/* ==================================================================== * Copyright (c) 2004-2015 Electric Sheep Fencing, LLC. All rights reserved. * * Redistribution and use in source and binary forms, with or without modification, * are permitted provided that the following conditions are met: * * 1. Redistributions of source code must retain the above copyright notice, * this list of conditions and the following disclaimer. * * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgment: * "This product includes software developed by the pfSense Project * for use in the pfSense software distribution. (http://www.pfsense.org/). * * 4. The names "pfSense" and "pfSense Project" must not be used to * endorse or promote products derived from this software without * prior written permission. For written permission, please contact * coreteam@pfsense.org. * * 5. Products derived from this software may not be called "pfSense" * nor may "pfSense" appear in their names without prior written * permission of the Electric Sheep Fencing, LLC. * * 6. Redistributions of any form whatsoever must retain the following * acknowledgment: * * "This product includes software developed by the pfSense Project * for use in the pfSense software distribution (http://www.pfsense.org/). * * THIS SOFTWARE IS PROVIDED BY THE pfSense PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE pfSense PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * * ==================================================================== * */ 10 1 pfSense Setup true This wizard will provide guidance through the initial configuration of pfSense.<br/><br/> The wizard may be stopped at any time by clicking the logo image at the top of the screen. Next submit conf_mount_rw(); unlink_if_exists('/conf/trigger_initial_wizard'); conf_mount_ro(); 2 Bling your pfSense with pfSense Gold true Feel the power of a pfSense Gold subscription. Receive special benefits while supporting ongoing development of the Open Source pfSense project.<br/> <br/> Benefits include access to our AutoConfigBackup secure cloud based backup service for up to 10 hosts, pre-publication access to the updated pfSense: The Definitive Guide book in PDF, fully updated for the pfSense 2.1 release, and a monthly online MeetUp! Video conference to discuss and demonstrate advanced features and architectures using pfSense. <br/> <br/> Go to <a href="https://www.pfsense.org/gold" target="_blank"> pfSense Gold Subscriptions</a> to sign up now. <br/> <br/> Next submit 3 General Information On this screen the general pfSense parameters will be set. Hostname input wizardtemp->system->hostname EXAMPLE: myserver ^[a-zA-Z0-9-]+$ Invalid Hostname Domain input wizardtemp->system->domain EXAMPLE: mydomain.com ^[a-zA-Z0-9.-]+$ Domain name field is invalid DNS Resolver Behavior text The default behavior of the DNS Resolver will ignore manually configured DNS servers for client queries and query root DNS servers directly. To use the manually configured DNS servers below for client queries, visit Services > DNS Resolver and enable DNS Query Forwarding after completing the wizard. Primary DNS Server input system->dnsserver yes 0 ^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$ Primary DNS Server field is invalid Secondary DNS Server input system->dnsserver 1 ^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$ Secondary DNS Server field is invalid Override DNS Allow DNS servers to be overridden by DHCP/PPP on WAN checkbox system->dnsallowoverride Next submit 4 Time Server Information Please enter the time, date and time zone. Time server hostname Enter the hostname (FQDN) of the time server. input system->timeservers Timezone timezone_select system->timezone Next submit 5 true Configure WAN Interface On this screen the Wide Area Network information will be configured. var selectedItem = 0; if(document.forms[0].ipaddress.value == 'dhcp') { selectedItem = 1; document.forms[0].ipaddress.value = ''; } else if(document.forms[0].ipaddress.value == 'pppoe') { selectedItem = 2; document.forms[0].ipaddress.value = ''; } else if(document.forms[0].ipaddress.value == 'pptp') { selectedItem = 3; document.forms[0].ipaddress.value = ''; } else if(document.forms[0].ipaddress.value == 'ppp' || document.forms[0].ipaddress.value == 'l2tp') { document.forms[0].ipaddress.value = ''; } else { selectedItem = 0; } document.forms[0].selectedtype.selectedIndex = selectedItem; enableitems(selectedItem); events.push(function(){ $('#showpppoepassword').click(function(event) { if(this.checked) { $('#pppoepassword').attr('type', 'text'); } else { $('#pppoepassword').attr('type', 'password'); } }); $('#showpptppassword').click(function(event) { if(this.checked) { $('#pptppassword').attr('type', 'text'); } else { $('#pptppassword').attr('type', 'password'); } }); }); SelectedType select true General configuration listtopic true MAC Address interfaces->wan->spoofmac input This field can be used to modify ("spoof") the MAC address of the WAN interface (may be required with some cable connections). Enter a MAC address in the following format: xx:xx:xx:xx:xx:xx or leave blank. ^([0-9a-f]{2}([:-]||$)){6}$ MAC Address field is invalid true MTU input interfaces->wan->mtu Set the MTU of the WAN interface. If this field is left blank, an MTU of 1492 bytes for PPPoE and 1500 bytes for all other connection types will be assumed. true MSS input interfaces->wan->mss If a value is entered in this field, then MSS clamping for TCP connections to the value entered above minus 40 (TCP/IP header size) will be in effect. If this field is left blank, an MSS of 1492 bytes for PPPoE and 1500 bytes for all other connection types will be assumed. This should match the above MTU value in most all cases. Static IP Configuration listtopic IP Address interfaces->wan->ipaddr input / true ^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$ IP Address field is invalid true true true Subnet Mask interfaces->wan->subnet subnet_select Upstream Gateway wizardtemp->wangateway input ^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$ Gateway IP Address field is invalid DHCP client configuration listtopic DHCP Hostname input interfaces->wan->dhcphostname The value in this field is sent as the DHCP client identifier and hostname when requesting a DHCP lease. Some ISPs may require this (for client identification). PPPoE configuration listtopic PPPoE Username input wizardtemp->wan->username PPPoE Password password wizardtemp->wan->password Show PPPoE password checkbox Reveal password characters PPPoE Service name input Hint: this field can usually be left empty wizardtemp->wan->provider PPPoE Dial on demand Enable Dial-On-Demand mode checkbox This option causes the interface to operate in dial-on-demand mode, allowing a virtual full time connection. The interface is configured, but the actual connection of the link is delayed until qualifying outgoing traffic is detected. wizardtemp->wan->ondemand PPPoE Idle timeout input If no qualifying outgoing packets are transmitted for the specified number of seconds, the connection is brought down. An idle timeout of zero disables this feature. wizardtemp->wan->idletimeout PPTP configuration listtopic PPTP Username input wizardtemp->wan->pptpusername PPTP Password password wizardtemp->wan->pptppassword Show PPTP password checkbox Reveal password characters true PPTP Local IP Address input / wizardtemp->wan->localip ^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$ PPTP Local IP Address field is invalid true true true pptplocalsubnet wizardtemp->wan->subnet subnet_select PPTP Remote IP Address wizardtemp->wan->gateway input ^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$ PPTP Remote IP Address field is invalid PPTP Dial on demand Enable Dial-On-Demand mode checkbox wizardtemp->wan->pptpondemand This option causes the interface to operate in dial-on-demand mode, allowing a virtual full time connection. The interface is configured, but the actual connection of the link is delayed until qualifying outgoing traffic is detected. PPTP Idle timeout input wizardtemp->wan->pptpidletimeout If no qualifying outgoing packets are transmitted for the specified number of seconds, the connection is brought down. An idle timeout of zero disables this feature. RFC1918 Networks listtopic true Block RFC1918 Private Networks When set, this option blocks traffic from IP addresses that are reserved for private networks as per RFC 1918 (10/8, 172.16/12, 192.168/16) as well as loopback addresses (127/8). This option should generally be left turned on, unless the WAN network lies in such a private address space, too. checkbox interfaces->wan->blockpriv Block private networks from entering via WAN Block bogon networks listtopic true Block bogon networks When set, this option blocks traffic from IP addresses that are reserved (but not RFC 1918) or not yet assigned by IANA. Bogons are prefixes that should never appear in the Internet routing table, and obviously should not appear as the source address in any packets received. checkbox interfaces->wan->blockbogons Block non-Internet routed networks from entering via WAN Next submit $ppp) { if ($ppp['ptpid'] == "0") { if ((substr($config['interfaces']['wan']['if'],0,5) == "pppoe") || (substr($config['interfaces']['wan']['if'],0,4) == "pptp")) { $oldif = explode(",", $ppp['ports']); $config['interfaces']['wan']['if'] = $oldif[0]; } if ($type == "pppoe" || $type == "pptp") unset($config['ppps']['ppp'][$pppid]); } } } if ($type == "pppoe" || $type == "pptp") { if ($type == "pptp") { $config['wizardtemp']['wan']['username'] = $config['wizardtemp']['wan']['pptpusername']; $config['wizardtemp']['wan']['password'] = $config['wizardtemp']['wan']['pptppassword']; $config['wizardtemp']['wan']['ondemand'] = $config['wizardtemp']['wan']['pptpondemand']; $config['wizardtemp']['wan']['idletimeout'] = $config['wizardtemp']['wan']['pptpidletimeout']; unset($config['wizardtemp']['wan']['pptpusername']); unset($config['wizardtemp']['wan']['pptppassword']); unset($config['wizardtemp']['wan']['pptpondemand']); unset($config['wizardtemp']['wan']['pptpidletimeout']); } $config['wizardtemp']['wan']['password'] = base64_encode($config['wizardtemp']['wan']['password']); $tmp = array(); $tmp['ptpid'] = "0"; $tmp['type'] = $type; $tmp['if'] = $type . "0"; $tmp['ports'] = $config['interfaces']['wan']['if']; $config['ppps']['ppp'][] = array_merge($tmp, $config['wizardtemp']['wan']); unset($tmp); $config['interfaces']['wan']['if'] = $type."0"; } unset($config['wizardtemp']['wan']); ]]> 6 Configure LAN Interface On this screen the Local Area Network information will be configured. LAN IP Address input interfaces->lan->ipaddr Type dhcp if this interface uses DHCP to obtain its IP address. ^(?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)$ LAN IP Address field is invalid Subnet Mask subnet_select interfaces->lan->subnet Next submit = $ipaddresses_before) { // The LAN IP is in the 1st half of the subnet, so put DHCP in the 2nd half. if ($ipaddresses_after > 30) { // There is reasonable space in the subnet, use a smaller chunk of the space for DHCP // This case will work out like the old defaults if the user has specified the ".1" address. // The range will be something like ".10" to ".245" $config['dhcpd']['lan']['range']['from'] = ip_after($_POST['lanipaddress'], 9); $config['dhcpd']['lan']['range']['to'] = ip_before($highestip, 10); } else { // There is not much space in the subnet, so allocate everything above the LAN IP to DHCP. $config['dhcpd']['lan']['range']['from'] = ip_after($_POST['lanipaddress']); $config['dhcpd']['lan']['range']['to'] = ip_before($highestip); } } else { // The LAN IP is in the 2nd half of the subnet, so put DHCP in the 1st half. if ($ipaddresses_before > 30) { // There is reasonable space in the subnet, use a smaller chunk of the space for DHCP $config['dhcpd']['lan']['range']['from'] = ip_after($lowestip, 10); $config['dhcpd']['lan']['range']['to'] = ip_before($_POST['lanipaddress'], 9); } else { // There is not much space in the subnet, so allocate everything below the LAN IP to DHCP. $config['dhcpd']['lan']['range']['from'] = ip_after($lowestip); $config['dhcpd']['lan']['range']['to'] = ip_before($_POST['lanipaddress']); } } ]]> 7 Set Admin WebGUI Password On this screen the admin password will be set, which is used to access the WebGUI and also SSH services if enabled. Admin Password password Admin Password AGAIN password Next submit 8 Reload configuration true Click 'Reload' to reload pfSense with new changes. Reload submit 9 Reload in progress A reload is now in progress. Please wait. <p> <meta http-equiv="refresh" content="5; url=wizard.php?xml=setup_wizard.xml&stepid=9" > <p> The wizard will redirect to the next step once the reload is completed. 10 Wizard completed. 'pfSense') { header("Location: " . fixup_string("\$myurl")); exit; } ]]> Please consider contributing back to the project!

Click here to purchase services offered by the pfSense team and find other ways to contribute.

Click here to continue on to pfSense webConfigurator.

]]>