UPS: apcupsd support with gui
[tomato.git] / release / src / router / nvram / defaults.c
blobf3fea6647a9c9d2c64cd4a99212e82aca40c8ca6
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //Barry add 2004 09 16
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
64 { "lan1_ipaddr", "" },
65 { "lan1_netmask", "" },
66 { "lan1_stp", "0" },
67 { "lan2_ipaddr", "" },
68 { "lan2_netmask", "" },
69 { "lan2_stp", "0" },
70 { "lan3_ipaddr", "" },
71 { "lan3_netmask", "" },
72 { "lan3_stp", "0" },
74 // WAN H/W parameters
75 //! { "wan_ifname", "" }, // WAN interface name
76 //! { "wan_ifnames", "" }, // WAN interface names
77 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
78 { "wan_hwaddr", "" }, // WAN interface MAC address
79 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
81 // WAN TCP/IP parameters
82 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
83 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
84 { "wan_netmask", "0.0.0.0" }, // WAN netmask
85 { "wan_gateway", "0.0.0.0" }, // WAN gateway
86 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
87 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
88 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
89 { "wan_lease", "86400" }, // WAN lease time in seconds
90 { "wan_islan", "0" },
91 { "modem_ipaddr", "0.0.0.0" }, // modem IP address (i.e. PPPoE bridged modem)
93 { "wan_primary", "1" }, // Primary wan connection
94 { "wan_unit", "0" }, // Last configured connection
95 /* --- obsolete ---
96 // Filters
97 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
98 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
99 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
101 { "filter", "on" }, // [on | off] Firewall Protection
103 // Port forwards
104 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
106 // DHCP server parameters
107 { "dhcp_start", "2" }, //
108 { "dhcp_num", "50" }, //
109 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
110 { "dhcpd_endip", "" }, // "
111 { "dhcp_lease", "1440" }, // LAN lease time in minutes
112 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
113 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
114 { "wan_routes", "" },
115 { "wan_msroutes", "" },
117 { "dhcp1_start", "" },
118 { "dhcp1_num", "" },
119 { "dhcpd1_startip", "" },
120 { "dhcpd1_endip", "" },
121 { "dhcp1_lease", "1440" },
122 { "dhcp2_start", "" },
123 { "dhcp2_num", "" },
124 { "dhcpd2_startip", "" },
125 { "dhcpd2_endip", "" },
126 { "dhcp2_lease", "1440" },
127 { "dhcp3_start", "" },
128 { "dhcp3_num", "" },
129 { "dhcpd3_startip", "" },
130 { "dhcpd3_endip", "" },
131 { "dhcp3_lease", "1440" },
133 // 3G Modem
134 { "modem_pin", "" },
135 { "modem_dev", "ttyUSB0" },
136 { "modem_init", "*99#" },
137 { "modem_apn", "internet" },
139 // PPPoE parameters
140 { "pppoe_ifname", "" }, // PPPoE enslaved interface
141 { "ppp_username", "" }, // PPP username
142 { "ppp_passwd", "" }, // PPP password
143 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
144 { "ppp_keepalive", "0" }, // Restore link automatically
145 { "ppp_demand", "0" }, // Dial on demand
146 { "ppp_redialperiod", "10" }, // Redial Period (seconds)*/
147 { "ppp_mru", "1500" }, // Negotiate MRU to this value
148 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
149 { "ppp_service", "" }, // PPPoE service name
150 { "ppp_ac", "" }, // PPPoE access concentrator name
151 { "ppp_static", "0" }, // Enable / Disable Static IP
152 { "ppp_static_ip", "" }, // PPPoE Static IP
153 { "ppp_get_ac", "" }, // PPPoE Server ac name
154 { "ppp_get_srv", "" }, // PPPoE Server service name
155 { "ppp_custom", "" }, // PPPD additional options
156 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
158 { "pppoe_lei", "" },
159 { "pppoe_lef", "" },
161 #ifdef TCONFIG_IPV6
162 // IPv6 parameters
163 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
164 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
165 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
166 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
167 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
168 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
169 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
170 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
171 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
172 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
173 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
174 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
175 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
176 { "ipv6_dns", "" }, // DNS server(s) IPs
177 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
178 #endif
180 // Wireless parameters
181 { "wl_ifname", "" }, // Interface name
182 { "wl_hwaddr", "" }, // MAC address
183 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
184 { "wl_corerev", "" }, // Current core revision
185 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
186 { "wl_radioids", "" }, // List of radio IDs
187 { "wl_ssid", "Tomato24" }, // Service set ID (network name)
188 { "wl1_ssid", "Tomato50" },
189 { "wl_country_code", "" }, // Country (default obtained from driver)
190 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
191 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
192 { "wl_closed", "0" }, // Closed (hidden) network
193 { "wl_ap_isolate", "0" }, // AP isolate mode
194 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
195 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
196 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
197 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
198 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
199 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
200 { "wl_key", "1" }, // Current WEP key
201 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
202 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
203 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
204 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
205 { "wl_channel", "6" }, // Channel number
206 { "wl1_channel", "0" },
207 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
208 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
209 { "wl_rateset", "default" }, // "default" or "all" or "12"
210 { "wl_frag", "2346" }, // Fragmentation threshold
211 { "wl_rts", "2347" }, // RTS threshold
212 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
213 { "wl_bcn", "100" }, // Beacon interval
214 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
215 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
216 { "wl_gmode", "1" }, // 54g mode
217 { "wl_gmode_protection","off" }, // 802.11g RTS/CTS protection (off|auto)
218 { "wl_afterburner", "off" }, // AfterBurner
219 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
220 { "wl_wme", "auto" }, // WME mode (auto|off|on)
221 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
222 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
223 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
224 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
225 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
226 { "wl_mitigation", "3" }, // Interference Mitigation Mode (0|1|2|3)
228 { "wl_passphrase", "" }, // Passphrase // Add
229 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
230 { "wl_wep_buf", "" }, // save all settings for web // Add
231 { "wl_wep_gen", "" }, // save all settings for generate button // Add
232 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
234 // WPA parameters
235 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
236 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
237 { "wl_wpa_psk", "" }, // WPA pre-shared key
238 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
239 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
240 { "wl_radius_key", "" }, // RADIUS shared secret
241 { "wl_radius_port", "1812" }, // RADIUS server UDP port
242 { "wl_crypto", "aes" }, // WPA data encryption
243 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
244 { "wl_akm", "" }, // WPA akm list
246 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
247 // EDCA parameters for STA
248 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
249 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
250 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
251 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
253 // EDCA parameters for AP
254 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
255 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
256 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
257 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
259 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
260 { "wl_wme_apsd", "on" }, // WME APSD mode
261 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
263 /* Per AC Tx parameters */
264 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
265 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
266 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
267 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
269 { "wl_unit", "0" }, // Last configured interface
270 { "wl_mac_deny", "" }, // filter MAC // Add
272 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
273 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
274 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
276 // !!TB: n-mode
277 { "wl_nmode", "-1" }, // N-mode
278 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
279 { "wl1_nband", "1" },
280 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
281 { "wl_nreqd", "0" }, // Require 802.11n support
282 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
283 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
284 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
285 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
286 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
287 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
288 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
289 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
290 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
291 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
292 { "wl_bcn_rotate", "1" }, // Beacon rotation
293 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
294 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
296 #ifdef TCONFIG_EMF
297 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
298 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
299 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
300 { "emf_enable", "0" }, // Disable EMF by default
301 #endif
302 #ifdef CONFIG_BCMWL5
303 // AMPDU
304 { "wl_ampdu", "auto" }, // Default AMPDU setting
305 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
306 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
307 { "wl_amsdu", "auto" }, // Default AMSDU setting
308 // power save
309 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
310 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
311 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
312 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
313 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
314 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
315 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
316 // misc
317 { "wl_wmf_bss_enable", "0" }, // Wireless Multicast Forwarding Enable/Disable
318 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
319 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
320 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
321 #endif
323 { "pptp_server_ip", "" }, // as same as WAN gateway
324 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
325 { "pptp_dhcp", "1" },
327 // for firewall
328 { "mtu_enable", "0" }, // WAN MTU [1|0]
329 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
331 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
332 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
333 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
335 // misc
336 { "wl_tnoise", "-99" },
337 { "led_override", "" },
338 { "btn_override", "" },
339 { "btn_reset", "" },
340 { "env_path", "" },
341 { "manual_boot_nv", "0" },
342 // { "wlx_hpamp", "" },
343 // { "wlx_hperx", "" }, // see init.c
344 { "t_fix1", "" },
346 // basic-ddns
347 { "ddnsx0", "" },
348 { "ddnsx1", "" },
349 { "ddnsx0_cache", "" },
350 { "ddnsx1_cache", "" },
351 { "ddnsx_save", "1" },
352 { "ddnsx_refresh", "28" },
354 // basic-ident
355 { "router_name", "TomatoUSB" },
356 { "wan_hostname", "unknown" },
357 { "wan_domain", "" },
359 // basic-time
360 { "tm_sel", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
361 { "tm_tz", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
362 { "tm_dst", "1", },
363 { "ntp_updates", "4" },
364 { "ntp_tdod", "0" },
365 { "ntp_server", "0.europe.pool.ntp.org 1.europe.pool.ntp.org 2.europe.pool.ntp.org" },
366 { "ntp_kiss", "" },
367 { "ntp_kiss_ignore", "" },
369 // basic-static
370 { "dhcpd_static", "" },
371 { "dhcpd_static_only", "0" },
372 // basic-wfilter
373 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
374 { "wl_macmode", "disabled" },
375 { "macnames", "" },
377 // advanced-ctnf
378 { "ct_tcp_timeout", "" },
379 { "ct_udp_timeout", "" },
380 { "ct_timeout", "" },
381 { "ct_max", "" },
382 { "nf_ttl", "0" },
383 { "nf_l7in", "1" },
384 #ifdef LINUX26
385 { "nf_sip", "1" },
386 { "ct_hashsize", "2048" },
387 #endif
388 #ifdef LINUX26
389 { "nf_rtsp", "0" },
390 #else
391 { "nf_rtsp", "1" },
392 #endif
393 { "nf_pptp", "1" },
394 { "nf_h323", "1" },
395 { "nf_ftp", "1" },
397 // advanced-mac
398 { "mac_wan", "" },
399 { "wl_macaddr", "" },
401 // advanced-misc
402 { "boot_wait", "on" },
403 { "wait_time", "5" },
404 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
405 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
406 { "jumbo_frame_size", "2000" },
407 #ifdef CONFIG_BCMWL5
408 { "ctf_disable", "1" },
409 #endif
411 // advanced-dhcpdns
412 { "dhcpd_dmdns", "1" },
413 { "dhcpd_slt", "0" },
414 { "dhcpd_gwmode", "" },
415 { "dhcpd_lmax", "" },
416 { "dns_addget", "0" },
417 { "dns_intcpt", "0" },
418 { "dhcpc_minpkt", "1" },
419 { "dhcpc_custom", "" },
420 { "dns_norebind", "1" },
421 { "dnsmasq_custom", "" },
422 { "dnsmasq_static_only", "0" },
423 // { "dnsmasq_norw", "0" },
425 // advanced-firewall
426 // { "block_loopback", "0" }, // nat loopback
427 { "nf_loopback", "0" },
428 { "block_wan", "1" }, // block inbound icmp
429 { "multicast_pass", "0" }, // enable multicast proxy
430 { "multicast_lan", "0" }, // on LAN (br0)
431 { "multicast_lan1", "0" }, // on LAN1 (br1)
432 { "multicast_lan2", "0" }, // on LAN2 (br2)
433 { "multicast_lan3", "0" }, // on LAN3 (br3)
434 { "ne_syncookies", "0" }, // tcp_syncookies
435 { "dhcp_pass", "1" }, // allow DHCP responses
436 { "ne_shlimit", "1,3,60" }, //shibby - enable limit connection attempts for sshd
437 { "imq_enable", "0" },
438 { "imq_numdevs", "16" },
440 // advanced-routing
441 { "routes_static", "" },
442 { "dhcp_routes", "1" },
443 { "wk_mode", "gateway" }, // Network mode [gateway|router]
444 #ifdef TCONFIG_ZEBRA
445 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
446 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
447 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
448 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
449 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
450 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
451 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
452 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
453 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
454 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
455 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
456 #endif
458 // advanced-vlan
459 { "trunk_vlan_so", "0" }, // VLAN trunk support override
461 // advanced-wireless
462 { "wl_txant", "3" },
463 { "wl_txpwr", "42" },
464 { "wl_maxassoc", "128" }, // Max associations driver could support
465 { "wl_bss_maxassoc", "128" },
466 { "wl_distance", "" },
468 // forward-*
469 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
470 #ifdef TCONFIG_IPV6
471 { "ipv6_portforward", ""},
472 #endif
473 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
474 { "dmz_enable", "0" },
475 { "dmz_ipaddr", "0" },
476 { "dmz_sip", "" },
478 // forward-upnp
479 { "upnp_enable", "0" },
480 { "upnp_secure", "1" },
481 { "upnp_port", "0" },
482 { "upnp_ssdp_interval", "60" }, // SSDP interval
483 { "upnp_mnp", "0" },
485 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
486 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
487 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
488 #if 0 // disabled for miniupnpd
489 { "upnp_max_age", "180" }, // Max age
490 { "upnp_config", "0" },
491 #endif
493 // qos
494 { "qos_enable", "0" },
495 { "qos_ack", "0" },
496 { "qos_syn", "1" },
497 { "qos_fin", "1" },
498 { "qos_rst", "1" },
499 { "qos_icmp", "0" },
500 { "qos_reset", "1" },
501 { "qos_obw", "230" },
502 { "qos_ibw", "1000" },
503 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<-1<d<123<0<<0:10<<0<Network Time (NTP)>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<x<9<0<<<<0<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<0<RPC (Microsoft)>0<<6<x<23,992<0<<<<0<Telnet>0<<-1<d<22<0<<<<3<SSH>0<<17<x<3544<0<<<<3<Teredo port>0<<6<s<80,8080<0<<<<3<Remote Router Access>0<<6<x<3389<0<<<<3<Remote Assistance>0<<-1<a<<0<flash<<<2<Flash Video, (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video, (Youtube)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<s<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<6<x<6005<0<<<<2<Camfrog>0<<-1<d<1220,1234,5100,6005,6970<0<<<<-1<VLC>0<<-1<x<554,5004,5005<0<<<<2<RTP/RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<x<1935<0<<<<2<RTMP>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<d<1718:1720<0<<<<1<H323>0<<-1<a<<0<skypetoskype<<<1<Skype>0<<-1<a<<0<skypeout<<<1<Skypeout>0<<-1<d<80<0<<0:512<<4<HTTP>0<<-1<d<443<0<<0:512<<4<HTTPS>0<<6<d<8080<0<<0:512<<4<HTTP Proxy / Alternate>0<<-1<d<25,587,465<0<<<<5<SMTP, Submission>0<<-1<d<110,995<0<<<<5<POP3 Mail>0<<-1<d<119,563<0<<<<5<NNTP>0<<-1<d<143,220,585,993<0<<<<5<IMAP Mail>0<<-1<a<<0<irc<<<6<IRC>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<Yahoo Messenger>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<Other Chat Services>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<-1<x<6571,6891:6901<0<<<<7<WLM File/Webcam>0<<6<d<80,443,8080<0<<512:<<7<HTTP,SSL File Transfers>0<<17<x<1:65535<0<<<<-1<P2P (uTP, UDP)" },
504 { "qos_burst0", "" },
505 { "qos_burst1", "" },
506 { "qos_default", "8" },
507 { "qos_orates", "5-20,5-20,5-25,5-70,20-100,5-80,5-80,5-80,5-50,0-0" },
508 { "qos_irates", "10,60,60,70,0,60,60,80,30,1" },
509 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger Download P2P/Bulk Crawl" },
511 { "ne_vegas", "0" }, // TCP Vegas
512 { "ne_valpha", "2" }, // "
513 { "ne_vbeta", "6" }, // "
514 { "ne_vgamma", "2" }, // "
516 // access restrictions
517 { "rruleN", "0" },
518 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
519 //* { "rrule##", "" },
520 { "rrulewp", "80,8080" },
522 #if TOMATO_SL
523 // samba
524 { "smbd_on", "0" },
525 { "nmbd_on", "0" },
526 { "smbd_wgroup", "WORKGROUP" },
527 { "smbd_nbname", "TOMATO" },
528 { "smbd_adminpass", "admin" },
529 #endif
531 // admin-access
532 { "http_username", "" }, // Username
533 { "http_passwd", "admin" }, // Password
534 { "remote_management", "0" }, // Remote Management [1|0]
535 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
536 { "http_wanport", "8080" }, // WAN port to listen on
537 { "http_lanport", "80" }, // LAN port to listen on
538 { "https_lanport", "443" }, // LAN port to listen on
539 { "http_enable", "1" }, // HTTP server enable/disable
540 { "https_enable", "0" }, // HTTPS server enable/disable
541 { "https_crt_save", "0" },
542 { "https_crt_cn", "" },
543 { "https_crt_file", "" },
544 { "https_crt", "" },
545 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
546 { "web_css", "usbblue" },
547 { "web_svg", "1" },
548 { "telnetd_eas", "1" },
549 { "telnetd_port", "23" },
550 { "sshd_eas", "1" }, //shibby - enable sshd by default
551 { "sshd_pass", "1" },
552 { "sshd_port", "22" },
553 { "sshd_remote", "0" },
554 { "sshd_rport", "22" },
555 { "sshd_authkeys", "" },
556 { "sshd_hostkey", "" },
557 { "sshd_dsskey", "" },
558 { "sshd_forwarding", "1" },
559 { "rmgt_sip", "" }, // remote management: source ip address
561 { "http_id", "" },
562 { "web_mx", "status,bwm" },
563 { "web_pb", "" },
565 // admin-bwm
566 { "rstats_enable", "1" },
567 { "rstats_path", "" },
568 { "rstats_stime", "48" },
569 { "rstats_offset", "1" },
570 { "rstats_data", "" },
571 { "rstats_colors", "" },
572 { "rstats_exclude", "" },
573 { "rstats_sshut", "1" },
574 { "rstats_bak", "0" },
576 // admin-ipt
577 { "cstats_enable", "1" },
578 { "cstats_path", "" },
579 { "cstats_stime", "48" },
580 { "cstats_offset", "1" },
581 { "cstats_labels", "0" },
582 { "cstats_exclude", "" },
583 { "cstats_include", "" },
584 { "cstats_all", "1" },
585 { "cstats_sshut", "1" },
586 { "cstats_bak", "0" },
588 // advanced-buttons
589 { "sesx_led", "0" },
590 { "sesx_b0", "1" },
591 { "sesx_b1", "4" },
592 { "sesx_b2", "4" },
593 { "sesx_b3", "4" },
594 { "sesx_script",
595 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
597 { "script_brau",
598 "if [ ! -e /tmp/switch-start ]; then\n"
599 " # do something at startup\n"
600 " echo position at startup was $1 >/tmp/switch-start\n"
601 " exit\n"
602 "fi\n"
603 "if [ $1 = \"bridge\" ]; then\n"
604 " # do something\n"
605 " led bridge on\n"
606 "elif [ $1 = \"auto\" ]; then\n"
607 " # do something\n"
608 " led bridge off\n"
609 "fi\n"
612 // admin-log
613 { "log_remote", "0" },
614 { "log_remoteip", "" },
615 { "log_remoteport", "514" },
616 { "log_file", "1" },
617 { "log_file_custom", "0" },
618 { "log_file_path", "/var/log/messages" },
619 { "log_limit", "60" },
620 { "log_in", "0" },
621 { "log_out", "0" },
622 { "log_mark", "60" },
623 { "log_events", "" },
625 // admin-log-webmonitor
626 { "log_wm", "0" },
627 { "log_wmtype", "0" },
628 { "log_wmip", "" },
629 { "log_wmdmax", "300" },
630 { "log_wmsmax", "300" },
632 // admin-debugging
633 { "debug_nocommit", "0" },
634 { "debug_cprintf", "0" },
635 { "debug_cprintf_file", "0" },
636 // { "debug_keepfiles", "0" },
637 { "console_loglevel", "1" },
638 { "t_cafree", "1" },
639 { "t_hidelr", "0" },
640 { "debug_clkfix", "1" },
641 { "debug_ddns", "0" },
643 // admin-cifs
644 { "cifs1", "" },
645 { "cifs2", "" },
647 // admin-jffs2
648 { "jffs2_on", "0" },
649 { "jffs2_exec", "" },
651 #ifdef TCONFIG_USB
652 // nas-usb - !!TB
653 { "usb_enable", "0" },
654 { "usb_uhci", "0" },
655 { "usb_ohci", "0" },
656 { "usb_usb2", "1" },
657 { "usb_irq_thresh", "0" },
658 { "usb_storage", "1" },
659 { "usb_printer", "1" },
660 { "usb_printer_bidirect", "0" },
661 { "usb_ext_opt", "" },
662 { "usb_fat_opt", "" },
663 { "usb_ntfs_opt", "" },
664 { "usb_fs_ext3", "1" },
665 { "usb_fs_fat", "1" },
666 #ifdef TCONFIG_NTFS
667 { "usb_fs_ntfs", "1" },
668 #endif
669 #ifdef TCONFIG_HFS
670 { "usb_fs_hfs", "0" }, //!Victek
671 #endif
672 { "usb_automount", "1" },
673 #if 0
674 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
675 #endif
676 { "script_usbhotplug", "" },
677 { "script_usbmount", "" },
678 { "script_usbumount", "" },
679 { "idle_enable", "0" },
680 { "usb_3g", "1" },
681 #endif
683 #ifdef TCONFIG_FTP
684 // nas-ftp - !!TB
685 { "ftp_enable", "0" },
686 { "ftp_super", "0" },
687 { "ftp_anonymous", "0" },
688 { "ftp_dirlist", "0" },
689 { "ftp_port", "21" },
690 { "ftp_max", "0" },
691 { "ftp_ipmax", "0" },
692 { "ftp_staytimeout", "300" },
693 { "ftp_rate", "0" },
694 { "ftp_anonrate", "0" },
695 { "ftp_anonroot", "" },
696 { "ftp_pubroot", "" },
697 { "ftp_pvtroot", "" },
698 { "ftp_users", "" },
699 { "ftp_custom", "" },
700 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
701 { "ftp_limit", "0,3,60" },
702 { "log_ftp", "0" },
703 #endif
705 #ifdef TCONFIG_SNMP
706 { "snmp_enable", "0" },
707 { "snmp_location", "router" },
708 { "snmp_contact", "admin@tomato" },
709 { "snmp_ro", "rocommunity" },
710 #endif
712 #ifdef TCONFIG_SAMBASRV
713 // nas-samba - !!TB
714 { "smbd_enable", "0" },
715 { "smbd_wgroup", "WORKGROUP" },
716 { "smbd_master", "1" },
717 { "smbd_wins", "1" },
718 { "smbd_cpage", "" },
719 { "smbd_cset", "utf8" },
720 { "smbd_custom", "" },
721 { "smbd_autoshare", "2" },
722 { "smbd_shares",
723 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
725 { "smbd_user", "nas" },
726 { "smbd_passwd", "" },
727 #endif
729 #ifdef TCONFIG_MEDIA_SERVER
730 // nas-media
731 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
732 { "ms_dirs", "/mnt<" },
733 { "ms_port", "0" },
734 { "ms_dbdir", "" },
735 { "ms_tivo", "0" },
736 { "ms_stdlna", "0" },
737 { "ms_sas", "0" },
738 #endif
740 #ifdef TCONFIG_SDHC
741 // admin-sdhc
742 { "mmc_on", "0" },
743 { "mmc_cs", "7" },
744 { "mmc_clk", "3" },
745 { "mmc_din", "2" },
746 { "mmc_dout", "4" },
747 { "mmc_fs_partition", "1" },
748 { "mmc_fs_type", "ext2" },
749 { "mmc_exec_mount", "" },
750 { "mmc_exec_umount", "" },
751 #endif
753 // admin-sch
754 { "sch_rboot", "" },
755 { "sch_rcon", "" },
756 { "sch_c1", "" },
757 { "sch_c2", "" },
758 { "sch_c3", "" },
759 { "sch_c4", "" },
760 { "sch_c5", "" },
761 { "sch_c1_cmd", "" },
762 { "sch_c2_cmd", "" },
763 { "sch_c3_cmd", "" },
764 { "sch_c4_cmd", "" },
765 { "sch_c5_cmd", "" },
767 // admin-script
768 { "script_init", "" },
769 { "script_shut", "" },
770 { "script_fire", "" },
771 { "script_wanup", "" },
773 #ifdef TCONFIG_NFS
774 { "nfs_enable", "0" },
775 { "nfs_exports", "" },
776 #endif
778 #ifdef TCONFIG_UPS
779 { "ups_enable", "0" },
780 #endif
782 #ifdef TCONFIG_OPENVPN
783 // vpn
784 { "vpn_debug", "0" },
785 { "vpn_server_eas", "" },
786 { "vpn_server_dns", "" },
787 { "vpn_server1_poll", "0" },
788 { "vpn_server1_if", "tun" },
789 { "vpn_server1_proto", "udp" },
790 { "vpn_server1_port", "1194" },
791 { "vpn_server1_firewall", "auto" },
792 { "vpn_server1_crypt", "tls" },
793 { "vpn_server1_comp", "adaptive" },
794 { "vpn_server1_cipher", "default" },
795 { "vpn_server1_dhcp", "1" },
796 { "vpn_server1_r1", "192.168.1.50" },
797 { "vpn_server1_r2", "192.168.1.55" },
798 { "vpn_server1_sn", "10.8.0.0" },
799 { "vpn_server1_nm", "255.255.255.0" },
800 { "vpn_server1_local", "10.8.0.1" },
801 { "vpn_server1_remote", "10.8.0.2" },
802 { "vpn_server1_reneg", "-1" },
803 { "vpn_server1_hmac", "-1" },
804 { "vpn_server1_plan", "1" },
805 { "vpn_server1_ccd", "0" },
806 { "vpn_server1_c2c", "0" },
807 { "vpn_server1_ccd_excl", "0" },
808 { "vpn_server1_ccd_val", "" },
809 { "vpn_server1_pdns", "0" },
810 { "vpn_server1_rgw", "0" },
811 { "vpn_server1_custom", "" },
812 { "vpn_server1_static", "" },
813 { "vpn_server1_ca", "" },
814 { "vpn_server1_crt", "" },
815 { "vpn_server1_key", "" },
816 { "vpn_server1_dh", "" },
817 { "vpn_server2_poll", "0" },
818 { "vpn_server2_if", "tun" },
819 { "vpn_server2_proto", "udp" },
820 { "vpn_server2_port", "1194" },
821 { "vpn_server2_firewall", "auto" },
822 { "vpn_server2_crypt", "tls" },
823 { "vpn_server2_comp", "adaptive" },
824 { "vpn_server2_cipher", "default" },
825 { "vpn_server2_dhcp", "1" },
826 { "vpn_server2_r1", "192.168.1.50" },
827 { "vpn_server2_r2", "192.168.1.55" },
828 { "vpn_server2_sn", "10.8.0.0" },
829 { "vpn_server2_nm", "255.255.255.0" },
830 { "vpn_server2_local", "10.8.0.1" },
831 { "vpn_server2_remote", "10.8.0.2" },
832 { "vpn_server2_reneg", "-1" },
833 { "vpn_server2_hmac", "-1" },
834 { "vpn_server2_plan", "1" },
835 { "vpn_server2_ccd", "0" },
836 { "vpn_server2_c2c", "0" },
837 { "vpn_server2_ccd_excl", "0" },
838 { "vpn_server2_ccd_val", "" },
839 { "vpn_server2_pdns", "0" },
840 { "vpn_server2_rgw", "0" },
841 { "vpn_server2_custom", "" },
842 { "vpn_server2_static", "" },
843 { "vpn_server2_ca", "" },
844 { "vpn_server2_crt", "" },
845 { "vpn_server2_key", "" },
846 { "vpn_server2_dh", "" },
847 { "vpn_client_eas", "" },
848 { "vpn_client1_poll", "0" },
849 { "vpn_client1_if", "tun" },
850 { "vpn_client1_bridge", "1" },
851 { "vpn_client1_nat", "1" },
852 { "vpn_client1_proto", "udp" },
853 { "vpn_client1_addr", "" },
854 { "vpn_client1_port", "1194" },
855 { "vpn_client1_retry", "30" },
856 { "vpn_client1_rg", "0" },
857 { "vpn_client1_firewall", "auto" },
858 { "vpn_client1_crypt", "tls" },
859 { "vpn_client1_comp", "adaptive" },
860 { "vpn_client1_cipher", "default" },
861 { "vpn_client1_local", "10.8.0.2" },
862 { "vpn_client1_remote", "10.8.0.1" },
863 { "vpn_client1_nm", "255.255.255.0" },
864 { "vpn_client1_reneg", "-1" },
865 { "vpn_client1_hmac", "-1" },
866 { "vpn_client1_adns", "0" },
867 { "vpn_client1_rgw", "0" },
868 { "vpn_client1_gw", "" },
869 { "vpn_client1_custom", "" },
870 { "vpn_client1_static", "" },
871 { "vpn_client1_ca", "" },
872 { "vpn_client1_crt", "" },
873 { "vpn_client1_key", "" },
874 { "vpn_client2_poll", "0" },
875 { "vpn_client2_if", "tun" },
876 { "vpn_client2_bridge", "1" },
877 { "vpn_client2_nat", "1" },
878 { "vpn_client2_proto", "udp" },
879 { "vpn_client2_addr", "" },
880 { "vpn_client2_port", "1194" },
881 { "vpn_client2_retry", "30" },
882 { "vpn_client2_rg", "0" },
883 { "vpn_client2_firewall", "auto" },
884 { "vpn_client2_crypt", "tls" },
885 { "vpn_client2_comp", "adaptive" },
886 { "vpn_client2_cipher", "default" },
887 { "vpn_client2_local", "10.8.0.2" },
888 { "vpn_client2_remote", "10.8.0.1" },
889 { "vpn_client2_nm", "255.255.255.0" },
890 { "vpn_client2_reneg", "-1" },
891 { "vpn_client2_hmac", "-1" },
892 { "vpn_client2_adns", "0" },
893 { "vpn_client2_rgw", "0" },
894 { "vpn_client2_gw", "" },
895 { "vpn_client2_custom", "" },
896 { "vpn_client2_static", "" },
897 { "vpn_client2_ca", "" },
898 { "vpn_client2_crt", "" },
899 { "vpn_client2_key", "" },
900 #endif // vpn
902 #ifdef TCONFIG_BT
903 // nas-transmission
904 { "bt_enable", "0" },
905 #ifdef TCONFIG_BBT
906 { "bt_binary", "internal" },
907 #else
908 { "bt_binary", "optware" },
909 #endif
910 { "bt_binary_custom", "/path/to/binaries/directory" },
911 { "bt_custom", "" },
912 { "bt_port", "51515" },
913 { "bt_dir", "/mnt" },
914 { "bt_incomplete", "1" },
915 { "bt_settings", "down_dir" },
916 { "bt_settings_custom", "/tmp/btclient" },
917 { "bt_rpc_enable", "1" },
918 { "bt_rpc_wan", "0" },
919 { "bt_auth", "1" },
920 { "bt_login", "admin" },
921 { "bt_password", "admin11" },
922 { "bt_port_gui", "9091" },
923 { "bt_dl_enable", "0" },
924 { "bt_ul_enable", "0" },
925 { "bt_dl", "248" },
926 { "bt_ul", "64" },
927 { "bt_peer_limit_global", "150" },
928 { "bt_peer_limit_per_torrent", "30" },
929 { "bt_ul_slot_per_torrent", "10" },
930 { "bt_ratio_enable", "0" },
931 { "bt_ratio", "1.0000" },
932 { "bt_ratio_idle_enable", "0" },
933 { "bt_ratio_idle", "30" },
934 { "bt_dht", "0" },
935 { "bt_pex", "0" },
936 { "bt_lpd", "0" },
937 { "bt_utp", "1" },
938 { "bt_blocklist", "0" },
939 { "bt_blocklist_url", "http://list.iblocklist.com/?list=bt_level1" },
940 { "bt_sleep", "10" },
941 { "bt_check", "1" },
942 { "bt_check_time", "15" },
943 { "bt_dl_queue_enable", "0" },
944 { "bt_dl_queue_size", "5" },
945 { "bt_ul_queue_enable", "0" },
946 { "bt_ul_queue_size", "5" },
947 { "bt_message", "2" },
948 #endif
950 #if 0
951 // safe to remove?
952 { "QoS", "0" },
954 { "ses_enable", "0" }, // enable ses
955 { "ses_event", "2" }, // initial ses event
956 { "ses_led_assertlvl", "0" }, // For SES II
957 { "ses_client_join", "0" }, // For SES II
958 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
959 { "ses_count", "0" },
960 { "eou_configured", "0" },
962 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
963 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
964 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
965 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
966 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
967 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
968 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
969 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
970 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
971 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
972 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
973 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
975 //obs zzz { "http_method", "post" }, // HTTP method
977 // { "wl_macmode1", "disabled" },
979 /* obsolete
980 { "filter", "on" }, // Firewall Protection [on|off]
981 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
982 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
983 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
984 { "block_cookie", "0" }, // Block Cookie [1|0]
985 { "ident_pass", "0" }, // IDENT passthrough [1|0]
986 { "block_proxy", "0" }, // Block Proxy [1|0]
989 /* --- obsolete ---
990 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
991 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
993 // for mac clone
994 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
995 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
997 { "public_ip", "" }, // public ip
1000 //forced in rc.c { "os_name", "" }, // OS name string
1001 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
1002 //forced in rc.c { "os_date", __DATE__ }, // OS date
1003 //not used { "ct_modules", "" }, // CyberTAN kernel modules
1004 //obs { "timer_interval", "3600" }, // Timer interval in seconds
1005 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
1006 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
1007 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
1008 //obs { "os_server", "" }, // URL for getting upgrades
1009 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
1010 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
1011 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
1012 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
1013 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
1014 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
1015 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
1016 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
1017 //{ "eou_device_id", "" },
1018 //{ "eou_public_key", "" },
1019 //{ "eou_private_key", "" },
1020 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
1021 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
1022 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
1023 // { "ntp_enable", "1" }, // replaced with ntp_updates
1024 // { "ntp_mode", "auto" }, // auto, manual
1027 // for AOL
1028 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
1029 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
1030 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
1031 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
1032 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
1034 // advanced-watchdog
1035 { "wd_en", "" },
1036 { "wd_atp0", "" },
1037 { "wd_atp1", "" },
1038 { "wd_atp2", "" },
1039 { "wd_atp3", "" },
1040 { "wd_atp4", "" },
1041 { "wd_mxr", "3" },
1042 { "wd_rdy", "15" },
1043 { "wd_cki", "300" },
1044 { "wd_fdm", "" },
1045 { "wd_aof", "" },
1047 #endif // 0
1049 // new_qoslimit
1050 { "new_qoslimit_enable", "0" },
1051 { "new_qoslimit_obw", "" },
1052 { "new_qoslimit_ibw", "" },
1053 { "new_qoslimit_rules", "" },
1054 { "qosl_enable", "0" },
1055 { "qosl_tcp", "0" },//unlimited
1056 { "qosl_udp", "0" },//unlimited
1057 { "qosl_dlc", "" },
1058 { "qosl_ulc", "" },
1059 { "qosl_dlr", "" },
1060 { "qosl_ulr", "" },
1062 // NoCatSplash. !!Victek
1063 #ifdef TCONFIG_NOCAT
1064 { "NC_enable", "0" }, // enable NoCatSplash
1065 { "NC_Verbosity", "2" },
1066 { "NC_GatewayName", "Tomato Captive Portal" },
1067 { "NC_GatewayPort", "5280" },
1068 { "NC_GatewayMode", "Open" },
1069 { "NC_DocumentRoot", "/tmp/splashd" },
1070 { "NC_ExcludePorts", "1863" },
1071 { "NC_HomePage", "http://victek.is-a-geek.com" },
1072 { "NC_ForcedRedirect", "0" },
1073 { "NC_IdleTimeout", "0" },
1074 { "NC_MaxMissedARP", "5" },
1075 { "NC_PeerChecktimeout", "0" },
1076 { "NC_LoginTimeout", "3600" },
1077 { "NC_RenewTimeout", "0" },
1078 { "NC_AllowedWebHosts", "www.victek.is-a-geek.com" },
1079 #endif
1080 { NULL, NULL }
1083 const defaults_t if_generic[] = {
1084 { "lan_ifname", "br0" },
1085 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
1086 { "wan_ifname", "eth1" },
1087 { "wan_ifnames", "eth1" },
1088 { NULL, NULL }
1091 const defaults_t if_vlan[] = {
1092 { "lan_ifname", "br0" },
1093 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
1094 { "lan1_ifname", "" },
1095 { "lan1_ifnames", "" },
1096 { "lan2_ifname", "" },
1097 { "lan2_ifnames", "" },
1098 { "lan3_ifname", "" },
1099 { "lan3_ifnames", "" },
1100 { "wan_ifname", "vlan1" },
1101 { "wan_ifnames", "vlan1" },
1102 { NULL, NULL }