cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2482
Views
0
Helpful
5
Replies

Limiting web access using an RV110W

wood.mark.d
Level 1
Level 1

Is it possible to set up an RV110W to limit access to only specified websites according to a schedule?

I can block access to specific sites using the Internet Access Policy settings under Firewall, but I can't figure out a successful way to block access to all sites except those specified.  I also tried establishing access rules but that did not work either.

5 Replies 5

Mattinfo31
Level 1
Level 1

Hello


I have a similar problem with a RV120W.

I want to allow access to five sites and block everything else.

Have you found a solution?


Authorized site needed: WindowsUpdate, antivirus, and a site update for a specific application


See you soon

mpyhala
Level 7
Level 7

Hi Mark and Matthieu,

Thank you for posting. The Admin Guide describes how to set this up starting on page 88:

http://www.cisco.com/en/US/docs/routers/csbr/rv110w/administration/guide/rv110w_admin.pdf

I think that you want to look at Step 5: Always Block, which refers to Step 7.

Please keep us updated and let us know if you have any issues.

The Internet Access Policy

worked mediocre for me, It opnly work if I specify the optional client MAC address or IP

BUT it only bliock http pages (port 80), if the client access the blocked site in https (port 443) it allow him to do it.

so I was not able to block Facebook access using the Internet Access Policy

I need to it in the Access Rules, and by this I had to type all the IP address that Facebook use (I just hope they don't add new IP soon)

Mattinfo31
Level 1
Level 1

Hello

Not solution for my customer, not good for the business...

Is realy not possible to block access to url type www.facebook.com or ok to access for windowsupdate ?

Because block IP adresse is not possible for the big site and IP adresse change and move.

Is not possible to block or allow with keyword ?

Sorry for my english ;-)

Regard

Your message is clear:  Blocking by IP address and port are no longer adequate.  We need to be able to block by DNS resolved name/range of IPs which means being able to define rules based on names, not IPs.  Hopefully this will change, hopefully it is cisco that gets there first.