Main Page Windows 7 DLLs NirSoft Utilities
Windows 10 DLL File Information - FirewallAPI.dll

The following DLL report was generated by automatic DLL script that scanned and loaded all DLL files in the system32 directory of Windows 10, extracted the information from them, and then saved it into HTML reports. If you want to view a report of another DLL, go to the main page of this Web site.

 

General Information

File Description: Windows Firewall API  
File Version: 10.0.10130.0 (fbl_impressive.150522-2224)  
Company: Microsoft Corporation  
Product Name: Microsoft® Windows® Operating System  
DLL popularity Medium - 20 other DLL files in system32 directory are statically linked to this file.
File Size: 351 KB
Total Number of Exported Functions: 196
Total Number of Exported Functions With Names: 196
 

Section Headers

Name Virtual Address Raw Data Size % of File Characteristics Section Contains...
.text 0x00001000 301,568 Bytes 83.9% Read, Execute Code
.data 0x0004b000 1,536 Bytes 0.4% Write, Read Initialized Data
.idata 0x0004c000 6,656 Bytes 1.9% Read Initialized Data
.didat 0x0004e000 1,024 Bytes 0.3% Write, Read Initialized Data
.rsrc 0x0004f000 26,112 Bytes 7.3% Read Initialized Data
.reloc 0x00056000 21,504 Bytes 6.0% Read, Discardable Initialized Data
 

Static Linking

FirewallAPI.dll is statically linked to the following files:

msvcrt.dll
ntdll.dll
RPCRT4.dll
api-ms-win-core-com-midlproxystub-l1-1-0.dll
api-ms-win-core-synch-l1-2-0.dll
api-ms-win-core-libraryloader-l1-2-0.dll
api-ms-win-core-string-l2-1-0.dll
api-ms-win-core-errorhandling-l1-1-1.dll
api-ms-win-core-registry-l1-1-0.dll
api-ms-win-core-sysinfo-l1-2-1.dll
api-ms-win-core-memory-l1-1-2.dll
api-ms-win-core-string-l1-1-0.dll
api-ms-win-core-heap-l1-2-0.dll
api-ms-win-security-base-l1-2-0.dll
api-ms-win-core-version-l1-1-0.dll
api-ms-win-core-heap-l2-1-0.dll
api-ms-win-core-localization-l1-2-1.dll
api-ms-win-core-processthreads-l1-1-2.dll
api-ms-win-core-threadpool-l1-2-0.dll
api-ms-win-core-debug-l1-1-1.dll
api-ms-win-core-profile-l1-1-0.dll
api-ms-win-core-string-obsolete-l1-1-0.dll
api-ms-win-core-delayload-l1-1-1.dll

This means that when FirewallAPI.dll is loaded, the above files are automatically loaded too. If one of these files is corrupted or missing, FirewallAPI.dll won't be loaded.

 

General Resources Information

Resource Type Number of Items Total Size % of File
Icons 0 0 Bytes 0.0%
Animated Icons 0 0 Bytes 0.0%
Cursors 0 0 Bytes 0.0%
Animated Cursors 0 0 Bytes 0.0%
Bitmaps 0 0 Bytes 0.0%
AVI Files 0 0 Bytes 0.0%
Dialog-Boxes 0 0 Bytes 0.0%
HTML Related Files 0 0 Bytes 0.0%
Menus 0 0 Bytes 0.0%
Strings 1,015 135,318 Bytes 37.6%
Type Libraries 1 21,004 Bytes 5.8%
Manifest 0 0 Bytes 0.0%
All Others 3 4,515 Bytes 1.3%
Total 1,019 160,837 Bytes 44.7%
 

Icons in this file

No icons found in this file

 

Cursors in this file

No cursors found in this file

 

Dialog-boxes list (up to 1000 dialogs)

No dialog resources in this file.

 

String resources in this dll (up to 1000 strings)

String ID String Text
1657 Firewall log files (*.log)
1658 Browse
1675 The value entered for the log file size is not valid. Enter a value between 1 and 32767 k.
23000 File and Printer Sharing
23001 NetBIOS Name Service
23002 NetBIOS Datagram Service
23004 NetBIOS Session Service
23005 SMB over TCP
23006 UPnP Framework
23007 SSDP Component of UPnP Framework
23008 UPnP Framework over TCP
23009 Remote Desktop
23012 Domain Name Server (DNS)
23013 Dynamic Host Configuration Protocol Server (DHCP)
23014 Dynamic Host Configuration Protocol Client (DHCP)
23015 Incoming Connection VPN (PPTP)
23016 Incoming Connection VPN (L2TP)
23017 IP Security (IPsec - IKE)
23018 IP Security (IPsec - IKE/NAT-T)
23038 Phase 1: Local address = %s, Remote address = %s
23039 Phase 2: Local address = %s, Remote address = %s
23040 , Protocol = 0x%x
23041 , Protocol = Any
23042 , Local port = 0x%x
23043 , Local port = Any
23044 , Remote port = 0x%x
23045 , Remote port = Any
23090 Windows Firewall
23091 Windows Firewall helps protect your computer by preventing unauthorized users from gaining access to your computer through the Internet or a network.
23092 Windows Firewall Authorization Driver
23093 Windows Firewall Authorization Driver is a kernel mode driver that provides deep inspection services on inbound and outbound network traffic.
23094 Allow authenticated IPsec bypass
23095 Allows specific computers to have unrestricted, but authenticated, access to the computer.
23102 Enabled
23103 Disabled
23104 Group Policy
23105 Local Policy
23106 Group and Local Policy
23107 Domain
23108 Private
23109 All interfaces
23112 Don't allow exceptions
23113 All subnets
23114 Local subnet only
23115 Custom subnets
23117 Remove
23118 Modify
23119 Allow outgoing destination unreachable
23120 Allow outgoing source quench
23121 Allow redirect
23122 Allow incoming echo request
23123 Allow incoming router request
23124 Allow outgoing time exceeded
23125 Allow outgoing parameter problem
23126 Allow incoming timestamp request
23127 Allow incoming mask request
23128 Allow outgoing packet too big
23129 The rule was parsed successfully from the store.
23130 The rule is from a later version of the service. Some fields were not understood and have been ignored. This may cause the rule to be less restrictive than on the version where it was created. To mitigate any risk from this fallback behavior, ensure that the original rule is as specific as possible. To avoid this fallback behavior, create version-specific GPO's, or apply a Platform condition to the rule.
23131 The rule is from a newer schema version than the service, and the unknown fields could not be ignored. The whole rule was ignored.
23132 The name contains invalid characters, or is an invalid length.
23133 The description contains invalid characters, or is an invalid length.
23134 The application contains invalid characters, or is an invalid length.
23135 The service contains invalid characters, or is an invalid length.
23136 The authorized remote machines list contains invalid characters, or is an invalid length.
23137 The authorized remote users list contains invalid characters, or is an invalid length.
23138 The group (sometimes called the embedded context) contains invalid characters, or is an invalid length.
23139 The service was unable to parse the rule.
23140 An invalid port range was specified, or 0 was used as a port number.
23141 Some of the keywords specified on the remote address are only valid on the local address.
23142 Number of interfaces and interface buffer don't match.
23143 The interface type is invalid.
23144 The action is invalid.
23145 The direction is invalid.
23146 The protocol-specific options do not match the protocol that was chosen.
23147 The rule was parsed successfully, but there was an unknown semantic error when processing the rule.
23148 An error occurred.
23149 Enable Windows Firewall
23150 Disable Stealth Mode
23151 Windows Firewall Shielded Mode
23152 Disable Unicast Responses to Multicast
23153 Log Dropped Packets
23154 Log Successful Connections
23155 Log Ignored Rules
23156 Maximum Log File Size
23157 Log File Path
23158 Disable Inbound Notifications
23159 Allow User preferred merge of Authorized Applications
23160 Allow User preferred merge of Globally open ports
23161 Allow Local Policy Merge
23162 Allow Local IPsec Policy Merge
23163 Disabled Interfaces
23164 Default Outbound Action
23165 Default Inbound Action
23166 Current Profile
23167 Disable Stateful FTP
23168 Ignored Disable Stateful PPTP
23169 IPsec SA Idle time
23170 IPsec preshared key encoding
23171 IPsec Exempt
23172 IPsec CRL Check
23173 <All>
23174 Allow
23175 Block
23176 The rule ID contains invalid characters, or is an invalid length.
23177 The phase 1 auth set ID contains invalid characters, or is an invalid length.
23178 The quick mode crypto set ID contains invalid characters, or is an invalid length.
23179 The main mode crypto set ID contains invalid characters, or is an invalid length.
23180 The application name could not be resolved.
23181 The Rule ID was not specified.
23182 Mismatch in number of ports and ports buffer.
23183 One of the port keywords is invalid.
23184 Mismatch in number of V4 address subnets and subnets buffer.
23185 Mismatch in number of V6 address subnets and subnets buffer.
23186 Mismatch in number of V4 address ranges and ranges buffer.
23187 Mismatch in number of V6 address ranges and ranges buffer.
23188 The address range is invalid. The end address is less than the beginning address.
23189 One or more of the subnet masks is invalid.
23190 One or more of the address prefixes is invalid.
23191 One or more of the address keywords are invalid.
23192 Some of the keywords specified on the local address are only valid on the remote address.
23193 Mismatch in number of ICMP and ICMP buffer.
23194 Invalid ICMP code specified.
23195 Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (inbound, authenticate/encrypt flags set, remote machine auth list specified)
23196 The protocol number is invalid.
23197 Invalid flags specified.
23198 Autogenerate flag is set but Authenticate / Authenticate-encrypt flags are not set.
23199 Autogenerate flag is set but the action is block.
23200 Autogenerate flag is set along with Dynamic RPC flag.
23201 The Authentication and Authentication & Encryption flags cannot be used together.
23202 Authorization lists can only be used if authentication is required on the rule.
23203 Number of valid OS Platforms and the list of valid OS Platforms don't match
23204 The phase 1 auth set ID must be specified.
23205 The quick mode crypto set ID must be specified.
23206 The Set ID was not specified.
23207 The IPsec phase is invalid.
23208 No suites specified in the set.
23209 One of the phase 1 auth methods is invalid.
23210 One of the phase 2 auth methods is invalid.
23211 Anonymous cannot be the only authentication method.
23212 Invalid auth suite flags specified.
23213 Machine certificates can only be used in phase 2 auth if they are machine health certificates.
23214 Machine Preshared Key was selected as an authentication type, but no key string was specified.
23215 The certificate authority name is required, and must be formatted as an X.509 distinguished name.
23216 Both machine and user auth cannot be proposed within the same authentication set.
23217 The main mode crypto set ID must be specified.
23218 The phase 1 crypto set flags are invalid.
23219 The main mode lifetime, in minutes, is invalid.
23220 The main mode lifetime, in sessions, is invalid.
23221 One of the main mode key exchange algorithms is invalid.
23222 One of the main mode encryption algorithms is invalid.
23223 One of the main mode hash algorithms is invalid.
23224 One of the quick mode key exchange algorithms is invalid.
23225 One of the quick mode encapsulation types is invalid.
23226 One of the quick mode encryption algorithms is invalid.
23227 One of the quick mode hash algorithms is invalid.
23228 The quick mode lifetime, in minutes, is invalid.
23229 The quick mode lifetime, in kilobytes, is invalid.
23230 Remote user authorization can only be applied to inbound rules.
23231 An unspecified, multicast, broadcast, or loopback IPv6 address was specified.
23232 If the action is Do Not Secure, the auth and crypto sets must be null.
23233 Either Encryption or Hash must be specified.
23234 Block action was specified in conjunction with require security or require encryption.
23235 The phase 1 authentication set was not found.
23236 The phase 2 authentication set was not found.
23237 The quick mode cryptographic set was not found.
23238 A conflict was detected between the phase 1 and phase 2 authentication sets. When preshared keys are used in phase 1, there cannot be a phase 2 authentication set.
23239 A local address cannot be used in conjunction with an interface or interface type condition.
23240 Program Name
23241 Interfaces
23242 Local Addresses
23243 Remote Addresses
23244 Local Port
23245 Remote Port
23246 EndPoint 1 Addresses
23247 EndPoint 2 Addresses
23248 Endpoint 1 Port
23249 Endpoint 2 Port
23250 Not Configured
23251 The profile type is invalid.
23252 Public
23253 An unspecified, multicast, broadcast, or loopback IPv4 address was specified.
23254 Machine health certificates and regular certificates cannot both be proposed within the same authentication set.
23255 None
23256 Endpoint 'any' cannot be specified for a tunnel-mode rule.
23257 IPsec Through NAT
23258 Policy Version
23259 The target schema version specified is not supported.
23260 The same authentication method cannot be used more than once within a set.
23261 This error value is not used.
23262 The target schema version does not support port ranges.
23263 The Authentication (Dynamic Encryption) flag cannot be used when direction is Outbound.
23264 When the Authentication (Dynamic Encryption) flag is set, the Authentication & Encryption flag must be set as well.
23265 The target schema version does not support Authentication (Dynamic Encryption).
23266 The target schema version does not support outbound Allow-Bypass rules.
23267 Allow-Bypass action specified, but the rule does not meet allow-bypass criteria (authenticate/encrypt flags set)
23268 Defer to user' setting can only be used in a firewall rule where program path and TCP/UDP protocol are specified with no additional conditions.
23269 Port ranges are only allowed in connection security rules when the action is Do Not Secure.
23270 The target schema version does not support the platform operator specified.
23271 The DTM flag requires at least one dynamic endpoint.
23272 A dynamic tunnel-mode exemption rule cannot have tunnel endpoints.
23273 The target schema version does not support tunnel-mode exemptions.
23274 Authentication mode,"Require inbound and clear outbound" can only be set when using IPsec tunneling.
23275 Bypass Tunnel If Secure may not be set on Transport-Mode rules.
23276 One of the platform operators is invalid.
23277 %s unregistered from Windows Firewall.
23278 %s unregistered from Windows Firewall. Windows Firewall is now controlling the filtering for %s.
23279 FirewallRuleCategory
23280 ConSecRuleCategory
23281 StealthRuleCategory
23282 BootTimeRuleCategory
23284 Authentication (No Encapsulation) cannot be specified on a tunnel-mode rule.
23285 Authentication (No Encapsulation) cannot be specified on a rule that uses a preshared key.
23286 The target schema version does not support certificate criteria.
23287 Certificate criteria version does not match schema version.
23288 The certificate criteria are invalid. A thumbprint hash must be specified when FollowRenewal is used.
23289 The certificate criteria are invalid. The thumbprint hash is invalid.
23290 The certificate criteria are invalid. One or more of the EKU's are invalid.
23291 The certificate criteria are invalid. The name type is invalid.
23292 The certificate criteria are invalid. The subject name is not valid.
23293 The certificate criteria are invalid. The criteria type flags are invalid.
23294 The certificate criteria are invalid. You need to specify at least one set of validation criteria and one set of selection criteria for each set of certificate proposal with the same signing method.
23295 The local user authorization list contains invalid characters, or is an invalid length.
23296 The authorized local user list may not be used in conjunction with a service SID.
23297 The target schema version does not support the authorized local user list.
23298 Disable Stealth Mode IPsec Secured Packet Exemption
23299 The Kerberos proxy name must be a fully qualified domain name (FQDN). For example: kerbproxy.contoso.com
23300 IPsec Policy Agent service hardening - LDAP/TCP
23301 Allow IPsec Policy Agent outbound LDAP/TCP traffic to Active Directory
23302 IPsec Policy Agent service hardening - LDAP/UDP
23303 Allow IPsec Policy Agent outbound LDAP/UDP traffic to Active Directory
23304 IPsec Policy Agent service hardening - Block any other traffic to IPsec Policy Agent
23305 IPsec Policy Agent service hardening - Block any other traffic from IPsec Policy Agent
23306 MpsSvc service hardening - Block any other traffic to MpsSvc
23307 MpsSvc service hardening - Block any other traffic from MpsSvc
23308 Inbound service restriction rule for %1!s!
23309 Block all inbound traffic to service %1!s!
23310 Outbound service restriction rule for %1!s!
23311 Block all outbound traffic from service %1!s!
23312 IPsec Policy Agent service hardening - Remote Management
23313 Allow IPsec Policy Agent inbound RPC/TCP traffic for Remote Management
23400 The remote endpoints are invalid.
23401 The remote endpoint FQDN is invalid.
23402 The choice of key modules is invalid.
23403 The forward path SA lifetime is invalid.
23404 The target schema version does not support custom key module preferences.
23405 The target schema version does not support transport rule machine authorization lists.
23406 The target schema version does not support transport rule user authorization lists.
23407 Transport machine authorization SDDL specified on tunnel-mode rule.
23408 Transport user authorization SDDL specified on tunnel-mode rule.
23409 The Apply Global Authorization flag cannot be used when a per-rule authorization list is also specified.
23410 The transport rule machine SDDL is not valid.
23411 The transport rule user SDDL is not valid.
23412 This error value is not used.
23413 The phase 2 auth set ID contains invalid characters, or is an invalid length.
23414 The target schema version does not support dynamic endpoints.
23415 When specifying tunnel endpoints in both IPv4 and IPv6, a tunnel endpoint may not be dynamic for one address family and explicit for the other. (A dynamic tunnel endpoint is one set to "Any".)
23416 The edge traversal flags are inconsistent. Defer To App must be set without Edge Traversal, but Defer To User must be set with Edge Traversal.
23417 The target schema version does not support Authentication (No Encapsulation).
23418 When the Authentication (No Encapsulation) flag is set, the Authentication flag must be set as well.
23419 The target schema version does not support tunnel authentication modes.
23420 The target schema version does not support tunnel authentication modes.
23421 The target schema version does not support the IP_HTTPS keyword.
23422 The target schema version does not support the IP_TLS keyword.
23423 The target schema version does not support dynamic edge traversal.
23424 The local user owner SID is invalid.
23425 The target schema version does not support the local user owner field.
23426 The target schema version does not support profile crossing.
23427 The target schema version does not support one or more of the address keywords given.
23428 The application package SID is invalid.
23429 The target schema version does not support application package SIDs.
23430 Logical endpoints (trust tuples) cannot be combined with specific addresses or ports.
23431 One or more of the logical endpoints (trust tuples) are invalid.
23432 The target schema version does not support logical endpoints (trust tuples).
23433 The target schema version does not support the Key Manager Dictation flag.
23434 The target schema version does not support the Key Manager Notification flag.
23435 The target schema version does not support one or more of the authentication methods given.
23436 The target schema version does not support the requested certificate signing algorithm.
23437 The target schema version does not support targeting Intermediate CA's.
23438 When specifying multiple certificate authentication proposals, all the certificate proposals with the same signing method must must be grouped together within the set.
23439 The target schema version does not support kerberos proxy servers.
23440 The main mode crypto set ID should be the global main mode crypto set ID.
23441 The target schema version does not support one of the main mode encryption algorithms chosen.
23442 The target schema version does not support one of the main mode hash algorithms chosen.
23443 The target schema version does not support one of the main mode key exchange algorithms chosen.
23444 The target schema version does not support one of the quick mode encryption algorithms chosen.
23445 The target schema version does not support one of the quick mode hash algorithms chosen.
23446 The target schema version does not support one of the quick mode key exchange algorithms chosen.
23447 The encryption and hash algorithms specified are incompatible.
23448 Malformed query: Mismatch in the number of ORed terms and the terms array
23449 Malformed query: Mismatch in the number of ANDed conditions and conditions array
23450 Malformed query: Invalid confition match key
23451 Malformed query: Invalid condition match type
23452 Malformed query: Invalid condition data type
23453 Malformed query: Invalid key and data type combination
23454 Malformed query: Protocol condition present without a protocol condition
23455 Malformed query: Profile Key unavailable for this object type queried
23456 Malformed query: Status Key unavailable for this object type queried
23457 Malformed query: FilterID Key unavailable for this object type queried
23458 Malformed query: Application Key unavailable for this object type queried
23459 Malformed query: Protocol Key unavailable for this object type queried
23460 Malformed query: Local Port Key unavailable for this object type queried
23461 Malformed query: Remote Port Key unavailable for this object type queried
23462 Malformed query: Service Name Key unavailable for this object type queried
23463 Authentication (No Encapsulation) may not be used on tunnel-mode rules.
23464 Authentication (No Encapsulation) may not be used on rules that contain preshared keys.
23465 A runtime error occurred while trying to enforce the rule.
23466 The main mode cryptographic set was not found.
23467 The target schema version does not support local only mapping.
23468 The key module in the rule is incompatible with the authentication methods specified in the associated authentication sets.
23469 The target schema version does not support Security Realm flag.
23470 Firewall Rules with security realm Id field would require authentication and encryption, and action should be Allow.
23471 A string for the security realm Id is invalid.
23472 The target schema version does not support security realm Id.
23500 mpssvc
23501 Microsoft Corporation
23502 Microsoft Windows Firewall Provider
23503 Windows Firewall Static Session
23504 Windows Firewall Dynamic Session
23505 Boot Time Filter
23506 This filter is in effect before the service starts.
23507 Logging Filter
23508 This filter implements logging, if configured.
23509 Port Scanning Prevention Filter
23510 This filter prevents port scanning. This many times means there are no listeners. If debugging ensure your scenario has one.
23511 Loopback Permit Filter
23512 This filter permits loopback traffic.
23513 Secondary Connections Filter
23514 This filter permits secondary connections for FTP protocols.
23515 Deep Protocol Inspection Filter
23516 This filter implements deep inspection for FTP protocols.
23517 FTP Inspection Filter
23518 This filter enables inspection of FTP.
23521 Microsoft Corporation
23522 Microsoft Windows Firewall IPsec Provider
23523 State Management Filter
23524 Indicates different options to WFP to allow customization of state creation.
23525 State Management Provider Context
23526 Contains State Management Options
23527 Security Realm Id Provider Context
23528 Contains Security Realm Id
23529 Interface to Bind Provider Context
23530 Contains The Interface Id to Bind to
23831 UPnP Framework (TCP-In)
23832 Inbound rule for UPnP Framework traffic [TCP]
23833 UPnP Framework (TCP-Out)
23834 Outbound rule for UPnP Framework traffic [TCP]
23835 UPnP Framework (UDP-In)
23836 Inbound rule for UPnP Framework traffic [UDP]
23837 UPnP Framework (UDP-Out)
23838 Outbound rule for UPnP Framework traffic [UDP]
24000 Windows Firewall with Advanced Security
24001 Configure policies that provide enhanced network security for Windows computers.
25000 Core Networking
25001 Core Networking - Packet Too Big (ICMPv6-In)
25002 Core Networking - Packet Too Big (ICMPv6-Out)
25007 Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link.
25008 Core Networking - Router Solicitation (ICMPv6-Out)
25009 Core Networking - Router Solicitation (ICMPv6-In)
25011 Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration.
25012 Core Networking - Router Advertisement (ICMPv6-In)
25013 Core Networking - Router Advertisement (ICMPv6-Out)
25018 Router Advertisement messages are sent by routers to other nodes for stateless auto-configuration.
25019 Core Networking - Neighbor Discovery Solicitation (ICMPv6-In)
25020 Core Networking - Neighbor Discovery Solicitation (ICMPv6-Out)
25025 Neighbor Discovery Solicitations are sent by nodes to discover the link-layer address of another on-link IPv6 node.
25026 Core Networking - Neighbor Discovery Advertisement (ICMPv6-In)
25027 Core Networking - Neighbor Discovery Advertisement (ICMPv6-Out)
25032 Neighbor Discovery Advertisement messages are sent by nodes to notify other nodes of link-layer address changes or in response to a Neighbor Discovery Solicitation request.
25033 Core Networking - Inverse Neighbor Discovery Solicitation (ICMPv6-In)
25034 Core Networking - Inverse Neighbor Discovery Solicitation (ICMPv6-Out)
25039 Inverse Neighbor Discovery Solicitations are sent by nodes to discover the IP address of another IPv6 node given its link-layer address.
25040 Core Networking - Inverse Neighbor Discovery Advertisement (ICMPv6-In)
25041 Core Networking - Inverse Neighbor Discovery Advertisement (ICMPv6-Out)
25046 Inverse Neighbor Discovery Solicitations are sent by nodes to notify other nodes of IP address changes or in response to an Inverse Neighbor Discovery Solicitation request.
25047 Core Networking - Certificate Path Solicitation (ICMPv6-In)
25048 Core Networking - Certificate Path Solicitation (ICMPv6-Out)
25053 SEND - Secure Neighbor Discovery - Certificate Path Solicitation is a secure version of Neighbor Discovery Solicitation.
25054 Core Networking - Certificate Path Advertisement (ICMPv6-In)
25055 Core Networking - Certificate Path Advertisement (ICMPv6-Out)
25060 SEND - Secure Neighbor Discovery - Certificate Path Advertisement is a secure version of Neighbor Discovery Advertisement.
25061 Core Networking - Multicast Listener Query (ICMPv6-In)
25062 Core Networking - Multicast Listener Query (ICMPv6-Out)
25067 An IPv6 multicast-capable router uses the Multicast Listener Query message to query a link for multicast group membership.
25068 Core Networking - Multicast Listener Report (ICMPv6-In)
25069 Core Networking - Multicast Listener Report (ICMPv6-Out)
25074 The Multicast Listener Report message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query.
25075 Core Networking - Multicast Listener Report v2 (ICMPv6-In)
25076 Core Networking - Multicast Listener Report v2 (ICMPv6-Out)
25081 Multicast Listener Report v2 message is used by a listening node to either immediately report its interest in receiving multicast traffic at a specific multicast address or in response to a Multicast Listener Query.
25082 Core Networking - Multicast Listener Done (ICMPv6-In)
25083 Core Networking - Multicast Listener Done (ICMPv6-Out)
25088 Multicast Listener Done messages inform local routers that there are no longer any members remaining for a specific multicast address on the subnet.
25089 Core Networking - Multicast Router Advertisement (ICMPv6-In)
25090 Core Networking - Multicast Router Advertisement (ICMPv6-Out)
25095 Multicast Router Advertisement messages are sent by routers to advertise that IP multicast forwarding is enabled.
25096 Core Networking - Multicast Router Solicitation (ICMPv6-In)
25097 Core Networking - Multicast Router Solicitation (ICMPv6-Out)
25102 Multicast Router Solicitation messages are sent in order to discover routers with IP multicast forwarding enabled.
25103 Core Networking - Multicast Router Termination (ICMPv6-In)
25104 Core Networking - Multicast Router Termination (ICMPv6-Out)
25109 Multicast Router Termination messages are sent when a router stops IP multicast routing functions on an interface.
25110 Core Networking - Destination Unreachable (ICMPv6-In)
25111 Core Networking - Destination Unreachable (ICMPv6-Out)
25112 Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion.
25113 Core Networking - Time Exceeded (ICMPv6-In)
25114 Core Networking - Time Exceeded (ICMPv6-Out)
25115 Time Exceeded error messages are generated from any node that a packet traverses if the Hop Limit value is decremented to zero at any point on the path.
25116 Core Networking - Parameter Problem (ICMPv6-In)
25117 Core Networking - Parameter Problem (ICMPv6-Out)
25118 Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets.
25251 Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-In)
25252 Core Networking - Destination Unreachable Fragmentation Needed (ICMPv4-Out)
25257 Destination Unreachable Fragmentation Needed error messages are sent from any node that a packet traverses which is unable to forward the packet because fragmentation was needed and the don’t fragment bit was set.
25301 Core Networking - Dynamic Host Configuration Protocol (DHCP-In)
25302 Core Networking - Dynamic Host Configuration Protocol (DHCP-Out)
25303 Allows DHCP (Dynamic Host Configuration Protocol) messages for stateful auto-configuration.
25304 Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-In)
25305 Core Networking - Dynamic Host Configuration Protocol for IPv6(DHCPV6-Out)
25306 Allows DHCPV6 (Dynamic Host Configuration Protocol for IPv6) messages for stateful and stateless configuration.
25326 Core Networking - Teredo (UDP-In)
25327 Core Networking - Teredo (UDP-Out)
25332 Inbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator.
25333 Outbound UDP rule to allow Teredo edge traversal, a technology that provides address assignment and automatic tunneling for unicast IPv6 traffic when an IPv6/IPv4 host is located behind an IPv4 network address translator.
25351 Core Networking - IPv6 (IPv6-In)
25352 Core Networking - IPv6 (IPv6-Out)
25357 Inbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services.
25358 Outbound rule required to permit IPv6 traffic for ISATAP (Intra-Site Automatic Tunnel Addressing Protocol) and 6to4 tunneling services.
25376 Core Networking - Internet Group Management Protocol (IGMP-In)
25377 Core Networking - Internet Group Management Protocol (IGMP-Out)
25382 IGMP messages are sent and received by nodes to create, join and depart multicast groups.
25401 Core Networking - Group Policy (NP-Out)
25402 Outbound rule to allow SMB traffic for Group Policy updates. [TCP 445]
25403 Core Networking - Group Policy (TCP-Out)
25404 Outbound rule to allow remote RPC traffic for Group Policy updates. [TCP]
25405 Core Networking - DNS (UDP-Out)
25406 Outbound rule to allow DNS requests. DNS responses based on requests that matched this rule will be permitted regardless of source address. This behavior is classified as loose source mapping. [LSM] [UDP 53]
25407 Core Networking - Group Policy (LSASS-Out)
25408 Outbound rule to allow remote LSASS traffic for Group Policy updates [TCP].
25426 Core Networking - IPHTTPS (TCP-In)
25427 Core Networking - IPHTTPS (TCP-Out)
25428 Inbound TCP rule to allow IPHTTPS tunneling technology to provide connectivity across HTTP proxies and firewalls.
25429 Outbound TCP rule to allow IPHTTPS tunneling technology to provide connectivity across HTTP proxies and firewalls.
26008 Networking - Destination Unreachable (ICMPv4-In)
26009 Networking - Destination Unreachable (ICMPv4-Out)
26014 Destination Unreachable error messages are sent from any node that a packet traverses which is unable to forward the packet for any reason except congestion.
26015 Networking - Source Quench (ICMPv4-In)
26016 Networking - Source Quench (ICMPv4-Out)
26021 Source Quench messages are sent from any node that a packet traverses which discards the datagram because they are arriving too fast or there are buffering issues.
26022 Networking - Redirect (ICMPv4-In)
26023 Networking - Redirect (ICMPv4-Out)
26028 Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach the network in question.
26036 Networking - Time Exceeded (ICMPv4-In)
26037 Networking - Time Exceeded (ICMPv4-Out)
26042 Time Exceeded error messages are generated from any node which a packet traverses if the Hop Limit value is decremented to zero at any point on the path.
26043 Networking - Timestamp Request (ICMPv4-In)
26044 Networking - Timestamp Request (ICMPv4-Out)
26049 Timestamp Request messages are sent by nodes who wish to obtain the current timestamp from another node.
26057 Networking - Parameter Problem (ICMPv4-In)
26058 Networking - Parameter Problem (ICMPv4-Out)
26063 Parameter Problem error messages are sent by nodes as a result of incorrectly generated packets.
26078 Networking - Redirect (ICMPv6-In)
26079 Networking - Redirect (ICMPv6-Out)
26084 Redirect messages are sent to indicate that the node which the packet was sent to is no longer the best gateway to reach the network in question.
26106 Networking - Router Solicitation (ICMPv6-In)
26109 Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration.
26117 Networking - Generic Routing Encapsulation (GRE-In)
26118 Networking - Generic Routing Encapsulation (GRE-Out)
26123 Generic Routing Encapsulation is used for encapsulation of an arbitrary network layer protocol over another arbitrary network layer protocol.
26124 Networking - PGM Reliable Transport Protocol (PGM-In)
26125 Networking - PGM Reliable Transport Protocol (PGM-Out)
26130 Pragmatic General Multicast is a reliable multicast transport protocol used for applications that require ordered or unordered, duplicate-free, multicast data delivery from multiple sources to multiple receivers.
26131 Networking - Packet Too Big (ICMPv4-In)
26132 Networking - Packet Too Big (ICMPv4-Out)
26133 Packet Too Big error messages are sent from any node that a packet traverses which is unable to forward the packet because the packet is too large for the next link.
26134 Networking - Router Solicitation (ICMPv4-In)
26135 Networking - Router Solicitation (ICMPv4-Out)
26136 Router Solicitation messages are sent by nodes seeking routers to provide stateless auto-configuration.
26137 Networking - Address Mask Request (ICMPv4-In)
26138 Networking - Address Mask Request (ICMPv4-Out)
26139 Address Mask Request messages are sent by nodes who wish to obtain the subnet mask for their assigned address.
26140 Networking - Echo Request (ICMPv4-In)
26141 Networking - Echo Request (ICMPv4-Out)
26142 Networking - Echo Request (ICMPv6-In)
26143 Networking - Echo Request (ICMPv6-Out)
26144 Echo Request messages are sent as ping requests to other nodes.
28002 Key Management Service
28003 Key Management Service (TCP-In)
28006 Inbound rule for the Key Management Service to allow for machine counting and license compliance. [TCP 1688]
28252 BITS Peercaching
28254 BITS Peercaching (WSD-In)
28257 Inbound rule for BITS Peercaching to discover neighbors who may have content via WSDAPI. [UDP 3702]
28258 BITS Peercaching (WSD-Out)
28261 Outbound rule for BITS Peercaching to discover neighbors who may have content via WSDAPI. [UDP 3702]
28262 BITS Peercaching (Content-In)
28265 Inbound rule for BITS Peercaching content transfer port. [TCP 2178]
28266 BITS Peercaching (Content-Out)
28269 Outbound rule for BITS Peercaching content transfer port. [TCP 2178]
28270 BITS Peercaching (RPC)
28273 Inbound rule for the Peercaching authorization exchange port via dynamic RPC/TCP.
28274 BITS Peercaching (RPC-EPMAP)
28277 Inbound rule for the RPCSS service in order to allow RPC/TCP traffic for BITS Peercaching.
28502 File and Printer Sharing
28503 File and Printer Sharing (NB-Session-In)
28506 Inbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139]
28507 File and Printer Sharing (NB-Session-Out)
28510 Outbound rule for File and Printer Sharing to allow NetBIOS Session Service connections. [TCP 139]
28511 File and Printer Sharing (SMB-In)
28514 Inbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445]
28515 File and Printer Sharing (SMB-Out)
28518 Outbound rule for File and Printer Sharing to allow Server Message Block transmission and reception via Named Pipes. [TCP 445]
28519 File and Printer Sharing (NB-Name-In)
28522 Inbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137]
28523 File and Printer Sharing (NB-Name-Out)
28526 Outbound rule for File and Printer Sharing to allow NetBIOS Name Resolution. [UDP 137]
28527 File and Printer Sharing (NB-Datagram-In)
28530 Inbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138]
28531 File and Printer Sharing (NB-Datagram-Out)
28534 Outbound rule for File and Printer Sharing to allow NetBIOS Datagram transmission and reception. [UDP 138]
28535 File and Printer Sharing (Spooler Service - RPC)
28538 Inbound rule for File and Printer Sharing to allow the Print Spooler Service to communicate via TCP/RPC.
28539 File and Printer Sharing (Spooler Service - RPC-EPMAP)
28542 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Spooler Service.
28543 File and Printer Sharing (Echo Request - ICMPv4-In)
28544 File and Printer Sharing (Echo Request - ICMPv4-Out)
28545 File and Printer Sharing (Echo Request - ICMPv6-In)
28546 File and Printer Sharing (Echo Request - ICMPv6-Out)
28547 Echo Request messages are sent as ping requests to other nodes.
28548 File and Printer Sharing (LLMNR-UDP-In)
28549 Inbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355]
28550 File and Printer Sharing (LLMNR-UDP-Out)
28551 Outbound rule for File and Printer Sharing to allow Link Local Multicast Name Resolution. [UDP 5355]
28602 File and Printer Sharing over SMBDirect
28603 File and Printer Sharing over SMBDirect (iWARP-In)
28606 Inbound rule for File and Printer Sharing over SMBDirect to allow iWARP [TCP 5445]
28752 Remote Desktop
28753 Remote Desktop (TCP-In)
28756 Inbound rule for the Remote Desktop service to allow RDP traffic. [TCP 3389]
28757 RemoteApp and Desktop Connection Management - WMI (TCP-In)
28758 Inbound rule for WMI management of RemoteApp and Desktop Connection Management
28759 RemoteApp and Desktop Connection Management - WMI (DCOM-In)
28760 Inbound rule to allow DCOM traffic for remote WMI management of RemoteApp and Desktop Connection Management. [TCP 135]
28761 RemoteApp and Desktop Connection Management - WMI (TCP-Out)
28762 Outbound rule for WMI management of RemoteApp and Desktop Connection Management
28763 RemoteApp and Desktop Connection Management - WMI (Async-TCP-In)
28764 Inbound rule for asynchronous WMI management of RemoteApp and Desktop Connection Management
28765 RemoteApp and Desktop Connection Management (RPC)
28766 Inbound rule to allow RemoteApp and Desktop Connection Management to be remotely managed via RPC/TCP traffic
28767 Remote Desktop Web Access - WMI (Async-TCP-In)
28768 Inbound rule for asynchronous WMI management of Remote Desktop Web Access
28769 Remote Desktop Web Access - WMI (DCOM-In)
28770 Inbound rule to allow DCOM traffic for remote WMI management of Remote Desktop Web Access
28771 Remote Desktop Web Access - WMI (TCP-In)
28772 Inbound rule for WMI management of Remote Desktop Web Access
28773 Remote Desktop Web Access - WMI (TCP-Out)
28774 Outbound rule for WMI management of Remote Desktop Web Access
28775 Remote Desktop - User Mode (TCP-In)
28776 Remote Desktop - User Mode (UDP-In)
28777 Inbound rule for the Remote Desktop service to allow RDP traffic. [UDP 3389]
28778 Remote Desktop - Shadow (TCP-In)
28779 Inbound rule for the Remote Desktop service to allow shadowing of an existing Remote Desktop session. (TCP-In)
29002 iSCSI Service
29003 iSCSI Service (TCP-In)
29006 Inbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP]
29007 iSCSI Service (TCP-Out)
29010 Outbound rule for the iSCSI Service to allow communications with an iSCSI server or device. [TCP]
29252 Remote Event Log Management
29253 Remote Event Log Management (RPC)
29256 Inbound rule for the local Event Log service to be remotely managed via RPC/TCP.
29257 Remote Event Log Management (NP-In)
29260 Inbound rule for the local Event Log service to be remotely managed over Named Pipes.
29265 Remote Event Log Management (RPC-EPMAP)
29268 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Event Log Service.
29502 Remote Service Management
29503 Remote Service Management (RPC)
29506 Inbound rule for the local Service Control Manager to be remotely managed via RPC/TCP.
29507 Remote Service Management (NP-In)
29510 Inbound rule for the local Service Control Manager to be remotely managed over Named Pipes.
29515 Remote Service Management (RPC-EPMAP)
29518 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the local Service Control Manager.
29752 Remote Administration
29753 Remote Administration (RPC)
29756 Inbound rule for all services to be remotely managed via RPC/TCP.
29757 Remote Administration (NP-In)
29760 Inbound rule for all services to be remotely managed over Named Pipes.
29765 Remote Administration (RPC-EPMAP)
29768 Inbound rule for the RPCSS service to allow RPC/TCP traffic for all the local services.
30002 Windows Firewall Remote Management
30003 Windows Firewall Remote Management (RPC)
30006 Inbound rule for the Windows Firewall to be remotely managed via RPC/TCP.
30007 Windows Firewall Remote Management (RPC-EPMAP)
30010 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Windows Firewall.
30252 Windows Remote Management (Compatibility)
30253 Windows Remote Management (HTTP-In)
30256 Inbound rule for Windows Remote Management via WS-Management. [TCP 5985]
30267 Windows Remote Management
30502 Wireless Portable Devices
30503 Wireless Portable Devices (TCP-Out)
30506 Outbound rule for Wireless Portable Devices to allow use of the Usermode Driver Framework. [TCP]
30507 Wireless Portable Devices (SSDP-In)
30510 Inbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900]
30511 Wireless Portable Devices (SSDP-Out)
30514 Outbound rule for Wireless Portable Devices to allow use of the Simple Service Discovery Protocol. [UDP 1900]
30515 Wireless Portable Devices (UPnP-In)
30518 Inbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP 2869]
30519 Wireless Portable Devices (UPnP-Out)
30522 Outbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP]
30523 Wireless Portable Devices (UPnPHost-Out)
30524 Outbound rule for Wireless Portable Devices to allow use of Universal Plug and Play. [TCP]
30752 Media Center Extenders
30753 Media Center Extenders - SSDP (UDP-In)
30756 Inbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900]
30757 Media Center Extenders - SSDP (UDP-Out)
30760 Outbound rule for Media Center Extenders to allow use of the Simple Service Discovery Protocol. [UDP 1900]
30761 Media Center Extenders - RTSP (TCP-In)
30764 Inbound rule for Media Center Extenders to allow RTSP AV Control. [TCP 554, TCP 8554-8558]
30765 Media Center Extenders - RTSP (TCP-Out)
30768 Outbound rule for Media Center Extenders to allow WMDRM-ND and RTSP AV Control. [TCP]
30769 Media Center Extenders - qWave (UDP-In)
30772 Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177]
30773 Media Center Extenders - qWave (UDP-Out)
30776 Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177]
30777 Media Center Extenders - qWave (TCP-In)
30780 Inbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177]
30781 Media Center Extenders - qWave (TCP-Out)
30784 Outbound rule for Media Center Extenders to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177]
30785 Media Center Extenders - HTTP Streaming (TCP-In)
30788 Inbound rule for Media Center Extenders to allow HTTP Media Streaming. [TCP 10244]
30793 Media Center Extenders - XSP (TCP-In)
30796 Inbound rule for Media Center Extenders to allow terminal sessions. [TCP 3390]
30801 Media Center Extenders - WMDRM-ND/RTP/RTCP (UDP-In)
30804 Inbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP 7777-7781, UDP 5004-5005, UDP 50004-50013]
30805 Media Center Extenders - WMDRM-ND/RTP/RTCP (UDP-Out)
30808 Outbound rule for Media Center Extenders to allow WMDRM-ND and RTP/RTCP AV Streaming. [UDP]
30810 Media Center Extenders - Service (TCP-Out)
30811 Outbound rule for Media Center Extenders to allow extender devices to locate and connect to the computer. [TCP]
30812 Media Center Extenders - Device Provisioning (TCP-Out)
30813 Outbound rule for Media Center Extenders to allow traffic for Device Provisioning. [TCP]
30814 Media Center Extenders - Media Streaming (TCP-In)
30815 Inbound rule for Media Center Extenders to allow UPnP traffic for Media Streaming. [TCP 2869]
30816 Media Center Extenders - Media Streaming (TCP-Out)
30817 Outbound rule for Media Center Extenders to allow UPnP traffic for Media Streaming. [TCP]
30818 Media Center Extenders - Device Validation (TCP-Out)
30819 Outbound rule for Media Center Extenders to allow traffic for Device Validation. [TCP]
30820 Media Center Extenders - Media Streaming (UDP-Out)
30821 Outbound rule for Media Center Extenders to allow Media Streaming devices to respond to an SSDP search. [UDP 1900]
30822 Media Center Extenders - UPnP (TCP-Out)
30823 Outbound rule for Media Center Extenders to allow UPnP devices to transmit device information. [TCP]
31002 Windows Media Player
31003 Windows Media Player (UDP-In)
31006 Inbound rule for Windows Media Player to allow UDP Media Streaming. [UDP]
31007 Windows Media Player (UDP-Out)
31010 Outbound rule for Windows Media Player to allow UDP Media Streaming. [UDP]
31011 Windows Media Player (TCP-Out)
31014 Outbound rule for Windows Media Player to allow TCP/HTTP Media Streaming. [TCP]
31015 Windows Media Player - Internet Group Management Protocol (IGMP-In)
31018 Inbound rule for Windows Media Player to allow IGMP messages.
31019 Windows Media Player - Internet Group Management Protocol (IGMP-Out)
31022 Outbound rule for Windows Media Player to allow IGMP messages.
31023 Windows Media Player x86 (UDP-In)
31024 Windows Media Player x86 (UDP-Out)
31025 Windows Media Player x86 (TCP-Out)
31252 Windows Media Player Network Sharing Service
31253 Windows Media Player Network Sharing Service (qWave-UDP-In)
31256 Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177]
31257 Windows Media Player Network Sharing Service (qWave-UDP-Out)
31260 Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177]
31261 Windows Media Player Network Sharing Service (qWave-TCP-In)
31264 Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177]
31265 Windows Media Player Network Sharing Service (qWave-TCP-Out)
31268 Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177]
31269 Windows Media Player Network Sharing Service (SSDP-In)
31272 Inbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900]
31273 Windows Media Player Network Sharing Service (SSDP-Out)
31276 Outbound rule for the Windows Media Player Network Sharing Service to allow use of the Simple Service Discovery Protocol. [UDP 1900]
31277 Windows Media Player Network Sharing Service (UPnP-In)
31280 Inbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP 2869]
31281 Windows Media Player Network Sharing Service (UPnP-Out)
31284 Outbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP]
31285 Windows Media Player Network Sharing Service (HTTP-Streaming-In)
31288 Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243]
31289 Windows Media Player Network Sharing Service (HTTP-Streaming-Out)
31292 Outbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10243]
31293 Windows Media Player Network Sharing Service (Streaming-UDP-In)
31296 Inbound rule for Windows Media Player to allow UDP Media Streaming. [UDP]
31297 Windows Media Player Network Sharing Service (Streaming-UDP-Out)
31300 Outbound rule for Windows Media Player to allow UDP Media Streaming. [UDP]
31301 Windows Media Player Network Sharing Service (Streaming-TCP-Out)
31304 Outbound rule for Windows Media Player to allow TCP/HTTP Media Streaming. [TCP]
31305 Windows Media Player Network Sharing Service (UDP-In)
31308 Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP]
31309 Windows Media Player Network Sharing Service (UDP-Out)
31312 Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [UDP]
31313 Windows Media Player Network Sharing Service (TCP-In)
31316 Inbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP]
31317 Windows Media Player Network Sharing Service (TCP-Out)
31320 Outbound rule for the Windows Media Player Network Sharing Service to allow sharing traffic. [TCP]
31321 Windows Media Player Network Sharing Service (UPnPHost-Out)
31322 Outbound rule for the Windows Media Player Network Sharing Service to allow use of Universal Plug and Play. [TCP]
31323 Windows Media Player Network Sharing Service x86 (Streaming-UDP-In)
31324 Windows Media Player Network Sharing Service x86 (Streaming-UDP-Out)
31325 Windows Media Player Network Sharing Service x86 (Streaming-TCP-Out)
31500 Windows Media Player Network Sharing Service (Internet)
31501 Windows Media Player Network Sharing Service (HTTP-Streaming-In)
31502 Inbound rule for the Windows Media Player Network Sharing Service to allow HTTP Media Streaming. [TCP 10245]
31700 Windows Media Player Network Sharing Service service hardening - RTSP
31701 Allow incoming RTSP connections to the Windows Media Player Network Sharing Service
31702 Windows Media Player Network Sharing Service service hardening - Block any other incoming TCP traffic
31752 Connect to a Network Projector
31753 Connect to a Network Projector (WSD-In)
31756 Inbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702]
31757 Connect to a Network Projector (WSD-Out)
31760 Outbound rule for Connect to a Network Projector to discover devices via WSDAPI. [UDP 3702]
31761 Connect to a Network Projector (TCP-In)
31764 Inbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP]
31765 Connect to a Network Projector (TCP-Out)
31768 Outbound rule for Connect to a Network Projector to communicate with devices on the network. [TCP]
31769 Connect to a Network Projector (WSD Events-In)
31770 Inbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5357]
31771 Connect to a Network Projector (WSD Events-Out)
31772 Outbound rule for Connect to a Network Projector to allow WSDAPI Events Discovery. [TCP 5358]
31773 Connect to a Network Projector (WSD EventsSecure-In)
31774 Inbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358]
31775 Connect to a Network Projector (WSD EventsSecure-Out)
31776 Outbound rule for Connect to a Network Projector to allow Secure WSDAPI Events. [TCP 5358]
32002 Windows Peer to Peer Collaboration Foundation
32003 Windows Peer to Peer Collaboration Foundation (TCP-In)
32006 Inbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP]
32007 Windows Peer to Peer Collaboration Foundation (TCP-Out)
32010 Outbound rule for the Windows Peer to Peer Collaboration Foundation for Peer to Peer Communication. [TCP]
32011 Windows Peer to Peer Collaboration Foundation (WSD-In)
32014 Inbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702]
32015 Windows Peer to Peer Collaboration Foundation (WSD-Out)
32018 Outbound rule for the Windows Peer to Peer Collaboration Foundation to discover devices via WSDAPI. [UDP 3702]
32019 Windows Peer to Peer Collaboration Foundation (PNRP-In)
32022 Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540]
32023 Windows Peer to Peer Collaboration Foundation (PNRP-Out)
32026 Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow Peer Name Resolution. [UDP 3540]
32027 Windows Peer to Peer Collaboration Foundation (SSDP-In)
32030 Inbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900]
32031 Windows Peer to Peer Collaboration Foundation (SSDP-Out)
32034 Outbound rule for the Windows Peer to Peer Collaboration Foundation to allow use of the Simple Service Discovery Protocol. [UDP 1900]
32252 Windows Meeting Space
32253 Windows Meeting Space (DFSR-In)
32256 Inbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722]
32257 Windows Meeting Space (DFSR-Out)
32260 Outbound rule for Windows Meeting Space to allow Distributed File System Replication traffic. [TCP 5722]
32261 Windows Meeting Space (TCP-In)
32264 Inbound rule for Windows Meeting Space to allow collaboration traffic. [TCP]
32265 Windows Meeting Space (TCP-Out)
32268 Outbound rule for Windows Meeting Space to allow collaboration traffic. [TCP]
32269 Windows Meeting Space (UDP-In)
32272 Inbound rule for Windows Meeting Space to allow collaboration traffic. [UDP]
32273 Windows Meeting Space (UDP-Out)
32276 Outbound rule for Windows Meeting Space to allow collaboration traffic. [UDP]
32277 Windows Meeting Space (P2P-In)
32280 Inbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587]
32281 Windows Meeting Space (P2P-Out)
32284 Outbound rule for Windows Meeting Space to allow Peer Networking traffic. [TCP 3587]
32752 Network Discovery
32753 Network Discovery (SSDP-In)
32756 Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]
32757 Network Discovery (SSDP-Out)
32760 Outbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]
32761 Network Discovery (UPnP-In)
32764 Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869]
32765 Network Discovery (UPnP-Out)
32768 Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP]
32769 Network Discovery (NB-Name-In)
32772 Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]
32773 Network Discovery (NB-Name-Out)
32776 Outbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]
32777 Network Discovery (NB-Datagram-In)
32780 Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]
32781 Network Discovery (NB-Datagram-Out)
32784 Outbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]
32785 Network Discovery (WSD-In)
32788 Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
32789 Network Discovery (WSD-Out)
32792 Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
32801 Network Discovery (LLMNR-UDP-In)
32804 Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]
32805 Network Discovery (LLMNR-UDP-Out)
32808 Outbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]
32809 Network Discovery (Pub-WSD-In)
32810 Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
32811 Network Discovery (Pub WSD-Out)
32812 Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
32813 Network Discovery (WSD EventsSecure-In)
32814 Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]
32815 Network Discovery (WSD EventsSecure-Out)
32816 Outbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]
32817 Network Discovery (WSD Events-In)
32818 Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]
32819 Network Discovery (WSD Events-Out)
32820 Outbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]
32821 Network Discovery (UPnPHost-Out)
32822 Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP]
32825 Network Discovery (WSD-In)
32826 Inbound rule for Network Discovery to discover devices via Device Association Framework. [UDP 3702]
33002 Remote Assistance
33003 Remote Assistance (TCP-In)
33006 Inbound rule for Remote Assistance traffic. [TCP]
33007 Remote Assistance (TCP-Out)
33010 Outbound rule for Remote Assistance traffic. [TCP]
33011 Remote Assistance (RA Server TCP-In)
33014 Inbound rule for Remote Assistance to allow offers for assistance. [TCP]
33015 Remote Assistance (RA Server TCP-Out)
33018 Outbound rule for Remote Assistance to allow offers for assistance. [TCP]
33019 Remote Assistance (SSDP UDP-In)
33022 Inbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900]
33023 Remote Assistance (SSDP UDP-Out)
33026 Outbound rule for Remote Assistance to allow use of the Simple Service Discovery Protocol. [UDP 1900]
33027 Remote Assistance (SSDP TCP-In)
33030 Inbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP 2869]
33031 Remote Assistance (SSDP TCP-Out)
33034 Outbound rule for Remote Assistance to allow use of Universal Plug and Play. [TCP]
33035 Remote Assistance (DCOM-In)
33036 Inbound rule for Remote Assistance to allow offers for assistance via DCOM. [TCP 135]
33037 Remote Assistance (PNRP-Out)
33038 Outbound rule for Remote Assistance to allow use of Peer Name Resolution Protocol. [UDP]
33039 Remote Assistance (PNRP-In)
33040 Inbound rule for Remote Assistance to allow use Peer Name Resolution Protocol. [UDP 3540]
33252 Remote Scheduled Tasks Management
33253 Remote Scheduled Tasks Management (RPC)
33256 Inbound rule for the Task Scheduler service to be remotely managed via RPC/TCP.
33257 Remote Scheduled Tasks Management (RPC-EPMAP)
33260 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Task Scheduler service.
33502 Distributed Transaction Coordinator
33503 Distributed Transaction Coordinator (TCP-In)
33506 Inbound rule to allow traffic for the Distributed Transaction Coordinator. [TCP]
33507 Distributed Transaction Coordinator (TCP-Out)
33510 Outbound rule to allow traffic for the Distributed Transaction Coordinator. [TCP]
33511 Distributed Transaction Coordinator (RPC)
33512 Inbound rule for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service to be remotely managed via RPC/TCP.
33513 Distributed Transaction Coordinator (RPC-EPMAP)
33514 Inbound rule for the RPCSS service to allow RPC/TCP traffic for the Kernel Transaction Resource Manager for Distributed Transaction Coordinator service.
33752 Routing and Remote Access
33753 Routing and Remote Access (L2TP-In)
33756 Inbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701]
33757 Routing and Remote Access (L2TP-Out)
33760 Outbound rule for RRAS to allow Layer 2 Tunnel Protocol traffic. [UDP 1701]
33761 Routing and Remote Access (PPTP-Out)
33764 Outbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723]
33765 Routing and Remote Access (PPTP-In)
33768 Inbound rule for RRAS to allow Point-to-Point Tunnel Protocol traffic. [TCP 1723]
33769 Routing and Remote Access (GRE-In)
33772 Inbound rule for RRAS to allow Generic Routing Encapsulation Protocol traffic.
33773 Routing and Remote Access (GRE-Out)
33776 Outbound rule for RRAS to allow Generic Routing Encapsulation Protocol Traffic
34002 Windows Collaboration Computer Name Registration Service
34003 Windows Collaboration Computer Name Registration Service (PNRP-In)
34004 Inbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540]
34005 Windows Collaboration Computer Name Registration Service (PNRP-Out)
34006 Outbound rule for the Windows Collaboration Computer Name Registration Service to allow Peer Name Resolution. [UDP 3540]
34007 Windows Collaboration Computer Name Registration Service (SSDP-In)
34008 Inbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900]
34009 Windows Collaboration Computer Name Registration Service (SSDP-Out)
34010 Outbound rule for the Windows Collaboration Computer Name Registration Service to allow use of the Simple Service Discovery Protocol. [UDP 1900]
34251 Windows Management Instrumentation (WMI)
34252 Windows Management Instrumentation (DCOM-In)
34253 Inbound rule to allow DCOM traffic for remote Windows Management Instrumentation. [TCP 135]
34254 Windows Management Instrumentation (WMI-In)
34255 Inbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP]
34256 Windows Management Instrumentation (ASync-In)
34257 Inbound rule to allow Asynchronous WMI traffic for remote Windows Management Instrumentation. [TCP]
34258 Windows Management Instrumentation (WMI-Out)
34259 Outbound rule to allow WMI traffic for remote Windows Management Instrumentation. [TCP]
34501 Remote Volume Management
34502 Remote Volume Management - Virtual Disk Service (RPC)
34503 Inbound rule for the Remote Volume Management - Virtual Disk Service to be remotely managed via RPC/TCP.
34504 Remote Volume Management - Virtual Disk Service Loader (RPC)
34505 Inbound rule for the Remote Volume Management - Virtual Disk Service Loader to be remotely managed via RPC/TCP.
34506 Remote Volume Management (RPC-EPMAP)
34507 Inbound rule for the RPCSS service to allow RPC/TCP traffic for Remote Volume Management.
34752 Performance Logs and Alerts
34753 Performance Logs and Alerts (TCP-In)
34754 Inbound rule for Performance Logs and Alerts traffic. [TCP-In]
34755 Performance Logs and Alerts (DCOM-In)
34756 Inbound rule for Performance Logs and Alerts to allow remote DCOM activation. [TCP-135]
35000 The firewall rules that are part of Core Networking are required for reliable IPv4 and IPv6 connectivity.
35001 Windows Remote Management - Compatibility Mode (HTTP-In)
35002 Compatibility mode inbound rule for Windows Remote Management via WS-Management. [TCP 80]
36001 Cast to Device functionality
36002 Cast to Device streaming server (HTTP-Streaming-In)
36003 Inbound rule for the Cast to Device server to allow streaming using HTTP. [TCP 10246]
36004 Cast to Device streaming server (RTCP-Streaming-In)
36005 Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP]
36006 Cast to Device streaming server (RTP-Streaming-Out)
36007 Outbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [UDP]
36008 Cast to Device streaming server (RTSP-Streaming-In)
36009 Inbound rule for the Cast to Device server to allow streaming using RTSP and RTP. [TCP 23554, 23555, 23556]
36010 Cast to Device functionality (qWave-UDP-In)
36011 Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177]
36012 Cast to Device functionality (qWave-UDP-Out)
36013 Outbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [UDP 2177]
36014 Cast to Device functionality (qWave-TCP-In)
36015 Inbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177]
36016 Cast to Device functionality (qWave-TCP-Out)
36017 Outbound rule for the Cast to Device functionality to allow use of the Quality Windows Audio Video Experience Service. [TCP 2177]
36100 Cast to Device streaming server hardening rules for RTSP
36101 Allow incoming RTSP connections to the Cast to Device streaming server
36102 Cast to Device streaming server hardening - Block incoming TCP traffic
36103 Cast to Devicestreaming server hardening - Block outgoing TCP traffic
36104 Cast to Device SSDP Discovery (UDP-In)
36105 Inbound rule to allow discovery of Cast to Device targets using SSDP
36106 Cast to Device UPnP Events (TCP-In)
36107 Inbound rule to allow receiving UPnP Events from Cast to Device targets
36251 Proximity Sharing
36252 Proximity sharing over TCP (TCP sharing-In)
36253 Inbound rule for Proximity sharing over TCP
36254 Proximity sharing over TCP (TCP sharing-Out)
36255 Outbound rule for Proximity sharing over TCP
36501 TPM Virtual Smart Card Management
36502 TPM Virtual Smart Card Management (DCOM-In)
36503 Inbound rule for remote TPM Virtual Smart Card Management to allow DCOM activation. [TCP 135]
36504 TPM Virtual Smart Card Management (TCP-In)
36505 Inbound rule for remote TPM Virtual Smart Card Management traffic. [TCP]
36506 TPM Virtual Smart Card Management (TCP-Out)
36507 Outbound rule for remote TPM Virtual Smart Card Management traffic. [TCP]
36751 Remote Shutdown
36753 Inbound Rule for Remote Shutdown (TCP-In)
36754 Inbound rule for the Remote Shutdown via dynamic RPC/TCP.
36755 Inbound Rule for Remote Shutdown (RPC-EP-In)
36756 Inbound rule for the RPCSS service to allow RPC/TCP traffic
36801 Remote Event Monitor
36802 Remote Event Monitor (RPC)
36803 Inbound rule for remote event monitoring via RPC/TCP.
36804 Remote Event Monitor (RPC-EPMAP)
36805 Inbound rule for the RPCSS service to allow RPC/TCP traffic for remote event monitoring.
36851 Wi-Fi Direct Network Discovery
36852 Wi-Fi Direct Network Discovery (In)
36853 Inbound rule to discover WSD devices on Wi-Fi Direct networks.
36854 Wi-Fi Direct Network Discovery (Out)
36855 Outbound rule to discover WSD devices on Wi-Fi Direct networks.
36856 Wi-Fi Direct Spooler Use (In)
36857 Inbound rule to use WSD printers on Wi-Fi Direct networks.
36858 Wi-Fi Direct Spooler Use (Out)
36859 Outbound rule to use WSD printers on Wi-Fi Direct networks.
36860 Wi-Fi Direct Scan Service Use (In)
36861 Inbound rule to use WSD scanners on Wi-Fi Direct networks.
36862 Wi-Fi Direct Scan Service Use (Out)
36863 Outbound rule to use WSD scanners on Wi-Fi Direct networks.
36902 Software Load Balancer
36903 Software Load Balancer Multiplexer (TCP-In)
36904 The Software Load Balancer Multiplexer enables TCP communication to the Network Controller. [TCP]
37002 AllJoyn Router
37003 AllJoyn Router (TCP-In)
37004 Inbound rule for AllJoyn Router traffic [TCP]
37005 AllJoyn Router (TCP-Out)
37006 Outbound rule for AllJoyn Router traffic [TCP]
37007 AllJoyn Router (UDP-In)
37008 Inbound rule for AllJoyn Router traffic [UDP]
37009 AllJoyn Router (UDP-Out)
37010 Outbound rule for AllJoyn Router traffic [UDP]
37101 DIAL protocol server
37102 DIAL protocol server (HTTP-In)
37103 Inbound rule for DIAL protocol server to allow remote control of Apps using HTTP. [TCP 10247]
37202 XBox SystemOS
37203 XBox SRA Inbound rule Telnet Guest [TCP]
37204 XBox SRA Inbound rule for allowed Telnet Guest TCP traffic
37205 XBox SRA Inbound rule Telnet Guest [TCP]
37206 XBox SRA Inbound rule for allowed Telnet Guest TCP traffic
37207 XBox SRA Inbound rule RPC Endpoint Mapper [TCP]
37208 XBox SRA Inbound rule for prohibited RPC Endpoint Mapper TCP traffic
37209 XBox SRA Inbound rule Echo Request [ICMPv4]
37210 XBox SRA Inbound rule for allowed ICMP Echo Request traffic
37211 XBox SRA Outbound rule ICMPv4 Echo Request
37212 XBox SRA Outbound rule for allowed ICMPv4 Echo Request traffic
38002 This feature is used for machine counting and license compliance in enterprise environments.
38252 This feature allows Background Intelligent Transfer Service (BITS) clients that are in the same subnet to locate and share files that are stored in the BITS cache. (Uses WSDAPI and RPC)
38502 This feature is used for sharing local files and printers with other users on the network. (Uses NetBIOS, LLMNR, SMB and RPC)
38602 This feature is used for sharing local files over RDMA using the SMBDirect protocol. (Uses RDMA)
38752 This feature is used for accessing the desktop from a remote system.
39002 This feature is used for connecting to iSCSI target servers and devices.
39252 This feature allows remote viewing and management of the local event log. (Uses Named Pipes and RPC)
39502 This feature allows remote management of local services. (Uses Named Pipes and RPC)
39752 The feature allows remotely manageable services to receive RPC traffic. (Uses Named Pipes and RPC)
40002 This feature allows remote management of the local Windows Firewall. (Uses RPC)
40252 This feature allows remote management of the system via WS-Management, a web services-based protocol for remote management of operating systems and devices.
40267 This feature allows remote management of the system via WS-Management, a web services-based protocol for remote management of operating systems and devices.
40502 This feature allows the transfer of media from your network enabled camera or media device to your computer using the Media Transfer Protocol (MTP). (Uses UPnP and SSDP)
40752 This feature allows Media Center Extenders to communicate with a computer running Windows Media Center. (Uses SSDP and qWave)
41002 This feature allows users to receive streaming media over UDP.
41252 This feature enables users to share media over a network. (Uses UPnP, SSDP and qWave)
41500 This feature allows users to share out home media over the Internet
41752 This feature enables users to connect to projectors over wired or wireless networks to project presentations. (Uses WSDAPI)
42002 This feature is required to enable various peer-to-peer programs and technologies. (Uses SSDP and PNRP)
42252 This feature is used for collaborating over a network to share documents, programs or your desktop with other people. (Uses DFSR and P2P)
42752 This feature allows this computer to discover other devices and be discovered by other devices on the network. (Uses Function Discovery Host and Publication Services, UPnP, SSDP, NetBIOS and LLMNR)
43002 This feature allows users of this computer to request remote assistance from other users on the network. (Uses UPnP, SSDP, PNRP and Teredo)
43252 This feature allows remote management of the local task scheduling service. (Uses RPC)
43502 This feature coordinates transactions that update transaction-protected resources, such as databases, message queues and file systems.
43752 This feature is used to allow incoming VPN and RAS connections.
44002 This feature allows other computers to find and communicate with your computer using the Peer Name Resolution Protocol. (Uses SSDP and PNRP)
44251 This feature allows remote management of Windows by exposing a set of manageable components in a set of classes defined by the Common Information Model (CIM) of the distributed management task force. (Uses DCOM)
44501 This feature provides remote software and hardware disk volume management. (Uses RPC)
44752 This feature allows remote management of the Performance Logs and Alerts service. (Uses RPC)
46001 This feature enables streaming of music, video and pictures to DLNA Digital Media Renderer devices.
46251 This feature enables sharing of content between two PCs with proximity devices when tapped together.
 

COM Classes/Interfaces

Name Type Description
INetFwAuthorizedApplication Dispatch  
INetFwAuthorizedApplications Dispatch  
INetFwIcmpSettings Dispatch  
INetFwMgr Dispatch  
INetFwOpenPort Dispatch  
INetFwOpenPorts Dispatch  
INetFwPolicy Dispatch  
INetFwPolicy2 Dispatch  
INetFwProduct Dispatch  
INetFwProducts Dispatch  
INetFwProfile Dispatch  
INetFwRemoteAdminSettings Dispatch  
INetFwRule Dispatch  
INetFwRule2 Dispatch  
INetFwRule3 Dispatch  
INetFwRules Dispatch  
INetFwService Dispatch  
INetFwServiceRestriction Dispatch  
INetFwServices Dispatch  
 

Exported Functions List

The following functions are exported by this dll:
DllCanUnloadNow DllGetClassObject
DllRegisterServer DllUnregisterServer
FWAddAuthenticationSet FWAddConnectionSecurityRule
FWAddCryptoSet FWAddFirewallRule
FWAddMainModeRule FWAddSecurityRealm
FWChangeNotificationCreate FWChangeNotificationDestroy
FWChangeTransactionalState FWClosePolicyStore
FWCopyAuthenticationSet FWCopyConnectionSecurityRule
FWCopyCryptoSet FWCopyFirewallRule
FWDeleteAllAuthenticationSets FWDeleteAllConnectionSecurityRules
FWDeleteAllCryptoSets FWDeleteAllFirewallRules
FWDeleteAllMainModeRules FWDeleteAuthenticationSet
FWDeleteConnectionSecurityRule FWDeleteCryptoSet
FWDeleteFirewallRule FWDeleteMainModeRule
FWDeletePhase1SAs FWDeletePhase2SAs
FWDeleteSecurityRealm FWDiagGetAppList
FWEnumAdapters FWEnumAuthenticationSets
FWEnumConnectionSecurityRules FWEnumCryptoSets
FWEnumFirewallRules FWEnumMainModeRules
FWEnumNetworks FWEnumPhase1SAs
FWEnumPhase2SAs FWEnumProducts
FWExportPolicy FWFreeAdapters
FWFreeAuthenticationSet FWFreeAuthenticationSets
FWFreeAuthenticationSetsByHandle FWFreeConnectionSecurityRule
FWFreeConnectionSecurityRules FWFreeConnectionSecurityRulesByHandle
FWFreeCryptoSet FWFreeCryptoSets
FWFreeCryptoSetsByHandle FWFreeDiagAppList
FWFreeFirewallRule FWFreeFirewallRules
FWFreeFirewallRulesByHandle FWFreeFirewallRulesOld
FWFreeMainModeRule FWFreeMainModeRules
FWFreeMainModeRulesByHandle FWFreeNetworks
FWFreePhase1SAs FWFreePhase2SAs
FWFreeProducts FWGetConfig
FWGetConfig2 FWGetGlobalConfig
FWGetGlobalConfig2 FWGetGlobalConfig3
FWGetIndicatedPortInUse FWImportPolicy
FWIndicatePortInUse FWIndicateProxyForUrl
FWIndicateProxyResolverRefresh FWIndicateTupleInUse
FWIsTargetAProxy FWOpenPolicyStore
FWQueryAuthenticationSets FWQueryConnectionSecurityRules
FWQueryCryptoSets FWQueryFirewallRules
FWQueryIsolationType FWQueryMainModeRules
FWRegisterProduct FWResetIndicatedPortInUse
FWResetIndicatedTupleInUse FWRestoreDefaults
FWRestoreGPODefaults FWRevertTransaction
FWSelectConSecRule FWSetAuthenticationSet
FWSetConfig FWSetConnectionSecurityRule
FWSetCryptoSet FWSetFirewallRule
FWSetGlobalConfig FWSetGlobalConfig2
FWSetMainModeRule FWStatusMessageFromStatusCode
FWUnregisterProduct FWVerifyAuthenticationSet
FWVerifyAuthenticationSetQuery FWVerifyConnectionSecurityRule
FWVerifyConnectionSecurityRuleQuery FWVerifyCryptoSet
FWVerifyCryptoSetQuery FWVerifyFirewallRule
FWVerifyFirewallRuleQuery FWVerifyMainModeRule
FWVerifyMainModeRuleQuery FwActivate
FwAlloc FwAllocCheckSize
FwAllowedProgramsAdd FwAllowedProgramsDelete
FwAnalyzeFirewallPolicy FwAnalyzeFirewallPolicyOnProfile
FwApiHelperFree FwApiHelperInit
FwBstrToPorts FwConvertIPv6SubNetToRange
FwCopyAuthSet FwCopyMainModeRule
FwCopyWFAddressesContents FwEmptyWFAddresses
FwFree FwFreeAddresses
FwFreePorts FwGetAddressesAsString
FwGetCurrentProfile FwGetVersionField
FwIcmpSettingsEnum FwIcmpSettingsSet
FwIsGroupPolicyEnforced FwIsRemoteManagementEnabled
FwLogSettingsSet FwMergeAddresses
FwMulticastBroadcastResponsesEnum FwMulticastBroadcastResponsesSet
FwNotificationsEnum FwNotificationsSet
FwOpModesEnum FwOpModesSet
FwPortOpeningsAdd FwPortOpeningsDelete
FwProfileTypeCurrentGet FwProfileTypeGet
FwRestoreDefaults FwServicesEnum
FwServicesSet FwStringToAddresses
FwStringToPorts GetDisabledInterfaces
IcfAddrChangeNotificationCreate IcfChangeNotificationCreate
IcfChangeNotificationDestroy IcfConnect
IcfDisconnect IcfFreeDynamicFwPorts
IcfFreeProfile IcfFreeTickets
IcfGetCurrentProfileType IcfGetDynamicFwPorts
IcfGetOperationalMode IcfGetProfile
IcfGetTickets IcfIsPortAllowed
IcfOpenDynamicFwPortWithoutSocket IcfSubNetsGetScope
IsFirewallInCoExistanceMode IsPortOrICMPAllowed
NetworkIsolationAddAllowEnterpriseIdRule NetworkIsolationCreateAllInterfacesContainer
NetworkIsolationCreateAppContainer NetworkIsolationCreateInterfaceContainer
NetworkIsolationDeleteAllInterfacesContainer NetworkIsolationDeleteAllowEnterpriseIdRule
NetworkIsolationDeleteAppContainer NetworkIsolationDeleteInterfaceContainer
NetworkIsolationDiagnoseConnectFailure NetworkIsolationDiagnoseConnectFailureAndGetInfo
NetworkIsolationDiagnoseListen NetworkIsolationDiagnoseSocketCreation
NetworkIsolationEnumAppContainers NetworkIsolationEnumerateAppContainerRules
NetworkIsolationFreeAppContainers NetworkIsolationGetAppContainer
NetworkIsolationGetAppContainerConfig NetworkIsolationGetEnterpriseId
NetworkIsolationGetEnterpriseIdAsync NetworkIsolationGetEnterpriseIdClose
NetworkIsolationRegisterForAppContainerChanges NetworkIsolationSetAppContainerConfig
NetworkIsolationSetupAppContainerBinaries NetworkIsolationUnregisterForAppContainerChanges

 

Imported Functions List

The following functions are imported by this dll: