Level2 generic French translation

This commit is contained in:
2017-10-13 13:05:56 -05:00
parent b79fd16384
commit 2d8aae5a61
12 changed files with 1556 additions and 571 deletions

View File

@ -4,16 +4,18 @@
<Network>
<en_message>Firewall devices can have an advanced firewall. You can control which interfaces can ping which interfaces. This allows you to protect one side of the LAN from the other. We will use this functionality a lot more later on.
This technology is mainly used for VLAN security, or setting up a DMZ. To do this puzzle, remove the firewall rule that is keeping the one side from pinging the other side.</en_message>
<fr_message>Les pare-feu peuvent avoir un pare-feu avancé. Vous pouvez contrôler quelles interfaces peuvent cingler quelles interfaces. Cela vous permet de protéger un côté du réseau local de l'autre. Nous utiliserons cette fonctionnalité beaucoup plus tard.
Cette technologie est principalement utilisée pour la sécurité VLAN, ou la mise en place d'une DMZ. Pour ce casse-tête, supprimez la règle du pare-feu qui empêche le côté d'envoyer un ping de l'autre côté.</fr_message>
<en_title>Firewall Test 2</en_title>
<height>1024</height>
<width>1024</width>
<itemsize>100</itemsize>
<showlabels>False</showlabels>
<showlabels>none</showlabels>
<level>2</level>
<sortorder>0.01</sortorder>
<uniqueidentifier>158</uniqueidentifier>
<startinghelplevel>full</startinghelplevel>
<vlansenabled>False</vlansenabled>
<vlansenabled>True</vlansenabled>
<VLANPacketColors>False</VLANPacketColors>
<device>
<hostname>firewall0</hostname>
@ -42,7 +44,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>wan</nictype>
<uniqueidentifier>104</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>wan0</nicname>
<myip>
@ -67,7 +69,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>101</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -92,7 +94,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>eth</nictype>
<uniqueidentifier>102</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>eth0</nicname>
<myip>
@ -117,7 +119,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>eth</nictype>
<uniqueidentifier>103</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>eth1</nicname>
<myip>
@ -186,7 +188,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>106</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -211,7 +213,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>management_interface</nictype>
<uniqueidentifier>107</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>management_interface0</nicname>
<myip>
@ -236,7 +238,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>108</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port1</nicname>
<myip>
@ -261,7 +263,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>109</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port2</nicname>
<myip>
@ -286,7 +288,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>110</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port3</nicname>
<myip>
@ -311,7 +313,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>111</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port4</nicname>
<myip>
@ -336,7 +338,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>112</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port5</nicname>
<myip>
@ -361,7 +363,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>113</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port6</nicname>
<myip>
@ -386,7 +388,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>114</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port7</nicname>
<myip>
@ -426,7 +428,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>119</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -451,7 +453,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>management_interface</nictype>
<uniqueidentifier>120</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>management_interface0</nicname>
<myip>
@ -476,7 +478,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>121</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port1</nicname>
<myip>
@ -501,7 +503,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>122</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port2</nicname>
<myip>
@ -526,7 +528,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>123</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port3</nicname>
<myip>
@ -551,7 +553,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>124</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port4</nicname>
<myip>
@ -576,7 +578,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>125</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port5</nicname>
<myip>
@ -601,7 +603,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>126</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port6</nicname>
<myip>
@ -626,7 +628,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>127</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port7</nicname>
<myip>
@ -666,7 +668,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>140</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -691,7 +693,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>management_interface</nictype>
<uniqueidentifier>141</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>management_interface0</nicname>
<myip>
@ -716,7 +718,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>142</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port1</nicname>
<myip>
@ -741,7 +743,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>143</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port2</nicname>
<myip>
@ -766,7 +768,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>144</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port3</nicname>
<myip>
@ -791,7 +793,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>145</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port4</nicname>
<myip>
@ -816,7 +818,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>146</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port5</nicname>
<myip>
@ -841,7 +843,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>147</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port6</nicname>
<myip>
@ -866,7 +868,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>port</nictype>
<uniqueidentifier>148</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>port7</nicname>
<myip>
@ -906,7 +908,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>116</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -931,7 +933,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>eth</nictype>
<uniqueidentifier>117</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>eth0</nicname>
<myip>
@ -971,7 +973,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>129</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -996,7 +998,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>eth</nictype>
<uniqueidentifier>130</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>eth0</nicname>
<myip>
@ -1036,7 +1038,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>136</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -1061,14 +1063,14 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>eth</nictype>
<uniqueidentifier>137</uniqueidentifier>
<usesdhcp>True</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>eth0</nicname>
<myip>
<ip>192.168.1.5</ip>
<mask>255.255.255.0</mask>
<gateway>192.168.1.1</gateway>
<type>route</type>
<ip>0.0.0.0</ip>
<mask>0.0.0.0</mask>
<gateway>0.0.0.0</gateway>
<type>ip</type>
</myip>
<VLAN
ID="1">Untagged</VLAN>
@ -1101,7 +1103,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>150</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -1126,7 +1128,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>eth</nictype>
<uniqueidentifier>151</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>eth0</nicname>
<myip>
@ -1166,7 +1168,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>lo</nictype>
<uniqueidentifier>155</uniqueidentifier>
<usesdhcp>False</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>lo0</nicname>
<myip>
@ -1191,14 +1193,14 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<nictype>eth</nictype>
<uniqueidentifier>156</uniqueidentifier>
<usesdhcp>True</usesdhcp>
<ssid />
<encryptionkey />
<interface>
<nicname>eth0</nicname>
<myip>
<ip>192.168.2.5</ip>
<mask>255.255.255.0</mask>
<gateway>192.168.2.1</gateway>
<type>route</type>
<ip>0.0.0.0</ip>
<mask>0.0.0.0</mask>
<gateway>0.0.0.0</gateway>
<type>ip</type>
</myip>
<VLAN
ID="1">Untagged</VLAN>
@ -1218,7 +1220,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<hostname>net_switch1</hostname>
<nicname>port1</nicname>
</DstNic>
<hostname />
<hostname>pc1_link_net_switch1</hostname>
<linktype>normal</linktype>
<uniqueidentifier>131</uniqueidentifier>
</link>
@ -1235,7 +1237,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<hostname>firewall0</hostname>
<nicname>eth0</nicname>
</DstNic>
<hostname />
<hostname>net_switch1_link_firewall0</hostname>
<linktype>normal</linktype>
<uniqueidentifier>132</uniqueidentifier>
</link>
@ -1252,7 +1254,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<hostname>net_switch0</hostname>
<nicname>port1</nicname>
</DstNic>
<hostname />
<hostname>firewall0_link_net_switch0</hostname>
<linktype>normal</linktype>
<uniqueidentifier>133</uniqueidentifier>
</link>
@ -1269,7 +1271,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<hostname>pc0</hostname>
<nicname>eth0</nicname>
</DstNic>
<hostname />
<hostname>net_switch0_link_pc0</hostname>
<linktype>normal</linktype>
<uniqueidentifier>134</uniqueidentifier>
</link>
@ -1286,7 +1288,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<hostname>net_switch1</hostname>
<nicname>port3</nicname>
</DstNic>
<hostname />
<hostname>pc2_link_net_switch1</hostname>
<linktype>normal</linktype>
<uniqueidentifier>138</uniqueidentifier>
</link>
@ -1303,7 +1305,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<hostname>net_switch2</hostname>
<nicname>port1</nicname>
</DstNic>
<hostname />
<hostname>firewall0_link_net_switch2</hostname>
<linktype>normal</linktype>
<uniqueidentifier>152</uniqueidentifier>
</link>
@ -1320,7 +1322,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<hostname>pc3</hostname>
<nicname>eth0</nicname>
</DstNic>
<hostname />
<hostname>net_switch2_link_pc3</hostname>
<linktype>normal</linktype>
<uniqueidentifier>153</uniqueidentifier>
</link>
@ -1337,7 +1339,7 @@ This technology is mainly used for VLAN security, or setting up a DMZ. To do th
<hostname>net_switch2</hostname>
<nicname>port3</nicname>
</DstNic>
<hostname />
<hostname>pc4_link_net_switch2</hostname>
<linktype>normal</linktype>
<uniqueidentifier>157</uniqueidentifier>
</link>