" . gettext("You must apply the changes in order for them to take effect."));?>
-
+
".gettext("You must apply the changes in order for them to take effect."));?>
".gettext("You must apply the changes in order for them to take effect."));?>
-
+
=gettext("Note:");?>=gettext("Alias Edit");?>
- =gettext("Alias Import");?>
- =gettext("Alias Import");?>
+
@@ -230,9 +230,9 @@ include("head.inc");
-
+
-
-
-
-
-
+
+
-
- =gettext("If");?>
- =gettext("Proto");?>
- =gettext("Src. addr");?>
- =gettext("Src. ports");?>
- =gettext("Dest. addr");?>
- =gettext("Dest. ports");?>
- =gettext("NAT IP");?>
- =gettext("NAT Ports");?>
- =gettext("Description");?>
-
-
+
+
+
- ";
-
+
$alias_popup = rule_popup($natent['source']['address'], pprint_port($natent['source']['port']), $natent['destination']['address'], pprint_port($natent['destination']['port']));
-
+
$alias_src_span_begin = $alias_popup["src"];
$alias_src_port_span_begin = $alias_popup["srcport"];
$alias_dst_span_begin = $alias_popup["dst"];
$alias_dst_port_span_begin = $alias_popup["dstport"];
-
+
$alias_src_span_end = $alias_popup["src_end"];
$alias_src_port_span_end = $alias_popup["srcport_end"];
$alias_dst_span_end = $alias_popup["dst_end"];
$alias_dst_port_span_end = $alias_popup["dstport_end"];
-
+
$alias_popup = rule_popup("","",$natent['target'], pprint_port($natent['local-port']));
-
+
$alias_target_span_begin = $alias_popup["dst"];
$alias_local_port_span_begin = $alias_popup["dstport"];
-
+
$alias_target_span_end = $alias_popup["dst_end"];
$alias_local_port_span_end = $alias_popup["dstport_end"];
-
+
if (isset($natent['disabled']))
$textss = "";
else
$textss = "";
-
+
$textse = "";
-
+
/* if user does not have access to edit an interface skip on to the next record */
- if(!have_natpfruleint_access($natent['interface']))
+ if(!have_natpfruleint_access($natent['interface']))
continue;
?>
+
+ =gettext("If");?>
+ =gettext("Proto");?>
+ =gettext("Src. addr");?>
+ =gettext("Src. ports");?>
+ =gettext("Dest. addr");?>
+ =gettext("Dest. ports");?>
+ =gettext("NAT IP");?>
+ =gettext("NAT Ports");?>
+ =gettext("Description");?>
+
+
@@ -292,10 +292,10 @@ $main_buttons = array(
-
+
-
+
-
+
@@ -308,34 +308,34 @@ $main_buttons = array(
?>
=$textse;?>
-
+
=$textss;?>=strtoupper($natent['protocol']);?>=$textse;?>
-
+
=$textss;?>=$textse;?>
=$textss;?>=$textse;?>
-
+
=$textss;?>=$textse;?>
=$textss;?>=$textse;?>
-
+
=$textss;?>=$textse;?>
=$textss;?>=$textse;?>
-
+
=$textss;?>=htmlspecialchars($natent['descr']);?> =$textse;?>
-
-
-
-
- ')" class="btn btn-default btn-xs">
-
-
+
+
+
+
+ ')" class="btn btn-default btn-xs">
+
+
@@ -405,4 +405,4 @@ $main_buttons = array(
-
\ No newline at end of file
+
diff --git a/src/www/firewall_nat_1to1.php b/src/www/firewall_nat_1to1.php
index edfa04722..8bb35cac2 100644
--- a/src/www/firewall_nat_1to1.php
+++ b/src/www/firewall_nat_1to1.php
@@ -154,13 +154,13 @@ $main_buttons = array(
?>
-
+
-
+
-
+
-
+
">
-
+
-
+
-
-
+
+
@@ -200,8 +200,8 @@ $main_buttons = array(
=gettext("Description"); ?>
@@ -257,7 +257,7 @@ $main_buttons = array(
-
+
')" class="btn btn-default btn-xs">
@@ -270,7 +270,7 @@ $main_buttons = array(
-
+
-
+
@@ -282,9 +282,9 @@ $main_buttons = array(
-
+
-
+
@@ -312,7 +312,7 @@ $main_buttons = array(
+
+
@@ -487,7 +487,7 @@ include("head.inc");
=gettext("Edit Redirect entry"); ?>
@@ -511,34 +511,34 @@ include("head.inc");
@@ -612,7 +612,7 @@ include("head.inc");
@@ -629,9 +629,9 @@ include("head.inc");
@@ -683,16 +683,16 @@ include("head.inc");
-
- $ifdesc): ?>
+
+ $ifdesc): ?>
-
-
+
+
@@ -757,7 +757,7 @@ include("head.inc");
$wkportdesc): ?>
-
+
@@ -844,7 +844,7 @@ include("head.inc");
$linkedrule = "
" . gettext("View the filter rule") . "
";
}
echo ">". htmlspecialchars('Rule ' . $filter_rule['descr']) . "\n";
-
+
}
}
}
@@ -870,7 +870,7 @@ include("head.inc");
-
\ No newline at end of file
+
diff --git a/src/www/firewall_nat_npt.php b/src/www/firewall_nat_npt.php
index 72997d2ac..f62777612 100644
--- a/src/www/firewall_nat_npt.php
+++ b/src/www/firewall_nat_npt.php
@@ -86,20 +86,20 @@ $main_buttons = array(
-
+
-
-
-
+
+
+
-
-
-
+ =gettext("Interface"); ?>
- =gettext("External Prefix"); ?>
- =gettext("Internal prefix"); ?>
- =gettext("Description"); ?>
-
-
+
-
+
- ";
-
+
$i = 0; foreach ($a_npt as $natent):
-
+
if (isset($natent['disabled']))
$textss = "";
else
@@ -147,17 +147,17 @@ $main_buttons = array(
echo $textse;
?>
-
=gettext("Interface"); ?>
+ =gettext("External Prefix"); ?>
+ =gettext("Internal prefix"); ?>
+ =gettext("Description"); ?>
+
+
-
+
-
+
=$textss;?>
@@ -169,15 +169,15 @@ $main_buttons = array(
-
+
+
+
-
+
=gettext("Edit NAT NPt entry"); ?>
-
=gettext("Disabled"); ?>
@@ -190,29 +190,29 @@ include("head.inc");
foreach ($ifdisp as $if => $ifdesc)
if(have_ruleint_access($if))
$interfaces[$if] = $ifdesc;
-
+
if ($config['l2tp']['mode'] == "server")
if(have_ruleint_access("l2tp"))
$interfaces['l2tp'] = "L2TP VPN";
-
+
if ($config['pptpd']['mode'] == "server")
if(have_ruleint_access("pptp"))
$interfaces['pptp'] = "PPTP VPN";
-
+
if ($config['pppoe']['mode'] == "server")
if(have_ruleint_access("pppoe"))
$interfaces['pppoe'] = "PPPoE VPN";
-
+
/* add ipsec interfaces */
if (isset($config['ipsec']['enable']) || isset($config['ipsec']['mobileclients']['enable']))
if(have_ruleint_access("enc0"))
$interfaces["enc0"] = "IPsec";
-
+
/* add openvpn/tun interfaces */
if ($config['openvpn']["openvpn-server"] || $config['openvpn']["openvpn-client"])
$interfaces["openvpn"] = "OpenVPN";
-
- foreach ($interfaces as $iface => $ifacename):
+
+ foreach ($interfaces as $iface => $ifacename):
?>
- =gettext("Enter the internal (LAN) ULA IPv6 Prefix for the Network Prefix translation. The prefix size specified for the internal IPv6 prefix will be applied to the
- external prefix.");
+ =gettext("Enter the internal (LAN) ULA IPv6 Prefix for the Network Prefix translation. The prefix size specified for the internal IPv6 prefix will be applied to the
+ external prefix.");
?>
@@ -278,16 +278,16 @@ include("head.inc");
=gettext("Enter the Global Unicast routable IPv6 prefix here"); ?>
-
+
- =gettext("Description"); ?>
-
+
=gettext("You may enter a description here " .
"for your reference (not parsed)."); ?>
+
-
+
" />
" onclick="window.location.href='=$referer;?>'" />
@@ -296,12 +296,12 @@ include("head.inc");
-
+
-
-
+
+
=gettext("Mode:"); ?>
-
+
/>
@@ -273,7 +273,7 @@ include("head.inc");
/>
@@ -296,45 +296,45 @@ include("head.inc");
-
+
-
+
" />
-
-
-
-
-
- =gettext("Mappings:"); ?>
-
-
-
+
+
-
- =gettext("Interface");?>
- =gettext("Source");?>
- =gettext("Source Port");?>
- =gettext("Destination");?>
- =gettext("Destination Port");?>
- =gettext("NAT Address");?>
- =gettext("NAT Port");?>
- =gettext("Static Port");?>
- =gettext("Description");?>
-
-
-
-
-
+
+
+ =gettext("Mappings:"); ?>
+
+
+
-
+
" class="=$iconfn;?> =$textss;?>">
+
+ =gettext("Interface");?>
+ =gettext("Source");?>
+ =gettext("Source Port");?>
+ =gettext("Destination");?>
+ =gettext("Destination Port");?>
+ =gettext("NAT Address");?>
+ =gettext("NAT Port");?>
+ =gettext("Static Port");?>
+ =gettext("Description");?>
+
+
+
+
+
NO NAT';
elseif (!$natent['target'])
@@ -440,7 +440,7 @@ include("head.inc");
-
+
" alt="edit" class="btn btn-default btn-xs">
')" title="=gettext("delete rule");?>" alt="delete" class="btn btn-default btn-xs">
" class="btn btn-default btn-xs">
@@ -476,14 +476,14 @@ include("head.inc");
@@ -640,7 +640,7 @@ include("head.inc");
-
+
-
+
-
-
+
+
@@ -491,9 +491,9 @@ include("head.inc");
-
+
" alt="add" class="btn btn-default btn-xs">
-
+
@@ -505,7 +505,7 @@ include("head.inc");
-
+
-
+
+
+
-
=gettext("Edit Advanced Outbound NAT entry");?>
@@ -488,27 +488,27 @@ function poolopts_change() {
foreach ($iflist as $if => $ifdesc)
if(have_ruleint_access($if))
$interfaces[$if] = $ifdesc;
-
+
if ($config['l2tp']['mode'] == "server")
if(have_ruleint_access("l2tp"))
$interfaces['l2tp'] = "L2TP VPN";
-
+
if ($config['pptpd']['mode'] == "server")
if(have_ruleint_access("pptp"))
$interfaces['pptp'] = "PPTP VPN";
-
+
if (is_pppoe_server_enabled() && have_ruleint_access("pppoe"))
$interfaces['pppoe'] = "PPPoE VPN";
-
+
/* add ipsec interfaces */
if (isset($config['ipsec']['enable']) || isset($config['ipsec']['client']['enable']))
if(have_ruleint_access("enc0"))
$interfaces["enc0"] = "IPsec";
-
+
/* add openvpn/tun interfaces */
if ($config['openvpn']["openvpn-server"] || $config['openvpn']["openvpn-client"])
$interfaces["openvpn"] = "OpenVPN";
-
+
foreach ($interfaces as $iface => $ifacename):
?>
-
+
-
+
=gettext("Other Subnet:");?>
@@ -716,7 +716,7 @@ function poolopts_change() {
@@ -821,7 +821,7 @@ function poolopts_change() {
@@ -833,7 +833,7 @@ function poolopts_change() {
@@ -852,16 +852,16 @@ function poolopts_change() {
@@ -416,7 +416,7 @@ include("head.inc");
-
-
+
+
=gettext("Schedule");?>
=gettext("Description");?>
-
+
-
+
@@ -441,7 +441,7 @@ include("head.inc");
if (!isset($config['system']['webgui']['noantilockout']) &&
(((count($config['interfaces']) > 1) && ($if == 'lan'))
|| ((count($config['interfaces']) == 1) && ($if == 'wan')))):
-
+
$alports = implode('
', filter_get_antilockout_ports(true));
?>
@@ -460,17 +460,17 @@ include("head.inc");
-
+
" alt="move" class="btn btn-default btn-xs">
" class="btn btn-default btn-xs">
-
+
" width="17" height="17" border="0" alt="add" class="btn btn-default btn-xs">
@@ -493,7 +493,7 @@ include("head.inc");
-
+
*
=gettext("RFC 1918 networks");?>
*
@@ -482,9 +482,9 @@ include("head.inc");
=gettext("Block private networks");?>
" alt="move" class="btn btn-default btn-xs">
-
+
" class="btn btn-default btn-xs">
-
+
" width="17" height="17" border="0" alt="add" class="btn btn-default btn-xs">
@@ -570,14 +570,14 @@ include("head.inc");
//$alias_src_port_span_begin = "";
//$alias_dst_span_begin = "";
//$alias_dst_port_span_begin = "";
-
+
$alias_popup = rule_popup($filterent['source']['address'],pprint_port($filterent['source']['port']),$filterent['destination']['address'],pprint_port($filterent['destination']['port']));
//var_dump($alias_popup);
//$alias_src_span_begin = $alias_popup["src"];
//$alias_src_port_span_begin = $alias_popup["srcport"];
//$alias_dst_span_begin = $alias_popup["dst"];
//$alias_dst_port_span_begin = $alias_popup["dstport"];
-
+
$alias_src_span_end = ""; //$alias_popup["src_end"];
//$alias_src_port_span_end = $alias_popup["srcport_end"];
//$alias_dst_span_end = $alias_popup["dst_end"];
@@ -609,7 +609,7 @@ include("head.inc");
{
if ($schedule['name'] == $filterent['sched'] ){
$schedstatus = filter_get_time_based_rule_status($schedule);
-
+
foreach($schedule['timerange'] as $timerange) {
$tempFriendlyTime = "";
$tempID = "";
@@ -617,14 +617,14 @@ include("head.inc");
if ($timerange){
$dayFriendly = "";
$tempFriendlyTime = "";
-
+
//get hours
$temptimerange = $timerange['hour'];
$temptimeseparator = strrpos($temptimerange, "-");
-
+
$starttime = substr ($temptimerange, 0, $temptimeseparator);
$stoptime = substr ($temptimerange, $temptimeseparator+1);
-
+
if ($timerange['month']){
$tempmontharray = explode(",", $timerange['month']);
$tempdayarray = explode(",",$timerange['day']);
@@ -634,14 +634,14 @@ include("head.inc");
foreach ($tempmontharray as $monthtmp){
$month = $tempmontharray[$arraycounter];
$day = $tempdayarray[$arraycounter];
-
+
if (!$firstDayFound)
{
$firstDay = $day;
$firstmonth = $month;
$firstDayFound = true;
}
-
+
$currentDay = $day;
$nextDay = $tempdayarray[$arraycounter+1];
$currentDay++;
@@ -798,7 +798,7 @@ include("head.inc");
-
+
*
=gettext("Reserved/not assigned by IANA");?>
*
@@ -505,11 +505,11 @@ include("head.inc");
=gettext("Block bogon networks");?>
" alt="move" class="btn btn-default btn-xs">
-
+
" class="btn btn-default btn-xs">
-
+
" width="17" height="17" border="0" alt="add" class="btn btn-default btn-xs">
-
+
" class="btn btn-default btn-xs">
-
+
" onclick="return confirm('Do you really want to delete this rule?')" class="btn btn-default btn-xs">
" class="btn btn-default btn-xs">
@@ -834,9 +834,9 @@ include("head.inc");
-
+
-
+
@@ -845,8 +845,8 @@ include("head.inc");
@@ -915,13 +915,13 @@ include("head.inc");
-
+
-
\ No newline at end of file
+
diff --git a/src/www/firewall_rules_edit.php b/src/www/firewall_rules_edit.php
index f184d298d..18af8d758 100644
--- a/src/www/firewall_rules_edit.php
+++ b/src/www/firewall_rules_edit.php
@@ -583,7 +583,7 @@ if ($_POST) {
if (($_POST['statetimeout'] != "") && !is_posnumericint($_POST['statetimeout']))
$input_errors[] = gettext("State timeout (advanced option) must be a positive integer");
- if ((($_POST['max-src-conn-rate'] <> "" and $_POST['max-src-conn-rates'] == "")) ||
+ if ((($_POST['max-src-conn-rate'] <> "" and $_POST['max-src-conn-rates'] == "")) ||
(($_POST['max-src-conn-rate'] == "" and $_POST['max-src-conn-rates'] <> "")))
$input_errors[] = gettext("Both maximum new connections per host and the interval (per second(s)) must be specified");
@@ -810,24 +810,24 @@ include("head.inc");
-
+
+
+
@@ -930,7 +930,7 @@ include("head.inc");
if ($config['pptpd']['mode'] == "server")
if(have_ruleint_access("pptp"))
$interfaces['pptp'] = "PPTP VPN";
-
+
if (is_pppoe_server_enabled() && have_ruleint_access("pppoe"))
$interfaces['pppoe'] = "PPPoE VPN";
/* add ipsec interfaces */
@@ -945,7 +945,7 @@ include("head.inc");
$selected_interfaces = explode(",", $pconfig['interface']);
foreach ($interfaces as $iface => $ifacename): ?>
-
+
=gettext("Edit Firewall rule");?>
=gettext("Choose on which interface packets must come in to match this rule.");?>
@@ -995,7 +995,7 @@ include("head.inc");
$protocols = explode(" ", "TCP UDP TCP/UDP ICMP ESP AH GRE IPV6 IGMP PIM OSPF any carp pfsync");
foreach ($protocols as $proto): ?>
-
+
=gettext("Choose which IP protocol this rule should match.");?>
=gettext("Hint: in most cases, you should specify ");?>TCP =gettext("here.");?>
@@ -1025,10 +1025,10 @@ include("head.inc");
"maskreq" => gettext("Address mask request"),
"maskrep" => gettext("Address mask reply")
);
-
+
foreach ($icmptypes as $icmptype => $descr): ?>
-
+
=gettext("If you selected ICMP for the protocol above, you may specify an ICMP type here.");?>
@@ -1079,7 +1079,7 @@ include("head.inc");
=$ifdesc?> =gettext("address");?>
-
+
@@ -1090,7 +1090,7 @@ include("head.inc");
@@ -1112,9 +1112,9 @@ include("head.inc");
autocomplete='off' class="formfldalias" name="srcbeginport_cust" id="srcbeginport_cust" type="text" size="5" value="" />
@@ -1172,15 +1172,15 @@ include("head.inc");
-
- $ifdesc): ?>
+
+ $ifdesc): ?>
-
+
@@ -1211,9 +1211,9 @@ include("head.inc");
autocomplete='off' class="formfldalias" name="dstbeginport_cust" id="dstbeginport_cust" type="text" size="5" value="" />
@@ -1226,7 +1226,7 @@ include("head.inc");
$wkportdesc): ?>
-
+
autocomplete='off' class="formfldalias" name="dstendport_cust" id="dstendport_cust" type="text" size="5" value="" />
@@ -1266,7 +1266,7 @@ include("head.inc");
" onclick="window.location.href='=$referer;?>'" />
-
+
@@ -1458,7 +1458,7 @@ include("head.inc");
else
$opts .= "\n";
}
-
+
$optsset = "";
foreach($vlanprio as $vprioset) {
if ($vprioset == $pconfig['vlanprioset'])
@@ -1618,7 +1618,7 @@ include("head.inc");
-
+
@@ -1779,4 +1779,4 @@ include("head.inc");
var oTextbox6 = new AutoSuggestControl(document.getElementById("dstendport_cust"), new StateSuggestions(customarray));
//]]>
-
\ No newline at end of file
+
diff --git a/src/www/firewall_schedule.php b/src/www/firewall_schedule.php
index 9c2a91157..70f45edee 100644
--- a/src/www/firewall_schedule.php
+++ b/src/www/firewall_schedule.php
@@ -96,34 +96,34 @@ $main_buttons = array(
=gettext("Ackqueue/Queue");?>
@@ -1745,7 +1745,7 @@ include("head.inc");
" onclick="window.location.href='=$referer;?>'" />
-
+
-
+
+
-
-
+
+
=gettext("Name");?>
=gettext("Time Range(s)");?>
=gettext("Description");?>
-
+
@@ -131,14 +131,14 @@ $main_buttons = array(
-
-
" width="17" height="17" border="0" alt="schedule" />
+
" width="17" height="17" border="0" alt="schedule" />
-
-
- ";
@@ -372,33 +372,33 @@ if ($queue)
echo $queue->build_javascript();
else
echo $newjavascript;
-
+
$main_buttons = array(
array('label'=>gettext("Create new limiter"), 'href'=>'firewall_shaper_vinterface.php?pipe=new&action=add'),
);
-
-include("fbegin.inc");
+
+include("fbegin.inc");
?>
0): ?>
@@ -423,17 +423,17 @@ include("fbegin.inc");
@@ -444,16 +444,16 @@ include("fbegin.inc");
-
+
-
+
-
-
+
+
$wizard):
?>
@@ -151,5 +151,5 @@ include("head.inc");
-
-
\ No newline at end of file
+
+
diff --git a/src/www/firewall_virtual_ip.php b/src/www/firewall_virtual_ip.php
index 2be5e11c7..b4e74debb 100644
--- a/src/www/firewall_virtual_ip.php
+++ b/src/www/firewall_virtual_ip.php
@@ -68,21 +68,21 @@ if ($_POST) {
if (!empty($ovip))
interface_vip_bring_down($ovip);
if ($a_vip[$vid]) {
- switch ($a_vip[$vid]['mode']) {
- case "ipalias":
- interface_ipalias_configure($a_vip[$vid]);
- break;
- case "proxyarp":
- interface_proxyarp_configure($a_vip[$vid]['interface']);
- break;
- case "carp":
- interface_carp_configure($a_vip[$vid]);
+ switch ($a_vip[$vid]['mode']) {
+ case "ipalias":
+ interface_ipalias_configure($a_vip[$vid]);
+ break;
+ case "proxyarp":
+ interface_proxyarp_configure($a_vip[$vid]['interface']);
+ break;
+ case "carp":
+ interface_carp_configure($a_vip[$vid]);
+ break;
+ default:
break;
- default:
- break;
}
- }
- }
+ }
+ }
@unlink("{$g['tmp_path']}/.firewall_virtual_ip.apply");
}
$retval = 0;
@@ -147,7 +147,7 @@ if ($_GET['act'] == "del") {
if ($subnet == $if_subnet)
$found_if = true;
-
+
$vipiface = $a_vip[$_GET['id']]['interface'];
foreach ($a_vip as $vip_id => $vip) {
if ($vip_id == $_GET['id'])
@@ -163,7 +163,7 @@ if ($_GET['act'] == "del") {
if ($found_carp === true && $found_other_alias === false && $found_if === false)
$input_errors[] = gettext("This entry cannot be deleted because it is still referenced by a CARP IP with the description") . " {$vip['descr']}.";
}
-
+
if (!$input_errors) {
if (!session_id())
session_start();
@@ -197,7 +197,7 @@ $pgtitle = array(gettext("Firewall"),gettext("Virtual IP Addresses"));
include("head.inc");
$main_buttons = array(
- array('href'=>'firewall_virtual_ip_edit.php', 'label'=>'Add'),
+ array('href'=>'firewall_virtual_ip_edit.php', 'label'=>'Add'),
);
?>
@@ -205,41 +205,41 @@ $main_buttons = array(
=gettext("Wizard function");?>
=gettext("Wizard Link");?>
-
+
-
-
+
+
=gettext("Virtual IP address");?>
=gettext("Interface");?>
@@ -247,8 +247,8 @@ $main_buttons = array(
=gettext("Description");?>
">
-
+
')">
@@ -289,7 +289,7 @@ $main_buttons = array(
-
+
=gettext("Edit Virtual IP");?>
- =gettext("Edit Virtual IP");?>
+
@@ -465,18 +465,18 @@ function typesel_change() {
-
=gettext("Type");?>
+ =gettext("Type");?>
/> =gettext("IP Alias");?>
@@ -384,7 +384,7 @@ function typesel_change() {
=gettext("Interface");?>
-
+
" />
- */
+ */
?>
=gettext("Expansion:");?>
/>
- Disable expansion of this entry into IPs on NAT lists (e.g. 192.168.1.0/24 expands to 256 entries.)
-
+ Disable expansion of this entry into IPs on NAT lists (e.g. 192.168.1.0/24 expands to 256 entries.)
+
Base:
+
Skew:
+
@@ -501,16 +501,16 @@ function typesel_change() {
=gettext("The frequency that this machine will advertise. 0 means usually master. Otherwise the lowest combination of both values in the cluster determines the master.");?>
-
- =gettext("Proxy ARP and Other type Virtual IPs cannot be bound to by anything running on the firewall, such as IPsec, OpenVPN, etc. Use a CARP or IP Alias type address for these cases.");?>
-
=gettext("For more information on CARP and the above values, visit the OpenBSD ");?> =gettext("CARP FAQ"); ?>.
+
+ =gettext("Proxy ARP and Other type Virtual IPs cannot be bound to by anything running on the firewall, such as IPsec, OpenVPN, etc. Use a CARP or IP Alias type address for these cases.");?>
+
=gettext("For more information on CARP and the above values, visit the OpenBSD ");?> =gettext("CARP FAQ"); ?>.
+
-
+
-
-
+
+
+
-
-
+
-
\ No newline at end of file
+
diff --git a/src/www/firewall_aliases_import.php b/src/www/firewall_aliases_import.php
index 956e7e876..5909caa98 100755
--- a/src/www/firewall_aliases_import.php
+++ b/src/www/firewall_aliases_import.php
@@ -162,25 +162,25 @@ include("head.inc");
-
+
+
-
\ No newline at end of file
+
diff --git a/src/www/firewall_aliases_edit.php b/src/www/firewall_aliases_edit.php
index 7f368979a..7ae068843 100755
--- a/src/www/firewall_aliases_edit.php
+++ b/src/www/firewall_aliases_edit.php
@@ -624,26 +624,26 @@ EOD;
+
-
+
-
+
-
-
-
-
-
-
-
+
-
-
+
+
+
@@ -240,4 +240,4 @@ include("head.inc");
-
\ No newline at end of file
+
diff --git a/src/www/firewall_nat.php b/src/www/firewall_nat.php
index e82c4e499..645decf49 100644
--- a/src/www/firewall_nat.php
+++ b/src/www/firewall_nat.php
@@ -107,7 +107,7 @@ if (isset($_POST['del_x'])) {
// Check for filter rule associations
if (isset($a_nat[$rulei]['associated-rule-id'])){
delete_id($a_nat[$rulei]['associated-rule-id'], $config['filter']['rule']);
-
+
mark_subsystem_dirty('filter');
}
unset($a_nat[$rulei]);
@@ -179,13 +179,13 @@ $main_buttons = array(
body.dragging, body.dragging * {
cursor: move !important;
}
-
+
.dragged {
position: absolute;
opacity: 0.5;
z-index: 2000;
}
-
+
ol.example li.placeholder {
position: relative;
/** More li styles **/
@@ -193,29 +193,29 @@ $main_buttons = array(
ol.example li.placeholder:before {
position: absolute;
/** Define arrowhead **/
- }
+ }
-
+
-
+
-
-
+
-
+
-
-
-
-
-
-
-
-
-
-
+
+
+
+
+
+
+
+
+
+
+
+
+
-
-
-
+
-
-
+
+
" . gettext("You must apply the changes in order for them to take effect."));?>
-
-
-
-
-
-
+
+
+
-
-
+
+
-
-
+
+
+
" .
gettext("You must apply the changes in order for them to take effect."));
?>
-
-
-
+
+
+
-
-
-
+
+
+
-
-
+
+
@@ -322,4 +322,4 @@ $main_buttons = array(
-
\ No newline at end of file
+
diff --git a/src/www/firewall_nat_1to1_edit.php b/src/www/firewall_nat_1to1_edit.php
index 1c19179f7..f9d5621cd 100644
--- a/src/www/firewall_nat_1to1_edit.php
+++ b/src/www/firewall_nat_1to1_edit.php
@@ -229,7 +229,7 @@ include("head.inc");
-
+
-
\ No newline at end of file
+
diff --git a/src/www/firewall_nat_edit.php b/src/www/firewall_nat_edit.php
index ce6b16ada..8865cdcda 100644
--- a/src/www/firewall_nat_edit.php
+++ b/src/www/firewall_nat_edit.php
@@ -247,7 +247,7 @@ if ($_POST) {
}
/* if user enters an alias and selects "network" then disallow. */
- if( ($_POST['srctype'] == "network" && is_alias($_POST['src']) )
+ if( ($_POST['srctype'] == "network" && is_alias($_POST['src']) )
|| ($_POST['dsttype'] == "network" && is_alias($_POST['dst']) ) ) {
$input_errors[] = gettext("You must specify single host or alias for alias entries.");
}
@@ -310,7 +310,7 @@ if ($_POST) {
}
}
- // Allow extending of the firewall edit page and include custom input validation
+ // Allow extending of the firewall edit page and include custom input validation
pfSense_handle_custom_code("/usr/local/pkg/firewall_nat/input_validation");
if (!$input_errors) {
@@ -429,7 +429,7 @@ if ($_POST) {
$natent['updated'] = make_config_revision_entry();
- // Allow extending of the firewall edit page and include custom input validation
+ // Allow extending of the firewall edit page and include custom input validation
pfSense_handle_custom_code("/usr/local/pkg/firewall_nat/pre_write_config");
// Update the NAT entry now
@@ -461,25 +461,25 @@ include("head.inc");
-
+
-
+
-
-
-
+
+
+
-
+
-
-
-
-
-
-
-
+
+
+
+
+
-
-
+
+
+
" . gettext("You must apply the changes in order for them to take effect."));?>
-
+
+
+
-
-
+
+
-
-
-
+
+
-
+
-
\ No newline at end of file
+
diff --git a/src/www/firewall_nat_npt_edit.php b/src/www/firewall_nat_npt_edit.php
index 0a10665e0..a0fbe10e9 100644
--- a/src/www/firewall_nat_npt_edit.php
+++ b/src/www/firewall_nat_npt_edit.php
@@ -1,22 +1,22 @@
-.
All rights reserved.
-
+
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are met:
-
+
1. Redistributions of source code must retain the above copyright notice,
this list of conditions and the following disclaimer.
-
+
2. Redistributions in binary form must reproduce the above copyright
notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
-
+
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
@@ -98,7 +98,7 @@ if (isset($id) && $a_npt[$id]) {
if ($_POST) {
-
+
unset($input_errors);
$pconfig = $_POST;
@@ -109,7 +109,7 @@ if ($_POST) {
$reqdfieldsn[] = gettext("Source prefix");
$reqdfields[] = "dst";
$reqdfieldsn[] = gettext("Destination prefix");
-
+
do_input_validation($_POST, $reqdfields, $reqdfieldsn, $input_errors);
if (!$input_errors) {
@@ -157,23 +157,23 @@ include("head.inc");
-
-
+
+
-
+
-
-
+
-
-
-
-
-
-
+
+
+
+
+
+
-
-
+
+
+
".gettext("You must apply the changes in order for them to take effect."));
?>
-
+
-
-
-
+
+
+
-
+
-
-
-
-
@@ -648,4 +648,4 @@ include("head.inc");
-
\ No newline at end of file
+
diff --git a/src/www/firewall_nat_out_edit.php b/src/www/firewall_nat_out_edit.php
index dc24397e3..cbc72ed67 100644
--- a/src/www/firewall_nat_out_edit.php
+++ b/src/www/firewall_nat_out_edit.php
@@ -248,7 +248,7 @@ if ($_POST) {
}
}
- // Allow extending of the firewall edit page and include custom input validation
+ // Allow extending of the firewall edit page and include custom input validation
pfSense_handle_custom_code("/usr/local/pkg/firewall_aon/input_validation");
if (!$input_errors) {
@@ -268,7 +268,7 @@ if ($_POST) {
} else {
unset($natent['staticnatport']);
}
-
+
if(isset($_POST['disabled'])) {
$natent['disabled'] = true;
} else {
@@ -293,7 +293,7 @@ if ($_POST) {
$natent['destination']['address'] = $ext;
}
if($_POST['natport'] != "" && $protocol_uses_ports && !isset($_POST['nonat'])) {
- $natent['natport'] = $_POST['natport'];
+ $natent['natport'] = $_POST['natport'];
} else {
unset($natent['natport']);
}
@@ -318,7 +318,7 @@ if ($_POST) {
$natent['updated'] = make_config_revision_entry();
- // Allow extending of the firewall edit page and include custom input validation
+ // Allow extending of the firewall edit page and include custom input validation
pfSense_handle_custom_code("/usr/local/pkg/firewall_aon/pre_write_config");
if (isset($id) && $a_out[$id]) {
@@ -443,24 +443,24 @@ function poolopts_change() {
-
+
-
+
+
+
+
+
+
-
-
+
+
-
+
-
-
-
-
-
-
-
+
+
+
+
-
+
-
-
-
+
+
+
-
\ No newline at end of file
+
diff --git a/src/www/firewall_rules.php b/src/www/firewall_rules.php
index 3c1e84a52..004c52ec0 100644
--- a/src/www/firewall_rules.php
+++ b/src/www/firewall_rules.php
@@ -77,10 +77,10 @@ $ifdescs = get_configured_interface_with_descr();
// Drag and drop reordering
if($_REQUEST['dragdroporder']) {
-
-
-
+
+
+
// First create a new ruleset array and tmp arrays
$a_filter_before = array();
$a_filter_order = array();
@@ -256,9 +256,9 @@ if (isset($_POST['del_x'])) {
break;
}
}
-
-
+
+
/* move selected rules before this rule */
if (isset($movebtn) && is_array($_POST['rule']) && count($_POST['rule'])) {
$a_filter_new = array();
@@ -305,13 +305,13 @@ include("head.inc");
body.dragging, body.dragging * {
cursor: move !important;
}
-
+
.dragged {
position: absolute;
opacity: 0.5;
z-index: 2000;
}
-
+
ol.example li.placeholder {
position: relative;
/** More li styles **/
@@ -319,7 +319,7 @@ include("head.inc");
ol.example li.placeholder:before {
position: absolute;
/** Define arrowhead **/
- }
+ }
@@ -329,17 +329,17 @@ include("head.inc");
jQuery(window).load(
function(){
var originalLeave=jQuery.fn.popover.Constructor.prototype.leave;
- jQuery.fn.popover.Constructor.prototype.leave=function(obj)
+ jQuery.fn.popover.Constructor.prototype.leave=function(obj)
{
var self=obj instanceof this.constructor?obj:jQuery(obj.currentTarget)[this.type](this.getDelegateOptions()).data('bs.'+this.type)
var container,timeout;originalLeave.call(this,obj);
if(obj.currentTarget){container=jQuery(obj.currentTarget).siblings('.popover')
timeout=self.timeout;
container.one('mouseenter',function()
- {
+ {
clearTimeout(timeout);
container.one('mouseleave',function()
- {
+ {
jQuery.fn.popover.Constructor.prototype.leave.call(self,self);
});
})
@@ -356,9 +356,9 @@ include("head.inc");
+
+
+
-
+
-
-
+
+
+
+
+
-
+
-
-
+
+
-
-
-
-
-
-
-
-
+
+
+
+
+
+
+
-
+
-
+
-
-
-
-
-
-
-
-
+
+
+
+
+
+
+
+
-
-
-
+
+
+
-
+
-
-
-
-
-
+
+
-
-
+
+
-
\ No newline at end of file
+
diff --git a/src/www/firewall_shaper_wizards.php b/src/www/firewall_shaper_wizards.php
index fc2a254e6..b3297e222 100644
--- a/src/www/firewall_shaper_wizards.php
+++ b/src/www/firewall_shaper_wizards.php
@@ -88,19 +88,19 @@ include("head.inc");
-
-
+
-
-
+
+
+ ?>
-
+
-
-
+
+
+
-
+
-
-
-
-
-
-
+
+
+
+
-
-
+
+
+
-
- ".gettext("You must apply the changes in order for them to take effect."));
?>
-
+
-
-
-
-
-
-
-
-
+
+
+
-
+
+
-
-
+
+
-
-
\ No newline at end of file
+
+
diff --git a/src/www/firewall_virtual_ip_edit.php b/src/www/firewall_virtual_ip_edit.php
index d8a76975f..a9dbd8d90 100644
--- a/src/www/firewall_virtual_ip_edit.php
+++ b/src/www/firewall_virtual_ip_edit.php
@@ -74,7 +74,7 @@ function find_last_used_vhid() {
global $config, $g;
$vhid = 0;
foreach($config['virtualip']['vip'] as $vip) {
- if($vip['vhid'] > $vhid)
+ if($vip['vhid'] > $vhid)
$vhid = $vip['vhid'];
}
return $vhid;
@@ -263,7 +263,7 @@ include("head.inc");
-
+
@@ -303,5 +303,5 @@ $main_buttons = array(
+
@@ -521,4 +521,4 @@ function typesel_change() {
enable_change();
//]]>
-
\ No newline at end of file
+
-
+
-
+
-
-
-
-
-
-
-
-
-
-
+
+
+
+
+
+
+
+
+
+
+
+
+
-
-
-