1. Home
  2. Docs
  3. Flashstart
  4. Router Guides
  5. Cisco

Cisco

CONFIGURE THE FILTER ON CISCO DEVICES

To activate Content Filter Cloud with Cisco devices follow these steps:

Register for free, if you aren’t yet, by visiting this link: Click here to register.
Connect to the dashboard by entering the IP address of the Cisco in your browser. Then type login credentials.

First of all you need to change the DNSs of the device. To do that click on the [Setup] menu and then open the [Network] submenu.

At this point check the WAN Settings Table section and select your WAN interface. Click the [Edit] button to modify it.



In the windows that appears, enable the Use the Following DNS Server Address voice and type the following IPs respectively in the fields DNS Server 1 and DNS Server 2:
– 185.236.104.104
– 185.236.105.105

Click the ‘Save’ button to apply the changes.


To configure the Dynamic DNS service, open the [Setup] menu and then click on the [Dynamic DNS] entry.

Select your WAN interface and click the [Edit] button.



Configure the service in this way:
– Service: Select DynDNS.org.
– Username: Type the Content Filter email/username.
– Password: Type the Content Filter password.
– Host Name: Enter ddns.flashstart.com.

Then click on the [Save] button to save the changes.



After that you can enable the DHCP Server to automatically distribute our DNS on internal network devices.
Open the [DHCP] menu and then click on [DHCP Setup] submenu.
Configure the service with your network parameters and choose the Use DNS as Below entry, in the DNS Server field, to configure our DNSs.
Enter the following IPs respectively in the fields Static DNS 1 and Static DNS 2:
– 185.236.104.104
– 185.236.105.105

Click [Save] to run the service.



Otherwise you can manually change DNS of various devices that you want to filter.

OPTIONAL: DENY USER DNS CHANGES

You can enforce security avoiding user DNS changes. To do that you can proceed in this way:
Open the [Firewall] menu and click on the [Access Rules] entry. Click [Add] to create a new rule.


Now you need to configure a rule to block all traffic on port 53 (DNS Service), except Content Filter DNS Servers. To do that, fill in the fields as follows:
– Action: Choose Allow.
– Services: Choose DNS[UDP/53~53].
– Log: Choose if you want, or not, log the traffics for this rule.
– Souce Interface: Choose the name of your LAN (internal) interface.
– Source IP: Leave ANYNB: You can also choose a range of IP that will use this rule instead of ANY.
– Destination IP: Select Single and add the Public IP 185.236.104.104.
– Time: Leave Always.

Then click the [Save] button to create the rule.


Now you need to create another rule, equal to the previous one, except for the Destination IP field that must be 185.236.105.105.
The last thing to do is create a new rule as follows:
– Action: Choose Deny.
– Services: Choose DNS[UDP/53~53].
– Log: Choose if you want, or not, log the traffics for this rule.
– Souce Interface: Choose the name of your LAN (internal) interface.
– Source IP: Leave ANYNB: You can also choose a range of IP that will use this rule instead of ANY.
– Destination IP: Select ANY.
– Time: Leave Always.

Click the [Save] button to apply the changes.

 
Was this article helpful to you? Yes No

How can we help?