Firewall IPv4 for the Cisco DPC3914BRouter Sceenshot

Back to the Cisco DPC3914B

Screenshots from

Loading... Skip to content Hi cusadmin   •   Logout   •   Change Password 60% Internet Loading... Wi-Fi Loading... MoCA Loading... DECT Loading... Security Loading... WARNING: Gateway operating in bridge mode! Gateway At a Glance Connection LAN Status WAN Status Local IP Network Wi-Fi MoCA Firewall IPv4 IPv6 Software Hardware System Hardware LAN Wireless Connected Devices Devices Range Extenders Device Control Management Managed Sites Managed Services Managed Devices Reports Advanced Port Forwarding Port Triggering Port Management DMZ NAT Static Routing Dynamic DNS Device Discovery Troubleshooting Logs Diagnostic Tools Reset/Restore Gateway Change Password Gateway > Firewall > IPv4 Manage your firewall settings. Select a firewall option to disable True Static IP , Gateway Smart Packet , Ping on WAN Interface . Select a security level for details. If you're unfamiliar with firewall settings, keep the default security level, Minimum Security (Low). Maxium Security (High): Blocks all applications, including voice applications (such as Gtalk, Skype) and P2P applications, but allows Internet, email, VPN, DNS, and iTunes services. Typical Security (Medium): Blocks P2P applications and pings to the Gateway, but allows all other traffic. Minimum Security (Low): No application or traffic is blocked. (Default setting) Custom security: Block specific services. Firewall Options IPv4 firewall control information Disable Firewall for True Static IP Subnet Only Disable Gateway Smart Packet Detection Disable Ping on WAN Interface Firewall Security Level Maximum Security (High) LAN-to-WAN: Allow as per below. HTTP and HTTPS (TCP port 80, 443) DNS (TCP/UDP port 53) NTP (TCP port 119, 123) email (TCP port 25, 110, 143, 465, 587, 993, 995) VPN (GRE, UDP 500, TCP 1723) iTunes (TCP port 3689) WAN-to-LAN: Block all unrelated traffic and enable IDS. Typical Security (Medium) LAN-to-WAN: Allow all. WAN-to-LAN: Block as per below and enable IDS. IDENT (port 113) ICMP request Peer-to-peer apps: kazaa - (TCP/UDP port 1214) bittorrent - (TCP port 6881-6999) gnutella- (TCP/UDP port 6346) vuze - (TCP port 49152-65534) Minimum Security (Low) LAN-to-WAN: Allow all. WAN-to-LAN: Block as per below and enable IDS IDENT (port 113) Custom Security LAN-to-WAN : Allow all. WAN-to-LAN : IDS Enabled and block as per selections below. Block http (TCP port 80, 443) Block ICMP Block Multicast Block Peer-to-peer applications Block IDENT (port 113) Disable entire firewall •   customerCentral •   User Guide
Home > Screenshots > Cisco > DPC3914B > Firewall IPv4