Telit EZ10-GPRS/-PCS
Product Description
80269ST10014a, Rev. 3 – 26/09/05
Reproduction forbidden without written authorization by Telit Communications S.p.A.
Page 36 of 74
All Rights reserved – Right of modification reserved
b) configuring the embedded TCP/IP stack behaviour
c) defining the Internet Peer that can contact this device (firewall settings)
d) request the GPRS context to be activated
e) request the socket connection to be opened in listen
f) receive connection requests
g) exchange
data
h) close the TCP connection while keeping the GPRS active
All these steps are achieved through AT commands.
As for common modem interface, two logical status are involved: command mode and data traffic
mode.
-
In Command Mode (CM), some AT commands are provided to configure the Data Module
Internet stack and to start up the data traffic.
- In data traffic mode (Socket Mode, SKTM), the client can send/receive a raw data stream
which will be encapsulated in the previously configured TCP / IP packets which will be sent to
the other side of the network and viceversa. Control plane of ongoing socket connection is
deployed internally to the module.
3.1.4.1 Defining the Internet Peer that can contact this device (firewall settings)
The EZ10-GPRS has an internal Firewall that controls the behaviour of the incoming connections
to the module.
The firewall applies for INCOMING (listening) connections, OUTGOING connections will be always
done regardless of the firewall settings.
Firewall General policy is DROP, therefore all packets that are not included into an ACCEPT chain
rule will be silently discarded.
When a packet incomes from the IP address <incoming IP>, the firewall chain rules will be
scanned for matching with the following criteria:
<incoming IP> & <net mask> = <ip_address> ?
if the result is yes, then the packet is accepted and the rule scan is finished, otherwise the next
chain is taken into account until the end of the rules when the packet is silently dropped if no
matching was found.
For example, let assume we want to accept connections only from our devices which are on the IP
addresses ranging from :
197.158.1.1 to 197.158.255.255
We need to add the following chain to the firewall:
AT#FRWL=1,"197.158.1.1","255.255.0.0"