Firewall Tab; Figure 6-16: Firewall Basic; Figure 6-17: Internet Access Policy - Linksys RVS4000 User Manual

4-port gigabit security router with vpn business series
Hide thumbs Also See for RVS4000:
Table of Contents

Advertisement

4-Port Gigabit Security Router with VPN

Firewall Tab

From the Firewall Tab, you can configure the Router to deny or allow specific internal users from accessing the
Internet. You can also configure the Router to deny or allow specific Internet users from accessing the internal
servers. You can set up different packet filters for different users that are located on internal (LAN) side or
external (WAN) side based on their IP addresses or their network Port number.
Basic
SPI Firewall Protection: SPI (Stateful Packet Inspection), when enabled this feature will block DoS (Denial of
Service) attacks. A DoS attack does not attempt to steal data or damage your PCs, but overloads your Internet
connection so you can not use it.
Restrict WEB Features
Block. Place a checkmark next to the Web features that you wish to restrict.
• Proxy: If local users have access to WAN proxy servers, they may be able to circumvent the Router's
content filters and access Internet sites blocked by the Router. Denying Proxy will block access to any
WAN proxy servers.
• Cookies: A cookie is data stored on your PC and used by Internet sites when you interact with them, so
you may not want to deny cookies.
• Java Applets: Java is a programming language for websites. If you deny Java, you run the risk of not
having access to Internet sites created using this programming language.
• ActiveX: ActiveX is a Microsoft (Internet Explorer) programming language for websites. If you deny
ActiveX, you run the risk of not having access to Internet sites using this programming language. Also,
Windows Update uses ActiveX, so if this is blocked, Windows update will not work.
Block WAN Request
Block Anonymous Internet Requests. Check this checkbox if you wish to have these filtered out.
Internet Access Policy
Access can be managed by a policy. Use the settings on this screen to establish an access policy. Selecting a
policy from the drop-down menu will display that policy's settings. You can then perform the following
operations:
Chapter 6: Setting Up and Configuring the Router
Firewall Tab

Figure 6-16: Firewall Basic

Figure 6-17: Internet Access Policy

25

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents