initial commit of file from CVS for smeserver-manager-locale on Mon 10 Jul 08:39:31 BST 2023
This commit is contained in:
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Промяна на настройките за отдалечен достъп',
|
||||
'rma_DESCRIPTION' => 'За всяка от възможностите по-долу, настройка "частен" позволява всеки от локалната мрежа да достъпи сървъра. Настройката "публичен" позволява достъп от всякъде по интернет. Настройката "без достъп" забранява достъпа. За да разберете отражението върху сигурността при промяната на тези настройки спрямо подразбиращите се стойности ще трябва да се запознаете със секцията за отдалечен достъп на ръководството за потребителя.',
|
||||
'rma_SUCCESS' => 'Новите настройки за отдалечен достъп бяха записани.',
|
||||
'rma_NO_ACCESS' => 'Без достъп',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Приемай пароли само от локалните мрежи',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Приемай пароли от всякъде',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet достъп',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP достъп',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Достъп чрез FTP с парола',
|
||||
'rma_LABEL_PPTP' => 'Брой на PPTP клиентите',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'Броят на pptp клиентите е по-голям от броя на резервираните IP адреси за DHCP. Трябва да посочите по-малко число.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP порт за secure shell достъп',
|
||||
'rma_LABEL_SSH' => 'Достъп чрез secure shell',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Позволи достъп до административния команден редчрез secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Позволи достъп чрез secure shell с използване на стандартни пароли',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Настройки на Secure Shell</h2>Можете да контролирате Secure Shell достъпа до сървъра. Настройката за публичен достъп трябва да се включи само от опитни администратори за отдалечена диагностика и решаване на проблеми. Препоръчваме да оставите тази настройка "Без достъп" освен ако нямате определена причина да я включите. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>Настройки на FTP</h2> Можете също да управлявате достъпа чрез <b>FTP</b> до сървъра. Препоръчваме да оставите тази настройка "Без достъп" освен ако нямате определена причина да я включите. <p> Забележка: тези настройки ограничават достъпа до сървъра и са с предимство пред другите настройки, включително и тези за отделните информационни слотове.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Можете също управлявате достъпа чрез FTP с автентикация до информационните слотове и потребителските акаунти. Препоръчваме да оставите тази настройка на "частен" освен ако нямате определена причина да я променяте. <p> Забележка: Може да се използва и secure shell sftp клиент за да се достъпи сървъра, ако отдалечения достъп чрез secure shell е включен. Този метод на достъп защитава паролите и данните в FTP сесията, докато стандартния FTP не предоставя защита.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>Настройки на PPTP</h2> Можете да включите достъпа до сървъра с PPTP. Трябва да оставите тази настройка изключена като зададете стойност числото , освен ако не Ви е нужен достъпа чрез PPTP. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Стойността трябва да е нула или положително цяло число',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Управление на отдалечения достъп',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Възможно е да разрешите на машини в отдалечени мрежи до достъпват управлението на сървъра като въведете тези мрежи тук. Използвайте мрежова маска 255.255.255.255 за да ограничите достъпа до определена машина. Всяка машина в посочения обхват ще може да достъпи управлението на сървъра като използва HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'За да добавите нова мрежа за отдалечено управление въведете информацията по-долу.',
|
||||
'rma_SUBNET_MASK' => 'Маска на подмрежа',
|
||||
'rma_NUM_OF_HOSTS' => 'брой машини',
|
||||
'rma_NO_ENTRIES_YET' => 'Все още няма елементи',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Некоректна маска на подмрежа',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Или въведете и мрежа и мрежова маска или оставете и двете полета празни.',
|
||||
'rma_ERR_NO_RECORD' => 'Не мога да открия httpd-admin запис в БД с конфигурации',
|
||||
'Remote access' => 'Отдалечен достъп',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Серийна конзола',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Серийна конзола</h2> Можете да позволите достъп до конзолата на сървъра от терминал, свързан към серийния порт.',
|
||||
'rma_PORT1_ENABLED' => 'Разрешен на сериен порт 1',
|
||||
'rma_PORT2_ENABLED' => 'Разрешен на сериен порт 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Потребителски достъп чрез PPTP по подразбиране',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Настройки на Telnet</h2> ВНИМАНИЕ: Telnet в момента е разрешен, но тази възможност вече не се поддържа. Telnet от само себе си е несигурен и трябва ба бъде използван само при обстоятелства, когато няма други алтернативи. Трябва да промените настройката на {$NO_ACCESS} и да използвате secure shell ако е нужен отдалечен достъп. След като го забраните, telnet вече няма да се показва на този екран. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>Настройки на IPSEC клиент (Roadwarrior)</h2> Можете да разрешите IPSEC клиентски достъп до сървъра, като автентикацията става с цифрови сертификати. Трябва да оставите тази настройка изключена като зададете стойност числото 0, освен ако не искате IPSEC клиентски достъп. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Брой на IPSEC клиентите',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Ако желаете да инициализирате всички цифрови сертификати, можете да направите това тук.<br>Всички стари сертификати вече няма да могат да служат за автентикация пред сървъра, така че <b><i>всички IPSEC клиенти ще трябва да заредят новия сертификат!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Инициализация на цифровите сертификати',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Fjernadgang',
|
||||
'rma_DESCRIPTION' => 'For hver af mulighederne nedenfor, giver indstillingen Privat, at enhver fra lokalnettet har adgang. Indstilligen Offentlig tillader adgang fra hele Internet. Ingen adgang lukker for adgang. Før du ændre disse indstillinger bør du af sikkerhedsmæssige grunde læse brugermanualens afsnit om fjernadgang.',
|
||||
'rma_SUCCESS' => 'De nye fjernadgangsindstillinger er gemt.',
|
||||
'rma_NO_ACCESS' => 'Ingen adgang',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Accepter kun adgangskoder fra lokalnet',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Accepter adgangskoder både fra lokalnet og Internet',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet adgang',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP adgang',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP adgang med adgangskode',
|
||||
'rma_LABEL_PPTP' => 'Antal VPNklienter',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'Antallet af pptp klienter er større end antallet af reserverede ip numre for DHCP. Du skal vælge et mindre antal.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP-port for secure shell adgang',
|
||||
'rma_LABEL_SSH' => 'Secure shell adgang',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Tillad administrativ komandolinie-adgang over secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Tillad secure shell adgang med standard adgangskoder',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>\'Secure Shell\' indstillinger</h2>Du kan styre Secure Shell adgang til serveren. Offentlig adgang bør kun gives af erfarne administratorer til fjern fejlsøgning og fejlretning. Vi anbefaler indstillingen "Ingen adgang" medmindre du har specielle grunde til andet. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP-indstillinger</h2> Du kan styre <b>FTP</b> adgang til serveren. Vi anbefaler indstillingen Ingen adgang medmindre du har specielle grunde til at gøre andet. <p> Bemærk: Disse indstillinger begænser adgangen til serveren og overskiver andre indstillinger, også de individuelle indstillinger for i-bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Du kan også styre brugergodkendt FTP-adgang til i-bays og brugerkonti. Vi vil på det bestemteste anbefale et efterlade denne indstilling på privat, medmindre du har specifikke grunde til at gøre andet. <p> Bemærk: secure shell sftp klienten kan også bruges til at få adgang til serveren, når fjernadgang via secure shell er slået til. Denne form for adgang beskytter adgangskoder og data for FTP-sessionen, mens standard FTP ikke yder nogen beskyttelse.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar"/><h2>VPNadgang</h2> Du kan tillade VPNadgang til din server. Du bør efterlade denne funktion deaktiveret ved at sætte værdien til tallet 0, medmindre du har behov for VPNadgang. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Værdien skal være et helt positivt tal eller 0',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Fjernadministration',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Det er muligt, at tillade værter på fjerne netværker adgang til Serverstyringen, ved at tilføje disse netværker her. Enhver vært indenfor det angivne område vil være i stand til at få adgang til Serverstyringen ved at bruge HTTPS. Brug subnetmaske 255.255.255.255 for at begrænse adgangen til en bestemt vært.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'For at tilføje et nyt netværk til fjernadministration, angiv detaljer nedenfor.',
|
||||
'rma_SUBNET_MASK' => 'Subnetmaske',
|
||||
'rma_NUM_OF_HOSTS' => 'Antal værter',
|
||||
'rma_NO_ENTRIES_YET' => 'Der er ingen noter endnu',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Ugyldig subnetmaske',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Angiv både en netværksadresse og en subnetmaske, eller efterlad begge felter tomme.',
|
||||
'rma_ERR_NO_RECORD' => 'Er ikke i stand til at lokalisere en http-admin optegnelse i konfigurationsdatabasen',
|
||||
'Remote access' => 'Fjernadgang',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Seriel konsol',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Seriel konsol</h2> Du kan tillade adgang til serverkonsollen fra en terminal tilsluttet serverens serielle port.',
|
||||
'rma_PORT1_ENABLED' => 'Tilladt på seriel port 1',
|
||||
'rma_PORT2_ENABLED' => 'Tilladt på seriel port 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Grundlæggende VPNbrugeradgang',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet indstillinger</h2> ADVARSEL: Telnet er pt. tændt, men denne funktion er ikke længere understøttet. Telnet er grundlæggende usikker og bør kun anvendes når der ikke er andre alternativer. Du bør ændre indstillingen til {$NO_ACCESS} og bruge secure shell når fjernadgang er påkrævet. Slås funktionen fra, vil telnet ikke længere dukke op på dette skærmbillede. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC klient (Roadwarrior) indstillinger</h2> Du kan tillade IPSEC klientadgang til din server, brugergodkendt med digitale certifikater. Du bør efterlade denne indstilling slukket, ved at sætte værdien til tallet 0, medmindre du har behov for IPSEC klientadgang. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Antal IPSEC-klienter',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Ønsker du at nulstille alle digitale certifikater, kan du gøre det her.<br>Samtlige gamle certifikater vil ikke kunne brugergodkende på denne server, så <b><i>alle IPSEC klienter må importere et nyt certifikat!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Nulstil digitale certifikater',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Fernzugriffseinstellungen ändern',
|
||||
'rma_DESCRIPTION' => 'Für jede der unteren Optionen erlaubt die Einstellung Privar jedem Ihres lokalen Netzwerks den Zugang zu Ihrem Server. Die Einstellung Öffentlich erlaubt den Zugriff von überall aus dem Internet. Die Einstellung Kein Zugriff deaktiviert den Zugriff. Bevor Sie die Standardwerte dieser Optionen verändern, sollten Sie die mit einer Veränderung verbundenen Sicherheitsrisiken verstehen, lesen Sie hierzu die Kapitel zum Fernzugriff in der Benutzeranleitung.',
|
||||
'rma_SUCCESS' => 'Die neuen Fernzugriffseinstellungen wurden gespeichert.',
|
||||
'rma_NO_ACCESS' => 'Kein Zugang',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Kennwörter nur aus den lokalen Netzwerken akzeptieren',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Kennwörter von überall akzeptieren',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet Zugriff',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP Zugriff',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP Zugriff mit Kennwort',
|
||||
'rma_LABEL_PPTP' => 'Anzahl der PPTP Clients',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'Die Anzahl der PPTP Clients ist größer als die Anzahl der für DHCP reservierten IP-Adressen. Sie sollten eine kleinere Anzahl einstellen.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP-Port für den SSH-Zugriff',
|
||||
'rma_LABEL_SSH' => 'Sicherer Zugriff über SSH',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Administrativen Konsolenzugriff über einen sicheren SSH-Zugang erlauben',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Den sicheren SSH-Zugriff mit Standard-Kennwörtern erlauben',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/><h2>Einstellung für sicheren SSH-Zugriff</h2> Sie können den Zugriff zu Ihrem Server per sicherem SSH gestatten. Der Öffentliche Zugang sollte nur von erfahrenen Administratoren zur Diagnose und Fehlerbehebung aktiviert werden. Wir empfehlen den Parameter auf "Kein Zugang" eingestellt zu lassen, außer Sie haben besondere Gründe, dies zu ändern. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar"/><h2>FTP Einstellungen</h2> Sie können auch den <b>FTP Zugriff</b> zu Ihrem Server gestatten. Wir empfehlen jedoch diesen Parameter auf \'Kein Zugang\' zu belassen, außer Sie haben besondere Gründe dies zu ändern. <p> Anmerkung: Diese Einstellungen begrenzen den Zugriff zu Ihrem Server und überschreiben andere Einstellungen, auch die für einzelne i-bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Sie können auch den authentifizierten FTP Zugriff zu Ihren i-bays und Benutzerkonten kontrollieren. Wir empfehlen Ihnen dringend die Einstellung auf Privat zu belassen, außer Sie haben besondere Gründe, dies zu ändern. <p> Anmerkung: Eine sichere sftp Client Datenübertragung kann auch für den Zugang zu Ihrem Server gewählt werden, wenn der Fernzugriff über eine sichere SSH Datenübertregung aktiviert wurde. Diese Zugriffsmethode schützt Ihr Passwort sowie Ihre Daten einer FTP Sitzung, wohingegen Standard FTP keinen Schutz bietet.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar"/><h2>PPTP Einstellungen</h2> Sie können den PPTP Zugang zu Ihrem Server erlauben. Sie sollten diese Funktion durch Eingabe einer 0 deaktivieren, außer Sie benötigen den PPTP Zugang. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Dieser Wert muß 0 oder ganzzahlig positiv sein',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Fernzugriffs-Management',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p> Es ist möglich, Hosts aus entfernten Netzwerken den Zugriff auf den Server Manager zu erlauben, hierzu hinterlegen Sie diese Netzwerke hier. Verwenden Sie die Subnetz-Maske 255.255.255.255, um den Zugang auf einen bestimmten Host zu beschränken. Jeder Host im spezifizierten Bereich kann den Server Manager über HTTPS erreichen.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Um den Fernzugriff für ein neues entferntes Netzwerk zu erlauben, geben Sie unten die Daten für das Netzwerk ein.',
|
||||
'rma_SUBNET_MASK' => 'Subnetz-Maske',
|
||||
'rma_NUM_OF_HOSTS' => 'Anzahl von Hosts',
|
||||
'rma_NO_ENTRIES_YET' => 'Es sind noch keine Eingaben vorhanden',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Ungültige Subnetz-Maske',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Geben Sie entweder sowohl Netzwerk als auch Subnetz-Maske ein, oder lassen sie beide Felder leer.',
|
||||
'rma_ERR_NO_RECORD' => 'Es ist nicht möglich den http-admin Eintrag in der Konfigurationsdatenbank zu finden',
|
||||
'Remote access' => 'Fernzugriff',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Serielle Konsole',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar"/><h2>Serielle Konsole</h2> Sie können den Zugang zu der Server-Konsole über die serielle Schnittstelle des Servers von einem Terminal aus erlauben.',
|
||||
'rma_PORT1_ENABLED' => 'Aktiviert auf seriellem Port 1',
|
||||
'rma_PORT2_ENABLED' => 'Aktiviert auf seriellem Port 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP Standardbenutzerzugang',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar"/><h2>Telnet Einstellungen</h2> WARNUNG: Telnet ist zurzeit aktiviert, aber diese Funktion wird nicht weiter unterstützt. Telnet ist schon an sich sehr unsicher und sollte nur dort verwendet werden, wo keine vernünftigen Alternativen vorhanden sind. Sie sollten die Option auf {$NO_ACCESS} setzen und sollten eine sichere SSH Datenübertragung wählen, wenn der Fernzugriff benötigt wird. Wenn telnet je deaktiviert würde, wird die telnet Funktion auf dieser Seite nicht mehr zur Verfügung stehen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) Einstellungen</h2> Sie können IPSEC Clients unter Verwendung eines authentifizierten digitalen Zertifikats den Zugriff auf Ihren Server erlauben. Sie sollten diese Funktion durch Eingabe von 0 deaktiviert lassen, außer Sie benötigen den IPSEC Client Zugang. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Anzahl von IPSEC clients',
|
||||
'rma_DESC_IPSECRW_RESET' => ' Wenn Sie alle digitalen Zertifikate zurücksetzen möchten, können Sie dies hier tun.<br>Alle alten Zertifikate werden gegenüber dem Server nicht mehr authentifiziert, darum <b><i> müssen alle IPSEC clients ein neues Zertifikat importieren!</i></b> ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Digitale Zertifikate zurücksetzen',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Αλλαγή ρυθμίσεων απομεμακρυσμένης πρόσβασης',
|
||||
'rma_DESCRIPTION' => 'Για καθεμία από τις ακόλουθες επιλογές, η ρύθμιση "ιδιωτική" επιτρέπει σε οποιονδήποτε από το τοπικό σας δίκτυο να προσπελάσει το διακομιστή σας. Η ρύθμιση "δημόσια" επιτρέπει πρόσβαση από οπουδήποτε στο Διαδίκτυο. Η ρύθμιση "καμία πρόσβαση" καθιστά αδύνατη κάθε πρόσβαση. Για να κατανοήσετε τις επιπτώσεις που επιφέρουν σε θέματα ασφαλείας οι αλλαγές των προεπιλεγμένων ρυθμίσεις των ανωτέρω επιλογών, θα πρέπει να διαβάσετε το κεφάλαιο απομεμακρυσμένης πρόσβασης στο εγχειρίδιο του χρήστη.',
|
||||
'rma_SUCCESS' => 'Οι νέες ρυθμίσεις απομεμακρυσμένης πρόσβασης έχουν αποθηκευθεί.',
|
||||
'rma_NO_ACCESS' => 'Καμία πρόσβαση',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Αποδοχή κωδικών πρόσβασης μόνον από τα τοπικά δίκτυα',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Αποδοχή κωδικών πρόσβασης από οπουδήποτε',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Πρόσβαση Telnet',
|
||||
'rma_LABEL_FTP_ACCESS' => 'Πρόσβαση FTP',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Πρόσβαση FTP μέσω κωδικών',
|
||||
'rma_LABEL_PPTP' => 'Πλήθος πελατών PPTP',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'Θύρα TCP για πρόσβαση μέσω ασφαλούς κελύφους',
|
||||
'rma_LABEL_SSH' => 'Πρόσβαση μέσω ασφαλούς κελύφους',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Επιτρέπεται η πρόσβαση σε γραμμή εντολής διαχείρισης μέσω ασφαλούς κελύφους',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Επιτρέπεται η πρόσβαση μέσω ασφαλούς κελύφους με χρήση συνήθων κωδικών πόσβασης',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Ρυθμίσεις Ασφαλούς Κελύφους (Secure Shell)</h2>Μπορείτε να ελέγξετε την πρόσβαση μέσω ασφαλούς κελύφους στο διακομιστή σας. Η ρύθμιση "δημόσια" (public) θα πρέπει να ενεργοποιείται μόνο από πεπειραμένους διαχειριστές με σκοπό την απομεμακρυσμένη διάγνωση και επίλυση προβλημάτων. Συνιστάται να διατηρείται η ρύθμιση "Καμία Πρόσβαση" στην παράμετρο αυτή, εκτός εάν υπάρχει συγκεκριμένος λόγος για το αντίθετο. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>Ρυθμίσεις FTP</h2> Μπορείτε επίσης να ελέγξετε την πρόσβαση μέσω <b>FTP</b> στο διακομιστή σας. Συνιστάται να διατηρείται η ρύθμιση "Καμία Πρόσβαση" στην παράμετρο αυτή, εκτός εάν υπάρχει συγκεκριμένος λόγος για το αντίθετο. <p> Σημείωση: αυτές οι ρυθμίσεις περιορίζουν την πρόσβαση προς το διακομιστή σας, υποσκελίζοντας άλλες ρυθμίσεις, περιλαμβανομένων αυτών για εξατομικευμένα πεδία πληροφοριών.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Μπορείτε επίσης να ελέγχετε την πιστοποίηση γνησιότητας της πρόσβασης FTP σε i-bays και λογαριασμούς χρηστών. Συνιστάται ιδιαιτέρως να διατηρείται η ρύθμιση "Ιδιωτική" στην παράμετρο αυτή, εκτός εάν υπάρχει συγκεκριμένος λόγος για το αντίθετο. <p> Σημείωση: ένας πελάτης ασφαλούς κελύφους sftp μπορεί επίσης να χρησιμοποιηθεί για την πρόσβαση στον διακομιστή, εάν ενεργοποιηθεί η δυνατότητα απομεμακρυσμένης πρόσβασης μέσω ασφαλούς κελύφους. Αυτή η μέθοδος προστατεύει τους κωδικούς πρόσβασης και τα δεδομένα της FTP συνεδρίας, σε αντιδιαστολή με το κοινό FTP που δεν προσφέρει καμία προστασία. </p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>Ρυθμίσεις PPTP</h2> Μπορείτε να επιτρέψετε πρόσβαση PPTP στο διακομιστή σας. Εάν δεν επιθυμείτε PPTP πρόσβαση, θα πρέπει να αφήσετε αυτή τη δυνατότητα απενεργοποιημένη θέτοντας την τιμή 0. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Η τιμή πρέπει να είναι 0 ή θετικός ακέραιος αριθμός',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Απομεμακρυσμένη Διαχείριση',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Μπορείτε να επιτρέψετε σε Η/Υ απομεμακρυσμένων δικτύων να προσπελάσουν το διαχειριστή του διακομιστή (server manager), εισάγοντας εδώ τα εν λόγω δίκτυα. Χρησιμοποιήστε τη μάσκα υποδικτύου 255.255.255.255 για να περιορίσετε τη δυνατότητα πρόσβασης από το συγκεκριμένο Η/Υ και μόνον. Οποιοσδήποτε Η/Υ εντός της προσδιορισμένης περιοχής θα έχει πρόσβαση στο διαχειριστή του διακομιστή χρησιμοποιώντας HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Για να προσθέσετε ένα νέο δίκτυο απομεμακρυσμένης διαχείρισης, πληκτρολογήστε τις λεπτομέρειες στη συνέχεια.',
|
||||
'rma_SUBNET_MASK' => 'Μάσκα υποδικτύου',
|
||||
'rma_NUM_OF_HOSTS' => 'Πλήθος Η/Υ',
|
||||
'rma_NO_ENTRIES_YET' => 'Δεν υπάρχουν καταχωρήσεις επί του παρόντος',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Μη-έγκυρη μάσκα υποδικτύου',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Είτε δώστε στοιχεία για αμφότερα το δίκτυο και τη μάσκα υποδικτύου, ή αφήστε και τα δύο πεδία κενά.',
|
||||
'rma_ERR_NO_RECORD' => 'Αδύνατος ο εντοπισμός πεδίου httpd-admin στην βάση δεδομένων ρυθμίσεων παραμέτρων συστήματος',
|
||||
'rma_Remote access' => 'Απομεμακρυσμένη πρόσβαση',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Σειριακή κονσόλα',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Σειριακή κονσόλα</h2> Μπορείτε να επιτρέψετε την πρόσβαση στην κονσόλα του διακομιστή από ένα τερματικό συνδεδεμένο σε μία σειριακή θύρα του διακομιστή.',
|
||||
'rma_PORT1_ENABLED' => 'Ενεργοποιημένη στη σειριακή θύρα 1',
|
||||
'rma_PORT2_ENABLED' => 'Ενεργοποιημένη στη σειριακή θύρα 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Προεπιλεγμένη PPTP πρόσβαση χρήστη',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Ρυθμίσεις Telnet</h2> ΠΡΟΕΙΔΟΠΟΙΗΣΗ: Το Telnet είναι επί του παρόντος ενεργοποιημένο, αλλά δεν υποστηρίζεται πλέον. Το Telnet είναι εγγενώς επισφαλές και πρέπει να χρησιμοποιείται μόνο σε περιστάσεις όπου δεν υφίστανται εναλλακτικές πρακτικές. Πρέπει να αλλάξετε την επιλογή σε {$NO_ACCESS} και να χρησιμοποιήσετε περιβάλλον ασφαλούς κελύφους στην περίπτωση που απαιτείται απομεμακρυσμένη πρόσβαση. Εφόσον απενεργοποιηθεί, το telnet δεν θα εμφανίζεται πλέον στην παρούσα σελίδα. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>Ρύθμιση Πελάτη IPSEC (Roadwarrior)</h2> Μπορείτε να επιτρέψετε την πρόσβαση πελάτη IPSEC στο διακομιστή σας, που διαθέτει ψηφιακή πιστοποίηση γνησιότητας. Εάν δεν επιθυμείτε πρόσβαση πελατών IPSEC, θα πρέπει να αφήσετε αυτή τη δυνατότητα απενεργοποιημένη θέτοντας την τιμή 0. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Πλήθος πελατών IPSEC',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Εάν επιθυμείτε την αρχικοποίηση (reset) όλων των ψηφιακών πιστοποιητικών, μπορείτε να το κάνετε εδώ.<br>Οποιαδήποτε παλαιά πιστοποιητικά δεν θα παρέχουν πλέον πιστοποίηση γνησιότητας έναντι του διακομιστή, ως εκ τούτου <b><i>κάθε πελάτης IPSEC θα χρειαστεί να εισάγει νέο πιστοποιητικό!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Αρχικοποίηση ψηφιακών πιστοποιητικών',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Cambiar la configuración de acceso remoto',
|
||||
'rma_DESCRIPTION' => 'Para cada opción siguiente, la configuración privada permite que cualquier persona de la red local acceda al servidor. La configuración pública permite el acceso desde cualquier parte en Internet. La configuración de no acceso deshabilita el acceso. Para comprender las implicaciones de seguridad acerca de cambiar estas opciones desde la configuración predeterminada, lea la sección sobre el acceso remoto incluida en la guía de usuario.',
|
||||
'rma_SUCCESS' => 'Se ha guardado la nueva configuración de acceso remoto.',
|
||||
'rma_NO_ACCESS' => 'Sin acceso',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Aceptar contraseñas sólo desde redes locales',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Aceptar contraseñas desde cualquier lugar',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Acceso Telnet',
|
||||
'rma_LABEL_FTP_ACCESS' => 'Acceso FTP',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Acceso FTP con contraseña',
|
||||
'rma_LABEL_PPTP' => 'Número de clientes PPTP',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'Puerto TCP para acceso shell seguro',
|
||||
'rma_LABEL_SSH' => 'Acceso shell seguro',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Permitir acceso administrativo por línea de comando sobre el shell seguro',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Permitir el acceso shell seguro utilizando contraseñas estándar',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/><h2>Configuración de shell seguro</h2>Puede controlar el acceso de shell seguro al servidor. La configuración pública la deben habilitar sólo los administradores experimentados para diagnosticar y solucionar problemas remotos. Se recomienda que este parámetro se deje configurado en "Sin acceso" a menos que tenga una razón específica para hacer lo contrario. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>Configuración de FTP</h2> También puede controlar el acceso <b>FTP</b> al servidor. Se recomienda que este parámetro se deje configurado en \'sin acceso\' a menos que tenga una razón específica para hacer lo contrario. <p>Nota: esta configuración limita el acceso al servidor y anula otros ajustes, incluidos los correspondientes a bahías de información individuales.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' También puede controlar el acceso de FTP autenticado para bahías de información y cuentas de usuario. Se recomienda encarecidamente que este parámetro se deje configurado en privado a menos que tenga una razón específica para hacer lo contrario. <p> Nota: también se puede usar un cliente sftp de shell seguro para acceder al servidor, en caso de que esté habilitado el acceso remoto a través del shell seguro. Este método de acceso protege las contraseñas y los datos de la sesión FTP, mientras que el FTP estándar no proporciona ninguna protección.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>Configuración PPTP</h2> Usted puede permitir acceso PPTP al servidor. Debería dejar esta función deshabilitada configurando el valor en 0, a menos que necesite acceso PPTP. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'El valor debe ser cero o un número entero positivo',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Administración Remota',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar"/><h2>{$REMOTE_MANAGEMENT}</h2> <p>Se puede permitir el acceso a hosts de redes remotas a la administración del servidor si introduce esas redes aquí. Use una máscara de subred de 255.255.255.255 para limitar el acceso al host especificado. Todos los hosts dentro del rango especificado podrán acceder al administrador del servidor utilizando HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Para agregar una nueva red de administración remota, introduzca los detalles a continuación.',
|
||||
'rma_SUBNET_MASK' => 'Máscara de subred',
|
||||
'rma_NUM_OF_HOSTS' => 'Cantidad de hosts',
|
||||
'rma_NO_ENTRIES_YET' => 'Aún no hay entradas',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Máscara de subred inválida',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Proporcione una red y máscara de subred o deje ambos campos en blanco.',
|
||||
'rma_ERR_NO_RECORD' => 'No se puede ubicar el registro httpd-admin en la base de datos de configuración',
|
||||
'Remote access' => 'Acceso remoto',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Consola serie',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Consola serie</h2> Puede permitir acceso a la consola del servidor desde un terminal conectado a un puerto serie del servidor.',
|
||||
'rma_PORT1_ENABLED' => 'Habilitado en el puerto serie 1',
|
||||
'rma_PORT2_ENABLED' => 'Habilitado en el puerto serie 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Acceso PPTP predeterminado para usuarios',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Configuración de Telnet</h2> ADVERTENCIA: Actualmente Telnet se encuentra habilitado, pero esta característica ya no es soportada. Telnet es inherentemente inseguro y debe ser usado únicamente en aquellas circunstancias donde ninguna otra alternativa se encuentra disponible. Usted debe cambiar la opción a {$NO_ACCESS} y usar shell seguro si el acceso remoto es requerido. Una vez que Telnet sea deshabilitado, esta opción no volverá a aparecer en esta pantalla. ',
|
||||
'rma_DESC_IPSECRW' => '<h2>Configuración de Cliente IPSEC (Roadwarrior)</h2> Puede permitir el acceso del cliente IPSEC a su servidor, autenticado por los certificados digitales. Debería dejar esta función deshabilitada configurando el valor numérico en 0 a menos que necesite acceso de cliente IPSEC. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Número de clientes IPSEC',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Si desea reinicializar todos los certificados digitales, puede hacerlo aquí.<br>Los certificados antiguos ya no estarán autenticados ante el servidor, por lo que <b><i>todos los clientes IPSEC deberán importar ¡el nuevo certificado!</i></b> ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Reinicializar certificados digitales',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Muuda kaughalduse juurdepääsu seadeid',
|
||||
'rma_DESCRIPTION' => 'For each of the options below, the private setting allows anyone from your local network to access your server. The public setting allows access from anywhere on the Internet. The no access setting disables access. To understand the security implications of changing these options from the default settings, you should read the user\'s guide section on remote access.',
|
||||
'rma_SUCCESS' => 'Uued kaughalduse juurdepääsu seadistused on salvestatud.',
|
||||
'rma_NO_ACCESS' => 'Pole juurdepääsu',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Aktsepteeri parooli ainult kohtvõrgust',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Aktsepteeri parooli kõikjalt',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet juurdepääs',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP juurdepääs',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP parooliga juurdepääs',
|
||||
'rma_LABEL_PPTP' => 'PPTP klientide arv',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP Port secure shell juurdepääsuks',
|
||||
'rma_LABEL_SSH' => 'Secure shell juurdepääs',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Luba jurdepääs administreerida käsurealt üle secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Luba secure shell juurdepääsul kasutada standartseid paroole',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Secure Shell Settings</h2>You can control Secure Shell access to your server. The public setting should only be enabled by experienced administrators for remote problem diagnosis and resolution. We recommend leaving this parameter set to "No Access" unless you have a specific reason to do otherwise. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Settings</h2> You can also control <b>FTP</b> access to your server. We recommend leaving this parameter set to \'no access\' unless you have a specific reason to do otherwise. <p> Note: these settings limit access to the server and override other settings, including those for individual information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' You can also control authenticated FTP access to information bays and user accounts. We strongly recommend leaving this parameter set to private unless you have a specific reason to do otherwise. <p> Note: a secure shell sftp client can also be used to access the server, if remote access via the secure shell is enabled. This method of access protects the passwords and data of the FTP session, whereas standard FTP provides no protection.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP Seaded</h2> Saad lubada PPTP juurdepääsu oma serverile. Juurdepääsu keelamiseks anna väärtuseks 0 kui sul pole PPTP juurdepääsu vaja. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Väärtus peab olema 0 või posiktiivne',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Kaughaldus',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Võimalik on lubada teatud hostidest serveri kaughaldust, selleks sisesta need võrgud siia. Kasuta subnet maski 255.255.255.255 et limiteerida juurdepääsu teatud hostidest. Kõik hostid mis mahuvad vahemiku saavad juurdepääsu serveri kaughaldusele üle HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Lisamask uut võrku kust on kaughaldus lubatud, sisesta andmed siia.',
|
||||
'rma_SUBNET_MASK' => 'Subnet mask',
|
||||
'rma_NUM_OF_HOSTS' => 'Hostide arv',
|
||||
'rma_NO_ENTRIES_YET' => 'Siin pole veel sisestusi',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Sobimatu subnet mask',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Lisa mõlemad võrk ja subnet mask või jäta mõlemad tühjaks',
|
||||
'rma_ERR_NO_RECORD' => 'Ei leidnud httpd-admin kirjeid konfiguratsiooni andmebaasist',
|
||||
'rma_Remote access' => 'Kaughaldus',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Serial console',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Serial console</h2> You can allow access to the server console from a terminal connected to a server serial port.',
|
||||
'rma_PORT1_ENABLED' => 'Enabled on serial port 1',
|
||||
'rma_PORT2_ENABLED' => 'Enabled on serial port 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP vaikimisi kasutaja juurdepääs ',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet Settings</h2> WARNING: Telnet is currently enabled, but this feature is no longer supported. Telnet is inherently insecure and should only be used in circumstances where no practical alternative exists. You should change option to {$NO_ACCESS} and use secure shell if remote access is required. Once disabled, telnet will no longer appear on this screen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) Settings</h2> You can allow IPSEC client access to your server, authenticated by digital certificates. You should leave this feature disabled by setting the value to the number 0 unless you require IPSEC client access. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'IPSEC klientide arv',
|
||||
'rma_DESC_IPSECRW_RESET' => 'If you wish to reset all digital certificates, you can do so here.<br>Any old certificates will no longer authenticate against the server, so <b><i>all IPSEC clients will need to import a new certificate!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Reset digital certificates',
|
@@ -0,0 +1,46 @@
|
||||
'rma_FORM_TITLE' => 'Configuration des paramètres d\'accès à distance',
|
||||
'rma_DESCRIPTION' => 'Pour chacune des options ci-dessous, la valeur \'Privé\' permet à toute personne du réseau local d\'accéder au serveur. La valeur \'Public\' permet l\'accès depuis n\'importe où sur Internet. La valeur \'Aucun accès\' interdit tout accès. Pour comprendre l\'importance des effets produits sur la sécurité par le changement des valeurs par défaut, nous vous recommandons de lire la section ayant trait à l\'accès distant dans la documentation utilisateur.',
|
||||
'rma_SUCCESS' => 'Les nouveaux paramètres d\'accès à distance ont été enregistrés.',
|
||||
'rma_NO_ACCESS' => 'Aucun accès',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'N\'autoriser l\'authentification que depuis les réseaux locaux',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Permettre l\'authentification depuis n\'importe où',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Accès Telnet',
|
||||
'rma_LABEL_FTP_ACCESS' => 'Accès FTP',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Accès FTP par mot de passe',
|
||||
'rma_LABEL_PPTP' => 'Nombre de connexions simultanées',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'Le nombre de sessions PPTP est supérieur aux IP réservées pour le DHCP. Vous devez allouez moins de sessions PPTP',
|
||||
'rma_LABEL_SSH_PORT' => 'Port TCP pour l\'accès SSH',
|
||||
'rma_LABEL_SSH' => 'Accès par terminal sécurisé (SSH)',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Autoriser l\'administrateur à se connecter au serveur par SSH',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Autoriser l\'authentification par SSH à l\'aide de mots de passe standards',
|
||||
'rma_DESC_SSH' => 'Vous pouvez contrôler l\'accès à votre serveur par terminal sécurisé (SSH). L\'accès "public" ne doit être activé que par des administrateurs expérimentés afin de pouvoir diagnostiquer et résoudre des problèmes à distance. Nous vous recommandons de laisser ce paramètre validé sur "Aucun accès", à moins que vous n\'ayez une raison bien précise de faire autrement. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' Vous pouvez aussi contrôler l\'accès par FTP à votre serveur. Nous vous recommandons de laisser ce paramètre validé sur "aucun accès", à moins que vous n\'ayez une raison bien précise de faire autrement. Remarque : ces paramètres limitent l\'accès global au serveur FTP et priment sur tout autre, y compris ceux définis pour chaque i-bay. ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Vous pouvez contrôler l\'accès authentifié par FTP aux i-bays et aux comptes utilisateur. Nous vous recommandons de n\'autoriser l\'autentification que depuis les réseaux locaux, à moins que vous n\'ayez une raison bien précise de faire autrement. Remarque : il est également possible d\'utiliser un client SFTP (terminal sécurisé) pour accéder au serveur, à condition que l\'accès à distance par SSH ait été activé. Ce mode d\'accès protège les mots de passe et les données de la session FTP, tandis que le FTP standard n\'offre aucune protection à cet égard. ',
|
||||
'rma_DESC_PPTP' => 'Vous pouvez autoriser l\'accès VPN par PPTP à votre serveur. Nous vous recommandons de laisser cette fonctionnalité désactivée en fixant la valeur à 0, à moins que vous n\'ayez absolument besoin d\'un accès par PPTP. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'La valeur doit être un entier supérieur ou égal à zéro.',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Gestion à distance',
|
||||
'rma_VALIDFROM_DESC' => ' Il est possible de permettre l\'accès au gestionnaire du serveur à des hôtes situés sur des réseaux distants en indiquant ces réseaux ici. Utilisez le masque de sous-réseau 255.255.255.255 pour ne permettre l\'accès qu\'à une machine unique. Tout hôte contenu dans la plage d\'adresses spécifiée pourra alors accéder au gestionnaire du serveur à l\'aide du protocole sécurisé HTTPS. ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Pour ajouter une nouvelle plage d\'adresses de gestion à distance, entrez les informations ci-dessous :',
|
||||
'rma_SUBNET_MASK' => 'Masque de sous-réseau',
|
||||
'rma_NUM_OF_HOSTS' => 'Nombre d\'hôtes',
|
||||
'rma_NO_ENTRIES_YET' => 'Aucun hôte défini',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Masque de sous-réseau non valide.',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Vous devez soit entrer l\'adresse de réseau et le masque de sous-réseau, soit laisser ces deux champs vides.',
|
||||
'rma_ERR_NO_RECORD' => 'Impossible de trouver les informations relatives au gestionnaire du serveur dans la base de données de configuration.',
|
||||
'Remote access' => 'Accès à distance',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Console sur port série',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => 'Vous pouvez autoriser l\'accès à la console du serveur à partir d\'un terminal relié à un port série du serveur. ',
|
||||
'rma_PORT1_ENABLED' => 'Activé sur le port série 1',
|
||||
'rma_PORT2_ENABLED' => 'Activé sur le port série 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Accès utilisateur par défaut via PPTP',
|
||||
'rma_DESC_TELNET_ACCESS' => 'AVERTISSEMENT : Telnet est actuellement activé, mais cette fonctionnalité n\'est plus prise en charge. Intrinsèquement, Telnet n\'est pas sécurisé et nous vous recommandons de ne pas l\'utiliser, à moins que vous n\'ayez pas d\'autre alternative. Vous devriez définir cette option à "{$NO_ACCESS}" et utiliser un terminal sécurisé (SSH) si l\'accès distant est nécessaire. Une fois désactivé, Telnet n\'apparaîtra plus sur cette page. ',
|
||||
'rma_DESC_IPSECRW' => 'Vous pouvez autoriser l\'accès authentifié par certificat numérique à votre serveur via un client IPSEC. Nous vous recommandons de laisser cette fonctionnalité désactivée en réglant la valeur à 0, à moins que vous n\'ayez absolument besoin d\'un accès par IPSEC. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Nombre de connexions simultanées',
|
||||
'rma_DESC_IPSECRW_RESET' => ' Si vous le désirez, vous pouvez régénérer les certificats numériques ici.<br> Les anciens certificats ne permettront plus l\'authentification auprès du serveur et <b><i>tous les clients IPSEC devront donc importer un nouveau certificat !</i></b> ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Régénérer les certificats numériques',
|
||||
'rma_TITLE_SSH' => 'Paramètres SSH',
|
||||
'rma_TITLE_FTP_ACCESS' => 'Paramètres FTP',
|
||||
'rma_TITLE_PPTP' => 'Paramètres PPTP',
|
||||
'rma_VALIDFROM_TITLE' => '[_1]',
|
||||
'rma_TITLE_TELNET_ACCESS' => 'Paramètres Telnet',
|
||||
'rma_TITLE_IPSECRW' => 'ParamètresIPSEC Client (Roadwarrior)',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Change remote access settings',
|
||||
'rma_DESCRIPTION' => 'For each of the options below, the private setting allows anyone from your local network to access your server. The public setting allows access from anywhere on the Internet. The no access setting disables access. To understand the security implications of changing these options from the default settings, you should read the user\'s guide section on remote access.',
|
||||
'rma_SUCCESS' => 'The new remote access settings have been saved.',
|
||||
'rma_NO_ACCESS' => 'No Access',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Accept passwords only from local networks',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Accept passwords from anywhere',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet access',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP access',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP password access',
|
||||
'rma_LABEL_PPTP' => 'Number of PPTP clients',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP Port for secure shell access',
|
||||
'rma_LABEL_SSH' => 'Secure shell access',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Allow administrative command line access over secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Allow secure shell access using standard passwords',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Secure Shell Settings</h2>You can control Secure Shell access to your server. The public setting should only be enabled by experienced administrators for remote problem diagnosis and resolution. We recommend leaving this parameter set to "No Access" unless you have a specific reason to do otherwise. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Settings</h2> You can also control <b>FTP</b> access to your server. We recommend leaving this parameter set to \'no access\' unless you have a specific reason to do otherwise. <p> Note: these settings limit access to the server and override other settings, including those for individual information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' You can also control authenticated FTP access to information bays and user accounts. We strongly recommend leaving this parameter set to private unless you have a specific reason to do otherwise. <p> Note: a secure shell sftp client can also be used to access the server, if remote access via the secure shell is enabled. This method of access protects the passwords and data of the FTP session, whereas standard FTP provides no protection.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP Settings</h2> You can allow PPTP access to your server. You should leave this feature disabled by setting the value to the number 0 unless you require PPTP access. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Value must be zero or a positive integer',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Remote Management',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>It is possible to allow hosts on remote networks to access the server manager by entering those networks here. Use a subnet mask of 255.255.255.255 to limit the access to the specified host. Any hosts within the specified range will be able to access the server manager using HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'To add a new remote management network, enter the details below.',
|
||||
'rma_SUBNET_MASK' => 'Subnet mask',
|
||||
'rma_NUM_OF_HOSTS' => 'Number of hosts',
|
||||
'rma_NO_ENTRIES_YET' => 'There are no entries yet',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Invalid subnet mask',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Either provide both a network and subnet mask, or leave both fields blank.',
|
||||
'rma_ERR_NO_RECORD' => 'Unable to locate httpd-admin record in configuration db',
|
||||
'rma_Remote access' => 'Remote access',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Serial console',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Serial console</h2> You can allow access to the server console from a terminal connected to a server serial port.',
|
||||
'rma_PORT1_ENABLED' => 'Enabled on serial port 1',
|
||||
'rma_PORT2_ENABLED' => 'Enabled on serial port 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP default user access',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet Settings</h2> WARNING: Telnet is currently enabled, but this feature is no longer supported. Telnet is inherently insecure and should only be used in circumstances where no practical alternative exists. You should change option to {$NO_ACCESS} and use secure shell if remote access is required. Once disabled, telnet will no longer appear on this screen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) Settings</h2> You can allow IPSEC client access to your server, authenticated by digital certificates. You should leave this feature disabled by setting the value to the number 0 unless you require IPSEC client access. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Number of IPSEC clients',
|
||||
'rma_DESC_IPSECRW_RESET' => 'If you wish to reset all digital certificates, you can do so here.<br>Any old certificates will no longer authenticate against the server, so <b><i>all IPSEC clients will need to import a new certificate!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Reset digital certificates',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Távoli hozzáférés beállításainak módosítása',
|
||||
'rma_DESCRIPTION' => 'Az alábbi minden egyes opciónál, a magán beállítás bárkinek a helyi hálózatból engedélyezi a hozzáférést a szerverhez. A nyilvános beállítás az egész Internetről engedélyezi a hozzáférést. A nincs hozzáférés beállítás letiltja a hozzáférést. Hogy megértse a biztonsági vonatkozásait ezen a beállítások megváltoztatásának, olvassa el a felhasználói kézikönyvben az ide vonatkozó részt.',
|
||||
'rma_SUCCESS' => 'Az új távoli hozzáférés beállítások lementődtek.',
|
||||
'rma_NO_ACCESS' => 'Nincs hozzáférés',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Csak helyi hálózatokból fogad el jelszavakat',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Bárhonnan elfogadja a jelszavakat',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet hozzáférés',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP hozzáférés',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP jelszó hozzáférés',
|
||||
'rma_LABEL_PPTP' => 'PPTP kliensek száma',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'A pptp-ügyfelek száma nagyobb, mint a DHCP által fenntartott IP-címek száma. Kisebb számot kell megadni.',
|
||||
'rma_LABEL_SSH_PORT' => 'A secure shell hozzáférés TCP portja',
|
||||
'rma_LABEL_SSH' => 'Secure shell hozzáférés',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Rendszergazdai parancsok fogadása secure shell-en keresztül',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Secure shell hozzáférés engedélyezése hagyományos jelszavakkal',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Secure Shell beállítások</h2>Szabályozhatja a Secure Shell hozzáférést a szerverhez. A nyilvános beállítást csak tapasztalt rendszergazdák alkalmazzák távoli hibaelhárításhoz. Ha nincs rá különösebb oka ezt használni, akkor ajánlott ezt a beállítást a "Nincs hozzáférés" -re állítani. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP beállítások</h2> Az <b>FTP</b> hozzáférést is szabályozhatja a szerveren. Ajánlatos ezt a paramétert \'Nincs hozzáférés\' -re állítani, hacsak nincs rá oka hogy másképp tegyen. <p> Figyelem: ezek a beállítások korlátozzák a hozzáférést a szerverhez és felülírnak más beállításokat, beleértve az egyedi adattárak beállításait.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Szabályozhatja a biztonságos FTP hozzáférést az adattárakhoz és a felhasználói fiókokhoz. Ajánlatos ezt a paramétertprivate-ra állítani, hacsak nincs rá oka hogy másképp tegyen. <p> Figyelem: egy secure shell sftp kliens használható a szerverhez való hozzáféréshez, ha a távoli hozzáférés secure shellen keresztül engedélyezve van. Ez a módszer védi a jelszavakat és az adatokat az FTP kapcsolat során, míg a hagyományos FTP nem biztosít védelmet.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP beállítások</h2> Engedélyezheti a PPTP hozzáférést a szerveréhez. Ha nincs szüksége a PPTP hozzáférésre, a 0 érték beállításával kikapcsolhatja azt. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Az értéknek 0-nak vagy pozitív egész számnak kell lennie',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Távoli hozzáférés',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Lehetséges engedélyezni a távoli hálózatokban lévő gépeknek a szerver kezelőhöz való hozzáférést azok hálózatának bejegyzésével. Használja a 255.255.255.255 alhálózati maszkot a gépek hozzáférésének korlátozásához. Az alhálózati maszk által meghatározott címtartományban minden gép HTTPS használatával hozzáférhet a szerver kezelőhöz.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Távoli hálózat hozzáadásához, adja meg az alábbi adatokat.',
|
||||
'rma_SUBNET_MASK' => 'Alhálózati maszk',
|
||||
'rma_NUM_OF_HOSTS' => 'Gépek száma',
|
||||
'rma_NO_ENTRIES_YET' => 'Nincsenek még bejegyzések',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Érvénytelen alhálózati maszk',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Adja meg a hálózatot és az alhálózati maszkot is, vagy hagyja mindkét mezőt üresen.',
|
||||
'rma_ERR_NO_RECORD' => 'Nem lehet megtalálni a http-admin rekordot a konfigurációs adatbázisban',
|
||||
'rma_Remote access' => 'Távoli hozzáférés',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Soros konzol',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Soros konzol</h2> Engedélyezheti a hozzáférést a szerver konzolhoz egy szerverre kapcsolt soros terminálon keresztül.',
|
||||
'rma_PORT1_ENABLED' => 'Engedélyezve az 1. soros porton',
|
||||
'rma_PORT2_ENABLED' => 'Engedélyezve az 2. soros porton',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP alapértelmezett hozzáférés',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet beállítások</h2> Figyelem: A telnet jelenleg engedélyezett, de ez a szolgáltatás többé nem támogatott. A telnet alapvetően nem biztonságos és csak olyan körülmények között használja, ahol nem létezik más alternatíva. Állítsa ezt az opciót{$NO_ACCESS} -re és használjon secure shell-t ha távoli hozzáférésre van szüksége. Miután letiltja, a telnet nem jelenik meg többé ezen az oldalon. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC kliens (Roadwarrior) beállítások</h2> Engedélyezheti a digitális tanúsitvánnyal azonosított IPSEC kliensek számára a hozzáférést ehhez a szerverhez. Ha nincs szüksége az IPSEC kliens hozzáférésre, a 0 érték beállításával kikapcsolhatja azt. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'IPSEC kliensek száma',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Ha meg akarja változtatni a digitális tanusítványokat, azt itt teheti meg.<br>Egyik régi tanúsítvánnyal sem lehet majd bejelentkezni, ezért <b><i>minden IPSEC kliensnek be kell szereznie egy új tanúsítványt!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Digitális tanúsítványok megváltoztatása',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Ubah akses jarak jauh',
|
||||
'rma_DESCRIPTION' => 'Untuk setiap pilihan dibawah, pengaturan privat membolehkan semua orang dari jaringan lokal anda untuk mengakses server anda. Pengaturan umum membolehkan akses dari mana saja di Internet. Pengaturan no access men-disable akses. Untuk mengerti aspek keamanan akibat dari perubahan mengubah pilihan tersebut dari setting default, anda harus membaca panduan pengguna pada bagian akses jarak jauh.',
|
||||
'rma_SUCCESS' => 'Setting pengaturan jarak jauh yang baru telah disimpan.',
|
||||
'rma_NO_ACCESS' => 'Tidak ada akses',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Terima password hanya dari jaringan lokal',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Terima password dari manapun',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Akses telnet',
|
||||
'rma_LABEL_FTP_ACCESS' => 'Akses FTP',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Password akses FTP',
|
||||
'rma_LABEL_PPTP' => 'Jumlah klien PPTP',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'Port TCP untuk akses secure shell',
|
||||
'rma_LABEL_SSH' => 'Akses secure shell',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Bolehkan akses administrasi command line melalui secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Bolehkan akses secure shell menggunakan password standar',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/> <h2>Pengaturan Secure Shell</h2>Anda dapat mengkontrol akses Secure Shell ke server anda. Pengaturan untuk umum hanya dibolehkan oleh administrator berpengalaman untuk diagnosa dan penyelesaian masalah secara jarak jauh. Kami anjurkan untuk membiarkan parameter ini di set ke "No Access" kecuali anda punya alasan yang khusus. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar"/><h2>Pengaturan FTP </h2> Anda juga dapat mengatur akses <b>FTP</b> ke server anda. Kami menganjurkan untuk membiarkan parameter ini ke \'no access\' kecuali anda memiliki alasan khusus. <p> Catatan: pengaruran tersebut membatasi akses ke server dan menimpa aturan lain, termasuk pada masing-masing information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Anda juga dapat mengatur akses FTP access ke information bays dan akun pengguna. Kami sangat menganjurkan agar membiarkan parameter ini ke privat kecuali anda punya alasan khusus. <p> Catatan: klien secure shell sftp dapat juga digunakan untuk mengakses server, jika akses jarak jauh melalui secure shell dibolehkan. Metode ini memproteksi password and data dari sesi FTP, dimana FTP yang umum tidak melakukan proteksi.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar"/><h2>Pengaturan PPTP</h2> Anda dapat membolehkan akses PPTP ke server anda. Anda harus membiarkan fitur ini dalam kondisi disabled dengan cara mengisikan angka 0 kecuali anda memerlukan akses PPTP. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Nilai haruslah nol atau bilangan bulat positif',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Pengaturan Jarak Jauh',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar"/><h2>{$REMOTE_MANAGEMENT}</h2> <p>Adalah memungkinkan untuk membolehkan host di jaringan luar untuk mengakses server manager dengan memasukkan jaringan tersebut disini. Gunakan subnet mask dengan format 255.255.255.255 untuk membatasi akses host tertentu. Semua host dalam jangkauan yang ditentukan itu akan dapat mengakses server manager menggunakan HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Untuk menambahkan jaringan untuk pengaturan jarak jauh, masukkan rincian dibawah ini.',
|
||||
'rma_SUBNET_MASK' => 'Subnet mask',
|
||||
'rma_NUM_OF_HOSTS' => 'Jumlah host',
|
||||
'rma_NO_ENTRIES_YET' => 'Belum ada entry',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Subnet mask cacat',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Isikan network dan subnet mask, atau biarkan keduanya kosong.',
|
||||
'rma_ERR_NO_RECORD' => 'Tidak dapat menemukan record httpd-admin dalam configuration db',
|
||||
'rma_Remote access' => 'Akses jarak jauh',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Konsol serial',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar"/><h2>Konsol Serial</h2> Anda dapat membolehkan akses ke konsol server dari sebuah terminal yang terhubung melalui serial port pada server.',
|
||||
'rma_PORT1_ENABLED' => 'Dibolehkan pada port serial 1',
|
||||
'rma_PORT2_ENABLED' => 'Dibolehkan pada port serial 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Akses default user PPTP',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar"/><h2>Pengaturan Telnet</h2> PERINGATAN: Telnet saat ini di enable, tapi fitur ini tidak didukung lagi. Telnet kurang aman dan hanya boleh digunakan jika tidak ada pilihan lain. Anda harus mengganti opsi menjadi {$NO_ACCESS} dan menggunakan secure shell jika akses jarak jauhdiperlukan. Sekali di-disable, telnet tidak akan muncul lagi di layar ini. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>Pengaturan Klien IPSEC (Roadwarrior) </h2> Anda bisa membolehkan klien IPSEC untuk mengakses server anda, diotentikasi dengan sertifikat digital. Anda harus membiarkan fitur ini dalam kondisi disable dengan mengisikan angka 0 kecuali anda memerlukan akses bagi klien IPSEC. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Jumlah klien IPSEC',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Jika anda ingin mereset semua sertifikat digital, anda dapat lakukan disini.<br>Semua sertifikat yang lama tidak akan di otentikasi dengan server, karena itu <b><i>semua klien IPSEC perlu untuk meng-import sertifikat yang baru!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Reset sertifikat digital',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Cambio impostazioni accesso remoto',
|
||||
'rma_DESCRIPTION' => 'Per ognuna delle opzioni sottostanti, l\'impostazione privato permette a chiunque di accedere al server dalla rete locale. L\'impostazione pubblico consente l\'accesso da ovunque su Internet. L\'impostazione nessun accesso inibisce l\'accesso. Per comprendere le implicazioni di sicurezza legate a queste opzioni è necessario leggere la guida utente, sezione accesso remoto.',
|
||||
'rma_SUCCESS' => 'Le nuove impostazioni di accesso remoto sono state salvate.',
|
||||
'rma_NO_ACCESS' => 'Nessun Accesso',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Accetta password solo dalle reti locali',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Accetta password da tutte le reti',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Accesso Telnet',
|
||||
'rma_LABEL_FTP_ACCESS' => 'Accesso FTP',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Accesso FTP con password',
|
||||
'rma_LABEL_PPTP' => 'Numero di client PPTP',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'Il numero di client pptp è più grande del numero di indirizzi ip riservati da DHCP. Deve essere scelto un numero più piccolo.',
|
||||
'rma_LABEL_SSH_PORT' => 'Porta TCP usata per l\'accesso ssh',
|
||||
'rma_LABEL_SSH' => 'Accesso Secure shell (ssh)',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Consenti accesso amministrativo da linea comandi su ssh',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Consenti accesso ssh con password standard',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/><h2>Impostazioni Secure Shell (ssh)</h2>E\' possibile impostare l\'accesso ssh al server. L\'impostazione pubblico dovrebbe essere abilitata solo da amministratori esperti per diagnosi e risoluzione problemi da remoto. Il valore raccomandato per questo parametro è "Nessun Accesso" a meno di specifiche ragioni contrarie. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar"/><h2>Impostazioni FTP</h2> E\' possibile controllare l\'accesso <b>FTP</b> al server. Si consiglia di lasciare questo parametro a "Nessun Accesso" a meno di specifiche ragioni. <p> Nota: queste impostazioni limitano l\'accesso al server e hanno precedenza sulle altre impostazioni, comprese quelle per le singole i-bay.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' E\' possibile controllare l\'accesso FTP autenticato alle i-bay e agli utenti. E\' fortemente raccomandato lasciare questa impostazione a privato. <p> Nota: è possibile utilizzare un client sftp (ssh) per accedere al server, avendo preventivamente abilitato l\'accesso ssh. Questo metodo protegge password e dati della sessione ftp, mentre l\'FTP standard non offre protezione.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar"/><h2>Impostazioni PPTP</h2> E\' possibile abilitare l\'accesso PPTP al server. Questa funzionalità dovrebbe rimanere disabilitata impostando a 0 il valore, a meno che sia necessario l\'accesso PPTP. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Il valore deve essere 0 o un intero positivo',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Gestione Remota',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar"/><h2>{$REMOTE_MANAGEMENT}</h2> <p>E\' possibile consentire l\'accesso a computer su reti remote al server-manager, inserendo le reti abilitate qui. Utilizzare una subnet mask di 255.255.255.255 per limitare l\'accesso ad un host specifico. I computer abilitati potranno accedere al server-manager in HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Per aggiungere una nuova rete di gestione, inserire i dettagli sotto.',
|
||||
'rma_SUBNET_MASK' => 'Maschera di rete',
|
||||
'rma_NUM_OF_HOSTS' => 'Numero di host',
|
||||
'rma_NO_ENTRIES_YET' => 'Non ci sono valori',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Subnet mask non valida',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Inserire una coppia rete e maschera di rete o lasciare vuoti entrambi i campi.',
|
||||
'rma_ERR_NO_RECORD' => 'Impossibile trovare il record httpd-admin nel db di configurazione',
|
||||
'Remote access' => 'Accesso remoto',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Console seriale',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar"/><h2>Console seriale</h2> E\' possibile accedere alla console del server da un terminale collegato a una porta seriale.',
|
||||
'rma_PORT1_ENABLED' => 'Abilitato sulla porta seriale 1',
|
||||
'rma_PORT2_ENABLED' => 'Abilitato sulla porta seriale 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Accesso utente PPTP default',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar"/><h2>Impostazioni Telnet</h2> ATTENZIONE: Telnet è abilitato, ma non più supportato. Telnet non è sicuro e dovrebbe essere usato solo in circostanze in cui non esistono alternative. L\'opzione dovrebbe essere su {$NO_ACCESS} e dovrebbe essere utilizzato ssh in caso di accesso remoto. Una volta disabilitato, telnet non apparirà su questo schermo. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>Impostazioni client IPSEC (Roadwarrior)</h2> E\' possibile consentire l\'accesso IPSEC al server, con autenticazione a certificati digitali. Questa caratteristica dovrebbe rimanere disabilitata impostando il valore 0 a meno di necessità di accesso client IPSEC. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Numero di client IPSEC',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Desiderando reimpostare tutti i certificati digitali è possibile farlo qui.<br>I vecchi certificati non permetteranno l\'autenticazione sul server e <b><i>tutti i client IPSEC dovranno importare un nuovo certificato!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Ricrea i certificati digitali',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Change remote access settings',
|
||||
'rma_DESCRIPTION' => 'For each of the options below, the private setting allows anyone from your local network to access your server. The public setting allows access from anywhere on the Internet. The no access setting disables access. To understand the security implications of changing these options from the default settings, you should read the user\'s guide section on remote access.',
|
||||
'rma_SUCCESS' => 'The new remote access settings have been saved.',
|
||||
'rma_NO_ACCESS' => 'No Access',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Accept passwords only from local networks',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Accept passwords from anywhere',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet access',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP access',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP password access',
|
||||
'rma_LABEL_PPTP' => 'Number of PPTP clients',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP Port for secure shell access',
|
||||
'rma_LABEL_SSH' => 'Secure shell access',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Allow administrative command line access over secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Allow secure shell access using standard passwords',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Secure Shell Settings</h2>You can control Secure Shell access to your server. The public setting should only be enabled by experienced administrators for remote problem diagnosis and resolution. We recommend leaving this parameter set to "No Access" unless you have a specific reason to do otherwise. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Settings</h2> You can also control <b>FTP</b> access to your server. We recommend leaving this parameter set to \'no access\' unless you have a specific reason to do otherwise. <p> Note: these settings limit access to the server and override other settings, including those for individual information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' You can also control authenticated FTP access to information bays and user accounts. We strongly recommend leaving this parameter set to private unless you have a specific reason to do otherwise. <p> Note: a secure shell sftp client can also be used to access the server, if remote access via the secure shell is enabled. This method of access protects the passwords and data of the FTP session, whereas standard FTP provides no protection.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP Settings</h2> You can allow PPTP access to your server. You should leave this feature disabled by setting the value to the number 0 unless you require PPTP access. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Value must be zero or a positive integer',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Remote Management',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>It is possible to allow hosts on remote networks to access the server manager by entering those networks here. Use a subnet mask of 255.255.255.255 to limit the access to the specified host. Any hosts within the specified range will be able to access the server manager using HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'To add a new remote management network, enter the details below.',
|
||||
'rma_SUBNET_MASK' => 'Subnet mask',
|
||||
'rma_NUM_OF_HOSTS' => 'Number of hosts',
|
||||
'rma_NO_ENTRIES_YET' => 'There are no entries yet',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Invalid subnet mask',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Either provide both a network and subnet mask, or leave both fields blank.',
|
||||
'rma_ERR_NO_RECORD' => 'Unable to locate httpd-admin record in configuration db',
|
||||
'rma_Remote access' => 'Remote access',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Serial console',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Serial console</h2> You can allow access to the server console from a terminal connected to a server serial port.',
|
||||
'rma_PORT1_ENABLED' => 'Enabled on serial port 1',
|
||||
'rma_PORT2_ENABLED' => 'Enabled on serial port 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP default user access',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet Settings</h2> WARNING: Telnet is currently enabled, but this feature is no longer supported. Telnet is inherently insecure and should only be used in circumstances where no practical alternative exists. You should change option to {$NO_ACCESS} and use secure shell if remote access is required. Once disabled, telnet will no longer appear on this screen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) Settings</h2> You can allow IPSEC client access to your server, authenticated by digital certificates. You should leave this feature disabled by setting the value to the number 0 unless you require IPSEC client access. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Number of IPSEC clients',
|
||||
'rma_DESC_IPSECRW_RESET' => 'If you wish to reset all digital certificates, you can do so here.<br>Any old certificates will no longer authenticate against the server, so <b><i>all IPSEC clients will need to import a new certificate!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Reset digital certificates',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Endre fjerntilgang innstillinger',
|
||||
'rma_DESCRIPTION' => 'For hver av valgene nedenfor, privat innstilling tillater alle på ditt lokale nettverk tilgang til serveren. Offentlig innstilling tillater alle fra hele internett. Ingen tilgang innstilling slår av all tilgang.Du bør lese brukermanual seksjonen om fjerntilgang for å forstå hvilken innvirkning på sikkerheten det har å endre på disse innstillingene.',
|
||||
'rma_SUCCESS' => 'De nye fjerntilgang innstillinger er lagret.',
|
||||
'rma_NO_ACCESS' => 'Ingen tilgang',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Tillat passord bare fra lokale nettverk',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Tillat passor fra hvor som helst',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet tilgang',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP tilgang',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP passord tilgang',
|
||||
'rma_LABEL_PPTP' => 'Antall PPTP klienter',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP porter for sikker shell tilgang',
|
||||
'rma_LABEL_SSH' => 'Sikker shell tilgang',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Tillat administrativ kommandolinje tilgang over sikker shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Tillat sikker shell tilgang ved å bruke standard passord',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Sikker Shell Innstillinger</h2>Du kan kontrollere Sikker Shell tilgang til serveren. Offentlig innstilling bør bare brukes av erfarne administratorer for fjern problem diagnostisering og løsning. Vi anbefaler å la denne innstillingen stå på "Ingen tilgang" med mindre du har en spesifikk grunn til å gjøre annet. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Innstillinger</h2> du kan også kontrollere <b>FTP</b> tilgang til serveren. Vi anbefaler å la denne innstillingen til \'ingen tilgang\' med mindre du har spesifikke grunner til å gjøre annet. <p> Merk: disse innstillingene begrenser tilgangen til serveren og overstyrer andre innstillinger, inkludert de for individuell informasjon bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Du kan også kontrollere autentisert FTP tilgang til informasjon bays og brukerkontoer. Vi anbefaler på det sterkeste å la disse innstillingene stå til privat med mindre du har spesifikke grunner til å gjøre noe annet. <p> Merk: en sikker shell sftp klient kan også brukes for tilgang til serveren, hvis fjerntilgang via sikker shell er på. Denne tilgangs metoden beskytter passordene og dataene i FTP sessjonen, hvor standard FTP ikke gir noen beskyttelse.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP Innstillinger</h2> Du kan tillate PPTP tilgang til serveren. Du bør la denne muligheten være av ved å sette verdien til 0 med mindre det kreves PPTP tilgang. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Verdien må være null eller et positivt heltall',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Fjern administrasjon',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Det er mulig å tillate maskiner på fjerne nettverk å få tilgang til server manager ved å skrive inn nettverkene her. Bruk en subnett maske på 255.255.255.255 for å begrense tilgangen til en spesifikk maskin. Enhver maskin innenfor det spesifiserte område vil ha tilgang til server manager ved å bruke HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'For å legge til et nytt fjern administrasjonsnettverk, skriver du inn detaljene nedenfor.',
|
||||
'rma_SUBNET_MASK' => 'Subnett maske',
|
||||
'rma_NUM_OF_HOSTS' => 'Antall maskiner',
|
||||
'rma_NO_ENTRIES_YET' => 'Det er ingen lagt til enda',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Ugyldig lokal subnettmaske',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Du må enten oppgi både nettverk og subnett maske, eller la begge feltene stå tomme.',
|
||||
'rma_ERR_NO_RECORD' => 'Ikke mulig å finne httpd-admin oppføring i oppsettsdatabasen',
|
||||
'rma_Remote access' => 'Fjernadministrasjon',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Seriell konsoll',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Seriell konsoll</h2> Du kan tillate tilgang til server console fra en terminal koblet til en serieport.',
|
||||
'rma_PORT1_ENABLED' => 'Slått på på serieport 1',
|
||||
'rma_PORT2_ENABLED' => 'Slått på på serieport 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP standard bruker tilgang',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet Innstillinger</h2> ADVARSEL: Telnet er mulig, men denne muligheten er ikke lenger støttet. Telnet er usikkert og bør bare brukes under omstendigheter hvor ingen andre muligheter finnes. Du bør endre dette til {$NO_ACCESS} og bruke sikkert shell hvis fjerntilgang er påkrevd. Når dette blir slått av, vil ikke lenger telnet vises på denne skjermen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) Innstillinger</h2> Du kan tillate IPSEC klient tilgang til serveren, autentisert av digitale sertifikater. Du bør la denne være slått av ved å sette den til 0 med mindre det kreves IPSEC klient tilgang. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Antall IPSEC klienter',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Hvis du øpnsker å nullstille alle digitale sertifikater, kan du gjøre det her.<br>Ett hvert gammelt sertifikat vil ikke lenger autentisere mot serveren, så <b><i>alle IPSEC klienter vil trenge å importere et nytt sertifikat!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Nulstill digitale sertifikater',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Wijzig de instellingen van toegang op afstand',
|
||||
'rma_DESCRIPTION' => 'Voor elk van de opties hieronder, laat de privé toegang toe zodat iedereen vanaf het lokale netwerk toegang heeft tot uw server. De publieke toegang laat toegang toe van overal op het internet. De geen toegang schakelt toegang uit. U dient de sectie over toegang op afstand in de gebruikershandleiding te lezen om goed de veiligheidsimplicaties te kunnen begrijpen van deze opties.',
|
||||
'rma_SUCCESS' => 'De nieuwe toegang op afstand instellingen zijn opgeslagen.',
|
||||
'rma_NO_ACCESS' => 'Geen toegang',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Alleen wachtwoorden accepteren vanaf lokale netwerken',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Wachtwoorden accepteren vanaf overal',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet toegang',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP toegang',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP wachtwoord toegang',
|
||||
'rma_LABEL_PPTP' => 'Aantal PPTP clienten',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'Het ingestelde aantal PPTP toegangen is meer dan het aantal gereserveerde IP adressen van DHCP. Neem een kleiner aantal.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP poort voor beveiligde shell toegang',
|
||||
'rma_LABEL_SSH' => 'Beveiligde shell toegang',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Administratieve commandoregel toestaan via beveiligde shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Beveiligde shell toegang via standaard wachtwoorden toestaan',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/><h2>Beveiligde shell instellingen</h2>U kunt de beveiligde shell toegang tot uw server beheren. Publieke toegang mag alleen door ervaren systeembeheerders worden ingeschakeld voor probleemoplossingen op afstand. We raden aan om deze instelling op "Geen toegang" te laten staan tenzij u een specifieke reden hebt om dit te niet te doen. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP instellingen</h2> U kunt de <b>FTP</b> toegang tot uw server beheren. Wij raden u aan deze instellingen op \'Geen toegang\' te laten staan tenzij u een specifieke reden hebt om dit niet te doen. <p> Merk op dat deze instellingen de toegang tot de server beperken en andere instellingen overschrijven, inclusief deze voor afzonderlijke informatie-baaien.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' U kan ook de geauthenticeerde FTP toegang tot informatie-baaien en gebruikersaccounts beheren. We raden u sterk aan om deze instelling op "privé" te laten staan tenzij u een specifieke reden hebt om dit niet te doen. <p> Merk op dat u ook een beveiligde shell SFTP client kan gebruiken indien de toegang op afstand is ingeschakeld. Deze methode beveiligd de wachwoorden en gegevens van de FTP sessie, waar dit bij een standaard FTP sessie niet het geval is.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP instellingen</h2> U kunt via PPTP toegang tot uw server verlenen. Tenzij u PPTP toegang nodig heeft, laat u deze optie het beste uitgeschakeld door als waarde het getal 0 in te geven. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Waarde moet nul zijn of een positief geheel getal',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Beheer op afstand',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar"/><h2>{$REMOTE_MANAGEMENT}</h2> <p>De mogelijkheid bestaat om hosts op een extern netwerk toegang te geven tot de Server Manager door deze netwerken hier in te geven. Gebruik het subnet masker 255.255.255.255 om de toegang te beperken tot de gespecificeerde host. Elke host binnen het opgegeven bereik zal via HTTPS toegang kunnen verkrijgen tot de Server Manager.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Voer hieronder de details in van een nieuw op afstand beheer netwerk.',
|
||||
'rma_SUBNET_MASK' => 'Subnet masker',
|
||||
'rma_NUM_OF_HOSTS' => 'Aantal hosts',
|
||||
'rma_NO_ENTRIES_YET' => 'Er zijn nog geen gegevens',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Ongeldig subnet masker',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Geef zowel een netwerk als een subnet masker op of laat beide velden leeg.',
|
||||
'rma_ERR_NO_RECORD' => 'Kan het httpd-admin record niet vinden in de configuratie database',
|
||||
'Remote access' => 'Toegang op afstand',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Seriële console',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Seriële console</h2> U kunt toegang verlenen tot de server console vanaf een terminal die is aangesloten op een seriële poort van de server.',
|
||||
'rma_PORT1_ENABLED' => 'Geactiveerd op seriële poort 1',
|
||||
'rma_PORT2_ENABLED' => 'Geactiveerd op seriële poort 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Standaard PPTP gebruikerstoegang',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar"/><h2>Telnet instellingen</h2> WAARSCHUWING: Telnet is momenteel ingeschakeld, maar deze optie wordt niet langer ondersteund. Telnet is onveilig en mag alleen worden gebruikt indien er praktisch gezien geen alternatieven bestaan. Het is aan te raden de optie te wijzigen in {$NO_ACCESS} en gebruik te maken van beveiligde shell indien toegang op afstand noodzakelijk is. Eenmaal uitgeschakeld, zal telnet niet meer op dit scherm verschijnen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) instellingen</h2> U kunt IPSEC toegang tot uw server verlenen aan clienten, geauthenticeerd met digitale certificaten. Tenzij u IPSEC toegang nodig hebt, laat u deze optie uitgeschakeld door als waarde het getal 0 op te geven. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Aantal IPSEC clienten',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Indien u alle digitale certificaten opnieuw wenst in te stellen dan kunt u dat hier doen. <br>Alle oude certificaten zullen niet langer geauthenticeerd worden door deze server. Dus <b><i>alle IPSEC clienten zullen een nieuw certificaat moeten importeren!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Digitale certificaten opnieuw instellen',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Change remote access settings',
|
||||
'rma_DESCRIPTION' => 'For each of the options below, the private setting allows anyone from your local network to access your server. The public setting allows access from anywhere on the Internet. The no access setting disables access. To understand the security implications of changing these options from the default settings, you should read the user\'s guide section on remote access.',
|
||||
'rma_SUCCESS' => 'The new remote access settings have been saved.',
|
||||
'rma_NO_ACCESS' => 'No Access',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Accept passwords only from local networks',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Accept passwords from anywhere',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet access',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP access',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP password access',
|
||||
'rma_LABEL_PPTP' => 'Number of PPTP clients',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP Port for secure shell access',
|
||||
'rma_LABEL_SSH' => 'Secure shell access',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Allow administrative command line access over secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Allow secure shell access using standard passwords',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Secure Shell Settings</h2>You can control Secure Shell access to your server. The public setting should only be enabled by experienced administrators for remote problem diagnosis and resolution. We recommend leaving this parameter set to "No Access" unless you have a specific reason to do otherwise. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Settings</h2> You can also control <b>FTP</b> access to your server. We recommend leaving this parameter set to \'no access\' unless you have a specific reason to do otherwise. <p> Note: these settings limit access to the server and override other settings, including those for individual information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' You can also control authenticated FTP access to information bays and user accounts. We strongly recommend leaving this parameter set to private unless you have a specific reason to do otherwise. <p> Note: a secure shell sftp client can also be used to access the server, if remote access via the secure shell is enabled. This method of access protects the passwords and data of the FTP session, whereas standard FTP provides no protection.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>Ustawienia PPTP</h2> Możesz zezwolić na dostęp do sieci poprzez PPTP. Powinieneś zostawić wyłączoną usługę, poprzez ustawienie tej wielkości na 0, chyba że potrzebujesz dostępu poprzez PPTP. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Wartość musi być większa lub równa zeru',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Zdalne zarządzanie',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Możliwe jest, aby zezwolić hostom w sieci zdalnej do dostępu do menedżera serwera poprzez wpisanie tutaj tych sieci. Użyj maski od 255.255.255.255, aby ograniczyć dostęp do poszczególnych hostów. Wszystkie hosty mieszczące się w randze, będą miały dostęp do menedżera serwera poprzez protokół HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Aby dodać nową zdalnie zarządzaną siecią, wpisz szczegóły sieci poniżej.',
|
||||
'rma_SUBNET_MASK' => 'Maska podsieci',
|
||||
'rma_NUM_OF_HOSTS' => 'Liczba hostów',
|
||||
'rma_NO_ENTRIES_YET' => 'Tutaj nie ma jeszcze wpisów',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Nieprawidłowa maska podsieci',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Either provide both a network and subnet mask, or leave both fields blank.',
|
||||
'rma_ERR_NO_RECORD' => 'Unable to locate httpd-admin record in configuration db',
|
||||
'rma_Remote access' => 'Remote access',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Serial console',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Serial console</h2> You can allow access to the server console from a terminal connected to a server serial port.',
|
||||
'rma_PORT1_ENABLED' => 'Enabled on serial port 1',
|
||||
'rma_PORT2_ENABLED' => 'Enabled on serial port 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP default user access',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet Settings</h2> WARNING: Telnet is currently enabled, but this feature is no longer supported. Telnet is inherently insecure and should only be used in circumstances where no practical alternative exists. You should change option to {$NO_ACCESS} and use secure shell if remote access is required. Once disabled, telnet will no longer appear on this screen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) Settings</h2> You can allow IPSEC client access to your server, authenticated by digital certificates. You should leave this feature disabled by setting the value to the number 0 unless you require IPSEC client access. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Number of IPSEC clients',
|
||||
'rma_DESC_IPSECRW_RESET' => 'If you wish to reset all digital certificates, you can do so here.<br>Any old certificates will no longer authenticate against the server, so <b><i>all IPSEC clients will need to import a new certificate!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Reset digital certificates',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Trocar configuração de acesso remoto',
|
||||
'rma_DESCRIPTION' => 'Para cada uma das opções abaixo, a configuração privada permite qualquer um de sua rede local acessar seu servidor. O modo público permite acesso de qualquer ponto da Internet. O modo sem acesso desabilita o acesso. Para entender as implicações de segurança na troca de configuração dessas opções padrão, você deverá ler no guia do usuário a seção sobre acesso remoto.',
|
||||
'rma_SUCCESS' => 'A nova configuração de acesso remoto foi salva.',
|
||||
'rma_NO_ACCESS' => 'Sem Acesso',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Aceitar senhas apenas da rede local',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Aceitar senhas de qualquer lugar',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Acesso telnet',
|
||||
'rma_LABEL_FTP_ACCESS' => 'Acesso FTP',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Senha de acesso FTP',
|
||||
'rma_LABEL_PPTP' => 'Número de clientes PPTP',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'O número de clientes PPTP é maior do que o número de IPs reservados para DHCP. Você precisa escolher um número menor.',
|
||||
'rma_LABEL_SSH_PORT' => 'Porta TCP para acesso via shell segura',
|
||||
'rma_LABEL_SSH' => 'Acesso shell seguro',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Permite acesso a linhas de comando administrativa sobre shell segura',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Permite acesso seguro ao shell usando senhas padrão',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/><h2>Configuração de shell segura</h2>Você pode controlar acesso ao Shell Seguro para seu servidor. A configuração pública deve somente ser habilitada por administradores experientes para resolução e diagnóstico de problemas. Nós recomendamos deixar este parâmetro configurado para "Sem Acesso" a não ser que você tenha uma razão específica para fazer o contrário. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar"/><h2>Configurar FTP</h2> Você também pode controlar o acesso <b>FTP</b> para o seu servidor. Nós recomendamos deixar esse parâmetro configurado para \'sem acesso\' a não ser que você tenha uma razão específica para fazer o contrário. <p> Nota: essas configurações limitam o acesso ao servidor e sobrepõem-se outras configurações, incluindo aquelas para compartilhamentos individuais.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Você também pode controlar autenticação de acesso FTP para compartilhamentos e conta de usuários. Nós recomendamos fortemente deixar esses parâmetros configurados para privados, a não ser que exista uma razão específica para fazer o contrário. <p> Nota: o cliente de shell segura sftp também pode ser usado para acessar o servidor, se o acesso remoto via shell seguro estiver habilitado. Este método de acesso protege a senha e os dados da seção FTP, ao passo que FTP padrão não suporta nenhuma proteção.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar"/><h2>Configurar PPTP</h2> Você pode habilitar acesso PPTP ao seu servidor. Você dev eria deixar esta configuração desabilitada entrando o número 0 (zero) a não ser que precise de acesso PPPT. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Valor deve ser 0 (zero) ou um número inteiro positivo',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Gerenciamento Remoto',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar"/><h2>{$REMOTE_MANAGEMENT}</h2> <p>É possível permitir que hosts em uma rede remota acessem o gerenciador do servidor entrando essas redes aqui. Use uma máscara de subrede de 255.255.255.255 para limitar o acesso a um determinado host. Qualquer host dentro da faixa especificada estará habilitado a acessar o gerenciador do servidor usando HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Para adicionar uma nova rede de gerenciamento remoto, entre com os detalhes abaixo.',
|
||||
'rma_SUBNET_MASK' => 'Máscara de subrede',
|
||||
'rma_NUM_OF_HOSTS' => 'Número de hosts',
|
||||
'rma_NO_ENTRIES_YET' => 'Não existe entradas ainda',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Máscara de subrede inválida',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Escolha entre fornecer ambos, uma rede e máscara de subrede, ou deixar ambos os campos em branco.',
|
||||
'rma_ERR_NO_RECORD' => 'Incapaz de localizar registro httpd-admin na configuração do banco de dados',
|
||||
'rma_Remote access' => 'Acesso remoto',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Console serial',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar"/><h2>Console serial</h2> Você pode permitir o acesso ao console do servidor de um terminal conectado a porta serial.',
|
||||
'rma_PORT1_ENABLED' => 'Habilitar na porta serial 1',
|
||||
'rma_PORT2_ENABLED' => 'Habilitar na porta serial 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Acesso padrão de usuário PPTP',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar"/><h2>Configuração telnet</h2> AVISO: Telnet está atualmente habilitado, mas esta opção não é mais suportada. Telnet é inerentemente inseguro e somente deve ser usado numa circunstância onde uma prática alternativa não exista. Você deve trocar essa opção para {$NO_ACCESS} e usar shell segura se acesso remoto for necessário. Uma vez desabilitada, telnet não mais aparecerá nessa tela. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>Configuração Clientes IPSEC(Roadwarrior)</h2> Você pode permitir acesso de clientes IPSEC para o seu servidor, autenticado por certificado digital. Você deve deixar esta opção desabilitada configurando o valor numérico para 0 (zero) a não ser que deseje acesso de clientes IPSEC. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Número de clientes IPSEC',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Se você deseja apagar todos os certificados digitais, você pode fazê-lo aqui.<br>Qualquer certificado antigo não funcionará mais para este servidor, então <b><i>todos os clientes IPSEC terão que importar um novo certificado!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Apagar certificados digitais',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Trocar configuração de acesso remoto',
|
||||
'rma_DESCRIPTION' => 'Para cada uma das opções abaixo, a configuração privada permite qualquer um de sua rede local acessar seu servidor. O modo público permite acesso de qualquer ponto da Internet. O modo acesso negado desabilita o acesso. Para entender as implicações de segurança na troca de configuração dessas opções padrão, voce deverá ler no guia do usuário a seção sbre acesso remoto.',
|
||||
'rma_SUCCESS' => 'A nova configuração de acesso remoto foi salva.',
|
||||
'rma_NO_ACCESS' => 'Acesso negado',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Aceitar senhas apenas da rede local',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Aceitar senhas de qualquer lugar',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Acesso telnet',
|
||||
'rma_LABEL_FTP_ACCESS' => 'Acesso FTP',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Senha de acesso FTP',
|
||||
'rma_LABEL_PPTP' => 'Número de clientes PPTP',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'Porta TCP para acesso via shell segura',
|
||||
'rma_LABEL_SSH' => 'Acesso seguro shell',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Permite acesso a linhas de comando administrativos sobre shell segura',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Permite acesso seguro ao shell usando senhas padrão',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/><h2>Configuração de shell segura</h2>Você pode controlar acesso ao Shell Seguro para seu servidor. A configuração pública deve somente ser habilitada por administradores experientes para resolução e diagnóstico de problemas. Nós recomendamos deixar este parâmetro configurado para "Acesso negado" a não ser que voce tenha uma razão específica para fazer o contrário. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar"/><h2>Configurar FTP</h2> Você pode também controlar o acesso <b>FTP</b> para o seu servidor. Nós recomendamos deixar esse parâmetro configurado para \'acesso negado\' a não ser que você tenha uma razão específica para fazer o contrário. <p> Nota: essas configurações limitam o acesso ao servidor e sobrepõem-se outras configurações, incluindo aquelas para compartilhamentos individuais.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Você também pode controlar autenticação de acesso FTP para compartilhamentos e conta de usuários. Nós recomendamos fortementedeixar esses parametros configurados para privados, a não ser que exista uma razão específica para fazer o contrário. <p> Nota: o cliente de shell segura sftp também pode ser usado para acessar o servidor, se o acesso remoto via shell segura estiver habilitado. Este método de acesso protege a senha e os dados da seção FTP, ao passo que FTP padrão não suporta nenhuma proteção.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar"/><h2>Configurar PPTP</h2> Você pode habilitar acesso PPTP ao seu servidor. Você deve deixar este configuração desabilitada entrando com o número 0 (zero) a não ser que precise de acesso PPPT. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Valor tem que ser 0 ou um inteiro positivo',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Gerenciamento remoto',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar"/><h2>{$REMOTE_MANAGEMENT}</h2> <p>É possível permitir que hosts em uma rede remota acessem o gerenciador do servidor entrando essas redes aqui. Use uma máscara de subrede de 255.255.255.255 para limitar o acesso a um determinado host. Qualquer host dentro da faixa especificada estará habilitado a acessar o gerenciador do servidor usando HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Para adicionar um novo gerenciador remoto da rede, entre com os detalhes abaixo.',
|
||||
'rma_SUBNET_MASK' => 'Máscara de subrede',
|
||||
'rma_NUM_OF_HOSTS' => 'Número de hosts',
|
||||
'rma_NO_ENTRIES_YET' => 'Não existe entradas ainda',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Máscara de subrede inválida',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Escolha entre fornecer ambos, uma rede e máscara de subrede, ou deixar ambos os campos em branco.',
|
||||
'rma_ERR_NO_RECORD' => 'Incapaz de localizar registro httpd-admin na configuração do banco de dados',
|
||||
'rma_Remote access' => 'Acesso remoto',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Console serial',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar"/><h2>Console serial</h2> Você pode permitir o acesso ao console do servidor de um terminal conectado a porta serial.',
|
||||
'rma_PORT1_ENABLED' => 'Habilitar na porta serial 1',
|
||||
'rma_PORT2_ENABLED' => 'Habilitar na porta serial 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'Acesso padrão de usuário PPTP',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar"/><h2>Configuraração telnet</h2> AVISO: Telnet está atualmente habilitada, mas esta opção não é mas suportada. Telnet é inerentemente insegura e somente deve ser usada numa circunstância onde uma prática alternativa não exista. Você deve trocar essa opção para {$NO_ACCESS} e usar shell segura se acesso remoto for necessário. Uma vez desabilitada, telnet não irá mais aparecer nessa tela. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>Configuração (Roadwarrior) Clientes IPSEC</h2> Você pode permitir acesso de clientes IPSEC para o seu servidor, autenticado por certificado digital. Você deve deixar esta opção desabilitada configurando o valor numérico para 0 a não ser que voce deseje acesso de clientes IPSEC. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Número de clientes IPSEC',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Se voce deseja apagar todos os certificados digitais, você pode fazê-lo aqui.<br>Qualquer certificado antigo não mais funcionará mais para este servidor, então <b><i>todos os clientes IPSEC terão que importar um novo certificado!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Apagar certificados digitais',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Change remote access settings',
|
||||
'rma_DESCRIPTION' => 'For each of the options below, the private setting allows anyone from your local network to access your server. The public setting allows access from anywhere on the Internet. The no access setting disables access. To understand the security implications of changing these options from the default settings, you should read the user\'s guide section on remote access.',
|
||||
'rma_SUCCESS' => 'The new remote access settings have been saved.',
|
||||
'rma_NO_ACCESS' => 'No Access',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Accept passwords only from local networks',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Accept passwords from anywhere',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet access',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP access',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP password access',
|
||||
'rma_LABEL_PPTP' => 'Number of PPTP clients',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP Port for secure shell access',
|
||||
'rma_LABEL_SSH' => 'Secure shell access',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Allow administrative command line access over secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Allow secure shell access using standard passwords',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Secure Shell Settings</h2>You can control Secure Shell access to your server. The public setting should only be enabled by experienced administrators for remote problem diagnosis and resolution. We recommend leaving this parameter set to "No Access" unless you have a specific reason to do otherwise. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Settings</h2> You can also control <b>FTP</b> access to your server. We recommend leaving this parameter set to \'no access\' unless you have a specific reason to do otherwise. <p> Note: these settings limit access to the server and override other settings, including those for individual information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' You can also control authenticated FTP access to information bays and user accounts. We strongly recommend leaving this parameter set to private unless you have a specific reason to do otherwise. <p> Note: a secure shell sftp client can also be used to access the server, if remote access via the secure shell is enabled. This method of access protects the passwords and data of the FTP session, whereas standard FTP provides no protection.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP Settings</h2> You can allow PPTP access to your server. You should leave this feature disabled by setting the value to the number 0 unless you require PPTP access. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Value must be zero or a positive integer',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Remote Management',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>It is possible to allow hosts on remote networks to access the server manager by entering those networks here. Use a subnet mask of 255.255.255.255 to limit the access to the specified host. Any hosts within the specified range will be able to access the server manager using HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'To add a new remote management network, enter the details below.',
|
||||
'rma_SUBNET_MASK' => 'Subnet mask',
|
||||
'rma_NUM_OF_HOSTS' => 'Number of hosts',
|
||||
'rma_NO_ENTRIES_YET' => 'There are no entries yet',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Invalid subnet mask',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Either provide both a network and subnet mask, or leave both fields blank.',
|
||||
'rma_ERR_NO_RECORD' => 'Unable to locate httpd-admin record in configuration db',
|
||||
'rma_Remote access' => 'Remote access',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Serial console',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Serial console</h2> You can allow access to the server console from a terminal connected to a server serial port.',
|
||||
'rma_PORT1_ENABLED' => 'Enabled on serial port 1',
|
||||
'rma_PORT2_ENABLED' => 'Enabled on serial port 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP default user access',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet Settings</h2> WARNING: Telnet is currently enabled, but this feature is no longer supported. Telnet is inherently insecure and should only be used in circumstances where no practical alternative exists. You should change option to {$NO_ACCESS} and use secure shell if remote access is required. Once disabled, telnet will no longer appear on this screen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) Settings</h2> You can allow IPSEC client access to your server, authenticated by digital certificates. You should leave this feature disabled by setting the value to the number 0 unless you require IPSEC client access. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Number of IPSEC clients',
|
||||
'rma_DESC_IPSECRW_RESET' => 'If you wish to reset all digital certificates, you can do so here.<br>Any old certificates will no longer authenticate against the server, so <b><i>all IPSEC clients will need to import a new certificate!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Reset digital certificates',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Изменить настройки удалённого доступа',
|
||||
'rma_DESCRIPTION' => 'For each of the options below, the private setting allows anyone from your local network to access your server. The public setting allows access from anywhere on the Internet. The no access setting disables access. To understand the security implications of changing these options from the default settings, you should read the user\'s guide section on remote access.',
|
||||
'rma_SUCCESS' => 'Новые настройки удалённого доступа были сохранены.',
|
||||
'rma_NO_ACCESS' => 'Нет доступа',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Принимать пароли только из локальных сетей',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Принимать пароли отовсюду',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet доступ',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP доступ',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Парольный доступ к FTP',
|
||||
'rma_LABEL_PPTP' => 'Число PPTP клиентов',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'Порт TCP для SSH доступа',
|
||||
'rma_LABEL_SSH' => 'SSH доступ',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Разрешить доступ к административной командной строке через SSH',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Разрешить SSH доступ с использованием стандартных паролей',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Secure Shell Settings</h2>You can control Secure Shell access to your server. The public setting should only be enabled by experienced administrators for remote problem diagnosis and resolution. We recommend leaving this parameter set to "No Access" unless you have a specific reason to do otherwise. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Settings</h2> You can also control <b>FTP</b> access to your server. We recommend leaving this parameter set to \'no access\' unless you have a specific reason to do otherwise. <p> Note: these settings limit access to the server and override other settings, including those for individual information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' You can also control authenticated FTP access to information bays and user accounts. We strongly recommend leaving this parameter set to private unless you have a specific reason to do otherwise. <p> Note: a secure shell sftp client can also be used to access the server, if remote access via the secure shell is enabled. This method of access protects the passwords and data of the FTP session, whereas standard FTP provides no protection.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>Настройки PPTP</h2> Вы можете разрешить PPTP доступ к вашему серверу. Вам следует оставить эту функцию отключённой, установив значение равным 0, пока вам не потребуется PPTP доступ.',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Значение должно быть нулевым или положительным целым числом',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Удаленное управление',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Возможно разрешить узлам удаленной сети доступ управлению сервером путем ввода этих сетей здесь. Используйте маску подсети 255.255.255.255, чтобы ограничить доступ указанным узлом. Любой узел, в пределах указанного диапазона будет иметь доступ к управлению сервером, используя HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Чтобы добавить новую сеть удалённого управления, введите параметры ниже.',
|
||||
'rma_SUBNET_MASK' => 'Маска подсети',
|
||||
'rma_NUM_OF_HOSTS' => 'Число узлов',
|
||||
'rma_NO_ENTRIES_YET' => 'Нет записей',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Неверная маска подсети',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Введите сеть и маску подсети, либо оставьте оба поля пустыми.',
|
||||
'rma_ERR_NO_RECORD' => 'Невозможно обнаружить запись httpd-admin в БД конфигурации',
|
||||
'rma_Remote access' => 'Удалённый доступ',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Последовательная консоль',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Последовательная консоль</h2> Вы можете разрешить доступ к консоли сервера с терминала подключённого к последовательному порту сервера.',
|
||||
'rma_PORT1_ENABLED' => 'Доступно на последовательном порту 1',
|
||||
'rma_PORT2_ENABLED' => 'Доступно на последовательном порту 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP доступ пользователя по умолчанию',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Настройки Telnet</h2> ВНИМАНИЕ: Telnet включён, но эта функция больше не поддерживается. Telnet является небезопасным и по своей сути должен быть использован только в тех случаях, когда нет практической альтернативы. Вы должны изменить параметр на {$NO_ACCESS} и использовать SSH, если требуется удаленный доступ. После отключения, Telnet больше не будет появляться на этом экране. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>Настройки IPSEC клиента (Roadwarrior)</h2> Вы можете разрешить клиентский IPSEC доступ к вашему серверу, с входом по цифровыми сертификатами. Вы должны оставить эту функцию отключённой, установив значение равным 0, пока вам не требуется клиентский IPSEC доступ. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Число IPSEC клиентов',
|
||||
'rma_DESC_IPSECRW_RESET' => 'If you wish to reset all digital certificates, you can do so here.<br>Any old certificates will no longer authenticate against the server, so <b><i>all IPSEC clients will need to import a new certificate!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Сбросить цифровые сертификаты',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Spremeni dostop na daljavo',
|
||||
'rma_DESCRIPTION' => 'Vse spodnje opcije omogocajo lokalni dostop do streznika iz lokalnega omrezja. Javni dostop omogoca dostop iz celega interneta. Opcija "NE" onemogoca dostop. Za razumevanje zapletenosti varnostnih nastavitev in spreminjanje le teh iz osnovnih nastavitev, bi moral prebrati uporabniski prirocnik (user\'s guide) za oddaljen dostop.',
|
||||
'rma_SUCCESS' => 'Nove nastavitve dostopa na daljavo so bile shranjene.',
|
||||
'rma_NO_ACCESS' => 'Ni dostopa',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Sprejmi geslo samo z lokalnega omrezja',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Sprejmi geslo od kjerkoli',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet dostop',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP dostop',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP geslo dostop',
|
||||
'rma_LABEL_PPTP' => 'Stevilo PPTP klientov',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP Port for secure shell access',
|
||||
'rma_LABEL_SSH' => 'Varni shell dostop',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Dovoli administrativni command line dostop preko varne shell povezave',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Dovoli varen shell dostop z uporabo standardnega gesla',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/><h2>Varnostne nastavitve lupine Shell</h2> Tu lahko nastavis Varnostne Nastavitve Lupine Shell za dostop do streznika. Javni dostop naj bi bil izbran samo za zelo izkusene Administratorje za resevanje tezav na daljavo. Priporocam ti, da pustis to opcijo nastavljeno na "ni dostopa", razen ce imas tehten razlog za spremembo. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar"/><h2>FTP Nastavitve</h2> Nastavis lahko tudi <b>FTP</b> dostop do streznika. Predlagam ti, da pustis ta parameter nastavljen na "Ni dostopa" razen ce imas tehten razlog, da to spremenis. <p> Pozor: Ta nastavitev omeji dostop do streznika in prepise vse nastavitve vkljucno z individualnimi v information bays. </p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Lahko tudi controliras identifikacijo za dostop do informations bays in uporabniskih racunov. Mocno ti priporocam, da pustis te parametre take kot so razen ce imas tehten razlog, da to spremenis. <p> Pozor: Lahko uporabis tudi Varni Dostop do <b>sFTP</b>, ce je omogocen Varni Dostop. Ta nacin dostopa zasciti geslo in podatke v FTP seji, kar standarden dostop ne omogoca..</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar"/><h2>PPTP Nastavitve</h2> Tu lahko omogocis PPTP dostop do streznika. To opcijo pusti onemogoceno z vneseno stevilko "0" razen, ce potrbujes PPTP dostop. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Vrednost mora biti nic (0) ali pozitivno stevilo',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Oddaljeno upravljanje',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar"/><h2>{$REMOTE_MANAGEMENT}</h2> <p>Tu je mozno dolociti oddaljeno omrezje za dostop do Upravljalca Streznika (server-manager). Uporabi masko podomrezja 255.255.255.255, da omogocis dostop samo izbranemu gostitelju (host-u). Vsak gostitelj v izbranem obmocju bo imel dostop do Upravljalca Streznika preko <b>HTTPS</b> povezave..</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Za dodajanje oddaljenega omrezja vnesi spodnje podatke.',
|
||||
'rma_SUBNET_MASK' => 'Podomrezna maska',
|
||||
'rma_NUM_OF_HOSTS' => 'Stevilo gostiteljev (host)',
|
||||
'rma_NO_ENTRIES_YET' => 'Tukaj se ni vnosov',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Nepravilna podomrezna maska',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Vnesti moras tako omrezje kot masko podomrezja ali pa pusti obe polji prazni.',
|
||||
'rma_ERR_NO_RECORD' => 'Ne morem locirati httpd-admin zapisa v Konfiguracijski db',
|
||||
'rma_Remote access' => 'Oddaljen dostop',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Serijska konzola',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar"/><h2>Serijska konzola</h2> Tu lahko omogocis dostop do Konzole Streznika preko terminala, ki je prikljucen preko serijskega porta na strezniku..',
|
||||
'rma_PORT1_ENABLED' => 'Omogoci na serijskem portu 1',
|
||||
'rma_PORT2_ENABLED' => 'Omogoci na serijskem portu 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP osnovni dostop uporabnikov',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar"/><h2>Telnet nastavitve</h2> POZOR: Telnet dostop je trenutno omogocen. Toda ta opcija ni vec podprta. Telnet je izredno brez varnosti in naj bo uporabljen samo takrat, ko ni popolnoma nobene druge moznosti. Moral bi spremeniti v {$NO_ACCESS} in uporabiti Varen Dostop, ce potrebujes oddaljen dostop. Ko bo Telnet enkrat onemogocen se na ekranu ne bo vec pojavil ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Klient nastavitve</h2> Tu lahko omogocis certificiran dostop IPSEC Klientu do streznika z digitalnim potrdilom. To opcijo pusti onemogoceno z vredostjo stevilke "0" razen ce potrebujes IPSEC dostop za kliente. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Stevilo IPSEC klientov',
|
||||
'rma_DESC_IPSECRW_RESET' => ' Ce zelis resetirati vse digitalne certifikate, lahko to storis tukaj. <br> Vsi stari certifikati ne bodo vec veljavni na strezniku in bodo morali <b><i>vsi IPSEC klienti morali uvoziti nove certifikate!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Resetiraj digitalne certifikate',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Ändra inställningar för fjärråtkomst',
|
||||
'rma_DESCRIPTION' => 'För varje val nedan gäller att de privata inställningarna tillåter vem som helst från ditt lokala nätverk att få åtkomst till din server. De publika inställningarna tillåter åtkomst från vilken plats som helt på Internet. Inställningen ingen åtkomst ger ingen åtkomst. För att förstå säkerhetspåverkan av dessa val från den förvalda inställningen, bör du läsa användarmanualens kapitel om fjärråtkomst (remote access).',
|
||||
'rma_SUCCESS' => 'De nya inställningarna för fjärråtkomst har sparats.',
|
||||
'rma_NO_ACCESS' => 'Ingen åtkomst',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Acceptera lösenord endast från det lokala nätverket',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Acceptera lösenord från alla platser',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet åtkomst',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP åtkomst',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP åtkomst med lösenord',
|
||||
'rma_LABEL_PPTP' => 'Antal PPTP klienter',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP-port för secure shell åtkomst',
|
||||
'rma_LABEL_SSH' => 'Säker skalåtkomst',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Tillåt administrativa kommandon över säkert skal',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Tillåt säker skalåtkomst med standardlösenorden',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar"/><h2>Inställningar för säkert skal</h2>Du kan kontrollera åtkomsten via säkert skal till din server. Den publika inställningen bör endast tillåtas av erfarna administratörer för fjärrdiagnostik och för problemlösning. Vi rekommenderar att låta denna inställning vara "Ingen åtkomst" om du inte har ett speciellt skäl att göra annorlunda. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar"/><h2>FTP-inställningar</h2> Du kan också kontrollera <b>FTP</b>-åtkomsten till din server. Vi rekommenderar att du låter denna inställning vara \'ingen åtkomst\' om du inte har speciella skäl att göra annorlunda. <p> OBS: Dessa inställningar begränsar åtkomsten till servern och överrider andra inställningar, inklusive dem för information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' Du kan också kontrollera autenticieringen av FTP-åtkomst till information bays och användarkonton. Vi rekommenderar starkt att du ställer in denna parameter till privata om du inte har speciella skäl att göra annorlunda. <p> OBS: En klient för säkert skal sftp kan även användas för åtkomst till servern, om fjärråtkomst via säkert skal är tillåten. Denna metod för fjärråtkomst skyddar lösenorden och data vid FTP sessionen, där standard FTP inte ger något skydd.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar"/><h2>PPTP inställningar</h2> Du kan tillåta PPTP åtkomst till din server. Du bör ange denna inställning till Ej tillåten genom att ange värdet till 0 såvida du inte behöver PPTP åtkomst. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Värdet måste vara noll eller ett positivt heltal',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Fjärråtkomst',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar"/><h2>{$REMOTE_MANAGEMENT}</h2> <p>Det är möjligt att tillåta värdar på fjärrnätverk att komma åt serverhanteraren genom att ange de specifika nätverken här. Använd en subnätmask av formen 255.255.255.255 för att begränsa åtkomsten för en specik värd. Alla värdar inom det angivna intervallet kommer att få åtkomst till serverhanteraren genom att använda HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'För att lägga till en nytt nätverk för fjärrhantering, ange värden nedan.',
|
||||
'rma_SUBNET_MASK' => 'Subnätmask',
|
||||
'rma_NUM_OF_HOSTS' => 'Antal värdar',
|
||||
'rma_NO_ENTRIES_YET' => 'Det finns inga värden ännu',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Ogiltig subnätmask',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Antingen anger du både nätverk och subnätmask eller så lämnar du båda fälten tomma.',
|
||||
'rma_ERR_NO_RECORD' => 'Kan inte hitta httpd-admin posten i konfigurationsdatabasen',
|
||||
'rma_Remote access' => 'Fjärråtkomst',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Seriell konsol',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar"/><h2>Seriell konsol</h2> Du kan tillåta åtkomst till serverkonsolen från en terminal ansluten till serverns serieport.',
|
||||
'rma_PORT1_ENABLED' => 'Tillåten på serieport 1',
|
||||
'rma_PORT2_ENABLED' => 'Tillåten på serieport 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP förvald användaråtkomst',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar"/><h2>Telnet-inställningar</h2> Varning: Telnet är för tillfället tillåten, med denna möjlighet stöds inte längre. Telnet är osäker och skall endast användas i de fall då inga andra pratiska alternativ finns. Du bör ändra valet till {$NO_ACCESS} och använda säkert skal om fjärråtkomst krävs. När den inte längre är tillåten, kommer telnet inte att synas på denna skärm. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC.klient inställningar (Roadwarrior)</h2> Du kan tillåta åtkomst för IPSEC klient till din server, autenticierad av digitala certifikat. Du bör lämna detta val ej tillåtet genom att ange värdet till 0 om du inte har behov av åtkomst från en IPSEC-klient. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Antal IPSEC-klienter',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Om du önskar återställa alla digitala certifikat, kan du göra det här.<br>Alla gamla certifikat kommer inte längre att autenticieras mot denna server, därför behöver <b><i>alla IPSEC-klienter importera ett nytt certifikat!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Återställ digitala certifikat',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'แก้ไขการตั้งค่าremote access',
|
||||
'rma_DESCRIPTION' => 'การตั้งค่าเป็น private จะเปิดให้ทุกคนในเครือข่ายท้องถิ่นสามารถเข้าถึงเซิร์ฟเวอร์ได้ การตั้งเป็น public จะเปิดให้สามารถเข้าถึงได้จากอินเตอร์เน็ตตั้งเป็น no access จะเป็นการปิดไม่ให้เข้าถึงได้ โปรดทราบว่ามันจะมีผลกระทบต่อความปลอดภัยหากเปลี่ยนค่าไปจากค่าตั้งต้นที่ให้มา คุณควรศึกษาจากคู่มือผู้ใช้เรื่อง remote access ก่อนทำการแก้ไข',
|
||||
'rma_SUCCESS' => 'ข้อมูลใหม่ของการตั้งค่า remote access ถูกบันทึกแล้ว',
|
||||
'rma_NO_ACCESS' => 'ไม่เปิดให้เข้าถึง',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'เปิดรับเฉพาะจากเครือข่ายท้องถิ่นโดยใช้รหัสผ่าน',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'เปิดรับจากทุกที่โดยใช้รหัสผ่าน',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'การเข้าถึงผ่าน telnet',
|
||||
'rma_LABEL_FTP_ACCESS' => 'การเข้าถึงแบบ FTP',
|
||||
'rma_LABEL_FTP_LOGIN' => 'การเข้าถึงจาก FTP โดยใช้รหัสผ่าน',
|
||||
'rma_LABEL_PPTP' => 'ตัวเลขจำนวน PPTP clients',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'หมายเลขพอร์ท TCP ของการเข้าถึงแบบ secure shell ',
|
||||
'rma_LABEL_SSH' => 'เข้าถึงแบบ secure shell',
|
||||
'rma_LABEL_SSH_ADMIN' => 'อนุญาตให้ใช้คำสั่งจัดการระบบ (administrative command line) ผ่าน secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'อนุญาตให้เข้าถึง secure shell โดยใช้รหัสผ่านแบบ standard',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>ตั้งค่า Secure Shell</h2>คุณสามารถควบคุมการเข้าถึงแบบ ของเซิร์ฟเวอร์นี้ของคุณได้ การเปิดให้เข้าถึงแบบสาธารณะควรเปิดให้ใช้เฉพาะกับผู้ดูแลระบบที่มีความชำนาญ เพื่อใช้ในการตรวจสอบหาและแก้ไขความผิดปกติของระบบจากภายนอก เราแนะนำให้คุณปล่อยเป็น "No Access" เอาไว้ตามค่าตั้งต้น ยกเว้นหากคุณมีความประสงค์เป็นอย่างอื่น ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Settings</h2>คุณสามารถควบคุมการเข้าถึง<b>FTP</b> ของเซิร์ฟเวอร์นี้ของคุณ เราแนะนำให้ปล่อยค่าให้เป็น \'no access\' เอาไว้ยกเว้นหากคุณมีเหตุผลในการตั้งค่าเป็นอย่างอื่น <p> หมายเหตุ: การการตั้งค่าเหล่านี้จะเป็นการจำกัดการเข้าถึงเซิร์ฟเวอร์ และจะมีผลเหนือการตั้งค่าอื่นๆ รวมถึงค่าที่ตั้งไว้ของ information bays แต่ละตัวด้วย</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' คุณสามารถควบคุมการเข้าถึง authenticated FTP ของ information bays และบัญชีผู้ใช้ได้ เราแนะนำอย่างยิ่งว่าควรปล่อยการตั้งค่าให้เป็น private เอาไว้ ยกเว้นคุณมีเหตุผลอื่นที่จะใช้งาน<p>หมายเหตุ: เซิร์ฟเวอร์นี้สามารถทำการเข้าถึงแบบ secure shell sftp ได้หากเปิดใช้การเข้าถึงแบบ secure shell เอาไว้ การเข้าถึงแบบนี้จะช่วยปกป้องข้อมูลและรหัสผ่านที่ของคุณขณะทำการสื่อสารผ่านการเชื่อมต่อ FTP นั้นๆ ซึ่งจะไม่มีในการการสื่อสารผ่าน FTP แบบปกติ</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>ตั้งค่า PPTP</h2>คุณสามารถให้เข้าถึงเซิร์ฟเวอร์นี้ผ่าน PPTP ได้ กรอกตัวเลขจำนวนการเข้าถึงผ่าน PPTP สูงสุดที่ต้องการเปิดที่นี่ หรือกรอก 0 หากต้องการปิดการใช้งาน ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'ต้องเป็นตัวเลขเต็มบวก หรือ 0',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Remote Management',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>คุณสามารถเปิดให้โฮสต์จาก remote networks สามารถเข้าถึงเซิร์ฟเวอร์นี้ได้โดยกรอกข้อมูลเครือข่ายเหล่านั้นด้านล่าง Use a subnet mask of 255.255.255.255 to limit the access to the specified host. Any hosts within the specified range will be able to access the server manager using HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'กรอกข้อมูลด้านล่าง เพื่อเพิ่มข้อมูล remote management network',
|
||||
'rma_SUBNET_MASK' => 'Subnet mask',
|
||||
'rma_NUM_OF_HOSTS' => 'จำนวนของโฮสท์',
|
||||
'rma_NO_ENTRIES_YET' => 'ยังไม่มีการกรอกข้อมูล',
|
||||
'rma_INVALID_SUBNET_MASK' => 'subnet mask ไม่ถูกต้อง',
|
||||
'rma_ERR_INVALID_PARAMS' => 'กรอกทั้ง network และ subnet mask หรือไม่กรอกทั้งสอง',
|
||||
'rma_ERR_NO_RECORD' => 'ไม่พบข้อ httpd-admin recordใน configuration db',
|
||||
'rma_Remote access' => 'Remote access',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Serial console',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Serial console</h2>คุณสามารถเปิดใช้งาน server console จากเทอร์มินัลที่ต่อกับซีเรียลพอร์ตของเซิร์ฟเวอร์ได้',
|
||||
'rma_PORT1_ENABLED' => 'เปิดใช้ซีเรียลพอร์ต 1',
|
||||
'rma_PORT2_ENABLED' => 'เปิดใช้ซีเรียลพอร์ต 2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'ค่าเริ่มต้นของการเข้าถึง PPTP ของผู้ใช้',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>การตั้งค่า telnet</h2> คำเตือน: ขณะนี้การเข้าถึงแบบ telnet ถูกเปิดไว้ แต่คุณสมบัตินี้ไม่ได้รับการสนับสนุนให้ใช้แล้ว การเข้าถึงแบบ telnet มีความไม่ปลอดภัยในตัวของมันและควรถูกใช้ในกรณีที่ไม่ทางเลือกอื่นที่ดีกว่า คุณควรเลือกตั้งให้เป็น {$NO_ACCESS} และใช้งาน secure shell แทนหากจไเป็นต้องใช้การ remote access, Once disabled, telnet will no longer appear on this screen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>ตั้งค่า IPSEC Client (Roadwarrior)</h2> คุณสามารถเปิดให้ผู้ใช้เข้าถึงเซิร์ฟเวอร์นี้ของคุณผ่าน IPSEC client access ได้ โดยการตรวจสอบสิทธิ์จะกระทำผ่านใบรับรองดิจิตอล (digital certificates) การปิดการใช้งานนี้ทำได้โดยกรอกตัวเลขเป็น 0 ยกเว้นหาคุณมีความประสงค์ที่จะให้ใช้ IPSEC client access ',
|
||||
'rma_LABEL_IPSECRW_SESS' => ' ตัวเลขจำนวน IPSEC clients',
|
||||
'rma_DESC_IPSECRW_RESET' => ' คุณสามารถทำการรีเซ็ต ใบรับรองดิจิตอล (digital certificates) ได้ที่นี่<br>การรับรองอันเดิมทั้งหมดจะไม่สามารถใช้เพื่อเข้าถึงเซิรฟเวอร์นี้ได้อีกต่อไป ดังนั้น <b><i>เครื่อง IPSEC clients ทุกเครื่องต้องทำการนำเข้า (import) ใบรับรองอันใหม่!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'รีเซ็ตใบรับรองดิจิตอล (digital certificates)',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Uzaktan erişim ayarlarını değiştir',
|
||||
'rma_DESCRIPTION' => 'Aşağıdaki ayarlar, genel erişim ayarları herhangi bir kullanıcının yerel ağdan sunucunuza bağlanmasına olanak sağlar. Genel erişim ayarları herhengi bir ağdan ve internetten erişim sağlar. Erişim yok ayarı ise erişimie izin vermez. Varsayılan ayarları değiştirmenin güvenlik üzerinde etkilerini anlamak için, kullanıcı klavuzunun uzaktan erişim bölümünü okuyunuz.',
|
||||
'rma_SUCCESS' => 'Yeni uzaktan erişim ayarları kaydedildi.',
|
||||
'rma_NO_ACCESS' => 'Erişim yok',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Sadece yerel ağdan şifre girişlerini kabul et',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Her yerden şifre girişlerini kabul et',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet erişimi',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP erişimi',
|
||||
'rma_LABEL_FTP_LOGIN' => 'Şifreli FTP erişimi',
|
||||
'rma_LABEL_PPTP' => 'PPTP istemci sayısı',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'ssh erişimi için TCP Portu',
|
||||
'rma_LABEL_SSH' => 'ssh erişimi',
|
||||
'rma_LABEL_SSH_ADMIN' => 'ssh üzerinden yönetim komutlarını kabul et',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Standart şifreyle ssh üzerinden bağlanmaya izin ver',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>ssh Ayarları</h2>Sunucunuza ssh erişimini kontrol edebilirsiniz. Genel erişim sadece deneyimli yneticilerin sorun tespit ve çözümleri için aktifleştirilmelidir. Geçerli bir sebep yoksa "Erişim yok" olarak ayarlamanız önerilir. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Ayarları</h2> Sunucunuzun <b>FTP</b> erişimini kontrol edebilirsiniz. Bir zorunluluk olmadığı sürece \'erişim yok\' seçeneğini seçmenizi öneririz . <p> Not: bu ayarlar sunucu erişimini sınırlar ve diğer erişim ayarlarını etkiler, özgün i-bayları da kapsar.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => 'i-bay ve kullanıcı hesapları için yetkilendirilmiş FTP erişimini kontrol edebilirsiniz. Bir zorunluluk olmadığı sürece buradaki ayarları özel olarak seçmenizi öneririz. <p> Not: güvenli sftp kullanıcıları bu sunucuya erişebilir, eğer ssh erişimi etkinse. Bu yönetm FTP erişiminizin şifre ve verilerini korur, oysa standard FTP güvenlik sağlamaz.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP Ayarları</h2> Sunucunuza PPTP erişimine izin verebilirsiniz. Eğer PPTP erişimi vermek istemiyorsanız 0 değerini vermeniz yeterlidir. ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => 'Değer sıfır veya pozitif tam sayı olmalıdır',
|
||||
'rma_REMOTE_MANAGEMENT' => 'Uzaktan Yönetim',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>Uzaktaki bir sistemden, yönetim arabirime erişim izni verebilirsiniz. Alt ağ maskesi olarak 255.255.255.255 girin. HTTPS kullanarak belirtilen ağ aralığındaki herhangi bir sistemden erişim sağlanabilir.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => 'Uzaktan yönetim ağı tanımlamak için ayrıntıları aşağıya girin.',
|
||||
'rma_SUBNET_MASK' => 'Alt ağ maskesi',
|
||||
'rma_NUM_OF_HOSTS' => 'Etki alanı sayısı',
|
||||
'rma_NO_ENTRIES_YET' => 'Henüz bir giriş yok',
|
||||
'rma_INVALID_SUBNET_MASK' => 'Geçersiz alt ağ maskesi',
|
||||
'rma_ERR_INVALID_PARAMS' => 'Hem ağı hem de alt ağ maskesini girin, veya ikisini de boş bırakın.',
|
||||
'rma_ERR_NO_RECORD' => 'httpd-admin kayıtları ayar veritabanında bulunamadı',
|
||||
'rma_Remote access' => 'Uzaktan erişim',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => 'Konsol',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>Konsol</h2> Sunucuya seri porttan bağlı bir terminalden konsol erişimi verebilirsiniz.',
|
||||
'rma_PORT1_ENABLED' => '1 seri porttan erişimi etkin',
|
||||
'rma_PORT2_ENABLED' => '2 seri porttan erişimi etkin',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP varsayılan kullanıcı erişimi',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet Ayarları</h2> DİKKAT: Telnet erişimi etkin, fakat bu özellik artık kullanılmayacaktır. Telnet güvenli olmadığı için sadece başka bir alternatif bulunmadığında kullanılmalıdır. Seçimi {$NO_ACCESS} olarak değiştirip bağlantı için ssh kullanılmalıdır. Telnet inaktif edildiğinde, artık bu sayfa görünmeyecektir. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC İstemci (Roadwarrior) Ayarları</h2> IPSEC istemcilerin bu sunucuya erişimini aktifleştirebilirsiniz, girişler dijital sertifikalarla doğrulanır. IPSEC istemcilerinini erişimine izin vermek istemiyorsanız buradaki ayarı 0 yapmanız yeterlidir. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'IPSEC İstemci Sayısı',
|
||||
'rma_DESC_IPSECRW_RESET' => 'Bütün dijital sertifikaları sıfırlamak için, burayı kullanabilirsiniz.<br>Herhangi eski bir sertifikanın geçerliliği kalmayacaktır, <b><i>bütün IPSEC istemcileri yeni sertifikaları edinmelidir!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Dijital sertifikaları sıfırla',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => '变更远程访问设置',
|
||||
'rma_DESCRIPTION' => '对于下面的每一个选项,私有设置允许本地网络中的任何人访问服务器,开放设置允许因特网上的任何地方的任何人访问。无法访问设置则将禁止访问。要了解改变这些默认设置带来的安全隐患,您应该阅读用户手册的远程访问章节。',
|
||||
'rma_SUCCESS' => '远程访问设置已被保存。',
|
||||
'rma_NO_ACCESS' => '无法访问',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => '只接受来自本地网络的密码',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => '接受来自任何地方的密码',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet访问',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP访问',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP密码访问',
|
||||
'rma_LABEL_PPTP' => 'PPTP客户端数量',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'pptp客户端数量大于DHCP服务范围。您应该选择一个小点的数字。',
|
||||
'rma_LABEL_SSH_PORT' => 'SSH访问的TCP端口',
|
||||
'rma_LABEL_SSH' => 'SSH访问',
|
||||
'rma_LABEL_SSH_ADMIN' => '允许在命令行通过SSH访问',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => '允许SSH使用标准密码访问',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>SSH设置</h2>您可以控制服务器的SSH访问。为了进行远程故障诊断和解决,开放设置只应由有经验的管理员来启用。除非您有特别的理由,否则建议此处设置为"无法访问"。',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP设置</h2> 您可以控制服务器的 <b>FTP</b> 访问。 除非您有特别的理由,否则建议此处设置为"无法访问"。 <p> 注意: 此设置会限制访问服务器,同时会覆盖包括个人信息港的其他设置。</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' 您可以控制到信息港和用户账号的FTP验证访问。除非您有特别的理由,强烈建议此处设置为私有。<p> 注意:如果启用了远程的ssh访问,那么您可以使用ssh ftp 即sftp客户端来访问服务器。这种访问方式能为FTP会话的用户密码和传输的数据提供加密,然而标准的FTP不能提供。</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP设置</h2> 您可以允许PPTP访问服务器。除非您需要PPTP访问,否则请将其参数设置为0,禁用此功能。 ',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => '数值必须为零或一个正整数',
|
||||
'rma_REMOTE_MANAGEMENT' => '远程管理',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>在下面输入外部网络的主机IP,将允许这些主机远程访问server manager。使用子网掩码255.255.255.255以允许指定主机的访问。任何指定范围内的主机均通过使用HTTPS来访问server manager。</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => '要添加远程管理网络,请在下面输入。',
|
||||
'rma_SUBNET_MASK' => '子网掩码',
|
||||
'rma_NUM_OF_HOSTS' => '主机数量',
|
||||
'rma_NO_ENTRIES_YET' => '暂无项目。',
|
||||
'rma_INVALID_SUBNET_MASK' => '无效的子网掩码',
|
||||
'rma_ERR_INVALID_PARAMS' => '请同时添加网络和子网掩码,或者全部留空。',
|
||||
'rma_ERR_NO_RECORD' => '无法在配置数据库中找到httpd-admin记录',
|
||||
'rma_Remote access' => '远程访问',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => '串口控制台',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>串口控制台</h2> 您可以允许一个终端通过串口连接来访问系统控制台。',
|
||||
'rma_PORT1_ENABLED' => '在串口1启用',
|
||||
'rma_PORT2_ENABLED' => '串口2启用',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP默认用户访问',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet设置</h2> 警告: Telnet当前被启用,但此特性已不被支持了。Telnet本来就是不安全的,仅仅在没有可替代方案的情况下使用。您应该设置为 {$NO_ACCESS} ,如果远程需要访问,请使用SSH。一旦禁用,telnet将不会在屏幕上出现。 ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC客户端设置</h2> 通过数字证书验证的方式,可以允许IPSEC客户端访问服务器。 除非您真的需要IPSEC客户端,否则请设置为0,禁用该特性。 ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'IPSEC客户端数量',
|
||||
'rma_DESC_IPSECRW_RESET' => '如果您要重置所有数字证书,请在此处处理。<br>旧的证书将不能通过服务器的验证,因此 <b><i>所有IPSEC客户端需要重新导入新的证书!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => '重置数字证书',
|
@@ -0,0 +1,40 @@
|
||||
'rma_FORM_TITLE' => 'Change remote access settings',
|
||||
'rma_DESCRIPTION' => 'For each of the options below, the private setting allows anyone from your local network to access your server. The public setting allows access from anywhere on the Internet. The no access setting disables access. To understand the security implications of changing these options from the default settings, you should read the user\'s guide section on remote access.',
|
||||
'rma_SUCCESS' => '新的遠端存取設定已儲存。',
|
||||
'rma_NO_ACCESS' => 'No Access',
|
||||
'rma_PASSWORD_LOGIN_PRIVATE' => 'Accept passwords only from local networks',
|
||||
'rma_PASSWORD_LOGIN_PUBLIC' => 'Accept passwords from anywhere',
|
||||
'rma_LABEL_TELNET_ACCESS' => 'Telnet access',
|
||||
'rma_LABEL_FTP_ACCESS' => 'FTP access',
|
||||
'rma_LABEL_FTP_LOGIN' => 'FTP password access',
|
||||
'rma_LABEL_PPTP' => 'Number of PPTP clients',
|
||||
'rma_NUMBER_OF_PPTP_CLIENTS_MUST_BE_LESSER_THAN_NUMBER_OF_IP_IN_DHCP_RANGE' => 'The number of pptp clients is greater than the number of reserved IP for DHCP. You should take a smaller number.',
|
||||
'rma_LABEL_SSH_PORT' => 'TCP Port for secure shell access',
|
||||
'rma_LABEL_SSH' => 'Secure shell access',
|
||||
'rma_LABEL_SSH_ADMIN' => 'Allow administrative command line access over secure shell',
|
||||
'rma_LABEL_SSH_PASSWORD_ACCESS' => 'Allow secure shell access using standard passwords',
|
||||
'rma_DESC_SSH' => ' <hr class="sectionbar" /> <h2>Secure Shell Settings</h2>You can control Secure Shell access to your server. The public setting should only be enabled by experienced administrators for remote problem diagnosis and resolution. We recommend leaving this parameter set to "No Access" unless you have a specific reason to do otherwise. ',
|
||||
'rma_DESC_FTP_ACCESS' => ' <hr class="sectionbar" /><h2>FTP Settings</h2> You can also control <b>FTP</b> access to your server. We recommend leaving this parameter set to \'no access\' unless you have a specific reason to do otherwise. <p> Note: these settings limit access to the server and override other settings, including those for individual information bays.</p> ',
|
||||
'rma_DESC_FTP_LOGIN' => ' You can also control authenticated FTP access to information bays and user accounts. We strongly recommend leaving this parameter set to private unless you have a specific reason to do otherwise. <p> Note: a secure shell sftp client can also be used to access the server, if remote access via the secure shell is enabled. This method of access protects the passwords and data of the FTP session, whereas standard FTP provides no protection.</p> ',
|
||||
'rma_DESC_PPTP' => ' <hr class="sectionbar" /><h2>PPTP設定</h2> 您可允許PPTP存取伺服器。除非您需要PPTP存取,否則您應當藉由將參數設定為0來關閉此功能。',
|
||||
'rma_VALUE_ZERO_OR_POSITIVE' => '數值必需為零或一個正整數',
|
||||
'rma_REMOTE_MANAGEMENT' => '遠端管理',
|
||||
'rma_VALIDFROM_DESC' => ' <hr class="sectionbar" /><h2>{$REMOTE_MANAGEMENT}</h2> <p>It is possible to allow hosts on remote networks to access the server manager by entering those networks here. Use a subnet mask of 255.255.255.255 to limit the access to the specified host. Any hosts within the specified range will be able to access the server manager using HTTPS.</p> ',
|
||||
'rma_DESC_VALID_FROM_ENTRIES' => '要增加新的遠端管理網路,請於下方輸入細節。',
|
||||
'rma_SUBNET_MASK' => '子網路遮罩',
|
||||
'rma_NUM_OF_HOSTS' => '主機數量',
|
||||
'rma_NO_ENTRIES_YET' => '尚無輸入',
|
||||
'rma_INVALID_SUBNET_MASK' => '無效的子網路遮罩',
|
||||
'rma_ERR_INVALID_PARAMS' => '請同時提供網路與子網路遮罩,亦或全數留白。',
|
||||
'rma_ERR_NO_RECORD' => '無法在設定資料庫中尋找httpd-admin紀錄',
|
||||
'rma_Remote access' => '遠端存取',
|
||||
'rma_LABEL_SERIAL_CONSOLE_ACCESS' => '序列主控台',
|
||||
'rma_DESC_SERIAL_CONSOLE_ACCESS' => ' <hr class="sectionbar" /><h2>序列主控台</h2> You can allow access to the server console 您可以允許透過終端機連結到伺服器序列埠來存取伺服器主控台。',
|
||||
'rma_PORT1_ENABLED' => '啟動序列埠1',
|
||||
'rma_PORT2_ENABLED' => '啟動序列埠2',
|
||||
'rma_LABEL_PPTP_ACCESS' => 'PPTP default user access',
|
||||
'rma_DESC_TELNET_ACCESS' => ' <hr class="sectionbar" /><h2>Telnet Settings</h2> WARNING: Telnet is currently enabled, but this feature is no longer supported. Telnet is inherently insecure and should only be used in circumstances where no practical alternative exists. You should change option to {$NO_ACCESS} and use secure shell if remote access is required. Once disabled, telnet will no longer appear on this screen. ',
|
||||
'rma_DESC_IPSECRW' => ' <h2>IPSEC Client (Roadwarrior) Settings</h2> You can allow IPSEC client access to your server, authenticated by digital certificates. You should leave this feature disabled by setting the value to the number 0 unless you require IPSEC client access. ',
|
||||
'rma_LABEL_IPSECRW_SESS' => 'Number of IPSEC clients',
|
||||
'rma_DESC_IPSECRW_RESET' => 'If you wish to reset all digital certificates, you can do so here.<br>Any old certificates will no longer authenticate against the server, so <b><i>all IPSEC clients will need to import a new certificate!</i></b>. ',
|
||||
'rma_LABEL_IPSECRW_RESET' => 'Reset digital certificates',
|
Reference in New Issue
Block a user