Translation status

382 Strings 100% Translate
10,602 Words 100%

Other components

Component Translated Untranslated Untranslated words Checks Suggestions Comments
Book_Info This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0
04_installation This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0
11_network-services This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0
02_case-study This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0
05_packaging-system This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0 1
99_backcover This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0
90_derivative-distributions This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0
debian-handbook This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0
08_basic-configuration This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0
01_the-debian-project This component is linked to the Debian Handbook/12_advanced-administration repository. Fix this component to clear its alerts. GPL-2.0

Translation Information

Project website debian-handbook.info
Instructions for translators

https://debian-handbook.info/contribute/ Mailing list for translators: <<debian-handbook-translators@lists.alioth.debian.org>

Project maintainers User avatar rhertzog User avatar pere
Translation process
  • Translations can be made directly.
  • Translation suggestions can be made.
  • Any authenticated user can contribute.
  • The translation uses bilingual files.
Translation license GNU General Public License v2.0 or later
Source code repository https://salsa.debian.org/hertzog/debian-handbook.git
Repository branch buster/master
Last remote commit fr-FR: Translated using Weblate. 109bba20
User avatar pere authored 2 weeks ago
Weblate repository https://hosted.weblate.org/git/debian-handbook/12_advanced-administration/
Filemask */10_network-infrastructure.po
Translation file es-ES/10_network-infrastructure.po
<acronym>OSPF</acronym> (Open Shortest Path First) is generally the best protocol to use for dynamic routing on private networks, but <acronym>BGP</acronym> (Border Gateway Protocol) is more common for Internet-wide routing. <acronym>RIP</acronym> (Routing Information Protocol) is rather ancient, and hardly used anymore.
<acronym>OSPF (</acronym> (Open Shortest Path First</acronym>) es generalmente el mejor protocolo a utilizar para el enrutamiento dinámico en redes privadas pero BGP (<<acronym>BGP</acronym> (Border Gateway Protocol</acronym>) es maś común para enrutamiento en Internet. RIP (<<acronym>RIP</acronym> (Routing Information Protocol</acronym>) es bastante arcaico y rara vez utilizado en la actualidad.
4 months ago
Daemons are enabled by creating the <filename>/etc/quagga/<replaceable>daemon</replaceable>.conf</filename> config file, daemon being the name of the daemon to use; this file must belong to the <literal>quagga</literal> user and group in order for the <filename>/etc/init.d/zebra</filename> script to invoke the daemon. The package <emphasis role="pkg">quagga-core</emphasis> provides configuration examples under <filename>/usr/share/doc/quagga-core/examples/</filename>.
Los demonios se activan creando el archivo de configuración <filename>/etc/quagga/<replaceable>demonio</replaceable>.conf</filename>, siendo demonio el nombre del demonio a utilizar; este archivo debe pertenecer al usuario y grupo <literal>quagga</literal> para que el <foreignphrase>script</foreignphrase> <filename>/etc/init.d/zebra</filename> pueda invocar al demonio. El paquete <emphasis role="pkg">quagga-core</emphasis> proporciona ejemplos de configuración en <filename>/usr/share/doc/quagga-core/examples/</filename>.
4 months ago
New strings to translate 4 months ago
Resource update 4 months ago
User avatar None

Source string changed

Debian Handbook / 10_network-infrastructureSpanish

<acronym>OSPF (</acronym> (Open Shortest Path First</acronym>) is generally the best protocol to use for dynamic routing on private networks, but BGP (<<acronym>BGP</acronym> (Border Gateway Protocol</acronym>) is more common for Internet-wide routing. RIP (<<acronym>RIP</acronym> (Routing Information Protocol</acronym>) is rather ancient, and hardly used anymore.
4 months ago
User avatar None

Source string changed

Debian Handbook / 10_network-infrastructureSpanish

Daemons are enabled by creating the <filename>/etc/quagga/<replaceable>daemon</replaceable>.conf</filename> config file, daemon being the name of the daemon to use; this file must belong to the <literal>quagga</literal> user and group in order for the <filename>/etc/init.d/zebra</filename> script to invoke the daemon. The package <emphasis role="pkg">quagga-core</emphasis> provides configuration examples under <filename>/usr/share/doc/quagga-core/examples/</filename>.
4 months ago
The certificate can now be created, as well as the Diffie-Hellman parameters required for the server side of an SSL/TLS connection. They want to use it for a VPN server (see section <xref linkend="sect.virtual-private-network" />) that is identified by the DNS name <literal>vpn.falcot.com</literal>; this name is re-used for the generated key files (<filename>keys/vpn.falcot.com.crt</filename> for the public certificate, <filename>keys/vpn.falcot.com.key</filename> for the private key):
Ahora puede crear el certificado, así como también los parámetros Diffie-Hellman necesarios en el servidor para la conexión SSL/TLS. Quieren usarlo para un servidor VPN (consulte la sección <xref linkend="sect.virtual-private-network" />) identificado cor el nombre DNS <literal>vpn.falcot.com</literal>; se reutiliza este nombre para los archivos de llaves generados (<filename>keys/vpn.falcot.com.crt</filename> para el certificado público, <filename>keys/vpn.falcot.com.key</filename> para la llave privada):
4 months ago

<computeroutput># </computeroutput><userinput>nmap mirtuel</userinput>
<computeroutput>
Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 21:05 CET
Nmap scan report for mirtuel (192.168.1.242)
Host is up (0.000013s latency).
rDNS record for 192.168.1.242: mirtuel.internal.placard.fr.eu.org
Not shown: 998 closed ports
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind

Nmap done: 1 IP address (1 host up) scanned in 2.41 seconds
# </computeroutput><userinput>nmap -A localhost</userinput>
<computeroutput>
Starting Nmap 7.70 ( https://nmap.org ) at 2019-06-30 21:17 CEST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000039s latency).
Other addresses for localhost (not scanned): ::1
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.9p1 Debian 10 (protocol 2.0)
| ssh-hostkey:
| 2048 33:a1:d8:b1:e5:5b:b2:0d:15:1b:8e:76:7f:e4:d7:3d (RSA)
| 256 8f:83:cf:fa:b3:58:54:9a:1d:1b:4c:db:b1:e2:58:76 (ECDSA)
|_ 256 fa:3d:58:62:49:92:93:90:52:fe:f4:26:ca:dc:4c:40 (ED25519)
25/tcp open smtp Exim smtpd 4.92
| smtp-commands: mirtuel Hello localhost [127.0.0.1], SIZE 52428800, 8BITMIME, PIPELINING, CHUNKING, PRDR, HELP,
|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
631/tcp open ipp CUPS 2.2
| http-methods:
|_ Potentially risky methods: PUT
| http-robots.txt: 1 disallowed entry
|_/
|_http-server-header: CUPS/2.2 IPP/2.1
|_http-title: Home - CUPS 2.2.10
Device type: general purpose
Running: Linux 3.X
OS CPE: cpe:/o:linux:linux_kernel:3
OS details: Linux 3.7 - 3.10
Network Distance: 0 hops
Service Info: Host: debian; OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.33 seconds
</computeroutput>

<computeroutput># </computeroutput><userinput>nmap mirtuel</userinput>
<computeroutput>
Starting Nmap 6.477.70 ( https://nmap.org ) at 20159-03-09 16:466-30 21:05 CET
Nmap scan report for mirtuel (192.168.1.242)
Host is up (0.000013s latency).
rDNS record for 192.168.1.242: mirtuel.internal.placard.fr.eu.org
Not shown: 998 closed ports
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind

Nmap done: 1 IP address (1 host up) scanned in 2.41 seconds
# </computeroutput><userinput>nmap -A localhost</userinput>
<computeroutput>
Starting Nmap 6.477.70 ( https://nmap.org ) at 20159-03-09 16:466-30 21:17 CEST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.0000139s latency).
Other addresses for localhost (not scanned): 127.0.0.::1
Not shown: 997 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 6.77.9p1 Debian 310 (protocol 2.0)
|_ ssh-hostkey: ERROR: Script execution failed (use -d to debug
| 2048 33:a1:d8:b1:e5:5b:b2:0d:15:1b:8e:76:7f:e4:d7:3d (RSA)
| 256 8f:83:cf:fa:b3:58:54:9a:1d:1b:4c:db:b1:e2:58:76 (ECDSA)
|_ 256 fa:3d:58:62:49:92:93:90:52:fe:f4:26:ca:dc:4c:40 (ED25519
)
25/tcp open smtp Exim smtpd 4.8492
| smtp-commands: mirtuel Hello localhost [127.0.0.1], SIZE 52428800, 8BITMIME, PIPELINING, CHUNKING, PRDR, HELP,
|_ Commands supported: AUTH HELO EHLO MAIL RCPT DATA BDAT NOOP QUIT RSET HELP
11631/tcp open rpcbind 2-4 (RPC #100000)
| rpcinfo
ipp CUPS 2.2
| http-methods
:
|_ program version port/proto service
| 100000 2,3,4 111/tcp rpcbind
| 100000 2,3,4 111/udp rpcbind
| 100024 1 36568/tcp status
|_ 100024 1 39172/udp status
Potentially risky methods: PUT
| http-robots.txt: 1 disallowed entry
|_/
|_http-server-header: CUPS/2.2 IPP/2.1
|_http-title: Home - CUPS 2.2.10

Device type: general purpose
Running: Linux 3.X
OS CPE: cpe:/o:linux:linux_kernel:3
OS details: Linux 3.7 - 3.150
Network Distance: 0 hops
Service Info: Host: mirtueldebian; OS: Linux; CPE: cpe:/o:linux:linux_kernel

OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.542.33 seconds
</computeroutput>
4 months ago

<computeroutput>$ </computeroutput><userinput>./easyrsa build-client-full JoeSmith nopass
</userinput><computeroutput>
Note: using Easy-RSA configuration from: ./vars

Using SSL: openssl OpenSSL 1.1.1d 10 Sep 2019
Generating a RSA private key
.......................................................+++++
...........................+++++
writing new private key to '/root/pki-falcot/pki/private/JoeSmith.key.Tgr8kk0a6a'
-----
Using configuration from /root/pki-falcot/pki/safessl-easyrsa.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName :ASN.1 12:'JoeSmith'
Certificate is to be certified until Feb 20 04:52:43 2023 GMT (1080 days)

Write out database with 1 new entries
Data Base Updated
</computeroutput>

<computeroutput>$ </computeroutput><userinput>./easyrsa build-client-full JoeSmith nopass
</userinput><computeroutput>
Note: using Easy-RSA configuration from: ./vars

Using SSL: openssl OpenSSL 1.1.1d 10 Sep 2019
Generating a RSA private key
.......................................................+++++
...........................+++++
writing new private key to '/root/pki-falcot/pki/private/JoeSmith.key.Tgr8kk0a6a'
-----
Using configuration from /root/pki-falcot/pki/safessl-easyrsa.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName :ASN.1 12:'JoeSmith'
Certificate is to be certified until Feb 20 04:52:43 2023 GMT (1080 days)

Write out database with 1 new entries
Data Base Updated
</computeroutput>
4 months ago

<computeroutput>$ </computeroutput><userinput>./easyrsa gen-req vpn.falcot.com nopass
</userinput><computeroutput>Note: using Easy-RSA configuration from: ./vars

Using SSL: openssl OpenSSL 1.1.1b 26 Feb 2019
Generating a RSA private key
.................................................................................+++++
........+++++
writing new private key to '/home/roland/pki-falcot/pki/private/vpn.falcot.com.key.E5c3RGJBUd'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Common Name (eg: your user, host, or server name) [vpn.falcot.com]:

Keypair and certificate request completed. Your files are:
req: /home/roland/pki-falcot/pki/reqs/vpn.falcot.com.req
key: /home/roland/pki-falcot/pki/private/vpn.falcot.com.key

$ </computeroutput><userinput>./easyrsa sign-req server vpn.falcot.com
</userinput><computeroutput>
Note: using Easy-RSA configuration from: ./vars

Using SSL: openssl OpenSSL 1.1.1b 26 Feb 2019


You are about to sign the following certificate.
Please check over the details shown below for accuracy. Note that this request
has not been cryptographically verified. Please be sure it came from a trusted
source or that you have verified the request checksum with the sender.

Request subject, to be signed as a server certificate for 1080 days:

subject=
commonName = vpn.falcot.com


Type the word 'yes' to continue, or any other input to abort.
Confirm request details: <userinput>yes
</userinput>Using configuration from /home/roland/pki-falcot/pki/safessl-easyrsa.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName :ASN.1 12:'vpn.falcot.com'
Certificate is to be certified until Jun 14 10:44:44 2022 GMT (1080 days)

Write out database with 1 new entries
Data Base Updated

Certificate created at: /home/roland/pki-falcot/pki/issued/vpn.falcot.com.crt

$ </computeroutput><userinput>./easyrsa gen-dh
</userinput><computeroutput>
Note: using Easy-RSA configuration from: ./vars

Using SSL: openssl OpenSSL 1.1.1b 26 Feb 2019
Generating DH parameters, 2048 bit long safe prime, generator 2
This is going to take a long time
[…]
DH parameters of size 2048 created at /home/roland/pki-falcot/pki/dh.pem

</computeroutput>

<computeroutput>$ </computeroutput><userinput>./easyrsa gen-req vpn.falcot.com nopass
</userinput><computeroutput>Note: using Easy-RSA configuration from: ./vars

Using SSL: openssl OpenSSL 1.1.1b 26 Feb 2019
Generating a RSA private key
.................................................................................+++++
........+++++
writing new private key to '/home/roland/pki-falcot/pki/private/vpn.falcot.com.key.E5c3RGJBUd'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Common Name (eg: your user, host, or server name) [vpn.falcot.com]:

Keypair and certificate request completed. Your files are:
req: /home/roland/pki-falcot/pki/reqs/vpn.falcot.com.req
key: /home/roland/pki-falcot/pki/private/vpn.falcot.com.key

$ </computeroutput><userinput>./easyrsa sign-req server vpn.falcot.com
</userinput><computeroutput>
Note: using Easy-RSA configuration from: ./vars

Using SSL: openssl OpenSSL 1.1.1b 26 Feb 2019


You are about to sign the following certificate.
Please check over the details shown below for accuracy. Note that this request
has not been cryptographically verified. Please be sure it came from a trusted
source or that you have verified the request checksum with the sender.

Request subject, to be signed as a server certificate for 1080 days:

subject=
commonName = vpn.falcot.com


Type the word 'yes' to continue, or any other input to abort.
Confirm request details: <userinput>yes
</userinput>Using configuration from /home/roland/pki-falcot/pki/safessl-easyrsa.cnf
Check that the request matches the signature
Signature ok
The Subject's Distinguished Name is as follows
commonName :ASN.1 12:'vpn.falcot.com'
Certificate is to be certified until Jun 14 10:44:44 2022 GMT (1080 days)

Write out database with 1 new entries
Data Base Updated

Certificate created at: /home/roland/pki-falcot/pki/issued/vpn.falcot.com.crt

$ </computeroutput><userinput>./easyrsa gen-dh
</userinput><computeroutput>
Note: using Easy-RSA configuration from: ./vars

Using SSL: openssl OpenSSL 1.1.1b 26 Feb 2019
Generating DH parameters, 2048 bit long safe prime, generator 2
This is going to take a long time
[…]
DH parameters of size 2048 created at /home/roland/pki-falcot/pki/dh.pem

</computeroutput>
4 months ago
Browse all translation changes

Statistics

Percent Strings Words Chars
Total 382 10,602 86,072
Translated 100% 382 10,602 86,072
Needs editing 0% 0 0 0
Failing checks 0% 0 0 0

Last activity

Last change Aug. 28, 2020, 3:06 p.m.
Last author Jorge Maldonado Ventura

Daily activity

Daily activity

Weekly activity

Weekly activity