Project

General

Profile

Download (13.1 KB) Statistics
| Branch: | Tag: | Revision:
1
<?php
2
/* $Id$ */
3
/*
4
	diag_logs_settings.php
5
	Copyright (C) 2004-2009 Scott Ullrich
6
	All rights reserved.
7

    
8
	originially part of m0n0wall (http://m0n0.ch/wall)
9
	Copyright (C) 2003-2004 Manuel Kasper <mk@neon1.net>.
10
	All rights reserved.
11

    
12
	Redistribution and use in source and binary forms, with or without
13
	modification, are permitted provided that the following conditions are met:
14

    
15
	1. Redistributions of source code must retain the above copyright notice,
16
	   this list of conditions and the following disclaimer.
17

    
18
	2. Redistributions in binary form must reproduce the above copyright
19
	   notice, this list of conditions and the following disclaimer in the
20
	   documentation and/or other materials provided with the distribution.
21

    
22
	THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
23
	INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
24
	AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
25
	AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
26
	OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
27
	SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
28
	INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
29
	CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
30
	ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
31
	POSSIBILITY OF SUCH DAMAGE.
32
*/
33

    
34
/*	
35
	pfSense_MODULE:	system
36
*/
37

    
38
##|+PRIV
39
##|*IDENT=page-diagnostics-logs-settings
40
##|*NAME=Diagnostics: Logs: Settings page
41
##|*DESCR=Allow access to the 'Diagnostics: Logs: Settings' page.
42
##|*MATCH=diag_logs_settings.php*
43
##|-PRIV
44

    
45
require("guiconfig.inc");
46
require_once("functions.inc");
47
require_once("filter.inc");
48
require_once("shaper.inc");
49

    
50
$pconfig['reverse'] = isset($config['syslog']['reverse']);
51
$pconfig['nentries'] = $config['syslog']['nentries'];
52
$pconfig['remoteserver'] = $config['syslog']['remoteserver'];
53
$pconfig['remoteserver2'] = $config['syslog']['remoteserver2'];
54
$pconfig['remoteserver3'] = $config['syslog']['remoteserver3'];
55
$pconfig['filter'] = isset($config['syslog']['filter']);
56
$pconfig['dhcp'] = isset($config['syslog']['dhcp']);
57
$pconfig['portalauth'] = isset($config['syslog']['portalauth']);
58
$pconfig['vpn'] = isset($config['syslog']['vpn']);
59
$pconfig['logall'] = isset($config['syslog']['logall']);
60
$pconfig['system'] = isset($config['syslog']['system']);
61
$pconfig['enable'] = isset($config['syslog']['enable']);
62
$pconfig['logdefaultblock'] = !isset($config['syslog']['nologdefaultblock']);
63
$pconfig['rawfilter'] = isset($config['syslog']['rawfilter']);
64
$pconfig['disablelocallogging'] = isset($config['syslog']['disablelocallogging']);
65

    
66
if (!$pconfig['nentries'])
67
	$pconfig['nentries'] = 50;
68

    
69
if ($_POST) {
70

    
71
	unset($input_errors);
72
	$pconfig = $_POST;
73

    
74
	/* input validation */
75
	if ($_POST['enable'] && !is_ipaddr($_POST['remoteserver'])) {
76
		$input_errors[] = "A valid IP address must be specified for remote syslog server #1.";
77
	}
78
	if ($_POST['enable'] && $_POST['remoteserver2'] && !is_ipaddr($_POST['remoteserver2'])) {
79
		$input_errors[] = "A valid IP address must be specified for remote syslog server #2.";
80
	}
81
	if ($_POST['enable'] && $_POST['remoteserver3'] && !is_ipaddr($_POST['remoteserver3'])) {
82
		$input_errors[] = "A valid IP address must be specified for remote syslog server #3.";
83
	}
84
	if ($_POST['enable'] && !is_ipaddr($_POST['remoteserver'])) {
85
		$input_errors[] = "A valid IP address must be specified.";
86
	}
87

    
88
	if (($_POST['nentries'] < 5) || ($_POST['nentries'] > 2000)) {
89
		$input_errors[] = "Number of log entries to show must be between 5 and 2000.";
90
	}
91

    
92
	if (!$input_errors) {
93
		$config['syslog']['reverse'] = $_POST['reverse'] ? true : false;
94
		$config['syslog']['nentries'] = (int)$_POST['nentries'];
95
		$config['syslog']['remoteserver'] = $_POST['remoteserver'];
96
		$config['syslog']['remoteserver2'] = $_POST['remoteserver2'];
97
		$config['syslog']['remoteserver3'] = $_POST['remoteserver3'];
98
		$config['syslog']['filter'] = $_POST['filter'] ? true : false;
99
		$config['syslog']['dhcp'] = $_POST['dhcp'] ? true : false;
100
		$config['syslog']['portalauth'] = $_POST['portalauth'] ? true : false;
101
		$config['syslog']['vpn'] = $_POST['vpn'] ? true : false;
102
                $config['syslog']['logall'] = $_POST['logall'] ? true : false;
103
		$config['syslog']['system'] = $_POST['system'] ? true : false;
104
		$config['syslog']['disablelocallogging'] = $_POST['disablelocallogging'] ? true : false;
105
		$config['syslog']['enable'] = $_POST['enable'] ? true : false;
106
		$oldnologdefaultblock = isset($config['syslog']['nologdefaultblock']);
107
		$config['syslog']['nologdefaultblock'] = $_POST['logdefaultblock'] ? false : true;
108
		$config['syslog']['rawfilter'] = $_POST['rawfilter'] ? true : false;
109
		if($config['syslog']['enable'] == false) {
110
			unset($config['syslog']['remoteserver']);
111
			unset($config['syslog']['remoteserver2']);
112
			unset($config['syslog']['remoteserver3']);
113
		}
114

    
115
		write_config();
116

    
117
		$retval = 0;
118
		$retval = system_syslogd_start();
119
		if ($oldnologdefaultblock !== isset($config['syslog']['nologdefaultblock']))
120
			$retval |= filter_configure();
121

    
122
		$savemsg = get_std_save_message($retval);
123
	}
124
}
125

    
126
$pgtitle = array("Status","System logs","Settings");
127
include("head.inc");
128

    
129
?>
130

    
131

    
132
<script language="JavaScript">
133
<!--
134
function enable_change(enable_over) {
135
	if (document.iform.enable.checked || enable_over) {
136
		document.iform.remoteserver.disabled = 0;
137
		document.iform.remoteserver2.disabled = 0;
138
		document.iform.remoteserver3.disabled = 0;
139
		document.iform.filter.disabled = 0;
140
		document.iform.dhcp.disabled = 0;
141
		document.iform.portalauth.disabled = 0;
142
		document.iform.vpn.disabled = 0;
143
		document.iform.system.disabled = 0;
144
		document.iform.logall.disabled = 0;
145
	} else {
146
		document.iform.remoteserver.disabled = 1;
147
		document.iform.remoteserver2.disabled = 1;
148
		document.iform.remoteserver3.disabled = 1;
149
		document.iform.filter.disabled = 1;
150
		document.iform.dhcp.disabled = 1;
151
		document.iform.portalauth.disabled = 1;
152
		document.iform.vpn.disabled = 1;
153
		document.iform.system.disabled = 1;
154
		document.iform.logall.disabled = 1;
155
	}
156
}
157
// -->
158
</script>
159

    
160
<body link="#0000CC" vlink="#0000CC" alink="#0000CC">
161
<?php include("fbegin.inc"); ?>
162
<form action="diag_logs_settings.php" method="post" name="iform" id="iform">
163
<?php if ($input_errors) print_input_errors($input_errors); ?>
164
<?php if ($savemsg) print_info_box($savemsg); ?>
165
<table width="100%" border="0" cellpadding="0" cellspacing="0">
166
  <tr><td>
167
<?php
168
	$tab_array = array();
169
	$tab_array[] = array("System", false, "diag_logs.php");
170
	$tab_array[] = array("Firewall", false, "diag_logs_filter.php");
171
	$tab_array[] = array("DHCP", false, "diag_logs_dhcp.php");
172
	$tab_array[] = array("Portal Auth", false, "diag_logs_auth.php");
173
	$tab_array[] = array("IPsec", false, "diag_logs_ipsec.php");
174
	$tab_array[] = array("VPN", false, "diag_logs_vpn.php");
175
	$tab_array[] = array("Load Balancer", false, "diag_logs_relayd.php");
176
	$tab_array[] = array("OpenVPN", false, "diag_logs_openvpn.php");
177
	$tab_array[] = array("OpenNTPD", false, "diag_logs_ntpd.php");
178
	$tab_array[] = array("Settings", true, "diag_logs_settings.php");
179
	display_top_tabs($tab_array);
180
?>
181
  </td></tr>
182
  <tr>
183
    <td>
184
	<div id="mainarea">
185
	  <table class="tabcont" width="100%" border="0" cellpadding="6" cellspacing="0">
186
                      <tr>
187
                        <td width="22%" valign="top" class="vtable">&nbsp;</td>
188
                        <td width="78%" class="vtable"> <input name="reverse" type="checkbox" id="reverse" value="yes" <?php if ($pconfig['reverse']) echo "checked"; ?>>
189
                          <strong>Show log entries in reverse order (newest entries
190
                          on top)</strong></td>
191
                      </tr>
192
                      <tr>
193
                        <td width="22%" valign="top" class="vtable">&nbsp;</td>
194
                        <td width="78%" class="vtable">Number of log entries to
195
                          show:
196
                          <input name="nentries" id="nentries" type="text" class="formfld unknown" size="4" value="<?=htmlspecialchars($pconfig['nentries']);?>"></td>
197
                      </tr>
198
                      <tr>
199
                        <td valign="top" class="vtable">&nbsp;</td>
200
                        <td class="vtable"> <input name="logdefaultblock" type="checkbox" id="logdefaultblock" value="yes" <?php if ($pconfig['logdefaultblock']) echo "checked"; ?>>
201
                          <strong>Log packets blocked by the default rule</strong><br>
202
                          Hint: packets that are blocked by the
203
                          implicit default block rule will not be logged anymore
204
                          if you uncheck this option. Per-rule logging options are not affected.</td>
205
                      </tr>
206
                      <tr>
207
                        <td valign="top" class="vtable">&nbsp;</td>
208
                        <td class="vtable"> <input name="rawfilter" type="checkbox" id="rawfilter" value="yes" <?php if ($pconfig['rawfilter']) echo "checked"; ?>>
209
                          <strong>Show raw filter logs</strong><br>
210
                          Hint: If this is checked, filter logs are shown as generated by the packet filter, without any formatting. This will reveal more detailed information. </td>
211
                      </tr>
212
                      <tr>
213
                        <td width="22%" valign="top" class="vtable">&nbsp;</td>
214
                        <td width="78%" class="vtable"> <input name="disablelocallogging" type="checkbox" id="disablelocallogging" value="yes" <?php if ($pconfig['disablelocallogging']) echo "checked"; ?> onClick="enable_change(false)">
215
                          <strong>Disable writing log files to the local RAM disk</strong></td>
216
                       </tr>
217
                      <tr>
218
                        <td width="22%" valign="top" class="vtable">&nbsp;</td>
219
                        <td width="78%" class="vtable"> <input name="enable" type="checkbox" id="enable" value="yes" <?php if ($pconfig['enable']) echo "checked"; ?> onClick="enable_change(false)">
220
                          <strong>Enable syslog'ing to remote syslog server</strong></td>
221
                      </tr>
222
                      <tr>
223
                        <td width="22%" valign="top" class="vncell">Remote syslog servers</td>
224
                        <td width="78%" class="vtable"> 
225
							<table>
226
								<tr>
227
									<td>
228
										Server 1
229
									</td>
230
									<td>
231
										<input name="remoteserver" id="remoteserver" type="text" class="formfld host" size="20" value="<?=htmlspecialchars($pconfig['remoteserver']);?>">
232
									</td>
233
								</tr>
234
								<tr>
235
									<td>
236
										Server 2
237
									</td>
238
									<td>
239
										<input name="remoteserver2" id="remoteserver2" type="text" class="formfld host" size="20" value="<?=htmlspecialchars($pconfig['remoteserver2']);?>">
240
									</td>
241
								</tr>
242
								<tr>
243
									<td>
244
										Server 3
245
									</td>
246
									<td>
247
										<input name="remoteserver3" id="remoteserver3" type="text" class="formfld host" size="20" value="<?=htmlspecialchars($pconfig['remoteserver3']);?>">
248
									</td>
249
								</tr>
250
								<tr>
251
									<td>
252
										&nbsp;
253
									</td>
254
									<td>
255
										IP addresses of remote syslog servers
256
									</td>
257
							</table>
258
					 	  <input name="system" id="system" type="checkbox" value="yes" onclick="enable_change(false)" <?php if ($pconfig['system']) echo "checked"; ?>>
259
                          system events <br> <input name="filter" id="filter" type="checkbox" value="yes" <?php if ($pconfig['filter']) echo "checked"; ?>>
260
                          firewall events<br> <input name="dhcp" id="dhcp" type="checkbox" value="yes" <?php if ($pconfig['dhcp']) echo "checked"; ?>>
261
                          DHCP service events<br> <input name="portalauth" id="portalauth" type="checkbox" value="yes" <?php if ($pconfig['portalauth']) echo "checked"; ?>>
262
                          Portal Auth<br> <input name="vpn" id="vpn" type="checkbox" value="yes" <?php if ($pconfig['vpn']) echo "checked"; ?>>
263
                          PPTP VPN events
264
                          <br> <input name="logall" id="logall" type="checkbox" value="yes" <?php if ($pconfig['logall']) echo "checked"; ?>>
265
                          Everything
266
                        </td>
267
                      </tr>
268
                      <tr>
269
                        <td width="22%" valign="top">&nbsp;</td>
270
                        <td width="78%"> <input name="Submit" type="submit" class="formbtn" value="Save" onclick="enable_change(true)">
271
                        </td>
272
                      </tr>
273
                      <tr>
274
                        <td width="22%" height="53" valign="top">&nbsp;</td>
275
                        <td width="78%"><strong><span class="red">Note:</span></strong><br>
276
                          syslog sends UDP datagrams to port 514 on the specified
277
                          remote syslog server. Be sure to set syslogd on the
278
                          remote server to accept syslog messages from <?=$g['product_name']?>.
279
                        </td>
280
                      </tr>
281
                    </table>
282
	</div>
283
    </td>
284
  </tr>
285
</table>
286
</form>
287
<script language="JavaScript">
288
<!--
289
enable_change(false);
290
//-->
291
</script>
292
<?php include("fend.inc"); ?>
293
</body>
294
</html>
(25-25/216)