Examples of using Rule type in English and their translations into Russian
{-}
-
Official
-
Colloquial
The Rule Type page is displayed.
The wizard provides four predefined rule types.
On the Rule Type page, select Port.
In the Type drop down list, select the rule type.
On the Rule Type page, select Tunnel.
ARGUMENT, KEYS DESCRIPTION ANDPOSSIBLE VALUES Schedule rule type.
On the Rule Type page, select Tunnel.
Based on the two Anti-Hacker protection levels,there are two rule types.
On the Rule Type page, select Predefined.
This option is available only when you specify an Isolation or Custom rule type.
On the Rule Type page, select either Program or Custom.
As well as dynamic analyzers cannot compete with static ones regarding some rule types.
On the Rule Type page, select Authentication Exemption.
To specify a service by using the wizard, choose the Custom option on the Rule Type page of the wizard.
In Rule Type choose File Exists, then make sure the option Match any file is enabled.
In the Add exception box, select the rule type that you want to create, and then click Add.
On the Rule Type page, select any type except Authentication exemption.
In the New Inbound Rule Wizard, on the Rule Type page, select Predefined.
On the Rule Type page, select either Server-to-server or Custom, and then click Next.
Not all of the authentication methods listed here are available for all connection security rule types.
If you select this rule type, then the following pages in addition to the Name page are enabled in the wizard.
The rules displayed on this page are determined by the group you select in the list on the Rule Type page.
If you created this rule by using the Client-to-Gateway tunnel rule type, then Endpoint 1 is set to Any IP address.
Use this rule type to secure communications between two computers by using tunnel mode, instead of transport mode, in IPsec.
If you created this rule by using the Gateway-to-Client tunnel rule type, then Endpoint 1 consists of the IP addresses of the computers on the private network behind the local tunnel endpoint(the gateway).
The authentication methods available for the rule type are displayed on the Authentication Method page of the New Connection Security Rule Wizard and on the Authentication tab on the Connection Security Rule Properties page.
This rule is similar to the isolation rule type, but the Endpoints page will be displayed so that you can identify the computers that are affected by this rule. .