Chinese translation for "port-based"
|
- 数据帧
- Example Sentences:
| 1. | A kind of port - based vlan design 设备的设计与实现 | | 2. | Local and metropolitan area networks - port - based network access control 局域网和城域网.基于端口的网络通路控制 | | 3. | At present , user isolation and security mechanism can only be realized through the port - based vlan and 802 . 1 qvlan 用户隔离以及安全机制目前只能通过基于端口的vlan和802 . 1qvlan来实现。 | | 4. | The port - based vlan is short of exclusive user identifications and lacks a security mechanism , so it cannot tell users from each other and does no good to the service development 基于端口的vlan用户缺乏唯一标识,本身也缺乏安全机制,无法实现用户的区分,不利于业务的发展。 | | 5. | All port - based services are tracked , slow responseno response and slow connectno connect are flagged and sorted by severity . a generic tcp conditions expert tracks all port - based protocols for slow response or connection characteristics 所有基于端口的业务被追踪,慢响应无响应和慢连接无连接被标记,并按照严重性排列。 | | 6. | The changes were brought about by three elements : port - based economy and business - oriented attitude , spread of new ideas and appearance of revolutions , and implementation of reform and opening - up policy and return of population 港口经济与重商主义,维新思潮与革命运动,改革开放与人口迁徙回流是促成这一蜕变的三个重要基因。 | | 7. | First of all , the defects of the ieee802 . 11 are analyzed . moreover , a detailed depiction of the ieee 802 . 1x ’ s authentication mechanism and the eap - tls ’ s authentication mechanism , which are based on port - based access control , is given 本文首先分析了ieee802 . 11标准的安全缺陷,详细描述了基于端口访问控制的ieee802 . 1x认证机制以及eap - tls认证机制。 | | 8. | " . the use of individual mac addresses with eapol permits the use of eapol in shared media lan environments , and , in particular , this has been allowed in order to support the use of port - based network access control in ieee 802 . 11 wireless lan infrastructures “将个体mac地址与eapol ( 7 . 8 )一起使用,可以允许在共享媒体局域网环境中使用eapol ,而且特别是它已经过允许,以便支持在ieee 802 . 11无线局域网基础结构中使用基于端口的网络访问控制。 | | 9. | For the above reason , new security mechanism for wlan is necessary to make sure the data in transmission confidential , complete and undeniable . at the same time , it should provide identity certification and access control . the 802 . 1x fulfils all the above requirements , which provides an upgraded certification and authentication method for controlling lan users ’ access through port - based certification 然而常规的无线局域网安全措施如wep等都已被证明不再安全,人们已经认识到必须专门为wlan设计新的安全防护机制,以保护在wlan中传输数据的机密性、完整性和不可否认性,同时对请求接入wlan的用户进行身份认证和访问控制。 | | 10. | Attempting to use eapol in a shared medium environment that does not support the use of secure associations renders port - based network access control highly vulnerable to attack ; for example , station a can mount a successful denial - of - service attack on station b simply by issuing an eapol - logoff packet using station b s individual mac address . " see ieee 802 . 1x specifications , page 21 , section 7 . 9 , lines 34 - 39 , available to link to in the 在不支持使用安全关联的共享媒体环境中进行使用eapol的尝试会导致基于端口的网络访问控制极易受到攻击;例如,工作站a只要发出一个使用工作站b的个体mac地址的eapol - logoff包,就能够在工作站b上挂装一个成功的拒绝服务攻击。 ” |
- Similar Words:
- "port-au-port" Chinese translation, "port-au-prince" Chinese translation, "port-au-spain" Chinese translation, "port-aux-francais" Chinese translation, "port-backuland use study" Chinese translation, "port-bou" Chinese translation, "port-bound" Chinese translation, "port-cartier" Chinese translation, "port-cartier-ouest" Chinese translation, "port-construction duty" Chinese translation
|
|
|