Specifications

UC864-E/G/WD/WDU AT Commands Reference Guide
80304ST10041a Rev. 7 - 2010-10-14
Reproduction forbidden without Telit Communications S.p.A’s. written authorization - All Rights Reserved. Page 272 of 318
#E2SLRI - Socket Listen Ring Indicator
AT#E2SLRI=? Test command returns the allowed values for parameter <status>.
3.5.7.4.18. Firewall Setup - #FRWL
#FRWL - Firewall Setup
AT#FRWL=
[<action>,
<ip_address>,
<net mask>]
Execution command controls the internal firewall settings.
Parameters:
<action> - command action
0 - remove selected chain
1 - add an ACCEPT chain
2 - remove all chains (DROP everything); <ip_addr> and <net_mask> has
no meaning in this case.
<ip_addr> - remote address to be added into the ACCEPT chain; string
type, it can be any valid IP address in the format: xxx.xxx.xxx.xxx
<net_mask> - mask to be applied on the <ip_addr>; string type, it can be
any valid IP address mask in the format: xxx.xxx.xxx.xxx
Command returns OK result code if successful.
Note: the firewall applies for incoming (listening) connections only.
Firewall general policy is DROP, therefore all packets that are not included
into an ACCEPT chain rule will be silently discarded.
When a packet comes from the IP address incoming_IP, the firewall chain
rules will be scanned for matching with the following criteria:
incoming_IP & <net_mask> = <ip_addr> & <net_mask>
If criteria is matched, then the packet is accepted and the rule scan is
finished; if criteria is not matched for any chain the packet is silently
dropped.
AT#FRWL? Read command reports the list of all ACCEPT chain rules registered in the
Firewall settings in the format:
#FRWL: <ip_addr>,<net_mask>
#FRWL: <ip_addr>,<net_mask>
….
OK
AT#FRWL=? Test command returns the allowed values for parameter <action>.
Example
Let assume we want to accept connections only from our devices which are
on the IP addresses ranging from