How to Adjust Settings on a Cisco RV120W VPN Firewall

There are numerous reasons why you’d want to adjust the settings on a Cisco RV120W VPN Firewall. Sometimes, the default settings just don’t work for your needs. In some cases, you might wish to adjust the firewall to allow certain protocols or types of traffic. Maybe you’d like to change the way the device works altogether. Or, you might want to give it a different security profile. Whatever your needs, there’s probably a setting out there that can help you out.

Fortunately, it’s really easy to change these settings. You can do most of it via the web interface that comes with the device. The majority of the settings can also be configured via the CLI. In this article, we’ll cover methods to change the following settings:

Hardware Encryption

One of the first things you’ll most likely want to change is the encryption type used by the firewall. By default, the RV120W uses Advanced Encryption Standard (AES) encryption to protect data that passes through it. If you’re already using a Cisco product for your network connections or VPNs, you might already be familiar with this algorithm. AES is one of the most common encryption algorithms used in encryption/decryption and comes in many different variations (including the standard, CBC, and CCM modes). It is considered to be one of the safest and most secure algorithms available today. If you are interested in learning more, you can read this excellent in-depth technical article about AES and its various modes of use (including those used in the Cisco RV120W).

To change the hardware encryption setting on the device, visit the Settings menu and then navigate to the General section. From here, you can choose between AES and 3DES (Triple Data Encryption Standard) modes. You can also set the key length to either 12, 15, or 20 bytes. 12- and 15-byte keys are generally considered to be strong encryption, while 20-byte keys are weaker and less secure. Finally, you can choose between using the device’s internal flash memory for the AES key or exporting it to external media (such as a SD card or USB). The latter option is generally considered to be more secure, since external media can be easily corrupted or lost. However, if you do choose to use the internal flash memory for the key, you’ll need to perform a full reboot in order to change it. Doing this is extremely simple, however, you’ll have to access the device’s Configuration page in order to complete the process.

Remote Access

The Remote Access settings on a Cisco RV120W VPN Firewall determine who can access the device remotely. By default, the settings are configured to allow anyone with access to the Internet to connect to the device. The best VPNs for remote access are those that are completely transparent. This feature is really helpful if you have a home network and want to connect a few laptops or smartphones to it. In this scenario, you don’t want to limit access to the network, since you might want to connect additional devices at a later date. You can, however, choose to limit access to specific IP addresses or ranges. This way, only specific devices can connect to the network and access its resources. The following table lists the various options that are available:

Remote Access Level

The Remote Access Level setting determines how restricted the device will be when accessed remotely. You have two options here:

  • Password Protected: Enables you to create a login username and password for the VPN.
  • Password Free: Makes the VPN accessible to anyone.

If you choose the first option, you can optionally enter a password for the VPN. This will allow you to limit access to specific devices or IP ranges. To create a new user, visit the Settings menu and then navigate to the General section. From here, you can click on the + icon to enter the User Management page. In the space that follows, you can enter a user name and optionally create a password for the new user. Remember, this information will be saved on the device. Make sure to add a useful description about the user (for example, an administrator) before saving the new entry.

Network Address Translation (NAT)

The NAT settings on a Cisco RV120W VPN Firewall determine whether or not the device will handle IP address translation (IP addressing). As the name would suggest, network address translation is a feature that allows computers to be addressed by the same IP address from multiple devices. Imagine, for example, that you have a server at home that you frequently use and a laptop that you take with you to work. If the laptop connects to the server through the VPN, both devices will have the same IP address (which will be assigned to you by your ISP). Now, if you decide to connect another device (such as a smartphone or tablet), you’ll have to manually configure it to use the same IP address as the other two devices. This can be a hassle if you’re not used to dealing with the extra step. It would be much easier if the server and laptop swapped their addresses with the other two devices whenever they were connected to each other through the VPN. The following table lists the various options that are available:

IP Address Translation

The IP Address Translation settings determine whether or not the VPN Firewall will handle IP address translation. To put it simply, this is a one-stop-shop for limiting the IP address range that can be used by connected devices. By default, the VPN will enable IP address translation for all IPv4 addresses. This feature is usually turned on for Public Switched Telephone Network (PSTN) and local networks in order to provide visitors with a hassle-free experience. If you’re looking for a hassle-free experience while using a VPN, your best bet is to disable this feature. The following table lists the various options that are available:

Remote Login

The Remote Login settings on a Cisco RV120W VPN Firewall determine whether or not the device will allow remote logins. By default, this setting is set to No, which keeps remote logins from occurring. However, you can choose to Allow Remote Logins to provide additional convenience to users. In order to do this, simply choose Yes. The following table lists the various options that are available:

Bandwidth Control

The Bandwidth Control settings on a Cisco RV120W VPN Firewall determine what is and isn’t allowed when it comes to the data that is transmitted through it. By default, the device will allow LAN connections (such as those used for file sharing or data communication between devices on a local network). However, you can limit this behavior by choosing Yes for NodeBandwidthLimit and PathBandwidthLimit. These settings are typically used if you want to ensure that data isn’t stolen or corrupted during transit. Bandwidth control can also be applied to a VPN tunnel, if you choose. This essentially means that the data that is transmitted over the connection will be subject to the same restrictions as any other network traffic. The following table lists the various options that are available:

Node/Path Bandwidth Control

The NodeBandwidthLimit and PathBandwidthLimit options determine what is and isn’t allowed when it comes to the data that is transmitted over a specific networking path or segment. For example, if you have a server at home that you frequently use and a laptop that you take with you to work, you can choose to limit the bandwidth that is consumed by this connection. This is useful if you’re concerned about your ISP throttling or limiting your bandwidth in any way. Keep in mind that you’ll have to restart your router for these settings to take effect.

Firewall Rules

The Firewall Rules settings on a Cisco RV120W VPN Firewall determine which rules will be applied to data that is blocked by the device. You can choose from the following options:

Similar Posts