packet_athena.conf 2.2 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970
  1. // Athena sockets Configuration file
  2. // translated (davidsiaw)
  3. // Display debug reports (When something goes wrong during the report, the report is saved.)
  4. debug: no
  5. // Linux/Epoll: Maximum Events per cycle
  6. // Default Value:
  7. // (Maximum Supported Connections)/2
  8. // NOTE: this controls the maximum collected socket-events per-cycle (call to epoll_wait())
  9. // for example settings this to 32 will allow up to 32 events (incoming data/new connections
  10. // per server-cycle.
  11. // NOTE: Recommended Settings is at least half the maximum supported connections
  12. // Settings this to a lower value, may cause lags/delays
  13. // Depending on available CPU Time
  14. // NOTE: This Setting is only available on Linux when build using EPoll as event dispatcher!
  15. //
  16. //epoll_maxevents: 1024
  17. // How long can a socket stall before closing the connection (in seconds)
  18. stall_time: 60
  19. //----- IP Rules Settings -----
  20. // If IP's are checked when connecting.
  21. // This also enables DDoS protection.
  22. enable_ip_rules: yes
  23. // Order of the checks
  24. // deny,allow : Checks deny rules, then allow rules. Allows if no rules match.
  25. // allow,deny : Checks allow rules, then deny rules. Allows if no rules match.
  26. // mutual-failure : Allows only if an allow rule matches and no deny rules match.
  27. // (default is deny,allow)
  28. order: deny,allow
  29. // order: allow,deny
  30. // order: mutual-failure
  31. // IP rules
  32. // allow : Accepts connections from the ip range (even if flagged as DDoS)
  33. // deny : Rejects connections from the ip range
  34. // The rules are processed in order, the first matching rule of each list (allow and deny) is used
  35. // allow: 127.0.0.1
  36. // allow: 192.168.0.0/16
  37. // allow: 10.0.0.0/255.0.0.0
  38. // allow: all
  39. // deny: 127.0.0.1
  40. //---- DDoS Protection Settings ----
  41. // If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack
  42. // Consecutive attempts interval (msec)
  43. // (default is 3000 msecs, 3 seconds)
  44. ddos_interval: 3000
  45. // Consecutive attempts trigger
  46. // (default is 5 attempts)
  47. ddos_count: 5
  48. // The time interval after which the threat of DDoS is assumed to be gone. (msec)
  49. // After this amount of time, the DDoS restrictions are lifted.
  50. // (default is 600000 msecs, 10 minutes)
  51. ddos_autoreset: 600000
  52. import: conf/import/packet_conf.txt