Search results

Jump to navigation Jump to search

Page title matches

Page text matches

  • {{r|Access control list}}
    394 bytes (43 words) - 11:18, 6 May 2010
  • {{r|Access control list}}
    326 bytes (40 words) - 18:54, 2 November 2009
  • An '''access control list''' or '''ACL''', in the broadest sense used in computers and security, is a
    593 bytes (105 words) - 05:52, 4 March 2010
  • {{r|Access control list}}
    420 bytes (51 words) - 10:13, 12 June 2009
  • {{r|Access control list}}
    390 bytes (47 words) - 18:28, 22 February 2009
  • Auto-populated based on [[Special:WhatLinksHere/Access control list]]. Needs checking by a human.
    499 bytes (64 words) - 07:42, 8 January 2010
  • Unicast reverse path forwarding is a widely used technique, an evolution of [[access control list]]s that were harder to maintain and imposed much higher router overhead.<re
    2 KB (245 words) - 01:23, 6 May 2008
  • ...be done before forwarding (e.g., accounting or encryption), or applying an access control list that may cause the packet to be dropped.
    12 KB (1,829 words) - 23:07, 23 December 2010
  • ...t Practice) 34}}</ref> In early [[router]]s, this was done with explicit [[access control list]]s (ACL) on the interface, which was a benefit if the interface had some au
    5 KB (749 words) - 18:25, 22 February 2009