Revision db0d17ed
Added by NOYB NOYB about 9 years ago
src/usr/local/www/firewall_nat_1to1_edit.php | ||
---|---|---|
408 | 408 |
'No BINAT (NOT)', |
409 | 409 |
'Do not perform binat for the specified address', |
410 | 410 |
$pconfig['nobinat'] |
411 |
))->setHelp('Excludes the address from a later, more general, rule'); |
|
411 |
))->setHelp('Excludes the address from a later, more general, rule.');
|
|
412 | 412 |
|
413 | 413 |
$iflist = get_configured_interface_with_descr(false, true); |
414 | 414 |
|
src/usr/local/www/firewall_nat_edit.php | ||
---|---|---|
876 | 876 |
|
877 | 877 |
$group->setHelp('Specify the port on the machine with the IP address entered above. In case of a port range, specify the ' . |
878 | 878 |
'beginning port of the range (the end port will be calculated automatically).' . '<br />' . |
879 |
'this is usually identical to "From port" above');
|
|
879 |
'This is usually identical to the "From port" above.');
|
|
880 | 880 |
|
881 | 881 |
$group->add(new Form_Input( |
882 | 882 |
'localbeginport_cust', |
src/usr/local/www/firewall_nat_out_edit.php | ||
---|---|---|
458 | 458 |
'Do not NAT', |
459 | 459 |
'Enabling this option will disable NAT for traffic matching this rule and stop processing Outbound NAT rules', |
460 | 460 |
isset($pconfig['nonat']) |
461 |
))->setHelp('In most cases this option is not required'); |
|
461 |
))->setHelp('In most cases this option is not required.');
|
|
462 | 462 |
|
463 | 463 |
$iflist = get_configured_interface_with_descr(false, true); |
464 | 464 |
|
... | ... | |
557 | 557 |
null, |
558 | 558 |
'Not', |
559 | 559 |
$pconfig['destination_not'] |
560 |
))->setHelp('Invert the sense of the destination match'); |
|
560 |
))->setHelp('Invert the sense of the destination match.');
|
|
561 | 561 |
|
562 | 562 |
$form->add($section); |
563 | 563 |
|
src/usr/local/www/firewall_rules_edit.php | ||
---|---|---|
1247 | 1247 |
'inet6' => 'IPv6', |
1248 | 1248 |
'inet46' => 'IPv4+IPv6', |
1249 | 1249 |
) |
1250 |
))->setHelp('Select the Internet Protocol version this rule applies to'); |
|
1250 |
))->setHelp('Select the Internet Protocol version this rule applies to.');
|
|
1251 | 1251 |
|
1252 | 1252 |
$section->addInput(new Form_Select( |
1253 | 1253 |
'proto', |
... | ... | |
1537 | 1537 |
'Max. src. conn. Rate', |
1538 | 1538 |
'number', |
1539 | 1539 |
$pconfig['max-src-conn-rate'] |
1540 |
))->setHelp('Maximum new connections per host (TCP only)'); |
|
1540 |
))->setHelp('Maximum new connections per host (TCP only).');
|
|
1541 | 1541 |
|
1542 | 1542 |
$section->addInput(new Form_Input( |
1543 | 1543 |
'max-src-conn-rates', |
... | ... | |
1577 | 1577 |
'synproxy state' => gettext('Synproxy'), |
1578 | 1578 |
'none' => gettext('None'), |
1579 | 1579 |
) |
1580 |
))->setHelp('Select which type of state tracking mechanism to use. If in doubt, use keep state' . '<br />' . |
|
1580 |
))->setHelp('Select which type of state tracking mechanism to use. If in doubt, use keep state.' . '<br />' .
|
|
1581 | 1581 |
'<span></span>'); |
1582 | 1582 |
|
1583 | 1583 |
$section->addInput(new Form_Checkbox( |
... | ... | |
1594 | 1594 |
'VLAN Prio', |
1595 | 1595 |
$pconfig['vlanprio'], |
1596 | 1596 |
$vlanprio |
1597 |
))->setHelp('Choose 802.1p priority to match on'); |
|
1597 |
))->setHelp('Choose 802.1p priority to match on.');
|
|
1598 | 1598 |
|
1599 | 1599 |
$section->addInput(new Form_Select( |
1600 | 1600 |
'vlanprioset', |
1601 | 1601 |
'VLAN Prio Set', |
1602 | 1602 |
$pconfig['vlanprioset'], |
1603 | 1603 |
$vlanprio |
1604 |
))->setHelp('Choose 802.1p priority to apply'); |
|
1604 |
))->setHelp('Choose 802.1p priority to apply.');
|
|
1605 | 1605 |
|
1606 | 1606 |
$schedules = array(); |
1607 | 1607 |
foreach ((array)$config['schedules']['schedule'] as $schedule) { |
... | ... | |
1615 | 1615 |
'Schedule', |
1616 | 1616 |
$pconfig['sched'], |
1617 | 1617 |
['' => gettext('none')] + array_combine($schedules, $schedules) |
1618 |
))->setHelp('Leave as \'none\' to leave the rule enabled all the time'); |
|
1618 |
))->setHelp('Leave as \'none\' to leave the rule enabled all the time.');
|
|
1619 | 1619 |
|
1620 | 1620 |
$gateways = array("" => gettext('default')); |
1621 | 1621 |
foreach (return_gateways_array() as $gwname => $gw) { |
src/usr/local/www/firewall_virtual_ip_edit.php | ||
---|---|---|
429 | 429 |
'VHID Group', |
430 | 430 |
$pconfig['vhid'], |
431 | 431 |
array_combine(range(1, 255, 1), range(1, 255, 1)) |
432 |
))->setHelp('Enter the VHID group that the machines will share'); |
|
432 |
))->setHelp('Enter the VHID group that the machines will share.');
|
|
433 | 433 |
|
434 | 434 |
$group = new Form_Group('Advertising frequency'); |
435 | 435 |
$group->add(new Form_Select( |
Also available in: Unified diff
Firewall - Punctuation Clean Up
Some punctuation clean up.
(cherry picked from commit 4a75d129df0c6eee2540d885c951e9ae72a0ed5e)