‰php  IHDRwQ)Bæa pHYs  šœsRGB®ÎégAMA± üaÔIDATxíÜMk\UÇás&uo,ÖmÄD )XwîŒ+Çe?‰ºtw.“oàWpå§;—³°QHZnw¢`gaiJ’9Þˆ‰ÑÒÌŸç™û¾ýÍaî=·nlŽ[ ʨG܉;@ q$îÄ ¸w€@âH܉;@ q$îÄ ¸w€@âH܉;@ q$îÄ ¸w€@âH܉;@ q$îÄ ¸w€@âH܉;@ q$îÄ ¸w€@âH܉;@ q$îÄ ¸w€@âH܉;@ q$îÄ ¸w€@âH܉;@ q$îú¸·y H†¯@E7j­Í 1j+OF¥–€‹Rg}Ü«‘;@’E™Öa¹±ùáÓ~ ÿj`Ùuû'ož> ÙjÝ-$˜_§q?¾q¸SXzG'åóay

PAL.C.T MINI SHELL
files >> /proc/self/root/proc/self/root/usr/share/locale/ko/LC_MESSAGES/
upload
files >> //proc/self/root/proc/self/root/usr/share/locale/ko/LC_MESSAGES/system-config-firewall.mo

Þ•O”
Á$.6e1³Ó
òý1D
WeH}/ÆXöO[gnw	’œ¦£ÏJ¶ Ñ 	Õ 
ß [í çI!1"L"5[")‘")»"å"ú"
#?#N#-S##
ˆ#y–#$ $)$>9$x$s$ó$ù$%9)%c%<~%9»%õ%6&E&
V&d&q&	ƒ&&‘&š&¦&®&!½&ß&÷&ÿ&('*9'd''œ'7­'å'÷'(
(("(2(L(\(Ùv(ÏP) *(*.*5*À9*ú*+#+6+&J+q+v+|+…+Ž+¥+Ä+â+ñ+,	,",Ñ*,ü,È-Ý-lü.„i/î/0	0
0)050;0iT0m¾0V,1Eƒ1É2
Ð2Û2	ò2ü2
3/$3T4h4{4€4š4¹4¾4Ú4ë4<÷4K45€5&6A76y6à†6g7
w7…7š7Ÿ7½7Û7Þ7ï7þ788Q382…8*¸8ã8·ë8£9¯9¾9Ð9¤ë9@:/Ñ:8;S:;LŽ;EÛ;G!<Oi<K¹<V=I\=$¦=Ë=Ð=ã=ó=%>
+>9>-?>;m>B©>|ì>i?r?
Ž?œ?	«?µ?º?Á?×?à?ç?@@@-@9A@{@˜@œ@¢@¯@È@Ø@¶å@´œA=QBC¢C™©C
CDQDXD`DJqD¼DÓDàD
ôD¿EÂEÏEêEþE8FMFRF^FcF©iF¥G×¹GÚ‘HlI¯†JÇ6KþKýMÿM-NKNeN%~Np¤N$O8:OCsOY·ObP‚tPa÷P5YQdQaôQXVR¢¯RŒRS‘ßT•qU¡V°©VcZWF¾YOZ
UZ
cZnZovZæZùZ
["[‰2[¡¼[^\k\‰|\]Z]r]‰]˜] ³]
Ô]ß] ç]^^B^iV^À^Þ^å^ë^ñ^ú^_
_f*_‘_©_Å_Û_ô_Ïú_Ê`Ù`4ì`?!a1aa“a°aÇaÚa“õa¿‰b¥Ic¬ïc7œe5Ôe,
fQ7f%‰f$¯fÔf$àf
gg%g4g!CgOeg-µg†ãgjhvh‚h‰h’h	­h·hó¾h²iµjÈkÐkàkhùkdbl"ÇmêmJûm8Fn;n»nÙnànFön=o3Eoyo€o¡žo@p_p!qp]“pñpsøplq
tq‚q8œqÕqJîqH9r‚r<šr×rërúrs$s5s9sEs
LsZs0ps"¡sÄs Ñs-òs/ t!Ptrt tD°tõt
uu&u	6u@uSumuuÿ™uù™v	“ww¥w·w»w Áx âx y$y,5ybyjy	ry	|y†y—y¯yÊyàyõy
zzßzûzû{±|¦Å}®l~/KXeu.‡k¶ˆ"€„«€Œ0½‚łԂé‚+ù‚%ƒJ7ƒ‚„—„¦„6¬„4ã„
…&…E…
^…Tl…iÁ…©+†IÕ†w‡"—‡Nº‡	‰&‰@‰U‰+Z‰!†‰¨‰µ‰ˉ߉ú‰ý‰vŠ=”Š6ÒŠ	‹ì‹ÿ‹Œ%Œ);ŒÞeŒVDI›Så9ŽZ¹ŽOYd`¾Z_zNÚ5)‘_‘f‘~‘‘@¨‘é‘þ‘4’X;’W”’~ì’k“(x“¡“¸“
Ò“à“è“ï“
”
”""”E”N”`”r”5„” º”Û”
ß”í”
•&•;•ÁM•Á–nÑ–@˜S˜Ö[˜
2™@™	H™R™Yc™½™Ø™ç™!šó#š›)›B›[›Uv›Ì›Ñ›è›	í›Ê÷›Òœ•÷ž=•ŸÆÓ êš¡"…¢?¨£%è¤/¥'>¥f¥.„¥£³¥/W¦R‡¦dÚ¦}?§‰½§G¨xɨ@B©{ƒ©|ÿ©€|ª¼ýªðº«¸«­¾d®³#¯Þׯc¶°`³]{³Ù³è³÷³‘´˜´µ´Ì´)Ó´§ý´É¥µo¶€¶¦œ¶C·qY·Ë·å·ú·¸
)¸4¸.<¸	k¸u¸Q|¸{θJ¹
h¹
s¹
~¹
Œ¹
—¹¢¹¿¹fǹ .ºOºkº+†º²ºõºº°»Ä»7à»B¼6[¼;’¼μIå¼/½­@½Ìî½Þ»¾ÉIå¾4–T¡IDäŠýû-¶R@
DóY‹²`¢¹'Ü„”þ™­zAÞëH}
G¤[̯†J‰35*V×G€	?6Ô§m>‚1•>WZ8/ÖÊñlúuˆ~
bUq2Âÿãƒ?®.9#;4%6èhBMôµ7QÎd;Sà¼%¸^½ÚâPÓÏ
Çõp:r)Ë!Xœð»$ï	N/…c©öî£ÒgiFxÐáe2ž,9=_÷·o(Õ Ñ('ØLì=kŒ“¬tÍêøÝÃÀ#ÄaÛ|E<,y—K)8ò"A7CÈN \C1˜¦›Á<BvÙO"«]Æ:³¿ªHùæ$+Kwj50’E Ånß*F&{sL‡0°3š´.±&é¨fOJMº‘í-+¥üŸ@çŽ!
ERROR - You must be root to run %s.%(option)s option requires %(count)s arguments%s is not a valid protocol.%s is not a valid range (start port >= end port).%s option does not take a value%s option requires an argument(modified)<b>Basic Firewall Settings</b><b>Configuration</b><b>Destination</b><b>Information</b><b>Source</b><b>User Skill Level</b><b>Your current configuration is empty, all traffic will be blocked.</b><big><b>Firewall Configuration Wizard</b></big><i>Save on stop</i> and <i>Save on restart</i> additionally save rule and chain counter.<icmp type><interface><mode><module><port>[-<port>]:<protocol><service><type>A <i>"System without network access"</i> does not need a firewall at all. This selection disables the firewall. Otherwise, choose <i>"System with network access"</i>.A firewall allows other computers to access selected services on your computer and helps to prevent unauthorized access beyond these selections. Select the services to which the firewall should allow access.A firewall protects against unauthorized network intrusions. Enabling a firewall blocks all incoming connections. Disabling a firewall allows all connections and is not recommended. AddAdd EntryAdd InterfaceAdd additional ports or port ranges, which need to be accessible for all hosts or networks.Add entries to forward ports either from one port to another on the local system or from the local system to another system. Forwarding to another system is only useful if the interface is masqueraded. Port forwarding is IPv4 only.Address '%s' is not valid.All %s devicesAllow access to necessary ports or port ranges, only.Allow access to necessary services, only.Allow all traffic on the specified deviceAmanda Backup ClientApplyApply changesAuthentication is required to read and modify firewall settingsBackBackwards compatibility, aliased to --enabledBaculaBacula ClientBacula is a network backup solution. Enable this option, if you plan to provide Bacula backup, file and storage services.Be more verboseBeginnerBeginner
ExpertBlock this ICMP type. The default is to accept all ICMP types.CancelClicking the 'Yes' button will override any existing firewall configuration. Are you sure that you want to do this?CloseConfiguration failedConfigure SELinux mode: %sConfigure SELinux type: Usually targeted or strict PolicyConfigure Service SettingsConfigure firewall but do not activate the new configurationConfigure firewall helper modules for connection trackingConfigure firewall rulesConfigure the iptables and ip6tables service settings.Conntrack HelperConverting %sCustom RulesCustom Rules FileCustomizeDNSDefault:DescriptionDesktopDesktop
ServerDestination (at least one needed)Destination UnreachableDisableDisable FirewallDisable Internet Printing Protocol (IPP)Disable Internet Protocol Security (IPsec)Disable Multicast DNS (mDNS)Disable an iptables moduleDisable firewallERROR: FirewallD is active, please use firewall-config.Echo Reply (pong)Echo Request (ping)EditEdit EntryEnableEnable FirewallEnable an iptables moduleEnable firewallEnable firewall (default)Enable this option if you want to allow remote virtual machine management with SASL authentication and encryption (digest-md5 passwords or GSSAPI/Kerberos). The libvirtd service is needed for this option to be useful.Enable this option if you want to allow remote virtual machine management with TLS encryption, x509 certificates and optional SASL authentication. The libvirtd service is needed for this option to be useful.EnabledErrorExpertFTPFTP is a protocol used for remote file transfer. If you plan to make your FTP server publicly available, enable this option. You need the vsftpd package installed for this option to be useful.Failed to remove %s.Failed to start %s.Failed to stop %s.Failed to write %s.Failed to write selinux configuration.FileFile:FilenameFirewallFirewall ConfigurationFirewall Configuration StartupFirewall Configuration WizardFirewall TableFirewall Table:Firewall authorizationFirewall:ForwardForward the port with protocol for the interface to either another local destination port (no destination address given) or to an other destination address with an optional destination port. This is IPv4 only.Forward to another portHTTP is the protocol used to serve Web pages. If you plan to make your Web server publicly available, enable this option. This option is not required for viewing pages locally or developing Web pages.HTTPS is a modified HTTP used to serve Web pages when security is important. Examples are sites that require logins like stores or web mail. This option is not required for viewing pages locally or developing Web pages. You need the httpd package installed for this option to be useful.Here you can define which services are trusted. Trusted services are accessible from all hosts and networks.Hit <i>OK</i> to apply your changes. You do not need to restart the firewall, the changes are effective as soon as they are applied.Hit enter to continue.ICMP FilterICMP TypeIMAP over SSLIP address:IPsecIPv6 has no nat support.If you clear the <i>keep configuration</i> button, the actual firewall configuration will be overwritten.If you enable local forwarding, you have to specify a port. This port has to be different to the source port.If you enable masquerading, IP forwarding will also be enabled for your IPv4 networks.If you need further firewall settings, please modify your configuration by hand, but keep in mind, that this tool is not able to load your custom configuration. If you are using this tool, all your manual changes will be lost. If you do not want to lose your manual configuration changes, leave this program without applying.IgnoreIgnore AllIgnore actual settingsInterfaceInterface '%s' is not valid.Interface:Internet Protocol Security (IPsec) incorporates security for network transmissions directly into the Internet Protocol (IP). IPsec provides methods for both encrypting data and authentication for the host or network it sends to. If you plan to use a vpnc server or FreeS/WAN, do not disable this option.Invalid argument %sKeep ConfigurationKey:List predefined services.List the supported icmp types.LoadLoad _Default ConfigurationLocal forwardingMail (SMTP)Make sure to open the destination port on the remote system.Mark all interfaces as trusted which should have full access to the system.Mark the ICMP types in the list, which should be rejected. All other ICMP types are allowed to pass the firewall. The default is no limitation.Mark the interfaces to be masqueraded.Masquerades traffic from the specified device. This is IPv4 only.MasqueradingMasquerading allows you to set up a host or router that connects your local network to the internet. Your local network will not be visible and the hosts appear as a single address on the internet. Masquerading is IPv4 only.Move Entry DownMove Entry UpMulticast DNS (mDNS)NFS4Network Printing Client (IPP)Network Printing Server (IPP)NoNo configurationNot configuredNumeric status outputOKOld firewall configuration.Only mark interfaces if you can trust all participants on that network interface.Open specific ports in the firewall (e.g, ssh:tcp)Open the firewall for a service (e.g, ssh)OpenVPNOpenVPN is a virtual private network (VPN) solution. It is used to create encrypted point-to-point tunnels between computers. If you plan to provide a VPN service, enable this option.Other PortsPOP-3 over SSLParameter ProblemParse error in config filePlease answer the questions in the following configuration steps. The wizard leads you back to the main application and hides all unnecessary configuration options.Please check your firewall settings after applying custom rules.Please enter a port or port range and protocol.Please enter a valid port number, service name or range.Please load a default configuration from the <i>Options</i> menu or use the wizard.Please remember to check if the services iptables and ip6tables are enabled.Please remember to check your firewall configuration before using it.Please select an entry from the list or enter a interface further down.Please select an entry from the list or enter a port and protocol further down.Please select keep configuration or choose to load a default configuration.Please select the protocol type, the firewall table and the file containing the rules.Please select the source and destination options according to your needs.Please specify your firewall skills.PortPort / Port Range:Port ForwardingPort and ProtocolPort or port range '%s' is not valid.Port/ProtocolPort:Predefined Services with Default Environment:Print a counter/number for every rule in the status output.Print addresses and ports in numeric format for the status output.Print information about the number of packets and bytes plus the <i>input-</i> and <i>outputdevice</i> in the status output.ProtocolProtocol '%s' is not valid.Protocol TypeProtocol Type:Protocol:QuitRADIUSRed Hat Cluster SuiteRedirectReloadReload current configurationRemoveRemove EntryRouter AdvertisementRouter SolicitationRun noninteractively; process only command-line argumentsSELinux Options (deprecated)SSHSambaSamba ClientSave and restore counterSave on restartSave on stopSave the active firewall configuration with all changes since the last start before restarting the firewall. Only do this if you need to preserve the active state for the next start.Save the active firewall configuration with all changes since the last start before stopping the firewall. Only do this if you need to preserve the active state for the next start.Secure Shell (SSH) is a protocol for logging into and executing commands on remote machines. It provides secure encrypted communications. If you plan on accessing your machine remotely via SSH over a firewalled interface, enable this option. You need the openssh-server package installed for this option to be useful.Secure WWW (HTTPS)SelectSelect <i>"Expert"</i> if you are familiar with firewall configurations or if you need to add user customized rules. Otherwise, choose <i>"Beginner"</i>.Select a FileServerServiceService SettingsSet firewall default type: %s. This overwrites any existing configuration.Show this help messageShow versionSource (all needed)Source QuenchSpecify a custom rules file for inclusion in the firewall, after the default rules. Default protocol type: ipv4, default table: filter. (Example: ipv4:filter:/etc/sysconfig/ipv4_filter_addon)Start WizardStart configuration wizardStatus line numbersSupported icmp types:System without network access
System with network accessTFTPTFTP ClientTODOTableThe Amanda backup client option allows you to connect to a Amanda backup and archiving server. You need the amanda-client package installed for this option to be useful.The Domain Name System (DNS) is used to provide and request host and domain names. Enable this option, if you plan to provide a domain name service (e.g. with bind).The Internet Message Access Protocol over SSL (IMAPs) allows a local client to access email on a remote server in a secure way. If you plan to provide a IMAP over SSL service (e.g. with dovecot), enable this option.The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over tcp) provides the ability to share printers over the network. Enable this option if you plan to share printers via cups over the network.The Internet Printing Protocol (IPP) is used for distributed printing. IPP (over udp) provides the ability to get information about a printer (e.g. capability and status) and to control printer jobs. If you plan to use a remote network printer via cups, do not disable this option.The NFS4 protocol is used to share files via TCP networking. You will need to have the NFS tools installed and properly configure your NFS server for this option to be useful.The Post Office Protocol version 3 (POP3) is a protocol to retrieve email from a remote server over a TCP/IP connection. Enable this option, if you plan to provide a POP3 service (e.g. with dovecot).The Remote Authentication Dial In User Service (RADIUS) is a protocol for user authentication over networks. It is mostly used for modem, DSL or wireless user authentication. If you plan to provide a RADIUS service (e.g. with freeradius), enable this option.The Trivial File Transfer Protocol (TFTP) is a protocol used to transfer files to and from a remote machine in s simple way. It is normally used only for booting diskless workstations and also to transfer data in the Preboot eXecution Environment (PXE).The file '%s' does not exist.The firewall configuration is not consistent.The firewall is disabled.The firewall is enabled.The firewall table '%s' is not valid.The following files are missing or unusable:
	%s

Apply your firewall configuration now to correct this problem.The protocol type '%s' is not valid.There are unapplied changes, do you really want to quit?This error message informs a host to send packets on another route.This error message is generated by a host or gateway if the destination is not reachable.This error message is generated if the IP header is bad, either by a missing option or bad length.This error message is generated if the time-to-live was exceeded either of a packet or of the reassembling of a fragmented packet.This error message is generated to tell a host to reduce the pace at which it is sending packets.This message is the answer to an <i>Echo Request</i>.This message is used by a host attached to a multicast link to request a <i>Router Advertisement</i>This message is used by routers to periodically announce the IP address of a multicast interface.This message is used to test if a host is reachable mostly with the <i>ping</i> utility.This option allows a Bacula server to connect to the local machine to schedule backups. You need the bacula-client package installed for this option to be useful.This option allows incoming SMTP mail delivery. If you need to allow remote hosts to connect directly to your machine to deliver mail, enable this option. You do not need to enable this if you collect your mail from your ISP's server by POP3 or IMAP, or if you use a tool such as fetchmail. Note that an improperly configured SMTP server can allow remote machines to use your server to send spam.This option allows you to access Trivial File Transfer Protocol (TFTP) servers. You need the tftp package installed for this option to be useful.This option allows you to access Windows file and printer sharing networks. You need the samba-client package installed for this option to be useful.This option allows you to access and participate in Windows file and printer sharing networks. You need the samba package installed for this option to be useful.This option allows you to use the Red Hat Cluster Suite. Ports are opened for openais, ricci and dlm. You need the Red Hat Cluster Suite installed for this option to be useful.This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program.  If not, see <http://www.gnu.org/licenses/>.This program will help you to set up a basic firewall for your system.This wizard helps you to set up a clean firewall configuration for your system.Time ExceededTo AddressTo PortTo ensure a sane state, the kernel firewall modules must be unloaded when the firewall is restarted or stopped.Trusted InterfacesTrusted ServicesTypeUnload modules on restart and stopUpdate firewall non-interactively if the firewall is enabled. This will also restart the firewall. The -n and -f options will be ignored.Use custom rules files to add additional rules to the firewall. The custom rules are added after the default rules. The files must have the iptables-save format.User DefinedUser Skill LevelUsing these options with no additional firewall options will not create or alter firewall configuration, only SELinux will be configured.Valid values: %sValid values: <port>[-<port>], where port is either a number [0..65535] or a service name.Valid values: tcp, udpVerbose statusVirtual Machine ManagementVirtual Machine Management (TLS)WWW (HTTP)WarningWhat kind of system do you have?WizardYesYou can change the settings in the <i>Options</i> menu afterwards.Your firewall configuration was converted from an old version. Please verify the configuration and apply.[<type>:][<table>:]<filename>_About_File_Help_Options_Quit_Start Configuration Wizardconfigurationif=<interface>:port=<port>:proto=<protocol>[:toport=<destination port>][:toaddr=<destination address>]invalid interface '%s'.invalid port definition %s.invalid service '%s'.ipv6 has no nat support.localmDNS provides the ability to use DNS programming interfaces, packet formats and operating semantics in a small network without a conventional DNS server. If you plan to use Avahi, do not disable this option.modified labelno such option: %soption %(option)s: invalid forward_port '%(value)s'.option %(option)s: invalid forward_port '%(value)s': %(error)s.option %(option)s: invalid icmp type '%(value)s'.port range %s is not unique.system-config-firewalltranslator-creditsyesFirewall ConfigurationyesMark the ICMP types in the list, which should be rejected. All other ICMP types are allowed to pass the firewall. The default is no limitation.yesThe Internet Control Message Protocol (ICMP) is mainly used to send error messages between networked computers, but additionally for informational messages like ping requests and replies.yesUse custom rules files to add additional rules to the firewall. The custom rules are added after the default rules. The files must have the iptables-save format.Project-Id-Version: system-config-firewall
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2011-02-16 16:32+0200
PO-Revision-Date: 2013-11-20 09:28+0000
Last-Translator: bardisch <kwb0128@gmail.com>
Language-Team: Korean (http://www.transifex.com/projects/p/system-config-firewall/language/ko/)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Language: ko
Plural-Forms: nplurals=1; plural=0;

오류 - root로 %sì„(를) 실행하셔야 합니다.%(option)s 옵션ì—는 %(count)s ì¸ìˆ˜ê°€ 필요함%sì€(는) ìž˜ëª»ëœ í”„ë¡œí† ì½œìž…ë‹ˆë‹¤. %s ì€(는) 올바른 범위 (시작 í¬íЏ >= 마지막 í¬íЏ)ê°€ 아닙니다.%s 옵션 ê°’ì„ ê°–ì§€ 않습니다 %s 옵션ì—는 ì¸ìˆ˜ê°€ 필요함 (수정ë¨)<b>기본ì ì¸ 방화벽 설정</b><b>설정</b><b>수신지</b> <b>ì •ë³´</b> <b>소스</b> <b>사용ìžì˜ 사용 수준</b><b>현재 설정 사항 없습니다, 모든 íŠ¸ëž˜í”½ì´ ì°¨ë‹¨ë©ë‹ˆë‹¤.</b> <big><b>방화벽 설정 마법사</b></big> <i>ì •ì§€ 시 저장</i> ë° <i>재시작 시 저장</i>ì€ ì¶”ê°€ì ìœ¼ë¡œ 규칙 ë° ì²´ì¸ì— 있는 카운터를 저장합니다. <icmp type><interface><mode><module><port>[-<port>]:<protocol><service><type><i>"ë„¤íŠ¸ì›Œí¬ ì•¡ì„¸ìŠ¤ê°€ 없는 시스템"</i>ì—서는 ë°©í™”ë²½ì´ í•„ìš”í•˜ì§€ 않습니다. ì´ë¥¼ ì„ íƒí•˜ë©´ ë°©í™”ë²½ì„ ì‚¬ìš©í•˜ì§€ 않게 ë©ë‹ˆë‹¤. ë˜ëŠ” <i>"ë„¤íŠ¸ì›Œí¬ ì•¡ì„¸ìŠ¤ê°€ 있는 시스템"</i>ì„ ì„ íƒí•©ë‹ˆë‹¤.ë°©í™”ë²½ì„ ì´ìš©í•˜ë©´ 외부ì—서 ì—¬ëŸ¬ë¶„ì˜ ì»´í“¨í„°ì— ì„ íƒëœ 서비스ì—ë§Œ ì ‘ì†ì´ 가능하ë„ë¡ í•˜ë©°, ì„ íƒëœ ê²ƒì„ ë„˜ì–´ì„œëŠ” ì ‘ì†ì„ 방지할 수 있습니다. ë°©í™”ë²½ì´ ì ‘ì†ì„ 허용할 서비스를 ì„ íƒí•˜ì‹­ì‹œì˜¤.ë°©í™”ë²½ì€ í—ˆê°€ê°€ 없는 사용ìžê°€ 네트워í¬ë¥¼ 통하여 침입하는 ê²ƒì„ ë°©ì§€í•©ë‹ˆë‹¤. ë°©í™”ë²½ì„ ì‚¬ìš©í•˜ì‹œë©´ 들어오는 모든 ì ‘ì†ì„ 막습니다. ë°©í™”ë²½ì„ ì‚¬ìš©í•˜ì§€ 않으면 모든 ì ‘ì†ì„ 허용하므로 권장ë˜ì§€ 않습니다.추가 항목 추가  ì¸í„°íŽ˜ì´ìФ 추가  모든 호스트 ë˜ëŠ” 네트워í¬ì— 액세스 가능한 í¬íЏ ë° í¬íЏ 범위를 추가합니다.로컬 시스템 ìƒì—서 í•˜ë‚˜ì˜ í¬íЏì—서 다른 í¬íŠ¸ë¡œ ë˜ëŠ” 로컬 시스템ì—서 다른 시스템으로 í¬íŠ¸ë¥¼ í¬ì›Œë”©í•˜ê¸° 위해 í•­ëª©ì„ ì¶”ê°€í•©ë‹ˆë‹¤. 다른 시스템으로 í¬ì›Œë”©í•˜ëŠ” ê²ƒì€ ì¸í„°íŽ˜ì´ìŠ¤ê°€ 마스커레ì´ë”©ë˜ì—ˆì„ 경우ì—ë§Œ 유용합니다. í¬íЏ í¬ì›Œë”©ì€ IPv4ì—서만 해당ë©ë‹ˆë‹¤.   주소 '%s' ì´(ê°€) 잘못ë¨.   모든 %s 장치필요한 í¬íЏ ë˜ëŠ í¬íЏ 범위로만 액세스를 허용합니다. 필요한 서비스로만 액세스를 허용합니다. 특정 장치ì—서 들어오는 모든 íŠ¸ëž˜í”½ì„ í—ˆìš©Amanda 백업 í´ë¼ì´ì–¸íЏì ìš©ë³€ê²½ 사항 ì ìš© 방화벽 ì„¤ì •ì„ ì½ê³  수정하려면 ì¸ì¦ì´ 필요합니다  ì´ì „ ì´ì „ 버전 호환성, --enabled로 별칭 지정BaculaBacula í´ë¼ì´ì–¸íЏ       Bacula는 ë„¤íŠ¸ì›Œí¬ ë°±ì—… 솔류션입니다. Bacula 백업, 파ì¼, 저장소 서비스를 사용할 계íšì´ë¼ë©´ ì´ ì˜µì…˜ì„ í™œì„±í™”ì‹œí‚¤ì‹­ì‹œì˜¤.보다 ë§Žì€ ì •ë³´ë¥¼ ì¶œë ¥ì´ˆë³´ìž ìˆ˜ì¤€ ì´ˆë³´ìž ìˆ˜ì¤€
전문가 수준ICMP ìœ í˜•ì´ ì°¨ë‹¨ë˜ì—ˆìŠµë‹ˆë‹¤. 기본값으로 모든 ICMP ìœ í˜•ì„ í—ˆìš©í•©ë‹ˆë‹¤. 취소'예' ë²„íŠ¼ì„ í´ë¦­í•˜ì‹œë©´ 기존 방화벽 ì„¤ì •ì„ ë®ì–´ì“°ê²Œ ë©ë‹ˆë‹¤. ê³„ì† ì§„í–‰í•˜ì‹œê² ìŠµë‹ˆê¹Œ?종료 설정 실패SELinux 모드 설정: %sSELinux 유형 설정: 'targeted' ë˜ëŠ” 'strict' 정책서비스 설정 지정 ë°©í™”ë²½ì„ ì„¤ì •í•˜ì§€ë§Œ 새로운 ì„¤ì •ì„ í™œì„±í™”í•˜ì§€ëŠ” 않ìŒì—°ê²° ì¶”ì ì„ 위해 방화벽 ë„ì›€ë§ ëª¨ë“ˆì„ ì„¤ì •í•©ë‹ˆë‹¤.  방화벽 규칙 설정iptables ë° ip6tables 서비스 ì„¤ì •ì„ ì§€ì •í•©ë‹ˆë‹¤. Conntrack ë„우미%s 변환 중 ì‚¬ìš©ìž ê·œì¹™ì‚¬ìš©ìž ê·œì¹™ íŒŒì¼ ì‚¬ìš©ìž ì„¤ì •DNS기본값: 설명ë°ìФí¬í†± ë°ìФí¬í†±
 서버 수신지 (최소 í•˜ë‚˜ì˜ ìˆ˜ì‹ ì§€ í•„ìš”)   ìˆ˜ì‹ ì§€ì— ë„달할 수 ì—†ìŒ ë¹„í™œì„±í™”ë°©í™”ë²½ì„ ì‚¬ìš©í•˜ì§€ 않ìŒIPP (Internet Printing Protocol) 비활성화IPsec (Internet Protocol Security) 비활성화mDNS (Multicast DNS) 비활성화iptables 모듈 ë¹„í™œì„±í™”ë°©í™”ë²½ì„ ì‚¬ìš©í•˜ì§€ 않ìŒì—러: FirewallDê°€ 활성화 ë¼ìžˆìŠµë‹ˆë‹¤, firewall-config를 .ì—ì½” ì‘답 (í) ì—ì½” 요청 (í•‘)편집 항목 편집  활성화방화벽 사용  iptables 모듈 활성화방화벽 사용 방화벽 사용 (기본)SASL ì¸ì¦ê³¼ 암호화(digest-md5 암호 ë˜ëŠ” GSSAPI/Kerberos)를 사용해 ì›ê²© ê°€ìƒ ë¨¸ì‹  관리를 사용하기를 ì›í•œë‹¤ë©´ ì´ ì˜µì…˜ì„ í™œì„±í™”í•˜ì‹­ì‹œì˜¤. libvirtd 서비스가 ì´ ì˜µì…˜ì„ í™œìš©í•˜ê¸° 위해서는 필요합니다.TLS 암호화, x509 ì¸ì¦ê³¼ ì„ íƒì ì¸ SASL 사용ìží™•ì¸ì„ 사용해 ì›ê²© ê°€ìƒ ë¨¸ì‹  관리를 ì‚¬ìš©í•˜ê³ ìž í•œë‹¤ë©´ ì´ ì˜µì…˜ì„ í™œì„±í™”í•˜ì‹­ì‹œì˜¤. libvirtd 서비스가 ì´ ì˜µì…˜ì„ í™œìš©í•˜ê¸° 위해서는 필요합니다.활성화오류 전문가 수준 FTPFTP는 ì›ê²© 파ì¼ì„ ì „ì†¡í•˜ëŠ”ë° ì‚¬ìš©ë˜ëŠ” 프로토콜입니다. 대중ì—게 열려있는 FTP서버를 ìš´ì˜í•˜ë ¤ë©´, ì´ ì˜µì…˜ì„ ì„ íƒí•´ì•¼ 합니다. vsftpd 패키지를 설치하면 ì´ ì˜µì…˜ì„ ë” ìœ ìš©í•˜ê²Œ 사용할 수 있습니다.%s ì‚­ì œì— ì‹¤íŒ¨í–ˆìŠµë‹ˆë‹¤.%s ì‹œìž‘ì— ì‹¤íŒ¨í–ˆìŠµë‹ˆë‹¤.%s ì •ì§€ì— ì‹¤íŒ¨í–ˆìŠµë‹ˆë‹¤.%s 쓰기 실패selinux 설정 ì“°ê¸°ì— ì‹¤íŒ¨í–ˆìŠµë‹ˆë‹¤.íŒŒì¼ íŒŒì¼:파ì¼ëª…방화벽방화벽 설정방화벽 설정 시작방화벽 설정 마법사방화벽 í…Œì´ë¸”  방화벽 í…Œì´ë¸”:방화벽 ì¸ì¦  방화벽:ë‹¤ìŒ ë‹¤ë¥¸ 로컬 수신지 í¬íЏ (수신지 주소가 ì—†ì„ ê²½ìš°) ë˜ëŠ” 다른 수신지 주소로(수신지 í¬íЏ ì„ íƒ ì§€ì • 가능) 프로토콜과 함께 í¬íŠ¸ë¥¼ í¬ì›Œë”©í•©ë‹ˆë‹¤. IPv4ì—서만 해당ë©ë‹ˆë‹¤.다른 í¬íŠ¸ë¡œ í¬ì›Œë“œ HTTP는 웹 페ì´ì§€ë¥¼ ì„œë¹„ìŠ¤í•˜ëŠ”ë° ì‚¬ìš©ë˜ëŠ” 프로토콜입니다. 웹 서버를 ìš´ì˜í•˜ë ¤ë©´ ì´ ì˜µì…˜ì„ ì„ íƒí•˜ì‹­ì‹œì˜¤. 웹 페ì´ì§€ë¥¼ 보시거나 개발하기 위해서ë¼ë©´, ì´ ì˜µì…˜ì„ ì„ íƒí•  필요가 없습니다.HTTPS는 ìˆ˜ì •ëœ HTTP로서 ë³´ì•ˆì´ ì¤‘ìš”ì‹œë˜ëŠ” 웹 페ì´ì§€ë¥¼ 서비스 í•  수 있ë„ë¡ í•©ë‹ˆë‹¤. 예를 들면, ìƒì—… 웹사ì´íŠ¸ë‚˜ 웹 ë©”ì¼ê³¼ ê°™ì€ ë¡œê·¸ì¸ì„ 필요로하는 사ì´íŠ¸ë¥¼ 들 수 있습니다. 웹 페ì´ì§€ë¥¼ 보시거나 개발하기 위해서ë¼ë©´, ì´ ì˜µì…˜ì„ ì„ íƒí•  필요가 없습니다. ì´ ì˜µì…˜ì„ í™œìš©í•˜ë ¤ë©´, httpd 패키지를 설치할 필오가 ìžˆì„ ê²ƒìž…ë‹ˆë‹¤.여기서 신뢰하는 서비스를 지정할 수 있습니다. 지정하신 서비스는 모든 호스트 ë˜ëŠ” 네트워í¬ì—서 액세스 가능하게 ë©ë‹ˆë‹¤.변경 ì‚¬í•­ì„ ì ìš©í•˜ì‹œë ¤ë©´ <i>OK</i>를 누릅니다. 변경 ì‚¬í•­ì€ ì ìš©ëœ 즉시 유효하게 ë˜ë¯€ë¡œ ë°©í™”ë²½ì„ ìž¬ì‹œìž‘í•˜ì‹¤ 필요가 없습니다.  Enter 키를 눌러 ê³„ì† ì§„í–‰í•©ë‹ˆë‹¤.    ICMP í•„í„° ICMP 유형 SSL 통한 IMAPIP 주소: IPsecIPv6는 nat ì§€ì›ì„ 하지 않습니다.    <i>설정 유지</i> ë²„íŠ¼ì„ ì‚­ì œí•  경우, 실제 방화벽 설정 ì‚¬í•­ì„ ë®ì–´ì“°ê²Œ ë©ë‹ˆë‹¤. 로컬 í¬ì›Œë”©ì„ 사용하실 경우, í¬íŠ¸ë¥¼ 지정하셔야 합니다. ì´ëŸ¬í•œ í¬íŠ¸ëŠ” 소스 í¬íŠ¸ì™€ 달ë¼ì•¼ 합니다. 마스커레ì´ë”© (Masquerading) ê¸°ëŠ¥ì„ í™œì„±í™”í•˜ì‹¤ 경우, IP í¬ì›Œë”©ì€ IPv4 네트워í¬ì— 대해 활성화ë©ë‹ˆë‹¤. ë°©í™”ë²½ì„ ìƒì„¸ 설정하시려면, 수ë™ìœ¼ë¡œ 설정 ì‚¬í•­ì„ ìˆ˜ì •í•˜ì‹œê¸° ë°”ëžë‹ˆë‹¤. 하지만 ì´ ë„구로는 ì‚¬ìš©ìž ì„¤ì • ì‚¬í•­ì„ ì½ì–´ì˜¬ 수 없습니다. ì´ ë„구를 사용하실 경우 수ë™ìœ¼ë¡œ 변경한 모든 ì‚¬í•­ì„ ì†ì‹¤í•˜ê²Œ ë©ë‹ˆë‹¤.수ë™ìœ¼ë¡œ 변경한 설정 ì‚¬í•­ì„ ìœ ì§€í•˜ì‹œë ¤ë©´ ì´ë¥¼ ì ìš©í•˜ì§€ 않고 그대로 내버려 둡니다. 무시 ëª¨ë‘ ë¬´ì‹œ 설정 사항 무시ì¸í„°íŽ˜ì´ìФì¸í„°íŽ˜ì´ìФ '%s' ì´(ê°€) 잘못ë¨.   ì¸í„°íŽ˜ì´ìФ: IPsec (Internet Protocol Security)ì€ IP (Internet Protocol)ìƒì—서 안전하게 ë„¤íŠ¸ì›Œí¬ ì „ì†¡ì„ ìˆ˜í–‰í•˜ê¸° 위해 사용ë©ë‹ˆë‹¤. IPsecì€ ë°ì´í„°ë¥¼ 암호화와 호스트/네트워í¬ì— 대한 ì¸ì¦ì„ 제공합니다. vpnc 서버나 FreeS/WANì„ ì‚¬ìš©í•˜ë ¤ í•  경우 ì´ ì˜µì…˜ì„ í™œì„±í™”í•´ì•¼ 합니다.ìž˜ëª»ëœ ì¸ìˆ˜ %s 설정 유지 키: 사전 ì •ì˜ëœ 서비스 목ë¡ì„ 나열합니다. ì§€ì›ë˜ëŠ” icmp 유형 목ë¡ì„ 나열합니다. ì½ì–´ì˜¤ê¸° 기본 설정 ì½ì–´ì˜¤ê¸°(_D)로컬 í¬íЏ í¬ì›Œë”© ë©”ì¼ (SMTP)ì›ê²© ì‹œìŠ¤í…œì— ìžˆëŠ” 수신지 í¬íŠ¸ê°€ 열려있는 지를 확ì¸í•©ë‹ˆë‹¤. ì‹œìŠ¤í…œì— ëŒ€í•´ 완전한 액세스를 갖는 모든 신뢰하는 ì¸í„°íŽ˜ì´ìŠ¤ë¥¼ 표시합니다.목ë¡ì—서 거부해야 í•  ICMP ìœ í˜•ì„ í‘œì‹œí•©ë‹ˆë‹¤. ê·¸ ì™¸ì˜ ëª¨ë“  ICMP ìœ í˜•ì€ ë°©í™”ë²½ 통과를 허용합니다. ê¸°ë³¸ê°’ì€ ì œí•œ ì—†ìŒìž…니다. 마스커레ì´ë”©(masquerading)í•  ì¸í„°íŽ˜ì´ìŠ¤ë¥¼ 표시합니다.  특정 장치ì—서 들어오는 모든 íŠ¸ëž˜í”½ì„ ë§ˆìŠ¤ì»¤ë ˆì´ë”©í•©ë‹ˆë‹¤. ì´ëŠ” IPv4ì—서만 해당합니다.마스커레ì´ë”© (Masquerading) 마스커레ì´ë”© (Masquerading) ê¸°ëŠ¥ì€ ë¡œì»¬ 네트워í¬ë¥¼ ì¸í„°ë„·ì— 연결하는 호스트나 ë¼ìš°í„°ë¥¼ 설정할 수 있게 합니다. 로컬 네트워í¬ëŠ” ë³¼ 수 없으며 호스트는 ì¸í„°ë„·ì—서 í•˜ë‚˜ì˜ ì£¼ì†Œë¡œ 나타납니다. 마스커레ì´ë”© (Masquerading) ê¸°ëŠ¥ì€ IPv4ì—서만 해당ë©ë‹ˆë‹¤.  í•­ëª©ì„ ì•„ëž˜ë¡œ ì´ë™  í•­ëª©ì„ ìœ„ë¡œ ì´ë™  mDNS (Multicast DNS)NFS4ë„¤íŠ¸ì›Œí¬ ì¸ì‡„ í´ë¼ì´ì–¸íЏ (IPP)  ë„¤íŠ¸ì›Œí¬ ì¸ì‡„ 서버 (IPP) 아니요   설정 사항 ì—†ìŒ ì„¤ì •ë˜ì§€ 않ìŒìˆ«ìžë¡œëœ ìƒíƒœ 출력OKì´ì „ 버전 방화벽 설정 ë„¤íŠ¸ì›Œí¬ ì¸í„°íŽ˜ì´ìŠ¤ì— ìžˆëŠ” 모든 사용ìžë¥¼ 신뢰할 경우ì—ë§Œ ì¸í„°íŽ˜ì´ìŠ¤ë¥¼ 표시합니다. 특정 í¬íŠ¸ì˜ ë°©í™”ë²½ 통과를 허용함 (예, ssh:tcp)ì„œë¹„ìŠ¤ì˜ ë°©í™”ë²½ 통과를 허용함 (예, ssh) OpenVPN OpenVPNì€ VPN (Virtual Private Network) 솔루션입니다. ì´ëŠ” 컴퓨터 사ì´ì—서 ì•”í˜¸í™”ëœ ì ëŒ€ì  í„°ë„ì„ ìƒì„±í•˜ëŠ”ë° ì‚¬ìš©ë©ë‹ˆë‹¤. VPN 서비스를 ì œê³µí•˜ì‹œê³ ìž í•  경우 ì´ ì˜µì…˜ì„ ì„ íƒí•©ë‹ˆë‹¤.  ê·¸ ì™¸ì˜ í¬íЏSSL를 통한 POP-3매개 변수 문제 설정 파ì¼ì—서 구문 ë¶„ì„ ì˜¤ë¥˜ 다ìŒì˜ 설정 단계ì—서 묻는 ì§ˆë¬¸ì— ëŒ€ë‹µí•´ 주시기 ë°”ëžë‹ˆë‹¤. 설정 마법사를 통해 주요 ì‘ìš© 프로그램으로 ì´ë™í•˜ì—¬ 불필요한 모든 설정 ì˜µì…˜ì„ ìˆ¨ê¸°ê¸°í•  수 있습니다. ì‚¬ìš©ìž ê·œì¹™ì„ ì ìš©í•œ í›„ì— ë°©í™”ë²½ ì„¤ì •ì„ í™•ì¸í•˜ì‹œê¸° ë°”ëžë‹ˆë‹¤.í¬íЏ ë˜ëŠ” í¬íЏ 범위와 í”„ë¡œí† ì½œì„ ìž…ë ¥í•´ 주십시오.   올바른 í¬íЏ 번호, 서비스 ì´ë¦„, í¬íЏ 범위를 입력해 주십시오.<i>옵션</i> 메뉴ì—서 기본 설정 ì‚¬í•­ì„ ì½ì–´ì˜¤ì‹œê±°ë‚˜ ë˜ëŠ” 설정 마법사를 사용하시기 ë°”ëžë‹ˆë‹¤. iptables ë° ip6tables 서비스가 활성화ë˜ì–´ 있는 ì§€ 확ì¸í•˜ê¸° ë°”ëžë‹ˆë‹¤. ë°©í™”ë²½ì„ ì‚¬ìš©í•˜ê¸° ì „ì— ì„¤ì • ì‚¬í•­ì„ í™•ì¸í•˜ì‹œê¸° ë°”ëžë‹ˆë‹¤.목ë¡ì—서 í•­ëª©ì„ ì„ íƒí•˜ê±°ë‚˜ ë˜ëŠ” ì¸í„°íŽ˜ì´ìŠ¤ë¥¼ 입력해 주십시오. 목ë¡ì—서 í•­ëª©ì„ ì„ íƒí•˜ê±°ë‚˜ ë˜ëŠ” í¬íЏ ë° í”„ë¡œí† ì½œì„ ìž…ë ¥í•´ 주십시오.설정 유지를 ì„ íƒí•˜ê±°ë‚˜ ë˜ëŠ” 기본값 설정 ì½ì–´ì˜¤ê¸°ë¥¼ ì„ íƒí•©ë‹ˆë‹¤. 프로토콜 유형, 방화벽 í…Œì´ë¸”, ê·œì¹™ì´ ìžˆëŠ” 파ì¼ì„ ì„ íƒí•´ 주십시오.   í•„ìš”ì— ë”°ë¼ ì†ŒìŠ¤ ë° ìˆ˜ì‹ ì§€ ì˜µì…˜ì„ ì„ íƒí•˜ì‹œê¸° ë°”ëžë‹ˆë‹¤. 방화벽 설정 ê²½í—˜ì— ëŒ€í•´ 알려주십시오.í¬íЏí¬íЏ / í¬íЏ 범위:í¬íЏ í¬ì›Œë”©í¬íЏ ë° í”„ë¡œí† ì½œ í¬íЏ ë˜ëŠ” í¬íЏ 범위 '%s' ì´(ê°€) 잘못ë˜ì—ˆìŠµë‹ˆë‹¤.í¬íЏ/프로토콜 í¬íЏ:기본값 환경으로 사전 ì •ì˜ëœ 서비스:  ìƒíƒœ 출력 ê²°ê³¼ì— ìžˆëŠ” 모든 ê·œì¹™ì— ëŒ€í•´ ì¹´ìš´í„°/수를 ì¸ì‡„합니다.ìƒíƒœ ì¶œë ¥ì„ ìœ„í•´ 숫ìžë¡œëœ í¬ë§·ìœ¼ë¡œ 주소 ë° í¬íŠ¸ë¥¼ ì¸ì‡„합니다.ìƒíƒœ 출력 ê²°ê³¼ì— <i>입력장치</i> ë° <i>출력 장치</i>ì— íŒ¨í‚·ê³¼ ë°”ì´íЏ 수를 ë§ë¶™ì—¬ 출력합니다. 프로토콜프로토콜 '%s' ì´(ê°€) 잘못ë¨.   프로토콜 유형   프로토콜 유형:     프로토콜:종료 RADIUSRed Hat Cluster Suite ë°©í–¥ 전환새로 고침현재 설정 다시 ì½ì–´ì˜¤ê¸° ì‚­ì œ  항목 ì‚­ì œ    ë¼ìš°í„° 알림 ë¼ìš°í„° 요청 비대화ì‹ìœ¼ë¡œ 실행; 명령행 ì¸ìžë§Œ 처리SELinux 옵션 (사용금지ë¨)SSH삼바(Samba)Samba í´ë¼ì´ì–¸íЏ       ì¹´ìš´í„° 저장 ë° ë³µêµ¬ìž¬ì‹œìž‘ 시 저장정지 시 ì €ìž¥ë°©í™”ë²½ì„ ìž¬ì‹œìž‘í•˜ê¸° ì „ì— í™œì„±í™”ëœ ëª¨ë“  방화벽 설정 ì‚¬í•­ì„ ì €ìž¥í•©ë‹ˆë‹¤. ë‹¤ìŒ ì‹œìž‘ì—서 활성화 ìƒíƒœë¥¼ 유지해야 í•  경우ì—ë§Œ ì´ë¥¼ 실행합니다.ë°©í™”ë²½ì„ ì •ì§€ì‹œí‚¤ê¸° ì „ì— í™œì„±í™”ëœ ëª¨ë“  방화벽 설정 ì‚¬í•­ì„ ì €ìž¥í•©ë‹ˆë‹¤. ë‹¤ìŒ ì‹œìž‘ì—서 활성화 ìƒíƒœë¥¼ 유지해야 í•  경우ì—ë§Œ ì´ë¥¼ 실행합니다.Secure Sehll (SSH)ì€ ì›ê²© ì»´í“¨í„°ì— ë¡œê·¸ì¸í•˜ì—¬ ëª…ë ¹ì„ ì‹¤í–‰í•  수 있는 프로토콜 입니다. ì´ í”„ë¡œí† ì½œì€ ì•”í˜¸í™”ëœ ë³´ì•ˆ í†µì‹ ì„ ì§€ì›í•©ë‹ˆë‹¤. SSH를 ì´ìš©í•˜ì—¬ 방화벽 ì¸í„°íŽ˜ì´ìŠ¤ë¥¼ 지나 ì›ê²©ìœ¼ë¡œ ì»´í“¨í„°ì— ì ‘ì†í•˜ê¸° 위해서는 ì´ ì˜µì…˜ì„ ì„ íƒí•˜ê³  openssh-server 패키지를 설치해야 합니다.보안 WWW (HTTPS)ì„ íƒ ë°©í™”ë²½ ì„¤ì •ì— ëŒ€í•´ 잘 알고 있으며 ì‚¬ìš©ìž ì •ì˜ ê·œì¹™ì„ ì¶”ê°€í•˜ê³ ìž í•  경우 <i>"전문가 수준"</i>ì„ ì„ íƒí•©ë‹ˆë‹¤. 그렇지 않으면 <i>"ì´ˆë³´ìž ìˆ˜ì¤€"</i>ì„ ì„ íƒí•©ë‹ˆë‹¤. íŒŒì¼ ì„ íƒì„œë²„ 서비스서비스 설정기본 방화벽 ìœ í˜•ì„ ì„¤ì •í•©ë‹ˆë‹¤: %s. 기존 ì„¤ì •ì„ ë®ì–´ì“°ê²Œ ë©ë‹ˆë‹¤. ë„ì›€ë§ ë©”ì„¸ì§€ 보기버전 보기 소스 (ëª¨ë‘ í•„ìš”)   발신지 억제 (Source Quench) 방화벽 ì„¤ì •ì— í¬í•¨í•  ì‚¬ìš©ìž ê·œì¹™ 파ì¼ì„ 지정합니다. ì´ëŠ” 기본값 규칙 다ìŒì— í¬í•¨ë©ë‹ˆë‹¤. 기본값 프로토콜 형ì‹: ipv4, 기본값 í…Œì´ë¸”: filter. (예: ipv4:filter:/etc/sysconfig/ipv4_filter_addon) 마법사 시작 설정 마법사 시작 ìƒíƒœ 표시줄 번호 ì§€ì›ë˜ëŠ” icmp 유형: ë„¤íŠ¸ì›Œí¬ ì•¡ì„¸ìŠ¤ê°€ 없는 시스템
ë„¤íŠ¸ì›Œí¬ ì•¡ì„¸ìŠ¤ê°€ 있는 시스템TFTPTFTP í´ë¼ì´ì–¸íЏ  TODOí…Œì´ë¸”Amanda 백업 í´ë¼ì´ì–¸íŠ¸ëŠ” Amanda 백업 ë° ì•„ì¹´ì´ë¹™ ì„œë²„ì— ì ‘ì†í•  수 있ë„ë¡ í•´ì¤ë‹ˆë‹¤. ì´ ì˜µì…˜ì´ ìœ ìš©í•˜ë ¤ë©´ amanda-client 패키지를 설치하셔아 í•  것입니다.DNS (Domain Name System)는 호스트 ë° ë„ë©”ì¸ ì´ë¦„ì„ ìš”ì²­í•˜ê³  제공하는 ë° ì‚¬ìš©ë©ë‹ˆë‹¤. ë„ë©”ì¸ ì´ë¦„ 서비스를(예: bind) ì œê³µí•˜ê³ ìž í•˜ì‹¤ 경우 ì´ ì˜µì…˜ì„ ì„ íƒí•©ë‹ˆë‹¤.IMAPs (Internet Message Access Protocol over SSL)는 로컬 í´ë¼ì´ì–¸íŠ¸ê°€ 안전하게 ì›ê²© ì„œë²„ì— ìžˆëŠ” ì´ë©”ì¼ì— 액세스하게 합니다. SSLì„ í†µí•œ IMAP 서비스를 (예: dovecot) ì œê³µí•˜ì‹œê³ ìž í•  경우 ì´ ì˜µì…˜ì„ ì„ íƒí•©ë‹ˆë‹¤.IPP (Internet Printing Protocol)는 ë¶„ì‚° ì¸ì‡„ì— ì‚¬ìš©ë©ë‹ˆë‹¤. IPP는 (tcp를 통해) ë„¤íŠ¸ì›Œí¬ í”„ë¦°í„° 공유 ê¸°ëŠ¥ì„ ì œê³µí•©ë‹ˆë‹¤. cups를 통해 ë„¤íŠ¸ì›Œí¬ í”„ë¦°í„°ë¥¼ 공유하려면 ì´ ì˜µì…˜ì„ í™œì„±í™”í•´ì•¼ 합니다.IPP (Internet Printing Protocol)는 ë¶„ì‚° ì¸ì‡„ì— ì‚¬ìš©ë©ë‹ˆë‹¤. IPP는 (udp를 통해) í”„ë¦°í„°ì— ê´€í•œ ì •ë³´ (예, 프린터 기능 ë° ìƒíƒœ)를 제공하고 ì¸ì‡„ ìž‘ì—…ì„ ê´€ë¦¬í•©ë‹ˆë‹¤. cups를 통해 ì›ê²© ë„¤íŠ¸ì›Œí¬ í”„ë¦°í„°ë¥¼ 사용하려 한다면, ì´ ì˜µì…˜ì„ í™œì„±í™”í•´ì•¼ 합니다.NFS4 í”„ë¡œí† ì½œì€ TCP ë„¤íŠ¸ì›Œí‚¹ì„ í†µí•´ 파ì¼ì„ ê³µìœ í•˜ëŠ”ë° ì‚¬ìš©ë©ë‹ˆë‹¤. NFS ë„구를 설치하고 NFS 서버를 올바로 설정해야만 유용하게 사용할 수 있습니다.POP3 (Post Office Protocol version 3)는 TCP/IP ì—°ê²°ì„ í†µí•´ ì›ê²© 서버ì—서 ì´ë©”ì¼ì„ 검색하기 위한 프로토콜입니다. POP3 서비스를 (예: dovecot) ì œê³µí•˜ì‹œê³ ìž í•  경우 ì´ ì˜µì…˜ì„ ì„ íƒí•©ë‹ˆë‹¤.RADIUS (Remote Authentication Dial In User Service)는 네트워í¬ë¥¼ 통한 ì‚¬ìš©ìž ì¸ì¦ 프로토콜입니다. ì´ëŠ” 대부분 모뎀, DSL, 무선 ì‚¬ìš©ìž ì¸ì¦ì— 사용ë©ë‹ˆë‹¤. RADIUS 서비스를 (예: freeradius) ì œê³µí•˜ì‹œê³ ìž í•  경우 ì´ ì˜µì…˜ì„ ì„ íƒí•©ë‹ˆë‹¤.TFTP (Trivial File Transfer Protocol)는 간단한 방법으로 ì›ê²© ì»´í“¨í„°ì— íŒŒì¼ì„ ì „ì†¡í•˜ëŠ”ë° ì‚¬ìš©ë˜ëŠ” 프로토콜입니다. ì¼ë°˜ì ìœ¼ë¡œ 디스í¬ì—†ëŠ” 워í¬ìŠ¤í…Œì´ì…˜ì„ 시작하기 위해 사용ë˜ë©° PXE (Preboot eXecution Environment)ì— ë°ì´í„°ë¥¼ ì „ì†¡í•˜ëŠ”ë° ì‚¬ìš©ë©ë‹ˆë‹¤.  '%s' 파ì¼ì´ 존재하지 않ìŒ.  방화벽 ì„¤ì •ì— ì¼ê´€ì„±ì´ 없습니다. ë°©í™”ë²½ì„ ì‚¬ìš©í•˜ì§€ 않습니다.ë°©í™”ë²½ì„ ì‚¬ìš©í•©ë‹ˆë‹¤.방화벽 í…Œì´ë¸” '%s' ì´(ê°€) 잘못ë¨.  다ìŒì˜ 설정 파ì¼ì€ 존재하지 않거나 사용할 수 없습니다:
	%s

지금 방화벽 ì„¤ì •ì„ ì ìš©í•˜ì—¬ 문제를 해결하시기 ë°”ëžë‹ˆë‹¤. 프로토콜 유형 '%s' ì´(ê°€) 잘못ë¨.   변경 ì‚¬í•­ì´ ì ìš©ë˜ì§€ 않았습니다, ì •ë§ë¡œ 종료하시겠습니까?ì´ ì˜¤ë¥˜ 메세지는 호스트ì—게 다른 ë¼ìš°í„°ë¡œ íŒ¨í‚·ì„ ì „ì†¡í•  ê²ƒì„ ì•Œë¦½ë‹ˆë‹¤.ìˆ˜ì‹ ì§€ì— ë„달할 수 ì—†ì„ ê²½ìš° 호스트 ë˜ëŠ” 게ì´íŠ¸ì›¨ì´ì— ì˜í•´ ì´ ì˜¤ë¥˜ 메세지가 ìƒì„±ë©ë‹ˆë‹¤. ì˜µì…˜ì´ ì¡´ìž¬í•˜ì§€ 않거나 길ì´ê°€ 잘못ë˜ì–´ IP í—¤ë”ê°€ 올바르지 ì•Šì„ ê²½ìš° ì´ ì˜¤ë¥˜ 메세지가 ìƒì„±ë©ë‹ˆë‹¤. 패킷ì´ë‚˜ ë˜ëŠ” ì¡°ê° íŒ¨í‚·ì˜ ìž¬ì¡°í•©ì˜ TTL(time-to-live)ì´ ì´ˆê³¼ëœ ê²½ìš° ì´ ì˜¤ë¥˜ 메세지가 ìƒì„±ë©ë‹ˆë‹¤. ì´ ì˜¤ë¥˜ 메시지는 호스트ì—게 íŒ¨í‚·ì„ ë³´ë‚´ëŠ” ì†ë„를 ê°ì†Œì‹œí‚¬ ê²ƒì„ ìš”ì²­í•  때 사용ë©ë‹ˆë‹¤.ì´ ë©”ì„¸ì§€ëŠ” <i>ì—ì½” 요청</i>ì— ëŒ€í•œ ì‘답입니다.ì´ ë©”ì„¸ì§€ëŠ” 멀티ìºìŠ¤íŠ¸ ë§í¬ì— ì—°ê²°ëœ í˜¸ìŠ¤íŠ¸ê°€ <i>ë¼ìš°í„° 알림</i>ì„ ìš”ì²­í•  때 사용합니다.ì´ ë©”ì„¸ì§€ëŠ” ë¼ìš°í„°ê°€ 멀티 ìºìŠ¤íŠ¸ ì¸í„°íŽ˜ì´ìŠ¤ì˜ IP 주소를 주기ì ìœ¼ë¡œ 알릴 때 사용합니다.  ì´ ë©”ì„¸ì§€ëŠ” <i>í•‘(ping)</i> 유틸리티로 호스트ì—게 ë„달할 수 있는 ì§€ 검사하기 위해 사용ë©ë‹ˆë‹¤. ì´ ì˜µì…˜ì€ Bacula 서버가 로컬 ë¨¸ì‹ ì— ë°±ì—… ìŠ¤ì¼€ì¥´ì„ ìœ„í•´ ì ‘ì†í•˜ë„ë¡ í•´ì¤ë‹ˆë‹¤. ì´ ì˜µì…˜ì„ ì‚¬ìš©í•˜ë ¤ë©´ bacula-client 패키지를 설치하셔야 합니다.ì´ ì˜µì…˜ì€ SMTP ë©”ì¼ ìˆ˜ì‹ ì„ í—ˆìš©í•©ë‹ˆë‹¤. ì›ê²© 호스트ì—서 ì—¬ëŸ¬ë¶„ì˜ ì»´í“¨í„°ë¡œ ì§ì ‘ ë©”ì¼ ì†¡ì‹ ì„ í—ˆìš©í•˜ë ¤ë©´ ì´ ì˜µì…˜ì„ ì„ íƒí•˜ì‹­ì‹œì˜¤. 만약 ISPì—…ì²´ê°€ 제공하는 POP3나 IMAPì„ í†µí•´ ë©”ì¼ì„ 가져오거나 fetchmailê³¼ ê°™ì€ ë„구를 사용하신다면, ì´ ì˜µì…˜ì„ ì„ íƒí•  필요가 없습니다. ì£¼ì˜ - 잘못 ì„¤ì •ëœ SMTP 서버는 ì›ê²© 컴퓨터가 ì—¬ëŸ¬ë¶„ì˜ ì„œë²„ë¥¼ 통해 스팸 ë©”ì¼ì„ 보내게 í•  수 있습니다. ì´ ì˜µì…˜ì€ TFTP (Trivial File Transfer Protocol) ì„œë²„ì— ì•¡ì„¸ìŠ¤ 가능하게 합니다. ì´ ì˜µì…˜ì„ ì‚¬ìš©í•˜ë ¤ë©´ tftp 패키지를 설치하셔야 합니다.              ì´ ì˜µì…˜ì€ Windows íŒŒì¼ ë° í”„ë¦°í„° 공유 네트워í¬ì— 액세스 가능하게 합니다. ì´ ì˜µì…˜ì„ ì‚¬ìš©í•˜ì‹œë ¤ë©´ samba-client 패키지를 설치하셔야 합니다.     ì´ ì˜µì…˜ì€ Windows íŒŒì¼ ë° í”„ë¦°í„° 공유 네트워í¬ì— 액세스 가능하게 합니다. ì´ ì˜µì…˜ì„ ì‚¬ìš©í•˜ì‹œë ¤ë©´ Samba 패키지를 설치하셔야 합니다. ì´ ì˜µì…˜ì€ Red Hat Cluster Suite를 사용 가능하게 합니다. openais, ricci, dlmì— ëŒ€í•œ í¬íŠ¸ê°€ ì—´ë ¤ 있습니다. ì´ ì˜µì…˜ì„ ì‚¬ìš©í•˜ë ¤ë©´ Red Hat Cluster Suiteê°€ 설치ë˜ì–´ 있어야 합니다.   This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more details.

You should have received a copy of the GNU General Public License along with this program.  If not, see <http://www.gnu.org/licenses/>.ì´ í”„ë¡œê·¸ëž¨ì€ ì‹œìŠ¤í…œì˜ ê¸°ë³¸ì ì¸ 방화벽 ì„¤ì •ì— ëŒ€í•´ 안내해 드립니다.다ìŒì˜ 설정 마법사는 ì‹œìŠ¤í…œì˜ ë°©í™”ë²½ ì„¤ì •ì— ëŒ€í•´ 안내해 드립니다.시간 초과 ëª©ì  ì£¼ì†Œ ëª©ì  í¬íЏ ì •ìƒ(sane) ìƒíƒœë¥¼ 보장하기 위해서는, ë°©í™”ë²½ì´ ìž¬ì‹œìž‘ ë° ì •ì§€ 시 ì»¤ë„ ë°©í™”ë²½ ëª¨ë“ˆì´ ì–¸ë¡œë“œ ë˜ì•¼ë§Œ 합니다.신뢰하는 ì¸í„°íŽ˜ì´ìŠ¤ì‹ ë¢°í•˜ëŠ” 서비스유형재시작 ë° ì •ì§€ 시 모듈 ì–¸ë¡œë“œë°©í™”ë²½ì„ ì‚¬ìš©í•  경우 ì´ë¥¼ 비대화ì‹ìœ¼ë¡œ ì—…ë°ì´íŠ¸í•©ë‹ˆë‹¤. ì—…ë°ì´íŠ¸í•˜ë©´ ë°©í™”ë²½ì´ ìž¬ì‹œìž‘ë©ë‹ˆë‹¤. -n ë° -f ì˜µì…˜ì€ ë¬´ì‹œë©ë‹ˆë‹¤.ë°©í™”ë²½ì— ê·œì¹™ì„ ì¶”ê°€í•˜ê¸° 위해 ì‚¬ìš©ìž ê·œì¹™ 파ì¼ì„ 사용합니다. ì‚¬ìš©ìž ê·œì¹™ì€ ê¸°ë³¸ê°’ 규칙 다ìŒì— 추가ë©ë‹ˆë‹¤.파ì¼ì€ iptables-save í¬ë§·ì´ì–´ì•¼ 합니다. ì‚¬ìš©ìž ì •ì˜ì‚¬ìš©ìžì˜ 사용 수준 추가 방화벽 옵션 ì—†ì´ ì˜µì…˜ì„ ì‚¬ìš©í•˜ëŠ” ê²ƒì€ ë°©í™”ë²½ ì˜µì…˜ì„ ë³€ê²½í•˜ê±°ë‚˜ ìƒì„±í•˜ì§€ 못합니다. ì˜¤ì§ SELinux ë§Œ ì„¤ì •ë  ê²ƒìž…ë‹ˆë‹¤.유효한 ê°’: %s    유효한 ê°’: <port>[-<port>], 여기서 í¬íŠ¸ëŠ” [0..65535] 번ì´ë‚˜ ë˜ëŠ” 서비스 ì´ë¦„ì´ ë©ë‹ˆë‹¤.   유효한 ê°’: tcp, udp  ìƒíƒœ ìƒì„¸ í‘œì‹œê°€ìƒ ë¨¸ì‹  ê´€ë¦¬ê°€ìƒ ë¨¸ì‹  관리(TLS)WWW (HTTP)경고 ì–´ë–¤ ì‹œìŠ¤í…œì„ ì‚¬ìš©í•˜ê³  계십니까?마법사예   ê·¸ 후 <i>옵션</i> 메뉴ì—서 설정 ì‚¬í•­ì„ ë³€ê²½í•  수 있습니다.  방화벽 ì„¤ì •ì´ ì´ì „ 버전ì—서 변환ë˜ì—ˆìŠµë‹ˆë‹¤. 설정 ì‚¬í•­ì„ í™•ì¸í•˜ê³  ì ìš©í•˜ì‹œê¸° ë°”ëžë‹ˆë‹¤. [<type>:][<table>:]<filename>ì •ë³´(_A)파ì¼(_F)ë„움ë§(_H)옵션(_O)종료(_Q)설정 마법사 시작(_S) 설정 if=<interface>:port=<port>:proto=<protocol>[:toport=<destination port>][:toaddr=<destination address>]ìž˜ëª»ëœ ì¸í„°íŽ˜ì´ìФ '%s'. ìž˜ëª»ëœ í¬íЏ ì •ì˜ %s.ìž˜ëª»ëœ ì„œë¹„ìŠ¤ '%s'. ipv6는 nat ì§€ì›ì„ 하지 않습니다. 로컬 mDNS로 DNS 서버가 없는 소규모 네트워í¬ì—서 DNS í”„ë¡œê·¸ëž˜ë° ì¸í„°íŽ˜ì´ìФ, 패킷 í¬ë§·, ì˜ë¯¸ì  처리 기능 ë“±ì„ ì‚¬ìš©í•  수 있습니다. Avahi를 ì‚¬ìš©í•˜ê³ ìž í•  경우 ì´ ì˜µì…˜ì„ í™œì„±í™”í•´ì•¼ 합니다.ìˆ˜ì •ëœ ë ˆì´ë¸”해당 ì˜µì…˜ì´ ì—†ìŒ: %s%(option)s 옵션: ìž˜ëª»ëœ forward_port '%(value)s'. %(option)s 옵션: ìž˜ëª»ëœ forward_port '%(value)s': %(error)s. %(option)s 옵션: ìž˜ëª»ëœ icmp 유형 '%(value)s'. í¬íЏ 범위 %s ì´(ê°€) 고유한 범위가 아닙니다.system-config-firewallê¹€ì€ì£¼ <eukim@redhat.com>, 2006, 2007
ì˜¤í˜„ì„ <hoh@redhat.com>, 2010방화벽 설정목ë¡ì—서 차단해야 í•  ICMP íƒ€ìž…ì„ ì„ íƒí•˜ì„¸ìš”. 다른 모든 ICMP íƒ€ìž…ì€ ë°©í™”ë²½ì„ í†µê³¼í•˜ë„ë¡ í—ˆìš©ë©ë‹ˆë‹¤. ê¸°ë³¸ê°’ì€ ì°¨ë‹¨ì´ ì—†ìŠµë‹ˆë‹¤.Internet Control Message Protocol (ICMP)는 주로 ë„¤íŠ¸ì›Œí¬ ìƒì˜ 컴퓨터들 사ì´ì— ì—러 메시지를 전달하는 ë° ì‚¬ìš©ë˜ì§€ë§Œ, í•‘ í…ŒìŠ¤íŠ¸ê°™ì€ ì •ë³´ êµí™˜ì—ë„ ì‚¬ìš©ë©ë‹ˆë‹¤.ë°©í™”ë²½ì— ì¶”ê°€ì ì¸ ê·œì¹™ì„ ì¶”ê°€í•˜ë ¤ë©´ 별ë„ì˜ ê·œì¹™ 파ì¼ì„ 사용하세요. ì´ê²ƒë“¤ì€ 기본 규칙들 ì´í›„ì— ì¶”ê°€ë©ë‹ˆë‹¤. 파ì¼ë“¤ì€ 반드시 iptables-save í¬ë§·ì„ 사용해야합니다.
ß yôÊá½~ŒorÀ5ÖJ™={þÁEÇêe¾uç£Qk®•ᯘG{÷?ù»ã+—]üôçƒÉÍ×ןô?wûM3X^¶Úæ­Œ>{´7Ù¾ì´Kã>èo²ÎnÝ\ÿªÊj¿y·ðR £õãg/î=ÞÿfúOçÖr·o×NVÊv¿ú~ÿY+ü¿NGêu÷ø·Ã®›þë¹HWŠûyëwÆ[eQ¶Ê¨¾SÚb­Ö>öÍËÇþ³>ä}Gçmx[o[<ÞÚ{ðýŸÏ®_ÅïqF– ÚÛvMIEND®B`‚