Start Port No. | End Port No. | IP Address | |
1 | All ports | All ports | |
2 |
Oh and just in case you wonder, the only mode of authentication allowed from the outside is private key, so good luck trying to break in!
Start Port No. | End Port No. | IP Address | |
1 | All ports | All ports | |
2 |