网站首页  词典首页

请输入您要查询的英文单词:

 

单词 ipsec
释义

ipsec

  • 网络安全;安全协议;协议安全
1.
安全
网络协议安全IPSec)是在网络层运行的,在互联网的架构里面,它负责数据包的传输,而其他协议都是运行在应用层的。这 …
xijie.wordpress.com
2.
安全协议
网络层安全协议IPsec):(IP Security)IP 层安全协议。它将安全机制引入到 IP 协议。
www.docin.com
3.
协议安全
拥有“基于协议安全IPSEC)的纯软件多隧道虚拟专用网”、“政府采购信息系统”、“飞越比特电子政务系统”等10多项软件产品 …
www.shanghai.gov.cn
4.
协定安全性
网际网路通讯协定安全性 (IPsec) 支援网路层级的对等验证、资料来源验证、资料完整性、资料机密性 (加密),以及重新执行保 …
blog.yam.com
5.
协议安全性
“Internet 协议安全性 (IPSec)”是一种开放标准的框架结构,通过使用加密的安全服务以确保在 Internet 协议 (IP) 网络上进行保 …
network.51cto.com
6.
网际协议安全
通过网际协议安全 (IPSec) 连接的第二层隧道协议 (L2TP) 不能跨越 NAT 计算机工作。 4、Windows 2000 Server 网络地址转 …
www.docin.com

例句

释义:
1.
The IPSec policy storage failed to open. No Domain controller can be found for your domain.
无法打开IPSec策略存储。在您的域中找不到域控制器。
angel.w15.5tom.cn
2.
Connections that use the L2TP protocol over IPSec require the installation of a machine certificate, also known as a computer certificate.
使用通过IPSec的L2TP协议的连接要求安装一个机器证书,它也叫做计算机证书。
support.microsoft.com
3.
Failed to open IPSec policy storage due to insufficient access rights. You must be an administrator.
由于没有充分的访问权,无法打开IPSec策略存储。您必须是管理员。
www.fan6.net
4.
For a more complete reference on IPSec, you can refer to the Security Guide document in the Resources section of this article.
有关IPSec的更完整的描述,您可以参考本文参考资料一节中的SecurityGuide文档。
www.ibm.com
5.
Failed to open IPSec policy storage due to insufficient access rights. You must have administrator privileges.
由于没有充分的访问权,无法打开IPSec策略存储。您必须有管理员特权。
www.fan6.net
6.
No policy version information was found. IPSec stored policies cannot be retrieved. Contact your administrator immediately.
找不到策略版本信息。无法检索IPSec存储策略。请直接与您的管理员联系。
angel.w15.5tom.cn
7.
Communication with computers that do not support IPSec may expose your network to security risks.
和不支持IPSec的计算机通讯会使您的网络有风险。
bbs.translators.com.cn
8.
IPSec provides a general solution to the complex combination of media and application mixtures that make up the Internet.
IPSec为复杂结合在一起构成Internet的媒介和各种应用程序提供了一个通用的解决方案。
www.ibm.com
9.
This new payload contains a well-known hash value, which indicates that the peer is capable of performing IPSec NAT-T.
这个新的有效载荷包含一个众所周知的散列值,它表明这个对话方能够执行IPSecNAT-T。
blog.163.com
10.
A secure network protocol technology such as IPSec might be used to secure the communication channel between computers on a network.
可以使用一些安全网络协议技术,例如IPSec,来保证网络上计算机间通信信道的安全性。
www.ibm.com
1.
The manager instances route the IPsec tunnel traffic to the data center and act as encrypted switches between the cloud-based servers.
管理器实例将IPsec信道交通路由到数据中心,并作为基于云计算的服务器之间的加密交换机。
www.ibm.com
2.
IPsec is based on an end-to-end security model that establishes trust and security from a source IP address to a destination IP address.
IPsec基于从源IP地址到目标IP地址建立信任和安全机制的端到端安全模型。
technet.microsoft.com
3.
However, for an IPSec peer located behind a NAT, the NAT changes the source address of the initial IKE Main Mode packet.
然而,对于一个位于NAT之后的IPSec对话方,NAT会改变初始IKE主模式包的源地址。
blog.163.com
4.
Select the certification authority that you require for IPSec authentication when using this security rule.
当使用这个安全规则时,请选择您为IPSec身份验证请求的证书颁发机构。
angel.w15.5tom.cn
5.
Solution: By encapsulating the ESP PDU with a UDP header, the NAT can use the UDP ports to multiplex the IPSec data streams.
解决办法:通过使用UDP报头封装ESPPDU,NAT能够使用UDP端口来多路传输IPSec数据流。
blog.163.com
6.
Use this option if there are computers that do not support IPSec on your network.
如果您的网络上有不支持IPSec的计算机,请使用此选项。
bbs.translators.com.cn
7.
Parts of IPsec-related services were jointly developed by Microsoft and Cisco Systems, Inc.
IPsec相关服务的几个部分是由Microsoft和CiscoSystems,Inc联合开发的。
technet.microsoft.com
8.
In this architecture, an IPSec router in the client infrastructure encrypts traffic bound for the service infrastructure.
在此体系结构中,客户端基础结构中的IPSec路由器对发往服务基础结构的通信进行加密。
www.ibm.com
9.
IPSec protocol is a set of related protocols that IETF provides the safety service for IP layer.
IPSec协议是IETF为IP层提供安全服务而定义的一组相关协议。
www.juhe8.com
10.
IPsec uses cryptography-based protection services, security protocols, and dynamic key management.
IPsec使用基于加密的保护服务、安全协议和动态密钥管理。
technet.microsoft.com
1.
Whether both the initiating IPSec peer (typically a client computer) and responding IPSec peer (typically a server) can perform IPSec NAT-T.
发起IPSec对话的一方(通常是一个客户端计算机)和响应IPSec对话的一方(通常是一个服务器)是否都能执行IPSecNAT-T。
blog.163.com
2.
A firewall capable of supporting IPSec termination.
一个支持IPSec终止的防火墙。
www.ibm.com
3.
An IPSec router in the service infrastructure decrypts the IP packets and forwards them to the machine hosting the service for processing.
服务基础结构中的IPSec路由器对IP数据包进行解密,并将其转发到服务所在的计算机中进行处理。
www.ibm.com
4.
IPSec provides methods to authenticate and encrypt network communication across local networks and the Internet.
IPSec提供了在局域网和Internet上认证和加密网络通信的方法。
www.ibm.com
5.
This article showcases the ability of AIX IPSec to work across heterogeneous environments.
本文展示了AIXIPSec跨异构环境工作的能力。
www.ibm.com
6.
When you are transmitting secrets over a network, use Secure Sockets Layer (SSL) or IPSec to encrypt the channel.
通过网络传输机密内容时,请使用安全套接字层(SSL)或IPSec对通道进行加密。
msdn2.microsoft.com
7.
A pre-shared key is used to guarantee you are who you say you are in an IP Security (IPSec) communication cycle.
预共享密钥用于保证您在IP安全设置(IPSec)通信周期中所表明的身份。
support.microsoft.com
8.
IPSec NAT-T defines both changes in the negotiation process and different methods of sending IPSec-protected data.
IPSecNAT-T对协商过程进行了修改,并且定义了发送受IPSec保护的数据的不同方法。
blog.163.com
9.
Over 10 years, the IPSEC code has gone through many changes and fixes, so it is unclear what the true impact of these allegations are.
十年内,IPSEC代码经历了很多变化与修复,因此现在很难确认这些说法的真实性。
www.infoq.com
10.
In this scenario, you can use IPSec between the Web server and application server.
在此方案中,可以在Web服务器和应用程序服务器之间使用IPSec。
zxianf.blog.163.com
1.
Run the following command to check the state of the IPSec devices.
运行以下命令检查IPSec设备的状态。
www.ibm.com
2.
Since IPsec may call routines in the network stack recursively, what requirement does this place on the code?
既然IPsec可以递归调用网络协议栈内的,这对该代码有什么样的要求?
bbs.chinaunix.net
3.
For information about IPsec, see your Windows or networking documentation.
有关IPsec的信息,请参阅Windows文档或网络文档。
msdn2.microsoft.com
4.
ESP-protected IPSec traffic does not contain a visible TCP or UDP header.
ESP保护的IPSec流量没有包含可见的TCP或UDP报头。
blog.163.com
5.
A nice feature of CosMos is that it uses an IPSec tunnel to create secure end-to-end communication between the cluster nodes.
CosMos的一个非常好的特性是,它使用IPSec隧道来在集群节点间创建安全的端到端通信。
www.ibm.com
6.
Secure connection to existing data-center-based extranet solutions via an IPsec tunnel.
通过使用IPsec信道保证现有基于数据中心的外联网解决方案的安全连接。
www.ibm.com
7.
Use IPSec to secure the transport of data between the client and server.
使用IPSec保护客户端和服务器之间的数据传输安全。
zxianf.blog.163.com
8.
In other words, it provides a center for all security settings, including TCP, IPSEC, and auditing.
换句话说,它为所有安全设置,包括TCP、IPSEC和审计,提供一个中心。
www.ibm.com
9.
Use Internet Protocol security (IPSec) policies to filter ports on the Internet NIC.
使用Internet协议安全(IPSec)策略来筛选InternetNIC上的端口。
technet.microsoft.com
10.
If needed, IPsec can be used to encrypt this data.
如果需要,可使用IPsec加密此数据。
technet.microsoft.com
1.
Use IPSec to secure the communication channel between client and server if you use the TCP channel.
如果您使用TCP通道,请使用IPSec保护客户端和服务器之间的通信通道。
zxianf.blog.163.com
2.
Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
选择在IPSec隧道中加密数据所用的加密算法和散列算法。
www.ibm.com
3.
If needed, you can use Internet Protocol security (IPsec) to encrypt this traffic.
如果需要,可以使用Internet协议安全性(IPsec)对此通信进行加密。
technet.microsoft.com
4.
This new payload contains the original (untranslated) address of the IPSec peer.
这个新的有效载荷包含IPSec对话方的原始(未转换的)地址。
blog.163.com
5.
This process is safe and it reuses your team's existing skills: IPsec for site-to-site and Secure Sockets Layer in the cloud segments.
这个过程很安全,而且利用了您的团队的已有技能:站点到站点的IPsec,以及云环境的SecureSocketsLayer。
www.ibm.com
6.
IPSec snap-ins need to be added to this console.
需要把IPSecsnap-in添加到这个控制台中。
www.ibm.com
7.
External authentication uses a mechanism that isn't part of Exchange, such as a physically-secured network or IPsec.
外部身份验证使用非Exchange组成部分的机制,如物理安全网络或IPsec。
technet.microsoft.com
8.
Install this update to address multiple issues in the IPSec Policy Agent.
安装本更新程序可以解决IPSec策略代理中存在的多个问题。
www.microsoft.com
9.
The IPSec policy assigned to this machine has a data format that is not supported. No IPSec policy is currently active.
指派给这台机器上的IPSec策略有一个不支持的数据格式。当前没有任何IPSec策略是活动的。
angel.w15.5tom.cn
10.
You can use Internet Protocol security (IPSec) if a secure channel is required between front-end and back-end cluster servers.
如果前端群集服务器和后端群集服务器之间需要安全通道,则可以使用Internet协议安全(IPSec)。
technet.microsoft.com
1.
Here, you can make IPSec communicate with multiple hosts, as well by defining a subnet, and then click Next.
在这里,还可以通过定义子网让IPSec与多个主机通信,然后单击Next。
www.ibm.com
2.
Some implementations of IPSec use UDP port 500 as both the source and destination UDP port number.
IPSec的某些实现同时使用UDP端口500来作为源和目标UDP端口号。
blog.163.com
3.
To begin, enable IP filtering by enabling IPSec in the server.
首先启用服务器中的IPSec以启用IP过滤。
www.ibm.com
4.
The test shows the project based on IPSec VPN proposed in the article can enhance the security of WLAN.
测试结果表明,本文提出的IPSecVPN方案,可有效增强WLAN的安全性。
www.juhe8.com
5.
Although NATs help conserve the remaining IP address space, they also introduce problems for end-to-end protocols such as IPSec.
虽然NAT有助于节省剩余的IP地址空间,但是它们也给诸如IPSec之类的端对端协议带来了问题。
blog.163.com
6.
No policy version information was found. IPSec policies can not be retrieved. Contact your system administrator.
找不到策略版本信息。无法检索IPSec策略。请与您的系统管理员联系。
angel.w15.5tom.cn
7.
IPSec for IPv6 provides the same level of authentication and security as it does for IPv4.
IPSec为IPv6提供了与IPv4的相同级别的认证和安全。
www.ibm.com
8.
Internet Protocol Security (IPSec) is another enhancement to the 2. 6 kernel.
Internet协议安全(IPSec)是对2.6内核的另一个增强。
www.ibm.com
9.
IPsec is an optional security component of IPv4, but in IPv6 it is mandatory.
IPSec是IPv4的一个可选的安全组成部分,但在IPv6是强制性的。
www.bing.com
10.
Save this as IPSec. msc for future use.
把它保存为IPSec.msc供以后使用。
www.ibm.com
1.
Besides extending IPSec, IPComp, and tunneling support to work over IPv6, the 2. 6 kernel provides IPv6 Privacy Extensions.
除了扩展IPSec、IPComp和对IPv6隧道的支持外,2.6内核还提供了IPv6隐私扩展。
www.ibm.com
2.
SQL Server 2005 supports Secure Sockets Layer (SSL) and is compatible with Internet Protocol security (IPsec).
SQLServer2005支持安全套接字层(SSL),并且与Internet协议安全(IPsec)兼容。
msdn2.microsoft.com
3.
Give the preshared key you want to use for authentication in IPSec tunnel (for example 12345) and click Next.
对于选择的预共享密钥,指定IPSec隧道中的身份验证(例如12345)并单击Next。
www.ibm.com
4.
For more information about IPSec policies, see the Microsoft Windows 2000 or Windows Server 2003 online documentation.
有关IPSec策略的详细信息,请参阅MicrosoftWindows2000或WindowsServer2003联机文档。
technet.microsoft.com
5.
A Security Analysis of the IPSec Based WLAN Solution and a Study of Its Algorithm
基于IPSec的无线局域网安全通信机制分析及其算法研究
www.ilib.cn
6.
Increase flexibility with an architecture that supports all major security protocols - including SSL, TLS, IPSec, ETS, and DRM
使用支持所有主要安全协议(包括SSL、TLS、IPSec、ETS和DRM)的体系结构增强灵活性
www.certicom.com
7.
Research on the Architecture of the Next Generation High-performance Network Security Processor Based on IPSec
基于IPSec的下一代高性能安全处理器的体系结构
ilib.cn
8.
A Study of Security Policy System and Its Implementation in IPsec
安全策略系统的研究及其在IPsec中的应用
www.ilib.cn
9.
Network administration focusing on network configuration, IPsec, the Internet super server, Apache, and BIND
网络管理,重点在网络配置、IP安全、互联网超级服务器、Apache和BIND等
www.bing.com
10.
ipsec is the only protocol that can give security guarantee for any communication in the internet
它是目前唯一一个能够为任何internet通信提供安全保障的协议。
www.ichacha.net
1.
Research and Implementation of the Automatic Authe-ntication Configuration Mode for the IPSec Client End
IPSec客户端自动认证配置方式的研究与实现
www.ilib.cn
2.
Key exchange implementation and security analysis for IPSec based virtual private network
基于IPSec的虚拟专用网络密钥交换实现及其安全分析
www.ilib.cn
3.
An Application-Oriented IPSec System Policy Management Mechanism
面向应用的IPSec系统策略管理机制
www.ilib.cn
4.
On the Implementation of the IPSec Security Engine in High-Speed Boundary Routers
高速边缘路由器中IPSec安全引擎实现技术的研究
www.ilib.cn
5.
Analysis About Security Association and Production Process of Confidential key in IPSec System
IPSec系统中安全联盟及密钥生成过程分析
ilib.cn
6.
Device manufacturers who want to create an IPSec-based VPN client for a constrained device
希望为限定设备创建基于IPSec的VPN客户端的设备制造商
www.certicom.com
7.
Study on the Technologies of IPSec Security Processing Unit in High Speed Boundary Routers
基于高速边缘路由器的IPSec处理部件的研究
scholar.ilib.cn
8.
Study and implementation of workgroup-based IPsec security policy system
基于工作组的IPsec安全策略系统研究与实现
service.ilib.cn
9.
High performance IPSec for resource constrained devices
用于资源有限的设备的高性能IPSec
www.certicom.com
10.
Analysis of Realization of IPSec Security Engine in High Speed Boundary Routers
高速边缘路由器中IPSec安全引擎实现技术分析
www.ilib.cn
1.
Accept the unsecured communication, but always respond using IPSec, A
接受不安全的通讯,但总是用
www.fan6.net
2.
The problems associated with using IPSec over NATs are the following
与通过NAT使用IPSec相关的问题如下
blog.163.com
3.
IPSec VPN Key Technique Research And Application Analysis
关键技术研究与应用分析
ilib.cn
4.
Research on Packet Balance Arithmetic of Switchboard in IPSec VPN
交换板报文平衡算法的研究
service.ilib.cn
5.
SSH Communications Security information on SSH IPSec Express toolkit
有关SSHIPSecExpress工具箱SSH通信安全性的信息
www-128.ibm.com
6.
IPSec Support for Front-End and Back-End Cluster Configurations
为前端和后端群集配置提供IPSec支持
technet.microsoft.com
7.
the new solution of nat and ipsec protocol compatibility
协议兼容性问题解决方案
www.ichacha.net
8.
Problems Associated with using IPSec over NATs
与通过NAT使用IPSec相关的问题
blog.163.com
9.
Implementation of VPN Based on IPSec and Its Security Analysis
基于IPSec的虚拟专用网的实现和安全性分析
www.wanfangdata.com.cn
10.
Update new IPSec configuration in the IKE database
在IKE数据库中更新新的IPSec配置
www.ibm.com
1.
Research on Some Management Problems of IPSec VPN
进行运营管理的若干问题的研究
service.ilib.cn
2.
Analysis of security and implementation of virtual private network based on IPSec
基于IPSec的虚拟专用网络实现及其安全性分析
ilib.cn
3.
Needed to implement IPSec policy on server
在服务器上实现IPSec策略时需要
technet.microsoft.com
4.
IPSec support for front-end and back-end servers
为前端服务器和后端服务器提供IPSec支持
technet.microsoft.com
5.
netsh ipsec static delete policy all
删除所有策略
wenwen.soso.com
6.
Run the following command to check if any IPSec tunnel is active
运行以下命令检查是否激活了任何IPSec隧道
www.ibm.com
7.
IPSec realization scheme based on network processor
基于网络处理器的IPSec的实现方案研究
service.ilib.cn
8.
Management of IPSec Security Policy Based on Formal Language and View-tool
基于形式化与图形化的IPSec安全策略管理
www.ilib.cn
9.
Research and Design of Linux VPN Security Gateway Based on IPSec Protocal
安全网关的研究与设计
www.ilib.cn
10.
netsh ipsec static show policy all
显示所有策略
wenwen.soso.com
1.
ipsec is a new ip security protocol suite
ipsec协议是一个新的ip层安全协议。
www.ichacha.net
2.
VPN How to Set up VPN on Public Network by IPSec Technology
怎样用IPSec技术在公网中建立
www.ilib.cn
3.
Design and Implementation of IPSec VPN Client Based on NDIS
客户端的设计与实现
ilib.cn
4.
Design and Study on Security of School Network Based on IPSec
基于IPSec的网络安全在校园网中的研究与设计
www.ilib.cn
5.
A Security Multicast System Model Based on IPSec
一个基于IPSec的安全组播系统结构模型
ilib.cn
6.
How to simplify the creation and maintenance of Internet Protocol (IPsec) security filters in Windows Server 2003 and Windows XP
WindowsServer2003和WindowsXP中如何简化创建和维护的Internet协议(IPsec)安全筛选
support.microsoft.com
7.
IPsec ignores the CRL check process during IPsec session initiation on a computer that is running Windows Server 2003 with SP1
IPsecIPsec是运行WindowsServer2003带有SP1计算机上启动会话期间忽略CRL检查过程
support.microsoft.com
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2024/12/26 14:29:21