summaryrefslogtreecommitdiffstats
path: root/usr/local/www/firewall_nat_out_edit.php
diff options
context:
space:
mode:
authorChris Buechler <cmb@pfsense.org>2010-01-04 20:50:33 -0500
committerChris Buechler <cmb@pfsense.org>2010-01-04 20:50:33 -0500
commit5bc37291c754af3910fe5484043f071289f8cc39 (patch)
tree08174eba12a691f13e409d516238a5489c461adc /usr/local/www/firewall_nat_out_edit.php
parentaef123a00e958111285f5196520b2bb3cd860ee7 (diff)
downloadpfsense-5bc37291c754af3910fe5484043f071289f8cc39.zip
pfsense-5bc37291c754af3910fe5484043f071289f8cc39.tar.gz
remove broken input validation check. There's no harm in duplicate outbound NAT rules and the logic here is way off, no need for this check at all.
Diffstat (limited to 'usr/local/www/firewall_nat_out_edit.php')
-rwxr-xr-xusr/local/www/firewall_nat_out_edit.php9
1 files changed, 0 insertions, 9 deletions
diff --git a/usr/local/www/firewall_nat_out_edit.php b/usr/local/www/firewall_nat_out_edit.php
index 8083a3c..209ee78 100755
--- a/usr/local/www/firewall_nat_out_edit.php
+++ b/usr/local/www/firewall_nat_out_edit.php
@@ -188,15 +188,6 @@ if ($_POST) {
if (!$natent['interface']) {
$natent['interface'] == "wan";
}
- if (($natent['interface'] == $_POST['interface']) && ($natent['source']['network'] == $osn)) {
- if (isset($natent['destination']['not']) == isset($_POST['destination_not'])) {
- if ((isset($natent['destination']['any']) && ($ext == "any")) ||
- ($natent['destination']['address'] == $ext)) {
- $input_errors[] = "There is already an outbound NAT rule with the specified settings.";
- break;
- }
- }
- }
}
if (!$input_errors) {
OpenPOWER on IntegriCloud