EasyManuals Logo
Home>Cisco>Firewall>RV215W

Cisco RV215W Administration Guide

Cisco RV215W
149 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #85 background imageLoading...
Page #85 background image
Configuring the Firewall
Configuring Basic Firewall Settings
Cisco RV215W Wireless-N VPN Firewall Administration Guide 85
8
Rules for allowing or blocking inbound and outbound Internet traffic for
specified services on specified schedules.
MAC addresses of devices whose inbound access to your network the
router should block.
Port triggers that signal the router to allow or block access to specified
services as defined by port number.
Reports and alerts that you want the router to send to you.
You can, for example, establish restricted-access policies based on time-of-day,
web addresses, and web address keywords. You can block Internet access by
applications and services on the LAN, such as chat rooms or games. You can block
only certain groups of PCs on your network from being accessed by the WAN or
public DMZ network.
Inbound (WAN to LAN/DMZ) rules restrict access to traffic entering your network,
selectively allowing only specific outside users to access specific local resources.
By default, all access from the insecure WAN side is blocked from accessing the
secure LAN, except in response to requests from the LAN or DMZ. To allow
outside devices to access services on the secure LAN, you must create a firewall
rule for each service.
If you want to allow incoming traffic, you must make the router's WAN port IP
address known to the public. This is called exposing your host. How you make
your address known depends on how the WAN ports are configured. For your
device, you may use the IP address if a static address is assigned to the WAN port,
or if your WAN address is dynamic, a DDNS (Dynamic DNS) name can be used.
Outbound (LAN/DMZ to WAN) rules restrict access to traffic leaving your network,
selectively allowing only specific local users to access specific outside resources.
The default outbound rule is to allow access from the secure zone (LAN) to either
the public DMZ or insecure WAN. To block hosts on the secure LAN from
accessing services on the outside (insecure WAN), you must create a firewall rule
for each service.
Configuring Basic Firewall Settings
To configure basic firewall settings:
STEP 1 Choose Firewall > Basic Settings.
STEP 2 Configure the following firewall settings:

Table of Contents

Other manuals for Cisco RV215W

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco RV215W and is the answer not in the manual?

Cisco RV215W Specifications

General IconGeneral
VPN support3DES, PPTP, L2TP
Ethernet LANYes
Cabling technology10/100Base-T(X)
Networking standardsIEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.1p, IEEE 802.1Q
VPN tunnels quantity6
Ethernet LAN data rates10, 100 Mbit/s
Ethernet LAN interface typeFast Ethernet
Wi-Fi bandNo
Wi-Fi standards802.11b, 802.11g, Wi-Fi 4 (802.11n)
Top Wi-Fi standardWi-Fi 4 (802.11n)
Ethernet LAN (RJ-45) ports4
Input current1.67 A
Supported protocolsPPPoE, PPTP, L2TP, RSTP, NAT, DynDNS, PAT, DMZ
Security algorithmsWEP, WPA, WPA2, WPS
Antennas quantity2
CertificationFCC Class B, CE, IC, UL, cUL, Wi-Fi, C-Tick
Storage temperature (T-T)-20 - 70 °C
Operating temperature (T-T)0 - 40 °C
Storage relative humidity (H-H)5 - 90 %
Operating relative humidity (H-H)10 - 85 %
Product colorBlack
Weight and Dimensions IconWeight and Dimensions
Width150 mm
Height30 mm
Weight300 g

Related product manuals