IPSec

IPSec

 英

  • 网络安全;安全协议;协议安全

例句

The IPSec policy storage failed to open. No Domain controller can be found for your domain.

无法打开IPSec策略存储控制器

Connections that use the L2TP protocol over IPSec require the installation of a machine certificate, also known as a computer certificate.

使用通过IPSecL2TP协议连接要求安装一个机器证书叫做计算机证书

Failed to open IPSec policy storage due to insufficient access rights. You must be an administrator.

由于没有充分访问无法打开IPSec策略存储必须管理员

For a more complete reference on IPSec, you can refer to the Security Guide document in the Resources section of this article.

有关IPSec完整描述可以参考本文参考资料SecurityGuide文档

Failed to open IPSec policy storage due to insufficient access rights. You must have administrator privileges.

由于没有充分访问无法打开IPSec策略存储必须管理员特权

No policy version information was found. IPSec stored policies cannot be retrieved. Contact your administrator immediately.

策略版本信息无法检索IPSec存储策略直接管理员联系

Communication with computers that do not support IPSec may expose your network to security risks.

支持IPSec计算机通讯使网络风险

IPSec provides a general solution to the complex combination of media and application mixtures that make up the Internet.

IPSec复杂结合一起构成Internet媒介各种应用程序提供一个通用解决方案

This new payload contains a well-known hash value, which indicates that the peer is capable of performing IPSec NAT-T.

这个有效载荷包含一个众所周知散列表明这个对话能够执行IPSecNAT-T。

A secure network protocol technology such as IPSec might be used to secure the communication channel between computers on a network.

可以使用一些安全网络协议技术例如IPSec保证网络计算机通信信道安全性

The manager instances route the IPsec tunnel traffic to the data center and act as encrypted switches between the cloud-based servers.

管理器实例IPsec信道交通路由数据中心作为基于云计算服务器之间加密交换机

IPsec is based on an end-to-end security model that establishes trust and security from a source IP address to a destination IP address.

IPsec基于IP地址目标IP地址建立信任安全机制安全模型

However, for an IPSec peer located behind a NAT, the NAT changes the source address of the initial IKE Main Mode packet.

然而对于一个位于NAT之后IPSec对话NAT改变初始IKE模式地址

Select the certification authority that you require for IPSec authentication when using this security rule.

使用这个安全规则选择IPSec身份验证请求证书颁发机构

Solution: By encapsulating the ESP PDU with a UDP header, the NAT can use the UDP ports to multiplex the IPSec data streams.

解决办法通过使用UDP报头封装ESPPDU,NAT能够使用UDP端口多路传输IPSec数据

Use this option if there are computers that do not support IPSec on your network.

如果网络支持IPSec计算机使用选项

Parts of IPsec-related services were jointly developed by Microsoft and Cisco Systems, Inc.

IPsec相关服务几个部分MicrosoftCiscoSystems,Inc联合开发

In this architecture, an IPSec router in the client infrastructure encrypts traffic bound for the service infrastructure.

在此体系结构客户端基础结构IPSec路由器服务基础结构通信进行加密

IPSec protocol is a set of related protocols that IETF provides the safety service for IP layer.

IPSec协议IETFIP提供安全服务定义相关协议

IPsec uses cryptography-based protection services, security protocols, and dynamic key management.

IPsec使用基于加密保护服务安全协议动态密钥管理

Whether both the initiating IPSec peer (typically a client computer) and responding IPSec peer (typically a server) can perform IPSec NAT-T.

发起IPSec对话一方通常一个客户端计算机响应IPSec对话一方通常一个服务器是否执行IPSecNAT-T。

A firewall capable of supporting IPSec termination.

一个支持IPSec终止防火墙

An IPSec router in the service infrastructure decrypts the IP packets and forwards them to the machine hosting the service for processing.

服务基础结构IPSec路由器IP数据包进行解密转发服务所在计算机进行处理

IPSec provides methods to authenticate and encrypt network communication across local networks and the Internet.

IPSec提供局域网Internet认证加密网络通信方法

This article showcases the ability of AIX IPSec to work across heterogeneous environments.

本文展示AIXIPSec异构环境工作能力

When you are transmitting secrets over a network, use Secure Sockets Layer (SSL) or IPSec to encrypt the channel.

通过网络传输机密内容使用安全SSLIPSec通道进行加密

A pre-shared key is used to guarantee you are who you say you are in an IP Security (IPSec) communication cycle.

共享用于保证IP安全设置IPSec通信周期表明身份

IPSec NAT-T defines both changes in the negotiation process and different methods of sending IPSec-protected data.

IPSecNAT-T协商过程进行修改并且定义发送IPSec保护数据不同方法

Over 10 years, the IPSEC code has gone through many changes and fixes, so it is unclear what the true impact of these allegations are.

IPSEC代码经历很多变化修复因此现在很难确认这些说法真实性

In this scenario, you can use IPSec between the Web server and application server.

在此方案可以Web服务器应用程序服务器之间使用IPSec

Run the following command to check the state of the IPSec devices.

运行以下命令检查IPSec设备状态

Since IPsec may call routines in the network stack recursively, what requirement does this place on the code?

既然IPsec可以递归调用网络协议代码什么样要求

For information about IPsec, see your Windows or networking documentation.

有关IPsec信息请参阅Windows文档网络文档

ESP-protected IPSec traffic does not contain a visible TCP or UDP header.

ESP保护IPSec流量没有包含可见TCPUDP报头

A nice feature of CosMos is that it uses an IPSec tunnel to create secure end-to-end communication between the cluster nodes.

CosMos一个非常特性使用IPSec隧道集群节点创建安全通信

Secure connection to existing data-center-based extranet solutions via an IPsec tunnel.

通过使用IPsec信道保证现有基于数据中心联网解决方案安全连接

Use IPSec to secure the transport of data between the client and server.

使用IPSec保护客户端服务器之间数据传输安全

In other words, it provides a center for all security settings, including TCP, IPSEC, and auditing.

换句话说所有安全设置包括TCPIPSEC审计提供一个中心

Use Internet Protocol security (IPSec) policies to filter ports on the Internet NIC.

使用Internet协议安全IPSec策略筛选InternetNIC端口

If needed, IPsec can be used to encrypt this data.

如果需要使用IPsec加密数据

热门查询