beautypg.com

B&B Electronics WLNN-AN(ER,SE,SP.EK)-DP551 - Manual User Manual

Page 4

background image

4

Airborne Enterprise CLI Reference Manual

6.3.5

LISTEN Mode (Serial/UART/SPI Interface Only) .................................................. 25

6.3.6

CLI Session Startup Modes ................................................................................... 26

6.4

CLI Server Escape Processing ...............................................................................................26

6.5

Detecting and Executing the Escape Sequence ..................................................................26

6.6

CLI Conventions ........................................................................................................................27

6.7

ASCHEX vs. Binary Values .....................................................................................................28

6.8

Command Responses ..............................................................................................................28

7.0

A Typical Development System ......................................................................................... 29

8.0

Serial Device Server Use .................................................................................................. 30

8.1

Data Bridging .............................................................................................................................30

8.1.1

Bridging from the Serial Interface .......................................................................... 30

8.1.2

Bridging from a TCP connection on the wl-telnet-port ........................................... 34

8.1.3

Bridging from a TCP connection on the wl-tunnel-port .......................................... 35

8.1.4

Bridging Using UDP ............................................................................................... 37

8.1.5

Data Bridging with XMODEM Guidelines .............................................................. 38

8.1.6

Bridging from a SSH connection on the wl-ssh-port .............................................. 39

8.1.7

Bridging using SSH ................................................................................................ 40

9.0

Ethernet Bridge Use .......................................................................................................... 42

9.1

Public Network Interface ..........................................................................................................43

9.2

Private Network Interface .........................................................................................................45

9.3

Ethernet Firewall Configuration ...............................................................................................46

9.4

Router Port Forwarding Configuration ...................................................................................49

9.5

Ethernet Port mode: Router vs. Client vs. Bridge .................................................................52

10.0

WLAN Security .................................................................................................................. 56

10.1

Disabled (No Security) ..............................................................................................................56

10.2

WEP Security .............................................................................................................................56

10.2.1

WPA Migration Mode ............................................................................................. 57

10.3

WPA Security .............................................................................................................................58

10.4

WPA2 Security ...........................................................................................................................58

10.5

Enterprise Security ....................................................................................................................59

10.6

Configuring EAP-FAST.............................................................................................................64

10.7

Managing Certificates and Private Keys ................................................................................65

11.0

Using Configuration Files .................................................................................................. 70

11.1

Configuration File Format .........................................................................................................72

12.0

Protecting Configuration Settings ...................................................................................... 73

12.1

Transferring Encrypted Configurations ..................................................................................74

13.0

WLAN Roaming ................................................................................................................. 76

14.0

FTP Configuration .............................................................................................................. 78

15.0

Firmware Update ............................................................................................................... 79

15.1

Using FTP to Update Firmware ...............................................................................................80

15.2

Using Xmodem to Update Firmware ......................................................................................80