diff --git a/doc/ChangeLog b/doc/ChangeLog index d58e93989..b8fe68351 100644 --- a/doc/ChangeLog +++ b/doc/ChangeLog @@ -1,3 +1,9 @@ +2011-06-20 Vadim Kurland + + * gui.pro: see #2506 Removed obsolete localization files (Russian + and Japanese). These were incomplete and have never been updated for + v4. + 2011-06-10 Theron Tock * implementation of keywords associated with objects in the GUI; diff --git a/src/gui/fwbuilder_en.ts b/src/gui/fwbuilder_en.ts deleted file mode 100644 index 29d5b1f3b..000000000 --- a/src/gui/fwbuilder_en.ts +++ /dev/null @@ -1,15675 +0,0 @@ - - - - - AboutDialog_q - - - - Firewall Builder - - - - - &OK - - - - - Revision: - - - - - Using libfwbuilder API v - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:13pt; font-weight:400; font-style:normal;"> -<p align="center" style=" margin-top:12px; margin-bottom:12px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><a href="http://www.fwbuilder.org"><span style=" text-decoration: underline; color:#0000ff;">http://www.fwbuilder.org</span></a></p></body></html> - - - - - Copyright 2002-2010 NetCitadel, LLC - - - - - ActionsDialog - - - 'Change inbound interface', 'Continue packet inspection' and 'Make a copy' options are mutually exclusive - - - - - - &Continue - - - - - Rule name for accounting is converted to the iptables -chain name and therefore may not contain white space -and special characters. - - - - - Emulation of terminating behavior for MARK and CLASSIFY targets is currently ON, rule will be terminating - - - - - Emulation of terminating behavior for MARK and CLASSIFY targets is currently OFF, rule will not be terminating - - - - - ActionsDialog_q - - - Actions Dialog - - - - - - Tag service object: - - - - - If rule action is 'Reject', this option defines firewall's reaction to the packet matching the rule - - - - - This action has no parameters. - - - - - Requires CONNMARK target - - - - - Tag connections created by packets that match this rule - - - - - Note: this action translates into MARK target for iptables. -Normally this target is non-terminating, that is, other rules -with Classify or Tag actions below this one will process -the same packet. However, Firewall Builder can emulate -terminating behavior for this action. Option in the "compiler" -tab of the firewall object properties dialog activates emulation. - - - - - Emulation of terminating behavior for MARK target is currently ON, the rule will be terminating - - - - - Rule name for accounting. (white spaces and special characters are not allowed) - - - - - Packet classification can be implemented in different ways: - - - - - use dummynet(4) 'pipe' - - - - - use dummynet(4) 'queue' - - - - - Pipe or queue number: - - - - - Custom string: - - - - - Classify string: - - - - - Note: CLASSIFY target in iptables is non-terminating, -this means other rules with Classify or Branch -target below this one will process the same packet. -However, Firewall Builder can emulate terminating -behavior for this action. Emulation is activated -by an option in the "compiler" tab of the firewall -object properties dialog. - - - - - Emulation is currently ON, rule will be terminating - - - - - Divert socket port number: - - - - - Policy ruleset object: - - - - - In addition to 'filter', create branching rule in 'mangle' table as well - - - - - Policy rule set object: - - - - - - Route through - - - - - - Route reply through - - - - - - Route a copy through - - - - - - interface - - - - - - next hop - - - - - - None - - - - - Fastroute - - - - - Load Balancing: - - - - - Bitmask - - - - - Random - - - - - Source Hash - - - - - Round Robin - - - - - Change inbound interface to - - - - - Route through gateway - - - - - Change outbound interface to - - - - - Continue packet inspection - - - - - Make a copy - - - - - NAT Rule set object: - - - - - AddressRangeDialog - - - - Illegal IP address '%1' - - - - - - &Continue - - - - - AddressRangeDialog_q - - - Address Range - - - - - Name: - - - - - Range Start: - - - - - Range End: - - - - - Comment: - - - - - AddressTableDialog_q - - - Address Table - - - - - Name: - - - - - Compile Time - - - - - Run Time - - - - - File name: - - - - - - Browse - - - - - Preview - - - - - Comment: - - - - - ClusterDialog - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - - - - - &No - - - - - ClusterDialog_q - - - Cluster - - - - - Name: - - - - - Platform: - - - - - Host OS: - - - - - Modified: - - - - - - - TextLabel - - - - - Compiled: - - - - - Installed: - - - - - Comment: - - - - - Skip this firewall for batch compile and install operations - - - - - Inactive cluster - - - - - ClusterGroupDialog - - - Master - - - - - Firewall %1 can be used as a member of this cluster - - - - - Invalid - - - - - Firewall %1 can not be used as a member of this cluster - because its host OS or platform does not match those of the cluster. - - - - - FWBuilder API error: %1 - - - - - &Continue - - - - - ClusterGroupDialog_q - - - ClusterGroup - - - - - Name: - - - - - Type: - - - - - Edit protocol parameters - - - - - List of current members of this cluster. -Double click on an entry to load it. - - - - - Firewall - - - - - Interface - - - - - Master - - - - - Status - - - - - Click here to manage member firewalls of this cluster group. - - - - - Manage Members - - - - - Comment: - - - - - ClusterInterfaceWidget - - - Form - - - - - Name: - - - - - Label: - - - - - Comment: - - - - - Select firewall interfaces to use with cluster interface and choose its name. - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">Configuration of cluster interfaces depends on the failover protocol chosen on the next page. If the protocol creates its own new interface, such as <span style=" font-weight:600;">CARP</span> that creates interface <span style=" font-weight:600; font-style:italic;">carp0</span>, then the cluster interface object represents it and should have name <span style=" font-weight:600; font-style:italic;">carp0</span>. If failover protocol does not create new interfaces, such as <span style=" font-weight:600;">heartbeat</span> or <span style=" font-weight:600;">OpenAIS</span>, then cluster interface should have the same name as corresponding member firewall interfaces, that is <span style=" font-weight:600; font-style:italic;">eth0</span>, <span style=" font-weight:600; font-style:italic;">eth1.102</span>, <span style=" font-weight:600; font-style:italic;">vlan200</span>, and so on. In the latter case cluster interface is an abstraction used to define mapping between corresponding interfaces of the member firewalls and to provide place for the configuration of the failover protocol.</p></body></html> - - - - - Some of the cluster interfaces do not have any member firewall interface selected - - - - - Please select interface of the member firewall rather than the firewall object to be used with cluster interface - - - - - %1 can not be used as cluster interface. - - - - - ClusterInterfacesSelectorWidget - - - Add new interface - - - - - Delete current interface - - - - - New interface - - - - - This cluster has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - No interfaces - - - - - Interface %1 of firewall %2 is used in more than one cluster interface. - - - - - ColorLabelMenuItem - - - no color - - - - - CommentEditorPanel - - - Warning: loading from file discards current contents of the script. - - - - - Choose file that contains PIX commands - - - - - Could not open file %1 - - - - - CommentEditorPanel_q - - - Comment Editor Panel - - - - - Import from file ... - - - - - CompareObjectsDialog - - - Next - - - - - The following two objects have the same internal ID but different attributes: - - - - - Skip the rest but build report - - - - - CompilerOutputPanel - - - Compiling rule... - - - - - CompilerOutputPanel_q - - - Script Editor - - - - - ConfirmDeleteObjectDialog - - - Not used anywhere - - - - - ConfirmDeleteObjectDialog_q - - - Firewall Builder - - - - - Groups and firewall policy rules shown in the list below reference objects you are about to delete. If you delete objects, they will be removed from these groups and rules. - - - - - Deleted objects are moved to the "Deleted objects" library. You can recover them later by moving back to the user's library. However if you delete an object already located in the "Deleted objects" library, it is destroyed and can not be restored. - - - - - Object - - - - - Parent - - - - - Details - - - - - Delete - - - - - Cancel - - - - - CustomServiceDialog_q - - - Custom Service - - - - - Name: - - - - - Platform: - - - - - - Custom service object has separate code string for each -supported firewall platform. - - - - - Code String: - - - - - Protocol Name: - - - - - Choose one of the standard protocols from the menu or enter custom -protocol string. Policy compilers can use this information to add correct -protocol-specific parameters to the generated configuration. For example, -iptables compiler is allowed to add "--reject-with tcp-reset" to the target -REJECT only if service object belongs to protocol "tcp". - - - - - - Address Family: - - - - - Like with protocol, setting address family helps -policy compiler generate more accurate configuration -using this custom service object. For example, if -address family is set to ipv6, this custom service -will only be used in ipv6 policies. - - - - - - IPv4 - - - - - IPv6 - - - - - Comment: - - - - - DNSNameDialog_q - - - DNS Name - - - - - Name: - - - - - DNS Record: - - - - - DNS 'A' record name entered in this input field will be converted to -IP address using DNS query during policy compilation if checkbox -"Compile time" is turned on, or during firewall policy activation if -"Run Time" mode is used. This field can be automatically populated -using object name, this is controlled by an option in the global -Preferences dialog, tab "Objects" - - - - - Compile Time - - - - - Run Time - - - - - Comment: - - - - - DiscoveryDruid - - - Hosts file parsing ... - - - - - DNS zone transfer ... - - - - - Network discovery using SNMP ... - - - - - Import configuration from file ... - - - - - - - Discovery error - - - - - Could not open file %1 - - - - - - Adding objects ... - - - - - - - - - Cancel - - - - - Prepare objects ... - - - - - - Copying results ... - - - - - Incomlete network specification. - - - - - Empty community string - - - - - Some discovered interfaces have been rearranged in fwbuilder objects and recreated as subinterfaces to reflect VLANs, bonding and bridging configurations. The algorithm used to guess correct relationship between interfaces and subinterfaces is imperfect because of the limited information provided by SNMP daemon. Pelase review created objects to make sure generated configuration is accurate. - -The program expects MAC addresses of bonding, bridge and vlan interfaces to be the same. It is especially important to review and fix generated objects if you use MAC address spoofing. - - - - - &Continue - - - - - DiscoveryDruid_q - - - TextLabel - - - - - Choose discovery method used to collect information about network objects from the list below and click 'Next' to continue. - - - - - Discovery method: - - - - - Read file in hosts format - - - - - Import DNS zone - - - - - Perform network discovery using SNMP - - - - - Import configuration of a firewall or a router - - - - - Enter full path and file name below or click "Browse" to find it: - - - - - File in hosts format - - - - - Browse ... - - - - - All objects created during import will be placed in the library currently opened in the tree. - - - - - Policy import tries to parse given configuration file and preserve its logic as close as possible. However, very often target firewall configuration allows for more commands, options and their combinations than importer can understand. Rules that importer could not parse exactly are colored red in the rule sets it creates. Always inspect firewall policy created by the importer and compare it with the original. Manual changes and corrections may be required. Comments in the rules that could not be parsed show fragments of the original configuration parser did not understand. - - - - - Import from file: - - - - - Browse... - - - - - Cisco IOS - - - - - iptables - - - - - Platform: - - - - - textLabel1 - - - - - Firewall name: - - - - - This discovery method creates objects for all 'A' records found in DNS domain. You will later have a chance to accept only those objects you wish and ignore others. -Please enter the domain name below: - - - - - Domain name - - - - - Objects created using this method may have long or short names. long name consists of the host name and full domain name (this is called <i>Fully Qualified Domain Name</i>). Short name consists of only host name. Check in the box below if you wish to use long name, then click next to continue: - - - - - Use long names - - - - - DNS zone information has to be transferred from the name server authoritative for the domain. Pick the name server: - - - - - Name server - - - - - choose name server from the list below - - - - - server name or its IP address here if you wish to use different one: - - - - - DNS Query options - - - - - Timeout (sec) - - - - - Retries - - - - - This discovery method scans networks looking for hosts or gateways responding to SNMP queries. It pulls host's ARP table and uses all the entries found in it to create objects. Scan starts from the host called "seed". Enter "seed" host name or address below: - - - - - 'Seed' host - - - - - Enter a valid host name or address. - - - - - The scanner process can be confined to a certain network, so it won't discover hosts on adjacent networks. If you leave these fields blank, scanner will visit all networks it can find: - - - - - Confine scan to this network: - - - - - Netmask: - - - - - Address: - - - - - The scanner process can repeat its algorithm recursively using each new host it finds as a new "seed". This allows it to find as many objects on your network as possible. On the other hand, it takes more time and may find some objects you do not really need. You can turn recursive scanning on below: - - - - - Run network scan recursively - - - - - The scanner process can find nodes beyond the boundaries of your network by following point-to-point links connecting it to the Internet or other parts of WAN. - - - - - Follow point-to-point links - - - - - The scanner process normally ignores interfaces that have no IP addresses; checking this option makes it create such interfaces as "Unnumbered" - - - - - Include interfaces with no ip addresses - - - - - Analysis of ARP table yields IP addresses for hosts on your network. In order to determine their names, scanner can run reverse name lookup queries using your name servers (DNS): - - - - - Run reverse name lookup DNS queries to determine host names - - - - - Enter parameters for SNMP and DNS reverse lookup queries below. (If unsure, just leave default values): - - - - - SNMP query parameters: - - - - - SNMP 'read' community string: - - - - - - number of retries: - - - - - timeout (sec): - - - - - public - - - - - DNS parameters: - - - - - timeout (sec) : - - - - - Number of threads: - - - - - Process name - - - - - Stop - - - - - Save scan log to file - - - - - Process log: - - - - - These are the networks found by the scanner process. Choose the ones you wish to use from the list below, then click 'Next': - - - - - - - - - Select All - - - - - - - Filter ... - - - - - - - - - Unselect All - - - - - - - Remove Filter - - - - - - -> - - - - - - <- - - - - - Choose objects you wish to use, then click 'Next': - - - - - Change type of selected objects: - - - - - Address - - - - - Host - - - - - Firewall - - - - - Object - - - - - Interfaces - - - - - Type - - - - - Here you can change type of the objects to be created for each address discovered by the scanner. By default, an "Address" object is created for the host with just one interface with single IP address and "Host" object is created for the host with multiple interfaces, however you can change their types on this page. - - - - - Select target library - - - - - Adding new objects to library ... - - - - - < &Back - - - - - &Next > - - - - - &Finish - - - - - &Cancel - - - - - FWBAboutDialog - - - Build: %1 - - - - - Using Firewall Builder API %1 - - - - - FWBMainWindow_q - - - Firewall Builder - - - - - Output - - - - - Find - - - - - Editor - - - - - Help - - - - - &Edit - - - - - Object - - - - - Tools - - - - - &Help - - - - - Tutorial - - - - - - Rules - - - - - &File - - - - - Open Recent - - - - - Window - - - - - View - - - - - - Undo Stack - - - - - &New Object File - - - - - - New Object File - - - - - &Open... - - - - - - - Open - - - - - Ctrl+O - - - - - &Save - - - - - - - Save - - - - - Ctrl+S - - - - - Save &As... - - - - - Save As - - - - - &Print... - - - - - Print - - - - - Ctrl+P - - - - - E&xit - - - - - Exit - - - - - &Cut - - - - - Cut - - - - - Ctrl+X - - - - - C&opy - - - - - Copy - - - - - Ctrl+C - - - - - &Paste - - - - - Paste - - - - - Ctrl+V - - - - - - Ctrl+F - - - - - &Contents... - - - - - Contents - - - - - &Index... - - - - - Index - - - - - &About - - - - - About - - - - - - New - - - - - &Close - - - - - Close - - - - - - Compile - - - - - - - Compile rules of all firewall and cluster objects - - - - - - Install - - - - - - - Install firewall policy of all firewall and cluster objects - - - - - - Back - - - - - - Move back to the previous object - - - - - &New Object - - - - - New Object - - - - - Create New Object - - - - - Ctrl+N - - - - - &Find Object - - - - - Find Object - - - - - - Find object in the tree - - - - - P&references... - - - - - Preferences... - - - - - Edit Preferences - - - - - - Object Discovery - - - - - Summary of features - - - - - Getting started - - - - - Inspect - - - - - Add File to &RCS - - - - - Add File to RCS - - - - - - Delete - - - - - &Export Library - - - - - Export Library To a File - - - - - Import &Library - - - - - Import Library From a File - - - - - &Debug - - - - - Debug - - - - - - Propert&ies - - - - - Show File Properties - - - - - Ctrl+I - - - - - &Discard - - - - - Discard - - - - - Discard Changes and Overwrite With Clean Copy Of The Head Revision From RCS - - - - - Co&mmit - - - - - Commit - - - - - Commit Opened File to RCS and Continue Editing - - - - - - Lock - - - - - - Unlock - - - - - - new item - - - - - - Find Conflicting Objects in Two Files - - - - - Import Po&licy - - - - - Import Policy - - - - - Firewall Builder Help - - - - - Clear Menu - - - - - Release Notes - - - - - Object Tree - - - - - Ctrl+T - - - - - Editor Panel - - - - - FWObjectDropArea - - - Drop object here. - - - - - Show in the tree - - - - - Edit - - - - - Paste - - - - - Delete - - - - - FWObjectDropArea_q - - - Form1 - - - - - FWWindow - - - Ctrl+Z - - - - - Ctrl+Y - - - - - Shift+Ctrl+Z - - - - - Open File - - - - - File '%1' does not exist or is not readable - - - - - A new version of Firewall Builder is available at http://www.fwbuilder.org - - - - - Print configuration of %1 - - - - - Printing... - - - - - - Printing aborted - - - - - &Continue - - - - - Printing completed - - - - - Printing cancelled - - - - - FilterDialog - - - Filter error - - - - - Invalid RegExp. - - - - - Name - - - - - Address - - - - - Contains - - - - - Is equal to - - - - - Starts with - - - - - Ends with - - - - - Matches Wildcard - - - - - Matches RegExp - - - - - FilterDialog_q - - - Filter - - - - - Save - - - - - Load - - - - - Ok - - - - - Cancel - - - - - Match - - - - - all - - - - - any - - - - - of the following: - - - - - Add a new pattern - - - - - + - - - - - Target - - - - - Type - - - - - Pattern - - - - - Case sensitive - - - - - Remove a pattern - - - - - - - - - - - FindObjectWidget - - - Search hit the end of the policy rules. - - - - - - &Continue at top - - - - - - &Stop - - - - - Search hit the end of the object tree. - - - - - Search object is missing. - - - - - Replace object is missing. - - - - - Cannot replace object with itself. - - - - - Search and Replace objects are incompatible. - - - - - Replaced %1 objects. - - - - - Policy of firewall ' - - - - - FindWhereUsedWidget - - - NAT rule set - - - - - Policy rule set - - - - - Routing rule set - - - - - Rule set of unknown type - - - - - %1 "%2" / Rule %3 / %4 - - - - - Type: - - - - - FirewallCodeViewer_q - - - Firewall code viewer - - - - - Firewall / ruleset - - - - - File: - - - - - Close - - - - - FirewallDialog - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - - - - - &No - - - - - Platform setting can not be empty - - - - - - - - &Continue - - - - - Host OS setting can not be empty - - - - - - FWBuilder API error: %1 - - - - - FirewallDialog_q - - - Firewall - - - - - Name: - - - - - Platform: - - - - - Version: - - - - - Host OS: - - - - - Modified: - - - - - - - TextLabel - - - - - Compiled: - - - - - Installed: - - - - - Host OS Settings ... - - - - - Comment: - - - - - Firewall Settings ... - - - - - Skip this firewall for batch compile and install operations - - - - - Inactive firewall - - - - - FirewallInstaller - - - Generated script file %1 not found. - - - - - &Continue - - - - - Copying %1 -> %2:%3 - - - - - - FirewallInstallerCisco - - - Can not read generated script %1 - - - - - &Continue - - - - - FirewallInstallerUnx - - - Incorrect manifest format in generated script. Line with "*" is missing, can not find any files to copy to the firewall. -%1 - - - - - &Continue - - - - - FirewallSelectorWidget - - - You should select at least one firewall to use with the cluster - - - - - Host operation systems of chosen firewalls are different - - - - - Platforms of chosen firewalls are different - - - - - Versions of chosen firewalls are different - - - - - Cluster firewalls should have at least one common inteface - - - - - GroupObjectDialog - - - Open - - - - - Edit - - - - - Copy - - - - - Cut - - - - - Paste - - - - - Delete - - - - - GroupObjectDialog_q - - - Group - - - - - I - - - - - L - - - - - Comment: - - - - - Name: - - - - - New Object - - - - - Create New Object - - - - - Create new object and add to this group - - - - - HelpView_q - - - Help - - - - - Object Name - - - - - Close - - - - - HostDialog - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - - - - - &No - - - - - HostDialog_q - - - Host - - - - - MAC matching - - - - - Name: - - - - - Comment: - - - - - ICMPServiceDialog_q - - - ICMP - - - - - Name: - - - - - ICMP Type: - - - - - - any - - - - - ICMP Code: - - - - - Comment: - - - - - IPServiceDialog - - - DSCP code or class: - - - - - TOS code (numeric): - - - - - IPServiceDialog_q - - - IP - - - - - Name: - - - - - Protocol number: (0=any) - - - - - DiffServ - - - - - Use DSCP - - - - - Use TOS - - - - - DSCP or TOS code -(numerical, dec or hex): - - - - - IP options: - - - - - IP service object that has this attribute turned on matches IP packets with any IP options present. - - - - - Any options - - - - - lsrr (loose source route) - - - - - ssrr (strict source route) - - - - - rr (record route) - - - - - timestamp - - - - - router-alert option - - - - - Fragments: - - - - - all - - - - - 'short' - - - - - Comment: - - - - - IPv4Dialog - - - Illegal IP address '%1' - - - - - - &Continue - - - - - Illegal netmask '%1' - - - - - DNS lookup failed for both names of the address object '%1' and the name of the host '%2'. - - - - - DNS lookup failed for name of the address object '%1'. - - - - - IPv4Dialog_q - - - IPv4 - - - - - Name: - - - - - Address: - - - - - Netmask: - - - - - DNS Lookup... - - - - - Comment: - - - - - IPv6Dialog - - - Illegal IP address '%1' - - - - - - &Continue - - - - - Illegal netmask '%1' - - - - - DNS lookup failed for both names of the address object '%1' and the name of the host '%2'. - - - - - DNS lookup failed for name of the address object '%1'. - - - - - IPv6Dialog_q - - - IPv6 - - - - - Name: - - - - - Address: - - - - - Network (bit length) - - - - - DNS Lookup... - - - - - Comment: - - - - - InterfaceDialog - - - Group: - - - - - Network: - - - - - - - &Continue - - - - - The name of the interface '%1' has changed. The program can also rename IP address objects that belong to this interface, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to interface '%2' will stay the same.) - - - - - &Yes - - - - - &No - - - - - FWBuilder API error: %1 - - - - - InterfaceDialog_q - - - Interface - - - - - Name: - - - - - Label: - - - - - Security level: - - - - - <p>Each interface of the firewall must have security level associated with it.<br>Security level can be any number between 0 and 100, 0 being least secure and 100 being most secure levels. Interface with security level 0 ususally serves Internet connection.</p> - - - - - <p>Each interface of the firewall must have security level associated with it.<br> -Security level can be any number between 0 and 100, 0 being least secure and 100 being most secure levels. Interface with security level 0 ususally serves Internet connection.</p> - - - - - Network zone: - - - - - - <p>Network zone consists of hosts and networks that can be reached through this interface of the firewall. Subnet to which this interface is directly attached must be part of its network zone. Other subnets reachable by means of routing should alse be added to the network zone. -<br> -If network zone for this interface consists of only one subnet, you can simply choose that network's object in the pull-down below. If your network zone should include multiple subnets, you need to create an Object Group, then put all hosts and networks which are going to be part of the network zone into that group and finally choose this group in the pull-down below.</p> - - - - - <p>Check if this interface is used for management (SNMP queries, remote policy install etc.)<p> - - - - - Management interface - - - - - Skip this interface while assigning policy rules - - - - - Unprotected interface - - - - - Dedicated failover interface - - - - - Regular interface - - - - - Address is assigned dynamically - - - - - Unnumbered interface - - - - - Bridge Port Interface - - - - - Advanced Interface Settings ... - - - - - Comment: - - - - - InterfaceEditorWidget - - - Form - - - - - Name: - - - - - Label: - - - - - Comment: - - - - - Type: - - - - - Regular interface - - - - - Dynamic address - - - - - Unnumbered interface - - - - - MAC address: - - - - - Protocol: - - - - - Address - - - - - Netmask - - - - - Type - - - - - - Remove - - - - - - Add address - - - - - New interface - - - - - Failover protocol %1 does not require IP address for interface %2 - - - - - Failover protocol %1 requires an IP address for interface %2 - - - - - Empty address or netmask field - - - - - Add another address - - - - - Invalid address '%1/%2' - - - - - - Invalid netmask '%1/%2' - - - - - InterfacesTabWidget - - - TabWidget - - - - - Tab 1 - - - - - Tab 2 - - - - - Add new interface - - - - - Delete current interface - - - - - New interface - - - - - This firewall has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - This cluster has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - No interfaces - - - - - LibExport_q - - - Export - - - - - This will export a library to a file which can later be imported back into Firewall Builder - - - - - New Item - - - - - Make exported libraries read-only - - - - - Choose libraries to be exported: - - - - - Ok - - - - - Cancel - - - - - LibraryDialog_q - - - Library - - - - - Name: - - - - - Color: - - - - - Comment: - - - - - MetricEditorPanel_q - - - Script Editor - - - - - NATRuleOptionsDialog_q - - - NAT Rule Options - - - - - No options are available for this firewall platform - - - - - Normally, if object used to define translated source address is an interface marked as "dynamic", fwbuilder generates NAT rule with target MASQUERADE. However masquerading has problems with policy routing. This option makes fwbuilder use SNAT target instead. - - - - - Use SNAT target instead of MASQUERADING for NAT rules with dynamic interfaces - - - - - Randomize port mapping (translates to --random) - - - - - Give a client the same source-/destination-address for each connection (translates to --persistent, requires iptables 1.4.3 or later). - - - - - Pool type - - - - - default - - - - - bitmask - - - - - random - - - - - source-hash - - - - - round-robin - - - - - static-port - - - - - NetworkDialog - - - Illegal IP address '%1' - - - - - - - - &Continue - - - - - - Illegal netmask '%1' - - - - - Network object should not have netmask '0.0.0.0' - - - - - NetworkDialogIPv6 - - - Illegal IPv6 address '%1' - - - - - - &Continue - - - - - Illegal netmask '%1' - - - - - NetworkDialogIPv6_q - - - Network - - - - - Name: - - - - - Address: - - - - - Netmask (bit length) - - - - - Comment: - - - - - NetworkDialog_q - - - Network - - - - - Name: - - - - - Address: - - - - - Netmask: - - - - - Comment: - - - - - ObjConflictResolutionDialog - - - Keep current object - - - - - Replace with this object - - - - - - Object '%1' has been deleted - - - - - - Delete - - - - - Object '%1' in the objects tree - - - - - - Object '%1' in file %2 - - - - - ObjConflictResolutionDialog_q - - - Conflict Resolution - - - - - There is a conflict between an object in your tree and object in the file you are trying to open. Choose which version of this object you want to use: - - - - - Current Object - - - - - Keep current object - - - - - - Always choose this -object if there is a conflict - - - - - New Object - - - - - Replace with this object - - - - - ObjectManipulator - - - Object Manipulator - - - - - Edit - - - - - Open - - - - - Duplicate ... - - - - - Move ... - - - - - place in library %1 - - - - - to library %1 - - - - - Copy - - - - - Cut - - - - - Paste - - - - - Delete - - - - - Find - - - - - Where used - - - - - Group - - - - - New cluster from selected firewalls - - - - - Compile - - - - - Install - - - - - Inspect - - - - - - Transfer - - - - - Lock - - - - - Unlock - - - - - dump - - - - - New &Library - - - - - Create and add to group - - - - - Cluster host OS %1 does not support state synchronization - - - - - State Sync Group - - - - - Failover group - - - - - Copy object '%1' to clipboard' - - - - - Cut object - - - - - When you delete a library, all objects that belong to it -disappear from the tree and all groups and rules that reference them. -Do you still want to delete library %1? - - - - - &Yes - - - - - &No - - - - - ObjectManipulator_q - - - Tree of Objects - - - - - Back - - - - - Go back to the previous object - - - - - New Object - - - - - Create New Object - - - - - Filter: - - - - - Object name pattern - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:11pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">Clear filter</p></body></html> - - - - - ObjectTreeView - - - Object - - - - - Attributes - - - - - PhysAddressDialog_q - - - physAddress - - - - - Name: - - - - - Physical address (MAC): - - - - - Comment: - - - - - PrefsDialog - - - Find working directory - - - - - Find Secure Shell utility - - - - - Find SCP utility - - - - - A new version of Firewall Builder is available at http://www.fwbuilder.org - - - - - Your version of Firewall Builder is up to date. - - - - - Error checking for software updates: -%1 - - - - - PrintingProgressDialog - - - Printing (page %1/%2) - - - - - Printing page %1 - - - - - Aborting print operation - - - - - Cannot abort printing - - - - - ProjectPanel - - - No firewalls defined - - - - - Untitled - - - - - (read-only) - - - - - Cancel - - - - - Compile and Inspect files - - - - - - and - - - - - Firewall objects %1 have been modified and need to be recompiled. - - - - - Firewall object "%1" has been modified and needs to be recompiled. - - - - - %1 firewall objects have been modified and need to be recompiled. - - - - - Can not read generated files for the firewall objects %1. You need to compile them to create the files. - - - - - Can not read generated files for the firewall objects %1. You need to compile it to create the files. - - - - - Can not read generated files for the %1 firewall objects. You need to compile then to create the files. - - - - - <b>Multiple firewalls</b> - - - - - Searching for firewalls affected by the change... - - - - - - &Save - - - - - &Discard - - - - - - - &Cancel - - - - - FWB Files (*.fwb);;All Files (*) - - - - - - Choose name and location for the new file - - - - - Choose name and location for the file - - - - - This operation discards all changes that have been saved into the file so far, closes it and replaces it with a clean copy of its head revision from RCS. -All changes will be lost if you do this. - - - - - - &Discard changes - - - - - File %1 has been added to RCS. - - - - - - - - - - - - - - - - - - - &Continue - - - - - Error adding file to RCS: -%1 - - - - - Choose a file to import - - - - - This operation inspects two data files (either .fwb or .fwl) and finds conflicting objects. Conflicting objects have the same internal ID but different attributes. Two data files can not be merged, or one imported into another, if they contain such objects. This operation also helps identify changes made to objects in two copies of the same data file.<br><br>This operation does not find objects present in one file but not in the other, such objects present no problem for merge or import operations.<br><br>This operation works with two external files, neither of which needs to be opened in the program. Currently opened data file is not affected by this operation and objects in the tree do not change.<br><br>Do you want to proceed ? - - - - - Choose the first file - - - - - Choose the second file - - - - - - Error loading file %1: -%2 - - - - - Total number of conflicting objects: %1. -Do you want to generate report? - - - - - Choose name and location for the report file - - - - - TXT Files (*.txt);;All Files (*) - - - - - Can not open report file for writing. File '%1' - - - - - Unexpected error comparing files %1 and %2: -%3 - - - - - Please select a library you want to export. - - - - - The file %1 already exists. -Do you want to overwrite it ? - - - - - &Yes - - - - - &No - - - - - A library that you are trying to export contains references -to objects in the other libraries and can not be exported. -The following objects need to be moved outside of it or -objects that they refer to moved in it: - - - - - - (Long error message was truncated) - - - - - The program encountered error trying to load file %1. -The file has not been loaded. Error: -%2 - - - - - - Loading system objects... - - - - - Error loading file: -%1 - - - - - Reading and parsing data file... - - - - - Merging with system objects... - - - - - Firewall Builder uses file extension '.fwb' and -needs to rename old data file '%1' to '%2', -but file '%3' already exists. -Choose a different name for the new file. - - - - - Load operation cancelled and data file revertedto original version. - - - - - Firewall Builder uses file extension '.fwb'. Your datafile '%1' -has been renamed '%2' - - - - - Exception: %1 - - - - - Failed transformation : %1 - - - - - XML element : %1 - - - - - - The program encountered error trying to load data file. -The file has not been loaded. Error: -%1 - - - - - Building object tree... - - - - - Indexing... - - - - - Checking file %1 in RCS - - - - - Error checking in file %1: -%2 - - - - - Saving data to file %1 - - - - - File is read-only - - - - - Error saving file %1: %2 - - - - - ProjectPanel_q - - - Form - - - - - - - Compile this firewall - - - - - - - - ... - - - - - - - Insert rule - - - - - - - Compile and install this firewall - - - - - - - Inspect generated files - - - - - Firewall / ruleset - - - - - QObject - - - - - - Support module for %1 is not available - - - - - Firewall Builder can import Cisco IOS access lists from the router configuration saved using 'show run' or any other command that saves running config. The name of the created firewall object, all of its interfaces and their addresses will be configured automatically if this information can be found in the configuration file. - - - - - Firewall Builder can import iptables rules from a file in iptables-save format. Firewall name and addresses of its interfaces need to be configured manually because iptables-save file does not have this information. - - - - - Working directory %1 does not exist and could not be created. -Ignoring this setting. - - - - - Impossible to insert object %1 (type %2) into %3 -because of incompatible type. - - - - - - New Library - - - - - Library - - - - - - Firewall - - - - - Cluster - - - - - - Host - - - - - - - - Interface - - - - - - Network - - - - - Network IPv6 - - - - - - - Address - - - - - Address IPv6 - - - - - DNS Name - - - - - Address Table - - - - - Address Range - - - - - Object Group - - - - - - Custom Service - - - - - - IP Service - - - - - - - ICMP Service - - - - - ICMP6 Service - - - - - - TCP Service - - - - - - UDP Service - - - - - TagService - - - - - User Service - - - - - Service Group - - - - - - - Time Interval - - - - - MAC Address - - - - - Policy Rule Set - - - - - NAT Rule Set - - - - - Routing Rule Set - - - - - Failover group - - - - - State synchronization group - - - - - New Firewall - - - - - New Cluster - - - - - New Host - - - - - New Interface - - - - - New Network - - - - - New Network IPv6 - - - - - New Address - - - - - New Address IPv6 - - - - - New DNS Name - - - - - New Address Table - - - - - New Address Range - - - - - New Object Group - - - - - New Custom Service - - - - - New IP Service - - - - - New ICMP Service - - - - - New ICMP6 Service - - - - - New TCP Service - - - - - New UDP Service - - - - - New TagService - - - - - New User Service - - - - - New Service Group - - - - - New MAC Address - - - - - New Policy Rule Set - - - - - New NAT Rule Set - - - - - New Routing Rule Set - - - - - New failover group - - - - - New state synchronization group - - - - - - Add object to group - - - - - Add library - - - - - Edit - - - - - Rename object - - - - - Edit protocol parameters - - - - - Delete object - - - - - Move object - - - - - insert rule - - - - - delete rules - - - - - delete rules from group - - - - - change rule(s) color - - - - - move rule up - - - - - move rule down - - - - - negate rule element - - - - - remove object(s) from group - - - - - create new group - - - - - add to group above - - - - - add to group below - - - - - Edit Rule Action - - - - - Edit Rule Comment - - - - - Edit Rule Options - - - - - Negate - - - - - - type: - - - - - objects - - - - - - protocol: %1 - - - - - - type: %1 - - - - - - code: %1 - - - - - DNS record: - - - - - Address Table: - - - - - <b>Library:</b> - - - - - <b>Object Id:</b> - - - - - <b>Object Type:</b> - - - - - <b>Object Name:</b> - - - - - <b>DNS record:</b> - - - - - - Run-time - - - - - - Compile-time - - - - - <b>Table file:</b> - - - - - type: %1<br> - - - - - Group member %1:%2<br> - - - - - %1 objects<br> - - - - - - protocol - - - - - code: - - - - - Stateless - - - - - Stateful - - - - - - Log prefix: - - - - - Log Level: - - - - - Netlink group: - - - - - connlimit value: - - - - - Part of Any - - - - - Log facility: - - - - - - Log level: - - - - - Send 'unreachable' - - - - - Keep information on fragmented packets - - - - - Max state: - - - - - Force 'keep-state' - - - - - Source tracking - - - - - Max src nodes: - - - - - Max src states: - - - - - Add mirrored rule - - - - - Version: - - - - - Log interval: - - - - - Disable logging for this rule - - - - - - Pattern: "%1" - - - - - - Type: - - - - - Members: - - - - - %1 objects - - - - - Label: %1 - - - - - Addresses: - - - - - Address: - - - - - - User id: "%1" - - - - - <b>Action :</b> %1<br> - - - - - <b>Parameter:</b> - - - - - use SNAT instead of MASQ<br> - - - - - - random<br> - - - - - persistent<br> - - - - - bitmask<br> - - - - - source-hash<br> - - - - - round-robin<br> - - - - - static-port<br> - - - - - Replace object - - - - - No firewalls assigned to cluster '%1' - - - - - Type '%1': new object can not be created because -corresponding branch is missing in the object tree. -Please repair the tree using command 'fwbedit checktree -f file.fwb'. - - - - - Create new %1 - - - - - Create library - - - - - Create new Firewall - - - - - Create new Cluster - - - - - Create new Host - - - - - - - Paste object - - - - - Lock object - - - - - Unlock object - - - - - Create new group - - - - - Addres Range - - - - - Group of objects - - - - - Group of services - - - - - Policy: - - - - - Firewall name: %1 - - - - - Platform: - - - - - Version: - - - - - Host OS: - - - - - Legend - - - - - Objects - - - - - Groups - - - - - EMPTY - - - - - Library %1: Firewall '%2' (%3 rule #%4) uses object '%5' from library '%6' - - - - - Library %1: Group '%2' uses object '%3' from library '%4' - - - - - File is read-only - - - - - Error saving file %1: %2 - - - - - - - RCS tools are unavailable - - - - - Fatal error during initial RCS checkin of file %1 : - %2 -Exit status %3 - - - - - Fatal error running rlog for %1 - - - - - Fatal error running rcsdiff for file %1 - - - - - Follow global setting - - - - - - - - - - - - - On - - - - - - - - - - - - - Off - - - - - ERROR - - - - - OK - - - - - - - - - - - - No change - - - - - Compiling rule sets for firewall: %1 - - - - - - Installing policy rules on firewall '%1' - - - - - Summary: - - - - - * Running as user : %1 - - - - - * Firewall name : %1 - - - - - * Installer uses user name : %1 - - - - - * Management address : %1 - - - - - * Platform : %1 - - - - - * Host OS : %1 - - - - - * Loading configuration from file %1 - - - - - * Configuration diff will be saved in file %1 - - - - - * Commands will not be executed on the firewall - - - - - Only one interface of the firewall '%1' must be marked as management interface. - - - - - - One of the interfaces of the firewall '%1' must be marked as management interface. - - - - - - Management interface does not have IP address, can not communicate with the firewall. - - - - - - - - 0 - System Unusable - - - - - - - 1 - Take Immediate Action - - - - - - - 2 - Critical Condition - - - - - - - 3 - Error Message - - - - - - - 4 - Warning Message - - - - - - - 5 - Normal but significant condition - - - - - - - 6 - Informational - - - - - - - 7 - Debug Message - - - - - - - - - %1 advanced settings - - - - - - on top of the script - - - - - - after interface configuration - - - - - - after policy reset - - - - - Aggressive - - - - - Conservative - - - - - For high latency - - - - - Normal - - - - - Bound to interfaces - - - - - Floating - - - - - in the activation shell script - - - - - in the pf rule file, at the very top - - - - - in the pf rule file, after set comamnds - - - - - in the pf rule file, after scrub comamnds - - - - - in the pf rule file, after table definitions - - - - - alert - - - - - crit - - - - - error - - - - - warning - - - - - notice - - - - - info - - - - - debug - - - - - kern - - - - - user - - - - - mail - - - - - daemon - - - - - auth - - - - - syslog - - - - - lpr - - - - - news - - - - - uucp - - - - - cron - - - - - authpriv - - - - - ftp - - - - - local0 - - - - - local1 - - - - - local2 - - - - - local3 - - - - - local4 - - - - - local5 - - - - - local6 - - - - - local7 - - - - - ICMP admin prohibited - - - - - ICMP host prohibited - - - - - ICMP host unreachable - - - - - ICMP net prohibited - - - - - ICMP net unreachable - - - - - ICMP port unreachable - - - - - ICMP protocol unreachable - - - - - TCP RST - - - - - - None - - - - - Route through - - - - - Route reply through - - - - - Route a copy through - - - - - Bitmask - - - - - Random - - - - - Source Hash - - - - - Round Robin - - - - - /day - - - - - /hour - - - - - /minute - - - - - /second - - - - - - any - - - - - - 1.2.5 or earlier - - - - - 1.2.6 to 1.2.8 - - - - - 1.2.9 to 1.2.11 - - - - - 1.3.x - - - - - 1.4.0 or later - - - - - 1.4.1.1 or later - - - - - 1.4.3 or later - - - - - 3.x - - - - - 3.7 to 3.9 - - - - - 4.0 to 4.2 - - - - - 4.3 - - - - - 4.5 - - - - - 4.6 - - - - - 4.7 and later - - - - - Source - - - - - - Destination - - - - - Service - - - - - Time - - - - - Original Src - - - - - Original Dst - - - - - Original Srv - - - - - Translated Src - - - - - Translated Dst - - - - - Translated Srv - - - - - Gateway - - - - - Direction - - - - - Action - - - - - Options - - - - - Metric - - - - - Comment - - - - - Page %1 - - - - - Executing: - - - - - Using transfer agent '%1' - - - - - Appending fw object name to tarball - - - - - Could not transfer %1 config to '%2' - - - - - Impossible to apply changes because object is located in read-only -part of the tree or data file was opened read-only - - - - - - &Continue - - - - - Object with name '%1' already exists, please choose different name. - - - - - Compiler for firewall platform %1 not found - - - - - Original rule combines match of tcp/udp/icmp -protocols with two or more module matches, such as -module 'mark', 'recent' or 'length'. Use additional -branches to implement this complex match. - - - - - Unknown parameter of target REJECT: %1. - - - - - Can not reproduce default action in table 'mangle' chain 'FORWARD'. - - - - - Can not reproduce default action in table 'mangle' chain 'INPUT'. - - - - - - A single interface belonging to this firewall is expected in this field. - - - - - A single ip address is expected here. You may also insert a host or a network adapter leading to a single ip adress. - - - - - A single ip adress is expected here. You may also insert a host or a network adapter leading to a single ip adress. - - - - - RCS - - - - - Error checking file out: %1 - - - - - - - - - &Continue - - - - - Error creating temporary file - - - - - Error writing to temporary file - - - - - File is opened and locked by %1. -You can only open it read-only. - - - - - Revision %1 of this file has been checked out and locked by you earlier. -The file may be opened in another copy of Firewall Builder or was left opened -after the program crashed. - - - - - Open &read-only - - - - - &Open and continue editing - - - - - &Cancel - - - - - RCSFilePreview - - - File is not in RCS - - - - - RCSFilePreview_q - - - RCSFilePreview - - - - - Revision - - - - - Date - - - - - Author - - - - - Locked by - - - - - Tree View - - - - - List View - - - - - RCS log: - - - - - Open - - - - - Open read-only - - - - - Cancel - - - - - RCSFileSaveDialog_q - - - Log record for the new revision - - - - - Do not ask me anymore, always check files in with empty log - - - - - Check file &in - - - - - Alt+I - - - - - &Cancel - - - - - Checking file %1 into RCS - - - - - Log record for this revision: - - - - - RoutingRuleOptionsDialog_q - - - Routing Rule Options - - - - - If installation of this routing rule fails, just carry on - - - - - No options available for routing rules of this firewall platform - - - - - RuleOptionsDialog_q - - - Rule Options for ipt - - - - - - General - - - - - Assume firewall is part of "any" for this rule only: - - - - - Follow global setting - - - - - On - - - - - Off - - - - - - Normally policy compiler uses stateful inspection in each rule. Activating this option makes this rule stateless. - - - - - - - Stateless rule - - - - - - - Logging - - - - - alert - - - - - crit - - - - - error - - - - - warning - - - - - notice - - - - - info - - - - - debug - - - - - - Log prefix: - - - - - - - Log level: - - - - - Netlink group (if using ULOG): - - - - - limit - - - - - Module limit - - - - - Rate (rule matches if it hits this often or less): - - - - - - /day - - - - - - /hour - - - - - - /minute - - - - - - /second - - - - - - Negate - - - - - - Burst: - - - - - connlimit - - - - - Module connlimit - - - - - Match if the number of existing connections is above this (translates into option --connlimit-above) - - - - - per network with netmask of - - - - - bit - - - - - hashlimit - - - - - Module hashlimit - - - - - Name: - - - - - On some older systems this module has name 'dstlimit'. Check here if you need to use this name. - - - - - Rate: - - - - - Mode: - - - - - srcip - - - - - dstip - - - - - srcport - - - - - dstport - - - - - Options below control size of the hash table and expiration time. They will be omitted from the generated script if set to zero. - - - - - htable-size: - - - - - The number of buckets of the hash table (omit this option in generated script if set to 0) - - - - - htable-max: - - - - - Maximum number of entries in the hash (omit this option in generated script if set to 0) - - - - - htable-expire: - - - - - After how many milliseconds do hash entries expire (omit this option in the generated script if set to 0) - - - - - htable-gcinterval: - - - - - How many milliseconds between garbage collection intervals (omit this option in generated script if set to 0) - - - - - - Normally policy compiler uses stateful inspection in each rule. Activating next option makes this rule stateless. - - - - - Send ICMP 'unreachable' packet masquerading as being from the original destination - - - - - Keep information on fragmented packets, to be applied to later fragments - - - - - Log facility: - - - - - State Tracking - - - - - Force "keep state" to make the rule stateful regardless of the default. - - - - - - Available in OpenBSD 4.5 and later - - - - - Prevent state changes for states created by this rule from appearing on the pfsync interface. - - - - - States created by this rule are exported on the pflow interface. - - - - - When this option is checked, the number of states per source IP is tracked - - - - - Activate source tracking. - - - - - Maximum number of source addresses which can simultaneously have state table entries (max-src-nodes): - - - - - Maximum number of simultaneous state entries that a single source address can create with this rule (max-src-states): - - - - - Limits - - - - - Maximum number of concurrent states this rule may create. Unlimited if set to zero (option 'max'). - - - - - When this limit is reached, further packets matching the rule that would create state are dropped, until existing states time out. - - - - - Maximum number of simultaneous TCP connections that a single host can make (max-src-conn): - - - - - The limit of new connections over a time interval (max-src-conn-rate): - - - - - / - - - - - sec - - - - - overload table: - - - - - flush - - - - - global - - - - - TCP - - - - - Modulate state - - - - - synproxy - - - - - Use sloppy TCP state tracker for this rule - - - - - These options are only valid for PIX running software v6.3 or later - - - - - completely disable logging for this rule - - - - - Logging interval: - - - - - Compiler can automatically create a rule with mirrored source and destination addresses and service fields. This can be used to match "reply" packets using address and service parameters matched by this rule. The action of the mirrored rule is the same as that of this one. Firewall Builder recognizes the following services and creates "mirrored" versions as follows: - - - - - * UDP service: mirrored service has source and destination port ranges reversed - * TCP service: mirrored service has source and destination port ranges reversed and "established" flag inverted. If TCP service used in this rule does not have "established" flag, the mirrored service gets it, and the other way around. This is designed to simplify creating ACL rules to permit "reply" TCP packets - * ICMP service: ICMP echo request is recognized, mirrored service becomes ICMP echo reply. Other ICMP types are simply copied to the mirrored service - * ICMPv6 service: like with ICMP, ICMP echo request is recognized and other ICMPv6 types are just copied - * IP service: mirrored service is a copy - - - - - - Add mirror rule - - - - - There are no options for this firewall platform - - - - - RuleSetDialog - - - Rule set name '%1' is invalid. Only '[a-z][A-Z][0-9]_-+=@%^' characters are allowed. - - - - - &Continue - - - - - RuleSetDialog_q - - - Ruleset - - - - - Name: - - - - - This is IPv4 rule set - - - - - This is IPv6 rule set - - - - - This is combined IPv4 and IPv6 rule set - - - - - Top ruleset - - - - - filter+mangle table - - - - - mangle table - - - - - Comment: - - - - - On iptables "top" rule set goes into -the built-in chains INPUT, OUTPUT, -FORWARD; if this flag is unchecked, -rules go into user-defined chain -with the name the same as the name of -the rule set. - - - - - If this flag is unchecked, rules go -into anchor with the name the same as -the name of the rule set. - - - - - If this flag is unchecked, generated -access list will not be assigned to -interfaces with "ip access-group" -command. The name of the rule set will -be used as a prefix for names of -access access lists generated for it. - - - - - RuleSetView - - - Compile rule - - - - - - Move Rule up - - - - - - Move Rule down - - - - - Parameters - - - - - Inbound - - - - - Outbound - - - - - Both - - - - - - - - Edit - - - - - Rule Options - - - - - Logging On - - - - - Logging Off - - - - - Copy - - - - - Cut - - - - - Paste - - - - - Delete - - - - - Where used - - - - - Reveal in tree - - - - - Negate - - - - - - Insert Rule - - - - - Add new rule on top - - - - - Add new rule at the bottom - - - - - Paste Rule - - - - - Rename group - - - - - Change color - - - - - No color - - - - - Remove from the group - - - - - New group - - - - - Add to the group - - - - - Add Rule Below - - - - - - Remove Rule - - - - - Remove Rules - - - - - Move Rules up - - - - - Move Rules down - - - - - Copy Rule - - - - - Cut Rule - - - - - Paste Rule Above - - - - - Paste Rule Below - - - - - - Enable Rule - - - - - Enable Rules - - - - - - Disable Rule - - - - - Disable Rules - - - - - - Enter group name: - - - - - Enable rule - - - - - Disable rule - - - - - New Group - - - - - Change direction - - - - - Change action - - - - - Change logging - - - - - delete - - - - - Copy object '%1' to clipboard' - - - - - cut - - - - - Move object - - - - - RuleSetViewDelegate - - - log - - - - - (options) - - - - - Any - - - - - Original - - - - - Default - - - - - All - - - - - SSHCisco - - - -*** Fatal error : - - - - - Logged in - - - - - Switching to enable mode... - - - - - New RSA key - - - - - Yes - - - - - No - - - - - In enable mode. - - - - - Pushing firewall configuration - - - - - Rule %1 - - - - - End - - - - - SSHPIX - - - Making backup copy of the firewall configuration - - - - - *** Clearing unused access lists - - - - - *** Clearing unused object groups - - - - - *** End - - - - - SSHSession - - - You are connecting to the firewall <b>'%1'</b> for the first time. It has provided you its identification in a form of its host public key. The fingerprint of the host public key is: "%2" You can save the host key to the local database by pressing YES, or you can cancel connection by pressing NO. You should press YES only if you are sure you are really connected to the firewall <b>'%3'</b>. - - - - - Failed to start ssh - - - - - Stopping background process - - - - - Background process is still running. Will wait %1 sec - - - - - SSH session terminated, exit status: %1 - - - - - SSHUnx - - - -*** Fatal error : - - - - - Logged in - - - - - New RSA key - - - - - Yes - - - - - No - - - - - Done - - - - - Error in SSH - - - - - SimpleIntEditor_q - - - Script Editor - - - - - Cancel - - - - - OK - - - - - SimpleTextEditor - - - Warning: loading from file discards current contents of the script. - - - - - Choose file - - - - - Could not open file %1 - - - - - SimpleTextEditor_q - - - Script Editor - - - - - OK - - - - - Cancel - - - - - Import from file ... - - - - - SimpleTextView_q - - - Text viewer - - - - - Object Name - - - - - Close - - - - - StartTipDialog_q - - - Welcome to Firewall Builder - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-family:'Lucida Grande'; font-size:28pt;">Firewall Builder %1</span></p></body></html> - - - - - Watch Getting Started Tutorial - - - - - Summary of features - - - - - Do not show this again - - - - - Previous Tip - - - - - Next Tip - - - - - Close - - - - - TCPServiceDialog_q - - - TCP - - - - - Name: - - - - - U - - - - - TCP flags that must be set (see man iptables, option --tcp-flags) - - - - - Settings: - - - - - R - - - - - P - - - - - TCP flags that should be examined (see man iptables, option --tcp-flags) - - - - - Mask: - - - - - Flags: - - - - - A - - - - - S - - - - - F - - - - - Option "established" can be used if supported -by the target firewall platform - - - - - Established - - - - - Source Port Range - - - - - - Start: - - - - - - End: - - - - - Destination Port Range - - - - - Comment: - - - - - TagServiceDialog_q - - - Form1 - - - - - Name: - - - - - Code: - - - - - Comment: - - - - - TimeDialog_q - - - Time - - - - - Name: - - - - - Start date: - - - - - - M/d/yyyy - - - - - Start time: - - - - - End date: - - - - - End time: - - - - - Mon - - - - - Tue - - - - - Wed - - - - - Thu - - - - - Fri - - - - - Sat - - - - - Sun - - - - - Comment: - - - - - TutorialDialog_q - - - Tutorial - - - - - Reset - - - - - Previous - - - - - Next - - - - - Close - - - - - UDPServiceDialog_q - - - UDP - - - - - Name: - - - - - Source Port Range - - - - - - Start: - - - - - - End: - - - - - Destination Port Range - - - - - Comment: - - - - - UserDialog_q - - - User - - - - - Name: - - - - - User id: - - - - - Comment: - - - - - WorkflowIcons_q - - - Form - - - - - Create new -firewall - - - - - Import existing -configuration - - - - - Watch "Getting -Started" tutorial - - - - - askRuleNumberDialog_q - - - Enter New Position For The Rule - - - - - Enter new position for selected rules: - - - - - &Move - - - - - Alt+M - - - - - &Cancel - - - - - Alt+C - - - - - asklibforcopydialog_q - - - Copying - - - - - Object will be copied to library: - - - - - carpOptionsDialog - - - Input not valid: %1 - - - - - carpOptionsDialog_q - - - CARP protocol settings - - - - - &OK - - - - - &Cancel - - - - - CARP Parameters - - - - - - CARP password - - - - - Virtual Host ID - - - - - VHID - - - - - Advertisement interval (sec) - - - - - Master advskew - - - - - Default advskew - - - - - clusterMembersDialog_q - - - cluster member configuration - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - Cluster - - - - - Manage member firewalls for this Cluster. Firewalls are considered valid members if they have the same host OS and platform as the Cluster object. They also need to have at minimum one physical interface attached. - - - - - Available Firewalls: - - - - - Tree of potential cluster members. Select an interface to assign to the cluster. - - - - - Firewall - - - - - - Interface - - - - - Label - - - - - - ... - - - - - Selected as Cluster-Members: - - - - - Table of already selected member firewalls with their assigned cluster interfaces. - - - - - Name - - - - - Master - - - - - colorLabelMenuItem_q - - - Orange - - - - - Green - - - - - Purple - - - - - Blue - - - - - Yellow - - - - - Gray - - - - - Red - - - - - No color - - - - - conntrackOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - - - - - conntrackOptionsDialog_q - - - conntrack protocol settings - - - - - &OK - - - - - &Cancel - - - - - conntrack Parameters - - - - - Use unicast address for conntrackd - - - - - Address: - - - - - Port number (udp): - - - - - debugDialog_q - - - Debugging Info - - - - - &Close - - - - - Alt+C - - - - - filePropDialog - - - Opened read-only - - - - - Revision %1 - - - - - filePropDialog_q - - - File Properties - - - - - Location: - - - - - location - - - - - RO - - - - - Time of last modification: - - - - - lastModified - - - - - Revision Control: - - - - - Revision: - - - - - rev - - - - - Locked by user: - - - - - lockedBy - - - - - Revision history: - - - - - Print - - - - - OK - - - - - findDialog - - - Search hit the end of the object tree. - - - - - &Continue at top - - - - - &Stop - - - - - findDialog_q - - - Find Object - - - - - Text to be found in object names: - - - - - Search in policy rules - - - - - Search in the tree - - - - - Find - - - - - Matching attribute: - - - - - Address - - - - - TCP/UDP port - - - - - Protocol number - - - - - ICMP type - - - - - Search for substring using regular expressions - - - - - findObjectWidget_q - - - Form1 - - - - - Find object - - - - - Name - - - - - Address - - - - - TCP/UDP port - - - - - Protocol number - - - - - ICMP type - - - - - Use regular expressions - - - - - Replace object - - - - - Scope for search and replace : - - - - - Tree only - - - - - Tree and policy of all firewalls - - - - - Policy of all firewalls - - - - - policy of the opened firewall - - - - - Find Next - - - - - Replace - - - - - Replace all - - - - - Replace Current && Find Next - - - - - findWhereUsedWidget_q - - - Form1 - - - - - Object: - - - - - Object is found in : - - - - - Object - - - - - Used by - - - - - Details - - - - - Include children of the object in search. For example, if the object is a firewall, results will include all rules and groups using it, its interfaces and their addresses - - - - - Include children - - - - - Find - - - - - freebsdAdvancedDialog_q - - - FreeBSD: advanced settings - - - - - Options - - - - - - Packet forwarding - - - - - - - - No change - - - - - - - - On - - - - - - - - Off - - - - - Forward source routed packets - - - - - Generate ICMP redirects - - - - - Path - - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - - - - - ipfw: - - - - - pfctl: - - - - - ipf: - - - - - ipnat: - - - - - sysctl: - - - - - &OK - - - - - &Cancel - - - - - heartbeatOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - - - - - heartbeatOptionsDialog_q - - - heartbeat protocol settings - - - - - &OK - - - - - &Cancel - - - - - heartbeat Parameters - - - - - Heartbeat should be configured to use unicast address -of each firewall member for health checks. Firewall Builder -will add policy rules to permit these automatically. - - - - - Use unicast address for heartbeat - - - - - Address: - - - - - Enter multicat address used for heartbeat health checks here. - - - - - Port number (udp): - - - - - instBatchOptionsDialog - - - Batch install options - - - - - instDialog - - - There are no firewalls to process. - - - - - Select firewalls to compile. - - - - - No files were generated, there is nothing to show. - - - - - <b>Multiple firewalls</b> - - - - - Policy installer uses Secure Shell to communicate with the firewall. -Please configure directory path to the secure shell utility -installed on your machine using Preferences dialog - - - - - - - - - &Continue - - - - - Error: Failed to start program - - - - - Last error: - - - - - The process failed to start - - - - - The process crashed some time after starting successfully. - - - - - The last waitFor...() function timed out. Elapsed time: %1 ms - - - - - An error occurred when attempting to write to the process. - - - - - An error occurred when attempting to read from the process. - - - - - An unknown error occurred. - - - - - Current state of QProcess: - - - - - The process is not running. - - - - - The process is starting, but the program has not yet been invoked. - - - - - The process is running and is ready for reading and writing. - - - - - Compiling rule sets for firewall: - - - - - - Compiling ... - - - - - - Stop - - - - - Firewall platform is not specified in this object. -Can't compile firewall policy. - - - - - Install firewall: - - - - - - Installing ... - - - - - - Failure - - - - - Success - - - - - - Error - - - - - Cancelled - - - - - <b>You are trying to compile policy for a firewall object that is a member of a cluster, however you requested compilation of only this member firewall and not the cluster it belongs to. Assuming firewall is standalone and not cluster member. Rules and parts of the script specific for the cluster configuration will not be generated.</b> - - - - - Firewall '%1' is member of cluster '%2' - - - - - Running command '%1' - - - - - - instDialog_q - - - TextLabel - - - - - <p align="center"><b><font size="+2">Select firewalls to compile and install.</font></b></p> - - - - - - warning text goes here - - - - - Select all - - - - - Select none - - - - - - Firewall - - - - - Compile - - - - - Install - - - - - Last Modified - - - - - Last Compiled - - - - - Last Installed - - - - - Stop - - - - - Progress - - - - - Firewalls: - - - - - firewall - - - - - current operation here - - - - - Process log - - - - - Save log to file - - - - - Inspect generated files - - - - - Perform batch install - - - - - Check this option if you want to install all selected firewalls automatically. This only works if you use the same user name and password to authenticate to all these firewalls. - - - - - < &Back - - - - - &Next > - - - - - &Finish - - - - - &Cancel - - - - - instOptionsDialog - - - Install options for firewall '%1' - - - - - instOptionsDialog_q - - - Install options - - - - - <p align="center"><b><font size="+2">Install options for firewall '%1'</font></b></p> - - - - - User name: - - - - - Password or passphrase: - - - - - Enable password: - - - - - Remember passwords for the duration of the session (passwords -are never stored permanently). To enable this option turn it on -in Preferences and configure user name used to authenticate to -the firewall in the "advanced" settings dialog of the firewall object. - - - - - Remember passwords - - - - - Write configuration to standby PIX - - - - - Store configuration diff in a file - - - - - Make a backup copy of the firewall configuration in this file: - - - - - Address that will be used to communicate with the firewall: - - - - - Dry run (commands won't be executed on the firewall) - - - - - Quiet install: do not print anything as commands are executed on the firewall - - - - - Verbose: print all commands as they are executed on the firewall - - - - - Remove comments from configuration - - - - - Compress script - - - - - Store a copy of fwb file on the firewall - - - - - min - - - - - Test run: run the script on the firewall but do not store it permanently. - - - - - Rebooting the firewall will restore its original policy. To cancel reboot, install the policy with "test run" option turned off - - - - - Schedule reboot in - - - - - If you install the policy in test mode, it will not be saved permanently, so you can revert to the last working configuration by rebooting the firewall - - - - - Cancel reboot if policy activation was successfull - - - - - Install - - - - - Cancel All - - - - - Cancel - - - - - iosAdvancedDialog_q - - - IOS Advanced Configuration Options - - - - - OK - - - - - Cancel - - - - - General - - - - - Set router name using object's name - - - - - Generate commands to configure addresses for interfaces - - - - - iosaclAdvancedDialog - - - - Script Editor - - - - - iosaclAdvancedDialog_q - - - IOS ACL Firewall Settings - - - - - Compiler Options - - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Compiler creates multiple access lists from the same policy, -two for each interface: one for inbound and another for -outbound. If the policy is written in a such way that no rule -can possibly be associated with an interface, this interface -gets no access list at all. Also, interfaces marked as -"unprotected" never get access list regardless of how the policy -rules are designed. - - - - - - Generate separate access list for each interface - - - - - Compiler creates one access list and assigns it to all -interfaces. - - - - - - Create one access list and attach it to all interfaces - - - - - Policy Compiler Options - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in the policy - - - - - Use object-group statements (requires IOS v12.4(20)T and later) - - - - - Always permit ssh access from the management workstation with this address: - - - - - Script Options - - - - - - Insert comments into generated IOSACL configuration file - - - - - Comment the code - - - - - Use ACL remarks - - - - - Group IOSACL commands in the script so that similar commands appear next to each other, just like IOSACL does it when you use 'show config' - - - - - Group similar commands together - - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via IPSEC tunnel. This is the way access lists were generated in older versions of Firewall Builder for IOSACL. - - - - - Do not clear access lists and object group, just generate IOSACL commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - - - - - Installer - - - - - Built-in installer - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - Instead of running generated configuration on the router line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the router for this to work. This method works for IOS v12.4 or later and is much faster than running configuration line by line. - - - - - Copy generated configuration file to the router using scp - - - - - File system on the router where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "nvram:": - - - - - External install script - - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Logging - - - - - Generate logging commands - - - - - Syslog - - - - - Syslog host (name or IP address): - - - - - syslog facility: - - - - - syslog level ('logging trap'): - - - - - The logging timestamp command requires that the clock command be set. - - - - - Enable logging timestamps on syslog file - - - - - Other logging destinations and levels: - - - - - Internal buffer - - - - - Console - - - - - IPv6 - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - OK - - - - - Cancel - - - - - ipcopAdvancedDialog - - - - Script Editor - - - - - ipcopAdvancedDialog_q - - - ipcop advanced settings - - - - - Compiler - - - - - Compiler: - - - - - Command line options for the compiler: - - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - rc.firewall.local - - - - - Assume firewall is part of 'any' - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Bridging firewall - - - - - Detect shadowing in policy rules - - - - - Ignore empty groups in rules - - - - - Enable support for NAT of locally originated connections - - - - - Make Tag and Classify actions terminating - - - - - Default action on 'Reject': - - - - - Always permit ssh access from -the management workstation -with this address: - - - - - Installer - - - - - Built-in installer - - - - - Directory on the firewall where script should be installed - - - - - /etc/rc.d/ - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - admin - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - /etc/rc.d/rc.firewall - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - External install script - - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Logging - - - - - use ULOG - - - - - use LOG - - - - - log TCP seq. numbers - - - - - log IP options - - - - - use numeric syslog levels - - - - - Log level: - - - - - log TCP options - - - - - cprange - - - - - queue threshold: - - - - - netlink group: - - - - - Log prefix: - - - - - Logging limit: - - - - - Activate logging in all rules -(overrides rule options, use for debugging) - - - - - Script - - - - - These options enable auxiliary sections in the generated shell script. - - - - - Turn debugging on in generated script - - - - - Verify interfaces before loading firewall policy - - - - - IPv6 - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - ipcoposAdvancedDialog_q - - - IPCOP: advanced settings - - - - - Options - - - - - IPv4 Packet forwarding - - - - - - - - - - - - - - - - - - - - No change - - - - - - - - - - - - - - - - - - - - On - - - - - - - - - - - - - - - - - - - - Off - - - - - IPv6 Packet forwarding - - - - - Kernel anti-spoofing protection - - - - - Ignore broadcast pings - - - - - Ignore all pings - - - - - Accept source route - - - - - Accept ICMP redirects - - - - - Ignore bogus ICMP errors - - - - - Allow dynamic addresses - - - - - Log martians - - - - - whats this text - whats this comment - - - - - TCP - - - - - These parameters make sense for connections to or from the firewall host - - - - - TCP sack - - - - - TCP window scaling - - - - - TCP ECN - - - - - TCP SYN cookies - - - - - TCP keepalive time (sec) - - - - - TCP fack - - - - - TCP timestamps - - - - - TCP FIN timeout (sec) - - - - - Path - - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - - - - - iptables: - - - - - :ip6tables - - - - - ip: - - - - - vconfig - - - - - brctl - - - - - ifenslave - - - - - logger: - - - - - modprobe: - - - - - lsmod - - - - - iptables-restore: - - - - - :ip6tables-restore - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - ipfAdvancedDialog - - - - Script Editor - - - - - ipfAdvancedDialog_q - - - ipf: advanced settings - - - - - &OK - - - - - &Cancel - - - - - Compiler - - - - - Compiler: - - - - - Command line options for the compiler: - - - - - Output file name. If left blank, the file name is constructed of the firewall object name and extension ".fw" - - - - - Generated script (.fw file) and configuration (.conf) files can be copied to the firewall machine under different names. If these fields are left blank, the file name does not change. - - - - - Script (.fw) file name on the firewall - - - - - ipf.conf file name on the firewall - - - - - nat.conf file name on the firewall - - - - - Always permit ssh access from the management - workstation with this address: - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Find and eliminate duplicate rules - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in policy - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - - - - - Default action on 'Reject': - - - - - Masquerade returned icmp as being from original -packet's destination - - - - - Protocol Helpers - - - - - Use raudio proxy in NAT rules - - - - - Use h323 proxy in NAT rules - - - - - Use ipsec proxy in NAT rules - - - - - Use ftp proxy in NAT rules - - - - - Use rcmd proxy in NAT rules - - - - - Use Kerberos rcmd proxy in NAT rules - - - - - Use Kerberos ekshell proxy in NAT rules - - - - - Use PPTP proxy in NAT rules - - - - - Use IRC proxy in NAT rules for DCC - - - - - Some protocols involve multiple associated network connections. Firewall can keep track of such connections automatically if you activate one or all of the following options: - - - - - Installer - - - - - Built-in installer - - - - - Directory on the firewall where configuration files should be installed - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - External install script - - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Logging - - - - - Log facility: - - - - - Log level: - - - - - Log packet body - - - - - Block if can not log - - - - - Script Options - - - - - Add virtual addresses for NAT - - - - - Configure Interfaces of the firewall machine - - - - - Turn debugging on in generated script - - - - - If this option is on, policy compiler adds virtual addresses to the interfaces to make the firewall answer to ARP queries for addresses used in NAT rules. - - - - - Optimization - - - - - These options enable auxiliary sections in the generated shell script. - - - - - Determine addresses of dynamic interfaces at run time - - - - - IPv6 - - - - - Enable IPv6 support - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - ipfwAdvancedDialog - - - - Script Editor - - - - - ipfwAdvancedDialog_q - - - ipfw: advanced settings - - - - - &OK - - - - - &Cancel - - - - - Compiler - - - - - Compiler: - - - - - Command line options for the compiler: - - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Generated script can be copied to the firewall machine under different name. If this field is left blank, the file name does not change. - - - - - Script name on the firewall - - - - - Add rule to accept packets matching dynamic rules created for -known sessions on top of the policy (action 'check-state') - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in policy - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - - - - - Always permit ssh access from -the management workstation -with this address: - - - - - Installer - - - - - Built-in installer - - - - - Directory on the firewall where script should be installed - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - External install script - - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Script Options - - - - - Add virtual addresses for NAT - - - - - Configure Interfaces of the firewall machine - - - - - Turn debugging on in generated script - - - - - These options enable auxiliary sections in the generated shell script. - - - - - IPv6 - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - iptAdvancedDialog - - - - Script Editor - - - - - iptAdvancedDialog_q - - - iptables: advanced settings - - - - - Compiler - - - - - Compiler: - - - - - Generated script can be copied to the firewall machine under different name. If this field is left blank, the file name does not change. - - - - - Script name on the firewall: - - - - - Compiler command line options: - - - - - Output file name: - - - - - If output file name is left blank, the file name is constructed of the firewall object name and extension ".fw" - - - - - Assume firewall is part of 'any' - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Accept ESTABLISHED and RELATED packets before the first rule - - - - - Drop packets that are associated with -no known connection - - - - - and log them - - - - - Bridging firewall - - - - - Detect shadowing in policy rules - - - - - Ignore empty groups in rules - - - - - Enable support for NAT of locally originated connections - - - - - This adds a rule on top of the policy with iptables target TCPMSS -and option --clamp-mss-to-pmtu. Generation of this command is -version-dependent and also depends on the setting of ip or ipv6 forwarding -in host settings dialog. - - - - - - Clamp MSS to MTU - - - - - Make Tag and Classify actions terminating - - - - - Compiler will automatically generate rules to permit ICMP6 packets used in IPv6 -Neighbor Discovery after the rules that accept ESTABLISHED,RELATE and before -the rule that drops packets in state INVALID. - - - - - Default action on 'Reject': - - - - - Add rules to accept IPv6 Neighbor Discovery -packets to IPv6 policies - - - - - Use module "set" for run-time Address Table objects (module is only available in iptables v 1.4.1.1 and later) - - - - - Always permit ssh access from the management workstation with this address: - - - - - Install the rule for ssh access from the management workstation when the firewall script is run with the "block" command - - - - - Installer - - - - - Built-in installer - - - - - Directory on the firewall where script should be installed - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - External install script - - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Insert prolog script - - - - - on top of the script - - - - - after interface configuration - - - - - after policy reset - - - - - Logging - - - - - use ULOG - - - - - use LOG - - - - - log TCP seq. numbers - - - - - log IP options - - - - - use numeric syslog levels - - - - - Log level: - - - - - log TCP options - - - - - cprange - - - - - queue threshold: - - - - - netlink group: - - - - - Log prefix: - - - - - Logging limit: - - - - - Activate logging in all rules -(overrides rule options, use for debugging) - - - - - Script - - - - - Load iptables modules - - - - - If debugging is turned on, the script will run with shell option "-x" that makes it print every command it executes. Warning: this produces a lot of debugging output. - - - - - Turn debugging on in generated script - - - - - Managing interfaces and addresses - - - - - Verify interfaces before loading firewall policy - - - - - Configure Interfaces of the firewall machine - - - - - Clear ip addresses and bring down interfaces not configured in fwbuilder - - - - - Configure VLAN Interfaces - - - - - Configure bridge Interfaces - - - - - Configure bonding Interfaces - - - - - Add virtual addresses for NAT - - - - - Generated script can load rules one by one by calling iptables command line utility, or activate them all at once using iptables-restore. In both cases you just run the script with command line parameter "start" to activate the policy, the script will use iptables-restore automatically if this checkbox is on - - - - - iptables-restore replaces firewall policy in one atomic transaction - - - - - Use iptables-restore to activate policy - - - - - IPv6 - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - linksysAdvancedDialog_q - - - Linksys/Sveasoft: advanced settings - - - - - &OK - - - - - &Cancel - - - - - Path - - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - - - - - iptables: - - - - - ip: - - - - - logger: - - - - - modprobe: - - - - - lsmod - - - - - vconfig - - - - - brctl - - - - - ifenslave - - - - - Prompts - - - - - Policy installer relies on the shell prompt on the firewall to execute commands. Installer tries both prompt string patterns configured here; it assumes that the firewall is ready to accept a command if either prompt matches. You should only need to change these string patterns if Sveasoft changes the shell prompt in the future releases of the software. -<br> -<br> -The default strings work for Sveasoft Alchemy pre-5.1 and pre-5.2 - - - - - Use default prompts - - - - - prompt 2 - - - - - prompt 1 - - - - - linux24AdvancedDialog_q - - - Linux 2.4: advanced settings - - - - - Options - - - - - IPv4 Packet forwarding - - - - - - - - - - - - - - - - - - - - - No change - - - - - - - - - - - - - - - - - - - - - On - - - - - - - - - - - - - - - - - - - - - Off - - - - - IPv6 Packet forwarding - - - - - Kernel anti-spoofing protection - - - - - Ignore broadcast pings - - - - - Ignore all pings - - - - - Accept source route - - - - - Accept ICMP redirects - - - - - Ignore bogus ICMP errors - - - - - Allow dynamic addresses - - - - - Log martians - - - - - whats this text - whats this comment - - - - - TCP - - - - - These parameters make sense for connections to or from the firewall host - - - - - TCP sack - - - - - TCP window scaling - - - - - TCP ECN - - - - - TCP SYN cookies - - - - - TCP keepalive time (sec) - - - - - TCP fack - - - - - TCP timestamps - - - - - TCP FIN timeout (sec) - - - - - Path - - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - - - - - iptables: - - - - - :ip6tables - - - - - ip: - - - - - logger: - - - - - vconfig: - - - - - brctl: - - - - - ifenslave: - - - - - lsmod: - - - - - ipset: - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">These parameters allow you to tune performance of<br />conntrack module (netfilter state tracking). This<br />should only be necessary for large firewalls with a lot<br />of traffic and many stateful rules.<br />Explanation of these parameters can be found on</p> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">the Internet if you search for &quot;netfilter conntrack performance&quot;<br /><br />Set both to zero to use default values</p></body></html> - - - - - modprobe: - - - - - iptables-restore: - - - - - :ip6tables-restore - - - - - conntrack - - - - - CONNTRACK_MAX - - - - - CONNTRACK_MAX is the maximum number of "sessions" (connection tracking entries) -that can be handled simultaneously by netfilter in kernel memory. - - - - - HASHSIZE - - - - - the size of the hash table storing the lists of conntrack entries - - - - - This parameter is used if you run conntrackd in state <br> -synchronization mode for a firewall cluster and have<br> -kernel &lt;2.6.22<br> -Explanation of this parameter can be found at<br> -<a href="http://conntrack-tools.netfilter.org/manual.html">http://conntrack-tools.netfilter.org/manual.html</a> - - - - - - Disable TCP window tracking ("ip_conntrack_tcp_be_liberal") - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - linux24IfaceOptsDialog - - - Input not valid: %1 - - - - - linux24IfaceOptsDialog_q - - - Linux: interface settings - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Device Type - - - - - VLAN ID - - - - - Enable STP - - - - - Bonding policy: - - - - - balance-rr - - - - - active-backup - - - - - balance-xor - - - - - broadcast - - - - - 802.3ad - - - - - balance-tlb - - - - - balance-alb - - - - - Xmit hash policy: - - - - - layer2 - - - - - layer3+4 - - - - - Other parameters: - - - - - longTextDialog_q - - - longTextDialog_q - - - - - Continue - - - - - this is the error text - - - - - macosxAdvancedDialog_q - - - MacOS X: advanced settings - - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Generate ICMP redirects - - - - - Packet forwarding - - - - - - - No change - - - - - - - On - - - - - - - Off - - - - - Forward source routed packets - - - - - Path - - - - - ipfw: - - - - - sysctl: - - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - - - - - newClusterDialog - - - do not use any, i will create new policy and NAT rules - - - - - Depending on the failover protocol, cluster interface may or may not need an IP address. <b>VRRP</b>, <b>CARP</b>, <b>heartbeat</b> interfaces should have their own unique IP addresses different from the member firewall interfaces. Other failover protocols such as the one used in <b>Cisco ASA (PIX) firewall</b> do not require additional IP address.<br><br>List of available failover protocols depends on the firewall platform. - - - - - regular - - - - - dynamic - - - - - unnumbered - - - - - with address: - - - - - with addresses: - - - - - You should select at least one firewall to create a cluster - - - - - newClusterDialog_q - - - TextLabel - - - - - < &Back - - - - - &Next > - - - - - &Finish - - - - - &Cancel - - - - - Enter the name of the new object - - - - - Select member firewall objects to use with the new cluster. One member firewall should be marked as master. You can choose to copy policy and NAT rules from the rule sets of one of the members to the new cluster later. - - - - - Firewall - - - - - Use in cluster - - - - - Master - - - - - - Tab 1 - - - - - Choose which member's policy and NAT rules should be used to create policy and nat rules of the cluster. First, each member firewall object will be copied with the name "<firewall>-bak" (where <firewall> is the name of the member) for backup, then rules from the chosen member will be copied to the new cluster and finally all policy and NAT rules will be deleted in both members. Backup firewall objects ensure that you do not lose your configuration and can always revert back if necessary. You can delete backup objects or move them to a separate library for archival later. - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:13pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-weight:600;">Cluster summary:</span></p></body></html> - - - - - Name: - - - - - Firewalls used in this cluster - - - - - Master firewall: - - - - - Cluster interfaces - - - - - Policy and NAT rules will be copied from firewall: - - - - - Click Finish to create this cluster. - - - - - newFirewallDialog - - - FWBuilder template files - - - - - FWBuilder template files (*.xml *.fwb *.fwl) - - - - - Missing SNMP community string. - - - - - - Address of %1 could not be obtained via DNS - - - - - Please select template - - - - - - &Continue - - - - - Dynamic interface gets its IP address by means of DHCP or PPP protocol and does not require an address here. Regular interface has statically configured IP address which should be entered on this page. Interface can have several IPv4 and IPv6 addresses. - - - - - Error loading template library: -%1 - - - - - Here you can change IP address of the template interface to match addresses used on your network. Interface can have several IPv4 and IPv6 addresses. - - - - - Interface: %1 (%2) - - - - - Dynamic address - - - - - Unnumbered interface - - - - - - - Invalid address '%1/%2' - - - - - Can not find interface %1 in the interface editor data - - - - - newFirewallDialog_q - - - TextLabel - - - - - Enter the name of the new object below: - - - - - Choose firewall software it is running: - - - - - Choose OS the new firewall runs on: - - - - - Use preconfigured template firewall objects - - - - - Template file: - - - - - Browse - - - - - Use standard template library - - - - - Next step is to add interfaces to the new firewall. There are two ways to do it: using SNMP query or manually. Adding them using SNMP query is fast and automatic, but is only possible if firewall runs SNMP agent and you know SNMP community string 'read'. - - - - - Configure interfaces manually - - - - - Use SNMP to discover interfaces of the firewall - - - - - Discover Interfaces using SNMP - - - - - SNMP 'read' community string: - - - - - Firewall IP address: - - - - - - 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. Label is mandatory for PIX firewall. - - - - - Choose template object in the list and click 'Next' when ready. - -You can change interface names and their IP addresses on the next page. Template firewall object comes with basic policy and NAT rules that implement policy described in its comment. If you change IP addresses of its interfaces, policy and NAT rules will be automatically corrected to reflect this change. However you should always inspect the rules and adjust them to suite your security policy. Template objects are designed to be a starting point, a way to jump-start your configuration and most likely require changes to be useful in your environment. - - - - - - - Tab 1 - - - - - up - - - - - down - - - - - Name - - - - - Label - - - - - Address - - - - - Security Level - - - - - In order to be able to build firewall policy properly, Firewall Builder needs information about 'security level' of the firewall's interfaces. Interface that connects it to the Internet is considered 'insecure' and has security level '0', while interface connected to the internal network is supposed to be 'secure' (security level '100'). You can arrange interfaces in the order of their security level below. - - - - - < &Back - - - - - &Next > - - - - - &Finish - - - - - &Cancel - - - - - newGroupDialog_q - - - New Group - - - - - Library: - - - - - Group Name: - - - - - This operation will create a new group and put selected objects in it - - - - - Create a group - - - - - Cancel - - - - - newHostDialog - - - FWBuilder template files - - - - - FWBuilder template files (*.xml *.fwb) - - - - - Missing SNMP community string. - - - - - Address of %1 could not be obtained via DNS - - - - - Interface: %1 (%2) - - - - - Dynamic address - - - - - Unnumbered interface - - - - - - - Illegal address '%1/%2' - - - - - newHostDialog_q - - - TextLabel - - - - - Enter the name of the new object below: - - - - - Use preconfigured template host objects - - - - - Template file: - - - - - Browse - - - - - Use standard template library - - - - - Next step is to add interfaces to the new host. There are two ways to do it: using SNMP query or manually. Adding them using SNMP query is fast and automatic, but is only possible if the host runs SNMP agent and you know SNMP community string 'read'. - - - - - Configure interfaces manually - - - - - Use SNMP to discover interfaces of the host - - - - - Discover Interfaces using SNMP - - - - - SNMP 'read' community string: - - - - - Here you can add or edit interfaces manually. 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. - - - - - Check option 'Unnumbered interface' for the interface that does not have an IP address. Examples of interfaces of this kind are those used to terminate PPPoE or VPN tunnels. - - - - - Check option 'dynamic address' for the interface that gets its IP address dynamically via DHCP or PPP protocol. - - - - - Click 'Next' when done. - - - - - Tab 2 - - - - - Choose template object in the list and click 'Finish' when ready. Template objects use generic interface names that will be iherited by the firewall object you create. You may need to rename them later to reflect real names of interfaces on your firewall machine. - - - - - < &Back - - - - - &Next > - - - - - &Finish - - - - - &Cancel - - - - - openaisOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - - - - - openaisOptionsDialog_q - - - openais protocol settings - - - - - &OK - - - - - &Cancel - - - - - openais Parameters - - - - - Address: - - - - - Port number (udp): - - - - - openbsdAdvancedDialog_q - - - OpenBSD: advanced settings - - - - - Options - - - - - IPv4 Packet forwarding - - - - - - - - - No change - - - - - - - - - On - - - - - - - - - Off - - - - - IPv6 Packet forwarding - - - - - Enable directed broadcast - - - - - Forward source routed packets - - - - - Generate ICMP redirects - - - - - Path - - - - - pfctl: - - - - - sysctl: - - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - - - - - &OK - - - - - &Cancel - - - - - openbsdIfaceOptsDialog_q - - - OpenBSD: interface settings - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Device Type - - - - - VLAN ID - - - - - Enable STP - - - - - pageSetupDialog_q - - - Page Setup - - - - - start each section on a new page - - - - - print header on every page - - - - - print legend - - - - - print objects used in rules - - - - - Scale tables: - - - - - TextLabel - - - - - &OK - - - - - Alt+O - - - - - &Cancel - - - - - Alt+C - - - - - pfAdvancedDialog - - - - Script Editor - - - - - pfAdvancedDialog_q - - - pf: advanced settings - - - - - Compiler - - - - - Compiler: - - - - - Command line options for the compiler: - - - - - Generated script (.fw file) and configuration (.conf) file can be copied to the firewall machine under different names. If these fields are left blank, the file name does not change. - - - - - Script (.fw) file name on the firewall - - - - - .conf file name on the firewall - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Modulate state for all stateful rules (applies only to TCP services) - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in policy - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - - - - - Optimization: - - - - - State policy: - - - - - States can be bound to interfaces or match packets on any interface. The latter can be useful in case of an assymmetric routing. - - - - - Always permit ssh access from -the management workstation -with this address: - - - - - Scrub - - - - - Clears the don't fragment bit from the IP packet header. - - - - - Clear DF bit - - - - - Replaces the IP identification field of outgoing packets with random values to compensate for operating systems that use predictable values. - - - - - Use random ID - - - - - Enforce Minimum TTL: - - - - - Enforces a minimum Time To Live (TTL) in IP packet headers. - - - - - Enforce Maximum MSS: - - - - - Enforces a maximum Maximum Segment Size (MSS) in TCP packet headers. - - - - - Reassemble fragments - - - - - Buffer and reassemble fragments (default) - - - - - Drop duplicate fragments, do not buffer and reassemble - - - - - Drop duplicate and subsequent fragments - - - - - Limits - - - - - maximum number of entries in the memory pool used for packet reassembly - - - - - table-entries - - - - - maximum number of addresses that canbe stored in tables - - - - - maximum number of entries in the memory pool used for state table entries - - - - - state table size: - - - - - reassembly pool: - - - - - maximum number of entries in the memory pool used for tracking source IP addresses - - - - - maximum number of tables that can exist in the memory simultaneously - - - - - tables - - - - - src-nodes - - - - - Timeouts - - - - - When a packet matches a stateful connection, the seconds to live for the connection will be updated to the value which corresponds to the connection state. - - - - - TCP - - - - - - - - first - - - - - - - - - - The state after the first packet. - - - - - opening - - - - - The state before the destination host ever sends a packet. - - - - - established - - - - - The fully established state. - - - - - The state after the first FIN has been sent. - - - - - closing - - - - - The state after both FINs have been exchanged and the connection is closed. - - - - - finwait - - - - - The state after one endpoint sends an RST. - - - - - closed - - - - - UDP - - - - - - single - - - - - The state if the source host sends more than one packet but the destination host has never sent one back. - - - - - - multiple - - - - - The state if both hosts have sent packets. - - - - - ICMP - - - - - The state after an ICMP error came back in response to an ICMP packet. - - - - - error - - - - - Other Protocols - - - - - Fragments - - - - - reassembly timeout - - - - - state expiration timeout - - - - - seconds between purges of expired states and packet fragments. - - - - - seconds before an unassembled fragment is expired. - - - - - Adaptive scaling - - - - - (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Output file name: - - - - - Buffers incoming packet fragments and reassembles them into a complete packet before passing them to the filter engine. In PF 4.5 and earlier. - - - - - Causes duplicate fragments to be dropped and any overlaps to be cropped. In PF 4.5 and earlier. - - - - - Similar to 'Drop duplicate fragments' except that all duplicate or overlapping fragments will be dropped as well as any further corresponding fragments. In PF 4.5 and earlier. - - - - - Statefully normalises TCP connections. - - - - - Reassemble TCP - - - - - Timeout values can be reduced adaptively as the number of state table entries grows (see man page pf.conf(5) for details) - - - - - adaptive start - - - - - When the number of state entries exceeds this value, adaptive scaling begins. - - - - - adaptive end - - - - - When reaching this number of state entries, all timeout val- ues become zero, effectively purging all state entries imme- diately. - - - - - Activate adaptive timeout scaling - - - - - Installer - - - - - Built-in installer - - - - - Directory on the firewall where script should be installed - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - External install script - - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Insert prolog and epilog scripts - - - - - in the activation shell script (.fw file) - - - - - in the pf rule file (.conf file) - - - - - Logging - - - - - Log Prefix - - - - - Fallback "deny all" rule should log blocked packets - - - - - Script - - - - - These options enable auxiliary sections in the generated shell script. - - - - - Turn debugging on in generated script - - - - - Configure Interfaces of the firewall machine - - - - - Configure CARP Interfaces - - - - - Configure pfsync Interfaces - - - - - Configure VLAN Interfaces - - - - - Add virtual addresses for NAT - - - - - Flush pf states after reloading rules - - - - - IPv6 - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - pfsyncOptionsDialog_q - - - pfsync protocol settings - - - - - &OK - - - - - &Cancel - - - - - pfsync Parameters - - - - - By default pfsync updates are multicast on the local network. This option overrides that behavior and instead unicasts the update to the specified peer. - - - - - Use unicast address to communicate with the peer - - - - - pixAdvancedDialog - - - - Script Editor - - - - - pixAdvancedDialog_q - - - PIX Firewall Settings - - - - - OK - - - - - Cancel - - - - - Compiler - - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Policy Compiler Options - - - - - Generate rules assuming the firewall is part of "Any". This makes a difference in rules that use services 'ssh' and 'telnet' since PIX uses special commands to control ssh and telnet access to the firewall machine - - - - - Assume firewall is part of 'any' - - - - - PIX inspects packets with ACLs before it does NAT, while many other firewalls do NAT first and then apply ACLs. Policy compiler can emulate the latter behaviour if this options is turned on. - - - - - Replace NAT'ted objects with their translations in policy rules - - - - - Normally PIX does not support ouotbound ACL, however policy compiler can emulate them if this option is turned on - - - - - Emulate outbound ACLs - - - - - Generate outbound ACLs - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - - - - - In nat rules where network zone object is used in OSrc, ODst and OSrv are 'any' and TSrc defines a global pool for the translation, replace object in OSrc with 'any' to produce PIX command "nat (interface) N 0.0.0.0 0.0.0.0" - - - - - Optimize 'default nat' rules - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in the policy - - - - - Verification of NAT rules - - - - - Check for duplicate nat rules - - - - - Check for overlapping global pools - - - - - Check for overlapping statics - - - - - Check for overlapping global pools and statics - - - - - Always permit ssh access from the management workstation with this address: - - - - - Installer - - - - - Built-in installer - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - Instead of running generated configuration on the firewall line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the firewall for this to work. This method works for PIX v7 or later and is much faster than running configuration line by line. - - - - - Copy generated configuration file to the firewall using scp - - - - - File system on the firewall where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "flash:": - - - - - External install script - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Timeouts - - - - - xlate - - - - - conn - - - - - udp - - - - - rpc - - - - - h323 - - - - - - sip - - - - - sip&media - - - - - unauth - - - - - telnet - - - - - ssh - - - - - ss - - - - - mm - - - - - hh - - - - - half-closed - - - - - Inactivity - - - - - Absolute - - - - - Set all to defaults.. - - - - - Inspect - - - - - Policy compiler generates 'fixup' commands for PIX v6.1-6.3 and FWSM v2.3. For PIX 7.0 it generates 'class-map' and 'inspect' commands assigned to the 'policy-map' under either default or custom inspection classes. - - - - - ctiqbe - - - - - - - - - - - - - - - - - - - - - - - skip - - - - - - - - - - - - - - - - - - - - - - - enable - - - - - - - - - - - - - - - - - - - - - - - disable - - - - - Computer Telephony Interface Quick Buffer Encoding (CTIQBE) protocol inspection module that supports NAT, PAT, and bi-directional NAT. - - - - - - - - - - - - - - - - - - - port: - - - - - dns - - - - - Based on this maximum-length configured by the user, the DNS fixup checks to see if the DNS packet length is within this limit. Every UDP DNS packet (request/response) undergoes the above check. - - - - - max length: - - - - - esp ike - - - - - Enables PAT for Encapsulating Security Payload (ESP), single tunnel. - - - - - ftp - - - - - strict: - - - - - Activated support for FTP protocol and allows to change the ftp control connection port number. - - - - - h323 h225 - - - - - Specifies to use H.225, the ITU standard that governs H.225.0 session establishment and packetization, with H.323 - - - - - - - - - - - - -- - - - - - h323 ras - - - - - Specifies to use RAS with H.323 to enable dissimilar communication devices to communicate with each other. - - - - - http - - - - - The default port for HTTP is 80. Use the port option to change the HTTP port, or specify a range of HTTP ports. - - - - - icmp error - - - - - Enables NAT of ICMP error messages. This creates translations for intermediate hops based on the static or network address translation configuration on the firewall. - - - - - ils - - - - - Provides NAT support for Microsoft NetMeeting, SiteServer, and Active Directory products that use LightWeight Directory Access Protocol (LDAP) to exchange directory information with an for Internet Locator Service (ILS) server. - - - - - mgcp - - - - - Enables the Media Gateway Control Protocol (MGCP) fixup. - - - - - Gateway Port: - - - - - Call Agent port: - - - - - pptp - - - - - Enables Point-to-Point Tunneling Protocol (PPTP) application inspection. - - - - - rsh - - - - - Enables inspection of RSH protocol. - - - - - rtsp - - - - - Lets PIX Firewall pass Real Time Streaming Protocol (RTSP) packets. RTSP is used by RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, and Cisco IP/TV connections. - - - - - Enable or change the port assignment for the Session Initiation Protocol (SIP) for Voice over IP TCP connections. - - - - - sip udp - - - - - Enable SIP-over-UDP application inspection. - - - - - skinny - - - - - Enable SCCP application inspection. SCCP protocol supports IP telephony and can coexist in an H.323 environment. An application layer ensures that all SCCP signaling and media packets can traverse the PIX Firewall and interoperate with H.323 terminals. - - - - - smtp - - - - - Enables the Mail Guard feature, which only lets mail servers receive the RFC 821, section 4.5.1, commands of HELO, MAIL, RCPT, DATA, RSET, NOOP, and QUIT. All other commands are translated into X's which are rejected by the internal server. - - - - - sqlnet - - - - - Enables support for SQL*Net protocol. - - - - - tftp - - - - - Enable TFTP application inspection. - - - - - Enable all protocols - - - - - Disable all protocols - - - - - Skip all protocols - - - - - Logging - - - - - Syslog message queue size (messages): - - - - - syslog facility: - - - - - syslog level ('logging trap'): - - - - - PIX Firewall Version 6.3 introduces support for EMBLEM format, which is required when using the CiscoWorks Resource Manager Essentials (RME) syslog analyzer. - - - - - Use 'EMBLEM' format for syslog messages - - - - - Set device id for syslog messages (v6.3 and later): - - - - - use hostname - - - - - use address of interface - - - - - use text string - - - - - The logging timestamp command requires that the clock command be set. - - - - - Enable logging timestamps on syslog file - - - - - Other logging destinations and levels: - - - - - Internal buffer - - - - - Console - - - - - Script - - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via IPSEC tunnel. This is the way access lists were generated in older versions of Firewall Builder for PIX. - - - - - Do not clear access lists and object group, just generate PIX commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - - - - - Normally PIX does not support outbound ACL, however policy compiler can emulate them if this option is turned on - - - - - Policy install script (built-in installer will be used if blank): - - - - - Syslog host (IP address): - - - - - Script (additional) - - - - - Compiler can generate PIX configuration without commands that configures interfaces, timeouts and inspectors. These parts of configuration change rarely so it makes no sense to execute the same commands again and again. In addition, runnig the same commands on configuration reload cause errors. Use this option to generate shortened configuration to avoid errors and make update faster. - - - - - Generate only access-list, access-group, telnet, ssh, nat, global and static commands - - - - - Insert comments into generated PIX configuration file - - - - - Comment the code - - - - - Use ACL remarks to relate ACL commands and policy rules in the GUI - - - - - Use ACL remarks - - - - - Group PIX commands in the script so that similar commands appear next to each other, just like PIX does it when you use 'show config' - - - - - Group similar commands together - - - - - Use manual ACL commit on FWSM - - - - - PIX Options - - - - - Actively reset inbound TCP connections with RST - - - - - Actively reset inbound TCP connections with RST on outside interface - - - - - Force each TCP connection to linger in a shortened TIME&WAIT - - - - - Alt+W - - - - - Enable the IP Frag Guard feature (deprecated in v6.3 and later). - - - - - Enable TCP resource control for AAA Authentication Proxy - - - - - Specify that when an incoming packet does a route lookup, -the incoming interface is used to determine which interface -the packet should go to, and which is the next hop -(deprecated in v6.3 and later). - - - - - Disable inbound embedded DNS A record fixups - - - - - Disable outbound DNS A record replies - - - - - The following parameters are used for all NAT rules: - - - - - maximum number of simultaneous TCP and UDP connections - - - - - Specifies the maximum number of simultaneous TCP and UDP connections for the entire subnet. The default is 0, which means unlimited connections. (Idle connections are closed after the idle timeout specified by the timeout conn command.) - - - - - maximum number of embryonic connections per host - - - - - Specifies the maximum number of embryonic connections per host. An embryonic connection is a connection request that has not finished the necessary handshake between source and destination. Set a small value for slower systems, and a higher value for faster systems. The default is 0, which means unlimited embryonic connections. - - - - - (The default for both parameters is 0, which means unlimited number of connections.) - - - - - IPv6 - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - pixFailoverOptionsDialog - - - Input not valid: %1 - - - - - pixFailoverOptionsDialog_q - - - PIX failover protocol settings - - - - - &OK - - - - - &Cancel - - - - - PIX Failover Protocol Parameters - - - - - PIX Failover Key - - - - - Key: - - - - - pixosAdvancedDialog_q - - - PIX Advanced Configuration Options - - - - - General - - - - - Set PIX host name using object's name - - - - - Generate commands to configure addresses for interfaces - - - - - NTP - - - - - NTP Servers: - - - - - Server 1: - - - - - Server 2: - - - - - Server 3: - - - - - Preffered: - - - - - - IP address: - - - - - SNMP - - - - - Disable SNMP Agent - - - - - Set SNMP communities using data from the firewall object dialog - - - - - SNMP servers - - - - - - Poll - - - - - - Poll and Traps - - - - - - Traps - - - - - Enable: - - - - - SNMP Server 1: - - - - - SNMP Server 2: - - - - - Enable sending log messages as SNMP trap notifications - - - - - Options - - - - - Change TCP MSS to - - - - - bytes - - - - - OK - - - - - Cancel - - - - - pixosIfaceOptsDialog - - - Input not valid: %1 - - - - - pixosIfaceOptsDialog_q - - - PIX: interface settings - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Device Type - - - - - VLAN ID - - - - - prefsDialog_q - - - Preferences - - - - - General - - - - - Working directory: - - - - - - - Browse... - - - - - Software Updates: - - - - - Check Now - - - - - Check for updates automatically - - - - - Use http proxy while checking for updates (host:port) - - - - - No identifiable information will be sent to the server during update check - - - - - Do not show tips on startup - - - - - Objects - - - - - Tooltip delay: - - - - - Show deleted objects - - - - - Show object attributes in the tree - - - - - Clip comments in rules - - - - - DNS Name - - - - - - Create new objects in "Compile Time" mode by default - - - - - - Create new objects in "Run Time" mode by default - - - - - Use object name for the DNS record in all objects of this type - - - - - Address Table - - - - - Data File - - - - - Periodically save data to file every - - - - - minutes - - - - - Do not ask for the log record when checking in new file revision. - - - - - Enable compression of the data file - - - - - Installer - - - - - A full path to the Secure Shell utility (remote command execution; for example ssh on Unix or plink.exe on Windows): - - - - - A full path to the SCP utility (file copy over ssh; for example scp on Unix or pscp.exe on Windows): - - - - - Built-in policy installer can remember passwords for the duration of the session. Passwords are never stored permanently, they are only kept in memory. In order to use this feature, you also need to configure user name used to authenticate to the firewall in the "advanced" settings dialog of the firewall object. - - - - - Warning: using this feature creates certain risk if working Firewall Builder GUI is left unattended on the unlocked workstation. Someone may walk up to the machine and make changes to the firewall using cached password of the administrator who used the same GUI session before. Always lock the screen or exit Firewall Builder GUI when leaving computer. - - - - - Enable password caching for the duration of the session (passwords -are never stored permanently) - - - - - Enable password caching - - - - - Download plink.exe and pscp.exe from the web site at - - - - - Enable object tooltips in the tree and rule sets - - - - - Properties of specific object types: - - - - - Value for the ServerAliveInterval ssh configuration parameter. This parameter sets timeout interval in seconds after which if no data has been received from the server, ssh client will send a message through the encrypted channel to request a response from the server. This helps detect disconnects between fwbuilder policy installer and the firewall. If set to 0, these messages will not be sent to the server and loss of connectivity with the firewall will lead to hanging of the installer session. Scp uses different parameter for this, ConnectTimeout. Fwbuilder automatically calculates the value for this parameter using the same timeout value. Note that this only works with ssh protocol v2. - - - - - sec - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><a href="http://www.chiark.greenend.org.uk/~sgtatham/putty/"><span style=" font-family:'Lucida Grande'; font-size:8pt; text-decoration: underline; color:#0000ff;">http://www.chiark.greenend.org.uk/~sgtatham/putty/</span></a></p></body></html> - - - - - Labels - - - - - Use these labels to mark rules in the firewall policy - - - - - Red - - - - - Blue - - - - - Yellow - - - - - Orange - - - - - Purple - - - - - Green - - - - - Gray - - - - - Appearance - - - - - Icons settings - - - - - Choose font for rules sets - - - - - Rules font - - - - - rules font description - - - - - - Choose font for tree - - - - - Tree font - - - - - tree font description - - - - - Compiler Output Panel font - - - - - compiler output font description - - - - - Show icons in rules - - - - - Show text descriptions in columns "Direction", "Action" - - - - - Icons size in rules: - - - - - 16x16 - - - - - 25x25 - - - - - Show text under toolbar icons - - - - - Platforms and OS - - - - - If you disable firewall platform or host OS here, it will not appear in the drop-down lists of platforms and host OS anywhere in the program. This helps avoid clutter in lists of platforms and OS if you only work with one or two of them. - - - - - Supported firewall platforms - - - - - Supported host OS - - - - - Platform - - - - - Host OS - - - - - &OK - - - - - &Cancel - - - - - printingProgressDialog_q - - - Printing - - - - - Cancel - - - - - textLabel1 - - - - - procurveaclAdvancedDialog - - - - Script Editor - - - - - procurveaclAdvancedDialog_q - - - HP ProCurve ACL Firewall Settings - - - - - Compiler Options - - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Compiler creates multiple access lists from the same policy, -two for each interface: one for inbound and another for -outbound. If the policy is written in a such way that no rule -can possibly be associated with an interface, this interface -gets no access list at all. Also, interfaces marked as -"unprotected" never get access list regardless of how the policy -rules are designed. - - - - - - Generate separate access list for each interface - - - - - Compiler creates one access list and assigns it to all -interfaces. - - - - - - Create one access list and attach it to all interfaces - - - - - Policy Compiler Options - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in the policy - - - - - Always permit ssh access from the management workstation with this address: - - - - - Script Options - - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via tunnel. - - - - - Do not clear access lists, just generate commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - - - - - - Insert comments into generated IOSACL configuration file - - - - - Comment the code - - - - - Use ACL remarks - - - - - Installer - - - - - Built-in installer - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - Instead of running generated configuration on the router line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the router for this to work. This method is much faster than running configuration line by line. - - - - - Copy generated configuration file to the router using scp - - - - - File system on the router where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "nvram:": - - - - - External install script - - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Logging - - - - - Generate logging commands - - - - - Syslog - - - - - Syslog host (name or IP address): - - - - - syslog facility: - - - - - syslog level ('logging trap'): - - - - - The logging timestamp command requires that the clock command be set. - - - - - Enable logging timestamps on syslog file - - - - - Other logging destinations and levels: - - - - - Internal buffer - - - - - Console - - - - - IPv6 - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - OK - - - - - Cancel - - - - - secuwallAdvancedDialog - - - - Script Editor - - - - - secuwallAdvancedDialog_q - - - iptables: advanced settings - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - Compiler - - - - - Compiler: - - - - - Command line options for the compiler: - - - - - Assume firewall is part of 'any' - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Accept ESTABLISHED and RELATED packets before the first rule - - - - - Drop packets that are associated with -no known connection - - - - - and log them - - - - - Bridging firewall - - - - - Detect shadowing in policy rules - - - - - Ignore empty groups in rules - - - - - Enable support for NAT of locally originated connections - - - - - This adds a rule on top of the policy with iptables target TCPMSS -and option --clamp-mss-to-pmtu. Generation of this command is -version-dependent and also depends on the setting of ip or ipv6 forwarding -in host settings dialog. - - - - - - Clamp MSS to MTU - - - - - Make Tag and Classify actions terminating - - - - - Default action on 'Reject': - - - - - Always permit ssh access from the management workstation with this address: - - - - - Install the rule for ssh access from the management workstation when the firewall -is stopped - - - - - Installer - - - - - Built-in installer - - - - - Additional command line parameters for ssh - - - - - Additional command line parameters for scp - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - External install script - - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Insert prolog script - - - - - on top of the script - - - - - after interface configuration - - - - - after policy reset - - - - - Logging - - - - - use ULOG - - - - - use LOG - - - - - log TCP seq. numbers - - - - - log IP options - - - - - use numeric syslog levels - - - - - Log level: - - - - - log TCP options - - - - - cprange - - - - - queue threshold: - - - - - netlink group: - - - - - Log prefix: - - - - - Logging limit: - - - - - Activate logging in all rules -(overrides rule options, use for debugging) - - - - - Script - - - - - Allow reboot to load modules (only if needed) - - - - - Turn debugging on in generated script - - - - - Managing interfaces and addresses - - - - - Verify interfaces before loading firewall policy - - - - - Configure Interfaces of the running firewall machine - - - - - Add virtual addresses for NAT - - - - - Generated script can load rules one by one by calling iptables command line utility, or activate them all at once using iptables-restore. In both cases you just run the script with command line parameter "start" to activate the policy, the script will use iptables-restore automatically if this checkbox is on. - - - - - iptables-restore replaces firewall policy in one atomic transaction - - - - - Use iptables-restore to activate policy - - - - - Warning: rebooting breaks the connectivity until the firewall is up again. The outage can be up to minutes, depending on how fast the machine restarts. - - - - - If debugging is turned on, the script will run with shell option "-x" that makes it print every command it executes. Warning: this produces a lot of debugging output. - - - - - Warning: this breaks the connectivity until all interfaces are 'up' again. The outage is typically < 10 seconds - - - - - secuwallIfaceOptsDialog_q - - - secunet wall: interface settings - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - - Options - - - - - Specify secunet wall advanced interface options below - - - - - MTU - - - - - Device Type - - - - - VLAN ID - - - - - Disable at boot - - - - - Disable ARP on this interface - - - - - secuwallosAdvancedDialog - - - Select templates directory - - - - - URL is not valid: %1 - - - - - Could not open URL: %1 - - - - - Empty address found (position %1) - - - - - Illegal address '%1' (position %2) - - - - - Input not valid: %1 - - - - - secuwallosAdvancedDialog_q - - - secunet wall: advanced settings - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - Management - - - - - secunet wall Management settings - - - - - Specify secunet wall Management settings below. -Please use commas to separate a list of IP addresses. - - - - - Management access - - - - - Enter the IP addresses or networks of the secunet wall management zone - - - - - Syslog servers - - - - - Enter IP addresses of logging servers - - - - - SNMP access - - - - - Enter IP addresses or networks where SNMP requests to this firewall come from - - - - - RO-SNMP string - - - - - Enter community string for read only SNMP access - - - - - NTP servers - - - - - Enter IP addresses of NTP servers - - - - - Nagios access - - - - - Enter IP addresses or networks for Nagios access - - - - - Local /var partition - - - - - Enter name for partition that will be mounted to /var - - - - - Local config partition - - - - - Enter name for local config partition - - - - - Disable auto-generation of firewall rules for management services - - - - - Don't create firewall rules - - - - - DNS Client - - - - - secunet wall DNS settings - - - - - Specify secunet wall DNS client related settings below - - - - - DNS servers - - - - - Search domains - - - - - Enter DNS search domains here. One search domain per line - - - - - Hosts file - - - - - Enter Hosts entries here. One IP-Address/Name pair per line. These entries will be written to /etc/hosts file on the firewall - - - - - The resolution order defines how hostnames will be resolved on the firewall (nsswitch.conf). Default is "Hosts file first" - - - - - Resolution order - - - - - - - - - Hosts - - - - - - - - - DNS - - - - - - - - - NIS - - - - - - - - - NIS+ - - - - - - - - - DB - - - - - Options - - - - - Specify secunet wall advanced iptables/routing options below - - - - - IPv4 Packet forwarding - - - - - - - - - - - - - - - - - - - - No change - - - - - - - - - - - - - - - - - - - - On - - - - - - - - - - - - - - - - - - - - Off - - - - - IPv6 Packet forwarding - - - - - Kernel anti-spoofing protection - - - - - Ignore broadcast pings - - - - - Ignore all pings - - - - - Accept source route - - - - - Accept ICMP redirects - - - - - Ignore bogus ICMP errors - - - - - Allow dynamic addresses - - - - - Log martians - - - - - whats this text - whats this comment - - - - - TCP - - - - - These parameters make sense for connections to or from the firewall host - - - - - TCP FIN timeout (sec) - - - - - TCP keepalive time (sec) - - - - - TCP window scaling - - - - - TCP sack - - - - - TCP fack - - - - - TCP ECN - - - - - TCP SYN cookies - - - - - TCP timestamps - - - - - Files - - - - - Enable support for additional files here. Files in the selected templates directory will be added to the configuration of this Firewall. - - - - - Add additional files to firewall configuration - - - - - Template directory - - - - - Select templates directory for this Firewall - - - - - Browse - - - - - Open current path in file browser - - - - - Open - - - - - solarisAdvancedDialog_q - - - Solaris: advanced settings - - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Ignore ICMP redirects - - - - - - - - - No change - - - - - - - - - On - - - - - - - - - Off - - - - - Forward directed broadcasts - - - - - Respond to echo broadcast - - - - - Packet forwarding - - - - - Forward source routed packets - - - - - Path - - - - - ipf: - - - - - ipnat: - - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - - - - - transferDialog - - - Transfer error: %1 - - - - - - &Continue - - - - - No firewalls selected for transfer - - - - - Waiting - - - - - Error: Failed to start program - - - - - Error: Waiting for program termination - - - - - Error: Program returned failure status - - - - - transferDialog_q - - - Config transfer options - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p align="center" style=" margin-top:12px; margin-bottom:12px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-size:x-large; font-weight:600;">Export firewall configs to transfer device</span></p></body></html> - - - - - Select usbstick volume to start firewall config transfer: - - - - - Select a portable disk volume to transfer firewall configs - - - - - Device - - - - - Size - - - - - Mounted - - - - - Mountpoint - - - - - Filesystem - - - - - Double click on a firewall in this tree to jump to the corresponding process log entry - - - - - Firewall - - - - - Progress - - - - - Process log - - - - - Save log to file - - - - - Start the export! - - - - - Transfer - - - - - Close - - - - - vlanOnlyIfaceOptsDialog - - - Input not valid: %1 - - - - - vlanOnlyIfaceOptsDialog_q - - - Vlan interface settings - - - - - Help - - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Device Type - - - - - VLAN ID - - - - - vrrpOptionsDialog - - - Input not valid: %1 - - - - - vrrpOptionsDialog_q - - - secunet wall: interface settings - - - - - &OK - - - - - &Cancel - - - - - VRRP Parameters - - - - - Use IPsec AH protected VRRP - - - - - VRRP Secret - - - - - Virtual Router ID - - - - - VRID - - - - diff --git a/src/gui/fwbuilder_ja.ts b/src/gui/fwbuilder_ja.ts deleted file mode 100644 index 41be69bf2..000000000 --- a/src/gui/fwbuilder_ja.ts +++ /dev/null @@ -1,30130 +0,0 @@ - - - - - AboutDialog_q - - - - Firewall Builder - ファイアウォールビルダー - - - - Revision: - リビジョン: - - - - Using libfwbuilder API v - 使用中の libfwbuilder API バージョン - - - Copyright 2002-2008 NetCitadel, LLC - Copyright 2002-2008 NetCitadel, LLC - - - - &OK - &OK - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:13pt; font-weight:400; font-style:normal;"> -<p align="center" style=" margin-top:12px; margin-bottom:12px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><a href="http://www.fwbuilder.org"><span style=" text-decoration: underline; color:#0000ff;">http://www.fwbuilder.org</span></a></p></body></html> - - - - - Copyright 2002-2010 NetCitadel, LLC - Copyright 2002-2009 NetCitadel, LLC - Copyright 2002-2006 NetCitadel, LLC {2002-2009 ?} - - - - ActionsDialog - - - - &Continue - 続ける(&C) - - - - Rule name for accounting is converted to the iptables -chain name and therefore may not contain white space -and special characters. - - - - - Emulation of terminating behavior for MARK and CLASSIFY targets is currently ON, rule will be terminating - - - - - Emulation of terminating behavior for MARK and CLASSIFY targets is currently OFF, rule will not be terminating - - - - - 'Change inbound interface', 'Continue packet inspection' and 'Make a copy' options are mutually exclusive - - - - - ActionsDialog_q - - - Actions Dialog - 操作ダイアログ - - - - - Tag service object: - - - - - If rule action is 'Reject', this option defines firewall's reaction to the packet matching the rule - - - - - This action has no parameters. - この操作はパラメーターがありません。. - - - - Requires CONNMARK target - - - - - Note: this action translates into MARK target for iptables. -Normally this target is non-terminating, that is, other rules -with Classify or Tag actions below this one will process -the same packet. However, Firewall Builder can emulate -terminating behavior for this action. Option in the "compiler" -tab of the firewall object properties dialog activates emulation. - - - - - Emulation of terminating behavior for MARK target is currently ON, the rule will be terminating - - - - - Rule name for accounting. (white spaces and special characters are not allowed) - - - - - Packet classification can be implemented in different ways: - - - - - use dummynet(4) 'pipe' - - - - - use dummynet(4) 'queue' - - - - - Pipe or queue number: - パイプもしくはキュー番号: - - - - Custom string: - カスタム文字列: - - - - Classify string: - 分類文字列: - - - - Emulation is currently ON, rule will be terminating - - - - - Divert socket port number: - プロトコル番号: - - - - Policy ruleset object: - - - - - In addition to 'filter', create branching rule in 'mangle' table as well - - - - - Policy rule set object: - - - - - - Route through - - - - - - Route reply through - - - - - - Route a copy through - - - - - - interface - インターフェース - - - - - next hop - 次のホップ - - - - Fastroute - - - - - Load Balancing: - ロードバランシング: - - - - - None - なし - - - - Tag connections created by packets that match this rule - - - - - Note: CLASSIFY target in iptables is non-terminating, -this means other rules with Classify or Branch -target below this one will process the same packet. -However, Firewall Builder can emulate terminating -behavior for this action. Emulation is activated -by an option in the "compiler" tab of the firewall -object properties dialog. - - - - - Bitmask - ビットマスク - - - - Random - ランダム - - - - Source Hash - ソースハッシュ - - - - Round Robin - ラウンドロビン - - - - Change inbound interface to - インターフェンス管理 - - - - Route through gateway - - - - - Change outbound interface to - インターフェンス管理 - - - - Continue packet inspection - パケット監査を続ける - - - - Make a copy - コピーを作る - - - - NAT Rule set object: - - - - - AddressRangeDialog - - - - Illegal IP address '%1' - 不当な IP アドレス '%1' - - - - - &Continue - 続ける(&C) - - - - AddressRangeDialog_q - - - Address Range - アドレスの範囲 - - - - Name: - 名前: - - - - Range Start: - 範囲の開始: - - - - Range End: - 範囲の終了: - - - - Comment: - コメント: - - - - AddressTableDialog_q - - - Address Table - アドレステーブル - - - - Name: - 名前: - - - - Compile Time - コンパイル時間 - - - - Run Time - ランタイム - - - - File name: - ファイル名: - - - - - Browse - 参照 - - - - Preview - プレビュー - - - - Comment: - コメント: - - - - ClusterDialog - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - はい(&Y) - - - - &No - いいえ(&N) - - - - ClusterDialog_q - - - Cluster - - - - - Name: - 名前: - - - - Platform: - プラットフォーム: - - - - Host OS: - ホスト OS: - - - - Modified: - - - - - - - TextLabel - テキストラベル - - - - Compiled: - - - - - Installed: - - - - - Comment: - コメント: - - - - Skip this firewall for batch compile and install operations - - - - - Inactive cluster - - - - - ClusterGroupDialog - - - Master - - - - - Firewall %1 can be used as a member of this cluster - - - - - Invalid - - - - - Firewall %1 can not be used as a member of this cluster - because its host OS or platform does not match those of the cluster. - - - - - FWBuilder API error: %1 - FWBuilder API エラー: %1 - - - - &Continue - 続ける(&C) - - - - ClusterGroupDialog_q - - - ClusterGroup - - - - - Name: - 名前: - - - - Type: - - - - - Edit protocol parameters - - - - - List of current members of this cluster. -Double click on an entry to load it. - - - - - Firewall - ファイアウォール - - - - Interface - インターフェース - - - - Master - - - - - Status - - - - - Click here to manage member firewalls of this cluster group. - - - - - Manage Members - - - - - Comment: - コメント: - - - - ClusterInterfaceWidget - - - Some of the cluster interfaces do not have any member firewall interface selected - - - - - Please select interface of the member firewall rather than the firewall object to be used with cluster interface - - - - - %1 can not be used as cluster interface. - - - - - Form - フォーム - - - - Name: - 名前: - - - - Label: - ラベル: - - - - Comment: - コメント: - - - - Select firewall interfaces to use with cluster interface and choose its name. - Select firewall interfaces to use with the cluster interface. - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">Configuration of cluster interfaces depends on the failover protocol chosen on the next page. If the protocol creates its own new interface, such as <span style=" font-weight:600;">CARP</span> that creates interface <span style=" font-weight:600; font-style:italic;">carp0</span>, then the cluster interface object represents it and should have name <span style=" font-weight:600; font-style:italic;">carp0</span>. If failover protocol does not create new interfaces, such as <span style=" font-weight:600;">heartbeat</span> or <span style=" font-weight:600;">OpenAIS</span>, then cluster interface should have the same name as corresponding member firewall interfaces, that is <span style=" font-weight:600; font-style:italic;">eth0</span>, <span style=" font-weight:600; font-style:italic;">eth1.102</span>, <span style=" font-weight:600; font-style:italic;">vlan200</span>, and so on. In the latter case cluster interface is an abstraction used to define mapping between corresponding interfaces of the member firewalls and to provide place for the configuration of the failover protocol.</p></body></html> - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:13pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">Configuration of cluster interfaces depends on the failover protocol chosen on the next page. If the protocol creates its own new interfaces, such as <span style=" font-weight:600;">VRRP</span> or <span style=" font-weight:600;">CARP</span> that create inetrfaces <span style=" font-weight:600; font-style:italic;">vrrp0</span> or <span style=" font-weight:600; font-style:italic;">carp0</span>, then cluster interface objects represent these and should have the name <span style=" font-weight:600; font-style:italic;">vrrp0</span> or <span style=" font-weight:600; font-style:italic;">carp0</span>. If failover protocol does not create new interfaces, such as <span style=" font-weight:600;">heartbeat</span> or <span style=" font-weight:600;">OpenAIS</span>, then cluster interface should have the same name as member firewall interfaces, that is <span style=" font-weight:600; font-style:italic;">eth0</span>, <span style=" font-weight:600; font-style:italic;">eth1.102</span>, <span style=" font-weight:600; font-style:italic;">vlan200</span>, and so on. In the latter case cluster interface is an abstraction used to define mapping between corresponding interfaces of the member firewalls and to provide place for the configuration of the failover protocol.</p></body></html> - - - - - ClusterInterfacesSelectorWidget - - - Add new interface - - - - - Delete current interface - - - - - New interface - - - - - This cluster has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - No interfaces - - - - - Interface %1 of firewall %2 is used in more than one cluster interface. - - - - - ColorLabelMenuItem - - - no color - 色なし - - - - CommentEditorPanel - - - Warning: loading from file discards current contents of the script. - - - - - Choose file that contains PIX commands - PIX コマンドを含むファイルを選択してください - - - - Could not open file %1 - ファイル %1 を開くことが出来ません - - - - CommentEditorPanel_q - - - Comment Editor Panel - コメントエディターパネル - - - - Import from file ... - ファイルからインポート ... - - - - CompareObjectsDialog - - - Next - 次へ - - - - The following two objects have the same internal ID but different attributes: - - - - - Skip the rest but build report - - - - - CompilerOutputPanel - - - Compiling rule... - - - - - CompilerOutputPanel_q - - - Script Editor - スクリプトエディター - - - - ConfirmDeleteObjectDialog - - NAT - NAT - - - Policy - ポリシー - - - Routing - ルーティング - - - Unknown rule set - 不明なルールセット - - - /Rule%1 - /ルール %1 - - - Type: - 種類: - - - - Not used anywhere - - - - - ConfirmDeleteObjectDialog_q - - - Firewall Builder - ファイアウォールビルダー - - - - Groups and firewall policy rules shown in the list below reference objects you are about to delete. If you delete objects, they will be removed from these groups and rules. - - - - - Deleted objects are moved to the "Deleted objects" library. You can recover them later by moving back to the user's library. However if you delete an object already located in the "Deleted objects" library, it is destroyed and can not be restored. - - - - - Object - オブジェクト - - - - Parent - - - - - Details - 詳細 - - - - Delete - 削除 - - - - Cancel - 取り消し - - - - CustomServiceDialog_q - - - Custom Service - カスタムサービス - - - - Name: - 名前: - - - - Platform: - プラットフォーム: - - - - Code String: - コード文字列: - - - Protocol String: - プロトコル文字列: - - - - Comment: - コメント: - - - - - Custom service object has separate code string for each -supported firewall platform. - - - - - Protocol Name: - - - - - Choose one of the standard protocols from the menu or enter custom -protocol string. Policy compilers can use this information to add correct -protocol-specific parameters to the generated configuration. For example, -iptables compiler is allowed to add "--reject-with tcp-reset" to the target -REJECT only if service object belongs to protocol "tcp". - - - - - - Address Family: - - - - - Like with protocol, setting address family helps -policy compiler generate more accurate configuration -using this custom service object. For example, if -address family is set to ipv6, this custom service -will only be used in ipv6 policies. - - - - - - IPv4 - IPv4 - - - - IPv6 - IPv6 - - - - DNSNameDialog_q - - - DNS Name - DNS 名 - - - - Name: - 名前: - - - - DNS Record: - DNS レコード: - - - - DNS 'A' record name entered in this input field will be converted to -IP address using DNS query during policy compilation if checkbox -"Compile time" is turned on, or during firewall policy activation if -"Run Time" mode is used. This field can be automatically populated -using object name, this is controlled by an option in the global -Preferences dialog, tab "Objects" - - - - - Compile Time - コンパイル時間 - - - - Run Time - ランタイム - - - - Comment: - コメント: - - - - DiscoveryDruid - - - Hosts file parsing ... - hosts ファイルを解析しています ... - - - - DNS zone transfer ... - DNS ゾーン転送 ... - - - - Network discovery using SNMP ... - SNMP を用いたネットワーク検出 ... - - - - Import configuration from file ... - ファイルから構成のインポート ... - - - - - - Discovery error - 検出エラー - - - - Could not open file %1 - ファイル %1 を開くことが出来ません - - - - - Adding objects ... - オブジェクトを追加しています ... - - - - - - - - Cancel - 取り消し - - - - Prepare objects ... - オブジェクトの準備 ... - - - - - Copying results ... - 結果をコピーしています ... - - - - Incomlete network specification. - ネットワークの指定が完了していません。 - - - - Empty community string - コミュニティ文字列が空です - - - - Some discovered interfaces have been rearranged in fwbuilder objects and recreated as subinterfaces to reflect VLANs, bonding and bridging configurations. The algorithm used to guess correct relationship between interfaces and subinterfaces is imperfect because of the limited information provided by SNMP daemon. Pelase review created objects to make sure generated configuration is accurate. - -The program expects MAC addresses of bonding, bridge and vlan interfaces to be the same. It is especially important to review and fix generated objects if you use MAC address spoofing. - - - - - &Continue - 続ける(&C) - - - - DiscoveryDruid_q - - - TextLabel - テキストラベル - - - - Choose discovery method used to collect information about network objects from the list below and click 'Next' to continue. - - - - - Discovery method: - 検出方法: - - - - Read file in hosts format - hosts 形式のファイルを読み込む - - - - Import DNS zone - DNS ゾーンをインポートをする - - - - Perform network discovery using SNMP - SNMP を用いてネットワークの検出を実行する - - - - Import configuration of a firewall or a router - ファイアウォールもしくはルーターの設定のインポート - - - - Enter full path and file name below or click "Browse" to find it: - 下にフルパスとファイル名を入力し、「参照」ボタンをクリックして検索してください: - - - - File in hosts format - hosts 形式のファイル - - - - Browse ... - 参照 ... - - - - All objects created during import will be placed in the library currently opened in the tree. - - - - - Policy import tries to parse given configuration file and preserve its logic as close as possible. However, very often target firewall configuration allows for more commands, options and their combinations than importer can understand. Rules that importer could not parse exactly are colored red in the rule sets it creates. Always inspect firewall policy created by the importer and compare it with the original. Manual changes and corrections may be required. Comments in the rules that could not be parsed show fragments of the original configuration parser did not understand. - - - - - Import from file: - ファイルからインポート: - - - - Browse... - 参照... - - - - Cisco IOS - Cisco IOS - - - - iptables - iptables - - - - Platform: - プラットフォーム: - - - - textLabel1 - テキストラベル 1 - - - - Firewall name: - - - - - This discovery method creates objects for all 'A' records found in DNS domain. You will later have a chance to accept only those objects you wish and ignore others. -Please enter the domain name below: - - - - - Domain name - ドメイン名 - - - - Objects created using this method may have long or short names. long name consists of the host name and full domain name (this is called <i>Fully Qualified Domain Name</i>). Short name consists of only host name. Check in the box below if you wish to use long name, then click next to continue: - - - - - Use long names - 長い名前を使う - - - - DNS zone information has to be transferred from the name server authoritative for the domain. Pick the name server: - - - - - Name server - ネームサーバー - - - - choose name server from the list below - 下の一覧からネームサーバーを選択する - - - - server name or its IP address here if you wish to use different one: - - - - - DNS Query options - DNS 問い合わせオプション - - - - Timeout (sec) - タイムアウト (秒) - - - - Retries - 再実行 - - - - This discovery method scans networks looking for hosts or gateways responding to SNMP queries. It pulls host's ARP table and uses all the entries found in it to create objects. Scan starts from the host called "seed". Enter "seed" host name or address below: - - - - - 'Seed' host - - - - - Enter a valid host name or address. - 正しいホスト名かアドレスを入力してください。 - - - - The scanner process can be confined to a certain network, so it won't discover hosts on adjacent networks. If you leave these fields blank, scanner will visit all networks it can find: - - - - - Confine scan to this network: - - - - - Netmask: - ネットマスク: - - - - Address: - アドレス: - - - - The scanner process can repeat its algorithm recursively using each new host it finds as a new "seed". This allows it to find as many objects on your network as possible. On the other hand, it takes more time and may find some objects you do not really need. You can turn recursive scanning on below: - - - - - Run network scan recursively - ネットワークの再起スキャンを実行する - - - - The scanner process can find nodes beyond the boundaries of your network by following point-to-point links connecting it to the Internet or other parts of WAN. - - - - - Follow point-to-point links - - - - Include virtual addresses - バーチャルアドレスを含む - - - - Analysis of ARP table yields IP addresses for hosts on your network. In order to determine their names, scanner can run reverse name lookup queries using your name servers (DNS): - - - - - Run reverse name lookup DNS queries to determine host names - - - - - Enter parameters for SNMP and DNS reverse lookup queries below. (If unsure, just leave default values): - - - - - SNMP query parameters: - SNMP 問い合わせパラメーター: - - - - SNMP 'read' community string: - SNMP 'read' コミュニティ文字列: - - - - - number of retries: - 再実行の回数: - - - - timeout (sec): - タイムアウト (秒): - - - - public - - - - - DNS parameters: - DNS パラメーター: - - - - timeout (sec) : - タイムアウト (秒) : - - - - Number of threads: - スレッドの数: - - - - Process name - 処理名 - - - - Stop - 停止 - - - - Save scan log to file - スキャンログをファイルに保存する - - - - Process log: - 処理ログ: - - - - These are the networks found by the scanner process. Choose the ones you wish to use from the list below, then click 'Next': - - - - - - - - - Select All - すべて選択する - - - - - - Filter ... - フィルター ... - - - - - - - - Unselect All - すべて選択を解除する - - - - - - Remove Filter - フィルターを削除する - - - - - -> - - - - - - <- - - - - - Choose objects you wish to use, then click 'Next': - - - - - Change type of selected objects: - 選択されたオブジェクトの種類の変更: - - - - Address - アドレス - - - - Host - ホスト - - - - Firewall - ファイアウォール - - - - Object - オブジェクト - - - - Interfaces - インターフェース - - - - Type - 種類 - - - - Here you can change type of the objects to be created for each address discovered by the scanner. By default, an "Address" object is created for the host with just one interface with single IP address and "Host" object is created for the host with multiple interfaces, however you can change their types on this page. - - - - - Select target library - ターゲットライブラリーを選択する - - - - Adding new objects to library ... - ライブラリーに新しいオブジェクトを追加しています ... - - - - < &Back - < 戻る(&B) - - - - &Next > - 次へ(&N) > - - - - &Finish - 終了(&F) - - - - &Cancel - 取り消し(&C) - - - - The scanner process normally ignores interfaces that have no IP addresses; checking this option makes it create such interfaces as "Unnumbered" - - - - - Include interfaces with no ip addresses - - - - - FWBAboutDialog - - Revision: %1 ( Build: %2 ) - リビジョン: %1 ( ビルド: %2 ) - - - - Using Firewall Builder API %1 - 使用中のファイアウォールビルダー API %1 - - - - Build: %1 - - - - - FWBMainWindow_q - - - Firewall Builder - ファイアウォールビルダー - - - - &Edit - 編集(&E) - - - - Object - オブジェクト - - - - Tools - ツール - - - - &Help - ヘルプ(&H) - - - - Tutorial - - - - - - Rules - ルール - - - - &File - ファイル(&F) - - - - Window - ウィンドウ - - - - &New Object File - 新規オブジェクトファイル(&N) - - - - - New Object File - 新規オブジェクトファイル - - - - &Open... - 開く(&O)... - - - - - - Open - 開く - - - - Ctrl+O - Ctrl+O - - - - &Save - 保存(&S) - - - - - - Save - 保存 - - - - Ctrl+S - Ctrl+S - - - - Save &As... - 名前を付けて保存(&A)... - - - - Save As - 名前を付けて保存 - - - - &Print... - 印刷(&P)... - - - - Print - 印刷 - - - - Ctrl+P - Ctrl+P - - - - E&xit - 終了(&X) - - - - Exit - 終了 - - - - Summary of features - - - - - Getting started - - - - - Inspect - 監査 - - - &Undo - 取り消し(&U) - - - Undo - 取り消し - - - Ctrl+Z - Ctrl+Z - - - &Redo - やり直し(&R) - - - Redo - やり直し - - - Ctrl+Y - Ctrl+Y - - - - &Cut - 切り取り(&C) - - - - Cut - 切り取り - - - - Ctrl+X - Ctrl+X - - - - C&opy - コピー(&O) - - - - Copy - コピー - - - - Ctrl+C - Ctrl+C - - - - &Paste - 貼り付け(&P) - - - - Paste - 貼り付け - - - - Ctrl+V - Ctrl+V - - - - - Ctrl+F - Ctrl+F - - - - &Contents... - 内容(&C)... - - - - Contents - 内容 - - - - &Index... - インデックス(&I)... - - - - Index - インデックス - - - - &About - ファイアウォールビルダーについて(&A) - - - - About - ファイアウォールビルダーについて - - - - - New - 新規 - - - - &Close - 閉じる(&C) - - - - Close - 閉じる - - - - - Compile - コンパイル - - - Compile rules - コンパイルルール - - - - - Install - インストール - - - Install firewall policy - ファイアウォールポリシーのインストール - - - - - Back - 戻る - - - - - Move back to the previous object - 前のオブジェクトに戻る - - - - &New Object - 新規オブジェクト(&N) - - - - New Object - 新規オブジェクト - - - - Create New Object - 新規オブジェクト作成 - - - - Ctrl+N - Ctrl+N - - - - &Find Object - オブジェクト検索(&F) - - - - Find Object - オブジェクト検索 - - - - - Find object in the tree - ツリー中のオブジェクトを検索する - - - - P&references... - 設定(&E)... - - - - Preferences... - 設定... - - - - Edit Preferences - 設定の編集 - - - Insert Rule - ルール挿入 - - - Move Rule Up - ルールを上に移動する - - - Move Rule Down - ルールを下に移動 - - - Add Rule Below - 下にルールを追加する - - - Remove Rule - ルール削除 - - - Ctrl+Del - Ctrl+Del - - - Copy Rule - ルールのコピー - - - Cut Rule - ルール切り取り - - - Paste Rule Above - 上にルールを貼り付け - - - Paste Rule Below - 下にルールを貼り付け - - - - Add File to &RCS - RCS にファイルを追加する(&R) - - - - Add File to RCS - RCS にファイルを追加する - - - - - Delete - 削除 - - - - &Export Library - ライブラリーのエクスポート(&E) - - - - Export Library To a File - ファイルへライブラリーをエクスポートする - - - - Import &Library - ライブラリーをインポートする(&L) - - - - Import Library From a File - ファイルからライブラリーをインポート - - - - &Debug - デバッグ(&D) - - - - Debug - デバッグ - - - - - Propert&ies - プロパティ(&I) - - - - Show File Properties - ファイルのプロパティの表示 - - - - Ctrl+I - Ctrl+I - - - Move Selected Rules - 選択したルールを移動する - - - - &Discard - 破棄する(&D) - - - - Discard - 破棄する - - - - Discard Changes and Overwrite With Clean Copy Of The Head Revision From RCS - - - - - Co&mmit - コミットする(&M) - - - - Commit - コミットする - - - - Commit Opened File to RCS and Continue Editing - 開いているファイルを RCS にコミットして編集を続ける - - - - - Lock - ロックする - - - - - Unlock - ロック解除する - - - - - new item - 新規項目 - - - - - Find Conflicting Objects in Two Files - ふたつのファイルから衝突したオブジェクトを検索する - - - - Import Po&licy - ポリシーのインポート(&L) - - - - Import Policy - ポリシーをインポートする - - - - Open Recent - - - - - Firewall Builder Help - - - - - Clear Menu - - - - - Find - 検索 - - - - Editor - - - - Apply - 適用する - - - - Help - ヘルプ - - - - View - - - - - Release Notes - - - - - Object Tree - - - - - Output - - - - - - Undo Stack - - - - - - - Compile rules of all firewall and cluster objects - - - - - - - Install firewall policy of all firewall and cluster objects - - - - - - Object Discovery - - - - - Ctrl+T - - - - - Editor Panel - - - - - FWObjectDropArea - - - Drop object here. - ここにオブジェクトをドロップします。 - - - - Show in the tree - ツリーの中を表示する - - - - Edit - 編集 - - - - Paste - 貼り付け - - - - Delete - 削除 - - - - FWObjectDropArea_q - - - Form1 - - - - - FWWindow - - - A new version of Firewall Builder is available at http://www.fwbuilder.org - ファイアウォールビルダーの新しいバージョンを利用できます http://www.fwbuilder.org - - - Legend - 凡例 - - - Objects - オブジェクト - - - Groups - グループ - - - EMPTY - - - - - Print configuration of %1 - - - - - Printing... - - - - - - Printing aborted - 印刷を中断しました - - - - &Continue - 続ける(&C) - - - - Printing completed - 印刷を完了しました - - - - Printing cancelled - Printing <ed - - - - - Open File - ファイルを開く - - - - Ctrl+Z - Ctrl+Z - - - - Ctrl+Y - Ctrl+Y - - - - Shift+Ctrl+Z - - - - - File '%1' does not exist or is not readable - - - - - FilterDialog - - - Filter error - フィルターエラー - - - - Invalid RegExp. - 不正な正規表現です。 - - - - Name - 名前 - - - - Address - アドレス - - - - Contains - 内容 - - - - Is equal to - - - - - Starts with - - - - - Ends with - 編集 - - - - Matches Wildcard - - - - - Matches RegExp - - - - - FilterDialog_q - - - Filter - フィルター - - - - Save - 保存 - - - - Load - 読み込み - - - - Ok - OK - - - - Cancel - 取り消し - - - - Match - 一致 - - - - all - すべて - - - - any - 何でも - - - - of the following: - - - - - Add a new pattern - 新規パターンを追加する - - - - + - + - - - - Target - ターゲット - - - - Type - 種類 - - - - Pattern - パターン - - - - Case sensitive - 英大小文字の区別 - - - - Remove a pattern - パターンを削除する - - - - - - - - - - - FindObjectWidget - - - Search hit the end of the policy rules. - 検索のヒットがオブジェクトツリーの最後です。 - - - - - &Continue at top - 続ける(&C) - - - - - &Stop - 停止(&S) - - - - Search hit the end of the object tree. - 検索のヒットがオブジェクトツリーの最後です。 - - - Cannot replace object by itself. - 自分自身でオブジェクトを置換できません。 - - - - Search and Replace objects are incompatible. - オブジェクトの検索と置換は互換性がありません。 - - - - - Replaced %1 objects. - %1 個のオブジェクトを置換しました。 - - - - Policy of firewall ' - ファイアウォールのポリシー - - - - Search object is missing. - - - - - Replace object is missing. - - - - - Cannot replace object with itself. - - - - - FindWhereUsedWidget - - - Type: - 種類: - - - NAT - NAT - - - Policy - ポリシー - - - Routing - ルーティング - - - Unknown rule set - 不明なルールセット - - - /Rule%1 - /ルール %1 - - - - NAT rule set - - - - - Policy rule set - - - - - Routing rule set - - - - - Rule set of unknown type - - - - - %1 "%2" / Rule %3 / %4 - - - - - FirewallCodeViewer_q - - - Firewall code viewer - - - - - Firewall / ruleset - ファイアウォール / ルールセット - - - - File: - - - - - Close - 閉じる - - - - FirewallDialog - - - - FWBuilder API error: %1 - FWBuilder API エラー: %1 - - - - - - - &Continue - 続ける(&C) - - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - はい(&Y) - - - - &No - いいえ(&N) - - - - Platform setting can not be empty - - - - - Host OS setting can not be empty - - - - - FirewallDialog_q - - - Firewall - ファイアウォール - - - - Name: - 名前: - - - - Platform: - プラットフォーム: - - - - Version: - バージョン: - - - - Host OS: - ホスト OS: - - - - Host OS Settings ... - ホスト OS 設定 ... - - - - Comment: - コメント: - - - - Firewall Settings ... - ファイアウォール設定 ... - - - - Skip this firewall for batch compile and install operations - - - - - Inactive firewall - 新規ファイアウォール - - - - Modified: - - - - - - - TextLabel - テキストラベル - - - - Compiled: - - - - - Installed: - - - - - FirewallInstaller - - - Generated script file %1 not found. - 生成したスクリプトファイル %1 が見つかりません。 - - - - &Continue - 続ける(&C) - - - - Copying %1 -> %2:%3 - - コピーしています %1 → %2:%3 - - - - - - FirewallInstallerCisco - - - Can not read generated script %1 - - - - - &Continue - 続ける(&C) - - - - FirewallInstallerUnx - - Generated script file %1 not found. - 生成したスクリプトファイル %1 が見つかりません。 - - - - &Continue - 続ける(&C) - - - Copying %1 -> %2:%3 - - コピーしています %1 → %2:%3 - - - - - Error: Failed to start program: - エラー: プログラムの開始でエラー: - - - - Incorrect manifest format in generated script. Line with "*" is missing, can not find any files to copy to the firewall. -%1 - - - - - FirewallSelectorWidget - - - You should select at least one firewall to use with the cluster - - - - - Host operation systems of chosen firewalls are different - - - - - Platforms of chosen firewalls are different - - - - - Versions of chosen firewalls are different - - - - - Cluster firewalls should have at least one common inteface - - - - - GroupObjectDialog - - - Open - 開く - - - - Edit - 編集 - - - - Copy - コピー - - - - Cut - 切り取り - - - - Paste - 貼り付け - - - - Delete - 削除 - - - - GroupObjectDialog_q - - - Group - グループ - - - - I - I - - - - L - L - - - - Comment: - コメント: - - - - Name: - 名前: - - - - New Object - 新規オブジェクト - - - - Create New Object - 新規オブジェクト作成 - - - - Create new object and add to this group - - - - - HelpView_q - - - Help - ヘルプ - - - - Object Name - オブジェクト名 - - - - Close - 閉じる - - - - HostDialog - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - はい(&Y) - - - - &No - いいえ(&N) - - - - HostDialog_q - - - Host - ホスト - - - - MAC matching - MAC 一致 - - - - Name: - 名前: - - - - Comment: - コメント: - - - - ICMPServiceDialog_q - - - ICMP - ICMP - - - ICMP Service - ICMP サービス - - - - Name: - 名前: - - - - ICMP Type: - ICMP の種類: - - - - - any - どれか - - - - ICMP Code: - ICMP コード: - - - - Comment: - コメント: - - - - IPServiceDialog - - - DSCP code or class: - - - - - TOS code (numeric): - TOS コード (数値): - - - - IPServiceDialog_q - - - IP - IP - - - IP Service - IP サービス - - - - Name: - 名前: - - - Protocol number: - (0- any protocol) - プロトコル番号: (0: いくつかのプロトコル) - - - - DiffServ - - - - - Use DSCP - DSCP を使う - - - - Use TOS - TOS を使う - - - - DSCP or TOS code -(numerical, dec or hex): - - - - - lsrr (loose source route) - - - - - ssrr (strict source route) - - - - - rr (record route) - - - - - timestamp - タイムスタンプ - - - all fragments - すべてのフラグメント - - - - Comment: - コメント: - - - - Protocol number: (0=any) - - - - - IP options: - - - - - IP service object that has this attribute turned on matches IP packets with any IP options present. - - - - - Any options - - - - - router-alert option - - - - - Fragments: - - - - - all - すべて - - - - 'short' - - - - - IPv4Dialog - - - Illegal IP address '%1' - 不当な IP アドレス 「%1」 - - - - - &Continue - 続ける(&C) - - - - Illegal netmask '%1' - 不当なネットマスク 「%1」 - - - - DNS lookup failed for both names of the address object '%1' and the name of the host '%2'. - - - - - DNS lookup failed for name of the address object '%1'. - アドレスオブジェクト「%1」の名前のDNS 問い合わせに失敗しました。 - - - - IPv4Dialog_q - - - IPv4 - IPv4 - - - Address - アドレス - - - - Name: - 名前: - - - - Address: - アドレス: - - - - Netmask: - ネットマスク: - - - - DNS Lookup... - DNS 問い合わせ... - - - - Comment: - コメント: - - - - IPv6Dialog - - - Illegal IP address '%1' - 不当な IP アドレス「%1」 - - - - - &Continue - 続ける(&C) - - - - Illegal netmask '%1' - 不当なネットマスク 「%1」 - - - - DNS lookup failed for both names of the address object '%1' and the name of the host '%2'. - - - - - DNS lookup failed for name of the address object '%1'. - アドレスオブジェクト「%1」の名前のDNS 問い合わせに失敗しました。 - - - - IPv6Dialog_q - - - IPv6 - IPv6 - - - Address IPv6 - IPv6 アドレス - - - - Name: - 名前: - - - - Address: - アドレス: - - - - Network (bit length) - ネットワーク (ビット長) - - - - DNS Lookup... - DNS 問い合わせ... - - - - Comment: - コメント: - - - - InterfaceDialog - - - Group: - グループ: - - - - Network: - ネットワーク: - - - - - - &Continue - 続ける(&C) - - - - The name of the interface '%1' has changed. The program can also rename IP address objects that belong to this interface, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to interface '%2' will stay the same.) - - - - - &Yes - はい(&Y) - - - - &No - いいえ(&N) - - - - FWBuilder API error: %1 - FWBuilder API エラー: %1 - - - - InterfaceDialog_q - - - Interface - インターフェース - - - - Name: - 名前: - - - - Label: - ラベル: - - - - Security level: - セキュリティレベル: - - - - <p>Each interface of the firewall must have security level associated with it.<br>Security level can be any number between 0 and 100, 0 being least secure and 100 being most secure levels. Interface with security level 0 ususally serves Internet connection.</p> - - - - - <p>Each interface of the firewall must have security level associated with it.<br> -Security level can be any number between 0 and 100, 0 being least secure and 100 being most secure levels. Interface with security level 0 ususally serves Internet connection.</p> - - - - This interface is external (insecure) - このインターフェースは外部です (セキュアではありません) - - - - <p>Check if this interface is used for management (SNMP queries, remote policy install etc.)<p> - - - - - Management interface - インターフェンス管理 - - - - Unnumbered interface - アンナンバードインターフェース - - - - Address is assigned dynamically - アドレスは動的に割り当てました - - - - Regular interface - レギュラーインターフェース - - - - Skip this interface while assigning policy rules - - - - - Unprotected interface - 保護なしインターフェース - - - Bridge port - ブリッジポート - - - - Comment: - コメント: - - - - Network zone: - ネットワークゾーン: - - - - - <p>Network zone consists of hosts and networks that can be reached through this interface of the firewall. Subnet to which this interface is directly attached must be part of its network zone. Other subnets reachable by means of routing should alse be added to the network zone. -<br> -If network zone for this interface consists of only one subnet, you can simply choose that network's object in the pull-down below. If your network zone should include multiple subnets, you need to create an Object Group, then put all hosts and networks which are going to be part of the network zone into that group and finally choose this group in the pull-down below.</p> - - - - - Bridge Port Interface - - - - - Advanced Interface Settings ... - - - - - Dedicated failover interface - - - - - InterfaceEditorWidget - - - New interface - - - - - - Remove - 削除 - - - - Failover protocol %1 does not require IP address for interface %2 - - - - - Failover protocol %1 requires an IP address for interface %2 - - - - - Empty address or netmask field - - - - - Add another address - - - - - Invalid address '%1/%2' - - - - - - Invalid netmask '%1/%2' - - - - - Form - フォーム - - - - Name: - 名前: - - - - Label: - ラベル: - - - - Comment: - コメント: - - - MAC: - MAC: - - - - Type: - - - - - Regular interface - レギュラーインターフェース - - - - Dynamic address - ダイナミックアドレス - - - - Unnumbered interface - アンナンバードインターフェース - - - - MAC address: - - - - - Protocol: - - - - - Address - アドレス - - - - Netmask - ネットマスク - - - - Type - 種類 - - - - - Add address - - - - - InterfacesTabWidget - - - Add new interface - - - - - Delete current interface - - - - - New interface - - - - - This firewall has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - This cluster has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - No interfaces - - - - - TabWidget - - - - - Tab 1 - タブ 1 - - - - Tab 2 - タブ 2 - - - - LibExport_q - - - Export - エクスポート - - - - This will export a library to a file which can later be imported back into Firewall Builder - - - - - New Item - 新規項目 - - - - Make exported libraries read-only - エクスポートしたライブラリーは読み込み専用に設定します - - - - Choose libraries to be exported: - エクスポートするライブラリーを選択: - - - - Ok - OK - - - - Cancel - 取り消し - - - - LibraryDialog_q - - - Library - ライブラリー - - - - Name: - 名前: - - - - Color: - 色: - - - - Comment: - コメント: - - - - MetricEditorPanel_q - - - Script Editor - スクリプトエディター - - - textLabel2 - テキストラベル 2 - - - - NATRuleOptionsDialog_q - - - NAT Rule Options - NAT ルールオプション - - - - No options are available for this firewall platform - このファイアウォールプラットフォームで利用できるオプションはありません - - - - Randomize port mapping (translates to --random) - - - - - Give a client the same source-/destination-address for each connection (translates to --persistent, requires iptables 1.4.3 or later). - - - - - Pool type - プールの種類 - - - - default - 標準 - - - - bitmask - ビットマスク - - - - random - ランダム - - - - source-hash - ソースハッシュ - - - - round-robin - ラウンドロビン - - - - static-port - 静的ポート - - - - Normally, if object used to define translated source address is an interface marked as "dynamic", fwbuilder generates NAT rule with target MASQUERADE. However masquerading has problems with policy routing. This option makes fwbuilder use SNAT target instead. - - - - - Use SNAT target instead of MASQUERADING for NAT rules with dynamic interfaces - - - - - NetworkDialog - - - Illegal IP address '%1' - 不当な IP アドレス「%1」 - - - - - - - &Continue - 続ける(&C) - - - - - Illegal netmask '%1' - 不当なネットマスク 「%1」 - - - - Network object should not have netmask '0.0.0.0' - - - - - NetworkDialogIPv6 - - - Illegal IPv6 address '%1' - 不当な IPv6 アドレス「%1」 - - - - - &Continue - 続ける(&C) - - - - Illegal netmask '%1' - 不当なネットマスク 「%1」 - - - - NetworkDialogIPv6_q - - - Network - ネットワーク - - - - Comment: - コメント: - - - - Name: - 名前: - - - - Address: - アドレス: - - - - Netmask (bit length) - ネットマスク (ビット長) - - - - NetworkDialog_q - - - Network - ネットワーク - - - - Name: - 名前: - - - - Address: - アドレス: - - - - Netmask: - ネットマスク: - - - - Comment: - コメント: - - - - ObjConflictResolutionDialog - - - Keep current object - 現在のオブジェクトを保持する - - - - Replace with this object - このオブジェクトと置換する - - - - - Object '%1' has been deleted - オブジェクト「%1」を削除しました - - - - - Delete - 削除 - - - - Object '%1' in the objects tree - オブジェクトツリー中のオブジェクト「%1」 - - - - - Object '%1' in file %2 - ファイル %2 中の オブジェクト「%1」 - - - - ObjConflictResolutionDialog_q - - - Conflict Resolution - 衝突の解決 - - - - There is a conflict between an object in your tree and object in the file you are trying to open. Choose which version of this object you want to use: - - - - - Current Object - 現在のオブジェクト - - - - Keep current object - 現在のオブジェクトを保持する - - - - - Always choose this -object if there is a conflict - 衝突する場合、常にこのオブジェクトを選んでください - - - - New Object - 新規オブジェクト - - - - Replace with this object - このオブジェクトと置換する - - - - ObjectEditor - - &Continue editing - 編集を続ける(&C) - - - &Discard changes - 変更を破棄する(&D) - - - This object has been modified but not saved. -Do you want to save it ? - このオブジェクトの修正が保存されていません。 -保存しますか? - - - &Save - 保存(&S) - - - &Discard - 破棄する(&D) - - - - ObjectManipulator - - - Object Manipulator - オブジェクトマニピュレーター - - - - New &Library - 新規ライブラリー(&L) - - - New Firewall - 新規ファイアウォール - - - New Host - 新規ホスト - - - New Interface - 新規インターフェース - - - New Network - 新規ネットワーク - - - New Network IPv6 - 新規 IPv6 ネットワーク - - - New Address - 新規アドレス - - - New Address IPv6 - 新規 IPv6 アドレス - - - New DNS Name - 新規 DNS 名 - - - New Address Table - 新規アドレステーブル - - - New Address Range - 新規アドレスの範囲 - - - New Object Group - 新規オブジェクトグループ - - - New Custom Service - 新規カスタムサービス - - - New IP Service - 新規 IP サービス - - - New ICMP Service - 新規 ICMP サービス - - - New ICMP6 Service - 新規 ICMP6 サービス - - - New TCP Serivce - 新規 TCP サービス - - - New UDP Service - 新規 UDP サービス - - - New TagService - 新規タグサービス - - - New User Service - 新規ユーザーサービス - - - New Service Group - 新規サービスグループ - - - New Time Interval - 新規時間間隔 - - - - Copy object '%1' to clipboard' - - - - - Cut object - - - - - When you delete a library, all objects that belong to it -disappear from the tree and all groups and rules that reference them. -Do you still want to delete library %1? - - - - - &Yes - はい(&Y) - - - - &No - いいえ(&N) - - - - Edit - 編集 - - - - Open - 開く - - - - Duplicate ... - 複製 ... - - - - Move ... - 移動 ... - - - - place in library %1 - ライブラリー %1 の中の場所 - - - - to library %1 - ライブラリー %1 へ - - - - Copy - コピー - - - - Cut - 切り取り - - - - Paste - 貼り付け - - - - Delete - 削除 - - - Add Interface - インターフェース追加 - - - Add Policy Rule Set - ポリシールールセット追加 - - - Add NAT Rule Set - NAT ルールセット追加 - - - Add IP Address - IP アドレス追加 - - - Add IPv6 Address - IPv6 アドレス追加 - - - Add MAC Address - MAC アドレス追加 - - - New Group - 新規グループ - - - New TCP Service - 新規 TCP サービス - - - - Find - 検索 - - - - Where used - 使うとき - - - - Group - グループ - - - - New cluster from selected firewalls - - - - - Compile - コンパイル - - - - Install - インストール - - - - Inspect - 監査 - - - - Lock - ロックする - - - - Unlock - ロック解除する - - - - dump - ダンプ - - - Searching for firewalls affected by the change... - 変更に影響したファイアウォールを検索しています... - - - - - Transfer - - - - - Create and add to group - - - - - Cluster host OS %1 does not support state synchronization - - - - - State Sync Group - - - - - Failover group - - - - Network - ネットワーク - - - Address - アドレス - - - Address IPv6 - IPv6 アドレス - - - DNS Name - DNS 名 - - - Address Table - アドレステーブル - - - Custom Service - カスタムサービス - - - IP Service - IP サービス - - - ICMP Service - ICMP サービス - - - TCP Service - TCP サービス - - - UDP Service - UDP サービス - - - Time Interval - 時間間隔 - - - - ObjectManipulator_q - - - Tree of Objects - オブジェクトのツリー - - - - Back - 戻る - - - - Go back to the previous object - 前のオブジェクトに戻る - - - - New Object - 新規オブジェクト - - - - Create New Object - 新規オブジェクト作成 - - - - Filter: - - - - - Object name pattern - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:11pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">Clear filter</p></body></html> - - - - - ObjectTreeView - - - Object - オブジェクト - - - - Attributes - - - - - PhysAddressDialog_q - - - physAddress - 物理アドレス - - - MAC Address - MAC アドレス - - - - Name: - 名前: - - - - Physical address (MAC): - 物理アドレス (MAC): - - - - Comment: - コメント: - - - - PrefsDialog - - - Find working directory - 作業ディレクトリの検索 - - - - Find Secure Shell utility - セキュアシェルユーティリティの検索 - - - - Find SCP utility - SCP ユーティリティの検索 - - - - Your version of Firewall Builder is up to date. - ファイアウォールビルダーのバージョンは最新です。 - - - - A new version of Firewall Builder is available at http://www.fwbuilder.org - ファイアウォールビルダーの新しいバージョンを利用できます http://www.fwbuilder.org - - - - Error checking for software updates: -%1 - ソフトウェアの更新の確認中にエラー: -%1 - - - - PrintingProgressDialog - - - Printing (page %1/%2) - 印刷中 (ページ %1/%2) - - - - Printing page %1 - 印刷中 (ページ %1) - - - - Aborting print operation - 印刷操作を中断しています - - - - Cannot abort printing - 印刷を中断できません - - - - ProjectPanel - - - No firewalls defined - ファイアウォールは未定義です - - - - Untitled - 名称未設定 - - - - (read-only) - (読み込み専用) - - - - Cancel - 取り消し - - - - Compile and Inspect files - - - - - - and - - - - - Firewall objects %1 have been modified and need to be recompiled. - - - - - Firewall object "%1" has been modified and needs to be recompiled. - - - - - %1 firewall objects have been modified and need to be recompiled. - - - - - Can not read generated files for the firewall objects %1. You need to compile them to create the files. - - - - - Can not read generated files for the firewall objects %1. You need to compile it to create the files. - - - - - Can not read generated files for the %1 firewall objects. You need to compile then to create the files. - - - - - <b>Multiple firewalls</b> - - - - Building policy view... - ポリシービューを構築しています... - - - - - &Save - 保存(&S) - - - - &Discard - 破棄する(&D) - - - - - - &Cancel - 取り消し(&C) - - - - FWB Files (*.fwb);;All Files (*) - FWB ファイル (*.fwb);;すべてのファイル (*) - - - - - Choose name and location for the new file - 新規ファイルの名前とフォルダーを選択する - - - Open File - ファイルを開く - - - Saving data to file... - ファイルにデータを保存しています... - - - - Choose name and location for the file - ファイルの名前とフォルダーを選択する - - - - &Discard changes - 変更を破棄する(&D) - - - - File %1 has been added to RCS. - ファイル %1 を RCS に追加しました。 - - - - - - - - - - - - - - - - - - &Continue - 続ける(&C) - - - - Error adding file to RCS: -%1 - RCS へのファイルの追加エラー: -%1 - - - - Choose a file to import - インポートするファイルを選んでください - - - - This operation inspects two data files (either .fwb or .fwl) and finds conflicting objects. Conflicting objects have the same internal ID but different attributes. Two data files can not be merged, or one imported into another, if they contain such objects. This operation also helps identify changes made to objects in two copies of the same data file.<br><br>This operation does not find objects present in one file but not in the other, such objects present no problem for merge or import operations.<br><br>This operation works with two external files, neither of which needs to be opened in the program. Currently opened data file is not affected by this operation and objects in the tree do not change.<br><br>Do you want to proceed ? - - - - - Choose the first file - 1 つ目のファイルを選んでください - - - - Choose the second file - 2 つ目のファイルを選んでください - - - - - Error loading file %1: -%2 - ファイル %1 の読み込み中のエラー: -%2 - - - - Total number of conflicting objects: %1. -Do you want to generate report? - 衝突オブジェクトの総数: %1 -報告を生成しますか? - - - - Choose name and location for the report file - 報告ファイルの場所と名前を選んでください - - - - TXT Files (*.txt);;All Files (*) - テキストファイル (*.txt);;すべてのファイル (*) - - - - Can not open report file for writing. File '%1' - 報告ファイルを書き込むために開けません。ファイル「%1」 - - - - Unexpected error comparing files %1 and %2: -%3 - %1 と %2 のファイル比較で予期せぬエラー: -%3 - - - - Please select a library you want to export. - エクスポートしたいライブラリーを選択してください。 - - - - The file %1 already exists. -Do you want to overwrite it ? - ファイル %1 は既に存在します。 -上書きしますか? - - - - &Yes - はい(&Y) - - - - &No - いいえ(&N) - - - - A library that you are trying to export contains references -to objects in the other libraries and can not be exported. -The following objects need to be moved outside of it or -objects that they refer to moved in it: - - - - - - (Long error message was truncated) - (長いエラーメッセージを切り詰めました) - - - - The program encountered error trying to load file %1. -The file has not been loaded. Error: -%2 - - - - - - Loading system objects... - システムオブジェクトを読み込んでいます... - - - - Error loading file: -%1 - ファイルの読み込み中のエラー: -%1 - - - - Reading and parsing data file... - データファイルの読み込みと解析をしています... - - - - Merging with system objects... - システムオブジェクトと結合しています... - - - Firewall Builder 2 uses file extension '.fwb' and -needs to rename old data file '%1' to '%2', -but file '%3' already exists. -Choose a different name for the new file. - ファイアウォールビルダー 2 はファイル拡張子に「.fwb」を使っていましたが、 -古いデータファイル「%1」の名前を「%2」に変える必要があります。 -しかしファイル「%3」は既に存在します。 -新しいファイルのための違う名前を選んでください。 - - - - Load operation cancelled and data file revertedto original version. - 読み込み操作を取り消し、データファイルをオリジナルバージョンに戻しました。 - - - Firewall Builder 2 uses file extension '.fwb'. Your datafile '%1' -has been renamed '%2' - ファイアウォールビルダー 2 はファイル拡張子に「.fwb」を使っていました。 -データファイル「%1」の名前を「%2」に変える必要があります - - - - Exception: %1 - 例外: %1 - - - - Failed transformation : %1 - 変換に失敗しました : %1 - - - - XML element : %1 - XML 要素 : %1 - - - - - The program encountered error trying to load data file. -The file has not been loaded. Error: -%1 - - - - - Building object tree... - オブジェクトツリーを構築しています... - - - - Indexing... - インデックスを作成しています... - - - - Checking file %1 in RCS - RCS にファイル %1 をチェックインしています - - - - Error checking in file %1: -%2 - ファイル %1 の検査中のエラー:%2 - - - - Saving data to file %1 - - - - - File is read-only - ファイルは読み込み専用です - - - - Error saving file %1: %2 - ファイル %1 の保存中のエラー: %2 - - - - Searching for firewalls affected by the change... - 変更に影響したファイアウォールを検索しています... - - - - Firewall Builder uses file extension '.fwb' and -needs to rename old data file '%1' to '%2', -but file '%3' already exists. -Choose a different name for the new file. - - - - - Firewall Builder uses file extension '.fwb'. Your datafile '%1' -has been renamed '%2' - - - - - This operation discards all changes that have been saved into the file so far, closes it and replaces it with a clean copy of its head revision from RCS. -All changes will be lost if you do this. - - - - - - ProjectPanel_q - - - Form - フォーム - - - Apply - 適用する - - - Close - 閉じる - - - - Firewall / ruleset - ファイアウォール / ルールセット - - - - - - Compile this firewall - - - - - - - Insert rule - - - - - - - - ... - - - - - - - Compile and install this firewall - - - - - - - Inspect generated files - - - - - QObject - - - - - - Support module for %1 is not available - %1 のサポートモジュールは利用できません - - - - Firewall Builder can import Cisco IOS access lists from the router configuration saved using 'show run' or any other command that saves running config. The name of the created firewall object, all of its interfaces and their addresses will be configured automatically if this information can be found in the configuration file. - - - - - Firewall Builder can import iptables rules from a file in iptables-save format. Firewall name and addresses of its interfaces need to be configured manually because iptables-save file does not have this information. - - - - - Working directory %1 does not exist and could not be created. -Ignoring this setting. - 作業ディレクトリ %1 が存在しない上に作成できませんでした。 -この設定は無効になります。 - - - - - New Library - 新規ライブラリー - - - - DNS record: - DNS レコード: - - - - Address Table: - アドレステーブル: - - - - objects - オブジェクト - - - - - protocol: %1 - プロトコル: %1 - - - - - type: %1 - 種類: %1 - - - - - code: %1 - コード: %1 - - - - - Type: - 種類: - - - - Members: - - - - - %1 objects - - - - - Label: %1 - - - - - Addresses: - - - - - Address: - アドレス: - - - - <b>Library:</b> - <b>ライブラリー:</b> - - - - <b>Object Id:</b> - <b>オブジェクト ID:</b> - - - - <b>Object Type:</b> - <b>オブジェクトの種類:</b> - - - - <b>Object Name:</b> - <b<>オブジェクト名:</b> - - - - <b>DNS record:</b> - <b>DNS レコード:</b> - - - - - Run-time - ランタイム - - - - - Compile-time - コンパイル時間 - - - - <b>Table file:</b> - <b<>テーブルファイル:</b> - - - - %1 objects<br> - - %1 オブジェクト<br> - - - - - Stateless - - - - - Stateful - - - - - - Log prefix: - ログ接頭語: - - - - Log Level: - - - - - Netlink group: - - - - - connlimit value: - - - - - Part of Any - - - - - Log facility: - - - - - - Log level: - ログレベル: - - - - Send 'unreachable' - - - - - Keep information on fragmented packets - - - - - Max state: - - - - - Force 'keep-state' - - - - - Source tracking - - - - - Max src nodes: - - - - - Max src states: - - - - - Add mirrored rule - - - - - Version: - バージョン: - - - - Log interval: - - - - - Disable logging for this rule - - - - <b>Path:</b> - <b>パス:</b> - - - - protocol - プロトコル - - - - - type: - 種類: - - - - code: - コード: - - - - - Pattern: "%1" - パターン: 「%1」 - - - - - User id: "%1" - ユーザー ID: 「%1」 - - - <b>Action :</b> - <b>操作 :</b> - - - - <b>Parameter:</b> - <b>パラメーター:</b> - - - <b>Log prefix :</b> - <b>ログ接頭語 :</b> - - - <b>Log Level :</b> - <b>ログレベル :</b> - - - <b>Netlink group :</b> - <b>ネットリンクグループ :</b> - - - <b>Limit Value :</b> - <b>制限値 :</b> - - - <b>Limit burst :</b> - <b>ライブラリー:</b> - - - <li><b>Stateless</b></li> - <li><b>ステートレス</b></li> - - - <b>Log facility:</b> - <b>ログファシリティ:</b> - - - <b>Log level :</b> - <b>ログレベル :</b> - - - <li><b>Send 'unreachable'</b></li> - <li><b>「未到達(unreachable)」を送る</b></li> - - - <b>Log prefix :</b> - <b>ログ接頭語 :</b> - - - <b>Max state :</b> - <b>ライブラリー:</b> - - - <li><b>Source tracking</b></li> - <li><b>送信元の追跡</b></li> - - - <b>Max src states:</b> - <b>ライブラリー:</b> - - - <u><b>Ver:%1</b></u><br> - - <u><b>バージョン:%1</b></u><br> - - - - <li><b>Disable logging for this rule</b></li> - <li><b>このルールのログ記録をの無効化</b></li> - - - - use SNAT instead of MASQ<br> - - - - - - random<br> - - - - - persistent<br> - - - - - bitmask<br> - - - - - source-hash<br> - - - - - round-robin<br> - - - - - static-port<br> - - - - bitmask - ビットマスク - - - random - ランダム - - - source-hash - ソースハッシュ - - - round-robin - ラウンドロビン - - - static-port - 静的ポート - - - - - Firewall - ファイアウォール - - - - - Host - ホスト - - - - - - Address - アドレス - - - - Addres Range - アドレス範囲 - - - - - - - Interface - インターフェース - - - - - Network - ネットワーク - - - - Group of objects - オブジェクトのグループ - - - - Library - ライブラリー - - - - Cluster - - - - - Network IPv6 - - - - - Address IPv6 - IPv6 アドレス - - - - DNS Name - DNS 名 - - - - Address Table - アドレステーブル - - - - Address Range - - - - - Object Group - - - - - - Custom Service - カスタムサービス - - - - - IP Service - IP サービス - - - - - - ICMP Service - ICMP サービス - - - - ICMP6 Service - - - - - - TCP Service - TCP サービス - - - - - UDP Service - UDP サービス - - - - TagService - - - - - User Service - - - - - Service Group - - - - - MAC Address - - - - - Policy Rule Set - - - - - NAT Rule Set - - - - - Routing Rule Set - - - - - Failover group - - - - - State synchronization group - - - - - New Firewall - 新規ファイアウォール - - - - New Cluster - - - - - New Host - 新規ホスト - - - - New Interface - 新規インターフェース - - - - New Network - 新規ネットワーク - - - - New Network IPv6 - 新規 IPv6 ネットワーク - - - - New Address - 新規アドレス - - - - New Address IPv6 - 新規 IPv6 アドレス - - - - New DNS Name - 新規 DNS 名 - - - - New Address Table - 新規アドレステーブル - - - - New Address Range - - - - - New Object Group - 新規オブジェクトグループ - - - - New Custom Service - 新規カスタムサービス - - - - New IP Service - 新規 IP サービス - - - - New ICMP Service - 新規 ICMP サービス - - - - New ICMP6 Service - 新規 ICMP6 サービス - - - - New TCP Service - 新規 TCP サービス - - - - New UDP Service - 新規 UDP サービス - - - - New TagService - - - - - New User Service - 新規ユーザーサービス - - - - New Service Group - 新規サービスグループ - - - - New MAC Address - - - - - New Policy Rule Set - - - - - New NAT Rule Set - - - - - New Routing Rule Set - - - - - New failover group - - - - - New state synchronization group - - - - - Group of services - サービスのグループ - - - - - - Time Interval - 時間間隔 - - - - Firewall name: %1 - ファイアウォール名: %1 - - - - Platform: - プラットフォーム: - - - - Version: - バージョン: - - - - Host OS: - ホスト OS: - - - - Policy: - ポリシー: - - - NAT: - NAT: - - - Routing - ルーティング - - - ( read only ) - ( 読み込み専用 ) - - - - Impossible to insert object %1 (type %2) into %3 -because of incompatible type. - - - - - Library %1: Firewall '%2' (%3 rule #%4) uses object '%5' from library '%6' - - - - - Library %1: Group '%2' uses object '%3' from library '%4' - - - - - File is read-only - ファイルは読み込み専用です - - - - Error saving file %1: %2 - ファイル %1 の保存中にエラー: %2 - - - - - - RCS tools are unavailable - - - - - Fatal error during initial RCS checkin of file %1 : - %2 -Exit status %3 - - - - - Fatal error running rlog for %1 - %1 の rlog を実行中に致命的なエラー - - - - Fatal error running rcsdiff for file %1 - ファイル %1 のrcsdiff を実行中に致命的なエラー - - - Can not open file %1 - ファイル %1 を開くことができません - - - - ERROR - エラー - - - - OK - OK - - - &Continue editing - 編集を続ける(&C) - - - - - - - - - - - No change - 変更なし - - - - - - - - - - - - On - オン - - - - - - - - - - - - Off - オフ - - - - Compiling rule sets for firewall: %1 - - - - - - Installing policy rules on firewall '%1' - - - - <b>Summary:</b> - - <b>要約:</b> - - - - * firewall name : %1 - - * ファイアウォール名 : %1 - - - - * user name : %1 - - * ユーザー名 : %1 - - - - * management address : %1 - - * アドレス管理 : %1 - - - - * platform : %1 - - * プラットフォーム : %1 - - - - * host OS : %1 - - * ホスト OS : %1 - - - - * Loading configuration from file %1 - - * ファイル %1 からせって意を読み込んでいます - - - - * Running as user : %1 - - - - - * Firewall name : %1 - - - - - * Installer uses user name : %1 - - - - - * Management address : %1 - - - - - * Platform : %1 - - - - - * Host OS : %1 - - - - - Only one interface of the firewall '%1' must be marked as management interface. - - - - - - One of the interfaces of the firewall '%1' must be marked as management interface. - - - - - - Management interface does not have IP address, can not communicate with the firewall. - - - - - - - - 0 - System Unusable - 0 - システム未使用 - - - - - - 1 - Take Immediate Action - 1 - すぐさま処理をする - - - - - - 2 - Critical Condition - 2 - 危険な状態 - - - - - - 3 - Error Message - 3 - エラーメッセージ - - - - - - 4 - Warning Message - 4 - 警告メッセージ - - - - - - 5 - Normal but significant condition - - - - - - - 6 - Informational - 6 - 情報 - - - - - - 7 - Debug Message - 7 - デバッグメッセージ - - - - - &Continue - 続ける(&C) - - - Error loading file %1: -%2 - ファイル %1 の読み込み中のエラー: -%2 - - - Duplicate library '%1' - ライブラリー「%1」の複製 - - - dynamic - ダイナミック - - - - Aggressive - アグレッシブ - - - - Conservative - コンサバティブ - - - - For high latency - - - - - Normal - 通常 - - - - alert - alert - - - - crit - crit - - - - error - error - - - - warning - warning - - - - notice - notice - - - - info - info - - - - debug - debug - - - - kern - kern - - - - user - user - - - - mail - mail - - - - daemon - daemon - - - - auth - auth - - - - syslog - syslog - - - - lpr - lpr - - - - news - news - - - - uucp - uucp - - - - cron - cron - - - - authpriv - authpriv - - - - ftp - ftp - - - - local0 - local0 - - - - local1 - local1 - - - - local2 - local2 - - - - local3 - local3 - - - - local4 - local4 - - - - local5 - local5 - - - - local6 - local6 - - - - local7 - local7 - - - - ICMP admin prohibited - ICMP 管理は禁止されました - - - - ICMP host prohibited - ICMP ホストは禁止されました - - - - ICMP host unreachable - ICMP ホストに到達しません - - - - ICMP net prohibited - ICMP ネットは禁止されました - - - - ICMP net unreachable - ICMP ネットに到達しません - - - - ICMP port unreachable - ICMP ポートに到達しません - - - - ICMP protocol unreachable - ICMP プロトコルに到達しません - - - - TCP RST - TCP RST - - - - - None - なし - - - - Route through - - - - - Route reply through - - - - - Route a copy through - - - - - Random - ランダム - - - - Source Hash - ソースハッシュ - - - - Round Robin - ラウンドロビン - - - - 1.4.1.1 or later - 1.3.0 以上 {1.4.1.1 ?} - - - - 4.3 - 200% {4.3?} - - - - 4.5 - 200% {4.5?} - - - - 4.6 - 200% {4.6?} - - - - 4.7 and later - - - - - - on top of the script - - - - - - after interface configuration - インターフェース設定の後 - - - - - after policy reset - ポリシーリセットの後 - - - - in the activation shell script - - - - - in the pf rule file, at the very top - - - - - in the pf rule file, after set comamnds - - - - - in the pf rule file, after scrub comamnds - - - - - in the pf rule file, after table definitions - - - - - /day - /日 - - - - /hour - /時 - - - - /minute - /分 - - - - /second - /秒 - - - - - any - - - 任意 - - - - - 1.2.5 or earlier - 1.2.5 以上 - - - - 1.2.6 to 1.2.8 - 1.2.6 から 1.2.8 - - - - 1.2.9 to 1.2.11 - 1.2.9 から 1.2.11 - - - - 1.3.x - 4.x {1.3.?} - - - - 1.4.0 or later - 1.3.0 以上 {1.4.0 ?} - - - - 3.x - 3.x - - - - 3.7 to 3.9 - 3.7 から 3.9 - - - 4.x - 4.x - - - Accept - 受理 - - - Deny - 破棄 - - - Reject - 拒否 - - - Return - 返す - - - Skip - 飛ばす - - - Continue - 続ける - - - Modify - 修正 - - - Classify - 分類 - - - Custom - カスタム - - - Branch - 分岐 - - - Chain - 連結 - - - Accounting - アカウント - - - Count - 回数 - - - Tag - タグ - - - Mark - マスク - - - Pipe - パイプ - - - Queue - キュー - - - - Page %1 - ページ %1 - - - - Object with name '%1' already exists, please choose different name. - オブジェクト名「%1」は既に存在します。別の名前を選択してください。 - - - - Legend - 凡例 - - - - Objects - オブジェクト - - - - Groups - グループ - - - - EMPTY - - - - - Source - ソース - - - - - Destination - ディスティネーション - - - - Service - サービス - - - - Time - 時間 - - - - Original Src - オリジナルソース - - - - Original Dst - オリジナルディスティネーション - - - - Original Srv - オリジナルサービス - - - - Translated Src - 転送元ソース - - - - Translated Dst - 転送先 - - - - Translated Srv - 転送サービス - - - - Gateway - ゲートウェイ - - - - Direction - 方向 - - - - Action - 操作 - - - - Options - オプション - - - - Metric - サービス - - - - Comment - コメント - - - - type: %1<br> - - - - - Group member %1:%2<br> - - - - - No firewalls assigned to cluster '%1' - - - - - Type '%1': new object can not be created because -corresponding branch is missing in the object tree. -Please repair the tree using command 'fwbedit checktree -f file.fwb'. - - - - - Summary: - - - - * firewall name : %1 - * ファイアウォール名: %1 - - - * user name : %1 - * ユーザー名: %1 - - - * management address : %1 - * 管理アドレス: %1 - - - * platform : %1 - * プラットフォーム: %1 - - - * host OS : %1 - * ホスト OS: %1 - - - - * Loading configuration from file %1 - * ファイル %1 から設定を読み込んでいます - - - * Incremental install - * インクリメンタルインストール - - - - * Configuration diff will be saved in file %1 - * 設定の差分をファイル %1 に保存するでしょう - - - - * Commands will not be executed on the firewall - * コマンドはファイアウォール上で実行されないでしょう - - - - - - - - %1 advanced settings - - - - - Bitmask - ビットマスク - - - - 1.4.3 or later - 1.3.0 以上 {1.4.3 ?} - - - - Executing: - - - - - Using transfer agent '%1' - - - - - Appending fw object name to tarball - - - - - Could not transfer %1 config to '%2' - - - - - Edit - - - - - Rename object - - - - - Edit protocol parameters - - - - - Edit Rule Action - - - - - Edit Rule Options - - - - - Edit Rule Comment - - - - - insert rule - - - - - delete rules - - - - - delete rules from group - - - - - change rule(s) color - - - - - move rule up - - - - - move rule down - - - - - negate rule element - - - - - remove object(s) from group - - - - - create new group - - - - - add to group above - - - - - add to group below - - - - - Negate - 否定 - - - - <b>Action :</b> %1<br> - - - - - Replace object - - - - - Create new %1 - - - - - Create library - - - - - Create new Firewall - - - - - Create new Cluster - - - - - Create new Host - - - - - Follow global setting - - - - - Bound to interfaces - - - - - Floating - - - - - 4.0 to 4.2 - 3.7 から 4.2 {4.0 ?} - - - - Impossible to apply changes because object is located in read-only -part of the tree or data file was opened read-only - - - - - - Add object to group - - - - - Add library - - - - - Delete object - - - - - Move object - - - - - - - Paste object - - - - - Lock object - - - - - Unlock object - - - - - Create new group - - - - - Compiler for firewall platform %1 not found - - - - - Original rule combines match of tcp/udp/icmp -protocols with two or more module matches, such as -module 'mark', 'recent' or 'length'. Use additional -branches to implement this complex match. - - - - - Unknown parameter of target REJECT: %1. - - - - - Can not reproduce default action in table 'mangle' chain 'FORWARD'. - - - - - Can not reproduce default action in table 'mangle' chain 'INPUT'. - - - - - - A single interface belonging to this firewall is expected in this field. - - - - - A single ip address is expected here. You may also insert a host or a network adapter leading to a single ip adress. - - - - - A single ip adress is expected here. You may also insert a host or a network adapter leading to a single ip adress. - - - - - RCS - - - - - Error checking file out: %1 - ファイル取り出しの確認中のエラー: %1 - - - - - - - - &Continue - 続ける(&C) - - - - Error creating temporary file - 一時ファイルの作成に失敗しました - - - - Error writing to temporary file - 一時ファイルの書き込みに失敗しました - - - - File is opened and locked by %1. -You can only open it read-only. - ファイルは %1 により開かれ、ロックされています -読み込み専用でのみ開くことができます。 - - - - Revision %1 of this file has been checked out and locked by you earlier. -The file may be opened in another copy of Firewall Builder or was left opened -after the program crashed. - - - - - Open &read-only - 読み込み専用で開く(&O) - - - - &Open and continue editing - 読み込んで編集を続ける(&O) - - - - &Cancel - 取り消し(&C) - - - - RCSFilePreview - - - File is not in RCS - ファイルは RCS 内にありません - - - - RCSFilePreview_q - - - RCSFilePreview - RCS ファイルプレビュー - - - - Revision - リビジョン - - - - Date - 日付 - - - - Author - 著者 - - - - Locked by - ロックした人 - - - - RCS log: - RCS ログ: - - - - Open - 開く - - - - Open read-only - 読み込み専用で開く - - - - Cancel - 取り消し - - - - Tree View - - - - - List View - - - - - RCSFileSaveDialog_q - - - Log record for the new revision - 新規リビジョンのログ記録 - - - - Do not ask me anymore, always check files in with empty log - - - - - Check file &in - ファイルのチェックイン(&I) - - - - Alt+I - Alt+I - - - - &Cancel - 取り消し(&C) - - - - Checking file %1 into RCS - RCS にファイル %1 をチェックインしています - - - - Log record for this revision: - このリビジョンのログ記録: - - - - RoutingRuleOptionsDialog_q - - - Routing Rule Options - ルーティングのルールオプション - - - - If installation of this routing rule fails, just carry on - - - - - No options available for routing rules of this firewall platform - - - - - RuleOptionsDialog_q - - - Rule Options for ipt - ipt 用ルールオプション - - - - - General - 一般 - - - - - - Stateless rule - ステートレスルール - - - - - Normally policy compiler uses stateful inspection in each rule. Activating next option makes this rule stateless. - - - - - - - Logging - ログ記録 - - - - alert - alert - - - - crit - crit - - - - error - error - - - - warning - warning - - - - notice - notice - - - - info - info - - - - debug - debug - - - - - Log prefix: - ログ接頭語: - - - - - - Log level: - ログレベル: - - - - Netlink group (if using ULOG): - ネットリンクグループ (ULOG を使う場合): - - - - limit - 制限 - - - - Rate (rule matches if it hits this often or less): - - - - - Module limit - モジュール制限 - - - - - Burst: - バースト: - - - - - /day - /日 - - - - - /hour - /時 - - - - - /minute - /分 - - - - - /second - /秒 - - - - connlimit - 接続制限 - - - - bit - ビット - - - - per network with netmask of - - - - - Module connlimit - モジュールの接続制限 - - - - hashlimit - ハッシュ制限 - - - - Module hashlimit - モジュールのハッシュ制限 - - - - On some older systems this module has name 'dstlimit'. Check here if you need to use this name. - - - - - Rate: - 日付: - - - - Name: - 名前: - - - - - Negate - 否定 - - - - Match if the number of existing connections is above this (translates into option --connlimit-above) - - - - - Mode: - モード: - - - - htable-size: - - - - - The number of buckets of the hash table (omit this option in generated script if set to 0) - - - - - htable-max: - - - - - Maximum number of entries in the hash (omit this option in generated script if set to 0) - - - - - htable-expire: - - - - - After how many milliseconds do hash entries expire (omit this option in the generated script if set to 0) - - - - - htable-gcinterval: - - - - - How many milliseconds between garbage collection intervals (omit this option in generated script if set to 0) - - - - - Options below control size of the hash table and expiration time. They will be omitted from the generated script if set to zero. - - - - - srcip - 接続元 IP - - - - dstip - 接続先 IP - - - - srcport - 接続元ポート - - - - dstport - 接続先ポート - - - - Send ICMP 'unreachable' packet masquerading as being from the original destination - - - - - Keep information on fragmented packets, to be applied to later fragments - - - - - Log facility: - ログファシリティ: - - - Add 'keep state' - 「状態維持」を追加する - - - Tracking - 追跡 - - - - When this option is checked, the number of states per source IP is tracked - - - - Activate source tracking - ソース追跡を有効にする - - - - State Tracking - - - - - Force "keep state" to make the rule stateful regardless of the default. - - - - - - Available in OpenBSD 4.5 and later - - - - - Prevent state changes for states created by this rule from appearing on the pfsync interface. - - - - - States created by this rule are exported on the pflow interface. - - - - - Activate source tracking. - - - - - Maximum number of source addresses which can simultaneously have state table entries (max-src-nodes): - - - - - Maximum number of simultaneous state entries that a single source address can create with this rule (max-src-states): - - - - - Limits - 制限 - - - - Maximum number of concurrent states this rule may create. Unlimited if set to zero (option 'max'). - - - - - When this limit is reached, further packets matching the rule that would create state are dropped, until existing states time out. - - - - - Maximum number of simultaneous TCP connections that a single host can make (max-src-conn): - - - - - The limit of new connections over a time interval (max-src-conn-rate): - - - - - / - / - - - - sec - - - - - overload table: - - - - - flush - flush - - - - global - global - - - - TCP - TCP - - - - Modulate state - - - - - synproxy - synproxy - - - - These options are only valid for PIX running software v6.3 or later - これらのオプションは実行中の PIX ソフトウェアバージョン 6.3 以上で有効です - - - - completely disable logging for this rule - このルールのログ記の無効化を完了しました - - - - Logging interval: - ログ記録間隔: - - - - Compiler can automatically create a rule with mirrored source and destination addresses and service fields. This can be used to match "reply" packets using address and service parameters matched by this rule. The action of the mirrored rule is the same as that of this one. Firewall Builder recognizes the following services and creates "mirrored" versions as follows: - - - - - * UDP service: mirrored service has source and destination port ranges reversed - * TCP service: mirrored service has source and destination port ranges reversed and "established" flag inverted. If TCP service used in this rule does not have "established" flag, the mirrored service gets it, and the other way around. This is designed to simplify creating ACL rules to permit "reply" TCP packets - * ICMP service: ICMP echo request is recognized, mirrored service becomes ICMP echo reply. Other ICMP types are simply copied to the mirrored service - * ICMPv6 service: like with ICMP, ICMP echo request is recognized and other ICMPv6 types are just copied - * IP service: mirrored service is a copy - - - - - - Add mirror rule - - - - - There are no options for this firewall platform - このファイアウォールプラットフォームでそのオプションはありません - - - - Use sloppy TCP state tracker for this rule - - - - - Assume firewall is part of "any" for this rule only: - - - - - Follow global setting - - - - - On - オン - - - - Off - オフ - - - - - Normally policy compiler uses stateful inspection in each rule. Activating this option makes this rule stateless. - - - - - RuleSetDialog - - - Rule set name '%1' is invalid. Only '[a-z][A-Z][0-9]_-+=@%^' characters are allowed. - ルールセット名「%1」は正しくありません。英数字と一部の記号(「_」「-」「+」「=」「@」「%」のみ許可しています。 - - - - &Continue - 続ける(&C) - - - - RuleSetDialog_q - - - On iptables "top" rule set goes into -the built-in chains INPUT, OUTPUT, -FORWARD; if this flag is unchecked, -rules go into user-defined chain -with the name the same as the name of -the rule set. - - - - - If this flag is unchecked, rules go -into anchor with the name the same as -the name of the rule set. - - - - - If this flag is unchecked, generated -access list will not be assigned to -interfaces with "ip access-group" -command. The name of the rule set will -be used as a prefix for names of -access access lists generated for it. - - - - - Ruleset - ルールセット - - - Rule set - ルールセット - - - - Name: - 名前: - - - - This is IPv4 rule set - これは IPv4 ルールセットです - - - - This is IPv6 rule set - これは IPv6 ルールセットです - - - - filter+mangle table - - - - - mangle table - - - - - Top ruleset - - - - - Comment: - コメント: - - - - This is combined IPv4 and IPv6 rule set - - - - - RuleSetView - - Outbound - 外向き - - - Original - オリジナル - - - Default - 標準 - - - All - すべて - - - Any - どれか - - - - - Enter group name: - グループ名の入力: - - - - - Insert Rule - ルール挿入 - - - - Paste Rule - ルール貼り付け - - - - New group - 新規グループ - - - - Add to the group - グループに追加する - - - - Remove from the group - グループから削除する - - - Insert Rule Above - 上にルールの挿入 - - - - Rename group - グループ名を変更する - - - - Change color - 色変更 - - - - No color - 色なし - - - Red - 赤色 - - - Orange - オレンジ色 - - - Yellow - 黄色 - - - Green - 緑色 - - - Blue - 青色 - - - Purple - 紫色 - - - Gray - 灰色 - - - - Parameters - パラメーター - - - - Inbound - 内向き - - - - Outbound - 外向き - - - - Both - 両方 - - - - Rule Options - ルールオプション - - - - Logging On - 記録する - - - - Logging Off - 記録しない - - - - - - - Edit - 編集 - - - - Copy - コピー - - - - Cut - 切り取り - - - - Paste - 貼り付け - - - - Delete - 削除 - - - - Where used - 使うとき - - - - Reveal in tree - ツリーから検索 - - - - Negate - 否定 - - - - Change direction - - - - - Change action - - - - - Change logging - - - - - delete - - - - - Copy object '%1' to clipboard' - - - - - cut - - - - - Move object - - - - Rules %1-%2 - ルール %1-%2 - - - Rule %1 - ルール %1 - - - - Add Rule Below - 下にルール追加 - - - - - Remove Rule - ルールの削除 - - - - Remove Rules - 複数ルールの削除 - - - Move Rule - ルール移動 - - - Move Rules - 複数ルール移動 - - - - Copy Rule - ルールのコピー - - - - Cut Rule - ルールの切り取り - - - - Paste Rule Above - 上にルールを貼り付け - - - - Paste Rule Below - 下にルールを貼り付け - - - - - Enable Rule - ルール有効 - - - - Enable Rules - ルール有効 - - - - - Disable Rule - ルール無効 - - - - Disable Rules - ルール無効 - - - - Compile rule - - - - - - Move Rule up - - - - - Move Rules up - - - - - - Move Rule down - - - - - Move Rules down - - - - - Enable rule - - - - - Disable rule - - - - - New Group - 新規グループ - - - - Add new rule on top - - - - - Add new rule at the bottom - - - - - RuleSetViewDelegate - - - log - - - - - (options) - - - - - Any - - - - - Original - オリジナル - - - - Default - - - - - All - すべて - - - - SSHCisco - - - -*** Fatal error : - -*** 致命的なエラー : - - - - Logged in - ログイン - - - - Switching to enable mode... - 有効モードに切り替え中... - - - - - New RSA key - - - - - Yes - はい - - - - No - いいえ - - - - In enable mode. - 有効モード中です。 - - - - Pushing firewall configuration - - - - - Rule %1 - ルール %1 - - - - End - - - - - SSHPIX - - -*** Fatal error : - -*** 致命的なエラー : - - - Logged in - ログイン - - - Switching to enable mode... - 有効モードに切り替え中... - - - - New RSA key - 新規 RSA 鍵 - - - Yes - はい - - - No - いいえ - - - In enable mode. - 有効モード中です。 - - - Rule %1 - ルール %1 - - - End - 終了 - - - - Making backup copy of the firewall configuration - ファイアウォール設定のバックアップコピーを作成しています - - - - *** Clearing unused access lists - *** 未使用アクセス一覧の整理中 - - - - *** Clearing unused object groups - *** 未使用オブジェクトグループの整理中 - - - - *** End - *** 終了 - - - Reading current firewall configuration - 現在のファイアウォール設定を読み込んでいます - - - Generating configuration diff - 設定の差分を生成しています - - - Fork failed for %1 - %1 のフォークに失敗しました - - - Not enough memory. - メモリーがありません。 - - - Too many opened file descriptors in the system. - システムでファイルディスクリプタを開きすぎています。 - - - Empty configuration diff - 設定の差分がありません - - - - SSHSession - - - You are connecting to the firewall <b>'%1'</b> for the first time. It has provided you its identification in a form of its host public key. The fingerprint of the host public key is: "%2" You can save the host key to the local database by pressing YES, or you can cancel connection by pressing NO. You should press YES only if you are sure you are really connected to the firewall <b>'%3'</b>. - - - - - Failed to start ssh - ssh の開始に失敗しました - - - - Stopping background process - - - - - Background process is still running. Will wait %1 sec - - - - - SSH session terminated, exit status: %1 - SSH 接続が切断しました。終了ステータス: %1 - - - - SSHUnx - - - -*** Fatal error : - -*** 致命的なエラー : - - - - Logged in - ログイン - - - - New RSA key - 新規 RSA 鍵 - - - - Yes - はい - - - - No - いいえ - - - - Done - 終了しました - - - - Error in SSH - SSH のエラー - - - - SimpleIntEditor_q - - - Script Editor - スクリプトエディター - - - - Cancel - 取り消し - - - - OK - OK - - - - SimpleTextEditor - - - Warning: loading from file discards current contents of the script. - - - - - Choose file - ファイルを選ぶ - - - - Could not open file %1 - ファイル %1 を開くことが出来ません - - - - SimpleTextEditor_q - - - Script Editor - スクリプトエディター - - - - OK - OK - - - - Cancel - 取り消し - - - - Import from file ... - ファイルからインポート ... - - - - SimpleTextView_q - - - Text viewer - テキストビュアー - - - - Object Name - オブジェクト名 - - - - Close - 閉じる - - - - StartTipDialog_q - - - Do not show this again - - - - - Close - 閉じる - - - - Welcome to Firewall Builder - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-family:'Lucida Grande'; font-size:28pt;">Firewall Builder %1</span></p></body></html> - - - - - Watch Getting Started Tutorial - - - - - Summary of features - - - - - Previous Tip - - - - - Next Tip - - - - - TCPServiceDialog_q - - - TCP - TCP - - - TCP Service - TCP サービス - - - - Name: - 名前: - - - - U - U - - - - TCP flags that must be set (see man iptables, option --tcp-flags) - - - - - Settings: - 設定: - - - - R - R - - - - P - P - - - - TCP flags that should be examined (see man iptables, option --tcp-flags) - - - - - Mask: - マスク: - - - - Flags: - フラグ: - - - - A - A - - - - S - S - - - - F - F - - - - Option "established" can be used if supported -by the target firewall platform - - - - - Established - 確立済み - - - - Source Port Range - 送信元ポート範囲 - - - - - Start: - 開始: - - - - - End: - 終了: - - - - Destination Port Range - 送信先ポート範囲 - - - - Comment: - コメント: - - - - TagServiceDialog_q - - - Form1 - - - - Tag Service - タグサービス - - - - Name: - 名前: - - - - Code: - コード: - - - - Comment: - コメント: - - - - TimeDialog_q - - - Time - 時間 - - - Time Interval - 時間間隔 - - - - Name: - 名前: - - - - Start date: - 開始日: - - - - - M/d/yyyy - - - - - Start time: - 開始時間: - - - - End date: - 終了日: - - - - End time: - 終了時間: - - - - Mon - - - - - Tue - - - - - Wed - - - - - Thu - - - - - Fri - - - - - Sat - - - - - Sun - - - - - Comment: - コメント: - - - - TutorialDialog_q - - - Tutorial - - - - - Reset - - - - - Previous - - - - - Next - 次へ - - - - Close - 閉じる - - - - UDPServiceDialog_q - - - UDP - UDP - - - UDP Service - UDP サービス - - - - Name: - 名前: - - - - Source Port Range - 送信元ポート幅 - - - - - Start: - 開始: - - - - - End: - 終了: - - - - Destination Port Range - 送信先ポート幅 - - - - Comment: - コメント: - - - - UserDialog_q - - - User - ユーザー - - - - Name: - 名前: - - - - User id: - ユーザー ID: - - - - Comment: - コメント: - - - - WorkflowIcons_q - - - Form - フォーム - - - - Create new -firewall - - - - - Import existing -configuration - - - - - Watch "Getting -Started" tutorial - - - - - askRuleNumberDialog_q - - - Enter New Position For The Rule - ルールの<新しい位置を入力する - - - - Enter new position for selected rules: - 選択されたルール群の新しい位置を入力する: - - - - &Move - 移動(&M) - - - - Alt+M - Alt+M - - - - &Cancel - 取り消し(&C) - - - - Alt+C - Alt+C - - - - asklibforcopydialog_q - - - Copying - コピーしています - - - - Object will be copied to library: - - - - - carpOptionsDialog - - - Input not valid: %1 - - - - - carpOptionsDialog_q - - - CARP protocol settings - - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - CARP Parameters - - - - - - CARP password - - - - - Virtual Host ID - - - - - VHID - - - - - Advertisement interval (sec) - - - - - Master advskew - - - - - Default advskew - - - - - clusterMembersDialog_q - - - cluster member configuration - - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Cluster - - - - - Manage member firewalls for this Cluster. Firewalls are considered valid members if they have the same host OS and platform as the Cluster object. They also need to have at minimum one physical interface attached. - - - - - Available Firewalls: - - - - - Tree of potential cluster members. Select an interface to assign to the cluster. - - - - - Firewall - ファイアウォール - - - - - Interface - インターフェース - - - - Label - ラベル - - - - - ... - - - - - Selected as Cluster-Members: - - - - - Table of already selected member firewalls with their assigned cluster interfaces. - - - - - Name - 名前 - - - - Master - - - - - colorLabelMenuItem_q - - - Orange - オレンジ色 - - - - Green - 緑色 - - - - Purple - 紫色 - - - - Blue - 青色 - - - - Yellow - 黄色 - - - - Gray - 灰色 - - - - Red - 赤色 - - - - No color - 色なし - - - - conntrackOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - 続ける(&C) - - - - conntrackOptionsDialog_q - - - conntrack protocol settings - - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - conntrack Parameters - - - - - Use unicast address for conntrackd - - - - - Address: - アドレス: - - - - Port number (udp): - - - - - debugDialog_q - - - Debugging Info - デバッグ情報 - - - - &Close - 閉じる(&C) - - - - Alt+C - Alt+C - - - - filePropDialog - - - Opened read-only - 読み込み専用で開いています - - - - Revision %1 - リビジョン %1 - - - - filePropDialog_q - - - File Properties - ファイルのプロパティ - - - - Location: - 場所: - - - - location - 場所 - - - - RO - 読み込み専用 - - - - Time of last modification: - 最終修正の時間: - - - - lastModified - 最終更新日時 - - - - Revision Control: - リビジョン制御: - - - - Revision: - リビジョン: - - - - rev - リビジョン - - - - Locked by user: - ユーザーがロック中: - - - - lockedBy - - - - - Revision history: - リビジョン履歴: - - - - Print - 印刷 - - - - OK - OK - - - - findDialog - - - Search hit the end of the object tree. - 検索のヒットがオブジェクトツリーの最後です。 - - - - &Continue at top - 続ける(&C) - - - - &Stop - 停止(&S) - - - - findDialog_q - - - Find Object - オブジェクト検索 - - - - Text to be found in object names: - - - - - Search in policy rules - ポリシールールから検索 - - - - Search in the tree - ツリーから検索 - - - - Find - 検索 - - - - Matching attribute: - - - - - Address - アドレス - - - - TCP/UDP port - TCP/UDP ポート - - - - Protocol number - プロトコル番号 - - - - ICMP type - ICMP の種類 - - - - Search for substring using regular expressions - - - - - findObjectWidget_q - - - Form1 - - - - Replace && Find - 置換と検索 - - - - Replace object - オブジェクトの置換 - - - Close - 閉じる - - - - Scope for search and replace : - 検索と置換のスコープ : - - - - Tree only - ツリーのみ - - - - Tree and policy of all firewalls - すべてのファイアウォールのポリシーとツリー - - - - Policy of all firewalls - すべてのファイアウォールのポリシー - - - - policy of the opened firewall - 開いているファイアウォールのポリシー - - - - Replace - 置換する - - - - Replace all - すべて置換する - - - Next - 次へ - - - - Find object - オブジェクト検索 - - - - Name - 名前 - - - - Address - アドレス - - - - TCP/UDP port - TCP/UDP ポート - - - - Protocol number - プロトコル番号 - - - - ICMP type - ICMP の種類 - - - - Use regular expressions - 正規表現を使う - - - - Find Next - - - - - Replace Current && Find Next - - - - - findWhereUsedWidget_q - - - Form1 - - - - - Object: - オブジェクト: - - - - Object is found in : - - - - - Used by - - - - Parent Object - 親オブジェクト - - - - Details - 詳細 - - - - Include children of the object in search. For example, if the object is a firewall, results will include all rules and groups using it, its interfaces and their addresses - - - - - Include children - - - - - Find - 検索 - - - Close - 閉じる - - - - Object - オブジェクト - - - Parent - - - - - freebsdAdvancedDialog_q - - - FreeBSD: advanced settings - FreeBSD: 高度な設定 - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Options - オプション - - - - - Packet forwarding - パケット転送 - - - - - - - No change - 変更なし - - - - - - - On - オン - - - - - - - Off - オフ - - - - Forward source routed packets - - - - - Generate ICMP redirects - ICMP リダイレクト生成 - - - - Path - パス - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - - - - - ipnat: - ipnat: - - - - sysctl: - sysctl: - - - - ipf: - ipf: - - - - ipfw: - ipfw: - - - - pfctl: - pfctl: - - - - heartbeatOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - 続ける(&C) - - - - heartbeatOptionsDialog_q - - - heartbeat protocol settings - - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - heartbeat Parameters - - - - - Heartbeat should be configured to use unicast address -of each firewall member for health checks. Firewall Builder -will add policy rules to permit these automatically. - - - - - Use unicast address for heartbeat - - - - - Address: - アドレス: - - - - Enter multicat address used for heartbeat health checks here. - - - - - Port number (udp): - - - - - instBatchOptionsDialog - - - Batch install options - - - - - instDialog - - - There are no firewalls to process. - - - - Unknown operation. - 不明な操作です。 - - - - Select firewalls to compile. - - - - - No files were generated, there is nothing to show. - - - - - <b>Multiple firewalls</b> - - - - - Policy installer uses Secure Shell to communicate with the firewall. -Please configure directory path to the secure shell utility -installed on your machine using Preferences dialog - - - - - - - - - &Continue - 続ける(&C) - - - - Last error: - - - - - The process failed to start - - - - - The process crashed some time after starting successfully. - - - - - The last waitFor...() function timed out. Elapsed time: %1 ms - - - - - An error occurred when attempting to write to the process. - - - - - An error occurred when attempting to read from the process. - - - - - An unknown error occurred. - - - - - Current state of QProcess: - - - - - The process is not running. - - - - - The process is starting, but the program has not yet been invoked. - - - - - The process is running and is ready for reading and writing. - - - - - Compiling rule sets for firewall: - - - - - - Compiling ... - コンパイル中... - - - - - Stop - 停止 - - - - Error: Failed to start program - エラー: プログラムの開始に失敗しました - - - - Firewall platform is not specified in this object. -Can't compile firewall policy. - ファイアウォールプラットフォームがこのオブジェクトで指定されていません。 -ファイアウォールポリシーをコンパイルできません。 - - - - Install firewall: - ファイアウォールインストール: - - - - - Installing ... - インストールしています... - - - - - Failure - 失敗 - - - - Success - 成功 - - - - <b>You are trying to compile policy for a firewall object that is a member of a cluster, however you requested compilation of only this member firewall and not the cluster it belongs to. Assuming firewall is standalone and not cluster member. Rules and parts of the script specific for the cluster configuration will not be generated.</b> - - - - - Firewall '%1' is member of cluster '%2' - - - - - - Error - エラー - - - - Cancelled - 取り消しました - - - Show details - 詳細を表示する - - - Hide details - 詳細を隠す - - - - Running command '%1' - - コマンド '%1' を実行しています - - - - Show selected - 選択の表示 - - - Show all - すべて表示する - - - - instDialog_q - - - TextLabel - テキストラベル - - - - <p align="center"><b><font size="+2">Select firewalls to compile and install.</font></b></p> - - - - - - warning text goes here - - - - - Select all - - - - - Select none - - - - - Inspect generated files - - - - - Perform batch install - - - - - Check this option if you want to install all selected firewalls automatically. This only works if you use the same user name and password to authenticate to all these firewalls. - - - - - Compile - コンパイル - - - - Install - インストール - - - - - Firewall - ファイアウォール - - - Library - ライブラリー - - - - Last Modified - 最終更新日時 - - - - Last Compiled - 最終コンパイル日時 - - - - Last Installed - 最終インストール日時 - - - All - すべて - - - None - なし - - - Show selected - 選択の表示 - - - - Stop - 停止 - - - - Progress - 処理中 - - - - Firewalls: - ファイアウォール: - - - - firewall - ファイアウォール - - - - current operation here - - - - Show Details - 詳細を表示する - - - - Process log - 処理ログ - - - - Save log to file - ファイルにログを保存する - - - - < &Back - < 戻る(&B) - - - - &Next > - 次へ(&N) > - - - - &Finish - 終了(&F) - - - - &Cancel - 取り消し(&C) - - - - instOptionsDialog - - - Install options for firewall '%1' - ファイアウォール「%」のオプションをインストールする - - - - instOptionsDialog_q - - - Install options - インストールのオプション - - - - <p align="center"><b><font size="+2">Install options for firewall '%1'</font></b></p> - - - - OK - OK - - - - Cancel - 取り消し - - - - min - 最小 - - - - Remember passwords for the duration of the session (passwords -are never stored permanently). To enable this option turn it on -in Preferences and configure user name used to authenticate to -the firewall in the "advanced" settings dialog of the firewall object. - - - - - Test run: run the script on the firewall but do not store it permanently. - - - - - Rebooting the firewall will restore its original policy. To cancel reboot, install the policy with "test run" option turned off - - - - - Schedule reboot in - - - - - If you install the policy in test mode, it will not be saved permanently, so you can revert to the last working configuration by rebooting the firewall - - - - - Cancel reboot if policy activation was successfull - - - - - Install - インストール - - - - Cancel All - - - - - Quiet install: do not print anything as commands are executed on the firewall - - - - - Verbose: print all commands as they are executed on the firewall - - - - - Remove comments from configuration - 設定からコメントを削除する - - - - Compress script - スクリプト圧縮 - - - - Store a copy of fwb file on the firewall - - - - - Address that will be used to communicate with the firewall: - - - - - Write configuration to standby PIX - - - - - Dry run (commands won't be executed on the firewall) - - - - - Store configuration diff in a file - - - - - Make a backup copy of the firewall configuration in this file: - - - - - Password or passphrase: - パスワードかパスフレーズ: - - - - User name: - ユーザー名: - - - - Enable password: - 有効なパスワード: - - - - Remember passwords - - - - - iosAdvancedDialog_q - - - IOS Advanced Configuration Options - - - - - General - 一般 - - - - Set router name using object's name - - - - - Generate commands to configure addresses for interfaces - - - - - OK - OK - - - - Cancel - 取り消し - - - - iosaclAdvancedDialog - - - - Script Editor - スクリプトエディター - - - - iosaclAdvancedDialog_q - - - IOS ACL Firewall Settings - - - - - OK - OK - - - - Cancel - 取り消し - - - - Compiler Options - コンパイラーオプション - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Policy Compiler Options - コンパイラーオプションのポリシー - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in the policy - - - - - Script Options - スクリプトオプション - - - - - Insert comments into generated IOSACL configuration file - - - - - Comment the code - コメントコード - - - - Group IOSACL commands in the script so that similar commands appear next to each other, just like IOSACL does it when you use 'show config' - - - - - Group similar commands together - - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via IPSEC tunnel. This is the way access lists were generated in older versions of Firewall Builder for IOSACL. - - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - Instead of running generated configuration on the router line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the router for this to work. This method works for IOS v12.4 or later and is much faster than running configuration line by line. - - - - - Copy generated configuration file to the router using scp - - - - - File system on the router where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "nvram:": - - - - - External install script - 外部インストールスクリプト - - - - Policy install script (using built-in installer if this field is blank): - インストールスクリプトのポリシー (この項目が空の場合に使用する組み込みインストーラー): - - - - Command line options for the script: - スクリプトのコマンドラインオプション: - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Logging - ログ記録 - - - - Generate logging commands - - - - - Syslog - Syslog - - - - Syslog host (name or IP address): - Syslog ホスト (名前か IP アドレス): - - - - syslog facility: - syslog ファシリティ: - - - - syslog level ('logging trap'): - syslog レベル ('logging trap'): - - - - The logging timestamp command requires that the clock command be set. - - - - - Enable logging timestamps on syslog file - syslog ファイルで日付の記録を有効にする - - - - Other logging destinations and levels: - その他のログ記録先とレベル: - - - - Internal buffer - 内部バッファ - - - - Console - コンソール - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - IPv4 の前に IPv6 - - - - IPv6 before IPv4 - IPv6 の前に IPv4 - - - - Compiler creates multiple access lists from the same policy, -two for each interface: one for inbound and another for -outbound. If the policy is written in a such way that no rule -can possibly be associated with an interface, this interface -gets no access list at all. Also, interfaces marked as -"unprotected" never get access list regardless of how the policy -rules are designed. - - - - - - Generate separate access list for each interface - - - - - Compiler creates one access list and assigns it to all -interfaces. - - - - - - Create one access list and attach it to all interfaces - - - - - Use object-group statements (requires IOS v12.4(20)T and later) - - - - - Always permit ssh access from the management workstation with this address: - - - - - Use ACL remarks - - - - - Do not clear access lists and object group, just generate IOSACL commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - ipcopAdvancedDialog - - - - Script Editor - スクリプトエディター - - - - ipcopAdvancedDialog_q - - - ipcop advanced settings - - - - - Compiler - コンパイラー - - - - Compiler: - コンパイラー: - - - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - rc.firewall.local - - - - - Assume firewall is part of 'any' - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Bridging firewall - ブリッジ中のファイアウォール - - - - Detect shadowing in policy rules - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - Enable support for NAT of locally originated connections - - - - - Make Tag and Classify actions terminating - タグと分類の設定操作を中断しました - - - - Default action on 'Reject': - - - - - Always permit ssh access from -the management workstation -with this address: - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - Directory on the firewall where script should be installed - - - - - /etc/rc.d/ - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - admin - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - /etc/rc.d/rc.firewall - - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - External install script - 外部インストールスクリプト - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Logging - ログ記録 - - - - use ULOG - - - - - use LOG - - - - - log TCP seq. numbers - - - - - log IP options - IP オプションをログ記録する - - - - use numeric syslog levels - 使用する syslog レベルの数値 - - - - Log level: - ログレベル: - - - - log TCP options - - - - - cprange - - - - - queue threshold: - キュー閾値: - - - - netlink group: - ネットリンクグループ: - - - - Log prefix: - ログ接頭語: - - - - Logging limit: - ログ記録制限: - - - - Activate logging in all rules -(overrides rule options, use for debugging) - すべてのルールのログを記録する -(ルールオプションを上書きします。デバッグで使います) - - - - Script - スクリプト - - - - These options enable auxiliary sections in the generated shell script. - - - - - Turn debugging on in generated script - - - - - Verify interfaces before loading firewall policy - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - IPv4 の前に IPv6 - - - - IPv6 before IPv4 - IPv6 の前に IPv4 - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - ipcoposAdvancedDialog_q - - - IPCOP: advanced settings - - - - - Options - オプション - - - - IPv4 Packet forwarding - IPv4 パケット転送 - - - - - - - - - - - - - - - - - - - No change - 変更なし - - - - - - - - - - - - - - - - - - - On - オン - - - - - - - - - - - - - - - - - - - Off - オフ - - - - IPv6 Packet forwarding - IPv6 パケット転送 - - - - Kernel anti-spoofing protection - - - - - Ignore broadcast pings - - - - - Ignore all pings - - - - - Accept source route - - - - - Accept ICMP redirects - ICMP リダイレクトの受理 - - - - Ignore bogus ICMP errors - - - - - Allow dynamic addresses - ダイナミックアドレス群の許可 - - - - Log martians - - - - - whats this text - whats this comment - このテキストは何 - - - - TCP - TCP - - - - These parameters make sense for connections to or from the firewall host - - - - - TCP sack - TCP sack - - - - TCP window scaling - TCP ウィンドウスケーリング - - - - TCP ECN - TCP ECN - - - - TCP SYN cookies - TCP SYN クッキー - - - - TCP keepalive time (sec) - - - - - TCP fack - TCP fack - - - - TCP timestamps - TCP タイムスタンプ - - - - TCP FIN timeout (sec) - TCP FIN タイムアウト(秒) - - - - Path - パス - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - - - - - iptables: - iptables: - - - - :ip6tables - :ip6tables - - - - ip: - ip: - - - - vconfig - - - - - brctl - - - - - ifenslave - - - - - logger: - logger: - - - - modprobe: - modprobe: - - - - lsmod - lsmod - - - - iptables-restore: - iptables-restore: - - - - :ip6tables-restore - :ip6tables-restore - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - ipfAdvancedDialog - - - - Script Editor - スクリプトエディター - - - - ipfAdvancedDialog_q - - - ipf: advanced settings - ipf: 高度な設定 - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Protocol Helpers - プロトコルヘッダー - - - - Use raudio proxy in NAT rules - NAT ルールで raudio を使用する - - - - Use h323 proxy in NAT rules - NAT ルールで h323 プロキシーを使う - - - - Use ipsec proxy in NAT rules - NAT ルールで ipsec プロキシーを使う - - - - Use ftp proxy in NAT rules - NAT ルール中で ftp プロキシーを使用する - - - - Use rcmd proxy in NAT rules - NAT ルールで rcmd プロキシーを使う - - - - Use PPTP proxy in NAT rules - NAT ルールで PPTP プロキシーを使う - - - - Use IRC proxy in NAT rules for DCC - DCC 用の NAT ルールで IRC プロキシーを使う - - - - Some protocols involve multiple associated network connections. Firewall can keep track of such connections automatically if you activate one or all of the following options: - - - - - Compiler - コンパイラー - - - - Compiler: - コンパイラー: - - - - Masquerade returned icmp as being from original -packet's destination - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Find and eliminate duplicate rules - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in policy - ポリシー中の隠れたルールを検出する - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - Default action on 'Reject': - 「Reject(拒否)」標準動作: - - - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - Always permit ssh access from the management - workstation with this address: - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - Directory on the firewall where configuration files should be installed - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - External install script - 外部インストールスクリプト - - - - Policy install script (using built-in installer if this field is blank): - ポリシーインストールスクリプト (もしこのフィールドがブランクの時に使用する組み込みインストーラー) - - - - Command line options for the script: - スクリプトのコマンドラインオプション: - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Logging - ログ記録 - - - - Log facility: - ログファシリティ: - - - - Log level: - ログレベル: - - - - Log packet body - ログパケット本体 - - - - Block if can not log - - - - - Script Options - スクリプトオプション - - - - Add virtual addresses for NAT - NAT 用バーチャルアドレスの追加 - - - - Configure Interfaces of the firewall machine - ファイアウォールマシンのインターフェース構成 - - - - Turn debugging on in generated script - 生成スクリプトでデバッグに切り替え - - - - If this option is on, policy compiler adds virtual addresses to the interfaces to make the firewall answer to ARP queries for addresses used in NAT rules. - - - - - Optimization - 最適化 - - - - These options enable auxiliary sections in the generated shell script. - - - - - Determine addresses of dynamic interfaces at run time - - - - - IPv6 - IPv6 - - - - Enable IPv6 support - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - IPv4 の前に IPv6 - - - - IPv6 before IPv4 - IPv6 の前に IPv4 - - - - Use Kerberos rcmd proxy in NAT rules - - - - - Use Kerberos ekshell proxy in NAT rules - - - - - Output file name. If left blank, the file name is constructed of the firewall object name and extension ".fw" - - - - - Generated script (.fw file) and configuration (.conf) files can be copied to the firewall machine under different names. If these fields are left blank, the file name does not change. - - - - - Script (.fw) file name on the firewall - - - - - ipf.conf file name on the firewall - - - - - nat.conf file name on the firewall - - - - - ipfwAdvancedDialog - - - - Script Editor - スクリプトエディター - - - - ipfwAdvancedDialog_q - - - ipfw: advanced settings - ipfw: 高度な設定 - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Compiler - コンパイラー - - - - Compiler: - コンパイラー: - - - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Add rule to accept packets matching dynamic rules created for -known sessions on top of the policy (action 'check-state') - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in policy - ポリシー中の隠れたルールを検出する - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - Always permit ssh access from -the management workstation -with this address: - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - Directory on the firewall where script should be installed - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - External install script - 外部インストールスクリプト - - - - Policy install script (using built-in installer if this field is blank): - インストールスクリプトのポリシー (この項目が空の場合に使用する組み込みインストーラー): - - - - Command line options for the script: - スクリプトのコマンドラインオプション: - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Script Options - スクリプトオプション - - - - Add virtual addresses for NAT - NAT 用バーチャルアドレス群の追加 - - - - Configure Interfaces of the firewall machine - ファイアウォールマシンのインターフェース構成 - - - - Turn debugging on in generated script - 生成スクリプトでデバッグに切り替え - - - - These options enable auxiliary sections in the generated shell script. - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - IPv4 の前に IPv6 - - - - IPv6 before IPv4 - IPv6 の前に IPv4 - - - - Generated script can be copied to the firewall machine under different name. If this field is left blank, the file name does not change. - - - - - Script name on the firewall - - - - - iptAdvancedDialog - - - - Script Editor - スクリプトエディター - - - - iptAdvancedDialog_q - - - iptables: advanced settings - iptables: 高度な設定 - - - - Compiler - コンパイラー - - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - Accept ESTABLISHED and RELATED packets before the first rule - - - - - Bridging firewall - ブリッジ中のファイアウォール - - - - Detect shadowing in policy rules - - - - - Assume firewall is part of 'any' - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Enable support for NAT of locally originated connections - - - - - Compiler: - コンパイラー: - - - - Drop packets that are associated with -no known connection - - - - - and log them - - - - - Clamp MSS to MTU - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - Default action on 'Reject': - 「Reject(拒否)」の標準動作: - - - - Make Tag and Classify actions terminating - タグと分類の設定操作を中断しました - - - - Compiler will automatically generate rules to permit ICMP6 packets used in IPv6 -Neighbor Discovery after the rules that accept ESTABLISHED,RELATE and before -the rule that drops packets in state INVALID. - - - - - Always permit ssh access from the management workstation with this address: - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - Directory on the firewall where script should be installed - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - External install script - 外部インストールスクリプト - - - - Policy install script (using built-in installer if this field is blank): - ポリシーインストールスクリプト (もしこのフィールドがブランクの時に使用する組み込みインストーラー) - - - - Command line options for the script: - スクリプトのコマンドラインオプション: - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Insert prolog script - prolog スクリプトの挿入 - - - - on top of the script - - - - - after interface configuration - インターフェース設定の後 - - - - after policy reset - ポリシーリセットの後 - - - - Logging - ログ記録 - - - - use ULOG - ULOG を使う - - - - use LOG - LOG を使う - - - - log TCP seq. numbers - TCP シーケンス番号を記録する - - - - log IP options - IP オプションをログ記録する - - - - use numeric syslog levels - 使用する syslog レベルの数値 - - - - Log level: - ログレベル: - - - - log TCP options - TCP オプションを記録する - - - - cprange - - - - - queue threshold: - キュー閾値: - - - - netlink group: - ネットリンクグループ: - - - - Log prefix: - ログ接頭語: - - - - Logging limit: - ログ記録制限: - - - - Activate logging in all rules -(overrides rule options, use for debugging) - すべてのルールのログを記録する -(ルールオプションを上書きします。デバッグで使います) - - - - Script - スクリプト - - - - iptables-restore replaces firewall policy in one atomic transaction - - - - - Use iptables-restore to activate policy - - - - - Add virtual addresses for NAT - NAT 用バーチャルアドレス群の追加 - - - Load modules - モジュール読み込み - - - - Verify interfaces before loading firewall policy - ファイアウォールポリシーを読み込む前にインターフェースの確認 - - - - Turn debugging on in generated script - 生成スクリプトでデバッグに切り替え - - - - Compiler command line options: - - - - - Output file name: - - - - - If output file name is left blank, the file name is constructed of the firewall object name and extension ".fw" - - - - - Add rules to accept IPv6 Neighbor Discovery -packets to IPv6 policies - - - - - Use module "set" for run-time Address Table objects (module is only available in iptables v 1.4.1.1 and later) - - - - - Install the rule for ssh access from the management workstation when the firewall script is run with the "block" command - - - - - Load iptables modules - - - - - If debugging is turned on, the script will run with shell option "-x" that makes it print every command it executes. Warning: this produces a lot of debugging output. - - - - - Managing interfaces and addresses - - - - - Configure Interfaces of the firewall machine - ファイアウォールマシンのインターフェース構成 - - - - Clear ip addresses and bring down interfaces not configured in fwbuilder - - - - - Generated script can load rules one by one by calling iptables command line utility, or activate them all at once using iptables-restore. In both cases you just run the script with command line parameter "start" to activate the policy, the script will use iptables-restore automatically if this checkbox is on - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - IPv4 の前に IPv6 - - - - IPv6 before IPv4 - IPv6 の前に IPv4 - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - This adds a rule on top of the policy with iptables target TCPMSS -and option --clamp-mss-to-pmtu. Generation of this command is -version-dependent and also depends on the setting of ip or ipv6 forwarding -in host settings dialog. - - - - - - Generated script can be copied to the firewall machine under different name. If this field is left blank, the file name does not change. - - - - - Script name on the firewall: - - - - - Configure VLAN Interfaces - - - - - Configure bridge Interfaces - - - - - Configure bonding Interfaces - - - - - linksysAdvancedDialog_q - - - Linksys/Sveasoft: advanced settings - Linksys/Sveasoft: 高度な設定 - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Path - パス - - - - modprobe: - modprobe: - - - - logger: - logger: - - - - ip: - ip: - - - - lsmod - lsmod - - - - iptables: - iptables: - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - - - - - Prompts - プロンプト - - - - Policy installer relies on the shell prompt on the firewall to execute commands. Installer tries both prompt string patterns configured here; it assumes that the firewall is ready to accept a command if either prompt matches. You should only need to change these string patterns if Sveasoft changes the shell prompt in the future releases of the software. -<br> -<br> -The default strings work for Sveasoft Alchemy pre-5.1 and pre-5.2 - - - - - Use default prompts - 標準プロンプトを使う - - - - prompt 2 - プロンプト2 - - - - prompt 1 - プロンプト1 - - - - vconfig - - - - - brctl - - - - - ifenslave - - - - - linux24AdvancedDialog_q - - - Linux 2.4: advanced settings - Linux 2.4: 高度な設定 - - - - Options - オプション - - - - IPv4 Packet forwarding - IPv4 パケット転送 - - - - - - - - - - - - - - - - - - - - No change - 変更なし - - - - - - - - - - - - - - - - - - - - On - オン - - - - - - - - - - - - - - - - - - - - Off - オフ - - - - IPv6 Packet forwarding - IPv6 パケット転送 - - - - Kernel anti-spoofing protection - カーネルの spoofing 対策防御 - - - - Ignore broadcast pings - ブロードキャスト ping の無視 - - - - Ignore all pings - すべての ping の無視 - - - - Accept source route - ソースルートの受理 - - - - Accept ICMP redirects - ICMP リダイレクトの受理 - - - - Ignore bogus ICMP errors - bogus ICMP エラーの無視 - - - - Allow dynamic addresses - ダイナミックアドレス群の許可 - - - - Log martians - - - - - whats this text - whats this comment - このテキストは何 - - - - TCP - TCP - - - - These parameters make sense for connections to or from the firewall host - - - - - TCP sack - TCP sack - - - - TCP window scaling - TCP ウィンドウスケーリング - - - - TCP ECN - TCP ECN - - - - TCP SYN cookies - TCP SYN クッキー - - - - TCP keepalive time (sec) - TCP キープアライブ (秒) - - - - TCP fack - TCP fack - - - - TCP timestamps - TCP タイムスタンプ - - - - TCP FIN timeout (sec) - TCP FIN タイムアウト(秒) - - - - Path - パス - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - - - - - iptables: - iptables: - - - - :ip6tables - :ip6tables - - - - ip: - ip: - - - - logger: - logger: - - - - vconfig: - - - - - brctl: - - - - - ifenslave: - - - - - modprobe: - modprobe: - - - - lsmod: - - - - - ipset: - - - - lsmod - lsmod - - - - iptables-restore: - iptables-restore: - - - - :ip6tables-restore - :ip6tables-restore - - - - This parameter is used if you run conntrackd in state <br> -synchronization mode for a firewall cluster and have<br> -kernel &lt;2.6.22<br> -Explanation of this parameter can be found at<br> -<a href="http://conntrack-tools.netfilter.org/manual.html">http://conntrack-tools.netfilter.org/manual.html</a> - - - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - conntrack - - - - - CONNTRACK_MAX - - - - - CONNTRACK_MAX is the maximum number of "sessions" (connection tracking entries) -that can be handled simultaneously by netfilter in kernel memory. - - - - - HASHSIZE - - - - - the size of the hash table storing the lists of conntrack entries - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">These parameters allow you to tune performance of<br />conntrack module (netfilter state tracking). This<br />should only be necessary for large firewalls with a lot<br />of traffic and many stateful rules.<br />Explanation of these parameters can be found on</p> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">the Internet if you search for &quot;netfilter conntrack performance&quot;<br /><br />Set both to zero to use default values</p></body></html> - - - - - Disable TCP window tracking ("ip_conntrack_tcp_be_liberal") - - - - - linux24IfaceOptsDialog - - - Input not valid: %1 - - - - - linux24IfaceOptsDialog_q - - - Linux: interface settings - - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Options - オプション - - - - Device Type - - - - - VLAN ID - - - - - Enable STP - - - - - Bonding policy: - - - - - balance-rr - - - - - active-backup - - - - - balance-xor - - - - - broadcast - - - - - 802.3ad - - - - - balance-tlb - - - - - balance-alb - - - - - Xmit hash policy: - - - - - layer2 - - - - - layer3+4 - - - - - Other parameters: - - - - - longTextDialog_q - - - longTextDialog_q - - - - - Continue - 続ける - - - - this is the error text - これはエラーテキストです - - - - macosxAdvancedDialog_q - - - MacOS X: advanced settings - Mac OS X: 高度な設定 - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Options - オプション - - - - Generate ICMP redirects - ICMP リダイレクト生成 - - - - Packet forwarding - パケット転送 - - - - - - No change - 変更なし - - - - - - On - オン - - - - - - Off - オフ - - - - Forward source routed packets - - - - - Path - パス - - - - ipfw: - ipfw: - - - - sysctl: - sysctl: - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - - - - - newClusterDialog - - FWBuilder template files - ファイアウォールビルダー用テンプレートファイル - - - FWBuilder template files (*.xml *.fwb) - ファイアウォールビルダー用テンプレートファイル (*.xml *.fwb) - - - Interface: %1 (%2) - インターフェース: %1 (%2) - - - Illegal address '%1/%2' - 不当なアドレス 「%1/%2」 - - - - do not use any, i will create new policy and NAT rules - - - - - Depending on the failover protocol, cluster interface may or may not need an IP address. <b>VRRP</b>, <b>CARP</b>, <b>heartbeat</b> interfaces should have their own unique IP addresses different from the member firewall interfaces. Other failover protocols such as the one used in <b>Cisco ASA (PIX) firewall</b> do not require additional IP address.<br><br>List of available failover protocols depends on the firewall platform. - Depending on the failover protocol, cluster interface may or may not need an IP address. <b>VRRP</b> and <b>CARP</b> interfaces should have their own unique IP addresses different from the member firewall interfaces. Other failover protocols such as <b>heartbeat</b> or <b>OpenAIS</b> do not create new interface and therefore do not require additional IP address. <br><br>List of available failover protocols depends on the firewall platform. - - - - - regular - - - - - dynamic - - - - - unnumbered - - - - - with address: - - - - - with addresses: - - - - - You should select at least one firewall to create a cluster - - - - - newClusterDialog_q - - - TextLabel - テキストラベル - - - - Enter the name of the new object - - - - Template file: - テンプレートファイル: - - - Use standard template library - 標準テンプレートライブラリーを使う - - - Name - 名前 - - - Label - ラベル - - - Address - アドレス - - - Netmask - ネットマスク - - - Name: - 名前: - - - Address: - アドレス: - - - Netmask: - ネットマスク: - - - Label: - ラベル: - - - Delete - 削除 - - - Update - 更新 - - - Add - 追加 - - - - < &Back - < 戻る(&B) - - - - &Next > - 次へ(&N) > - - - - &Finish - 終了(&F) - - - - &Cancel - 取り消し(&C) - - - - Select member firewall objects to use with the new cluster. One member firewall should be marked as master. You can choose to copy policy and NAT rules from the rule sets of one of the members to the new cluster later. - - - - - Firewall - ファイアウォール - - - - Use in cluster - - - - - Master - - - - - - Tab 1 - タブ 1 - - - - Choose which member's policy and NAT rules should be used to create policy and nat rules of the cluster. First, each member firewall object will be copied with the name "<firewall>-bak" (where <firewall> is the name of the member) for backup, then rules from the chosen member will be copied to the new cluster and finally all policy and NAT rules will be deleted in both members. Backup firewall objects ensure that you do not lose your configuration and can always revert back if necessary. You can delete backup objects or move them to a separate library for archival later. - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:13pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-weight:600;">Cluster summary:</span></p></body></html> - - - - - Name: - - - - - Firewalls used in this cluster - - - - - Master firewall: - - - - - Cluster interfaces - - - - - Policy and NAT rules will be copied from firewall: - - - - - Click Finish to create this cluster. - - - - - newFirewallDialog - - - FWBuilder template files - ファイアウォールビルダー用テンプレートファイル - - - FWBuilder template files (*.xml *.fwb) - ファイアウォールビルダー用テンプレートファイル (*.xml *.fwb) - - - - Missing SNMP community string. - SNMP コミュニティ文字列が足りません。 - - - - - Address of %1 could not be obtained via DNS - - - - - Interface: %1 (%2) - インターフェース: %1 (%2) - - - - Dynamic address - ダイナミックアドレス - - - - Unnumbered interface - アンナンバードインターフェース - - - Bridge port - ブリッジポート - - - Illegal address '%1/%2' - 不当なアドレス 「%1/%2」 - - - - FWBuilder template files (*.xml *.fwb *.fwl) - - - - - Please select template - - - - - - &Continue - 続ける(&C) - - - - Dynamic interface gets its IP address by means of DHCP or PPP protocol and does not require an address here. Regular interface has statically configured IP address which should be entered on this page. Interface can have several IPv4 and IPv6 addresses. - - - - - Error loading template library: -%1 - - - - - Here you can change IP address of the template interface to match addresses used on your network. Interface can have several IPv4 and IPv6 addresses. - - - - - - - Invalid address '%1/%2' - - - - - Can not find interface %1 in the interface editor data - - - - - newFirewallDialog_q - - - TextLabel - テキストラベル - - - - Enter the name of the new object below: - 新しいオブジェクトの名前を入力してください: - - - - Choose firewall software it is running: - 実行中のファイアウォールソフトウェアの選択してください: - - - - Choose OS the new firewall runs on: - 新規ファイアウォールを実行する OS を選択してください: - - - - Use preconfigured template firewall objects - あらかじめ設定されたテンプレートオブジェクトを使用する - - - - Template file: - テンプレートファイル: - - - - Browse - 参照 - - - - Use standard template library - 標準テンプレートライブラリーを使う - - - - Next step is to add interfaces to the new firewall. There are two ways to do it: using SNMP query or manually. Adding them using SNMP query is fast and automatic, but is only possible if firewall runs SNMP agent and you know SNMP community string 'read'. - - - - - Configure interfaces manually - インターフェースを手動設定する - - - - Use SNMP to discover interfaces of the firewall - SNMP を使用し、ファイアウォールのインターフェースを検出する - - - - Discover Interfaces using SNMP - SNMP を用いてインターフェースを検出する - - - - SNMP 'read' community string: - SNMP「read」コミュニティ文字列: - - - - Firewall IP address: - - - - - - 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. Label is mandatory for PIX firewall. - - - - Here you can add or edit interfaces manually. 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. Label is mandatory for PIX firewall. - ;; - - - Click 'Next' when done. - 「次へ」をクリックすると処理します。 - - - - Name - 名前 - - - - Label - ラベル - - - - Address - アドレス - - - Netmask - ネットマスク - - - Dyn - Dyn - - - MAC - MAC - - - Name: - 名前: - - - Address: - アドレス: - - - Netmask: - ネットマスク: - - - MAC: - MAC: - - - Label: - ラベル: - - - Bridge port - ブリッジポート - - - Unnumbered interface - アンナンバードインターフェース - - - Dynamic address - ダイナミックアドレス - - - Regular interface - レギュラーインターフェース - - - Delete - 削除 - - - Update - 更新 - - - Add - 追加 - - - - up - - - - - down - - - - - Security Level - セキュリティレベル - - - Click 'Finish' when done. - 「終了を」をクリックすると処理します。 - - - - In order to be able to build firewall policy properly, Firewall Builder needs information about 'security level' of the firewall's interfaces. Interface that connects it to the Internet is considered 'insecure' and has security level '0', while interface connected to the internal network is supposed to be 'secure' (security level '100'). You can arrange interfaces in the order of their security level below. - - - - - Choose template object in the list and click 'Next' when ready. - -You can change interface names and their IP addresses on the next page. Template firewall object comes with basic policy and NAT rules that implement policy described in its comment. If you change IP addresses of its interfaces, policy and NAT rules will be automatically corrected to reflect this change. However you should always inspect the rules and adjust them to suite your security policy. Template objects are designed to be a starting point, a way to jump-start your configuration and most likely require changes to be useful in your environment. - - - - - - < &Back - < 戻る(&B) - - - - &Next > - 次へ(&N) > - - - - &Finish - 終了(&F) - - - - &Cancel - 取り消し(&C) - - - - - Tab 1 - タブ 1 - - - - newGroupDialog_q - - - New Group - 新規グループ - - - - Library: - ライブラリー: - - - - Group Name: - グループ名: - - - - This operation will create a new group and put selected objects in it - - - - - Create a group - グループ作成 - - - - Cancel - 取り消し - - - - newHostDialog - - - FWBuilder template files - ファイアウォールビルダー用テンプレートファイル - - - - FWBuilder template files (*.xml *.fwb) - ファイアウォールビルダー用テンプレートファイル (*.xml *.fwb) - - - - Missing SNMP community string. - SNMP コミュニティ文字列が足りません。 - - - - Address of %1 could not be obtained via DNS - - - - - Interface: %1 (%2) - インターフェース: %1 (%2) - - - - Dynamic address - ダイナミックアドレス - - - - Unnumbered interface - アンナンバードインターフェース - - - - - - Illegal address '%1/%2' - 不当なアドレス 「%1/%2」 - - - - newHostDialog_q - - - TextLabel - テキストラベル - - - - Enter the name of the new object below: - 新しいオブジェクトの名前を入力してください: - - - - Use preconfigured template host objects - 事前定義されたホストオブジェクトテンプレートを使う - - - - Template file: - テンプレートファイル: - - - - Browse - 参照 - - - - Use standard template library - 標準テンプレートライブラリーを使う - - - - Next step is to add interfaces to the new host. There are two ways to do it: using SNMP query or manually. Adding them using SNMP query is fast and automatic, but is only possible if the host runs SNMP agent and you know SNMP community string 'read'. - - - - - Configure interfaces manually - インターフェースを手動設定する - - - - Use SNMP to discover interfaces of the host - SNMP を使用し、ホストのインターフェースを検出する - - - - Discover Interfaces using SNMP - SNMP を用いてインターフェースを検出する - - - - SNMP 'read' community string: - SNMP「read」コミュニティ文字列: - - - - Here you can add or edit interfaces manually. 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. - - - - - Check option 'Unnumbered interface' for the interface that does not have an IP address. Examples of interfaces of this kind are those used to terminate PPPoE or VPN tunnels. - - - - - Check option 'dynamic address' for the interface that gets its IP address dynamically via DHCP or PPP protocol. - - - - - Click 'Next' when done. - 「次へ」をクリックすると処理します。 - - - Name: - 名前: - - - Label: - ラベル: - - - Address: - アドレス: - - - Unnumbered interface - アンナンバードインターフェース - - - Name - 名前 - - - Label - ラベル - - - Address - アドレス - - - Netmask - ネットマスク - - - Dyn - Dyn - - - MAC - MAC - - - MAC: - MAC: - - - Dynamic address - ダイナミックアドレス - - - Netmask: - ネットマスク: - - - Add - 追加 - - - Update - 更新 - - - Delete - 削除 - - - - Choose template object in the list and click 'Finish' when ready. Template objects use generic interface names that will be iherited by the firewall object you create. You may need to rename them later to reflect real names of interfaces on your firewall machine. - - - - - < &Back - < 戻る(&B) - - - - &Next > - 次へ(&N) > - - - - &Finish - 終了(&F) - - - - &Cancel - 取り消し(&C) - - - - Tab 2 - タブ 2 - - - - openaisOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - 続ける(&C) - - - - openaisOptionsDialog_q - - - openais protocol settings - - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - openais Parameters - - - - - Address: - アドレス: - - - - Port number (udp): - - - - - openbsdAdvancedDialog_q - - - OpenBSD: advanced settings - OpenBSD: 高度な設定 - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Options - オプション - - - - IPv4 Packet forwarding - IPv4 パケット転送 - - - - - - - - No change - 変更なし - - - - - - - - On - オン - - - - - - - - Off - オフ - - - - IPv6 Packet forwarding - IPv6 パケット転送 - - - - Enable directed broadcast - ダイレクトブロードキャストを入力する - - - - Forward source routed packets - - - - - Generate ICMP redirects - ICMP リダイレクト生成 - - - - Path - パス - - - - pfctl: - pfctl: - - - - sysctl: - sysctl: - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - - - - - openbsdIfaceOptsDialog_q - - - OpenBSD: interface settings - - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Options - オプション - - - - Device Type - - - - - VLAN ID - - - - - Enable STP - - - - - pageSetupDialog_q - - - Page Setup - ページ設定 - - - - start each section on a new page - 新規ページで各セクションを開始する - - - - print header on every page - 各ページにヘッダーを印刷する - - - - print legend - 凡例を印刷する - - - - print objects used in rules - ルールで使用したオブジェクトを印刷する - - - - &OK - &OK - - - - Alt+O - Alt+O - - - - &Cancel - 取り消し(&C) - - - - Alt+C - Alt+C - - - - Scale tables: - テーブルスケール: - - - 50% - 50% - - - 75% - 75% - - - 100% - 100% - - - 150% - 150% - - - 200% - 200% - - - - TextLabel - テキストラベル - - - - pfAdvancedDialog - - - - Script Editor - スクリプトエディター - - - - pfAdvancedDialog_q - - - pf: advanced settings - pf: 高度な設定 - - - - Compiler - コンパイラー - - - - Compiler: - コンパイラー: - - - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - Accept TCP sessions opened prior to firewall restart - - - - - Modulate state for all stateful rules (applies only to TCP services) - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in policy - ポリシー中の隠れたルールを検出する - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - Optimization: - 最適化: - - - - Always permit ssh access from -the management workstation -with this address: - - - - - Scrub - - - - - Clears the don't fragment bit from the IP packet header. - - - - - Clear DF bit - DF ビット解除 - - - - Replaces the IP identification field of outgoing packets with random values to compensate for operating systems that use predictable values. - - - - - Use random ID - ランダム ID を使う - - - - Enforce Minimum TTL: - TTL 最小値の強化: - - - - Enforces a minimum Time To Live (TTL) in IP packet headers. - - - - - Enforce Maximum MSS: - MSS 最大値の強化: - - - - Enforces a maximum Maximum Segment Size (MSS) in TCP packet headers. - - - - - Reassemble fragments - - - - - Buffer and reassemble fragments (default) - - - - - Drop duplicate fragments, do not buffer and reassemble - - - - - Drop duplicate and subsequent fragments - - - - - Statefully normalises TCP connections. - - - - - Reassemble TCP - - - - - Limits - 制限 - - - - maximum number of entries in the memory pool used for packet reassembly - - - - - table-entries - テーブルエントリー - - - - maximum number of addresses that canbe stored in tables - - - - - maximum number of entries in the memory pool used for state table entries - - - - - state table size: - ステートテーブルの大きさ: - - - - reassembly pool: - - - - - maximum number of entries in the memory pool used for tracking source IP addresses - - - - - maximum number of tables that can exist in the memory simultaneously - - - - - tables - テーブル - - - - src-nodes - - - - - Timeouts - タイムアウト - - - - When a packet matches a stateful connection, the seconds to live for the connection will be updated to the value which corresponds to the connection state. - - - - - TCP - TCP - - - - - - - first - first - - - - - - - - - The state after the first packet. - - - - - opening - opening - - - - The state before the destination host ever sends a packet. - - - - - established - 確立済み - - - - The fully established state. - 完全な確立状態です。 - - - - The state after the first FIN has been sent. - - - - - closing - closing - - - - The state after both FINs have been exchanged and the connection is closed. - - - - - finwait - finwait - - - - The state after one endpoint sends an RST. - - - - - closed - closed - - - - UDP - UDP - - - - - single - single - - - - The state if the source host sends more than one packet but the destination host has never sent one back. - - - - - - multiple - multiple - - - - The state if both hosts have sent packets. - - - - - ICMP - ICMP - - - - The state after an ICMP error came back in response to an ICMP packet. - - - - - error - error - - - - Other Protocols - その他のプロトコル - - - - Fragments - フラグメント - - - - reassembly timeout - 組み換えのタイムアウト - - - - state expiration timeout - - - - - seconds between purges of expired states and packet fragments. - - - - - seconds before an unassembled fragment is expired. - - - - - Adaptive scaling - - - - - (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Output file name: - - - - - Buffers incoming packet fragments and reassembles them into a complete packet before passing them to the filter engine. In PF 4.5 and earlier. - - - - - Causes duplicate fragments to be dropped and any overlaps to be cropped. In PF 4.5 and earlier. - - - - - Similar to 'Drop duplicate fragments' except that all duplicate or overlapping fragments will be dropped as well as any further corresponding fragments. In PF 4.5 and earlier. - - - - - Timeout values can be reduced adaptively as the number of state table entries grows (see man page pf.conf(5) for details) - - - - - adaptive start - - - - - When the number of state entries exceeds this value, adaptive scaling begins. - - - - - adaptive end - - - - - When reaching this number of state entries, all timeout val- ues become zero, effectively purging all state entries imme- diately. - - - - - Activate adaptive timeout scaling - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - Directory on the firewall where script should be installed - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - External install script - 外部インストールスクリプト - - - - Policy install script (using built-in installer if this field is blank): - インストールスクリプトのポリシー (この項目が空の場合に使用する組み込みインストーラー): - - - - Command line options for the script: - スクリプトのコマンドラインオプション: - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Insert prolog and epilog scripts - - - - - in the activation shell script (.fw file) - - - - - in the pf rule file (.conf file) - - - - - Logging - ログ記録 - - - - Log Prefix - ログ接頭語 - - - - Fallback "deny all" rule should log blocked packets - - - - - Script - スクリプト - - - - Add virtual addresses for NAT - NAT 用バーチャルアドレス群の追加 - - - - Configure Interfaces of the firewall machine - ファイアウォールマシンのインターフェース構成 - - - - Turn debugging on in generated script - 生成スクリプトでデバッグに切り替え - - - - These options enable auxiliary sections in the generated shell script. - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - IPv4 の前に IPv6 - - - - IPv6 before IPv4 - IPv6 の前に IPv4 - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Flush pf states after reloading rules - - - - - Generated script (.fw file) and configuration (.conf) file can be copied to the firewall machine under different names. If these fields are left blank, the file name does not change. - - - - - Script (.fw) file name on the firewall - - - - - .conf file name on the firewall - - - - - Configure CARP Interfaces - - - - - Configure pfsync Interfaces - - - - - Configure VLAN Interfaces - - - - - State policy: - - - - - States can be bound to interfaces or match packets on any interface. The latter can be useful in case of an assymmetric routing. - - - - - pfsyncOptionsDialog_q - - - pfsync protocol settings - - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - pfsync Parameters - - - - - By default pfsync updates are multicast on the local network. This option overrides that behavior and instead unicasts the update to the specified peer. - - - - - Use unicast address to communicate with the peer - - - - - pixAdvancedDialog - - Compiler error - コンパイラーエラー - - - - - Script Editor - スクリプトエディター - - - - pixAdvancedDialog_q - - - PIX Firewall Settings - PIX ファイアウォール設定 - - - - OK - OK - - - - Cancel - 取り消し - - - - Compiler - コンパイラー - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Policy Compiler Options - ポリシーコンパイラーオプション - - - - Generate rules assuming the firewall is part of "Any". This makes a difference in rules that use services 'ssh' and 'telnet' since PIX uses special commands to control ssh and telnet access to the firewall machine - - - - - Assume firewall is part of 'any' - - - - - PIX inspects packets with ACLs before it does NAT, while many other firewalls do NAT first and then apply ACLs. Policy compiler can emulate the latter behaviour if this options is turned on. - - - - - Normally PIX does not support ouotbound ACL, however policy compiler can emulate them if this option is turned on - - - - - Emulate outbound ACLs - - - - - Generate outbound ACLs - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - In nat rules where network zone object is used in OSrc, ODst and OSrv are 'any' and TSrc defines a global pool for the translation, replace object in OSrc with 'any' to produce PIX command "nat (interface) N 0.0.0.0 0.0.0.0" - - - - - Optimize 'default nat' rules - 「default nat」ルールを最適化する - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in the policy - - - - - Verification of NAT rules - NAT ルールの検証中 - - - - Check for duplicate nat rules - 複製 NAT ルールを確認する - - - - Check for overlapping global pools - - - - - Check for overlapping statics - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - External install script - 外部インストールスクリプト - - - Policy install script (using built-in installer if this field is blank): - インストールスクリプトのポリシー (この項目が空の場合に使用する組み込みインストーラー): - - - - Command line options for the script: - スクリプトのコマンドラインオプション: - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Timeouts - タイムアウト - - - - Set all to defaults.. - すべてを標準に設定します。 - - - - xlate - xlate - - - - Replace NAT'ted objects with their translations in policy rules - - - - - Check for overlapping global pools and statics - - - - - Always permit ssh access from the management workstation with this address: - - - - - Instead of running generated configuration on the firewall line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the firewall for this to work. This method works for PIX v7 or later and is much faster than running configuration line by line. - - - - - Copy generated configuration file to the firewall using scp - - - - - File system on the firewall where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "flash:": - - - - - conn - conn - - - - udp - udp - - - - rpc - rpc - - - - h323 - h323 - - - - - sip - sip - - - - sip&media - sip&media - - - - unauth - unauth - - - - telnet - telnet - - - - ssh - ssh - - - - ss - ss - - - - mm - mm - - - - hh - hh - - - - half-closed - - - - - Inactivity - - - - - Absolute - - - - - Inspect - 監査 - - - - Policy compiler generates 'fixup' commands for PIX v6.1-6.3 and FWSM v2.3. For PIX 7.0 it generates 'class-map' and 'inspect' commands assigned to the 'policy-map' under either default or custom inspection classes. - - - - - Enable all protocols - すべてのプロトコルを有効にする - - - - Disable all protocols - すべてのプロトコルを無効にする - - - - Skip all protocols - すべてのプロトコルを飛ばします - - - Display generated commands - 生成されたコマンドを表示する - - - - ctiqbe - ctiqbe - - - - - - - - - - - - - - - - - - - - - - skip - 飛ばす - - - - - - - - - - - - - - - - - - - - - - enable - 有効 - - - - - - - - - - - - - - - - - - - - - - disable - 無効 - - - - Computer Telephony Interface Quick Buffer Encoding (CTIQBE) protocol inspection module that supports NAT, PAT, and bi-directional NAT. - - - - - - - - - - - - - - - - - - - port: - ポート: - - - - dns - dns - - - - Based on this maximum-length configured by the user, the DNS fixup checks to see if the DNS packet length is within this limit. Every UDP DNS packet (request/response) undergoes the above check. - - - - - max length: - 最大長: - - - - esp ike - - - - - Enables PAT for Encapsulating Security Payload (ESP), single tunnel. - - - - - ftp - ftp - - - - strict: - - - - - Activated support for FTP protocol and allows to change the ftp control connection port number. - - - - - h323 h225 - h323 h225 - - - - Specifies to use H.225, the ITU standard that governs H.225.0 session establishment and packetization, with H.323 - - - - - - - - - - - - -- - -- - - - - h323 ras - h323 ras - - - - Specifies to use RAS with H.323 to enable dissimilar communication devices to communicate with each other. - - - - - http - http - - - - The default port for HTTP is 80. Use the port option to change the HTTP port, or specify a range of HTTP ports. - - - - - icmp error - ICMP エラー - - - - Enables NAT of ICMP error messages. This creates translations for intermediate hops based on the static or network address translation configuration on the firewall. - - - - - ils - ils - - - - Provides NAT support for Microsoft NetMeeting, SiteServer, and Active Directory products that use LightWeight Directory Access Protocol (LDAP) to exchange directory information with an for Internet Locator Service (ILS) server. - - - - - mgcp - mgcp - - - - Enables the Media Gateway Control Protocol (MGCP) fixup. - - - - - Gateway Port: - ゲートウェイポート: - - - - Call Agent port: - エージェントポートを呼ぶ: - - - - pptp - pptp - - - - Enables Point-to-Point Tunneling Protocol (PPTP) application inspection. - - - - - rsh - rsh - - - - Enables inspection of RSH protocol. - RSH プロトコルの監査を可能にします。 - - - - rtsp - rtsp - - - - Lets PIX Firewall pass Real Time Streaming Protocol (RTSP) packets. RTSP is used by RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, and Cisco IP/TV connections. - - - - - Enable or change the port assignment for the Session Initiation Protocol (SIP) for Voice over IP TCP connections. - - - - - sip udp - sip udp - - - - Enable SIP-over-UDP application inspection. - SIP オーバー UDP アプリケーションの監査を有効にします。 - - - - skinny - skinny - - - - Enable SCCP application inspection. SCCP protocol supports IP telephony and can coexist in an H.323 environment. An application layer ensures that all SCCP signaling and media packets can traverse the PIX Firewall and interoperate with H.323 terminals. - - - - - smtp - smtp - - - - Enables the Mail Guard feature, which only lets mail servers receive the RFC 821, section 4.5.1, commands of HELO, MAIL, RCPT, DATA, RSET, NOOP, and QUIT. All other commands are translated into X's which are rejected by the internal server. - - - - - sqlnet - sqlnet - - - - Enables support for SQL*Net protocol. - SQL*Net プロトコルのサポートを有効にします。 - - - - tftp - tftp - - - - Enable TFTP application inspection. - TFTP アプリケーションの監査を有効にします。 - - - - Logging - ログ記録 - - - Syslog host (name or IP address): - Syslog ホスト (名前か IP アドレス): - - - - syslog facility: - syslog ファシリティ: - - - - syslog level ('logging trap'): - syslog レベル ('logging trap'): - - - - Syslog message queue size (messages): - Syslog メッセージキューの大きさ(メッセージ): - - - - PIX Firewall Version 6.3 introduces support for EMBLEM format, which is required when using the CiscoWorks Resource Manager Essentials (RME) syslog analyzer. - - - - - Use 'EMBLEM' format for syslog messages - syslog で「EMBLEM「」形式 -を使用する - - - - Set device id for syslog messages (v6.3 and later): - syslog メッセージのデバイス ID 設定 (v6.3 以上): - - - - use address of interface - インターフェースのアドレスを使用する - - - - use text string - テキスト文字列を使用する - - - - use hostname - ホスト名を使用する - - - - The logging timestamp command requires that the clock command be set. - - - - - Enable logging timestamps on syslog file - syslog ファイルで日付の記録を有効にする - - - - Other logging destinations and levels: - その他のログ記録先とレベル: - - - - Internal buffer - 内部バッファ - - - - Console - コンソール - - - - Script - スクリプト - - - - Insert comments into generated PIX configuration file - - - - - Comment the code - コメントコード - - - - Use ACL remarks to relate ACL commands and policy rules in the GUI - - - - - Use ACL remarks - - - - - Group PIX commands in the script so that similar commands appear next to each other, just like PIX does it when you use 'show config' - - - - - Group similar commands together - - - - - Use manual ACL commit on FWSM - - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via IPSEC tunnel. This is the way access lists were generated in older versions of Firewall Builder for PIX. - - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - - - - - Normally PIX does not support outbound ACL, however policy compiler can emulate them if this option is turned on - - - - - Policy install script (built-in installer will be used if blank): - - - - - Syslog host (IP address): - - - - - Script (additional) - - - - - Compiler can generate PIX configuration without commands that configures interfaces, timeouts and inspectors. These parts of configuration change rarely so it makes no sense to execute the same commands again and again. In addition, runnig the same commands on configuration reload cause errors. Use this option to generate shortened configuration to avoid errors and make update faster. - - - - - Generate only access-list, access-group, telnet, ssh, nat, global and static commands - - - - - PIX Options - PIX オプション - - - - Actively reset inbound TCP connections with RST - - - - - Actively reset inbound TCP connections with RST on outside interface - - - - - Force each TCP connection to linger in a shortened TIME&WAIT - - - - - Alt+W - Alt+W - - - - Enable the IP Frag Guard feature (deprecated in v6.3 and later). - IP フラグガード機能を有効にします(バージョン 6.3 以上では非推奨です)。 - - - - Enable TCP resource control for AAA Authentication Proxy - - - - - Specify that when an incoming packet does a route lookup, -the incoming interface is used to determine which interface -the packet should go to, and which is the next hop -(deprecated in v6.3 and later). - - - - - Disable inbound embedded DNS A record fixups - - - - - Disable outbound DNS A record replies - - - - - maximum number of simultaneous TCP and UDP connections - - - - - maximum number of embryonic connections per host - - - - - Specifies the maximum number of simultaneous TCP and UDP connections for the entire subnet. The default is 0, which means unlimited connections. (Idle connections are closed after the idle timeout specified by the timeout conn command.) - - - - - Specifies the maximum number of embryonic connections per host. An embryonic connection is a connection request that has not finished the necessary handshake between source and destination. Set a small value for slower systems, and a higher value for faster systems. The default is 0, which means unlimited embryonic connections. - - - - - The following parameters are used for all NAT rules: - - - - - (The default for both parameters is 0, which means unlimited number of connections.) - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - IPv4 の前に IPv6 - - - - IPv6 before IPv4 - IPv6 の前に IPv4 - - - - Do not clear access lists and object group, just generate PIX commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - pixFailoverOptionsDialog - - - Input not valid: %1 - - - - - pixFailoverOptionsDialog_q - - - PIX failover protocol settings - - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - PIX Failover Protocol Parameters - - - - - PIX Failover Key - - - - - Key: - - - - - pixosAdvancedDialog_q - - - PIX Advanced Configuration Options - PIX 高度な設定オプション - - - - General - 一般 - - - - Set PIX host name using object's name - オブジェクト名を使用して PIX ホスト名を設定する - - - - Generate commands to configure addresses for interfaces - - - - - NTP - NTP - - - - NTP Servers: - NTP サーバー: - - - - Server 1: - サーバー 1: - - - - Server 2: - サーバー 2: - - - - Server 3: - サーバー 3: - - - - Preffered: - - - - - - IP address: - IP アドレス: - - - - SNMP - SNMP - - - - Disable SNMP Agent - SNMP エージェントを無効にする - - - - Set SNMP communities using data from the firewall object dialog - - - - - SNMP servers - SNMP サーバー - - - - - Poll - - - - - - Poll and Traps - - - - - - Traps - トラップ - - - - Enable: - 有効: - - - - SNMP Server 1: - SNMP サーバー1: - - - - SNMP Server 2: - SNMP サーバー2: - - - - Enable sending log messages as SNMP trap notifications - ログメッセージを SNMP トラップ通知で送信を有効にする - - - - Options - オプション - - - - Change TCP MSS to - - - - - bytes - バイト - - - - OK - OK - - - - Cancel - 取り消し - - - - pixosIfaceOptsDialog - - - Input not valid: %1 - - - - - pixosIfaceOptsDialog_q - - - PIX: interface settings - - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Options - オプション - - - - Device Type - - - - - VLAN ID - - - - - prefsDialog_q - - - Preferences - 設定 - - - - General - 一般 - - - - Working directory: - 作業ディレクトリ-: - - - - - - Browse... - 参照... - - - - Software Updates: - ソフトウェアの更新: - - - - Check for updates automatically - 自動的に更新を確認する - - - - Check Now - 今すぐ確認する - - - - Use http proxy while checking for updates (host:port) - - - - - Objects - オブジェクト - - - Enable object tooltips - オブジェクトツールチップスを有効にする - - - - Tooltip delay: - ツールチップ遅延: - - - - Show deleted objects - 削除されたオブジェクトを表示する - - - - Clip comments in rules - - - - - Data File - データファイル - - - - Enable object tooltips in the tree and rule sets - - - - - Properties of specific object types: - - - - - Periodically save data to file every - - - - - minutes - - - - - Do not ask for the log record when checking in new file revision. - - - - - Enable compression of the data file - データファイルの圧縮を有効にする - - - SSH - SSH - - - - A full path to the Secure Shell utility (remote command execution; for example ssh on Unix or plink.exe on Windows): - - - - - A full path to the SCP utility (file copy over ssh; for example scp on Unix or pscp.exe on Windows): - - - - - Value for the ServerAliveInterval ssh configuration parameter. This parameter sets timeout interval in seconds after which if no data has been received from the server, ssh client will send a message through the encrypted channel to request a response from the server. This helps detect disconnects between fwbuilder policy installer and the firewall. If set to 0, these messages will not be sent to the server and loss of connectivity with the firewall will lead to hanging of the installer session. Scp uses different parameter for this, ConnectTimeout. Fwbuilder automatically calculates the value for this parameter using the same timeout value. Note that this only works with ssh protocol v2. - - - - - sec - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><a href="http://www.chiark.greenend.org.uk/~sgtatham/putty/"><span style=" font-family:'Lucida Grande'; font-size:8pt; text-decoration: underline; color:#0000ff;">http://www.chiark.greenend.org.uk/~sgtatham/putty/</span></a></p></body></html> - - - - - Labels - ラベル - - - - Use these labels to mark rules in the firewall policy - - - - - Red - 赤色 - - - - Blue - 青色 - - - - Yellow - 黄色 - - - - Orange - オレンジ色 - - - - Purple - 紫色 - - - - Green - 緑色 - - - - Gray - 灰色 - - - Icons - アイコン - - - - Icons settings - アイコンの設定 - - - - Show icons in rules - ルールのアイコンを表示する - - - - Show text descriptions in columns "Direction", "Action" - - - - Icon size: - アイコンの大きさ: - - - - 16x16 - 16×16 - - - - 25x25 - 25×25 - - - Fonts - フォント - - - - Choose font for rules sets - ルールセットのフォントを選んでください - - - - Rules font - ルールのフォント - - - - rules font description - ルールフォントの説明 - - - - - Choose font for tree - ツリーのフォントを選んでください - - - - Tree font - ツリーのフォント - - - - tree font description - ツリーフォントの説明 - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - No identifiable information will be sent to the server during update check - - - - - Do not show tips on startup - - - - - Show object attributes in the tree - - - - - DNS Name - DNS 名 - - - - - Create new objects in "Compile Time" mode by default - - - - - - Create new objects in "Run Time" mode by default - - - - - Use object name for the DNS record in all objects of this type - - - - - Address Table - アドレステーブル - - - - Installer - インストーラー - - - - Built-in policy installer can remember passwords for the duration of the session. Passwords are never stored permanently, they are only kept in memory. In order to use this feature, you also need to configure user name used to authenticate to the firewall in the "advanced" settings dialog of the firewall object. - - - - - Warning: using this feature creates certain risk if working Firewall Builder GUI is left unattended on the unlocked workstation. Someone may walk up to the machine and make changes to the firewall using cached password of the administrator who used the same GUI session before. Always lock the screen or exit Firewall Builder GUI when leaving computer. - - - - - Download plink.exe and pscp.exe from the web site at - - - - - Appearance - - - - - Compiler Output Panel font - - - - - compiler output font description - - - - - Icons size in rules: - - - - - Show text under toolbar icons - - - - - Platforms and OS - - - - - If you disable firewall platform or host OS here, it will not appear in the drop-down lists of platforms and host OS anywhere in the program. This helps avoid clutter in lists of platforms and OS if you only work with one or two of them. - - - - - Supported firewall platforms - - - - - Supported host OS - - - - - Platform - - - - - Host OS - - - - - Enable password caching for the duration of the session (passwords -are never stored permanently) - - - - - Enable password caching - - - - - printingProgressDialog_q - - - Printing - 印刷をしています - - - - Cancel - 取り消し - - - - textLabel1 - テキストラベル 1 - - - - procurveaclAdvancedDialog - - - - Script Editor - スクリプトエディター - - - - procurveaclAdvancedDialog_q - - - HP ProCurve ACL Firewall Settings - - - - - Compiler Options - コンパイラーオプション - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Compiler creates multiple access lists from the same policy, -two for each interface: one for inbound and another for -outbound. If the policy is written in a such way that no rule -can possibly be associated with an interface, this interface -gets no access list at all. Also, interfaces marked as -"unprotected" never get access list regardless of how the policy -rules are designed. - - - - - - Generate separate access list for each interface - - - - - Compiler creates one access list and assigns it to all -interfaces. - - - - - - Create one access list and attach it to all interfaces - - - - - Policy Compiler Options - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in the policy - - - - - Always permit ssh access from the management workstation with this address: - - - - - Script Options - スクリプトオプション - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via tunnel. - - - - - Do not clear access lists, just generate commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - - - - - - Insert comments into generated IOSACL configuration file - - - - - Comment the code - コメントコード - - - - Use ACL remarks - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - Instead of running generated configuration on the router line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the router for this to work. This method is much faster than running configuration line by line. - - - - - Copy generated configuration file to the router using scp - - - - - File system on the router where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "nvram:": - - - - - External install script - 外部インストールスクリプト - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Logging - ログ記録 - - - - Generate logging commands - - - - - Syslog - Syslog - - - - Syslog host (name or IP address): - Syslog ホスト (名前か IP アドレス): - - - - syslog facility: - - - - - syslog level ('logging trap'): - - - - - The logging timestamp command requires that the clock command be set. - - - - - Enable logging timestamps on syslog file - syslog ファイルで日付の記録を有効にする - - - - Other logging destinations and levels: - その他のログ記録先とレベル: - - - - Internal buffer - 内部バッファ - - - - Console - コンソール - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - IPv4 の前に IPv6 - - - - IPv6 before IPv4 - IPv6 の前に IPv4 - - - - OK - OK - - - - Cancel - 取り消し - - - - secuwallAdvancedDialog - - Illegal address '%1' - 不当なアドレス 「%1/%2」 {1'?} - - - - - Script Editor - スクリプトエディター - - - - secuwallAdvancedDialog_q - - - iptables: advanced settings - iptables: 高度な設定 - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Compiler - コンパイラー - - - - Compiler: - コンパイラー: - - - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - Assume firewall is part of 'any' - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Accept ESTABLISHED and RELATED packets before the first rule - - - - - Drop packets that are associated with -no known connection - - - - - and log them - - - - - Bridging firewall - ブリッジ中のファイアウォール - - - - Detect shadowing in policy rules - - - - - Ignore empty groups in rules - ルールのからグループを無視する - - - - Enable support for NAT of locally originated connections - - - - - This adds a rule on top of the policy with iptables target TCPMSS -and option --clamp-mss-to-pmtu. Generation of this command is -version-dependent and also depends on the setting of ip or ipv6 forwarding -in host settings dialog. - - - - - - Clamp MSS to MTU - - - - - Make Tag and Classify actions terminating - タグと分類の設定操作を中断しました - - - - Default action on 'Reject': - - - - - Always permit ssh access from the management workstation with this address: - - - - - Install the rule for ssh access from the management workstation when the firewall -is stopped - - - - - Installer - インストーラー - - - - Built-in installer - 組み込みインストーラー - - - - Additional command line parameters for ssh - ssh の追加コマンドラインパラメーター - - - - Additional command line parameters for scp - scp の追加コマンドラインパラメーター - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - External install script - 外部インストールスクリプト - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - 編集 - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Insert prolog script - prolog スクリプトの挿入 - - - - on top of the script - - - - - after interface configuration - インターフェース設定の後 - - - - after policy reset - ポリシーリセットの後 - - - - Logging - ログ記録 - - - - use ULOG - - - - - use LOG - - - - - log TCP seq. numbers - - - - - log IP options - IP オプションをログ記録する - - - - use numeric syslog levels - 使用する syslog レベルの数値 - - - - Log level: - ログレベル: - - - - log TCP options - - - - - cprange - - - - - queue threshold: - キュー閾値: - - - - netlink group: - ネットリンクグループ: - - - - Log prefix: - ログ接頭語: - - - - Logging limit: - ログ記録制限: - - - - Activate logging in all rules -(overrides rule options, use for debugging) - すべてのルールのログを記録する -(ルールオプションを上書きします。デバッグで使います) - - - - Script - スクリプト - - - - Allow reboot to load modules (only if needed) - - - - - Turn debugging on in generated script - - - - - Managing interfaces and addresses - - - - - Verify interfaces before loading firewall policy - - - - - Configure Interfaces of the running firewall machine - - - - - Add virtual addresses for NAT - - - - - Generated script can load rules one by one by calling iptables command line utility, or activate them all at once using iptables-restore. In both cases you just run the script with command line parameter "start" to activate the policy, the script will use iptables-restore automatically if this checkbox is on. - - - - - iptables-restore replaces firewall policy in one atomic transaction - - - - - Use iptables-restore to activate policy - - - - - Warning: rebooting breaks the connectivity until the firewall is up again. The outage can be up to minutes, depending on how fast the machine restarts. - - - - - If debugging is turned on, the script will run with shell option "-x" that makes it print every command it executes. Warning: this produces a lot of debugging output. - - - - - Warning: this breaks the connectivity until all interfaces are 'up' again. The outage is typically < 10 seconds - - - - Options - オプション - - - IPv4 Packet forwarding - IPv4 パケット転送 - - - No change - 変更なし - - - On - オン - - - Off - オフ - - - IPv6 Packet forwarding - IPv6 パケット転送 - - - Accept ICMP redirects - ICMP リダイレクトの受理 - - - Allow dynamic addresses - ダイナミックアドレス群の許可 - - - whats this text - whats this comment - このテキストは何 - - - TCP - TCP - - - TCP FIN timeout (sec) - TCP FIN タイムアウト(秒) - - - TCP window scaling - TCP ウィンドウスケーリング - - - TCP sack - TCP sack - - - TCP fack - TCP fack - - - TCP ECN - TCP ECN - - - TCP SYN cookies - TCP SYN クッキー - - - TCP timestamps - TCP タイムスタンプ - - - Open - 開く - - - - secuwallIfaceOptsDialog_q - - - secunet wall: interface settings - - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - - Options - オプション - - - - Specify secunet wall advanced interface options below - - - - - MTU - - - - - Device Type - - - - - VLAN ID - - - - - Disable at boot - - - - - Disable ARP on this interface - - - - - secuwallosAdvancedDialog - - - Select templates directory - - - - - URL is not valid: %1 - - - - - Could not open URL: %1 - - - - - Empty address found (position %1) - - - - - Illegal address '%1' (position %2) - - - - - Input not valid: %1 - - - - - secuwallosAdvancedDialog_q - - - secunet wall: advanced settings - - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Management - - - - - secunet wall Management settings - - - - - Specify secunet wall Management settings below. -Please use commas to separate a list of IP addresses. - - - - - Management access - - - - - Enter the IP addresses or networks of the secunet wall management zone - - - - - Syslog servers - - - - - Enter IP addresses of logging servers - - - - - SNMP access - - - - - Enter IP addresses or networks where SNMP requests to this firewall come from - - - - - RO-SNMP string - - - - - Enter community string for read only SNMP access - - - - - NTP servers - - - - - Enter IP addresses of NTP servers - - - - - Nagios access - - - - - Enter IP addresses or networks for Nagios access - - - - - Local /var partition - - - - - Enter name for partition that will be mounted to /var - - - - - Local config partition - - - - - Enter name for local config partition - - - - - Disable auto-generation of firewall rules for management services - - - - - Don't create firewall rules - - - - - DNS Client - - - - - secunet wall DNS settings - - - - - Specify secunet wall DNS client related settings below - - - - - DNS servers - - - - - Search domains - - - - - Enter DNS search domains here. One search domain per line - - - - - Hosts file - - - - - Enter Hosts entries here. One IP-Address/Name pair per line. These entries will be written to /etc/hosts file on the firewall - - - - - The resolution order defines how hostnames will be resolved on the firewall (nsswitch.conf). Default is "Hosts file first" - - - - - Resolution order - - - - - - - - - Hosts - - - - - - - - - DNS - - - - - - - - - NIS - - - - - - - - - NIS+ - - - - - - - - - DB - - - - - Options - オプション - - - - Specify secunet wall advanced iptables/routing options below - - - - - IPv4 Packet forwarding - IPv4 パケット転送 - - - - - - - - - - - - - - - - - - - No change - 変更なし - - - - - - - - - - - - - - - - - - - On - オン - - - - - - - - - - - - - - - - - - - Off - オフ - - - - IPv6 Packet forwarding - IPv6 パケット転送 - - - - Kernel anti-spoofing protection - - - - - Ignore broadcast pings - - - - - Ignore all pings - - - - - Accept source route - - - - - Accept ICMP redirects - ICMP リダイレクトの受理 - - - - Ignore bogus ICMP errors - - - - - Allow dynamic addresses - ダイナミックアドレス群の許可 - - - - Log martians - - - - - whats this text - whats this comment - このテキストは何 - - - - TCP - TCP - - - - These parameters make sense for connections to or from the firewall host - - - - - TCP FIN timeout (sec) - TCP FIN タイムアウト(秒) - - - - TCP keepalive time (sec) - - - - - TCP window scaling - TCP ウィンドウスケーリング - - - - TCP sack - TCP sack - - - - TCP fack - TCP fack - - - - TCP ECN - TCP ECN - - - - TCP SYN cookies - TCP SYN クッキー - - - - TCP timestamps - TCP タイムスタンプ - - - - Files - - - - - Enable support for additional files here. Files in the selected templates directory will be added to the configuration of this Firewall. - - - - - Add additional files to firewall configuration - - - - - Template directory - - - - - Select templates directory for this Firewall - - - - - Browse - - - - - Open current path in file browser - - - - - Open - 開く - - - - solarisAdvancedDialog_q - - - Solaris: advanced settings - Solaris: 高度な設定 - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Options - オプション - - - - Ignore ICMP redirects - ICMP リダイレクトを無視する - - - - - - - - No change - 変更なし - - - - - - - - On - オン - - - - - - - - Off - オフ - - - - Forward directed broadcasts - ダイレクトブロードキャストの転送 - - - - Respond to echo broadcast - エコーブロードキャストへの応答 - - - - Packet forwarding - パケット転送 - - - - Forward source routed packets - - - - - Path - パス - - - - ipf: - ipf: - - - - ipnat: - ipnat: - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - - - - - src/gui/.ui/FWBMainWindow_q.cpp:430 - - Firewall Builder - ファイアウォールビルダー - - - - src/gui/.ui/FWBMainWindow_q.cpp:433 - - Firewall Name - ファイアウォール名 - - - - src/gui/.ui/FWBMainWindow_q.cpp:434 - - Firewalls: - ファイアウォール: - - - - src/gui/.ui/FWBMainWindow_q.cpp:435 - - Tab 1 - タブ 1 - - - - src/gui/.ui/FWBMainWindow_q.cpp:437 - - Close - 閉じる - - - - src/gui/.ui/FWBMainWindow_q.cpp:438 - - New Object File - 新規オブジェクトファイル - - - - src/gui/.ui/FWBMainWindow_q.cpp:439 - - &New Object File - 新規オブジェクトファイル(&N) - - - - src/gui/.ui/FWBMainWindow_q.cpp:440 - - Open - 開く - - - - src/gui/.ui/FWBMainWindow_q.cpp:441 - - &Open... - 開く(&O)... - - - - src/gui/.ui/FWBMainWindow_q.cpp:442 - - Ctrl+O - Ctrl+O - - - - src/gui/.ui/FWBMainWindow_q.cpp:443 - - Save - 保存 - - - - src/gui/.ui/FWBMainWindow_q.cpp:444 - - &Save - 保存(&S) - - - - src/gui/.ui/FWBMainWindow_q.cpp:445 - - Ctrl+S - Ctrl+S - - - - src/gui/.ui/FWBMainWindow_q.cpp:446 - - Save As - 名前を付けて保存 - - - - src/gui/.ui/FWBMainWindow_q.cpp:447 - - Save &As... - 名前を付けて保存(&A)... - - - - src/gui/.ui/FWBMainWindow_q.cpp:449 - - Print - 印刷 - - - - src/gui/.ui/FWBMainWindow_q.cpp:450 - - &Print... - 印刷(&P) - - - - src/gui/.ui/FWBMainWindow_q.cpp:451 - - Ctrl+P - Ctrl+P - - - - src/gui/.ui/FWBMainWindow_q.cpp:452 - - Exit - 終了 - - - - src/gui/.ui/FWBMainWindow_q.cpp:453 - - E&xit - 終了(&X) - - - - src/gui/.ui/FWBMainWindow_q.cpp:455 - - Undo - 取り消し - - - - src/gui/.ui/FWBMainWindow_q.cpp:456 - - &Undo - 取り消し(&U) - - - - src/gui/.ui/FWBMainWindow_q.cpp:457 - - Ctrl+Z - Ctrl+Z - - - - src/gui/.ui/FWBMainWindow_q.cpp:458 - - Redo - やり直し - - - - src/gui/.ui/FWBMainWindow_q.cpp:459 - - &Redo - やり直し(&R) - - - - src/gui/.ui/FWBMainWindow_q.cpp:460 - - Ctrl+Y - Ctrl+Y - - - - src/gui/.ui/FWBMainWindow_q.cpp:461 - - Cut - 切り取り - - - - src/gui/.ui/FWBMainWindow_q.cpp:462 - - &Cut - 切り取り(&C) - - - - src/gui/.ui/FWBMainWindow_q.cpp:463 - - Ctrl+X - Ctrl+X - - - - src/gui/.ui/FWBMainWindow_q.cpp:464 - - Copy - コピー - - - - src/gui/.ui/FWBMainWindow_q.cpp:465 - - C&opy - コピー(&O) - - - - src/gui/.ui/FWBMainWindow_q.cpp:466 - - Ctrl+C - Ctrl+C - - - - src/gui/.ui/FWBMainWindow_q.cpp:467 - - Paste - 貼り付け - - - - src/gui/.ui/FWBMainWindow_q.cpp:468 - - &Paste - 貼り付け(&P) - - - - src/gui/.ui/FWBMainWindow_q.cpp:469 - - Ctrl+V - Ctrl+V - - - - src/gui/.ui/FWBMainWindow_q.cpp:472 - - Ctrl+F - Ctrl+F - - - - src/gui/.ui/FWBMainWindow_q.cpp:473 - - Contents - 内容 - - - - src/gui/.ui/FWBMainWindow_q.cpp:474 - - &Contents... - 内容(&C) - - - - src/gui/.ui/FWBMainWindow_q.cpp:476 - - Index - インデックス - - - - src/gui/.ui/FWBMainWindow_q.cpp:477 - - &Index... - インデックス...(&I) - - - - src/gui/.ui/FWBMainWindow_q.cpp:479 - - About - ファイアウォールビルダーについて - - - - src/gui/.ui/FWBMainWindow_q.cpp:480 - - &About - ファイアウォールビルダーについて(&A) - - - - src/gui/.ui/FWBMainWindow_q.cpp:482 - - New - 新規 - - - - src/gui/.ui/FWBMainWindow_q.cpp:483 - - New - 新規 - - - - src/gui/.ui/FWBMainWindow_q.cpp:484 - - Open - 開く - - - - src/gui/.ui/FWBMainWindow_q.cpp:485 - - Open - 開く - - - - src/gui/.ui/FWBMainWindow_q.cpp:486 - - Save - 保存 - - - - src/gui/.ui/FWBMainWindow_q.cpp:487 - - Save - 保存 - - - - src/gui/.ui/FWBMainWindow_q.cpp:488 - - Close - 閉じる - - - - src/gui/.ui/FWBMainWindow_q.cpp:489 - - &Close - 閉じる(&C) - - - - src/gui/.ui/FWBMainWindow_q.cpp:490 - - Compile - コンパイル - - - - src/gui/.ui/FWBMainWindow_q.cpp:491 - - Compile - コンパイル - - - - src/gui/.ui/FWBMainWindow_q.cpp:492 - - Compile rules - コンパイルルール - - - - src/gui/.ui/FWBMainWindow_q.cpp:493 - - Install - インストール - - - - src/gui/.ui/FWBMainWindow_q.cpp:494 - - Install - インストール - - - - src/gui/.ui/FWBMainWindow_q.cpp:495 - - Install firewall policy - ファイアウォールポリシーのインストール - - - - src/gui/.ui/FWBMainWindow_q.cpp:496 - - Back - 戻る - - - - src/gui/.ui/FWBMainWindow_q.cpp:497 - - Back - 戻る - - - - src/gui/.ui/FWBMainWindow_q.cpp:498 - - Move back to the previous object - 前のオブジェクトに戻る - - - - src/gui/.ui/FWBMainWindow_q.cpp:499 - - Move back to the previous object - 前のオブジェクトに戻る - - - - src/gui/.ui/FWBMainWindow_q.cpp:500 - - New Object - 新規オブジェクト - - - - src/gui/.ui/FWBMainWindow_q.cpp:501 - - &New Object - 新規オブジェクト(&N) - - - - src/gui/.ui/FWBMainWindow_q.cpp:502 - - Create New Object - 新規オブジェクト作成 - - - - src/gui/.ui/FWBMainWindow_q.cpp:503 - - Ctrl+N - Ctrl+N - - - - src/gui/.ui/FWBMainWindow_q.cpp:504 - - Find Object - オブジェクト検索 - - - - src/gui/.ui/FWBMainWindow_q.cpp:505 - - &Find Object - オブジェクト検索(&F) - - - - src/gui/.ui/FWBMainWindow_q.cpp:506 - - Find object in the tree - ツリー中のオブジェクトを検索 - - - - src/gui/.ui/FWBMainWindow_q.cpp:507 - - Find object in the tree - ツリー中のオブジェクトを検索 - - - - src/gui/.ui/FWBMainWindow_q.cpp:508 - - Ctrl+F - Ctrl+F - - - - src/gui/.ui/FWBMainWindow_q.cpp:509 - - Preferences... - 設定... - - - - src/gui/.ui/FWBMainWindow_q.cpp:510 - - P&references... - 設定(&E)... - - - - src/gui/.ui/FWBMainWindow_q.cpp:511 - - Edit Preferences - 設定の編集 - - - - src/gui/.ui/FWBMainWindow_q.cpp:512 - - Insert Rule - ルール挿入 - - - - src/gui/.ui/FWBMainWindow_q.cpp:513 - - Insert Rule - ルール挿入 - - - - src/gui/.ui/FWBMainWindow_q.cpp:514 - - Move Rule Up - ルールを上に移動 - - - - src/gui/.ui/FWBMainWindow_q.cpp:515 - - Move Rule Up - ルールを上に移動 - - - - src/gui/.ui/FWBMainWindow_q.cpp:516 - - Move Rule Down - ルールを下に移動 - - - - src/gui/.ui/FWBMainWindow_q.cpp:517 - - Move Rule Down - ルールを下に移動 - - - - src/gui/.ui/FWBMainWindow_q.cpp:518 - - Add Rule Below - 下にルール追加 - - - - src/gui/.ui/FWBMainWindow_q.cpp:519 - - Add Rule Below - 下にルール追加 - - - - src/gui/.ui/FWBMainWindow_q.cpp:520 - - Remove Rule - ルール削除 - - - - src/gui/.ui/FWBMainWindow_q.cpp:521 - - Remove Rule - ルール削除 - - - - src/gui/.ui/FWBMainWindow_q.cpp:522 - - Ctrl+Del - Ctrl+Del - - - - src/gui/.ui/FWBMainWindow_q.cpp:523 - - Copy Rule - ルールコピー - - - - src/gui/.ui/FWBMainWindow_q.cpp:524 - - Copy Rule - ルールコピー - - - - src/gui/.ui/FWBMainWindow_q.cpp:525 - - Cut Rule - ルール切り取り - - - - src/gui/.ui/FWBMainWindow_q.cpp:526 - - Cut Rule - ルール切り取り - - - - src/gui/.ui/FWBMainWindow_q.cpp:527 - - Paste Rule Above - 上にルールを貼り付け - - - - src/gui/.ui/FWBMainWindow_q.cpp:528 - - Paste Rule Above - 上にルールを貼り付け - - - - src/gui/.ui/FWBMainWindow_q.cpp:529 - - Paste Rule Below - 下にルールを貼り付け - - - - src/gui/.ui/FWBMainWindow_q.cpp:530 - - Paste Rule Below - 下にルールを貼り付け - - - - src/gui/.ui/FWBMainWindow_q.cpp:531 - - Add File to RCS - RCS にファイルを追加 - - - - src/gui/.ui/FWBMainWindow_q.cpp:532 - - Add File to &RCS - RCS にファイルを追加(&R) - - - - src/gui/.ui/FWBMainWindow_q.cpp:533 - - Delete - 削除 - - - - src/gui/.ui/FWBMainWindow_q.cpp:534 - - Delete - 削除 - - - - src/gui/.ui/FWBMainWindow_q.cpp:535 - - Export Library To a File - ファイルへライブラリーをエクスポート - - - - src/gui/.ui/FWBMainWindow_q.cpp:536 - - &Export Library - ライブラリーエクスポート(&E) - - - - src/gui/.ui/FWBMainWindow_q.cpp:537 - - Import Library From a File - ファイルからライブラリーをインポート - - - - src/gui/.ui/FWBMainWindow_q.cpp:538 - - &Import Library - ライブラリーインポート(&I) - - - - src/gui/.ui/FWBMainWindow_q.cpp:539 - - Debug - デバッグ - - - - src/gui/.ui/FWBMainWindow_q.cpp:540 - - &Debug - デバッグ(&D) - - - - src/gui/.ui/FWBMainWindow_q.cpp:541 - - &Properties - プロパティ(&P) - - - - src/gui/.ui/FWBMainWindow_q.cpp:542 - - &Properties - プロパティ(&P) - - - - src/gui/.ui/FWBMainWindow_q.cpp:543 - - Show File Properties - ファイルのプロパティを表示する - - - - src/gui/.ui/FWBMainWindow_q.cpp:544 - - Move Selected Rules - 選択したルールを移動する - - - - src/gui/.ui/FWBMainWindow_q.cpp:545 - - Move Selected Rules - 選択したルールを移動する - - - - src/gui/.ui/FWBMainWindow_q.cpp:546 - - Discard - やり直し - - - - src/gui/.ui/FWBMainWindow_q.cpp:547 - - &Discard - 破棄する(&D) - - - - src/gui/.ui/FWBMainWindow_q.cpp:549 - - Commit - コミットする - - - - src/gui/.ui/FWBMainWindow_q.cpp:550 - - C&ommit - コメント(&C) - - - - src/gui/.ui/FWBMainWindow_q.cpp:551 - - Commit Opened File to RCS and Continue Editing - 開いているファイルをRCS にコミットして編集を続ける - - - - src/gui/.ui/FWBMainWindow_q.cpp:552 - - Lock - ロックする - - - - src/gui/.ui/FWBMainWindow_q.cpp:553 - - Lock - ロックする - - - - src/gui/.ui/FWBMainWindow_q.cpp:554 - - Unlock - ロック解除する - - - - src/gui/.ui/FWBMainWindow_q.cpp:555 - - Unlock - ロック解除する - - - - src/gui/.ui/FWBMainWindow_q.cpp:558 - - new item - 新規項目 - - - - src/gui/.ui/FWBMainWindow_q.cpp:559 - - new item - 新規項目 - - - - src/gui/.ui/FWBMainWindow_q.cpp:560 - - Toolbar - ツールバー - - - - src/gui/.ui/FWBMainWindow_q.cpp:562 - - &File - ファイル(&F) - - - - src/gui/.ui/FWBMainWindow_q.cpp:564 - - &Edit - 編集(&E) - - - - src/gui/.ui/FWBMainWindow_q.cpp:566 - - Object - オブジェクト - - - - src/gui/.ui/FWBMainWindow_q.cpp:568 - - Rules - ルール - - - - src/gui/.ui/FWBMainWindow_q.cpp:570 - - Tools - ツール - - - - src/gui/.ui/FWBMainWindow_q.cpp:572 - - &Help - ヘルプ(&H) - - - - src/gui/.ui/aboutdialog_q.cpp:135 - - Firewall Builder - ファイアウォールビルダー - - - - src/gui/.ui/aboutdialog_q.cpp:136 - - Firewall Builder - ファイアウォールビルダー - - - - src/gui/.ui/aboutdialog_q.cpp:137 - - Using libfwbuilder API v - 試用中の libfwbuilder API バージョン - - - - src/gui/.ui/aboutdialog_q.cpp:138 - - Revision: - リビジョン: - - - - src/gui/.ui/aboutdialog_q.cpp:139 - - &OK - &OK - - - - src/gui/.ui/aboutdialog_q.cpp:141 - - Copyright 2002-2006 NetCitadel, LLC - Copyright 2002-2006 NetCitadel, LLC - - - - src/gui/.ui/aboutdialog_q.cpp:142 - - <p align="center"><a href="http://www.fwbuilder.org/">http://www.fwbuilder.org</a></p> - <a href=\"http://www.fwbuilder.org/\">http://www.fwbuilder.org</a> - - - - src/gui/.ui/actionsdialog_q.cpp:437 - - Actions Dialog - 操作ダイアログ - - - - src/gui/.ui/actionsdialog_q.cpp:439 - - Tag string: - タグ文字列: - - - - src/gui/.ui/actionsdialog_q.cpp:452 - - Custom string: - テキスト文字列を使用する - - - - src/gui/.ui/actionsdialog_q.cpp:454 - - Divert socket port number: - プロトコル番号: - - - - src/gui/.ui/actionsdialog_q.cpp:455 - - User-defined chain name: - ユーザー定義チェイン名: - - - - src/gui/.ui/actionsdialog_q.cpp:457 - - Anchor name: - 著者名 - - - - src/gui/.ui/actionsdialog_q.cpp:462 - - interface - インターフェース - - - - src/gui/.ui/actionsdialog_q.cpp:469 - - interface - インターフェース - - - - src/gui/.ui/actionsdialog_q.cpp:471 - - Change inbound interface to - インターフェンス管理 - - - - src/gui/.ui/actionsdialog_q.cpp:473 - - Change outbound interface to - インターフェンス管理 - - - - src/gui/.ui/actionsdialog_q.cpp:474 - - Continue packet inspection - 続ける(&C) - - - - src/gui/.ui/addressrangedialog_q.cpp:162 - - Address Range - アドレスレンジ - - - - src/gui/.ui/addressrangedialog_q.cpp:163 - - Address Range - アドレスレンジ - - - - src/gui/.ui/addressrangedialog_q.cpp:164 - - Comment: - コメント: - - - - src/gui/.ui/addressrangedialog_q.cpp:165 - - Range End: - レンジ終了 - - - - src/gui/.ui/addressrangedialog_q.cpp:166 - - Range Start: - レンジ開始 - - - - src/gui/.ui/addressrangedialog_q.cpp:167 - - Name: - 名前: - - - - src/gui/.ui/addressrangedialog_q.cpp:168 - - Library: - ライブラリー: - - - - src/gui/.ui/addresstabledialog_q.cpp:187 - - Address Table - アドレステーブル - - - - src/gui/.ui/addresstabledialog_q.cpp:188 - - Address Table - アドレステーブル - - - - src/gui/.ui/addresstabledialog_q.cpp:189 - - Comment: - コメント: - - - - src/gui/.ui/addresstabledialog_q.cpp:190 - - Library: - ライブラリー: - - - - src/gui/.ui/addresstabledialog_q.cpp:191 - - Name: - 名前: - - - - src/gui/.ui/addresstabledialog_q.cpp:193 - - Compile Time - コンパイル時間 - - - - src/gui/.ui/addresstabledialog_q.cpp:194 - - Run Time - ランタイム - - - - src/gui/.ui/addresstabledialog_q.cpp:195 - - File name: - ファイル名: - - - - src/gui/.ui/addresstabledialog_q.cpp:196 - - Browse - 閲覧 - - - - src/gui/.ui/addresstabledialog_q.cpp:197 - - Browse - 閲覧 - - - - src/gui/.ui/addresstabledialog_q.cpp:198 - - Preview - プレビュー - - - - src/gui/.ui/askrulenumberdialog_q.cpp:86 - - Enter New Position For The Rule - ルールの<新しい位置を入力する - - - - src/gui/.ui/askrulenumberdialog_q.cpp:87 - - Enter new position for selected rules: - 選択されたルール群の新しい位置を入力する - - - - src/gui/.ui/askrulenumberdialog_q.cpp:88 - - &Move - 移動(&M) - - - - src/gui/.ui/askrulenumberdialog_q.cpp:89 - - Alt+M - Alt+M - - - - src/gui/.ui/askrulenumberdialog_q.cpp:90 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/askrulenumberdialog_q.cpp:91 - - Alt+C - Alt+C - - - - src/gui/.ui/colorlabelmenuitem_q.cpp:108 - - Orange - オレンジ色 - - - - src/gui/.ui/colorlabelmenuitem_q.cpp:110 - - Green - 緑色 - - - - src/gui/.ui/colorlabelmenuitem_q.cpp:112 - - Purple - 紫色 - - - - src/gui/.ui/colorlabelmenuitem_q.cpp:114 - - Blue - 青色 - - - - src/gui/.ui/colorlabelmenuitem_q.cpp:116 - - Yellow - 黄色 - - - - src/gui/.ui/colorlabelmenuitem_q.cpp:118 - - Gray - 灰色 - - - - src/gui/.ui/colorlabelmenuitem_q.cpp:120 - - Red - 赤色 - - - - src/gui/.ui/colorlabelmenuitem_q.cpp:122 - - No color - 色なし - - - - src/gui/.ui/commenteditorpanel_q.cpp:95 - - Comment Editor Panel - コメントエディタパネル - - - - src/gui/.ui/commenteditorpanel_q.cpp:98 - - Import from file ... - ファイルからインポート ... - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:104 - - Firewall Builder - ファイアウォールビルダー - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:105 - - Delete - 削除 - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:106 - - Cancel - 取り消し - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:108 - - Object - オブジェクト - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:109 - - Parent - - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:110 - - Details - 詳細 - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:64 - - Object - オブジェクト - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:65 - - Parent - - - - - src/gui/.ui/confirmdeleteobjectdialog_q.cpp:66 - - Details - 詳細 - - - - src/gui/.ui/customservicedialog_q.cpp:177 - - Custom Service - カスタムサービス - - - - src/gui/.ui/customservicedialog_q.cpp:178 - - Custom Service - カスタムサービス - - - - src/gui/.ui/customservicedialog_q.cpp:179 - - Comment: - コメント: - - - - src/gui/.ui/customservicedialog_q.cpp:180 - - Name: - 名前: - - - - src/gui/.ui/customservicedialog_q.cpp:181 - - Library: - ライブラリー: - - - - src/gui/.ui/customservicedialog_q.cpp:183 - - Platform: - プラットフォーム: - - - - src/gui/.ui/customservicedialog_q.cpp:184 - - Code: - コード: - - - - src/gui/.ui/debugdialog_q.cpp:73 - - Debugging Info - デバグ情報 - - - - src/gui/.ui/debugdialog_q.cpp:74 - - &Close - 閉じる(&C) - - - - src/gui/.ui/debugdialog_q.cpp:75 - - Alt+C - Alt+C - - - - src/gui/.ui/discoverydruid_q.cpp:688 - - Object - オブジェクト - - - - src/gui/.ui/discoverydruid_q.cpp:690 - - Interfaces - インターフェース - - - - src/gui/.ui/discoverydruid_q.cpp:692 - - Type - 種類 - - - - src/gui/.ui/discoverydruid_q.cpp:802 - - Discovery method: - 検出方法 - - - - src/gui/.ui/discoverydruid_q.cpp:803 - - Read file in hosts format - hosts 形式のファイルを読み込む - - - - src/gui/.ui/discoverydruid_q.cpp:804 - - Import DNS zone - DNS ゾーンをインポートをする - - - - src/gui/.ui/discoverydruid_q.cpp:805 - - Perform network discovery using SNMP - SNMP を用いてネットワークの検出を実行する - - - - src/gui/.ui/discoverydruid_q.cpp:806 - - Discovery Method - 検出方法 - - - - src/gui/.ui/discoverydruid_q.cpp:808 - - File in hosts format - hosts 形式のファイル - - - - src/gui/.ui/discoverydruid_q.cpp:809 - - Browse ... - 参照 ... - - - - src/gui/.ui/discoverydruid_q.cpp:813 - - Domain name - ドメイン名 - - - - src/gui/.ui/discoverydruid_q.cpp:815 - - Use long names - ユーザー名: - - - - src/gui/.ui/discoverydruid_q.cpp:816 - - Import DNS zone - DNS ゾーンをインポートをする - - - - src/gui/.ui/discoverydruid_q.cpp:818 - - Name server - ネームサーバー - - - - src/gui/.ui/discoverydruid_q.cpp:819 - - choose name server from the list below - 下の一覧からネームサーバーを選択する - - - - src/gui/.ui/discoverydruid_q.cpp:822 - - DNS Query options - ルールオプション - - - - src/gui/.ui/discoverydruid_q.cpp:823 - - Timeout (sec) - TCP FIN タイムアウト(秒) - - - - src/gui/.ui/discoverydruid_q.cpp:824 - - Retries - サービス - - - - src/gui/.ui/discoverydruid_q.cpp:825 - - Name server - ネームサーバー - - - - src/gui/.ui/discoverydruid_q.cpp:829 - - Enter a valid host name or address. - 正しいホスト銘菓アドレスを入力してください。 - - - - src/gui/.ui/discoverydruid_q.cpp:832 - - Netmask: - ネットマスク: - - - - src/gui/.ui/discoverydruid_q.cpp:833 - - Address: - アドレス: - - - - src/gui/.ui/discoverydruid_q.cpp:835 - - Network discovery using SNMP - SNMP を用いてインターフェースを検出する - - - - src/gui/.ui/discoverydruid_q.cpp:837 - - Run network scan recursively - ネットワークの再起スキャンを実行する - - - - src/gui/.ui/discoverydruid_q.cpp:841 - - Include virtual addresses - NAT 用バーチャルアドレス群の追加 - - - - src/gui/.ui/discoverydruid_q.cpp:844 - - Network scan options - ネットワークゾーン: - - - - src/gui/.ui/discoverydruid_q.cpp:846 - - SNMP query parameters: - フラグメント - - - - src/gui/.ui/discoverydruid_q.cpp:847 - - SNMP 'read' community string: - SNMP 'read' コミュニティ文字列 - - - - src/gui/.ui/discoverydruid_q.cpp:849 - - timeout (sec): - タイムアウト(秒): - - - - src/gui/.ui/discoverydruid_q.cpp:851 - - DNS parameters: - DNS パラメーター: - - - - src/gui/.ui/discoverydruid_q.cpp:853 - - timeout (sec) : - タイムアウト(秒) : - - - - src/gui/.ui/discoverydruid_q.cpp:858 - - Process name - 処理名 - - - - src/gui/.ui/discoverydruid_q.cpp:860 - - Stop - 停止 - - - - src/gui/.ui/discoverydruid_q.cpp:861 - - Save scan log to file - スキャンログをファイルに保存する - - - - src/gui/.ui/discoverydruid_q.cpp:862 - - Process log: - 処理ログ: - - - - src/gui/.ui/discoverydruid_q.cpp:865 - - Select All - すべて選択する - - - - src/gui/.ui/discoverydruid_q.cpp:866 - - Filter ... - フィルター ... - - - - src/gui/.ui/discoverydruid_q.cpp:867 - - Unselect All - すべて選択をやめる - - - - src/gui/.ui/discoverydruid_q.cpp:868 - - Remove Filter - フィルターを削除する - - - - src/gui/.ui/discoverydruid_q.cpp:869 - - -> - - - - - src/gui/.ui/discoverydruid_q.cpp:870 - - <- - - - - - src/gui/.ui/discoverydruid_q.cpp:871 - - Select All - すべて選択する - - - - src/gui/.ui/discoverydruid_q.cpp:872 - - Unselect All - すべて選択をやめる - - - - src/gui/.ui/discoverydruid_q.cpp:873 - - Networks - ネットワーク - - - - src/gui/.ui/discoverydruid_q.cpp:875 - - Remove Filter - フィルターを削除する - - - - src/gui/.ui/discoverydruid_q.cpp:876 - - Select All - すべて選択する - - - - src/gui/.ui/discoverydruid_q.cpp:877 - - Filter ... - フィルター ... - - - - src/gui/.ui/discoverydruid_q.cpp:878 - - Unselect All - すべて選択をやめる - - - - src/gui/.ui/discoverydruid_q.cpp:879 - - -> - - - - - src/gui/.ui/discoverydruid_q.cpp:880 - - <- - - - - - src/gui/.ui/discoverydruid_q.cpp:881 - - Select All - すべて選択する - - - - src/gui/.ui/discoverydruid_q.cpp:882 - - Unselect All - すべて選択をやめる - - - - src/gui/.ui/discoverydruid_q.cpp:883 - - Objects - オブジェクト - - - - src/gui/.ui/discoverydruid_q.cpp:884 - - Unselect All - すべて選択をやめる - - - - src/gui/.ui/discoverydruid_q.cpp:885 - - Remove Filter - フィルターを削除する - - - - src/gui/.ui/discoverydruid_q.cpp:886 - - Filter ... - フィルター ... - - - - src/gui/.ui/discoverydruid_q.cpp:887 - - Select All - すべて選択する - - - - src/gui/.ui/discoverydruid_q.cpp:888 - - Change type of selected objects: - 選択されたオブジェクトの種類の変更: - - - - src/gui/.ui/discoverydruid_q.cpp:889 - - Address - アドレス - - - - src/gui/.ui/discoverydruid_q.cpp:890 - - Host - ホスト - - - - src/gui/.ui/discoverydruid_q.cpp:891 - - Firewall - ファイアウォール - - - - src/gui/.ui/discoverydruid_q.cpp:892 - - Object - オブジェクト - - - - src/gui/.ui/discoverydruid_q.cpp:893 - - Interfaces - インターフェース - - - - src/gui/.ui/discoverydruid_q.cpp:894 - - Type - 種類 - - - - src/gui/.ui/discoverydruid_q.cpp:896 - - Adjust Object types - オブジェクトの種類の調整 - - - - src/gui/.ui/discoverydruid_q.cpp:897 - - Select target library - ターゲットライブラリーを選択する - - - - src/gui/.ui/discoverydruid_q.cpp:898 - - Target library - ターゲットライブラリー - - - - src/gui/.ui/discoverydruid_q.cpp:899 - - Adding new objects to library ... - ライブラリーに新しいオブジェクトを追加しています ... - - - - src/gui/.ui/discoverydruid_q.cpp:900 - - Creatnig objects - 新規オブジェクト作成 - - - - src/gui/.ui/dnsnamedialog_q.cpp:164 - - DNS Name - DNS 名 - - - - src/gui/.ui/dnsnamedialog_q.cpp:165 - - DNS Name - DNS 名 - - - - src/gui/.ui/dnsnamedialog_q.cpp:166 - - Comment: - コメント: - - - - src/gui/.ui/dnsnamedialog_q.cpp:168 - - Compile Time - コンパイル時間 - - - - src/gui/.ui/dnsnamedialog_q.cpp:169 - - Run Time - ランタイム - - - - src/gui/.ui/dnsnamedialog_q.cpp:170 - - Library: - ライブラリー: - - - - src/gui/.ui/dnsnamedialog_q.cpp:171 - - Name: - 名前: - - - - src/gui/.ui/dnsnamedialog_q.cpp:172 - - DNS Record: - DNS レコード: - - - - src/gui/.ui/execdialog_q.cpp:90 - - Executing external command - 外部コマンドの実行 - - - - src/gui/.ui/execdialog_q.cpp:91 - - Save log to file - ファイルにログを保存する - - - - src/gui/.ui/execdialog_q.cpp:92 - - Stop - 停止 - - - - src/gui/.ui/execdialog_q.cpp:93 - - &Close - 閉じる(&C) - - - - src/gui/.ui/execdialog_q.cpp:94 - - Alt+C - Alt+C - - - - src/gui/.ui/filepropdialog_q.cpp:109 - - File Properties - ファイルプロパティ - - - - src/gui/.ui/filepropdialog_q.cpp:110 - - Location: - 場所: - - - - src/gui/.ui/filepropdialog_q.cpp:111 - - RO - RO - - - - src/gui/.ui/filepropdialog_q.cpp:112 - - Revision Control: - リビジョン制御 - - - - src/gui/.ui/filepropdialog_q.cpp:113 - - Time of last modification: - 最終修正の時間 - - - - src/gui/.ui/filepropdialog_q.cpp:114 - - Revision: - リビジョン - - - - src/gui/.ui/filepropdialog_q.cpp:115 - - Locked by user: - ユーザーがロック中: - - - - src/gui/.ui/filepropdialog_q.cpp:116 - - location - 場所 - - - - src/gui/.ui/filepropdialog_q.cpp:117 - - lastModified - 最終更新日時 - - - - src/gui/.ui/filepropdialog_q.cpp:118 - - rev - リビジョン - - - - src/gui/.ui/filepropdialog_q.cpp:120 - - Revision history: - リビジョン履歴: - - - - src/gui/.ui/filepropdialog_q.cpp:121 - - OK - OK - - - - src/gui/.ui/filepropdialog_q.cpp:122 - - Print - 印刷 - - - - src/gui/.ui/filterdialog_q.cpp:139 - - Filter - フィルター - - - - src/gui/.ui/filterdialog_q.cpp:140 - - Save - 保存 - - - - src/gui/.ui/filterdialog_q.cpp:141 - - Load - 読み込み - - - - src/gui/.ui/filterdialog_q.cpp:142 - - Ok - OK - - - - src/gui/.ui/filterdialog_q.cpp:143 - - Cancel - 取り消し - - - - src/gui/.ui/filterdialog_q.cpp:144 - - Match - 一致 - - - - src/gui/.ui/filterdialog_q.cpp:146 - - all - すべて - - - - src/gui/.ui/filterdialog_q.cpp:147 - - any - どれか - - - - src/gui/.ui/filterdialog_q.cpp:150 - - + - + - - - - src/gui/.ui/filterdialog_q.cpp:151 - - Add a new pattern - パターンを追加する - - - - src/gui/.ui/filterdialog_q.cpp:152 - - Target - ターゲット - - - - src/gui/.ui/filterdialog_q.cpp:153 - - Type - 種類 - - - - src/gui/.ui/filterdialog_q.cpp:154 - - Pattern - パターン - - - - src/gui/.ui/filterdialog_q.cpp:155 - - Case sensitive - 英大小文字の区別 - - - - src/gui/.ui/filterdialog_q.cpp:156 - - - - - - - - - src/gui/.ui/filterdialog_q.cpp:157 - - Remove a pattern - パターンを削除する - - - - src/gui/.ui/filterdialog_q.cpp:87 - - Target - ターゲット - - - - src/gui/.ui/filterdialog_q.cpp:89 - - Type - 種類 - - - - src/gui/.ui/filterdialog_q.cpp:91 - - Pattern - パターン - - - - src/gui/.ui/finddialog_q.cpp:126 - - Find Object - オブジェクト検索 - - - - src/gui/.ui/finddialog_q.cpp:128 - - Search in policy rules - ポリシールール群から検索 - - - - src/gui/.ui/finddialog_q.cpp:129 - - Search in the tree - ツリーから検索 - - - - src/gui/.ui/finddialog_q.cpp:130 - - Find - 検索 - - - - src/gui/.ui/finddialog_q.cpp:133 - - Address - アドレス - - - - src/gui/.ui/finddialog_q.cpp:134 - - TCP/UDP port - TCP/UDP ポート - - - - src/gui/.ui/finddialog_q.cpp:135 - - Protocol number - プロトコル番号 - - - - src/gui/.ui/finddialog_q.cpp:136 - - ICMP type - ICMP の種類 - - - - src/gui/.ui/findobjectwidget_q.cpp:172 - - Find object - オブジェクト検索 - - - - src/gui/.ui/findobjectwidget_q.cpp:174 - - Name - 名前 - - - - src/gui/.ui/findobjectwidget_q.cpp:175 - - Address - アドレス - - - - src/gui/.ui/findobjectwidget_q.cpp:176 - - TCP/UDP port - TCP/UDP ポート - - - - src/gui/.ui/findobjectwidget_q.cpp:177 - - Protocol number - プロトコル番号 - - - - src/gui/.ui/findobjectwidget_q.cpp:178 - - ICMP type - ICMP の種類 - - - - src/gui/.ui/findobjectwidget_q.cpp:179 - - Replace object - このオブジェクトと置換 - - - - src/gui/.ui/findobjectwidget_q.cpp:180 - - Replace && Find - 置換と検索 - - - - src/gui/.ui/findobjectwidget_q.cpp:182 - - Next - 次へ - - - - src/gui/.ui/findobjectwidget_q.cpp:183 - - Replace all - すべて置換する - - - - src/gui/.ui/findobjectwidget_q.cpp:184 - - Replace - 置換する - - - - src/gui/.ui/findobjectwidget_q.cpp:187 - - Tree only - ツリーのみ - - - - src/gui/.ui/findobjectwidget_q.cpp:188 - - Tree and policy of all firewalls - すべてのファイアウォールのポリシーとツリー - - - - src/gui/.ui/findobjectwidget_q.cpp:189 - - Policy of all firewalls - すべてのファイアウォールのポリシー - - - - src/gui/.ui/findobjectwidget_q.cpp:190 - - policy of the opened firewall - 開いているファイアウォールのポリシー - - - - src/gui/.ui/findobjectwidget_q.cpp:191 - - Close - 閉じる - - - - src/gui/.ui/findwhereusedwidget_q.cpp:113 - - Object: - オブジェクト: - - - - src/gui/.ui/findwhereusedwidget_q.cpp:115 - - Parent Object - 親オブジェクト - - - - src/gui/.ui/findwhereusedwidget_q.cpp:116 - - Details - 詳細 - - - - src/gui/.ui/findwhereusedwidget_q.cpp:117 - - Find - 検索 - - - - src/gui/.ui/findwhereusedwidget_q.cpp:118 - - Close - 閉じる - - - - src/gui/.ui/findwhereusedwidget_q.cpp:61 - - Parent Object - 親オブジェクト - - - - src/gui/.ui/findwhereusedwidget_q.cpp:62 - - Details - 詳細 - - - - src/gui/.ui/firewalldialog_q.cpp:199 - - Firewall - ファイアウォール - - - - src/gui/.ui/firewalldialog_q.cpp:200 - - Firewall - ファイアウォール - - - - src/gui/.ui/firewalldialog_q.cpp:201 - - Host OS Settings ... - ホスト OS 設定 ... - - - - src/gui/.ui/firewalldialog_q.cpp:202 - - Inactive firewall - 新規ファイアウォール - - - - src/gui/.ui/firewalldialog_q.cpp:204 - - Firewall Settings ... - ファイアウォール設定 ... - - - - src/gui/.ui/firewalldialog_q.cpp:205 - - Comment: - コメント: - - - - src/gui/.ui/firewalldialog_q.cpp:206 - - Name: - 名前: - - - - src/gui/.ui/firewalldialog_q.cpp:207 - - Library: - ライブラリー: - - - - src/gui/.ui/firewalldialog_q.cpp:208 - - Platform: - プラットフォーム: - - - - src/gui/.ui/firewalldialog_q.cpp:209 - - Version: - バージョン: - - - - src/gui/.ui/firewalldialog_q.cpp:210 - - Host OS: - ホスト OS: - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:185 - - FreeBSD: advanced settings - FreeBSD: 高度な設定 - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:186 - - &OK - &OK - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:188 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:191 - - Generate ICMP redirects - ICMP リダイレクト生成 - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:192 - - Packet forwarding - パケット転送 - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:194 - - No change - 変更なし - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:195 - - On - オン - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:196 - - Off - オフ - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:198 - - No change - 変更なし - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:199 - - On - オン - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:200 - - Off - オフ - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:202 - - No change - 変更なし - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:203 - - On - オン - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:204 - - Off - オフ - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:205 - - Options - オプション - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:207 - - ipnat: - ipnat: - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:208 - - sysctl: - sysctl: - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:209 - - ipf: - ipf: - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:210 - - ipfw: - ipfw: - - - - src/gui/.ui/freebsdadvanceddialog_q.cpp:211 - - Path - パス - - - - src/gui/.ui/groupobjectdialog_q.cpp:186 - - Group - グループ - - - - src/gui/.ui/groupobjectdialog_q.cpp:187 - - Group - グループ - - - - src/gui/.ui/groupobjectdialog_q.cpp:188 - - Comment: - コメント: - - - - src/gui/.ui/groupobjectdialog_q.cpp:190 - - I - I - - - - src/gui/.ui/groupobjectdialog_q.cpp:191 - - L - L - - - - src/gui/.ui/groupobjectdialog_q.cpp:192 - - Library: - ライブラリー: - - - - src/gui/.ui/groupobjectdialog_q.cpp:193 - - Name: - 名前: - - - - src/gui/.ui/hostdialog_q.cpp:144 - - Host - ホスト - - - - src/gui/.ui/hostdialog_q.cpp:145 - - Host - ホスト - - - - src/gui/.ui/hostdialog_q.cpp:146 - - MAC matching - MAC 一致 - - - - src/gui/.ui/hostdialog_q.cpp:147 - - Name: - 名前: - - - - src/gui/.ui/hostdialog_q.cpp:148 - - Library: - ライブラリー: - - - - src/gui/.ui/hostdialog_q.cpp:149 - - Comment: - コメント: - - - - src/gui/.ui/icmpservicedialog_q.cpp:167 - - ICMP - ICMP - - - - src/gui/.ui/icmpservicedialog_q.cpp:168 - - ICMP Service - ICMP サービス - - - - src/gui/.ui/icmpservicedialog_q.cpp:169 - - Comment: - コメント: - - - - src/gui/.ui/icmpservicedialog_q.cpp:170 - - Name: - 名前: - - - - src/gui/.ui/icmpservicedialog_q.cpp:171 - - Library: - ライブラリー: - - - - src/gui/.ui/icmpservicedialog_q.cpp:172 - - ICMP Type: - ICMP の種類 - - - - src/gui/.ui/icmpservicedialog_q.cpp:173 - - any - どれか - - - - src/gui/.ui/icmpservicedialog_q.cpp:174 - - ICMP Code: - ICMP コード: - - - - src/gui/.ui/icmpservicedialog_q.cpp:175 - - any - どれか - - - - src/gui/.ui/instdialog_q.cpp:130 - - Firewall - ファイアウォール - - - - src/gui/.ui/instdialog_q.cpp:131 - - Progress - 処理中 - - - - src/gui/.ui/instdialog_q.cpp:219 - - Firewall - ファイアウォール - - - - src/gui/.ui/instdialog_q.cpp:220 - - Compile status - コンパイル状態 - - - - src/gui/.ui/instdialog_q.cpp:221 - - Install status - インストール状態 - - - - src/gui/.ui/instdialog_q.cpp:259 - - Firewall Builder: Policy Installer - ファイアウォールビルダー: ポリシーインストーラー - - - - src/gui/.ui/instdialog_q.cpp:263 - - Compile - コンパイル - - - - src/gui/.ui/instdialog_q.cpp:264 - - Install - インストール - - - - src/gui/.ui/instdialog_q.cpp:265 - - Firewall - ファイアウォール - - - - src/gui/.ui/instdialog_q.cpp:266 - - Library - ライブラリー - - - - src/gui/.ui/instdialog_q.cpp:267 - - Last Modified - 最終更新日時 - - - - src/gui/.ui/instdialog_q.cpp:268 - - Last Compiled - 最終コンパイル日時 - - - - src/gui/.ui/instdialog_q.cpp:269 - - Last Installed - 最終インストール日時 - - - - src/gui/.ui/instdialog_q.cpp:271 - - None - なし - - - - src/gui/.ui/instdialog_q.cpp:272 - - Show selected - 選択の表示 - - - - src/gui/.ui/instdialog_q.cpp:274 - - Stop - 停止 - - - - src/gui/.ui/instdialog_q.cpp:275 - - Firewall - ファイアウォール - - - - src/gui/.ui/instdialog_q.cpp:276 - - Progress - 処理中 - - - - src/gui/.ui/instdialog_q.cpp:277 - - Firewalls: - ファイアウォール: - - - - src/gui/.ui/instdialog_q.cpp:278 - - firewall - ファイアウォール - - - - src/gui/.ui/instdialog_q.cpp:279 - - Progress: - 処理中: - - - - src/gui/.ui/instdialog_q.cpp:281 - - Show Details - 詳細を表示する - - - - src/gui/.ui/instdialog_q.cpp:282 - - Process log - 処理ログ - - - - src/gui/.ui/instdialog_q.cpp:283 - - Save log to file - ファイルにログを保存する - - - - src/gui/.ui/instdialog_q.cpp:285 - - Firewall - ファイアウォール - - - - src/gui/.ui/instdialog_q.cpp:286 - - Compile status - コンパイル状態 - - - - src/gui/.ui/instdialog_q.cpp:287 - - Install status - インストール状態 - - - - src/gui/.ui/instdialog_q.cpp:77 - - Compile - コンパイル - - - - src/gui/.ui/instdialog_q.cpp:79 - - Install - インストール - - - - src/gui/.ui/instdialog_q.cpp:81 - - Firewall - ファイアウォール - - - - src/gui/.ui/instdialog_q.cpp:83 - - Library - ライブラリー - - - - src/gui/.ui/instdialog_q.cpp:85 - - Last Modified - 最終更新日時 - - - - src/gui/.ui/instdialog_q.cpp:87 - - Last Compiled - 最終コンパイル日時 - - - - src/gui/.ui/instdialog_q.cpp:89 - - Last Installed - 最終インストール日時 - - - - src/gui/.ui/instoptionsdialog_q.cpp:270 - - Install options - インストールのオプション - - - - src/gui/.ui/instoptionsdialog_q.cpp:272 - - Enter authentication information below and click 'Next' - 下に認証情報を入力し、「次へ」をクリックしてください - - - - src/gui/.ui/instoptionsdialog_q.cpp:273 - - Password or passphrase: - パスワードかパスフレーズ: - - - - src/gui/.ui/instoptionsdialog_q.cpp:274 - - User name: - ユーザー名: - - - - src/gui/.ui/instoptionsdialog_q.cpp:281 - - Enable password: - 有効なパスワード: - - - - src/gui/.ui/instoptionsdialog_q.cpp:286 - - min - 最小 - - - - src/gui/.ui/instoptionsdialog_q.cpp:291 - - Remove comments from configuration - 設定からコメントを削除 - - - - src/gui/.ui/instoptionsdialog_q.cpp:292 - - Compress script - スクリプト圧縮 - - - - src/gui/.ui/instoptionsdialog_q.cpp:294 - - Ok - OK - - - - src/gui/.ui/instoptionsdialog_q.cpp:295 - - Cancel - 取り消し - - - - src/gui/.ui/interfacedialog_q.cpp:210 - - Interface - インターフェース - - - - src/gui/.ui/interfacedialog_q.cpp:211 - - Interface - インターフェース - - - - src/gui/.ui/interfacedialog_q.cpp:212 - - Comment: - コメント: - - - - src/gui/.ui/interfacedialog_q.cpp:213 - - Name: - 名前: - - - - src/gui/.ui/interfacedialog_q.cpp:214 - - Label: - ラベル: - - - - src/gui/.ui/interfacedialog_q.cpp:215 - - Library: - ライブラリー: - - - - src/gui/.ui/interfacedialog_q.cpp:216 - - Security level: - セキュリティレベル: - - - - src/gui/.ui/interfacedialog_q.cpp:223 - - Network zone: - ネットワークゾーン: - - - - src/gui/.ui/interfacedialog_q.cpp:228 - - Management interface - インターフェンス管理 - - - - src/gui/.ui/interfacedialog_q.cpp:230 - - This interface is external (insecure) - このインターフェースは外部です (セキュアではありません) - - - - src/gui/.ui/interfacedialog_q.cpp:233 - - Regular interface - レギュラーインターフェース - - - - src/gui/.ui/interfacedialog_q.cpp:235 - - Unnumbered interface - アンナンバードインターフェース - - - - src/gui/.ui/interfacedialog_q.cpp:236 - - Bridge port - ブリッジポート - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:521 - - ipf: advanced settings - ipf: 高度な設定 - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:522 - - &OK - &OK - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:524 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:526 - - Use raudio proxy in NAT rules - NAT ルール中で paudio を使用する - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:527 - - Use h323 proxy in NAT rules - NAT ルール中で h323 プロキシを使用する - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:528 - - Use ipsec proxy in NAT rules - NAT ルール中で ipsec プロキシを使用する - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:529 - - Use ftp proxy in NAT rules - NAT ルール中で ftp プロキシを使用する - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:531 - - Use PPTP proxy in NAT rules - NAT ルール中で ftp プロキシを使用する - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:532 - - Use IRC proxy in NAT rules for DCC - NAT ルール中で ftp プロキシを使用する - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:534 - - Protocol Helpers - プロトコルヘッダー - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:535 - - Compiler: - コンパイラー: - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:551 - - Default action on 'Reject': - 'Reject(拒否)'のデフォルトアクション: - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:552 - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:554 - - Compiler - コンパイラー - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:556 - - Policy install script (using built-in installer if this field is blank): - ポリシーインストールスクリプト (もしこのフィールドがブランクの時に使用する組み込みインストーラー) - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:557 - - Command line options for the script: - スクリプトのコマンドラインオプション - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:558 - - Built-in installer - 組み込みインストーラー - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:564 - - Installer - インストーラー - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:566 - - Edit - 編集 - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:570 - - Edit - 編集 - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:574 - - Log facility: - ログファシリティ - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:575 - - Log level: - ログレベル: - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:576 - - Log packet body - ログパケット本体 - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:578 - - Logging - ログ記録 - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:579 - - Add virtual addresses for NAT - NAT 用バーチャルアドレス群の追加 - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:580 - - Configure Interfaces of the firewall machine - ファイアウォールマシンのインターフェース構成 - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:581 - - Turn debugging on in generated script - 生成スクリプトでデバグを切り替え - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:582 - - Optimization - 最適化 - - - - src/gui/.ui/ipfadvanceddialog_q.cpp:586 - - Script Options - スクリプトオプション - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:344 - - ipfw: advanced settings - ipfw: 高度な設定 - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:345 - - &OK - &OK - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:347 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:353 - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:354 - - Compiler: - コンパイラー: - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:359 - - Compiler - コンパイラー - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:361 - - Policy install script (using built-in installer if this field is blank): - ポリシーインストールスクリプト (もしこのフィールドがブランクの時に使用する組み込みインストーラー) - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:362 - - Command line options for the script: - スクリプトのコマンドラインオプション - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:363 - - Built-in installer - 組み込みインストーラー - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:369 - - Installer - インストーラー - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:371 - - Edit - 編集 - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:375 - - Edit - 編集 - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:379 - - Add virtual addresses for NAT - NAT 用バーチャルアドレス群の追加 - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:380 - - Configure Interfaces of the firewall machine - ファイアウォールマシンのインターフェース構成 - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:381 - - Turn debugging on in generated script - 生成スクリプトでデバグを切り替え - - - - src/gui/.ui/ipfwadvanceddialog_q.cpp:383 - - Script Options - スクリプトオプション - - - - src/gui/.ui/ipservicedialog_q.cpp:208 - - IP - IP - - - - src/gui/.ui/ipservicedialog_q.cpp:209 - - IP Service - IP サービス - - - - src/gui/.ui/ipservicedialog_q.cpp:210 - - Comment: - コメント: - - - - src/gui/.ui/ipservicedialog_q.cpp:212 - - all fragments - 全フラグメント - - - - src/gui/.ui/ipservicedialog_q.cpp:214 - - timestamp - タイムスタンプ - - - - src/gui/.ui/ipservicedialog_q.cpp:218 - - Library: - ライブラリー: - - - - src/gui/.ui/ipservicedialog_q.cpp:219 - - Name: - 名前: - - - - src/gui/.ui/ipservicedialog_q.cpp:220 - - Protocol number: - プロトコル番号: - - - - src/gui/.ui/ipservicedialog_q.cpp:221 - - ( 0 - any protocol ) - ( 0 - 任意のプロトコル ) - - - - src/gui/.ui/iptadvanceddialog_q.cpp:589 - - iptables: advanced settings - iptables: 高度な設定 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:590 - - &OK - &OK - - - - src/gui/.ui/iptadvanceddialog_q.cpp:592 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/iptadvanceddialog_q.cpp:594 - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - src/gui/.ui/iptadvanceddialog_q.cpp:599 - - Bridging firewall - ブリッジ中のファイアウォール - - - - src/gui/.ui/iptadvanceddialog_q.cpp:606 - - Compiler: - コンパイラー: - - - - src/gui/.ui/iptadvanceddialog_q.cpp:608 - - Default action on 'Reject': - 'Reject(拒否)'のデフォルトアクション: - - - - src/gui/.ui/iptadvanceddialog_q.cpp:612 - - Compiler - コンパイラー - - - - src/gui/.ui/iptadvanceddialog_q.cpp:614 - - Policy install script (using built-in installer if this field is blank): - ポリシーインストールスクリプト (もしこのフィールドがブランクの時に使用する組み込みインストーラー) - - - - src/gui/.ui/iptadvanceddialog_q.cpp:615 - - Command line options for the script: - スクリプトのコマンドラインオプション - - - - src/gui/.ui/iptadvanceddialog_q.cpp:616 - - Built-in installer - 組み込みインストーラー - - - - src/gui/.ui/iptadvanceddialog_q.cpp:622 - - Installer - インストーラー - - - - src/gui/.ui/iptadvanceddialog_q.cpp:624 - - Edit - 編集 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:630 - - Edit - 編集 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:634 - - after interface configuration - インターフェース設定の後 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:635 - - after policy reset - ポリシーリセットの後 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:638 - - use ULOG - ULOG を使用する - - - - src/gui/.ui/iptadvanceddialog_q.cpp:639 - - use LOG - LOG を使用する - - - - src/gui/.ui/iptadvanceddialog_q.cpp:640 - - log TCP seq. numbers - TCP シーケンス番号をログ記録する - - - - src/gui/.ui/iptadvanceddialog_q.cpp:641 - - log IP options - IP オプションをログ記録する - - - - src/gui/.ui/iptadvanceddialog_q.cpp:642 - - use numeric syslog levels - 使用する syslog レベルの数値 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:643 - - Log level: - ログレベル: - - - - src/gui/.ui/iptadvanceddialog_q.cpp:644 - - log TCP options - ログ TCP オプション - - - - src/gui/.ui/iptadvanceddialog_q.cpp:646 - - queue threshold: - キュー閾値: - - - - src/gui/.ui/iptadvanceddialog_q.cpp:647 - - netlink group: - ネットリンクグループ: - - - - src/gui/.ui/iptadvanceddialog_q.cpp:648 - - Log prefix: - ログ接頭語: - - - - src/gui/.ui/iptadvanceddialog_q.cpp:649 - - Logging limit: - ログ記録制限: - - - - src/gui/.ui/iptadvanceddialog_q.cpp:652 - - Logging - ログ記録 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:654 - - Configure Interfaces of the firewall machine - ファイアウォールマシンのインターフェース構成 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:655 - - Turn debugging on in generated script - 生成スクリプトでデバグを切り替え - - - - src/gui/.ui/iptadvanceddialog_q.cpp:656 - - Verify interfaces before loading firewall policy - ファイアウォールポリシーをロードする前にインターフェースを確認 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:657 - - Load modules - ロードモジュール - - - - src/gui/.ui/iptadvanceddialog_q.cpp:658 - - Add virtual addresses for NAT - NAT 用バーチャルアドレス群の追加 - - - - src/gui/.ui/iptadvanceddialog_q.cpp:661 - - Script Options - スクリプトオプション - - - - src/gui/.ui/ipv4dialog_q.cpp:164 - - IPv4 - IPv4 - - - - src/gui/.ui/ipv4dialog_q.cpp:165 - - Address - アドレス - - - - src/gui/.ui/ipv4dialog_q.cpp:166 - - Comment: - コメント: - - - - src/gui/.ui/ipv4dialog_q.cpp:167 - - Name: - 名前: - - - - src/gui/.ui/ipv4dialog_q.cpp:168 - - Library: - ライブラリー: - - - - src/gui/.ui/ipv4dialog_q.cpp:169 - - Address: - アドレス: - - - - src/gui/.ui/ipv4dialog_q.cpp:170 - - Netmask: - ネットマスク: - - - - src/gui/.ui/ipv4dialog_q.cpp:171 - - DNS Lookup... - DNS 照合... - - - - src/gui/.ui/libexport_q.cpp:105 - - Export - エクスポート - - - - src/gui/.ui/libexport_q.cpp:108 - - New Item - 新規項目 - - - - src/gui/.ui/libexport_q.cpp:110 - - Choose libraries to be exported: - エクスポートするライブラリーを選択: - - - - src/gui/.ui/libexport_q.cpp:111 - - Ok - OK - - - - src/gui/.ui/libexport_q.cpp:112 - - Cancel - 取り消し - - - - src/gui/.ui/librarydialog_q.cpp:136 - - Library - ライブラリー - - - - src/gui/.ui/librarydialog_q.cpp:137 - - Library - ライブラリー - - - - src/gui/.ui/librarydialog_q.cpp:138 - - Color: - 色: - - - - src/gui/.ui/librarydialog_q.cpp:139 - - Name: - 名前: - - - - src/gui/.ui/librarydialog_q.cpp:141 - - Comment: - コメント: - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:187 - - Linksys/Sveasoft: advanced settings - Linksys/Sveasoft: 高度な設定 - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:188 - - &OK - &OK - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:190 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:192 - - modprobe: - modprobe: - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:193 - - logger: - logger: - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:194 - - ip: - ip: - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:195 - - lsmod - lsmod - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:196 - - iptables: - iptables: - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:198 - - Path - パス - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:203 - - prompt 1 - プロンプト1 - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:204 - - prompt 2 - プロンプト2 - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:205 - - Use default prompts - デフォルトプロンプトを使う - - - - src/gui/.ui/linksysadvanceddialog_q.cpp:206 - - Prompts - プロンプト - - - - src/gui/.ui/linux24advanceddialog_q.cpp:364 - - Linux 2.4: advanced settings - Linux 2.4: 高度な設定 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:365 - - &OK - &OK - - - - src/gui/.ui/linux24advanceddialog_q.cpp:367 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/linux24advanceddialog_q.cpp:370 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:371 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:372 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:374 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:375 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:376 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:378 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:379 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:380 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:382 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:383 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:384 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:386 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:387 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:388 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:390 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:391 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:392 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:394 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:395 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:396 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:398 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:399 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:400 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:402 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:403 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:404 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:405 - - Packet forwarding - パケット転送 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:406 - - Kernel anti-spoofing protection - カーネルの spoofing 対策保護 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:407 - - Ignore broadcast pings - ブロードキャストピングの無視 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:408 - - Ignore all pings - 全ピングの無視 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:409 - - Accept source route - ソースルートの許可 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:410 - - Accept ICMP redirects - ICMP リダイレクトの受理 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:411 - - Ignore bogus ICMP errors - bogus ICMP エラーを無視 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:412 - - Allow dynamic addresses - ダイナミックアドレス群の許可 - - - - src/gui/.ui/linux24advanceddialog_q.cpp:414 - - Options - オプション - - - - src/gui/.ui/linux24advanceddialog_q.cpp:417 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:418 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:419 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:421 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:422 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:423 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:425 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:426 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:427 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:429 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:430 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:431 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:433 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:434 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:435 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:437 - - No change - 変更なし - - - - src/gui/.ui/linux24advanceddialog_q.cpp:438 - - On - オン - - - - src/gui/.ui/linux24advanceddialog_q.cpp:439 - - Off - オフ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:441 - - TCP window scaling - TCP ウィンドウスケーリング - - - - src/gui/.ui/linux24advanceddialog_q.cpp:442 - - TCP ECN - TCP ECN - - - - src/gui/.ui/linux24advanceddialog_q.cpp:443 - - TCP SYN cookies - TCP SYN クッキー - - - - src/gui/.ui/linux24advanceddialog_q.cpp:444 - - TCP keepalive time (sec) - TCP 生存時間 (秒) - - - - src/gui/.ui/linux24advanceddialog_q.cpp:446 - - TCP timestamps - TCP タイムスタンプ - - - - src/gui/.ui/linux24advanceddialog_q.cpp:447 - - TCP FIN timeout (sec) - TCP FIN タイムアウト(秒) - - - - src/gui/.ui/linux24advanceddialog_q.cpp:448 - - TCP - TCP - - - - src/gui/.ui/linux24advanceddialog_q.cpp:449 - - modprobe: - modprobe: - - - - src/gui/.ui/linux24advanceddialog_q.cpp:450 - - logger: - logger: - - - - src/gui/.ui/linux24advanceddialog_q.cpp:451 - - ip: - ip: - - - - src/gui/.ui/linux24advanceddialog_q.cpp:452 - - lsmod - lsmod - - - - src/gui/.ui/linux24advanceddialog_q.cpp:454 - - iptables: - iptables: - - - - src/gui/.ui/linux24advanceddialog_q.cpp:455 - - iptables-restore: - iptables-restore: - - - - src/gui/.ui/linux24advanceddialog_q.cpp:456 - - Path - パス - - - - src/gui/.ui/longtextdialog_q.cpp:95 - - Continue - 続ける - - - - src/gui/.ui/longtextdialog_q.cpp:96 - - this is the error text - これはエラーテキストです - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:163 - - MacOS X: advanced settings - Mac OS X: 高度な設定 - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:164 - - &OK - &OK - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:166 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:168 - - Generate ICMP redirects - ICMP リダイレクト生成 - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:169 - - Packet forwarding - パケット転送 - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:171 - - No change - 変更なし - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:172 - - On - オン - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:173 - - Off - オフ - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:175 - - No change - 変更なし - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:176 - - On - オン - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:177 - - Off - オフ - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:179 - - No change - 変更なし - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:180 - - On - オン - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:181 - - Off - オフ - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:183 - - Options - オプション - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:184 - - ipfw: - ipfw: - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:185 - - sysctl: - sysctl: - - - - src/gui/.ui/macosxadvanceddialog_q.cpp:187 - - Path - パス - - - - src/gui/.ui/metriceditorpanel_q.cpp:76 - - Script Editor - スクリプトエディター - - - - src/gui/.ui/metriceditorpanel_q.cpp:78 - - textLabel2 - テキストラベル 2 - - - - src/gui/.ui/natruleoptionsdialog_q.cpp:154 - - NAT Rule Options - NAT ルールオプション - - - - src/gui/.ui/natruleoptionsdialog_q.cpp:157 - - Pool type - プールの種類 - - - - src/gui/.ui/natruleoptionsdialog_q.cpp:158 - - default - 標準 - - - - src/gui/.ui/natruleoptionsdialog_q.cpp:159 - - bitmask - ネットマスク - - - - src/gui/.ui/natruleoptionsdialog_q.cpp:160 - - random - ランダム - - - - src/gui/.ui/networkdialog_q.cpp:163 - - Network - ネットワーク - - - - src/gui/.ui/networkdialog_q.cpp:164 - - Network - ネットワーク - - - - src/gui/.ui/networkdialog_q.cpp:165 - - Comment: - コメント: - - - - src/gui/.ui/networkdialog_q.cpp:166 - - Name: - 名前: - - - - src/gui/.ui/networkdialog_q.cpp:167 - - Library: - ライブラリー: - - - - src/gui/.ui/networkdialog_q.cpp:168 - - Netmask: - ネットマスク: - - - - src/gui/.ui/networkdialog_q.cpp:169 - - Address: - アドレス: - - - - src/gui/.ui/newfirewalldialog_q.cpp:169 - - Name - 名前 - - - - src/gui/.ui/newfirewalldialog_q.cpp:170 - - Label - ラベル - - - - src/gui/.ui/newfirewalldialog_q.cpp:171 - - Address - アドレス - - - - src/gui/.ui/newfirewalldialog_q.cpp:172 - - Netmask - ネットマスク - - - - src/gui/.ui/newfirewalldialog_q.cpp:173 - - Dyn - Dyn - - - - src/gui/.ui/newfirewalldialog_q.cpp:174 - - MAC - MAC - - - - src/gui/.ui/newfirewalldialog_q.cpp:320 - - Name - 名前 - - - - src/gui/.ui/newfirewalldialog_q.cpp:321 - - Label - ラベル - - - - src/gui/.ui/newfirewalldialog_q.cpp:322 - - Address - アドレス - - - - src/gui/.ui/newfirewalldialog_q.cpp:323 - - Security Level - セキュリティレベル - - - - src/gui/.ui/newfirewalldialog_q.cpp:485 - - New Firewall - 新規ファイアウォール - - - - src/gui/.ui/newfirewalldialog_q.cpp:486 - - Enter the name of the new object below: - 新しいオブジェクトの名前を入力してください: - - - - src/gui/.ui/newfirewalldialog_q.cpp:487 - - Choose firewall software it is running: - 実行中のファイアウォールソフトウェアの選択してください: - - - - src/gui/.ui/newfirewalldialog_q.cpp:488 - - Choose OS the new firewall runs on: - 新規ファイアウォールを実行する OS を選択してください: - - - - src/gui/.ui/newfirewalldialog_q.cpp:489 - - Use preconfigured template firewall objects - あらかじめ設定されたテンプレートオブジェクトを使用する - - - - src/gui/.ui/newfirewalldialog_q.cpp:493 - - Configure interfaces manually - インターフェースを手動設定する - - - - src/gui/.ui/newfirewalldialog_q.cpp:494 - - Use SNMP to discover interfaces of the firewall - SNMP を使用し、ファイアウォールのインターフェースを発見する - - - - src/gui/.ui/newfirewalldialog_q.cpp:495 - - Discover Interfaces using SNMP - SNMP を用いてインターフェースを発見する - - - - src/gui/.ui/newfirewalldialog_q.cpp:496 - - SNMP 'read' community string: - SNMP 'read' コミュニティ文字列 - - - - src/gui/.ui/newfirewalldialog_q.cpp:499 - - Click 'Next' when done. - 「Next」をクリックすると処理します。 - - - - src/gui/.ui/newfirewalldialog_q.cpp:500 - - Name - 名前 - - - - src/gui/.ui/newfirewalldialog_q.cpp:501 - - Label - ラベル - - - - src/gui/.ui/newfirewalldialog_q.cpp:502 - - Address - アドレス - - - - src/gui/.ui/newfirewalldialog_q.cpp:503 - - Netmask - ネットマスク - - - - src/gui/.ui/newfirewalldialog_q.cpp:504 - - Dyn - Dyn - - - - src/gui/.ui/newfirewalldialog_q.cpp:505 - - MAC - MAC - - - - src/gui/.ui/newfirewalldialog_q.cpp:506 - - Label: - ラベル: - - - - src/gui/.ui/newfirewalldialog_q.cpp:507 - - Delete - 削除 - - - - src/gui/.ui/newfirewalldialog_q.cpp:508 - - Update - 更新 - - - - src/gui/.ui/newfirewalldialog_q.cpp:509 - - Add - 追加 - - - - src/gui/.ui/newfirewalldialog_q.cpp:511 - - Bridge port - ブリッジポート - - - - src/gui/.ui/newfirewalldialog_q.cpp:512 - - Unnumbered interface - アンナンバードインターフェース - - - - src/gui/.ui/newfirewalldialog_q.cpp:513 - - Dynamic address - ダイナミックアドレス - - - - src/gui/.ui/newfirewalldialog_q.cpp:514 - - Regular interface - レギュラーインターフェース - - - - src/gui/.ui/newfirewalldialog_q.cpp:515 - - Name: - 名前: - - - - src/gui/.ui/newfirewalldialog_q.cpp:516 - - Address: - アドレス: - - - - src/gui/.ui/newfirewalldialog_q.cpp:517 - - Netmask: - ネットマスク: - - - - src/gui/.ui/newfirewalldialog_q.cpp:518 - - MAC: - MAC: - - - - src/gui/.ui/newfirewalldialog_q.cpp:520 - - up - - - - - src/gui/.ui/newfirewalldialog_q.cpp:521 - - down - - - - - src/gui/.ui/newfirewalldialog_q.cpp:522 - - Name - 名前 - - - - src/gui/.ui/newfirewalldialog_q.cpp:523 - - Label - ラベル - - - - src/gui/.ui/newfirewalldialog_q.cpp:524 - - Address - アドレス - - - - src/gui/.ui/newfirewalldialog_q.cpp:525 - - Security Level - セキュリティレベル - - - - src/gui/.ui/newfirewalldialog_q.cpp:526 - - Click 'Finish' when done. - 「Finish」をクリックすると処理します。 - - - - src/gui/.ui/newgroupdialog_q.cpp:100 - - Create a group - 新規グループ - - - - src/gui/.ui/newgroupdialog_q.cpp:101 - - Cancel - 取り消し - - - - src/gui/.ui/newgroupdialog_q.cpp:96 - - New Group - 新規グループ - - - - src/gui/.ui/newgroupdialog_q.cpp:97 - - Library: - ライブラリー: - - - - src/gui/.ui/newgroupdialog_q.cpp:98 - - Group Name: - グループ名: - - - - src/gui/.ui/newhostdialog_q.cpp:185 - - Name - 名前 - - - - src/gui/.ui/newhostdialog_q.cpp:186 - - Label - ラベル - - - - src/gui/.ui/newhostdialog_q.cpp:187 - - Address - アドレス - - - - src/gui/.ui/newhostdialog_q.cpp:188 - - Netmask - ネットマスク - - - - src/gui/.ui/newhostdialog_q.cpp:189 - - Dyn - Dyn - - - - src/gui/.ui/newhostdialog_q.cpp:190 - - MAC - MAC - - - - src/gui/.ui/newhostdialog_q.cpp:376 - - New Host - 新規ホスト - - - - src/gui/.ui/newhostdialog_q.cpp:377 - - Enter the name of the new object below: - 新しいオブジェクトの名前を入力してください: - - - - src/gui/.ui/newhostdialog_q.cpp:378 - - Use preconfigured template host objects - 事前定義されたホストオブジェクトテンプレートを使う - - - - src/gui/.ui/newhostdialog_q.cpp:382 - - Configure interfaces manually - インターフェースを手動設定する - - - - src/gui/.ui/newhostdialog_q.cpp:383 - - Use SNMP to discover interfaces of the host - ホストのインタフェースを発見するためにSNMPを使用する - - - - src/gui/.ui/newhostdialog_q.cpp:384 - - Discover Interfaces using SNMP - SNMP を用いてインターフェースを発見する - - - - src/gui/.ui/newhostdialog_q.cpp:385 - - SNMP 'read' community string: - SNMP 'read' コミュニティ文字列 - - - - src/gui/.ui/newhostdialog_q.cpp:390 - - Click 'Next' when done. - 「Next」をクリックすると処理します。 - - - - src/gui/.ui/newhostdialog_q.cpp:391 - - Name: - 名前: - - - - src/gui/.ui/newhostdialog_q.cpp:392 - - Label: - ラベル: - - - - src/gui/.ui/newhostdialog_q.cpp:393 - - Address: - アドレス: - - - - src/gui/.ui/newhostdialog_q.cpp:394 - - Unnumbered interface - アンナンバードインターフェース - - - - src/gui/.ui/newhostdialog_q.cpp:396 - - Name - 名前 - - - - src/gui/.ui/newhostdialog_q.cpp:397 - - Label - ラベル - - - - src/gui/.ui/newhostdialog_q.cpp:398 - - Address - アドレス - - - - src/gui/.ui/newhostdialog_q.cpp:399 - - Netmask - ネットマスク - - - - src/gui/.ui/newhostdialog_q.cpp:400 - - Dyn - Dyn - - - - src/gui/.ui/newhostdialog_q.cpp:401 - - MAC - MAC - - - - src/gui/.ui/newhostdialog_q.cpp:402 - - MAC: - MAC: - - - - src/gui/.ui/newhostdialog_q.cpp:403 - - Dynamic address - ダイナミックアドレス - - - - src/gui/.ui/newhostdialog_q.cpp:405 - - Netmask: - ネットマスク: - - - - src/gui/.ui/newhostdialog_q.cpp:406 - - Add - 追加 - - - - src/gui/.ui/newhostdialog_q.cpp:407 - - Update - 更新 - - - - src/gui/.ui/newhostdialog_q.cpp:408 - - Delete - 削除 - - - - src/gui/.ui/objconflictresolutiondialog_q.cpp:147 - - Current Object - 現在のオブジェクト - - - - src/gui/.ui/objconflictresolutiondialog_q.cpp:149 - - Keep current object - 現在のオブジェクトを保持 - - - - src/gui/.ui/objconflictresolutiondialog_q.cpp:152 - - New Object - 新規オブジェクト - - - - src/gui/.ui/objconflictresolutiondialog_q.cpp:154 - - Replace with this object - このオブジェクトと置換 - - - - src/gui/.ui/objectmanipulator_q.cpp:107 - - Tree of Objects - オブジェクトのツリー - - - - src/gui/.ui/objectmanipulator_q.cpp:110 - - Back - 戻る - - - - src/gui/.ui/objectmanipulator_q.cpp:111 - - Go back to the previous object - 前のオブジェクトに戻る - - - - src/gui/.ui/objectmanipulator_q.cpp:113 - - New Object - 新規オブジェクト - - - - src/gui/.ui/objectmanipulator_q.cpp:114 - - Create New Object - 新規オブジェクト作成 - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:171 - - OpenBSD: advanced settings - OpenBSD: 高度な設定 - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:172 - - &OK - &OK - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:174 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:177 - - Enable directed broadcast - ダイレクトブロードキャストを入力する - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:179 - - No change - 変更なし - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:180 - - On - オン - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:181 - - Off - オフ - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:183 - - No change - 変更なし - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:184 - - On - オン - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:185 - - Off - オフ - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:186 - - Packet forwarding - パケット転送 - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:188 - - No change - 変更なし - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:189 - - On - オン - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:190 - - Off - オフ - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:192 - - No change - 変更なし - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:193 - - On - オン - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:194 - - Off - オフ - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:196 - - Generate ICMP redirects - ICMP リダイレクト生成 - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:197 - - Options - オプション - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:198 - - pfctl: - pfctl: - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:199 - - sysctl: - sysctl: - - - - src/gui/.ui/openbsdadvanceddialog_q.cpp:201 - - Path - パス - - - - src/gui/.ui/pagesetupdialog_q.cpp:102 - - Page Setup - ページ設定 - - - - src/gui/.ui/pagesetupdialog_q.cpp:103 - - start each section on a new page - 各セクションを新規ページで開始する - - - - src/gui/.ui/pagesetupdialog_q.cpp:104 - - print header on every page - 各ページにヘッダーを印刷する - - - - src/gui/.ui/pagesetupdialog_q.cpp:105 - - print legend - 凡例を印刷する - - - - src/gui/.ui/pagesetupdialog_q.cpp:106 - - print objects used in rules - ツリー中のオブジェクトを検索 - - - - src/gui/.ui/pagesetupdialog_q.cpp:107 - - &OK - &OK - - - - src/gui/.ui/pagesetupdialog_q.cpp:108 - - Alt+O - Alt+O - - - - src/gui/.ui/pagesetupdialog_q.cpp:109 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/pagesetupdialog_q.cpp:110 - - Alt+C - Alt+C - - - - src/gui/.ui/pagesetupdialog_q.cpp:111 - - Scale tables: - テーブルスケール: - - - - src/gui/.ui/pagesetupdialog_q.cpp:113 - - 50% - 50% - - - - src/gui/.ui/pagesetupdialog_q.cpp:114 - - 75% - 75% - - - - src/gui/.ui/pagesetupdialog_q.cpp:115 - - 100% - 100% - - - - src/gui/.ui/pagesetupdialog_q.cpp:116 - - 150% - 150% - - - - src/gui/.ui/pagesetupdialog_q.cpp:117 - - 200% - 200% - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1006 - - Timeouts - タイムアウト - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1008 - - Policy install script (using built-in installer if this field is blank): - ポリシーインストールスクリプト (もしこのフィールドがブランクの時に使用する組み込みインストーラー) - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1009 - - Command line options for the script: - スクリプトのコマンドラインオプション - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1010 - - Built-in installer - 組み込みインストーラー - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1016 - - Installer - インストーラー - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1018 - - Edit - 編集 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1022 - - Edit - 編集 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1026 - - Log Prefix - ログ接頭語 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1028 - - Logging - ログ記録 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1029 - - Add virtual addresses for NAT - NAT 用バーチャルアドレス群の追加 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1030 - - Configure Interfaces of the firewall machine - ファイアウォールマシンのインターフェース構成 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1031 - - Turn debugging on in generated script - 生成スクリプトでデバグを切り替え - - - - src/gui/.ui/pfadvanceddialog_q.cpp:1033 - - Script Options - スクリプトオプション - - - - src/gui/.ui/pfadvanceddialog_q.cpp:917 - - pf: advanced settings - pf: 高度な設定 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:918 - - &OK - &OK - - - - src/gui/.ui/pfadvanceddialog_q.cpp:920 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/pfadvanceddialog_q.cpp:922 - - Compiler: - コンパイラー: - - - - src/gui/.ui/pfadvanceddialog_q.cpp:923 - - Command line options for the compiler: - コンパイラーのコマンドラインオプション: - - - - src/gui/.ui/pfadvanceddialog_q.cpp:927 - - state table size: - ステートテーブルの大きさ: - - - - src/gui/.ui/pfadvanceddialog_q.cpp:942 - - Optimization: - 最適化: - - - - src/gui/.ui/pfadvanceddialog_q.cpp:943 - - Compiler - コンパイラー - - - - src/gui/.ui/pfadvanceddialog_q.cpp:944 - - Enforce Minimum TTL: - TTL 最小値の強化 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:945 - - Enforce Maximum MSS: - MSS 最大値の強化 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:949 - - Clear DF bit - DF ビット解除 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:951 - - Use random ID - ランダム ID の使用 - - - - src/gui/.ui/pfadvanceddialog_q.cpp:962 - - TCP - TCP - - - - src/gui/.ui/pfadvanceddialog_q.cpp:975 - - UDP - UDP - - - - src/gui/.ui/pfadvanceddialog_q.cpp:982 - - ICMP - ICMP - - - - src/gui/.ui/pfadvanceddialog_q.cpp:986 - - error - error - - - - src/gui/.ui/pfadvanceddialog_q.cpp:987 - - Other Protocols - その他のプロトコル - - - - src/gui/.ui/pfadvanceddialog_q.cpp:994 - - Fragments - フラグメント - - - - src/gui/.ui/physaddressdialog_q.cpp:149 - - physAddress - 物理アドレス - - - - src/gui/.ui/physaddressdialog_q.cpp:150 - - MAC Address - 新規 MAC アドレス - - - - src/gui/.ui/physaddressdialog_q.cpp:151 - - Name: - 名前: - - - - src/gui/.ui/physaddressdialog_q.cpp:152 - - Library: - ライブラリー: - - - - src/gui/.ui/physaddressdialog_q.cpp:153 - - Physical address (MAC): - 物理アドレス (MAC): - - - - src/gui/.ui/physaddressdialog_q.cpp:154 - - Comment: - コメント: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1800 - - PIX Firewall Settings - PIX ファイアウォール設定 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1801 - - OK - OK - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1802 - - Cancel - 取り消し - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1803 - - Policy Compiler Options - ポリシーコンパイラーオプション - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1811 - - Optimize 'default nat' rules - 'default nat' ルールを最適化 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1818 - - Verification of NAT rules - NAT ルールの検証中 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1819 - - Check for duplicate nat rules - 複製 NAT ルールの検証中 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1827 - - Compiler Options - コンパイラーオプション - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1828 - - Options - オプション - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1846 - - Script Options - スクリプトオプション - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1848 - - Policy install script (using built-in installer if this field is blank): - ポリシーインストールスクリプト (もしこのフィールドがブランクの時に使用する組み込みインストーラー) - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1849 - - Command line options for the script: - スクリプトのコマンドラインオプション - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1850 - - Built-in installer - 組み込みインストーラー - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1854 - - Installer - インストーラー - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1856 - - Edit - 編集 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1860 - - Edit - 編集 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1866 - - conn - conn - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1867 - - udp - udp - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1868 - - rpc - rpc - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1869 - - h323 - h323 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1870 - - sip - sip - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1871 - - sip&media - sip&media - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1872 - - unauth - unauth - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1873 - - telnet - telnet - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1874 - - ssh - ssh - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1875 - - ss - ss - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1876 - - mm - mm - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1877 - - hh - hh - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1884 - - Timeouts - タイムアウト - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1887 - - Enable all protocols - 全プロトコルを有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1888 - - Disable all protocols - 全プロトコルを無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1889 - - Skip all protocols - 全プロトコルをスキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1890 - - Display generated commands - 'clear' コマンドを生成 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1892 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1893 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1894 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1896 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1899 - - max length: - 最大長: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1901 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1902 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1903 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1904 - - dns - dns - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1907 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1908 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1909 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1912 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1915 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1916 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1917 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1919 - - ftp - ftp - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1921 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1922 - - -- - -- - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1924 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1925 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1926 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1927 - - h323 h225 - h323 h225 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1929 - - -- - -- - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1930 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1932 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1933 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1934 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1935 - - h323 ras - h323 ras - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1937 - - -- - -- - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1938 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1940 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1941 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1942 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1943 - - http - http - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1946 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1947 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1948 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1949 - - icmp error - ICMP エラー - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1951 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1952 - - -- - -- - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1954 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1955 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1956 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1957 - - ils - ils - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1959 - - Gateway Port: - ゲートウェイポート - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1962 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1963 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1964 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1965 - - mgcp - mgcp - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1967 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1969 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1970 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1971 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1972 - - pptp - pptp - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1973 - - Enables inspection of RSH protocol. - RSHプロトコルの検査を可能にする - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1974 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1976 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1977 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1978 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1979 - - rsh - rsh - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1981 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1983 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1984 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1985 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1986 - - rtsp - rtsp - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1988 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1989 - - -- - -- - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1991 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1992 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1993 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1994 - - sip - sip - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1996 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1998 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:1999 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2000 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2001 - - sip udp - sip udp - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2003 - - -- - -- - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2004 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2006 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2007 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2008 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2009 - - skinny - skinny - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2011 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2012 - - -- - -- - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2014 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2015 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2016 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2017 - - smtp - smtp - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2018 - - Enables support for SQL*Net protocol. - SQL*Net プロトコルのサポートを有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2019 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2020 - - -- - -- - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2022 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2023 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2024 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2025 - - sqlnet - sqlnet - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2026 - - Enable TFTP application inspection. - TFTP アプリケーション検査を有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2027 - - port: - ポート: - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2029 - - skip - スキップ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2030 - - enable - 有効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2031 - - disable - 無効 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2032 - - tftp - tftp - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2034 - - Syslog - Syslog - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2035 - - Syslog host (name or IP address): - Syslog ホスト (名前か IP アドレス): - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2036 - - syslog facility: - syslog ファシリティ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2037 - - syslog level ('logging trap'): - syslog レベル ('logging trap') - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2038 - - Syslog message queue size (messages): - Syslog メッセージキューサイズ(メッセージ): - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2039 - - Use 'EMBLEM' format for syslog messages - syslog で`書式 'EMBLEM' を使用する - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2041 - - Set device id for syslog messages (v6.3 and later): - syslog メッセージのデバイス ID 設定 (v6.3 かそれ以上) - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2042 - - use address of interface - インターフェースのアドレスを使用する - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2043 - - use text string - テキスト文字列を使用する - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2044 - - use hostname - ホスト名を使用する - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2048 - - Internal buffer - 内部バッファ - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2049 - - Console - コンソール - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2050 - - Logging - ログ記録 - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2056 - - Alt+W - Alt+W - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2057 - - Enable the IP Frag Guard feature (deprecated in v6.3 and later). - IP フラグガード機能有効 (deprecated in v6.3 and later) - - - - src/gui/.ui/pixadvanceddialog_q.cpp:2071 - - PIX Options - PIX オプション - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:274 - - PIX Advanced Configuration Options - PIX 高度な設定オプション - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:275 - - Set PIX host name using object's name - オブジェクト名を使用して PIX ホスト名を設定 - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:277 - - General - 一般 - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:278 - - NTP Servers: - NTP サーバー: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:281 - - Server 1: - サーバー 1: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:282 - - Server 2: - サーバー 2: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:283 - - Server 3: - サーバー 3: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:286 - - IP address: - IP アドレス: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:287 - - NTP - NTP - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:288 - - Disable SNMP Agent - SNMP エージェントを無効にする - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:290 - - SNMP servers - SNMP サーバー - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:294 - - Traps - トラップ - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:298 - - Traps - トラップ - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:299 - - Enable: - 有効: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:300 - - IP address: - IP アドレス: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:301 - - SNMP Server 1: - SNMP サーバー1: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:302 - - SNMP Server 2: - SNMP サーバー2: - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:303 - - Enable sending log messages as SNMP trap notifications - ログメッセージを SNMP トラップ通知で送信を有効にする - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:304 - - SNMP - SNMP - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:306 - - bytes - バイト - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:307 - - Options - オプション - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:308 - - OK - OK - - - - src/gui/.ui/pixosadvanceddialog_q.cpp:309 - - Cancel - 取り消し - - - - src/gui/.ui/prefsdialog_q.cpp:208 - - Name - 名前 - - - - src/gui/.ui/prefsdialog_q.cpp:211 - - Load - 読み込み - - - - src/gui/.ui/prefsdialog_q.cpp:212 - - File Path - ファイルパス - - - - src/gui/.ui/prefsdialog_q.cpp:362 - - Preferences - 設定 - - - - src/gui/.ui/prefsdialog_q.cpp:363 - - &OK - &OK - - - - src/gui/.ui/prefsdialog_q.cpp:365 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/prefsdialog_q.cpp:367 - - minutes - - - - - src/gui/.ui/prefsdialog_q.cpp:369 - - Tooltip delay: - ツールチップ遅延 - - - - src/gui/.ui/prefsdialog_q.cpp:370 - - Enable object tooltips - オブジェクトツールチップスを有効にする - - - - src/gui/.ui/prefsdialog_q.cpp:371 - - Show deleted objects - 削除されたオブジェクトを表示 - - - - src/gui/.ui/prefsdialog_q.cpp:373 - - On startup: - 起動時 - - - - src/gui/.ui/prefsdialog_q.cpp:375 - - Load standard objects - 標準オブジェクトを読み込む - - - - src/gui/.ui/prefsdialog_q.cpp:376 - - Load last edited file - 最終編集ファイルを読み込む - - - - src/gui/.ui/prefsdialog_q.cpp:377 - - Expand all branches in the object tree - オブジェクトツリーの全ての分岐を展開 - - - - src/gui/.ui/prefsdialog_q.cpp:378 - - Working directory: - 作業ディレクトリ - - - - src/gui/.ui/prefsdialog_q.cpp:379 - - Browse... - 閲覧... - - - - src/gui/.ui/prefsdialog_q.cpp:380 - - General - 一般 - - - - src/gui/.ui/prefsdialog_q.cpp:382 - - Revision Control - リビジョン制御 - - - - src/gui/.ui/prefsdialog_q.cpp:384 - - Browse... - 閲覧... - - - - src/gui/.ui/prefsdialog_q.cpp:385 - - SSH - SSH - - - - src/gui/.ui/prefsdialog_q.cpp:386 - - Add... - 追加... - - - - src/gui/.ui/prefsdialog_q.cpp:387 - - Remove - 削除 - - - - src/gui/.ui/prefsdialog_q.cpp:389 - - Available libraries: - 有効なライブラリー: - - - - src/gui/.ui/prefsdialog_q.cpp:390 - - Name - 名前 - - - - src/gui/.ui/prefsdialog_q.cpp:391 - - Load - 読み込み - - - - src/gui/.ui/prefsdialog_q.cpp:392 - - File Path - ファイルパス - - - - src/gui/.ui/prefsdialog_q.cpp:393 - - Libraries - ライブラリー - - - - src/gui/.ui/prefsdialog_q.cpp:396 - - Red - 赤色 - - - - src/gui/.ui/prefsdialog_q.cpp:397 - - Blue - 青色 - - - - src/gui/.ui/prefsdialog_q.cpp:398 - - Yellow - 黄色 - - - - src/gui/.ui/prefsdialog_q.cpp:400 - - Orange - オレンジ色 - - - - src/gui/.ui/prefsdialog_q.cpp:405 - - Purple - 紫色 - - - - src/gui/.ui/prefsdialog_q.cpp:407 - - Green - 緑色 - - - - src/gui/.ui/prefsdialog_q.cpp:408 - - Gray - 灰色 - - - - src/gui/.ui/prefsdialog_q.cpp:409 - - Labels - ラベル - - - - src/gui/.ui/printingprogressdialog_q.cpp:72 - - Printing - 印刷をしています - - - - src/gui/.ui/printingprogressdialog_q.cpp:73 - - Cancel - 取り消し - - - - src/gui/.ui/printingprogressdialog_q.cpp:74 - - textLabel1 - テキストラベル 1 - - - - src/gui/.ui/rcsfilepreview_q.cpp:120 - - RCSFilePreview - RCS ファイルプレビュー - - - - src/gui/.ui/rcsfilepreview_q.cpp:121 - - Open read-only - 読み込み専用で開く - - - - src/gui/.ui/rcsfilepreview_q.cpp:122 - - Revision - リビジョン - - - - src/gui/.ui/rcsfilepreview_q.cpp:123 - - Date - 日付 - - - - src/gui/.ui/rcsfilepreview_q.cpp:124 - - Author - 著者 - - - - src/gui/.ui/rcsfilepreview_q.cpp:125 - - Locked by - ロックした人 - - - - src/gui/.ui/rcsfilepreview_q.cpp:126 - - RCS log: - RCS ログ: - - - - src/gui/.ui/rcsfilepreview_q.cpp:48 - - Revision - リビジョン - - - - src/gui/.ui/rcsfilepreview_q.cpp:51 - - Date - 日付 - - - - src/gui/.ui/rcsfilepreview_q.cpp:54 - - Author - 著者 - - - - src/gui/.ui/rcsfilepreview_q.cpp:57 - - Locked by - ロックした人 - - - - src/gui/.ui/rcsfilesavedialog_q.cpp:101 - - Check file &in - チェックファイル入力(&I) - - - - src/gui/.ui/rcsfilesavedialog_q.cpp:102 - - Alt+I - Alt+I - - - - src/gui/.ui/rcsfilesavedialog_q.cpp:103 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/rcsfilesavedialog_q.cpp:105 - - Checking file %1 into RCS - RCS にファイル %1 をチェックインしています - - - - src/gui/.ui/rcsfilesavedialog_q.cpp:106 - - Log record for this revision: - このリビジョンのログレコード - - - - src/gui/.ui/rcsfilesavedialog_q.cpp:99 - - Log record for the new revision - 新規リビジョンのログレコード - - - - src/gui/.ui/routingruleoptionsdialog_q.cpp:118 - - Routing Rule Options - ルーティングのルールオプション - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:663 - - Rule Options for ipt - ipt 用ルールオプション - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:666 - - Stateless rule - ステートレスルール - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:668 - - General - 一般 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:671 - - alert - alert - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:672 - - crit - crit - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:673 - - error - error - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:674 - - warning - warning - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:675 - - notice - notice - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:676 - - info - info - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:677 - - debug - debug - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:678 - - Log prefix: - ログ接頭語: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:679 - - Log level: - ログレベル: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:681 - - Logging - ログ記録 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:684 - - Burst: - バースト: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:687 - - /day - /日 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:688 - - /hour - /時 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:689 - - /minute - /分 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:690 - - /second - /秒 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:696 - - connlimit - ログ記録制限: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:700 - - /day - /日 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:701 - - /hour - /時 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:702 - - /minute - /分 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:703 - - /second - /秒 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:704 - - Rate: - 日付: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:705 - - Burst: - バースト: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:707 - - dstip - smtp - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:708 - - srcip - スキップ - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:711 - - Mode: - モード: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:715 - - Stateless rule - ステートレスルール - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:718 - - General - 一般 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:719 - - Log facility: - ログファシリティ - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:720 - - Log level: - ログレベル: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:721 - - Logging - ログ記録 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:723 - - Stateless rule - ステートレスルール - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:724 - - General - 一般 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:725 - - Log prefix: - ログ接頭語: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:726 - - Logging - ログ記録 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:727 - - Activate source tracking - ソース追跡を有効にする - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:737 - - / - / - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:741 - - sec - - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:744 - - Limits - 制限 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:745 - - Stateless rule - ステートレスルール - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:747 - - These options are only valid for PIX running software v6.3 or later - これらのオプションは実行中の PIX ソフトウェアバージョン 6.3 以上で有効です。 - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:748 - - completely disable logging for this rule - このルールのログ記の無効化を -完了しました - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:749 - - Log level: - ログレベル: - - - - src/gui/.ui/ruleoptionsdialog_q.cpp:750 - - Logging interval: - ログ記録間隔: - - - - src/gui/.ui/simpleinteditor_q.cpp:83 - - Script Editor - スクリプトエディター - - - - src/gui/.ui/simpleinteditor_q.cpp:84 - - Cancel - 取り消し - - - - src/gui/.ui/simpleinteditor_q.cpp:86 - - OK - OK - - - - src/gui/.ui/simpletexteditor_q.cpp:86 - - Script Editor - スクリプトエディター - - - - src/gui/.ui/simpletexteditor_q.cpp:88 - - OK - OK - - - - src/gui/.ui/simpletexteditor_q.cpp:89 - - Cancel - 取り消し - - - - src/gui/.ui/simpletexteditor_q.cpp:90 - - Import from file ... - ファイルからインポート ... - - - - src/gui/.ui/simpletextview_q.cpp:91 - - Text viewer - テキストビュアー - - - - src/gui/.ui/simpletextview_q.cpp:92 - - Object Name - オブジェクト名 - - - - src/gui/.ui/simpletextview_q.cpp:93 - - Close - 閉じる - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:181 - - Solaris: advanced settings - Solaris: 高度な設定 - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:182 - - &OK - &OK - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:184 - - &Cancel - 取り消し(&C) - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:186 - - Ignore ICMP redirects - ICMP リダイレクトを無視 - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:188 - - No change - 変更なし - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:189 - - On - オン - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:190 - - Off - オフ - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:191 - - Forward directed broadcasts - ダイレクトブロードキャストの転送 - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:192 - - Respond to echo broadcast - エコーブロードキャストへの応答 - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:194 - - No change - 変更なし - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:195 - - On - オン - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:196 - - Off - オフ - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:198 - - No change - 変更なし - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:199 - - On - オン - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:200 - - Off - オフ - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:201 - - Packet forwarding - パケット転送 - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:203 - - No change - 変更なし - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:204 - - On - オン - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:205 - - Off - オフ - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:207 - - No change - 変更なし - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:208 - - On - オン - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:209 - - Off - オフ - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:211 - - Options - オプション - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:212 - - ipf: - ipf: - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:213 - - ipnat: - ipnat: - - - - src/gui/.ui/solarisadvanceddialog_q.cpp:215 - - Path - パス - - - - src/gui/.ui/tagservicedialog_q.cpp:143 - - Tag Service - タグサービス - - - - src/gui/.ui/tagservicedialog_q.cpp:144 - - Comment: - コメント: - - - - src/gui/.ui/tagservicedialog_q.cpp:145 - - Library: - ライブラリー: - - - - src/gui/.ui/tagservicedialog_q.cpp:146 - - Name: - 名前: - - - - src/gui/.ui/tagservicedialog_q.cpp:147 - - Code: - コード: - - - - src/gui/.ui/tcpservicedialog_q.cpp:349 - - TCP - TCP - - - - src/gui/.ui/tcpservicedialog_q.cpp:350 - - TCP Service - TCP サービス - - - - src/gui/.ui/tcpservicedialog_q.cpp:351 - - Comment: - コメント: - - - - src/gui/.ui/tcpservicedialog_q.cpp:352 - - TCP Flags - TCP フラグ - - - - src/gui/.ui/tcpservicedialog_q.cpp:354 - - A - A - - - - src/gui/.ui/tcpservicedialog_q.cpp:359 - - U - U - - - - src/gui/.ui/tcpservicedialog_q.cpp:362 - - Mask: - マスク: - - - - src/gui/.ui/tcpservicedialog_q.cpp:364 - - Settings: - 設定: - - - - src/gui/.ui/tcpservicedialog_q.cpp:365 - - S - S - - - - src/gui/.ui/tcpservicedialog_q.cpp:367 - - F - F - - - - src/gui/.ui/tcpservicedialog_q.cpp:368 - - P - P - - - - src/gui/.ui/tcpservicedialog_q.cpp:369 - - R - R - - - - src/gui/.ui/tcpservicedialog_q.cpp:374 - - Name: - 名前: - - - - src/gui/.ui/tcpservicedialog_q.cpp:375 - - Library: - ライブラリー: - - - - src/gui/.ui/tcpservicedialog_q.cpp:376 - - Source Port Range - 送信元ポートレンジ - - - - src/gui/.ui/tcpservicedialog_q.cpp:377 - - Start: - 開始: - - - - src/gui/.ui/tcpservicedialog_q.cpp:378 - - End: - 終了: - - - - src/gui/.ui/tcpservicedialog_q.cpp:379 - - Destination Port Range - 送信先ポートレンジ - - - - src/gui/.ui/tcpservicedialog_q.cpp:380 - - Start: - 開始: - - - - src/gui/.ui/tcpservicedialog_q.cpp:381 - - End: - 終了: - - - - src/gui/.ui/timedialog_q.cpp:235 - - Time - 時間 - - - - src/gui/.ui/timedialog_q.cpp:236 - - Time Interval - 時間間隔 - - - - src/gui/.ui/timedialog_q.cpp:237 - - Activate a rule on: - ルールの活性化日時 - - - - src/gui/.ui/timedialog_q.cpp:238 - - Day of week (0-6): - 曜日数 (0-6): - - - - src/gui/.ui/timedialog_q.cpp:239 - - Date: - 日付: - - - - src/gui/.ui/timedialog_q.cpp:240 - - Time: - 時間: - - - - src/gui/.ui/timedialog_q.cpp:241 - - Deactivate a rule on: - ルールの非活性化日時 - - - - src/gui/.ui/timedialog_q.cpp:242 - - Day of week (0-6): - 曜日数 (0-6): - - - - src/gui/.ui/timedialog_q.cpp:243 - - Date: - 日付: - - - - src/gui/.ui/timedialog_q.cpp:244 - - Time: - 時間: - - - - src/gui/.ui/timedialog_q.cpp:245 - - Comment: - コメント: - - - - src/gui/.ui/timedialog_q.cpp:246 - - Name: - 名前: - - - - src/gui/.ui/timedialog_q.cpp:247 - - Library: - ライブラリー: - - - - src/gui/.ui/udpservicedialog_q.cpp:221 - - UDP - UDP - - - - src/gui/.ui/udpservicedialog_q.cpp:222 - - UDP Service - UDP サービス - - - - src/gui/.ui/udpservicedialog_q.cpp:223 - - Comment: - コメント: - - - - src/gui/.ui/udpservicedialog_q.cpp:224 - - Source Port Range - 送信元ポートレンジ - - - - src/gui/.ui/udpservicedialog_q.cpp:225 - - Start: - 開始: - - - - src/gui/.ui/udpservicedialog_q.cpp:226 - - End: - 終了: - - - - src/gui/.ui/udpservicedialog_q.cpp:227 - - Destination Port Range - 送信先ポートレンジ - - - - src/gui/.ui/udpservicedialog_q.cpp:228 - - Start: - 開始: - - - - src/gui/.ui/udpservicedialog_q.cpp:229 - - End: - 終了: - - - - src/gui/.ui/udpservicedialog_q.cpp:230 - - Library: - ライブラリー: - - - - src/gui/.ui/udpservicedialog_q.cpp:231 - - Name: - 名前: - - - - src/gui/ActionsDialog.cpp:123 - - &Continue - 続ける(&C) - - - - src/gui/ActionsDialog.cpp:98 - - &Continue - 続ける(&C) - - - - src/gui/AddressRangeDialog.cpp:107 - - Illegal IP address '%1' - 不当な IP アドレス '%1' - - - - src/gui/AddressRangeDialog.cpp:108 - - &Continue - 続ける(&C) - - - - src/gui/AddressRangeDialog.cpp:118 - - Illegal IP address '%1' - 不当な IP アドレス '%1' - - - - src/gui/AddressRangeDialog.cpp:119 - - &Continue - 続ける(&C) - - - - src/gui/ColorLabelMenuItem.cpp:48 - - no color - 色なし - - - - src/gui/CommentEditorPanel.cpp:80 - - Choose file that contains PIX commands - PIX コマンドを含むファイルを選択してください。 - - - - src/gui/CommentEditorPanel.cpp:88 - - Could not open file %1 - ファイル %1 を開くことが出来ません。 - - - - src/gui/ConfirmDeleteObjectDialog.cpp:157 - - NAT - NAT - - - - src/gui/ConfirmDeleteObjectDialog.cpp:160 - - Policy - ポリシー - - - - src/gui/ConfirmDeleteObjectDialog.cpp:163 - - Routing - ルーティング - - - - src/gui/ConfirmDeleteObjectDialog.cpp:166 - - Unknown rule set - 不明なルールセット - - - - src/gui/ConfirmDeleteObjectDialog.cpp:168 - - /Rule%1 - ルール %1 - - - - src/gui/ConfirmDeleteObjectDialog.cpp:182 - - Type: - 種類: - - - - src/gui/DiscoveryDruid.cpp:1086 - - Adding objects ... - オブジェクトを追加しています ... - - - Cancel - 取り消し - - - - src/gui/DiscoveryDruid.cpp:1158 - - Adding objects ... - オブジェクトを追加しています ... - - - - src/gui/DiscoveryDruid.cpp:1159 - - Cancel - 取り消し - - - - src/gui/DiscoveryDruid.cpp:1362 - - Cancel - 取り消し - - - Prepare objects ... - オブジェクトの準備 ... - - - - src/gui/DiscoveryDruid.cpp:1507 - - Cancel - 取り消し - - - Copying results ... - 結果をコピーしています ... - - - - src/gui/DiscoveryDruid.cpp:1548 - - Copying results ... - 結果をコピーしています ... - - - - src/gui/DiscoveryDruid.cpp:1549 - - Cancel - 取り消し - - - - src/gui/DiscoveryDruid.cpp:1675 - - Discovery error - 検出エラー - - - - src/gui/DiscoveryDruid.cpp:1722 - - Discovery error - 検出エラー - - - - src/gui/DiscoveryDruid.cpp:1917 - - Empty community string - コミュニティ文字列が空です - - - - src/gui/DiscoveryDruid.cpp:616 - - Hosts file parsing ... - ホストファイルを解析しています ... - - - - src/gui/DiscoveryDruid.cpp:625 - - DNS zone transfer ... - DNS ゾーン転送 ... - - - - src/gui/DiscoveryDruid.cpp:635 - - Network discovery using SNMP ... - SNMP を用いたネットワーク検出 ... - - - - src/gui/DiscoveryDruid.cpp:645 - - Import configuration from file ... - ファイルから構成のインポート ... - - - - src/gui/DiscoveryDruid.cpp:790 - - Discovery error - 検出エラー - - - - src/gui/DiscoveryDruid.cpp:791 - - Could not open file %1 - ファイル %1 を開くことが出来ません。 - - - - src/gui/FWBSettings.cpp:150 - - Working directory %1 does not exist and could not be created. -Ignoring this setting. - 作業ディレクトリ %1 が存在しない上に作成できませんでした。 -この設定は無効になります。 - - - - src/gui/FWBTree.cpp:399 - - New Library - 新規ライブラリー - - - - src/gui/FWObjectDropArea.cpp:103 - - Drop object here. - ここにオブジェクトをドロップします。 - - - - src/gui/FWObjectDropArea.cpp:141 - - Paste - 貼り付け - - - - src/gui/FWObjectDropArea.cpp:143 - - Delete - 削除 - - - - src/gui/FWObjectPropertiesFactory.cpp:102 - - DNS record: - DNS レコード: - - - - src/gui/FWObjectPropertiesFactory.cpp:106 - - Address Table: - アドレステーブル: - - - - src/gui/FWObjectPropertiesFactory.cpp:157 - - objects - オブジェクト - - - - src/gui/FWObjectPropertiesFactory.cpp:173 - - protocol: %1 - プロトコル: %1 - - - - src/gui/FWObjectPropertiesFactory.cpp:177 - - type: %1 - 種類: %1 - - - - src/gui/FWObjectPropertiesFactory.cpp:179 - - code: %1 - コード: %1 - - - - src/gui/FWObjectPropertiesFactory.cpp:238 - - <b>Library:</b> - <b>ライブラリー:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:243 - - <b>Object Id:</b> - <b>オブジェクト ID:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:248 - - <b>Object Type:</b> - <b>オブジェクトタイプ:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:252 - - <b>Object Name:</b> - <b<>オブジェクト名:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:274 - - <b>DNS record:</b> - <b>DNS レコード:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:277 - - Run-time - ランタイム - - - Compile-time - コンパイルタイム - - - - src/gui/FWObjectPropertiesFactory.cpp:282 - - <b>Table file:</b> - <b<>テーブルファイル:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:285 - - Run-time - ランタイム - - - Compile-time - コンパイルタイム - - - - src/gui/FWObjectPropertiesFactory.cpp:320 - - %1 objects<br> - - %1 オブジェクト<br> - - - - - src/gui/FWObjectPropertiesFactory.cpp:385 - - <b>Path:</b> - <b>パス:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:444 - - protocol - プロトコル - - - - src/gui/FWObjectPropertiesFactory.cpp:449 - - type: - 種類: - - - - src/gui/FWObjectPropertiesFactory.cpp:451 - - code: - コード: - - - - src/gui/FWObjectPropertiesFactory.cpp:471 - - Pattern: "%1" - パターン: 「%1」 - - - - src/gui/FWObjectPropertiesFactory.cpp:605 - - <b>Action :</b> - <b>操作 :</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:608 - - <b>Parameter:</b> - <b>パラメーター:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:631 - - <b>Log prefix :</b> - <b>ログ接頭語 :</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:637 - - <b>Log Level :</b> - <b>ログレベル :</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:644 - - <b>Netlink group :</b> - <b>ネットリンクグループ:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:650 - - <b>Limit Value :</b> - <b>制限値 :</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:663 - - <b>Limit burst :</b> - <b>ライブラリー:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:676 - - <li><b>Stateless</b></li> - <li><b>ステートレス</b></li> - - - - src/gui/FWObjectPropertiesFactory.cpp:685 - - <b>Log facility:</b> - <b>ログファシリティ:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:692 - - <b>Log level :</b> - <b>ログレベル :</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:706 - - <li><b>Stateless</b></li> - <li><b>ステートレス</b></li> - - - - src/gui/FWObjectPropertiesFactory.cpp:722 - - <b>Log prefix :</b> - <b>ログ接頭語 :</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:728 - - <b>Max state :</b> - <b>ライブラリー:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:735 - - <li><b>Stateless</b></li> - <li><b>ステートレス</b></li> - - - - src/gui/FWObjectPropertiesFactory.cpp:747 - - <b>Max src states:</b> - <b>ライブラリー:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:758 - - <li><b>Stateless</b></li> - <li><b>ステートレス</b></li> - - - - src/gui/FWObjectPropertiesFactory.cpp:775 - - <b>Log level :</b> - <b>ログレベル :</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:781 - - <b>Log interval :</b> - <b>ライブラリー:</b> - - - - src/gui/FWObjectPropertiesFactory.cpp:788 - - <li><b>Disable logging for this rule</b></li> - このルールのログ記の無効化を -完了しました - - - - src/gui/FWObjectPropertiesFactory.cpp:820 - - bitmask - ネットマスク - - - - src/gui/FWObjectPropertiesFactory.cpp:821 - - random - ランダム - - - - src/gui/FWWindow.cpp:1080 - - Firewall Builder 2 uses file extension '.fwb' and -needs to rename old data file '%1' to '%2', -but file '%3' already exists. -Choose a different name for the new file. - ファイアウォールビルダー2 はファイル拡張子 '.fwb' を使用します。 -あなたのデータファイルは '%1' は '%2' に名称変更する必要があります。< -しかしファイル '%3' は既に存在します。 -違う新規ファイル名を選んでください。 - - - - src/gui/FWWindow.cpp:1082 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1086 - - Choose name and location for the new file - 新規ファイルの名前とフォルダーを選択 - - - - src/gui/FWWindow.cpp:1095 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1109 - - Firewall Builder 2 uses file extension '.fwb'. Your data file '%1' -has been renamed '%2' - ファイアウォールビルダー2 はファイル拡張子 '.fwb' を使用します。あなたのデータファイルは '%1' は '%2' に名称変更されました。 - - - - src/gui/FWWindow.cpp:1111 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1124 - - (read-only) - (読み込み専用) - - - - src/gui/FWWindow.cpp:1140 - - Exception: %1 - 例外: %1 - - - - src/gui/FWWindow.cpp:1142 - - Failed transformation : %1 - 変換に失敗しました : %1 - - - - src/gui/FWWindow.cpp:1144 - - XML element : %1 - XML 要素 : %1 - - - - src/gui/FWWindow.cpp:1148 - - Error loading file: -%1 - ファイルの読み込みエラー: -%1 - - - - src/gui/FWWindow.cpp:1149 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1154 - - Error loading file: -%1 - ファイルの読み込みエラー: -%1 - - - - src/gui/FWWindow.cpp:1155 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1167 - - Building object tree... - オブジェクトツリーを構築しています... - - - - src/gui/FWWindow.cpp:1172 - - Indexing... - インデックスを作成しています... - - - - src/gui/FWWindow.cpp:1198 - - Checking file %1 in RCS - RCS にファイル %1 をチェックインしています - - - - src/gui/FWWindow.cpp:1223 - - Error checking in file %1: -%2 - ファイル %1 の検査中のエラーです:%2 - - - - src/gui/FWWindow.cpp:1225 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1311 - - File is read-only - ファイルは読み込み専用です。 - - - - src/gui/FWWindow.cpp:1317 - - Error saving file %1: %2 - ファイル %1 の保存エラー: %2 - - - - src/gui/FWWindow.cpp:1319 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1360 - - Duplicate library '%1' - ライブラリー %1 の複製 - - - - src/gui/FWWindow.cpp:1361 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1382 - - Error loading file %1: -%2 - ファイル %1 の読み込みエラー: -%2 - - - - src/gui/FWWindow.cpp:1384 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1396 - - Choose a file to import - インポートするファイルを選んでください。 - - - - src/gui/FWWindow.cpp:1427 - - Choose the first file - 1 つ目のファイルを選んでください - - - - src/gui/FWWindow.cpp:1434 - - Choose the second file - 2 つ目のファイルを選んでください - - - - src/gui/FWWindow.cpp:1455 - - Error loading file %1: -%2 - ファイル %1 の読み込みエラー: -%2 - - - - src/gui/FWWindow.cpp:1457 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1473 - - Error loading file %1: -%2 - ファイル %1 の読み込みエラー: -%2 - - - - src/gui/FWWindow.cpp:1475 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1510 - - TXT Files (*.txt);;All Files (*) - FWB ファイル (*.fwb);;すべてのファイル (*) - - - - src/gui/FWWindow.cpp:1512 - - Choose name and location for the report file - 新規ファイルの名前とフォルダーを選択 - - - - src/gui/FWWindow.cpp:1538 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:1550 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:175 - - No firewalls defined - ファイアウォールは未定義です - - - - src/gui/FWWindow.cpp:1751 - - File is read-only - ファイルは読み込み専用です。 - - - - src/gui/FWWindow.cpp:1755 - - Error saving file %1: %2 - ファイル %1 の保存エラー: %2 - - - - src/gui/FWWindow.cpp:1781 - - Please select a library you want to export. - エクスポートしたいライブラリーを選択してください。 - - - - src/gui/FWWindow.cpp:1806 - - The file %1 already exists. -Do you want to overwrite it ? - ファイル %1 は既に存在します。 -本当に上書きしますか? - - - - src/gui/FWWindow.cpp:1808 - - &Yes - はい(&Y) - - - &No - いいえ(&N) - - - - src/gui/FWWindow.cpp:2000 - - %1 - %1 - - - - src/gui/FWWindow.cpp:2012 - - Building branch policy view '%1'... - ポリシービュー「%1」の分岐を構築しています... - - - - src/gui/FWWindow.cpp:2082 - - Building policy view... - ポリシービューを構築しています... - - - - src/gui/FWWindow.cpp:2088 - - Policy - ポリシー - - - - src/gui/FWWindow.cpp:2111 - - Building NAT view... - NAT ビューを構築しています... - - - - src/gui/FWWindow.cpp:2116 - - NAT - NAT - - - - src/gui/FWWindow.cpp:2126 - - Building routing view... - ルーティングビューを構築しています... - - - - src/gui/FWWindow.cpp:2131 - - Routing - ルーティング - - - - src/gui/FWWindow.cpp:379 - - Some objects have been modified but not saved. -Do you want to save changes now ? - いくつかのオブジェクトの修正が保存されていません。 -変更を保存しますか? - - - - src/gui/FWWindow.cpp:381 - - &Save - 保存(&S) - - - &Discard - 破棄する(&D) - - - &Cancel - 取り消し(&C) - - - - src/gui/FWWindow.cpp:436 - - FWB Files (*.fwb);;All Files (*) - FWB ファイル (*.fwb);;すべてのファイル (*) - - - - src/gui/FWWindow.cpp:447 - - The file %1 already exists. -Do you want to overwrite it ? - ファイル %1 は既に存在します。 -本当に上書きしますか? - - - - src/gui/FWWindow.cpp:449 - - &Yes - はい(&Y) - - - &No - いいえ(&N) - - - - src/gui/FWWindow.cpp:483 - - Choose name and location for the new file - 新規ファイルの名前とフォルダーを選択 - - - - src/gui/FWWindow.cpp:585 - - Saving data to file... - ファイルにデータを保存しています... - - - - src/gui/FWWindow.cpp:617 - - Choose name and location for the file - ファイルの名前とフォルダーを選択する - - - - src/gui/FWWindow.cpp:679 - - &Discard changes - 変更のやり直し(&D) - - - - src/gui/FWWindow.cpp:680 - - &Cancel - 取り消し(&C) - - - - src/gui/FWWindow.cpp:723 - - File %1 has been added to RCS. - ファイル %1 を RCS に追加しました。 - - - - src/gui/FWWindow.cpp:724 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:732 - - Error adding file to RCS: -%1 - RCS へのファイルの追加エラー: -%1 - - - - src/gui/FWWindow.cpp:733 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:739 - - (read-only) - (読み込み専用) - - - - src/gui/FWWindow.cpp:798 - - Loading system objects... - システムオブジェクトを読み込んでいます... - - - - src/gui/FWWindow.cpp:857 - - Error loading file: -%1 - ファイルの読み込みエラー: -%1 - - - - src/gui/FWWindow.cpp:858 - - &Continue - 続ける(&C) - - - - src/gui/FWWindow.cpp:908 - - Loading system objects... - システムオブジェクトを読み込んでいます... - - - - src/gui/FWWindow.cpp:916 - - Reading and parsing data file... - データファイルの読み込みと解析をしています... - - - - src/gui/FWWindow.cpp:986 - - Merging with system objects... - システムオブジェクトと結合しています... - - - - src/gui/FWWindowPrint.cpp:100 - - IP Service - IP サービス - - - - src/gui/FWWindowPrint.cpp:101 - - ICMP Service - ICMP サービス - - - - src/gui/FWWindowPrint.cpp:102 - - TCP Service - TCP サービス - - - - src/gui/FWWindowPrint.cpp:103 - - UDP Service - UDP サービス - - - - src/gui/FWWindowPrint.cpp:104 - - Group of services - サービスのグループ - - - - src/gui/FWWindowPrint.cpp:105 - - Time Interval - 時間間隔 - - - - src/gui/FWWindowPrint.cpp:281 - - Firewall name: %1 - * ファイアウォール名: %1 - - - - src/gui/FWWindowPrint.cpp:282 - - Platform: - プラットフォーム: - - - - src/gui/FWWindowPrint.cpp:283 - - Version: - バージョン: - - - - src/gui/FWWindowPrint.cpp:284 - - Host OS: - ホスト OS: - - - - src/gui/FWWindowPrint.cpp:290 - - Global Policy - 全体ポリシー - - - - src/gui/FWWindowPrint.cpp:343 - - Interface %1 - インターフェース %1 - - - - src/gui/FWWindowPrint.cpp:371 - - NAT - NAT - - - - src/gui/FWWindowPrint.cpp:398 - - Routing - ルーティング - - - - src/gui/FWWindowPrint.cpp:538 - - Legend - 凡例 - - - - src/gui/FWWindowPrint.cpp:629 - - Objects - オブジェクト - - - - src/gui/FWWindowPrint.cpp:851 - - Groups - グループ - - - - src/gui/FWWindowPrint.cpp:916 - - Printing aborted - 印刷を中断しました - - - - src/gui/FWWindowPrint.cpp:919 - - Printing aborted - 印刷を中断しました - - - - src/gui/FWWindowPrint.cpp:92 - - Firewall - ファイアウォール - - - - src/gui/FWWindowPrint.cpp:920 - - &Continue - 続ける(&C) - - - - src/gui/FWWindowPrint.cpp:923 - - Printing completed - 印刷を完了しました - - - - src/gui/FWWindowPrint.cpp:927 - - Printing aborted - 印刷を中断しました - - - - src/gui/FWWindowPrint.cpp:93 - - Host - ホスト - - - - src/gui/FWWindowPrint.cpp:94 - - Address - アドレス - - - - src/gui/FWWindowPrint.cpp:95 - - Addres Range - アドレスレンジ - - - - src/gui/FWWindowPrint.cpp:96 - - Interface - インターフェース - - - - src/gui/FWWindowPrint.cpp:97 - - Network - ネットワーク - - - - src/gui/FWWindowPrint.cpp:98 - - Group of objects - オブジェクトのツリー - - - - src/gui/FWWindowPrint.cpp:99 - - Custom Service - カスタムサービス - - - - src/gui/FilterDialog.cpp:102 - - Filter error - フィルターエラー - - - Invalid RegExp. - 不正な正規表現です。 - - - - src/gui/FilterDialog.cpp:404 - - Name - 名前 - - - - src/gui/FilterDialog.cpp:405 - - Address - アドレス - - - - src/gui/FilterDialog.cpp:408 - - Contains - 内容 - - - - src/gui/FilterDialog.cpp:411 - - Ends with - 編集 - - - - src/gui/FindObjectWidget.cpp:316 - - Search hit the end of the policy rules. - 検索のヒットがオブジェクトツリーの最後です。 - - - - src/gui/FindObjectWidget.cpp:317 - - &Continue at top - 続ける(&C) - - - &Stop - 停止(&S) - - - - src/gui/FindObjectWidget.cpp:324 - - Search hit the end of the object tree. - 検索のヒットがオブジェクトツリーの最後です。 - - - - src/gui/FindObjectWidget.cpp:325 - - &Continue at top - 続ける(&C) - - - &Stop - 停止(&S) - - - - src/gui/FindObjectWidget.cpp:466 - - Replaced %1 objects. - このオブジェクトと置換 - - - - src/gui/FindWhereUsedWidget.cpp:171 - - NAT - NAT - - - - src/gui/FindWhereUsedWidget.cpp:174 - - Policy - ポリシー - - - - src/gui/FindWhereUsedWidget.cpp:177 - - Routing - ルーティング - - - - src/gui/FindWhereUsedWidget.cpp:180 - - Unknown rule set - 不明なルールセット - - - - src/gui/FindWhereUsedWidget.cpp:182 - - /Rule%1 - ルール %1 - - - - src/gui/FindWhereUsedWidget.cpp:196 - - Type: - 種類: - - - - src/gui/FirewallDialog.cpp:314 - - FWBuilder API error: %1 - FWBuilder API エラー: %1 - - - - src/gui/FirewallDialog.cpp:315 - - &Continue - 続ける(&C) - - - - src/gui/FirewallDialog.cpp:339 - - FWBuilder API error: %1 - FWBuilder API エラー: %1 - - - - src/gui/FirewallDialog.cpp:340 - - &Continue - 続ける(&C) - - - - src/gui/GroupObjectDialog.cpp:144 - - Name - 名前 - - - - src/gui/GroupObjectDialog.cpp:145 - - Properties - プロパティ - - - - src/gui/GroupObjectDialog.cpp:675 - - Open - 開く - - - - src/gui/GroupObjectDialog.cpp:677 - - Edit - 編集 - - - - src/gui/GroupObjectDialog.cpp:680 - - Copy - コピー - - - - src/gui/GroupObjectDialog.cpp:681 - - Cut - 切り取り - - - - src/gui/GroupObjectDialog.cpp:682 - - Paste - 貼り付け - - - - src/gui/GroupObjectDialog.cpp:683 - - Delete - 削除 - - - - src/gui/IPv4Dialog.cpp:145 - - Illegal IP address '%1' - 不当な IP アドレス '%1' - - - - src/gui/IPv4Dialog.cpp:146 - - &Continue - 続ける(&C) - - - - src/gui/IPv4Dialog.cpp:159 - - Illegal netmask '%1' - 不当なネットマスク 「%1」 - - - - src/gui/IPv4Dialog.cpp:160 - - &Continue - 続ける(&C) - - - - src/gui/IPv4Dialog.cpp:270 - - DNS lookup failed for name of the address object '%1'. - アドレスオブジェクト '%1' の名前を DNS 解決に失敗しました。 - - - - src/gui/InstallFirewallViewItem.cpp:31 - - Failure - 失敗 - - - - src/gui/InstallFirewallViewItem.cpp:44 - - Success - 成功 - - - - src/gui/InterfaceDialog.cpp:193 - - Group: - グループ: - - - - src/gui/InterfaceDialog.cpp:211 - - Network: - ネットワーク: - - - - src/gui/LibraryDialog.cpp:151 - - Pick the color for this library - このライブラリーの色を選択してください。 - - - - src/gui/NetworkDialog.cpp:108 - - Illegal IP address '%1' - 不当な IP アドレス '%1' - - - - src/gui/NetworkDialog.cpp:109 - - &Continue - 続ける(&C) - - - - src/gui/NetworkDialog.cpp:119 - - Illegal netmask '%1' - 不当なネットマスク 「%1」 - - - - src/gui/NetworkDialog.cpp:120 - - &Continue - 続ける(&C) - - - - src/gui/ObjConflictResolutionDialog.cpp:117 - - Object '%1' has been deleted - オブジェクト「%1」を削除しました。 - - - - src/gui/ObjConflictResolutionDialog.cpp:118 - - Delete - 削除 - - - - src/gui/ObjConflictResolutionDialog.cpp:141 - - Object '%1' has been deleted - オブジェクト「%1」を削除しました。 - - - - src/gui/ObjConflictResolutionDialog.cpp:142 - - Delete - 削除 - - - - src/gui/ObjConflictResolutionDialog.cpp:176 - - Object '%1' in the objects tree - 検索のヒットがオブジェクトツリーの最後です。 - - - - src/gui/ObjConflictResolutionDialog.cpp:178 - - Object '%1' in file %2 - ファイル %2 中の オブジェクト「%1」 - - - - src/gui/ObjConflictResolutionDialog.cpp:180 - - Object '%1' in file %2 - ファイル %2 中の オブジェクト「%1」 - - - - src/gui/ObjConflictResolutionDialog.cpp:297 - - Next - 次へ - - - - src/gui/ObjConflictResolutionDialog.cpp:63 - - Keep current object - 現在のオブジェクトを保持 - - - - src/gui/ObjConflictResolutionDialog.cpp:64 - - Replace with this object - このオブジェクトと置換 - - - - src/gui/ObjectEditor.cpp:438 - - &Continue editing - 編集を続ける(&C) - - - - src/gui/ObjectEditor.cpp:439 - - &Discard changes - 変更のやり直し(&D) - - - - src/gui/ObjectEditor.cpp:465 - - This object has been modified but not saved. -Do you want to save it ? - いくつかのオブジェクトの修正が保存されていません。 -変更を保存しますか? - - - - src/gui/ObjectEditor.cpp:466 - - &Save - 保存(&S) - - - &Discard - 破棄する(&D) - - - &Continue editing - 編集を続ける(&C) - - - - src/gui/ObjectManipulator.cpp:1002 - - New TagService - 新規 TCP サービス - - - - src/gui/ObjectManipulator.cpp:1006 - - New Group - 新規グループ - - - - src/gui/ObjectManipulator.cpp:1010 - - New Time Interval - 新規時間間隔 - - - - src/gui/ObjectManipulator.cpp:1014 - - Find - 検索 - - - - src/gui/ObjectManipulator.cpp:1027 - - Group - グループ - - - - src/gui/ObjectManipulator.cpp:1035 - - Compile - コンパイル - - - - src/gui/ObjectManipulator.cpp:1036 - - Install - インストール - - - - src/gui/ObjectManipulator.cpp:1043 - - Lock - ロックする - - - - src/gui/ObjectManipulator.cpp:1045 - - Unlock - ロック解除する - - - - src/gui/ObjectManipulator.cpp:1054 - - dump - ダンプ - - - - src/gui/ObjectManipulator.cpp:1087 - - Undelete... - 削除の復活... - - - - src/gui/ObjectManipulator.cpp:145 - - Object Manipulator - オブジェクトマニピュレータ - - - - src/gui/ObjectManipulator.cpp:161 - - New &Library - 新規ライブラリー(&L) - - - - src/gui/ObjectManipulator.cpp:164 - - New &Firewall - 新規ファイアウォール(&F) - - - - src/gui/ObjectManipulator.cpp:165 - - New &Host - 新規ホスト(&H) - - - - src/gui/ObjectManipulator.cpp:166 - - New &Interface - 新規インターフェース(&I) - - - - src/gui/ObjectManipulator.cpp:168 - - New &Network - 新規ネットワーク(&N) - - - - src/gui/ObjectManipulator.cpp:169 - - New &Address - 新規アドレス(&A) - - - - src/gui/ObjectManipulator.cpp:170 - - New &DNS Name - 新規 DNS 名(&D) - - - - src/gui/ObjectManipulator.cpp:171 - - New A&ddress Table - 新規アドレステーブル(&D) - - - - src/gui/ObjectManipulator.cpp:172 - - New Address &Range - 新規アドレスレンジ(&R) - - - - src/gui/ObjectManipulator.cpp:173 - - New &Object Group - 新規オブジェクトグループ(&O) - - - - src/gui/ObjectManipulator.cpp:175 - - New &Custom Service - 新規カスタムサービス(&C) - - - - src/gui/ObjectManipulator.cpp:1752 - - &Yes - はい(&Y) - - - &No - いいえ(&N) - - - - src/gui/ObjectManipulator.cpp:176 - - New &IP Service - 新規 IP サービス(&I) - - - - src/gui/ObjectManipulator.cpp:177 - - New IC&MP Service - 新規 ICMP サービス(&M) - - - - src/gui/ObjectManipulator.cpp:178 - - New &TCP Service - 新規 TCP サービス(&T) - - - - src/gui/ObjectManipulator.cpp:179 - - New &UDP Service - 新規 UDP サービス(&D) - - - - src/gui/ObjectManipulator.cpp:180 - - New &TagService - 新規タグサービス(&T) - - - - src/gui/ObjectManipulator.cpp:181 - - New &Service Group - 新規サービスグループ(&S) - - - - src/gui/ObjectManipulator.cpp:1828 - - &Yes - はい(&Y) - - - &No - いいえ(&N) - - - - src/gui/ObjectManipulator.cpp:183 - - New Ti&me Interval - 新規時間間隔(&M) - - - - src/gui/ObjectManipulator.cpp:230 - - ( read only ) - ( 読み込み専用 ) - - - - src/gui/ObjectManipulator.cpp:2470 - - New Interface - 新規インターフェース - - - - src/gui/ObjectManipulator.cpp:2473 - - New Interface - 新規インターフェース - - - - src/gui/ObjectManipulator.cpp:2491 - - New Network - 新規ネットワーク - - - - src/gui/ObjectManipulator.cpp:2515 - - New Address - 新規アドレス - - - - src/gui/ObjectManipulator.cpp:2531 - - New Address - 新規アドレス - - - - src/gui/ObjectManipulator.cpp:2546 - - New DNS Name - 新規 DNS 名 - - - - src/gui/ObjectManipulator.cpp:2557 - - New Address Table - 新規アドレステーブル - - - - src/gui/ObjectManipulator.cpp:2591 - - New TagService - 新規 TCP サービス - - - - src/gui/ObjectManipulator.cpp:2624 - - New Address Range - 新規アドレスレンジ - - - - src/gui/ObjectManipulator.cpp:2635 - - New Object Group - 新規オブジェクトグループ - - - - src/gui/ObjectManipulator.cpp:2647 - - New Custom Service - 新規カスタムサービス - - - - src/gui/ObjectManipulator.cpp:2658 - - New IP Service - 新規 IP サービス - - - - src/gui/ObjectManipulator.cpp:2669 - - New ICMP Service - 新規 ICMP サービス - - - - src/gui/ObjectManipulator.cpp:2680 - - New TCP Service - 新規 TCP サービス - - - - src/gui/ObjectManipulator.cpp:2691 - - New UDP Service - 新規 UDP サービス - - - - src/gui/ObjectManipulator.cpp:2702 - - New Service Group - 新規サービスグループ - - - - src/gui/ObjectManipulator.cpp:2714 - - New Time Interval - 新規時間間隔 - - - - src/gui/ObjectManipulator.cpp:510 - - &Yes - はい(&Y) - - - &No - いいえ(&N) - - - - src/gui/ObjectManipulator.cpp:539 - - &Yes - はい(&Y) - - - &No - いいえ(&N) - - - - src/gui/ObjectManipulator.cpp:840 - - Edit - 編集 - - - - src/gui/ObjectManipulator.cpp:874 - - place in library %1 - ライブラリー %1 の中の場所 - - - - src/gui/ObjectManipulator.cpp:883 - - to library %1 - ライブラリー %1 へ - - - - src/gui/ObjectManipulator.cpp:893 - - place here - ここの場所 - - - - src/gui/ObjectManipulator.cpp:896 - - Duplicate ... - 複製 ... - - - - src/gui/ObjectManipulator.cpp:901 - - Move ... - 移動 ... - - - - src/gui/ObjectManipulator.cpp:904 - - Move ... - 移動 ... - - - - src/gui/ObjectManipulator.cpp:912 - - Copy - コピー - - - - src/gui/ObjectManipulator.cpp:914 - - Cut - 切り取り - - - - src/gui/ObjectManipulator.cpp:916 - - Paste - 貼り付け - - - - src/gui/ObjectManipulator.cpp:921 - - Delete - 削除 - - - - src/gui/ObjectManipulator.cpp:933 - - Add Interface - 新規インターフェース - - - - src/gui/ObjectManipulator.cpp:938 - - Add IP Address - 新規 IP アドレス - - - - src/gui/ObjectManipulator.cpp:940 - - Add MAC Address - 新規 MAC アドレス - - - - src/gui/ObjectManipulator.cpp:945 - - New Firewall - 新規ファイアウォール - - - - src/gui/ObjectManipulator.cpp:950 - - New Address - 新規アドレス - - - - src/gui/ObjectManipulator.cpp:955 - - New DNS Name - 新規 DNS 名 - - - - src/gui/ObjectManipulator.cpp:961 - - New Address Table - 新規アドレステーブル - - - - src/gui/ObjectManipulator.cpp:966 - - New Address Range - 新規アドレスレンジ - - - - src/gui/ObjectManipulator.cpp:970 - - New Host - 新規ホスト - - - - src/gui/ObjectManipulator.cpp:974 - - New Network - 新規ネットワーク - - - - src/gui/ObjectManipulator.cpp:978 - - New Group - 新規グループ - - - - src/gui/ObjectManipulator.cpp:982 - - New Custom Service - 新規カスタムサービス - - - - src/gui/ObjectManipulator.cpp:986 - - New IP Service - 新規 IP サービス - - - - src/gui/ObjectManipulator.cpp:990 - - New ICMP Service - 新規 ICMP サービス - - - - src/gui/ObjectManipulator.cpp:994 - - New TCP Service - 新規 TCP サービス - - - - src/gui/ObjectManipulator.cpp:998 - - New UDP Service - 新規 UDP サービス - - - - src/gui/ObjectTreeView.cpp:115 - - Object - オブジェクト - - - - src/gui/PrefsDialog.cpp:178 - - Pick the color - 色を摘出 - - - - src/gui/PrefsDialog.cpp:226 - - Find working directory - 作業ディレクトリの検索 - - - - src/gui/PrefsDialog.cpp:235 - - Find Secure Shell utility - セキュアシェルユーティリティの検索 - - - - src/gui/PrefsDialog.cpp:286 - - Find add-on library - アドオンライブラリーの検索 - - - - src/gui/PrintingProgressDialog.cpp:48 - - Printing (page %1/%2) - 印刷中 (ページ %1/%2) - - - - src/gui/PrintingProgressDialog.cpp:50 - - Printing page %1 - 印刷中 (ページ %1) - - - - src/gui/PrintingProgressDialog.cpp:67 - - Aborting print operation - 印刷操作を中断しています - - - - src/gui/RCS.cpp:1038 - - Fatal error running rcsdiff for file %1 - 致命的なエラーです。ファイル %1 のrcsdiff を実行中です。 - - - - src/gui/RCS.cpp:502 - - Error checking file out: %1 - ファイル取り出しの検査中エラー: %1 - - - - src/gui/RCS.cpp:503 - - &Continue - 続ける(&C) - - - - src/gui/RCS.cpp:694 - - Error creating temporary file - 一時ファイルの作成に失敗しました - - - - src/gui/RCS.cpp:695 - - &Continue - 続ける(&C) - - - - src/gui/RCS.cpp:707 - - Error writing to temporary file - 維持値ファイルの書き込みに失敗しました - - - - src/gui/RCS.cpp:708 - - &Continue - 続ける(&C) - - - - src/gui/RCS.cpp:724 - - Error checking file out: %1 - ファイル取り出しの検査中エラー: %1 - - - - src/gui/RCS.cpp:725 - - &Continue - 続ける(&C) - - - - src/gui/RCS.cpp:739 - - File is opened and locked by %1. -You can only open it read-only. - ファイルはオープン済みで %1 にロックされています。それは読み込み専用でのみ開くことが出来ます。 - - - - src/gui/RCS.cpp:755 - - &Cancel - 取り消し(&C) - - - Open &read-only - 読み込み専用で開く(&O) - - - &Open and continue editing - 読み込んで編集を続ける(&O) - - - - src/gui/RCS.cpp:807 - - Error checking file out: %1 - ファイル取り出しの検査中エラー: %1 - - - - src/gui/RCS.cpp:808 - - &Continue - 続ける(&C) - - - - src/gui/RCS.cpp:998 - - Fatal error running rlog for %1 - 致命的なエラーで、%1 の rlog を実行中です。 - - - - src/gui/RCSFilePreview.cpp:137 - - File is not in RCS - ファイルが RCS にありません。 - - - - src/gui/RuleSetView.cpp:1457 - - Insert Rule - ルール挿入 - - - - src/gui/RuleSetView.cpp:1459 - - Paste Rule - ルール貼り付け - - - - src/gui/RuleSetView.cpp:1473 - - Paste Rule - ルール貼り付け - - - - src/gui/RuleSetView.cpp:1603 - - Parameters - フラグメント - - - - src/gui/RuleSetView.cpp:1620 - - Inbound - 内向き - - - - src/gui/RuleSetView.cpp:1624 - - Outbound - 外向き - - - - src/gui/RuleSetView.cpp:1628 - - Both - 両方 - - - - src/gui/RuleSetView.cpp:1637 - - Rule Options - ルールオプション - - - - src/gui/RuleSetView.cpp:1644 - - Logging On - 記録する - - - - src/gui/RuleSetView.cpp:1648 - - Logging Off - 記録しない - - - - src/gui/RuleSetView.cpp:1660 - - Edit - 編集 - - - - src/gui/RuleSetView.cpp:1663 - - Copy - コピー - - - - src/gui/RuleSetView.cpp:1665 - - Cut - 切り取り - - - - src/gui/RuleSetView.cpp:1666 - - Paste - 貼り付け - - - - src/gui/RuleSetView.cpp:1669 - - Delete - 削除 - - - - src/gui/RuleSetView.cpp:1674 - - Reveal in tree - ツリーから検索 - - - - src/gui/RuleSetView.cpp:1677 - - Negate - 否定 - - - - src/gui/RuleSetView.cpp:1717 - - Insert Rule - ルール挿入 - - - - src/gui/RuleSetView.cpp:1725 - - Rules: %1-%2 - ルール: %1-%2 - - - - src/gui/RuleSetView.cpp:1728 - - Rule: %1 - ルール: %1 - - - - src/gui/RuleSetView.cpp:1733 - - Color Label: - 色ラベル: - - - - src/gui/RuleSetView.cpp:1745 - - Insert Rule - ルール挿入 - - - - src/gui/RuleSetView.cpp:1747 - - Add Rule Below - 下にルール追加 - - - - src/gui/RuleSetView.cpp:1750 - - Remove Rule - ルール削除 - - - - src/gui/RuleSetView.cpp:1751 - - Remove Rules - 複数ルール削除 - - - - src/gui/RuleSetView.cpp:1754 - - Move Rule - ルール移動 - - - - src/gui/RuleSetView.cpp:1755 - - Move Rules - 複数ルール移動 - - - - src/gui/RuleSetView.cpp:1761 - - Copy Rule - ルールコピー - - - - src/gui/RuleSetView.cpp:1763 - - Cut Rule - ルール切り取り - - - - src/gui/RuleSetView.cpp:1765 - - Paste Rule Above - 上にルールを貼り付け - - - - src/gui/RuleSetView.cpp:1767 - - Paste Rule Below - 下にルールを貼り付け - - - - src/gui/RuleSetView.cpp:1774 - - Enable Rule - ルール有効 - - - - src/gui/RuleSetView.cpp:1775 - - Enable Rules - ルール群有効 - - - - src/gui/RuleSetView.cpp:1779 - - Disable Rule - ルール無効 - - - - src/gui/RuleSetView.cpp:1780 - - Disable Rules - ルール群無効 - - - - src/gui/RuleSetView.cpp:1789 - - Edit - 編集 - - - - src/gui/RuleSetView.cpp:1793 - - Edit - 編集 - - - - src/gui/RuleSetView.cpp:1797 - - Edit - 編集 - - - - src/gui/RuleSetView.cpp:206 - - A Rule Set - ルールセット - - - - src/gui/RuleSetView.cpp:3306 - - Source - ソース - - - - src/gui/RuleSetView.cpp:3309 - - Destination - ディスティネーション - - - - src/gui/RuleSetView.cpp:3312 - - Service - サービス - - - - src/gui/RuleSetView.cpp:3315 - - Interface - インターフェース - - - - src/gui/RuleSetView.cpp:3318 - - Direction - 方向 - - - - src/gui/RuleSetView.cpp:3321 - - Action - 操作 - - - - src/gui/RuleSetView.cpp:3326 - - Time - 時間 - - - - src/gui/RuleSetView.cpp:3332 - - Options - オプション - - - - src/gui/RuleSetView.cpp:3336 - - Comment - コメント - - - - src/gui/RuleSetView.cpp:3396 - - Source - ソース - - - - src/gui/RuleSetView.cpp:3399 - - Destination - ディスティネーション - - - - src/gui/RuleSetView.cpp:3402 - - Service - サービス - - - - src/gui/RuleSetView.cpp:3405 - - Direction - 方向 - - - - src/gui/RuleSetView.cpp:3408 - - Action - 操作 - - - - src/gui/RuleSetView.cpp:3413 - - Time - 時間 - - - - src/gui/RuleSetView.cpp:3419 - - Options - オプション - - - - src/gui/RuleSetView.cpp:3423 - - Comment - コメント - - - - src/gui/RuleSetView.cpp:3481 - - Original Src - オリジナルソース - - - - src/gui/RuleSetView.cpp:3484 - - Original Dst - オリジナルディスティネーション - - - - src/gui/RuleSetView.cpp:3487 - - Original Srv - オリジナルサービス - - - - src/gui/RuleSetView.cpp:3490 - - Translated Src - 転送元ソース - - - - src/gui/RuleSetView.cpp:3493 - - Translated Dst - 転送先 - - - - src/gui/RuleSetView.cpp:3496 - - Translated Srv - 転送サービス - - - - src/gui/RuleSetView.cpp:3499 - - Options - オプション - - - - src/gui/RuleSetView.cpp:3502 - - Comment - コメント - - - - src/gui/RuleSetView.cpp:3559 - - Destination - ディスティネーション - - - - src/gui/RuleSetView.cpp:3562 - - Gateway - ゲートウェイ - - - - src/gui/RuleSetView.cpp:3565 - - Interface - インターフェース - - - - src/gui/RuleSetView.cpp:3568 - - Metric - サービス - - - - src/gui/RuleSetView.cpp:3571 - - Options - オプション - - - - src/gui/RuleSetView.cpp:3574 - - Comment - コメント - - - - src/gui/RuleSetView.cpp:621 - - Outbound - 外向き - - - - src/gui/RuleSetView.cpp:707 - - Original - オリジナル - - - - src/gui/RuleSetView.cpp:708 - - Default - 削除 - - - - src/gui/RuleSetView.cpp:712 - - Any - すべて - - - - src/gui/RuleSetView.cpp:720 - - Any - すべて - - - - src/gui/SSHPIX.cpp:136 - - -*** Fatal error : - -*** 致命的なエラー : - - - - src/gui/SSHPIX.cpp:170 - - Logged in - ログイン - - - - src/gui/SSHPIX.cpp:171 - - Switching to enable mode... - 有効モードに切り替え中... - - - - - src/gui/SSHPIX.cpp:205 - - New RSA key - 新規 RSA キー - - - - src/gui/SSHPIX.cpp:206 - - Yes - はい - - - No - いいえ - - - - src/gui/SSHPIX.cpp:252 - - In enable mode. - 有効モード中です。 - - - - src/gui/SSHPIX.cpp:347 - - Can not open file %1 - ファイル %1 を開くことが出来ません。 - - - - src/gui/SSHPIX.cpp:424 - - Rule %1 - ルール %1 - - - - src/gui/SSHPIX.cpp:450 - - End - 終了: - - - - src/gui/SSHPIX.cpp:532 - - Making backup copy of the firewall configuration - ファイアウォール設定のバックアップコピー作成中 - - - - src/gui/SSHPIX.cpp:596 - - *** Clearing unused access lists - *** 未使用アクセス一覧の消去中 - - - - src/gui/SSHPIX.cpp:661 - - *** Clearing unused object groups - *** 未使用オブジェクトグループの消去中 - - - - src/gui/SSHPIX.cpp:681 - - *** End - *** 終了 - - - - src/gui/SSHPIX.cpp:692 - - Reading current firewall configuration - 現在のファイアウォール設定の読み込み中 - - - - src/gui/SSHPIX.cpp:717 - - Generating configuration diff - 設定の差分を生成中 - - - - src/gui/SSHPIX.cpp:732 - - Fork failed for %1 - %1 のフォークに失敗しました - - - - src/gui/SSHPIX.cpp:738 - - Not enough memory. - メモリがありません。 - - - - src/gui/SSHPIX.cpp:743 - - Too many opened file descriptors in the system. - システムでファイルディスクリプタを開きすぎています。 - - - - src/gui/SSHPIX.cpp:769 - - Empty configuration diff - 設定の差分がありません - - - - src/gui/SSHSession.cpp:180 - - Failed to start ssh - ssh の開始に失敗しました。 - - - - src/gui/SSHSession.cpp:500 - - ERROR - エラー - - - OK - OK - - - - src/gui/SSHSession.cpp:502 - - SSH session terminated, exit status: %1 - SSH 接続が切断しました。終了ステータス: %1 - - - - src/gui/SSHUnx.cpp:152 - - Logged in - ログイン - - - - src/gui/SSHUnx.cpp:177 - - New RSA key - 新規 RSA キー - - - - src/gui/SSHUnx.cpp:178 - - Yes - はい - - - No - いいえ - - - - src/gui/SSHUnx.cpp:237 - - Done - 終了しました - - - - src/gui/SSHUnx.cpp:249 - - Error in SSH - SSH のエラー - - - - src/gui/SSHUnx.cpp:96 - - -*** Fatal error : - -*** 致命的なエラー : - - - - src/gui/SimpleTextEditor.cpp:71 - - Choose file - インポートするファイルを選んでください。 - - - - src/gui/SimpleTextEditor.cpp:79 - - Could not open file %1 - ファイル %1 を開くことが出来ません。 - - - - src/gui/StartWizard.cpp:106 - - File %1 is read-only, you can not save changes to it. - ファイル %1 は読み込み専用です。変更を保存することが出来ませんでした。 - - - - src/gui/StartWizard.cpp:157 - - Error adding file to RCS: -%1 - RCS へのファイルの追加エラー: -%1 - - - - src/gui/StartWizard.cpp:171 - - Error opening file: -%1 - ファイルを開くことが出来ません: -%1 - - - - src/gui/StartWizard.cpp:99 - - Choose name and location for the new file - 新規ファイルの名前とフォルダーを選択 - - - - src/gui/TCPServiceDialog.cpp:177 - - &Continue editing - 編集を続ける(&C) - - - - src/gui/TCPServiceDialog.cpp:185 - - &Continue editing - 編集を続ける(&C) - - - - src/gui/TimeDialog.cpp:68 - - (M/D/Y) - 日付 (月/日/年): - - - - src/gui/TimeDialog.cpp:69 - - (M/D/Y) - 日付 (月/日/年): - - - - src/gui/TimeDialog.cpp:73 - - (D/M/Y) - 日付 (日/月/年): - - - - src/gui/TimeDialog.cpp:74 - - (D/M/Y) - 日付 (日/月/年): - - - - src/gui/TimeDialog.cpp:78 - - (Y/M/D) - 日付 (年/日/月): - - - - src/gui/TimeDialog.cpp:79 - - (Y/M/D) - 日付 (年/日/月): - - - - src/gui/TimeDialog.cpp:83 - - (Y/D/M) - 日付 (年/日/月) - - - - src/gui/TimeDialog.cpp:84 - - (Y/D/M) - 日付 (年/日/月) - - - - src/gui/UDPServiceDialog.cpp:119 - - &Continue editing - 編集を続ける(&C) - - - - src/gui/UDPServiceDialog.cpp:127 - - &Continue editing - 編集を続ける(&C) - - - - src/gui/aboutdialog_q.ui.h:14 - - Revision: %1 ( Build: %2 ) - リビジョン: %1 ( ビルド: %2 ) - - - - src/gui/aboutdialog_q.ui.h:16 - - Using Firewall Builder API %1 - 試用中の libfwbuilder API バージョン - - - - src/gui/execDialog.cpp:101 - - Error: Failed to start program - エラー: プログラムの開始に失敗しました。 - - - - src/gui/filePropDialog.cpp:62 - - Opened read-only - 読み込み専用で開いています - - - - src/gui/filePropDialog.cpp:80 - - Revision %1 - リビジョン %1 - - - - src/gui/findDialog.cpp:269 - - Search hit the end of the object tree. - 検索のヒットがオブジェクトツリーの最後です。 - - - - src/gui/findDialog.cpp:270 - - &Continue at top - 続ける(&C) - - - &Stop - 停止(&S) - - - - src/gui/freebsdAdvancedDialog.cpp:62 - - No change - 変更なし - - - - src/gui/freebsdAdvancedDialog.cpp:65 - - On - オン - - - - src/gui/freebsdAdvancedDialog.cpp:68 - - Off - オフ - - - - src/gui/instDialog.cpp:1043 - - Can not open file %1 - ファイル %1 を開くことが出来ません。 - - - - src/gui/instDialog.cpp:1146 - - -Copying %1 -> %2:%3 - - -%1 から %2:%3 へコピーしています - - - - - src/gui/instDialog.cpp:1180 - - Running command '%1' - - コマンド '%1' を実行しています - - - - - src/gui/instDialog.cpp:1190 - - Success - 成功 - - - - src/gui/instDialog.cpp:1191 - - Success - 成功 - - - - src/gui/instDialog.cpp:1195 - - Error - エラー - - - - src/gui/instDialog.cpp:1196 - - Error - エラー - - - - src/gui/instDialog.cpp:1225 - - Done - - 実行しました - - - - - src/gui/instDialog.cpp:1288 - - Activating new policy - - 新規ポリシーの有効化中 - - - - - src/gui/instDialog.cpp:1450 - - Error: Failed to start program - エラー: プログラムの開始に失敗しました。 - - - - src/gui/instDialog.cpp:1476 - - &Continue - 続ける(&C) - - - - src/gui/instDialog.cpp:1497 - - Firewall isn't compiled. - ファイアウォールを構築しませんでした。 - - - - src/gui/instDialog.cpp:159 - - Unknown operation. - 不明な操作です。 - - - - src/gui/instDialog.cpp:1592 - - Firewall platform is not specified in this object. -Can't compile firewall policy. - ファイアウォールプラットフォームがこのオブジェクトで指定されていません。 -ファイアウォールポリシーをコンパイルできません。 - - - - src/gui/instDialog.cpp:1594 - - &Continue - 続ける(&C) - - - - src/gui/instDialog.cpp:1793 - - Error: Terminating install sequence - - エラー: インストールシーケンス終了 - - - - - src/gui/instDialog.cpp:1829 - - Success - 成功 - - - - src/gui/instDialog.cpp:1834 - - Error - エラー - - - - src/gui/instDialog.cpp:1858 - - Success - 成功 - - - - src/gui/instDialog.cpp:1859 - - Success - 成功 - - - - src/gui/instDialog.cpp:1870 - - Error - エラー - - - - src/gui/instDialog.cpp:1871 - - Error - エラー - - - - src/gui/instDialog.cpp:1899 - - Compiling ... - コンパイル中... - - - - src/gui/instDialog.cpp:190 - - Show details - 詳細を表示する - - - - src/gui/instDialog.cpp:1904 - - Failure - 失敗 - - - - src/gui/instDialog.cpp:1913 - - Recompile - 再コンパイル - - - - src/gui/instDialog.cpp:196 - - Hide details - 詳細を隠す - - - - src/gui/instDialog.cpp:1999 - - Batch policy rules compilation - ポリシールール群から検索 - - - - src/gui/instDialog.cpp:2028 - - Stop - 停止 - - - - src/gui/instDialog.cpp:2052 - - Compiling ... - コンパイル中... - - - - src/gui/instDialog.cpp:2057 - - Failure - 失敗 - - - - src/gui/instDialog.cpp:2122 - - Error: Failed to start program - エラー: プログラムの開始に失敗しました。 - - - - src/gui/instDialog.cpp:2171 - - Stop - 停止 - - - - src/gui/instDialog.cpp:2182 - - Install firewall: - ファイアウォールインストール: - - - - src/gui/instDialog.cpp:2192 - - Installing firewalls - ファイアウォールのインストール - - - - src/gui/instDialog.cpp:2223 - - Installing ... - インストール中... - - - - src/gui/instDialog.cpp:2265 - - Failure - 失敗 - - - - src/gui/instDialog.cpp:2284 - - Failure - 失敗 - - - - src/gui/instDialog.cpp:2298 - - Failure - 失敗 - - - - src/gui/instDialog.cpp:2310 - - Failure - 失敗 - - - - src/gui/instDialog.cpp:2407 - - Show selected - 選択の表示 - - - - src/gui/instDialog.cpp:2413 - - Show all - すべて表示する - - - - src/gui/instDialog.cpp:300 - - Unsupported exception - 未サポートの例外 - - - - src/gui/instDialog.cpp:340 - - <b>Summary:</b> - <b>要約:</b> - - - - src/gui/instDialog.cpp:343 - - * firewall name : %1 - * ファイアウォール名: %1 - - - - src/gui/instDialog.cpp:345 - - * user name : %1 - * ユーザー名: %1 - - - - src/gui/instDialog.cpp:347 - - * management address : %1 - * 管理アドレス: %1 - - - - src/gui/instDialog.cpp:349 - - * platform : %1 - * プラットフォーム: %1 - - - - src/gui/instDialog.cpp:351 - - * host OS : %1 - * ホスト OS: %1 - - - - src/gui/instDialog.cpp:353 - - * Loading configuration from file %1 - * ファイル %1 から設定を読み込んでいます - - - - src/gui/instDialog.cpp:358 - - * Incremental install - * インクリメンタルインストール - - - - src/gui/instDialog.cpp:363 - - * Configuration diff will be saved in file %1 - * 設定の差分をファイル %1 に保存するでしょう - - - - src/gui/instDialog.cpp:368 - - * Commands will not be executed on the firewall - * コマンドはファイアウォール上で実行されないでしょう - - - - src/gui/instDialog.cpp:373 - - * firewall name : %1 - * ファイアウォール名: %1 - - - - src/gui/instDialog.cpp:732 - - File %1 not found. - ファイル %1 が見つかりません。 - - - - src/gui/instDialog.cpp:733 - - &Continue - 続ける(&C) - - - - src/gui/instOptionsDialog.cpp:66 - - Install options for firewall '%1' - ファイアウォールポリシーのインストール - - - - src/gui/ipfAdvancedDialog.cpp:170 - - Script Editor - スクリプトエディター - - - - src/gui/ipfAdvancedDialog.cpp:179 - - Script Editor - スクリプトエディター - - - - src/gui/ipfwAdvancedDialog.cpp:144 - - Script Editor - スクリプトエディター - - - - src/gui/ipfwAdvancedDialog.cpp:153 - - Script Editor - スクリプトエディター - - - - src/gui/iptAdvancedDialog.cpp:204 - - Script Editor - スクリプトエディター - - - - src/gui/iptAdvancedDialog.cpp:213 - - Script Editor - スクリプトエディター - - - - src/gui/linksysAdvancedDialog.cpp:68 - - No change - 変更なし - - - - src/gui/linksysAdvancedDialog.cpp:71 - - On - オン - - - - src/gui/linksysAdvancedDialog.cpp:74 - - Off - オフ - - - - src/gui/linux24AdvancedDialog.cpp:62 - - No change - 変更なし - - - - src/gui/linux24AdvancedDialog.cpp:65 - - On - オン - - - - src/gui/linux24AdvancedDialog.cpp:68 - - Off - オフ - - - - src/gui/listOfLibraries.cpp:148 - - &Continue - 続ける(&C) - - - - src/gui/listOfLibraries.cpp:186 - - Error loading file %1: -%2 - ファイル %1 の読み込みエラー: -%2 - - - - src/gui/listOfLibraries.cpp:188 - - &Continue - 続ける(&C) - - - - src/gui/listOfLibraries.cpp:214 - - Duplicate library '%1' - ライブラリー %1 の複製 - - - - src/gui/listOfLibraries.cpp:215 - - &Continue - 続ける(&C) - - - - src/gui/macosxAdvancedDialog.cpp:62 - - No change - 変更なし - - - - src/gui/macosxAdvancedDialog.cpp:65 - - On - オン - - - - src/gui/macosxAdvancedDialog.cpp:68 - - Off - オフ - - - - src/gui/newFirewallDialog.cpp:229 - - Missing SNMP community string. - SNMP コミュニティ文字列が足りません。 - - - - src/gui/newFirewallDialog.cpp:422 - - dynamic - ダイナミック - - - - src/gui/newFirewallDialog.cpp:503 - - Interface: %1 (%2) - インターフェース: %1 (%2) - - - - src/gui/newFirewallDialog.cpp:511 - - Dynamic address - ダイナミックアドレス - - - - src/gui/newFirewallDialog.cpp:513 - - Unnumbered interface - アンナンバードインターフェース - - - - src/gui/newFirewallDialog.cpp:515 - - Bridge port - ブリッジポート - - - - src/gui/newFirewallDialog.cpp:555 - - Illegal address '%1/%2' - 不当なアドレス 「%1/%2」 - - - - src/gui/newHostDialog.cpp:222 - - Missing SNMP community string. - SNMP コミュニティ文字列が足りません。 - - - - src/gui/newHostDialog.cpp:433 - - Interface: %1 (%2) - インターフェース: %1 (%2) - - - - src/gui/newHostDialog.cpp:441 - - Dynamic address - ダイナミックアドレス - - - - src/gui/newHostDialog.cpp:443 - - Unnumbered interface - アンナンバードインターフェース - - - - src/gui/newHostDialog.cpp:480 - - Illegal address '%1/%2' - 不当なアドレス 「%1/%2」 - - - - src/gui/openbsdAdvancedDialog.cpp:62 - - No change - 変更なし - - - - src/gui/openbsdAdvancedDialog.cpp:65 - - On - オン - - - - src/gui/openbsdAdvancedDialog.cpp:68 - - Off - オフ - - - - src/gui/pfAdvancedDialog.cpp:100 - - Conservative - コンサバティブ - - - - src/gui/pfAdvancedDialog.cpp:104 - - Normal - 通常 - - - - src/gui/pfAdvancedDialog.cpp:278 - - Script Editor - スクリプトエディター - - - - src/gui/pfAdvancedDialog.cpp:287 - - Script Editor - スクリプトエディター - - - - src/gui/pfAdvancedDialog.cpp:98 - - Aggressive - アグレッシブ - - - - src/gui/pixAdvancedDialog.cpp:130 - - 0 - System Unusable - 0 - システム未使用 - - - - src/gui/pixAdvancedDialog.cpp:135 - - 1 - Take Immediate Action - 1 - すぐさま処理をする - - - - src/gui/pixAdvancedDialog.cpp:140 - - 2 - Critical Condition - 2 - 危険な状態 - - - - src/gui/pixAdvancedDialog.cpp:145 - - 3 - Error Message - 3 - エラーメッセージ - - - - src/gui/pixAdvancedDialog.cpp:150 - - 4 - Warning Message - 4 - 警告メッセージ - - - - src/gui/pixAdvancedDialog.cpp:160 - - 6 - Informational - 6 - 情報 - - - - src/gui/pixAdvancedDialog.cpp:165 - - 7 - Debug Message - 7 - デバグメッセージ - - - - src/gui/pixAdvancedDialog.cpp:703 - - Compiler error - コンパイラーエラー - - - - src/gui/pixAdvancedDialog.cpp:786 - - Script Editor - スクリプトエディター - - - - src/gui/pixAdvancedDialog.cpp:795 - - Script Editor - スクリプトエディター - - - - src/gui/platforms.cpp:101 - - ftp - ftp - - - - src/gui/platforms.cpp:103 - - local0 - local0 - - - - src/gui/platforms.cpp:105 - - local1 - local1 - - - - src/gui/platforms.cpp:107 - - local2 - local2 - - - - src/gui/platforms.cpp:109 - - local3 - local3 - - - - src/gui/platforms.cpp:111 - - local4 - local4 - - - - src/gui/platforms.cpp:113 - - local5 - local5 - - - - src/gui/platforms.cpp:115 - - local6 - local6 - - - - src/gui/platforms.cpp:117 - - local7 - local7 - - - - src/gui/platforms.cpp:122 - - ICMP admin prohibited - ICMP 管理は禁止されました。 - - - - src/gui/platforms.cpp:124 - - ICMP host prohibited - ICMP ホストは禁止されました。 - - - - src/gui/platforms.cpp:126 - - ICMP host unreachable - ICMP ホストに到達しません。 - - - - src/gui/platforms.cpp:128 - - ICMP net prohibited - ICMP ネットは禁止されました。 - - - - src/gui/platforms.cpp:130 - - ICMP net unreachable - ICMP ネットに到達しません。 - - - - src/gui/platforms.cpp:132 - - ICMP port unreachable - ICMP ポートに到達しません。 - - - - src/gui/platforms.cpp:134 - - ICMP protocol unreachable - ICMP プロトコルに到達しません。 - - - - src/gui/platforms.cpp:136 - - TCP RST - TCP RST - - - - src/gui/platforms.cpp:139 - - None - なし - - - - src/gui/platforms.cpp:148 - - None - なし - - - - src/gui/platforms.cpp:150 - - Random - ランダム - - - - src/gui/platforms.cpp:152 - - Source Hash - ソースハッシュ - - - - src/gui/platforms.cpp:154 - - Round Robin - ラウンドロビン - - - - src/gui/platforms.cpp:159 - - after interface configuration - インターフェース設定の後 - - - - src/gui/platforms.cpp:161 - - after policy reset - ポリシーリセットの後 - - - - src/gui/platforms.cpp:181 - - /day - /日 - - - - src/gui/platforms.cpp:183 - - /hour - /時 - - - - src/gui/platforms.cpp:185 - - /minute - /分 - - - - src/gui/platforms.cpp:187 - - /second - /秒 - - - - src/gui/platforms.cpp:392 - - - any - - - 任意 - - - - - src/gui/platforms.cpp:393 - - 1.2.5 or earlier - 1.2.5 以上 - - - - src/gui/platforms.cpp:394 - - 1.2.6 to 1.2.8 - 1.2.6 から 1.2.8 - - - - src/gui/platforms.cpp:395 - - 1.2.9 to 1.2.11 - 1.2.9 から 1.2.11 - - - - src/gui/platforms.cpp:396 - - 1.3.0 or later - 1.3.0 以上 - - - - src/gui/platforms.cpp:413 - - 3.x - 3.x - - - - src/gui/platforms.cpp:414 - - 3.7 to 3.9 - 3.7 から 3.9 - - - - src/gui/platforms.cpp:415 - - 4.x - 4.x - - - - src/gui/platforms.cpp:536 - - Accept - 受理 - - - - src/gui/platforms.cpp:538 - - Deny - 破棄 - - - - src/gui/platforms.cpp:540 - - Reject - 拒否 - - - - src/gui/platforms.cpp:546 - - Skip - スキップ - - - - src/gui/platforms.cpp:548 - - Continue - 続ける - - - - src/gui/platforms.cpp:550 - - Modify - 修正 - - - - src/gui/platforms.cpp:554 - - Custom - カスタム - - - - src/gui/platforms.cpp:557 - - Branch - 分岐 - - - - src/gui/platforms.cpp:558 - - Chain - 連結 - - - - src/gui/platforms.cpp:563 - - Accounting - アカウント - - - - src/gui/platforms.cpp:564 - - Count - 回数 - - - - src/gui/platforms.cpp:568 - - Tag - タグ - - - - src/gui/platforms.cpp:569 - - Mark - マスク - - - - src/gui/platforms.cpp:573 - - Pipe - パイプ - - - - src/gui/platforms.cpp:574 - - Queue - キュー - - - - src/gui/platforms.cpp:577 - - Routing - ルーティング - - - - src/gui/platforms.cpp:61 - - alert - alert - - - - src/gui/platforms.cpp:63 - - crit - crit - - - - src/gui/platforms.cpp:65 - - error - error - - - - src/gui/platforms.cpp:67 - - warning - warning - - - - src/gui/platforms.cpp:69 - - notice - notice - - - - src/gui/platforms.cpp:71 - - info - info - - - - src/gui/platforms.cpp:73 - - debug - debug - - - - src/gui/platforms.cpp:79 - - kern - kern - - - - src/gui/platforms.cpp:81 - - user - user - - - - src/gui/platforms.cpp:83 - - mail - mail - - - - src/gui/platforms.cpp:85 - - daemon - daemon - - - - src/gui/platforms.cpp:87 - - auth - auth - - - - src/gui/platforms.cpp:89 - - syslog - syslog - - - - src/gui/platforms.cpp:91 - - lpr - lpr - - - - src/gui/platforms.cpp:93 - - news - news - - - - src/gui/platforms.cpp:95 - - uucp - uucp - - - - src/gui/platforms.cpp:97 - - cron - cron - - - - src/gui/platforms.cpp:99 - - authpriv - authpriv - - - - src/gui/printerStream.cpp:147 - - Page %1 - ページ %1 - - - - src/gui/solarisAdvancedDialog.cpp:62 - - No change - 変更なし - - - - src/gui/solarisAdvancedDialog.cpp:65 - - On - オン - - - - src/gui/solarisAdvancedDialog.cpp:68 - - Off - オフ - - - - src/gui/upgradePredicate.h:53 - - &Upgrade - アップグレード(&U) - - - - src/gui/upgradePredicate.h:54 - - &Do not load the file - ファイル %1 を読み込まない(&D) - - - - src/gui/utils.cpp:198 - - &Continue - 続ける(&C) - - - - src/gui/utils.cpp:219 - - Object with name '%1' already exists, please choose different name. - オブジェクト名 '%1' は既に存在します。別の名前を洗濯してください。 - - - - src/gui/utils.cpp:221 - - &Continue editing - 編集を続ける(&C) - - - - transferDialog - - - Transfer error: %1 - - - - - - &Continue - 続ける(&C) - - - - No firewalls selected for transfer - - - - - Waiting - - - - - Error: Failed to start program - - - - - Error: Waiting for program termination - - - - - Error: Program returned failure status - - - - - transferDialog_q - - - Config transfer options - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p align="center" style=" margin-top:12px; margin-bottom:12px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-size:x-large; font-weight:600;">Export firewall configs to transfer device</span></p></body></html> - - - - - Select usbstick volume to start firewall config transfer: - - - - - Select a portable disk volume to transfer firewall configs - - - - - Device - - - - - Size - - - - - Mounted - - - - - Mountpoint - - - - - Filesystem - - - - - Double click on a firewall in this tree to jump to the corresponding process log entry - - - - - Firewall - ファイアウォール - - - - Progress - 処理中 - - - - Process log - 処理ログ - - - - Save log to file - ファイルにログを保存する - - - - Start the export! - - - - - Transfer - - - - - Close - 閉じる - - - Cancel - 取り消し - - - - vlanOnlyIfaceOptsDialog - - - Input not valid: %1 - - - - - vlanOnlyIfaceOptsDialog_q - - - Vlan interface settings - - - - - Help - ヘルプ - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - Options - オプション - - - - Device Type - - - - - VLAN ID - - - - - vrrpOptionsDialog - - - Input not valid: %1 - - - - - vrrpOptionsDialog_q - - - secunet wall: interface settings - - - - - &OK - &OK - - - - &Cancel - 取り消し(&C) - - - - VRRP Parameters - - - - - Use IPsec AH protected VRRP - - - - - VRRP Secret - - - - - Virtual Router ID - - - - - VRID - - - - diff --git a/src/gui/fwbuilder_ru.ts b/src/gui/fwbuilder_ru.ts deleted file mode 100644 index c017fe13d..000000000 --- a/src/gui/fwbuilder_ru.ts +++ /dev/null @@ -1,23129 +0,0 @@ - - - - - @default - - A - test - - - F - test - - - I - test - - - L - test - - - P - test - - - R - test - - - S - test - - - U - test - - - -- - test - - - IP - test - - - OK - test - - - No - test - - - On - test - - - RO - test - - - hh - test - - - mm - test - - - ss - test - - - up - test - - - &OK - test - - - Add - test - - - Del - test - - - Cut - test - - - Dyn - test - - - MAC - MAC - - - NAT - test - - - NTP - test - - - New - test - - - Off - test - - - SSH - test - - - TCP - test - - - Red - test - - - UDP - test - - - Yes - test - - - any - test - - - dns - test - - - ftp - test - - - ils - test - - - ip: - test - - - rev - test - - - rpc - test - - - rsh - test - - - sip - test - - - ssh - test - - - udp - test - - - Destination - test - - - &Cut - test - - - /day - test - - - Back - test - - - Blue - test - - - Copy - test - - - Date - test - - - Edit - test - - - End: - test - - - Exit - test - - - Find - test - - - ICMP - test - - - IPv4 - test - - - Gray - test - - - Host - test - - - MAC: - test - - - Load - test - - - Name - test - - - Open - test - - - Path - test - - - Poll - test - - - SNMP - test - - - Redo - test - - - Save - test - - - Stop - test - - - Time - test - - - Undo - test - - - conn - test - - - crit - test - - - Use ACL remarks - test - - - h323 - test - - - down - test - - - dump - test - - - http - test - - - info - test - - - ipf: - test - - - mgcp - test - - - pptp - test - - - rtsp - test - - - skip - test - - - smtp - test - - - tftp - test - - - Set device id for syslog messages (v6.3 and later): - test - - - Working directory %1 does not seem to exist. -Do you want to create it ? - test - - - all fragments - test - - - Here you can add or edit interfaces manually. 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. Label is mandatory for PIX firewall. - test - - - Click here to change amount of information shown about object selected in the tree - test - - - Ignore bogus ICMP errors - test - - - These options control algorithms used by the policy compiler to generate iptables commands. - test - - - Range Start: - : - - - &Edit - &Редактировать - - - &File - &Файл - - - Clear DF bit - test - - - &Help - &Помощь - - - &Move - test - - - &Redo - test - - - &Save - &Сохранить - - - &Undo - test - - - Custom service object has separate code string for each supported firewall platform. - test - - - /hour - test - - - File is read-only - test - - - Timeouts - test - - - *** Fatal error : - test - - - C&opy - test - - - About - test - - - E&xit - test - - - Alt+C - test - - - Alt+I - test - - - Alt+M - test - - - Alt+W - test - - - Close - test - - - Code: - : - - - Date: - test - - - Debug - test - - - Fixup - test - - - Green - test - - - Group - test - - - Index - test - - - Label - test - - - You are connecting to the firewall <b>'%1'</b> for the first time. It has provided you its identification in a form of its host public key. The fingerprint of the host public key is: "%2" You can save the host key to the local database by pressing YES, or you can cancel connection by pressing NO. You should press YES only if you are sure you are really connected to the firewall <b>'%3'</b>. - test - - - Mask: - test - - - Name: - : - - - Paste - test - - - Block if can not log - test - - - Print - test - - - Rules - Правила - - - Tab 1 - test - - - Install - test - - - Time: - test - - - Traps - test - - - Check for overlapping global pools - test - - - Accept ESTABLISHED and RELATED packets before the first rule - test - - - Move back to the previous object - test - - - alert - test - - - type: %1 - test - - - bytes - test - - - debug - test - - - error - test - - - Use preconfigured template firewall objects - test - - - ipfw: - test - - - lsmod - test - - - Poll and Traps - test - - - port: - test - - - state table size: - test - - - &Discard changes - &Отмена - - - xlate - test - - - Group similar commands together - test - - - Firewall - test - - - Use h323 proxy in NAT rules - test - - - New UDP Service - UDP - - - New TCP Service - TCP - - - Revision: - test - - - Check option 'dynamic address' for the interface that gets its IP address dynamically via DHCP or PPP protocol. - test - - - Missing SNMP community string. - test - - - Tooltip delay: - test - - - use text string - test - - - ICMP admin prohibited - test - - - Stateless rule - test - - - Use ipsec proxy in NAT rules - test - - - New &IP Service - IP сервис - - - Library %1: Firewall '%2' (global policy rule #%3) uses object '%4' from library '%5' - test - - - These options enable auxiliary sections in the generated shell script. - test - - - Executing external command - test - - - Security Level - test - - - Illegal IP address '%1' - IP '%1' - - - Log record for the new revision - test - - - Keep information on fragmented -packets, to be applied to later -fragments - test - - - Failed transformation : %1 - test - - - Original Src - test - - - Original Srv - test - - - Original Dst - test - - - <p>Each interface of the firewall must have security level associated with it.<br>Security level can be any number between 0 and 100, 0 being least secure and 100 being most secure levels. Interface with security level 0 ususally serves Internet connection.</p> - test - - - Error creating temporary file - test - - - Firewall platform is not specified in this object. -Can't compile firewall policy. - test - - - Interface: %1 (%2) - test - - - Allow dynamic addresses - test - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - test - - - use hostname - test - - - Object with name '%1' already exists, please choose different name. - test - - - In nat rules where network zone object is used in OSrc, ODst and OSrv are 'any' and TSrc defines a global pool for the translation, replace object in OSrc with 'any' to produce PIX command "nat (interface) N 0.0.0.0 0.0.0.0" - test - - - Enable or change the port assignment for the Session Initiation Protocol (SIP) for Voice over IP TCP connections. - test - - - Locked by user: - test - - - No color - test - - - use numeric syslog levels - test - - - Use rcmd proxy in NAT rules - test - - - Compiler Options - test - - - Color Label: - test - - - New &Network - Сеть - - - SSH terminated, exit status: %1 - test - - - * firewall name : %1 - test - - - 5 - Normal but significant condition - test - - - Object <b>'%1'</b> in the objects tree - test - - - Replaces the IP identification field of outgoing packets with random values to compensate for operating systems that use predictable values. - test - - - Not enough memory. - test - - - place in library %1 - test - - - New &Custom Service - Специальный сервис - - - Open read-only - test - - - Packet forwarding - test - - - In enable mode. - test - - - Replace with this object - test - - - Computer Telephony Interface Quick Buffer Encoding (CTIQBE) protocol inspection module that supports NAT, PAT, and bi-directional NAT. - test - - - Actively reset inbound TCP connections with RST on outside interface - test - - - Revision %1 of this file has been checked out and locked by you earlier. -The file may be opened in another copy of Firewall Builder or was left opened -after the program crashed. - test - - - reassembly pool: - test - - - Add MAC Address - MAC - - - Choose a file to import - test - - - Add File to RCS - testОшибка добавления файла в RCS -%1 - - - Respond to echo broadcast - test - - - Group Name: - : - - - When you delete a library, all objects that belong to it -disappear from the tree and all groups and rules that reference them. -You won't be able to reverse this operation later. -Do you still want to delete library %1? - test - - - Translated Dst - test - - - Translated Srv - test - - - Translated Src - test - - - Enable Rule - test - - - Configure interfaces manually - test - - - Buffer and reassemble fragments (default) - test - - - TCP Flags - test - - - ICMP Code: - test - - - Text to be found in object names: - test - - - Send ICMP 'unreachable' packet -masquerading as being from -the original destination - test - - - TCP window scaling - test - - - ICMP Type: - test - - - Verification of NAT rules - test - - - icmp error - test - - - Solaris: advanced settings - test - - - File Path - test - - - OpenBSD: advanced settings - test - - - File is not in RCS - test - - - lastModified - test - - - Find working directory - test - - - Undelete... - test - - - PIX inspects packets with ACLs before it does NAT, while many other firewalls do NAT first and then apply ACLs. Policy compiler can emulate the latter behaviour if this options is turned on. - test - - - Assume firewall is part -of 'any' (this setting only -affects code generated -for this rule) - test - - - Check file &in - test - - - * host OS : %1 - test - - - &About - test - - - &Close - test - - - &Debug - test - - - Date (Y/M/D): - test - - - &Paste - test - - - Error activating firewall policy - test - - - Date (Y/D/M): - test - - - Enable TCP resource control for AAA Authentication Proxy - test - - - Reading current firewall configuration - test - - - sip&media - test - - - Remove Rules - test - - - max length: - test - - - New &Address - Адрес - - - Save &As... - test - - - Library - test - - - Detect rule shadowing in the policy - test - - - Enable all protocols - test - - - Error checking file out: %1 - test - - - Causes duplicate fragments to be dropped and any overlaps to be cropped. - test - - - Log record for this revision: - test - - - SNMP Get - test - - - Do not ask me anymore, always check files in with empty log - test - - - Dynamic address - test - - - Library file %1 is corrupted. - test - - - New Object File - test - - - &New Object File - test - - - Choose name and folder for the new file - Выберите имя и фолдер для нового файла - - - logger: - test - - - Logging - test - - - Modulate state for all stateful rules (applies only to TCP services) - test - - - This object has been modified but not saved. -Do you want to save it before switching to another object? - test - - - The following commands will be added verbatim on top of generated configuration - test - - - Reassemble fragments - test - - - Enable password: - test - - - Force each TCP connection to linger in a shortened TIME&WAIT - test - - - Clamp MSS to MTU - test - - - Kernel anti-spoofing protection - test - - - Enable Rules - test - - - to library %1 - test - - - Masquerade returned icmp as being from original -packet's destination - test - - - Can not open file %1 - test - - - XML element : %1 - test - - - Find Secure File Transfer utility - test - - - Failed to start ssh - test - - - Choose libraries to be exported: - test - - - Drop duplicate fragments, do not buffer and reassemble - test - - - ICMP host unreachable - test - - - MacOS X: advanced settings - test - - - ICMP port unreachable - test - - - (The default for both parameters is 0, which means unlimited number of connections.) - test - - - Enable SIP-over-UDP application inspection. - test - - - Enter authentication information below and click 'Next' - test - - - Syslog host (name or IP address): - test - - - timestamp - test - - - Do not ask for the log record when checking in new file revision. - test - - - Enter new position for selected rules: - test - - - Enable SCCP application inspection. SCCP protocol supports IP telephony and can coexist in an H.323 environment. An application layer ensures that all SCCP signaling and media packets can traverse the PIX Firewall and interoperate with H.323 terminals. - test - - - Running command '%1' - - - test - - - Find Secure Shell utility - test - - - Periodically save data to file every - test - - - log IP options - test - - - Group PIX commands in the script so that similar commands appear next to each other, just like PIX does it when you use 'show config' - test - - - minutes - test - - - These parameters make sense for connections to or from the firewall host - test - - - Enable TFTP application inspection. - test - - - half-closed - test - - - Error loading file %1: -%2 - test - - - Address of this interface is assigned dynamically using DHCP or PPP protocol - test - - - ipfw: advanced settings - test - - - Some protocols involve multiple associated network connections. Firewall can keep track of such connections automatically if you activate one or all of the following options: - test - - - ipf: advanced settings - test - - - New &Firewall - Файрволл - - - pf: advanced settings - test - - - Incremental install - test - - - * Incremental install - test - - - If rule action is 'Reject', this option defines firewall's reaction to the packet matching the rule - test - - - Prolog/Epilog - test - - - The name of the interface '%1' has changed. The program can also -rename IP address objects that belong to this interface, -using standard naming scheme 'host_name:interface_name:ip'. -This makes it easier to distinguish what host or a firewall -given IP address object belongs to when it is used in -the policy or NAT rule. The program also renames MAC address -objects using scheme 'host_name:interface_name:mac'. -Do you want to rename child IP and MAC address objects now? -(If you click 'No', names of all address objects that belong to -%1 will stay the same.) - test - - - For high latency - test - - - Use SNMP to discover interfaces of the firewall - test - - - Compiler: - test - - - User name: - test - - - Templates - test - - - Fatal error running rcsdiff for file %1 - test - - - Scrub rule options - test - - - Add... - test - - - Action - test - - - state expiration timeout: - test - - - Disable SNMP Agent - test - - - This interface is -external (insecure) - test - - - Directory on the firewall where script should be installed - test - - - Address of %1 could not be obtained via DNS - test - - - Author - test - - - TCP timestamps - test - - - Cancel - test - - - Burst: - test - - - Similar to 'Drop duplicate fragments' except that all duplicate or overlapping fragments will be dropped as well as any further corresponding fragments. - test - - - Color: - test - - - Object Manipulator - test - - - Ctrl+C - test - - - Ctrl+F - test - - - Ctrl+N - test - - - Ctrl+O - test - - - Ctrl+P - test - - - Ctrl+S - test - - - Ctrl+V - test - - - Ctrl+X - test - - - Ctrl+Y - test - - - Ctrl+Z - test - - - Delete - test - - - &Index... - test - - - Move Rule Down - test - - - Script formatting - test - - - Drop duplicate and subsequent fragments - test - - - Generate both 'in' and 'out' rules - test - - - File Properties - test - - - Use 'EMBLEM' format for syslog messages - test - - - <p>Check if this interface is used for management (SNMP queries, remote policy install etc.)<p> - test - - - New IC&MP Service - ICMP сервис - - - Exception: %1 - test - - - Netmask - test - - - Network - test - - - Export - test - - - Description: - test - - - When you delete an object, it is removed from the tree and -all groups and firewall policy rules that reference it. -Do you want to delete selected objects ? - test - - - Add virtual addresses for NAT - test - - - This operation will create a new group and put selected objects in it - test - - - Error loading file: -%1 - test - - - Logging limit: - test - - - Forward source routed packets - test - - - Log packet body - test - - - Generate commands to configure addresses for interfaces - test - - - TCP keepalive time (sec) - test - - - Label: - test - - - Labels - test - - - maximum number of simultaneous TCP and UDP connections - test - - - One interface of the firewall must be marked as 'external'. This interface should be connected to the least secure network, usually the Internet. - test - - - Skip all protocols - test - - - Enable directed broadcast - test - - - Search hit the end of the object tree. - . - - - 1.2.9 or later - test - - - <a href="http://www.fwbuilder.org/">http://www.fwbuilder.org</a> - test - - - Negate - test - - - This option is provisional and will change or disappear in future releases because we expect to make this a default behavior. - test - - - Normal - test - - - h323 h225 - test - - - Object - test - - - New IP Service - IP - - - New Object - test - - - Orange - test - - - Normally policy compiler uses stateful inspection in each rule. Activating next option makes this rule stateless. - test - - - Firewall Builder - test - - - reassembly timeout: - test - - - &New Object - test - - - Policy - test - - - seconds before an unassembled fragment is expired. - test - - - Alternative address to communicate with the firewall: - test - - - Purple - test - - - Log Prefix - test - - - Find add-on library - test - - - Activate Revision Control System for this file -(if you do not do this now, you can always activate it later) - testАктивизировать систему контроля версий для этого файла -(если Вы не сделаете это сейчас, Вы всегда можете активизироват ее позже) - - - completely disable logging -for this rule - test - - - Remove - test - - - Ignore broadcast pings - test - - - objects - test - - - location - test - - - lockedBy - test - - - Firewall Builder: Policy Installer - test - - - Source - test - - - code: %1 - : - - - Start: - test - - - Syslog - test - - - Update - test - - - Check option 'Unnumbered interface' for the interface that does not have an IP address. Examples of interfaces of this kind are those used to terminate PPPoE or VPN tunnels. - test - - - Set all to defaults.. - test - - - Progress: - test - - - Emptying of the 'Deleted Objects' in a library file is not recommended. -When you remove deleted objects from a library file, Firewall Builder -loses ability to track them. If a group or a policy rule in some -data file still uses removed object from this library, you may encounter -unusual and unexpected behavior of the program. -Do you want to delete selected objects anyway ? - test - - - Enforces a maximum Maximum Segment Size (MSS) in TCP packet headers. - test - - - Yellow - test - - - PIX Firewall Version 6.3 introduces support for EMBLEM format, which is required when using the CiscoWorks Resource Manager Essentials (RME) syslog analyzer. - test - - - Protocol Helpers - test - - - Remove comments from configuration - test - - - Fatal error running rlog for %1 - test - - - <p>Each interface of the firewall must have security level associated with it.<br> -Security level can be any number between 0 and 100, 0 being least secure and 100 being most secure levels. Interface with security level 0 ususally serves Internet connection.</p> - test - - - Enables Point-to-Point Tunneling Protocol (PPTP) application inspection. - test - - - Move Selected Rules - test - - - Import from file ... - test - - - Specifies the maximum number of embryonic connections per host. An embryonic connection is a connection request that has not finished the necessary handshake between source and destination. Set a small value for slower systems, and a higher value for faster systems. The default is 0, which means unlimited embryonic connections. - test - - - PIX Options - test - - - Check for overlapping statics - test - - - Configure Interfaces of the firewall machine - test - - - Recognize regular expressions in search pattern - test - - - Conflict Resolution - test - - - /minute - test - - - Comment: - : - - - Compiler - test - - - DNS lookup failed for both names of the address object '%1' and the name of the host '%2'. - test - - - h323 ras - test - - - New &Interface - Интерфейс - - - Contact: - test - - - Contents - test - - - &Continue - test - - - Load standard objects - test - - - Syslog message queue size (messages): - test - - - &Open... - test - - - Optimization - test - - - Firewall Builder 2 uses file extension '.fwb'. Your data file '%1' -has been renamed '%2' - test - - - Options - test - - - Here you can add or edit interfaces manually. 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. - test - - - Available libraries: - test - - - Verify interfaces before loading firewall policy - test - - - No firewalls defined - Нет ни одного файрволла - - - Default action on 'Reject': - test - - - syslog level ('logging trap'): - test - - - Saving data to file... - test - - - /second - test - - - Data format - test - - - No change - test - - - SNMP community: - test - - - code: - test - - - Host OS: - test - - - ctiqbe - test - - - Generating configuration diff - test - - - protocol - test - - - Date (M/D/Y): - test - - - Find and eliminate duplicate rules - test - - - enable - test - - - Disable Rule - test - - - Move ... - test - - - Properties - test - - - Gateway Port: - test - - - use address of interface - test - - - &Properties - test - - - Browse... - test - - - Accept ICMP redirects - test - - - Optimization: - test - - - ipnat: - test - - - Detect shadowing in policy rules - test - - - Error checking in file %1: -%2 - test - - - Expand all branches in the object tree - . - - - Create new project file - Создать новый проект - - - Unnumbered interface - test - - - New RSA key - test - - - Log level: - test - - - (read-only) - (только для чтения) - - - The default port for HTTP is 80. Use the port option to change the HTTP port, or specify a range of HTTP ports. - test - - - <p>Network zone consists of hosts and networks that can be reached through this interface of the firewall. Subnet to which this interface is directly attached must be part of its network zone. Other subnets reachable by means of routing should alse be added to the network zone. -<br> -If network zone for this interface consists of only one subnet, you can simply choose that network's object in the pull-down below. If your network zone should include multiple subnets, you need to create an Object Group, then put all hosts and networks which are going to be part of the network zone into that group and finally choose this group in the pull-down below.</p> - test - - - Enables the Media Gateway Control Protocol (MGCP) fixup. - test - - - notice - test - - - Move Rules - Правила - - - Accept source route - test - - - pfctl: - test - - - Load modules - test - - - Store configuration diff in a file - test - - - Ignore empty groups in rules - test - - - skinny - test - - - Use tables - test - - - sqlnet - test - - - A full path to the Secure Shell utility (remote command execution; for example ssh on Unix or plink.exe or vsh.exe on Windows): - test - - - Address - test - - - telnet - test - - - Library %1: Firewall '%2' (interface %3 policy rule #%4) uses object '%5' from library '%6' - test - - - New &Library - Библиотека - - - Copy Rule - test - - - type: - test - - - unauth - test - - - Physical address (MAC): - test - - - log TCP seq. numbers - test - - - Turn debugging on in generated script - test - - - PIX Advanced Configuration Options - test - - - Log prefix: - test - - - maximum number of entries in the memory pool used for packet reassembly - test - - - physAddress - test - - - Host OS Settings ... - test - - - Install firewall policy - test - - - queue threshold: - test - - - Optimize 'default nat' rules - test - - - &Find Object - test - - - Deactivate a rule on: - test - - - Activate a rule on: - test - - - In order to be able to build firewall policy properly, Firewall Builder needs information about 'security level' of the firewall's interfaces. Interface that connects it to the Internet is considered 'insecure' and has security level '0', while interface connected to the internal network is supposed to be 'secure' (security level '100'). You can arrange interfaces in the order of their security level below. - test - - - Based on this maximum-length configured by the user, the DNS fixup checks to see if the DNS packet length is within this limit. Every UDP DNS packet (request/response) undergoes the above check. - test - - - &Install old copy - test - - - Regular interface - test - - - Enter New Position For The Rule - test - - - Forward directed broadcasts - test - - - A full path to the Secure Copy utility (secure file copy; for example scp on Unix or pscp.exe or vcp.exe on Windows): - test - - - Copyright 2002-2004 NetCitadel, LLC - test - - - TCP fack - test - - - TCP sack - test - - - Show deleted objects - test - - - Call Agent port: - test - - - Some objects have been modified but not saved. -Do you want to save changes now ? - testНекоторые объекты были модифицированы -но не сохранены. Хотите ли Вы сохранить изменения ? - - - Check for duplicate nat rules - test - - - Use random ID - test - - - RCS log: - test - - - TCP ECN - test - - - TCP RST - test - - - Some objects have been modified since -you compiled the policy last time. -Do you want to recompile it before you install ? - testНекоторые объекты были модифицированы -но не сохранены. Хотите ли Вы сохранить изменения ? - - - The name of the object '%1' has changed. The program can also -rename IP address objects that belong to this object, -using standard naming scheme 'host_name:interface_name:ip'. -This makes it easier to distinguish what host or a firewall -given IP address object belongs to when it is used in -the policy or NAT rule. The program also renames MAC address -objects using scheme 'host_name:interface_name:mac'. -Do you want to rename child IP and MAC address objects now? -(If you click 'No', names of all address objects that belong to -%1 will stay the same.) - test - - - Enter the name of the new object below: - test - - - Platform: - : - - - Please select a library you want to export. - test - - - Error saving file %1: %2 - test - - - Direction - test - - - Aggressive - test - - - File %1 has been added to RCS. - test - - - 6 - Informational - test - - - Set SNMP communities using data from the firewall object dialog - test - - - If you remove libraries from the list, changes get in effect next time you start the program - test - - - Linux 2.4: advanced settings - test - - - Enable the IP Frag Guard feature (deprecated in v6.3 and later). - test - - - Ignore all pings - test - - - Original - test - - - &Print... - test - - - * Test run, commands will not be executed on the firewall - test - - - Revision history: - test - - - Using libfwbuilder API v - libfwbuilder v - - - Running command on the firewall: - test - - - New &Host - Хост - - - Insert Rule - test - - - Only one interface of the firewall '%1' must be marked as management interface. - test - - - Insert comments into generated PIX configuration file - test - - - 7 - Debug Message - test - - - check this option to make compiler add 'clear' statements to remove all pre-existing ACLs and NAT commands - test - - - Destination Port Range - test - - - This is unnumbered interface, that is, it does not have an IP address. You can use this for interfaces that terminate PPPoE or other VPN tunnels - test - - - place here - test - - - These options are only valid for PIX running software v6.3 or later - test - - - use ULOG - test - - - 2 - Critical Condition - test - - - Libraries - test - - - Location: - test - - - Save As - test - - - The file %1 already exists. -Do you want to overwrite it ? - Файл %1 уже существует. Переписать? - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - test - - - Enables support for SQL*Net protocol. - test - - - NTP Servers: - test - - - Absolute - test - - - Let the program automatically open this file when I start it next time -(you can activate this option later using Preferences dialog) - testПрограмма должна автоматически открывать этот файл при -старте (эта функция также может быть активизирована в диалоге Установки) - - - Rules: %1-%2 - : - - - Firewall Settings ... - test - - - There are two ways compiler can generate code for rules in the Global Policy: it can either create two ipf rules to control both incoming and outgoing packets for each rule, or it can create only one ipf rule for incoming packets and permit all outgoing ones.You get more control over the packets crossing the firewall in the first mode, but generated script is going to be smaller if you choose the second. - test - - - Enables the Mail Guard feature, which only lets mail servers receive the RFC 821, section 4.5.1, commands of HELO, MAIL, RCPT, DATA, RSET, NOOP, and QUIT. All other commands are translated into X's which are rejected by the internal server. - test - - - Unsupported exception - test - - - Revision %1 - test - - - Choose template object in the list and click 'Finish' when ready. Template objects use generic interface names that will be iherited by the firewall object you create. You may need to rename them later to reflect real names of interfaces on your firewall machine. - test - - - Rule %1 - test - - - ICMP net unreachable - test - - - Service - test - - - Server 1: - test - - - Server 2: - test - - - Server 3: - test - - - Network zone: - test - - - Choose firewall software it is running: - test - - - Use ACL remarks to relate ACL commands and policy rules in the GUI - test - - - Pushing firewall configuration - test - - - sip udp - test - - - Disable all protocols - test - - - Could not open file %1 - test - - - Choose file that contains PIX commands - test - - - Generate 'clear' commands - test - - - Change TCP MSS to - test - - - Locked by - test - - - Enforce Maximum MSS: - test - - - Actively reset inbound TCP connections with RST - test - - - Enforce Minimum TTL: - test - - - DNS lookup failed for name of the address object '%1'. - %1 DNS - - - File %1 not found. - test - - - Always choose this -object if there is a conflict - test - - - Warning: loading from file discards current contents of the script. - test - - - Policy installer uses Secure Shell to communicate with the firewall. -Please configure directory path to the secure file copy and secure -shell utilities installed on your machine using Preferences dialog - test - - - Drop here firewall objects that should be used as policy templates for this firewall. Rules will be added on top of the rules of this firewall and will be taken from policies of the template objects in the order they were added, from top to bottom: - test - - - Ignore ICMP redirects - test - - - Error writing to temporary file - test - - - Policy Compiler Options - test - - - netlink group: - test - - - <b>Summary:</b> - test - - - Comment - test - - - &Compile - &Файл - - - Compile - test - - - maximum number of entries in the memory pool used for state table entries - test - - - Console - test - - - Load last edited file - test - - - Paste Rule - test - - - cprange - test - - - iptables: - test - - - Discover Interfaces using SNMP - test - - - Do you want to open existing project file or create a new one? - Хотите ли Вы открыть существующий проект или создать новый ? - - - Outbound - test - - - Library %1: Group '%2' uses object '%3' from library '%4' - test - - - &Cancel - test - - - Pass all outgoing - test - - - Installer - test - - - Empty configuration diff - test - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - test - - - * user name : %1 - Имя файла: %1 - - - Inactivity - test - - - Quiet install: do not print anything as commands are executed on the firewall - test - - - Address: - test - - - strict: - test - - - Generate rules assuming the firewall is part of "Any". This makes a difference in rules that use services 'ssh' and 'telnet' since PIX uses special commands to control ssh and telnet access to the firewall machine - test - - - Log facility: - test - - - Other logging destinations and levels: - test - - - syslog facility: - test - - - Provides NAT support for Microsoft NetMeeting, SiteServer, and Active Directory products that use LightWeight Directory Access Protocol (LDAP) to exchange directory information with an for Internet Locator Service (ILS) server. - test - - - Interface - test - - - Logging interval: - test - - - Edit Preferences - test - - - Working directory: - test - - - Revision Control - test - - - SNMP Server 1: - test - - - SNMP Server 2: - test - - - Disable outbound DNS A record replies - test - - - &Contents... - test - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - test - - - IP address: - test - - - disable - test - - - Discard - &Отмена - - - &Discard - &Отмена - - - sysctl: - test - - - SNMP 'read' community string: - test - - - Click 'Finish' when done. - test - - - Enables NAT of ICMP error messages. This creates translations for intermediate hops based on the static or network address translation configuration on the firewall. - test - - - New Ti&me Interval - интервал времени - - - File name: %1 - Имя файла: %1 - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - test - - - Object <b>'%1'</b> in file %2 - test - - - Directory on the firewall where configuration files should be installed - test - - - <p>One interface of the firewall must be marked as 'external'. This interface should be connected to the least secure network, usually the Internet.</p> - test - - - Lets PIX Firewall pass Real Time Streaming Protocol (RTSP) packets. RTSP is used by RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, and Cisco IP/TV connections. - test - - - Fatal error during initial RCS checkin of file %1 : - %2 -Exit status %3 - test - - - Toolbar - test - - - New &TCP Service - TCP сервис - - - New &UDP Service - UDP сервис - - - modprobe: - test - - - Rule Options for ipt - test - - - Ctrl+Del - test - - - Verbose: print all commands as they are executed on the firewall - test - - - Object <b>'%1'</b> has been deleted - test - - - Click 'Next' when done. - test - - - Detect rule shadowing in policy - test - - - seconds between purges of expired states and packet fragments. - test - - - Replace NAT'ted objects with their -translations in policy rules - test - - - Settings: - test - - - Library %1: Firewall '%2' (NAT rule #%3) uses object '%4' from library '%5' - test - - - New &Service Group - группа сервисов - - - The following parameters are used for all NAT rules: - test - - - Create a group - test - - - Network: - : - - - Assume firewall is part of 'any' - test - - - Activated support for FTP protocol and allows to change the ftp control connection port number. - test - - - Generate ICMP redirects - test - - - Impossible to insert object %1 (type %2) into %3 -because of incompatible type. - test - - - PIX Firewall Settings - test - - - Import Library From a File - test - - - Too many opened file descriptors in the system. - test - - - dynamic - test - - - Current Object - test - - - Accounting - test - - - TCP SYN cookies - test - - - Preferences... - test - - - P&references... - test - - - A Rule Set - test - - - Rule: %1 - : - - - FWB Files (*.fwb);;All Files (*) - test - - - Remove Rule - test - - - Export Library To a File - test - - - Enable: - test - - - SNMP servers - test - - - %1 objects<br> - - test - - - Disable Rules - test - - - Internal buffer - test - - - Specify that when an incoming packet does a route lookup, -the incoming interface is used to determine which interface -the packet should go to, and which is the next hop -(deprecated in v6.3 and later). - test - - - Cut Rule - test - - - Move Rule - test - - - Keep current object - test - - - This will export a library to a file which can later be imported back into Firewall Builder - test - - - Generated fixup commands: - test - - - New Item - test - - - use LOG - test - - - Version: - : - - - esp ike - test - - - * Loading configuration from file %1 - test - - - 4 - Warning Message - test - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - test - - - Password or passphrase: - test - - - Netmask: - test - - - Use preconfigured template host objects - test - - - ICMP host prohibited - test - - - *** End - test - - - Enforces a minimum Time To Live (TTL) in IP packet headers. - test - - - Preffered: - test - - - Time of last modification: - test - - - Revision - test - - - Firewalls: - test - - - The logging timestamp command requires that the clock command be set. - test - - - Welcome to Firewall Builder - Добро пожаловать в Firewall Builder - - - Specifies to use RAS with H.323 to enable dissimilar communication devices to communicate with each other. - test - - - Rule matches if it hits this often -or less: - test - - - Preferences - test - - - Script Options - test - - - Command line options for the compiler: - test - - - lsrr (loose source route) - test - - - FreeBSD: advanced settings - test - - - Open existing file - Открыть существующий проект - - - Move Rule Up - test - - - Disable inbound embedded DNS A record fixups - test - - - Revision: - : - - - Script Editor - test - - - DNS Lookup... - test - - - Specifies to use H.225, the ITU standard that governs H.225.0 session establishment and packetization, with H.323 - test - - - New ICMP Service - ICMP - - - Compile rules - test - - - Always permit ssh access from -the management workstation -with this address: - test - - - Add Rule Below - test - - - Clears the don't fragment bit from the IP packet header. - test - - - Paste Rule Above - test - - - Paste Rule Below - test - - - ( read only ) - (только для чтения) - - - Bridging firewall - test - - - New &Object Group - Группа объектов - - - New Address &Range - Диапазон адресов - - - 0 - System Unusable - test - - - Conservative - test - - - Making backup copy of the firewall configuration - test - - - Range End: - : - - - Make a backup copy of the firewall configuration in this file: - test - - - Choose OS the new firewall runs on: - test - - - warning - test - - - 1 - Take Immediate Action - test - - - Policy install script (using built-in installer if this field is blank): - test - - - Verification of policy rules - test - - - Activate logging in all rules -(overrides rule options, use for debugging) - test - - - Log martians - test - - - Logged in - - test - - - Data file has been created in the old version of Firewall Builder. Use fwbuilder GUI to convert it. - - test - - - Date (D/M/Y): - test - - - Comment the code - test - - - MAC matching - test - - - Calculate difference between current firewall state and generated configuration and install only those commands that update state of the firewall - test - - - The following commands will be added verbatim after generated configuration - test - - - General - test - - - ( 0 - any protocol ) - test - - - Next step is to add interfaces to the new firewall. There are two ways to do it: using SNMP query or manually. Adding them using SNMP query is fast and automatic, but is only possible if firewall runs SNMP agent and you know SNMP community string 'read'. - test - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - test - - - Add IP Address - IP - - - Enable object tooltips - test - - - Logged in - test - - - Revision Control: - test - - - Security level: - test - - - Buffers incoming packet fragments and reassembles them into a complete packet before passing them to the filter engine. - test - - - * management address : %1 - test - - - On startup: - test - - - Netlink group -(if using ULOG): - test - - - Management interface does not have IP address, can not communicate with the firewall. - test - - - Command line options for the script: - test - - - Enable support for NAT of locally originated connections - test - - - iptables: advanced settings - test - - - Use SNMP to discover interfaces of the host - test - - - Set PIX host name using object's name - test - - - Accept TCP sessions opened prior to firewall restart - test - - - Day of week (0-6): - test - - - Enables PAT for Encapsulating Security Payload (ESP), single tunnel. - test - - - If this option is on, policy compiler adds virtual addresses to the interfaces to make the firewall answer to ARP queries for addresses used in NAT rules. - test - - - Fork failed for %1 - %1 DNS - - - Emulate outbound ACLs - test - - - Do not save a copy of objects form add-on libraries in each data file - test - - - Group: - : - - - File is opened and locked by %1. -You can only open it read-only. - test - - - Discard Changes and Overwrite With Clean Copy Of The Head Revision From RCS - test - - - 'short' fragments - test - - - Check option 'Unnumbered interface' for the interface that does not have an IP address. Examples of interfaces of this kind are those used to terminate PPPoE or VPN tunnels and interfaces of the bridging firewall. - test - - - Next step is to add interfaces to the new host. There are two ways to do it: using SNMP query or manually. Adding them using SNMP query is fast and automatic, but is only possible if the host runs SNMP agent and you know SNMP community string 'read'. - test - - - Address is assigned -dynamically - test - - - Use these labels to mark rules in the firewall policy - test - - - * Configuration diff will be saved in file %1 - test - - - maximum number of embryonic connections per host - test - - - Management interface - test - - - Error: Failed to start program - test - - - TCP FIN timeout (sec) - test - - - Error opening file: -%1 - testОшибка добавления файла в RCS -%1 - - - Error adding file to RCS: -%1 - testОшибка добавления файла в RCS -%1 - - - Protocol number: - test - - - ssrr (strict source route) - test - - - Tree of Objects - test - - - One of the interfaces of the firewall '%1' must be marked as management interface. - test - - - Test run (commands won't be executed on the firewall) - test - - - ICMP protocol unreachable - test - - - Find object in the tree - test - - - Debugging Info - test - - - Installing policy rules on firewall '%1'. Logging in - test - - - ICMP net prohibited - test - - - Normally PIX does not support ouotbound ACL, however policy compiler can emulate them if this option is turned on - test - - - log TCP options - test - - - Pushing firewall configuration - - test - - - Illegal address '%1/%2' - test - - - protocol: %1 - test - - - Use raudio proxy in NAT rules - test - - - Specifies the maximum number of simultaneous TCP and UDP connections for the entire subnet. The default is 0, which means unlimited connections. (Idle connections are closed after the idle timeout specified by the timeout conn command.) - test - - - There is a conflict between an object in your tree and object in the file you are trying to open. Choose which version of this object you want to use: - test - - - Enables inspection of RSH protocol. - test - - - Installing policy rules on firewall '%1'. - test - - - rr (record route) - test - - - File %1 is read-only, you can not save changes to it. - Файл %1 защищен от записи, Вы не сможете сохранить изменения. - - - A library that you are trying to export contains references -to objects in the other libraries and can not be exported. -The following objects need to be moved outside of it or -objects that they refer to moved in it: - test - - - 3 - Error Message - test - - - - any - - test - - - Create New Object - test - - - Use ftp proxy in NAT rules - test - - - Enable sending log messages as SNMP trap notifications - test - - - Source Port Range - test - - - Check for overlapping global pools and statics - test - - - Library: - : - - - Impossible to apply changes because object is located in read-only -part of the tee or data file was opened read-only - test - - - Enable logging timestamps on syslog file - test - - - Illegal netmask '%1' - '%1' - - - Automatically save data in dialogs when switching between objects - test - - - This operation discards all changes that have been saved -into the file so far, closes it and replaces it with a clean -copy of its head revision from RCS. - -All changes will be lost if you do this. - - - test - - - <b>Firewall Builder 2.0</b> - test - - - * platform : %1 - test - - - Add File to &RCS - testОшибка добавления файла в RCS -%1 - - - RCSFilePreview - test - - - Switching to enable mode... - test - - - - AboutDialog_q - - - - Firewall Builder - Firewall Builder - - - - Using libfwbuilder API v - Используется libfwbuilder API версии - - - - Revision: - Ревизия: - - - - &OK - OK - - - Copyright 2002-2004 NetCitadel, LLC - Copyright 2002-2004 (C) NetCitadel, LLC - - - <a href="http://www.fwbuilder.org/">http://www.fwbuilder.org</a> - <a href="http://www.fwbuilder.org/">http://www.fwbuilder.org</a> - - - Revision: %1 ( Build: %2 ) - Ревизия: %1 (Сборка: %2) - - - Using Firewall Builder API %1 - Используется Firewall Builder API версии %1 - - - Registered - Зарегистрированая копия программы - - - Unregistered - Незарегистрированная копия программы - - - <p align="center"><a href="http://www.fwbuilder.org/">http://www.fwbuilder.org</a></p> - <p align="center"><a href="http://www.fwbuilder.org/">http://www.fwbuilder.org</a></p> - - - Copyright 2002-2006 NetCitadel, LLC - Copyright 2002-2006 (C) NetCitadel, LLC - - - Copyright 2002-2008 NetCitadel, LLC - Copyright 2002-2008 (C) NetCitadel, LLC - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:13pt; font-weight:400; font-style:normal;"> -<p align="center" style=" margin-top:12px; margin-bottom:12px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><a href="http://www.fwbuilder.org"><span style=" text-decoration: underline; color:#0000ff;">http://www.fwbuilder.org</span></a></p></body></html> - - - - - Copyright 2002-2010 NetCitadel, LLC - Copyright 2002-2010 (C) NetCitadel, LLC - - - - ActionsDialog - - 'Chabge inbound interface', 'Continue packet inspection' and 'Make a copy' options are mutually exclusive - Опции 'Изменить входящий интерфейс', 'Продолжить инспекцию пакетов' и 'Сделать копию' являются взаимно исключающими - - - - - &Continue - Продолжить - - - - Rule name for accounting is converted to the iptables -chain name and therefore may not contain white space -and special characters. - Название правила для учета конвертируется в -название цепочки iptables, и поэтому оно не может -содержать пробела или других специальных символов. - - - - Emulation of terminating behavior for MARK and CLASSIFY targets is currently ON, rule will be terminating - - - - - Emulation of terminating behavior for MARK and CLASSIFY targets is currently OFF, rule will not be terminating - - - - - 'Change inbound interface', 'Continue packet inspection' and 'Make a copy' options are mutually exclusive - - - - - ActionsDialog_q - - - Actions Dialog - Действия - - - fw/rule num/action - номер/действие МЭ/правила - - - Tag string: - Строка пометки: - - - - If rule action is 'Reject', this option defines firewall's reaction to the packet matching the rule - Если действие правила установлено в 'Блокировать с уведомлением', то эта опция определяет тип уведомления - - - - This action has no parameters. - Для выбранного действия нет параметров. - - - Tag value: - Значение пометки: - - - Mark connections created by packets that match this rule - Маркировать пакеты, попадающие под это правило - - - - Requires CONNMARK target - Требует наличия цели CONNMARK - - - Mark packets in PREROUTING chain - Маркировать пакеты в цепочке PREROUTING - - - - Rule name for accounting. (white spaces and special characters are not allowed) - Название правила для учета (пробел или специальные символы не допустимы) - - - - Packet classification can be implemented in different ways: - Варианты классификации пакетов: - - - - use dummynet(4) 'pipe' - использовать dummynet(4) 'pipe' - - - - use dummynet(4) 'queue' - использовать dummynet(4) 'queue' - - - - Pipe or queue number: - Номер pipe или queue: - - - - Custom string: - Строка, заданная пользователем: - - - - Classify string: - Строка классификации: - - - - Note: CLASSIFY target in iptables is non-terminating, -this means other rules with Classify or Branch -target below this one will process the same packet. -However, Firewall Builder can emulate terminating -behavior for this action. Emulation is activated -by an option in the "compiler" tab of the firewall -object properties dialog. - - - - - Divert socket port number: - Номер порта для divert socket: - - - User-defined chain name: - Название цепочки, заданное пользователем: - - - - In addition to 'filter', create branching rule in 'mangle' table as well - В дополнение к таблице 'filter' создать ветку правила в таблице 'mangle' - - - Anchor name: - Имя прикрепления: - - - - - Route through - Маршрутизировать через - - - - - Route reply through - Маршрутизировать ответ через - - - - - Route a copy through - Маршрутизировать копию через - - - - - interface - интерфейс - - - - - next hop - следующий маршрутизатор - - - - Fastroute - Быстрая маршрутизация - - - - Change inbound interface to - Изменить входящий интерфейс на - - - - Route through gateway - Маршрутизировать через маршрутизатор - - - - Change outbound interface to - Изменить исходящий интерфейс на - - - - Continue packet inspection - Продолжить инспекцию пакетов - - - - Make a copy - Сделать копию - - - - Emulation is currently ON, rule will be terminating - - - - - Load Balancing: - - - - - - None - Ничего - - - - Tag connections created by packets that match this rule - - - - - Bitmask - - - - - Random - Случайный - - - - Source Hash - - - - - Round Robin - - - - - - Tag service object: - - - - - Note: this action translates into MARK target for iptables. -Normally this target is non-terminating, that is, other rules -with Classify or Tag actions below this one will process -the same packet. However, Firewall Builder can emulate -terminating behavior for this action. Option in the "compiler" -tab of the firewall object properties dialog activates emulation. - - - - - Emulation of terminating behavior for MARK target is currently ON, the rule will be terminating - - - - - Policy ruleset object: - - - - - Policy rule set object: - - - - - NAT Rule set object: - - - - - AddressRangeDialog - - - - Illegal IP address '%1' - Некорректный IP адрес '%1' - - - - - &Continue - Продолжить - - - - AddressRangeDialog_q - - - Address Range - Диапазон адресов - - - - Name: - Название: - - - Library: - Библиотека: - - - - Comment: - Комментарий: - - - - Range End: - Конец диапазона: - - - - Range Start: - Начало диапазона: - - - Apply Changes - Применить - - - - AddressTableDialog_q - - - Address Table - Таблица адресов - - - - Comment: - Комментарий: - - - Library: - Библиотека: - - - - Name: - Название: - - - - Compile Time - Время компиляции - - - - Run Time - Время выполнения - - - - File name: - Имя файла: - - - - - Browse - Выбрать - - - - Preview - Предварительный просмотр - - - - ClusterDialog - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - Да - - - - &No - Нет - - - - ClusterDialog_q - - - Cluster - - - - - Name: - - - - - Platform: - - - - - Host OS: - - - - - Modified: - - - - - - - TextLabel - - - - - Compiled: - - - - - Installed: - - - - - Comment: - - - - - Skip this firewall for batch compile and install operations - Пропускать этот межсетевой экран при пакетной компиляции и/или установке - - - - Inactive cluster - - - - - ClusterGroupDialog - - - Master - - - - - Firewall %1 can be used as a member of this cluster - - - - - Invalid - - - - - Firewall %1 can not be used as a member of this cluster - because its host OS or platform does not match those of the cluster. - - - - - FWBuilder API error: %1 - Ошибка API FWBuilder: %1 - - - - &Continue - - - - - ClusterGroupDialog_q - - - ClusterGroup - - - - - Name: - - - - - Type: - - - - - Edit protocol parameters - - - - - List of current members of this cluster. -Double click on an entry to load it. - - - - - Firewall - - - - - Interface - - - - - Master - - - - - Status - - - - - Click here to manage member firewalls of this cluster group. - - - - - Manage Members - - - - - Comment: - - - - - ClusterInterfaceWidget - - - Some of the cluster interfaces do not have any member firewall interface selected - - - - - Please select interface of the member firewall rather than the firewall object to be used with cluster interface - - - - - %1 can not be used as cluster interface. - - - - - Form - Форма - - - - Name: - - - - - Label: - - - - - Comment: - - - - - Select firewall interfaces to use with cluster interface and choose its name. - Select firewall interfaces to use with the cluster interface. - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">Configuration of cluster interfaces depends on the failover protocol chosen on the next page. If the protocol creates its own new interface, such as <span style=" font-weight:600;">CARP</span> that creates interface <span style=" font-weight:600; font-style:italic;">carp0</span>, then the cluster interface object represents it and should have name <span style=" font-weight:600; font-style:italic;">carp0</span>. If failover protocol does not create new interfaces, such as <span style=" font-weight:600;">heartbeat</span> or <span style=" font-weight:600;">OpenAIS</span>, then cluster interface should have the same name as corresponding member firewall interfaces, that is <span style=" font-weight:600; font-style:italic;">eth0</span>, <span style=" font-weight:600; font-style:italic;">eth1.102</span>, <span style=" font-weight:600; font-style:italic;">vlan200</span>, and so on. In the latter case cluster interface is an abstraction used to define mapping between corresponding interfaces of the member firewalls and to provide place for the configuration of the failover protocol.</p></body></html> - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:13pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">Configuration of cluster interfaces depends on the failover protocol chosen on the next page. If the protocol creates its own new interfaces, such as <span style=" font-weight:600;">VRRP</span> or <span style=" font-weight:600;">CARP</span> that create inetrfaces <span style=" font-weight:600; font-style:italic;">vrrp0</span> or <span style=" font-weight:600; font-style:italic;">carp0</span>, then cluster interface objects represent these and should have the name <span style=" font-weight:600; font-style:italic;">vrrp0</span> or <span style=" font-weight:600; font-style:italic;">carp0</span>. If failover protocol does not create new interfaces, such as <span style=" font-weight:600;">heartbeat</span> or <span style=" font-weight:600;">OpenAIS</span>, then cluster interface should have the same name as member firewall interfaces, that is <span style=" font-weight:600; font-style:italic;">eth0</span>, <span style=" font-weight:600; font-style:italic;">eth1.102</span>, <span style=" font-weight:600; font-style:italic;">vlan200</span>, and so on. In the latter case cluster interface is an abstraction used to define mapping between corresponding interfaces of the member firewalls and to provide place for the configuration of the failover protocol.</p></body></html> - - - - - ClusterInterfacesSelectorWidget - - - Add new interface - - - - - Delete current interface - - - - - New interface - - - - - This cluster has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - No interfaces - - - - - Interface %1 of firewall %2 is used in more than one cluster interface. - - - - - ColorLabelMenuItem - - - no color - без цвета - - - - CommentEditorPanel - - - Warning: loading from file discards current contents of the script. - Предупреждение: загрузка из файла удалит текущее содержимое скрипта. - - - - Choose file that contains PIX commands - Выберите файл, содержащий команды Cisco PIX - - - - Could not open file %1 - Не могу открыть файл %1 - - - - CommentEditorPanel_q - - - Comment Editor Panel - Панель редактора комментариев - - - fw/rule num - номер МЭ/правила - - - - Import from file ... - Импорт из файла... - - - - CompareObjectsDialog - - - Next - Следующий - - - - The following two objects have the same internal ID but different attributes: - - - - - Skip the rest but build report - - - - - CompilerOutputPanel - - - Compiling rule... - - - - - CompilerOutputPanel_q - - - Script Editor - - - - - ConfirmDeleteObjectDialog - - NAT - Сетевая трансляция адресов (NAT) - - - Policy - Набор правил - - - Routing - Маршрутизация - - - Unknown rule set - Неизвестный набор правил - - - /Rule%1 - /Правило%1 - - - Type: - Тип: - - - - Not used anywhere - Нигде не используется - - - - ConfirmDeleteObjectDialog_q - - - Object - Объект - - - - Parent - Наследует от - - - - Details - Подробности - - - - Firewall Builder - Firewall Builder - - - - Delete - Удалить - - - - Cancel - Отмена - - - - Groups and firewall policy rules shown in the list below reference objects you are about to delete. If you delete objects, they will be removed from these groups and rules. - Группы и правила в списке ниже ссылаются на объекты, которые вы собираетесь удалить. Если вы их удалите, то они будут удалены и из этих групп и правил. - - - - Deleted objects are moved to the "Deleted objects" library. You can recover them later by moving back to the user's library. However if you delete an object already located in the "Deleted objects" library, it is destroyed and can not be restored. - Удаленные объекты перемещены в специальную библиотеку "Deleted objects", при необходимости вы можете их восстановить путем перемещения в обычную библиотеку. При удалении из специальной библиотеки "Deleted objects", объекты утрачиваются навсегда и не подлежат восстановлению. - - - - CustomServiceDialog_q - - - Custom Service - Пользовательский сервис - - - - Name: - Название: - - - Library: - Библиотека: - - - Custom service object has separate code string for each supported firewall platform. - Пользовательский сервис должен содержать отдельное определение для каждого типа межсетевого экрана. - - - - Platform: - Тип межсетевого экрана: - - - Apply Changes - Применить - - - Code: - Определение: - - - - Comment: - Комментарий: - - - - Code String: - - - - - - Custom service object has separate code string for each -supported firewall platform. - - - - - Protocol Name: - - - - - Choose one of the standard protocols from the menu or enter custom -protocol string. Policy compilers can use this information to add correct -protocol-specific parameters to the generated configuration. For example, -iptables compiler is allowed to add "--reject-with tcp-reset" to the target -REJECT only if service object belongs to protocol "tcp". - - - - - - Address Family: - - - - - Like with protocol, setting address family helps -policy compiler generate more accurate configuration -using this custom service object. For example, if -address family is set to ipv6, this custom service -will only be used in ipv6 policies. - - - - - - IPv4 - IPv4 - - - - IPv6 - IPv6 - - - - DNSNameDialog_q - - - DNS Name - DNS имя - - - - DNS 'A' record name entered in this input field will be converted to -IP address using DNS query during policy compilation if checkbox -"Compile time" is turned on, or during firewall policy activation if -"Run Time" mode is used. This field can be automatically populated -using object name, this is controlled by an option in the global -Preferences dialog, tab "Objects" - - - - - Comment: - Комментарий: - - - - Compile Time - Время компиляции - - - - Run Time - Время выполнения - - - Library: - Библиотека: - - - - Name: - Название: - - - - DNS Record: - DNS запись: - - - - DiscoveryDruid - - - Hosts file parsing ... - Обработка файла узлов ... - - - - DNS zone transfer ... - Получение зоны DNS ... - - - - Network discovery using SNMP ... - Получение информации через SNMP ... - - - - - Adding objects ... - Добавление объектов ... - - - - - - - - Cancel - Отмена - - - - Prepare objects ... - Подготовка объектов ... - - - - - Copying results ... - Копирование результатов ... - - - - - - Discovery error - Ошибка получения информации - - - - Incomlete network specification. - Неполная сетевая спецификация. - - - - Empty community string - Пустая строка SNMP community - - - - Import configuration from file ... - Импортировать конфигурацию из файла ... - - - - Could not open file %1 - Не удалось открыть файл %1 - - - - Some discovered interfaces have been rearranged in fwbuilder objects and recreated as subinterfaces to reflect VLANs, bonding and bridging configurations. The algorithm used to guess correct relationship between interfaces and subinterfaces is imperfect because of the limited information provided by SNMP daemon. Pelase review created objects to make sure generated configuration is accurate. - -The program expects MAC addresses of bonding, bridge and vlan interfaces to be the same. It is especially important to review and fix generated objects if you use MAC address spoofing. - - - - - &Continue - - - - - DiscoveryDruid_q - - - Object - Объект - - - - Interfaces - Интерфейсы - - - - Type - Тип - - - Discovery Druid - Менеджер получения информации - - - - Choose discovery method used to collect information about network objects from the list below and click 'Next' to continue. - Выберите метод получения информации о сетевых объектов ниже и нажмите 'Далее' для продолжения. - - - - Discovery method: - Метод получения информации: - - - - Read file in hosts format - Прочитать файл узлов (в формате /etc/hosts) - - - - Import DNS zone - Импортировать зону DNS - - - - Perform network discovery using SNMP - Метод получения информации - - - - Enter full path and file name below or click "Browse" to find it: - Введите ниже полный путь и название файла или нажмите 'Просмотр' ниже для его поиска: - - - - File in hosts format - Файл узлов (в формате /etc/hosts) - - - - Browse ... - Выбрать... - - - Reading file in hosts format - Чтение файла узлов (в формате /etc/hosts) - - - - This discovery method creates objects for all 'A' records found in DNS domain. You will later have a chance to accept only those objects you wish and ignore others. -Please enter the domain name below: - Этот метод получения информации создает объекты согласно записи типа 'A' DNS указанного домена. На следующем шаге можно выбрать те объекты, которые вы хотите добавить (и соответственно не добавлять ненужные). -Введите имя домена: - - - - Domain name - Имя домена - - - - Objects created using this method may have long or short names. long name consists of the host name and full domain name (this is called <i>Fully Qualified Domain Name</i>). Short name consists of only host name. Check in the box below if you wish to use long name, then click next to continue: - Объекты создаваемые этим методом могут иметь как длинные, так и короткие имена. Длинные имена состоят из имени узла и полного доменного имени (FQDN). Короткие имена состоят из имени узла. Поставьте отметку ниже, если вы хотите получить объекты с длинными именами и нажмите Далее: - - - - Use long names - Использовать длинные имена - - - - DNS zone information has to be transferred from the name server authoritative for the domain. Pick the name server: - Информация о зоне DNS будет получена от указанного DNS сервера: - - - - Name server - DNS сервер - - - - choose name server from the list below - выберите DNS сервер из списка ниже - - - - server name or its IP address here if you wish to use different one: - альтернативное имя сервера или IP адрес: - - - - DNS Query options - Опции DNS запроса - - - - Timeout (sec) - Таймаут (сек) - - - - Retries - Количество повторов - - - - This discovery method scans networks looking for hosts or gateways responding to SNMP queries. It pulls host's ARP table and uses all the entries found in it to create objects. Scan starts from the host called "seed". Enter "seed" host name or address below: - Этот метод получения информации создает объекты согласно результатам опроса узлов и маршрутизаторов по протоколу SNMP. Он получает ARP таблицы узлов и использует все записи этих таблиц. Сканирование начинается с узла, называемого "seed". Введите имя или IP адрес узла "seed": - - - - 'Seed' host - Узел "seed" - - - - Enter a valid host name or address. - Введите имя или IP адрес узла. - - - - The scanner process can be confined to a certain network, so it won't discover hosts on adjacent networks. If you leave these fields blank, scanner will visit all networks it can find: - Сканер может быть настроен на определенную подсеть и не использовать ненужные подсети. Если поля ниже будут пусты, то сканер будет использовать все подсети, которые сможет найти: - - - - Confine scan to this network: - Сканировать только подсеть: - - - - Netmask: - Маска подсети: - - - - Address: - Адрес: - - - Network discovery using SNMP - Получение информации через SNMP - - - - The scanner process can repeat its algorithm recursively using each new host it finds as a new "seed". This allows it to find as many objects on your network as possible. On the other hand, it takes more time and may find some objects you do not really need. You can turn recursive scanning on below: - Сканер может работать рекурсивно, то есть пытаться использовать каждый найденый узел как "seed" узел. С одной стороны, это позволяет получить информацию по максимуму объектов вашей сети, с другой - сканирование займет слишком много времени. Включить рекурсивное сканирование: - - - - Run network scan recursively - Выполнять рекурсивное сканирование - - - - The scanner process can find nodes beyond the boundaries of your network by following point-to-point links connecting it to the Internet or other parts of WAN. - Сканер может найти объекты за пределами вашей сети через каналы типа точка-точка, которые могут соединять вашу сеть как с Internet, так и с другими частями вашей сети. - - - - Follow point-to-point links - Использовать каналы типа точка-точка - - - The scanner process can distinguish virtual IP addresses created on hosts as static "published" ARP entries or as secondary addresses on interfaces. - Сканер может различать виртуальные IP адреса созданные на узлах как статические записи в ARP таблице, либо как вторичные адреса на интерфейсе. - - - Include virtual addresses - Обрабатывать виртуальные адреса - - - - Analysis of ARP table yields IP addresses for hosts on your network. In order to determine their names, scanner can run reverse name lookup queries using your name servers (DNS): - Получать DNS имена узлов для IP адресов, найденых в ARP таблицах. Для получения DNS имен сканер будет использовать обратные DNS запросы на ваши DNS серверы: - - - - Run reverse name lookup DNS queries to determine host names - Получать DNS имена узлов для IP адресов через обратные DNS запросы - - - Network scan options - Опции сканирования сети - - - - Enter parameters for SNMP and DNS reverse lookup queries below. (If unsure, just leave default values): - Введите параметры для SNMP и DNS обратных запросов (вы можете не изменять это поле, чтобы использовать значения по-умолчанию): - - - - SNMP query parameters: - Параметры SNMP запросов: - - - - SNMP 'read' community string: - Строка SNMP community для чтения: - - - - - number of retries: - количество попыток: - - - - timeout (sec): - таймаут (сек): - - - - public - public - - - - DNS parameters: - Параметры DNS: - - - - timeout (sec) : - таймаут (сек): - - - - Number of threads: - Количество потоков: - - - SNMP and DNS reverse lookup queries parameters - Параметры для SNMP и DNS обратных запросов - - - - Process name - Имя процесса - - - - Stop - Стоп - - - - Save scan log to file - Сохранить журнал сканирования в файл - - - - Process log: - Выполняется получение информации - - - - These are the networks found by the scanner process. Choose the ones you wish to use from the list below, then click 'Next': - Ниже перечислены найденые сканером подсети. Выберите те, которые вы будет использовать и нажмите 'Далее': - - - - - - - - Select All - Выбрать все - - - - - - Filter ... - Фильтр ... - - - - - - - - Unselect All - Снять выбор со всех - - - - - - Remove Filter - Удалить фильтр - - - - - -> - -> - - - - - <- - <- - - - Networks - Подсети - - - - Choose objects you wish to use, then click 'Next': - Выберите объект, который вы хотите использовать и нажмите 'Далее': - - - Objects - Объекты - - - - Change type of selected objects: - Изменить тип выбранных объектов: - - - - Address - Адрес - - - - Host - Узел - - - - Firewall - Межсетевой экран - - - - Here you can change type of the objects to be created for each address discovered by the scanner. By default, an "Address" object is created for the host with just one interface with single IP address and "Host" object is created for the host with multiple interfaces, however you can change their types on this page. - Сейчас вы можете изменить тип объекта для каждого адреса, найденного сканером. По-умолчанию для узлов с одним интерфейсом и IP-адресом создается объект типа 'Адрес', для узлов с несколькими интерфейсами создается объект типа 'Узел'. - - - Adjust Object types - Изменить типы объектов - - - - Select target library - Библиотека для объектов - - - - Adding new objects to library ... - Добавление новых объектов в библиотеку ... - - - Creatnig objects - Прочитать файл узлов (формата /etc/hosts) - - - - TextLabel - - - - - Import configuration of a firewall or a router - - - - - All objects created during import will be placed in the library currently opened in the tree. - - - - - Policy import tries to parse given configuration file and preserve its logic as close as possible. However, very often target firewall configuration allows for more commands, options and their combinations than importer can understand. Rules that importer could not parse exactly are colored red in the rule sets it creates. Always inspect firewall policy created by the importer and compare it with the original. Manual changes and corrections may be required. Comments in the rules that could not be parsed show fragments of the original configuration parser did not understand. - - - - - Firewall name: - - - - - Import from file: - - - - - Browse... - - - - - Cisco IOS - - - - - iptables - - - - - Platform: - - - - - textLabel1 - textLabel1 - - - - < &Back - < Назад - - - - &Next > - Дальше > - - - - &Finish - Готово - - - - &Cancel - - - - - The scanner process normally ignores interfaces that have no IP addresses; checking this option makes it create such interfaces as "Unnumbered" - - - - - Include interfaces with no ip addresses - - - - - FWBAboutDialog - - Revision: %1 ( Build: %2 ) - Ревизия: %1 (Сборка: %2) - - - - Using Firewall Builder API %1 - Используется Firewall Builder API версии %1 - - - Registered - Зарегистрированая копия программы - - - Unregistered - Незарегистрированная копия программы - - - - Build: %1 - - - - - FWBMainWindow_q - - - Firewall Builder - Firewall Builder - - - Click here to change amount of information shown about object selected in the tree - Нажмите, чтобы изменить режим показа информации про выбранный в дереве объект - - - Tab 1 - Tab 1 - - - Firewall Name - Название межсетевого экрана - - - Firewalls: - Межсетевые экраны: - - - - &File - Проект - - - - &Edit - Редактировать - - - - Object - Объект - - - - - Rules - Правила - - - - &Help - Помощь - - - Toolbar - Панель инструментов - - - - - New Object File - Создать новый - - - - &New Object File - Создать новый - - - - - - Open - Открыть - - - - &Open... - Открыть... - - - - Ctrl+O - Ctrl-O - - - - - - Save - Сохранить - - - - &Save - Сохранить - - - - Ctrl+S - Ctrl-S - - - - Save As - Сохранить как - - - - Save &As... - Сохранить как... - - - - Print - Печать - - - - &Print... - Печать... - - - - Ctrl+P - Ctrl-P - - - - Exit - Выход - - - - E&xit - Выход - - - Undo - Отмена - - - &Undo - Отмена - - - Ctrl+Z - Ctrl-Z - - - Redo - Повторить отмененное действие - - - &Redo - Повторить отмененное действие - - - Ctrl+Y - Ctrl-Y - - - - Cut - Вырезать - - - - &Cut - Вырезать - - - - Ctrl+X - Ctrl-X - - - - Copy - Копировать - - - - C&opy - Копировать - - - - Ctrl+C - Ctrl-C - - - - Paste - Вставить - - - - &Paste - Вставить - - - - Ctrl+V - Ctrl-V - - - - - Ctrl+F - Ctrl-F - - - - Contents - Содержимое - - - - &Contents... - Содержимое - - - - Index - Содержание - - - - &Index... - Содержание - - - - About - О программе - - - - &About - О программе - - - - - New - Создать - - - - Close - Закрыть - - - - &Close - Закрыть - - - - - Compile - Компилировать - - - Compile rules - Компилировать правила - - - - - Install - Установить - - - Install firewall policy - Установить набор правил - - - - - Back - Назад - - - - - Move back to the previous object - Вернуться к предидущему объекту - - - - New Object - Создать объект - - - - &New Object - Создать объект - - - - Create New Object - Создать новый объект - - - - Ctrl+N - Ctrl-N - - - - Find Object - Найти объект - - - - &Find Object - Найти объект... - - - - - Find object in the tree - Поиск объекта по дереву - - - - Preferences... - Настройки... - - - - P&references... - Настройки... - - - - Edit Preferences - Редактировать настройки - - - Insert Rule - Вставить правило - - - Move Rule Up - Переместить правило выше - - - Move Rule Down - Переместить правило ниже - - - Add Rule Below - Добавить правило ниже - - - Remove Rule - Удалить правило - - - Ctrl+Del - Ctrl-Del - - - Copy Rule - Копировать правило - - - Cut Rule - Вырезать правило - - - Paste Rule Above - Вставить правило выше - - - Paste Rule Below - Вставить правило ниже - - - - Add File to RCS - Добавить файл в систему контроля версий - - - - Add File to &RCS - Добавить файл в систему контроля версий - - - - - Delete - Удалить - - - Del - Del - - - - Export Library To a File - Экспортировать библиотеку в файл - - - - &Export Library - Экспортировать библиотеку - - - - Import Library From a File - Импортировать библиотеку из файла - - - &Import Library - Импортировать библиотеку - - - - Debug - Отладка - - - - &Debug - Отладка - - - &Properties - Свойства - - - Move Selected Rules - Переместить выбранные правила - - - - Discard - Отменить изменения - - - - &Discard - Отменить изменения - - - - Discard Changes and Overwrite With Clean Copy Of The Head Revision From RCS - Отменить изменения и перезаписать копией из основной ветки системы контроля версий - - - Apply - Применить - - - - Show File Properties - -Показать свойства файла - - - - Commit - Принять изменения - - - - Commit Opened File to RCS and Continue Editing - Принять изменения открытого файла в систему контроля версия и продолжить редактирование - - - - - Lock - Заблокировать - - - - - Unlock - Разблокировать - - - Discovery Druid - Менеджер получения информации - - - - - new item - новый элемент - - - - Tools - Утилиты - - - - Co&mmit - Записать в систему контроля ревизий - - - - - Find Conflicting Objects in Two Files - Найти конфликтующие объекты в двух файлах - - - - Import Po&licy - Импортировать правила из файла - - - - Window - Окно - - - - Import &Library - Импортировать библиотеку - - - - - Propert&ies - Свойства - - - - Ctrl+I - - - - - Import Policy - Импортировать правила из файла - - - - Open Recent - - - - - Firewall Builder Help - - - - - Clear Menu - - - - - Find - - - - - Editor - - - - - Help - Справка - - - - Tutorial - - - - - View - - - - - - Object Discovery - - - - - Release Notes - - - - - Object Tree - - - - - Summary of features - - - - - Getting started - - - - - Inspect - Инспектировать - - - - Output - - - - - - Undo Stack - - - - - - - Compile rules of all firewall and cluster objects - - - - - - - Install firewall policy of all firewall and cluster objects - - - - - Ctrl+T - - - - - Editor Panel - - - - - FWObjectDropArea - - - Drop object here. - Поместить объект сюда. - - - - Paste - Вставить - - - - Delete - Удалить - - - - Show in the tree - - - - - Edit - - - - - FWObjectDropArea_q - - - Form1 - Форма1 - - - - FWObjectPropertiesFactory - - <b>Library:</b> - <b>Библиотека:</b> - - - <b>Object Id:</b> - <b>Идентификатор объекта:</b> - - - <b>Object Type:</b> - <b>Тип объекта:</b> - - - <b>Object Name:</b> - <b>Имя Объекта:</b> - - - - FWWindow - - Some objects have been modified but not saved. -Do you want to save changes now ? - Некоторые объекты были изменены без сохранения. -Сохранить изменения? - - - &Save - Сохранить - - - &Discard - Отменить изменения - - - &Cancel - Отмена - - - FWB Files (*.fwb);;All Files (*) - Файлы Firewall Builder (*.fwb);;Все файлы (*) - - - The file %1 already exists. -Do you want to overwrite it ? - Файл с именем %1 уже существует. -Хотите перезаписать его? - - - Choose name and location for the new file - Выберите имя и папку для нового файла - - - Saving data to file... - Сохранение данных в файл... - - - Choose name and location for the file - Выберите имя и папку для размещения файла - - - This operation discards all changes that have been saved -into the file so far, closes it and replaces it with a clean -copy of its head revision from RCS. - -All changes will be lost if you do this. - - - Выбранная операция перезапишет файл копией -из основной ветки системы контроля версий. - -Все ранее сделанные изменения будут утрачены. - - - &Discard changes - Отменить изменения - - - File %1 has been added to RCS. - Файл %1 был добавлен в систему контроля версий - - - Error adding file to RCS: -%1 - Ошибка при добавлении файла %1 в систему контроля версий - - - (read-only) - (только для чтения) - - - Error loading file: -%1 - Ошибка при загрузке файла %1 - - - Firewall Builder 2 uses file extension '.fwb' and -needs to rename old data file '%1' to '%2', -but file '%3' already exists. -Choose a different name for the new file. - Firewall Builder версии 2 использует расширение файлов .fwb. -Для выполнения текущей операции необходимо переименовать -старый файл %1 в новый %2, однако файл %3 уже существует. -Выберите другое имя для создаваемого файла. - - - Please choose a different name for the new file. - Выберите другое имя для создаваемого файла. - - - Firewall Builder 2 uses file extension '.fwb'. Your data file '%1' -has been renamed '%2' - Firewall Builder 2 использует расширение .fwb. -Старый файл %1 был переименован в %2. - - - Exception: %1 - Исключение: %1 - - - Failed transformation : %1 - Ошибка преобразования: %1 - - - XML element : %1 - Элемент XML: %1 - - - Error checking in file %1: -%2 - Ошибка при добавлении файла %1 в систему контроля версий: -%2 - - - File is read-only - Файл доступен только для чтения - - - Error saving file %1: %2 - Ошибка при сохранении файла %1: -%2 - - - Error loading file %1: -%2 - Ошибка при открытии файла %1: -%2 - - - Choose a file to import - Выберите файл для импорта - - - No firewalls defined - Не определено ни одного межсетевого экрана - - - Policy - Набор правил - - - NAT - Сетевая трансляция адресов (NAT) - - - Firewall platform is not specified in this object. -Can't compile firewall policy. - Не задан тип межсетевого экрана для этого объекта. -Невозможно скомпилировать набор правил. - - - Policy installer uses Secure Shell to communicate with the firewall. -Please configure directory path to the secure file copy and secure -shell utilities installed on your machine using Preferences dialog - Программа установки правил использует утилиты SSH для связи с межсетевым экраном. -Определите в настройках программы пути к утилитам scp и ssh. - - - - &Continue - Компилировать - - - Some objects have been modified since -you compiled the policy last time. -Do you want to recompile it before you install ? - Некоторые объекты были изменены с момента последей копиляции. -Хотите перекомпилировать набор правил перед тем как установить его? - - - &Install old copy - Установить старую копию - - - Load operation cancelled and data file reverted to original version. - Операция открытия файла была отменена, поэтому файл не был изменен. - - - &Yes - Да - - - &No - Нет - - - Checking file %1 in RCS - Добавление файла %1 в систему контроля версий - - - Legend - Условные обозначения - - - Objects - Объекты - - - - Print configuration of %1 - - - - - Printing... - - - - - - Printing aborted - Печать отменена - - - - Printing completed - Печать завершена - - - Close - Закрыть - - - Install - Установить - - - Groups - Группы - - - EMPTY - Пусто - - - Loading system objects... - Загрузка системных объектов... - - - Reading and parsing data file... - Чтение и обработка файла данных... - - - Merging with system objects... - Смешивание с системными объектами... - - - Building object tree... - Построение дерева объектов... - - - Indexing... - Индексация... - - - A library that you are trying to export contains references -to objects in the other libraries and can not be exported. -The following objects need to be moved outside of it or -objects that they refer to moved in it: - Библиотека не может быть экспортирована, так как, -содержит ссылки на объекты других библиотек. -Для успешного экспортирования следующие объекты -необходимо или удалить из библиотеки или поместить в нее: - - - Please select a library you want to export. - Выберите библиотеку для экспортирования. - - - Policy/%1 - Набор правил/%1 - - - Building branch policy view '%1'... - Строится представление ветки набора правил '%1' ... - - - Building policy view... - Строится представление набора правил ... - - - Building NAT view... - Строится представление таблицы трансляции адресов ... - - - Building routing view... - Строится представление маршрутизации ... - - - Routing - Маршрутизация - - - - Printing cancelled - Printing <ed - - - - - A new version of Firewall Builder is available at http://www.fwbuilder.org - Новая версия программы может быть загружена с http://www.fwbuilder.org - - - - Open File - - - - - Ctrl+Z - - - - - Ctrl+Y - - - - - Shift+Ctrl+Z - - - - - File '%1' does not exist or is not readable - - - - - FilterDialog - - - Filter error - Ошибка фильтрации - - - - Invalid RegExp. - Некорректное регулярное выражение. - - - - Name - Название - - - - Address - Адрес - - - - Contains - Содержит - - - - Is equal to - Эквивалентно - - - - Starts with - Начинается на - - - - Ends with - Заканчивается на - - - - Matches Wildcard - Соответствует шаблону - - - - Matches RegExp - Соответствует регулярному выражению - - - - FilterDialog_q - - - Target - Цель - - - - Type - Тип - - - - Pattern - Образец - - - - Filter - Фильтр - - - - Save - Сохранить - - - - Load - Загрузить - - - - Ok - OK - - - - Cancel - Отмена - - - - Match - Соответствие - - - - all - все - - - - any - любой - - - - of the following: - из следующих: - - - - + - + - - - - Add a new pattern - Добавить новый образец - - - - Case sensitive - Чувствителен к регистру - - - - - - - - - - - Remove a pattern - Удалить образец - - - - FindObjectWidget - - - Search hit the end of the policy rules. - Поиск по набору правил завершен. - - - - - &Continue at top - Продолжить с начала - - - - - &Stop - ОК - - - - Search hit the end of the object tree. - Поиск по дереву объектов завершен. - - - Search or Replace object ind't specified. - Не указан объект для поиска или замены. - - - Cannot replace object by itself. - Невозможно заменить объект на самого себя. - - - - Search and Replace objects are incompatible. - Объекты для поиска и замены разных типов. - - - - Replaced %1 objects. - Заменен объект %1. - - - - Policy of firewall ' - Набор правил межесетевого экрана ' - - - - Search object is missing. - - - - - Replace object is missing. - - - - - Cannot replace object with itself. - - - - - FindWhereUsedWidget - - NAT - Сетевая трансляция адресов (NAT) - - - Policy - Набор правил - - - Routing - Маршрутизация - - - Unknown rule set - Неизвестный набор правил - - - /Rule%1 - /Правило%1 - - - - Type: - Тип: - - - - NAT rule set - Набор правил трансляции адресов - - - - Policy rule set - Набор правил политики - - - - Routing rule set - Набор правил роутинга - - - - Rule set of unknown type - Набо правил неизвестного типа - - - - %1 "%2" / Rule %3 / %4 - %1 "%2" / Правило %3 / %4 - - - - FirewallCodeViewer_q - - - Firewall code viewer - - - - - Firewall / ruleset - Межсетевой экран / набор правил - - - - File: - - - - - Close - - - - - FirewallDialog - - - - FWBuilder API error: %1 - Ошибка API FWBuilder: %1 - - - - - - - &Continue - Продолжить - - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - Да - - - - &No - Нет - - - - Platform setting can not be empty - - - - - Host OS setting can not be empty - - - - - FirewallDialog_q - - - Firewall - Межсетевой экран - - - General - Основное - - - - Name: - Название: - - - Library: - Библиотека: - - - - Comment: - Комментарий: - - - - Firewall Settings ... - Настройка параметров межсетевого экрана... - - - - Host OS Settings ... - Настройка параметров операционной системы... - - - - Platform: - Тип межсетевого экрана: - - - - Version: - Версия межсетевого экрана: - - - - Host OS: - Операционная система межсетевого экрана: - - - Templates - Шаблоны - - - Drop here firewall objects that should be used as policy templates for this firewall. Rules will be added on top of the rules of this firewall and will be taken from policies of the template objects in the order they were added, from top to bottom: - Перетащите в область ниже другие объекты (только межсетевые экраны), которые будут использоваться для создания шаблона этого межсетевого экрана. Правила добавленных межсетевых экранов будут добавляться в набор правил этого экрана в той же последовательности, в которой будут добавлены межсетевые экраны в область ниже: - - - SNMP - SNMP - - - SNMP community: - Строка SNMP community: - - - Contact: - Контактное лицо: - - - Location: - Местоположение: - - - SNMP Get - Автозаполнение при помощи SNMP запроса - - - Description: - Описание: - - - Apply Changes - Применить - - - - Inactive firewall - Неактивный межсетевой экран - - - - Skip this firewall for batch compile and install operations - Пропускать этот межсетевой экран при пакетной компиляции и/или установке - - - - Modified: - - - - - - - TextLabel - - - - - Compiled: - - - - - Installed: - - - - - FirewallInstaller - - - Generated script file %1 not found. - Сгенерированный компилятором файл %1 не найден. - - - - &Continue - - - - - Copying %1 -> %2:%3 - - Копируется файл %1 -> %2:%3 - - - - FirewallInstallerCisco - - - Can not read generated script %1 - - - - - &Continue - - - - - FirewallInstallerUnx - - Generated script file %1 not found. - Сгенерированный компилятором файл %1 не найден. - - - - &Continue - Продолжить работу - - - Copying %1 -> %2:%3 - - Копируется файл %1 -> %2:%3 - - - Error: Failed to start program: - Не удалось запустить программу: - - - - Incorrect manifest format in generated script. Line with "*" is missing, can not find any files to copy to the firewall. -%1 - - - - - FirewallSelectorWidget - - - You should select at least one firewall to use with the cluster - - - - - Host operation systems of chosen firewalls are different - - - - - Platforms of chosen firewalls are different - - - - - Versions of chosen firewalls are different - - - - - Cluster firewalls should have at least one common inteface - - - - - GroupObjectDialog - - Name - Название - - - Properties - Свойства - - - - Open - Открыть - - - - Edit - Редактировать - - - - Copy - Копировать - - - - Cut - Вырезать - - - - Paste - Вставить - - - - Delete - Удалить - - - - GroupObjectDialog_q - - - Group - Группа - - - - L - L - - - - New Object - - - - - Create New Object - - - - - Create new object and add to this group - - - - - I - I - - - - Name: - Название: - - - Library: - Библиотека: - - - Apply Changes - Применить - - - - Comment: - Комментарий: - - - - HelpView_q - - - Help - Справка - - - - Object Name - Название объекта - - - - Close - - - - - HostDialog - - - The name of the object '%1' has changed. The program can also rename IP address objects that belong to this object, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to %2 will stay the same.) - - - - - &Yes - Да - - - - &No - Нет - - - - HostDialog_q - - - Host - Узел - - - - Name: - Название: - - - Library: - Библиотека: - - - - Comment: - Комментарий: - - - SNMP community: - Строка SNMP community: - - - - MAC matching - Проверка MAC адреса - - - Apply Changes - Применить - - - - ICMPServiceDialog_q - - - ICMP - ICMP - - - - Name: - Название: - - - Library: - Библиотека: - - - Apply Changes - Применить - - - - ICMP Type: - Тип ICMP: - - - - - any - любой - - - - ICMP Code: - Код ICMP: - - - - Comment: - Комментарий: - - - ICMP Service - ICMP сервис - - - - IPServiceDialog - - - DSCP code or class: - Код или класс DSCP: - - - - TOS code (numeric): - Код TOS (числовой): - - - - IPServiceDialog_q - - - IP - IP - - - - Comment: - Комментарий: - - - all fragments - все фрагменты - - - - rr (record route) - rr (record route) - - - - timestamp - timestamp - - - - ssrr (strict source route) - ssrr (strict source route) - - - 'short' fragments - 'короткие' фрагменты - - - - lsrr (loose source route) - lsrr (loose source route) - - - Protocol number: - Номер протокола: - - - ( 0 - any protocol ) - ( 0 - любой протокол ) - - - - Name: - Название: - - - Library: - Библиотека: - - - Apply Changes - Применить - - - IP Service - IP сервис - - - Protocol number: - (0- any protocol) - Номер протокола: (0-любой) - - - - DiffServ - - - - - Use DSCP - Использовать DSCP - - - - Use TOS - Использовать TOS - - - - DSCP or TOS code -(numerical, dec or hex): - Код DSCP или TOS (числовой, dec или hex): - - - - Protocol number: (0=any) - - - - - IP options: - - - - - IP service object that has this attribute turned on matches IP packets with any IP options present. - - - - - Any options - - - - - router-alert option - - - - - Fragments: - - - - - all - все - - - - 'short' - - - - - IPv4Dialog - - - Illegal IP address '%1' - Некорректный IP адрес %1 - - - - - &Continue - Продолжить - - - - Illegal netmask '%1' - Некорректная маска подсети %1 - - - - DNS lookup failed for both names of the address object '%1' and the name of the host '%2'. - Не удалось получить данные используя DNS запрос как для адреса %1, так и для имени %2. - - - - DNS lookup failed for name of the address object '%1'. - Не удалось получить имя используя DNS запрос для адреса %1. - - - - IPv4Dialog_q - - - IPv4 - IPv4 - - - - Name: - Название: - - - Library: - Библиотека: - - - - Comment: - Комментарий: - - - - Address: - Адрес: - - - - Netmask: - Маска подсети: - - - Apply Changes - Применить - - - - DNS Lookup... - Получить имя через DNS запрос... - - - Address - Адрес - - - - IPv6Dialog - - - Illegal IP address '%1' - Неверный IP адрес '%1' - - - - - &Continue - Продолжить - - - - Illegal netmask '%1' - Неверная маска '%1' - - - - DNS lookup failed for both names of the address object '%1' and the name of the host '%2'. - DNS запрос не сработал и для имени объекта '%1' и для имени хоста '%2'. - - - - DNS lookup failed for name of the address object '%1'. - DNS запрос не сработал для имени объекта '%1'. - - - - IPv6Dialog_q - - - IPv6 - IPv6 - - - Address IPv6 - Адрес IPv6 - - - - Name: - Имя: - - - - Address: - Адрес: - - - - Network (bit length) - Сеть (длина в битах) - - - - DNS Lookup... - Опеределить адрес при помощи DNS... - - - - Comment: - Комментарий: - - - - InterfaceDialog - - - Group: - Группа: - - - - Network: - Подсеть: - - - - - - &Continue - - - - - The name of the interface '%1' has changed. The program can also rename IP address objects that belong to this interface, using standard naming scheme 'host_name:interface_name:ip'. This makes it easier to distinguish what host or a firewall given IP address object belongs to when it is used in the policy or NAT rule. The program also renames MAC address objects using scheme 'host_name:interface_name:mac'. Do you want to rename child IP and MAC address objects now? (If you click 'No', names of all address objects that belong to interface '%2' will stay the same.) - - - - - &Yes - Да - - - - &No - Нет - - - - FWBuilder API error: %1 - Ошибка API FWBuilder: %1 - - - - InterfaceDialog_q - - - Interface - Интерфейс - - - - Name: - Название: - - - Library: - Библиотека: - - - - Label: - Метка: - - - Address is assigned -dynamically - Адрес назначается -динамически - - - - Regular interface - Обычный интерфейс с адресом - - - - Unnumbered interface - Интерфейс без адреса - - - - Management interface - Управляющий интерфейс - - - - <p>Check if this interface is used for management (SNMP queries, remote policy install etc.)<p> - <p>Выберите этот пункт, если этот интерфейс используется для управления межсетевым экраном (SNMP запросы, установка наборов правил и др.).</p> - - - This interface is -external (insecure) - Это внешний интерфейс -(небезопасный) - - - <p>One interface of the firewall must be marked as 'external'. This interface should be connected to the least secure network, usually the Internet.</p> - <p>Один из интерфейсов должен быть внешним. Этот интерфейс должен подключаться к менее безопасной сети, чаще всего к сети Internet.</p> - - - One interface of the firewall must be marked as 'external'. This interface should be connected to the least secure network, usually the Internet. - Один из интерфейсов должен быть внешним. Этот интерфейс должен подключаться к менее безопасной сети, чаще всего к сети Internet. - - - Apply Changes - Применить - - - - Comment: - Комментарий: - - - - - <p>Network zone consists of hosts and networks that can be reached through this interface of the firewall. Subnet to which this interface is directly attached must be part of its network zone. Other subnets reachable by means of routing should alse be added to the network zone. -<br> -If network zone for this interface consists of only one subnet, you can simply choose that network's object in the pull-down below. If your network zone should include multiple subnets, you need to create an Object Group, then put all hosts and networks which are going to be part of the network zone into that group and finally choose this group in the pull-down below.</p> - <p>Сетевая зона состоит из узлов и подсетей, к которым можно получить доступ через этот сетевой интерфейс межсетевого экрана. Подсеть, к которой этот сетевой интерфейс подключен напрямую, должна являться частью сетевой зоны этого интерфейса. Другие подсети, доступные через маршрутизацию также должны быть добавлены в эту сетевую зону. -<br> -Если сетевая зона для этого интерфейса состоит только из одной подсети, тогда вы можете просто выбрать ее в выпадающем списке сетевых объектов ниже. Если сетевая зона должна включать несколько подсетей, тогда необходимо создать группу объектов, в которую включить все эти подсети и выбрать эту группу объектов в выпадающем списке сетевых объектов ниже.</p> - - - - Network zone: - Сетевая зона: - - - - Security level: - Уровень безопасности: - - - - <p>Each interface of the firewall must have security level associated with it.<br>Security level can be any number between 0 and 100, 0 being least secure and 100 being most secure levels. Interface with security level 0 ususally serves Internet connection.</p> - <p>Каждому интерфейсу межсетевого экрана должен быть назначен уровень безопасности в диапазоне от 0 до 100. 0 означает меньшую безопасность, 100 - бОльшую. Нулевой уровень безопасности чаще всего присваивается интерфейсу, подключенному к сети Internet.</p> - - - - <p>Each interface of the firewall must have security level associated with it.<br> -Security level can be any number between 0 and 100, 0 being least secure and 100 being most secure levels. Interface with security level 0 ususally serves Internet connection.</p> - <p>Каждому интерфейсу межсетевого экрана должен быть назначен уровень безопасности в диапазоне от 0 до 100. 0 означает меньшую безопасность, 100 - бОльшую. Нулевой уровень безопасности чаще всего присваивается интерфейсу, подключенному к сети Internet.</p> - - - This interface is external (insecure) - Это внешний интерфейс (небезопасный) - - - - Address is assigned dynamically - Адрес назначается динамически - - - Bridge port - Порт моста - - - - Skip this interface while assigning policy rules - - - - - Unprotected interface - - - - - Bridge Port Interface - - - - - Advanced Interface Settings ... - - - - - Dedicated failover interface - - - - - InterfaceEditorWidget - - - New interface - - - - - - Remove - - - - - Failover protocol %1 does not require IP address for interface %2 - - - - - Failover protocol %1 requires an IP address for interface %2 - - - - - Empty address or netmask field - - - - - Add another address - - - - - Invalid address '%1/%2' - - - - - - Invalid netmask '%1/%2' - - - - - Form - Форма - - - - Name: - - - - - Label: - - - - - Comment: - - - - - Type: - - - - - Regular interface - - - - - Dynamic address - - - - - Unnumbered interface - - - - - MAC address: - - - - - Protocol: - - - - - Address - - - - - Netmask - - - - - Type - Тип - - - - - Add address - - - - - InterfacePolicyView - - Source - Источник - - - Destination - Назначение - - - Service - Сервис - - - Direction - Направление - - - Action - Действие - - - Time - Интервал времени - - - Options - Опции - - - Comment - Комментарий - - - - InterfacesTabWidget - - - Add new interface - - - - - Delete current interface - - - - - New interface - - - - - This firewall has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - This cluster has no interfaces. Add interface using button <img src=":/Icons/add.png" width=15 height=15>. - - - - - No interfaces - - - - - TabWidget - - - - - Tab 1 - - - - - Tab 2 - Tab 2 - - - - LibExportDialog - - Please select a library you want to export. - Выберите библиотеку для экспорта. - - - A library that you are trying to export contains references -to objects in the other libraries and can not be exported. -The following objects need to be moved outside of it or -objects that they refer to moved in it: - Библиотека не может быть экспортирована, поскольку содержит -ссылки на объекты других библиотек. Необходимо, или переместить -перечисленные ниже объекты из этой в другие библиотеки, или -добавить в эту библиотеку объекты других библиотек, на которые -она ссылается: - - - - LibExport_q - - - Export - Экспорт - - - - This will export a library to a file which can later be imported back into Firewall Builder - Это действие произведет экспорт библиотеки в файл, из которого она может быть позже импортирована обратно в Firewall Builder - - - - New Item - Новый элемент - - - - Make exported libraries read-only - Устанавливать доступ только для чтения на экспортируемые библиотеки - - - - Choose libraries to be exported: - Выберите библиотеки для экспорта: - - - - Ok - OK - - - - Cancel - Отмена - - - - LibraryDialog - - Pick the color for this library - Выберите цвет этой библиотеки - - - - LibraryDialog_q - - - Library - Библиотека - - - - Name: - Название: - - - - Comment: - Комментарий: - - - - Color: - Цвет: - - - Apply Changes - Применить - - - - MetricEditorPanel_q - - - Script Editor - Редактор скриптов - - - textLabel2 - textLabel2 - - - - NATRuleOptionsDialog_q - - - NAT Rule Options - Опции правила сетевой трансляции адресов (NAT) - - - fw/rule num - номер МЭ/правила - - - - No options are available for this firewall platform - Опции не доступны для выбранного межсетевого экрана - - - - Randomize port mapping (translates to --random) - - - - - Give a client the same source-/destination-address for each connection (translates to --persistent, requires iptables 1.4.3 or later). - - - - - Pool type - Тип пула - - - - default - по-умолчанию - - - - bitmask - битовая маска - - - - random - случайное - - - - source-hash - хэш источника - - - - round-robin - round-robin - - - - static-port - статический порт - - - - Normally, if object used to define translated source address is an interface marked as "dynamic", fwbuilder generates NAT rule with target MASQUERADE. However masquerading has problems with policy routing. This option makes fwbuilder use SNAT target instead. - - - - - Use SNAT target instead of MASQUERADING for NAT rules with dynamic interfaces - - - - - NATView - - Original Src - Исходный -адрес источника - - - Original Dst - Исходный -адрес назначения - - - Original Srv - Исходный -сервис - - - Translated Src - Транслированный -адрес источника - - - Translated Dst - Транслированный -адрес назначения - - - Translated Srv - Транслированный -сервис - - - Comment - Комментарий - - - Options - Опции - - - - NetworkDialog - - - Illegal IP address '%1' - Некорректный IP адрес %1 - - - - - - - &Continue - Продолжить - - - - - Illegal netmask '%1' - Некорректная маска подсети %1 - - - - Network object should not have netmask '0.0.0.0' - - - - - NetworkDialogIPv6 - - - Illegal IPv6 address '%1' - Некорректный IPv6 адрес '%1' - - - - - &Continue - Продолжить - - - - Illegal netmask '%1' - Некорректная маска подсети '%1' - - - - NetworkDialogIPv6_q - - - Network - Сеть - - - - Comment: - Комментарий: - - - - Name: - Название: - - - - Address: - Адрес: - - - - Netmask (bit length) - Маска подсети (длина в битах) - - - - NetworkDialog_q - - - Network - Подсеть - - - - Name: - Название: - - - Library: - Библиотека: - - - - Comment: - Комментарий: - - - - Netmask: - Маска подсети: - - - - Address: - Адрес: - - - Apply Changes - Применить - - - - ObjConflictResolutionDialog - - - Keep current object - Сохранить текущий объект - - - - Replace with this object - Заменить объектом - - - - - Delete - Удалить - - - Object <b>'%1'</b> in the objects tree - Объект <b> %1 </b> в дереве объектов - - - Object <b>'%1'</b> in file %2 - Объект <b> %1 </b> в файле %2 - - - - - Object '%1' has been deleted - Объект '%1' был удален - - - - Object '%1' in the objects tree - Объект '%1' в дереве объектов - - - - - Object '%1' in file %2 - Объект '%1' в файле '%2' - - - - ObjConflictResolutionDialog_q - - - Conflict Resolution - Разрешение конфликта - - - - There is a conflict between an object in your tree and object in the file you are trying to open. Choose which version of this object you want to use: - Версии объекта в дереве и в открываемом файле конфликтуют. Выберите, какую версию объекта следует использовать: - - - - Current Object - Текущий объект - - - - Keep current object - Сохранить текущий объект - - - - - Always choose this -object if there is a conflict - Всегда выбирать этот -объект в случае конфликта - - - - New Object - Создать объект - - - - Replace with this object - Заменить следующим объектом - - - - ObjectEditor - - This object has been modified but not saved. -Do you want to save it before switching to another object? - Изменения в этом объекте не были сохранены. -Сохранить их? - - - &Save - Сохранить - - - &Discard - Отменить изменения - - - &Continue editing - Продолжить редактирование - - - Modifications done to this object can not be saved. -Do you want to continue editing it ? - Изменения этого объекта не могут быть сохранены. -Продолжить его редактирование? - - - &Edit - Редактировать - - - Object %1 has been modified but not saved. -Do you want to save it ? - Объект %1 был изменен, но не сохранен. -Сохранить его? - - - &Discard changes - Отменить изменения - - - - ObjectEditor_q - - Firewall Builder - Firewall Builder - - - &Close - Закрыть - - - Alt+C - Alt+C - - - - ObjectManipulator - - - Object Manipulator - Объектный манипулятор - - - - New &Library - Новая библиотека - - - New &Host - Новый узел - - - New &Interface - Новый интерфейс - - - New &Network - Новая подсеть - - - New Address &Range - Новый диапазон адресов - - - New &Object Group - Новая группа объектов - - - New &Custom Service - Новый пользовательский сервис - - - New &IP Service - Новый IP сервис - - - New IC&MP Service - Новый ICMP сервис - - - New &TCP Service - Новый TCP сервис - - - New &UDP Service - Новый UDP сервис - - - New &Service Group - Новая группа сервисов - - - New Ti&me Interval - Новый интервал времени - - - The name of the object '%1' has changed. The program can also -rename IP address objects that belong to this object, -using standard naming scheme 'host_name:interface_name:ip'. -This makes it easier to distinguish what host or a firewall -given IP address object belongs to when it is used in -the policy or NAT rule. The program also renames MAC address -objects using scheme 'host_name:interface_name:mac'. -Do you want to rename child IP and MAC address objects now? -(If you click 'No', names of all address objects that belong to -%1 will stay the same.) - Название объекта %1 изменилось. Программа может -переименовать названия IP интерфейсов, относящихся к -этому объекту, используя стандартную схему именования -интерфейсов имя_узла:интерфейс:IP, а названия MAC -интерфейсов, используя схему имя_узла:имя_интерфейса:MAC. - -Переименовать по приведенным схемам? -(в случае отказа будут сохранены старые названия) - - - The name of the interface '%1' has changed. The program can also -rename IP address objects that belong to this interface, -using standard naming scheme 'host_name:interface_name:ip'. -This makes it easier to distinguish what host or a firewall -given IP address object belongs to when it is used in -the policy or NAT rule. The program also renames MAC address -objects using scheme 'host_name:interface_name:mac'. -Do you want to rename child IP and MAC address objects now? -(If you click 'No', names of all address objects that belong to -%1 will stay the same.) - Название интерфейса %1 изменилось. Программа может -переименовать названия IP интерфейсов, относящихся к -этому объекту, используя стандартную схему именования -интерфейсов имя_узла:интерфейс:IP, а названия MAC -интерфейсов, используя схему имя_узла:имя_интерфейса:MAC. - -Переименовать по приведенным схемам? -(в случае отказа будут сохранены старые названия) - - - - Edit - Редактировать - - - - Open - - - - - place in library %1 - поместить в библиотеку %1 - - - - to library %1 - в библиотеку %1 - - - place here - поместить тут - - - - Duplicate ... - Дублировать... - - - - Move ... - Переместить... - - - - Copy - Копировать - - - - Cut - Вырезать - - - - Paste - Вставить - - - - Delete - Удалить - - - Add Interface - Добавить интерфейс - - - Add IP Address - Добавить IP адрес - - - Add MAC Address - Добавить MAC адрес - - - New Firewall - Новый межсетевой экран - - - New Address - Новый адрес - - - New Address Range - Новый диапазон адресов - - - New Host - Новый сервер - - - New Network - Новая подсеть - - - New Group - Новая группа - - - New Custom Service - Новый пользовательский сервис - - - New IP Service - Новый IP сервис - - - New ICMP Service - Новый ICMP сервис - - - New TCP Service - Новый TCP сервис - - - New UDP Service - Новый ICMP сервис - - - New Time Interval - Новый интервал времени - - - - Find - Найти - - - - New cluster from selected firewalls - - - - - Compile - Компилировать - - - - Install - Установить - - - - Group - Группа - - - - dump - дамп - - - Undelete... - Отменить удаление... - - - Emptying of the 'Deleted Objects' in a library file is not recommended. -When you remove deleted objects from a library file, Firewall Builder -loses ability to track them. If a group or a policy rule in some -data file still uses removed object from this library, you may encounter -unusual and unexpected behavior of the program. -Do you want to delete selected objects anyway ? - Полное удаление удаленных объектов не рекомендуется -и может привести к непредсказуемым результатам. -Вы точно уверены, что хотите совсем удалить их из библиотеки? - - - When you delete an object, it is removed from the tree and -all groups and firewall policy rules that reference it. -Do you want to delete selected objects ? - При удалении объекта, он удаляется из дерева, -из всех групп и наборов правил, которые ссылались на него. -Удалить выбранные объекты? - - - When you delete a library, all objects that belong to it -disappear from the tree and all groups and rules that reference them. -You won't be able to reverse this operation later. -Do you still want to delete library %1? - При удалении библиотеки, все объекты, которые относятся к ней -удаляются из дерева вместе со всеми своими группами и правилами. -Эта операция не может быть отменена. -Вы уверены, что хотите удалить библиотеку %1? - - - New Interface - Новый интерфейс - - - New Object Group - Новая группа объектов - - - New Service Group - Новая группа сервисов - - - - Copy object '%1' to clipboard' - - - - - Cut object - - - - - When you delete a library, all objects that belong to it -disappear from the tree and all groups and rules that reference them. -Do you still want to delete library %1? - - - - - &Yes - Да - - - - &No - Нет - - - New &DNS Name - Новое DNS имя - - - New A&ddress Table - Новая таблица адресов - - - New DNS Name - Новое DNS имя - - - New Address Table - Новая таблица адресов - - - New TagService - Новый сервис пометок - - - - Where used - Найти где этот объект используется - - - - Inspect - Инспектировать - - - - Lock - Заблокировать - - - - Unlock - Разблокировать - - - Emptying the 'Deleted Objects' in a library file is not recommended. -When you remove deleted objects from a library file, Firewall Builder -loses ability to track them. If a group or a policy rule in some -data file still uses removed object from this library, you may encounter -unusual and unexpected behavior of the program. -Do you want to delete selected objects anyway ? - Очистка 'Deleted Obkects' в файле библиотеки не рекомендуется. -При удалении объектов из файла библиотеки Firewall Builder теряет -возможность отслеживать их. Если группа или набор правил в -каком-нибудь файле данных использует удаленный из библиотеки -объект, то поведение программы может быть некорректным. -Вы все равно хотите удалить выбранные объекты? - - - Searching for firewalls affected by the change... - Поиск межсетевых экранов, на которые повлияет изменение ... - - - New Network IPv6 - Новая сеть IPv6 - - - New Address IPv6 - Новый адрес IPv6 - - - New ICMP6 Service - Новый сервис ICMPv6 - - - New TCP Serivce - Новый TCP сервис - - - New User Service - Новый сервис "имя пользователя" - - - The name of the object '%1' has changed. The program can also -rename IP address objects that belong to this object, -using standard naming scheme 'host_name:interface_name:ip'. -This makes it easier to distinguish what host or a firewall -given IP address object belongs to when it is used in -the policy or NAT rule. The program also renames MAC address -objects using scheme 'host_name:interface_name:mac'. -Do you want to rename child IP and MAC address objects now? -(If you click 'No', names of all address objects that belong to -%2 will stay the same.) - Название объекта %1 изменилось. Программа может -переименовать названия IP интерфейсов, относящихся к -этому объекту, используя стандартную схему именования -интерфейсов имя_узла:интерфейс:IP, а названия MAC -интерфейсов, используя схему имя_узла:имя_интерфейса:MAC. - -Переименовать по приведенным схемам? -(в случае отказа будут сохранены старые названия) {1'?} {2 ?} - - - Add Policy Rule Set - Добавить набор правил политики - - - Add NAT Rule Set - Добавить набор правил трансляции - - - Add IPv6 Address - Добавить адрес IPv6 - - - New Cluster - Новый кластер - - - Add Failover Group - Добавить группу отказоустойчивого кластера - - - Add Cluster interface - Добавить интерфейс кластера - - - Add State Synchronization Group - Добавить группу синхронизации состояния - - - - - Transfer - Перенос конфигурации - - - - Create and add to group - - - - - Cluster host OS %1 does not support state synchronization - Операционная система %1 кластера не поддерживает синхронизацию состояния - - - - State Sync Group - Группа синхронизации состояния - - - - Failover group - Группа отказоустойчивости - - - Network - Сеть - - - Network IPv6 - Сеть IPv6 - - - Address - Адрес - - - Address IPv6 - Адрес IPv6 - - - DNS Name - DNS имя - - - Address Table - Таблица адресов - - - TagService - Сервис ярлыков - - - User Service - Сервис имени пользователя - - - Address Range - Диапазон адресов - - - Object Group - Группа объектов - - - Custom Service - Пользовательский сервис - - - IP Service - IP сервис - - - ICMP Service - ICMP сервис - - - ICMP6 Service - ICMPv6 сервис - - - TCP Service - TCP сервис - - - UDP Service - UDP сервис - - - Service Group - Группа сервисов - - - Time Interval - Интервал времени - - - - ObjectManipulator_q - - - Tree of Objects - Дерево объектов - - - - Back - Назад - - - - Go back to the previous object - Назад, к предидущему объекту - - - - New Object - Создать объект - - - - Create New Object - Создать новый объект - - - - Filter: - - - - - Object name pattern - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:11pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">Clear filter</p></body></html> - - - - - ObjectTreeView - - - Object - Объект - - - - Attributes - Атрибуты - - - - PhysAddressDialog_q - - - physAddress - физический адрес - - - - Name: - Название: - - - Library: - Библиотека: - - - - Comment: - Комментарий: - - - - Physical address (MAC): - Физический адрес (MAC): - - - Apply Changes - Применить - - - MAC Address - MAC адрес - - - - PolicyView - - Source - Источник - - - Destination - Назначение - - - Service - Сервис - - - Action - Действие - - - Time - Интервал времени - - - Options - Опции - - - Comment - Комментарий - - - Interface - Интерфейс - - - Direction - Направление - - - - PrefsDialog - - - Find working directory - Определить рабочий каталог - - - Find Secure File Transfer utility - Определить утилиту scp - - - - Find Secure Shell utility - Определить утилиту ssh - - - Find add-on library - Определить библиотеку дополнений - - - Pick the color - Выберите цвет - - - - Your version of Firewall Builder is up to date. - Вы используете послднюю версию программы. - - - - A new version of Firewall Builder is available at http://www.fwbuilder.org - Новая версия программы может быть загружена с http://www.fwbuilder.org - - - - Error checking for software updates: -%1 - Произошла ошибка во время проверки версии программы: %1 - - - - Find SCP utility - Найти утилиту scp - - - - PrintingProgressDialog - - - Printing (page %1/%2) - Идет печать (страница %1 из %2) - - - - Printing page %1 - Идет печать %1 страницы - - - - Aborting print operation - Прерывание печати - - - - Cannot abort printing - Не могу прекратить печать - - - - ProjectPanel - - - No firewalls defined - Нет ни одного межсетевого экрана - - - - Cancel - - - - - Compile and Inspect files - - - - - - and - - - - - Firewall objects %1 have been modified and need to be recompiled. - - - - - Firewall object "%1" has been modified and needs to be recompiled. - - - - - %1 firewall objects have been modified and need to be recompiled. - - - - - Can not read generated files for the firewall objects %1. You need to compile them to create the files. - - - - - Can not read generated files for the firewall objects %1. You need to compile it to create the files. - - - - - Can not read generated files for the %1 firewall objects. You need to compile then to create the files. - - - - - <b>Multiple firewalls</b> - - - - Building branch policy view '%1'... - Строится представление ветки набора правил '%1' ... - - - Building policy view... - Строится представление набора правил ... - - - Building NAT view... - Строится представление таблицы трансляции адресов ... - - - Building routing view... - Строится представление маршрутизации ... - - - - - &Save - Сохранить - - - - &Discard - Отбросить изменения - - - - - - &Cancel - Отмена - - - - FWB Files (*.fwb);;All Files (*) - - - - - The file %1 already exists. -Do you want to overwrite it ? - Файл %1 уже существует.\nПереписать ? - - - - &Yes - Да - - - - &No - Нет - - - - - Choose name and location for the new file - Выберите имя и папку для нового файла - - - Saving data to file... - Данные записываются в файл... - - - - Choose name and location for the file - Выберите имя и папку для размещения файла - - - This operation discards all changes that have been saved -into the file so far, closes it and replaces it with a clean -copy of its head revision from RCS. - -All changes will be lost if you do this. - - - Эта операция отбрасывает все изменения сохраненные в файл\nданных до сих пор, закрывает его и заменяет его\nчистой копией самой последней ревизии из RCS.\n\nВсе изменения сделанные до сих пор будут потеряны. - - - - &Discard changes - Отбросить изменения - - - - File %1 has been added to RCS. - Файл %1 добавлен в систему контроля ревизий (RCS). - - - - - - - - - - - - - - - - - - &Continue - Продолжать - - - - Error adding file to RCS: -%1 - Произошла ошибка во время добавления файла в RCS: %1 - - - - (read-only) - (только для чтения) - - - - - Loading system objects... - Загрузка системных объектов... - - - - Error loading file: -%1 - Произошла ошибка во время загрузки файла: %1 - - - - Reading and parsing data file... - Чтение и обработка файла данных... - - - - Merging with system objects... - Смешивание с системными объектами... - - - Firewall Builder 2 uses file extension '.fwb' and -needs to rename old data file '%1' to '%2', -but file '%3' already exists. -Choose a different name for the new file. - Firewall Builder версии 2 использует расширение файлов .fwb. -Для выполнения текущей операции необходимо переименовать -старый файл %1 в новый %2, однако файл %3 уже существует. -Выберите другое имя для создаваемого файла. - - - Load operation cancelled and data file reverted to original version. - Операция открытия файла была отменена, поэтому файл не был изменен. - - - - Exception: %1 - Ошибка: %1 - - - - Failed transformation : %1 - Трансформации которые не сработали: %1 - - - - XML element : %1 - Элемент XML: %1 - - - - Building object tree... - Построение дерева объектов... - - - - Indexing... - Индексация... - - - - Checking file %1 in RCS - Добавление файла %1 в систему контроля версий - - - - Error checking in file %1: -%2 - Поиск ошибок в файле %1: -%2 - - - - Saving data to file %1 - - - - - File is read-only - Файл только для чтения - - - - Error saving file %1: %2 - Ошибка сохранения файла %1: %2 - - - - - Error loading file %1: -%2 - Ошибка загрузки файла %1: %2 - - - - Choose a file to import - Выберите файл для импорта - - - - This operation inspects two data files (either .fwb or .fwl) and finds conflicting objects. Conflicting objects have the same internal ID but different attributes. Two data files can not be merged, or one imported into another, if they contain such objects. This operation also helps identify changes made to objects in two copies of the same data file.<br><br>This operation does not find objects present in one file but not in the other, such objects present no problem for merge or import operations.<br><br>This operation works with two external files, neither of which needs to be opened in the program. Currently opened data file is not affected by this operation and objects in the tree do not change.<br><br>Do you want to proceed ? - - - - - Choose the first file - - - - - Choose the second file - - - - - Total number of conflicting objects: %1. -Do you want to generate report? - - - - - Choose name and location for the report file - - - - - TXT Files (*.txt);;All Files (*) - - - - - Can not open report file for writing. File '%1' - - - - - Unexpected error comparing files %1 and %2: -%3 - - - - - A library that you are trying to export contains references -to objects in the other libraries and can not be exported. -The following objects need to be moved outside of it or -objects that they refer to moved in it: - - - - - Please select a library you want to export. - - - - - Untitled - - - - - - (Long error message was truncated) - - - - - The program encountered error trying to load file %1. -The file has not been loaded. Error: -%2 - - - - - - The program encountered error trying to load data file. -The file has not been loaded. Error: -%1 - - - - - Load operation cancelled and data file revertedto original version. - - - - - Searching for firewalls affected by the change... - Поиск межсетевых экранов, на которые повлияет изменение ... - - - - Firewall Builder uses file extension '.fwb' and -needs to rename old data file '%1' to '%2', -but file '%3' already exists. -Choose a different name for the new file. - - - - - Firewall Builder uses file extension '.fwb'. Your datafile '%1' -has been renamed '%2' - - - - - This operation discards all changes that have been saved into the file so far, closes it and replaces it with a clean copy of its head revision from RCS. -All changes will be lost if you do this. - - - - - - ProjectPanel_q - - - Form - Форма - - - Click here to change amount of information shown about object selected in the tree - Нажмите, чтобы изменить режим показа информации про выбранный в дереве объект - - - Firewall Name - Название межсетевого экрана - - - Firewalls: - Межсетевые экраны: - - - Tab 1 - Tab 1 - - - Apply - Применить - - - Close - Закрыть - - - - Firewall / ruleset - Межсетевой экран / набор правил - - - - - - Compile this firewall - Компилировать этот межсетевой экран - - - - - - Insert rule - - - - - - - - ... - ... - - - - - - Compile and install this firewall - Компилировать и инсталлировать этот межсетевой экран - - - - - - Inspect generated files - - - - - QApplication - - Executable '%1' requires Qt %2, found Qt %3. - Исполняемый %1 файл требует Qt %2, однако доступна только %3. - - - Incompatible Qt Library Error - Ошибка несовместимости библиотек Qt - - - - QColorDialog - - Hu&e: - Тон: - - - &Sat: - Насыщенность: - - - &Val: - Значение: - - - &Red: - Красный: - - - &Green: - Зеленый: - - - Bl&ue: - Синий: - - - A&lpha channel: - Альфа канал: - - - &Basic colors - Простые цвета - - - &Custom colors - Пользовательские цвета - - - &Define Custom Colors >> - Определить пользовательские цвета >> - - - OK - OK - - - Cancel - Отмена - - - &Add to Custom Colors - Добавить в пользовательские цвета - - - Select color - Выберите цвет - - - - QDialog - - Help - Справка - - - What's This? - Что это? - - - - QErrorMessage - - Debug Message: - Отладочное сообщение: - - - Warning: - Предупреждение: - - - Fatal Error: - Фатальная ошибка: - - - &Show this message again - Показать это сообщение еще раз - - - &OK - OK - - - - QFileDialog - - Copy or Move a File - Копировать или переместить файл - - - Read: %1 - Чтение: %1 - - - Write: %1 - Запись: %1 - - - Cancel - Отмена - - - All Files (*) - Все файлы (*) - - - Name - Имя - - - Size - Размер - - - Type - Тип - - - Date - Дата - - - Attributes - Атрибуты - - - &OK - OK - - - Look &in: - Смотреть в: - - - File &name: - Имя файла: - - - File &type: - Тип файла: - - - Back - Назад - - - One directory up - Выше на один каталог - - - Create New Folder - Создать новый каталог - - - List View - В виде списка - - - Detail View - В виде подробного списка - - - Preview File Info - Показывать информацию о файле - - - Preview File Contents - Показывать содержимое файла - - - Read-write - Чтение-запись - - - Read-only - Только для чтения - - - Write-only - Только для записи - - - Inaccessible - Недоступный - - - Symlink to File - Символическая ссылка на файл - - - Symlink to Directory - Символическая ссылка на каталог - - - Symlink to Special - Символическая ссылка на специальный файл - - - File - Файл - - - Dir - Каталог - - - Special - Специальный - - - Open - Открыть - - - Save As - Сохранить как - - - &Open - Открыть - - - &Save - Сохранить - - - &Rename - Переименовать - - - &Delete - Удалить - - - R&eload - Обновить - - - Sort by &Name - Сортировка по имени - - - Sort by &Size - Сортировка по размеру - - - Sort by &Date - Сортировка по дате - - - &Unsorted - Без сортировки - - - Sort - Сортировать - - - Show &hidden files - Показывать скрытые файлы - - - the file - файл - - - the directory - каталог - - - the symlink - символическая ссылка - - - Delete %1 - Удалить %1 - - - <qt>Are you sure you wish to delete %1 "%2"?</qt> - <at>Вы уверены, что хотите удалить %1 "%2"?</qt> - - - &Yes - Да - - - &No - Нет - - - New Folder 1 - Новый каталог 1 - - - New Folder - Новый каталог - - - New Folder %1 - Новый каталог %1 - - - Find Directory - Найти каталог - - - Directories - Каталоги - - - Directory: - Каталог: - - - Error - Ошибка - - - %1 -File not found. -Check path and filename. - %1 -Файл не найден. -Проверьте правильность пути и имени файла. - - - - QFontDialog - - &Font - Шрифт - - - Font st&yle - Стиль шрифта - - - &Size - Размер - - - Effects - Эффекты - - - Stri&keout - Перечеркивание - - - &Underline - Подчеркивание - - - Sample - Пример - - - Scr&ipt - Скрипт - - - OK - OK - - - Apply - Применить - - - Cancel - Отмена - - - Close - Закрыть - - - Select Font - Выберите шрифт - - - - QInputDialog - - OK - OK - - - Cancel - Отмена - - - - QMessageBox - - OK - OK - - - Cancel - Отмена - - - &Yes - Да - - - &No - Нет - - - &Abort - Прервать - - - &Retry - Повторить - - - &Ignore - Игнорировать - - - Yes to &All - Всегда Да - - - N&o to All - Всегда Нет - - - <h3>About Qt</h3><p>This program uses Qt version %1.</p><p>Qt is a C++ toolkit for multiplatform GUI &amp; application development.</p><p>Qt provides single-source portability across MS&nbsp;Windows, Mac&nbsp;OS&nbsp;X, Linux, and all major commercial Unix variants.<br>Qt is also available for embedded devices.</p><p>Qt is a Trolltech product. See <tt>http://www.trolltech.com/qt/</tt> for more information.</p> - <h3>About Qt</h3><p>This program uses Qt version %1.</p><p>Qt is a C++ toolkit for multiplatform GUI &amp; application development.</p><p>Qt provides single-source portability across MS&nbsp;Windows, Mac&nbsp;OS&nbsp;X, Linux, and all major commercial Unix variants.<br>Qt is also available for embedded devices.</p><p>Qt is a Trolltech product. See <tt>http://www.trolltech.com/qt/</tt> for more information.</p> - - - About Qt - О Qt - - - - QObject - - - - - - - - - - No change - Без изменений - - - - - - - - - - - - On - Включить - - - - - - - - - - - - Off - Выключить - - - Working directory %1 does not seem to exist. -Do you want to create it ? - Рабочий катлог %1 не существует. -Создать его? - - - - Impossible to insert object %1 (type %2) into %3 -because of incompatible type. - Невозможно вставить объект %1 (%2) в объект %3 -из-за несовместимости типов объектов. - - - - - New Library - Новая библиотека - - - - objects - объекты - - - - - protocol: %1 - протокол: %1 - - - - - type: %1 - тип: %1 - - - - - code: %1 - код: %1 - - - - - Type: - Тип: - - - - Members: - - - - - %1 objects - - - - - Label: %1 - - - - - Addresses: - - - - - Address: - - - - - %1 objects<br> - - %1 объекты<br> - - - - - protocol - протокол - - - - Stateless - - - - - Stateful - - - - - - Log prefix: - - - - - Log Level: - - - - - Netlink group: - - - - - connlimit value: - - - - - Part of Any - - - - - Log facility: - - - - - - Log level: - - - - - Send 'unreachable' - - - - - Keep information on fragmented packets - - - - - Max state: - - - - - Force 'keep-state' - - - - - Source tracking - - - - - Max src nodes: - - - - - Max src states: - - - - - Add mirrored rule - - - - - Version: - - - - - Log interval: - - - - - Disable logging for this rule - - - - - - type: - тип: - - - - code: - код: - - - Unsupported exception - Неподдерживаемое исключение - - - <b>Summary:</b> - <b>ИТОГО:</b> - - - * firewall name : %1 - * название межсетевого экрана: %1 - - - * user name : %1 - * имя пользователя: %1 - - - * management address : %1 - * управляющий адрес: %1 - - - * platform : %1 - * тип межсетевого экрана: %1 - - - * host OS : %1 - * операционная система межсетевого экрана: %1 - - - - * Loading configuration from file %1 - * Загружаю конфигурацию из файла %1 - - - * Incremental install - * Последовательная установка - - - - * Configuration diff will be saved in file %1 - * Различия в конфигурации будут сохранены в файле %1 - - - - * Commands will not be executed on the firewall - * Команды не будут выполняться на межсетевом экране - - - Only one interface of the firewall '%1' must be marked as management interface. - Только один интерфейс межсетевого экрана %1 может быть помечен как управляющий. - - - One of the interfaces of the firewall '%1' must be marked as management interface. - Один интерфейс межсетевого экрана %1 должен быть помечен как управляющий. - - - Management interface does not have IP address, can not communicate with the firewall. - Управляющий интерфейс не имеет IP адреса, не могу связаться с межсетевым экраном. - - - Can not open file %1 - Не могу открыть файл %1 - - - Library %1: Firewall '%2' (global policy rule #%3) uses object '%4' from library '%5' - Библиотека %1: Межсетевой экран %2 (правило в наборе #%3) использует объект %4 из библиотеки %5 - - - Library %1: Firewall '%2' (interface %3 policy rule #%4) uses object '%5' from library '%6' - Библиотека %1: Межсетевой экран %2 (правило интерфейса %3 в наборе #%4) использует объект %5 из библиотеки %6 - - - Library %1: Firewall '%2' (NAT rule #%3) uses object '%4' from library '%5' - Библиотека %1: Межсетевой экран %2 (правило NAT в наборе #%3) использует объект %4 из библиотеки %5 - - - - Library %1: Firewall '%2' (%3 rule #%4) uses object '%5' from library '%6' - - - - - Library %1: Group '%2' uses object '%3' from library '%4' - Библиотека %1: Группа %2 использует объект %3 из библиотеки %4 - - - - File is read-only - Файл доступен только для чтения - - - - Error saving file %1: %2 - Ошибка сохранения файла %1: %2 - - - dynamic - динамический - - - ( read only ) - (только для чтения) - - - - - - 0 - System Unusable - 0 - System Unusable - - - - - - 1 - Take Immediate Action - 1 - Take Immediate Action - - - - - - 2 - Critical Condition - 2 - Critical Condition - - - - - - 3 - Error Message - 3 - Error Message - - - - - - 4 - Warning Message - 4 - Warning Message - - - - - - 5 - Normal but significant condition - 5 - Normal but significant condition - - - - - - 6 - Informational - 6 - Informational - - - - - - 7 - Debug Message - 7 - Debug Message - - - - - any - - любая - - - 1.2.9 or later - 1.2.9 или старше - - - - - - RCS tools are unavailable - - - - - Fatal error during initial RCS checkin of file %1 : - %2 -Exit status %3 - Фатальная ошибка при помещении файла %1 в систему контроля версий: -%2 -Код возврата %3 - - - - Fatal error running rlog for %1 - Фатальная ошибка при выполнении rlog для %1 - - - - Fatal error running rcsdiff for file %1 - Фатальная ошибка при выполнении rcsdiff для файла %1 - - - &Upgrade - Обновить - - - &Do not load the file - Не загружать файл - - - Impossible to apply changes because object is located in read-only -part of the tee or data file was opened read-only - Невозможно сохранить изменения, поскольку объект размещен -в части или файле, доступных только для чтения - - - - - &Continue - Продолжить - - - - Object with name '%1' already exists, please choose different name. - Объект с именем %1 уже существует. Выберите другое имя. - - - &Continue editing - Продолжить редактирование - - - - <b>Library:</b> - <b>Библиотека:</b> - - - - <b>Object Id:</b> - <b>Идентификатор объекта:</b> - - - - <b>Object Type:</b> - <b>Тип объекта:</b> - - - - <b>Object Name:</b> - <b>Имя Объекта:</b> - - - - Working directory %1 does not exist and could not be created. -Ignoring this setting. - Рабочий каталог %1 не существует и не может быть создан. -Этот параметр будет проигнорирован. - - - - ERROR - ОШИБКА - - - - OK - OK - - - Address Ranges - Диапазон адресов - - - Address RangesS - Диапазон адресов - - - Address RangesX - Диапазон адресов - - - The library file you are trying to open -has been saved in an older version of -Firewall Builder and needs to be upgraded. -To upgarde it, just load it in the Firewall -Builder GUI and save back to file again. - Открываемый файл библиотеки был сохранен -в формате старой версии Firewall Builder и -требует обновления. Для выполнения этой -операции загрузите его в программу и сохраните. - - - Error loading file %1: -%2 - Ошибка при открытии файла %1: -%2 - - - Duplicate library '%1' - Дублированная библиотека %1 - - - - 1.2.5 or earlier - 1.2.5 или младше - - - - 1.2.6 to 1.2.8 - с 1.2.6 по 1.2.8 - - - The data file you are trying to open has been -saved with an older version of Firewall Builder. -Opening it in this version will cause it to be -upgraded, which may prevent older versions of -the program from reading it. Backup copy of your -file in the old format will be made in the same -directory with extension '.bak'. -Are you sure you want to open it? - Открываемый файл был сохранен в формате -старой версии Firewall Builder и будет обновлен. -Обновленный файл проекта нельзя будет -использовать в старых версиях Firewall Builder. -Резервная копия файла в формате старой -версии будет сохранена в том же каталоге в -файле с расширением .bak. -Открыть файл? - - - Red - Красный - - - Orange - Оранжевый - - - Yellow - Желтый - - - Green - Зеленый - - - Blue - Синий - - - Purple - Пурпурный - - - Gray - Серый - - - - - Firewall - Межсетевой экран - - - - - Host - Узел - - - - - - Address - Адрес - - - - Addres Range - Диапазон адресов - - - - - - - Interface - Интерфейс - - - - - Network - Подсеть - - - - Group of objects - Группа объектов - - - - Library - - - - - Cluster - - - - - Network IPv6 - Сеть IPv6 - - - - Address IPv6 - Адрес IPv6 - - - - DNS Name - DNS имя - - - - Address Table - Таблица адресов - - - - Address Range - Диапазон адресов - - - - Object Group - Группа объектов - - - - - Custom Service - Пользовательский сервис - - - - - IP Service - IP сервис - - - - - - ICMP Service - ICMP сервис - - - - ICMP6 Service - ICMPv6 сервис - - - - - TCP Service - TCP сервис - - - - - UDP Service - UDP сервис - - - - TagService - Сервис ярлыков - - - - User Service - Сервис имени пользователя - - - - Service Group - Группа сервисов - - - - MAC Address - MAC адрес - - - - Policy Rule Set - - - - - NAT Rule Set - - - - - Routing Rule Set - - - - - Failover group - Группа отказоустойчивости - - - - State synchronization group - - - - - New Firewall - Новый межсетевой экран - - - - New Cluster - Новый кластер - - - - New Host - - - - - New Interface - Новый интерфейс - - - - New Network - Новая подсеть - - - - New Network IPv6 - Новая сеть IPv6 - - - - New Address - Новый адрес - - - - New Address IPv6 - Новый адрес IPv6 - - - - New DNS Name - Новое DNS имя - - - - New Address Table - Новая таблица адресов - - - - New Address Range - Новый диапазон адресов - - - - New Object Group - Новая группа объектов - - - - New Custom Service - Новый пользовательский сервис - - - - New IP Service - - - - - New ICMP Service - - - - - New ICMP6 Service - Новый сервис ICMPv6 - - - - New TCP Service - - - - - New UDP Service - - - - - New TagService - Новый сервис пометок - - - - New User Service - Новый сервис "имя пользователя" - - - - New Service Group - Новая группа сервисов - - - - New MAC Address - - - - - New Policy Rule Set - - - - - New NAT Rule Set - - - - - New Routing Rule Set - - - - - New failover group - - - - - New state synchronization group - - - - - Group of services - Группа сервисов - - - - - - Time Interval - Интервал времени - - - - Page %1 - Страница %1 - - - - Firewall name: %1 - Название межсетевого экрана: %1 - - - - Platform: - Тип межсетевого экрана: - - - - Version: - Версия межсетевого экрана: - - - - Host OS: - Операционная система межсетевого экрана: - - - - Policy: - Политика: - - - Interface %1 - Интерфейс %1 - - - NAT - Сетевая трансляция адресов (NAT) - - - - - - - Support module for %1 is not available - Модуль поддержки %1 не доступен - - - - DNS record: - DNS запись: - - - - Address Table: - Таблица адресов: - - - - <b>DNS record:</b> - <b>DNS запись:</b> - - - - - Run-time - Во время выполнения - - - - - Compile-time - Во время компиляции - - - - <b>Table file:</b> - <b>Файл с таблицей:</b> - - - <b>Path:</b> - <b>Путь:</b> - - - - - Pattern: "%1" - Образец: "%1" - - - <b>Action :</b> - <b>Действие :</b> - - - - <b>Parameter:</b> - <b>Параметр:</b> - - - <b>Log prefix :</b> - <b>Log prefix :</b> - - - <b>Log Level :</b> - <b>Log level :</b> - - - <b>Netlink group :</b> - <b>Группа netlink :</b> - - - <b>Limit Value :</b> - <b>Значение предела :</b> - - - <b>Limit suffix :</b> - <b>Суффикс предела :</b> - - - <b>Limit burst :</b> - <b>Изменение предела </b> - - - <li><b>Part of Any</b></li> - <li><b>Часть любого</b></li> - - - <li><b>Stateless</b></li> - <li><b>Без фильтрации по состоянию</b></li> - - - <b>Log facility:</b> - <b>Log facility:</b> - - - <b>Log level :</b> - <b>Log level :</b> - - - <li><b>Send 'unreachable'</b></li> - <li><b>Отправить 'недоступен'</b></li> - - - <li><b>Keep information on fragmented packets</b></li> - <li><b>Хранить информацию по фрагментированным пакетам</b></li> - - - <b>Log prefix :</b> - <b>Log prefix :</b> - - - <b>Max state :</b> - <b>Максимум состояния :</b> - - - <li><b>Source tracking</b></li> - <li><b>Отслеживание источника</b></li> - - - <b>Max src nodes :</b> - <b>Максимум узлов источника :</b> - - - <b>Max src states:</b> - <b>Максимум состояний источника:</b> - - - <u><b>Ver:%1</b></u><br> - - <u><b>Версия:%1</b></u><br> - - - - <b>Log interval :</b> - <b>Интервал журналирования :</b> - - - <li><b>Disable logging for this rule</b></li> - <li><b>Выключить протоколирование для этого правила</b></li> - - - - use SNAT instead of MASQ<br> - - - - - - random<br> - - - - - persistent<br> - - - - - bitmask<br> - - - - - source-hash<br> - - - - - round-robin<br> - - - - - static-port<br> - - - - bitmask - битовая маска - - - random - случайное - - - source-hash - хэш источника - - - round-robin - round-robin - - - static-port - статический порт - - - Failure - Ошибка - - - Success - Успешно - - - Compiling rule sets for firewall: %1 - Компиляция наборов правил межсетевого экрана: %1 - - - Installing policy rules on firewall '%1'. - Установка наборов правил межсетевого экрана: '%1'. - - - Type '%1': new object can not be created because -corresponding branch is missing in the object tree. -Please repair the tree using command 'fwbedit -s -f file.fwb'. - Тип '%1': новый объект не может быть создан, потому что -соответствующая ветка отсутствует в дереве объектов. -Восстановите дерево объектов командой 'fwbedit -s -f file.fwb'. - - - - Aggressive - Агрессивный - - - - Conservative - Консервативный - - - - For high latency - Для высокой латентности - - - - Normal - Нормальный - - - - alert - alert - - - - crit - crit - - - - error - error - - - - warning - warning - - - - notice - notice - - - - info - info - - - - debug - debug - - - - kern - kern - - - - user - user - - - - mail - mail - - - - daemon - daemon - - - - auth - auth - - - - syslog - syslog - - - - lpr - lpr - - - - news - news - - - - uucp - uucp - - - - cron - cron - - - - authpriv - authpriv - - - - ftp - ftp - - - - local0 - local0 - - - - local1 - local1 - - - - local2 - local2 - - - - local3 - local3 - - - - local4 - local4 - - - - local5 - local5 - - - - local6 - local6 - - - - local7 - local7 - - - - ICMP admin prohibited - ICMP admin prohibited - - - - ICMP host prohibited - ICMP host prohibited - - - - ICMP host unreachable - ICMP host unreachable - - - - ICMP net prohibited - ICMP net prohibited - - - - ICMP net unreachable - - - - - ICMP port unreachable - ICMP port unreachable - - - - ICMP protocol unreachable - ICMP protocol unreachable - - - - TCP RST - TCP RST - - - - Route through - Маршрутизировать через - - - - Route reply through - Маршрутизировать ответ через - - - - Route a copy through - Маршрутизировать копию через - - - - 1.4.1.1 or later - 1.4.0 и старше {1.4.1.1 ?} - - - - 4.3 - 200% {4.3?} - - - - 4.5 - 200% {4.5?} - - - - 4.6 - 200% {4.6?} - - - - 4.7 and later - - - - - - on top of the script - в начало скрипта - - - - - after interface configuration - после конфигурирования интерфейсов - - - - - after policy reset - после удаления страрого набора правил - - - - /day - в день - - - - /hour - в час - - - - /minute - в минуту - - - - /second - в секунду - - - - 1.2.9 to 1.2.11 - с 1.2.9 по 1.2.11 - - - 1.3.0 or later - 1.3.0 или старше - - - Accept - Разрешить - - - Deny - Блокировать - - - Reject - Блокировать с уведомлением - - - Scrub - Чистить [SCRUB] - - - Return - Вернуть - - - Skip - Пропустить - - - Continue - Продолжить - - - Modify - Изменить - - - Classify - Классифицировать - - - Custom - Определенное пользователем - - - Branch - Ветка - - - Chain - Цепочка - - - Anchor - Прикрепить - - - Accounting - Учитывать - - - Count - Считать - - - Tag - Пометить - - - Mark - Маркировать - - - Pipe - Передать - - - Queue - Поставить в очередь - - - Routing - Маршрутизировать - - - - Firewall Builder can import Cisco IOS access lists from the router configuration saved using 'show run' or any other command that saves running config. The name of the created firewall object, all of its interfaces and their addresses will be configured automatically if this information can be found in the configuration file. - - - - - Firewall Builder can import iptables rules from a file in iptables-save format. Firewall name and addresses of its interfaces need to be configured manually because iptables-save file does not have this information. - - - - Invalid range defined for the source port. - Некорректный диапазон определен для порта источника. - - - Invalid range defined for the destination port. - Некорректный диапазон определен для порта назначения. - - - - - None - Ничего - - - - Random - Случайный - - - - Source Hash - - - - - Round Robin - - - - - in the activation shell script - - - - - in the pf rule file, at the very top - - - - - in the pf rule file, after set comamnds - - - - - in the pf rule file, after scrub comamnds - - - - - in the pf rule file, after table definitions - - - - - 3.x - 1.3.0 и старше {3.?} - - - - 3.7 to 3.9 - с 3.7 по 3.9 - - - 4.x - 1.3.0 и старше {4.?} - - - - - User id: "%1" - - - - - Compiling rule sets for firewall: %1 - - Компиляция наборов правил межсетевого экрана: %1 - - - - - Installing policy rules on firewall '%1' - - - - - * Running as user : %1 - - - - - * Firewall name : %1 - - - - - * Installer uses user name : %1 - - - - - * Management address : %1 - - - - - * Platform : %1 - - - - - * Host OS : %1 - - - - - Only one interface of the firewall '%1' must be marked as management interface. - - - - - - One of the interfaces of the firewall '%1' must be marked as management interface. - - - - - - Management interface does not have IP address, can not communicate with the firewall. - - - - - - 1.3.x - 1.3.0 и старше - - - - 1.4.0 or later - 1.4.0 и старше - - - - Legend - Условные обозначения - - - - Objects - Объекты - - - - Groups - Группы - - - - EMPTY - Пусто - - - - Source - Источник - - - - - Destination - Назначение - - - - Service - Сервис - - - - Time - Время - - - - Original Src - Оригинальный Источник - - - - Original Dst - Оригинальное Назначение - - - - Original Srv - Оригинальный Сервис - - - - Translated Src - Транслированный Источник - - - - Translated Dst - Транслированное Назначение - - - - Translated Srv - Транслированный Сервис - - - - Gateway - Маршрутизатор - - - - Direction - Направление - - - - Action - Действие - - - - Options - Параметры - - - - Metric - Метрика - - - - Comment - Комментарий - - - - type: %1<br> - - - - - Group member %1:%2<br> - - - - - No firewalls assigned to cluster '%1' - - - - - Type '%1': new object can not be created because -corresponding branch is missing in the object tree. -Please repair the tree using command 'fwbedit checktree -f file.fwb'. - - - - - Summary: - - - - - - - - - %1 advanced settings - - - - - Bitmask - - - - - 1.4.3 or later - 1.4.0 и старше {1.4.3 ?} - - - - Executing: - - - - - Using transfer agent '%1' - - - - - Appending fw object name to tarball - - - - - Could not transfer %1 config to '%2' - - - - - Edit - - - - - Rename object - - - - - Edit protocol parameters - - - - - Edit Rule Action - - - - - Edit Rule Options - - - - - Edit Rule Comment - - - - - insert rule - - - - - delete rules - - - - - delete rules from group - - - - - change rule(s) color - - - - - move rule up - - - - - move rule down - - - - - negate rule element - - - - - remove object(s) from group - - - - - create new group - - - - - add to group above - - - - - add to group below - - - - - Negate - - - - - <b>Action :</b> %1<br> - - - - - Replace object - - - - - Create new %1 - - - - - Create library - - - - - Create new Firewall - - - - - Create new Cluster - - - - - Create new Host - - - - - Follow global setting - - - - - Bound to interfaces - - - - - Floating - - - - - 4.0 to 4.2 - с 1.2.9 по 4.2 {4.0 ?} - - - - Impossible to apply changes because object is located in read-only -part of the tree or data file was opened read-only - - - - - - Add object to group - - - - - Add library - - - - - Delete object - - - - - Move object - - - - - - - Paste object - - - - - Lock object - - - - - Unlock object - - - - - Create new group - - - - - Compiler for firewall platform %1 not found - - - - - Original rule combines match of tcp/udp/icmp -protocols with two or more module matches, such as -module 'mark', 'recent' or 'length'. Use additional -branches to implement this complex match. - - - - - Unknown parameter of target REJECT: %1. - - - - - Can not reproduce default action in table 'mangle' chain 'FORWARD'. - - - - - Can not reproduce default action in table 'mangle' chain 'INPUT'. - - - - - - A single interface belonging to this firewall is expected in this field. - - - - - A single ip address is expected here. You may also insert a host or a network adapter leading to a single ip adress. - - - - - A single ip adress is expected here. You may also insert a host or a network adapter leading to a single ip adress. - - - - - QProgressDialog - - Cancel - Отмена - - - - QTabDialog - - OK - OK - - - Apply - Применить - - - Help - Справка - - - Defaults - По-умолчанию - - - Cancel - Отмена - - - - QWizard - - &Cancel - Отмена - - - < &Back - < Назад - - - &Next > - Дальше > - - - &Finish - Готово - - - &Help - Помощь - - - - RCS - - - - - Error checking file out: %1 - Ошибка при получении файла %1 из системы контроля версий - - - - - - - - &Continue - Продолжить - - - - Error creating temporary file - Ошибка при создании временного файла - - - - Error writing to temporary file - Ошибка при записи во временный файл - - - - File is opened and locked by %1. -You can only open it read-only. - Файл уже открыт и заблокирован %1. -Вы можете открыть его только для чтения. - - - - Revision %1 of this file has been checked out and locked by you earlier. -The file may be opened in another copy of Firewall Builder or was left opened -after the program crashed. - Ревизия %1 этого файла была получена и заблокирована вами ранее. -Файл возможно открыт в другой копии программы Firewall Builder или -возможно остался открытым после краха предидущей копии программы. - - - - Open &read-only - Открыть только для чтения - - - - &Open and continue editing - Открыть и продолжить редактирование - - - - &Cancel - Отмена - - - - RCSFilePreview - - - File is not in RCS - Файл не находится в системе контроля версий - - - - RCSFilePreview_q - - - RCSFilePreview - Предварительный просмотр файла из системы контроля версий - - - - Open read-only - Открыть только для чтения - - - - Revision - Ревизия - - - - Date - Дата - - - - Author - Автор - - - - Locked by - Заблокирован - - - - RCS log: - Журнал системы контроля версий: - - - - Open - Открыть - - - - Cancel - Отмена - - - - Tree View - - - - - List View - В виде списка - - - - RCSFileSaveDialog_q - - - Log record for the new revision - Сделать запись в журнал для новой версии - - - - Log record for this revision: - Сделать запись в журнал для этой версии: - - - - Do not ask me anymore, always check files in with empty log - Всегда помещать файл в систему контроля версий с пустой записью в журнал - - - - Check file &in - Поместить файл в систему контроля версий - - - - Alt+I - Alt+I - - - - &Cancel - Отмена - - - - Checking file %1 into RCS - Добавление файла %1 в систему контроля версий - - - - RoutingRuleOptionsDialog_q - - - Routing Rule Options - Опции правила маршрутизации - - - fw/rule num - номер МЭ/правила - - - - If installation of this routing rule fails, just carry on - Продолжить при неуспешной установке этого правила маршрутизации - - - - No options available for routing rules of this firewall platform - Опции правил маршрутизации не доступны для выбранного межсетевого экрана - - - - RoutingView - - Destination - Назначение - - - Gateway - Маршрутизатор - - - Interface - Интерфейс - - - Metric - Метрика - - - Options - Опции - - - Comment - Комментарий - - - - RuleOptionsDialog - - Rule name for accounting is converted to the iptables -chain name and therefore may not contain white space -and special characters. - Название правила для учета конвертируется в -название цепочки iptables, и поэтому оно не может -содержать пробела или других специальных символов. - - - &Continue - Продолжить - - - - RuleOptionsDialog_q - - - Rule Options for ipt - Опции правила для ipt - - - Apply Changes - Применить - - - If rule action is 'Reject', this option defines firewall's reaction to the packet matching the rule - Если действие правила установлено в 'Блокировать с уведомлением', то эта опция определяет ответ межсетевого экрана - - - - - Log prefix: - Log prefix: - - - - alert - alert - - - - crit - crit - - - - error - error - - - - warning - warning - - - - notice - notice - - - - info - info - - - - debug - debug - - - Netlink group -(if using ULOG): - Netlink group -(для ULOG): - - - - - - Log level: - Log level: - - - ICMP admin prohibited - ICMP admin prohibited - - - ICMP host prohibited - ICMP host prohibited - - - ICMP host unreachable - ICMP host unreachable - - - ICMP net prohibited - ICMP net prohibited - - - ICMP net unreachable - ICMP net unreachable - - - ICMP port unreachable - ICMP port unreachable - - - ICMP protocol unreachable - ICMP protocol unreachable - - - TCP RST - TCP RST - - - - - Normally policy compiler uses stateful inspection in each rule. Activating next option makes this rule stateless. - Отключить фильтрацию по состоянию (stateful) для этого правила. - - - Assume firewall is part -of 'any' (this setting only -affects code generated -for this rule) - Считать межсетевой экран -частью любого узла -(только для этого правила) - - - - - Burst: - Верхняя граница нормы: - - - - - /day - в день - - - - - /hour - в час - - - - - /minute - в минуту - - - - - /second - в секунду - - - Rule matches if it hits this often -or less: - Условие правила выполняется, если -оно вызывается меньше чем: - - - - - - Stateless rule - Правило без фильтрации по состоянию - - - - Log facility: - Log facility: - - - Send ICMP 'unreachable' packet -masquerading as being from -the original destination - Отправлять ICMP unreachable пакет -используя маскарадинг, чтобы он -выглядел, как отправленный от -оригинального узла назначения - - - Keep information on fragmented -packets, to be applied to later -fragments - Держать информацию о фрагментированных -пакетах для её использования с -последующими фрагментами - - - - When this limit is reached, further packets matching the rule that would create state are dropped, until existing states time out. - По достижении этого ограничения, пакеты выполняющие условие правила и создающие новую запись в таблице состояний будут блокированы до тех пор, пока существующие записи в таблице состояний не будут удалены по таймауту. - - - Maximum number of concurrent states this rule may create. (Unlimited if set to zero). - Максимальное количество записей в таблице состояний, которое может создать это правило (0 - неограничено). - - - Activate source tracking - Включить отслеживание источника (source tracking) - - - - When this option is checked, the number of states per source IP is tracked - При включении этой опции будет отслеживаться количество состояний на каждый IP источника - - - Maximum number of source addresses which can simultaneously have state table entries: - Максимальное количество адресов источников, которые могут быть одновременно записаны в таблице состояний: - - - Maximum number of simultaneous state entries that a single source address can create with this rule: - Максимальное количество записей в таблице состояний на один адрес источника, которое может создать это правило: - - - - These options are only valid for PIX running software v6.3 or later - Эти опции действительны только для межсетевого экрана Cisco PIX версии 6.3 или выше - - - completely disable logging -for this rule - не протоколировать это правило - - - - Logging interval: - Интервал журналирования: - - - Rule name for accounting. (white spaces and special characters are not allowed) - Название правила для учета (пробел или специальные символы не допустимы) - - - fw/rule num - номер МЭ/правила - - - Assume firewall is part of 'any' (this setting only affects code generated for this rule) - Считать межсетевой экран частью любого узла (только для этого правила) - - - - - General - Общие - - - - Netlink group (if using ULOG): - Netlink group (для ULOG): - - - - - - Logging - Запись в журнал (протоколирование) - - - - Rate (rule matches if it hits this often or less): - Отношение (условие правила выполняется, если оно вызывается меньше или больше чем): - - - - Module limit - Модуль limit - - - - limit - limit - - - - bit - бит - - - - per network with netmask of - на подсеть с маской - - - Number of allowed connections per client host - Количество разрешенных соединений на клиентский узел - - - - Module connlimit - Модуль connlimit - - - - connlimit - connlimit - - - - Module hashlimit - Модуль hashlimit - - - - Rate: - Отношение: - - - - dstip - dstip - - - - srcip - srcip - - - dstip,dstport - dstip,dstport - - - srcip,srcport - srcip,srcport - - - - Mode: - Режим: - - - - On some older systems this module has name 'dstlimit'. Check here if you need to use this name. - На некоторых старых системах этот модуль имеет имя 'dstlimit'. Пометьте ниже, если вам нужно использовать это имя. - - - - hashlimit - hashlimit - - - - Send ICMP 'unreachable' packet masquerading as being from the original destination - Отправлять пакет ICMP unreachable так, словно он был отправлен оригинальным узлом назначения - - - - Keep information on fragmented packets, to be applied to later fragments - Хранить информацию по фрагментированным пакетам для того, чтобы затем применять ее к следующим фрагментам - - - - State Tracking - - - - - Force "keep state" to make the rule stateful regardless of the default. - - - - - - Available in OpenBSD 4.5 and later - - - - - Prevent state changes for states created by this rule from appearing on the pfsync interface. - - - - - States created by this rule are exported on the pflow interface. - - - - - Activate source tracking. - - - - - Maximum number of source addresses which can simultaneously have state table entries (max-src-nodes): - Максимальное количество адресов источника, которые могут одновременно иметь записи в таблице состояний (max-src-nodes): - - - - Maximum number of simultaneous state entries that a single source address can create with this rule (max-src-states): - Максимальное количество записей в таблице состояний на один адрес источника, которое может создать это правило (max-src-states): - - - Tracking - Отслеживание - - - - overload table: - перегрузка таблицы: - - - - flush - очистить - - - - Maximum number of simultaneous TCP connections that a single host can make (max-src-conn): - Максимальное количество одновременных TCP соединений, которые может создать один узел (max-src-conn): - - - - global - глобально - - - - The limit of new connections over a time interval (max-src-conn-rate): - Максимальное число новых соединений в единицу времени (max-src-conn-rate): - - - - / - в - - - - sec - сек - - - - Maximum number of concurrent states this rule may create. Unlimited if set to zero (option 'max'). - Максимальное число различных состояний, которое может создать это правило. 0 - неограниченно (max). - - - - Limits - Ограничения - - - - completely disable logging for this rule - полностью отключить протоколирование для этого правила - - - - Name: - - - - - - Negate - - - - - Match if the number of existing connections is above this (translates into option --connlimit-above) - - - - - htable-size: - - - - - The number of buckets of the hash table (omit this option in generated script if set to 0) - - - - - htable-max: - - - - - Maximum number of entries in the hash (omit this option in generated script if set to 0) - - - - - htable-expire: - - - - - After how many milliseconds do hash entries expire (omit this option in the generated script if set to 0) - - - - - htable-gcinterval: - - - - - How many milliseconds between garbage collection intervals (omit this option in generated script if set to 0) - - - - - Options below control size of the hash table and expiration time. They will be omitted from the generated script if set to zero. - - - - - Compiler can automatically create a rule with mirrored source and destination addresses and service fields. This can be used to match "reply" packets using address and service parameters matched by this rule. The action of the mirrored rule is the same as that of this one. Firewall Builder recognizes the following services and creates "mirrored" versions as follows: - - - - - * UDP service: mirrored service has source and destination port ranges reversed - * TCP service: mirrored service has source and destination port ranges reversed and "established" flag inverted. If TCP service used in this rule does not have "established" flag, the mirrored service gets it, and the other way around. This is designed to simplify creating ACL rules to permit "reply" TCP packets - * ICMP service: ICMP echo request is recognized, mirrored service becomes ICMP echo reply. Other ICMP types are simply copied to the mirrored service - * ICMPv6 service: like with ICMP, ICMP echo request is recognized and other ICMPv6 types are just copied - * IP service: mirrored service is a copy - - - - - - Add mirror rule - - - - - There are no options for this firewall platform - - - - - srcport - - - - - dstport - - - - - TCP - - - - - Modulate state - - - - - synproxy - - - - - Use sloppy TCP state tracker for this rule - - - - - Assume firewall is part of "any" for this rule only: - - - - - Follow global setting - - - - - On - - - - - Off - - - - - - Normally policy compiler uses stateful inspection in each rule. Activating this option makes this rule stateless. - - - - - RuleSetDialog - - - Rule set name '%1' is invalid. Only '[a-z][A-Z][0-9]_-+=@%^' characters are allowed. - - - - - &Continue - - - - - RuleSetDialog_q - - - On iptables "top" rule set goes into -the built-in chains INPUT, OUTPUT, -FORWARD; if this flag is unchecked, -rules go into user-defined chain -with the name the same as the name of -the rule set. - - - - - If this flag is unchecked, rules go -into anchor with the name the same as -the name of the rule set. - - - - - If this flag is unchecked, generated -access list will not be assigned to -interfaces with "ip access-group" -command. The name of the rule set will -be used as a prefix for names of -access access lists generated for it. - - - - - Ruleset - - - - - Name: - - - - - This is IPv4 rule set - - - - - This is IPv6 rule set - - - - - Top ruleset - - - - - Comment: - - - - - filter+mangle table - - - - - mangle table - - - - - This is combined IPv4 and IPv6 rule set - - - - - RuleSetView - - A Rule Set - Набор правил - - - Accounting - Учёт - - - Outbound - Исходящее - - - Original - Исходный - - - - - Insert Rule - Вставить правило - - - - Paste Rule - Вставить правило из буфера обмена - - - - - - - Edit - Редактировать - - - - Copy - Копировать - - - - Cut - Вырезать - - - - Paste - Вставить из буфера обмена - - - - Delete - Удалить - - - - Negate - Отрицание - - - Rules: %1-%2 - Правила: %1-%2 - - - Rule: %1 - Правило: %1 - - - Color Label: - Цветовая метка: - - - - Add Rule Below - Добавить правило ниже - - - - - Remove Rule - Удалить правило - - - - Remove Rules - Удалить правила - - - Move Rule - Переместить правило - - - Move Rules - Переместить правила - - - - Copy Rule - Копировать правило - - - - Cut Rule - Вырезать правило - - - - Paste Rule Above - Вставить правило выше - - - - Paste Rule Below - Вставить правило ниже - - - - - Enable Rule - Включить правило - - - - Enable Rules - Включить правила - - - - - Disable Rule - Отключить правило - - - - Disable Rules - Отключить правила - - - - Change direction - - - - - Change action - - - - - Change logging - - - - - delete - - - - - Copy object '%1' to clipboard' - - - - - cut - - - - - Move object - - - - Comment Editor - Редактор комментариев - - - Any - Любой - - - Accept - Разрешить - - - Deny - Блокировать - - - Reject - Блокировать с уведомлением - - - Accounting - Учитывать - - - - Inbound - Входящее - - - - Outbound - Исходящее - - - - Both - Оба - - - - Rule Options - Опции правила - - - - Logging On - Включить протоколирование - - - - Logging Off - Отключить протоколирование - - - Default - По-умолчанию - - - All - Все - - - - Parameters - Параметры - - - - Reveal in tree - Показывать в дереве - - - - Where used - Используется - - - - Change color - - - - - No color - - - - - - Enter group name: - - - - - New group - - - - - Add to the group - - - - - Remove from the group - - - - - Rename group - - - - - Compile rule - - - - - - Move Rule up - - - - - Move Rules up - - - - - - Move Rule down - - - - - Move Rules down - - - - - Enable rule - - - - - Disable rule - - - - - New Group - Новая группа - - - - Add new rule on top - - - - - Add new rule at the bottom - - - - - RuleSetViewDelegate - - - log - - - - - (options) - - - - - Any - Любой - - - - Original - - - - - Default - По-умолчанию - - - - All - Все - - - - SSHCisco - - - -*** Fatal error : - -*** Критическая ошибка: - - - - Logged in - - - - - Switching to enable mode... - - - - - New RSA key - - - - - Yes - - - - - No - - - - - In enable mode. - - - - - Pushing firewall configuration - - - - - Rule %1 - - - - - End - Конец - - - - SSHPIX - - *** Fatal error : - *** Фатальная ошибка: - - - -Logged in - -Вошли в систему - - - Switching to enable mode... - Переключение в режим включения... - - - New RSA key - Новый RSA ключ - - - Yes - Да - - - No - Нет - - - In enable mode. - Нахожусь в режиме включения. - - - Pushing firewall configuration - Пересылка конфигурации межсетевого экрана - - - - *** End - *** Конец - - - Rule %1 - Правило %1 - - - - Making backup copy of the firewall configuration - Создание резервной копии конфигурации межсетевого экрана - - - Reading current firewall configuration - Чтение текущей конфигурации межсетевого экрана - - - Generating configuration diff - Сравнение конфигураций - - - Fork failed for %1 - Ответвление не удалось для %1 - - - Not enough memory. - Не достаточно памяти. - - - Too many opened file descriptors in the system. - Слишком много открытых файловых дескрипторов в системе. - - - Empty configuration diff - Сохранение конфигурации в запасной PIX - - - - Logged in - - Вход произведен - - - - Switching to enable mode... - - Переход в режим enable ... - - - - End - - Конец - - - - Exiting - - Осуществляется выход - - - - - *** Clearing unused access lists - *** Очищаются неиспользуемые списки доступа - - - - *** Clearing unused object groups - *** Очищаются неиспользуемые группы объектов - - - -*** Fatal error : - -*** Критическая ошибка: - - - Logged in - Произведен вход - - - End - Конец - - - Save configuration - Сохранить конфигурацию - - - Save configuration to standby unit - Сохранить конфигурацию в резервном элементе - - - Exiting - Выполняется выход - - - - SSHSession - - - You are connecting to the firewall <b>'%1'</b> for the first time. It has provided you its identification in a form of its host public key. The fingerprint of the host public key is: "%2" You can save the host key to the local database by pressing YES, or you can cancel connection by pressing NO. You should press YES only if you are sure you are really connected to the firewall <b>'%3'</b>. - Вы соединяетесь с межсетевым экраном <b>%1</b> первый раз, его идентификация осуществляется с помощью открытого ключа. Открытый ключ этого межсетевого экрана: %2. Если вы уверены, что это открытый ключ межсетевого экрана %3, нажмите 'Да', иначе - нажмите 'Нет'. - - - - Failed to start ssh - Работа программы ssh была прервана, код возврата: %1 - - - - Stopping background process - - - - - Background process is still running. Will wait %1 sec - - - - - SSH session terminated, exit status: %1 - SSH сессия прервалась, статус выхода: %1 - - - - SSHUnx - - *** Fatal error : - *** Фатальная ошибка: - - - -Logged in - - -Вошли в систему - - - - - New RSA key - Новый RSA ключ - - - - Yes - Да - - - - No - Нет - - - - Error in SSH - Вход произведен - - - - - Done - Завершено - - - - -*** Fatal error : - -*** Критическая ошибка: - - - - Logged in - Произведен вход - - - - SimpleIntEditor_q - - - Script Editor - Редактор скриптов - - - - Cancel - Отмена - - - - OK - OK - - - - SimpleTextEditor - - - Warning: loading from file discards current contents of the script. - Выберите файл, содержащий команды Cisco PIX - - - - Could not open file %1 - Не могу открыть файл %1 - - - - Choose file - - - - - SimpleTextEditor_q - - - Script Editor - Редактор скриптов - - - - OK - OK - - - - Cancel - Отмена - - - - Import from file ... - Импорт из файла... - - - - SimpleTextView_q - - - Text viewer - Просмотр текста - - - - Object Name - Название объекта - - - - Close - Закрыть - - - - StartTipDialog_q - - - Do not show this again - - - - - Close - - - - - Welcome to Firewall Builder - Добро пожаловать в Firewall Builder - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-family:'Lucida Grande'; font-size:28pt;">Firewall Builder %1</span></p></body></html> - - - - - Watch Getting Started Tutorial - - - - - Summary of features - - - - - Previous Tip - - - - - Next Tip - - - - - TCPServiceDialog_q - - - TCP - TCP - - - - Name: - Название: - - - Library: - Библиотека: - - - - Destination Port Range - Диапазон портов назначения - - - - - Start: - Начало: - - - - - End: - Конец: - - - - Source Port Range - Диапазон портов источника - - - Apply Changes - Применить - - - - Comment: - Комментарий: - - - TCP Flags - Флаги TCP - - - - A - A - - - - U - U - - - - Mask: - Маска: - - - - Settings: - Установки: - - - - S - S - - - - F - F - - - - P - P - - - - R - R - - - TCP Service - TCP сервис - - - - TCP flags that must be set (see man iptables, option --tcp-flags) - - - - - TCP flags that should be examined (see man iptables, option --tcp-flags) - - - - - Flags: - - - - - Option "established" can be used if supported -by the target firewall platform - - - - - Established - - - - - TagServiceDialog_q - - - Form1 - Форма1 - - - Tag Service - Служба пометок - - - - Comment: - Комментарий: - - - Library: - Библиотека: - - - - Name: - Название: - - - - Code: - Определение: - - - - TimeDialog - - Date (M/D/Y): - Дата (M/D/Y): - - - Date (D/M/Y): - Дата (D/M/Y): - - - Date (Y/M/D): - Дата (Y/M/D): - - - Date (Y/D/M): - Дата (Y/D/M): - - - - TimeDialog_q - - - Time - Интервал времени - - - - Comment: - Комментарий: - - - Apply Changes - Применить - - - - Name: - Название: - - - Library: - Библиотека: - - - Date: - Дата: - - - Time: - Время: - - - Activate a rule on: - Включить правило в: - - - Day of week (0-6): - День недели (0 - 6): - - - Deactivate a rule on: - Отключить правило в: - - - Time Interval - Интервал времени - - - Any - Любой - - - - Start time: - - - - - Start date: - - - - - End time: - - - - - - M/d/yyyy - - - - - End date: - - - - - Mon - - - - - Tue - - - - - Wed - - - - - Thu - - - - - Fri - - - - - Sat - - - - - Sun - - - - - TutorialDialog_q - - - Tutorial - - - - - Reset - - - - - Previous - - - - - Next - Следующий - - - - Close - - - - - UDPServiceDialog_q - - - UDP - UDP - - - - Name: - Название: - - - Library: - Библиотека: - - - Apply Changes - Применить - - - - Comment: - Комментарий: - - - - Destination Port Range - Диапазон портов назначения - - - - - Start: - Начало: - - - - - End: - Конец: - - - - Source Port Range - Диапазон портов источника - - - UDP Service - UDP сервис - - - - UserDialog_q - - - User - - - - - Name: - - - - - User id: - - - - - Comment: - - - - - WorkflowIcons_q - - - Form - Форма - - - - Create new -firewall - - - - - Import existing -configuration - - - - - Watch "Getting -Started" tutorial - - - - - askRuleNumberDialog_q - - - Enter New Position For The Rule - Введите новую позцию для правила - - - - Enter new position for selected rules: - Введите новую позцию для выбранных правил: - - - - &Move - Переместить - - - - Alt+M - Alt+M - - - - &Cancel - Отмена - - - - Alt+C - Alt+C - - - - asklibforcopydialog_q - - - Copying - Копирование - - - - Object will be copied to library: - Объект будет скопирован в библиотеку: - - - - carpOptionsDialog - - - Input not valid: %1 - - - - - carpOptionsDialog_q - - - CARP protocol settings - - - - - &OK - - - - - &Cancel - - - - - CARP Parameters - - - - - - CARP password - - - - - Virtual Host ID - - - - - VHID - - - - - Advertisement interval (sec) - - - - - Master advskew - - - - - Default advskew - - - - - clusterMembersDialog_q - - - cluster member configuration - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - Cluster - - - - - Manage member firewalls for this Cluster. Firewalls are considered valid members if they have the same host OS and platform as the Cluster object. They also need to have at minimum one physical interface attached. - - - - - Available Firewalls: - - - - - Tree of potential cluster members. Select an interface to assign to the cluster. - - - - - Firewall - - - - - - Interface - - - - - Label - - - - - - ... - ... - - - - Selected as Cluster-Members: - - - - - Table of already selected member firewalls with their assigned cluster interfaces. - - - - - Name - - - - - Master - - - - - colorLabelMenuItem_q - - - Orange - Оранжевый - - - - Green - Зеленый - - - - Purple - Пурпурный - - - - Blue - Синий - - - - Yellow - Желтый - - - - Gray - Серый - - - - Red - Красный - - - - No color - Без цвета - - - - conntrackOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - - - - - conntrackOptionsDialog_q - - - conntrack protocol settings - - - - - &OK - - - - - &Cancel - - - - - conntrack Parameters - - - - - Use unicast address for conntrackd - - - - - Address: - - - - - Port number (udp): - - - - - debugDialog_q - - - Debugging Info - Отладочная информация - - - - &Close - Закрыть - - - - Alt+C - Alt+C - - - - execDialog - - Error: Failed to start program - Ошибка: не могу запустить программу - - - - execDialog_q - - Executing external command - Выполнение внешней команды - - - &Close - Закрыть - - - Alt+C - Alt+C - - - Stop - Остановить - - - Save log to file - Сохранить журнал в файл - - - - filePropDialog - - - Opened read-only - Открыт только для чтения - - - - Revision %1 - Ревизия: %1 - - - - filePropDialog_q - - - File Properties - -Свойства файла - - - - Location: - Местоположение: - - - - location - местоположение - - - - Revision history: - История изменений версий: - - - - RO - RO - - - - Revision Control: - Управление версиями (ревизиями): - - - - Time of last modification: - Последняя модификация: - - - - rev - ревизия - - - - lockedBy - заблокирован - - - - lastModified - последняя модификация - - - - Revision: - Ревизия: - - - - Locked by user: - Заблокирован пользователем: - - - - OK - OK - - - - Print - Печать - - - - findDialog - - - Search hit the end of the object tree. - Поиск по дереву объектов завершен. - - - - &Continue at top - Продолжить с начала - - - - &Stop - ОК - - - - findDialog_q - - - Find Object - Найти объект - - - - Text to be found in object names: - Разрешить регулярные выражения при поиске - - - - Search in the tree - Искать по дереву объектов - - - - Search in policy rules - Искать по наборам правил - - - - Find - Найти - - - - Matching attribute: - Атрибут соответствия: - - - - Address - Адрес - - - - TCP/UDP port - Порт TCP/UDP - - - - Protocol number - Номер протокола - - - - ICMP type - Тип ICMP - - - - Search for substring using regular expressions - Поиск подстроки с использованием регулярных выражений - - - - findObjectWidget_q - - - Form1 - Форма1 - - - - Find object - Найти объект - - - - Name - Название - - - - Address - Адрес - - - - TCP/UDP port - Порт TCP/UDP - - - - Protocol number - Номер протокола - - - - ICMP type - Тип ICMP - - - - Replace object - Заменить объект - - - Replace && Find - Заменить и найти - - - Next - Следующий - - - - Replace all - Заменить все - - - - Replace - Заменить - - - - Scope for search and replace : - Область поиска и замены: - - - - Tree only - Только дерево - - - - Tree and policy of all firewalls - Дерево и набор правил всех межсетевых экранов - - - - Policy of all firewalls - Набор правил всех межсетевых экранов - - - - policy of the opened firewall - Набор правил открытого межсетевого экрана - - - Close - Закрыть - - - - Use regular expressions - - - - - Find Next - - - - - Replace Current && Find Next - - - - - findWhereUsedWidget_q - - Parent Object - Родительский объект - - - - Details - Подробности - - - - Form1 - Форма1 - - - - Object: - Объект: - - - - Object is found in : - Объект обнаружен в: - - - - Used by - - - - - Include children of the object in search. For example, if the object is a firewall, results will include all rules and groups using it, its interfaces and their addresses - - - - - Include children - - - - - Find - Найти - - - Close - Закрыть - - - - Object - - - - Parent - Наследует от - - - - freebsdAdvancedDialog_q - - - FreeBSD: advanced settings - FreeBSD: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Options - Опции - - - - Forward source routed packets - Маршрутизировать пакеты с маршрутизацией источника - - - - Generate ICMP redirects - Отправлять ICMP redirect-ы - - - - - Packet forwarding - Маршрутизация пакетов - - - - - - - No change - Без изменений - - - - - - - On - Включить - - - - - - - Off - Выключить - - - - Path - Путь - - - - ipf: - ipf: - - - - ipnat: - ipnat: - - - - sysctl: - sysctl: - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - Укажите полный путь к перечисленным утилитам в операционной системе этого межсетевого экрана. Для незаполненных полей будут использованы значения по-умолчанию. - - - - ipfw: - ipfw: - - - - pfctl: - - - - - heartbeatOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - - - - - heartbeatOptionsDialog_q - - - heartbeat protocol settings - - - - - &OK - - - - - &Cancel - - - - - heartbeat Parameters - - - - - Heartbeat should be configured to use unicast address -of each firewall member for health checks. Firewall Builder -will add policy rules to permit these automatically. - - - - - Use unicast address for heartbeat - - - - - Address: - - - - - Enter multicat address used for heartbeat health checks here. - - - - - Port number (udp): - - - - - instBatchOptionsDialog - - - Batch install options - Опции пакетной установки - - - - instDialog - - File %1 not found. - Не найден файл %1. - - - - Select firewalls to compile. - - - - - No files were generated, there is nothing to show. - - - - - <b>Multiple firewalls</b> - - - - - - - - - &Continue - Продолжить - - - - Last error: - - - - - The process failed to start - - - - - The process crashed some time after starting successfully. - - - - - The last waitFor...() function timed out. Elapsed time: %1 ms - - - - - An error occurred when attempting to write to the process. - - - - - An error occurred when attempting to read from the process. - - - - - An unknown error occurred. - - - - - Current state of QProcess: - - - - - The process is not running. - - - - - The process is starting, but the program has not yet been invoked. - - - - - The process is running and is ready for reading and writing. - - - - -Copying %1 -> %2 - - -Копирование %1 -> %2 - - - - Running command '%1' - - - Выполняется команда %1 - - - ERROR: Terminating install sequence - - ОШИБКА: Прерывание установки - - - - Done - - Завершено - - - - Activating new policy - - Включение нового набора правил - - - - There is no firewalls to process. - Отсутствуют межесетевые экраны для обработки. - - - <p align="center"><b><font size="+2">Select firewalls for compilation.</font></b></p> - <p align="center"><b><font size="+2">Выберите межсетевые экраны для компиляции.</font></b></p> - - - Unknown operation. - Неизвестная операция. - - - Show details - Показать подробности - - - Hide details - Скрыть подробности - - - Install options for firewall '%1' - Опции установки межсетевого экрана '%1' - - - -Copying %1 -> %2:%3 - - -Копирование %1 -> %2:%3 - - - - - Success - Успешно - - - - - Error - Ошибка - - - Fatal error, terminating install sequence - - Фатальная ошибка, прерывается установка - - - - - Error: Failed to start program - Ошибка: не могу запустить программу - - - - Policy installer uses Secure Shell to communicate with the firewall. -Please configure directory path to the secure shell utility -installed on your machine using Preferences dialog - Программа установки политик использует SSH для взаимодействия -с межсетевым экраном. Укажите путь к утилите ssh, установленной -в вашей системе используя диалог Настройка - - - Firewall isn't compiled. - Набор правил для межсетевого экрана не скомпилирован. - - - - Firewall platform is not specified in this object. -Can't compile firewall policy. - Не указан межесетевой экран для этого объекта. -Невозможно скомпилировать набор правил межсетевого экрана. - - - Error: Terminating install sequence - - Ошибка: установка завершается - - - - Abnormal program termination - Некорректное завершение программы - - - Skipped - Пропущен - - - - - Compiling ... - Компиляция ... - - - - - Failure - Ошибка - - - Recompile - Перекомпилировать - - - Batch policy rules compilation - Пакетная компиляция набора правил - - - - - Stop - Остановить - - - - Install firewall: - Установить межсетевой экран: - - - Installing firewalls - Установка межсетевых экранов - - - - - Installing ... - Установка ... - - - Show selected - Показать выбранные - - - Show all - Показать все - - - - There are no firewalls to process. - - - - - Compiling rule sets for firewall: - - - - - Cancelled - - - - - <b>You are trying to compile policy for a firewall object that is a member of a cluster, however you requested compilation of only this member firewall and not the cluster it belongs to. Assuming firewall is standalone and not cluster member. Rules and parts of the script specific for the cluster configuration will not be generated.</b> - - - - - Firewall '%1' is member of cluster '%2' - - - - - Running command '%1' - - - - - - instDialog_q - - Firewall Builder: Policy Installer - Firewall Builder: установка набора правил - - - Installing policy rules on firewall '%1'. Logging in - Установка набора правил на межсетевой экран %1. Подключение и вход в систему - - - Enter authentication information below and click 'Next' - Введите информацию необходимую для аутентификации и нажмите 'Далее' - - - install only ACL, 'icmp', 'telnet', 'ssh', 'nat', 'global' and 'static' commands - использовать только следующие команды ACL: icmp, telnet, ssh, nat, global and static - - - Calculate difference between current firewall state and generated configuration and install only those commands that update state of the firewall - Найти различия между устанавливаемой и текущей конфигурацией межсетевого экрана и выполнить только команды для приведения межсетевого экрана к устанавливаемой конфигурации - - - Quiet install: do not print anything as commands are executed on the firewall - Краткий режим: не показывать ничего при выполнении команд на межсетевом экране - - - Dry run (commands won't be executed on the firewall) - Проверка установки (команды не будут выполняться на межсетевом экране) - - - Make a backup copy of the firewall configuration in this file: - Создать резервную копию конфигурации межсетевого экрана в файле: - - - Alternative address to communicate with the firewall: - Запасной адрес для связи с межсетевым экраном: - - - Store configuration diff in a file - Сохранять изменения конфигурации в файле - - - Enable password: - Указать пароль: - - - Password or passphrase: - Пароль: - - - User name: - Имя пользователя: - - - Verbose: print all commands as they are executed on the firewall - Подробный режим: показывать все команды, выполняемые на межсетевом экране - - - Remove comments from configuration - Удалить комментарии из конфигурации - - - Compress script - Сжать скрипт - - - Test run: run the script on the firewall but do not store it permanently. -You can revert to the last working configuration by rebooting the firewall. - Тестовый запуск: запустить скрипт на межсетевом экране, -но не прописывать его в загрузочных скриптах. -При необходимости можно вернуть старую конфигурацию -межсетевого экрана путем его перезагрузки. - - - Schedule reboot in - Отложить перезагрузку до - - - Rebooting the firewall will restore its original policy. To cancel reboot, install the policy with "test run" option turned off - После перезагрузки межсетевого экрана будет загружен старый набор правил, чтобы избежать этого произведите установку набора правил с отключенной опцией 'Тестовый запуск' - - - min - мин - - - Installing policy rules on firewall '%1'. - Установка набора правил на межсетевой экран %1. - - - - Process log - Журнал обработки - - - Write configuration to standby PIX - Запись конфигурации в запасной PIX - - - - Compile - Компилировать - - - - Install - Установить - - - - - Firewall - Межсетевой экран - - - Library - Библиотека - - - - Last Modified - Последняя модификация - - - - Last Compiled - Последняя компиляция - - - - Last Installed - Последняя установка - - - - Progress - Прогресс - - - Compile status - Статус компиляции - - - Install status - Статус установки - - - - <p align="center"><b><font size="+2">Select firewalls to compile and install.</font></b></p> - <p align="center"><b><font size="+2">Выберите межсетевые экраны для компиляции и установки.</font></b></p> - - - - Perform batch install - Выполнить пакетную установку - - - - Check this option if you want to install all selected firewalls automatically. This only works if you use the same user name and password to authenticate to all these firewalls. - Включите эту опцию для автоматической установки всех межсетевых экранов. Эта опция работает только в случае полного совпадения используемого имени пользователя и пароля для всех выбранных межсетевых экранов. - - - All - Все - - - None - Ничего - - - Show selected - Показать выбранные - - - - Stop - Остановить - - - - Firewalls: - Межсетевые экраны: - - - - firewall - межсетевой экран - - - Show Details - Показать подробности - - - - Save log to file - Сохранить журнал в файл - - - - TextLabel - - - - - - warning text goes here - - - - - Select all - - - - - Select none - - - - - Inspect generated files - - - - - < &Back - < Назад - - - - &Next > - Дальше > - - - - &Finish - Готово - - - - &Cancel - - - - - current operation here - - - - - instOptionsDialog - - - Install options for firewall '%1' - Опции установки межсетевого экрана '%1' - - - - instOptionsDialog_q - - - Install options - Опции установки - - - - <p align="center"><b><font size="+2">Install options for firewall '%1'</font></b></p> - Введите информацию для аутентификации ниже и нажмите 'Далее' - - - - Password or passphrase: - Пароль: - - - - User name: - Имя пользователя: - - - - Write configuration to standby PIX - Записать конфигурацию в запасной PIX - - - - Dry run (commands won't be executed on the firewall) - Проверка установки (команды не будут выполняться на межсетевом экране) - - - - Store configuration diff in a file - Сохранить изменения конфигурации в файле - - - install only ACL, 'icmp', 'telnet', 'ssh', 'nat', 'global' and 'static' commands - установить только команды: ACL, icmp, telnet, ssh, nat, global и static - - - Calculate difference between current firewall state and generated configuration and install only those commands that update state of the firewall - Найти изменения между текущей и генерируемой конфигурациями межесетевого экрана, после чего установить только те команды, которые обновят текущую конфигурацию до генерируемой - - - - Enable password: - Введите пароль: - - - - Make a backup copy of the firewall configuration in this file: - Создать резервную копию конфигурации межсетевого экрана в файле: - - - Alternative address to communicate with the firewall: - Альтернативный адрес для связи с межесетевым экраном: - - - - Schedule reboot in - Отложить перезагрузку до - - - - Rebooting the firewall will restore its original policy. To cancel reboot, install the policy with "test run" option turned off - После перезагрузки межсетевого экрана будет загружен старый набор правил, чтобы избежать этого произведите установку набора правил с отключенной опцией 'Тестовый запуск' - - - - min - мин - - - If you install the policy in the test mode, you can revert to the last working configuration by rebooting the firewall - Если вы устанавливаете набор правил в тестовом режиме, то вы можете восстановить последнюю рабочую конфигурацию путем перезагрузки межсетевого экрана - - - - Test run: run the script on the firewall but do not store it permanently. - Тестовый запуск: запустить скрипт на межсетевом экране, не сохраняя его на нем. - - - - Quiet install: do not print anything as commands are executed on the firewall - Обычная установка: не показывать команды по мере их выполнения на межсетевом экране - - - - Remember passwords for the duration of the session (passwords -are never stored permanently). To enable this option turn it on -in Preferences and configure user name used to authenticate to -the firewall in the "advanced" settings dialog of the firewall object. - - - - - Verbose: print all commands as they are executed on the firewall - Подробная установка: показывать все команды по мере их выполнения на межсетевом экране - - - - Remove comments from configuration - Удалить комментарии из конфигурации - - - - Compress script - Сжимать скрипт - - - - Store a copy of fwb file on the firewall - Сохранить копию fwb-файла на межсетевом экране - - - - Install - - - - - Cancel All - - - - Ok - OK - - - - Cancel - Отмена - - - - If you install the policy in test mode, it will not be saved permanently, so you can revert to the last working configuration by rebooting the firewall - - - - - Cancel reboot if policy activation was successfull - - - - - Address that will be used to communicate with the firewall: - - - - - Remember passwords - - - - - iosAdvancedDialog_q - - - IOS Advanced Configuration Options - - - - - General - - - - - Set router name using object's name - - - - - Generate commands to configure addresses for interfaces - - - - - OK - - - - - Cancel - - - - - iosaclAdvancedDialog - - - - Script Editor - - - - - iosaclAdvancedDialog_q - - - IOS ACL Firewall Settings - - - - - OK - - - - - Cancel - - - - - Compiler Options - - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - Имя файла (по-умолчанию, если пустое, имя будет состоять из названия объекта межсетевого экрана и расширения '.fw') - - - - Policy Compiler Options - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in the policy - - - - - Use object-group statements (requires IOS v12.4(20)T and later) - - - - - Always permit ssh access from the management workstation with this address: - - - - - Script Options - - - - - - Insert comments into generated IOSACL configuration file - - - - - Comment the code - - - - - Group IOSACL commands in the script so that similar commands appear next to each other, just like IOSACL does it when you use 'show config' - - - - - Group similar commands together - - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via IPSEC tunnel. This is the way access lists were generated in older versions of Firewall Builder for IOSACL. - - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - "Безопасный метод": - -Сначала создаются временные списки доступа для разрешения соединений с управляющего узла или подсети, указанных ниже. Это необходимо для создания и поддержания временного доступа управляющей рабочей станции к межсетевому экрану во время установки набора правил (особенно в случае, если управляющее соединение идет через IPSec). После установки набора -правил, временные списки доступа удаляются. Этот метод гарантирует удаленный доступ к межсетевому экрану без прерываний, за счет немного большего размера конфигурации. - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - Временный список доступа должен разрешить доступ с указанного адреса узла или подсети (используйте нотацию с пркфикосм для указания подсети, например - 10.0.0.0/24): - - - - Installer - - - - - Instead of running generated configuration on the router line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the router for this to work. This method works for IOS v12.4 or later and is much faster than running configuration line by line. - - - - - Copy generated configuration file to the router using scp - - - - - File system on the router where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "nvram:": - - - - - External install script - Внешний скрипт для установки - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Built-in installer - Встроенный установщик - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Logging - - - - - Syslog - - - - - Syslog host (name or IP address): - - - - - syslog facility: - - - - - syslog level ('logging trap'): - - - - - The logging timestamp command requires that the clock command be set. - - - - - Enable logging timestamps on syslog file - - - - - Other logging destinations and levels: - - - - - Internal buffer - - - - - Console - - - - - Additional command line parameters for scp - - - - - Generate logging commands - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Compiler creates multiple access lists from the same policy, -two for each interface: one for inbound and another for -outbound. If the policy is written in a such way that no rule -can possibly be associated with an interface, this interface -gets no access list at all. Also, interfaces marked as -"unprotected" never get access list regardless of how the policy -rules are designed. - - - - - - Generate separate access list for each interface - - - - - Compiler creates one access list and assigns it to all -interfaces. - - - - - - Create one access list and attach it to all interfaces - - - - - Use ACL remarks - - - - - Do not clear access lists and object group, just generate IOSACL commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - ipcopAdvancedDialog - - - - Script Editor - - - - - ipcopAdvancedDialog_q - - - ipcop advanced settings - - - - - Compiler - - - - - Compiler: - - - - - Command line options for the compiler: - - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - Имя файла (по-умолчанию, если пустое, имя будет состоять из названия объекта межсетевого экрана и расширения '.fw') - - - - rc.firewall.local - - - - - Assume firewall is part of 'any' - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Bridging firewall - - - - - Detect shadowing in policy rules - - - - - Ignore empty groups in rules - - - - - Enable support for NAT of locally originated connections - - - - - Make Tag and Classify actions terminating - - - - - Default action on 'Reject': - - - - - Always permit ssh access from -the management workstation -with this address: - - - - - Installer - - - - - Built-in installer - Встроенный установщик - - - - Directory on the firewall where script should be installed - - - - - /etc/rc.d/ - - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - admin - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - - - - - /etc/rc.d/rc.firewall - - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - Additional command line parameters for scp - - - - - External install script - Внешний скрипт для установки - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Logging - - - - - use ULOG - - - - - use LOG - - - - - log TCP seq. numbers - - - - - log IP options - - - - - use numeric syslog levels - - - - - Log level: - - - - - log TCP options - - - - - cprange - - - - - queue threshold: - - - - - netlink group: - - - - - Log prefix: - - - - - Logging limit: - - - - - Activate logging in all rules -(overrides rule options, use for debugging) - - - - - Script - - - - - These options enable auxiliary sections in the generated shell script. - - - - - Turn debugging on in generated script - - - - - Verify interfaces before loading firewall policy - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - ipcoposAdvancedDialog_q - - - IPCOP: advanced settings - - - - - Options - - - - - IPv4 Packet forwarding - - - - - - - - - - - - - - - - - - - - No change - - - - - - - - - - - - - - - - - - - - On - - - - - - - - - - - - - - - - - - - - Off - - - - - IPv6 Packet forwarding - - - - - Kernel anti-spoofing protection - - - - - Ignore broadcast pings - - - - - Ignore all pings - - - - - Accept source route - - - - - Accept ICMP redirects - - - - - Ignore bogus ICMP errors - - - - - Allow dynamic addresses - - - - - Log martians - - - - - whats this text - whats this comment - - - - - TCP - - - - - These parameters make sense for connections to or from the firewall host - - - - - TCP sack - - - - - TCP window scaling - - - - - TCP ECN - - - - - TCP SYN cookies - - - - - TCP keepalive time (sec) - - - - - TCP fack - - - - - TCP timestamps - - - - - TCP FIN timeout (sec) - - - - - Path - - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - - - - - iptables: - - - - - :ip6tables - - - - - ip: - - - - - vconfig - - - - - brctl - - - - - ifenslave - - - - - logger: - - - - - modprobe: - - - - - lsmod - - - - - iptables-restore: - iptables-restore: - - - - :ip6tables-restore - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - ipfAdvancedDialog - - - - Script Editor - Редактор скриптов - - - - ipfAdvancedDialog_q - - - ipf: advanced settings - ipf: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Compiler - Компилятор - - - - Compiler: - Компилятор: - - - There are two ways compiler can generate code for rules in the Global Policy: it can either create two ipf rules to control both incoming and outgoing packets for each rule, or it can create only one ipf rule for incoming packets and permit all outgoing ones.You get more control over the packets crossing the firewall in the first mode, but generated script is going to be smaller if you choose the second. - Компиляция правил глобальной политики может проходить двумя путями: или путем создания двух правил межсетевого экрана для входящих и исходящих пакетов соответственно для каждого правила политики или путем создания одного правила для входящих пакетов (в этом случае все исходящие пакеты будут разрешены). В первом случае вы лучше контролируете межсетевой экран, во втором - уменьшается создаваемый скрипт. - - - - Masquerade returned icmp as being from original -packet's destination - Отправлять ICMP пакеты используя маскарадинг, -чтобы они выглядели, как отправленные от -оригинального узла назначения - - - Generate both 'in' and 'out' rules - Генерировать правила как входящие, так и исходящие - - - Pass all outgoing - Разрешить все исходящие - - - - Accept TCP sessions opened prior to firewall restart - Не сбрасывать TCP сессии открытые до загрузки нового набора правил межсетевого экрана - - - - Find and eliminate duplicate rules - Находить и упрощать все дублирующие правила - - - - Detect rule shadowing in policy - Находить 'затенение' правил в наборе - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - Затенение происходит, когда одно правило идущее ранее делает одно или несколько следующующих правил не рабочими. Это происходит из-за того, что пакеты, которые должны попадать под условия следующих правил будут попадать под условие первого правило. - - - - Ignore empty groups in rules - Игнорировать пустые группы в правилах - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - При выключении этой опции компилятор будет воспринимать пустые группы в наборе правил как ошибку, а при включении - будет удалять при компиляции пустые группы из всех правил. Во втором случае если после удаления группы правило окажется пустым в том месте, где была группа (окажется с полем любой), то такое правило будет игнорироваться. Используйте эту опцию очень внимательно и осторожно! - - - Always permit ssh access from -the management workstation -with this address: - Всегда разрешать доступ -по протоколу SSH с управляющей -рабочей станции с адресом: - - - - Default action on 'Reject': - ICMP protocol unreachable - - - ICMP admin prohibited - ICMP admin prohibited - - - ICMP host prohibited - ICMP host prohibited - - - ICMP net prohibited - ICMP net prohibited - - - ICMP net unreachable - ICMP net unreachable - - - ICMP port unreachable - ICMP port unreachable - - - TCP RST - TCP RST - - - - Command line options for the compiler: - Опции командной строки для компилятора: - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - Имя файла (по-умолчанию, если пустое, имя будет состоять из названия объекта межсетевого экрана и расширения '.fw') - - - - Protocol Helpers - Расширенная поддержка протоколов - - - - Some protocols involve multiple associated network connections. Firewall can keep track of such connections automatically if you activate one or all of the following options: - Некоторые протоколы допускают наличие нескольких взаимосвязанных соединений. Межсетевой экран может отслеживать такие соединения автоматически, если вы включите одну или несколько из следующих опций: - - - - Use raudio proxy in NAT rules - Использовать raudio прокси для NAT правил - - - - Use h323 proxy in NAT rules - Использовать h323 прокси для NAT правил - - - - Use ipsec proxy in NAT rules - Использовать ipsec прокси для NAT правил - - - - Use ftp proxy in NAT rules - Использовать ftp прокси для NAT правил - - - - Use rcmd proxy in NAT rules - Использовать rcmd прокси для NAT правил - - - - Installer - Установщик - - - - Command line options for the script: - Опции командной строки для скрипта: - - - - Policy install script (using built-in installer if this field is blank): - Скрипт установки набора правил (не заполняйте для использования встроенного скрипта установки): - - - - Always permit ssh access from the management - workstation with this address: - - - - - Directory on the firewall where configuration files should be installed - Каталог на межсетевом экране, в который должны быть установлены файлы конфигурации - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - Имя пользователя, используемое для аутентификации на межсетевом экране (не заполняйте, если используете putty сессию): - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - Альтернативный адрес или имя межсетевого экрана для связи с ним (в Windows поддерживаются названия сессий putty) - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - Команда, используемая установщиком для загрузки нового набора правил (если это поле пустое, установщик будет выполнять скрипт межсетевого экрана в указанном выше каталоге, он также будет использовать sudo, если имя пользователя не root) - - - - Logging - Запись в журнал (протоколирование) - - - - Log facility: - Log facility: - - - - Log level: - Log level: - - - - Log packet body - Протоколировать тело пакета - - - - Block if can not log - Блокировать при невозможности протоколировать - - - - Script Options - Опции скрипта - - - - Add virtual addresses for NAT - Добавлять виртуальные адреса для NAT - - - - Configure Interfaces of the firewall machine - Конфигурировать интерфейсы межсетевого экрана - - - - Turn debugging on in generated script - Включить режим отладки в генерируемом скрипте - - - - Optimization - Оптимизация - - - - If this option is on, policy compiler adds virtual addresses to the interfaces to make the firewall answer to ARP queries for addresses used in NAT rules. - При включении этой опции, компилятор добавит виртуальные адреса к интерфейсам межсетевого экрана для того, чтобы он отвечал на ARP-запросы адресов, используемых в правилах сетевой трансляции адресов (NAT). - - - - These options enable auxiliary sections in the generated shell script. - Эти опции подключают внешние секции в генерируемом shell-скрипте. - - - - Prolog/Epilog - Prolog/Epilog - - - - - Edit - Редактировать - - - - The following commands will be added verbatim on top of generated configuration - Следующие команду будут добавлены в начало генерируемого скрипта конфигурации - - - - The following commands will be added verbatim after generated configuration - Следующие команду будут добавлены в конец генерируемого скрипта конфигурации - - - - External install script - Внешний скрипт для установки - - - - Built-in installer - Встроенный установщик - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - Determine addresses of dynamic interfaces at run time - Определять адреса динамических интерфейсов во время запуска - - - - Use PPTP proxy in NAT rules - Использовать pptp прокси для NAT правил - - - - Use IRC proxy in NAT rules for DCC - Использовать irc прокси для DCC в NAT правилах - - - - Additional command line parameters for scp - - - - - IPv6 - IPv6 - - - - Enable IPv6 support - - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Use Kerberos rcmd proxy in NAT rules - - - - - Use Kerberos ekshell proxy in NAT rules - - - - - Output file name. If left blank, the file name is constructed of the firewall object name and extension ".fw" - - - - - Generated script (.fw file) and configuration (.conf) files can be copied to the firewall machine under different names. If these fields are left blank, the file name does not change. - - - - - Script (.fw) file name on the firewall - - - - - ipf.conf file name on the firewall - - - - - nat.conf file name on the firewall - - - - - ipfwAdvancedDialog - - - - Script Editor - Редактор скриптов - - - - ipfwAdvancedDialog_q - - - ipfw: advanced settings - ipfw: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Compiler - Компилятор - - - - Command line options for the compiler: - Опции командной строки для компилятора: - - - - Compiler: - Компилятор: - - - - Always permit ssh access from -the management workstation -with this address: - Всегда разрешать доступ -по протоколу SSH с управляющей -рабочей станции с адресом: - - - - Ignore empty groups in rules - Игнорировать пустые группы в правилах - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - При выключении этой опции компилятор будет воспринимать пустые группы в наборе правил как ошибку, а при включении - будет удалять при компиляции пустые группы из всех правил. Во втором случае если после удаления группы правило окажется пустым в том месте, где была группа (окажется с полем любой), то такое правило будет игнорироваться. Используйте эту опцию очень внимательно и осторожно! - - - - Detect rule shadowing in policy - Находить 'затенение' правил в наборе - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - Затенение происходит, когда одно правило идущее ранее делает одно или несколько следующующих правил не рабочими. Это происходит из-за того, что пакеты, которые должны попадать под условия следующих правил будут попадать под условие первого правило. - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - Имя файла (по-умолчанию, если пустое, имя будет состоять из названия объекта межсетевого экрана и расширения '.fw') - - - - Installer - Установщик - - - - Command line options for the script: - Опции командной строки для скрипта: - - - Directory on the firewall where configuration files should be installed - Каталог на межсетевом экране, в которые должны быть установлены файлы конфигурации - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - Имя пользователя, используемое для аутентификации на межсетевом экране (не заполняйте, если используете putty сессию): - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - Альтернативный адрес или имя межсетевого экрана для связи с ним (в Windows поддерживаются названия сессий putty) - - - - Policy install script (using built-in installer if this field is blank): - Скрипт установки набора правил (не заполняйте для использования встроенного скрипта установки): - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - Команда, используемая установщиком для загрузки нового набора правил (если это поле пустое, установщик будет выполнять скрипт межсетевого экрана в указанном выше каталоге, он также будет использовать sudo, если имя пользователя не root) - - - - Script Options - Опции скрипта - - - - Add virtual addresses for NAT - Добавлять виртуальные адреса для NAT - - - - Configure Interfaces of the firewall machine - Конфигурировать интерфейсы межсетевого экрана - - - - Turn debugging on in generated script - Включить режим отладки в генерируемом скрипте - - - - These options enable auxiliary sections in the generated shell script. - Эти опции подключают внешние секции в генерируемом shell-скрипте. - - - - Prolog/Epilog - Prolog/Epilog - - - - - Edit - Редактировать - - - - The following commands will be added verbatim after generated configuration - Следующие команду будут добавлены в конец генерируемого скрипта конфигурации - - - - The following commands will be added verbatim on top of generated configuration - Следующие команду будут добавлены в начало генерируемого скрипта конфигурации - - - - External install script - Внешний скрипт для установки - - - - Built-in installer - Встроенный установщик - - - - Directory on the firewall where script should be installed - Каталог на межсетевом экране, в которые должны быть установлены файлы конфигурации - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - Add rule to accept packets matching dynamic rules created for -known sessions on top of the policy (action 'check-state') - - - - - Additional command line parameters for scp - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Generated script can be copied to the firewall machine under different name. If this field is left blank, the file name does not change. - - - - - Script name on the firewall - - - - - iptAdvancedDialog - - - - Script Editor - Редактор скриптов - - - - iptAdvancedDialog_q - - - iptables: advanced settings - iptables: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Compiler - Компилятор - - - Command line options for the compiler: - Опции командной строки для компилятора: - - - Always permit ssh access from -the management workstation -with this address: - Всегда разрешать доступ -по протоколу SSH с управляющей -рабочей станции с адресом: - - - - Accept ESTABLISHED and RELATED packets before the first rule - Добавить вначале набора скрытое правило для приема пакетов ссостоянием соедиения ESTABLISHED и RELATED - - - - Bridging firewall - Поддержка режима моста - - - - Detect shadowing in policy rules - Находить 'затенение' правил в наборе - - - - and log them - и протоколировать их - - - - Assume firewall is part of 'any' - Считать межсетевой экран частью 'любого' - - - - Accept TCP sessions opened prior to firewall restart - Блокировать пакеты, которые не относятся к разрешенным соединениям - - - - Clamp MSS to MTU - Выравнивать MSS до MTU - - - - Enable support for NAT of locally originated connections - Разрешить NAT для локальных соединений - - - - Ignore empty groups in rules - Игнорировать пустые группы в правилах - - - - Compiler: - Компилятор: - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - Имя файла (по-умолчанию, если пустое, имя будет состоять из названия объекта межсетевого экрана и расширения '.fw') - - - ICMP admin prohibited - ICMP admin prohibited - - - ICMP host prohibited - ICMP host prohibited - - - ICMP host unreachable - ICMP host unreachable - - - ICMP net prohibited - ICMP net prohibited - - - ICMP net unreachable - ICMP net unreachable - - - ICMP port unreachable - ICMP port unreachable - - - ICMP protocol unreachable - ICMP protocol unreachable - - - TCP RST - TCP RST - - - - Default action on 'Reject': - Уведомление по-умолчанию для действия 'Блокировать с уведомлением': - - - - Installer - Установщик - - - - Command line options for the script: - Опции командной строки для скрипта: - - - - Directory on the firewall where script should be installed - Каталог на межсетевом экране, в которые должны быть установлены файлы конфигурации - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - Имя пользователя, используемое для аутентификации на межсетевом экране (не заполняйте, если используете putty сессию): - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - Альтернативный адрес или имя межсетевого экрана для связи с ним (в Windows поддерживаются названия сессий putty) - - - - Policy install script (using built-in installer if this field is blank): - Скрипт установки набора правил (не заполняйте для использования встроенного скрипта установки): - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - Команда, используемая установщиком для загрузки нового набора правил (если это поле пустое, установщик будет выполнять скрипт межсетевого экрана в указанном выше каталоге, он также будет использовать sudo, если имя пользователя не root) - - - - Compiler command line options: - - - - - Output file name: - - - - - If output file name is left blank, the file name is constructed of the firewall object name and extension ".fw" - - - - - Add rules to accept IPv6 Neighbor Discovery -packets to IPv6 policies - - - - - Use module "set" for run-time Address Table objects (module is only available in iptables v 1.4.1.1 and later) - - - - - Install the rule for ssh access from the management workstation when the firewall script is run with the "block" command - - - - - Logging - Запись в журнал (протоколирование) - - - - use ULOG - исользовать ULOG - - - - use LOG - исользовать LOG - - - - log TCP seq. numbers - протоколировать номера последовательностей TCP - - - - log IP options - Протоколировать опции IP - - - - use numeric syslog levels - использовать цифры-номера уровней syslog - - - - Log level: - Log level: - - - alert - alert - - - crit - crit - - - error - error - - - warning - warning - - - notice - notice - - - info - info - - - debug - debug - - - - log TCP options - Протоколировать опции TCP - - - - cprange - cprange - - - - queue threshold: - queue threshold: - - - - netlink group: - группа netlink: - - - - Log prefix: - Log prefix: - - - - Logging limit: - Ограничение протоколирования: - - - /day - в день - - - /hour - в час - - - /minute - в минуту - - - /second - в секунду - - - - Activate logging in all rules -(overrides rule options, use for debugging) - Включить протоколирование для всех правил -(независимо от настроек правил, используется для отладки) - - - Script Options - Опции скрипта - - - These options enable auxiliary sections in the generated shell script. - Эти опции подключают внешние секции в генерируемом shell-скрипте. - - - - Configure Interfaces of the firewall machine - Конфигурировать интерфейсы межсетевого экрана - - - - Add virtual addresses for NAT - Добавлять виртуальные адреса для NAT - - - - Turn debugging on in generated script - Включить режим отладки в генерируемом скрипте - - - - Verify interfaces before loading firewall policy - Проверять наличие необходимых интерфейсов межсетевого экрана перед загрузкой набора правил - - - Load modules - Загружать необходимые модули ядра - - - - Drop packets that are associated with -no known connection - Блокировать пакеты, которые не относятся -к известным соединениям - - - - Compiler will automatically generate rules to permit ICMP6 packets used in IPv6 -Neighbor Discovery after the rules that accept ESTABLISHED,RELATE and before -the rule that drops packets in state INVALID. - - - - - Always permit ssh access from the management workstation with this address: - - - - - Prolog/Epilog - Prolog/Epilog - - - - - Edit - Редактировать - - - - The following commands will be added verbatim after generated configuration - Следующие команду будут добавлены в конец генерируемого скрипта конфигурации - - - - The following commands will be added verbatim on top of generated configuration - Следующие команду будут добавлены в начало генерируемого скрипта конфигурации - - - - Insert prolog script - Вставить скрипт пролога - - - - on top of the script - в начало скрипта - - - - after interface configuration - после конфигурирования интерфейсов - - - - after policy reset - после удаления страрого набора правил - - - - Load iptables modules - - - - - If debugging is turned on, the script will run with shell option "-x" that makes it print every command it executes. Warning: this produces a lot of debugging output. - - - - - Managing interfaces and addresses - - - - - Clear ip addresses and bring down interfaces not configured in fwbuilder - - - - - Generated script can load rules one by one by calling iptables command line utility, or activate them all at once using iptables-restore. In both cases you just run the script with command line parameter "start" to activate the policy, the script will use iptables-restore automatically if this checkbox is on - - - - - Use iptables-restore to activate policy - Использовать команду iptables-restore для включения набора правил - - - - iptables-restore replaces firewall policy in one atomic transaction - iptables-restore заменяет набор правил межсетевого экрана единой атомарной транзакцией - - - - External install script - Внешний скрипт для установки - - - - Built-in installer - Встроенный установщик - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - Make Tag and Classify actions terminating - - - - - Additional command line parameters for scp - - - - - Script - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Help - Справка - - - - This adds a rule on top of the policy with iptables target TCPMSS -and option --clamp-mss-to-pmtu. Generation of this command is -version-dependent and also depends on the setting of ip or ipv6 forwarding -in host settings dialog. - - - - - - Generated script can be copied to the firewall machine under different name. If this field is left blank, the file name does not change. - - - - - Script name on the firewall: - - - - - Configure VLAN Interfaces - - - - - Configure bridge Interfaces - - - - - Configure bonding Interfaces - - - - - linksysAdvancedDialog_q - - - Linksys/Sveasoft: advanced settings - Linksys/Sveasoft: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Path - Путь - - - - modprobe: - modprobe: - - - - logger: - logger: - - - - ip: - ip: - - - - lsmod - lsmod - - - - iptables: - iptables: - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - Укажите полный путь к перечисленным утилитам в операционной системе этого межсетевого экрана. Для незаполненных полей будут использованы значения по-умолчанию. - - - - Prompts - Приглашения - - - - Policy installer relies on the shell prompt on the firewall to execute commands. Installer tries both prompt string patterns configured here; it assumes that the firewall is ready to accept a command if either prompt matches. You should only need to change these string patterns if Sveasoft changes the shell prompt in the future releases of the software. -<br> -<br> -The default strings work for Sveasoft Alchemy pre-5.1 and pre-5.2 - Программа установки набора правил выполняет команды только при наличии определенного приглашения командной строки (она проверяет наличие указанных здесь приглашений). Если программа установки видит указанные приглашения, то она считает, что межсетевой экран готов для выполнения команды. Изменение этих строк приглашений может потребоваться в случае изменения приглашений командной строки в новых версиях программного обеспечения Sveasoft. -<br> -<br> -По-умолчанию строки приглашений командной строки настроены на Sveasoft Alchemy версий pre-5.1 и pre-5.2 - - - - prompt 1 - приглашение 1 - - - - prompt 2 - приглашение 2 - - - - Use default prompts - Использовать приглашения по умолчанию - - - - vconfig - - - - - brctl - - - - - ifenslave - - - - - linux24AdvancedDialog_q - - - Linux 2.4: advanced settings - Linux 2.4/2.6: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Options - Опции - - - - - - - - - - - - - - - - - - - - No change - Без изменений - - - - - - - - - - - - - - - - - - - - On - Включить - - - - - - - - - - - - - - - - - - - - Off - Выключить - - - Packet forwarding - Маршрутизация пакетов - - - - Kernel anti-spoofing protection - Защита ядра от подмены адреса (anti-spoofing) - - - - Ignore broadcast pings - Игнорировать широковещательные ICMP ping пакеты - - - - Ignore all pings - Игнорировать все ICMP ping пакеты - - - - Accept source route - Принимать пакеты ICMP source route - - - - Accept ICMP redirects - Принимать пакеты ICMP redirect - - - - Ignore bogus ICMP errors - Игнорировать пакеты ICMP со странными кодами ошибки - - - - Allow dynamic addresses - Разрешить динамичнские адреса - - - - Log martians - Записывать в журнал пакеты с подозрительными адресами - - - - TCP - TCP - - - - These parameters make sense for connections to or from the firewall host - Эти параметры влияют на соединения идущие с/на сам межсетевой экран - - - - TCP sack - TCP sack - - - - TCP window scaling - TCP window scaling - - - - TCP ECN - TCP ECN - - - - TCP SYN cookies - TCP SYN cookies - - - - TCP keepalive time (sec) - TCP keepalive time (секунд) - - - - TCP fack - TCP fack - - - - TCP timestamps - TCP timestamps - - - - TCP FIN timeout (sec) - TCP FIN таймаут (секунд) - - - - Path - Путь - - - - vconfig: - - - - - brctl: - - - - - ifenslave: - - - - - modprobe: - modprobe: - - - - logger: - logger: - - - - ip: - ip: - - - lsmod - lsmod - - - - iptables: - iptables: - - - - Specify directory path and a file name for each utility on your firewall machine. Leave these empty if you want to use default values. - Укажите полный путь к перечисленным утилитам в операционной системе этого межсетевого экрана. Для незаполненных полей будут использованы значения по-умолчанию. - - - - iptables-restore: - iptables-restore: - - - - IPv4 Packet forwarding - - - - - IPv6 Packet forwarding - - - - - whats this text - whats this comment - - - - - :ip6tables - - - - - lsmod: - - - - - ipset: - - - - - :ip6tables-restore - - - - - This parameter is used if you run conntrackd in state <br> -synchronization mode for a firewall cluster and have<br> -kernel &lt;2.6.22<br> -Explanation of this parameter can be found at<br> -<a href="http://conntrack-tools.netfilter.org/manual.html">http://conntrack-tools.netfilter.org/manual.html</a> - - - - - - Help - Справка - - - - conntrack - - - - - CONNTRACK_MAX - - - - - CONNTRACK_MAX is the maximum number of "sessions" (connection tracking entries) -that can be handled simultaneously by netfilter in kernel memory. - - - - - HASHSIZE - - - - - the size of the hash table storing the lists of conntrack entries - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">These parameters allow you to tune performance of<br />conntrack module (netfilter state tracking). This<br />should only be necessary for large firewalls with a lot<br />of traffic and many stateful rules.<br />Explanation of these parameters can be found on</p> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;">the Internet if you search for &quot;netfilter conntrack performance&quot;<br /><br />Set both to zero to use default values</p></body></html> - - - - - Disable TCP window tracking ("ip_conntrack_tcp_be_liberal") - - - - - linux24IfaceOptsDialog - - - Input not valid: %1 - - - - - linux24IfaceOptsDialog_q - - - Linux: interface settings - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Device Type - - - - - VLAN ID - - - - - Enable STP - - - - - Bonding policy: - - - - - balance-rr - - - - - active-backup - - - - - balance-xor - - - - - broadcast - - - - - 802.3ad - - - - - balance-tlb - - - - - balance-alb - - - - - Xmit hash policy: - - - - - layer2 - - - - - layer3+4 - - - - - Other parameters: - - - - - longTextDialog_q - - - longTextDialog_q - longTextDialog_q - - - - Continue - Продолжить - - - - this is the error text - минут - - - - macosxAdvancedDialog_q - - - MacOS X: advanced settings - MacOS X: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Options - Опции - - - - Generate ICMP redirects - Отправлять пакеты ICMP redirect - - - - Packet forwarding - Маршрутизация пакетов - - - - - - No change - Без изменений - - - - - - On - Включить - - - - - - Off - Выключить - - - - Forward source routed packets - Маршрутизировать пакеты с маршрутизацией источника - - - - Path - Путь - - - - ipfw: - ipfw: - - - - sysctl: - sysctl: - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - Укажите полный путь к перечисленным утилитам в операционной системе этого межсетевого экрана. Для незаполненных полей будут использованы значения по-умолчанию. - - - - newClusterDialog - - - do not use any, i will create new policy and NAT rules - - - - - Depending on the failover protocol, cluster interface may or may not need an IP address. <b>VRRP</b>, <b>CARP</b>, <b>heartbeat</b> interfaces should have their own unique IP addresses different from the member firewall interfaces. Other failover protocols such as the one used in <b>Cisco ASA (PIX) firewall</b> do not require additional IP address.<br><br>List of available failover protocols depends on the firewall platform. - Depending on the failover protocol, cluster interface may or may not need an IP address. <b>VRRP</b> and <b>CARP</b> interfaces should have their own unique IP addresses different from the member firewall interfaces. Other failover protocols such as <b>heartbeat</b> or <b>OpenAIS</b> do not create new interface and therefore do not require additional IP address. <br><br>List of available failover protocols depends on the firewall platform. - - - - - regular - - - - - dynamic - - - - - unnumbered - - - - - with address: - - - - - with addresses: - - - - - You should select at least one firewall to create a cluster - - - - - newClusterDialog_q - - - TextLabel - - - - - Enter the name of the new object - - - - Browse - Выбрать - - - - < &Back - < Назад - - - - &Next > - Дальше > - - - - &Finish - Готово - - - - &Cancel - - - - - Select member firewall objects to use with the new cluster. One member firewall should be marked as master. You can choose to copy policy and NAT rules from the rule sets of one of the members to the new cluster later. - - - - - Firewall - - - - - Use in cluster - - - - - Master - - - - - - Tab 1 - - - - - Choose which member's policy and NAT rules should be used to create policy and nat rules of the cluster. First, each member firewall object will be copied with the name "<firewall>-bak" (where <firewall> is the name of the member) for backup, then rules from the chosen member will be copied to the new cluster and finally all policy and NAT rules will be deleted in both members. Backup firewall objects ensure that you do not lose your configuration and can always revert back if necessary. You can delete backup objects or move them to a separate library for archival later. - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Lucida Grande'; font-size:13pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-weight:600;">Cluster summary:</span></p></body></html> - - - - - Name: - - - - - Firewalls used in this cluster - - - - - Master firewall: - - - - - Cluster interfaces - - - - - Policy and NAT rules will be copied from firewall: - - - - - Click Finish to create this cluster. - - - - - newFirewallDialog - - - Missing SNMP community string. - Не указана строка SNMP community. - - - - - Address of %1 could not be obtained via DNS - Для имени %1 не может быть получен адрес при помощи DNS запроса - - - - Interface: %1 (%2) - Интерфейс: %1 (%2) - - - - Dynamic address - Динамический адрес - - - - Unnumbered interface - Интерфейс без адреса - - - Illegal address '%1/%2' - Некорректный адрес %1/%2 - - - Check option 'dynamic address' for the interface that gets its IP address dynamically via DHCP or PPP protocol. - Включите опцию 'Динамический адрес' для интерфейсов получающих IP адрес динамически. Чаще всего это необходимо для интерфейсов, которые получают адрес через DHCP запрос или используют PPP. - - - Check option 'Unnumbered interface' for the interface that does not have an IP address. Examples of interfaces of this kind are those used to terminate PPPoE or VPN tunnels. - Включите опцию 'Интерфейс без адреса' для интерфейсов не имеющих IP адреса. Чаще всего это необходимо для интерфейсов, которые используются для создания: PPPoE или VPN туннелей, мостов. - - - Bridge port - Порт моста - - - - FWBuilder template files - - - - - FWBuilder template files (*.xml *.fwb *.fwl) - - - - - Please select template - - - - - - &Continue - - - - - Dynamic interface gets its IP address by means of DHCP or PPP protocol and does not require an address here. Regular interface has statically configured IP address which should be entered on this page. Interface can have several IPv4 and IPv6 addresses. - - - - - Error loading template library: -%1 - - - - - Here you can change IP address of the template interface to match addresses used on your network. Interface can have several IPv4 and IPv6 addresses. - - - - - - - Invalid address '%1/%2' - - - - - Can not find interface %1 in the interface editor data - - - - - newFirewallDialog_q - - New Firewall - Новый межсетевой экран - - - - Enter the name of the new object below: - Имя создаваемого объекта: - - - - Choose firewall software it is running: - Тип межсетевого экрана: - - - - Choose OS the new firewall runs on: - Операционная система межсетевого экрана: - - - - Use preconfigured template firewall objects - Использовать шаблоны межсетевых экранов - - - - Next step is to add interfaces to the new firewall. There are two ways to do it: using SNMP query or manually. Adding them using SNMP query is fast and automatic, but is only possible if firewall runs SNMP agent and you know SNMP community string 'read'. - Теперь необходимо добавить интерфейсы для создаваемого межсетевого экрана. Это можно сделать автоматически, используя SNMP запрос или вручную. SNMP запрос выполнится только для межсетевых экранов с включенным SNMP сервисом и правильно указанной строкой community (для чтения). - - - - Configure interfaces manually - Сконфигурировать интерфейсы вручную - - - - Use SNMP to discover interfaces of the firewall - Использовать SNMP запрос для получения конфигурации интерфейсов - - - - Discover Interfaces using SNMP - Использовать SNMP запрос для получения конфигурации интерфейсов - - - - SNMP 'read' community string: - SNMP строка community (для чтения): - - - Check option 'Unnumbered interface' for the interface that does not have an IP address. Examples of interfaces of this kind are those used to terminate PPPoE or VPN tunnels and interfaces of the bridging firewall. - Включите опцию 'Интерфейс без адреса' для интерфейсов не имеющих IP адреса. Чаще всего это необходимо для интерфейсов, которые используются для создания: PPPoE или VPN туннелей, мостов. - - - Check option 'dynamic address' for the interface that gets its IP address dynamically via DHCP or PPP protocol. - Включите опцию 'Динамический адрес' для интерфейсов получающих IP адрес динамически. Чаще всего это необходимо для интерфейсов, которые получают адрес через DHCP запрос или используют PPP. - - - Click 'Next' when done. - Для продолжения нажмите 'Далее'. - - - Name: - Название: - - - Label: - Метка: - - - Address: - Адрес: - - - Unnumbered interface - Интерфейс без адреса - - - This is unnumbered interface, that is, it does not have an IP address. You can use this for interfaces that terminate PPPoE or other VPN tunnels - Это интерфейс без адреса, то есть он не имеет IP адреса. Включаите эту опцию для интерфейсов, которые используются для создания: PPPoE или VPN туннелей, мостов - - - - Name - Название - - - - Label - Метка - - - - Address - Адрес - - - Netmask - Маска подсети - - - Dyn - Dyn - - - MAC - MAC - - - MAC: - MAC: - - - Dynamic address - Динамический адрес - - - Address of this interface is assigned dynamically using DHCP or PPP protocol - Интерфейс получаюет IP адрес динамически. Включаите эту опцию для интерфейсов, которые получают адрес через DHCP запрос или используют PPP - - - Netmask: - Маска подсети: - - - Add - Добавить - - - Update - Обновить - - - Delete - Удалить - - - Here you can add or edit interfaces manually. 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. Label is mandatory for PIX firewall. - Здесь вы можете редактировать интерфейсы вручную. 'Название' соответствует названию физического интерфейса, например: 'eth0' или 'fxp0'. Метка маркирует интерфейс для отражения сетевой топологии (например 'внешний' или 'внутренний'). Указание метки обязательно для межсетевого экрана PIX. - - - - up - вверх - - - - down - вниз - - - - Security Level - Уровень безопасности - - - Click 'Finish' when done. - Для продолжения нажмите 'Готово'. - - - - In order to be able to build firewall policy properly, Firewall Builder needs information about 'security level' of the firewall's interfaces. Interface that connects it to the Internet is considered 'insecure' and has security level '0', while interface connected to the internal network is supposed to be 'secure' (security level '100'). You can arrange interfaces in the order of their security level below. - Каждому интерфейсу межсетевого экрана должен быть назначен уровень безопасности в диапазоне от 0 до 100. 0 означает меньшую безопасность, 100 - бОльшую. Нулевой уровень безопасности чаще всего присваивается интерфейсу, подключенному к сети Internet. Распределите интерфейсы в порядке их уровня безопасности ниже. - - - Choose template object in the list and click 'Finish' when ready. Template objects use generic interface names that will be iherited by the firewall object you create. You may need to rename them later to reflect real names of interfaces on your firewall machine. - Выберите объект - шаблон и нажмите 'Готово'. После добавления шаблона необходимо проверить и при необходимости переименовать названия интерфейсов межсетевого экрана. - - - Bridge port - Порт моста - - - Regular interface - Обычный интерфейс с адресом - - - - TextLabel - - - - - Firewall IP address: - - - - - - 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. Label is mandatory for PIX firewall. - - - - - Choose template object in the list and click 'Next' when ready. - -You can change interface names and their IP addresses on the next page. Template firewall object comes with basic policy and NAT rules that implement policy described in its comment. If you change IP addresses of its interfaces, policy and NAT rules will be automatically corrected to reflect this change. However you should always inspect the rules and adjust them to suite your security policy. Template objects are designed to be a starting point, a way to jump-start your configuration and most likely require changes to be useful in your environment. - - - - - - < &Back - < Назад - - - - &Next > - Дальше > - - - - &Finish - Готово - - - - &Cancel - - - - - Template file: - - - - - Browse - Выбрать - - - - Use standard template library - - - - - - Tab 1 - - - - - newGroupDialog_q - - - New Group - Новая группа - - - - Library: - Библиотека: - - - - Group Name: - Название группы: - - - - This operation will create a new group and put selected objects in it - Эта операция создаст группу и добавить в нее выбранные объекты - - - - Create a group - Новая группа - - - - Cancel - Отмена - - - - newHostDialog - - - Missing SNMP community string. - Не указана строка SNMP community. - - - - Address of %1 could not be obtained via DNS - Для имени %1 не может быть получен адрес при помощи DNS запроса - - - - Interface: %1 (%2) - Интерфейс: %1 (%2) - - - - Dynamic address - Динамический адрес - - - - Unnumbered interface - Интерфейс без адреса - - - - - - Illegal address '%1/%2' - Некорректный адрес %1/%2 - - - - FWBuilder template files - - - - - FWBuilder template files (*.xml *.fwb) - - - - - newHostDialog_q - - New Host - Новый узел - - - - Enter the name of the new object below: - Имя создаваемого объекта: - - - - Use preconfigured template host objects - Использовать шаблоны межсетевых экранов - - - - Next step is to add interfaces to the new host. There are two ways to do it: using SNMP query or manually. Adding them using SNMP query is fast and automatic, but is only possible if the host runs SNMP agent and you know SNMP community string 'read'. - Теперь необходимо добавить интерфейсы для создаваемого межсетевого экрана. Это можно сделать автоматически, используя SNMP запрос или вручную. SNMP запрос выполнится только для межсетевых экранов с включенным SNMP сервисом и правильно указанной строкой community (для чтения). - - - - Configure interfaces manually - Сконфигурировать интерфейсы вручную - - - - Use SNMP to discover interfaces of the host - Использовать SNMP запрос для получения конфигурации интерфейсов - - - - Discover Interfaces using SNMP - Использовать SNMP запрос для получения конфигурации интерфейсов - - - - SNMP 'read' community string: - SNMP строка community (для чтения): - - - - Check option 'Unnumbered interface' for the interface that does not have an IP address. Examples of interfaces of this kind are those used to terminate PPPoE or VPN tunnels. - Включите опцию 'Интерфейс без адреса' для интерфейсов не имеющих IP адреса. Чаще всего это необходимо для интерфейсов, которые используются для создания: PPPoE или VPN туннелей, мостов. - - - - Check option 'dynamic address' for the interface that gets its IP address dynamically via DHCP or PPP protocol. - Включите опцию 'Динамический адрес' для интерфейсов получающих IP адрес динамически. Чаще всего это необходимо для интерфейсов, которые получают адрес через DHCP запрос или используют PPP. - - - - Click 'Next' when done. - Для продолжения нажмите 'Далее'. - - - Name: - Название: - - - Label: - Метка: - - - Address: - Адрес: - - - Unnumbered interface - Интерфейс без адреса - - - This is unnumbered interface, that is, it does not have an IP address. You can use this for interfaces that terminate PPPoE or other VPN tunnels - Это интерфейс без адреса, то есть он не имеет IP адреса. Включаите эту опцию для интерфейсов, которые используются для создания: PPPoE или VPN туннелей, мостов - - - Name - Название - - - Label - Метка - - - Address - Адрес - - - Netmask - Маска подсети - - - Dyn - Dyn - - - MAC - MAC - - - MAC: - MAC: - - - Dynamic address - Динамический адрес - - - Address of this interface is assigned dynamically using DHCP or PPP protocol - Интерфейс получаюет IP адрес динамически. Включите эту опцию для интерфейсов, которые получают адрес через DHCP запрос или используют PPP - - - Netmask: - Маска подсети: - - - Add - Добавить - - - Update - Обновить - - - Delete - Удалить - - - - Here you can add or edit interfaces manually. 'Name' corresponds to the name of the physical interface, such as 'eth0', 'fxp0', 'ethernet0' etc. 'Label' is used to mark interface to reflect network topology, e.g. 'outside' or 'inside'. - Здесь вы можете редактировать интерфейсы вручную. 'Название' соответствует названию физического интерфейса, например: 'eth0' или 'fxp0'. Метка маркирует интерфейс для отражения сетевой топологии (например 'внешний' или 'внутренний'). Указание метки обязательно для межсетевого экрана PIX. - - - - Choose template object in the list and click 'Finish' when ready. Template objects use generic interface names that will be iherited by the firewall object you create. You may need to rename them later to reflect real names of interfaces on your firewall machine. - Выберите объект - шаблон и нажмите 'Готово'. После добавления шаблона необходимо проверить и при необходимости переименовать названия интерфейсов межсетевого экрана. - - - - TextLabel - - - - - < &Back - < Назад - - - - &Next > - Дальше > - - - - &Finish - Готово - - - - &Cancel - - - - - Template file: - - - - - Browse - Выбрать - - - - Use standard template library - - - - - Tab 2 - Tab 2 - - - - openaisOptionsDialog - - - Invalid IP address '%1' - - - - - &Continue - - - - - openaisOptionsDialog_q - - - openais protocol settings - - - - - &OK - - - - - &Cancel - - - - - openais Parameters - - - - - Address: - - - - - Port number (udp): - - - - - openbsdAdvancedDialog_q - - - OpenBSD: advanced settings - OpenBSD: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Options - Опции - - - - Forward source routed packets - Маршрутизировать пакеты с маршрутизацией источника - - - - Enable directed broadcast - Разрешить направленные широковещательные пакеты - - - - - - - - No change - Без изменений - - - - - - - - On - Включить - - - - - - - - Off - Выключить - - - Packet forwarding - Маршрутизация пакетов - - - - Generate ICMP redirects - Отправлять ICMP redirect-ы - - - - Path - Путь - - - - pfctl: - pfctl: - - - - sysctl: - sysctl: - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - Укажите полный путь к перечисленным утилитам в операционной системе этого межсетевого экрана. Для незаполненных полей будут использованы значения по-умолчанию. - - - - IPv4 Packet forwarding - - - - - IPv6 Packet forwarding - - - - - openbsdIfaceOptsDialog_q - - - OpenBSD: interface settings - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Device Type - - - - - VLAN ID - - - - - Enable STP - - - - - pageSetupDialog_q - - - Page Setup - Настройка страницы - - - - start each section on a new page - начинать каждую секцию на новой странице - - - - print header on every page - печатать заголовок на каждой странице - - - - print legend - печатать условные обозначения - - - - print objects used in rules - печатать объекты, использованные в правилах - - - - &OK - OK - - - - Alt+O - Alt-O - - - - &Cancel - Отмена - - - - Alt+C - Alt+C - - - - Scale tables: - Масштаб: - - - 50% - 50% - - - 75% - 75% - - - 100% - 100% - - - 150% - 150% - - - 200% - 200% - - - - TextLabel - - - - - pfAdvancedDialog - - - - Script Editor - Редактор скриптов - - - - pfAdvancedDialog_q - - - pf: advanced settings - pf: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Compiler - Компилятор - - - - Compiler: - Компилятор: - - - - Command line options for the compiler: - Опции командной строки для компилятора: - - - - Always permit ssh access from -the management workstation -with this address: - Всегда разрешать доступ -по протоколу SSH с управляющей -рабочей станции с адресом: - - - Aggressive - Агресивный - - - Conservative - Консервативный - - - For high latency - С высокой латентностью - - - Normal - Нормальный - - - - Optimization: - Оптимизация: - - - state table size: - размер таблицы состояний: - - - - maximum number of entries in the memory pool used for state table entries - макисмальное количество записей в пуле памяти, используемого для записей таблицы состояний - - - reassembly pool: - пересобирающий пул: - - - - maximum number of entries in the memory pool used for packet reassembly - макисмальное количество записей в пуле памяти, используемого пересборки пакетов - - - - Accept TCP sessions opened prior to firewall restart - Не сбрасывать TCP сессии открытые до загрузки нового набора правил межсетевого экрана - - - - Modulate state for all stateful rules (applies only to TCP services) - Моделировать состояние для всех правил с фильтрацией по состоянию (только для TCP сервисов) - - - - Detect rule shadowing in policy - Находить 'затенение' правил в наборе - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - Затенение происходит, когда одно правило идущее ранее делает одно или несколько следующующих правил не рабочими. Это происходит из-за того, что пакеты, которые должны попадать под условия следующих правил будут попадать под условие первого правило. - - - - Ignore empty groups in rules - Игнорировать пустые группы в правилах - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - При выключении этой опции компилятор будет воспринимать пустые группы в наборе правил как ошибку, а при включении - будет удалять при компиляции пустые группы из всех правил. Во втором случае если после удаления группы правило окажется пустым в том месте, где была группа (окажется с полем любой), то такое правило будет игнорироваться. Используйте эту опцию очень внимательно и осторожно! - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - Имя файла (по-умолчанию, если пустое, имя будет состоять из названия объекта межсетевого экрана и расширения '.fw') - - - Pass all outgoing - Разрешить все исходящие - - - Generate both 'in' and 'out' rules - Генерировать правила как входящие, так и исходящие - - - There are two ways compiler can generate code for rules in the Global Policy: it can either create two ipf rules to control both incoming and outgoing packets for each rule, or it can create only one ipf rule for incoming packets and permit all outgoing ones.You get more control over the packets crossing the firewall in the first mode, but generated script is going to be smaller if you choose the second. - Компиляция правил глобальной политики может проходить двумя путями: или путем создания двух правил межсетевого экрана для входящих и исходящих пакетов соответственно для каждого правила политики или путем создания одного правила для входящих пакетов (в этом случае все исходящие пакеты будут разрешены). В первом случае вы лучше контролируете межсетевой экран, во втором - уменьшается создаваемый скрипт. - - - Scrub rule options - Подчищать опции правил - - - - Enforce Minimum TTL: - Задать минимальный TTL: - - - - Enforce Maximum MSS: - Задать максимальный MSS: - - - - Enforces a maximum Maximum Segment Size (MSS) in TCP packet headers. - Задает максимальный размер сегмента (MSS) в заголовках TCP пакетов. - - - - Enforces a minimum Time To Live (TTL) in IP packet headers. - Задает минимальное время жизни (TTL) в заголовках IP пакетов. - - - - Reassemble fragments - Пересобирать фрагменты - - - - Clear DF bit - Очищать бит DF - - - - Clears the don't fragment bit from the IP packet header. - Очищать бит не фрагментированный в заголовках IP-пакетов. - - - - Use random ID - Использовать случайный ID - - - - Replaces the IP identification field of outgoing packets with random values to compensate for operating systems that use predictable values. - Заменить значение поля идентификации исходящих IP пакетов на случайное значение для защиты от атак на операционные системы, использующие легко предсказуемые значения. - - - - Buffer and reassemble fragments (default) - Буферизовать и пересобирать фрагменты (по-умолчанию) - - - Buffers incoming packet fragments and reassembles them into a complete packet before passing them to the filter engine. - Буферизовать входящие фрагменты пакетов и пересобирать их в целый пакет перед отправкой в фильтр межсетевого экрана. - - - - Drop duplicate fragments, do not buffer and reassemble - Блокировать дубликаты фрагментов, не буферизовать и не пересобирать их - - - Causes duplicate fragments to be dropped and any overlaps to be cropped. - Блокировать дубликаты фрагментов и вырезать любые наложения фрагментов. - - - - Drop duplicate and subsequent fragments - Блокировать дубликаты и последующие за ними фрагменты - - - Similar to 'Drop duplicate fragments' except that all duplicate or overlapping fragments will be dropped as well as any further corresponding fragments. - То же, что и Блокировать дубликаты фрагментов, но также будут блокироваться все накладывающиеся и все последующие за ними фрагменты. - - - - Timeouts - Таймауты - - - - When a packet matches a stateful connection, the seconds to live for the connection will be updated to the value which corresponds to the connection state. - При соответствии пакета фильруемому по состоянию соединению, количество секунд жизни соединения будет обновлено и установлено в значение, которое соответствует состоянию соединения. - - - - TCP - TCP - - - - - - - first - first - - - - - - - - - The state after the first packet. - Состояние после первого пакета. - - - - opening - opening - - - - The state before the destination host ever sends a packet. - Состояние перед тем, как узел назначения ответил на пакет. - - - - established - established - - - - The fully established state. - Состяние успешно установленного соединения. - - - - The state after the first FIN has been sent. - Состояние после отправки первого пакета с установленным флагом FIN. - - - - closing - closing - - - - The state after both FINs have been exchanged and the connection is closed. - Состояние после отправки обоих пакетов с установленным флагом FIN и закрытия соединения. - - - - finwait - finwait - - - - The state after one endpoint sends an RST. - Состояние после отправки одной из сторон пакета с установленным флагом RST. - - - - closed - closed - - - - UDP - UDP - - - - - single - single - - - - The state if the source host sends more than one packet but the destination host has never sent one back. - Состояние после отправики одной из сторон нескольких пакетов и неполучении от второй стороны ни одного пакета в ответ. - - - - - multiple - multiple - - - - The state if both hosts have sent packets. - Состояние после отправки обеими сторонами пакетов. - - - - ICMP - ICMP - - - - The state after an ICMP error came back in response to an ICMP packet. - Состояние после получения ICMP сообщения об ошибке в ответ на отправленный ICMP пакет. - - - - error - ошибка - - - - Other Protocols - Другие протоколы - - - - Fragments - Фрагменты - - - - reassembly timeout - таймаут пересборки - - - - state expiration timeout - таймаут для состояния соединения - - - - seconds between purges of expired states and packet fragments. - количество секунд для таймаута очистки состояния соединения и фрагментов пакетов. - - - - seconds before an unassembled fragment is expired. - количество секунд для таймаута несобранных фрагментов. - - - - Adaptive scaling - Адаптивное масштабирование - - - - Timeout values can be reduced adaptively as the number of state table entries grows (see man page pf.conf(5) for details) - Значения таймаутов могут изменяться адаптивно в зависимости от ситуации (количества записей в таблице состояний соединений, см. страницу руководства man pf.conf(5)) - - - - adaptive start - начало адаптивного масштабирования - - - - When the number of state entries exceeds this value, adaptive scaling begins. - Когда, количество записей в таблице соединений превысит это значение, включится адаптивное масштабирование. - - - - adaptive end - конец адаптивного масштабирования - - - - When reaching this number of state entries, all timeout val- ues become zero, effectively purging all state entries imme- diately. - Когда, количество записей в таблице соединений достигнет этого значения, все таймауты записей в таблице соединений установятся в ноль, таким образом произойдет немедленная и эффективная её очистка. - - - - Activate adaptive timeout scaling - Включить адаптивное масштабирование таймаутов - - - - Installer - Установщик - - - - Command line options for the script: - Опции командной строки для скрипта: - - - Directory on the firewall where configuration files should be installed - Каталог на межсетевом экране, в который должны быть установлены файлы конфигурации - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - Имя пользователя, используемое для аутентификации на межсетевом экране (не заполняйте, если используете putty сессию): - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - Альтернативный адрес или имя межсетевого экрана для связи с ним (в Windows поддерживаются названия сессий putty) - - - - Policy install script (using built-in installer if this field is blank): - Скрипт установки набора правил (не заполняйте для использования встроенного скрипта установки): - - - - A command that installer should execute on the firewall in order to activate the policy (if this field is blank, installer runs firewall script in the directory specified above; it uses sudo if user name is not 'root') - Команда, используемая установщиком для загрузки нового набора правил (если это поле пустое, установщик будет выполнять скрипт межсетевого экрана в указанном выше каталоге, он также будет использовать sudo, если имя пользователя не root) - - - - Logging - Запись в журнал (протоколирование) - - - - Log Prefix - Log prefix - - - - Fallback "deny all" rule should log blocked packets - Записывать в журнал блокированные пакеты (только правилом по-умолчанию блокировать все) - - - Script Options - Опции скрипта - - - - Add virtual addresses for NAT - Добавлять виртуальные адреса для NAT - - - - Configure Interfaces of the firewall machine - Конфигурировать интерфейсы межсетевого экрана - - - - Turn debugging on in generated script - Включить режим отладки в генерируемом скрипте - - - - These options enable auxiliary sections in the generated shell script. - Эти опции подключают внешние секции в генерируемом shell-скрипте. - - - - Prolog/Epilog - Prolog/Epilog - - - - - Edit - Редактировать - - - - The following commands will be added verbatim after generated configuration - Следующие команду будут добавлены в конец генерируемого скрипта конфигурации - - - - The following commands will be added verbatim on top of generated configuration - Следующие команду будут добавлены в начало генерируемого скрипта конфигурации - - - - External install script - Внешний скрипт для установки - - - - Built-in installer - Встроенный установщик - - - - Directory on the firewall where script should be installed - Каталог на межсетевом экране, в которые должны быть установлены файлы конфигурации - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - state table size: - размер таблицы состояний: - - - - reassembly pool: - пул пересборки: - - - - Limits - Ограничения - - - - (if left blank, the file name is constructed of the firewall object name and extension ".fw") - - - - - Output file name: - - - - - Buffers incoming packet fragments and reassembles them into a complete packet before passing them to the filter engine. In PF 4.5 and earlier. - - - - - Causes duplicate fragments to be dropped and any overlaps to be cropped. In PF 4.5 and earlier. - - - - - Similar to 'Drop duplicate fragments' except that all duplicate or overlapping fragments will be dropped as well as any further corresponding fragments. In PF 4.5 and earlier. - - - - - Statefully normalises TCP connections. - - - - - Reassemble TCP - - - - - table-entries - - - - - maximum number of addresses that canbe stored in tables - - - - - maximum number of entries in the memory pool used for tracking source IP addresses - - - - - maximum number of tables that can exist in the memory simultaneously - - - - - tables - - - - - src-nodes - - - - - Insert prolog and epilog scripts - - - - - in the activation shell script (.fw file) - - - - - in the pf rule file (.conf file) - - - - - Scrub - Чистить [SCRUB] - - - - Additional command line parameters for scp - - - - - Script - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Help - Справка - - - - Flush pf states after reloading rules - - - - - Generated script (.fw file) and configuration (.conf) file can be copied to the firewall machine under different names. If these fields are left blank, the file name does not change. - - - - - Script (.fw) file name on the firewall - - - - - .conf file name on the firewall - - - - - Configure CARP Interfaces - - - - - Configure pfsync Interfaces - - - - - Configure VLAN Interfaces - - - - - State policy: - - - - - States can be bound to interfaces or match packets on any interface. The latter can be useful in case of an assymmetric routing. - - - - - pfsyncOptionsDialog_q - - - pfsync protocol settings - - - - - &OK - - - - - &Cancel - - - - - pfsync Parameters - - - - - By default pfsync updates are multicast on the local network. This option overrides that behavior and instead unicasts the update to the specified peer. - - - - - Use unicast address to communicate with the peer - - - - - pixAdvancedDialog - - - - Script Editor - Редактор скриптов - - - Error: Policy compiler for PIX is not installed - Ошибка: компилятор наборов правил для межсетевого экрана PIX не установлен - - - Compiler error - Ошибка компиляции - - - - pixAdvancedDialog_q - - - PIX Firewall Settings - Настройки межсетевого экрана PIX - - - - OK - OK - - - - Cancel - Отмена - - - Compiler Options - Опции компилятора - - - Always permit ssh access from -the management workstation -with this address: - Всегда разрешать доступ -по протоколу SSH с управляющей -рабочей станции с адресом: - - - - Verification of NAT rules - Проверка NAT правил - - - - Check for duplicate nat rules - Проверять на наличие дублирующих правил сетевой трансляции адресов (NAT) - - - - Check for overlapping global pools - Проверка наложений глобальных пулов - - - - Check for overlapping statics - Проверка наложений глобальных пулов и статики - - - Script formatting - Форматирование скрипта - - - - Comment the code - Комментировать код - - - - Insert comments into generated PIX configuration file - Вставить комментарии в генерируемый файл конфигурации межсетевого экрана PIX - - - - Use ACL remarks - Использовать ремарки ACL - - - - Use ACL remarks to relate ACL commands and policy rules in the GUI - Использовать ремарки ACL для задания отношений между командами скрипта и набором правил в GUI - - - - Group similar commands together - Группировать схожие команды вместе - - - - Group PIX commands in the script so that similar commands appear next to each other, just like PIX does it when you use 'show config' - Группировать команды в скрипте, так чтобы схожие команды шли друг за другом, подобно тому, как межсетевой экран PIX вывходит конфигурацию по команде show config - - - - Policy Compiler Options - Опции компилятора набора правил - - - - Emulate outbound ACLs - Эмулировать исходящие ACL - - - - Normally PIX does not support ouotbound ACL, however policy compiler can emulate them if this option is turned on - Обычно межсетевой экран не поддерживает исходящих ACL, однако компилятор набора правил может эмулировать их, если эта опция включена - - - - Assume firewall is part of 'any' - Считать межсетевой экран частью 'любого' - - - - Generate rules assuming the firewall is part of "Any". This makes a difference in rules that use services 'ssh' and 'telnet' since PIX uses special commands to control ssh and telnet access to the firewall machine - Генерировать правила считая межсетевой экран частью любого. Межсетевой экран PIX использует специальные команды для контроля доступа по протоколам ssh и telnet к самому межсетевому экрану - - - Replace NAT'ted objects with their -translations in policy rules - Заменить транслируемые объекты (NAT) на -их трасляции (другие объекты) в наборе правил - - - - PIX inspects packets with ACLs before it does NAT, while many other firewalls do NAT first and then apply ACLs. Policy compiler can emulate the latter behaviour if this options is turned on. - включите эту опцию, чтобы компилятор добавлял команды clear для удаления уже существующих ACL и NAT команд - - - Generate 'clear' commands - Генерировать команды clear - - - - Optimize 'default nat' rules - Оптимизировать правила default nat - - - - In nat rules where network zone object is used in OSrc, ODst and OSrv are 'any' and TSrc defines a global pool for the translation, replace object in OSrc with 'any' to produce PIX command "nat (interface) N 0.0.0.0 0.0.0.0" - В правилах сетевой трансляции адресов, когда объект сетевая зона используется в OSrc, ODst и OSrv является любым и TSrc определяет глобальный пул для трасляции, заменять объект в OSrc на любой для формирования команды PIX "nat (interface) N 0.0.0.0 0.0.0.0" - - - - Ignore empty groups in rules - Игнорировать пустые группы в правилах - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - При выключении этой опции компилятор будет воспринимать пустые группы в наборе правил как ошибку, а при включении - будет удалять при компиляции пустые группы из всех правил. Во втором случае если после удаления группы правило окажется пустым в том месте, где была группа (окажется с полем любой), то такое правило будет игнорироваться. Используйте эту опцию очень внимательно и осторожно! - - - - Detect rule shadowing in the policy - Находить 'затенение' правил в наборе - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - Затенение происходит, когда одно правило идущее ранее делает одно или несколько следующующих правил не рабочими. Это происходит из-за того, что пакеты, которые должны попадать под условия следующих правил будут попадать под условие первого правило. - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - Имя файла (по-умолчанию, если пустое, имя будет состоять из названия объекта межсетевого экрана и расширения '.fw') - - - - Installer - Установщик - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - Имя пользователя, используемое для аутентификации на межсетевом экране (не заполняйте, если используете putty сессию): - - - - Command line options for the script: - Опции командной строки для скрипта: - - - Policy install script (using built-in installer if this field is blank): - Скрипт установки набора правил (не заполняйте для использования встроенного скрипта установки): - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - Альтернативный адрес или имя межсетевого экрана для связи с ним (в Windows поддерживаются названия сессий putty) - - - - Prolog/Epilog - Prolog/Epilog - - - - - Edit - Редактировать - - - - The following commands will be added verbatim on top of generated configuration - Следующие команду будут добавлены в начало генерируемого скрипта конфигурации - - - - The following commands will be added verbatim after generated configuration - Следующие команду будут добавлены в конец генерируемого скрипта конфигурации - - - - Timeouts - Таймауты - - - - Set all to defaults.. - Установить всё в значения по-умолчанию. - - - - xlate - xlate - - - - Normally PIX does not support outbound ACL, however policy compiler can emulate them if this option is turned on - - - - - Policy install script (built-in installer will be used if blank): - - - - - conn - conn - - - - udp - udp - - - - rpc - rpc - - - - h323 - h323 - - - - - sip - sip - - - - sip&media - sip&media - - - - unauth - unauth - - - - telnet - telnet - - - - ssh - ssh - - - - ss - секунд - - - - mm - минут - - - - hh - часов - - - - half-closed - полузакрытое - - - - Inactivity - Inactivity - - - - Absolute - Absolute - - - Fixup - Fixup - - - - ctiqbe - ctiqbe - - - - - - - - - - - - - - - - - - - - - - skip - пропустить - - - - - - - - - - - - - - - - - - - - - - enable - включить - - - - - - - - - - - - - - - - - - - - - - disable - отключить - - - - Computer Telephony Interface Quick Buffer Encoding (CTIQBE) protocol inspection module that supports NAT, PAT, and bi-directional NAT. - Инспекция протокола Computer Telephony Interface Quick Buffer Encoding (CTIQBE). Поддерживает NAT, PAT и двунаправленный NAT. - - - - - - - - - - - - - - - - - - port: - порт: - - - - dns - dns - - - - Based on this maximum-length configured by the user, the DNS fixup checks to see if the DNS packet length is within this limit. Every UDP DNS packet (request/response) undergoes the above check. - Указанная масимальная длина, определяет максимальный размер DNS пакета. Любой UDP DNS пакет будет проверяться на это условие исправлением DNS. - - - - max length: - максимальная длина: - - - - esp ike - esp ike - - - - Enables PAT for Encapsulating Security Payload (ESP), single tunnel. - Включить PAT для одного туннеля Encapsulating Security Payload (ESP). - - - - ftp - ftp - - - - strict: - strict: - - - - Activated support for FTP protocol and allows to change the ftp control connection port number. - Расширенная поддержка FTP протокола, позволяет изменять номер порта контролирующего соединения. - - - - h323 h225 - h323 h225 - - - - Specifies to use H.225, the ITU standard that governs H.225.0 session establishment and packetization, with H.323 - Использовать H.225 для H.323 (H.225 - ITU стандарт, который определяет управление сессиями и пакетами H.225.0) - - - - - - - - - - - -- - -- - - - - h323 ras - h323 ras - - - - Specifies to use RAS with H.323 to enable dissimilar communication devices to communicate with each other. - Использовать RAS с H.323 для разрешения связи различных устройств друг с другом. - - - - http - http - - - - The default port for HTTP is 80. Use the port option to change the HTTP port, or specify a range of HTTP ports. - Портом по-умолчанию для протокола HTTP является 80. Используйте опцию порт для изменения порта HTTP или указания диапазона HTTP портов. - - - - icmp error - ошибка icmp - - - - Enables NAT of ICMP error messages. This creates translations for intermediate hops based on the static or network address translation configuration on the firewall. - Включить NAT для ICMP сообщений об ошибках. Конфигурация создается исходя из уже заданных сетевых трансляций адресов для межсетевого экрана. - - - - ils - ils - - - - Provides NAT support for Microsoft NetMeeting, SiteServer, and Active Directory products that use LightWeight Directory Access Protocol (LDAP) to exchange directory information with an for Internet Locator Service (ILS) server. - Включить NAT для продуктов Microsoft NetMeeting, SiteServer и Active Directory, которые используют LightWeight Directory Access Protocol (LDAP) для обмена информацией со службой каталога с/для сервера Internet Locator Service (ILS). - - - - mgcp - mgcp - - - - Enables the Media Gateway Control Protocol (MGCP) fixup. - Включить исправление для Media Gateway Control Protocol (MGCP). - - - - Gateway Port: - Порт маршрутизатора: - - - - Call Agent port: - Порт вызывающего агента: - - - - pptp - pptp - - - - Enables Point-to-Point Tunneling Protocol (PPTP) application inspection. - Включить инспекцию соединений PPTP на уровне приложений OSI. - - - - rsh - rsh - - - - Enables inspection of RSH protocol. - Включить инспекцию соединений по протоколу RSH. - - - - rtsp - rtsp - - - - Lets PIX Firewall pass Real Time Streaming Protocol (RTSP) packets. RTSP is used by RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, and Cisco IP/TV connections. - Разрешить прохождение пакетов протоколов Real Time Streaming Protocol (RTSP). RTSP используется для соединений RealAudio, RealNetworks, Apple QuickTime 4, RealPlayer, и Cisco IP/TV. - - - - Enable or change the port assignment for the Session Initiation Protocol (SIP) for Voice over IP TCP connections. - Включить или изменить назначение порта для Session Initiation Protocol (SIP) для TCP соединений VoIP. - - - - sip udp - sip udp - - - - Enable SIP-over-UDP application inspection. - Включить SIP-over-UDP инспекцию на уровне приложений. - - - - skinny - skinny - - - - Enable SCCP application inspection. SCCP protocol supports IP telephony and can coexist in an H.323 environment. An application layer ensures that all SCCP signaling and media packets can traverse the PIX Firewall and interoperate with H.323 terminals. - Включить SCCP инспекцию на уровне приложений. SCCP протокол поддерживает IP телефонию и может сосуществовать с имеющейся средой H.323. На уровне приложений проверяется, что управляющие и пакеты данных SCCP могут проходить через PIX и взаимодействовать с H.323 терминалами. - - - - smtp - smtp - - - - Enables the Mail Guard feature, which only lets mail servers receive the RFC 821, section 4.5.1, commands of HELO, MAIL, RCPT, DATA, RSET, NOOP, and QUIT. All other commands are translated into X's which are rejected by the internal server. - Включить режим Mail Guard, который разрешает почтовым серверам получать только команды, определенные в RFC821, секции 4.5.1: HELO, MAIL, RCPT, DATA, RSET, NOOP и QUIT. Все другие команды транслируются на внутренний сервер PIX, который их блокирует. - - - - sqlnet - sqlnet - - - - Enables support for SQL*Net protocol. - Включить поддержку протокола SQL *Net. - - - - tftp - tftp - - - - Enable TFTP application inspection. - Генерировать команды-исправления: - - - - Enable all protocols - Включить все протоколы - - - - Skip all protocols - Пропустить все протоколы - - - - Disable all protocols - Отключить все протоколы - - - - Logging - Запись в журнал (протоколирование) - - - Syslog - Syslog - - - Syslog host (name or IP address): - Имя узла syslog (имя или IP-адрес): - - - - syslog facility: - syslog facility: - - - - syslog level ('logging trap'): - syslog level (logging trap): - - - - Syslog message queue size (messages): - Размер очереди сообщений syslog (кол-во сообщений): - - - - Use 'EMBLEM' format for syslog messages - Использовать формат EMBLEM для сообщений syslog - - - - PIX Firewall Version 6.3 introduces support for EMBLEM format, which is required when using the CiscoWorks Resource Manager Essentials (RME) syslog analyzer. - Начиная с версии 6.3 межсетевого экрана PIX добавлена поддержка формата EMBLEM, который требуется для использования анализатора syslog из CiscoWorks Resource Manager Essentials (RME). - - - - Set device id for syslog messages (v6.3 and later): - Установить идентификатор для сообщений syslog (для PIX версий 6.3 и выше): - - - - use address of interface - использовать адрес для интерфейса - - - - use text string - использовать тектовую строку - - - - use hostname - использовать имя узла - - - - Replace NAT'ted objects with their translations in policy rules - - - - - Check for overlapping global pools and statics - test - - - - Always permit ssh access from the management workstation with this address: - - - - - Instead of running generated configuration on the firewall line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the firewall for this to work. This method works for PIX v7 or later and is much faster than running configuration line by line. - - - - - Copy generated configuration file to the firewall using scp - - - - - File system on the firewall where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "flash:": - - - - - The logging timestamp command requires that the clock command be set. - Команда записи в журнал времени протколирования требует установки команды clock. - - - - Enable logging timestamps on syslog file - Включить запись в файл журнала syslog времени протоколирования - - - - Other logging destinations and levels: - Другие назначения протоколирования и уровни: - - - - Internal buffer - Внутренний буфер - - - - Console - Консоль - - - - Script (additional) - - - - - Compiler can generate PIX configuration without commands that configures interfaces, timeouts and inspectors. These parts of configuration change rarely so it makes no sense to execute the same commands again and again. In addition, runnig the same commands on configuration reload cause errors. Use this option to generate shortened configuration to avoid errors and make update faster. - - - - - Generate only access-list, access-group, telnet, ssh, nat, global and static commands - - - - - PIX Options - Опции PIX - - - - Actively reset inbound TCP connections with RST - Активно сбрасывать входящие TCP соединения при помощи RST - - - - Actively reset inbound TCP connections with RST on outside interface - Активно сбрасывать входящие TCP соединения при помощи RST на внешнем интерфейсе - - - - Force each TCP connection to linger in a shortened TIME&WAIT - Установить каждое TCP соединение в медленное состояние TIME&WAIT - - - - Alt+W - Alt+W - - - - Enable the IP Frag Guard feature (deprecated in v6.3 and later). - Включить IP Frag Guard (запрещено в PIX версии 6.3 и выше). - - - - Enable TCP resource control for AAA Authentication Proxy - Включить контроль TCP ресурсов для AAA аутентифицирующего прокси - - - - Specify that when an incoming packet does a route lookup, -the incoming interface is used to determine which interface -the packet should go to, and which is the next hop -(deprecated in v6.3 and later). - Указывает, что когда для входящего пакета принимается -решение о его маршрутизации, тогда входящий интерфейс -используется для определения через какой интерфейс пакет -должен идти дальше и какой маршрутизатор является следующим -(запрещено в PIX версии 6.3 и выше). - - - - Disable inbound embedded DNS A record fixups - Выключить исправления входящих вложенных DNS A записей - - - - Disable outbound DNS A record replies - Выключить исходящие ответы с DNS A записями - - - - maximum number of simultaneous TCP and UDP connections - макимальное число одновременных TCP и UDP соединений - - - - maximum number of embryonic connections per host - макимальное число порождаемых соединений на узел - - - - Specifies the maximum number of simultaneous TCP and UDP connections for the entire subnet. The default is 0, which means unlimited connections. (Idle connections are closed after the idle timeout specified by the timeout conn command.) - Указывает максимальное число одновременных TCP и UDP соединения для всей подсети. По-умолчанию равно 0, что означает неограниченное число соединений. (Проставивающие соединения закрываются после таймаута idle, указываемого в команде conn.) - - - - Specifies the maximum number of embryonic connections per host. An embryonic connection is a connection request that has not finished the necessary handshake between source and destination. Set a small value for slower systems, and a higher value for faster systems. The default is 0, which means unlimited embryonic connections. - Указывает максимальное число порожденных соединений для узла. По-умолчанию равно 0, что означает неограниченное число соединений. Порожденным является соединение, которое не было установлено (выполнен необходимый обмен пакетами между сторонами). Установите маленькое значение для медленных систем и большое для быстрых. - - - - The following parameters are used for all NAT rules: - Следующие параметры используются для всех правил NAT: - - - - (The default for both parameters is 0, which means unlimited number of connections.) - (По-умолчанию оба параметра равны 0, что означает неограниченное число соединений.) - - - Check for overlapping global -pools and statics - Проверка наложений глобальных -пулов и статики - - - Script Options - Опции скрипта - - - Options - Опции - - - Access lists (requires Firewall Builder for PIX 1.1.6 and later) - Списки доступа (требуют Firewall Builder for PIX версии 1.1.6 и выше) - - - Clear all access lists then install new ones. This method may interrupt -access to the firewall if you manage it remotely via IPSEC tunnel. This -is the way access lists were generated in older versions of Firewall -Builder for PIX. - Очистить все списки доступа и установить новый. Этот метод может нарушить -доступ к межсетевому экрану если вы управляете им удаленно через IPSec, -он использовался в старых версиях Firewall Builder for PIX. - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - Не очищать списки доступа и группы объектов, просто сгенерировать команды -PIX для новых списков и групп. Эта опция полезна при использовании своих -скриптов установки набора правил. - - - "Safety net" method: - -First, create temporary access list to permit connections from the management -subnet specified below to the firewall and assign it to outside interface. This -temporary ACL helps maintain session between management station and -the firewall while access lists are reloaded in case connection comes over -IPSEC tunnel. Then clear permanent lists, recreate them and assign to -interfaces. This method ensures that remote access to the firewall is -maintained without interruption at a cost of slightly larger configuration. - "Безопасный метод": - -Сначала создаются временные списки доступа для разрешения соединений -с управляющего узла или подсети, указанных ниже. Это необходимо для -создания и поддержания временного доступа управляющей рабочей станции -к межсетевому экрану во время установки набора правил (особенно в случае, -если управляющее соединение идет через IPSec). После установки набора -правил, временные списки доступа удаляются. Этот метод гарантирует -удаленный доступ к межсетевому экрану без прерываний, за счет немного -большего размера конфигурации. - - - - External install script - Внешний скрипт для установки - - - - Built-in installer - Встроенный установщик - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - Use manual ACL commit on FWSM - Использовать ручное подтверждение ACL для FWSM - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via IPSEC tunnel. This is the way access lists were generated in older versions of Firewall Builder for PIX. - Очистить все списки доступа и установить новые. Этот метод может нарушить доступ к межсетевому экрану если вы управляете им удаленно через IPSec, он использовался в старых версиях Firewall Builder for PIX. - - - Do not clear access lists and object group, just generate PIX commands for the new ones. Use this optin if you have your own policy installation scripts. - Не очищать списки доступа и группы объектов, просто сгенерировать команды PIX для новых списков и групп. Эта опция полезна при использовании своих скриптов установки набора правил. - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - "Безопасный метод": - -Сначала создаются временные списки доступа для разрешения соединений с управляющего узла или подсети, указанных ниже. Это необходимо для создания и поддержания временного доступа управляющей рабочей станции к межсетевому экрану во время установки набора правил (особенно в случае, если управляющее соединение идет через IPSec). После установки набора -правил, временные списки доступа удаляются. Этот метод гарантирует удаленный доступ к межсетевому экрану без прерываний, за счет немного большего размера конфигурации. - - - - Policy compiler generates 'fixup' commands for PIX v6.1-6.3 and FWSM v2.3. For PIX 7.0 it generates 'class-map' and 'inspect' commands assigned to the 'policy-map' under either default or custom inspection classes. - Компилятор набора правил генерирует команды 'fixup' для PIX версий 6.1-6.3 и FWSM версии 2.3, для PIX версии 7.0 он генерирует команды 'class-map' и 'inspect' связанные с 'policy-map' либо через стандартные (по-умолчанию), либо через пользовательские классы инспекций. - - - Display generated commands - Показывать генерируемые команды - - - - Inspect - Инспектировать - - - - Generate outbound ACLs - - - - - Compiler - - - - - Additional command line parameters for scp - - - - - Syslog host (IP address): - - - - - Script - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - Do not clear access lists and object group, just generate PIX commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - pixFailoverOptionsDialog - - - Input not valid: %1 - - - - - pixFailoverOptionsDialog_q - - - PIX failover protocol settings - - - - - &OK - - - - - &Cancel - - - - - PIX Failover Protocol Parameters - - - - - PIX Failover Key - - - - - Key: - - - - - pixosAdvancedDialog_q - - - PIX Advanced Configuration Options - Раширенные настройки конфигурации PIX - - - - General - Общие - - - - Set PIX host name using object's name - Установить имя узла межсетевого экрана PIX в название объекта - - - - Generate commands to configure addresses for interfaces - Конфигурировать интерфейсы межсетевого экрана - - - - NTP - NTP - - - - NTP Servers: - NTP серверы: - - - - Server 1: - Сервер 1: - - - - Server 2: - Сервер 2: - - - - Server 3: - Сервер 3: - - - - Preffered: - Предпочтительный: - - - - - IP address: - IP адрес: - - - - SNMP - SNMP - - - - Disable SNMP Agent - Отключить SNMP агента - - - - Set SNMP communities using data from the firewall object dialog - Установить SNMP строки community из диалога объекта межсетевой экран - - - - SNMP servers - SNMP серверы - - - - - Poll - Poll - - - - - Poll and Traps - Poll and Traps - - - - - Traps - Ловушки - - - - Enable: - Включить: - - - - SNMP Server 1: - SNMP сервер 1: - - - - SNMP Server 2: - SNMP сервер 2: - - - - Enable sending log messages as SNMP trap notifications - Включить протоколирование оповещением SNMP ловушек - - - - Options - Опции - - - - Change TCP MSS to - Установить TCP MSS в - - - - bytes - байт - - - - OK - OK - - - - Cancel - Отмена - - - - pixosIfaceOptsDialog - - - Input not valid: %1 - - - - - pixosIfaceOptsDialog_q - - - PIX: interface settings - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Device Type - - - - - VLAN ID - - - - - prefsDialog_q - - - Preferences - Настройки - - - - Enable object tooltips in the tree and rule sets - - - - - Properties of specific object types: - - - - - &OK - OK - - - - &Cancel - Отмена - - - - General - Общие - - - - Working directory: - Рабочий каталог: - - - - - - Browse... - Выбрать... - - - On startup: - При запуске: - - - Load standard objects - Загрузить стандартные объекты - - - Load last edited file - Загрузить последний редактированный проект - - - Expand all branches in the object tree - Раскрыть все дерево объектов - - - - Tooltip delay: - Задержка всплывающей подсказки: - - - Automatically save data in dialogs when switching between objects - Автоматически сохранять данные в диалогах при переключении между объектами - - - - Periodically save data to file every - Периодически сохранять данные в файл, каждые - - - - minutes - минут - - - Enable object tooltips - Включить всплывающие подсказки для объектов - - - - Show deleted objects - Показывать удаленные объекты - - - Revision Control - Управление версиями (ревизиями) - - - - Do not ask for the log record when checking in new file revision. - Всегда помещать файл в систему контроля версий с пустой записью в журнал. - - - SSH - SSH - - - A full path to the Secure Copy utility (secure file copy; for example scp on Unix or pscp.exe or vcp.exe on Windows): - Полный путь к утилите SCP (например, scp для Unix и pscp.exe или vcp.exe для Windows): - - - A full path to the Secure Shell utility (remote command execution; for example ssh on Unix or plink.exe or vsh.exe on Windows): - Полный путь к утилите SSH (например, ssh для Unix и plink.exe или vsh.exe для Windows): - - - Libraries - Библиотеки - - - Add... - Добавить... - - - Remove - Удалить - - - If you remove libraries from the list, changes get in effect next time you start the program - При удалении библиотеки, изменения вступят в силу после перезапуска программы - - - Available libraries: - Доступные библиотеки: - - - Name - Название - - - Load - Загрузить - - - File Path - Путь к файлу - - - - Labels - Метки - - - - Use these labels to mark rules in the firewall policy - Использовать эти метки для маркировки правил в наборе - - - - Green - Зеленый - - - - Purple - Пурпурный - - - - Red - Красный - - - - Orange - Оранжевый - - - - Blue - Синий - - - - Gray - Серый - - - - Yellow - Желтый - - - Data format - Формат данных - - - Do not save a copy of objects form add-on libraries in each data file - Не сохранять копии объктов из дополнительных библиотек в каждом проекте - - - This option is provisional and will change or disappear in future releases because we expect to make this a default behavior. - Это временная опция и она может измениться или исчезнуть в следующих версиях программы (будет включена в них по-умолчанию). - - - Ask user what to do - Спросить, что делать дальше - - - Icons - Иконки - - - - Show icons in rules - Показывать иконки в правилах - - - Icon size: - Размер иконок: - - - - 25x25 - 25x25 - - - - 16x16 - 16x16 - - - - Clip comments in rules - Обрезать в правилах комментарии по размеру ячейки - - - - Icons settings - Настройки иконок - - - Fonts - Шрифты - - - - Choose font for rules sets - Выберите шрифт для правил - - - - Rules font - Шрифт правил - - - - - Choose font for tree - Выберите шрифт для дерева - - - - Tree font - Шрифт дерева - - - Choose font for the rest of the interface - Выберите шрифт для остальной части интерфейса - - - Interface font - Шрифт интерфейса - - - - Software Updates: - Проверка наличия новых версий программы: - - - - Check for updates automatically - Проверять автоматически - - - - Check Now - Проверить сейчас - - - - Use http proxy while checking for updates (host:port) - Использовать http proxy при проверке на наличие новых версий (host:port) - - - - Show text descriptions in columns "Direction", "Action" - Показывать текстовые пояснения в колонках "Направление" и "Действие" - - - - rules font description - описание шрифта для правил - - - - tree font description - описание шрифта для дерева объектов - - - - A full path to the Secure Shell utility (remote command execution; for example ssh on Unix or plink.exe on Windows): - Полный путь к утилите SSH (исполнение команд на другом компьютере; наример ssh на Unix или plink.exe на Windows): - - - - A full path to the SCP utility (file copy over ssh; for example scp on Unix or pscp.exe on Windows): - Полный путь к утилите SCP (копирование файлов на другой компьютер; наример scp на Unix или pscp.exe на Windows): - - - - Objects - Объекты - - - - Data File - Файл данных - - - - Enable compression of the data file - Включить сжатие файла данных - - - - No identifiable information will be sent to the server during update check - - - - - Do not show tips on startup - - - - - Show object attributes in the tree - - - - - DNS Name - DNS имя - - - - - Create new objects in "Compile Time" mode by default - - - - - - Create new objects in "Run Time" mode by default - - - - - Use object name for the DNS record in all objects of this type - - - - - Address Table - Таблица адресов - - - - Installer - - - - - Value for the ServerAliveInterval ssh configuration parameter. This parameter sets timeout interval in seconds after which if no data has been received from the server, ssh client will send a message through the encrypted channel to request a response from the server. This helps detect disconnects between fwbuilder policy installer and the firewall. If set to 0, these messages will not be sent to the server and loss of connectivity with the firewall will lead to hanging of the installer session. Scp uses different parameter for this, ConnectTimeout. Fwbuilder automatically calculates the value for this parameter using the same timeout value. Note that this only works with ssh protocol v2. - - - - - sec - сек - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p style=" margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><a href="http://www.chiark.greenend.org.uk/~sgtatham/putty/"><span style=" font-family:'Lucida Grande'; font-size:8pt; text-decoration: underline; color:#0000ff;">http://www.chiark.greenend.org.uk/~sgtatham/putty/</span></a></p></body></html> - - - - - Built-in policy installer can remember passwords for the duration of the session. Passwords are never stored permanently, they are only kept in memory. In order to use this feature, you also need to configure user name used to authenticate to the firewall in the "advanced" settings dialog of the firewall object. - - - - - Warning: using this feature creates certain risk if working Firewall Builder GUI is left unattended on the unlocked workstation. Someone may walk up to the machine and make changes to the firewall using cached password of the administrator who used the same GUI session before. Always lock the screen or exit Firewall Builder GUI when leaving computer. - - - - - Download plink.exe and pscp.exe from the web site at - - - - - Appearance - - - - - Compiler Output Panel font - - - - - compiler output font description - - - - - Icons size in rules: - - - - - Show text under toolbar icons - - - - - Platforms and OS - - - - - If you disable firewall platform or host OS here, it will not appear in the drop-down lists of platforms and host OS anywhere in the program. This helps avoid clutter in lists of platforms and OS if you only work with one or two of them. - - - - - Supported firewall platforms - - - - - Supported host OS - - - - - Platform - - - - - Host OS - - - - - Enable password caching for the duration of the session (passwords -are never stored permanently) - - - - - Enable password caching - - - - - printingProgressDialog_q - - - Printing - Идет печать - - - - Cancel - Отмена - - - - textLabel1 - textLabel1 - - - - procurveaclAdvancedDialog - - - - Script Editor - - - - - procurveaclAdvancedDialog_q - - - HP ProCurve ACL Firewall Settings - - - - - Compiler Options - - - - - Output file name (if left blank, the file name is constructed of the firewall object name and extension ".fw") - Имя файла (по-умолчанию, если пустое, имя будет состоять из названия объекта межсетевого экрана и расширения '.fw') - - - - Compiler creates multiple access lists from the same policy, -two for each interface: one for inbound and another for -outbound. If the policy is written in a such way that no rule -can possibly be associated with an interface, this interface -gets no access list at all. Also, interfaces marked as -"unprotected" never get access list regardless of how the policy -rules are designed. - - - - - - Generate separate access list for each interface - - - - - Compiler creates one access list and assigns it to all -interfaces. - - - - - - Create one access list and attach it to all interfaces - - - - - Policy Compiler Options - - - - - If the option is deactivated, compiler treats empty groups as an error and aborts processing the policy. If this option is activated, compiler removes all empty groups from all rule elements. If rule element becomes 'any' after the last empty group has been removed, the whole rule will be ignored. Use this option only if you fully understand how it works! - - - - - Ignore empty groups in rules - - - - - Shadowing happens because a rule is a superset of a subsequent rule and any packets potentially matched by the subsequent rule have already been matched by the prior rule. - - - - - Detect rule shadowing in the policy - - - - - Always permit ssh access from the management workstation with this address: - - - - - Script Options - - - - - Clear all access lists then install new ones. This method may interrupt access to the firewall if you manage it remotely via tunnel. - - - - - Do not clear access lists, just generate commands for the new ones. Use this option if you have your own policy installation scripts. - - - - - "Safety net" method: - -First, create temporary access list to permit connections from the management subnet specified below to the firewall and assign it to outside interface. This temporary ACL helps maintain session between management station and the firewall while access lists are reloaded in case connection comes over IPSEC tunnel. Then clear permanent lists, recreate them and assign to interfaces. This method ensures that remote access to the firewall is maintained without interruption at a cost of slightly larger configuration. - "Безопасный метод": - -Сначала создаются временные списки доступа для разрешения соединений с управляющего узла или подсети, указанных ниже. Это необходимо для создания и поддержания временного доступа управляющей рабочей станции к межсетевому экрану во время установки набора правил (особенно в случае, если управляющее соединение идет через IPSec). После установки набора -правил, временные списки доступа удаляются. Этот метод гарантирует удаленный доступ к межсетевому экрану без прерываний, за счет немного большего размера конфигурации. - - - - Temporary access list should permit access from this address or subnet (use prefix notation to specify subnet, e.g. 192.0.2.0/24): - - - - - - Insert comments into generated IOSACL configuration file - - - - - Comment the code - - - - - Use ACL remarks - - - - - Installer - - - - - Built-in installer - Встроенный установщик - - - - User name used to authenticate to the firewall (leave this empty if you use putty session): - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - Additional command line parameters for scp - - - - - Instead of running generated configuration on the router line by line, installer can use scp to copy the file and then "copy file running-config" command to activate it. Ssh v2 and scp servers should be configured on the router for this to work. This method is much faster than running configuration line by line. - - - - - Copy generated configuration file to the router using scp - - - - - File system on the router where configuration file should be saved if it is copied with scp. Examples: "flash:", "disk0:". Should end with a colon ":". If this input field is left blank, installer uses "nvram:": - - - - - External install script - Внешний скрипт для установки - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim on top of generated configuration - - - - - The following commands will be added verbatim after generated configuration - - - - - Logging - - - - - Generate logging commands - - - - - Syslog - - - - - Syslog host (name or IP address): - - - - - syslog facility: - - - - - syslog level ('logging trap'): - - - - - The logging timestamp command requires that the clock command be set. - - - - - Enable logging timestamps on syslog file - - - - - Other logging destinations and levels: - - - - - Internal buffer - - - - - Console - - - - - IPv6 - IPv6 - - - - The order in which ipv4 and ipv6 rules should be generated: - - - - - IPv4 before IPv6 - - - - - IPv6 before IPv4 - - - - - OK - - - - - Cancel - - - - - secuwallAdvancedDialog - - Illegal address '%1' - Некорректный адрес %1/%2 {1'?} - - - - - Script Editor - - - - - secuwallAdvancedDialog_q - - - iptables: advanced settings - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - Compiler - - - - - Compiler: - - - - - Command line options for the compiler: - - - - - Assume firewall is part of 'any' - - - - - Accept TCP sessions opened prior to firewall restart - - - - - Accept ESTABLISHED and RELATED packets before the first rule - - - - - Drop packets that are associated with -no known connection - Блокировать пакеты, которые не относятся -к известным соединениям - - - - and log them - и протоколировать их - - - - Bridging firewall - - - - - Detect shadowing in policy rules - - - - - Ignore empty groups in rules - - - - - Enable support for NAT of locally originated connections - - - - - This adds a rule on top of the policy with iptables target TCPMSS -and option --clamp-mss-to-pmtu. Generation of this command is -version-dependent and also depends on the setting of ip or ipv6 forwarding -in host settings dialog. - - - - - - Clamp MSS to MTU - - - - - Make Tag and Classify actions terminating - - - - - Default action on 'Reject': - - - - - Always permit ssh access from the management workstation with this address: - - - - - Install the rule for ssh access from the management workstation when the firewall -is stopped - - - - - Installer - - - - - Built-in installer - Встроенный установщик - - - - Additional command line parameters for ssh - Дполнительные опции командной строки для ssh - - - - Additional command line parameters for scp - - - - - Alternative name or address used to communicate with the firewall (also putty session name on Windows) - - - - - External install script - Внешний скрипт для установки - - - - Policy install script (using built-in installer if this field is blank): - - - - - Command line options for the script: - - - - - Prolog/Epilog - - - - - - Edit - - - - - The following commands will be added verbatim after generated configuration - - - - - The following commands will be added verbatim on top of generated configuration - - - - - Insert prolog script - Вставить скрипт пролога - - - - on top of the script - в начало скрипта - - - - after interface configuration - после конфигурирования интерфейсов - - - - after policy reset - после удаления страрого набора правил - - - - Logging - - - - - use ULOG - - - - - use LOG - - - - - log TCP seq. numbers - - - - - log IP options - - - - - use numeric syslog levels - - - - - Log level: - - - - - log TCP options - - - - - cprange - - - - - queue threshold: - - - - - netlink group: - - - - - Log prefix: - - - - - Logging limit: - - - - - Activate logging in all rules -(overrides rule options, use for debugging) - - - - - Script - - - - - Allow reboot to load modules (only if needed) - - - - - Turn debugging on in generated script - - - - - Managing interfaces and addresses - - - - - Verify interfaces before loading firewall policy - - - - - Configure Interfaces of the running firewall machine - - - - - Add virtual addresses for NAT - - - - - Generated script can load rules one by one by calling iptables command line utility, or activate them all at once using iptables-restore. In both cases you just run the script with command line parameter "start" to activate the policy, the script will use iptables-restore automatically if this checkbox is on. - - - - - iptables-restore replaces firewall policy in one atomic transaction - iptables-restore заменяет набор правил межсетевого экрана единой атомарной транзакцией - - - - Use iptables-restore to activate policy - Использовать команду iptables-restore для включения набора правил - - - - Warning: rebooting breaks the connectivity until the firewall is up again. The outage can be up to minutes, depending on how fast the machine restarts. - - - - - If debugging is turned on, the script will run with shell option "-x" that makes it print every command it executes. Warning: this produces a lot of debugging output. - - - - - Warning: this breaks the connectivity until all interfaces are 'up' again. The outage is typically < 10 seconds - - - - Browse - Выбрать - - - - secuwallIfaceOptsDialog_q - - - secunet wall: interface settings - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - - Options - - - - - Specify secunet wall advanced interface options below - - - - - MTU - - - - - Device Type - - - - - VLAN ID - - - - - Disable at boot - - - - - Disable ARP on this interface - - - - - secuwallosAdvancedDialog - - - Select templates directory - - - - - URL is not valid: %1 - - - - - Could not open URL: %1 - - - - - Empty address found (position %1) - - - - - Illegal address '%1' (position %2) - - - - - Input not valid: %1 - - - - - secuwallosAdvancedDialog_q - - - secunet wall: advanced settings - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - Management - - - - - secunet wall Management settings - - - - - Specify secunet wall Management settings below. -Please use commas to separate a list of IP addresses. - - - - - Management access - - - - - Enter the IP addresses or networks of the secunet wall management zone - - - - - Syslog servers - - - - - Enter IP addresses of logging servers - - - - - SNMP access - - - - - Enter IP addresses or networks where SNMP requests to this firewall come from - - - - - RO-SNMP string - - - - - Enter community string for read only SNMP access - - - - - NTP servers - - - - - Enter IP addresses of NTP servers - - - - - Nagios access - - - - - Enter IP addresses or networks for Nagios access - - - - - Local /var partition - - - - - Enter name for partition that will be mounted to /var - - - - - Local config partition - - - - - Enter name for local config partition - - - - - Disable auto-generation of firewall rules for management services - - - - - Don't create firewall rules - - - - - DNS Client - - - - - secunet wall DNS settings - - - - - Specify secunet wall DNS client related settings below - - - - - DNS servers - - - - - Search domains - - - - - Enter DNS search domains here. One search domain per line - - - - - Hosts file - - - - - Enter Hosts entries here. One IP-Address/Name pair per line. These entries will be written to /etc/hosts file on the firewall - - - - - The resolution order defines how hostnames will be resolved on the firewall (nsswitch.conf). Default is "Hosts file first" - - - - - Resolution order - - - - - - - - - Hosts - - - - - - - - - DNS - - - - - - - - - NIS - - - - - - - - - NIS+ - - - - - - - - - DB - - - - - Options - - - - - Specify secunet wall advanced iptables/routing options below - - - - - IPv4 Packet forwarding - - - - - - - - - - - - - - - - - - - - No change - - - - - - - - - - - - - - - - - - - - On - - - - - - - - - - - - - - - - - - - - Off - - - - - IPv6 Packet forwarding - - - - - Kernel anti-spoofing protection - - - - - Ignore broadcast pings - - - - - Ignore all pings - - - - - Accept source route - - - - - Accept ICMP redirects - - - - - Ignore bogus ICMP errors - - - - - Allow dynamic addresses - - - - - Log martians - - - - - whats this text - whats this comment - - - - - TCP - - - - - These parameters make sense for connections to or from the firewall host - - - - - TCP FIN timeout (sec) - - - - - TCP keepalive time (sec) - - - - - TCP window scaling - - - - - TCP sack - - - - - TCP fack - - - - - TCP ECN - - - - - TCP SYN cookies - - - - - TCP timestamps - - - - - Files - - - - - Enable support for additional files here. Files in the selected templates directory will be added to the configuration of this Firewall. - - - - - Add additional files to firewall configuration - - - - - Template directory - - - - - Select templates directory for this Firewall - - - - - Browse - Выбрать - - - - Open current path in file browser - - - - - Open - - - - - solarisAdvancedDialog_q - - - Solaris: advanced settings - Solaris: расширенные настройки - - - - &OK - OK - - - - &Cancel - Отмена - - - - Options - Опции - - - - Ignore ICMP redirects - Игнорировать пакеты ICMP redirect - - - - - - - - No change - Без изменений - - - - - - - - On - Включить - - - - - - - - Off - Выключить - - - - Forward directed broadcasts - Маршрутизировать направленные широковещательные пакеты - - - - Respond to echo broadcast - Отвечать на широковещательные ICMP ping пакеты - - - - Packet forwarding - Маршрутизация пакетов - - - - Forward source routed packets - Маршрутизировать пакеты с маршрутизацией источника - - - - Path - Путь - - - - ipf: - ipf: - - - - ipnat: - ipnat: - - - - Specify directory path and a file name for the following utilities on the OS your firewall machine is running. Leave these empty if you want to use default values. - Укажите полный путь к перечисленным утилитам в операционной системе этого межсетевого экрана. Для незаполненных полей будут использованы значения по-умолчанию. - - - - transferDialog - - - Transfer error: %1 - - - - - - &Continue - - - - - No firewalls selected for transfer - - - - - Waiting - - - - - Error: Failed to start program - - - - - Error: Waiting for program termination - - - - - Error: Program returned failure status - - - - - transferDialog_q - - - Config transfer options - - - - - <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0//EN" "http://www.w3.org/TR/REC-html40/strict.dtd"> -<html><head><meta name="qrichtext" content="1" /><style type="text/css"> -p, li { white-space: pre-wrap; } -</style></head><body style=" font-family:'Sans Serif'; font-size:9pt; font-weight:400; font-style:normal;"> -<p align="center" style=" margin-top:12px; margin-bottom:12px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px;"><span style=" font-size:x-large; font-weight:600;">Export firewall configs to transfer device</span></p></body></html> - - - - - Select usbstick volume to start firewall config transfer: - - - - - Select a portable disk volume to transfer firewall configs - - - - - Device - - - - - Size - Размер - - - - Mounted - - - - - Mountpoint - - - - - Filesystem - - - - - Double click on a firewall in this tree to jump to the corresponding process log entry - - - - - Firewall - - - - - Progress - Прогресс - - - - Process log - Журнал обработки - - - - Save log to file - Сохранить журнал в файл - - - - Start the export! - - - - - Transfer - Перенос конфигурации - - - - Close - - - - - vlanOnlyIfaceOptsDialog - - - Input not valid: %1 - - - - - vlanOnlyIfaceOptsDialog_q - - - Vlan interface settings - - - - - Help - Справка - - - - &OK - - - - - &Cancel - - - - - Options - - - - - Device Type - - - - - VLAN ID - - - - - vrrpOptionsDialog - - - Input not valid: %1 - - - - - vrrpOptionsDialog_q - - - secunet wall: interface settings - - - - - &OK - - - - - &Cancel - - - - - VRRP Parameters - - - - - Use IPsec AH protected VRRP - - - - - VRRP Secret - - - - - Virtual Router ID - - - - - VRID - - - - diff --git a/src/gui/gui.pro b/src/gui/gui.pro index 8a067109b..12f8c2bd7 100644 --- a/src/gui/gui.pro +++ b/src/gui/gui.pro @@ -58,19 +58,15 @@ STATIC_LIBS += $$OTHER_LIBS PRE_TARGETDEPS = $$STATIC_LIBS -macx:STATIC_LIBS += -framework \ - Carbon +macx:STATIC_LIBS += -framework Carbon STATIC_LIBS += $$LIBS_FWCOMPILER LIBS = $$STATIC_LIBS $$LIBS -#RESOURCES += ../libgui/MainRes.qrc -TRANSLATIONS = fwbuilder_ru.ts \ - fwbuilder_ja.ts \ - fwbuilder_en.ts -ja.path = $$PKGLOCALEDIR -ja.files = fwbuilder_ja.qm -ru.path = $$PKGLOCALEDIR -ru.files = fwbuilder_ru.qm -INSTALLS += ja ru +# TRANSLATIONS = fwbuilder_ru.ts fwbuilder_ja.ts fwbuilder_en.ts +# ja.path = $$PKGLOCALEDIR +# ja.files = fwbuilder_ja.qm +# ru.path = $$PKGLOCALEDIR +# ru.files = fwbuilder_ru.qm +# INSTALLS += ja ru diff --git a/src/libgui/fwbuilder_ja.qm b/src/libgui/fwbuilder_ja.qm deleted file mode 100644 index 4c5cf15ad..000000000 Binary files a/src/libgui/fwbuilder_ja.qm and /dev/null differ diff --git a/src/libgui/fwbuilder_ru.qm b/src/libgui/fwbuilder_ru.qm deleted file mode 100644 index d0a29ce6a..000000000 Binary files a/src/libgui/fwbuilder_ru.qm and /dev/null differ