Perle Systems CSS manual User Commands, Commands for Users Logged Into the Iolan

Models: CSS

1 164
Download 164 pages 36.39 Kb
Page 53
Image 53

3 User Commands

Chapter 3

This chapter defines all the CLI commands available to users who are logged into the IOLAN.

Commands for Users Logged Into the IOLAN

Admin

Description Changes a Normal-level user to the Admin user. When you press Enter after you type this command, you will be prompted for the Admin password.

User Level Normal

Syntax admin

Help

Description Displays help on using the command line interface (CLI).

User Level Restricted, Normal, Admin

Syntax help

Kill Line

Description Restarts a line. On IOLANs with more than 1 port, you can specify a port number and then a range of ports; for example, kill line 4, 10-13, 15. This command can also be used to reset the internal modem on the IOLAN. The internal modem is addressed as last serial port +1 (i.e., on an SDS 3M, the modem is line 4). On single port models, use the command kill line.

User Level Normal, Admin

Syntax kill line *<number><number range>

Note: the * is a wildcard meaning all lines.

Kill Session

Description Kills an active session.

User Level Restricted, Normal, Admin

Syntax kill session 1234

Options 1234

The number of the session you want to kill.

Logout

Description Logs the user out from the IOLAN.

User Level Restricted, Normal, Admin

Syntax logout

IOLAN SDS/SCS/STS CLI Reference Guide, Version 3.6

51

Page 53
Image 53
Perle Systems CSS manual User Commands, Commands for Users Logged Into the Iolan

CSS specifications

Perle Systems, a well-established provider of networking and IoT solutions, offers the innovative Perle CSS (ClearSky Services) platform, designed to facilitate efficient and secure device management. This powerful solution aims to address the challenges of managing a diverse range of devices connected to the Internet, particularly in enterprise, industrial, and M2M (Machine-to-Machine) environments.

One of the main features of the Perle CSS is its robust device management capabilities. Administrators can remotely monitor, configure, and control devices in real-time. This means that troubleshooting can be conducted without the need for physical access, significantly reducing operational downtime. Additionally, the platform supports bulk provisioning, allowing organizations to onboard multiple devices simultaneously, which streamlines the deployment process.

Another notable feature is its security architecture. Perle Systems has integrated advanced security protocols to ensure the integrity and confidentiality of data transmitted between devices. The use of virtual private networks (VPNs), secure socket layer (SSL) encryption, and secure shell (SSH) protocols ensures that sensitive information remains protected from unauthorized access while in transit.

The Perle CSS also stands out for its compatibility with various communication protocols, including MQTT, RESTful APIs, and others. This interoperability allows organizations to integrate the CSS platform seamlessly with their existing systems, facilitating efficient data exchange and interoperability between different devices and applications.

Moreover, Perle CSS adopts a cloud-based architecture, which provides users with the flexibility to access device information from any location. This cloud integration enhances scalability, allowing businesses to expand their network capabilities without the need for extensive infrastructure investments.

The platform's user-friendly interface simplifies navigation, allowing users to manage devices effectively without requiring extensive technical expertise. With customizable dashboards and real-time analytics, administrators can gain valuable insights into device performance, network status, and usage patterns.

In summary, Perle Systems' CSS offers a comprehensive solution for managing connected devices in a secure and efficient manner. Its key features, including robust device management, advanced security, protocol compatibility, and a cloud-based architecture make it an ideal choice for enterprises looking to enhance their IoT capabilities and streamline operations in an increasingly connected world.