Fixing css layout
Remove IPV6 operations.
Remove <br/> from schedule strong note.
Add a note about firewall rule schedule logic that will pop up in a new window describing how pass rules work when they are outside of the schedule window, etc.
Do not output blank gateways
Only foreach() through the object if it is an array.
This should fix the Warning: Invalid argument supplied for foreach() in /usr/local/www/firewall_rules_edit.php on line 729
Firewall Schedule GUI! ... and there was much rejoicing.
Backport IPSEC filtering to 1.0.1.
Requested and will be tested by Seth
sICMPV6/ipv6-icmp/
Notify user that reject style rules only work with the TCP protocol.
Ticket #1118
Do not allow user to select "network" and enter an alias. Alert user the item is an alias and that is should be set to "Single host or alias" option before saving.
Ticket #1090
Ticket #1052
MFC 13319Add NMAP to OS list Useful for blocking NMAP scans :)
Add entries for optional interfaces ip address
Ticket #1041
While I am nitpciking this form to all get out, move the description to the bottom where it should be.
s/gettext//
Keep state really wants to be an advanced option, too. Let him join the party.
Make other button consistent now with a -
- Show advanced options
Turn advanced option are into a default to no show area as well.
Move state timeout to advanced options row, its the same as the other options as you leave it blank for default.
Only foreach if lb pool is an array
MFCHide source and destination port boxes when protocol is not tcp, udp or tcp/udp
Convert to button so page does not shift after url being pressed
Hide Show advanced option button when user clicks on the option
MFCRequire the user to have a brain to see the Source port range for a firewall rule by adding a link in the source box that says Advanced - Show source port range.
Add missing <ul> and </ul> elements.
MFC 11098Helper -> Allow for LAN Address in rules MFC: with billm changes for next snapshot.
MFC 11097Allow for LAN Address in rules MFC: for next snapshot
Remove #!/usr/local/bin/php
Fix members
Add blurb HINT: This prevents the rule from automatically syncing to other carp memebers.
Nuke display_topbar(). Its's currently red and looks incredibly out of place. Hopefully we can add this back post 1.0
MFC 8288Add NOSYNC options to firewall rules and firewall nat outbound
MFC 7320Add interface ip option for firewall rules
unless both max-src-conn-rate and max-src-conn-rates are provided, unset the values - ticket #650
No need to strong a table
Use a table width of 90%
<br> before second note
NOTE to user that they will not enter anything here 99.99999% of the time and if they are unsure, don't enter a value here.
frags -> statetimeout
Ticket #547
(#479) GUI side workaround for multi-wan synproxy issue
Correctly restore DHCP gateway setting in firewall rule.
Ticket #480
Slightly better description of what the gateway option actually does
First Step in Fixing AutoComplete and Cleaning Up Code
Add DHCP gateways
Ticket #371
$config -> $pconfig
Use lbpool, not virtual servers
Allow selection of pools for outgoing load balanacing
add pfSense (C)
Add PPPoE options
really restrict user labels to 63 chars
server side checking that description doesn't exceed 63 characters (sincewe use it for the rule label"
Don't allow user to enter descriptions longer than 63 chars
More screens inherit rounded tabletops
Don't close <head> tag - these files use javascript inside <head>
Correctly include head.inc
Use $pgtitle instead of re-typing the page title overUse head.inc on the _edit.php files
Do not redeclare functions
Add address_to_pconfig()
Backout last commit
Add TCP Flags menu to firewall rules edit screen
Close a comment correctly
Missing "e" in "else"
No need to check for default route, this option should only override the routing tablenot make you choose per rule.
Really create a "default" gateway that doesn't override the routing table
Grab default route as a gateway, interface might be dynamic
Fix ) bug
Remove extra input box
Add support for roue-to inside each rule which allows traffic direction for multiple wan environments
Remove more duplicate code
Remove duplicate code
returngateway and friends aren't part of rules
Fix broken rules
Backend and support for allow limiting of TCP connections by establishment rateUseful for protecting against sudden outburts, etc.
Make Cancel button match the Save buttons style
Oops, remove keep fragments option - in pf this is global
Add $Id$ tag
Use the firewall interface for reply-to directive.
Save the return gateway value.
Add reply-to (aka return gateway) rule support for multiple WAN support.
And the crowd goes nuts!
Add pfsync and carp protocols
Add ICMP6 as a supported porotocol type.
Toggle OS dropdown off and on when a TCP rule is enabled or disabled.
Do not update os type unless its defined in the rule.
We can now put OS filtering in rules
clean up ICMP types
Make rules for icmp echo work
Only allow tcp rules to use alternate keep state methods
Be sure to save and restore state values.
Submitted-by: Bill Marquette <bill.marquette_AT_gmail.com>
Do not submit the form if the user presses enter in one of the textarea fields with a dropdown widget attached to it.
On input validation note that the source or destionation ports can now be aliases.
Style cleanup
Add auto_complete_helper.hs auto complete javascript helper file.