MZ@ !L!This program cannot be run in DOS mode. $Rؕ3}3}3}H̴3}H̱3}Rich3}PEL!  dr@hc.rsrcpd@@0H H`x 8Ph !&',(-@3X4p56789?EL0~H`x            0 @ P ` p             0 @ P ` p  `t8|!d#>$H&,t'`)(+-.d0:1\2(44 p> HP T[anDbbeH(fvjRkoMUIcj(*s[ƌ 3_jy;tS MUI en-USInbound IP Packet v4 Layer"Inbound IP Packet v4 Discard LayerInbound IP Packet v6 Layer"Inbound IP Packet v6 Discard LayerOutbound IP Packet v4 Layer#Outbound IP Packet v4 Discard LayerOutbound IP Packet v6 Layer#Outbound IP Packet v6 Discard LayerIP Forward v4 LayerIP Forward v4 Discard LayerInbound Transport v4 Layer"Inbound Transport v4 Discard LayerInbound Transport v6 Layer"Inbound Transport v6 Discard LayerOutbound Transport v4 Layer#Outbound Transport v4 Discard LayerOutbound Transport v6 Layer#Outbound Transport v6 Discard LayerStream v4 LayerStream v4 Discard LayerStream v6 LayerStream v6 Discard LayerDatagram Data v4 LayerDatagram Data v4 Discard LayerDatagram Data v6 LayerDatagram Data v6 Discard LayerInbound ICMP Error v4 Layer#Inbound ICMP Error v4 Discard LayerInbound ICMP Error v6 Layer#Inbound ICMP Error v6 Discard Layer ALE Resource Assignment v4 Layer(ALE Resource Assignment v4 Discard Layer ALE Resource Assignment v6 Layer(ALE Resource Assignment v6 Discard LayerALE Listen v4 LayerALE Listen v4 Discard LayerALE Listen v6 LayerALE Listen v6 Discard LayerALE Receive/Accept v4 Layer#ALE Receive/Accept v4 Discard LayerALE Receive/Accept v6 Layer#ALE Receive/Accept v6 Discard LayerALE Connect v4 LayerALE Connect v4 Discard LayerALE Connect v6 LayerALE Connect v6 Discard LayerALE Flow Established v4 Layer%ALE Flow Established v4 Discard LayerALE Flow Established v6 Layer%ALE Flow Established v6 Discard LayerInbound Ethernet LayerOutbound Ethernet LayerIPsec KM Demux v4 LayerIPsec KM Demux v6 LayerIPsec v4 LayerIPsec v6 Layer IKE v4 Layer IKE v6 LayerPA RPC UM LayerRPC EPMAP LayerOutbound ICMP Error v4 Layer$Outbound ICMP Error v4 Discard LayerOutbound ICMP Error v6 Layer$Outbound ICMP Error v6 Discard LayerRPC EP ADD LayerRPC Proxy Connect LayerRPC Proxy Interface LayerIP Forward v6 LayerIP Forward v6 Discard Layer!Keying Module Authorization LayerName Resolution Cache v4 LayerName Resolution Cache v6 LayerALE Resource Release v4 LayerALE Resource Release v6 LayerALE Endpoint Closure v4 LayerALE Endpoint Closure v6 LayerALE Connect Redirect v4 LayerALE Connect Redirect v6 LayerALE Bind Redirect v4 LayerALE Bind Redirect v6 LayerStream Packet v4 LayerStream Packet v6 LayerInbound Native MAC LayerOutbound Native MAC LayerIngress vSwitch Ethernet layerEgress vSwitch Ethernet layer"Ingress vSwitch Transport v4 layer"Ingress vSwitch Transport v6 layer!Egress vSwitch Transport v4 layer!Egress vSwitch Transport v6 layerInbound Transport v4 Layer fast Outbound Transport v4 Layer fastInbound Native MAC Layer fastOutbound Native MAC Layer fast PAWFP Built-in Universal Sublayer"WFP Built-in Legacy IPsec Sublayer#WFP Built-in Secure Socket Sublayer)WFP Built-in TCP Chimney Offload Sublayer WFP Built-in Inspection SublayerRPC Built-in Audit Sublayer"WFP Built-in IPsec Tunnel Sublayer$WFP Built-in Edge Traversal Sublayer3WFP Built-in IPsec Forward Outbound Tunnel Sublayer*WFP Built-in IPsec DoS Protection Sublayer#WFP Built-in TCP Templates Sublayer; Condition ID: %ls Match value: %ls Condition value: %ls Equal to Greater than Less thanGreater than or equal toLess than or equal toIn rangePA All flags set Any flags set No flags setEqual to (case insensitive) Not equal toPAAWFP Built-in Default Secure Socket AuthIP Policy Provider ContextUAuthenticated Internet Protocol (AuthIP) main mode default policy for secure sockets.@WFP Built-in Default Secure Socket IPsec Policy Provider ContextPInternet Protocol Security (IPsec) quick mode default policy for secure sockets.5WFP Built-in IPsec Inbound Transport v4 Layer CalloutzVerifies that each received packet that is supposed to arrive over a transport mode security association arrives securely.5WFP Built-in IPsec Inbound Transport v6 Layer CalloutzVerifies that each received packet that is supposed to arrive over a transport mode security association arrives securely.6WFP Built-in IPsec Outbound Transport v4 Layer CalloutgIndicates to IPsec the outbound traffic that must be secured over transport mode security associations.6WFP Built-in IPsec Outbound Transport v6 Layer CalloutgIndicates to IPsec the outbound traffic that must be secured over transport mode security associations.2WFP Built-in IPsec Inbound Tunnel v4 Layer CalloutwVerifies that each received packet that is supposed to arrive over a tunnel mode security association arrives securely.2WFP Built-in IPsec Inbound Tunnel v6 Layer CalloutwVerifies that each received packet that is supposed to arrive over a tunnel mode security association arrives securely.3WFP Built-in IPsec Outbound Tunnel v4 Layer CalloutdIndicates to IPsec the outbound traffic that must be secured over tunnel mode security associations.3WFP Built-in IPsec Outbound Tunnel v6 Layer CalloutdIndicates to IPsec the outbound traffic that must be secured over tunnel mode security associations.:WFP Built-in IPsec Forward Inbound Tunnel v4 Layer CalloutwVerifies that each received packet that is supposed to arrive over a tunnel mode security association arrives securely.:WFP Built-in IPsec Forward Inbound Tunnel v6 Layer CalloutwVerifies that each received packet that is supposed to arrive over a tunnel mode security association arrives securely.;WFP Built-in IPsec Forward Outbound Tunnel v4 Layer CallouteIndicates to IPsec the outbound traffic that must be secured over a tunnel mode security association.;WFP Built-in IPsec Forward Outbound Tunnel v6 Layer CallouteIndicates to IPsec the outbound traffic that must be secured over a tunnel mode security association.;WFP Built-in IPsec Inbound Initiate Secure v4 Layer CalloutZVerifies that each incoming connection that is supposed to arrive secure arrives securely.;WFP Built-in IPsec Inbound Initiate Secure v6 Layer CalloutZVerifies that each incoming connection that is supposed to arrive secure arrives securely./WFP Built-in IPsec ALE Connect v4 Layer Callout6Applies IPsec policy modifiers to client applications./WFP Built-in IPsec ALE Connect v6 Layer Callout6Applies IPsec policy modifiers to client applications.;WFP Built-in Silent Drop Transport v4 Discard Layer Callout}Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint.;WFP Built-in Silent Drop Transport v6 Discard Layer Callout}Implements stealth-mode filtering by silently dropping all incoming packets for which TCP does not have a listening endpoint.=WFP Built-in TCP Chimney Offload ALE Connect v4 Layer CalloutEEnables or disables TCP Chimney Offload for each outgoing connection.=WFP Built-in TCP Chimney Offload ALE Connect v6 Layer CalloutEEnables or disables TCP Chimney Offload for each outgoing connection.DWFP Built-in TCP Chimney Offload ALE Receive/Accept v4 Layer CalloutEEnables or disables TCP Chimney Offload for each incoming connection.DWFP Built-in TCP Chimney Offload ALE Receive/Accept v6 Layer CalloutEEnables or disables TCP Chimney Offload for each incoming connection.4WFP Built-in Set Option ALE Connect v4 Layer Callout(Sets classify options on outbound flows.4WFP Built-in Set Option ALE Connect v6 Layer Callout(Sets classify options on outbound flows.EWFP Built-in IPsec Inbound Tunnel ALE Receive/Accept v4 Layer CalloutdPermits IPsec tunnel mode IP-in-IP packets when they get classified at the ALE receive/accept layer.EWFP Built-in IPsec Inbound Tunnel ALE Receive/Accept v6 Layer CalloutdPermits IPsec tunnel mode IP-in-IP packets when they get classified at the ALE receive/accept layer.DWFP Built-in Edge Traversal ALE Resource Assignment v4 Layer CalloutwSignals Windows when an application is attempting to bind to an interface and has opted in for edge traversing traffic.DWFP Built-in Edge Traversal ALE Resource Assignment v6 Layer CalloutwSignals Windows when an application is attempting to bind to an interface and has opted in for edge traversing traffic.7WFP Built-in Edge Traversal ALE Listen v4 Layer CalloutySignals Windows when an application is attempting to listen on an interface and has opted in for edge traversing traffic.7WFP Built-in Edge Traversal ALE Listen v6 Layer CalloutySignals Windows when an application is attempting to listen on an interface and has opted in for edge traversing traffic.:WFP Built-in IPsec DoS Protection Forward v4 Layer CalloutmInspection point for IPsec Denial of Service Protection at the forward layer to create state and prevent DoS.:WFP Built-in IPsec DoS Protection Forward v6 Layer CalloutPAmInspection point for IPsec Denial of Service Protection at the forward layer to create state and prevent DoS.7WFP Built-in TCP Templates ALE Connect v4 Layer Callout2Applies TCP Template for each outgoing connection.7WFP Built-in TCP Templates ALE Connect v6 Layer Callout2Applies TCP Template for each outgoing connection.>WFP Built-in TCP Templates ALE Receive/Accept v4 Layer Callout2Applies TCP Template for each incoming connection.>WFP Built-in TCP Templates ALE Receive/Accept v6 Layer Callout2Applies TCP Template for each incoming connection.WFP Built-in Reserved calloutWFP Built-in Reserved calloutWFP Built-in Reserved calloutWFP Built-in Reserved callout;WFP Built-in Set Option ALE Receive/Accept v4 Layer Callout'Sets classify options on inbound flows.;WFP Built-in Set Option ALE Receive/Accept v6 Layer Callout'Sets classify options on inbound flows.PA!WFP Built-in IKE Exemption Filter)Default exemption filter for IKE traffic.Base Filtering EngineOThe Base Filtering Engine (BFE) is a service that manages firewall and Internet Protocol security (IPsec) policies and implements user mode filtering. Stopping or disabling the BFE service will significantly reduce the security of the system. It will also result in unpredictable behavior in IPsec management and firewall applications.Default WinPE PolicyMicrosoft Corporation\Microsoft Windows WFP Built-in IKEEXT provider used to identify filters added by IKE/AuthIP.Microsoft CorporationrMicrosoft Windows WFP Built-in TCP Chimney Offload provider used to identify filters added by TCP Chimney Offload.Microsoft CorporationMicrosoft Windows WFP Built-in IPsec DoS Protection configuration provider used to identify filters added by IPsec Denial of Service Protection.Microsoft CorporationyMicrosoft Windows WFP Built-in TCP Templates provider used to identify filters added by TCP Template based configuration.PAMicrosoft CorporationThis task adjusts the start type for firewall-triggered services when the start type of the Base Filtering Engine (BFE) is disabled.PA00@PPTtPInfo Information 4BFE IPsec Connections TBFE IPsec Connections Operational Log (New Connection ,Connection Closed None DH 1 DH 2 DH 2048 ECDH 256 ECDH 384 DH 14 DH 24 (Transport Mode Tunnel Mode $PRESHARED_KEY CERTIFICATE KERBEROS ANONYMOUS SSL NTLM_V2 IPV6_CGA 4CERTIFICATE_ECDSA_384 4CERTIFICATE_ECDSA_384 (SSL_ECDSA_P256 (SSL_ECDSA_P384 EAP Max 4VS_VERSION_INFO@%@%?StringFileInfo040904B0LCompanyNameMicrosoft CorporationTFileDescriptionBase Filtering Enginer)FileVersion6.3.9600.16384 (winblue_rtm.130821-1623)0InternalNameBFE.DLL.LegalCopyright Microsoft Corporation. All rights reserved.@ OriginalFilenameBFE.DLL.MUIj%ProductNameMicrosoft Windows Operating SystemBProductVersion6.3.9600.16384DVarFileInfo$Translation PADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGX