1
|
<?php
|
2
|
/*
|
3
|
vpn_pptp.php
|
4
|
part of m0n0wall (http://m0n0.ch/wall)
|
5
|
|
6
|
Copyright (C) 2003-2005 Manuel Kasper <mk@neon1.net>.
|
7
|
All rights reserved.
|
8
|
|
9
|
Redistribution and use in source and binary forms, with or without
|
10
|
modification, are permitted provided that the following conditions are met:
|
11
|
|
12
|
1. Redistributions of source code must retain the above copyright notice,
|
13
|
this list of conditions and the following disclaimer.
|
14
|
|
15
|
2. Redistributions in binary form must reproduce the above copyright
|
16
|
notice, this list of conditions and the following disclaimer in the
|
17
|
documentation and/or other materials provided with the distribution.
|
18
|
|
19
|
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
|
20
|
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
|
21
|
AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
22
|
AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
|
23
|
OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
24
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
25
|
INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
26
|
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
27
|
ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
28
|
POSSIBILITY OF SUCH DAMAGE.
|
29
|
*/
|
30
|
|
31
|
##|+PRIV
|
32
|
##|*IDENT=page-vpn-vpnpptp
|
33
|
##|*NAME=VPN: VPN PPTP page
|
34
|
##|*DESCR=Allow access to the 'VPN: VPN PPTP' page.
|
35
|
##|*MATCH=vpn_pptp.php*
|
36
|
##|-PRIV
|
37
|
|
38
|
require("guiconfig.inc");
|
39
|
require_once("functions.inc");
|
40
|
require_once("filter.inc");
|
41
|
require_once("shaper.inc");
|
42
|
require_once("vpn.inc");
|
43
|
|
44
|
if (!is_array($config['pptpd']['radius'])) {
|
45
|
$config['pptpd']['radius'] = array();
|
46
|
}
|
47
|
$pptpcfg = &$config['pptpd'];
|
48
|
|
49
|
$pconfig['remoteip'] = $pptpcfg['remoteip'];
|
50
|
$pconfig['localip'] = $pptpcfg['localip'];
|
51
|
$pconfig['redir'] = $pptpcfg['redir'];
|
52
|
$pconfig['mode'] = $pptpcfg['mode'];
|
53
|
$pconfig['wins'] = $pptpcfg['wins'];
|
54
|
$pconfig['req128'] = isset($pptpcfg['req128']);
|
55
|
$pconfig['n_pptp_units'] = $pptpcfg['n_pptp_units'];
|
56
|
$pconfig['pptp_dns1'] = $pptpcfg['dns1'];
|
57
|
$pconfig['pptp_dns2'] = $pptpcfg['dns2'];
|
58
|
$pconfig['radiusenable'] = isset($pptpcfg['radius']['server']['enable']);
|
59
|
$pconfig['radiusissueips'] = isset($pptpcfg['radius']['radiusissueips']);
|
60
|
$pconfig['radiussecenable'] = isset($pptpcfg['radius']['server2']['enable']);
|
61
|
$pconfig['radacct_enable'] = isset($pptpcfg['radius']['accounting']);
|
62
|
$pconfig['radiusserver'] = $pptpcfg['radius']['server']['ip'];
|
63
|
$pconfig['radiusserverport'] = $pptpcfg['radius']['server']['port'];
|
64
|
$pconfig['radiusserveracctport'] = $pptpcfg['radius']['server']['acctport'];
|
65
|
$pconfig['radiussecret'] = $pptpcfg['radius']['server']['secret'];
|
66
|
$pconfig['radiusserver2'] = $pptpcfg['radius']['server2']['ip'];
|
67
|
$pconfig['radiusserver2port'] = $pptpcfg['radius']['server2']['port'];
|
68
|
$pconfig['radiusserver2acctport'] = $pptpcfg['radius']['server2']['acctport'];
|
69
|
$pconfig['radiussecret2'] = $pptpcfg['radius']['server2']['secret2'];
|
70
|
$pconfig['radius_acct_update'] = $pptpcfg['radius']['acct_update'];
|
71
|
$pconfig['radius_nasip'] = $pptpcfg['radius']['nasip'];
|
72
|
|
73
|
if ($_POST) {
|
74
|
|
75
|
if (isset($input_errors))
|
76
|
unset($input_errors);
|
77
|
$pconfig = $_POST;
|
78
|
|
79
|
/* input validation */
|
80
|
if ($_POST['mode'] == "server") {
|
81
|
$reqdfields = explode(" ", "localip remoteip");
|
82
|
$reqdfieldsn = array(gettext("Server address"),gettext("Remote start address"));
|
83
|
|
84
|
if ($_POST['radiusenable']) {
|
85
|
$reqdfields = array_merge($reqdfields, explode(" ", "radiusserver radiussecret"));
|
86
|
$reqdfieldsn = array_merge($reqdfieldsn,
|
87
|
array(gettext("RADIUS server address"),gettext("RADIUS shared secret")));
|
88
|
}
|
89
|
|
90
|
do_input_validation($_POST, $reqdfields, $reqdfieldsn, $input_errors);
|
91
|
|
92
|
if (($_POST['localip'] && !is_ipaddr($_POST['localip']))) {
|
93
|
$input_errors[] = gettext("A valid server address must be specified.");
|
94
|
}
|
95
|
if (is_ipaddr_configured($_POST['localip'])) {
|
96
|
$input_errors[] = gettext("'Server address' parameter should NOT be set to any IP address currently in use on this firewall.");
|
97
|
}
|
98
|
if (!is_ipaddr($_POST['remoteip'])) {
|
99
|
$input_errors[] = gettext("A valid remote start address must be specified.");
|
100
|
}
|
101
|
if (($_POST['radiusserver'] && !is_ipaddr($_POST['radiusserver']))) {
|
102
|
$input_errors[] = gettext("A valid RADIUS server address must be specified.");
|
103
|
}
|
104
|
|
105
|
if (!$input_errors) {
|
106
|
$subnet_start = ip2ulong($_POST['remoteip']);
|
107
|
$subnet_end = ip2ulong($_POST['remoteip']) + $_POST['n_pptp_units'] - 1;
|
108
|
|
109
|
if ((ip2ulong($_POST['localip']) >= $subnet_start) &&
|
110
|
(ip2ulong($_POST['localip']) <= $subnet_end)) {
|
111
|
$input_errors[] = gettext("The specified server address lies in the remote subnet.");
|
112
|
}
|
113
|
// TODO: Should this check be for any local IP address?
|
114
|
if ($_POST['localip'] == $config['interfaces']['lan']['ipaddr']) {
|
115
|
$input_errors[] = gettext("The specified server address is equal to the LAN interface address.");
|
116
|
}
|
117
|
}
|
118
|
} else if ($_POST['mode'] == "redir") {
|
119
|
$reqdfields = explode(" ", "redir");
|
120
|
$reqdfieldsn = array(gettext("PPTP redirection target address"));
|
121
|
|
122
|
do_input_validation($_POST, $reqdfields, $reqdfieldsn, $input_errors);
|
123
|
|
124
|
if (($_POST['redir'] && !is_ipaddr($_POST['redir']))) {
|
125
|
$input_errors[] = gettext("A valid target address must be specified.");
|
126
|
}
|
127
|
} else if (isset($config['pptpd']['mode'])) {
|
128
|
unset($config['pptpd']['mode']);
|
129
|
}
|
130
|
|
131
|
if (!$input_errors) {
|
132
|
$pptpcfg['remoteip'] = $_POST['remoteip'];
|
133
|
$pptpcfg['redir'] = $_POST['redir'];
|
134
|
$pptpcfg['localip'] = $_POST['localip'];
|
135
|
$pptpcfg['mode'] = $_POST['mode'];
|
136
|
$pptpcfg['wins'] = $_POST['wins'];
|
137
|
$pptpcfg['n_pptp_units'] = $_POST['n_pptp_units'];
|
138
|
$pptpcfg['radius']['server']['ip'] = $_POST['radiusserver'];
|
139
|
$pptpcfg['radius']['server']['port'] = $_POST['radiusserverport'];
|
140
|
$pptpcfg['radius']['server']['acctport'] = $_POST['radiusserveracctport'];
|
141
|
$pptpcfg['radius']['server']['secret'] = $_POST['radiussecret'];
|
142
|
$pptpcfg['radius']['server2']['ip'] = $_POST['radiusserver2'];
|
143
|
$pptpcfg['radius']['server2']['port'] = $_POST['radiusserver2port'];
|
144
|
$pptpcfg['radius']['server2']['acctport'] = $_POST['radiusserver2acctport'];
|
145
|
$pptpcfg['radius']['server2']['secret2'] = $_POST['radiussecret2'];
|
146
|
$pptpcfg['radius']['nasip'] = $_POST['radius_nasip'];
|
147
|
$pptpcfg['radius']['acct_update'] = $_POST['radius_acct_update'];
|
148
|
|
149
|
if ($_POST['pptp_dns1'] == "") {
|
150
|
if (isset($pptpcfg['dns1']))
|
151
|
unset($pptpcfg['dns1']);
|
152
|
} else
|
153
|
$pptpcfg['dns1'] = $_POST['pptp_dns1'];
|
154
|
|
155
|
if ($_POST['pptp_dns2'] == "") {
|
156
|
if (isset($pptpcfg['dns2']))
|
157
|
unset($pptpcfg['dns2']);
|
158
|
} else
|
159
|
$pptpcfg['dns2'] = $_POST['pptp_dns2'];
|
160
|
|
161
|
if($_POST['req128'] == "yes")
|
162
|
$pptpcfg['req128'] = true;
|
163
|
else if (isset($pptpcfg['req128']))
|
164
|
unset($pptpcfg['req128']);
|
165
|
|
166
|
if($_POST['radiusenable'] == "yes")
|
167
|
$pptpcfg['radius']['server']['enable'] = true;
|
168
|
else if (isset($pptpcfg['radius']['server']['enable']))
|
169
|
unset($pptpcfg['radius']['server']['enable']);
|
170
|
|
171
|
if($_POST['radiussecenable'] == "yes")
|
172
|
$pptpcfg['radius']['server2']['enable'] = true;
|
173
|
else if (isset($pptpcfg['radius']['server2']['enable']))
|
174
|
unset($pptpcfg['radius']['server2']['enable']);
|
175
|
|
176
|
if($_POST['radacct_enable'] == "yes")
|
177
|
$pptpcfg['radius']['accounting'] = true;
|
178
|
else if (isset($pptpcfg['radius']['accounting']))
|
179
|
unset($pptpcfg['radius']['accounting']);
|
180
|
|
181
|
if($_POST['radiusissueips'] == "yes") {
|
182
|
$pptpcfg['radius']['radiusissueips'] = true;
|
183
|
} else if (isset($pptpcfg['radius']['radiusissueips']))
|
184
|
unset($pptpcfg['radius']['radiusissueips']);
|
185
|
|
186
|
write_config();
|
187
|
|
188
|
$retval = 0;
|
189
|
$retval = vpn_pptpd_configure();
|
190
|
$savemsg = get_std_save_message($retval);
|
191
|
|
192
|
filter_configure();
|
193
|
}
|
194
|
}
|
195
|
|
196
|
$pgtitle = array(gettext("VPN"),gettext("VPN PPTP"));
|
197
|
$shortcut_section = "pptps";
|
198
|
include("head.inc");
|
199
|
|
200
|
?>
|
201
|
|
202
|
<body link="#0000CC" vlink="#0000CC" alink="#0000CC">
|
203
|
<?php include("fbegin.inc"); ?>
|
204
|
<script type="text/javascript">
|
205
|
//<![CDATA[
|
206
|
function get_radio_value(obj)
|
207
|
{
|
208
|
for (i = 0; i < obj.length; i++) {
|
209
|
if (obj[i].checked)
|
210
|
return obj[i].value;
|
211
|
}
|
212
|
return null;
|
213
|
}
|
214
|
|
215
|
function enable_change(enable_over) {
|
216
|
if ((get_radio_value(document.iform.mode) == "server") || enable_over) {
|
217
|
document.iform.remoteip.disabled = 0;
|
218
|
document.iform.localip.disabled = 0;
|
219
|
document.iform.req128.disabled = 0;
|
220
|
document.iform.radiusenable.disabled = 0;
|
221
|
document.iform.radiusissueips.disabled = 0;
|
222
|
document.iform.wins.disabled = 0;
|
223
|
document.iform.n_pptp_units.disabled = 0;
|
224
|
document.iform.pptp_dns1.disabled = 0;
|
225
|
document.iform.pptp_dns2.disabled = 0;
|
226
|
|
227
|
if (document.iform.radiusenable.checked || enable_over) {
|
228
|
document.iform.radiussecenable.disabled = 0;
|
229
|
document.iform.radacct_enable.disabled = 0;
|
230
|
document.iform.radiusserver.disabled = 0;
|
231
|
document.iform.radiusserverport.disabled = 0;
|
232
|
document.iform.radiusserveracctport.disabled = 0;
|
233
|
document.iform.radiussecret.disabled = 0;
|
234
|
document.iform.radius_nasip.disabled = 0;
|
235
|
document.iform.radius_acct_update.disabled = 0;
|
236
|
document.iform.radiusissueips.disabled = 0;
|
237
|
if (document.iform.radiussecenable.checked || enable_over) {
|
238
|
document.iform.radiusserver2.disabled = 0;
|
239
|
document.iform.radiussecret2.disabled = 0;
|
240
|
document.iform.radiusserver2port.disabled = 0;
|
241
|
document.iform.radiusserver2acctport.disabled = 0;
|
242
|
} else {
|
243
|
|
244
|
document.iform.radiusserver2.disabled = 1;
|
245
|
document.iform.radiussecret2.disabled = 1;
|
246
|
document.iform.radiusserver2port.disabled = 1;
|
247
|
document.iform.radiusserver2acctport.disabled = 1;
|
248
|
}
|
249
|
} else {
|
250
|
document.iform.radacct_enable.disabled = 1;
|
251
|
document.iform.radiusserver.disabled = 1;
|
252
|
document.iform.radiusserverport.disabled = 1;
|
253
|
document.iform.radiusissueips.disabled = 1;
|
254
|
document.iform.radiusserveracctport.disabled = 1;
|
255
|
document.iform.radiussecret.disabled = 1;
|
256
|
document.iform.radius_nasip.disabled = 1;
|
257
|
document.iform.radius_acct_update.disabled = 1;
|
258
|
document.iform.radiusissueips.disabled = 1;
|
259
|
document.iform.radiusserver2.disabled = 1;
|
260
|
document.iform.radiussecret2.disabled = 1;
|
261
|
document.iform.radiusserver2port.disabled = 1;
|
262
|
document.iform.radiusserver2acctport.disabled = 1;
|
263
|
}
|
264
|
|
265
|
} else {
|
266
|
document.iform.remoteip.disabled = 1;
|
267
|
document.iform.localip.disabled = 1;
|
268
|
document.iform.req128.disabled = 1;
|
269
|
document.iform.n_pptp_units.disabled = 1;
|
270
|
document.iform.pptp_dns1.disabled = 1;
|
271
|
document.iform.pptp_dns2.disabled = 1;
|
272
|
document.iform.radiusenable.disabled = 1;
|
273
|
document.iform.radacct_enable.disabled = 1;
|
274
|
document.iform.radiusserver.disabled = 1;
|
275
|
document.iform.radiusserverport.disabled = 1;
|
276
|
document.iform.radiusissueips.disabled = 1;
|
277
|
document.iform.radiusserveracctport.disabled = 1;
|
278
|
document.iform.radiussecret.disabled = 1;
|
279
|
document.iform.radius_nasip.disabled = 1;
|
280
|
document.iform.radius_acct_update.disabled = 1;
|
281
|
document.iform.radiussecenable.disabled = 1;
|
282
|
document.iform.radiusserver2.disabled = 1;
|
283
|
document.iform.radiusserver2port.disabled = 1;
|
284
|
document.iform.radiusserver2acctport.disabled = 1;
|
285
|
document.iform.radiussecret2.disabled = 1;
|
286
|
document.iform.wins.disabled = 1;
|
287
|
document.iform.radiusissueips.disabled = 1;
|
288
|
}
|
289
|
if ((get_radio_value(document.iform.mode) == "redir") || enable_over) {
|
290
|
document.iform.redir.disabled = 0;
|
291
|
} else {
|
292
|
document.iform.redir.disabled = 1;
|
293
|
}
|
294
|
}
|
295
|
//]]>
|
296
|
</script>
|
297
|
<form action="vpn_pptp.php" method="post" name="iform" id="iform">
|
298
|
<?php if ($input_errors) print_input_errors($input_errors); ?>
|
299
|
<?php if ($savemsg) print_info_box($savemsg); ?>
|
300
|
<?php print_info_box(gettext("PPTP is no longer considered a secure VPN technology because it relies upon MS-CHAPv2 which has been compromised. If you continue to use PPTP be aware that intercepted traffic can be decrypted by a third party, so it should be considered unencrypted. We advise migrating to another VPN type such as OpenVPN or IPsec.<br /><br /><a href=\"https://isc.sans.edu/diary/End+of+Days+for+MS-CHAPv2/13807\">Read More</a>")); ?>
|
301
|
<table width="100%" border="0" cellpadding="0" cellspacing="0" summary="vpn pptp">
|
302
|
<tr><td class="tabnavtbl">
|
303
|
<?php
|
304
|
$tab_array = array();
|
305
|
$tab_array[0] = array(gettext("Configuration"), true, "vpn_pptp.php");
|
306
|
$tab_array[1] = array(gettext("Users"), false, "vpn_pptp_users.php");
|
307
|
display_top_tabs($tab_array);
|
308
|
?>
|
309
|
</td></tr>
|
310
|
<tr>
|
311
|
<td>
|
312
|
<div id="mainarea">
|
313
|
<table class="tabcont" width="100%" border="0" cellpadding="6" cellspacing="0" summary="main area">
|
314
|
<tr>
|
315
|
<td width="22%" valign="top" class="vtable"> </td>
|
316
|
<td width="78%" class="vtable">
|
317
|
<input name="mode" type="radio" onclick="enable_change(false)" value="off"
|
318
|
<?php if (($pconfig['mode'] != "server") && ($pconfig['mode'] != "redir")) echo "checked=\"checked\"";?> />
|
319
|
<?=gettext("Off"); ?></td>
|
320
|
</tr>
|
321
|
<tr>
|
322
|
<td width="22%" valign="top" class="vtable"> </td>
|
323
|
<td width="78%" class="vtable">
|
324
|
|
325
|
<input type="radio" name="mode" value="redir" onclick="enable_change(false)" <?php if ($pconfig['mode'] == "redir") echo "checked=\"checked\"" ?> />
|
326
|
<?=gettext("Redirect incoming PPTP connections to");?>:</td>
|
327
|
</tr>
|
328
|
<tr>
|
329
|
<td width="22%" valign="top" class="vncellreq"><?=gettext("PPTP redirection");?></td>
|
330
|
<td width="78%" class="vtable">
|
331
|
<?=$mandfldhtml;?><input name="redir" type="text" class="formfld unknown" id="redir" size="20" value="<?=htmlspecialchars($pconfig['redir']);?>" />
|
332
|
<br />
|
333
|
<?=gettext("Enter the IP address of a host which will accept incoming " .
|
334
|
"PPTP connections"); ?>.</td>
|
335
|
</tr>
|
336
|
<tr>
|
337
|
<td width="22%" valign="top" class="vtable"> </td>
|
338
|
<td width="78%" class="vtable">
|
339
|
<input type="radio" name="mode" value="server" onclick="enable_change(false)" <?php if ($pconfig['mode'] == "server") echo "checked=\"checked\""; ?> />
|
340
|
<?=gettext("Enable PPTP server"); ?></td>
|
341
|
</tr>
|
342
|
<tr>
|
343
|
<td width="22%" valign="top" class="vncellreq"><?=gettext("No. PPTP users"); ?></td>
|
344
|
<td width="78%" class="vtable">
|
345
|
<select id="n_pptp_units" name="n_pptp_units">
|
346
|
<?php
|
347
|
$toselect = ($pconfig['n_pptp_units'] > 0) ? $pconfig['n_pptp_units'] : 16;
|
348
|
for($x=1; $x<255; $x++) {
|
349
|
if($x == $toselect)
|
350
|
$SELECTED = " selected=\"selected\"";
|
351
|
else
|
352
|
$SELECTED = "";
|
353
|
echo "<option value=\"{$x}\"{$SELECTED}>{$x}</option>\n";
|
354
|
}
|
355
|
?>
|
356
|
</select>
|
357
|
<br /><?=gettext("Hint: 10 is ten PPTP clients"); ?>
|
358
|
</td>
|
359
|
</tr>
|
360
|
<tr>
|
361
|
<td width="22%" valign="top" class="vncellreq"><?=gettext("Server address"); ?></td>
|
362
|
<td width="78%" class="vtable">
|
363
|
<?=$mandfldhtml;?><input name="localip" type="text" class="formfld unknown" id="localip" size="20" value="<?=htmlspecialchars($pconfig['localip']);?>" />
|
364
|
<br />
|
365
|
<?=gettext("Enter the IP address the PPTP server should give to clients for use as their \"gateway\""); ?>.
|
366
|
<br />
|
367
|
<?=gettext("Typically this is set to an unused IP just outside of the client range"); ?>.
|
368
|
<br />
|
369
|
<br />
|
370
|
<?=gettext("NOTE: This should NOT be set to any IP address currently in use on this firewall"); ?>.</td>
|
371
|
</tr>
|
372
|
<tr>
|
373
|
<td width="22%" valign="top" class="vncellreq"><?=gettext("Remote address " .
|
374
|
"range"); ?></td>
|
375
|
<td width="78%" class="vtable">
|
376
|
<?=$mandfldhtml;?><input name="remoteip" type="text" class="formfld unknown" id="remoteip" size="20" value="<?=htmlspecialchars($pconfig['remoteip']);?>" />
|
377
|
<br />
|
378
|
<?=gettext("Specify the starting address for the client IP subnet"); ?>.<br />
|
379
|
</td>
|
380
|
</tr>
|
381
|
<tr>
|
382
|
<td width="22%" valign="top" class="vncell"><?=gettext("PPTP DNS Servers"); ?></td>
|
383
|
<td width="78%" class="vtable">
|
384
|
<?=$mandfldhtml;?><input name="pptp_dns1" type="text" class="formfld unknown" id="pptp_dns1" size="20" value="<?=htmlspecialchars($pconfig['pptp_dns1']);?>" />
|
385
|
<br />
|
386
|
<input name="pptp_dns2" type="text" class="formfld unknown" id="pptp_dns2" size="20" value="<?=htmlspecialchars($pconfig['pptp_dns2']);?>" />
|
387
|
<br />
|
388
|
<?=gettext("primary and secondary DNS servers assigned to PPTP clients"); ?><br />
|
389
|
</td>
|
390
|
</tr>
|
391
|
<tr>
|
392
|
<td width="22%" valign="top" class="vncell"><?=gettext("WINS Server"); ?></td>
|
393
|
<td width="78%" valign="top" class="vtable">
|
394
|
<input name="wins" class="formfld unknown" id="wins" size="20" value="<?=htmlspecialchars($pconfig['wins']);?>" />
|
395
|
</td>
|
396
|
</tr>
|
397
|
<tr>
|
398
|
<td width="22%" valign="top" class="vncell"><?=gettext("RADIUS"); ?></td>
|
399
|
<td width="78%" class="vtable">
|
400
|
<input name="radiusenable" type="checkbox" id="radiusenable" onclick="enable_change(false)" value="yes" <?php if ($pconfig['radiusenable']) echo "checked=\"checked\""; ?> />
|
401
|
<strong><?=gettext("Use a RADIUS server for authentication"); ?></strong><br />
|
402
|
<?=gettext("When set, all users will be authenticated using " .
|
403
|
"the RADIUS server specified below. The local user database " .
|
404
|
"will not be used"); ?>.<br />
|
405
|
<br />
|
406
|
<input name="radacct_enable" type="checkbox" id="radacct_enable" onclick="enable_change(false)" value="yes" <?php if ($pconfig['radacct_enable']) echo "checked=\"checked\""; ?> />
|
407
|
<strong><?=gettext("Enable RADIUS accounting"); ?> <br />
|
408
|
</strong><?=gettext("Sends accounting packets to the RADIUS server"); ?>.<br />
|
409
|
<br />
|
410
|
<input name="radiussecenable" type="checkbox" id="radiussecenable" onclick="enable_change(false)" value="yes" <?php if ($pconfig['radiussecenable']) echo "checked=\"checked\""; ?> />
|
411
|
<strong><?=gettext("Secondary RADIUS server for failover authentication"); ?></strong><br />
|
412
|
<?=gettext("When set, all requests will go to the secondary server when primary fails"); ?><br />
|
413
|
<br />
|
414
|
<input name="radiusissueips" value="yes" type="checkbox" class="formfld" id="radiusissueips"<?php if($pconfig['radiusissueips']) echo " checked=\"checked\""; ?> />
|
415
|
<strong><?=gettext("RADIUS issued IPs"); ?></strong>
|
416
|
<br /><?=gettext("Issue IP addresses via RADIUS server"); ?>.
|
417
|
</td>
|
418
|
</tr>
|
419
|
<tr>
|
420
|
<td width="22%" valign="top" class="vncell"><?=gettext("RADIUS NAS IP"); ?></td>
|
421
|
<td width="78%" valign="top" class="vtable">
|
422
|
<input name="radius_nasip" class="formfld unknown" id="radius_nasip" size="20" value="<?=htmlspecialchars($pconfig['radius_nasip']);?>" />
|
423
|
</td>
|
424
|
</tr>
|
425
|
<tr>
|
426
|
<td width="22%" valign="top" class="vncell"><?=gettext("RADIUS Accounting Update"); ?></td>
|
427
|
<td width="78%" valign="top" class="vtable">
|
428
|
<input name="radius_acct_update" class="formfld unknown" id="radius_acct_update" size="20" value="<?=htmlspecialchars($pconfig['radius_acct_update']);?>" />
|
429
|
</td>
|
430
|
</tr>
|
431
|
<tr>
|
432
|
<td width="22%" valign="top" class="vncell"><?=gettext("RADIUS Server"); ?> </td>
|
433
|
<td width="78%" class="vtable">
|
434
|
<input name="radiusserver" type="text" class="formfld unknown" id="radiusserver" size="20" value="<?=htmlspecialchars($pconfig['radiusserver']);?>" />
|
435
|
<input name="radiusserverport" type="text" class="formfld unknown" id="radiusserverport" size="4" value="<?=htmlspecialchars($pconfig['radiusserverport']);?>" />
|
436
|
<input name="radiusserveracctport" type="text" class="formfld unknown" id="radiusserveracctport" size="4" value="<?=htmlspecialchars($pconfig['radiusserveracctport']);?>" />
|
437
|
<br />
|
438
|
<?=gettext("Enter the IP address, RADIUS port, and RADIUS accounting port of the RADIUS server"); ?>.</td>
|
439
|
</tr>
|
440
|
<tr>
|
441
|
<td width="22%" valign="top" class="vncell"><?=gettext("RADIUS shared secret"); ?></td>
|
442
|
<td width="78%" valign="top" class="vtable">
|
443
|
<input name="radiussecret" type="password" class="formfld pwd" id="radiussecret" size="20" value="<?=htmlspecialchars($pconfig['radiussecret']);?>" />
|
444
|
<br />
|
445
|
<?=gettext("Enter the shared secret that will be used to authenticate " .
|
446
|
"to the RADIUS server"); ?>.</td>
|
447
|
</tr>
|
448
|
<tr>
|
449
|
<td width="22%" valign="top" class="vncell"><?=gettext("Secondary RADIUS server"); ?> </td>
|
450
|
<td width="78%" class="vtable">
|
451
|
<input name="radiusserver2" type="text" class="formfld unknown" id="radiusserver2" size="20" value="<?=htmlspecialchars($pconfig['radiusserver2']);?>" />
|
452
|
<input name="radiusserver2port" type="text" class="formfld unknown" id="radiusserver2port" size="4" value="<?=htmlspecialchars($pconfig['radiusserver2port']);?>" />
|
453
|
<input name="radiusserver2acctport" type="text" class="formfld unknown" id="radiusserver2acctport" size="4" value="<?=htmlspecialchars($pconfig['radiusserver2acctport']);?>" />
|
454
|
<br />
|
455
|
<?=gettext("Enter the IP address, RADIUS port, and RADIUS accounting port of the RADIUS server"); ?>.</td>
|
456
|
</tr>
|
457
|
<tr>
|
458
|
<td width="22%" valign="top" class="vncell"><?=gettext("Secondary RADIUS shared secret"); ?></td>
|
459
|
<td width="78%" valign="top" class="vtable">
|
460
|
<input name="radiussecret2" type="password" class="formfld pwd" id="radiussecret2" size="20" value="<?=htmlspecialchars($pconfig['radiussecret2']);?>" />
|
461
|
<br />
|
462
|
<?=gettext("Enter the shared secret that will be used to authenticate " .
|
463
|
"to the secondary RADIUS server"); ?>.</td>
|
464
|
</tr>
|
465
|
<tr>
|
466
|
<td height="16" colspan="2" valign="top"></td>
|
467
|
</tr>
|
468
|
<tr>
|
469
|
<td width="22%" valign="middle"> </td>
|
470
|
<td width="78%" class="vtable">
|
471
|
<input name="req128" type="checkbox" id="req128" value="yes" <?php if ($pconfig['req128']) echo "checked=\"checked\""; ?> />
|
472
|
<strong><?=gettext("Require 128-bit encryption"); ?></strong><br />
|
473
|
<?=gettext("When set, only 128-bit encryption will be accepted. Otherwise " .
|
474
|
"40-bit and 56-bit encryption will be accepted as well. Note that " .
|
475
|
"encryption will always be forced on PPTP connections (i.e. " .
|
476
|
"unencrypted connections will not be accepted)"); ?>.</td>
|
477
|
</tr>
|
478
|
<tr>
|
479
|
<td width="22%" valign="top"> </td>
|
480
|
<td width="78%">
|
481
|
<input name="Submit" type="submit" class="formbtn" value="<?=gettext("Save"); ?>" onclick="enable_change(true)" />
|
482
|
</td>
|
483
|
</tr>
|
484
|
<tr>
|
485
|
<td width="22%" valign="top"> </td>
|
486
|
<td width="78%"><span class="vexpl"><span class="red"><strong><?=gettext("Note");?>:<br />
|
487
|
</strong></span><?=gettext("don't forget to ");?><a href="firewall_rules.php?if=pptp"><?=gettext("add a firewall rule"); ?></a> <?=gettext("to permit ".
|
488
|
"traffic from PPTP clients");?>!</span></td>
|
489
|
</tr>
|
490
|
</table>
|
491
|
</div>
|
492
|
</td>
|
493
|
</tr>
|
494
|
</table>
|
495
|
</form>
|
496
|
<script type="text/javascript">
|
497
|
//<![CDATA[
|
498
|
enable_change(false);
|
499
|
//]]>
|
500
|
</script>
|
501
|
<?php include("fend.inc"); ?>
|
502
|
</body>
|
503
|
</html>
|