summaryrefslogtreecommitdiffstats
path: root/usr/local/www/firewall_nat_edit.php
Commit message (Collapse)AuthorAgeFilesLines
* Only apply this port check for TCP and UDP.jim-p2012-11-201-1/+1
|
* fixed pathsogun acik2012-11-051-2/+2
|
* Local port must be specified, fix input validationChris Buechler2011-12-251-2/+2
|
* Adding chosen but do not actually use it beyond loadingScott Ullrich2011-07-231-0/+4
|
* Oops fix hook nameScott Ullrich2011-07-181-1/+1
|
* Adding hook for interfaces editScott Ullrich2011-07-181-0/+2
|
* Add missing plugin code. Move the pre_write section up a bit.Scott Ullrich2011-05-301-0/+14
|
* Bug #1403. Filter Rules description do not get saved when "(quote) present ↵Evgeny Yurchenko2011-05-271-16/+1
| | | | as character
* Adding a new hook system for firewall nat edit and firewall rules edit page.Scott Ullrich2011-05-251-0/+15
| | | | | | | | | | | | | | Basically if the directory exists it will suck in the files to extend these pags. /usr/local/pkg/firewall_nat/input_validation /usr/local/pkg/firewall_nat/pre_write_config /usr/local/pkg/firewall_nat/htmlphpearly /usr/local/pkg/firewall_nat/htmlphplate /usr/local/pkg/firewall_rules/input_validation /usr/local/pkg/firewall_rules/pre_write_config /usr/local/pkg/firewall_rules/htmlphpearly /usr/local/pkg/firewall_rules/htmlphplate
* In IPsec, s/mobileclients/client/, this was changed long ago in the config ↵jim-p2011-03-281-1/+1
| | | | but not everywhere followed.
* Use autocomplete='off' like all other fields that accept aliases, to prevent ↵Erik Fonnesbeck2011-02-131-1/+1
| | | | web browser auto-complete from covering up the alias list popup.
* Generalize pppoe server enabled check and use it elsewhere in the GUI that ↵jim-p2011-02-101-3/+2
| | | | needed fixed. Still needs changes in filter.inc - Ticket #1243
* Add a per-entry option for Proxy ARP VIPs of the Network type to disable ↵jim-p2010-12-201-0/+2
| | | | their expansion on Port Forwards and Outbound NAT screens. Will allow users with large proxy arp subnets used only with 1:1 to still load those pages in a reasonable time. Resolves #1119
* Fix XSS issuesScott Ullrich2010-11-121-1/+1
|
* Bring in XSS id fixes from m0n0wallScott Ullrich2010-11-121-6/+6
|
* Fix input validation with "no rdr" for ticket #570Erik Fonnesbeck2010-09-291-10/+21
|
* Hide redirect and filter rule association fields when "no rdr" is checked. ↵Erik Fonnesbeck2010-09-291-4/+5
| | | | Ticket #570
* Fix associated rule source address changes on NAT Port ForwardRenato Botelho2010-08-261-9/+6
| | | | | | When we change the source address on a NAT Port Forward rule that had an associated rule, we need to change the associated rule source address as well
* Merge remote branch 'mainline/master'Renato Botelho2010-08-121-0/+1
|\ | | | | | | | | | | | | | | | | Conflicts: usr/local/www/diag_smart.php usr/local/www/firewall_rules_edit.php usr/local/www/interfaces.php usr/local/www/load_balancer_pool_edit.php usr/local/www/pkg_mgr_settings.php
| * Fix the ID for the link to the associated filter rule when a filter rule has ↵Erik Fonnesbeck2010-08-121-0/+1
| | | | | | | | not been saved since the associated rule was created.
* | gettext() fixes on firewall_nat_edit.phpCarlos Eduardo Ramos2010-08-121-16/+16
|/
* Fix link to the associated filter rule for port forwards on an interface ↵Erik Fonnesbeck2010-08-071-5/+2
| | | | other than the first with a filter rule.
* Checked gettext() implementation on firewall_nat_edit.phpCarlos Eduardo Ramos2010-07-131-1/+1
|
* Corrections gettext implementation on firewall_nat_edit.phpCarlos Eduardo Ramos2010-07-081-18/+8
|
* Merge remote branch 'mainline/master' into 2_firewallRenato Botelho2010-07-071-0/+24
|\
| * Add per-rule NAT reflection override.Erik Fonnesbeck2010-07-051-0/+16
| |
| * Add the missing VPN types to the interface list on port forwards and add the ↵Erik Fonnesbeck2010-07-051-0/+8
| | | | | | | | same VPNs to the list available on other types of NAT rules.
* | Revert "Implemment gettext()"Vinicius Coque2010-07-021-0/+10
| | | | | | | | | | | | | | | | | | | | This reverts commit 1baff2e5d32ebb5a71b07f38d9f97e3c4788e3be. Lot of syntax errors Conflicts: usr/local/www/firewall_nat_edit.php
* | Review firewall_nat_edit.phpRenato Botelho2010-06-301-13/+13
| |
* | Implemment gettext()Jeann2010-06-281-3/+3
| |
* | Implement gettext() callsCarlos Eduardo Ramos2010-06-241-99/+99
|/
* Properly generate a list of proxy arp VIPs for address drop-down list.jim-p2010-05-241-5/+5
|
* Various fixes to usage of ip2long, long2ip, and negated subnet masks, mostly ↵Erik Fonnesbeck2010-05-201-2/+2
| | | | affecting 64-bit. Ticket #459
* Use client-side values in the function call rather than PHP-generated values ↵Erik Fonnesbeck2010-05-141-1/+2
| | | | for further calls to this client-side function.
* Test correctly for previous existing entries of linked rules otherwise some ↵Ermal2010-05-131-1/+1
| | | | bad deletions might happen. Reported-by: http://forum.pfsense.org/index.php/topic,25091.0.html
* It wasn't clear enough why source port should usually be any. Make it more ↵Erik Fonnesbeck2010-05-111-1/+1
| | | | clear.
* fix display of PARP VIP ranges. Resolves #386Chris Buechler2010-05-011-2/+2
|
* Show the source options on port forwards if they are not at the defaults.Erik Fonnesbeck2010-04-301-0/+3
|
* Initialize variable properly, it fixes #557Renato Botelho2010-04-301-2/+4
|
* Improve NAT Port ForwardingRenato Botelho2010-04-291-144/+427
| | | | | | | | | | | | | | New features available are: * Now you can disable a rule * You can define "no rdr" rules * Source type, address and port, with an option "not" for exceptions * Destination type, address and port, with an option "not" for exceptions Implemented by: Carlos Eduardo Ramos <carlos.ramos@bluepex.com> Renato Botelho <renato.botelho@bluepex.com> Vinicius Coque <vinicius.coque@bluepex.com> Reviewed by: cmb and efonne Sponsored by: BluePex Security Solutions
* Add a new alias type, urltable, which downloads a file of IP/CIDR addresses ↵jim-p2010-04-211-0/+1
| | | | and loads them into a pf persist table instead of importing the addresses directly into a traditional alias. This allows for using huge tables of addresses that would otherwise break the GUI and/or fail to load into pf. Part of ticket #512
* Ticket #386. Add all possible proxy arp to the external ip when it is ↵Ermal Luçi2010-03-091-1/+11
| | | | defined as network.
* Ticket #136. Fixed showing the link and calculating correct id to the rule ↵Ermal Luçi2010-01-271-9/+8
| | | | edit page.
* Ticket #136.Ermal Luçi2010-01-261-41/+42
| | | | | | | | Fix associated nat rules. Now both the filter rules and the nat ones contain a associated-rule-id tag which helps link the items together. The API to use for this is in itemid.inc. All the issues should be solved now.
* link to correct associated firewall ruleChris Buechler2009-12-131-1/+1
|
* Add patch from lietu (Janne Enberg). Ticket #136pierrepomes2009-12-121-15/+58
| | | | | | | | | | | | | | | | | | | | | 1) Multiple NAT rules can be assigned the same filter rule -> Fixed, added assigned-nat-rule-id to filter rules to keep track of the assignment 2) when removing the link (i.e. switching to "pass" or "none", the linked rule isn't deleted (should it be? probably yes) -> Fixed, when a NAT rule's association is removed, the filter rule is deleted. Added a "create new associated filter rule" option to the dropdown if there is none selected. 3) The destination IP and port of linked rules can be edited in firewall_rules_edit.php and shouldn't be. Source should be editable but not destination, since that should strictly be tied to the NAT rule. -> Fixed, you cannot edit the destination for the filter rules that are linked to NAT rules, this has been disabled both by JavaScript and PHP. 4) If you edit the source in a linked firewall rule, it gets overwritten when you edit the NAT rule. The NAT rule should never touch the firewall rule source after the rule exists. -> Fixed, previously the old rule was deleted and a new one created, now it only updates the old rule and doesn't touch the source. Also added crosslinking from the NAT rule to the filter rule and back, so you can jump to edit the filter rule from the NAT rule and vice-versa.
* Resolves #146 Add propper validation on alias usage. Allow port type aliases ↵Ermal Luçi2009-12-031-3/+3
| | | | only on port side and other aliases in ip specifications and similar. Introduce a new function is_portoralias to ressemble the is_ipaddroralias to check for the cases.
* Restore the external port range to. Resolves #192sullrich2009-12-021-0/+2
|
* Correctly set vtable classsullrich2009-12-021-1/+1
|
* Ticket #146. Fix the autocompletion of ports aliases only for the ports and ↵Ermal Luçi2009-11-301-9/+16
| | | | host/network aliases for the src/dst. Checking if a valid alias is entered end if it is a correct one for this box seems like to much overhead and work for this. (For firewall_nat_edit.php)
OpenPOWER on IntegriCloud