diff options
author | Ermal Luci <eri@pfsense.org> | 2009-01-25 19:28:53 +0000 |
---|---|---|
committer | Ermal Luci <eri@pfsense.org> | 2009-01-25 19:28:53 +0000 |
commit | 775ccea3128661220000fddeffe5496c8c4d4775 (patch) | |
tree | d3474a0c3bc4a23ed928e307b6bde248d7b42cbf /usr/local/www/firewall_rules_edit.php | |
parent | e09bd5be5fd91e902d0d88f7c650b9e0b46eaca8 (diff) | |
download | pfsense-775ccea3128661220000fddeffe5496c8c4d4775.zip pfsense-775ccea3128661220000fddeffe5496c8c4d4775.tar.gz |
Add allow-opts filter rule option which is useful in multicast rule options.
Diffstat (limited to 'usr/local/www/firewall_rules_edit.php')
-rwxr-xr-x | usr/local/www/firewall_rules_edit.php | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/usr/local/www/firewall_rules_edit.php b/usr/local/www/firewall_rules_edit.php index 0883d62..c0d0d66 100755 --- a/usr/local/www/firewall_rules_edit.php +++ b/usr/local/www/firewall_rules_edit.php @@ -119,6 +119,8 @@ if (isset($id) && $a_filter[$id]) { $pconfig['tagged'] = $a_filter[$id]['tagged']; if (isset($a_filter[$id]['quick']) && $a_filter[$id]['quick']) $pconfig['quick'] = $a_filter[$id]['quick']; + if (isset($a_filter[$id]['allowopts'])) + $pconfig['allowopts'] = true; /* advanced */ $pconfig['max-src-nodes'] = $a_filter[$id]['max-src-nodes']; @@ -359,6 +361,10 @@ if ($_POST) { } /* Advanced options */ + if ($_POST['allowopts'] == "yes") + $filterent['allowopts'] = true; + else + unset($filterent['allowopts']); $filterent['max-src-nodes'] = $_POST['max-src-nodes']; $filterent['max-src-states'] = $_POST['max-src-states']; $filterent['statetimeout'] = $_POST['statetimeout']; @@ -962,6 +968,9 @@ include("head.inc"); </div> <div id="aodivmain" name="aodivmain" style="display:none"> + <input type="checkbox" id="allowopts" value="yes" name="allowopts"<?php if($pconfig['allowopts'] == true) echo " checked"; ?>> + <br/><span class="vexpl"><?=gettext("This allows packets with ip options to pass otherwise they are blocked by default i.e. with multicast routing/proxing.");?> + </span><p> <input name="tag" id="tag" value="<?=htmlspecialchars($pconfig['tag']);?>"> <br /><span class="vexpl"><?=gettext("You can mark a packet matching this rule and use this mark to match on other nat/filter rules. It is called <b>Policy filtering</b>");?> </span><p> |