OPNsense / pfSense config.xml Data Structure Research¶
Research conducted Feb 2025 by analyzing upstream OPNsense and pfSense source code, config.xml samples, and the Go schema package. This document informs parsing accuracy and identifies gaps in our data model.
Sources¶
| Source | URL / Path | Purpose |
|---|---|---|
| OPNsense config.xml.sample | src/etc/config.xml.sample (GitHub) |
Default configuration template |
| OPNsense FilterRule.php | src/opnsense/mvc/app/models/OPNsense/Firewall/FilterRule.php |
Rule processing logic |
| OPNsense Rule.php | src/opnsense/mvc/app/models/OPNsense/Firewall/Rule.php |
MVC model definitions |
| pfSense filter.inc | src/etc/inc/filter.inc |
pf rule generation from config.xml |
| pfSense firewall_rules_edit.php | src/usr/local/www/firewall_rules_edit.php |
Web UI address handling |
| pfSense Bug #6893 | Redmine issue tracker | Self-closing tag inconsistency fix |
| Go schema package | pkg/schema/opnsense/*.go |
Our current data model |
1. XML Boolean Patterns¶
OPNsense/pfSense uses two distinct patterns for boolean-like values. Understanding these is critical for correct Go type selection.
1a. Presence-Based Booleans (Self-Closing Tags)¶
Element existing = true, absent = false. Content is irrelevant.
Upstream PHP pattern: isset($rule['disabled']) or !empty($rule['disabled'])
Go type: BoolFlag (custom type in pkg/schema/opnsense/common.go)
| Element | Parent Context | Upstream Evidence |
|---|---|---|
<any/> |
<source>, <destination> |
isset($this->rule['source']['any']) in FilterRule.php |
<not/> |
<source>, <destination> |
isset($adr['not']) in filter.inc |
<disabled/> |
<rule> (filter, NAT) |
isset($rule['disabled']) in filter.inc |
<log/> |
<rule> (filter) |
isset($rule['log']) sets $filterent['log'] = true |
<quick/> |
<rule> (filter) |
isset($rule['quick']) in OPNsense |
<disableconsolemenu/> |
<system> |
config.xml.sample: self-closing |
<enable/> |
<rrd> |
config.xml.sample: self-closing |
<tcpflags_any/> |
<rule> (filter) |
isset($rule['tcpflags_any']) |
<nopfsync/> |
<rule> (filter) |
isset($rule['nopfsync']) |
<allowopts/> |
<rule> (filter) |
$filterent['allowopts'] = true |
<disablereplyto/> |
<rule> (filter) |
$filterent['disablereplyto'] = true |
<nosync/> |
<rule> (filter, NAT) |
$natent['nosync'] = true |
<nordr/> |
<rule> (NAT inbound) |
isset($natent['nordr']) |
<staticnatport/> |
<rule> (NAT outbound) |
Presence-checked in OPNsense |
<nonat/> |
<rule> (NAT outbound) |
Presence-checked |
<interfacenot/> |
<rule> (filter) |
!empty($rule['interfacenot']) |
<nottagged/> |
<rule> (filter) |
Match packets NOT tagged |
<trigger_initial_wizard/> |
<opnsense> (root) |
First-boot wizard trigger |
<enable/> |
<interfaces><wan> |
Interface enabled (pfSense uses BoolFlag) |
<enable/> |
<dhcpd><lan> |
DHCP scope enabled (pfSense uses BoolFlag) |
pfSense Bug #6893 note: Prior to pfSense 2.3.3, some code produced <tag/> while other code produced <tag></tag>. Both forms are valid XML and our *string / BoolFlag types handle both correctly via Go's encoding/xml.
pfSense presence-based enable note: pfSense correctly parses Interface and DhcpdInterface <enable/> elements as presence-based using BoolFlag types. The public API converts to string "1" for backward compatibility.
1b. Value-Based Booleans¶
Element contains 1, yes, or a specific value. Absent or empty = false.
Upstream PHP pattern: $config['system']['ipv6allow'] == "1"
Go type: string with value check, or BoolFlag (which now delegates non-empty body content to shared.IsValueTrue)
| Element | Parent | Values | Type | Notes |
|---|---|---|---|---|
<enable> |
<interfaces><wan> |
1 |
varies | pfSense: presence-based (see §1a). OPNsense: value-based. pfSense parser uses BoolFlag fork |
<enable> |
<dhcpd><lan> |
1 |
varies | pfSense: presence-based (see §1a). OPNsense: value-based. pfSense parser uses BoolFlag fork |
<blockpriv> |
<interfaces><wan> |
1 |
string |
Block private networks |
<blockbogons> |
<interfaces><wan> |
1 |
string |
Block bogon networks |
<dnsallowoverride> |
<system> |
1 |
BoolFlag |
Allow DNS override (migrated from int) |
<ipv6allow> |
<system> |
1 |
string |
IPv6 enabled |
<usevirtualterminal> |
<system> |
1 |
BoolFlag |
Virtual terminal (migrated from int) |
<pf_share_forward> |
<system> |
1 |
BoolFlag |
Shared forwarding (migrated from int) |
<lb_use_sticky> |
<system> |
1 |
BoolFlag |
Sticky load balancing (migrated from int) |
<disablenatreflection> |
<system> |
yes |
string |
NAT reflection disabled |
<enable> |
various OPNsense modules | 1 |
string |
Service/feature enabled |
1c. Design Rationale¶
The distinction is not arbitrary:
- Presence-based = flags typically absent (disabled, negation, special modes)
- Value-based = feature toggles typically enabled (with explicit
1)
Note: As of PR #577, BoolFlag now delegates non-empty element bodies to shared.IsValueTrue, so int or string toggle fields can migrate to BoolFlag when the semantics allow. This addresses issue #558 where OPNsense 26.1 emits on into fields previously typed as int, causing parse failures. The canonical truthy/falsy parsers are implemented in pkg/schema/shared/ (see §8b).
BoolFlag is NOT a drop-in for every value-based boolean. BoolFlag.MarshalXML emits a self-closing element for true and emits nothing at all for false. That means a field whose on-wire representation is always <tag>0</tag> or <tag>1</tag> (and must remain so on round-trip) cannot migrate to BoolFlag — the false case would disappear from the output. Criteria for safe migration:
- Absence of the element must be semantically equivalent to
falsein the target device's behavior (OPNsense/pfSense treat most toggles this way — absent = disabled). - No round-trip consumer must depend on the literal
<tag>0</tag>form when the underlying value is false.
If either criterion fails, prefer shared.FlexBool (always emits <tag>0</tag> or <tag>1</tag>) or keep the field as string and call shared.IsValueTrue at the converter.
2. Source/Destination Structure¶
The <source> and <destination> elements are the most complex sub-structures in firewall rules. Understanding their design is critical.
2a. XML Structure Examples¶
<!-- Match any address -->
<source><any/></source>
<!-- Match interface subnet -->
<source><network>lan</network></source>
<!-- Match specific IP/CIDR -->
<source><address>192.168.1.0/24</address></source>
<!-- Match alias -->
<source><address>MyAlias</address></source>
<!-- Negated match -->
<source><not/><network>lan</network></source>
<!-- With port (TCP/UDP only) -->
<destination><network>wan</network><port>443</port></destination>
<!-- Port range -->
<destination><any/><port>8000-9000</port></destination>
2b. Mutual Exclusivity¶
<any>, <network>, and <address> are mutually exclusive. Resolution priority (from OPNsense legacyMoveAddressFields):
<network>(highest priority)<address><any>/ implicit any (when none present)
2c. Valid <network> Values¶
- Interface names:
lan,wan,opt1,opt2, ... - Interface IP:
lanip,wanip,opt1ip - Special:
(self)(all local IPs) - Interface group names
- VIP names
2d. Port Range Delimiters¶
- In config.xml: hyphen (
80-443) - In pf rules: colon (
80:443) - OPNsense/pfSense code handles the conversion
3. Filter Rule Fields Reference¶
3a. Currently Modeled (in Rule struct)¶
| Field | XML Element | Go Type | Status | Phase |
|---|---|---|---|---|
| Type | <type> |
string |
Correct | Initial |
| Descr | <descr> |
string |
Correct | Initial |
| Interface | <interface> |
InterfaceList |
Correct | Initial |
| IPProtocol | <ipprotocol> |
string |
Correct | Initial |
| Protocol | <protocol> |
string |
Correct | Initial |
| Source | <source> |
Source |
Complete | Phase 1 |
| Destination | <destination> |
Destination |
Complete | Phase 1 |
| Target | <target> |
string |
Correct | Initial |
| SourcePort | <sourceport> |
string |
Correct | Initial |
| Disabled | <disabled> |
BoolFlag |
Converted | Phase 2 |
| Quick | <quick> |
BoolFlag |
Converted | Phase 2 |
| Log | <log> |
BoolFlag |
Added | Phase 2 |
| Floating | <floating> |
string |
Added | Phase 2 |
| Gateway | <gateway> |
string |
Added | Phase 2 |
| Direction | <direction> |
string |
Added | Phase 2 |
| Tracker | <tracker> |
string |
Added | Phase 2 |
| StateType | <statetype> |
string |
Added | Phase 2 |
| Updated | <updated> |
*Updated |
Correct | Initial |
| Created | <created> |
*Created |
Correct | Initial |
| UUID | uuid attr |
string |
Correct | Initial |
3b. Rate-Limiting and Advanced Fields (Added in Phase 3)¶
| Field | XML Element | Go Type | Phase |
|---|---|---|---|
| MaxSrcNodes | <max-src-nodes> |
string |
Phase 3 |
| MaxSrcConn | <max-src-conn> |
string |
Phase 3 |
| MaxSrcConnRate | <max-src-conn-rate> |
string |
Phase 3 |
| MaxSrcConnRates | <max-src-conn-rates> |
string |
Phase 3 |
| TCPFlags1 | <tcpflags1> |
string |
Phase 3 |
| TCPFlags2 | <tcpflags2> |
string |
Phase 3 |
| TCPFlagsAny | <tcpflags_any> |
BoolFlag |
Phase 3 |
| ICMPType | <icmptype> |
string |
Phase 3 |
| ICMP6Type | <icmp6-type> |
string |
Phase 3 |
| StateTimeout | <statetimeout> |
string |
Phase 3 |
| AllowOpts | <allowopts> |
BoolFlag |
Phase 3 |
| DisableReplyTo | <disablereplyto> |
BoolFlag |
Phase 3 |
| NoPfSync | <nopfsync> |
BoolFlag |
Phase 3 |
| NoSync | <nosync> |
BoolFlag |
Phase 3 |
3c. Remaining Missing Fields (LOW importance)¶
| Field | XML Element | Recommended Go Type |
|---|---|---|
| Tag | <tag> |
string |
| Tagged | <tagged> |
string |
| OS | <os> |
string |
| DSCP | <dscp> |
string |
| DNPipe | <dnpipe> |
string |
| PDNPipe | <pdnpipe> |
string |
| DefaultQueue | <defaultqueue> |
string |
| AckQueue | <ackqueue> |
string |
| Max | <max> |
string |
| MaxSrcStates | <max-src-states> |
string |
| VLANPrio | <vlanprio> |
string |
| VLANPrioSet | <vlanprioset> |
string |
| SetPrio | <set-prio> |
string |
| SetPrioLow | <set-prio-low> |
string |
| InterfaceNot | <interfacenot> |
BoolFlag |
| NotTagged | <nottagged> |
BoolFlag |
4. Schema Gaps: Source and Destination¶
RESOLVED (Phase 1): All missing fields added directly to Source/Destination structs. Fields were added directly rather than via
RuleLocationembedding to preserve the*stringAny field and maintain backward compatibility with existing consumers.
4a. Current Implementation (Post-Phase 1)¶
// security.go
type Source struct {
Any *string `xml:"any,omitempty"`
Network string `xml:"network,omitempty"`
Address string `xml:"address,omitempty"`
Port string `xml:"port,omitempty"`
Not BoolFlag `xml:"not,omitempty"`
}
type Destination struct {
Any *string `xml:"any,omitempty"`
Network string `xml:"network,omitempty"`
Address string `xml:"address,omitempty"`
Port string `xml:"port,omitempty"`
Not BoolFlag `xml:"not,omitempty"`
}
4b. Previously Missing Fields (Now Resolved)¶
| Field | XML Element | Impact | Resolution |
|---|---|---|---|
Address |
<address> |
CRITICAL - IP/CIDR/alias data | Phase 1 |
Not |
<not> |
HIGH - Negated rule semantics | Phase 1 |
Port (Source only) |
<port> |
MEDIUM - Source port matching | Phase 1 |
Helper methods IsAny(), EffectiveAddress(), and Equal() were added to both types for safe comparison and address resolution following OPNsense priority rules.
4c. Existing RuleLocation Type¶
pkg/schema/opnsense/common.go defines RuleLocation with similar fields. It remains available for other use cases but was not embedded into Source/Destination to avoid complexity with the *string Any field and XML marshaling behavior.
5. Type Mismatches: string vs BoolFlag¶
Resolution Status¶
Converted to BoolFlag (presence-based — isset() in PHP):
- Rule: Disabled, Quick, Log (security.go) — Phase 2
- NATRule: Disabled, Log (security.go) — Phase 2
- InboundRule: Disabled, Log (security.go) — Phase 2
- System: DisableConsoleMenu (system.go) — Phase 3
- Firmware: Type, Subscription, Reboot (system.go) — Phase 3
- User: Expires, AuthorizedKeys, IPSecPSK, OTPSeed (system.go) — Phase 3
- System.RRD: Enable (system.go) — Phase 3
- Rrd: Enable (services.go) — Phase 3
- OpnSenseDocument: TriggerInitialWizard (opnsense.go) — Phase 3
Kept as string (value-based — == "1" in PHP):
The following fields use OPNsense MVC value-based semantics where <field>0</field> is valid and distinct from absent. BoolFlag would incorrectly treat <field>0</field> as true (element present), breaking the == "1" / == "0" distinction. These remain string:
5a. Security (security.go) — value-based, kept as string¶
| Struct | Field | Type | Rationale |
|---|---|---|---|
| IDS.General | Enabled | string |
MVC field, uses == "1" with helper method |
| IDS.General | Ips | string |
MVC field, uses == "1" with helper method |
| IDS.General | Promisc | string |
MVC field, uses == "1" with helper method |
| IDS.EveLog.HTTP | Enable | string |
MVC field, value-based |
| IDS.EveLog.HTTP | Extended | string |
MVC field, value-based |
| IDS.EveLog.HTTP | DumpAllHeaders | string |
MVC field, value-based |
| IDS.EveLog.TLS | Enable | string |
MVC field, value-based |
| IDS.EveLog.TLS | Extended | string |
MVC field, value-based |
| IDS.EveLog.TLS | SessionResumption | string |
MVC field, value-based |
| IPsec.General | Enabled | string |
MVC field, uses FormatBoolean() |
| IPsec.General | Disablevpnrules | string |
MVC field, uses FormatBoolean() |
5b. Services (services.go) — value-based, kept as string¶
| Struct | Field | Type | Rationale |
|---|---|---|---|
| Unbound | Enable | string |
Heavily used with == "1" across 10+ files |
| Monit.General | Enabled | string |
MVC field, value-based |
| Monit.General | Ssl | string |
MVC field, value-based |
| Monit.General | Sslverify | string |
MVC field, value-based |
| Monit.General | HttpdEnabled | string |
MVC field, value-based |
| Monit.Alert | Enabled | string |
MVC field, value-based |
| MonitService | Enabled | string |
MVC field, value-based |
5c. OPNsense module (opnsense.go) — value-based, kept as string¶
| Struct | Field | Type | Rationale |
|---|---|---|---|
| Kea.Dhcp4.General | Enabled | string |
MVC field, value-based |
| Kea.HighAvailability | Enabled | string |
MVC field, value-based |
| UnboundPlus.General | Enabled | string |
MVC field, value-based |
| UnboundPlus.General | Stats | string |
MVC field, value-based |
| UnboundPlus.General | Dnssec | string |
MVC field, value-based |
| UnboundPlus.General | DNS64 | string |
MVC field, value-based |
| UnboundPlus.General | RegisterDHCP* (x3) | string |
MVC field, value-based |
| UnboundPlus.General | No* fields (x2) | string |
MVC field, value-based |
| UnboundPlus.General | Txtsupport | string |
MVC field, value-based |
| UnboundPlus.General | Cacheflush | string |
MVC field, value-based |
| UnboundPlus.General | EnableWpad | string |
MVC field, value-based |
| UnboundPlus.Dnsbl | Enabled | string |
MVC field, value-based |
| UnboundPlus.Dnsbl | Safesearch | string |
MVC field, value-based |
| UnboundPlus.Forwarding | Enabled | string |
MVC field, value-based |
| SyslogInternal.General | Enabled | string |
MVC field, value-based |
| Netflow.Capture | EgressOnly | string |
MVC field, value-based |
| Netflow.Collect | Enable | string |
MVC field, value-based |
5d. Interfaces and DHCP (interfaces.go, dhcp.go) — platform-specific¶
pfSense and OPNsense use different boolean semantics for interface and DHCP scope enable flags:
| Struct | Field | pfSense Type | OPNsense Type | Rationale |
|---|---|---|---|---|
| Interface | Enable | opnsense.BoolFlag |
string |
pfSense: presence-based <enable/> / absent. OPNsense: value-based <enable>1</enable>. pfSense parser uses platform-specific type fork (pkg/schema/pfsense/interfaces.go) with BoolFlag, converts to "1" for API compatibility |
| DhcpdInterface | Enable | opnsense.BoolFlag |
string |
pfSense: presence-based <enable/> / absent. OPNsense: value-based <enable>1</enable>. pfSense parser uses platform-specific type fork (pkg/schema/pfsense/dhcp.go) with BoolFlag, converts to "1" for API compatibility |
Implementation: The pfSense parser uses an intermediate decodeDocument type (pkg/parser/pfsense/decode_types.go) that decodes XML with BoolFlag-aware pfsense.Interface and pfsense.DhcpdInterface types, then converts to backward-compatible opnsense.Interfaces/opnsense.Dhcpd with string Enable fields set to "1" (enabled) or "" (disabled).
6. NAT Structure Issues¶
RESOLVED (Phase 4): All missing NAT outbound and inbound fields have been added.
6a. NAT XML Path¶
In OPNsense config.xml, inbound NAT (port forward) rules are at <nat><rule>, not <nat><inbound><rule>. Our schema uses xml:"inbound>rule" path mapping.
6b. NAT Outbound Rule Fields (Added in Phase 4)¶
| Field | XML Element | Type | Status |
|---|---|---|---|
| StaticNatPort | <staticnatport> |
BoolFlag |
Added |
| NoNat | <nonat> |
BoolFlag |
Added |
| NatPort | <natport> |
string |
Added |
| PoolOptsSrcHashKey | <poolopts_sourcehashkey> |
string |
Added |
6c. NAT Inbound Rule Fields (Added in Phase 4)¶
| Field | XML Element | Type | Status |
|---|---|---|---|
| NATReflection | <natreflection> |
string |
Added |
| AssociatedRuleID | <associated-rule-id> |
string |
Added |
| NoRDR | <nordr> |
BoolFlag |
Added |
| NoSync | <nosync> |
BoolFlag |
Added |
| LocalPort | <local-port> |
string |
Added |
6d. Outbound NAT Mode Values¶
| Value | Meaning |
|---|---|
automatic |
Automatic outbound NAT (default) |
hybrid |
Hybrid: auto + manual rules |
advanced |
Manual outbound NAT only |
disabled |
Disable outbound NAT |
7. Key XML Design Decisions¶
7a. Dynamic Interface Keys¶
The <interfaces> section uses dynamic element names (<wan>, <lan>, <opt0>) rather than repeated <interface name="wan">. This requires custom unmarshaling in Go. Our map-based approach in Interfaces and Dhcpd types is correct.
7b. Comma-Separated Lists¶
Several fields pack multiple values into a single element:
<interface>wan,lan,opt1</interface>(floating rules)<icmptype>3,11,0</icmptype>(ICMP type list)- Space-separated:
<timeservers>0.ntp.org 1.ntp.org</timeservers>
Our InterfaceList custom type correctly handles the comma-separated case.
7c. UUID vs Tracker¶
- OPNsense:
uuidattribute on rule elements (<rule uuid="...">) - pfSense:
<tracker>element (integer, auto-generated frommicrotime) - Both may be present in migrated configs
7d. Legacy vs MVC Model Split¶
OPNsense maintains two parallel systems:
- Legacy: Rules in
<filter><rule>and<nat><rule>(pfSense-compatible) - MVC/New-style: Rules in
<OPNsense><Firewall><Filter>with<rules>,<snatrules>, etc.
Both are loaded by pf_firewall(). Our schema currently only models the legacy format.
8. Correctly Implemented Patterns¶
8a. Source.Any / Destination.Any as *string¶
Go's encoding/xml produces "" for both <any/> and absent elements when using plain string. Using *string correctly distinguishes presence (non-nil) from absence (nil). Validated against FilterRule.php's isset() pattern.
8b. BoolFlag Custom Type¶
Correctly implements presence-based boolean semantics: absent element → false, <tag/> (empty body) → true, <tag>body</tag> → delegates to shared.IsValueTrue(body). This means <tag>0</tag>, <tag>off</tag>, and <tag>no</tag> correctly parse as false, fixing a latent bug where any element presence previously returned true regardless of content.
Shared boolean vocabulary: The pkg/schema/shared/ package defines the canonical liberal parsers:
IsValueTrue(s)/IsValueFalse(s)— recognizes "on"/"off", "yes"/"no", "1"/"0", "true"/"false", "enable"/"disable", "enabled"/"disabled" (case-insensitive)FlexBool— value-level liberal boolean for fields where element presence is not the signal (always emitted, content carries the boolean value)FlexInt— liberal int parser sibling (delegates toIsValueTruefor non-numeric content)
BoolFlag.UnmarshalXML layers presence semantics over shared.IsValueTrue — absent → false, <tag/> → true, <tag>body</tag> → IsValueTrue(body). FlexBool delegates to the same IsValueTrue helper for its body parsing, so the two types share the liberal vocabulary without one depending on the other. pfSense converters use shared.IsValueTrue directly (retired pfsense.isPfSenseValueTrue).
8c. InterfaceList Custom Type¶
Correctly handles comma-separated interface lists for floating rules.
8d. Interfaces and Dhcpd Map Types¶
Correctly handle dynamic interface element names via custom UnmarshalXML/MarshalXML.
8e. decodeDocument Intermediate Layer (pfSense parser)¶
The pfSense parser uses a two-stage architecture for correct presence-based boolean handling:
-
Decode stage: XML is decoded into an intermediate
decodeDocumenttype (defined inpkg/parser/pfsense/decode_types.go) that uses platform-specific types with BoolFlag-aware Enable fields: -
pfsense.InterfacewithEnable opnsense.BoolFlag(frompkg/schema/pfsense/interfaces.go) -
pfsense.DhcpdInterfacewithEnable opnsense.BoolFlag(frompkg/schema/pfsense/dhcp.go) -
Conversion stage: The intermediate document is converted to a
pfsense.Documentwith backward-compatible opnsense types viatoDocument(): -
BoolFlag Enable fields are transformed to string:
true→"1",false→"" - This preserves API compatibility with existing consumers expecting string Enable fields
This architecture resolves the type mismatch issue described in Section 5 by using platform-specific type forks at the decode layer while maintaining a unified public API. It correctly distinguishes pfSense's presence-based <enable/> (element present = enabled) from absent elements (disabled), which was previously mishandled when using string types that cannot distinguish <enable/> from <enable></enable> from absent elements.
9. Action Items (Priority Order)¶
CRITICAL: Add— COMPLETEAddressfield toSourceandDestinationstructsHIGH: Add— COMPLETENotfield (BoolFlag) toSourceandDestinationHIGH: Add— COMPLETEPortfield toSourcestructHIGH: Add— COMPLETELogfield (BoolFlag) toRulestructHIGH: Convert— COMPLETERule.Disabled,NATRule.Disabled,InboundRule.DisabledfromstringtoBoolFlagHIGH: Add— COMPLETEFloating,Gateway,Directionfields toRuleMEDIUM: Convert— COMPLETEstruct{}fields in system.go toBoolFlagMEDIUM: Add rate-limiting fields to— COMPLETE (Phase 3: 14 fields added — rate-limiting, TCP/ICMP, state/advanced)Rule(max-src-nodes, etc.)- MEDIUM: Convert IDS/IPsec Enabled fields from
stringtoBoolFlag - LOW: Add remaining missing filter rule fields (tag, tagged, DSCP, etc.)
LOW: Add missing NAT rule fields— COMPLETE (Phase 4: NATRule +4 fields, InboundRule +5 fields)
10. Remaining Work¶
10a. Medium Priority¶
| Item | Description | Rationale |
|---|---|---|
| #9 | Convert IDS/IPsec Enabled fields from string to BoolFlag |
These use MVC value-based semantics (== "1") which BoolFlag cannot represent correctly. Requires a new MVCBool type or keeping as string with helper methods. Current helper methods (IsEnabled(), IsIPSMode()) work correctly with string. |
10b. Low Priority¶
| Item | Description | Fields |
|---|---|---|
| #10 | Add remaining filter rule fields | tag, tagged, os, dscp, dnpipe, pdnpipe, defaultqueue, ackqueue, max, max-src-states, vlanprio, vlanprioset, set-prio, set-prio-low, interfacenot, nottagged |
10c. Phase Summary¶
| Phase | Scope | Fields Added | Status |
|---|---|---|---|
| 1 | Source/Destination gaps | Address, Port (Source), Not | Complete |
| 2 | High-priority Rule fields | Log, Disabled→BoolFlag, Quick→BoolFlag, Floating, Gateway, Direction, Tracker, StateType | Complete |
| 3 | Rate-limiting and advanced fields | 14 fields (max-src-*, TCP/ICMP, state/advanced) | Complete |
| 4 | NAT rule enhancements | NATRule +4 fields, InboundRule +5 fields | Complete |
| 5 | Documentation and validation | Research doc updates, field reference, validator enhancements | Complete |