Configuring Firewall Rules; Creating A Firewall Rule - Cisco Small Business RV220W Administration Manual

Wireless-n network security firewall
Hide thumbs Also See for Small Business RV220W:
Table of Contents

Advertisement

Configuring the Firewall

Configuring Firewall Rules

Configuring Firewall Rules
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
Cisco RV220W Administration Guide
All configured firewall rules on the Cisco RV220W are displayed in the Firewall
Rules list. This list also indicates whether the rule is enabled (active), and gives a
summary of the "from/to" zone as well as the services and users the rule affects.

Creating a Firewall Rule

To create firewall rules:
Choose Firewall > Access Control > IPv4 Rules.
Click Add.
In the From Zone field, choose the source of originating traffic:
Trusted (LAN)—Choose if traffic will originate from the secure LAN.
Untrusted (WAN)—Choose this option to create an inbound rule.
Choose the To Zone to configure the destination of traffic covered by this rule. If
the From Zone is the WAN, the To Zone can be the public DMZ or secure LAN. If
the From Zone is the LAN, then the To Zone can be only the insecure WAN.
Choose the service to allow or block for this rule. Choose Any to allow the rule to
apply to all applications and services, or you can choose a single application to
block:
AIM (AOL Instant Messenger)
BGP (Border Gateway Control)
BOOT_P (Bootstrap Protocol) client
BOOT_P Server
CU-SeeMe (videoconferencing) UDP or TCP
Domain Name System (DNS), UDP or TCP
Finger
File Transfer Protocol (FTP)
Hyptertext Transfer Protocol (HTTP)
Secure Hypertext Transfer Protocol (HTTPS)
4
84

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents