Firewall
Attack Protection Configuration
Cisco RV132W ADSL2+ Wireless-N  and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 100
5
 
To add a port triggering rule:
STEP 1 Select Firewall > Port Range Triggering. 
STEP  2 In the Application field, enter the name of the application for which to configure 
port forwarding.
STEP  3 In the Triggered Range fields, enter the port number or range of port numbers that 
will trigger this rule when a connection request from outgoing traffic is made. If the 
outgoing connection uses only one port, enter the same port number in both 
fields.
STEP  4 In the Forwarded Range fields, enter the port number or range of port numbers 
used by the remote system to respond to the request it receives. If the incoming 
connection uses only one port, then specify the same port number in both fields.
STEP  5 In the Interface drop-down list, select DSL_ATM, DSL_PTM, ETH_WAN, or 
USB_WAN.
STEP  6 In the Enable field, check the Enable box to enable the rule. 
STEP  7 Click Save.
Attack Protection Configuration
Use the Attack Protection page to specify how to protect your network against 
common types of attacks including discovery, flooding, and echo storms. 
STEP 1 Click Firewall > Attack Protection. 
STEP  2 Check the following and enter a numeric range for each: 
• SYN Flood Detect Rate: Enter the maximum number of SYN packets per 
second that will cause the security appliance to determine that a SYN Flood 
Intrusion is occurring. Enter a value from 0 to 10000 SYN packets per second. 
The default value is 128 SYN packets per seconds. A value of zero (0) 
indicates that the SYN Flood Detect feature is disabled. 
• Echo Storm: Enter the number of pings per second that will cause the 
security appliance to determine that an echo storm intrusion event is 
occurring. Enter a value from 0 to 10000 ping packets per second. The 
default value is 100 ping packets per seconds. A value of zero (0) indicates 
that the Echo Storm feature is disabled.