vpn

vpn

1. CE routers do not have to achieve MPLS VPN, or any special understanding.

CE路由器不必实现MPLS或对VPN有任何特别了解。

2. There are two basic VPN technologies: IPsec VPN and SSL VPN, and each has advantages and disadvantages.

IPsec VPN和SSL VPN是两种主流的VPN技术,各有优势和不足。

3. L2TP is an extension of the Point-to-Point Tunneling Protocol used by Internet service providers to enable a VPN over the Internet.

L2TP是点对点隧道协议的扩展,Internet服务提供商使用它来启用Internet上的VPN。

4. LER will be its own VPN other LER in the region to establish direct LDP conversation.

LER将与其所属的VPN区域中其他的LER建立直接的LDP会话。

5. OpenVPN supports IPv4/v6, Netware IPX, Appletalk, etc. And it can establish Intranet VPN, Extranet VPN and also can access VPN remotely. It is a full-featured VPN solution.

OpenVPN支持IPv4/v6、Netware IPX、Appletalk等多种网络协议,可部署内联网、外联网、远程访问等多种VPN系统,是一种“全功能”的VPN软件。

6. OpenVPN is an open source SSL-based VPN.

OpenVPN是一种基于SSL的开源VPN技术。

7. Outlook Anywhere eliminates the need for users in remote offices or mobile users to use a virtual private network (VPN) to connect to their Exchange servers.

Outlook Anywhere可以使远程办公的用户或移动用户无须使用虚拟专用网(VPN)即可连接到其Exchange服务器。

8. A RRAS server can route network traffic or set up either dial-up networking or a virtual private network (VPN).

RRAS伺服器可以路由网路流量,或设定拨号网路或虚拟私人网路(VPN)。

9. SSL VPN is a safety network framework implemented on the basis of SSL safety mechanism and the cur- rent firewall system.

SSL VPN是基于SSL安全机制,在不改变现有防火墙构架的基础上,实现的一种安全网络构架。

10. The SSL VPN needs to ensure that after the user logs off (or is timed out) their access credentials are wiped from the browser machine.

SSL VPN要求确保用户登出后(或超时后),把他们获得的访问凭证从浏览器的机器上抹去。

11. User interfaces for the SSL VPN access should be customized so that varying user groups see their own entry pages, typical to their work environment.

SSL VPN访问的用户界面,应该被定制,以至于不同的用户群体看到了类似于他们自己的工作环境的入口页面。

12. UTM allows you to operate a broad range of services: Leased Lines, Dial-Up and VPN, Hotspot, IP-Telephony, etc.

UTM允许你进行广泛的服务:线路租用,拨号和VPN专线,热区和IP电话等等.

13. VPN clients work by generating a useable IP address for the session that adds the remote computer to the corporate network.

VPN客户机是通过为将远程计算机添加到公司网络的会话生成可用的IP地址而运行的。

14. Application of VPN Technology in Vehicle Travel Expenses to Collect and Check System.

VPN技术在五小车辆养路费征稽系统中的应用。

15. VPN technology applied to campus network has raised it's manageability, flexibility and safety.

VPN技术在校园网中的应用,提高了校园网的可管理性、灵活性和安全性。

16. VPN technology is a virtual private network technology which use the cryptogram knowledge in the establishment of open public networks.

VPN技术是利用有关密码学知识在开放的公共网络上建立虚拟专用网络的技术。

17. The core of the technique of VPN is tunnel technique that includes IPSec, GRE, L2TP, PPTP etc.

VPN技术的核心是隧道技术,现有IPSec、GRE、L2TP、PPTP等技术。

18. A VPN is a method of connecting to a private network (for example, your office network) by way of a public network (for example, the Internet).

VPN是一种借助公用网络(例如Internet)连接专用网络(例如您的办公室网络)的方法。

19. The VPN server may not be able to get IP from DHCP for the VPN client. So, you may want to re-configure VPN host networking settings.

VPN服务器可能无法从DHCP获得分配个VPN客户端IP地址。因此,你须要重新配置VPN主机的网络设置。

20. What is the name or address of the VPN server?

VPN服务器的名称或地址是什么?

21. The VPN is a many of classificate method, it is divided the VPN into MPLS VPN, IPSEC VPN and dail VPN by its scale size.

VPN的分类方法很多,按网络规模大小将VPN分为MPLS VPN、IPSEC VPN和拨号VPN三类。

22. Pressure testing of VPN (Virtual Private Network).

VPN的压力测试,请问这样翻译对吗?

23. The performance of VPN is related to cryptographic algorithms, authentication algorithms and network environments.

VPN的性能与加密算法、认证算法和网络环境有关。

24. English: The VPN firewall is being deactivated. Please hold...

VPN防火墙正在关闭。请稍后...

25. A VPN connection won't work with an active Winsock proxy client.

Winsock代理客户端处于活动状态时,VPN连接将无法工作。

26. A closed society.Our first industry-specific firewall and VPN system for your company network: EAGLE.

一个安全隔离的系统我们为您提供的第一个应用于企业网络的工业级防火墙和VPN系统

27. Integrating Certicom's security technology enables faster performance for the DSL modem products and VPN solutions.

与Certicom安全技术的集成提高了DSL调制解调器产品和VPN解决方案的性能。

28. To protect corporate data,experts recommend that when wireless, you only connect to the Internet through a VPN and always use WEP or WPA encryption.

为了保护公司的数据,专家建议,当用无线上网时,只通过VPN(专用虚网),而且始终用WEP或WPA加密。

29. In order to guarantee the documents the transmission security, we have applied IPSEC VPN and SSL VPN.

为了保证文档的传输安全,我们应用了IPSEC VPN和SSL VPN。

30. In fact, many products are designed only as upgrades to existing offerings, providing basic VPN services that are limited to running only over the Internet.

事实上,很多产品是仅作为对现有产品的升级而设计的,即提供仅局限在因特网上运行的基本VPN服务。

31. A connection between the Internet and an Intranet creates a virtual private network (VPN), and constitutes a major security risk.

互联网与内部网的连接就建成了虚拟专用网(VPN),同时成了重大的安全风险。

32. WatchGuard’s UTM bundles include FW, VPN, IPS, URL filtering, AV and antispam.

产品包括FW、VPN、IPS、URL过滤、AV和防垃圾邮件功能。

33. Most VPN solutions available today are basic offerings that stop at simple tunneling capabilities, providing only rudimentary point-to-point connections.

今天能得到的多数VPN方案都是提供基本功能,停留在简单的隧道功能,即只提供基本的点对点连接。

34. The VPN technique and the procedure for building VPN connection with routers are introduced.

介绍了VPN技术和路由器实现VPN连接的建立过程。

35. This paper introduces the components of virtual private network,analyzes the various plans about VPN and presents some key technologies in VPN.

介绍了VPN技术的构建方法,分析了国内外各厂家在VPN上的解决方案,最后介绍了VPN的关键技术。

36. This article introduces the methods and the steps of Availing itself of VPN technology to build intercommunication among schools.

介绍了利用VPN技术建立校际间网络的方法和步骤。

37. This paper introduces the embedded VPN gateway ESG-1 and discusses the design outlines of device driver program for the PCI Ethernet adapter based on RTEMS.

介绍了嵌入式VPN网关ESG-1的基本情况,讨论了RTEMS的PCI网卡驱动程序的设计要点:采用服务线程进行网络中断处理;

38. This paper in detail introduce how to use VPN technolog y to create network LED display system, the structure principle and tunnel agreement provide an applied network resolvent.

介绍如何利用VPN技术搭建网络型LED显示屏系统,阐述VPN系统的构成原理及隧道协议,并提供一种实用的联网解决方案。

39. With the necessity of ERP's development, a kind of scheme of the ERP's security architecture based on the main theory of VPN technology is proposed.

从ERP系统发展的需要出发,在分析VPN关键技术的基础上,介绍了一种基于VPN的ERP广域网组网方案。

40. Access to a proprietary internal LAN from a wireless network should be through a VPN to a central server with strong authentication - like token devices.

从无线网络访问专用内部LAN应该通过VPN连接到需要严格认证的中央服务器如令牌设备。

41. If you wish to create a VPN with windows XP, then you've come to the right place.

他们都认同了隧道协议,因为他们都急需的运用加密技术创建了一个“虚拟隧道”。

42. But the VPN and NTA are based on some kinds of central server to construct the whole enterprises network.

但VPN以及NTA所做的都是基于某种中心服务器来构筑整个企业网的。

43. But the truth is, if anyone cornered you at the water cooler and asked, "What is a VPN?" You'd have a hard time giving him an intelligible answer.

但实际情况是,如果有人在冷水机旁碰到你,问:“何谓VPN?” 你将一时很难给他一个聪明的回答。

44. However, you can deploy Team Foundation Server in an environment that supports virtual private network (VPN) connections.

但是,您可以在支持虚拟专用网络(VPN连接)的环境中部署Team Foundation Server。

45. But the cryptograph algorithms cost too much CPU time, which descrease the throughput of the VPN Gateway.

但是加密算法佔用大量的CPU资源,降低了VPN网关的吞吐量。

46. This is you can use multiple ISP profiles, but control which one if them is to be associated with your VPN configuration.

你也可以使用共享isp的配置,但是如何控制他们中的一个完全取决于你的配置。

47. You know that virtual private networks (VPN) might save your money by helping your firm make better use of the internet.

你知道虚拟专用网可以通过帮助你的公司更好地使用因特网而省钱。

48. You can use a virtual private network (VPN) to connect components to one network by using another network, such as the Internet.

使用虚拟专用网络(VPN),您可以通过其他网络(例如Internet)将组件连接到某个网络上。

49. Using our algorithms,service providers can automatically discover VPN topology that has already been configured using the current network configuration information.

使用该算法,服务提供者能使用当前网络配置信息自动地发现VPN拓扑。

50. For example, a company that implements a VPN system using IPSEC isn't immune from a worm or virus if its virus scanner only inspects e-mail at the firewall border.

例如,一个实现了使用IPSEC的VPN系统的公司,如果其病毒扫描程序只审查防火墙边界的电子邮件,就不能对蠕虫或病毒免疫。

51. Client/server database applications, for example, might have to be reconfigured to take into account variations in the speed of data transmission over the VPN.

例如,客户/服务器数据库应用程序因考虑到在VPN上传送数据速度的变化而可能不得不重新配置。

52. For example, a lot of VPN traffic is indistinguishable from SSH traffic, which means that it would be throttled if SSH was," he says.

例如,很多VPN流量与SSH流量几乎没有区别,这就意味着,如果SSH受阻,那么VPN也会如此。

53. Senior Software Engineer(IPSec)-WH806Responsibility:-Responsible for IPSec VPN designing and developing. -Work independe...... ...

公司名称:凹凸科技(中国)有限公司工作地点:其他发布时间:2009-4-22

54. Responsibility:-Responsible for IPSec VPN designing and developing. -Work independently or within a team to comp...... ...

公司名称:凹凸科技(中国)有限公司工作地点:湖北省武汉市发布时间:2009-4-11

55. How to progress the VPN network application?

关于VPN网路的申请,要如何着手呢?

56. At the same time analyze the VPN of QoS with the MPLS.

其次对基于MPLS技术的VPN QoS进行了分析。

57. Compatibility First, all ports can support navigation (vpn, ddn, ipe, Xin Tian, 443 port).

兼容性第一,可支持航行所有端口(vpn,ddn,ipe,信天游,443端口)。

58. The Nortel VPN Client provides the user-side functionality for secure remote access over IP networks using Contivity IP access routers and VPN servers.

北电网络的VPN网关3050是一种远程接入安全解决方案,允许远程用户访问企业应用和资源。

59. Another problem is that many current VPN offerings are incompatible with other vendor's products.

另一个问题是,当前很多VPN产品与其他厂家的产品不兼容。

60. In addition, NDIS intermediate driver is applied widely in many other areas, such as VPN, NAT, VLAN.

另外,NDIS中间驱动程序的应用很广泛,不仅仅应用在个人防火墙方面,还可以用来实现VPN、NAT、VLAN等。

61. In addition, P addition to the router can support MPLS, but also to support the VPN.

另外,P路由器除了要求能够支持MPLS之外,还要能够支持VPN。

62. Only if the dialup IP matches this IP will the VPN be brought up automatically.

只有在拨号地址和这个地址匹配的时候,这个vpn连接就会自动的建立起来。

63. The VPN connection over the Internet logically operates as a Wide Area Network (WAN) link between the sites.

在Internet上的VPN连接逻辑上作为站点间的广域网(WAN)链路运行。

64. In LER, a VPN using the nesting space must be tagged with the LER supported by all other VPN use the space for different nesting tags.

在LER上,每一个VPN使用的嵌套标记空间必须与该LER所支持的其他所有VPN使用的嵌套标记空间不同。

65. There is two kinds of method to realize VPN gateway by the Linux.

在Linux上有两种主要VPN网关的实现形式。

66. Under Proxy server, select the Use a proxy server for your LAN (These settings will not apply to dial-up or VPN connections) check box.

在“代理服务器”下,选中“为LAN使用代理服务器(这些设置不会应用于拨号或VPN连接)”复选框。

67. This article introduces the principle of VPN,and how to build a multi-schooldistrict library network.

在介绍VPN技术的基础上,阐述了利用VPN技术构建跨校区图书通还通借网络的实现过程。

68. Upon the above research, an application case based on BGP/MPLS VPN supporting OoS in some extent is given and the embodied scheme of this case is explained.

在以上研究的基础上,本文还给出了一个基于BGP/MPLSVPN实际应用案例,并给出了该案例的具体规划。

69. To deploy VPN in the circumstance of NAT devices, you must deal with the incompatibility between IPsec and NAT.

在使用NAT设备的环境中应用VPN技术,必须解决IPsec和NAT的不兼容性问题。

70. At the same time, the physical host that the virtual desktop runs on can be barred from the VPN.

在同一时间内,物理主机的虚拟桌面上运行,可以被禁止的VPN 。

71. After your computer connects to the Internet, the VPN server prompts you for your user name and password.

在您的计算机连接到Internet之后,VPN服务器提示您输入用户名和密码。

72. Because the AVL is a very fast method for the searching used in illegal VPN detection, we optimize and implement it in our design. 5.

在拦截处理时,使用了平衡二叉树,充分利用其查找快速的特点,优化了拦截的速度。

73. Combined the customer cellular phone message with the dynamic password, it can carry out the dynamic password attestation of Contivity VPN.

在现有VPN的基础上,根据用户的需求,文章提出动态密码认证方案。

74. The research and design of AAA management based on VPN.

基于VPN的AAA管理系统的研究。

75. RTCM is transferred through GPRS VPN to improve accuracy of GPS up to 0.9 m.

基于通用分组无线业务的虚拟专网(GPRS VPN)网络传送美国海运事业无线电委员会(RTCM)的差分数据,GPS定位精度达到0.9 m;

76. A very lightweight monitoring tool useful, you can monitor and protect the VPN connection.

壹个非常轻巧实用的监测工具,可以监控和保护VPN连接。

77. General Network Computing Ltd.(GNC) - Specializes in structural cabling, systems integration, wireless network, wireless booster and antenna, VPN, firewall and VoIP.

大米网络工程顾问-提供整体解决方案,包括系统、网路、电讯、保安、数据、等;还提供企业和个人的技术支援。

78. If clients telecommute or are setting up a branch office of a larger corporation, they probably need to use virtual private networking (VPN) features.

如果客户远距离工作或设立一个大公司的分部,他们可能需要使用虚拟专用网(VPN)特性。

79. If you know the IP address (for example: 131.107.10.25) of your VPN server, type that address for the VPN connection, and then press ENTER.

如果知道VPN服务器的IP地址(例如:131.107.10.25),请键入该VPN连接的地址,然后按Enter。

80. It enables Remote Desktop connections to a corporate network from the Internet without setting up a virtual private network (VPN) connection.

它从Internet允许到公司网络没有建立虚拟专用网络(VPN)连接远程桌面连接。

英语宝典
考试词汇表