diff --git a/html/cgi-bin/fwhosts.cgi b/html/cgi-bin/fwhosts.cgi index abb60c917..e608b0f3f 100755 --- a/html/cgi-bin/fwhosts.cgi +++ b/html/cgi-bin/fwhosts.cgi @@ -391,25 +391,14 @@ if ($fwhostsettings{'ACTION'} eq 'savehost') $errormessage=$errormessage.$Lang::tr{'fwhost err empty'}; $fwhostsettings{'ACTION'} = 'edithost'; }else{ - if($fwhostsettings{'type'} eq 'ip' && $fwhostsettings{'IP'}=~/^([0-9a-fA-F]{1,2}:){5}[0-9a-fA-F]{1,2}$/){ + if($fwhostsettings{'IP'}=~/^([0-9a-fA-F]{1,2}:){5}[0-9a-fA-F]{1,2}$/){ $fwhostsettings{'type'} = 'mac'; - }elsif($fwhostsettings{'type'} eq 'mac' && $fwhostsettings{'IP'}=~/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/){ - $fwhostsettings{'type'} = 'ip'; - }elsif($fwhostsettings{'type'} eq 'mac' && $fwhostsettings{'IP'}=~/^([0-9a-fA-F]{1,2}:){5}[0-9a-fA-F]{1,2}$/){ - $fwhostsettings{'type'} = 'mac'; - }elsif($fwhostsettings{'type'} eq 'ip' && $fwhostsettings{'IP'}=~/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/){ + }elsif($fwhostsettings{'IP'}=~/^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/){ $fwhostsettings{'type'} = 'ip'; }else{ $fwhostsettings{'type'} = ''; $errormessage=$Lang::tr{'fwhost err ipmac'}; } - if($fwhostsettings{'type'} eq 'mac' ) - { - if ($fwhostsettings{'IP'}!~/^([0-9a-fA-F]{1,2}:){5}[0-9a-fA-F]{1,2}$/ ) - { - $errormessage=$Lang::tr{'fwhost err mac'}; - } - } #check remark if ($fwhostsettings{'HOSTREMARK'} ne '' && !&validremark($fwhostsettings{'HOSTREMARK'})){ $errormessage=$Lang::tr{'fwhost err remark'}; @@ -1097,8 +1086,8 @@ sub addnet $fwhostsettings{'orgnetremark'}=$fwhostsettings{'NETREMARK'}; print< - $Lang::tr{'name'}:$Lang::tr{'fwhost netaddress'}:$Lang::tr{'netmask'}: - $Lang::tr{'remark'}: + $Lang::tr{'name'}:$Lang::tr{'fwhost netaddress'}:$Lang::tr{'netmask'}: + $Lang::tr{'remark'}: END if ($fwhostsettings{'ACTION'} eq 'editnet' || $fwhostsettings{'error'} eq 'on') @@ -1119,15 +1108,19 @@ sub addhost $fwhostsettings{'orgremark'}=$fwhostsettings{'HOSTREMARK'}; print< - $Lang::tr{'name'}: + $Lang::tr{'name'}: + END - if ($fwhostsettings{'type'} eq 'ip'){print "IP";}else{print "IP";} - if ($fwhostsettings{'type'} eq 'mac'){print "MAC";}else{print "MAC";} + # + #if ($fwhostsettings{'type'} eq 'ip'){print "IP";}else{print "IP";} + #if ($fwhostsettings{'type'} eq 'mac'){print "MAC";}else{print "MAC";} + # print<IP/MAC: - $Lang::tr{'remark'}: - $Lang::tr{'fwhost attention'}$Lang::tr{'fwhost macwarn'} - + + IP/MAC: + $Lang::tr{'remark'}: + $Lang::tr{'fwhost attention'}$Lang::tr{'fwhost macwarn'} + END if ($fwhostsettings{'ACTION'} eq 'edithost' || $fwhostsettings{'error'} eq 'on') @@ -1157,7 +1150,7 @@ sub addgrp if ($fwhostsettings{'update'} eq ''){ print< - $Lang::tr{'fwhost addgrpname'}$Lang::tr{'remark'}: + $Lang::tr{'fwhost addgrpname'}$Lang::tr{'remark'}: END }else{ @@ -1265,7 +1258,7 @@ sub addservice } print< - $Lang::tr{'fwhost srv_name'}:$Lang::tr{'fwhost prot'}: + $Lang::tr{'fwhost srv_name'}:$Lang::tr{'fwhost prot'}: END foreach ("TCP","UDP","ICMP") { @@ -1277,8 +1270,8 @@ END } } print<$Lang::tr{'fwhost port'}: - $Lang::tr{'fwhost icmptype'} + $Lang::tr{'fwhost port'}: + $Lang::tr{'fwhost icmptype'} END &General::readhasharray("${General::swroot}/fwhosts/icmp-types", \%icmptypes); print"All ICMP-Types"; @@ -1323,7 +1316,7 @@ sub addservicegrp if ($fwhostsettings{'updatesrvgrp'} eq ''){ print< - $Lang::tr{'fwhost addgrpname'}$Lang::tr{'remark'}: + $Lang::tr{'fwhost addgrpname'}$Lang::tr{'remark'}: END diff --git a/langs/de/cgi-bin/de.pl b/langs/de/cgi-bin/de.pl index 4ba95c7e5..d97739e8a 100644 --- a/langs/de/cgi-bin/de.pl +++ b/langs/de/cgi-bin/de.pl @@ -924,7 +924,7 @@ 'fwdfw man port' => 'Port(s) manuell:', 'fwdfw moveup' => 'Hoch', 'fwdfw movedown' => 'Runter', -'fwdfw p2p txt' => 'Hier können einzelne P2P Netzwerke erlaubt oder verboten werden. Das System setzt die Regeln automatisch unabhängig vom aktuellen Firewall Modus. Bitte beachten, dass ein erlaubtes P2P Netzwerk unter Umständen einen erheblichen Teil der Bandbreite beanspruchen kann, wenn der Client nicht korrekt konfiguriert ist.', +'fwdfw p2p txt' => 'Hier können einzelne P2P Netzwerke erlaubt oder verboten werden. Das System setzt die Regeln automatisch unabhängig vom aktuellen Firewall Modus. Unter Umständen können einzelne aktivierte P2P Netzewerke einen erheblichen Teil der Bandbreite beanspruchen.', 'fwdfw pol allow' => 'Zugelassen', 'fwdfw pol block' => 'Blockiert', 'fwdfw pol title' => 'Standardverhalten der Firewall', @@ -1010,16 +1010,16 @@ 'fwhost icmptype' => 'ICMP-Typ:', 'fwhost ipadr' => 'IP Adresse:', 'fwhost ip_mac' => 'IP/MAC Adresse', -'fwhost ipsec host' => 'IpSec Clients:', -'fwhost ipsec net' => 'IpSec Netzwerke:', +'fwhost ipsec host' => 'IPsec Clients:', +'fwhost ipsec net' => 'IPsec Netzwerke:', 'fwhost netaddress' => 'Netzwerk Adresse', -'fwhost newnet' => 'Netz Einstellungen', -'fwhost newhost' => 'Adress Einstellungen', -'fwhost newgrp' => 'Adress Gruppierung', -'fwhost newservice' => 'Dienst Einstellungen', -'fwhost newservicegrp' => 'Dienst Gruppierung', +'fwhost newnet' => 'Netz-Einstellungen', +'fwhost newhost' => 'Adress-Einstellungen', +'fwhost newgrp' => 'Adress-Gruppierung', +'fwhost newservice' => 'Dienst-Einstellungen', +'fwhost newservicegrp' => 'Dienst-Gruppierung', 'fwhost macwarn' => 'MAC Adressen können nicht als Ziel definiert werden. Solche Adressen werden ignoriert.', -'fwhost menu' => 'Firewall Gruppen', +'fwhost menu' => 'Firewall-Gruppen', 'fwhost orange' => 'Orange', 'fwhost ovpn_n2n' => 'OpenVPN N-2-N', 'fwhost port' => 'Port(s)', @@ -1045,13 +1045,13 @@ 'from email server' => 'Von Email Server', 'from email user' => 'Von Email Benutzer', 'from warn email bad' => 'Von Email Adresse ist nicht gültig', -'fw blue' => 'Firewall Optionen für das Blaue Interface', +'fw blue' => 'Firewall-Optionen für das Blaue Interface', 'fw default drop' => 'Firewall Policy', -'fw settings' => 'Firewall Einstellungen', +'fw settings' => 'Firewall-Einstellungen', 'fw settings color' => 'Farben in Regeltabelle anzeigen', 'fw settings remark' => 'Anmerkungen in Regeltabelle anzeigen', 'fw settings ruletable' => 'Leere Regeltabellen anzeigen', -'fw logging' => 'Firewall Logging', +'fw logging' => 'Firewall-Logging', 'gateway' => 'Gateway', 'gateway ip' => 'Gateway-IP', 'gen static key' => 'Statischen Schlüssel erzeugen', @@ -1505,7 +1505,7 @@ 'optional at cmd' => 'zusätzlicher Modembefehl', 'optional data' => '3. Optionale Einstellungen', 'options' => 'Optionen', -'options fw' => 'Firewall Optionen', +'options fw' => 'Firewall-Optionen', 'optionsfw portlist hint' => 'Die Liste der Ports muss durch ein Komma getrennt werden (z.B. 137,138). Sie können maximal bis zu 15 Ports pro Protokoll angeben.', 'optionsfw warning' => 'Verändern dieser Optionen bedingt einen Neustart der Firewall', 'or' => 'oder', diff --git a/langs/en/cgi-bin/en.pl b/langs/en/cgi-bin/en.pl index 6b9f6d4a5..99976d12a 100644 --- a/langs/en/cgi-bin/en.pl +++ b/langs/en/cgi-bin/en.pl @@ -949,7 +949,7 @@ 'fwdfw man port' => 'Port(s) manual:', 'fwdfw moveup' => 'Move up', 'fwdfw movedown' => 'Move down', -'fwdfw p2p txt' => 'Here you can admit or deny or allow single p2p networks. Just define which networks are allowed or denied and the system takes care of the rules depending on the firewall mode. An allowed p2p network may use a lot of bandwith if the clients are not configured correctly.', +'fwdfw p2p txt' => 'Here you can admit or deny or allow single p2p networks. Just define which networks are allowed or denied and the system takes care of the rules depending on the firewall mode. An allowed p2p network may use a lot of bandwith.', 'fwdfw pol allow' => 'Allowed', 'fwdfw pol block' => 'Blocked', 'fwdfw pol title' => 'Firewall default behavior',