Configuring the Firewall
Configuring Attack Prevention
Cisco RV180/RV180W Administration Guide 83
4
 
STEP  8 If you are configuring an outbound firewall access rule:
a. In the Destination IP field, configure the IP address to which the firewall rule 
applies:
• Any—The rule applies to traffic going to any IP address.
• Single Address—The rule applies to traffic going to a single IP address. 
Enter the address in the Start field.
• Address Range—The rule applies to traffic going to an IP address located in 
a range of addresses. Enter the starting IP address in the Start field, and the 
ending IP address in the Finish field.
b. You can configure Secure Network Address Translation (SNAT) to map a public 
IP address (your Dedicated WAN address, Optional WAN address, or another 
address) to an IP address on your private network. Under Use This SNAT IP 
Address, check Enable and enter the SNAT IP Address.
c. Under Rule Status, choose Enabled or Disabled. You may want to configure a 
rule and choose Disabled if you want to enable it at a later time.
Configuring Attack Prevention
Attacks are malicious security breaches or unintentional network issues that 
render the Cisco RV180/RV180W unusable. Attack prevention allows you to 
manage WAN security threats such as continual ping requests and discovery via 
ARP scans. TCP and UDP flood attack prevention can be enabled to manage 
extreme usage of WAN resources. 
As well, certain Denial-of-Service (DoS) attacks can be blocked. These attacks, if 
uninhibited, can use up processing power and bandwidth and prevent regular 
network services from running normally. ICMP packet flooding, SYN traffic 
flooding, and Echo storm thresholds can be configured to temporarily suspend 
traffic from the offending source. 
To configure attack prevention:
STEP 1 Choose Firewall > Attack Prevention.