Browsing Russian translation

Don't show this notice anymore
Before translating, be sure to go through Ubuntu Translators instructions and Russian guidelines.
663672 of 2030 results
663.
-t nat -- the rule is to go into the nat table
-t nat -- правило, для обращения к таблице NAT
Translated and reviewed by Alexey Balmashnov
Located in serverguide/C/security.xml:744(para)
664.
-A POSTROUTING -- the rule is to be appended (-A) to the POSTROUTING chain
-A POSTROUTING -- правило, добавлямое (-A) к цепочке POSTROUTING
Translated and reviewed by Alexey Balmashnov
Located in serverguide/C/security.xml:745(para)
665.
-s 192.168.0.0/16 -- the rule applies to traffic originating from the specified address space
-s 192.168.0.0/16 -- правило применяется для трафика, происходящего из обозначенного адресного пространства
Translated and reviewed by Roman Dronov
Located in serverguide/C/security.xml:746(para)
666.
-o ppp0 -- the rule applies to traffic scheduled to be routed through the specified network device
-o ppp0 -- правило применяется к трафику, который планируется направить через определенное сетевое устройство
Translated and reviewed by Roman Dronov
Located in serverguide/C/security.xml:747(para)
667.
-j MASQUERADE -- traffic matching this rule is to "jump" (-j) to the MASQUERADE target to be manipulated as described above
-j MASQUERADE -- трафик попадающий под данное правило должен быть перенаправлен "jump" (-j) с маскировкой (MASQUERADE) для обработки, как описано выше
Translated and reviewed by Alexey Balmashnov
Located in serverguide/C/security.xml:749(para)
668.
Also, each chain in the filter table (the default table, and where most or all packet filtering occurs) has a default <emphasis>policy</emphasis> of ACCEPT, but if you are creating a firewall in addition to a gateway device, you may have set the policies to DROP or REJECT, in which case your masqueraded traffic needs to be allowed through the FORWARD chain for the above rule to work:
Также, каждая цепочка в таблице фильтров (таблица по умолчанию, в которой происходит большая часть фильтрации) имеет <emphasis>политику</emphasis> по умолчанию для правила ACCEPT, но если вы создаете брандмауэр в дополнение к устройству шлюза, вы можете установить политики в DROP или REJECT. В этом случае ваш замаскированный трафик должен быть разрешён в цепочке FORWARD, для того, чтобы правило вверху работало:
Translated by Alexander Telenga
Reviewed by Alexander Telenga
Located in serverguide/C/security.xml:757(para)
669.

sudo iptables -A FORWARD -s 192.168.0.0/16 -o ppp0 -j ACCEPT
sudo iptables -A FORWARD -d 192.168.0.0/16 -m state --state ESTABLISHED,RELATED -i ppp0 -j ACCEPT
There are line breaks here. Each one represents a line break. Start a new line in the equivalent position in the translation.

sudo iptables -A FORWARD -s 192.168.0.0/16 -o ppp0 -j ACCEPT
sudo iptables -A FORWARD -d 192.168.0.0/16 -m state --state ESTABLISHED,RELATED -i ppp0 -j ACCEPT
Translated and reviewed by Petr E. Antonov
Located in serverguide/C/security.xml:764(screen)
670.
The above commands will allow all connections from your local network to the Internet and all traffic related to those connections to return to the machine that initiated them.
Верхняя команда разрешит все соединения из вашей локальной сети с Интернетом, и весь трафик, относящийся к этим соединениям, будет возвращаться машинам, их установившим.
Translated and reviewed by Alexander Telenga
Located in serverguide/C/security.xml:768(para)
671.
If you want masquerading to be enabled on reboot, which you probably do, edit <filename>/etc/rc.local</filename> and add any commands used above. For example add the first command with no filtering:
Если вы хотите включить маскарадинг после перезагрузки, что вы уже, вероятно сделали, отредактируйте <filename>/etc/rc.local</filename> и добавьте любую из перечисленных выше команд. Например, добавьте первую команду без фильтрации:
Translated by Alexander Telenga
Reviewed by Alexander Telenga
Located in serverguide/C/security.xml:775(para)
672.

iptables -t nat -A POSTROUTING -s 192.168.0.0/16 -o ppp0 -j MASQUERADE
There are line breaks here. Each one represents a line break. Start a new line in the equivalent position in the translation.

iptables -t nat -A POSTROUTING -s 192.168.0.0/16 -o ppp0 -j MASQUERADE
Translated and reviewed by Petr E. Antonov
Located in serverguide/C/security.xml:779(screen)
663672 of 2030 results

This translation is managed by Russian Ubuntu Translators, assigned by Ubuntu Translators.

You are not logged in. Please log in to work on translations.

Contributors to this translation: Alex Mr.Brightside Demurine, Alex Nikolaenko, Alexander Ilyashov, Alexander Nasonkin, Alexander Salamatnikov, Alexander Telenga, Alexey 'keir' Dunaev, Alexey Balmashnov, Andrew Diakin, Andrew Krivosheev, Andrey Bachmaga, Arsen Kamensky, Artem Popov, Dennis Prochko, Dmitriy Goroshko, Dmitry Drozdovich, Dmitry Tumaikin, Eugene Fedin, Evgeny, Georgy Faradzhev, Gofer, IC Raibow, Igor Zakharov, Igor Zubarev, Ivan Kliouchenkov, Krox, Leo, Matthew East, Maxim Rogachev, Mikhail Kashkin, Mikhail Pitertsev, Nash, Nick Gorbunov, Nicolae Istratii, Nikolay Saptsin, Oleg Koptev, Pavel Shylenok, Petr E. Antonov, RBasil, Roman Dronov, Sergey A.Stukalov, Sergey Kirienko, Sergey M. Nenashev, Sergey Sedov, Sergey Tuchkin, Somebody32, Someone, Vadim Glyshkov, Valentina Mukhamedzhanova, Viktor Kazakov, Vladimir Ovcharuk, Vyacheslav Rodionov, andrey i. mavlyanov, boa, chups, ehpc, ekn, evilzipik, nailll, qxov, redirect2006, roland, roma333, takedown, v0v04ka, vasilisc, vic-quakesrc, xXLiAXx, Александр AldeX Крылов.