Added setting for WME APSD mode
[tomato.git] / release / src / router / nvram / defaults.c
blob61d846ea99a39093df7e95117e7ed74f4d9361e8
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include "tomato_profile.h"
36 #include "defaults.h"
38 //! = see restore_main()
40 const defaults_t defaults[] = {
41 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
43 // LAN H/W parameters
44 //! { "lan_ifname", "" }, // LAN interface name
45 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
46 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
47 { "lan_hwaddr", "" }, // LAN interface MAC address
49 // LAN TCP/IP parameters
50 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
51 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //Barry add 2004 09 16
52 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
53 { "lan_netmask", "255.255.255.0" }, // LAN netmask
54 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
55 { "lan_domain", "" }, // LAN domain name
56 { "lan_lease", "86400" }, // LAN lease time in seconds
57 { "lan_stp", "0" }, // LAN spanning tree protocol
58 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
60 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
61 { "wds_enable", "0" }, // WDS Enable (0|1)
63 // WAN H/W parameters
64 //! { "wan_ifname", "" }, // WAN interface name
65 //! { "wan_ifnames", "" }, // WAN interface names
66 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
67 { "wan_hwaddr", "" }, // WAN interface MAC address
68 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
70 // WAN TCP/IP parameters
71 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
72 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
73 { "wan_netmask", "0.0.0.0" }, // WAN netmask
74 { "wan_gateway", "0.0.0.0" }, // WAN gateway
75 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
76 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
77 { "wan_lease", "86400" }, // WAN lease time in seconds
78 { "wan_islan", "0" },
80 { "wan_primary", "1" }, // Primary wan connection
81 { "wan_unit", "0" }, // Last configured connection
83 // Filters
84 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
85 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
86 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
88 { "filter", "on" }, // [on | off] Firewall Protection
90 // Port forwards
91 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
93 // DHCP server parameters
94 { "dhcp_start", "100" }, //
95 { "dhcp_num", "50" }, //
96 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
97 { "dhcpd_endip", "" }, // "
98 { "dhcp_lease", "0" }, // LAN lease time in minutes
99 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
100 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
103 // PPPoE parameters
104 { "pppoe_ifname", "" }, // PPPoE enslaved interface
105 { "ppp_username", "" }, // PPP username
106 { "ppp_passwd", "" }, // PPP password
107 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
108 { "ppp_keepalive", "0" }, // Restore link automatically
109 { "ppp_demand", "0" }, // Dial on demand
110 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
111 { "ppp_mru", "1500" }, // Negotiate MRU to this value
112 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
113 { "ppp_service", "" }, // PPPoE service name
114 { "ppp_ac", "" }, // PPPoE access concentrator name
115 { "ppp_static", "0" }, // Enable / Disable Static IP
116 { "ppp_static_ip", "" }, // PPPoE Static IP
117 { "ppp_get_ac", "" }, // PPPoE Server ac name
118 { "ppp_get_srv", "" }, // PPPoE Server service name
120 { "pppoe_lei", "" },
121 { "pppoe_lef", "" },
123 // Wireless parameters
124 { "wl_ifname", "" }, // Interface name
125 { "wl_hwaddr", "" }, // MAC address
126 { "wl_phytype", "g" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
127 { "wl_corerev", "" }, // Current core revision
128 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
129 { "wl_radioids", "" }, // List of radio IDs
130 { "wl_ssid", "wireless" }, // Service set ID (network name)
131 { "wl_country", "JP" }, // Country (default obtained from driver)
132 { "wl_country_code", "JP" }, // !!TB - Country (default to JP to allow all 14 channels)
133 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
134 { "wl_closed", "0" }, // Closed (hidden) network
135 { "wl_ap_isolate", "0" }, // AP isolate mode
136 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
137 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
138 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
139 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
140 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
141 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
142 { "wl_key", "1" }, // Current WEP key
143 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
144 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
145 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
146 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
147 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
148 { "wl_channel", "6" }, // Channel number
149 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
150 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
151 { "wl_rateset", "default" }, // "default" or "all" or "12"
152 { "wl_frag", "2346" }, // Fragmentation threshold
153 { "wl_rts", "2347" }, // RTS threshold
154 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
155 { "wl_bcn", "100" }, // Beacon interval
156 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
157 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
158 { "wl_gmode", "1" }, // 54g mode
159 { "wl_gmode_protection","off" }, // 802.11g RTS/CTS protection (off|auto)
160 { "wl_afterburner", "off" }, // AfterBurner
161 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
162 { "wl_wme", "off" }, // WME mode (off|on)
163 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
164 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
165 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
166 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
168 { "wl_passphrase", "" }, // Passphrase // Add
169 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
170 { "wl_wep_buf", "" }, // save all settings for web // Add
171 { "wl_wep_gen", "" }, // save all settings for generate button // Add
172 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
173 { "wl_active_mac", "" }, // xx:xx:xx:xx:xx:xx ... // Add
175 // WPA parameters
176 { "security_mode2", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
177 { "security_mode", "disabled" }, // WPA mode (disabled|radius|wpa|psk|wep|psk psk2|wpa wpa2) for WEB // Add
178 { "security_mode_last", "" }, // Save last WPA mode // Add
179 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
180 { "wl_wpa_psk", "" }, // WPA pre-shared key
181 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
182 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
183 { "wl_radius_key", "" }, // RADIUS shared secret
184 { "wl_radius_port", "1812" }, // RADIUS server UDP port
185 { "wl_crypto", "tkip" }, // WPA data encryption
186 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
187 { "wl_akm", "" }, // WPA akm list
189 // WME parameters
190 // EDCA parameters for STA
191 { "wl_wme_sta_bk", "15 1023 7 0 0 off" }, // WME STA AC_BK paramters
192 { "wl_wme_sta_be", "15 1023 3 0 0 off" }, // WME STA AC_BE paramters
193 { "wl_wme_sta_vi", "7 15 2 6016 3008 off" }, // WME STA AC_VI paramters
194 { "wl_wme_sta_vo", "3 7 2 3264 1504 off" }, // WME STA AC_VO paramters
196 // EDCA parameters for AP
197 { "wl_wme_ap_bk", "15 1023 7 0 0 off" }, // WME AP AC_BK paramters
198 { "wl_wme_ap_be", "15 63 3 0 0 off" }, // WME AP AC_BE paramters
199 { "wl_wme_ap_vi", "7 15 1 6016 3008 off" }, // WME AP AC_VI paramters
200 { "wl_wme_ap_vo", "3 7 1 3264 1504 off" }, // WME AP AC_VO paramters
202 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
203 { "wl_wme_apsd", "on" }, // WME APSD mode
205 { "wl_unit", "0" }, // Last configured interface
206 { "wl_mac_deny", "" }, // filter MAC // Add
208 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
209 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
210 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
212 { "pptp_server_ip", "" }, // as same as WAN gateway
213 { "pptp_get_ip", "" }, // IP Address assigned by PPTP server
215 // for firewall
216 { "mtu_enable", "0" }, // WAN MTU [1|0]
217 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
219 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
220 { "l2tp_get_ip", "" }, // IP Address assigned by L2TP server
221 { "wan_gateway_buf", "0.0.0.0" }, // save the default gateway for DHCP
222 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
223 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
225 // misc
226 { "t_noise", "-99" },
227 { "led_override", "" },
228 { "btn_override", "" },
229 { "btn_reset", "" },
230 { "env_path", "" },
231 { "manual_boot_nv", "0" },
232 { "wlx_hpamp", "" },
233 // { "wlx_hperx", "" }, // see init.c
234 { "t_fix1", "" },
236 // basic-ddns
237 { "ddnsx0", "" },
238 { "ddnsx1", "" },
239 { "ddnsx0_cache", "" },
240 { "ddnsx1_cache", "" },
241 { "ddnsx_save", "1" },
242 { "ddnsx_refresh", "28" },
244 // basic-network
245 { "wds_save", "" },
247 // basic-ident
248 { "router_name", "tomato" },
249 { "wan_hostname", "unknown" },
250 { "wan_domain", "" },
252 // basic-time
253 { "tm_sel", "PST8PDT,M3.2.0/2,M11.1.0/2" },
254 { "tm_tz", "PST8PDT,M3.2.0/2,M11.1.0/2" },
255 { "tm_dst", "1", },
256 { "ntp_updates", "4" },
257 { "ntp_tdod", "0" },
258 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
259 { "ntp_kiss", "" },
260 { "ntp_kiss_ignore", "" },
262 // basic-static
263 { "dhcpd_static", "" },
265 // basic-wfilter
266 { "wl_mac_list", "" },
267 { "wl_macmode", "disabled" },
268 { "macnames", "" },
270 // advanced-ctnf
271 { "ct_tcp_timeout", "" },
272 { "ct_udp_timeout", "" },
273 { "ct_max", "" },
274 { "nf_ttl", "0" },
275 { "nf_l7in", "1" },
276 { "nf_rtsp", "1" },
277 { "nf_pptp", "1" },
278 { "nf_h323", "1" },
279 { "nf_ftp", "1" },
281 // advanced-mac
282 { "mac_wan", "" },
283 { "mac_wl", "" },
285 // advanced-misc
286 { "boot_wait", "on" },
287 { "wait_time", "5" },
288 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
290 // advanced-dhcpdns
291 { "dhcpd_dmdns", "1" },
292 { "dhcpd_slt", "0" },
293 { "dhcpd_gwmode", "" },
294 { "dhcpd_lmax", "" },
295 { "dns_addget", "0" },
296 { "dns_intcpt", "0" },
297 { "dhcpc_minpkt", "0" },
298 { "dnsmasq_custom", "" },
299 // { "dnsmasq_norw", "0" },
301 // advanced-firewall
302 // { "block_loopback", "0" }, // nat loopback
303 { "nf_loopback", "1" },
304 { "block_wan", "1" }, // block inbound icmp
305 { "multicast_pass", "0" }, // enable multicast proxy
306 { "ne_syncookies", "0" }, // tcp_syncookies
307 { "ne_shlimit", "0,3,60" },
309 // advanced-routing
310 { "routes_static", "" },
311 { "wk_mode", "gateway" }, // Network mode [gateway|router]
312 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
313 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
314 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
315 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
316 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
318 // advanced-wireless
319 { "wl_txant", "3" },
320 { "wl_txpwr", "42" },
321 { "wl_maxassoc", "128" }, // Max associations driver could support
322 { "wl_distance", "" },
324 // forward-*
325 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
326 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
327 { "dmz_enable", "0" },
328 { "dmz_ipaddr", "0" },
329 { "dmz_sip", "" },
331 // forward-upnp
332 { "upnp_enable", "1" },
333 { "upnp_secure", "1" },
334 { "upnp_port", "5000" },
335 #if 0 // disabled for miniupnpd
336 { "upnp_ssdp_interval", "60" }, // SSDP interval
337 { "upnp_max_age", "180" }, // Max age
338 { "upnp_mnp", "0" },
339 { "upnp_config", "0" },
340 #endif
342 // qos
343 { "qos_enable", "0" },
344 { "qos_ack", "1" },
345 { "qos_syn", "0" },
346 { "qos_fin", "0" },
347 { "qos_rst", "0" },
348 { "qos_icmp", "0" },
349 { "qos_reset", "0" },
350 { "qos_obw", "230" },
351 { "qos_ibw", "1000" },
352 { "qos_orules", "0<<6<d<80,443<0<<0:512<1<WWW>0<<6<d<80,443<0<<512:<3<WWW (512K+)>0<<-1<d<53<0<<0:2<0<DNS>0<<-1<d<53<0<<2:<4<DNS (2K+)>0<<-1<d<1024:65535<0<<<4<Bulk Traffic" },
353 { "qos_burst0", "" },
354 { "qos_burst1", "" },
356 { "qos_default", "3" },
357 { "qos_orates", "80-100,10-100,5-100,3-100,2-95,1-50,1-40,1-30,1-20,1-10" },
359 { "ne_vegas", "0" }, // TCP Vegas
360 { "ne_valpha", "2" }, // "
361 { "ne_vbeta", "6" }, // "
362 { "ne_vgamma", "2" }, // "
364 // access restrictions
365 { "rruleN", "0" },
366 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
367 //* { "rrule##", "" },
368 { "rrulewp", "80,8080" },
370 #if TOMATO_SL
371 // samba
372 { "smbd_on", "0" },
373 { "nmbd_on", "0" },
374 { "smbd_wgroup", "WORKGROUP" },
375 { "smbd_nbname", "TOMATO" },
376 { "smbd_adminpass", "admin" },
377 #endif
379 // admin-access
380 { "http_username", "" }, // Username
381 { "http_passwd", "admin" }, // Password
382 { "remote_management", "0" }, // Remote Management [1|0]
383 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
384 { "http_wanport", "8080" }, // WAN port to listen on
385 { "http_lanport", "80" }, // LAN port to listen on
386 { "https_lanport", "443" }, // LAN port to listen on
387 { "http_enable", "1" }, // HTTP server enable/disable
388 { "https_enable", "0" }, // HTTPS server enable/disable
389 { "https_crt_save", "0" },
390 { "https_crt_cn", "" },
391 { "https_crt_file", "" },
392 { "https_crt", "" },
393 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
394 { "web_css", "tomato" },
395 { "web_svg", "1" },
396 { "telnetd_eas", "1" },
397 { "telnetd_port", "23" },
398 { "sshd_eas", "0" },
399 { "sshd_pass", "1" },
400 { "sshd_port", "22" },
401 { "sshd_remote", "0" },
402 { "sshd_rport", "2222" },
403 { "sshd_authkeys", "" },
404 { "sshd_hostkey", "" },
405 { "sshd_forwarding", "1" },
406 { "rmgt_sip", "" }, // remote management: source ip address
408 { "http_id", "" },
409 { "web_mx", "" },
410 { "web_pb", "" },
412 // admin-bwm
413 { "rstats_enable", "1" },
414 { "rstats_path", "" },
415 { "rstats_stime", "48" },
416 { "rstats_offset", "1" },
417 { "rstats_data", "" },
418 { "rstats_colors", "" },
419 { "rstats_exclude", "" },
420 { "rstats_sshut", "1" },
421 { "rstats_bak", "0" },
423 // advanced-buttons
424 { "sesx_led", "0" },
425 { "sesx_b0", "1" },
426 { "sesx_b1", "4" },
427 { "sesx_b2", "4" },
428 { "sesx_b3", "4" },
429 { "sesx_script",
430 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
432 { "script_brau",
433 "if [ ! -e /tmp/switch-start ]; then\n"
434 " # do something at startup\n"
435 " echo position at startup was $1 >/tmp/switch-start\n"
436 " exit\n"
437 "fi\n"
438 "if [ $1 = \"bridge\" ]; then\n"
439 " # do something\n"
440 " led bridge on\n"
441 "elif [ $1 = \"auto\" ]; then\n"
442 " # do something\n"
443 " led bridge off\n"
444 "fi\n"
447 // admin-log
448 { "log_remote", "0" },
449 { "log_remoteip", "" },
450 { "log_remoteport", "514" },
451 { "log_file", "1" },
452 { "log_limit", "60" },
453 { "log_in", "0" },
454 { "log_out", "0" },
455 { "log_mark", "60" },
456 { "log_events", "" },
458 // admin-debugging
459 { "debug_nocommit", "0" },
460 { "debug_cprintf", "0" },
461 { "debug_cprintf_file", "0" },
462 // { "debug_keepfiles", "0" },
463 { "console_loglevel", "1" },
464 { "t_cafree", "0" },
465 { "t_hidelr", "0" },
466 { "debug_clkfix", "1" },
467 { "debug_ddns", "0" },
469 // admin-cifs
470 { "cifs1", "" },
471 { "cifs2", "" },
473 // admin-jffs2
474 { "jffs2_on", "0" },
475 { "jffs2_exec", "" },
477 // admin-sch
478 { "sch_rboot", "" },
479 { "sch_rcon", "" },
480 { "sch_c1", "" },
481 { "sch_c2", "" },
482 { "sch_c3", "" },
483 { "sch_c1_cmd", "" },
484 { "sch_c2_cmd", "" },
485 { "sch_c3_cmd", "" },
487 // admin-script
488 { "script_init", "" },
489 { "script_shut", "" },
490 { "script_fire", "" },
491 { "script_wanup", "" },
493 #if 0
494 // safe to remove?
495 { "QoS", "0" },
497 { "ses_enable", "0" }, // enable ses
498 { "ses_event", "2" }, // initial ses event
499 { "ses_led_assertlvl", "0" }, // For SES II
500 { "ses_client_join", "0" }, // For SES II
501 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
502 { "ses_count", "0" },
503 { "eou_configured", "0" },
505 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
506 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
507 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
508 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
509 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
510 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
511 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
512 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
513 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
514 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
515 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
516 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
518 //obs zzz { "http_method", "post" }, // HTTP method
520 // { "wl_macmode1", "disabled" },
522 /* obsolete
523 { "filter", "on" }, // Firewall Protection [on|off]
524 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
525 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
526 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
527 { "block_cookie", "0" }, // Block Cookie [1|0]
528 { "ident_pass", "0" }, // IDENT passthrough [1|0]
529 { "block_proxy", "0" }, // Block Proxy [1|0]
532 /* --- obsolete ---
533 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
534 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
536 // for mac clone
537 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
538 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
540 { "public_ip", "" }, // public ip
543 //forced in rc.c { "os_name", "" }, // OS name string
544 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
545 //forced in rc.c { "os_date", __DATE__ }, // OS date
546 //not used { "ct_modules", "" }, // CyberTAN kernel modules
547 //obs { "timer_interval", "3600" }, // Timer interval in seconds
548 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
549 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
550 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
551 //obs { "os_server", "" }, // URL for getting upgrades
552 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
553 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
554 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
555 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
556 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
557 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
558 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
559 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
560 //{ "eou_device_id", "" },
561 //{ "eou_public_key", "" },
562 //{ "eou_private_key", "" },
563 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
564 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
565 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
566 // { "ntp_enable", "1" }, // replaced with ntp_updates
567 // { "ntp_mode", "auto" }, // auto, manual
570 // for AOL
571 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
572 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
573 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
574 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
575 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
577 // advanced-watchdog
578 { "wd_en", "" },
579 { "wd_atp0", "" },
580 { "wd_atp1", "" },
581 { "wd_atp2", "" },
582 { "wd_atp3", "" },
583 { "wd_atp4", "" },
584 { "wd_mxr", "3" },
585 { "wd_rdy", "15" },
586 { "wd_cki", "300" },
587 { "wd_fdm", "" },
588 { "wd_aof", "" },
590 #endif // 0
592 { NULL, NULL }
595 const defaults_t if_generic[] = {
596 { "lan_ifname", "br0" },
597 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
598 { "wan_ifname", "eth1" },
599 { "wan_ifnames", "eth1" },
600 { NULL, NULL }
603 const defaults_t if_vlan[] = {
604 { "lan_ifname", "br0" },
605 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
606 { "wan_ifname", "vlan1" },
607 { "wan_ifnames", "vlan1" },
608 { NULL, NULL }