summaryrefslogtreecommitdiffstats
path: root/usr/local/www/firewall_rules_edit.php
diff options
context:
space:
mode:
authorChris Buechler <cmb@pfsense.org>2015-04-04 00:06:02 -0500
committerChris Buechler <cmb@pfsense.org>2015-04-04 00:07:16 -0500
commit72992b8533b8335b20fd70e9b11f38e9397ed70f (patch)
treed1cf923d42f5e0d01d645af515e5b17e783dc175 /usr/local/www/firewall_rules_edit.php
parentdc17a9dedd6a871c77836fc1158c4c9276ef9d36 (diff)
downloadpfsense-72992b8533b8335b20fd70e9b11f38e9397ed70f.zip
pfsense-72992b8533b8335b20fd70e9b11f38e9397ed70f.tar.gz
There is no longer any need to restrict protocols for IPv4+IPv6 rules, the appropriate ruleset is generated and problem scenarios that would otherwise break here are prevented by other input validation.
Diffstat (limited to 'usr/local/www/firewall_rules_edit.php')
-rw-r--r--usr/local/www/firewall_rules_edit.php5
1 files changed, 0 insertions, 5 deletions
diff --git a/usr/local/www/firewall_rules_edit.php b/usr/local/www/firewall_rules_edit.php
index 1e438c1..5deeabf 100644
--- a/usr/local/www/firewall_rules_edit.php
+++ b/usr/local/www/firewall_rules_edit.php
@@ -298,11 +298,6 @@ if ($_POST) {
$input_errors[] = gettext("You can not assign an IPv6 Gateway to an IPv4 Filter rule");
}
}
-
- if (($_POST['proto'] != "tcp") && ($_POST['proto'] != "udp") && ($_POST['proto'] != "tcp/udp") && ($_POST['proto'] != "icmp")) {
- if($_POST['ipprotocol'] == "inet46")
- $input_errors[] = gettext("You can not assign a protocol other than ICMP, TCP, UDP or TCP/UDP to a rule that applies to IPv4 and IPv6");
- }
if (($_POST['proto'] == "icmp") && ($_POST['icmptype'] <> "")){
if($_POST['ipprotocol'] == "inet46")
$input_errors[] = gettext("You can not assign a ICMP type to a rule that applies to IPv4 and IPv6");
OpenPOWER on IntegriCloud