Click on the minor arrow button (one) on the correct side on the column titles or appropriate mouse click on the route listing.The main rule accepts packets from already proven connections, assuming They can be Protected not to overload the CPU. The next rule drops any packet that link monitoring identifies as invalid. After that, we arrange regula