Configuring the Firewall
Configuring Port Forwarding
Cisco RV 120W Administration Guide 96
4
• STRMWORKS
• Terminal Access Controller Access-Control System (TACACS)
• Telnet (command)
• Trivial File Transfer Protocol (TFTP)
• Routing Information Protocol (RIP)
• IKE
• Simple HTTPD web server
• UDP Encapsulation of IPsec packets (IPSEC-UDP-ENCAP)
• IDENT protocol
• VDOLive (web video delivery)
• SSH
• SIP-TCP
• SIP-UDP
STEP 4 Choose the action:
• Always Block—Always block the selected type of traffic.
• Always Allow—Never block the selected type of traffic.
• Block by schedule, otherwise allow—Blocks the selected type of traffic
according to a schedule. See Creating Firewall Schedules, page 85.
• Allow by schedule, otherwise block—Allows the selected type of traffic
according to a schedule. See Creating Firewall Schedules, page 85.
STEP 5 If you selected block or allow by schedule, choose the schedule.
STEP 6 Select the Source Users:
• Any—Specifies that the rule being created is for traffic from the given
endpoint.
• Single Address—Limit to one host. Requires the IP address of the host to
which this rule would be applied.
• Address Range—This is used to apply this rule to a group of computers/
devices within an IP address range. Requires a from IP address and to IP
address.