User Manual

71
7.6.5 Custom Rules
Here you have the ultimate freedom in defining your rules – you can enter them straight into the iptables program.
Just type them out into the text field ant it will get executed as a Linux shell script. If you are unsure of how to use iptables,
check out the internet for manuals, examples and explanations.
7.6.6 DDOS Prevention
7.6.6.1 SYN Flood Protection
SYN Flood Protection allows you to protect your router from attacks that exploit part of the normal TCP three-way
handshake to consume resources on the targeted server and render it unresponsive. Essentially, with SYN flood DDoS, the
offender sends TCP connection requests faster than the targeted machine can process them, causing network saturation.