NetworkSecurity Class

  • ID:  Microsoft.Windows.RemoteAccess.2012.Class.NetworkSecurity
  • Description:  NetworkSecurity
  • Class Hierarchy: 
    Entity
    Logical Entity
    Application Component
    Windows Application Component
    NetworkSecurity

  • Attributes:  Public, Hosted
Login
Network security is not working as expected. The Base Filtering Engine (BFE) service has either been stopped, or is not responding. BFE is a service that manages firewall and IPsec policies, and implements user mode filtering.  Disabling the BFE service reduces system security, and IPsec management and firewall applications might not work as expected. DOSP Unknown Error Network security is not working as expected. The IKE and AuthIP IPsec Keying Modules (IKEEXT) service was stopped, or is not responding. Check for IPsec Denial of Service Protection (DoSP) is not enabled. The Current State Entries counter has exceeded critical levels. View this counter under IPsec DOS Protection in Performance Monitor. This counter defines the number of active state entries in the table. A state entry is a pair of IPv6 addresses that is authorized to pass through from a public to an internal adapter. A Denial of Service (DoS) attack  might be underway. IPv6 Main Mode negotiation failures have reached warning or critical levels. Check to verify if a DoS attack is underway Network Security ICMP Queue Overflow Warning. Network Security Queue Overflow Warning The Inbound Rate Limit Discarded IPv6 IPsec Unauthenticated Packets/sec counter has exceeded a defined threshold. View this counter under IPsec DOS Protection in Performance Monitor. This counter defines the rate at which unauthenticated IKEv1, IKEv2, AuthIP, or ESP IPv6 packets received on a public adapter were discarded because they exceeded the rate limit for IPv6 IPsec unauthenticated packets per second. An unauthenticated packet is an IPsec packet without an associated state entry. A state entry is a pair of IPv6 addresses that is authorized to pass through from a public to an internal adapter. A network security component is under a Replay attack. A Replay attack is a form of network attack in which a valid  data transmission is maliciously or fraudulently repeated or delayed. A network security component is under a spoofing attack. NetworkSecurity DirectAccessServer

Download diagram as a Visio file

Properties

Display Name Description
Display Name Display name of monitoring object.

Discovered By

Name Description
RemoteAccessServerPSDiscovery  

Relations

Health Source
NameClassType
Entity Watched By Perspective Entity Reference

Health Target
NameClassType
DirectAccessServer Hosts NetworkSecurity NetworkSecurity Hosting

Class Knowledgebase

Summary
This class does not contain any summary.
External References
This class does not contain any external references.

See Also for Windows Routing and Remote Access Service (RRAS) Management Pack


Downloads for Windows Routing and Remote Access Service (RRAS) Management Pack

AZURE OPTIMIZATION ASSESSMENT GET STARTED
MIGRATION TO AZURE GET STARTED
SYSTEM CENTER MIGRATION TO AZURE GET STARTED
MIGRATION TO AZURE FOR SQL AND WINDOWS 2008 GET STARTED