
AP-5131 Access Point Product Reference Guide
6-50
3. Click the Reset VPNs button to reset active VPNs. Selecting Reset VPNs forces renegotiation of all 
the Security Associations and keys. Users could notice a slight pause in network performance.
4. Reference the IKE Summary field to view the following: 
5. Click Logout to securely exit the AP-5131 Symbol Access Point applet. A prompt displays 
confirming the logout before the applet is closed.
6.12 Configuring Content Filtering SettingsContent filtering allows system administrators to block specific commands and URL extensions from 
going out through the AP-5131 WAN port. Therefore, content filtering affords system administrators 
selective control on the content proliferating the network and is a powerful data and network 
screening tool. Content filtering allows the blocking of up to 10 files or URL extensions and allows 
blocking of specific outbound HTTP, SMTP, and FTP requests.
Life Time Use the Life Time column to view the lifetime associated with a 
particular Security Association (SA). Each SA has a finite lifetime 
defined. When the lifetime expires, the SA can no longer be used 
to protect data traffic. The maximum SA lifetime is 65535 seconds.
Tx Bytes The Tx Bytes column lists the amount of data (in bytes) 
transmitted through each configured tunnel. 
Rx Bytes The Rx Bytes column lists the amount of data (in bytes) received 
through each configured tunnel. 
Tunnel Name Displays the name of each of the tunnels configured to use IKE for 
automatic key exchange. 
IKE State Lists the state for each of the tunnels configured to use IKE for 
automatic key exchange. When the tunnel is not active, the IKE 
State field displays NOT_CONNECTED. When the tunnel is 
active, the IKE State field displays CONNECTED.
Destination IP Displays the destination IP address for each tunnel configured to 
use IKE for automatic key exchange. 
Remaining Life Lists the remaining life of the current IKE key for each tunnel. When 
the remaining life on the IKE key reaches 0, IKE initiates a 
negotiation for a new key. IKE keys associated with a renegotiated 
tunnel.