firewalls

英 [ˈfaɪəwɔːlz] 美 [ˈfaɪrwɑlz]

n.  防火墙(防止窃取信息的系统)
firewall的第三人称单数和复数

计算机



柯林斯词典

  1. N-COUNT 防火墙(自动防止未经授权者通过网络侵入计算机的系统或程序)
    A firewall is a computer system or program that automatically prevents an unauthorized person from gaining access to a computer when it is connected to a network such as the Internet.
    1. New technology should provide a secure firewall against hackers.
      新技术应该能提供安全可靠的防火墙抵御黑客袭击。

双语例句

  1. Because many networks have firewalls, the VP protocol can use HTTP tunneling and other technologies to bypass firewall conflicts.
    因为很多网络都有防火墙,VP协议可以使用HTTP隧道(tunneling)技术和其它技术绕过防火墙冲突。
  2. You might hear this referred to as "setting up the encryption domain" for the firewalls.
    您可能会听到这被称之为防火墙“设置加密域”。
  3. Firewalls and routers can also time out and disconnect a client session.
    防火墙和路由器也可能会超时,并断开客户机会话。
  4. In a traditional deployment, these servers are logically isolated from each other by routers and firewalls that limit the network connectivity and access to the servers.
    在传统部署中,这些服务器在逻辑上由路由器和防火墙彼此隔离,限制了网络连接和对服务器的访问。
  5. Collect information about network switches, routers, firewalls, and any other devices.
    收集关于网络交换机、路由器、防火墙和任何其他设备的信息。
  6. It also allows configuration of stateful firewalls.
    它还允许配置有状态的防火墙。
  7. In general, this environment does not include network devices such as load-balancers, routers, or firewalls.
    一般来说,这种环境不包括诸如负载平衡器、路由器或防火墙这样的设备。
  8. In fact, the firewalls above would probably prevent such access.
    事实上,上面的防火墙将可能会阻止进行此访问。
  9. Three firewalls have been added to the topology
    在这个网络布局中添加了三个防火墙
  10. Cloud-based firewalls are agnostic and do not require hardware or software changes to accommodate expansion.
    基于云的防火墙是不可知的,并且不需要对硬件或软件进行更改以适应扩张。
  11. No firewalls on the route between hosts or running on either host are blocking ICMP traffic.
    在两个主机之间的路由上或在这两个主机上运行的防火墙不会阻挡ICMP通信流。
  12. Routers, gateways, firewalls, and network collisions could all be a source of performance bottlenecks.
    路由器、网关、防火墙和网络冲突都可以造成性能瓶颈。
  13. Improper configuration of the controller and firewalls could lead to IaaS outages and attacks.
    控制器和防火墙的不当配置可能导致IaaS宕机和受到攻击。
  14. Network security is provided by high-performance, state-of-the-art firewalls.
    网络安全通过高性能、先进的防火墙提供。
  15. Separate your production networks from your internal network using firewalls.
    可以使用防火墙将您的生产网络与内部网络分开。
  16. Internal and external services and data feeds are mashed inside the enterprise firewalls.
    内部和外部的服务和数据源在企业防火墙内部混合。
  17. Firewalls and other technologies are used to achieve network segregation.
    您可以使用防火墙和其他技术实现网络隔离。
  18. In addition, requests usually pass through firewalls, proxies, and other servers.
    另外,请求通常能够通过防火墙、代理和其他服务器。
  19. You may have firewalls blocking the ports.
    您的防火墙可能会阻塞端口。
  20. Companies can also install firewalls, which form a barrier between the internal network and the public internet.
    公司也可以安装防火墙,这样可以在内部网和公共网络之间设置屏障。
  21. In addition, firewalls are no defence against internal hackers.
    黑客、骇客与防火墙的安全性问题;此外,防火墙无法防御内部黑客。
  22. The Indigo connector has a build in support for intermediaries including firewalls, proxies, and application-level gateways.
    Indigo连接器提供了一个构建(Build)为中介提供支持,包括防火墙、代理和应用程序级网关。
  23. Also it uses a non-standard port, so it is often blocked by client firewalls.
    由于使用了非标准的端口,这样客户端防火墙经常会阻止其运行。
  24. Firewall vendors offer VPNs that are essentially firewalls in combination with a variety of security measures and management tools.
    有些防火墙供应商也提供VPN,它们基本上是防火墙与各种安全措施与管理工具的结合。
  25. A world protected by firewalls, passwords and the most advanced security systems.
    它由防火墙、密码和最尖端的安全系统层层保护。
  26. Some third-party firewalls or proxy servers apply their own message header size limits.
    某些第三方防火墙或代理服务器应用其自身的邮件头大小限制。
  27. Firewalls and virtual private network gateways record traffic deemed suspicious.
    防火墙和虚拟专网网关记录被认为是可疑的流量。
  28. Web servers can be protected by the use of "firewalls".
    可以采用“防火墙”保护网络服务器。
  29. Internet Sacurity And Firewall Technology; In addition, firewalls are no defence against internal hackers.
    Internet安全和防火墙技术此外,防火墙无法防御内部黑客。
  30. Application-layer filtering firewalls can enforce security policy for both valid connection states and valid application layer communications.
    应用层过滤防火墙能够强制执行为合法的连接状态和合法的应用层通讯制定的安全策略。