<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Recent changes to feature-requests</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/</link><description>Recent changes to feature-requests</description><atom:link href="https://sourceforge.net/p/fwbuilder/feature-requests/feed.rss" rel="self"/><language>en</language><lastBuildDate>Tue, 12 Jul 2016 07:52:01 -0000</lastBuildDate><atom:link href="https://sourceforge.net/p/fwbuilder/feature-requests/feed.rss" rel="self" type="application/rss+xml"/><item><title>#319 Mikrotik support</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/319/?limit=25#fc19</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I'm also interested!&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Michael Speth</dc:creator><pubDate>Tue, 12 Jul 2016 07:52:01 -0000</pubDate><guid>https://sourceforge.net689b576b581b4b9778d6e7cbd7351a051206901c</guid></item><item><title>#319 Mikrotik support</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/319/?limit=25#7c3d</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;I'd love to see this.  I have a large number of mikrotik routers and keeping firewall rules tight between them is a bit of a chore.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">dadenson</dc:creator><pubDate>Thu, 10 Mar 2016 15:55:53 -0000</pubDate><guid>https://sourceforge.netbddd85bf6ab1181595ee1621aa426f7b82970fdf</guid></item><item><title>Automatic packet queueing rules for PF</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/323/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;Is there any development guide so I can try to implement automatic queueing rules for PF?&lt;/p&gt;
&lt;p&gt;Thanks,&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">bananabr</dc:creator><pubDate>Mon, 28 Sep 2015 14:05:14 -0000</pubDate><guid>https://sourceforge.net78e85e42839176bf92d427a6f724a9200b6a6744</guid></item><item><title>Use Kernel Timezone in Time Module</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/322/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;The time module has the following options:&lt;/p&gt;
&lt;h1 id="iptables-m-time-help"&gt;iptables -m time --help&lt;/h1&gt;
&lt;p&gt;&lt;span&gt;[…]&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;time match options:&lt;br /&gt;
    --datestart time     Start and stop time, to be given in ISO 8601&lt;br /&gt;
    --datestop time      (YYYY&lt;span&gt;[-MM[-DD[Thh[:mm[:ss]&lt;/span&gt;]]]])&lt;br /&gt;
    --timestart time     Start and stop daytime (hh:mm&lt;span&gt;[:ss]&lt;/span&gt;)&lt;br /&gt;
    --timestop time      (between 00:00:00 and 23:59:59)&lt;br /&gt;
&lt;span&gt;[!]&lt;/span&gt; --monthdays value    List of days on which to match, separated by comma&lt;br /&gt;
                         (Possible days: 1 to 31; defaults to all)&lt;br /&gt;
&lt;span&gt;[!]&lt;/span&gt; --weekdays value     List of weekdays on which to match, sep. by comma&lt;br /&gt;
                         (Possible days: Mon,Tue,Wed,Thu,Fri,Sat,Sun or 1 to 7&lt;br /&gt;
                         Defaults to all weekdays.)&lt;br /&gt;
    --kerneltz           Work with the kernel timezone instead of UTC&lt;/p&gt;
&lt;p&gt;All except two of these options are usable from FWBuilder. One of the not accessibles is the timezone: "kerneltz".&lt;br /&gt;
This is quite important for everybody, not living in the UTC zone.&lt;br /&gt;
And it would be easy to implement: Just add a checkbox "Use Kernel Timezone &lt;span&gt;[YES/NO]&lt;/span&gt;" and then translate or not this into:&lt;/p&gt;
&lt;p&gt;-m time  --timestart 01:23  --timestop 23:45  --weekdays Mon,Tue,Wed,Thu,Fri --kerneltz&lt;/p&gt;
&lt;p&gt;or not:&lt;/p&gt;
&lt;p&gt;-m time  --timestart 01:23  --timestop 23:45  --weekdays Mon,Tue,Wed,Thu,Fri&lt;/p&gt;
&lt;p&gt;Thanks for all what you did so far!&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Heiri Müller</dc:creator><pubDate>Thu, 09 Jul 2015 14:49:14 -0000</pubDate><guid>https://sourceforge.netabaf80c6eaa5ab8a398cf88652d7b5475f50f4c4</guid></item><item><title>IPTables Packet Length Module</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/321/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Thanks for your great product!&lt;br /&gt;
I would need IPTables "-m length --length" module.&lt;br /&gt;
I think this module is important to have.&lt;/p&gt;
&lt;p&gt;Thanks&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Philip Mötteli</dc:creator><pubDate>Fri, 21 Nov 2014 09:35:47 -0000</pubDate><guid>https://sourceforge.net616a4388d57f764e7c494b414358f5bdf7b409fc</guid></item><item><title>ipv6-ipv6 nat support</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/320/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;The current linux kernels contain the long awaited possibility to nat ipv6&amp;lt;-&amp;gt;ipv6&lt;/p&gt;
&lt;p&gt;It would be very useful to support port-natting in SNAT/DNAT, masquerading, static ipv6 mappings, user or group match SNAT ...&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Robert Bossecker</dc:creator><pubDate>Sun, 12 Jan 2014 16:15:34 -0000</pubDate><guid>https://sourceforge.netd78338b4c640224ada247bba972073def8571e17</guid></item><item><title>Mikrotik support</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/319/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Well, I don't know if the project is still maintained here but ... I would like to know if there is any plan to include Mikrotik (http://www.mikrotik.com) support in fwbuilder. &lt;/p&gt;
&lt;p&gt;Mikrotik RouterOS is embedded linux, and the firewall is netfilter, but with a different syntax than the standard iptables. &lt;/p&gt;
&lt;p&gt;The syntax is described here: &lt;br /&gt;
Filter table: &lt;a href="http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/Filter" rel="nofollow"&gt;http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/Filter&lt;/a&gt;&lt;br /&gt;
NAT table: &lt;a href="http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/NAT" rel="nofollow"&gt;http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/NAT&lt;/a&gt;&lt;br /&gt;
Mangle table: &lt;a href="http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/Mangle" rel="nofollow"&gt;http://wiki.mikrotik.com/wiki/Manual:IP/Firewall/Mangle&lt;/a&gt; &lt;/p&gt;
&lt;p&gt;Packet flow is described in details here: &lt;br /&gt;
IPv4: &lt;a href="http://wiki.mikrotik.com/wiki/Manual:Packet_Flow" rel="nofollow"&gt;http://wiki.mikrotik.com/wiki/Manual:Packet_Flow&lt;/a&gt;&lt;br /&gt;
IPv6: &lt;a href="http://wiki.mikrotik.com/wiki/Manual:Packet_Flow_v6" rel="nofollow"&gt;http://wiki.mikrotik.com/wiki/Manual:Packet_Flow_v6&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I could probably contribute, if given some support on the existing architecture from existing developpers, but don't have much available time, so any help would be appreciated. &lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Frederic Hermann</dc:creator><pubDate>Tue, 15 Oct 2013 16:18:20 -0000</pubDate><guid>https://sourceforge.net9f6c1dd14578d04b7f8428ec68e5376fca18699d</guid></item><item><title>#293 Advanced routing table</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/293/?limit=25#f2cf</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Integration of policy rules and routing tables would be very helpful indeed.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Brian Ronald</dc:creator><pubDate>Fri, 26 Apr 2013 13:48:27 -0000</pubDate><guid>https://sourceforge.net559ffcdf65767250e998ba9b8e60b3496fb40065</guid></item><item><title>ipset support</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/318/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Add ipset support for table lookup of groups of IP addresses instead of creating a sequentially-parsed separate rule for every address.&lt;/p&gt;
&lt;p&gt;This increases routing performance significantly.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Wilco Baan Hofman</dc:creator><pubDate>Sun, 20 Jan 2013 01:58:27 -0000</pubDate><guid>https://sourceforge.net4b8218e0698da234a574c42db2af33efbe590327</guid></item><item><title>stateless filtering with --syn</title><link>https://sourceforge.net/p/fwbuilder/feature-requests/317/</link><description>&lt;div class="markdown_content"&gt;&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I'd like to test for TCP flags in a firewall rule. I always *disable* connection tracking and filter based on TCP flags.&lt;/p&gt;
&lt;p&gt;So, three things I need:&lt;br /&gt;
1. Allow me to disable xt_conntrack kernel module&lt;br /&gt;
2. Allow me to do --syn on outbound rules and ! --syn on inbound rules with the service as the source&lt;br /&gt;
3. A service can also be a source&lt;/p&gt;
&lt;p&gt;Or better yet, combine the last two into the default for stateless filtering for iptables. I don't want anybody with a service source port like 22 (possible!) to connect to all of my services, but I don't want to keep state in my ipv6 firewall.&lt;/p&gt;&lt;/div&gt;</description><dc:creator xmlns:dc="http://purl.org/dc/elements/1.1/">Wilco Baan Hofman</dc:creator><pubDate>Sun, 20 Jan 2013 01:27:40 -0000</pubDate><guid>https://sourceforge.net69d80a1eac51718126cbe983ba4cd226b3825a2b</guid></item></channel></rss>