Source code of Windows XP (NT5)
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1234 lines
62 KiB

  1. /*++
  2. Copyright (c) 1996 Microsoft Corporation
  3. Module Name:
  4. ipmon.rc
  5. Abstract:
  6. IP Router Console Monitor Resources
  7. Author:
  8. Stefan Solomon 01/04/1996
  9. Revision History:
  10. --*/
  11. #include "strdefs.h"
  12. STRINGTABLE
  13. {
  14. MSG_NULL, ""
  15. HLP_RAS_HELP1, "Displays help.\n"
  16. HLP_RAS_HELP1_EX, "\
  17. \nUsage: %1!s!\n\
  18. \nRemarks: Displays help.\n\n"
  19. HLP_RAS_DUMP, "Dumps RAS configuration info in script form.\n"
  20. HLP_RAS_DUMP_EX "\
  21. \n%1!s! \
  22. \n \
  23. \n Dumps RAS configuration information in script form. \
  24. \n\n"
  25. HLP_SHOW_SERVERS, "Listens for RAS server advertisements.\n"
  26. HLP_SHOW_SERVERS_EX "\
  27. \n%1!s! \
  28. \n \
  29. \n Listens for RAS server advertisements. \
  30. \n\n"
  31. HLP_SHOW_CLIENT, "Shows RAS clients connected to this machine.\n"
  32. HLP_SHOW_CLIENT_EX, "\
  33. \n%1!s! \
  34. \n \
  35. \n Displays the RAS clients connected to this machine. \
  36. \n\n"
  37. HLP_GROUP_ADD, "Adds items to a table.\n"
  38. HLP_GROUP_DEL, "Removes items from a table.\n"
  39. HLP_GROUP_SET, "Sets configuration information.\n"
  40. HLP_GROUP_SHOW, "Displays information.\n"
  41. HLP_GROUP_ENABLE, "Enables options.\n"
  42. HLP_GROUP_DISABLE, "Disables options.\n"
  43. HLP_TRACE_SHOW, "Shows whether extended tracing is enabled for components.\n"
  44. HLP_TRACE_SET, "Enables/disables extended tracing for a component.\n"
  45. HLP_RASFLAG_SHOW, "Displays the state of a RAS server flag.\n"
  46. HLP_RASFLAG_SET, "Sets or clears a RAS server flag.\n"
  47. HLP_RASUSER_SHOW, "Displays RAS properties for a user(s).\n"
  48. HLP_RASUSER_SET, "Sets the RAS properties of a user.\n"
  49. HLP_DOMAIN_REGISTER,"Registers the given Windows 2000 computer as a RAS \
  50. \n server in the Active Directory of the given domain.\n"
  51. HLP_DOMAIN_UNREGISTER,"Un-registers the given Windows 2000 computer as a \
  52. \n RAS server in the Active Directory of the given \
  53. \n domain. \n"
  54. HLP_DOMAIN_SHOWREG,"Displays whether a computer is registered as a \
  55. \n RAS server in the Active Directory of the given \
  56. \n domain. \n"
  57. HLP_TRACE_SHOW_EX, "\
  58. \n %1!s! [ [component = ] component ] \
  59. \n \
  60. \n Shows whether tracing for the given component is enabled. If no \
  61. \n component is specified, shows the state of all components. \
  62. \n \
  63. \n component - the component \
  64. \n\n"
  65. HLP_TRACE_SET_EX, "\
  66. \n %1!s! [component = ] component [state = ] ENABLED|DISABLED \
  67. \n \
  68. \n Enables or disables extended tracing for the given component. \
  69. \n \
  70. \n component - the component (use '*' to denote all components) \
  71. \n\n"
  72. HLP_RASFLAG_SHOW_EX, "\
  73. \n %1!s! [ [flag = ] flag ] \
  74. \n \
  75. \n Displays the state of the RAS server flag. If no flag is given, \
  76. \n the state of all flags will be displayed. \
  77. \n \
  78. \n flag - The server flag to show which can be one of the following: \
  79. \n \
  80. \n UseCallbackDelay: Delay before calling back a client. \
  81. \n UseSwCompression: Enable software compression. \
  82. \n NegotiateSPAP: Allow SPAP authentication. \
  83. \n RequireEncryption: Require clients to employ data encryption. \
  84. \n NegotiateMSCHAP: Allow MSCHAP authentication. \
  85. \n UseLcpExtensions: Use LCP extensions. \
  86. \n NegotiateMultilink: Allow multilinked calls. \
  87. \n AuthenticatePeer: Enable mutual auth. for router interfaces. \
  88. \n RequireStrongEncryption: Require clients to employ strong encryption. \
  89. \n NegotiateBacp: Allow BACP negotiation. \
  90. \n NegotiateEAP: Allow EAP authentication. \
  91. \n NegotiatePAP: Allow PAP authentication. \
  92. \n NegotiateMD5CHAP: Allow MD5CHAP authentication. \
  93. \n RequireIPSEC: Require IPSEC when L2TP call is requested. \
  94. \n DisableEncryption: Do not negotiate data encryption. \
  95. \n Require56BitEncryption: Require clients to employ 56 bit encryption. \
  96. \n UseLmPassword: Use LM password. \
  97. \n NegotiateStrongMSCHAP: Allow MSCHAP version 2 authentication. \
  98. \n NoCallback: Never callback \
  99. \n\n"
  100. HLP_RASFLAG_SET_EX, "\
  101. \n %1!s! [flag = ] flag [ [state = ] ENABLED|DISABLED ] \
  102. \n \
  103. \n Enables the RAS server flag. \
  104. \n \
  105. \n For a list of available flags, see the help for 'show rasflag' \
  106. \n command. \
  107. \n \
  108. \n If no state is provided, ENABLED is assumed. \
  109. \n"
  110. HLP_RASFLAG_AUTHMODE_SET, "Sets the authentication mode.\n"
  111. HLP_RASFLAG_AUTHMODE_SET_EX, "\
  112. \n%1!s! [mode = ] STANDARD|NODCC|BYPASS \
  113. \n \
  114. \n Sets the mode that determines whether and when dialin clients should\
  115. \n be authenticated. \
  116. \n \
  117. \n mode - The mode \
  118. \n STANDARD - All devices need to be authenticated. \
  119. \n NODCC - Direct-connect devices are not authenticated. \
  120. \n BYPASS - Authentication is not required for any device. \
  121. \n"
  122. HLP_RASFLAG_AUTHMODE_SHOW, "Shows the authentication mode.\n"
  123. HLP_RASFLAG_AUTHMODE_SHOW_EX, "\
  124. \n%1!s! \
  125. \n \
  126. \n Shows the authentication mode. \
  127. \n"
  128. HLP_RASFLAG_AUTHTYPE_ADD, "Adds types of authentication the RAS server will negotiate.\n"
  129. HLP_RASFLAG_AUTHTYPE_ADD_EX, "\
  130. \n%1!s! [type = ] PAP|SPAP|MD5CHAP|MSCHAP|MSCHAPv2|EAP \
  131. \n \
  132. \nSelects the types of authentication which this RAS server will \
  133. \nattempt to negotiate. Negotiation will be in the order most-secure to \
  134. \nleast-secure. Once both client and server agree upon an authentication\
  135. \ntype, the PPP negotiation will follow the appropriate RFCs. \
  136. \n \
  137. \n type - the type \
  138. \n PAP - Password Authentication Protocol (clear text). \
  139. \n SPAP - Shiva Password Authentication Protocol. \
  140. \n MD5CHAP - Challenge Handshake Authentication Protocol using \
  141. \n Message Digest 5 hashing scheme to encrypt the response.\
  142. \n MSCHAP - Microsoft Challenge-Handshake Authentication Protocol. \
  143. \n MSCHAPv2 - Version 2 of MSCHAP. \
  144. \n EAP - Extensible Authentication Protocol. \
  145. \n"
  146. HLP_RASFLAG_AUTHTYPE_DEL, "Deletes an authentication type from the RAS server.\n"
  147. HLP_RASFLAG_AUTHTYPE_DEL_EX, "\
  148. \n%1!s! [type = ] PAP|SPAP|MD5CHAP|MSCHAP|MSCHAPv2|EAP \
  149. \n \
  150. \n Deletes an authentication type from the list of types that the RAS \
  151. \n server will negotiate. \
  152. \n \
  153. \n type - the type \
  154. \n PAP - Password Authentication Protocol (clear text). \
  155. \n SPAP - Shiva Password Authentication Protocol. \
  156. \n MD5CHAP - Challenge Handshake Authentication Protocol using \
  157. \n Message Digest 5 hashing scheme to encrypt the response.\
  158. \n MSCHAP - Microsoft Challenge-Handshake Authentication Protocol. \
  159. \n MSCHAPv2 - Version 2 of MSCHAP. \
  160. \n EAP - Extensible Authentication Protocol. \
  161. \n"
  162. HLP_RASFLAG_AUTHTYPE_SHOW, "Displays the authentication types currently enabled.\n"
  163. HLP_RASFLAG_AUTHTYPE_SHOW_EX, "\
  164. \n%1!s! \
  165. \n \
  166. \n Displays the authentication type(s) currently enabled. \
  167. \n \
  168. \n"
  169. HLP_RASFLAG_LINK_ADD, "Adds to the list of link properties PPP will negotiate\n"
  170. HLP_RASFLAG_LINK_DEL, "Deletes from the list of link properties PPP will negotiate\n"
  171. HLP_RASFLAG_LINK_SHOW, "Shows the link properties PPP will negotiate\n"
  172. HLP_RASFLAG_MLINK_ADD, "Adds to the list of multilink types PPP will negotiate\n"
  173. HLP_RASFLAG_MLINK_DEL, "Deletes from the list of multilink types PPP will negotiate\n"
  174. HLP_RASFLAG_MLINK_SHOW, "Shows the multilink types PPP will negotiate\n"
  175. HLP_RASFLAG_LINK_ADD_EX, "\
  176. \n%1!s! [type = ] SWC|LCP \
  177. \n \
  178. \n Adds to the list of link properties PPP will negotiate. \
  179. \n \
  180. \n type - the type \
  181. \n SWC - Provides software compression (MPPC) \
  182. \n LCP - Provides Link Control Protocol extensions from the PPP suite of protocols. \
  183. \n"
  184. HLP_RASFLAG_LINK_DEL_EX, "\
  185. \n%1!s! [type = ] SWC|LCP \
  186. \n \
  187. \n Deletes from the list of link properties PPP will negotiate. \
  188. \n \
  189. \n type - the type \
  190. \n SWC - Provides software compression (MPPC) \
  191. \n LCP - Provides Link Control Protocol extensions from the PPP suite of protocols. \
  192. \n"
  193. HLP_RASFLAG_LINK_SHOW_EX, "\
  194. \n%1!s! \
  195. \n \
  196. \n Shows the link properties PPP will negotiate. \
  197. \n \
  198. \n"
  199. HLP_RASFLAG_MLINK_ADD_EX, "\
  200. \n%1!s! [type = ] MULTI|BACP \
  201. \n \
  202. \n Adds to the list of multilink types PPP will negotiate. \
  203. \n \
  204. \n type - the type \
  205. \n MULTI - Provides mutlilink PPP sessions. \
  206. \n BACP - Provides Bandwidth Allocation Control Protocol. \
  207. \n"
  208. HLP_RASFLAG_MLINK_DEL_EX, "\
  209. \n%1!s! [type = ] MULTI|BACP \
  210. \n \
  211. \n Deletes from the list of multilink types PPP will negotiate. \
  212. \n \
  213. \n type - the type \
  214. \n MULTI - Provides mutlilink PPP sessions. \
  215. \n BACP - Provides Bandwidth Allocation Control Protocol. \
  216. \n"
  217. HLP_RASFLAG_MLINK_SHOW_EX, "\
  218. \n%1!s! \
  219. \n \
  220. \n Shows the multilink types PPP will negotiate. \
  221. \n \
  222. \n"
  223. HLP_RASUSER_SHOW_EX, "\
  224. \n%1!s! [ [name = ] username \
  225. \n [mode = ] PERMIT|REPORT ] \
  226. \n \
  227. \n Displays user RAS properties. \
  228. \n \
  229. \n username - the user's logon name. If none is supplied, \
  230. \n all users will be displayed. \
  231. \n \
  232. \n mode - the mode for showing information. If no mode is \
  233. \n specified, REPORT is assumed. \
  234. \n REPORT - show all users. \
  235. \n PERMIT - show only users whose dial in permission is PERMIT \
  236. \n\n"
  237. HLP_RASUSER_SET_EX, "\
  238. \n%1!s! [name = ] username \
  239. \n [dialin = ] PERMIT|DENY|POLICY \
  240. \n [ [cbpolicy = ] NONE|CALLER|ADMIN \
  241. \n [cbnumber = ] callback number ] \
  242. \n \
  243. \n Sets user RAS properties. \
  244. \n \
  245. \n username - the user's logon name. \
  246. \n \
  247. \n dialin - whether the user will be allowed to dial in \
  248. \n PERMIT - allow the user to dial in. \
  249. \n DENY - do not allow the user to dial in. \
  250. \n POLICY - use remote access policies to determine dialin. \
  251. \n \
  252. \n cbpolicy - the callback policy of the user. The callback \
  253. \n feature is used to save the caller the cost of \
  254. \n the phone call. \
  255. \n NONE - callback is not allowed for the user \
  256. \n CALLER - user can specify callback number at call time \
  257. \n ADMIN - always call the user at the callback number \
  258. \n \
  259. \n cbnumber - the number to use when cbpolicy is ADMIN \
  260. \n \
  261. \n \
  262. \n NOTE: The 'POLICY' option is not available for users that belong \
  263. \n to a mixed-mode domain. For these users, 'POLICY' is \
  264. \n assumed to mean 'DENY'. \
  265. \n"
  266. HLP_DOMAIN_REGISTER_EX, "\
  267. \n%1!s! [ [domain = ] domain [server = ] server ] \
  268. \n \
  269. \n Registers the given Windows 2000 computer as a RAS server in \
  270. \n the Active Directory of the given domain. \
  271. \n \
  272. \n server - the computer name of the computer to be registered as \
  273. \n a RAS server. If no server is specified the computer \
  274. \n from which the command is issued is assumed. \
  275. \n \
  276. \n domain - the domain in which the given server should be \
  277. \n registered. If no domain is provided, the primary \
  278. \n domain of the computer from which the command is \
  279. \n issued is assumed. \
  280. \n\n"
  281. HLP_DOMAIN_UNREGISTER_EX, "\
  282. \n%1!s! [ [domain = ] domain [server = ] server ] \
  283. \n \
  284. \n Un-registers the given Windows 2000 computer as a RAS server in \
  285. \n the Active Directory of the given domain. \
  286. \n \
  287. \n server - the computer name of the computer to be unregistered as\
  288. \n a RAS server. If no server is specified the computer \
  289. \n from which the command is issued is assumed. \
  290. \n \
  291. \n domain - the domain in which the given server should be \
  292. \n unregistered. If no domain is provided, the primary \
  293. \n domain of the computer from which the command is \
  294. \n issued is assumed. \
  295. \n\n"
  296. HLP_DOMAIN_SHOWREG_EX, "\
  297. \n%1!s! [ [domain = ] domain [server = ] server ] \
  298. \n \
  299. \n Displays whether the given computer is registered as a RAS \
  300. \n server in the given domain. \
  301. \n \
  302. \n server - the computer name of the computer in question. \
  303. \n If no server is specified the computer from which the \
  304. \n command is issued is assumed. \
  305. \n \
  306. \n domain - the domain. If no domain is provided, the primary \
  307. \n domain of the computer from which the command is \
  308. \n issued is assumed. \
  309. \n\n"
  310. MSG_RAS_SCRIPTHEADER, "\
  311. \n \
  312. \n# ----------------------------------------- \
  313. \n# RAS Configuration \
  314. \n# ----------------------------------------- \
  315. \n"
  316. MSG_RAS_SCRIPTFOOTER, "\
  317. \n# End of RAS configuration. \
  318. \n \
  319. \n \
  320. \n"
  321. MSG_RAS_SHOW_SERVERS_HEADER, "\
  322. \nTimestamp Sender \
  323. \n------------------------ ----------------------------------\
  324. \n"
  325. MSG_RASFLAG_DUMP, "%1!s! %2!s! %3!s!\n"
  326. MSG_RASFLAG_DUMP2, "%1!s! %2!s!\n"
  327. MSG_TRACE_DUMP, "%1!s! %2!s! %3!s!\n"
  328. MSG_RASFLAG_AUTHMODE_STANDARD, "authentication mode = standard\n"
  329. MSG_RASFLAG_AUTHMODE_NODCC, "authentication mode = nodcc\n"
  330. MSG_RASFLAG_AUTHMODE_BYPASS, "authentication mode = bypass\n"
  331. MSG_RASFLAG_AUTHTYPE_HEADER, "\
  332. \nEnabled Authentication Types: \
  333. \n \
  334. \nCode Meaning \
  335. \n------------------------------------------\
  336. \n"
  337. MSG_RASFLAG_AUTHTYPE_PAP, "\
  338. PAP Password Authentication Protocol.\n"
  339. MSG_RASFLAG_AUTHTYPE_SPAP, "\
  340. SPAP Shiva Password Authentication Protocol.\n"
  341. MSG_RASFLAG_AUTHTYPE_MD5CHAP, "\
  342. MD5CHAP Challenge Handshake Authentication Protocol (MD5).\n"
  343. MSG_RASFLAG_AUTHTYPE_MSCHAP, "\
  344. MSCHAP Microsoft Challenge-Handshake Authentication Protocol.\n"
  345. MSG_RASFLAG_AUTHTYPE_MSCHAP2, "\
  346. MSCHAPv2 Microsoft Challenge-Handshake Authentication Protocol version 2.\n"
  347. MSG_RASFLAG_AUTHTYPE_EAP, "\
  348. EAP Extensible Authentication Protocol.\n"
  349. MSG_RASFLAG_LINK_HEADER, "\
  350. \nEnabled Link Options: \
  351. \n \
  352. \nCode Meaning \
  353. \n------------------------------------------\
  354. \n"
  355. MSG_RASFLAG_LINK_SWC, "\
  356. SWC Provides software compression (MPPC).\n"
  357. MSG_RASFLAG_LINK_LCP, "\
  358. LCP Provides Link Control Protocol extensions from the PPP suite of protocols.\n"
  359. MSG_RASFLAG_MLINK_HEADER, "\
  360. \nEnabled Multilink Options: \
  361. \n \
  362. \nCode Meaning \
  363. \n------------------------------------------\
  364. \n"
  365. MSG_RASFLAG_MLINK_MULTI, "\
  366. MULTI Provides mutlilink PPP sessions.\n"
  367. MSG_RASFLAG_MLINK_BACP, "\
  368. BACP Provides Bandwidth Allocation Control Protocol.\n"
  369. MSG_RASUSER_RASINFO, "\
  370. \nUser name: %1!s! \
  371. \nDialin: %2!s! \
  372. \nCallback policy: %3!s! \
  373. \nCallback number: %4!s! \
  374. \n"
  375. MSG_RASUSER_SET_CMD, "%1!s! %2!s! %3!s! %4!s! %5!s!\n"
  376. MSG_DOMAIN_REGISTER_SUCCESS, "\
  377. \nRegistration completed successfully: \
  378. \n RAS Server: %1!s! \
  379. \n Domain: %2!s! \
  380. \n \
  381. \n"
  382. MSG_DOMAIN_REGISTER_FAIL, "\
  383. \nRegistration FAILED: \
  384. \n RAS Server: %1!s! \
  385. \n Domain: %2!s! \
  386. \n \
  387. \n"
  388. MSG_DOMAIN_UNREGISTER_SUCCESS, "\
  389. \nUn-registration completed successfully: \
  390. \n RAS Server: %1!s! \
  391. \n Domain: %2!s! \
  392. \n \
  393. \n Since user accounts are cached by the 'IAS' and \
  394. \n 'Routing and Remote Access' services, this \
  395. \n un-registration will not take effect until these \
  396. \n services are restarted. \
  397. \n \
  398. \n"
  399. MSG_DOMAIN_UNREGISTER_FAIL, "\
  400. \nUn-registration FAILED: \
  401. \n RAS Server: %1!s! \
  402. \n Domain: %2!s! \
  403. \n \
  404. \n"
  405. MSG_DOMAIN_SHOW_REGISTERED, "\
  406. \nThe following RAS server is registered:\
  407. \n RAS Server: %1!s! \
  408. \n Domain: %2!s! \
  409. \n \
  410. \n"
  411. MSG_DOMAIN_SHOW_UNREGISTERED, "\
  412. \nThe following RAS server is not registered:\
  413. \n RAS Server: %1!s! \
  414. \n Domain: %2!s! \
  415. \n \
  416. \n"
  417. MSG_DOMAIN_SHOW_REGISTER_FAIL, "\
  418. \nUnable to determine the registration: \
  419. \n RAS Server: %1!s! \
  420. \n Domain: %2!s! \
  421. \n \
  422. \n"
  423. MSG_CLIENT_SHOW, "\
  424. \nUser: %1!s! \
  425. \nDomain: %2!s! \
  426. \nConnected from: %3!s! \
  427. \nDuration: %4!d! days %5!d! hours %6!d! mins %7!d! secs \
  428. \n"
  429. MSG_TRACE_SHOW, "%1!-40s! %2!s!\n"
  430. EMSG_CANT_FIND_EOPT, "\
  431. One or more essential parameters not specified\n"
  432. EMSG_BAD_OPTION_VALUE, "\
  433. %1!s! is not an acceptable value for %2!s!.\n"
  434. EMSG_UNABLE_TO_ENUM_USERS, "\
  435. Unable to enumerate the users:\n\n"
  436. EMSG_RASUSER_MUST_PROVIDE_CB_NUMBER, "\
  437. \nIn order to set administrative callback mode, either you must specify \
  438. \na callback number or the user must already have a callback number set.\
  439. \n\n"
  440. //
  441. // The following are specific to the 'ras ip' sub context
  442. //
  443. HLP_RASIP_HELP1, "Displays help.\n"
  444. HLP_RASIP_HELP1_EX, "\
  445. \nUsage: %1!s!\n\
  446. \n Displays help.\n\n"
  447. HLP_RASIP_DUMP, "Dumps RAS IP configuration info in script form.\n"
  448. HLP_RASIP_SHOW_CONFIG, "Displays current RAS IP configuration.\n"
  449. HLP_RASIP_SET_ASSIGNMENT, "Sets the method by which the RAS server\
  450. \n assigns IP addresses to its clients.\n"
  451. HLP_RASIP_SET_CALLERSPEC, "Sets whether clients can request their own IP addresses.\n"
  452. HLP_RASIP_SET_ACCESS, "Sets whether clients are given access beyond the remote\
  453. \n access server.\n"
  454. HLP_RASIP_SET_NEGOTIATION, "Sets whether IP is negotiated for client RAS connections.\n"
  455. HLP_RASIP_SET_NETBTBCAST, "Sets whether to enable or disable broadcast\
  456. \n name resolution using NetBIOS over TCP/IP.\n"
  457. HLP_RASIP_ADD_RANGE, "Adds a range to the static IP address pool.\n"
  458. HLP_RASIP_DEL_RANGE, "Deletes a range from the static IP address pool.\n"
  459. HLP_RASIP_DEL_POOL, "Deletes all ranges from the static IP address pool.\n"
  460. HLP_RASIP_DUMP_EX "\
  461. \n%1!s! \
  462. \n \
  463. \n Dumps RAS configuration information in script form. \
  464. \n\n"
  465. HLP_RASIP_SHOW_CONFIG_EX, "\
  466. \n%1!s! \
  467. \n \
  468. \n Displays current RAS IP configuration. \
  469. \n\n"
  470. HLP_RASIP_SET_NEGOTIATION_EX, "\
  471. \n%1!s! [mode = ] ALLOW|DENY \
  472. \n \
  473. \n Specifies whether the RAS server will allow IP to be configured for \
  474. \n any client connections it accepts. \
  475. \n \
  476. \n mode - the mode \
  477. \n ALLOW - permit IP over client connections. \
  478. \n DENY - do not permit IP over client connections. \
  479. \n\n"
  480. HLP_RASIP_SET_ACCESS_EX, "\
  481. \nUsage: %1!s! [mode = ] ALL|SERVERONLY \
  482. \n \
  483. \nParameters: \
  484. \n \
  485. \n mode - what type of access to grant \
  486. \n ALL - clients are able to reach the remote access server and any \
  487. \n networks to which it is connected. \
  488. \n SERVERONLY - clients are able to reach the remote access server only. \
  489. \n \
  490. \nRemarks: Specifies whether IP network traffic from any client is \
  491. \n forwarded to the network(s) to which the remote access server \
  492. \n is connected. \
  493. \n\n"
  494. HLP_RASIP_SET_ASSIGNMENT_EX, "\
  495. \n%1!s! [method = ] AUTO|POOL \
  496. \n \
  497. \n Sets the method by which the RAS server assigns IP addresses to \
  498. \n its clients. \
  499. \n \
  500. \n method - the method to use \
  501. \n AUTO - automatically assigns IP addresses using DHCP. If no \
  502. \n DHCP server is available, a random, private address \
  503. \n is assigned. \
  504. \n POOL - assigns IP address from the RAS server's pool. \
  505. \n\n"
  506. HLP_RASIP_ADD_RANGE_EX, "\
  507. \n%1!s! [from = ] from [to = ] to \
  508. \n \
  509. \n Adds a range to the static IP address pool that the RAS server uses. \
  510. \n \
  511. \n from - the starting IP address in the range in the form 'x.x.x.x' \
  512. \n to - the ending IP address in the range in the form 'x.x.x.x' \
  513. \n\n"
  514. HLP_RASIP_DEL_RANGE_EX, "\
  515. \n%1!s! [from = ] from [to = ] to \
  516. \n \
  517. \n Deletes a range from the static IP address pool that the RAS server uses.\
  518. \n \
  519. \n from - the starting IP address in the range in the form 'x.x.x.x' \
  520. \n to - the ending IP address in the range in the form 'x.x.x.x' \
  521. \n\n"
  522. HLP_RASIP_DEL_POOL_EX, "\
  523. \n%1!s! \
  524. \n \
  525. \n Deletes all ranges from the static IP address pool. \
  526. \n\n"
  527. HLP_RASIP_SET_CALLERSPEC_EX, "\
  528. \n%1!s! [mode = ] ALLOW|DENY \
  529. \n \
  530. \n Specifies whether dialin clients are permitted to request their own \
  531. \n IP addresses. \
  532. \n \
  533. \n mode - the mode \
  534. \n ALLOW - allow clients to request their own IP addresses. \
  535. \n DENY - don't allow clients to request their own IP addresses. \
  536. \n\n"
  537. HLP_RASIP_SET_NETBTBCAST_EX, "\
  538. \n%1!s! [mode = ] ENABLED|DISABLED \
  539. \n \
  540. \n Specifies whether to enable or disable broadcast name resolution \
  541. \n using NetBIOS over TCP/IP. \
  542. \n \
  543. \n mode - the mode \
  544. \n ENABLED - enables broadcast name resolution using NetBIOS over \
  545. \n TCP/IP. \
  546. \n DISABLED - disables broadcast name resolution using NetBIOS over \
  547. \n TCP/IP. \
  548. \n\n"
  549. MSG_RASIP_SERVERCONFIG, "\
  550. \nRAS IP config \
  551. \n \
  552. \n Negotiation mode: %2!s! \
  553. \n Access mode: %3!s! \
  554. \n Address request mode: %5!s! \
  555. \n Broadcast name resolution: %6!s! \
  556. \n Assignment method: %4!s! \
  557. \n Pool: \
  558. \n"
  559. MSG_RASIP_SHOW_POOL " %1!11s! to %2!11s!\n"
  560. MSG_RASIP_SET_CMD, "%1!s! %2!s!\n"
  561. MSG_RASIP_ADD_RANGE_CMD, "%1!s! %2!s! %3!s!\n"
  562. MSG_RASIP_SCRIPTHEADER, "\
  563. \n \
  564. \n# ----------------------------------------- \
  565. \n# RAS IP Configuration \
  566. \n# ----------------------------------------- \
  567. \n"
  568. MSG_RASIP_SCRIPTFOOTER, "\
  569. \n# End of RAS IP configuration. \
  570. \n \
  571. \n"
  572. EMSG_RASIP_INVALID_POOL, "\
  573. \nThe IP address range entered is invalid for the following reason: \
  574. \n \
  575. \n %1!s!\
  576. \n \
  577. \nThe following constraints apply to IP address ranges: \
  578. \n \
  579. \n 1. The addresses must be specified in standard dotted notation \
  580. \n and must lie between 1.0.0.0 and 224.0.0.0 \
  581. \n \
  582. \n 2. The addresses must not be in the form the form 127.x.x.x. \
  583. \n \
  584. \n 3. The 'from' IP address must be at least 1 address less than \
  585. \n the 'to' address. \
  586. \n \
  587. \n\n"
  588. EMSG_RASIP_BAD_ADDRESS, "An IP address entered was invalid."
  589. EMSG_RASIP_BAD_RANGE, "The range is not large enough."
  590. EMSG_RASIP_NETID_127, "An IP address entered was in the form 127.x.x.x"
  591. EMSG_RASIP_BAD_POOL_GENERIC "No reason given"
  592. EMSG_RASIP_NEED_VALID_POOL, "\
  593. \nBefore you can switch to pool assignment mode, you must specify a \
  594. \nvalid IP address pool using the '%1!s!' command. \
  595. \n\n"
  596. EMSG_RASIP_OVERLAPPING_RANGE, "\
  597. \nThe range you entered can not be assigned to the system since it overlaps\
  598. \nan existing range. \
  599. \n\n"
  600. //
  601. // The following are specific to the 'ras ipx' sub context
  602. //
  603. HLP_RASIPX_HELP1, "Displays help.\n"
  604. HLP_RASIPX_HELP1_EX, "\
  605. \nUsage: %1!s!\n\
  606. \n Displays help.\n\n"
  607. HLP_RASIPX_DUMP, "Dumps RAS IPX configuration info in script form.\n"
  608. HLP_RASIPX_SHOW_CONFIG, "Displays current RAS IPX configuration.\n"
  609. HLP_RASIPX_SET_NEGOTIATION, "Sets whether IPX is negotiated for client RAS connections.\n"
  610. HLP_RASIPX_SET_ACCESS, "Sets whether clients will be given access beyond the RAS server.\n"
  611. HLP_RASIPX_SET_ASSIGNMENT, "Sets the method by which the RAS server \
  612. assigns IPX addresses to its clients.\n"
  613. HLP_RASIPX_SET_POOL, "Sets the RAS IPX address pool.\n"
  614. HLP_RASIPX_SET_CALLERSPEC, "Sets whether clients can request their own IPX node numbers.\n"
  615. HLP_RASIPX_DUMP_EX "\
  616. \n%1!s! \
  617. \n \
  618. \n Dumps RAS IPX configuration information in script form. \
  619. \n\n"
  620. HLP_RASIPX_SHOW_CONFIG_EX, "\
  621. \n%1!s! \
  622. \n \
  623. \n Displays current RAS IPX configuration. \
  624. \n\n"
  625. HLP_RASIPX_SET_NEGOTIATION_EX, "\
  626. \n%1!s! [mode = ] ALLOW|DENY \
  627. \n \
  628. \n Specifies whether the RAS server will allow IPX to be configured for \
  629. \n any client connections it accepts. \
  630. \n \
  631. \n mode - the mode \
  632. \n ALLOW - permit IPX over client connections. \
  633. \n DENY - do not permit IPX over client connections. \
  634. \n\n"
  635. HLP_RASIPX_SET_ACCESS_EX, "\
  636. \n%1!s! [mode = ] ALL|SERVERONLY \
  637. \n \
  638. \n Specifies whether IPX network traffic from any client will be forwarded\
  639. \n to the network(s) to which the RAS server is connected. \
  640. \n \
  641. \n mode - what type of access to grant \
  642. \n ALL - clients will be able to reach the RAS server and any \
  643. \n networks to which it is connected. \
  644. \n SERVERONLY - clients will be able to reach the RAS server only. \
  645. \n\n"
  646. HLP_RASIPX_SET_ASSIGNMENT_EX, "\
  647. \n%1!s! [method = ] AUTO|POOL|AUTOSAME|POOLSAME \
  648. \n \
  649. \n Sets the method by which the RAS server assigns IPX addresses to \
  650. \n its clients. \
  651. \n \
  652. \n method - the method to use \
  653. \n AUTO - assigns a different random IPX network number to all \
  654. \n clients. \
  655. \n POOL - assigns IPX addresses from the RAS server's pool. \
  656. \n AUTOSAME - generates a random IPX network number as assigns it to \
  657. \n all clients. \
  658. \n POOLSAME - chooses a number from the RAS server's pool and assigns\
  659. \n it to all clients. \
  660. \n \
  661. \n Notes: \
  662. \n \
  663. \n For most configurations, either the AUTOSAME or POOLSAME method \
  664. \n is recommended as these conserve network numbers and reduce network\
  665. \n traffic. \
  666. \n \
  667. \n Before a network number is assigned to a client, it is verified \
  668. \n to not be in use on the RAS server's intranet. As a result some \
  669. \n addresses in the address pool may not be assigned. \
  670. \n\n"
  671. HLP_RASIPX_SET_POOL_EX, "\
  672. \n%1!s! [firstnet = ] address [size = ] size \
  673. \n \
  674. \n Sets RAS server's IPX address pool \
  675. \n \
  676. \n firstnet - the first IPX network number in the pool. (hexadecimal) \
  677. \n size - the total number of IPX addresses in the pool. If zero is \
  678. \n specified, then the pool will grow dynamically as needed. \
  679. \n (decimal) \
  680. \n\n"
  681. HLP_RASIPX_SET_CALLERSPEC_EX, "\
  682. \n%1!s! [mode = ] ALLOW|DENY \
  683. \n \
  684. \n Specifies whether dialin clients are permitted to request their own \
  685. \n IPX node numbers. \
  686. \n \
  687. \n mode - the mode \
  688. \n ALLOW - allow clients to request their own IPX node numbers. \
  689. \n DENY - don't allow clients to request their own IPX node numbers.\
  690. \n\n"
  691. MSG_RASIPX_SERVERCONFIG, "\
  692. \nRAS IPX config \
  693. \n \
  694. \n Negotiation mode: %2!s! \
  695. \n Access mode: %3!s! \
  696. \n Node number request mode: %5!s! \
  697. \n Assignment method: %4!s! \
  698. \n IPX address pool base: %6!s! \
  699. \n IPX address pool size: %7!s! \
  700. \n \
  701. \n\n"
  702. MSG_RASIPX_SET_CMD, "%1!s! %2!s!\n"
  703. MSG_RASIPX_SET_POOL_CMD, "%1!s! %2!s! %3!s!\n"
  704. MSG_RASIPX_SCRIPTHEADER, "\
  705. \n \
  706. \n# ----------------------------------------- \
  707. \n# RAS IPX Configuration \
  708. \n# ----------------------------------------- \
  709. \n"
  710. MSG_RASIPX_SCRIPTFOOTER, "\
  711. \n# End of RAS IPX configuration. \
  712. \n \
  713. \n \
  714. \n"
  715. EMSG_RASIPX_BAD_IPX, "\
  716. \nThe IPX network number is invalid. It must be specified as a string \
  717. \nwith at most ten characters representing a four-byte hexadecimal value.\
  718. \n \
  719. \nAlso, the values 0, 1, and 0xffffffff are not permitted. \
  720. \n \
  721. \n Examples: \
  722. \n ABCDEF \
  723. \n 0x1234 \
  724. \n 00A1C2E3 \
  725. \n \
  726. \n\n"
  727. EMSG_RASIPX_BAD_POOLSIZE, "\
  728. \nThe pool size is invalid. It can be at most 64000. If zero is \
  729. \nspecified, then the pool will dynamically grow as needed. \
  730. \n\n"
  731. //
  732. // The following are specific to the 'ras nbf' sub context
  733. //
  734. HLP_RASNBF_HELP1, "Displays help.\n"
  735. HLP_RASNBF_HELP1_EX, "\
  736. \nUsage: %1!s!\n\
  737. \n Displays help.\n\n"
  738. HLP_RASNBF_DUMP, "Dumps RAS NBF configuration info in script form.\n"
  739. HLP_RASNBF_SHOW_CONFIG, "Displays current RAS NBF configuration.\n"
  740. HLP_RASNBF_SET_NEGOTIATION, "Sets whether NBF is negotiated for client RAS connections.\n"
  741. HLP_RASNBF_SET_ACCESS, "Sets whether clients will be given access beyond the RAS server.\n"
  742. HLP_RASNBF_DUMP_EX "\
  743. \n%1!s! \
  744. \n \
  745. \n Dumps RAS NBF configuration information in script form. \
  746. \n\n"
  747. HLP_RASNBF_SHOW_CONFIG_EX, "\
  748. \n%1!s! \
  749. \n \
  750. \n Displays current RAS NBF configuration. \
  751. \n\n"
  752. HLP_RASNBF_SET_NEGOTIATION_EX, "\
  753. \n%1!s! [mode = ] ALLOW|DENY \
  754. \n \
  755. \n Specifies whether the RAS server will allow NBF to be configured for \
  756. \n any client connections it accepts. \
  757. \n \
  758. \n mode - the mode \
  759. \n ALLOW - permit NBF over client connections. \
  760. \n DENY - do not permit NBF over client connections. \
  761. \n\n"
  762. HLP_RASNBF_SET_ACCESS_EX, "\
  763. \n%1!s! [mode = ] ALL|SERVERONLY \
  764. \n \
  765. \n Specifies whether NBF network traffic from any client will be forwarded\
  766. \n to the network(s) to which the RAS server is connected. \
  767. \n \
  768. \n mode - what type of access to grant \
  769. \n ALL - clients will be able to reach the RAS server and any \
  770. \n networks to which it is connected. \
  771. \n SERVERONLY - clients will be able to reach the RAS server only. \
  772. \n\n"
  773. MSG_RASNBF_SERVERCONFIG, "\
  774. \nRAS NBF config \
  775. \n \
  776. \n Negotiation mode: %2!s! \
  777. \n Access mode: %3!s! \
  778. \n \
  779. \n\n"
  780. MSG_RASNBF_SET_CMD, "%1!s! %2!s!\n"
  781. MSG_RASNBF_SCRIPTHEADER, "\
  782. \n \
  783. \n# ----------------------------------------- \
  784. \n# RAS NBF Configuration \
  785. \n# ----------------------------------------- \
  786. \n"
  787. MSG_RASNBF_SCRIPTFOOTER, "\
  788. \n# End of RAS NBF configuration. \
  789. \n \
  790. \n \
  791. \n"
  792. //
  793. // The following are specific to the 'ras at' sub context
  794. //
  795. HLP_RASAT_HELP1, "Displays help.\n"
  796. HLP_RASAT_HELP1_EX, "\
  797. \nUsage: %1!s!\n\
  798. \n Displays help.\n\n"
  799. HLP_RASAT_DUMP, "Dumps remote access AppleTalk configuration info in script form.\n"
  800. HLP_RASAT_SHOW_CONFIG, "Displays current remote access AppleTalk configuration.\n"
  801. HLP_RASAT_SET_NEGOTIATION, "Sets whether AppleTalk is negotiated for client remote\
  802. \n access connections.\n"
  803. HLP_RASAT_SET_ACCESS, "Sets whether clients will be given access beyond the RAS server.\n"
  804. HLP_RASAT_DUMP_EX "\
  805. \nUsage: %1!s! \
  806. \n \
  807. \nRemarks: Dumps remote access AppleTalk configuration information in \
  808. \n script form.\n\n"
  809. HLP_RASAT_SHOW_CONFIG_EX, "\
  810. \nUsage: %1!s! \
  811. \n \
  812. \nRemarks: Displays current remote access AppleTalk configuration. \
  813. \n\n"
  814. HLP_RASAT_SET_NEGOTIATION_EX, "\
  815. \nUsage: %1!s! [mode = ] ALLOW|DENY \
  816. \n \
  817. \nParameters: \
  818. \n \
  819. \n mode - the mode \
  820. \n ALLOW - permit AppleTalk over client connections. \
  821. \n DENY - do not permit AppleTalk over client connections. \
  822. \n \
  823. \nRemarks: Specifies whether the remote access server allows AppleTalk to be\
  824. \n configured for any client connections it accepts. \
  825. \n\n"
  826. HLP_RASAT_SET_ACCESS_EX, "\
  827. \n%1!s! [mode = ] ALL|SERVERONLY \
  828. \n \
  829. \n Specifies whether AppleTalk network traffic from any client will be \
  830. \n forwarded to the network(s) to which the RAS server is connected. \
  831. \n \
  832. \n mode - what type of access to grant \
  833. \n ALL - clients will be able to reach the RAS server and any \
  834. \n networks to which it is connected. \
  835. \n SERVERONLY - clients will be able to reach the RAS server only. \
  836. \n\n"
  837. MSG_RASAT_SERVERCONFIG, "\
  838. \nRemote Access AppleTalk config \
  839. \n \
  840. \n Negotiation mode: %2!s!\
  841. \n Access mode: %3!s!\
  842. \n\n"
  843. MSG_RASAT_SET_CMD, "%1!s! %2!s!\n"
  844. MSG_RASAT_SCRIPTHEADER, "\
  845. \n \
  846. \n# ----------------------------------------- \
  847. \n# RemoteAccess AppleTalk Configuration \
  848. \n# ----------------------------------------- \
  849. \n"
  850. MSG_RASAT_SCRIPTFOOTER, "\
  851. \n# End of RemoteAccess AppleTalk configuration.\
  852. \n\n"
  853. //
  854. // The following are specific to the 'ras aaaa' sub context
  855. //
  856. HLP_RASAAAA_ADD_AUTHSERV, "Adds a RADIUS authentication server.\n"
  857. HLP_RASAAAA_ADD_ACCTSERV, "Adds a RADIUS accounting server.\n"
  858. HLP_RASAAAA_DEL_AUTHSERV, "Deletes a RADIUS server.\n"
  859. HLP_RASAAAA_DEL_ACCTSERV, "Deletes a RADIUS accounting server.\n"
  860. HLP_RASAAAA_SET_AUTH, "Sets the authentication provider.\n"
  861. HLP_RASAAAA_SET_ACCT, "Sets the accounting provider.\n"
  862. HLP_RASAAAA_SET_AUTHSERV, "Sets properties of an authentication server.\n"
  863. HLP_RASAAAA_SET_ACCTSERV, "Sets properties of an accounting server.\n"
  864. HLP_RASAAAA_SHOW_AUTH, "Displays the current authentication provider.\n"
  865. HLP_RASAAAA_SHOW_ACCT, "Displays the current accounting provider.\n"
  866. HLP_RASAAAA_SHOW_AUTHSERV, "Displays the RADIUS server(s) used for authentication.\n"
  867. HLP_RASAAAA_SHOW_ACCTSERV, "Displays the RADIUS server(s) used for accounting.\n"
  868. HLP_RASAAAA_ADD_AUTHSERV_EX, "\
  869. \n%1!s! [ name = ] server \
  870. \n [ [secret =] secret \
  871. \n [init-score =] InitialScore \
  872. \n [port =] port \
  873. \n [timeout =] timeout \
  874. \n [signature = ] ENABLED|DISABLED ] \
  875. \n \
  876. \n Provides an IP address or name of a RADIUS server to pass authentication\
  877. \n requests. \
  878. \n \
  879. \n name The DNS name or IP address of the RADIUS server \
  880. \n secret The shared secret \
  881. \n init-score Initial score (server priority) \
  882. \n port Sets the port on which to send the authentication requests. \
  883. \n timeout The timeout period before the RADIUS server is marked \
  884. \n unavailable (seconds) \
  885. \n signature whether to use digital signatures \
  886. \n\n"
  887. HLP_RASAAAA_ADD_ACCTSERV_EX, "\
  888. \n%1!s! [ name = ] server \
  889. \n [ [secret =] secret \
  890. \n [init-score =] InitialScore \
  891. \n [port =] port \
  892. \n [timeout = ] timeout \
  893. \n [messages = ] ENABLED|DISABLED ] \
  894. \n \
  895. \n Provides an IP address or name of a RADIUS server to use for accounting.\
  896. \n \
  897. \n name The DNS name or IP address of the RADIUS server \
  898. \n secret The shared secret \
  899. \n init-score Initial score (server priority) \
  900. \n port Sets the port on which to send the authentication requests. \
  901. \n timeout The timeout period before the RADIUS server is marked \
  902. \n unavailable (seconds) \
  903. \n messages whether to send accounting on/off messages. \
  904. \n\n"
  905. HLP_RASAAAA_DEL_AUTHSERV_EX, "\
  906. \n%1!s! [name = ] server \
  907. \n \
  908. \n Deletes a RADIUS authentication server. \
  909. \n\n"
  910. HLP_RASAAAA_DEL_ACCTSERV_EX, "\
  911. \n%1!s! [ [name = ] server ] \
  912. \n \
  913. \n Deletes a RADIUS accounting server. \
  914. \n\n"
  915. HLP_RASAAAA_SET_AUTH_EX, "\
  916. \n%1!s! [provider =] WINDOWS|RADIUS \
  917. \n \
  918. \n Sets the authentication provider. \
  919. \n \
  920. \n windows Authentication via Windows security \
  921. \n radius Authentication against a RADIUS server \
  922. \n\n"
  923. HLP_RASAAAA_SET_ACCT_EX, "\
  924. \n%1!s! [provider =] WINDOWS|RADIUS|NONE \
  925. \n \
  926. \n Sets the accounting provider. \
  927. \n \
  928. \n windows Accounting via the Windows logging facility \
  929. \n radius Accounting via a RADIUS accounting server \
  930. \n none Do not perform accounting \
  931. \n\n"
  932. HLP_RASAAAA_SET_AUTHSERV_EX, "\
  933. \n%1!s! [ name = ] server \
  934. \n [ [secret =] secret \
  935. \n [init-score =] InitialScore \
  936. \n [port =] port \
  937. \n [timeout =] timeout \
  938. \n [signature = ] ENABLED|DISABLED ] \
  939. \n \
  940. \n Provides an IP address or name of a RADIUS server to pass authentication\
  941. \n requests. \
  942. \n \
  943. \n name The DNS name or IP address of the RADIUS server \
  944. \n secret The shared secret \
  945. \n init-score Initial score (server priority) \
  946. \n port Sets the port on which to send the authentication requests. \
  947. \n timeout The timeout period before the RADIUS server is marked \
  948. \n unavailable (seconds) \
  949. \n signature whether to use digital signatures \
  950. \n\n"
  951. HLP_RASAAAA_SET_ACCTSERV_EX, "\
  952. \n%1!s! [ name = ] server \
  953. \n [ [secret =] secret \
  954. \n [init-score =] InitialScore \
  955. \n [port =] port \
  956. \n [timeout = ] timeout \
  957. \n [messages = ] ENABLED|DISABLED ] \
  958. \n \
  959. \n Provides an IP address or name of a RADIUS server to use for accounting.\
  960. \n \
  961. \n name The DNS name or IP address of the RADIUS server \
  962. \n secret The shared secret \
  963. \n init-score Initial score (server priority) \
  964. \n port Sets the port on which to send the authentication requests. \
  965. \n timeout The timeout period before the RADIUS server is marked \
  966. \n unavailable (seconds) \
  967. \n messages whether to send accounting on/off messages. \
  968. \n\n"
  969. HLP_RASAAAA_SHOW_AUTH_EX, "\
  970. \n%1!s! \
  971. \n \
  972. \n Displays the authentication provider \
  973. \n\n"
  974. HLP_RASAAAA_SHOW_ACCT_EX, "\
  975. \n%1!s! \
  976. \n \
  977. \n Displays the accounting provider \
  978. \n\n"
  979. HLP_RASAAAA_SHOW_AUTHSERV_EX, "\
  980. \n%1!s! [ [name = ] server ] \
  981. \n \
  982. \n Displays detailed information about an authentication \
  983. \n server. \
  984. \n \
  985. \n name The DNS name or IP address of the RADIUS server \
  986. \n \
  987. \n If no server name is provided, all configured authentication\
  988. \n servers will be displayed. \
  989. \n\n"
  990. HLP_RASAAAA_SHOW_ACCTSERV_EX, "\
  991. \n%1!s! [ [name = ] server ] \
  992. \n \
  993. \n Displays detailed information about an accounting \
  994. \n server. \
  995. \n \
  996. \n name The DNS name or IP address of the RADIUS server \
  997. \n \
  998. \n If no server name is provided, all configured accounting \
  999. \n servers will be displayed. \
  1000. \n\n"
  1001. HLP_RASAAAA_HELP1, "Displays help.\n"
  1002. HLP_RASAAAA_HELP1_EX, "\
  1003. \nUsage: %1!s!\n\
  1004. \n Displays help.\n\n"
  1005. HLP_RASAAAA_DUMP, "Dumps RAS AAAA configuration info in script form.\n"
  1006. HLP_RASAAAA_DUMP_EX "\
  1007. \n%1!s! \
  1008. \n \
  1009. \n Dumps RAS AAAA configuration information in script form. \
  1010. \n\n"
  1011. MSG_RASAAAA_SHOW_AUTH, "RAS authentication provider: %1!s!\n"
  1012. MSG_RASAAAA_SHOW_ACCT, "RAS accounting provider: %1!s!\n"
  1013. MSG_RASAAAA_SHOW_AUTHSERV_HDR, "\
  1014. \nName Address Port Score Timeout Signature\
  1015. \n-------------------------------------------------------------------------------\n"
  1016. MSG_RASAAAA_SHOW_AUTHSERV, "\
  1017. %1!-34s! %2!-14s! %3!-4d! %4!-5d! %5!-7d! %6!s!\n"
  1018. MSG_RASAAAA_SHOW_ACCTSERV_HDR, "\
  1019. \nName Address Port Score Timeout Messages\
  1020. \n-------------------------------------------------------------------------------\n"
  1021. MSG_RASAAAA_MUST_RESTART_SERVICES, "\
  1022. The RemoteAccess service must be restarted for changes to take effect.\n"
  1023. MSG_RASAAAA_SCRIPTHEADER, "\
  1024. \n \
  1025. \n# ----------------------------------------- \
  1026. \n# RAS AAAA Configuration \
  1027. \n# ----------------------------------------- \
  1028. \n"
  1029. MSG_RASAAAA_SCRIPTFOOTER, "\
  1030. \n# End of RAS AAAA configuration. \
  1031. \n \
  1032. \n \
  1033. \n"
  1034. MSG_RASAAAA_CMD1, "%1!s! %2!s!\n"
  1035. MSG_RASAAAA_CMD5, "%1!s! %2!s! %3!s! %4!s! %5!s! %6!s!\n"
  1036. }
  1037. #include <windows.h>
  1038. #include <ntverp.h>
  1039. #define VER_FILETYPE VFT_DLL
  1040. #define VER_FILESUBTYPE VFT2_UNKNOWN
  1041. #define VER_FILEDESCRIPTION_STR "RAS Monitor DLL"
  1042. #define VER_INTERNALNAME_STR "rasmontr.dll"
  1043. #define VER_ORIGINALFILENAME_STR "rasmontr.dll"
  1044. #include "common.ver" // NT5.0 version file.