• 可以创建一个IP地址访问列表告诉路由器网路哪些计算机需要NAT

    You can create an access list of IP addresses that tells the router which computers on the network require NAT.

    youdao

  • 注意可以直接访问列表元素

    Notice that you can access list elements directly.

    youdao

  • 主机访问列表中添加访问细节

    Add access detail in the access list for this host.

    youdao

  • 如果某些用户位于访问列表确保理解为何授予那种访问权。

    If any users or groups are in the access list, make sure you understand why that access was granted.

    youdao

  • 访问列表条目应该简单但是不能得到这个工作

    Accessing list entries after spitting. Should be simple but I can't get this to work?

    youdao

  • 访问列表中的数据除了考虑这些因素外,还有一个方面比较重要

    Besides these considerations it's also important to be smart when accessing data in the list.

    youdao

  • 介绍绑定IP地址MAC地址与访问列表相结合的安全管理办法

    This article described a security way that binding IP address and MAC address combine with using access-list.

    youdao

  • 如果用户不在匹配概要文件访问列表那么它们将获得UACC提供访问权限。

    If the user is not in the access list for the best matching profile, then they get the access provided by the UACC.

    youdao

  • 表单服务器移动设备提供表单应用程序脱机排队传递支持用户访问列表

    The forms server provides offline and queued delivery of forms applications to mobile devices and supports an access list for users and groups.

    youdao

  • 队列管理器管理员甚至没有权限显示定义什么概要文件或者这些概要文件访问列表

    The queue manager's administrators might not even have the authority to display what profiles are defined, or the access lists for those profiles.

    youdao

  • RESLEVEL开关如果存在访问列表应该所有队列管理器之间相似

    The switches (if any exist) and the access list for RESLVEL should be similar throughout all of your queue managers.

    youdao

  • oam概要文件存在与UACC对应地方;用户可以包含包含访问列表

    OAM profiles do not have anything corresponding to the UACC; a user is either included in the access list or is not.

    youdao

  • 另外SharePoint对象模型也提供了一些额外特性加强访问列表数据的能力。

    Additionally, the SharePoint Object Model provides additional features to enhance access to list items.

    youdao

  • 表示要向允许访问列表中添加LimitAuthConfig”,覆盖顶层配置文件

    That means adding "Limit AuthConfig" to the list of allowed overrides in the top-level configuration file.

    youdao

  • 因此考虑使用uacc值NONE定义一个MXTOPIC配置文件,访问列表没有用户

    So, consider defining a MXTOPIC profile for it with a UACC of NONE, and no users in the access list.

    youdao

  • LotusSametimebot可以使用这个检查访问列表中的用户ID

    The Lotus Sametime bot can use this value to check the user ID in its access list.

    youdao

  • 通常定义一个带有UACC (NONE)的backstop配置文件,访问列表没有很少用户

    Typically, you define a backstop profile with UACC (NONE), and no or very few users in the access list.

    youdao

  • 对于CICSIMS连接确定哪些用户需要处于已经定义了的配置文件访问列表比较简单。

    Determining which users or groups need to be in the access list of the profiles that have been defined, for batch, CICS, and IMS connections is straightforward.

    youdao

  • 相同概要文件可以应用所有用户ID因为它们要么访问列表,要么受uacc的支配。

    The same profile applies to all user IDs or groups, since they are either in the access list or are subject to the UACC.

    youdao

  • 如果用户出现禁止访问列表中,没有允许访问列表中,那么不能授予用户访问服务器的权限。

    If a user is listed in a deny access list or is not listed in an allowed access list, then the user cannot be granted access to the server.

    youdao

  • 通过建立路由器访问控制列表可以控制任何IP地址网络访问实现网络的单向访问一般访问列表无法做到的。

    One can control any IP addresses to access a network to set up a router access-control-list, but a normal ACL can not be implemented to access a network unilaterally.

    youdao

  • 被授予访问权限由于概要文件访问列表而被拒绝授予权限用户ID拥有它们获得的访问权限,这是很明显的。

    The user IDs and groups that had access granted or denied specifically because they are in the access list of the profile, would, obviously, have the access that they were granted.

    youdao

  • 最后,结合校园网实际,根据现有设备条件,运用VLAN技术NAT技术路由器访问列表以及流量监控实现对校园网的基本安全防护

    Lastly, along with campus fact and equipment, using technology of VLAN, NAT, router access-list and network traffic flow monitoring system, we carry out basic security defense of campus network.

    youdao

  • 在对控制访问列表作用规则作了概括性介绍后,给出应用实例,具体分析访问控制列表的使用方法,对于网络安全中的应用给了一些建议

    This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.

    youdao

  • 例如可以通过zget("/request/myList#3")访问列表元素使用 zget("/request/myMap#key") 访问映射内部 key 的

    For example, you can access a list element with zget("/request/myList#3"), or the value of key within a map using zget("/request/myMap#key").

    youdao

  • 门户管理可以管理访问控制列表 (ACL),以便门户确定角色权限映射

    The Portal Administration can also manage the Access Control List (ACL) that determines role andpermission mappings for your portal.

    youdao

  • 某些文件系统支持高级安全特性比如访问控制列表(acl)。

    Some file systems support advanced security features, such as access control lists (ACLs).

    youdao

  • 这个用例展示不同访问控制列表特定队列之间交互

    This case will illustrate how different access control lists interact with a given set of queues.

    youdao

  • 访问控制列表处理

    Access control list processing.

    youdao

  • 访问控制列表处理

    Access control list processing.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定