How do we ensure that all people, especially the poor, have access to the global network, have some control of the network, and can gain local benefits from being a part of the network?
如何能保证他们也能在这个网络中占一席之地?也能作为这个网络中的一部分而得到地区性好处?
Network access control is to ensure that the cyber source is not illegal, is the main strategy of network security and protection.
入网访问控制是保证网络资源不被非法使用, 是网络安全防范和保护的主要策略。
This paper introduces functions and rules of access control list, gives an instance to study how to use ACL in a real network environment, and ends with some advice on network security.
在对控制访问列表的作用和规则作了概括性介绍后,给出了一个应用的实例,具体分析了访问控制列表的使用方法,并对于它在网络安全中的应用给了一些建议。
The network Auditing System usually used to implement the user authentication, access control, log recording and other functions such as flow charge in a large network.
网络审计系统广泛应用于园区网络,实现园区网络内的身份认证、访问控制、日志记录以及流量计费等功能。
Currently, only few domestic device manufacturers can produce switches for core network, so this method of utilizing access control list in core network switches is a leading technology domestically.
目前在国内的设备生产厂商中,能够生产骨干层网络交换机的厂商为数不多,所以,在骨干层网络交换机上的访问控制列表技术在国内是处于领先地位的。
Routers are playing an important role in the network flow of the computer -network increasingly, where the key technology is the configuration of access control lists.
路由器在计算机网络流量控制方面的作用日益显著,其关键技术就是访问控制列表的配置。
The main purpose of Access Control, a major technique of network security prevention and protection, is to safeguard network resources from being illegally visited and used.
访问控制作为网络安全防范和保护的主要技术,主要任务是保证网络资源不被非法访问和使用。
SCADA provides local and remote control capability for immediate access to real-time network information, as well as easy connectivity to other systems in the electrical network.
SCADA系统为立即获得实时的网络信息,以及容易连接到其他系统的电气网络,提供了本地和远程控制能力。
In wireless network, intruders can change their MAC addresses to legitimate ones. Thus their wireless facilities can't be found by access control list, and they can steal network information.
在无线网络中,攻击者可以修改自己无线网卡的MAC地址为合法站点的地址,从而可以绕过访问控制列表,窃取网络信息,这给无线网络安全带来很大的危害。
On this basis, the proposed campus network security solutions, focusing on network access control, endpoint security, protocol analysis and network security monitoring and other related technologies.
在此基础上,提出了校园网安全方案,重点介绍了网络访问控制、端点安全保护、协议分析和网络安全监控等相关技术。
Authentication and network access control system verifies users legal identity and authorizes network resources access.
身份认证与网络访问控制验证用户的合法身份,授权网络资源的访问。
This paper provides two corresponding solutions: one is role-based access control, the other is effective security management to network system, network data and network users.
另一方面是对网络系统实施有效的安全管理,做好网络数据的备份和网络用户的管理两项工作。
An Internet network control device, which could be a separate router or switch, is typically used between the SS7 network and multiple net access switches.
因特网的网络控制装置(可以是一个分开的路由器或交换机),一般都用于七号信令网络和多个网络接入交换机之间。
One can control any IP addresses to access a network to set up a router access-control-list, but a normal ACL can not be implemented to access a network unilaterally.
通过建立路由器访问控制列表,可以控制任何IP地址对网络的访问,但要实现网络的单向访问,一般的访问列表是无法做到的。
In wireless optical code multiple access (W-OCDMA) network, Media access Control (MAC) is a key issue, which determines network performance, bandwidth efficiency, complexity and cost of terminal.
无线光码分多址(W -OCDMA)接入网中,数据链路层的媒质接入控制技术(MAC)至关重要,它直接影响网络的性能、带宽利用效率、终端设备的复杂度和成本。
This practice makes it easier for network administrators to control access to various items on the corporate network.
这种做法使网络管理员更容易对网络用户进入公司网络进行控制。
This practice makes it easier for network administrators to control access to various items on the corporate network.
这种做法使网络管理员更容易对网络用户进入公司网络进行控制。
应用推荐