On Debian 3.1 systems, IPtables rules are saved in /etc/iptables.up.rules and activated through /etc/network/interfaces, rather than using an init.d script.
---- Changes since 1.350 ----
Added a setup option to configure a firewall for a typical hosting server.
+---- Changes since 1.400 ----
+Show SNAT inputs in custom NAT chains.
"<input name=dpto size=6 value='$dpto'>"),"</td> </tr>\n";
}
-if (($table->{'name'} eq 'nat' && $rule->{'chain'} eq 'POSTROUTING') &&
+if (($table->{'name'} eq 'nat' && $rule->{'chain'} ne 'PREROUTING' &&
+ $rule->{'chain'} ne 'OUTPUT') &&
&can_jump("SNAT")) {
if ($rule->{'j'}->[1] eq 'SNAT') {
if ($rule->{'to-source'}->[1] =~
print "<table width=100%><tr>\n";
print "<form action=index.cgi>\n";
print "<td><input type=submit value='$text{'index_change'}'>\n";
- print "<select name=table>\n";
+ print "<select name=table onChange='form.submit()'>\n";
foreach $t (@tables) {
if (&can_edit_table($t->{'name'})) {
printf "<option value=%s %s>%s\n",
delete($rule->{'to-destination'});
}
}
- if ($table->{'name'} eq 'nat' && $rule->{'chain'} eq 'POSTROUTING') {
+ if ($table->{'name'} eq 'nat' && $rule->{'chain'} ne 'PREROUTING' &&
+ $rule->{'chain'} ne 'OUTPUT') {
if ($rule->{'j'}->[1] eq 'SNAT' && !$in{'snatdef'}) {
&check_ipaddress($in{'sipfrom'}) ||
&error($text{'save_esipfrom'});