Audit IPsec Main Mode

Applies to

  • Windows 10
  • Windows Server 2016

Audit IPsec Main Mode allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations.

Audit IPsec Main Mode subcategory is out of scope of this document, because this subcategory is mainly used for IPsec Main Mode troubleshooting.

Computer Type General Success General Failure Stronger Success Stronger Failure Comments
Domain Controller IF IF IF IF IF - This subcategory is mainly used for IPsec Main Mode troubleshooting, or for tracing or monitoring IPsec Main Mode operations.
Member Server IF IF IF IF IF - This subcategory is mainly used for IPsec Main Mode troubleshooting, or for tracing or monitoring IPsec Main Mode operations.
Workstation IF IF IF IF IF - This subcategory is mainly used for IPsec Main Mode troubleshooting, or for tracing or monitoring IPsec Main Mode operations.

4646: Security ID: %1

4650: An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication was not used.

4651: An IPsec Main Mode security association was established. Extended Mode was not enabled. A certificate was used for authentication.

4652: An IPsec Main Mode negotiation failed.

4653: An IPsec Main Mode negotiation failed.

4655: An IPsec Main Mode security association ended.

4976: During Main Mode negotiation, IPsec received an invalid negotiation packet. If this problem persists, it could indicate a network issue or an attempt to modify or replay this negotiation.

5049: An IPsec Security Association was deleted.

5453: An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.