Be aware that an attacker could be automatically looking for exploitable devices just like z10 that and using that as a jump box into your network.