📄 wifidog.conf.svn-base
字号:
# $Id: wifidog.conf 1162 2007-01-06 23:51:02Z benoitg $# WiFiDog Configuration file# Parameter: GatewayID# Default: default# Optional## Set this to the node ID on the auth server# this is used to give a customized login page to the clients and for# monitoring/statistics purpose# If none is supplied, the mac address of the GatewayInterface interface will be used,# without the : separators# GatewayID default# Parameter: ExternalInterface# Default: NONE# Optional## Set this to the external interface. Typically vlan1 for OpenWrt, and eth0 or ppp0 otherwise,# Normally autodetected# ExternalInterface eth0# Parameter: GatewayInterface# Default: NONE# Mandatory## Set this to the internal interface. Typically br0 for OpenWrt, and eth1 otherwiseGatewayInterface br0# Parameter: GatewayAddress# Default: Find it from GatewayInterface# Optional## Set this to the internal IP address of the gateway# GatewayAddress 192.168.1.1# Parameter: AuthServer# Default: NONE# Mandatory, repeatable## This allows you to configure your auth server(s). Each one will be tried in order, untill one responds.# Set this to the hostname or IP of your auth server(s), the path where# WiFiDog-auth resides in and the port it listens on.#AuthServer {# Hostname (Mandatory; Default: NONE)# SSLAvailable (Optional; Default: no; Possible values: yes, no)# SSLPort 443 (Optional; Default: 443)# HTTPPort 80 (Optional; Default: 80)# Path wifidog/ (Optional; Default: /wifidog/ Note: The path must be both prefixed and suffixed by /. Use a single / for server root.)#}#AuthServer {# Hostname auth.ilesansfil.org# SSLAvailable yes# Path /#}#AuthServer {# Hostname auth2.ilesansfil.org# SSLAvailable yes# Path /#}# Parameter: Portal# Default: none# Optional## Set this to a URL for your portal, if you run without an auth server# Portal http://www.ilesansfil.org/# Parameter: Daemon# Default: 1# Optional## Set this to true if you want to run as a daemon# Daemon 1# Parameter: GatewayPort# Default: 2060# Optional## Listen on this port# GatewayPort 2060# Parameter: HTTPDName# Default: WiFiDog# Optional## Define what name the HTTPD server will respond# HTTPDName WiFiDog# Parameter: HTTPDMaxConn# Default: 10# Optional## How many sockets to listen to# HTTPDMaxConn 10# Parameter: CheckInterval# Default: 60# Optional## How many seconds should we wait between timeout checks. This is also# how often the gateway will ping the auth server and how often it will# update the traffic counters on the auth server. Setting this too low# wastes bandwidth, setting this too high will cause the gateway to take # a long time to switch to it's backup auth server(s).# CheckInterval 60# Parameter: ClientTimeout# Default: 5# Optional## Set this to the desired of number of CheckInterval of inactivity before a client is logged out# The timeout will be INTERVAL * TIMEOUTClientTimeout 5# Parameter: TrustedMACList# Default: none# Optional## Comma separated list of MAC addresses who are allowed to pass# through without authentication#TrustedMACList 00:00:DE:AD:BE:AF,00:00:C0:1D:F0:0D# Parameter: FirewallRuleSet# Default: none# Mandatory## Groups a number of FirewallRule statements together.# Parameter: FirewallRule# Default: none# # Define one firewall rule in a rule set.# Rule Set: global# # Used for rules to be applied to all other rulesets except locked.FirewallRuleSet global { # This is the default config for the Teliphone service. #FirewallRule allow udp to 69.90.89.192/27 #FirewallRule allow udp to 69.90.85.0/27 #FirewallRule allow tcp port 80 to 69.90.89.205 # To block SMTP out, as it's a tech support nightmare, and a legal liability #FirewallRule block tcp port 25}# Rule Set: validating-users## Used for new users validating their accountFirewallRuleSet validating-users { FirewallRule allow to 0.0.0.0/0}# Rule Set: known-users## Used for normal validated users.FirewallRuleSet known-users { FirewallRule allow to 0.0.0.0/0}# Rule Set: unknown-users## Used for unvalidated users, this is the ruleset that gets redirected.## XXX The redirect code adds the Default DROP clause.FirewallRuleSet unknown-users { FirewallRule allow udp port 53 FirewallRule allow tcp port 53 FirewallRule allow udp port 67 FirewallRule allow tcp port 67}# Rule Set: locked-users## Used for users that have been locked out.FirewallRuleSet locked-users { FirewallRule block to 0.0.0.0/0}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -