Cisco Systems RV130W Network Router User Manual


 
Configuring the Firewall
Configuring Basic Firewall Settings
Cisco RV130/130W Wireless Multifunction VPN Router Administration Guide 83
5
Inbound (WAN to LAN/DMZ) rules restrict access to traffic entering your network,
selectively allowing only specific outside users to access specific local resources.
By default, all access from the insecure WAN side is blocked from accessing the
secure LAN, except in response to requests from the LAN or DMZ. To allow
outside devices to access services on the secure LAN, you must create a firewall
rule for each service.
If you want to allow incoming traffic, you must make the router's WAN port IP
address known to the public. This is called “exposing your host.” How you make
your address known depends on how the WAN ports are configured; for the
device, you may use the IP address if a static address is assigned to the WAN port,
or if your WAN address is dynamic, a DDNS (Dynamic DNS) name can be used.
Outbound (LAN/DMZ to WAN) rules restrict access to traffic leaving your network,
selectively allowing only specific local users to access specific outside resources.
The default outbound rule is to allow access from the secure zone (LAN) to either
the public DMZ or insecure WAN. To block hosts on the secure LAN from
accessing services on the outside (insecure WAN), you must create a firewall rule
for each service.
Configuring Basic Firewall Settings
To configure basic firewall settings:
STEP 1 Choose Firewall > Basic Settings.
STEP 2 Configure the following firewall settings:
IP Address Spoofing
Protection
To protect your network against IP address
spoofing, check the Enable check box.
DoS Protection Check Enable to enable Denial of Service
protection.
Block WAN Request Blocks ping requests to the device from the WAN.
LAN/VPN Web Access Choose the type of web access that can be used
to connect to the firewall: HTTP or HTTPS (secure
HTTP).