I just wasted 3 hours of my life trying to block traffic to unauthorized DNS servers from my RV082
I created rules to block both TCP and UDP port 53 from the LAN side, and created rules to allow traffic to authorized DNS servers (OpenDNS). No matter what I did, workstations could still be set to use other DNS servers and browse the web without issue.
Looking at the router's online Help, I saw this:
Custom rules can be created to override the RV082 default rules, but there are four additional default rules that will be always active, and custom rule can not override the four rules. * HTTP service from LAN side to RV082 is always allowed. * DHCP service from LAN side is always allowed. * DNS service from LAN side is always allowed. * Ping service from LAN side to RV082 is always allowed.
I think I just lost faith in my favorite router. Why in the world would they not allow you to block/restrict DNS traffic?
Anyone aware of a workaround? Cisco was not of any help....
Hello, This article will describe how to configure PPTP VPN on the new
RV340/345 routers from the Small Business series. RV340/345
Configuration The first step is to enable the PPTP Server: Go to VPN ->
PPTP Server Change PPTP Server: from Off to On Selec...
Article ID:5748 Use TheGreenBow VPN Client to Connect with RV34x Series
Router Introduction A Virtual Private Network (VPN) connection allows
users to access, send, and receive data to and from a private network by
means of going through a public or share...
Article ID:5728 Configure a Teleworker VPN Client on the RV34x Series
Router Objective The Teleworker VPN Client feature minimizes the
configuration requirements at remote locations by allowing the device to
work as a Cisco VPN hardware client. When the T...