diff options
author | Chris Buechler <cmb@pfsense.org> | 2015-04-04 00:06:02 -0500 |
---|---|---|
committer | Chris Buechler <cmb@pfsense.org> | 2015-04-04 00:07:16 -0500 |
commit | 72992b8533b8335b20fd70e9b11f38e9397ed70f (patch) | |
tree | d1cf923d42f5e0d01d645af515e5b17e783dc175 /usr/local/www | |
parent | dc17a9dedd6a871c77836fc1158c4c9276ef9d36 (diff) | |
download | pfsense-72992b8533b8335b20fd70e9b11f38e9397ed70f.zip pfsense-72992b8533b8335b20fd70e9b11f38e9397ed70f.tar.gz |
There is no longer any need to restrict protocols for IPv4+IPv6 rules, the appropriate ruleset is generated and problem scenarios that would otherwise break here are prevented by other input validation.
Diffstat (limited to 'usr/local/www')
-rw-r--r-- | usr/local/www/firewall_rules_edit.php | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/usr/local/www/firewall_rules_edit.php b/usr/local/www/firewall_rules_edit.php index 1e438c1..5deeabf 100644 --- a/usr/local/www/firewall_rules_edit.php +++ b/usr/local/www/firewall_rules_edit.php @@ -298,11 +298,6 @@ if ($_POST) { $input_errors[] = gettext("You can not assign an IPv6 Gateway to an IPv4 Filter rule"); } } - - if (($_POST['proto'] != "tcp") && ($_POST['proto'] != "udp") && ($_POST['proto'] != "tcp/udp") && ($_POST['proto'] != "icmp")) { - if($_POST['ipprotocol'] == "inet46") - $input_errors[] = gettext("You can not assign a protocol other than ICMP, TCP, UDP or TCP/UDP to a rule that applies to IPv4 and IPv6"); - } if (($_POST['proto'] == "icmp") && ($_POST['icmptype'] <> "")){ if($_POST['ipprotocol'] == "inet46") $input_errors[] = gettext("You can not assign a ICMP type to a rule that applies to IPv4 and IPv6"); |