Click the minimal arrow button (one) on the best facet with the column titles or appropriate mouse click on the route listing.The main rule accepts packets from previously recognized connections, assuming They are really Secure to not overload the CPU. The second rule drops any packet that connection tracking identifies as invalid. Following that,