From 1b6218f1ce8a044ac8d57e9bd3177d6deffd8e02 Mon Sep 17 00:00:00 2001 From: Franco Fichtner Date: Sun, 30 Dec 2018 11:09:25 +0100 Subject: [PATCH] wizard: restore translations in wizards, other lint --- src/wizard/openvpn.xml | 170 ++++++++++------------------------------- src/wizard/system.xml | 95 ++++++----------------- 2 files changed, 63 insertions(+), 202 deletions(-) diff --git a/src/wizard/openvpn.xml b/src/wizard/openvpn.xml index 8294fefec..bab55b63b 100644 --- a/src/wizard/openvpn.xml +++ b/src/wizard/openvpn.xml @@ -150,8 +150,7 @@ ssl - The protocol used by your LDAP server. It can either be standard TCP or SSL encrypted. - + The protocol used by your LDAP server. It can either be standard TCP or SSL encrypted. scope @@ -182,10 +181,7 @@ input 40 wizardtemp->step2->authscope - Semicolon separated. This will be prepended to the search base DN above or you can specify - full container path, e.g. CN=Users;DC=example or - CN=Users,DC=example,DC=com;OU=OtherUsers,DC=example,DC=com - + Semicolon separated. This will be prepended to the search base DN above or you can specify full container path, e.g. CN=Users;DC=example or CN=Users,DC=example,DC=com;OU=OtherUsers,DC=example,DC=com userdn @@ -201,9 +197,7 @@ password 20 wizardtemp->step2->passdn - If a user DN was supplied above, this password will also be used when performing a bind - operation. - + If a user DN was supplied above, this password will also be used when performing a bind operation. nameattr @@ -224,9 +218,7 @@ Member Naming Attribute input wizardtemp->step2->memberattr - Typically "member" (OpenLDAP), "memberOf" (Microsoft AD), "uniqueMember" (Novell - eDirectory) - + Typically "member" (OpenLDAP), "memberOf" (Microsoft AD), "uniqueMember" (Novell eDirectory) submit @@ -298,8 +290,7 @@ input 8 wizardtemp->step2->port - Port used by the RADIUS server for accepting Authentication requests, typically 1812. - + Port used by the RADIUS server for accepting Authentication requests, typically 1812. secret @@ -354,9 +345,7 @@ descr Descriptive name - A name for your reference, to identify this certificate. This is the same as common-name - field for other Certificates. - + A name for your reference, to identify this certificate. This is the same as common-name field for other Certificates. input 20 wizardtemp->step6->certca @@ -364,9 +353,7 @@ keylength Key length - Size of the key which will be generated. The larger the key, the more security is offers, - but larger keys are generally slower to use. - + Size of the key which will be generated. The larger the key, the more security is offers, but larger keys are generally slower to use. select 2048 wizardtemp->step6->keylength @@ -413,8 +400,7 @@ state State or Province - Full State of Province name, not abbreviated (e.g. Zuid Holland, Sachsen, Kentucky). - + Full State of Province name, not abbreviated (e.g. Zuid Holland, Sachsen, Kentucky). input 30 wizardtemp->step6->state @@ -438,9 +424,7 @@ email Email - Email address for the Certificate contact. Often the email of the person generating the - certificate (i.e. You.) - + Email address for the Certificate contact. Often the email of the person generating the certificate (i.e. You.) input 30 wizardtemp->step6->email @@ -490,9 +474,7 @@ descr Descriptive name - A name for your reference, to identify this certificate. This is also known as the - certificate's "Common Name". - + A name for your reference, to identify this certificate. This is also known as the certificate's "Common Name". input 20 wizardtemp->step9->certname @@ -500,9 +482,7 @@ keylength Key length - Size of the key which will be generated. The larger the key, the more security is offers, - but larger keys are generally slower to use. - + Size of the key which will be generated. The larger the key, the more security is offers, but larger keys are generally slower to use. select 2048 wizardtemp->step9->keylength @@ -549,8 +529,7 @@ state State or Province - Full State of Province name, not abbreviated (e.g. Zuid Holland, Sachsen, Kentucky). - + Full State of Province name, not abbreviated (e.g. Zuid Holland, Sachsen, Kentucky). input 30 wizardtemp->step9->state @@ -574,9 +553,7 @@ email Email - Email address for the Certificate contact. Often the email of the person generating the - certificate (i.e. You.) - + Email address for the Certificate contact. Often the email of the person generating the certificate (i.e. You.) input 30 wizardtemp->step9->email @@ -637,15 +614,12 @@ TCP6 - Protocol to use for OpenVPN connections. If you are unsure, leave this set to UDP. - + Protocol to use for OpenVPN connections. If you are unsure, leave this set to UDP. localport Local Port - Local port upon which OpenVPN will listen for connections. The default port is 1194. Leave - this blank to auto-select an unused port. - + Local port upon which OpenVPN will listen for connections. The default port is 1194. Leave this blank to auto-select an unused port. input 10 wizardtemp->step10->localport @@ -653,9 +627,7 @@ description Description - A name for this OpenVPN instance, for your reference. It can be set however you like, but - is often used to distinguish the purpose of the service (e.g. "Remote Technical Staff"). - + A name for this OpenVPN instance, for your reference. It can be set however you like, but is often used to distinguish the purpose of the service (e.g. "Remote Technical Staff"). input 30 wizardtemp->step10->descr @@ -695,10 +667,7 @@ dhparam_selection 2048 wizardtemp->step10->dhkey - Length of Diffie-Hellman (DH) key exchange parameters, used for establishing a secure - communications channel. As with other such settings, the larger values are more secure, but may be - slower in operation. - + Length of Diffie-Hellman (DH) key exchange parameters, used for establishing a secure communications channel. As with other such settings, the larger values are more secure, but may be slower in operation. crypto @@ -711,10 +680,7 @@ dummy - The method used to encrypt traffic between endpoints. This setting must match on the client - and server side, but is otherwise set however you like. Certain algorithms will perform better on - different hardware, depending on the availability of supported VPN accelerator chips. - + The method used to encrypt traffic between endpoints. This setting must match on the client and server side, but is otherwise set however you like. Certain algorithms will perform better on different hardware, depending on the availability of supported VPN accelerator chips. digest @@ -728,9 +694,7 @@ SHA1 - The method used to authenticate traffic between endpoints. This setting must match on the - client and server side, but is otherwise set however you like. - + The method used to authenticate traffic between endpoints. This setting must match on the client and server side, but is otherwise set however you like. engine @@ -743,8 +707,7 @@ dummy - The hardware cryptographic accelerator to use for this VPN connection, if any. - + The hardware cryptographic accelerator to use for this VPN connection, if any. listtopic @@ -756,11 +719,7 @@ input 20 wizardtemp->step10->tunnelnet - This is the IPv4 virtual network used for private communications between this server and - client hosts expressed using CIDR (eg. 10.0.8.0/24). The first network address will be assigned to - the server virtual interface. The remaining network addresses can optionally be assigned to - connecting clients. (see Address Pool) - + This is the IPv4 virtual network used for private communications between this server and client hosts expressed using CIDR (eg. 10.0.8.0/24). The first network address will be assigned to the server virtual interface. The remaining network addresses can optionally be assigned to connecting clients. (see Address Pool) IPv6 Tunnel Network @@ -768,11 +727,7 @@ input 20 wizardtemp->step10->tunnelnetv6 - This is the IPv6 virtual network used for private communications between this server and - client hosts expressed using CIDR (eg. fe80::/64). The first network address will be assigned to the - server virtual interface. The remaining network addresses can optionally be assigned to connecting - clients. (see Address Pool) - + This is the IPv6 virtual network used for private communications between this server and client hosts expressed using CIDR (eg. fe80::/64). The first network address will be assigned to the server virtual interface. The remaining network addresses can optionally be assigned to connecting clients. (see Address Pool) Redirect Gateway @@ -787,11 +742,7 @@ input 20 wizardtemp->step10->localnet - These are the IPv4 networks that will be accessible from the remote endpoint. Expressed as - a comma-separated list of one or more CIDR ranges. You may leave this blank if you don't want to add - a route to the local network through this tunnel on the remote machine. This is generally set to - your LAN network. - + These are the IPv4 networks that will be accessible from the remote endpoint. Expressed as a comma-separated list of one or more CIDR ranges. You may leave this blank if you don't want to add a route to the local network through this tunnel on the remote machine. This is generally set to your LAN network. IPv6 Local Network @@ -799,11 +750,7 @@ input 20 wizardtemp->step10->localnetv6 - These are the IPv6 networks that will be accessible from the remote endpoint. Expressed as - a comma-separated list of one or more IP/PREFIX. You may leave this blank if you don't want to add a - route to the local network through this tunnel on the remote machine. This is generally set to your - LAN network. - + These are the IPv6 networks that will be accessible from the remote endpoint. Expressed as a comma-separated list of one or more IP/PREFIX. You may leave this blank if you don't want to add a route to the local network through this tunnel on the remote machine. This is generally set to your LAN network. IPv4 Remote Network @@ -811,11 +758,7 @@ input 20 wizardtemp->step10->remotenet - These are the IPv4 networks that will be routed through the tunnel, so that a site-to-site - VPN can be established without manually changing the routing tables. Expressed as a comma-separated - list of one or more CIDR ranges. If this is a site-to-site VPN, enter the remote LAN/s here. You may - leave this blank if you don't want a site-to-site VPN. - + These are the IPv4 networks that will be routed through the tunnel, so that a site-to-site VPN can be established without manually changing the routing tables. Expressed as a comma-separated list of one or more CIDR ranges. If this is a site-to-site VPN, enter the remote LAN/s here. You may leave this blank if you don't want a site-to-site VPN. IPv6 Remote Network @@ -823,17 +766,12 @@ input 20 wizardtemp->step10->remotenetv6 - These are the IPv6 networks that will be routed through the tunnel, so that a site-to-site - VPN can be established without manually changing the routing tables. Expressed as a comma-separated - list of one or more IP/PREFIX. If this is a site-to-site VPN, enter the remote LAN/s here. You may - leave this blank if you don't want a site-to-site VPN. - + These are the IPv6 networks that will be routed through the tunnel, so that a site-to-site VPN can be established without manually changing the routing tables. Expressed as a comma-separated list of one or more IP/PREFIX. If this is a site-to-site VPN, enter the remote LAN/s here. You may leave this blank if you don't want a site-to-site VPN. Concurrent Connections concurrentcon - Specify the maximum number of clients allowed to concurrently connect to this server. - + Specify the maximum number of clients allowed to concurrently connect to this server. input 10 wizardtemp->step10->concurrentcon @@ -841,10 +779,7 @@ Compression compression - Compress tunnel packets using the LZO algorithm. Adaptive compression will dynamically - disable compression for a period of time if OpenVPN detects that the data in the packets is not - being compressed efficiently. - + Compress tunnel packets using the LZO algorithm. Adaptive compression will dynamically disable compression for a period of time if OpenVPN detects that the data in the packets is not being compressed efficiently. wizardtemp->step10->compression select @@ -858,8 +793,7 @@ Type-of-Service tos checkbox - Set the TOS IP header value of tunnel packets to match the encapsulated packet value. - + Set the TOS IP header value of tunnel packets to match the encapsulated packet value. wizardtemp->step10->tos @@ -873,9 +807,7 @@ Duplicate Connections duplicate_cn checkbox - Allow multiple concurrent connections from clients using the same Common Name. This is not - generally recommended, but may be needed for some scenarios. - + Allow multiple concurrent connections from clients using the same Common Name. This is not generally recommended, but may be needed for some scenarios. wizardtemp->step10->duplicate_cn @@ -887,8 +819,7 @@ dynip checkbox on - Allow connected clients to retain their connections if their IP address changes. - + Allow connected clients to retain their connections if their IP address changes. wizardtemp->step10->dynip @@ -953,9 +884,7 @@ checkbox NetBIOS Options wizardtemp->step10->nbtenable - Enable NetBIOS over TCP/IP. If this option is not set, all NetBIOS-over-TCP/IP options - (including WINS) will be disabled. - + Enable NetBIOS over TCP/IP. If this option is not set, all NetBIOS-over-TCP/IP options (including WINS) will be disabled. NetBIOS Node Type @@ -968,48 +897,35 @@ dummy - Possible options: b-node (broadcasts), p-node (point-to-point name queries to a WINS - server), m-node (broadcast then query name server), and h-node (query name server, then broadcast). - + Possible options: b-node (broadcasts), p-node (point-to-point name queries to a WINS server), m-node (broadcast then query name server), and h-node (query name server, then broadcast). NetBIOS Scope ID nbtscope input wizardtemp->step10->nbtscope - A NetBIOS Scope ID provides an extended naming service for NetBIOS over TCP/IP. The NetBIOS - Scope ID isolates NetBIOS traffic on a single network to only those nodes with the same NetBIOS - Scope ID. - + A NetBIOS Scope ID provides an extended naming service for NetBIOS over TCP/IP. The NetBIOS Scope ID isolates NetBIOS traffic on a single network to only those nodes with the same NetBIOS Scope ID. WINS Server 1 winsserver1 input wizardtemp->step10->wins1 - A Windows Internet Name Service (WINS) server to provide for connecting clients, which - allows them to browse Windows shares. This is typically an Active Directory Domain Controller, - designated WINS server, or Samba server. - + A Windows Internet Name Service (WINS) server to provide for connecting clients, which allows them to browse Windows shares. This is typically an Active Directory Domain Controller, designated WINS server, or Samba server. WINS Server 2 winsserver2 input wizardtemp->step10->wins2 - A Windows Internet Name Service (WINS) server to provide for connecting clients, which - allows them to browse Windows shares. This is typically an Active Directory Domain Controller, - designated WINS server, or Samba server. - + A Windows Internet Name Service (WINS) server to provide for connecting clients, which allows them to browse Windows shares. This is typically an Active Directory Domain Controller, designated WINS server, or Samba server. Advanced textarea 30 5 - Enter any additional options you would like to add to the OpenVPN server configuration - here, separated by a semicolon. EXAMPLE: push "route 10.0.0.0 255.255.255.0" - + Enter any additional options you would like to add to the OpenVPN server configuration here, separated by a semicolon. EXAMPLE: push "route 10.0.0.0 255.255.255.0" wizardtemp->step10->advanced @@ -1030,11 +946,7 @@ text - Firewall Rules control what network traffic is permitted. You must add rules to allow - traffic to the OpenVPN server's IP and port, as well as allowing traffic from connected clients - through the tunnel. These rules can be automatically added here, or configured manually after - completing the wizard. - + Firewall Rules control what network traffic is permitted. You must add rules to allow traffic to the OpenVPN server's IP and port, as well as allowing traffic from connected clients through the tunnel. These rules can be automatically added here, or configured manually after completing the wizard. listtopic @@ -1043,8 +955,7 @@ ovpnrule Firewall Rule - Add a rule to permit traffic from clients on the Internet to the OpenVPN server process. - + Add a rule to permit traffic from clients on the Internet to the OpenVPN server process. checkbox wizardtemp->step11->ovpnrule @@ -1055,8 +966,7 @@ ovpnallow OpenVPN rule - Add a rule to allow all traffic from connected clients to pass across the VPN tunnel. - + Add a rule to allow all traffic from connected clients to pass across the VPN tunnel. checkbox wizardtemp->step11->ovpnallow diff --git a/src/wizard/system.xml b/src/wizard/system.xml index 9e24e5809..c4567d748 100644 --- a/src/wizard/system.xml +++ b/src/wizard/system.xml @@ -36,9 +36,7 @@ text - This wizard will guide you through the initial system configuration. The wizard may be - stopped at any time by clicking the logo image at the top of the screen. - + This wizard will guide you through the initial system configuration. The wizard may be stopped at any time by clicking the logo image at the top of the screen. Next @@ -91,9 +89,7 @@ yes 0 - - ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ - + ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ Primary DNS Server field is invalid @@ -101,9 +97,7 @@ input system->dnsserver 1 - - ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ - + ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ Secondary DNS Server field is invalid @@ -243,15 +237,12 @@ if (count($input_errors)) { @@ -264,10 +255,7 @@ if (count($input_errors)) { MAC Address interfaces->wan->spoofmac input - This field can be used to modify ("spoof") the MAC address of the WAN interface (may be - required with some cable connections). Enter a MAC address in the following format: - xx:xx:xx:xx:xx:xx or leave blank. - + This field can be used to modify ("spoof") the MAC address of the WAN interface (may be required with some cable connections). Enter a MAC address in the following format: xx:xx:xx:xx:xx:xx or leave blank. ^([0-9a-f]{2}([:-]||$)){6}$ MAC Address field is invalid @@ -276,20 +264,14 @@ if (count($input_errors)) { MTU input interfaces->wan->mtu - Set the MTU of the WAN interface. If you leave this field blank, an MTU of 1492 bytes for - PPPoE and 1500 bytes for all other connection types will be assumed. - + Set the MTU of the WAN interface. If you leave this field blank, an MTU of 1492 bytes for PPPoE and 1500 bytes for all other connection types will be assumed. true MSS input interfaces->wan->mss - If you enter a value in this field, then MSS clamping for TCP connections to the value - entered above minus 40 (TCP/IP header size) will be in effect. If you leave this field blank, an MSS - of 1492 bytes for PPPoE and 1500 bytes for all other connection types will be assumed. This should - match the above MTU value in most all cases. - + If you enter a value in this field, then MSS clamping for TCP connections to the value entered above minus 40 (TCP/IP header size) will be in effect. If you leave this field blank, an MSS of 1492 bytes for PPPoE and 1500 bytes for all other connection types will be assumed. This should match the above MTU value in most all cases. Static IP Configuration @@ -299,11 +281,9 @@ if (count($input_errors)) { IP Address interfaces->wan->ipaddr input - / + / true - - ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ - + ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ IP Address field is invalid @@ -318,9 +298,7 @@ if (count($input_errors)) { Upstream Gateway wizardtemp->wangateway input - - ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ - + ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ Gateway IP Address field is invalid @@ -331,9 +309,7 @@ if (count($input_errors)) { DHCP Hostname input interfaces->wan->dhcphostname - The value in this field is sent as the DHCP client identifier and hostname when requesting - a DHCP lease. Some ISPs may require this (for client identification). - + The value in this field is sent as the DHCP client identifier and hostname when requesting a DHCP lease. Some ISPs may require this (for client identification). PPPoE configuration @@ -358,18 +334,13 @@ if (count($input_errors)) { PPPoE Dial on demand Enable Dial-On-Demand mode checkbox - This option causes the interface to operate in dial-on-demand mode, allowing you to have a - virtual full time connection. The interface is configured, but the actual connection of the link is - delayed until qualifying outgoing traffic is detected. - + This option causes the interface to operate in dial-on-demand mode, allowing you to have a virtual full time connection. The interface is configured, but the actual connection of the link is delayed until qualifying outgoing traffic is detected. wizardtemp->wan->ondemand PPPoE Idle timeout input - If no qualifying outgoing packets are transmitted for the specified number of seconds, the - connection is brought down. An idle timeout of zero disables this feature. - + If no qualifying outgoing packets are transmitted for the specified number of seconds, the connection is brought down. An idle timeout of zero disables this feature. wizardtemp->wan->idletimeout @@ -390,11 +361,9 @@ if (count($input_errors)) { true PPTP Local IP Address input - / + / wizardtemp->wan->localip - - ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ - + ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ PPTP Local IP Address field is invalid @@ -409,9 +378,7 @@ if (count($input_errors)) { PPTP Remote IP Address wizardtemp->wan->gateway input - - ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ - + ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ PPTP Remote IP Address field is invalid @@ -419,18 +386,13 @@ if (count($input_errors)) { Enable Dial-On-Demand mode checkbox wizardtemp->wan->pptpondemand - This option causes the interface to operate in dial-on-demand mode, allowing you to have a - virtual full time connection. The interface is configured, but the actual connection of the link is - delayed until qualifying outgoing traffic is detected. - + This option causes the interface to operate in dial-on-demand mode, allowing you to have a virtual full time connection. The interface is configured, but the actual connection of the link is delayed until qualifying outgoing traffic is detected. PPTP Idle timeout input wizardtemp->wan->pptpidletimeout - If no qualifying outgoing packets are transmitted for the specified number of seconds, the - connection is brought down. An idle timeout of zero disables this feature. - + If no qualifying outgoing packets are transmitted for the specified number of seconds, the connection is brought down. An idle timeout of zero disables this feature. RFC1918 Networks @@ -439,11 +401,7 @@ if (count($input_errors)) { true Block RFC1918 Private Networks - When set, this option blocks traffic from IP addresses that are reserved for private - networks as per RFC 1918 (10/8, 172.16/12, 192.168/16) as well as loopback addresses (127/8). You - should generally leave this option turned on, unless your WAN network lies in such a private address - space, too. - + When set, this option blocks traffic from IP addresses that are reserved for private networks as per RFC 1918 (10/8, 172.16/12, 192.168/16) as well as loopback addresses (127/8). You should generally leave this option turned on, unless your WAN network lies in such a private address space, too. checkbox interfaces->wan->blockpriv Block private networks from entering via WAN @@ -455,10 +413,7 @@ if (count($input_errors)) { true Block bogon networks - When set, this option blocks traffic from IP addresses that are reserved (but not RFC 1918) - or not yet assigned by IANA. Bogons are prefixes that should never appear in the Internet routing - table, and obviously should not appear as the source address in any packets you receive. - + When set, this option blocks traffic from IP addresses that are reserved (but not RFC 1918) or not yet assigned by IANA. Bogons are prefixes that should never appear in the Internet routing table, and obviously should not appear as the source address in any packets you receive. checkbox interfaces->wan->blockbogons Block non-Internet routed networks from entering via WAN @@ -562,9 +517,7 @@ if ($_POST['selectedtype'] != "Static") { LAN IP Address input interfaces->lan->ipaddr - - ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ - + ^(?:[0]*(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:[0]*(?:25[0-5]|2[0-4][0-9]|1[0-9][0-9]|[1-9][0-9]|[1-9]))$ (leave empty for none) LAN IP Address field is invalid @@ -696,9 +649,7 @@ write_config(); text - A reload is now in progress. The wizard will redirect you to the dashboard once the reload - is completed. - + A reload is now in progress. The wizard will redirect you to the dashboard once the reload is completed. refresh