ssh服务器基于主机的配置。
ssh客户机基于主机的配置。
当这个设备基于主机名自动配置地址时,记下地址属性的值。
Take note of the address attribute's value as the appliance automatically configures the address based on the host name provided.
为了让DB 2UDBD PF实例使用基于主机的认证,实例中的每个主机必须正确地配置ssh客户机和ssh服务器。
For your DB2 UDB DPF instance to use host-based authentication, each host in the instance must have the SSH client and SSH server configured properly.
ssh客户机现在已经被配置为允许基于主机的认证。
The SSH client has now been configured to allow host-based authentication.
对于ssh 基于主机的认证,主机必须建立一个信任关系,然后已配置主机上的所有用户ID都将可以凭相同的用户ID在任何其他已配置主机上登录。
With ssh host-based authentication, hosts must establish a trust relationship, and then all user IDs on the configured hosts will be allowed to login as the same user ID on any other configured host.
本文描述如何配置基于主机的和PAM身份验证方法,以及在IBM支持的OpenSSH版本中新增的一些特性和配置选项。
This article describes how to configure host-based and PAM authentication and some of the new features and configuration options added in the IBM-supported version of OpenSSH.
在系统中,既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用了主机配置和网络配置相互配合的方式。
In the system, apply the Intrusion detection technique of the based on unusual behavior and signature-based, and adopt the way of host and network configuration cooperating each other.
该系统模型既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用主机配置和网络配置相互配合的方式。
This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.
该系统模型既综合了基于异常行为的入侵检测和基于特征的入侵检测技术,在配置上又采用主机配置和网络配置相互配合的方式。
This model uses not only misuse but also anomaly detection technology, and at deployment the host based subsystem cooperates with the network-based subsystem.
应用推荐