Project

General

Profile

« Previous | Next » 

Revision 1bbdab13

Added by Phil Davis over 8 years ago

Required fields for VPN pages

View differences:

src/usr/local/www/vpn_ipsec_keys_edit.php
134 134

  
135 135
$section->addInput(new Form_Input(
136 136
	'ident',
137
	'Identifier',
137
	'*Identifier',
138 138
	'text',
139 139
	$pconfig['ident']
140 140
))->setHelp('This can be either an IP address, fully qualified domain name or an e-mail address.');
141 141

  
142 142
$section->addInput(new Form_Select(
143 143
	'type',
144
	'Secret type',
144
	'*Secret type',
145 145
	$pconfig['type'],
146 146
	$ipsec_preshared_key_type
147 147
))->setWidth(2);
148 148

  
149 149
$section->addInput(new Form_Input(
150 150
	'psk',
151
	'Pre-Shared Key',
151
	'*Pre-Shared Key',
152 152
	'text',
153 153
	$pconfig['psk']
154 154
));
src/usr/local/www/vpn_ipsec_mobile.php
448 448

  
449 449
$section->addInput(new Form_Select(
450 450
	'user_source',
451
	'User Authentication',
451
	'*User Authentication',
452 452
	explode(",", $pconfig['user_source']),
453 453
	$authServers,
454 454
	true
......
456 456

  
457 457
$section->addInput(new Form_Select(
458 458
	'group_source',
459
	'Group Authentication',
459
	'*Group Authentication',
460 460
	$pconfig['group_source'],
461 461
	array(
462 462
		'none' => gettext('none'),
src/usr/local/www/vpn_ipsec_phase1.php
659 659

  
660 660
$section->addInput(new Form_Select(
661 661
	'iketype',
662
	'Key Exchange version',
662
	'*Key Exchange version',
663 663
	$pconfig['iketype'],
664 664
	array("ikev1" => "IKEv1", "ikev2" => "IKEv2", "auto" => gettext("Auto"))
665 665
))->setHelp('Select the Internet Key Exchange protocol version to be used. Auto uses IKEv2 when initiator, and accepts either IKEv1 or IKEv2 as responder.');
666 666

  
667 667
$section->addInput(new Form_Select(
668 668
	'protocol',
669
	'Internet Protocol',
669
	'*Internet Protocol',
670 670
	$pconfig['protocol'],
671 671
	array("inet" => "IPv4", "inet6" => "IPv6")
672 672
))->setHelp('Select the Internet Protocol family.');
673 673

  
674 674
$section->addInput(new Form_Select(
675 675
	'interface',
676
	'Interface',
676
	'*Interface',
677 677
	$pconfig['interface'],
678 678
	build_interface_list()
679 679
))->setHelp('Select the interface for the local endpoint of this phase1 entry.');
......
681 681
if (!$pconfig['mobile']) {
682 682
	$section->addInput(new Form_Input(
683 683
		'remotegw',
684
		'Remote Gateway',
684
		'*Remote Gateway',
685 685
		'text',
686 686
		$pconfig['remotegw']
687 687
	))->setHelp('Enter the public IP address or host name of the remote gateway.');
......
700 700

  
701 701
$section->addInput(new Form_Select(
702 702
	'authentication_method',
703
	'Authentication Method',
703
	'*Authentication Method',
704 704
	$pconfig['authentication_method'],
705 705
	build_auth_method_list()
706 706
))->setHelp('Must match the setting chosen on the remote side.');
707 707

  
708 708
$section->addInput(new Form_Select(
709 709
	'mode',
710
	'Negotiation mode',
710
	'*Negotiation mode',
711 711
	$pconfig['mode'],
712 712
	array("main" => gettext("Main"), "aggressive" => gettext("Aggressive"))
713 713
))->setHelp('Aggressive is more flexible, but less secure.');
714 714

  
715
$group = new Form_Group('My identifier');
715
$group = new Form_Group('*My identifier');
716 716

  
717 717
$group->add(new Form_Select(
718 718
	'myid_type',
......
730 730

  
731 731
$section->add($group);
732 732

  
733
$group = new Form_Group('Peer identifier');
733
$group = new Form_Group('*Peer identifier');
734 734
$group->addClass('peeridgroup');
735 735

  
736 736
$group->add(new Form_Select(
......
755 755

  
756 756
$section->addInput(new Form_Input(
757 757
	'pskey',
758
	'Pre-Shared Key',
758
	'*Pre-Shared Key',
759 759
	'text',
760 760
	$pconfig['pskey']
761 761
))->setHelp('Enter the Pre-Shared Key string.');
762 762

  
763 763
$section->addInput(new Form_Select(
764 764
	'certref',
765
	'My Certificate',
765
	'*My Certificate',
766 766
	$pconfig['certref'],
767 767
	build_cert_list()
768 768
))->setHelp('Select a certificate previously configured in the Certificate Manager.');
769 769

  
770 770
$section->addInput(new Form_Select(
771 771
	'caref',
772
	'Peer Certificate Authority',
772
	'*Peer Certificate Authority',
773 773
	$pconfig['caref'],
774 774
	build_ca_list()
775 775
))->setHelp('Select a certificate authority previously configured in the Certificate Manager.');
......
778 778

  
779 779
$section = new Form_Section('Phase 1 Proposal (Algorithms)');
780 780

  
781
$group = new Form_Group('Encryption Algorithm');
781
$group = new Form_Group('*Encryption Algorithm');
782 782

  
783 783
$group->add(new Form_Select(
784 784
	'ealgo',
......
798 798

  
799 799
$section->addInput(new Form_Select(
800 800
	'halgo',
801
	'Hash Algorithm',
801
	'*Hash Algorithm',
802 802
	$pconfig['halgo'],
803 803
	$p1_halgos
804 804
))->setHelp('Must match the setting chosen on the remote side.');
805 805

  
806 806
$section->addInput(new Form_Select(
807 807
	'dhgroup',
808
	'DH Group',
808
	'*DH Group',
809 809
	$pconfig['dhgroup'],
810 810
	$p1_dhgroups
811 811
))->setHelp('Must match the setting chosen on the remote side.');
812 812

  
813 813
$section->addInput(new Form_Input(
814 814
	'lifetime',
815
	'Lifetime (Seconds)',
815
	'*Lifetime (Seconds)',
816 816
	'number',
817 817
	$pconfig['lifetime']
818 818
));
src/usr/local/www/vpn_ipsec_phase2.php
503 503

  
504 504
$section->addInput(new Form_Select(
505 505
	'mode',
506
	'Mode',
506
	'*Mode',
507 507
	$pconfig['mode'],
508 508
	$p2_modes
509 509
));
510 510

  
511
$group = new Form_Group('Local Network');
511
$group = new Form_Group('*Local Network');
512 512
$group->addClass('opt_localid');
513 513

  
514 514
$subnetarray = get_configured_interface_with_descr();
......
559 559
$section->add($group);
560 560

  
561 561
if (!isset($pconfig['mobile'])) {
562
	$group = new Form_Group('Remote Network');
562
	$group = new Form_Group('*Remote Network');
563 563
	$group->addClass('opt_remoteid');
564 564

  
565 565
	$group->add(new Form_Select(
......
591 591

  
592 592
$section->addInput(new Form_Select(
593 593
	'proto',
594
	'Protocol',
594
	'*Protocol',
595 595
	$pconfig['proto'],
596 596
	$p2_protos
597 597
))->setHelp('ESP is encryption, AH is authentication only.');
......
600 600
$rows = count($p2_ealgos) - 1;
601 601

  
602 602
foreach ($p2_ealgos as $algo => $algodata) {
603
	$group = new Form_Group($i == 0 ? 'Encryption Algorithms':'');
603
	$group = new Form_Group($i == 0 ? '*Encryption Algorithms':'');
604 604
	$group->addClass('encalg');
605 605

  
606 606
	// Note: ID attribute of each element created is to be unique.  Not being used, suppressing it.
......
638 638
	$section->add($group);
639 639
}
640 640

  
641
$group = new Form_Group('Hash Algorithms');
641
$group = new Form_Group('*Hash Algorithms');
642 642

  
643 643
foreach ($p2_halgos as $algo => $algoname) {
644 644
	// Note: ID attribute of each element created is to be unique.  Not being used, suppressing it.
src/usr/local/www/vpn_l2tp.php
208 208

  
209 209
$section->addInput(new Form_Select(
210 210
	'interface',
211
	'Interface',
211
	'*Interface',
212 212
	$pconfig['interface'],
213 213
	$iflist
214 214
));
215 215

  
216 216
$section->addInput(new Form_Input(
217 217
	'localip',
218
	'Server address',
218
	'*Server address',
219 219
	'text',
220 220
	$pconfig['localip']
221 221
))->setHelp('Enter the IP address the L2TP server should give to clients for use as their "gateway". ' . '<br />' .
......
224 224

  
225 225
$section->addInput(new Form_IpAddress(
226 226
	'remoteip',
227
	'Remote address range',
227
	'*Remote address range',
228 228
	$pconfig['remoteip']
229 229
))->addMask(l2tp_subnet, $pconfig['l2tp_subnet'])
230 230
  ->setHelp('Specify the starting address for the client IP address subnet.');
231 231

  
232 232
$section->addInput(new Form_Select(
233 233
	'n_l2tp_units',
234
	'Number of L2TP users',
234
	'*Number of L2TP users',
235 235
	$pconfig['n_l2tp_units'],
236 236
	array_combine(range(1, 255, 1), range(1, 255, 1))
237 237
));
......
245 245

  
246 246
$section->addInput(new Form_Select(
247 247
	'paporchap',
248
	'Authentication type',
248
	'*Authentication type',
249 249
	$pconfig['paporchap'],
250 250
	array(
251 251
		'chap' => 'CHAP',
......
289 289

  
290 290
$section->addInput(new Form_IpAddress(
291 291
	'radiusserver',
292
	'Server',
292
	'*Server',
293 293
	$pconfig['radiusserver']
294 294
))->setHelp('Enter the IP address of the RADIUS server.');
295 295

  
296 296
$section->addPassword(new Form_Input(
297 297
	'radiussecret',
298
	'Secret',
298
	'*Secret',
299 299
	'password',
300 300
	$pconfig['radiussecret']
301 301
))->setHelp('Enter the shared secret that will be used to authenticate to the RADIUS server.');
src/usr/local/www/vpn_l2tp_users_edit.php
62 62
if (isset($id) && $a_secret[$id]) {
63 63
	$pconfig['usernamefld'] = $a_secret[$id]['name'];
64 64
	$pconfig['ip'] = $a_secret[$id]['ip'];
65
	$pwd_required = "";
66
} else {
67
	$pwd_required = "*";
65 68
}
66 69

  
67 70
if ($_POST) {
......
147 150

  
148 151
$section->addInput(new Form_Input(
149 152
	'usernamefld',
150
	'Username',
153
	'*Username',
151 154
	'text',
152 155
	$pconfig['usernamefld']
153 156
));
154 157

  
155 158
$pwd = new Form_Input(
156 159
	'passwordfld',
157
	'Password',
160
	$pwd_required . 'Password',
158 161
	'text',
159 162
	$pconfig['passwordfld']
160 163
);
src/usr/local/www/vpn_openvpn_client.php
492 492

  
493 493
	$section->addInput(new Form_Select(
494 494
		'mode',
495
		'Server mode',
495
		'*Server mode',
496 496
		$pconfig['mode'],
497 497
		$openvpn_client_modes
498 498
		));
499 499

  
500 500
	$section->addInput(new Form_Select(
501 501
		'protocol',
502
		'Protocol',
502
		'*Protocol',
503 503
		$pconfig['protocol'],
504 504
		$openvpn_prots
505 505
		));
506 506

  
507 507
	$section->addInput(new Form_Select(
508 508
		'dev_mode',
509
		'Device mode',
509
		'*Device mode',
510 510
		empty($pconfig['dev_mode']) ? 'tun':$pconfig['dev_mode'],
511 511
		$openvpn_dev_mode
512 512
		))->setHelp("\"tun\" mode carries IPv4 and IPv6 (OSI layer 3) and is the most common and compatible mode across all platforms." .
......
514 514

  
515 515
	$section->addInput(new Form_Select(
516 516
		'interface',
517
		'Interface',
517
		'*Interface',
518 518
		$pconfig['interface'],
519 519
		openvpn_build_if_list()
520 520
		))->setHelp("The interface used by the firewall to originate this OpenVPN client connection");
......
529 529

  
530 530
	$section->addInput(new Form_Input(
531 531
		'server_addr',
532
		'Server host or address',
532
		'*Server host or address',
533 533
		'text',
534 534
		$pconfig['server_addr']
535 535
	))->setHelp("The IP address or hostname of the OpenVPN server.");
......
544 544

  
545 545
	$section->addInput(new Form_Input(
546 546
		'server_port',
547
		'Server port',
547
		'*Server port',
548 548
		'number',
549 549
		$pconfig['server_port']
550 550
	))->setHelp("The port used by the server to receive client connections.");
......
634 634

  
635 635
	$section->addInput(new Form_Textarea(
636 636
		'tls',
637
		'TLS Key',
637
		'*TLS Key',
638 638
		$pconfig['tls']
639 639
	))->setHelp("Paste the TLS key here." .
640 640
	    "<br/>" .
......
642 642

  
643 643
	$section->addInput(new Form_Select(
644 644
		'tls_type',
645
		'TLS Key Usage Mode',
645
		'*TLS Key Usage Mode',
646 646
		empty($pconfig['tls_type']) ? 'auth':$pconfig['tls_type'],
647 647
		$openvpn_tls_modes
648 648
		))->setHelp("In Authentication mode the TLS key is used only as HMAC authentication for the control channel, protecting the peers from unauthorized connections. " .
......
657 657

  
658 658
		$section->addInput(new Form_Select(
659 659
			'caref',
660
			'Peer Certificate Authority',
660
			'*Peer Certificate Authority',
661 661
			$pconfig['caref'],
662 662
			$list
663 663
		));
664 664
	} else {
665 665
		$section->addInput(new Form_StaticText(
666
			'Peer Certificate Authority',
666
			'*Peer Certificate Authority',
667 667
			sprintf('No Certificate Authorities defined. One may be created here: %s', '<a href="system_camanager.php">System &gt; Cert. Manager</a>')
668 668
		));
669 669
	}
......
691 691

  
692 692
	$section->addInput(new Form_Textarea(
693 693
		'shared_key',
694
		'Shared Key',
694
		'*Shared Key',
695 695
		$pconfig['shared_key']
696 696
	))->setHelp('Paste the shared key here');
697 697

  
......
706 706

  
707 707
	$section->addInput(new Form_Select(
708 708
		'crypto',
709
		'Encryption Algorithm',
709
		'*Encryption Algorithm',
710 710
		$pconfig['crypto'],
711 711
		openvpn_get_cipherlist()
712 712
		))->setHelp('The Encryption Algorithm used for data channel packets when Negotiable Cryptographic Parameter (NCP) support is not available.');
......
745 745
	  ->setAttribute('size', '10')
746 746
	  ->setHelp('Allowed NCP Encryption Algorithms. Click an algorithm name to remove it from the list');
747 747

  
748
	$group->setHelp(		'The order of the selected NCP Encryption Algorithms is respected by OpenVPN.' .
748
	$group->setHelp('The order of the selected NCP Encryption Algorithms is respected by OpenVPN.' .
749 749
					'<div class="infoblock">' . sprint_info_box(
750 750
					'For backward compatibility, when an older peer connects that does not support NCP, OpenVPN will use the Encryption Algorithm ' .
751 751
					'requested by the peer so long as it is selected in this list or chosen as the Encryption Algorithm.', 'info', false) .
......
755 755

  
756 756
	$section->addInput(new Form_Select(
757 757
		'digest',
758
		'Auth digest algorithm',
758
		'*Auth digest algorithm',
759 759
		$pconfig['digest'],
760 760
		openvpn_get_digestlist()
761 761
		))->setHelp('The algorithm used to authenticate data channel packets, and control channel packets if a TLS Key is present.' .
src/usr/local/www/vpn_openvpn_csc.php
339 339

  
340 340
	$section->addInput(new Form_Input(
341 341
		'common_name',
342
		'Common Name',
342
		'*Common Name',
343 343
		'text',
344 344
		$pconfig['common_name']
345 345
	))->setHelp('Enter the X.509 common name for the client certificate, or the username for VPNs utilizing password authentication. This match is case sensitive.');
src/usr/local/www/vpn_openvpn_server.php
677 677

  
678 678
	$section->addInput(new Form_Select(
679 679
		'mode',
680
		'Server mode',
680
		'*Server mode',
681 681
		$pconfig['mode'],
682 682
		openvpn_build_mode_list()
683 683
		));
......
703 703

  
704 704
	$section->addInput(new Form_Select(
705 705
		'authmode',
706
		'Backend for authentication',
706
		'*Backend for authentication',
707 707
		$authmodes,
708 708
		$options,
709 709
		true
......
711 711

  
712 712
	$section->addInput(new Form_Select(
713 713
		'protocol',
714
		'Protocol',
714
		'*Protocol',
715 715
		$pconfig['protocol'],
716 716
		$openvpn_prots
717 717
		));
718 718

  
719 719
	$section->addInput(new Form_Select(
720 720
		'dev_mode',
721
		'Device mode',
721
		'*Device mode',
722 722
		empty($pconfig['dev_mode']) ? 'tun':$pconfig['dev_mode'],
723 723
		$openvpn_dev_mode
724 724
		))->setHelp("\"tun\" mode carries IPv4 and IPv6 (OSI layer 3) and is the most common and compatible mode across all platforms." .
......
726 726

  
727 727
	$section->addInput(new Form_Select(
728 728
		'interface',
729
		'Interface',
729
		'*Interface',
730 730
		$pconfig['interface'],
731 731
		openvpn_build_if_list()
732 732
		))->setHelp("The interface or Virtual IP address where OpenVPN will receive client connections.");
733 733

  
734 734
	$section->addInput(new Form_Input(
735 735
		'local_port',
736
		'Local port',
736
		'*Local port',
737 737
		'number',
738 738
		$pconfig['local_port'],
739 739
		['min' => '0']
......
770 770

  
771 771
	$section->addInput(new Form_Textarea(
772 772
		'tls',
773
		'TLS Key',
773
		'*TLS Key',
774 774
		$pconfig['tls']
775 775
	))->setHelp("Paste the TLS key here." .
776 776
	    "<br/>" .
......
778 778

  
779 779
	$section->addInput(new Form_Select(
780 780
		'tls_type',
781
		'TLS Key Usage Mode',
781
		'*TLS Key Usage Mode',
782 782
		empty($pconfig['tls_type']) ? 'auth':$pconfig['tls_type'],
783 783
		$openvpn_tls_modes
784 784
		))->setHelp("In Authentication mode the TLS key is used only as HMAC authentication for the control channel, protecting the peers from unauthorized connections. " .
......
794 794

  
795 795
		$section->addInput(new Form_Select(
796 796
			'caref',
797
			'Peer Certificate Authority',
797
			'*Peer Certificate Authority',
798 798
			$pconfig['caref'],
799 799
			$list
800 800
		));
801 801
	} else {
802 802
		$section->addInput(new Form_StaticText(
803
			'Peer Certificate Authority',
803
			'*Peer Certificate Authority',
804 804
			sprintf('No Certificate Authorities defined. One may be created here: %s', '<a href="system_camanager.php">System &gt; Cert. Manager</a>')
805 805
		));
806 806
	}
......
839 839

  
840 840
	$section->addInput(new Form_Select(
841 841
		'certref',
842
		'Server certificate',
842
		'*Server certificate',
843 843
		$pconfig['certref'],
844 844
		$cl['server'] + $cl['non-server']
845 845
		))->setHelp($certhelp);
846 846

  
847 847
	$section->addInput(new Form_Select(
848 848
		'dh_length',
849
		'DH Parameter Length',
849
		'*DH Parameter Length',
850 850
		$pconfig['dh_length'],
851 851
		$openvpn_dh_lengths
852 852
		))->setHelp('Diffie-Hellman (DH) parameter set used for key exchange.' .
......
879 879

  
880 880
	$section->addInput(new Form_Textarea(
881 881
		'shared_key',
882
		'Shared Key',
882
		'*Shared Key',
883 883
		$pconfig['shared_key']
884 884
	))->setHelp('Paste the shared key here');
885 885

  
886 886
	$section->addInput(new Form_Select(
887 887
		'crypto',
888
		'Encryption Algorithm',
888
		'*Encryption Algorithm',
889 889
		$pconfig['crypto'],
890 890
		openvpn_get_cipherlist()
891 891
		))->setHelp('The Encryption Algorithm used for data channel packets when Negotiable Cryptographic Parameter (NCP) support is not available.');
......
921 921
	  ->setAttribute('size', '10')
922 922
	  ->setHelp('Allowed NCP Encryption Algorithms. Click an algorithm name to remove it from the list');
923 923

  
924
	$group->setHelp(		'The order of the selected NCP Encryption Algorithms is respected by OpenVPN.' .
924
	$group->setHelp('The order of the selected NCP Encryption Algorithms is respected by OpenVPN.' .
925 925
					'<div class="infoblock">' . sprint_info_box(
926 926
					'For backward compatibility, when an older peer connects that does not support NCP, OpenVPN will use the Encryption Algorithm ' .
927 927
					'requested by the peer so long as it is selected in this list or chosen as the Encryption Algorithm.', 'info', false) .
......
931 931

  
932 932
	$section->addInput(new Form_Select(
933 933
		'digest',
934
		'Auth digest algorithm',
934
		'*Auth digest algorithm',
935 935
		$pconfig['digest'],
936 936
		openvpn_get_digestlist()
937 937
		))->setHelp('The algorithm used to authenticate data channel packets, and control channel packets if a TLS Key is present.' .
......
949 949

  
950 950
	$section->addInput(new Form_Select(
951 951
		'cert_depth',
952
		'Certificate Depth',
952
		'*Certificate Depth',
953 953
		$pconfig['cert_depth'],
954 954
		["" => gettext("Do Not Check")] + $openvpn_cert_depths
955 955
		))->setHelp('When a certificate-based client logs in, do not accept certificates below this depth. ' .
......
1640 1640
				hideInput('serverbridge_interface', true);
1641 1641
				hideInput('serverbridge_dhcp_start', true);
1642 1642
				hideInput('serverbridge_dhcp_end', true);
1643
				setRequired('tunnel_network', true);
1643 1644
				if (sharedkey) {
1644 1645
					hideInput('local_network', true);
1645 1646
					hideInput('local_networkv6', true);
......
1655 1656

  
1656 1657
			case "tap":
1657 1658
				hideInput('tunnel_network', false);
1659
				setRequired('tunnel_network', false);
1658 1660

  
1659 1661
				if (!p2p) {
1660 1662
					hideCheckbox('serverbridge_dhcp', false);

Also available in: Unified diff