Security 7-213. Select Source IP Address and enter the source IP address thisfilter will match on. You can enter a subnet or a host address.4. Select Source IP Address Mask and enter a mask for the sourceIP address. This allows you to further modify the way the filter willmatch on the source address. Enter 0.0.0.0 to force the filter tomatch on all source IP addresses, or enter 255.255.255.255 tomatch the source IP address exclusively.5. Select Dest. IP Address and enter the destination IP address thisfilter will match on. You can enter a subnet or a host address.6. Select Dest. IP Address Mask and enter a mask for thedestination IP address. This allows you to further modify the waythe filter will match on the destination address. Enter 0.0.0.0 toforce the filter to match on all destination IP addresses.7. Select Protocol Type and enter ICMP, TCP, UDP, Any, or thenumber of another IP transport protocol (see the table onpage 7-12).Note: If Protocol Type is set to TCP or UDP, the settings for portcomparison that you configure in steps 8 and 9 will appear. Thesesettings only take effect if the Protocol Type is TCP or UDP.8. Select Source Port Compare and choose a comparison methodfor the filter to use on a packet’s source port number. Then selectSource Port ID and enter the actual source port number to matchon (see the table on page 7-10).9. Select Dest. Port Compare and choose a comparison method forthe filter to use on a packet’s destination port number. Thenselect Dest. Port ID and enter the actual destination port numberto match on (see the table on page 7-10).10. When you are finished configuring the filter, select ADD THISFILTER NOW to save the filter in the filter set. Select CANCEL todiscard the filter.TCP filter. You can increase security on connections using TCP byfiltering by protocol type and matching established TCP connectionsonly. With this filter attached to an active connection profile, no TCPconnections can be established from outside the firewall, increasingnetwork security.