Search results
Jump to navigation
Jump to search
Page title matches
- An '''access control list''' or '''ACL''', in the broadest sense used in computers and security, is a593 bytes (105 words) - 05:52, 4 March 2010
- 140 bytes (21 words) - 21:21, 23 March 2009
- Auto-populated based on [[Special:WhatLinksHere/Access control list]]. Needs checking by a human.499 bytes (64 words) - 07:42, 8 January 2010
Page text matches
- {{r|Access control list}}394 bytes (43 words) - 11:18, 6 May 2010
- {{r|Access control list}}326 bytes (40 words) - 18:54, 2 November 2009
- An '''access control list''' or '''ACL''', in the broadest sense used in computers and security, is a593 bytes (105 words) - 05:52, 4 March 2010
- {{r|Access control list}}420 bytes (51 words) - 10:13, 12 June 2009
- {{r|Access control list}}390 bytes (47 words) - 18:28, 22 February 2009
- Auto-populated based on [[Special:WhatLinksHere/Access control list]]. Needs checking by a human.499 bytes (64 words) - 07:42, 8 January 2010
- Unicast reverse path forwarding is a widely used technique, an evolution of [[access control list]]s that were harder to maintain and imposed much higher router overhead.<re2 KB (245 words) - 01:23, 6 May 2008
- ...be done before forwarding (e.g., accounting or encryption), or applying an access control list that may cause the packet to be dropped.12 KB (1,829 words) - 23:07, 23 December 2010
- ...t Practice) 34}}</ref> In early [[router]]s, this was done with explicit [[access control list]]s (ACL) on the interface, which was a benefit if the interface had some au5 KB (749 words) - 18:25, 22 February 2009