summaryrefslogtreecommitdiff
path: root/conf-tmpl/packet_athena.conf
diff options
context:
space:
mode:
Diffstat (limited to 'conf-tmpl/packet_athena.conf')
-rw-r--r--conf-tmpl/packet_athena.conf51
1 files changed, 51 insertions, 0 deletions
diff --git a/conf-tmpl/packet_athena.conf b/conf-tmpl/packet_athena.conf
new file mode 100644
index 000000000..1c29c84bf
--- /dev/null
+++ b/conf-tmpl/packet_athena.conf
@@ -0,0 +1,51 @@
+// Athena sockets Configuration file
+// translated (davidsiaw)
+
+
+// Display debug reports (iWhen something goes wrong during the report, the report is saved.)
+debug: no
+
+// How long can a socket stall before closing the connection (in seconds)
+stall_time: 60
+
+
+//----- IP Rules Settings -----
+
+// Do we check IP's before allowing incoming connections?
+enable_ip_rules: yes
+
+// Decide the order of access restriction (Same as apache?)
+// deny,allow Is the standard
+
+order: deny,allow
+// order: allow,deny
+// order: mutual-failture
+
+// The IP list which it uses to access controls
+// allow : Allows access regardless of permissions
+// deny : Completely disallow
+// Žw’è–³‚µ : If the permission check encounters mutual-failure(whatever that means) it will disallow access
+
+// allow: 127.0.0.1
+// allow: 192.168.0.0/16
+// allow: 10.0.0.0/255.0.0.0
+allow: all
+
+// deny: 127.0.0.1
+
+
+//---- Ddos Protection Settings ----
+// If there is a connection request within ddos_interval msec for ddos_count number of times, it will assume it is a ddos attack
+
+// Consecutive intervals(msec)
+ddos_interval: 3000
+
+// Connection frequency
+ddos_count: 5
+
+// The time interval after which the threat of ddos is assumed to be gone
+// After this amount of time, the ddos restrictions are lifted.
+ddos_autoreset: 600000
+
+
+//import: conf/import/packet_conf.txt