<firewall>
<!-- IP: IP block / allow list, remember that net mask can also be provided to block subnets example: 23.23.0.0/255.255.0.0, this will block the whole 23.23.X net. -->
<IP>
<!--
block: These ips will get blocked.
Note!: If allow element is specified, the block element will not be functional.
-->
<block>
<item>23.23.23.23</item>
<item>23.23.23.21</item>
</block>
<!-- allow: When using allow block element is not needed because you only allow these elements -->
<allow>
<item>192.168.0.44</item>
<item>127.0.0.1</item>
<item>127.2.2.2</item>
</allow>
</IP>
<!-- userinput: User input settings, to remove sql injections and block userinput of any kind.
Additional settings is separated by the "|" symbol.
The following Constants can be selected:
Firewall::POST
Firewall::GET
Firewall::FILES
Firewall::COOKIE
Firewall::SERVER
Firewall::SESSION
-->
<userinput>
<!-- preventInput: Prevents all variables and unsets any data posted by users including post, get, cookie and all other variables that users can post data in. Leave types arguement empty if you want to filter it all.
This setting is only useful at static php webpages.
-->
<preventInput types="Firewall::POST|Firewall::GET">false</preventInput>
<!-- inputProtection: XSS safe and removes sql injection from any kind of userinput including get,post, cookie, session variables. Leave types arguement empty if you want to filter it all.
stripHTML will strip all html when turned on, else it will use the RemoveXXS function to remove XXS attacks.
-->
<inputProtection stripHTML="false" types="Firewall::POST|Firewall::GET|Firewall::FILES|Firewall::SESSION|Firewall::COOKIE|Firewall::SERVER">true</inputProtection>
</userinput>
</firewall> |