blob: 79e2cf2c81bd877400d5e6b173bb47b3b297f4c5 [file] [log] [blame]
# Licensed to the Apache Software Foundation (ASF) under one
# or more contributor license agreements. See the NOTICE file
# distributed with this work for additional information
# regarding copyright ownership. The ASF licenses this file
# to you under the Apache License, Version 2.0 (the
# "License"); you may not use this file except in compliance
# with the License. You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing,
# software distributed under the License is distributed on an
# "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
# KIND, either express or implied. See the License for the
# specific language governing permissions and limitations
# under the License.
#
# Translators:
msgid ""
msgstr ""
"Project-Id-Version: Apache CloudStack Administration RTD\n"
"Report-Msgid-Bugs-To: \n"
"POT-Creation-Date: 2014-06-30 12:52+0200\n"
"PO-Revision-Date: 2016-12-18 23:39+0100\n"
"Language-Team: French (http://www.transifex.com/ke4qqq/apache-cloudstack-"
"administration-rtd/language/fr/)\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
"Language: fr\n"
"Plural-Forms: nplurals=2; plural=(n > 1);\n"
"Last-Translator: \n"
"X-Generator: Poedit 1.8.11\n"
# 3ec46c2d67cb4acc87705b3f0985e5c8
#: ../../networking/ip_forwarding_and_firewalling.rst:18
msgid "IP Forwarding and Firewalling"
msgstr "Redirection IP et pare-feu"
# 5bb709bf233742ce8f3a83dc5ce7cf26
#: ../../networking/ip_forwarding_and_firewalling.rst:20
msgid ""
"By default, all incoming traffic to the public IP address is rejected. All "
"outgoing traffic from the guests is also blocked by default."
msgstr ""
# 83f985061e4e4301aa5ce50049ea4565
#: ../../networking/ip_forwarding_and_firewalling.rst:23
msgid ""
"To allow outgoing traffic, follow the procedure in :ref:`egress-fw-rules`."
msgstr ""
# 1328a8040ae7487b8f7ed1dcaaf5a596
#: ../../networking/ip_forwarding_and_firewalling.rst:25
msgid ""
"To allow incoming traffic, users may set up firewall rules and/or port "
"forwarding rules. For example, you can use a firewall rule to open a range "
"of ports on the public IP address, such as 33 through 44. Then use port "
"forwarding rules to direct traffic from individual ports within that range "
"to specific ports on user VMs. For example, one port forwarding rule could "
"route incoming traffic on the public IP's port 33 to port 100 on one user "
"VM's private IP."
msgstr ""
# 88ee727310bb4a5789291e8e48578dab
#: ../../networking/ip_forwarding_and_firewalling.rst:35
msgid "Firewall Rules"
msgstr "Règles du parefeu"
# 073cb21345c44ce2a3f2ce3446d4ad3a
#: ../../networking/ip_forwarding_and_firewalling.rst:37
msgid ""
"By default, all incoming traffic to the public IP address is rejected by "
"the firewall. To allow external traffic, you can open firewall ports by "
"specifying firewall rules. You can optionally specify one or more CIDRs to "
"filter the source IPs. This is useful when you want to allow only incoming "
"requests from certain IP addresses."
msgstr ""
# b43e4fc4f43841c9aebd342bbd60b33d
#: ../../networking/ip_forwarding_and_firewalling.rst:43
msgid ""
"You cannot use firewall rules to open ports for an elastic IP address. When "
"elastic IP is used, outside access is instead controlled through the use of "
"security groups. See `\"Adding a Security Group\" <#adding-a-security-"
"group>`_."
msgstr ""
# 36b1e8acd3ef4b1cb7a7ffd1f60599c5
#: ../../networking/ip_forwarding_and_firewalling.rst:48
msgid ""
"In an advanced zone, you can also create egress firewall rules by using the "
"virtual router. For more information, see \":ref:`egress-fw-rules`\"."
msgstr ""
# 2aeb084c075b4451b0911c2a6baf0f84
#: ../../networking/ip_forwarding_and_firewalling.rst:51
msgid ""
"Firewall rules can be created using the Firewall tab in the Management "
"Server UI. This tab is not displayed by default when CloudStack is "
"installed. To display the Firewall tab, the CloudStack administrator must "
"set the global configuration parameter firewall.rule.ui.enabled to \"true.\""
msgstr ""
# e1408eeb730f4709bbba8852f79807fd
#: ../../networking/ip_forwarding_and_firewalling.rst:57
msgid "To create a firewall rule:"
msgstr "Pour créer une règle de parefeu :"
# 098b22043ec643559c039b39aa24d618
# f62479b013c241a791c42b8843bd140d
# c384f1b44804485fba23fe018c16683e
#: ../../networking/ip_forwarding_and_firewalling.rst:59
#: ../../networking/ip_forwarding_and_firewalling.rst:132
#: ../../networking/ip_forwarding_and_firewalling.rst:245
msgid "Log in to the CloudStack UI as an administrator or end user."
msgstr ""
"Se connecter à l'interface de CloudStack comme administrateur ou "
"utilisateur final."
# a633160d3ee343639365b9067af58eb1
# c6c7495d464a4262ace3361c7cce9b5b
#: ../../networking/ip_forwarding_and_firewalling.rst:61
#: ../../networking/ip_forwarding_and_firewalling.rst:134
msgid "In the left navigation, choose Network."
msgstr "Dans la navigation à gauche, choisissez Réseau."
# ff56e69810c34ee4a08280a7ef06cfbb
#: ../../networking/ip_forwarding_and_firewalling.rst:63
msgid "Click the name of the network where you want to work with."
msgstr "Cliquez sur le nom du réseau avec lequel vous souhaitez travailler."
# d546be88025a4254b8eecf1f0b16bdf0
#: ../../networking/ip_forwarding_and_firewalling.rst:65
msgid "Click View IP Addresses."
msgstr "Cliquez sur Voir les adresses IP."
# 0c60a7fde5644f9188c0bf190c166890
#: ../../networking/ip_forwarding_and_firewalling.rst:67
msgid "Click the IP address you want to work with."
msgstr ""
# 0e0775a902554fa68fc54157ed73ed0a
#: ../../networking/ip_forwarding_and_firewalling.rst:69
msgid "Click the Configuration tab and fill in the following values."
msgstr ""
# 8bb21f2deca7442683f782de4a83935f
#: ../../networking/ip_forwarding_and_firewalling.rst:71
msgid ""
"**Source CIDR**: (Optional) To accept only traffic from IP addresses within "
"a particular address block, enter a CIDR or a comma-separated list of "
"CIDRs. Example: 192.168.0.0/22. Leave empty to allow all CIDRs."
msgstr ""
# 4cb05fbe28ae408a8df34014da711575
#: ../../networking/ip_forwarding_and_firewalling.rst:76
msgid "**Protocol**: The communication protocol in use on the opened port(s)."
msgstr ""
# e59d4d2a187f4510a91409fac5cfb51c
#: ../../networking/ip_forwarding_and_firewalling.rst:79
msgid ""
"**Start Port and End Port**: The port(s) you want to open on the firewall. "
"If you are opening a single port, use the same number in both fields"
msgstr ""
# 3274875afce44bbe9d7017bb4e2fc2b2
#: ../../networking/ip_forwarding_and_firewalling.rst:83
msgid ""
"**ICMP Type and ICMP Code**: Used only if Protocol is set to ICMP. Provide "
"the type and code required by the ICMP protocol to fill out the ICMP "
"header. Refer to ICMP documentation for more details if you are not sure "
"what to enter"
msgstr ""
# 41821a610d844daf8255026b71299059
# 1d39fcb3a5e34d769f89885db9866836
# 2319658c89b74a0294ce8f0a253a4d53
#: ../../networking/ip_forwarding_and_firewalling.rst:88
#: ../../networking/ip_forwarding_and_firewalling.rst:163
#: ../../networking/ip_forwarding_and_firewalling.rst:276
msgid "Click Add."
msgstr "Cliquer sur Ajouter."
# eec2e0a57feb4eca85c58ac1b58b228b
#: ../../networking/ip_forwarding_and_firewalling.rst:94
msgid "Egress Firewall Rules in an Advanced Zone"
msgstr ""
# 3bae6d1e0fb543beaeb466c40aeddfc3
#: ../../networking/ip_forwarding_and_firewalling.rst:96
msgid ""
"The egress traffic originates from a private network to a public network, "
"such as the Internet. By default, the egress traffic is blocked in default "
"network offerings, so no outgoing traffic is allowed from a guest network "
"to the Internet. However, you can control the egress traffic in an Advanced "
"zone by creating egress firewall rules. When an egress firewall rule is "
"applied, the traffic specific to the rule is allowed and the remaining "
"traffic is blocked. When all the firewall rules are removed the default "
"policy, Block, is applied."
msgstr ""
# 80fbdba2a681463894376f620458c160
#: ../../networking/ip_forwarding_and_firewalling.rst:107
msgid "Prerequisites and Guidelines"
msgstr "Prérequis et lignes directrives"
# 998ae537c5664319b836e769ab967fc3
#: ../../networking/ip_forwarding_and_firewalling.rst:109
msgid "Consider the following scenarios to apply egress firewall rules:"
msgstr ""
# 18a68e97f28f4f7898b92513d34e5e26
#: ../../networking/ip_forwarding_and_firewalling.rst:111
msgid "Egress firewall rules are supported on Juniper SRX and virtual router."
msgstr ""
# a4eaae6cb4474e5a8182092404f48116
#: ../../networking/ip_forwarding_and_firewalling.rst:114
msgid "The egress firewall rules are not supported on shared networks."
msgstr ""
# 85bdd2e7a708485bae147bfa93cdcb1b
#: ../../networking/ip_forwarding_and_firewalling.rst:116
msgid ""
"Allow the egress traffic from specified source CIDR. The Source CIDR is "
"part of guest network CIDR."
msgstr ""
# d9af348ce95e47a0bae91a55488b1155
#: ../../networking/ip_forwarding_and_firewalling.rst:119
msgid "Allow the egress traffic with protocol TCP,UDP,ICMP, or ALL."
msgstr ""
# 786d85af2e334cf5a8a25fc59dde7cb5
#: ../../networking/ip_forwarding_and_firewalling.rst:121
msgid ""
"Allow the egress traffic with protocol and destination port range. The port "
"range is specified for TCP, UDP or for ICMP type and code."
msgstr ""
# 8d9e5fa49cb648a6ad0b917f06176014
#: ../../networking/ip_forwarding_and_firewalling.rst:124
msgid ""
"The default policy is Allow for the new network offerings, whereas on "
"upgrade existing network offerings with firewall service providers will "
"have the default egress policy Deny."
msgstr ""
# ee1ee0417255469abce66dbfd40f9611
#: ../../networking/ip_forwarding_and_firewalling.rst:130
msgid "Configuring an Egress Firewall Rule"
msgstr ""
# 4d43b047c25a4605acc888b025d376aa
#: ../../networking/ip_forwarding_and_firewalling.rst:136
msgid ""
"In Select view, choose Guest networks, then click the Guest network you "
"want."
msgstr ""
# 4c11dfc739f94ce0995b7c7bdf566e5d
#: ../../networking/ip_forwarding_and_firewalling.rst:139
msgid ""
"To add an egress rule, click the Egress rules tab and fill out the "
"following fields to specify what type of traffic is allowed to be sent out "
"of VM instances in this guest network:"
msgstr ""
# a476fe8da41b43168b89c7b558afcb48
#: ../../networking/ip_forwarding_and_firewalling.rst:143
msgid "|egress-firewall-rule.png|"
msgstr "|egress-firewall-rule.png|"
# d56527f1ac864c5c9d47df9e55c225cf
#: ../../networking/ip_forwarding_and_firewalling.rst:145
msgid ""
"**CIDR**: (Add by CIDR only) To send traffic only to the IP addresses "
"within a particular address block, enter a CIDR or a comma-separated list "
"of CIDRs. The CIDR is the base IP address of the destination. For example, "
"192.168.0.0/22. To allow all CIDRs, set to 0.0.0.0/0."
msgstr ""
# c1e8fac9fa8046d8a9315511c011542e
#: ../../networking/ip_forwarding_and_firewalling.rst:151
msgid ""
"**Protocol**: The networking protocol that VMs uses to send outgoing "
"traffic. The TCP and UDP protocols are typically used for data exchange and "
"end-user communications. The ICMP protocol is typically used to send error "
"messages or network monitoring data."
msgstr ""
# 6b9d46d4c88d48c98d3fa4fcceb60e29
#: ../../networking/ip_forwarding_and_firewalling.rst:156
msgid ""
"**Start Port, End Port**: (TCP, UDP only) A range of listening ports that "
"are the destination for the outgoing traffic. If you are opening a single "
"port, use the same number in both fields."
msgstr ""
# 17c266c56f194132a6fc948f3142e4bc
#: ../../networking/ip_forwarding_and_firewalling.rst:160
msgid ""
"**ICMP Type, ICMP Code**: (ICMP only) The type of message and error code "
"that are sent."
msgstr ""
# f0100304289f4a67b01e8f6c52976a10
#: ../../networking/ip_forwarding_and_firewalling.rst:167
msgid "Configuring the Default Egress Policy"
msgstr "Configurer la Stratégie par défaut Egress"
# a802326f92404392beacd9675985c106
#: ../../networking/ip_forwarding_and_firewalling.rst:169
msgid ""
"The default egress policy for Isolated guest network is configured by using "
"Network offering. Use the create network offering option to determine "
"whether the default policy should be block or allow all the traffic to the "
"public network from a guest network. Use this network offering to create "
"the network. If no policy is specified, by default all the traffic is "
"allowed from the guest network that you create by using this network "
"offering."
msgstr ""
# 9b5e480b6757449ab8272d3e7a691110
#: ../../networking/ip_forwarding_and_firewalling.rst:177
msgid "You have two options: Allow and Deny."
msgstr "Vous avez 2 options : Autoriser et Refuser."
# 9b8d4463d6024d8589cc801658fa7bab
#: ../../networking/ip_forwarding_and_firewalling.rst:180
msgid "Allow"
msgstr "Allow"
# 01d29e0665f84d548d9f41399d9258d8
#: ../../networking/ip_forwarding_and_firewalling.rst:182
msgid ""
"If you select Allow for a network offering, by default egress traffic is "
"allowed. However, when an egress rule is configured for a guest network, "
"rules are applied to block the specified traffic and rest are allowed. If "
"no egress rules are configured for the network, egress traffic is accepted."
msgstr ""
# 63816b9551f04933aa99e27cc3dc34f1
#: ../../networking/ip_forwarding_and_firewalling.rst:189
msgid "Deny"
msgstr "Deny"
# 1952d7735fb746a6834bbdeed4c1eaa9
#: ../../networking/ip_forwarding_and_firewalling.rst:191
msgid ""
"If you select Deny for a network offering, by default egress traffic for "
"the guest network is blocked. However, when an egress rules is configured "
"for a guest network, rules are applied to allow the specified traffic. "
"While implementing a guest network, CloudStack adds the firewall egress "
"rule specific to the default egress policy for the guest network."
msgstr ""
# 238db98415e74782937deddd3970b285
#: ../../networking/ip_forwarding_and_firewalling.rst:198
msgid "This feature is supported only on virtual router and Juniper SRX."
msgstr ""
# e460df960d61405db56e64d21a8c43d7
#: ../../networking/ip_forwarding_and_firewalling.rst:200
msgid "Create a network offering with your desirable default egress policy:"
msgstr ""
# 5271ad0a1d4a4a27aa5597b044b42acf
#: ../../networking/ip_forwarding_and_firewalling.rst:202
msgid "Log in with admin privileges to the CloudStack UI."
msgstr "Log in with admin privileges to the CloudStack UI."
# fd49a59627284ffda66fef7096eaa709
#: ../../networking/ip_forwarding_and_firewalling.rst:204
msgid "In the left navigation bar, click Service Offerings."
msgstr "In the left navigation bar, click Service Offerings."
# 7fce8b96f6e64727bb6063766c828bdd
#: ../../networking/ip_forwarding_and_firewalling.rst:206
msgid "In Select Offering, choose Network Offering."
msgstr "In Select Offering, choose Network Offering."
# ef8895c197ff4343b04aecc73b5a9294
#: ../../networking/ip_forwarding_and_firewalling.rst:208
msgid "Click Add Network Offering."
msgstr "Cliquer sur Ajouter une offre de réseau."
# abb73d0d766d4d32a4bbe32137193cad
#: ../../networking/ip_forwarding_and_firewalling.rst:210
msgid "In the dialog, make necessary choices, including firewall provider."
msgstr ""
# 932c30480a1f4e3ea92f06ba4296ae45
#: ../../networking/ip_forwarding_and_firewalling.rst:213
msgid "In the Default egress policy field, specify the behaviour."
msgstr ""
# 41d012a83e774bdeaeac42e5b44d851c
#: ../../networking/ip_forwarding_and_firewalling.rst:215
msgid "Click OK."
msgstr "Cliquez sur OK."
# 5a1192bc5c8a4c3c930879e56c5d58bb
#: ../../networking/ip_forwarding_and_firewalling.rst:217
msgid "Create an isolated network by using this network offering."
msgstr ""
# 3918ff66d4914376a4707b9db470a027
#: ../../networking/ip_forwarding_and_firewalling.rst:219
msgid ""
"Based on your selection, the network will have the egress public traffic "
"blocked or allowed."
msgstr ""
# 29ffedbd547e431f95d82b075df5ea66
#: ../../networking/ip_forwarding_and_firewalling.rst:224
msgid "Port Forwarding"
msgstr "Redirection de port"
# d9efd9df178e4f7c8d81b2ba24a9fdbb
#: ../../networking/ip_forwarding_and_firewalling.rst:226
msgid ""
"A port forward service is a set of port forwarding rules that define a "
"policy. A port forward service is then applied to one or more guest VMs. "
"The guest VM then has its inbound network access managed according to the "
"policy defined by the port forwarding service. You can optionally specify "
"one or more CIDRs to filter the source IPs. This is useful when you want to "
"allow only incoming requests from certain IP addresses to be forwarded."
msgstr ""
# ae4f5d3e4bc24f8584c17c3057688144
#: ../../networking/ip_forwarding_and_firewalling.rst:234
msgid ""
"A guest VM can be in any number of port forward services. Port forward "
"services can be defined but have no members. If a guest VM is part of more "
"than one network, port forwarding rules will function only if they are "
"defined on the default network"
msgstr ""
# 89ce910349884d8ea8a7b4f6aee10613
#: ../../networking/ip_forwarding_and_firewalling.rst:239
msgid ""
"You cannot use port forwarding to open ports for an elastic IP address. "
"When elastic IP is used, outside access is instead controlled through the "
"use of security groups. See Security Groups."
msgstr ""
# 263627f6e1de45999d0e9ab68c8a1a2d
#: ../../networking/ip_forwarding_and_firewalling.rst:243
msgid "To set up port forwarding:"
msgstr ""
# 41c9b9f2473e4b5aa0d8ea3c54e45b1b
#: ../../networking/ip_forwarding_and_firewalling.rst:247
msgid ""
"If you have not already done so, add a public IP address range to a zone in "
"CloudStack. See Adding a Zone and Pod in the Installation Guide."
msgstr ""
# 2c98fbd961df4ef28a276b3ccf1d53c0
#: ../../networking/ip_forwarding_and_firewalling.rst:251
msgid "Add one or more VM instances to CloudStack."
msgstr ""
# 17a544cc6c8a42cbaef47575f1029173
#: ../../networking/ip_forwarding_and_firewalling.rst:253
msgid "In the left navigation bar, click Network."
msgstr ""
# ade84b4f63694fadbe6c835b52ba796f
#: ../../networking/ip_forwarding_and_firewalling.rst:255
msgid "Click the name of the guest network where the VMs are running."
msgstr ""
# 48ab8bf9d7e04ca7a13eaf58eeead278
#: ../../networking/ip_forwarding_and_firewalling.rst:257
msgid ""
"Choose an existing IP address or acquire a new IP address. See `\"Acquiring "
"a New IP Address\" <#acquiring-a-new-ip-address>`_. Click the name of the "
"IP address in the list."
msgstr ""
# da392889cd304ce8973c2b4b8341665b
#: ../../networking/ip_forwarding_and_firewalling.rst:261
msgid "Click the Configuration tab."
msgstr "Cliquer sur l'onglet Configuration."
# 4d02af0497b544d89616ff1ddf286767
#: ../../networking/ip_forwarding_and_firewalling.rst:263
msgid "In the Port Forwarding node of the diagram, click View All."
msgstr ""
# ee9101e2c97447d4b23f89177c60e7ab
#: ../../networking/ip_forwarding_and_firewalling.rst:265
msgid "Fill in the following:"
msgstr "Remplissez les champs suivants:"
# e9d9402255ae405781f85b32409d3654
#: ../../networking/ip_forwarding_and_firewalling.rst:267
msgid ""
"**Public Port**: The port to which public traffic will be addressed on the "
"IP address you acquired in the previous step."
msgstr ""
# bf8d351e8ca649ca9931311f402ea7bc
#: ../../networking/ip_forwarding_and_firewalling.rst:270
msgid ""
"**Private Port**: The port on which the instance is listening for forwarded "
"public traffic."
msgstr ""
# 5140efc173fd46e194d6c4827a8a67fc
#: ../../networking/ip_forwarding_and_firewalling.rst:273
msgid "**Protocol**: The communication protocol in use between the two ports"
msgstr ""