A list kept by the system to control access to or from the network server for a number of services (for example, to restrict packets with a certain IP address from leaving a particular interface on the network server).
a file that directs the SMTP server to selectively accept or reject mail from or to specific hosts, domains, networks, host addresses, or mail addresses
a list I use which details the exact usernames on the box
a list of AppleTalk network numbers kept by the Cisco router to control access to or from specific networks for a number of services
a list of AppleTalk network numbers or zones that is maintained by the Cisco IOS software and used to control access to or from specific zones or networks
a list of VINES network numbers that is maintained by the router
a sequence of statements, each of which either permits or denies certain conditions or addresses
a sequential collection of permit and deny conditions that apply to Internet addresses
a sequential list filters, each of which defines a matching criteria and an action
a sequential list of instructions to either permit or deny access through a router interface based on IP address or other criteria
a sequential series of filters
a table of the MAC addresses of NICs that are allowed to connect to the network
a table that the network administrator creates
a table the network administrator creates that lists which addresses have access to that network
A list consisting of one or more individual user IDs or user groups and the privilege set associated with each user ID or user group. You use access lists to control user access to objects in the Content Manager system. The objects that can be associated with access lists are the data objects stored by users, index classes and subsets, workbaskets, and workflows.
A listing of names used to designate those persons authorized to enter a controlled area or to have access to a particular classified document.
A list of users and UNIX groups who are permitted or denied access to a resource such as a queue or a host. Users and groups can belong to multiple access lists, and the same access lists can be used in various contexts.
List kept by routers to control access to or from the router for a number of services (for example, to prevent packets with a certain IP address from leaving a particular interface on the router).