Example #3 – rule to prevent SYN flood attacks