By using TCP/20 as a source port it's possible to bypass firewall protection.
vulners.com/securityvulns/securityvulns:doc:3247