beautypg.com

Understanding the cli, Connecting to the cli server, Cli security – Quatech WLNG-ET-DP500 Series User Manual

Page 17: 0 understanding the cli

background image

Quatech, Inc.

Company Confidential

100-8081-100

Airborne CLI Reference Manual

17

6.0 Understanding the CLI

CLI Sessions established to the CLI Server may operate in one of three modes: CLI,
PASS, or LISTEN. Not all modes are supported on all interfaces of the device. A CLI
Session established on the serial interface may operate in any of the three modes. CLI
Sessions established on the wireless interface are restricted to CLI or PASS Modes.

6.1

Connecting to the CLI Server

Users may connect to the CLI Server on the serial interface using a terminal
emulation program such as HyperTerminal. The DPAC default settings for the
serial interface are:

 Bits per second: 9600

 Data bits: 8

 Stop bits: 1

 Parity: none

 Flow control: none

 Users may also connect to the CLI Server on the wireless interface using a

TCP client such as Windows Telnet. The Module’s CLI Server supports a
Telnet connection with the following restrictions:

 Telnet option negotiation should be turned off.

 Telnet commands such as DO, WONT, and DON, must not be issued.

 Network Virtual Terminal codes are not supported.

 NUT 7-bit encoding does not allow 8

–bit data transfers.

The CLI Server’s wireless interface is characterized as follows:

 The CLI Server listens on the TCP port specified by the wl-telnet-port

parameter. The default is 23.

 The CLI Server inactivity timer is configured via the wl-telnet-timeout

command.

 The CLI Server uses the wl-telnet-timeout value to timeout and close

TCP connections that are inactive.

 The CLI Server supports up to three (3) TCP sessions.

6.2

CLI Security

The CLI Server supports five (5) levels of security for each CLI Session. The
security levels provide a safeguard for the set of CLI commands that may be
executed by users. CLI Sessions that are authenticated at a particular security
level may execute all CLI commands specified for that security level and below.

The

Module’s five (5) levels of security are:

 Level 0 (L0) = connectionless

This manual is related to the following products: