| I just can't imagine how you could effectively use different access strategies to a single region. Handling different combinations in order to produce a consistent result would be very hard (if technically possible at all), and it would be a nightmare to test it properly. I agree, though, that silently ignoring the access type on second access is not ideal, it should fail or at least log a warning. |