Allow IPv6 address entry in tools>ping - Loosens valid character check
[tomato/davidwu.git] / release / src / router / nvram / defaults.c
blob5c0d2a1c2e215b456caaf99a02d29d2a49096f2d
1 /*
3 Copyright 2003, CyberTAN Inc.
4 All Rights Reserved.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
23 All Rights Reserved.
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
32 #include <string.h>
33 #include <bcmnvram.h>
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
37 #include "defaults.h"
39 //! = see restore_main()
41 const defaults_t defaults[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
44 // LAN H/W parameters
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "static" }, // DHCP server [static|dhcp] //start with ENABLED dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
64 #ifdef TCONFIG_VLAN
65 { "lan1_ipaddr", "" },
66 { "lan1_netmask", "" },
67 { "lan1_stp", "0" },
68 { "lan2_ipaddr", "" },
69 { "lan2_netmask", "" },
70 { "lan2_stp", "0" },
71 { "lan3_ipaddr", "" },
72 { "lan3_netmask", "" },
73 { "lan3_stp", "0" },
74 #endif
76 // WAN H/W parameters
77 //! { "wan_ifname", "" }, // WAN interface name
78 //! { "wan_ifnames", "" }, // WAN interface names
79 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
80 { "wan_hwaddr", "" }, // WAN interface MAC address
81 { "wan_ifnameX", NULL }, // real wan if; see wan.c:start_wan
83 // WAN TCP/IP parameters
84 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
85 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
86 { "wan_netmask", "0.0.0.0" }, // WAN netmask
87 { "wan_gateway", "0.0.0.0" }, // WAN gateway
88 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
89 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
90 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
91 { "wan_lease", "86400" }, // WAN lease time in seconds
92 { "wan_islan", "0" },
93 { "modem_ipaddr", "0.0.0.0" }, // modem IP address (i.e. PPPoE bridged modem)
95 { "wan_primary", "1" }, // Primary wan connection
96 { "wan_unit", "0" }, // Last configured connection
97 /* --- obsolete ---
98 // Filters
99 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
100 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
101 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
103 { "filter", "on" }, // [on | off] Firewall Protection
105 // Port forwards
106 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
108 // DHCP server parameters
109 { "dhcp_start", "100" }, //
110 { "dhcp_num", "50" }, //
111 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
112 { "dhcpd_endip", "" }, // "
113 { "dhcp_lease", "0" }, // LAN lease time in minutes
114 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
115 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
116 { "wan_routes", "" },
117 { "wan_msroutes", "" },
119 #ifdef TCONFIG_VLAN
120 { "dhcp1_start", "" },
121 { "dhcp1_num", "" },
122 { "dhcpd1_startip", "" },
123 { "dhcpd1_endip", "" },
124 { "dhcp1_lease", "0" },
125 { "dhcp2_start", "" },
126 { "dhcp2_num", "" },
127 { "dhcpd2_startip", "" },
128 { "dhcpd2_endip", "" },
129 { "dhcp2_lease", "0" },
130 { "dhcp3_start", "" },
131 { "dhcp3_num", "" },
132 { "dhcpd3_startip", "" },
133 { "dhcpd3_endip", "" },
134 { "dhcp3_lease", "0" },
135 #endif
137 //3G parameters
138 { "modem_pin", "" },
139 { "modem_dev", "USB0" },
140 { "modem_init", "*99#" },
141 { "modem_apn", "internet" },
143 // PPPoE parameters
144 { "pppoe_ifname", "" }, // PPPoE enslaved interface
145 { "ppp_username", "" }, // PPP username
146 { "ppp_passwd", "" }, // PPP password
147 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
148 { "ppp_keepalive", "0" }, // Restore link automatically
149 { "ppp_demand", "0" }, // Dial on demand
150 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
151 { "ppp_mru", "1500" }, // Negotiate MRU to this value
152 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
153 { "ppp_service", "" }, // PPPoE service name
154 { "ppp_ac", "" }, // PPPoE access concentrator name
155 { "ppp_static", "0" }, // Enable / Disable Static IP
156 { "ppp_static_ip", "" }, // PPPoE Static IP
157 { "ppp_get_ac", "" }, // PPPoE Server ac name
158 { "ppp_get_srv", "" }, // PPPoE Server service name
159 { "ppp_custom", "" }, // PPPD additional options
160 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
162 { "pppoe_lei", "" },
163 { "pppoe_lef", "" },
165 #ifdef TCONFIG_IPV6
166 // IPv6 parameters
167 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
168 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
169 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
170 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
171 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
172 { "ipv6_accept_ra", "1" }, // Accept RA on WAN and/or LAN interfaces
173 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
174 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
175 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
176 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
177 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
178 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
179 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
180 { "ipv6_dns", "" }, // DNS server(s) IPs
181 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
182 #endif
184 // Wireless parameters
185 { "wl_ifname", "" }, // Interface name
186 { "wl_hwaddr", "" }, // MAC address
187 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
188 { "wl_corerev", "" }, // Current core revision
189 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
190 { "wl_radioids", "" }, // List of radio IDs
191 { "wl_ssid", "wireless" }, // Service set ID (network name)
192 { "wl1_ssid", "wireless1" },
193 { "wl_country_code", "SG" }, // Country (default obtained from driver)
194 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
195 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
196 { "wl_closed", "0" }, // Closed (hidden) network
197 { "wl_ap_isolate", "0" }, // AP isolate mode
198 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
199 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
200 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
201 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
202 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
203 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
204 { "wl_key", "1" }, // Current WEP key
205 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
206 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
207 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
208 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
209 { "wl_channel", "1" }, // Channel number
210 { "wl1_channel", "0" },
211 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
212 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
213 { "wl_rateset", "default" }, // "default" or "all" or "12"
214 { "wl_frag", "2346" }, // Fragmentation threshold
215 { "wl_rts", "2347" }, // RTS threshold
216 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
217 { "wl_bcn", "100" }, // Beacon interval
218 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
219 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
220 { "wl_gmode", "1" }, // 54g mode
221 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
222 { "wl_afterburner", "off" }, // AfterBurner
223 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
224 { "wl_wme", "auto" }, // WME mode (auto|off|on)
225 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
226 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
227 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
228 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
229 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
230 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3|4) //Toastman 0=off
231 { "wl_passphrase", "" }, // Passphrase // Add
232 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
233 { "wl_wep_buf", "" }, // save all settings for web // Add
234 { "wl_wep_gen", "" }, // save all settings for generate button // Add
235 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
237 #ifdef TCONFIG_VLAN
238 { "wl_vifs", "" }, // multiple/virtual BSSIDs
239 #endif
241 // WPA parameters
242 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
243 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
244 { "wl_wpa_psk", "" }, // WPA pre-shared key
245 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
246 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
247 { "wl_radius_key", "" }, // RADIUS shared secret
248 { "wl_radius_port", "1812" }, // RADIUS server UDP port
249 { "wl_crypto", "aes" }, // WPA data encryption
250 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
251 { "wl_akm", "" }, // WPA akm list
253 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
254 // EDCA parameters for STA
255 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
256 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
257 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
258 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
260 // EDCA parameters for AP
261 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
262 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
263 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
264 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
266 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
267 { "wl_wme_apsd", "off" }, // WME APSD mode
268 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
270 /* Per AC Tx parameters */
271 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
272 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
273 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
274 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
276 { "wl_unit", "0" }, // Last configured interface
277 { "wl_mac_deny", "" }, // filter MAC // Add
279 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
280 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
281 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
283 // !!TB: n-mode
284 { "wl_nmode", "-1" }, // N-mode
285 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
286 { "wl1_nband", "1" },
287 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
288 { "wl_nreqd", "0" }, // Require 802.11n support
289 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
290 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
291 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
292 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
293 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
294 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
295 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
296 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
297 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
298 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
299 { "wl_bcn_rotate", "1" }, // Beacon rotation
300 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
301 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
303 #ifdef TCONFIG_EMF
304 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
305 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
306 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
307 { "emf_enable", "0" }, // Disable EMF by default
308 #endif
309 #ifdef CONFIG_BCMWL5
310 // AMPDU
311 { "wl_ampdu", "auto" }, // Default AMPDU setting
312 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
313 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
314 { "wl_amsdu", "auto" }, // Default AMSDU setting
315 // power save
316 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
317 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
318 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
319 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
320 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
321 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
322 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
323 // misc
324 { "wl_wmf_bss_enable", "0" }, // Wireless Multicast Forwarding Enable/Disable
325 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
326 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
327 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
328 #endif
330 { "pptp_server_ip", "" }, // as same as WAN gateway
331 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
332 { "pptp_dhcp", "1" },
334 // for firewall
335 { "mtu_enable", "0" }, // WAN MTU [1|0]
336 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
338 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
339 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
340 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
342 // misc
343 { "wl_tnoise", "-99" },
344 { "led_override", "" },
345 { "btn_override", "" },
346 { "btn_reset", "" },
347 { "env_path", "" },
348 { "manual_boot_nv", "0" },
349 // { "wlx_hpamp", "" },
350 // { "wlx_hperx", "" }, // see init.c
351 { "t_fix1", "" },
353 // basic-ddns
354 { "ddnsx0", "" },
355 { "ddnsx1", "" },
356 { "ddnsx0_cache", "" },
357 { "ddnsx1_cache", "" },
358 { "ddnsx_save", "1" },
359 { "ddnsx_refresh", "28" },
361 // basic-ident
362 { "router_name", "tomato" },
363 { "wan_hostname", "unknown" },
364 { "wan_domain", "" },
366 // basic-time
367 { "tm_sel", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
368 { "tm_tz", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
369 { "tm_dst", "1", },
370 { "ntp_updates", "4" },
371 { "ntp_tdod", "0" },
372 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
373 { "ntp_kiss", "" },
374 { "ntp_kiss_ignore", "" },
376 // basic-static
377 { "dhcpd_static", "" },
378 { "arpbind_listed", "0" }, // AB - Enable static ARP for all devices on list
380 // basic-wfilter
381 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
382 { "wl_macmode", "disabled" },
383 { "macnames", "" },
385 // advanced-ctnf
386 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
387 { "ct_udp_timeout", "30 180" },
388 { "ct_timeout", "10 10" },
389 { "ct_max", "8192" },
390 { "nf_ttl", "0" },
391 { "nf_l7in", "1" },
392 #ifdef LINUX26
393 { "nf_sip", "1" },
394 { "ct_hashsize", "2048" },
395 #endif
396 #ifdef LINUX26
397 { "nf_rtsp", "0" },
398 #else
399 { "nf_rtsp", "1" },
400 #endif
401 { "nf_pptp", "1" },
402 { "nf_h323", "1" },
403 { "nf_ftp", "1" },
405 // advanced-mac
406 { "mac_wan", "" },
407 { "wl_macaddr", "" },
409 // advanced-misc
410 { "boot_wait", "on" },
411 { "wait_time", "5" },
412 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
413 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
414 { "jumbo_frame_size", "2000" },
415 #ifdef CONFIG_BCMWL5
416 { "ctf_disable", "1" },
417 #endif
419 // advanced-dhcpdns
420 { "dhcpd_dmdns", "1" },
421 { "dhcpd_slt", "0" },
422 { "dhcpd_gwmode", "" },
423 { "dhcpd_lmax", "" },
424 { "dns_addget", "0" },
425 { "dns_intcpt", "0" },
426 { "dhcpc_minpkt", "1" },
427 { "dhcpc_custom", "" },
428 { "dns_norebind", "1" },
429 { "dnsmasq_custom", "" },
430 { "dhcpd_static_only", "0" },
431 // { "dnsmasq_norw", "0" },
433 // advanced-firewall
434 // { "block_loopback", "0" }, // nat loopback
435 { "nf_loopback", "0" },
436 { "block_wan", "1" }, // block inbound icmp
437 { "block_wan_limit", "1" },
438 { "block_wan_limit_icmp", "1" },
439 { "block_wan_limit_tr", "5" },
440 { "multicast_pass", "0" }, // enable multicast proxy
441 #ifdef TCONFIG_VLAN
442 { "multicast_lan", "0" }, // on LAN (br0)
443 { "multicast_lan1", "0" }, // on LAN1 (br1)
444 { "multicast_lan2", "0" }, // on LAN2 (br2)
445 { "multicast_lan3", "0" }, // on LAN3 (br3)
446 #endif
447 { "udpxy_enable", "0" },
448 { "udpxy_stats", "0" },
449 { "udpxy_clients", "3" },
450 { "udpxy_port", "4022" },
451 { "ne_syncookies", "0" }, // tcp_syncookies
452 { "ne_snat", "0" }, // use SNAT instead of MASQUERADE
453 { "dhcp_pass", "1" }, // allow DHCP responses
454 { "ne_shlimit", "0,3,60" },
456 // advanced-routing
457 { "routes_static", "" },
458 { "dhcp_routes", "1" },
459 { "wk_mode", "gateway" }, // Network mode [gateway|router]
460 #ifdef TCONFIG_ZEBRA
461 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
462 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
463 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
464 #ifdef TCONFIG_VLAN
465 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
466 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
467 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
468 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
469 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
470 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
471 #endif
472 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
473 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
474 #endif
476 // advanced-vlan
477 { "trunk_vlan_so", "0" }, // VLAN trunk support override
479 // advanced-wireless
480 { "wl_txant", "3" },
481 { "wl_txpwr", "0" }, // 0 = driver default power
482 { "wl_maxassoc", "128" }, // Max associations driver could support
483 { "wl_bss_maxassoc", "128" },
484 { "wl_distance", "" },
486 // forward-*
487 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
488 #ifdef TCONFIG_IPV6
489 { "ipv6_portforward", "" },
490 #endif
491 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
492 { "dmz_enable", "0" },
493 { "dmz_ipaddr", "0" },
494 { "dmz_sip", "" },
495 #ifdef TCONFIG_VLAN
496 { "dmz_ifname", "br0" },
497 #endif
499 // forward-upnp
500 { "upnp_enable", "3" },
501 { "upnp_secure", "1" },
502 { "upnp_port", "0" },
503 { "upnp_ssdp_interval", "60" }, // SSDP interval
504 { "upnp_max_age", "180" }, // Max age
505 { "upnp_mnp", "0" },
506 { "upnp_custom", "" },
507 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
508 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
509 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
510 #if 0 // disabled for miniupnpd
511 { "upnp_max_age", "180" }, // Max age
512 { "upnp_config", "0" },
513 #endif
515 // qos
516 { "atm_overhead", "0" },
517 { "qos_enable", "0" },
518 { "qos_ack", "0" },
519 { "qos_syn", "1" },
520 { "qos_fin", "1" },
521 { "qos_rst", "1" },
522 { "qos_udp", "0" },
523 { "qos_icmp", "1" },
524 { "qos_reset", "1" },
525 { "qos_obw", "700" },
526 { "qos_ibw", "16000" },
528 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<17<d<123<0<<0:10<<0<NTP>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<d<9<0<<0:50<<4<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<4<RPC (Microsoft)>0<<17<d<3544<0<<<<-1<Teredo Tunnel>0<<6<x<22,2222<0<<<<3<SSH>0<<6<d<23,992<0<<<<3<Telnet>0<<6<s<80,5938,8080,2222<0<<<<3<Remote Access>0<<-1<x<3389<0<<<<3<Remote Assistance>0<<-1<x<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<-1<x<554,5004,5005<0<<<<2<RTP, RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<s<53,88,3074<0<<<<1<Xbox Live>0<<6<d<1718:1720<0<<<<1<H323>0<<-1<d<11031,11235:11335,11999,2300:2400,6073,28800:29100,47624<0<<<<1<Various Games>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<MSGR1 - Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<MSGR2 - Yahoo>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<MSGR3 - Additional>0<<-1<d<19294:19310<0<<<<6<Google+ & Voice>0<<6<d<6005,6006<0<<<<6<Camfrog>0<<-1<x<6571,6891:6901<0<<<<6<WLM File/Webcam>0<<-1<a<<0<skypetoskype<<<1<Skype to Skype>0<<-1<a<<0<skypeout<<<-1<Skype Phone (deprecated)>0<<-1<a<<0<youtube-2012<<<2<YouTube 2012 (Youtube)>0<<-1<a<<0<flash<<<2<Flash Video (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video (Youtube)>0<<-1<a<<0<rtp<<<2<RTP>0<<-1<a<<0<rtmp<<<2<RTMP>0<<-1<a<<0<rtmpt<<<2<RTMPT (RTMP over HTTP)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<a<<0<irc<<<6<IRC>0<<6<d<80,443,8080<0<<0:512<<4<HTTP, HTTPS, HTTP Proxy>0<<6<d<80,443,8080<0<<512:<<7<HTTP, SSL File Transfers>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<6<d<119,563<0<<<<7<NNTP News & Downloads>0<<6<d<25,587,465,2525<0<<<<5<SMTP, Submission Mail>0<<6<d<110,995<0<<<<5<POP3 Mail>0<<6<d<143,220,585,993<0<<<<5<IMAP Mail>0<<17<d<1:65535<0<<<<9<P2P (uTP, UDP)" },
530 { "qos_burst0", "" },
531 { "qos_burst1", "" },
532 { "qos_default", "8" },
533 { "qos_orates", "5-100,5-30,5-30,5-100,20-100,5-70,5-70,5-70,5-30,1-5" },
534 { "qos_irates", "5-100,5-30,5-40,5-100,20-90,5-60,5-60,5-60,5-60,1-5" },
535 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger FileXfer P2P/Bulk Crawl" },
537 { "ne_vegas", "0" }, // TCP Vegas
538 { "ne_valpha", "3" }, // "
539 { "ne_vbeta", "3" }, // "
540 { "ne_vgamma", "2" }, // "
542 // qos-bw-limiter
543 { "qosl_enable", "0" },
544 // { "qosl_obw", "" }, //unused - used qos_obw
545 // { "qosl_ibw", "" }, //unused - used qos_obw
546 { "qosl_rules", "" },
548 // access restrictions
549 { "rruleN", "0" },
550 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
551 //* { "rrule##", "" },
552 { "rrulewp", "80,8080" },
554 #if TOMATO_SL
555 // samba
556 { "smbd_on", "0" },
557 { "nmbd_on", "0" },
558 { "smbd_wgroup", "WORKGROUP" },
559 { "smbd_nbname", "TOMATO" },
560 { "smbd_adminpass", "admin" },
561 #endif
563 // admin-access
564 { "http_username", "" }, // Username
565 { "http_passwd", "admin" }, // Password
566 { "remote_management", "0" }, // Remote Management [1|0]
567 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
568 { "http_wanport", "8080" }, // WAN port to listen on
569 { "http_lanport", "80" }, // LAN port to listen on
570 { "https_lanport", "443" }, // LAN port to listen on
571 { "http_enable", "1" }, // HTTP server enable/disable
572 { "https_enable", "0" }, // HTTPS server enable/disable
573 { "https_crt_save", "0" },
574 { "https_crt_cn", "" },
575 { "https_crt_file", "" },
576 { "https_crt", "" },
577 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
578 { "web_css", "tomato" },
579 { "web_svg", "1" },
580 { "telnetd_eas", "1" },
581 { "telnetd_port", "23" },
582 { "sshd_eas", "0" },
583 { "sshd_pass", "1" },
584 { "sshd_port", "22" },
585 { "sshd_remote", "0" },
586 { "sshd_rport", "2222" },
587 { "sshd_authkeys", "" },
588 { "sshd_hostkey", "" },
589 { "sshd_dsskey", "" },
590 { "sshd_forwarding", "1" },
591 { "rmgt_sip", "" }, // remote management: source ip address
592 { "http_id", "" },
593 { "web_mx", "" },
594 { "web_pb", "" },
596 // admin-bwm
597 { "rstats_enable", "1" },
598 { "rstats_path", "" },
599 { "rstats_stime", "48" },
600 { "rstats_offset", "1" },
601 { "rstats_data", "" },
602 { "rstats_colors", "" },
603 { "rstats_exclude", "" },
604 { "rstats_sshut", "1" },
605 { "rstats_bak", "0" },
607 // admin-ipt
608 { "cstats_enable", "0" },
609 { "cstats_path", "" },
610 { "cstats_stime", "48" },
611 { "cstats_offset", "1" },
612 { "cstats_labels", "0" },
613 { "cstats_exclude", "" },
614 { "cstats_include", "" },
615 { "cstats_all", "1" },
616 { "cstats_sshut", "1" },
617 { "cstats_bak", "0" },
619 // advanced-buttons
620 { "sesx_led", "0" },
621 { "sesx_b0", "1" },
622 { "sesx_b1", "4" },
623 { "sesx_b2", "4" },
624 { "sesx_b3", "4" },
625 { "sesx_script",
626 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
628 { "script_brau",
629 "if [ ! -e /tmp/switch-start ]; then\n"
630 " # do something at startup\n"
631 " echo position at startup was $1 >/tmp/switch-start\n"
632 " exit\n"
633 "fi\n"
634 "if [ $1 = \"bridge\" ]; then\n"
635 " # do something\n"
636 " led bridge on\n"
637 "elif [ $1 = \"auto\" ]; then\n"
638 " # do something\n"
639 " led bridge off\n"
640 "fi\n"
643 // admin-log
644 { "log_remote", "0" },
645 { "log_remoteip", "" },
646 { "log_remoteport", "514" },
647 { "log_file", "1" },
648 { "log_file_custom", "0" },
649 { "log_file_path", "/var/log/messages"},
650 { "log_file_size", "50" },
651 { "log_file_keep", "1" },
652 { "log_limit", "60" },
653 { "log_in", "0" },
654 { "log_out", "0" },
655 { "log_mark", "60" },
656 { "log_events", "" },
658 // admin-log-webmonitor
659 { "log_wm", "0" },
660 { "log_wmtype", "0" },
661 { "log_wmip", "" },
662 { "log_wmdmax", "300" },
663 { "log_wmsmax", "300" },
665 // admin-debugging
666 { "debug_nocommit", "0" },
667 { "debug_cprintf", "0" },
668 { "debug_cprintf_file", "0" },
669 // { "debug_keepfiles", "0" },
670 { "console_loglevel", "1" },
671 { "t_cafree", "1" },
672 { "t_hidelr", "0" },
673 { "debug_clkfix", "1" },
674 { "debug_ddns", "0" },
676 // admin-cifs
677 { "cifs1", "" },
678 { "cifs2", "" },
680 // admin-jffs2
681 { "jffs2_on", "0" },
682 { "jffs2_exec", "" },
684 #ifdef TCONFIG_USB
685 // nas-usb - !!TB
686 { "usb_enable", "0" },
687 { "usb_uhci", "0" },
688 { "usb_ohci", "0" },
689 { "usb_usb2", "1" },
690 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
691 { "usb_mmc", "-1" },
692 #endif
693 { "usb_irq_thresh", "0" },
694 { "usb_storage", "1" },
695 { "usb_printer", "1" },
696 { "usb_printer_bidirect", "0" },
697 { "usb_ext_opt", "" },
698 { "usb_fat_opt", "" },
699 { "usb_ntfs_opt", "" },
700 { "usb_fs_ext3", "1" },
701 { "usb_fs_fat", "1" },
702 #ifdef TCONFIG_NTFS
703 { "usb_fs_ntfs", "1" },
704 #endif
705 { "usb_fs_hfs", "0" }, //!Victek
706 { "usb_fs_hfsplus", "0" }, //!Victek
707 { "usb_automount", "1" },
708 #if 0
709 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
710 #endif
711 { "script_usbhotplug", "" },
712 { "script_usbmount", "" },
713 { "script_usbumount", "" },
714 { "idle_enable", "0" },
715 { "usb_3g", "1" },
716 #endif
718 #ifdef TCONFIG_FTP
719 // nas-ftp - !!TB
720 { "ftp_enable", "0" },
721 { "ftp_super", "0" },
722 { "ftp_anonymous", "0" },
723 { "ftp_dirlist", "0" },
724 { "ftp_port", "21" },
725 { "ftp_max", "0" },
726 { "ftp_ipmax", "0" },
727 { "ftp_staytimeout", "300" },
728 { "ftp_rate", "0" },
729 { "ftp_anonrate", "0" },
730 { "ftp_anonroot", "" },
731 { "ftp_pubroot", "" },
732 { "ftp_pvtroot", "" },
733 { "ftp_users", "" },
734 { "ftp_custom", "" },
735 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
736 { "ftp_limit", "0,3,60" },
737 { "log_ftp", "0" },
738 #endif
740 #ifdef TCONFIG_SNMP
741 { "snmp_enable", "0" },
742 { "snmp_port", "161" },
743 { "snmp_remote", "0" },
744 { "snmp_remote_sip", "" },
745 { "snmp_location", "router" },
746 { "snmp_contact", "admin@tomato" },
747 { "snmp_ro", "rocommunity" },
748 #endif
750 #ifdef TCONFIG_SAMBASRV
751 // nas-samba - !!TB
752 { "smbd_enable", "0" },
753 { "smbd_wgroup", "WORKGROUP" },
754 { "smbd_master", "1" },
755 { "smbd_wins", "1" },
756 { "smbd_cpage", "" },
757 { "smbd_cset", "utf8" },
758 { "smbd_custom", "" },
759 { "smbd_autoshare", "2" },
760 { "smbd_shares",
761 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
763 { "smbd_user", "nas" },
764 { "smbd_passwd", "" },
765 #endif
767 #ifdef TCONFIG_MEDIA_SERVER
768 // nas-media
769 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
770 { "ms_dirs", "/mnt<" },
771 { "ms_port", "0" },
772 { "ms_dbdir", "" },
773 { "ms_tivo", "0" },
774 { "ms_stdlna", "0" },
775 { "ms_sas", "0" },
776 #endif
778 // admin-sch
779 { "sch_rboot", "" },
780 { "sch_rcon", "" },
781 { "sch_c1", "" },
782 { "sch_c2", "" },
783 { "sch_c3", "" },
784 { "sch_c1_cmd", "" },
785 { "sch_c2_cmd", "" },
786 { "sch_c3_cmd", "" },
788 // admin-script
789 { "script_init", "" },
790 { "script_shut", "" },
791 { "script_fire",
792 "# Example scripts\n\n"
793 "# Restrict number of TCP connections per user\n"
794 "# iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP\n"
795 "# Restrict number of non-TCP connections per user\n"
796 "# iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP\n"
797 "# Restrict number of simultaneous SMTP connections (e.g. from mailer viruses)\n"
798 "# iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP\n"
800 { "script_wanup", "" },
803 #ifdef TCONFIG_OPENVPN
804 // vpn
805 { "vpn_debug", "0" },
806 { "vpn_server_eas", "" },
807 { "vpn_server_dns", "" },
808 { "vpn_server1_poll", "0" },
809 { "vpn_server1_if", "tun" },
810 { "vpn_server1_proto", "udp" },
811 { "vpn_server1_port", "1194" },
812 { "vpn_server1_firewall", "auto" },
813 { "vpn_server1_crypt", "tls" },
814 { "vpn_server1_comp", "adaptive" },
815 { "vpn_server1_cipher", "default" },
816 { "vpn_server1_dhcp", "1" },
817 { "vpn_server1_r1", "192.168.1.50" },
818 { "vpn_server1_r2", "192.168.1.55" },
819 { "vpn_server1_sn", "10.8.0.0" },
820 { "vpn_server1_nm", "255.255.255.0" },
821 { "vpn_server1_local", "10.8.0.1" },
822 { "vpn_server1_remote", "10.8.0.2" },
823 { "vpn_server1_reneg", "-1" },
824 { "vpn_server1_hmac", "-1" },
825 { "vpn_server1_plan", "1" },
826 { "vpn_server1_ccd", "0" },
827 { "vpn_server1_c2c", "0" },
828 { "vpn_server1_ccd_excl", "0" },
829 { "vpn_server1_ccd_val", "" },
830 { "vpn_server1_pdns", "0" },
831 { "vpn_server1_rgw", "0" },
832 { "vpn_server1_custom", "" },
833 { "vpn_server1_static", "" },
834 { "vpn_server1_ca", "" },
835 { "vpn_server1_crt", "" },
836 { "vpn_server1_key", "" },
837 { "vpn_server1_dh", "" },
838 { "vpn_server2_poll", "0" },
839 { "vpn_server2_if", "tun" },
840 { "vpn_server2_proto", "udp" },
841 { "vpn_server2_port", "1194" },
842 { "vpn_server2_firewall", "auto" },
843 { "vpn_server2_crypt", "tls" },
844 { "vpn_server2_comp", "adaptive" },
845 { "vpn_server2_cipher", "default" },
846 { "vpn_server2_dhcp", "1" },
847 { "vpn_server2_r1", "192.168.1.50" },
848 { "vpn_server2_r2", "192.168.1.55" },
849 { "vpn_server2_sn", "10.8.0.0" },
850 { "vpn_server2_nm", "255.255.255.0" },
851 { "vpn_server2_local", "10.8.0.1" },
852 { "vpn_server2_remote", "10.8.0.2" },
853 { "vpn_server2_reneg", "-1" },
854 { "vpn_server2_hmac", "-1" },
855 { "vpn_server2_plan", "1" },
856 { "vpn_server2_ccd", "0" },
857 { "vpn_server2_c2c", "0" },
858 { "vpn_server2_ccd_excl", "0" },
859 { "vpn_server2_ccd_val", "" },
860 { "vpn_server2_pdns", "0" },
861 { "vpn_server2_rgw", "0" },
862 { "vpn_server2_custom", "" },
863 { "vpn_server2_static", "" },
864 { "vpn_server2_ca", "" },
865 { "vpn_server2_crt", "" },
866 { "vpn_server2_key", "" },
867 { "vpn_server2_dh", "" },
868 { "vpn_client_eas", "" },
869 { "vpn_client1_poll", "0" },
870 { "vpn_client1_if", "tun" },
871 { "vpn_client1_bridge", "1" },
872 { "vpn_client1_nat", "1" },
873 { "vpn_client1_proto", "udp" },
874 { "vpn_client1_addr", "" },
875 { "vpn_client1_port", "1194" },
876 { "vpn_client1_retry", "30" },
877 { "vpn_client1_rg", "0" },
878 { "vpn_client1_firewall", "auto" },
879 { "vpn_client1_crypt", "tls" },
880 { "vpn_client1_comp", "adaptive" },
881 { "vpn_client1_cipher", "default" },
882 { "vpn_client1_local", "10.8.0.2" },
883 { "vpn_client1_remote", "10.8.0.1" },
884 { "vpn_client1_nm", "255.255.255.0" },
885 { "vpn_client1_reneg", "-1" },
886 { "vpn_client1_hmac", "-1" },
887 { "vpn_client1_adns", "0" },
888 { "vpn_client1_rgw", "0" },
889 { "vpn_client1_gw", "" },
890 { "vpn_client1_custom", "" },
891 { "vpn_client1_static", "" },
892 { "vpn_client1_ca", "" },
893 { "vpn_client1_crt", "" },
894 { "vpn_client1_key", "" },
895 { "vpn_client2_poll", "0" },
896 { "vpn_client2_if", "tun" },
897 { "vpn_client2_bridge", "1" },
898 { "vpn_client2_nat", "1" },
899 { "vpn_client2_proto", "udp" },
900 { "vpn_client2_addr", "" },
901 { "vpn_client2_port", "1194" },
902 { "vpn_client2_retry", "30" },
903 { "vpn_client2_rg", "0" },
904 { "vpn_client2_firewall", "auto" },
905 { "vpn_client2_crypt", "tls" },
906 { "vpn_client2_comp", "adaptive" },
907 { "vpn_client2_cipher", "default" },
908 { "vpn_client2_local", "10.8.0.2" },
909 { "vpn_client2_remote", "10.8.0.1" },
910 { "vpn_client2_nm", "255.255.255.0" },
911 { "vpn_client2_reneg", "-1" },
912 { "vpn_client2_hmac", "-1" },
913 { "vpn_client2_adns", "0" },
914 { "vpn_client2_rgw", "0" },
915 { "vpn_client2_gw", "" },
916 { "vpn_client2_custom", "" },
917 { "vpn_client2_static", "" },
918 { "vpn_client2_ca", "" },
919 { "vpn_client2_crt", "" },
920 { "vpn_client2_key", "" },
921 #endif // vpn
922 #ifdef TCONFIG_USERPPTP
923 { "pptp_client_enable", "0" },
924 { "pptp_client_peerdns", "0" },
925 { "pptp_client_mtuenable","0" },
926 { "pptp_client_mtu", "1450" },
927 { "pptp_client_mruenable","0" },
928 { "pptp_client_mru", "1450" },
929 { "pptp_client_nat", "0" },
930 { "pptp_client_srvip", "" },
931 { "pptp_client_srvsub", "10.0.0.0" },
932 { "pptp_client_srvsubmsk","255.0.0.0" },
933 { "pptp_client_username", "" },
934 { "pptp_client_passwd", "" },
935 { "pptp_client_crypt", "0" },
936 { "pptp_client_custom", "" },
937 { "pptp_client_dfltroute","0" },
938 #endif
940 #if 0
941 // safe to remove?
942 { "QoS", "0" },
944 { "ses_enable", "0" }, // enable ses
945 { "ses_event", "2" }, // initial ses event
946 { "ses_led_assertlvl", "0" }, // For SES II
947 { "ses_client_join", "0" }, // For SES II
948 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
949 { "ses_count", "0" },
950 { "eou_configured", "0" },
952 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
953 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
954 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
955 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
956 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
957 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
958 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
959 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
960 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
961 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
962 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
963 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
965 //obs zzz { "http_method", "post" }, // HTTP method
967 // { "wl_macmode1", "disabled" },
969 /* obsolete
970 { "filter", "on" }, // Firewall Protection [on|off]
971 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
972 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
973 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
974 { "block_cookie", "0" }, // Block Cookie [1|0]
975 { "ident_pass", "0" }, // IDENT passthrough [1|0]
976 { "block_proxy", "0" }, // Block Proxy [1|0]
979 /* --- obsolete ---
980 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
981 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
983 // for mac clone
984 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
985 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
987 { "public_ip", "" }, // public ip
990 //forced in rc.c { "os_name", "" }, // OS name string
991 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
992 //forced in rc.c { "os_date", __DATE__ }, // OS date
993 //not used { "ct_modules", "" }, // CyberTAN kernel modules
994 //obs { "timer_interval", "3600" }, // Timer interval in seconds
995 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
996 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
997 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
998 //obs { "os_server", "" }, // URL for getting upgrades
999 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
1000 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
1001 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
1002 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
1003 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
1004 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
1005 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
1006 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
1007 //{ "eou_device_id", "" },
1008 //{ "eou_public_key", "" },
1009 //{ "eou_private_key", "" },
1010 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
1011 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
1012 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
1013 // { "ntp_enable", "1" }, // replaced with ntp_updates
1014 // { "ntp_mode", "auto" }, // auto, manual
1017 // for AOL
1018 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
1019 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
1020 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
1021 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
1022 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
1024 // advanced-watchdog
1025 { "wd_en", "" },
1026 { "wd_atp0", "" },
1027 { "wd_atp1", "" },
1028 { "wd_atp2", "" },
1029 { "wd_atp3", "" },
1030 { "wd_atp4", "" },
1031 { "wd_mxr", "3" },
1032 { "wd_rdy", "15" },
1033 { "wd_cki", "300" },
1034 { "wd_fdm", "" },
1035 { "wd_aof", "" },
1037 #endif // 0
1039 // arpbind
1040 { "arpbind_enable", "0" },
1041 { "arpbind_only", "0" },
1042 { "arpbind_list", "" },
1044 // NoCatSplash. !!Victek
1045 #ifdef TCONFIG_NOCAT
1046 { "NC_enable", "0" }, // enable NoCatSplash
1047 { "NC_Verbosity", "2" },
1048 { "NC_GatewayName", "Tomato Captive Portal" },
1049 { "NC_GatewayPort", "5280" },
1050 { "NC_GatewayMode", "Open" },
1051 { "NC_DocumentRoot", "/tmp/splashd" },
1052 { "NC_ExcludePorts", "1863" },
1053 { "NC_HomePage", "http://google.com" },
1054 { "NC_ForcedRedirect", "0" },
1055 { "NC_IdleTimeout", "0" },
1056 { "NC_MaxMissedARP", "5" },
1057 { "NC_PeerChecktimeout", "0" },
1058 { "NC_LoginTimeout", "3600" },
1059 { "NC_RenewTimeout", "0" },
1060 { "NC_AllowedWebHosts", "" },
1061 #ifdef TCONFIG_VLAN
1062 { "NC_BridgeLAN", "br0" },
1063 #endif
1064 #endif
1065 { NULL, NULL}
1069 const defaults_t if_generic[] = {
1070 { "lan_ifname", "br0" },
1071 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
1072 { "wan_ifname", "eth1" },
1073 { "wan_ifnames", "eth1" },
1074 { NULL, NULL }
1077 const defaults_t if_vlan[] = {
1078 { "lan_ifname", "br0" },
1079 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
1080 #ifdef TCONFIG_VLAN
1081 { "lan1_ifname", "" },
1082 { "lan1_ifnames", "" },
1083 { "lan2_ifname", "" },
1084 { "lan2_ifnames", "" },
1085 { "lan3_ifname", "" },
1086 { "lan3_ifnames", "" },
1087 #endif
1088 { "wan_ifname", "vlan1" },
1089 { "wan_ifnames", "vlan1" },
1090 { NULL, NULL }