Specifications
HE863 family AT commands reference guide
80377ST10083a Rev.4 – 2012-02-01
Reproduction forbidden without written authorization from Telit Communications S.p.A.- All Rights Reserved. Page 199 of
228
#FRWL - Firewall Setup
incoming_IP & <net_mask> = <ip_addr> & <net_mask>
If criteria is matched, then the packet is accepted and the rule scan is finished; if
criteria is not matched for any chain the packet is silently dropped.
AT#FRWL?
Read command reports the list of all ACCEPT chain rules registered in the
Firewall settings in the format:
#FRWL: <ip_addr>,<net_mask>
#FRWL: <ip_addr>,<net_mask>
….
OK
AT#FRWL=?
Test command returns the allowed values for parameter <action>.
Example
Let assume we want to accept connections only from our devices which are on the
IP addresses ranging from
197.158.1.1 to 197.158.255.255
We need to add the following chain to the firewall:
AT#FRWL=1,"197.158.1.1","255.255.0.0"
OK
Note For outgoing connections made with #SKTOP and #SKTD the remote host is
dynamically inserted into the ACCEPT chain for all the connection duration.
Therefore the #FRWL command shall be used only for defining the #SKTL
behaviour, deciding which hosts are allowed to connect to the local device.
Rules are not saved in NVM, at startup the rules list will be empty.
3.5.5.1.79. Maximum TCP Payload Size - #TCPMAXDAT
#TCPMAXDAT – Maximum TCP Payload Size
AT#TCPMAXDAT=
<size>
Set command allows to set the maximum TCP payload size in TCP header
options.
Parameter:
<size> - maximum TCP payload size accepted in one single TCP/IP
datagram; it is sent in TCP header options in SYN packet.
0 - the maximum TCP payload size is automatically handled by module
(default).
496..1420 - maximum TCP payload size
AT#TCPMAXDAT?
Read command reports the current maximum TCP payload size, in the
format: