18
18
# Default: NONE
19
19
# Optional
20
20
#
21
- # Set this to the external interface (the one going out to the Inernet or your larger LAN).
21
+ # Set this to the external interface (the one going out to the Inernet or your larger LAN).
22
22
# Typically vlan1 for OpenWrt, and eth0 or ppp0 otherwise,
23
23
# Normally autodetected
24
24
28
28
# Default: NONE
29
29
# Mandatory
30
30
#
31
- # Set this to the internal interface (typically your wifi interface).
31
+ # Set this to the internal interface (typically your wifi interface).
32
32
# Typically br-lan for Openwrt (by default the wifi interface is bridged with wired lan in openwrt)
33
33
# and eth1, wlan0, ath0, etc. otherwise
34
34
# You can get this interface with the ifconfig command and finding your wifi interface
@@ -61,11 +61,11 @@ GatewayInterface br-lan
61
61
# Set this to the hostname or IP of your auth server(s), the path where
62
62
# WiFiDog-auth resides in and the port it listens on.
63
63
#AuthServer {
64
- # Hostname (Mandatory; Default: NONE)
65
- # SSLAvailable (Optional; Default: no; Possible values: yes, no)
66
- # SSLPort (Optional; Default: 443)
67
- # HTTPPort (Optional; Default: 80)
68
- # Path (Optional; Default: /wifidog/ Note: The path must be both prefixed and suffixed by /. Use a single / for server root.)
64
+ # Hostname (Mandatory; Default: NONE)
65
+ # SSLAvailable (Optional; Default: no; Possible values: yes, no)
66
+ # SSLPort (Optional; Default: 443)
67
+ # HTTPPort (Optional; Default: 80)
68
+ # Path (Optional; Default: /wifidog/ Note: The path must be both prefixed and suffixed by /. Use a single / for server root.)
69
69
# LoginScriptPathFragment (Optional; Default: login/? Note: This is the script the user will be sent to for login.)
70
70
# PortalScriptPathFragment (Optional; Default: portal/? Note: This is the script the user will be sent to after a successfull login.)
71
71
# MsgScriptPathFragment (Optional; Default: gw_message.php? Note: This is the script the user will be sent to upon error to read a readable message.)
@@ -95,7 +95,7 @@ GatewayInterface br-lan
95
95
# Optional
96
96
#
97
97
# Set this to true if you want to reset each user's traffic (Outgoing and Incoming) value after each Auth operation.
98
- # If this is enabled, Wifidog will add two new parameters to the AuthScriptPathFragment: Incoming_Delta, Outgoing_delta.
98
+ # If this is enabled, Wifidog will add two new parameters to the AuthScriptPathFragment: Incoming_Delta, Outgoing_delta.
99
99
# DeltaTraffic no
100
100
101
101
# Parameter: Daemon
@@ -159,7 +159,7 @@ GatewayInterface br-lan
159
159
# How many seconds should we wait between timeout checks. This is also
160
160
# how often the gateway will ping the auth server and how often it will
161
161
# update the traffic counters on the auth server. Setting this too low
162
- # wastes bandwidth, setting this too high will cause the gateway to take
162
+ # wastes bandwidth, setting this too high will cause the gateway to take
163
163
# a long time to switch to it's backup auth server(s).
164
164
165
165
# CheckInterval 60
@@ -203,13 +203,13 @@ ClientTimeout 5
203
203
#
204
204
# The certificates in this directory must be named by their hash
205
205
# value. For OpenWRT, you need a ca-certificates package newer
206
- # than what is shipped in Barrier Breaker (see
206
+ # than what is shipped in Barrier Breaker (see
207
207
# https://dev.openwrt.org/ticket/16537).
208
208
#
209
209
# This setting requires that WifiDog is compiled with SSL support.
210
210
# It will be ignored otherwise.
211
211
#
212
- # SSLCertPath /etc/ssl/certs/
212
+ # SSLCertPath /etc/ssl/certs/
213
213
214
214
# Parameter: SSLAllowedCipherList
215
215
# Default: all ciphers supported
@@ -261,11 +261,11 @@ PopularServers kernel.org,ieee.org
261
261
262
262
# Parameter: FirewallRule
263
263
# Default: none
264
- #
264
+ #
265
265
# Define one firewall rule in a rule set.
266
266
267
267
# Rule Set: global
268
- #
268
+ #
269
269
# Used for rules to be applied to all other rulesets except locked.
270
270
FirewallRuleSet global {
271
271
@@ -274,15 +274,15 @@ FirewallRuleSet global {
274
274
275
275
## To block SMTP out, as it's a tech support nightmare, and a legal liability
276
276
#FirewallRule block tcp port 25
277
-
278
- ## Use the following if you don't want clients to be able to access machines on
277
+
278
+ ## Use the following if you don't want clients to be able to access machines on
279
279
## the private LAN that gives internet access to wifidog. Note that this is not
280
280
## client isolation; The laptops will still be able to talk to one another, as
281
281
## well as to any machine bridged to the wifi of the router.
282
282
# FirewallRule block to 192.168.0.0/16
283
283
# FirewallRule block to 172.16.0.0/12
284
284
# FirewallRule block to 10.0.0.0/8
285
-
285
+
286
286
## This is an example ruleset for the Teliphone service.
287
287
#FirewallRule allow udp to 69.90.89.192/27
288
288
#FirewallRule allow udp to 69.90.85.0/27
@@ -299,7 +299,7 @@ FirewallRuleSet global {
299
299
300
300
## Use the following to log or ulog the traffic you want to allow or block.
301
301
# For OPENWRT: use of these feature requires modules ipt_LOG or ipt_ULOG present in dependencies
302
- # iptables-mod-extra and iptables-mod-ulog (to adapt it to the linux distribution).
302
+ # iptables-mod-extra and iptables-mod-ulog (to adapt it to the linux distribution).
303
303
# Note: the log or ulog rule must be passed before, the rule you want to match.
304
304
# for openwrt: use of these feature requires modules ipt_LOG or ipt_ULOG present in dependencies
305
305
# iptables-mod-extra and iptables-mod-ulog
@@ -340,13 +340,13 @@ FirewallRuleSet known-users {
340
340
#
341
341
# XXX The redirect code adds the Default DROP clause.
342
342
FirewallRuleSet unknown-users {
343
- # Use to-ipset to block or allow externally specified hosts.
344
- # Ipsets are created with the ipset utility. This is useful to
343
+ # Use to-ipset to block or allow externally specified hosts.
344
+ # Ipsets are created with the ipset utility. This is useful to
345
345
# block or allow hosts at runtime externally.
346
- # For example, if your auth server requires users to log in
347
- # via Facebook, use the ipset feature built into dnsmasq to
346
+ # For example, if your auth server requires users to log in
347
+ # via Facebook, use the ipset feature built into dnsmasq to
348
348
# to populate a list of various IPs used by the Facebook networks.
349
- #FirewallRule allow to-ipset fb
349
+ #FirewallRule allow to-ipset fb
350
350
FirewallRule allow udp port 53
351
351
FirewallRule allow tcp port 53
352
352
FirewallRule allow udp port 67
0 commit comments