Configuring the Firewall
Configuring Firewall Rules
Configuring Firewall Rules
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
Cisco RV220W Administration Guide
All configured firewall rules on the Cisco RV220W are displayed in the Firewall
Rules list. This list also indicates whether the rule is enabled (active), and gives a
summary of the "from/to" zone as well as the services and users the rule affects.
Creating a Firewall Rule
To create firewall rules:
Choose Firewall > Access Control > IPv4 Rules.
Click Add.
In the From Zone field, choose the source of originating traffic:
•
Trusted (LAN)—Choose if traffic will originate from the secure LAN.
•
Untrusted (WAN)—Choose this option to create an inbound rule.
Choose the To Zone to configure the destination of traffic covered by this rule. If
the From Zone is the WAN, the To Zone can be the public DMZ or secure LAN. If
the From Zone is the LAN, then the To Zone can be only the insecure WAN.
Choose the service to allow or block for this rule. Choose Any to allow the rule to
apply to all applications and services, or you can choose a single application to
block:
•
AIM (AOL Instant Messenger)
•
BGP (Border Gateway Control)
•
BOOT_P (Bootstrap Protocol) client
•
BOOT_P Server
•
CU-SeeMe (videoconferencing) UDP or TCP
•
Domain Name System (DNS), UDP or TCP
•
Finger
•
File Transfer Protocol (FTP)
•
Hyptertext Transfer Protocol (HTTP)
•
Secure Hypertext Transfer Protocol (HTTPS)
4
84