
100-8005-101G Airborne™ Product Family CLI Reference Guide Page iii
Quatech, Inc. Confidential
CONTENTS
PREFACE.....................................................................................................................................................V
CONVENTIONS.............................................................................................................................................V
Terminology .......................................................................................................................................... v
Notes.....................................................................................................................................................v
Cautions ................................................................................................................................................ v
Courier Typeface.................................................................................................................................. vi
RELATED DOCUMENTATION......................................................................................................................... VI
CHAPTER 1 CLI OVERVIEW ......................................................................................................................1
1.1 OVERVIEW ......................................................................................................................................1
1.2 UNDERSTANDING CLI SESSIONS ......................................................................................................1
1.2.1 Connecting to the CLI Server................................................................................................1
1.2.2 CLI Security...........................................................................................................................2
1.2.3 CLI Session Modes...............................................................................................................2
1.2.4 CLI Mode...............................................................................................................................2
1.2.5 PASS Mode...........................................................................................................................3
1.2.6 PASS Mode for the Serial Interface......................................................................................3
1.2.7 PASS Mode for the Wireless Interface .................................................................................3
1.2.8 LISTEN Mode (Serial Interface Only) ...................................................................................4
1.2.9 CLI Session Startup Modes ..................................................................................................4
1.2.10 CLI Server Escape Processing.............................................................................................4
1.2.11 Detecting and Executing the Escape Sequence...................................................................5
1.3 TYPICAL EVALUATION SYSTEM SETUP ..............................................................................................6
1.4 DATA BRIDGING...............................................................................................................................6
1.4.1 Bridging from the Serial Interface .........................................................................................7
1.4.2 Bridging from a TCP connection on the wl-telnet-port..........................................................9
1.4.3 Bridging from a TCP connection on the wl-tunnel-port.......................................................10
1.4.4 Bridging Using UDP ............................................................................................................12
1.4.5 Data Bridging with XMODEM Guidelines............................................................................13
1.6 WIRELESS LAN ROAMING..............................................................................................................13
1.8 WPA-LEAP SECURITY..................................................................................................................14
1.8.4 Computer Resource Requirements ...........................................................................................14
1.8.5 System Implementation Considerations ....................................................................................15
1.9 CLI CONVENTIONS ........................................................................................................................16
1.10 ASCHEX VS. BINARY VALUES .......................................................................................................17
1.11 COMMAND RESPONSES .................................................................................................................17
CHAPTER 2 CLI COMMANDS ..................................................................................................................19
2.1 OVERVIEW ....................................................................................................................................19
2.2 CLI COMMANDS ............................................................................................................................20
2.2.1 LAN Configuration Commands ...........................................................................................20
2.2.2 Wireless Configuration Commands ....................................................................................23
2.2.3 LAN Communication Commands........................................................................................30
2.2.4 Escape Configuration Commands ......................................................................................33
2.2.5 UART Port Configuration Commands — NOT FOR ABD ETHERNET..............................34
2.2.7 Discovery Service Commands............................................................................................35
2.2.8 Administration Commands..................................................................................................35
2.2.9 I/O Commands — WLN ONLY............................................................................................36
2.3 CLI ERROR CODES AND MESSAGES.............................................................................................42
GLOSSARY................................................................................................................................................43
INDEX .........................................................................................................................................................49
Kommentare zu diesen Handbüchern