3 Copyright 2003, CyberTAN Inc.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
39 //! = see restore_main()
41 const defaults_t defaults
[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //Barry add 2004 09 16
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wds_enable", "0" }, // WDS Enable (0|1)
65 //! { "wan_ifname", "" }, // WAN interface name
66 //! { "wan_ifnames", "" }, // WAN interface names
67 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
68 { "wan_hwaddr", "" }, // WAN interface MAC address
69 { "wan_ifnameX", NULL
}, // real wan if; see wan.c:start_wan
71 // WAN TCP/IP parameters
72 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
73 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
74 { "wan_netmask", "0.0.0.0" }, // WAN netmask
75 { "wan_gateway", "0.0.0.0" }, // WAN gateway
76 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
77 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
78 { "wan_lease", "86400" }, // WAN lease time in seconds
81 { "wan_primary", "1" }, // Primary wan connection
82 { "wan_unit", "0" }, // Last configured connection
85 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
86 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
87 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
89 { "filter", "on" }, // [on | off] Firewall Protection
92 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
94 // DHCP server parameters
95 { "dhcp_start", "100" }, //
96 { "dhcp_num", "50" }, //
97 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
98 { "dhcpd_endip", "" }, // "
99 { "dhcp_lease", "0" }, // LAN lease time in minutes
100 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
101 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
105 { "pppoe_ifname", "" }, // PPPoE enslaved interface
106 { "ppp_username", "" }, // PPP username
107 { "ppp_passwd", "" }, // PPP password
108 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
109 { "ppp_keepalive", "0" }, // Restore link automatically
110 { "ppp_demand", "0" }, // Dial on demand
111 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
112 { "ppp_mru", "1500" }, // Negotiate MRU to this value
113 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
114 { "ppp_service", "" }, // PPPoE service name
115 { "ppp_ac", "" }, // PPPoE access concentrator name
116 { "ppp_static", "0" }, // Enable / Disable Static IP
117 { "ppp_static_ip", "" }, // PPPoE Static IP
118 { "ppp_get_ac", "" }, // PPPoE Server ac name
119 { "ppp_get_srv", "" }, // PPPoE Server service name
124 // Wireless parameters
125 { "wl_ifname", "" }, // Interface name
126 { "wl_hwaddr", "" }, // MAC address
127 { "wl_phytype", "g" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
128 { "wl_corerev", "" }, // Current core revision
129 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
130 { "wl_radioids", "" }, // List of radio IDs
131 { "wl_ssid", "wireless" }, // Service set ID (network name)
132 { "wl_country", "JP" }, // Country (default obtained from driver)
133 { "wl_country_code", "JP" }, // !!TB - Country (default to JP to allow all 14 channels)
134 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
135 { "wl_closed", "0" }, // Closed (hidden) network
136 { "wl_ap_isolate", "0" }, // AP isolate mode
137 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
138 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
139 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
140 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
141 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
142 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
143 { "wl_key", "1" }, // Current WEP key
144 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
145 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
146 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
147 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
148 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
149 { "wl_channel", "6" }, // Channel number
150 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
151 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
152 { "wl_rateset", "default" }, // "default" or "all" or "12"
153 { "wl_frag", "2346" }, // Fragmentation threshold
154 { "wl_rts", "2347" }, // RTS threshold
155 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
156 { "wl_bcn", "100" }, // Beacon interval
157 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
158 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
159 { "wl_gmode", "1" }, // 54g mode
160 { "wl_gmode_protection","off" }, // 802.11g RTS/CTS protection (off|auto)
161 { "wl_afterburner", "off" }, // AfterBurner
162 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
163 { "wl_wme", "off" }, // WME mode (off|on)
164 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
165 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
166 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
167 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
169 { "wl_passphrase", "" }, // Passphrase // Add
170 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
171 { "wl_wep_buf", "" }, // save all settings for web // Add
172 { "wl_wep_gen", "" }, // save all settings for generate button // Add
173 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
174 { "wl_active_mac", "" }, // xx:xx:xx:xx:xx:xx ... // Add
177 { "security_mode2", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
178 { "security_mode", "disabled" }, // WPA mode (disabled|radius|wpa|psk|wep|psk psk2|wpa wpa2) for WEB // Add
179 { "security_mode_last", "" }, // Save last WPA mode // Add
180 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
181 { "wl_wpa_psk", "" }, // WPA pre-shared key
182 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
183 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
184 { "wl_radius_key", "" }, // RADIUS shared secret
185 { "wl_radius_port", "1812" }, // RADIUS server UDP port
186 { "wl_crypto", "tkip" }, // WPA data encryption
187 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
188 { "wl_akm", "" }, // WPA akm list
191 // EDCA parameters for STA
192 { "wl_wme_sta_bk", "15 1023 7 0 0 off" }, // WME STA AC_BK paramters
193 { "wl_wme_sta_be", "15 1023 3 0 0 off" }, // WME STA AC_BE paramters
194 { "wl_wme_sta_vi", "7 15 2 6016 3008 off" }, // WME STA AC_VI paramters
195 { "wl_wme_sta_vo", "3 7 2 3264 1504 off" }, // WME STA AC_VO paramters
197 // EDCA parameters for AP
198 { "wl_wme_ap_bk", "15 1023 7 0 0 off" }, // WME AP AC_BK paramters
199 { "wl_wme_ap_be", "15 63 3 0 0 off" }, // WME AP AC_BE paramters
200 { "wl_wme_ap_vi", "7 15 1 6016 3008 off" }, // WME AP AC_VI paramters
201 { "wl_wme_ap_vo", "3 7 1 3264 1504 off" }, // WME AP AC_VO paramters
203 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
205 { "wl_unit", "0" }, // Last configured interface
206 { "wl_mac_deny", "" }, // filter MAC // Add
208 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
209 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
210 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
212 { "pptp_server_ip", "" }, // as same as WAN gateway
213 { "pptp_get_ip", "" }, // IP Address assigned by PPTP server
216 { "mtu_enable", "0" }, // WAN MTU [1|0]
217 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
219 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
220 { "l2tp_get_ip", "" }, // IP Address assigned by L2TP server
221 { "wan_gateway_buf", "0.0.0.0" }, // save the default gateway for DHCP
222 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
223 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
226 { "t_noise", "-99" },
227 { "led_override", "" },
228 { "btn_override", "" },
231 { "manual_boot_nv", "0" },
233 // { "wlx_hperx", "" }, // see init.c
239 { "ddnsx0_cache", "" },
240 { "ddnsx1_cache", "" },
241 { "ddnsx_save", "1" },
242 { "ddnsx_refresh", "28" },
248 { "router_name", "tomato" },
249 { "wan_hostname", "unknown" },
250 { "wan_domain", "" },
253 { "tm_sel", "PST8PDT,M3.2.0/2,M11.1.0/2" },
254 { "tm_tz", "PST8PDT,M3.2.0/2,M11.1.0/2" },
256 { "ntp_updates", "4" },
258 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
260 { "ntp_kiss_ignore", "" },
263 { "dhcpd_static", "" },
266 { "wl_mac_list", "" },
267 { "wl_macmode", "disabled" },
271 { "ct_tcp_timeout", "" },
272 { "ct_udp_timeout", "" },
273 { "ct_timeout", "" },
279 { "ct_hashsize", "" },
291 { "boot_wait", "on" },
292 { "wait_time", "5" },
293 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
294 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
295 { "jumbo_frame_size", "2000" },
298 { "dhcpd_dmdns", "1" },
299 { "dhcpd_slt", "0" },
300 { "dhcpd_gwmode", "" },
301 { "dhcpd_lmax", "" },
302 { "dns_addget", "0" },
303 { "dns_intcpt", "0" },
304 { "dhcpc_minpkt", "0" },
305 { "dnsmasq_custom", "" },
306 // { "dnsmasq_norw", "0" },
309 // { "block_loopback", "0" }, // nat loopback
310 { "nf_loopback", "1" },
311 { "block_wan", "1" }, // block inbound icmp
312 { "multicast_pass", "0" }, // enable multicast proxy
313 { "ne_syncookies", "0" }, // tcp_syncookies
314 { "ne_shlimit", "0,3,60" },
317 { "routes_static", "" },
318 { "wk_mode", "gateway" }, // Network mode [gateway|router]
320 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
321 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
322 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
323 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
324 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
329 { "wl_txpwr", "42" },
330 { "wl_maxassoc", "128" }, // Max associations driver could support
331 { "wl_distance", "" },
334 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
335 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
336 { "dmz_enable", "0" },
337 { "dmz_ipaddr", "0" },
341 { "upnp_enable", "1" },
342 { "upnp_secure", "1" },
343 { "upnp_port", "5000" },
344 #if 0 // disabled for miniupnpd
345 { "upnp_ssdp_interval", "60" }, // SSDP interval
346 { "upnp_max_age", "180" }, // Max age
348 { "upnp_config", "0" },
352 { "qos_enable", "0" },
358 { "qos_reset", "0" },
359 { "qos_obw", "230" },
360 { "qos_ibw", "1000" },
361 { "qos_orules", "0<<6<d<80,443<0<<0:512<1<WWW>0<<6<d<80,443<0<<512:<3<WWW (512K+)>0<<-1<d<53<0<<0:2<0<DNS>0<<-1<d<53<0<<2:<4<DNS (2K+)>0<<-1<d<1024:65535<0<<<4<Bulk Traffic" },
362 { "qos_burst0", "" },
363 { "qos_burst1", "" },
365 { "qos_default", "3" },
366 { "qos_orates", "80-100,10-100,5-100,3-100,2-95,1-50,1-40,1-30,1-20,1-10" },
368 { "ne_vegas", "0" }, // TCP Vegas
369 { "ne_valpha", "2" }, // "
370 { "ne_vbeta", "6" }, // "
371 { "ne_vgamma", "2" }, // "
373 // access restrictions
375 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
376 //* { "rrule##", "" },
377 { "rrulewp", "80,8080" },
383 { "smbd_wgroup", "WORKGROUP" },
384 { "smbd_nbname", "TOMATO" },
385 { "smbd_adminpass", "admin" },
389 { "http_username", "" }, // Username
390 { "http_passwd", "admin" }, // Password
391 { "remote_management", "0" }, // Remote Management [1|0]
392 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
393 { "http_wanport", "8080" }, // WAN port to listen on
394 { "http_lanport", "80" }, // LAN port to listen on
395 { "https_lanport", "443" }, // LAN port to listen on
396 { "http_enable", "1" }, // HTTP server enable/disable
397 { "https_enable", "0" }, // HTTPS server enable/disable
398 { "https_crt_save", "0" },
399 { "https_crt_cn", "" },
400 { "https_crt_file", "" },
402 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
403 { "web_css", "tomato" },
405 { "telnetd_eas", "1" },
406 { "telnetd_port", "23" },
408 { "sshd_pass", "1" },
409 { "sshd_port", "22" },
410 { "sshd_remote", "0" },
411 { "sshd_rport", "2222" },
412 { "sshd_authkeys", "" },
413 { "sshd_hostkey", "" },
414 { "sshd_forwarding", "1" },
415 { "rmgt_sip", "" }, // remote management: source ip address
422 { "rstats_enable", "1" },
423 { "rstats_path", "" },
424 { "rstats_stime", "48" },
425 { "rstats_offset", "1" },
426 { "rstats_data", "" },
427 { "rstats_colors", "" },
428 { "rstats_exclude", "" },
429 { "rstats_sshut", "1" },
430 { "rstats_bak", "0" },
439 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
442 "if [ ! -e /tmp/switch-start ]; then\n"
443 " # do something at startup\n"
444 " echo position at startup was $1 >/tmp/switch-start\n"
447 "if [ $1 = \"bridge\" ]; then\n"
450 "elif [ $1 = \"auto\" ]; then\n"
457 { "log_remote", "0" },
458 { "log_remoteip", "" },
459 { "log_remoteport", "514" },
461 { "log_limit", "60" },
464 { "log_mark", "60" },
465 { "log_events", "" },
468 { "debug_nocommit", "0" },
469 { "debug_cprintf", "0" },
470 { "debug_cprintf_file", "0" },
471 // { "debug_keepfiles", "0" },
472 { "console_loglevel", "1" },
475 { "debug_clkfix", "1" },
476 { "debug_ddns", "0" },
484 { "jffs2_exec", "" },
488 { "usb_enable", "0" },
492 { "usb_storage", "1" },
493 { "usb_printer", "1" },
494 { "usb_printer_bidirect", "1" },
495 { "usb_fs_ext3", "1" },
496 { "usb_fs_fat", "1" },
498 { "usb_fs_ntfs", "1" },
500 { "usb_automount", "1" },
502 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
504 { "script_usbhotplug", "" },
505 { "script_usbmount", "" },
506 { "script_usbumount", "" },
511 { "ftp_enable", "0" },
512 { "ftp_super", "0" },
513 { "ftp_anonymous", "0" },
514 { "ftp_dirlist", "0" },
515 { "ftp_port", "21" },
517 { "ftp_ipmax", "0" },
518 { "ftp_staytimeout", "300" },
520 { "ftp_anonrate", "0" },
521 { "ftp_anonroot", "" },
522 { "ftp_pubroot", "" },
523 { "ftp_pvtroot", "" },
525 { "ftp_custom", "" },
526 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
527 { "ftp_limit", "0,3,60" },
531 #ifdef TCONFIG_SAMBASRV
533 { "smbd_enable", "0" },
534 { "smbd_wgroup", "WORKGROUP" },
535 { "smbd_master", "1" },
536 { "smbd_wins", "1" },
537 { "smbd_cpage", "" },
538 { "smbd_cset", "utf8" },
539 { "smbd_loglevel", "0" },
540 { "smbd_custom", "" },
541 { "smbd_autoshare", "1" },
543 "share</mnt<Default Share<0<0>root$</<Hidden Root<0<1"
545 { "smbd_user", "nas" },
546 { "smbd_passwd", "" },
555 { "sch_c1_cmd", "" },
556 { "sch_c2_cmd", "" },
557 { "sch_c3_cmd", "" },
560 { "script_init", "" },
561 { "script_shut", "" },
562 { "script_fire", "" },
563 { "script_wanup", "" },
569 { "ses_enable", "0" }, // enable ses
570 { "ses_event", "2" }, // initial ses event
571 { "ses_led_assertlvl", "0" }, // For SES II
572 { "ses_client_join", "0" }, // For SES II
573 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
574 { "ses_count", "0" },
575 { "eou_configured", "0" },
577 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
578 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
579 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
580 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
581 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
582 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
583 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
584 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
585 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
586 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
587 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
588 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
590 //obs zzz { "http_method", "post" }, // HTTP method
592 // { "wl_macmode1", "disabled" },
595 { "filter", "on" }, // Firewall Protection [on|off]
596 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
597 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
598 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
599 { "block_cookie", "0" }, // Block Cookie [1|0]
600 { "ident_pass", "0" }, // IDENT passthrough [1|0]
601 { "block_proxy", "0" }, // Block Proxy [1|0]
605 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
606 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
609 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
610 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
612 { "public_ip", "" }, // public ip
615 //forced in rc.c { "os_name", "" }, // OS name string
616 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
617 //forced in rc.c { "os_date", __DATE__ }, // OS date
618 //not used { "ct_modules", "" }, // CyberTAN kernel modules
619 //obs { "timer_interval", "3600" }, // Timer interval in seconds
620 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
621 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
622 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
623 //obs { "os_server", "" }, // URL for getting upgrades
624 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
625 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
626 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
627 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
628 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
629 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
630 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
631 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
632 //{ "eou_device_id", "" },
633 //{ "eou_public_key", "" },
634 //{ "eou_private_key", "" },
635 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
636 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
637 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
638 // { "ntp_enable", "1" }, // replaced with ntp_updates
639 // { "ntp_mode", "auto" }, // auto, manual
643 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
644 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
645 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
646 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
647 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
667 const defaults_t if_generic
[] = {
668 { "lan_ifname", "br0" },
669 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
670 { "wan_ifname", "eth1" },
671 { "wan_ifnames", "eth1" },
675 const defaults_t if_vlan
[] = {
676 { "lan_ifname", "br0" },
677 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
678 { "wan_ifname", "vlan1" },
679 { "wan_ifnames", "vlan1" },