Provided by: firehol-doc_2.0.3+ds-1_all bug

NAME

       firehol-protection - add extra protections to a definition

SYNOPSIS

       protection [reverse] strong [requests/period [burst]]

       protection [reverse] flood-protection-type [requests/period [burst]]

       protection [reverse] { bad-packets | packet-protection-type }

DESCRIPTION

       The protection subcommand sets protection rules on an interface or router.

       Flood protections honour the values requests/period and burst.  They are used to limit the
       rate of certain types of traffic.

       The default rate FireHOL uses is 100 operations per  second  with  a  burst  of  50.   Run
       iptables -m limit --help for more information.

       The  protection  type  strong  will  switch  on  all  protections  (both  packet and flood
       protections) except all-floods.  It has aliases full and all.

       The protection type bad-packets will switch  on  all  packet  protections  but  not  flood
       protections.

       You  can  specify  multiple  protection  types by using multiple protection commands or by
       using a single command and enclosing the types in quotes.

              Note

              On a router, protections are normally set up on inface.

              The reverse option will set up the protections on outface.  You must use it as  the
              first keyword.

PACKET PROTECTION TYPES

       invalid
              Drops all incoming invalid packets, as detected INVALID by the connection tracker.

              See  also  FIREHOL_DROP_INVALID  in  firehol-variables(5) which allows setting this
              function globally.

       fragments
              Drops all packet fragments.

              This rule will probably never match anything  since  iptables(8)  reconstructs  all
              packets  automatically  before the firewall rules are processed whenever connection
              tracking is running.

       new-tcp-w/o-syn
              Drops all TCP packets that initiate a socket but have not got the SYN flag set.

       malformed-xmas
              Drops all TCP packets that have all TCP flags set.

       malformed-null
              Drops all TCP packets that have all TCP flags unset.

       malformed-bad
              Drops all TCP packets that have illegal combinations of TCP flags set.

FLOOD PROTECTION TYPES

       icmp-floods [requests/period [burst]]
              Allows only a certain amount of ICMP echo requests.

       syn-floods [requests/period [burst]]
              Allows only a certain amount of new TCP connections.

              Be careful to not set the rate too low as the rule is applied  to  all  connections
              regardless of their final result (rejected, dropped, established, etc).

       all-floods [requests/period [burst]]
              Allows only a certain amount of new connections.

              Be  careful  to  not set the rate too low as the rule is applied to all connections
              regardless of their final result (rejected, dropped, established, etc).

EXAMPLES

              protection strong

              protection "invalid new-tcp-w/o-syn"

              protection syn-floods 90/sec 40

KNOWN ISSUES

       When using multiple types in a single command, if  the  quotes  are  forgotten,  incorrect
       rules will be generated without warning.

       When using multiple types in a single command, FireHOL will silently ignore any types that
       come after a group type (bad-packets, strong and its aliases).  Only use  group  types  on
       their own line.

SEE ALSO

       · firehol(1) - FireHOL program

       · firehol.conf(5) - FireHOL configuration

       · firehol-interface(5) - interface definition

       · firehol-router(5) - router definition

       · FireHOL Website (http://firehol.org/)

       · FireHOL Online PDF Manual (http://firehol.org/firehol-manual.pdf)

       · FireHOL Online HTML Manual (http://firehol.org/manual)

AUTHORS

       FireHOL Team.