The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the associated IP filter list. It takes two rules to describe an IPSec tunnel.
The trust types do not match. To successfully establish a trust relationship, both domains must be configured to use the ...
The trusted domain object corresponding to the deleted interdomain trust account %1 ( %2 ) could not be deleted. The return ...
The trusted domain object corresponding to the interdomain trust account %1 ( %2 ) could not be created. The return code ...
The TTOption property specifies how TrueType(r) fonts should be printed. There are 3 possible values: Bitmap - Prints TrueType ...
The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the associated IP filter ...
The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the security rule's ...
The TxIsolation Level property for the COM+ component being created is stronger than the TxIsolationLevel for the "root" ...
The type of desktop monitor or CRT. For example, multiscan color or monochrome monitors (values 2 or 3, respectively) can ...
The type of memory. This is a part of the object key. Values correspond to the list of possible memory types in the CIM_PhysicalMemory ...