Click on the minor arrow button (1) on the proper side of your column titles or proper mouse click on the route listing.The primary rule accepts packets from already proven connections, assuming They are really Secure not to overload the CPU. The 2nd rule drops any packet that connection tracking identifies as invalid. After that, we build typical