From owner-svn-doc-head@freebsd.org Sat Jul 8 09:58:07 2017 Return-Path: Delivered-To: svn-doc-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 63784D95EA1; Sat, 8 Jul 2017 09:58:07 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 3AE5F7B100; Sat, 8 Jul 2017 09:58:07 +0000 (UTC) (envelope-from bhd@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id v689w6KI026008; Sat, 8 Jul 2017 09:58:06 GMT (envelope-from bhd@FreeBSD.org) Received: (from bhd@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id v689w6aR026007; Sat, 8 Jul 2017 09:58:06 GMT (envelope-from bhd@FreeBSD.org) Message-Id: <201707080958.v689w6aR026007@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhd set sender to bhd@FreeBSD.org using -f From: Bjoern Heidotting Date: Sat, 8 Jul 2017 09:58:06 +0000 (UTC) To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r50461 - head/de_DE.ISO8859-1/books/handbook/security X-SVN-Group: doc-head X-SVN-Commit-Author: bhd X-SVN-Commit-Paths: head/de_DE.ISO8859-1/books/handbook/security X-SVN-Commit-Revision: 50461 X-SVN-Commit-Repository: doc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-doc-head@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the doc tree for head List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jul 2017 09:58:07 -0000 Author: bhd Date: Sat Jul 8 09:58:06 2017 New Revision: 50461 URL: https://svnweb.freebsd.org/changeset/doc/50461 Log: Update to r50359: Add a note that FreeBSD 11 & newer have IPsec support enabled by default (no need to build a kernel). Set hostnames for different hosts before the &prompt.root; macro rather than in user input section. This resolves issue with double prompts in generated page. Modified: head/de_DE.ISO8859-1/books/handbook/security/chapter.xml Modified: head/de_DE.ISO8859-1/books/handbook/security/chapter.xml ============================================================================== --- head/de_DE.ISO8859-1/books/handbook/security/chapter.xml Sat Jul 8 07:31:33 2017 (r50460) +++ head/de_DE.ISO8859-1/books/handbook/security/chapter.xml Sat Jul 8 09:58:06 2017 (r50461) @@ -5,7 +5,7 @@ $FreeBSD$ $FreeBSDde: de-docproj/books/handbook/security/chapter.xml,v 1.178 2012/04/30 17:07:41 bcr Exp $ - basiert auf: r49377 + basiert auf: r50359 --> über das IPsec-Subsystem von &os; finden Sie in &man.ipsec.4;. - Um die Unterstützung für IPsec im Kernel - zu aktivieren, fügen Sie folgenden Optionen in die + Seit &os; 11 ist IPsec in der + Voreinstellung aktiviert. Um die Unterstützung für + IPsec in älteren Versionen zu aktivieren, + fügen Sie folgenden Optionen in die Kernelkonfigurationsdatei ein und erstellen Sie einen neuen Kernel, wie in beschrieben. @@ -2443,11 +2445,10 @@ round-trip min/avg/max/stddev = 28.106/94.594/154.524/ Netzwerkes richtig routen. Dazu werden folgende Befehle verwendet: - &prompt.root; corp-net# route add 10.0.0.0 10.0.0.5 255.255.255.0 -&prompt.root; corp-net# route add net 10.0.0.0: gateway 10.0.0.5 - - &prompt.root; priv-net# route add 10.246.38.0 10.246.38.1 255.255.255.0 -&prompt.root; priv-net# route add host 10.246.38.0: gateway 10.246.38.1 + corp-net&prompt.root; route add 10.0.0.0 10.0.0.5 255.255.255.0 +corp-net&prompt.root; route add net 10.0.0.0: gateway 10.0.0.5 +priv-net&prompt.root; route add 10.246.38.0 10.246.38.1 255.255.255.0 +priv-net&prompt.root; route add host 10.246.38.0: gateway 10.246.38.1 Ab jetzt sollten die Rechner von den Gateways sowie von den Rechnern hinter den Gateways erreichbar sein. Dies können