云计算中的虚拟网络的优点有。
马尔堡虚拟网络的实验室包括。
虚拟网络使用虚拟交换机。
虚拟网络配置是PowerHA配置的重要方面。
The virtual network configuration is an important aspect of the PowerHA configuration.
第一个挑战是虚拟网络提供的基于网络的控制不足。
First, virtualized networks offer insufficient net-work-based controls.
构建虚拟网络几乎不需修改用户的数据中心基础架构。
Setting up an virtual network requires little modification of the customer's data center network infrastructure.
构建虚拟网络云计算端与构建物理数据中心的网络类似。
Setting up the cloud side of the virtual network is very similar to setting up a network in a physical data center.
对于我的虚拟网络,我特别地将它绑定到eth0适配器。
For my virtual network, I bound it to the eth0 adapter specifically.
可能对您有用的一个技巧是配置当虚拟网络可用时的特殊场景。
One trick that may be useful is for you to configure special situations when the virtual network is available.
记住,要使虚拟网络正常工作,您必须使这个网络端口可双向访问。
Remember that you must have network port access both ways for the virtual network to work.
合并——物理网络可以被组合成一个单一的虚拟网络来整体简化管理。
Consolidation - Physical networks can be combined into one virtual network for overall simplification of management.
您还详细了解了如何使用gvpe工具对一个虚拟网络进行基本设置。
You also took a detailed look at the basic setup of a virtual network using the gvpe tools.
除了虚拟网络的元素以外,我们还关注这些内容,作为该探索的一部分。
We'll look at these in addition to the elements of the virtual network as part of this exploration.
宽带用户用于虚拟网络社交的平均时间为每周近三个小时,相当于每年六天。
The average amount of time spent on virtual networking is nearly three hours a week, or six days a year.
对虚拟机之间通信所用的内部虚拟网络的控制不够明确,难以实施安全策略。
Controls on internal virtual networks that are used to communicate between virtual machines are insufficiently visible to enforce security policies.
采用这种方式主要是由于Power ha集群在虚拟网络环境中的通信方式。
The main driver for this approach is the way the PowerHA cluster communicates in a virtual network environment.
虚拟网络前端由 xennet模块处理,后端由 netbk 模块处理。
The virtual network frontend is handled by the module xennet and the backend by netbk.
虚拟网络中的每个主机都被提供一个惟一的主机密匙,公共版本用于加密通信信道。
Each host within the virtual network is provided with a unique host key and the public version is used to encrypt the communication channel.
最有可能的是,虚拟网络将在公共网络上使用,或将多个主机连接成单个虚拟网络。
More likely the virtual network will be used over public networks or to connect multiple hosts together into a single virtual network.
熟悉传统网络和VPN配置和管理的IT人员也能配置和运行虚拟网络就是一个例子。
A virtual network that can be configured and run by an it staff already familiar with configuration and management of a traditional networks and VPN is one such example.
除非使用虚拟网络计算(VNC)会话或类似的东西,否则就不能远程地做上面这些事。
You can't do either of these things remotely unless you use a Virtual Network Computing (VNC) session or something similar.
这些混合设备充当虚拟网络的虚拟交换机和路由器,这些虚拟网络构筑于物理网络之上。
These hybrid devices act as virtual switches and routers of this virtual network which essentially sits above your physical network.
在这种线上线下形成交集的情况下,分清虚拟网络与现实生活就已经不太重要了。
This points to a convergence of the offline and online worlds, where it is less important to distinguish between what happens online from the "real world."
当问题出现且网络上没有发现任何异常流量时,您可能需要将您的分析工具植入虚拟网络中。
When problems are occurring and you don't see any unusual traffic on the network, you may need to get your analysis tools plugged into the virtual network.
另外,在虚拟网络上发送的信息将被自动路由到正确的主机并在虚拟网络中配置,如图2所示。
In addition, the information sent on the virtual network is automatically routed to the right host and configured within the virtual network, as shown here in figure 2.
安全——如此以来,就有了更多的入口点需要去监测,如hypervisor和虚拟网络层。
Security - There are now more entry points such as the hypervisor and virtual networking layer to monitor.
管理程序也允许虚拟网络的动态构建,由虚拟交换机完成,支持可配置的VM 端点间的通信。
The hypervisor also permits the dynamic construction of a virtual network, complete with virtualized switches to enable configurable communication among the VM endpoints.
MochaVNC使用户以虚拟网络计算(VNC)技术通过iPhone接入到家庭电脑中。
Mocha VNC allows you to access your home computer on your iPhone through Virtual Network Computing (VNC).
现在,在将成为网络中的第二个虚拟主机的主机上,运行命令在private2上启动虚拟网络。
Now on the host that will be the second virtual host in the network, run the command for starting the virtual network on private2.
IaaS管理员无法在虚拟网络中应用基于IP的网络分段等标准控制措施,黑客可以利用这一情况。
A hacker takes advantage of the fact that the IaaS administrator cannot apply standard controls such as IP-based network zoning in virtualized networks.
应用推荐