diff options
author | Chris Buechler <cmb@pfsense.org> | 2010-01-04 20:50:33 -0500 |
---|---|---|
committer | Chris Buechler <cmb@pfsense.org> | 2010-01-04 20:50:33 -0500 |
commit | 5bc37291c754af3910fe5484043f071289f8cc39 (patch) | |
tree | 08174eba12a691f13e409d516238a5489c461adc /usr | |
parent | aef123a00e958111285f5196520b2bb3cd860ee7 (diff) | |
download | pfsense-5bc37291c754af3910fe5484043f071289f8cc39.zip pfsense-5bc37291c754af3910fe5484043f071289f8cc39.tar.gz |
remove broken input validation check. There's no harm in duplicate outbound NAT rules and the logic here is way off, no need for this check at all.
Diffstat (limited to 'usr')
-rwxr-xr-x | usr/local/www/firewall_nat_out_edit.php | 9 |
1 files changed, 0 insertions, 9 deletions
diff --git a/usr/local/www/firewall_nat_out_edit.php b/usr/local/www/firewall_nat_out_edit.php index 8083a3c..209ee78 100755 --- a/usr/local/www/firewall_nat_out_edit.php +++ b/usr/local/www/firewall_nat_out_edit.php @@ -188,15 +188,6 @@ if ($_POST) { if (!$natent['interface']) { $natent['interface'] == "wan"; } - if (($natent['interface'] == $_POST['interface']) && ($natent['source']['network'] == $osn)) { - if (isset($natent['destination']['not']) == isset($_POST['destination_not'])) { - if ((isset($natent['destination']['any']) && ($ext == "any")) || - ($natent['destination']['address'] == $ext)) { - $input_errors[] = "There is already an outbound NAT rule with the specified settings."; - break; - } - } - } } if (!$input_errors) { |