Translations by Federico Lazcano

Federico Lazcano has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

143 of 43 results
~
Once you install PHP5 related packages and enabled PHP5 Apache 2 module, you should restart Apache2 Web server to run PHP5 scripts. You can run the following command at a terminal prompt to restart your web server: <screen><command>sudo service apache2 restart</command> </screen>
2012-05-22
Una vez instalados los paquetes relacionados con PHP5, y habilitado el módulo PHP5 para Apache 2, debería reiniciar el servidor web Apache2 Web para ejecutar código PHP5. Puede ejecutar el siguiente comando en una terminal para reiniciar el servidor web: <screen><command>sudo service apache2 restart</command> </screen>
~
config openvpn client1 option enable 1 option client 1 # option dev tap option dev tun option proto udp option ca /etc/openvpn/ca.crt option cert /etc/openvpn/client.crt option key /etc/openvpn/client.key option comp_lzo 1
2012-04-20
config openvpn client1 option enable 1 option client 1 # option dev tap option dev tun option proto udp option ca /etc/openvpn/ca.crt option cert /etc/openvpn/client.crt option key /etc/openvpn/client.key option comp_lzo 1
~
root@client:~# restart network-manager network-manager start/running, process 3078
2012-04-20
root@client:~# restart network-manager network-manager start/running, process 3078
~
The PHP5 is available in Ubuntu Linux. Unlike python and perl, which are installed in the base system, PHP must be added.
2012-04-20
PHP5 está disponible en Ubuntu Linux. A diferencia de python y perl, los cuales están instalados en el sistema base, PHP debe ser añadido.
29.
The server also reads a file containing mime document types; the filename is set by the <emphasis>TypesConfig</emphasis> directive, typically via <filename>/etc/apache2/mods-available/mime.conf</filename>, which might also include additions and overrides, and is <filename>/etc/mime.types</filename> by default.
2012-05-27
El servidor también lee un archivo que contiene los tipos de documento MIMe; El nombre de archivo es configurado por la directiva <emphasis>TypesConfig</emphasis>, típicamente a través de <filename>/etc/apache2/mods-available/mime.conf</filename>, el cual también puede incluir agregados e invalidaciones, y es por defecto <filename>/etc/mime.types</filename>.
73.
<emphasis role="bold">Group</emphasis> - The Group directive is similar to the User directive. Group sets the group under which the server will answer requests. The default group is also "www-data".
2012-05-22
<emphasis role="bold">Group</emphasis> - La directiva Group es similar a la directiva User. Esta directiva define el grupo bajo el cual el servidor responderá las peticiones. El grupo por defecto también es "www-data".
101.
If access must be granted to more than one group per directory, enable Access Control Lists (ACLs).
2012-04-20
Si el acceso debe ser permitido a más de un grupo por directorio, habilite Listas de Control de Acceso (LCA)
179.
To install the Tomcat server, you can enter the following command in the terminal prompt:
2012-04-20
Para instalar el servidor Tomcat, puede ingresar en siguiente comando en la consola:
232.
OpenVPN is a Virtual Private Networking (VPN) solution provided in the Ubuntu Repositories. It is flexible, reliable and secure. It belongs to the family of SSL/TLS VPN stacks (different from IPSec VPNs). This chapter will cover installing and configuring <application>OpenVPN</application> to create a VPN.
2012-05-22
OpenVPN es una solución de Red Privada Virtual (VPN) provista en los repositorios Ubuntu. Es flexible, confiable y segura. Pertenece a la famila de VPN SSL/TLS (diferente de IPSec). Esta capítulo cubre la instalación y la configuración de <application>OpenVPN</application> para crear VPN.
250.
Enter the following to generate the master Certificate Authority (CA) certificate and key:
2012-04-20
Para generar el certificado y la clave maestra de la Autoridad Certificadora (AC), ingrese lo siguiente:
270.
/etc/openvpn/easy-rsa/keys/client1.key
2012-04-20
/etc/openvpn/easy-rsa/keys/client1.key
298.
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf /etc/openvpn/
2012-04-20
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf /etc/openvpn/
300.
ca ca.crt cert client1.crt key client1.key
2012-04-20
ca ca.crt cert client1.crt key client1.key
302.
client remote vpnserver.example.com 1194
2012-04-20
client remote vpnserver.example.com 1194
304.
Now start the OpenVPN client:
2012-04-20
Ahora inicie el cliente OpenVPN:
306.
Check if it created a tun0 interface:
2012-04-20
Revise si fue creada la interfaz tun0:
307.
root@client:/etc/openvpn# ifconfig tun0 tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:10.8.0.6 P-t-P:10.8.0.5 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
2012-04-20
root@client:/etc/openvpn# ifconfig tun0 tun0 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 inet addr:10.8.0.6 P-t-P:10.8.0.5 Mask:255.255.255.255 UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
308.
Check if you can ping the OpenVPN server:
2012-04-20
Revise si puede hacer ping al servidor OpenVPN:
309.
root@client:/etc/openvpn# ping 10.8.0.1 PING 10.8.0.1 (10.8.0.1) 56(84) bytes of data. 64 bytes from 10.8.0.1: icmp_req=1 ttl=64 time=0.920 ms
2012-04-20
root@client:/etc/openvpn# ping 10.8.0.1 PING 10.8.0.1 (10.8.0.1) 56(84) bytes of data. 64 bytes from 10.8.0.1: icmp_req=1 ttl=64 time=0.920 ms
311.
Check out your routes:
2012-04-20
Revise las rutas:
312.
root@client:/etc/openvpn# netstat -rn Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 10.8.0.5 0.0.0.0 255.255.255.255 UH 0 0 0 tun0 10.8.0.1 10.8.0.5 255.255.255.255 UGH 0 0 0 tun0 192.168.42.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.42.1 0.0.0.0 UG 0 0 0 eth0
2012-04-20
root@client:/etc/openvpn# netstat -rn Kernel IP routing table Destination Gateway Genmask Flags MSS Window irtt Iface 10.8.0.5 0.0.0.0 255.255.255.255 UH 0 0 0 tun0 10.8.0.1 10.8.0.5 255.255.255.255 UGH 0 0 0 tun0 192.168.42.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0 0.0.0.0 192.168.42.1 0.0.0.0 UG 0 0 0 eth0
326.
push "route 10.0.0.0 255.0.0.0"
2012-04-20
push "route 10.0.0.0 255.0.0.0"
328.
push "redirect-gateway def1 bypass-dhcp"
2012-04-20
push "redirect-gateway def1 bypass-dhcp"
330.
server 10.8.0.0 255.255.255.0
2012-04-20
server 10.8.0.0 255.255.255.0
332.
ifconfig-pool-persist ipp.txt
2012-04-20
ifconfig-pool-persist ipp.txt
333.
Push DNS servers to the client.
2012-04-20
Fuerce los servidores DNS en el cliente.
334.
push "dhcp-option DNS 10.0.0.2" push "dhcp-option DNS 10.1.0.2"
2012-04-20
push "dhcp-option DNS 10.0.0.2" push "dhcp-option DNS 10.1.0.2"
335.
Allow client to client communication.
2012-04-20
Permitir la comunicación entre clientes.
336.
client-to-client
2012-04-20
client-to-client
337.
Enable compression on the VPN link.
2012-04-20
Habilitar compresión en el enlace VPN.
338.
comp-lzo
2012-04-20
comp-lzo
340.
keepalive 1 3
2012-04-20
keepalive 1 3
342.
user nobody group nogroup
2012-04-20
user nobody group nogroup
344.
# client config! auth-user-pass
2012-04-20
# client config! auth-user-pass
354.
auto eth0 iface eth0 inet static address 1.2.3.4 netmask 255.255.255.248 default 1.2.3.1 auto eth1 iface eth1 inet static address 10.0.0.4 netmask 255.255.255.0
2012-04-20
auto eth0 iface eth0 inet static address 1.2.3.4 netmask 255.255.255.248 default 1.2.3.1 auto eth1 iface eth1 inet static address 10.0.0.4 netmask 255.255.255.0
356.
auto eth0 iface eth0 inet static address 1.2.3.4 netmask 255.255.255.248 default 1.2.3.1 auto eth1 iface eth1 inet manual up ip link set $IFACE up promisc on auto br0 iface br0 inet static address 10.0.0.4 netmask 255.255.255.0 bridge_ports eth1
2012-04-20
auto eth0 iface eth0 inet static address 1.2.3.4 netmask 255.255.255.248 default 1.2.3.1 auto eth1 iface eth1 inet manual up ip link set $IFACE up promisc on auto br0 iface br0 inet static address 10.0.0.4 netmask 255.255.255.0 bridge_ports eth1
361.
;dev tun dev tap up "/etc/openvpn/up.sh br0 eth1" ;server 10.8.0.0 255.255.255.0 server-bridge 10.0.0.4 255.255.255.0 10.0.0.128 10.0.0.254
2012-04-20
;dev tun dev tap up "/etc/openvpn/up.sh br0 eth1" ;server 10.8.0.0 255.255.255.0 server-bridge 10.0.0.4 255.255.255.0 10.0.0.128 10.0.0.254
363.
#!/bin/sh BR=$1 ETHDEV=$2 TAPDEV=$3 /sbin/ip link set "$TAPDEV" up /sbin/ip link set "$ETHDEV" promisc on /sbin/brctl addif $BR $TAPDEV
2012-04-20
#!/bin/sh BR=$1 ETHDEV=$2 TAPDEV=$3 /sbin/ip link set "$TAPDEV" up /sbin/ip link set "$ETHDEV" promisc on /sbin/brctl addif $BR $TAPDEV
364.
Then make it executable:
2012-04-20
Luego, conviértalo en ejecutable:
386.
# sample client.ovpn for Tunnelblick client remote blue.example.com port 1194 proto udp dev tun dev-type tun ns-cert-type server reneg-sec 86400 auth-user-pass auth-nocache auth-retry interact comp-lzo yes verb 3 ca ca.crt cert client.crt key client.key
2012-04-20
# sample client.ovpn for Tunnelblick client remote blue.example.com port 1194 proto udp dev tun dev-type tun ns-cert-type server reneg-sec 86400 auth-user-pass auth-nocache auth-retry interact comp-lzo yes verb 3 ca ca.crt cert client.crt key client.key
398.
opkg update
2012-04-20
opkg update
399.
opkg install openvpn
2012-04-20
opkg install openvpn
4899.
translator-credits
2013-03-27
Launchpad Contributions: Adolfo Jayme Barrientos https://launchpad.net/~fitoschido Clever https://launchpad.net/~cleverflores Eduardo Alberto Calvo https://launchpad.net/~edu5800 Federico Lazcano https://launchpad.net/~lazki Ivan https://launchpad.net/~ivan-fr1990 Monkey https://launchpad.net/~monkey-libre Paco Molinero https://launchpad.net/~franciscomol jamesjedimaster https://launchpad.net/~jamesjedimaster