blob: 1ad9acb8c8b5da9e3f65579bdc5b2916041bd872 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
|
<?xml version="1.0" encoding="utf-8"?>
<i18n:msgs xmlns:i18n="http://luci.freifunk-halle.net/2008/i18n#" xmlns="http://www.w3.org/1999/xhtml">
<i18n:msg xml:id="fw_portfw">Port forwarding</i18n:msg>
<i18n:msg xml:id="fw_forwarding">Zone-to-Zone forwarding</i18n:msg>
<i18n:msg xml:id="fw_fw">Firewall</i18n:msg>
<i18n:msg xml:id="fw_zone">Zone</i18n:msg>
<i18n:msg xml:id="fw_zones">Zones</i18n:msg>
<i18n:msg xml:id="fw_custfwd">Custom forwarding</i18n:msg>
<i18n:msg xml:id="fw_rules">Incoming traffic rules</i18n:msg>
<i18n:msg xml:id="fw_rules1">Here you can create custom firewall rules to control your network traffic.</i18n:msg>
<i18n:msg xml:id="fw_fw1">The firewall creates zones over your network interfaces to control network traffic flow.</i18n:msg>
<i18n:msg xml:id="firewall_rule_src">Input Zone</i18n:msg>
<i18n:msg xml:id="firewall_rule_dest">Output Zone</i18n:msg>
<i18n:msg xml:id="firewall_rule_srcip">Source address</i18n:msg>
<i18n:msg xml:id="firewall_rule_destip">Destination address</i18n:msg>
<i18n:msg xml:id="firewall_rule_srcmac">Source MAC-Address</i18n:msg>
<i18n:msg xml:id="firewall_rule_srcport">Source port</i18n:msg>
<i18n:msg xml:id="firewall_rule_destport">Destination port</i18n:msg>
<i18n:msg xml:id="firewall_rule_target">Action</i18n:msg>
<i18n:msg xml:id="fw_accept">accept</i18n:msg>
<i18n:msg xml:id="fw_reject">reject</i18n:msg>
<i18n:msg xml:id="fw_drop">drop</i18n:msg>
<i18n:msg xml:id="fw_portfw1">Port forwarding allows to provide network services in the internal network to an external network.</i18n:msg>
<i18n:msg xml:id="firewall_redirect_src_desc">External Zone</i18n:msg>
<i18n:msg xml:id="firewall_redirect_srcdport">External port</i18n:msg>
<i18n:msg xml:id="firewall_redirect_srcdport_desc">port or range as first-last</i18n:msg>
<i18n:msg xml:id="firewall_redirect_destip">Internal address</i18n:msg>
<i18n:msg xml:id="firewall_redirect_destip_desc">IP-Address</i18n:msg>
<i18n:msg xml:id="firewall_redirect_destport">Internal port (optional)</i18n:msg>
<i18n:msg xml:id="firewall_redirect_destport_desc">port or range as first-last</i18n:msg>
<i18n:msg xml:id="fw_forwarding1">Here you can specify which network traffic is allowed to flow between network zones. Only new connections will be matched. Packets belonging to already open connections are automatically allowed to pass the firewall.</i18n:msg>
<i18n:msg xml:id="firewall_forwarding_src">Input</i18n:msg>
<i18n:msg xml:id="firewall_forwarding_dest">Output</i18n:msg>
<i18n:msg xml:id="firewall_defaults">Defaults</i18n:msg>
<i18n:msg xml:id="firewall_defaults_desc">These are the default settings that are used if no other rules match.</i18n:msg>
<i18n:msg xml:id="firewall_defaults_synflood">SYN-flood protection</i18n:msg>
<i18n:msg xml:id="firewall_defaults_input">Incoming Traffic</i18n:msg>
<i18n:msg xml:id="firewall_defaults_output">Outgoing Traffic</i18n:msg>
<i18n:msg xml:id="firewall_defaults_forward">Forwarded Traffic</i18n:msg>
<i18n:msg xml:id="firewall_zone_desc">Zones part the network interfaces into certain isolated areas to separate network traffic. One or more networks can belong to a zone. The MASQ-flag enables NAT masquerading for all outgoing traffic on this zone.</i18n:msg>
<i18n:msg xml:id="firewall_zone_input">Incoming Traffic</i18n:msg>
<i18n:msg xml:id="firewall_zone_input_desc">Default Policy</i18n:msg>
<i18n:msg xml:id="firewall_zone_output">Outgoing Traffic</i18n:msg>
<i18n:msg xml:id="firewall_zone_output_desc">Default Policy</i18n:msg>
<i18n:msg xml:id="firewall_zone_forward">Forwarded Traffic</i18n:msg>
<i18n:msg xml:id="firewall_zone_forward_desc">Default Policy</i18n:msg>
<i18n:msg xml:id="firewall_zone_masq">MASQ</i18n:msg>
<i18n:msg xml:id="firewall_zone_network">Networks</i18n:msg>
<i18n:msg xml:id="firewall_zone_network_desc">contained networks</i18n:msg>
</i18n:msgs>
|