Browsing Russian translation

Don't show this notice anymore
Before translating, be sure to go through Ubuntu Translators instructions and Russian guidelines.
110 of 20 results
127.
Do you want to provide it? %s
Do you want to provide them? %s
(no translation yet)
Translated by Maxim Taranov
Reviewed by Maxim Taranov
(no translation yet)
Translated by Maxim Taranov
Reviewed by Maxim Taranov
(no translation yet)
Translated by Maxim Taranov
Reviewed by Maxim Taranov
Located in ../clients/cli/connections.c:4647
369.
Usage: nmcli general reload { ARGUMENTS | help }

ARGUMENTS := [<flag>[,<flag>...]]

Reload NetworkManager's configuration and perform certain updates, like
flushing caches or rewriting external state to disk. This is similar to
sending SIGHUP to NetworkManager but it allows for more fine-grained
control over what to reload through the flags argument. It also allows
non-root access via PolicyKit and contrary to signals it is synchronous.

Available flags are:

'conf' Reload the NetworkManager.conf configuration from
disk. Note that this does not include connections, which
can be reloaded through 'nmcli connection reload' instead.

'dns-rc' Update DNS configuration, which usually involves writing
/etc/resolv.conf anew.

'dns-full' Restart the DNS plugin. This is for example useful when
using dnsmasq plugin, which uses additional configuration
in /etc/NetworkManager/dnsmasq.d. If you edit those files,
you can restart the DNS plugin. This action shortly
interrupts name resolution.

With no flags, everything that is supported is reloaded, which is
identical to sending a SIGHUP.
There are line breaks here. Each one represents a line break. Start a new line in the equivalent position in the translation.
There are leading/trailing spaces here. Each one represents a space character. Enter a space in the equivalent position in the translation.
(no translation yet)
Located in ../clients/cli/general.c:358
831.
The WireGuard config file must be a valid interface name followed by ".conf"
(no translation yet)
Located in ../clients/common/nm-vpn-helpers.c:377
860.
Key management used for the connection. One of "none" (WEP), "ieee8021x" (Dynamic WEP), "wpa-psk" (infrastructure WPA-PSK), "sae" (SAE) or "wpa-eap" (WPA-Enterprise). This property must be set for any Wi-Fi connection that uses security.
(no translation yet)
Located in ../clients/common/settings-docs.h.in:27
901.
Specifies the allowed "phase 2" inner non-EAP authentication method when an EAP method that uses an inner TLS tunnel is specified in the "eap" property. Recognized non-EAP "phase 2" methods are "pap", "chap", "mschap", "mschapv2", "gtc", "otp", "md5", and "tls". Each "phase 2" inner method requires specific parameters for successful authentication; see the wpa_supplicant documentation for more details.
(no translation yet)
Located in ../clients/common/settings-docs.h.in:68
902.
Specifies the allowed "phase 2" inner EAP-based authentication method when an EAP method that uses an inner TLS tunnel is specified in the "eap" property. Recognized EAP-based "phase 2" methods are "md5", "mschapv2", "otp", "gtc", and "tls". Each "phase 2" inner method requires specific parameters for successful authentication; see the wpa_supplicant documentation for more details.
(no translation yet)
Located in ../clients/common/settings-docs.h.in:69
972.
Whether Link-Local Multicast Name Resolution (LLMNR) is enabled for the connection. LLMNR is a protocol based on the Domain Name System (DNS) packet format that allows both IPv4 and IPv6 hosts to perform name resolution for hosts on the same local link. The permitted values are: "yes" (2) register hostname and resolving for the connection, "no" (0) disable LLMNR for the interface, "resolve" (1) do not register hostname but allow resolving of LLMNR host names If unspecified, "default" ultimately depends on the DNS plugin (which for systemd-resolved currently means "yes"). This feature requires a plugin which supports LLMNR. Otherwise the setting has no effect. One such plugin is dns-systemd-resolved.
(no translation yet)
Located in ../clients/common/settings-docs.h.in:143
974.
Whether mDNS is enabled for the connection. The permitted values are: "yes" (2) register hostname and resolving for the connection, "no" (0) disable mDNS for the interface, "resolve" (1) do not register hostname but allow resolving of mDNS host names and "default" (-1) to allow lookup of a global default in NetworkManager.conf. If unspecified, "default" ultimately depends on the DNS plugin (which for systemd-resolved currently means "no"). This feature requires a plugin which supports mDNS. Otherwise the setting has no effect. One such plugin is dns-systemd-resolved.
(no translation yet)
Located in ../clients/common/settings-docs.h.in:145
981.
This represents the identity of the connection used for various purposes. It allows to configure multiple profiles to share the identity. Also, the stable-id can contain placeholders that are substituted dynamically and deterministically depending on the context. The stable-id is used for generating IPv6 stable private addresses with ipv6.addr-gen-mode=stable-privacy. It is also used to seed the generated cloned MAC address for ethernet.cloned-mac-address=stable and wifi.cloned-mac-address=stable. It is also used as DHCP client identifier with ipv4.dhcp-client-id=stable and to derive the DHCP DUID with ipv6.dhcp-duid=stable-[llt,ll,uuid]. Note that depending on the context where it is used, other parameters are also seeded into the generation algorithm. For example, a per-host key is commonly also included, so that different systems end up generating different IDs. Or with ipv6.addr-gen-mode=stable-privacy, also the device's name is included, so that different interfaces yield different addresses. The '$' character is treated special to perform dynamic substitutions at runtime. Currently supported are "${CONNECTION}", "${DEVICE}", "${MAC}", "${BOOT}", "${RANDOM}". These effectively create unique IDs per-connection, per-device, per-boot, or every time. Note that "${DEVICE}" corresponds to the interface name of the device and "${MAC}" is the permanent MAC address of the device. Any unrecognized patterns following '$' are treated verbatim, however are reserved for future use. You are thus advised to avoid '$' or escape it as "$$". For example, set it to "${CONNECTION}-${BOOT}-${DEVICE}" to create a unique id for this connection that changes with every reboot and differs depending on the interface where the profile activates. If the value is unset, a global connection default is consulted. If the value is still unset, the default is similar to "${CONNECTION}" and uses a unique, fixed ID for the connection.
(no translation yet)
Located in ../clients/common/settings-docs.h.in:152
985.
Timeout in milliseconds to wait for device at startup. During boot, devices may take a while to be detected by the driver. This property will cause to delay NetworkManager-wait-online.service and nm-online to give the device a chance to appear. Note that this property only works together with NMSettingConnection:interface-name to identify the device that will be waited for. The value 0 means no wait time. The default value is -1, which currently has the same meaning as no wait time.
(no translation yet)
Located in ../clients/common/settings-docs.h.in:156
110 of 20 results

This translation is managed by Russian Ubuntu Translators, assigned by Ubuntu Translators.

You are not logged in. Please log in to work on translations.

Contributors to this translation: #D|zeR by RSIS, Al Tarakanoff, Aleksey Kabanov, Alex Lutz, Alexander Matveev, Alexey 'huNTer' Kolosov, Alexey Kotov, Andrey S. Bobryshev, Andy Lemz, Anton Patsev, Artem Popov, Copied by Zanata, Dmitry Shachnev, Dr Gregory House, Eugene Roskin, Evgeny, Ivlev Denis, JTux, Leonid Kanter, Leonid Ryzhov, Mathieu Trudel-Lapierre, Maxim Taranov, Melman, Michael Rybinsky, Nick Lavlinsky, Olcha Artna, Oleg Lyash, Roman Mindlin, Sergey Sedov, Stalker, Stas Solovey, TuzelKO, Xamuh, Yuri Kozlov, Yuri Myasoedov, Yuri Myasoedov, iseedeadcode, vanya, zamazan4ik, Глория Хрусталёва, Данил Тютюник, Устин, ☠Jay ZDLin☠.