diff options
author | Carlos Eduardo Ramos <carlos.ramos@bluepex.com> | 2010-07-12 12:42:54 -0300 |
---|---|---|
committer | Carlos Eduardo Ramos <carlos.ramos@bluepex.com> | 2010-07-12 12:42:54 -0300 |
commit | 1dc3df6223356540e0d5c5b6f9bdb1db5da417cb (patch) | |
tree | f4389ac899d09547ac75b60685cba474fbdce549 /usr/local/www/firewall_nat_out.php | |
parent | 74aff49c2e38851147c02e5da25ddd1ecb637532 (diff) | |
download | pfsense-1dc3df6223356540e0d5c5b6f9bdb1db5da417cb.zip pfsense-1dc3df6223356540e0d5c5b6f9bdb1db5da417cb.tar.gz |
Checked gettext() implementation on firewall_nat_out.php
Diffstat (limited to 'usr/local/www/firewall_nat_out.php')
-rwxr-xr-x | usr/local/www/firewall_nat_out.php | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/usr/local/www/firewall_nat_out.php b/usr/local/www/firewall_nat_out.php index 59d6cb4..7049134 100755 --- a/usr/local/www/firewall_nat_out.php +++ b/usr/local/www/firewall_nat_out.php @@ -306,7 +306,7 @@ include("head.inc"); <td> <div id="mainarea"> <table class="tabcont" width="100%" border="0" cellpadding="0" cellspacing="0"> - <tr><td align="right"><b>Mode:</b></td> + <tr><td align="right"><b><?=gettext("Mode"); ?>:</b></td> <td> <input name="advancedoripsec" type="radio" id="ipsecpassthru" value="ipsecpassthru" <?php if (isset($config['nat']['ipsecpassthru']['enable'])) echo "checked";?>> <strong><?=gettext("Automatic outbound NAT rule generation<br/> (IPsec passthrough included)");?></strong> @@ -332,7 +332,7 @@ include("head.inc"); </tr> </table> <table class="tabcont" width="100%" border="0" cellpadding="0" cellspacing="0"> - <tr><td colspan="5"><b> Mappings:</b></td></tr> + <tr><td colspan="5"><b> <?=gettext("Mappings"); ?>:</b></td></tr> <tr><td> </td></tr> <tr id="frheader"> <td width="3%" class="list"> </td> @@ -455,14 +455,14 @@ include("head.inc"); </tr> <tr> <td colspan="12"> - <p><span class="vexpl"><span class="red"><strong>Note:<br> - </strong></span>If advanced outbound NAT is enabled, no outbound NAT - rules will be automatically generated any longer. Instead, only the mappings - you specify below will be used. With advanced outbound NAT disabled, - a mapping is automatically created for each interface's subnet - (except WAN). If you use target addresses other than the WAN interface's - IP address, then depending on the way your WAN connection is setup, you - may also need a <a href="firewall_virtual_ip.php">Virtual IP</a>.</span><br> + <p><span class="vexpl"><span class="red"><strong><?=gettext("Note"); ?>:<br> + </strong></span><?=gettext("If advanced outbound NAT is enabled, no outbound NAT " . + "rules will be automatically generated any longer. Instead, only the mappings " . + "you specify below will be used. With advanced outbound NAT disabled, " . + "a mapping is automatically created for each interface's subnet " . + "(except WAN). If you use target addresses other than the WAN interface's " . + "IP address, then depending on the way your WAN connection is setup, you " . + "may also need a"); ?> <a href="firewall_virtual_ip.php"><?=gettext("Virtual IP"); ?></a>.</span><br> </td> </tr> |