Примеры использования Outbound connections на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Do not establish tunnels for outbound connections.
Outbound connections are not authenticated.
Require authentication for inbound and outbound connections.
Add rate limit for outbound connections at tunnel endpoints.
Request authentication for inbound and outbound connections.
The server can make outbound connections that are not affected by this rule.
This is a PCB from a few centimeters with identical inbound and outbound connections.
Create rules for inbound and outbound connections with the following settings.
Allow outbound connections from all local ports to remote ports TCP 137- 139, TCP 445.
If the default settings are applied, no rule should be created for outbound connections.
It monitors inbound and outbound connections and scans ports and data packets.
Require authentication for inbound connections andrequest authentication for outbound connections.
XP's Windows Firewall cannot block outbound connections; it is only capable of blocking inbound ones.
For outbound connections of client computers to the Administration Server and Update Agents, the range of ports 1024-5000(TCP) is used.
This setting determines the behavior for outbound connections that do not match an outbound firewall rule.
In the Windows firewall settings window, configure the rules of outbound andinbound connections in Windows firewall see Section"Configuring inbound and outbound connections in Windows firewall" on page 21.
Configuring inbound and outbound connections in Windows firewall The names of settings may vary under different Windows operating systems.
Use the settings on this wizard page to specify how authentication is applied to inbound and outbound connections that match this connection security rule.
Examination of all inbound and outbound connections allows for inspection and restriction of traffic based on the source and/or destination address, thus preventing unfiltered access between untrusted and trusted environments.
However, in this mode a user may encounter connection problems in some network applications, since in Stealth Mode all inbound and outbound connections are blocked regardless of the rules created.
If you set Outbound connections to Block and then deploy the firewall policy by using a Group Policy object(GPO), computers that receive it will not receive subsequent Group Policy updates unless you first create and deploy an outbound rule that enables Group Policy to work.
Use the settings on this wizard page to specify how authentication is applied to inbound and outbound connections that match this connection security rule. If you request authentication, then the connection is allowed even if authentication fails.
Using the information provided on this page, the Security Configuration Wizard(SCW) will set the LAN Manager authentication level that is appropriate for your environment anduse that authentication level to authenticate domain accounts that are attempting to make outbound connections through the server.
If you specify a domain controller to be used as an installation partner,specify a domain controller that has a low number of inbound and outbound connections and ensure that it is not a significant originator or forwarder of changes with File Replication Service(FRS) replication partners.
In addition to proper placement in the basic set of services for co-location include:Providing a certain amount of prepaid traffic(inbound or outbound) connection to external channels with high bandwidth(100 Mbit/ c), the presence of reserve channels, increased level of security Round the clock support; Operational troubleshooting directly"on site" on-site.
This OS uses automatically generated keys to repeatedly encrypt and decrypt all outbound network connections thus giving the user virtually complete protection from tracking.
Other analog or digital access systems for semi-permanent connections without associated signaling information that is transmitted over the separate channel outbound.
You can see the detailed information about all the connections established on your computer, open ports, and the volume of inbound and outbound traffic.
For outbound rules, select Only allow connections to these computers to specify the computers to which this computer is allowed to connect.
You must create both an inbound and outbound for each tunnel connection.