Click on the minor arrow button (1) on the best aspect with the column titles or suitable mouse click on the route list.The initial rule accepts packets from presently proven connections, assuming They can be Secure not to overload the CPU. The second rule drops any packet that relationship tracking identifies as invalid. After that, we arrange nor