在 英语 中使用 The firewall 的示例及其翻译为 中文
{-}
-
Political
-
Ecclesiastic
-
Programming
The firewall may be a separate machine.
How to turn on or turn off the firewall in Windows XP.
The Firewall is blocking the connection.
Recently, Roger Grimes opined that the firewall was dead.
Do the firewall rules allow traffic to that address?
人们也翻译
Solution: Allow ICMP traffic through the firewall or router.
The Firewall Configuration window opens.
This is the most common port allowed through the firewall.
Make sure the firewall you are behind has this port open.
A lot of products have to open the packet up at the firewall.
Please clear the firewall, blacklist, and other such functions on your phone;
Run iptables-nvL- line-number to view the firewall rules:.
The firewall can protect you against any type network borne attack.
For our example, we will assume the firewall is Linux iptables.
The firewall could also time out the connection after a period of inactivity.
Effectively protects the OS 24 hours a day and integrates with the firewall.
Right click the Firewall Policy node, point to New and click Access Rule.
In addition,PPTP or VPN pass-through options need to be enabled in the firewall settings, but usually they're switched on by default.
The firewall protection component is not supported by 64-bit versions of Windows XP.
In a private cloud, because it is generally within the firewall, so little impact on the IT department processes.
The firewall cannot prevent the attacks initiated by the internal network.
Alternatively, disable the firewall software and try to access the online service.
The firewall administrator decides what rules in the rule set he wants to log and adds the log keyword to those rules.
When processing a packet, the firewall scans the appropriate chain, one rule after another;
We need to make sure that the firewall allows SSH connections so that we can log back in next time.
You must make sure that the firewall is allowing SSH connections so that we can log in back in next time.
IM clients effectively perforate the firewall and provide an alternate conduit for viruses, spam and other unauthorised files.
Of primary importance is knowing whether the firewall is withstanding probes and attacks, and determining whether the controls on the firewall are adequate.