Wlan security, Using configuration files, Protecting configuration settings – B&B Electronics WLNN-AN(ER,SE,SP.EK)-DP551 - Manual User Manual
Page 18: Wlan roaming, Ftp configuration, Firmware update, U-boot update, Power management

18
Airborne Enterprise CLI Reference Manual
3.6
WLAN Security
This section will cover the use of the advanced security features available in the
module. Configuration of the module, requirements for successful deployment,
examples of configuration for the use of the advanced authentication and
wireless security options will be provided.
Descriptions of how to use WEP, WPA and WPA2 will be included. Outlines of
the authentication methods supported (EAP), certificate delivery and deployment
will be reviewed.
3.7
Using Configuration Files
This section will cover the use of configuration files to predefine device
configuration, to be delivered and stored on the module.
3.8
Protecting Configuration Settings
This section will cover the use of encryption to protect sensitive configuration
settings from prying eyes. This is used on the parts of the configuration that are
considered sensitive, like encryption keys, passwords, etc.
3.9
WLAN Roaming
This section will outline the commands that impact the roaming performance of
the module. Discussion of configuration options based upon application
requirements is also included.
3.10 FTP Configuration
The Airborne Enterprise Device Server family supports delivery of certificates,
private keys, configuration files and module firmware via FTP. This section
describes how to configure and use the FTP capabilities.
3.11 Firmware Update
The Airborne Enterprise Device Server family supports in-field updating of the
devices firmware. This allows devices already deployed access to the latest
feature updates and enhancements.
3.12 U-Boot Update
This section describes the ability to update the U-Boot. This should be an
infrequent event, however when required, a procedure exists to install an update.
3.13 Power Management
A review of the CLI commands impacting device power usage will include a
description of the power save modes and how to utilize them. A discussion on
the impact of power, data latency and module status will be included.