Specifications
HE863 family AT commands reference guide
80377ST10083a Rev.4 – 2012-02-01
Reproduction forbidden without written authorization from Telit Communications S.p.A.- All Rights Reserved. Page 198 of
228
#SKTL - Socket Listen
ON or OFF according to the #GPRS setting, therefore when the connection made
with #SKTL is closed the context (and hence the local IP address) is maintained.
3.5.5.1.77. Socket Listen Ring Indicator - #E2SLRI
#E2SLRI - Socket Listen Ring Indicator
AT#E2SLRI=[<n>]
Set command enables/disables the Ring Indicator pin response to a Socket Listen
connect and, if enabled, the duration of the negative going pulse generated on
receipt of connect.
Parameter:
<n> - RI enabling
0 - RI disabled for Socket Listen connect (factory default)
50..1150 - RI enabled for Socket Listen connect; a negative going pulse is
generated on receipt of connect and <n> is the duration in ms of this pulse.
AT#E2SLRI?
Read command reports whether the Ring Indicator pin response to a Socket Listen
connect is currently enabled or not, in the format:
#E2SLRI: <n>
AT#E2SLRI=?
Test command returns the allowed values for parameter <status>.
3.5.5.1.78. Firewall Setup - #FRWL
#FRWL - Firewall Setup
AT#FRWL=
[<action>,
<ip_address>,
<net mask>]
Execution command controls the internal firewall settings.
Parameters:
<action> - command action
0 - remove selected chain
1 - add an ACCEPT chain
2 - remove all chains (DROP everything); <ip_addr> and <net_mask> has no
meaning in this case.
<ip_addr> - remote address to be added into the ACCEPT chain; string type, it
can be any valid IP address in the format: xxx.xxx.xxx.xxx
<net_mask> - mask to be applied on the <ip_addr>; string type, it can be any valid
IP address mask in the format: xxx.xxx.xxx.xxx
Command returns OK result code if successful.
Note: the firewall applies for incoming (listening) connections only.
Firewall general policy is DROP, therefore all packets that are not included into an
ACCEPT chain rule will be silently discarded.
When a packet comes from the IP address incoming_IP, the firewall chain rules
will be scanned for matching with the following criteria: