Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/documentation/bookshandbookfirewalls_index/en/units/?format=api&page=13
HTTP 200 OK
Allow: GET, POST, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 711,
    "next": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/units/?format=api&page=14",
    "previous": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/units/?format=api&page=12",
    "results": [
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "`on`: must be followed by the interface name as displayed by man:ifconfig[8].  The rule will only match if the packet is going through the specified interface in the specified direction."
            ],
            "previous_source": "",
            "target": [
                "`on`: must be followed by the interface name as displayed by man:ifconfig[8].  The rule will only match if the packet is going through the specified interface in the specified direction."
            ],
            "id_hash": 8576581672088349555,
            "content_hash": 8576581672088349555,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1980",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 529,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 30,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220010/?format=api",
            "priority": 100,
            "id": 1220010,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=f70623970ff3ab73",
            "url": "https://translate-dev.freebsd.org/api/units/1220010/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:01.760750Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Additional options are available to specify error return messages.  Refer to man:ipf[5] for more details."
            ],
            "previous_source": "",
            "target": [
                "Additional options are available to specify error return messages.  Refer to man:ipf[5] for more details."
            ],
            "id_hash": 1282332911212647973,
            "content_hash": 1282332911212647973,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1989",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 533,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 15,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220012/?format=api",
            "priority": 100,
            "id": 1220012,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=91cbc2fd189f5625",
            "url": "https://translate-dev.freebsd.org/api/units/1220012/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:01.965815Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The protocol type is optional.  However, it is mandatory if the rule needs to specify a SRC_PORT or a DST_PORT as it defines the type of protocol.  When specifying the type of protocol, use the `proto` keyword followed by either a protocol number or name from [.filename]#/etc/protocols#.  Example protocol names include `tcp`, `udp`, or `icmp`.  If PROTO_TYPE is specified but no SRC_PORT or DST_PORT is specified, all port numbers for that protocol will match that rule."
            ],
            "previous_source": "",
            "target": [
                "The protocol type is optional.  However, it is mandatory if the rule needs to specify a SRC_PORT or a DST_PORT as it defines the type of protocol.  When specifying the type of protocol, use the `proto` keyword followed by either a protocol number or name from [.filename]#/etc/protocols#.  Example protocol names include `tcp`, `udp`, or `icmp`.  If PROTO_TYPE is specified but no SRC_PORT or DST_PORT is specified, all port numbers for that protocol will match that rule."
            ],
            "id_hash": 4673882990678397303,
            "content_hash": 4673882990678397303,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1996",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 535,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 76,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220014/?format=api",
            "priority": 100,
            "id": 1220014,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=c0dcf7d115205177",
            "url": "https://translate-dev.freebsd.org/api/units/1220014/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:02.068358Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The `from` keyword is mandatory and is followed by a keyword which represents the source of the packet.  The source can be a hostname, an IP address followed by the CIDR mask, an address pool, or the keyword `all`.  Refer to man:ipf[5] for examples."
            ],
            "previous_source": "",
            "target": [
                "The `from` keyword is mandatory and is followed by a keyword which represents the source of the packet.  The source can be a hostname, an IP address followed by the CIDR mask, an address pool, or the keyword `all`.  Refer to man:ipf[5] for examples."
            ],
            "id_hash": 7652670433556317005,
            "content_hash": 7652670433556317005,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2001",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 537,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 44,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220016/?format=api",
            "priority": 100,
            "id": 1220016,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=ea33bf36b742434d",
            "url": "https://translate-dev.freebsd.org/api/units/1220016/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:02.171837Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "There is no way to match ranges of IP addresses which do not express themselves easily using the dotted numeric form / mask-length notation.  The package:net-mgmt/ipcalc[] package or port may be used to ease the calculation of the CIDR mask.  Additional information is available at the utility's web page: http://jodies.de/ipcalc[http://jodies.de/ipcalc]."
            ],
            "previous_source": "",
            "target": [
                "There is no way to match ranges of IP addresses which do not express themselves easily using the dotted numeric form / mask-length notation.  The package:net-mgmt/ipcalc[] package or port may be used to ease the calculation of the CIDR mask.  Additional information is available at the utility's web page: http://jodies.de/ipcalc[http://jodies.de/ipcalc]."
            ],
            "id_hash": 2167720296945734843,
            "content_hash": 2167720296945734843,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2005",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 538,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 50,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220018/?format=api",
            "priority": 100,
            "id": 1220018,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=9e154a1fffdad4bb",
            "url": "https://translate-dev.freebsd.org/api/units/1220018/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:02.263289Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The port number of the source is optional.  However, if it is used, it requires PROTO_TYPE to be first defined in the rule.  The port number must also be preceded by the `proto` keyword."
            ],
            "previous_source": "",
            "target": [
                "The port number of the source is optional.  However, if it is used, it requires PROTO_TYPE to be first defined in the rule.  The port number must also be preceded by the `proto` keyword."
            ],
            "id_hash": -1792334705943995191,
            "content_hash": -1792334705943995191,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2010",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 539,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 34,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220020/?format=api",
            "priority": 100,
            "id": 1220020,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=67205914c59a9cc9",
            "url": "https://translate-dev.freebsd.org/api/units/1220020/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:02.375191Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The `to` keyword is mandatory and is followed by a keyword which represents the destination of the packet.  Similar to SRC_ADDR, it can be a hostname, an IP address followed by the CIDR mask, an address pool, or the keyword `all`."
            ],
            "previous_source": "",
            "target": [
                "The `to` keyword is mandatory and is followed by a keyword which represents the destination of the packet.  Similar to SRC_ADDR, it can be a hostname, an IP address followed by the CIDR mask, an address pool, or the keyword `all`."
            ],
            "id_hash": -1463116451921547908,
            "content_hash": -1463116451921547908,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2018",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 543,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 41,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220022/?format=api",
            "priority": 100,
            "id": 1220022,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=6bb1f756c22fad7c",
            "url": "https://translate-dev.freebsd.org/api/units/1220022/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:02.763674Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Similar to SRC_PORT, the port number of the destination is optional.  However, if it is used, it requires PROTO_TYPE to be first defined in the rule.  The port number must also be preceded by the `proto` keyword."
            ],
            "previous_source": "",
            "target": [
                "Similar to SRC_PORT, the port number of the destination is optional.  However, if it is used, it requires PROTO_TYPE to be first defined in the rule.  The port number must also be preceded by the `proto` keyword."
            ],
            "id_hash": -5873369773355937441,
            "content_hash": -5873369773355937441,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2023",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 544,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 37,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220024/?format=api",
            "priority": 100,
            "id": 1220024,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=2e7d994f409a515f",
            "url": "https://translate-dev.freebsd.org/api/units/1220024/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:02.869150Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "If `tcp` is specified as the PROTO_TYPE, flags can be specified as letters, where each letter represents one of the possible TCP flags used to determine the state of a connection.  Possible values are: `S` (SYN), `A` (ACK), `P` (PSH), `F` (FIN), `U` (URG), `R` (RST), `C` (CWN), and `E` (ECN)."
            ],
            "previous_source": "",
            "target": [
                "If `tcp` is specified as the PROTO_TYPE, flags can be specified as letters, where each letter represents one of the possible TCP flags used to determine the state of a connection.  Possible values are: `S` (SYN), `A` (ACK), `P` (PSH), `F` (FIN), `U` (URG), `R` (RST), `C` (CWN), and `E` (ECN)."
            ],
            "id_hash": 1152407055019477265,
            "content_hash": 1152407055019477265,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2027",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 546,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 51,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220026/?format=api",
            "priority": 100,
            "id": 1220026,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=8ffe2c1c5f170911",
            "url": "https://translate-dev.freebsd.org/api/units/1220026/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:02.960154Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "If `icmp` is specified as the PROTO_TYPE, the ICMP type to match can be specified.  Refer to man:ipf[5] for the allowable types."
            ],
            "previous_source": "",
            "target": [
                "If `icmp` is specified as the PROTO_TYPE, the ICMP type to match can be specified.  Refer to man:ipf[5] for the allowable types."
            ],
            "id_hash": 5448826802171394987,
            "content_hash": 5448826802171394987,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2030",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 547,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 22,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220028/?format=api",
            "priority": 100,
            "id": 1220028,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=cb9e1f1b820dbbab",
            "url": "https://translate-dev.freebsd.org/api/units/1220028/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:02.984485Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "If a `pass` rule contains `keep state`, IPF will add an entry to its dynamic state table and allow subsequent packets that match the connection.  IPF can track state for TCP, UDP, and ICMP sessions.  Any packet that IPF can be certain is part of an active session, even if it is a different protocol, will be allowed."
            ],
            "previous_source": "",
            "target": [
                "If a `pass` rule contains `keep state`, IPF will add an entry to its dynamic state table and allow subsequent packets that match the connection.  IPF can track state for TCP, UDP, and ICMP sessions.  Any packet that IPF can be certain is part of an active session, even if it is a different protocol, will be allowed."
            ],
            "id_hash": 4703129272713141311,
            "content_hash": 4703129272713141311,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2035",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 549,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 58,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220030/?format=api",
            "priority": 100,
            "id": 1220030,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=c144df27c0cedc3f",
            "url": "https://translate-dev.freebsd.org/api/units/1220030/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:03.148112Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "In IPF, packets destined to go out through the interface connected to the public Internet are first checked against the dynamic state table.  If the packet matches the next expected packet comprising an active session conversation, it exits the firewall and the state of the session conversation flow is updated in the dynamic state table.  Packets that do not belong to an already active session are checked against the outbound ruleset.  Packets coming in from the interface connected to the public Internet are first checked against the dynamic state table.  If the packet matches the next expected packet comprising an active session, it exits the firewall and the state of the session conversation flow is updated in the dynamic state table.  Packets that do not belong to an already active session are checked against the inbound ruleset."
            ],
            "previous_source": "",
            "target": [
                "In IPF, packets destined to go out through the interface connected to the public Internet are first checked against the dynamic state table.  If the packet matches the next expected packet comprising an active session conversation, it exits the firewall and the state of the session conversation flow is updated in the dynamic state table.  Packets that do not belong to an already active session are checked against the outbound ruleset.  Packets coming in from the interface connected to the public Internet are first checked against the dynamic state table.  If the packet matches the next expected packet comprising an active session, it exits the firewall and the state of the session conversation flow is updated in the dynamic state table.  Packets that do not belong to an already active session are checked against the inbound ruleset."
            ],
            "id_hash": 596827883223105567,
            "content_hash": 596827883223105567,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2042",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 550,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 137,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220032/?format=api",
            "priority": 100,
            "id": 1220032,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=88485bcc338fc01f",
            "url": "https://translate-dev.freebsd.org/api/units/1220032/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:03.251353Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Several keywords can be added after `keep state`.  If used, these keywords set various options that control stateful filtering, such as setting connection limits or connection age.  Refer to man:ipf[5] for the list of available options and their descriptions."
            ],
            "previous_source": "",
            "target": [
                "Several keywords can be added after `keep state`.  If used, these keywords set various options that control stateful filtering, such as setting connection limits or connection age.  Refer to man:ipf[5] for the list of available options and their descriptions."
            ],
            "id_hash": -8487733711404655288,
            "content_hash": -8487733711404655288,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2046",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 551,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 39,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220034/?format=api",
            "priority": 100,
            "id": 1220034,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=0a358328cf9e1d48",
            "url": "https://translate-dev.freebsd.org/api/units/1220034/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:03.287054Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "FreeBSD uses the loopback interface ([.filename]#lo0#) and the IP address `127.0.0.1` for internal communication.  The firewall ruleset must contain rules to allow free movement of these internally used packets:"
            ],
            "previous_source": "",
            "target": [
                "FreeBSD uses the loopback interface ([.filename]#lo0#) and the IP address `127.0.0.1` for internal communication.  The firewall ruleset must contain rules to allow free movement of these internally used packets:"
            ],
            "id_hash": -374288105933021309,
            "content_hash": -374288105933021309,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2053",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 553,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 29,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220036/?format=api",
            "priority": 100,
            "id": 1220036,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=7ace42f362355f83",
            "url": "https://translate-dev.freebsd.org/api/units/1220036/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:03.451086Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The public interface connected to the Internet is used to authorize and control access of all outbound and inbound connections.  If one or more interfaces are cabled to private networks, those internal interfaces may require rules to allow packets originating from the LAN to flow between the internal networks or to the interface attached to the Internet.  The ruleset should be organized into three major sections: any trusted internal interfaces, outbound connections through the public interface, and inbound connections through the public interface."
            ],
            "previous_source": "",
            "target": [
                "The public interface connected to the Internet is used to authorize and control access of all outbound and inbound connections.  If one or more interfaces are cabled to private networks, those internal interfaces may require rules to allow packets originating from the LAN to flow between the internal networks or to the interface attached to the Internet.  The ruleset should be organized into three major sections: any trusted internal interfaces, outbound connections through the public interface, and inbound connections through the public interface."
            ],
            "id_hash": 6858378249969832725,
            "content_hash": 6858378249969832725,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2064",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 555,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 83,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220038/?format=api",
            "priority": 100,
            "id": 1220038,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=df2ddaae5cb79315",
            "url": "https://translate-dev.freebsd.org/api/units/1220038/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:03.563801Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "This set of rules defines the outbound section of the public interface named [.filename]#dc0#.  These rules keep state and identify the specific services that internal systems are authorized for public Internet access.  All the rules use `quick` and specify the appropriate port numbers and, where applicable, destination addresses."
            ],
            "previous_source": "",
            "target": [
                "This set of rules defines the outbound section of the public interface named [.filename]#dc0#.  These rules keep state and identify the specific services that internal systems are authorized for public Internet access.  All the rules use `quick` and specify the appropriate port numbers and, where applicable, destination addresses."
            ],
            "id_hash": 2609109902262608827,
            "content_hash": 2609109902262608827,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2079",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 559,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 48,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220040/?format=api",
            "priority": 100,
            "id": 1220040,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=a4356ba1e85123bb",
            "url": "https://translate-dev.freebsd.org/api/units/1220040/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:03.800044Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "This example of the rules in the inbound section of the public interface blocks all undesirable packets first.  This reduces the number of packets that are logged by the last rule."
            ],
            "previous_source": "",
            "target": [
                "This example of the rules in the inbound section of the public interface blocks all undesirable packets first.  This reduces the number of packets that are logged by the last rule."
            ],
            "id_hash": -3823530216829826338,
            "content_hash": -3823530216829826338,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2125",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 570,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 31,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220042/?format=api",
            "priority": 100,
            "id": 1220042,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=4af0178695e2cade",
            "url": "https://translate-dev.freebsd.org/api/units/1220042/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:04.369091Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Any time there are logged messages on a rule with the `log first` option, run `ipfstat -hio` to evaluate how many times the rule has been matched.  A large number of matches may indicate that the system is under attack."
            ],
            "previous_source": "",
            "target": [
                "Any time there are logged messages on a rule with the `log first` option, run `ipfstat -hio` to evaluate how many times the rule has been matched.  A large number of matches may indicate that the system is under attack."
            ],
            "id_hash": -6705431553115911547,
            "content_hash": -6705431553115911547,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2167",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 578,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 40,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220044/?format=api",
            "priority": 100,
            "id": 1220044,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=22f1858782d48a85",
            "url": "https://translate-dev.freebsd.org/api/units/1220044/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:04.769259Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The rest of the rules in the inbound section define which connections are allowed to be initiated from the Internet.  The last rule denies all connections which were not explicitly allowed by previous rules in this section."
            ],
            "previous_source": "",
            "target": [
                "The rest of the rules in the inbound section define which connections are allowed to be initiated from the Internet.  The last rule denies all connections which were not explicitly allowed by previous rules in this section."
            ],
            "id_hash": 1679491319018494736,
            "content_hash": 1679491319018494736,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2170",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 579,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 37,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220046/?format=api",
            "priority": 100,
            "id": 1220046,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=974ec074d1731b10",
            "url": "https://translate-dev.freebsd.org/api/units/1220046/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:04.875126Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "NAT rules are flexible and can accomplish many different things to fit the needs of both commercial and home users.  The rule syntax presented here has been simplified to demonstrate common usage.  For a complete rule syntax description, refer to man:ipnat[5]."
            ],
            "previous_source": "",
            "target": [
                "NAT rules are flexible and can accomplish many different things to fit the needs of both commercial and home users.  The rule syntax presented here has been simplified to demonstrate common usage.  For a complete rule syntax description, refer to man:ipnat[5]."
            ],
            "id_hash": 2636331539754719210,
            "content_hash": 2636331539754719210,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2198",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 586,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 41,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220048/?format=api",
            "priority": 100,
            "id": 1220048,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=a4962191493d17ea",
            "url": "https://translate-dev.freebsd.org/api/units/1220048/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:05.246005Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The _LAN_IP_RANGE_ is the range of IP addresses used by internal clients.  Usually, it is a private address range such as `192.168.1.0/24`.  The _PUBLIC_ADDRESS_ can either be the static external IP address or the keyword `0/32` which represents the IP address assigned to _IF_."
            ],
            "previous_source": "",
            "target": [
                "The _LAN_IP_RANGE_ is the range of IP addresses used by internal clients.  Usually, it is a private address range such as `192.168.1.0/24`.  The _PUBLIC_ADDRESS_ can either be the static external IP address or the keyword `0/32` which represents the IP address assigned to _IF_."
            ],
            "id_hash": 1637801639336220021,
            "content_hash": 1637801639336220021,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2209",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 589,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 44,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220050/?format=api",
            "priority": 100,
            "id": 1220050,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=96baa3e9dd301575",
            "url": "https://translate-dev.freebsd.org/api/units/1220050/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:05.376521Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "In IPF, when a packet arrives at the firewall from the LAN with a public destination, it first passes through the outbound rules of the firewall ruleset.  Then, the packet is passed to the NAT ruleset which is read from the top down, where the first matching rule wins.  IPF tests each NAT rule against the packet's interface name and source IP address.  When a packet's interface name matches a NAT rule, the packet's source IP address in the private LAN is checked to see if it falls within the IP address range specified in _LAN_IP_RANGE_.  On a match, the packet has its source IP address rewritten with the public IP address specified by _PUBLIC_ADDRESS_.  IPF posts an entry in its internal NAT table so that when the packet returns from the Internet, it can be mapped back to its original private IP address before being passed to the firewall rules for further processing."
            ],
            "previous_source": "",
            "target": [
                "In IPF, when a packet arrives at the firewall from the LAN with a public destination, it first passes through the outbound rules of the firewall ruleset.  Then, the packet is passed to the NAT ruleset which is read from the top down, where the first matching rule wins.  IPF tests each NAT rule against the packet's interface name and source IP address.  When a packet's interface name matches a NAT rule, the packet's source IP address in the private LAN is checked to see if it falls within the IP address range specified in _LAN_IP_RANGE_.  On a match, the packet has its source IP address rewritten with the public IP address specified by _PUBLIC_ADDRESS_.  IPF posts an entry in its internal NAT table so that when the packet returns from the Internet, it can be mapped back to its original private IP address before being passed to the firewall rules for further processing."
            ],
            "id_hash": 1833579864475553225,
            "content_hash": 1833579864475553225,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2216",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 590,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 154,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220052/?format=api",
            "priority": 100,
            "id": 1220052,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=99722f2c095fcdc9",
            "url": "https://translate-dev.freebsd.org/api/units/1220052/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:05.460494Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "For networks that have large numbers of internal systems or multiple subnets, the process of funneling every private IP address into a single public IP address becomes a resource problem.  Two methods are available to relieve this issue."
            ],
            "previous_source": "",
            "target": [
                "For networks that have large numbers of internal systems or multiple subnets, the process of funneling every private IP address into a single public IP address becomes a resource problem.  Two methods are available to relieve this issue."
            ],
            "id_hash": -3735789559852317730,
            "content_hash": -3735789559852317730,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2219",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 591,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 38,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220054/?format=api",
            "priority": 100,
            "id": 1220054,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=4c27cf303963c3de",
            "url": "https://translate-dev.freebsd.org/api/units/1220054/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:05.553250Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The first method is to assign a range of ports to use as source ports.  By adding the `portmap` keyword, NAT can be directed to only use source ports in the specified range:"
            ],
            "previous_source": "",
            "target": [
                "The first method is to assign a range of ports to use as source ports.  By adding the `portmap` keyword, NAT can be directed to only use source ports in the specified range:"
            ],
            "id_hash": 3576883605570031792,
            "content_hash": 3576883605570031792,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2222",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 592,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 33,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220056/?format=api",
            "priority": 100,
            "id": 1220056,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=b1a3a4b028eb90b0",
            "url": "https://translate-dev.freebsd.org/api/units/1220056/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:05.583321Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The second method is to use a pool of public addresses.  This is useful when there are too many LAN addresses to fit into a single public address and a block of public IP addresses is available.  These public addresses can be used as a pool from which NAT selects an IP address as a packet's address is mapped on its way out."
            ],
            "previous_source": "",
            "target": [
                "The second method is to use a pool of public addresses.  This is useful when there are too many LAN addresses to fit into a single public address and a block of public IP addresses is available.  These public addresses can be used as a pool from which NAT selects an IP address as a packet's address is mapped on its way out."
            ],
            "id_hash": 8654924083310584785,
            "content_hash": 8654924083310584785,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2238",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 596,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 63,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220058/?format=api",
            "priority": 100,
            "id": 1220058,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=f81c779917b363d1",
            "url": "https://translate-dev.freebsd.org/api/units/1220058/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:06.868368Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The range of public IP addresses can be specified using a netmask or CIDR notation.  These two rules are equivalent:"
            ],
            "previous_source": "",
            "target": [
                "The range of public IP addresses can be specified using a netmask or CIDR notation.  These two rules are equivalent:"
            ],
            "id_hash": 5234895226764591581,
            "content_hash": 5234895226764591581,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2241",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 597,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 20,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220060/?format=api",
            "priority": 100,
            "id": 1220060,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=c8a615791bb101dd",
            "url": "https://translate-dev.freebsd.org/api/units/1220060/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:06.966883Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "IPF has a built in FTP proxy which can be used with NAT.  It monitors all outbound traffic for active or passive FTP connection requests and dynamically creates temporary filter rules containing the port number used by the FTP data channel.  This eliminates the need to open large ranges of high order ports for FTP connections."
            ],
            "previous_source": "",
            "target": [
                "IPF has a built in FTP proxy which can be used with NAT.  It monitors all outbound traffic for active or passive FTP connection requests and dynamically creates temporary filter rules containing the port number used by the FTP data channel.  This eliminates the need to open large ranges of high order ports for FTP connections."
            ],
            "id_hash": -2979386482669303737,
            "content_hash": -2979386482669303737,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2267",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 603,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 56,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220064/?format=api",
            "priority": 100,
            "id": 1220064,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=56a717c78be54847",
            "url": "https://translate-dev.freebsd.org/api/units/1220064/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:07.271354Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "In this example, the first rule calls the proxy for outbound FTP traffic from the internal LAN.  The second rule passes the FTP traffic from the firewall to the Internet, and the third rule handles all non-FTP traffic from the internal LAN:"
            ],
            "previous_source": "",
            "target": [
                "In this example, the first rule calls the proxy for outbound FTP traffic from the internal LAN.  The second rule passes the FTP traffic from the firewall to the Internet, and the third rule handles all non-FTP traffic from the internal LAN:"
            ],
            "id_hash": 8318123879934845547,
            "content_hash": 8318123879934845547,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2270",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 604,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 42,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220066/?format=api",
            "priority": 100,
            "id": 1220066,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=f36fe998f535e26b",
            "url": "https://translate-dev.freebsd.org/api/units/1220066/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:07.367541Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The FTP `map` rules go before the NAT rule so that when a packet matches an FTP rule, the FTP proxy creates temporary filter rules to let the FTP session packets pass and undergo NAT.  All LAN packets that are not FTP will not match the FTP rules but will undergo NAT if they match the third rule."
            ],
            "previous_source": "",
            "target": [
                "The FTP `map` rules go before the NAT rule so that when a packet matches an FTP rule, the FTP proxy creates temporary filter rules to let the FTP session packets pass and undergo NAT.  All LAN packets that are not FTP will not match the FTP rules but will undergo NAT if they match the third rule."
            ],
            "id_hash": 3549238077094827917,
            "content_hash": 3549238077094827917,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2280",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 606,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 58,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220068/?format=api",
            "priority": 100,
            "id": 1220068,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=b1416d39f887178d",
            "url": "https://translate-dev.freebsd.org/api/units/1220068/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:07.475243Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Without the FTP proxy, the following firewall rules would instead be needed.  Note that without the proxy, all ports above `1024` need to be allowed:"
            ],
            "previous_source": "",
            "target": [
                "Without the FTP proxy, the following firewall rules would instead be needed.  Note that without the proxy, all ports above `1024` need to be allowed:"
            ],
            "id_hash": 3183717584677969789,
            "content_hash": 3183717584677969789,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2283",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 607,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 25,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220070/?format=api",
            "priority": 100,
            "id": 1220070,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=ac2ed64673e51f7d",
            "url": "https://translate-dev.freebsd.org/api/units/1220070/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:07.567139Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Whenever the file containing the NAT rules is edited, run `ipnat` with `-CF` to delete the current NAT rules and flush the contents of the dynamic translation table.  Include `-f` and specify the name of the NAT ruleset to load:"
            ],
            "previous_source": "",
            "target": [
                "Whenever the file containing the NAT rules is edited, run `ipnat` with `-CF` to delete the current NAT rules and flush the contents of the dynamic translation table.  Include `-f` and specify the name of the NAT ruleset to load:"
            ],
            "id_hash": 8434188275443844093,
            "content_hash": 8434188275443844093,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2299",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 611,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 40,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220072/?format=api",
            "priority": 100,
            "id": 1220072,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=f50c418cde9843fd",
            "url": "https://translate-dev.freebsd.org/api/units/1220072/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:07.770532Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "IPF includes man:ipfstat[8] which can be used to retrieve and display statistics which are gathered as packets match rules as they go through the firewall.  Statistics are accumulated since the firewall was last started or since the last time they were reset to zero using `ipf -Z`."
            ],
            "previous_source": "",
            "target": [
                "IPF includes man:ipfstat[8] which can be used to retrieve and display statistics which are gathered as packets match rules as they go through the firewall.  Statistics are accumulated since the firewall was last started or since the last time they were reset to zero using `ipf -Z`."
            ],
            "id_hash": -1568458246941724088,
            "content_hash": -1568458246941724088,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2330",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 620,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 47,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220074/?format=api",
            "priority": 100,
            "id": 1220074,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=6a3bb788d201b248",
            "url": "https://translate-dev.freebsd.org/api/units/1220074/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:08.176842Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Several options are available.  When supplied with either `-i` for inbound or `-o` for outbound, the command will retrieve and display the appropriate list of filter rules currently installed and in use by the kernel.  To also see the rule numbers, include `-n`.  For example, `ipfstat -on` displays the outbound rules table with rule numbers:"
            ],
            "previous_source": "",
            "target": [
                "Several options are available.  When supplied with either `-i` for inbound or `-o` for outbound, the command will retrieve and display the appropriate list of filter rules currently installed and in use by the kernel.  To also see the rule numbers, include `-n`.  For example, `ipfstat -on` displays the outbound rules table with rule numbers:"
            ],
            "id_hash": 6843678462294785937,
            "content_hash": 6843678462294785937,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2358",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 623,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 55,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220076/?format=api",
            "priority": 100,
            "id": 1220076,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=def9a14d56127f91",
            "url": "https://translate-dev.freebsd.org/api/units/1220076/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:08.354822Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Include `-h` to prefix each rule with a count of how many times the rule was matched.  For example, `ipfstat -oh` displays the outbound internal rules table, prefixing each rule with its usage count:"
            ],
            "previous_source": "",
            "target": [
                "Include `-h` to prefix each rule with a count of how many times the rule was matched.  For example, `ipfstat -oh` displays the outbound internal rules table, prefixing each rule with its usage count:"
            ],
            "id_hash": 338659937586612997,
            "content_hash": 338659937586612997,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2368",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 625,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 34,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220078/?format=api",
            "priority": 100,
            "id": 1220078,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=84b3296b3f818b05",
            "url": "https://translate-dev.freebsd.org/api/units/1220078/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:08.465463Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "To display the state table in a format similar to man:top[1], use `ipfstat -t`.  When the firewall is under attack, this option provides the ability to identify and see the attacking packets.  The optional sub-flags give the ability to select the destination or source IP, port, or protocol to be monitored in real time.  Refer to man:ipfstat[8] for details."
            ],
            "previous_source": "",
            "target": [
                "To display the state table in a format similar to man:top[1], use `ipfstat -t`.  When the firewall is under attack, this option provides the ability to identify and see the attacking packets.  The optional sub-flags give the ability to select the destination or source IP, port, or protocol to be monitored in real time.  Refer to man:ipfstat[8] for details."
            ],
            "id_hash": -6547722336120155911,
            "content_hash": -6547722336120155911,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2380",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 627,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 59,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220080/?format=api",
            "priority": 100,
            "id": 1220080,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=2521d13a03aad0f9",
            "url": "https://translate-dev.freebsd.org/api/units/1220080/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:09.371135Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "IPF provides `ipmon`, which can be used to write the firewall's logging information in a human readable format.  It requires that `options IPFILTER_LOG` be first added to a custom kernel using the instructions in crossref:kernelconfig[kernelconfig,Configuring the FreeBSD Kernel]."
            ],
            "previous_source": "",
            "target": [
                "IPF provides `ipmon`, which can be used to write the firewall's logging information in a human readable format.  It requires that `options IPFILTER_LOG` be first added to a custom kernel using the instructions in crossref:kernelconfig[kernelconfig,Configuring the FreeBSD Kernel]."
            ],
            "id_hash": 364942197036087182,
            "content_hash": 364942197036087182,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2385",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 629,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 38,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220082/?format=api",
            "priority": 100,
            "id": 1220082,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=851088fea1e2f78e",
            "url": "https://translate-dev.freebsd.org/api/units/1220082/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:09.467604Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "This command is typically run in daemon mode in order to provide a continuous system log file so that logging of past events may be reviewed.  Since FreeBSD has a built in man:syslogd[8] facility to automatically rotate system logs, the default [.filename]#rc.conf# `ipmon_flags` statement uses `-Ds`:"
            ],
            "previous_source": "",
            "target": [
                "This command is typically run in daemon mode in order to provide a continuous system log file so that logging of past events may be reviewed.  Since FreeBSD has a built in man:syslogd[8] facility to automatically rotate system logs, the default [.filename]#rc.conf# `ipmon_flags` statement uses `-Ds`:"
            ],
            "id_hash": 1999631306697071536,
            "content_hash": 1999631306697071536,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2388",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 630,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 46,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220084/?format=api",
            "priority": 100,
            "id": 1220084,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=9bc01e14356ddbb0",
            "url": "https://translate-dev.freebsd.org/api/units/1220084/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:09.556113Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Logging provides the ability to review, after the fact, information such as which packets were dropped, what addresses they came from, and where they were going.  This information is useful in tracking down attackers."
            ],
            "previous_source": "",
            "target": [
                "Logging provides the ability to review, after the fact, information such as which packets were dropped, what addresses they came from, and where they were going.  This information is useful in tracking down attackers."
            ],
            "id_hash": 6556874618461973833,
            "content_hash": 6556874618461973833,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2399",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 632,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 34,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220086/?format=api",
            "priority": 100,
            "id": 1220086,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=dafeb2b9c6336d49",
            "url": "https://translate-dev.freebsd.org/api/units/1220086/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:09.655093Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Once the logging facility is enabled in [.filename]#rc.conf# and started with `service ipmon start`, IPF will only log the rules which contain the `log` keyword.  The firewall administrator decides which rules in the ruleset should be logged and normally only deny rules are logged.  It is customary to include the `log` keyword in the last rule in the ruleset.  This makes it possible to see all the packets that did not match any of the rules in the ruleset."
            ],
            "previous_source": "",
            "target": [
                "Once the logging facility is enabled in [.filename]#rc.conf# and started with `service ipmon start`, IPF will only log the rules which contain the `log` keyword.  The firewall administrator decides which rules in the ruleset should be logged and normally only deny rules are logged.  It is customary to include the `log` keyword in the last rule in the ruleset.  This makes it possible to see all the packets that did not match any of the rules in the ruleset."
            ],
            "id_hash": 1585446834829548740,
            "content_hash": 1585446834829548740,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2404",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 633,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 79,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220088/?format=api",
            "priority": 100,
            "id": 1220088,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=9600a37f08485cc4",
            "url": "https://translate-dev.freebsd.org/api/units/1220088/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:09.748614Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "By default, `ipmon -Ds` mode uses `local0` as the logging facility.  The following logging levels can be used to further segregate the logged data:"
            ],
            "previous_source": "",
            "target": [
                "By default, `ipmon -Ds` mode uses `local0` as the logging facility.  The following logging levels can be used to further segregate the logged data:"
            ],
            "id_hash": -2348701791760639421,
            "content_hash": -2348701791760639421,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2407",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 634,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 24,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220090/?format=api",
            "priority": 100,
            "id": 1220090,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=5f67bc2a12c89a43",
            "url": "https://translate-dev.freebsd.org/api/units/1220090/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:09.771510Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Messages generated by `ipmon` consist of data fields separated by white space.  Fields common to all messages are:"
            ],
            "previous_source": "",
            "target": [
                "Messages generated by `ipmon` consist of data fields separated by white space.  Fields common to all messages are:"
            ],
            "id_hash": -6063011148605311997,
            "content_hash": -6063011148605311997,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2436",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 642,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 18,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220092/?format=api",
            "priority": 100,
            "id": 1220092,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=2bdbdb7bca25b403",
            "url": "https://translate-dev.freebsd.org/api/units/1220092/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:10.268019Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "If the packet is a TCP packet, there will be an additional field starting with a hyphen followed by letters corresponding to any flags that were set.  Refer to man:ipf[5] for a list of letters and their flags."
            ],
            "previous_source": "",
            "target": [
                "If the packet is a TCP packet, there will be an additional field starting with a hyphen followed by letters corresponding to any flags that were set.  Refer to man:ipf[5] for a list of letters and their flags."
            ],
            "id_hash": 7940882116529169750,
            "content_hash": 7940882116529169750,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2448",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 651,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 38,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220094/?format=api",
            "priority": 100,
            "id": 1220094,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=ee33ae365ef92556",
            "url": "https://translate-dev.freebsd.org/api/units/1220094/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:10.746678Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "If the packet is an ICMP packet, there will be two fields at the end: the first always being \"icmp\" and the next being the ICMP message and sub-message type, separated by a slash.  For example: `icmp 3/3` for a port unreachable message."
            ],
            "previous_source": "",
            "target": [
                "If the packet is an ICMP packet, there will be two fields at the end: the first always being \"icmp\" and the next being the ICMP message and sub-message type, separated by a slash.  For example: `icmp 3/3` for a port unreachable message."
            ],
            "id_hash": -2620970486808866458,
            "content_hash": -2620970486808866458,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2451",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 652,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 43,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220096/?format=api",
            "priority": 100,
            "id": 1220096,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=5ba0713a8ef99166",
            "url": "https://translate-dev.freebsd.org/api/units/1220096/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:10.847457Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "This chapter describes how to set up blacklistd, configure it, and provides examples on how to use it.  Readers should be familiar with basic firewall concepts like rules.  For details, refer to the firewall chapter.  PF is used in the examples, but other firewalls available on FreeBSD should be able to work with blacklistd, too."
            ],
            "previous_source": "",
            "target": [
                "This chapter describes how to set up blacklistd, configure it, and provides examples on how to use it.  Readers should be familiar with basic firewall concepts like rules.  For details, refer to the firewall chapter.  PF is used in the examples, but other firewalls available on FreeBSD should be able to work with blacklistd, too."
            ],
            "id_hash": 3766055115287799174,
            "content_hash": 3766055115287799174,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2465",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 655,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 55,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220100/?format=api",
            "priority": 100,
            "id": 1220100,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=b443b72c8745a586",
            "url": "https://translate-dev.freebsd.org/api/units/1220100/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:10.977812Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The main configuration for blacklistd is stored in man:blacklistd.conf[5].  Various command line options are also available to change blacklistd's run-time behavior.  Persistent configuration across reboots should be stored in [.filename]#/etc/blacklistd.conf#.  To enable the daemon during system boot, add a `blacklistd_enable` line to [.filename]#/etc/rc.conf# like this:"
            ],
            "previous_source": "",
            "target": [
                "The main configuration for blacklistd is stored in man:blacklistd.conf[5].  Various command line options are also available to change blacklistd's run-time behavior.  Persistent configuration across reboots should be stored in [.filename]#/etc/blacklistd.conf#.  To enable the daemon during system boot, add a `blacklistd_enable` line to [.filename]#/etc/rc.conf# like this:"
            ],
            "id_hash": -1106337358145517236,
            "content_hash": -1106337358145517236,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2472",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 657,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 45,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220102/?format=api",
            "priority": 100,
            "id": 1220102,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=70a58008cdfe094c",
            "url": "https://translate-dev.freebsd.org/api/units/1220102/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:11.075929Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "Rules for blacklistd are configured in man:blacklistd.conf[5] with one entry per line.  Each rule contains a tuple separated by spaces or tabs.  Rules either belong to a `local` or a `remote`, which applies to the machine where blacklistd is running or an outside source, respectively."
            ],
            "previous_source": "",
            "target": [
                "Rules for blacklistd are configured in man:blacklistd.conf[5] with one entry per line.  Each rule contains a tuple separated by spaces or tabs.  Rules either belong to a `local` or a `remote`, which applies to the machine where blacklistd is running or an outside source, respectively."
            ],
            "id_hash": 2177755694928058136,
            "content_hash": 2177755694928058136,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2490",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 662,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 45,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220104/?format=api",
            "priority": 100,
            "id": 1220104,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=9e38f1442bc55718",
            "url": "https://translate-dev.freebsd.org/api/units/1220104/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:11.361884Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "All rules that follow the `[local]` section are treated as local rules (which is the default), applying to the local machine.  When a `[remote]` section is encountered, all rules that follow it are handled as remote machine rules."
            ],
            "previous_source": "",
            "target": [
                "All rules that follow the `[local]` section are treated as local rules (which is the default), applying to the local machine.  When a `[remote]` section is encountered, all rules that follow it are handled as remote machine rules."
            ],
            "id_hash": 1804491479467449717,
            "content_hash": 1804491479467449717,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2503",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 666,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 38,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220106/?format=api",
            "priority": 100,
            "id": 1220106,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=990ad770a1e05d75",
            "url": "https://translate-dev.freebsd.org/api/units/1220106/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:11.556825Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "The socket type is defined by the second field.  TCP sockets are of type `stream`, whereas UDP is denoted as `dgram`.  The example above uses TCP, since SSH is using that protocol."
            ],
            "previous_source": "",
            "target": [
                "The socket type is defined by the second field.  TCP sockets are of type `stream`, whereas UDP is denoted as `dgram`.  The example above uses TCP, since SSH is using that protocol."
            ],
            "id_hash": -1548986582427527598,
            "content_hash": -1548986582427527598,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2523",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 670,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 32,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220112/?format=api",
            "priority": 100,
            "id": 1220112,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=6a80e4e9008f9652",
            "url": "https://translate-dev.freebsd.org/api/units/1220112/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:11.853585Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "A protocol can be used in the third field of a blacklistd rule.  The following protocols can be used: `tcp`, `udp`, `tcp6`, `udp6`, or numeric.  A wildcard, like in the example, is typically used to match all protocols unless there is a reason to distinguish traffic by a certain protocol."
            ],
            "previous_source": "",
            "target": [
                "A protocol can be used in the third field of a blacklistd rule.  The following protocols can be used: `tcp`, `udp`, `tcp6`, `udp6`, or numeric.  A wildcard, like in the example, is typically used to match all protocols unless there is a reason to distinguish traffic by a certain protocol."
            ],
            "id_hash": 4476772288939205150,
            "content_hash": 4476772288939205150,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2527",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 671,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 50,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220114/?format=api",
            "priority": 100,
            "id": 1220114,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=be20b0ad8688a21e",
            "url": "https://translate-dev.freebsd.org/api/units/1220114/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:11.880885Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/en/?format=api",
            "source": [
                "In the fourth field, the effective user or owner of the daemon process that is reporting the event is defined.  The username or UID can be used here, as well as a wildcard (see example rule above)."
            ],
            "previous_source": "",
            "target": [
                "In the fourth field, the effective user or owner of the daemon process that is reporting the event is defined.  The username or UID can be used here, as well as a wildcard (see example rule above)."
            ],
            "id_hash": 1422055306253541458,
            "content_hash": 1422055306253541458,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:2530",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 100,
            "fuzzy": false,
            "translated": true,
            "approved": false,
            "position": 672,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 37,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220116/?format=api",
            "priority": 100,
            "id": 1220116,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/en/?checksum=93bc27c44433a052",
            "url": "https://translate-dev.freebsd.org/api/units/1220116/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:12:11.969791Z"
        }
    ]
}