Project

General

Profile

Download (10.7 KB) Statistics
| Branch: | Tag: | Revision:
1 4d875b4f Scott Ullrich
<?php
2 b46bfcf5 Bill Marquette
/* $Id$ */
3 5b237745 Scott Ullrich
/*
4
	diag_logs_settings.php
5 4d875b4f Scott Ullrich
	Copyright (C) 2004 Scott Ullrich
6
	All rights reserved.
7
8
	originially part of m0n0wall (http://m0n0.ch/wall)
9 5b237745 Scott Ullrich
	Copyright (C) 2003-2004 Manuel Kasper <mk@neon1.net>.
10
	All rights reserved.
11 4d875b4f Scott Ullrich
12 5b237745 Scott Ullrich
	Redistribution and use in source and binary forms, with or without
13
	modification, are permitted provided that the following conditions are met:
14 4d875b4f Scott Ullrich
15 5b237745 Scott Ullrich
	1. Redistributions of source code must retain the above copyright notice,
16
	   this list of conditions and the following disclaimer.
17 4d875b4f Scott Ullrich
18 5b237745 Scott Ullrich
	2. Redistributions in binary form must reproduce the above copyright
19
	   notice, this list of conditions and the following disclaimer in the
20
	   documentation and/or other materials provided with the distribution.
21 4d875b4f Scott Ullrich
22 5b237745 Scott Ullrich
	THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
23
	INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
24
	AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
25
	AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
26
	OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27
	SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
28
	INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
29
	CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30
	ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31
	POSSIBILITY OF SUCH DAMAGE.
32
*/
33
34
require("guiconfig.inc");
35
36
$pconfig['reverse'] = isset($config['syslog']['reverse']);
37
$pconfig['nentries'] = $config['syslog']['nentries'];
38
$pconfig['remoteserver'] = $config['syslog']['remoteserver'];
39
$pconfig['filter'] = isset($config['syslog']['filter']);
40
$pconfig['dhcp'] = isset($config['syslog']['dhcp']);
41 3f2b92d2 Scott Ullrich
$pconfig['portalauth'] = isset($config['syslog']['portalauth']);
42 5b237745 Scott Ullrich
$pconfig['vpn'] = isset($config['syslog']['vpn']);
43
$pconfig['system'] = isset($config['syslog']['system']);
44
$pconfig['enable'] = isset($config['syslog']['enable']);
45
$pconfig['logdefaultblock'] = !isset($config['syslog']['nologdefaultblock']);
46
$pconfig['rawfilter'] = isset($config['syslog']['rawfilter']);
47 af659dda Scott Ullrich
$pconfig['disablelocallogging'] = isset($config['syslog']['disablelocallogging']);
48 5b237745 Scott Ullrich
49
if (!$pconfig['nentries'])
50
	$pconfig['nentries'] = 50;
51
52
if ($_POST) {
53
54
	unset($input_errors);
55
	$pconfig = $_POST;
56
57
	/* input validation */
58
	if ($_POST['enable'] && !is_ipaddr($_POST['remoteserver'])) {
59
		$input_errors[] = "A valid IP address must be specified.";
60
	}
61 102de157 Scott Ullrich
	if (($_POST['nentries'] < 5) || ($_POST['nentries'] > 2000)) {
62
		$input_errors[] = "Number of log entries to show must be between 5 and 2000.";
63 5b237745 Scott Ullrich
	}
64
65
	if (!$input_errors) {
66
		$config['syslog']['reverse'] = $_POST['reverse'] ? true : false;
67
		$config['syslog']['nentries'] = (int)$_POST['nentries'];
68
		$config['syslog']['remoteserver'] = $_POST['remoteserver'];
69
		$config['syslog']['filter'] = $_POST['filter'] ? true : false;
70
		$config['syslog']['dhcp'] = $_POST['dhcp'] ? true : false;
71 3f2b92d2 Scott Ullrich
		$config['syslog']['portalauth'] = $_POST['portalauth'] ? true : false;
72 5b237745 Scott Ullrich
		$config['syslog']['vpn'] = $_POST['vpn'] ? true : false;
73
		$config['syslog']['system'] = $_POST['system'] ? true : false;
74 e1c0c35a Scott Ullrich
		$config['syslog']['disablelocallogging'] = $_POST['disablelocallogging'] ? true : false;
75 5b237745 Scott Ullrich
		$config['syslog']['enable'] = $_POST['enable'] ? true : false;
76
		$oldnologdefaultblock = isset($config['syslog']['nologdefaultblock']);
77
		$config['syslog']['nologdefaultblock'] = $_POST['logdefaultblock'] ? false : true;
78
		$config['syslog']['rawfilter'] = $_POST['rawfilter'] ? true : false;
79 c195be3f Scott Ullrich
		if($config['syslog']['enable'] == false)
80 f3a5f0c5 Scott Ullrich
			unset($config['syslog']['remoteserver']);
81 c195be3f Scott Ullrich
82 5b237745 Scott Ullrich
		write_config();
83 c195be3f Scott Ullrich
84 5b237745 Scott Ullrich
		$retval = 0;
85 fd31e9ee Scott Ullrich
		config_lock();
86
		$retval = system_syslogd_start();
87
		if ($oldnologdefaultblock !== isset($config['syslog']['nologdefaultblock']))
88
			$retval |= filter_configure();
89
		config_unlock();
90 c195be3f Scott Ullrich
91 4d875b4f Scott Ullrich
		$savemsg = get_std_save_message($retval);
92 5b237745 Scott Ullrich
	}
93
}
94
95 d88c6a9f Scott Ullrich
$pgtitle = array("Status","System logs","Settings");
96 b63695db Scott Ullrich
include("head.inc");
97
98 5b237745 Scott Ullrich
?>
99 b63695db Scott Ullrich
100
101 5b237745 Scott Ullrich
<script language="JavaScript">
102
<!--
103
function enable_change(enable_over) {
104
	if (document.iform.enable.checked || enable_over) {
105
		document.iform.remoteserver.disabled = 0;
106
		document.iform.filter.disabled = 0;
107
		document.iform.dhcp.disabled = 0;
108 3f2b92d2 Scott Ullrich
		document.iform.portalauth.disabled = 0;
109 5b237745 Scott Ullrich
		document.iform.vpn.disabled = 0;
110
		document.iform.system.disabled = 0;
111
	} else {
112
		document.iform.remoteserver.disabled = 1;
113
		document.iform.filter.disabled = 1;
114
		document.iform.dhcp.disabled = 1;
115 3f2b92d2 Scott Ullrich
		document.iform.portalauth.disabled = 1;
116 5b237745 Scott Ullrich
		document.iform.vpn.disabled = 1;
117
		document.iform.system.disabled = 1;
118
	}
119
}
120
// -->
121
</script>
122
123
<body link="#0000CC" vlink="#0000CC" alink="#0000CC">
124
<?php include("fbegin.inc"); ?>
125
<form action="diag_logs_settings.php" method="post" name="iform" id="iform">
126
<?php if ($input_errors) print_input_errors($input_errors); ?>
127
<?php if ($savemsg) print_info_box($savemsg); ?>
128
<table width="100%" border="0" cellpadding="0" cellspacing="0">
129
  <tr><td>
130 b63695db Scott Ullrich
<?php
131
	$tab_array = array();
132 9972f533 Bill Marquette
	$tab_array[] = array("System", false, "diag_logs.php");
133
	$tab_array[] = array("Firewall", false, "diag_logs_filter.php");
134
	$tab_array[] = array("DHCP", false, "diag_logs_dhcp.php");
135
	$tab_array[] = array("Portal Auth", false, "diag_logs_auth.php");
136 0f266b2e Chris Buechler
	$tab_array[] = array("IPsec VPN", false, "diag_logs_ipsec.php");
137 9972f533 Bill Marquette
	$tab_array[] = array("PPTP VPN", false, "diag_logs_vpn.php");
138 ba0a9384 Scott Ullrich
	$tab_array[] = array("Load Balancer", false, "diag_logs_slbd.php");
139 03491df0 Scott Ullrich
	$tab_array[] = array("OpenVPN", false, "diag_logs_openvpn.php");
140 18330d38 Scott Ullrich
	$tab_array[] = array("OpenNTPD", false, "diag_logs_ntpd.php");
141 9972f533 Bill Marquette
	$tab_array[] = array("Settings", true, "diag_logs_settings.php");
142 b63695db Scott Ullrich
	display_top_tabs($tab_array);
143
?>
144 5b237745 Scott Ullrich
  </td></tr>
145 4d875b4f Scott Ullrich
  <tr>
146 0f10aee4 Bill Marquette
    <td>
147
	<div id="mainarea">
148
	  <table class="tabcont" width="100%" border="0" cellpadding="6" cellspacing="0">
149 4d875b4f Scott Ullrich
                      <tr>
150 5b237745 Scott Ullrich
                        <td width="22%" valign="top" class="vtable">&nbsp;</td>
151
                        <td width="78%" class="vtable"> <input name="reverse" type="checkbox" id="reverse" value="yes" <?php if ($pconfig['reverse']) echo "checked"; ?>>
152 4d875b4f Scott Ullrich
                          <strong>Show log entries in reverse order (newest entries
153 5b237745 Scott Ullrich
                          on top)</strong></td>
154
                      </tr>
155 4d875b4f Scott Ullrich
                      <tr>
156 5b237745 Scott Ullrich
                        <td width="22%" valign="top" class="vtable">&nbsp;</td>
157 4d875b4f Scott Ullrich
                        <td width="78%" class="vtable">Number of log entries to
158
                          show:
159 b5c78501 Seth Mos
                          <input name="nentries" id="nentries" type="text" class="formfld unknown" size="4" value="<?=htmlspecialchars($pconfig['nentries']);?>"></td>
160 5b237745 Scott Ullrich
                      </tr>
161 4d875b4f Scott Ullrich
                      <tr>
162 5b237745 Scott Ullrich
                        <td valign="top" class="vtable">&nbsp;</td>
163
                        <td class="vtable"> <input name="logdefaultblock" type="checkbox" id="logdefaultblock" value="yes" <?php if ($pconfig['logdefaultblock']) echo "checked"; ?>>
164
                          <strong>Log packets blocked by the default rule</strong><br>
165 4d875b4f Scott Ullrich
                          Hint: packets that are blocked by the
166
                          implicit default block rule will not be logged anymore
167 5b237745 Scott Ullrich
                          if you uncheck this option. Per-rule logging options are not affected.</td>
168
                      </tr>
169 4d875b4f Scott Ullrich
                      <tr>
170 5b237745 Scott Ullrich
                        <td valign="top" class="vtable">&nbsp;</td>
171
                        <td class="vtable"> <input name="rawfilter" type="checkbox" id="rawfilter" value="yes" <?php if ($pconfig['rawfilter']) echo "checked"; ?>>
172
                          <strong>Show raw filter logs</strong><br>
173
                          Hint: If this is checked, filter logs are shown as generated by the packet filter, without any formatting. This will reveal more detailed information. </td>
174
                      </tr>
175 4d875b4f Scott Ullrich
                      <tr>
176 5b237745 Scott Ullrich
                        <td width="22%" valign="top" class="vtable">&nbsp;</td>
177
                        <td width="78%" class="vtable"> <input name="enable" type="checkbox" id="enable" value="yes" <?php if ($pconfig['enable']) echo "checked"; ?> onClick="enable_change(false)">
178
                          <strong>Enable syslog'ing to remote syslog server</strong></td>
179
                      </tr>
180 e1c0c35a Scott Ullrich
                      <tr>
181
                        <td width="22%" valign="top" class="vtable">&nbsp;</td>
182 f9483185 Scott Ullrich
                        <td width="78%" class="vtable"> <input name="disablelocallogging" type="checkbox" id="disablelocallogging" value="yes" <?php if ($pconfig['disablelocallogging']) echo "checked"; ?> onClick="enable_change(false)">
183 c195be3f Scott Ullrich
                          <strong>Disable writing log files to the local ram disk</strong></td>
184
                       </tr>
185 4d875b4f Scott Ullrich
                      <tr>
186
                        <td width="22%" valign="top" class="vncell">Remote syslog
187 5b237745 Scott Ullrich
                          server</td>
188 b5c78501 Seth Mos
                        <td width="78%" class="vtable"> <input name="remoteserver" id="remoteserver" type="text" class="formfld host" size="20" value="<?=htmlspecialchars($pconfig['remoteserver']);?>">
189 5b237745 Scott Ullrich
                          <br>
190
                          IP address of remote syslog server<br> <br> <input name="system" id="system" type="checkbox" value="yes" onclick="enable_change(false)" <?php if ($pconfig['system']) echo "checked"; ?>>
191
                          system events <br> <input name="filter" id="filter" type="checkbox" value="yes" <?php if ($pconfig['filter']) echo "checked"; ?>>
192
                          firewall events<br> <input name="dhcp" id="dhcp" type="checkbox" value="yes" <?php if ($pconfig['dhcp']) echo "checked"; ?>>
193 3f2b92d2 Scott Ullrich
                          DHCP service events<br> <input name="portalauth" id="portalauth" type="checkbox" value="yes" <?php if ($pconfig['portalauth']) echo "checked"; ?>>
194
                          Portal Auth<br> <input name="vpn" id="vpn" type="checkbox" value="yes" <?php if ($pconfig['vpn']) echo "checked"; ?>>
195 5b237745 Scott Ullrich
                          PPTP VPN events</td>
196
                      </tr>
197 4d875b4f Scott Ullrich
                      <tr>
198 5b237745 Scott Ullrich
                        <td width="22%" valign="top">&nbsp;</td>
199 4d875b4f Scott Ullrich
                        <td width="78%"> <input name="Submit" type="submit" class="formbtn" value="Save" onclick="enable_change(true)">
200 5b237745 Scott Ullrich
                        </td>
201
                      </tr>
202 4d875b4f Scott Ullrich
                      <tr>
203 5b237745 Scott Ullrich
                        <td width="22%" height="53" valign="top">&nbsp;</td>
204
                        <td width="78%"><strong><span class="red">Note:</span></strong><br>
205 4d875b4f Scott Ullrich
                          syslog sends UDP datagrams to port 514 on the specified
206
                          remote syslog server. Be sure to set syslogd on the
207 36d0358b Scott Ullrich
                          remote server to accept syslog messages from {$g['product_name']}.
208 5b237745 Scott Ullrich
                        </td>
209
                      </tr>
210
                    </table>
211 0f10aee4 Bill Marquette
	</div>
212 5b237745 Scott Ullrich
    </td>
213
  </tr>
214
</table>
215
</form>
216
<script language="JavaScript">
217
<!--
218
enable_change(false);
219
//-->
220
</script>
221
<?php include("fend.inc"); ?>
222
</body>
223
</html>