You can create an access list of IP addresses that tells the router which computers on the network require NAT.
你可以创建一个IP地址的访问列表,告诉路由器网路中哪些计算机需要NAT 。
Notice that you can access list elements directly.
注意,您可以直接访问列表元素。
Add access detail in the access list for this host.
为该主机在访问列表中添加访问细节。
The Lotus Sametime bot can use this value to check the user ID in its access list.
LotusSametimebot可以使用这个值来检查其访问列表中的用户ID。
If any users or groups are in the access list, make sure you understand why that access was granted.
如果某些用户或组位于访问列表中,确保您理解为何授予那种访问权。
So, consider defining a MXTOPIC profile for it with a UACC of NONE, and no users in the access list.
因此,考虑使用一个uacc值NONE为它定义一个MXTOPIC配置文件,访问列表中没有用户。
Select Discovery => Access List, then configure the access detail for the scope, as shown in Figure 2.
选择Discovery =>Access List,然后配置范围的访问细节,如图 2 所示。
Typically, you define a backstop profile with UACC (NONE), and no or very few users in the access list.
通常,定义一个带有UACC (NONE)的backstop配置文件,访问列表中没有或有很少用户。
If the user is not in the access list for the best matching profile, then they get the access provided by the UACC.
如果用户不在最匹配概要文件的访问列表中,那么它们将获得UACC提供的访问权限。
OAM profiles do not have anything corresponding to the UACC; a user is either included in the access list or is not.
oam概要文件不存在与UACC对应的地方;用户可以包含或未包含在访问列表中。
The switches (if any exist) and the access list for RESLVEL should be similar throughout all of your queue managers.
RESLEVEL的开关(如果存在)和访问列表应该在您的所有队列管理器之间相似。
The same profile applies to all user IDs or groups, since they are either in the access list or are subject to the UACC.
相同的概要文件可以应用到所有用户ID和组,因为它们要么在访问列表中,要么受uacc的支配。
If a user is listed in a deny access list or is not listed in an allowed access list, then the user cannot be granted access to the server.
如果用户出现在禁止访问列表中,或没有列在允许访问列表中,那么就不能授予该用户访问服务器的权限。
The forms server provides offline and queued delivery of forms applications to mobile devices and supports an access list for users and groups.
表单服务器向移动设备提供表单应用程序的脱机和排队传递,并支持用户和组的访问列表。
Determining which users or groups need to be in the access list of the profiles that have been defined, for batch, CICS, and IMS connections is straightforward.
对于批、CICS和IMS连接,确定哪些用户或组需要处于已经定义了的配置文件的访问列表中比较简单。
The user IDs and groups that had access granted or denied specifically because they are in the access list of the profile, would, obviously, have the access that they were granted.
被授予访问权限或由于在概要文件的访问列表中而被拒绝授予权限的用户ID和组将拥有它们已获得的访问权限,这是很明显的。
An administrator can also assign an access control list to each work node for additional security control at the work node level.
管理员也可以为每个工作节点分配访问控制列表,进一步在工作节点级别上进行安全控制。
The method might be an access control list for example.
这个方法可能是例子的访问控制清单。
You can iterate over this list and access all pertinent information for each queue.
可以循环遍历这个列表并访问每个队列的所有相关信息。
Access control list processing.
访问控制列表处理。
Note that the function can only access the list as an immutable sequence-that is, trying to modify the contents of the list results in an error.
注意,函数只能作为不可变的序列访问这个列表—也就是说,尝试修改列表的内容会导致错误。
You can also access the mailing list archives at these URLs.
使用这些URL还可以访问邮件列表档案。
In the integrated portal environment, one can both access a task list (see Figure 4) and work on tasks.
在集成门户环境中,既可以访问任务列表(请参阅图4),也可以处理各项任务。
Access Control list (ACL) : An ACL is a data structure that associates to a set of principals a list of permissions for a service.
访问控制列表(acl): ACL是一种数据结构,它将一个服务的权限列表与一组主体相关联。
One method to satisfy the access authority on file access is to implement an access control list (ACL).
对文件访问进行访问授权的一种方法是实现访问控制列表 (ACL)。
Though this file is ACL (Access Control List)-protected by root only access, it may not be enough for highly secure systems.
尽管这个文件由 ACL (AccessControlList) 保护,只允许根用户访问,但是这对于安全性要求高的系统可能不够。
From anywhere within StarCraft II, you can access the Friends List. This allows you to quickly.
在星际争霸2里的任何地方,你都能访问好友列表。
To access this list of users, add a link to users.php on the index.php file, right above the form.
为了访问这个用户列表,在index . php文件中表单的上方添加一个到users . php的链接。
Acl: An access control list specification.
acl:一个访问控制列表规范。
The kadm5.acl (access control list) file resides on the KDC host and controls access to the Kerberos database.
acl(访问控制列表)文件位于 KDC主机,它控制对Kerberos数据库的访问。
应用推荐