12 configuring content filtering settings, Configuring content filtering settings -52, Configuring content filtering – Motorola AP-51XX User Manual

Page 270

Advertising
background image

AP-51xx Access Point Product Reference Guide

6-52

3.

Click the

Reset VPNs

button to reset active VPNs. Selecting

Reset VPNs

forces

renegotiation of all the Security Associations and keys. Users could notice a slight pause in
network performance.

4.

Reference the

IKE Summary

field to view the following:

5.

Click

Logout

to securely exit the access point applet. A prompt displays confirming the

logout before the applet is closed.

6.12 Configuring Content Filtering Settings

Content filtering allows system administrators to block specific commands and URL extensions from
going out through the access point’s WAN port. Therefore, content filtering affords system
administrators selective control on the content proliferating the network and is a powerful data and
network screening tool. Content filtering allows the blocking of up to 10 files or URL extensions and
allows blocking of specific outbound HTTP, SMTP, and FTP requests.

Life Time

Use the

Life Time

column to view the lifetime associated with a

particular Security Association (SA). Each SA has a finite lifetime
defined. When the lifetime expires, the SA can no longer be used
to protect data traffic. The maximum SA lifetime is 65535 seconds.

Tx Bytes

The

Tx Bytes

column lists the amount of data (in bytes)

transmitted through each configured tunnel.

Rx Bytes

The

Rx Bytes

column lists the amount of data (in bytes) received

through each configured tunnel.

Tunnel Name

Displays the name of each of the tunnels configured to use IKE for
automatic key exchange.

IKE State

Lists the state for each of the tunnels configured to use IKE for
automatic key exchange. When the tunnel is not active, the

IKE

State

field displays

NOT_CONNECTED.

When the tunnel is

active, the

IKE State

field displays

CONNECTED

.

Destination IP

Displays the destination IP address for each tunnel configured to
use IKE for automatic key exchange.

Remaining Life

Lists the remaining life of the current IKE key for each tunnel. When
the remaining life on the IKE key reaches 0, IKE initiates a
negotiation for a new key. IKE keys associated with a renegotiated
tunnel.

Advertising