Configuring the Firewall
Configuring Access Rules
Cisco RV215W Wireless-N VPN Firewall Administration Guide
93
8
•
Secure Hypertext Transfer Protocol (HTTPS)
•
Trivial File Transfer Protocol (TFTP)
•
Internet Message Access Protocol (IMAP)
•
Network News Transport Protocol (NNTP)
•
Post Office Protocol (POP3)
•
Simple Network Management Protocol (SNMP)
•
Simple Mail Transfer Protocol (SMTP)
•
Telnet
•
STRMWORKS
•
Terminal Access Controller Access-Control System (TACACS)
•
Telnet (command)
•
Telnet Secondary
•
Telnet SSL
•
Voice (SIP)
STEP 6
(Optional) Click
Configure Services
to go to the
Service Management
page to
configure the services before applying access rules to them.
See
Configuring Services Management
for more information.
STEP 7
In the
Source IP
field, select the users to which the firewall rule applies:
•
Any
—The rule applies to traffic originating on any host in the local network.
•
Single Address
—The rule applies to traffic originating on a single IP address
in the local network. Enter the address in the
Start
field.
•
Address Range
—The rule applies to traffic originating from an IP address
located in a range of addresses. Enter the starting IP address in the
Start
field, and the ending IP address in the
Finish
field.