摘要:
Enforcing a policy is described. A mapping between an IP address of a device and a user identity is identified, at least in part by correlating event information. A policy is applied to the device based at least in part on the user identity. One example of an event is an access to a mail server, such as an access to a Microsoft Exchange server.
摘要:
Enforcing a policy is described. A mapping between an IP address of a device and a user identity is identified at a first appliance, at least in part by correlating event information. The mapping is transmitted to a second appliance. A policy is applied by the second appliance to the device based at least in part on the user identity.
摘要:
Techniques for detecting encrypted tunneling traffic are disclosed. In some embodiments, detecting encrypted tunneling traffic includes monitoring encrypted network communications between a client and a remote server, in which the encrypted network communications are encrypted using a first protocol (e.g., Secure Shell (SSH) protocol or another protocol for encrypted network communications); and determining if the client sends a request to create a tunnel using the first protocol with the remote server. In some embodiments, detecting encrypted tunneling traffic further includes performing an action in response to determining that the client sent a request to create a tunnel using the first protocol with the remote server.
摘要:
A network management system is described for assuring that a network device complies with a device-specific configuration policy. One example of the network management system contains one or more business rules that describe a business policy regarding a computer network in a network-independent form. In general, the business rules refer to high-level business requirements and not to device-specific configuration information. The network management system uses the business rule to determine which business policies are currently in force. In addition, the network management system contains one or more network design rules that describe relationship between the business policy and one or more device-specific configuration policies. The network management server uses the network design rules to determine whether to deploy a device-specific configuration policies. In this manner, an administrator or other user may create high-level business rules without regard to particular network devices or topologies, yet device-specific configuration polices are deployed to the network devices to assure compliance even if the network management system is bypassed.
摘要:
Enforcing a policy is described. A mapping between an IP address of a device and a user identity is identified, at least in part by correlating event information. A policy is applied to the device based at least in part on the user identity. One example of an event is an access to a mail server, such as an access to a Microsoft Exchange server.
摘要:
In the field of non-intrusive velocity measurement, a device and a method for measuring the velocity of objects, particles or fluid flow is provided. The device comprises transmitter means (1) comprising at least one linear array (101) of surface emitting light sources (102x), said light sources (102) being arranged in a linear configuration spaced apart by a predetermined separation distance (d) an optical system (103-105) including at least one imaging lens directing the substantially coherent electromagnetic radiation (10) emitted from the light sources (102) into a measurement region in a predetermined manner producing an array of fringes or spots (4) spaced apart with a predetermined fringe distance (Λ?) corresponding to the separation distance (d) between the light sources (102), receiver means (2) comprising light manipulating means (202, 203) directing the electromagnetic radiation (20) scattered from the measurement region to detection means including at least one detector (201, 204, 205) detecting the scattered electromagnetic radiation (20) from the measurement region as an object (3) passes through the measurement region, detector processing means processing the detected signals from the detector means corresponding to the particle(s) and surface (3) passing the fringes (4) in the measurement region. According to the invention, the surface emitting light sources are Yertical Cavity Surface Emitting Laserdiodes (VCSEL). Hereby, a low power consumption is achieved just as a reliable and simple light source is provided resulting in a robust non-intrusive velocity measurement system.
摘要:
For an arrangement for reproducing decompressed video and/or audio data at a video and an audio reproduction clock frequency, the arrangement comprises a circuit for generating the video and/or audio reproduction clock, which the circuit derives the reproduction clocks from the externally supplied digital video signal, for the purpose of synchronizing these data and for a possibly joint representation by an external video signal.