<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.manjaro.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Charles-Elie</id>
	<title>Manjaro - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.manjaro.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Charles-Elie"/>
	<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php/Special:Contributions/Charles-Elie"/>
	<updated>2026-04-10T20:02:03Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Firewalls/fr&amp;diff=54444</id>
		<title>Firewalls/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Firewalls/fr&amp;diff=54444"/>
		<updated>2025-04-07T04:41:15Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;Utiliser un pare-feu local est toujours une bonne pratique. Même si vous utiliser un pare-feu réseau, votre pare-feu local vous protège des menaces internes à votre réseau.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages/&amp;gt;&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
=Aperçu=&lt;br /&gt;
&lt;br /&gt;
Utiliser un pare-feu local est toujours une bonne pratique. Même si vous utiliser un pare-feu réseau, votre pare-feu local vous protège des menaces internes à votre réseau.&lt;br /&gt;
&lt;br /&gt;
=UFW= &lt;br /&gt;
&lt;br /&gt;
UFW stands for Uncomplicated FireWall, and is a program for managing a netfilter firewall. It provides a command line interface and aims to be uncomplicated and easy to use.  UFW is far simpler than iptables and a good place to start unless you have very specialized needs.&lt;br /&gt;
&lt;br /&gt;
==Installer UFW==&lt;br /&gt;
&lt;br /&gt;
You can install the {{ic|ufw}} package using you favorite package manager or the command:&lt;br /&gt;
 {{UserCmd|command=pamac install ufw}}&lt;br /&gt;
&lt;br /&gt;
Once UFW is installed you need to start and enable it using the commands:&lt;br /&gt;
 {{UserCmd|command=sudo systemctl enable ufw.service}}&lt;br /&gt;
 {{UserCmd|command=sudo ufw enable}}&lt;br /&gt;
&lt;br /&gt;
{{warning|Don't enable both iptables.service and ufw.service}}&lt;br /&gt;
&lt;br /&gt;
==Ajout d'une règle==&lt;br /&gt;
&lt;br /&gt;
Pour afficher la configuration actuelle, vous pouvez utiliser la commande suivante : {{ic|ufw status}}. Voici à quoi cela ressemble dans une nouvelle installation :&lt;br /&gt;
&lt;br /&gt;
{{UserCmdOutput|command=sudo ufw status verbose|result=&lt;br /&gt;
&amp;lt;pre&amp;gt;Status: active&lt;br /&gt;
Logging: on (low)&lt;br /&gt;
Default: deny (incoming), allow (outgoing), disabled (routed)&lt;br /&gt;
New profiles: skip&amp;lt;/pre&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
Cela indique que le trafic entrant sera bloqué et que le trafic sortant sera autorisé. C'est un bon point de départ pour la plupart des systèmes de bureau. Cependant, il est souvent nécessaire d'autoriser une partie du trafic entrant. Pour ce faire, utilisez la commande suivante : {{ic|ufw allow}}.Par exemple, si nous voulons autoriser le trafic ssh entrant afin de pouvoir nous connecter à la machine à partir d'autres machines du réseau, nous pouvons utiliser la commande :&lt;br /&gt;
{{UserCmd|command=sudo ufw allow ssh}}&lt;br /&gt;
&lt;br /&gt;
Si nous voulions également établir des connexions TCP vers un serveur Web local sur un port https 8443 (ce n'est pas le port standard pour https), nous pourrions utiliser la commande :&lt;br /&gt;
{{UserCmd|command=sudo ufw allow in 8443/tcp}}&lt;br /&gt;
&lt;br /&gt;
{{tip|When you don't specify &amp;quot;in&amp;quot; or &amp;quot;out&amp;quot;, &amp;quot;in&amp;quot; is assumed}}&lt;br /&gt;
&lt;br /&gt;
==UFW and Applications==&lt;br /&gt;
&lt;br /&gt;
You may notice a difference in the above two commands.  When we built the rules for ssh we used the name and for https we used the port number, 8443.  This is because UFW has a small database of applications it knows the ports for.  You can see the list with the command:&lt;br /&gt;
{{UserCmd|command=sudo ufw app list}}&lt;br /&gt;
&lt;br /&gt;
For applications on the list you can add them by name.  If you want to review the configuration for one of the applications, you can use the command {{ic|ufw app info}}.  For example, to the configuration for ssh:&lt;br /&gt;
&lt;br /&gt;
 {{UserCmdOutput|command=sudo ufw app info SSH|result=&lt;br /&gt;
&amp;lt;pre&amp;gt;Profile: SSH&lt;br /&gt;
Title: SSH server&lt;br /&gt;
Description: SSH server&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
Port:&lt;br /&gt;
  22/tcp&amp;lt;/pre&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{tip|When using ufw app the commands are case sensitive but when adding rules they are not}}&lt;br /&gt;
&lt;br /&gt;
Some additional preconfigured applications can be added by installing the package {{ic|ufw-extras}} with your favorite package manager or the command:&lt;br /&gt;
 {{UserCmd|command=pamac install ufw-extras}}&lt;br /&gt;
&lt;br /&gt;
==Removing Rules==&lt;br /&gt;
&lt;br /&gt;
Rules can be removed with the {{ic|ufw delete}} command.  For example, to delete our 8443 rules we could use the command:&lt;br /&gt;
 {{UserCmd|command=sudo ufw delete allow 8443/tcp}}&lt;br /&gt;
&lt;br /&gt;
You can also delete them by number.  This is easier if you have a numbered list which you can see with the command:&lt;br /&gt;
&lt;br /&gt;
{{UserCmdOutput|command=sudo ufw status numbered|result=&lt;br /&gt;
&amp;lt;pre&amp;gt;Status: active&lt;br /&gt;
To                         Action      From&lt;br /&gt;
     --                         ------      ----&lt;br /&gt;
[ 1] 22                         ALLOW IN    Anywhere&lt;br /&gt;
[ 2] 22 (v6)                    ALLOW IN    Anywhere (v6)&lt;br /&gt;
&amp;lt;/pre&amp;gt;}}&lt;br /&gt;
&lt;br /&gt;
Now if we wanted to stop allowing ssh on ipv6 we could use the command:&lt;br /&gt;
 {{UserCmd|command=sudo ufw delete 2}}&lt;br /&gt;
&lt;br /&gt;
==GUFW==&lt;br /&gt;
[[File:gufw.jpg|thumb|left|240px]]&lt;br /&gt;
&lt;br /&gt;
Prefer to use GUI applications and still want to manage your firewall? No problem.  GUFW is a GTK front-end for UFW that aims to make managing a Linux firewall as accessible and easy as possible. It features pre-sets for common ports and p2p applications.&lt;br /&gt;
&lt;br /&gt;
If it is not installed already gufw can be installed from the repos:&lt;br /&gt;
 {{UserCmd|command=pamac install gufw}}&lt;br /&gt;
&lt;br /&gt;
It will now be available in the menu as '''Firewall Configuration''' or by running {{ic|gufw}} directly.&lt;br /&gt;
&amp;lt;div style=&amp;quot;clear: both&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=iptables=&lt;br /&gt;
&lt;br /&gt;
iptables is included as part of the Linux kernel.  iptables is significantly more complicated than using a tool like UFW.  As a result, a full tutorial on iptables is beyond the scope of this wiki.  Using iptables on Manjaro should be the same for every distribution of Linux so there is plenty of available documentation.  Some of this is linked [[Firewalls#See_Also|below]].  Here are some basics to get you started.&lt;br /&gt;
&lt;br /&gt;
To enable loading rules on startup you can use the command:&lt;br /&gt;
 {{UserCmd|command=sudo systemctl enable iptables.service}}&lt;br /&gt;
&lt;br /&gt;
This will load the rules from the file {{ic|/etc/iptables/iptables.rules}}.&lt;br /&gt;
&lt;br /&gt;
To display the currently loaded rules:&lt;br /&gt;
 {{UserCmd|command=sudo iptables -L}}&lt;br /&gt;
&lt;br /&gt;
To save the current rules to a file&lt;br /&gt;
 {{UserCmd|command=sudo sh -c &amp;quot;iptables-save &amp;gt; /etc/iptables/iptables.rules&amp;quot;}}&lt;br /&gt;
&lt;br /&gt;
To load the rules from a file&lt;br /&gt;
 {{UserCmd|command=sudo sh -c &amp;quot;iptables-restore &amp;gt; /etc/iptables/iptables.rules&amp;quot;}}&lt;br /&gt;
&lt;br /&gt;
To allow ssh connections&lt;br /&gt;
 {{UserCmd|command=sudo iptables -A INPUT -p tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT}}&lt;br /&gt;
 {{UserCmd|command=sudo iptables -A OUTPUT -p tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT}}&lt;br /&gt;
&lt;br /&gt;
=See Also=&lt;br /&gt;
* The Arch Wiki on [https://wiki.archlinux.org/index.php/Ufw UFW]&lt;br /&gt;
* The [https://help.ubuntu.com/community/UFW UFW website]&lt;br /&gt;
* The [http://gufw.org/ GUFW website]&lt;br /&gt;
* The [https://linux.die.net/man/8/iptables iptables man page]&lt;br /&gt;
* The Arch Wiki on [https://wiki.archlinux.org/index.php/iptables iptables]&lt;br /&gt;
* The Debian Wiki on [https://wiki.debian.org/iptables iptables]&lt;br /&gt;
&lt;br /&gt;
[[Category:Contents Page{{#translation:}}]]&lt;br /&gt;
[[Category:Security{{#translation:}}]]&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Firewalls/fr&amp;diff=54422</id>
		<title>Firewalls/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Firewalls/fr&amp;diff=54422"/>
		<updated>2025-04-07T04:40:51Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;Pare-feux&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;languages/&amp;gt;&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
=Overview=&lt;br /&gt;
&lt;br /&gt;
Running a local firewall is almost always a good practice.  Even when you are behind a network firewall, a local firewall protects you from threats on the inside of your network.&lt;br /&gt;
&lt;br /&gt;
=UFW= &lt;br /&gt;
&lt;br /&gt;
UFW stands for Uncomplicated FireWall, and is a program for managing a netfilter firewall. It provides a command line interface and aims to be uncomplicated and easy to use.  UFW is far simpler than iptables and a good place to start unless you have very specialized needs.&lt;br /&gt;
&lt;br /&gt;
==Installing UFW==&lt;br /&gt;
&lt;br /&gt;
You can install the {{ic|ufw}} package using you favorite package manager or the command:&lt;br /&gt;
 {{UserCmd|command=pamac install ufw}}&lt;br /&gt;
&lt;br /&gt;
Once UFW is installed you need to start and enable it using the commands:&lt;br /&gt;
 {{UserCmd|command=sudo systemctl enable ufw.service}}&lt;br /&gt;
 {{UserCmd|command=sudo ufw enable}}&lt;br /&gt;
&lt;br /&gt;
{{warning|Don't enable both iptables.service and ufw.service}}&lt;br /&gt;
&lt;br /&gt;
==Adding Rules==&lt;br /&gt;
&lt;br /&gt;
To view the current configuration you can use the command {{ic|ufw status}}.  Here is what it looks like in a new install:&lt;br /&gt;
&lt;br /&gt;
{{UserCmdOutput|command=sudo ufw status verbose|result=&lt;br /&gt;
&amp;lt;pre&amp;gt;Status: active&lt;br /&gt;
Logging: on (low)&lt;br /&gt;
Default: deny (incoming), allow (outgoing), disabled (routed)&lt;br /&gt;
New profiles: skip&amp;lt;/pre&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
This indicates that it will block all incoming traffic and allow all outgoing traffic.  This is a good starting point for most desktop systems.  However, often we will want to allow some incoming traffic.  This can be done with the command {{ic|ufw allow}}.  For example, if we want to allow incoming ssh traffic so we can connect to the machine from other machines on the network we could use the command:&lt;br /&gt;
 {{UserCmd|command=sudo ufw allow ssh}}&lt;br /&gt;
&lt;br /&gt;
If we wanted to also tcp connections to a local webserver on a non-standard https port, 8443.  We could use the command:&lt;br /&gt;
 {{UserCmd|command=sudo ufw allow in 8443/tcp}}&lt;br /&gt;
&lt;br /&gt;
{{tip|When you don't specify &amp;quot;in&amp;quot; or &amp;quot;out&amp;quot;, &amp;quot;in&amp;quot; is assumed}}&lt;br /&gt;
&lt;br /&gt;
==UFW and Applications==&lt;br /&gt;
&lt;br /&gt;
You may notice a difference in the above two commands.  When we built the rules for ssh we used the name and for https we used the port number, 8443.  This is because UFW has a small database of applications it knows the ports for.  You can see the list with the command:&lt;br /&gt;
{{UserCmd|command=sudo ufw app list}}&lt;br /&gt;
&lt;br /&gt;
For applications on the list you can add them by name.  If you want to review the configuration for one of the applications, you can use the command {{ic|ufw app info}}.  For example, to the configuration for ssh:&lt;br /&gt;
&lt;br /&gt;
 {{UserCmdOutput|command=sudo ufw app info SSH|result=&lt;br /&gt;
&amp;lt;pre&amp;gt;Profile: SSH&lt;br /&gt;
Title: SSH server&lt;br /&gt;
Description: SSH server&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
Port:&lt;br /&gt;
  22/tcp&amp;lt;/pre&amp;gt;&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{tip|When using ufw app the commands are case sensitive but when adding rules they are not}}&lt;br /&gt;
&lt;br /&gt;
Some additional preconfigured applications can be added by installing the package {{ic|ufw-extras}} with your favorite package manager or the command:&lt;br /&gt;
 {{UserCmd|command=pamac install ufw-extras}}&lt;br /&gt;
&lt;br /&gt;
==Removing Rules==&lt;br /&gt;
&lt;br /&gt;
Rules can be removed with the {{ic|ufw delete}} command.  For example, to delete our 8443 rules we could use the command:&lt;br /&gt;
 {{UserCmd|command=sudo ufw delete allow 8443/tcp}}&lt;br /&gt;
&lt;br /&gt;
You can also delete them by number.  This is easier if you have a numbered list which you can see with the command:&lt;br /&gt;
&lt;br /&gt;
{{UserCmdOutput|command=sudo ufw status numbered|result=&lt;br /&gt;
&amp;lt;pre&amp;gt;Status: active&lt;br /&gt;
To                         Action      From&lt;br /&gt;
     --                         ------      ----&lt;br /&gt;
[ 1] 22                         ALLOW IN    Anywhere&lt;br /&gt;
[ 2] 22 (v6)                    ALLOW IN    Anywhere (v6)&lt;br /&gt;
&amp;lt;/pre&amp;gt;}}&lt;br /&gt;
&lt;br /&gt;
Now if we wanted to stop allowing ssh on ipv6 we could use the command:&lt;br /&gt;
 {{UserCmd|command=sudo ufw delete 2}}&lt;br /&gt;
&lt;br /&gt;
==GUFW==&lt;br /&gt;
[[File:gufw.jpg|thumb|left|240px]]&lt;br /&gt;
&lt;br /&gt;
Prefer to use GUI applications and still want to manage your firewall? No problem.  GUFW is a GTK front-end for UFW that aims to make managing a Linux firewall as accessible and easy as possible. It features pre-sets for common ports and p2p applications.&lt;br /&gt;
&lt;br /&gt;
If it is not installed already gufw can be installed from the repos:&lt;br /&gt;
 {{UserCmd|command=pamac install gufw}}&lt;br /&gt;
&lt;br /&gt;
It will now be available in the menu as '''Firewall Configuration''' or by running {{ic|gufw}} directly.&lt;br /&gt;
&amp;lt;div style=&amp;quot;clear: both&amp;quot;&amp;gt;&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=iptables=&lt;br /&gt;
&lt;br /&gt;
iptables is included as part of the Linux kernel.  iptables is significantly more complicated than using a tool like UFW.  As a result, a full tutorial on iptables is beyond the scope of this wiki.  Using iptables on Manjaro should be the same for every distribution of Linux so there is plenty of available documentation.  Some of this is linked [[Firewalls#See_Also|below]].  Here are some basics to get you started.&lt;br /&gt;
&lt;br /&gt;
To enable loading rules on startup you can use the command:&lt;br /&gt;
 {{UserCmd|command=sudo systemctl enable iptables.service}}&lt;br /&gt;
&lt;br /&gt;
This will load the rules from the file {{ic|/etc/iptables/iptables.rules}}.&lt;br /&gt;
&lt;br /&gt;
To display the currently loaded rules:&lt;br /&gt;
 {{UserCmd|command=sudo iptables -L}}&lt;br /&gt;
&lt;br /&gt;
To save the current rules to a file&lt;br /&gt;
 {{UserCmd|command=sudo sh -c &amp;quot;iptables-save &amp;gt; /etc/iptables/iptables.rules&amp;quot;}}&lt;br /&gt;
&lt;br /&gt;
To load the rules from a file&lt;br /&gt;
 {{UserCmd|command=sudo sh -c &amp;quot;iptables-restore &amp;gt; /etc/iptables/iptables.rules&amp;quot;}}&lt;br /&gt;
&lt;br /&gt;
To allow ssh connections&lt;br /&gt;
 {{UserCmd|command=sudo iptables -A INPUT -p tcp --dport 22 -m conntrack --ctstate NEW,ESTABLISHED -j ACCEPT}}&lt;br /&gt;
 {{UserCmd|command=sudo iptables -A OUTPUT -p tcp --sport 22 -m conntrack --ctstate ESTABLISHED -j ACCEPT}}&lt;br /&gt;
&lt;br /&gt;
=See Also=&lt;br /&gt;
* The Arch Wiki on [https://wiki.archlinux.org/index.php/Ufw UFW]&lt;br /&gt;
* The [https://help.ubuntu.com/community/UFW UFW website]&lt;br /&gt;
* The [http://gufw.org/ GUFW website]&lt;br /&gt;
* The [https://linux.die.net/man/8/iptables iptables man page]&lt;br /&gt;
* The Arch Wiki on [https://wiki.archlinux.org/index.php/iptables iptables]&lt;br /&gt;
* The Debian Wiki on [https://wiki.debian.org/iptables iptables]&lt;br /&gt;
&lt;br /&gt;
[[Category:Contents Page{{#translation:}}]]&lt;br /&gt;
[[Category:Security{{#translation:}}]]&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/12/fr&amp;diff=54421</id>
		<title>Translations:Firewalls/12/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/12/fr&amp;diff=54421"/>
		<updated>2025-03-29T13:48:15Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;Si nous voulions également établir des connexions TCP vers un serveur Web local sur un port https 8443 (ce n'est pas le port standard pour https), nous pourrions utiliser la...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Si nous voulions également établir des connexions TCP vers un serveur Web local sur un port https 8443 (ce n'est pas le port standard pour https), nous pourrions utiliser la commande :&lt;br /&gt;
$usercmd5&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/11/fr&amp;diff=54420</id>
		<title>Translations:Firewalls/11/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/11/fr&amp;diff=54420"/>
		<updated>2025-03-29T13:45:55Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;Cela indique que le trafic entrant sera bloqué et que le trafic sortant sera autorisé. C'est un bon point de départ pour la plupart des systèmes de bureau. Cependant, il e...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Cela indique que le trafic entrant sera bloqué et que le trafic sortant sera autorisé. C'est un bon point de départ pour la plupart des systèmes de bureau. Cependant, il est souvent nécessaire d'autoriser une partie du trafic entrant. Pour ce faire, utilisez la commande suivante : {{ic|ufw allow}}.Par exemple, si nous voulons autoriser le trafic ssh entrant afin de pouvoir nous connecter à la machine à partir d'autres machines du réseau, nous pouvons utiliser la commande :&lt;br /&gt;
$usercmd4&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/38/fr&amp;diff=54419</id>
		<title>Translations:Firewalls/38/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/38/fr&amp;diff=54419"/>
		<updated>2025-03-29T13:44:25Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;$usercmdoutput1&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;$usercmdoutput1&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/10/fr&amp;diff=54418</id>
		<title>Translations:Firewalls/10/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/10/fr&amp;diff=54418"/>
		<updated>2025-03-29T13:44:17Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;Pour afficher la configuration actuelle, vous pouvez utiliser la commande suivante : {{ic|ufw status}}. Voici à quoi cela ressemble dans une nouvelle installation :&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Pour afficher la configuration actuelle, vous pouvez utiliser la commande suivante : {{ic|ufw status}}. Voici à quoi cela ressemble dans une nouvelle installation :&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/9/fr&amp;diff=54417</id>
		<title>Translations:Firewalls/9/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/9/fr&amp;diff=54417"/>
		<updated>2025-03-29T13:43:36Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;==Ajout d'une règle==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Ajout d'une règle==&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/5/fr&amp;diff=54416</id>
		<title>Translations:Firewalls/5/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/5/fr&amp;diff=54416"/>
		<updated>2025-03-29T13:43:01Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;==Installer UFW==&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Installer UFW==&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/3/fr&amp;diff=54415</id>
		<title>Translations:Firewalls/3/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/3/fr&amp;diff=54415"/>
		<updated>2025-03-29T13:42:14Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;=UFW=&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=UFW=&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/2/fr&amp;diff=54414</id>
		<title>Translations:Firewalls/2/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/2/fr&amp;diff=54414"/>
		<updated>2025-03-29T13:50:00Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;Utiliser un pare-feu local est toujours une bonne pratique. Même si vous utiliser un pare-feu réseau, votre pare-feu local vous protège des menaces internes à votre réseau.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Utiliser un pare-feu local est toujours une bonne pratique. Même si vous utiliser un pare-feu réseau, votre pare-feu local vous protège des menaces internes à votre réseau.&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/1/fr&amp;diff=54413</id>
		<title>Translations:Firewalls/1/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/1/fr&amp;diff=54413"/>
		<updated>2025-03-29T13:41:28Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;=Aperçu=&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Aperçu=&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
	<entry>
		<id>https://wiki.manjaro.org/index.php?title=Translations:Firewalls/Page_display_title/fr&amp;diff=54412</id>
		<title>Translations:Firewalls/Page display title/fr</title>
		<link rel="alternate" type="text/html" href="https://wiki.manjaro.org/index.php?title=Translations:Firewalls/Page_display_title/fr&amp;diff=54412"/>
		<updated>2025-03-29T13:52:02Z</updated>

		<summary type="html">&lt;p&gt;Charles-Elie: Created page with &amp;quot;Pare-feux&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Pare-feux&lt;/div&gt;</summary>
		<author><name>Charles-Elie</name></author>
	</entry>
</feed>