Allow Established TCP Connections on 135
Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local ports in
{135} and remote port is in {0-65535}.
Apply for packets of existing connections.
Don't log when packet matches rule.
Advanced: Discard packets that have following bytes <empty> with mask
<empty> at offset 0.
Deny TCP packets on 135
Deny TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in
{135} and remote port is in {0-65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Discard packets that have following bytes <empty> with mask
<empty> at offset 0.
TCP healthy traffic Monitor
Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in
{0-65535} and remote port is in {0-65535}.
Apply for connection initiation and existing connection packets.
Don't log when packet matches rule.
Advanced: Select packets that have following bytes <empty> with mask
<empty> at offset 0.
Discard TCP traffic
Deny TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in
{0-65535} and remote port is in {0-65535}.
Apply for all packets.
Don't log when packet matches rule.
Advanced: Select packets that have following bytes <empty> with mask
<empty> at offset 0.
Monitor established TCP traffic
Allow TCP packets from address 0.0.0.0 with mask 0.0.0.0 if local port is in
{0-65535} and remote port is in {0-65535}.
Apply for packets of existing connections.
Don't log when packet matches rule.
Advanced: Select packets that have following bytes <empty> with mask
<empty> at offset 0.