I am experiencing a rather annoying brute force attack on my WAN over the SSH TCP port.
To try to mitigate such a problem I've read this wiki page, second chapter about SSH.
It's not clear to me how those rules can discern from the various SSH handshake stages, especially with the order that's being shown there.
Could anyone provide me with some hint?
TIA.