#!/usr/local/bin/php . All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. */ $pgtitle = array("System", "Advanced setup"); require("guiconfig.inc"); $pconfig['filteringbridge_enable'] = isset($config['bridge']['filteringbridge']); $pconfig['ipv6nat_enable'] = isset($config['diag']['ipv6nat']['enable']); $pconfig['ipv6nat_ipaddr'] = $config['diag']['ipv6nat']['ipaddr']; $pconfig['cert'] = base64_decode($config['system']['webgui']['certificate']); $pconfig['key'] = base64_decode($config['system']['webgui']['private-key']); $pconfig['disableconsolemenu'] = isset($config['system']['disableconsolemenu']); $pconfig['disablefirmwarecheck'] = isset($config['system']['disablefirmwarecheck']); $pconfig['allowipsecfrags'] = isset($config['filter']['allowipsecfrags']); $pconfig['expanddiags'] = isset($config['system']['webgui']['expanddiags']); if ($g['platform'] == "generic-pc") $pconfig['harddiskstandby'] = $config['system']['harddiskstandby']; $pconfig['bypassstaticroutes'] = isset($config['filter']['bypassstaticroutes']); $pconfig['noantilockout'] = isset($config['system']['webgui']['noantilockout']); $pconfig['tcpidletimeout'] = $config['filter']['tcpidletimeout']; $pconfig['preferoldsa_enable'] = isset($config['ipsec']['preferoldsa']); $pconfig['polling_enable'] = isset($config['system']['polling']); $pconfig['ipfstatentries'] = $config['diag']['ipfstatentries']; $pconfig['watchdog'] = isset($config['system']['watchdog']); if ($_POST) { unset($input_errors); $pconfig = $_POST; /* input validation */ if ($_POST['ipv6nat_enable'] && !is_ipaddr($_POST['ipv6nat_ipaddr'])) { $input_errors[] = "You must specify an IP address to NAT IPv6 packets."; } if ($_POST['tcpidletimeout'] && !is_numericint($_POST['tcpidletimeout'])) { $input_errors[] = "The TCP idle timeout must be an integer."; } if ($_POST['ipfstatentries'] && !is_numericint($_POST['ipfstatentries'])) { $input_errors[] = "The 'firewall states displayed' value must be an integer."; } if (($_POST['cert'] && !$_POST['key']) || ($_POST['key'] && !$_POST['cert'])) { $input_errors[] = "Certificate and key must always be specified together."; } else if ($_POST['cert'] && $_POST['key']) { if (!strstr($_POST['cert'], "BEGIN CERTIFICATE") || !strstr($_POST['cert'], "END CERTIFICATE")) $input_errors[] = "This certificate does not appear to be valid."; if (!strstr($_POST['key'], "BEGIN RSA PRIVATE KEY") || !strstr($_POST['key'], "END RSA PRIVATE KEY")) $input_errors[] = "This key does not appear to be valid."; } if (!$input_errors) { $config['bridge']['filteringbridge'] = $_POST['filteringbridge_enable'] ? true : false; $config['diag']['ipv6nat']['enable'] = $_POST['ipv6nat_enable'] ? true : false; $config['diag']['ipv6nat']['ipaddr'] = $_POST['ipv6nat_ipaddr']; $oldcert = $config['system']['webgui']['certificate']; $oldkey = $config['system']['webgui']['private-key']; $config['system']['webgui']['certificate'] = base64_encode($_POST['cert']); $config['system']['webgui']['private-key'] = base64_encode($_POST['key']); $config['system']['disableconsolemenu'] = $_POST['disableconsolemenu'] ? true : false; $config['system']['disablefirmwarecheck'] = $_POST['disablefirmwarecheck'] ? true : false; $config['filter']['allowipsecfrags'] = $_POST['allowipsecfrags'] ? true : false; $config['system']['webgui']['expanddiags'] = $_POST['expanddiags'] ? true : false; if ($g['platform'] == "generic-pc") { $oldharddiskstandby = $config['system']['harddiskstandby']; $config['system']['harddiskstandby'] = $_POST['harddiskstandby']; } $config['system']['webgui']['noantilockout'] = $_POST['noantilockout'] ? true : false; $config['filter']['bypassstaticroutes'] = $_POST['bypassstaticroutes'] ? true : false; $config['filter']['tcpidletimeout'] = $_POST['tcpidletimeout']; $oldpreferoldsa = $config['ipsec']['preferoldsa']; $config['ipsec']['preferoldsa'] = $_POST['preferoldsa_enable'] ? true : false; $config['system']['polling'] = $_POST['polling_enable'] ? true : false; if (!$_POST['ipfstatentries']) unset($config['diag']['ipfstatentries']); else $config['diag']['ipfstatentries'] = $_POST['ipfstatentries']; $config['system']['watchdog'] = $_POST['watchdog'] ? true : false; write_config(); if (($config['system']['webgui']['certificate'] != $oldcert) || ($config['system']['webgui']['private-key'] != $oldkey)) { touch($d_sysrebootreqd_path); } else if (($g['platform'] == "generic-pc") && ($config['system']['harddiskstandby'] != $oldharddiskstandby)) { if (!$config['system']['harddiskstandby']) { // Reboot needed to deactivate standby due to a stupid ATA-protocol touch($d_sysrebootreqd_path); unset($config['system']['harddiskstandby']); } else { // No need to set the standby-time if a reboot is needed anyway system_set_harddisk_standby(); } } $retval = 0; if (!file_exists($d_sysrebootreqd_path)) { config_lock(); $retval = filter_configure(); $retval |= interfaces_optional_configure(); if ($config['ipsec']['preferoldsa'] != $oldpreferoldsa) $retval |= vpn_ipsec_configure(); $retval |= system_polling_configure(); $retval |= system_set_termcap(); $retval |= system_watchdog_configure(); config_unlock(); } $savemsg = get_std_save_message($retval); } } ?>

Note: the options on this page are intended for use by advanced users only, and there's NO support for them.

IPv6 tunneling
  onclick="enable_change(false)"> NAT encapsulated IPv6 packets (IP protocol 41/RFC2893) to:

 (IP address)
Don't forget to add a firewall rule to permit IPv6 packets!
 
Filtering bridge
  > Enable filtering bridge
This will cause bridged packets to pass through the packet filter in the same way as routed packets do (by default bridged packets are always passed). If you enable this option, you'll have to add filter rules to selectively permit traffic from bridged interfaces.
 
webGUI SSL certificate/key
Certificate
Paste a signed certificate in X.509 PEM format here.
Key
Paste an RSA private key in PEM format here.
 
Miscellaneous
Console menu > Disable console menu
Changes to this option will take effect after a reboot.
Watchdog > Enable hardware watchdog
If the hardware watchdog is enabled, it will reset the CPU after a few seconds if the system software has stopped responding.
Firmware version check > Disable firmware version check
This will cause m0n0wall not to check for newer firmware versions when the System: Firmware page is viewed.
IPsec fragmented packets > Allow fragmented IPsec packets
This will cause m0n0wall to allow fragmented IP packets that are encapsulated in IPsec ESP packets.
TCP idle timeout seconds
Idle TCP connections will be removed from the state table after no packets have been received for the specified number of seconds. Don't set this too high or your state table could become full of connections that have been improperly shut down. The default is 2.5 hours.
Hard disk standby time
Puts the hard disk into standby mode when the selected amount of time after the last access has elapsed. Do not set this for CF cards.
Navigation > Keep diagnostics in navigation expanded
Static route filtering > Bypass firewall rules for traffic on the same interface
This option only applies if you have defined one or more static routes. If it is enabled, traffic that enters and leaves through the same interface will not be checked by the firewall. This may be desirable in some situations where multiple subnets are connected to the same interface.
webGUI anti-lockout > Disable webGUI anti-lockout rule
By default, access to the webGUI on the LAN interface is always permitted, regardless of the user-defined filter rule set. Enable this feature to control webGUI access (make sure to have a filter rule in place that allows you in, or you will lock yourself out!).
Hint: the "set LAN IP address" option in the console menu resets this setting as well.
IPsec SA preferral > Prefer old IPsec SAs
By default, if several SAs match, the newest one is preferred if it's at least 30 seconds old. Select this option to always prefer old SAs over new ones.
Device polling > Use device polling
Device polling is a technique that lets the system periodically poll network devices for new data instead of relying on interrupts. This can reduce CPU load and therefore increase throughput, at the expense of a slightly higher forwarding delay (the devices are polled 1000 times per second). Not all NICs support polling; see the m0n0wall homepage for a list of supported cards.
Firewall states displayed entries
Maxmimum number of firewall state entries to be displayed on the Diagnostics: Firewall state page. Default is 300. Setting this to a very high value will cause a slowdown when viewing the firewall states page, depending on your system's processing power.