Motorola AP-51XX 사용자 설명서

다운로드
페이지 698
AP-51xx Access Point Product Reference Guide
6-52
3.
Click the 
Reset VPNs 
button to reset active VPNs. Selecting 
Reset VPNs
 forces 
renegotiation of all the Security Associations and keys. Users could notice a slight pause in 
network performance.
4.
Reference the 
IKE Summary
 field to view the following: 
5.
Click 
Logout 
to securely exit the access point applet. A prompt displays confirming the 
logout before the applet is closed.
6.12 Configuring Content Filtering Settings
Content filtering allows system administrators to block specific commands and URL extensions from 
going out through the access point’s WAN port. Therefore, content filtering affords system 
administrators selective control on the content proliferating the network and is a powerful data and 
network screening tool. Content filtering allows the blocking of up to 10 files or URL extensions and 
allows blocking of specific outbound HTTP, SMTP, and FTP requests.
Life Time
Use the 
Life Time 
column to view the lifetime associated with a 
particular Security Association (SA). Each SA has a finite lifetime 
defined. When the lifetime expires, the SA can no longer be used 
to protect data traffic. The maximum SA lifetime is 65535 seconds.
Tx Bytes
The 
Tx Bytes 
column lists the amount of data (in bytes) 
transmitted through each configured tunnel. 
Rx Bytes
The 
Rx Bytes
 column lists the amount of data (in bytes) received 
through each configured tunnel. 
Tunnel Name
Displays the name of each of the tunnels configured to use IKE for 
automatic key exchange. 
IKE State
Lists the state for each of the tunnels configured to use IKE for 
automatic key exchange. When the tunnel is not active, the 
IKE 
State
 field displays 
NOT_CONNECTED.
 When the tunnel is 
active, the 
IKE State 
field displays 
CONNECTED
.
Destination IP
Displays the destination IP address for each tunnel configured to 
use IKE for automatic key exchange. 
Remaining Life
Lists the remaining life of the current IKE key for each tunnel. When 
the remaining life on the IKE key reaches 0, IKE initiates a 
negotiation for a new key. IKE keys associated with a renegotiated 
tunnel.