Telit LE910 V2 Series AT Commands
80446ST10707A Rev. 0– 2015-11-03
Reproduction forbidden without Telit Communications S.p.A. written authorization - All Rights Reserved page 299 of 509
Mod. 0808 2011-07 Rev.2
TCP AT Run Firewall List - #TCPATRUNFRWL
#TCPATRUNFRWL – TCP AT Run Firewall List
AT#
=
<action>,
<ip_addr>,
<net_mask>
Set command controls the internal firewall settings for the TCPATRUN
connection.
Parameters:
<action> - command action
0 - remove selected chain
1 - add an ACCEPT chain
2 - remove all chains (DROP everything); <ip_addr> and <net_mask>
has no meaning in this case.
<ip_addr> - remote address to be added into the ACCEPT chain; string
type, it can be any valid IP address in the format:
xxx.xxx.xxx.xxx
<net_mask> - mask to be applied on the <ip_addr>; string type, it can be
any valid IP address mask in the format: xxx.xxx.xxx.xxx
Command returns OK result code if successful.
Firewall general policy is DROP, therefore all packets that are not
included into an ACCEPT chain rule will be silently discarded.
When a packet comes from the IP address incoming_IP, the firewall chain
rules will be scanned for matching with the following criteria:
incoming_IP & <net_mask> = <ip_addr> & <net_mask>
If criteria is matched, then the packet is accepted and the rule scan is
finished; if criteria is not matched for any chain the packet is silently
dropped.
Note1: A maximum of 5 firewall can be present at same time in the List.
Note2: the firewall list is saved in NVM
Read command reports the list of all ACCEPT chain rules registered in
the
Firewall settings in the format:
#TCPATRUNFRWL: <ip_addr>,<net_mask>
#TCPATRUNFRWL: <ip_addr>,<net_mask>
…
Test command returns the allowed values for parameter <action>.
It will return ERROR if executed using SMSATRUN digest mode or
TCPATRUN server mode