Source         /   Destination   / Service 
1.TrustedZone ->Outside -> http
2.Trusted Zone ->Outside -> Negate(Service1)

Is there any use on Rule 2?
doesn;t Rule1 in itself permits http and ONLY http? so there wouldn't have
to be Rule2?

Jaime O.









================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to