User Guide

CONFIDENTIAL
13 (19)
CPE TPWLR58C1
Version 1.2
SYSTEM USER GUIDE
30 September 2015
13 Copyright © 2015 TruePath Wireless, LLC. All rights reserved. Reproduction in whole or in part without permission is prohibited. Information contained herein is subject to
change without notice. The specifications and information regarding the products in this document are subject to change without notice. All statements, information, and
recommendations in this document are believed to be accurate, but are presented without warranty of any kind, express, or implied. Users must take full responsibility for their
application of any products. Trademarks, brand names and products mentioned in this document are the property of their respective owners. All such references are used
strictly in an editorial fashion with no intent to convey any affiliation with the name or the product's rightful owner.
3.1.3 Router Role
Management IP packets are routed (Layer 3) between wired and wireless interfaces.
Lower layer broadcast packets are dropped at each interface.
Below (Table 5) is a list of settings and descriptions that are specific to the wireless LAN
(WLAN) interface when the device is configured in a router role.
Network Settings
Description
IP Address
IP address used for device management. It is
accessible from both the wireless and wired LAN
interfaces.
Netmask
Dotted decimal representation of 4 binary octets that
determine which part of address is the network and that
of the host (the mask). For example, 255.255.255.0 is
the most common mask used.
Table 5 - WLAN Network Settings
3.1.4 Static Routes
In both routed and static network modes, static routes can be entered to provide entries
to the gateway interfaces for the networks served by the network interfaces (ROUTED,
or BRIDGED). In bridging mode, there should only be one gateway IP address to point
to networks outside of the management IP network space. As a router, the gateway IP
address points to the location that services the destination network.
3.1.5 Embedded CLI
The command line interface is a structured (hierarchical XML configuration) customer
user interface. It is equipped with features that are typically found on carrier-class
systems. This includes help, command completion, and option range/bounds checking.
Similarly, the interface is serviced by a secure sockets shell server and is fully
integrated with the Linux authentication subsystem.
Additionally, the CLI is equipped to support look up tables to allow the CLI to be
customized to make commands easier to read- while maintaining the underlying
software interface. Figure 6 shows some of the available root level commands.