Windows 8 DLL File Information - nshwfp.dll |
The following DLL report was generated by automatic DLL script that scanned and loaded all DLL files in the system32 directory of Windows 8, extracted the information from them, and then saved it into HTML reports. If you want to view a report of another DLL, go to the main page of this Web site.
General Information
File Description: | Windows Filtering Platform Netsh Helper |
File Version: | 6.2.9200.16384 (win8_rtm.120725-1247) |
Company: | Microsoft Corporation |
Product Name: | Microsoft® Windows® Operating System |
DLL popularity | Very Low - There is no any other DLL in system32 directory that is statically linked to this file. |
File Size: | 686 KB |
Total Number of Exported Functions: | 7 |
Total Number of Exported Functions With Names: | 7 |
Section Headers
Name | Virtual Address | Raw Data Size | % of File | Characteristics | Section Contains... |
---|---|---|---|---|---|
.text | 0x00001000 | 562,688 Bytes | 80.1% | Read, Execute | Code |
.data | 0x0008b000 | 84,992 Bytes | 12.1% | Write, Read | Initialized Data |
.idata | 0x000a1000 | 10,752 Bytes | 1.5% | Read | Initialized Data |
.rsrc | 0x000a4000 | 1,536 Bytes | 0.2% | Read | Initialized Data |
.reloc | 0x000a5000 | 41,472 Bytes | 5.9% | Read, Discardable | Initialized Data |
Static Linking
nshwfp.dll is statically linked to the following files:msvcrt.dll
api-ms-win-core-libraryloader-l1-1-1.dll
RPCRT4.dll
api-ms-win-core-heap-l1-2-0.dll
api-ms-win-core-interlocked-l1-2-0.dll
api-ms-win-security-base-l1-2-0.dll
api-ms-win-core-synch-l1-2-0.dll
api-ms-win-core-errorhandling-l1-1-1.dll
api-ms-win-core-string-l1-1-0.dll
api-ms-win-core-processthreads-l1-1-1.dll
api-ms-win-service-management-l1-1-0.dll
api-ms-win-core-sysinfo-l1-2-0.dll
api-ms-win-core-file-l1-2-0.dll
api-ms-win-core-localization-l1-2-0.dll
api-ms-win-core-console-l1-1-0.dll
api-ms-win-core-processenvironment-l1-2-0.dll
api-ms-win-core-console-l2-1-0.dll
api-ms-win-service-management-l2-1-0.dll
api-ms-win-security-sddl-l1-1-0.dll
api-ms-win-core-handle-l1-1-0.dll
IPHLPAPI.DLL
api-ms-win-core-profile-l1-1-0.dll
api-ms-win-core-shlwapi-legacy-l1-1-0.dll
api-ms-win-core-heap-obsolete-l1-1-0.dll
NSI.dll
ntdll.dll
CRYPT32.dll
Cabinet.dll
fwpuclnt.dll
NETSH.EXE
api-ms-win-core-timezone-l1-1-0.dll
api-ms-win-security-lsalookup-l2-1-0.dll
api-ms-win-eventing-controller-l1-1-0.dll
api-ms-win-core-registry-l1-1-0.dll
api-ms-win-core-kernel32-legacy-l1-1-0.dll
api-ms-win-eventing-legacy-l1-1-0.dll
api-ms-win-security-lsapolicy-l1-1-0.dll
This means that when nshwfp.dll is loaded, the above files are automatically loaded too. If one of these files is corrupted or missing, nshwfp.dll won't be loaded.
General Resources Information
Resource Type | Number of Items | Total Size | % of File |
---|---|---|---|
Icons | 0 | 0 Bytes | 0.0% |
Animated Icons | 0 | 0 Bytes | 0.0% |
Cursors | 0 | 0 Bytes | 0.0% |
Animated Cursors | 0 | 0 Bytes | 0.0% |
Bitmaps | 0 | 0 Bytes | 0.0% |
AVI Files | 0 | 0 Bytes | 0.0% |
Dialog-Boxes | 0 | 0 Bytes | 0.0% |
HTML Related Files | 0 | 0 Bytes | 0.0% |
Menus | 0 | 0 Bytes | 0.0% |
Strings | 148 | 59,270 Bytes | 8.4% |
Type Libraries | 0 | 0 Bytes | 0.0% |
Manifest | 0 | 0 Bytes | 0.0% |
All Others | 2 | 1,148 Bytes | 0.2% |
Total | 150 | 60,418 Bytes | 8.6% |
Icons in this file
No icons found in this file
Cursors in this file
No cursors found in this file
Dialog-boxes list (up to 200 dialogs)
No dialog resources in this file.
String resources in this dll (up to 200 strings)
String ID | String Text |
---|---|
999 | Captures real-time diagnostic information. |
1000 | Shows WFP configuration and state. |
1001 | Sets WFP diagnostic options. |
1002 | Controlling the WFP-IPsec event trace session. |
1990 | Starts an interactive capture session. |
1991 | Usage: capture start [ [ cab = ] (ON | OFF) ] [ [ traceonly = ] (ON | OFF) ] [ [ keywords = ] (NONE | BCAST | MCAST | BCAST+MCAST) ] [ [ file = ] <path> ] Parameters: Tag Value cab - Can be ON or OFF. The default is ON. ON compiles the files in a single .cab file. OFF leaves the output files uncompressed. This is useful if doing your own troubleshooting, rather than collecting data for others. traceonly - Can be ON or OFF. The default is OFF. ON collects only event tracing data, which reduces the output file size. keywords - Can be NONE, BCAST, MCAST, or BCAST+MCAST. The default is BCAST+MCAST. Sets the net event keywords used for the session. BCAST includes broadcast events and MCAST includes multicast events. To reduce the file size for long- running captures, set to NONE. file - Output file name. The default is 'wfpdiag.cab'. If the cab option is ON, the file name should not include the extension since the .cab is automatically added to the output file. Remarks: Starts an interactive capture session. To stop capture, run 'capture stop'. |
1992 | Stops an interactive capture session. |
1993 | Usage: capture stop Remarks: Stops an interactive capture session. Takes effect if previous command executed was 'capture start'. |
2000 | Displays the current state of WFP and IPsec. |
2001 | Usage: show state [ [ file = ] <path> | - ] Parameters: Tag Value file - Output file name. The default is 'wfpstate.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. Remarks: Displays the current state of WFP and IPsec. |
2002 | Displays filters matching the specified traffic parameters. |
2003 | Usage: show filters [ [ file = ] <path> | - ] [ [ protocol = ] <ipproto> ] [ [ localaddr = ] <ipaddr> ] [ [ remoteaddr = ] <ipaddr> ] [ [ localport = ] <port> ] [ [ remoteport = ] <port> ] [ [ appid = ] <path> ] [ [ userid = ] <user> ] [ [ dir = ] IN | OUT ] [ [ verbose = ] ON | OFF ] Parameters: Tag Value file - Output file name. The default is 'filters.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. protocol - The IP protocol. This must be an integer. localaddr - The IP addresses. 'localaddr' is the local IP address, remoteaddr and the 'remoteaddr' is the remote IP address. The addresses are either IPv4 or IPv6. If both local and remote addressses are specified, they both must belong to the same address family. localport - The ports. 'localport' is the local port remoteport and 'remoteport' is the remote port. They must be integers. appid - The application sending or receiving the traffic on the local host. This either an NT path such as '\device\harddiskvolume1\windows\system32\ftp.exe' or a DOS path such as 'c:\Windows\System32\ftp.exe' The supplied path must exist. userid - The user sending or receiving the traffic on the local host. The userid may be a SID (such as 'S-1-5-18') or a user name (such as 'nt authority\system'). dir - The direction of the connection. By default, filters for both inbound and outbound traffic are displayed. Use IN to display only filters for inbound traffic or OUT to display only filters for outbound traffic. verbose - Determines whether to display all filters. Can be ON or OFF. The default is OFF, which attempts to suppress matching filters that are unlikely to affect connectivity. ON does not suppress any filters. Remarks: Displays filters matching the specified traffic parameters. |
2004 | Displays the boot-time policy and filters. |
2005 | Usage: show boottimepolicy [ [ file = ] <path> | - ] Parameters: Tag Value file - Output file name. The default is 'btpol.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. Remarks: Displays the boot-time policy and filters. |
2008 | Displays the global WFP options. |
2009 | Usage: show options [optionsfor = ] NETEVENTS | KEYWORDS | TXNWATCHDOG Parameters: Tag Value optionsfor - Can be either NETEVENTS, KEYWORDS, or TXNWATCHDOG. NETEVENTS shows whether network events are buffered for diagnostics. KEYWORDS shows which network events are buffered for diagnostics. TXNWATCHDOG shows the timeout in milliseconds for the transaction watchdog event. Remarks: Displays the current value set for the specified option. |
2010 | Displays the application ID for the specified file. |
2011 | Usage: show appid [ file = ] <path> Parameters: Tag Value file - Specifies the DOS path for the application. Remarks: Displays the application NT path for the specified file. The supplied path must exist. |
2014 | Sets the global WFP options. |
2015 | Usage: set options [ netevents = ON | OFF ] [ [ keywords = ] NONE | BCAST | MCAST| BCAST+MCAST ] [ [ txnwatchdog = ] <time in msec> ] Parameters: Tag Value netevents - Can be either ON or OFF. Sets the netevents option. keywords - Can be NONE, BCAST, MCAST, or BCAST+MCAST. Sets the keywords option. The default is NONE. txnwatchdog - Sets the timeout in milliseconds for the transaction watchdog event. This must be an integer. If no value is specified, the timeout is set to zero, and an event will be triggered for every transaction. Remarks: Sets the global WFP options. Only one option parameter can be set per execution. |
2018 | Tells whether an interactive capture session is in progress. |
2019 | Usage: capture status Remarks: Tells whether an interactive capture session is in progress. |
2055 | Displays recent network events matching the traffic parameters. |
2064 | Usage: show netevents [ [ file = ] <path> | - ] [ [ protocol = ] <ipproto> ] [ [ localaddr = ] <ipaddr> ] [ [ remoteaddr = ] <ipaddr> ] [ [ localport = ] <port> ] [ [ remoteport = ] <port> ] [ [ appid = ] <path> ] [ [ userid = ] <user> ] [ [ timewindow = ] <seconds> ] Parameters: Tag Value file - Output file name. The default is 'netevents.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. protocol - The IP protocol. This must be an integer. localaddr - The IP addresses. 'localaddr' is the local IP address, remoteaddr and 'remoteaddr' is the remote IP address. The addresses are either IPv4 or IPv6. If both local and remote addresses are specified, they both must belong to the same address family. localport - The ports. 'localport' is the local port, and 'remoteport' is the remote port. remoteport They must be integers. appid - The application sending or receiving the traffic on the local host. This either an NT path such as '\device\harddiskvolume1\windows\system32\ftp.exe' or a DOS path such as 'c:\Windows\System32\ftp.exe' The supplied path must exist. userid - The user sending or receiving the traffic on the local host. The userid may be a SID (such as 'S-1-5-18') or a user name (such as 'nt authority\system'). timewindow - Limits the output to network events that occurred within a specified number of seconds. This must be an integer. Remarks: Displays recent network events matching the specified traffic parameters. |
2065 | Displays the specified security descriptor. |
2066 | Usage: show security [ type = ] CALLOUT|ENGINE|FILTER|IKESADB|IPSECSADB|LAYER|NETEVENTS |PROVIDER|PROVIDERCONTEXT|SUBLAYER [ [ guid = ] <guid> Parameters: Tag Value type - Specifies the object type to be retrieved. Can be CALLOUT, ENGINE, FILTER, IKESADB, IPSECSADB, LAYER, NETEVENTS, PROVIDER, PROVIDERCONTEXT, or SUBLAYER. guid - For object types that support per-object security descriptors, this is the GUID of the object. If not specified, it defaults to IID_NULL, which retrieves the security descriptor of the type container. The following types support per-object security descriptors: callout filter layer provider providercontext sublayer Remarks: Displays the specified security descriptor. |
2075 | Displays system ports used by the TCP/IP Stack and the RPC sub-system. |
2084 | Usage: show sysports [ [ file = ] <path> | - ] Parameters: Tag Value file - Output file name. The default is 'sysports.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. Remarks: Displays system ports used by the TCP/IP stack and the RPC sub-system. |
3000 | Initializing data collection -- please wait. |
3001 | Only event tracing will be collected. |
3002 | Initialization complete. Reproduce the scenario, then run 'capture stop'. |
3003 | Data collection successful; output = %1!s! |
3004 | Data collection successful; output = %t%1 %t%2 |
3005 | Finalizing data collection -- please wait. |
3006 | Success. |
3007 | At least one netevent was not captured during the ETW session. |
4001 | Unable to connect to BFE; error = %1!s! |
4002 | Unable to start an ETW trace session; error=%1!s! |
4003 | Unable to open the XML file with Write access; error=%1!s! |
4004 | Unable to subscribe to change notifications; error = %1!s! |
4005 | Unable to write output to the XML file; error = %1!s! |
4006 | Unable to collect run-time events; error = %1!s! |
4007 | Unable to format the trace file; error = %1!s! |
4008 | Unable to create the cabinet file. |
4009 | Unable to load the XML document; error = %1!s! |
4010 | Import file parsing terminated at line %1!u!, column %2!u! |
4011 | Unexpected element '%1' at line %2!u!, column %3!u! |
4012 | Unexpected text in element '%1' at line %2!u!, column %3!u!. |
4013 | Invalid text in element '%1' at line %2!u!, column %3!u!. |
4014 | Unable to read the boot-time policy; error = %1!s! |
4015 | Unable to enumerate the network events; error = %1!s! |
4016 | Unable to open the data collector set; error = %1!s! |
4017 | Unable to add an object; error = %1!s! |
4018 | Unable to delete an object; error = %1!s! |
4019 | The object is defined at line %1!u!, column %2!u! |
4020 | Capture is already in progress. |
4021 | No capture is in progress. |
4022 | The IKEEXT log file does not exist. Ensure that IKEEXT tracing is enabled. |
4028 | Unable to query lost netevents from ETW. |
5000 | Deletes all IPsec DoS Protection configuration. |
5001 | reset Deletes all IPsec DoS Protection configuration. Parameters: none |
5100 | Adds IPsec DoS Protection configuration. |
5101 | Adds IPsec DoS Protection interface configuration. |
5102 | add interface [name=]<string> [type=]public|internal Adds IPsec DoS Protection interface configuration. Parameters: Tag Value name - Friendly name of the interface. type - Interface type. public: Interface faces public network. internal: Interface faces internal network. Examples: add interface "Local Area Connection" public add interface name="Local Area Connection" type=public |
5110 | Adds IPsec DoS Protection keying module configuration. |
5111 | add allowedkeyingmodule [name=]ikev1|ikev2|authip [[internalprefix=]<IPv6 address>[/<integer>]] Adds IPsec DoS Protection allowed keying module configuration. Parameters: Tag Value name - Name of an IPsec keying module to allow. ikev1: The IKEv1 keying module. ikev2: The IKEv2 keying module. authip: The AuthIP keying module. internalprefix - Internal host IPv6 address or subnet for which the keying module needs to be allowed (optional). If not specified, it will be allowed for all internal IPv6 addresses. Remarks: AuthIP is present in the list of allowed keying modules by default. Examples: add allowedkeyingmodule ikev1 add allowedkeyingmodule name=ikev1 add allowedkeyingmodule ikev1 3ffe:401d:1f00:baa::1 |
5120 | Adds IPsec DoS Protection IPv6 filter configuration. |
5121 | add filter [[publicprefix=]<IPv6 address>[/<integer>]] [[internalprefix=]<IPv6 address>[/<integer>]] [action=]exempt|block Adds IPsec DoS Protection IPv6 filter configuration. Parameters: Tag Value publicprefix - Public host IPv6 address or subnet (optional). If not specified, the filter will match all public IPv6 addresses. internalprefix - Internal host IPv6 address or subnet (optional). If not specified, the filter will match all internal IPv6 addresses. action - Action to take for any traffic that matches the filter. exempt: Don't require matching traffic to be IPsec protected. block: Block matching traffic. Examples: add filter publicprefix=3ffe:401d:1f00::/64 action=block |
5200 | Deletes IPsec DoS Protection configuration. |
5201 | Deletes IPsec DoS Protection interface configuration. |
5202 | delete interface [name=]<string> Deletes IPsec DoS Protection interface configuration. Parameters: Tag Value name - Friendly name of the interface. Examples: delete interface "Local Area Connection" delete interface name="Local Area Connection" |
5210 | Deletes IPsec DoS Protection allowed keying module configuration. |
5211 | delete allowedkeyingmodule [name=]ikev1|ikev2|authip [[internalprefix=]<IPv6 address>[/<integer>]] Deletes IPsec DoS Protection allowed keying module configuration. Parameters: Tag Value name - Name of an IPsec keying module to disallow. ikev1: The IKEv1 keying module. ikev2: The IKEv2 keying module. authip: The AuthIP keying module. internalprefix - Internal host IPv6 address or subnet for which the keying module should be disallowed (optional). If not specified, it will be disallowed for all internal IPv6 addresses. Examples: delete allowedkeyingmodule ikev1 delete allowedkeyingmodule name=ikev1 delete allowedkeyingmodule ikev1 3ffe:401d:1f00:baa::1 |
5220 | Deletes IPsec DoS Protection IPv6 filter configuration. |
5221 | delete filter [[publicprefix=]<IPv6 address>[/<integer>]] [[internalprefix=]<IPv6 address>[/<integer>]] Deletes IPsec DoS Protection IPv6 filter configuration. Parameters: Tag Value publicprefix - Public host IPv6 address or subnet (optional). This must be same as the publicprefix specified with the corresponding add command. internalprefix - Internal host IPv6 address or subnet (optional). This must be same as the internalprefix specified with the corresponding add command. Examples: delete filter 3ffe:401d:1f00::/64 delete filter publicprefix=3ffe:401d:1f00::/64 |
5300 | Sets IPsec DoS Protection information. |
5301 | Sets IPsec DoS Protection DSCP marking configuration. |
5302 | set dscp [type=]ipsecauthenticated|ipsecunauthenticated|icmpv6|filtered|default [value=]<integer>|disable Sets IPsec DoS Protection DSCP marking configuration. Parameters: Tag Value type - Type of inbound traffic for which the DSCP marking is being specified. ipsecauthenticated: Authenticated IPv6 IPsec traffic. ipsecunauthenticated: Unauthenticated IPv6 IPsec traffic. icmpv6: ICMPv6 traffic. filtered: Filter exempted IPv6 traffic. default: Default-block exempted traffic. value - DCSP value to mark in the top 6 bits of the traffic class or TOS field in the IP header of corresponding traffic. <integer>: Must be <= 63. disable: Disable this marking. Remarks: By default DSCP marking for all traffic types is disabled. Examples: set dscp ipsecunauthenticated 10 set dscp type=ipsecunauthenticated value=10 set dscp ipsecauthenticated DISABLE |
5310 | Sets IPsec DoS Protection miscellaneous configuration. |
5311 | set miscellaneous [[stateidletimeout=]<integer>] [[peripratelimitidletimeout=]<integer>] [[maxentries=]<integer>] [[maxperipratelimitqueues=]<integer>] [[defaultblock=]enable|disable] Sets IPsec DoS Protection miscellaneous configuration. Parameters: Tag Value stateidletimeout - State inactivity timeout in seconds (optional). <integer>: Must be > 0 and <= 4294967295. Default value is 360. peripratelimitidletimeout - Per internal IP address rate limit queue inactivity timeout in seconds (optional). <integer>: Must be > 0 and <= 4294967295. Default value is 360. maxentries - Maximum number of state entries (optional). <integer>: Must be > 0 and <= 4294967295. Default value is 75000. maxperipratelimitqueues - Maximum number of per internal IP address rate limit queues (optional). <integer>: Must be > 0 and <= 4294967295. Default value is 50000. defaultblock - Value of the default block setting (optional). enable: IPsec DoS Protection will drop all IPv4 traffic & all non-IPsec IPv6 traffic that is forwarded between a public interface and an internal interface, except ICMPv6 (default). disable: IPsec DoS Protection will permit all IPv4 traffic & all non-IPsec IPv6 traffic that is forwarded between a public interface and an internal interface. Examples: set miscellaneous 480 100000 set miscellaneous stateidletimeout=480 maxentries=100000 set miscellaneous defaultblock=disable |
5320 | Sets IPsec DoS Protection rate limit configuration. |
5321 | set ratelimit [type=]ipsecauthenticated|ipsecunauthenticated|ipsecunauthenticatedperip| icmpv6|filtered|default [value=]<integer>|disable Sets IPsec DoS Protection rate limit configuration. Parameters: Tag Value type - Type of inbound traffic for which the rate limit is being specified. ipsecauthenticated: Authenticated IPv6 IPsec traffic. Rate limit disabled by default. ipsecunauthenticated: Unauthenticated IPv6 IPsec traffic. Default rate limit is 102400 bytes/sec. ipsecunauthenticatedperip: Per internal IP address rate limit for unauthenticated IPv6 IPsec traffic. Default rate limit is 10240 bytes/sec. icmpv6: ICMPv6 traffic. Default rate limit for this traffic type is 10240 bytes/sec. filtered: Filter exempted IPv6 traffic. Default rate limit is 102400 bytes/sec. default: Default-block exempted traffic. Default rate limit is 102400 bytes/sec. value - Value of the rate limit in bytes/sec. <integer>: Must be > 0 and <= 4294967295. disable: Disable this rate limit. Examples: set ratelimit ipsecunauthenticated 2048 set ratelimit type=ipsecunauthenticated value=2048 set ratelimit filtered disable |
5400 | Displays IPsec DoS Protection information. |
5401 | Displays IPsec DoS Protection interface configuration. |
5402 | show interface [[type=]public|internal] Displays IPsec DoS Protection interface configuration. Parameters: Tag Value type - Interface type (optional). public: Show interfaces facing public network. internal: Show interfaces facing internal network. Examples: show interface show interface public show interface type=public |
5403 | Public interfaces: |
5404 | Internal interfaces: |
5410 | Displays IPsec DoS Protection keying module configuration. |
5411 | show allowedkeyingmodule Displays IPsec DoS Protection allowed keying module configuration. Parameters: none |
5412 | Allowed keying modules (internalprefix - keying module list): |
5420 | Displays IPsec DoS Protection DSCP marking configuration. |
5421 | show dscp [[type=]ipsecauthenticated|ipsecunauthenticated|icmpv6|filtered|default] Displays IPsec DoS Protection DSCP marking configuration. Parameters: Tag Value type - Type of inbound traffic for which the DSCP marking should be displayed (optional). If not specified, all types will be displayed. ipsecauthenticated: Authenticated IPv6 IPsec traffic. ipsecunauthenticated: Unauthenticated IPv6 IPsec traffic. icmpv6: ICMPv6 traffic. filtered: Filter exempted IPv6 traffic. default: Default-block exempted traffic. Examples: show dscp show dscp ipsecunauthenticated show dscp type=ipsecunauthenticated |
5422 | Authenticated IPv6 IPsec dscp: %1!s! |
5423 | Unauthenticated IPv6 IPsec dscp: %1!s! |
5424 | ICMPv6 dscp: %1!s! |
5425 | IPv6 filter exempted dscp: %1!s! |
5426 | Default-block exempted dscp: %1!s! |
5430 | Displays IPsec DoS Protection miscellaneous configuration. |
5431 | show miscellaneous Displays IPsec DoS Protection miscellaneous configuration. Parameters: none |
5432 | State idle timeout (seconds): %1!u! |
5433 | Per IP address rate limit queue idle timeout (seconds): %1!u! |
5434 | Maximum number of state entries: %1!u! |
5435 | Maximum number of per IP address rate limit queues: %1!u! |
5436 | Default block: %1!s! |
5440 | Displays IPsec DoS Protection rate limit configuration. |
5441 | show ratelimit [[type=]ipsecauthenticated|ipsecunauthenticated|ipsecunauthenticatedperip| icmpv6|filtered|default] Displays IPsec DoS Protection rate limit configuration. Parameters: Tag Value type - Type of traffic for which the rate limit should be displayed (optional). If not specified, all types will be displayed. ipsecauthenticated: Authenticated IPv6 IPsec traffic. ipsecunauthenticated: Unauthenticated IPv6 IPsec traffic. ipsecunauthenticatedperip: Per internal IP address rate limit for unauthenticated IPv6 IPsec traffic. icmpv6: ICMPv6 traffic. filtered: Filter exempted IPv6 traffic. default: Default-block exempted traffic. Examples: show ratelimit show ratelimit ipsecunauthenticated show ratelimit type=ipsecunauthenticated |
5442 | Authenticated IPv6 IPsec rate limit (bytes/sec): %1!s! |
5443 | Unauthenticated IPv6 IPsec rate limit (bytes/sec): %1!s! |
5444 | Unauthenticated IPv6 IPsec per IP address rate limit (bytes/sec): %1!s! |
5445 | ICMPv6 rate limit (bytes/sec): %1!s! |
5446 | IPv6 filter exempted rate limit (bytes/sec): %1!s! |
5447 | Default-block exempted rate limit (bytes/sec): %1!s! |
5450 | Displays IPsec DoS Protection state entries. |
5451 | show state [[publicprefix=]<IPv6 address>[/<integer>]] [[internalprefix=]<IPv6 address>[/<integer>]] Displays all state entries inside IPsec DoS Protection that match specified criteria. Parameters: Tag Value publicprefix - Public host IPv6 address or subnet (optional). If not specified, all public IPv6 addresses will be matched. internalprefix - Internal host IPv6 address or subnet (optional). If not specified, all internal IPv6 addresses will be matched. Examples: Show state Show state publicprefix=3ffe::/16 Show state internalprefix=3ffe:401d:1f00:baa::1 |
5452 | IPsec DoS Protection state entries (There are %1!u! entries) ---------------------------------------------------------------------------- |
5453 | Public host IPv6 address: %1!s! |
5454 | Internal host IPv6 address: %1!s! |
5455 | Total inbound IPv6 IPsec packets allowed on this state: %1!I64u! |
5456 | Total outbound IPv6 IPsec packets allowed on this state: %1!I64u! |
5457 | Time elapsed since state creation (seconds): %1!u! |
5460 | Displays IPsec DoS Protection statistics. |
5461 | show statistics Displays IPsec DoS Protection statistics. Parameters: none |
5462 | Total state entries created: %1!I64u! |
5463 | Current state entries: %1!I64u! |
5464 | Current per IP address rate limit queues: %1!I64u! |
5465 | Total inbound allowed unauthenticated IPv6 IPsec packets: %1!I64u! |
5466 | Total inbound unauthenticated IPv6 IPsec packets discarded due to rate limit: %1!I64u! |
5467 | Total inbound unauthenticated IPv6 IPsec packets discarded due to per IP address rate limit: %1!I64u! |
5468 | Total inbound unauthenticated IPv6 IPsec packets discarded due to other reasons: %1!I64u! |
5469 | Total inbound allowed authenticated IPv6 IPsec packets: %1!I64u! |
5470 | Total inbound authenticated IPv6 IPsec packets discarded due to rate limit: %1!I64u! |
5471 | Total inbound authenticated IPv6 IPsec packets discarded due to other reasons: %1!I64u! |
5472 | Total inbound allowed ICMPv6 packets: %1!I64u! |
5473 | Total inbound ICMPv6 packets discarded due to rate limit: %1!I64u! |
5474 | Total inbound allowed filter exempted IPv6 packets: %1!I64u! |
5475 | Total inbound filter exempted IPv6 packets discarded due to rate limit: %1!I64u! |
5476 | Total inbound filter blocked IPv6 packets: %1!I64u! |
5477 | Total inbound allowed default-block exempted packets: %1!I64u! |
5478 | Total inbound default-block exempted packets discarded due to rate limit: %1!I64u! |
5479 | Total inbound default-block discarded packets: %1!I64u! |
5480 | Displays IPsec DoS Protection IPv6 filter configuration. |
5481 | show filter Displays IPsec DoS Protection IPv6 filter configuration. Parameters: none |
5482 | IPv6 filters (publicprefix <-> internalprefix - action): |
5490 | Displays IPsec DoS Protection configuration, statistics and state entries. |
5491 | show all Displays IPsec DoS Protection configuration, statistics and state entries. Parameters: none |
5492 | IPsec DoS Protection configuration parameters ---------------------------------------------------------------------------- |
5493 | IPsec DoS Protection statistics ---------------------------------------------------------------------------- |
5500 | <empty> |
COM Classes/Interfaces
There is no type library in this file with COM classes/interfaces information
Exported Functions List
The following functions are exported by this dll:IdpConfigAddPolicy | IdpConfigAllocateAndGetPolicy | IdpConfigFreePolicy | IdpConfigInitDefaultPolicy |
IdpConfigRemovePolicy | InitHelperDll | WfpCaptureExportedW |
Imported Functions List
The following functions are imported by this dll:- msvcrt.dll:
_XcptFilter _amsg_exit _close _errno _except_handler4_common _get_errno _i64toa_s _initterm _lseek _ltoa_s _open _read _set_errno _snwprintf_s _tempnam _ui64toa_s _ultoa_s _ultow_s _vsnprintf _vsnwprintf _wcsicmp _wcsnicmp _wcstoi64 _wcstoui64 _write bsearch free isprint malloc memcmp memcpy memset qsort remove sprintf_s strchr strcpy_s strpbrk strstr swprintf_s wcsncmp wcstod wcstol wcstoul wprintf - api-ms-win-core-libraryloader-l1-1-1.dll:
KernelBase!DisableThreadLibraryCalls KernelBase!GetModuleHandleExW KernelBase!GetProcAddress KernelBase!LoadStringW - RPCRT4.dll:
I_RpcExceptionFilter MesDecodeBufferHandleCreate MesEncodeDynBufferHandleCreate MesHandleFree NdrMesTypeDecode2 UuidCreate UuidFromStringW - api-ms-win-core-heap-l1-2-0.dll:
KernelBase!GetProcessHeap KernelBase!HeapCreate KernelBase!HeapDestroy ntdll!RtlAllocateHeap ntdll!RtlFreeHeap ntdll!RtlReAllocateHeap ntdll!RtlSizeHeap - api-ms-win-core-interlocked-l1-2-0.dll:
KernelBase!InterlockedCompareExchange KernelBase!InterlockedDecrement KernelBase!InterlockedExchange KernelBase!InterlockedExchangeAdd KernelBase!InterlockedIncrement - api-ms-win-security-base-l1-2-0.dll:
KernelBase!GetLengthSid - api-ms-win-core-synch-l1-2-0.dll:
KernelBase!CreateEventW KernelBase!InitializeCriticalSectionAndSpinCount KernelBase!OpenEventW KernelBase!SetEvent KernelBase!Sleep KernelBase!WaitForSingleObject ntdll!RtlDeleteCriticalSection ntdll!RtlEnterCriticalSection ntdll!RtlLeaveCriticalSection - api-ms-win-core-errorhandling-l1-1-1.dll:
KernelBase!GetLastError KernelBase!SetUnhandledExceptionFilter KernelBase!UnhandledExceptionFilter ntdll!RtlRestoreLastWin32Error - api-ms-win-core-string-l1-1-0.dll:
KernelBase!MultiByteToWideChar KernelBase!WideCharToMultiByte - api-ms-win-core-processthreads-l1-1-1.dll:
kernel32!CreateProcessW kernel32!ExitProcess kernel32!GetCurrentProcess kernel32!GetCurrentProcessId kernel32!GetCurrentThreadId kernel32!GetExitCodeProcess kernel32!TerminateProcess - api-ms-win-service-management-l1-1-0.dll:
sechost!CloseServiceHandle sechost!OpenSCManagerW sechost!OpenServiceW - api-ms-win-core-sysinfo-l1-2-0.dll:
KernelBase!GetSystemInfo KernelBase!GetSystemTimeAsFileTime KernelBase!GetTickCount - api-ms-win-core-file-l1-2-0.dll:
KernelBase!CreateFileA KernelBase!CreateFileW KernelBase!DeleteFileA KernelBase!DeleteFileW KernelBase!FileTimeToLocalFileTime KernelBase!GetFileAttributesA KernelBase!GetFileInformationByHandle KernelBase!WriteFile - api-ms-win-core-localization-l1-2-0.dll:
KernelBase!FormatMessageW - api-ms-win-core-console-l1-1-0.dll:
KernelBase!GetConsoleOutputCP - api-ms-win-core-processenvironment-l1-2-0.dll:
KernelBase!GetStdHandle - api-ms-win-core-console-l2-1-0.dll:
KernelBase!AttachConsole - api-ms-win-service-management-l2-1-0.dll:
sechost!QueryServiceStatusEx - api-ms-win-security-sddl-l1-1-0.dll:
sechost!ConvertSecurityDescriptorToStringSecurityDescriptorW sechost!ConvertSidToStringSidW sechost!ConvertStringSecurityDescriptorToSecurityDescriptorW sechost!ConvertStringSidToSidW - api-ms-win-core-handle-l1-1-0.dll:
KernelBase!CloseHandle - IPHLPAPI.DLL:
GetAdaptersAddresses - api-ms-win-core-profile-l1-1-0.dll:
ntdll!RtlQueryPerformanceCounter - api-ms-win-core-shlwapi-legacy-l1-1-0.dll:
KernelBase!PathFindExtensionW - api-ms-win-core-heap-obsolete-l1-1-0.dll:
kernel32!LocalFree - NSI.dll:
NsiGetAllParameters NsiSetAllParameters - ntdll.dll:
EtwEventWrite EtwTraceMessage RtlApplicationVerifierStop RtlEthernetAddressToStringA RtlEthernetStringToAddressW RtlIpv4AddressToStringA RtlIpv4StringToAddressW RtlIpv6AddressToStringA RtlIpv6AddressToStringW RtlIpv6StringToAddressW RtlNtStatusToDosError - CRYPT32.dll:
CertCreateCertificateContext CertFreeCertificateContext CertGetNameStringW CertNameToStrW - Cabinet.dll:
FCIAddFile FCICreate FCIDestroy FCIFlushCabinet - fwpuclnt.dll:
FwpmCalloutAdd0 FwpmCalloutCreateEnumHandle0 FwpmCalloutDeleteById0 FwpmCalloutDeleteByKey0 FwpmCalloutDestroyEnumHandle0 FwpmCalloutEnum0 FwpmCalloutGetByKey0 FwpmCalloutGetSecurityInfoByKey0 FwpmCalloutSetSecurityInfoByKey0 FwpmCalloutSubscribeChanges0 FwpmCalloutSubscriptionsGet0 FwpmCalloutUnsubscribeChanges0 FwpmEngineClose0 FwpmEngineGetOption0 FwpmEngineGetSecurityInfo0 FwpmEngineOpen0 FwpmEngineSetOption0 FwpmEngineSetSecurityInfo0 FwpmFilterAdd0 FwpmFilterCreateEnumHandle0 FwpmFilterDeleteById0 FwpmFilterDeleteByKey0 FwpmFilterDestroyEnumHandle0 FwpmFilterEnum0 FwpmFilterGetByKey0 FwpmFilterGetSecurityInfoByKey0 FwpmFilterSetSecurityInfoByKey0 FwpmFilterSubscribeChanges0 FwpmFilterSubscriptionsGet0 FwpmFilterUnsubscribeChanges0 FwpmFreeMemory0 FwpmGetAppIdFromFileName0 FwpmLayerCreateEnumHandle0 FwpmLayerDestroyEnumHandle0 FwpmLayerEnum0 FwpmLayerGetSecurityInfoByKey0 FwpmLayerSetSecurityInfoByKey0 FwpmNetEventCreateEnumHandle0 FwpmNetEventDestroyEnumHandle0 FwpmNetEventEnum2 FwpmNetEventSubscribe1 FwpmNetEventSubscriptionsGet0 FwpmNetEventUnsubscribe0 FwpmNetEventsGetSecurityInfo0 FwpmNetEventsLost0 FwpmNetEventsSetSecurityInfo0 FwpmProviderAdd0 FwpmProviderContextAdd2 FwpmProviderContextCreateEnumHandle0 FwpmProviderContextDeleteById0 FwpmProviderContextDeleteByKey0 FwpmProviderContextDestroyEnumHandle0 FwpmProviderContextEnum2 FwpmProviderContextGetByKey2 FwpmProviderContextGetSecurityInfoByKey0 FwpmProviderContextSetSecurityInfoByKey0 FwpmProviderContextSubscribeChanges0 FwpmProviderContextSubscriptionsGet0 FwpmProviderContextUnsubscribeChanges0 FwpmProviderCreateEnumHandle0 FwpmProviderDeleteByKey0 FwpmProviderDestroyEnumHandle0 FwpmProviderEnum0 FwpmProviderGetByKey0 FwpmProviderGetSecurityInfoByKey0 FwpmProviderSetSecurityInfoByKey0 FwpmProviderSubscribeChanges0 FwpmProviderSubscriptionsGet0 FwpmProviderUnsubscribeChanges0 FwpmSessionCreateEnumHandle0 FwpmSessionDestroyEnumHandle0 FwpmSessionEnum0 FwpmSubLayerAdd0 FwpmSubLayerCreateEnumHandle0 FwpmSubLayerDeleteByKey0 FwpmSubLayerDestroyEnumHandle0 FwpmSubLayerEnum0 FwpmSubLayerGetByKey0 FwpmSubLayerGetSecurityInfoByKey0 FwpmSubLayerSetSecurityInfoByKey0 FwpmSubLayerSubscribeChanges0 FwpmSubLayerSubscriptionsGet0 FwpmSubLayerUnsubscribeChanges0 FwpmSystemPortsGet0 FwpmTransactionAbort0 FwpmTransactionBegin0 FwpmTransactionCommit0 FwpsAleEndpointCreateEnumHandle0 FwpsAleEndpointDestroyEnumHandle0 FwpsAleEndpointEnum0 IPsecDospGetStatistics0 IPsecDospStateCreateEnumHandle0 IPsecDospStateDestroyEnumHandle0 IPsecDospStateEnum0 IPsecGetStatistics1 IPsecSaContextCreateEnumHandle0 IPsecSaContextDestroyEnumHandle0 IPsecSaContextEnum1 IPsecSaDbGetSecurityInfo0 IPsecSaDbSetSecurityInfo0 IkeextGetStatistics1 IkeextSaCreateEnumHandle0 IkeextSaDbGetSecurityInfo0 IkeextSaDbSetSecurityInfo0 IkeextSaDestroyEnumHandle0 IkeextSaEnum2 - NETSH.EXE:
MatchEnumTag PreprocessCommand PrintMessage PrintMessageFromModule RegisterContext RegisterHelper - api-ms-win-core-timezone-l1-1-0.dll:
KernelBase!FileTimeToSystemTime - api-ms-win-security-lsalookup-l2-1-0.dll:
advapi32!LookupAccountNameW - api-ms-win-eventing-controller-l1-1-0.dll:
KernelBase!ControlTraceW KernelBase!StartTraceW - api-ms-win-core-registry-l1-1-0.dll:
KernelBase!RegCloseKey KernelBase!RegEnumValueW KernelBase!RegOpenKeyExW KernelBase!RegQueryInfoKeyW KernelBase!RegQueryValueExW - api-ms-win-core-kernel32-legacy-l1-1-0.dll:
kernel32!FileTimeToDosDateTime - api-ms-win-eventing-legacy-l1-1-0.dll:
advapi32!EnableTrace - api-ms-win-security-lsapolicy-l1-1-0.dll:
sechost!LsaClose sechost!LsaFreeMemory sechost!LsaOpenPolicy sechost!LsaQueryInformationPolicy