It is possible to use security policies based on 'any' interface. However, for better granularity and stricter security, explicit interfaces are recommended. However, fundamental transfer mechanisms are arranged independently, regardless the processing of the previous request, which is the reason why the context between packets disappears. Oc