Spade

Mini Shell

Directory:~$ /proc/self/root/usr/share/locale/en_US/LC_MESSAGES/
Upload File

[Home] [System Details] [Kill Me]
Current File:~$ //proc/self/root/usr/share/locale/en_US/LC_MESSAGES/firewalld.mo

��Jl
����q�\"z����	���	��
�
)
2@I
U`
lzI�{��I��%� � �
!!#!)!0!F!N!f!|!�!�!4�!$�!'"$4"Y"_"f"m"�"2�"2�"##
$#2#:#"I#l#$�#�#$�#�#$$#$�5$�$�$]�$
\%j%{%n�%�%,&H&U&Z&f&s&�&�&�&
�&�&�&
�&�&'')'8'	I'S'	b'l'y'�'�'	�'�'�'�'�'�'k�'-I(w(:�(�(�(�(�(�()A$)f)r~)��)C�*2+8+	D+
N+uY+�+�+�+�+�+	�+��+m�,Q2-��-$.	+.
5.@.M.T.\.t.�.�.�.�.l�.	7/A/$F/�k/�/0�0�011'1C1#T1
x1�1
�1�1D�12	2D2)`2'�2$�2!�2�23:,3Bg3:�3�34484T4m4/�4%�45�4?5IT5�5�5�5�5�5�5�5	�5�5	66�6�6�67
7/7<7P7a7r7�7�7�7�7
�7�7�7�7�7	8
88#8+8@8`88�8�8�8q�889
K9V9g9n9u9}9A�9�9�9�9�9��9*�:��;�m<+3=_=�u=�>��?
,@7@W?@*�@�@�@�@�@	�@	A
AA&A/A7ACA&HA#oA+�A)�AM�A07B(hB^�BA�B;2CnCwC}C�C�C�C�C	�C�C�C�C�C�C�C�C�C	�C�C�C-�C%D2D
7D	BDLDQDZD
_DmDrDwD}D�D�D
�D�D�D�D�D�D�D�D�D�D�D�D�D
�D�D��D�Fq�F\KG"�G�H�H�H�H	�H�HI	II
+I
9IGIWI
`InIwI
�I�I
�I�II�I{�I�wJ�K%�KL&LFLKLQLWL^LtL|L�L�L�L�L4�L$M':M$bM�M�M�M�M�M2�M2N4NEN
RN`NhN"wN�N$�N�N$�N"O.O6O#?O�cOPP],P
�P�P�Pn�P+Q,IQvQ�Q�Q�Q�Q�Q�Q�Q
�Q�QR
RR6RHRWRfR	wR�R	�R�R�R�R�R	�R�R�R�R�RSkS-wS�S:�S�S�STTT5TART�Tr�T�UC�U23VfV	rV
|Vu�V�V	WWWW	W�)Wm�WQ`X��XRY	YY
cYnY{Y�Y�Y�Y�Y�Y�Y�Yl�Y	eZoZ$tZ��Z)[9[�F['\/\C\'I\q\#�\
�\�\
�\�\D�\3]	?]DI])�]'�]$�]!^'^@^:Z^B�^:�^_2_L_f_�_�_/�_%�_5`?B`I�`�`�`�`�`aaa	a'a	0a:a�Ka&b-b:bNb]bjb~b�b�b�b�b�b�b
�b�bcc%c	6c
@cKcQcYcnc�c�c�c�c�cq�cfd
yd�d�d�d�d�dA�d�d�d�de�e*�e��f��g+ah�h��h�Ei��j
ZkekWmk*�k�kll!l	)l	3l
=lHlTl]lelql&vl#�l+�l)�lMm0em(�m^�mAn;`n�n�n�n�n�n�n�n	�n�n�n�n�n�n�no
o	
ooo-%oSo`o
eo	pozoo�o
�o�o�o�o�o�o�o
�o�o�o�o�o�o�o�o�o�oppp
p'p�g\�49@�j�O��fcI&9���Y���@�m�nK���3,Ld��y�a�GV�56��F����{�D���GI��8�>+���i~��3���=&_�;
1��0�>*�o[AQ���5����^��%�$�7
M��E�20���C��$.2,��8-�P�*S�rNB��(��	z����C�H4:"<	e:7p?�x��X!�1��Z
-�#�E���Tv�����]�=<�;�b'U
("q)���h��W+RFD��Jlt}#�uk!�%���
/������6��|w��A�)�s`����?
.BHJ'//A firewalld icmptype provides the information for an
Internet Control Message Protocol (ICMP) type for firewalld.A firewalld
service is a combination of ports, protocols, modules and destination
addresses.A firewalld zone defines the level of trust for network
connections, interfaces and source addresses bound to the zone. The zone
combines services, ports, protocols, masquerading, port/packet forwarding,
icmp filters and rich rules. The zone can be bound to interfaces and source
addresses.AboutAbout %sActionAction:Add ChainAdd Command LineAdd ContextAdd
EntryAdd Forward PortAdd ICMP TypeAdd InterfaceAdd PassthroughAdd PortAdd
Rich RuleAdd RuleAdd ServiceAdd SourceAdd User IdAdd User NameAdd ZoneAdd a
rule with the arguments args to a chain in a table with a priority.Add
additional ports or port ranges, which need to be accessible for all hosts
or networks that can connect to the machine.Add entries to bind interfaces
to the zone. If the interface will be used by a connection, the zone will
be set to the zone specified in the connection.Add entries to forward ports
either from one port to another on the local system or from the local
system to another system. Forwarding to another system is only useful if
the interface is masqueraded. Port forwarding is IPv4 only.Additional
chains for use with rules.AddressAll network traffic is
blocked.ArgsArgs:AuditAudit:Authorization failed.AuthorsBase ICMP Type
SettingsBase Service SettingsBase Zone SettingsBindingsBlock all network
trafficBold entries are mandatory, all others are optional.Built-in icmp,
rename not supported.Built-in service, rename not supported.Built-in zone,
rename not supported.ChainChain:ChainsChange Default ZoneChange Zones of
Connections...Change default zone for connections or interfaces.Change
which zone a network connection belongs to.Changes applied.Command
lineCommand linesCommentConfiguration:Configure Shields UP/Down
Zones...Configure Shields Up/Down ZonesConnection to FirewallD
established.Connection to FirewallD lost.Connection to firewalld
established.ConnectionsContextContextsCurrent default zone of the
system.Currently visible configuration. Runtime configuration is the actual
active configuration. Permanent configuration will be active after service
or system reload or restart.Default TargetDefault ZoneDefault Zone
'{default_zone}' active for connection '{connection}'
on interface '{interface}'Default Zone:Default Zone: %sDefault
Zone: '%s'Default zone '{default_zone}'
{activated_deactivated} for connection '{connection}' on
interface '{interface}'Default zone changed to
'%s'.Default zone used by network connection
'%s'Description:DestDestinationDestination:Direct ChainDirect
ConfigurationDirect Passthrough RuleDirect RuleEdit ChainEdit Command
LineEdit ContextEdit EntryEdit Firewall Settings...Edit Forward PortEdit
ICMP TypeEdit InterfaceEdit PassthroughEdit PortEdit Rich RuleEdit RuleEdit
ServiceEdit SourceEdit User IdEdit User NameEdit ZoneElementElement:Enable
NotificationsEntryErrorFailed to connect to firewalld. Please make sure
that the service has been started correctly and try again.Failed to get
connections from NetworkManagerFailed to load icons.Failed to set zone
{zone} for connection {connection_name}FamilyFamily:FirewallFirewall
AppletFirewall ConfigurationFirewallD has been reloaded.For host or network
white or blacklisting deactivate the element.Forward to another
portForwarding to another system is only useful if the interface is
masqueraded.
Do you want to masquerade this zone ?Here you can define which services are
trusted in the zone. Trusted services are accessible from all hosts and
networks that can reach the machine from connections, interfaces and
sources bound to this zone.Here you can select the zones used for Shields
Up and Shields Down.Here you can set rich language rules for the zone.ICMP
FilterICMP TypeICMP TypesICMP Types can only be changed in the permanent
configuration view. The runtime configuration of ICMP Types is fixed.IP
address:IPv4IPv4:IPv6IPv6:Icmp TypeIf a command entry on the whitelist ends
with an asterisk '*', then all command lines starting with the
command will match. If the '*' is not there the absolute command
inclusive arguments must match.If you enable local forwarding, you have to
specify a port. This port has to be different to the source port.If you
enable masquerading, IP forwarding will be enabled for your IPv4
networks.If you specify destination addresses, the service entry will be
limited to the destination address and type. If both entries are empty,
there is no limitation.IgnoreInterfaceInterfacesInvalid
nameLevel:LicenseLoad ICMP Type DefaultsLoad Service DefaultsLoad Zone
DefaultsLocal forwardingLockdownLockdown WhitelistLockdown locks firewall
configuration so that only applications on lockdown whitelist are able to
change it.Lockdown:Log:Make runtime configuration permanentMark the ICMP
types in the list, which should be rejected. All other ICMP types are
allowed to pass the firewall. The default is no limitation.Masquerade
zoneMasqueradingMasquerading allows you to set up a host or router that
connects your local network to the internet. Your local network will not be
visible and the hosts appear as a single address on the internet.
Masquerading is IPv4 only.ModulesName already existsName:Network traffic is
not blocked anymore.No Active Zones.No NetworkManager imports availableNo
connection to firewall daemonOther Protocol:Panic ModePanic Mode:Panic mode
means that all incoming and outgoing packets are
dropped.PassthroughPermanentPlease be careful with passthrough rules to not
damage the firewall.Please configure base ICMP type settings:Please
configure base service settings:Please configure base zone settings:Please
enter a port and protocol.Please enter a protocol.Please enter a rich
rule.Please enter an ipv4 address with the form address[/mask].Please enter
an ipv4 or ipv6 address with the form address[/mask].Please enter an ipv6
address with the form address[/mask].Please enter the command line.Please
enter the context.Please enter the user id.Please enter the user
name.Please select a service.Please select an ICMP typePlease select
default zone from the list below.Please select ipv and enter the
args.Please select ipv and table and enter the chain name.Please select ipv
and table, chain priority and enter the args.Please select the source and
destination options according to your needs.PortPort / Port Range:Port
ForwardingPort and
ProtocolPortsPrefix:PriorityPriority:ProtocolProtocol:Reload
FirewalldReloads firewall rules. Current permanent configuration will
become new runtime configuration. i.e. all runtime only changes done until
reload are lost with reload if they have not been also in permanent
configuration.RemoveRemove ChainRemove Command LineRemove ContextRemove
EntryRemove Forward PortRemove ICMP TypeRemove InterfaceRemove
PassthroughRemove PortRemove Rich RuleRemove RuleRemove ServiceRemove
SourceRemove User IdRemove User NameRemove ZoneReset To DefaultRich
RuleRich RulesRulesRuntimeRuntime To PermanentSelect zone for connection
'%s'Select zone for interface '%s'Select zone for
source %sSelect zone for source '%s'ServiceServicesServices can
only be changed in the permanent configuration view. The runtime
configuration of services is fixed.Shields Down Zone:Shields UpShields Up
Zone:Short:SourceSource:SourcesSpecify whether this ICMP Type is available
for IPv4 and/or IPv6.SrcTableTable:Target:The Internet Control Message
Protocol (ICMP) is mainly used to send error messages between networked
computers, but additionally for informational messages like ping requests
and replies.The direct configuration gives a more direct access to the
firewall. These options require user to know basic iptables concepts, i.e.
tables, chains, commands, parameters and targets. Direct configuration
should be used only as a last resort when it is not possible to use other
firewalld features.The ipv argument of each option has to be ipv4 or ipv6
or eb. With ipv4 it will be for iptables, with ipv6 for ip6tables and with
eb for ethernet bridges (ebtables).The lockdown feature is a light version
of user and application policies for firewalld. It limits changes to the
firewall. The lockdown whitelist can contain commands, contexts, users and
user ids.The mask can be a network mask or a number.The mask is a
number.The passthrough rules are directly passed through to the firewall
and are not placed in special chains. All iptables, ip6tables and ebtables
options can be used.The priority is used to order rules. Priority 0 means
add rule on top of the chain, with a higher priority the rule will be added
further down. Rules with the same priority are on the same level and the
order of these rules is not fixed and may change. If you want to make sure
that a rule will be added after another one, use a low priority for the
first and a higher for the following.This feature is useful for people
using the default zones mostly. For users, that are changing zones of
connections, it might be of limited use.To AddressTo PortTo enable this
Action has to be 'reject' and Family either 'ipv4' or
'ipv6' (not both).Trying to connect to firewalld, waiting...Used
by network connection '%s'User IDUser IdsUser idUser ids.User
nameUser namesUser names.Version:WarningWith limit:ZoneZone '%s'
activated for interface '%s'Zone '%s' activated for
source '%s'Zone '%s': ICMP type '%s' is not
available.Zone '%s': Service '%s' is not available.Zone
'{zone}' active for connection '{connection}' on
interface '{interface}'Zone '{zone}' active for
interface '{interface}'Zone '{zone}' active for source
{source}Zone '{zone}' {activated_deactivated} for connection
'{connection}' on interface '{interface}'Zone
'{zone}' {activated_deactivated} for interface
'{interface}'Zone '{zone}' {activated_deactivated} for
source '{source}'Zone:
%sZones_File_Help_Options_Viewacceptactivatedalertcriticaldaydeactivateddebugdisableddropebemergencyenablederrorfirewall;network;security;iptables;netfilter;forward-porthouricmp-blockicmp-typeinfoinvertedipv4ipv4
and
ipv6ipv6ipv:levellimitlogmarkmasquerademinutenatnoticeportprotocolrawrejectsecondsecurityservicesource-portwarningwith
Type:yesProject-Id-Version: firewalld
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2020-01-13 14:38-0500
PO-Revision-Date: 2020-01-14 14:02+0000
Last-Translator: Eric Garver <egarver@redhat.com>
Language-Team: English (United States)
<https://translate.stg.fedoraproject.org/projects/firewalld/master/en_US/>
Language: en_US
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Plural-Forms: nplurals=2; plural=n != 1;
X-Generator: Weblate 3.10.1
/A firewalld icmptype provides the information for an Internet Control
Message Protocol (ICMP) type for firewalld.A firewalld service is a
combination of ports, protocols, modules and destination addresses.A
firewalld zone defines the level of trust for network connections,
interfaces and source addresses bound to the zone. The zone combines
services, ports, protocols, masquerading, port/packet forwarding, icmp
filters and rich rules. The zone can be bound to interfaces and source
addresses.AboutAbout %sActionAction:Add ChainAdd Command LineAdd ContextAdd
EntryAdd Forward PortAdd ICMP TypeAdd InterfaceAdd PassthroughAdd PortAdd
Rich RuleAdd RuleAdd ServiceAdd SourceAdd User IdAdd User NameAdd ZoneAdd a
rule with the arguments args to a chain in a table with a priority.Add
additional ports or port ranges, which need to be accessible for all hosts
or networks that can connect to the machine.Add entries to bind interfaces
to the zone. If the interface will be used by a connection, the zone will
be set to the zone specified in the connection.Add entries to forward ports
either from one port to another on the local system or from the local
system to another system. Forwarding to another system is only useful if
the interface is masqueraded. Port forwarding is IPv4 only.Additional
chains for use with rules.AddressAll network traffic is
blocked.ArgsArgs:AuditAudit:Authorization failed.AuthorsBase ICMP Type
SettingsBase Service SettingsBase Zone SettingsBindingsBlock all network
trafficBold entries are mandatory, all others are optional.Built-in icmp,
rename not supported.Built-in service, rename not supported.Built-in zone,
rename not supported.ChainChain:ChainsChange Default ZoneChange Zones of
Connections...Change default zone for connections or interfaces.Change
which zone a network connection belongs to.Changes applied.Command
lineCommand linesCommentConfiguration:Configure Shields UP/Down
Zones...Configure Shields Up/Down ZonesConnection to FirewallD
established.Connection to FirewallD lost.Connection to firewalld
established.ConnectionsContextContextsCurrent default zone of the
system.Currently visible configuration. Runtime configuration is the actual
active configuration. Permanent configuration will be active after service
or system reload or restart.Default TargetDefault ZoneDefault Zone
'{default_zone}' active for connection '{connection}'
on interface '{interface}'Default Zone:Default Zone: %sDefault
Zone: '%s'Default zone '{default_zone}'
{activated_deactivated} for connection '{connection}' on
interface '{interface}'Default zone changed to
'%s'.Default zone used by network connection
'%s'Description:DestDestinationDestination:Direct ChainDirect
ConfigurationDirect Passthrough RuleDirect RuleEdit ChainEdit Command
LineEdit ContextEdit EntryEdit Firewall Settings...Edit Forward PortEdit
ICMP TypeEdit InterfaceEdit PassthroughEdit PortEdit Rich RuleEdit RuleEdit
ServiceEdit SourceEdit User IdEdit User NameEdit ZoneElementElement:Enable
NotificationsEntryErrorFailed to connect to firewalld. Please make sure
that the service has been started correctly and try again.Failed to get
connections from NetworkManagerFailed to load icons.Failed to set zone
{zone} for connection {connection_name}FamilyFamily:FirewallFirewall
AppletFirewall ConfigurationFirewallD has been reloaded.For host or network
white or blacklisting deactivate the element.Forward to another
portForwarding to another system is only useful if the interface is
masqueraded.
Do you want to masquerade this zone ?Here you can define which services are
trusted in the zone. Trusted services are accessible from all hosts and
networks that can reach the machine from connections, interfaces and
sources bound to this zone.Here you can select the zones used for Shields
Up and Shields Down.Here you can set rich language rules for the zone.ICMP
FilterICMP TypeICMP TypesICMP Types can only be changed in the permanent
configuration view. The runtime configuration of ICMP Types is fixed.IP
address:IPv4IPv4:IPv6IPv6:Icmp TypeIf a command entry on the whitelist ends
with an asterisk '*', then all command lines starting with the
command will match. If the '*' is not there the absolute command
inclusive arguments must match.If you enable local forwarding, you have to
specify a port. This port has to be different to the source port.If you
enable masquerading, IP forwarding will be enabled for your IPv4
networks.If you specify destination addresses, the service entry will be
limited to the destination address and type. If both entries are empty,
there is no limitation.IgnoreInterfaceInterfacesInvalid
nameLevel:LicenseLoad ICMP Type DefaultsLoad Service DefaultsLoad Zone
DefaultsLocal forwardingLockdownLockdown WhitelistLockdown locks firewall
configuration so that only applications on lockdown whitelist are able to
change it.Lockdown:Log:Make runtime configuration permanentMark the ICMP
types in the list, which should be rejected. All other ICMP types are
allowed to pass the firewall. The default is no limitation.Masquerade
zoneMasqueradingMasquerading allows you to set up a host or router that
connects your local network to the internet. Your local network will not be
visible and the hosts appear as a single address on the internet.
Masquerading is IPv4 only.ModulesName already existsName:Network traffic is
not blocked anymore.No Active Zones.No NetworkManager imports availableNo
connection to firewall daemonOther Protocol:Panic ModePanic Mode:Panic mode
means that all incoming and outgoing packets are
dropped.PassthroughPermanentPlease be careful with passthrough rules to not
damage the firewall.Please configure base ICMP type settings:Please
configure base service settings:Please configure base zone settings:Please
enter a port and protocol.Please enter a protocol.Please enter a rich
rule.Please enter an ipv4 address with the form address[/mask].Please enter
an ipv4 or ipv6 address with the form address[/mask].Please enter an ipv6
address with the form address[/mask].Please enter the command line.Please
enter the context.Please enter the user id.Please enter the user
name.Please select a service.Please select an ICMP typePlease select
default zone from the list below.Please select ipv and enter the
args.Please select ipv and table and enter the chain name.Please select ipv
and table, chain priority and enter the args.Please select the source and
destination options according to your needs.PortPort / Port Range:Port
ForwardingPort and
ProtocolPortsPrefix:PriorityPriority:ProtocolProtocol:Reload
FirewalldReloads firewall rules. Current permanent configuration will
become new runtime configuration. i.e. all runtime only changes done until
reload are lost with reload if they have not been also in permanent
configuration.RemoveRemove ChainRemove Command LineRemove ContextRemove
EntryRemove Forward PortRemove ICMP TypeRemove InterfaceRemove
PassthroughRemove PortRemove Rich RuleRemove RuleRemove ServiceRemove
SourceRemove User IdRemove User NameRemove ZoneReset To DefaultRich
RuleRich RulesRulesRuntimeRuntime To PermanentSelect zone for connection
'%s'Select zone for interface '%s'Select zone for
source %sSelect zone for source '%s'ServiceServicesServices can
only be changed in the permanent configuration view. The runtime
configuration of services is fixed.Shields Down Zone:Shields UpShields Up
Zone:Short:SourceSource:SourcesSpecify whether this ICMP Type is available
for IPv4 and/or IPv6.SrcTableTable:Target:The Internet Control Message
Protocol (ICMP) is mainly used to send error messages between networked
computers, but additionally for informational messages like ping requests
and replies.The direct configuration gives a more direct access to the
firewall. These options require user to know basic iptables concepts, i.e.
tables, chains, commands, parameters and targets. Direct configuration
should be used only as a last resort when it is not possible to use other
firewalld features.The ipv argument of each option has to be ipv4 or ipv6
or eb. With ipv4 it will be for iptables, with ipv6 for ip6tables and with
eb for ethernet bridges (ebtables).The lockdown feature is a light version
of user and application policies for firewalld. It limits changes to the
firewall. The lockdown whitelist can contain commands, contexts, users and
user ids.The mask can be a network mask or a number.The mask is a
number.The passthrough rules are directly passed through to the firewall
and are not placed in special chains. All iptables, ip6tables and ebtables
options can be used.The priority is used to order rules. Priority 0 means
add rule on top of the chain, with a higher priority the rule will be added
further down. Rules with the same priority are on the same level and the
order of these rules is not fixed and may change. If you want to make sure
that a rule will be added after another one, use a low priority for the
first and a higher for the following.This feature is useful for people
using the default zones mostly. For users, that are changing zones of
connections, it might be of limited use.To AddressTo PortTo enable this
Action has to be 'reject' and Family either 'ipv4' or
'ipv6' (not both).Trying to connect to firewalld, waiting...Used
by network connection '%s'User IDUser IdsUser idUser ids.User
nameUser namesUser names.Version:WarningWith limit:ZoneZone '%s'
activated for interface '%s'Zone '%s' activated for
source '%s'Zone '%s': ICMP type '%s' is not
available.Zone '%s': Service '%s' is not available.Zone
'{zone}' active for connection '{connection}' on
interface '{interface}'Zone '{zone}' active for
interface '{interface}'Zone '{zone}' active for source
{source}Zone '{zone}' {activated_deactivated} for connection
'{connection}' on interface '{interface}'Zone
'{zone}' {activated_deactivated} for interface
'{interface}'Zone '{zone}' {activated_deactivated} for
source '{source}'Zone:
%sZones_File_Help_Options_Viewacceptactivatedalertcriticaldaydeactivateddebugdisableddropebemergencyenablederrorfirewall;network;security;iptables;netfilter;forward-porthouricmp-blockicmp-typeinfoinvertedipv4ipv4
and
ipv6ipv6ipv:levellimitlogmarkmasquerademinutenatnoticeportprotocolrawrejectsecondsecurityservicesource-portwarningwith
Type:yes