Jo faktisk du har rett, det er en oppgradering eller en patch. Se tekst under eller linken. Syntaksen din ser heller ikke ut til å være så gal.
http://www.netfilter.org/documentation/HOWTO/netfilter-extensions-HOWTO-3.html3.3 iplimit patch
This patch by Gerd Knorr <kraxel@bytesex.org> adds a new match that will allow you to restrict the number of parallel TCP connections from a particular host or network.
For example, let's limit the number of parallel HTTP connections made by a single IP address to 4 :
# iptables -A INPUT -p tcp --syn --dport http -m iplimit --iplimit-above 4 -j REJECT
# iptables --list
Chain INPUT (policy ACCEPT)
target prot opt source destination
REJECT tcp -- anywhere anywhere tcp dpt:http flags:SYN,RST,ACK/SYN #conn/32 > 4 reject-with icmp-port-unreachable
Or you might want to limit the number of parallel connections made by a whole class A for example :
# iptables -A INPUT -p tcp --syn --dport http -m iplimit --iplimit-mask 8 --iplimit-above 4 -j REJECT
# iptables --list
Chain INPUT (policy ACCEPT)
target prot opt source destination
REJECT tcp -- anywhere anywhere tcp dpt:http flags:SYN,RST,ACK/SYN #conn/8 > 4 reject-with icmp-port-unreachable
Supported options for the iplimit patch are :
[!] --iplimit-above n
-> match if the number of existing tcp connections is (not) above n
--iplimit-mask n
-> group hosts using mask