英語 での Access control lists の使用例とその 日本語 への翻訳
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
You can use access control lists to limit who can install applications.
Feel confident your firewalls are performing as they should with ASA High Availability monitoring and help optimize access control lists with shadow and redundant rule detection.
These options enable extended attributes and access control lists, respectively.
Depending on the database type, Plesk employs either firewall rules or MySQL access control lists.
Xml file to define the user data to migrate and also to control how access control lists(ACLs) for user data are migrated.
As an alternative to basic authentication, you can use access control lists(ACLs) to restrict access to your assets by allowlisting a set of IP addresses.
With RBAC, you don't need to modify and manage access control lists(ACLs), which was done in Exchange Server 2007.
Varnish allows you to use access control lists(ACLs), a feature that enables fast matching of a client's IP address against a list of defined IP addresses.
Network access control lists(ACLs) are applied at multiple levels of the infrastructure, blocking all the unauthorized incoming traffic and all unnecessary communications between infrastructure components.
If access control lists(ACLs) are in the control path between the controller and its access points, you need to open new protocol ports to prevent access points from being stranded.
Returning users connect automatically to the secure network with the appropriate policies, including virtual LANs and access control lists(ACLs)- all of which are applied dynamically.
In addition to advanced management, security, and quality of service(QoS), these switches deliver capabilities such as static routing, advanced threat defense, time-based access control lists and 802.1x, and many others.
With RBAC, you don't need to modify and manage access control lists(ACLs), which was done in Exchange Server 2007 and earlier.
At this time, Active Directory-based authentication and access control lists(ACLs) are not supported, but they will be at some time in the future.
This type of network switch is good for managing a complex network, but it requires the skills of a network engineer to monitor port security, access control lists(ACLs) and bandwidth allocation.
The company recommends setting the Internet zone security setting to“high” and using access control lists to disable Ole32db. dll to provide the most effective protection against an attack.
Knowledge Base While Windows uses access control lists(ACLs) exclusively to enforce security, the Macintosh uses any one of three different schemes: Mac-style folder permissions, UNIX permissions, or ACLs.
If you assign permissions to a parent object and want child objects to inherit these permission entries, you can keep performance optimal by making sure all the child objects have identical access control lists(ACLs).
The enforcement mechanism(e.g., individual/group/public controls, access control lists) would allow users to specify and control sharing of objects by individuals or groups, or both, and would provide controls to limit propagation of access rights.
Supervisor 1A provides enhanced performance and support for a broad range of services, including: Intelligent multi layer switching and network management Support for the FlexWAN module for WAN-edge connectivity 2 GBIC-based Gigabit uplink ports Wire-speed IP/IPX Multicast Full Internet routing table support Wire-rate inter-VLAN IOS access control lists(ACL) and intra-VLAN access control lists(VACL) HSRP for high availability and load balancing QoS features Additional Resources.