From 40438c8ba1f7348d840e807e1c8446f5e8bf5561 Mon Sep 17 00:00:00 2001 From: BBcan177 Date: Tue, 9 Dec 2014 21:56:52 -0500 Subject: XHTML mods All
to
Widget Added alt="" to img tags Closed any open tags > to /> --- config/pfblockerng/pfblockerng_v6lists.xml | 114 ++++++++++++++--------------- 1 file changed, 57 insertions(+), 57 deletions(-) (limited to 'config/pfblockerng/pfblockerng_v6lists.xml') diff --git a/config/pfblockerng/pfblockerng_v6lists.xml b/config/pfblockerng/pfblockerng_v6lists.xml index a13db64f..c324b310 100644 --- a/config/pfblockerng/pfblockerng_v6lists.xml +++ b/config/pfblockerng/pfblockerng_v6lists.xml @@ -162,11 +162,11 @@ Alias Name aliasname - - Example: Badguys
- Do not include 'pfBlocker' or 'pfB_' in the Alias Name, it's done by package.
+ + Example: Badguys
+ Do not include 'pfBlocker' or 'pfB_' in the Alias Name, it's done by package.
International, special or space characters will be ignored in firewall alias names. -
]]> +
]]>
input 20 @@ -180,41 +180,41 @@ InfoLists info - 'Format' : Select the Format Type

+ 'Format' : Select the Format Type

'URL' : Add direct link to list: (Example: Ads, Spyware, - Proxies )

- 'pfSense Local File' Format :

+ Proxies )

+ 'pfSense Local File' Format :

  http(s)://127.0.0.1/NAME_OF_FILE   or   - /usr/local/www/NAME_OF_FILE    ((Files can also be placed in the /var/db/pfblockerng folders)

+ /usr/local/www/NAME_OF_FILE    ((Files can also be placed in the /var/db/pfblockerng folders)

- 'Header' : Enter the 'Header' Field it must be Unique, it will - name the Blocklist File and it will be referenced in the pfBlocker Widget. - Use a Unique Prefix per 'Alias Category' followed by a unique descriptor for each Blocklist.

]]> + 'Header' : The 'Header' Field must be Unique, it will + name the List File and it will be referenced in the pfBlockerNG Widget. + Use a Unique Prefix per 'Alias Category' followed by a unique descriptor for each List.

]]>
IPv6 Lists]]> none - 'Format' - Choose the file format that URL will retrieve.
+ 'Format' - Choose the file format that URL will retrieve.
-
  • 'txt' Plain txt Lists

  • -
  • 'gz' - IBlock GZ Lists in Range Format

  • -
  • 'gz_2' - Other GZ Lists in IP or CIDR only

  • -
  • 'zip' - ZIP'd Lists

  • -
  • 'block'- IP x.x.x.0 Block type

  • -
  • 'html' - Web Links

  • -
  • 'xlsx' - Excel Lists

  • -
  • 'rsync' - RSync Lists

  • -
  • 'SKIP' - This format can be used to 'Disable' an Individual List.

  • -
  • 'HOLD' - Once a List has been Downloaded, you can change to 'HOLD' to keep this list Static.
+
  • 'txt' Plain txt Lists

  • +
  • 'gz' - IBlock GZ Lists in Range Format

  • +
  • 'gz_2' - Other GZ Lists in IP or CIDR only

  • +
  • 'zip' - ZIP'd Lists

  • +
  • 'block'- IP x.x.x.0 Block type

  • +
  • 'html' - Web Links

  • +
  • 'xlsx' - Excel Lists

  • +
  • 'rsync' - RSync Lists

  • +
  • 'SKIP' - This format can be used to 'Disable' an Individual List.

  • +
  • 'HOLD' - Once a List has been Downloaded, you can change to 'HOLD' to keep this list Static.

  • - Note:
    - Downloaded or pfSense local file must have only one network per line and follows the syntax below:
    - Network ranges: TBC
    - IP Address: TBC
    - CIDR: TBC

    ]]> + Note:
    + Downloaded or pfSense local file must have only one network per line and follows the syntax below:
    + Network ranges: TBC
    + IP Address: TBC
    + CIDR: TBC


]]>
rowhelper @@ -242,7 +242,7 @@ 75 - Header + Header header input 15 @@ -251,41 +251,41 @@
List Action - Default : Disabled

- Select the Action for Firewall Rules on lists you have selected.

- 'Disabled' Rules: Disables selection and does nothing to selected Alias.

+ Default : Disabled

+ Select the Action for Firewall Rules on lists you have selected.

+ 'Disabled' Rules: Disables selection and does nothing to selected Alias.

- 'Deny' Rules:
+ 'Deny' Rules:
'Deny' rules create high priority 'block' or 'reject' rules on the stated interfaces. They don't change the 'pass' rules on other - interfaces. Typical uses of 'Deny' rules are:
+ interfaces. Typical uses of 'Deny' rules are:
  • Deny Both - blocks all traffic in both directions, if the source or destination IP is in the block list
  • Deny Inbound/Deny Outbound - blocks all traffic in one direction unless it is part of a session started by traffic sent in the other direction. Does not affect traffic in the other direction.
  • One way 'Deny' rules can be used to selectively block unsolicited incoming (new session) packets in one direction, while still allowing deliberate outgoing sessions to be created in the other direction.
- 'Permit' Rules:
- 'Permit' rules create high priority 'pass' rules on the stated interfaces. They are not the opposite of Deny rules, and don't create - any 'blocking' effect anywhere. They have priority over all Deny rules. Typical uses of 'Permit' rules are:
+ 'Permit' Rules:
+ 'Permit' rules create high priority 'pass' rules on the stated interfaces. They are the opposite of Deny rules, and don't create + any 'blocking' effect anywhere. They have priority over all Deny rules. Typical uses of 'Permit' rules are:
  • To ensure that traffic to/from the listed IPs will always be allowed in the stated directions. They override almost all other Firewall rules on the stated interfaces.
  • To act as a whitelist for Deny rule exceptions, for example if a large IP range or pre-created blocklist blocks a few IPs that should be accessible.
- 'Match' Rules:
- 'Match' or 'Log' only the traffic on the stated interfaces. This does not Block or Reject. It just Logs the traffic. + 'Match' Rules:
+ 'Match' or 'Log' only the traffic on the stated interfaces. This does not Block or Reject. It just Logs the traffic.
  • Match Both - Matches all traffic in both directions, if the source or destination IP is in the list.
  • -
  • Match Inbound/Match Outbound - Matches all traffic in one direction only.
- 'Alias' Rules:
+
  • Match Inbound/Match Outbound - Matches all traffic in one direction only.
  • + 'Alias' Rules:
    'Alias' rules create an alias for the list (and do nothing else). This enables a pfBlockerNG list to be used by name, in any firewall rule or pfSense function, as desired. -
    • Options    - Alias Deny,  Alias Permit,  Alias Match,  Alias Native

    • -
    • 'Alias Deny' can use De-Duplication and Reputation Processes if configured.

    • -
    • 'Alias Permit' and 'Alias Match' will be saved in the Same folder as the other Permit/Match Auto-Rules

    • -
    • 'Alias Native' lists are kept in their Native format without any modifications.
    +
    • Options    - Alias Deny,  Alias Permit,  Alias Match,  Alias Native

    • +
    • 'Alias Deny' can use De-Duplication and Reputation Processes if configured.

    • +
    • 'Alias Permit' and 'Alias Match' will be saved in the Same folder as the other Permit/Match Auto-Rules

    • +
    • 'Alias Native' lists are kept in their Native format without any modifications.
    When using 'Alias' rules, change (pfB_) to ( pfb_ ) in the beginning of rule description and Use the 'Exact' spelling of the Alias (no trailing Whitespace)  Custom 'Alias' rules with 'pfB_ xxx' description will be removed by package if - using Auto Rule Creation.

    Tip: You can create the Auto Rules and remove "auto rule" from the Rule + using Auto Rule Creation.

    Tip: You can create the Auto Rules and remove "auto rule" from the Rule Descriptions, then disable Auto Rules. This method will 'KEEP' these rules from being 'Deleted' which will allow editing for a Custom - Alias Configuration
    ]]> + Alias Configuration
    ]]>
    action select @@ -309,7 +309,7 @@ Update Frequency cron - Never
    + Never
    Select how often List files will be downloaded]]>
    select @@ -329,8 +329,8 @@ Weekly (Day of Week) dow - 1
    - Select the 'Weekly' ( Day of the Week ) to Update
    + 1
    + Select the 'Weekly' ( Day of the Week ) to Update
    This is only required for the 'Weekly' Frequency Selection. The 24 Hour Download 'Time' will be used.]]>
    select @@ -347,8 +347,8 @@ Enable Logging aliaslog - Enable
    - Select - Logging to Status: System Logs: FIREWALL ( Log )
    + Enable
    + Select - Logging to Status: System Logs: FIREWALL ( Log )
    This can be overriden by the 'Global Logging' Option in the General Tab.]]>
    select @@ -363,11 +363,11 @@ IPv6 Custom Address(es) custom - - Follow the syntax below:

    - Network ranges: TBC
    - IP Address: TBC
    - CIDR: TBC

    + + Follow the syntax below:

    + Network ranges: TBC
    + IP Address: TBC
    + CIDR: TBC

    You may use "#" after any IP/CIDR/Range to add comments. # Safe IP Address]]>
    textarea @@ -378,7 +378,7 @@ Update Custom List custom_update - Disable
    + Disable
    Select - Enable Update if changes are made to this List. Cron will also resync this list at the next Scheduled Update.]]>
    select -- cgit v1.2.3