packet_athena.conf 2.24 KB
Newer Older
1 2 3 4
// Athena sockets Configuration file
// translated (davidsiaw)


5
// Display debug reports (When something goes wrong during the report, the report is saved.)
6 7
debug: no

8 9 10 11 12 13 14 15 16 17 18 19 20
// Linux/Epoll: Maximum Events per cycle
// Default Value:
//	(Maximum Supported Connections)/2
// NOTE: this controls the maximum collected socket-events per-cycle (call to epoll_wait())
//       for example settings this to 32 will allow up to 32 events (incoming data/new connections
//       per server-cycle.
// NOTE: Recommended Settings is at least half the maximum supported connections
//       Settings this to a lower value, may cause lags/delays
//       Depending on available CPU Time
// NOTE: This Setting is only available on Linux when build using EPoll as event dispatcher!
//
//epoll_maxevents: 1024

21 22 23 24 25
// How long can a socket stall before closing the connection (in seconds)
stall_time: 60

//----- IP Rules Settings -----

26 27
// If IP's are checked when connecting.
// This also enables DDoS protection.
28 29
enable_ip_rules: yes

30 31 32 33 34
// Order of the checks
//   deny,allow     : Checks deny rules, then allow rules. Allows if no rules match.
//   allow,deny     : Checks allow rules, then deny rules. Allows if no rules match.
//   mutual-failure : Allows only if an allow rule matches and no deny rules match.
// (default is deny,allow)
35 36 37

order: deny,allow
// order: allow,deny
38
// order: mutual-failure
39

40 41 42 43
// IP rules
//   allow : Accepts connections from the ip range (even if flagged as DDoS)
//   deny  : Rejects connections from the ip range
// The rules are processed in order, the first matching rule of each list (allow and deny) is used
44 45 46 47

// allow: 127.0.0.1
// allow: 192.168.0.0/16
// allow: 10.0.0.0/255.0.0.0
48
// allow: all
49 50 51 52

// deny: 127.0.0.1


53 54
//---- DDoS Protection Settings ----
// If ddos_count connection request are made within ddos_interval msec, it assumes it's a DDoS attack
55

56 57
// Consecutive attempts interval (msec)
// (default is 3000 msecs, 3 seconds)
58 59
ddos_interval: 3000

60
// Consecutive attempts trigger
61
// (default is 5 attempts)
62 63
ddos_count: 5

64 65 66
// The time interval after which the threat of DDoS is assumed to be gone. (msec)
// After this amount of time, the DDoS restrictions are lifted.
// (default is 600000 msecs, 10 minutes)
67 68 69
ddos_autoreset: 600000


Lupus's avatar
Lupus committed
70
import: conf/import/packet_conf.txt