3 Copyright 2003, CyberTAN Inc.
6 This is UNPUBLISHED PROPRIETARY SOURCE CODE of CyberTAN Inc.
7 the contents of this file may not be disclosed to third parties,
8 copied or duplicated in any form without the prior written
9 permission of CyberTAN Inc.
11 This software should be used as a reference only, and it not
12 intended for production use!
14 THIS SOFTWARE IS OFFERED "AS IS", AND CYBERTAN GRANTS NO WARRANTIES OF ANY
15 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. CYBERTAN
16 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
17 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE
22 Copyright 2005, Broadcom Corporation
25 THIS SOFTWARE IS OFFERED "AS IS", AND BROADCOM GRANTS NO WARRANTIES OF ANY
26 KIND, EXPRESS OR IMPLIED, BY STATUTE, COMMUNICATION OR OTHERWISE. BROADCOM
27 SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS
28 FOR A SPECIFIC PURPOSE OR NONINFRINGEMENT CONCERNING THIS SOFTWARE.
35 #include <tomato_config.h> //!!TB
36 #include "tomato_profile.h"
39 //! = see restore_main()
41 const defaults_t defaults
[] = {
42 { "restore_defaults", "0" }, // Set to 0 to not restore defaults on boot
45 //! { "lan_ifname", "" }, // LAN interface name
46 //! { "lan_ifnames", "" }, // Enslaved LAN interfaces
47 { "lan_hwnames", "" }, // LAN driver names (e.g. et0)
48 { "lan_hwaddr", "" }, // LAN interface MAC address
50 // LAN TCP/IP parameters
51 { "lan_dhcp", "0" }, // DHCP client [static|dhcp]
52 { "lan_proto", "static" }, // DHCP server [static|dhcp] //start with ENABLED dhcp if nvram corrupted
53 { "lan_ipaddr", "192.168.1.1" }, // LAN IP address
54 { "lan_netmask", "255.255.255.0" }, // LAN netmask
55 { "lan_wins", "" }, // x.x.x.x x.x.x.x ...
56 { "lan_domain", "" }, // LAN domain name
57 { "lan_lease", "86400" }, // LAN lease time in seconds
58 { "lan_stp", "0" }, // LAN spanning tree protocol
59 { "lan_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
61 { "lan_gateway", "0.0.0.0" }, // LAN Gateway
62 { "wl_wds_enable", "0" }, // WDS Enable (0|1)
65 { "lan1_ipaddr", "" },
66 { "lan1_netmask", "" },
68 { "lan2_ipaddr", "" },
69 { "lan2_netmask", "" },
71 { "lan3_ipaddr", "" },
72 { "lan3_netmask", "" },
77 //! { "wan_ifname", "" }, // WAN interface name
78 //! { "wan_ifnames", "" }, // WAN interface names
79 { "wan_hwname", "" }, // WAN driver name (e.g. et1)
80 { "wan_hwaddr", "" }, // WAN interface MAC address
81 { "wan_ifnameX", NULL
}, // real wan if; see wan.c:start_wan
83 // WAN TCP/IP parameters
84 { "wan_proto", "dhcp" }, // [static|dhcp|pppoe|disabled]
85 { "wan_ipaddr", "0.0.0.0" }, // WAN IP address
86 { "wan_netmask", "0.0.0.0" }, // WAN netmask
87 { "wan_gateway", "0.0.0.0" }, // WAN gateway
88 { "wan_gateway_get", "0.0.0.0" }, // default gateway for PPP
89 { "wan_dns", "" }, // x.x.x.x x.x.x.x ...
90 { "wan_wins", "" }, // x.x.x.x x.x.x.x ...
91 { "wan_lease", "86400" }, // WAN lease time in seconds
93 { "modem_ipaddr", "0.0.0.0" }, // modem IP address (i.e. PPPoE bridged modem)
95 { "wan_primary", "1" }, // Primary wan connection
96 { "wan_unit", "0" }, // Last configured connection
99 { "filter_maclist", "" }, // xx:xx:xx:xx:xx:xx ...
100 { "filter_macmode", "deny" }, // "allow" only, "deny" only, or "disabled" (allow all)
101 { "filter_client0", "" }, // [lan_ipaddr0-lan_ipaddr1|*]:lan_port0-lan_port1,proto,enable,day_start-day_end,sec_start-sec_end,desc
103 { "filter", "on" }, // [on | off] Firewall Protection
106 { "autofw_port0", "" }, // out_proto:out_port,in_proto:in_port0-in_port1>to_port0-to_port1,enable,desc
108 // DHCP server parameters
109 { "dhcp_start", "100" }, //
110 { "dhcp_num", "50" }, //
111 { "dhcpd_startip", "" }, // if empty, tomato will use dhcp_start/dchp_num for better compatibility
112 { "dhcpd_endip", "" }, // "
113 { "dhcp_lease", "0" }, // LAN lease time in minutes
114 { "dhcp_domain", "wan" }, // Use WAN domain name first if available (wan|lan)
115 { "wan_get_dns", "" }, // DNS IP address which get by dhcpc // Add
116 { "wan_routes", "" },
117 { "wan_msroutes", "" },
120 { "dhcp1_start", "" },
122 { "dhcpd1_startip", "" },
123 { "dhcpd1_endip", "" },
124 { "dhcp1_lease", "0" },
125 { "dhcp2_start", "" },
127 { "dhcpd2_startip", "" },
128 { "dhcpd2_endip", "" },
129 { "dhcp2_lease", "0" },
130 { "dhcp3_start", "" },
132 { "dhcpd3_startip", "" },
133 { "dhcpd3_endip", "" },
134 { "dhcp3_lease", "0" },
139 { "modem_dev", "USB0" },
140 { "modem_init", "*99#" },
141 { "modem_apn", "internet" },
144 { "pppoe_ifname", "" }, // PPPoE enslaved interface
145 { "ppp_username", "" }, // PPP username
146 { "ppp_passwd", "" }, // PPP password
147 { "ppp_idletime", "5" }, // Dial on demand max idle time (mins)
148 { "ppp_keepalive", "0" }, // Restore link automatically
149 { "ppp_demand", "0" }, // Dial on demand
150 { "ppp_redialperiod", "30" }, // Redial Period (seconds)*/
151 { "ppp_mru", "1500" }, // Negotiate MRU to this value
152 { "ppp_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
153 { "ppp_service", "" }, // PPPoE service name
154 { "ppp_ac", "" }, // PPPoE access concentrator name
155 { "ppp_static", "0" }, // Enable / Disable Static IP
156 { "ppp_static_ip", "" }, // PPPoE Static IP
157 { "ppp_get_ac", "" }, // PPPoE Server ac name
158 { "ppp_get_srv", "" }, // PPPoE Server service name
159 { "ppp_custom", "" }, // PPPD additional options
160 { "ppp_mlppp", "0" }, // PPPoE single line MLPPP
162 { "pppoe_lei", "10" }, // PPP LCP Echo interval
163 { "pppoe_lef", "5" }, // PPP LCP echo link failure limit
167 { "ipv6_service", "" }, // [''|native|native-pd|6to4|sit|other]
168 { "ipv6_prefix", "" }, // The global-scope IPv6 prefix to route/advertise
169 { "ipv6_prefix_length", "64" }, // The bit length of the prefix. Used by dhcp6c. For radvd, /64 is always assumed.
170 { "ipv6_rtr_addr", "" }, // defaults to $ipv6_prefix::1
171 { "ipv6_radvd", "1" }, // Enable Router Advertisement (radvd)
172 { "ipv6_accept_ra", "1" }, // Accept RA on WAN and/or LAN interfaces
173 { "ipv6_ifname", "six0" }, // The interface facing the rest of the IPv6 world
174 { "ipv6_tun_v4end", "0.0.0.0" }, // Foreign IPv4 endpoint of SIT tunnel
175 { "ipv6_relay", "1" }, // Foreign IPv4 endpoint host of SIT tunnel 192.88.99.?
176 { "ipv6_tun_addr", "" }, // IPv6 address to assign to local tunnel endpoint
177 { "ipv6_tun_addrlen", "64" }, // CIDR prefix length for tunnel's IPv6 address
178 { "ipv6_tun_mtu", "0" }, // Tunnel MTU, 0 for default
179 { "ipv6_tun_ttl", "255" }, // Tunnel TTL
180 { "ipv6_dns", "" }, // DNS server(s) IPs
181 { "ipv6_get_dns", "" }, // DNS IP address which get by dhcp6c
182 { "ipv6_6rd_prefix", "2602:100::" }, // 6RD prefix (Charter)
183 { "ipv6_6rd_prefix_length", "32" }, // 6RD prefix length (32-62) checkme
184 { "ipv6_6rd_borderrelay", "68.114.165.1" }, // 6RD border relay address
185 { "ipv6_6rd_ipv4masklen", "0" }, // 6RD IPv4 mask length 0-30) checkme
188 // Wireless parameters
189 { "wl_ifname", "" }, // Interface name
190 { "wl_hwaddr", "" }, // MAC address
191 { "wl_phytype", "b" }, // Current wireless band ("a" (5 GHz), "b" (2.4 GHz), or "g" (2.4 GHz)) // Modify
192 { "wl_corerev", "" }, // Current core revision
193 { "wl_phytypes", "" }, // List of supported wireless bands (e.g. "ga")
194 { "wl_radioids", "" }, // List of radio IDs
195 { "wl_ssid", "wireless" }, // Service set ID (network name)
196 { "wl1_ssid", "wireless1" },
197 { "wl_country_code", "SG" }, // Country (default obtained from driver)
198 { "wl_radio", "1" }, // Enable (1) or disable (0) radio
199 { "wl1_radio", "1" }, // Enable (1) or disable (0) radio
200 { "wl_closed", "0" }, // Closed (hidden) network
201 { "wl_ap_isolate", "0" }, // AP isolate mode
202 { "wl_mode", "ap" }, // AP mode (ap|sta|wds)
203 { "wl_lazywds", "1" }, // Enable "lazy" WDS mode (0|1)
204 { "wl_wds", "" }, // xx:xx:xx:xx:xx:xx ...
205 { "wl_wds_timeout", "1" }, // WDS link detection interval defualt 1 sec*/
206 { "wl_wep", "disabled" }, // WEP data encryption (enabled|disabled)
207 { "wl_auth", "0" }, // Shared key authentication optional (0) or required (1)
208 { "wl_key", "1" }, // Current WEP key
209 { "wl_key1", "" }, // 5/13 char ASCII or 10/26 char hex
210 { "wl_key2", "" }, // 5/13 char ASCII or 10/26 char hex
211 { "wl_key3", "" }, // 5/13 char ASCII or 10/26 char hex
212 { "wl_key4", "" }, // 5/13 char ASCII or 10/26 char hex
213 { "wl_channel", "1" }, // Channel number
214 { "wl1_channel", "0" },
215 { "wl_rate", "0" }, // Rate (bps, 0 for auto)
216 { "wl_mrate", "0" }, // Mcast Rate (bps, 0 for auto)
217 { "wl_rateset", "default" }, // "default" or "all" or "12"
218 { "wl_frag", "2346" }, // Fragmentation threshold
219 { "wl_rts", "2347" }, // RTS threshold
220 { "wl_dtim", "1" }, // DTIM period (3.11.5)*/ // It is best value for WiFi test
221 { "wl_bcn", "100" }, // Beacon interval
222 { "wl_plcphdr", "long" }, // 802.11b PLCP preamble type
223 { "wl_net_mode", "mixed" }, // Wireless mode (mixed|g-only|b-only|disable)
224 { "wl_gmode", "1" }, // 54g mode
225 { "wl_gmode_protection", "off" }, // 802.11g RTS/CTS protection (off|auto)
226 { "wl_afterburner", "off" }, // AfterBurner
227 { "wl_frameburst", "off" }, // BRCM Frambursting mode (off|on)
228 { "wl_wme", "auto" }, // WME mode (auto|off|on)
229 { "wl1_wme", "auto" }, // WME mode (auto|off|on)
230 { "wl_antdiv", "-1" }, // Antenna Diversity (-1|0|1|3)
231 { "wl_infra", "1" }, // Network Type (BSS/IBSS)
232 { "wl_btc_mode", "0" }, // !!TB - BT Coexistence Mode
233 { "wl_sta_retry_time", "5" }, // !!TB - Seconds between association attempts (0 to disable retries)
234 { "wl_mitigation", "0" }, // Interference Mitigation Mode (0|1|2|3|4) //Toastman 0=off
235 { "wl_passphrase", "" }, // Passphrase // Add
236 { "wl_wep_bit", "128" }, // WEP encryption [64 | 128] // Add
237 { "wl_wep_buf", "" }, // save all settings for web // Add
238 { "wl_wep_gen", "" }, // save all settings for generate button // Add
239 { "wl_wep_last", "" }, // Save last wl_wep mode // Add
242 { "wl_vifs", "" }, // multiple/virtual BSSIDs
246 { "wl_security_mode", "disabled" }, // WPA mode (disabled|radius|wpa_personal|wpa_enterprise|wep|wpa2_personal|wpa2_enterprise) for WEB // Add
247 { "wl_auth_mode", "none" }, // Network authentication mode (radius|none)
248 { "wl_wpa_psk", "" }, // WPA pre-shared key
249 { "wl_wpa_gtk_rekey", "3600" }, // WPA GTK rekey interval // Modify
250 { "wl_radius_ipaddr", "" }, // RADIUS server IP address
251 { "wl_radius_key", "" }, // RADIUS shared secret
252 { "wl_radius_port", "1812" }, // RADIUS server UDP port
253 { "wl_crypto", "aes" }, // WPA data encryption
254 { "wl_net_reauth", "36000" }, // Network Re-auth/PMK caching duration
255 { "wl_akm", "" }, // WPA akm list
257 // WME parameters (cwmin cwmax aifsn txop_b txop_ag adm_control oldest_first)
258 // EDCA parameters for STA
259 { "wl_wme_sta_bk", "15 1023 7 0 0 off off" }, // WME STA AC_BK paramters
260 { "wl_wme_sta_be", "15 1023 3 0 0 off off" }, // WME STA AC_BE paramters
261 { "wl_wme_sta_vi", "7 15 2 6016 3008 off off" }, // WME STA AC_VI paramters
262 { "wl_wme_sta_vo", "3 7 2 3264 1504 off off" }, // WME STA AC_VO paramters
264 // EDCA parameters for AP
265 { "wl_wme_ap_bk", "15 1023 7 0 0 off off" }, // WME AP AC_BK paramters
266 { "wl_wme_ap_be", "15 63 3 0 0 off off" }, // WME AP AC_BE paramters
267 { "wl_wme_ap_vi", "7 15 1 6016 3008 off off" }, // WME AP AC_VI paramters
268 { "wl_wme_ap_vo", "3 7 1 3264 1504 off off" }, // WME AP AC_VO paramters
270 { "wl_wme_no_ack", "off" }, // WME No-Acknowledgmen mode
271 { "wl_wme_apsd", "off" }, // WME APSD mode
272 { "wl_wme_bss_disable", "0" }, // WME BSS disable advertising (off|on)
274 /* Per AC Tx parameters */
275 { "wl_wme_txp_be", "7 3 4 2 0" }, /* WME AC_BE Tx parameters */
276 { "wl_wme_txp_bk", "7 3 4 2 0" }, /* WME AC_BK Tx parameters */
277 { "wl_wme_txp_vi", "7 3 4 2 0" }, /* WME AC_VI Tx parameters */
278 { "wl_wme_txp_vo", "7 3 4 2 0" }, /* WME AC_VO Tx parameters */
280 { "wl_unit", "0" }, // Last configured interface
281 { "wl_mac_deny", "" }, // filter MAC // Add
283 { "wl_leddc", "0x640000" }, // !!TB - 100% duty cycle for LED on router (WLAN LED fix for some routers)
284 { "wl_bss_enabled", "1" }, // !!TB - If not present the new versions of wlconf may not bring up wlan
285 { "wl_reg_mode", "off" }, // !!TB - Regulatory: 802.11H(h)/802.11D(d)/off(off)
288 { "wl_nmode", "-1" }, // N-mode
289 { "wl_nband", "2" }, // 2 - 2.4GHz, 1 - 5GHz, 0 - Auto
290 { "wl1_nband", "1" },
291 { "wl_nmcsidx", "-1" }, // MCS Index for N - rate
292 { "wl_nreqd", "0" }, // Require 802.11n support
293 { "wl_nbw", "40" }, // BW: 20 / 40 MHz
294 { "wl_nbw_cap", "1" }, // BW: def 20inB and 40inA
295 { "wl_mimo_preamble", "mm" }, // 802.11n Preamble: mm/gf/auto/gfbcm
296 { "wl_nctrlsb", "upper" }, // N-CTRL SB (none/lower/upper)
297 { "wl_nmode_protection", "off" }, // 802.11n RTS/CTS protection (off|auto)
298 { "wl_rxstreams", "0" }, // 802.11n Rx Streams, 0 is invalid, WLCONF will change it to a radio appropriate default
299 { "wl_txstreams", "0" }, // 802.11n Tx Streams 0, 0 is invalid, WLCONF will change it to a radio appropriate default
300 { "wl_dfs_preism", "60" }, // 802.11H pre network CAC time
301 { "wl_dfs_postism", "60" }, // 802.11H In Service Monitoring CAC time
302 { "wl_radarthrs", "1 0x6c0 0x6e0 0x6bc 0x6e0 0x6ac 0x6cc 0x6bc 0x6e0" }, // Radar thrs params format: version thresh0_20 thresh1_20 thresh0_40 thresh1_40
303 { "wl_bcn_rotate", "1" }, // Beacon rotation
304 { "wl_vlan_prio_mode", "off" }, // VLAN Priority support
305 { "wl_obss_coex", "0" }, // OBSS Coexistence (0|1): when enabled, channel width is forced to 20MHz
308 { "emf_entry", "" }, // Static MFDB entry (mgrp:if)
309 { "emf_uffp_entry", "" }, // Unreg frames forwarding ports
310 { "emf_rtport_entry", "" }, // IGMP frames forwarding ports
311 { "emf_enable", "0" }, // Disable EMF by default
315 { "wl_ampdu", "auto" }, // Default AMPDU setting
316 { "wl_ampdu_rtylimit_tid", "5 5 5 5 5 5 5 5" }, // Default AMPDU retry limit per-tid setting
317 { "wl_ampdu_rr_rtylimit_tid", "2 2 2 2 2 2 2 2" }, // Default AMPDU regular rate retry limit per-tid setting
318 { "wl_amsdu", "auto" }, // Default AMSDU setting
320 { "wl_rxchain_pwrsave_enable", "1" }, // Rxchain powersave enable
321 { "wl_rxchain_pwrsave_quiet_time","1800" }, // Quiet time for power save
322 { "wl_rxchain_pwrsave_pps", "10" }, // Packets per second threshold for power save
323 { "wl_radio_pwrsave_enable", "0" }, // Radio powersave enable
324 { "wl_radio_pwrsave_quiet_time","1800" }, // Quiet time for power save
325 { "wl_radio_pwrsave_pps", "10" }, // Packets per second threshold for power save
326 { "wl_radio_pwrsave_on_time", "50" }, // Radio on time for power save
328 { "wl_wmf_bss_enable", "0" }, // Wireless Multicast Forwarding Enable/Disable
329 { "wl_rifs_advert", "auto" }, // RIFS mode advertisement
330 { "wl_stbc_tx", "auto" }, // Default STBC TX setting
331 { "wl_mcast_regen_bss_enable", "1" }, // MCAST REGEN Enable/Disable
334 { "pptp_server_ip", "" }, // as same as WAN gateway
335 { "ppp_get_ip", "" }, // IP Address assigned by PPTP/L2TP server
336 { "pptp_dhcp", "1" },
339 { "mtu_enable", "0" }, // WAN MTU [1|0]
340 { "wan_mtu", "1500" }, // Negotiate MTU to the smaller of this value or the peer MRU
342 { "l2tp_server_ip", "" }, // L2TP auth server (IP Address)
343 // hbobs { "hb_server_ip", "" }, // heartbeat auth server (IP Address)
344 // hbobs { "hb_server_domain", "" }, // heartbeat auth server (domain name)
347 { "wl_tnoise", "-99" },
348 { "led_override", "" },
349 { "btn_override", "" },
352 { "manual_boot_nv", "0" },
353 // { "wlx_hpamp", "" },
354 // { "wlx_hperx", "" }, // see init.c
360 { "ddnsx0_cache", "" },
361 { "ddnsx1_cache", "" },
362 { "ddnsx_save", "1" },
363 { "ddnsx_refresh", "28" },
366 { "router_name", "tomato" },
367 { "wan_hostname", "unknown" },
368 { "wan_domain", "" },
371 { "tm_sel", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
372 { "tm_tz", "BRT3BRST,M10.3.0/0,M2.3.0/0" },
374 { "ntp_updates", "4" },
376 { "ntp_server", "0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org" },
378 { "ntp_kiss_ignore", "" },
381 { "dhcpd_static", "" },
382 { "arpbind_listed", "0" }, // AB - Enable static ARP for all devices on list
385 { "wl_maclist", "" }, // xx:xx:xx:xx:xx:xx ... = 17
386 { "wl_macmode", "disabled" },
390 { "ct_tcp_timeout", "0 1800 30 20 20 20 10 20 20 0" },
391 { "ct_udp_timeout", "30 180" },
392 { "ct_timeout", "10 10" },
393 { "ct_max", "8192" },
398 { "ct_hashsize", "2048" },
411 { "wl_macaddr", "" },
414 { "boot_wait", "on" },
415 { "wait_time", "5" },
416 { "wan_speed", "4" }, // 0=10 Mb Full, 1=10 Mb Half, 2=100 Mb Full, 3=100 Mb Half, 4=Auto
417 { "jumbo_frame_enable", "0" }, // Jumbo Frames support (for RT-N16/WNR3500L)
418 { "jumbo_frame_size", "2000" },
420 { "ctf_disable", "1" },
424 { "dhcpd_dmdns", "1" },
425 { "dhcpd_slt", "0" },
426 { "dhcpd_gwmode", "" },
427 { "dhcpd_lmax", "" },
428 { "dns_addget", "0" },
429 { "dns_intcpt", "0" },
430 { "dhcpc_minpkt", "1" },
431 { "dhcpc_custom", "" },
432 { "dns_norebind", "1" },
433 { "dnsmasq_custom", "" },
434 { "dhcpd_static_only", "0" },
435 // { "dnsmasq_norw", "0" },
438 // { "block_loopback", "0" }, // nat loopback
439 { "nf_loopback", "0" },
440 { "block_wan", "1" }, // block inbound icmp
441 { "block_wan_limit", "1" },
442 { "block_wan_limit_icmp", "1" },
443 { "block_wan_limit_tr", "5" },
444 { "multicast_pass", "0" }, // enable multicast proxy
446 { "multicast_lan", "0" }, // on LAN (br0)
447 { "multicast_lan1", "0" }, // on LAN1 (br1)
448 { "multicast_lan2", "0" }, // on LAN2 (br2)
449 { "multicast_lan3", "0" }, // on LAN3 (br3)
451 { "udpxy_enable", "0" },
452 { "udpxy_stats", "0" },
453 { "udpxy_clients", "3" },
454 { "udpxy_port", "4022" },
455 { "ne_syncookies", "0" }, // tcp_syncookies
456 { "ne_snat", "0" }, // use SNAT instead of MASQUERADE
457 { "dhcp_pass", "1" }, // allow DHCP responses
458 { "ne_shlimit", "0,3,60" },
461 { "routes_static", "" },
462 { "dhcp_routes", "1" },
463 { "wk_mode", "gateway" }, // Network mode [gateway|router]
465 { "dr_setting", "0" }, // [ Disable | WAN | LAN | Both ]
466 { "dr_lan_tx", "0" }, // Dynamic-Routing LAN out
467 { "dr_lan_rx", "0" }, // Dynamic-Routing LAN in
469 { "dr_lan1_tx", "0" }, // Dynamic-Routing LAN out
470 { "dr_lan1_rx", "0" }, // Dynamic-Routing LAN in
471 { "dr_lan2_tx", "0" }, // Dynamic-Routing LAN out
472 { "dr_lan2_rx", "0" }, // Dynamic-Routing LAN in
473 { "dr_lan3_tx", "0" }, // Dynamic-Routing LAN out
474 { "dr_lan3_rx", "0" }, // Dynamic-Routing LAN in
476 { "dr_wan_tx", "0" }, // Dynamic-Routing WAN out
477 { "dr_wan_rx", "0" }, // Dynamic-Routing WAN in
481 { "trunk_vlan_so", "0" }, // VLAN trunk support override
485 { "wl_txpwr", "0" }, // 0 = driver default power
486 { "wl_maxassoc", "128" }, // Max associations driver could support
487 { "wl_bss_maxassoc", "128" },
488 { "wl_distance", "" },
491 { "portforward", "0<3<1.1.1.0/24<1000:2000<<192.168.1.2<ex: 1000 to 2000, restricted>0<2<<1000,2000<<192.168.1.2<ex: 1000 and 2000>0<1<<1000<2000<192.168.1.2<ex: different internal port>0<3<<1000:2000,3000<<192.168.1.2<ex: 1000 to 2000, and 3000>" },
493 { "ipv6_portforward", "" },
495 { "trigforward", "0<1<3000:4000<5000:6000<ex: open 5000-6000 if 3000-4000>" },
496 { "dmz_enable", "0" },
497 { "dmz_ipaddr", "0" },
500 { "dmz_ifname", "br0" },
504 { "upnp_enable", "3" },
505 { "upnp_secure", "1" },
506 { "upnp_port", "0" },
507 { "upnp_ssdp_interval", "60" }, // SSDP interval
508 { "upnp_max_age", "180" }, // Max age
510 { "upnp_custom", "" },
511 { "upnp_clean", "1" }, /* 0:Disable 1:Enable */
512 { "upnp_clean_interval", "600" }, /* Cleaning interval in seconds */
513 { "upnp_clean_threshold", "20" }, /* Threshold for cleaning unused rules */
514 #if 0 // disabled for miniupnpd
515 { "upnp_max_age", "180" }, // Max age
516 { "upnp_config", "0" },
520 { "atm_overhead", "0" },
521 { "qos_enable", "0" },
528 { "qos_reset", "1" },
529 { "qos_obw", "700" },
530 { "qos_ibw", "16000" },
532 { "qos_orules", "0<<-1<d<53<0<<0:10<<0<DNS>0<<-1<d<37<0<<0:10<<0<Time>0<<17<d<123<0<<0:10<<0<NTP>0<<-1<d<3455<0<<0:10<<0<RSVP>0<<-1<d<9<0<<0:50<<4<SCTP, Discard>0<<-1<x<135,2101,2103,2105<0<<<<4<RPC (Microsoft)>0<<17<d<3544<0<<<<-1<Teredo Tunnel>0<<6<x<22,2222<0<<<<3<SSH>0<<6<d<23,992<0<<<<3<Telnet>0<<6<s<80,5938,8080,2222<0<<<<3<Remote Access>0<<-1<x<3389<0<<<<3<Remote Assistance>0<<-1<x<6970:7170,8554<0<<<<2<Quicktime/RealAudio>0<<-1<d<1220,7070<0<<<<2<Quicktime/RealAudio>0<<-1<x<554,5004,5005<0<<<<2<RTP, RTSP>0<<-1<x<1755<0<<<<2<MMS (Microsoft)>0<<-1<d<3478,3479,5060:5063<0<<<<1<SIP, Sipgate Stun Services>0<<-1<s<53,88,3074<0<<<<1<Xbox Live>0<<6<d<1718:1720<0<<<<1<H323>0<<-1<d<11031,11235:11335,11999,2300:2400,6073,28800:29100,47624<0<<<<1<Various Games>0<<-1<d<1493,1502,1503,1542,1863,1963,3389,5061,5190:5193,7001<0<<<<6<MSGR1 - Windows Live>0<<-1<d<1071:1074,1455,1638,1644,5000:5010,5050,5100,5101,5150,8000:8002<0<<<<6<MSGR2 - Yahoo>0<<-1<d<194,1720,1730:1732,5220:5223,5298,6660:6669,22555<0<<<<6<MSGR3 - Additional>0<<-1<d<19294:19310<0<<<<6<Google+ & Voice>0<<6<d<6005,6006<0<<<<6<Camfrog>0<<-1<x<6571,6891:6901<0<<<<6<WLM File/Webcam>0<<-1<a<<0<skypetoskype<<<1<Skype to Skype>0<<-1<a<<0<skypeout<<<-1<Skype Phone (deprecated)>0<<-1<a<<0<youtube-2012<<<2<YouTube 2012 (Youtube)>0<<-1<a<<0<flash<<<2<Flash Video (Youtube)>0<<-1<a<<0<httpvideo<<<2<HTTP Video (Youtube)>0<<-1<a<<0<rtp<<<2<RTP>0<<-1<a<<0<rtmp<<<2<RTMP>0<<-1<a<<0<rtmpt<<<2<RTMPT (RTMP over HTTP)>0<<-1<a<<0<shoutcast<<<2<Shoutcast>0<<-1<a<<0<irc<<<6<IRC>0<<6<d<80,443,8080<0<<0:512<<4<HTTP, HTTPS, HTTP Proxy>0<<6<d<80,443,8080<0<<512:<<7<HTTP, SSL File Transfers>0<<6<d<20,21,989,990<0<<<<7<FTP>0<<6<d<119,563<0<<<<7<NNTP News & Downloads>0<<6<d<25,587,465,2525<0<<<<5<SMTP, Submission Mail>0<<6<d<110,995<0<<<<5<POP3 Mail>0<<6<d<143,220,585,993<0<<<<5<IMAP Mail>0<<17<d<1:65535<0<<<<9<P2P (uTP, UDP)" },
534 { "qos_burst0", "" },
535 { "qos_burst1", "" },
536 { "qos_default", "8" },
537 { "qos_orates", "5-100,5-30,5-30,5-100,20-100,5-70,5-70,5-70,5-30,1-5" },
538 { "qos_irates", "5-100,5-30,5-40,5-100,20-90,5-60,5-60,5-60,5-60,1-5" },
539 { "qos_classnames", "Service VOIP/Game Media Remote WWW Mail Messenger FileXfer P2P/Bulk Crawl" },
541 { "ne_vegas", "0" }, // TCP Vegas
542 { "ne_valpha", "3" }, // "
543 { "ne_vbeta", "3" }, // "
544 { "ne_vgamma", "2" }, // "
547 { "qosl_enable", "0" },
548 // { "qosl_obw", "" }, //unused - used qos_obw
549 // { "qosl_ibw", "" }, //unused - used qos_obw
550 { "qosl_rules", "" },
552 // access restrictions
554 { "rrule0", "0|1320|300|31|||word text\n^begins-with.domain.\n.ends-with.net$\n^www.exact-domain.net$|0|example" },
555 //* { "rrule##", "" },
556 { "rrulewp", "80,8080" },
562 { "smbd_wgroup", "WORKGROUP" },
563 { "smbd_nbname", "TOMATO" },
564 { "smbd_adminpass", "admin" },
568 { "http_username", "" }, // Username
569 { "http_passwd", "admin" }, // Password
570 { "remote_management", "0" }, // Remote Management [1|0]
571 { "remote_mgt_https", "0" }, // Remote Management use https [1|0]
572 { "http_wanport", "8080" }, // WAN port to listen on
573 { "http_lanport", "80" }, // LAN port to listen on
574 { "https_lanport", "443" }, // LAN port to listen on
575 { "http_enable", "1" }, // HTTP server enable/disable
576 { "https_enable", "0" }, // HTTPS server enable/disable
577 { "https_crt_save", "0" },
578 { "https_crt_cn", "" },
579 { "https_crt_file", "" },
581 { "web_wl_filter", "0" }, // Allow/Deny Wireless Access Web
582 { "web_css", "tomato" },
584 { "telnetd_eas", "1" },
585 { "telnetd_port", "23" },
587 { "sshd_pass", "1" },
588 { "sshd_port", "22" },
589 { "sshd_remote", "0" },
590 { "sshd_rport", "2222" },
591 { "sshd_authkeys", "" },
592 { "sshd_hostkey", "" },
593 { "sshd_dsskey", "" },
594 { "sshd_forwarding", "1" },
595 { "rmgt_sip", "" }, // remote management: source ip address
601 { "rstats_enable", "1" },
602 { "rstats_path", "" },
603 { "rstats_stime", "48" },
604 { "rstats_offset", "1" },
605 { "rstats_data", "" },
606 { "rstats_colors", "" },
607 { "rstats_exclude", "" },
608 { "rstats_sshut", "1" },
609 { "rstats_bak", "0" },
612 { "cstats_enable", "0" },
613 { "cstats_path", "" },
614 { "cstats_stime", "48" },
615 { "cstats_offset", "1" },
616 { "cstats_labels", "0" },
617 { "cstats_exclude", "" },
618 { "cstats_include", "" },
619 { "cstats_all", "1" },
620 { "cstats_sshut", "1" },
621 { "cstats_bak", "0" },
630 "[ $1 -ge 20 ] && telnetd -p 233 -l /bin/sh\n"
633 "if [ ! -e /tmp/switch-start ]; then\n"
634 " # do something at startup\n"
635 " echo position at startup was $1 >/tmp/switch-start\n"
638 "if [ $1 = \"bridge\" ]; then\n"
641 "elif [ $1 = \"auto\" ]; then\n"
648 { "log_remote", "0" },
649 { "log_remoteip", "" },
650 { "log_remoteport", "514" },
652 { "log_file_custom", "0" },
653 { "log_file_path", "/var/log/messages"},
654 { "log_file_size", "50" },
655 { "log_file_keep", "1" },
656 { "log_limit", "60" },
659 { "log_mark", "60" },
660 { "log_events", "" },
662 // admin-log-webmonitor
664 { "log_wmtype", "0" },
666 { "log_wmdmax", "300" },
667 { "log_wmsmax", "300" },
670 { "debug_nocommit", "0" },
671 { "debug_cprintf", "0" },
672 { "debug_cprintf_file", "0" },
673 // { "debug_keepfiles", "0" },
674 { "console_loglevel", "1" },
677 { "debug_clkfix", "1" },
678 { "debug_ddns", "0" },
686 { "jffs2_exec", "" },
690 { "usb_enable", "0" },
694 #if defined(LINUX26) && defined(TCONFIG_USB_EXTRAS)
697 { "usb_irq_thresh", "0" },
698 { "usb_storage", "1" },
699 { "usb_printer", "1" },
700 { "usb_printer_bidirect", "0" },
701 { "usb_ext_opt", "" },
702 { "usb_fat_opt", "" },
703 { "usb_ntfs_opt", "" },
704 { "usb_fs_ext3", "1" },
705 { "usb_fs_fat", "1" },
707 { "usb_fs_ntfs", "1" },
709 { "usb_fs_hfs", "0" }, //!Victek
710 { "usb_fs_hfsplus", "0" }, //!Victek
711 { "usb_automount", "1" },
713 { "usb_bdflush", "30 500 0 0 100 100 60 0 0" },
715 { "script_usbhotplug", "" },
716 { "script_usbmount", "" },
717 { "script_usbumount", "" },
718 { "idle_enable", "0" },
724 { "ftp_enable", "0" },
725 { "ftp_super", "0" },
726 { "ftp_anonymous", "0" },
727 { "ftp_dirlist", "0" },
728 { "ftp_port", "21" },
730 { "ftp_ipmax", "0" },
731 { "ftp_staytimeout", "300" },
733 { "ftp_anonrate", "0" },
734 { "ftp_anonroot", "" },
735 { "ftp_pubroot", "" },
736 { "ftp_pvtroot", "" },
738 { "ftp_custom", "" },
739 { "ftp_sip", "" }, // wan ftp access: source ip address(es)
740 { "ftp_limit", "0,3,60" },
745 { "snmp_enable", "0" },
746 { "snmp_port", "161" },
747 { "snmp_remote", "0" },
748 { "snmp_remote_sip", "" },
749 { "snmp_location", "router" },
750 { "snmp_contact", "admin@tomato" },
751 { "snmp_ro", "rocommunity" },
754 #ifdef TCONFIG_SAMBASRV
756 { "smbd_enable", "0" },
757 { "smbd_wgroup", "WORKGROUP" },
758 { "smbd_master", "1" },
759 { "smbd_wins", "1" },
760 { "smbd_cpage", "" },
761 { "smbd_cset", "utf8" },
762 { "smbd_custom", "" },
763 { "smbd_autoshare", "2" },
765 "jffs</jffs<JFFS<1<0>root$</<Hidden Root<0<1"
767 { "smbd_user", "nas" },
768 { "smbd_passwd", "" },
771 #ifdef TCONFIG_MEDIA_SERVER
773 { "ms_enable", "0" }, /* 0:Disable 1:Enable 2:Enable&Rescan */
774 { "ms_dirs", "/mnt<" },
778 { "ms_stdlna", "0" },
788 { "sch_c1_cmd", "" },
789 { "sch_c2_cmd", "" },
790 { "sch_c3_cmd", "" },
793 { "script_init", "" },
794 { "script_shut", "" },
796 "# Example scripts\n\n"
797 "# Restrict number of TCP connections per user\n"
798 "# iptables -t nat -I PREROUTING -p tcp --syn -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 100 -j DROP\n"
799 "# Restrict number of non-TCP connections per user\n"
800 "# iptables -t nat -I PREROUTING -p ! tcp -m iprange --src-range 192.168.1.50-192.168.1.250 -m connlimit --connlimit-above 50 -j DROP\n"
801 "# Restrict number of simultaneous SMTP connections (e.g. from mailer viruses)\n"
802 "# iptables -t nat -I PREROUTING -p tcp --dport 25 -m connlimit --connlimit-above 5 -j DROP\n"
804 { "script_wanup", "" },
807 #ifdef TCONFIG_OPENVPN
809 { "vpn_debug", "0" },
810 { "vpn_server_eas", "" },
811 { "vpn_server_dns", "" },
812 { "vpn_server1_poll", "0" },
813 { "vpn_server1_if", "tun" },
814 { "vpn_server1_proto", "udp" },
815 { "vpn_server1_port", "1194" },
816 { "vpn_server1_firewall", "auto" },
817 { "vpn_server1_crypt", "tls" },
818 { "vpn_server1_comp", "adaptive" },
819 { "vpn_server1_cipher", "default" },
820 { "vpn_server1_dhcp", "1" },
821 { "vpn_server1_r1", "192.168.1.50" },
822 { "vpn_server1_r2", "192.168.1.55" },
823 { "vpn_server1_sn", "10.8.0.0" },
824 { "vpn_server1_nm", "255.255.255.0" },
825 { "vpn_server1_local", "10.8.0.1" },
826 { "vpn_server1_remote", "10.8.0.2" },
827 { "vpn_server1_reneg", "-1" },
828 { "vpn_server1_hmac", "-1" },
829 { "vpn_server1_plan", "1" },
830 { "vpn_server1_ccd", "0" },
831 { "vpn_server1_c2c", "0" },
832 { "vpn_server1_ccd_excl", "0" },
833 { "vpn_server1_ccd_val", "" },
834 { "vpn_server1_pdns", "0" },
835 { "vpn_server1_rgw", "0" },
836 { "vpn_server1_custom", "" },
837 { "vpn_server1_static", "" },
838 { "vpn_server1_ca", "" },
839 { "vpn_server1_crt", "" },
840 { "vpn_server1_key", "" },
841 { "vpn_server1_dh", "" },
842 { "vpn_server2_poll", "0" },
843 { "vpn_server2_if", "tun" },
844 { "vpn_server2_proto", "udp" },
845 { "vpn_server2_port", "1194" },
846 { "vpn_server2_firewall", "auto" },
847 { "vpn_server2_crypt", "tls" },
848 { "vpn_server2_comp", "adaptive" },
849 { "vpn_server2_cipher", "default" },
850 { "vpn_server2_dhcp", "1" },
851 { "vpn_server2_r1", "192.168.1.50" },
852 { "vpn_server2_r2", "192.168.1.55" },
853 { "vpn_server2_sn", "10.8.0.0" },
854 { "vpn_server2_nm", "255.255.255.0" },
855 { "vpn_server2_local", "10.8.0.1" },
856 { "vpn_server2_remote", "10.8.0.2" },
857 { "vpn_server2_reneg", "-1" },
858 { "vpn_server2_hmac", "-1" },
859 { "vpn_server2_plan", "1" },
860 { "vpn_server2_ccd", "0" },
861 { "vpn_server2_c2c", "0" },
862 { "vpn_server2_ccd_excl", "0" },
863 { "vpn_server2_ccd_val", "" },
864 { "vpn_server2_pdns", "0" },
865 { "vpn_server2_rgw", "0" },
866 { "vpn_server2_custom", "" },
867 { "vpn_server2_static", "" },
868 { "vpn_server2_ca", "" },
869 { "vpn_server2_crt", "" },
870 { "vpn_server2_key", "" },
871 { "vpn_server2_dh", "" },
872 { "vpn_client_eas", "" },
873 { "vpn_client1_poll", "0" },
874 { "vpn_client1_if", "tun" },
875 { "vpn_client1_bridge", "1" },
876 { "vpn_client1_nat", "1" },
877 { "vpn_client1_proto", "udp" },
878 { "vpn_client1_addr", "" },
879 { "vpn_client1_port", "1194" },
880 { "vpn_client1_retry", "30" },
881 { "vpn_client1_rg", "0" },
882 { "vpn_client1_firewall", "auto" },
883 { "vpn_client1_crypt", "tls" },
884 { "vpn_client1_comp", "adaptive" },
885 { "vpn_client1_cipher", "default" },
886 { "vpn_client1_local", "10.8.0.2" },
887 { "vpn_client1_remote", "10.8.0.1" },
888 { "vpn_client1_nm", "255.255.255.0" },
889 { "vpn_client1_reneg", "-1" },
890 { "vpn_client1_hmac", "-1" },
891 { "vpn_client1_adns", "0" },
892 { "vpn_client1_rgw", "0" },
893 { "vpn_client1_gw", "" },
894 { "vpn_client1_custom", "" },
895 { "vpn_client1_static", "" },
896 { "vpn_client1_ca", "" },
897 { "vpn_client1_crt", "" },
898 { "vpn_client1_key", "" },
899 { "vpn_client2_poll", "0" },
900 { "vpn_client2_if", "tun" },
901 { "vpn_client2_bridge", "1" },
902 { "vpn_client2_nat", "1" },
903 { "vpn_client2_proto", "udp" },
904 { "vpn_client2_addr", "" },
905 { "vpn_client2_port", "1194" },
906 { "vpn_client2_retry", "30" },
907 { "vpn_client2_rg", "0" },
908 { "vpn_client2_firewall", "auto" },
909 { "vpn_client2_crypt", "tls" },
910 { "vpn_client2_comp", "adaptive" },
911 { "vpn_client2_cipher", "default" },
912 { "vpn_client2_local", "10.8.0.2" },
913 { "vpn_client2_remote", "10.8.0.1" },
914 { "vpn_client2_nm", "255.255.255.0" },
915 { "vpn_client2_reneg", "-1" },
916 { "vpn_client2_hmac", "-1" },
917 { "vpn_client2_adns", "0" },
918 { "vpn_client2_rgw", "0" },
919 { "vpn_client2_gw", "" },
920 { "vpn_client2_custom", "" },
921 { "vpn_client2_static", "" },
922 { "vpn_client2_ca", "" },
923 { "vpn_client2_crt", "" },
924 { "vpn_client2_key", "" },
926 #ifdef TCONFIG_USERPPTP
927 { "pptp_client_enable", "0" },
928 { "pptp_client_peerdns", "0" },
929 { "pptp_client_mtuenable","0" },
930 { "pptp_client_mtu", "1450" },
931 { "pptp_client_mruenable","0" },
932 { "pptp_client_mru", "1450" },
933 { "pptp_client_nat", "0" },
934 { "pptp_client_srvip", "" },
935 { "pptp_client_srvsub", "10.0.0.0" },
936 { "pptp_client_srvsubmsk","255.0.0.0" },
937 { "pptp_client_username", "" },
938 { "pptp_client_passwd", "" },
939 { "pptp_client_crypt", "0" },
940 { "pptp_client_custom", "" },
941 { "pptp_client_dfltroute","0" },
948 { "ses_enable", "0" }, // enable ses
949 { "ses_event", "2" }, // initial ses event
950 { "ses_led_assertlvl", "0" }, // For SES II
951 { "ses_client_join", "0" }, // For SES II
952 { "ses_sw_btn_status", "DEFAULTS" }, // Barry Adds 20050309 for SW SES BTN
953 { "ses_count", "0" },
954 { "eou_configured", "0" },
956 { "port_priority_1", "0" }, // port 1 priority; 1:high, 0:low
957 { "port_flow_control_1", "1" }, // port 1 flow control; 1:enable, 0:disable
958 { "port_rate_limit_1", "0" }, // port 1 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
959 { "port_priority_2", "0" }, // port 2 priority; 1:high, 0:low
960 { "port_flow_control_2", "1" }, // port 2 flow control; 1:enable, 0:disable
961 { "port_rate_limit_2", "0" }, // port 2 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
962 { "port_priority_3", "0" }, // port 3 priority; 1:high, 0:low
963 { "port_flow_control_3", "1" }, // port 3 flow control; 1:enable, 0:disable
964 { "port_rate_limit_3", "0" }, // port 3 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
965 { "port_priority_4", "0" }, // port 4 priority; 1:high, 0:low
966 { "port_flow_control_4", "1" }, // port 4 flow control; 1:enable, 0:disable
967 { "port_rate_limit_4", "0" }, // port 4 rate limit: 256k,512k,1M,2M,5M,10M,20M,50M
969 //obs zzz { "http_method", "post" }, // HTTP method
971 // { "wl_macmode1", "disabled" },
974 { "filter", "on" }, // Firewall Protection [on|off]
975 { "ipsec_pass", "1" }, // IPSec Pass Through [1|0]
976 { "pptp_pass", "1" }, // PPTP Pass Through [1|0]
977 { "l2tp_pass", "1" }, // L2TP Pass Through [1|0]
978 { "block_cookie", "0" }, // Block Cookie [1|0]
979 { "ident_pass", "0" }, // IDENT passthrough [1|0]
980 { "block_proxy", "0" }, // Block Proxy [1|0]
984 { "forward_port", "" }, // name:[on|off]:[tcp|udp|both]:wan_port>lan_ipaddr:lan_port0
985 { "port_trigger", "" }, // name:[on|off]:[tcp|udp|both]:wan_port0-wan_port1>lan_port0-lan_port1
988 { "mac_clone_enable", "0" }, // User define WAN interface MAC address
989 { "def_hwaddr", "00:00:00:00:00:00" }, // User define WAN interface MAC address
991 { "public_ip", "" }, // public ip
994 //forced in rc.c { "os_name", "" }, // OS name string
995 //forced in rc.c { "os_version", EPI_VERSION_STR }, // OS revision
996 //forced in rc.c { "os_date", __DATE__ }, // OS date
997 //not used { "ct_modules", "" }, // CyberTAN kernel modules
998 //obs { "timer_interval", "3600" }, // Timer interval in seconds
999 //obs { "ezc_enable", "1" }, // Enable EZConfig updates
1000 //obs { "ezc_version", EZC_VERSION_STR }, // EZConfig version
1001 //obs { "is_default", "1" }, // is it default setting: 1:yes 0:no*/
1002 //obs { "os_server", "" }, // URL for getting upgrades
1003 //obs { "stats_server", "" }, // URL for posting stats -- used by httpd/stats.c
1004 //obs { "router_disable", "0" }, // lan_proto=static lan_stp=0 wan_proto=disabled
1005 //obs { "fw_disable", "0" }, // Disable firewall (allow new connections from the WAN)
1006 //obs { "static_route", "" }, // Static routes (ipaddr:netmask:gateway:metric:ifname ...)
1007 //obs { "static_route_name", "" }, // Static routes name ($NAME:name)
1008 // { "filter_port", "" }, // [lan_ipaddr|*]:lan_port0-lan_port1
1009 //{ "dhcp_end", "150" }, // Last assignable DHCP address // Remove
1010 //zzz not used { "dhcp_wins", "wan" }, // Use WAN WINS first if available (wan|lan)
1011 //{ "eou_device_id", "" },
1012 //{ "eou_public_key", "" },
1013 //{ "eou_private_key", "" },
1014 //{ "eou_public", "b49b5ec6866f5b166cc058110b20551d4fe7a5c96a9b5f01a3929f40015e4248359732b7467bae4948d6bb62f96996a7122c6834311c1ea276b35d12c37895501c0f5bd215499cf443d580b999830ac620ac2bf3b7f912741f54fea17627d13a92f44d014030d5c8d3249df385f500ffc90311563e89aa290e7c6f06ef9a6ec311" },
1015 //{ "eou_private", "1fdf2ed7bd5ef1f4e603d34e4d41f0e70e19d1f65e1b6b1e6828eeed2d6afca354c0543e75d9973a1be9a898fed665e13f713f90bd5f50b3421fa7034fabde1ce63c44d01a5489765dc4dc3486521163bf6288db6c5e99c44bbb0ad7494fef20148ad862662dabcbff8dae7b466fad087d9f4754e9a6c84bc9adcbda7bc22e59" },
1016 { "eou_expired_hour", "72" }, //The expired time is 72 hours, and this value = 72 * 10*/
1017 // { "ntp_enable", "1" }, // replaced with ntp_updates
1018 // { "ntp_mode", "auto" }, // auto, manual
1022 { "aol_block_traffic", "0" }, // 0:Disable 1:Enable for global
1023 { "aol_block_traffic1", "0" }, // 0:Disable 1:Enable for "ppp_username"
1024 { "aol_block_traffic2", "0" }, // 0:Disable 1:Enable for "Parental control"
1025 { "skip_amd_check", "0" }, // 0:Disable 1:Enable
1026 { "skip_intel_check", "0" }, // 0:Disable 1:Enable
1028 // advanced-watchdog
1037 { "wd_cki", "300" },
1044 { "arpbind_enable", "0" },
1045 { "arpbind_only", "0" },
1046 { "arpbind_list", "" },
1048 // NoCatSplash. !!Victek
1049 #ifdef TCONFIG_NOCAT
1050 { "NC_enable", "0" }, // enable NoCatSplash
1051 { "NC_Verbosity", "2" },
1052 { "NC_GatewayName", "Tomato Captive Portal" },
1053 { "NC_GatewayPort", "5280" },
1054 { "NC_GatewayMode", "Open" },
1055 { "NC_DocumentRoot", "/tmp/splashd" },
1056 { "NC_ExcludePorts", "1863" },
1057 { "NC_HomePage", "http://google.com" },
1058 { "NC_ForcedRedirect", "0" },
1059 { "NC_IdleTimeout", "0" },
1060 { "NC_MaxMissedARP", "5" },
1061 { "NC_PeerChecktimeout", "0" },
1062 { "NC_LoginTimeout", "3600" },
1063 { "NC_RenewTimeout", "0" },
1064 { "NC_AllowedWebHosts", "" },
1066 { "NC_BridgeLAN", "br0" },
1073 const defaults_t if_generic
[] = {
1074 { "lan_ifname", "br0" },
1075 { "lan_ifnames", "eth0 eth2 eth3 eth4" },
1076 { "wan_ifname", "eth1" },
1077 { "wan_ifnames", "eth1" },
1081 const defaults_t if_vlan
[] = {
1082 { "lan_ifname", "br0" },
1083 { "lan_ifnames", "vlan0 eth1 eth2 eth3" },
1085 { "lan1_ifname", "" },
1086 { "lan1_ifnames", "" },
1087 { "lan2_ifname", "" },
1088 { "lan2_ifnames", "" },
1089 { "lan3_ifname", "" },
1090 { "lan3_ifnames", "" },
1092 { "wan_ifname", "vlan1" },
1093 { "wan_ifnames", "vlan1" },