Source / Destination / Service
1.TrustedZone ->Outside -> http
2.Trusted Zone ->Outside -> Negate(Service1)
Is there any use on Rule 2?
doesn;t Rule1 in itself permits http and ONLY http? so there wouldn't have
to be Rule2?
Jaime O.
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================