summaryrefslogtreecommitdiffstats
path: root/usr/local/www/system_advanced_firewall.php
Commit message (Collapse)AuthorAgeFilesLines
* Add a knob to tune the maximum number of tables that can be defined, the pf ↵jim-p2012-05-291-0/+21
| | | | default of 1000 is too low for systems with >500 aliases.
* Add a checkbox that disabled automatically generates negate rules for ↵smos2011-12-201-0/+16
| | | | | | directly connected networks and VPNs Ticket #2057 in redmine
* until 2.0.1 is tagged, Revert "Add a checkbox that disabled automatically ↵RELENG_2_0_1Chris Buechler2011-12-201-16/+0
| | | | | | generates negate rules for directly connected networks and VPNs" This reverts commit 9ae39b01fb7dfd9c27091e3fae7e034e9e115519.
* Add a checkbox that disabled automatically generates negate rules for ↵smos2011-12-201-0/+16
| | | | | | directly connected networks and VPNs Ticket #2057 in redmine
* Fix typojim-p2011-10-191-1/+1
|
* Clarify notes so people don't think they need to disable pf to disable NAT.jim-p2011-08-301-1/+2
|
* remove dead link, no equivalent exists, will add info on that page's helpChris Buechler2011-08-201-1/+0
|
* Test if a variable is set before trying to unset it. If a user has no rules ↵jim-p2011-04-141-1/+1
| | | | in their config, then $config['filter'] would not be undefined, so unsettings $config['filter']['bypassstaticroutes'] would result in an error. http://forum.pfsense.org/index.php/topic,35702.0.html
* Correct text to include PPTP as well.Ermal2011-04-061-1/+1
|
* Resolves #1391. Bring back VPN auto rule disable advanced setting.Ermal2011-04-061-0/+15
|
* This is not NAT, so put it under the Firewall Advanced heading instead.Erik Fonnesbeck2011-03-011-11/+11
|
* Add Global reply-to disable checkbox, resolves the issue #1137lgcosta2011-02-221-0/+17
|
* reversal of accidentally deleted fileslgcosta2011-02-221-20/+0
| | | | | | Revert "Add Global reply-to disable checkbox, resolves the issue #1137" This reverts commit c646776871dacebcaa4225b083aa0789dc0bfba6.
* Add Global reply-to disable checkbox, resolves the issue #1137Luiz Gustavo S. Costa2011-02-211-0/+20
|
* Add option to control automatic creation of NAT rules which assist ↵Erik Fonnesbeck2010-11-221-0/+14
| | | | forwarding rules that send traffic out to the same subnet it originated from.
* gettext fixesRenato Botelho2010-08-121-3/+3
|
* On system_advanced_firewall.php, fix display of selected TFTP interfaces ↵Erik Fonnesbeck2010-08-051-2/+2
| | | | after saving. Fixes #794
* Make Firewall Optimization Options text readableScott Ullrich2010-05-211-1/+1
|
* Add a GUI field to let the user configure the maxium table entries size. ↵jim-p2010-05-131-0/+20
| | | | | | Resolves #588 NOTE: Actual tables, not states.
* Add note that reflection timeout only applies for port forwards.Erik Fonnesbeck2010-05-081-1/+1
|
* Revert changes to reflection for port forwards until finished and approved.Erik Fonnesbeck2010-05-081-2/+15
|
* Merge remote branch 'mainline/master' into patchesErik Fonnesbeck2010-05-051-11/+14
|\ | | | | | | | | Resolved conflicts: usr/local/www/system_advanced_firewall.php
| * Slightly change wording of NAT reflection description.Erik Fonnesbeck2010-05-041-2/+2
| |
| * Add configuration option in System: Advanced: Firewall/NAT for NAT ↵Erik Fonnesbeck2010-05-041-3/+19
| | | | | | | | reflection on 1:1 NAT.
| * Remove note about reflection being skipped on large port ranges.Erik Fonnesbeck2010-05-041-1/+1
| |
| * Removed unused NAT reflection timeout setting.Erik Fonnesbeck2010-05-041-13/+0
| |
* | Fix gettext issuesCarlos Eduardo Ramos2010-04-291-11/+11
| |
* | Merge branch 'master' into gettextErik Fonnesbeck2010-04-281-1/+2
|\ \ | |/ | | | | | | | | | | Resolved conflicts: usr/local/www/system_advanced_firewall.php usr/local/www/system_routes.php usr/local/www/system_routes_edit.php
| * properly show TFTP enabled interfacesChris Buechler2010-04-281-1/+2
| |
* | Fix : for translationsRenato Botelho2010-04-271-2/+2
| |
* | Add missing gettext() callRenato Botelho2010-04-271-1/+1
| |
* | Merge branch 'master' into gettextRenato Botelho2010-04-261-1/+1
|\ \ | |/
| * Mark this just informative textarea as readonlyRenato Botelho2010-04-261-1/+1
| |
* | Implement gettext()Renato Botelho2010-04-261-57/+57
|/
* Ticket #508. Make TFTP proxy configurable by System Advanced->Firewall/NAT ↵Ermal2010-04-161-0/+19
| | | | for several interfaces.
* Do not use the presence of lan as an indicator of having only one interface. ↵Ermal2010-04-161-1/+1
| | | | Actually deduce that from the count of interfaces. It is perfectly legal on 2.0 to not have a lan interface and only opt/wan ones.
* fix textChris Buechler2010-03-221-1/+1
|
* fix textChris Buechler2010-03-221-1/+1
|
* Require filter.inc and shaper.incScott Ullrich2009-11-211-0/+3
|
* Add pfSense_BUILDER_BINARIES: and pfSense_MODULE:. Adjust Copyright to ↵Scott Ullrich2009-09-141-1/+3
| | | | include 2009 on files that I have asserted (C) on
* Adding Notifications tabScott Ullrich2009-07-091-0/+1
|
* * Create two new functions lock($subsystem)/unlock() to have more reliable ↵Ermal Luçi2009-05-081-1/+0
| | | | | | | | | | | locking using semaphores. This function can sleep till the resource is free and can help find not well behaving code. * Remove most of the config_lock/config_unlock logics on the whole scripts/pages it is an abuse of this. If any sybsytem wants to lock can do so with its own lock. * Lock the config when doing a filter reload to avoid parallell recursion on this function, since it is not reentrant. This compenstates for the removal of lock aquiring from the scripts/pages. * config_lock/config_unlock are now compate shims that do nothing. They are preserved since packages 'abuse' them too.
* From yesterday moving of ipfw loading to only captive portal a regression ↵Ermal Luçi2009-05-081-0/+7
| | | | | | | | was noticed on ipfw states sizeing. Fix this regression by changing this states when they are changed on the system advanced settings page. Reported by: cmb@
* Remove "Allow IPv6" option from Firewall/NAT tab, it's already on the ↵jim-p2009-04-151-17/+0
| | | | Networking tab with other IPv6 options.
* Block all IPv6 traffic by default, since IPv6 isn't supported, there isn't ↵Chris Buechler2009-04-051-1/+17
| | | | any way to add such rules in the GUI, and nearly all users won't want IPv6 to traverse their firewall at this point. Add "Allow IPv6" checkbox to disable this behavior.
* Remove ftp-proxy/pftpx/ftpsesame references we handle all of this in kernel ↵Ermal Luçi2009-03-161-12/+0
| | | | now.(yay!)
* Fix typoBill Marquette2008-12-061-1/+1
|
* Correct config path so filter rules are generated again for staticSeth Mos2008-11-211-2/+2
| | | | routes.
* Remove ocurrences of m0n0 for shaper type in the code.Ermal Luçi2008-10-231-13/+0
|
* Split random-id and no-df option for scrubbing.Ermal Luçi2008-10-191-4/+18
|
OpenPOWER on IntegriCloud