is creating zone based firewall, so you don't assign firewall rules to an interface.
Normally , you allow traffic from zone1 -> zone2, and return traffic is automatically allowed (with established/related rule)
So you only need to allow initial packet
I see ftp is involved, this really complicates matters.
http://slacksite.com/other/ftp.html
Note in active mode ,the connection on port 20 is setup from server to client !!
For standard ftp, the ER listens in on port21 conversation, and automatically opens required ports (for active and passive mode)
However, for secure ftp, ER can't, and you have to make messy manual rules yourself. Per flow, you only need to allow initial packet