Actually those 2 lines are my full set of firewall rules. Just waiting for someone to show how they can be breached before I go for a more complex setup ;-)