Depends on "bypass" definition. HW firewall has not process-dependent filtering, so any program can bypass it if its traffic fits HW FW rules. But I don't think it is possible to bypass HW FW rules.
This sentence doesn't really make sense, if you've bypassed it you've discovered an open port and somehow managed to get it to accept your data. Good luck with that!
I was asking if it was POSSIBLE to bypass the hardware firewall since you can't find any open ports without bypassing it.
That's actually not how it goes. If you want to learn a bit more on networking and firewalls, this tutorial did it for me, at least got me started really well: http://www.urs2.net/rsj/computing/kerio/index.html Do the PRELIMINARIES, ie, read up on the terms listed there. It's a Kerio 2.1.5 tutorial, but the sequence - learning networking concepts - tweaking kerio - observing and answering firewall prompts for browsers, IM clients, P2P etc. provided me a good overview of it all, without needing to be an expert (you don't become one either, note).