summaryrefslogtreecommitdiffstats
path: root/etc
diff options
context:
space:
mode:
authorMatthew Grooms <mgrooms@pfsense.org>2008-09-05 03:16:33 +0000
committerMatthew Grooms <mgrooms@pfsense.org>2008-09-05 03:16:33 +0000
commit0770c295d1d43034da9949058e429b99cffb3031 (patch)
treec06e7a9f037e58e50609f6bab2a5e80f593fe0ea /etc
parent3f066eb8107b00fbf552ea0c2bb4f26f0b3c18e6 (diff)
downloadpfsense-0770c295d1d43034da9949058e429b99cffb3031.zip
pfsense-0770c295d1d43034da9949058e429b99cffb3031.tar.gz
Remove the code that auto-generates an outbound NAT rule for traffic that
originates from a private network to a distant OpenVPN network. We don't want to unconditionally hide all traffic behind the vpn interface address. If a admin wants to do this manually, nothing is stopping them.
Diffstat (limited to 'etc')
-rw-r--r--etc/inc/filter.inc13
1 files changed, 2 insertions, 11 deletions
diff --git a/etc/inc/filter.inc b/etc/inc/filter.inc
index 5fbd2e0..3162d05 100644
--- a/etc/inc/filter.inc
+++ b/etc/inc/filter.inc
@@ -736,23 +736,14 @@ function filter_nat_rules_generate()
if ($numberofnathosts > 0):
- if (!empty($config['openvpn']['openvpn-client'])) {
- foreach ($config['openvpn']['openvpn-client'] as $settings) {
- $vpnid = $settings['vpnid'];
- if (!empty($settings['remote_network']))
- $natrules .= "nat on ovpnc{$vpnid} from \$tonatsubnets to any -> (ovpnc{$vpnid})\n";
- }
- }
-
foreach ($FilterIflist as $if => $ifcfg) {
update_filter_reload_status("Creating outbound rules {$if} - ({$ifcfg['descr']})");
if (interface_has_gateway($if)) {
$target = get_current_wan_address($if);
- /* do not nat tftp proxy */
- $natrules .= "no nat on \${$ifcfg['descr']} to port tftp\n";
-
+ /* do not nat tftp proxy */
+ $natrules .= "no nat on \${$ifcfg['descr']} to port tftp\n";
/* create outbound nat entries for all local networks */
$natrules .= filter_nat_rules_generate_if($if,
OpenPOWER on IntegriCloud