Main Page Windows 7 DLLs NirSoft Utilities
Windows 10 DLL File Information - nshwfp.dll

The following DLL report was generated by automatic DLL script that scanned and loaded all DLL files in the system32 directory of Windows 10, extracted the information from them, and then saved it into HTML reports. If you want to view a report of another DLL, go to the main page of this Web site.

 

General Information

File Description: Windows Filtering Platform Netsh Helper  
File Version: 10.0.10130.0 (fbl_impressive.150522-2224)  
Company: Microsoft Corporation  
Product Name: Microsoft® Windows® Operating System  
DLL popularity Very Low - There is no any other DLL in system32 directory that is statically linked to this file.
File Size: 559 KB
Total Number of Exported Functions: 8
Total Number of Exported Functions With Names: 8
 

Section Headers

Name Virtual Address Raw Data Size % of File Characteristics Section Contains...
.text 0x00001000 463,872 Bytes 81.0% Read, Execute Code
.data 0x00073000 69,632 Bytes 12.2% Write, Read Initialized Data
.idata 0x00086000 9,728 Bytes 1.7% Read Initialized Data
.rsrc 0x00089000 1,536 Bytes 0.3% Read Initialized Data
.reloc 0x0008a000 26,624 Bytes 4.7% Read, Discardable Initialized Data
 

Static Linking

nshwfp.dll is statically linked to the following files:

msvcrt.dll
api-ms-win-core-libraryloader-l1-2-0.dll
RPCRT4.dll
api-ms-win-core-heap-l1-2-0.dll
api-ms-win-security-base-l1-2-0.dll
api-ms-win-core-synch-l1-2-0.dll
api-ms-win-core-errorhandling-l1-1-1.dll
api-ms-win-core-string-l1-1-0.dll
api-ms-win-core-processthreads-l1-1-2.dll
api-ms-win-service-management-l1-1-0.dll
api-ms-win-core-sysinfo-l1-2-1.dll
api-ms-win-core-file-l1-2-1.dll
api-ms-win-core-localization-l1-2-1.dll
api-ms-win-core-console-l1-1-0.dll
api-ms-win-core-processenvironment-l1-2-0.dll
api-ms-win-core-console-l2-1-0.dll
api-ms-win-service-management-l2-1-0.dll
api-ms-win-security-sddl-l1-1-0.dll
api-ms-win-core-handle-l1-1-0.dll
api-ms-win-core-heap-l2-1-0.dll
IPHLPAPI.DLL
api-ms-win-core-profile-l1-1-0.dll
api-ms-win-core-shlwapi-legacy-l1-1-0.dll
NSI.dll
ntdll.dll
CRYPT32.dll
Cabinet.dll
fwpuclnt.dll
NETSH.EXE
api-ms-win-core-timezone-l1-1-0.dll
api-ms-win-security-lsalookup-l2-1-1.dll
api-ms-win-eventing-controller-l1-1-0.dll
api-ms-win-core-registry-l1-1-0.dll
api-ms-win-core-kernel32-legacy-l1-1-1.dll
api-ms-win-eventing-legacy-l1-1-0.dll
api-ms-win-security-lsapolicy-l1-1-0.dll

This means that when nshwfp.dll is loaded, the above files are automatically loaded too. If one of these files is corrupted or missing, nshwfp.dll won't be loaded.

 

General Resources Information

Resource Type Number of Items Total Size % of File
Icons 0 0 Bytes 0.0%
Animated Icons 0 0 Bytes 0.0%
Cursors 0 0 Bytes 0.0%
Animated Cursors 0 0 Bytes 0.0%
Bitmaps 0 0 Bytes 0.0%
AVI Files 0 0 Bytes 0.0%
Dialog-Boxes 0 0 Bytes 0.0%
HTML Related Files 0 0 Bytes 0.0%
Menus 0 0 Bytes 0.0%
Strings 148 59,270 Bytes 10.4%
Type Libraries 0 0 Bytes 0.0%
Manifest 0 0 Bytes 0.0%
All Others 2 1,152 Bytes 0.2%
Total 150 60,422 Bytes 10.6%
 

Icons in this file

No icons found in this file

 

Cursors in this file

No cursors found in this file

 

Dialog-boxes list (up to 1000 dialogs)

No dialog resources in this file.

 

String resources in this dll (up to 1000 strings)

String ID String Text
999 Captures real-time diagnostic information.
1000 Shows WFP configuration and state.
1001 Sets WFP diagnostic options.
1002 Controlling the WFP-IPsec event trace session.
1990 Starts an interactive capture session.
1991 Usage: capture start [ [ cab = ] (ON | OFF) ] [ [ traceonly = ] (ON | OFF) ] [ [ keywords = ] (NONE | BCAST | MCAST | BCAST+MCAST) ] [ [ file = ] <path> ] Parameters: Tag Value cab - Can be ON or OFF. The default is ON. ON compiles the files in a single .cab file. OFF leaves the output files uncompressed. This is useful if doing your own troubleshooting, rather than collecting data for others. traceonly - Can be ON or OFF. The default is OFF. ON collects only event tracing data, which reduces the output file size. keywords - Can be NONE, BCAST, MCAST, or BCAST+MCAST. The default is BCAST+MCAST. Sets the net event keywords used for the session. BCAST includes broadcast events and MCAST includes multicast events. To reduce the file size for long- running captures, set to NONE. file - Output file name. The default is 'wfpdiag.cab'. If the cab option is ON, the file name should not include the extension since the .cab is automatically added to the output file. Remarks: Starts an interactive capture session. To stop capture, run 'capture stop'.
1992 Stops an interactive capture session.
1993 Usage: capture stop Remarks: Stops an interactive capture session. Takes effect if previous command executed was 'capture start'.
2000 Displays the current state of WFP and IPsec.
2001 Usage: show state [ [ file = ] <path> | - ] Parameters: Tag Value file - Output file name. The default is 'wfpstate.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. Remarks: Displays the current state of WFP and IPsec.
2002 Displays filters matching the specified traffic parameters.
2003 Usage: show filters [ [ file = ] <path> | - ] [ [ protocol = ] <ipproto> ] [ [ localaddr = ] <ipaddr> ] [ [ remoteaddr = ] <ipaddr> ] [ [ localport = ] <port> ] [ [ remoteport = ] <port> ] [ [ appid = ] <path> ] [ [ userid = ] <user> ] [ [ dir = ] IN | OUT ] [ [ verbose = ] ON | OFF ] Parameters: Tag Value file - Output file name. The default is 'filters.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. protocol - The IP protocol. This must be an integer. localaddr - The IP addresses. 'localaddr' is the local IP address, remoteaddr and the 'remoteaddr' is the remote IP address. The addresses are either IPv4 or IPv6. If both local and remote addressses are specified, they both must belong to the same address family. localport - The ports. 'localport' is the local port remoteport and 'remoteport' is the remote port. They must be integers. appid - The application sending or receiving the traffic on the local host. This either an NT path such as '\device\harddiskvolume1\windows\system32\ftp.exe' or a DOS path such as 'c:\Windows\System32\ftp.exe' The supplied path must exist. userid - The user sending or receiving the traffic on the local host. The userid may be a SID (such as 'S-1-5-18') or a user name (such as 'nt authority\system'). dir - The direction of the connection. By default, filters for both inbound and outbound traffic are displayed. Use IN to display only filters for inbound traffic or OUT to display only filters for outbound traffic. verbose - Determines whether to display all filters. Can be ON or OFF. The default is OFF, which attempts to suppress matching filters that are unlikely to affect connectivity. ON does not suppress any filters. Remarks: Displays filters matching the specified traffic parameters.
2004 Displays the boot-time policy and filters.
2005 Usage: show boottimepolicy [ [ file = ] <path> | - ] Parameters: Tag Value file - Output file name. The default is 'btpol.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. Remarks: Displays the boot-time policy and filters.
2008 Displays the global WFP options.
2009 Usage: show options [optionsfor = ] NETEVENTS | KEYWORDS | TXNWATCHDOG Parameters: Tag Value optionsfor - Can be either NETEVENTS, KEYWORDS, or TXNWATCHDOG. NETEVENTS shows whether network events are buffered for diagnostics. KEYWORDS shows which network events are buffered for diagnostics. TXNWATCHDOG shows the timeout in milliseconds for the transaction watchdog event. Remarks: Displays the current value set for the specified option.
2010 Displays the application ID for the specified file.
2011 Usage: show appid [ file = ] <path> Parameters: Tag Value file - Specifies the DOS path for the application. Remarks: Displays the application NT path for the specified file. The supplied path must exist.
2014 Sets the global WFP options.
2015 Usage: set options [ netevents = ON | OFF ] [ [ keywords = ] NONE | BCAST | MCAST| BCAST+MCAST ] [ [ txnwatchdog = ] <time in msec> ] Parameters: Tag Value netevents - Can be either ON or OFF. Sets the netevents option. keywords - Can be NONE, BCAST, MCAST, or BCAST+MCAST. Sets the keywords option. The default is NONE. txnwatchdog - Sets the timeout in milliseconds for the transaction watchdog event. This must be an integer. If no value is specified, the timeout is set to zero, and an event will be triggered for every transaction. Remarks: Sets the global WFP options. Only one option parameter can be set per execution.
2018 Tells whether an interactive capture session is in progress.
2019 Usage: capture status Remarks: Tells whether an interactive capture session is in progress.
2055 Displays recent network events matching the traffic parameters.
2064 Usage: show netevents [ [ file = ] <path> | - ] [ [ protocol = ] <ipproto> ] [ [ localaddr = ] <ipaddr> ] [ [ remoteaddr = ] <ipaddr> ] [ [ localport = ] <port> ] [ [ remoteport = ] <port> ] [ [ appid = ] <path> ] [ [ userid = ] <user> ] [ [ timewindow = ] <seconds> ] Parameters: Tag Value file - Output file name. The default is 'netevents.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. protocol - The IP protocol. This must be an integer. localaddr - The IP addresses. 'localaddr' is the local IP address, remoteaddr and 'remoteaddr' is the remote IP address. The addresses are either IPv4 or IPv6. If both local and remote addresses are specified, they both must belong to the same address family. localport - The ports. 'localport' is the local port, and 'remoteport' is the remote port. remoteport They must be integers. appid - The application sending or receiving the traffic on the local host. This either an NT path such as '\device\harddiskvolume1\windows\system32\ftp.exe' or a DOS path such as 'c:\Windows\System32\ftp.exe' The supplied path must exist. userid - The user sending or receiving the traffic on the local host. The userid may be a SID (such as 'S-1-5-18') or a user name (such as 'nt authority\system'). timewindow - Limits the output to network events that occurred within a specified number of seconds. This must be an integer. Remarks: Displays recent network events matching the specified traffic parameters.
2065 Displays the specified security descriptor.
2066 Usage: show security [ type = ] CALLOUT|ENGINE|FILTER|IKESADB|IPSECSADB|LAYER|NETEVENTS |PROVIDER|PROVIDERCONTEXT|SUBLAYER [ [ guid = ] <guid> Parameters: Tag Value type - Specifies the object type to be retrieved. Can be CALLOUT, ENGINE, FILTER, IKESADB, IPSECSADB, LAYER, NETEVENTS, PROVIDER, PROVIDERCONTEXT, or SUBLAYER. guid - For object types that support per-object security descriptors, this is the GUID of the object. If not specified, it defaults to IID_NULL, which retrieves the security descriptor of the type container. The following types support per-object security descriptors: callout filter layer provider providercontext sublayer Remarks: Displays the specified security descriptor.
2075 Displays system ports used by the TCP/IP Stack and the RPC sub-system.
2084 Usage: show sysports [ [ file = ] <path> | - ] Parameters: Tag Value file - Output file name. The default is 'sysports.xml'. If this parameter is set to the dash character, 'file = -', the output is written only to the console. Remarks: Displays system ports used by the TCP/IP stack and the RPC sub-system.
3000 Initializing data collection -- please wait.
3001 Only event tracing will be collected.
3002 Initialization complete. Reproduce the scenario, then run 'capture stop'.
3003 Data collection successful; output = %1!s!
3004 Data collection successful; output = %t%1 %t%2
3005 Finalizing data collection -- please wait.
3006 Success.
3007 At least one netevent was not captured during the ETW session.
4001 Unable to connect to BFE; error = %1!s!
4002 Unable to start an ETW trace session; error=%1!s!
4003 Unable to open the XML file with Write access; error=%1!s!
4004 Unable to subscribe to change notifications; error = %1!s!
4005 Unable to write output to the XML file; error = %1!s!
4006 Unable to collect run-time events; error = %1!s!
4007 Unable to format the trace file; error = %1!s!
4008 Unable to create the cabinet file.
4009 Unable to load the XML document; error = %1!s!
4010 Import file parsing terminated at line %1!u!, column %2!u!
4011 Unexpected element '%1' at line %2!u!, column %3!u!
4012 Unexpected text in element '%1' at line %2!u!, column %3!u!.
4013 Invalid text in element '%1' at line %2!u!, column %3!u!.
4014 Unable to read the boot-time policy; error = %1!s!
4015 Unable to enumerate the network events; error = %1!s!
4016 Unable to open the data collector set; error = %1!s!
4017 Unable to add an object; error = %1!s!
4018 Unable to delete an object; error = %1!s!
4019 The object is defined at line %1!u!, column %2!u!
4020 Capture is already in progress.
4021 No capture is in progress.
4022 The IKEEXT log file does not exist. Ensure that IKEEXT tracing is enabled.
4028 Unable to query lost netevents from ETW.
5000 Deletes all IPsec DoS Protection configuration.
5001 reset Deletes all IPsec DoS Protection configuration. Parameters: none
5100 Adds IPsec DoS Protection configuration.
5101 Adds IPsec DoS Protection interface configuration.
5102 add interface [name=]<string> [type=]public|internal Adds IPsec DoS Protection interface configuration. Parameters: Tag Value name - Friendly name of the interface. type - Interface type. public: Interface faces public network. internal: Interface faces internal network. Examples: add interface "Local Area Connection" public add interface name="Local Area Connection" type=public
5110 Adds IPsec DoS Protection keying module configuration.
5111 add allowedkeyingmodule [name=]ikev1|ikev2|authip [[internalprefix=]<IPv6 address>[/<integer>]] Adds IPsec DoS Protection allowed keying module configuration. Parameters: Tag Value name - Name of an IPsec keying module to allow. ikev1: The IKEv1 keying module. ikev2: The IKEv2 keying module. authip: The AuthIP keying module. internalprefix - Internal host IPv6 address or subnet for which the keying module needs to be allowed (optional). If not specified, it will be allowed for all internal IPv6 addresses. Remarks: AuthIP is present in the list of allowed keying modules by default. Examples: add allowedkeyingmodule ikev1 add allowedkeyingmodule name=ikev1 add allowedkeyingmodule ikev1 3ffe:401d:1f00:baa::1
5120 Adds IPsec DoS Protection IPv6 filter configuration.
5121 add filter [[publicprefix=]<IPv6 address>[/<integer>]] [[internalprefix=]<IPv6 address>[/<integer>]] [action=]exempt|block Adds IPsec DoS Protection IPv6 filter configuration. Parameters: Tag Value publicprefix - Public host IPv6 address or subnet (optional). If not specified, the filter will match all public IPv6 addresses. internalprefix - Internal host IPv6 address or subnet (optional). If not specified, the filter will match all internal IPv6 addresses. action - Action to take for any traffic that matches the filter. exempt: Don't require matching traffic to be IPsec protected. block: Block matching traffic. Examples: add filter publicprefix=3ffe:401d:1f00::/64 action=block
5200 Deletes IPsec DoS Protection configuration.
5201 Deletes IPsec DoS Protection interface configuration.
5202 delete interface [name=]<string> Deletes IPsec DoS Protection interface configuration. Parameters: Tag Value name - Friendly name of the interface. Examples: delete interface "Local Area Connection" delete interface name="Local Area Connection"
5210 Deletes IPsec DoS Protection allowed keying module configuration.
5211 delete allowedkeyingmodule [name=]ikev1|ikev2|authip [[internalprefix=]<IPv6 address>[/<integer>]] Deletes IPsec DoS Protection allowed keying module configuration. Parameters: Tag Value name - Name of an IPsec keying module to disallow. ikev1: The IKEv1 keying module. ikev2: The IKEv2 keying module. authip: The AuthIP keying module. internalprefix - Internal host IPv6 address or subnet for which the keying module should be disallowed (optional). If not specified, it will be disallowed for all internal IPv6 addresses. Examples: delete allowedkeyingmodule ikev1 delete allowedkeyingmodule name=ikev1 delete allowedkeyingmodule ikev1 3ffe:401d:1f00:baa::1
5220 Deletes IPsec DoS Protection IPv6 filter configuration.
5221 delete filter [[publicprefix=]<IPv6 address>[/<integer>]] [[internalprefix=]<IPv6 address>[/<integer>]] Deletes IPsec DoS Protection IPv6 filter configuration. Parameters: Tag Value publicprefix - Public host IPv6 address or subnet (optional). This must be same as the publicprefix specified with the corresponding add command. internalprefix - Internal host IPv6 address or subnet (optional). This must be same as the internalprefix specified with the corresponding add command. Examples: delete filter 3ffe:401d:1f00::/64 delete filter publicprefix=3ffe:401d:1f00::/64
5300 Sets IPsec DoS Protection information.
5301 Sets IPsec DoS Protection DSCP marking configuration.
5302 set dscp [type=]ipsecauthenticated|ipsecunauthenticated|icmpv6|filtered|default [value=]<integer>|disable Sets IPsec DoS Protection DSCP marking configuration. Parameters: Tag Value type - Type of inbound traffic for which the DSCP marking is being specified. ipsecauthenticated: Authenticated IPv6 IPsec traffic. ipsecunauthenticated: Unauthenticated IPv6 IPsec traffic. icmpv6: ICMPv6 traffic. filtered: Filter exempted IPv6 traffic. default: Default-block exempted traffic. value - DCSP value to mark in the top 6 bits of the traffic class or TOS field in the IP header of corresponding traffic. <integer>: Must be <= 63. disable: Disable this marking. Remarks: By default DSCP marking for all traffic types is disabled. Examples: set dscp ipsecunauthenticated 10 set dscp type=ipsecunauthenticated value=10 set dscp ipsecauthenticated DISABLE
5310 Sets IPsec DoS Protection miscellaneous configuration.
5311 set miscellaneous [[stateidletimeout=]<integer>] [[peripratelimitidletimeout=]<integer>] [[maxentries=]<integer>] [[maxperipratelimitqueues=]<integer>] [[defaultblock=]enable|disable] Sets IPsec DoS Protection miscellaneous configuration. Parameters: Tag Value stateidletimeout - State inactivity timeout in seconds (optional). <integer>: Must be > 0 and <= 4294967295. Default value is 360. peripratelimitidletimeout - Per internal IP address rate limit queue inactivity timeout in seconds (optional). <integer>: Must be > 0 and <= 4294967295. Default value is 360. maxentries - Maximum number of state entries (optional). <integer>: Must be > 0 and <= 4294967295. Default value is 75000. maxperipratelimitqueues - Maximum number of per internal IP address rate limit queues (optional). <integer>: Must be > 0 and <= 4294967295. Default value is 50000. defaultblock - Value of the default block setting (optional). enable: IPsec DoS Protection will drop all IPv4 traffic & all non-IPsec IPv6 traffic that is forwarded between a public interface and an internal interface, except ICMPv6 (default). disable: IPsec DoS Protection will permit all IPv4 traffic & all non-IPsec IPv6 traffic that is forwarded between a public interface and an internal interface. Examples: set miscellaneous 480 100000 set miscellaneous stateidletimeout=480 maxentries=100000 set miscellaneous defaultblock=disable
5320 Sets IPsec DoS Protection rate limit configuration.
5321 set ratelimit [type=]ipsecauthenticated|ipsecunauthenticated|ipsecunauthenticatedperip| icmpv6|filtered|default [value=]<integer>|disable Sets IPsec DoS Protection rate limit configuration. Parameters: Tag Value type - Type of inbound traffic for which the rate limit is being specified. ipsecauthenticated: Authenticated IPv6 IPsec traffic. Rate limit disabled by default. ipsecunauthenticated: Unauthenticated IPv6 IPsec traffic. Default rate limit is 102400 bytes/sec. ipsecunauthenticatedperip: Per internal IP address rate limit for unauthenticated IPv6 IPsec traffic. Default rate limit is 10240 bytes/sec. icmpv6: ICMPv6 traffic. Default rate limit for this traffic type is 10240 bytes/sec. filtered: Filter exempted IPv6 traffic. Default rate limit is 102400 bytes/sec. default: Default-block exempted traffic. Default rate limit is 102400 bytes/sec. value - Value of the rate limit in bytes/sec. <integer>: Must be > 0 and <= 4294967295. disable: Disable this rate limit. Examples: set ratelimit ipsecunauthenticated 2048 set ratelimit type=ipsecunauthenticated value=2048 set ratelimit filtered disable
5400 Displays IPsec DoS Protection information.
5401 Displays IPsec DoS Protection interface configuration.
5402 show interface [[type=]public|internal] Displays IPsec DoS Protection interface configuration. Parameters: Tag Value type - Interface type (optional). public: Show interfaces facing public network. internal: Show interfaces facing internal network. Examples: show interface show interface public show interface type=public
5403 Public interfaces:
5404 Internal interfaces:
5410 Displays IPsec DoS Protection keying module configuration.
5411 show allowedkeyingmodule Displays IPsec DoS Protection allowed keying module configuration. Parameters: none
5412 Allowed keying modules (internalprefix - keying module list):
5420 Displays IPsec DoS Protection DSCP marking configuration.
5421 show dscp [[type=]ipsecauthenticated|ipsecunauthenticated|icmpv6|filtered|default] Displays IPsec DoS Protection DSCP marking configuration. Parameters: Tag Value type - Type of inbound traffic for which the DSCP marking should be displayed (optional). If not specified, all types will be displayed. ipsecauthenticated: Authenticated IPv6 IPsec traffic. ipsecunauthenticated: Unauthenticated IPv6 IPsec traffic. icmpv6: ICMPv6 traffic. filtered: Filter exempted IPv6 traffic. default: Default-block exempted traffic. Examples: show dscp show dscp ipsecunauthenticated show dscp type=ipsecunauthenticated
5422 Authenticated IPv6 IPsec dscp: %1!s!
5423 Unauthenticated IPv6 IPsec dscp: %1!s!
5424 ICMPv6 dscp: %1!s!
5425 IPv6 filter exempted dscp: %1!s!
5426 Default-block exempted dscp: %1!s!
5430 Displays IPsec DoS Protection miscellaneous configuration.
5431 show miscellaneous Displays IPsec DoS Protection miscellaneous configuration. Parameters: none
5432 State idle timeout (seconds): %1!u!
5433 Per IP address rate limit queue idle timeout (seconds): %1!u!
5434 Maximum number of state entries: %1!u!
5435 Maximum number of per IP address rate limit queues: %1!u!
5436 Default block: %1!s!
5440 Displays IPsec DoS Protection rate limit configuration.
5441 show ratelimit [[type=]ipsecauthenticated|ipsecunauthenticated|ipsecunauthenticatedperip| icmpv6|filtered|default] Displays IPsec DoS Protection rate limit configuration. Parameters: Tag Value type - Type of traffic for which the rate limit should be displayed (optional). If not specified, all types will be displayed. ipsecauthenticated: Authenticated IPv6 IPsec traffic. ipsecunauthenticated: Unauthenticated IPv6 IPsec traffic. ipsecunauthenticatedperip: Per internal IP address rate limit for unauthenticated IPv6 IPsec traffic. icmpv6: ICMPv6 traffic. filtered: Filter exempted IPv6 traffic. default: Default-block exempted traffic. Examples: show ratelimit show ratelimit ipsecunauthenticated show ratelimit type=ipsecunauthenticated
5442 Authenticated IPv6 IPsec rate limit (bytes/sec): %1!s!
5443 Unauthenticated IPv6 IPsec rate limit (bytes/sec): %1!s!
5444 Unauthenticated IPv6 IPsec per IP address rate limit (bytes/sec): %1!s!
5445 ICMPv6 rate limit (bytes/sec): %1!s!
5446 IPv6 filter exempted rate limit (bytes/sec): %1!s!
5447 Default-block exempted rate limit (bytes/sec): %1!s!
5450 Displays IPsec DoS Protection state entries.
5451 show state [[publicprefix=]<IPv6 address>[/<integer>]] [[internalprefix=]<IPv6 address>[/<integer>]] Displays all state entries inside IPsec DoS Protection that match specified criteria. Parameters: Tag Value publicprefix - Public host IPv6 address or subnet (optional). If not specified, all public IPv6 addresses will be matched. internalprefix - Internal host IPv6 address or subnet (optional). If not specified, all internal IPv6 addresses will be matched. Examples: Show state Show state publicprefix=3ffe::/16 Show state internalprefix=3ffe:401d:1f00:baa::1
5452 IPsec DoS Protection state entries (There are %1!u! entries) ----------------------------------------------------------------------------
5453 Public host IPv6 address: %1!s!
5454 Internal host IPv6 address: %1!s!
5455 Total inbound IPv6 IPsec packets allowed on this state: %1!I64u!
5456 Total outbound IPv6 IPsec packets allowed on this state: %1!I64u!
5457 Time elapsed since state creation (seconds): %1!u!
5460 Displays IPsec DoS Protection statistics.
5461 show statistics Displays IPsec DoS Protection statistics. Parameters: none
5462 Total state entries created: %1!I64u!
5463 Current state entries: %1!I64u!
5464 Current per IP address rate limit queues: %1!I64u!
5465 Total inbound allowed unauthenticated IPv6 IPsec packets: %1!I64u!
5466 Total inbound unauthenticated IPv6 IPsec packets discarded due to rate limit: %1!I64u!
5467 Total inbound unauthenticated IPv6 IPsec packets discarded due to per IP address rate limit: %1!I64u!
5468 Total inbound unauthenticated IPv6 IPsec packets discarded due to other reasons: %1!I64u!
5469 Total inbound allowed authenticated IPv6 IPsec packets: %1!I64u!
5470 Total inbound authenticated IPv6 IPsec packets discarded due to rate limit: %1!I64u!
5471 Total inbound authenticated IPv6 IPsec packets discarded due to other reasons: %1!I64u!
5472 Total inbound allowed ICMPv6 packets: %1!I64u!
5473 Total inbound ICMPv6 packets discarded due to rate limit: %1!I64u!
5474 Total inbound allowed filter exempted IPv6 packets: %1!I64u!
5475 Total inbound filter exempted IPv6 packets discarded due to rate limit: %1!I64u!
5476 Total inbound filter blocked IPv6 packets: %1!I64u!
5477 Total inbound allowed default-block exempted packets: %1!I64u!
5478 Total inbound default-block exempted packets discarded due to rate limit: %1!I64u!
5479 Total inbound default-block discarded packets: %1!I64u!
5480 Displays IPsec DoS Protection IPv6 filter configuration.
5481 show filter Displays IPsec DoS Protection IPv6 filter configuration. Parameters: none
5482 IPv6 filters (publicprefix <-> internalprefix - action):
5490 Displays IPsec DoS Protection configuration, statistics and state entries.
5491 show all Displays IPsec DoS Protection configuration, statistics and state entries. Parameters: none
5492 IPsec DoS Protection configuration parameters ----------------------------------------------------------------------------
5493 IPsec DoS Protection statistics ----------------------------------------------------------------------------
5500 <empty>
 

COM Classes/Interfaces

There is no type library in this file with COM classes/interfaces information

 

Exported Functions List

The following functions are exported by this dll:
IdpConfigAddPolicy IdpConfigAllocateAndGetPolicy IdpConfigFreePolicy IdpConfigInitDefaultPolicy
IdpConfigRemovePolicy InitHelperDll WfpCaptureExportedW WfpCaptureStop

 

Imported Functions List

The following functions are imported by this dll: