Cisco Small Business RV 120W Wireless-N VPN Firewall ...

Cisco Small Business RV 120W Wireless-N VPN Firewall ... Cisco Small Business RV 120W Wireless-N VPN Firewall ...

ipland.com.ua
from ipland.com.ua More from this publisher
12.07.2015 Views

Configuring the FirewallFirewall Configuration Examples4Example 3: Multi-NAT ConfigurationIn this example, you want to configure multi-NAT to support multiple public IPaddresses on one WAN port interface.Create an inbound rule that configures the firewall to host an additional public IPaddress. Associate this address with a web server on the DMZ. If you arrange withyour ISP to have more than one public IP address for your use, you can use theadditional public IP addresses to map to servers on your LAN. One of these publicIP addresses is used as the primary IP address of the router. This address is usedto provide Internet access to your LAN PCs through NAT. The other addresses areavailable to map to your DMZ servers.The following addressing scheme is used to illustrate this procedure:• WAN IP address: 10.1.0.118• LAN IP address: 192.168.1.1; subnet 255.255.255.0• Web server PC in the DMZ, IP address: 192.168.1.2• Access to Web server: (simulated) public IP address 10.1.0.52ParameterConnection TypeActionServiceSource IPValueInboundAlways AllowHTTPSingle AddressStart 10.1.0.52Send to Local Server (DNAT IP)Rule Status192.168.1.2 (local IP address of your web server)EnabledCisco RV120W Administration Guide 89

Configuring the FirewallFirewall Configuration Examples4Example 4: Block traffic by schedule if generated from specific range ofmachinesIn this example, you want to block all HTTP traffic on the weekends if the requestoriginates from a specific group of machines in the LAN having a known range ofIP addresses, and anyone coming in through the Network from the WAN (i.e. allremote users).STEP 1STEP 2STEP 3STEP 4STEP 5STEP 6STEP 7Setup a schedule. Choose Firewall > Advanced Settings > Schedules.Click Add.Enter the schedule name (for example, “Weekend”).Under Time, check All Day.Under Repeat, leave Everyday unchecked.Check Saturday and Sunday.Click Save.Create an outbound access rule with the following parameters:ParameterConnection TypeActionScheduleServiceSource IPStartFinishDestination IPRule StatusValueOutboundBlock by ScheduleWeekendHTTPAddress Rangestarting IP addressending IP addressAnyEnabledCisco RV120W Administration Guide 90

Configuring the <strong>Firewall</strong><strong>Firewall</strong> Configuration Examples4Example 3: Multi-NAT ConfigurationIn this example, you want to configure multi-NAT to support multiple public IPaddresses on one WAN port interface.Create an inbound rule that configures the firewall to host an additional public IPaddress. Associate this address with a web server on the DMZ. If you arrange withyour ISP to have more than one public IP address for your use, you can use theadditional public IP addresses to map to servers on your LAN. One of these publicIP addresses is used as the primary IP address of the router. This address is usedto provide Internet access to your LAN PCs through NAT. The other addresses areavailable to map to your DMZ servers.The following addressing scheme is used to illustrate this procedure:• WAN IP address: 10.1.0.118• LAN IP address: 192.168.1.1; subnet 255.255.255.0• Web server PC in the DMZ, IP address: 192.168.1.2• Access to Web server: (simulated) public IP address 10.1.0.52ParameterConnection TypeActionServiceSource IPValueInboundAlways AllowHTTPSingle AddressStart 10.1.0.52Send to Local Server (DNAT IP)Rule Status192.168.1.2 (local IP address of your web server)Enabled<strong>Cisco</strong> <strong>RV</strong><strong>120W</strong> Administration Guide 89

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!