1
0
mirror of https://github.com/fwbuilder/fwbuilder synced 2026-03-20 18:27:16 +01:00

1125 Commits

Author SHA1 Message Date
Vadim Kurland
8fee475805 * IOSImporter.cpp (createTCPUDPNeqObject): see #2248 implemented
import of Cisco IOS and PIX/ASA service configurations using port
operation "neq". Since object model in fwbuilder does not provide
direct support for "port not equal to" expression, this
configuration is conveted into two tcp or udp service objects with
port range extending below and above specified port and these two
service objects are then placed in a group.
2011-03-19 20:54:08 -07:00
Vadim Kurland
b158752a99 see #2240 changelog record 2011-03-19 18:26:59 -07:00
Vadim Kurland
ff2b5eee62 * IPTImporter.cpp (pushPolicyRule): change in the importer
behavior: configuration import is aborted with an appropriate
error message in the log when program enounters protocol or
service name that it does not recognize and can not convert to
protocol or port number. We used to replace port number with some
placeholder (usually 0) and mark rule as "bad" by coloring it red
and adding comment.
2011-03-19 18:23:36 -07:00
Vadim Kurland
f3f08d170d see #2239 added var firewall_name to installer configlets that define commands installer runs on the machine to activate policy 2011-03-17 12:36:52 -07:00
Vadim Kurland
0e71443165 updated changelog record 2011-03-16 17:09:35 -07:00
Vadim Kurland
027b629b42 updated changelog record 2011-03-16 17:07:06 -07:00
Vadim Kurland
6a56bcb794 updated changelog record 2011-03-16 17:04:43 -07:00
Vadim Kurland
26f9f171d0 see #1548 "Object
de-duplication during import process". Also SourceForge bug
2980566 "Import from hostsfile may cause duplicate Objects" and
3030072 "remove duplicates during any import". Now the program can
optionally re-use existing objects from both Standard Objects and
user-defined libraries when it imports existing firewall
configuration. This works for any firewall platform for which we
support policy import.
2011-03-16 16:59:29 -07:00
Vadim Kurland
b7d1170d70 see #2223 support for import of PIX/ASA named objects 2011-03-14 19:43:18 -07:00
Vadim Kurland
0aa3eac4d4 * Compiler.cpp (expandGroupsInRuleElement): sorting objects in the
rule element by name after group is expanded, this helps ensure
stable ordering of objects in generated configuration.

* Compiler.cpp (replaceClusterInterfaceInItfRE::processNext):
sorting objects in rule element after cluster interfaces have been
replaced, this helps ensure stable ordering of objects in generated
configuration.

* FWObject.h (FWObjectNameCmpPredicate): moved this class from
gui-specific module to libfwbuilder as it is universally useful.
It can compare FWObject objects by name and can optionally can
follow references; it can be used with std::sort() to sort lists
of FWObject pointers or directly sort rule elements.
2011-03-12 19:50:24 -08:00
Vadim Kurland
5893edb768 see #2212 changelog record 2011-03-12 16:41:11 -08:00
Vadim Kurland
c9f8e8bf3e see #2209 changelog record 2011-03-11 12:30:29 -08:00
Vadim Kurland
7ebdc6c238 see #2207, #2209, fixes #2213 all objects created by compilers are placed in persistent_objects library; CompilerDriver creates and manages persistent_objects lib; changes in libfwbuilder - an object can be a child of only one parent in the tree, method FWObject::add() enforces this and FWObject::findDuplicateLinks() can be used to find objects with multiple parents 2011-03-11 10:11:42 -08:00
Vadim Kurland
8d8cf4c9f2 * CustomServiceDialog.cpp (loadFWObject): fixes #2201 "Some fields
of locked object are editable". Some input fields of the Custom
Service object dialog were editable even when object was locked
read-only.
2011-03-08 19:12:37 -08:00
Vadim Kurland
3f10891723 * GroupObjectDialog.cpp (loadFWObject): fixes #2203 "Crash when
attempting to add an object to a locked group".
2011-03-08 19:07:28 -08:00
Vadim Kurland
a1111b83bd * PolicyCompiler.cpp (checkForShadowing): see #2204 "Shadowing
detected for rule with action Continue". Policy rules with action
"Continue" should not shadow other rules and can not be shadowed.
2011-03-08 19:02:19 -08:00
Vadim Kurland
de8921b32e * Importer.cpp (addStandardRuleComment): see #2189 Program adds
the file name and the line number to comments of policy and nat
rules it creates during import.
2011-03-08 18:15:57 -08:00
Vadim Kurland
f5e058fdd7 * IPTImporter.cpp (pushPolicyRule): see #2202 importer for
iptables creates Custom Service object to match combination of
states it does not recognize. This includes "NEW,ESTABLISHED".
2011-03-08 17:38:28 -08:00
Vadim Kurland
9632d9b141 see #2197 "iptables nat rules in
chain OUTPUT not imported correctly"
2011-03-07 18:49:22 -08:00
Vadim Kurland
304fa20d24 * iptables.g (nat_addr_range): see #2194 "iptables import problem
with SNAT rule translating to an address range". NAT rules
translating into address range did not import correctly
2011-03-07 18:44:57 -08:00
Vadim Kurland
610448d440 * IPTImporter.cpp (pushNATRule): fixes #2195 "incorrect iptables
import of nat rule with NETMAP target"
2011-03-07 18:26:58 -08:00
Vadim Kurland
a268a91f7b * IPTImporter.cpp (pushNATRule): see #2196 "iptables nat rules
with target REDIRECT not imported". Iptables NAT rules with target
REDIRECT where not imported correctly.

* IPTImporter.cpp (pushNATRule): see #2190 "support for import of
branches in NAT rules for iptables". Implemented import of NAT
rules in user-defined chains for iptables, these translate into
branching NAT rules in fwbuilder.
2011-03-07 18:21:04 -08:00
Vadim Kurland
85291843f5 * Importer.cpp (ignoreCurrentInterface): see #2152 "ASA Import -
shutdown interfaces". Importer recognizes and skips ASA interfaces
in "shutdown" mode.
2011-03-06 21:27:28 -08:00
Vadim Kurland
69d277ce41 see #2181 importr recognizes -i and -o 2011-03-06 20:14:47 -08:00
Vadim Kurland
2717d09f7e see #2170 checking combination of -i and -o interface and chain 2011-03-06 19:57:45 -08:00
Vadim Kurland
5c25bfb711 * IPTImporter.cpp (pushPolicyRule): see #2189 Policy importer
warnings and errors now include line numbers to help find relevant
lines in the original configuration file.
2011-03-06 13:16:11 -08:00
Vadim Kurland
d82b81682e fixes #2183 count errors and warnings generated by the importer and show the numbers in the progress page of the wizard 2011-03-05 15:48:02 -08:00
Vadim Kurland
85afa6dc8e see #2162 renamed menu item File / Import Firewall; see #2179 button Finish should be disabled while importer is still running 2011-03-05 11:06:22 -08:00
Vadim Kurland
2e65d946da see #2161 import wizard finished 2011-03-04 18:06:54 -08:00
Vadim Kurland
0ed86de82a new policy import wizard; see #2161 - automatic detection of firewall platform and host name works 2011-03-04 13:34:45 -08:00
Vadim Kurland
a0eb7989ef build 3491 2011-03-01 17:20:44 -08:00
Vadim Kurland
19ce284f21 see #2156 select new firewall in tree, expand subtree and open firewall object in the editor after successful import 2011-02-27 13:30:22 -08:00
Vadim Kurland
689e54005d see #2160 "Installer reports error "Generated script file
<firewall>.fw not found."". The problem was intorduced earlier
while fixing #2047
2011-02-27 12:39:22 -08:00
Vadim Kurland
73500e15c5 see #2153 Wizard shows
additional page when user imports PIX/ASA config. This page
explains concept of network zones and offers UI to let them choose
network objects or groups as a network zone of each interface.
2011-02-26 20:45:57 -08:00
Vadim Kurland
ff53d6bd07 see #2145 Vlan interfaces discovered in the process of PIX configuration
import should be created as subinterfaces of the corresponding
parent with correct interface type and vlan id.
2011-02-26 12:17:23 -08:00
Vadim Kurland
1714e27233 see #2146 Issue a warning when
parser encounters "standby" parameter in an interface
configuration. We do not support import of PIX failover
configuration at this time.
2011-02-26 11:09:38 -08:00
Vadim Kurland
1258c4580e new build 3488; see #2147 "ASA Import - some versions are not detected correctly". SEtting version in the created firewall object to the best match of the version found in imported config 2011-02-26 10:45:40 -08:00
Vadim Kurland
59562d852c see #87 tested parser on pix6, pix7 and asa8 configs, making sure it parses different interface configurations correctly 2011-02-25 20:40:04 -08:00
Vadim Kurland
98a2f51d52 see #2047
Do not
pass full path to the output file as an argument of the "-o"
option when the GUI launches policy compiler. Since the "-d"
option passes directory path where files sould be saved, actual
file names do not need to be absolute path, except if the user
entered absolute path for the output file name in the firewall
settings dialog.
2011-02-24 18:55:55 -08:00
Vadim Kurland
5b3160267d * configlets/freebsd/installer_commands_root: see #2143 "installer
should run /etc/rc.d/pf script to reload PF rules on FreeBSD when
generated script is in rc.conf format"
2011-02-24 17:28:57 -08:00
Vadim Kurland
d841231a28 * AddressTableDialog.cpp (browse): see #2140 "Attempting to create
new Address Table file results in read-only error". Implemented
support for the workflow when user wants to create the file used
to feed addresses to the AddressTable object.
2011-02-24 11:10:52 -08:00
Vadim Kurland
da776105be see #2139 show warning dialog and offer choice: open file for veiwing read-only or cancel 2011-02-24 10:19:46 -08:00
Vadim Kurland
25fa09d626 see #2135 Editing table objects 2011-02-23 19:28:22 -08:00
Vadim Kurland
85dad674bf new build 3485
* configlets/linux24/shell_functions: see #2130 "unnecessary
output when iptables script runs on the firewall". Ever since I
switched to using "command" to verify that various system
utilities generated script needs are present and can be used, the
scirpt produced extra lines in the log printing full path and
names to /usr/bin/logger, /sbin/ip etc. These lines are
unnecessary and should not be there. This problem was introduced
some time during the work on 4.2.0
2011-02-22 15:26:06 -08:00
Vadim Kurland
7bf0f8a4f4 see #2129
deprecate "test install" function. We have decided to deprecate test install because it is rather heavy-handed on Linux and PIX where it reboots the firewall and plain does not work on *BSD.
2011-02-22 15:12:26 -08:00
Vadim Kurland
e84751e95c see #2008 compiler avoids INPUT/OUTPUT chain if interface in the rule column "Interface" is a bridge port and firewall is bridging firewall (which means we are going to use --physdev-in or --physdev-out option for this rule) 2011-02-21 17:06:43 -08:00
Vadim Kurland
8ee59ebbf8 * newFirewallDialog.cpp (monitor): see #2126 Using snmp sysDescr
OID to guess version of the new firewall when it is created using
snmp polling.
2011-02-21 16:34:29 -08:00
Vadim Kurland
cdbd1e35c3 see #1990 newly created PIX/ASA firewalls now have "generate outbound acl" option turned on by default 2011-02-21 15:11:47 -08:00
Vadim Kurland
b42fe3e802 see #1678 When creating a firewall from template it appears that a default template is selected 2011-02-21 13:52:09 -08:00
Vadim Kurland
264d6bc3ee see #1971 dialog does not let user enter range end address lower than range start address 2011-02-21 13:35:13 -08:00