
Quatech, Inc. Company Confidential
100-8081-100 Airborne CLI Reference Manual 5
Contents
1.0 Overview......................................................................................................................................................................9
2.0 Conventions...............................................................................................................................................................10
2.1 Terminology..........................................................................................................................................................10
2.2 Notes.....................................................................................................................................................................10
2.3 Caution..................................................................................................................................................................10
2.4 File Format............................................................................................................................................................10
2.5 Courier Typeface..................................................................................................................................................11
3.0 Scope.........................................................................................................................................................................12
3.1 Overview...............................................................................................................................................................12
3.2 Understanding the CLI..........................................................................................................................................12
3.3 Typical Development System...............................................................................................................................12
3.4 Serial Device Server Use.....................................................................................................................................12
3.5 Ethernet Bridge Use .............................................................................................................................................13
3.6 WLAN Security .....................................................................................................................................................13
3.7 WLAN Roaming....................................................................................................................................................13
3.8 FTP Configuration.................................................................................................................................................13
3.9 Power Management .............................................................................................................................................13
3.10 Command Line Descriptions................................................................................................................................13
4.0 Supported Devices ....................................................................................................................................................14
5.0 Overview....................................................................................................................................................................15
5.1 UART ....................................................................................................................................................................15
5.2 Serial.....................................................................................................................................................................15
5.3 Ethernet.................................................................................................................................................................15
6.0 Understanding the CLI...............................................................................................................................................17
6.1 Connecting to the CLI Server...............................................................................................................................17
6.2 CLI Security ..........................................................................................................................................................17
6.3 CLI Session Modes ..............................................................................................................................................18
6.3.1 CLI Mode ....................................................................................................................................................18
6.3.2 PASS Mode................................................................................................................................................18
6.3.3 PASS Mode for the Serial Interface...........................................................................................................19
6.3.4 PASS Mode for the Wireless Interface......................................................................................................19
6.3.5 LISTEN Mode (Serial/UART/SPI Interface Only)......................................................................................19
6.3.6 CLI Session Startup Modes .......................................................................................................................19
6.4 CLI Server Escape Processing............................................................................................................................20
6.5 Detecting and Executing the Escape Sequence .................................................................................................20
6.6 CLI Conventions...................................................................................................................................................21
6.7 ASCHEX vs. Binary Values..................................................................................................................................22
6.8 Command Responses..........................................................................................................................................22
7.0 A Typical Development System................................................................................................................................23
8.0 Serial Device Server Use..........................................................................................................................................24
8.1 Data Bridging........................................................................................................................................................24
8.1.1 Bridging from the Serial Interface ..............................................................................................................24
8.1.2 Bridging from a TCP connection on the wl-telnet-port..............................................................................26
8.1.3 Bridging from a TCP connection on the wl-tunnel-port.............................................................................27
8.1.4 Bridging Using UDP ...................................................................................................................................29
8.1.5 Data Bridging with XMODEM Guidelines..................................................................................................30
9.0 Ethernet Bridge Use..................................................................................................................................................31
9.1 Public Network Interface ......................................................................................................................................32
9.2 Private Network Interface.....................................................................................................................................34
10.0 WLAN Security ..........................................................................................................................................................36
10.1 Disabled (No Security)..........................................................................................................................................36
10.2 WEP Security........................................................................................................................................................36
10.2.1 WPA Migration Mode .................................................................................................................................37
10.3 WPA Security........................................................................................................................................................37
10.4 WPA2 Security......................................................................................................................................................38
10.5 Managing Certificates and Private Keys..............................................................................................................41
11.0 WLAN Roaming.........................................................................................................................................................46
12.0 FTP Configuration......................................................................................................................................................48
13.0 Power Save................................................................................................................................................................49
14.0 Command Descriptions.............................................................................................................................................50
dev-type ..........................................................................................................................................................................51
wl-security.......................................................................................................................................................................52
get-cert............................................................................................................................................................................53
get-cfg .............................................................................................................................................................................54
put-cert............................................................................................................................................................................55
put-cfg .............................................................................................................................................................................56