In order for the Security Management Server to install a policy to the Firewall, an explicit rule must be created to allow the server…
Which of the following statements BEST describes Check Point’s Hide Network Address Translation method?