Configuring Basic Firewall Settings; Protecting From Attacks - Cisco Small Business RV220W Administration Manual

Wireless-n network security firewall
Hide thumbs Also See for Small Business RV220W:
Table of Contents

Advertisement

Configuring the Firewall

Configuring Basic Firewall Settings

Configuring Basic Firewall Settings
STEP 1
STEP 2
Cisco RV220W Administration Guide
To configure basic firewall settings, choose Firewall > Basic Settings. You can
configure the following firewall settings.
Protecting from Attacks, page 80
Configuring Universal Plug and Play, page 81
Enabling Session Initiation Protocol Application-Level Gateway, page 83
Configuring the Default Outbound Policy, page 83

Protecting from Attacks

Attacks are malicious security breaches or unintentional network issues that
render the Cisco RV220W unusable. Attack checks allow you to manage WAN
security threats such as continual ping requests and discovery via ARP scans.
TCP and UDP flood attack checks can be enabled to manage extreme usage of
WAN resources.
As well, certain Denial-of-Service (DoS) attacks can be blocked. These attacks, if
uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect
traffic from the offending source.
To protect your network from attacks:
Choose Firewall > Basic Settings > Attack Checks.
Check the boxes to enable the following functions:
WAN Security
Respond to Ping on the Internet—To configure the Cisco RV220W to allow
a response to an Internet Control Message Protocol (ICMP) Echo (ping)
request on the WAN interface, check the Enable box. This setting is used as
a diagnostic tool for connectivity problems. Not enabled by default.
Stealth Mode—If Stealth Mode is enabled, the router will not respond to
port scans from the WAN. This feature makes the network less susceptible
to discovery and attacks. Enabled by default.
4
80

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents