3 Copyright 2003, CyberTAN Inc.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
39 //! = see restore_main()
41 const defaults_t defaults
[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //start with ENABLED dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
65 { "lan1_ipaddr", "" },
66 { "lan1_netmask", "" },
68 { "lan2_ipaddr", "" },
69 { "lan2_netmask", "" },
71 { "lan3_ipaddr", "" },
72 { "lan3_netmask", "" },
77 //! { "wan_ifname", "" }, // WAN interface name
78 //! { "wan_ifnames", "" }, // WAN interface names
79 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
80 { "wan_hwaddr", "" }, // WAN interface MAC address
81 { "wan_ifnameX", NULL
}, // real wan if; see wan.c:start_wan
83 // WAN TCP/IP parameters
84 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
85 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
86 { "wan_netmask", "0.0.0.0" }, // WAN netmask
87 { "wan_gateway", "0.0.0.0" }, // WAN gateway
88 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
89 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
90 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
91 { "wan_lease", "86400" }, // WAN lease time in seconds
93 { "modem_ipaddr", "0.0.0.0" }, // modem IP address (i.e. PPPoE bridged modem)
95 { "wan_primary", "1" }, // Primary wan connection
96 { "wan_unit", "0" }, // Last configured connection
99 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
100 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
101 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
103 { "filter", "on" }, // [on | off] Firewall Protection
106 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
108 // DHCP server parameters
109 { "dhcp_start", "100" }, //
110 { "dhcp_num", "50" }, //
111 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
112 { "dhcpd_endip", "" }, // "
113 { "dhcp_lease", "0" }, // LAN lease time in minutes
114 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
115 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
116 { "wan_routes", "" },
117 { "wan_msroutes", "" },
120 { "dhcp1_start", "" },
122 { "dhcpd1_startip", "" },
123 { "dhcpd1_endip", "" },
124 { "dhcp1_lease", "0" },
125 { "dhcp2_start", "" },
127 { "dhcpd2_startip", "" },
128 { "dhcpd2_endip", "" },
129 { "dhcp2_lease", "0" },
130 { "dhcp3_start", "" },
132 { "dhcpd3_startip", "" },
133 { "dhcpd3_endip", "" },
134 { "dhcp3_lease", "0" },
139 { "modem_dev", "USB0" },
140 { "modem_init", "*99#" },
141 { "modem_apn", "internet" },
144 { "pppoe_ifname", "" }, // PPPoE enslaved interface
145 { "ppp_username", "" }, // PPP username
146 { "ppp_passwd", "" }, // PPP password
147 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
148 { "ppp_keepalive", "0" }, // Restore link automatically
149 { "ppp_demand", "0" }, // Dial on demand
150 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
151 { "ppp_mru", "1500" }, // Negotiate MRU to this value
152 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
153 { "ppp_service", "" }, // PPPoE service name
154 { "ppp_ac", "" }, // PPPoE access concentrator name
155 { "ppp_static", "0" }, // Enable / Disable Static IP
156 { "ppp_static_ip", "" }, // PPPoE Static IP
157 { "ppp_get_ac", "" }, // PPPoE Server ac name
158 { "ppp_get_srv", "" }, // PPPoE Server service name
159 { "ppp_custom", "" }, // PPPD additional options
160 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
167 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
168 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
169 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
170 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
171 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
172 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
173 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
174 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
175 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
176 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
177 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
178 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
179 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
180 { "ipv6_dns", "" }, // DNS server(s) IPs
181 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
184 // Wireless parameters
185 { "wl_ifname", "" }, // Interface name
186 { "wl_hwaddr", "" }, // MAC address
187 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
188 { "wl_corerev", "" }, // Current core revision
189 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
190 { "wl_radioids", "" }, // List of radio IDs
191 { "wl_ssid", "wireless" }, // Service set ID (network name)
192 { "wl1_ssid", "wireless1" },
193 { "wl_country_code", "" }, // Country (default obtained from driver)
194 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
195 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
196 { "wl_closed", "0" }, // Closed (hidden) network
197 { "wl_ap_isolate", "0" }, // AP isolate mode
198 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
199 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
200 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
201 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
202 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
203 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
204 { "wl_key", "1" }, // Current WEP key
205 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
206 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
207 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
208 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
209 { "wl_channel", "1" }, // Channel number
210 { "wl1_channel", "0" },
211 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
212 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
213 { "wl_rateset", "default" }, // "default" or "all" or "12"
214 { "wl_frag", "2346" }, // Fragmentation threshold
215 { "wl_rts", "2347" }, // RTS threshold
216 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
217 { "wl_bcn", "100" }, // Beacon interval
218 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
219 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
220 { "wl_gmode", "1" }, // 54g mode
221 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
222 { "wl_afterburner", "off" }, // AfterBurner
223 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
224 { "wl_wme", "auto" }, // WME mode (auto|off|on)
225 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
226 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
227 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
228 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
229 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
230 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3|4) //Toastman - 0=off
231 { "wl_passphrase", "" }, // Passphrase // Add
232 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
233 { "wl_wep_buf", "" }, // save all settings for web // Add
234 { "wl_wep_gen", "" }, // save all settings for generate button // Add
235 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
238 { "wl_vifs", "" }, // multiple/virtual BSSIDs
242 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
243 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
244 { "wl_wpa_psk", "" }, // WPA pre-shared key
245 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
246 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
247 { "wl_radius_key", "" }, // RADIUS shared secret
248 { "wl_radius_port", "1812" }, // RADIUS server UDP port
249 { "wl_crypto", "aes" }, // WPA data encryption
250 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
251 { "wl_akm", "" }, // WPA akm list
253 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
254 // EDCA parameters for STA
255 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
256 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
257 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
258 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
260 // EDCA parameters for AP
261 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
262 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
263 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
264 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
266 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
267 { "wl_wme_apsd", "off" }, // WME APSD mode
268 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
270 /* Per AC Tx parameters */
271 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
272 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
273 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
274 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
276 { "wl_unit", "0" }, // Last configured interface
277 { "wl_mac_deny", "" }, // filter MAC // Add
279 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
280 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
281 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
284 { "wl_nmode", "-1" }, // N-mode
285 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
286 { "wl1_nband", "1" },
287 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
288 { "wl_nreqd", "0" }, // Require 802.11n support
289 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
290 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
291 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
292 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
293 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
294 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
295 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
296 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
297 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
298 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
299 { "wl_bcn_rotate", "1" }, // Beacon rotation
300 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
301 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
304 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
305 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
306 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
307 { "emf_enable", "0" }, // Disable EMF by default
311 { "wl_ampdu", "auto" }, // Default AMPDU setting
312 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
313 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
314 { "wl_amsdu", "auto" }, // Default AMSDU setting
316 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
317 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
318 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
319 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
320 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
321 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
322 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
324 { "wl_wmf_bss_enable", "0" }, // Wireless Multicast Forwarding Enable/Disable
325 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
326 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
327 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
330 { "pptp_server_ip", "" }, // as same as WAN gateway
331 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
332 { "pptp_dhcp", "1" },
335 { "mtu_enable", "0" }, // WAN MTU [1|0]
336 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
338 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
339 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
340 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
343 { "wl_tnoise", "-99" },
344 { "led_override", "" },
345 { "btn_override", "" },
348 { "manual_boot_nv", "0" },
349 // { "wlx_hpamp", "" },
350 // { "wlx_hperx", "" }, // see init.c
356 { "ddnsx0_cache", "" },
357 { "ddnsx1_cache", "" },
358 { "ddnsx_save", "1" },
359 { "ddnsx_refresh", "28" },
362 { "router_name", "tomato" },
363 { "wan_hostname", "unknown" },
364 { "wan_domain", "" },
367 { "tm_sel", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
368 { "tm_tz", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
370 { "ntp_updates", "4" },
372 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
374 { "ntp_kiss_ignore", "" },
377 { "dhcpd_static", "" },
378 { "arpbind_listed", "0" }, // AB - Enable static ARP for all devices on list
381 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
382 { "wl_macmode", "disabled" },
386 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
387 { "ct_udp_timeout", "30 180" },
388 { "ct_timeout", "10 10" },
389 { "ct_max", "8192" },
394 { "ct_hashsize", "2048" },
407 { "wl_macaddr", "" },
410 { "boot_wait", "on" },
411 { "wait_time", "5" },
412 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
413 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
414 { "jumbo_frame_size", "2000" },
416 { "ctf_disable", "1" },
420 { "dhcpd_dmdns", "1" },
421 { "dhcpd_slt", "0" },
422 { "dhcpd_gwmode", "" },
423 { "dhcpd_lmax", "" },
424 { "dns_addget", "0" },
425 { "dns_intcpt", "0" },
426 { "dhcpc_minpkt", "1" },
427 { "dhcpc_custom", "" },
428 { "dns_norebind", "1" },
429 { "dnsmasq_custom", "" },
430 { "dhcpd_static_only", "0" },
431 // { "dnsmasq_norw", "0" },
434 // { "block_loopback", "0" }, // nat loopback
435 { "nf_loopback", "0" },
436 { "block_wan", "1" }, // block inbound icmp
437 { "multicast_pass", "0" }, // enable multicast proxy
439 { "multicast_lan", "0" }, // on LAN (br0)
440 { "multicast_lan1", "0" }, // on LAN1 (br1)
441 { "multicast_lan2", "0" }, // on LAN2 (br2)
442 { "multicast_lan3", "0" }, // on LAN3 (br3)
444 { "udpxy_enable", "0" },
445 { "udpxy_stats", "0" },
446 { "udpxy_clients", "3" },
447 { "udpxy_port", "4022" },
448 { "ne_syncookies", "0" }, // tcp_syncookies
449 { "ne_snat", "0" }, // use SNAT instead of MASQUERADE
450 { "dhcp_pass", "1" }, // allow DHCP responses
451 { "ne_shlimit", "0,3,60" },
454 { "routes_static", "" },
455 { "dhcp_routes", "1" },
456 { "wk_mode", "gateway" }, // Network mode [gateway|router]
458 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
459 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
460 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
462 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
463 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
464 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
465 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
466 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
467 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
469 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
470 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
474 { "trunk_vlan_so", "0" }, // VLAN trunk support override
478 { "wl_txpwr", "0" }, // 0 = driver default power
479 { "wl_maxassoc", "128" }, // Max associations driver could support
480 { "wl_bss_maxassoc", "128" },
481 { "wl_distance", "" },
484 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
486 { "ipv6_portforward", ""},
488 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
489 { "dmz_enable", "0" },
490 { "dmz_ipaddr", "0" },
494 { "upnp_enable", "3" },
495 { "upnp_secure", "1" },
496 { "upnp_port", "0" },
497 { "upnp_ssdp_interval", "60" }, // SSDP interval
498 { "upnp_max_age", "180" }, // Max age
500 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
501 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
502 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
503 #if 0 // disabled for miniupnpd
504 { "upnp_max_age", "180" }, // Max age
505 { "upnp_config", "0" },
509 { "qos_enable", "0" },
516 { "qos_reset", "1" },
517 { "qos_obw", "700" },
518 { "qos_ibw", "16000" },
519 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<-1<d<123<0<<0:10<<0<Network Time (NTP)>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<x<9<0<<<<0<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<0<RPC (Microsoft)>0<<6<x<23,992<0<<<<0<Telnet>0<<-1<d<22<0<<<<0<SSH>0<<17<x<3544<0<<<<3<Teredo port>0<<6<s<80,8080<0<<<<3<Remote Router Access>0<<6<x<3389<0<<<<3<Remote Assistance>0<<-1<a<<0<flash<<<2<Flash Video, (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video, (Youtube)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<s<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<6<x<6005<0<<<<2<Camfrog>0<<-1<d<1220,1234,5100,6005,6970<0<<<<-1<VLC>0<<-1<x<554,5004,5005<0<<<<2<RTP/RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<x<1935<0<<<<2<RTMP>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<d<1718:1720<0<<<<1<H323>0<<-1<a<<0<skypetoskype<<<1<Skype>0<<-1<a<<0<skypeout<<<1<Skypeout>0<<-1<d<80<0<<0:512<<4<HTTP>0<<-1<d<443<0<<0:512<<4<HTTPS>0<<6<d<8080<0<<0:512<<4<HTTP Proxy / Alternate>0<<-1<d<25,587,465<0<<<<5<SMTP, Submission>0<<-1<d<110,995<0<<<<5<POP3 Mail>0<<-1<d<119,563<0<<<<5<NNTP>0<<-1<d<143,220,585,993<0<<<<5<IMAP Mail>0<<-1<a<<0<irc<<<6<IRC>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<Yahoo Messenger>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<Other Chat Services>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<-1<x<6571,6891:6901<0<<<<7<WLM File/Webcam>0<<6<d<80,443,8080<0<<512:<<7<HTTP,SSL File Transfers>0<<17<x<1:65535<0<<<<-1<P2P (uTP, UDP)" },
520 { "qos_burst0", "" },
521 { "qos_burst1", "" },
522 { "qos_default", "8" },
523 { "qos_orates", "5-20,5-20,5-25,5-70,20-100,5-80,5-80,5-80,5-50,1-5" },
524 { "qos_irates", "5-100,5-100,5-100,5-100,20-100,5-100,5-100,5-100,5-100,1-5" },
525 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger Download P2P/Bulk Crawl" },
527 { "ne_vegas", "0" }, // TCP Vegas
528 { "ne_valpha", "3" }, // "
529 { "ne_vbeta", "3" }, // "
530 { "ne_vgamma", "2" }, // "
533 { "qosl_enable", "0" },
534 // { "qosl_obw", "" }, unused - used qos_obw
535 // { "qosl_ibw", "" }, unused - used qos_obw
536 { "qosl_rules", "" },
537 { "qosl_denable", "0" },
538 { "qosl_dtcp", "0" },//unlimited
539 { "qosl_dudp", "0" },//unlimited
545 // access restrictions
547 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
548 //* { "rrule##", "" },
549 { "rrulewp", "80,8080" },
555 { "smbd_wgroup", "WORKGROUP" },
556 { "smbd_nbname", "TOMATO" },
557 { "smbd_adminpass", "admin" },
561 { "http_username", "" }, // Username
562 { "http_passwd", "admin" }, // Password
563 { "remote_management", "0" }, // Remote Management [1|0]
564 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
565 { "http_wanport", "8080" }, // WAN port to listen on
566 { "http_lanport", "80" }, // LAN port to listen on
567 { "https_lanport", "443" }, // LAN port to listen on
568 { "http_enable", "1" }, // HTTP server enable/disable
569 { "https_enable", "0" }, // HTTPS server enable/disable
570 { "https_crt_save", "0" },
571 { "https_crt_cn", "" },
572 { "https_crt_file", "" },
574 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
575 { "web_css", "tomato" },
577 { "telnetd_eas", "1" },
578 { "telnetd_port", "23" },
580 { "sshd_pass", "1" },
581 { "sshd_port", "22" },
582 { "sshd_remote", "0" },
583 { "sshd_rport", "2222" },
584 { "sshd_authkeys", "" },
585 { "sshd_hostkey", "" },
586 { "sshd_dsskey", "" },
587 { "sshd_forwarding", "1" },
588 { "rmgt_sip", "" }, // remote management: source ip address
595 { "rstats_enable", "1" },
596 { "rstats_path", "" },
597 { "rstats_stime", "48" },
598 { "rstats_offset", "1" },
599 { "rstats_data", "" },
600 { "rstats_colors", "" },
601 { "rstats_exclude", "" },
602 { "rstats_sshut", "1" },
603 { "rstats_bak", "0" },
606 { "cstats_enable", "1" },
607 { "cstats_path", "" },
608 { "cstats_stime", "48" },
609 { "cstats_offset", "1" },
610 { "cstats_labels", "0" },
611 { "cstats_exclude", "" },
612 { "cstats_include", "" },
613 { "cstats_all", "1" },
614 { "cstats_sshut", "1" },
615 { "cstats_bak", "0" },
624 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
627 "if [ ! -e /tmp/switch-start ]; then\n"
628 " # do something at startup\n"
629 " echo position at startup was $1 >/tmp/switch-start\n"
632 "if [ $1 = \"bridge\" ]; then\n"
635 "elif [ $1 = \"auto\" ]; then\n"
642 { "log_remote", "0" },
643 { "log_remoteip", "" },
644 { "log_remoteport", "514" },
646 { "log_file_custom", "0" },
647 { "log_file_path", "/var/log/messages"},
648 { "log_file_size", "50" },
649 { "log_file_keep", "1" },
650 { "log_limit", "60" },
653 { "log_mark", "60" },
654 { "log_events", "" },
656 // admin-log-webmonitor
658 { "log_wmtype", "0" },
660 { "log_wmdmax", "300" },
661 { "log_wmsmax", "300" },
664 { "debug_nocommit", "0" },
665 { "debug_cprintf", "0" },
666 { "debug_cprintf_file", "0" },
667 // { "debug_keepfiles", "0" },
668 { "console_loglevel", "1" },
671 { "debug_clkfix", "1" },
672 { "debug_ddns", "0" },
680 { "jffs2_exec", "" },
684 { "usb_enable", "0" },
688 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
691 { "usb_irq_thresh", "0" },
692 { "usb_storage", "1" },
693 { "usb_printer", "1" },
694 { "usb_printer_bidirect", "0" },
695 { "usb_ext_opt", "" },
696 { "usb_fat_opt", "" },
697 { "usb_ntfs_opt", "" },
698 { "usb_fs_ext3", "1" },
699 { "usb_fs_fat", "1" },
701 { "usb_fs_ntfs", "1" },
703 { "usb_fs_hfs", "0" }, //!Victek
704 { "usb_fs_hfsplus", "0" }, //!Victek
705 { "usb_automount", "1" },
707 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
709 { "script_usbhotplug", "" },
710 { "script_usbmount", "" },
711 { "script_usbumount", "" },
712 { "idle_enable", "0" },
718 { "ftp_enable", "0" },
719 { "ftp_super", "0" },
720 { "ftp_anonymous", "0" },
721 { "ftp_dirlist", "0" },
722 { "ftp_port", "21" },
724 { "ftp_ipmax", "0" },
725 { "ftp_staytimeout", "300" },
727 { "ftp_anonrate", "0" },
728 { "ftp_anonroot", "" },
729 { "ftp_pubroot", "" },
730 { "ftp_pvtroot", "" },
732 { "ftp_custom", "" },
733 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
734 { "ftp_limit", "0,3,60" },
739 { "snmp_enable", "0" },
740 { "snmp_location", "router" },
741 { "snmp_contact", "admin@tomato" },
742 { "snmp_ro", "rocommunity" },
745 #ifdef TCONFIG_SAMBASRV
747 { "smbd_enable", "0" },
748 { "smbd_wgroup", "WORKGROUP" },
749 { "smbd_master", "1" },
750 { "smbd_wins", "1" },
751 { "smbd_cpage", "" },
752 { "smbd_cset", "utf8" },
753 { "smbd_custom", "" },
754 { "smbd_autoshare", "2" },
756 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
758 { "smbd_user", "nas" },
759 { "smbd_passwd", "" },
762 #ifdef TCONFIG_MEDIA_SERVER
764 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
765 { "ms_dirs", "/mnt<" },
769 { "ms_stdlna", "0" },
779 { "sch_c1_cmd", "" },
780 { "sch_c2_cmd", "" },
781 { "sch_c3_cmd", "" },
784 { "script_init", "" },
785 { "script_shut", "" },
786 { "script_fire", "#Restrict number of TCP connections per user #iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP #Restrict number of non-TCP connections per user #iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP #Restrict number of simltaneous SMTP connections (from mailer viruses) #iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP" },
787 { "script_wanup", "" },
790 #ifdef TCONFIG_OPENVPN
792 { "vpn_debug", "0" },
793 { "vpn_server_eas", "" },
794 { "vpn_server_dns", "" },
795 { "vpn_server1_poll", "0" },
796 { "vpn_server1_if", "tun" },
797 { "vpn_server1_proto", "udp" },
798 { "vpn_server1_port", "1194" },
799 { "vpn_server1_firewall", "auto" },
800 { "vpn_server1_crypt", "tls" },
801 { "vpn_server1_comp", "adaptive" },
802 { "vpn_server1_cipher", "default" },
803 { "vpn_server1_dhcp", "1" },
804 { "vpn_server1_r1", "192.168.1.50" },
805 { "vpn_server1_r2", "192.168.1.55" },
806 { "vpn_server1_sn", "10.8.0.0" },
807 { "vpn_server1_nm", "255.255.255.0" },
808 { "vpn_server1_local", "10.8.0.1" },
809 { "vpn_server1_remote", "10.8.0.2" },
810 { "vpn_server1_reneg", "-1" },
811 { "vpn_server1_hmac", "-1" },
812 { "vpn_server1_plan", "1" },
813 { "vpn_server1_ccd", "0" },
814 { "vpn_server1_c2c", "0" },
815 { "vpn_server1_ccd_excl", "0" },
816 { "vpn_server1_ccd_val", "" },
817 { "vpn_server1_pdns", "0" },
818 { "vpn_server1_rgw", "0" },
819 { "vpn_server1_custom", "" },
820 { "vpn_server1_static", "" },
821 { "vpn_server1_ca", "" },
822 { "vpn_server1_crt", "" },
823 { "vpn_server1_key", "" },
824 { "vpn_server1_dh", "" },
825 { "vpn_server2_poll", "0" },
826 { "vpn_server2_if", "tun" },
827 { "vpn_server2_proto", "udp" },
828 { "vpn_server2_port", "1194" },
829 { "vpn_server2_firewall", "auto" },
830 { "vpn_server2_crypt", "tls" },
831 { "vpn_server2_comp", "adaptive" },
832 { "vpn_server2_cipher", "default" },
833 { "vpn_server2_dhcp", "1" },
834 { "vpn_server2_r1", "192.168.1.50" },
835 { "vpn_server2_r2", "192.168.1.55" },
836 { "vpn_server2_sn", "10.8.0.0" },
837 { "vpn_server2_nm", "255.255.255.0" },
838 { "vpn_server2_local", "10.8.0.1" },
839 { "vpn_server2_remote", "10.8.0.2" },
840 { "vpn_server2_reneg", "-1" },
841 { "vpn_server2_hmac", "-1" },
842 { "vpn_server2_plan", "1" },
843 { "vpn_server2_ccd", "0" },
844 { "vpn_server2_c2c", "0" },
845 { "vpn_server2_ccd_excl", "0" },
846 { "vpn_server2_ccd_val", "" },
847 { "vpn_server2_pdns", "0" },
848 { "vpn_server2_rgw", "0" },
849 { "vpn_server2_custom", "" },
850 { "vpn_server2_static", "" },
851 { "vpn_server2_ca", "" },
852 { "vpn_server2_crt", "" },
853 { "vpn_server2_key", "" },
854 { "vpn_server2_dh", "" },
855 { "vpn_client_eas", "" },
856 { "vpn_client1_poll", "0" },
857 { "vpn_client1_if", "tun" },
858 { "vpn_client1_bridge", "1" },
859 { "vpn_client1_nat", "1" },
860 { "vpn_client1_proto", "udp" },
861 { "vpn_client1_addr", "" },
862 { "vpn_client1_port", "1194" },
863 { "vpn_client1_retry", "30" },
864 { "vpn_client1_rg", "0" },
865 { "vpn_client1_firewall", "auto" },
866 { "vpn_client1_crypt", "tls" },
867 { "vpn_client1_comp", "adaptive" },
868 { "vpn_client1_cipher", "default" },
869 { "vpn_client1_local", "10.8.0.2" },
870 { "vpn_client1_remote", "10.8.0.1" },
871 { "vpn_client1_nm", "255.255.255.0" },
872 { "vpn_client1_reneg", "-1" },
873 { "vpn_client1_hmac", "-1" },
874 { "vpn_client1_adns", "0" },
875 { "vpn_client1_rgw", "0" },
876 { "vpn_client1_gw", "" },
877 { "vpn_client1_custom", "" },
878 { "vpn_client1_static", "" },
879 { "vpn_client1_ca", "" },
880 { "vpn_client1_crt", "" },
881 { "vpn_client1_key", "" },
882 { "vpn_client2_poll", "0" },
883 { "vpn_client2_if", "tun" },
884 { "vpn_client2_bridge", "1" },
885 { "vpn_client2_nat", "1" },
886 { "vpn_client2_proto", "udp" },
887 { "vpn_client2_addr", "" },
888 { "vpn_client2_port", "1194" },
889 { "vpn_client2_retry", "30" },
890 { "vpn_client2_rg", "0" },
891 { "vpn_client2_firewall", "auto" },
892 { "vpn_client2_crypt", "tls" },
893 { "vpn_client2_comp", "adaptive" },
894 { "vpn_client2_cipher", "default" },
895 { "vpn_client2_local", "10.8.0.2" },
896 { "vpn_client2_remote", "10.8.0.1" },
897 { "vpn_client2_nm", "255.255.255.0" },
898 { "vpn_client2_reneg", "-1" },
899 { "vpn_client2_hmac", "-1" },
900 { "vpn_client2_adns", "0" },
901 { "vpn_client2_rgw", "0" },
902 { "vpn_client2_gw", "" },
903 { "vpn_client2_custom", "" },
904 { "vpn_client2_static", "" },
905 { "vpn_client2_ca", "" },
906 { "vpn_client2_crt", "" },
907 { "vpn_client2_key", "" },
910 { "pptp_client_enable", "0" },
911 { "pptp_client_peerdns", "0" },
912 { "pptp_client_mtuenable","0" },
913 { "pptp_client_mtu", "1450" },
914 { "pptp_client_mruenable","0" },
915 { "pptp_client_mru", "1450" },
916 { "pptp_client_nat", "0" },
917 { "pptp_client_srvip", "" },
918 { "pptp_client_srvsub", "10.0.0.0" },
919 { "pptp_client_srvsubmsk","255.0.0.0" },
920 { "pptp_client_username", "" },
921 { "pptp_client_passwd", "" },
922 { "pptp_client_crypt", "0" },
923 { "pptp_client_custom", "" },
924 { "pptp_client_dfltroute","0" },
931 { "ses_enable", "0" }, // enable ses
932 { "ses_event", "2" }, // initial ses event
933 { "ses_led_assertlvl", "0" }, // For SES II
934 { "ses_client_join", "0" }, // For SES II
935 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
936 { "ses_count", "0" },
937 { "eou_configured", "0" },
939 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
940 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
941 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
942 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
943 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
944 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
945 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
946 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
947 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
948 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
949 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
950 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
952 //obs zzz { "http_method", "post" }, // HTTP method
954 // { "wl_macmode1", "disabled" },
957 { "filter", "on" }, // Firewall Protection [on|off]
958 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
959 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
960 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
961 { "block_cookie", "0" }, // Block Cookie [1|0]
962 { "ident_pass", "0" }, // IDENT passthrough [1|0]
963 { "block_proxy", "0" }, // Block Proxy [1|0]
967 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
968 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
971 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
972 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
974 { "public_ip", "" }, // public ip
977 //forced in rc.c { "os_name", "" }, // OS name string
978 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
979 //forced in rc.c { "os_date", __DATE__ }, // OS date
980 //not used { "ct_modules", "" }, // CyberTAN kernel modules
981 //obs { "timer_interval", "3600" }, // Timer interval in seconds
982 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
983 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
984 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
985 //obs { "os_server", "" }, // URL for getting upgrades
986 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
987 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
988 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
989 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
990 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
991 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
992 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
993 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
994 //{ "eou_device_id", "" },
995 //{ "eou_public_key", "" },
996 //{ "eou_private_key", "" },
997 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
998 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
999 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
1000 // { "ntp_enable", "1" }, // replaced with ntp_updates
1001 // { "ntp_mode", "auto" }, // auto, manual
1005 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
1006 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
1007 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
1008 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
1009 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
1011 // advanced-watchdog
1020 { "wd_cki", "300" },
1027 { "arpbind_enable", "0" },
1028 { "arpbind_only", "0" },
1029 { "arpbind_list", "" },
1031 // NoCatSplash. !!Victek
1032 #ifdef TCONFIG_NOCAT
1033 { "NC_enable", "0" }, // enable NoCatSplash
1034 { "NC_Verbosity", "0" }, // logging too verbose on startup!
1035 { "NC_GatewayName", "WWW Portal" },
1036 { "NC_GatewayPort", "5280" },
1037 { "NC_GatewayMode", "Open" },
1038 { "NC_DocumentRoot", "/tmp/splashd" },
1039 { "NC_ExcludePorts", "1863" },
1040 { "NC_HomePage", "" },
1041 { "NC_ForcedRedirect", "0" },
1042 { "NC_IdleTimeout", "0" },
1043 { "NC_MaxMissedARP", "5" },
1044 { "NC_PeerChecktimeout", "0" },
1045 { "NC_LoginTimeout", "86400" },
1046 { "NC_RenewTimeout", "0" },
1047 { "NC_AllowedWebHosts", "" },
1053 const defaults_t if_generic
[] = {
1054 { "lan_ifname", "br0" },
1055 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
1056 { "wan_ifname", "eth1" },
1057 { "wan_ifnames", "eth1" },
1061 const defaults_t if_vlan
[] = {
1062 { "lan_ifname", "br0" },
1063 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
1065 { "lan1_ifname", "" },
1066 { "lan1_ifnames", "" },
1067 { "lan2_ifname", "" },
1068 { "lan2_ifnames", "" },
1069 { "lan3_ifname", "" },
1070 { "lan3_ifnames", "" },
1072 { "wan_ifname", "vlan1" },
1073 { "wan_ifnames", "vlan1" },