Does anyone have any examples of custom network analysis rules (advanced section of Access control policy). I have tuned the NA policy based on reassembly and fragmentation but I am trying to imagine a scenario where you would need a custom na rule. ...