The first step to doing that would be to determine what kind of firewall it is, and then seeing if there are any known hacks for it. If done properly, firewalls like this are usually fairly bullet-proof (as far as preventing unauthorized Internet access),
and hacking is made more difficult by the fact that very few firewalls are the same, and there is no way of knowing if or what hacking will effect the firewall.