KGRKJGETMRETU895U-589TY5MIGM5JGB5SDFESFREWTGR54TY
Server : Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8e-fips-rhel5 DAV/2 PHP/5.2.17
System : Linux localhost 2.6.18-419.el5 #1 SMP Fri Feb 24 22:47:42 UTC 2017 x86_64
User : nobody ( 99)
PHP Version : 5.2.17
Disable Function : NONE
Directory :  /usr/share/locale/ja/LC_MESSAGES/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Current File : //usr/share/locale/ja/LC_MESSAGES/system-config-securitylevel.mo
Þ•[ôÌÈ)É!óŒ	í¢	Û
ëlÒX
}+Щhz)ãU
âc>F…‹š.&xUJÎN(h¶‘H)Q{)‹,µâ	½Ìj|)•2¿	òü ( 1 K e 	m w { „ "› ¾ 	Õ Eß %!9!
E!-P!~!ƒ!ˆ!‹!Ž!
š!0¥!Ö!	ß!9é!#"+"<"@"F")Y"ƒ# #¼#Ì#Ó#Û#ì#þ#
$($Ò8%&&&&;&DK&
&ž&¯&eÌ&E2(¤x(É*\ç*¤D,]é.•G0,Ý2
5ö*6®!8äÐ9Qµ;c=Œk=¡ø>ºš?¦UA´üAX±C+
D56DlE?E¿E<ÐE.
F$<FaF\nFêËGÒ¶H‰I›I<¹IZöIQJ)dJ*ŽJ¹J)ÀJ<êJ'K	.K8K<K!UK3wK-«KÙKxóKlLŒLœLK¯LûLMM
M
M
#MQ.M
€M‹MJœMçMïMÿMN	NšN$·OBÜOP<PCPSPpP(P
¶PÅÁPZ‡R.âST$TBTI[T¥TÁT'ÝT!Z:&NB#MEL
[()3HT,AS6	%.5=
 78Q-+?K1GYR>9JU'/<WVOFC*PX0D@"2$;I4
ERROR - You must be root to run lokkit.

Firewall Configuration

   A firewall sits between your computer and the network, 
   and determines which resources on your computer remote
   users on the network are able to access. A
   properly configured firewall can greatly increase
   the out-of-the-box security of your system.


Firewall Customization

   Choose which trusted devices and incoming services
   should be allowed for your network security
   settings.

     * FTP -- FTP is a protocol used for remote file
       transfer. If you plan on making your FTP
       server publicly available, enable this option.
       You need the vsftpd package installed for this
       option to be useful.
     * Mail (SMTP) -- This allows incoming SMTP mail
       delivery. If you need to allow remote hosts to
       connect directly to your machine to deliver
       mail, enable this option. You do not need to
       enable this if you collect your mail from your
       ISP's server by POP3 or IMAP, or if you use a
       tool such as fetchmail. Note that an
       improperly configured SMTP server can allow
       remote machines to use your server to send
       spam.
     * NFSv4 -- This allowed you to use the NFS
       version 4 protocol via TCP to share files.  You will
       need to have the NFS tools installed and properly
       configure your NFS server for this option to be
       useful.
     * Other ports -- You can specify that other
       ports not listed here be allowed through the
       firewall. The format to use is
       'port:protocol'. For example, if you wanted to
       allow IMAP access through your firewall, you
       can specify 'imap:tcp'. You can also specify
       numeric ports explicitly; to allow UDP packets
       on port 1234 through, specify '1234:udp'. To
       specify multiple ports, separate them by
       commas.
     * SSH -- Secure Shell (SSH) is a protocol for
       logging into and executing commands on remote
       machines. It provides secure encrypted
       communications. If you plan on accessing your
       machine remotely via SSH over a firewalled
       interface, enable this option. You need the
       openssh-server package installed for this
       option to be useful.
     * Samba Browsing -- This allows you to access
       access and participate in Windows file and printer
       sharing networks.  You need the Samba package
       installed for this option to be useful
     * Secure WWW (HTTPS) -- HTTPS is a modified HTTP
       used to serve Web pages when security is
       important.  Examples are sites that require logins
       like stores or web mail.  This option is not
       required for viewing pages locally or
       developing Web pages.  You need the httpd
       package installed for this option to be useful
     * Telnet -- Telnet is a protocol for logging
       into remote machines. It is unencrypted, and
       provides little security from network snooping
       attacks. Enabling telnet is not recommended.
       You need the telnet-server package installed
       for this option to be useful.
     * WWW (HTTP) -- HTTP is the protocol used 
       to serve Web pages. If you plan on
       making your Web server publicly available,
       enable this option. This option is not
       required for viewing pages locally or
       developing Web pages. You need the httpd
       package installed for this option to be
       useful.
   Allow Incoming -- Enabling these options allows the
   specified services to pass through the firewall.
   Note, during a workstation-class installation, the
   majority of these services are not present on the
   system.

   Choose the appropriate security level for your
   system.

   Disabled -- Disabling the  firewall allows complete
   access and does no security checking. It is recommended
   that this only be selected if you are running on a
   trusted network (not the Internet), or if you plan
   to do more detailed firewall configuration later.

   Enabled -- By choosing enabled, your system will
   not accept connections from the outside that are
   not explicitly defined by you.

   If you are connecting your system to the Internet,
   but do not plan to run a server, this is the
   safest choice. If additional services are needed,
   you can choose Customize to allow specific
   services through the firewall, or to implicitly
   trust traffic coming over certain interfaces.

   It is not recommended to enable this for devices
   that are connected to public networks, such as the
   Internet.

   Trusted Devices -- Checking these for any of your
   devices allows all traffic coming from that device
   to be allowed. For example, if you are running a
   local network, but are connecting to the Internet
   via a PPP dialup, you could check that eth0 is
   trusted to allow any traffic coming from your
   local network.

 <Tab>/<Alt-Tab> between elements   |   <Space> selects  |   <F12> next screen'enforcing', 'permissive', or 'disabled'A firewall protects against unauthorized network intrusions. Enabling a firewall blocks all incoming connections. Disabling a firewall allows all connections and is not recommended. Add PortAllow all traffic on the specified deviceAllow incoming:Allow specific ports through the firewallBackwards compatibilty, aliased to --enabledBackwards compatiblity, ignoredCancelChanging this SELinux setting requires rebooting the system so the entire file system may be relabeled.  Relabeling takes a long time depending on the file system.  Would you like to continue with this setting and reboot the system after firstboot is complete?Changing to SELinux enabled will cause a relabel of the entire file system on the next boot. Relabeling takes a long time depending on the size of the file system.  Do you wish to continue?Clicking the 'Yes' button will set the security level of the system and override any existing firewall configuration.  Are you sure that you want to do this?Configure SELinuxConfigure SELinux PolicyConfigure firewall but do not activate itConfigure system security level and firewall rulesCustomizeDisable an iptables moduleDisable firewallDisabledEnable an iptables moduleEnable firewall (default)EnabledEnforcingFTPFirewallFirewall ConfigurationFirewall Configuration - CustomizeFirewall CustomizationFirewall:Invalid port given: '%s'.  Please give a port number or service name.MASQUERADE Devices:Mail (SMTP)MasqueradeMasquerades traffic from the specified deviceNFS4NameOKOkOther portsPermissivePlease choose the security level for the system.Port(s):Protocol:Run noninteractively; process only command-line argumentsSELinuxSELinux Setting:SSHSambaSecure WWW (HTTPS)Security Enhanced Linux (SELinux) provides finer-grained security controls than those available in a traditional Linux system.  It can be set up in a disabled state, a state which only warns about things which would be denied, or a fully active state.  Most people should keep the default setting.Security Level ConfigurationSecurity Level and FirewallSecurity Level:TelnetTrustedTrusted Devices:Trusted services:Usually 'targeted' or 'strict'WWW (HTTP)You can customize your firewall in two ways. First, you can select to allow all traffic from certain network interfaces. Second, you can allow certain protocols explicitly through the firewall. Specify additional ports in the form 'service:protocol', such as 'imap:tcp'. You can use a firewall to allow access to specific services on your computer from other computers and prevent unauthorized access from the outside world.  Which services, if any, do you wish to allow access to?_Firewall Options_SELinuxdevice to masqueradedevice to trustignore settings stored in /etc/sysconfig/system-config-securitylevelmodule to addmodule to removeport:protocol (e.g, ssh:tcp)Project-Id-Version: ja
Report-Msgid-Bugs-To: 
POT-Creation-Date: 2006-11-28 10:51-0500
PO-Revision-Date: 2006-10-12 14:28+0900
Last-Translator: isoiso <isoiso@one-design.jp>
Language-Team: Japanese <ja@li.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Generated-By: pygettext.py 1.4
X-Generator: KBabel 1.9.1

エラー - lokkit 㯠root ã§å®Ÿè¡Œã™ã‚‹å¿…è¦ãŒã‚りã¾ã™ã€‚

ファイアウォールã®è¨­å®š

   ファイアウォールã¯ã‚³ãƒ³ãƒ”ュータã¨ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã®é–“ã«ã‚りã€
   コンピュータ上ã®ã©ã®ãƒªã‚½ãƒ¼ã‚¹ã‚’ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ä¸Šã®ãƒªãƒ¢ãƒ¼ãƒˆãƒ¦ãƒ¼ã‚¶ãƒ¼ãŒ
   アクセスã§ãã‚‹ã‹ã‚’決定ã—ã¾ã™ã€‚
   é©åˆ‡ãªè¨­å®šã®ãƒ•ァイアウォールã¯ä½¿ç”¨å§‹ã‚ãŸã°ã‹ã‚Šã®ã‚·ã‚¹ãƒ†ãƒ ã®
   セキュリティを大幅ã«ã«å¼·åŒ–ã—ã¾ã™ã€‚


ファイアウォールã®ã‚«ã‚¹ã‚¿ãƒžã‚¤ã‚º

   ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ã®è¨­å®šã§è¨±å¯ã™ã¹ã
    ä¿¡é ¼ã§ãるデãƒã‚¤ã‚¹ã¨å—ä¿¡ã™ã‚‹ã‚µãƒ¼ãƒ“スを
    é¸æŠžã—ã¾ã™ã€‚

     * FTP -- FTPã¯ãƒªãƒ¢ãƒ¼ãƒˆãƒ•ァイル転é€ã«ä½¿ç”¨ã•れる
      プロトコルã§ã™ã€‚FTPサーãƒãƒ¼ã‚’公開ã™ã‚‹äºˆå®šã®å ´åˆã¯
       ã“ã®ã‚ªãƒ—ションを有効ã«ã—ã¾ã™ã€‚ã“ã®ã‚ªãƒ—ションを
       使用ã§ãるよã†ã«ã™ã‚‹ã«ã¯vsftpdパッケージを
      インストールã™ã‚‹å¿…è¦ãŒã‚りã¾ã™ã€‚
     * Mail (SMTP) -- ã“ã‚Œã¯æ¥ä¿¡ã®SMTPメールé…é€ã‚’
        許å¯ã—ã¾ã™ã€‚リモートホストをマシンã«ç›´æŽ¥æŽ¥ç¶š
        ã—ã¦ãƒ¡ãƒ¼ãƒ«é…é€ã®è¨±å¯ã‚’ã™ã‚‹å¿…è¦ãŒã‚ã‚‹å ´åˆã€
        ã“ã®ã‚ªãƒ—ションを有効ã«ã—ã¾ã™ã€‚POP3 ã‚„ IMAPを使用
        ã—ã¦ISPサーãƒãƒ¼ã‹ã‚‰ãƒ¡ãƒ¼ãƒ«ã‚’å–å¾—ã—ãŸã‚Šã€fetchmail
        ãªã©ã®ãƒ„ールを使用ã™ã‚‹å ´åˆã¯ã“れを有効ã«ã™ã‚‹
        å¿…è¦ã¯ã‚りã¾ã›ã‚“。ä¸é©åˆ‡ãªè¨­å®šã®SMTPサーãƒãƒ¼ã¯
        ユーザーã®ãƒžã‚·ãƒ³ã‚’使用ã—ãŸspamã‚’é…é€ã‚’
        リモートマシンã«è¨±å¯ã—ã¦ã—ã¾ã†ã“ã¨ã«æ³¨æ„ 
        ã—ã¦ãã ã•ã„。
     * NFSv4 -- ã“れ㌠TCP を経由ã—㟠NFS ãƒãƒ¼ã‚¸ãƒ§ãƒ³ 4 
       プロトコルã®ä½¿ç”¨ã‚’許å¯ã—ã¦ã€ãƒ•ァイルã®å…±æœ‰ãŒå¯èƒ½ã«ãªã‚Šã¾ã™ã€‚
       ã“ã®ã‚ªãƒ—ションãŒå½¹ã«ç«‹ã¤ã«ã¯ã€NFS ツールをインストールã—ã¦ã€
       NFS サーãƒãƒ¼ã‚’æ­£ã—ã設定ã—ã¦ãŠãå¿…è¦ãŒ
       ã‚りã¾ã™ã€‚
     * ä»–ã®ãƒãƒ¼ãƒˆ -- ã“ã“ã«ãƒªã‚¹ãƒˆã—ã¦ã„ãªã„ä»–ã®
       ãƒãƒ¼ãƒˆã«ãƒ•ァイアウォールã®é€šéŽã‚’許å¯ã™ã‚‹
        ã“ã¨ãŒã§ãã¾ã™ã€‚使用ã™ã‚‹å½¢å¼ã¯
       「port:protocolã€ã¨ãªã‚Šã¾ã™ã€‚例ãˆã°ã€ãƒ•ァイア
       ウォールを通ã˜ã¦ IMAP アクセスを許å¯ã—ãŸã„å ´åˆã€
       「imap:tcpã€ã¨æŒ‡å®šã—ã¾ã™ã€‚ã¾ãŸæ˜Žç¢ºã«ãƒãƒ¼ãƒˆã‚’数値
       ã§ç¤ºã™ã“ã¨ã‚‚ã§ãã¾ã™ã€‚ãƒãƒ¼ãƒˆ 1234 を通ã—㦠UDP
       パケットを許å¯ã™ã‚‹ã«ã¯ã€ã€Œ1234:udpã€ã¨æŒ‡å®š
       ã—ã¾ã™ã€‚複数ã®ãƒãƒ¼ãƒˆã‚’指定ã™ã‚‹ã«ã¯ã€ãれらを
       コンマã§åŒºåˆ‡ã‚Šã¾ã™ã€‚
     * SSH -- Secure Shell (SSH)ã¯ãƒªãƒ¢ãƒ¼ãƒˆãƒžã‚·ãƒ³ä¸Šã§
       ログインã—ãŸã‚Šã€ã‚³ãƒžãƒ³ãƒ‰ã‚’実行ã—ãŸã‚Šã™ã‚‹ç‚ºã®
       プロトコルã§ã™ã€‚æš—å·åŒ–ã—ãŸå®‰å…¨ãªé€šä¿¡ã‚’
       æä¾›ã—ã¾ã™ã€‚ファイアウォール設定ã®ã‚ã‚‹
       インターフェイスã§SSHを通ã—ã¦ãƒžã‚·ãƒ³ã«ãƒªãƒ¢ãƒ¼ãƒˆ
       アクセスã™ã‚‹äºˆå®šã®å ´åˆã¯ã€ã“ã®ã‚ªãƒ—ションを
       有効ã«ã—ã¾ã™ã€‚ã“れを使用ã™ã‚‹ã«ã¯openssh-server
       パッケージをインストールã™ã‚‹å¿…è¦ãŒã‚りã¾ã™ã€‚
     * Samba ブラウジング -- Windows 共有ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯å†…ã®
      ファイルやプリンターã¸ã®ã‚¢ã‚¯ã‚»ã‚¹ã‚„å‚加を許å¯ã—ã¾ã™ã€‚
      ã“ã®ã‚ªãƒ—ã‚·ãƒ§ãƒ³ãŒæœ‰åйã«ãªã£ã¦ã„ã‚‹ Samba パッケージ
       ã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ãŒå¿…è¦ã§ã™ã€‚
     * Secure WWW (HTTPS) -- HTTPS ã¯ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãŒé‡è¦
       ãªå ´åˆã« Web ページを供給ã™ã‚‹ãŸã‚ã«ç”¨ã„られる修正
       ã•れ㟠HTTP ã§ã™ã€‚例ã¯è“„ç©å ´æ‰€ã®ã‚ˆã†ãªãƒ­ã‚°ã‚¤ãƒ³ã‚’
       å¿…è¦ã¨ã™ã‚‹ã‚µã‚¤ãƒˆã‚„ web メールã§ã™ã€‚ã“ã®ã‚ªãƒ—ション
       ã¯ãƒ­ãƒ¼ã‚«ãƒ«ã®ãƒšãƒ¼ã‚¸ã‚’見ãŸã‚Š Web ページã®é–‹ç™ºã«ã¯
       å¿…è¦ã‚りã¾ã›ã‚“。ã“ã®ã‚ªãƒ—ã‚·ãƒ§ãƒ³ãŒæœ‰åйã«ã—ã¦ã‚ã‚‹ 
       httpd パッケージãŒå¿…è¦ã§ã™ã€‚
     * Telnet -- Telnetã¯ãƒªãƒ¢ãƒ¼ãƒˆãƒžã‚·ãƒ³ã«ãƒ­ã‚°ã‚¤ãƒ³ã™ã‚‹
        為ã®ãƒ—ロトコルã§ã™ã€‚éžæš—å·åŒ–ã®ç‚ºã«ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ä¸Šã®
        å‚å—ã«å¯¾ã—殆んã©ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãŒã‚りã¾ã›ã‚“。Telnetã‚’
        有効ã«ã™ã‚‹ã“ã¨ã¯æŽ¨å¥¨ã§ãã¾ã›ã‚“。ã“ã®ã‚ªãƒ—ションを
        役立ã¦ã‚‹ã«ã¯telnet-serverパッケージをインストール
        ã™ã‚‹å¿…è¦ãŒã‚りã¾ã™ã€‚
     * WWW (HTTP) -- HTTPã¯Webページをサービスã™ã‚‹ç‚ºã® 
       プロトコルã§ã™ã€‚Webページを公開ã™ã‚‹äºˆå®šã®å ´åˆã¯
        ã“ã®ã‚ªãƒ—ションを有効ã«ã—ã¾ã™ã€‚ページをローカルã§
        表示ã—ãŸã‚Šã€Webページã®é–‹ç™ºã«ã¯ã“ã®ã‚ªãƒ—ションã¯
        å¿…è¦ã‚りã¾ã›ã‚“。ã“ã®ã‚ªãƒ—ションを役ã«ç«‹ã¤ã‚ˆã†ã«
        ã™ã‚‹ã«ã¯httpdパッケージをインストールã™ã‚‹å¿…è¦ãŒ
        ã‚りã¾ã™ã€‚
   å—ä¿¡ã‚’è¨±å¯ -- ã“ã®ã‚ªãƒ—ションを有効ã«ã™ã‚‹ã¨æŒ‡å®šã—ãŸ
   サービスã«ãƒ•ァイアウォールã®é€šéŽã‚’許å¯ã—ã¾ã™ã€‚
   ワークステーションクラスã®ã‚¤ãƒ³ã‚¹ãƒˆãƒ¼ãƒ«ä¸­ã«ã“れらã®
   殆んã©ã®ã‚µãƒ¼ãƒ“スã¯ã‚·ã‚¹ãƒ†ãƒ ã«å­˜åœ¨ã—ã¦ã„ãªã„ã“ã¨ã«
   注æ„ã—ã¦ãã ã•ã„。

   ã“ã®ã‚·ã‚¹ãƒ†ãƒ ç”¨ã«é©åˆ‡ãªã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ¬ãƒ™ãƒ«ã‚’
   é¸æŠžã—ã¦ãã ã•ã„。

   無効 --- ファイアウォールを無効ã«ã™ã‚‹ã¨å®Œå…¨ãª
   アクセスを許å¯ã—ã¦ã€ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒã‚§ãƒƒã‚¯ã‚’ã—ã¾ã›ã‚“。
   ã“れã¯ã€ä¿¡é ¼ã§ãã‚‹ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ï¼ˆã‚¤ãƒ³ã‚¿ãƒ¼ãƒãƒƒãƒˆ
   ã§ã¯ãªã)を実行ã—ã¦ã„ã‚‹å ´åˆã€åˆã¯å¾Œã§è©³ç´°ãª
   ファイアウォール設定を計画ã—ã¦ã„ã‚‹å ´åˆã®ã¿ã«
   é¸æŠžã—ã¦ãã ã•ã„。

   有効 -- 「有効ã€ã‚’é¸æŠžã™ã‚‹ã¨ã€ã‚·ã‚¹ãƒ†ãƒ ã¯ãƒ¦ãƒ¼ã‚¶ãƒ¼ãŒ
   明示的ã«å®šç¾©ã—ã¦ã„ãªã„外部ã‹ã‚‰ã®æŽ¥ç¶šã‚’
   å—付ã¾ã›ã‚“。

   ユーザーãŒã‚·ã‚¹ãƒ†ãƒ ã‚’インターãƒãƒƒãƒˆã«æŽ¥ç¶šã—ã¦ã„ã¦
   サーãƒãƒ¼ã‚’実行ã™ã‚‹äºˆå®šãŒãªã„å ´åˆã€ã“ã‚ŒãŒæœ€ã‚‚
   安全ãªé¸æŠžã§ã™ã€‚追加ã®ã‚µãƒ¼ãƒ“スãŒå¿…è¦ãªå ´åˆã¯
   ファイアウォール通éŽã‚’許å¯ã™ã‚‹ç‰¹å®šã®ã‚µãƒ¼ãƒ“スを
   é¸æŠžã™ã‚‹ã‚«ã‚¹ã‚¿ãƒžã‚¤ã‚ºã‚’ã™ã‚‹ã‹ã€åˆã¯ä¸€å®šã®ã‚¤ãƒ³ã‚¿ãƒ¼
   フェイス上ã§åˆ°ç€ã™ã‚‹é€šä¿¡ã‚’ä¿¡é ¼ã™ã‚‹ã‚ˆã†ã«ã—ã¾ã™ã€‚

   インターãƒãƒƒãƒˆãªã©ã®å…¬é–‹ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã«
   接続ã•れã¦ã„るデãƒã‚¤ã‚¹ç”¨ã«ã“れを有効ã«ã™ã‚‹
   ã“ã¨ã¯æŽ¨å¥¨ã§ãã¾ã›ã‚“。

   ä¿¡é ¼ã§ãるデãƒã‚¤ã‚¹ -- デãƒã‚¤ã‚¹ä¸Šã§ã“れらをãƒã‚§ãƒƒã‚¯
   ã™ã‚‹ã¨ãã®ãƒ‡ãƒã‚¤ã‚¹ã‹ã‚‰ã®å…¨ã¦ã®é€šä¿¡ã¯è¨±å¯ã•れã¾ã™ã€‚
   例ãˆã°ãƒ­ãƒ¼ã‚«ãƒ«ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã‚’実行ã—ã¦ã„ã¦PPPを通ã˜ã¦
   インターãƒãƒƒãƒˆã«æŽ¥ç¶šã—ã¦ã„ã‚‹å ´åˆã€eth0ã«
   ãƒã‚§ãƒƒã‚¯ã‚’入れã¦ä¿¡é ¼ã—ã€
   ローカルãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã‹ã‚‰ã®é€šä¿¡ã‚’å…¨ã¦è¨±å¯ã™ã‚‹
   ã“ã¨ãŒã§ãã¾ã™ã€‚

 <TAB>/<Alt-TAB> エレメント移動     |   <SPACE> é¸æŠž     |   <F12> 次ã®ç”»é¢'enforcing' ã‹ 'permissive' ã‹ 'disabled'ファイアウォールã¯è¨±å¯ã•れãªã„ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã®ä¾µå…¥ã«å¯¾ã™ã‚‹é˜²å¾¡ã‚’ã—ã¾ã™ã€‚ファイアウォールを有効ã«ã™ã‚‹ã¨å…¨ã¦ã®å…¥ä¿¡ã™ã‚‹æŽ¥ç¶šã‚’阻止ã—ã¾ã™ã€‚ファイアウォールを無効ã«ã™ã‚‹ã¨å…¨ã¦ã®æŽ¥ç¶šã‚’許å¯ã—ã¾ã™ã®ã§ã€æŽ¨å¥¨ã§ãã¾ã›ã‚“。ãƒãƒ¼ãƒˆã®è¿½åŠ æŒ‡å®šã®ãƒ‡ãƒã‚¤ã‚¹ä¸Šã§å…¨ã¦ã®ãƒˆãƒ©ãƒ•ィックを許å¯å—信を許å¯:特定ã®ãƒãƒ¼ãƒˆã«ãƒ•ァイアウォール通éŽã‚’許å¯ä¸‹ä½äº’æ›ã€--enabled ã¸ã®ã‚¨ã‚¤ãƒªã‚¢ã‚¹ä¸‹ä½äº’æ›ã€ç„¡è¦–ã•れã¾ã—ãŸå–り消ã—ã“ã® SELinux ã®è¨­å®šã‚’変更ã™ã‚‹ã«ã¯ã€å…¨ã¦ã®ãƒ•ァイルシステムãŒãƒªãƒ©ãƒ™ãƒ«ã•れるよã†ã«ã‚·ã‚¹ãƒ†ãƒ ã®å†èµ·å‹•ãŒå¿…è¦ã§ã™ã€‚リラベルã¯ãƒ•ァイルシステムã«ã‚ˆã£ã¦ã¯æ™‚é–“ãŒã‹ã‹ã‚‹ã“ã¨ãŒã‚りã¾ã™ã€‚ã“ã®è¨­å®šã§ç¶šã‘ã¦ã€ firstboot ãŒå®Œäº†ã—ãŸå¾Œã«ã‚·ã‚¹ãƒ†ãƒ ã‚’å†èµ·å‹•ã—ã¾ã™ã‹?SELinux を有効ã«ã™ã‚‹ã«ã¯æ¬¡å›žã®èµ·å‹•ã§å…¨ã¦ã®ãƒ•ァイルシステムã®ãƒªãƒ©ãƒ™ãƒ«ãŒå¿…è¦ã«ãªã‚Šã¾ã™ã€‚リラベルã¯ãƒ•ァイルシステムã®å¤§ãã•ã«ã‚ˆã£ã¦ã¯æ™‚é–“ãŒã‹ã‹ã‚Šã¾ã™ã€‚ç¶šã‘ã¾ã™ã‹?[ã¯ã„]ã®ãƒœã‚¿ãƒ³ã‚’クリックã™ã‚‹ã¨ã€ã‚·ã‚¹ãƒ†ãƒ ã®ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ¬ãƒ™ãƒ«ã‚’設定ã—ã¦æ—¢å­˜ã®ãƒ•ァイアウォール設定を上書ãã—ã¾ã™ã€‚本当ã«ã“ã®æ“作をã—ãŸã„ã§ã™ã‹?SELinux ã®è¨­å®šSELinux ãƒãƒªã‚·ãƒ¼ã®è¨­å®šãƒ•ァイアウォールを設定ã—ã¦ã‚‚作動ã•ã›ãªã„システムã®ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ¬ãƒ™ãƒ«ã¨ãƒ•ァイヤーウォールルールã®è¨­å®šã‚«ã‚¹ã‚¿ãƒžã‚¤ã‚ºiptable モジュールを無効ã«ã™ã‚‹ãƒ•ァイアウォールを無効ã«ã™ã‚‹ç„¡åйiptable モジュールを有効ã«ã™ã‚‹ãƒ•ァイアウォールを有効ã«ã™ã‚‹ (デフォルト)有効EnforcingFTPファイアウォールファイアウォールã®è¨­å®šãƒ•ァイアウォール設定 - カスタマイズファイアウォールã®ã‚«ã‚¹ã‚¿ãƒžã‚¤ã‚ºãƒ•ァイアウォール:無効ãªãƒãƒ¼ãƒˆãŒä¸Žãˆã‚‰ã‚Œã¾ã—ãŸ: '%s'。ãƒãƒ¼ãƒˆãƒŠãƒ³ãƒãƒ¼ã‹ã‚µãƒ¼ãƒ“スåを指定ã—ã¦ãã ã•ã„。マスカレードデãƒã‚¤ã‚¹:メール(SMTP)マスカレード指定ã®ãƒ‡ãƒã‚¤ã‚¹ã‹ã‚‰ã®ãƒˆãƒ©ãƒ•ィックをマスカレードã™ã‚‹NFS4åå‰OKOKãã®ä»–ã®ãƒãƒ¼ãƒˆPermissiveã“ã®ã‚·ã‚¹ãƒ†ãƒ ç”¨ã®ã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ¬ãƒ™ãƒ«ã‚’é¸æŠžã—ã¦ãã ã•ã„。ãƒãƒ¼ãƒˆ:プロトコル:éžå¯¾è©±çš„ã«å®Ÿè¡Œ; コマンドラインã®å¼•æ•°ã®ã¿ã‚’処ç†ã™ã‚‹SELinuxSELinux 設定:SSHSambaSecure WWW (HTTPS)セキュリティ拡張 Linux (SELinux) ã¯ä¼çµ±çš„㪠Linux ã®ã‚·ã‚¹ãƒ†ãƒ ã§ä½¿ç”¨ã§ãる以上㮠finger 許å¯ã•れãŸã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£åˆ¶å¾¡ã‚’æä¾›ã—ã¾ã™ã€‚無効ã®çŠ¶æ…‹ã€æ‹’å¦ã—ã¦ã„ã‚‹ã‚‚ã®ã«å¯¾ã—ã¦ã®è­¦å‘Šã®ã¿ã®çŠ¶æ…‹ã€ãã—ã¦å®Œå…¨ã«ã‚¢ã‚¯ãƒ†ã‚£ãƒ–ãªçŠ¶æ…‹ã«è¨­å®šã™ã‚‹ã“ã¨ã‚‚ã§ãã¾ã™ã€‚ã»ã¨ã‚“ã©ã®äººã¯ãƒ‡ãƒ•ォルトã®è¨­å®šã«ã—ã¦ãŠãã¹ãã§ã™ã€‚セキュリティレベルã®è¨­å®šã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ¬ãƒ™ãƒ«ã¨ãƒ•ァイヤーウォールã®è¨­å®šã‚»ã‚­ãƒ¥ãƒªãƒ†ã‚£ãƒ¬ãƒ™ãƒ«:Telnetä¿¡é ¼ã§ãã‚‹ä¿¡é ¼ã§ãるデãƒã‚¤ã‚¹:ä¿¡é ¼ã§ãるサービス:通常㯠'targeted' ã‹ 'strict' ã§ã™WWW (HTTP)2ã¤ã®æ–¹æ³•ã§ãƒ•ァイアウォールをカスタマイズã™ã‚‹ã“ã¨ãŒã§ãã¾ã™ã€‚1ã¤ã¯ã€ç‰¹å®šã®ãƒãƒƒãƒˆãƒ¯ãƒ¼ã‚¯ã‚¤ãƒ³ã‚¿ãƒ¼ãƒ•ェースã‹ã‚‰ã®å…¨ã¦ã®ãƒˆãƒ©ãƒ•ィックを許å¯ã™ã‚‹ã‚ˆã†é¸æŠžã™ã‚‹ã“ã¨ã§ã™ã€‚2ã¤ç›®ã¯ã€æ˜Žç¤ºçš„ã«ãƒ•ァイアウォールを通éŽã•ã›ã‚‹ç‰¹å®šã®ãƒ—ロトコルã®è¨±å¯ã§ã™ã€‚「imap:tcpã€ã®æ§˜ãªã€Œã‚µãƒ¼ãƒ“ス:プロトコルã€ã®å½¢å¼ã§è¿½åŠ ã®ãƒãƒ¼ãƒˆã‚’指定ã—ã¾ã™ã€‚ä»–ã®ã‚³ãƒ³ãƒ”ューターã‹ã‚‰ã‚ãªãŸã®ã‚³ãƒ³ãƒ”ãƒ¥ãƒ¼ã‚¿ãƒ¼ã§æŒ‡å®šã—ãŸã‚µãƒ¼ãƒ“スã®ã‚¢ã‚¯ã‚»ã‚¹ã‚’許å¯ã™ã‚‹ã‚ˆã†ã«ãƒ•ァイヤーウォールを使ã†ã“ã¨ãŒã§ãã€å¤–部ã‹ã‚‰ã®èªè¨¼ã•れã¦ã„ãªã„アクセスを防ãã“ã¨ãŒã§ãã¾ã™ã€‚ã©ã®ã‚µãƒ¼ãƒ“スã€ã¾ãŸã¯å…¨ã¦ã€ã®ã‚¢ã‚¯ã‚»ã‚¹ã‚’許å¯ã—ã¾ã™ã‹?ファイアウォールã®ã‚ªãƒ—ション(_F)SELinux(_S)マスカレードã™ã‚‹ãƒ‡ãƒã‚¤ã‚¹ä¿¡é ¼ã™ã‚‹ãƒ‡ãƒã‚¤ã‚¹/etc/sysconfig/system-config-securitylevel ã®ä¸­ã®è¨­å®šã‚’無視ã™ã‚‹è¿½åŠ ã™ã‚‹ãƒ¢ã‚¸ãƒ¥ãƒ¼ãƒ«å‰Šé™¤ã™ã‚‹ãƒ¢ã‚¸ãƒ¥ãƒ¼ãƒ«ãƒãƒ¼ãƒˆ:プロトコル (例 ssh:tcp)

Anon7 - 2021