5
Cisco RV132W ADSL2+ Wireless-N  and RV134W VDSL2 Wireless-AC VPN Router Administration Guide 85
 
Firewall
You can secure your network by creating and applying the rules that the device 
uses to selectively block and allow inbound and outbound Internet traffic. You can 
then specify how and to what devices the rules apply. To do so, you must define 
the following:
• Services or traffic types that the router should allow or block. For example, 
web browsing, VoIP, other standard and custom services that you define.
• Direction of traffic by specifying the source and destination; this is done by 
specifying the From Zone (LAN/WAN/DMZ) and To Zone (LAN/WAN/DMZ).
• Schedules as to when the router should apply the rules.
• Keywords (in a domain name or URL of a web page) that the router should 
allow or block.
• Rules for allowing or blocking inbound and outbound Internet traffic for 
specified services on specified schedules.
• MAC addresses of devices whose inbound access to your network the 
router should block.
• Port triggers that signal the router to allow or block access to specified 
services as defined by a port number.
• Reports and alerts that you want the router to send to you.
You can, for example, establish restricted-access policies based on the time-of-
day, web addresses, and web address keywords. You can block Internet access 
by applications and services on the LAN, such as chat rooms or games. You can 
block specific groups of PCs on your network from being accessed by the WAN 
or public DMZ network.