QoS: changed some defaults
[tomato.git] / release / src / router / nvram / defaults.c
blobd21847e39a3968b26dcca3571c140c2d0c940a3b
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //Barry add 2004 09 16
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wds_enable", "0" }, // WDS Enable (0|1)
64 // WAN H/W parameters
65 //! { "wan_ifname", "" }, // WAN interface name
66 //! { "wan_ifnames", "" }, // WAN interface names
67 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
68 { "wan_hwaddr", "" }, // WAN interface MAC address
69 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
71 // WAN TCP/IP parameters
72 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
73 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
74 { "wan_netmask", "0.0.0.0" }, // WAN netmask
75 { "wan_gateway", "0.0.0.0" }, // WAN gateway
76 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
77 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
78 { "wan_lease", "86400" }, // WAN lease time in seconds
79 { "wan_islan", "0" },
81 { "wan_primary", "1" }, // Primary wan connection
82 { "wan_unit", "0" }, // Last configured connection
84 // Filters
85 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
86 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
87 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
89 { "filter", "on" }, // [on | off] Firewall Protection
91 // Port forwards
92 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
94 // DHCP server parameters
95 { "dhcp_start", "100" }, //
96 { "dhcp_num", "50" }, //
97 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
98 { "dhcpd_endip", "" }, // "
99 { "dhcp_lease", "0" }, // LAN lease time in minutes
100 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
101 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
102 { "wan_routes", "" },
103 { "wan_msroutes", "" },
106 // PPPoE parameters
107 { "pppoe_ifname", "" }, // PPPoE enslaved interface
108 { "ppp_username", "" }, // PPP username
109 { "ppp_passwd", "" }, // PPP password
110 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
111 { "ppp_keepalive", "0" }, // Restore link automatically
112 { "ppp_demand", "0" }, // Dial on demand
113 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
114 { "ppp_mru", "1500" }, // Negotiate MRU to this value
115 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
116 { "ppp_service", "" }, // PPPoE service name
117 { "ppp_ac", "" }, // PPPoE access concentrator name
118 { "ppp_static", "0" }, // Enable / Disable Static IP
119 { "ppp_static_ip", "" }, // PPPoE Static IP
120 { "ppp_get_ac", "" }, // PPPoE Server ac name
121 { "ppp_get_srv", "" }, // PPPoE Server service name
123 { "pppoe_lei", "" },
124 { "pppoe_lef", "" },
126 // Wireless parameters
127 { "wl_ifname", "" }, // Interface name
128 { "wl_hwaddr", "" }, // MAC address
129 { "wl_phytype", "g" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
130 { "wl_corerev", "" }, // Current core revision
131 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
132 { "wl_radioids", "" }, // List of radio IDs
133 { "wl_ssid", "wireless" }, // Service set ID (network name)
134 #ifdef CONFIG_BCMWL5
135 { "wl_country", "" }, // Country (default obtained from driver)
136 { "wl_country_code", "" }, // Country (default obtained from driver)
137 #else
138 { "wl_country", "JP" }, // Country (default obtained from driver)
139 { "wl_country_code", "JP" }, // !!TB - Country (default to JP to allow all 14 channels)
140 #endif
141 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
142 { "wl_closed", "0" }, // Closed (hidden) network
143 { "wl_ap_isolate", "0" }, // AP isolate mode
144 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
145 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
146 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
147 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
148 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
149 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
150 { "wl_key", "1" }, // Current WEP key
151 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
152 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
153 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
154 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
155 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
156 { "wl_channel", "6" }, // Channel number
157 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
158 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
159 { "wl_rateset", "default" }, // "default" or "all" or "12"
160 { "wl_frag", "2346" }, // Fragmentation threshold
161 { "wl_rts", "2347" }, // RTS threshold
162 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
163 { "wl_bcn", "100" }, // Beacon interval
164 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
165 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
166 { "wl_gmode", "1" }, // 54g mode
167 { "wl_gmode_protection","off" }, // 802.11g RTS/CTS protection (off|auto)
168 { "wl_afterburner", "off" }, // AfterBurner
169 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
170 { "wl_wme", "auto" }, // WME mode (auto|off|on)
171 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
172 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
173 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
174 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
176 { "wl_passphrase", "" }, // Passphrase // Add
177 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
178 { "wl_wep_buf", "" }, // save all settings for web // Add
179 { "wl_wep_gen", "" }, // save all settings for generate button // Add
180 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
181 { "wl_active_mac", "" }, // xx:xx:xx:xx:xx:xx ... // Add
183 // WPA parameters
184 { "security_mode2", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
185 { "security_mode", "disabled" }, // WPA mode (disabled|radius|wpa|psk|wep|psk psk2|wpa wpa2) for WEB // Add
186 { "security_mode_last", "" }, // Save last WPA mode // Add
187 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
188 { "wl_wpa_psk", "" }, // WPA pre-shared key
189 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
190 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
191 { "wl_radius_key", "" }, // RADIUS shared secret
192 { "wl_radius_port", "1812" }, // RADIUS server UDP port
193 { "wl_crypto", "tkip" }, // WPA data encryption
194 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
195 { "wl_akm", "" }, // WPA akm list
197 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
198 // EDCA parameters for STA
199 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
200 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
201 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
202 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
204 // EDCA parameters for AP
205 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
206 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
207 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
208 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
210 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
211 { "wl_wme_apsd", "on" }, // WME APSD mode
212 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
214 /* Per AC Tx parameters */
215 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
216 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
217 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
218 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
220 { "wl_unit", "0" }, // Last configured interface
221 { "wl_mac_deny", "" }, // filter MAC // Add
223 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
224 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
225 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
227 // !!TB: n-mode
228 { "wl_nmode", "-1" }, // N-mode
229 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
231 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
232 { "wl_nreqd", "0" }, // Require 802.11n support
233 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
234 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
235 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
236 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
237 { "wl_nband", "2" }, // N-Band
238 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
239 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
240 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
241 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
242 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
243 { "wl_radarthrs", "0 0x6a8 0x6c8 0x6ac 0x6c7" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
244 { "wl_bcn_rotate", "1" }, // Beacon rotation
245 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
246 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
248 #ifdef CONFIG_BCMWL5
249 // EMF
250 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
251 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
252 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
253 { "emf_enable", "0" }, // Disable EMF by default
254 // AMPDU
255 { "wl_ampdu", "auto" }, // Default AMPDU setting
256 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
257 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
258 { "wl_amsdu", "auto" }, // Default AMSDU setting
259 // power save
260 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
261 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
262 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
263 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
264 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
265 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
266 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
267 // misc
268 { "wl_wmf_bss_enable", "0" }, // WMF Enable/Disable
269 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
270 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
271 #endif
273 { "pptp_server_ip", "" }, // as same as WAN gateway
274 { "pptp_get_ip", "" }, // IP Address assigned by PPTP server
275 { "pptp_dhcp", "1" },
277 // for firewall
278 { "mtu_enable", "0" }, // WAN MTU [1|0]
279 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
281 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
282 { "l2tp_get_ip", "" }, // IP Address assigned by L2TP server
283 { "wan_gateway_buf", "0.0.0.0" }, // save the default gateway for DHCP
284 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
285 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
287 // misc
288 { "t_noise", "-99" },
289 { "led_override", "" },
290 { "btn_override", "" },
291 { "btn_reset", "" },
292 { "env_path", "" },
293 { "manual_boot_nv", "0" },
294 // { "wlx_hpamp", "" },
295 // { "wlx_hperx", "" }, // see init.c
296 { "t_fix1", "" },
298 // basic-ddns
299 { "ddnsx0", "" },
300 { "ddnsx1", "" },
301 { "ddnsx0_cache", "" },
302 { "ddnsx1_cache", "" },
303 { "ddnsx_save", "1" },
304 { "ddnsx_refresh", "28" },
306 // basic-network
307 { "wds_save", "" },
309 // basic-ident
310 { "router_name", "tomato" },
311 { "wan_hostname", "unknown" },
312 { "wan_domain", "" },
314 // basic-time
315 { "tm_sel", "PST8PDT,M3.2.0/2,M11.1.0/2" },
316 { "tm_tz", "PST8PDT,M3.2.0/2,M11.1.0/2" },
317 { "tm_dst", "1", },
318 { "ntp_updates", "4" },
319 { "ntp_tdod", "0" },
320 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
321 { "ntp_kiss", "" },
322 { "ntp_kiss_ignore", "" },
324 // basic-static
325 { "dhcpd_static", "" },
327 // basic-wfilter
328 { "wl_mac_list", "" },
329 { "wl_macmode", "disabled" },
330 { "macnames", "" },
332 // advanced-ctnf
333 { "ct_tcp_timeout", "" },
334 { "ct_udp_timeout", "" },
335 { "ct_timeout", "" },
336 { "ct_max", "" },
337 { "nf_ttl", "0" },
338 { "nf_l7in", "1" },
339 #ifdef LINUX26
340 { "nf_sip", "1" },
341 { "ct_hashsize", "" },
342 #endif
343 #ifdef LINUX26
344 { "nf_rtsp", "0" },
345 #else
346 { "nf_rtsp", "1" },
347 #endif
348 { "nf_pptp", "1" },
349 { "nf_h323", "1" },
350 { "nf_ftp", "1" },
352 // advanced-mac
353 { "mac_wan", "" },
354 { "mac_wl", "" },
356 // advanced-misc
357 { "boot_wait", "on" },
358 { "wait_time", "5" },
359 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
360 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
361 { "jumbo_frame_size", "2000" },
363 // advanced-dhcpdns
364 { "dhcpd_dmdns", "1" },
365 { "dhcpd_slt", "0" },
366 { "dhcpd_gwmode", "" },
367 { "dhcpd_lmax", "" },
368 { "dns_addget", "0" },
369 { "dns_intcpt", "0" },
370 { "dhcpc_minpkt", "1" },
371 { "dhcpc_vendorclass", "" },
372 { "dhcpc_requestip", "" },
373 { "dns_norebind", "1" },
374 { "dnsmasq_custom", "" },
375 // { "dnsmasq_norw", "0" },
377 // advanced-firewall
378 // { "block_loopback", "0" }, // nat loopback
379 { "nf_loopback", "1" },
380 { "block_wan", "1" }, // block inbound icmp
381 { "multicast_pass", "0" }, // enable multicast proxy
382 { "ne_syncookies", "0" }, // tcp_syncookies
383 { "dhcp_pass", "1" }, // allow DHCP responses
384 { "ne_shlimit", "0,3,60" },
386 // advanced-routing
387 { "routes_static", "" },
388 { "dhcp_routes", "1" },
389 { "wk_mode", "gateway" }, // Network mode [gateway|router]
390 #ifdef TCONFIG_ZEBRA
391 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
392 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
393 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
394 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
395 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
396 #endif
398 // advanced-wireless
399 { "wl_txant", "3" },
400 { "wl_txpwr", "42" },
401 { "wl_maxassoc", "128" }, // Max associations driver could support
402 { "wl_bss_maxassoc", "128" },
403 { "wl_distance", "" },
405 // forward-*
406 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
407 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
408 { "dmz_enable", "0" },
409 { "dmz_ipaddr", "0" },
410 { "dmz_sip", "" },
412 // forward-upnp
413 { "upnp_enable", "0" },
414 { "upnp_secure", "1" },
415 { "upnp_port", "0" },
416 { "upnp_ssdp_interval", "60" }, // SSDP interval
417 { "upnp_mnp", "0" },
419 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
420 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
421 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
422 #if 0 // disabled for miniupnpd
423 { "upnp_max_age", "180" }, // Max age
424 { "upnp_config", "0" },
425 #endif
427 // qos
428 { "qos_enable", "0" },
429 { "qos_ack", "0" },
430 { "qos_syn", "1" },
431 { "qos_fin", "1" },
432 { "qos_rst", "1" },
433 { "qos_icmp", "0" },
434 { "qos_reset", "0" },
435 { "qos_obw", "230" },
436 { "qos_ibw", "1000" },
437 { "qos_orules", "0<<6<d<80,443<0<<0:512<1<WWW>0<<6<d<80,443<0<<512:<3<WWW (512K+)>0<<-1<d<53<0<<0:2<0<DNS>0<<-1<d<53<0<<2:<4<DNS (2K+)" },
438 { "qos_burst0", "" },
439 { "qos_burst1", "" },
441 { "qos_default", "4" },
442 { "qos_orates", "80-100,10-100,5-100,3-100,2-95,1-50,1-40,1-30,1-20,1-10" },
444 { "ne_vegas", "0" }, // TCP Vegas
445 { "ne_valpha", "2" }, // "
446 { "ne_vbeta", "6" }, // "
447 { "ne_vgamma", "2" }, // "
449 // access restrictions
450 { "rruleN", "0" },
451 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
452 //* { "rrule##", "" },
453 { "rrulewp", "80,8080" },
455 #if TOMATO_SL
456 // samba
457 { "smbd_on", "0" },
458 { "nmbd_on", "0" },
459 { "smbd_wgroup", "WORKGROUP" },
460 { "smbd_nbname", "TOMATO" },
461 { "smbd_adminpass", "admin" },
462 #endif
464 // admin-access
465 { "http_username", "" }, // Username
466 { "http_passwd", "admin" }, // Password
467 { "remote_management", "0" }, // Remote Management [1|0]
468 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
469 { "http_wanport", "8080" }, // WAN port to listen on
470 { "http_lanport", "80" }, // LAN port to listen on
471 { "https_lanport", "443" }, // LAN port to listen on
472 { "http_enable", "1" }, // HTTP server enable/disable
473 { "https_enable", "0" }, // HTTPS server enable/disable
474 { "https_crt_save", "0" },
475 { "https_crt_cn", "" },
476 { "https_crt_file", "" },
477 { "https_crt", "" },
478 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
479 { "web_css", "tomato" },
480 { "web_svg", "1" },
481 { "telnetd_eas", "1" },
482 { "telnetd_port", "23" },
483 { "sshd_eas", "0" },
484 { "sshd_pass", "1" },
485 { "sshd_port", "22" },
486 { "sshd_remote", "0" },
487 { "sshd_rport", "2222" },
488 { "sshd_authkeys", "" },
489 { "sshd_hostkey", "" },
490 { "sshd_dsskey", "" },
491 { "sshd_forwarding", "1" },
492 { "rmgt_sip", "" }, // remote management: source ip address
494 { "http_id", "" },
495 { "web_mx", "status,bwm" },
496 { "web_pb", "" },
498 // admin-bwm
499 { "rstats_enable", "1" },
500 { "rstats_path", "" },
501 { "rstats_stime", "48" },
502 { "rstats_offset", "1" },
503 { "rstats_data", "" },
504 { "rstats_colors", "" },
505 { "rstats_exclude", "" },
506 { "rstats_sshut", "1" },
507 { "rstats_bak", "0" },
509 // advanced-buttons
510 { "sesx_led", "0" },
511 { "sesx_b0", "1" },
512 { "sesx_b1", "4" },
513 { "sesx_b2", "4" },
514 { "sesx_b3", "4" },
515 { "sesx_script",
516 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
518 { "script_brau",
519 "if [ ! -e /tmp/switch-start ]; then\n"
520 " # do something at startup\n"
521 " echo position at startup was $1 >/tmp/switch-start\n"
522 " exit\n"
523 "fi\n"
524 "if [ $1 = \"bridge\" ]; then\n"
525 " # do something\n"
526 " led bridge on\n"
527 "elif [ $1 = \"auto\" ]; then\n"
528 " # do something\n"
529 " led bridge off\n"
530 "fi\n"
533 // admin-log
534 { "log_remote", "0" },
535 { "log_remoteip", "" },
536 { "log_remoteport", "514" },
537 { "log_file", "1" },
538 { "log_limit", "60" },
539 { "log_in", "0" },
540 { "log_out", "0" },
541 { "log_mark", "60" },
542 { "log_events", "" },
544 // admin-log-webmonitor
545 { "log_wm", "0" },
546 { "log_wmtype", "0" },
547 { "log_wmip", "" },
548 { "log_wmdmax", "300" },
549 { "log_wmsmax", "300" },
551 // admin-debugging
552 { "debug_nocommit", "0" },
553 { "debug_cprintf", "0" },
554 { "debug_cprintf_file", "0" },
555 // { "debug_keepfiles", "0" },
556 { "console_loglevel", "1" },
557 { "t_cafree", "1" },
558 { "t_hidelr", "0" },
559 { "debug_clkfix", "1" },
560 { "debug_ddns", "0" },
562 // admin-cifs
563 { "cifs1", "" },
564 { "cifs2", "" },
566 // admin-jffs2
567 { "jffs2_on", "0" },
568 { "jffs2_exec", "" },
570 #ifdef TCONFIG_USB
571 // nas-usb - !!TB
572 { "usb_enable", "0" },
573 { "usb_uhci", "0" },
574 { "usb_ohci", "0" },
575 { "usb_usb2", "1" },
576 { "usb_irq_thresh", "0" },
577 { "usb_storage", "1" },
578 { "usb_printer", "1" },
579 { "usb_printer_bidirect", "1" },
580 { "usb_ext_opt", "" },
581 { "usb_fat_opt", "" },
582 { "usb_ntfs_opt", "" },
583 { "usb_fs_ext3", "1" },
584 { "usb_fs_fat", "1" },
585 #ifdef TCONFIG_NTFS
586 { "usb_fs_ntfs", "1" },
587 #endif
588 { "usb_automount", "1" },
589 #if 0
590 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
591 #endif
592 { "script_usbhotplug", "" },
593 { "script_usbmount", "" },
594 { "script_usbumount", "" },
595 #endif
597 #ifdef TCONFIG_FTP
598 // nas-ftp - !!TB
599 { "ftp_enable", "0" },
600 { "ftp_super", "0" },
601 { "ftp_anonymous", "0" },
602 { "ftp_dirlist", "0" },
603 { "ftp_port", "21" },
604 { "ftp_max", "0" },
605 { "ftp_ipmax", "0" },
606 { "ftp_staytimeout", "300" },
607 { "ftp_rate", "0" },
608 { "ftp_anonrate", "0" },
609 { "ftp_anonroot", "" },
610 { "ftp_pubroot", "" },
611 { "ftp_pvtroot", "" },
612 { "ftp_users", "" },
613 { "ftp_custom", "" },
614 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
615 { "ftp_limit", "0,3,60" },
616 { "log_ftp", "0" },
617 #endif
619 #ifdef TCONFIG_SAMBASRV
620 // nas-samba - !!TB
621 { "smbd_enable", "0" },
622 { "smbd_wgroup", "WORKGROUP" },
623 { "smbd_master", "1" },
624 { "smbd_wins", "1" },
625 { "smbd_cpage", "" },
626 { "smbd_cset", "utf8" },
627 { "smbd_custom", "" },
628 { "smbd_autoshare", "1" },
629 { "smbd_shares",
630 "share</mnt<Default Share<0<0>root$</<Hidden Root<0<1"
632 { "smbd_user", "nas" },
633 { "smbd_passwd", "" },
634 #endif
636 #ifdef TCONFIG_MEDIA_SERVER
637 // nas-media
638 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
639 { "ms_dirs", "/mnt<" },
640 { "ms_port", "0" },
641 { "ms_dbdir", "" },
642 { "ms_tivo", "0" },
643 { "ms_stdlna", "0" },
644 { "ms_sas", "0" },
645 #endif
647 // admin-sch
648 { "sch_rboot", "" },
649 { "sch_rcon", "" },
650 { "sch_c1", "" },
651 { "sch_c2", "" },
652 { "sch_c3", "" },
653 { "sch_c1_cmd", "" },
654 { "sch_c2_cmd", "" },
655 { "sch_c3_cmd", "" },
657 // admin-script
658 { "script_init", "" },
659 { "script_shut", "" },
660 { "script_fire", "" },
661 { "script_wanup", "" },
663 #ifdef TCONFIG_OPENVPN
664 // vpn
665 { "vpn_debug", "0" },
666 { "vpn_server_eas", "" },
667 { "vpn_server_dns", "" },
668 { "vpn_server1_poll", "0" },
669 { "vpn_server1_if", "tun" },
670 { "vpn_server1_proto", "udp" },
671 { "vpn_server1_port", "1194" },
672 { "vpn_server1_firewall", "auto" },
673 { "vpn_server1_crypt", "tls" },
674 { "vpn_server1_comp", "adaptive" },
675 { "vpn_server1_cipher", "default" },
676 { "vpn_server1_dhcp", "1" },
677 { "vpn_server1_r1", "192.168.1.50" },
678 { "vpn_server1_r2", "192.168.1.55" },
679 { "vpn_server1_sn", "10.8.0.0" },
680 { "vpn_server1_nm", "255.255.255.0" },
681 { "vpn_server1_local", "10.8.0.1" },
682 { "vpn_server1_remote", "10.8.0.2" },
683 { "vpn_server1_reneg", "-1" },
684 { "vpn_server1_hmac", "-1" },
685 { "vpn_server1_plan", "1" },
686 { "vpn_server1_ccd", "0" },
687 { "vpn_server1_c2c", "0" },
688 { "vpn_server1_ccd_excl", "0" },
689 { "vpn_server1_ccd_val", "" },
690 { "vpn_server1_pdns", "0" },
691 { "vpn_server1_rgw", "0" },
692 { "vpn_server1_custom", "" },
693 { "vpn_server1_static", "" },
694 { "vpn_server1_ca", "" },
695 { "vpn_server1_crt", "" },
696 { "vpn_server1_key", "" },
697 { "vpn_server1_dh", "" },
698 { "vpn_server2_poll", "0" },
699 { "vpn_server2_if", "tun" },
700 { "vpn_server2_proto", "udp" },
701 { "vpn_server2_port", "1194" },
702 { "vpn_server2_firewall", "auto" },
703 { "vpn_server2_crypt", "tls" },
704 { "vpn_server2_comp", "adaptive" },
705 { "vpn_server2_cipher", "default" },
706 { "vpn_server2_dhcp", "1" },
707 { "vpn_server2_r1", "192.168.1.50" },
708 { "vpn_server2_r2", "192.168.1.55" },
709 { "vpn_server2_sn", "10.8.0.0" },
710 { "vpn_server2_nm", "255.255.255.0" },
711 { "vpn_server2_local", "10.8.0.1" },
712 { "vpn_server2_remote", "10.8.0.2" },
713 { "vpn_server2_reneg", "-1" },
714 { "vpn_server2_hmac", "-1" },
715 { "vpn_server2_plan", "1" },
716 { "vpn_server2_ccd", "0" },
717 { "vpn_server2_c2c", "0" },
718 { "vpn_server2_ccd_excl", "0" },
719 { "vpn_server2_ccd_val", "" },
720 { "vpn_server2_pdns", "0" },
721 { "vpn_server2_rgw", "0" },
722 { "vpn_server2_custom", "" },
723 { "vpn_server2_static", "" },
724 { "vpn_server2_ca", "" },
725 { "vpn_server2_crt", "" },
726 { "vpn_server2_key", "" },
727 { "vpn_server2_dh", "" },
728 { "vpn_client_eas", "" },
729 { "vpn_client1_poll", "0" },
730 { "vpn_client1_if", "tun" },
731 { "vpn_client1_bridge", "1" },
732 { "vpn_client1_nat", "1" },
733 { "vpn_client1_proto", "udp" },
734 { "vpn_client1_addr", "" },
735 { "vpn_client1_port", "1194" },
736 { "vpn_client1_retry", "30" },
737 { "vpn_client1_rg", "0" },
738 { "vpn_client1_firewall", "auto" },
739 { "vpn_client1_crypt", "tls" },
740 { "vpn_client1_comp", "adaptive" },
741 { "vpn_client1_cipher", "default" },
742 { "vpn_client1_local", "10.8.0.2" },
743 { "vpn_client1_remote", "10.8.0.1" },
744 { "vpn_client1_nm", "255.255.255.0" },
745 { "vpn_client1_reneg", "-1" },
746 { "vpn_client1_hmac", "-1" },
747 { "vpn_client1_adns", "0" },
748 { "vpn_client1_rgw", "0" },
749 { "vpn_client1_gw", "" },
750 { "vpn_client1_custom", "" },
751 { "vpn_client1_static", "" },
752 { "vpn_client1_ca", "" },
753 { "vpn_client1_crt", "" },
754 { "vpn_client1_key", "" },
755 { "vpn_client2_poll", "0" },
756 { "vpn_client2_if", "tun" },
757 { "vpn_client2_bridge", "1" },
758 { "vpn_client2_nat", "1" },
759 { "vpn_client2_proto", "udp" },
760 { "vpn_client2_addr", "" },
761 { "vpn_client2_port", "1194" },
762 { "vpn_client2_retry", "30" },
763 { "vpn_client2_rg", "0" },
764 { "vpn_client2_firewall", "auto" },
765 { "vpn_client2_crypt", "tls" },
766 { "vpn_client2_comp", "adaptive" },
767 { "vpn_client2_cipher", "default" },
768 { "vpn_client2_local", "10.8.0.2" },
769 { "vpn_client2_remote", "10.8.0.1" },
770 { "vpn_client2_nm", "255.255.255.0" },
771 { "vpn_client2_reneg", "-1" },
772 { "vpn_client2_hmac", "-1" },
773 { "vpn_client2_adns", "0" },
774 { "vpn_client2_rgw", "0" },
775 { "vpn_client2_gw", "" },
776 { "vpn_client2_custom", "" },
777 { "vpn_client2_static", "" },
778 { "vpn_client2_ca", "" },
779 { "vpn_client2_crt", "" },
780 { "vpn_client2_key", "" },
781 #endif // vpn
783 #if 0
784 // safe to remove?
785 { "QoS", "0" },
787 { "ses_enable", "0" }, // enable ses
788 { "ses_event", "2" }, // initial ses event
789 { "ses_led_assertlvl", "0" }, // For SES II
790 { "ses_client_join", "0" }, // For SES II
791 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
792 { "ses_count", "0" },
793 { "eou_configured", "0" },
795 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
796 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
797 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
798 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
799 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
800 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
801 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
802 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
803 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
804 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
805 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
806 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
808 //obs zzz { "http_method", "post" }, // HTTP method
810 // { "wl_macmode1", "disabled" },
812 /* obsolete
813 { "filter", "on" }, // Firewall Protection [on|off]
814 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
815 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
816 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
817 { "block_cookie", "0" }, // Block Cookie [1|0]
818 { "ident_pass", "0" }, // IDENT passthrough [1|0]
819 { "block_proxy", "0" }, // Block Proxy [1|0]
822 /* --- obsolete ---
823 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
824 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
826 // for mac clone
827 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
828 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
830 { "public_ip", "" }, // public ip
833 //forced in rc.c { "os_name", "" }, // OS name string
834 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
835 //forced in rc.c { "os_date", __DATE__ }, // OS date
836 //not used { "ct_modules", "" }, // CyberTAN kernel modules
837 //obs { "timer_interval", "3600" }, // Timer interval in seconds
838 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
839 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
840 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
841 //obs { "os_server", "" }, // URL for getting upgrades
842 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
843 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
844 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
845 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
846 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
847 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
848 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
849 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
850 //{ "eou_device_id", "" },
851 //{ "eou_public_key", "" },
852 //{ "eou_private_key", "" },
853 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
854 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
855 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
856 // { "ntp_enable", "1" }, // replaced with ntp_updates
857 // { "ntp_mode", "auto" }, // auto, manual
860 // for AOL
861 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
862 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
863 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
864 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
865 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
867 // advanced-watchdog
868 { "wd_en", "" },
869 { "wd_atp0", "" },
870 { "wd_atp1", "" },
871 { "wd_atp2", "" },
872 { "wd_atp3", "" },
873 { "wd_atp4", "" },
874 { "wd_mxr", "3" },
875 { "wd_rdy", "15" },
876 { "wd_cki", "300" },
877 { "wd_fdm", "" },
878 { "wd_aof", "" },
880 #endif // 0
882 { NULL, NULL }
885 const defaults_t if_generic[] = {
886 { "lan_ifname", "br0" },
887 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
888 { "wan_ifname", "eth1" },
889 { "wan_ifnames", "eth1" },
890 { NULL, NULL }
893 const defaults_t if_vlan[] = {
894 { "lan_ifname", "br0" },
895 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
896 { "wan_ifname", "vlan1" },
897 { "wan_ifnames", "vlan1" },
898 { NULL, NULL }