summaryrefslogtreecommitdiff
path: root/conf-tmpl/packet_athena.conf
diff options
context:
space:
mode:
authorFlavioJS <FlavioJS@54d463be-8e91-2dee-dedb-b68131a5f0ec>2006-12-05 13:23:07 +0000
committerFlavioJS <FlavioJS@54d463be-8e91-2dee-dedb-b68131a5f0ec>2006-12-05 13:23:07 +0000
commit288490094a7fe9167747dc78d416940759a31197 (patch)
tree53dc4f5c2375f4b688b53ca8841630ddec5e1f88 /conf-tmpl/packet_athena.conf
parent8ec1c47aed09c90343949d57c92760ba84738a46 (diff)
downloadhercules-288490094a7fe9167747dc78d416940759a31197.tar.gz
hercules-288490094a7fe9167747dc78d416940759a31197.tar.bz2
hercules-288490094a7fe9167747dc78d416940759a31197.tar.xz
hercules-288490094a7fe9167747dc78d416940759a31197.zip
- Massive EOL normalization & 'svn:eol-style native' flag setting for all txt/conf/h/c files.
git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@9410 54d463be-8e91-2dee-dedb-b68131a5f0ec
Diffstat (limited to 'conf-tmpl/packet_athena.conf')
-rw-r--r--conf-tmpl/packet_athena.conf114
1 files changed, 57 insertions, 57 deletions
diff --git a/conf-tmpl/packet_athena.conf b/conf-tmpl/packet_athena.conf
index 6f5a1ac2f..d654a0e35 100644
--- a/conf-tmpl/packet_athena.conf
+++ b/conf-tmpl/packet_athena.conf
@@ -1,57 +1,57 @@
-// Athena sockets Configuration file
-// translated (davidsiaw)
-
-
-// Display debug reports (iWhen something goes wrong during the report, the report is saved.)
-debug: no
-
-// How long can a socket stall before closing the connection (in seconds)
-stall_time: 60
-
-// When enabled, sets TCP_NODELAY (disable nagel Algorythm) on all connections
-mode_neg: yes
-
-// frame packet size as considered by the server (when there's enough
-// information in queue to fill the frame_size, a "send" is forced)
-//frame_size: 1054
-
-//----- IP Rules Settings -----
-
-// Do we check IP's before allowing incoming connections?
-enable_ip_rules: yes
-
-// Decide the order of access restriction (Same as apache?)
-// deny,allow Is the standard
-
-order: deny,allow
-// order: allow,deny
-// order: mutual-failture
-
-// The IP list which it uses to access controls
-// allow : Allows access regardless of permissions
-// deny : Completely disallow
-// 指定無し : If the permission check encounters mutual-failure(whatever that means) it will disallow access
-
-// allow: 127.0.0.1
-// allow: 192.168.0.0/16
-// allow: 10.0.0.0/255.0.0.0
-allow: all
-
-// deny: 127.0.0.1
-
-
-//---- Ddos Protection Settings ----
-// If there is a connection request within ddos_interval msec for ddos_count number of times, it will assume it is a ddos attack
-
-// Consecutive intervals(msec)
-ddos_interval: 3000
-
-// Connection frequency
-ddos_count: 5
-
-// The time interval after which the threat of ddos is assumed to be gone
-// After this amount of time, the ddos restrictions are lifted.
-ddos_autoreset: 600000
-
-
-//import: conf/import/packet_conf.txt
+// Athena sockets Configuration file
+// translated (davidsiaw)
+
+
+// Display debug reports (iWhen something goes wrong during the report, the report is saved.)
+debug: no
+
+// How long can a socket stall before closing the connection (in seconds)
+stall_time: 60
+
+// When enabled, sets TCP_NODELAY (disable nagel Algorythm) on all connections
+mode_neg: yes
+
+// frame packet size as considered by the server (when there's enough
+// information in queue to fill the frame_size, a "send" is forced)
+//frame_size: 1054
+
+//----- IP Rules Settings -----
+
+// Do we check IP's before allowing incoming connections?
+enable_ip_rules: yes
+
+// Decide the order of access restriction (Same as apache?)
+// deny,allow Is the standard
+
+order: deny,allow
+// order: allow,deny
+// order: mutual-failture
+
+// The IP list which it uses to access controls
+// allow : Allows access regardless of permissions
+// deny : Completely disallow
+// 指定無し : If the permission check encounters mutual-failure(whatever that means) it will disallow access
+
+// allow: 127.0.0.1
+// allow: 192.168.0.0/16
+// allow: 10.0.0.0/255.0.0.0
+allow: all
+
+// deny: 127.0.0.1
+
+
+//---- Ddos Protection Settings ----
+// If there is a connection request within ddos_interval msec for ddos_count number of times, it will assume it is a ddos attack
+
+// Consecutive intervals(msec)
+ddos_interval: 3000
+
+// Connection frequency
+ddos_count: 5
+
+// The time interval after which the threat of ddos is assumed to be gone
+// After this amount of time, the ddos restrictions are lifted.
+ddos_autoreset: 600000
+
+
+//import: conf/import/packet_conf.txt