Page 71 / 163 Scroll up to view Page 66 - 70
Configuring the Wireless Network
Configuring Wi-Fi Protected Setup
Cisco RV120W Administration Guide
62
3
environment. This function boosts the Cisco RV120W’s ability to catch all wireless
transmissions but severely decreases performance.
STEP
8
The Short Retry Limit and Long Retry Limit fields determine the number of times
the Cisco RV120W will reattempt a frame transmission that fails. The limit applies
to both long and short frames of a size less than or equal to the RTS threshold.
STEP
9
Click Save.
Configuring Wi-Fi Protected Setup
You can configure Wi-Fi Protected Setup (WPS) on the Cisco RV120W to allow
WPS-enabled devices to more easily connect to the wireless network.
STEP 1
Choose Wireless > WPS.
STEP
2
In the VAP field, select the wireless network on which you want to enable WPS.
The network must use WPA, WPA2, or WPA+WPA2 security.
NOTE
You can enable WPS on only one of the four networks, or virtual access points.
STEP
3
Under WPS Status, choose Enable to allow WPS configuration. By default, WPS is
disabled.
STEP
4
Click Save.
Page 72 / 163
Configuring the Wireless Network
Configuring a Wireless Distribution System (WDS)
Cisco RV120W Administration Guide
63
3
To set up a WPS-enabled device in the network:
STEP 1
Choose Wireless > WPS.
STEP
2
Choose the WPS setup method:
Setup Using a PIN—In the WPS Setup Method section, in the Station PIN
field, enter the personal identification number (PIN) of the device you want
to connect to the network. You must log in to that device to obtain its WPS
PIN. Then click Configure via PIN. After clicking this button on the Cisco
RV120W, on the WPS-enabled device, select the necessary option to begin
WPS. The device should begin communication with the Cisco RV120W.
Setup Using a WPS Button—If the device you want to connect has a WPS
button, push the button on the device. Then, on the Cisco RV120W, click
Configure via PBC (push button configuration).
Configuring a Wireless Distribution System (WDS)
A Wireless Distribution System (WDS) is a system that enables the wireless
interconnection of access points in a network. It allows a wireless network to be
expanded using multiple access points without the need for a wired backbone to
link them.
WDS peers are other access points in the network connected in the WDS. All
base stations in a WDS must be configured to use the same radio channel, method
of encryption (none, WEP, or WPA) and encryption keys.
To configure a WDS:
STEP 1
Choose Wireless > WDS.
STEP
2
Check the Enable box to enable WDS in the Cisco RV120W.
STEP
3
Enter a WPA Key (password) for authentication.
STEP
4
Click Save.
Page 73 / 163
Configuring the Wireless Network
Configuring a Wireless Distribution System (WDS)
Cisco RV120W Administration Guide
64
3
You can manually add WDS peers that can connect to the Cisco RV120W:
STEP 1
In the WDS Peer Table, click Add.
STEP
2
Enter the MAC (hardware) address of the WDS peer and click Save.
Page 74 / 163
4
Cisco RV120W Administration Guide
65
Configuring the Firewall
This chapter contains information about configuring the firewall properties of the
Cisco RV120W and includes the following sections:
Cisco RV120W Firewall Features, page 65
Configuring Access Rules, page 67
Configuring Attack Prevention, page 71
Configuring Content Filtering, page 72
Configuring URL Blocking, page 74
Configuring Port Triggering, page 75
Configuring Port Forwarding, page 76
Configuring a DMZ Host, page 80
Configuring Advanced Firewall Settings, page 80
Firewall Configuration Examples, page 87
Cisco RV120W Firewall Features
You can secure your network by creating and applying access rules that the
Cisco RV120W uses to selectively block and allow inbound and outbound Internet
traffic. You then specify how and to what devices the rules apply. You can
configure the following:
Services or traffic types (examples: web browsing, VoIP, other standard
services and also custom services that you define) that the router should
allow or block.
Rules for outbound (from your LAN to the Internet) or inbound (from the
Internet to your LAN) traffic.
Page 75 / 163
Configuring the Firewall
Cisco RV120W Firewall Features
Cisco RV120W Administration Guide
66
4
Schedules as to when the router should apply rules.
Keywords (in a domain name or on a URL of a web page) that the router
should allow or block.
MAC addresses of devices whose inbound access to your network the
router should block.
Port triggers that signal the router to allow or block access to specified
services as defined by port number.
Reports and alerts that you want the router to send to you.
You can, for example, establish restricted-access policies based on time-of-day,
web addresses, and web address keywords. You can block Internet access by
applications and services on the LAN, such as chat rooms or games. You can block
just certain groups of PCs on your network from being accessed by the WAN or
public network.
Inbound (Internet to LAN) rules restrict access to traffic entering your network,
selectively allowing only specific outside users to access specific local resources.
By default, all access from the insecure WAN side is blocked from accessing the
secure LAN, except in response to requests from the LAN or DMZ. To allow
outside devices to access services on the secure LAN, you must create a firewall
rule for each service.
If you want to allow incoming traffic, you must make the router's WAN port IP
address known to the public. This is called “exposing your host.” How you make
your address known depends on how the WAN ports are configured; for the
Cisco RV120W, you may use the IP address if a static address is assigned to the
WAN port, or if your WAN address is dynamic, a DDNS (Dynamic DNS) name can
be used.
Outbound (LAN to Internet) rules restrict access to traffic leaving your network,
selectively allowing only specific local users to access specific outside resources.
The default outbound rule is to allow access from the secure zone (LAN) to the
insecure WAN. To block hosts on the secure LAN from accessing services on the
outside (insecure WAN), you must create a firewall rule for each service.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top