Þ•  -Ð" Ñ"Ü"Þ"qð#\b$"¿$â%è%ñ%ø%&& && /&;& Q&[& l& z& „&’&¢& «& ¸&Æ& Ï& Û& æ& ò&'I '{S'[Ï'‚+(b®(˜)ê)çn*EV+%œ+Â+Ê+ Î+Ø+‚ø+{,€,†,Œ,“,©,±,Ã,Ø,ð,----6-4P-&…-$¬-%Ñ-'÷-$.D.J.Q.X.l.~. –.¢.2Á.2ô.'/>/ O/ \/j/r/$/.¦/"Õ/ø/$0=0$[0 €0Œ0”0#0¬Á0n1 }1]Š1 è1ö12n2‰2,§2?Ô2 3!3 &3 23 ?3L3a3 y3 …33 ¢3 ¯3º3Ô3æ3 õ344 4 *484 G4 Q4 ^4 j4w4 †44˜4¡4¶4û¾4º5À5kÆ5-26`6v6:“6Î6Õ6Ý6æ6ö6 7@*7k7rƒ7 ö788Ï8Cß82#9LV9 £9 ¯9 ¹9uÄ9 ::F:L:JS:ž:£:©:®: ´:Œ¾:ÈK;m<Q‚<ŸÔ<t={= ›= ¥= °= ½=Ë=Ò=Ú=ò=>>/>@>I>l\> É> Ó>Þ>$ã>? ??£?©? ¹?àÆ?%§@Í@€Ö@yWAÑAÙAáAõA6ûA'2BZB#kB B °B¾B ÎB ÙBDåB *C 6CD@C)…C&¯C%ÖC'üC$$D*ID!tD–D¯DÉDàDE:EBXE:›EÖEõEF)FEFZF+rFžF·FÒF/êF%G5@G?vG*¶G#áGIHOHTHgHwH‰HH—H  HªH ³H ½HÇHÚØH³IºI ÍIÚIîIýI J#J7J HJUJfJ yJ…J•J ¦J²JÈJ ×JåJôJ KK "K ,K7K=KEKZKzK™K³KÏK×KqàKRL eLpLLLˆLÕL ÜL èLõLýLAMGMKMQMXM `M»kMœ'N*ÄN¥ïOÅ•PD[QS Q+ôQ R¡6RƒØRŒ\TéTzU“U œU§UW¯U*V2V8VXV`ViV qV {V …V VœV¥V ­V¹V&¾V#åV+ W)5WM_W0­W(ÞW^XAfX;¨XäXíXóXùXÿXYY YY%Y.Y 2Y>YDYMYRY UY_YgY-mY ›Y¨Y ­Y ¸YÂYÇYÐY ÕYãYèYíYóYùYÿYZ ZZZZ%Z*Z3Z7Z>ZEZNZ VZbZ jZuZ&yZ Z»·Z s\~\€\t–]Y ^Ye^¿_Æ_Ú_á_é_ý_ `` #`1` L`Z`r` …`’`©` ¾`Ì`à` õ`a a"a6a Naf\a¢Ãahfb©ÏboycµécöŸda–e\øf5Ug‹g’g ™g4§g Üg}h„hŒh“h›h¶h ½hËhàhúhi&i ;i$EiWjiDÂi2j?:j7zj4²jçjîjöjýjk%'k Mk[kBsk?¶kök'l 6l @l JlTl.\l6‹l!Âläl#m''m#Omsmzm m+Žm˺m †n ”np¢no"o4o~Ho,Ço=ôoS2p†pŽp•p œp §p µpÃp Øp æpôp q q!qrErMr^rìerRsYs{`s.Üs' t3t>Qt t št ¥t¯tÃt*Ôtnÿtnu¥‰u/v>vEvLv[cwK¿w^ x jx vx ‚x†Žx y y&yP-y~yƒy‰yŽy ”yÉ yæjz‡Q{iÙ{¬C|ð|$÷|},}<} M}[}c}%v}œ}¹}Ô}ì}~ ~%~³~ »~É~*Ñ~ü~¨¬´ºÔLç"4Wfu„Œ “´F¼;‚$?‚3d‚0˜‚É‚Ø‚ í‚û‚I ƒ Tƒ bƒOlƒ0¼ƒ0íƒ#„/B„,r„/Ÿ„.Ï„#þ„$"…!G…1i…'›…>Ã…J†>M† Œ†#­†#ц'õ†‡":‡6]‡ ”‡!µ‡ׇ8ô‡1-ˆF_ˆU¦ˆ-üˆ(*‰MS‰¡‰¨‰À‰щé‰ ð‰ û‰Š Š $Š 2Š?Š]Šd‹k‹ €‹Ž‹ Ÿ‹­‹ È‹Ö‹î‹ ŒŒ%Œ :ŒHŒ\Œ qŒŒ—Œ ¨Œ¶ŒÊŒ âŒðŒ & - 7X(x¡Á á ë‚õxŽ ŽŽ˜ŽªŽ[²Ž  #19\@ ¤ ®¹ÁøÒÙËr¥‘ñ“ü ”D•nL•K»•"–µ*–à–¨â˜´‹™@š_š nš |š„Šš6›F›,N› {› ˆ› •› ¢›°›Á›Ò›ä›ì›ó›û›Fœ=Iœ<‡œ:ÄœaÿœDa6¦`ÝR>žF‘ž Øžãž êž õž Ÿ ŸŸ Ÿ-Ÿ4Ÿ;Ÿ?Ÿ OŸYŸiŸpŸsŸ zŸ‡Ÿ1ŽŸÀŸÑŸ ÕŸ áŸíŸ ôŸþŸ      % , 3 : A T X \ c  j w ~ … ‰    š ¦ ­ µ '¹ á 0Ž†ãu ˆçá9yŸt£[ìâM›žýQuÂ$©AYšEÓ‡‰m×wojë¹`™Mň“Ô<Ä ™+)À»H{÷|,GŠÁ– T¤bHŠð:ÍNÒsnò/ªv«— ûp;FiÆR:ÚxÈt;}„5~f.¬OƒI#pLù ›„_5 ‚— 8¸˜*[q{%ü7à)Û“Gra”23 4íCJB‡CkLŽè ‰€!˜YËäñóN^/-‘œVZƒØ^z• ÿ]Zg2özérD6wïA0øh?ÊUÎÙš­¾}>KceÜe>ϧº¿dP …‹<låÃõ¨Xy|¦®_W ÞÖ4=\3oEÉ]'sŸ&!7%’…J.ž`D‚K(xdIna‹Ðôî’½O@æ¢Ç–-új6F+hþBÕµ"R³¥VX"#SêgSf~ 1·=±ß•b†vcUѶ1\,T('lQ ÝŒP8°k*œm¯”²9´qÌ$€Œ?&@Wi¼‘¡- Select -/A connection tracking helper is assisting to make protocols work that are using different flows for signaling and data transfers. The data transfers are using ports that are unrelated to the signaling connection and are therefore blocked by the firewall without the helper.A firewalld icmptype provides the information for an Internet Control Message Protocol (ICMP) type for firewalld.A firewalld service is a combination of ports, protocols, modules and destination addresses.A firewalld zone defines the level of trust for network connections, interfaces and source addresses bound to the zone. The zone combines services, ports, protocols, masquerading, port/packet forwarding, icmp filters and rich rules. The zone can be bound to interfaces and source addresses.AboutAbout %sActionAction:Active BindingsAddAdd ChainAdd Command LineAdd ContextAdd Entries From FileAdd EntryAdd Forward PortAdd ICMP TypeAdd IPSetAdd InterfaceAdd PassthroughAdd PortAdd ProtocolAdd Rich RuleAdd RuleAdd ServiceAdd SourceAdd User IdAdd User NameAdd ZoneAdd a rule with the arguments args to a chain in a table with a priority.Add additional ports or port ranges, which need to be accessible for all hosts or networks that can connect to the machine.Add additional ports or port ranges, which need to be accessible for all hosts or networks.Add additional source ports or port ranges, which need to be accessible for all hosts or networks that can connect to the machine.Add additional source ports or port ranges, which need to be accessible for all hosts or networks.Add entries to bind interfaces to the zone. If the interface will be used by a connection, the zone will be set to the zone specified in the connection.Add entries to bind source addresses or areas to the zone. You can also bind to a MAC source address, but with limitations. Port forwarding and masquerading will not work for MAC source bindings.Add entries to forward ports either from one port to another on the local system or from the local system to another system. Forwarding to another system is only useful if the interface is masqueraded. Port forwarding is IPv4 only.Add protocols, which need to be accessible for all hosts or networks.Additional chains for use with rules.AddressAllAll FilesAll network traffic is blocked.An IPSet can be used to create white or black lists and is able to store for example IP addresses, port numbers or MAC addresses. ArgsArgs:AuditAudit:Authorization failed.AuthorsAutomatic HelpersBase Helper SettingsBase ICMP Type SettingsBase IPSet SettingsBase Service SettingsBase Zone SettingsBindingsBlock all network trafficBold entries are mandatory, all others are optional.Built-in helper, rename not supported.Built-in icmp, rename not supported.Built-in ipset, rename not supported.Built-in service, rename not supported.Built-in zone, rename not supported.ChainChain:ChainsChange Default ZoneChange Log DeniedChange LogDenied value.Change ZoneChange Zones of Connections...Change default zone for connections or interfaces.Change which zone a network connection belongs to.Change zone of bindingChanges applied.Command lineCommand linesCommentConfiguration:Configure Automatic Helper AssigmentConfigure Automatic Helper Assignment setting.Configure Shields UP/Down Zones...Configure Shields Up/Down ZonesConnection to FirewallD established.Connection to FirewallD lost.Connection to firewalld established.ConnectionsContextContextsCurrent default zone of the system.Currently visible configuration. Runtime configuration is the actual active configuration. Permanent configuration will be active after service or system reload or restart.Default TargetDefault ZoneDefault Zone '{default_zone}' active for connection '{connection}' on interface '{interface}'Default Zone:Default Zone: %sDefault Zone: '%s'Default zone '{default_zone}' {activated_deactivated} for connection '{connection}' on interface '{interface}'Default zone changed to '%s'.Default zone used by network connection '%s'Define ports or port ranges, which are monitored by the helper.Description:DestDestinationDestination:Direct ChainDirect ConfigurationDirect Passthrough RuleDirect RuleEdit ChainEdit Command LineEdit ContextEdit EntryEdit Firewall Settings...Edit Forward PortEdit ICMP TypeEdit IPSetEdit InterfaceEdit PassthroughEdit PortEdit ProtocolEdit Rich RuleEdit RuleEdit ServiceEdit SourceEdit User IdEdit User NameEdit ZoneElementElement:Enable NotificationsEntriesEntries of the IPSet. You will only be able to see entries of ipsets that are not using the timeout option, also only the entries, that have been added by firewalld. Entries, that have been directly added with the ipset command wil not be listed here.EntryErrorFailed to connect to firewalld. Please make sure that the service has been started correctly and try again.Failed to get connections from NetworkManagerFailed to load icons.Failed to read file '%s': %sFailed to set zone {zone} for connection {connection_name}FamilyFamily:FirewallFirewall AppletFirewall ConfigurationFirewallD has been reloaded.For host or network allow or denylisting deactivate the element.Forward to another portForwarding to another system is only useful if the interface is masqueraded. Do you want to masquerade this zone ?Hashsize:HelperHelpersHere you can define which services are trusted in the zone. Trusted services are accessible from all hosts and networks that can reach the machine from connections, interfaces and sources bound to this zone.Here you can select the zones used for Shields Up and Shields Down.Here you can set rich language rules for the zone.Hide active runtime bindings of connections, interfaces and sources to zonesICMP FilterICMP TypeICMP TypesICMP Types can only be changed in the permanent configuration view. The runtime configuration of ICMP Types is fixed.IP address:IPSetIPSetsIPSets can only be created or deleted in the permanent configuration view.IPv4IPv4:IPv6IPv6:Icmp TypeIf Invert Filter is enabled, marked ICMP entries are accepted and the others are rejected. In a zone with the target DROP, they are dropped.If a command entry on the whitelist ends with an asterisk '*', then all command lines starting with the command will match. If the '*' is not there the absolute command inclusive arguments must match.If you enable local forwarding, you have to specify a port. This port has to be different to the source port.If you enable masquerading, IP forwarding will be enabled for your IPv4 networks.If you specify destination addresses, the service entry will be limited to the destination address and type. If both entries are empty, there is no limitation.IgnoreInitial hash size, default 1024InterfaceInterfacesInvalid nameInvert FilterLevel:LicenseLoad ICMP Type DefaultsLoad IPSet DefaultsLoad Service DefaultsLoad Zone DefaultsLocal forwardingLockdownLockdown WhitelistLockdown locks firewall configuration so that only applications on lockdown whitelist are able to change it.Lockdown:Log DeniedLog:Make runtime configuration permanentMarkMark the ICMP types in the list, which should be rejected. All other ICMP types are allowed to pass the firewall. The default is no limitation.Mark:Mask:Masquerade zoneMasqueradingMasquerading allows you to set up a host or router that connects your local network to the internet. Your local network will not be visible and the hosts appear as a single address on the internet. Masquerading is IPv4 only.Max number of elements, default 65536Maxelem:Meaning: Log of denied packets. But this is too long. LogDenied is also the parameter used in firewalld.conf.Automatic Helpers:Meaning: Log of denied packets. But this is too long. LogDenied is also the parameter used in firewalld.conf.Log Denied:Module:ModulesName already existsName:Netfilter helper modules are needed for some services.Network traffic is not blocked anymore.No Active Zones.No NetworkManager imports availableNo connection to firewall daemonOther Module:Other Protocol:Panic ModePanic Mode:Panic mode means that all incoming and outgoing packets are dropped.PassthroughPermanentPlease be careful with passthrough rules to not damage the firewall.Please configure base ICMP type settings:Please configure base helper settings:Please configure base ipset settings:Please configure base service settings:Please configure base zone settings:Please enter a mark with an optional mask.Please enter a port and protocol.Please enter a protocol.Please enter a rich rule.Please enter a source.Please enter an interface name:Please enter an ipset entry:Please enter an ipv4 address with the form address[/mask].Please enter an ipv4 or ipv6 address with the form address[/mask].Please enter an ipv6 address with the form address[/mask].Please enter the command line.Please enter the context.Please enter the user id.Please enter the user name.Please select a filePlease select a helper:Please select a netfilter conntrack helper:Please select a service.Please select an ICMP typePlease select an ipset:Please select default zone from the list below.Please select ipv and enter the args.Please select ipv and table and enter the chain name.Please select ipv and table, chain priority and enter the args.Please select the automatic helpers value:Please select the log denied value:Please select the source and destination options according to your needs.PortPort / Port Range:Port ForwardingPort and ProtocolPortsPrefix:PriorityPriority:ProtocolProtocol:ProtocolsReload FirewalldReloads firewall rules. Current permanent configuration will become new runtime configuration. i.e. all runtime only changes done until reload are lost with reload if they have not been also in permanent configuration.RemoveRemove All EntriesRemove ChainRemove Command LineRemove ContextRemove Entries From FileRemove EntryRemove Forward PortRemove ICMP TypeRemove IPSetRemove InterfaceRemove PassthroughRemove PortRemove ProtocolRemove Rich RuleRemove RuleRemove Selected EntryRemove ServiceRemove SourceRemove User IdRemove User NameRemove ZoneReset To DefaultRich RuleRich RulesRulesRuntimeRuntime To PermanentSelect zone for connection '%s'Select zone for interface '%s'Select zone for source %sSelect zone for source '%s'ServiceServicesServices can only be changed in the permanent configuration view. The runtime configuration of services is fixed.Shields Down Zone:Shields UpShields Up Zone:Short:Show active runtime bindings of connections, interfaces and sources to zonesSourceSource PortSource PortsSource:SourcesSpecify whether this ICMP Type is available for IPv4 and/or IPv6.SrcTableTable:Target:Text FilesThe Internet Control Message Protocol (ICMP) is mainly used to send error messages between networked computers, but additionally for informational messages like ping requests and replies.The context is the security (SELinux) context of a running application or service. To get the context of a running application use ps -e --context.The direct configuration gives a more direct access to the firewall. These options require user to know basic iptables concepts, i.e. tables, chains, commands, parameters and targets. Direct configuration should be used only as a last resort when it is not possible to use other firewalld features.The ipv argument of each option has to be ipv4 or ipv6 or eb. With ipv4 it will be for iptables, with ipv6 for ip6tables and with eb for ethernet bridges (ebtables).The lockdown feature is a light version of user and application policies for firewalld. It limits changes to the firewall. The lockdown whitelist can contain commands, contexts, users and user ids.The mark and the mask fields are both 32 bits wide unsigned numbers.The mask can be a network mask or a number for ipv4. The mask is a number for ipv6.The mask can be a network mask or a number.The mask is a number.The passthrough rules are directly passed through to the firewall and are not placed in special chains. All iptables, ip6tables and ebtables options can be used.The priority is used to order rules. Priority 0 means add rule on top of the chain, with a higher priority the rule will be added further down. Rules with the same priority are on the same level and the order of these rules is not fixed and may change. If you want to make sure that a rule will be added after another one, use a low priority for the first and a higher for the following.This IPSet uses the timeout option, therefore no entries are visible here. The entries should be taken care directly with the ipset command.This feature is useful for people using the default zones mostly. For users, that are changing zones of connections, it might be of limited use.Timeout value in secondsTimeout:To AddressTo PortTo enable this Action has to be 'reject' and Family either 'ipv4' or 'ipv6' (not both).Trying to connect to firewalld, waiting...Type:Used by network connection '%s'User IDUser IdsUser idUser ids.User nameUser namesUser names.Version:WarningWith limit:ZoneZone '%s' activated for interface '%s'Zone '%s' activated for source '%s'Zone '%s': ICMP type '%s' is not available.Zone '%s': Service '%s' is not available.Zone '{zone}' active for connection '{connection}' on interface '{interface}'Zone '{zone}' active for interface '{interface}'Zone '{zone}' active for source {source}Zone '{zone}' {activated_deactivated} for connection '{connection}' on interface '{interface}'Zone '{zone}' {activated_deactivated} for interface '{interface}'Zone '{zone}' {activated_deactivated} for source '{source}'Zone: %sZones_File_Help_Options_Viewacceptactivatedalertcriticaldaydeactivateddebugdisableddropebemergencyenablederrorfirewall;network;security;iptables;netfilter;forward-porthouricmp-blockicmp-typeinfoinvertedipv4ipv4 and ipv6ipv6ipv:labellevellimitlogmarkmasquerademinutenatnoticeportprotocolrawrejectsecondsecurityservicesource-portwarningwith Type:yes{entry} (Default Zone: {default_zone}){entry} (Zone: {zone})Project-Id-Version: PACKAGE VERSION Report-Msgid-Bugs-To: POT-Creation-Date: 2021-05-25 10:54-0400 PO-Revision-Date: 2022-06-06 06:18+0000 Last-Translator: ê¹€ì¸ìˆ˜ Language-Team: Korean Language: ko MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Plural-Forms: nplurals=1; plural=0; X-Generator: Weblate 4.12.2 - ì„ íƒ -/ì—°ê²° ì¶”ì  í—¬í¼ê°€ 신호 발송과 ë°ì´í„° ì „ì†¡ì— ì„œë¡œ 다른 íë¦„ì„ ì‚¬ìš©í•˜ëŠ” í”„ë¡œí† ì½œì´ ìž‘ë™í•˜ë„ë¡ ë•ìŠµë‹ˆë‹¤. ë°ì´í„° ì „ì†¡ì€ ì‹ í˜¸ 발송 ì—°ê²°ê³¼ 무관한 í¬íŠ¸ë¥¼ 사용하므로 í—¬í¼ ì—†ì´ëŠ” ë°©í™”ë²½ì— ì˜í•´ 차단ë©ë‹ˆë‹¤.firewalld icmp ìœ í˜•ì€ firewalld ìš© ICMP (Internet Control Message Protocol) ìœ í˜•ì˜ ì •ë³´ë¥¼ 제공합니다.firewalld 서비스는 í¬íŠ¸, 프로토콜, 모듈 ë° ëŒ€ìƒ ì£¼ì†Œì˜ ì¡°í•©ìž…ë‹ˆë‹¤.firewalld ì˜ì—­ì€ ì˜ì—­ê³¼ ê²°í•©ëœ ë„¤íŠ¸ì›Œí¬ ì—°ê²°, ì¸í„°íŽ˜ì´ìŠ¤ ë° ì†ŒìŠ¤ ì£¼ì†Œì˜ ì‹ ë¢°ëœ ìˆ˜ì¤€ì„ ì •ì˜í•©ë‹ˆë‹¤. ì˜ì—­ì€ 서비스, í¬íŠ¸ 프로토콜, 마스커레ì´ë”©, í¬íŠ¸/패킷 í¬ì›Œë”©, icmp í•„í„° ë° ê³ ê¸‰ ê·œì¹™ì˜ ì¡°í•©ìž…ë‹ˆë‹¤. ì˜ì—­ì€ ì¸í„°íŽ˜ì´ìŠ¤ì™€ 소스 주소로 ì—°ê²°ë  ìˆ˜ 있습니다.ì •ë³´%sì— ëŒ€í•œ ì •ë³´ë™ìž‘ë™ìž‘:ë°”ì¸ë”© í™œì„±í™”ì¶”ê°€ì²´ì¸ ì¶”ê°€ëª…ë ¹í–‰ 추가문맥 추가파ì¼ì—ì„œ 항목 추가항목 추가í¬ì›Œë“œ í¬íŠ¸ 추가ICMP 유형 추가IPSet 추가ì¸í„°íŽ˜ì´ìŠ¤ 추가통과 규칙 추가í¬íŠ¸ 추가프로토콜 추가고급 규칙 추가규칙 추가서비스 추가소스 ì¶”ê°€ì‚¬ìš©ìž ID ì¶”ê°€ì‚¬ìš©ìž ì´ë¦„ 추가ì˜ì—­ ì¶”ê°€ê·œì¹™ì„ args ì¸ìˆ˜ì™€ 함께 í…Œì´ë¸”ì— ìžˆëŠ” ì²´ì¸ì— ìš°ì„  순위를 붙여 추가합니다.ì´ ì»´í“¨í„°ì— ì—°ê²° 가능한 모든 호스트 ë˜ëŠ” 네트워í¬ì— 액세스할 수 있어야 하는 추가 í¬íŠ¸ ë˜ëŠ” í¬íŠ¸ 범위를 추가합니다.모든 호스트 ë˜ëŠ” 네트워í¬ì— 액세스 가능한 í¬íŠ¸ ë° í¬íŠ¸ 범위를 추가합니다.ì´ ì»´í“¨í„°ì— ì—°ê²° 가능한 모든 호스트 ë˜ëŠ” 네트워í¬ì— 액세스할 수 있어야 하는 추가 소스 í¬íŠ¸ ë˜ëŠ” í¬íŠ¸ 범위를 추가합니다.모든 호스트 ë˜ëŠ” 네트워í¬ì— 액세스 가능한 소스 í¬íŠ¸ ë° í¬íŠ¸ 범위를 추가합니다.ì˜ì—­ì— ì¸í„°íŽ˜ì´ìŠ¤ë¥¼ ë°”ì¸ë”©í•  í•­ëª©ì„ ì¶”ê°€í•©ë‹ˆë‹¤. ì¸í„°íŽ˜ì´ìŠ¤ê°€ ì—°ê²°ì— ì˜í•´ ì‚¬ìš©ë  ê²½ìš° ì˜ì—­ì€ ì—°ê²°ì— ì§€ì •ëœ ì˜ì—­ìœ¼ë¡œ 설정ë©ë‹ˆë‹¤.ì˜ì—­ì— 소스 주소 ë˜ëŠ” 범위를 ë°”ì¸ë”©í•  í•­ëª©ì„ ì¶”ê°€í•©ë‹ˆë‹¤. MAC 소스 주소를 ë°”ì¸ë”©í•  수 있지만 ì œí•œì´ ë”°ë¦…ë‹ˆë‹¤. í¬íŠ¸ í¬ì›Œë”© ë° ë§ˆìŠ¤ì»¤ë ˆì´ë”©ì€ MAC 소스 ë°”ì¸ë”©ì— ìž‘ë™í•˜ì§€ 않습니다.로컬 시스템 ìƒì—ì„œ í•˜ë‚˜ì˜ í¬íŠ¸ì—ì„œ 다른 í¬íŠ¸ë¡œ ë˜ëŠ” 로컬 시스템ì—ì„œ 다른 시스템으로 í¬íŠ¸ë¥¼ í¬ì›Œë”©í•˜ê¸° 위해 í•­ëª©ì„ ì¶”ê°€í•©ë‹ˆë‹¤. 다른 시스템으로 í¬ì›Œë”©í•˜ëŠ” ê²ƒì€ ì¸í„°íŽ˜ì´ìŠ¤ê°€ 마스커레ì´ë”©ë˜ì—ˆì„ 경우ì—만 유용합니다. í¬íŠ¸ í¬ì›Œë”©ì€ IPv4ì—서만 해당ë©ë‹ˆë‹¤.모든 호스트 ë˜ëŠ” 네트워í¬ì— 액세스 가능한 í”„ë¡œí† ì½œì„ ì¶”ê°€í•©ë‹ˆë‹¤.규칙과 함께 사용ë˜ëŠ” 추가 ì²´ì¸ìž…니다.주소모ë‘모든 파ì¼ëª¨ë“  ë„¤íŠ¸ì›Œí¬ í†µì‹ ì´ ì°¨ë‹¨ë˜ì—ˆìŠµë‹ˆë‹¤.IPSet를 사용하여 í™”ì´íŠ¸ë¦¬ìŠ¤íŠ¸ ë˜ëŠ” 블랙리스트를 만들 수 있으며 IP 주소, í¬íŠ¸ 번호, MAC 주소 ë“±ì„ ì €ìž¥í•  수 있습니다. ì¸ìˆ˜ì¸ìˆ˜:ê°ì‚¬ê°ì‚¬:ì¸ì¦ 실패했습니다.ìž‘ìžìžë™ í—¬í¼ê¸°ë³¸ í—¬í¼ ì„¤ì •ê¸°ë³¸ ICMP 유형 설정기본 IPSet 설정기본 서비스 설정기본 ì˜ì—­ 설정바ì¸ë”©ëª¨ë“  ë„¤íŠ¸ì›Œí¬ í†µì‹ ëŸ‰ 차단굵게 í‘œì‹œëœ í•­ëª©ì€ í•„ìˆ˜ 항목ì´ë©° 모든 다른 í•­ëª©ì€ ì˜µì…˜ìž…ë‹ˆë‹¤.기본 제공 í—¬í¼, ì´ë¦„ 바꾸기가 지ì›ë˜ì§€ 않습니다.ë‚´ìž¥ëœ icmp, ì´ë¦„ì„ ë°”ê¿€ 수 없습니다.ë‚´ìž¥ëœ ipset입니다. ì´ë¦„ì„ ë³€ê²½í•  수 없습니다.ë‚´ìž¥ëœ ì„œë¹„ìŠ¤, ì´ë¦„ì„ ë°”ê¿€ 수 없습니다.ë‚´ìž¥ëœ ì˜ì—­, ì´ë¦„ì„ ë°”ê¿€ 수 없습니다.ì²´ì¸ì²´ì¸:ì²´ì¸ê¸°ë³¸ ì˜ì—­ 변경로그 거부 변경로그 거부 ê°’ì„ ë³€ê²½í•©ë‹ˆë‹¤.ì˜ì—­ 변경연결 ì˜ì—­ 변경...ì—°ê²° ë˜ëŠ” ì¸í„°íŽ˜ì´ìŠ¤ì˜ 기본 ì˜ì—­ì„ 변경합니다.ë„¤íŠ¸ì›Œí¬ ì—°ê²°ì´ ì†í•´ 있는 ì˜ì—­ì„ 변경합니다.ë°”ì¸ë”© ì˜ì—­ 변경변경 ì‚¬í•­ì´ ì ìš©ë˜ì—ˆìŠµë‹ˆë‹¤.명령행명령행코멘트설정:ìžë™ ë„움 í• ë‹¹ì„ êµ¬ì„±í•´ 주십시오ìžë™ í—¬í¼ í• ë‹¹ ì„¤ì •ì„ êµ¬ì„±í•´ 주십시오.쉴드업/다운 ì˜ì—­ 설정...쉴드업/다운 ì˜ì—­ 설정FirewallDì— ì—°ê²°ë˜ì—ˆìŠµë‹ˆë‹¤.FirewallD ì—°ê²°ì´ ëŠì–´ì¡ŒìŠµë‹ˆë‹¤.firewalldì— ì—°ê²°ë˜ì—ˆìŠµë‹ˆë‹¤.ì ‘ì†ë¬¸ë§¥ì»¨í…ìŠ¤íŠ¸ì‹œìŠ¤í…œì˜ í˜„ìž¬ 기본 ì˜ì—­ìž…니다.현재 사용 가능한 설정. 런타임 ì„¤ì •ì€ ì‹¤ì œ í™œì„±í™”ëœ ì„¤ì •ìž…ë‹ˆë‹¤. ì˜êµ¬ ì„¤ì •ì€ ì„œë¹„ìŠ¤ë‚˜ ì‹œìŠ¤í…œì„ ë‹¤ì‹œ 로딩하거나 다시 시작한 후 사용할 수 있습니다.기본 대ìƒê¸°ë³¸ ì˜ì—­ê¸°ë³¸ ì˜ì—­ '{default_zone}'ì€ ì¸í„°íŽ˜ì´ìŠ¤ '{interface}' ìƒì˜ ì—°ê²° '{connection}'ì— ëŒ€í•´ 활성화기본 ì˜ì—­:기본 ì˜ì—­: %s기본 ì˜ì—­: '%s'기본 ì˜ì—­ '{default_zone}'ì€ ì¸í„°íŽ˜ì´ìŠ¤ '{interface}' ìƒì˜ ì—°ê²° '{connection}'ì— ëŒ€í•´ {activated_deactivated}기본 ì˜ì—­ì„ '%s'ë¡œ 변경했습니다.ë„¤íŠ¸ì›Œí¬ ì—°ê²° '%s'ì— ì˜í•´ 사용ë˜ëŠ” 기본 ì˜ì—­í—¬í¼ê°€ 모니터ë§í•˜ëŠ” í¬íŠ¸ ë˜ëŠ” í¬íŠ¸ 범위를 ì •ì˜í•´ 주십시오.설명:대ìƒëŒ€ìƒìˆ˜ì‹ ì§€:ì§ì ‘ ì²´ì¸ì§ì ‘ 설정ì§ì ‘ 통과 규칙ì§ì ‘ ê·œì¹™ì²´ì¸ íŽ¸ì§‘ëª…ë ¹í–‰ 편집문맥 편집항목 편집방화벽 설정 편집...í¬ì›Œë“œ í¬íŠ¸ 편집ICMP 유형 편집IPSet 편집ì¸í„°íŽ˜ì´ìŠ¤ 편집통과 규칙 편집í¬íŠ¸ 편집프로토콜 편집고급 규칙 편집규칙 편집서비스 편집소스 íŽ¸ì§‘ì‚¬ìš©ìž ID íŽ¸ì§‘ì‚¬ìš©ìž ì´ë¦„ 편집ì˜ì—­ 편집요소요소:통지 활성화항목IPSet 항목입니다. 시간 제한 ì˜µì…˜ì„ ì‚¬ìš©í•˜ì§€ 않는 IPSet 항목과 firewalldì— ì˜í•´ ì¶”ê°€ëœ í•­ëª©ë§Œì„ í™•ì¸í•  수 있습니다. ì§ì ‘ ipset ëª…ë ¹ì„ ì‹¤í–‰í•˜ì—¬ ì¶”ê°€ëœ í•­ëª©ì„ í‘œì‹œë˜ì§€ 않습니다.í•­ëª©ì˜¤ë¥˜ë°©í™”ë²½ì— ì—°ê²°í•  수 없습니다. 서비스를 제대로 시작했는지 확ì¸í•˜ê³  다시 ì‹œë„í•´ 주십시오.NetworkManagerì—ì„œ ì—°ê²° 실패했습니다아ì´ì½˜ ë¡œë”©ì— ì‹¤íŒ¨í–ˆìŠµë‹ˆë‹¤.'%s' íŒŒì¼ ì½ê¸° 실패: %s{connection_name} ì—°ê²°ì„ ìœ„í•œ {zone} ì˜ì—­ 설정 실패제품군제품군:방화벽방화벽 애플릿방화벽 설정FirewallDê°€ 다시 로딩ë˜ì—ˆìŠµë‹ˆë‹¤.호스트 ë˜ëŠ” 네트워í¬ì˜ 경우 허용 ë˜ëŠ” 거부 목ë¡ì— ë”°ë¼ ìš”ì†Œê°€ 비활성화ë©ë‹ˆë‹¤.다른 í¬íŠ¸ë¡œ í¬ì›Œë“œì¸í„°íŽ˜ì´ìŠ¤ê°€ 마스커레ì´ë”©ë˜ëŠ” 경우ì—만 다른 ì‹œìŠ¤í…œì— ì „ì†¡í•˜ëŠ” ê²ƒì´ ìœ ìš©í•©ë‹ˆë‹¤. ì´ ì˜ì—­ì„ 마스커레ì´ë”©í•˜ì‹œê² ìŠµë‹ˆê¹Œ?í•´ì‹œ í¬ê¸°:í—¬í¼í—¬í¼ì˜ì—­ì—ì„œ 신뢰할 수 있는 서비스를 지정할 수 있습니다. 신뢰할 수 있는 서비스는 ì´ ì˜ì—­ì— ê²°í•©ëœ ì—°ê²°, ì¸í„°íŽ˜ì´ìŠ¤, 소스ì—ì„œ ì‹œìŠ¤í…œì— ë„달할 수 있는 모든 호스트 ë° ë„¤íŠ¸ì›Œí¬ì—ì„œ 액세스 가능하게 ë©ë‹ˆë‹¤.여기ì—ì„œ 쉴드업 ë° ì‰´ë“œ ë‹¤ìš´ì— ì‚¬ìš©í•  ì˜ì—­ì„ ì„ íƒí•  수 있습니다.여기ì—ì„œ ì˜ì—­ì˜ 고급 언어 ê·œì¹™ì„ ì„¤ì • í•  수 있습니다.ì˜ì—­ìœ¼ë¡œì˜ 소스, ì¸í„°íŽ˜ì´ìŠ¤, ì—°ê²°ì— ëŒ€í•œ 활성 런타임 ë°”ì¸ë”© 숨기기ICMP í•„í„°ICMP 유형ICMP 유형ICMP ìœ í˜•ì€ ì˜êµ¬ 설정 보기ì—서만 변경할 수 있습니다. ICMP ìœ í˜•ì˜ ëŸ°íƒ€ìž„ ì„¤ì •ì€ ê³ ì •ë˜ì–´ 있습니다.IP 주소:IPSetIPSetsì˜êµ¬ 설정 보기ì—서만 IPSetì„ ìƒì„± ë˜ëŠ” 삭제할 수 있습니다.IPv4IPv4:IPv6IPv6:Icmp 유형필터 ë°˜ì „ì´ í™œì„±í™”ë˜ì–´ ìžˆì„ ê²½ìš° í‘œì‹œëœ ICMP í•­ëª©ì´ í—ˆìš©ë˜ë©° ê·¸ ì™¸ì˜ í•­ëª©ì€ ê±°ë¶€ë©ë‹ˆë‹¤. ëŒ€ìƒ DROPì´ ìžˆëŠ” ì˜ì—­ì—ì„œ ì´ëŸ¬í•œ í•­ëª©ì€ ì„ íƒ í•´ì œë©ë‹ˆë‹¤.í™”ì´íŠ¸ë¦¬ìŠ¤íŠ¸ì˜ ëª…ë ¹ì´ ë³„í‘œ '*'ë¡œ ë나는 경우 해당 명령으로 시작하는 모든 명령행과 ì¼ì¹˜í•˜ê²Œ ë©ë‹ˆë‹¤. '*'ê°€ ì—†ì„ ê²½ìš° ì¸ìˆ˜ë¥¼ í¬í•¨í•˜ì—¬ ëª…ë ¹ì´ ì •í™•í•˜ê²Œ ì¼ì¹˜í•´ì•¼ 합니다.로컬 í¬ì›Œë”©ì„ 사용하실 경우, í¬íŠ¸ë¥¼ 지정하셔야 합니다. ì´ëŸ¬í•œ í¬íŠ¸ëŠ” 소스 í¬íŠ¸ì™€ 달ë¼ì•¼ 합니다.마스커레ì´ë”©ì„ 활성화할 경우 IP í¬ì›Œë”©ì€ IPv4 네트워í¬ì— 대해 활성화ë©ë‹ˆë‹¤.ëŒ€ìƒ ì£¼ì†Œë¥¼ 지정할 경우, 서비스 í•­ëª©ì€ ëŒ€ìƒ ì£¼ì†Œ ë° ìœ í˜•ìœ¼ë¡œ 제한ë©ë‹ˆë‹¤. ë‘ í•­ëª© 모ë‘ê°€ 비어 ìžˆì„ ê²½ìš° ì œí•œì´ ì—†ê²Œ ë©ë‹ˆë‹¤.무시초기 í•´ì‹œ í¬ê¸°, 기본값 1024ì¸í„°íŽ˜ì´ìŠ¤ì¸í„°íŽ˜ì´ìŠ¤ìž˜ëª»ëœ ì´ë¦„í•„í„° 반전단계:저작권(license)ICMP ìœ í˜•ì˜ ê¸°ë³¸ê°’ 가져오기IPSet 기본값 불러오기서비스 기본값 ì½ê¸°ì˜ì—­ 기본값 ì½ê¸°ë¡œì»¬ í¬íŠ¸ í¬ì›Œë”©ìž ê¸ˆìž ê¸ˆ í™”ì´íŠ¸ë¦¬ìŠ¤íŠ¸ìž ê¸ˆ ê¸°ëŠ¥ì€ ë°©í™”ë²½ ì„¤ì •ì„ ìž ê¸ˆí•˜ì—¬ 잠금 í™”ì´íŠ¸ ë¦¬ìŠ¤íŠ¸ì— ìžˆëŠ” ì‘용프로그램만 변경 í•  수 있게 합니다.잠금:로그 거부기ë¡:런타임 ì„¤ì •ì„ ì˜êµ¬ì ìœ¼ë¡œ 유지마í¬ëª©ë¡ì—ì„œ 거부해야 í•  ICMP ìœ í˜•ì„ í‘œì‹œí•©ë‹ˆë‹¤. ê·¸ ì™¸ì˜ ëª¨ë“  ICMP ìœ í˜•ì€ ë°©í™”ë²½ 통과를 허용합니다. ê¸°ë³¸ê°’ì€ ì œí•œ ì—†ìŒìž…니다.마í¬:Mask:마스커레ì´ë”© ì˜ì—­ë§¤ìŠ¤ì¿¼ë ˆì´ë”©ë§ˆìŠ¤ì»¤ë ˆì´ë”© (Masquerading) ê¸°ëŠ¥ì€ ë¡œì»¬ 네트워í¬ë¥¼ ì¸í„°ë„·ì— 연결하는 호스트나 ë¼ìš°í„°ë¥¼ 설정할 수 있게 합니다. 로컬 네트워í¬ëŠ” ë³¼ 수 없으며 호스트는 ì¸í„°ë„·ì—ì„œ í•˜ë‚˜ì˜ ì£¼ì†Œë¡œ 나타납니다. 마스커레ì´ë”© (Masquerading) ê¸°ëŠ¥ì€ IPv4ì—서만 해당ë©ë‹ˆë‹¤.최대 요소 ê°’, 기본값 65536최대 요소:ìžë™ í—¬í¼:로그 거부:모듈:모듈ì´ë¦„ì´ ì´ë¯¸ 존재합니다ì´ë¦„:ì¼ë¶€ 서비스 ì‹¤í–‰ì— Netfilter í—¬í¼ ëª¨ë“ˆì´ í•„ìš”í•©ë‹ˆë‹¤.ë„¤íŠ¸ì›Œí¬ í†µì‹ ì´ ë”ì´ìƒ 차단ë˜ì§€ 않습니다.í™œì„±í™”ëœ ì˜ì—­ì´ 없습니다.가져올 수 있는 NetworkManagerê°€ 없습니다방화벽 ë°ëª¬ìœ¼ë¡œì˜ ì—°ê²°ì´ ì—†ìŠµë‹ˆë‹¤ê¸°íƒ€ 모듈:다른 프로토콜:패닉 모드패닉 모드:패닉 모드는 모든 송수신 íŒ¨í‚·ì´ ì‚­ì œë¨ì„ ì˜ë¯¸í•©ë‹ˆë‹¤.통과 규칙ì˜êµ¬ì í†µê³¼ ê·œì¹™ì´ ë°©í™”ë²½ì— ì†ìƒì„ 입히지 ì•Šë„ë¡ ì£¼ì˜í•˜ì‹­ì‹œì˜¤.기본 ICMP 유형 ì„¤ì •ì„ êµ¬ì„±í•˜ì‹­ì‹œì˜¤:기본 ë„움 ì„¤ì •ì„ êµ¬ì„±í•´ 주십시오.:기본 IPSetì„ ì„¤ì •í•˜ì‹­ì‹œì˜¤:기본 서비스 ì„¤ì •ì„ êµ¬ì„± 하십시오:기본 ì˜ì—­ ì„¤ì •ì„ êµ¬ì„± 하십시오:mask 옵션으로 마í¬ë¥¼ 입력하십시오.í¬íŠ¸ ë° í”„ë¡œí† ì½œì„ ìž…ë ¥í•˜ì‹­ì‹œì˜¤.í”„ë¡œí† ì½œì„ ìž…ë ¥í•˜ì‹­ì‹œì˜¤.고급 ê·œì¹™ì„ ìž…ë ¥í•˜ì‹­ì‹œì˜¤.소스를 입력해 주십시오.ì¸í„°íŽ˜ì´ìŠ¤ ì´ë¦„ì„ ìž…ë ¥í•´ 주십시오:ipset í•­ëª©ì„ ìž…ë ¥í•´ 주십시오:ipv4 주소를 address[/mask] 형ì‹ìœ¼ë¡œ 입력하십시오.ipv4 ë˜ëŠ” ipv6 주소를 address[/mask] 형ì‹ìœ¼ë¡œ 입력하십시오.ipv6 주소를 address[/mask] 형ì‹ìœ¼ë¡œ 입력하십시오.ëª…ë ¹í–‰ì„ ìž…ë ¥í•˜ì‹­ì‹œì˜¤.컨í…스트를 입력하십시오.ì‚¬ìš©ìž ID를 입력하십시오.ì‚¬ìš©ìž ì´ë¦„ì„ ìž…ë ¥í•˜ì‹­ì‹œì˜¤.파ì¼ì„ ì„ íƒí•˜ì‹­ì‹œì˜¤ë„움를 ì„ íƒí•´ 주십시오.:Netfilter conntrack ë„움를 ì„ íƒí•´ 주십시오.:서비스를 ì„ íƒí•˜ì‹­ì‹œì˜¤.ICMP ìœ í˜•ì„ ì„ íƒí•˜ì‹­ì‹œì˜¤IPSetì„ ì„ íƒí•˜ì‹­ì‹œì˜¤:아래 목ë¡ì—ì„œ 기본 ì˜ì—­ì„ ì„ íƒí•˜ì‹­ì‹œì˜¤.ipv를 ì„ íƒí•˜ê³  ì¸ìˆ˜ë¥¼ 입력하십시오.ipv ë° í…Œì´ë¸”ì„ ì„ íƒí•˜ê³  ì²´ì¸ ì´ë¦„ì„ ìž…ë ¥í•˜ì‹­ì‹œì˜¤.ipv ë° í…Œì´ë¸”, ì²´ì¸ ìš°ì„  순위를 ì„ íƒí•˜ê³  ì¸ìˆ˜ë¥¼ 입력하십시오.ìžë™ ë„움 ê°’ì„ ì„ íƒí•´ 주십시오.:로그 거부 ê°’ì„ ì„ íƒí•˜ì‹­ì‹œì˜¤:í•„ìš”ì— ë”°ë¼ ì†ŒìŠ¤ ë° ìˆ˜ì‹ ì§€ ì˜µì…˜ì„ ì„ íƒí•˜ì‹œê¸° ë°”ëžë‹ˆë‹¤.í¬íŠ¸í¬íŠ¸ / í¬íŠ¸ 범위:í¬íŠ¸ í¬ì›Œë”©í¬íŠ¸ ë° í”„ë¡œí† ì½œí¬íŠ¸ì ‘ë‘부:우선순위우선 순위:프로토콜프로토콜:프로토콜Firewalld 다시 불러오기방화벽 ê·œì¹™ì„ ë‹¤ì‹œ 로딩합니다. 현재 ì˜êµ¬ ì„¤ì •ì€ ìƒˆë¡œìš´ 런타임 ì„¤ì •ì´ ë©ë‹ˆë‹¤. 즉, 방화벽 ê·œì¹™ì´ ì˜êµ¬ì  ì„¤ì •ì— ì¡´ìž¬í•˜ì§€ ì•Šì„ ê²½ìš° 다시 로딩할 ë•Œ 까지 ë³€ê²½ëœ ëª¨ë“  런타임 ë‚´ìš©ì´ ì†ì‹¤ë©ë‹ˆë‹¤.제거모든 항목 ì‚­ì œì²´ì¸ ì œê±°ëª…ë ¹í–‰ 제거문맥 제거파ì¼ì—ì„œ 항목 삭제항목 ì‚­ì œí¬ì›Œë“œ í¬íŠ¸ ì‚­ì œICMP 유형 제거IPSet ì‚­ì œì¸í„°íŽ˜ì´ìŠ¤ 제거통과 규칙 제거í¬íŠ¸ 삭제프로토콜 삭제고급 규칙 삭제규칙 삭제선íƒí•œ 항목 삭제서비스 삭제소스 ì œê±°ì‚¬ìš©ìž ID ì œê±°ì‚¬ìš©ìž ì´ë¦„ 제거ì˜ì—­ 제거기본값으로 재설정고급 규칙고급 규칙규칙런타임ì˜êµ¬ì ìœ¼ë¡œ 런타임 설정연결 '%s'ì˜ ì˜ì—­ì„ ì„ íƒì¸í„°íŽ˜ì´ìŠ¤ '%s'ì˜ ì˜ì—­ì„ ì„ íƒì†ŒìŠ¤ '%s'ì˜ ì˜ì—­ì„ ì„ íƒì†ŒìŠ¤ '%s'ì˜ ì˜ì—­ì„ ì„ íƒì„œë¹„스서비스서비스는 ì˜êµ¬ 설정 보기ì—서만 변경할 수 있습니다. ì„œë¹„ìŠ¤ì˜ ëŸ°íƒ€ìž„ ì„¤ì •ì€ ê³ ì •ë˜ì–´ 있습니다.쉴드 다운 ì˜ì—­:쉴드업쉴드업 ì˜ì—­:개요:ì˜ì—­ìœ¼ë¡œì˜ 소스, ì¸í„°íŽ˜ì´ìŠ¤, ì—°ê²°ì— ëŒ€í•œ 활성 런타임 ë°”ì¸ë”© 표시소스소스 í¬íŠ¸ì†ŒìŠ¤ í¬íŠ¸ì†ŒìŠ¤:소스ICMP ìœ í˜•ì´ IPv4 ë° IPv6ì—ì„œ 사용 가능한 ì§€ì— ëŒ€í•œ 여부를 지정합니다.소스테ì´ë¸”í…Œì´ë¸”:대ìƒ:í…스트 파ì¼ICMP (Internet Control Message Protocol)는 네트워í¬ë¡œ ì—°ê²°ëœ ì»´í“¨í„° ê°„ì˜ ì˜¤ë¥˜ 메세지를 보내는 ë° ì£¼ë¡œ 사용ë˜ì§€ë§Œ, 추가로 í•‘ 요청 ë° ì‘답과 ê°™ì€ ì•Œë¦¼ 메세지를 보내는 ë° ì‚¬ìš©ë  ìˆ˜ 있습니다.컨í…스트는 실행 ì¤‘ì¸ ì‘용프로그램ì´ë‚˜ ì„œë¹„ìŠ¤ì˜ ë³´ì•ˆ (SELinux) 컨í…스트입니다. 실행 ì¤‘ì¸ ì‘ìš©í”„ë¡œê·¸ëž¨ì˜ ì»¨í…스트를 얻으려면 ps -e --context를 사용합니다.ì§ì ‘ 설정하면 ë°©í™”ë²½ì— ì§ì ‘ 액세스할 수 있습니다. ì´ ì˜µì…˜ì€ ì‚¬ìš©ìžê°€ iptablesì˜ ê¸°ë³¸ ê°œë…, 즉 í…Œì´ë¸”, ì²´ì¸, 명령, 매개 변수, 대ìƒì— 대한 지ì‹ì„ 가지고 있ìŒì„ 전제로 하고 있습니다. ì§ì ‘ ì„¤ì •ì€ ë‹¤ë¥¸ 방화벽 ê¸°ëŠ¥ì„ ì‚¬ìš©í•  수 없는 ê²½ìš°ì— ë§ˆì§€ë§‰ 방법으로 사용해야 합니다.ê° ì˜µì…˜ì˜ ipv ì¸ìˆ˜ëŠ” ipv4, ipv6, eb 중 하나여야 합니다. ipv4를 지정하면 iptablesê°€ 사용ë©ë‹ˆë‹¤. ipv6를 지정하면 ip6tablesê°€ 사용ë©ë‹ˆë‹¤. eb를 사용하면 ì´ë”ë„· 브리지 (ebtables)ê°€ 사용ë©ë‹ˆë‹¤.잠금 ê¸°ëŠ¥ì€ firewalldì˜ ì‚¬ìš©ìžì™€ ì‘용프로그램 ì •ì±…ì— ëŒ€í•œ 경량 버전입니다. ì´ëŠ” 방화벽 ë³€ê²½ì„ ì œí•œí•©ë‹ˆë‹¤. 잠금 í™”ì´íŠ¸ 리스트ì—는 명령, ë‚´ìš©, ì‚¬ìš©ìž ë° ì‚¬ìš©ìž IDê°€ í¬í•¨ë˜ì–´ 있습니다.ë§ˆí¬ ë° mask 필드는 32 ë¹„íŠ¸ì˜ ë¶€í˜¸ì—†ëŠ” 숫ìžìž…니다.mask는 ë„¤íŠ¸ì›Œí¬ ë§ˆìŠ¤í¬ ë˜ëŠ” ipv4 숫ìžë¡œ 지정할 수 있습니다. mask는 ipv6 숫ìžìž…니다.mask는 ë„¤íŠ¸ì›Œí¬ ë§ˆìŠ¤í¬ ë˜ëŠ” 숫ìžë¡œ 지정할 수 있습니다.mask는 숫ìžë¡œ 지정합니다.통과 ê·œì¹™ì€ ì§ì ‘ ë°©í™”ë²½ì— ì „ë‹¬ë˜ëŠ” 규칙으로 특별한 ì²´ì¸ì— ë‘지 않습니다. iptables, ip6tables, ebtablesì˜ ëª¨ë“  ì˜µì…˜ì„ ì‚¬ìš©í•  수 있습니다.ìš°ì„  순위는 ê·œì¹™ì˜ ìˆœì„œë¥¼ ì§€ì •í•˜ëŠ”ë° ì‚¬ìš©ë©ë‹ˆë‹¤. ìš°ì„  순위 0ì€ ê·œì¹™ì„ ì²´ì¸ì˜ 처ìŒì— 추가합니다. ë” ë†’ì€ ìš°ì„  순위를 가진 ê·œì¹™ì´ ë” ì•„ëž˜ì— ì¶”ê°€ë©ë‹ˆë‹¤. ë™ì¼í•œ ìš°ì„  순위를 갖는 ê·œì¹™ì€ ë™ì¼í•œ ìˆ˜ì¤€ì´ ë˜ë©° ì´ëŸ¬í•œ ê·œì¹™ì˜ ìˆœì„œëŠ” ê³ ì •ë˜ì§€ ì•Šê³  ë³€ê²½ë  ìˆ˜ 있습니다. ê·œì¹™ì„ ë‹¤ë¥¸ 규칙 ë’¤ì— ì¶”ê°€í•˜ë ¤ë©´ 먼저 ë‚®ì€ ìš°ì„  순위를 사용하고 ê·¸ 다ìŒìœ¼ë¡œ ë” ë†’ì€ ìš°ì„  순위를 사용합니다.IPSet는 시간 제한 ì˜µì…˜ì„ ì‚¬ìš©í•˜ê¸° ë•Œë¬¸ì— ì—¬ê¸°ì—는 í•­ëª©ì´ í‘œì‹œë˜ì§€ 않습니다. ipset ëª…ë ¹ì„ ì§ì ‘ 실행하여 í•­ëª©ì„ ê´€ë¦¬í•©ë‹ˆë‹¤.ì´ ê¸°ëŠ¥ì€ ëŒ€ë¶€ë¶„ 기본값 ì˜ì—­ì„ 사용하는 사용ìžì—게 유용합니다. ì—°ê²° ì˜ì—­ì„ 변경한 사용ìžì˜ 경우 제한ì ìœ¼ë¡œ 사용할 수 있습니다.제한 시간 ê°’ (ì´ˆ 단위)제한 시간:ëª©ì  ì£¼ì†Œëª©ì  í¬íŠ¸ì´ë¥¼ 활성화하려면 ìž‘ì—…ì„ '거부'하고 'ipv4' ë˜ëŠ” 'ipv6' 중 하나 (둘 중 하나)ì˜ ì œí’ˆêµ°ì„ ì„ íƒí•©ë‹ˆë‹¤.firewalldì— ì—°ê²° ì‹œë„ ì¤‘ìž…ë‹ˆë‹¤. 대기 중...유형:ë„¤íŠ¸ì›Œí¬ ì—°ê²° '%s'ì— ì˜í•´ 사용ë¨ì‚¬ìš©ìž IDì‚¬ìš©ìž IDì‚¬ìš©ìž IDì‚¬ìš©ìž ID.ì‚¬ìš©ìž ì´ë¦„ì‚¬ìš©ìž ì´ë¦„ì‚¬ìš©ìž ì´ë¦„.버전:경고제한:ì˜ì—­ì˜ì—­ '%s'ì´ ì¸í„°íŽ˜ì´ìŠ¤ '%s'ì— ëŒ€í•´ 활성화ë˜ì—ˆìŠµë‹ˆë‹¤ì˜ì—­ '%s'ì´ ì†ŒìŠ¤ '%s'ì— ëŒ€í•´ 활성화ë˜ì—ˆìŠµë‹ˆë‹¤ì˜ì—­ '%s': ICMP 유형 '%s'ì„ ì‚¬ìš©í•  수 없습니다.ì˜ì—­ '%s': 서비스 '%s'를 사용할 수 없습니다.ì˜ì—­ '{zone}'ì€ ì¸í„°íŽ˜ì´ìŠ¤ '{interface}' ìƒì˜ ì—°ê²° '{connection}'ì— ëŒ€í•´ 활성화ì˜ì—­ '{zone}'ì€ ì¸í„°íŽ˜ì´ìŠ¤ '{interface}'ì— ëŒ€í•´ 활성화ì˜ì—­ '{zone}'ì€ ì†ŒìŠ¤ {source}ì— ëŒ€í•´ 활성화ì˜ì—­ '{zone}'ì´ ì¸í„°íŽ˜ì´ìŠ¤ '{interface}' ìƒì˜ ì—°ê²°ì— ëŒ€í•´ {activated_deactivated}ì˜ì—­ '{zone}'ì´ ì¸í„°íŽ˜ì´ìŠ¤ '{interface}'ì— ëŒ€í•´ {activated_deactivated}ì˜ì—­ '{zone}'ì´ ì†ŒìŠ¤ '{source}'ì— ëŒ€í•´ {activated_deactivated}ì˜ì—­: %sì˜ì—­íŒŒì¼(_F)ë„움ë§(_H)옵션(_O)보기(_V)허용활성화ë¨ì£¼ì˜ìœ„í—˜ì¼ë¹„활성화ë¨ë””버그비활성화ë¨ë“œë¡­eb긴급활성화ë¨ì˜¤ë¥˜ë°©í™”ë²½;네트워í¬;보안;iptables;netfilter;í¬ì›Œë“œ-í¬íŠ¸ì‹œicmp-차단icmp 유형정보변환ë¨ipv4ipv4 ë° ipv6ipv6ipv:ë ˆì´ë¸”레벨제한로그표시마스커레ì´ë”©ë¶„nat알림í¬íŠ¸í”„로토콜날것거부초보안서비스source-port경고유형:예{entry} (기본 ì˜ì—­: {default_zone}){entry} (ì˜ì—­: {zone})