Configuring the Firewall
Configuring Attack Prevention
Cisco RV120W Administration Guide
71
4
c. Under Rule Status, choose Enabled or Disabled. You may want to configure a
rule and choose Disabled if you want to enable it at a later time.
Configuring Attack Prevention
Attacks are malicious security breaches or unintentional network issues that
render the Cisco RV120W unusable. Attack prevention allows you to manage WAN
security threats such as continual ping requests and discovery via ARP scans.
TCP and UDP flood attack prevention can be enabled to manage extreme usage
of WAN resources.
As well, certain Denial-of-Service (DoS) attacks can be blocked. These attacks, if
uninhibited, can use up processing power and bandwidth and prevent regular
network services from running normally. ICMP packet flooding, SYN traffic
flooding, and Echo storm thresholds can be configured to temporarily suspend
traffic from the offending source.
To configure attack prevention:
STEP 1
Choose
Firewall
> Attack Prevention.
STEP 2
Check the boxes to enable the following functions:
WAN (Internet) Security Checks
•
Respond to Ping on WAN (Internet)—To configure the Cisco RV120W to
allow a response to an Internet Control Message Protocol (ICMP) Echo
(ping) request on the WAN interface, check this box. This setting is used as
a diagnostic tool for connectivity problems. Not enabled by default.
•
Stealth Mode—If Stealth Mode is enabled, the router will not respond to
port scans from the WAN. This feature makes the network less susceptible
to discovery and attacks. Enabled by default.
•
Flood— If this option is enabled, the router will drop all invalid TCP packets.
This feature protects the network from a SYN flood attack. Enabled by
default.