Telit GE864 and GC864
Product Description
80273ST10008A Rev. 3 - 10/02/06
Reproduction forbidden without DAI Telecom written authorization – All Right reserved – Right of modification reserved
page 50 of 72
The steps that will be required to open a socket in listen, waiting for connection requests from
remote hosts and accept these request connections only from a selected set of hosts, then close it
without closing the GRPS context are:
a) Configuring the GPRS Access
b) Configuring the embedded TCP/IP stack behavior (see par.
c) Defining the Internet Peer that can contact this device (firewall settings) (see par.
d) Requesting the GPRS context to be activated (see par.
e) Request the socket connection to be opened in listen (see par.
f) Receive connection requests (see par.
g) exchange data
h) Close the TCP connection while keeping the GPRS active (see par.
All these steps are achieved through AT commands.
As for common modem interface, two logical statuses are involved: command mode and data
traffic mode.
- In Command Mode (CM), some AT commands are provided to configure the Data Module
Internet stack and to start up the data traffic.
- In data traffic mode (Socket Mode, SKTM), the client can send/receive a raw data stream
which will be encapsulated in the previously configured TCP / IP packets which will be sent to
the other side of the network and vice versa. Control plane of ongoing socket connection is
deployed internally to the module.
5.1.4.1 Defining the Internet Peer that can contact this device (firewall
settings)
The GE864 / GC864 have an internal Firewall that controls the behavior of the incoming
connections to the module.
The firewall applies for INCOMING (listening) connections; OUTGOING connections will be always
done regardless of the firewall settings.
Firewall General policy is DROP, therefore all packets that are not included into an ACCEPT chain
rule will be silently discarded.
When a packet incomes from the IP address <incoming IP>, the firewall chain rules will be
scanned for matching with the following criteria:
<incoming IP> & <net mask> = <ip_address> ?
if the result is yes, then the packet is accepted and the rule scan is finished, otherwise the next
chain is taken into account until the end of the rules when the packet is silently dropped if no
matching was found.
For example, let assume we want to accept connections only from our devices which are on the IP
addresses ranging from:
197.158.1.1 to 197.158.255.255
We need to add the following chain to the firewall: