Added "Route Modem IP" option (from Tomato/MLPPP)
[tomato.git] / release / src / router / nvram / defaults.c
blob8e9e4dc1d8c28df7cfc49bf22ee72b81e2644fb5
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //Barry add 2004 09 16
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
64 #ifdef TCONFIG_VLAN
65 { "lan1_ipaddr", "" },
66 { "lan1_netmask", "" },
67 { "lan1_stp", "0" },
68 { "lan2_ipaddr", "" },
69 { "lan2_netmask", "" },
70 { "lan2_stp", "0" },
71 { "lan3_ipaddr", "" },
72 { "lan3_netmask", "" },
73 { "lan3_stp", "0" },
74 #endif
76 // WAN H/W parameters
77 //! { "wan_ifname", "" }, // WAN interface name
78 //! { "wan_ifnames", "" }, // WAN interface names
79 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
80 { "wan_hwaddr", "" }, // WAN interface MAC address
81 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
83 // WAN TCP/IP parameters
84 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
85 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
86 { "wan_netmask", "0.0.0.0" }, // WAN netmask
87 { "wan_gateway", "0.0.0.0" }, // WAN gateway
88 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
89 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
90 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
91 { "wan_lease", "86400" }, // WAN lease time in seconds
92 { "wan_islan", "0" },
93 { "modem_ipaddr", "0.0.0.0" }, // modem IP address (i.e. PPPoE bridged modem)
95 { "wan_primary", "1" }, // Primary wan connection
96 { "wan_unit", "0" }, // Last configured connection
97 /* --- obsolete ---
98 // Filters
99 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
100 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
101 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
103 { "filter", "on" }, // [on | off] Firewall Protection
105 // Port forwards
106 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
108 // DHCP server parameters
109 { "dhcp_start", "100" }, //
110 { "dhcp_num", "50" }, //
111 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
112 { "dhcpd_endip", "" }, // "
113 { "dhcp_lease", "0" }, // LAN lease time in minutes
114 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
115 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
116 { "wan_routes", "" },
117 { "wan_msroutes", "" },
119 #ifdef TCONFIG_VLAN
120 { "dhcp1_start", "" },
121 { "dhcp1_num", "" },
122 { "dhcpd1_startip", "" },
123 { "dhcpd1_endip", "" },
124 { "dhcp1_lease", "0" },
125 { "dhcp2_start", "" },
126 { "dhcp2_num", "" },
127 { "dhcpd2_startip", "" },
128 { "dhcpd2_endip", "" },
129 { "dhcp2_lease", "0" },
130 { "dhcp3_start", "" },
131 { "dhcp3_num", "" },
132 { "dhcpd3_startip", "" },
133 { "dhcpd3_endip", "" },
134 { "dhcp3_lease", "0" },
135 #endif
137 // PPPoE parameters
138 { "pppoe_ifname", "" }, // PPPoE enslaved interface
139 { "ppp_username", "" }, // PPP username
140 { "ppp_passwd", "" }, // PPP password
141 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
142 { "ppp_keepalive", "0" }, // Restore link automatically
143 { "ppp_demand", "0" }, // Dial on demand
144 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
145 { "ppp_mru", "1500" }, // Negotiate MRU to this value
146 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
147 { "ppp_service", "" }, // PPPoE service name
148 { "ppp_ac", "" }, // PPPoE access concentrator name
149 { "ppp_static", "0" }, // Enable / Disable Static IP
150 { "ppp_static_ip", "" }, // PPPoE Static IP
151 { "ppp_get_ac", "" }, // PPPoE Server ac name
152 { "ppp_get_srv", "" }, // PPPoE Server service name
153 { "ppp_custom", "" }, // PPPD additional options
154 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
156 { "pppoe_lei", "" },
157 { "pppoe_lef", "" },
159 #ifdef TCONFIG_IPV6
160 // IPv6 parameters
161 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
162 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
163 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
164 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
165 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
166 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
167 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
168 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
169 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
170 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
171 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
172 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
173 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
174 { "ipv6_dns", "" }, // DNS server(s) IPs
175 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
176 #endif
178 // Wireless parameters
179 { "wl_ifname", "" }, // Interface name
180 { "wl_hwaddr", "" }, // MAC address
181 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
182 { "wl_corerev", "" }, // Current core revision
183 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
184 { "wl_radioids", "" }, // List of radio IDs
185 { "wl_ssid", "wireless" }, // Service set ID (network name)
186 { "wl1_ssid", "wireless1" },
187 { "wl_country_code", "" }, // Country (default obtained from driver)
188 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
189 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
190 { "wl_closed", "0" }, // Closed (hidden) network
191 { "wl_ap_isolate", "0" }, // AP isolate mode
192 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
193 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
194 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
195 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
196 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
197 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
198 { "wl_key", "1" }, // Current WEP key
199 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
200 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
201 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
202 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
203 { "wl_channel", "6" }, // Channel number
204 { "wl1_channel", "0" },
205 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
206 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
207 { "wl_rateset", "default" }, // "default" or "all" or "12"
208 { "wl_frag", "2346" }, // Fragmentation threshold
209 { "wl_rts", "2347" }, // RTS threshold
210 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
211 { "wl_bcn", "100" }, // Beacon interval
212 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
213 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
214 { "wl_gmode", "1" }, // 54g mode
215 { "wl_gmode_protection","off" }, // 802.11g RTS/CTS protection (off|auto)
216 { "wl_afterburner", "off" }, // AfterBurner
217 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
218 { "wl_wme", "auto" }, // WME mode (auto|off|on)
219 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
220 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
221 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
222 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
223 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
224 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3)
226 { "wl_passphrase", "" }, // Passphrase // Add
227 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
228 { "wl_wep_buf", "" }, // save all settings for web // Add
229 { "wl_wep_gen", "" }, // save all settings for generate button // Add
230 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
232 // WPA parameters
233 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
234 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
235 { "wl_wpa_psk", "" }, // WPA pre-shared key
236 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
237 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
238 { "wl_radius_key", "" }, // RADIUS shared secret
239 { "wl_radius_port", "1812" }, // RADIUS server UDP port
240 { "wl_crypto", "aes" }, // WPA data encryption
241 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
242 { "wl_akm", "" }, // WPA akm list
244 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
245 // EDCA parameters for STA
246 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
247 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
248 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
249 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
251 // EDCA parameters for AP
252 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
253 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
254 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
255 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
257 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
258 { "wl_wme_apsd", "on" }, // WME APSD mode
259 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
261 /* Per AC Tx parameters */
262 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
263 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
264 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
265 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
267 { "wl_unit", "0" }, // Last configured interface
268 { "wl_mac_deny", "" }, // filter MAC // Add
270 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
271 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
272 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
274 // !!TB: n-mode
275 { "wl_nmode", "-1" }, // N-mode
276 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
277 { "wl1_nband", "1" },
278 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
279 { "wl_nreqd", "0" }, // Require 802.11n support
280 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
281 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
282 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
283 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
284 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
285 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
286 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
287 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
288 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
289 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
290 { "wl_bcn_rotate", "1" }, // Beacon rotation
291 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
292 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
294 #ifdef TCONFIG_EMF
295 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
296 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
297 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
298 { "emf_enable", "0" }, // Disable EMF by default
299 #endif
300 #ifdef CONFIG_BCMWL5
301 // AMPDU
302 { "wl_ampdu", "auto" }, // Default AMPDU setting
303 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
304 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
305 { "wl_amsdu", "auto" }, // Default AMSDU setting
306 // power save
307 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
308 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
309 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
310 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
311 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
312 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
313 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
314 // misc
315 { "wl_wmf_bss_enable", "0" }, // WMF Enable/Disable
316 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
317 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
318 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
319 #endif
321 { "pptp_server_ip", "" }, // as same as WAN gateway
322 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
323 { "pptp_dhcp", "1" },
325 // for firewall
326 { "mtu_enable", "0" }, // WAN MTU [1|0]
327 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
329 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
330 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
331 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
333 // misc
334 { "wl_tnoise", "-99" },
335 { "led_override", "" },
336 { "btn_override", "" },
337 { "btn_reset", "" },
338 { "env_path", "" },
339 { "manual_boot_nv", "0" },
340 // { "wlx_hpamp", "" },
341 // { "wlx_hperx", "" }, // see init.c
342 { "t_fix1", "" },
344 // basic-ddns
345 { "ddnsx0", "" },
346 { "ddnsx1", "" },
347 { "ddnsx0_cache", "" },
348 { "ddnsx1_cache", "" },
349 { "ddnsx_save", "1" },
350 { "ddnsx_refresh", "28" },
352 // basic-ident
353 { "router_name", "tomato" },
354 { "wan_hostname", "unknown" },
355 { "wan_domain", "" },
357 // basic-time
358 { "tm_sel", "PST8PDT,M3.2.0/2,M11.1.0/2" },
359 { "tm_tz", "PST8PDT,M3.2.0/2,M11.1.0/2" },
360 { "tm_dst", "1", },
361 { "ntp_updates", "4" },
362 { "ntp_tdod", "0" },
363 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
364 { "ntp_kiss", "" },
365 { "ntp_kiss_ignore", "" },
367 // basic-static
368 { "dhcpd_static", "" },
370 // basic-wfilter
371 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
372 { "wl_macmode", "disabled" },
373 { "macnames", "" },
375 // advanced-ctnf
376 { "ct_tcp_timeout", "" },
377 { "ct_udp_timeout", "" },
378 { "ct_timeout", "" },
379 { "ct_max", "" },
380 { "nf_ttl", "0" },
381 { "nf_l7in", "1" },
382 #ifdef LINUX26
383 { "nf_sip", "1" },
384 { "ct_hashsize", "" },
385 #endif
386 #ifdef LINUX26
387 { "nf_rtsp", "0" },
388 #else
389 { "nf_rtsp", "1" },
390 #endif
391 { "nf_pptp", "1" },
392 { "nf_h323", "1" },
393 { "nf_ftp", "1" },
395 // advanced-mac
396 { "mac_wan", "" },
397 { "wl_macaddr", "" },
399 // advanced-misc
400 { "boot_wait", "on" },
401 { "wait_time", "5" },
402 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
403 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
404 { "jumbo_frame_size", "2000" },
405 #ifdef CONFIG_BCMWL5
406 { "ctf_disable", "1" },
407 #endif
409 // advanced-dhcpdns
410 { "dhcpd_dmdns", "1" },
411 { "dhcpd_slt", "0" },
412 { "dhcpd_gwmode", "" },
413 { "dhcpd_lmax", "" },
414 { "dns_addget", "0" },
415 { "dns_intcpt", "0" },
416 { "dhcpc_minpkt", "1" },
417 { "dhcpc_custom", "" },
418 { "dns_norebind", "1" },
419 { "dnsmasq_custom", "" },
420 { "dhcpd_static_only", "0" },
421 // { "dnsmasq_norw", "0" },
423 // advanced-firewall
424 // { "block_loopback", "0" }, // nat loopback
425 { "nf_loopback", "1" },
426 { "block_wan", "1" }, // block inbound icmp
427 { "multicast_pass", "0" }, // enable multicast proxy
428 #ifdef TCONFIG_VLAN
429 { "multicast_lan", "0" }, // on LAN (br0)
430 { "multicast_lan1", "0" }, // on LAN1 (br1)
431 { "multicast_lan2", "0" }, // on LAN2 (br2)
432 { "multicast_lan3", "0" }, // on LAN3 (br3)
433 #endif
434 { "udpxy_enable", "0" },
435 { "udpxy_stats", "0" },
436 { "udpxy_clients", "3" },
437 { "udpxy_port", "4022" },
438 { "ne_syncookies", "0" }, // tcp_syncookies
439 { "dhcp_pass", "1" }, // allow DHCP responses
440 { "ne_shlimit", "0,3,60" },
442 // advanced-routing
443 { "routes_static", "" },
444 { "dhcp_routes", "1" },
445 { "wk_mode", "gateway" }, // Network mode [gateway|router]
446 #ifdef TCONFIG_ZEBRA
447 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
448 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
449 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
450 #ifdef TCONFIG_VLAN
451 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
452 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
453 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
454 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
455 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
456 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
457 #endif
458 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
459 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
460 #endif
462 // advanced-vlan
463 { "trunk_vlan_so", "0" }, // VLAN trunk support override
465 // advanced-wireless
466 { "wl_txant", "3" },
467 { "wl_txpwr", "42" },
468 { "wl_maxassoc", "128" }, // Max associations driver could support
469 { "wl_bss_maxassoc", "128" },
470 { "wl_distance", "" },
472 // forward-*
473 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
474 #ifdef TCONFIG_IPV6
475 { "ipv6_portforward", ""},
476 #endif
477 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
478 { "dmz_enable", "0" },
479 { "dmz_ipaddr", "0" },
480 { "dmz_sip", "" },
482 // forward-upnp
483 { "upnp_enable", "0" },
484 { "upnp_secure", "1" },
485 { "upnp_port", "0" },
486 { "upnp_ssdp_interval", "60" }, // SSDP interval
487 { "upnp_mnp", "0" },
489 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
490 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
491 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
492 #if 0 // disabled for miniupnpd
493 { "upnp_max_age", "180" }, // Max age
494 { "upnp_config", "0" },
495 #endif
497 // qos
498 { "qos_enable", "0" },
499 { "qos_ack", "0" },
500 { "qos_syn", "1" },
501 { "qos_fin", "1" },
502 { "qos_rst", "1" },
503 { "qos_icmp", "0" },
504 { "qos_reset", "1" },
505 { "qos_obw", "230" },
506 { "qos_ibw", "1000" },
507 { "qos_orules", "0<<6<d<80,443<0<<0:512<1<WWW>0<<6<d<80,443<0<<512:<3<WWW (512K+)>0<<-1<d<53<0<<0:2<0<DNS>0<<-1<d<53<0<<2:<4<DNS (2K+)" },
508 { "qos_burst0", "" },
509 { "qos_burst1", "" },
511 { "qos_default", "4" },
512 { "qos_orates", "80-100,10-100,5-100,3-100,2-95,1-50,1-40,1-30,1-20,1-10" },
514 { "ne_vegas", "0" }, // TCP Vegas
515 { "ne_valpha", "2" }, // "
516 { "ne_vbeta", "6" }, // "
517 { "ne_vgamma", "2" }, // "
519 // access restrictions
520 { "rruleN", "0" },
521 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
522 //* { "rrule##", "" },
523 { "rrulewp", "80,8080" },
525 #if TOMATO_SL
526 // samba
527 { "smbd_on", "0" },
528 { "nmbd_on", "0" },
529 { "smbd_wgroup", "WORKGROUP" },
530 { "smbd_nbname", "TOMATO" },
531 { "smbd_adminpass", "admin" },
532 #endif
534 // admin-access
535 { "http_username", "" }, // Username
536 { "http_passwd", "admin" }, // Password
537 { "remote_management", "0" }, // Remote Management [1|0]
538 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
539 { "http_wanport", "8080" }, // WAN port to listen on
540 { "http_lanport", "80" }, // LAN port to listen on
541 { "https_lanport", "443" }, // LAN port to listen on
542 { "http_enable", "1" }, // HTTP server enable/disable
543 { "https_enable", "0" }, // HTTPS server enable/disable
544 { "https_crt_save", "0" },
545 { "https_crt_cn", "" },
546 { "https_crt_file", "" },
547 { "https_crt", "" },
548 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
549 { "web_css", "tomato" },
550 { "web_svg", "1" },
551 { "telnetd_eas", "1" },
552 { "telnetd_port", "23" },
553 { "sshd_eas", "0" },
554 { "sshd_pass", "1" },
555 { "sshd_port", "22" },
556 { "sshd_remote", "0" },
557 { "sshd_rport", "2222" },
558 { "sshd_authkeys", "" },
559 { "sshd_hostkey", "" },
560 { "sshd_dsskey", "" },
561 { "sshd_forwarding", "1" },
562 { "rmgt_sip", "" }, // remote management: source ip address
564 { "http_id", "" },
565 { "web_mx", "status,bwm" },
566 { "web_pb", "" },
568 // admin-bwm
569 { "rstats_enable", "1" },
570 { "rstats_path", "" },
571 { "rstats_stime", "48" },
572 { "rstats_offset", "1" },
573 { "rstats_data", "" },
574 { "rstats_colors", "" },
575 { "rstats_exclude", "" },
576 { "rstats_sshut", "1" },
577 { "rstats_bak", "0" },
579 // admin-ipt
580 { "cstats_enable", "1" },
581 { "cstats_path", "" },
582 { "cstats_stime", "48" },
583 { "cstats_offset", "1" },
584 { "cstats_colors", "" },
585 { "cstats_exclude", "" },
586 { "cstats_include", "" },
587 { "cstats_all", "1" },
588 { "cstats_sshut", "1" },
589 { "cstats_bak", "0" },
591 // advanced-buttons
592 { "sesx_led", "0" },
593 { "sesx_b0", "1" },
594 { "sesx_b1", "4" },
595 { "sesx_b2", "4" },
596 { "sesx_b3", "4" },
597 { "sesx_script",
598 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
600 { "script_brau",
601 "if [ ! -e /tmp/switch-start ]; then\n"
602 " # do something at startup\n"
603 " echo position at startup was $1 >/tmp/switch-start\n"
604 " exit\n"
605 "fi\n"
606 "if [ $1 = \"bridge\" ]; then\n"
607 " # do something\n"
608 " led bridge on\n"
609 "elif [ $1 = \"auto\" ]; then\n"
610 " # do something\n"
611 " led bridge off\n"
612 "fi\n"
615 // admin-log
616 { "log_remote", "0" },
617 { "log_remoteip", "" },
618 { "log_remoteport", "514" },
619 { "log_file", "1" },
620 { "log_limit", "60" },
621 { "log_in", "0" },
622 { "log_out", "0" },
623 { "log_mark", "60" },
624 { "log_events", "" },
626 // admin-log-webmonitor
627 { "log_wm", "0" },
628 { "log_wmtype", "0" },
629 { "log_wmip", "" },
630 { "log_wmdmax", "300" },
631 { "log_wmsmax", "300" },
633 // admin-debugging
634 { "debug_nocommit", "0" },
635 { "debug_cprintf", "0" },
636 { "debug_cprintf_file", "0" },
637 // { "debug_keepfiles", "0" },
638 { "console_loglevel", "1" },
639 { "t_cafree", "1" },
640 { "t_hidelr", "0" },
641 { "debug_clkfix", "1" },
642 { "debug_ddns", "0" },
644 // admin-cifs
645 { "cifs1", "" },
646 { "cifs2", "" },
648 // admin-jffs2
649 { "jffs2_on", "0" },
650 { "jffs2_exec", "" },
652 #ifdef TCONFIG_USB
653 // nas-usb - !!TB
654 { "usb_enable", "0" },
655 { "usb_uhci", "0" },
656 { "usb_ohci", "0" },
657 { "usb_usb2", "1" },
658 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
659 { "usb_mmc", "-1" },
660 #endif
661 { "usb_irq_thresh", "0" },
662 { "usb_storage", "1" },
663 { "usb_printer", "1" },
664 { "usb_printer_bidirect", "0" },
665 { "usb_ext_opt", "" },
666 { "usb_fat_opt", "" },
667 { "usb_ntfs_opt", "" },
668 { "usb_fs_ext3", "1" },
669 { "usb_fs_fat", "1" },
670 #ifdef TCONFIG_NTFS
671 { "usb_fs_ntfs", "1" },
672 #endif
673 { "usb_automount", "1" },
674 #if 0
675 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
676 #endif
677 { "script_usbhotplug", "" },
678 { "script_usbmount", "" },
679 { "script_usbumount", "" },
680 #endif
682 #ifdef TCONFIG_FTP
683 // nas-ftp - !!TB
684 { "ftp_enable", "0" },
685 { "ftp_super", "0" },
686 { "ftp_anonymous", "0" },
687 { "ftp_dirlist", "0" },
688 { "ftp_port", "21" },
689 { "ftp_max", "0" },
690 { "ftp_ipmax", "0" },
691 { "ftp_staytimeout", "300" },
692 { "ftp_rate", "0" },
693 { "ftp_anonrate", "0" },
694 { "ftp_anonroot", "" },
695 { "ftp_pubroot", "" },
696 { "ftp_pvtroot", "" },
697 { "ftp_users", "" },
698 { "ftp_custom", "" },
699 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
700 { "ftp_limit", "0,3,60" },
701 { "log_ftp", "0" },
702 #endif
704 #ifdef TCONFIG_SNMP
705 { "snmp_enable", "0" },
706 { "snmp_location", "router" },
707 { "snmp_contact", "admin@tomato" },
708 { "snmp_ro", "rocommunity" },
709 #endif
711 #ifdef TCONFIG_SAMBASRV
712 // nas-samba - !!TB
713 { "smbd_enable", "0" },
714 { "smbd_wgroup", "WORKGROUP" },
715 { "smbd_master", "1" },
716 { "smbd_wins", "1" },
717 { "smbd_cpage", "" },
718 { "smbd_cset", "utf8" },
719 { "smbd_custom", "" },
720 { "smbd_autoshare", "2" },
721 { "smbd_shares",
722 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
724 { "smbd_user", "nas" },
725 { "smbd_passwd", "" },
726 #endif
728 #ifdef TCONFIG_MEDIA_SERVER
729 // nas-media
730 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
731 { "ms_dirs", "/mnt<" },
732 { "ms_port", "0" },
733 { "ms_dbdir", "" },
734 { "ms_tivo", "0" },
735 { "ms_stdlna", "0" },
736 { "ms_sas", "0" },
737 #endif
739 // admin-sch
740 { "sch_rboot", "" },
741 { "sch_rcon", "" },
742 { "sch_c1", "" },
743 { "sch_c2", "" },
744 { "sch_c3", "" },
745 { "sch_c1_cmd", "" },
746 { "sch_c2_cmd", "" },
747 { "sch_c3_cmd", "" },
749 // admin-script
750 { "script_init", "" },
751 { "script_shut", "" },
752 { "script_fire", "" },
753 { "script_wanup", "" },
755 #ifdef TCONFIG_OPENVPN
756 // vpn
757 { "vpn_debug", "0" },
758 { "vpn_server_eas", "" },
759 { "vpn_server_dns", "" },
760 { "vpn_server1_poll", "0" },
761 { "vpn_server1_if", "tun" },
762 { "vpn_server1_proto", "udp" },
763 { "vpn_server1_port", "1194" },
764 { "vpn_server1_firewall", "auto" },
765 { "vpn_server1_crypt", "tls" },
766 { "vpn_server1_comp", "adaptive" },
767 { "vpn_server1_cipher", "default" },
768 { "vpn_server1_dhcp", "1" },
769 { "vpn_server1_r1", "192.168.1.50" },
770 { "vpn_server1_r2", "192.168.1.55" },
771 { "vpn_server1_sn", "10.8.0.0" },
772 { "vpn_server1_nm", "255.255.255.0" },
773 { "vpn_server1_local", "10.8.0.1" },
774 { "vpn_server1_remote", "10.8.0.2" },
775 { "vpn_server1_reneg", "-1" },
776 { "vpn_server1_hmac", "-1" },
777 { "vpn_server1_plan", "1" },
778 { "vpn_server1_ccd", "0" },
779 { "vpn_server1_c2c", "0" },
780 { "vpn_server1_ccd_excl", "0" },
781 { "vpn_server1_ccd_val", "" },
782 { "vpn_server1_pdns", "0" },
783 { "vpn_server1_rgw", "0" },
784 { "vpn_server1_custom", "" },
785 { "vpn_server1_static", "" },
786 { "vpn_server1_ca", "" },
787 { "vpn_server1_crt", "" },
788 { "vpn_server1_key", "" },
789 { "vpn_server1_dh", "" },
790 { "vpn_server2_poll", "0" },
791 { "vpn_server2_if", "tun" },
792 { "vpn_server2_proto", "udp" },
793 { "vpn_server2_port", "1194" },
794 { "vpn_server2_firewall", "auto" },
795 { "vpn_server2_crypt", "tls" },
796 { "vpn_server2_comp", "adaptive" },
797 { "vpn_server2_cipher", "default" },
798 { "vpn_server2_dhcp", "1" },
799 { "vpn_server2_r1", "192.168.1.50" },
800 { "vpn_server2_r2", "192.168.1.55" },
801 { "vpn_server2_sn", "10.8.0.0" },
802 { "vpn_server2_nm", "255.255.255.0" },
803 { "vpn_server2_local", "10.8.0.1" },
804 { "vpn_server2_remote", "10.8.0.2" },
805 { "vpn_server2_reneg", "-1" },
806 { "vpn_server2_hmac", "-1" },
807 { "vpn_server2_plan", "1" },
808 { "vpn_server2_ccd", "0" },
809 { "vpn_server2_c2c", "0" },
810 { "vpn_server2_ccd_excl", "0" },
811 { "vpn_server2_ccd_val", "" },
812 { "vpn_server2_pdns", "0" },
813 { "vpn_server2_rgw", "0" },
814 { "vpn_server2_custom", "" },
815 { "vpn_server2_static", "" },
816 { "vpn_server2_ca", "" },
817 { "vpn_server2_crt", "" },
818 { "vpn_server2_key", "" },
819 { "vpn_server2_dh", "" },
820 { "vpn_client_eas", "" },
821 { "vpn_client1_poll", "0" },
822 { "vpn_client1_if", "tun" },
823 { "vpn_client1_bridge", "1" },
824 { "vpn_client1_nat", "1" },
825 { "vpn_client1_proto", "udp" },
826 { "vpn_client1_addr", "" },
827 { "vpn_client1_port", "1194" },
828 { "vpn_client1_retry", "30" },
829 { "vpn_client1_rg", "0" },
830 { "vpn_client1_firewall", "auto" },
831 { "vpn_client1_crypt", "tls" },
832 { "vpn_client1_comp", "adaptive" },
833 { "vpn_client1_cipher", "default" },
834 { "vpn_client1_local", "10.8.0.2" },
835 { "vpn_client1_remote", "10.8.0.1" },
836 { "vpn_client1_nm", "255.255.255.0" },
837 { "vpn_client1_reneg", "-1" },
838 { "vpn_client1_hmac", "-1" },
839 { "vpn_client1_adns", "0" },
840 { "vpn_client1_rgw", "0" },
841 { "vpn_client1_gw", "" },
842 { "vpn_client1_custom", "" },
843 { "vpn_client1_static", "" },
844 { "vpn_client1_ca", "" },
845 { "vpn_client1_crt", "" },
846 { "vpn_client1_key", "" },
847 { "vpn_client2_poll", "0" },
848 { "vpn_client2_if", "tun" },
849 { "vpn_client2_bridge", "1" },
850 { "vpn_client2_nat", "1" },
851 { "vpn_client2_proto", "udp" },
852 { "vpn_client2_addr", "" },
853 { "vpn_client2_port", "1194" },
854 { "vpn_client2_retry", "30" },
855 { "vpn_client2_rg", "0" },
856 { "vpn_client2_firewall", "auto" },
857 { "vpn_client2_crypt", "tls" },
858 { "vpn_client2_comp", "adaptive" },
859 { "vpn_client2_cipher", "default" },
860 { "vpn_client2_local", "10.8.0.2" },
861 { "vpn_client2_remote", "10.8.0.1" },
862 { "vpn_client2_nm", "255.255.255.0" },
863 { "vpn_client2_reneg", "-1" },
864 { "vpn_client2_hmac", "-1" },
865 { "vpn_client2_adns", "0" },
866 { "vpn_client2_rgw", "0" },
867 { "vpn_client2_gw", "" },
868 { "vpn_client2_custom", "" },
869 { "vpn_client2_static", "" },
870 { "vpn_client2_ca", "" },
871 { "vpn_client2_crt", "" },
872 { "vpn_client2_key", "" },
873 #endif // vpn
875 #if 0
876 // safe to remove?
877 { "QoS", "0" },
879 { "ses_enable", "0" }, // enable ses
880 { "ses_event", "2" }, // initial ses event
881 { "ses_led_assertlvl", "0" }, // For SES II
882 { "ses_client_join", "0" }, // For SES II
883 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
884 { "ses_count", "0" },
885 { "eou_configured", "0" },
887 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
888 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
889 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
890 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
891 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
892 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
893 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
894 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
895 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
896 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
897 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
898 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
900 //obs zzz { "http_method", "post" }, // HTTP method
902 // { "wl_macmode1", "disabled" },
904 /* obsolete
905 { "filter", "on" }, // Firewall Protection [on|off]
906 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
907 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
908 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
909 { "block_cookie", "0" }, // Block Cookie [1|0]
910 { "ident_pass", "0" }, // IDENT passthrough [1|0]
911 { "block_proxy", "0" }, // Block Proxy [1|0]
914 /* --- obsolete ---
915 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
916 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
918 // for mac clone
919 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
920 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
922 { "public_ip", "" }, // public ip
925 //forced in rc.c { "os_name", "" }, // OS name string
926 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
927 //forced in rc.c { "os_date", __DATE__ }, // OS date
928 //not used { "ct_modules", "" }, // CyberTAN kernel modules
929 //obs { "timer_interval", "3600" }, // Timer interval in seconds
930 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
931 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
932 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
933 //obs { "os_server", "" }, // URL for getting upgrades
934 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
935 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
936 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
937 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
938 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
939 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
940 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
941 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
942 //{ "eou_device_id", "" },
943 //{ "eou_public_key", "" },
944 //{ "eou_private_key", "" },
945 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
946 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
947 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
948 // { "ntp_enable", "1" }, // replaced with ntp_updates
949 // { "ntp_mode", "auto" }, // auto, manual
952 // for AOL
953 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
954 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
955 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
956 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
957 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
959 // advanced-watchdog
960 { "wd_en", "" },
961 { "wd_atp0", "" },
962 { "wd_atp1", "" },
963 { "wd_atp2", "" },
964 { "wd_atp3", "" },
965 { "wd_atp4", "" },
966 { "wd_mxr", "3" },
967 { "wd_rdy", "15" },
968 { "wd_cki", "300" },
969 { "wd_fdm", "" },
970 { "wd_aof", "" },
972 #endif // 0
974 { NULL, NULL }
977 const defaults_t if_generic[] = {
978 { "lan_ifname", "br0" },
979 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
980 { "wan_ifname", "eth1" },
981 { "wan_ifnames", "eth1" },
982 { NULL, NULL }
985 const defaults_t if_vlan[] = {
986 { "lan_ifname", "br0" },
987 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
988 #ifdef TCONFIG_VLAN
989 { "lan1_ifname", "" },
990 { "lan1_ifnames", "" },
991 { "lan2_ifname", "" },
992 { "lan2_ifnames", "" },
993 { "lan3_ifname", "" },
994 { "lan3_ifnames", "" },
995 #endif
996 { "wan_ifname", "vlan1" },
997 { "wan_ifnames", "vlan1" },
998 { NULL, NULL }