Understanding Check Point FireWall Part 2