7.6.5 Custom Rules
Here you have the ultimate freedom in defining your rules – you can enter them straight into the iptables
program. Just type them out into the text field ant it will get executed as a Linux shell script. If you are unsure of how to
use iptables, check out the internet for manuals, examples and explanations.
7.6.6 DDOS Prevention
7.6.6.1 SYN Flood Protection
SYN Flood Protection allows you to protect your router from attacks that exploit part of the normal TCP three-way
handshake to consume resources on the targeted server and render it unresponsive. Essentially, with SYN flood DDoS,
the offender sends TCP connection requests faster than the targeted machine can process them, causing network
saturation.
70