This section shows you how to configure IF to implement an access control policy.
本节将向您展示如何配置IF来实现访问控制策略。
Section 7.2.5, "Access Control, Stage 2: Request Verification", describes the rules for this.
第7 . 2.5节“访问控制,阶段2:请求验证”描述了这一点的规则。
Section 7.2.5, "Access Control, Stage 2: Request Verification", describes the rules for this.
第7 . 2.5节“访问控制,阶段2:请求验证”描述了这一点的规则。
应用推荐