The document contains firewall configuration rules that block common ports used by viruses and worms, drop traffic from known attackers and port scanners, and add offending sources to block lists. Rules are defined for the "virus" and "input" chains to block ports used by Blaster, Sasser, MyDoom, and other malware. Additional rules add sources to block lists if they trigger specific conditions like too many login attempts or port scanning patterns, and traffic from lists is subsequently dropped.