User`s guide
Chapter 9 Firewall Screens
LAN-Cell 2 User’s Guide
208
3 Does a rule that allows Internet users access to resources on the LAN create a security
vulnerability? For example, if FTP ports (TCP 20, 21) are allowed from the Internet to
the LAN, Internet users may be able to connect to computers with running FTP servers.
4 Does this rule conflict with any existing rules?