Do not automatically create a record for WAN.
Do not harc code white
Rewrite the pfsense privilege system with the following goals in mind ...
1) Redefine page privileges to not use static urls2) Accurate generation of privilege definitions from source3) Merging the user and group privileges into a single set4) Allow any privilege to be added to users or groups w/ inheritance...
When switching to AON rules do not create nat rules for interfaces that have gateway.This fixes some broken generated rules.
NOTE: That some more work is needed to make it comply to interfaces that are set as dhcp or to produce nat rules for interfaces other then WAN.
NOTE: this is the other half of changes
Continue interface improvements
touch up text
Ticket #1569
Switch over to array style page titles. Obtained-from: m0n0wall
Add a plus button on the top header of these pages.This to make it easier on large configurations.
Alter outbound nat descriptions to match operation
MFC: Soon?
Do not unset advanced outbound nat settings if user deletes all rules and saves. This prevents the operator from having a nat-free environment.
Reported-by: Andrew Thompson
MFC 11291Ticket #893 Also address "bugs/features" in the new XML parser (should be safe to MFC - needs testing before commiting to RELENG_1 though, works in HEAD perfectly)
use isset
Woops, we want !
Do not create rules every time user saves settings.
Ticket #858
MFC
MFC 9581Fix description field being to far to the right if you aren't usingstatic ports
MFC 7185Add new port display to this screen. This was supposed to go with [7145] and would have been MFC'd with [7153].
Forgotten MFC
Increase colspan
Include static port
Remove #!/usr/local/bin/php
MFC 8573Correctly deterimine starting address Ticket #738
Remove reboot required checks
MFC 6877Update terminology - should help cut down questions too
anymore -> any longer
Cleanup HTML
Ticket #467 destination network on firewall_nat_out_edit.php incorrectly parsed.
Submitted-by-someone-who-refuses-to-accept-cvs-account: databeestje
When creating outbound nat rules, label LAN correctly
Woops, use the complete xml path.
Replace OPT[n] with the interface description
Do not mapped disabled optional interfaces.
Ticket #416
friendly tags
Nuke old outgoing load balancnig code
updating files to use theme imagesremoving images from /usr/local/wwwadding specific images into the correct theme directories
Merge in virtual IP codeThis changeset does the following: merges proxy arp and carp setup menus removes proxy arp menu from left side upgrades config file from 1.7 to 1.8 moves existing carp virtual IP and proxy arp config to new <virtualip> tag...
Fix bottom rounds
Change "Inbound NAT" to "Port Forward" Update _edit.php's to use diaplay_topbar()Change "Outgoing" to "Outbound" for consistency between load balancing and NAT
Apply changes is now handled in guiconfig.inc
Move more items to head (<html>, DOCTYPE)
Set page titles
Use head.inc. It's cool.
Revert last commit.
Automatically take into account multi-wan support.
interface -> interfaces
Use correct variable
ip -> ipaddr
When user turns on advanced outbound nat, automatically create rules for them.
Ticket 155
Ticket #6: Allow for NAT rule duplication (adv. outbound nat this round)
Echo out interface name when its not WAN.
This should address Ticket #32
doubleclick for editallow clicking on description for selection
Add $Id$ tag
Ensure the cell doesnt look broken by placing a non-breaking space in the cell.
missing </td>
whitespace cleanup
Merge in firewall_rules changes
comment
IPSec passthru option is finally here
spelling mistake and whitespace cleanup
We can now reorder outbound NATs (just like rules!)
More standardization
advanced nat can now do source port mapping (useful for IPSec traversal)
Add Outgoing load balancing
no message
Clarify about outbound NAT load balancing
Setup load balancing on outbound nat
Load balancing makes more sense on the outgoing tab
Convert description font color to white
Initial revision