Cisco Systems RV130W Manual De Usuario

Descargar
Página de 141
Configuring the Firewall
Configuring Basic Firewall Settings
Cisco RV130/130W Wireless Multifunction VPN Router Administration Guide
83
5
 
Inbound (WAN to LAN/DMZ) rules restrict access to traffic entering your network, 
selectively allowing only specific outside users to access specific local resources. 
By default, all access from the insecure WAN side is blocked from accessing the 
secure LAN, except in response to requests from the LAN or DMZ. To allow 
outside devices to access services on the secure LAN, you must create a firewall 
rule for each service.
If you want to allow incoming traffic, you must make the router's WAN port IP 
address known to the public. This is called “exposing your host.” How you make 
your address known depends on how the WAN ports are configured; for the 
device, you may use the IP address if a static address is assigned to the WAN port, 
or if your WAN address is dynamic, a DDNS (Dynamic DNS) name can be used.
Outbound (LAN/DMZ to WAN) rules restrict access to traffic leaving your network, 
selectively allowing only specific local users to access specific outside resources. 
The default outbound rule is to allow access from the secure zone (LAN) to either 
the public DMZ or insecure WAN. To block hosts on the secure LAN from 
accessing services on the outside (insecure WAN), you must create a firewall rule 
for each service.
Configuring Basic Firewall Settings
To configure basic firewall settings:
STEP 1
Choose Firewall > Basic Settings
STEP  2
Configure the following firewall settings:
IP Address Spoofing 
Protection
To protect your network against IP address 
spoofing, check the Enable check box.
DoS Protection
Check Enable to enable Denial of Service 
protection.
Block WAN Request
Blocks ping requests to the device from the WAN.
LAN/VPN Web Access
Choose the type of web access that can be used 
to connect to the firewall: HTTP or HTTPS (secure 
HTTP).