete all the Filter List(s) and Filter Action(s) associated with the policy ? (Y/N) \n"
|
|
|
|
|
|
//HandleStaticDeleteFilterList
|
|
/* L*/ DEL_STATIC_FILTERLIST_ALL_FL_DEL_QUERY "Delete all the Filter Lists from "
|
|
/* L*/ DEL_STATIC_FILTERLIST_Y_N_STR "? (Y/N)\n"
|
|
|
|
//HandleStaticDeleteFilterAction
|
|
/* L*/ DEL_STATIC_FILTERACTION_ALL_FA_DEL_QUERY "Delete all the Filter Actions from "
|
|
/* L*/ DEL_STATIC_FILTERACTION_Y_N_STR "? (Y/N)\n"
|
|
|
|
//HandleStaticDeleteRule
|
|
/* L*/ DEL_STATIC_RULE_FL_FA_DEL_QUERY "Would you like to delete both the Filter List and Filter Action associated with the rule(s)? (Y/N) \n"
|
|
|
|
//HandleStaticDeleteAll
|
|
/* L*/ DEL_STATIC_ALL_POL_DEL_QUERY "Are you sure to delete all policies from "
|
|
/* L*/ DEL_STATIC_ALL_Y_N_STR "? (Y/N)\n"
|
|
|
|
//ShowWhereFAUsed / ShowWhereFLUsed
|
|
/* L*/ DEL_STATIC_SHWRUSED_TITLE "\n\
|
|
\nFollowing policies/rule(s) are using it\n"
|
|
/* L*/ DEL_STATIC_SHWRUSED_UNDERLINE "---------------------------------------\n"
|
|
/* L*/ DEL_STATIC_SHWRUSED_RULE_NAME_STR "\tRule Name : %1!s!\n"
|
|
|
|
/* L*/ DEL_STATIC_SHWRUSED_RULE_NAME_NONE "\tRule Name : NONE\n"
|
|
|
|
/* L*/ ADD_STATIC_POLICY_LIFETIME_STR "Life should be within %1!d! and %2!d! kBytes\n"
|
|
|
|
/* L*/ ADD_STATIC_CRNEWPOL_SUCCESS_MSG "New Policy is created and updated successfully\n"
|
|
/* L*/ ADD_STATIC_CRNEWPOL_CREATING_INFO "Creating new Policy with name '%1!s!'...\n"
|
|
/* L*/ ADD_STATIC_CRNEWPOL_UPDATING_INFO "Creating new Policy with name '%1!s!' and setting it to '%2!s!'...\n"
|
|
|
|
/* L*/ ADD_STATIC_FILTERACTION_LIFE_TIME_STR "Life should be with in %1!d! and %2!d! kBytes\n"
|
|
|
|
/* L*/ ADD_STATIC_FILTER_SRCSERVER_WARNING "Destination IP address has been taken as 'me'\n"
|
|
/* L*/ ADD_STATIC_FILTER_DSTSERVER_WARNING "Source IP address has been taken as 'me'\n"
|
|
|
|
/* L*/ ADD_STATIC_RULE_SUCCESS_MSG "New Rule was created and updated successfully\n"
|
|
/* L*/ ADD_STATIC_RULE_CREATING_INFO "Creating new Rule with name '%1!s!' ...\n"
|
|
/* L*/ ADD_STATIC_RULE_UPDATING_INFO "Creating new Rule with name '%1!s!' and setting it to '%2!s!' ...\n"
|
|
/* L*/ ADD_STATIC_RULE_INVALID_TUNNEL "Server type/'me'/'any' cannot be specified for tunnel. Tunnel value is ignored\n"
|
|
|
|
/* L*/ SET_STATIC_POLICY_NEW_POL_QUERY "Would you like to create a new policy? (Y/N) \n"
|
|
|
|
/* L*/ SET_STATIC_POLICY_INVALID_CERTMAP_MSG "Certificate-to-account mapping can only be enabled on Active Directory domain members. The option will be ignored.\n"
|
|
/* L*/ SET_STATIC_POLICY_CERTMAP_YES_STR "Cert To Account Mapping: YES\n"
|
|
/* L*/ SET_STATIC_POLICY_CERTMAP_NO_STR "Cert To Account Mapping: NO\n"
|
|
/* L*/ SET_STATIC_POLICY_MISSING_GPO_NAME_STR "If store is domain and assign is specified, GPO name is required\n"
|
|
/* L*/ SET_STATIC_POLICY_GPO_NOT_OK_STR "If GPO name is specified, then you must be operating on a domain policy store.\n"
|
|
|
|
/* L*/ SET_STATIC_RULE_NEW_RULE_QUERY "Would you like to create a new Rule? (Y/N) \n"
|
|
|
|
// Function: HandleStaticShowPolicy()
|
|
/* L*/ SHW_STATIC_POLICY_COUNT "\n\
|
|
\nNo. of policies : %1!d!\n"
|
|
|
|
/* L*/ SHW_STATIC_POLICY_STORE_RM_NAME_STR "Store : Local Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_POLICY_STORE_LM_NAME_STR "Store : Local Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_POLICY_STORE_RM_NAME_STRP "Store : Persistent Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_POLICY_STORE_LM_NAME_STRP "Store : Persistent Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_POLICY_STORE_LD_NAME_STR "Store : Domain Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_POLICY_STORE_RD_NAME_STR "Store : Domain Store <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_POLICY_STORE_LM_STR "Store : Local Store \n"
|
|
/* L*/ SHW_STATIC_POLICY_STORE_LM_STRP "Store : Persistent Store \n"
|
|
/* L*/ SHW_STATIC_POLICY_STORE_LD_STR "Store : Domain Store \n"
|
|
/* L*/ SHW_STATIC_POLICY_RM_STR "Remote Machine <%1!s!>"
|
|
/* L*/ SHW_STATIC_POLICY_LM_STR "Local Machine <%1!s!>"
|
|
/* L*/ SHW_STATIC_POLICY_RD_STR "Remote Domain <%1!s!>"
|
|
/* L*/ SHW_STATIC_POLICY_LD_STR "Local Domain <%1!s!>"
|
|
|
|
/* L*/ SHW_STATIC_POLICY_LM "Local Machine"
|
|
/* L*/ SHW_STATIC_POLICY_LD "Local Domain "
|
|
|
|
|
|
// Function: HandleStaticShowFilterList()
|
|
/* L*/ SHW_STATIC_FILTERLIST_POL_NAME "\n\
|
|
\nPolicy Name : %1!s!\n"
|
|
|
|
// Function: HandleStaticShowRule()
|
|
|
|
/* L*/ SHW_STATIC_RULE_RULE_ID_GUID "\n\
|
|
\nRule ID : %1!d!, GUID = %2!s!"
|
|
/* L*/ SHW_STATIC_RULE_FL_NAME_STR "FilterList Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_RULE_FL_NAME_NONE "FilterList Name : NONE\n"
|
|
|
|
|
|
// Function: PrintPolicy()
|
|
|
|
/* L*/ SHW_STATIC_PRTPOLICY_POL_NAME_STR "Policy Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_POL_DESC_STR "Description : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_POL_DESC_NONE "Description : NONE\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_ASSIGNED_YES_STR "Assigned : YES\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_ASSIGNED_NO_STR "Assigned : NO\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_MMPFS_YES_STR "Master PFS : YES\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_MMPFS_NO_STR "Master PFS : NO\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_POLL_INTERVAL "Polling Interval : %1!d! minutes\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_RULE_COUNT "\n\
|
|
\nNo. of Rules : %1!d! \n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_RULE_DETAILS_TITLE "\nRule Details\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_RULE_DETAILS_UNDERLINE "------------\n"
|
|
/* L*/ SHW_STATIC_PRTPOLICY_ASSIGNED_AD "Assigned : YES but AD Policy Overrides\n"
|
|
|
|
// Function: PrintRule()
|
|
/* L*/ SHW_STATIC_PRTRULE_RULE_NAME_STR "\nRule Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_RULE_NAME_NONE "\nRule Name : NONE\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_AUTH_TITLE "Authentication Methods(%1!d!)\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTRULE_TUNNEL_IP "Tunnel Dest IP Address : "
|
|
|
|
/* L*/ SHW_STATIC_PRTRULE_CONN_ALL_STR "Connection Type : ALL\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_CONN_LAN_STR "Connection Type : LAN\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_CONN_DIALUP_STR "Connection Type : DIAL UP\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTRULE_CONN_NONE_STR "Connection Type : NONE\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTRULE_FL_DETAILS_TITLE "\nFilterList Details\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_FL_DETAILS_UNDERLINE "------------------\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTRULE_NO_FL_FOR_DEF_RULE "\nNo FilterList exists in Default Response Rule\n\
|
|
\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_FA_DETAILS_TITLE "FilterAction Details\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_FA_TITLE_UNDERLINE "---------------------\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_TRANS_COUNT "\nNo of Transport rule(s): %1!d!"
|
|
/* L*/ SHW_STATIC_PRTRULE_TUNNEL_COUNT "\nNo of Tunnel rule(s) : %1!d!"
|
|
/* L*/ SHW_STATIC_PRTRULE_ACTIVATED_YES_STR "Activated : YES\n"
|
|
/* L*/ SHW_STATIC_PRTRULE_ACTIVATED_NO_STR "Activated : NO\n"
|
|
|
|
// Function: PrintNegPolData()
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_FA_NAME_STR "FilterAction Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_FA_NAME_NONE "FilterAction Name : NONE\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_ACTION_PERMIT "Action : PERMIT\n"
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_ACTION_BLOCK "Action : BLOCK\n"
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_ACTION_NEGOTIATE "Action : NEGOTIATE SECURITY\n"
|
|
|
|
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_SOFT_YES_STR "AllowUnsecure(Fallback): YES\n"
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_SOFT_NO_STR "AllowUnsecure(Fallback): NO\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_INPASS_YES_STR "Inbound Passthrough : YES\n"
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_INPASS_NO_STR "Inbound Passthrough : NO\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_SEC_MTD_COUNT "No. of Security.Methods: %1!d!"
|
|
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_ALGO_TITLE_STR " AH ESP LIFE (Sec/kB) \n"
|
|
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_ALGO_TITLE_UNDERLINE " -- --- ------------- \n"
|
|
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_QMPFS_YES_STR "QMPFS : YES\n"
|
|
/* L*/ SHW_STATIC_PRTNEGPOL_QMPFS_NO_STR "QMPFS : NO \n"
|
|
|
|
|
|
// Function: PrintAuthMethods()
|
|
/* L*/ SHW_STATIC_PRTAUTH_KERBEROS "KERBEROS\n"
|
|
/* L*/ SHW_STATIC_PRTAUTH_ROORCA_STR "Root CA : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTAUTH_PRE_STR "Preshared Key : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTAUTH_NONE_STR "NONE\n"
|
|
|
|
/* L*/ SHW_AUTH_EXCLUDE_CA_NAME_YES_STR " Exclude CA name : YES\n"
|
|
/* L*/ SHW_AUTH_EXCLUDE_CA_NAME_NO_STR " Exclude CA name : NO\n"
|
|
/* L*/ SHW_AUTH_CERTMAP_ENABLED_YES_STR " Certmapping enabled : YES\n"
|
|
/* L*/ SHW_AUTH_CERTMAP_ENABLED_NO_STR " Certmapping enabled : NO\n"
|
|
|
|
// Function: PrintFilterData()
|
|
/* L*/ SHW_STATIC_PRTFILTERDATA_FL_NAME_STR "\nFilterList Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTFILTERDATA_FL_NAME_NONE "\nFilterList Name : NONE\n"
|
|
/* L*/ SHW_STATIC_PRTFILTERDATA_FILTERS_COUNT "No. of Filters : %1!d!\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTFILTERDATA_FILTERS_TITLE "Filter(s)\n"
|
|
/* L*/ SHW_STATIC_PRTFILTERDATA_FILTERS_TITLE_UNDERLINE "---------\n"
|
|
/* L*/ SHW_STATIC_PRTFILTERDATA_FL_GUID "GUID : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTFILTERDATA_FL_LASTMODIFIED "Last Modified : %1!s!\n"
|
|
|
|
// Function: PrintFilterSpec()
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_ME "Source DNS Name : <My IP Address>\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_STR "Source DNS Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_ANY "Source DNS Name : <Any IP Address>\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_SPECIFIC_IP "Source DNS Name : <A Specific IP Address>\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_SPECIFIC_SUBNET "Source DNS Name : <A Specific IP Subnet>\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_NONE_STR "Source DNS Name : NONE\n"
|
|
|
|
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_ME "Destination DNS Name : <My IP Address>\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_STR "Destination DNS Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_ANY "Destination DNS Name : <Any IP Address>\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_SPECIFIC_IP "Destination DNS Name : <A Specific IP Address>\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_SPECIFIC_SUBNET "Destination DNS Name : <A Specific IP Subnet>\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_NONE_STR "Destination DNS Name : NONE\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTFSPEC_MIR_YES_STR "Mirrored : YES\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_MIR_NO_STR "Mirrored : NO\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_RESOLVE "Source DNS Name : %1!s! resolves to "
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DST_DNS_RESOLVE "Destination DNS Name : %1!s! resolves to "
|
|
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_DNSSERVER "Source DNS Name : < DNS SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_WINSSERVER "Source DNS Name : < WINS SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_DHCPSERVER "Source DNS Name : < DHCP SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_SRCDNS_DEFGATEWAY "Source DNS Name : < DEFAULT GATEWAY >\n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_DNSSERVER "Destination DNS Name : < DNS SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_WINSSERVER "Destination DNS Name : < WINS SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_DHCPSERVER "Destination DNS Name : < DHCP SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFSPEC_DSTDNS_DEFGATEWAY "Destination DNS Name : < DEFAULT GATEWAY >\n"
|
|
|
|
/*NL*/ SHW_STATIC_PRTFSPEC_FORMAT15S "%1!-15s!\t"
|
|
/*NL*/ SHW_STATIC_PRTFSPEC_FORMAT_NO_NEWLINE "%1!s!"
|
|
/*NL*/ SHW_STATIC_PRTFSPEC_FORMAT_NEWLINE "%1!s!\n"
|
|
|
|
/*NL*/ SHW_STATIC_PRTFSPEC_NEWLINE "\n"
|
|
|
|
/*NL*/ SHW_STATIC_PRTFSPEC_COMMA ","
|
|
/*NL*/ SHW_STATIC_PRTFSPEC_EXTENSION " ..."
|
|
|
|
|
|
/*NL*/ SHW_STATIC_PRTFSPEC_SPACE_COMMA " , "
|
|
|
|
// Function: PrintFilter()
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCIP_ME "Source IP Address : <My IP Address> \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCIP_ANY "Source IP Address : <Any IP Address> \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCIP_STR "Source IP Address : "
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCIP_MASK "Source Mask : "
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTIP_ME "Destination IP Address : <My IP Address> \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTIP_ANY "Destination IP Address : <Any IP Address> \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTIP_STR "Destination IP Address : "
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTIP_MASK "Destination Mask : "
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCPORT_STR "Source Port : %1!d!\n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCPORT_ANY "Source Port : ANY\n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTPORT_STR "Destination Port : %1!d!\n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTPORT_ANY "Destination Port : ANY\n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_RESOLVES " resolves to %1!s!\n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_DNS_FAILED " <DNS Look up failed>\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCIP_DNSSERVER "Source IP Address : < DNS SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCIP_WINSSERVER "Source IP Address : < WINS SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCIP_DHCPSERVER "Source IP Address : < DHCP SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_SRCIP_DEFGATEWAY "Source IP Address : < DEFAULT GATEWAY >\n"
|
|
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTIP_DNSSERVER "Destination IP Address : < DNS SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTIP_WINSSERVER "Destination IP Address : < WINS SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTIP_DHCPSERVER "Destination IP Address : < DHCP SERVER > \n"
|
|
/* L*/ SHW_STATIC_PRTFILTER_DSTIP_DEFGATEWAY "Destination IP Address : < DEFAULT GATEWAY >\n"
|
|
|
|
// Function: PrintProtocolName()
|
|
/* L*/ SHW_STATIC_PRTPROTOCOL_ICMP "Protocol : ICMP\n"
|
|
/* L*/ SHW_STATIC_PRTPROTOCOL_TCP "Protocol : TCP\n"
|
|
/* L*/ SHW_STATIC_PRTPROTOCOL_UDP "Protocol : UDP\n"
|
|
/* L*/ SHW_STATIC_PRTPROTOCOL_RAW "Protocol : RAW\n"
|
|
/* L*/ SHW_STATIC_PRTPROTOCOL_ANY "Protocol : ANY\n"
|
|
/* L*/ SHW_STATIC_PRTPROTOCOL_OTHER "Protocol : %1!d!\n"
|
|
|
|
// Function: PrintISAKMPData()
|
|
|
|
/* L*/ SHW_STATIC_PRTISAKMP_MMSEC_ORDER_TITLE "Main Mode Security Method Order\n"
|
|
/* L*/ SHW_STATIC_PRTISAKMP_MMLIFETIME_STR "MainMode LifeTime : %1!d! minutes / %2!d! Quick Mode sessions\n"
|
|
/* L*/ SHW_STATIC_PRTISAKMP_ALGO_TITLE_STR " Encryption Integrity DH Group\n"
|
|
/* L*/ SHW_STATIC_PRTISAKMP_ALGO_TITLE_UNDERLINE " ---------- --------- --------"
|
|
|
|
// Function: PrintISAKAMPSecurityMethods()
|
|
/* L*/ SHW_STATIC_PRTISAKMPSEC_DES_STR "\n DES "
|
|
/* L*/ SHW_STATIC_PRTISAKMPSEC_3DES_STR "\n 3DES "
|
|
/* L*/ SHW_STATIC_PRTISAKMPSEC_SHA1_STR " SHA1 "
|
|
/* L*/ SHW_STATIC_PRTISAKMPSEC_MD5_STR " MD5 "
|
|
/* L*/ SHW_STATIC_PRTISAKMPSEC_DH_LOW_STR " Low(1) "
|
|
/* L*/ SHW_STATIC_PRTISAKMPSEC_DH_MED_STR " Medium(2) "
|
|
/* L*/ SHW_STATIC_PRTISAKMPSEC_DH_2048_STR " 2048 "
|
|
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_SRCMACHINE "\n\
|
|
\nSource Machine : Local Computer GPO for <%1!s!>\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_SRCDOMAIN "\n\
|
|
\nSource Domain : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_DC_NAME "DC Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_GPO_NAME_STR "GPO Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_LOCAL_POL_NAME_STR "Local IPSec Policy Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_AD_POL_NAME_STR "AD IPSec Policy Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_GPO_DN_NAME "GPO DN : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_GPO_OU_LINK "GPO OU Link : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_AD_POL_DN_NAME "AD Policy DN : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_LOC_OPOL_ACTIVE_AD "Local IPSec Policy Assigned: Yes, but AD Policy is Overriding\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_LOC_POL_ACTIVE_STR "Local IPSec Policy DN : %1!s!\n"
|
|
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_LOC_POL_NAME_NONE "Local IPSec Policy Name : NONE\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_AD_POL_NAME_NONE "AD IPSec Policy Name : NONE\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_POL_NAME_STR "IPSec Policy Name : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_POL_DN_STR "IPSec Policy DN : %1!s!\n"
|
|
/* L*/ SHW_STATIC_ASSIGNEDGPO_POL_ACTIVE_STR "IPSec Policy Assigned : YES\n"
|
|
|
|
// Static error codes start here
|
|
/* L*/ ERR_ADD_STATIC_POLICY_MISSING_POL_NAME "Missing Policy Name\n"
|
|
/* L*/ ERR_ADD_STATIC_POLICY_POLL_INTERVAL_MSG "Polling Interval should be within %1!d! and %2!d! minutes\n"
|
|
/* L*/ ERR_ADD_STATIC_POLICY_QMPERMM_MSG "Quickmode limit should be within %1!d! and %2!d! sessions\n"
|
|
/* L*/ ERR_ADD_STATIC_POLICY_LIFETIME_LIMIT_MSG "Lifetime should be within %1!d! and %2!d! minutes\n"
|
|
/* L*/ ERR_ADD_STATIC_CRNEWPOL_POL_EXISTS "Policy with name '%1!s!' already exists\n"
|
|
/* L*/ ERR_ADD_STATIC_CRNEWPOL_DEF_RULE_ERR "Error while adding Default Response Rule\n"
|
|
/* L*/ ERR_ADD_STATIC_CRNEWPOL_ERROR "Error while creating Policy with name '%1!s!'\n"
|
|
/* L*/ ERR_ADD_STATIC_CRNEWPOL_FAIL_DEF_AUTH "Error while creating policy with name '%1!s!' due to failure in loading default auth methods \n"
|
|
|
|
//Add Filterlist
|
|
/* L*/ ERR_ADD_STATIC_FILTERLIST_MISSING_FL_NAME "Missing FilterList Name\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTERLIST_FL_ALREADY_EXISTS "FilterList with name '%1!s!' already exists\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTERLIST_ERROR_NEW_FL "Error while creating FilterList with name '%1!s!'\n"
|
|
|
|
//Add Filter
|
|
/* L*/ ERR_ADD_STATIC_FILTER_ERROR_NEW_FILTER "Error while creating the specified Filter\n"
|
|
|
|
//Add FilterAction
|
|
ERR_ADD_STATIC_RULE_MISSIGN_FA_NAME "Missing FilterAction Name\n"
|
|
ERR_ADD_STATIC_FILTERACTION_FA_EXISTS "FilterAction with name '%1!s!' already exists\n"
|
|
ERR_ADD_STATIC_FILTERACTION_ERROR_NEW_FA "Error while creating FilterAction with name '%1!s!'\n"
|
|
|
|
//Add Rule
|
|
/* L*/ ERR_ADD_STATIC_RULE_MISSING_RULE_NAME "Missing Rule Name\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_POL_NOT_AVAILABLE "Policy with name '%1!s!' does not exist\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_RULE_ALREADY_EXISTS "Rule with name '%1!s!' already exists in policy '%2!s!'\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_FA_NOT_EXISTS "FilterAction with name '%1!s!' does not exist\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_NO_FILTERS_IN_FL "No Filters in FilterList with name '%1!s!'\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_ERROR_NEW_RULE "Error while creating Rule with name '%1!s!'\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_MISSING_RULE_NAME_OR_ID "Missing Rule Name or Rule ID\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_DEF_AUTH_LOAD_FAILED "Error while creating Rule with name '%1!s!' due to failure in loading default auth methods\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_CERT_DECODING_FAIL "Certificate decoding operation failed\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_POL_NOT_EXIST_IN_DOMAIN "Policy with name '%1!s!' does not exist in current machine's domain\n"
|
|
/* L*/ ERR_ADD_RULE_INVALID_TUNNEL "Invalid Tunnel IP Address Specified\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTER_FL_NOT_EXISTS "FilterList with name '%1!s!' does not exist\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTER_SERVER_NOT_ALLOWED_BOTH_SIDES "Servers cannot be specified for both source and destination sides\n"
|
|
|
|
/* L*/ ERR_ADD_STATIC_FILTER_INVALID_SRCIP "Invalid Source IP Address specified\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTER_INVALID_SRCIPMASK "Invalid Source IP/Mask specified\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTER_ADDRESS_CONFLICT "Address Conflict. Source and Destination cannot have same IP/DNS\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTER_INVALID_SERVER_TYPE "Invalid server specified\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTER_SERVER_TYPE_NEEDED "Server needs to be specified\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTER_INVALID_DSTIP "Invalid destination IP Address specified\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTER_INVALID_DSTIPMASK "Invalid destination mask specified\n"
|
|
|
|
//Set Policy
|
|
/* L*/ ERR_ADD_STATIC_FILTERLIST_INVALID_GUID "Invalid GUID specified\n"
|
|
/* L*/ ERR_ADD_STATIC_RULE_POL_GUID_NOT_EXISTS "Policy with GUID %1!s! does not exist\n"
|
|
/* L*/ ERR_SET_STATIC_POLICY_NO_DS "No Directory Service available\n"
|
|
/* L*/ ERR_SET_STATIC_POLICY_NO_GPO_NAME "GPO with name '%1!s!' does not exist in current machine's domain\n"
|
|
/* L*/ ERR_SET_STATIC_POLICY_ERR_GPO_ASSIGN "Error while assigning the Policy to the GPO with name '%1!s!' or specified GPO does not exist\n"
|
|
/* L*/ ERR_SET_STATIC_POLICY_INVALID_CERTMAP_MSG "Error while updating the Policy with name '%1!s!'\n"
|
|
/* L*/ ERR_SET_STATIC_POLICY_CERTMAP_YES_STR "Error while updating the Policy with GUID %1!s!\n"
|
|
/* L*/ ERR_SET_STATIC_POLICY_CERT_MAP_NO_STR "Error while unassigning the Policy from the GPO with name '%1!s!' or specified GPO does not exist\n"
|
|
|
|
//Set Filterlist
|
|
/* L*/ ERR_ADD_STATIC_FILTER_FL_GUID_NOT_EXISTS "FilterList with GUID %1!s! does not exist\n"
|
|
/* L*/ ERR_SET_STATIC_FILTERLIST_ERR_UPDATE_FL_NAME "Error while updating FilterList with name '%1!s!'\n"
|
|
/* L*/ ERR_SET_STATIC_FILTERLIST_ERR_UPDATE_FL_GUID "Error while updating FilterList with GUID %1!s!\n"
|
|
|
|
//set filter action
|
|
/* L*/ ERR_ADD_STATIC_FILTERACTION_INVALID_OPTIONS "Inpass, Qmpfs, Soft and Qmsec options are not valid for the Permit or Block type FilterAction. 'action = negotiate' needs to be specified\n"
|
|
/* L*/ ERR_ADD_STATIC_FILTERACTION_MIMIMUM_QMSEC "Atleast One Quick mode Security method needs to be specified\n"
|
|
|
|
/* L*/ ERR_ADD_STATIC_RULE_FA_GUID_NOT_EXISTS "FilterAction with GUID %1!s! does not exist\n"
|
|
/* L*/ ERR_SET_STATIC_FA_ERR_NAME_UPDATE "Error while updating FilterAction with name '%1!s!'\n"
|
|
/* L*/ ERR_SET_STATIC_FA_ERR_GUID_UPDATE "Error while updating FilterAction with GUID %1!s!\n"
|
|
|
|
//set rule
|
|
/* L*/ ERR_SET_STATIC_RULE_INVALID_NAME "Rule with name '%1!s!' does not exist in Policy '%2!s!'\n"
|
|
/* L*/ ERR_SET_STATIC_RULE_ERROR_UPDATE "Error while updating rule with name '%1!s!'\n"
|
|
/* L*/ ERR_SET_STATIC_RULE_DEF_DEL_NOT_ALLOWED "Default rule cannot be updated with this command. Use the 'set defaultrule' command\n"
|
|
/* L*/ ERR_SET_STATIC_RULE_NEW_RULE_QUERY "Rule with ID %1!d! does not exist in Policy '%2!s!'\n"
|
|
/* L*/ ERR_SET_STATIC_RULE_INVALID_ID "Invalid Rule ID Specified\n"
|
|
//set def rule
|
|
/* L*/ ERR_SET_STATIC_DEFRULE_ERROR_UPDATE "Error while updating Default Rule of Policy with name '%1!s!'\n"
|
|
|
|
//import policy
|
|
|
|
/* L*/ ERR_MISC_STATIC_IMPORTPOLICY_NO_FILE_NAME "No file name specified\n"
|
|
/* L*/ ERR_MISC_STATIC_IMPORTPOLICY_INVALID_FILE "Invalid File / Path name\n"
|
|
/* L*/ ERR_MISC_STATIC_IMPORTPOLICY_ERROR "Error while importing policies\n"
|
|
|
|
//export policy
|
|
/* L*/ ERR_MISC_STATIC_EXPORTPOLICY_ERROR "Error while exporting policies\n"
|
|
|
|
//restore def
|
|
/* L*/ ERR_MISC_STATIC_RESDEFRULE_ERROR "Error while restoring default policies\n"
|
|
/* L*/ ERR_MISC_STATIC_RESDEFRULE_CMD_NA "This command is only available for the local store\n"
|
|
|
|
//Set Store
|
|
/* L*/ ERR_MISC_STATIC_SETSTORE_DOMAIN_NA "Invalid Domain Name. Domain with name '%1!s!' does not exist\n"
|
|
/* L*/ ERR_MISC_STATIC_SETSTORE_NOT_DOMAIN_MEMBER "Your machine is not a member of domain\n"
|
|
//delete policy
|
|
/* L*/ ERR_DEL_STATIC_POLICY_ERROR "Error while deleting Policy with name '%1!s!'\n"
|
|
/* L*/ ERR_SHW_STATIC_POLICY_NAME_NOT_EXISTS "No Policy with name '%1!s!'\n"
|
|
|
|
//delete filterlist
|
|
/* L*/ ERR_DEL_STATIC_FILTERLIST_DEL_NOT_ALLOWED "FilterList with name '%1!s!' cannot be deleted"
|
|
/* L*/ ERR_DEL_STATIC_FILTERLIST_ERROR "Error while deleting FilterList with name '%1!s!'"
|
|
|
|
//delete filter
|
|
/* L*/ ERR_SHW_STATIC_TAB_PRTALLFL_NAME_NOT_EXISTS "No FilterList with name '%1!s!'\n"
|
|
/* L*/ ERR_DEL_STATIC_FILTER_NOT_AVAILABLE "Filter with the specified spec does not exist in FilterList with name '%1!s!'\n"
|
|
/* L*/ ERR_DEL_STATIC_FILTER_ERROR "Error while updating FilterList with name '%1!s!' after deletion of the specified filter\n"
|
|
|
|
//delete filter action
|
|
/* L*/ ERR_DEL_STATIC_FA_DEL_NOT_ALLOWED "FilterAction with name '%1!s!' cannot be deleted"
|
|
/* L*/ ERR_DEL_STATIC_FA_ERROR "Error while deleting FilterAction with name '%1!s!'"
|
|
/* L*/ ERR_SHW_STATIC_TAB_PRTALLFA_FA_COUNT_LIST "No FilterAction with name '%1!s!'\n"
|
|
|
|
//delete rule
|
|
/* L*/ ERR_SHW_STATIC_RULE_MISSING_POL_NAME "No Policy name specified\n"
|
|
/* L*/ ERR_DEL_STATIC_RULE_ERR_DEL_RULE_NAME "Error while deleting Rule with name '%1!s!'\n"
|
|
/* L*/ ERR_DEL_STATIC_RULE_ERR_DEL_RULE_ID "Error while deleting Rule with ID %1!d!\n"
|
|
/* L*/ ERR_DEL_STATIC_RULE_DEF_DEL_NOT_ALLOWED "Default Response Rule cannot be deleted\n"
|
|
/* L*/ ERR_SHW_STATIC_RULE_NO_RULE_WITH_ID "No Rule with ID %1!d!\n"
|
|
/* L*/ ERR_DEL_STATIC_RULE_NO_RULE_WITH_NAME "No Rule with name '%1!s!'\n"
|
|
|
|
//show policy
|
|
/* L*/ ERR_SHW_STATIC_LIST_POLICY_COUNT "No policy with name '%1!s!'\n"
|
|
/* L*/ ERR_SHW_STATIC_TAB_POLICY_ERR_NEGPOL "Error while extracting NegPol info of Policy with name '%1!s!'\n"
|
|
/* L*/ ERR_SHW_STATIC_TAB_POLICY_ERR_FILTER "Error while extracting Filter info of Policy with name '%1!s!'\n"
|
|
/* L*/ ERR_SHW_STATIC_TAB_POLICY_ERR_ISAKMP "Error while extracting ISAKMP info of Policy with name '%1!s!'\n"
|
|
|
|
//show filterl
|
|
/* L*/ ERR_SHW_STATIC_TAB_FL_NO_RULE_NAME_STR "No Rule with name '%1!s!'\n"
|
|
/* L*/ ERR_SHW_STATIC_TAB_RULE_NO_RULE_ID "No Rule with ID %1!d!\n"
|
|
|
|
|
|
//show assigned gpo policy
|
|
/* L*/ ERR_SHW_STATIC_TAB_ASSIGNPOL_NO_ACTIVE_POL "No currently assigned Policy\n"
|
|
|
|
/* L*/ ERR_SHW_STATIC_TAB_PRTALLFL_NO_FL "No FilterList exists in Policy Store\n"
|
|
/* L*/ ERR_SHW_STATIC_TAB_PRTALLFA_NO_FA "No FilterAction exists in Policy Store\n"
|
|
/* L*/ ERR_SHW_STATIC_ASSIGNEDGPO_SRCMACHINE3 "Either invalid GPO name or no currently assigned policy\n"
|
|
/* L*/ ERR_SHW_STATIC_ASSIGNEDGPO_SRCMACHINE4 "A name must be specified when using the domain store\n"
|
|
/* L*/ ERR_SHW_STATIC_ASSIGNEDGPO_SRCMACHINE5 "No name can be specified when using the local store\n"
|
|
|
|
/* L*/ ERR_SET_STATIC_POL_NEWNAME "Invalid Newname. Policy with name '%1!s!' already exists\n"
|
|
/* L*/ ERR_SET_STATIC_RULE_NEWNAME "Invalid Newname. Rule with name '%1!s!' already exists\n"
|
|
/* L*/ ERR_SET_STATIC_FL_NEWNAME "Invalid Newname. Filterlist with name '%1!s!' already exists\n"
|
|
/* L*/ ERR_SET_STATIC_FA_NEWNAME "Invalid Newname. Filteraction with name '%1!s!' already exists\n"
|
|
/* L*/ ERR_SET_STATIC_SHOW_RULE_TYPE "If a type is specified, 'all' needs to be specified\n"
|
|
|
|
//Internal error
|
|
/* L*/ ERR_STATIC_INTERNAL_ERROR "Internal error occurred during this operation\n"
|
|
/* L*/ ERR_SHW_STATIC_RULE_RULE_ID_GUID "No Tunnel type rules exist in policy '%1!s!'\n"
|
|
/* L*/ ERR_UPDATE_DEF_NEGPOL "Updating default Filteraction is not allowed through this command. Use 'Set DefaultRule' command.\n"
|
|
/* L*/ ERR_SET_POL_READ_ONLY_OBJECT "Policy with name '%1!s!' has READONLY attribute. Updation denied\n"
|
|
/* L*/ ERR_ADD_SET_RULE_READ_ONLY_OBJECT "Specified Rule has READONLY attribute. Updation denied\n"
|
|
/* L*/ ERR_SET_FA_READ_ONLY_OBJECT "Filteraction with name '%1!s!' has READONLY attribute. Updation denied\n"
|
|
/* L*/ ERR_SET_FL_READ_ONLY_OBJECT "FilterList with name '%1!s!' has READONLY attribute. Updation denied\n"
|
|
/* L*/ ERR_DEL_POL_READ_ONLY_OBJECT "Policy with name '%1!s!' has READONLY attribute. Deletion denied\n"
|
|
/* L*/ ERR_DEL_RULE_READ_ONLY_OBJECT "Rule with name '%1!s!' has READONLY attribute. Deletion denied\n"
|
|
/* L*/ ERR_DEL_FA_READ_ONLY_OBJECT "Filteraction with name '%1!s!' has READONLY attribute. Deletion denied\n"
|
|
/* L*/ ERR_DEL_FL_READ_ONLY_OBJECT "FilterList with name '%1!s!' has READONLY attribute. Deletion denied\n"
|
|
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Error strings
|
|
//
|
|
/////////////////////////////////////////////////////////////////////////////////////////////////////////
|
|
|
|
/* L*/ ERR_WIN32_FMT "ERR Win32[%1!05d!] : %2!s!"
|
|
/* L*/ ERR_IPSEC_FMT "ERR IPSec[%1!05d!] : "
|
|
/* L*/ ERR_WIN32_SPACE " : "
|
|
/* L*/ ERR_WIN32_INVALID_WIN32CODE "ERR Win32[%1!05d!] : Invalid Win32 Err Code\n"
|
|
|
|
/* L*/ ERR_INVALID_NUM_ARGS "One or more essential parameters not specified\n"
|
|
/* L*/ ERR_INVALID_ARGS "Arguments are not matching. Check help for the correct syntax\n"
|
|
/* L*/ ERR_INVALID_POLICY_NAME "Policy with name %1!s! not exists in Policy Store\n"
|
|
/* L*/ ERR_NO_POLICY "No Policies in Policy Store\n"
|
|
/* L*/ ERR_FAILED_POLSTORE_OPEN "Unable to open Policy Store\n"
|
|
|
|
/* L*/ ERR_NO_FILTER_ACTION "No Filter Actions in Policy Store\n"
|
|
/* L*/ ERR_NO_FILTER_LIST "No Filter Lists in Policy Store\n"
|
|
|
|
|
|
/* L*/ ERR_INVALID_INDEX "Internal Error, Invalid Switch Case.\n"
|
|
/* L*/ ERR_INVALID_ARG "Invalid Parameter for the Argument '%1!s!'\n"
|
|
|
|
/* L*/ ERR_DNSLOOKUP_FAILED "DNS lookup failed for the given dns name '%1!s!'\n"
|
|
|
|
/* L*/ ERR_INVALID_ADDR "IP Address specified is invalid\n"
|
|
/* L*/ ERR_INVALID_TAG "'%1!s!' not a valid tag for this context\n"
|
|
/* L*/ ERR_TAG_ALREADY_PRESENT "'%1!s!' tag already present\n"
|
|
/* L*/ ERR_GPONAME_ARG_NEEDED "GPOname cannot be specified without argument 'assign = y/n'\n"
|
|
/* L*/ ERR_NAME_GUID_NEEDED "Tag 'Name' or 'GUID' needed for the given command\n"
|
|
/* L*/ ERR_TAG_NEEDED "'%1!s!' tag is needed\n"
|
|
/* L*/ ERR_ARG_INVALID "'%1!s!' is not a valid argument for the tag '%2!s!'\n"
|
|
/* L*/ ERR_MASK_INVALID "'%1!s!' is not a valid Mask/Prefix \n"
|
|
/* L*/ ERR_PREFIX_INVALID "Prefix should be between 1 and 32 only\n"
|
|
/* L*/ ERR_INVALID_MASK "Subnet mask specified is invalid\n"
|
|
/* L*/ ERR_INVALID_MACHINE "Non-tagged arg can only be machine or domain\n"
|
|
/* L*/ ERR_NULL_STRING "The argument supplied is null\n"
|
|
/* L*/ ERR_SECLIFE_INVALID "The 'Seconds' LifeTime specified is out of limit. It should be in between '%1!d!' and '%2!d!' only\n"
|
|
/* L*/ ERR_KBLIFE_INVALID "The 'Kbytes' specified is out of limit. It should be in between '%1!d!' and '%2!d!' only \n"
|
|
/* L*/ ERR_P2REKEY_INVALID "The Rekey Unit (k/s) is invalid\n"
|
|
/* L*/ ERR_HASH_INVALID "Invalid HASH algorithm specified\n"
|
|
/* L*/ ERR_ESP_INCOMPLETE "Incomplete ESP specified\n"
|
|
/* L*/ ERR_DUPALG_INVALID "Duplicate Algo's specified for '%1!s!'\n"
|
|
/* L*/ ERR_NONE_INVALID "None and None not allowed\n"
|
|
/* L*/ ERR_IPSECPROT_INVALID "Invalid IPSec protocol specified. It should be ESP or AH only\n"
|
|
/* L*/ ERR_MAX_OFFERS "Max Number of OFFERS[%1!d!] is crossed\n"
|
|
/* L*/ ERR_AHESP_INVALID "Invalid QM_OFFERS. Encryption+Encryption or Authentication+Authentication are not allowed\n"
|
|
/* L*/ ERR_KS_INVALID "Invalid Lifetime or Data specification for QMOffers.\n"
|
|
/* L*/ ERR_INVALID_P1GROUP "Invalid PFS Group specified for MMOFFER \n"
|
|
/* L*/ ERR_P1GROUP_MISSING "P1 Group missing\n"
|
|
/* L*/ ERR_MMOFFER_INVALID "Invalid MMOFFER is specified\n"
|
|
/* L*/ ERR_FILETYPE_INVALID "File name should contain .ipsec extension only\n"
|
|
/* L*/ ERR_ADDR_ALL_INVALID "'%1!s!' and ALL not allowed\n"
|
|
/* L*/ ERR_NO_PREKEY "Preshared key not specified\n"
|
|
/* L*/ ERR_AUTH_INVALID "Invalid Authmethod is specified \n"
|
|
/* L*/ ERR_ENCODE_FAILED "Invalid Certificate specified\n"
|
|
/* L*/ ERR_MULTIPLE_KERBPRE "Multiple '%1!s!' parameters are specified. Only one is allowed.\n"
|
|
/* L*/ ERR_PORT_INVALID "The Port specified is invalid. It should be in less than '%1!d!' only\n"
|
|
/* L*/ ERR_MAXARGS_CROSSED "No of arguments are more,truncated\n"
|
|
/* L*/ ERR_QMOFFER_INVALID "Invalid QMOFFER specified\n"
|
|
/* L*/ ERR_INVALID_TUNNEL "Invalid Tunnel IP specified\n"
|
|
/* L*/ ERR_PROTO_INVALID "Protocol can't be specified without source and destination addresses\n"
|
|
|
|
|
|
/* L*/ ERR_OUTOF_MEMORY "ERR WIN32[00014] : There is not enough memory to complete this operation.\n"
|
|
|
|
//Dynamic Error/warning messages
|
|
//Addrule
|
|
/* L*/ ERR_DYN_ACTION_IN_OUT_NEGOTIATE "QMPolicy is needed when ActionInbound or ActionOutbound specified as NEGOTIATE.\n"
|
|
/* L*/ ERR_DYN_INVALID_PORT "\nPort number valid for TCP or UDP protocols, continuing without PortNumber.\n"
|
|
|
|
/* L*/ ERR_DYN_QMP_NEEDED "QMPolicy is needed when ActionInbound or ActionOutbound specified as NEGOTIATE.\n"
|
|
/* L*/ ERR_DYN_INVALID_MIRROR "Mirror = Yes is not valid for Tunnel Rule.\n"
|
|
/* L*/ ERR_DYN_QMP_DOES_NOT_EXIST "Specified QMPolicy does not exist.\n"
|
|
/* L*/ ERR_DYN_MMP_DOES_NOT_EXIST "Specified MainMode Policy does not exist.\n"
|
|
|
|
//setrule
|
|
/* L*/ ERR_DYN_RULE_MMP_DOES_NOT_EXIST "Specified MainMode Policy does not exist.\n"
|
|
/* L*/ ERR_DYN_RULE_QMP_DOES_NOT_EXIST "Specified QMPolicy does not exist.\n"
|
|
|
|
//delete rule
|
|
/* L*/ ERR_DYN_MMF_DOES_NOT_EXIST "Specified MainMode Filter does not exist.\n"
|
|
/* L*/ ERR_DYN_TRANSPORT_DOES_NOT_EXIST "Specified Transport Filter does not exist.\n"
|
|
/* L*/ ERR_DYN_TUNNEL_DOES_NOT_EXIST "Specified Tunnel Filter does not exist.\n"
|
|
|
|
/* L*/ ERR_DYN_DEL_MMF_DOES_NOT_EXIST "MainMode Filters do not exist.\n"
|
|
/* L*/ ERR_DYN_DEL_MMF_MMP_DOES_NOT_EXIST "Specified MainMode Filter does not exist and Policy is not found.\n"
|
|
/* L*/ ERR_DYN_DEL_MMP_DOES_NOT_EXIST "Specified MainMode Policy either does not exist or not associated with specified MainMode Filter.\n"
|
|
/* L*/ ERR_DYN_DEL_SPECIFIED_MMF_DOES_NOT_EXIST "Specified MainMode Filter does not exist.\n"
|
|
|
|
/* L*/ ERR_DYN_DEL_QMF_DOES_NOT_EXIST "QuickMode Filters do not exist.\n"
|
|
/* L*/ ERR_DYN_DEL_QMF_QMP_DOES_NOT_EXIST "Specified QuickMode Filter does not exist and Policy is not found.\n"
|
|
/* L*/ ERR_DYN_DEL_QMP_DOES_NOT_EXIST "Specified QuickMode Policy either does not exist or is not associated with QuickMode Filter.\n"
|
|
/* L*/ ERR_DYN_DEL_SPECIFIED_QMF_DOES_NOT_EXIST "Specified QuickMode Filter does not exist.\n"
|
|
|
|
/* L*/ ERR_DYN_DEL_AUTH_BEING_USED "Authentication method(s) being used.\n"
|
|
|
|
/* L*/ ERR_DYN_DEL_MMF_OBJ_NOTDEL "%1!d! MMFilter object(s) could not be deleted.\n"
|
|
/* L*/ ERR_DYN_DEL_TRANSPORT_OBJ_NOTDEL "%1!d! Transport Filter object(s) could not be deleted.\n"
|
|
/* L*/ ERR_DYN_DEL_TUNNEL_OBJ_NOTDEL "%1!d! Tunnel Filter object(s) could not be deleted.\n"
|
|
|
|
/* L*/ ERR_DYN_MMP_EXISTS "MainMode Policy with the given name already exists.\n"
|
|
/* L*/ ERR_DYN_QMP_EXISTS "QuickMode Policy with the given name already exists.\n"
|
|
|
|
/* L*/ ERROR_DEL_NO_MMP "MainMode Policies are not available.\n"
|
|
/* L*/ ERROR_DEL_NO_QMP "QuickMode Policies are not available.\n"
|
|
|
|
/* L*/ ERROR_PA_NOT_RUN "The IPSec Policy Agent service is not active.\n"
|
|
/* L*/ ERROR_PA_SUCCESS "\nPolicy Agent service successfully started.\n"
|
|
/* L*/ ERROR_PARSER_STATS "\nWrong token from Parser, Should be either IPSEC, IKE or ALL."
|
|
/* L*/ ERROR_PARSER_ADDR "\nInvalid AddressType received from Parser.\n"
|
|
/* L*/ ERROR_PARSER_ADDRTYPE "Source and Destination both cannot be Servers.\n"
|
|
/* L*/ ERROR_PARSER_TUNNELADDRTYPE "Tunnel Source and Tunnel Destination both cannot be Servers.\n"
|
|
}
|
|
|
|
#include <windows.h>
|
|
#include <ntverp.h>
|
|
|
|
#define VER_FILETYPE VFT_DLL
|
|
#define VER_FILESUBTYPE VFT2_UNKNOWN
|
|
#define VER_FILEDESCRIPTION_STR "Net Shell IP Security helper DLL"
|
|
#define VER_INTERNALNAME_STR "nshipsec.dll"
|
|
#define VER_ORIGINALFILENAME_STR "nshipsec.dll"
|
|
|
|
#include "common.ver"
|