
Configuring the Firewall
Configuring Access Rules
Cisco RV215W Wireless-N VPN Firewall Administration Guide 93
8
• Secure Hypertext Transfer Protocol (HTTPS)
• Trivial File Transfer Protocol (TFTP)
• Internet Message Access Protocol (IMAP)
• Network News Transport Protocol (NNTP)
• Post Office Protocol (POP3)
• Simple Network Management Protocol (SNMP)
• Simple Mail Transfer Protocol (SMTP)
• Te l n e t
• STRMWORKS
• Terminal Access Controller Access-Control System (TACACS)
• Telnet (command)
• Te l n e t S e c o n d a r y
• Telnet SSL
• Voice (SIP)
STEP 6 (Optional) Click Configure Services to go to the Service Management page to
configure the services before applying access rules to them.
See Configuring Services Management for more information.
STEP 7 In the Source IP field, select the users to which the firewall rule applies:
• Any—The rule applies to traffic originating on any host in the local network.
• Single Address—The rule applies to traffic originating on a single IP address
in the local network. Enter the address in the Start field.
• Address Range—The rule applies to traffic originating from an IP address
located in a range of addresses. Enter the starting IP address in the Start
field, and the ending IP address in the Finish field.