4 and 5 are redundant—rule 1 covers their actions. They are listed here for illustrative purposes. Next comes the rules governing access to the SMTP server, denial of ping and Telnet access, and access to the HTTP server. If heavy traffic to the HTTP server is expected, move the HTTP server rule closer to the top (for example, into the position of rule 2), which would expedite rule processing for external communications. Rules 8 and 9 are actually unnecessary as the cleanup rule would take care of their tasks. The final rule in Table 6-16 denies any other types of communications. In the outbound rule set (Table 6-17) the first rule allows the firewall, system, or network administrator to access any device, including the firewall. Since this rule is on the outbound side, you do not need to worry about external attackers or spoofers. The next four rules prohibit access to and by the firewall itself, with the remaining rules allowing outbound communications and denying all else. Note the similarities and differences in the two firewalls’ rule sets. The internal filtering router/firewall rule sets, shown in Tables 6-18 and 6-19, have to both protect against traffic to and allow traffic from the internal network (192.168.2.0). Most of the rules in Tables 6-18 and 6-19 are similar to those in Tables 6-16 and 6-17: allowing responses to internal communications; denying communications to and from the firewall itself; and allowing all outbound internal traffic.