Examples of using Internet protocol security in English and their translations into Italian
{-}
-
Colloquial
-
Official
-
Medicine
-
Financial
-
Ecclesiastic
-
Ecclesiastic
-
Computer
-
Programming
-
Official/political
To choose the Internet Protocol security(IPsec) settings, click IPSec.
For more information, see the Internet Protocol Security(IPSec) Help content.
This method is useful for domain isolation using Internet Protocol security(IPsec).
paired with Internet Protocol Security(IPSec).
Cause: The remote control traffic is being encrypted by Internet Protocol security(IPSec).
Used by Internet Protocol security(IPsec) to digitally sign,
An Internet Protocol security(IPsec) policy consists of one
For each Internet Protocol security(IPsec) rule, you must define to which connection types the rule will be applied.
In this capacity, HRA functions as a NAP enforcement server for the NAP Internet Protocol security(IPsec) enforcement method.
IPSec is short for Internet Protocol Security, which is an additional framework of security technology that's usually implemented alongside L2TP.
be configured for Internet Protocol security(IPsec) in order for Web Services events to be logged.
There is a free software-based VPN solution for Linux called FreeS/Wan that utilizes a standardized Internet Protocol Security(IPsec) implementation.
You can use the New Connection Security Rule wizard to create Internet Protocol security(IPsec) rules to meet different network security goals.
You must configure a trusted server group only if you are using the Internet Protocol security(IPsec) enforcement client to enforce health policies.
only allow a connection that is secured through the use of Internet Protocol security(IPsec), or explicitly block the connection.
Internet Protocol Security(IPsec) is the supported VPN implementation for Fedora,
High-volume certificate issuance scenarios such as Network Access Protection(NAP) deployments with Internet Protocol security(IPsec) enforcement create unique public key infrastructure(PKI) needs.
In a domain with Internet Protocol security(IPsec) enabled, scanners must support and be configured for
You must have Internet Protocol security(IPsec) policies and domain isolation deployed in your organization to enforce network access restriction with the IPsec enforcement client.
you do not need to configure NAP health registration authority settings unless you deploy Internet Protocol security(IPsec)-based enforcement.