rathena/conf/packet_athena.conf
FlavioJS 909992ed5a * Limited manual detection of data truncation to string/enum/blob columns.
* Renamed conf-tmpl to conf.

git-svn-id: https://svn.code.sf.net/p/rathena/svn/trunk@11284 54d463be-8e91-2dee-dedb-b68131a5f0ec
2007-09-24 09:13:50 +00:00

58 lines
1.6 KiB
Plaintext

// Athena sockets Configuration file
// translated (davidsiaw)
// Display debug reports (When something goes wrong during the report, the report is saved.)
debug: no
// How long can a socket stall before closing the connection (in seconds)
stall_time: 60
//----- IP Rules Settings -----
// If IP's are checked when connecting.
// This also enables DDoS protection.
enable_ip_rules: yes
// Order of the checks
// deny,allow : Checks deny rules, then allow rules. Allows if no rules match.
// allow,deny : Checks allow rules, then deny rules. Allows if no rules match.
// mutual-failure : Allows only if an allow rule matches and no deny rules match.
// (default is deny,allow)
order: deny,allow
// order: allow,deny
// order: mutual-failture
// IP rules
// allow : Accepts connections from the ip range (even if flagged as DDoS)
// deny : Rejects connections from the ip range
// The rules are processed in order, the first matching rule of each list (allow and deny) is used
// allow: 127.0.0.1
// allow: 192.168.0.0/16
// allow: 10.0.0.0/255.0.0.0
// allow: all
// deny: 127.0.0.1
//---- DDoS Protection Settings ----
// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack
// Consecutive attempts interval (msec)
// (default is 3000 msecs, 3 seconds)
ddos_interval: 3000
// Consecutive attempts trigger
// (default is 5 attemps)
ddos_count: 5
// The time interval after which the threat of DDoS is assumed to be gone. (msec)
// After this amount of time, the DDoS restrictions are lifted.
// (default is 600000 msecs, 10 minutes)
ddos_autoreset: 600000
import: conf/import/packet_conf.txt