A role to manage iptables rules which doesn't suck.
-
Updated
Sep 10, 2024 - Shell
A role to manage iptables rules which doesn't suck.
Optimal IPTables Configuration for Attack Mitigation This project aims to design and implement the best IPTables configurations to defend against various cyber attacks. It includes analyzing threats, creating tailored rules for prevention, and ensuring system security while balancing performance and reducing false positives.
QoS & Traffic Control(TC) - Optimize Your Ubuntu Server.
Make 🐳 Docker play nice with 🧱 ConfigServer Firewall
Firewall Workarounds für das UnifiOS der Ubiquiti Unifi Dream Machines Pro.
SA-MP Exploit Protection iptables rules
UniFi - guides on CLI syntax like rsync, iptables, firewall logs, what ports, manage Protect storage. Info about Content Filter, AdBlocking and more.
Convert a hosts file or a list of domain into iptables.
Iptables & Kernel (sysctl) ddos protection rules
Configurar Ubuntu Server 20.04 como router linux
Proteção Anti-DDoS
Firewall rules intended for single hosts (not excluding routers/firewalls)
Dry-running iptables-legacy rulesets
An iptables script that allows your HTTP(80)/HTTPS(443) port to receive traffic from cloudflare only
Shell Script - Firewall with Iptables
wallrules: A repository for creating clean, secure, and custom rules for iptables.
In this assignment, we work with network scanning and iptables rules. Iptables are used to set up, maintain, and inspect the tables of IP packet filter rules in the Linux kernel. Several different tables may be defined. Each table contains a number of built-in chains and may also contain user-defined chains.
Add a description, image, and links to the iptables-rules topic page so that developers can more easily learn about it.
To associate your repository with the iptables-rules topic, visit your repo's landing page and select "manage topics."