Translations by EAdam

EAdam has submitted the following strings to this translation. Contributions are visually coded: currently used translations, unreviewed suggestions, rejected suggestions.

51100 of 107 results
512.
source vars
2011-05-07
原始变量
513.
./clean-all
2011-05-07
./clean-all
514.
./build-dh
2011-05-07
./build-dh
515.
./pkitool --initca
2011-05-07
./pkitool --initca
516.
./pkitool --server server
2011-05-07
./pkitool --server server
517.
cd keys
2011-05-07
cd keys
518.
openvpn --genkey --secret ta.key
2011-05-07
openvpn --genkey --secret ta.key
519.
sudo cp server.crt server.key ca.crt dh1024.pem ta.key /etc/openvpn/
2011-05-07
sudo cp server.crt server.key ca.crt dh1024.pem ta.key /etc/openvpn/
520.
Client Certificates
2011-05-07
客户端证书
521.
The VPN client will also need a certificate to authenticate itself to the server. To create the certificate, enter the following in a terminal:
2011-05-07
VPN客户端也需要一个证书用来向服务器认证自己。要创建证书,请在终端输入:
522.
./pkitool hostname
2011-05-07
./pkitool hostname
523.
Replace <emphasis>hostname</emphasis> with the actual hostname of the machine connecting to the VPN.
2011-05-07
将<emphasis>hostname</emphasis>替换成要连接到VPN的实际主机名。
524.
Copy the following files to the client:
2011-05-07
将如下文件复制到客户端:
529.
Remember to adjust the above file names for your client machine's <emphasis>hostname</emphasis>.
2011-05-07
记得要将你的客户端机器的<emphasis>主机名</emphasis>的以上文件做相应调整。
530.
It is best to use a secure method to copy the certificate and key files. The <application>scp</application> utility is a good choice, but copying the files to removable media then to the client, also works well.
2011-05-07
最好是使用安全的方法来复制证书和钥匙文件。<application>scp</application>工具是个不错的选择,但将文件复制到可移除介质再复制到客户端也是可以的。
532.
Now configure the <application>openvpn</application> server by creating <filename>/etc/openvpn/server.conf</filename> from the example file. In a terminal enter:
2011-05-07
现在可以通过编辑示例文件中的<filename>/etc/openvpn/server.conf</filename>来配置<application>openvpn</application>。在终端中输入:
533.
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz /etc/openvpn/
2011-05-07
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/server.conf.gz /etc/openvpn/
534.
sudo gzip -d /etc/openvpn/server.conf.gz
2011-05-07
sudo gzip -d /etc/openvpn/server.conf.gz
537.
<emphasis>local</emphasis>: is the IP address of the bridge interface.
2011-05-07
<emphasis>local</emphasis>:是桥接界面的IP地址。
538.
<emphasis>server-bridge</emphasis>: needed when the configuration uses bridging. The <emphasis>172.18.100.101 255.255.255.0</emphasis> portion is the bridge interface and mask. The IP range <emphasis>172.18.100.105 172.18.100.200</emphasis> is the range of IP addresses that will be assigned to clients.
2011-05-07
<emphasis>server-bridge</emphasis>:在配置用户桥接时需要此项。<emphasis>172.18.100.101 255.255.255.0</emphasis>是桥接界面和掩码。IP范围<emphasis>172.18.100.105 172.18.100.200</emphasis>是将分配给客户端的IP地址范围。
539.
<emphasis>push</emphasis>: are directives to add networking options for clients.
2011-05-07
<emphasis>push</emphasis>: 是为客户端添加网络选项的命令。
540.
<emphasis>user and group</emphasis>: configure which user and group the <application>openvpn</application> daemon executes as.
2011-05-07
<emphasis>user and group</emphasis>: 配置<application>openvpn</application>程序执行时所使用的用户名和组名。
541.
Replace all IP addresses and domain names above with those of your network.
2011-05-07
用你自己网络相应的IP地址和域名来做替换。
542.
Next, create a couple of helper scripts to add the <emphasis>tap</emphasis> interface to the bridge. Create <filename>/etc/openvpn/up.sh</filename>:
2011-05-07
接下来,创建两个帮助脚本将<emphasis>tap</emphasis>界面添加至桥接。创建<filename>/etc/openvpn/up.sh</filename>:
543.
#!/bin/sh BR=$1 DEV=$2 MTU=$3 /sbin/ifconfig $DEV mtu $MTU promisc up /usr/sbin/brctl addif $BR $DEV
2011-05-07
#!/bin/sh BR=$1 DEV=$2 MTU=$3 /sbin/ifconfig $DEV mtu $MTU promisc up /usr/sbin/brctl addif $BR $DEV
544.
And <filename>/etc/openvpn/down.sh</filename>:
2011-05-07
和<filename>/etc/openvpn/down.sh</filename>:
545.
#!/bin/sh BR=$1 DEV=$2 /usr/sbin/brctl delif $BR $DEV /sbin/ifconfig $DEV down
2011-05-07
#!/bin/sh BR=$1 DEV=$2 /usr/sbin/brctl delif $BR $DEV /sbin/ifconfig $DEV down
546.
Then make them executable:
2011-05-07
然后让他们可执行:
547.
sudo chmod 755 /etc/openvpn/down.sh
2011-05-07
sudo chmod 755 /etc/openvpn/down.sh
548.
sudo chmod 755 /etc/openvpn/up.sh
2011-05-07
sudo chmod 755 /etc/openvpn/up.sh
549.
After configuring the server, restart <application>openvpn</application> by entering:
2011-05-07
配置完服务器之后,使用以下命令来重启<application>openvpn</application>:
550.
sudo /etc/init.d/openvpn restart
2011-05-07
sudo /etc/init.d/openvpn restart
551.
Client Configuration
2011-05-07
客户端配置
554.
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf /etc/openvpn
2011-05-07
sudo cp /usr/share/doc/openvpn/examples/sample-config-files/client.conf /etc/openvpn
555.
Now edit <filename>/etc/openvpn/client.conf</filename> changing the following options:
2011-05-07
现在编辑<filename>/etc/openvpn/client.conf</filename>,更改以下选项:
556.
dev tap remote vpn.example.com 1194 cert hostname.crt key hostname.key tls-auth ta.key 1
2011-05-07
dev tap remote vpn.example.com 1194 cert hostname.crt key hostname.key tls-auth ta.key 1
557.
Replace <emphasis>vpn.example.com</emphasis> with the hostname of your VPN server, and <emphasis>hostname.*</emphasis> with the actual certificate and key filenames.
2011-05-07
用您的VPN服务器的主机名替换<emphasis>vpn.example.com</emphasis>,并用实际的证书和钥匙文件名替换<emphasis>hostname.*</emphasis>。
558.
Finally, restart <application>openvpn</application>:
2011-05-07
最后,重启<application>openvpn</application>:
559.
You should now be able to connect to the remote LAN through the VPN.
2011-05-07
您现在应该可以通过VPN连接到远程LAN。
560.
See the <ulink url="http://openvpn.net/">OpenVPN</ulink> website for additional information.
2011-05-07
请查看<ulink url="http://openvpn.net/">OpenVPN</ulink>网站以获取更多信息。
561.
Also, Pakt's <ulink url="http://www.packtpub.com/openvpn/book">OpenVPN: Building and Integrating Virtual Private Networks</ulink> is a good resource.
2011-05-07
还有,Pakt的<ulink url="http://www.packtpub.com/openvpn/book">OpenVPN: Building and Integrating Virtual Private Networks</ulink>也是个不错的信息源。
580.
You are now ready to install a <emphasis>Guest</emphasis> operating system. Installing a virtual machine follows the same process as installing the operating system directly on the hardware. You either need a way to automate the installation, or a keyboard and monitor will need to be attached to the physical machine.
2008-08-26
您现在正准备安装一个GUEST操作系统。依据与安装操作系统相同的步骤在电脑上安装虚拟机软件。您可以让安装自动进行,也可以将键盘及显示器连接到电脑来完成安装。
792.
Here is the command with all the options discussed above:
2011-05-07
这是使用了上面所有涉及到选项的命令:
1110.
Accessing Subversion repository via WebDAV protocol with SSL encryption (https://) is similar to http:// except that you must install and configure the digital certificate in your Apache2 web server. To use SSL with Subversion add the above Apache2 configuration to <filename>/etc/apache2/sites-available/default-ssl</filename>. For more information on setting up Apache2 with SSL see <xref linkend="https-configuration"/>.
2011-05-07
使用带有SSL加密的(https://)WebDAV协议访问Subversion仓库跟 http://... 的方式相似,除了你必须在你的Apache2中安装配置数字证书。 你可以向<filename>/etc/apache2/sites-available/default-ssl</filename>文件添加以上Apache2配置来使用带有SSL的Subversion。关于配置Apache2 SSL的更多信息请看<xref linkend="https-configuration"/>。
1111.
You can install a digital certificate issued by a signing authority. Alternatively, you can install your own self-signed certificate.
2011-05-07
您可以安装一个权威机构发行的数字证书。当然,您也可以安装一个自定义的证书。
1298.
Applications that open ports can include an <application>ufw</application> profile, which details the ports needed for the application to function properly. The profiles are kept in <filename role="directory">/etc/ufw/applications.d</filename>, and can be edited if the default ports have been changed.
2009-10-20
可以打开端口的应用程序可以被包含在<application>ufw</application>的预设文件中,这里根据功能适当的包含了应用程序所需的端口。这个预设文件包含在<filename role="directory">/etc/ufw/applications.d</filename>,在默认端口发生改变的时候可以进行编辑。
1318.
net/ipv4/ip_forward=1
2011-05-07
net/ipv4/ip_forward=1
1320.
net/ipv6/conf/default/forwarding=1
2011-05-07
net/ipv6/conf/default/forwarding=1
1332.
Similar to <application>ufw</application>, the first step is to enable IPv4 packet forwarding by editing <filename>/etc/sysctl.conf</filename> and uncomment the following line
2009-04-10
类似于<application>ufw</application>,激活IPv4包投递的第一步是编辑<filename>/etc/sysctl.conf</filename>并注释掉以下行:
2787.
The Exim4 does not use the above aliases to forward mails to Mailman, as it uses a <emphasis>discover</emphasis> approach. To suppress the aliases while creating the list, you can add <emphasis>MTA=None</emphasis> line in Mailman configuration file, <filename>/etc/mailman/mm_cfg.py</filename>.
2011-05-07
因为Exim4使用<emphasis>发现</emphasis> 机制,所以它不使用以上的别名将邮件转发给Mailman。要在创建列表时禁止别名,你可以将<emphasis>MTA=None</emphasis>添加到Mailman的配置文件<filename>/etc/mailman/mm_cfg.py</filename>中。