Why do you think this could be a bad idea if there is an Intrusion Detection System deployed to monitor the traffic between point A and B?