虛擬安全網路 的英文怎麼說

中文拼音 [ānquánwǎng]
虛擬安全網路 英文
virtual security network, vsn
  • : Ⅰ名詞1 (空虛) void; emptiness 2 (政治思想等方面的道理) guiding principles; theory 3 (二十八...
  • : 動詞1. (設計; 起草) draw up; draft 2. (打算; 想要) intend; plan 3. (模仿) imitate
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : Ⅰ名詞1 (捕魚捉鳥的器具) net 2 (像網的東西) thing which looks like a net 3 (像網一樣的組織或...
  • : 1 (道路) road; way; path 2 (路程) journey; distance 3 (途徑; 門路) way; means 4 (條理) se...
  • 虛擬 : 1. (虛構的) invented; fictitious 2. (假設的) suppositional; 虛擬語氣 [語言學] subjunctive mood
  • 網路 : 1. [電學] network; electric network2. (網) meshwork; system; graph (指一維復形); mesh
  1. Security, too, is a key issue for switching the traditional private nforork to vpn. security of mpls wn architectur is analyzed thorouguy in this thesis, including septheion of address space and route, hiding of the mpls core smicture, resistance of attacks, impossibi1ity of 1abe1 spoofing

    性是專用能否取代傳統專用的關鍵,本文對mplsvpn體系結構的性進行了深入分析,包括地址空間和由的隔離、隱藏mpls核心結構、抵抗攻擊、抵抗標記欺騙等,從而得出mplsvpn與atm framerelay具有相同級別的結論。
  2. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了專用的概念、特點、技術及實現的關鍵隧道協議,通過對實現技術的分析比較,選用了性強大的ipsec隧道技術,接著深入研究了ipv6協議ipsec的體系結構、操作模式,詳細論述了ipsec協議簇的各個組成部分,如認證報頭ah協議、封裝載荷esp協議、密鑰管理ike協議、加密認證演算法、聯盟和策略等,以及這些組件之間如何協作,來共同實現對層ip數據包的保護。
  3. A relatively security, reliable virtual private network _ and implementary plan was designed to meet the demands of data traffic, security of information transmission, transmission of video frequency, ip telephone, oa of companies. the design applied vpn and realized data increment service, for example, transimission of video frequency, ip telephone and oa and so on. these projects gained good economic and social utility for si chuan unicom

    論文依據四川某集團公司對數據通信、信息傳輸、視頻傳輸、 ip電話、集團公司oa的需求,具體設計了一個相對、可靠的專用建設和實施方案,依據此方案在集團公司實施了vpn ,又在該vpn平臺上實現了相關的數據增值業務,如:視頻傳輸、 ip電話及集團公司oa等。
  4. In this paper, the shortages and limitations of the perimeter firewall and current host firewall are analyzed, the current network attacks and the methods defending against them are analyzed and discussed, the strategies of the network security in the intranet are discussed, the scarcities of the current applications for the host firewall in the intranet are analyzed, a kind of intranet host firewall model based on the techniques of tcp / ip packets filter, vpn and ids is designed and discussed deeply

    本文針對的現狀,分析了邊界防火墻及現有主機防火墻的不足之處;對現有黑客的攻擊手段與方法進行分析研究,並對防禦這些攻擊的方法進行了研究;對企業策略進行討論,分析了現有主機防火墻在企業中應用的不足,並在此基礎上,結合包過濾、專用、入侵檢測等防火墻技術,設計了一種企業中的主機防火墻模型,並對這一模型進行了較深入地研究。
  5. An abstract model of secure subnet is put forward based on channel model of vpn and secure subnet model of enterprise in charpter three. and double - way authentication access control mechanism of secure subnet is analyzed in detail in charpte four

    首先以「專用」 ( vpn )隧道模型和企業級結構模型為基礎,提出的抽象模型,然後詳細討論了的雙向認證訪問控制機制。
  6. This paper gives the general design of the administration system in the broadband man. it also explains the detail implementation, such as the modules of the traffic accounting and radius ( remote authentication dial in user service ) programs, the control of the layer 2 switch ports, the distribution of ip address, and so on. during the building of the system, we greatly unproved the efficiency of snmp ( simple networks manage protocol ) trap and achieved the access control hi the broadband man

    對以太方式接入的用戶,利用802 . 1q 、 pvlan (私有局域)等新技術實現了用戶數據隔離和性保證,並對用戶埠資源進行了統一管理和遠程自動控制,採用snmp (簡單管理協議)採集埠流量的方式實現了以太用戶的按流量計費,詳細設計了具體的流量採集程序模塊組成和各部分的功能。
  7. Therefore, many security technologies have been developed. vpn technology offers a safe and reliant tunnel for both sides in communication

    Vpn ( virtualprivatenetwork ,私有)技術提供了一個、可信的通道供通信雙方使用。
  8. The active directory client extension does not deliver advanced virtual private networking protocols, like internet protocol security ipsec or layer 2 tunneling protocol l2tp

    該active directory客戶端擴展不提供高級專用vpn協議,如internet協議性ipsec或第2層隧道協議l2tp 。
  9. A private network between two remote sites, over a secure encrypted virtual internet connection ( a tunnel )

    兩個遠程站點間專用,通過加密的因特連接通道。
  10. Firstly, unlike other technologies that verify security at high - level protocol, verifying security at ip level is transparent to applications and end - users that don " t have to be modified even if there is any change at ip level. secondly, another conspicuous advantage is that it can be used on any machine that uses ip protocol to communicate. no matter ipsec runs on routers, on firewall machines, on various application servers, and on end - user desktop or laptop machines, it can verify security of network transmission

    首先,在通信協議底層對數據傳輸提供保護與其它在高層協議中提供保護的技術不同,在ip層提供性保護對應用程序和終端用戶都是透明的,不需要應用程序、其它通信層次和部件做任何改動;其次, ipsec的另一個顯著特點是它幾乎可以運行在使用ip協議進行通信的任何機器上,不論是運行在由器、防火墻主機、各種各樣的應用服務器上,還是運行在終端用戶的個人計算機或筆記本電腦上,它都能提供一定的保障;最後,利用ipsec實現專用是目前通過internet實現企業內部的主要解決方案之一。
  11. According to the platform of guizhou power mpls / vpn ( multiprotocol label switching / virtual private network ) data network, the thesis mainly study how to realize the fusion of various professional service systems, and ensure the requirements of security, stability, extensibility, feasibility and in the coordination with local services in order to ensure the large - scale access of services. mpls improves the technology of the private network construction

    基於目前建設的貴州電力mpls / vpn (多協議標記交換/專用)數據平臺,論文主要探討如何實現各專業系統的融合,保障各業務系統性、穩定性、可擴展性、可用性以及與本地業務的高度協同性等方面的要求,最終實現規模性的業務接入。
  12. The virtual local area network ( vlan ) is not only advantageous to the network security and prevents the network storm, moreover may enhance the network movement the efficiency, simultaneously also may solve the network to expands accommodates the question

    局域( vlan )不僅有利於和防止風暴,而且可以提高運行的效率,同時也可解決擴容問題。
  13. Abstract this paper analyzes the network security questions of the library, and discusses the design and technical implementqtion of constructing the network security system for the library based on comprehensively utilizing the technologies of virtual firewall, virtual local area network and virtual intrusion deception

    摘要分析圖書館問題,對如何綜合運用防火墻、局域入侵誘騙三種技術構建圖書館體系進行面的設計與技術實現。
  14. Layer 2 tunneling is a technique which forwards layer 2 protocol data units ( pdus ), especially ppp, through a data transfer tunnel established on top of public data network services, so as to provide a means for setting up layer 2 virtual " leased links ". for its convenience and cost effectiveness, it has become a popular technology for setting up intranets for geographically dispersed enterprises

    第二層隧道協議( layer2tunnelingprotocol )作為借用公用數據建立公用隧道在遠程用戶之間提供對第二層協議(特別是使用極廣的點到點協議( ppp ) )進行中繼,提供實現遠程專用的技術,近年來受到廣泛的重視,並逐漸成為建立的跨地域專用( vpn )的重要手段之一。
  15. Analysis of security and implementation of virtual private network based on ipsec

    專用實現及其性分析
  16. Key exchange implementation and security analysis for ipsec based virtual private network

    專用密鑰交換實現及其分析
  17. You can now more easily create a virtual private network to securely connect computers over the internet

    現在可以更加方便地創建專用地通過internet連接其他計算機。
  18. That is to say that ipsec is not suit for the guizhou electric power data network. to this point, after synthesizing the feature of the security, the expansibility and the flexibility, this thesis conclude that mpls vpn is a reasonable way out to connect all parts of businesses and operations in the guizhou electric power system. by this means, different applications run within different vpns, separately in logic, safely and extended well and if necessary, every department can get easy access to the bone net only through a physical interface and interact each other

    在綜合對多協議標記交換專用( mplsvpn )特性的描述,以及mplsvpn固有的高擴展性和靈活性的特點后,為保證各專業系統在骨幹傳輸的性,論文認為完可以使用mplsvpn的架構,把貴州電力系統的每個業務和相應的vpn對應起來,建議可通過電力數據通信骨幹mplsvpn方式,不同的應用在各自不同的vpn上,邏輯上相互獨立,可靠,並且擴展性好,每家單位只需要一個物理介面接入骨幹,即使在同一個局域上也可將vpn區分出來。
  19. We applied dummy special net, complex firewall and inbreak checking techniques into the network, applied inherent safety mechanism of system software, operating system, database and application software into the system, and applied norton anti - virus software into the application

    層應用了專用技術、復合型防火墻阻技術和入侵檢測技術;在系統層應用了基於系統軟體固有的機制、基於操作系統的機制、基於數據庫的機制和基於應用軟體的機制;在應用層採取防norton防病毒軟體。
  20. Abstract : this paper introduced virtual private network technology ( vpn ) , including its background , idea , superiority , principle , security system and administration of networks

    文摘:簡要介紹了專用技術( vpn ) ,包括它的背景、概念、優勢、工作原理、機制和管理。
分享友人