The following article is part two of a two part series. "Alternately, you could create limit rules to accept only a certain number of requests every second. Or if you have monitoring software that requires your box to be "pingable," you could accept ICMP requests from only a certain IP or set of IP addresses." . . .
The following article is part two of a two part series. "Alternately, you could create limit rules to accept only a certain number of requests every second. Or if you have monitoring software that requires your box to be "pingable," you could accept ICMP requests from only a certain IP or set of IP addresses."

The link for this article located at ZDNet AU is no longer available.