Validation of policy ensures that the defined policy has no configuration conflicts, and that various security devices such as the PIX Firewall do not conflict with each other.

Leaving a hole in network security will invite hackers to access the network.