Configuring the Firewall
Configuring Attack Prevention
STEP 8
Configuring Attack Prevention
STEP 1
Cisco RV180/RV180W Administration Guide
If you are configuring an outbound firewall access rule:
a. In the Destination IP field, configure the IP address to which the firewall rule
applies:
•
Any—The rule applies to traffic going to any IP address.
•
Single Address—The rule applies to traffic going to a single IP address.
Enter the address in the Start field.
•
Address Range—The rule applies to traffic going to an IP address located in
a range of addresses. Enter the starting IP address in the Start field, and the
ending IP address in the Finish field.
b. You can configure Secure Network Address Translation (SNAT) to map a public
IP address (your Dedicated WAN address, Optional WAN address, or another
address) to an IP address on your private network. Under Use This SNAT IP
Address, check Enable and enter the SNAT IP Address.
c. Under Rule Status, choose Enabled or Disabled. You may want to configure a
rule and choose Disabled if you want to enable it at a later time.
Attacks are malicious security breaches or unintentional network issues that
render the Cisco RV180/RV180W unusable. Attack prevention allows you to
manage WAN security threats such as continual ping requests and discovery via
ARP scans. TCP and UDP flood attack prevention can be enabled to manage
extreme usage of WAN resources.
As well, certain Denial-of-Service (DoS) attacks can be blocked. These attacks, if
uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspend
traffic from the offending source.
To configure attack prevention:
Choose Firewall > Attack Prevention.
4
83