This article described a security way that binding IP address and MAC address combine with using access-list.
介绍了绑定IP地址和MAC地址与访问列表相结合的安全管理办法。
In this paper, the basic concept and theory of access-list is detailedly discussed. Finally, the solution of network security is given.
文章就访问表的基本概念及工作原理进行了探讨,最后给出了基于访问表的各种安全控制策略及实现方案。
Lastly, along with campus fact and equipment, using technology of VLAN, NAT, router access-list and network traffic flow monitoring system, we carry out basic security defense of campus network.
最后,结合校园网的实际,根据现有设备条件,运用VLAN技术、NAT技术、路由器访问列表以及流量监控实现了对校园网的基本安全防护。
You can create an access list of IP addresses that tells the router which computers on the network require NAT.
你可以创建一个IP地址的访问列表,告诉路由器网路中哪些计算机需要NAT 。
Add access detail in the access list for this host.
为该主机在访问列表中添加访问细节。
The user IDs and groups that had access granted or denied specifically because they are in the access list of the profile, would, obviously, have the access that they were granted.
被授予访问权限或由于在概要文件的访问列表中而被拒绝授予权限的用户ID和组将拥有它们已获得的访问权限,这是很明显的。
The same profile applies to all user IDs or groups, since they are either in the access list or are subject to the UACC.
相同的概要文件可以应用到所有用户ID和组,因为它们要么在访问列表中,要么受uacc的支配。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
If a user is listed in a deny access list or is not listed in an allowed access list, then the user cannot be granted access to the server.
如果用户出现在禁止访问列表中,或没有列在允许访问列表中,那么就不能授予该用户访问服务器的权限。
If the user is not in the access list for the best matching profile, then they get the access provided by the UACC.
如果用户不在最匹配概要文件的访问列表中,那么它们将获得UACC提供的访问权限。
Notice that you can access list elements directly.
注意,您可以直接访问列表元素。
If any users or groups are in the access list, make sure you understand why that access was granted.
如果某些用户或组位于访问列表中,确保您理解为何授予那种访问权。
The method might be an access control list for example.
这个方法可能是例子的访问控制清单。
You can iterate over this list and access all pertinent information for each queue.
可以循环遍历这个列表并访问每个队列的所有相关信息。
Access control list processing.
访问控制列表处理。
OAM profiles do not have anything corresponding to the UACC; a user is either included in the access list or is not.
oam概要文件不存在与UACC对应的地方;用户可以包含或未包含在访问列表中。
You can also access the mailing list archives at these URLs.
使用这些URL还可以访问邮件列表档案。
In the integrated portal environment, one can both access a task list (see Figure 4) and work on tasks.
在集成门户环境中,既可以访问任务列表(请参阅图4),也可以处理各项任务。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
The forms server provides offline and queued delivery of forms applications to mobile devices and supports an access list for users and groups.
表单服务器向移动设备提供表单应用程序的脱机和排队传递,并支持用户和组的访问列表。
The switches (if any exist) and the access list for RESLVEL should be similar throughout all of your queue managers.
RESLEVEL的开关(如果存在)和访问列表应该在您的所有队列管理器之间相似。
So, consider defining a MXTOPIC profile for it with a UACC of NONE, and no users in the access list.
因此,考虑使用一个uacc值NONE为它定义一个MXTOPIC配置文件,访问列表中没有用户。
Typically, you define a backstop profile with UACC (NONE), and no or very few users in the access list.
通常,定义一个带有UACC (NONE)的backstop配置文件,访问列表中没有或有很少用户。
From anywhere within StarCraft II, you can access the Friends List. This allows you to quickly.
在星际争霸2里的任何地方,你都能访问好友列表。
To access this list of users, add a link to users.php on the index.php file, right above the form.
为了访问这个用户列表,在index . php文件中表单的上方添加一个到users . php的链接。
The Lotus Sametime bot can use this value to check the user ID in its access list.
LotusSametimebot可以使用这个值来检查其访问列表中的用户ID。
Select Discovery => Access List, then configure the access detail for the scope, as shown in Figure 2.
选择Discovery =>Access List,然后配置范围的访问细节,如图 2 所示。
Acl: An access control list specification.
acl:一个访问控制列表规范。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
应用推荐