diff options
author | FlavioJS <FlavioJS@54d463be-8e91-2dee-dedb-b68131a5f0ec> | 2006-12-05 13:23:07 +0000 |
---|---|---|
committer | FlavioJS <FlavioJS@54d463be-8e91-2dee-dedb-b68131a5f0ec> | 2006-12-05 13:23:07 +0000 |
commit | 288490094a7fe9167747dc78d416940759a31197 (patch) | |
tree | 53dc4f5c2375f4b688b53ca8841630ddec5e1f88 /conf-tmpl/packet_athena.conf | |
parent | 8ec1c47aed09c90343949d57c92760ba84738a46 (diff) | |
download | hercules-288490094a7fe9167747dc78d416940759a31197.tar.gz hercules-288490094a7fe9167747dc78d416940759a31197.tar.bz2 hercules-288490094a7fe9167747dc78d416940759a31197.tar.xz hercules-288490094a7fe9167747dc78d416940759a31197.zip |
- Massive EOL normalization & 'svn:eol-style native' flag setting for all txt/conf/h/c files.
git-svn-id: https://rathena.svn.sourceforge.net/svnroot/rathena/trunk@9410 54d463be-8e91-2dee-dedb-b68131a5f0ec
Diffstat (limited to 'conf-tmpl/packet_athena.conf')
-rw-r--r-- | conf-tmpl/packet_athena.conf | 114 |
1 files changed, 57 insertions, 57 deletions
diff --git a/conf-tmpl/packet_athena.conf b/conf-tmpl/packet_athena.conf index 6f5a1ac2f..d654a0e35 100644 --- a/conf-tmpl/packet_athena.conf +++ b/conf-tmpl/packet_athena.conf @@ -1,57 +1,57 @@ -// Athena sockets Configuration file
-// translated (davidsiaw)
-
-
-// Display debug reports (iWhen something goes wrong during the report, the report is saved.)
-debug: no
-
-// How long can a socket stall before closing the connection (in seconds)
-stall_time: 60
-
-// When enabled, sets TCP_NODELAY (disable nagel Algorythm) on all connections
-mode_neg: yes
-
-// frame packet size as considered by the server (when there's enough
-// information in queue to fill the frame_size, a "send" is forced)
-//frame_size: 1054
-
-//----- IP Rules Settings -----
-
-// Do we check IP's before allowing incoming connections?
-enable_ip_rules: yes
-
-// Decide the order of access restriction (Same as apache?)
-// deny,allow Is the standard
-
-order: deny,allow
-// order: allow,deny
-// order: mutual-failture
-
-// The IP list which it uses to access controls
-// allow : Allows access regardless of permissions
-// deny : Completely disallow
-// 指定無し : If the permission check encounters mutual-failure(whatever that means) it will disallow access
-
-// allow: 127.0.0.1
-// allow: 192.168.0.0/16
-// allow: 10.0.0.0/255.0.0.0
-allow: all
-
-// deny: 127.0.0.1
-
-
-//---- Ddos Protection Settings ----
-// If there is a connection request within ddos_interval msec for ddos_count number of times, it will assume it is a ddos attack
-
-// Consecutive intervals(msec)
-ddos_interval: 3000
-
-// Connection frequency
-ddos_count: 5
-
-// The time interval after which the threat of ddos is assumed to be gone
-// After this amount of time, the ddos restrictions are lifted.
-ddos_autoreset: 600000
-
-
-//import: conf/import/packet_conf.txt
+// Athena sockets Configuration file +// translated (davidsiaw) + + +// Display debug reports (iWhen something goes wrong during the report, the report is saved.) +debug: no + +// How long can a socket stall before closing the connection (in seconds) +stall_time: 60 + +// When enabled, sets TCP_NODELAY (disable nagel Algorythm) on all connections +mode_neg: yes + +// frame packet size as considered by the server (when there's enough +// information in queue to fill the frame_size, a "send" is forced) +//frame_size: 1054 + +//----- IP Rules Settings ----- + +// Do we check IP's before allowing incoming connections? +enable_ip_rules: yes + +// Decide the order of access restriction (Same as apache?) +// deny,allow Is the standard + +order: deny,allow +// order: allow,deny +// order: mutual-failture + +// The IP list which it uses to access controls +// allow : Allows access regardless of permissions +// deny : Completely disallow +// 指定無し : If the permission check encounters mutual-failure(whatever that means) it will disallow access + +// allow: 127.0.0.1 +// allow: 192.168.0.0/16 +// allow: 10.0.0.0/255.0.0.0 +allow: all + +// deny: 127.0.0.1 + + +//---- Ddos Protection Settings ---- +// If there is a connection request within ddos_interval msec for ddos_count number of times, it will assume it is a ddos attack + +// Consecutive intervals(msec) +ddos_interval: 3000 + +// Connection frequency +ddos_count: 5 + +// The time interval after which the threat of ddos is assumed to be gone +// After this amount of time, the ddos restrictions are lifted. +ddos_autoreset: 600000 + + +//import: conf/import/packet_conf.txt |