Configuring Content Filtering Settings - Motorola AP-7131 Product Reference Manual

Hide thumbs Also See for AP-7131:
Table of Contents

Advertisement

6-52
AP-7131 Access Point Product Reference Guide
Life Time
Tx Bytes
Rx Bytes
3. Click the
renegotiation of all the Security Associations and keys. Users could notice a slight pause in
network performance.
4. Reference the
Tunnel Name
IKE State
Destination IP
Remaining Life
5. Click
Logout
logout before the applet is closed.

6.12 Configuring Content Filtering Settings

Content filtering allows system administrators to block specific commands and URL extensions from
going out through the access point's WAN port. Therefore, content filtering affords system
administrators selective control on the content proliferating the network and is a powerful data and
network screening tool. Content filtering allows the blocking of up to 10 files or URL extensions and
allows blocking of specific outbound HTTP, SMTP, and FTP requests.
Use the
Life Time
particular Security Association (SA). Each SA has a finite lifetime
defined. When the lifetime expires, the SA can no longer be used
to protect data traffic. The maximum SA lifetime is 65535 seconds.
The
Tx Bytes
transmitted through each configured tunnel.
The
Rx Bytes
through each configured tunnel.
Reset VPNs
button to reset active VPNs. Selecting
IKE Summary
field to view the following:
Displays the name of each of the tunnels configured to use IKE for
automatic key exchange.
Lists the state for each of the tunnels configured to use IKE for
automatic key exchange. When the tunnel is not active, the
State
field displays
active, the
Displays the destination IP address for each tunnel configured to
use IKE for automatic key exchange.
Lists the remaining life of the current IKE key for each tunnel. When
the remaining life on the IKE key reaches 0, IKE initiates a
negotiation for a new key. IKE keys associated with a renegotiated
tunnel.
to securely exit the access point applet. A prompt displays confirming the
column to view the lifetime associated with a
column lists the amount of data (in bytes)
column lists the amount of data (in bytes) received
NOT_CONNECTED.
IKE State
field displays CONNECTED.
Reset VPNs
forces
IKE
When the tunnel is

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents