Project

General

Profile

Download (40.7 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/* $Id$ */
3
/*
4
	firewall_nat_edit.php
5
	part of m0n0wall (http://m0n0.ch/wall)
6

    
7
	Copyright (C) 2003-2004 Manuel Kasper <mk@neon1.net>.
8
	All rights reserved.
9

    
10
	Redistribution and use in source and binary forms, with or without
11
	modification, are permitted provided that the following conditions are met:
12

    
13
	1. Redistributions of source code must retain the above copyright notice,
14
	   this list of conditions and the following disclaimer.
15

    
16
	2. Redistributions in binary form must reproduce the above copyright
17
	   notice, this list of conditions and the following disclaimer in the
18
	   documentation and/or other materials provided with the distribution.
19

    
20
	THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
21
	INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
22
	AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
23
	AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
24
	OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25
	SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26
	INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27
	CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28
	ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29
	POSSIBILITY OF SUCH DAMAGE.
30
*/
31
/*
32
	pfSense_MODULE:	nat
33
*/
34

    
35
##|+PRIV
36
##|*IDENT=page-firewall-nat-portforward-edit
37
##|*NAME=Firewall: NAT: Port Forward: Edit page
38
##|*DESCR=Allow access to the 'Firewall: NAT: Port Forward: Edit' page.
39
##|*MATCH=firewall_nat_edit.php*
40
##|-PRIV
41

    
42
require("guiconfig.inc");
43
require_once("itemid.inc");
44
require("filter.inc");
45
require("shaper.inc");
46

    
47
$specialsrcdst = explode(" ", "any pptp pppoe l2tp openvpn");
48
$ifdisp = get_configured_interface_with_descr();
49
foreach ($ifdisp as $kif => $kdescr) {
50
	$specialsrcdst[] = "{$kif}";
51
	$specialsrcdst[] = "{$kif}ip";
52
}
53

    
54
if (!is_array($config['nat']['rule'])) {
55
	$config['nat']['rule'] = array();
56
}
57
$a_nat = &$config['nat']['rule'];
58

    
59
$id = $_GET['id'];
60
if (isset($_POST['id']))
61
	$id = $_POST['id'];
62

    
63
if (isset($_GET['dup'])) {
64
        $id = $_GET['dup'];
65
        $after = $_GET['dup'];
66
}
67

    
68
if (isset($id) && $a_nat[$id]) {
69
	$pconfig['disabled'] = isset($a_nat[$id]['disabled']);
70
	$pconfig['nordr'] = isset($a_nat[$id]['nordr']);
71

    
72
	address_to_pconfig($a_nat[$id]['source'], $pconfig['src'],
73
		$pconfig['srcmask'], $pconfig['srcnot'],
74
		$pconfig['srcbeginport'], $pconfig['srcendport']);
75

    
76
	address_to_pconfig($a_nat[$id]['destination'], $pconfig['dst'],
77
		$pconfig['dstmask'], $pconfig['dstnot'],
78
		$pconfig['dstbeginport'], $pconfig['dstendport']);
79

    
80
	$pconfig['proto'] = $a_nat[$id]['protocol'];
81
	$pconfig['localip'] = $a_nat[$id]['target'];
82
	$pconfig['localbeginport'] = $a_nat[$id]['local-port'];
83
	$pconfig['descr'] = $a_nat[$id]['descr'];
84
	$pconfig['interface'] = $a_nat[$id]['interface'];
85
	$pconfig['associated-rule-id'] = $a_nat[$id]['associated-rule-id'];
86
	$pconfig['nosync'] = isset($a_nat[$id]['nosync']);
87
	$pconfig['natreflection'] = $a_nat[$id]['natreflection'];
88

    
89
	if (!$pconfig['interface'])
90
		$pconfig['interface'] = "wan";
91
} else {
92
	$pconfig['interface'] = "wan";
93
	$pconfig['src'] = "any";
94
	$pconfig['srcbeginport'] = "any";
95
	$pconfig['srcendport'] = "any";
96
}
97

    
98
if (isset($_GET['dup']))
99
	unset($id);
100

    
101
/*  run through $_POST items encoding HTML entties so that the user
102
 *  cannot think he is slick and perform a XSS attack on the unwilling
103
 */
104
unset($input_errors);
105
foreach ($_POST as $key => $value) {
106
	$temp = $value;
107
	$newpost = htmlentities($temp);
108
	if($newpost <> $temp)
109
		$input_errors[] = sprintf(gettext("Invalid characters detected %s. Please remove invalid characters and save again."), $temp);
110
}
111

    
112
if ($_POST) {
113

    
114
	if(strtoupper($_POST['proto']) == "TCP" || strtoupper($_POST['proto']) == "UDP" || strtoupper($_POST['proto']) == "TCP/UDP") {
115
		if ($_POST['srcbeginport_cust'] && !$_POST['srcbeginport'])
116
			$_POST['srcbeginport'] = $_POST['srcbeginport_cust'];
117
		if ($_POST['srcendport_cust'] && !$_POST['srcendport'])
118
			$_POST['srcendport'] = $_POST['srcendport_cust'];
119

    
120
		if ($_POST['srcbeginport'] == "any") {
121
			$_POST['srcbeginport'] = 0;
122
			$_POST['srcendport'] = 0;
123
		} else {
124
			if (!$_POST['srcendport'])
125
				$_POST['srcendport'] = $_POST['srcbeginport'];
126
		}
127
		if ($_POST['srcendport'] == "any")
128
			$_POST['srcendport'] = $_POST['srcbeginport'];
129

    
130
		if ($_POST['dstbeginport_cust'] && !$_POST['dstbeginport'])
131
			$_POST['dstbeginport'] = $_POST['dstbeginport_cust'];
132
		if ($_POST['dstendport_cust'] && !$_POST['dstendport'])
133
			$_POST['dstendport'] = $_POST['dstendport_cust'];
134

    
135
		if ($_POST['dstbeginport'] == "any") {
136
			$_POST['dstbeginport'] = 0;
137
			$_POST['dstendport'] = 0;
138
		} else {
139
			if (!$_POST['dstendport'])
140
				$_POST['dstendport'] = $_POST['dstbeginport'];
141
		}
142
		if ($_POST['dstendport'] == "any")
143
			$_POST['dstendport'] = $_POST['dstbeginport'];
144

    
145
		if ($_POST['localbeginport_cust'] && !$_POST['localbeginport'])
146
			$_POST['localbeginport'] = $_POST['localbeginport_cust'];
147

    
148
		/* Make beginning port end port if not defined and endport is */
149
		if (!$_POST['srcbeginport'] && $_POST['srcendport'])
150
			$_POST['srcbeginport'] = $_POST['srcendport'];
151
		if (!$_POST['dstbeginport'] && $_POST['dstendport'])
152
			$_POST['dstbeginport'] = $_POST['dstendport'];
153
	} else {
154
		$_POST['srcbeginport'] = 0;
155
		$_POST['srcendport'] = 0;
156
		$_POST['dstbeginport'] = 0;
157
		$_POST['dstendport'] = 0;
158
	}
159

    
160
	if (is_specialnet($_POST['srctype'])) {
161
		$_POST['src'] = $_POST['srctype'];
162
		$_POST['srcmask'] = 0;
163
	} else if ($_POST['srctype'] == "single") {
164
		$_POST['srcmask'] = 32;
165
	}
166
	if (is_specialnet($_POST['dsttype'])) {
167
		$_POST['dst'] = $_POST['dsttype'];
168
		$_POST['dstmask'] = 0;
169
	} else if ($_POST['dsttype'] == "single") {
170
		$_POST['dstmask'] = 32;
171
	} else if (is_ipaddr($_POST['dsttype'])) {
172
		$_POST['dst'] = $_POST['dsttype'];
173
		$_POST['dstmask'] = 32;
174
		$_POST['dsttype'] = "single";
175
	}
176

    
177
	$pconfig = $_POST;
178

    
179
	/* input validation */
180
	if(strtoupper($_POST['proto']) == "TCP" or strtoupper($_POST['proto']) == "UDP" or strtoupper($_POST['proto']) == "TCP/UDP") {
181
		$reqdfields = explode(" ", "interface proto dstbeginport dstendport");
182
		$reqdfieldsn = array(gettext("Interface"),gettext("Protocol"),gettext("Destination port from"),gettext("Destination port to"));
183
	} else {
184
		$reqdfields = explode(" ", "interface proto");
185
		$reqdfieldsn = array(gettext("Interface"),gettext("Protocol"));
186
	}
187

    
188
	if ($_POST['srctype'] == "single" || $_POST['srctype'] == "network") {
189
		$reqdfields[] = "src";
190
		$reqdfieldsn[] = gettext("Source address");
191
	}
192
	if ($_POST['dsttype'] == "single" || $_POST['dsttype'] == "network") {
193
		$reqdfields[] = "dst";
194
		$reqdfieldsn[] = gettext("Destination address");
195
	}
196
	if (!isset($_POST['nordr'])) {
197
		$reqdfields[] = "localip";
198
		$reqdfieldsn[] = gettext("Redirect target IP");
199
	}
200

    
201
	do_input_validation($_POST, $reqdfields, $reqdfieldsn, &$input_errors);
202

    
203
	if (!$_POST['srcbeginport']) {
204
		$_POST['srcbeginport'] = 0;
205
		$_POST['srcendport'] = 0;
206
	}
207
	if (!$_POST['dstbeginport']) {
208
		$_POST['dstbeginport'] = 0;
209
		$_POST['dstendport'] = 0;
210
	}
211

    
212
	if (!isset($_POST['nordr']) && ($_POST['localip'] && !is_ipaddroralias($_POST['localip']))) {
213
		$input_errors[] = sprintf(gettext("\"%s\" is not a valid redirect target IP address or host alias."), $_POST['localip']);
214
	}
215

    
216
	if ($_POST['srcbeginport'] && !is_portoralias($_POST['srcbeginport']))
217
		$input_errors[] = sprintf(gettext("%s is not a valid start source port. It must be a port alias or integer between 1 and 65535."), $_POST['srcbeginport']);
218
	if ($_POST['srcendport'] && !is_portoralias($_POST['srcendport']))
219
		$input_errors[] = sprintf(gettext("%s is not a valid end source port. It must be a port alias or integer between 1 and 65535."), $_POST['srcendport']);
220
	if ($_POST['dstbeginport'] && !is_portoralias($_POST['dstbeginport']))
221
		$input_errors[] = sprintf(gettext("%s is not a valid start destination port. It must be a port alias or integer between 1 and 65535."), $_POST['dstbeginport']);
222
	if ($_POST['dstendport'] && !is_portoralias($_POST['dstendport']))
223
		$input_errors[] = sprintf(gettext("%s is not a valid end destination port. It must be a port alias or integer between 1 and 65535."), $_POST['dstendport']);
224

    
225
	if (!isset($_POST['nordr']) && !is_portoralias($_POST['localbeginport'])) {
226
		$input_errors[] = sprintf(gettext("A valid local port must be specified. It must be a port alias or integer between 1 and 65535."), $_POST['localbeginport']);
227
	}
228

    
229
	/* if user enters an alias and selects "network" then disallow. */
230
	if( ($_POST['srctype'] == "network" && is_alias($_POST['src']) ) 
231
	 || ($_POST['dsttype'] == "network" && is_alias($_POST['dst']) ) ) {
232
		$input_errors[] = gettext("You must specify single host or alias for alias entries.");
233
	}
234

    
235
	if (!is_specialnet($_POST['srctype'])) {
236
		if (($_POST['src'] && !is_ipaddroralias($_POST['src']))) {
237
			$input_errors[] = sprintf(gettext("%s is not a valid source IP address or alias."), $_POST['src']);
238
		}
239
		if (($_POST['srcmask'] && !is_numericint($_POST['srcmask']))) {
240
			$input_errors[] = gettext("A valid source bit count must be specified.");
241
		}
242
	}
243
	if (!is_specialnet($_POST['dsttype'])) {
244
		if (($_POST['dst'] && !is_ipaddroralias($_POST['dst']))) {
245
			$input_errors[] = sprintf(gettext("%s is not a valid destination IP address or alias."), $_POST['dst']);
246
		}
247
		if (($_POST['dstmask'] && !is_numericint($_POST['dstmask']))) {
248
			$input_errors[] = gettext("A valid destination bit count must be specified.");
249
		}
250
	}
251

    
252
	if ($_POST['srcbeginport'] > $_POST['srcendport']) {
253
		/* swap */
254
		$tmp = $_POST['srcendport'];
255
		$_POST['srcendport'] = $_POST['srcbeginport'];
256
		$_POST['srcbeginport'] = $tmp;
257
	}
258
	if ($_POST['dstbeginport'] > $_POST['dstendport']) {
259
		/* swap */
260
		$tmp = $_POST['dstendport'];
261
		$_POST['dstendport'] = $_POST['dstbeginport'];
262
		$_POST['dstbeginport'] = $tmp;
263
	}
264

    
265
	if (!$input_errors) {
266
		if (!isset($_POST['nordr']) && ($_POST['dstendport'] - $_POST['dstbeginport'] + $_POST['localbeginport']) > 65535)
267
			$input_errors[] = gettext("The target port range must be an integer between 1 and 65535.");
268
	}
269

    
270
	/* check for overlaps */
271
	foreach ($a_nat as $natent) {
272
		if (isset($id) && ($a_nat[$id]) && ($a_nat[$id] === $natent))
273
			continue;
274
		if ($natent['interface'] != $_POST['interface'])
275
			continue;
276
		if ($natent['destination']['address'] != $_POST['dst'])
277
			continue;
278
		if (($natent['proto'] != $_POST['proto']) && ($natent['proto'] != "tcp/udp") && ($_POST['proto'] != "tcp/udp"))
279
			continue;
280

    
281
		list($begp,$endp) = explode("-", $natent['destination']['port']);
282
		if (!$endp)
283
			$endp = $begp;
284

    
285
		if (!(   (($_POST['beginport'] < $begp) && ($_POST['endport'] < $begp))
286
		      || (($_POST['beginport'] > $endp) && ($_POST['endport'] > $endp)))) {
287

    
288
			$input_errors[] = gettext("The destination port range overlaps with an existing entry.");
289
			break;
290
		}
291
	}
292

    
293
	// Allow extending of the firewall edit page and include custom input validation 
294
	pfSense_handle_custom_code("/usr/local/pkg/firewall_nat/input_validation");
295

    
296
	if (!$input_errors) {
297
		$natent = array();
298

    
299
		$natent['disabled'] = isset($_POST['disabled']) ? true:false;
300
		$natent['nordr'] = isset($_POST['nordr']) ? true:false;
301

    
302
		if ($natent['nordr']) {
303
			$_POST['associated-rule-id'] = '';
304
			$_POST['filter-rule-association'] = '';
305
		}
306

    
307
		pconfig_to_address($natent['source'], $_POST['src'],
308
			$_POST['srcmask'], $_POST['srcnot'],
309
			$_POST['srcbeginport'], $_POST['srcendport']);
310

    
311
		pconfig_to_address($natent['destination'], $_POST['dst'],
312
			$_POST['dstmask'], $_POST['dstnot'],
313
			$_POST['dstbeginport'], $_POST['dstendport']);
314

    
315
		$natent['protocol'] = $_POST['proto'];
316

    
317
		if (!$natent['nordr']) {
318
			$natent['target'] = $_POST['localip'];
319
			$natent['local-port'] = $_POST['localbeginport'];
320
		}
321
		$natent['interface'] = $_POST['interface'];
322
		$natent['descr'] = $_POST['descr'];
323
		$natent['associated-rule-id'] = $_POST['associated-rule-id'];
324

    
325
		if($_POST['filter-rule-association'] == "pass")
326
			$natent['associated-rule-id'] = "pass";
327

    
328
		if($_POST['nosync'] == "yes")
329
			$natent['nosync'] = true;
330
		else
331
			unset($natent['nosync']);
332

    
333
		if ($_POST['natreflection'] == "enable" || $_POST['natreflection'] == "purenat" || $_POST['natreflection'] == "disable")
334
			$natent['natreflection'] = $_POST['natreflection'];
335
		else
336
			unset($natent['natreflection']);
337

    
338
		// If we used to have an associated filter rule, but no-longer should have one
339
		if (!empty($a_nat[$id]) && ( empty($natent['associated-rule-id']) || $natent['associated-rule-id'] != $a_nat[$id]['associated-rule-id'] ) ) {
340
			// Delete the previous rule
341
			delete_id($a_nat[$id]['associated-rule-id'], $config['filter']['rule']);
342
			mark_subsystem_dirty('filter');
343
		}
344

    
345
		$need_filter_rule = false;
346
		// Updating a rule with a filter rule associated
347
		if (!empty($natent['associated-rule-id']))
348
			$need_filter_rule = true;
349
		// Create a rule or if we want to create a new one
350
		if( $natent['associated-rule-id']=='new' ) {
351
			$need_filter_rule = true;
352
			unset( $natent['associated-rule-id'] );
353
			$_POST['filter-rule-association']='add-associated';
354
		}
355
		// If creating a new rule, where we want to add the filter rule, associated or not
356
		else if( isset($_POST['filter-rule-association']) &&
357
			($_POST['filter-rule-association']=='add-associated' ||
358
			$_POST['filter-rule-association']=='add-unassociated') )
359
			$need_filter_rule = true;
360

    
361
		// Determine NAT entry ID now, we need it for the firewall rule
362
		if (isset($id) && $a_nat[$id])
363
			$a_nat[$id] = $natent;
364
		else {
365
			if (is_numeric($after))
366
				$id = $after + 1;
367
			else
368
				$id = count($a_nat);
369
		}
370

    
371
		if ($need_filter_rule == true) {
372

    
373
			/* auto-generate a matching firewall rule */
374
			$filterent = array();
375
			unset($filterentid);
376
			// If a rule already exists, load it
377
			if (!empty($natent['associated-rule-id'])) {
378
				$filterentid = get_id($natent['associated-rule-id'], $config['filter']['rule']);
379
				if ($filterentid == false)
380
					$filterent['associated-rule-id'] = $natent['associated-rule-id'];
381
				else
382
					$filterent =& $config['filter']['rule'][$filterentid];
383
			}
384
			pconfig_to_address($filterent['source'], $_POST['src'],
385
				$_POST['srcmask'], $_POST['srcnot'],
386
				$_POST['srcbeginport'], $_POST['srcendport']);
387

    
388
			// Update interface, protocol and destination
389
			$filterent['interface'] = $_POST['interface'];
390
			$filterent['protocol'] = $_POST['proto'];
391
			$filterent['destination']['address'] = $_POST['localip'];
392

    
393
			$dstpfrom = $_POST['localbeginport'];
394
			$dstpto = $dstpfrom + $_POST['dstendport'] - $_POST['dstbeginport'];
395

    
396
			if ($dstpfrom == $dstpto)
397
				$filterent['destination']['port'] = $dstpfrom;
398
			else
399
				$filterent['destination']['port'] = $dstpfrom . "-" . $dstpto;
400

    
401
			/*
402
			 * Our firewall filter description may be no longer than
403
			 * 63 characters, so don't let it be.
404
			 */
405
			$filterent['descr'] = substr("NAT " . $_POST['descr'], 0, 62);
406

    
407
			// If this is a new rule, create an ID and add the rule
408
			if( $_POST['filter-rule-association']=='add-associated' ) {
409
				$filterent['associated-rule-id'] = $natent['associated-rule-id'] = get_unique_id();
410
				$config['filter']['rule'][] = $filterent;
411
			}
412

    
413
			mark_subsystem_dirty('filter');
414
		}
415

    
416
		// Allow extending of the firewall edit page and include custom input validation 
417
		pfSense_handle_custom_code("/usr/local/pkg/firewall_nat/pre_write_config");
418

    
419
		// Update the NAT entry now
420
		if (isset($id) && $a_nat[$id])
421
			$a_nat[$id] = $natent;
422
		else {
423
			if (is_numeric($after))
424
				array_splice($a_nat, $after+1, 0, array($natent));
425
			else
426
				$a_nat[] = $natent;
427
		}
428

    
429
		mark_subsystem_dirty('natconf');
430

    
431
		write_config();
432

    
433
		header("Location: firewall_nat.php");
434
		exit;
435
	}
436
}
437

    
438
$pgtitle = array(gettext("Firewall"),gettext("NAT"),gettext("Port Forward"),gettext("Edit"));
439
include("head.inc");
440

    
441
?>
442
<link rel="stylesheet" href="/javascript/chosen/chosen.css" />
443
</head>
444

    
445
<body link="#0000CC" vlink="#0000CC" alink="#0000CC">
446
<script src="/javascript/chosen/chosen.jquery.js" type="text/javascript"></script>
447
<?php
448
include("fbegin.inc"); ?>
449
<?php if ($input_errors) print_input_errors($input_errors); ?>
450
            <form action="firewall_nat_edit.php" method="post" name="iform" id="iform">
451
              <table width="100%" border="0" cellpadding="6" cellspacing="0">
452
				<tr>
453
					<td colspan="2" valign="top" class="listtopic"><?=gettext("Edit Redirect entry"); ?></td>
454
				</tr>
455
<?php
456
		// Allow extending of the firewall edit page and include custom input validation 
457
		pfSense_handle_custom_code("/usr/local/pkg/firewall_nat/htmlphpearly");
458
?>
459
		<tr>
460
			<td width="22%" valign="top" class="vncellreq"><?=gettext("Disabled"); ?></td>
461
			<td width="78%" class="vtable">
462
				<input name="disabled" type="checkbox" id="disabled" value="yes" <?php if ($pconfig['disabled']) echo "checked"; ?>>
463
				<strong><?=gettext("Disable this rule"); ?></strong><br />
464
				<span class="vexpl"><?=gettext("Set this option to disable this rule without removing it from the list."); ?></span>
465
			</td>
466
		</tr>
467
                <tr>
468
                  <td width="22%" valign="top" class="vncell"><?=gettext("No RDR (NOT)"); ?></td>
469
                  <td width="78%" class="vtable">
470
                    <input type="checkbox" name="nordr" id="nordr" onClick="nordr_change();" <?php if($pconfig['nordr']) echo "CHECKED"; ?>>
471
                    <span class="vexpl"><?=gettext("Enabling this option will disable redirection for traffic matching this rule."); ?>
472
                    <br><?=gettext("Hint: this option is rarely needed, don't use this unless you know what you're doing."); ?></span>
473
                  </td>
474
                </tr>
475
		<tr>
476
                  <td width="22%" valign="top" class="vncellreq"><?=gettext("Interface"); ?></td>
477
                  <td width="78%" class="vtable">
478
					<select name="interface" class="formselect" onChange="dst_change(this.value,iface_old,document.iform.dsttype.value);iface_old = document.iform.interface.value;typesel_change();">
479
						<?php
480

    
481
						$iflist = get_configured_interface_with_descr(false, true);
482
						// Allow extending of the firewall edit interfaces 
483
						pfSense_handle_custom_code("/usr/local/pkg/firewall_nat/pre_interfaces_edit");
484
						foreach ($iflist as $if => $ifdesc)
485
							if(have_ruleint_access($if))
486
								$interfaces[$if] = $ifdesc;
487

    
488
						if ($config['l2tp']['mode'] == "server")
489
							if(have_ruleint_access("l2tp"))
490
								$interfaces['l2tp'] = "L2TP VPN";
491

    
492
						if ($config['pptpd']['mode'] == "server")
493
							if(have_ruleint_access("pptp"))
494
								$interfaces['pptp'] = "PPTP VPN";
495

    
496
						if (is_pppoe_server_enabled() && have_ruleint_access("pppoe"))
497
							$interfaces['pppoe'] = "PPPoE VPN";
498

    
499
						/* add ipsec interfaces */
500
						if (isset($config['ipsec']['enable']) || isset($config['ipsec']['client']['enable']))
501
							if(have_ruleint_access("enc0"))
502
								$interfaces["enc0"] = "IPsec";
503

    
504
						/* add openvpn/tun interfaces */
505
						if  ($config['openvpn']["openvpn-server"] || $config['openvpn']["openvpn-client"])
506
							$interfaces["openvpn"] = "OpenVPN";
507

    
508
						foreach ($interfaces as $iface => $ifacename): ?>
509
						<option value="<?=$iface;?>" <?php if ($iface == $pconfig['interface']) echo "selected"; ?>>
510
						<?=htmlspecialchars($ifacename);?>
511
						</option>
512
						<?php endforeach; ?>
513
					</select><br>
514
                     <span class="vexpl"><?=gettext("Choose which interface this rule applies to."); ?><br>
515
                     <?=gettext("Hint: in most cases, you'll want to use WAN here."); ?></span></td>
516
                </tr>
517
                <tr>
518
                  <td width="22%" valign="top" class="vncellreq"><?=gettext("Protocol"); ?></td>
519
                  <td width="78%" class="vtable">
520
                    <select name="proto" class="formselect" onChange="proto_change(); check_for_aliases();">
521
                      <?php $protocols = explode(" ", "TCP UDP TCP/UDP GRE ESP"); foreach ($protocols as $proto): ?>
522
                      <option value="<?=strtolower($proto);?>" <?php if (strtolower($proto) == $pconfig['proto']) echo "selected"; ?>><?=htmlspecialchars($proto);?></option>
523
                      <?php endforeach; ?>
524
                    </select> <br> <span class="vexpl"><?=gettext("Choose which IP protocol " .
525
                    "this rule should match."); ?><br>
526
                    <?=gettext("Hint: in most cases, you should specify"); ?> <em><?=gettext("TCP"); ?></em> &nbsp;<?=gettext("here."); ?></span></td>
527
                </tr>
528
		<tr id="showadvancedboxsrc" name="showadvancedboxsrc">
529
			<td width="22%" valign="top" class="vncellreq"><?=gettext("Source"); ?></td>
530
			<td width="78%" class="vtable">
531
				<input type="button" onClick="show_source()" value="<?=gettext("Advanced"); ?>"></input> - <?=gettext("Show source address and port range"); ?></a>
532
			</td>
533
		</tr>
534
		<tr style="display: none;" id="srctable" name="srctable">
535
			<td width="22%" valign="top" class="vncellreq"><?=gettext("Source"); ?></td>
536
			<td width="78%" class="vtable">
537
				<input name="srcnot" type="checkbox" id="srcnot" value="yes" <?php if ($pconfig['srcnot']) echo "checked"; ?>>
538
				<strong><?=gettext("not"); ?></strong>
539
				<br />
540
				<?=gettext("Use this option to invert the sense of the match."); ?>
541
				<br />
542
				<br />
543
				<table border="0" cellspacing="0" cellpadding="0">
544
					<tr>
545
						<td><?=gettext("Type:"); ?>&nbsp;&nbsp;</td>
546
						<td>
547
							<select name="srctype" class="formselect" onChange="typesel_change()">
548
<?php
549
								$sel = is_specialnet($pconfig['src']); ?>
550
								<option value="any"     <?php if ($pconfig['src'] == "any") { echo "selected"; } ?>><?=gettext("any"); ?></option>
551
								<option value="single"  <?php if (($pconfig['srcmask'] == 32) && !$sel) { echo "selected"; $sel = 1; } ?>><?=gettext("Single host or alias"); ?></option>
552
								<option value="network" <?php if (!$sel) echo "selected"; ?>><?=gettext("Network"); ?></option>
553
								<?php if(have_ruleint_access("pptp")): ?>
554
								<option value="pptp"    <?php if ($pconfig['src'] == "pptp") { echo "selected"; } ?>><?=gettext("PPTP clients"); ?></option>
555
								<?php endif; ?>
556
								<?php if(have_ruleint_access("pppoe")): ?>
557
								<option value="pppoe"   <?php if ($pconfig['src'] == "pppoe") { echo "selected"; } ?>><?=gettext("PPPoE clients"); ?></option>
558
								<?php endif; ?>
559
								 <?php if(have_ruleint_access("l2tp")): ?>
560
                                                                <option value="l2tp"   <?php if ($pconfig['src'] == "l2tp") { echo "selected"; } ?>><?=gettext("L2TP clients"); ?></option>
561
                                 <?php endif; ?>
562
<?php
563
								foreach ($ifdisp as $ifent => $ifdesc): ?>
564
								<?php if(have_ruleint_access($ifent)): ?>
565
									<option value="<?=$ifent;?>" <?php if ($pconfig['src'] == $ifent) { echo "selected"; } ?>><?=htmlspecialchars($ifdesc);?> <?=gettext("subnet"); ?></option>
566
									<option value="<?=$ifent;?>ip"<?php if ($pconfig['src'] ==  $ifent . "ip") { echo "selected"; } ?>>
567
										<?=$ifdesc?> <?=gettext("address");?>
568
									</option>
569
								<?php endif; ?>
570
<?php 							endforeach; ?>
571
							</select>
572
						</td>
573
					</tr>
574
					<tr>
575
						<td><?=gettext("Address:"); ?>&nbsp;&nbsp;</td>
576
						<td>
577
							<input autocomplete='off' name="src" type="text" class="formfldalias" id="src" size="20" value="<?php if (!is_specialnet($pconfig['src'])) echo htmlspecialchars($pconfig['src']);?>"> /
578
							<select name="srcmask" class="formselect" id="srcmask">
579
<?php						for ($i = 31; $i > 0; $i--): ?>
580
								<option value="<?=$i;?>" <?php if ($i == $pconfig['srcmask']) echo "selected"; ?>><?=$i;?></option>
581
<?php 						endfor; ?>
582
							</select>
583
						</td>
584
					</tr>
585
				</table>
586
			</td>
587
		</tr>
588
		<tr style="display:none" id="sprtable" name="sprtable">
589
			<td width="22%" valign="top" class="vncellreq"><?=gettext("Source port range"); ?></td>
590
			<td width="78%" class="vtable">
591
				<table border="0" cellspacing="0" cellpadding="0">
592
					<tr>
593
						<td><?=gettext("from:"); ?>&nbsp;&nbsp;</td>
594
						<td>
595
							<select name="srcbeginport" class="formselect" onchange="src_rep_change();ext_change()">
596
								<option value="">(<?=gettext("other"); ?>)</option>
597
								<option value="any" <?php $bfound = 0; if ($pconfig['srcbeginport'] == "any") { echo "selected"; $bfound = 1; } ?>><?=gettext("any"); ?></option>
598
<?php 							foreach ($wkports as $wkport => $wkportdesc): ?>
599
									<option value="<?=$wkport;?>" <?php if ($wkport == $pconfig['srcbeginport']) { echo "selected"; $bfound = 1; } ?>><?=htmlspecialchars($wkportdesc);?></option>
600
<?php 							endforeach; ?>
601
							</select>
602
							<input autocomplete='off' class="formfldalias" name="srcbeginport_cust" id="srcbeginport_cust" type="text" size="5" value="<?php if (!$bfound && $pconfig['srcbeginport']) echo htmlspecialchars($pconfig['srcbeginport']); ?>">
603
						</td>
604
					</tr>
605
					<tr>
606
						<td><?=gettext("to:"); ?></td>
607
						<td>
608
							<select name="srcendport" class="formselect" onchange="ext_change()">
609
								<option value="">(<?=gettext("other"); ?>)</option>
610
								<option value="any" <?php $bfound = 0; if ($pconfig['srcendport'] == "any") { echo "selected"; $bfound = 1; } ?>><?=gettext("any"); ?></option>
611
<?php							foreach ($wkports as $wkport => $wkportdesc): ?>
612
									<option value="<?=$wkport;?>" <?php if ($wkport == $pconfig['srcendport']) { echo "selected"; $bfound = 1; } ?>><?=htmlspecialchars($wkportdesc);?></option>
613
<?php							endforeach; ?>
614
							</select>
615
							<input autocomplete='off' class="formfldalias" name="srcendport_cust" id="srcendport_cust" type="text" size="5" value="<?php if (!$bfound && $pconfig['srcendport']) echo htmlspecialchars($pconfig['srcendport']); ?>">
616
						</td>
617
					</tr>
618
				</table>
619
				<br />
620
				<span class="vexpl"><?=gettext("Specify the source port or port range for this rule"); ?>. <b><?=gettext("This is usually"); ?> <em><?=gettext("random"); ?></em> <?=gettext("and almost never equal to the destination port range (and should usually be 'any')"); ?>.</b> <br /> <?=gettext("Hint: you can leave the"); ?> <em>'<?=gettext("to"); ?>'</em> <?=gettext("field empty if you only want to filter a single port."); ?></span><br/>
621
			</td>
622
		</tr>
623
		<tr>
624
			<td width="22%" valign="top" class="vncellreq"><?=gettext("Destination"); ?></td>
625
			<td width="78%" class="vtable">
626
				<input name="dstnot" type="checkbox" id="dstnot" value="yes" <?php if ($pconfig['dstnot']) echo "checked"; ?>>
627
				<strong><?=gettext("not"); ?></strong>
628
					<br />
629
				<?=gettext("Use this option to invert the sense of the match."); ?>
630
					<br />
631
					<br />
632
				<table border="0" cellspacing="0" cellpadding="0">
633
					<tr>
634
						<td><?=gettext("Type:"); ?>&nbsp;&nbsp;</td>
635
						<td>
636
							<select name="dsttype" class="formselect" onChange="typesel_change()">
637
<?php
638
								$sel = is_specialnet($pconfig['dst']); ?>
639
								<option value="any" <?php if ($pconfig['dst'] == "any") { echo "selected"; } ?>><?=gettext("any"); ?></option>
640
								<option value="single" <?php if (($pconfig['dstmask'] == 32) && !$sel) { echo "selected"; $sel = 1; } ?>><?=gettext("Single host or alias"); ?></option>
641
								<option value="network" <?php if (!$sel) echo "selected"; ?>><?=gettext("Network"); ?></option>
642
								<?php if(have_ruleint_access("pptp")): ?>
643
								<option value="pptp" <?php if ($pconfig['dst'] == "pptp") { echo "selected"; } ?>><?=gettext("PPTP clients"); ?></option>
644
								<?php endif; ?>
645
								<?php if(have_ruleint_access("pppoe")): ?>
646
								<option value="pppoe" <?php if ($pconfig['dst'] == "pppoe") { echo "selected"; } ?>><?=gettext("PPPoE clients"); ?></option>
647
								<?php endif; ?>
648
								<?php if(have_ruleint_access("l2tp")): ?>
649
                                                                <option value="l2tp" <?php if ($pconfig['dst'] == "l2tp") { echo "selected"; } ?>><?=gettext("L2TP clients"); ?></option>
650
                                                                <?php endif; ?>
651

    
652
<?php 							foreach ($ifdisp as $if => $ifdesc): ?>
653
								<?php if(have_ruleint_access($if)): ?>
654
									<option value="<?=$if;?>" <?php if ($pconfig['dst'] == $if) { echo "selected"; } ?>><?=htmlspecialchars($ifdesc);?> <?=gettext("subnet"); ?></option>
655
									<option value="<?=$if;?>ip"<?php if ($pconfig['dst'] == $if . "ip") { echo "selected"; } ?>>
656
										<?=$ifdesc;?> <?=gettext("address");?>
657
									</option>
658
								<?php endif; ?>
659
<?php 							endforeach; ?>
660

    
661
<?php							if (is_array($config['virtualip']['vip'])):
662
									foreach ($config['virtualip']['vip'] as $sn):
663
										if (isset($sn['noexpand']))
664
											continue;
665
										if ($sn['mode'] == "proxyarp" && $sn['type'] == "network"):
666
											$start = ip2long32(gen_subnet($sn['subnet'], $sn['subnet_bits']));
667
											$end = ip2long32(gen_subnet_max($sn['subnet'], $sn['subnet_bits']));
668
											$len = $end - $start;
669
											for ($i = 0; $i <= $len; $i++):
670
												$snip = long2ip32($start+$i);
671
?>
672
												<option value="<?=$snip;?>" <?php if ($snip == $pconfig['dst']) echo "selected"; ?>><?=htmlspecialchars("{$snip} ({$sn['descr']})");?></option>
673
<?php										endfor;
674
										else:
675
?>
676
											<option value="<?=$sn['subnet'];?>" <?php if ($sn['subnet'] == $pconfig['dst']) echo "selected"; ?>><?=htmlspecialchars("{$sn['subnet']} ({$sn['descr']})");?></option>
677
<?php									endif;
678
									endforeach;
679
								endif;
680
?>
681
							</select>
682
						</td>
683
					</tr>
684
					<tr>
685
						<td><?=gettext("Address:"); ?>&nbsp;&nbsp;</td>
686
						<td>
687
							<input autocomplete='off' name="dst" type="text" class="formfldalias" id="dst" size="20" value="<?php if (!is_specialnet($pconfig['dst'])) echo htmlspecialchars($pconfig['dst']);?>">
688
							/
689
							<select name="dstmask" class="formselect" id="dstmask">
690
<?php
691
							for ($i = 31; $i > 0; $i--): ?>
692
								<option value="<?=$i;?>" <?php if ($i == $pconfig['dstmask']) echo "selected"; ?>><?=$i;?></option>
693
<?php						endfor; ?>
694
							</select>
695
						</td>
696
					</tr>
697
				</table>
698
			</td>
699
		</tr>
700
		<tr id="dprtr" name="dprtr">
701
			<td width="22%" valign="top" class="vncellreq"><?=gettext("Destination port range"); ?> </td>
702
			<td width="78%" class="vtable">
703
				<table border="0" cellspacing="0" cellpadding="0">
704
					<tr>
705
						<td><?=gettext("from:"); ?>&nbsp;&nbsp;</td>
706
						<td>
707
							<select name="dstbeginport" class="formselect" onchange="dst_rep_change();ext_change()">
708
								<option value="">(<?=gettext("other"); ?>)</option>
709
<?php 							$bfound = 0;
710
								foreach ($wkports as $wkport => $wkportdesc): ?>
711
									<option value="<?=$wkport;?>" <?php if ($wkport == $pconfig['dstbeginport']) { echo "selected"; $bfound = 1; }?>><?=htmlspecialchars($wkportdesc);?></option>
712
<?php 							endforeach; ?>
713
							</select>
714
							<input autocomplete='off' class="formfldalias" name="dstbeginport_cust" id="dstbeginport_cust" type="text" size="5" value="<?php if (!$bfound && $pconfig['dstbeginport']) echo htmlspecialchars($pconfig['dstbeginport']); ?>">
715
						</td>
716
					</tr>
717
					<tr>
718
						<td><?=gettext("to:"); ?></td>
719
						<td>
720
							<select name="dstendport" class="formselect" onchange="ext_change()">
721
								<option value="">(<?=gettext("other"); ?>)</option>
722
<?php							$bfound = 0;
723
								foreach ($wkports as $wkport => $wkportdesc): ?>
724
									<option value="<?=$wkport;?>" <?php if ($wkport == $pconfig['dstendport']) { echo "selected"; $bfound = 1; } ?>><?=htmlspecialchars($wkportdesc);?></option>
725
<?php 							endforeach; ?>
726
							</select>
727
							<input autocomplete='off' class="formfldalias" name="dstendport_cust" id="dstendport_cust" type="text" size="5" value="<?php if (!$bfound && $pconfig['dstendport']) echo htmlspecialchars($pconfig['dstendport']); ?>">
728
						</td>
729
					</tr>
730
				</table>
731
				<br />
732
				<span class="vexpl">
733
					<?=gettext("Specify the port or port range for the destination of the packet for this mapping."); ?>
734
					<br />
735
					<?=gettext("Hint: you can leave the"); ?> <em>'<?=gettext("to"); ?>'</em> <?=gettext("field empty if you only want to map a single port"); ?>
736
				</span>
737
			</td>
738
		</tr>
739
                <tr name="localiptable" id="localiptable">
740
                  <td width="22%" valign="top" class="vncellreq"><?=gettext("Redirect target IP"); ?></td>
741
                  <td width="78%" class="vtable">
742
                    <input autocomplete='off' name="localip" type="text" class="formfldalias" id="localip" size="20" value="<?=htmlspecialchars($pconfig['localip']);?>">
743
                    <br> <span class="vexpl"><?=gettext("Enter the internal IP address of " .
744
                    "the server on which you want to map the ports."); ?><br>
745
                    <?=gettext("e.g."); ?> <em>192.168.1.12</em></span></td>
746
                </tr>
747
                <tr name="lprtr" id="lprtr">
748
                  <td width="22%" valign="top" class="vncellreq"><?=gettext("Redirect target port"); ?></td>
749
                  <td width="78%" class="vtable">
750
                    <select name="localbeginport" class="formselect" onChange="ext_change();check_for_aliases();">
751
                      <option value="">(<?=gettext("other"); ?>)</option>
752
                      <?php $bfound = 0; foreach ($wkports as $wkport => $wkportdesc): ?>
753
                      <option value="<?=$wkport;?>" <?php if ($wkport == $pconfig['localbeginport']) {
754
							echo "selected";
755
							$bfound = 1;
756
						}?>>
757
					  <?=htmlspecialchars($wkportdesc);?>
758
					  </option>
759
                      <?php endforeach; ?>
760
                    </select> <input onChange="check_for_aliases();" autocomplete='off' class="formfldalias" name="localbeginport_cust" id="localbeginport_cust" type="text" size="5" value="<?php if (!$bfound) echo htmlspecialchars($pconfig['localbeginport']); ?>">
761
                    <br>
762
                    <span class="vexpl"><?=gettext("Specify the port on the machine with the " .
763
                    "IP address entered above. In case of a port range, specify " .
764
                    "the beginning port of the range (the end port will be calculated " .
765
                    "automatically)."); ?><br>
766
                    <?=gettext("Hint: this is usually identical to the 'from' port above"); ?></span></td>
767
                </tr>
768
                <tr>
769
                  <td width="22%" valign="top" class="vncell"><?=gettext("Description"); ?></td>
770
                  <td width="78%" class="vtable">
771
                    <input name="descr" type="text" class="formfld unknown" id="descr" size="40" value="<?=htmlspecialchars($pconfig['descr']);?>">
772
                    <br> <span class="vexpl"><?=gettext("You may enter a description here " .
773
                    "for your reference (not parsed)."); ?></span></td>
774
                </tr>
775
				<tr>
776
					<td width="22%" valign="top" class="vncell"><?=gettext("No XMLRPC Sync"); ?></td>
777
					<td width="78%" class="vtable">
778
						<input type="checkbox" value="yes" name="nosync"<?php if($pconfig['nosync']) echo " CHECKED"; ?>><br>
779
						<?=gettext("HINT: This prevents the rule from automatically syncing to other CARP members"); ?>.
780
					</td>
781
				</tr>
782
				<tr>
783
					<td width="22%" valign="top" class="vncell"><?=gettext("NAT reflection"); ?></td>
784
					<td width="78%" class="vtable">
785
						<select name="natreflection" class="formselect">
786
						<option value="default" <?php if ($pconfig['natreflection'] != "enable" && $pconfig['natreflection'] != "purenat" && $pconfig['natreflection'] != "disable") echo "selected"; ?>><?=gettext("Use system default"); ?></option>
787
						<option value="enable" <?php if ($pconfig['natreflection'] == "enable") echo "selected"; ?>><?=gettext("Enable (NAT + Proxy)"); ?></option>
788
						<option value="purenat" <?php if ($pconfig['natreflection'] == "purenat") echo "selected"; ?>><?=gettext("Enable (Pure NAT)"); ?></option>
789
						<option value="disable" <?php if ($pconfig['natreflection'] == "disable") echo "selected"; ?>><?=gettext("Disable"); ?></option>
790
						</select>
791
					</td>
792
				</tr>
793
				<?php if (isset($id) && $a_nat[$id] && !isset($_GET['dup'])): ?>
794
				<tr name="assoctable" id="assoctable">
795
					<td width="22%" valign="top" class="vncell"><?=gettext("Filter rule association"); ?></td>
796
					<td width="78%" class="vtable">
797
						<select name="associated-rule-id">
798
							<option value=""><?=gettext("None"); ?></option>
799
							<option value="pass" <?php if($pconfig['associated-rule-id'] == "pass") echo " SELECTED"; ?>><?=gettext("Pass"); ?></option>
800
							<?php
801
							$linkedrule = "";
802
							if (is_array($config['filter']['rule'])) {
803
							      filter_rules_sort();
804
							      foreach ($config['filter']['rule'] as $filter_id => $filter_rule) {
805
								if (isset($filter_rule['associated-rule-id'])) {
806
									echo "<option value=\"{$filter_rule['associated-rule-id']}\"";
807
									if ($filter_rule['associated-rule-id']==$pconfig['associated-rule-id']) {
808
										echo " SELECTED";
809
										$linkedrule = "<br /><a href=\"firewall_rules_edit.php?id={$filter_id}\">" . gettext("View the filter rule") . "</a><br/>";
810
									}
811
									echo ">". htmlspecialchars('Rule ' . $filter_rule['descr']) . "</option>\n";
812

    
813
								}
814
							      }
815
							}
816
							if (isset($pconfig['associated-rule-id']))
817
								echo "<option value=\"new\">" . gettext("Create new associated filter rule") . "</option>\n";
818
						echo "</select>\n";
819
						echo $linkedrule;
820
						?>
821
					</td>
822
				</tr>
823
				<?php endif; ?>
824
                <?php if ((!(isset($id) && $a_nat[$id])) || (isset($_GET['dup']))): ?>
825
                <tr name="assoctable" id="assoctable">
826
                  <td width="22%" valign="top" class="vncell"><?=gettext("Filter rule association"); ?></td>
827
                  <td width="78%" class="vtable">
828
                    <select name="filter-rule-association" id="filter-rule-association">
829
						<option value=""><?=gettext("None"); ?></option>
830
						<option value="add-associated" selected="selected"><?=gettext("Add associated filter rule"); ?></option>
831
						<option value="add-unassociated"><?=gettext("Add unassociated filter rule"); ?></option>
832
						<option value="pass"><?=gettext("Pass"); ?></option>
833
					</select>
834
				  </td>
835
                </tr><?php endif; ?>
836
<?php
837
		// Allow extending of the firewall edit page and include custom input validation 
838
		pfSense_handle_custom_code("/usr/local/pkg/firewall_nat/htmlphplate");
839
?>
840
				<tr>
841
                  <td width="22%" valign="top">&nbsp;</td>
842
                  <td width="78%">&nbsp;</td>
843
				</tr>
844
                <tr>
845
                  <td width="22%" valign="top">&nbsp;</td>
846
                  <td width="78%">
847
                    <input name="Submit" type="submit" class="formbtn" value="<?=gettext("Save"); ?>"> <input type="button" class="formbtn" value="<?=gettext("Cancel"); ?>" onclick="history.back()">
848
                    <?php if (isset($id) && $a_nat[$id]): ?>
849
                    <input name="id" type="hidden" value="<?=htmlspecialchars($id);?>">
850
                    <?php endif; ?>
851
                  </td>
852
                </tr>
853
              </table>
854
</form>
855
<script language="JavaScript">
856
<!--
857
	ext_change();
858
	dst_change(document.iform.interface.value,'<?=htmlspecialchars($pconfig['interface'])?>','<?=htmlspecialchars($pconfig['dst'])?>');
859
	var iface_old = document.iform.interface.value;
860
	typesel_change();
861
	proto_change();
862
	<?php if ($pconfig['srcnot'] || $pconfig['src'] != "any" || $pconfig['srcbeginport'] != "any" || $pconfig['srcendport'] != "any"): ?>
863
	show_source();
864
	<?php endif; ?>
865
	nordr_change();
866
//-->
867
</script>
868
<?php
869
$isfirst = 0;
870
$aliases = "";
871
$addrisfirst = 0;
872
$aliasesaddr = "";
873
if($config['aliases']['alias'] <> "")
874
	foreach($config['aliases']['alias'] as $alias_name) {
875
		switch ($alias_name['type']) {
876
                        case "port":
877
                                if($isfirst == 1) $portaliases .= ",";
878
                                $portaliases .= "'" . $alias_name['name'] . "'";
879
                                $isfirst = 1;
880
                                break;
881
                        case "host":
882
                        case "network":
883
                        case "openvpn":
884
			case "urltable":
885
                                if($addrisfirst == 1) $aliasesaddr .= ",";
886
                                $aliasesaddr .= "'" . $alias_name['name'] . "'";
887
                                $addrisfirst = 1;
888
                                break;
889
                        default:
890
                                break;
891
		}
892
	}
893
?>
894
<script language="JavaScript">
895
<!--
896
	var addressarray=new Array(<?php echo $aliasesaddr; ?>);
897
	var customarray=new Array(<?php echo $portaliases; ?>);
898

    
899
	var oTextbox1 = new AutoSuggestControl(document.getElementById("localip"), new StateSuggestions(addressarray));
900
	var oTextbox2 = new AutoSuggestControl(document.getElementById("src"), new StateSuggestions(addressarray));
901
	var oTextbox3 = new AutoSuggestControl(document.getElementById("dst"), new StateSuggestions(addressarray));
902
	var oTextbox4 = new AutoSuggestControl(document.getElementById("dstbeginport_cust"), new StateSuggestions(customarray));
903
	var oTextbox5 = new AutoSuggestControl(document.getElementById("dstendport_cust"), new StateSuggestions(customarray));
904
	var oTextbox6 = new AutoSuggestControl(document.getElementById("srcbeginport_cust"), new StateSuggestions(customarray));
905
	var oTextbox7 = new AutoSuggestControl(document.getElementById("srcendport_cust"), new StateSuggestions(customarray));
906
	var oTextbox8 = new AutoSuggestControl(document.getElementById("localbeginport_cust"), new StateSuggestions(customarray));
907
//-->
908
</script>
909
<?php include("fend.inc"); ?>
910
</body>
911
</html>
(62-62/245)