Hello list, I have configured the hashlimit to protect port 80 (http) from apache benchmark and related attack. The rule is ` ` ` iptables -A INPUT -p tcp -m state --state NEW --dport 80 -m hashlimit \ --hashlimit 200/sec --hashlimit-burst 5 --hashlimit-htable-expire 18000 \ --hashlimit-mode srcip --hashlimit-name http -j ACCEPT ` ` ` But I have found this rule is not protecting the apache and apache is flooded by apache benchmark attack. Have I done some thing wrong in my rule set ? Please suggest. Thanks -- জয়দীপ বক্সী -- To unsubscribe from this list: send the line "unsubscribe netfilter" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html