MINI MINI MANI MO

Path : /usr/share/locale/zh_CN/LC_MESSAGES/
File Upload :
Current File : //usr/share/locale/zh_CN/LC_MESSAGES/firewalld.mo

<	\ 
  q \!"]!""""""	""""	""

#	#
"#0#@#I#
V#d#m#
y##
##I#{#[m$$bL%%H&'E'%:(`(h(	l(v(())%),)B)J)b)v))))4)$)%*'B*$j*******2*2-+`+w++
++"++$+,$8,],i,q,#z,,K-Z-]g-
---n-f.,......../
"/-/?/
L/W/q//
///	/
//	///00	#0-050>0S0[0W1]1-c1115112	22"292AV22r2	#3-3C32A4Lt44	4
4u4X5d5j5Jq55555	55i6m27Q7788
88
88889909C9T9]9lp9	9
99$9:!::::::%;;y;d<l<t<<'<<#< <
==
*=5=DA==	=D=)=%>'1>$Y>*~>!>>>:>B9?:|????
@&@;@T@o@/@%@5@?A#SAIwAAAAAAB		BB	B	&B0BABC#C6CCCWCfCCCCCCCCCCDD1D
@DND]DnDzD	D
DDDDDDEE8E@EqIEE
EEELE>FEFQF^FfFAnFFFF
FFG*'HRIIDJSK+WKKK;LMLNNN
N
OWO*jOOOOO	O	O
OOOPPP&P#@P+dP)PMP0Q(9Q^bQAQ;R?RHRNRTRZRcRiR	pRzRRRRRRRR	RRR-RRS
SSS!S
&S4S9S>SDSJSPSTS
YSdSkSoSvS{SSSSSSSS
SS&SST
UUUUF.VuVeW	lWvW	}WWW	WWWWWWWXX+X8XEXRXbXoX|XXXXEXWXNTYYQ+Zx}ZZ[3\!\\\\\d]	v]]	]]]]]]]]^*^#G^$k^$^$^^^^^	_!_'7_$____	_	_	_"__ ` ,`#M`q`	x`	``~`*a7aRDa
aaada.b$Lbqbybb	b	bbbb	bbbbcc1cDcQc^ckcxccccccccc	ccdddd%dde(eGeNe	[eeexee3eeUeBfRf?f0>g<oggggfg
:hEhKh6RhhhhhhhgidjFmjj6k#=kakhkxk	k	kkkkkkl	lfl	l
l	llll	Jm	Tm^mkmrm!_nn
nnnnnnn%n'oGo
Woeoro<ooo6o"p'pGpdp'ppp$p3p?1q3qqqqqqqr,r@r'Sr {r&r5rr3sIsPsisvss	sss	sssstt	tttttttuu(u5uBuOu_uluuuuuuu	u	uu	u!v#v?v[vuvvv`vww!w5w<=wzw	w	www9wwwwwxx;y)zz:m{y{0"|S|o|L|nF~~@	\fs^(		/	9C	P	Zdqy $*݀%F.-u(Ý@&<g


ʂ	Ղ߂		!$+2-9gt{
ƒɃЃ׃ރ
&-:$>cx^.LXReIw@
\7~Q+w>4r2q]vUaN[1ji9(I:	;fC5:J3\1RonbxSWa#QsTFP8yg"gK![FT98ZdVEVDuh'KY+DMH%zSU@<{nhNOZ2iO;'Pbc<4}Et#)
vyA`zc=/t=
urG&6>$0!	$pGqmA-~(.X-p H%J*/_|5fe,BW"&3_YkC*^k
L}{m7 |d]B?0,sl6?)loj`M- Select -/A firewalld icmptype provides the information for an Internet Control Message Protocol (ICMP) type for firewalld.A firewalld service is a combination of ports, protocols, modules and destination addresses.A firewalld zone defines the level of trust for network connections, interfaces and source addresses bound to the zone. The zone combines services, ports, protocols, masquerading, port/packet forwarding, icmp filters and rich rules. The zone can be bound to interfaces and source addresses.AboutAbout %sActionAction:Active BindingsAddAdd ChainAdd Command LineAdd ContextAdd Entries From FileAdd EntryAdd Forward PortAdd ICMP TypeAdd IPSetAdd InterfaceAdd PassthroughAdd PortAdd ProtocolAdd Rich RuleAdd RuleAdd ServiceAdd SourceAdd User IdAdd User NameAdd ZoneAdd a rule with the arguments args to a chain in a table with a priority.Add additional ports or port ranges, which need to be accessible for all hosts or networks that can connect to the machine.Add additional ports or port ranges, which need to be accessible for all hosts or networks.Add additional source ports or port ranges, which need to be accessible for all hosts or networks that can connect to the machine.Add additional source ports or port ranges, which need to be accessible for all hosts or networks.Add entries to bind interfaces to the zone. If the interface will be used by a connection, the zone will be set to the zone specified in the connection.Add entries to bind source addresses or areas to the zone. You can also bind to a MAC source address, but with limitations. Port forwarding and masquerading will not work for MAC source bindings.Add entries to forward ports either from one port to another on the local system or from the local system to another system. Forwarding to another system is only useful if the interface is masqueraded. Port forwarding is IPv4 only.Add protocols, which need to be accessible for all hosts or networks.Additional chains for use with rules.AddressAllAll FilesAll network traffic is blocked.An IPSet can be used to create white or black lists and is able to store for example IP addresses, port numbers or MAC addresses. Args:AuditAudit:Authorization failed.AuthorsBase ICMP Type SettingsBase IPSet SettingsBase Service SettingsBase Zone SettingsBindingsBlock all network trafficBold entries are mandatory, all others are optional.Built-in icmp, rename not supported.Built-in ipset, rename not supported.Built-in service, rename not supported.Built-in zone, rename not supported.Chain:ChainsChange Default ZoneChange Log DeniedChange LogDenied value.Change Zones of Connections...Change default zone for connections or interfaces.Change which zone a network connection belongs to.Change zone of bindingChanges applied.Command lineCommand linesConfiguration:Configure Shields UP/Down Zones...Configure Shields Up/Down ZonesConnection to FirewallD established.Connection to FirewallD lost.Connection to firewalld established.ConnectionsContextContextsCurrent default zone of the system.Currently visible configuration. Runtime configuration is the actual active configuration. Permanent configuration will be active after service or system reload or restart.Default TargetDefault ZoneDefault Zone '{default_zone}' active for connection '{connection}' on interface '{interface}'Default Zone:Default Zone: %sDefault Zone: '%s'Default zone '{default_zone}' {activated_deactivated} for connection '{connection}' on interface '{interface}'Default zone changed to '%s'.Default zone used by network connection '%s'Description:DestDestinationDestination:Direct ChainDirect ConfigurationDirect Passthrough RuleDirect RuleEdit ChainEdit Command LineEdit ContextEdit EntryEdit Firewall Settings...Edit Forward PortEdit ICMP TypeEdit IPSetEdit InterfaceEdit PassthroughEdit PortEdit ProtocolEdit Rich RuleEdit RuleEdit ServiceEdit SourceEdit User IdEdit User NameEdit ZoneElementElement:Enable NotificationsEntriesEntries of the IPSet. You will only be able to see entries of ipsets that are not using the timeout option, also only the entries, that have been added by firewalld. Entries, that have been directly added with the ipset command wil not be listed here.EntryErrorFailed to get connections from NetworkManagerFailed to load icons.Failed to read file '%s': %sFailed to set zone {zone} for connection {connection}FamilyFamily:FirewallFirewall AppletFirewall ConfigurationFirewallD has been reloaded.For host or network white or blacklisting deactivate the element.Forward to another portForwarding to another system is only useful if the interface is masqueraded.
Do you want to masquerade this zone ?Hashsize:Here you can define which services are trusted in the zone. Trusted services are accessible from all hosts and networks that can reach the machine from connections, interfaces and sources bound to this zone.Here you can select the zones used for Shields Up and Shields Down.Here you can set rich language rules for the zone.Hide active runtime bindings of connections, interfaces and sources to zonesICMP FilterICMP TypeICMP TypesICMP Types can only be changed in the permanent configuration view. The runtime configuration of ICMP Types is fixed.IP address:IPSetIPSetsIPSets can only be created or deleted in the permanent configuration view.IPv4IPv4:IPv6IPv6:Icmp TypeIf Invert Filter is enabled, marked ICMP entries are accepted and the others are rejected. In a zone with the target DROP, they are dropped.If a command entry on the whitelist ends with an asterisk '*', then all command lines starting with the command will match. If the '*' is not there the absolute command inclusive arguments must match.If you enable local forwarding, you have to specify a port. This port has to be different to the source port.If you enable masquerading, IP forwarding will be enabled for your IPv4 networks.If you specify destination addresses, the service entry will be limited to the destination address and type. If both entries are empty, there is no limitation.IgnoreInitial hash size, default 1024InterfacesInvalid nameInvert FilterLevel:LicenseLoad ICMP Type DefaultsLoad IPSet DefaultsLoad Service DefaultsLoad Zone DefaultsLocal forwardingLockdownLockdown WhitelistLockdown locks firewall configuration so that only applications on lockdown whitelist are able to change it.Lockdown:Log DeniedLog:Make runtime configuration permanentMarkMark the ICMP types in the list, which should be rejected. All other ICMP types are allowed to pass the firewall. The default is no limitation.Mark:Mask:Masquerade zoneMasqueradingMasquerading allows you to set up a host or router that connects your local network to the internet. Your local network will not be visible and the hosts appear as a single address on the internet. Masquerading is IPv4 only.Max number of elements, default 65536Maxelem:Meaning: Log of denied packets. But this is too long. LogDenied is also the parameter used in firewalld.conf.Log Denied:Module:ModulesName already existsName:Network traffic is not blocked anymore.No Active Zones.No NetworkManager imports availableNo connection to firewall daemonOther Module:Other Protocol:Panic ModePanic Mode:Panic mode means that all incoming and outgoing packets are dropped.PassthroughPermanentPlease be careful with passthrough rules to not damage the firewall.Please configure base ICMP type settings:Please configure base ipset settings:Please configure base service settings:Please configure base zone settings:Please enter a mark with an optional mask.Please enter a port and protocol.Please enter a protocol.Please enter a rich rule.Please enter an ipv4 address with the form address[/mask].Please enter an ipv4 or ipv6 address with the form address[/mask].Please enter an ipv6 address with the form address[/mask].Please enter the command line.Please enter the context.Please enter the user id.Please enter the user name.Please select a filePlease select a service.Please select an ICMP typePlease select an ipset:Please select default zone from the list below.Please select ipv and enter the args.Please select ipv and table and enter the chain name.Please select ipv and table, chain priority and enter the args.Please select the log denied value:Please select the source and destination options according to your needs.PortPort / Port Range:Port ForwardingPort and ProtocolPortsPrefix:Priority:ProtocolProtocol:ProtocolsReload FirewalldReloads firewall rules. Current permanent configuration will become new runtime configuration. i.e. all runtime only changes done until reload are lost with reload if they have not been also in permanent configuration.RemoveRemove All EntriesRemove ChainRemove Command LineRemove ContextRemove Entries From FileRemove EntryRemove Forward PortRemove ICMP TypeRemove IPSetRemove InterfaceRemove PassthroughRemove PortRemove ProtocolRemove Rich RuleRemove RuleRemove Selected EntryRemove ServiceRemove SourceRemove User IdRemove User NameRemove ZoneReset To DefaultRich RuleRich RulesRulesRuntimeRuntime To PermanentSelect zone for connection '%s'Select zone for interface '%s'Select zone for source %sSelect zone for source '%s'ServiceServicesServices can only be changed in the permanent configuration view. The runtime configuration of services is fixed.Shields Down Zone:Shields UpShields Up Zone:Short:Show active runtime bindings of connections, interfaces and sources to zonesSourceSource PortSource PortsSource:SourcesSpecify whether this ICMP Type is available for IPv4 and/or IPv6.SrcTable:Target:Text FilesThe Internet Control Message Protocol (ICMP) is mainly used to send error messages between networked computers, but additionally for informational messages like ping requests and replies.The context is the security (SELinux) context of a running application or service. To get the context of a running application use <tt>ps -e --context</tt>.The direct configuration gives a more direct access to the firewall. These options require user to know basic iptables concepts, i.e. tables, chains, commands, parameters and targets. Direct configuration should be used only as a last resort when it is not possible to use other firewalld features.The ipv argument of each option has to be ipv4 or ipv6 or eb. With ipv4 it will be for iptables, with ipv6 for ip6tables and with eb for ethernet bridges (ebtables).The lockdown feature is a light version of user and application policies for firewalld. It limits changes to the firewall. The lockdown whitelist can contain commands, contexts, users and user ids.The mark and the mask fields are both 32 bits wide unsigned numbers.The mask can be a network mask or a number for ipv4.
The mask is a number for ipv6.The mask can be a network mask or a number.The mask is a number.The passthrough rules are directly passed through to the firewall and are not placed in special chains. All iptables, ip6tables and ebtables options can be used.The priority is used to order rules. Priority 0 means add rule on top of the chain, with a higher priority the rule will be added further down. Rules with the same priority are on the same level and the order of these rules is not fixed and may change. If you want to make sure that a rule will be added after another one, use a low priority for the first and a higher for the following.This IPSet uses the timeout option, therefore no entries are visible here. The entries should be taken care directly with the ipset command.This feature is useful for people using the default zones mostly. For users, that are changing zones of connections, it might be of limited use.Timeout value in secondsTimeout:To AddressTo PortTo enable this Action has to be 'reject' and Family either 'ipv4' or 'ipv6' (not both).Trying to connect to firewalld, waiting...Type:Used by network connection '%s'User IDUser IdsUser ids.User nameUser namesUser names.Version:WarningWith limit:ZoneZone '%s' activated for interface '%s'Zone '%s' activated for source '%s'Zone '%s': ICMP type '%s' is not available.Zone '%s': Service '%s' is not available.Zone '{zone}' active for connection '{connection}' on interface '{interface}'Zone '{zone}' active for interface '{interface}'Zone '{zone}' active for source {source}Zone '{zone}' {activated_deactivated} for connection '{connection}' on interface '{interface}'Zone '{zone}' {activated_deactivated} for interface '{interface}'Zone '{zone}' {activated_deactivated} for source '{source}'Zone: %sZones_File_Help_Options_Viewacceptactivatedalertcriticaldaydeactivateddebugdisableddropebemergencyenablederrorfirewall;network;security;iptables;netfilter;forward-porthouricmp-blockinfoinvertedipv4ipv4 and ipv6ipv6ipv:labellevellimitlogmarkmasquerademinutenatnoticeportprotocolrawrejectsecondsecurityservicesource-portwarningwith Type:yes{entry} (Default Zone: {default_zone}){entry} (Zone: {zone})Project-Id-Version: PACKAGE VERSION
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2018-04-30 20:38-0400
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
PO-Revision-Date: 2017-04-20 09:26-0400
Last-Translator: Zamir SUN <sztsian@gmail.com>
Language-Team: Chinese (China) (http://www.transifex.com/projects/p/firewalld/language/zh_CN/)
Language: zh-CN
Plural-Forms: nplurals=1; plural=0;
X-Generator: Zanata 3.9.6
- 选择 -/FirewallD ICMP 类型为 firewallD 提供因特网控制报文协议 (ICMP) 的信息FirewallD 服务是端口、协议、模块和目的地址的组合。FirewallD 区域定义了绑定的网络连接、接口以及源地址的可信程度。区域是服务、端口、协议、IP伪装、端口/报文转发、ICMP过滤以及富规则的组合。区域可以绑定到接口以及源地址。关于关于 %s操作操作:活动的绑定新增添加链添加命令行添加上下文以文件添加条目添加条目添加转发端口添加 ICMP 类型添加 IPSet添加接口添加穿通添加端口添加协议添加富规则添加规则添加服务添加来源添加用户 ID添加用户名添加区域添加一个包含参数的规则至具备优先级信息的表中。添加可让允许访问的主机或者网络访问的附加端口或者端口范围。添加可让所有主机或者网络访问的附加端口或者端口范围。添加额外的源端口或范围,它们对于所有可以连接至这台主机的所有主机或网络都需要是可以访问的。添加可让所有主机或者网络访问的其他源端口或者端口范围。增加入口以将接口加入区域。若接口已经被连接占用,区域将被设定为连接所指定的区域。添加条目以便在该区域绑定源地址或范围。还可以绑定到 MAC 源地址,但会有所限制。端口转发及伪装不适用于 MAC 源绑定。添加条目来转发端口,可以是从本地系统的一个端口到另一个端口,也可以是从本地系统到另一个系统。转发到另一个系统只在接口是伪装的时候有用。端口转发只适用于 IPv4。添加所有主机或网络均可访问的协议。与规则共同生效的附加链地址全部所有文件阻挡所有网络传输。可使用 IPSet 创建白名单或黑名单,以便保存 IP 地址、端口号或者 MAC 地址。参数:审计审计:认证失败。作者基本 ICMP 类型设定基础 IPSet 设置基本服务设定基本区域设定:绑定阻止所有网络传输粗体项目为必需,其余为可选。预置 ICMP,不支持重命名。内置 ipset,不支持重命名。预置服务,不支持重命名。预置区域,不支持重命名。链:链改变默认区域修改 LogDenied修改 LogDenied 值。更改连接区域…更改连接或接口的默认区域。更改网络连接所属的区域。修改绑定的区变更已生效。命令行命令行配置:配置保护开启/关闭区域…配置保护开启/关闭区域建立至 FirewallD 的连接。丢失至 FirewallD 的连接。已建立至 firewalld 的连接。连接上下文上下文当前系统的默认区域。当前可见配置。运行时配置为实际启用的配置。永久配置则会在服务或系统重载或重启时启用。默认目标默认区域接口 '{interface}' 上连接 '{connection}'  的活动默认区 '{default_zone}'默认区域:默认区:%s默认区域: '%s'接口 '{interface}' 上连接 '{connection}'  的默认区 '{default_zone}' {activated_deactivated}默认区域变更至 '%s'。网络连接 '%s' 使用的默认区描述:目的目标地址目标:直接链直接配置直接穿通规则直接规则编辑链编辑命令行编辑上下文编辑条目编辑防火墙设置...编辑转发端口编辑 ICMP 类型编辑 IPSet编辑接口编辑穿通编辑端口编辑协议编辑富规则编辑规则编辑服务编辑来源编辑用户 ID编辑用户名编辑区域元素元素:启用通知条目IPSet 条目。只能看到不使用 timeout 选项的 ipset 条目以及已经由 firewalld 添加的条目。这里不会列出直接由 ipset 命令添加的条目。条目错误从 NetworkManager 获取连接失败载入图标失败。读取文件 %s 失败:%s设置 {connection} 的区 {zone} 失败家族产品线:防火墙防火墙小程序防火墙配置FirewallD 已经重载。为主机或网络白或黑名单禁用此元素。转发到另一端口转发至其他系统琴在端口伪装时才有用。
您想要伪装该区域吗?哈希大小:可以在这里定义区域中哪些服务是可信的。可连接至绑定到这个区域的连接、接口和源的所有主机和网络及丶可以访问可信服务。在这里您可以选择开启保护和关闭保护的区域。可以在这里为区域设定富语言规则。对区隐藏连接、接口和源服务器的 runtime 绑定ICMP 过滤器ICMP 类型ICMP 类型仅可以在永久配置视图中修改 ICMP 类型。运行时配置中的 ICMP 类型是固定的。IP 地址:IPSetIPSets只能在永久配置视图中创建或删除 IPSet。IPv4IPv4:IPv6IPv6:ICMP 类型如果启用了反向过滤器(Invert Filter),作了标记的 ICMP 条目都被会被接受,而其他条目则会被拒绝。在带有目标 DROP 的区里,它们会被丢弃。如果在白名单输入的命令以 '*' 星号结尾,则匹配所有以其开头的命令。如果不含 '*' 则命令和其中的参数必须绝对匹配。如果您允许本地转发,您必须指定一个端口。 这个端口不能和源端口相同。如果您启用伪装,将会为您的 IPv4 网络启用 IP 转发。如果您指定了目的地址,服务项目将仅限于目的地址和类型。如果两个项目均为空,则没有限制。忽略起始哈希大小,默认为 1024接口无效的名称反向过滤器等级:许可证载入默认 ICMP 类型载入 IPSet 默认设置载入默认服务载入默认区域本地转发锁定锁定白名单锁定可以对防火墙配置进行加锁,只允许锁定白名单上的应用程序进行改动。Lockdown:Log Denied日志:永久设置运行时配置掩码在列表中标记应该被拒绝的 ICMP 类型。所有其它 ICMP 类型则被允许通过防火墙。默认设置是没有限制。掩码:掩码:伪装区域伪装如果您要设置一台将您的本地网络连接到互联网的主机或者路由器,伪装是很有用的。您的本地网络将不可见,且该主机是以单一地址的形式出现在互联网中。伪装仅适用于 IPv4。最大元素数,默认为 65536最大元素数:LogDenied:模块: 模块名称已存在名称:不再阻挡网络传输。没有启用区域。没有可用的 NetworkManager 导入没有到防火墙守护进程的连接其他模块 : 其他协议:应急模式应急模式:应急模式意味着将丢弃所有传入和传出的包。穿通永久请小心使用穿通规则,不要损害防火墙。请配置基本 ICMP 类型设定:请配置基础 ipset 设置:请配置基本服务设定:请配置基本区域设定:请输入具有可选掩码的掩码。请输入端口和协议。请输入协议。请输入富规则(rich rule)。请输入 ipv4 地址,格式为 address[/mask]。请输入 ipv4 或者 ipv6 地址,格式为 address[/mask]。请输入 ipv6 地址,格式为 address[/mask]。请输入命令行。请输入上下文。请输入用户 ID。请输入用户名。请选择一个文件请选择一个服务。请选择ICMP类型请选择 ipset:请从下面列表选择默认区域。请选择 IPV 并输入参数。请选择 IPV 及表并输入链名。请选择 IPV 及表、链优先级并输入参数。请选择 Log Denied 值:请根据您的需要选择来源和目的选项。端口端口/端口范围:端口转发端口和协议端口前缀:优先级:协议协议:协议重载防火墙重载防火墙规则。当前永久配置将变成新的运行时配置。例如所有仅在运行时配置所做的变更若未在永久配置中操作,将在重载后丢失。移除移除全部项移除链移除命令行移除上下文从文件中移除条目删除条目移除转发端口移除 ICMP 类型删除 IPSet移除接口移除穿通移除端口删除协议移除富规则移除规则移除所选条目移除服务移除来源移除用户 ID移除用户名移除区域重设为默认设置富规则富规则规则运行时将 Runtime 设定为永久配置为连接 '%s' 选择区域为接口 '%s' 选择区域选择来源 %s 的区域为来源 '%s' 选择区域服务服务仅可以在永久配置视图中修改服务。运行时配置中的服务是不可修改的。关闭保护区域:启动保护开启保护区域:简称:对区显示连接、接口和源服务器的 runtime 绑定来源源端口源端口源:来源指定是否该 ICMP 类型可用于 IPv4 和/或 IPv6。来源表:目标:文本文件互联网控制报文协议(ICMP)主要用于在联网的计算机间发送出错信息,但也发送类似 ping 请求以及回应等信息。上下文是正在运行的应用程序或服务的安全(SELinux)上下文。请使用 <tt>ps -e --context</tt> 获取正在运行的应用程序的上下文。直接配置给予直接访问防火墙方式。这些选项需要用户了解基本的 iptables 概念,比如表、链、命令、参数和目标。直接配置应该仅用于当其他 firewalld 功能都不可用时的最后手段。每个操作的 IPV 参数应为 ipv4 或 ipv6 或 eb。ipv4 用于 iptables,ipv6 用于 ip6tables,eb 用于以太网桥接(ebtables)。锁定功能是适用于 firewalld 的轻量级用户和应用程序规范。它保证变更仅限于防火墙。锁定白名单可以包含命令、上下文、用户和用户 ID。掩码和掩码字段都是 32 位宽的未签名数字。对于 ipv4 地址,该掩码必须为网络掩码或一个数字。
对于 ipv6 地址,则该掩码为一个数字。该掩码必须为网络掩码或一个数字。该掩码为一个数字。穿通规则将被直接传递给防火墙而不会放置到特殊链中。可以使用所有 iptables、ip6tables 和 ebtables 选项。优先级用于规则排序。优先级0 代表在链顶端添加规则,更大的优先级将添加到链下方。优先级相同的规则将具备相同的级别,排序并不固定并有可能变化。如果您想要确保一个规则会在另外一个后添加,需为前者指定低优先级而为后者指定高优先级。这个 IPSet 使用 timeout 选项,因此在这个看不到。应直接使用 ipset 命令处理该条目。这项功能对于在绝大多数时间里使用默认区域的人有用。对于经常改变连接区域的用户来说,用处有限。以秒为单位的超时值超时:目的地址目的端口若启用该项,操作需为'reject'并且家族选择'ipv4'或'ipv6'(但不能同时选择)试图连接至 firewalld,等待中...类型:被网络连接  '%s' 使用用户 ID用户 ID用户 ID。用户名用户名用户名。版本:警告包含限制:区域在接口 '%s' 启用区域 '%s'在来源  '%s' 已启用区域 '%s'区域 '%s': ICMP 类型 '%s' 不可用。区域 '%s': 服务 '%s' 不可用。在接口 '{interface}' 启用连接 '{connection}' 的区域 '{zone}'在接口 '{interface}' 启用区域 '{zone}'在来源 {source} 启用区域 '{zone}'在接口 '{interface}' {activated_deactivated} 连接 '{connection}' 的区域 '{zone}' 在接口 '{interface}' {activated_deactivated} 区域 '{zone}' 在来源 '{source}' {activated_deactivated} 区域 '{zone}'区:%s区域文件(_F)帮助(_H)选项(_O)查看(V)接受已启用警告严重天已禁用除错禁用丢弃eb紧急启用错误firewall;network;security;iptables;netfilter;转发端口小时ICMP 阻拦信息反转ipv4IPv4 及 IPv6ipv6ipv:标签等级限制日志标记伪装分nat提醒端口协议raw拒绝秒security服务source-port警告及类型:是{entry} (默认区:{default_zone}){entry} (区域:{zone})

OHA YOOOO