Translation components API.

See the Weblate's Web API documentation for detailed description of the API.

GET /api/translations/documentation/bookshandbookfirewalls_index/fr_FR/units/?format=api&page=12
HTTP 200 OK
Allow: GET, POST, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "count": 711,
    "next": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/units/?format=api&page=13",
    "previous": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/units/?format=api&page=11",
    "results": [
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Dozens of OPTIONS are available.  Refer to man:ipfw[8] for a description of each available option."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4524947852662332073,
            "content_hash": 4524947852662332073,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1259",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 357,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 15,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219904/?format=api",
            "priority": 100,
            "id": 1220768,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=becbd819091adaa9",
            "url": "https://translate-dev.freebsd.org/api/units/1220768/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:12.364607Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This section demonstrates how to create an example stateful firewall ruleset script named [.filename]#/etc/ipfw.rules#.  In this example, all connection rules use `in` or `out` to clarify the direction.  They also use `via` _interface-name_ to specify the interface the packet is traveling over."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2874118219303409587,
            "content_hash": 2874118219303409587,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1265",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 359,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 42,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219906/?format=api",
            "priority": 100,
            "id": 1220769,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=a7e2eb4af00ed7b3",
            "url": "https://translate-dev.freebsd.org/api/units/1220769/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:12.447886Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The firewall script begins by indicating that it is a Bourne shell script and flushes any existing rules.  It then creates the `cmd` variable so that `ipfw add` does not have to be typed at the beginning of every rule.  It also defines the `pif` variable which represents the name of the interface that is attached to the Internet."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8677353091226526417,
            "content_hash": -8677353091226526417,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1281",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 363,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 59,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219908/?format=api",
            "priority": 100,
            "id": 1220770,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=0793d9568ece1d2f",
            "url": "https://translate-dev.freebsd.org/api/units/1220770/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:12.479793Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The next set of rules controls connections from Internet hosts to the internal network.  It starts by denying packets typically associated with attacks and then explicitly allows specific types of connections.  All the authorized services that originate from the Internet use `limit` to prevent flooding."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 9218233746583314385,
            "content_hash": 9218233746583314385,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1351",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 380,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 45,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219910/?format=api",
            "priority": 100,
            "id": 1220771,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ffedbec0919ddfd1",
            "url": "https://translate-dev.freebsd.org/api/units/1220771/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:12.754926Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "FreeBSD's IPFW firewall has two implementations of NAT: the userland implementation man:natd[8], and the more recent in-kernel NAT implementation.  Both work in conjunction with IPFW to provide network address translation.  This can be used to provide an Internet Connection Sharing solution so that several internal computers can connect to the Internet using a single public IP address."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7274935322788622555,
            "content_hash": -7274935322788622555,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1411",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 394,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 57,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219912/?format=api",
            "priority": 100,
            "id": 1220772,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=1b0a3cde413e0f25",
            "url": "https://translate-dev.freebsd.org/api/units/1220772/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.358945Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "To do this, the FreeBSD machine connected to the Internet must act as a gateway.  This system must have two NICs, where one is connected to the Internet and the other is connected to the internal LAN.  Each machine connected to the LAN should be assigned an IP address in the private network space, as defined by https://www.ietf.org/rfc/rfc1918.txt[RFC 1918]."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -921777720741006934,
            "content_hash": -921777720741006934,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1415",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 395,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 59,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219914/?format=api",
            "priority": 100,
            "id": 1220773,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=7335300bf95cf1aa",
            "url": "https://translate-dev.freebsd.org/api/units/1220773/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.365027Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Some additional configuration is needed in order to enable the in-kernel NAT facility of IPFW.  To enable in-kernel NAT support at boot time, the following must be set in [.filename]#/etc/rc.conf#:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3587600330440745931,
            "content_hash": 3587600330440745931,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1418",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 396,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 30,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219916/?format=api",
            "priority": 100,
            "id": 1220774,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=b1c9b77e1bfea3cb",
            "url": "https://translate-dev.freebsd.org/api/units/1220774/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.371130Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "When `firewall_nat_enable` is set but `firewall_enable` is not, it will have no effect and do nothing.  This is because the in-kernel NAT implementation is only compatible with IPFW."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -6767827606955260216,
            "content_hash": -6767827606955260216,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1430",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 398,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 28,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219918/?format=api",
            "priority": 100,
            "id": 1220775,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=2213d8a6225986c8",
            "url": "https://translate-dev.freebsd.org/api/units/1220775/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.456595Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "When the ruleset contains stateful rules, the positioning of the NAT rule is critical and the `skipto` action is used.  The `skipto` action requires a rule number so that it knows which rule to jump to.  The example below builds upon the firewall ruleset shown in the previous section.  It adds some additional entries and modifies some existing rules in order to configure the firewall for in-kernel NAT.  It starts by adding some additional variables which represent the rule number to skip to, the `keep-state` option, and a list of TCP ports which will be used to reduce the number of rules."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -1850356014535651914,
            "content_hash": -1850356014535651914,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1437",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 399,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 102,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219920/?format=api",
            "priority": 100,
            "id": 1220776,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=6652370225984db6",
            "url": "https://translate-dev.freebsd.org/api/units/1220776/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.475733Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "With in-kernel NAT it is necessary to disable TCP segmentation offloading (TSO) due to the architecture of man:libalias[3], a library implemented as a kernel module to provide the in-kernel NAT facility of IPFW.  TSO can be disabled on a per network interface basis using man:ifconfig[8] or on a system wide basis using man:sysctl[8].  To disable TSO system wide, the following must be set it [.filename]#/etc/sysctl.conf#:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2105140536279904889,
            "content_hash": 2105140536279904889,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1452",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 401,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 65,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219922/?format=api",
            "priority": 100,
            "id": 1220777,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=9d36f62a0b3d3279",
            "url": "https://translate-dev.freebsd.org/api/units/1220777/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.491143Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The inbound NAT rule is inserted _after_ the two rules which allow all traffic on the trusted and loopback interfaces and after the reassemble rule but _before_ the `check-state` rule.  It is important that the rule number selected for this NAT rule, in this example `100`, is higher than the first three rules and lower than the `check-state` rule.  Furthermore, because of the behavior of in-kernel NAT it is advised to place a reassemble rule just before the first NAT rule and after the rules that allow traffic on trusted interface.  Normally, IP fragmentation should not happen, but when dealing with IPSEC/ESP/GRE tunneling traffic it might and the reassembling of fragments is necessary before handing the complete packet over to the in-kernel NAT facility."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2900678967744481490,
            "content_hash": 2900678967744481490,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1476",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 405,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 124,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219926/?format=api",
            "priority": 100,
            "id": 1220779,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=a841482717db48d2",
            "url": "https://translate-dev.freebsd.org/api/units/1220779/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.572106Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The NAT instance and rule number used in this example does not match with the default NAT instance and rule number created by [.filename]#rc.firewall#.  [.filename]#rc.firewall# is a script that sets up the default firewall rules present in FreeBSD."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 1390632992100880342,
            "content_hash": 1390632992100880342,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1483",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 407,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 38,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219928/?format=api",
            "priority": 100,
            "id": 1220780,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=934c8556a31c8fd6",
            "url": "https://translate-dev.freebsd.org/api/units/1220780/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.582992Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The outbound rules are modified to replace the `allow` action with the `$skip` variable, indicating that rule processing will continue at rule `1000`.  The seven `tcp` rules have been replaced by rule `125` as the `$good_tcpo` variable contains the seven allowed outbound ports."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8384506792626805087,
            "content_hash": -8384506792626805087,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1497",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 409,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 43,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219930/?format=api",
            "priority": 100,
            "id": 1220781,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=0ba43f7ec0a126a1",
            "url": "https://translate-dev.freebsd.org/api/units/1220781/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.655178Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The inbound rules remain the same, except for the very last rule which removes the `via $pif` in order to catch both inbound and outbound rules.  The NAT rule must follow this last outbound rule, must have a higher number than that last rule, and the rule number must be referenced by the `skipto` action.  In this ruleset, rule number `1000` handles passing all packets to our configured instance for NAT processing.  The next rule allows any packet which has undergone NAT processing to pass."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 3688775402222107408,
            "content_hash": 3688775402222107408,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1516",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 412,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 85,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219932/?format=api",
            "priority": 100,
            "id": 1220782,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=b33129af31a5bb10",
            "url": "https://translate-dev.freebsd.org/api/units/1220782/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.671263Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Consider an internal web browser which initializes a new outbound HTTP session over port 80.  When the first outbound packet enters the firewall, it does not match rule `100` because it is headed out rather than in.  It passes rule `101` because this is the first packet and it has not been posted to the dynamic state table yet.  The packet finally matches rule `125` as it is outbound on an allowed port and has a source IP address from the internal LAN.  On matching this rule, two actions take place.  First, the `keep-state` action adds an entry to the dynamic state table and the specified action, `skipto rule 1000`, is executed.  Next, the packet undergoes NAT and is sent out to the Internet.  This packet makes its way to the destination web server, where a response packet is generated and sent back.  This new packet enters the top of the ruleset.  It matches rule `100` and has its destination IP address mapped back to the original internal address.  It then is processed by the `check-state` rule, is found in the table as an existing session, and is released to the LAN."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -1815583619468272750,
            "content_hash": -1815583619468272750,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1537",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 415,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 192,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219934/?format=api",
            "priority": 100,
            "id": 1220783,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=66cdc05145935b92",
            "url": "https://translate-dev.freebsd.org/api/units/1220783/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.760049Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "On the inbound side, the ruleset has to deny bad packets and allow only authorized services.  A packet which matches an inbound rule is posted to the dynamic state table and the packet is released to the LAN.  The packet generated as a response is recognized by the `check-state` rule as belonging to an existing session.  It is then sent to rule `1000` to undergo NAT before being released to the outbound interface."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 8263215135873126051,
            "content_hash": 8263215135873126051,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1542",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 416,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 73,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219936/?format=api",
            "priority": 100,
            "id": 1220784,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=f2acd662bc594ea3",
            "url": "https://translate-dev.freebsd.org/api/units/1220784/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.767286Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Transitioning from userland man:natd[8] to in-kernel NAT might appear seamless at first but there is small catch.  When using the GENERIC kernel, IPFW will load the [.filename]#libalias.ko# kernel module, when `firewall_nat_enable` is enabled in [.filename]#/etc/rc.conf#.  The [.filename]#libalias.ko# kernel module only provides basic NAT functionality, whereas the userland implementation man:natd[8] has all NAT functionality available in its userland library without any extra configuration.  All functionality refers to the following kernel modules that can additionally be loaded when needed besides the standard [.filename]#libalias.ko# kernel module: [.filename]#alias_ftp.ko#, [.filename]#alias_bbt.ko#, [.filename]#skinny.ko#, [.filename]#irc.ko#, [.filename]#alias_pptp.ko# and [.filename]#alias_smedia.ko# using the `kld_list` directive in [.filename]#/etc/rc.conf#.  If a custom kernel is used, the full functionality of the userland library can be compiled in, in the kernel, using the `options LIBALIAS`."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7886404244133675994,
            "content_hash": 7886404244133675994,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1550",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 417,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 120,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219938/?format=api",
            "priority": 100,
            "id": 1220785,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ed7222e046b883da",
            "url": "https://translate-dev.freebsd.org/api/units/1220785/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.774193Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The drawback with NAT in general is that the LAN clients are not accessible from the Internet.  Clients on the LAN can make outgoing connections to the world but cannot receive incoming ones.  This presents a problem if trying to run Internet services on one of the LAN client machines.  A simple way around this is to redirect selected Internet ports on the NAT providing machine to a LAN client."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 8551267160530634478,
            "content_hash": 8551267160530634478,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1558",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 419,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 70,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219940/?format=api",
            "priority": 100,
            "id": 1220786,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=f6ac342d0ae446ee",
            "url": "https://translate-dev.freebsd.org/api/units/1220786/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.851258Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "For example, an IRC server runs on client `A` and a web server runs on client `B`.  For this to work properly, connections received on ports 6667 (IRC) and 80 (HTTP) must be redirected to the respective machines."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2917269525804860494,
            "content_hash": -2917269525804860494,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1561",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 420,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 38,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219942/?format=api",
            "priority": 100,
            "id": 1220787,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=5783c6d298543bb2",
            "url": "https://translate-dev.freebsd.org/api/units/1220787/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.857529Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "With in-kernel NAT all configuration is done in the NAT instance configuration.  For a full list of options that an in-kernel NAT instance can use, consult man:ipfw[8].  The IPFW syntax follows the syntax of natd. The syntax for `redirect_port` is as follows:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -4949226220319402673,
            "content_hash": -4949226220319402673,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1565",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 421,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 42,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219944/?format=api",
            "priority": 100,
            "id": 1220788,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=3b50d0f988d0154f",
            "url": "https://translate-dev.freebsd.org/api/units/1220788/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.863650Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Port ranges over individual ports can be indicated with `redirect_port`.  For example, _tcp 192.168.0.2:2000-3000 2000-3000_ would redirect all connections received on ports 2000 to 3000 to ports 2000 to 3000 on client `A`."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4015139282401260887,
            "content_hash": 4015139282401260887,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1592",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 427,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 33,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219946/?format=api",
            "priority": 100,
            "id": 1220789,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=b7b8a3e77b3e7557",
            "url": "https://translate-dev.freebsd.org/api/units/1220789/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.947729Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Address redirection is useful if more than one IP address is available.  Each LAN client can be assigned its own external IP address by man:ipfw[8], which will then rewrite outgoing packets from the LAN clients with the proper external IP address and redirects all traffic incoming on that particular IP address back to the specific LAN client.  This is also known as static NAT.  For example, if IP addresses `128.1.1.1`, `128.1.1.2`, and `128.1.1.3` are available, `128.1.1.1` can be used as the man:ipfw[8] machine's external IP address, while `128.1.1.2` and `128.1.1.3` are forwarded back to LAN clients `A` and `B`."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7732682720019079713,
            "content_hash": -7732682720019079713,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1599",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 429,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 99,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219948/?format=api",
            "priority": 100,
            "id": 1220790,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=14affe0920761ddf",
            "url": "https://translate-dev.freebsd.org/api/units/1220790/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.957293Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Like `redirect_port`, these arguments are placed in a NAT instance configuration.  With address redirection, there is no need for port redirection, as all data received on a particular IP address is redirected."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5392453725961664600,
            "content_hash": 5392453725961664600,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1617",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 434,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 32,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219950/?format=api",
            "priority": 100,
            "id": 1220791,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=cad5d817e3ad3858",
            "url": "https://translate-dev.freebsd.org/api/units/1220791/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.977378Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The external IP addresses on the man:ipfw[8] machine must be active and aliased to the external interface.  Refer to man:rc.conf[5] for details."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -3972364745465305567,
            "content_hash": -3972364745465305567,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1620",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 435,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 22,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219952/?format=api",
            "priority": 100,
            "id": 1220792,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=48df534f7c416621",
            "url": "https://translate-dev.freebsd.org/api/units/1220792/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:13.982094Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Let us start with a statement: the userspace NAT implementation: man:natd[8], has more overhead than in-kernel NAT.  For man:natd[8] to translate packets, the packets have to be copied from the kernel to userspace and back which brings in extra overhead that is not present with in-kernel NAT."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2662084635668367659,
            "content_hash": 2662084635668367659,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1625",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 437,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 47,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219954/?format=api",
            "priority": 100,
            "id": 1220793,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=a4f19fdf2f09c92b",
            "url": "https://translate-dev.freebsd.org/api/units/1220793/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.047352Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "In general, the above ruleset as explained for in-kernel NAT can also be used together with man:natd[8].  The exceptions are the configuration of the in-kernel NAT instance `(ipfw -q nat 1 config ...)` which is not needed together with reassemble rule 99 because its functionality is included in the `divert` action.  Rule number 100 and 1000 will have to change sligthly as shown below."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5003444473760653524,
            "content_hash": 5003444473760653524,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1640",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 440,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 64,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219958/?format=api",
            "priority": 100,
            "id": 1220795,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=c56fce3d4fe520d4",
            "url": "https://translate-dev.freebsd.org/api/units/1220795/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.065571Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "To configure port or address redirection, a similar syntax as with in-kernel NAT is used.  Although, now, instead of specifying the configuration in our ruleset script like with in-kernel NAT, configuration of man:natd[8] is best done in a configuration file.  To do this, an extra flag must be passed via [.filename]#/etc/rc.conf# which specifies the path of the configuration file."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 9212165706878749953,
            "content_hash": 9212165706878749953,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1650",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 442,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 59,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219960/?format=api",
            "priority": 100,
            "id": 1220796,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ffd82fe6fa8b0d01",
            "url": "https://translate-dev.freebsd.org/api/units/1220796/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.076163Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The specified file must contain a list of configuration options, one per line.  For more information about the configuration file and possible variables, consult man:natd[8].  Below are two example entries, one per line:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2009778870477233602,
            "content_hash": 2009778870477233602,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1661",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 444,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 33,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219962/?format=api",
            "priority": 100,
            "id": 1220797,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=9be42b3c03e19dc2",
            "url": "https://translate-dev.freebsd.org/api/units/1220797/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.150561Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "`ipfw` can be used to make manual, single rule additions or deletions to the active firewall while it is running.  The problem with using this method is that all the changes are lost when the system reboots.  It is recommended to instead write all the rules in a file and to use that file to load the rules at boot time and to replace the currently running firewall rules whenever that file changes."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 1731620985245333946,
            "content_hash": 1731620985245333946,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1676",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 447,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 73,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219964/?format=api",
            "priority": 100,
            "id": 1220798,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=9807f41c8f28f9ba",
            "url": "https://translate-dev.freebsd.org/api/units/1220798/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.163417Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "`ipfw` is a useful way to display the running firewall rules to the console screen.  The IPFW accounting facility dynamically creates a counter for each rule that counts each packet that matches the rule.  During the process of testing a rule, listing the rule with its counter is one way to determine if the rule is functioning as expected."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7504348868699344166,
            "content_hash": 7504348868699344166,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1680",
            "context": "",
            "note": "type: delimited block = 4",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 448,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 59,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219966/?format=api",
            "priority": 100,
            "id": 1220799,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=e824cd894d6dcd26",
            "url": "https://translate-dev.freebsd.org/api/units/1220799/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.170142Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The next example lists accounting information and the packet count for matched rules along with the rules themselves.  The first column is the rule number, followed by the number of matched packets and bytes, followed by the rule itself."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2560716663898934718,
            "content_hash": -2560716663898934718,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1697",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 453,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 39,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219968/?format=api",
            "priority": 100,
            "id": 1220800,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=5c7681c2ede17242",
            "url": "https://translate-dev.freebsd.org/api/units/1220800/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.270332Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Even with the logging facility enabled, IPFW will not generate any rule logging on its own.  The firewall administrator decides which rules in the ruleset will be logged, and adds the `log` keyword to those rules.  Normally only deny rules are logged.  It is customary to duplicate the \"ipfw default deny everything\" rule with the `log` keyword included as the last rule in the ruleset.  This way, it is possible to see all the packets that did not match any of the rules in the ruleset."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -1644595192860019034,
            "content_hash": -1644595192860019034,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1738",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 464,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 86,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219970/?format=api",
            "priority": 100,
            "id": 1220801,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=692d3962b24376a6",
            "url": "https://translate-dev.freebsd.org/api/units/1220801/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.383078Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Logging is a two edged sword.  If one is not careful, an over abundance of log data or a DoS attack can fill the disk with log files.  Log messages are not only written to syslogd, but also are displayed on the root console screen and soon become annoying."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7661687725300083659,
            "content_hash": -7661687725300083659,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1742",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 465,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 49,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219972/?format=api",
            "priority": 100,
            "id": 1220802,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=15ac379b71849435",
            "url": "https://translate-dev.freebsd.org/api/units/1220802/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.450103Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The `IPFIREWALL_VERBOSE_LIMIT=5` kernel option limits the number of consecutive messages sent to man:syslogd[8], concerning the packet matching of a given rule.  When this option is enabled in the kernel, the number of consecutive messages concerning a particular rule is capped at the number specified.  There is nothing to be gained from 200 identical log messages.  With this option set to five, five consecutive messages concerning a particular rule would be logged to syslogd and the remainder identical consecutive messages would be counted and posted to syslogd with a phrase like the following:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -20588940107098185,
            "content_hash": -20588940107098185,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1747",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 466,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 92,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219974/?format=api",
            "priority": 100,
            "id": 1220803,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=7fb6da77d29d57b7",
            "url": "https://translate-dev.freebsd.org/api/units/1220803/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.458175Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Most experienced IPFW users create a file containing the rules and code them in a manner compatible with running them as a script.  The major benefit of doing this is the firewall rules can be refreshed in mass without the need of rebooting the system to activate them.  This method is convenient in testing new rules as the procedure can be executed as many times as needed.  Being a script, symbolic substitution can be used for frequently used values to be substituted into multiple rules."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8626908573016137516,
            "content_hash": -8626908573016137516,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1762",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 470,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 85,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219976/?format=api",
            "priority": 100,
            "id": 1220804,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=0847105c3399e0d4",
            "url": "https://translate-dev.freebsd.org/api/units/1220804/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.482519Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This example script is compatible with the syntax used by the man:sh[1], man:csh[1], and man:tcsh[1] shells.  Symbolic substitution fields are prefixed with a dollar sign ($).  Symbolic fields do not have the $ prefix.  The value to populate the symbolic field must be enclosed in double quotes (\"\")."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -5488922921581174676,
            "content_hash": -5488922921581174676,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1767",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 471,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 48,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219978/?format=api",
            "priority": 100,
            "id": 1220805,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=33d36daf33a7a06c",
            "url": "https://translate-dev.freebsd.org/api/units/1220805/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.562568Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "In order to statically compile IPFW support into a custom kernel, refer to the instructions in crossref:kernelconfig[kernelconfig,Configuring the FreeBSD Kernel].  The following options are available for the custom kernel configuration file:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 8858849346323978983,
            "content_hash": 8858849346323978983,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1818",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 481,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 31,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219980/?format=api",
            "priority": 100,
            "id": 1220806,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=faf0f48b56579ae7",
            "url": "https://translate-dev.freebsd.org/api/units/1220806/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.671085Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "IPFILTER is a kernel-side firewall and NAT mechanism that can be controlled and monitored by userland programs.  Firewall rules can be set or deleted using ipf, NAT rules can be set or deleted using ipnat, run-time statistics for the kernel parts of IPFILTER can be printed using ipfstat, and ipmon can be used to log IPFILTER actions to the system log files."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -6316700535731841131,
            "content_hash": -6316700535731841131,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1845",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 486,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 62,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219982/?format=api",
            "priority": 100,
            "id": 1220807,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=285692547f2f1795",
            "url": "https://translate-dev.freebsd.org/api/units/1220807/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.762503Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "IPF was originally written using a rule processing logic of \"the last matching rule wins\" and only used stateless rules.  Since then, IPF has been enhanced to include the `quick` and `keep state` options."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -8933735976974277261,
            "content_hash": -8933735976974277261,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1848",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 487,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 34,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219984/?format=api",
            "priority": 100,
            "id": 1220808,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=0404fe763f522573",
            "url": "https://translate-dev.freebsd.org/api/units/1220808/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.769555Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The IPF FAQ is at http://www.phildev.net/ipf/index.html[http://www.phildev.net/ipf/index.html].  A searchable archive of the IPFilter mailing list is available at http://marc.info/?l=ipfilter[http://marc.info/?l=ipfilter]."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7679554968204599802,
            "content_hash": 7679554968204599802,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1851",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 488,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 18,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219986/?format=api",
            "priority": 100,
            "id": 1220809,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ea93428e38ebe1fa",
            "url": "https://translate-dev.freebsd.org/api/units/1220809/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.776869Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This section of the Handbook focuses on IPF as it pertains to FreeBSD.  It provides examples of rules that contain the `quick` and `keep state` options."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -1799527332828651869,
            "content_hash": -1799527332828651869,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1854",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 489,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 26,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219988/?format=api",
            "priority": 100,
            "id": 1220810,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=6706cb6cd3245ea3",
            "url": "https://translate-dev.freebsd.org/api/units/1220810/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.846939Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "For users who prefer to statically compile IPF support into a custom kernel, refer to the instructions in crossref:kernelconfig[kernelconfig,Configuring the FreeBSD Kernel].  The following kernel options are available:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 467657659443443650,
            "content_hash": 467657659443443650,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1861",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 492,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 28,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219990/?format=api",
            "priority": 100,
            "id": 1220811,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=867d7429db9df7c2",
            "url": "https://translate-dev.freebsd.org/api/units/1220811/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.864120Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "To configure the system to enable IPF at boot time, add the following entries to [.filename]#/etc/rc.conf#.  These entries will also enable logging and `default pass all`.  To change the default policy to `block all` without compiling a custom kernel, remember to add a `block all` rule at the end of the ruleset."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 2420765663371080697,
            "content_hash": 2420765663371080697,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1875",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 495,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 52,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219992/?format=api",
            "priority": 100,
            "id": 1220812,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=a198498b89b233f9",
            "url": "https://translate-dev.freebsd.org/api/units/1220812/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.881196Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "To load the firewall rules, specify the name of the ruleset file using `ipf`.  The following command can be used to replace the currently running firewall rules:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 4389224236433793120,
            "content_hash": 4389224236433793120,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1906",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 501,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 27,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219994/?format=api",
            "priority": 100,
            "id": 1220813,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=bce9a8301c2be060",
            "url": "https://translate-dev.freebsd.org/api/units/1220813/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:14.973853Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This provides the ability to make changes to a custom ruleset and update the running firewall with a fresh copy of the rules without having to reboot the system.  This method is convenient for testing new rules as the procedure can be executed as many times as needed."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -7871590730491513933,
            "content_hash": -7871590730491513933,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1916",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 504,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 48,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219996/?format=api",
            "priority": 100,
            "id": 1220814,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=12c27defa3cbb3b3",
            "url": "https://translate-dev.freebsd.org/api/units/1220814/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:15.052653Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This section describes the IPF rule syntax used to create stateful rules.  When creating rules, keep in mind that unless the `quick` keyword appears in a rule, every rule is read in order, with the _last matching rule_ being the one that is applied.  This means that even if the first rule to match a packet is a `pass`, if there is a later matching rule that is a `block`, the packet will be dropped.  Sample rulesets can be found in [.filename]#/usr/share/examples/ipfilter#."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2964971940932920928,
            "content_hash": -2964971940932920928,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1925",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 507,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 82,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1219998/?format=api",
            "priority": 100,
            "id": 1220815,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=56da4dba93b159a0",
            "url": "https://translate-dev.freebsd.org/api/units/1220815/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:15.073194Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The keywords which are used in rules must be written in a specific order, from left to right.  Some keywords are mandatory while others are optional.  Some keywords have sub-options which may be keywords themselves and also include more sub-options.  The keyword order is as follows, where the words shown in uppercase represent a variable and the words shown in lowercase must precede the variable that follows it:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 7475527645611898862,
            "content_hash": 7475527645611898862,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1933",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 509,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 68,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220002/?format=api",
            "priority": 100,
            "id": 1220817,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=e7be68c9614f37ee",
            "url": "https://translate-dev.freebsd.org/api/units/1220817/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:15.152515Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "This section describes each of these keywords and their options.  It is not an exhaustive list of every possible option.  Refer to man:ipf[5] for a complete description of the rule syntax that can be used when creating IPF rules and examples for using each keyword."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 991339669290411144,
            "content_hash": 991339669290411144,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1939",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 511,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 45,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220004/?format=api",
            "priority": 100,
            "id": 1220818,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=8dc1f22d47cee488",
            "url": "https://translate-dev.freebsd.org/api/units/1220818/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:15.164105Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "The action keyword indicates what to do with the packet if it matches that rule.  Every rule _must_ have an action.  The following actions are recognized:"
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": 5538263321870989021,
            "content_hash": 5538263321870989021,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1944",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 512,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 26,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220006/?format=api",
            "priority": 100,
            "id": 1220819,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=ccdbdd25f4b1f6dd",
            "url": "https://translate-dev.freebsd.org/api/units/1220819/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:15.172469Z"
        },
        {
            "translation": "https://translate-dev.freebsd.org/api/translations/documentation/bookshandbookfirewalls_index/fr_FR/?format=api",
            "source": [
                "Options are optional.  However, if multiple options are specified, they must be used in the order shown here."
            ],
            "previous_source": "",
            "target": [
                ""
            ],
            "id_hash": -2507878278461231454,
            "content_hash": -2507878278461231454,
            "location": "documentation/content/en/books/handbook/firewalls/_index.adoc:1973",
            "context": "",
            "note": "type: Plain text",
            "flags": "",
            "labels": [],
            "state": 0,
            "fuzzy": false,
            "translated": false,
            "approved": false,
            "position": 526,
            "has_suggestion": false,
            "has_comment": false,
            "has_failing_check": false,
            "num_words": 18,
            "source_unit": "https://translate-dev.freebsd.org/api/units/1220008/?format=api",
            "priority": 100,
            "id": 1220820,
            "web_url": "https://translate-dev.freebsd.org/translate/documentation/bookshandbookfirewalls_index/fr_FR/?checksum=5d3239fe38666ea2",
            "url": "https://translate-dev.freebsd.org/api/units/1220820/?format=api",
            "explanation": "",
            "extra_flags": "",
            "pending": false,
            "timestamp": "2021-06-08T13:13:15.362982Z"
        }
    ]
}