Understanding Check Point Firewall Part 1