Authenticated Internet Protocol oor Nederlands

Authenticated Internet Protocol

en
A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements.

Vertalings in die woordeboek Engels - Nederlands

Authenticated Internet Protocol

en
A protocol extension to Internet Key Exchange (IKE) that supports additional authentication mechanisms and the combination of user and computer authentication requirements.
MicrosoftLanguagePortal

Geskatte vertalings

Vertoon algoritmies gegenereerde vertalings

voorbeelde

wedstryd
woorde
Advanced filtering
Voorbeelde moet herlaai word.
Network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over an Internet Protocol network.
Verlagingen in PTH werden in verband gebracht met niet-significante verlagingen van merkers van botmetabolisme (botspecifieke alkalische fosfatase, N-telopeptide, bot turnover en botfibroseEuroParl2021 EuroParl2021
In a tunnel mode rule, if you select Second authentication is optional, then the resulting IPsec policy is implemented as IKE only and does not use Authenticated Internet Protocol (AuthIP).
Hoe kan ik van een man houden die niet van zichzelf houdt?ParaCrawl Corpus ParaCrawl Corpus
The email servers assign the physical Internet Protocol (IP) addresses to email addresses, Google authenticates the sender of an email and, in some cases, the recipient, too, by means of the password, email address or identifying number and, by means of the internet protocols used, directs the conveyance of signals to an extent sufficient to support the assumption of control.
Andrew, liefjeEurlex2019 Eurlex2019
Network traffic that matches this rule is not authenticated by Internet Protocol security (IPsec) on this computer.
stil maar. stil maar, kleintjeParaCrawl Corpus ParaCrawl Corpus
DNSSEC is a protocol to verify the authenticity of the display name server responses (websites) up to the Internet root zone in what is called a ‘chain of trust’.
Alles wat uw hartje begeertEurLex-2 EurLex-2
The DNSSEC is a protocol to verify the authenticity of the display name server responses (websites) up to the Internet root zone in what is called a ‘chain of trust’.
Heeft hij u dat verteld?eurlex-diff-2018-06-20 eurlex-diff-2018-06-20
The DNSSEC is a protocol to verify the authenticity of the display name server responses (websites) up to the Internet root zone in what is called a ‘chain of trust’[21].
Dit plakband, dat minstens # mm breed moet zijn, wordt ten minste # minuten lang op het volgens punt #.#.# geprepareerde oppervlak gedruktEurLex-2 EurLex-2
STARTTLS is an extension to the Simple Mail Transfer Protocol (‘SMTP’) service that allows an SMTP server and client to use Transport Layer Security (‘TLS’) to provide private, authenticated communication over the Internet.
Deze terbeschikkingstelling wordt toegekend tot de vooravond van de dag waarop het personeelslid op een rustpensioen ten laste van de Schatkist aanspraak kan makeneurlex-diff-2018-06-20 eurlex-diff-2018-06-20
(HTTPS is the secure version of the basic Internet protocol HTTP, used to protect site authenticity on the internet.
We gaan ze verpletterenParaCrawl Corpus ParaCrawl Corpus
IPsec: IPsec (Internet Protocol Security) is another method by which communications over the Internet are authenticated, encrypted, and secured.
Recente behandelingsrichtlijnen moeten geraadpleegd worden om na te gaan of leverbiopsie noodzakelijk is vóór het begin van de behandelingParaCrawl Corpus ParaCrawl Corpus
Preshared key authentication is provided for interoperability and to meet Internet Protocol security (IPsec) standards.
Wij zijn ook geheim agentenParaCrawl Corpus ParaCrawl Corpus
The Kerberos flaws are serious because Kerberos is one of the most widely implemented authentication protocols on the Internet, and is used in many commercial products such as operating systems and routers.
Het is duidelijk dat de geldigheid van het TV voortkomt uit het volgen van heldere doelen, richtsnoeren en indicatoren voor het meten van prestaties, en een naar behoren gedefinieerde procedureParaCrawl Corpus ParaCrawl Corpus
The first authentication method is performed during the main mode phase of Internet Protocol security (IPsec) negotiations.
Ik heb een tijd in die sectie gezetenParaCrawl Corpus ParaCrawl Corpus
The first authentication method is performed during the main mode phase of Internet Protocol security (IPsec) negotiations.
Ze brengen mensen in verwarringParaCrawl Corpus ParaCrawl Corpus
The first and second authentication methods are used during the main mode phase of Internet Protocol security (IPsec) negotiations.
' t Is geen vrijdag, maar we doen toch iets bijzondersParaCrawl Corpus ParaCrawl Corpus
You can use a preshared key instead of a digital certificate for Layer Two Tunneling Protocol/Internet Protocol security (L2TP/IPsec) authentication of your virtual private network (VPN) clients.
Jij gaat nu geintjes maken?ParaCrawl Corpus ParaCrawl Corpus
Use this option to create an authentication exemption rule for connections to computers that do not require Internet Protocol security (IPsec) protection. Note
Ik vond haar adres en ging erheenParaCrawl Corpus ParaCrawl Corpus
Anonymous logon to disable HTTP authentication and use the guest account only for the Common Internet File System (CIFS) protocol.
Lopen, lopen!ParaCrawl Corpus ParaCrawl Corpus
“Private Internet Access provides tech-savvy users with the ability to choose among different encryption and authentication protocols.”
Bel en zorg dat ik met het volgende toestel terug kanParaCrawl Corpus ParaCrawl Corpus
The second authentication method is performed by Authenticated IP (AuthIP) in an extended mode of the main mode phase of Internet Protocol security (IPsec) negotiations.
Deze zondag?ParaCrawl Corpus ParaCrawl Corpus
Windows Firewall with Advanced Security uses Internet Protocol security (IPsec) to achieve connection security by using key exchange, authentication, data integrity, and, optionally, data encryption.
Algemeen verbindend wordt verklaard de als bijlage overgenomen collectieve arbeidsovereenkomst van # februari #, gesloten in het Paritair Comité voor het gas-en elektriciteitsbedrijf, betreffende de sociale programmatie voor de personeelsleden voor wie de collectieve arbeidsovereenkomst van # december # betreffende de waarborg van de rechten van de werknemers van de bedrijfstak elektriciteit en gas in dienst op # december # van toepassing isParaCrawl Corpus ParaCrawl Corpus
Secondly, the inbuilt security measure used by the time protocol NTP, known as authentication, doesn’t work across the Internet which means that NTP has no guarantee the time signal is coming from where it is supposed to.
De doelconcentratie vantre hemoglobine in twee studies was > # g/dl; in de overige drie studies was dat # g/dlParaCrawl Corpus ParaCrawl Corpus
The Internet Key Exchange (IKE) protocol is used between the peers to allow the peers to authenticate each other and negotiate the packet encryption and authentication mechanisms to be used for the connection.
Wat deed hij daar?ParaCrawl Corpus ParaCrawl Corpus
However, being one of the Internet’s oldest protocols and having been developed for over 25 years, NTP is equipped with its own security measures in the form of authentication.
Voorlichting over het gemeenschappelijk landbouwbeleidParaCrawl Corpus ParaCrawl Corpus
31 sinne gevind in 17 ms. Hulle kom uit baie bronne en word nie nagegaan nie.