Configuring the Firewall
Configuring Access Rules
STEP 6
STEP 7
Cisco RV215W Wireless-N VPN Firewall Administration Guide
•
Secure Hypertext Transfer Protocol (HTTPS)
•
Trivial File Transfer Protocol (TFTP)
•
Internet Message Access Protocol (IMAP)
•
Network News Transport Protocol (NNTP)
•
Post Office Protocol (POP3)
•
Simple Network Management Protocol (SNMP)
•
Simple Mail Transfer Protocol (SMTP)
•
Telnet
•
STRMWORKS
•
Terminal Access Controller Access-Control System (TACACS)
•
Telnet (command)
•
Telnet Secondary
•
Telnet SSL
•
Voice (SIP)
(Optional) Click Configure Services to go to the Service Management page to
configure the services before applying access rules to them.
See
Configuring Services Management
In the Source IP field, select the users to which the firewall rule applies:
•
Any—The rule applies to traffic originating on any host in the local network.
•
Single Address—The rule applies to traffic originating on a single IP address
in the local network. Enter the address in the Start field.
•
Address Range—The rule applies to traffic originating from an IP address
located in a range of addresses. Enter the starting IP address in the Start
field, and the ending IP address in the Finish field.
for more information.
8
93