3 Copyright 2003, CyberTAN Inc.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
39 //! = see restore_main()
41 const defaults_t defaults
[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //Barry add 2004 09 16
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
65 //! { "wan_ifname", "" }, // WAN interface name
66 //! { "wan_ifnames", "" }, // WAN interface names
67 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
68 { "wan_hwaddr", "" }, // WAN interface MAC address
69 { "wan_ifnameX", NULL
}, // real wan if; see wan.c:start_wan
71 // WAN TCP/IP parameters
72 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
73 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
74 { "wan_netmask", "0.0.0.0" }, // WAN netmask
75 { "wan_gateway", "0.0.0.0" }, // WAN gateway
76 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
77 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
78 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
79 { "wan_lease", "86400" }, // WAN lease time in seconds
82 { "wan_primary", "1" }, // Primary wan connection
83 { "wan_unit", "0" }, // Last configured connection
86 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
87 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
88 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
90 { "filter", "on" }, // [on | off] Firewall Protection
93 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
95 // DHCP server parameters
96 { "dhcp_start", "100" }, //
97 { "dhcp_num", "50" }, //
98 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
99 { "dhcpd_endip", "" }, // "
100 { "dhcp_lease", "0" }, // LAN lease time in minutes
101 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
102 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
103 { "wan_routes", "" },
104 { "wan_msroutes", "" },
108 { "pppoe_ifname", "" }, // PPPoE enslaved interface
109 { "ppp_username", "" }, // PPP username
110 { "ppp_passwd", "" }, // PPP password
111 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
112 { "ppp_keepalive", "0" }, // Restore link automatically
113 { "ppp_demand", "0" }, // Dial on demand
114 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
115 { "ppp_mru", "1500" }, // Negotiate MRU to this value
116 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
117 { "ppp_service", "" }, // PPPoE service name
118 { "ppp_ac", "" }, // PPPoE access concentrator name
119 { "ppp_static", "0" }, // Enable / Disable Static IP
120 { "ppp_static_ip", "" }, // PPPoE Static IP
121 { "ppp_get_ac", "" }, // PPPoE Server ac name
122 { "ppp_get_srv", "" }, // PPPoE Server service name
123 { "ppp_custom", "" }, // PPPD additional options
130 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
131 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
132 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
133 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
134 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
135 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
136 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
137 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
138 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
139 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
140 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
141 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
142 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
143 { "ipv6_dns", "" }, // DNS server(s) IPs
144 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
147 // Wireless parameters
148 { "wl_ifname", "" }, // Interface name
149 { "wl_hwaddr", "" }, // MAC address
150 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
151 { "wl_corerev", "" }, // Current core revision
152 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
153 { "wl_radioids", "" }, // List of radio IDs
154 { "wl_ssid", "wireless" }, // Service set ID (network name)
155 { "wl1_ssid", "wireless1" },
156 { "wl_country_code", "US" }, // Country (default obtained from driver)
157 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
158 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
159 { "wl_closed", "0" }, // Closed (hidden) network
160 { "wl_ap_isolate", "0" }, // AP isolate mode
161 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
162 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
163 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
164 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
165 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
166 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
167 { "wl_key", "1" }, // Current WEP key
168 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
169 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
170 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
171 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
172 { "wl_channel", "6" }, // Channel number
173 { "wl1_channel", "0" },
174 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
175 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
176 { "wl_rateset", "default" }, // "default" or "all" or "12"
177 { "wl_frag", "2346" }, // Fragmentation threshold
178 { "wl_rts", "2347" }, // RTS threshold
179 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
180 { "wl_bcn", "100" }, // Beacon interval
181 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
182 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
183 { "wl_gmode", "1" }, // 54g mode
184 { "wl_gmode_protection","off" }, // 802.11g RTS/CTS protection (off|auto)
185 { "wl_afterburner", "off" }, // AfterBurner
186 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
187 { "wl_wme", "auto" }, // WME mode (auto|off|on)
188 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
189 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
190 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
191 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
192 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
193 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3) //Toastman - 0=off
194 { "wl_passphrase", "" }, // Passphrase // Add
195 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
196 { "wl_wep_buf", "" }, // save all settings for web // Add
197 { "wl_wep_gen", "" }, // save all settings for generate button // Add
198 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
201 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
202 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
203 { "wl_wpa_psk", "" }, // WPA pre-shared key
204 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
205 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
206 { "wl_radius_key", "" }, // RADIUS shared secret
207 { "wl_radius_port", "1812" }, // RADIUS server UDP port
208 { "wl_crypto", "aes" }, // WPA data encryption
209 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
210 { "wl_akm", "" }, // WPA akm list
212 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
213 // EDCA parameters for STA
214 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
215 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
216 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
217 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
219 // EDCA parameters for AP
220 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
221 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
222 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
223 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
225 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
226 { "wl_wme_apsd", "on" }, // WME APSD mode
227 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
229 /* Per AC Tx parameters */
230 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
231 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
232 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
233 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
235 { "wl_unit", "0" }, // Last configured interface
236 { "wl_mac_deny", "" }, // filter MAC // Add
238 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
239 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
240 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
243 { "wl_nmode", "-1" }, // N-mode
244 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
245 { "wl1_nband", "1" },
246 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
247 { "wl_nreqd", "0" }, // Require 802.11n support
248 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
249 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
250 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
251 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
252 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
253 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
254 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
255 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
256 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
257 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
258 { "wl_bcn_rotate", "1" }, // Beacon rotation
259 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
260 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
263 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
264 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
265 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
266 { "emf_enable", "0" }, // Disable EMF by default
270 { "wl_ampdu", "auto" }, // Default AMPDU setting
271 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
272 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
273 { "wl_amsdu", "auto" }, // Default AMSDU setting
275 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
276 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
277 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
278 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
279 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
280 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
281 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
283 { "wl_wmf_bss_enable", "0" }, // WMF Enable/Disable
284 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
285 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
286 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
289 { "pptp_server_ip", "" }, // as same as WAN gateway
290 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
291 { "pptp_dhcp", "1" },
294 { "mtu_enable", "0" }, // WAN MTU [1|0]
295 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
297 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
298 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
299 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
302 { "wl_tnoise", "-99" },
303 { "led_override", "" },
304 { "btn_override", "" },
307 { "manual_boot_nv", "0" },
308 // { "wlx_hpamp", "" },
309 // { "wlx_hperx", "" }, // see init.c
315 { "ddnsx0_cache", "" },
316 { "ddnsx1_cache", "" },
317 { "ddnsx_save", "1" },
318 { "ddnsx_refresh", "28" },
321 { "router_name", "toast" },
322 { "wan_hostname", "unknown" },
323 { "wan_domain", "" },
326 { "tm_sel", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
327 { "tm_tz", "CET-1CEST,M3.5.0/2,M10.5.0/3" },
329 { "ntp_updates", "4" },
331 { "ntp_server", "0.europe.pool.ntp.org 1.europe.pool.ntp.org 2.europe.pool.ntp.org" },
333 { "ntp_kiss_ignore", "" },
336 { "dhcpd_static", "" },
339 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
340 { "wl_macmode", "disabled" },
344 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
345 { "ct_udp_timeout", "10 10" },
346 { "ct_timeout", "10 10" },
347 { "ct_max", "8192" },
352 { "ct_hashsize", "2048" },
365 { "wl_macaddr", "" },
368 { "boot_wait", "on" },
369 { "wait_time", "5" },
371 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
372 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
373 { "jumbo_frame_size", "2000" },
375 { "ctf_disable", "1" },
379 { "dhcpd_dmdns", "1" },
380 { "dhcpd_slt", "0" },
381 { "dhcpd_gwmode", "" },
382 { "dhcpd_lmax", "" },
383 { "dns_addget", "0" },
384 { "dns_intcpt", "0" },
385 { "dhcpc_minpkt", "1" },
386 { "dhcpc_custom", "" },
387 { "dns_norebind", "1" },
388 { "dnsmasq_custom", "" },
389 // { "dnsmasq_norw", "0" },
392 // { "block_loopback", "0" }, // nat loopback
393 { "nf_loopback", "0" },
394 { "block_wan", "1" }, // block inbound icmp
395 { "multicast_pass", "0" }, // enable multicast proxy
396 { "ne_syncookies", "0" }, // tcp_syncookies
397 { "dhcp_pass", "1" }, // allow DHCP responses
398 { "ne_shlimit", "0,3,60" },
401 { "routes_static", "" },
402 { "dhcp_routes", "1" },
403 { "wk_mode", "gateway" }, // Network mode [gateway|router]
405 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
406 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
407 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
408 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
409 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
414 { "wl_txpwr", "42" },
415 { "wl_maxassoc", "128" }, // Max associations driver could support
416 { "wl_bss_maxassoc", "128" },
417 { "wl_distance", "" },
420 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
422 { "ipv6_portforward", ""},
424 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
425 { "dmz_enable", "0" },
426 { "dmz_ipaddr", "0" },
430 { "upnp_enable", "3" },
431 { "upnp_secure", "1" },
432 { "upnp_port", "0" },
433 { "upnp_ssdp_interval", "60" }, // SSDP interval
434 { "upnp_max_age", "180" }, // Max age
436 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
437 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
438 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
439 #if 0 // disabled for miniupnpd
440 { "upnp_max_age", "180" }, // Max age
441 { "upnp_config", "0" },
445 { "qos_enable", "0" },
451 { "qos_reset", "1" },
452 { "qos_obw", "700" },
453 { "qos_ibw", "16000" },
454 { "qos_orules", "0<<-1<d<53,37,123,3455<0<<0:10<0<DNS,Time,NTP,RSVP>0<<6<s<80<0<<<3<Remote Access>0<<-1<d<11999,2300:2400,6001:6002,6073,28800:29100,47624<0<<0:50<1<Some well-known games>0<<-1<a<<0<flash<<2<Flash Video, (Youtube)>0<<-1<a<<0<httpvideo<<2<HTTP Video, (Youtube)>0<<-1<a<<0<shoutcast<<2<Shoutcast>0<<-1<d<9,554,1755,5004,5005,6970:7170,8554<0<<<2<RTP,RTSP>0<<-1<a<<0<skypetoskype<<6<SkypetoSkype>0<<-1<a<<0<skypeout<<1<Skypeout>0<<-1<d<1935,5004,5060:5063,1719,1720,3478,3479,10000,15000<0<<<2<RTMP,MMS,SIP,H323,STUN>0<<-1<d<1220,1234,5100,6005,6970<0<<<2<QT,Camfrog,VLC>0<<6<d<80,443,8080<0<<0:512<4<WWW,SSL,HTTP Proxy>0<<-1<d<25,465,563,587,110,119,143,220,993,995<0<<<5<SMTP,POP3,IMAP,NNTP>0<<-1<d<1493,1502:1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<6<MSGR1 - Windows Live>0<<-1<d<194,1720,1730:1732,6660:6669,22555<0<<<6<MSGR2 - Misc Chat Services>0<<-1<d<5000:5010,5050,5100,5222,5223,8000:8002<0<<<6<MSGR3 - Misc Chat Services>0<<-1<x<5060,5190,5220:5223,5678,16384:16403<0<<<6<MSGR4 - Apple iChat>0<<-1<x<20:23,6571,6891:6901<0<<<7<FTP,SFTP,WLM File/Webcam>0<<-1<d<80,443,8080<0<<512:<7<HTTP,SSL File Transfers>0<<17<d<1:65535<0<<<-1<P2P (uTP, UDP)" },
455 { "qos_burst0", "" },
456 { "qos_burst1", "" },
457 { "qos_default", "8" },
458 { "qos_orates", "5-20,5-20,5-25,5-70,20-100,5-80,5-80,5-80,5-50,0-0" },
459 { "qos_irates", "10,60,60,70,0,60,60,80,30,1" },
460 { "ne_vegas", "0" }, // TCP Vegas
461 { "ne_valpha", "3" }, // "
462 { "ne_vbeta", "3" }, // "
463 { "ne_vgamma", "2" }, // "
465 // access restrictions
467 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
468 //* { "rrule##", "" },
469 { "rrulewp", "80,8080" },
475 { "smbd_wgroup", "WORKGROUP" },
476 { "smbd_nbname", "TOMATO" },
477 { "smbd_adminpass", "admin" },
481 { "http_username", "" }, // Username
482 { "http_passwd", "admin" }, // Password
483 { "remote_management", "0" }, // Remote Management [1|0]
484 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
485 { "http_wanport", "8080" }, // WAN port to listen on
486 { "http_lanport", "80" }, // LAN port to listen on
487 { "https_lanport", "443" }, // LAN port to listen on
488 { "http_enable", "1" }, // HTTP server enable/disable
489 { "https_enable", "0" }, // HTTPS server enable/disable
490 { "https_crt_save", "0" },
491 { "https_crt_cn", "" },
492 { "https_crt_file", "" },
494 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
495 { "web_favicon", "0" },
496 { "web_css", "enlightened" },
498 { "telnetd_eas", "1" },
499 { "telnetd_port", "23" },
501 { "sshd_pass", "1" },
502 { "sshd_port", "22" },
503 { "sshd_remote", "0" },
504 { "sshd_rport", "2222" },
505 { "sshd_authkeys", "" },
506 { "sshd_hostkey", "" },
507 { "sshd_dsskey", "" },
508 { "sshd_forwarding", "1" },
509 { "rmgt_sip", "" }, // remote management: source ip address
512 { "web_mx", "status,bwm" },
516 { "rstats_enable", "1" },
517 { "rstats_path", "" },
518 { "rstats_stime", "48" },
519 { "rstats_offset", "1" },
520 { "rstats_data", "" },
521 { "rstats_colors", "" },
522 { "rstats_exclude", "" },
523 { "rstats_sshut", "1" },
524 { "rstats_bak", "0" },
533 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
536 "if [ ! -e /tmp/switch-start ]; then\n"
537 " # do something at startup\n"
538 " echo position at startup was $1 >/tmp/switch-start\n"
541 "if [ $1 = \"bridge\" ]; then\n"
544 "elif [ $1 = \"auto\" ]; then\n"
551 { "log_remote", "0" },
552 { "log_remoteip", "" },
553 { "log_remoteport", "514" },
555 { "log_limit", "60" },
558 { "log_mark", "60" },
559 { "log_events", "" },
561 // admin-log-webmonitor
563 { "log_wmtype", "0" },
565 { "log_wmdmax", "300" },
566 { "log_wmsmax", "300" },
569 { "debug_nocommit", "0" },
570 { "debug_cprintf", "0" },
571 { "debug_cprintf_file", "0" },
572 // { "debug_keepfiles", "0" },
573 { "console_loglevel", "1" },
576 { "debug_clkfix", "1" },
577 { "debug_ddns", "0" },
585 { "jffs2_exec", "" },
589 { "usb_enable", "0" },
593 { "usb_irq_thresh", "0" },
594 { "usb_storage", "1" },
595 { "usb_printer", "1" },
596 { "usb_printer_bidirect", "0" },
597 { "usb_ext_opt", "" },
598 { "usb_fat_opt", "" },
599 { "usb_ntfs_opt", "" },
600 { "usb_fs_ext3", "1" },
601 { "usb_fs_fat", "1" },
603 { "usb_fs_ntfs", "1" },
605 { "usb_automount", "1" },
607 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
609 { "script_usbhotplug", "" },
610 { "script_usbmount", "" },
611 { "script_usbumount", "" },
616 { "ftp_enable", "0" },
617 { "ftp_super", "0" },
618 { "ftp_anonymous", "0" },
619 { "ftp_dirlist", "0" },
620 { "ftp_port", "21" },
622 { "ftp_ipmax", "0" },
623 { "ftp_staytimeout", "300" },
625 { "ftp_anonrate", "0" },
626 { "ftp_anonroot", "" },
627 { "ftp_pubroot", "" },
628 { "ftp_pvtroot", "" },
630 { "ftp_custom", "" },
631 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
632 { "ftp_limit", "0,3,60" },
636 #ifdef TCONFIG_SAMBASRV
638 { "smbd_enable", "0" },
639 { "smbd_wgroup", "WORKGROUP" },
640 { "smbd_master", "1" },
641 { "smbd_wins", "1" },
642 { "smbd_cpage", "" },
643 { "smbd_cset", "utf8" },
644 { "smbd_custom", "" },
645 { "smbd_autoshare", "2" },
647 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
649 { "smbd_user", "nas" },
650 { "smbd_passwd", "" },
653 #ifdef TCONFIG_MEDIA_SERVER
655 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
656 { "ms_dirs", "/mnt<" },
660 { "ms_stdlna", "0" },
670 { "sch_c1_cmd", "" },
671 { "sch_c2_cmd", "" },
672 { "sch_c3_cmd", "" },
675 { "script_init", "" },
676 { "script_shut", "" },
677 { "script_fire", " Restrict number of TCP connections per user #iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP # Restrict number of non-TCP connections per user #iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP # Restrict number of simltaneous SMTP connections (from mailer viruses) #iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP" },
678 { "script_wanup", "" },
680 #ifdef TCONFIG_OPENVPN
682 { "vpn_debug", "0" },
683 { "vpn_server_eas", "" },
684 { "vpn_server_dns", "" },
685 { "vpn_server1_poll", "0" },
686 { "vpn_server1_if", "tun" },
687 { "vpn_server1_proto", "udp" },
688 { "vpn_server1_port", "1194" },
689 { "vpn_server1_firewall", "auto" },
690 { "vpn_server1_crypt", "tls" },
691 { "vpn_server1_comp", "adaptive" },
692 { "vpn_server1_cipher", "default" },
693 { "vpn_server1_dhcp", "1" },
694 { "vpn_server1_r1", "192.168.1.50" },
695 { "vpn_server1_r2", "192.168.1.55" },
696 { "vpn_server1_sn", "10.8.0.0" },
697 { "vpn_server1_nm", "255.255.255.0" },
698 { "vpn_server1_local", "10.8.0.1" },
699 { "vpn_server1_remote", "10.8.0.2" },
700 { "vpn_server1_reneg", "-1" },
701 { "vpn_server1_hmac", "-1" },
702 { "vpn_server1_plan", "1" },
703 { "vpn_server1_ccd", "0" },
704 { "vpn_server1_c2c", "0" },
705 { "vpn_server1_ccd_excl", "0" },
706 { "vpn_server1_ccd_val", "" },
707 { "vpn_server1_pdns", "0" },
708 { "vpn_server1_rgw", "0" },
709 { "vpn_server1_custom", "" },
710 { "vpn_server1_static", "" },
711 { "vpn_server1_ca", "" },
712 { "vpn_server1_crt", "" },
713 { "vpn_server1_key", "" },
714 { "vpn_server1_dh", "" },
715 { "vpn_server2_poll", "0" },
716 { "vpn_server2_if", "tun" },
717 { "vpn_server2_proto", "udp" },
718 { "vpn_server2_port", "1194" },
719 { "vpn_server2_firewall", "auto" },
720 { "vpn_server2_crypt", "tls" },
721 { "vpn_server2_comp", "adaptive" },
722 { "vpn_server2_cipher", "default" },
723 { "vpn_server2_dhcp", "1" },
724 { "vpn_server2_r1", "192.168.1.50" },
725 { "vpn_server2_r2", "192.168.1.55" },
726 { "vpn_server2_sn", "10.8.0.0" },
727 { "vpn_server2_nm", "255.255.255.0" },
728 { "vpn_server2_local", "10.8.0.1" },
729 { "vpn_server2_remote", "10.8.0.2" },
730 { "vpn_server2_reneg", "-1" },
731 { "vpn_server2_hmac", "-1" },
732 { "vpn_server2_plan", "1" },
733 { "vpn_server2_ccd", "0" },
734 { "vpn_server2_c2c", "0" },
735 { "vpn_server2_ccd_excl", "0" },
736 { "vpn_server2_ccd_val", "" },
737 { "vpn_server2_pdns", "0" },
738 { "vpn_server2_rgw", "0" },
739 { "vpn_server2_custom", "" },
740 { "vpn_server2_static", "" },
741 { "vpn_server2_ca", "" },
742 { "vpn_server2_crt", "" },
743 { "vpn_server2_key", "" },
744 { "vpn_server2_dh", "" },
745 { "vpn_client_eas", "" },
746 { "vpn_client1_poll", "0" },
747 { "vpn_client1_if", "tun" },
748 { "vpn_client1_bridge", "1" },
749 { "vpn_client1_nat", "1" },
750 { "vpn_client1_proto", "udp" },
751 { "vpn_client1_addr", "" },
752 { "vpn_client1_port", "1194" },
753 { "vpn_client1_retry", "30" },
754 { "vpn_client1_rg", "0" },
755 { "vpn_client1_firewall", "auto" },
756 { "vpn_client1_crypt", "tls" },
757 { "vpn_client1_comp", "adaptive" },
758 { "vpn_client1_cipher", "default" },
759 { "vpn_client1_local", "10.8.0.2" },
760 { "vpn_client1_remote", "10.8.0.1" },
761 { "vpn_client1_nm", "255.255.255.0" },
762 { "vpn_client1_reneg", "-1" },
763 { "vpn_client1_hmac", "-1" },
764 { "vpn_client1_adns", "0" },
765 { "vpn_client1_rgw", "0" },
766 { "vpn_client1_gw", "" },
767 { "vpn_client1_custom", "" },
768 { "vpn_client1_static", "" },
769 { "vpn_client1_ca", "" },
770 { "vpn_client1_crt", "" },
771 { "vpn_client1_key", "" },
772 { "vpn_client2_poll", "0" },
773 { "vpn_client2_if", "tun" },
774 { "vpn_client2_bridge", "1" },
775 { "vpn_client2_nat", "1" },
776 { "vpn_client2_proto", "udp" },
777 { "vpn_client2_addr", "" },
778 { "vpn_client2_port", "1194" },
779 { "vpn_client2_retry", "30" },
780 { "vpn_client2_rg", "0" },
781 { "vpn_client2_firewall", "auto" },
782 { "vpn_client2_crypt", "tls" },
783 { "vpn_client2_comp", "adaptive" },
784 { "vpn_client2_cipher", "default" },
785 { "vpn_client2_local", "10.8.0.2" },
786 { "vpn_client2_remote", "10.8.0.1" },
787 { "vpn_client2_nm", "255.255.255.0" },
788 { "vpn_client2_reneg", "-1" },
789 { "vpn_client2_hmac", "-1" },
790 { "vpn_client2_adns", "0" },
791 { "vpn_client2_rgw", "0" },
792 { "vpn_client2_gw", "" },
793 { "vpn_client2_custom", "" },
794 { "vpn_client2_static", "" },
795 { "vpn_client2_ca", "" },
796 { "vpn_client2_crt", "" },
797 { "vpn_client2_key", "" },
804 { "ses_enable", "0" }, // enable ses
805 { "ses_event", "2" }, // initial ses event
806 { "ses_led_assertlvl", "0" }, // For SES II
807 { "ses_client_join", "0" }, // For SES II
808 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
809 { "ses_count", "0" },
810 { "eou_configured", "0" },
812 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
813 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
814 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
815 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
816 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
817 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
818 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
819 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
820 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
821 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
822 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
823 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
825 //obs zzz { "http_method", "post" }, // HTTP method
827 // { "wl_macmode1", "disabled" },
830 { "filter", "on" }, // Firewall Protection [on|off]
831 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
832 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
833 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
834 { "block_cookie", "0" }, // Block Cookie [1|0]
835 { "ident_pass", "0" }, // IDENT passthrough [1|0]
836 { "block_proxy", "0" }, // Block Proxy [1|0]
840 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
841 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
844 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
845 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
847 { "public_ip", "" }, // public ip
850 //forced in rc.c { "os_name", "" }, // OS name string
851 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
852 //forced in rc.c { "os_date", __DATE__ }, // OS date
853 //not used { "ct_modules", "" }, // CyberTAN kernel modules
854 //obs { "timer_interval", "3600" }, // Timer interval in seconds
855 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
856 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
857 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
858 //obs { "os_server", "" }, // URL for getting upgrades
859 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
860 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
861 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
862 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
863 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
864 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
865 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
866 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
867 //{ "eou_device_id", "" },
868 //{ "eou_public_key", "" },
869 //{ "eou_private_key", "" },
870 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
871 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
872 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
873 // { "ntp_enable", "1" }, // replaced with ntp_updates
874 // { "ntp_mode", "auto" }, // auto, manual
878 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
879 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
880 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
881 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
882 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
900 { "new_qoslimit_enable", "0" },
901 { "new_qoslimit_obw", "" },
902 { "new_qoslimit_ibw", "" },
903 { "new_qoslimit_rules", "" },
904 { "qosl_enable", "0" },
905 { "qosl_tcp", "0" },//unlimited
906 { "qosl_udp", "0" },//unlimited
913 { "new_arpbind_enable", "0" },
914 { "new_arpbind_only", "0" },
915 { "new_arpbind_list", "" },
920 const defaults_t if_generic
[] = {
921 { "lan_ifname", "br0" },
922 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
923 { "wan_ifname", "eth1" },
924 { "wan_ifnames", "eth1" },
928 const defaults_t if_vlan
[] = {
929 { "lan_ifname", "br0" },
930 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
931 { "wan_ifname", "vlan1" },
932 { "wan_ifnames", "vlan1" },