Ignore:
Timestamp:
Apr 10, 2012, 2:51:13 PM (13 years ago)
Author:
rick
Message:

Merging and cleanups of files found in various other places and trees of SVN.

File:
1 edited

Legend:

Unmodified
Added
Removed
  • branches/releng-9.0/nanobsd/files/etc/rc.conf

    r10382 r10417  
    1 ## Building options
    2 dumpdev="NO"                    # No kernel dumps as we don't have a place to
    3                                 # store them
    4 ipv6_network_interfaces="NONE"  # No IPv6 support for now, near feature... ;-)
     1# No kernel dumps as we don't have a place to store them
     2dumpdev="NO"                   
     3# We are an router/gateway (wireless to be precise)
     4gateway_enable="YES"
    55
    66# NTP server needs working config with WL network or internet on boot
     
    2424sshd_flags="-u0"
    2525
    26 # Don't update the motd as it not writeable, the update_nanobsd_motd is a
    27 # simple wrapper found at /usr/local/etc/rc.d supporting this featureg
    28 update_motd="NO"
    29 update_nanobsd_motd="YES"
    30 
    3126# Monitoring deamons
    3227nrpe2_enable="YES"
     
    4035nanobsd_save_sshkeys_enable="YES"
    4136
    42 ## Port extentions
    43 # Serve our clients some pretty cool IP address to at least get connected
    44 # Also some low-memory footprint dns resolver
     37# low-memory footprint DHCP and non-autoritive recursive DNS resolver
    4538dnsmasq_enable="YES"
     39
     40# Explicitly disable the memory-hungry alternatives
     41dhcpd_enable="NO"
     42named_enable="NO"
    4643named_auto_forward="YES"
    47 named_enable="NO"
    4844
    49 ## WL ports extentions
     45# WL Captive Portal and WL Web Config Overview
    5046thttpd_enable="YES"
    5147http302_enable="YES"
    5248
    53 # Make sure generated ssh keys are saved
    54 nanobsd_save_sshkeys_enable="YES"
     49# Hybrid setup, requires outgoing VPN Server
     50openvpn_enable="NO"
     51openvpn_if="tap"
    5552
    56 #Hybrid
    57 openvpn_enable="YES"
    58 openvpn_if="tap"
     53# Enable the firewall by default
     54pf_enable="YES"
     55pf_rules="/etc/pf.default.conf"
     56pf_flags="-D ext_if=vr0 -D int_if=vr1 -D publicnat={80,443}"
Note: See TracChangeset for help on using the changeset viewer.