mirror of
https://github.com/webmin/webmin.git
synced 2026-03-20 16:50:24 +00:00
add filtering chains and ipset explanation to intro.html
This commit is contained in:
@@ -69,6 +69,24 @@ prendre la configuraci
|
||||
disposició de l'editor. Finalment, si la distribució ho suporta, hi ha
|
||||
un botó per canviar si el tallafocs s'activa en engegar el sistema o no. <p>
|
||||
|
||||
|
||||
|
||||
<h3>Filtering chains</h3>
|
||||
|
||||
For better collaboration with external iptables scripts you can exclude individual
|
||||
chains from the processing by the firewall. To do this, you must select direct
|
||||
processing of rules in the settings and enter a filter list, which excludes
|
||||
the appropriate chains from processing.
|
||||
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
|
||||
<p>
|
||||
|
||||
<h3>IP Sets</h3>
|
||||
|
||||
Newer versions of ip(6)table support the ipset extension.
|
||||
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
|
||||
and used as a condition in rules. On the main page, existing IP sets that can be used by
|
||||
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
|
||||
<p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
|
||||
@@ -69,5 +69,20 @@ Schließlich gibt noch eine Schaltfläche, um zu einzustellen ob die Fi
|
||||
Bootens aktiviert wird oder nicht.
|
||||
<p>
|
||||
|
||||
<h3>Filtern von Ketten</h3>
|
||||
|
||||
Für die bessere Zusammenarbeit mit exernen IPtables Scripten kann man einzelne Ketten von
|
||||
der Bearbeitung durch die Firewall ausnehmen. Dazu müssen sie in den Einstellungen die direkte
|
||||
Bearbeitung von Regeln auswählen und eine Filterliste
|
||||
eingeben, welche die passenden Ketten von der Bearbeitung ausnimmt.
|
||||
Ketten die nicht bearbeitet werden mit dem Hinweis "nichit von Firewall verwaltet" angezeigt<p>
|
||||
|
||||
<h3>IP-Sets</h3>
|
||||
|
||||
Neuere Versionen von IPtable unterstützen die Erweiterung ipset. IP-Sets sind Listen von IP-Adressen
|
||||
im Hauptspeicher, die sehr effizient durchsucht und als Bedingung in Regeln verwendet werden können.
|
||||
Auf der Hauptseite werden vorhandene IP-Sets die von der Regeln verwendet werden können angezeigt.
|
||||
Derzeit ist es allerdings nicht möglich diese in der Firewall zu verwalten.
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
@@ -68,5 +68,22 @@ taking the configuration that is currently in the kernel and making it
|
||||
available for editing. Finally, if your distribution supports it, there is
|
||||
a button to change whether the firewall is activated at boot time or not. <p>
|
||||
|
||||
<h3>Filtering chains</h3>
|
||||
|
||||
For better collaboration with external iptables scripts you can exclude individual
|
||||
chains from the processing by the firewall. To do this, you must select direct
|
||||
processing of rules in the settings and enter a filter list, which excludes
|
||||
the appropriate chains from processing.
|
||||
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
|
||||
<p>
|
||||
|
||||
<h3>IP Sets</h3>
|
||||
|
||||
Newer versions of ip(6)table support the ipset extension.
|
||||
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
|
||||
and used as a condition in rules. On the main page, existing IP sets that can be used by
|
||||
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
|
||||
<p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
@@ -75,5 +75,23 @@ vervolgens kunt bewerken.
|
||||
Tot slot, indien uw distributie dit ondersteund is er ook een knop waarmee u kunt
|
||||
wijzigen of de firewall wel of niet tijdens het booten geactiveerd moet worden. <p>
|
||||
|
||||
<hr>
|
||||
|
||||
<h3>Filtering chains</h3>
|
||||
|
||||
For better collaboration with external iptables scripts you can exclude individual
|
||||
chains from the processing by the firewall. To do this, you must select direct
|
||||
processing of rules in the settings and enter a filter list, which excludes
|
||||
the appropriate chains from processing.
|
||||
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
|
||||
<p>
|
||||
|
||||
<h3>IP Sets</h3>
|
||||
|
||||
Newer versions of ip(6)table support the ipset extension.
|
||||
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
|
||||
and used as a condition in rules. On the main page, existing IP sets that can be used by
|
||||
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
|
||||
<p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
@@ -68,5 +68,23 @@ edycj
|
||||
funkcję znajduje się przycisk umożliwiający wybranie, czy firewall
|
||||
ma być aktywowany w momencie uruchamiania systemu czy nie. <p>
|
||||
|
||||
<hr>
|
||||
|
||||
<h3>Filtering chains</h3>
|
||||
|
||||
For better collaboration with external iptables scripts you can exclude individual
|
||||
chains from the processing by the firewall. To do this, you must select direct
|
||||
processing of rules in the settings and enter a filter list, which excludes
|
||||
the appropriate chains from processing.
|
||||
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
|
||||
<p>
|
||||
|
||||
<h3>IP Sets</h3>
|
||||
|
||||
Newer versions of ip(6)table support the ipset extension.
|
||||
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
|
||||
and used as a condition in rules. On the main page, existing IP sets that can be used by
|
||||
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
|
||||
<p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
@@ -35,5 +35,23 @@ Voc
|
||||
|
||||
Na parte de baixo da página está um botão para tornar a configuração atual do firewall ativa, carregando-a através do comando <tt>ipi(6)tables-restore</tt>. A seguir está um botão para fazer o inverso - pegar a configuração que está corrente no kernel e torná-la disponível para edição. Finalmente, se sua distribuição suportar, existe um botão para indicar se o firewall será ativado durante o boot ou não. <p>
|
||||
|
||||
<hr>
|
||||
|
||||
<h3>Filtering chains</h3>
|
||||
|
||||
For better collaboration with external iptables scripts you can exclude individual
|
||||
chains from the processing by the firewall. To do this, you must select direct
|
||||
processing of rules in the settings and enter a filter list, which excludes
|
||||
the appropriate chains from processing.
|
||||
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
|
||||
<p>
|
||||
|
||||
<h3>IP Sets</h3>
|
||||
|
||||
Newer versions of ip(6)table support the ipset extension.
|
||||
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
|
||||
and used as a condition in rules. On the main page, existing IP sets that can be used by
|
||||
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
|
||||
<p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
@@ -40,5 +40,23 @@
|
||||
При попытке добавить или отредактировать правило, откроется новая страница на которой вы сможете выбрать <tt>Действие</tt> для правила, а так же <tt>Условие</tt>, при котором это Действие должно выполняться. <p>
|
||||
|
||||
В самом низу главной страницы находятся несколько кнопок: <tt>Применить конфигурацию</tt> - активирует текущие настройки брандмауэра, загружая их в ядро командой <tt>ipi(6)tables-restore</tt>. <tt>Вернуть конфигурацию</tt> действует наоборот - загружает в окно для конфигурирования настройки, активные в данный момент в ядре. <tt>Включать при запуске</tt> позволяет настроить автозапуск брандмауэра (если поддерживается вашим дистрибутивом). <tt>Сбросить конфигурацию</tt> - очищает все цепочки и таблицы, чтобы начать настройку с нуля.<p>
|
||||
<hr>
|
||||
|
||||
<h3>Filtering chains</h3>
|
||||
|
||||
For better collaboration with external iptables scripts you can exclude individual
|
||||
chains from the processing by the firewall. To do this, you must select direct
|
||||
processing of rules in the settings and enter a filter list, which excludes
|
||||
the appropriate chains from processing.
|
||||
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
|
||||
<p>
|
||||
|
||||
<h3>IP Sets</h3>
|
||||
|
||||
Newer versions of ip(6)table support the ipset extension.
|
||||
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
|
||||
and used as a condition in rules. On the main page, existing IP sets that can be used by
|
||||
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
|
||||
<p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
@@ -63,5 +63,23 @@ vezme konfigur
|
||||
podporuje, je tu ešte tlačidlo, ktoré nastaví, či sa má firewall aktivovať pri zavádzaní
|
||||
systému alebo nie. <p>
|
||||
|
||||
<hr>
|
||||
|
||||
<h3>Filtering chains</h3>
|
||||
|
||||
For better collaboration with external iptables scripts you can exclude individual
|
||||
chains from the processing by the firewall. To do this, you must select direct
|
||||
processing of rules in the settings and enter a filter list, which excludes
|
||||
the appropriate chains from processing.
|
||||
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
|
||||
<p>
|
||||
|
||||
<h3>IP Sets</h3>
|
||||
|
||||
Newer versions of ip(6)table support the ipset extension.
|
||||
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
|
||||
and used as a condition in rules. On the main page, existing IP sets that can be used by
|
||||
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
|
||||
<p>
|
||||
|
||||
<hr>
|
||||
|
||||
|
||||
19
firewall/help/ipset.txt
Normal file
19
firewall/help/ipset.txt
Normal file
@@ -0,0 +1,19 @@
|
||||
<h3>Filtering chains</h3>
|
||||
|
||||
For better collaboration with external iptables scripts you can exclude individual
|
||||
chains from the processing by the firewall. To do this, you must select direct
|
||||
processing of rules in the settings and enter a filter list, which excludes
|
||||
the appropriate chains from processing.
|
||||
Chains that are not exculded from editing are flagged with a "not managed by firewall" message.
|
||||
<p>
|
||||
|
||||
<h3>IP Sets</h3>
|
||||
|
||||
Newer versions of ip(6)table support the ipset extension.
|
||||
IP sets are lists of IP addresses in the main memory, which can be searched very efficiently
|
||||
and used as a condition in rules. On the main page, existing IP sets that can be used by
|
||||
rules are displayed. Currently, however, it is not possible to manage these in the firewall.
|
||||
<p>
|
||||
|
||||
<hr>
|
||||
|
||||
Reference in New Issue
Block a user