start with no DHCP if router loses nvram settings
[tomato.git] / release / src / router / nvram / defaults.c
blob6783400b5972f50461f3b7a90586e8c3e1f52222
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 // { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //start with no dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
64 // WAN H/W parameters
65 //! { "wan_ifname", "" }, // WAN interface name
66 //! { "wan_ifnames", "" }, // WAN interface names
67 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
68 { "wan_hwaddr", "" }, // WAN interface MAC address
69 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
71 // WAN TCP/IP parameters
72 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
73 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
74 { "wan_netmask", "0.0.0.0" }, // WAN netmask
75 { "wan_gateway", "0.0.0.0" }, // WAN gateway
76 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
77 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
78 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
79 { "wan_lease", "86400" }, // WAN lease time in seconds
80 { "wan_islan", "0" },
82 { "wan_primary", "1" }, // Primary wan connection
83 { "wan_unit", "0" }, // Last configured connection
84 /* --- obsolete ---
85 // Filters
86 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
87 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
88 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
90 { "filter", "on" }, // [on | off] Firewall Protection
92 // Port forwards
93 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
95 // DHCP server parameters
96 { "dhcp_start", "100" }, //
97 { "dhcp_num", "50" }, //
98 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
99 { "dhcpd_endip", "" }, // "
100 { "dhcp_lease", "0" }, // LAN lease time in minutes
101 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
102 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
103 { "wan_routes", "" },
104 { "wan_msroutes", "" },
107 // PPPoE parameters
108 { "pppoe_ifname", "" }, // PPPoE enslaved interface
109 { "ppp_username", "" }, // PPP username
110 { "ppp_passwd", "" }, // PPP password
111 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
112 { "ppp_keepalive", "0" }, // Restore link automatically
113 { "ppp_demand", "0" }, // Dial on demand
114 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
115 { "ppp_mru", "1500" }, // Negotiate MRU to this value
116 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
117 { "ppp_service", "" }, // PPPoE service name
118 { "ppp_ac", "" }, // PPPoE access concentrator name
119 { "ppp_static", "0" }, // Enable / Disable Static IP
120 { "ppp_static_ip", "" }, // PPPoE Static IP
121 { "ppp_get_ac", "" }, // PPPoE Server ac name
122 { "ppp_get_srv", "" }, // PPPoE Server service name
123 { "ppp_custom", "" }, // PPPD additional options
125 { "pppoe_lei", "" },
126 { "pppoe_lef", "" },
128 #ifdef TCONFIG_IPV6
129 // IPv6 parameters
130 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
131 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
132 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
133 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
134 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
135 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
136 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
137 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
138 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
139 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
140 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
141 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
142 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
143 { "ipv6_dns", "" }, // DNS server(s) IPs
144 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
145 #endif
147 // Wireless parameters
148 { "wl_ifname", "" }, // Interface name
149 { "wl_hwaddr", "" }, // MAC address
150 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
151 { "wl_corerev", "" }, // Current core revision
152 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
153 { "wl_radioids", "" }, // List of radio IDs
154 { "wl_ssid", "wireless" }, // Service set ID (network name)
155 { "wl1_ssid", "wireless1" },
156 { "wl_country_code", "US" }, // Country (default obtained from driver)
157 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
158 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
159 { "wl_closed", "0" }, // Closed (hidden) network
160 { "wl_ap_isolate", "0" }, // AP isolate mode
161 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
162 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
163 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
164 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
165 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
166 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
167 { "wl_key", "1" }, // Current WEP key
168 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
169 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
170 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
171 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
172 { "wl_channel", "1" }, // Channel number
173 { "wl1_channel", "0" },
174 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
175 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
176 { "wl_rateset", "default" }, // "default" or "all" or "12"
177 { "wl_frag", "2346" }, // Fragmentation threshold
178 { "wl_rts", "2347" }, // RTS threshold
179 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
180 { "wl_bcn", "100" }, // Beacon interval
181 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
182 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
183 { "wl_gmode", "1" }, // 54g mode
184 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
185 { "wl_afterburner", "off" }, // AfterBurner
186 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
187 { "wl_wme", "auto" }, // WME mode (auto|off|on)
188 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
189 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
190 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
191 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
192 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
193 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3) //Toastman - 0=off
194 { "wl_passphrase", "" }, // Passphrase // Add
195 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
196 { "wl_wep_buf", "" }, // save all settings for web // Add
197 { "wl_wep_gen", "" }, // save all settings for generate button // Add
198 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
200 // WPA parameters
201 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
202 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
203 { "wl_wpa_psk", "" }, // WPA pre-shared key
204 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
205 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
206 { "wl_radius_key", "" }, // RADIUS shared secret
207 { "wl_radius_port", "1812" }, // RADIUS server UDP port
208 { "wl_crypto", "aes" }, // WPA data encryption
209 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
210 { "wl_akm", "" }, // WPA akm list
212 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
213 // EDCA parameters for STA
214 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
215 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
216 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
217 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
219 // EDCA parameters for AP
220 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
221 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
222 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
223 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
225 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
226 { "wl_wme_apsd", "off" }, // WME APSD mode
227 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
229 /* Per AC Tx parameters */
230 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
231 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
232 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
233 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
235 { "wl_unit", "0" }, // Last configured interface
236 { "wl_mac_deny", "" }, // filter MAC // Add
238 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
239 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
240 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
242 // !!TB: n-mode
243 { "wl_nmode", "-1" }, // N-mode
244 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
245 { "wl1_nband", "1" },
246 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
247 { "wl_nreqd", "0" }, // Require 802.11n support
248 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
249 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
250 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
251 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
252 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
253 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
254 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
255 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
256 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
257 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
258 { "wl_bcn_rotate", "1" }, // Beacon rotation
259 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
260 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
262 #ifdef TCONFIG_EMF
263 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
264 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
265 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
266 { "emf_enable", "0" }, // Disable EMF by default
267 #endif
268 #ifdef CONFIG_BCMWL5
269 // AMPDU
270 { "wl_ampdu", "auto" }, // Default AMPDU setting
271 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
272 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
273 { "wl_amsdu", "auto" }, // Default AMSDU setting
274 // power save
275 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
276 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
277 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
278 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
279 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
280 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
281 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
282 // misc
283 { "wl_wmf_bss_enable", "0" }, // WMF Enable/Disable
284 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
285 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
286 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
287 #endif
289 { "pptp_server_ip", "" }, // as same as WAN gateway
290 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
291 { "pptp_dhcp", "1" },
293 // for firewall
294 { "mtu_enable", "0" }, // WAN MTU [1|0]
295 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
297 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
298 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
299 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
301 // misc
302 { "wl_tnoise", "-99" },
303 { "led_override", "" },
304 { "btn_override", "" },
305 { "btn_reset", "" },
306 { "env_path", "" },
307 { "manual_boot_nv", "0" },
308 // { "wlx_hpamp", "" },
309 // { "wlx_hperx", "" }, // see init.c
310 { "t_fix1", "" },
312 // basic-ddns
313 { "ddnsx0", "" },
314 { "ddnsx1", "" },
315 { "ddnsx0_cache", "" },
316 { "ddnsx1_cache", "" },
317 { "ddnsx_save", "1" },
318 { "ddnsx_refresh", "28" },
320 // basic-ident
321 { "router_name", "toast" },
322 { "wan_hostname", "unknown" },
323 { "wan_domain", "" },
325 // basic-time
326 { "tm_sel", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
327 { "tm_tz", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
328 { "tm_dst", "1", },
329 { "ntp_updates", "4" },
330 { "ntp_tdod", "0" },
331 { "ntp_server", "0.europe.pool.ntp.org 1.europe.pool.ntp.org 2.europe.pool.ntp.org" },
332 { "ntp_kiss", "" },
333 { "ntp_kiss_ignore", "" },
335 // basic-static
336 { "dhcpd_static", "" },
338 // basic-wfilter
339 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
340 { "wl_macmode", "disabled" },
341 { "macnames", "" },
343 // bwm-realtime
344 { "cmon_enable", "0" },
345 { "cmon_ipaddr", "0.0.0.0" },
347 // advanced-ctnf
348 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
349 { "ct_udp_timeout", "30 180" },
350 { "ct_timeout", "10 10" },
351 { "ct_max", "8192" },
352 { "nf_ttl", "0" },
353 { "nf_l7in", "1" },
354 #ifdef LINUX26
355 { "nf_sip", "1" },
356 { "ct_hashsize", "2048" },
357 #endif
358 #ifdef LINUX26
359 { "nf_rtsp", "0" },
360 #else
361 { "nf_rtsp", "1" },
362 #endif
363 { "nf_pptp", "1" },
364 { "nf_h323", "1" },
365 { "nf_ftp", "1" },
367 // advanced-mac
368 { "mac_wan", "" },
369 { "wl_macaddr", "" },
371 // advanced-misc
372 { "boot_wait", "on" },
373 { "wait_time", "5" },
374 { "clkfreq", "" },
375 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
376 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
377 { "jumbo_frame_size", "2000" },
378 #ifdef CONFIG_BCMWL5
379 { "ctf_disable", "1" },
380 #endif
382 // advanced-dhcpdns
383 { "dhcpd_dmdns", "1" },
384 { "dhcpd_slt", "0" },
385 { "dhcpd_gwmode", "" },
386 { "dhcpd_lmax", "" },
387 { "dns_addget", "0" },
388 { "dns_intcpt", "0" },
389 { "dhcpc_minpkt", "1" },
390 { "dhcpc_custom", "" },
391 { "dns_norebind", "1" },
392 { "dnsmasq_custom", "" },
393 // { "dnsmasq_norw", "0" },
395 // advanced-firewall
396 // { "block_loopback", "0" }, // nat loopback
397 { "nf_loopback", "0" },
398 { "block_wan", "1" }, // block inbound icmp
399 { "multicast_pass", "0" }, // enable multicast proxy
400 { "ne_syncookies", "0" }, // tcp_syncookies
401 { "dhcp_pass", "1" }, // allow DHCP responses
402 { "ne_shlimit", "0,3,60" },
404 // advanced-routing
405 { "routes_static", "" },
406 { "dhcp_routes", "1" },
407 { "wk_mode", "gateway" }, // Network mode [gateway|router]
408 #ifdef TCONFIG_ZEBRA
409 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
410 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
411 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
412 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
413 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
414 #endif
416 // advanced-wireless
417 { "wl_txant", "3" },
418 { "wl_txpwr", "42" },
419 { "wl_maxassoc", "128" }, // Max associations driver could support
420 { "wl_bss_maxassoc", "128" },
421 { "wl_distance", "" },
423 // forward-*
424 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
425 #ifdef TCONFIG_IPV6
426 { "ipv6_portforward", ""},
427 #endif
428 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
429 { "dmz_enable", "0" },
430 { "dmz_ipaddr", "0" },
431 { "dmz_sip", "" },
433 // forward-upnp
434 { "upnp_enable", "3" },
435 { "upnp_secure", "1" },
436 { "upnp_port", "0" },
437 { "upnp_ssdp_interval", "60" }, // SSDP interval
438 { "upnp_max_age", "180" }, // Max age
439 { "upnp_mnp", "0" },
440 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
441 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
442 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
443 #if 0 // disabled for miniupnpd
444 { "upnp_max_age", "180" }, // Max age
445 { "upnp_config", "0" },
446 #endif
448 // qos
449 { "qos_enable", "0" },
450 { "qos_ack", "0" },
451 { "qos_syn", "1" },
452 { "qos_fin", "1" },
453 { "qos_rst", "1" },
454 { "qos_icmp", "1" },
455 { "qos_reset", "1" },
456 { "qos_obw", "700" },
457 { "qos_ibw", "16000" },
458 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<-1<d<123<0<<0:10<<0<Network Time (NTP)>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<x<9<0<<<<0<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<0<RPC (Microsoft)>0<<6<x<23,992<0<<<<0<Telnet>0<<-1<d<22<0<<<<3<SSH>0<<17<x<3544<0<<<<3<Teredo port>0<<6<s<80,8080<0<<<<3<Remote Router Access>0<<6<x<3389<0<<<<3<Remote Assistance>0<<-1<a<<0<flash<<<2<Flash Video, (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video, (Youtube)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<s<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<6<x<6005<0<<<<2<Camfrog>0<<-1<d<1220,1234,5100,6005,6970<0<<<<-1<VLC>0<<-1<x<554,5004,5005<0<<<<2<RTP/RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<x<1935<0<<<<2<RTMP>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<d<1718:1720<0<<<<1<H323>0<<-1<a<<0<skypetoskype<<<1<Skype>0<<-1<a<<0<skypeout<<<1<Skypeout>0<<-1<d<80<0<<0:512<<4<HTTP>0<<-1<d<443<0<<0:512<<4<HTTPS>0<<6<d<8080<0<<0:512<<4<HTTP Proxy / Alternate>0<<-1<d<25,587,465<0<<<<5<SMTP, Submission>0<<-1<d<110,995<0<<<<5<POP3 Mail>0<<-1<d<119,563<0<<<<5<NNTP>0<<-1<d<143,220,585,993<0<<<<5<IMAP Mail>0<<-1<a<<0<irc<<<6<IRC>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<Yahoo Messenger>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<Other Chat Services>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<-1<x<6571,6891:6901<0<<<<7<WLM File/Webcam>0<<6<d<80,443,8080<0<<512:<<7<HTTP,SSL File Transfers>0<<17<x<1:65535<0<<<<-1<P2P (uTP, UDP)" },
459 { "qos_burst0", "" },
460 { "qos_burst1", "" },
461 { "qos_default", "8" },
462 { "qos_orates", "5-20,5-20,5-25,5-70,20-100,5-80,5-80,5-80,5-50,0-0" },
463 { "qos_irates", "10,60,60,70,0,60,60,80,30,1" },
464 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger Download P2P/Bulk Crawl" },
466 { "ne_vegas", "0" }, // TCP Vegas
467 { "ne_valpha", "3" }, // "
468 { "ne_vbeta", "3" }, // "
469 { "ne_vgamma", "2" }, // "
471 // qos-bw-limiter
472 { "qosl_enable", "0" },
473 // { "qosl_obw", "" }, unused - used qos_obw
474 // { "qosl_ibw", "" }, unused - used qos_obw
475 { "qosl_rules", "" },
476 { "qosl_denable", "0" },
477 { "qosl_dtcp", "0" },//unlimited
478 { "qosl_dudp", "0" },//unlimited
479 { "qosl_ddlc", "" },
480 { "qosl_dulc", "" },
481 { "qosl_ddlr", "" },
482 { "qosl_dulr", "" },
484 // access restrictions
485 { "rruleN", "0" },
486 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
487 //* { "rrule##", "" },
488 { "rrulewp", "80,8080" },
490 #if TOMATO_SL
491 // samba
492 { "smbd_on", "0" },
493 { "nmbd_on", "0" },
494 { "smbd_wgroup", "WORKGROUP" },
495 { "smbd_nbname", "TOMATO" },
496 { "smbd_adminpass", "admin" },
497 #endif
499 // admin-access
500 { "http_username", "" }, // Username
501 { "http_passwd", "admin" }, // Password
502 { "remote_management", "0" }, // Remote Management [1|0]
503 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
504 { "http_wanport", "8080" }, // WAN port to listen on
505 { "http_lanport", "80" }, // LAN port to listen on
506 { "https_lanport", "443" }, // LAN port to listen on
507 { "http_enable", "1" }, // HTTP server enable/disable
508 { "https_enable", "0" }, // HTTPS server enable/disable
509 { "https_crt_save", "0" },
510 { "https_crt_cn", "" },
511 { "https_crt_file", "" },
512 { "https_crt", "" },
513 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
514 { "web_favicon", "0" },
515 { "web_css", "brownlight" },
516 { "web_svg", "1" },
517 { "telnetd_eas", "1" },
518 { "telnetd_port", "23" },
519 { "sshd_eas", "0" },
520 { "sshd_pass", "1" },
521 { "sshd_port", "22" },
522 { "sshd_remote", "0" },
523 { "sshd_rport", "2222" },
524 { "sshd_authkeys", "" },
525 { "sshd_hostkey", "" },
526 { "sshd_dsskey", "" },
527 { "sshd_forwarding", "1" },
528 { "rmgt_sip", "" }, // remote management: source ip address
530 { "http_id", "" },
531 { "web_mx", "status,bwm" },
532 { "web_pb", "" },
534 // admin-bwm
535 { "rstats_enable", "1" },
536 { "rstats_path", "" },
537 { "rstats_stime", "48" },
538 { "rstats_offset", "1" },
539 { "rstats_data", "" },
540 { "rstats_colors", "" },
541 { "rstats_exclude", "" },
542 { "rstats_sshut", "1" },
543 { "rstats_bak", "0" },
545 // advanced-buttons
546 { "sesx_led", "0" },
547 { "sesx_b0", "1" },
548 { "sesx_b1", "4" },
549 { "sesx_b2", "4" },
550 { "sesx_b3", "4" },
551 { "sesx_script",
552 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
554 { "script_brau",
555 "if [ ! -e /tmp/switch-start ]; then\n"
556 " # do something at startup\n"
557 " echo position at startup was $1 >/tmp/switch-start\n"
558 " exit\n"
559 "fi\n"
560 "if [ $1 = \"bridge\" ]; then\n"
561 " # do something\n"
562 " led bridge on\n"
563 "elif [ $1 = \"auto\" ]; then\n"
564 " # do something\n"
565 " led bridge off\n"
566 "fi\n"
569 // admin-log
570 { "log_remote", "0" },
571 { "log_remoteip", "" },
572 { "log_remoteport", "514" },
573 { "log_file", "1" },
574 { "log_file_custom", "0" },
575 { "log_file_path", "/var/log/messages" },
576 { "log_limit", "60" },
577 { "log_in", "0" },
578 { "log_out", "0" },
579 { "log_mark", "60" },
580 { "log_events", "" },
582 // admin-log-webmonitor
583 { "log_wm", "0" },
584 { "log_wmtype", "0" },
585 { "log_wmip", "" },
586 { "log_wmdmax", "300" },
587 { "log_wmsmax", "300" },
589 // admin-debugging
590 { "debug_nocommit", "0" },
591 { "debug_cprintf", "0" },
592 { "debug_cprintf_file", "0" },
593 // { "debug_keepfiles", "0" },
594 { "console_loglevel", "1" },
595 { "t_cafree", "1" },
596 { "t_hidelr", "0" },
597 { "debug_clkfix", "1" },
598 { "debug_ddns", "0" },
600 // admin-cifs
601 { "cifs1", "" },
602 { "cifs2", "" },
604 // admin-jffs2
605 { "jffs2_on", "0" },
606 { "jffs2_exec", "" },
608 #ifdef TCONFIG_USB
609 // nas-usb - !!TB
610 { "usb_enable", "0" },
611 { "usb_uhci", "0" },
612 { "usb_ohci", "0" },
613 { "usb_usb2", "1" },
614 { "usb_irq_thresh", "0" },
615 { "usb_storage", "1" },
616 { "usb_printer", "1" },
617 { "usb_printer_bidirect", "0" },
618 { "usb_ext_opt", "" },
619 { "usb_fat_opt", "" },
620 { "usb_ntfs_opt", "" },
621 { "usb_fs_ext3", "1" },
622 { "usb_fs_fat", "1" },
623 #ifdef TCONFIG_NTFS
624 { "usb_fs_ntfs", "1" },
625 #endif
626 { "usb_automount", "1" },
627 #if 0
628 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
629 #endif
630 { "script_usbhotplug", "" },
631 { "script_usbmount", "" },
632 { "script_usbumount", "" },
633 #endif
635 #ifdef TCONFIG_FTP
636 // nas-ftp - !!TB
637 { "ftp_enable", "0" },
638 { "ftp_super", "0" },
639 { "ftp_anonymous", "0" },
640 { "ftp_dirlist", "0" },
641 { "ftp_port", "21" },
642 { "ftp_max", "0" },
643 { "ftp_ipmax", "0" },
644 { "ftp_staytimeout", "300" },
645 { "ftp_rate", "0" },
646 { "ftp_anonrate", "0" },
647 { "ftp_anonroot", "" },
648 { "ftp_pubroot", "" },
649 { "ftp_pvtroot", "" },
650 { "ftp_users", "" },
651 { "ftp_custom", "" },
652 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
653 { "ftp_limit", "0,3,60" },
654 { "log_ftp", "0" },
655 #endif
657 #ifdef TCONFIG_SAMBASRV
658 // nas-samba - !!TB
659 { "smbd_enable", "0" },
660 { "smbd_wgroup", "WORKGROUP" },
661 { "smbd_master", "1" },
662 { "smbd_wins", "1" },
663 { "smbd_cpage", "" },
664 { "smbd_cset", "utf8" },
665 { "smbd_custom", "" },
666 { "smbd_autoshare", "2" },
667 { "smbd_shares",
668 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
670 { "smbd_user", "nas" },
671 { "smbd_passwd", "" },
672 #endif
674 #ifdef TCONFIG_MEDIA_SERVER
675 // nas-media
676 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
677 { "ms_dirs", "/mnt<" },
678 { "ms_port", "0" },
679 { "ms_dbdir", "" },
680 { "ms_tivo", "0" },
681 { "ms_stdlna", "0" },
682 { "ms_sas", "0" },
683 #endif
685 // admin-sch
686 { "sch_rboot", "" },
687 { "sch_rcon", "" },
688 { "sch_c1", "" },
689 { "sch_c2", "" },
690 { "sch_c3", "" },
691 { "sch_c1_cmd", "" },
692 { "sch_c2_cmd", "" },
693 { "sch_c3_cmd", "" },
695 // admin-script
696 { "script_init", "" },
697 { "script_shut", "" },
698 { "script_fire", "#Restrict number of TCP connections per user #iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP #Restrict number of non-TCP connections per user #iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP #Restrict number of simltaneous SMTP connections (from mailer viruses) #iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP" },
699 { "script_wanup", "" },
701 #ifdef TCONFIG_OPENVPN
702 // vpn
703 { "vpn_debug", "0" },
704 { "vpn_server_eas", "" },
705 { "vpn_server_dns", "" },
706 { "vpn_server1_poll", "0" },
707 { "vpn_server1_if", "tun" },
708 { "vpn_server1_proto", "udp" },
709 { "vpn_server1_port", "1194" },
710 { "vpn_server1_firewall", "auto" },
711 { "vpn_server1_crypt", "tls" },
712 { "vpn_server1_comp", "adaptive" },
713 { "vpn_server1_cipher", "default" },
714 { "vpn_server1_dhcp", "1" },
715 { "vpn_server1_r1", "192.168.1.50" },
716 { "vpn_server1_r2", "192.168.1.55" },
717 { "vpn_server1_sn", "10.8.0.0" },
718 { "vpn_server1_nm", "255.255.255.0" },
719 { "vpn_server1_local", "10.8.0.1" },
720 { "vpn_server1_remote", "10.8.0.2" },
721 { "vpn_server1_reneg", "-1" },
722 { "vpn_server1_hmac", "-1" },
723 { "vpn_server1_plan", "1" },
724 { "vpn_server1_ccd", "0" },
725 { "vpn_server1_c2c", "0" },
726 { "vpn_server1_ccd_excl", "0" },
727 { "vpn_server1_ccd_val", "" },
728 { "vpn_server1_pdns", "0" },
729 { "vpn_server1_rgw", "0" },
730 { "vpn_server1_custom", "" },
731 { "vpn_server1_static", "" },
732 { "vpn_server1_ca", "" },
733 { "vpn_server1_crt", "" },
734 { "vpn_server1_key", "" },
735 { "vpn_server1_dh", "" },
736 { "vpn_server2_poll", "0" },
737 { "vpn_server2_if", "tun" },
738 { "vpn_server2_proto", "udp" },
739 { "vpn_server2_port", "1194" },
740 { "vpn_server2_firewall", "auto" },
741 { "vpn_server2_crypt", "tls" },
742 { "vpn_server2_comp", "adaptive" },
743 { "vpn_server2_cipher", "default" },
744 { "vpn_server2_dhcp", "1" },
745 { "vpn_server2_r1", "192.168.1.50" },
746 { "vpn_server2_r2", "192.168.1.55" },
747 { "vpn_server2_sn", "10.8.0.0" },
748 { "vpn_server2_nm", "255.255.255.0" },
749 { "vpn_server2_local", "10.8.0.1" },
750 { "vpn_server2_remote", "10.8.0.2" },
751 { "vpn_server2_reneg", "-1" },
752 { "vpn_server2_hmac", "-1" },
753 { "vpn_server2_plan", "1" },
754 { "vpn_server2_ccd", "0" },
755 { "vpn_server2_c2c", "0" },
756 { "vpn_server2_ccd_excl", "0" },
757 { "vpn_server2_ccd_val", "" },
758 { "vpn_server2_pdns", "0" },
759 { "vpn_server2_rgw", "0" },
760 { "vpn_server2_custom", "" },
761 { "vpn_server2_static", "" },
762 { "vpn_server2_ca", "" },
763 { "vpn_server2_crt", "" },
764 { "vpn_server2_key", "" },
765 { "vpn_server2_dh", "" },
766 { "vpn_client_eas", "" },
767 { "vpn_client1_poll", "0" },
768 { "vpn_client1_if", "tun" },
769 { "vpn_client1_bridge", "1" },
770 { "vpn_client1_nat", "1" },
771 { "vpn_client1_proto", "udp" },
772 { "vpn_client1_addr", "" },
773 { "vpn_client1_port", "1194" },
774 { "vpn_client1_retry", "30" },
775 { "vpn_client1_rg", "0" },
776 { "vpn_client1_firewall", "auto" },
777 { "vpn_client1_crypt", "tls" },
778 { "vpn_client1_comp", "adaptive" },
779 { "vpn_client1_cipher", "default" },
780 { "vpn_client1_local", "10.8.0.2" },
781 { "vpn_client1_remote", "10.8.0.1" },
782 { "vpn_client1_nm", "255.255.255.0" },
783 { "vpn_client1_reneg", "-1" },
784 { "vpn_client1_hmac", "-1" },
785 { "vpn_client1_adns", "0" },
786 { "vpn_client1_rgw", "0" },
787 { "vpn_client1_gw", "" },
788 { "vpn_client1_custom", "" },
789 { "vpn_client1_static", "" },
790 { "vpn_client1_ca", "" },
791 { "vpn_client1_crt", "" },
792 { "vpn_client1_key", "" },
793 { "vpn_client2_poll", "0" },
794 { "vpn_client2_if", "tun" },
795 { "vpn_client2_bridge", "1" },
796 { "vpn_client2_nat", "1" },
797 { "vpn_client2_proto", "udp" },
798 { "vpn_client2_addr", "" },
799 { "vpn_client2_port", "1194" },
800 { "vpn_client2_retry", "30" },
801 { "vpn_client2_rg", "0" },
802 { "vpn_client2_firewall", "auto" },
803 { "vpn_client2_crypt", "tls" },
804 { "vpn_client2_comp", "adaptive" },
805 { "vpn_client2_cipher", "default" },
806 { "vpn_client2_local", "10.8.0.2" },
807 { "vpn_client2_remote", "10.8.0.1" },
808 { "vpn_client2_nm", "255.255.255.0" },
809 { "vpn_client2_reneg", "-1" },
810 { "vpn_client2_hmac", "-1" },
811 { "vpn_client2_adns", "0" },
812 { "vpn_client2_rgw", "0" },
813 { "vpn_client2_gw", "" },
814 { "vpn_client2_custom", "" },
815 { "vpn_client2_static", "" },
816 { "vpn_client2_ca", "" },
817 { "vpn_client2_crt", "" },
818 { "vpn_client2_key", "" },
819 #endif // vpn
821 #if 0
822 // safe to remove?
823 { "QoS", "0" },
825 { "ses_enable", "0" }, // enable ses
826 { "ses_event", "2" }, // initial ses event
827 { "ses_led_assertlvl", "0" }, // For SES II
828 { "ses_client_join", "0" }, // For SES II
829 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
830 { "ses_count", "0" },
831 { "eou_configured", "0" },
833 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
834 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
835 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
836 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
837 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
838 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
839 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
840 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
841 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
842 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
843 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
844 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
846 //obs zzz { "http_method", "post" }, // HTTP method
848 // { "wl_macmode1", "disabled" },
850 /* obsolete
851 { "filter", "on" }, // Firewall Protection [on|off]
852 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
853 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
854 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
855 { "block_cookie", "0" }, // Block Cookie [1|0]
856 { "ident_pass", "0" }, // IDENT passthrough [1|0]
857 { "block_proxy", "0" }, // Block Proxy [1|0]
860 /* --- obsolete ---
861 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
862 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
864 // for mac clone
865 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
866 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
868 { "public_ip", "" }, // public ip
871 //forced in rc.c { "os_name", "" }, // OS name string
872 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
873 //forced in rc.c { "os_date", __DATE__ }, // OS date
874 //not used { "ct_modules", "" }, // CyberTAN kernel modules
875 //obs { "timer_interval", "3600" }, // Timer interval in seconds
876 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
877 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
878 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
879 //obs { "os_server", "" }, // URL for getting upgrades
880 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
881 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
882 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
883 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
884 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
885 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
886 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
887 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
888 //{ "eou_device_id", "" },
889 //{ "eou_public_key", "" },
890 //{ "eou_private_key", "" },
891 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
892 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
893 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
894 // { "ntp_enable", "1" }, // replaced with ntp_updates
895 // { "ntp_mode", "auto" }, // auto, manual
898 // for AOL
899 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
900 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
901 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
902 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
903 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
905 // advanced-watchdog
906 { "wd_en", "" },
907 { "wd_atp0", "" },
908 { "wd_atp1", "" },
909 { "wd_atp2", "" },
910 { "wd_atp3", "" },
911 { "wd_atp4", "" },
912 { "wd_mxr", "3" },
913 { "wd_rdy", "15" },
914 { "wd_cki", "300" },
915 { "wd_fdm", "" },
916 { "wd_aof", "" },
918 #endif // 0
920 // arpbind
921 { "arpbind_enable", "0" },
922 { "arpbind_only", "0" },
923 { "arpbind_list", "" },
925 // NoCatSplash. !!Victek
926 #ifdef TCONFIG_NOCAT
927 { "NC_enable", "0" }, // enable NoCatSplash
928 { "NC_Verbosity", "0" }, // logging too verbose on startup!
929 { "NC_GatewayName", "WWW Portal" },
930 { "NC_GatewayPort", "5280" },
931 { "NC_GatewayMode", "Open" },
932 { "NC_DocumentRoot", "/tmp/splashd" },
933 { "NC_ExcludePorts", "1863" },
934 { "NC_HomePage", "" },
935 { "NC_ForcedRedirect", "0" },
936 { "NC_IdleTimeout", "0" },
937 { "NC_MaxMissedARP", "5" },
938 { "NC_PeerChecktimeout", "0" },
939 { "NC_LoginTimeout", "86400" },
940 { "NC_RenewTimeout", "0" },
941 { "NC_AllowedWebHosts", "" },
942 #endif
943 { NULL, NULL}
947 const defaults_t if_generic[] = {
948 { "lan_ifname", "br0" },
949 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
950 { "wan_ifname", "eth1" },
951 { "wan_ifnames", "eth1" },
952 { NULL, NULL }
955 const defaults_t if_vlan[] = {
956 { "lan_ifname", "br0" },
957 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
958 { "wan_ifname", "vlan1" },
959 { "wan_ifnames", "vlan1" },
960 { NULL, NULL }