diff options
author | jim-p <jimp@pfsense.org> | 2016-10-13 11:08:12 -0400 |
---|---|---|
committer | jim-p <jimp@pfsense.org> | 2016-10-13 11:08:29 -0400 |
commit | a4cd0c5ff74ed2e6de5213dd06f05de18300a441 (patch) | |
tree | 529e12d0e240d6932b57c47db8e0c07981033e51 | |
parent | 3d69cce529ac2d4942213a0ce2667e9ac0f1e0e8 (diff) | |
download | pfsense-a4cd0c5ff74ed2e6de5213dd06f05de18300a441.zip pfsense-a4cd0c5ff74ed2e6de5213dd06f05de18300a441.tar.gz |
Fix up help text on outbound NAT.
-rw-r--r-- | src/usr/local/www/firewall_nat_out_edit.php | 26 |
1 files changed, 14 insertions, 12 deletions
diff --git a/src/usr/local/www/firewall_nat_out_edit.php b/src/usr/local/www/firewall_nat_out_edit.php index 08cfc5c..157aa8d 100644 --- a/src/usr/local/www/firewall_nat_out_edit.php +++ b/src/usr/local/www/firewall_nat_out_edit.php @@ -507,7 +507,7 @@ $section->addInput(new Form_Select( 'Interface', $pconfig['interface'], $interfaces -))->setHelp('Choose which interface this rule applies to. In most cases "WAN" is specified.'); +))->setHelp('The interface on which traffic is matched as it exits the firewall. In most cases this is "WAN" or another externally-connected interface.'); $protocols = "any TCP UDP TCP/UDP ICMP ESP AH GRE IPV6 IGMP carp pfsync"; @@ -538,7 +538,7 @@ $group->add(new Form_Input( null, 'text', $pconfig['sourceport'] -))->setHelp('Port')->setWidth('2'); +))->setHelp('Port or Range')->setWidth('2'); $section->add($group); @@ -562,7 +562,7 @@ $group->add(new Form_Input( null, 'text', $pconfig['dstport'] -))->setHelp('Port')->setWidth('2'); +))->setHelp('Port or Range')->setWidth('2'); $section->add($group); @@ -583,18 +583,17 @@ $section->addInput(new Form_Select( 'Address', $pconfig['target'], build_target_list() -)); +))->setHelp( 'Connections matching this rule will be mapped to the specified <b>Address</b>.' . '<br />' . + 'The <b>Address</b> can be an Interface, a Host-type Alias, or a ' . + '<a href="firewall_virtual_ip.php">' . gettext("Virtual IP") . '</a> ' . ' address.'); $section->addInput(new Form_IpAddress( 'targetip', 'Other subnet', $pconfig['targetip'] ))->addMask('targetip_subnet', $pconfig['targetip_subnet'])->setHelp( - 'Packets matching this rule will be mapped to the IP address given here.' . '<br />' . - 'To apply this rule to a different IP address than the IP address of the interface chosen above, ' . - 'select it here (' . - '<a href="firewall_virtual_ip.php">' . gettext("Virtual IP") . '</a> ' . - 'addresses need to be defined on the interface first)'); + 'This subnet must be routed to the firewall or each address in the subnet must be defined in one or more ' . + '<a href="firewall_virtual_ip.php">' . gettext("Virtual IP") . '</a> ' . ' addresses.'); $section->addInput(new Form_Select( 'poolopts', @@ -625,7 +624,7 @@ $section->addInput(new Form_Input( $pconfig['source_hash_key'] ))->setHelp('The key that is fed to the hashing algorithm in hex format, preceeded by "0x", or any string. A non-hex string is hashed using md5 to a hexadecimal key. Defaults to a randomly generated value.')->setWidth(10); -$group = new Form_Group('Port'); +$group = new Form_Group('Port or Range'); $group->addClass('natportgrp'); $group->add(new Form_Input( @@ -633,12 +632,15 @@ $group->add(new Form_Input( null, 'text', $pconfig['natport'] -))->setHelp('Enter the source port or range for the outbound NAT mapping.'); +))->setHelp('Enter the external source <b>Port or Range</b> used for remapping '. + 'the original source port on connections matching the rule. <br/><br/>'. + 'Port ranges are a low port and high port number separated by ":".<br/>'. + 'Leave blank when <b>Static Port</b> is checked.'); $group->add(new Form_Checkbox( 'staticnatport', null, - 'Static port', + 'Static Port', $pconfig['staticnatport'] )); |