Configuring the Firewall
Configuring Basic Firewall Settings
Configuring Basic Firewall Settings
STEP 1
STEP 2
Cisco RV220W Administration Guide
To configure basic firewall settings, choose Firewall > Basic Settings. You can
configure the following firewall settings.
•
Protecting from Attacks, page 80
•
Configuring Universal Plug and Play, page 81
•
Enabling Session Initiation Protocol Application-Level Gateway, page 83
•
Configuring the Default Outbound Policy, page 83
Protecting from Attacks
Attacks are malicious security breaches or unintentional network issues that
render the Cisco RV220W unusable. Attack checks allow you to manage WAN
security threats such as continual ping requests and discovery via ARP scans.
TCP and UDP flood attack checks can be enabled to manage extreme usage of
WAN resources.
As well, certain Denial-of-Service (DoS) attacks can be blocked. These attacks, if
uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect
traffic from the offending source.
To protect your network from attacks:
Choose Firewall > Basic Settings > Attack Checks.
Check the boxes to enable the following functions:
WAN Security
•
Respond to Ping on the Internet—To configure the Cisco RV220W to allow
a response to an Internet Control Message Protocol (ICMP) Echo (ping)
request on the WAN interface, check the Enable box. This setting is used as
a diagnostic tool for connectivity problems. Not enabled by default.
•
Stealth Mode—If Stealth Mode is enabled, the router will not respond to
port scans from the WAN. This feature makes the network less susceptible
to discovery and attacks. Enabled by default.
4
80