Click the little arrow button (1) on the appropriate aspect in the column titles or right mouse click the route checklist.The 1st rule accepts packets from already proven connections, assuming They are really Protected not to overload the CPU. The second rule drops any packet that relationship tracking identifies as invalid. After that, we setup ty