Owner's manual
Table Of Contents
- Reference Manual
- Overview
- Conventions
- Scope
- Supported Devices
- Overview
- Understanding the CLI
- A Typical Development System
- Serial Device Server Use
- Ethernet Bridge Use
- WLAN Security
- WLAN Roaming
- FTP Configuration
- Power Save
- Command Descriptions
- dev-type
- wl-security
- get-cert
- get-cfg
- put-cert
- put-cfg
- ca-cert-filename
- ca-cert2-filename
- client-cert-filename
- client-cert2-filename
- priv-key-filename
- priv-key2-filename
- priv-key-password
- priv-key2-password
- ? [Question Mark]
- help
- dh-parm-filename
- eap-password
- eap-ident
- eap-anon-ident
- eap-phase1
- eap-phase2
- subject-match
- subject-match2
- clear-cred
- clear
- del-cert
- clear-wep
- default-cfg
- radio-on
- radio-off
- ping
- stats
- ftp-server-address
- ftp-server-path
- ftp-user
- ftp-password
- ftp-filename
- save
- telnet-port
- http-port
- eth-ip
- eth-gateway
- eth-subnet
- eth-mode
- wl-specific-scan
- apply-cfg
- wl-assoc-backoff
- arp-reachable-time
- arp-staleout-time
- del-cfg
- discover
- intf-type
- list-cfg
- ssh-keygen
- ssh-keysize
- startup-text
- startup-msg
- ver-fw
- ver-radio
- ver-uboot
- wl-dhcp-vendorid
- wl-udp-ping
- wl-wins1
- wl-wins2
- cfg-dump
- Change Log

Quatech, Inc. Company Confidential
100-8081-100 Airborne CLI Reference Manual 67
dh-parm-filename
Command
dh-parm-filename
Arguments
[Private Key filename] with PEM extension.
Device Type
All
Default
[blank]
Description
DH/DSA parameters file name (in PEM format).
This is an optional configuration file for setting parameters for an ephemeral DH key exchange. In most
cases, the default RSA authentication does not use this configuration. However, it is possible to setup
RSA to use ephemeral DH key exchange. In addition, ciphers with DSA keys always use ephemeral DH
keys. This can be used to achieve forward secrecy. If the file is in DSA parameters format, it will be
automatically converted into DH parameters.