User's Manual
Table Of Contents
- Introduction
- LAN Ethernet Interfaces
- Wireless Access Point (Cisco RV180W)
- Firewall and VPN Client Access
- Wireless Distribution System (Cisco RV180W)
- Virtual Networks
- Wireless Security (Cisco RV180W)
- Quality of Service (Cisco RV180W)
- Configuration and Administration
- Front Panel
- Back Panel
- Front Panel
- Back Panel
- Installation Guidelines
- Wall Mounting
- Configuring Networking
- Configuring the IPv4 WAN (Internet)
- Configuring PPPoE Profiles
- Configuring IPv4 LAN (Local Network) Settings
- Configuring Virtual LAN (VLAN) Membership
- Configuring Multiple VLAN Subnets
- Configuring Static DHCP
- Configuring Advanced DHCP Settings
- Viewing DHCP Leased Clients
- Configuring RSTP (Cisco RV180W)
- Configuring Jumbo Frames
- Choosing the Routing Mode
- Viewing Routing Information
- Configuring Static Routes
- Configuring Dynamic Routing
- Configuring the IP Mode
- Configuring IPv6 WAN Settings
- Configuring IPv6 LAN Properties
- Configuring IPv6 Routing
- Configuring Tunneling
- Configuring Router Advertisement
- Configuring the Wireless Network (Cisco RV180W)
- Wireless Security Tips
- General Network Security Guidelines
- Enabling Rogue AP Detection
- Authorizing a Rogue AP
- Adding and Editing Authorized APs
- Configuring the Firewall
- Creating an Access Rule
- Adding a Port Triggering Rule
- Adding a Port Forwarding Configuration
- Configuring One-to-One Network Address Translation (NAT)
- Configuring MAC Address Filtering
- Configuring IP/MAC Address Binding
- Creating Custom Services
- Creating Firewall Schedules
- Configuring Sessions
- Configuring Internet Group Management Protocol (IGMP)
- Configuring LAN (Local Network) Groups
- Enabling Session Initiation Protocol Application-Level Gateway (SIP ALG)
- Configuring Virtual Private Networks (VPNs) and Security
- Creating Cisco QuickVPN Client Users
- Configuring a Basic VPN
- Configuring Advanced VPN Parameters
- Configuring VPN Clients
- Monitoring VPN Tunnel Status
- Configuring VPN Users
- Configuring VPN Passthrough
- Using SSL Certificates for Authentication
- Using the Cisco RV180/RV180W With a RADIUS Server
- Configuring 802.1x Port-Based Authentication
- Configuring Quality of Service (QoS)
- Administering Your Cisco RV180/RV180W
- Configuring Web Access
- Configuring User Accounts
- Setting the Session Timeout Value
- Configuring SNMP
- Configuring Additional SNMP Information
- Configuring Logging Policies
- Configuring Firewall Logs
- Configuring Remote Logging
- Configuring Bonjour
- Configuring UPnP
- Viewing the Cisco RV180/RV180W Status
- Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista
- Installing from the CD-ROM
- Downloading and Installing from the Internet
- Where to Go From Here
Configuring the Firewall
Configuring Access Rules
Cisco RV180/RV180W Administration Guide 76
4
DRAFT - CISCO CONFIDENTIAL
Configuring Access Rules
Configure access rules to control traffic to and from your network. To configure
access rules, choose Firewall > Access Rules. All configured firewall rules on the
Cisco RV180/RV180W are displayed in the Access Rule Table.
Configuring the Default Outbound Policy
You can configure the default outbound policy for the traffic that is directed from
your secure network (LAN) to the Internet. The default
inbound
policy for traffic
flowing from the Internet to your LAN is always blocked and cannot be changed.
The
default outbound policy
applies to traffic that is not covered by the specific
firewall rules that you have configured. For example, you may have specific
firewall rules restricting outbound instant messaging and video traffic, but all other
traffic would be permitted if you choose allow as the default outbound policy.
To configure the default outbound policy:
STEP 1 Choose Firewall > Access Rules.
STEP 2 Under Default Outbound Policy, choose Allow or Block. Allow permits traffic from
your LAN to the Internet. Block does not permit traffic from your LAN to the
Internet.
STEP 3 Click Save.
Using the Access Rules Table
In the Access Rules table, you can add, edit, enable, disable, and delete access
rules. Check the box next to the rule on which you want to perform the action, then
select the action from the buttons below the table.
You may want to reorder the access rules you have created to change the priority
of a rule. To reorder access rules:
STEP 1 Click Reorder.
STEP 2 In the Access Rule Table, check the rule that you want to move, and click the Up or
Down arrow to move it up or down the list.
STEP 3 Click Save.