然后它用它自己注册的IP地址替换发送来的数据包的IP地址,并将端口号替换为该数据包的源计算机信息条目在表中的相应位置号。
It then replaces the IP address with its own registered IP address and the port number corresponding to the location of the entry for that packet's source computer in the table.
在这个示例中,您可以看到原始以太网、IP和TCP数据包,包括源、目标主机的信息以及数据包选项。
In this case, you can see the raw Ethernet, IP, and TCP packet data, including the source and destination host information and packet options.
因为每个通信都包含源ip地址和源端口,所以主机能够区分这三个不同的连接。
Because every communication contains the source IP address and source port, the mainframe can distinguish between those three different connections.
网络流量由IP信息包(或,简称信息包)—以流的形式从源系统传输到目的地系统的一些小块数据—组成。
Network traffic is made up of IP packets or simply packets — small chunks of data traveling in streams from a source system to a destination system.
缺省源匹配与所有IP地址匹配。
您还可以设置一个策略,它根据日期、时间和源ip地址控制SQS队列的访问,如清单2所示。
You can also set policies that control access to our SQS queue based on date, time, and source IP Address, as in Listing 2.
IP提供在两个设置为ip节点的网络节点(称为源和目的地)间传输数据块的服务。
IP provides a service for transmitting blocks of data between two network nodes set up as IP nodes, called source and destination.
源和目的地节点都用IP地址标识。
The source and destination nodes are identified by IP addresses.
在隧道模式,内部的ip报头承载预设的源和最初的目的地址,外部ip报头包含用于跳点的IP地址,比如安全网关。
In tunnel mode, the inner IP header carries the intended source and original destination addresses, while an outer IP header contains IP addresses for hop points such as security gateways.
第一条命令认可来自您的IP地址的一个源的端口22 (TCP是默认选项)。
The first command allows port 22 (TCP is the default option) from a source of your IP address.
如果处理数据报的网关测定该数据报i p头中的生存时间字段为0,则丢弃该数据报并用超时消息通知源主机。
If the gateway processing a datagram determines that the time to live field in the datagram's IP header is 0, it discards the datagram and notifies the sending host with a time Exceeded Message.
地址(在IP数据报头中封装为源和目的地地址)用来将数据报传输到其目的地,这个过程称为路由。
The addresses, encapsulated as source and destination in the IP datagrams header, are used to transmit the datagram to their destination, called routing. Basically, this creates two scenarios
源数据库和DB 2服务器的IP地址或主机名。
不要相信“源ip”地址、HTTP“Referrer”头的值或者类似的数据所告诉您的数据来自何方;那些来自发送者的值可以被伪造。
Don't trust the "source IP" address, the HTTP "Referrer" header value, or similar data to tell you where the data really came from; those values come from the sender and can be forged.
s或——source:该源匹配用于根据信息包的源ip地址来与它们匹配。
S or — source: This source match is used to match packets based on their source IP address.
RTSP协议覆盖信令等领域,比如请求所需的电影编解码器的细节,通道数目,源服务器的IP地址和端口发送流。
RTSP protocol covers signalling areas such as requesting the details of the movie codecs required, number of tracks, source IP addresses and ports of the server sending the stream.
如果接收方主机ip地址与要求的IP地址匹配,就生成一个包括发送方所要求的硬件地址的ARP回应帧,并直接发送给源主机。
If the receiving hosts IP address matches the requested IP address, an ARP reply is formulated with the requested hardware address and sent directly to the source host.
当收到硬件地址时,源主机就把IP地址和硬件地址当作入口存储在本地ARP高速缓存中。
When the hardware address is received, both the IP address and hardware address are stored as an entry in the local ARP cache.
将邮件路由到这些发送连接器时,将使用为源服务器配置的外部DNS查找设置来解析传递目标的IP地址。
When messages are routed to these Send connectors, the external DNS lookup Settings that are configured for the source server are used to resolve IP addresses for the delivery destination.
在分析高级随机包标记算法(AMS)的基础上,提出了一种基于反向确认的攻击源追踪模型,该模型不再需要AMS过强的假设前提。
On the basis of analysis about advanced marking scheme (AMS), a reverse-validation IP traceback scheme is proposed, which no longer requires the too strong assumption of AMS.
通常,主机是IP通信量的源和目标。
A host is typically the source and the destination of IP traffic.
利用伪随机多频信号作为场源的多频相对相位谱观测法拥有相对相位观测法的优点,同时为异常源的区分提供丰富的信息。
PRMF relative phase spectrum IP method with PRMF signal as excitation has the same advantage of relative phase IP method, and offer rich information for the discrimination of anomaly source.
IP组播是面向组接收者的有效数据通信方式,利用一种协议将IP数据包从一个源传送到多个目的地,将信息的拷贝发送到一组地址,到达所有想要接收它的接收者处。
It's an efficient way to deliver IP data package from one source to more destination, send the copy of information to a group of address, to all the recipients at the same time.
攻击者使用IP欺骗来隐藏自己的真实地址,因此人们开始研究IP源回溯技术。
As the attackers usually use IP spoofing to conceal their real location, people started to study the IP Traceback.
针对当前的IP追踪和攻击源定位技术现状讨论了其未来发展趋势。
It discusses the development trend of IP tracing and source-finding technology in the basis of currently status.
针对常见的IP地址欺骗、IP源路由欺骗、ICM P重定向欺骗、IP劫持等网络攻击给予了分析并在过滤管理模块中给出了防御的方法。
Common network attacks such as IP spoofing, source route spoofing, ICMP redirect deception and IP Hijack are analyzed and protected by filter manage module.
IP协议中最脆弱的策略就是让源主机自己填写源IP地址,并且在TCP/IP协议中也没有提供一种机制来验证源IP地址的真实性。
The weakness in Internet Protocol is that the source host itself fills in the IP source host id, and there is no provision in TCP/IP to discover the true origin of a packet.
蠕虫模拟时产生的无效ip地址扫描包会在源节点所属的路由器被直接丢弃,这与实际网络中数据包的传输情况差距较大。
In current worm simulation, network simulators drop the scanning packets sent to invalid IP addresses, which will underestimate the traffic brought by worm.
蠕虫模拟时产生的无效ip地址扫描包会在源节点所属的路由器被直接丢弃,这与实际网络中数据包的传输情况差距较大。
In current worm simulation, network simulators drop the scanning packets sent to invalid IP addresses, which will underestimate the traffic brought by worm.
应用推荐