Examples of using Ipsec in English and their translations into Russian
{-}
-
Colloquial
-
Official
IPsec security methods.
We use OpenVPN and IPSec.
IPsec tunnel authorization.
To create a new IPsec policy.
IPsec Statistic Description.
People also translate
This is the number of active IPsec tunnels.
IPsec to Domain Controllers.
To set the new IPsec key, click OK.
IPsec Policy snap-in tasks.
They can also serve as the platform for IPsec.
Apply IPsec tunnel authorization.
It also supports both OpenVPN and IPSec connections.
Verify IPsec client configuration.
The following figure shows an example of IPsec logical networks.
Exempt IPsec protected connections.
To choose the Internet Protocol security(IPsec) settings,click IPSec.
I'm passing the IPsec, sending you the I.P. address now.
IPsec, which stands for Internet Protocol security.
To secure traffic with IPsec, you can create connection security rules.
IPsec settings are defined in separate connection security rules.
For more information about using tunnels, see IPsec Tunnel Settings.
Use IPsec to secure communications between site systems.
In addition, the router supports IPsec and allows to create secure VPN tunnels.
The IPsec Services Service in Microsoft Windows handles this functionality.
For" Type of VPN" select" Layer 2 Tunneling Protocol with IPsec(L2TP/IPsec)", then Click on" Advanced settings.
IPsec policies are used to configure IPsec security services.
They use a common set of IPsec policy settings for providing IPsec protection.
IPsec settings must be defined in separate connection security rules.
This configuration might be required if you are using Network Access Protection with IPsec enforcement in a native mode environment.
In the IPSec dialog box, select the Enable the IPSec settings check box.