Of course there are several types of DOS attacks , in this post I will demonstrating the use if iptables to limit the traffic on port 80.
The goal is to keep your web server “responsive” to legitimate traffic, but to throttle back on excessive (potential DOS) traffic.
In this demonstration iptables is configured :
- The default policy is ACCEPT (to prevent lockout in the event of flushing the rules with iptables -F).
- “Legitimate” traffic is then allowed. In this example I am allowing traffic only on port 80.
- All other traffic is then blocked at the end of the INPUT chain (the final rule in the INPUT chain is to DROP all traffic).