Click the minor arrow button (1) on the proper facet with the column titles or appropriate mouse click on the route list.The initial rule accepts packets from presently set up connections, assuming They're Protected to not overload the CPU. The second rule drops any packet that connection monitoring identifies as invalid. Following that, we build t