File name: | ipsecsnp.dll.mui |
Size: | 81920 byte |
MD5: | 5be95237a7e43a883b17b2a68cb22eba |
SHA1: | 2a0807b56eefde48e2459c4f002de0bfdc40eb39 |
SHA256: | d6849a46569b2bf32a892e55ec772f5dc425419f6b6f6c9e850e387304a087c1 |
Operating systems: | Windows 10 |
Extension: | MUI |
If an error occurred or the following message in English (U.S.) language and you cannot find a solution, than check answer in English. Table below helps to know how correctly this phrase sounds in English.
id | English (U.S.) | English |
---|---|---|
1 | Create and edit Internet Protocol Security policies | Create and edit Internet Protocol Security policies |
2 | IP Security Policy Management | IP Security Policy Management |
3 | Size (from IDS_SIZE) | Size (from IDS_SIZE) |
4 | Type (from IDS_TYPE) | Type (from IDS_TYPE) |
5 | Local Computer | Local Computer |
6 | Internet Protocol Security (IPsec) Administration. Manage IPsec policies for secure communication with other computers.
Portions of IPsec and related services were jointly developed by Microsoft Corporation and Cisco Systems, Inc. |
Internet Protocol Security (IPsec) Administration. Manage IPsec policies for secure communication with other computers.
Portions of IPsec and related services were jointly developed by Microsoft Corporation and Cisco Systems, Inc. |
8 | Microsoft Corporation | Microsoft Corporation |
9 | Security Policies | Security Policies |
10 | Filter Actions | Filter Actions |
11 | Available security policies | Available security policies |
12 | Available filter actions | Available filter actions |
13 | Filter action links, each containing associations to IP filter lists | Filter action links, each containing associations to IP filter lists |
14 | Associated Filters | Associated Filters |
15 | IP Filters | IP Filters |
16 | Available IP Filters | Available IP Filters |
17 | ICMP | ICMP |
18 | TCP | TCP |
19 | UDP | UDP |
20 | RAW | RAW |
21 | DES | DES |
22 | MD5 | MD5 |
23 | SHA1 | SHA1 |
24 | Are you sure? | Are you sure? |
25 | Any | Any |
26 | Invalid | Invalid |
27 | New IP Filter List | New IP Filter List |
28 | New IP Security Policy | New IP Security Policy |
29 | New Filter Action | New Filter Action |
30 | You must enter a port number that is in the range of 0 through 65535. | You must enter a port number that is in the range of 0 through 65535. |
31 | A valid IP filter list must be selected. | A valid IP filter list must be selected. |
32 | A valid filter action must be selected. | A valid filter action must be selected. |
33 | ESP Integrity | ESP Integrity |
34 | None | None |
35 | The following error occurred when removing IP Security data. %1 |
The following error occurred when removing IP Security data. %1 |
36 | The IPsec policy data could not be saved because you do not have administrative permissions (you must be a member of the Administrators group). As a result, data might have been lost. (Error = %1!lx!) | The IPsec policy data could not be saved because you do not have administrative permissions (you must be a member of the Administrators group). As a result, data might have been lost. (Error = %1!lx!) |
37 | ||
38 | 40 bit DES | 40 bit DES |
39 | 3DES | 3DES |
40 | Low (1) | Low (1) |
41 | Medium (2) | Medium (2) |
42 | High (2048) | High (2048) |
43 | IKE | IKE |
44 | The tunnel endpoint name resolved to multiple IP addresses. The first address returned will be used. | The tunnel endpoint name resolved to multiple IP addresses. The first address returned will be used. |
45 | The tunnel endpoint name could not be resolved. No IP address information could be cached. | The tunnel endpoint name could not be resolved. No IP address information could be cached. |
46 | Unable to verify integrity (Error = %lx) | Unable to verify integrity (Error = %lx) |
47 | Integrity verified | Integrity verified |
48 | You must enter a value that is in the range of 300 seconds (5 minutes) through 172,800 seconds (48 hours). | You must enter a value that is in the range of 300 seconds (5 minutes) through 172,800 seconds (48 hours). |
49 | You must enter a value that is in the range of 20,480 kilobytes (20 MB) through 2,147,483,647 kilobytes (2,097,152 MB). | You must enter a value that is in the range of 20,480 kilobytes (20 MB) through 2,147,483,647 kilobytes (2,097,152 MB). |
50 | Default response (earlier versions of Windows only) | Default response (earlier versions of Windows only) |
51 | L2TP Base | L2TP Base |
52 | L2TP Extended | L2TP Extended |
53 | Yes | Yes |
54 | No | No |
55 | All | All |
56 | LAN | LAN |
57 | Remote access | Remote access |
58 | A data error has occurred. The interface type is unknown. | A data error has occurred. The interface type is unknown. |
59 | This rule no longer has a valid IP filter selected. | This rule no longer has a valid IP filter selected. |
60 | , with policy storage | , with policy storage |
61 | The IPsec policy storage container could not be opened. No domain controller can be found for the domain. | The IPsec policy storage container could not be opened. No domain controller can be found for the domain. |
62 | The IPsec policy storage container could not be opened. Communication with Active Directory could not be established. | The IPsec policy storage container could not be opened. Communication with Active Directory could not be established. |
63 | The IPsec policy storage container could not be created. You might not have administrative permissions (you must be a member of the Administrators group). For the IPsec policy storage container to be created, you must have administrative permissions. | The IPsec policy storage container could not be created. You might not have administrative permissions (you must be a member of the Administrators group). For the IPsec policy storage container to be created, you must have administrative permissions. |
64 | The IPsec policy storage container could not be opened. You might not have administrative permissions (you must be a member of the Administrators group). For the IPsec policy storage container to be opened, you must have administrative permissions. | The IPsec policy storage container could not be opened. You might not have administrative permissions (you must be a member of the Administrators group). For the IPsec policy storage container to be opened, you must have administrative permissions. |
65 | The IPsec policy storage container could not be opened. The following error occurred: %1. |
The IPsec policy storage container could not be opened. The following error occurred: %1. |
66 | Type | Type |
67 | ESP Confidentiality | ESP Confidentiality |
69 | Name | Name |
70 | Description | Description |
71 | Encryption and Integrity | Encryption and Integrity |
72 | Integrity only | Integrity only |
73 | Custom | Custom |
74 | &Create IP Security Policy... | &Create IP Security Policy... |
75 | Creates an IP Security policy. | Creates an IP Security policy. |
78 | &Import Policies... | &Import Policies... |
79 | Imports IP Security policy information from a file. | Imports IP Security policy information from a file. |
80 | &Export Policies... | &Export Policies... |
81 | Exports information for all IP Security policies to a file. | Exports information for all IP Security policies to a file. |
82 | New Security Method | New Security Method |
83 | Edit Security Method | Edit Security Method |
85 | Refreshes IPsec policy information from the policy storage location. | Refreshes IPsec policy information from the policy storage location. |
87 | &Un-assign | &Un-assign |
88 | Un-assigns this policy (attempts to make it inactive). | Un-assigns this policy (attempts to make it inactive). |
89 | &Assign | &Assign |
90 | Assigns this policy (attempts to make it active). | Assigns this policy (attempts to make it active). |
91 | IP Filter List | IP Filter List |
92 | Filter Action | Filter Action |
93 | Authentication Methods | Authentication Methods |
94 | Tunnel Endpoint | Tunnel Endpoint |
95 | Connection Type | Connection Type |
96 | A data error has occurred. No IP filter has been associated with this rule. | A data error has occurred. No IP filter has been associated with this rule. |
97 | A data error has occurred. Multiple IP filters are associated with this rule. | A data error has occurred. Multiple IP filters are associated with this rule. |
98 | AH Integrity | AH Integrity |
99 | Compression | Compression |
100 | Encryption | Encryption |
101 | Integrity | Integrity |
102 | The selected IP filter list is currently being used by this rule. Select a different IP filter list before attempting to remove it. | The selected IP filter list is currently being used by this rule. Select a different IP filter list before attempting to remove it. |
103 | The selected filter action is currently being used by this rule. Select a different filter action before attempting to remove it. | The selected filter action is currently being used by this rule. Select a different filter action before attempting to remove it. |
104 | A data error has occurred. | A data error has occurred. |
107 | Policy Assigned | Policy Assigned |
109 | New Rule | New Rule |
110 | Edit Rule | Edit Rule |
111 | Select a certification authority (CA) you want to use when verifying IPsec certificates | Select a certification authority (CA) you want to use when verifying IPsec certificates |
112 | There was an error in displaying the trusted root certification authorities. | There was an error in displaying the trusted root certification authorities. |
113 | Export | Export |
115 | Manage IP Filter Lists | Manage IP Filter Lists |
116 | IP Security Policies on %1 | IP Security Policies on %1 |
117 | Active Directory | Active Directory |
118 | Feature not implemented. | Feature not implemented. |
120 | A data error has occurred. No filter action is associated with this rule. | A data error has occurred. No filter action is associated with this rule. |
124 | Kerberos | Kerberos |
125 | Certificate | Certificate |
126 | Preshared Key | Preshared Key |
127 | Dynamic | Dynamic |
128 | &Restore Default Policies | &Restore Default Policies |
129 | Restores the default IP Security policies to their initial settings. | Restores the default IP Security policies to their initial settings. |
131 | The default IP Security policies were successfully restored to their initial settings. | The default IP Security policies were successfully restored to their initial settings. |
132 | You must select AH, ESP, or both. | You must select AH, ESP, or both. |
133 | Diffie-Hellman Group | Diffie-Hellman Group |
134 | This filter action requires at least one security method. | This filter action requires at least one security method. |
135 | No ESP encryption or integrity algorithm was selected. The ESP selection has been removed. | No ESP encryption or integrity algorithm was selected. The ESP selection has been removed. |
136 | An IPsec policy has been provided by the domain controller. Domain provided policy overrides policy assigned on the local (or remote) computer. |
An IPsec policy has been provided by the domain controller. Domain provided policy overrides policy assigned on the local (or remote) computer. |
137 | Allowing unsecured communication may expose your network to security risks by allowing IP traffic to be sent with no authentication or encryption. On a computer with Windows Vista or a later version of Windows, this option allows unsecured communication to be sent anytime a secure connection cannot be established. On a Windows 2000, Windows XP, or Windows 2003 computer, this option allows unsecured communications to be sent only when the remote computer does not support IPsec. Are you sure you want to allow unsecured communication when secure communication cannot be established? |
Allowing unsecured communication may expose your network to security risks by allowing IP traffic to be sent with no authentication or encryption. On a computer with Windows Vista or a later version of Windows, this option allows unsecured communication to be sent anytime a secure connection cannot be established. On a Windows 2000, Windows XP, or Windows 2003 computer, this option allows unsecured communications to be sent only when the remote computer does not support IPsec. Are you sure you want to allow unsecured communication when secure communication cannot be established? |
138 | Enable unsecured communication? | Enable unsecured communication? |
139 | You must enter a number that is greater than zero in the host portion of this IP address. | You must enter a number that is greater than zero in the host portion of this IP address. |
140 | You must enter a number that is greater than zero in the network portion of this IP address. | You must enter a number that is greater than zero in the network portion of this IP address. |
142 | The IPsec policy is assigned, but the IPsec service is not running. You must start the 'IPsec Services' service to activate the assigned policy. | The IPsec policy is assigned, but the IPsec service is not running. You must start the 'IPsec Services' service to activate the assigned policy. |
143 | Policy is assigned, but it is being overridden by Active Directory-assigned policy. | Policy is assigned, but it is being overridden by Active Directory-assigned policy. |
144 | Create IPsec Security policy | Create IPsec Security policy |
146 | Add IPsec Security Rule | Add IPsec Security Rule |
148 | Enter the name and description of the new IP Security policy | Enter the name and description of the new IP Security policy |
149 | There was an error retrieving the distinguished name string from the certificate. | There was an error retrieving the distinguished name string from the certificate. |
150 | Select the certification authority that you require for IPsec authentication when using this security rule. | Select the certification authority that you require for IPsec authentication when using this security rule. |
152 | The default ""Anybody"" IP filter could not be found, probably because it was explicitly removed. You can either continue without this filter, or a new one can be generated for you. If you choose to restore the default filter the IPsec Responder, Lockdown, and Secure Initiator policies will also be restored to their initial settings. Do you want to restore the default policies? |
The default ""Anybody"" IP filter could not be found, probably because it was explicitly removed. You can either continue without this filter, or a new one can be generated for you. If you choose to restore the default filter the IPsec Responder, Lockdown, and Secure Initiator policies will also be restored to their initial settings. Do you want to restore the default policies? |
153 | A filter must be selected for this IPsec policy. The default Any rule was removed, so you must select another rule. | A filter must be selected for this IPsec policy. The default Any rule was removed, so you must select another rule. |
154 | Add a filter action | Add a filter action |
159 | &Manage IP filter lists and filter actions... | &Manage IP filter lists and filter actions... |
160 | Manages IP filter lists and filter actions. | Manages IP filter lists and filter actions. |
161 | Manage IP filter lists and filter actions | Manage IP filter lists and filter actions |
163 | Hos&t name: | Hos&t name: |
164 | &IP Address or Subnet: | &IP Address or Subnet: |
165 | &Host name: | &Host name: |
167 | Cached IP Address: | Cached IP Address: |
170 | Other | Other |
171 | My IP Address | My IP Address |
172 | Any IP Address | Any IP Address |
173 | A specific DNS Name | A specific DNS Name |
174 | A specific IP Address or Subnet | A specific IP Address or Subnet |
175 | A specific IP Subnet | A specific IP Subnet |
176 | Select which computer or domain this snap-in will manage | Select which computer or domain this snap-in will manage |
177 | The source address has been adjusted by the specified subnet mask. | The source address has been adjusted by the specified subnet mask. |
178 | The destination address has been adjusted by the specified subnet mask. | The destination address has been adjusted by the specified subnet mask. |
179 | A source DNS name must be entered. | A source DNS name must be entered. |
180 | A destination DNS name must be entered. | A destination DNS name must be entered. |
183 | The source DNS name resolved to multiple IP addresses. The first one is being cached. | The source DNS name resolved to multiple IP addresses. The first one is being cached. |
184 | The destination DNS name resolved to multiple IP addresses. The first one is being cached. | The destination DNS name resolved to multiple IP addresses. The first one is being cached. |
185 | The source DNS name could not be resolved. No IP address information is being cached. | The source DNS name could not be resolved. No IP address information is being cached. |
186 | The destination DNS name could not be resolved. No IP address information is being cached. | The destination DNS name could not be resolved. No IP address information is being cached. |
187 | IP security cannot be triggered by port 500 traffic. Port 500 is used by Internet Key Exchange (IKE) traffic. | IP security cannot be triggered by port 500 traffic. Port 500 is used by Internet Key Exchange (IKE) traffic. |
188 | IP Filter | IP Filter |
189 | Mirrored | Mirrored |
190 | Destination DNS Name | Destination DNS Name |
191 | Destination Address | Destination Address |
193 | Protocol | Protocol |
194 | Source Port | Source Port |
195 | Destination Port | Destination Port |
196 | Source DNS Name | Source DNS Name |
197 | Source Address | Source Address |
200 | When this console is saved the location will also be saved | When this console is saved the location will also be saved |
201 | A filter action requires at least one security method for negotiation. This filter action has none. Select a different one, or add a security method. | A filter action requires at least one security method for negotiation. This filter action has none. Select a different one, or add a security method. |
202 | The currently selected filter action has been deactivated because at least one security method is required. | The currently selected filter action has been deactivated because at least one security method is required. |
203 | This IP filter list is empty. It will not match IP packets. Do you want to save this filter list without any filters? | This IP filter list is empty. It will not match IP packets. Do you want to save this filter list without any filters? |
205 | You must enter a protocol number that is in the range of 0 through 255. | You must enter a protocol number that is in the range of 0 through 255. |
206 | You cannot use a multicast address for a subnet or for both the source address and the destination address. | You cannot use a multicast address for a subnet or for both the source address and the destination address. |
207 | An IP filter list requires at least one filter to be activated. This IP filter list has no filters. | An IP filter list requires at least one filter to be activated. This IP filter list has no filters. |
208 | Set the name and description. | Set the name and description. |
209 | This is an invalid mask for the specified IP address. | This is an invalid mask for the specified IP address. |
210 | The source and destination address can not be the same. | The source and destination address can not be the same. |
211 | &Close | &Close |
212 | The settings you have selected correspond to a %1 security level. Your security method's type will be changed to reflect this state. | The settings you have selected correspond to a %1 security level. Your security method's type will be changed to reflect this state. |
213 | DNS names are only used to build IP address filters. To ensure security, do not add, delete, or change source or destination IP addresses without updating this filter list and verifying that all IP addresses for a computer are included. Do you want to create a filter for each of the listed addresses? |
DNS names are only used to build IP address filters. To ensure security, do not add, delete, or change source or destination IP addresses without updating this filter list and verifying that all IP addresses for a computer are included. Do you want to create a filter for each of the listed addresses? |
214 | Security Warning | Security Warning |
215 | This security method duplicates an existing one. Either modify it, or cancel this dialog box. | This security method duplicates an existing one. Either modify it, or cancel this dialog box. |
216 | IP Add&ress or Subnet: | IP Add&ress or Subnet: |
220 | EGP | EGP |
221 | HMP | HMP |
222 | XNS-IDP | XNS-IDP |
223 | RDP | RDP |
224 | RVD | RVD |
225 | (%1)'s generated filter action | (%1)'s generated filter action |
226 | Specify how this policy responds to requests for secure communication. | Specify how this policy responds to requests for secure communication. |
227 | To add multiple authentication methods, edit the default response rule after completing the wizard. | To add multiple authentication methods, edit the default response rule after completing the wizard. |
228 | The security rule must be applied to a network type. | The security rule must be applied to a network type. |
229 | To add multiple authentication methods, edit the security rule after completing the wizard. | To add multiple authentication methods, edit the security rule after completing the wizard. |
230 | Select the IP filter list for the type of IP traffic to which this security rule applies. | Select the IP filter list for the type of IP traffic to which this security rule applies. |
231 | Select the filter action for this security rule. | Select the filter action for this security rule. |
232 | Specify whether this rule indicates that the computer should act as a tunnel server or as a tunnel client. | Specify whether this rule indicates that the computer should act as a tunnel server or as a tunnel client. |
233 | The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the security rule's IP filter list. | The tunnel endpoint is the tunneling computer closest to the IP traffic destination, as specified by the security rule's IP filter list. |
234 | Set the filter action behavior. | Set the filter action behavior. |
235 | Communicating with computers that do not support IPsec may expose your network to security risks. | Communicating with computers that do not support IPsec may expose your network to security risks. |
236 | Specify a security method for IP traffic. To add multiple security methods, edit the filter action after completing the wizard. | Specify a security method for IP traffic. To add multiple security methods, edit the filter action after completing the wizard. |
237 | Add an IP filter. | Add an IP filter. |
238 | Specify the source address of the IP traffic. | Specify the source address of the IP traffic. |
239 | Specify the destination address of the IP traffic. | Specify the destination address of the IP traffic. |
240 | Select the IP protocol type. If this type is TCP or UDP, you will also specify the source and destination ports. | Select the IP protocol type. If this type is TCP or UDP, you will also specify the source and destination ports. |
241 | Many TCP/IP application protocols are established with well-known TCP or UDP ports. | Many TCP/IP application protocols are established with well-known TCP or UDP ports. |
242 | You must enter a number that is greater than zero in the first octet of this IP address or subnet. | You must enter a number that is greater than zero in the first octet of this IP address or subnet. |
243 | You must enter a number that is less than 240 in the first octet of this IP address or subnet. | You must enter a number that is less than 240 in the first octet of this IP address or subnet. |
244 | A multicast address is not valid for a tunnel address. | A multicast address is not valid for a tunnel address. |
245 | The loopback address (127.0.0.1) is not valid for a tunnel address. | The loopback address (127.0.0.1) is not valid for a tunnel address. |
246 | IP Filter List Warning | IP Filter List Warning |
247 | The description for the destination IP subnet is being changed to "%1" because the subnet mask does not specify a subnet. | The description for the destination IP subnet is being changed to "%1" because the subnet mask does not specify a subnet. |
248 | The description for the source IP subnet is being changed to "%1" because the subnet mask does not specify a subnet. | The description for the source IP subnet is being changed to "%1" because the subnet mask does not specify a subnet. |
249 | You must enter a remote computer name. | You must enter a remote computer name. |
250 | Kerberos is valid only when this rule is enabled on a computer which is a member of a domain. This computer is not a member of a domain. Do you want to continue and save these rule properties? | Kerberos is valid only when this rule is enabled on a computer which is a member of a domain. This computer is not a member of a domain. Do you want to continue and save these rule properties? |
253 | Key Lifetimes (KB/sec) | Key Lifetimes (KB/sec) |
254 | %1!i! / %2!i! | %1!i! / %2!i! |
255 | Edit Authentication Method | Edit Authentication Method |
256 | New Authentication Method | New Authentication Method |
257 | There was a problem refreshing policies. Continue refreshing? (Error = %1!lx!) | There was a problem refreshing policies. Continue refreshing? (Error = %1!lx!) |
258 | &Finish | &Finish |
259 | You must enter a domain name. | You must enter a domain name. |
260 | An error occurred attempting to assign a restored default policy. You must specify the assigned policy manually. | An error occurred attempting to assign a restored default policy. You must specify the assigned policy manually. |
261 | An error occurred during the attempt to refresh the IPsec policy. The policy might have been deleted or the connection to the IPsec policy storage location might have been lost. (Error = %1!lx!) | An error occurred during the attempt to refresh the IPsec policy. The policy might have been deleted or the connection to the IPsec policy storage location might have been lost. (Error = %1!lx!) |
262 | Name this IP Security policy and provide a brief description | Name this IP Security policy and provide a brief description |
263 | IP Security Policy Name | IP Security Policy Name |
264 | Requests for Secure Communication | Requests for Secure Communication |
265 | Default Response Rule Authentication Method | Default Response Rule Authentication Method |
267 | Network Type | Network Type |
268 | Authentication Method | Authentication Method |
271 | Filter Action Name | Filter Action Name |
272 | Name this filter action and provide a brief description. | Name this filter action and provide a brief description. |
273 | Filter Action General Options | Filter Action General Options |
274 | Communicating with computers that do not support IPsec | Communicating with computers that do not support IPsec |
275 | IP Traffic Security | IP Traffic Security |
276 | IP Traffic Source | IP Traffic Source |
277 | IP Traffic Destination | IP Traffic Destination |
278 | IP Protocol Type | IP Protocol Type |
279 | IP Protocol Port | IP Protocol Port |
280 | The version of the IPsec policy in the IPsec policy storage location is an earlier version (%d.%d) than that expected (%d.%d). As a result, this component might not function correctly. Default settings will be used for any IPsec policy data that is not found in the policy storage location. You should upgrade the policy version. | The version of the IPsec policy in the IPsec policy storage location is an earlier version (%d.%d) than that expected (%d.%d). As a result, this component might not function correctly. Default settings will be used for any IPsec policy data that is not found in the policy storage location. You should upgrade the policy version. |
281 | The version of the IPsec policy in the IPsec policy storage location is a later version (%d.%d) than expected (%d.%d). As a result, this component might not function correctly, and some of the policy data in the policy store will be ignored. You should upgrade this component. | The version of the IPsec policy in the IPsec policy storage location is a later version (%d.%d) than expected (%d.%d). As a result, this component might not function correctly, and some of the policy data in the policy store will be ignored. You should upgrade this component. |
282 | The version of the IPsec policy in the IPsec policy storage location is not supported. The IPsec policy in the policy storage is version (%d.x). This component only supports version (%d.x). You must upgrade this component for the stored IPsec policy to function correctly. | The version of the IPsec policy in the IPsec policy storage location is not supported. The IPsec policy in the policy storage is version (%d.x). This component only supports version (%d.x). You must upgrade this component for the stored IPsec policy to function correctly. |
283 | No policy storage was found for the specified provider. |
No policy storage was found for the specified provider. |
284 | No IPsec policy version information was found. As a result, IPsec policies cannot be retrieved. | No IPsec policy version information was found. As a result, IPsec policies cannot be retrieved. |
285 | The version of the IPsec policy in the IPsec policy storage location is not supported. The IPsec policy in the policy storage is version (%d.x). This component only supports version (%d.x). You must upgrade this component for the stored IPsec policy to function correctly. | The version of the IPsec policy in the IPsec policy storage location is not supported. The IPsec policy in the policy storage is version (%d.x). This component only supports version (%d.x). You must upgrade this component for the stored IPsec policy to function correctly. |
286 | Active Directory does not contain a shared certificate store. When configuring Active Directory-based IPsec policy to use certificate authentication, you must ensure that each domain member has an appropriate certificate installed. Do you want to select a certification authority from the certificate store on the local computer? |
Active Directory does not contain a shared certificate store. When configuring Active Directory-based IPsec policy to use certificate authentication, you must ensure that each domain member has an appropriate certificate installed. Do you want to select a certification authority from the certificate store on the local computer? |
287 | You must type a name. | You must type a name. |
289 | The network connection to the IPsec policy storage location was lost. Close all open dialog boxes. Do you want to attempt to reconnect to the IPsec policy storage location now? |
The network connection to the IPsec policy storage location was lost. Close all open dialog boxes. Do you want to attempt to reconnect to the IPsec policy storage location now? |
290 | Certification authority | Certification authority |
291 | Method | Method |
292 | Details | Details |
293 | You must browse for a certification authority | You must browse for a certification authority |
294 | You must specify a preshared key | You must specify a preshared key |
295 | You must specify an authentication method. | You must specify an authentication method. |
296 | The IP filter lists cannot be removed because one or more of them are in use. | The IP filter lists cannot be removed because one or more of them are in use. |
297 | The selected IP filter actions cannot be removed because one or more of them are in use. | The selected IP filter actions cannot be removed because one or more of them are in use. |
298 | Key exchange requires at least one security method. | Key exchange requires at least one security method. |
299 | IP Filter Description and Mirrored property | IP Filter Description and Mirrored property |
300 | Use the Description field to specify a name or a detailed explanation of the IP filter. Select the Mirrored check box to specify a filter in each direction. |
Use the Description field to specify a name or a detailed explanation of the IP filter. Select the Mirrored check box to specify a filter in each direction. |
301 | Last Modified Time | Last Modified Time |
601 | %1 (%2) | %1 (%2) |
602 | Soft security associations are not allowed for IPsec tunnel policy. | Soft security associations are not allowed for IPsec tunnel policy. |
603 | DNS Servers | DNS Servers |
604 | WINS Servers | WINS Servers |
605 | DHCP Server | DHCP Server |
606 | Default Gateway | Default Gateway |
607 | Internet Proxy Server | Internet Proxy Server |
608 | HTTP Proxy | HTTP Proxy |
609 | You can only select a dynamic address for the source or for the destination, not for both. | You can only select a dynamic address for the source or for the destination, not for both. |
610 | GPO Name | GPO Name |
611 | Precedence | Precedence |
612 | OU | OU |
613 | &View... | &View... |
614 | , | , |
615 | The loopback address (127.0.0.1) is not a valid source or destination address. | The loopback address (127.0.0.1) is not a valid source or destination address. |
616 | Destination IP version does not match the source IP version. | Destination IP version does not match the source IP version. |
2002 | ESP with encryption and no authentication is no longer supported. Use integrity (MD5 or SHA1) with the ESP format. | ESP with encryption and no authentication is no longer supported. Use integrity (MD5 or SHA1) with the ESP format. |
3000 | The DNS name '%1' could not be resolved. You must enter a valid DNS name. | The DNS name '%1' could not be resolved. You must enter a valid DNS name. |
3001 | The following source IP addresses were found for DNS name '%1': %2. | The following source IP addresses were found for DNS name '%1': %2. |
3002 | The following destination IP addresses were found for DNS name '%1': %2. | The following destination IP addresses were found for DNS name '%1': %2. |
3005 | Out of memory. | Out of memory. |
3006 | You must enter a name for the IPsec policy. | You must enter a name for the IPsec policy. |
3007 | You must enter a number that is in the range of %1 through %2. | You must enter a number that is in the range of %1 through %2. |
3008 | The number of minutes is invalid. You must enter a number that is in the range of %1 through %2. | The number of minutes is invalid. You must enter a number that is in the range of %1 through %2. |
3009 | This key exchange security method duplicates an existing one. Either modify it, or cancel this dialog box. | This key exchange security method duplicates an existing one. Either modify it, or cancel this dialog box. |
3010 | The IP filter lists could not be removed, due to the following error: %1. | The IP filter lists could not be removed, due to the following error: %1. |
3011 | The IP filter actions could not be removed, due to the following error: %1. | The IP filter actions could not be removed, due to the following error: %1. |
3012 | You cannot add more security methods. The maximum number of security methods have already been added. | You cannot add more security methods. The maximum number of security methods have already been added. |
3013 | You cannot add more key exchange security methods. The maximum of %d key exchange security methods have already been added to the list. | You cannot add more key exchange security methods. The maximum of %d key exchange security methods have already been added to the list. |
3014 | There is already a preshared key in the list of authentication methods. A rule cannot have multiple preshared keys as the authentication methods. | There is already a preshared key in the list of authentication methods. A rule cannot have multiple preshared keys as the authentication methods. |
3015 | This authentication method duplicates an existing one. | This authentication method duplicates an existing one. |
3016 | Conversion of unicode to multibyte string failed. | Conversion of unicode to multibyte string failed. |
4005 | IPsec Policy Files | IPsec Policy Files |
4006 | All Files | All Files |
4007 | Verdana | Verdana |
4008 | 12 | 12 |
4009 | Certificate to account mapping is not allowed on computers that are not members of a domain. IPsec negotiations that use certificate mapping will fail. This option is being disabled for this method. Other methods that use this option should be edited to ensure correct IP Security behavior for this policy. When closing this dialog box, click OK to ensure that this option is properly disabled for this method. |
Certificate to account mapping is not allowed on computers that are not members of a domain. IPsec negotiations that use certificate mapping will fail. This option is being disabled for this method. Other methods that use this option should be edited to ensure correct IP Security behavior for this policy. When closing this dialog box, click OK to ensure that this option is properly disabled for this method. |
5001 | The following error occurred when saving IP Security data: %1 |
The following error occurred when saving IP Security data: %1 |
5002 | The following error occurred when loading IP Security data: %1 |
The following error occurred when loading IP Security data: %1 |
5003 | The operation failed due to the following error. %1 |
The operation failed due to the following error. %1 |
5004 | The following error occurred when loading IP Security rule data. Some of the IP Security rules may be corrupted. %1 |
The following error occurred when loading IP Security rule data. Some of the IP Security rules may be corrupted. %1 |
5006 | IP address or subnet specification is not valid. | IP address or subnet specification is not valid. |
5007 | Invalid address | Invalid address |
5008 | Enter a valid IPv4 address, IPv6 address, or a subnet specification. | Enter a valid IPv4 address, IPv6 address, or a subnet specification. |
6011 | Invalid character | Invalid character |
6012 | Enter a valid IPv4 or IPv6 address or subnet. | Enter a valid IPv4 or IPv6 address or subnet. |
6014 | %d filters were skipped in this filter list because they use features that are not compatible with this interface. | %d filters were skipped in this filter list because they use features that are not compatible with this interface. |
6015 | Some filters were skipped | Some filters were skipped |
6016 | MD5 and DES are considered to be insecure algorithms and their use is not recommended. Are you sure that you want to use them? | MD5 and DES are considered to be insecure algorithms and their use is not recommended. Are you sure that you want to use them? |
6017 | Importing policies may take several minutes or longer. Canceling this process or closing this program before import finishes could result in policy corruption. Do you want to continue? | Importing policies may take several minutes or longer. Canceling this process or closing this program before import finishes could result in policy corruption. Do you want to continue? |
6018 | The default response rule is not valid on Windows Vista. It is valid only on earlier versions of Windows. Do you want to activate it? |
The default response rule is not valid on Windows Vista. It is valid only on earlier versions of Windows. Do you want to activate it? |
6019 | %1%2%3 | %1%2%3 |
6020 | 700 | 700 |
File Description: | IP Security Policy Management Snap-in |
File Version: | 10.0.15063.0 (WinBuild.160101.0800) |
Company Name: | Microsoft Corporation |
Internal Name: | IPSECSNP |
Legal Copyright: | © Microsoft Corporation. All rights reserved. |
Original Filename: | IPSECSNP.DLL.MUI |
Product Name: | Microsoft® Windows® Operating System |
Product Version: | 10.0.15063.0 |
Translation: | 0x409, 1200 |