this document or the extent to which any license under such rights
might or might not be available; n... e model
protects against the threats described under "Security Requirements
of this Architecture", ... e, a Report PDU
MUST be returned to the sender under those conditions which can cause
the generatio... this document or the extent to which any license under such rights
might or might not be available; n
trols two
distinct origins, the two namespaces under those origins are distinct
unless explicitly a... bine multiple list members unless they are all
under the same organizational control and the hosts hav... eeds
to explicitly allow caching and to detail under what conditions a
response can be used to sati... hat protocol extensions can modify the conditions under which
preconditions are evaluated or the conse
existing practice in the use of payload formats under this profile
and include new payload formats d... ons are
defined, but applications operating under this profile MAY use
such extensions. Thus... report interval calculation. Sessions operating under
this profile MAY specify a separate paramet... ault security services are also the default
under this profile.
String-to-key mapping: No mappi
ions.
Typically an application will operate under only one profile. A
profile for audio and ... nality independent of payload format, the profile under
which those applications operate SHOULD def... its is to be defined by the profile specification under
which the implementations are operating. This... r and faster parsing because applications running under that
profile would be programmed to always
on is done in addition to the normal registration under the
SNMP engine's snmpEngineID. This is consi... this document or the extent to which any license under such rights
might or might not be available; n... h transport domain MUST
have an OID assignment under snmpDomains [RFC2578]. Values are to be
assig... ired
Each domain is assigned a MIB-defined OID under snmpDomains
Prefix snmpDomains
irements of the
section.
Under many of the individual topics in this document, t... this problem, a new
ICMP message under development will ask "are you a
... for default gateway discovery
is under development.
3.3.2 Reassembly
T... destination address.
Under the Strong ES model, the route computation
nternet standards
track, the objects are moved under the mgmt(2) subtree.
The private(4) subtree i... ains a textual
description of the organization under whose auspices this information
module was dev... lue of the MODULE-
IDENTITY macro as a subtree under which other OBJECT IDENTIFIER
values assigned ... SCRIPTION clause of the status column to indicate under
what circumstances the status column
The server
MUST close the data connection under the following conditions:
1. The server... ile transfer in
progress is completed under the old access control
parameters.
... h
the user and server data ports, and under normal
circumstances this command and... file is to be created in the current directory under a name
unique to that directory. The
eled, but has at least three children
directly under it: one node is administered by the Internationa... by the ISO and the CCITT, joint-iso-ccitt(2).
Under the iso(1) node, the ISO has designated one subtr... approved by the IAB, now specifies the
policy under which this subtree of OBJECT IDENTIFIERs is
ad... e will also register its networking subsystems
under this subtree, in order to provide an unambiguous
ACKNOWLEDGEMENTS
This RFC has been developed under the auspices of the Internet
Activities Board,... eless, it is expected that on computers operating under
the PC-DOS and MS-DOS operating systems that t... itiate a session with a process that is listening under
the specified name. The calling entit... about all of the requestor's sessions,
under the specified name. No network activity is invol
l messages that pertain to an IKE SA MUST be sent under that
IKE SA. Control messages that pertain to Child SAs MUST be sent
under the protection of the IKE SA that generated them ... itly closes any
remaining Child SAs negotiated under it. The response to a request
that deletes th... then rebuild the SAs it needs on
a clean base under a new IKE SA.
1.5. Informational Messages outsi
lete semantics).
See the last paragraph under "job-k-octets".
"job-media-sheets" (intege... semantics).
See the last paragraph under "job-k-octets".
Group 2: Job Template Attribu... o secure channel protocol configured to
run under HTTP. The value of 'none' in
"uri-authenti... o secure channel
protocol configured to run under HTTP. The value of 'digest' in
"uri-authen
has been used historically to refer to both URIs under the
"urn" scheme [RFC2141], which are required... normalizers.
2.4. When to Encode or Decode
Under normal circumstances, the only time when octets w... For example, the text
Yes, Jim, I found it under "http://www.w3.org/Addressing/",
but you ca... references being considered "same-document"
under this specification than there would be under the
, delete existing nodes, or delegate new subzones
under its zone.
If the organization has substructure, ... ler wants
one or more 32 bit IP addresses. Under the DNS, it
translates into a request for t... hus while data for x.y
and X.Y may both be stored under a single location x.y or X.Y, data for
a.x and B.X would never be stored under A.x, A.X, b.x, or b.X. In
general, this preserve
) to another string of octets (the
ciphertext) under control of a content-encryption key. The encrypt... t algorithm, and any
associated parameters, under which the content is digested. The
message... y) to another octet string (the
encrypted key) under control of a key-encryption key. The decryption
... aintext) to another octet string (the ciphertext) under control of
a content-encryption key. The decr