A command line utility used to set and control Laird Summit 802.11 supplicant
https://github.com/tesarmar/SDCset/releases
- Datalogic Elf
- Topsystem Voxter Elite
- Datalogic Falcon X3+
- Copy the application executable to some persistent directory in the device memory
- Create batch file including the desired command line parameters (see example below)
- Place the batch file to the Windows startup directory
@echo off
rem Set application executable location
set CMD=\somelocation\SDCset.exe
rem Switch off the WLAN NIC during configuration
start /wait "%CMD%" -radio off
rem Set global settings
start /wait "%CMD%" -global -roam_trig 65 -roam_delta 5 -roam_per 5 -dfs_chan on -aggressive on -ccx off -wmm on -txdiver on -rxdiver startmain -tray on -disppwd off -adminrequire on -adminpwd "adminpass" -opmk on
rem Create/modify wireless profile
start /wait "%CMD%" -config -add someprofile -ssid SOMESSID -client "someuser" -eap peapmschap -encrypt wpa2aes -eapuser "someuser" -eappassword "somepass" -eapvalidateserver off -eapusemsstore off -rfmode "bgna" -brate auto -pwr cam
rem Set power settings
start /wait "%CMD%" -power cam
rem Activate the newly created/configured profile and reactivate WLAN NIC
start /wait "%CMD%" -config -active someprofile
start /wait "%CMD%" -radio on
rem Remove default profile (active profile cannot be deleted)
start /wait "%CMD%" -config -delete Default
Display the copyright and version information for SDCset.
Displays the current status of the RF card, the terminal IP and MAC information, and the associated access point IP and MAC information if any.
Enables or disables the radio.
Set the currently active configuration to the specified power mode.
-active
– set the currently active wireless profile to the given profile-delete
– delete the given profile as long as it is not the currently active profile
Add or modify the given profile using the options below. Note that adding a profile will not automatically set it to be the currently active profile.
Service set identifier (SSID) for WLAN to which radio will connect
Name assigned to the Summit radio and client device that uses it
Use of Radio modes when interacting with AP or another peer:
b_only
– 1, 2, 5.5 and 11 Mbps; 2.4GHz band onlybg
– all 802.11b and 802.11g rates; 2.4GHz band only (Default for 802.11bg radios)g_only
– 6, 9, 12, 18, 24, 36, 48 and 54 Mbps; 2.4GHz band onlybg_subset
– 1, 2, 5.5, 6, 11, 24, 36 and 54 Mbps; 2.4GHz band onlya_only
– 6, 9, 12, 18, 24, 36, 48 and 54 Mbps; 5GHz band onlyabg
– all 802.11b and 802.11a/g rates; 5GHz band preferred (Default for 802.11abg radios)bga
– all 802.11b and 802.11a/g rates; 2.4GHz band preferredgn
– all 802.11g/n rates; 2.4GHz band onlyan
– all 802.11a/n rates; 5GHz band onlyabgn
– all 802.11b and 802.11a/g/n rates; 5GHz band preferredbgna
– all 802.11b and 802.11a/g/n rates; 2.4GHz band preferredadhoc
– peer to peer mode
Power save mode for the radio:
cam
– constantly awake modefast
– fast power save modemax
– maximum power savings
802.11 authentication type
Extensible Authentication Protocol type used for 802.1X authentication to the AP
Set the encryption mode for the specified configuration to the given mode. If static is selected, the wep key(s) must be specified along with the transmit key number. When using psk encryption, use the –psk option below to enter the preshared key.
none
– no encryptiondynamic
– WEP with key generated during EAP authenticationstatic
– WEP with up to four static keys -- 40-bit or 128-bit in ASCII or hex -- defined under WEP/PSK Keysckip
– WEP with Cisco Key Integrity Protocolautockip
– WEP with Cisco Key Integrity Protocol (?)wpapsk
– TKIP with PSK -- ASCII passphrase or hex PSK -- defined under WEP/PSK Keyswpatkip
– TKIP with key generated during EAP authenticationwpa2psk
– AES with PSK -- ASCII passphrase or hex PSK -- defined under WEP/PSK Keyswpa2aes
– AES with key generated during EAP authenticationcckmtkip
– TKIP with key generated during EAP authentication and with Cisco key management protocol for fast reauthenticationcckmaes
– AES with key generated during EAP authentication and with Cisco key management protocol for fast reauthentication
When specifying static wep mode, 1 to 4 static wep keys must be entered. Keys must be 5 or 13 characters long if ASCII. Keys may also be entered in hex and must be 10 or 26 characters long.
Wep transmit key number
Transmitter power in milliwatts.
The allowed bit rate (leave this set to auto normally).
When specifying wpapsk or wpa2psk encryption modes, the preshared key must be entered with this option. Note that the preshared key may not contain spaces or begin with ‘-‘.
Username or Domain/Username
Password if applicable
If eapvalidateserver and eapusemsstore are both on, eapcacert is evaluated as the certificate name to use with the server. Otherwise eapcacert is the name of the certificate file to use.
Used when eap mode is set to eapfast.
Used when eap mode is set to eapfast.
Set on when using a CA certificate to validate an authentication server.
Set on if the Microsoft certificate store should be used for a CA certificate if the eapvalidateserver is on.
Modify the global WLAN card settings using the options below.
When moving average RSSI from current AP is weaker than Roam Trigger, radio does a roam scan where it probes for an AP with a signal that is at least Roam Delta dBm stronger
When Roam Trigger is met, second AP's signal strength (RSSI) must be Roam Delta dBm stronger than moving average RSSI for current AP before radio will attempt to roam to second AP
After association or roam scan (with no roam), radio will collect RSSI scan data for Roam Period seconds before considering roaming
DFS channels support for 5GHz (802.11a/n)
When this setting is On and the current connection to an AP becomes tenuous, the radio scans for available APs more aggressively. Aggressive scanning complements and works in conjunction with the standard scanning that is configured through the Roam Trigger, Roam Delta, and Roam Period settings. Summit recommends that the Aggressive Scan global setting be On unless there is significant co-channel interference because of overlapping coverage from APs that are on the same channel.
- on – Use Cisco IE and CCX version number; support all CCX features
- optimized – Use Cisco IE and CCX version number; support all CCX features except AP-assisted roaming, AP-specified maximum transmit power, and radio management
- off – Do not use Cisco IE and CCX version number
Use of Wi-Fi Multimedia Extensions, also known as WMM
Auth Server type (1 – ACS, 2 – SBR)
Use main antenna only, use aux antenna only, or use diversity.
Use main antenna only, use aux antenna only, use diversity starting with the main antenna or use diversity starting with the aux antenna.
If packet size (in bytes) exceeds threshold, then packet is fragmented
Packet size above which RTS/CTS is required on link
The directory path to search for security certificates. Maximum of 64 characters.
When using b/g optimized mode (bg_lrs), setting this value restricts the radio to using and searching the specified channels. The value is given in hex, with bit 0 representing channel 1, and bit 12 representing channel 13. So to configure channels 1, 6 and 11, the channel value would be “0421”
The number of samples to be averaged together when computing RSSI
delay before sending out probes when AP's aren't located
Display the signal strength icon in the System Tray.
Enable or disable OPMK caching (OKC).
Should sensitive information such as passwords be displayed (on) or hidden with asterisks (off).
Is the administration password required to edit the radio settings with the Summit Configuration Utility.
The password required if adminrequire is on.
- Any string may be quoted to allow it to contain spaces or special characters, except that quote itself is not allowed in the string.
- As long is it is not within a quoted string, the following two special sequences may be used to insert the given value:
%s
– insert the terminal serial number. So to set the client name to the serial number of the terminal, you would use-client %s
%m
– insert the terminal RF MAC address. So to set the client name to DLM followed by the MAC address, you would use–client DLM%m