Examples of using Security rule in English and their translations into Polish
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Financial
-
Official/political
-
Programming
-
Computer
outbound connections that match this connection security rule.
both IPsec authentication and integrity algorithms as defined in a separate connection security rule.
If you select All ports, then all network traffic for the protocol you selected matches this connection security rule.
To be considered secure, the network traffic must be protected by a connection security rule that requires authentication by using a method that includes computer identification information,
To be considered secure, the network traffic must be protected by a connection security rule that requires authentication by using a method that includes user identification information,
Select Client-to-gateway on the Tunnel Type page if the connection security rule is for a client computer that must communicate with a remote gateway
If the connection security rule is a tunnel rule,
If the connection security rule is a tunnel rule,
Ports tab of the Connection Security Rule Properties page.
The authentication methods available for the rule type are displayed on the Authentication Method page of the New Connection Security Rule Wizard and on the Authentication tab on the Connection Security Rule Properties page.
Ports tab of the Connection Security Rule Properties page.
Connection security rules use IPsec to secure traffic while it crosses the network.
Require encryption for all connection security rules that use these settings.
Key exchange settings you select here apply to all connection security rules.
The Council's security rules shall apply mutatis mutandis to the European Council.
Article 25- Security rules on the protection of classified and sensitive non-classified information.
Article 26- Security rules on the protection of classified and sensitive.
Costs of administrating security rules, including compliance monitoring.
Financing of administrating security rules, including compliance monitoring.
Select this check box to require all connection security rules to require encryption.