Click the minor arrow button (one) on the best aspect on the column titles or appropriate mouse click on the route listing.The primary rule accepts packets from presently set up connections, assuming They can be Protected not to overload the CPU. The next rule drops any packet that connection monitoring identifies as invalid. After that, we create