Merge branch 'tomato-RT' into Toastman-RT
[tomato.git] / release / src / router / nvram / defaults.c
blob076f0e74dd2a365254a466a214f91bae1b8bc9ec
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 // { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //start with no dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
64 // WAN H/W parameters
65 //! { "wan_ifname", "" }, // WAN interface name
66 //! { "wan_ifnames", "" }, // WAN interface names
67 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
68 { "wan_hwaddr", "" }, // WAN interface MAC address
69 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
71 // WAN TCP/IP parameters
72 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
73 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
74 { "wan_netmask", "0.0.0.0" }, // WAN netmask
75 { "wan_gateway", "0.0.0.0" }, // WAN gateway
76 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
77 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
78 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
79 { "wan_lease", "86400" }, // WAN lease time in seconds
80 { "wan_islan", "0" },
82 { "wan_primary", "1" }, // Primary wan connection
83 { "wan_unit", "0" }, // Last configured connection
84 /* --- obsolete ---
85 // Filters
86 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
87 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
88 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
90 { "filter", "on" }, // [on | off] Firewall Protection
92 // Port forwards
93 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
95 // DHCP server parameters
96 { "dhcp_start", "100" }, //
97 { "dhcp_num", "50" }, //
98 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
99 { "dhcpd_endip", "" }, // "
100 { "dhcp_lease", "0" }, // LAN lease time in minutes
101 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
102 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
103 { "wan_routes", "" },
104 { "wan_msroutes", "" },
107 // PPPoE parameters
108 { "pppoe_ifname", "" }, // PPPoE enslaved interface
109 { "ppp_username", "" }, // PPP username
110 { "ppp_passwd", "" }, // PPP password
111 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
112 { "ppp_keepalive", "0" }, // Restore link automatically
113 { "ppp_demand", "0" }, // Dial on demand
114 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
115 { "ppp_mru", "1500" }, // Negotiate MRU to this value
116 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
117 { "ppp_service", "" }, // PPPoE service name
118 { "ppp_ac", "" }, // PPPoE access concentrator name
119 { "ppp_static", "0" }, // Enable / Disable Static IP
120 { "ppp_static_ip", "" }, // PPPoE Static IP
121 { "ppp_get_ac", "" }, // PPPoE Server ac name
122 { "ppp_get_srv", "" }, // PPPoE Server service name
123 { "ppp_custom", "" }, // PPPD additional options
124 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
126 { "pppoe_lei", "" },
127 { "pppoe_lef", "" },
129 #ifdef TCONFIG_IPV6
130 // IPv6 parameters
131 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
132 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
133 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
134 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
135 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
136 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
137 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
138 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
139 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
140 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
141 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
142 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
143 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
144 { "ipv6_dns", "" }, // DNS server(s) IPs
145 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
146 #endif
148 // Wireless parameters
149 { "wl_ifname", "" }, // Interface name
150 { "wl_hwaddr", "" }, // MAC address
151 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
152 { "wl_corerev", "" }, // Current core revision
153 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
154 { "wl_radioids", "" }, // List of radio IDs
155 { "wl_ssid", "wireless" }, // Service set ID (network name)
156 { "wl1_ssid", "wireless1" },
157 { "wl_country_code", "US" }, // Country (default obtained from driver)
158 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
159 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
160 { "wl_closed", "0" }, // Closed (hidden) network
161 { "wl_ap_isolate", "0" }, // AP isolate mode
162 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
163 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
164 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
165 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
166 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
167 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
168 { "wl_key", "1" }, // Current WEP key
169 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
170 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
171 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
172 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
173 { "wl_channel", "1" }, // Channel number
174 { "wl1_channel", "0" },
175 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
176 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
177 { "wl_rateset", "default" }, // "default" or "all" or "12"
178 { "wl_frag", "2346" }, // Fragmentation threshold
179 { "wl_rts", "2347" }, // RTS threshold
180 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
181 { "wl_bcn", "100" }, // Beacon interval
182 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
183 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
184 { "wl_gmode", "1" }, // 54g mode
185 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
186 { "wl_afterburner", "off" }, // AfterBurner
187 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
188 { "wl_wme", "auto" }, // WME mode (auto|off|on)
189 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
190 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
191 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
192 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
193 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
194 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3|4) //Toastman - 0=off
195 { "wl_passphrase", "" }, // Passphrase // Add
196 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
197 { "wl_wep_buf", "" }, // save all settings for web // Add
198 { "wl_wep_gen", "" }, // save all settings for generate button // Add
199 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
201 // WPA parameters
202 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
203 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
204 { "wl_wpa_psk", "" }, // WPA pre-shared key
205 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
206 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
207 { "wl_radius_key", "" }, // RADIUS shared secret
208 { "wl_radius_port", "1812" }, // RADIUS server UDP port
209 { "wl_crypto", "aes" }, // WPA data encryption
210 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
211 { "wl_akm", "" }, // WPA akm list
213 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
214 // EDCA parameters for STA
215 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
216 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
217 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
218 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
220 // EDCA parameters for AP
221 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
222 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
223 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
224 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
226 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
227 { "wl_wme_apsd", "off" }, // WME APSD mode
228 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
230 /* Per AC Tx parameters */
231 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
232 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
233 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
234 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
236 { "wl_unit", "0" }, // Last configured interface
237 { "wl_mac_deny", "" }, // filter MAC // Add
239 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
240 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
241 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
243 // !!TB: n-mode
244 { "wl_nmode", "-1" }, // N-mode
245 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
246 { "wl1_nband", "1" },
247 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
248 { "wl_nreqd", "0" }, // Require 802.11n support
249 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
250 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
251 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
252 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
253 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
254 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
255 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
256 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
257 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
258 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
259 { "wl_bcn_rotate", "1" }, // Beacon rotation
260 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
261 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
263 #ifdef TCONFIG_EMF
264 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
265 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
266 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
267 { "emf_enable", "0" }, // Disable EMF by default
268 #endif
269 #ifdef CONFIG_BCMWL5
270 // AMPDU
271 { "wl_ampdu", "auto" }, // Default AMPDU setting
272 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
273 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
274 { "wl_amsdu", "auto" }, // Default AMSDU setting
275 // power save
276 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
277 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
278 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
279 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
280 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
281 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
282 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
283 // misc
284 { "wl_wmf_bss_enable", "0" }, // WMF Enable/Disable
285 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
286 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
287 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
288 #endif
290 { "pptp_server_ip", "" }, // as same as WAN gateway
291 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
292 { "pptp_dhcp", "1" },
294 // for firewall
295 { "mtu_enable", "0" }, // WAN MTU [1|0]
296 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
298 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
299 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
300 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
302 // misc
303 { "wl_tnoise", "-99" },
304 { "led_override", "" },
305 { "btn_override", "" },
306 { "btn_reset", "" },
307 { "env_path", "" },
308 { "manual_boot_nv", "0" },
309 // { "wlx_hpamp", "" },
310 // { "wlx_hperx", "" }, // see init.c
311 { "t_fix1", "" },
313 // basic-ddns
314 { "ddnsx0", "" },
315 { "ddnsx1", "" },
316 { "ddnsx0_cache", "" },
317 { "ddnsx1_cache", "" },
318 { "ddnsx_save", "1" },
319 { "ddnsx_refresh", "28" },
321 // basic-ident
322 { "router_name", "toast" },
323 { "wan_hostname", "unknown" },
324 { "wan_domain", "" },
326 // basic-time
327 { "tm_sel", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
328 { "tm_tz", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
329 { "tm_dst", "1", },
330 { "ntp_updates", "4" },
331 { "ntp_tdod", "0" },
332 { "ntp_server", "0.europe.pool.ntp.org 1.europe.pool.ntp.org 2.europe.pool.ntp.org" },
333 { "ntp_kiss", "" },
334 { "ntp_kiss_ignore", "" },
336 // basic-static
337 { "dhcpd_static", "" },
339 // basic-wfilter
340 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
341 { "wl_macmode", "disabled" },
342 { "macnames", "" },
344 // advanced-ctnf
345 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
346 { "ct_udp_timeout", "30 180" },
347 { "ct_timeout", "10 10" },
348 { "ct_max", "8192" },
349 { "nf_ttl", "0" },
350 { "nf_l7in", "1" },
351 #ifdef LINUX26
352 { "nf_sip", "1" },
353 { "ct_hashsize", "2048" },
354 #endif
355 #ifdef LINUX26
356 { "nf_rtsp", "0" },
357 #else
358 { "nf_rtsp", "1" },
359 #endif
360 { "nf_pptp", "1" },
361 { "nf_h323", "1" },
362 { "nf_ftp", "1" },
364 // advanced-mac
365 { "mac_wan", "" },
366 { "wl_macaddr", "" },
368 // advanced-misc
369 { "boot_wait", "on" },
370 { "wait_time", "5" },
371 { "clkfreq", "" },
372 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
373 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
374 { "jumbo_frame_size", "2000" },
375 #ifdef CONFIG_BCMWL5
376 { "ctf_disable", "1" },
377 #endif
379 // advanced-dhcpdns
380 { "dhcpd_dmdns", "1" },
381 { "dhcpd_slt", "0" },
382 { "dhcpd_gwmode", "" },
383 { "dhcpd_lmax", "" },
384 { "dns_addget", "0" },
385 { "dns_intcpt", "0" },
386 { "dhcpc_minpkt", "1" },
387 { "dhcpc_custom", "" },
388 { "dns_norebind", "1" },
389 { "dnsmasq_custom", "" },
390 // { "dnsmasq_norw", "0" },
392 // advanced-firewall
393 // { "block_loopback", "0" }, // nat loopback
394 { "nf_loopback", "0" },
395 { "block_wan", "1" }, // block inbound icmp
396 { "multicast_pass", "0" }, // enable multicast proxy
397 { "ne_syncookies", "0" }, // tcp_syncookies
398 { "dhcp_pass", "1" }, // allow DHCP responses
399 { "ne_shlimit", "0,3,60" },
401 // advanced-routing
402 { "routes_static", "" },
403 { "dhcp_routes", "1" },
404 { "wk_mode", "gateway" }, // Network mode [gateway|router]
405 #ifdef TCONFIG_ZEBRA
406 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
407 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
408 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
409 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
410 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
411 #endif
413 // advanced-wireless
414 { "wl_txant", "3" },
415 { "wl_txpwr", "42" },
416 { "wl_maxassoc", "128" }, // Max associations driver could support
417 { "wl_bss_maxassoc", "128" },
418 { "wl_distance", "" },
420 // forward-*
421 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
422 #ifdef TCONFIG_IPV6
423 { "ipv6_portforward", ""},
424 #endif
425 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
426 { "dmz_enable", "0" },
427 { "dmz_ipaddr", "0" },
428 { "dmz_sip", "" },
430 // forward-upnp
431 { "upnp_enable", "3" },
432 { "upnp_secure", "1" },
433 { "upnp_port", "0" },
434 { "upnp_ssdp_interval", "60" }, // SSDP interval
435 { "upnp_max_age", "180" }, // Max age
436 { "upnp_mnp", "0" },
437 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
438 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
439 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
440 #if 0 // disabled for miniupnpd
441 { "upnp_max_age", "180" }, // Max age
442 { "upnp_config", "0" },
443 #endif
445 // qos
446 { "qos_enable", "0" },
447 { "qos_ack", "0" },
448 { "qos_syn", "1" },
449 { "qos_fin", "1" },
450 { "qos_rst", "1" },
451 { "qos_icmp", "1" },
452 { "qos_reset", "1" },
453 { "qos_obw", "700" },
454 { "qos_ibw", "16000" },
455 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<-1<d<123<0<<0:10<<0<Network Time (NTP)>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<x<9<0<<<<0<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<0<RPC (Microsoft)>0<<6<x<23,992<0<<<<0<Telnet>0<<-1<d<22<0<<<<3<SSH>0<<17<x<3544<0<<<<3<Teredo port>0<<6<s<80,8080<0<<<<3<Remote Router Access>0<<6<x<3389<0<<<<3<Remote Assistance>0<<-1<a<<0<flash<<<2<Flash Video, (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video, (Youtube)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<s<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<6<x<6005<0<<<<2<Camfrog>0<<-1<d<1220,1234,5100,6005,6970<0<<<<-1<VLC>0<<-1<x<554,5004,5005<0<<<<2<RTP/RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<x<1935<0<<<<2<RTMP>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<d<1718:1720<0<<<<1<H323>0<<-1<a<<0<skypetoskype<<<1<Skype>0<<-1<a<<0<skypeout<<<1<Skypeout>0<<-1<d<80<0<<0:512<<4<HTTP>0<<-1<d<443<0<<0:512<<4<HTTPS>0<<6<d<8080<0<<0:512<<4<HTTP Proxy / Alternate>0<<-1<d<25,587,465<0<<<<5<SMTP, Submission>0<<-1<d<110,995<0<<<<5<POP3 Mail>0<<-1<d<119,563<0<<<<5<NNTP>0<<-1<d<143,220,585,993<0<<<<5<IMAP Mail>0<<-1<a<<0<irc<<<6<IRC>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<Yahoo Messenger>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<Other Chat Services>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<-1<x<6571,6891:6901<0<<<<7<WLM File/Webcam>0<<6<d<80,443,8080<0<<512:<<7<HTTP,SSL File Transfers>0<<17<x<1:65535<0<<<<-1<P2P (uTP, UDP)" },
456 { "qos_burst0", "" },
457 { "qos_burst1", "" },
458 { "qos_default", "8" },
459 { "qos_orates", "5-20,5-20,5-25,5-70,20-100,5-80,5-80,5-80,5-50,0-0" },
460 { "qos_irates", "10,60,60,70,0,60,60,80,30,1" },
461 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger Download P2P/Bulk Crawl" },
463 { "ne_vegas", "0" }, // TCP Vegas
464 { "ne_valpha", "3" }, // "
465 { "ne_vbeta", "3" }, // "
466 { "ne_vgamma", "2" }, // "
468 // qos-bw-limiter
469 { "qosl_enable", "0" },
470 // { "qosl_obw", "" }, unused - used qos_obw
471 // { "qosl_ibw", "" }, unused - used qos_obw
472 { "qosl_rules", "" },
473 { "qosl_denable", "0" },
474 { "qosl_dtcp", "0" },//unlimited
475 { "qosl_dudp", "0" },//unlimited
476 { "qosl_ddlc", "" },
477 { "qosl_dulc", "" },
478 { "qosl_ddlr", "" },
479 { "qosl_dulr", "" },
481 // access restrictions
482 { "rruleN", "0" },
483 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
484 //* { "rrule##", "" },
485 { "rrulewp", "80,8080" },
487 #if TOMATO_SL
488 // samba
489 { "smbd_on", "0" },
490 { "nmbd_on", "0" },
491 { "smbd_wgroup", "WORKGROUP" },
492 { "smbd_nbname", "TOMATO" },
493 { "smbd_adminpass", "admin" },
494 #endif
496 // admin-access
497 { "http_username", "" }, // Username
498 { "http_passwd", "admin" }, // Password
499 { "remote_management", "0" }, // Remote Management [1|0]
500 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
501 { "http_wanport", "8080" }, // WAN port to listen on
502 { "http_lanport", "80" }, // LAN port to listen on
503 { "https_lanport", "443" }, // LAN port to listen on
504 { "http_enable", "1" }, // HTTP server enable/disable
505 { "https_enable", "0" }, // HTTPS server enable/disable
506 { "https_crt_save", "0" },
507 { "https_crt_cn", "" },
508 { "https_crt_file", "" },
509 { "https_crt", "" },
510 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
511 { "web_favicon", "0" },
512 { "web_css", "brownlight" },
513 { "web_svg", "1" },
514 { "telnetd_eas", "1" },
515 { "telnetd_port", "23" },
516 { "sshd_eas", "0" },
517 { "sshd_pass", "1" },
518 { "sshd_port", "22" },
519 { "sshd_remote", "0" },
520 { "sshd_rport", "2222" },
521 { "sshd_authkeys", "" },
522 { "sshd_hostkey", "" },
523 { "sshd_dsskey", "" },
524 { "sshd_forwarding", "1" },
525 { "rmgt_sip", "" }, // remote management: source ip address
527 { "http_id", "" },
528 { "web_mx", "status,bwm" },
529 { "web_pb", "" },
531 // admin-bwm
532 { "rstats_enable", "1" },
533 { "rstats_path", "" },
534 { "rstats_stime", "48" },
535 { "rstats_offset", "1" },
536 { "rstats_data", "" },
537 { "rstats_colors", "" },
538 { "rstats_exclude", "" },
539 { "rstats_sshut", "1" },
540 { "rstats_bak", "0" },
542 // advanced-buttons
543 { "sesx_led", "0" },
544 { "sesx_b0", "1" },
545 { "sesx_b1", "4" },
546 { "sesx_b2", "4" },
547 { "sesx_b3", "4" },
548 { "sesx_script",
549 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
551 { "script_brau",
552 "if [ ! -e /tmp/switch-start ]; then\n"
553 " # do something at startup\n"
554 " echo position at startup was $1 >/tmp/switch-start\n"
555 " exit\n"
556 "fi\n"
557 "if [ $1 = \"bridge\" ]; then\n"
558 " # do something\n"
559 " led bridge on\n"
560 "elif [ $1 = \"auto\" ]; then\n"
561 " # do something\n"
562 " led bridge off\n"
563 "fi\n"
566 // admin-log
567 { "log_remote", "0" },
568 { "log_remoteip", "" },
569 { "log_remoteport", "514" },
570 { "log_file", "1" },
571 { "log_file_custom", "0" },
572 { "log_file_path", "/var/log/messages" },
573 { "log_limit", "60" },
574 { "log_in", "0" },
575 { "log_out", "0" },
576 { "log_mark", "60" },
577 { "log_events", "" },
579 // admin-log-webmonitor
580 { "log_wm", "0" },
581 { "log_wmtype", "0" },
582 { "log_wmip", "" },
583 { "log_wmdmax", "300" },
584 { "log_wmsmax", "300" },
586 // admin-debugging
587 { "debug_nocommit", "0" },
588 { "debug_cprintf", "0" },
589 { "debug_cprintf_file", "0" },
590 // { "debug_keepfiles", "0" },
591 { "console_loglevel", "1" },
592 { "t_cafree", "1" },
593 { "t_hidelr", "0" },
594 { "debug_clkfix", "1" },
595 { "debug_ddns", "0" },
597 // admin-cifs
598 { "cifs1", "" },
599 { "cifs2", "" },
601 // admin-jffs2
602 { "jffs2_on", "0" },
603 { "jffs2_exec", "" },
605 #ifdef TCONFIG_USB
606 // nas-usb - !!TB
607 { "usb_enable", "0" },
608 { "usb_uhci", "0" },
609 { "usb_ohci", "0" },
610 { "usb_usb2", "1" },
611 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
612 { "usb_mmc", "-1" },
613 #endif
614 { "usb_irq_thresh", "0" },
615 { "usb_storage", "1" },
616 { "usb_printer", "1" },
617 { "usb_printer_bidirect", "0" },
618 { "usb_ext_opt", "" },
619 { "usb_fat_opt", "" },
620 { "usb_ntfs_opt", "" },
621 { "usb_fs_ext3", "1" },
622 { "usb_fs_fat", "1" },
623 #ifdef TCONFIG_NTFS
624 { "usb_fs_ntfs", "1" },
625 #endif
626 { "usb_fs_hfs", "0" }, //!Victek
627 { "usb_fs_hfsplus", "0" }, //!Victek
628 { "usb_automount", "1" },
629 #if 0
630 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
631 #endif
632 { "script_usbhotplug", "" },
633 { "script_usbmount", "" },
634 { "script_usbumount", "" },
635 { "idle_enable", "0" },
636 #endif
638 #ifdef TCONFIG_FTP
639 // nas-ftp - !!TB
640 { "ftp_enable", "0" },
641 { "ftp_super", "0" },
642 { "ftp_anonymous", "0" },
643 { "ftp_dirlist", "0" },
644 { "ftp_port", "21" },
645 { "ftp_max", "0" },
646 { "ftp_ipmax", "0" },
647 { "ftp_staytimeout", "300" },
648 { "ftp_rate", "0" },
649 { "ftp_anonrate", "0" },
650 { "ftp_anonroot", "" },
651 { "ftp_pubroot", "" },
652 { "ftp_pvtroot", "" },
653 { "ftp_users", "" },
654 { "ftp_custom", "" },
655 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
656 { "ftp_limit", "0,3,60" },
657 { "log_ftp", "0" },
658 #endif
660 #ifdef TCONFIG_SNMP
661 { "snmp_enable", "0" },
662 { "snmp_location", "router" },
663 { "snmp_contact", "admin@tomato" },
664 { "snmp_ro", "rocommunity" },
665 #endif
667 #ifdef TCONFIG_SAMBASRV
668 // nas-samba - !!TB
669 { "smbd_enable", "0" },
670 { "smbd_wgroup", "WORKGROUP" },
671 { "smbd_master", "1" },
672 { "smbd_wins", "1" },
673 { "smbd_cpage", "" },
674 { "smbd_cset", "utf8" },
675 { "smbd_custom", "" },
676 { "smbd_autoshare", "2" },
677 { "smbd_shares",
678 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
680 { "smbd_user", "nas" },
681 { "smbd_passwd", "" },
682 #endif
684 #ifdef TCONFIG_MEDIA_SERVER
685 // nas-media
686 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
687 { "ms_dirs", "/mnt<" },
688 { "ms_port", "0" },
689 { "ms_dbdir", "" },
690 { "ms_tivo", "0" },
691 { "ms_stdlna", "0" },
692 { "ms_sas", "0" },
693 #endif
695 // admin-sch
696 { "sch_rboot", "" },
697 { "sch_rcon", "" },
698 { "sch_c1", "" },
699 { "sch_c2", "" },
700 { "sch_c3", "" },
701 { "sch_c1_cmd", "" },
702 { "sch_c2_cmd", "" },
703 { "sch_c3_cmd", "" },
705 // admin-script
706 { "script_init", "" },
707 { "script_shut", "" },
708 { "script_fire", "#Restrict number of TCP connections per user #iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP #Restrict number of non-TCP connections per user #iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP #Restrict number of simltaneous SMTP connections (from mailer viruses) #iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP" },
709 { "script_wanup", "" },
712 #ifdef TCONFIG_OPENVPN
713 // vpn
714 { "vpn_debug", "0" },
715 { "vpn_server_eas", "" },
716 { "vpn_server_dns", "" },
717 { "vpn_server1_poll", "0" },
718 { "vpn_server1_if", "tun" },
719 { "vpn_server1_proto", "udp" },
720 { "vpn_server1_port", "1194" },
721 { "vpn_server1_firewall", "auto" },
722 { "vpn_server1_crypt", "tls" },
723 { "vpn_server1_comp", "adaptive" },
724 { "vpn_server1_cipher", "default" },
725 { "vpn_server1_dhcp", "1" },
726 { "vpn_server1_r1", "192.168.1.50" },
727 { "vpn_server1_r2", "192.168.1.55" },
728 { "vpn_server1_sn", "10.8.0.0" },
729 { "vpn_server1_nm", "255.255.255.0" },
730 { "vpn_server1_local", "10.8.0.1" },
731 { "vpn_server1_remote", "10.8.0.2" },
732 { "vpn_server1_reneg", "-1" },
733 { "vpn_server1_hmac", "-1" },
734 { "vpn_server1_plan", "1" },
735 { "vpn_server1_ccd", "0" },
736 { "vpn_server1_c2c", "0" },
737 { "vpn_server1_ccd_excl", "0" },
738 { "vpn_server1_ccd_val", "" },
739 { "vpn_server1_pdns", "0" },
740 { "vpn_server1_rgw", "0" },
741 { "vpn_server1_custom", "" },
742 { "vpn_server1_static", "" },
743 { "vpn_server1_ca", "" },
744 { "vpn_server1_crt", "" },
745 { "vpn_server1_key", "" },
746 { "vpn_server1_dh", "" },
747 { "vpn_server2_poll", "0" },
748 { "vpn_server2_if", "tun" },
749 { "vpn_server2_proto", "udp" },
750 { "vpn_server2_port", "1194" },
751 { "vpn_server2_firewall", "auto" },
752 { "vpn_server2_crypt", "tls" },
753 { "vpn_server2_comp", "adaptive" },
754 { "vpn_server2_cipher", "default" },
755 { "vpn_server2_dhcp", "1" },
756 { "vpn_server2_r1", "192.168.1.50" },
757 { "vpn_server2_r2", "192.168.1.55" },
758 { "vpn_server2_sn", "10.8.0.0" },
759 { "vpn_server2_nm", "255.255.255.0" },
760 { "vpn_server2_local", "10.8.0.1" },
761 { "vpn_server2_remote", "10.8.0.2" },
762 { "vpn_server2_reneg", "-1" },
763 { "vpn_server2_hmac", "-1" },
764 { "vpn_server2_plan", "1" },
765 { "vpn_server2_ccd", "0" },
766 { "vpn_server2_c2c", "0" },
767 { "vpn_server2_ccd_excl", "0" },
768 { "vpn_server2_ccd_val", "" },
769 { "vpn_server2_pdns", "0" },
770 { "vpn_server2_rgw", "0" },
771 { "vpn_server2_custom", "" },
772 { "vpn_server2_static", "" },
773 { "vpn_server2_ca", "" },
774 { "vpn_server2_crt", "" },
775 { "vpn_server2_key", "" },
776 { "vpn_server2_dh", "" },
777 { "vpn_client_eas", "" },
778 { "vpn_client1_poll", "0" },
779 { "vpn_client1_if", "tun" },
780 { "vpn_client1_bridge", "1" },
781 { "vpn_client1_nat", "1" },
782 { "vpn_client1_proto", "udp" },
783 { "vpn_client1_addr", "" },
784 { "vpn_client1_port", "1194" },
785 { "vpn_client1_retry", "30" },
786 { "vpn_client1_rg", "0" },
787 { "vpn_client1_firewall", "auto" },
788 { "vpn_client1_crypt", "tls" },
789 { "vpn_client1_comp", "adaptive" },
790 { "vpn_client1_cipher", "default" },
791 { "vpn_client1_local", "10.8.0.2" },
792 { "vpn_client1_remote", "10.8.0.1" },
793 { "vpn_client1_nm", "255.255.255.0" },
794 { "vpn_client1_reneg", "-1" },
795 { "vpn_client1_hmac", "-1" },
796 { "vpn_client1_adns", "0" },
797 { "vpn_client1_rgw", "0" },
798 { "vpn_client1_gw", "" },
799 { "vpn_client1_custom", "" },
800 { "vpn_client1_static", "" },
801 { "vpn_client1_ca", "" },
802 { "vpn_client1_crt", "" },
803 { "vpn_client1_key", "" },
804 { "vpn_client2_poll", "0" },
805 { "vpn_client2_if", "tun" },
806 { "vpn_client2_bridge", "1" },
807 { "vpn_client2_nat", "1" },
808 { "vpn_client2_proto", "udp" },
809 { "vpn_client2_addr", "" },
810 { "vpn_client2_port", "1194" },
811 { "vpn_client2_retry", "30" },
812 { "vpn_client2_rg", "0" },
813 { "vpn_client2_firewall", "auto" },
814 { "vpn_client2_crypt", "tls" },
815 { "vpn_client2_comp", "adaptive" },
816 { "vpn_client2_cipher", "default" },
817 { "vpn_client2_local", "10.8.0.2" },
818 { "vpn_client2_remote", "10.8.0.1" },
819 { "vpn_client2_nm", "255.255.255.0" },
820 { "vpn_client2_reneg", "-1" },
821 { "vpn_client2_hmac", "-1" },
822 { "vpn_client2_adns", "0" },
823 { "vpn_client2_rgw", "0" },
824 { "vpn_client2_gw", "" },
825 { "vpn_client2_custom", "" },
826 { "vpn_client2_static", "" },
827 { "vpn_client2_ca", "" },
828 { "vpn_client2_crt", "" },
829 { "vpn_client2_key", "" },
830 #endif // vpn
832 #if 0
833 // safe to remove?
834 { "QoS", "0" },
836 { "ses_enable", "0" }, // enable ses
837 { "ses_event", "2" }, // initial ses event
838 { "ses_led_assertlvl", "0" }, // For SES II
839 { "ses_client_join", "0" }, // For SES II
840 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
841 { "ses_count", "0" },
842 { "eou_configured", "0" },
844 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
845 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
846 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
847 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
848 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
849 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
850 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
851 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
852 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
853 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
854 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
855 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
857 //obs zzz { "http_method", "post" }, // HTTP method
859 // { "wl_macmode1", "disabled" },
861 /* obsolete
862 { "filter", "on" }, // Firewall Protection [on|off]
863 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
864 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
865 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
866 { "block_cookie", "0" }, // Block Cookie [1|0]
867 { "ident_pass", "0" }, // IDENT passthrough [1|0]
868 { "block_proxy", "0" }, // Block Proxy [1|0]
871 /* --- obsolete ---
872 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
873 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
875 // for mac clone
876 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
877 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
879 { "public_ip", "" }, // public ip
882 //forced in rc.c { "os_name", "" }, // OS name string
883 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
884 //forced in rc.c { "os_date", __DATE__ }, // OS date
885 //not used { "ct_modules", "" }, // CyberTAN kernel modules
886 //obs { "timer_interval", "3600" }, // Timer interval in seconds
887 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
888 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
889 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
890 //obs { "os_server", "" }, // URL for getting upgrades
891 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
892 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
893 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
894 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
895 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
896 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
897 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
898 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
899 //{ "eou_device_id", "" },
900 //{ "eou_public_key", "" },
901 //{ "eou_private_key", "" },
902 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
903 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
904 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
905 // { "ntp_enable", "1" }, // replaced with ntp_updates
906 // { "ntp_mode", "auto" }, // auto, manual
909 // for AOL
910 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
911 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
912 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
913 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
914 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
916 // advanced-watchdog
917 { "wd_en", "" },
918 { "wd_atp0", "" },
919 { "wd_atp1", "" },
920 { "wd_atp2", "" },
921 { "wd_atp3", "" },
922 { "wd_atp4", "" },
923 { "wd_mxr", "3" },
924 { "wd_rdy", "15" },
925 { "wd_cki", "300" },
926 { "wd_fdm", "" },
927 { "wd_aof", "" },
929 #endif // 0
931 // arpbind
932 { "arpbind_enable", "0" },
933 { "arpbind_only", "0" },
934 { "arpbind_list", "" },
936 // NoCatSplash. !!Victek
937 #ifdef TCONFIG_NOCAT
938 { "NC_enable", "0" }, // enable NoCatSplash
939 { "NC_Verbosity", "0" }, // logging too verbose on startup!
940 { "NC_GatewayName", "WWW Portal" },
941 { "NC_GatewayPort", "5280" },
942 { "NC_GatewayMode", "Open" },
943 { "NC_DocumentRoot", "/tmp/splashd" },
944 { "NC_ExcludePorts", "1863" },
945 { "NC_HomePage", "" },
946 { "NC_ForcedRedirect", "0" },
947 { "NC_IdleTimeout", "0" },
948 { "NC_MaxMissedARP", "5" },
949 { "NC_PeerChecktimeout", "0" },
950 { "NC_LoginTimeout", "86400" },
951 { "NC_RenewTimeout", "0" },
952 { "NC_AllowedWebHosts", "" },
953 #endif
954 { NULL, NULL}
958 const defaults_t if_generic[] = {
959 { "lan_ifname", "br0" },
960 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
961 { "wan_ifname", "eth1" },
962 { "wan_ifnames", "eth1" },
963 { NULL, NULL }
966 const defaults_t if_vlan[] = {
967 { "lan_ifname", "br0" },
968 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
969 { "wan_ifname", "vlan1" },
970 { "wan_ifnames", "vlan1" },
971 { NULL, NULL }