summaryrefslogtreecommitdiffstats
path: root/usr/local/www/firewall_nat_edit.php
Commit message (Collapse)AuthorAgeFilesLines
* Ticket #136. Fixed showing the link and calculating correct id to the rule ↵Ermal Luçi2010-01-271-9/+8
| | | | edit page.
* Ticket #136.Ermal Luçi2010-01-261-41/+42
| | | | | | | | Fix associated nat rules. Now both the filter rules and the nat ones contain a associated-rule-id tag which helps link the items together. The API to use for this is in itemid.inc. All the issues should be solved now.
* link to correct associated firewall ruleChris Buechler2009-12-131-1/+1
|
* Add patch from lietu (Janne Enberg). Ticket #136pierrepomes2009-12-121-15/+58
| | | | | | | | | | | | | | | | | | | | | 1) Multiple NAT rules can be assigned the same filter rule -> Fixed, added assigned-nat-rule-id to filter rules to keep track of the assignment 2) when removing the link (i.e. switching to "pass" or "none", the linked rule isn't deleted (should it be? probably yes) -> Fixed, when a NAT rule's association is removed, the filter rule is deleted. Added a "create new associated filter rule" option to the dropdown if there is none selected. 3) The destination IP and port of linked rules can be edited in firewall_rules_edit.php and shouldn't be. Source should be editable but not destination, since that should strictly be tied to the NAT rule. -> Fixed, you cannot edit the destination for the filter rules that are linked to NAT rules, this has been disabled both by JavaScript and PHP. 4) If you edit the source in a linked firewall rule, it gets overwritten when you edit the NAT rule. The NAT rule should never touch the firewall rule source after the rule exists. -> Fixed, previously the old rule was deleted and a new one created, now it only updates the old rule and doesn't touch the source. Also added crosslinking from the NAT rule to the filter rule and back, so you can jump to edit the filter rule from the NAT rule and vice-versa.
* Resolves #146 Add propper validation on alias usage. Allow port type aliases ↵Ermal Luçi2009-12-031-3/+3
| | | | only on port side and other aliases in ip specifications and similar. Introduce a new function is_portoralias to ressemble the is_ipaddroralias to check for the cases.
* Restore the external port range to. Resolves #192sullrich2009-12-021-0/+2
|
* Correctly set vtable classsullrich2009-12-021-1/+1
|
* Ticket #146. Fix the autocompletion of ports aliases only for the ports and ↵Ermal Luçi2009-11-301-9/+16
| | | | host/network aliases for the src/dst. Checking if a valid alias is entered end if it is a correct one for this box seems like to much overhead and work for this. (For firewall_nat_edit.php)
* Include filter.inc and shaper.incScott Ullrich2009-11-211-0/+2
|
* Rework includes/require. This saves about 4 megabytes.Scott Ullrich2009-11-211-0/+1
| | | | Simplify get_memory(). Tested on mips/i386
* Fixes Issue #142Ermal Luçi2009-11-091-0/+5
|
* show pass icon for rdr pass entries, fix editing of pass entriesChris Buechler2009-11-071-0/+1
|
* old version got committed accidentally, fixChris Buechler2009-11-071-1/+1
|
* Fix "Filter rule association" "Pass" optionunknown2009-11-071-0/+3
|
* Add pfSense_BUILDER_BINARIES: and pfSense_MODULE:. Adjust Copyright to ↵Scott Ullrich2009-09-141-1/+3
| | | | include 2009 on files that I have asserted (C) on
* Clarify what the drop down is forScott Ullrich2009-09-101-2/+2
|
* Add space in between save and end of table dataScott Ullrich2009-09-101-0/+4
|
* Add missing vncellScott Ullrich2009-09-101-1/+1
|
* Changed automatical filter rule creation to have multiple options.unknown2009-08-161-9/+24
|
* Added support for automatically managing firewall rules with NAT rules.unknown2009-08-141-12/+43
|
* Clear guiconfig from all sort junk functions and put them on the specific ↵Ermal Luçi2009-06-301-1/+0
| | | | | | pages where they are needed. Remove some sort functions not used.
* * Reorganize the 'apply' button infrustructure in the GUI.Ermal Luçi2009-06-301-2/+2
| | | | | | - Present three new functions is/mark/clear_subsystem_dirty('name_of_subsystem'). This makes easier to create such things without needing to introduce new globals. - Convert all pages to the new infrustructure - This improves a lot the control on this notification
* Remove ftp-proxy/pftpx/ftpsesame references we handle all of this in kernel ↵Ermal Luçi2009-03-161-39/+0
| | | | now.(yay!)
* Add CSS header like most pages already haveScott Ullrich2008-08-301-1/+4
|
* Rewrite the pfsense privilege system with the following goals in mind ...Matthew Grooms2008-08-011-0/+8
| | | | | | | | 1) Redefine page privileges to not use static urls 2) Accurate generation of privilege definitions from source 3) Merging the user and group privileges into a single set 4) Allow any privilege to be added to users or groups w/ inheritance 5) Cleaning up the related WebUI pages
* Rewrite portions of the user manager to ensure data is properly synced toMatthew Grooms2008-07-251-13/+0
| | | | | | | | | | | the system password and group databases. This is to provide better support for centralized user management when local account administration is preferred. I also took this opportunity to do some housekeeping. A lot of funtions that were only being used in one place or not at all were removed. The user page privelege checks were also simplified in preperation for future work in this area.
* Continue interface improvementsErmal Luçi2008-06-211-10/+4
|
* shorten description field to prevent creating rulesets that won't load.Chris Buechler2008-02-031-1/+1
| | | | Ticket #1619
* touch up textChris Buechler2008-01-081-1/+1
| | | | Ticket #1569
* Tell user which characters are badScott Ullrich2007-12-041-1/+1
|
* Use htmlentities() to detect html injections.Scott Ullrich2007-12-041-3/+4
|
* Do a check on all ID's > -1. When we a dup a rule with id 0 the checks ↵Scott Ullrich2007-12-031-1/+1
| | | | where bypassed. Spotted-by: billm
* * Run through all posted values and encode them to a temporary variable. IF ↵Scott Ullrich2007-12-031-0/+9
| | | | the contents differ then the operator is doing something bad. Simply reject the item with invalid character error and let them fix their XSS exploit attempt, etc.
* Add multi user firewall nat port forward capabilities.Scott Ullrich2007-12-031-4/+38
|
* Switch over to array style page titles. Obtained-from: m0n0wallScott Ullrich2007-11-161-2/+1
|
* Fixing css layoutSeth Mos2007-09-011-7/+7
|
* Limit NAT description to prevent invalid rules.Seth Mos2006-12-271-1/+8
| | | | Submitted-by: Devon O'Dell <devon.odell@coyotepoint.com>
* Fix case-oScott Ullrich2006-09-061-1/+1
| | | | | | s/carp/CARP Ticket #1097
* When a External port range item is an alias, disallow the entry of Local port.Scott Ullrich2006-09-041-7/+7
| | | | | In-discussion-with: BillM Bug-reported-by: ChrisB
* Correct error message field namesScott Ullrich2006-08-211-1/+1
| | | | Ticket #1084
* When redirecting FTP entries to internal, install rules for interface ↵Scott Ullrich2006-08-191-17/+17
| | | | address correctly if chosen.
* Make field names in input validation consistent with the field names on the ↵Scott Ullrich2006-05-011-1/+1
| | | | form. Our users are already confused enough to have this type of stuff going on.
* Return correct field for input validation for nat ipScott Ullrich2006-05-011-1/+1
|
* add value="yes" for nosyncScott Ullrich2006-04-211-1/+1
|
* Correctly display NOSYNCScott Ullrich2006-04-211-2/+3
| | | | Ticket #848
* Complete nosync supportScott Ullrich2006-04-211-0/+13
| | | | Ticket #848
* Add PPPOE options.Scott Ullrich2006-04-041-1/+3
|
* When adding a redirect for FTP alert the user that it really creates 2 ↵Scott Ullrich2006-04-041-2/+0
| | | | | | firewall rules Ticket #899
* When adding a redirect for FTP alert the user that it really creates 2 ↵Scott Ullrich2006-04-041-0/+8
| | | | | | firewall rules Ticket #899
* When selecting WAN ip in NAT port forward, correctly create the helper ↵Scott Ullrich2006-03-091-2/+7
| | | | | | firewall rule for it if the service is ftp Ticket #843
OpenPOWER on IntegriCloud