The Command Line Interface (CLI) provides an alternative to HTTPS access. CLI allows you to work in a text regime interface using an ssh (putty) or telnet client.
Use the telnet client to connect to the unit with service IP address 192.168.169.169. Type this in the command prompt:
telnet 192.168.169.169
Then use the username and password from the menu Service access/Users
for
https access (by default admin, admin
). This works if Service
access/Services/Telnet
is checked in https access.
Connection using putty client. Type this into the Host Name (or IP address) field:
admin@192.168.169.169
Click Open. Then enter the password admin
. This procedure (without key) is
subject to selection Service access/Services/SSH
on in https access.
If you own the private key part, then you do not need a password. In putty, continue by
selecting Connection/SSH/Auth
and selecting path to file with key e.g.
key.ppk
. Use Session/Logging
to save the putty configuration. To
access the unit via CLI simply select the connection in putty and click Open.
Overview of CLI options
cli_help
Parameters of CLI commands are listed in the help. For example:
-h
help listing -t
target unit -t l
local, default option -t b
both, both units, command item for remote unit has PEER_ prefix -t p
peer, opposite unit, when reading using the show command When inserting commands, using the tabulator can help
An incorrect command is rejected (e.g. inserting forbidden frequency)
A parameter that caused the loss of the connection is restored after 1 minute (Rollback)
Reading parameters of local unit
Reading radio parameters of peer unit
cli_cnf_show -t p | grep RADIO
Entering parameters (TX power of local unit)
cli_cnf_set RADIO_TX_PWR=-3
Items of command (RADIO_TX_PWR=) are taken from the list cli_cnf_showEntering more parameters in both units
cli_cnf_set -t b RADIO_TX_CHAN=17128000 PEER_RADIO_RX_CHAN=17128000
Put parameters containing spaces in quotation marks:
cli_time_set -t b -T '2012-11-27 10:55:00'
Set time in both units
Generation using ssh-keygen
[user@laptop ~]$ ssh-keygen -t dsa -f usr_ssh_key
Uses working directory to save privateusr_ssh_key
and public part of the keyusr_ssh_key.pub
Copying the key into the RAy2 unit
[user@laptop ~]$ scp usr_ssh_key.pub admin@192.168.141.202:/tmp
The public part of the key is written to the folder/tmp
Installation of key in RAy2 unit
CLI(admin):/rrusrhomes/admin$ cli_user_authkey -c a -k /tmp/usr_ssh_key.pub
Testing access to RAy2 unit using SSH key
[user@laptop ~]$ ssh -i usr_ssh_key admin@192.168.141.202
Script example with access using key
[user@laptop ~]$ ssh -i usr_ssh_key admin@192.168.141.202 "source /etc/profile;cli_info_link;echo \$?;cli_cnf_show | grep TX_PWR;echo $?" Warning: Permanently added '192.168.141.202' (DSA) to the list of known hosts. cli_info_link: Link status: up 0 RADIO_TX_PWR=4 0 [user@laptop ~]$
The script contains:
source /etc/profile;
environment settings cli_info_link;
query for link status echo \$?;
reading return value cli_cnf_show | grep TX_PWR;
query for radio power echo \$?
reading return value cli_info_link: Link status:up
return value 0
OK command RADIO_TX_PWR=4
power +4 dBm 0
OK command
Configuration backup
cli_cnf_backup_get
Saves the configuration of both units to filecnf_backup.tgz
into the working directory.Configuration restore
cli_cnf_set -t b -b cnf_backup.tgz
Restores configuration of both units from filecnf_backup.tgz
Default configuration list
cli_cnf_def_show
Warning, the commandcli_cnf_factory_set
is not a default setting – it uses factory settings, deleting all logs and saved data. It is very likely that the connection to peer unit will be interrupted!
Current version of fw
cli_info_station
Preparation of files
fw package, for examplebm4-RACOM-0.1.12.0.cpio
copy using ssh or putty into folder/tmp
in RAy17
Command
cli_fw_clear_buffer
Clears the RAy2 buffercli_fw_buffer_status
Checks buffer statusSaving into buffers
cli_fw_load_package -f /tmp/bm4-RACOM-0.1.12.0.cpio
A new fw package is loaded into the buffer (20 sec)cli_fw_upload2peer
The fw package is also loaded into the peer unit (20 sec)Upgrade
cli_fw_upgrade -t b
Firmware in both units will be replaced with new version from the buffer. After 3 minutes, this message appears:Firmware upgrade started. Estimated time to finish is 370 s.
Connection is terminated. After a few minutes, log in to RAy2 again
The RAy2 unit in default configuration, establishes a connection with any remote unit and both units act as a communication pair. Should the higher protection from the unauthorized communication take-over be required, it is possible to use the so called Secured mode of remote unit authorization. This mode is based on locking the two specific units into one communication pair. Units with Secured mode activated refuse to make a connection with any other communication unit. The units are locked using the unique authorization keys. The keys are exchanged between the units concerned. The authorization keys can be backed up to an external medium to be able to make a service unit exchange, if necessary. Should The Link authorization guard be disabled, the user data occurs even it the remote unit is not authorized.
The Secured mode set up process consists of a few steps:
Unique authorization keys generation:
cli_link_key_gen -t b
Authorization keys exchange between the two communication units:
cli_link_key_swap
Authorization keys activation:
cli_link_key_apply -t b
Parameter-t
determines whether we configure the whole link (-t b
) or only one unit (-t l
).Secured mode activation. Both sides of the link must have identically secured mode set On or Off:
cli_cnf_set -t b SVC_SECURE_PEER_MODE=on PEER_SVC_SECURE_PEER_MODE=on
Secured mode de-activation:
cli_cnf_set -t b SVC_SECURE_PEER_MODE=off PEER_SVC_SECURE_PEER_MODE=off
Backup of the keys to an external medium. The backup has to be performed to be able to make service exchange of the corrupted unit, if necessary. The new exchanged unit is not able to make an active connection with the other unit if it is not loaded with the proper authorization key.
cli_link_key_save -s s -f <file>
The key is backed up to a selected file in the internal unit file system. It can be transferred to an external medium using for example the scp client.Authorization key restoration from the external medium.
The key has to be transferred to the unit internal file system first. The scp client can be used. The CLI commands can be applied subsequently:cli_link_key_load -t b -f <file>
cli_link_key_apply -t b
“Radio loopback” function (accessible via CLI only) provides indicative measurement of XPD (cross polar discrimination). XPD is the ratio between desired signals on preferred polarization and signals on opposite polarization.
Command
cli_rloop
The Radio loopback command takes 10 seconds. The result is suppression [dB] of the unwanted signal (transmitter to receiver penetration). Radio loopback can only be used with units operating in 17 GHz or 24 GHz band.
WARNING: User traffic is interrupted during command execution!