• This article described a security way that binding IP address and MAC address combine with using access-list.

    介绍绑定IP地址MAC地址与访问列表相结合的安全管理办法

    youdao

  • In this paper, the basic concept and theory of access-list is detailedly discussed. Finally, the solution of network security is given.

    文章访问基本概念工作原理进行了探讨最后给出了基于访问表的各种安全控制策略及实现方案。

    youdao

  • Lastly, along with campus fact and equipment, using technology of VLAN, NAT, router access-list and network traffic flow monitoring system, we carry out basic security defense of campus network.

    最后,结合校园网实际,根据现有设备条件,运用VLAN技术NAT技术路由器访问列表以及流量监控实现对校园网的基本安全防护

    youdao

  • You can create an access list of IP addresses that tells the router which computers on the network require NAT.

    可以创建一个IP地址访问列表告诉路由器网路哪些计算机需要NAT

    youdao

  • Add access detail in the access list for this host.

    主机访问列表中添加访问细节

    youdao

  • The user IDs and groups that had access granted or denied specifically because they are in the access list of the profile, would, obviously, have the access that they were granted.

    授予访问权限由于概要文件访问列表而被拒绝授予权限用户ID拥有它们获得的访问权限,这是很明显的。

    youdao

  • The same profile applies to all user IDs or groups, since they are either in the access list or are subject to the UACC.

    相同概要文件可以应用所有用户ID因为它们要么访问列表中,要么受uacc的支配。

    youdao

  • An administrator can also assign an access control list to each work node for additional security control at the work node level.

    管理员可以每个工作节点分配访问控制列表进一步工作节点级别上进行安全控制。

    youdao

  • If a user is listed in a deny access list or is not listed in an allowed access list, then the user cannot be granted access to the server.

    如果用户出现禁止访问列表中,没有允许访问列表中,那么不能授予用户访问服务器的权限。

    youdao

  • If the user is not in the access list for the best matching profile, then they get the access provided by the UACC.

    如果用户不在匹配概要文件访问列表中那么它们将获得UACC提供的访问权限。

    youdao

  • Notice that you can access list elements directly.

    注意可以直接访问列表元素

    youdao

  • If any users or groups are in the access list, make sure you understand why that access was granted.

    如果某些用户位于访问列表中确保理解为何授予那种访问权。

    youdao

  • The method might be an access control list for example.

    这个方法可能例子访问控制清单

    youdao

  • You can iterate over this list and access all pertinent information for each queue.

    可以循环遍历这个列表访问每个队列的所有相关信息

    youdao

  • Access control list processing.

    访问控制列表处理

    youdao

  • OAM profiles do not have anything corresponding to the UACC; a user is either included in the access list or is not.

    oam概要文件存在与UACC对应地方;用户可以包含包含访问列表中

    youdao

  • You can also access the mailing list archives at these URLs.

    使用这些URL可以访问邮件列表档案

    youdao

  • In the integrated portal environment, one can both access a task list (see Figure 4) and work on tasks.

    集成门户环境中可以访问任务列表(请参阅4),也可以处理各项任务。

    youdao

  • Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.

    访问控制列表(acl): ACL数据结构将一个服务权限列表与一主体相关联。

    youdao

  • One method to satisfy the access authority on file access is to implement an access control list (ACL).

    文件访问进行访问授权方法实现访问控制列表 (ACL)。

    youdao

  • The forms server provides offline and queued delivery of forms applications to mobile devices and supports an access list for users and groups.

    表单服务器移动设备提供表单应用程序脱机排队传递支持用户访问列表

    youdao

  • The switches (if any exist) and the access list for RESLVEL should be similar throughout all of your queue managers.

    RESLEVEL开关如果存在访问列表应该所有队列管理器之间相似

    youdao

  • So, consider defining a MXTOPIC profile for it with a UACC of NONE, and no users in the access list.

    因此考虑使用uacc值NONE定义一个MXTOPIC配置文件,访问列表没有用户

    youdao

  • Typically, you define a backstop profile with UACC (NONE), and no or very few users in the access list.

    通常定义一个带有UACC (NONE)的backstop配置文件,访问列表没有很少用户

    youdao

  • From anywhere within StarCraft II, you can access the Friends List. This allows you to quickly.

    星际争霸2里的任何地方,访问好友列表。

    youdao

  • To access this list of users, add a link to users.php on the index.php file, right above the form.

    为了访问这个用户列表index . php文件中表单的上方添加一个users . php的链接

    youdao

  • The Lotus Sametime bot can use this value to check the user ID in its access list.

    LotusSametimebot可以使用这个检查访问列表中的用户ID

    youdao

  • Select Discovery => Access List, then configure the access detail for the scope, as shown in Figure 2.

    选择Discovery =>Access List然后配置范围访问细节如图 2 所示。

    youdao

  • Acl: An access control list specification.

    acl一个访问控制列表规范

    youdao

  • The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.

    acl访问控制列表文件位于 KDC主机,它控制Kerberos数据库的访问。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定