diff options
author | shennetsind <ind@henn.et> | 2013-01-25 14:02:43 -0200 |
---|---|---|
committer | shennetsind <ind@henn.et> | 2013-01-25 14:03:15 -0200 |
commit | cf0e8e7563e4273137c8a582d66fe4fcc6c283fa (patch) | |
tree | b8110178da066837e6776dee756191ed51254b5f /conf/packet_athena.conf | |
parent | 6864c961e1cfad9650d2343bf94a9e6b197360e3 (diff) | |
download | hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.gz hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.bz2 hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.tar.xz hercules-cf0e8e7563e4273137c8a582d66fe4fcc6c283fa.zip |
Dropping _athena file suffixes
Signed-off-by: shennetsind <ind@henn.et>
Diffstat (limited to 'conf/packet_athena.conf')
-rw-r--r-- | conf/packet_athena.conf | 64 |
1 files changed, 0 insertions, 64 deletions
diff --git a/conf/packet_athena.conf b/conf/packet_athena.conf deleted file mode 100644 index 0741ac013..000000000 --- a/conf/packet_athena.conf +++ /dev/null @@ -1,64 +0,0 @@ -// Athena sockets Configuration file -// translated (davidsiaw) - - -// Display debug reports (When something goes wrong during the report, the report is saved.) -debug: no - -// How long can a socket stall before closing the connection (in seconds) -stall_time: 60 - -// Maximum allowed size for clients packets in bytes (default: 24576). -// NOTE: To reduce the size of reported packets, lower the values of defines, which -// have been customized, such as MAX_STORAGE, MAX_GUILD_STORAGE or MAX_CART. -// NOTE: Do not modify this setting, unless the client has been modified to support -// larger packets. The client will crash, when it receives larger packets. -socket_max_client_packet: 24576 - -//----- IP Rules Settings ----- - -// If IP's are checked when connecting. -// This also enables DDoS protection. -enable_ip_rules: yes - -// Order of the checks -// deny,allow : Checks deny rules, then allow rules. Allows if no rules match. -// allow,deny : Checks allow rules, then deny rules. Allows if no rules match. -// mutual-failure : Allows only if an allow rule matches and no deny rules match. -// (default is deny,allow) - -order: deny,allow -// order: allow,deny -// order: mutual-failture - -// IP rules -// allow : Accepts connections from the ip range (even if flagged as DDoS) -// deny : Rejects connections from the ip range -// The rules are processed in order, the first matching rule of each list (allow and deny) is used - -// allow: 127.0.0.1 -// allow: 192.168.0.0/16 -// allow: 10.0.0.0/255.0.0.0 -// allow: all - -// deny: 127.0.0.1 - - -//---- DDoS Protection Settings ---- -// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack - -// Consecutive attempts interval (msec) -// (default is 3000 msecs, 3 seconds) -ddos_interval: 3000 - -// Consecutive attempts trigger -// (default is 5 attemps) -ddos_count: 5 - -// The time interval after which the threat of DDoS is assumed to be gone. (msec) -// After this amount of time, the DDoS restrictions are lifted. -// (default is 600000 msecs, 10 minutes) -ddos_autoreset: 600000 - - -import: conf/import/packet_conf.txt |