Especially when we use IPsecurityprotocol in the internal host password credentials to sign, on the basis of these marks strategy is undoubtedly more credibility for the host.
Some form of network-level encryption, such as a Virtual Private Network (VPN), perhaps using IPSecurityProtocol (IPSEC), is the most obvious solution, although there are other reasonable choices.
某种可能使用 IP 安全性协议 (IPSEC) 的网络级加密形式(例如虚拟专用网 (VPN))是最可取的解决方案,虽然也有其他合理的选择。
3
It is capable of real time data stream analysis, IP data package logging and protocol analysis, which makes it a new hot issue in safeguarding the network security.