User's Manual

Configuring the Firewall
Configuring Basic Firewall Settings
Cisco RV 120W Administration Guide 76
4
Configuring Basic Firewall Settings
To configure basic firewall settings, choose F
Firewall
> B
Basic Settings
. You can
configure the following:
Protecting from Attacks
Attacks are malicious security breeches or unintentional network issues that
render the Cisco RV 120W unusable. Attack checks allow you to manage WAN
security threats such as continual ping requests and discovery via ARP scans. TCP
and UDP flood attack checks can be enabled to manage extreme usage of WAN
resources.
As well, certain Denial-of-Service (DoS) attacks can be blocked. These attacks, if
uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspect
traffic from the offending source.
STEP 1 Choose F
Firewall
> B
Basic Settings
> A
Attack Checks
.
STEP 2 Check the boxes to enable the following functions:
WAN Security
Respond to Ping on the Internet
To configure the Cisco RV 120W to allow
a response to an Internet Control Message Protocol (ICMP) Echo (ping)
request on the WAN interface, check this box. This setting is used as a
diagnostic tool for connectivity problems. Not enabled by default.
Enable Stealth Mode
—If Stealth Mode is enabled, the router will not
respond to port scans from the WAN. This feature makes the network less
susceptible to discovery and attacks. Enabled by default.
Block TCP Flood
— If this option is enabled, the router will drop all invalid
TCP packets. This feature protects the network from a SYN flood attack.
Enabled by default.
LAN Security
Block UDP Flood
—If this option is enabled, the router will not accept more
than 25 simultaneous, active UDP connections from a single computer on
the LAN. Enabled by default.