TFTP Commands

Show SNMP

Description

Shows SNMP settings, including communities and traps.

User Level

Admin

Syntax

show snmp

TFTP Commands

Set Server TFTP

Description

Configures the IOLANs TFTP client settings.

User Level

Admin

Syntax

set server tftp [retry <integer>] [timeout <integer>]

Options

retry

 

The number of times the IOLAN will retry to transmit a TPFT packet to/from a host

 

when no response is received. Enter a value between 0 and 5. The default is 5. A value

 

of 0 (zero) means that the IOLAN will not attempt a retry should TFTP fail.

 

timeout

 

The time, in seconds, that the IOLAN will wait for a successful transmit or receipt of

 

TFTP packets before retrying a TFTP transfer. Enter a value between 3 and 10. The

 

default is 3 seconds.

Hosts Commands

Add Host

Description

Adds a host to the IOLAN host table.

User Level

Admin

Syntax

add host <hostname> <IP_address>

 

add host <hostname> fqdn <text>

Options

<hostname>

 

The name of the host.

 

<IP_address>

 

The host IPv4 or IPv6 address.

 

fqdn

 

When you have DNS defined in the IOLAN, you can enter a DNS resolvable fully

 

qualified domain name (note: FQDN’s are excluded as accessible hosts when IP

 

Filtering is enabled).

Delete Host

Description

Deletes a host from the IOLAN host table.

User Level

Admin

Syntax

delete host <config_host>

Option

<config_host>

 

You can see a list of hosts that can be deleted by typing delete host ?.

104

IOLAN SDS/SCS/STS CLI Reference Guide, Version 3.6

Page 108
Image 108
Perle Systems CSS manual Tftp Commands, Hosts Commands

CSS specifications

Perle Systems, a well-established provider of networking and IoT solutions, offers the innovative Perle CSS (ClearSky Services) platform, designed to facilitate efficient and secure device management. This powerful solution aims to address the challenges of managing a diverse range of devices connected to the Internet, particularly in enterprise, industrial, and M2M (Machine-to-Machine) environments.

One of the main features of the Perle CSS is its robust device management capabilities. Administrators can remotely monitor, configure, and control devices in real-time. This means that troubleshooting can be conducted without the need for physical access, significantly reducing operational downtime. Additionally, the platform supports bulk provisioning, allowing organizations to onboard multiple devices simultaneously, which streamlines the deployment process.

Another notable feature is its security architecture. Perle Systems has integrated advanced security protocols to ensure the integrity and confidentiality of data transmitted between devices. The use of virtual private networks (VPNs), secure socket layer (SSL) encryption, and secure shell (SSH) protocols ensures that sensitive information remains protected from unauthorized access while in transit.

The Perle CSS also stands out for its compatibility with various communication protocols, including MQTT, RESTful APIs, and others. This interoperability allows organizations to integrate the CSS platform seamlessly with their existing systems, facilitating efficient data exchange and interoperability between different devices and applications.

Moreover, Perle CSS adopts a cloud-based architecture, which provides users with the flexibility to access device information from any location. This cloud integration enhances scalability, allowing businesses to expand their network capabilities without the need for extensive infrastructure investments.

The platform's user-friendly interface simplifies navigation, allowing users to manage devices effectively without requiring extensive technical expertise. With customizable dashboards and real-time analytics, administrators can gain valuable insights into device performance, network status, and usage patterns.

In summary, Perle Systems' CSS offers a comprehensive solution for managing connected devices in a secure and efficient manner. Its key features, including robust device management, advanced security, protocol compatibility, and a cloud-based architecture make it an ideal choice for enterprises looking to enhance their IoT capabilities and streamline operations in an increasingly connected world.