1) Do not respond to ping echoes by clients (possibly reduce spambots)
2) Drop all incoming connections, apply only SSH, HTTP and HTTPS
2) Reject connection if too intense attempts. Useful against port scanners such as [Nmap](nmap.org) and other brute force scanners such as [Dirbuster](https://www.owasp.org/index.php/Category:OWASP_DirBuster_Project).
3) Drop packets if the client connection is too intense. May be useful against port scanners such as [Nmap](nmap.org).
3) Drop all incoming connections, apply only SSH, HTTP and HTTPS
The ruleset file has basic installation steps in the header section.