Set default for manual_boot_nv=1
[tomato.git] / release / src / router / nvram / defaults.c
bloba4f649642f49ef109286763ceeae03c7e44d9455
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 // { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //start with no dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
64 #ifdef TCONFIG_VLAN
65 { "lan1_ipaddr", "" },
66 { "lan1_netmask", "" },
67 { "lan1_stp", "0" },
68 { "lan2_ipaddr", "" },
69 { "lan2_netmask", "" },
70 { "lan2_stp", "0" },
71 { "lan3_ipaddr", "" },
72 { "lan3_netmask", "" },
73 { "lan3_stp", "0" },
74 #endif
76 // WAN H/W parameters
77 //! { "wan_ifname", "" }, // WAN interface name
78 //! { "wan_ifnames", "" }, // WAN interface names
79 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
80 { "wan_hwaddr", "" }, // WAN interface MAC address
81 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
83 // WAN TCP/IP parameters
84 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
85 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
86 { "wan_netmask", "0.0.0.0" }, // WAN netmask
87 { "wan_gateway", "0.0.0.0" }, // WAN gateway
88 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
89 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
90 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
91 { "wan_lease", "86400" }, // WAN lease time in seconds
92 { "wan_islan", "0" },
94 { "wan_primary", "1" }, // Primary wan connection
95 { "wan_unit", "0" }, // Last configured connection
96 /* --- obsolete ---
97 // Filters
98 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
99 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
100 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
102 { "filter", "on" }, // [on | off] Firewall Protection
104 // Port forwards
105 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
107 // DHCP server parameters
108 { "dhcp_start", "100" }, //
109 { "dhcp_num", "50" }, //
110 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
111 { "dhcpd_endip", "" }, // "
112 { "dhcp_lease", "0" }, // LAN lease time in minutes
113 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
114 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
115 { "wan_routes", "" },
116 { "wan_msroutes", "" },
118 #ifdef TCONFIG_VLAN
119 { "dhcp1_start", "" },
120 { "dhcp1_num", "" },
121 { "dhcpd1_startip", "" },
122 { "dhcpd1_endip", "" },
123 { "dhcp1_lease", "0" },
124 { "dhcp2_start", "" },
125 { "dhcp2_num", "" },
126 { "dhcpd2_startip", "" },
127 { "dhcpd2_endip", "" },
128 { "dhcp2_lease", "0" },
129 { "dhcp3_start", "" },
130 { "dhcp3_num", "" },
131 { "dhcpd3_startip", "" },
132 { "dhcpd3_endip", "" },
133 { "dhcp3_lease", "0" },
134 #endif
136 // PPPoE parameters
137 { "pppoe_ifname", "" }, // PPPoE enslaved interface
138 { "ppp_username", "" }, // PPP username
139 { "ppp_passwd", "" }, // PPP password
140 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
141 { "ppp_keepalive", "0" }, // Restore link automatically
142 { "ppp_demand", "0" }, // Dial on demand
143 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
144 { "ppp_mru", "1500" }, // Negotiate MRU to this value
145 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
146 { "ppp_service", "" }, // PPPoE service name
147 { "ppp_ac", "" }, // PPPoE access concentrator name
148 { "ppp_static", "0" }, // Enable / Disable Static IP
149 { "ppp_static_ip", "" }, // PPPoE Static IP
150 { "ppp_get_ac", "" }, // PPPoE Server ac name
151 { "ppp_get_srv", "" }, // PPPoE Server service name
152 { "ppp_custom", "" }, // PPPD additional options
153 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
155 { "pppoe_lei", "" },
156 { "pppoe_lef", "" },
158 #ifdef TCONFIG_IPV6
159 // IPv6 parameters
160 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
161 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
162 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
163 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
164 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
165 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
166 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
167 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
168 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
169 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
170 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
171 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
172 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
173 { "ipv6_dns", "" }, // DNS server(s) IPs
174 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
175 #endif
177 // Wireless parameters
178 { "wl_ifname", "" }, // Interface name
179 { "wl_hwaddr", "" }, // MAC address
180 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
181 { "wl_corerev", "" }, // Current core revision
182 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
183 { "wl_radioids", "" }, // List of radio IDs
184 { "wl_ssid", "wireless" }, // Service set ID (network name)
185 { "wl1_ssid", "wireless1" },
186 { "wl_country_code", "US" }, // Country (default obtained from driver)
187 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
188 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
189 { "wl_closed", "0" }, // Closed (hidden) network
190 { "wl_ap_isolate", "0" }, // AP isolate mode
191 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
192 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
193 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
194 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
195 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
196 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
197 { "wl_key", "1" }, // Current WEP key
198 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
199 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
200 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
201 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
202 { "wl_channel", "1" }, // Channel number
203 { "wl1_channel", "0" },
204 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
205 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
206 { "wl_rateset", "default" }, // "default" or "all" or "12"
207 { "wl_frag", "2346" }, // Fragmentation threshold
208 { "wl_rts", "2347" }, // RTS threshold
209 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
210 { "wl_bcn", "100" }, // Beacon interval
211 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
212 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
213 { "wl_gmode", "1" }, // 54g mode
214 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
215 { "wl_afterburner", "off" }, // AfterBurner
216 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
217 { "wl_wme", "auto" }, // WME mode (auto|off|on)
218 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
219 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
220 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
221 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
222 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
223 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3|4) //Toastman - 0=off
224 { "wl_passphrase", "" }, // Passphrase // Add
225 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
226 { "wl_wep_buf", "" }, // save all settings for web // Add
227 { "wl_wep_gen", "" }, // save all settings for generate button // Add
228 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
230 // WPA parameters
231 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
232 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
233 { "wl_wpa_psk", "" }, // WPA pre-shared key
234 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
235 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
236 { "wl_radius_key", "" }, // RADIUS shared secret
237 { "wl_radius_port", "1812" }, // RADIUS server UDP port
238 { "wl_crypto", "aes" }, // WPA data encryption
239 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
240 { "wl_akm", "" }, // WPA akm list
242 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
243 // EDCA parameters for STA
244 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
245 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
246 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
247 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
249 // EDCA parameters for AP
250 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
251 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
252 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
253 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
255 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
256 { "wl_wme_apsd", "off" }, // WME APSD mode
257 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
259 /* Per AC Tx parameters */
260 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
261 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
262 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
263 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
265 { "wl_unit", "0" }, // Last configured interface
266 { "wl_mac_deny", "" }, // filter MAC // Add
268 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
269 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
270 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
272 // !!TB: n-mode
273 { "wl_nmode", "-1" }, // N-mode
274 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
275 { "wl1_nband", "1" },
276 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
277 { "wl_nreqd", "0" }, // Require 802.11n support
278 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
279 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
280 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
281 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
282 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
283 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
284 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
285 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
286 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
287 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
288 { "wl_bcn_rotate", "1" }, // Beacon rotation
289 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
290 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
292 #ifdef TCONFIG_EMF
293 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
294 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
295 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
296 { "emf_enable", "0" }, // Disable EMF by default
297 #endif
298 #ifdef CONFIG_BCMWL5
299 // AMPDU
300 { "wl_ampdu", "auto" }, // Default AMPDU setting
301 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
302 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
303 { "wl_amsdu", "auto" }, // Default AMSDU setting
304 // power save
305 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
306 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
307 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
308 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
309 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
310 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
311 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
312 // misc
313 { "wl_wmf_bss_enable", "0" }, // Wireless Multicast Forwarding Enable/Disable
314 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
315 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
316 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
317 #endif
319 { "pptp_server_ip", "" }, // as same as WAN gateway
320 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
321 { "pptp_dhcp", "1" },
323 // for firewall
324 { "mtu_enable", "0" }, // WAN MTU [1|0]
325 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
327 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
328 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
329 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
331 // misc
332 { "wl_tnoise", "-99" },
333 { "led_override", "" },
334 { "btn_override", "" },
335 { "btn_reset", "" },
336 { "env_path", "" },
337 { "manual_boot_nv", "1" },
338 // { "wlx_hpamp", "" },
339 // { "wlx_hperx", "" }, // see init.c
340 { "t_fix1", "" },
342 // basic-ddns
343 { "ddnsx0", "" },
344 { "ddnsx1", "" },
345 { "ddnsx0_cache", "" },
346 { "ddnsx1_cache", "" },
347 { "ddnsx_save", "1" },
348 { "ddnsx_refresh", "28" },
350 // basic-ident
351 { "router_name", "toast" },
352 { "wan_hostname", "unknown" },
353 { "wan_domain", "" },
355 // basic-time
356 { "tm_sel", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
357 { "tm_tz", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
358 { "tm_dst", "1", },
359 { "ntp_updates", "4" },
360 { "ntp_tdod", "0" },
361 { "ntp_server", "0.europe.pool.ntp.org 1.europe.pool.ntp.org 2.europe.pool.ntp.org" },
362 { "ntp_kiss", "" },
363 { "ntp_kiss_ignore", "" },
365 // basic-static
366 { "dhcpd_static", "" },
368 // basic-wfilter
369 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
370 { "wl_macmode", "disabled" },
371 { "macnames", "" },
373 // advanced-ctnf
374 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
375 { "ct_udp_timeout", "30 180" },
376 { "ct_timeout", "10 10" },
377 { "ct_max", "8192" },
378 { "nf_ttl", "0" },
379 { "nf_l7in", "1" },
380 #ifdef LINUX26
381 { "nf_sip", "1" },
382 { "ct_hashsize", "2048" },
383 #endif
384 #ifdef LINUX26
385 { "nf_rtsp", "0" },
386 #else
387 { "nf_rtsp", "1" },
388 #endif
389 { "nf_pptp", "1" },
390 { "nf_h323", "1" },
391 { "nf_ftp", "1" },
393 // advanced-mac
394 { "mac_wan", "" },
395 { "wl_macaddr", "" },
397 // advanced-misc
398 { "boot_wait", "on" },
399 { "wait_time", "5" },
400 { "clkfreq", "" },
401 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
402 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
403 { "jumbo_frame_size", "2000" },
404 #ifdef CONFIG_BCMWL5
405 { "ctf_disable", "1" },
406 #endif
408 // advanced-dhcpdns
409 { "dhcpd_dmdns", "1" },
410 { "dhcpd_slt", "0" },
411 { "dhcpd_gwmode", "" },
412 { "dhcpd_lmax", "" },
413 { "dns_addget", "0" },
414 { "dns_intcpt", "0" },
415 { "dhcpc_minpkt", "1" },
416 { "dhcpc_custom", "" },
417 { "dns_norebind", "1" },
418 { "dnsmasq_custom", "" },
419 { "dhcpd_static_only", "0" },
420 // { "dnsmasq_norw", "0" },
422 // advanced-firewall
423 // { "block_loopback", "0" }, // nat loopback
424 { "nf_loopback", "0" },
425 { "block_wan", "1" }, // block inbound icmp
426 { "multicast_pass", "0" }, // enable multicast proxy
427 #ifdef TCONFIG_VLAN
428 { "multicast_lan", "0" }, // on LAN (br0)
429 { "multicast_lan1", "0" }, // on LAN1 (br1)
430 { "multicast_lan2", "0" }, // on LAN2 (br2)
431 { "multicast_lan3", "0" }, // on LAN3 (br3)
432 #endif
433 { "ne_syncookies", "0" }, // tcp_syncookies
434 { "dhcp_pass", "1" }, // allow DHCP responses
435 { "ne_shlimit", "0,3,60" },
437 // advanced-routing
438 { "routes_static", "" },
439 { "dhcp_routes", "1" },
440 { "wk_mode", "gateway" }, // Network mode [gateway|router]
441 #ifdef TCONFIG_ZEBRA
442 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
443 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
444 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
445 #ifdef TCONFIG_VLAN
446 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
447 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
448 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
449 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
450 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
451 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
452 #endif
453 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
454 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
455 #endif
457 // advanced-vlan
458 { "trunk_vlan_so", "0" }, // VLAN trunk support override
460 // advanced-wireless
461 { "wl_txant", "3" },
462 { "wl_txpwr", "42" },
463 { "wl_maxassoc", "128" }, // Max associations driver could support
464 { "wl_bss_maxassoc", "128" },
465 { "wl_distance", "" },
467 // forward-*
468 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
469 #ifdef TCONFIG_IPV6
470 { "ipv6_portforward", ""},
471 #endif
472 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
473 { "dmz_enable", "0" },
474 { "dmz_ipaddr", "0" },
475 { "dmz_sip", "" },
477 // forward-upnp
478 { "upnp_enable", "3" },
479 { "upnp_secure", "1" },
480 { "upnp_port", "0" },
481 { "upnp_ssdp_interval", "60" }, // SSDP interval
482 { "upnp_max_age", "180" }, // Max age
483 { "upnp_mnp", "0" },
484 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
485 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
486 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
487 #if 0 // disabled for miniupnpd
488 { "upnp_max_age", "180" }, // Max age
489 { "upnp_config", "0" },
490 #endif
492 // qos
493 { "qos_enable", "0" },
494 { "qos_ack", "0" },
495 { "qos_syn", "1" },
496 { "qos_fin", "1" },
497 { "qos_rst", "1" },
498 { "qos_icmp", "1" },
499 { "qos_reset", "1" },
500 { "qos_obw", "700" },
501 { "qos_ibw", "16000" },
502 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<-1<d<123<0<<0:10<<0<Network Time (NTP)>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<x<9<0<<<<0<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<0<RPC (Microsoft)>0<<6<x<23,992<0<<<<0<Telnet>0<<-1<d<22<0<<<<3<SSH>0<<17<x<3544<0<<<<3<Teredo port>0<<6<s<80,8080<0<<<<3<Remote Router Access>0<<6<x<3389<0<<<<3<Remote Assistance>0<<-1<a<<0<flash<<<2<Flash Video, (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video, (Youtube)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<s<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<6<x<6005<0<<<<2<Camfrog>0<<-1<d<1220,1234,5100,6005,6970<0<<<<-1<VLC>0<<-1<x<554,5004,5005<0<<<<2<RTP/RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<x<1935<0<<<<2<RTMP>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<d<1718:1720<0<<<<1<H323>0<<-1<a<<0<skypetoskype<<<1<Skype>0<<-1<a<<0<skypeout<<<1<Skypeout>0<<-1<d<80<0<<0:512<<4<HTTP>0<<-1<d<443<0<<0:512<<4<HTTPS>0<<6<d<8080<0<<0:512<<4<HTTP Proxy / Alternate>0<<-1<d<25,587,465<0<<<<5<SMTP, Submission>0<<-1<d<110,995<0<<<<5<POP3 Mail>0<<-1<d<119,563<0<<<<5<NNTP>0<<-1<d<143,220,585,993<0<<<<5<IMAP Mail>0<<-1<a<<0<irc<<<6<IRC>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<Yahoo Messenger>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<Other Chat Services>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<-1<x<6571,6891:6901<0<<<<7<WLM File/Webcam>0<<6<d<80,443,8080<0<<512:<<7<HTTP,SSL File Transfers>0<<17<x<1:65535<0<<<<-1<P2P (uTP, UDP)" },
503 { "qos_burst0", "" },
504 { "qos_burst1", "" },
505 { "qos_default", "8" },
506 { "qos_orates", "5-20,5-20,5-25,5-70,20-100,5-80,5-80,5-80,5-50,0-0" },
507 { "qos_irates", "10,60,60,70,0,60,60,80,30,1" },
508 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger Download P2P/Bulk Crawl" },
510 { "ne_vegas", "0" }, // TCP Vegas
511 { "ne_valpha", "3" }, // "
512 { "ne_vbeta", "3" }, // "
513 { "ne_vgamma", "2" }, // "
515 // qos-bw-limiter
516 { "qosl_enable", "0" },
517 // { "qosl_obw", "" }, unused - used qos_obw
518 // { "qosl_ibw", "" }, unused - used qos_obw
519 { "qosl_rules", "" },
520 { "qosl_denable", "0" },
521 { "qosl_dtcp", "0" },//unlimited
522 { "qosl_dudp", "0" },//unlimited
523 { "qosl_ddlc", "" },
524 { "qosl_dulc", "" },
525 { "qosl_ddlr", "" },
526 { "qosl_dulr", "" },
528 // access restrictions
529 { "rruleN", "0" },
530 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
531 //* { "rrule##", "" },
532 { "rrulewp", "80,8080" },
534 #if TOMATO_SL
535 // samba
536 { "smbd_on", "0" },
537 { "nmbd_on", "0" },
538 { "smbd_wgroup", "WORKGROUP" },
539 { "smbd_nbname", "TOMATO" },
540 { "smbd_adminpass", "admin" },
541 #endif
543 // admin-access
544 { "http_username", "" }, // Username
545 { "http_passwd", "admin" }, // Password
546 { "remote_management", "0" }, // Remote Management [1|0]
547 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
548 { "http_wanport", "8080" }, // WAN port to listen on
549 { "http_lanport", "80" }, // LAN port to listen on
550 { "https_lanport", "443" }, // LAN port to listen on
551 { "http_enable", "1" }, // HTTP server enable/disable
552 { "https_enable", "0" }, // HTTPS server enable/disable
553 { "https_crt_save", "0" },
554 { "https_crt_cn", "" },
555 { "https_crt_file", "" },
556 { "https_crt", "" },
557 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
558 { "web_favicon", "0" },
559 { "web_css", "brownlight" },
560 { "web_svg", "1" },
561 { "telnetd_eas", "1" },
562 { "telnetd_port", "23" },
563 { "sshd_eas", "0" },
564 { "sshd_pass", "1" },
565 { "sshd_port", "22" },
566 { "sshd_remote", "0" },
567 { "sshd_rport", "2222" },
568 { "sshd_authkeys", "" },
569 { "sshd_hostkey", "" },
570 { "sshd_dsskey", "" },
571 { "sshd_forwarding", "1" },
572 { "rmgt_sip", "" }, // remote management: source ip address
574 { "http_id", "" },
575 { "web_mx", "status,bwm" },
576 { "web_pb", "" },
578 // admin-bwm
579 { "rstats_enable", "1" },
580 { "rstats_path", "" },
581 { "rstats_stime", "48" },
582 { "rstats_offset", "1" },
583 { "rstats_data", "" },
584 { "rstats_colors", "" },
585 { "rstats_exclude", "" },
586 { "rstats_sshut", "1" },
587 { "rstats_bak", "0" },
589 // admin-ipt
590 { "cstats_enable", "1" },
591 { "cstats_path", "" },
592 { "cstats_stime", "48" },
593 { "cstats_offset", "1" },
594 { "cstats_colors", "" },
595 { "cstats_exclude", "" },
596 { "cstats_include", "" },
597 { "cstats_all", "1" },
598 { "cstats_sshut", "1" },
599 { "cstats_bak", "0" },
601 // advanced-buttons
602 { "sesx_led", "0" },
603 { "sesx_b0", "1" },
604 { "sesx_b1", "4" },
605 { "sesx_b2", "4" },
606 { "sesx_b3", "4" },
607 { "sesx_script",
608 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
610 { "script_brau",
611 "if [ ! -e /tmp/switch-start ]; then\n"
612 " # do something at startup\n"
613 " echo position at startup was $1 >/tmp/switch-start\n"
614 " exit\n"
615 "fi\n"
616 "if [ $1 = \"bridge\" ]; then\n"
617 " # do something\n"
618 " led bridge on\n"
619 "elif [ $1 = \"auto\" ]; then\n"
620 " # do something\n"
621 " led bridge off\n"
622 "fi\n"
625 // admin-log
626 { "log_remote", "0" },
627 { "log_remoteip", "" },
628 { "log_remoteport", "514" },
629 { "log_file", "1" },
630 { "log_file_custom", "0" },
631 { "log_file_path", "/var/log/messages" },
632 { "log_limit", "60" },
633 { "log_in", "0" },
634 { "log_out", "0" },
635 { "log_mark", "60" },
636 { "log_events", "" },
638 // admin-log-webmonitor
639 { "log_wm", "0" },
640 { "log_wmtype", "0" },
641 { "log_wmip", "" },
642 { "log_wmdmax", "300" },
643 { "log_wmsmax", "300" },
645 // admin-debugging
646 { "debug_nocommit", "0" },
647 { "debug_cprintf", "0" },
648 { "debug_cprintf_file", "0" },
649 // { "debug_keepfiles", "0" },
650 { "console_loglevel", "1" },
651 { "t_cafree", "1" },
652 { "t_hidelr", "0" },
653 { "debug_clkfix", "1" },
654 { "debug_ddns", "0" },
656 // admin-cifs
657 { "cifs1", "" },
658 { "cifs2", "" },
660 // admin-jffs2
661 { "jffs2_on", "0" },
662 { "jffs2_exec", "" },
664 #ifdef TCONFIG_USB
665 // nas-usb - !!TB
666 { "usb_enable", "0" },
667 { "usb_uhci", "0" },
668 { "usb_ohci", "0" },
669 { "usb_usb2", "1" },
670 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
671 { "usb_mmc", "-1" },
672 #endif
673 { "usb_irq_thresh", "0" },
674 { "usb_storage", "1" },
675 { "usb_printer", "1" },
676 { "usb_printer_bidirect", "0" },
677 { "usb_ext_opt", "" },
678 { "usb_fat_opt", "" },
679 { "usb_ntfs_opt", "" },
680 { "usb_fs_ext3", "1" },
681 { "usb_fs_fat", "1" },
682 #ifdef TCONFIG_NTFS
683 { "usb_fs_ntfs", "1" },
684 #endif
685 { "usb_fs_hfs", "0" }, //!Victek
686 { "usb_fs_hfsplus", "0" }, //!Victek
687 { "usb_automount", "1" },
688 #if 0
689 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
690 #endif
691 { "script_usbhotplug", "" },
692 { "script_usbmount", "" },
693 { "script_usbumount", "" },
694 { "idle_enable", "0" },
695 #endif
697 #ifdef TCONFIG_FTP
698 // nas-ftp - !!TB
699 { "ftp_enable", "0" },
700 { "ftp_super", "0" },
701 { "ftp_anonymous", "0" },
702 { "ftp_dirlist", "0" },
703 { "ftp_port", "21" },
704 { "ftp_max", "0" },
705 { "ftp_ipmax", "0" },
706 { "ftp_staytimeout", "300" },
707 { "ftp_rate", "0" },
708 { "ftp_anonrate", "0" },
709 { "ftp_anonroot", "" },
710 { "ftp_pubroot", "" },
711 { "ftp_pvtroot", "" },
712 { "ftp_users", "" },
713 { "ftp_custom", "" },
714 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
715 { "ftp_limit", "0,3,60" },
716 { "log_ftp", "0" },
717 #endif
719 #ifdef TCONFIG_SNMP
720 { "snmp_enable", "0" },
721 { "snmp_location", "router" },
722 { "snmp_contact", "admin@tomato" },
723 { "snmp_ro", "rocommunity" },
724 #endif
726 #ifdef TCONFIG_SAMBASRV
727 // nas-samba - !!TB
728 { "smbd_enable", "0" },
729 { "smbd_wgroup", "WORKGROUP" },
730 { "smbd_master", "1" },
731 { "smbd_wins", "1" },
732 { "smbd_cpage", "" },
733 { "smbd_cset", "utf8" },
734 { "smbd_custom", "" },
735 { "smbd_autoshare", "2" },
736 { "smbd_shares",
737 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
739 { "smbd_user", "nas" },
740 { "smbd_passwd", "" },
741 #endif
743 #ifdef TCONFIG_MEDIA_SERVER
744 // nas-media
745 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
746 { "ms_dirs", "/mnt<" },
747 { "ms_port", "0" },
748 { "ms_dbdir", "" },
749 { "ms_tivo", "0" },
750 { "ms_stdlna", "0" },
751 { "ms_sas", "0" },
752 #endif
754 // admin-sch
755 { "sch_rboot", "" },
756 { "sch_rcon", "" },
757 { "sch_c1", "" },
758 { "sch_c2", "" },
759 { "sch_c3", "" },
760 { "sch_c1_cmd", "" },
761 { "sch_c2_cmd", "" },
762 { "sch_c3_cmd", "" },
764 // admin-script
765 { "script_init", "" },
766 { "script_shut", "" },
767 { "script_fire", "#Restrict number of TCP connections per user #iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP #Restrict number of non-TCP connections per user #iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP #Restrict number of simltaneous SMTP connections (from mailer viruses) #iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP" },
768 { "script_wanup", "" },
771 #ifdef TCONFIG_OPENVPN
772 // vpn
773 { "vpn_debug", "0" },
774 { "vpn_server_eas", "" },
775 { "vpn_server_dns", "" },
776 { "vpn_server1_poll", "0" },
777 { "vpn_server1_if", "tun" },
778 { "vpn_server1_proto", "udp" },
779 { "vpn_server1_port", "1194" },
780 { "vpn_server1_firewall", "auto" },
781 { "vpn_server1_crypt", "tls" },
782 { "vpn_server1_comp", "adaptive" },
783 { "vpn_server1_cipher", "default" },
784 { "vpn_server1_dhcp", "1" },
785 { "vpn_server1_r1", "192.168.1.50" },
786 { "vpn_server1_r2", "192.168.1.55" },
787 { "vpn_server1_sn", "10.8.0.0" },
788 { "vpn_server1_nm", "255.255.255.0" },
789 { "vpn_server1_local", "10.8.0.1" },
790 { "vpn_server1_remote", "10.8.0.2" },
791 { "vpn_server1_reneg", "-1" },
792 { "vpn_server1_hmac", "-1" },
793 { "vpn_server1_plan", "1" },
794 { "vpn_server1_ccd", "0" },
795 { "vpn_server1_c2c", "0" },
796 { "vpn_server1_ccd_excl", "0" },
797 { "vpn_server1_ccd_val", "" },
798 { "vpn_server1_pdns", "0" },
799 { "vpn_server1_rgw", "0" },
800 { "vpn_server1_custom", "" },
801 { "vpn_server1_static", "" },
802 { "vpn_server1_ca", "" },
803 { "vpn_server1_crt", "" },
804 { "vpn_server1_key", "" },
805 { "vpn_server1_dh", "" },
806 { "vpn_server2_poll", "0" },
807 { "vpn_server2_if", "tun" },
808 { "vpn_server2_proto", "udp" },
809 { "vpn_server2_port", "1194" },
810 { "vpn_server2_firewall", "auto" },
811 { "vpn_server2_crypt", "tls" },
812 { "vpn_server2_comp", "adaptive" },
813 { "vpn_server2_cipher", "default" },
814 { "vpn_server2_dhcp", "1" },
815 { "vpn_server2_r1", "192.168.1.50" },
816 { "vpn_server2_r2", "192.168.1.55" },
817 { "vpn_server2_sn", "10.8.0.0" },
818 { "vpn_server2_nm", "255.255.255.0" },
819 { "vpn_server2_local", "10.8.0.1" },
820 { "vpn_server2_remote", "10.8.0.2" },
821 { "vpn_server2_reneg", "-1" },
822 { "vpn_server2_hmac", "-1" },
823 { "vpn_server2_plan", "1" },
824 { "vpn_server2_ccd", "0" },
825 { "vpn_server2_c2c", "0" },
826 { "vpn_server2_ccd_excl", "0" },
827 { "vpn_server2_ccd_val", "" },
828 { "vpn_server2_pdns", "0" },
829 { "vpn_server2_rgw", "0" },
830 { "vpn_server2_custom", "" },
831 { "vpn_server2_static", "" },
832 { "vpn_server2_ca", "" },
833 { "vpn_server2_crt", "" },
834 { "vpn_server2_key", "" },
835 { "vpn_server2_dh", "" },
836 { "vpn_client_eas", "" },
837 { "vpn_client1_poll", "0" },
838 { "vpn_client1_if", "tun" },
839 { "vpn_client1_bridge", "1" },
840 { "vpn_client1_nat", "1" },
841 { "vpn_client1_proto", "udp" },
842 { "vpn_client1_addr", "" },
843 { "vpn_client1_port", "1194" },
844 { "vpn_client1_retry", "30" },
845 { "vpn_client1_rg", "0" },
846 { "vpn_client1_firewall", "auto" },
847 { "vpn_client1_crypt", "tls" },
848 { "vpn_client1_comp", "adaptive" },
849 { "vpn_client1_cipher", "default" },
850 { "vpn_client1_local", "10.8.0.2" },
851 { "vpn_client1_remote", "10.8.0.1" },
852 { "vpn_client1_nm", "255.255.255.0" },
853 { "vpn_client1_reneg", "-1" },
854 { "vpn_client1_hmac", "-1" },
855 { "vpn_client1_adns", "0" },
856 { "vpn_client1_rgw", "0" },
857 { "vpn_client1_gw", "" },
858 { "vpn_client1_custom", "" },
859 { "vpn_client1_static", "" },
860 { "vpn_client1_ca", "" },
861 { "vpn_client1_crt", "" },
862 { "vpn_client1_key", "" },
863 { "vpn_client2_poll", "0" },
864 { "vpn_client2_if", "tun" },
865 { "vpn_client2_bridge", "1" },
866 { "vpn_client2_nat", "1" },
867 { "vpn_client2_proto", "udp" },
868 { "vpn_client2_addr", "" },
869 { "vpn_client2_port", "1194" },
870 { "vpn_client2_retry", "30" },
871 { "vpn_client2_rg", "0" },
872 { "vpn_client2_firewall", "auto" },
873 { "vpn_client2_crypt", "tls" },
874 { "vpn_client2_comp", "adaptive" },
875 { "vpn_client2_cipher", "default" },
876 { "vpn_client2_local", "10.8.0.2" },
877 { "vpn_client2_remote", "10.8.0.1" },
878 { "vpn_client2_nm", "255.255.255.0" },
879 { "vpn_client2_reneg", "-1" },
880 { "vpn_client2_hmac", "-1" },
881 { "vpn_client2_adns", "0" },
882 { "vpn_client2_rgw", "0" },
883 { "vpn_client2_gw", "" },
884 { "vpn_client2_custom", "" },
885 { "vpn_client2_static", "" },
886 { "vpn_client2_ca", "" },
887 { "vpn_client2_crt", "" },
888 { "vpn_client2_key", "" },
889 #endif // vpn
890 #ifdef TCONFIG_PPTP
891 { "pptp_client_enable", "0" },
892 { "pptp_client_peerdns", "0" },
893 { "pptp_client_mtuenable","0" },
894 { "pptp_client_mtu", "1450" },
895 { "pptp_client_mruenable","0" },
896 { "pptp_client_mru", "1450" },
897 { "pptp_client_nat", "0" },
898 { "pptp_client_srvip", "" },
899 { "pptp_client_srvsub", "10.0.0.0" },
900 { "pptp_client_srvsubmsk","255.0.0.0" },
901 { "pptp_client_username", "" },
902 { "pptp_client_passwd", "" },
903 { "pptp_client_crypt", "0" },
904 { "pptp_client_custom", "" },
905 { "pptp_client_dfltroute","0" },
906 #endif
908 #if 0
909 // safe to remove?
910 { "QoS", "0" },
912 { "ses_enable", "0" }, // enable ses
913 { "ses_event", "2" }, // initial ses event
914 { "ses_led_assertlvl", "0" }, // For SES II
915 { "ses_client_join", "0" }, // For SES II
916 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
917 { "ses_count", "0" },
918 { "eou_configured", "0" },
920 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
921 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
922 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
923 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
924 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
925 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
926 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
927 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
928 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
929 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
930 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
931 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
933 //obs zzz { "http_method", "post" }, // HTTP method
935 // { "wl_macmode1", "disabled" },
937 /* obsolete
938 { "filter", "on" }, // Firewall Protection [on|off]
939 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
940 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
941 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
942 { "block_cookie", "0" }, // Block Cookie [1|0]
943 { "ident_pass", "0" }, // IDENT passthrough [1|0]
944 { "block_proxy", "0" }, // Block Proxy [1|0]
947 /* --- obsolete ---
948 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
949 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
951 // for mac clone
952 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
953 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
955 { "public_ip", "" }, // public ip
958 //forced in rc.c { "os_name", "" }, // OS name string
959 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
960 //forced in rc.c { "os_date", __DATE__ }, // OS date
961 //not used { "ct_modules", "" }, // CyberTAN kernel modules
962 //obs { "timer_interval", "3600" }, // Timer interval in seconds
963 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
964 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
965 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
966 //obs { "os_server", "" }, // URL for getting upgrades
967 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
968 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
969 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
970 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
971 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
972 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
973 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
974 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
975 //{ "eou_device_id", "" },
976 //{ "eou_public_key", "" },
977 //{ "eou_private_key", "" },
978 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
979 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
980 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
981 // { "ntp_enable", "1" }, // replaced with ntp_updates
982 // { "ntp_mode", "auto" }, // auto, manual
985 // for AOL
986 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
987 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
988 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
989 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
990 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
992 // advanced-watchdog
993 { "wd_en", "" },
994 { "wd_atp0", "" },
995 { "wd_atp1", "" },
996 { "wd_atp2", "" },
997 { "wd_atp3", "" },
998 { "wd_atp4", "" },
999 { "wd_mxr", "3" },
1000 { "wd_rdy", "15" },
1001 { "wd_cki", "300" },
1002 { "wd_fdm", "" },
1003 { "wd_aof", "" },
1005 #endif // 0
1007 // arpbind
1008 { "arpbind_enable", "0" },
1009 { "arpbind_only", "0" },
1010 { "arpbind_list", "" },
1012 // NoCatSplash. !!Victek
1013 #ifdef TCONFIG_NOCAT
1014 { "NC_enable", "0" }, // enable NoCatSplash
1015 { "NC_Verbosity", "0" }, // logging too verbose on startup!
1016 { "NC_GatewayName", "WWW Portal" },
1017 { "NC_GatewayPort", "5280" },
1018 { "NC_GatewayMode", "Open" },
1019 { "NC_DocumentRoot", "/tmp/splashd" },
1020 { "NC_ExcludePorts", "1863" },
1021 { "NC_HomePage", "" },
1022 { "NC_ForcedRedirect", "0" },
1023 { "NC_IdleTimeout", "0" },
1024 { "NC_MaxMissedARP", "5" },
1025 { "NC_PeerChecktimeout", "0" },
1026 { "NC_LoginTimeout", "86400" },
1027 { "NC_RenewTimeout", "0" },
1028 { "NC_AllowedWebHosts", "" },
1029 #endif
1030 { NULL, NULL}
1034 const defaults_t if_generic[] = {
1035 { "lan_ifname", "br0" },
1036 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
1037 { "wan_ifname", "eth1" },
1038 { "wan_ifnames", "eth1" },
1039 { NULL, NULL }
1042 const defaults_t if_vlan[] = {
1043 { "lan_ifname", "br0" },
1044 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
1045 #ifdef TCONFIG_VLAN
1046 { "lan1_ifname", "" },
1047 { "lan1_ifnames", "" },
1048 { "lan2_ifname", "" },
1049 { "lan2_ifnames", "" },
1050 { "lan3_ifname", "" },
1051 { "lan3_ifnames", "" },
1052 #endif
1053 { "wan_ifname", "vlan1" },
1054 { "wan_ifnames", "vlan1" },
1055 { NULL, NULL }