Merge remote-tracking branch 'origin/QOS-DEV' into Teaman-RT
[tomato.git] / release / src / router / nvram / defaults.c
blob7e4e72c480d793b8d0822dd70e52c16cc8698a3c
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "dhcp" }, // DHCP server [static|dhcp] //start with ENABLED dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
64 #ifdef TCONFIG_VLAN
65 { "lan1_ipaddr", "" },
66 { "lan1_netmask", "" },
67 { "lan1_stp", "0" },
68 { "lan2_ipaddr", "" },
69 { "lan2_netmask", "" },
70 { "lan2_stp", "0" },
71 { "lan3_ipaddr", "" },
72 { "lan3_netmask", "" },
73 { "lan3_stp", "0" },
74 #endif
76 // WAN H/W parameters
77 //! { "wan_ifname", "" }, // WAN interface name
78 //! { "wan_ifnames", "" }, // WAN interface names
79 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
80 { "wan_hwaddr", "" }, // WAN interface MAC address
81 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
83 // WAN TCP/IP parameters
84 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
85 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
86 { "wan_netmask", "0.0.0.0" }, // WAN netmask
87 { "wan_gateway", "0.0.0.0" }, // WAN gateway
88 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
89 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
90 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
91 { "wan_lease", "86400" }, // WAN lease time in seconds
92 { "wan_islan", "0" },
93 { "modem_ipaddr", "0.0.0.0" }, // modem IP address (i.e. PPPoE bridged modem)
95 { "wan_primary", "1" }, // Primary wan connection
96 { "wan_unit", "0" }, // Last configured connection
97 /* --- obsolete ---
98 // Filters
99 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
100 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
101 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
103 { "filter", "on" }, // [on | off] Firewall Protection
105 // Port forwards
106 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
108 // DHCP server parameters
109 { "dhcp_start", "100" }, //
110 { "dhcp_num", "50" }, //
111 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
112 { "dhcpd_endip", "" }, // "
113 { "dhcp_lease", "0" }, // LAN lease time in minutes
114 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
115 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
116 { "wan_routes", "" },
117 { "wan_msroutes", "" },
119 #ifdef TCONFIG_VLAN
120 { "dhcp1_start", "" },
121 { "dhcp1_num", "" },
122 { "dhcpd1_startip", "" },
123 { "dhcpd1_endip", "" },
124 { "dhcp1_lease", "0" },
125 { "dhcp2_start", "" },
126 { "dhcp2_num", "" },
127 { "dhcpd2_startip", "" },
128 { "dhcpd2_endip", "" },
129 { "dhcp2_lease", "0" },
130 { "dhcp3_start", "" },
131 { "dhcp3_num", "" },
132 { "dhcpd3_startip", "" },
133 { "dhcpd3_endip", "" },
134 { "dhcp3_lease", "0" },
135 #endif
137 //3G parameters
138 { "modem_pin", "" },
139 { "modem_dev", "USB0" },
140 { "modem_init", "*99#" },
141 { "modem_apn", "internet" },
143 // PPPoE parameters
144 { "pppoe_ifname", "" }, // PPPoE enslaved interface
145 { "ppp_username", "" }, // PPP username
146 { "ppp_passwd", "" }, // PPP password
147 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
148 { "ppp_keepalive", "0" }, // Restore link automatically
149 { "ppp_demand", "0" }, // Dial on demand
150 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
151 { "ppp_mru", "1500" }, // Negotiate MRU to this value
152 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
153 { "ppp_service", "" }, // PPPoE service name
154 { "ppp_ac", "" }, // PPPoE access concentrator name
155 { "ppp_static", "0" }, // Enable / Disable Static IP
156 { "ppp_static_ip", "" }, // PPPoE Static IP
157 { "ppp_get_ac", "" }, // PPPoE Server ac name
158 { "ppp_get_srv", "" }, // PPPoE Server service name
159 { "ppp_custom", "" }, // PPPD additional options
160 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
162 { "pppoe_lei", "" },
163 { "pppoe_lef", "" },
165 #ifdef TCONFIG_IPV6
166 // IPv6 parameters
167 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
168 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
169 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
170 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
171 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
172 { "ipv6_accept_ra", "0" }, // Accept RA on WAN and/or LAN interfaces
173 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
174 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
175 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
176 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
177 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
178 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
179 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
180 { "ipv6_dns", "" }, // DNS server(s) IPs
181 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
182 #endif
184 // Wireless parameters
185 { "wl_ifname", "" }, // Interface name
186 { "wl_hwaddr", "" }, // MAC address
187 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
188 { "wl_corerev", "" }, // Current core revision
189 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
190 { "wl_radioids", "" }, // List of radio IDs
191 { "wl_ssid", "wireless" }, // Service set ID (network name)
192 { "wl1_ssid", "wireless1" },
193 { "wl_country_code", "" }, // Country (default obtained from driver)
194 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
195 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
196 { "wl_closed", "0" }, // Closed (hidden) network
197 { "wl_ap_isolate", "0" }, // AP isolate mode
198 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
199 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
200 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
201 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
202 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
203 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
204 { "wl_key", "1" }, // Current WEP key
205 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
206 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
207 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
208 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
209 { "wl_channel", "1" }, // Channel number
210 { "wl1_channel", "0" },
211 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
212 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
213 { "wl_rateset", "default" }, // "default" or "all" or "12"
214 { "wl_frag", "2346" }, // Fragmentation threshold
215 { "wl_rts", "2347" }, // RTS threshold
216 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
217 { "wl_bcn", "100" }, // Beacon interval
218 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
219 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
220 { "wl_gmode", "1" }, // 54g mode
221 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
222 { "wl_afterburner", "off" }, // AfterBurner
223 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
224 { "wl_wme", "auto" }, // WME mode (auto|off|on)
225 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
226 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
227 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
228 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
229 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
230 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3|4) //Toastman - 0=off
231 { "wl_passphrase", "" }, // Passphrase // Add
232 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
233 { "wl_wep_buf", "" }, // save all settings for web // Add
234 { "wl_wep_gen", "" }, // save all settings for generate button // Add
235 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
237 #ifdef TCONFIG_VLAN
238 { "wl_vifs", "" }, // multiple/virtual BSSIDs
239 #endif
241 // WPA parameters
242 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
243 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
244 { "wl_wpa_psk", "" }, // WPA pre-shared key
245 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
246 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
247 { "wl_radius_key", "" }, // RADIUS shared secret
248 { "wl_radius_port", "1812" }, // RADIUS server UDP port
249 { "wl_crypto", "aes" }, // WPA data encryption
250 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
251 { "wl_akm", "" }, // WPA akm list
253 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
254 // EDCA parameters for STA
255 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
256 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
257 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
258 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
260 // EDCA parameters for AP
261 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
262 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
263 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
264 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
266 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
267 { "wl_wme_apsd", "off" }, // WME APSD mode
268 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
270 /* Per AC Tx parameters */
271 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
272 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
273 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
274 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
276 { "wl_unit", "0" }, // Last configured interface
277 { "wl_mac_deny", "" }, // filter MAC // Add
279 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
280 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
281 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
283 // !!TB: n-mode
284 { "wl_nmode", "-1" }, // N-mode
285 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
286 { "wl1_nband", "1" },
287 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
288 { "wl_nreqd", "0" }, // Require 802.11n support
289 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
290 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
291 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
292 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
293 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
294 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
295 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
296 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
297 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
298 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
299 { "wl_bcn_rotate", "1" }, // Beacon rotation
300 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
301 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
303 #ifdef TCONFIG_EMF
304 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
305 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
306 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
307 { "emf_enable", "0" }, // Disable EMF by default
308 #endif
309 #ifdef CONFIG_BCMWL5
310 // AMPDU
311 { "wl_ampdu", "auto" }, // Default AMPDU setting
312 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
313 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
314 { "wl_amsdu", "auto" }, // Default AMSDU setting
315 // power save
316 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
317 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
318 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
319 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
320 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
321 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
322 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
323 // misc
324 { "wl_wmf_bss_enable", "0" }, // Wireless Multicast Forwarding Enable/Disable
325 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
326 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
327 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
328 #endif
330 { "pptp_server_ip", "" }, // as same as WAN gateway
331 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
332 { "pptp_dhcp", "1" },
334 // for firewall
335 { "mtu_enable", "0" }, // WAN MTU [1|0]
336 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
338 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
339 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
340 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
342 // misc
343 { "wl_tnoise", "-99" },
344 { "led_override", "" },
345 { "btn_override", "" },
346 { "btn_reset", "" },
347 { "env_path", "" },
348 { "manual_boot_nv", "0" },
349 // { "wlx_hpamp", "" },
350 // { "wlx_hperx", "" }, // see init.c
351 { "t_fix1", "" },
353 // basic-ddns
354 { "ddnsx0", "" },
355 { "ddnsx1", "" },
356 { "ddnsx0_cache", "" },
357 { "ddnsx1_cache", "" },
358 { "ddnsx_save", "1" },
359 { "ddnsx_refresh", "28" },
361 // basic-ident
362 { "router_name", "tomato" },
363 { "wan_hostname", "unknown" },
364 { "wan_domain", "" },
366 // basic-time
367 { "tm_sel", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
368 { "tm_tz", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
369 { "tm_dst", "1", },
370 { "ntp_updates", "4" },
371 { "ntp_tdod", "0" },
372 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
373 { "ntp_kiss", "" },
374 { "ntp_kiss_ignore", "" },
376 // basic-static
377 { "dhcpd_static", "" },
378 { "arpbind_listed", "0" }, // AB - Enable static ARP for all devices on list
380 // basic-wfilter
381 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
382 { "wl_macmode", "disabled" },
383 { "macnames", "" },
385 // advanced-ctnf
386 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
387 { "ct_udp_timeout", "30 180" },
388 { "ct_timeout", "10 10" },
389 { "ct_max", "8192" },
390 { "nf_ttl", "0" },
391 { "nf_l7in", "1" },
392 #ifdef LINUX26
393 { "nf_sip", "1" },
394 { "ct_hashsize", "2048" },
395 #endif
396 #ifdef LINUX26
397 { "nf_rtsp", "0" },
398 #else
399 { "nf_rtsp", "1" },
400 #endif
401 { "nf_pptp", "1" },
402 { "nf_h323", "1" },
403 { "nf_ftp", "1" },
405 // advanced-mac
406 { "mac_wan", "" },
407 { "wl_macaddr", "" },
409 // advanced-misc
410 { "boot_wait", "on" },
411 { "wait_time", "5" },
412 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
413 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
414 { "jumbo_frame_size", "2000" },
415 #ifdef CONFIG_BCMWL5
416 { "ctf_disable", "1" },
417 #endif
419 // advanced-dhcpdns
420 { "dhcpd_dmdns", "1" },
421 { "dhcpd_slt", "0" },
422 { "dhcpd_gwmode", "" },
423 { "dhcpd_lmax", "" },
424 { "dns_addget", "0" },
425 { "dns_intcpt", "0" },
426 { "dhcpc_minpkt", "1" },
427 { "dhcpc_custom", "" },
428 { "dns_norebind", "1" },
429 { "dnsmasq_custom", "" },
430 { "dhcpd_static_only", "0" },
431 // { "dnsmasq_norw", "0" },
433 // advanced-firewall
434 // { "block_loopback", "0" }, // nat loopback
435 { "nf_loopback", "0" },
436 { "block_wan", "1" }, // block inbound icmp
437 { "multicast_pass", "0" }, // enable multicast proxy
438 #ifdef TCONFIG_VLAN
439 { "multicast_lan", "0" }, // on LAN (br0)
440 { "multicast_lan1", "0" }, // on LAN1 (br1)
441 { "multicast_lan2", "0" }, // on LAN2 (br2)
442 { "multicast_lan3", "0" }, // on LAN3 (br3)
443 #endif
444 { "udpxy_enable", "0" },
445 { "udpxy_stats", "0" },
446 { "udpxy_clients", "3" },
447 { "udpxy_port", "4022" },
448 { "ne_syncookies", "0" }, // tcp_syncookies
449 { "ne_snat", "0" }, // use SNAT instead of MASQUERADE
450 { "dhcp_pass", "1" }, // allow DHCP responses
451 { "ne_shlimit", "0,3,60" },
453 // advanced-routing
454 { "routes_static", "" },
455 { "dhcp_routes", "1" },
456 { "wk_mode", "gateway" }, // Network mode [gateway|router]
457 #ifdef TCONFIG_ZEBRA
458 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
459 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
460 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
461 #ifdef TCONFIG_VLAN
462 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
463 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
464 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
465 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
466 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
467 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
468 #endif
469 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
470 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
471 #endif
473 // advanced-vlan
474 { "trunk_vlan_so", "0" }, // VLAN trunk support override
476 // advanced-wireless
477 { "wl_txant", "3" },
478 { "wl_txpwr", "0" }, // 0 = driver default power
479 { "wl_maxassoc", "128" }, // Max associations driver could support
480 { "wl_bss_maxassoc", "128" },
481 { "wl_distance", "" },
483 // forward-*
484 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
485 #ifdef TCONFIG_IPV6
486 { "ipv6_portforward", ""},
487 #endif
488 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
489 { "dmz_enable", "0" },
490 { "dmz_ipaddr", "0" },
491 { "dmz_sip", "" },
493 // forward-upnp
494 { "upnp_enable", "3" },
495 { "upnp_secure", "1" },
496 { "upnp_port", "0" },
497 { "upnp_ssdp_interval", "60" }, // SSDP interval
498 { "upnp_max_age", "180" }, // Max age
499 { "upnp_mnp", "0" },
500 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
501 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
502 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
503 #if 0 // disabled for miniupnpd
504 { "upnp_max_age", "180" }, // Max age
505 { "upnp_config", "0" },
506 #endif
508 // qos
509 { "qos_enable", "0" },
510 { "qos_ack", "0" },
511 { "qos_syn", "1" },
512 { "qos_fin", "1" },
513 { "qos_rst", "1" },
514 { "qos_udp", "0" },
515 { "qos_icmp", "1" },
516 { "qos_reset", "1" },
517 { "qos_obw", "700" },
518 { "qos_ibw", "16000" },
519 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<-1<d<123<0<<0:10<<0<Network Time (NTP)>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<x<9<0<<<<0<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<0<RPC (Microsoft)>0<<6<x<23,992<0<<<<0<Telnet>0<<-1<d<22<0<<<<0<SSH>0<<17<x<3544<0<<<<3<Teredo port>0<<6<s<80,8080<0<<<<3<Remote Router Access>0<<6<x<3389<0<<<<3<Remote Assistance>0<<-1<a<<0<flash<<<2<Flash Video, (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video, (Youtube)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<s<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<6<x<6005<0<<<<2<Camfrog>0<<-1<d<1220,1234,5100,6005,6970<0<<<<-1<VLC>0<<-1<x<554,5004,5005<0<<<<2<RTP/RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<x<1935<0<<<<2<RTMP>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<d<1718:1720<0<<<<1<H323>0<<-1<a<<0<skypetoskype<<<1<Skype>0<<-1<a<<0<skypeout<<<1<Skypeout>0<<-1<d<80<0<<0:512<<4<HTTP>0<<-1<d<443<0<<0:512<<4<HTTPS>0<<6<d<8080<0<<0:512<<4<HTTP Proxy / Alternate>0<<-1<d<25,587,465<0<<<<5<SMTP, Submission>0<<-1<d<110,995<0<<<<5<POP3 Mail>0<<-1<d<119,563<0<<<<5<NNTP>0<<-1<d<143,220,585,993<0<<<<5<IMAP Mail>0<<-1<a<<0<irc<<<6<IRC>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<Yahoo Messenger>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<Other Chat Services>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<-1<x<6571,6891:6901<0<<<<7<WLM File/Webcam>0<<6<d<80,443,8080<0<<512:<<7<HTTP,SSL File Transfers>0<<17<x<1:65535<0<<<<-1<P2P (uTP, UDP)" },
520 { "qos_burst0", "" },
521 { "qos_burst1", "" },
522 { "qos_default", "8" },
523 { "qos_orates", "5-20,5-20,5-25,5-70,20-100,5-80,5-80,5-80,5-50,1-5" },
524 { "qos_irates", "5-100,5-100,5-100,5-100,20-100,5-100,5-100,5-100,5-100,1-5" },
525 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger Download P2P/Bulk Crawl" },
527 { "ne_vegas", "0" }, // TCP Vegas
528 { "ne_valpha", "3" }, // "
529 { "ne_vbeta", "3" }, // "
530 { "ne_vgamma", "2" }, // "
532 // qos-bw-limiter
533 { "qosl_enable", "0" },
534 // { "qosl_obw", "" }, unused - used qos_obw
535 // { "qosl_ibw", "" }, unused - used qos_obw
536 { "qosl_rules", "" },
537 { "qosl_denable", "0" },
538 { "qosl_dtcp", "0" },//unlimited
539 { "qosl_dudp", "0" },//unlimited
540 { "qosl_ddlc", "" },
541 { "qosl_dulc", "" },
542 { "qosl_ddlr", "" },
543 { "qosl_dulr", "" },
545 // access restrictions
546 { "rruleN", "0" },
547 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
548 //* { "rrule##", "" },
549 { "rrulewp", "80,8080" },
551 #if TOMATO_SL
552 // samba
553 { "smbd_on", "0" },
554 { "nmbd_on", "0" },
555 { "smbd_wgroup", "WORKGROUP" },
556 { "smbd_nbname", "TOMATO" },
557 { "smbd_adminpass", "admin" },
558 #endif
560 // admin-access
561 { "http_username", "" }, // Username
562 { "http_passwd", "admin" }, // Password
563 { "remote_management", "0" }, // Remote Management [1|0]
564 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
565 { "http_wanport", "8080" }, // WAN port to listen on
566 { "http_lanport", "80" }, // LAN port to listen on
567 { "https_lanport", "443" }, // LAN port to listen on
568 { "http_enable", "1" }, // HTTP server enable/disable
569 { "https_enable", "0" }, // HTTPS server enable/disable
570 { "https_crt_save", "0" },
571 { "https_crt_cn", "" },
572 { "https_crt_file", "" },
573 { "https_crt", "" },
574 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
575 { "web_css", "tomato" },
576 { "web_svg", "1" },
577 { "telnetd_eas", "1" },
578 { "telnetd_port", "23" },
579 { "sshd_eas", "0" },
580 { "sshd_pass", "1" },
581 { "sshd_port", "22" },
582 { "sshd_remote", "0" },
583 { "sshd_rport", "2222" },
584 { "sshd_authkeys", "" },
585 { "sshd_hostkey", "" },
586 { "sshd_dsskey", "" },
587 { "sshd_forwarding", "1" },
588 { "rmgt_sip", "" }, // remote management: source ip address
590 { "http_id", "" },
591 { "web_mx", "" },
592 { "web_pb", "" },
594 // admin-bwm
595 { "rstats_enable", "1" },
596 { "rstats_path", "" },
597 { "rstats_stime", "48" },
598 { "rstats_offset", "1" },
599 { "rstats_data", "" },
600 { "rstats_colors", "" },
601 { "rstats_exclude", "" },
602 { "rstats_sshut", "1" },
603 { "rstats_bak", "0" },
605 // admin-ipt
606 { "cstats_enable", "1" },
607 { "cstats_path", "" },
608 { "cstats_stime", "48" },
609 { "cstats_offset", "1" },
610 { "cstats_labels", "0" },
611 { "cstats_exclude", "" },
612 { "cstats_include", "" },
613 { "cstats_all", "1" },
614 { "cstats_sshut", "1" },
615 { "cstats_bak", "0" },
617 // advanced-buttons
618 { "sesx_led", "0" },
619 { "sesx_b0", "1" },
620 { "sesx_b1", "4" },
621 { "sesx_b2", "4" },
622 { "sesx_b3", "4" },
623 { "sesx_script",
624 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
626 { "script_brau",
627 "if [ ! -e /tmp/switch-start ]; then\n"
628 " # do something at startup\n"
629 " echo position at startup was $1 >/tmp/switch-start\n"
630 " exit\n"
631 "fi\n"
632 "if [ $1 = \"bridge\" ]; then\n"
633 " # do something\n"
634 " led bridge on\n"
635 "elif [ $1 = \"auto\" ]; then\n"
636 " # do something\n"
637 " led bridge off\n"
638 "fi\n"
641 // admin-log
642 { "log_remote", "0" },
643 { "log_remoteip", "" },
644 { "log_remoteport", "514" },
645 { "log_file", "1" },
646 { "log_file_custom", "0" },
647 { "log_file_path", "/var/log/messages"},
648 { "log_file_size", "50" },
649 { "log_file_keep", "1" },
650 { "log_limit", "60" },
651 { "log_in", "0" },
652 { "log_out", "0" },
653 { "log_mark", "60" },
654 { "log_events", "" },
656 // admin-log-webmonitor
657 { "log_wm", "0" },
658 { "log_wmtype", "0" },
659 { "log_wmip", "" },
660 { "log_wmdmax", "300" },
661 { "log_wmsmax", "300" },
663 // admin-debugging
664 { "debug_nocommit", "0" },
665 { "debug_cprintf", "0" },
666 { "debug_cprintf_file", "0" },
667 // { "debug_keepfiles", "0" },
668 { "console_loglevel", "1" },
669 { "t_cafree", "1" },
670 { "t_hidelr", "0" },
671 { "debug_clkfix", "1" },
672 { "debug_ddns", "0" },
674 // admin-cifs
675 { "cifs1", "" },
676 { "cifs2", "" },
678 // admin-jffs2
679 { "jffs2_on", "0" },
680 { "jffs2_exec", "" },
682 #ifdef TCONFIG_USB
683 // nas-usb - !!TB
684 { "usb_enable", "0" },
685 { "usb_uhci", "0" },
686 { "usb_ohci", "0" },
687 { "usb_usb2", "1" },
688 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
689 { "usb_mmc", "-1" },
690 #endif
691 { "usb_irq_thresh", "0" },
692 { "usb_storage", "1" },
693 { "usb_printer", "1" },
694 { "usb_printer_bidirect", "0" },
695 { "usb_ext_opt", "" },
696 { "usb_fat_opt", "" },
697 { "usb_ntfs_opt", "" },
698 { "usb_fs_ext3", "1" },
699 { "usb_fs_fat", "1" },
700 #ifdef TCONFIG_NTFS
701 { "usb_fs_ntfs", "1" },
702 #endif
703 { "usb_fs_hfs", "0" }, //!Victek
704 { "usb_fs_hfsplus", "0" }, //!Victek
705 { "usb_automount", "1" },
706 #if 0
707 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
708 #endif
709 { "script_usbhotplug", "" },
710 { "script_usbmount", "" },
711 { "script_usbumount", "" },
712 { "idle_enable", "0" },
713 { "usb_3g", "1" },
714 #endif
716 #ifdef TCONFIG_FTP
717 // nas-ftp - !!TB
718 { "ftp_enable", "0" },
719 { "ftp_super", "0" },
720 { "ftp_anonymous", "0" },
721 { "ftp_dirlist", "0" },
722 { "ftp_port", "21" },
723 { "ftp_max", "0" },
724 { "ftp_ipmax", "0" },
725 { "ftp_staytimeout", "300" },
726 { "ftp_rate", "0" },
727 { "ftp_anonrate", "0" },
728 { "ftp_anonroot", "" },
729 { "ftp_pubroot", "" },
730 { "ftp_pvtroot", "" },
731 { "ftp_users", "" },
732 { "ftp_custom", "" },
733 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
734 { "ftp_limit", "0,3,60" },
735 { "log_ftp", "0" },
736 #endif
738 #ifdef TCONFIG_SNMP
739 { "snmp_enable", "0" },
740 { "snmp_location", "router" },
741 { "snmp_contact", "admin@tomato" },
742 { "snmp_ro", "rocommunity" },
743 #endif
745 #ifdef TCONFIG_SAMBASRV
746 // nas-samba - !!TB
747 { "smbd_enable", "0" },
748 { "smbd_wgroup", "WORKGROUP" },
749 { "smbd_master", "1" },
750 { "smbd_wins", "1" },
751 { "smbd_cpage", "" },
752 { "smbd_cset", "utf8" },
753 { "smbd_custom", "" },
754 { "smbd_autoshare", "2" },
755 { "smbd_shares",
756 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
758 { "smbd_user", "nas" },
759 { "smbd_passwd", "" },
760 #endif
762 #ifdef TCONFIG_MEDIA_SERVER
763 // nas-media
764 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
765 { "ms_dirs", "/mnt<" },
766 { "ms_port", "0" },
767 { "ms_dbdir", "" },
768 { "ms_tivo", "0" },
769 { "ms_stdlna", "0" },
770 { "ms_sas", "0" },
771 #endif
773 // admin-sch
774 { "sch_rboot", "" },
775 { "sch_rcon", "" },
776 { "sch_c1", "" },
777 { "sch_c2", "" },
778 { "sch_c3", "" },
779 { "sch_c1_cmd", "" },
780 { "sch_c2_cmd", "" },
781 { "sch_c3_cmd", "" },
783 // admin-script
784 { "script_init", "" },
785 { "script_shut", "" },
786 { "script_fire", "#Restrict number of TCP connections per user #iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP #Restrict number of non-TCP connections per user #iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP #Restrict number of simltaneous SMTP connections (from mailer viruses) #iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP" },
787 { "script_wanup", "" },
790 #ifdef TCONFIG_OPENVPN
791 // vpn
792 { "vpn_debug", "0" },
793 { "vpn_server_eas", "" },
794 { "vpn_server_dns", "" },
795 { "vpn_server1_poll", "0" },
796 { "vpn_server1_if", "tun" },
797 { "vpn_server1_proto", "udp" },
798 { "vpn_server1_port", "1194" },
799 { "vpn_server1_firewall", "auto" },
800 { "vpn_server1_crypt", "tls" },
801 { "vpn_server1_comp", "adaptive" },
802 { "vpn_server1_cipher", "default" },
803 { "vpn_server1_dhcp", "1" },
804 { "vpn_server1_r1", "192.168.1.50" },
805 { "vpn_server1_r2", "192.168.1.55" },
806 { "vpn_server1_sn", "10.8.0.0" },
807 { "vpn_server1_nm", "255.255.255.0" },
808 { "vpn_server1_local", "10.8.0.1" },
809 { "vpn_server1_remote", "10.8.0.2" },
810 { "vpn_server1_reneg", "-1" },
811 { "vpn_server1_hmac", "-1" },
812 { "vpn_server1_plan", "1" },
813 { "vpn_server1_ccd", "0" },
814 { "vpn_server1_c2c", "0" },
815 { "vpn_server1_ccd_excl", "0" },
816 { "vpn_server1_ccd_val", "" },
817 { "vpn_server1_pdns", "0" },
818 { "vpn_server1_rgw", "0" },
819 { "vpn_server1_custom", "" },
820 { "vpn_server1_static", "" },
821 { "vpn_server1_ca", "" },
822 { "vpn_server1_crt", "" },
823 { "vpn_server1_key", "" },
824 { "vpn_server1_dh", "" },
825 { "vpn_server2_poll", "0" },
826 { "vpn_server2_if", "tun" },
827 { "vpn_server2_proto", "udp" },
828 { "vpn_server2_port", "1194" },
829 { "vpn_server2_firewall", "auto" },
830 { "vpn_server2_crypt", "tls" },
831 { "vpn_server2_comp", "adaptive" },
832 { "vpn_server2_cipher", "default" },
833 { "vpn_server2_dhcp", "1" },
834 { "vpn_server2_r1", "192.168.1.50" },
835 { "vpn_server2_r2", "192.168.1.55" },
836 { "vpn_server2_sn", "10.8.0.0" },
837 { "vpn_server2_nm", "255.255.255.0" },
838 { "vpn_server2_local", "10.8.0.1" },
839 { "vpn_server2_remote", "10.8.0.2" },
840 { "vpn_server2_reneg", "-1" },
841 { "vpn_server2_hmac", "-1" },
842 { "vpn_server2_plan", "1" },
843 { "vpn_server2_ccd", "0" },
844 { "vpn_server2_c2c", "0" },
845 { "vpn_server2_ccd_excl", "0" },
846 { "vpn_server2_ccd_val", "" },
847 { "vpn_server2_pdns", "0" },
848 { "vpn_server2_rgw", "0" },
849 { "vpn_server2_custom", "" },
850 { "vpn_server2_static", "" },
851 { "vpn_server2_ca", "" },
852 { "vpn_server2_crt", "" },
853 { "vpn_server2_key", "" },
854 { "vpn_server2_dh", "" },
855 { "vpn_client_eas", "" },
856 { "vpn_client1_poll", "0" },
857 { "vpn_client1_if", "tun" },
858 { "vpn_client1_bridge", "1" },
859 { "vpn_client1_nat", "1" },
860 { "vpn_client1_proto", "udp" },
861 { "vpn_client1_addr", "" },
862 { "vpn_client1_port", "1194" },
863 { "vpn_client1_retry", "30" },
864 { "vpn_client1_rg", "0" },
865 { "vpn_client1_firewall", "auto" },
866 { "vpn_client1_crypt", "tls" },
867 { "vpn_client1_comp", "adaptive" },
868 { "vpn_client1_cipher", "default" },
869 { "vpn_client1_local", "10.8.0.2" },
870 { "vpn_client1_remote", "10.8.0.1" },
871 { "vpn_client1_nm", "255.255.255.0" },
872 { "vpn_client1_reneg", "-1" },
873 { "vpn_client1_hmac", "-1" },
874 { "vpn_client1_adns", "0" },
875 { "vpn_client1_rgw", "0" },
876 { "vpn_client1_gw", "" },
877 { "vpn_client1_custom", "" },
878 { "vpn_client1_static", "" },
879 { "vpn_client1_ca", "" },
880 { "vpn_client1_crt", "" },
881 { "vpn_client1_key", "" },
882 { "vpn_client2_poll", "0" },
883 { "vpn_client2_if", "tun" },
884 { "vpn_client2_bridge", "1" },
885 { "vpn_client2_nat", "1" },
886 { "vpn_client2_proto", "udp" },
887 { "vpn_client2_addr", "" },
888 { "vpn_client2_port", "1194" },
889 { "vpn_client2_retry", "30" },
890 { "vpn_client2_rg", "0" },
891 { "vpn_client2_firewall", "auto" },
892 { "vpn_client2_crypt", "tls" },
893 { "vpn_client2_comp", "adaptive" },
894 { "vpn_client2_cipher", "default" },
895 { "vpn_client2_local", "10.8.0.2" },
896 { "vpn_client2_remote", "10.8.0.1" },
897 { "vpn_client2_nm", "255.255.255.0" },
898 { "vpn_client2_reneg", "-1" },
899 { "vpn_client2_hmac", "-1" },
900 { "vpn_client2_adns", "0" },
901 { "vpn_client2_rgw", "0" },
902 { "vpn_client2_gw", "" },
903 { "vpn_client2_custom", "" },
904 { "vpn_client2_static", "" },
905 { "vpn_client2_ca", "" },
906 { "vpn_client2_crt", "" },
907 { "vpn_client2_key", "" },
908 #endif // vpn
909 #ifdef TCONFIG_PPTP
910 { "pptp_client_enable", "0" },
911 { "pptp_client_peerdns", "0" },
912 { "pptp_client_mtuenable","0" },
913 { "pptp_client_mtu", "1450" },
914 { "pptp_client_mruenable","0" },
915 { "pptp_client_mru", "1450" },
916 { "pptp_client_nat", "0" },
917 { "pptp_client_srvip", "" },
918 { "pptp_client_srvsub", "10.0.0.0" },
919 { "pptp_client_srvsubmsk","255.0.0.0" },
920 { "pptp_client_username", "" },
921 { "pptp_client_passwd", "" },
922 { "pptp_client_crypt", "0" },
923 { "pptp_client_custom", "" },
924 { "pptp_client_dfltroute","0" },
925 #endif
927 #if 0
928 // safe to remove?
929 { "QoS", "0" },
931 { "ses_enable", "0" }, // enable ses
932 { "ses_event", "2" }, // initial ses event
933 { "ses_led_assertlvl", "0" }, // For SES II
934 { "ses_client_join", "0" }, // For SES II
935 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
936 { "ses_count", "0" },
937 { "eou_configured", "0" },
939 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
940 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
941 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
942 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
943 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
944 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
945 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
946 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
947 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
948 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
949 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
950 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
952 //obs zzz { "http_method", "post" }, // HTTP method
954 // { "wl_macmode1", "disabled" },
956 /* obsolete
957 { "filter", "on" }, // Firewall Protection [on|off]
958 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
959 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
960 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
961 { "block_cookie", "0" }, // Block Cookie [1|0]
962 { "ident_pass", "0" }, // IDENT passthrough [1|0]
963 { "block_proxy", "0" }, // Block Proxy [1|0]
966 /* --- obsolete ---
967 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
968 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
970 // for mac clone
971 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
972 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
974 { "public_ip", "" }, // public ip
977 //forced in rc.c { "os_name", "" }, // OS name string
978 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
979 //forced in rc.c { "os_date", __DATE__ }, // OS date
980 //not used { "ct_modules", "" }, // CyberTAN kernel modules
981 //obs { "timer_interval", "3600" }, // Timer interval in seconds
982 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
983 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
984 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
985 //obs { "os_server", "" }, // URL for getting upgrades
986 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
987 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
988 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
989 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
990 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
991 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
992 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
993 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
994 //{ "eou_device_id", "" },
995 //{ "eou_public_key", "" },
996 //{ "eou_private_key", "" },
997 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
998 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
999 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
1000 // { "ntp_enable", "1" }, // replaced with ntp_updates
1001 // { "ntp_mode", "auto" }, // auto, manual
1004 // for AOL
1005 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
1006 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
1007 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
1008 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
1009 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
1011 // advanced-watchdog
1012 { "wd_en", "" },
1013 { "wd_atp0", "" },
1014 { "wd_atp1", "" },
1015 { "wd_atp2", "" },
1016 { "wd_atp3", "" },
1017 { "wd_atp4", "" },
1018 { "wd_mxr", "3" },
1019 { "wd_rdy", "15" },
1020 { "wd_cki", "300" },
1021 { "wd_fdm", "" },
1022 { "wd_aof", "" },
1024 #endif // 0
1026 // arpbind
1027 { "arpbind_enable", "0" },
1028 { "arpbind_only", "0" },
1029 { "arpbind_list", "" },
1031 // NoCatSplash. !!Victek
1032 #ifdef TCONFIG_NOCAT
1033 { "NC_enable", "0" }, // enable NoCatSplash
1034 { "NC_Verbosity", "0" }, // logging too verbose on startup!
1035 { "NC_GatewayName", "WWW Portal" },
1036 { "NC_GatewayPort", "5280" },
1037 { "NC_GatewayMode", "Open" },
1038 { "NC_DocumentRoot", "/tmp/splashd" },
1039 { "NC_ExcludePorts", "1863" },
1040 { "NC_HomePage", "" },
1041 { "NC_ForcedRedirect", "0" },
1042 { "NC_IdleTimeout", "0" },
1043 { "NC_MaxMissedARP", "5" },
1044 { "NC_PeerChecktimeout", "0" },
1045 { "NC_LoginTimeout", "86400" },
1046 { "NC_RenewTimeout", "0" },
1047 { "NC_AllowedWebHosts", "" },
1048 #endif
1049 { NULL, NULL}
1053 const defaults_t if_generic[] = {
1054 { "lan_ifname", "br0" },
1055 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
1056 { "wan_ifname", "eth1" },
1057 { "wan_ifnames", "eth1" },
1058 { NULL, NULL }
1061 const defaults_t if_vlan[] = {
1062 { "lan_ifname", "br0" },
1063 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
1064 #ifdef TCONFIG_VLAN
1065 { "lan1_ifname", "" },
1066 { "lan1_ifnames", "" },
1067 { "lan2_ifname", "" },
1068 { "lan2_ifnames", "" },
1069 { "lan3_ifname", "" },
1070 { "lan3_ifnames", "" },
1071 #endif
1072 { "wan_ifname", "vlan1" },
1073 { "wan_ifnames", "vlan1" },
1074 { NULL, NULL }