"Users are still able to get through the firewall if they are sly enough to use these permitted port numbers for their P2P or other application." . . . .