nvram defaults now country=SG, txpwr=auto
[tomato.git] / release / src / router / nvram / defaults.c
blob4cefddbd17624c8adcba525e0272d866ceb4eab4
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 // { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //start with no dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
64 #ifdef TCONFIG_VLAN
65 { "lan1_ipaddr", "" },
66 { "lan1_netmask", "" },
67 { "lan1_stp", "0" },
68 { "lan2_ipaddr", "" },
69 { "lan2_netmask", "" },
70 { "lan2_stp", "0" },
71 { "lan3_ipaddr", "" },
72 { "lan3_netmask", "" },
73 { "lan3_stp", "0" },
74 #endif
76 // WAN H/W parameters
77 //! { "wan_ifname", "" }, // WAN interface name
78 //! { "wan_ifnames", "" }, // WAN interface names
79 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
80 { "wan_hwaddr", "" }, // WAN interface MAC address
81 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
83 // WAN TCP/IP parameters
84 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
85 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
86 { "wan_netmask", "0.0.0.0" }, // WAN netmask
87 { "wan_gateway", "0.0.0.0" }, // WAN gateway
88 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
89 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
90 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
91 { "wan_lease", "86400" }, // WAN lease time in seconds
92 { "wan_islan", "0" },
93 { "modem_ipaddr", "0.0.0.0" }, // modem IP address (i.e. PPPoE bridged modem)
95 { "wan_primary", "1" }, // Primary wan connection
96 { "wan_unit", "0" }, // Last configured connection
97 /* --- obsolete ---
98 // Filters
99 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
100 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
101 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
103 { "filter", "on" }, // [on | off] Firewall Protection
105 // Port forwards
106 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
108 // DHCP server parameters
109 { "dhcp_start", "100" }, //
110 { "dhcp_num", "50" }, //
111 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
112 { "dhcpd_endip", "" }, // "
113 { "dhcp_lease", "0" }, // LAN lease time in minutes
114 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
115 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
116 { "wan_routes", "" },
117 { "wan_msroutes", "" },
119 #ifdef TCONFIG_VLAN
120 { "dhcp1_start", "" },
121 { "dhcp1_num", "" },
122 { "dhcpd1_startip", "" },
123 { "dhcpd1_endip", "" },
124 { "dhcp1_lease", "0" },
125 { "dhcp2_start", "" },
126 { "dhcp2_num", "" },
127 { "dhcpd2_startip", "" },
128 { "dhcpd2_endip", "" },
129 { "dhcp2_lease", "0" },
130 { "dhcp3_start", "" },
131 { "dhcp3_num", "" },
132 { "dhcpd3_startip", "" },
133 { "dhcpd3_endip", "" },
134 { "dhcp3_lease", "0" },
135 #endif
137 // PPPoE parameters
138 { "pppoe_ifname", "" }, // PPPoE enslaved interface
139 { "ppp_username", "" }, // PPP username
140 { "ppp_passwd", "" }, // PPP password
141 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
142 { "ppp_keepalive", "0" }, // Restore link automatically
143 { "ppp_demand", "0" }, // Dial on demand
144 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
145 { "ppp_mru", "1500" }, // Negotiate MRU to this value
146 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
147 { "ppp_service", "" }, // PPPoE service name
148 { "ppp_ac", "" }, // PPPoE access concentrator name
149 { "ppp_static", "0" }, // Enable / Disable Static IP
150 { "ppp_static_ip", "" }, // PPPoE Static IP
151 { "ppp_get_ac", "" }, // PPPoE Server ac name
152 { "ppp_get_srv", "" }, // PPPoE Server service name
153 { "ppp_custom", "" }, // PPPD additional options
154 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
156 { "pppoe_lei", "" },
157 { "pppoe_lef", "" },
159 #ifdef TCONFIG_IPV6
160 // IPv6 parameters
161 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
162 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
163 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
164 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
165 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
166 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
167 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
168 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
169 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
170 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
171 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
172 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
173 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
174 { "ipv6_dns", "" }, // DNS server(s) IPs
175 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
176 #endif
178 // Wireless parameters
179 { "wl_ifname", "" }, // Interface name
180 { "wl_hwaddr", "" }, // MAC address
181 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
182 { "wl_corerev", "" }, // Current core revision
183 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
184 { "wl_radioids", "" }, // List of radio IDs
185 { "wl_ssid", "wireless" }, // Service set ID (network name)
186 { "wl1_ssid", "wireless1" },
187 { "wl_country_code", "SG" }, // Country (default obtained from driver)
188 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
189 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
190 { "wl_closed", "0" }, // Closed (hidden) network
191 { "wl_ap_isolate", "0" }, // AP isolate mode
192 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
193 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
194 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
195 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
196 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
197 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
198 { "wl_key", "1" }, // Current WEP key
199 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
200 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
201 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
202 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
203 { "wl_channel", "1" }, // Channel number
204 { "wl1_channel", "0" },
205 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
206 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
207 { "wl_rateset", "default" }, // "default" or "all" or "12"
208 { "wl_frag", "2346" }, // Fragmentation threshold
209 { "wl_rts", "2347" }, // RTS threshold
210 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
211 { "wl_bcn", "100" }, // Beacon interval
212 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
213 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
214 { "wl_gmode", "1" }, // 54g mode
215 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
216 { "wl_afterburner", "off" }, // AfterBurner
217 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
218 { "wl_wme", "auto" }, // WME mode (auto|off|on)
219 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
220 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
221 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
222 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
223 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
224 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3|4) //Toastman - 0=off
225 { "wl_passphrase", "" }, // Passphrase // Add
226 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
227 { "wl_wep_buf", "" }, // save all settings for web // Add
228 { "wl_wep_gen", "" }, // save all settings for generate button // Add
229 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
231 // WPA parameters
232 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
233 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
234 { "wl_wpa_psk", "" }, // WPA pre-shared key
235 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
236 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
237 { "wl_radius_key", "" }, // RADIUS shared secret
238 { "wl_radius_port", "1812" }, // RADIUS server UDP port
239 { "wl_crypto", "aes" }, // WPA data encryption
240 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
241 { "wl_akm", "" }, // WPA akm list
243 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
244 // EDCA parameters for STA
245 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
246 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
247 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
248 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
250 // EDCA parameters for AP
251 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
252 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
253 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
254 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
256 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
257 { "wl_wme_apsd", "off" }, // WME APSD mode
258 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
260 /* Per AC Tx parameters */
261 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
262 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
263 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
264 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
266 { "wl_unit", "0" }, // Last configured interface
267 { "wl_mac_deny", "" }, // filter MAC // Add
269 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
270 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
271 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
273 // !!TB: n-mode
274 { "wl_nmode", "-1" }, // N-mode
275 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
276 { "wl1_nband", "1" },
277 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
278 { "wl_nreqd", "0" }, // Require 802.11n support
279 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
280 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
281 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
282 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
283 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
284 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
285 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
286 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
287 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
288 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
289 { "wl_bcn_rotate", "1" }, // Beacon rotation
290 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
291 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
293 #ifdef TCONFIG_EMF
294 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
295 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
296 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
297 { "emf_enable", "0" }, // Disable EMF by default
298 #endif
299 #ifdef CONFIG_BCMWL5
300 // AMPDU
301 { "wl_ampdu", "auto" }, // Default AMPDU setting
302 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
303 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
304 { "wl_amsdu", "auto" }, // Default AMSDU setting
305 // power save
306 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
307 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
308 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
309 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
310 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
311 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
312 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
313 // misc
314 { "wl_wmf_bss_enable", "0" }, // Wireless Multicast Forwarding Enable/Disable
315 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
316 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
317 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
318 #endif
320 { "pptp_server_ip", "" }, // as same as WAN gateway
321 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
322 { "pptp_dhcp", "1" },
324 // for firewall
325 { "mtu_enable", "0" }, // WAN MTU [1|0]
326 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
328 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
329 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
330 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
332 // misc
333 { "wl_tnoise", "-99" },
334 { "led_override", "" },
335 { "btn_override", "" },
336 { "btn_reset", "" },
337 { "env_path", "" },
338 { "manual_boot_nv", "0" },
339 // { "wlx_hpamp", "" },
340 // { "wlx_hperx", "" }, // see init.c
341 { "t_fix1", "" },
343 // basic-ddns
344 { "ddnsx0", "" },
345 { "ddnsx1", "" },
346 { "ddnsx0_cache", "" },
347 { "ddnsx1_cache", "" },
348 { "ddnsx_save", "1" },
349 { "ddnsx_refresh", "28" },
351 // basic-ident
352 { "router_name", "toast" },
353 { "wan_hostname", "unknown" },
354 { "wan_domain", "" },
356 // basic-time
357 { "tm_sel", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
358 { "tm_tz", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
359 { "tm_dst", "1", },
360 { "ntp_updates", "4" },
361 { "ntp_tdod", "0" },
362 { "ntp_server", "0.europe.pool.ntp.org 1.europe.pool.ntp.org 2.europe.pool.ntp.org" },
363 { "ntp_kiss", "" },
364 { "ntp_kiss_ignore", "" },
366 // basic-static
367 { "dhcpd_static", "" },
368 { "arpbind_listed", "0" }, // AB - Enable static ARP for all devices on list
370 // basic-wfilter
371 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
372 { "wl_macmode", "disabled" },
373 { "macnames", "" },
375 // advanced-ctnf
376 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
377 { "ct_udp_timeout", "30 180" },
378 { "ct_timeout", "10 10" },
379 { "ct_max", "8192" },
380 { "nf_ttl", "0" },
381 { "nf_l7in", "1" },
382 #ifdef LINUX26
383 { "nf_sip", "1" },
384 { "ct_hashsize", "2048" },
385 #endif
386 #ifdef LINUX26
387 { "nf_rtsp", "0" },
388 #else
389 { "nf_rtsp", "1" },
390 #endif
391 { "nf_pptp", "1" },
392 { "nf_h323", "1" },
393 { "nf_ftp", "1" },
395 // advanced-mac
396 { "mac_wan", "" },
397 { "wl_macaddr", "" },
399 // advanced-misc
400 { "boot_wait", "on" },
401 { "wait_time", "5" },
402 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
403 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
404 { "jumbo_frame_size", "2000" },
405 #ifdef CONFIG_BCMWL5
406 { "ctf_disable", "1" },
407 #endif
409 // advanced-dhcpdns
410 { "dhcpd_dmdns", "1" },
411 { "dhcpd_slt", "0" },
412 { "dhcpd_gwmode", "" },
413 { "dhcpd_lmax", "" },
414 { "dns_addget", "0" },
415 { "dns_intcpt", "0" },
416 { "dhcpc_minpkt", "1" },
417 { "dhcpc_custom", "" },
418 { "dns_norebind", "1" },
419 { "dnsmasq_custom", "" },
420 { "dhcpd_static_only", "0" },
421 // { "dnsmasq_norw", "0" },
423 // advanced-firewall
424 // { "block_loopback", "0" }, // nat loopback
425 { "nf_loopback", "0" },
426 { "block_wan", "1" }, // block inbound icmp
427 { "multicast_pass", "0" }, // enable multicast proxy
428 #ifdef TCONFIG_VLAN
429 { "multicast_lan", "0" }, // on LAN (br0)
430 { "multicast_lan1", "0" }, // on LAN1 (br1)
431 { "multicast_lan2", "0" }, // on LAN2 (br2)
432 { "multicast_lan3", "0" }, // on LAN3 (br3)
433 #endif
434 { "udpxy_enable", "0" },
435 { "udpxy_stats", "0" },
436 { "udpxy_clients", "3" },
437 { "udpxy_port", "4022" },
438 { "ne_syncookies", "0" }, // tcp_syncookies
439 { "ne_snat", "0" }, // use SNAT instead of MASQUERADE
440 { "dhcp_pass", "1" }, // allow DHCP responses
441 { "ne_shlimit", "0,3,60" },
443 // advanced-routing
444 { "routes_static", "" },
445 { "dhcp_routes", "1" },
446 { "wk_mode", "gateway" }, // Network mode [gateway|router]
447 #ifdef TCONFIG_ZEBRA
448 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
449 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
450 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
451 #ifdef TCONFIG_VLAN
452 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
453 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
454 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
455 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
456 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
457 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
458 #endif
459 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
460 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
461 #endif
463 // advanced-vlan
464 { "trunk_vlan_so", "0" }, // VLAN trunk support override
466 // advanced-wireless
467 { "wl_txant", "3" },
468 { "wl_txpwr", "0" }, // 0 = driver default power
469 { "wl_maxassoc", "128" }, // Max associations driver could support
470 { "wl_bss_maxassoc", "128" },
471 { "wl_distance", "" },
473 // forward-*
474 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
475 #ifdef TCONFIG_IPV6
476 { "ipv6_portforward", ""},
477 #endif
478 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
479 { "dmz_enable", "0" },
480 { "dmz_ipaddr", "0" },
481 { "dmz_sip", "" },
483 // forward-upnp
484 { "upnp_enable", "3" },
485 { "upnp_secure", "1" },
486 { "upnp_port", "0" },
487 { "upnp_ssdp_interval", "60" }, // SSDP interval
488 { "upnp_max_age", "180" }, // Max age
489 { "upnp_mnp", "0" },
490 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
491 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
492 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
493 #if 0 // disabled for miniupnpd
494 { "upnp_max_age", "180" }, // Max age
495 { "upnp_config", "0" },
496 #endif
498 // qos
499 { "qos_enable", "0" },
500 { "qos_ack", "0" },
501 { "qos_syn", "1" },
502 { "qos_fin", "1" },
503 { "qos_rst", "1" },
504 { "qos_udp", "0" },
505 { "qos_icmp", "1" },
506 { "qos_reset", "1" },
507 { "qos_obw", "700" },
508 { "qos_ibw", "16000" },
509 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<-1<d<123<0<<0:10<<0<Network Time (NTP)>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<x<9<0<<<<0<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<0<RPC (Microsoft)>0<<6<x<23,992<0<<<<0<Telnet>0<<-1<d<22<0<<<<3<SSH>0<<17<x<3544<0<<<<3<Teredo port>0<<6<s<80,8080<0<<<<3<Remote Router Access>0<<6<x<3389<0<<<<3<Remote Assistance>0<<-1<a<<0<flash<<<2<Flash Video, (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video, (Youtube)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<s<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<6<x<6005<0<<<<2<Camfrog>0<<-1<d<1220,1234,5100,6005,6970<0<<<<-1<VLC>0<<-1<x<554,5004,5005<0<<<<2<RTP/RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<x<1935<0<<<<2<RTMP>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<d<1718:1720<0<<<<1<H323>0<<-1<a<<0<skypetoskype<<<1<Skype>0<<-1<a<<0<skypeout<<<1<Skypeout>0<<-1<d<80<0<<0:512<<4<HTTP>0<<-1<d<443<0<<0:512<<4<HTTPS>0<<6<d<8080<0<<0:512<<4<HTTP Proxy / Alternate>0<<-1<d<25,587,465<0<<<<5<SMTP, Submission>0<<-1<d<110,995<0<<<<5<POP3 Mail>0<<-1<d<119,563<0<<<<5<NNTP>0<<-1<d<143,220,585,993<0<<<<5<IMAP Mail>0<<-1<a<<0<irc<<<6<IRC>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<Yahoo Messenger>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<Other Chat Services>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<-1<x<6571,6891:6901<0<<<<7<WLM File/Webcam>0<<6<d<80,443,8080<0<<512:<<7<HTTP,SSL File Transfers>0<<17<x<1:65535<0<<<<-1<P2P (uTP, UDP)" },
510 { "qos_burst0", "" },
511 { "qos_burst1", "" },
512 { "qos_default", "8" },
513 { "qos_orates", "5-20,5-20,5-25,5-70,20-100,5-80,5-80,5-80,5-50,1-5" },
514 { "qos_irates", "5-100,5-100,5-100,5-100,20-100,5-100,5-100,5-100,5-100,1-5" },
515 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger Download P2P/Bulk Crawl" },
517 { "ne_vegas", "0" }, // TCP Vegas
518 { "ne_valpha", "3" }, // "
519 { "ne_vbeta", "3" }, // "
520 { "ne_vgamma", "2" }, // "
522 // qos-bw-limiter
523 { "qosl_enable", "0" },
524 // { "qosl_obw", "" }, unused - used qos_obw
525 // { "qosl_ibw", "" }, unused - used qos_obw
526 { "qosl_rules", "" },
527 { "qosl_denable", "0" },
528 { "qosl_dtcp", "0" },//unlimited
529 { "qosl_dudp", "0" },//unlimited
530 { "qosl_ddlc", "" },
531 { "qosl_dulc", "" },
532 { "qosl_ddlr", "" },
533 { "qosl_dulr", "" },
535 // access restrictions
536 { "rruleN", "0" },
537 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
538 //* { "rrule##", "" },
539 { "rrulewp", "80,8080" },
541 #if TOMATO_SL
542 // samba
543 { "smbd_on", "0" },
544 { "nmbd_on", "0" },
545 { "smbd_wgroup", "WORKGROUP" },
546 { "smbd_nbname", "TOMATO" },
547 { "smbd_adminpass", "admin" },
548 #endif
550 // admin-access
551 { "http_username", "" }, // Username
552 { "http_passwd", "admin" }, // Password
553 { "remote_management", "0" }, // Remote Management [1|0]
554 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
555 { "http_wanport", "8080" }, // WAN port to listen on
556 { "http_lanport", "80" }, // LAN port to listen on
557 { "https_lanport", "443" }, // LAN port to listen on
558 { "http_enable", "1" }, // HTTP server enable/disable
559 { "https_enable", "0" }, // HTTPS server enable/disable
560 { "https_crt_save", "0" },
561 { "https_crt_cn", "" },
562 { "https_crt_file", "" },
563 { "https_crt", "" },
564 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
565 { "web_favicon", "0" },
566 { "web_css", "brownlight" },
567 { "web_svg", "1" },
568 { "telnetd_eas", "1" },
569 { "telnetd_port", "23" },
570 { "sshd_eas", "0" },
571 { "sshd_pass", "1" },
572 { "sshd_port", "22" },
573 { "sshd_remote", "0" },
574 { "sshd_rport", "2222" },
575 { "sshd_authkeys", "" },
576 { "sshd_hostkey", "" },
577 { "sshd_dsskey", "" },
578 { "sshd_forwarding", "1" },
579 { "rmgt_sip", "" }, // remote management: source ip address
581 { "http_id", "" },
582 { "web_mx", "status,bwm" },
583 { "web_pb", "" },
585 // admin-bwm
586 { "rstats_enable", "1" },
587 { "rstats_path", "" },
588 { "rstats_stime", "48" },
589 { "rstats_offset", "1" },
590 { "rstats_data", "" },
591 { "rstats_colors", "" },
592 { "rstats_exclude", "" },
593 { "rstats_sshut", "1" },
594 { "rstats_bak", "0" },
596 // admin-ipt
597 { "cstats_enable", "1" },
598 { "cstats_path", "" },
599 { "cstats_stime", "48" },
600 { "cstats_offset", "1" },
601 { "cstats_labels", "0" },
602 { "cstats_exclude", "" },
603 { "cstats_include", "" },
604 { "cstats_all", "1" },
605 { "cstats_sshut", "1" },
606 { "cstats_bak", "0" },
608 // advanced-buttons
609 { "sesx_led", "0" },
610 { "sesx_b0", "1" },
611 { "sesx_b1", "4" },
612 { "sesx_b2", "4" },
613 { "sesx_b3", "4" },
614 { "sesx_script",
615 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
617 { "script_brau",
618 "if [ ! -e /tmp/switch-start ]; then\n"
619 " # do something at startup\n"
620 " echo position at startup was $1 >/tmp/switch-start\n"
621 " exit\n"
622 "fi\n"
623 "if [ $1 = \"bridge\" ]; then\n"
624 " # do something\n"
625 " led bridge on\n"
626 "elif [ $1 = \"auto\" ]; then\n"
627 " # do something\n"
628 " led bridge off\n"
629 "fi\n"
632 // admin-log
633 { "log_remote", "0" },
634 { "log_remoteip", "" },
635 { "log_remoteport", "514" },
636 { "log_file", "1" },
637 { "log_file_custom", "0" },
638 { "log_file_path", "/var/log/messages" },
639 { "log_file_size", "50" },
640 { "log_file_keep", "1" },
641 { "log_limit", "60" },
642 { "log_in", "0" },
643 { "log_out", "0" },
644 { "log_mark", "60" },
645 { "log_events", "" },
647 // admin-log-webmonitor
648 { "log_wm", "0" },
649 { "log_wmtype", "0" },
650 { "log_wmip", "" },
651 { "log_wmdmax", "300" },
652 { "log_wmsmax", "300" },
654 // admin-debugging
655 { "debug_nocommit", "0" },
656 { "debug_cprintf", "0" },
657 { "debug_cprintf_file", "0" },
658 // { "debug_keepfiles", "0" },
659 { "console_loglevel", "1" },
660 { "t_cafree", "1" },
661 { "t_hidelr", "0" },
662 { "debug_clkfix", "1" },
663 { "debug_ddns", "0" },
665 // admin-cifs
666 { "cifs1", "" },
667 { "cifs2", "" },
669 // admin-jffs2
670 { "jffs2_on", "0" },
671 { "jffs2_exec", "" },
673 #ifdef TCONFIG_USB
674 // nas-usb - !!TB
675 { "usb_enable", "0" },
676 { "usb_uhci", "0" },
677 { "usb_ohci", "0" },
678 { "usb_usb2", "1" },
679 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
680 { "usb_mmc", "-1" },
681 #endif
682 { "usb_irq_thresh", "0" },
683 { "usb_storage", "1" },
684 { "usb_printer", "1" },
685 { "usb_printer_bidirect", "0" },
686 { "usb_ext_opt", "" },
687 { "usb_fat_opt", "" },
688 { "usb_ntfs_opt", "" },
689 { "usb_fs_ext3", "1" },
690 { "usb_fs_fat", "1" },
691 #ifdef TCONFIG_NTFS
692 { "usb_fs_ntfs", "1" },
693 #endif
694 { "usb_fs_hfs", "0" }, //!Victek
695 { "usb_fs_hfsplus", "0" }, //!Victek
696 { "usb_automount", "1" },
697 #if 0
698 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
699 #endif
700 { "script_usbhotplug", "" },
701 { "script_usbmount", "" },
702 { "script_usbumount", "" },
703 { "idle_enable", "0" },
704 #endif
706 #ifdef TCONFIG_FTP
707 // nas-ftp - !!TB
708 { "ftp_enable", "0" },
709 { "ftp_super", "0" },
710 { "ftp_anonymous", "0" },
711 { "ftp_dirlist", "0" },
712 { "ftp_port", "21" },
713 { "ftp_max", "0" },
714 { "ftp_ipmax", "0" },
715 { "ftp_staytimeout", "300" },
716 { "ftp_rate", "0" },
717 { "ftp_anonrate", "0" },
718 { "ftp_anonroot", "" },
719 { "ftp_pubroot", "" },
720 { "ftp_pvtroot", "" },
721 { "ftp_users", "" },
722 { "ftp_custom", "" },
723 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
724 { "ftp_limit", "0,3,60" },
725 { "log_ftp", "0" },
726 #endif
728 #ifdef TCONFIG_SNMP
729 { "snmp_enable", "0" },
730 { "snmp_location", "router" },
731 { "snmp_contact", "admin@tomato" },
732 { "snmp_ro", "rocommunity" },
733 #endif
735 #ifdef TCONFIG_SAMBASRV
736 // nas-samba - !!TB
737 { "smbd_enable", "0" },
738 { "smbd_wgroup", "WORKGROUP" },
739 { "smbd_master", "1" },
740 { "smbd_wins", "1" },
741 { "smbd_cpage", "" },
742 { "smbd_cset", "utf8" },
743 { "smbd_custom", "" },
744 { "smbd_autoshare", "2" },
745 { "smbd_shares",
746 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
748 { "smbd_user", "nas" },
749 { "smbd_passwd", "" },
750 #endif
752 #ifdef TCONFIG_MEDIA_SERVER
753 // nas-media
754 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
755 { "ms_dirs", "/mnt<" },
756 { "ms_port", "0" },
757 { "ms_dbdir", "" },
758 { "ms_tivo", "0" },
759 { "ms_stdlna", "0" },
760 { "ms_sas", "0" },
761 #endif
763 // admin-sch
764 { "sch_rboot", "" },
765 { "sch_rcon", "" },
766 { "sch_c1", "" },
767 { "sch_c2", "" },
768 { "sch_c3", "" },
769 { "sch_c1_cmd", "" },
770 { "sch_c2_cmd", "" },
771 { "sch_c3_cmd", "" },
773 // admin-script
774 { "script_init", "" },
775 { "script_shut", "" },
776 { "script_fire", "#Restrict number of TCP connections per user #iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP #Restrict number of non-TCP connections per user #iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP #Restrict number of simltaneous SMTP connections (from mailer viruses) #iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP" },
777 { "script_wanup", "" },
780 #ifdef TCONFIG_OPENVPN
781 // vpn
782 { "vpn_debug", "0" },
783 { "vpn_server_eas", "" },
784 { "vpn_server_dns", "" },
785 { "vpn_server1_poll", "0" },
786 { "vpn_server1_if", "tun" },
787 { "vpn_server1_proto", "udp" },
788 { "vpn_server1_port", "1194" },
789 { "vpn_server1_firewall", "auto" },
790 { "vpn_server1_crypt", "tls" },
791 { "vpn_server1_comp", "adaptive" },
792 { "vpn_server1_cipher", "default" },
793 { "vpn_server1_dhcp", "1" },
794 { "vpn_server1_r1", "192.168.1.50" },
795 { "vpn_server1_r2", "192.168.1.55" },
796 { "vpn_server1_sn", "10.8.0.0" },
797 { "vpn_server1_nm", "255.255.255.0" },
798 { "vpn_server1_local", "10.8.0.1" },
799 { "vpn_server1_remote", "10.8.0.2" },
800 { "vpn_server1_reneg", "-1" },
801 { "vpn_server1_hmac", "-1" },
802 { "vpn_server1_plan", "1" },
803 { "vpn_server1_ccd", "0" },
804 { "vpn_server1_c2c", "0" },
805 { "vpn_server1_ccd_excl", "0" },
806 { "vpn_server1_ccd_val", "" },
807 { "vpn_server1_pdns", "0" },
808 { "vpn_server1_rgw", "0" },
809 { "vpn_server1_custom", "" },
810 { "vpn_server1_static", "" },
811 { "vpn_server1_ca", "" },
812 { "vpn_server1_crt", "" },
813 { "vpn_server1_key", "" },
814 { "vpn_server1_dh", "" },
815 { "vpn_server2_poll", "0" },
816 { "vpn_server2_if", "tun" },
817 { "vpn_server2_proto", "udp" },
818 { "vpn_server2_port", "1194" },
819 { "vpn_server2_firewall", "auto" },
820 { "vpn_server2_crypt", "tls" },
821 { "vpn_server2_comp", "adaptive" },
822 { "vpn_server2_cipher", "default" },
823 { "vpn_server2_dhcp", "1" },
824 { "vpn_server2_r1", "192.168.1.50" },
825 { "vpn_server2_r2", "192.168.1.55" },
826 { "vpn_server2_sn", "10.8.0.0" },
827 { "vpn_server2_nm", "255.255.255.0" },
828 { "vpn_server2_local", "10.8.0.1" },
829 { "vpn_server2_remote", "10.8.0.2" },
830 { "vpn_server2_reneg", "-1" },
831 { "vpn_server2_hmac", "-1" },
832 { "vpn_server2_plan", "1" },
833 { "vpn_server2_ccd", "0" },
834 { "vpn_server2_c2c", "0" },
835 { "vpn_server2_ccd_excl", "0" },
836 { "vpn_server2_ccd_val", "" },
837 { "vpn_server2_pdns", "0" },
838 { "vpn_server2_rgw", "0" },
839 { "vpn_server2_custom", "" },
840 { "vpn_server2_static", "" },
841 { "vpn_server2_ca", "" },
842 { "vpn_server2_crt", "" },
843 { "vpn_server2_key", "" },
844 { "vpn_server2_dh", "" },
845 { "vpn_client_eas", "" },
846 { "vpn_client1_poll", "0" },
847 { "vpn_client1_if", "tun" },
848 { "vpn_client1_bridge", "1" },
849 { "vpn_client1_nat", "1" },
850 { "vpn_client1_proto", "udp" },
851 { "vpn_client1_addr", "" },
852 { "vpn_client1_port", "1194" },
853 { "vpn_client1_retry", "30" },
854 { "vpn_client1_rg", "0" },
855 { "vpn_client1_firewall", "auto" },
856 { "vpn_client1_crypt", "tls" },
857 { "vpn_client1_comp", "adaptive" },
858 { "vpn_client1_cipher", "default" },
859 { "vpn_client1_local", "10.8.0.2" },
860 { "vpn_client1_remote", "10.8.0.1" },
861 { "vpn_client1_nm", "255.255.255.0" },
862 { "vpn_client1_reneg", "-1" },
863 { "vpn_client1_hmac", "-1" },
864 { "vpn_client1_adns", "0" },
865 { "vpn_client1_rgw", "0" },
866 { "vpn_client1_gw", "" },
867 { "vpn_client1_custom", "" },
868 { "vpn_client1_static", "" },
869 { "vpn_client1_ca", "" },
870 { "vpn_client1_crt", "" },
871 { "vpn_client1_key", "" },
872 { "vpn_client2_poll", "0" },
873 { "vpn_client2_if", "tun" },
874 { "vpn_client2_bridge", "1" },
875 { "vpn_client2_nat", "1" },
876 { "vpn_client2_proto", "udp" },
877 { "vpn_client2_addr", "" },
878 { "vpn_client2_port", "1194" },
879 { "vpn_client2_retry", "30" },
880 { "vpn_client2_rg", "0" },
881 { "vpn_client2_firewall", "auto" },
882 { "vpn_client2_crypt", "tls" },
883 { "vpn_client2_comp", "adaptive" },
884 { "vpn_client2_cipher", "default" },
885 { "vpn_client2_local", "10.8.0.2" },
886 { "vpn_client2_remote", "10.8.0.1" },
887 { "vpn_client2_nm", "255.255.255.0" },
888 { "vpn_client2_reneg", "-1" },
889 { "vpn_client2_hmac", "-1" },
890 { "vpn_client2_adns", "0" },
891 { "vpn_client2_rgw", "0" },
892 { "vpn_client2_gw", "" },
893 { "vpn_client2_custom", "" },
894 { "vpn_client2_static", "" },
895 { "vpn_client2_ca", "" },
896 { "vpn_client2_crt", "" },
897 { "vpn_client2_key", "" },
898 #endif // vpn
899 #ifdef TCONFIG_PPTP
900 { "pptp_client_enable", "0" },
901 { "pptp_client_peerdns", "0" },
902 { "pptp_client_mtuenable","0" },
903 { "pptp_client_mtu", "1450" },
904 { "pptp_client_mruenable","0" },
905 { "pptp_client_mru", "1450" },
906 { "pptp_client_nat", "0" },
907 { "pptp_client_srvip", "" },
908 { "pptp_client_srvsub", "10.0.0.0" },
909 { "pptp_client_srvsubmsk","255.0.0.0" },
910 { "pptp_client_username", "" },
911 { "pptp_client_passwd", "" },
912 { "pptp_client_crypt", "0" },
913 { "pptp_client_custom", "" },
914 { "pptp_client_dfltroute","0" },
915 #endif
917 #if 0
918 // safe to remove?
919 { "QoS", "0" },
921 { "ses_enable", "0" }, // enable ses
922 { "ses_event", "2" }, // initial ses event
923 { "ses_led_assertlvl", "0" }, // For SES II
924 { "ses_client_join", "0" }, // For SES II
925 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
926 { "ses_count", "0" },
927 { "eou_configured", "0" },
929 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
930 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
931 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
932 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
933 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
934 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
935 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
936 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
937 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
938 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
939 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
940 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
942 //obs zzz { "http_method", "post" }, // HTTP method
944 // { "wl_macmode1", "disabled" },
946 /* obsolete
947 { "filter", "on" }, // Firewall Protection [on|off]
948 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
949 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
950 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
951 { "block_cookie", "0" }, // Block Cookie [1|0]
952 { "ident_pass", "0" }, // IDENT passthrough [1|0]
953 { "block_proxy", "0" }, // Block Proxy [1|0]
956 /* --- obsolete ---
957 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
958 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
960 // for mac clone
961 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
962 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
964 { "public_ip", "" }, // public ip
967 //forced in rc.c { "os_name", "" }, // OS name string
968 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
969 //forced in rc.c { "os_date", __DATE__ }, // OS date
970 //not used { "ct_modules", "" }, // CyberTAN kernel modules
971 //obs { "timer_interval", "3600" }, // Timer interval in seconds
972 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
973 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
974 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
975 //obs { "os_server", "" }, // URL for getting upgrades
976 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
977 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
978 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
979 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
980 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
981 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
982 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
983 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
984 //{ "eou_device_id", "" },
985 //{ "eou_public_key", "" },
986 //{ "eou_private_key", "" },
987 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
988 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
989 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
990 // { "ntp_enable", "1" }, // replaced with ntp_updates
991 // { "ntp_mode", "auto" }, // auto, manual
994 // for AOL
995 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
996 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
997 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
998 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
999 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
1001 // advanced-watchdog
1002 { "wd_en", "" },
1003 { "wd_atp0", "" },
1004 { "wd_atp1", "" },
1005 { "wd_atp2", "" },
1006 { "wd_atp3", "" },
1007 { "wd_atp4", "" },
1008 { "wd_mxr", "3" },
1009 { "wd_rdy", "15" },
1010 { "wd_cki", "300" },
1011 { "wd_fdm", "" },
1012 { "wd_aof", "" },
1014 #endif // 0
1016 // arpbind
1017 { "arpbind_enable", "0" },
1018 { "arpbind_only", "0" },
1019 { "arpbind_list", "" },
1021 // NoCatSplash. !!Victek
1022 #ifdef TCONFIG_NOCAT
1023 { "NC_enable", "0" }, // enable NoCatSplash
1024 { "NC_Verbosity", "0" }, // logging too verbose on startup!
1025 { "NC_GatewayName", "WWW Portal" },
1026 { "NC_GatewayPort", "5280" },
1027 { "NC_GatewayMode", "Open" },
1028 { "NC_DocumentRoot", "/tmp/splashd" },
1029 { "NC_ExcludePorts", "1863" },
1030 { "NC_HomePage", "" },
1031 { "NC_ForcedRedirect", "0" },
1032 { "NC_IdleTimeout", "0" },
1033 { "NC_MaxMissedARP", "5" },
1034 { "NC_PeerChecktimeout", "0" },
1035 { "NC_LoginTimeout", "86400" },
1036 { "NC_RenewTimeout", "0" },
1037 { "NC_AllowedWebHosts", "" },
1038 #endif
1039 { NULL, NULL}
1043 const defaults_t if_generic[] = {
1044 { "lan_ifname", "br0" },
1045 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
1046 { "wan_ifname", "eth1" },
1047 { "wan_ifnames", "eth1" },
1048 { NULL, NULL }
1051 const defaults_t if_vlan[] = {
1052 { "lan_ifname", "br0" },
1053 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
1054 #ifdef TCONFIG_VLAN
1055 { "lan1_ifname", "" },
1056 { "lan1_ifnames", "" },
1057 { "lan2_ifname", "" },
1058 { "lan2_ifnames", "" },
1059 { "lan3_ifname", "" },
1060 { "lan3_ifnames", "" },
1061 #endif
1062 { "wan_ifname", "vlan1" },
1063 { "wan_ifnames", "vlan1" },
1064 { NULL, NULL }