Windows 8

  1. IPsec dropped an inbound clear text packet that should have been secured. If the remote computer is configured with a Request ...
  2. IPsec dropped an inbound packet that failed a replay check. If this problem persists, it could indicate a replay attack against ...
  3. IPsec dropped an inbound packet that failed a replay check. The inbound packet had too low a sequence number to ensure it ...
  4. IPsec dropped an inbound packet that failed an integrity check. If this problem persists, it could indicate a network issue ...
  5. IPsec Extended Mode This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and ...
  6. IPsec has entered a DoS condition. This might indicate a DoS attack or a spike in the server load. 2. A high percentage of ...
  7. IPsec IKEv1 IPv4 is the set of Internet Protocol security (IPsec) Internet Key Exchange version 1 (IKEv1) counters that apply ...
  8. IPsec IKEv1 IPv6 is the set of Internet Protocol security (IPsec) Internet Key Exchange version 1 (IKEv1) counters that apply ...
  9. IPsec IKEv2 IPv4 is the set of Internet Protocol security (IPsec) Internet Key Exchange version 2 (IKEv2) counters that apply ...
  10. IPsec IKEv2 IPv6 is the set of Internet Protocol security (IPsec) Internet Key Exchange version 2 (IKEv2) counters that apply ...
  11. IPSec inbound packet integrity check failed: Packet Source: %1 Inbound SA: %2 Number Of Packets: %3 Received packet from ...
  12. IPSec inbound packet replay check failed: Packet Source: %1 Inbound SA: %2 Number of Packets: %3 Received packet from over ...
  13. IPsec main mode and extended mode security associations were established. Local Endpoint: Principal Name: %1 Network Address: ...
  14. IPsec main mode and extended mode security associations were established. Local Endpoint: Principal Name: %1 Network Address: ...
  15. IPsec main mode and extended mode security associations were established. Main Mode Local Endpoint: Principal Name: %1 Network ...
  16. IPsec main mode and extended mode security associations were established. Main Mode Local Endpoint: Principal Name: %1 Network ...
  17. IPSec main mode and user mode security associations established. Keying module type: AuthIp Local address: %1 Remote address: ...
  18. IPSec main mode and user mode security associations established. Keying module type: AuthIp Local address: %1 Remote address: ...
  19. IPSec main mode and user mode security associations established. Keying module type: AuthIp Local address: %1 Remote address: ...
  20. IPSec main mode and user mode security associations established. Keying module type: AuthIp Local address: %1 Remote address: ...
  21. IPSec main mode security association ended. Keying module type: %1 Local address: %2 Remote address: %3 Local port: %4 Remote ...
  22. IPSec main mode security association established. User mode is not configured. Keying module type: %1 Local address: %2 Remote ...
  23. IPSec main mode security association established. User mode is not configured. Keying module type: %1 Local address: %2 Remote ...
  24. IPSec main mode security association establishment failed. Keying module type: %1 Local address: %2 Remote address: %3 Local ...
  25. IPSec main mode security association establishment failed. Keying module type: %1 Local address: %2 Remote address: %3 Local ...
  26. IPsec Main Mode This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated ...
  27. IPsec Policy Agent failed to apply locally cached copy of Active Directory storage IPsec policy on the computer. Policy: ...
  28. IPsec Policy Agent failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in ...
  29. IPsec Policy Agent failed to get the complete list of network interfaces on the computer. This poses a potential security ...
  30. IPsec Policy Agent failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential ...
  31. IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, ...
  32. IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, ...
  33. IPsec Policy Agent polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, ...
  34. IPSec quick mode security association establishment failed. Keying module type: %1 Local address: %2 Local address mask: ...
  35. IPsec Quick Mode This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated ...
  36. IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI). This is usually caused by ...
  37. IPSec received inbound clear text packet that should have been secured: Packet Source: %1 Inbound SA: %2 Number of Packets: ...
  38. IPSec user mode security association establishment failed. Keying module type: AuthIp Local address: %1 Remote address: %2 ...
  39. IPSec user mode security association establishment failed. Keying module type: AuthIp Local address: %1 Remote address: %2 ...
  40. IPsec will use these settings to establish secured connections when there are active connection security rules. When you ...
  41. IPv4 address range %1 has been updated with the value %2 for the configuration setting %3. The previous value was %4.%rIPv4 ...
  42. IPv4 DHCP Relay Agent is enabled and configured, but none of the interfaces assigned to DHCP Relay Agent are configured with ...
  43. IPv4 DHCP Relay Agent must be configured with the address of at least one DHCPv4 server. Without a DHCP server, DHCP Relay ...
  44. IPv4 routes are not added for the demand dial connection as IPv4 transport is not available on the corresponding interface. ...
  45. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed ...
  46. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  47. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  48. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  49. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  50. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  51. IPv4/IPv6 address or hostname of the computer on which the remote access server computer specific tasks should be executed. ...
  52. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  53. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  54. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  55. IPv4/IPv6 address or hostname of the computer on which the Remote Access server computer specific tasks should be executed. ...
  56. IPv4/IPv6 address or hostname of the computer on which the remote access server machine specific tasks should be executed ...
  57. IPv4/IPv6 address or hostname of the computer on which the remote access server machine specific tasks should be executed. ...
  58. IPv4/IPv6 address or hostname of the computer on which the remote access server machine specific tasks should be executed. ...
  59. IPv4/IPv6 address or hostname of the computer on which the VPN server computer specific tasks should be executed. If ComputerName ...
  60. IPv4/IPv6 address or hostname of the computer on which the VPN server computer specific tasks should be executed. If ComputerName ...
  61. IPv4/IPv6 address or hostname of the external RADIUS server that is used for accounting. This parameter can be configured ...
  62. IPv4/IPv6 address or hostname of the external RADIUS server that is used for authentication. This parameter can be configured ...
  63. IPv4/IPv6 address or hostname of the external RADIUS server whose properties are being modified for the specified purpose. ...
  64. IPv4/IPv6 address or hostname of the proxy server configured for web traffic. The proxy server is specified in the format, ...
  65. IPv4/IPv6 address or hostname of the RADIUS server that is to be used for authentication. Specifying this parameter indicates ...
  66. IPv6 DHCPv6 Relay Agent is enabled and configured, but none of the interfaces assigned to DHCPv6 Relay Agent are configured ...
  67. IPv6 DHCPv6 Relay Agent must be configured with the address of at least one DHCPv6 server. Without a DHCPv6 server, DHCPv6 ...
  68. IPv6 has not been enabled. To enable IPv6, specify a valid prefix or FE80::/64 for the IPv6Prefix parameter in the Set-VpnIpAddressAssignment ...
  69. IPv6 Host (AAAA) Host address (AAAA) record for IPv6 hosts. Maps a DNS domain name to a single 128-bit IPv6 address. (RFC ...
  70. IPv6 prefix {0} specified for the internal network is identical to (or a subset of) prefix {1} that is assigned to DirectAccess ...
  71. IPv6 routes are not added for the demand dial connection as IPv6 transport is not available on the corresponding interface. ...
  72. IPv6 settings have been detected on your internal network. The detected settings are displayed on this page. The IPv6 prefix ...
  73. IPv6 transitioning technologies are disabled via group policy on this server. Modify the group policy to enable the technologies. ...
  74. IPv6 Tunnel address resource '%1' failed to come online because it does not depend on an IP Address (IPv4) resource. Dependency ...
  75. IPv6 tunnel address resource '%1' failed to come online. Cluster network '%2' associated with dependent IP address (IPv4) ...