vpn_ipsec_settings.php 11.7 KB
Newer Older
Ad Schellevis's avatar
Ad Schellevis committed
1
<?php
2

Ad Schellevis's avatar
Ad Schellevis committed
3
/*
4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27
    Copyright (C) 2014-2015 Deciso B.V.
    Copyright (C) 2014 Electric Sheep Fencing, LLC
    All rights reserved.

    Redistribution and use in source and binary forms, with or without
    modification, are permitted provided that the following conditions are met:

    1. Redistributions of source code must retain the above copyright notice,
       this list of conditions and the following disclaimer.

    2. Redistributions in binary form must reproduce the above copyright
       notice, this list of conditions and the following disclaimer in the
       documentation and/or other materials provided with the distribution.

    THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
    INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
    AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
    AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
    SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
    INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
    CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
    ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
    POSSIBILITY OF SUCH DAMAGE.
Ad Schellevis's avatar
Ad Schellevis committed
28 29
*/

30
require_once("guiconfig.inc");
Ad Schellevis's avatar
Ad Schellevis committed
31
require_once("filter.inc");
32
require_once("ipsec.inc");
33
require_once("services.inc");
34
require_once("pfsense-utils.inc");
35
require_once("interfaces.inc");
Ad Schellevis's avatar
Ad Schellevis committed
36

37
if (!isset($config['ipsec']) || !is_array($config['ipsec'])) {
38
    $config['ipsec'] = array();
39
}
40

41 42 43 44 45 46 47 48
if ($_SERVER['REQUEST_METHOD'] === 'GET') {
    // fetch form data
    $pconfig  = array();
    $pconfig['noinstalllanspd'] = isset($config['system']['noinstalllanspd']);
    $pconfig['preferoldsa_enable'] = isset($config['ipsec']['preferoldsa']);
    foreach ($ipsec_loglevels as $lkey => $ldescr) {
        if (!empty($config['ipsec']["ipsec_{$lkey}"])) {
            $pconfig["ipsec_{$lkey}"] = $config['ipsec']["ipsec_{$lkey}"];
49
        } else {
50
            $pconfig["ipsec_{$lkey}"] = null;
51
        }
52 53 54 55 56 57 58 59 60 61
    }
    $pconfig['failoverforcereload'] = isset($config['ipsec']['failoverforcereload']);
    $pconfig['maxmss_enable'] = isset($config['system']['maxmss_enable']);
    $pconfig['maxmss'] = isset($config['system']['maxmss']) ? $config['system']['maxmss'] : null;
} elseif ($_SERVER['REQUEST_METHOD'] === 'POST') {
    // save form data
    $pconfig = $_POST;
    if (isset($pconfig['noinstalllanspd']) && $pconfig['noinstalllanspd'] == "yes") {
        $config['system']['noinstalllanspd'] = true;
    } elseif (isset($config['system']['noinstalllanspd'])) {
62
        unset($config['system']['noinstalllanspd']);
63 64 65 66 67 68
    }
    if (isset($pconfig['preferoldsa_enable']) && $pconfig['preferoldsa_enable'] == "yes") {
        $config['ipsec']['preferoldsa'] = true;
    } elseif (isset($config['ipsec']['preferoldsa'])) {
        unset($config['ipsec']['preferoldsa']);
    }
69
    if (isset($config['ipsec']) && is_array($config['ipsec'])) {
70 71 72 73
        foreach ($ipsec_loglevels as $lkey => $ldescr) {
            if (empty($_POST["ipsec_{$lkey}"])) {
                if (isset($config['ipsec']["ipsec_{$lkey}"])) {
                    unset($config['ipsec']["ipsec_{$lkey}"]);
74
                }
75 76
            } else {
                $config['ipsec']["ipsec_{$lkey}"] = $_POST["ipsec_{$lkey}"];
77 78
            }
        }
79
    }
80

81 82 83 84
    if (isset($pconfig['failoverforcereload']) && $pconfig['failoverforcereload'] == "yes") {
        $config['ipsec']['failoverforcereload'] = true;
    } elseif (isset($config['ipsec']['failoverforcereload']))
        unset($config['ipsec']['failoverforcereload']);
85

86 87 88 89 90 91 92
    if (isset($pconfig['maxmss_enable']) && $pconfig['maxmss_enable'] == "yes") {
        $config['system']['maxmss_enable'] = true;
        if (!empty($pconfig['maxmss']) && is_numericint($pconfig['maxmss'])) {
            $config['system']['maxmss'] = $pconfig['maxmss'];
        }
    } else {
        if (isset($config['system']['maxmss_enable'])) {
93 94
            unset($config['system']['maxmss_enable']);
        }
95 96
        if (isset($config['system']['maxmss'])) {
            unset($config['system']['maxmss']);
97
        }
98
    }
99

100
    write_config();
101 102
    $savemsg = get_std_save_message();
    filter_configure();
103
    ipsec_configure();
Ad Schellevis's avatar
Ad Schellevis committed
104 105
}

106
$service_hook = 'ipsec';
Ad Schellevis's avatar
Ad Schellevis committed
107 108

include("head.inc");
109

Ad Schellevis's avatar
Ad Schellevis committed
110 111
?>

112
<body>
Ad Schellevis's avatar
Ad Schellevis committed
113 114 115 116
<?php include("fbegin.inc"); ?>

<script type="text/javascript">
//<![CDATA[
117 118 119
$( document ).ready(function() {
    maxmss_checked()
});
Ad Schellevis's avatar
Ad Schellevis committed
120 121

function maxmss_checked(obj) {
122
  if ($('#maxmss_enable').is(":checked")) {
123 124 125 126 127 128 129 130 131
    $('#maxmss').attr('disabled',false);
    $("#maxmss").addClass('show');
    $("#maxmss").removeClass('hidden');
  } else {
    $('#maxmss').attr('disabled',true);
    $("#maxmss").addClass('hidden');
    $("#maxmss").removeClass('show');
  }

Ad Schellevis's avatar
Ad Schellevis committed
132 133 134 135
}

//]]>
</script>
136 137 138
  <section class="page-content-main">
    <div class="container-fluid">
      <div class="row">
139

140
<?php
141 142 143 144 145 146
if (isset($savemsg)) {
    print_info_box($savemsg);
}
if (isset($input_errors) && count($input_errors) > 0) {
    print_input_errors($input_errors);
}
147 148
?>
        <section class="col-xs-12">
149 150 151 152
          <div class="tab-content content-box col-xs-12">
              <form action="vpn_ipsec_settings.php" method="post" name="iform" id="iform">
                <div class="table-responsive">
                  <table class="table table-striped">
153 154 155 156
                    <tr>
                      <td ><strong><?=gettext("IPSec Advanced Settings"); ?></strong></td>
                      <td align="right">
                        <small><?=gettext("full help"); ?> </small>
157
                        <i class="fa fa-toggle-off text-danger"  style="cursor: pointer;" id="show_all_help_page" type="button"></i></a>
158
                      </td>
159 160
                    </tr>
                    <tr>
DokuKaefer's avatar
DokuKaefer committed
161
                      <td><a id="help_for_noinstalllanspd" href="#" class="showhelp"><i class="fa fa-info-circle"></i></a> <?=gettext("LAN security associations"); ?></td>
162
                      <td>
163 164 165
                        <input name="noinstalllanspd" type="checkbox" id="noinstalllanspd" value="yes" <?=!empty($pconfig['noinstalllanspd']) ? "checked=\"checked\""  : "";?> />
                        <strong><?=gettext("Do not install LAN SPD"); ?></strong>
                        <div class="hidden" for="help_for_noinstalllanspd">
166
                            <?=gettext("By default, if IPSec is enabled negating SPD are inserted to provide protection. " .
167 168 169
                                                  "This behaviour can be changed by enabling this setting which will prevent installing these SPDs."); ?>
                        </div>
                      </td>
170 171 172 173
                    </tr>
                    <tr>
                      <td><a id="help_for_preferoldsa_enable" href="#" class="showhelp"><i class="fa fa-info-circle"></i></a> <?=gettext("Security Associations"); ?></td>
                      <td width="78%" class="vtable">
174 175 176
                        <input name="preferoldsa_enable" type="checkbox" id="preferoldsa_enable" value="yes" <?= !empty($pconfig['preferoldsa_enable']) ? "checked=\"checked\"" : "";?> />
                        <strong><?=gettext("Prefer older IPsec SAs"); ?></strong>
                        <div class="hidden" for="help_for_preferoldsa_enable">
177
                            <?=gettext("By default, if several SAs match, the newest one is " .
178 179 180
                                                  "preferred if it's at least 30 seconds old. Select this " .
                                                  "option to always prefer old SAs over new ones."); ?>
                        </div>
181 182 183 184 185
                      </td>
                    </tr>
                    <tr>
                      <td><a id="help_for_ipsec_debug" href="#" class="showhelp"><i class="fa fa-info-circle"></i></a> <?=gettext("IPsec Debug"); ?></td>
                      <td>
186
                        <div class="hidden" for="help_for_ipsec_debug">
187
                                      <strong><?=gettext("Start IPSec in debug mode based on sections selected"); ?></strong> <br/>
188 189
                        </div>
<?php                   foreach ($ipsec_loglevels as $lkey => $ldescr) :
190
?>
191 192
                        <?=$ldescr?>
                        <select name="ipsec_<?=$lkey?>" id="ipsec_<?=$lkey?>">
193
<?php                   foreach (array("Silent", "Audit", "Control", "Diag", "Raw", "Highest") as $lidx => $lvalue) :
194 195
?>
                          <option value="<?=$lidx?>" <?= isset($pconfig["ipsec_{$lkey}"]) && $pconfig["ipsec_{$lkey}"] == $lidx ? "selected=\"selected\"" : "";?> ?>
196
                                <?=$lvalue?>
197 198
                          </option>
<?php
199
endforeach; ?>
200
                        </select>
201
<?php
202
endforeach; ?>
203
                        <div class="hidden" for="help_for_ipsec_debug">
204
                        <?=gettext("Launches IPSec in debug mode so that more verbose logs " .
205 206 207 208
                                                    "will be generated to aid in troubleshooting."); ?>
                        </div>
                      </td>
                    </tr>
209 210 211
                    <tr>
                      <td><a id="help_for_failoverforcereloadg" href="#" class="showhelp"><i class="fa fa-info-circle"></i></a> <?=gettext("IPsec Reload on Failover"); ?></td>
                      <td>
212 213 214
                        <input name="failoverforcereload" type="checkbox" id="failoverforcereload" value="yes" <?= !empty($pconfig['failoverforcereload']) ? "checked=\"checked\"" : "";?> />
                        <strong><?=gettext("Force IPsec Reload on Failover"); ?></strong>
                        <div class="hidden" for="help_for_failoverforcereloadg">
215
                            <?=gettext("In some circumstances using a gateway group as the interface for " .
216 217 218 219
                                                  "an IPsec tunnel does not function properly, and IPsec must be forcefully reloaded " .
                                                  "when a failover occurs. Because this will disrupt all IPsec tunnels, this behavior" .
                                                  " is disabled by default. Check this box to force IPsec to fully reload on failover."); ?>
                        </div>
220 221 222 223 224 225 226
                      </td>
                    </tr>
                    <tr>
                      <td><a id="help_for_maxmss_enable" href="#" class="showhelp"><i class="fa fa-info-circle"></i></a> <?=gettext("Maximum MSS"); ?></td>
                      <td>
                        <input name="maxmss_enable" type="checkbox" id="maxmss_enable" value="yes" <?= !empty($pconfig['maxmss_enable']) ? "checked=\"checked\"" : "" ;?> onclick="maxmss_checked()" />
                        <strong><?=gettext("Enable MSS clamping on VPN traffic"); ?></strong>
227 228
                        <input name="maxmss" id="maxmss" type="text" value="<?= !empty($pconfig['maxmss']) ? $pconfig['maxmss'] : "1400";
?>" <?= !empty($pconfig['maxmss_enable']) ? "disabled=\"disabled\"" : "" ;?> />
229
                        <div class="hidden" for="help_for_maxmss_enable">
230
                        <?=gettext("Enable MSS clamping on TCP flows over VPN. " .
231 232
                                                  "This helps overcome problems with PMTUD on IPsec VPN links. If left blank, the default value is 1400 bytes. "); ?>
                        </div>
233 234 235 236 237 238 239 240 241 242 243 244 245 246 247
                      </td>
                    </tr>
                    <tr>
                      <td>&nbsp;</td>
                      <td>
                        <input name="submit" type="submit" class="btn btn-primary" value="<?=gettext("Save"); ?>" />
                      </td>
                    </tr>
                  </table>
                </div>
              </form>
            </div>
          </section>
        </div>
      </div>
248
    </section>
249
<?php include("foot.inc");