FIREWALL RULES in Chinese translation

防火墙规则
火墙规则
的防火墙规则

Examples of using Firewall rules in English and their translations into Chinese

{-}
  • Political category close
  • Ecclesiastic category close
  • Programming category close
It also provides an interface for services or applications to add firewall rules directly.
它还具备一个通向服务或者应用程序以直接增加防火墙规则的接口。
In addition, you can also with the firewall rules to limit the spread of worms.
此外,还可以配合防火墙规则来限制蠕虫病毒的传播。
Well written firewall rules can form a great filter from LOIC DDOS preventing the attacks from being fully effective.
写得很好的防火墙规则,可以形成一个巨大的过滤器LOICDDOS防止有效有效的攻击。
Implement firewall rules that block unsolicited inbound traffic and SSH access from the Internet and internal network.
实施用于阻止未经请求的入站流量和来自Internet和内部网络的SSH访问的防火墙规则
Typically you see"wildcard masks" used to match host IDs in access-control lists or firewall rules.
通常,您会看到“通配符掩码”用于匹配访问控制列表或防火墙规则中的主机ID。
Although they do not display information such as memory or CPU performance, they can be used to display exact firewall rules or VPN parameters.
虽然它们不显示内存或CPU性能等信息,但它们可用于显示确切的防火墙规则或VPN参数。
Additionally, the system_profiler gives a very detailed breakdown of configurations, firewall rules, mounted volumes, hardware, and many other things without needing elevated permissions.
此外,system_profiler提供了非常详细的配置、防火墙规则、挂载卷、硬件和许多其他内容的详细分类,不需要提升权限。
Learn how to secure SSH sessions, configure firewall rules, and set up intrusion detection to alert you to any possible attacks on your GNU/Linux® server.
了解如何加强SecureShell(SSH)会话,配置防火墙规则,并设置入侵检测来提醒在GNU/Linux®服务器上可能受到的攻击。
In the case that you're running third-party security software, make sure to check your vendor support website for more specific details on adding firewall rules.
如果您正在运行第三方安全软件,请务必查看供应商支持网站,以获取有关添加防火墙规则的更多具体详细信息。
We can tighten Secure Shell(SSH) sessions, configure firewall rules, and set up intrusion detection to alert you to possible attacks on your GNU/Linux® server.
了解如何加强SecureShell(SSH)会话,配置防火墙规则,并设置入侵检测来提醒在GNU/Linux®服务器上可能受到的攻击。
Network virtualization allows users to configure firewalls and network to mirror on-site networks, including NAT rules and firewall rules, networks, and public IPs.
网络虚拟化(英语:Networkvirtualization)允许用户配置防火墙和网络以镜像已有的网络,包括NAT规则、防火墙规则、网络与公网IP。
Where IT would see issues of policy, rights and compliance, the network team would see access control, firewall rules, classes of service and SLAs.
如果IT部门要看到策略、权利和合规性问题,网络团队要保持访问控制、防火墙规则、服务级别和SLA的可见性。
This allows you to carry it on a removable thumb drive in case you want to add Firewall rules to other computers than your own.
这允许您在可移动的拇指驱动器上携带它,以防您想要将防火墙规则添加到除您自己的计算机之外的其他计算机上。
Unlike server-level firewall rules, the database-level firewall rules are created per database and are stored in the individual databases(including master).
不像服务器层级的防火墙规则,数据库层级的防火墙规则是针对每个数据库而建立的,并储存在独立的数据库中(包括master)。
Software for firewall rule management and tracking.
防火墙规则管理和跟踪软件.
The display shows firewall rule sets, which include the name of the rule and the associated information.
屏幕将显示防火墙规则集,其中包括规则的名称和相关信息。
The easiest- and most common- way to write a firewall rule is to block traffic on a specific port.
最简单的(也是最常见的)防火墙规则编写方法是阻止特定端口上的流量。
Wireshark is a known tool for creating packets that detect a vulnerability within a network and check out firewall rule sets.
Wireshark是一种众所周知的数据包制作工具,可以发现网络中的漏洞并探测防火墙规则集。
In the event you need to undo a firewall rule that you have written, you can delete the rule as follows.
若您需要撤消已经写好的一条防火墙规则,可以如下删除该规则:.
Changing the order of firewall rules.
更改防火墙规则的顺序.
Results: 129, Time: 0.0317

Word-for-word translation

Top dictionary queries

English - Chinese