One-Click Attack Protection Profiles | Pre-Built Firewall Rules by Use Case | Flowtriq
Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape State of DDoS 2026 REPORT Free Certifications NEW
Research & Guides
Mirai Botnet Kill Switch Research memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners Whitelabel / Reseller Affiliate Program Pay with Crypto System Status
Legal & Support
Contact Us Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs, see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs/MSSPs Small Operators Routers Edge Node Defense
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services

One-Click Attack Protection Profiles

Best-practice firewall rules,
one click to deploy.

Pre-built protection profiles bundle curated firewall rules for your specific use case. Choose your firewall suite, review every command, toggle individual rules, and apply to all your nodes instantly. No guesswork, no copy-pasting from Stack Overflow.

10
Protection Profiles
3
Firewall Suites
1-Click
Deploy to All Nodes

How It Works

From profile to protection in four steps

Each profile is a curated bundle of firewall rules designed by our team for a specific use case. Every rule is based on real-world attack patterns we've seen across thousands of incidents.

You choose which firewall tool to use (iptables, nftables, or ufw), see the exact command for every rule, toggle individual rules on or off, then deploy to your nodes with one click.

Rules are queued through the same agent command pipeline as auto-mitigation rules. Your FTAgent picks them up and executes them within seconds.

flowtriq · attack profiles
Profile: Game Server Protection
Suite: iptables
Rules: 11 selected / 12 total

[UDP Flood Protection]
Rate-limit UDP per source 500/s
Drop UDP on non-game ports

[Amplification Prevention]
Block DNS amp (port 53)
Block NTP amp (port 123)
Block SSDP amp (port 1900)

Applying to 4 nodes...
✓ 44 commands queued
_

4 Steps

Deploy in under a minute

1

Pick your profile

Select the profile that matches your use case: game servers, hosting, ISP, SaaS, fintech, and more.

2

Choose your suite

Select iptables, nftables, or ufw. Every rule translates to the exact command for your chosen suite.

3

Review & toggle

See every command before it runs. Toggle individual rules on or off. No surprises.

4

Apply with one click

Commands are queued to your agent and executed on all selected nodes within seconds.

Why Profiles

Manual hardening vs. attack profiles

Manual hardening

  • Research best practices per use case
  • Write and test each iptables rule manually
  • SSH into every server individually
  • Hope you didn't forget a vector
  • Repeat for every new server
  • No audit trail of what was applied where

Flowtriq Attack Profiles

  • Curated rules based on real attack data
  • Choose iptables, nftables, or ufw
  • Review every command before it runs
  • Toggle individual rules on or off
  • One click to deploy across all nodes
  • Full audit trail of every applied rule

FAQ

Common questions about attack profiles

Do attack profiles replace auto-mitigation rules?

No. Profiles are proactive hardening - they apply static firewall rules before any attack happens. Auto-mitigation rules are reactive - they trigger on incident detection. Use both together for defense in depth.

Will applying a profile break my running services?

Every rule shows the exact command before you apply it. You choose which rules to enable and which to skip. Rules that could impact services (like blocking all UDP) are clearly labeled and disabled by default.

Can I customize the rules in a profile?

Yes. After selecting a profile, you can toggle individual rules on or off, choose your firewall suite (iptables, nftables, or ufw), and review every command before applying.

What happens if I apply the same profile twice?

The commands will be queued and executed again. Most rules are idempotent (e.g., enabling SYN cookies when already enabled has no effect). For iptables rules, duplicate rules may be added - check your rule chain before re-applying.

Which firewall suite should I choose?

Use iptables if you are on an older kernel or not sure. Use nftables if your distro uses it by default (Debian 10+, Fedora 18+). Use ufw if you manage your firewall through ufw on Ubuntu/Debian. Note: some advanced rules are only available in iptables and nftables.

Get Started

Harden your servers in one click.

Deploy best-practice firewall rules across all your nodes in under a minute. Free 7-day trial, no credit card required.

Start Free Trial Read the docs