<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[DDoS &amp; flood]]></title><description><![CDATA[<p dir="auto">can this by converted in to pfSense firewall ? I am using this on Linux .</p>
<pre><code>
#IPTABLES="/usr/sbin/iptables" ## Default IPTables &gt;= v. 1.2.0
IPTABLES="/usr/bin/iptables" ## Default IPTables &lt;= v. 1.1.2
PING_IS="ON"
PING_FLOOD="2/s"
#
SYN_FLOOD="5/s"
LOG_FLOOD="2/s"
#  Syn-Flood
echo -n "Loading Syn-Flood-Def"
   ${IPTABLES} -N FLOOD
   ${IPTABLES} -A FLOOD -p tcp --syn -m limit --limit $SYN_FLOOD -j RETURN
   ${IPTABLES} -A FLOOD -p tcp --tcp-flags SYN,ACK,FIN,RST RST -m limit --limit 2/s --limit-burst 3 -j RETURN
   ${IPTABLES} -A FLOOD -p tcp -j DROP
   ${IPTABLES} -A INPUT -p tcp -m state --state NEW -j FLOOD
echo "....done "
############################################################################################
#  Ping-Flood
function PING_FLOD_ON {
echo -n "Loading Ping CFG..."
   ${IPTABLES} -N ICMP
   ${IPTABLES} -F ICMP
#    0 = Echo Reply, what gets sent back after a type 8 is received here
#    3 = Destination Unreachable (inbound) or Fragmentation Needed (out)
#    4 = Source Quench tells sending IP to slow down its rate to destination
#    8 = Echo Request used for pinging hosts, but see the caution above
#   11 = Time Exceeded used for traceroute (TTL) or sometimes frag packets
#   12 = Parameter Problem is some error or weirdness detected in header
# Allow limited ICMP traffic
   ${IPTABLES} -A ICMP -p ICMP --icmp-type 0 -j ACCEPT
   ${IPTABLES} -A ICMP -p ICMP --icmp-type 3 -j ACCEPT
   ${IPTABLES} -A ICMP -p ICMP --icmp-type 8 -m limit --limit $PING_FLOOD --limit-burst 2 -j ACCEPT
   ${IPTABLES} -A ICMP -p ICMP --icmp-type 11 -j ACCEPT
# Set policy and add to INPUT table
   ${IPTABLES} -A ICMP -p icmp -j DROP
   ${IPTABLES} -A INPUT -p icmp -j ICMP
echo "....done "
}
function PING_FLOD_OF {
    echo -n "PING is DROP:"
    ${IPTABLES} -A INPUT -p icmp -j DROP
    echo ".....done"
}
if [ "$PING_IS" = "ON" ]; then
    PING_FLOD_ON
else
    PING_FLOD_OF
fi

</code></pre>
<p dir="auto">Sorry it might by incomplete but it is take out of my firewall script</p>
]]></description><link>https://forum.netgate.com/topic/99627/ddos-flood</link><generator>RSS for Node</generator><lastBuildDate>Tue, 21 Apr 2026 23:43:55 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/99627.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 09 May 2016 14:08:46 GMT</pubDate><ttl>60</ttl></channel></rss>