Mac
4
You could possibly create a permit all rule where the destination or source is your internal network. This would have the effect of making everything internal a trusted source but beware, a internal threat would then bypass the firewall (ex: a worm on another PC on the LAN)