⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 wifidog.conf.svn-base

📁 The Wifidog project is an open source captive portal solution. It was designed primarily for wireles
💻 SVN-BASE
字号:
# $Id: wifidog.conf 1162 2007-01-06 23:51:02Z benoitg $# WiFiDog Configuration file# Parameter: GatewayID# Default: default# Optional## Set this to the node ID on the auth server# this is used to give a customized login page to the clients and for# monitoring/statistics purpose# If none is supplied, the mac address of the GatewayInterface interface will be used,# without the : separators# GatewayID default# Parameter: ExternalInterface# Default: NONE# Optional## Set this to the external interface.  Typically vlan1 for OpenWrt, and eth0 or ppp0 otherwise,# Normally autodetected# ExternalInterface eth0# Parameter: GatewayInterface# Default: NONE# Mandatory## Set this to the internal interface.    Typically br0 for OpenWrt, and eth1 otherwiseGatewayInterface br0# Parameter: GatewayAddress# Default: Find it from GatewayInterface# Optional## Set this to the internal IP address of the gateway# GatewayAddress 192.168.1.1# Parameter: AuthServer# Default: NONE# Mandatory, repeatable## This allows you to configure your auth server(s).  Each one will be tried in order, untill one responds.# Set this to the hostname or IP of your auth server(s), the path where# WiFiDog-auth resides in and the port it listens on.#AuthServer {#	Hostname      (Mandatory; Default: NONE)#	SSLAvailable  (Optional; Default: no; Possible values: yes, no)#	SSLPort 443   (Optional; Default: 443)#	HTTPPort 80   (Optional; Default: 80)#	Path wifidog/ (Optional; Default: /wifidog/ Note:  The path must be both prefixed and suffixed by /.  Use a single / for server root.)#}#AuthServer {#    Hostname auth.ilesansfil.org#    SSLAvailable yes#    Path /#}#AuthServer {#    Hostname auth2.ilesansfil.org#    SSLAvailable yes#    Path /#}# Parameter: Portal# Default: none# Optional## Set this to a URL for your portal, if you run without an auth server# Portal http://www.ilesansfil.org/# Parameter: Daemon# Default: 1# Optional## Set this to true if you want to run as a daemon# Daemon 1# Parameter: GatewayPort# Default: 2060# Optional## Listen on this port# GatewayPort 2060# Parameter: HTTPDName# Default: WiFiDog# Optional## Define what name the HTTPD server will respond# HTTPDName WiFiDog# Parameter: HTTPDMaxConn# Default: 10# Optional## How many sockets to listen to# HTTPDMaxConn 10# Parameter: CheckInterval# Default: 60# Optional## How many seconds should we wait between timeout checks.  This is also# how often the gateway will ping the auth server and how often it will# update the traffic counters on the auth server.  Setting this too low# wastes bandwidth, setting this too high will cause the gateway to take # a long time to switch to it's backup auth server(s).# CheckInterval 60# Parameter: ClientTimeout# Default: 5# Optional## Set this to the desired of number of CheckInterval of inactivity before a client is logged out# The timeout will be INTERVAL * TIMEOUTClientTimeout 5# Parameter: TrustedMACList# Default: none# Optional## Comma separated list of MAC addresses who are allowed to pass# through without authentication#TrustedMACList 00:00:DE:AD:BE:AF,00:00:C0:1D:F0:0D# Parameter: FirewallRuleSet# Default: none# Mandatory## Groups a number of FirewallRule statements together.# Parameter: FirewallRule# Default: none# # Define one firewall rule in a rule set.# Rule Set: global# # Used for rules to be applied to all other rulesets except locked.FirewallRuleSet global {    # This is the default config for the Teliphone service.    #FirewallRule allow udp to 69.90.89.192/27    #FirewallRule allow udp to 69.90.85.0/27    #FirewallRule allow tcp port 80 to 69.90.89.205    # To block SMTP out, as it's a tech support nightmare, and a legal liability    #FirewallRule block tcp port 25}# Rule Set: validating-users## Used for new users validating their accountFirewallRuleSet validating-users {    FirewallRule allow to 0.0.0.0/0}# Rule Set: known-users## Used for normal validated users.FirewallRuleSet known-users {    FirewallRule allow to 0.0.0.0/0}# Rule Set: unknown-users## Used for unvalidated users, this is the ruleset that gets redirected.## XXX The redirect code adds the Default DROP clause.FirewallRuleSet unknown-users {    FirewallRule allow udp port 53    FirewallRule allow tcp port 53    FirewallRule allow udp port 67    FirewallRule allow tcp port 67}# Rule Set: locked-users## Used for users that have been locked out.FirewallRuleSet locked-users {    FirewallRule block to 0.0.0.0/0}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -