I have a Cisco RV110W in Router Mode because I don't want to use NAT.
The WAN side is configured with a static IP address (10.0.0.2). One more PC is connected to this network with address 10.0.0.3
The LAN side uses the default configuration (IP 192.168.1.1) and some PCs are connected.
The firewall is enabled in the Basic Settings page. Default outbound policy is set to "allow". One access rule always allows traffic from WAN to LAN side on port 35101, because there is a TCP server running.
1. Why can I only specify one destination IP and not an IP range. Why is it not possible to allow TCP traffic on one port for all devices on LAN side?
2. The manual says that once the firewall is enabled, all incoming traffic that matches no access rule is blocked by default. I don't see that here. All traffic reaches the destination until I create an access rule that explicitly blocks.
3. Rules for the ICMP protocol do not seem to work. If an access rule for blocking ICMP is enabled, I can reach all devices using ping.
I hope someone has an idea whats wrong with my configuration.
Hi, thank you for using our forum, my name is Luis I am part of the Small business Support community. I am glad to provide the proper answer for your questions.
1.Following the admin guide in page 88 you are able to specify a range of the source that you select in step 3. For example, if you select WAN to LAN in this case the range that you need to specify is the WAN included to the rule and vice versa. That will be the source range. Below you can find the Admin guide link.
2.For this feature you need to select Deny in Default Outbound Policy, so by default the IP address that don´t match to any access rule will be denied. (Don´t forget to save the changes when you change the option).
3.For the ICMP protocol you could create a service in Firewall > Service Management, put a service name and select ICMP protocol, then create an ACL for this protocol.
1. I don't understand this. I have multiple tcp servers on the LAN side listening on port 35001 for connections. They have the IP adresses 192.168.1.10 to 192.168.1.15. I want to allow connections from any WAN IP to each of this servers. Why cant I create an ACL like this: Always allow TCP 35001 from any to any? Or from any to 192.168.1.10-192.168.1.15
I can only create multiple access rules because the drop down menu is disabled and only allows a single IP:
Always allow TCP 35001 from any to 192.168.1.10
Always allow TCP 35001 from any to 192.168.1.11
Always allow TCP 35001 from any to 192.168.1.15
2. The admin guide says:
- "The Access Rules page allows you to configure the default outbound policy.." <- This means LAN to WAN, is that correct? I would like to allow all traffic from LAN to WAN.
- "The default inbound policy for traffic flowing from the non-secure zone to the secure zone is always blocked and cannot be changed." <- WAN to LAN? I want to deny all traffic from the Internet to the local network except one TCP port. My problem was that the default inbound policy does not work with my device.
3. This is exactly what I did, and it does not work.
Hi every one!!!When you are configuring a remote VPN connection, there
are some steps that are lost on the path. Here you can see those steps.
A) In your Cisco device: 1. Ensure you don´t have any rule denying the
traffic between the device and the remote...
** Update **These and a number of other issues have been addressed in
SRP520 MR3. Please see https://supportforums.cisco.com/docs/DOC-13853
for details on how to access this code.There have been a number of
reports of the SRP500 becoming unresponsive afte...
STANDARDSOURCECOMMENTSEthernet RJ-45 connector pin number12345678IEEE
802.3afusing data pairsRXDC+RXDC+TXDC-sparespareTXDC-sparespareIndustry
Standard for Embedded POE(used by Cisco Catalyst Switches)IEEE
802.3afusing spare pairs RXRXTXDC+DC+TXDC-DC-Indus...