PHP Classes

File: firewallconfig.xml

Recommend this page to a friend!
  Classes of Petter Kjelkenes   Firewall Protection   firewallconfig.xml   Download  
File: firewallconfig.xml
Role: Auxiliary data
Content type: text/plain
Description: Config script
Class: Firewall Protection
Restrict the access to pages based on IP address
Author: By
Last change: Updated XML to include some more help text.
Date: 13 years ago
Size: 2,152 bytes
 

Contents

Class file image Download
<firewall> <!-- IP: IP block / allow list, remember that net mask can also be provided to block subnets example: 23.23.0.0/255.255.0.0, this will block the whole 23.23.X net. --> <IP> <!-- block: These ips will get blocked. Note!: If allow element is specified, the block element will not be functional. --> <block> <item>23.23.23.23</item> <item>23.23.23.21</item> </block> <!-- allow: When using allow block element is not needed because you only allow these elements --> <allow> <item>192.168.0.44</item> <item>127.0.0.1</item> <item>127.2.2.2</item> </allow> </IP> <!-- userinput: User input settings, to remove sql injections and block userinput of any kind. Additional settings is separated by the "|" symbol. The following Constants can be selected: Firewall::POST Firewall::GET Firewall::FILES Firewall::COOKIE Firewall::SERVER Firewall::SESSION --> <userinput> <!-- preventInput: Prevents all variables and unsets any data posted by users including post, get, cookie and all other variables that users can post data in. Leave types arguement empty if you want to filter it all. This setting is only useful at static php webpages. --> <preventInput types="Firewall::POST|Firewall::GET">false</preventInput> <!-- inputProtection: XSS safe and removes sql injection from any kind of userinput including get,post, cookie, session variables. Leave types arguement empty if you want to filter it all. stripHTML will strip all html when turned on, else it will use the RemoveXXS function to remove XXS attacks. --> <inputProtection stripHTML="false" types="Firewall::POST|Firewall::GET|Firewall::FILES|Firewall::SESSION|Firewall::COOKIE|Firewall::SERVER">true</inputProtection> </userinput> </firewall>