Voorbeelden van het gebruik van Internet protocol security in het Engels en hun vertalingen in het Nederlands
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
To choose the Internet Protocol security(IPsec) settings, click IPSec.
This method is useful for domain isolation using Internet Protocol security IPsec.
An Internet Protocol security(IPsec) policy consists of one or more rules that determine IPsec behavior.
For more information, see the Internet Protocol Security(IPSec) Help content.
For each Internet Protocol security(IPsec) rule, you must define to which connection types the rule will be applied.
Allow a connection only if it is secured through the use of Internet Protocol security IPsec.
Used by Internet Protocol security(IPsec) to digitally sign, encrypt, and decrypt network communication.
Cause: The remote control traffic is being encrypted by Internet Protocol security IPSec.
Internet Protocol Security(IPsec) is a protocol that provides authentication
A health certificate is required for NAP with Internet Protocol security(IPsec)-based enforcement.
In an Internet Protocol security(IPsec) enforcement design, remediation servers should be placed in the IPsec logical boundary network.
The following tables list the default values for Internet Protocol security(IPsec) settings.
Internet Protocol security(IPsec) is a protocol that enforces authentication
Network traffic that matches this rule is not authenticated by Internet Protocol security(IPsec) on this computer.
Internet Protocol security(IPsec) provides integrity by calculating a hash generated from the data in the network packet.
The first authentication method is performed during the main mode phase of Internet Protocol security(IPsec) negotiations.
Use this dialog box to configure the Internet Protocol security(IPsec) main mode key exchange and quick mode data protection settings used for all IPsec negotiations.
Use this option to specify that only connections that are protected by Internet Protocol security(IPsec) are allowed.
Internet Protocol Security(IPsec) is a protocol suite for securing Internet Protocol(IP)
Use this option to specify that only network packets that are protected by Internet Protocol security(IPsec) are allowed.
You must have Internet Protocol security(IPsec) policies and domain isolation deployed in your organization to enforce network access restriction with the IPsec enforcement client.
The first and second authentication methods are used during the main mode phase of Internet Protocol security(IPsec) negotiations.
If the rule specifies an Internet Protocol security(IPsec) tunnel,
You must configure a trusted server group only if you are using the Internet Protocol security(IPsec) enforcement client to enforce health policies.
set up encryption of the network traffic that uses Internet Protocol security IPsec.
It also includes connection security rules that use Internet Protocol security(IPsec) to protect traffic as it travels across the network.
Select this option to specify that the network traffic that matches this rule travels from Endpoint 1 to Endpoint 2 through an Internet Protocol security(IPsec) tunnel.
only allow a connection that is secured through the use of Internet Protocol security(IPsec), or explicitly block the connection.
traffic protection by using Internet Protocol security IPsec.
uses IPv6 and Internet Protocol security(IPsec) to automatically initiate and maintain remote connectivity to an internal network from the Internet. .