summaryrefslogtreecommitdiffstats
path: root/usr/local/www/firewall_rules_edit.php
diff options
context:
space:
mode:
authorErmal Luci <eri@pfsense.org>2009-01-25 19:28:53 +0000
committerErmal Luci <eri@pfsense.org>2009-01-25 19:28:53 +0000
commit775ccea3128661220000fddeffe5496c8c4d4775 (patch)
treed3474a0c3bc4a23ed928e307b6bde248d7b42cbf /usr/local/www/firewall_rules_edit.php
parente09bd5be5fd91e902d0d88f7c650b9e0b46eaca8 (diff)
downloadpfsense-775ccea3128661220000fddeffe5496c8c4d4775.zip
pfsense-775ccea3128661220000fddeffe5496c8c4d4775.tar.gz
Add allow-opts filter rule option which is useful in multicast rule options.
Diffstat (limited to 'usr/local/www/firewall_rules_edit.php')
-rwxr-xr-xusr/local/www/firewall_rules_edit.php9
1 files changed, 9 insertions, 0 deletions
diff --git a/usr/local/www/firewall_rules_edit.php b/usr/local/www/firewall_rules_edit.php
index 0883d62..c0d0d66 100755
--- a/usr/local/www/firewall_rules_edit.php
+++ b/usr/local/www/firewall_rules_edit.php
@@ -119,6 +119,8 @@ if (isset($id) && $a_filter[$id]) {
$pconfig['tagged'] = $a_filter[$id]['tagged'];
if (isset($a_filter[$id]['quick']) && $a_filter[$id]['quick'])
$pconfig['quick'] = $a_filter[$id]['quick'];
+ if (isset($a_filter[$id]['allowopts']))
+ $pconfig['allowopts'] = true;
/* advanced */
$pconfig['max-src-nodes'] = $a_filter[$id]['max-src-nodes'];
@@ -359,6 +361,10 @@ if ($_POST) {
}
/* Advanced options */
+ if ($_POST['allowopts'] == "yes")
+ $filterent['allowopts'] = true;
+ else
+ unset($filterent['allowopts']);
$filterent['max-src-nodes'] = $_POST['max-src-nodes'];
$filterent['max-src-states'] = $_POST['max-src-states'];
$filterent['statetimeout'] = $_POST['statetimeout'];
@@ -962,6 +968,9 @@ include("head.inc");
</div>
<div id="aodivmain" name="aodivmain" style="display:none">
+ <input type="checkbox" id="allowopts" value="yes" name="allowopts"<?php if($pconfig['allowopts'] == true) echo " checked"; ?>>
+ <br/><span class="vexpl"><?=gettext("This allows packets with ip options to pass otherwise they are blocked by default i.e. with multicast routing/proxing.");?>
+ </span><p>
<input name="tag" id="tag" value="<?=htmlspecialchars($pconfig['tag']);?>">
<br /><span class="vexpl"><?=gettext("You can mark a packet matching this rule and use this mark to match on other nat/filter rules. It is called <b>Policy filtering</b>");?>
</span><p>
OpenPOWER on IntegriCloud