Configuring the Firewall
Configuring Content Filtering
Cisco RV180/RV180W Administration Guide 84
4
 
STEP  2 Check the boxes to enable the following functions: 
• WAN (Internet) Security Checks
- Respond to Ping on WAN (Internet)—To configure the Cisco RV180/
RV180W to allow a response to an Internet Control Message Protocol 
(ICMP) Echo (ping) request on the WAN interface, check this box. This 
setting is used as a diagnostic tool for connectivity problems. Not 
enabled by default.
- Stealth Mode—If Stealth Mode is enabled, the router will not respond to 
port scans from the WAN. This feature makes the network less 
susceptible to discovery and attacks. Enabled by default.
- Flood— If this option is enabled, the router will drop all invalid TCP 
packets. This feature protects the network from a SYN flood attack. 
Enabled by default.
• LAN (Local Network) Security Checks
- Block UDP Flood—If this option is enabled, the router will not accept 
more than 500 simultaneous, active UDP connections from a single 
computer on the LAN. Enabled by default.
• ICSA (International Computer Security Association) Settings
- Block Anonymous ICMP Messages—ICSA requires the firewall to silently 
block without sending an ICMP notification to the sender. Some 
protocols, such as MTU Path Discovery, require ICMP notifications. 
Enable this setting to operate in “stealth” mode. Enabled by default.
- Block Fragmented Packets—ICSA requires the firewall to block 
fragmented packets from ANY to ANY. Enabled by default.
- Block Multicast Packets—ICSA requires the firewall to block multicast 
packets. Enabled by default.
STEP  3 Click Save. 
Configuring Content Filtering
The Cisco RV180/RV180W supports several content filtering options. You can 
block certain web applications or components (such as ActiveX or Java). You can 
set up trusted domains from which to always allow content.