Solved

RV042 "Firewall" function / settings

Posted on 2013-12-18
2
369 Views
Last Modified: 2014-01-06
I'm using an RV042 as a sort of internet gateway router for strictly a range of public IP addresses.  It interfaces with a fiber internet feed, somewhat like a modem, providing the path for all the other public internet addresses we're assigned by our ISP.  This is in Router mode so no NAT.

We have 3 VPN devices that are managed by 3rd parties; each with their own public IP address.

I find that if I Enable the RV042 firewall, the 3rd party managers cannot access their VPN device that's at our site.  This is true even if most of the firewall functions are disabled.

I've attached a screen shot of the firewall settings when they are Disabled.  If I change *nothing* else but simply Enable the firewall top setting, the 3rd party managers cannot access their VPN device downstream.

The documentation for the RV042 in this regard is pretty thin.  I'm hoping that someone who *knows* how it works or what is happening might shed some light.
12-18-2013-3-56-50-PM.jpg
0
Comment
Question by:Fred Marshall
2 Comments
 
LVL 3

Accepted Solution

by:
vyaradaikin earned 500 total points
ID: 39728467
Hi! If you are using firewall you need to know what to restrict and what to permit. You need to configure access rules to grant vpn access inside the firewall. To do that firstly figure out what tcp/udp ports are used for vpn and then configure access rules.
0
 
LVL 25

Author Closing Comment

by:Fred Marshall
ID: 39761276
Not an expected answer but I will pursue it.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question