Voorbeelden van het gebruik van Ipsec tunnel in het Engels en hun vertalingen in het Nederlands
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Computer
-
Ecclesiastic
-
Official/political
-
Programming
This is the number of active IPsec tunnels.
An IPsec tunnel must be defined at both ends of the connection.
For more information, see IPsec Tunnel Settings.
The data uses an IPSec tunnel through the overlay network for most of the way.
and then under IPsec Tunneling, click Customize.
Internet VPNs offer an alternative to access this backbone, mostly on the basis of IPSec tunnels.
Is it possible to create an IPSec tunnel to a cloud server?
only appears if the IPsec tunnel is running.
Provides VPN termination of IPSec tunnels to enhance wireless security.
provide the information required in the Customize IPsec Tunneling Settings dialog box.
An IPsec tunnel is typically used to connect a private network behind a gateway to either a remote client
This setting is configured on the Customize IPsec Tunneling Settings dialog box.
Select the option to specify that network traffic that matches another IPsec connection security rule does not go through the IPsec tunnel.
Note that this file is automatically generated when the IPsec tunnel is activated
you do not want the network packet to go through the IPsec tunnel.
If one of the rules establishes an IPsec tunnel, you can choose whether to use the tunnel
For more information about using tunnels, see IPsec Tunnel Settings.
If you are using L2TP for remote communications, no IPsec tunnel configuration is required because the client
then provide the required information in the Customize IPsec Tunneling Settings dialog box.
from the Advanced tab, under IPsec Tunneling, click Customize,
The authorizations you specify here are in effect only for those tunnel rules on which the Apply authorization option has been selected on the Customize IPsec Tunneling Settings dialog box.
from the Advanced tab, under IPsec Tunneling, click Customize, and then change Local tunnel endpoint.
is closest to the local computer, as configured on the Customize IPsec Tunneling Settings dialog box.
These settings only apply to tunnel mode rules that have the Apply authorization option enabled on the Customize IPsec Tunneling Settings dialog box.
This indicates whether the use of the tunnel is restricted to only authorized users and computers, as configured on the Customize IPsec Tunneling Settings dialog box.