Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/documentation/articlesfiltering-bridges_index/tr_TR/units/?format=api&page=2
HTTP 200 OK
Allow: GET, POST, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 61,
    "next": null,
    "previous": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/units/?format=api",
    "results": [
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "Configuring firewalls and filtering on FreeBSD hosts acting as bridges rather than routers"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -1282506874399937174,
            "content_hash": -1282506874399937174,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:1",
            "context": "",
            "note": "type: YAML Front Matter: description",
            "flags": "no-wrap",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 1,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 13,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1177224/?format=api",
            "priority": 100,
            "id": 1177233,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=6e339ecaf1652d6a",
            "url": "https://translate-dev.freebsd.org/api/units/1177233/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-03T22:12:28.028644Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "# TCP section\n# Allow SSH\nadd pass tcp from any to any 22 in via fxp0 setup keep-state\n# Allow SMTP only towards the mail server\nadd pass tcp from any to relay 25 in via fxp0 setup keep-state\n# Allow zone transfers only by the secondary name server [dns2.nic.it]\nadd pass tcp from 193.205.245.8 to ns 53 in via fxp0 setup keep-state\n# Pass ident probes.  It is better than waiting for them to timeout\nadd pass tcp from any to any 113 in via fxp0 setup keep-state\n# Pass the \"quarantine\" range\nadd pass tcp from any to any 49152-65535 in via fxp0 setup keep-state\n"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8780147626945206822,
            "content_hash": -8780147626945206822,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:234",
            "context": "",
            "note": "type: delimited block . 4",
            "flags": "no-wrap",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 47,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 108,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1248628/?format=api",
            "priority": 100,
            "id": 1248637,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=0626a640a47125da",
            "url": "https://translate-dev.freebsd.org/api/units/1248637/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-07-24T15:15:31.153721Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "Now it is necessary to build and install the new kernel.  You may find detailed instructions in the extref:{handbook}[Building and Installing a Custom Kernel, kernelconfig-building] section of the FreeBSD Handbook."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2639712093697513971,
            "content_hash": 2639712093697513971,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:100",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 18,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 30,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1254794/?format=api",
            "priority": 100,
            "id": 1254811,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=a4a22429d62499f3",
            "url": "https://translate-dev.freebsd.org/api/units/1254811/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-11-05T02:43:33.103800Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "Often it is useful to divide one physical network (like an Ethernet) into two separate segments without having to create subnets, and use a router to link them together.  The device that connects the two networks in this way is called a bridge.  A FreeBSD system with two network interfaces is enough to act as a bridge."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4448588574366821498,
            "content_hash": 4448588574366821498,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:48",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 4,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 57,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1574258/?format=api",
            "priority": 100,
            "id": 1574342,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=bdbc8fbd1efeec7a",
            "url": "https://translate-dev.freebsd.org/api/units/1574342/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2023-05-21T18:17:04.962329Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "Before going on, be sure to have at least two Ethernet cards that support the promiscuous mode for both reception and transmission, since they must be able to send Ethernet packets with any address, not just their own.  Moreover, to have a good throughput, the cards should be PCI bus mastering cards.  The best choices are still the Intel EtherExpress(TM) Pro, followed by the 3Com(R) 3c9xx series.  To simplify the firewall configuration it may be useful to have two cards of different manufacturers (using different drivers) to distinguish clearly which interface is connected to the router and which to the inner network."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -1562895095424417697,
            "content_hash": -1562895095424417697,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:82",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 13,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 102,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1574260/?format=api",
            "priority": 100,
            "id": 1574343,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=6a4f7b30f807005f",
            "url": "https://translate-dev.freebsd.org/api/units/1574343/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2023-05-21T18:17:04.964050Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "Before rebooting to load the new kernel or the required modules (according to the previously chosen installation method), you have to make some changes to the [.filename]#/etc/rc.conf# configuration file.  The default rule of the firewall is to reject all IP packets.  Initially we will set up an `open` firewall, to verify its operation without any issue related to packet filtering (in case you are going to execute this procedure remotely, such configuration will avoid you to remain isolated from the network).  Put these lines in [.filename]#/etc/rc.conf#:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3752317852802856788,
            "content_hash": 3752317852802856788,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:121",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 24,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 86,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1574262/?format=api",
            "priority": 100,
            "id": 1574344,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=b412e934dcabb754",
            "url": "https://translate-dev.freebsd.org/api/units/1574344/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2023-05-21T18:17:04.965580Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "There is another important thing to know.  When running IP over Ethernet, there are actually two Ethernet protocols in use: one is IP, the other is ARP.  ARP does the conversion of the IP address of a host into its Ethernet address (MAC layer).  To allow the communication between two hosts separated by the bridge, it is necessary that the bridge will forward ARP packets.  Such protocol is not included in the IP layer, since it exists only with IP over Ethernet.  The FreeBSD firewall filters exclusively on the IP layer and therefore all non-IP packets (ARP included) will be forwarded without being filtered, even if the firewall is configured to not permit anything."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8952270363688838775,
            "content_hash": -8952270363688838775,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:144",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 28,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 114,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1574264/?format=api",
            "priority": 100,
            "id": 1574345,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=03c325890f11d989",
            "url": "https://translate-dev.freebsd.org/api/units/1574345/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2023-05-21T18:17:04.966630Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "At this point you should be able to insert the machine between two sets of hosts without compromising any communication abilities between them.  If so, the next step is to add the `net.link.ether.bridge._[blah]_=_[blah]_` portions of these rows to the [.filename]#/etc/sysctl.conf# file, to have them execute at startup."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -1010736046034468939,
            "content_hash": -1010736046034468939,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:165",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 35,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 47,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1574266/?format=api",
            "priority": 100,
            "id": 1574346,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=71f924ebd66ebfb5",
            "url": "https://translate-dev.freebsd.org/api/units/1574346/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2023-05-21T18:17:04.967773Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "Now it is time to create your own file with custom firewall rules, to secure the inside network.  There will be some complication in doing this because not all of the firewall functionalities are available on bridged packets.  Furthermore, there is a difference between the packets that are in the process of being forwarded and packets that are being received by the local machine.  In general, incoming packets are run through the firewall only once, not twice as is normally the case; in fact they are filtered only upon receipt, so rules that use `out` or `xmit` will never match.  Personally, I use `in via` which is an older syntax, but one that has a sense when you read it.  Another limitation is that you are restricted to use only `pass` or `drop` commands for packets filtered by a bridge.  Sophisticated things like `divert`, `forward` or `reject` are not available.  Such options can still be used, but only on traffic to or from the bridge machine itself (if it has an IP address)."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2860231474076980973,
            "content_hash": -2860231474076980973,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:177",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 37,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 173,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1574268/?format=api",
            "priority": 100,
            "id": 1574347,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=584e6aa0e43fe913",
            "url": "https://translate-dev.freebsd.org/api/units/1574347/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2023-05-21T18:17:04.968527Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "There are two rules for passing SMTP and DNS traffic towards the mail server and the name server, if you have them.  Obviously the whole rule set should be flavored to personal taste, this is only a specific example (rule format is described accurately in the man:ipfw[8] man page).  Note that for \"relay\" and \"ns\" to work, name service lookups must work _before_ the bridge is enabled.  This is an example of making sure that you set the IP on the correct network card.  Alternatively it is possible to specify the IP address instead of the host name (required if the machine is IP-less)."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8349429170536350280,
            "content_hash": -8349429170536350280,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:273",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 55,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 104,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1574270/?format=api",
            "priority": 100,
            "id": 1574348,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=0c20de6814e57db8",
            "url": "https://translate-dev.freebsd.org/api/units/1574348/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2023-05-21T18:17:04.970351Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/articlesfiltering-bridges_index/tr_TR/?format=api",
            "source": [
                "New in FreeBSD 4.0, is the concept of stateful filtering.  This is a big improvement for UDP traffic, which typically is a request going out, followed shortly thereafter by a response with the same set of IP addresses and port numbers (but with source and destination reversed, of course).  For firewalls that have no statekeeping, there is almost no way to deal with this sort of traffic as a single session.  But with a firewall that can \"remember\" an outgoing UDP packet and, for the next few minutes, allow a response, handling UDP services is trivial.  The following example shows how to do it.  It is possible to do the same thing with TCP packets.  This allows you to avoid some denial of service attacks and other nasty tricks, but it also typically makes your state table grow quickly in size."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -954341307957279448,
            "content_hash": -954341307957279448,
            "location": "documentation/content/en/articles/filtering-bridges/_index.adoc:185",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 38,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 141,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1615920/?format=api",
            "priority": 100,
            "id": 1615932,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/articlesfiltering-bridges_index/tr_TR/?checksum=72c17fa300b98528",
            "url": "https://translate-dev.freebsd.org/api/units/1615932/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2024-01-18T00:33:08.863169Z"
        }
    ]
}