The Command Line Interface (CLI) provides an alternative to HTTPS access. CLI allows you to work in a text regime interface using an ssh (putty) or telnet client.
Use the telnet client to connect to the unit with service IP address 192.168.169.169. Type this in the command prompt:
Then use the username and password from the menu
Service access/Users for
https access (by default
admin, admin). This works if
access/Services/Telnet is checked in https access.
Connection using putty client. Type this into the Host Name (or IP address) field:
Click Open. Then enter the password
admin. This procedure (without key) is
subject to selection
Service access/Services/SSH on in https access.
If you own the private key part, then you do not need a password. In putty, continue by
Connection/SSH/Auth and selecting path to file with key e.g.
Session/Logging to save the putty configuration. To
access the unit via CLI simply select the connection in putty and click Open.
Overview of CLI options
Parameters of CLI commands are listed in the help. For example:
local, default option
both, both units, command item for remote unit has PEER_ prefix
peer, opposite unit, when reading using the show command
When inserting commands, using the tabulator can help
An incorrect command is rejected (e.g. inserting forbidden frequency)
Reading parameters of local unit
Reading radio parameters of peer unit
cli_cnf_show -t p | grep RADIO
Entering parameters (TX power of local unit)
Items of command (RADIO_TX_PWR=) are taken from the list cli_cnf_show
Entering more parameters in both units
cli_cnf_set -t b RADIO_TX_CHAN=17128000 PEER_RADIO_RX_CHAN=17128000
Put parameters containing spaces in quotation marks:
cli_time_set -t b -T '2012-11-27 10:55:00'
Set time in both units
Generation using ssh-keygen
[user@laptop ~]$ ssh-keygen -t dsa -f usr_ssh_key
Uses working directory to save private
usr_ssh_keyand public part of the key
Copying the key into the RAy2 unit
[user@laptop ~]$ scp usr_ssh_key.pub firstname.lastname@example.org:/tmp
The public part of the key is written to the folder
Installation of key in RAy2 unit
CLI(admin):/rrusrhomes/admin$ cli_user_authkey -c a -k /tmp/usr_ssh_key.pub
Testing access to RAy2 unit using SSH key
[user@laptop ~]$ ssh -i usr_ssh_key email@example.com
Script example with access using key
[user@laptop ~]$ ssh -i usr_ssh_key firstname.lastname@example.org "source /etc/profile;cli_info_link;echo \$?;cli_cnf_show | grep TX_PWR;echo $?" Warning: Permanently added '192.168.141.202' (DSA) to the list of known hosts. cli_info_link: Link status: up 0 RADIO_TX_PWR=4 0 [user@laptop ~]$
The script contains:
query for link status
reading return value
cli_cnf_show | grep TX_PWR;
query for radio power
reading return value
cli_info_link: Link status:up
power +4 dBm
Saves the configuration of both units to file
cnf_backup.tgzinto the working directory.
cli_cnf_set -t b -b cnf_backup.tgz
Restores configuration of both units from file
Default configuration list
Warning, the command
is not a default setting – it uses factory settings, deleting all logs and saved data. It is very likely that the connection to peer unit will be interrupted!
Current version of fw
Preparation of files
fw package, for example
bm4-RACOM-0.1.12.0.cpiocopy using ssh or putty into folder
Clears the RAy2 buffer
Checks buffer status
Saving into buffers
cli_fw_load_package -f /tmp/bm4-RACOM-0.1.12.0.cpio
A new fw package is loaded into the buffer (20 sec)
The fw package is also loaded into the peer unit (20 sec)
cli_fw_upgrade -t b
Firmware in both units will be replaced with new version from the buffer. After 3 minutes, this message appears:
Firmware upgrade started. Estimated time to finish is 370 s.
Connection is terminated. After a few minutes, log in to RAy2 again
The RAy2 unit in default configuration, establishes a connection with any remote unit and both units act as a communication pair. Should the higher protection from the unauthorized communication take-over be required, it is possible to use the so called Secured mode of remote unit authorization. This mode is based on locking the two specific units into one communication pair. Units with Secured mode activated refuse to make a connection with any other communication unit. The units are locked using the unique authorization keys. The keys are exchanged between the units concerned. The authorization keys can be backed up to an external medium to be able to make a service unit exchange, if necessary. Should The Link authorization guard be disabled, the user data occurs even it the remote unit is not authorized.
The Secured mode set up process consists of a few steps:
Unique authorization keys generation:
cli_link_key_gen -t b
Authorization keys exchange between the two communication units:
Authorization keys activation:
cli_link_key_apply -t b
-tdetermines whether we configure the whole link (
-t b) or only one unit (
Secured mode activation. Both sides of the link must have identically secured mode set On or Off:
cli_cnf_set -t b SVC_SECURE_PEER_MODE=on PEER_SVC_SECURE_PEER_MODE=on
Secured mode de-activation:
cli_cnf_set -t b SVC_SECURE_PEER_MODE=off PEER_SVC_SECURE_PEER_MODE=off
Backup of the keys to an external medium. The backup has to be performed to be able to make service exchange of the corrupted unit, if necessary. The new exchanged unit is not able to make an active connection with the other unit if it is not loaded with the proper authorization key.
cli_link_key_save -s s -f <file>
The key is backed up to a selected file in the internal unit file system. It can be transferred to an external medium using for example the scp client.
Authorization key restoration from the external medium.
The key has to be transferred to the unit internal file system first. The scp client can be used. The CLI commands can be applied subsequently:
cli_link_key_load -t b -f <file>
cli_link_key_apply -t b
“Radio loopback” function (accessible via CLI only) provides indicative measurement of XPD (cross polar discrimination). XPD is the ratio between desired signals on preferred polarization and signals on opposite polarization.
The Radio loopback command takes 10 seconds. The result is suppression [dB] of the unwanted signal (transmitter to receiver penetration). Radio loopback can only be used with units operating in 17 GHz or 24 GHz band.
WARNING: User traffic is interrupted during command execution!