Tomato 1.26 beta(1766)
[tomato.git] / release / src / router / nvram / defaults.c
blob4fde63c341282dfff3bbf5fe8907d57f03a9ba43
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include "tomato_profile.h"
36 #include "defaults.h"
38 //! = see restore_main()
40 const defaults_t defaults[] = {
41 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
43 // LAN H/W parameters
44 //! { "lan_ifname", "" }, // LAN interface name
45 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
46 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
47 { "lan_hwaddr", "" }, // LAN interface MAC address
49 // LAN TCP/IP parameters
50 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
51 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //Barry add 2004 09 16
52 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
53 { "lan_netmask", "255.255.255.0" }, // LAN netmask
54 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
55 { "lan_domain", "" }, // LAN domain name
56 { "lan_lease", "86400" }, // LAN lease time in seconds
57 { "lan_stp", "0" }, // LAN spanning tree protocol
58 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
60 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
61 { "wds_enable", "0" }, // WDS Enable (0|1)
63 // WAN H/W parameters
64 //! { "wan_ifname", "" }, // WAN interface name
65 //! { "wan_ifnames", "" }, // WAN interface names
66 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
67 { "wan_hwaddr", "" }, // WAN interface MAC address
68 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
70 // WAN TCP/IP parameters
71 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
72 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
73 { "wan_netmask", "0.0.0.0" }, // WAN netmask
74 { "wan_gateway", "0.0.0.0" }, // WAN gateway
75 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
76 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
77 { "wan_lease", "86400" }, // WAN lease time in seconds
78 { "wan_islan", "0" },
80 { "wan_primary", "1" }, // Primary wan connection
81 { "wan_unit", "0" }, // Last configured connection
83 // Filters
84 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
85 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
86 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
88 { "filter", "on" }, // [on | off] Firewall Protection
90 // Port forwards
91 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
93 // DHCP server parameters
94 { "dhcp_start", "100" }, //
95 { "dhcp_num", "50" }, //
96 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
97 { "dhcpd_endip", "" }, // "
98 { "dhcp_lease", "0" }, // LAN lease time in minutes
99 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
100 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
103 // PPPoE parameters
104 { "pppoe_ifname", "" }, // PPPoE enslaved interface
105 { "ppp_username", "" }, // PPP username
106 { "ppp_passwd", "" }, // PPP password
107 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
108 { "ppp_keepalive", "0" }, // Restore link automatically
109 { "ppp_demand", "0" }, // Dial on demand
110 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
111 { "ppp_mru", "1500" }, // Negotiate MRU to this value
112 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
113 { "ppp_service", "" }, // PPPoE service name
114 { "ppp_ac", "" }, // PPPoE access concentrator name
115 { "ppp_static", "0" }, // Enable / Disable Static IP
116 { "ppp_static_ip", "" }, // PPPoE Static IP
117 { "ppp_get_ac", "" }, // PPPoE Server ac name
118 { "ppp_get_srv", "" }, // PPPoE Server service name
120 { "pppoe_lei", "" },
121 { "pppoe_lef", "" },
123 // Wireless parameters
124 { "wl_ifname", "" }, // Interface name
125 { "wl_hwaddr", "" }, // MAC address
126 { "wl_phytype", "g" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
127 { "wl_corerev", "" }, // Current core revision
128 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
129 { "wl_radioids", "" }, // List of radio IDs
130 { "wl_ssid", "wireless" }, // Service set ID (network name)
131 { "wl_country", "Worldwide" }, // Country (default obtained from driver)
132 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
133 { "wl_closed", "0" }, // Closed (hidden) network
134 { "wl_ap_isolate", "0" }, // AP isolate mode
135 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
136 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
137 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
138 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
139 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
140 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
141 { "wl_key", "1" }, // Current WEP key
142 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
143 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
144 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
145 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
146 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
147 { "wl_channel", "6" }, // Channel number
148 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
149 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
150 { "wl_rateset", "default" }, // "default" or "all" or "12"
151 { "wl_frag", "2346" }, // Fragmentation threshold
152 { "wl_rts", "2347" }, // RTS threshold
153 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
154 { "wl_bcn", "100" }, // Beacon interval
155 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
156 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
157 { "wl_gmode", "1" }, // 54g mode
158 { "wl_gmode_protection","off" }, // 802.11g RTS/CTS protection (off|auto)
159 { "wl_afterburner", "off" }, // AfterBurner
160 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
161 { "wl_wme", "off" }, // WME mode (off|on)
162 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
163 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
165 { "wl_passphrase", "" }, // Passphrase // Add
166 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
167 { "wl_wep_buf", "" }, // save all settings for web // Add
168 { "wl_wep_gen", "" }, // save all settings for generate button // Add
169 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
170 { "wl_active_mac", "" }, // xx:xx:xx:xx:xx:xx ... // Add
172 // WPA parameters
173 { "security_mode2", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
174 { "security_mode", "disabled" }, // WPA mode (disabled|radius|wpa|psk|wep|psk psk2|wpa wpa2) for WEB // Add
175 { "security_mode_last", "" }, // Save last WPA mode // Add
176 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
177 { "wl_wpa_psk", "" }, // WPA pre-shared key
178 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
179 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
180 { "wl_radius_key", "" }, // RADIUS shared secret
181 { "wl_radius_port", "1812" }, // RADIUS server UDP port
182 { "wl_crypto", "tkip" }, // WPA data encryption
183 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
184 { "wl_akm", "" }, // WPA akm list
186 // WME parameters
187 // EDCA parameters for STA
188 { "wl_wme_sta_bk", "15 1023 7 0 0 off" }, // WME STA AC_BK paramters
189 { "wl_wme_sta_be", "15 1023 3 0 0 off" }, // WME STA AC_BE paramters
190 { "wl_wme_sta_vi", "7 15 2 6016 3008 off" }, // WME STA AC_VI paramters
191 { "wl_wme_sta_vo", "3 7 2 3264 1504 off" }, // WME STA AC_VO paramters
193 // EDCA parameters for AP
194 { "wl_wme_ap_bk", "15 1023 7 0 0 off" }, // WME AP AC_BK paramters
195 { "wl_wme_ap_be", "15 63 3 0 0 off" }, // WME AP AC_BE paramters
196 { "wl_wme_ap_vi", "7 15 1 6016 3008 off" }, // WME AP AC_VI paramters
197 { "wl_wme_ap_vo", "3 7 1 3264 1504 off" }, // WME AP AC_VO paramters
199 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
201 { "wl_unit", "0" }, // Last configured interface
202 { "wl_mac_deny", "" }, // filter MAC // Add
204 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
205 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
206 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
208 { "pptp_server_ip", "" }, // as same as WAN gateway
209 { "pptp_get_ip", "" }, // IP Address assigned by PPTP server
211 // for firewall
212 { "mtu_enable", "0" }, // WAN MTU [1|0]
213 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
215 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
216 { "l2tp_get_ip", "" }, // IP Address assigned by L2TP server
217 { "wan_gateway_buf", "0.0.0.0" }, // save the default gateway for DHCP
218 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
219 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
221 // misc
222 { "t_noise", "-99" },
223 { "led_override", "" },
224 { "btn_override", "" },
225 { "btn_reset", "" },
226 { "env_path", "" },
227 { "manual_boot_nv", "0" },
228 { "wlx_hpamp", "" },
229 // { "wlx_hperx", "" }, // see init.c
230 { "t_fix1", "" },
232 // basic-ddns
233 { "ddnsx0", "" },
234 { "ddnsx1", "" },
235 { "ddnsx0_cache", "" },
236 { "ddnsx1_cache", "" },
237 { "ddnsx_save", "1" },
238 { "ddnsx_refresh", "28" },
240 // basic-network
241 { "wds_save", "" },
243 // basic-ident
244 { "router_name", "tomato" },
245 { "wan_hostname", "unknown" },
246 { "wan_domain", "" },
248 // basic-time
249 { "tm_sel", "PST8PDT,M3.2.0/2,M11.1.0/2" },
250 { "tm_tz", "PST8PDT,M3.2.0/2,M11.1.0/2" },
251 { "tm_dst", "1", },
252 { "ntp_updates", "4" },
253 { "ntp_tdod", "0" },
254 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
255 { "ntp_kiss", "" },
256 { "ntp_kiss_ignore", "" },
258 // basic-static
259 { "dhcpd_static", "" },
261 // basic-wfilter
262 { "wl_mac_list", "" },
263 { "wl_macmode", "disabled" },
264 { "macnames", "" },
266 // advanced-ctnf
267 { "ct_tcp_timeout", "" },
268 { "ct_udp_timeout", "" },
269 { "ct_max", "" },
270 { "nf_ttl", "0" },
271 { "nf_l7in", "1" },
272 { "nf_rtsp", "1" },
273 { "nf_pptp", "1" },
274 { "nf_h323", "1" },
275 { "nf_ftp", "1" },
277 // advanced-mac
278 { "mac_wan", "" },
279 { "mac_wl", "" },
281 // advanced-misc
282 { "boot_wait", "on" },
283 { "wait_time", "5" },
284 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
286 // advanced-dhcpdns
287 { "dhcpd_dmdns", "1" },
288 { "dhcpd_slt", "0" },
289 { "dhcpd_gwmode", "" },
290 { "dhcpd_lmax", "" },
291 { "dns_addget", "0" },
292 { "dns_intcpt", "0" },
293 { "dhcpc_minpkt", "0" },
294 { "dnsmasq_custom", "" },
295 // { "dnsmasq_norw", "0" },
297 // advanced-firewall
298 // { "block_loopback", "0" }, // nat loopback
299 { "nf_loopback", "1" },
300 { "block_wan", "1" }, // block inbound icmp
301 { "multicast_pass", "0" }, // enable multicast proxy
302 { "ne_syncookies", "0" }, // tcp_syncookies
303 { "ne_shlimit", "0,3,60" },
305 // advanced-routing
306 { "routes_static", "" },
307 { "wk_mode", "gateway" }, // Network mode [gateway|router]
308 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
309 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
310 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
311 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
312 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
314 // advanced-wireless
315 { "wl_txant", "3" },
316 { "wl_txpwr", "42" },
317 { "wl_maxassoc", "128" }, // Max associations driver could support
318 { "wl_distance", "" },
320 // forward-*
321 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
322 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
323 { "dmz_enable", "0" },
324 { "dmz_ipaddr", "0" },
325 { "dmz_sip", "" },
327 // forward-upnp
328 { "upnp_enable", "1" },
329 { "upnp_secure", "1" },
330 { "upnp_port", "5000" },
331 #if 0 // disabled for miniupnpd
332 { "upnp_ssdp_interval", "60" }, // SSDP interval
333 { "upnp_max_age", "180" }, // Max age
334 { "upnp_mnp", "0" },
335 { "upnp_config", "0" },
336 #endif
338 // qos
339 { "qos_enable", "0" },
340 { "qos_ack", "1" },
341 { "qos_syn", "0" },
342 { "qos_fin", "0" },
343 { "qos_rst", "0" },
344 { "qos_icmp", "0" },
345 { "qos_reset", "0" },
346 { "qos_obw", "230" },
347 { "qos_ibw", "1000" },
348 { "qos_orules", "0<<6<d<80,443<0<<0:512<1<WWW>0<<6<d<80,443<0<<512:<3<WWW (512K+)>0<<-1<d<53<0<<0:2<0<DNS>0<<-1<d<53<0<<2:<4<DNS (2K+)>0<<-1<d<1024:65535<0<<<4<Bulk Traffic" },
349 { "qos_burst0", "" },
350 { "qos_burst1", "" },
352 { "qos_default", "3" },
353 { "qos_orates", "80-100,10-100,5-100,3-100,2-95,1-50,1-40,1-30,1-20,1-10" },
355 { "ne_vegas", "0" }, // TCP Vegas
356 { "ne_valpha", "2" }, // "
357 { "ne_vbeta", "6" }, // "
358 { "ne_vgamma", "2" }, // "
360 // access restrictions
361 { "rruleN", "0" },
362 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
363 //* { "rrule##", "" },
364 { "rrulewp", "80,8080" },
366 #if TOMATO_SL
367 // samba
368 { "smbd_on", "0" },
369 { "nmbd_on", "0" },
370 { "smbd_wgroup", "WORKGROUP" },
371 { "smbd_nbname", "TOMATO" },
372 { "smbd_adminpass", "admin" },
373 #endif
375 // admin-access
376 { "http_username", "" }, // Username
377 { "http_passwd", "admin" }, // Password
378 { "remote_management", "0" }, // Remote Management [1|0]
379 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
380 { "http_wanport", "8080" }, // WAN port to listen on
381 { "http_lanport", "80" }, // LAN port to listen on
382 { "https_lanport", "443" }, // LAN port to listen on
383 { "http_enable", "1" }, // HTTP server enable/disable
384 { "https_enable", "0" }, // HTTPS server enable/disable
385 { "https_crt_save", "0" },
386 { "https_crt_cn", "" },
387 { "https_crt_file", "" },
388 { "https_crt", "" },
389 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
390 { "web_css", "tomato" },
391 { "web_svg", "1" },
392 { "telnetd_eas", "1" },
393 { "telnetd_port", "23" },
394 { "sshd_eas", "0" },
395 { "sshd_pass", "1" },
396 { "sshd_port", "22" },
397 { "sshd_remote", "0" },
398 { "sshd_rport", "2222" },
399 { "sshd_authkeys", "" },
400 { "sshd_hostkey", "" },
401 { "rmgt_sip", "" }, // remote management: source ip address
403 { "http_id", "" },
404 { "web_mx", "" },
405 { "web_pb", "" },
407 // admin-bwm
408 { "rstats_enable", "1" },
409 { "rstats_path", "" },
410 { "rstats_stime", "48" },
411 { "rstats_offset", "1" },
412 { "rstats_data", "" },
413 { "rstats_colors", "" },
414 { "rstats_exclude", "" },
415 { "rstats_sshut", "1" },
416 { "rstats_bak", "0" },
418 // advanced-buttons
419 { "sesx_led", "0" },
420 { "sesx_b0", "1" },
421 { "sesx_b1", "4" },
422 { "sesx_b2", "4" },
423 { "sesx_b3", "4" },
424 { "sesx_script",
425 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
427 { "script_brau",
428 "if [ ! -e /tmp/switch-start ]; then\n"
429 " # do something at startup\n"
430 " echo position at startup was $1 >/tmp/switch-start\n"
431 " exit\n"
432 "fi\n"
433 "if [ $1 = \"bridge\" ]; then\n"
434 " # do something\n"
435 " led bridge on\n"
436 "elif [ $1 = \"auto\" ]; then\n"
437 " # do something\n"
438 " led bridge off\n"
439 "fi\n"
442 // admin-log
443 { "log_remote", "0" },
444 { "log_remoteip", "" },
445 { "log_remoteport", "514" },
446 { "log_file", "1" },
447 { "log_limit", "60" },
448 { "log_in", "0" },
449 { "log_out", "0" },
450 { "log_mark", "60" },
451 { "log_events", "" },
453 // admin-debugging
454 { "debug_nocommit", "0" },
455 { "debug_cprintf", "0" },
456 { "debug_cprintf_file", "0" },
457 // { "debug_keepfiles", "0" },
458 { "console_loglevel", "1" },
459 { "t_cafree", "0" },
460 { "t_hidelr", "0" },
461 { "debug_clkfix", "1" },
462 { "debug_ddns", "0" },
464 // admin-cifs
465 { "cifs1", "" },
466 { "cifs2", "" },
468 // admin-jffs2
469 { "jffs2_on", "0" },
470 { "jffs2_exec", "" },
472 // admin-sch
473 { "sch_rboot", "" },
474 { "sch_rcon", "" },
475 { "sch_c1", "" },
476 { "sch_c2", "" },
477 { "sch_c3", "" },
478 { "sch_c1_cmd", "" },
479 { "sch_c2_cmd", "" },
480 { "sch_c3_cmd", "" },
482 // admin-script
483 { "script_init", "" },
484 { "script_shut", "" },
485 { "script_fire", "" },
486 { "script_wanup", "" },
488 #if 0
489 // safe to remove?
490 { "QoS", "0" },
492 { "ses_enable", "0" }, // enable ses
493 { "ses_event", "2" }, // initial ses event
494 { "ses_led_assertlvl", "0" }, // For SES II
495 { "ses_client_join", "0" }, // For SES II
496 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
497 { "ses_count", "0" },
498 { "eou_configured", "0" },
500 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
501 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
502 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
503 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
504 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
505 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
506 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
507 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
508 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
509 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
510 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
511 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
513 //obs zzz { "http_method", "post" }, // HTTP method
515 // { "wl_macmode1", "disabled" },
517 /* obsolete
518 { "filter", "on" }, // Firewall Protection [on|off]
519 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
520 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
521 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
522 { "block_cookie", "0" }, // Block Cookie [1|0]
523 { "ident_pass", "0" }, // IDENT passthrough [1|0]
524 { "block_proxy", "0" }, // Block Proxy [1|0]
527 /* --- obsolete ---
528 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
529 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
531 // for mac clone
532 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
533 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
535 { "public_ip", "" }, // public ip
538 //forced in rc.c { "os_name", "" }, // OS name string
539 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
540 //forced in rc.c { "os_date", __DATE__ }, // OS date
541 //not used { "ct_modules", "" }, // CyberTAN kernel modules
542 //obs { "timer_interval", "3600" }, // Timer interval in seconds
543 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
544 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
545 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
546 //obs { "os_server", "" }, // URL for getting upgrades
547 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
548 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
549 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
550 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
551 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
552 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
553 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
554 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
555 //{ "eou_device_id", "" },
556 //{ "eou_public_key", "" },
557 //{ "eou_private_key", "" },
558 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
559 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
560 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
561 // { "ntp_enable", "1" }, // replaced with ntp_updates
562 // { "ntp_mode", "auto" }, // auto, manual
565 // for AOL
566 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
567 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
568 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
569 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
570 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
572 // advanced-watchdog
573 { "wd_en", "" },
574 { "wd_atp0", "" },
575 { "wd_atp1", "" },
576 { "wd_atp2", "" },
577 { "wd_atp3", "" },
578 { "wd_atp4", "" },
579 { "wd_mxr", "3" },
580 { "wd_rdy", "15" },
581 { "wd_cki", "300" },
582 { "wd_fdm", "" },
583 { "wd_aof", "" },
585 #endif // 0
587 { NULL, NULL }
590 const defaults_t if_generic[] = {
591 { "lan_ifname", "br0" },
592 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
593 { "wan_ifname", "eth1" },
594 { "wan_ifnames", "eth1" },
595 { NULL, NULL }
598 const defaults_t if_vlan[] = {
599 { "lan_ifname", "br0" },
600 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
601 { "wan_ifname", "vlan1" },
602 { "wan_ifnames", "vlan1" },
603 { NULL, NULL }