From professional translators, enterprises, web pages and freely available translation repositories.
tsl sequence number (cláusula 5.3.2)
tsl sequence number (clause 5.3.2)
Last Update: 2018-03-04
Usage Frequency: 2
Quality:
mostrar página web sobre number in magnitudes
show webpage about
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
note that the ack sequence number is a small integer (1).
note that the ack sequence number is a small integer (1).
Last Update: 2018-02-13
Usage Frequency: 1
Quality:
the day number in the year (1-366).
the day number in the year (1-366).
Last Update: 2018-02-13
Usage Frequency: 1
Quality:
campo 2.008: número de secuencia (sequence number) (sqn)
field 2.008: sequence number (sqn)
Last Update: 2018-03-04
Usage Frequency: 2
Quality:
"mach number in transonic airflow around an airfoil; ma1 (b).
"mach number in transonic airflow around an airfoil; m 1 (b).
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting
seleccione los días de la semana en los que repetir la alarma@option: radio on day number in the month
select the days of the week on which to repeat the alarm
Last Update: 2011-10-23
Usage Frequency: 1
Quality:
básicamente, hacemos ésto como cortesía hacia otros hosts, ya que les prevendrá de ataques de predicción de secuencia numérica (sequence number prediction attack).
basically, we do this out of courtesy to other hosts, since we will prevent them from being attacked in a sequence number prediction attack.
Last Update: 2018-02-13
Usage Frequency: 1
Quality:
el párrafo inmediatamente posterior al título de la sección «tsl sequence number (cláusula 5.3.2)» se sustituye por el texto siguiente:
the paragraph following the section title ‘tsl sequence number (clause 5.3.2)’ is replaced by the following:
Last Update: 2018-03-04
Usage Frequency: 2
Quality:
en couchdb las bases de datos tienen un número de secuencia (sequence number) que se incrementa cada vez que la base datos cambia. couchdb se acuerda de qué cambios se hicieron en cada número de secuencia.
databases in couchdb have a sequence number that gets incremented every time the database is changed. couchdb remembers what changes came with which sequence number.
Last Update: 2018-02-13
Usage Frequency: 1
Quality:
entre otras:* 6windgate, pila ipsec fast path para procesador de red multinúcleo* nrl ipsec, una de las fuentes originales de código ipsec [http://ezine.daemonnews.org/199812/security.html* openbsd, con su propio código derivado de nrl ipsec* la pila de kame, que está incluida en mac os x, netbsd y freebsd* "ipsec" en el software ios de cisco [http://www.cisco.com/en/us/tech/tk583/tk372/technologies_tech_note09186a0080094203.shtml]* "ipsec" en microsoft windows, incluyendo windows xp[http://support.microsoft.com/kb/818043/, windows 2000y windows 2003[http://www.microsoft.com/windowsserver2003/technologies/networking/ipsec/default.mspx* las herramientas quicksec de safenet [http://www.safenet-inc.com/products/swtk/index.asp]* ipsec en solaris [http://docs.sun.com/app/docs/doc/817-2694?a=expand]* el sistema operativo aix de ibm* z/os de ibm* ipsec e ike en hp-ux (hp-ux ipsec)* "ipsec e ike" en vxworks [http://www.windriver.com/portal/server.pt?space=communitypage&cached=true&control=setcommunity&communityid=766]== lista de rfcs relacionados con ipsec ==* rfc 2327: pf_key interface* rfc 2367: pf_key interface* rfc 2401 (sustituye a rfc 1825 y fue sustituida por rfc 4301): security architecture for the internet protocol* rfc 2402 (sustituida por rfc 4302 y rfc 4305): authentication header* rfc 2403: the use of hmac-md5-96 within esp and ah* rfc 2404: the use of hmac-sha-1-96 within esp and ah* rfc 2405: the esp des-cbc cipher algorithm with explicit iv* rfc 2406 (sustituida por rfc 4303 y rfc 4305): encapsulating security payload* rfc 2407 (sustituida por rfc 4306): ipsec domain of interpretation for isakmp (ipsec doi)* rfc 2408 (sustituida por rfc 4306): internet security association and key management protocol (isakmp)* rfc 2409 (sustituida por rfc 4306): internet key exchange (ike)* rfc 2410: the null encryption algorithm and its use with ipsec* rfc 2411: ip security document roadmap* rfc 2412: (sustituye a rfc 1829) the oakley key determination protocol* rfc 2451: the esp cbc-mode cipher algorithms* rfc 2857: the use of hmac-ripemd-160-96 within esp and ah* rfc 3526: more modular exponential (modp) diffie-hellman groups for internet key exchange (ike)* rfc 3706: a traffic-based method of detecting dead internet key exchange (ike) peers* rfc 3715: ipsec-network address translation (nat) compatibility requirements* rfc 3947: negotiation of nat-traversal in the ike* rfc 3948: udp encapsulation of ipsec esp packets* rfc 4106: the use of galois/counter mode (gcm) in ipsec encapsulating security payload (esp)* rfc 4301 (sustituye a rfc 2401): security architecture for the internet protocol* rfc 4302 (sustituye a rfc 2402): ip authentication header* rfc 4303 (sustituye a rfc 2406): ip encapsulating security payload (esp)* rfc 4304: extended sequence number (esn) addendum to ipsec domain of interpretation (doi) for internet security association and key management protocol (isakmp)* rfc 4305 (sustituida por rfc 4835): cryptographic algorithm implementation requirements for encapsulating security payload (esp) and authentication header (ah)* rfc 4306 (sustituye a rfc 2407, rfc 2408, and rfc 2409): internet key exchange (ikev2) protocol* rfc 4307: cryptographic algorithms for use in the internet key exchange version 2 (ikev2)* rfc 4308: cryptographic suites for ipsec* rfc 4309: using advanced encryption standard (aes) ccm mode with ipsec encapsulating security payload (esp)* rfc 4478: repeated authentication in internet key exchange (ikev2) protocol* rfc 4543: the use of galois message authentication code (gmac) in ipsec esp and ah* rfc 4555: ikev2 mobility and multihoming protocol (mobike)* rfc 4621: design of the ikev2 mobility and multihoming (mobike) protocol* rfc 4718: ikev2 clarifications and implementation guidelines* rfc 4806: online certificate status protocol (ocsp) extensions to ikev2* rfc 4809: requirements for an ipsec certificate management profile* rfc 4835 (sustituye a rfc 4305): cryptographic algorithm implementation requirements for encapsulating security payload (esp) and authentication header (ah)* rfc 4945: the internet ip security pki profile of ikev1/isakmp, ikev2, and pkix== referencias ==
==ietf documentation=====standards track===* rfc 2403: the use of hmac-md5-96 within esp and ah* rfc 2404: the use of hmac-sha-1-96 within esp and ah* rfc 2405: the esp des-cbc cipher algorithm with explicit iv* rfc 2410: the null encryption algorithm and its use with ipsec* rfc 2451: the esp cbc-mode cipher algorithms* rfc 2857: the use of hmac-ripemd-160-96 within esp and ah* rfc 3526: more modular exponential (modp) diffie-hellman groups for internet key exchange (ike)* rfc 3602: the aes-cbc cipher algorithm and its use with ipsec* rfc 3686: using advanced encryption standard (aes) counter mode with ipsec encapsulating security payload (esp)* rfc 3947: negotiation of nat-traversal in the ike* rfc 3948: udp encapsulation of ipsec esp packets* rfc 4106: the use of galois/counter mode (gcm) in ipsec encapsulating security payload (esp)* rfc 4301: security architecture for the internet protocol* rfc 4302: ip authentication header* rfc 4303: ip encapsulating security payload* rfc 4304: extended sequence number (esn) addendum to ipsec domain of interpretation (doi) for internet security association and key management protocol (isakmp)* rfc 4307: cryptographic algorithms for use in the internet key exchange version 2 (ikev2)* rfc 4308: cryptographic suites for ipsec* rfc 4309: using advanced encryption standard (aes) ccm mode with ipsec encapsulating security payload (esp)* rfc 4543: the use of galois message authentication code (gmac) in ipsec esp and ah* rfc 4555: ikev2 mobility and multihoming protocol (mobike)* rfc 4806: online certificate status protocol (ocsp) extensions to ikev2* rfc 4835: cryptographic algorithm implementation requirements for encapsulating security payload (esp) and authentication header (ah)* rfc 4868: using hmac-sha-256, hmac-sha-384, and hmac-sha-512 with ipsec* rfc 4945: the internet ip security pki profile of ikev1/isakmp, ikev2, and pkix* rfc 5996: internet key exchange protocol version 2 (ikev2)===experimental rfcs===* rfc 4478: repeated authentication in internet key exchange (ikev2) protocol===informational rfcs===* rfc 2367: pf_key interface* rfc 2412: the oakley key determination protocol* rfc 3706: a traffic-based method of detecting dead internet key exchange (ike) peers* rfc 3715: ipsec-network address translation (nat) compatibility requirements* rfc 4621: design of the ikev2 mobility and multihoming (mobike) protocol* rfc 4809: requirements for an ipsec certificate management profile* rfc 6027: ipsec cluster problem statement* rfc 6071: ipsec and ike document roadmap===obsolete rfcs===* rfc 2401: security architecture for the internet protocol (ipsec overview) obsolete by rfc 4301* rfc 2409: the internet key exchange* rfc 4306: internet key exchange (ikev2) protocol (obsoleted by rfc 7296)* rfc 4718: ikev2 clarifications and implementation guidelines (obsoleted by rfc 7296)==see also==* ipsec passthrough* information security* opportunistic encryption* dynamic multipoint virtual private network* tcpcrypt==references====external links==* all ietf active security wgs** ietf ipsecme wg ("ip security maintenance and extensions" working group)** ietf btns wg ("better-than-nothing security" working group) (chartered to work on unauthenticated ipsec, ipsec apis, connection latching)]* securing data in transit with ipsec windowssecurity.com article by deb shinder* ipsec on microsoft technet** microsoft ipsec diagnostic tool on microsoft download center* an illustrated guide to ipsec by steve friedl* security architecture for ip (ipsec) data communication lectures by manfred lindner part ipsec* creating vpns with ipsec and ssl/tls linux journal article by rami rosen
Last Update: 2016-03-03
Usage Frequency: 1
Quality:
Warning: Contains invisible HTML formatting