DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/Help/Windows/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/Help/Windows/en-US/ipsecmonitor.h1s
MZ@PEL!@0`@.rsrc@@.its @@0	HX||4VS_VERSION_INFOStringFileInfo040904b0b!FileVersion1.00.00                         l"FileDescriptionCompiled Microsoft Help 2.0 TitleBFileStampA95BD96001CA041F4JCompilerVersion2.5.71210.08579VCompileDate2009-07-14T01:08:56      >TopicCount9I000000000000ALegalCopyright 2005 Microsoft Corporation. All rights reserved.CCCCCCCCCCCCCDVarFileInfo$Translation	ti	`[
6/ITOLITLS(X쌡^
V`   x ,CAOLPHHC ITSF #:^	sP-Y쌡^
VY쌡^
VIFCMAOLL,IFCM AOLL//$FXFtiAttribute//$FXFtiAttribute/BTREEe/$FXFtiAttribute/DATA/$FXFtiAttribute/PROPERTY}N/$FXFtiMain//$FXFtiMain/BTREEU/$FXFtiMain/DATAm*/$FXFtiMain/PROPERTYN/$Index/$ATTRNAME{\/$Index/$PROPBAGk/$Index/$STRINGSW`/$Index/$SYSTEM\
/$Index/$TOC//$Index/$TOC/$ipsecmonitorJ/$Index/$TOPICATTRK0/$Index/$TOPICSo /$Index/$URLSTR7p/$Index/$URLTBL'H/$Index/$VTAIDXW/$Index/AssetId//$Index/AssetId/$LEAVESW	/$OBJINSTJ/assets/0/assets/42f82bec-7716-4592-b2f6-f12b005e24ad.xmltA0/assets/56657011-52e2-4d7c-a5e1-8c16dbe476fd.xml5|0/assets/b2b916a7-bfd5-4432-bd4b-eea08787ecac.xml130/assets/c181d1b6-f5b3-4251-9787-55b308a3b771.xmld/ipsecmonitor.h1c&/ipsecmonitor.H1F'/ipsecmonitor.H1T22/ipsecmonitor.H1V-/ipsecmonitor_AssetId.H1Kdk/ipsecmonitor_BestBet.H1KOk/ipsecmonitor_LinkTerm.H1K:l/ipsecmonitor_SubjectTerm.H1K&o::DataSpace/NameList<(::DataSpace/Storage/MSCompressed/Content>,::DataSpace/Storage/MSCompressed/ControlDataT )::DataSpace/Storage/MSCompressed/SpanInfoL/::DataSpace/Storage/MSCompressed/Transform/List<_::DataSpace/Storage/MSCompressed/Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/InstanceData/i::DataSpace/Storage/MSCompressed/Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/InstanceData/ResetTableSH3::Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/v JVp,UncompressedMSCompressedFX쌡^
VLZXCHH<maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>Monitoring Quick Mode</maml:title><maml:introduction>
<maml:para>Quick Mode (also known as Phase 2) IKE negotiation establishes a secure channel between two computers to protect data. Because this phase involves the establishment of security associations (SAs) that are negotiated on behalf of the IPsec service, the SAs created during Quick Mode are called the IPsec SAs. During Quick Mode, keying material is refreshed or, if necessary, new keys are generated. A protection suite that protects specified IP traffic is also selected. A protection suite is a defined set of data integrity or data encryption settings. Quick Mode is not considered a complete exchange because it is dependent on a Main Mode exchange.</maml:para>
<maml:para>Monitoring Quick Mode SAs can provide information about which peers are currently connected to this computer, which protection suite was used to form the SA, and other information.</maml:para>
</maml:introduction><maml:content><maml:sections><maml:section><maml:title>Generic filters</maml:title><maml:introduction>
<maml:para>Generic filters are IP filters that are configured to use any of the IP address options as either a source or destination address. IPsec also allows you to use keywords, such as <maml:ui>My IP Address</maml:ui>, <maml:ui>DNS Server</maml:ui>, <maml:ui>DHCP Server</maml:ui>, <maml:ui>WINS Servers</maml:ui>, and <maml:ui>Default Gateway</maml:ui>, in the configuration of filters. When keywords are used, generic filters show the keywords in the IP Security Monitoring snap-in. Specific filters are derived from the generic filters by expanding keywords into IP addresses.</maml:para>
</maml:introduction>
<maml:sections>
<maml:section><maml:title>Adding, removing, and sorting columns</maml:title><maml:introduction>
<maml:para>You can add, remove, rearrange, and sort by these columns in the results pane:</maml:para>

<maml:list class="unordered">
<maml:listItem><maml:para><maml:phrase>Name</maml:phrase>.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Source</maml:phrase>. This is the IP address of the packet source.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Destination</maml:phrase>. This is the IP address of the packet destination.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Source Port</maml:phrase>. This is the TCP or UDP port of the packet source.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Destination Port</maml:phrase>. This is the TCP or UDP port of the packet destination.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Source Tunnel Endpoint</maml:phrase>. This is the tunnel endpoint nearest the local computer, if one was specified.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Destination Tunnel Endpoint</maml:phrase>. This is the tunnel endpoint nearest the destination computer, if one was specified.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Protocol</maml:phrase>. This is the protocol specified in the filter.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Inbound Action</maml:phrase>. This indicates whether inbound traffic is Allowed, Blocked, or uses the Negotiate Security action.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Outbound Action</maml:phrase>. This indicates whether outbound traffic is Allowed, Blocked, or uses the Negotiate Security action.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Negotiation Policy</maml:phrase>. This is the name of the Quick Mode negotiation policy, or cryptographic settings.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Connection Type</maml:phrase>. This is the type of connection that this filter is applied to, either local area network (LAN), remote access, or all network connection types.</maml:para></maml:listItem>
</maml:list>
</maml:introduction></maml:section>
</maml:sections>
</maml:section><maml:section><maml:title>Specific filters</maml:title><maml:introduction>
<maml:para>Specific filters are expanded from generic filters by using the IP addresses of the source or destination computer for the actual connection. For example, if you have a filter that used <maml:ui>My IP Address</maml:ui> option as the source address and the <maml:ui>DHCP Server</maml:ui> option as the destination address, then when a connection is formed using this filter, a filter that has your computer's IP address and the IP address of the DHCP server that this computer uses is created automatically.</maml:para>
</maml:introduction>
<maml:sections>
<maml:section><maml:title>Adding, removing, and sorting columns</maml:title><maml:introduction>
<maml:para>You can add, remove, rearrange, and sort by these columns in the results pane:</maml:para>
<maml:list class="unordered">
<maml:listItem><maml:para><maml:phrase>Name</maml:phrase>.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Source</maml:phrase>. This is the IP address of the packet source.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Destination</maml:phrase>. This is the IP address of the packet destination.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Source Port</maml:phrase>. This is the TCP or UDP port of the packet source.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Destination Port</maml:phrase>. This is the TCP or UDP port of the packet destination.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Source Tunnel Endpoint</maml:phrase>. This is the tunnel endpoint nearest the local computer, if one was specified.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Destination Tunnel Endpoint</maml:phrase>. This is the tunnel endpoint nearest the destination computer, if one was specified.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Protocol</maml:phrase>. This is the protocol specified in the filter.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Inbound Action</maml:phrase>. This indicates whether inbound traffic is Allowed, Blocked, or uses Negotiate Security action.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Outbound Action</maml:phrase>. This indicates whether outbound traffic is Allowed, Blocked, or uses Negotiate Security action.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Negotiation Policy</maml:phrase>. This is the name of the Quick Mode negotiation policy, or cryptographic settings.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Weight</maml:phrase>. This is the priority the IPsec service gives to the filter. Weight is derived from a number of factors. For more information about filter weights, see <maml:navigationLink><maml:linkText>http://go.microsoft.com/fwlink/?LinkId=62212</maml:linkText><maml:uri href="http://go.microsoft.com/fwlink/?LinkId=62212"></maml:uri></maml:navigationLink>.</maml:para>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>The weight property is always set to 0 on computers running Windows Vista®, Windows Server® 2008, or later versions of Windows.</maml:para></maml:alertSet></maml:listItem>
</maml:list>


</maml:introduction></maml:section>
</maml:sections>
</maml:section><maml:section><maml:title>Negotiation policies</maml:title><maml:introduction>
<maml:para>The negotiation policy is the security method preference order that the two peer computers agree to use when communicating with each other during Quick Mode negotiations.</maml:para>
</maml:introduction></maml:section><maml:section><maml:title>Statistics</maml:title><maml:introduction>
<maml:para>This table displays the statistics available from the Quick Mode Statistics view:</maml:para>

<maml:table><maml:tableHeader><maml:row><maml:entry><maml:para>IPsec Statistic</maml:para></maml:entry><maml:entry><maml:para>Description</maml:para></maml:entry></maml:row></maml:tableHeader>
<maml:row><maml:entry><maml:para>Active Security Associations</maml:para></maml:entry><maml:entry><maml:para>This is the number of active IPsec SAs.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Offloaded Security Associations</maml:para></maml:entry><maml:entry><maml:para>This is the number of active IPsec SAs offloaded to hardware.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Pending Key Operations</maml:para></maml:entry><maml:entry><maml:para>This is the number of IPsec key operations in progress.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Key Additions</maml:para></maml:entry><maml:entry><maml:para>This is the total number of successful IPsec SA negotiations.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Key Deletions</maml:para></maml:entry><maml:entry><maml:para>This is the number of key deletions for IPsec SAs.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Rekeys</maml:para></maml:entry><maml:entry><maml:para>This is the number of rekey operations for IPsec SAs.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Active Tunnels</maml:para></maml:entry><maml:entry><maml:para>This is the number of active IPsec tunnels.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Bad SPI Packets</maml:para></maml:entry><maml:entry><maml:para>This is the total number of packets for which the Security Parameters Index (SPI) was incorrect. The SPI is used to match inbound packets with SAs. If the SPI is incorrect, it might mean that the inbound SA has expired and a packet using the old SPI has recently arrived. This number is likely to increase if rekey intervals are short and there are a large number of SAs. Because SAs expire under normal conditions, a bad SPI packet does not necessarily mean that IPsec is failing.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Packets Not Decrypted</maml:para></maml:entry><maml:entry><maml:para>This is the total number of packets that failed decryption. This failure might indicate that a packet arrived for an SA that had expired. If the SA expires, the session key used to decrypt the packet is also deleted. This does not necessarily indicate that IPsec is failing.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Packets Not Authenticated</maml:para></maml:entry><maml:entry><maml:para>This is the total number of packets for which data could not be verified. This failure is most likely caused by an expired SA.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Packets With Replay Detection</maml:para></maml:entry><maml:entry><maml:para>This is the total number of packets that contained a valid Sequence Number field.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Confidential Bytes Sent</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes sent using the ESP protocol.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Confidential Bytes Received</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes received using the ESP protocol.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Authenticated Bytes Sent</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes sent using the AH protocol.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Authenticated Bytes Received</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes received using the AH protocol.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Transport Bytes Sent</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes sent using IPsec Transport Mode.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Transport Bytes Received</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes received using IPsec Transport Mode.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Bytes Sent in Tunnels</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes sent using IPsec Tunnel Mode.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Bytes Received in Tunnels</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes received using IPsec Tunnel Mode.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Offloaded Bytes Sent</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes sent using hardware offload.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Offloaded Bytes Received</maml:para></maml:entry><maml:entry><maml:para>This is the total number of bytes received using hardware offload.</maml:para></maml:entry></maml:row>
</maml:table>

<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>Some of these statistics can be used to detect network attack attempts.</maml:para></maml:alertSet>
</maml:introduction></maml:section><maml:section><maml:title>Security associations</maml:title><maml:introduction>
<maml:para>This view displays the active SAs with this computer. An SA is the combination of a negotiated key, security protocol, and SPI, which together define the security used to protect the communication from sender to receiver. Therefore, by looking at the security associations for this computer, you can determine which computers have connections with this computer, which type of data integrity and encryption is being used for that connection, and other information.</maml:para>
<maml:para>This information can be helpful when you are testing IPsec policies and troubleshooting access issues.</maml:para>
</maml:introduction>
<maml:sections>
<maml:section><maml:title>Adding, removing, and sorting columns</maml:title><maml:introduction>
<maml:para>You can add, remove, rearrange, and sort by these columns in the results pane:</maml:para>

<maml:list class="unordered">
<maml:listItem><maml:para><maml:phrase>Me </maml:phrase>. This is the IP address of the local computer.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Peer</maml:phrase>. This is the IP address of the remote computer.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Protocol</maml:phrase>. This is the protocol specified in the filter.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>My Port</maml:phrase>. This is the TCP or UDP port of the local computer specified in the filter.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Peer Port</maml:phrase>. This is the TCP or UDP port of the remote computer specified in the filter.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Negotiation Policy</maml:phrase>. This is the name of the Quick Mode negotiation policy, or cryptographic settings.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>AH Integrity</maml:phrase>. This is the AH protocol-specific data integrity method used for peer communications.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>ESP Confidentiality</maml:phrase>. This is the ESP protocol-specific encryption method used for peer communications.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>ESP Integrity</maml:phrase>. This is the ESP protocol-specific data integrity method used for peer communications.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>My Tunnel Endpoint</maml:phrase>. This is the tunnel endpoint nearest the local computer, if one was specified.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Peer Tunnel Endpoint</maml:phrase>. This is the tunnel endpoint nearest the local computer, if one was specified.</maml:para></maml:listItem>
</maml:list>

</maml:introduction></maml:section>
</maml:sections>
</maml:section><maml:section><maml:title>Additional references</maml:title><maml:introduction><maml:list class="unordered"><maml:listItem><maml:para><maml:navigationLink><maml:linkText>Monitoring IPsec</maml:linkText><maml:uri href="mshelp://windows/?id=56657011-52e2-4d7c-a5e1-8c16dbe476fd"></maml:uri></maml:navigationLink></maml:para></maml:listItem><maml:listItem><maml:para><maml:navigationLink><maml:linkText>Monitoring Main Mode</maml:linkText><maml:uri href="mshelp://windows/?id=b2b916a7-bfd5-4432-bd4b-eea08787ecac"></maml:uri></maml:navigationLink></maml:para></maml:listItem></maml:list></maml:introduction></maml:section></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>Monitoring IPsec</maml:title><maml:introduction>
<maml:para>You can use the IP Security Monitor snap-in to view and monitor IPsec-related statistics and the IPsec policy applied to this computer and other computers. This information can help you troubleshoot IPsec and test the policies you are creating. To change the IPsec policies, use the IP Security Policies snap-in.</maml:para>
<maml:para>If you create a policy using the Windows Firewall with Advanced Security snap-in, you cannot use the IP Security Monitor snap-in to view these rules. You must use the Monitoring item of the Windows Firewall with Advanced Security snap-in.</maml:para>

<maml:alertSet class="note"><maml:title>Notes </maml:title><maml:alert>The IP Security Monitor snap-in can be used to monitor IPsec only on computers running Windows XP and later. To monitor IPsec on a computer running Windows 2000, use the <maml:computerOutputInline>ipsecmon</maml:computerOutputInline> command.</maml:alert><maml:alert>The IP Security Policy snap-in can be used to create IPsec policies that can be applied to computers running Windows Vista®, Windows Server® 2008, and later versions of Windows, but this snap-in does not use the new security algorithms and other new features available in those later versions. To create IPsec polices using the newer algorithms, use the Windows Firewall with Advanced Security snap-in. The Windows Firewall with Advanced Security snap-in does not create policies that can be applied to earlier versions of Windows.</maml:alert></maml:alertSet>

</maml:introduction><maml:content><maml:sections><maml:section><maml:title>Monitoring tasks</maml:title><maml:introduction>
<maml:para>This is a brief list of the most common tasks you might perform using the IP Security Monitor snap-in:</maml:para>
</maml:introduction>
<maml:sections>
<maml:section><maml:title>Adding a computer</maml:title><maml:introduction>
<maml:para>Before you can monitor IPsec on a remote computer, you must first add the computer to the snap-in. You must have administrator-level access to the remote computer to add it and monitor IPsec.</maml:para>

<maml:procedure><maml:title>To add a computer to the IP Security Monitor snap-in</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the console tree, right-click <maml:ui>IP Security Monitor</maml:ui>, and then click <maml:ui>Add computer</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the <maml:ui>Add Computer</maml:ui> dialog box, click <maml:ui>The following computer</maml:ui>, and then type the name of the remote computer. Or, click <maml:ui>Browse</maml:ui> to find it on the network.</maml:para></maml:section></maml:sections></maml:step></maml:procedure>

<maml:alertSet class="note"><maml:title>Notes </maml:title><maml:alert>If the IPsec services are not started on the computer that is being monitored, the server icon is displayed as a stopped service. To refresh the IP Security Monitor after the IPsec services on that computer have been restarted, right-click the computer, and then click <maml:ui>Reconnect</maml:ui>.</maml:alert><maml:alert>On computers running Windows Server 2003 and later, you must set the <maml:computerOutputInline>EnableRemoteMgmt</maml:computerOutputInline> registry key to 1 on the remote computer and restart the IPsec service. Otherwise, you will get an "IPsec service not running" error from the snap-in. The registry key is located at HKEY_LOCAL_MACHINE \SYSTEM\\CurrentControlSet\Services\PolicyAgent.</maml:alert></maml:alertSet>
</maml:introduction></maml:section>

<maml:section><maml:title>Finding a specific filter</maml:title><maml:introduction>
<maml:para>There are two ways to find information about a specific filter, which might be helpful, for example, during troubleshooting: you can sort the Specific Filters view to find the filter or you can search for the filter in the Specific Filter folder of either Main Mode or Quick Mode.</maml:para>

<maml:procedure><maml:title>To find a filter in the filter list by browsing</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the Specific Filter folder of either the Main Mode or Quick Mode folders, click the column heading for the property that you want to browse. If you click the column heading again, the list will be sorted in reverse order.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Browse through the list to find the filter.</maml:para></maml:section></maml:sections></maml:step></maml:procedure>

<maml:procedure><maml:title>To find a specific filter by searching</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Under either the Main Mode or Quick Mode folder, right-click the Specific Filter folder, and then click <maml:ui>Find Matching Filters</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the <maml:ui>Find Matching Filters</maml:ui> dialog box, select the criteria you want to search for, and then click <maml:ui>Search</maml:ui>.</maml:para>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>The <maml:ui>Find the best match only</maml:ui> option will find only one match, the one that best matches the criteria. If you do not see the filter you were searching for, try the search again using the <maml:ui>Find all matches</maml:ui> option. The source and destination choice <maml:ui>Any</maml:ui> does not search for any source or destination. Instead, the choice is used to find the "Any" source or destination, as listed in the Specific Filter list view.</maml:para></maml:alertSet>
</maml:section></maml:sections></maml:step></maml:procedure>
</maml:introduction></maml:section>

<maml:section><maml:title>Looking for signs of possible attacks</maml:title><maml:introduction>
<maml:para>The statistics collected and displayed by the IP Security Monitor snap-in can be useful when looking for possible attacks against this computer or other computers you have added to the snap-in. This information is located in the Statistics folders of both the Main Mode and Quick Mode folders. For more information about the statistics available, see <maml:navigationLink><maml:linkText>Monitoring Main Mode</maml:linkText><maml:uri href="mshelp://windows/?id=b2b916a7-bfd5-4432-bd4b-eea08787ecac"></maml:uri></maml:navigationLink> or <maml:navigationLink><maml:linkText>Monitoring Quick Mode</maml:linkText><maml:uri href="mshelp://windows/?id=42f82bec-7716-4592-b2f6-f12b005e24ad"></maml:uri></maml:navigationLink>.</maml:para>
</maml:introduction></maml:section>

<maml:section><maml:title>Viewing security associations</maml:title><maml:introduction>
<maml:para>A security association (SA) is the combination of a negotiated key, security protocol, and security parameters index (SPI), which together define the security used to protect the communication from sender to receiver. By looking at the SAs for this computer, you can determine which computers have connections with this computer, which type of data integrity and encryption is being used for that connection, and other information.</maml:para>
<maml:para>This information can be helpful when you are testing IPsec policies or troubleshooting access issues.</maml:para>
</maml:introduction></maml:section>

<maml:section><maml:title>Changing other settings</maml:title><maml:introduction>
<maml:para>You can configure whether the snap-in automatically refreshes the information it provides. You can also configure how often it is refreshed and whether the views display IP addresses or DNS names.</maml:para>

<maml:procedure><maml:title>To configure automatic refresh</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Under the IP Security Monitor folder, right-click the computer's node, and then click <maml:ui>Properties</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para> In the computer <maml:ui>Properties</maml:ui> dialog box, select the <maml:ui>Enable auto refresh</maml:ui> check box.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>To change the frequency with which the snap-in updates the information, type the preferred interval.</maml:para>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>By default, automatic refresh is enabled with an interval of 45 seconds. Configuring the automatic refresh too frequently might lead to performance problems, especially when you are monitoring multiple computers from the snap-in and you have enabled DNS name resolution.</maml:para></maml:alertSet>
</maml:section></maml:sections></maml:step></maml:procedure>

<maml:procedure><maml:title>To view IP addresses as DNS names</maml:title><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>Right-click the computer's node in the IP Security Monitor snap-in, and then click <maml:ui>Properties</maml:ui>.</maml:para></maml:section></maml:sections></maml:step><maml:step><maml:sections><maml:section><maml:title></maml:title><maml:para>In the computer <maml:ui>Properties</maml:ui> dialog box, select the <maml:ui>Enable DNS name resolution</maml:ui> check box, and then click <maml:ui>OK</maml:ui>.</maml:para>
<maml:alertSet class="note"><maml:title>Notes </maml:title><maml:alert>DNS name resolution is not enabled by default. It works only in the Quick Mode Specific Filter view and in the Security Associations view for both Main Mode and Quick Mode.</maml:alert><maml:alert> DNS name resolution might affect performance if many items need to be resolved in this view.</maml:alert><maml:alert>To resolve the DNS name from its IP address, the appropriate reverse domains and pointer (PTR) resource records must be configured on your DNS infrastructure. PTR resource records can be configured either manually or through the use of DNS dynamic update. To resolve the NetBIOS computer name of a computer from its IP address, NetBIOS over TCP/IP must be enabled on the computer.</maml:alert></maml:alertSet>
</maml:section></maml:sections></maml:step></maml:procedure>
</maml:introduction></maml:section>

</maml:sections>
</maml:section><maml:section><maml:title>Additional references</maml:title><maml:introduction><maml:list class="unordered"><maml:listItem><maml:para><maml:navigationLink><maml:linkText>Active Policy</maml:linkText><maml:uri href="mshelp://windows/?id=c181d1b6-f5b3-4251-9787-55b308a3b771"></maml:uri></maml:navigationLink></maml:para></maml:listItem><maml:listItem><maml:para><maml:navigationLink><maml:linkText>Monitoring Quick Mode</maml:linkText><maml:uri href="mshelp://windows/?id=42f82bec-7716-4592-b2f6-f12b005e24ad"></maml:uri></maml:navigationLink></maml:para></maml:listItem><maml:listItem><maml:para><maml:navigationLink><maml:linkText>Monitoring Main Mode</maml:linkText><maml:uri href="mshelp://windows/?id=b2b916a7-bfd5-4432-bd4b-eea08787ecac"></maml:uri></maml:navigationLink></maml:para></maml:listItem></maml:list></maml:introduction></maml:section></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>Monitoring Main Mode</maml:title><maml:introduction>
<maml:para>Main Mode Internet Key Exchange (IKE) negotiation establishes a secure channel, known as the Internet Security Association and Key Management Protocol (ISAKMP) security association (SA), between two computers. The ISAKMP SA is used to protect subsequent key exchanges between peer computers, known as Quick Mode negotiation. To establish the secure channel, Main Mode negotiation determines a set of cryptographic protection suites, exchanges keying material to establish the shared secret key, and authenticates computer identities.</maml:para>
<maml:para>Monitoring Main Mode SAs can provide information about which peers are currently connected to this computer, when the SA was formed, which protection suite was used to form the SA, and other information.</maml:para>
</maml:introduction><maml:content><maml:sections><maml:section><maml:title>Generic filters</maml:title><maml:introduction>
<maml:para>Generic filters are IP filters that are configured to use any of the IP address options as either a source or destination address. IPsec allows you to use keywords, such as <maml:ui>My IP Address</maml:ui>, <maml:ui>DNS Server</maml:ui>, <maml:ui>DHCP Server</maml:ui>, <maml:ui>WINS Servers</maml:ui>, and <maml:ui>Default Gateway</maml:ui>, in the configuration of filters. When keywords are used, generic filters show the keywords in the IP Security Monitoring snap-in. Specific filters are derived by expanding keywords into IP addresses.</maml:para>
</maml:introduction>

<maml:sections>
<maml:section><maml:title>Adding, removing, and sorting columns</maml:title><maml:introduction>
<maml:para>You can add, remove, rearrange, and sort by these columns in the results pane:</maml:para>

<maml:list class="unordered"><maml:listItem><maml:para><maml:phrase>Name</maml:phrase>.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Source</maml:phrase>. This is the IP address of the packet source.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Destination</maml:phrase>. This is the IP address of the packet destination.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>IKE Policy</maml:phrase>. This is the name of the IKE policy associated with this generic filter, not the name of the IPsec policy that you created using the IPsec Policy snap-in. The policy details, such as which set of cryptographic algorithms was used, can be viewed in the IKE Policy item.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Authentication Methods</maml:phrase>. This is a list of all the authentication methods available to the filter, in order of preference.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Connection Type</maml:phrase>. This is the type of connection that this filter is applied to, either local area network (LAN), remote access, or all network connection types.</maml:para></maml:listItem>
</maml:list>
</maml:introduction></maml:section>
</maml:sections>
</maml:section><maml:section><maml:title>Specific filters</maml:title><maml:introduction>
<maml:para>Specific filters are expanded from generic filters by using the IP addresses of the source or destination computer for the actual connection. For example, if you have a filter that used the <maml:ui>My IP Address</maml:ui> option as the source address and the <maml:ui>DHCP Server</maml:ui> option as the destination address, then when a connection is formed using this filter, a filter that has your computer's IP address and the IP address of the DHCP server that this computer uses is automatically created.</maml:para>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>The IP Security Monitor snap-in can also resolve IP addresses to DNS names for the Specific Filters folder in the Quick Mode folder, but not in the Main Mode folder.</maml:para></maml:alertSet>
</maml:introduction>

<maml:sections>
<maml:section><maml:title>Adding, removing, and sorting columns</maml:title><maml:introduction>
<maml:para>You can add, remove, rearrange, and sort by these columns in the results pane:</maml:para>
<maml:list class="unordered"><maml:listItem><maml:para><maml:phrase>Name</maml:phrase>.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Source</maml:phrase>. This is the IP address of the packet source.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Destination</maml:phrase>. This is the IP address of the packet destination.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Direction</maml:phrase>. This specifies whether the filter is inbound or outbound.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>IKE Policy</maml:phrase>. This is the name of the IKE policy, not the name of the IPsec policy that you created using the IPsec Policy snap-in. The policy details, such as which set of cryptographic algorithms was used, can be viewed in the IKE Policy item.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Authentication Methods</maml:phrase>. This is a list of all the authentication methods available to the filter, in order of preference.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Weight</maml:phrase>. This is the priority the IPsec service gives to the filter. Weight is derived from a number of factors. For more information about filter weights, see <maml:navigationLink><maml:linkText>http://go.microsoft.com/fwlink/?LinkId=62212</maml:linkText><maml:uri href="http://go.microsoft.com/fwlink/?LinkId=62212"></maml:uri></maml:navigationLink>.</maml:para>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>The weight property is always set to 0 on computers running Windows Vista®, Windows Server® 2008, or later versions of Windows.</maml:para></maml:alertSet></maml:listItem>
</maml:list>

</maml:introduction></maml:section>
</maml:sections>
</maml:section><maml:section><maml:title>IKE policies</maml:title><maml:introduction>
<maml:para>The IKE policy refers to the integrity or encryption methods that the two peer computers can negotiate with in the Main Mode key exchange.</maml:para>
</maml:introduction></maml:section><maml:section><maml:title>Statistics</maml:title><maml:introduction>
<maml:para>This table displays the statistics available from the Main Mode Statistics view:</maml:para>

<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>Some of these statistics do not apply to computers running Windows Vista, Windows Server 2008, or later versions of Windows.</maml:para></maml:alertSet>

<maml:table>
<maml:tableHeader><maml:row><maml:entry><maml:para>IKE Statistic</maml:para></maml:entry><maml:entry><maml:para>Description</maml:para></maml:entry></maml:row></maml:tableHeader>
<maml:row><maml:entry><maml:para>Active Acquire</maml:para></maml:entry><maml:entry><maml:para>An acquire is a request by the IPsec driver to have IKE perform a task. The Active Acquire statistic includes the outstanding request and the number of queued requests, if any. Typically, the number of active acquires is 1. Under a heavy load, the number of active acquires is 1 and the number of requests that are queued by IKE for processing increases.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Active Receive</maml:para></maml:entry><maml:entry><maml:para>The number of IKE messages received that are queued for processing.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Acquire Failures</maml:para></maml:entry><maml:entry><maml:para>The number of times that an acquire has failed.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Receive Failures</maml:para></maml:entry><maml:entry><maml:para>The number of times that the Windows Sockets <maml:phrase>WSARecvFrom()</maml:phrase> function has failed while receiving IKE messages.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Send Failures</maml:para></maml:entry><maml:entry><maml:para>The number of times that the Windows Sockets <maml:phrase>WSASendTo() </maml:phrase>function has failed while sending IKE messages.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Acquire Heap Size</maml:para></maml:entry><maml:entry><maml:para>The number of entries in the acquire heap, which stores active acquires. This number increases under a heavy load and then gradually decreases over time, as the acquire heap is cleared.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Receive Heap Size</maml:para></maml:entry><maml:entry><maml:para>The number of entries in the IKE receive buffers for incoming IKE messages.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Authentication Failures</maml:para></maml:entry><maml:entry><maml:para>The total number of identity authentication failures (Kerberos, certificate, and preshared key) that occurred during Main Mode negotiation. If you are having difficulty communicating securely, attempt the communication and refer to this statistic to see if this number increases. If it does, check your authentication settings for either an unmatched authentication method or an incorrect authentication method configuration (for example, the use of preshared keys that do not match).</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Negotiation Failures</maml:para></maml:entry><maml:entry><maml:para>The total number of negotiation failures that occurred during Main Mode or Quick Mode negotiations. If you are having difficulty communicating securely, attempt the communication and refer to this statistic to see if this number increases if this number increases. If it does, check your authentication and security method settings for an unmatched authentication method, an incorrect authentication method configuration (for example, the use of preshared keys that do not match), or unmatched security methods or settings.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Invalid Cookies Received</maml:para></maml:entry><maml:entry><maml:para>A cookie is a value contained in a received IKE message that is used by IKE to find the state of an active Main Mode. A cookie in a received IKE message that cannot be matched with an active Main Mode is invalid.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Total Acquire</maml:para></maml:entry><maml:entry><maml:para>The total number of work requests submitted by IKE to the IPsec driver.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Total Get SPI</maml:para></maml:entry><maml:entry><maml:para>The total number of requests submitted by IKE to the IPsec driver to obtain a unique Security Parameters Index (SPI).</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Key Additions</maml:para></maml:entry><maml:entry><maml:para>The number of outbound Quick Mode SAs added by IKE to the IPsec driver.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Key Updates</maml:para></maml:entry><maml:entry><maml:para>The number of inbound Quick Mode SAs added by IKE to the IPsec driver.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Get SPI Failures</maml:para></maml:entry><maml:entry><maml:para>The number of failed requests submitted by IKE to the IPsec driver to obtain a unique SPI.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Key Addition Failures</maml:para></maml:entry><maml:entry><maml:para>The number of failed outbound Quick Mode SA addition requests submitted by IKE to the IPsec driver.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Key Update Failures</maml:para></maml:entry><maml:entry><maml:para>The number of failed inbound Quick Mode SA addition requests submitted by IKE to the IPsec driver.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>ISADB List Size</maml:para></maml:entry><maml:entry><maml:para>The number of Main Mode state entries, including negotiated Main Modes, Main Modes in progress, and Main Modes that failed and have not been deleted.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Connection List Size</maml:para></maml:entry><maml:entry><maml:para>The number of Quick Mode state entries.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>IKE Main Mode</maml:para></maml:entry><maml:entry><maml:para>The total number of successful SAs created during Main Mode negotiations.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>IKE Quick Mode</maml:para></maml:entry><maml:entry><maml:para>The total number of successful SAs created during Quick Mode negotiations. Because there are typically multiple Quick Mode SAs created for each Main Mode SA, this number does not necessarily match the Main Mode number.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Soft Associations</maml:para></maml:entry><maml:entry><maml:para>The total number of negotiations that resulted in the use of plaintext (also known as soft SAs). This typically reflects the number of associations formed with computers that did not respond to Main Mode negotiation attempts. This can include both computers that are not IPsec-compatible and computers that are IPsec-compatible but do not have IPsec policy to negotiate security with this IPsec peer. Although soft SAs are not the result of Main Mode and Quick Mode negotiations, they are still treated as Quick Mode SAs.</maml:para></maml:entry></maml:row>
<maml:row><maml:entry><maml:para>Invalid Packets Received</maml:para></maml:entry><maml:entry><maml:para>The number of received IKE messages that are invalid, including IKE messages with invalid header fields, incorrect payload lengths, and incorrect values for the responder cookie (when it should be set to 0). Invalid IKE messages are commonly caused by stale retransmitted IKE messages or an unmatched preshared key between the IPsec peers.</maml:para></maml:entry></maml:row>
</maml:table>
<maml:alertSet class="note"><maml:title>Note </maml:title><maml:para>Some of these statistics can be used to detect network attack attempts.</maml:para></maml:alertSet>
</maml:introduction></maml:section><maml:section><maml:title>Security associations</maml:title><maml:introduction>
<maml:para>This view displays the active SAs with this computer. An SA is the combination of a negotiated key, security protocol, and SPI, which together define the security used to protect the communication from sender to receiver. Therefore, by looking at the security associations for this computer, you can determine which computers have connections with this computer, which type of data integrity and encryption is being used for that connection, and other information.</maml:para>
<maml:para>This information can be helpful when you are testing IPsec policies and troubleshooting access issues.</maml:para>
</maml:introduction>
<maml:sections>
<maml:section><maml:title>Adding, removing, and sorting columns</maml:title><maml:introduction>
<maml:para>You can add, remove, rearrange, and sort by these columns in the results pane:</maml:para>
<maml:list class="unordered"><maml:listItem><maml:para><maml:phrase>Me</maml:phrase>. This is the local computer IP address.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>My ID</maml:phrase>. This is the local computer DNS name.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Peer</maml:phrase>. This is the remote computer or peer IP address.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Peer ID</maml:phrase>. This is the remote computer or peer DNS name.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Authentication </maml:phrase>. This is the authentication method used in creating the SA.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Encryption</maml:phrase>. This is the encryption method used by the SA for Quick Mode key exchanges.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Integrity</maml:phrase>. This is the data integrity method used by the SA for Quick Mode key exchanges.</maml:para></maml:listItem>
<maml:listItem><maml:para><maml:phrase>Diffie-Hellman</maml:phrase>. This is the Diffie-Hellman group used to create the Main Mode SA.</maml:para>
</maml:listItem>
</maml:list>
</maml:introduction></maml:section>
</maml:sections>
</maml:section><maml:section><maml:title>Additional references</maml:title><maml:introduction><maml:list class="unordered"><maml:listItem><maml:para><maml:navigationLink><maml:linkText>Monitoring IPsec</maml:linkText><maml:uri href="mshelp://windows/?id=56657011-52e2-4d7c-a5e1-8c16dbe476fd"></maml:uri></maml:navigationLink></maml:para></maml:listItem><maml:listItem><maml:para><maml:navigationLink><maml:linkText>Monitoring Quick Mode</maml:linkText><maml:uri href="mshelp://windows/?id=42f82bec-7716-4592-b2f6-f12b005e24ad"></maml:uri></maml:navigationLink></maml:para></maml:listItem></maml:list></maml:introduction></maml:section></maml:sections></maml:content></maml:conceptual><maml:conceptual contentType="conceptual" xmlns:maml="http://schemas.microsoft.com/maml/2004/10" xmlns:dev="http://schemas.microsoft.com/maml/dev/2004/10"><maml:title>Active Policy</maml:title><maml:introduction>
<maml:para>The Active Policy item of the IP Security Monitor snap-in describes the Internet Protocol security (IPsec) policy that has been applied to this computer. You cannot use the IP Security Monitor snap-in to change the policy.</maml:para>

<maml:para>Only one IPsec policy can be active at a time. The active policy is the IPsec policy that has been applied to this computer, either manually by the administrator of this computer or through the use of Active Directory Domain Services (AD DS) and Group Policy objects (GPOs). The active policy might be defined using GPOs instead of on the computer in the IP Security Policies snap-in.</maml:para>
</maml:introduction><maml:content><maml:sections><maml:section><maml:title>Name and Description</maml:title><maml:introduction>
<maml:para>This is the name and description given to the policy when it was created.</maml:para>
</maml:introduction></maml:section><maml:section><maml:title>Last Modified</maml:title><maml:introduction>
<maml:para>This is the time and date (local time) when the policy was last changed.</maml:para>
</maml:introduction></maml:section><maml:section><maml:title>Store</maml:title><maml:introduction>
<maml:para>This is where the policy is stored, in the local store (on the local computer) or in a GPO.</maml:para>
</maml:introduction></maml:section><maml:section><maml:title>Path</maml:title><maml:introduction>
<maml:para>This is the Active Directory Lightweight Directory Access Protocol (LDAP) path that describes the exact, fully-qualified location in AD DS for the IPsec policy that has been applied to this computer. This only applies to policies stored in GPOs in AD DS. Locally stored policies will not have this path.</maml:para>
</maml:introduction></maml:section><maml:section><maml:title>Organizational Unit</maml:title><maml:introduction>
<maml:para>This is the LDAP path that describes the exact, fully-qualified Active Directory organizational unit (OU) to which the policy was applied. This only applies to policies stored in a GPO in AD DS. Locally stored policies will not have an OU.</maml:para>
</maml:introduction></maml:section><maml:section><maml:title>Group Policy Object Name</maml:title><maml:introduction>
<maml:para>This is the name of the GPO and not the IPsec policy. This only applies to policies stored in GPOs in AD DS. Locally stored policies will not have a GPO name.</maml:para>
</maml:introduction></maml:section><maml:section><maml:title>Additional references</maml:title><maml:introduction><maml:list class="unordered"><maml:listItem><maml:para><maml:navigationLink><maml:linkText>Monitoring IPsec</maml:linkText><maml:uri href="mshelp://windows/?id=56657011-52e2-4d7c-a5e1-8c16dbe476fd"></maml:uri></maml:navigationLink></maml:para></maml:listItem></maml:list></maml:introduction></maml:section></maml:sections></maml:content></maml:conceptual><?xml version="1.0" encoding="utf-8"?>
<HelpCollection Id="ipsecmonitor" DTDVersion="1.0" FileVersion="" LangId="1033" Copyright="© 2005 Microsoft Corporation. All rights reserved." Title="IPsec Monitor" xmlns="http://schemas.microsoft.com/help/collection/2004/11">
	<CompilerOptions CompileResult="H1S" CreateFullTextIndex="Yes" BreakerId="Microsoft.NLG.en.WordBreaker">
		<IncludeFile File="ipsecmonitor.H1F" />
	</CompilerOptions>
	<TOCDef File="ipsecmonitor.H1T" Id="ipsecmonitor_TOC" />
	<VTopicDef File="ipsecmonitor.H1V" />
	<KeywordIndexDef File="ipsecmonitor_AssetId.H1K" />
	<KeywordIndexDef File="ipsecmonitor_BestBet.H1K" />
	<KeywordIndexDef File="ipsecmonitor_LinkTerm.H1K" />
	<KeywordIndexDef File="ipsecmonitor_SubjectTerm.H1K" />
	<ItemMoniker Name="!DefaultTOC" ProgId="HxDs.HxHierarchy" InitData="AnyString" />
	<ItemMoniker Name="!DefaultFullTextSearch" ProgId="HxDs.HxFullTextSearch" InitData="AnyString" />
	<ItemMoniker Name="!DefaultAssetIdIndex" ProgId="HxDs.HxIndex" InitData="AssetId" />
	<ItemMoniker Name="!DefaultBestBetIndex" ProgId="HxDs.HxIndex" InitData="BestBet" />
	<ItemMoniker Name="!DefaultAssociativeIndex" ProgId="HxDs.HxIndex" InitData="LinkTerm" />
	<ItemMoniker Name="!DefaultKeywordIndex" ProgId="HxDs.HxIndex" InitData="SubjectTerm" />
</HelpCollection><?xml version="1.0" encoding="utf-8"?>
<HelpFileList xmlns="http://schemas.microsoft.com/help/filelist/2004/11">
	<File Url="assets\42f82bec-7716-4592-b2f6-f12b005e24ad.xml" />
	<File Url="assets\56657011-52e2-4d7c-a5e1-8c16dbe476fd.xml" />
	<File Url="assets\b2b916a7-bfd5-4432-bd4b-eea08787ecac.xml" />
	<File Url="assets\c181d1b6-f5b3-4251-9787-55b308a3b771.xml" />
</HelpFileList><?xml version="1.0" encoding="utf-8"?>
<VTopicSet DTDVersion="1.0" xmlns="http://schemas.microsoft.com/help/vtopic/2004/11">
	<Vtopic Url="assets\42f82bec-7716-4592-b2f6-f12b005e24ad.xml" RLTitle="Monitoring Quick Mode">
		<Attr Name="assetid" Value="42f82bec-7716-4592-b2f6-f12b005e24ad" />
		<Keyword Index="AssetId" Term="42f82bec-7716-4592-b2f6-f12b005e24ad" />
		<Keyword Index="AssetId" Term="42f82bec-7716-4592-b2f6-f12b005e24ad1033" />
		<Attr Name="appliesToProduct" Value="Windows 7" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="appliesToSite" Value="BWCOnly" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1807" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="42f82bec-7716-4592-b2f6-f12b005e24ad" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\56657011-52e2-4d7c-a5e1-8c16dbe476fd.xml" RLTitle="Monitoring IPsec">
		<Attr Name="assetid" Value="56657011-52e2-4d7c-a5e1-8c16dbe476fd" />
		<Keyword Index="AssetId" Term="56657011-52e2-4d7c-a5e1-8c16dbe476fd" />
		<Keyword Index="AssetId" Term="56657011-52e2-4d7c-a5e1-8c16dbe476fd1033" />
		<Attr Name="appliesToProduct" Value="Windows 7" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="appliesToSite" Value="BWCOnly" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1807" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="56657011-52e2-4d7c-a5e1-8c16dbe476fd" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\b2b916a7-bfd5-4432-bd4b-eea08787ecac.xml" RLTitle="Monitoring Main Mode">
		<Attr Name="assetid" Value="b2b916a7-bfd5-4432-bd4b-eea08787ecac" />
		<Keyword Index="AssetId" Term="b2b916a7-bfd5-4432-bd4b-eea08787ecac" />
		<Keyword Index="AssetId" Term="b2b916a7-bfd5-4432-bd4b-eea08787ecac1033" />
		<Attr Name="appliesToProduct" Value="Windows 7" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="appliesToSite" Value="BWCOnly" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1807" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="b2b916a7-bfd5-4432-bd4b-eea08787ecac" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
	<Vtopic Url="assets\c181d1b6-f5b3-4251-9787-55b308a3b771.xml" RLTitle="Active Policy">
		<Attr Name="assetid" Value="c181d1b6-f5b3-4251-9787-55b308a3b771" />
		<Keyword Index="AssetId" Term="c181d1b6-f5b3-4251-9787-55b308a3b771" />
		<Keyword Index="AssetId" Term="c181d1b6-f5b3-4251-9787-55b308a3b7711033" />
		<Attr Name="appliesToProduct" Value="Windows 7" />
		<Attr Name="appliesToProduct" Value="Windows Server 2008 R2" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2DATACENTERSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISEIA64SERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2ENTERPRISESERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2STANDARDSERVER" />
		<Attr Name="APPLIESTOPRODUCTSPECIFIC" Value="WS08R2WEBSERVER" />
		<Attr Name="appliesToSite" Value="BWCOnly" />
		<Attr Name="CommunityContent" Value="1" />
		<Attr Name="WillHaveMamlFeed" Value="True" />
		<Attr Name="zzpub_assetBug" Value="1807" />
		<Attr Name="zzpub_MtpsProductFamily" Value="WS" />
		<Attr Name="zzpub_MTPSVersion" Value="11" />
		<Attr Name="Locale" Value="kbEnglish" />
		<Attr Name="AssetID" Value="c181d1b6-f5b3-4251-9787-55b308a3b771" />
		<Attr Name="TopicType" Value="kbArticle" />
	</Vtopic>
</VTopicSet><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpTOC>
<HelpTOC xmlns="http://schemas.microsoft.com/help/toc/2004/11" DTDVersion="1.0" Id="ipsecmonitor_TOC" FileVersion="" LangId="1033" ParentNodeIcon="Book" PluginStyle="Hierarchical">
	<HelpTOCNode Url="mshelp://windows/?tocid=c145eed5-7a32-490a-a4a7-ff1c42cfd67c" Title="">
		<HelpTOCNode Url="mshelp://windows/?id=56657011-52e2-4d7c-a5e1-8c16dbe476fd" Title="Monitoring IPsec">
			<HelpTOCNode Url="mshelp://windows/?id=c181d1b6-f5b3-4251-9787-55b308a3b771" Title="Active Policy" />
			<HelpTOCNode Url="mshelp://windows/?id=b2b916a7-bfd5-4432-bd4b-eea08787ecac" Title="Monitoring Main Mode" />
			<HelpTOCNode Url="mshelp://windows/?id=42f82bec-7716-4592-b2f6-f12b005e24ad" Title="Monitoring Quick Mode" />
		</HelpTOCNode>
	</HelpTOCNode>
</HelpTOC><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="AssetId" /><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="BestBet" /><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="LinkTerm" /><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="SubjectTerm" /> Հy`!vGEO~ndlcv;ER ‚Th');WI*DTT$WIF "eD`x3g?y
pDDEtq7lHk\j`B ihJ3"J@?@GAEhFl45@T= jH&QqYS5lp`v2;ّqo~=Bo)_yY>y9<Wy_\c-sӱ:džF3ctl&Msm?y>~tŸnyrϷб~u%/sƏ)9jty/z08^Z'}ws>q:"x/v__-q߾n\CO!?7wm-i|׷|yok[px9淞o~U~^݆|
/ɻ8KN:6'ߥm;y~wsxϣvFQuʝUmv\+|ۿC'-yC}_zz~z0iw86IzS$.W4}A.sOJt$SwyyQoyQ_޾f{ώvv.;<⯜7<h_۳l
P7PNcԖyV-̞|%=gG|Mmz&myklo_C}V>^ҳy6ƿM[+=lz^:wփu}[]4wll\gޮgل\m\sԳe&<kٟ^{K=g?nX}Ma=s
?a}_>v$z^dч5mo~ˍo}[+z}k[3Nַ~	o
~NԧV5k$SokfhNY[ksnnpw.}wnߝq{߹}s{_s6]ܾ7}s݊ﻛ[UͽAνs{U
돜}Us꓾:k.(-׻^|_-vZS___
__#?'@__+D/H_Ծf|R}RKW}R}Rg
o}R~Mv~|||Ů|_[/_v]'|˾vm7|׾|֩|v}}Rڥxۃq;h97%;||;r;s<WyuE}A~ZWq>|k
y<\NݏX}~zxÁ`<<h ãѵo$x˘k7o߻?ŕ?\VsxgSuJ?wjx5_7wGn'$_>y?9K]qӾ}Rv&tP9ў)9:KSJV{tT鼫N):tJguN靳)=S:=:SJ{t{JtJ{t\\N)ҝ))Yҝ):tg{JtJgvO9)9:S>S:3>:S>S:3>:'S/>S:|JtfƧJv|t|JtȧJLvOΒ<O\OΖ|N):Ssk>S:;t>h9:SJvN)ҙS:wJOOΟ9˝S:}JtЧJLwN)YG):Ss;txlO9ҝQ)9U);t|μN)ҙS:s;tOί9a)>:SJ}t}Jtι:SJxO)1t2y~Ǽ/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋ.%C};ߣC|Gp4͏!4m~
!GC4o~

GC0h8$|4:?CGh=?CGaP>W>

GC4~
CGp$~4
GC4D~
CG!4\~
æGh>_>
0ԏ!h4|?RGphH|4T?a~4
8ÜGhfZ?ÝGp|4{>

Gáh~>
GC04~
@Gáp$}4>
FGðhL}4*>
CG!qk>(0``00``00``00``00``00``00``00``0kj"""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""""#"r>y5~g8~G{8uisQSyޛS佩\|ね7wN{o}A<YN 0S8Y>qx>!Eweb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#FR8LLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLLcdy2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!kwn	Ysu湝\ć?ԅą¸p.\…p\.¸p.\…qᅫ…p\.¸p.\…p\.n…q7G¸p.\…p\<7ys]p\.¸p.\\<Ů᮸p.\…p\.¸p.\…p\.{HC؎h;펷>|trG}u>D} W#GyoP2V}{X}6^}h^<>}Aj >xB"f_w.\q1X<M44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM4ݿOmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[ջmkyc4MM4wm
44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MMӷ=q!mV[[mVmV[[mVmV[[mVZnjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjݶǵⳚƦiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii۞ow߽MwM;q.ƅ(.6kjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjviiiiiiiiiiiiiiiiiiiiiii
5^iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiۚiiiiiiiiiiiiiiiiiiiiiiiiiiii44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM6iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii|s/M4M<^[4پٟHK$[%}c|uN~vV|ϖ۬W;Kco~pP>u/{v.~{}*_<n˯Os&x_oџ9"/Ooowy6|`4 6"`&?a+
AZQ
Qt0ݴOLxe\)1j'ڮ<+33A~Ϋu{qz]9]
'!ZJ/ѤW	exNHKF%ՌGYE	eJR56[q+˿ve!2D"4$fc'ü@ys;.a!ͼ?Gy$9V́+(;9Lf^[IdB/>n-2/@j*QTB6*iǰQ j(k(APH΁a6}Z\7<o]"a{~O|ZStlAThLk|	OZreY{8W4QJBLr8(ldS30HvfuC5UAV-SjfB'/$tMd6jOY0+҉)[jC+ݘ?hkN+0kTƬ):Ljӕ̈́GOCſ`W&GkMIFmDaaak'fpj&720QJCxĢhŘ2=t+a:W+>)
܈	Wr峜\`=[~@௡sBYC8C3SpE3#W-
z#;Uέ_Ao8X!;63G¼8ќ-Yo7R(e۳:J7:MzSof}{]5v0a&9v4+ \k5zQ&Bj%Kj6ҍ,}@&/ȵ1v7fgOw'>XG|%l	#ifuu`"`Z$dTg$ԑyauB|OO֕ZJx"8WwaACdnC3&2[wF6e+~(ɍ83c*RAQՈ\-G1!=2$`z4:"CY_2)KۛII~t4ח#V)ŸA}]ao߉
i<LfivTY>`P9C.XGhumJ!ƴZwٱi"h_8-Ak=Y٫%j_3	 9uR[wHUcGV3hۖvt[<lȓ^2o3Ȧ@*q5֎-hnx@x֖6)CzL9B!:C]ѼoG$+#y~>qLg=9`Kf@g)H8e2¼ݧ  +uLJdq;D>1EI9C#<3@M>>l=p/0
P^T^ܦ#D<@!Aoa#$-sq4aFl&.DXKJUj`X\@u9A>"5 Cf,%N13&<YŪ2
k.^i8ǫb(T世CkF#zv[|Qr?/AꙨQ(
&'^;{R-bR~*4IHEv⦊6Or	2dƼB	,5wDN Dw_C"KcdM:;sfZV
bQ
mbkb2`u%_"EҎ'AHF0aĞ̵a_+͂Y_Th4FՑ,&DAʵDξuč橥׺&z[U0
D$fWGATF^?'O؁sċZ@n|~+9$uY<0͛LET~	4;*irc\NHF2oQ?r"P9R 6࢚If37.Ӿ׫PլkD"petr:=SR%b|mܟ̾_ߝF2Ŷ`<
mCkbo9V^2 a5nv~*?Nܶo5
3ɕ?|~;3ػ-7{r""|*uV	UD>t<J%\6/Ůs
RC僕iJ_x7┨
h+͹&OԺ~B<<ԋI\b֧Ħ[
pqOsMdՕg
MW~^{A3%
h=4TkO@~i(S.2wݵ8N&Cj+yѝgvx^˴謘ɷx9e]B)`ԍ?X'?n
jϱ@~۬X;Qw[_&p[1CmI &zfǭ"bE.5~H=Ql3^'{ ,JS܏n\t]8!g`JGHؙWNCQ>p$GA0W-K^R[駞[3<i9j߰.d𾵯+3=Ov鬾hhw#n_6}Յʼnu_.8K]ꗪ4%¢YېhN[_"΢hzٷVb%g:ʻhgӹ[PK]߁uzOirW'š`~.N,!+A
T; DklPʬqcmBoC?UW$4>|qC`:{-wl蟕P-W156Dn}瓗SPMl{Ch-ҝmqTh ש<<Kj[?mlkiϝ`˾X|"oKu(
pc)D:OLR{Kb$z9#Y61ZNfZEw;;,]薤`4]f[Xv@}ҟ\}6Z*j\L"3tɐߧS*o~	_Y~Y Tn\fT`	Zo~D\]D<ڌĞ$wWưFS^Փ{;KCJ׾)fsƫfMgCͨK_KKR%ImvUɨ"(	0ӺG.!?άqpXQj&;_$,znҰ0lcP¼r]q@LQdTDDk)
k;r
z_N5J3C86[HT_ئˎRZH54"
wWL*Smȣ+_-ؤ~)5ީ#eVpRZQl[_"՛'WI0.[>fM(K<AuvJ;@&2[Ĥ<Ju/+|2C.IPㄊ:ǐ
dytEa_6jŅߡˆخP-"ma01F? )qֽ>ɓ3Y
GeY[;OTsv}֛NE.g[ 2q"ވ(
{rºrS}" UYJܺX\LJJJ>r%*J_bq5S~6='v3'RYQh4|gӣߝ~g+D9=.XYsƎ3aJo4%HˠXl}ZGy;&U{N_Ujmh;䑅sVci&;:q	)\'QvwYE)RԈ#EN4L٤ 4ۧA6io儏_p7Je;!A֒V
R;^wcW׎GrXesJjr<CrAR\Lu4||A&jKx8O_ِٷu[@əOIlN'rөmlc%F%iF;6>o*
zطjCrvϴk?ӣ5Z_e#?dm)@f7og;m)n}`cv~W =	Z[Kl8HO,=KHm*Xs(A9<<>MC'ɵ%M:$
v0xIu5*KLXZCݻj)gLH"x_iRBQx|I`)хVGΎtlǗR֬]<\G1ih6YGU$)]oVS%jعqa]&Nךk"
?c*;r66Q%΢֍48^{kI|	n9cXNԟ5:c<if}#æ4L"Fa%ĕ
l;5go!Ƌ.!am;жgX΃s԰~
tɎ=*rSEYqǒG-T֮٦98fA&#>x6o|3B%Ue	OI=-^!CqY3$T!,@DPJ*K*YF[QM(4XJВvqrU{OIByVS9	 lJ:?v	N8Iz?RRӅɲeYmWװH7W*IU~P~C.JO'	}[5H"H%ljƁqt\aB,D
QՂb?=`B}nR+[3F @@  @ @1(
r@"2Z114mܲ姵V8F-iNV,Ԋ*s	20{W#7[vcs!O^Qo$?C>
PbV2/7<?"-EboG!P6m%4]Y?J
,CE`ɠ<0Y3Ƥw:vh[*I023Rgt
uoۻQ#]	<ȜbҌ?27̟E1V"ll L{}c</coڿ9KHfTkcARUuxlPi5$8^s5^Fbgz#v4qH7z[~4
`YlFظWYOYzL
Bg񲄁mUG-CWi'z&;	i|n'&u*i9B_yiBk'gD8F|36x)[:FL9~+#XM?/|7m8{V%Md(RB	ÃWVcD7LN~+^=
"PbiE֙5oq#}N`DWrT-jQ.,E=PH-v/q1-jd/t`/وL"Xs@Cq VwspBtA^%uM,)#τpoW=	AoN˲fv~V4q'q,\;{YޒʹaYMPUj {7Lb[URgOSE]CӊICު~9PmdP+@
2؞Vkp
)uѤLnAbiEU;*)x[OR"i/.W(e; :Zs[	QR)"+.r%+9t}ƪI>5Xօ	Xd"?9cGh`|
F0'E`bEfdMژWJ6eL~
5PHF.XYטԇz4`WYRjuaaÓv)wK5,r΅ ap&)=CfEZ1bo<D77!jOr wҭt"z6ƉsylE6(	|;ގAܣ*	W/m{"g11oykǗe@=AJ>C#]{yYun{@mp({C֔!rwgQp[PRʄzC-|S=R1`\D[R1ų=DW Xvxhs5g(ƣnbs=q4cʶd-Ƃ.rM>t<9v#*m8H		#b8?Á 160WD=w$p.]=ΩmAI@J1œtIP75rɫӵ)GCM[с7:⭢a5c5CE;g&O,[e(*9χ*Uܮ
Q@Om&ţ9M5l<x	{=$s`f
"Zi1Dz6̪;;f(-[#CtĻoq(8ݺ$>vbeᎶz"pecvE,a1OSBL6=cW+-R@ػTiح5҇Q ~ɵsRw9|w@dߠomh`uUٱw[2b><t8YiOxGSQp߀ӱƙ9TcӃPdvJuq3eY3?Y5#c0	V{]6n$[x^`ť?Rg9]Юbž19t%pKf5*BN2a0Zz@'QŢMP*{-[~W
)70nxl.qB\<|oj=OT'>}aBChҦGL[ØIXp^%Ew(#KxLJL_g:>ܤ̀5C,/C.lY?'umnTOUFƒRXɜKjӮHٻ-亸O;Bܴxk?ӟ$HBb9A7
:AE!Xa;A0pn%B	{vݞ9zeU~%;hdM(NK}tM(_˵"UQ*Q^#zo2Akñh0¶F]_d<+kž%Qab{an-Xh]
>ɫ쪘ؤd#œ'I靳I
I{ܝMnF:w7fTtafu^!ر̝cC_S(C0;5ZWʈd(i͎ďGUd˘I1(D#~dh.eKpص	WYQTxDUhj59_
NgK5+݇opݵ6NYxb\sH(%s-y?U'3P$MF;w-#)DKmv]*f(xPO87(.8尔h#ҁS%9PUk^rRLKޣ#[ex<h1X='jɛp:om;'Z"
 }jdF%=xNM96C?-êoT\OE\荏~;,x
Hߩ'd^T&)P2Mnk%5uաhO}js8tg`Vex"g.)iw&>cW)ܸMJHg&#zQ?!6+~vJnaSJ
G&n+)лzj"oLr_isoma;S4N8'K5TQlRzմn^3mj+	5g1x\4zYiCvm)FOY0
!sXE#Ռ
xYKal}FmR5,Z<.*4;+4޲Er$m'XQa	gGdۗ 
~<civ.۱rT
jbLV<Mk8<DjN-?&Cf
dkv
˜~7Jue0r啘$GWLE/Z\l{)IkKOהX=	RWڳ<k|S2xc|^H͔bYlyX](Nk2#GYz'9{1RbE#R
|O|L,~_pxXX%1Ĩ9a{
B_i\b]n5.=Z!/֩B
ͼߵJO#彍l%>K0ZIXB'.U	.
	Q9ΞۤGom̪Iݸveu%tKȤ.׆G:>e6`!0ɫX)gBB-|'!"pC;_Xct1|,WOqls-:)6_y
[G	7j5F;PHYS<9JD^Vm5brǥ-qNH39iPVS+M($.-bxhB;<\v2V6J69UW/U
b	hpDp
C[~	3gn
W~[NZ'~t@M}(3K)Erv~Na[@J@Zx֍%>2HԹ#|(/j[ʇqV7au;~KRVկ_)/h\hTwU|Ƕ.Q]ӒZMޢUhë$uA,VUUsUx=Rɦ4T^mt^akhE6Ld-7ĤpNLY-KOM:刐qU +زHCQ%*HNq9T!şH\ҁU$oK'ӕc}3&a2FI-q'RMF<Pj_o?,'28+g~tfhN<_10AnʬJAk(OXu͠+%tH<MR(Q$D)c÷H`2.a(!r<=Syv,>b_KGFhIфa3%.w"Ҷ. 
"e
^.;B`g|	L
~mf'
—g$!?:k	Ӏ`
.GKo1p~3*J.LNFO(ZMndF"E
!ķcsd_ۡ~[+X_whjՓ}Je
o>fo׏EAg}$,swr]a>^U֥/5JQ]Df`#=nOLE_ny_MECdJ\ef9}ZB*Umk،SxHխ4#7S}k`l	=G7%)?D/qnb3uDd3;0k0D=<9`6MS_gљA$g|OƬh#B]
Oᙰ +۬NG
TXj*>Oݜ5_«W3f%C<&43·'K7rq<88']1z]W|CBy7$LnW;Z3l
zvQ@֒fı4d[e(㧂
O^2!w;ơWVԻZrv#"r0ܥ+5F'('2Q9cUF[}r46T^NY9R
зjڞQ$ȠMW@?9!*@}uaA|OWPk;hpmg{3[abҢG*EK
La9A;bXY9iws1W(S+-q%c
#Z,Lѧ4RWs9x}9a|V1+,5XF01}ߏ@LAP9Cat	 LɄ9

/o@C/EC\A<gXhAՇaS%1<=ET}+ף. ώjA&c|	jgvY@s@  @@ ~6
!냍P	T|!`LA!zgҁܧGD8dN.t}nRWd4L:TV66aМLPQbU8SCAr%Qrƭ[i-4Tx?Uʄ("ٹj	
3"411Y'3\3Gq!J5	LPHu/eh[s[9B(ZAZD՛r*xv*I`decGk4`艂*,Q%LQQ wpbrI$w¥O<m%|ZeS$Q%v>6WP/r5E=1YБ
S* a0jm:gv>i#t
Kɷe\FΦqc}3{W0y?oӀ8?A|svl?y̻{`w,]L='
@PۥM(?}ٖ$穀O<C%wπ&E[p_i΁0玕cps{{+K8oҺySQ؀:|0MFnoepP=S$Pk
2k;oHفAh"GbVtpHT 7rw!]B5g'99ΊoiA:ke1L"mYu(zZ
 a7Rc."!!d&G`OQ:َFnAeHk(}\5CgKBv0򻎟޲۰nwGMN
'п p`txG?.潿qyңm–b;7}OpVl;W ;+bb5^~8jgHŮu~7j"_5ՄDώ_;$c|&VnE$MMm\(ywɵ`]F' @ @  jA#n(bfRN:A4&Mo>Hś^OaHvrQaXHHnN:o:!ЖXӅ(%1ͽ>uy
TQ6:Pfkl) n$լ
z9B۽wu
V:'a@Mo:珄Wr7~ws&@6hIYU|{iQnvЖ]G ȃ/~_}ǣ"OGH?gC Dq7 OPʩKfe?i`mп)i8)SēM4@  A=?>e:0ZIkCS?ܒE~9ȵE7];ȻvCzm3{9?G8i1hN@{WD/'cuk(av&}0H>sAO^rQzeNOW{B۠ݤiBOZ#H$J9}Ѩݣ(-]]wҦ{9CgRTZ-)ϒ{O	'SH"	Y[ptM
n<C|8I=4MN@{~pn!>vrꎓ=ɟC[ߪ{t  8:=1ڝ:FdrN{=u)9g
P"9xORwBn2/\8)e/첌~e+Ž]՚5'#Lw  k"Ԋ꺗ܻ}`CO߀2k$ 	d;Mt188 ykp(e$-mjzT:I-\>Yzz
Jij( QGSOxjkpTkFyV_Ԫ\J82ab8?Z7@}F4Q9c]!%ȧ<h_Hp</
3ʁ}/OE+i k2bV?g
]4`>t/v;~<$?)A&!?iH HHn[O$<Y'qS~P3٤0V&	,h"]O8v`tA`r@L෺/,5pGH)	ͯ6I_,Yt&$iTy^#Sw	{!K6>}K`uOzKJ+փepDH}|a}xYg.#`sy(WF@  @@  @@  @@ ?(Kr('E

Anon7 - 2022
AnonSec Team