UC864
UC864
UC864
UC864----E/G/WD/WDU
E/G/WD/WDU
E/G/WD/WDU
E/G/WD/WDU AT Commands Reference Guide
AT Commands Reference Guide
AT Commands Reference Guide
AT Commands Reference Guide
80304ST10041a Rev. 6
80304ST10041a Rev. 6
80304ST10041a Rev. 6
80304ST10041a Rev. 6 ---- 2010
2010
2010
2010----0
00
05
55
5----20
20
20
20
Reproduction forbidden without Telit Communications S.p.A’s. written authorization - All Rights Reserved.
Page 283 of 329
#E2SLRI
#E2SLRI
#E2SLRI
#E2SLRI ---- Socket Listen Ring Indicator
Socket Listen Ring Indicator
Socket Listen Ring Indicator
Socket Listen Ring Indicator
AT#E2SLRI=?
AT#E2SLRI=?
AT#E2SLRI=?
AT#E2SLRI=?
Test command returns the allowed values for parameter <status>.
<status>.
<status>.
<status>.
3.5.7.4.18.
Firewall Setup
Firewall Setup
Firewall Setup
Firewall Setup ---- #FRWL
#FRWL
#FRWL
#FRWL
#FRWL
#FRWL
#FRWL
#FRWL ---- Firewall Setup
Firewall Setup
Firewall Setup
Firewall Setup
AT#FRWL=
AT#FRWL=
AT#FRWL=
AT#FRWL=
[<action>,
[<action>,
[<action>,
[<action>,
<ip_address>,
<ip_address>,
<ip_address>,
<ip_address>,
<net mask>]
<net mask>]
<net mask>]
<net mask>]
Execution command controls the internal firewall settings.
Parameters:
<action>
<action>
<action>
<action> - command action
0 - remove selected chain
1 - add an ACCEPT
ACCEPT
ACCEPT
ACCEPT chain
2 - remove all chains (DROP
DROP
DROP
DROP everything); <ip_addr>
<ip_addr>
<ip_addr>
<ip_addr> and <net_mask>
<net_mask>
<net_mask>
<net_mask> has
no meaning in this case.
<ip_addr>
<ip_addr>
<ip_addr>
<ip_addr> - remote address to be added into the ACCEPT
ACCEPT
ACCEPT
ACCEPT chain; string
type, it can be any valid IP address in the format: xxx.xxx.xxx.xxx
<net_mask>
<net_mask>
<net_mask>
<net_mask> - mask to be applied on the <ip_addr>
<ip_addr>
<ip_addr>
<ip_addr>; string type, it can be
any valid IP address mask in the format: xxx.xxx.xxx.xxx
Command returns OK
OK
OK
OK result code if successful.
Note: the firewall applies for incoming (listening) connections only.
Firewall general policy is DROP
DROP
DROP
DROP, therefore all packets that are not included
into an ACCEPT
ACCEPT
ACCEPT
ACCEPT chain rule will be silently discarded.
When a packet comes from the IP address incoming_IP
incoming_IP
incoming_IP
incoming_IP, the firewall chain
rules will be scanned for matching with the following criteria:
incoming_IP & <net_mask> = <ip_addr> & <net_mask>
incoming_IP & <net_mask> = <ip_addr> & <net_mask>
incoming_IP & <net_mask> = <ip_addr> & <net_mask>
incoming_IP & <net_mask> = <ip_addr> & <net_mask>
If criteria is matched, then the packet is accepted and the rule scan is
finished; if criteria is not matched for any chain the packet is silently
dropped.
AT#FRWL?
AT#FRWL?
AT#FRWL?
AT#FRWL?
Read command reports the list of all ACCEPT
ACCEPT
ACCEPT
ACCEPT chain rules registered in the
Firewall settings in the format:
#FRWL: <ip_addr>,<
#FRWL: <ip_addr>,<
#FRWL: <ip_addr>,<
#FRWL: <ip_addr>,<net_mask
net_mask
net_mask
net_mask>
>>
>
#FRWL: <ip_addr>,<
#FRWL: <ip_addr>,<
#FRWL: <ip_addr>,<
#FRWL: <ip_addr>,<net_mask
net_mask
net_mask
net_mask>
>>
>
….
….
….
….
OK
OK
OK
OK
AT#FRWL=?
AT#FRWL=?
AT#FRWL=?
AT#FRWL=?
Test command returns the allowed values for parameter <action>.
<action>.
<action>.
<action>.
Example
Let assume we want to accept connections only from our devices which are
on the IP addresses ranging from