Windows 8.1

  1. IPRIPv2 discarded a response packet from a neighbor with IP address %1. IPRIPv2 is not configured to accept packets from ...
  2. IPRIPv2 discarded a response packet from a neighbor with IP address %1. The packet was not sent from the standard IP RIP ...
  3. IPRIPv2 discarded a version %1 packet received on the interface with IP address %2 from a neighbor with IP address %3. The ...
  4. IPRIPv2 has deleted its route to %1 with next-hop %2, since the route timed-out and no neighboring routers announced the ...
  5. IPRIPv2 has learnt of a new route. The route is to network %1 with next-hop %2, and the route was learnt from the neighbor ...
  6. IPRIPv2 has timed-out its route to %1 with next-hop %2, since no neighboring routers announced the route. The route will ...
  7. IPRIPv2 is ignoring a default route with next-hop %2 which was advertised by a neighbor with IP address %3, because the interface ...
  8. IPRIPv2 is ignoring a host route to %1 with next-hop %2 which was advertised by a neighbor with IP address %3, because the ...
  9. IPRIPv2 is ignoring a route on the local interface with IP address %1. The route is to the network %2 and it was received ...
  10. IPRIPv2 is ignoring a route to %1 with next-hop %2 which was advertised by a neighbor with IP address %3, because the interface ...
  11. IPRIPv2 is ignoring a route to %1 with next-hop %2 which was advertised by a neighbor with IP address %3, since the route ...
  12. IPRIPv2 is ignoring a route to %1 with next-hop %2 which was advertised by a neighbor with IP address %3. The route's network ...
  13. IPRIPv2 is ignoring a route to the broadcast network %1 with next-hop %2 which was advertised by a neighbor with IP address ...
  14. IPRIPv2 is ignoring a route to the loopback network %1 with next-hop %2 which was advertised by a neighbor with IP address ...
  15. IPRIPv2 received a packet which was smaller than the minimum size allowed for IPRIP packets. The packet has been discarded. ...
  16. IPRIPv2 received a packet with an invalid header. The packet has been discarded. It was received on the local interface with ...
  17. IPRIPv2 received a packet with an invalid version in its header. The packet has been discarded. It was received on the local ...
  18. IPRIPv2 received an error in a call to select(). This may indicate underlying network problems. The data is the error code. ...
  19. IPRIPv2 was unable to add a route to the Routing Table Manager. The route is to %1 with next-hop %2 and it was received from ...
  20. IPRIPv2 was unable to add a route to the Routing Table Manager. The route is to network %1 with next-hop %3. The data is ...
  21. IPRIPv2 was unable to initialize a table to hold information about configured network interfaces. The data is the error code. ...
  22. IPRIPv2 was unable to initialize a table to hold information about neighboring IPRIP routers. The data is the error code. ...
  23. IPRIPv2 was unable to receive an incoming message on the local interface with IP address %1. The data is the error code. ...
  24. IPRIPv2 was unable to request notification of events on the socket for the local interface with IP address %1. The data is ...
  25. IPRIPv2 was unable to send a packet from the interface with IP address %1 to the IP address %2. The data is the error code. ...
  26. IPsec Add SA translation: Original source address: %1, Translated source address: %2, Original destination address: %3, Translated ...
  27. IPsec authentication failed using Kerberos This computer couldn't contact a domain controller or isn't in the same domain ...
  28. IPsec authentication using a certificate failed The root certificate authority (CA) on this computer doesn't match the root ...
  29. IPsec AuthIP IPv4 is the set of Internet Protocol security (IPsec) Authenticated IP (AuthIP) counters that apply to traffic ...
  30. IPsec AuthIP IPv6 is the set of Internet Protocol security (IPsec) Authenticated IP (AuthIP) counters that apply to traffic ...
  31. IPsec Connections is the set of Internet Protocol security (IPsec) counters that apply to IPsec encapsulated connections. ...
  32. IPsec DoS Protection failed to create a per internal IP rate limit queue because the maximum number of queues allowed by ...
  33. IPsec DoS Protection is the set of counters that apply to the traffic flowing through the IPsec DoS Protection component. ...
  34. IPsec Driver is the set of Internet Protocol security (IPsec) driver counters that apply to traffic over Internet Protocol ...
  35. IPsec dropped an inbound clear text packet that should have been secured. If the remote computer is configured with a Request ...
  36. IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against ...
  37. IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it ...
  38. IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue ...
  39. IPsec Extended Mode This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and ...
  40. IPsec has entered a DoS condition. This might indicate a DoS attack or a spike in the server load. 2. A high percentage of ...
  41. IPsec IKEv1 IPv4 is the set of Internet Protocol security (IPsec) Internet Key Exchange version 1 (IKEv1) counters that apply ...
  42. IPsec IKEv1 IPv6 is the set of Internet Protocol security (IPsec) Internet Key Exchange version 1 (IKEv1) counters that apply ...
  43. IPsec IKEv2 IPv4 is the set of Internet Protocol security (IPsec) Internet Key Exchange version 2 (IKEv2) counters that apply ...
  44. IPsec IKEv2 IPv6 is the set of Internet Protocol security (IPsec) Internet Key Exchange version 2 (IKEv2) counters that apply ...
  45. IPSec inbound packet integrity check failed: Packet Source: %1 Inbound SA: %2 Number Of Packets: %3 Received packet from ...
  46. IPSec inbound packet replay check failed: Packet Source: %1 Inbound SA: %2 Number of Packets: %3 Received packet from over ...
  47. IPsec main mode and extended mode security associations were established. Local Endpoint: Principal Name: %1 Network Address: ...
  48. IPsec main mode and extended mode security associations were established. Local Endpoint: Principal Name: %1 Network Address: ...
  49. IPsec main mode and extended mode security associations were established. Main Mode Local Endpoint: Principal Name: %1 Network ...
  50. IPsec main mode and extended mode security associations were established. Main Mode Local Endpoint: Principal Name: %1 Network ...
  51. IPSec main mode and user mode security associations established. Keying module type: AuthIp Local address: %1 Remote address: ...
  52. IPSec main mode and user mode security associations established. Keying module type: AuthIp Local address: %1 Remote address: ...
  53. IPSec main mode and user mode security associations established. Keying module type: AuthIp Local address: %1 Remote address: ...
  54. IPSec main mode and user mode security associations established. Keying module type: AuthIp Local address: %1 Remote address: ...
  55. IPSec main mode security association ended. Keying module type: %1 Local address: %2 Remote address: %3 Local port: %4 Remote ...
  56. IPSec main mode security association established. User mode is not configured. Keying module type: %1 Local address: %2 Remote ...
  57. IPSec main mode security association established. User mode is not configured. Keying module type: %1 Local address: %2 Remote ...
  58. IPSec main mode security association establishment failed. Keying module type: %1 Local address: %2 Remote address: %3 Local ...
  59. IPSec main mode security association establishment failed. Keying module type: %1 Local address: %2 Remote address: %3 Local ...
  60. IPsec Main Mode This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated ...
  61. IPsec Policy Agent failed to apply locally cached copy of Active Directory storage IPsec policy on the computer. Policy: ...
  62. IPsec Policy Agent failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in ...
  63. IPsec Policy Agent failed to get the complete list of network interfaces on the computer. This poses a potential security ...
  64. IPsec Policy Agent failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential ...
  65. IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, ...
  66. IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, ...
  67. IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, ...
  68. IPSec quick mode security association establishment failed. Keying module type: %1 Local address: %2 Local address mask: ...
  69. IPsec Quick Mode This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated ...
  70. IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by ...
  71. IPSec received inbound clear text packet that should have been secured: Packet Source: %1 Inbound SA: %2 Number of Packets: ...
  72. IPSec user mode security association establishment failed. Keying module type: AuthIp Local address: %1 Remote address: %2 ...
  73. IPSec user mode security association establishment failed. Keying module type: AuthIp Local address: %1 Remote address: %2 ...
  74. IPsec will use these settings to establish secured connections when there are active connection security rules. When you ...
  75. IPv4 address range %1 of type %2 having start IP address %3, end IP address %4, managed by %5, service instance %6 and address ...