3 Copyright 2003, CyberTAN Inc.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
39 //! = see restore_main()
41 const defaults_t defaults
[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "static" }, // DHCP server [static|dhcp] //start with ENABLED dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
65 { "lan1_ipaddr", "" },
66 { "lan1_netmask", "" },
68 { "lan2_ipaddr", "" },
69 { "lan2_netmask", "" },
71 { "lan3_ipaddr", "" },
72 { "lan3_netmask", "" },
77 //! { "wan_ifname", "" }, // WAN interface name
78 //! { "wan_ifnames", "" }, // WAN interface names
79 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
80 { "wan_hwaddr", "" }, // WAN interface MAC address
81 { "wan_ifnameX", NULL
}, // real wan if; see wan.c:start_wan
83 // WAN TCP/IP parameters
84 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
85 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
86 { "wan_netmask", "0.0.0.0" }, // WAN netmask
87 { "wan_gateway", "0.0.0.0" }, // WAN gateway
88 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
89 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
90 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
91 { "wan_lease", "86400" }, // WAN lease time in seconds
93 { "modem_ipaddr", "0.0.0.0" }, // modem IP address (i.e. PPPoE bridged modem)
95 { "wan_primary", "1" }, // Primary wan connection
96 { "wan_unit", "0" }, // Last configured connection
99 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
100 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
101 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
103 { "filter", "on" }, // [on | off] Firewall Protection
106 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
108 // DHCP server parameters
109 { "dhcp_start", "100" }, //
110 { "dhcp_num", "50" }, //
111 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
112 { "dhcpd_endip", "" }, // "
113 { "dhcp_lease", "0" }, // LAN lease time in minutes
114 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
115 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
116 { "wan_routes", "" },
117 { "wan_msroutes", "" },
120 { "dhcp1_start", "" },
122 { "dhcpd1_startip", "" },
123 { "dhcpd1_endip", "" },
124 { "dhcp1_lease", "0" },
125 { "dhcp2_start", "" },
127 { "dhcpd2_startip", "" },
128 { "dhcpd2_endip", "" },
129 { "dhcp2_lease", "0" },
130 { "dhcp3_start", "" },
132 { "dhcpd3_startip", "" },
133 { "dhcpd3_endip", "" },
134 { "dhcp3_lease", "0" },
139 { "modem_dev", "USB0" },
140 { "modem_init", "*99#" },
141 { "modem_apn", "internet" },
144 { "pppoe_ifname", "" }, // PPPoE enslaved interface
145 { "ppp_username", "" }, // PPP username
146 { "ppp_passwd", "" }, // PPP password
147 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
148 { "ppp_keepalive", "0" }, // Restore link automatically
149 { "ppp_demand", "0" }, // Dial on demand
150 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
151 { "ppp_mru", "1500" }, // Negotiate MRU to this value
152 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
153 { "ppp_service", "" }, // PPPoE service name
154 { "ppp_ac", "" }, // PPPoE access concentrator name
155 { "ppp_static", "0" }, // Enable / Disable Static IP
156 { "ppp_static_ip", "" }, // PPPoE Static IP
157 { "ppp_get_ac", "" }, // PPPoE Server ac name
158 { "ppp_get_srv", "" }, // PPPoE Server service name
159 { "ppp_custom", "" }, // PPPD additional options
160 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
167 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
168 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
169 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
170 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
171 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
172 { "ipv6_accept_ra", "1" }, // Accept RA on WAN and/or LAN interfaces
173 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
174 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
175 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
176 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
177 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
178 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
179 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
180 { "ipv6_dns", "" }, // DNS server(s) IPs
181 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
184 // Wireless parameters
185 { "wl_ifname", "" }, // Interface name
186 { "wl_hwaddr", "" }, // MAC address
187 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
188 { "wl_corerev", "" }, // Current core revision
189 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
190 { "wl_radioids", "" }, // List of radio IDs
191 { "wl_ssid", "wireless" }, // Service set ID (network name)
192 { "wl1_ssid", "wireless1" },
193 { "wl_country_code", "SG" }, // Country (default obtained from driver)
194 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
195 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
196 { "wl_closed", "0" }, // Closed (hidden) network
197 { "wl_ap_isolate", "0" }, // AP isolate mode
198 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
199 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
200 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
201 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
202 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
203 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
204 { "wl_key", "1" }, // Current WEP key
205 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
206 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
207 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
208 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
209 { "wl_channel", "1" }, // Channel number
210 { "wl1_channel", "0" },
211 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
212 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
213 { "wl_rateset", "default" }, // "default" or "all" or "12"
214 { "wl_frag", "2346" }, // Fragmentation threshold
215 { "wl_rts", "2347" }, // RTS threshold
216 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
217 { "wl_bcn", "100" }, // Beacon interval
218 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
219 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
220 { "wl_gmode", "1" }, // 54g mode
221 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
222 { "wl_afterburner", "off" }, // AfterBurner
223 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
224 { "wl_wme", "auto" }, // WME mode (auto|off|on)
225 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
226 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
227 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
228 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
229 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
230 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3|4) //Toastman 0=off
231 { "wl_passphrase", "" }, // Passphrase // Add
232 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
233 { "wl_wep_buf", "" }, // save all settings for web // Add
234 { "wl_wep_gen", "" }, // save all settings for generate button // Add
235 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
238 { "wl_vifs", "" }, // multiple/virtual BSSIDs
242 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
243 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
244 { "wl_wpa_psk", "" }, // WPA pre-shared key
245 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
246 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
247 { "wl_radius_key", "" }, // RADIUS shared secret
248 { "wl_radius_port", "1812" }, // RADIUS server UDP port
249 { "wl_crypto", "aes" }, // WPA data encryption
250 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
251 { "wl_akm", "" }, // WPA akm list
253 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
254 // EDCA parameters for STA
255 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
256 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
257 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
258 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
260 // EDCA parameters for AP
261 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
262 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
263 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
264 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
266 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
267 { "wl_wme_apsd", "off" }, // WME APSD mode
268 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
270 /* Per AC Tx parameters */
271 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
272 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
273 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
274 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
276 { "wl_unit", "0" }, // Last configured interface
277 { "wl_mac_deny", "" }, // filter MAC // Add
279 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
280 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
281 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
284 { "wl_nmode", "-1" }, // N-mode
285 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
286 { "wl1_nband", "1" },
287 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
288 { "wl_nreqd", "0" }, // Require 802.11n support
289 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
290 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
291 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
292 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
293 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
294 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
295 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
296 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
297 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
298 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
299 { "wl_bcn_rotate", "1" }, // Beacon rotation
300 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
301 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
304 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
305 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
306 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
307 { "emf_enable", "0" }, // Disable EMF by default
311 { "wl_ampdu", "auto" }, // Default AMPDU setting
312 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
313 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
314 { "wl_amsdu", "auto" }, // Default AMSDU setting
316 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
317 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
318 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
319 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
320 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
321 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
322 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
324 { "wl_wmf_bss_enable", "0" }, // Wireless Multicast Forwarding Enable/Disable
325 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
326 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
327 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
330 { "pptp_server_ip", "" }, // as same as WAN gateway
331 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
332 { "pptp_dhcp", "1" },
335 { "mtu_enable", "0" }, // WAN MTU [1|0]
336 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
338 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
339 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
340 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
343 { "wl_tnoise", "-99" },
344 { "led_override", "" },
345 { "btn_override", "" },
348 { "manual_boot_nv", "0" },
349 // { "wlx_hpamp", "" },
350 // { "wlx_hperx", "" }, // see init.c
356 { "ddnsx0_cache", "" },
357 { "ddnsx1_cache", "" },
358 { "ddnsx_save", "1" },
359 { "ddnsx_refresh", "28" },
362 { "router_name", "tomato" },
363 { "wan_hostname", "unknown" },
364 { "wan_domain", "" },
367 { "tm_sel", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
368 { "tm_tz", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
370 { "ntp_updates", "4" },
372 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
374 { "ntp_kiss_ignore", "" },
377 { "dhcpd_static", "" },
378 { "arpbind_listed", "0" }, // AB - Enable static ARP for all devices on list
381 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
382 { "wl_macmode", "disabled" },
386 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
387 { "ct_udp_timeout", "30 180" },
388 { "ct_timeout", "10 10" },
389 { "ct_max", "8192" },
394 { "ct_hashsize", "2048" },
407 { "wl_macaddr", "" },
410 { "boot_wait", "on" },
411 { "wait_time", "5" },
412 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
413 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
414 { "jumbo_frame_size", "2000" },
416 { "ctf_disable", "1" },
420 { "dhcpd_dmdns", "1" },
421 { "dhcpd_slt", "0" },
422 { "dhcpd_gwmode", "" },
423 { "dhcpd_lmax", "" },
424 { "dns_addget", "0" },
425 { "dns_intcpt", "0" },
426 { "dhcpc_minpkt", "1" },
427 { "dhcpc_custom", "" },
428 { "dns_norebind", "1" },
429 { "dnsmasq_custom", "" },
430 { "dhcpd_static_only", "0" },
431 // { "dnsmasq_norw", "0" },
434 // { "block_loopback", "0" }, // nat loopback
435 { "nf_loopback", "0" },
436 { "block_wan", "1" }, // block inbound icmp
437 { "block_wan_limit", "1" },
438 { "block_wan_limit_icmp", "1" },
439 { "block_wan_limit_tr", "5" },
440 { "multicast_pass", "0" }, // enable multicast proxy
442 { "multicast_lan", "0" }, // on LAN (br0)
443 { "multicast_lan1", "0" }, // on LAN1 (br1)
444 { "multicast_lan2", "0" }, // on LAN2 (br2)
445 { "multicast_lan3", "0" }, // on LAN3 (br3)
447 { "udpxy_enable", "0" },
448 { "udpxy_stats", "0" },
449 { "udpxy_clients", "3" },
450 { "udpxy_port", "4022" },
451 { "ne_syncookies", "0" }, // tcp_syncookies
452 { "ne_snat", "0" }, // use SNAT instead of MASQUERADE
453 { "dhcp_pass", "1" }, // allow DHCP responses
454 { "ne_shlimit", "0,3,60" },
457 { "routes_static", "" },
458 { "dhcp_routes", "1" },
459 { "wk_mode", "gateway" }, // Network mode [gateway|router]
461 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
462 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
463 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
465 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
466 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
467 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
468 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
469 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
470 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
472 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
473 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
477 { "trunk_vlan_so", "0" }, // VLAN trunk support override
481 { "wl_txpwr", "0" }, // 0 = driver default power
482 { "wl_maxassoc", "128" }, // Max associations driver could support
483 { "wl_bss_maxassoc", "128" },
484 { "wl_distance", "" },
487 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
489 { "ipv6_portforward", "" },
491 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
492 { "dmz_enable", "0" },
493 { "dmz_ipaddr", "0" },
496 { "dmz_ifname", "br0" },
500 { "upnp_enable", "3" },
501 { "upnp_secure", "1" },
502 { "upnp_port", "0" },
503 { "upnp_ssdp_interval", "60" }, // SSDP interval
504 { "upnp_max_age", "180" }, // Max age
506 { "upnp_custom", "" },
507 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
508 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
509 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
510 #if 0 // disabled for miniupnpd
511 { "upnp_max_age", "180" }, // Max age
512 { "upnp_config", "0" },
516 { "atm_overhead", "0" },
517 { "qos_enable", "0" },
524 { "qos_reset", "1" },
525 { "qos_obw", "700" },
526 { "qos_ibw", "16000" },
528 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<17<d<123<0<<0:10<<0<NTP>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<d<9<0<<0:50<<4<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<4<RPC (Microsoft)>0<<17<d<3544<0<<<<-1<Teredo Tunnel>0<<6<x<22,2222<0<<<<3<SSH>0<<6<d<23,992<0<<<<3<Telnet>0<<6<s<80,5938,8080,2222<0<<<<3<Remote Access>0<<-1<x<3389<0<<<<3<Remote Assistance>0<<-1<x<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<-1<x<554,5004,5005<0<<<<2<RTP, RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<s<53,88,3074<0<<<<1<Xbox Live>0<<6<d<1718:1720<0<<<<1<H323>0<<-1<d<11031,11235:11335,11999,2300:2400,6073,28800:29100,47624<0<<<<1<Various Games>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<MSGR1 - Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<MSGR2 - Yahoo>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<MSGR3 - Additional>0<<-1<d<19294:19310<0<<<<6<Google+ & Voice>0<<6<d<6005,6006<0<<<<6<Camfrog>0<<-1<x<6571,6891:6901<0<<<<6<WLM File/Webcam>0<<-1<a<<0<skypetoskype<<<1<Skype to Skype>0<<-1<a<<0<skypeout<<<-1<Skype Phone (deprecated)>0<<-1<a<<0<youtube-2012<<<2<YouTube 2012 (Youtube)>0<<-1<a<<0<flash<<<2<Flash Video (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video (Youtube)>0<<-1<a<<0<rtp<<<2<RTP>0<<-1<a<<0<rtmp<<<2<RTMP>0<<-1<a<<0<rtmpt<<<2<RTMPT (RTMP over HTTP)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<a<<0<irc<<<6<IRC>0<<6<d<80,443,8080<0<<0:512<<4<HTTP, HTTPS, HTTP Proxy>0<<6<d<80,443,8080<0<<512:<<7<HTTP, SSL File Transfers>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<6<d<119,563<0<<<<7<NNTP News & Downloads>0<<6<d<25,587,465,2525<0<<<<5<SMTP, Submission Mail>0<<6<d<110,995<0<<<<5<POP3 Mail>0<<6<d<143,220,585,993<0<<<<5<IMAP Mail>0<<17<d<1:65535<0<<<<9<P2P (uTP, UDP)" },
530 { "qos_burst0", "" },
531 { "qos_burst1", "" },
532 { "qos_default", "8" },
533 { "qos_orates", "5-100,5-30,5-30,5-100,20-100,5-70,5-70,5-70,5-30,1-5" },
534 { "qos_irates", "5-100,5-30,5-40,5-100,20-90,5-60,5-60,5-60,5-60,1-5" },
535 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger FileXfer P2P/Bulk Crawl" },
537 { "ne_vegas", "0" }, // TCP Vegas
538 { "ne_valpha", "3" }, // "
539 { "ne_vbeta", "3" }, // "
540 { "ne_vgamma", "2" }, // "
543 { "qosl_enable", "0" },
544 { "qosl_rules", "" },
545 { "qosl_denable", "0" },
546 { "qosl_tcp", "0" },//unlimited
547 { "qosl_udp", "0" },//unlimited
552 // { "qosl_obw", "" }, unused - used qos_obw
553 // { "qosl_ibw", "" }, unused - used qos_obw
555 // access restrictions
557 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
558 //* { "rrule##", "" },
559 { "rrulewp", "80,8080" },
565 { "smbd_wgroup", "WORKGROUP" },
566 { "smbd_nbname", "TOMATO" },
567 { "smbd_adminpass", "admin" },
571 { "http_username", "" }, // Username
572 { "http_passwd", "admin" }, // Password
573 { "remote_management", "0" }, // Remote Management [1|0]
574 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
575 { "http_wanport", "8080" }, // WAN port to listen on
576 { "http_lanport", "80" }, // LAN port to listen on
577 { "https_lanport", "443" }, // LAN port to listen on
578 { "http_enable", "1" }, // HTTP server enable/disable
579 { "https_enable", "0" }, // HTTPS server enable/disable
580 { "https_crt_save", "0" },
581 { "https_crt_cn", "" },
582 { "https_crt_file", "" },
584 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
585 { "web_css", "tomato" },
587 { "telnetd_eas", "1" },
588 { "telnetd_port", "23" },
590 { "sshd_pass", "1" },
591 { "sshd_port", "22" },
592 { "sshd_remote", "0" },
593 { "sshd_rport", "2222" },
594 { "sshd_authkeys", "" },
595 { "sshd_hostkey", "" },
596 { "sshd_dsskey", "" },
597 { "sshd_forwarding", "1" },
598 { "rmgt_sip", "" }, // remote management: source ip address
604 { "rstats_enable", "1" },
605 { "rstats_path", "" },
606 { "rstats_stime", "48" },
607 { "rstats_offset", "1" },
608 { "rstats_data", "" },
609 { "rstats_colors", "" },
610 { "rstats_exclude", "" },
611 { "rstats_sshut", "1" },
612 { "rstats_bak", "0" },
615 { "cstats_enable", "0" },
616 { "cstats_path", "" },
617 { "cstats_stime", "48" },
618 { "cstats_offset", "1" },
619 { "cstats_labels", "0" },
620 { "cstats_exclude", "" },
621 { "cstats_include", "" },
622 { "cstats_all", "1" },
623 { "cstats_sshut", "1" },
624 { "cstats_bak", "0" },
633 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
636 "if [ ! -e /tmp/switch-start ]; then\n"
637 " # do something at startup\n"
638 " echo position at startup was $1 >/tmp/switch-start\n"
641 "if [ $1 = \"bridge\" ]; then\n"
644 "elif [ $1 = \"auto\" ]; then\n"
651 { "log_remote", "0" },
652 { "log_remoteip", "" },
653 { "log_remoteport", "514" },
655 { "log_file_custom", "0" },
656 { "log_file_path", "/var/log/messages"},
657 { "log_file_size", "50" },
658 { "log_file_keep", "1" },
659 { "log_limit", "60" },
662 { "log_mark", "60" },
663 { "log_events", "" },
665 // admin-log-webmonitor
667 { "log_wmtype", "0" },
669 { "log_wmdmax", "300" },
670 { "log_wmsmax", "300" },
673 { "debug_nocommit", "0" },
674 { "debug_cprintf", "0" },
675 { "debug_cprintf_file", "0" },
676 // { "debug_keepfiles", "0" },
677 { "console_loglevel", "1" },
680 { "debug_clkfix", "1" },
681 { "debug_ddns", "0" },
689 { "jffs2_exec", "" },
693 { "usb_enable", "0" },
697 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
700 { "usb_irq_thresh", "0" },
701 { "usb_storage", "1" },
702 { "usb_printer", "1" },
703 { "usb_printer_bidirect", "0" },
704 { "usb_ext_opt", "" },
705 { "usb_fat_opt", "" },
706 { "usb_ntfs_opt", "" },
707 { "usb_fs_ext3", "1" },
708 { "usb_fs_fat", "1" },
710 { "usb_fs_ntfs", "1" },
712 { "usb_fs_hfs", "0" }, //!Victek
713 { "usb_fs_hfsplus", "0" }, //!Victek
714 { "usb_automount", "1" },
716 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
718 { "script_usbhotplug", "" },
719 { "script_usbmount", "" },
720 { "script_usbumount", "" },
721 { "idle_enable", "0" },
727 { "ftp_enable", "0" },
728 { "ftp_super", "0" },
729 { "ftp_anonymous", "0" },
730 { "ftp_dirlist", "0" },
731 { "ftp_port", "21" },
733 { "ftp_ipmax", "0" },
734 { "ftp_staytimeout", "300" },
736 { "ftp_anonrate", "0" },
737 { "ftp_anonroot", "" },
738 { "ftp_pubroot", "" },
739 { "ftp_pvtroot", "" },
741 { "ftp_custom", "" },
742 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
743 { "ftp_limit", "0,3,60" },
748 { "snmp_enable", "0" },
749 { "snmp_port", "161" },
750 { "snmp_remote", "0" },
751 { "snmp_remote_sip", "" },
752 { "snmp_location", "router" },
753 { "snmp_contact", "admin@tomato" },
754 { "snmp_ro", "rocommunity" },
757 #ifdef TCONFIG_SAMBASRV
759 { "smbd_enable", "0" },
760 { "smbd_wgroup", "WORKGROUP" },
761 { "smbd_master", "1" },
762 { "smbd_wins", "1" },
763 { "smbd_cpage", "" },
764 { "smbd_cset", "utf8" },
765 { "smbd_custom", "" },
766 { "smbd_autoshare", "2" },
768 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
770 { "smbd_user", "nas" },
771 { "smbd_passwd", "" },
774 #ifdef TCONFIG_MEDIA_SERVER
776 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
777 { "ms_dirs", "/mnt<" },
781 { "ms_stdlna", "0" },
791 { "sch_c1_cmd", "" },
792 { "sch_c2_cmd", "" },
793 { "sch_c3_cmd", "" },
796 { "script_init", "" },
797 { "script_shut", "" },
799 "# Example scripts\n\n"
800 "# Restrict number of TCP connections per user\n"
801 "# iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP\n"
802 "# Restrict number of non-TCP connections per user\n"
803 "# iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP\n"
804 "# Restrict number of simultaneous SMTP connections (e.g. from mailer viruses)\n"
805 "# iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP\n"
807 { "script_wanup", "" },
810 #ifdef TCONFIG_OPENVPN
812 { "vpn_debug", "0" },
813 { "vpn_server_eas", "" },
814 { "vpn_server_dns", "" },
815 { "vpn_server1_poll", "0" },
816 { "vpn_server1_if", "tun" },
817 { "vpn_server1_proto", "udp" },
818 { "vpn_server1_port", "1194" },
819 { "vpn_server1_firewall", "auto" },
820 { "vpn_server1_crypt", "tls" },
821 { "vpn_server1_comp", "adaptive" },
822 { "vpn_server1_cipher", "default" },
823 { "vpn_server1_dhcp", "1" },
824 { "vpn_server1_r1", "192.168.1.50" },
825 { "vpn_server1_r2", "192.168.1.55" },
826 { "vpn_server1_sn", "10.8.0.0" },
827 { "vpn_server1_nm", "255.255.255.0" },
828 { "vpn_server1_local", "10.8.0.1" },
829 { "vpn_server1_remote", "10.8.0.2" },
830 { "vpn_server1_reneg", "-1" },
831 { "vpn_server1_hmac", "-1" },
832 { "vpn_server1_plan", "1" },
833 { "vpn_server1_ccd", "0" },
834 { "vpn_server1_c2c", "0" },
835 { "vpn_server1_ccd_excl", "0" },
836 { "vpn_server1_ccd_val", "" },
837 { "vpn_server1_pdns", "0" },
838 { "vpn_server1_rgw", "0" },
839 { "vpn_server1_custom", "" },
840 { "vpn_server1_static", "" },
841 { "vpn_server1_ca", "" },
842 { "vpn_server1_crt", "" },
843 { "vpn_server1_key", "" },
844 { "vpn_server1_dh", "" },
845 { "vpn_server2_poll", "0" },
846 { "vpn_server2_if", "tun" },
847 { "vpn_server2_proto", "udp" },
848 { "vpn_server2_port", "1194" },
849 { "vpn_server2_firewall", "auto" },
850 { "vpn_server2_crypt", "tls" },
851 { "vpn_server2_comp", "adaptive" },
852 { "vpn_server2_cipher", "default" },
853 { "vpn_server2_dhcp", "1" },
854 { "vpn_server2_r1", "192.168.1.50" },
855 { "vpn_server2_r2", "192.168.1.55" },
856 { "vpn_server2_sn", "10.8.0.0" },
857 { "vpn_server2_nm", "255.255.255.0" },
858 { "vpn_server2_local", "10.8.0.1" },
859 { "vpn_server2_remote", "10.8.0.2" },
860 { "vpn_server2_reneg", "-1" },
861 { "vpn_server2_hmac", "-1" },
862 { "vpn_server2_plan", "1" },
863 { "vpn_server2_ccd", "0" },
864 { "vpn_server2_c2c", "0" },
865 { "vpn_server2_ccd_excl", "0" },
866 { "vpn_server2_ccd_val", "" },
867 { "vpn_server2_pdns", "0" },
868 { "vpn_server2_rgw", "0" },
869 { "vpn_server2_custom", "" },
870 { "vpn_server2_static", "" },
871 { "vpn_server2_ca", "" },
872 { "vpn_server2_crt", "" },
873 { "vpn_server2_key", "" },
874 { "vpn_server2_dh", "" },
875 { "vpn_client_eas", "" },
876 { "vpn_client1_poll", "0" },
877 { "vpn_client1_if", "tun" },
878 { "vpn_client1_bridge", "1" },
879 { "vpn_client1_nat", "1" },
880 { "vpn_client1_proto", "udp" },
881 { "vpn_client1_addr", "" },
882 { "vpn_client1_port", "1194" },
883 { "vpn_client1_retry", "30" },
884 { "vpn_client1_rg", "0" },
885 { "vpn_client1_firewall", "auto" },
886 { "vpn_client1_crypt", "tls" },
887 { "vpn_client1_comp", "adaptive" },
888 { "vpn_client1_cipher", "default" },
889 { "vpn_client1_local", "10.8.0.2" },
890 { "vpn_client1_remote", "10.8.0.1" },
891 { "vpn_client1_nm", "255.255.255.0" },
892 { "vpn_client1_reneg", "-1" },
893 { "vpn_client1_hmac", "-1" },
894 { "vpn_client1_adns", "0" },
895 { "vpn_client1_rgw", "0" },
896 { "vpn_client1_gw", "" },
897 { "vpn_client1_custom", "" },
898 { "vpn_client1_static", "" },
899 { "vpn_client1_ca", "" },
900 { "vpn_client1_crt", "" },
901 { "vpn_client1_key", "" },
902 { "vpn_client2_poll", "0" },
903 { "vpn_client2_if", "tun" },
904 { "vpn_client2_bridge", "1" },
905 { "vpn_client2_nat", "1" },
906 { "vpn_client2_proto", "udp" },
907 { "vpn_client2_addr", "" },
908 { "vpn_client2_port", "1194" },
909 { "vpn_client2_retry", "30" },
910 { "vpn_client2_rg", "0" },
911 { "vpn_client2_firewall", "auto" },
912 { "vpn_client2_crypt", "tls" },
913 { "vpn_client2_comp", "adaptive" },
914 { "vpn_client2_cipher", "default" },
915 { "vpn_client2_local", "10.8.0.2" },
916 { "vpn_client2_remote", "10.8.0.1" },
917 { "vpn_client2_nm", "255.255.255.0" },
918 { "vpn_client2_reneg", "-1" },
919 { "vpn_client2_hmac", "-1" },
920 { "vpn_client2_adns", "0" },
921 { "vpn_client2_rgw", "0" },
922 { "vpn_client2_gw", "" },
923 { "vpn_client2_custom", "" },
924 { "vpn_client2_static", "" },
925 { "vpn_client2_ca", "" },
926 { "vpn_client2_crt", "" },
927 { "vpn_client2_key", "" },
929 #ifdef TCONFIG_USERPPTP
930 { "pptp_client_enable", "0" },
931 { "pptp_client_peerdns", "0" },
932 { "pptp_client_mtuenable","0" },
933 { "pptp_client_mtu", "1450" },
934 { "pptp_client_mruenable","0" },
935 { "pptp_client_mru", "1450" },
936 { "pptp_client_nat", "0" },
937 { "pptp_client_srvip", "" },
938 { "pptp_client_srvsub", "10.0.0.0" },
939 { "pptp_client_srvsubmsk","255.0.0.0" },
940 { "pptp_client_username", "" },
941 { "pptp_client_passwd", "" },
942 { "pptp_client_crypt", "0" },
943 { "pptp_client_custom", "" },
944 { "pptp_client_dfltroute","0" },
951 { "ses_enable", "0" }, // enable ses
952 { "ses_event", "2" }, // initial ses event
953 { "ses_led_assertlvl", "0" }, // For SES II
954 { "ses_client_join", "0" }, // For SES II
955 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
956 { "ses_count", "0" },
957 { "eou_configured", "0" },
959 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
960 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
961 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
962 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
963 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
964 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
965 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
966 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
967 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
968 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
969 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
970 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
972 //obs zzz { "http_method", "post" }, // HTTP method
974 // { "wl_macmode1", "disabled" },
977 { "filter", "on" }, // Firewall Protection [on|off]
978 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
979 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
980 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
981 { "block_cookie", "0" }, // Block Cookie [1|0]
982 { "ident_pass", "0" }, // IDENT passthrough [1|0]
983 { "block_proxy", "0" }, // Block Proxy [1|0]
987 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
988 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
991 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
992 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
994 { "public_ip", "" }, // public ip
997 //forced in rc.c { "os_name", "" }, // OS name string
998 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
999 //forced in rc.c { "os_date", __DATE__ }, // OS date
1000 //not used { "ct_modules", "" }, // CyberTAN kernel modules
1001 //obs { "timer_interval", "3600" }, // Timer interval in seconds
1002 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
1003 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
1004 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
1005 //obs { "os_server", "" }, // URL for getting upgrades
1006 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
1007 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
1008 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
1009 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
1010 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
1011 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
1012 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
1013 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
1014 //{ "eou_device_id", "" },
1015 //{ "eou_public_key", "" },
1016 //{ "eou_private_key", "" },
1017 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
1018 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
1019 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
1020 // { "ntp_enable", "1" }, // replaced with ntp_updates
1021 // { "ntp_mode", "auto" }, // auto, manual
1025 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
1026 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
1027 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
1028 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
1029 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
1031 // advanced-watchdog
1040 { "wd_cki", "300" },
1047 { "arpbind_enable", "0" },
1048 { "arpbind_only", "0" },
1049 { "arpbind_list", "" },
1051 // NoCatSplash. !!Victek
1052 #ifdef TCONFIG_NOCAT
1053 { "NC_enable", "0" }, // enable NoCatSplash
1054 { "NC_Verbosity", "2" },
1055 { "NC_GatewayName", "Tomato Captive Portal" },
1056 { "NC_GatewayPort", "5280" },
1057 { "NC_GatewayMode", "Open" },
1058 { "NC_DocumentRoot", "/tmp/splashd" },
1059 { "NC_ExcludePorts", "1863" },
1060 { "NC_HomePage", "http://google.com" },
1061 { "NC_ForcedRedirect", "0" },
1062 { "NC_IdleTimeout", "0" },
1063 { "NC_MaxMissedARP", "5" },
1064 { "NC_PeerChecktimeout", "0" },
1065 { "NC_LoginTimeout", "3600" },
1066 { "NC_RenewTimeout", "0" },
1067 { "NC_AllowedWebHosts", "" },
1069 { "NC_BridgeLAN", "br0" },
1076 const defaults_t if_generic
[] = {
1077 { "lan_ifname", "br0" },
1078 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
1079 { "wan_ifname", "eth1" },
1080 { "wan_ifnames", "eth1" },
1084 const defaults_t if_vlan
[] = {
1085 { "lan_ifname", "br0" },
1086 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
1088 { "lan1_ifname", "" },
1089 { "lan1_ifnames", "" },
1090 { "lan2_ifname", "" },
1091 { "lan2_ifnames", "" },
1092 { "lan3_ifname", "" },
1093 { "lan3_ifnames", "" },
1095 { "wan_ifname", "vlan1" },
1096 { "wan_ifnames", "vlan1" },