* Originally part of pfSense (https://www.pfsense.org)
*
* Redistribution and use in source and binary forms, with or without modification,
* are permitted provided that the following conditions are met:
*
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgment:
* "This product includes software developed by the pfSense Project
* for use in the pfSense software distribution. (http://www.pfsense.org/).
*
* 4. The names "pfSense" and "pfSense Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* coreteam@pfsense.org.
*
* 5. Products derived from this software may not be called "pfSense"
* nor may "pfSense" appear in their names without prior written
* permission of the Electric Sheep Fencing, LLC.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
*
* "This product includes software developed by the pfSense Project
* for use in the pfSense software distribution (http://www.pfsense.org/).
*
* THIS SOFTWARE IS PROVIDED BY THE pfSense PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE pfSense PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
*
* ====================================================================
*
*/
/*
pfSense_MODULE: nat
*/
##|+PRIV
##|*IDENT=page-firewall-nat-outbound
##|*NAME=Firewall: NAT: Outbound page
##|*DESCR=Allow access to the 'Firewall: NAT: Outbound' page.
##|*MATCH=firewall_nat_out.php*
##|-PRIV
require("guiconfig.inc");
require_once("functions.inc");
require_once("filter.inc");
require_once("shaper.inc");
global $FilterIflist;
global $GatewaysList;
if (!is_array($config['nat']['outbound'])) {
$config['nat']['outbound'] = array();
}
if (!is_array($config['nat']['outbound']['rule'])) {
$config['nat']['outbound']['rule'] = array();
}
$a_out = &$config['nat']['outbound']['rule'];
/* update rule order, POST[rule] is an array of ordered IDs */
if (is_array($_POST['rule']) && !empty($_POST['rule'])) {
$a_out_new = array();
// if a rule is not in POST[rule], it has been deleted by the user
foreach ($_POST['rule'] as $id)
$a_out_new[] = $a_out[$id];
$a_out = $a_out_new;
if (write_config())
mark_subsystem_dirty('filter');
header("Location: firewall_nat_out.php");
exit;
}
if (!isset($config['nat']['outbound']['mode']))
$config['nat']['outbound']['mode'] = "automatic";
$mode = $config['nat']['outbound']['mode'];
if ($_POST['apply']) {
$retval = 0;
$retval |= filter_configure();
if (stristr($retval, "error") <> true) {
$savemsg = get_std_save_message($retval);
} else {
$savemsg = $retval;
}
if ($retval == 0) {
clear_subsystem_dirty('natconf');
clear_subsystem_dirty('filter');
}
}
if (isset($_POST['save']) && $_POST['save'] == "Save") {
/* mutually exclusive settings - if user wants advanced NAT, we don't generate automatic rules */
if ($_POST['mode'] == "advanced" && ($mode == "automatic" || $mode == "hybrid")) {
/*
* user has enabled advanced outbound NAT and doesn't have rules
* lets automatically create entries
* for all of the interfaces to make life easier on the pip-o-chap
*/
if (empty($FilterIflist)) {
filter_generate_optcfg_array();
}
if (empty($GatewaysList)) {
filter_generate_gateways();
}
$tonathosts = filter_nat_rules_automatic_tonathosts(true);
$automatic_rules = filter_nat_rules_outbound_automatic("");
foreach ($tonathosts as $tonathost) {
foreach ($automatic_rules as $natent) {
$natent['source']['network'] = $tonathost['subnet'];
$natent['descr'] .= sprintf(gettext(' - %1$s to %2$s'),
$tonathost['descr'],
convert_real_interface_to_friendly_descr($natent['interface']));
$natent['created'] = make_config_revision_entry(null, gettext("Manual Outbound NAT Switch"));
/* Try to detect already auto created rules and avoid duplicating them */
$found = false;
foreach ($a_out as $rule) {
if ($rule['interface'] == $natent['interface'] &&
$rule['source']['network'] == $natent['source']['network'] &&
$rule['dstport'] == $natent['dstport'] &&
$rule['target'] == $natent['target'] &&
$rule['descr'] == $natent['descr']) {
$found = true;
break;
}
}
if ($found === false) {
$a_out[] = $natent;
}
}
}
$savemsg = gettext("Default rules for each interface have been created.");
unset($FilterIflist, $GatewaysList);
}
$config['nat']['outbound']['mode'] = $_POST['mode'];
if (write_config()) {
mark_subsystem_dirty('natconf');
}
header("Location: firewall_nat_out.php");
exit;
}
if ($_GET['act'] == "del") {
if ($a_out[$_GET['id']]) {
unset($a_out[$_GET['id']]);
if (write_config()) {
mark_subsystem_dirty('natconf');
}
header("Location: firewall_nat_out.php");
exit;
}
}
if (isset($_POST['del_x'])) {
/* delete selected rules */
if (is_array($_POST['rule']) && count($_POST['rule'])) {
foreach ($_POST['rule'] as $rulei) {
unset($a_out[$rulei]);
}
if (write_config()) {
mark_subsystem_dirty('natconf');
}
header("Location: firewall_nat_out.php");
exit;
}
} else if ($_GET['act'] == "toggle") {
if ($a_out[$_GET['id']]) {
if (isset($a_out[$_GET['id']]['disabled'])) {
unset($a_out[$_GET['id']]['disabled']);
} else {
$a_out[$_GET['id']]['disabled'] = true;
}
if (write_config("Firewall: NAT: Outbound, enable/disable NAT rule")) {
mark_subsystem_dirty('natconf');
}
header("Location: firewall_nat_out.php");
exit;
}
} else {
/* yuck - IE won't send value attributes for image buttons, while Mozilla does - so we use .x/.y to find move button clicks instead... */
unset($movebtn);
foreach ($_POST as $pn => $pd) {
if (preg_match("/move_(\d+)_x/", $pn, $matches)) {
$movebtn = $matches[1];
break;
}
}
/* move selected rules before this rule */
if (isset($movebtn) && is_array($_POST['rule']) && count($_POST['rule'])) {
$a_out_new = array();
/* copy all rules < $movebtn and not selected */
for ($i = 0; $i < $movebtn; $i++) {
if (!in_array($i, $_POST['rule'])) {
$a_out_new[] = $a_out[$i];
}
}
/* copy all selected rules */
for ($i = 0; $i < count($a_out); $i++) {
if ($i == $movebtn) {
continue;
}
if (in_array($i, $_POST['rule'])) {
$a_out_new[] = $a_out[$i];
}
}
/* copy $movebtn rule */
if ($movebtn < count($a_out)) {
$a_out_new[] = $a_out[$movebtn];
}
/* copy all rules > $movebtn and not selected */
for ($i = $movebtn+1; $i < count($a_out); $i++) {
if (!in_array($i, $_POST['rule'])) {
$a_out_new[] = $a_out[$i];
}
}
if (count($a_out_new) > 0) {
$a_out = $a_out_new;
}
if (write_config()) {
mark_subsystem_dirty('natconf');
}
header("Location: firewall_nat_out.php");
exit;
}
}
function rule_popup($src,$srcport,$dst,$dstport){
global $config,$g;
$aliases_array = array();
if ($config['aliases']['alias'] <> "" and is_array($config['aliases']['alias'])) {
$descriptions = array ();
foreach ($config['aliases']['alias'] as $alias_id=>$alias_name){
$loading_image=" " .gettext("loading...")."";
switch ($alias_name['type']){
case "port":
$width="250";
break;
case "urltable":
$width="500";
break;
default:
$width="350";
break;
}
$span_begin = "";
$span_end = "";
if ($alias_name['name'] == $src) {
$descriptions['src'] = $span_begin;
$descriptions['src_end'] = $span_end;
}
if ($alias_name['name'] == $srcport) {
$descriptions['srcport'] = $span_begin;
$descriptions['srcport_end'] = $span_end;
}
if ($alias_name['name'] == $dst ) {
$descriptions['dst'] = $span_begin;
$descriptions['dst_end'] = $span_end;
}
if ($alias_name['name'] == $dstport) {
$descriptions['dstport'] = $span_begin;
$descriptions['dstport_end'] = $span_end;
}
}
return $descriptions;
}
}
$pgtitle = array(gettext("Firewall"),gettext("NAT"),gettext("Outbound"));
include("head.inc");
if ($savemsg)
print_info_box($savemsg, 'success');
if (is_subsystem_dirty('natconf'))
print_info_box_np(gettext("The NAT configuration has been changed.")."
".gettext("You must apply the changes in order for them to take effect."));
$tab_array = array();
$tab_array[] = array(gettext("Port Forward"), false, "firewall_nat.php");
$tab_array[] = array(gettext("1:1"), false, "firewall_nat_1to1.php");
$tab_array[] = array(gettext("Outbound"), true, "firewall_nat_out.php");
$tab_array[] = array(gettext("NPt"), false, "firewall_nat_npt.php");
display_top_tabs($tab_array);
require('classes/Form.class.php');
$form = new Form();
$section = new Form_Section('General Logging Options');
$group = new Form_Group('Mode');
$group->add(new Form_Checkbox(
'mode',
'Mode',
null,
$mode == 'automatic',
'automatic'
))->displayAsRadio()->setHelp('Automatic outbound NAT rule generation.' . '
' . '(IPsec passthrough included)');
$group->add(new Form_Checkbox(
'mode',
null,
null,
$mode == 'hybrid',
'hybrid'
))->displayAsRadio()->setHelp('Hybrid Outbound NAT rule generation.' . '
' . '(Automatic Outbound NAT + rules below)');
$group->add(new Form_Checkbox(
'mode',
null,
null,
$mode == 'advanced',
'advanced'
))->displayAsRadio()->setHelp('Manual Outbound NAT rule generation.' . '
' . '(AON - Advanced Outbound NAT)');
$group->add(new Form_Checkbox(
'mode',
null,
null,
$mode == 'disabled',
'disabled'
))->displayAsRadio()->setHelp('Disable Outbound NAT rule generation.' . '
' . '(No Outbound NAT rules)');
$section->add($group);
$form->add($section);
print($form);
?>