blob: f9e0634b8b9077d8c5cba6666a3d7f400f7ab78b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
|
msgid ""
msgstr "Content-Type: text/plain; charset=UTF-8\n"
msgid "Allowed IP ranges"
msgstr "允许的 IP 范围"
msgid ""
"Attempt to automatically detect if the upstream IP will be blocked by the "
"configuration, and add an exception if it will. If this does not work "
"correctly, you can add exceptions manually below."
msgstr ""
"自动检测上游 IP 是否会被当前配置所阻止,当检测到会被阻止时将会添加例外。如果"
"自动检测无法正常工作,你可以在下面手动添加例外。"
msgid "Auto-detect upstream IP"
msgstr "自动检测上游 IP"
msgid "BCP38"
msgstr "BCP38"
msgid "BCP38 config"
msgstr "BCP38 配置"
msgid "Blocked IP ranges"
msgstr "阻止的 IP 范围"
msgid "Enable"
msgstr "启用"
msgid "Interface name"
msgstr "接口名称"
msgid ""
"Interface to apply the blocking to (should be the upstream WAN interface)."
msgstr "应用“阻止规则”的接口(应当为上游 WAN 接口)。"
msgid ""
"Takes precedence over blocked ranges. Use to whitelist your upstream network "
"if you're behind a double NAT and the auto-detection doesn't work."
msgstr ""
"这里的规则优先于阻止规则被使用。如果你在双重 NAT 之后并且自动检测功能不起作"
"用,请在这里添加你上游网络的白名单。"
msgid ""
"This function blocks packets with private address destinations from going "
"out onto the internet as per <a href=\"http://tools.ietf.org/html/"
"bcp38\">BCP 38</a>. For IPv6, only source specific default routes are "
"installed, so no BCP38 firewall routes are needed."
msgstr ""
"此功能可以阻止具有私有目标地址的数据包通过 <a href=\"http://tools.ietf.org/"
"html/bcp38\">BCP 38</a> 发送到互联网上。对于 IPv6,仅安装源特定的默认路由,因"
"此不需要 BCP38 防火墙路由。"
|