chloe K wrote:
Hi all
ks there iptables rules to limit attack?
Thank you
There are examples using the recent and limit modules on the Wiki (Securing SSH page):
http://wiki.centos.org/HowTos/Network/SecuringSSH#head-a296ec93e31637aa34953...
It should be easy to adapt these as required.