summaryrefslogtreecommitdiffstats
path: root/etc/inc/filter.inc
diff options
context:
space:
mode:
authorErmal Luçi <eri@pfsense.org>2008-06-18 21:12:37 +0000
committerErmal Luçi <eri@pfsense.org>2008-06-18 21:12:37 +0000
commit1197d8cf57d453517a5ebcebdcbaa4403b6b72dc (patch)
treea61eeb236db0b9eb6c308b1c9a10209c9cef6b36 /etc/inc/filter.inc
parentb7684e1d9430b687b2ba028de4540f5fd1ae9f8e (diff)
downloadpfsense-1197d8cf57d453517a5ebcebdcbaa4403b6b72dc.zip
pfsense-1197d8cf57d453517a5ebcebdcbaa4403b6b72dc.tar.gz
Remove dead code.
Diffstat (limited to 'etc/inc/filter.inc')
-rw-r--r--etc/inc/filter.inc51
1 files changed, 0 insertions, 51 deletions
diff --git a/etc/inc/filter.inc b/etc/inc/filter.inc
index fac49bd..441c01b 100644
--- a/etc/inc/filter.inc
+++ b/etc/inc/filter.inc
@@ -2542,7 +2542,6 @@ pass out all keep state label "let out anything from firewall host itself"
EOD;
- //$ipfrules .= create_firewall_outgoing_rules_to_itself();
/* permit internal ipsec outbound traffic */
$ipfrules .="pass out on \$enc0 keep state label \"IPsec internal host to host\"";
@@ -3123,56 +3122,6 @@ function setup_logging_interfaces() {
return $rules;
}
-function create_firewall_outgoing_rules_to_itself() {
- global $config, $g;
-
- if(isset($config['system']['developerspew'])) {
- $mt = microtime();
- echo "create_firewall_outgoing_rules_to_itself() being called $mt\n";
- }
-
- $i = 0;
- $rule .= "# pass traffic from firewall -> out\n";
- $rule .= "anchor \"firewallout\"\n";
-
- /* if list */
- $ifdescrs = get_configured_interface_list();
-
- update_filter_reload_status("Setting up tun interfaces (openvpn)");
-
- /* XXX: FIXME: Removal candidate. */
- /* openvpn tun interfaces. check for 100. */
- for($x=0; $x<100; $x++) {
- if(does_interface_exist("ovpn{$x}") == true) {
- /* If the interface has a gateway we do not add a pass in rule. */
- /* Some people use a TUN tunnel with public IP as a Multiwan interface */
- if(interface_has_gateway("openvpn{$x}")) {
- $rule .= "# Not adding default pass in rule for interface $friendlytunif - tun{$x} with a gateway!";
- } else {
- $rule .="pass in on openvpn{$x} all keep state label \"let out anything from firewall host itself openvpn\"\n";
- }
- }
- }
- for($x=0; $x<100; $x++) {
- if(does_interface_exist("tap{$x}") == true) {
- $rule .="pass out on tap{$x} all keep state label \"let out anything from firewall host itself openvpn\"\n";
- $friendlytapif = convert_real_interface_to_friendly_interface_name("tap{$x}");
- /* If the interface has a gateway we do not add a pass in rule. */
- /* Some people use a TAP tunnel with public IP as a Multiwan interface */
- if(interface_has_gateway("tap{$x}")) {
- $rule .= "# Not adding default pass in rule for interface $friendlytapif - tap{$x} with a gateway!";
- } else {
- $rule .="pass in on tap{$x} all keep state label \"let out anything from firewall host itself openvpn\"\n";
- }
- }
- }
-
- /* permit internal ipsec outbound traffic */
- $rule .="pass out on \$enc0 keep state label \"IPsec internal host to host\"";
-
- return $rule;
-}
-
function process_carp_nat_rules() {
global $g, $config;
OpenPOWER on IntegriCloud