User's Manual

Table Of Contents
4
Cisco RV180/RV180W Administration Guide 74
DRAFT - CISCO CONFIDENTIAL
Configuring the Firewall
This chapter contains information about configuring the firewall properties of the
Cisco RV180/RV180W and includes the following sections:
Cisco RV180/RV180W Firewall Features, page 74
Configuring Access Rules, page 76
Configuring Attack Prevention, page 80
Configuring Content Filtering, page 81
Configuring URL Blocking, page 83
Configuring Port Triggering, page 84
Configuring Port Forwarding, page 85
Configuring a DMZ Host, page 89
Configuring Advanced Firewall Settings, page 89
Firewall Configuration Examples, page 97
Cisco RV180/RV180W Firewall Features
You can secure your network by creating and applying access rules that the
Cisco RV180/RV180W uses to selectively block and allow inbound and outbound
Internet traffic. You then specify how and to what devices the rules apply. You can
configure the following:
Services or traffic types (examples: web browsing, VoIP, other standard
services and also custom services that you define) that the router should
allow or block.
Rules for outbound (from your LAN to the Internet) or inbound (from the
Internet to your LAN) traffic.