Firewall Vulnerability Scanning: Lessons from the SonicWall Breach