diff options
author | Scott Ullrich <sullrich@pfsense.org> | 2010-07-12 00:09:33 -0400 |
---|---|---|
committer | Scott Ullrich <sullrich@pfsense.org> | 2010-07-12 00:09:33 -0400 |
commit | d5475741279b2a60bbcd9fc8aa6ffb4c0f39031e (patch) | |
tree | 18f85a06ff6ff4abe3833fe3fd35c13b706c8020 | |
parent | c662cc9d59835e302d559a34435c0c8ce3e55f8e (diff) | |
download | pfsense-d5475741279b2a60bbcd9fc8aa6ffb4c0f39031e.zip pfsense-d5475741279b2a60bbcd9fc8aa6ffb4c0f39031e.tar.gz |
Cleanup HTML formatting
-rwxr-xr-x | usr/local/www/firewall_nat_out.php | 47 |
1 files changed, 26 insertions, 21 deletions
diff --git a/usr/local/www/firewall_nat_out.php b/usr/local/www/firewall_nat_out.php index c4f21c1..6137565 100755 --- a/usr/local/www/firewall_nat_out.php +++ b/usr/local/www/firewall_nat_out.php @@ -305,37 +305,29 @@ include("head.inc"); <tr> <td> <div id="mainarea"> - <table class="tabcont" width="100%" border="0" cellpadding="6" cellspacing="0"> + <table class="tabcont" width="100%" border="0" cellpadding="4" cellspacing="0"> + <tr><td colspan="2"><b>Mode:</b></td></tr> <tr> - <td class="vtable"><p> - <input name="advancedoripsec" type="radio" id="ipsecpassthru" value="ipsecpassthru" <?php if (isset($config['nat']['ipsecpassthru']['enable'])) echo "checked";?>> - <strong><?=gettext("Automatic outbound NAT rule generation (IPsec passthrough)");?></strong></p> + <td> + <input name="advancedoripsec" type="radio" id="ipsecpassthru" value="ipsecpassthru" <?php if (isset($config['nat']['ipsecpassthru']['enable'])) echo "checked";?>> + <strong><?=gettext("Automatic outbound NAT rule generation (IPsec passthrough)");?></strong> </td> </tr> <tr> - <td class="vtable"><p> - <input name="advancedoripsec" type="radio" id="advancedoutbound" value="advancedoutboundnat" <?php if (isset($config['nat']['advancedoutbound']['enable'])) echo "checked";?>> - <strong><?=gettext("Manual Outbound NAT rule generation (Advanced Outbound NAT (AON))");?></strong></p></td> + <td> + <input name="advancedoripsec" type="radio" id="advancedoutbound" value="advancedoutboundnat" <?php if (isset($config['nat']['advancedoutbound']['enable'])) echo "checked";?>> + <strong><?=gettext("Manual Outbound NAT rule generation (Advanced Outbound NAT (AON))");?></strong></td> </tr> <tr> - <td> <input name="save" type="submit" class="formbtn" value="Save"> + <td class="vtable" > + <input name="save" type="submit" class="formbtn" value="Save"> + <br/> </td> </tr> - <tr> - <td colspan="2"><p><span class="vexpl"><span class="red"><strong>Note:<br> - </strong></span>If advanced outbound NAT is enabled, no outbound NAT - rules will be automatically generated any longer. Instead, only the mappings - you specify below will be used. With advanced outbound NAT disabled, - a mapping is automatically created for each interface's subnet - (except WAN). If you use target addresses other than the WAN interface's - IP address, then depending on the way your WAN connection is setup, you - may also need a <a href="firewall_virtual_ip.php">Virtual IP</a>.</span><br> - <br> - You may enter your own mappings below.</p> - </td> - </tr> </table> <table class="tabcont" width="100%" border="0" cellpadding="0" cellspacing="0"> + <tr><td colspan="5"><b> Mappings:</b></td></tr> + <tr><td> </td></tr> <tr id="frheader"> <td width="3%" class="list"> </td> <td width="3%" class="list"> </td> @@ -455,6 +447,19 @@ include("head.inc"); </tr> </table></td> </tr> + <tr> + <td colspan="12"> + <p><span class="vexpl"><span class="red"><strong>Note:<br> + </strong></span>If advanced outbound NAT is enabled, no outbound NAT + rules will be automatically generated any longer. Instead, only the mappings + you specify below will be used. With advanced outbound NAT disabled, + a mapping is automatically created for each interface's subnet + (except WAN). If you use target addresses other than the WAN interface's + IP address, then depending on the way your WAN connection is setup, you + may also need a <a href="firewall_virtual_ip.php">Virtual IP</a>.</span><br> + </td> + </tr> + </table> </div> </td> |