-i // ip, only for machines with multiple network interfaces don't use these switches, unless you really know what you're doing: -A // Restricts voting for a map/mode to admins. 4 ERROR: log only messages of level ERROR ![]() 3 WARNING: log only messages of level WARNING and above 2 INFO: logs all messages of level INFO and above (same as console without -V switch) 1 VERBOSE: logs all messages of level VERBOSE and above (same as console log, when using the -V switch) The following levels can be selected (-LF & -LS): -LS // Sets the logging level for syslog logging (0.5), default 2 (Linux) or 5 (Win & Mac) -LF // Sets the logging level for file logs (0.5), default 2 (Win & Mac) or 5 (Linux) -T // Add timestamps to every line of the console and file logs. -C // import commandline options from file (can be used recursively) -V // verbose logging (enable this via commandline, until you're sure, there are no errors in your config left) -W // demopath, path & file prefix to store recorded demos at -x // adminpasswd, don't use, use serverpwd.cfg instead -p // serverpassword, for passworded servers -O // MOTD text filename prefix, default config/motd -I // serverinfo text filename prefix, default config/serverinfo -Z // sendmap/incoming limit in MB (default = 10MB) default: CRU (lowercase: any user is allowed to do it uppercase: admin role is required) r revert existing map to older revision u update existing map (same or newer revision) -M // sendmap permission string (read docs/commandline.html) default: fkBMASRCDEW (lowercase: a user can vote for it uppercase: admin role is required to vote) w vote to kick/ban without clear reasons p vote for a gamemode that is not supported by the map (default: no one can) r record a demo of the next game (if autorecording is disabled) -P // voting permission string (read docs/commandline.html) -K // server nickname blacklist file, default config/nicknameblacklist.cfg -B // server IP blacklist file, default config/serverblacklist.cfg -X // server passwords file, default config/serverpwd.cfg -r // server maprot file, default config/maprot.cfg change these, if you don't like the defaults: example colored server description: -n \f3red\f1blue example multiline MOTD: -o line 1\nline 2\nline 3 the available colors are: 0: green, 1: blue, 2: yellow, 3: red, 4: gray, 5: white, 6: dark brown, 7: dark red the switches o, n, n1 and n2 support coloring and character escaping 'o' also supports escaped newlines -D // number of demos to keep in RAM, default 5 -c // max client number, 1.20, default 6 -n2 // custom server description suffix -n1 // custom server description prefix o \f3server using example cmdline file (config/servercmdline.txt)\n\f2feel free to change this see docs/commandline.html for full parameter descriptions * you can separate the switch and it's argument by whitespace * you have to use the '-' characters for the switches * one commandline parameter per line only * everything after '//' in a line will be ignored to use this file, add -Cconfig/servercmdline.txt to your servers commandline Here are what these things mean if you dont know it.: i unchecked that.Ħth i setup my server on my assaultcube server on desktop with serverwizard.bat which looks like this:īin_win32\ac_server.exe -n"\f1|GOD|\f3Clan \f5Server" -o"Welcome to the |GOD|Clan Server\nHave a nice day" -c8 -xjoker13213619 -f28763 -Pkbmfaswp -McUR So LAN to WAN has a rule and also WAN to LAN has the exact same rule and also the ports are the same.Īlso the respond to ping on is: LAN to WANĪnd the box that says Do Not Respond to Requests for Unauthorized Services. So also i went to WAN to LAN and did all of the same steps as i did too LAN to WAN. Log: Log packet detail information checked. i added it to selected services too.: Here is how its setup of the packets and stuff. Than i clicked apply, and at the very top it shows a box that says active and that box is checked. So i went to the Firewall tab, than i went to LAN to WAN, So i added a rule to LAN to Wan. Okay my IP Address that i put for the server was my Ethernet Adaptor Local Area Connection: So my IPv4 Address is: 192.168.2.2Ĥth I added a rule to my router. ![]() okay so i went to NAT than Edit Details and i port forwarded ports: ![]() My routers ip address is: 192.168.2.1 and i typed it in on the ģrd Since my router is Embarq 660 series zyxel i have to go to NAT in order to portforward. Made them UDP also.Ģnd i went to my router to opened ports. Okay so i went to -> ġst i added exceptions to ports 28763 & 28764 on my firewall. Hello, im posting this because i need help on how to make a assault cube server: My router is a Embarq 660 Series.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |