This method of attack will always compute the password if it is made up of the character set you have selected to test.
Which is true about the PIX Firewall in the remote site firewall option in the SAFE SMR remote user design environment?