Cambium Networks 50450I Wireless Ethernet Bridge, Dual Channel OFDM MIMO Combination Access Point, Subscriber Station and Point to Point Equipment User Manual PMP PTP 450i Series User Guide

Cambium Networks Limited Wireless Ethernet Bridge, Dual Channel OFDM MIMO Combination Access Point, Subscriber Station and Point to Point Equipment PMP PTP 450i Series User Guide

User Guide Part 4

Chapter 7: Configuration Configuring security
Page 7-107
PTP 450i BHS display of BHM Evaluation Data parameter
Web, Telnet, FTP
Session Timeout
Enter the expiry in seconds for remote management sessions via
HTTP
,
telnet
, or
ftp
access to the AP/BHM.
IP Access Control You can permit access to the AP/BHM from any IP address (
IP Access
Filtering Disabled
) or limit it to access from only one, two, or three IP
addresses that you specify (
IP Access Filtering Enabled
). If you select
IP
Access Filtering Enabled
, then you must populate at least one of the
three
Allowed Source IP
parameters or have no access permitted from
any IP address
Allowed Source IP 1
to 3
If you selected
IP Access Filtering Enabled
for the
IP Access Control
parameter, then you must populate at least one of the three
Allowed
Source IP
parameters or have no access permitted to the AP from any IP
address. You may populate as many as all three.
If you selected
IP Access Filtering Disabled
for the
IP Access Control
parameter, then no entries in this parameter are read, and access from
all IP addresses is permitted.
Web Access The Radio supports secured and non-secured web access protocols.
Select suitable web access from drop down list:
HTTP Only
provides non-secured web access. The radio to be
accessed via http://<IP of Radio>.
HTTPs Only
provides a secured web access. The radio to be
accessed via https://<IP of Radio>.
HTTP and HTTPs
If enabled, the radio can be accessed via both http
and https.
SNMP This option allows to configure SNMP agent communication version. It
can be selected from drop down list :
SNMPv2c Only
Enables SNMP v2 community protocol.
SNMPv3 Only
Enables SNMP v3 protocol. It is a secured
communication protocol.
SNMPv2c and SNMPv3
It enables both the protocols.
Telnet This option allows to
Enable
and
Disable
Telnet access to the Radio.
FTP This option allows to
Enable
and
Disable
FTP access to the Radio.
TFTP This option allows to
Enable
and
Disable
TFTP access to the Radio.
Chapter 7: Configuration Configuring security
Page 7-108
Security page of SM
The security page of SM/BHS is explained in Table 90.
Table 91
Security attributes for SM
Chapter 7: Configuration Configuring security
Page 7-109
Attribute
Meaning
Authentication Key Only if the AP to which this SM will register requires authentication,
specify the key that the SM will use when authenticating. For alpha
characters in this hex key, use only upper case.
Select Key
The
Use Default Key
selection specifies the predetermined key for
authentication in Wireless Manager
The
Use Key above
selection specifies the 32-digit hexadecimal key that
is permanently stored on both the SM and the WM
Enforce
Authentication
The SM may enforce authentication types of
AAA
and
AP Pre-
sharedKey
. The SM will not finish the registration process if the AP is
not using the configured authentication method (and the SM locks out
the AP for 15 minutes).
Phase 1 The protocols supported for the
Phase 1
(Outside Identity) phase of
authentication are
EAPTTLS (Extensible Authentication Protocol
Tunneled Transport Layer
Security) or MSCHAPv2 (Microsoft
Challenge-Handshake Authentication Protocol version 2).
Phase 2 Select the desired
Phase 2
(Inside Identity) authentication protocol from
the
Phase 2
options of
PAP
(Password Authentication Protocol),
CHAP
(Challenge Handshake
Authentication
Protocol), and MSCHAP
Chapter 7: Configuration Configuring security
Page 7-110
(
Microsoft’s version of CHAP, version 2 is used). The protocol
must
be
consistent with the authentication protocol configured on the RADIUS
server.
Identity/Realm If Realms are being used, select
Enable Realm
and configure an outer
identity in the
Identity
field and a Realm in the
Realm
field. These must
match the Phase 1/Outer Identity and
Realm
configured in the RADIUS
server. The default
Identity
is anonymous”. The
Identity
can be
up
to
128 non-special (no diacritical markings) alphanumeric characters. The
default
Realm
is
“canopy.net”. The
Realm
can also be up to 128 non-
special alphanumeric
characters.
Configure an outer Identity in the
Username
field. This must match the
Phase
1/Outer
Identity username configured in the RADIUS server. The
default Phase 1/Outer
Identity
Username
isanonymous”. The
Username
can be up to 128 non-special (no
diacritical
markings)
alphanumeric
characters.
Username Enter a
Username
for the SM. This must match the username
configured for the SM on
the
RADIUS server. The default
Username
is
the SM’s MAC address. The
Username
can be up
to
128 non-special
(no diacritical markings) alphanumeric
characters.
Password Enter the desired password for the SM in the
Password
and
Confirm
Password
fields.
The
Password
must match the password configured
for the SM on the RADIUS server.
The
default
Password
is password”.
The
Password
can be up to 128 non-special (no
diacritical
markings)
alphanumeric
characters
Upload Certificate
File
To upload a certificate manually to a SM, first load it in a known place
on your PC
or
network
drive, then click on a
Delete
button on one of
the Certificate description blocks to delete a certificate to provide space
for your certificate. Click on
Choose File,
browse to
the
location of the
certificate, and click the
Import Certificate
button, and then reboot the
radio to use the new certificate.
When a certificate is in use, after the SM successfully registers to an
AP, an indication of
In
Use
will appear in the description block of the
certificate being
used.
The public certificates installed on the SMs are used with the private
certificate on the
RADIUS
server to provide a public/private key
encryption
system.
Up to 2 certificates can be resident on a SM. An installed certificate can
be deleted
by
clicking the
Delete
button in the certificate’s description
block on the Configuration >
Security
tab. To restore fhe 2 default
certificates, click the
Use Default Certificates
button in
the
RADIUS
Certificate Settings
parameter block and reboot the
radio.
Encryption Setting Specify the type of airlink security to apply to this SM. The encryption
Chapter 7: Configuration Configuring security
Page 7-111
setting must match the encryption setting of the AP.
None
provides no encryption on the air link.
DES
(Data Encryption Standard): An over-the-air link encryption option
that uses secret 56-bit keys and 8 parity bits. DES performs a series of
bit permutations, substitutions, and recombination operations on blocks
of data. DES encryption does not affect the performance or throughput
of the system.
AES
(Advanced Encryption Standard)
:
An over-the-air link encryption
option that uses the Rijndael algorithm and 128-bit keys to establish a
higher level of security than DES. AES products are certified as
compliant with the Federal Information Processing Standards (FIPS 197)
in the U.S.A.
Web, Telnet, FTP
Session Timeout
Enter the expiry in seconds for remote management sessions via HTTP,
telnet, or FTP access to the SM.
Ethernet Access
If you want to prevent any device that is connected to the Ethernet port
of the SM from accessing the management interface of the SM, select
Ethernet Access Disabled
. This selection disables access through this
port to via HTTP (the GUI), SNMP, telnet, FTP, and TFTP. With this
selection, management access is available through only the RF interface
via either an IP address (if
Network Accessibility
is set to
Public
on the
SM) or the Session Status or Remote Subscribers tab of the AP.
Note
This setting does not prevent a device connected to the
Ethernet port from accessing the management interface of
other SMs in the network. To prevent this, use the IP Access
Filtering Enabled selection in the IP Access Control
parameter of the SMs in the network. See IP Access Control
below.
If you want to allow management access through the Ethernet port,
select
Ethernet Access Enabled
. This is the factory default setting for this
parameter.
IP Access Control You can permit access to the SM from any IP address (
IP Access Filtering
Disabled
) or limit it to access from only one, two, or three IP addresses
that you specify (
IP Access Filtering Enabled
). If you select
IP Access
Filtering Enabled
, then you must populate at least one of the three
Allowed Source IP
parameters or have no access permitted from any IP
address
Allowed Source IP 1
to 3
If you selected
IP Access Filtering Enabled
for the
IP Access Control
parameter, then you must populate at least one of the three
Allowed
Source IP
parameters or have no access permitted to the SM from any IP
address. You may populate as many as all three.
If you selected IP Access Filtering Disabled for the IP Access Control
Chapter 7: Configuration Configuring security
Page 7-112
parameter, then no entries in this parameter are read, and access from
all IP addresses is permitted.
A subnet mask may be defined for each entry to allow for filtering
control based on a range of IP addresses.
Web Access The Radio supports secured and non-secured web access protocols.
Select suitable web access from drop down list:
HTTP Only
provides non-secured web access. The radio to be
accessed via http://<IP of Radio>.
HTTPs Only
provides a secured web access. The radio to be
accessed via https://<IP of Radio>.
HTTP and HTTPs
If enabled, the radio can be accessed via both http
and https.
SNMP This option allows to configure SNMP agent communication version. It
can be selected from drop down list :
SNMPv2c Only
Enables SNMP v2 community protocol.
SNMPv3 Only
Enables SNMP v3 protocol. It is secured
communication protocol.
SNMPv2c and SNMPv3
It enables both the protocols.
Telnet This option allows to
Enable
and
Disable
Telnet access to the Radio.
FTP This option allows to
Enable
and
Disable
FTP access to the Radio.
TFTP This option allows to
Enable
and
Disable
TFTP access to the Radio.
Security page of BHS
The Security page of BHS is explained in Table 90.
Chapter 7: Configuration Configuring security
Page 7-113
Table 92
Security attributes for BHS
Attribute
Meaning
Authentication Key Only if the BHM to which this BHS registers requires an authentication,
specify the key that the BHS will use when authenticating. For alpha
characters in this hex key, use only upper case.
Encryption Setting Specify the type of airlink security to apply to this BHS. The encryption
setting must match the encryption setting of the BHM.
None
provides no encryption on the air link.
DES
(Data Encryption Standard): An over-the-air link encryption option
that uses secret 56-bit keys and 8 parity bits. DES performs a series of
bit permutations, substitutions, and recombination operations on blocks
of data. DES encryption does not affect the performance or throughput
of the system.
AES
(Advanced Encryption Standard)
:
An over-the-air link encryption
option that uses the Rijndael algorithm and 128-bit keys to establish a
higher level of security than DES. AES products are certified as
compliant with the Federal Information Processing Standards (FIPS 197)
in the U.S.A.
Web, Telnet, FTP
Enter the expiry in seconds for remote management sessions via HTTP,
Chapter 7: Configuration Configuring security
Page 7-114
Session Timeout telnet, or FTP access to the BHS.
IP Access Control You can permit access to the BHS from any IP address (
IP Access
Filtering Disabled
) or limit it to access from only one, two, or three IP
addresses that you specify (
IP Access Filtering Enabled
). If you select
IP
Access Filtering Enabled
, then you must populate at least one of the
three
Allowed Source IP
parameters or have no access permitted from
any IP address
Allowed Source IP 1
to 3
If you selected
IP Access Filtering Enabled
for the
IP Access Control
parameter, then you must populate at least one of the three
Allowed
Source IP
parameters or have no access permitted to the BHS from any
IP address. You may populate as many as all three.
If you selected
IP Access Filtering Disabled
for the
IP Access Control
parameter, then no entries in this parameter are read, and access from
all IP addresses is permitted.
A subnet mask may be defined for each entry to allow for filtering
control based on a range of IP addresses.
Web Access The Radio supports secured and non-secured web access protocols.
Select suitable web access from drop down list:
HTTP Only
provides non-secured web access. The radio to be
accessed via http://<IP of Radio>.
HTTPs Only
provides a secured web access. The radio to be
accessed via https://<IP of Radio>.
HTTP and HTTPs
If enabled, the radio can be accessed via both http
and https.
SNMP This option allows to configure SNMP agent communication version. It
can be selected from drop down list :
SNMPv2c Only
Enables SNMP v2 community protocol.
SNMPv3 Only
Enables SNMP v3 protocol. It is secured
communication protocol.
SNMPv2c and SNMPv3
It enables both the protocols.
Telnet This option allows to
Enable
and
Disable
Telnet access to the Radio.
FTP This option allows to
Enable
and
Disable
FTP access to the Radio.
TFTP This option allows to
Enable
and
Disable
TFTP access to the Radio.
Chapter 7: Configuration Configuring radio parameters
Page 7-115
Configuring radio parameters
Radio configuration page on page 7-116
MIMO-A mode of operation for PMP 450i on page 7-134
Improved PPS performance of PMP 450i SMs on page 7-135
Chapter 7: Configuration Configuring radio parameters
Page 7-116
Radio configuration page
Radio page of AP
The
Radio
tab of the AP contains some of the configurable parameters that define how an AP
operates.
Note
Only the frequencies available for your region and the selected Channel bandwidth
(5/10/20) are displayed.
Table 93
AP Radio attributes
Chapter 7: Configuration Configuring radio parameters
Page 7-117
Attribute
Meaning
Frequency Band Select the desired operating frequency band.
Frequency Carrier Specify the frequency for the module to transmit. The default for this
parameter is
None
. For a list of channels in the band, see the drop-down
list on the radio GUI.
Alternate Frequency
Carrier 1 and 2
These parameters are displayed based on Regional Settings. Refer
Country on page 7-72
Channel Bandwidth The channel size used by the radio for RF transmission. The setting for
the channel bandwidth must match between the AP and the SM. The
supported Channel Bandwidths are 5, 10 and 20 MHz.
Cyclic Prefix OFDM technology uses a cyclic prefix, where a portion of the end of a
symbol (slot) is repeated at the beginning of the symbol to allow multi-
pathing to settle before receiving the desired data. A 1/16 cyclic prefix
means that for every 16 bits of throughput data transmitted, an
additional bit is used.
Frame Period Select the Frame Period in of the radio. The support Frame Periods are 5
ms and 2.5 ms.
Color Code
Specify a value from 0 to 254. For registration to occur, the color code of
the SM and the AP must match. Color code is not a security feature.
Instead, color code is a management feature, typically for assigning each
sector a different color code.
Color code allows you to force a SM to register to only a specific AP,
even where the SM can communicate with multiple APs. The default
setting for the color code value is 0. This value matches only the color
code of 0 (not all 255 color codes).
Subscriber Color
Code Rescan (When
not on a Primary
Color Code)
This timer may be utilized to initiate SM rescans in order to register to an
AP configured with the SM‘s primary color code.
The time (in minutes) for a subscriber to rescan (if this AP is not
configured with the SM‘s primary color code). This timer will only fire
once if the
Subscriber Color Code Wait Period for Idle
timer is
configured with a nonzero value and the
Subscriber Color Code Rescan
expires, the
Subscriber Color Code Wait Period for Idle
is started. If the
Subscriber Color Code Wait Period for Idle
timer is configured with a
zero value and the
Subscriber Color Code Rescan
timer expires, the SM
will immediately go into rescan mode
Subscriber Color
Code Wait Period for
Idle
The time (in minutes) for a subscriber to rescan while idle (if this AP is
not configured with the SM’s primary color code). This timer will fire
periodic events. The fired event determines if any RF unicast traffic
(either inbound or outbound) has occurred since the last event. If the
results of the event determine that no RF unicast traffic has occurred
(SM is idle), then the subscriber will rescan.
Chapter 7: Configuration Configuring radio parameters
Page 7-118
Installation Color
Code
With this feature enabled on the AP and SM, operators may install and
remotely configure SMs without having to configure matching color
codes between the modules. While the SM is accessible for
configuration from above the AP (for remote provisioning) and below
the SM (for local site provisioning), no user data is passed over the radio
link. When using the Installation Color Code feature, ensure that the SM
is configured with the factory default Color Code configuration (Color
Code 1 is “0”, Color Code 2-10 set to “0” and “Disable”). The status of
the Installation Color Code can be viewed on the AP Eval web GUI page,
and when the SM is registered using the Installation Color Code the
message “SM is registered via ICC Bridging Disabled!” is displayed in
red on every SM GUI page. The Installation Color Code parameter is
configurable without a radio reboot for both the AP and SM. If a SM is
registered via Installation Color Code and the feature is then disabled,
operators will need to reboot the SM or force it to reregister (i.e. using
Rescan APs functionality on the AP Eval page).
Max Range
Enter a number of miles (or kilometers divided by 1.61, then rounded to
an integer) for the furthest distance from which a SM is allowed to
register to this AP. Do not set the distance to any greater number of
miles. A greater distance
does not increase the power of transmission from the AP.
can reduce aggregate throughput.
Regardless of this distance, the SM must meet the minimum
requirements for an acceptable link. If the AP is in cluster, then you must
set this parameter on all other APs in the cluster exactly the same,
except as described in the NOTE admonition below. The default value of
this parameter is 2 miles (3.2 km).
Downlink Data
Specify the percentage of the aggregate throughput for the downlink
(frames transmitted from the AP to the subscriber). For example, if the
aggregate (uplink and downlink total) throughput on the AP is 90 Mb,
then 75% specified for this parameter allocates 67.5 Mb for the downlink
and 22.5 Mb for the uplink. The default for this parameter is 75%. This
parameter must be set in the range of 15% - 85%, otherwise the invalid
input will not be accepted and the previously-entered valid setting is
used.
Note
This setting does not prevent a device connected to the
Ethernet port from accessing the management interface of
other SMs in the network. To prevent this, use the IP Access
Filtering Enabled selection in the IP Access Control
parameter of the SMs in the network. See IP Access Control
below.
Contention Slots This field indicates the number of (reserved) Contention slots configured
Chapter 7: Configuration Configuring radio parameters
Page 7-119
(a.k.a. Control Slots) by the operator. The SM uses reserved Contention slots and unused data
slots for bandwidth requests. See Contention slots on page 7-129.
Broadcast Repeat
Count
The default is 2 repeats (in addition to the original broadcast packet, for
a total of 3 packets sent for every one needed), and is settable to 1 or 0
repeats (2 or 1 packets for every broadcast).
ARQ (Automatic Repeat reQuest) is not present in downlink broadcast
packets, since it can cause unnecessary uplink traffic from every SM for
each broadcast packet. For successful transport without ARQ, the AP
repeats downlink broadcast packets. The SMs filter out all repeated
broadcast packets and, thus, do not transport further.
The default of 2 repeats is optimum for typical uses of the network as an
internet access system. In applications with heavy download broadcast
such as video distribution, overall throughput is significantly improved
by setting the repeat count to 1 or 0. This avoids flooding the downlink
with repeat broadcast packets.
Transmitter Output
Power
This value represents the combined power of the AP’s two transmitters.
Nations and regions may regulate transmitter output power. For
example
5.4 GHz and 5.8 GHz modules are available as connectorized radios,
which require the operator to adjust power to ensure regulatory
compliance.
The professional installer of the equipment has the responsibility to
maintain awareness of applicable regulations.
calculate the permissible transmitter output power for the module.
confirm that the initial power setting is compliant with national or
regional regulations.
confirm that the power setting is compliant following any reset of
the module to factory defaults.
External Gain This value needs to correspond to the published gain of the antenna
used to ensure the radio will meet regulatory requirements.
SM Receive Target
Level
Each SM’s Transmitter Output Power is automatically set by the AP. The
AP monitors the received power from each SM, and adjusts each SM’s
Transmitter Output Power so that the received power at the AP from that
SM is not greater what is set in this field. This value represents the
transmitted and received power (combined power) perceived on the SM.
Multicast VC Data
Rate
This pull down menu of the Multicast Data Control screen helps in
configuring multicast packets to be transmitted over a dedicated channel
at a configurable rate of 1X, 2X, 4X or 6X. The default value is “Disable”.
If set to the default value, all multicast packets are transmitted over the
Broadcast VC data path. This feature is available only for the PMP 450
and is not backward compatible with PMP 430 series of radios.
Chapter 7: Configuration Configuring radio parameters
Page 7-120
Multicast Repeat
Count
This value is the number of packets that are repeated for every multicast
VC packet received on the AP (located under
Radio
tab of
Configuration
).
Multicast (like Broadcast) packets go over a VC that is shared by all SMs,
so there is no guaranteed delivery. The repeat count is an attempt to
improve the odds of the packets getting over the link. If the user has
issues with packets getting dropped, they can use this parameter to
improve the performance at the cost of the overall throughput possible
on that channel. The default value is 0.
Multicast Downlink
CIR
This value is the committed information rate for the multicast downlink
VC (located under the
Radio
tab of
Configuration
). The default value is 0
kbps. The range of this parameter is based on the number of repeat
counts. The higher the repeat count, the lower the range for the
multicast downlink CIR.
Receive Quality
Debug
To aid in link performance monitoring, the AP and SM now report the
number of fragments received per modulation (i.e. QPSK, 16-QAM, 64-
QAM) and per channel (polarization).
Note
Due to CPU load, this will slightly degrade packet per second
processing.
Chapter 7: Configuration Configuring radio parameters
Page 7-121
Radio page of BHM
The
Radio
page of BHM is explained in Table 93.
Table 94
Radio page attributes - BHM
Chapter 7: Configuration Configuring radio parameters
Page 7-122
Attribute
Meaning
Frequency Band Select the operating frequency band of the radio. The supported bands
are 4.9 GHz, 5.4 GHz and 5.7 GHz.
Frequency Carrier Specify the frequency for the module to transmit. The default for this
parameter is
None
. For a list of channels in the band, see the drop-down
list on the radio GUI.
Channel Bandwidth The channel size used by the radio for RF transmission. The setting for
the channel bandwidth must match between the BHM and the BHS.
Cyclic Prefix OFDM technology uses a cyclic prefix, where a portion of the end of a
symbol (slot) is repeated at the beginning of the symbol to allow multi-
pathing to settle before receiving the desired data. A 1/16 cyclic prefix
means that for every 16 bits of throughput data transmitted, an
additional bit is used.
Frame Period Select the Frame Period of the radio. The support Frame Periods are : 5
ms and 2.5 ms.
Color Code Specify a value from 0 to 254. For registration to occur, the color code of
the BHM and the BHS must match. Color code is not a security feature.
Instead, color code is a management feature, typically for assigning each
link a different color code.
Color code allows you to force a BHS to register to only a specific BHM.
The default setting for the color code value is 0. This value matches
only the color code of 0 (not all 255 color codes).
Large VC data Q
Enable
Large VC Q for applications that burst data high rates. Large Qs
may decrease effective throughput for TCP application.
Disable
Large VC Q if application need not handle bursts of data. Large
Qs may decrese effective throughput for TCP application.
Downlink Data
Specify the percentage of the aggregate throughput for the downlink
(frames transmitted from the BHM to the subscriber). For example, if the
aggregate (uplink and downlink total) throughput on the BHM is 132
Mbps, then 75% specified for this parameter allocates 99 Mbps for the
downlink and 33 Mbps for the uplink. The default for this parameter is
50%. This parameter must be set in the range of 15% - 85%, otherwise
the invalid input will not be accepted and the previously-entered valid
setting is used.
Note
In order to prevent self-interference, the frame
configuration needs to align. This includes Downlink Data,
Max Range and Contention slots.
Transmit Power
This value represents the combined power of the BHM’s two
transmitters.
Chapter 7: Configuration Configuring radio parameters
Page 7-123
Nations and regions may regulate transmit power. For example
PTP 450i modules are available as connectorized radios, which
require the operator to adjust power to ensure regulatory
compliance.
The professional installer of the equipment has the responsibility to:
Maintain awareness of applicable regulations.
Calculate the permissible transmitter output power for the module.
Confirm that the initial power setting is compliant with national or
regional regulations.
Confirm that the power setting is compliant following any reset of the
module to factory defaults.
External Gain This value needs to correspond to the published gain of the antenna
used to ensure the radio will meet regulatory requirements.
Frame Alignment
Legacy Mode
Enabled (Leacy Mode, no alignment): This is to enable Frame alignment
Legacy mode.
Disabled: This is to disable Frame Alignment Legacy Mode.
By default this is recommended to be left enabled. However, if GPS sync
problems are found, please contact support for use of this option.
Receive Quality
Debug
To aid in link performance monitoring, the BHM and BHS now report the
number of fragments received per modulation (i.e. QPSK, 16-QAM, 64-
QAM, 256-QAM) and per channel (polarization).
Note
Due to CPU load, this slightly degrades the packet during
per second processing.
Radio page of SM
The
Radio
page of SM is explained in Table 94.
Chapter 7: Configuration Configuring radio parameters
Page 7-124
Table 95
Radio attributes - SM
Chapter 7: Configuration Configuring radio parameters
Page 7-125
Attribute
Meaning
Custom Radio
Frequency Scan
Selection List
Check the frequencies that SM has to scan for AP transmissions. See
Radio Frequency Scan Selection List on page 7-129.
Channel Bandwidth
Scan
The channel size used by the radio for RF transmission.
Note
Selecting multiple channel bandwidths will increase
registration and re-registration times
.
Cyclic Prefix Scan The cyclic prefix for which AP scanning is executed.
AP Selection Method Operators may configure the method by which a scanning SM selects an
AP. By default, AP Selection Method is set to “Optimize for Throughput”,
which has been the mode of operation in releases prior to 12.0.3.1.
Power Level
: AP selection based solely on power level
or
Optimize for Throughput
: AP selection based on throughput
optimization the selection decision is based on power level (which
affects the modulation state), channel bandwidth (which affects
throughput) and number of SM registrations to the AP (which affects
system contention performance).
Color Code 1 Color code allows you to force the SM to register to only a specific AP,
even where the SM can communicate with multiple APs. For registration
to occur, the color code of the SM and the AP must match. Specify a
value from 0 to 254.
Color code is not a security feature. Instead, color code is a management
feature, typically for assigning each sector a different color code.
The default setting for the color code value is 0. This value matches only
the color code of 0 (not all 255 color codes).
SMs may be configured with up to 20 color codes. These color codes can
be tagged as
Primary
,
Secondary
, or
Tertiary
, or
Disable
. When the SM
is scanning for APs, it will first attempt to register to an AP that matches
one of the SM’s primary color codes. Failing that, the SM will continue
scanning and attempt to register to an AP that matches one of the SM’s
secondary color codes. Failing that, the SM will continue scanning and
attempt to register to an AP that matches one of the SM’s tertiary color
codes. This is all done in the scanning mode of the SM and will repeat
until a registration has occurred.
Color codes in the same priority group are treated equally. For example,
all APs matching one of the SM’s primary color codes are analyzed
equally. Likewise, this evaluation is done for the secondary and tertiary
groups in order. The analysis for selecting an AP within a priority group
is based on various inputs, including signal strength and number of SMs
Chapter 7: Configuration Configuring radio parameters
Page 7-126
already registered to each AP.
The first color code in the configuration is the pre-Release 9.5 color code.
Thus, it is always a primary color code for legacy reasons.
The color codes can be disabled, with the exception of the first color
code.
Installation Color
Code
With this feature enabled on the AP and SM, operators may install and
remotely configure SMs without having to configure matching color
codes between the modules. When using the Installation Color Code
feature, ensure that the SM is configured with the factory default Color
Code configuration (Color Code 1 is “0”, Color Code 2-10 set to “0” and
“Disable”). The status of the Installation Color Code can be viewed on
the AP Eval web GUI page, and when the SM is registered using the
Installation Color Code the message “SM is registered via ICC Bridging
Disabled!” is displayed in red on every SM GUI page. The Installation
Color Code parameter is configurable without a radio reboot for both the
AP and SM.
External Gain This value represents the antenna gain.
For ODUs with integrated antenna, this is set at te correct value in the
factory.
For Connectorized ODUs with external antenna, the user must set this
value to the overall antenna gain, including any RF cable loss between
the ODU and the antenna.
Large VC data Queue AP and BH have a configurable option used to prevent packet loss in the
uplink due to bursting IP traffic. This is designed for IP burst traffic
particular to video surveillance applications.
Receive Quality
Debug
To aid in link performance monitoring, the AP and SM now report the
number of fragments received per modulation (i.e. QPSK, 16-QAM, 64-
QAM) and per channel (polarization).
Note
Due to CPU load, this will slightly degrade packet per
second processing.
Note
The frequencies that a user can select are controlled by the country or a region and the
Channel Bandwidth selected. There can be a case where a user adds a custom
frequency (from the Custom Frequencies page on page 7-133) and cannot see it in the
pull down menu.
Chapter 7: Configuration Configuring radio parameters
Page 7-127
Radio page of BHS
The
Radio
page of BHS is explained in Table 95.
Table 96
Radio attributes - BHS
Attribute
Meaning
Custom Radio
Frequency Scan
Selection List
Check any frequency that you want the BHS to scan for BHM
transmissions. See Radio Frequency Scan Selection List on page 7-129.
Channel Bandwidth
Scan
The channel size used by the radio for RF transmission.
Note
Selecting multiple channel bandwidths will increase
registration and re-registration times
.
Chapter 7: Configuration Configuring radio parameters
Page 7-128
Cyclic Prefix Scan The cyclic prefix for which BHM scanning is executed.
Color Code Color code allows to force the BHS to register to only a specific BHM,
even where the BHS can communicate with multiple BHMs. For
registration to occur, the color code of the BHS and the BHM must
match. Specify a value from 0 to 254.
The color codes can be disabled, with the exception of the first color
code.
Large VC data Q BHM and BHS have a configurable option used to prevent packet loss in
the uplink due to bursting IP traffic. This is designed for IP burst traffic
particular to video surveillance applications.
Transmit Power This field lists the current combined transmit power level, in dBm.
External Gain This value represents the antenna gain.
For ODUs with integrated antenna, this is set at te correct value in the
factory.
For Connectorized ODUs with external antenna, the user must set this
value to the overall antenna gain, including any RF cable loss between
the ODU and the antenna.
Receive Quality
Debug
To aid in link performance monitoring, the BHM and BHS now report the
number of fragments received per modulation (i.e. QPSK, 16-QAM, 64-
QAM) and per channel (polarization).
Note
Due to CPU load, this will slightly degrade packet per
second processing.
Chapter 7: Configuration Configuring radio parameters
Page 7-129
Contention slots
The SM uses reserved Contention slots and unused data slots for bandwidth requests.
Uplink Data Slots are used first for data. If they are not needed for data in a given frame, the
remaining data slots can be used by the SMs for bandwidth requests. This allows SMs in sectors
with a small number of Contention slots configured to still successfully transmit bandwidth
requests using unused data slots.
A higher number of Contention slots give higher probability that a SM’s bandwidth request is
correctly received when the system is heavily loaded, but with the tradeoff that sector capacity is
reduced, so there is less capacity to handle the request. The sector capacity reduction is about 200
kbps for each Contention slot configured in a 20 MHz channel at QPSK MIMO-A modulation. The
reduction in sector capacity is proportionally higher at MIMO-B modulations (2 times at QPSK
MIMO-B, 4 times at 16 QAM MIMO-B, 6 times at 64 QAM MIMO-B and 8 times at 256 QAM MIMO-
B). If very few reserved Contention slots are specified, then latency increases in high traffic
periods. If too many are specified, then the maximum capacity is unnecessarily reduced.
The suggested Contention slot settings as a function of the number of active VCs in the sector are
shown in the table below.
Table 97
Contention slots and number of VCs
Number of VCs
Recommended Number of Contention slots
1 to 10 3
11 to 50 4
51 to 150 6
151 and above 8
Note that each SM uses one or two VCs. All SMs have a Low Priority Channel that uses one VC; if
the High Priority Channel is enabled for the SM, then the SM uses a second VC. Therefore the
number of active VCs in a sector is greater than or equal to the number of SMs registered to the
AP in the sector. For example, a network including 20 SMs with High Priority Channel disabled and
20 SMs with High Priority Channel enabled has 60 active VCs and may be configured with 6
Contention slots.
In a typical cluster, each AP must be set to the same number of Contention slots to assure proper
timing in the send and receive cycles. However, where high incidence of small packets exists, as in
a sector that serves several VoIP streams, additional Contention slots may provide better results.
For APs in a cluster of mismatched Contention slots setting, or where PMP 450 is collocated with
radios using different technologies, like PMP 430 or FSK, in the same frequency band, use the
frame calculator. To download the PMP 450 Contention Slots Paper, see
http://www.cambiumnetworks.com/solution-papers/pmp-450-contention-slots.
Radio Frequency Scan Selection List
The SM or BHS scans complete spectrum as per Full Spectrum Band Scan feature. SMs or BHS
first boot into the smallest selected channel bandwidth (10 MHz, if selected) and scan all selected
frequencies across both the 5.4 GHz and 5.7 GHz frequency bands.
Chapter 7: Configuration Configuring radio parameters
Page 7-130
After this scan, if a wider channel bandwidth is selected (20 MHz), the SM/BHS automatically
changes to 20 MHz channel bandwidth and then scans for APs/BHSs. After the SM/BHS finishes
this final scan it will evaluate the best AP/BHM with which to register. If required for registration,
the SM/BHS changes its channel bandwidth back to 10 MHz to match the best AP/BHM.
The SM/BHS will attempt to connect to an AP/BHM based on power level (which affects the
modulation state), channel bandwidth (which affects throughput) and number of SM/BHS
registrations to the AP/BHM (which affects system contention performance).
If it is desired to prioritize a certain AP/BHM over other available APs/BHMs, operators may use the
Color Code Priority feature on the SM/BHS. Utilization of the Color Code feature on the AP/BHM is
recommended to further constrain the AP selection.
If the SM does not find any suitable APs/BHMs for registration after scanning all channel
bandwidths, the SM restarts the scanning process beginning with the smallest configured channel
bandwidth.
Selecting multiple frequencies and multiple channel bandwidths impacts the SM/BHS scanning
time. The biggest consumption of time is in the changing of the SM/BHS channel bandwidth
setting.
The worst case scanning time is approximately two minutes after boot up (SM/BHS with all
frequencies and channel bandwidths selected and registering to an AP/BHM at 10 MHz). If only one
channel bandwidth is selected the time to scan all the available frequencies and register to an
AP/BHM is approximately one minute after boot up.
Other scanning features such as Color Code, Installation Color Code, and RADIUS authentication
are unaffected by the Full Band Scan feature.
Dedicated Multicast Virtual Circuit (VC)
A Multicast VC allows to configure multicast packets to be transmitted over a dedicated channel at
a configurable rate of 1X, 2X, 4X or 8X. This feature is available only for the PMP 450 and PMP 450i
and is not backward compatible with PMP 430 series of radios.
To configure Multicast VC, the AP must have this enabled. This can be enabled in the “Multicast
Data Control” section (under
Configuration >
Radio
page). The default value is “Disable”. If set to
the default value, all multicast packets are transmitted over the Broadcast VC data path. To enable,
select the data rate that is desired for the Multicast VC Data Rate parameter and click
Save
Changes
button. The radio requires no reboot after any changes to this parameter.
The multicast VC allows three different parameters to be configured on the AP. These can be
changed on the fly and are saved on the flash memory.
Chapter 7: Configuration Configuring radio parameters
Page 7-131
Note
If the Multicast VC Data Rate is set to a modulation that the radio is not currently
capable of or operates in non-permitted channel conditions, multicast data is sent but
not received.
Ex: If Multicast VC Data Rate is set to 6x and the channel conditions only permit 4x
mode of operation, then multicast data is sent at 6x modulation but the SM will not
receive the data.
Note
Actual Multicast CIR honored by the AP = Configured Multicast CINR/ (Multicast
Repeat Count + 1).
Increasing the Multicast data rate has no impact on the Unicast data rate.
For multicast and unicast traffic mix scenario examples, see Table 97.
Table 98
Example for mix of multicast and unicast traffic scenarios
Repeat
Count
Multicast Data
Rate (Mbps)
Unicast Data
Rate (Mbps)
Aggregate DL Data
Rate (Mbps)
0 10 40 50
1 5 40 45
2 3.33 40 43.33
The statistics have been added to the
Data VC
page (under
Statistics >
Data VC
). The table displays
the multicast row on the PMP 450i AP. The SM displays the multicast row if it is a PMP 450i.
Figure 70
Multicast VC statistics
The AP and SM display Transmit and Receive Multicast Data Count (under the
Statistics >
Scheduler
page), as shown in Figure 71.
Chapter 7: Configuration Configuring radio parameters
Page 7-132
Figure 71
Multicast scheduler statistics
Chapter 7: Configuration Configuring radio parameters
Page 7-133
Custom Frequencies page
In addition to the
Radio
tab, AP/SM/BH has another tab called
Custom Frequencies
as shown in
Table 98.
The custom frequency tab allows to configure custom frequency at 1 KHz raster. It means that the
custom frequencies can be at granularity of 1 KHz e.g. 4910.123 MHz, 4922.333 MHz, 4933.421 MHz
etc..
Note
Ensure that a customer frequency exists before using SNMP to set the radio to a
Custom Frequency.
Table 99
Custom Frequencies AP/SM/BH
Attribute
Meaning
Custom Frequency
Configuration
Custom frequencies with a channel raster of 1 KHz can be added from
the available range by keying in the frequency and then clicking the
Add
Frequency
button. Click
Remove Frequency
button to delete a specific
frequency keyed in the text box.
Click
Default Frequencies
button to add a pre-defined list of frequencies
that can be used in this band. This list can be reduced or increased by
manually removing or adding other custom frequencies.
Custom Frequencies Displays the complete list of user configured custom frequencies.
Chapter 7: Configuration Configuring radio parameters
Page 7-134
MIMO-A mode of operation for PMP 450i
PMP/PTP 450i supports MIMO-B mode using the following modulation levels: QPSK, 16-QAM, 64-
QAM and 256-QAM. System Release 13.2 introduces MIMO-A mode of operation using the same
modulation levels as the MIMO-B mode. With MIMO-B, the PMP/PTP 450i radio sends different
streams of data over the two antennas whereas with MIMO-A, the PMP/PTP 450i radio uses a
scheme that tries to optimize coverage by transmitting the same data over both antennas. This
redundancy improves the signal to noise ratio at the receiver making it more robust, at the cost of
throughput.
In addition to introducing MIMO-A modes, improvements have been made to the existing rate
adapt algorithm to switch between MIMO-A and MIMO-B seamlessly without any intervention or
added configuration by the operator. The various modulation levels used by the PMP 450 are
shown in Table 99.
Table 100
PMP/PTP 450i Modulation levels
Rate
MIMO-B
MIMO-A
QPSK 2X MIMO-B 1X MIMO-A
16-QAM 4X MIMO-B 2X MIMO-A
64-QAM 6X MIMO-B 3X MIMO-A
265-QAM 8X MIMO-B 4X MIMO-A
System Performance
For System Performance details of all the PMP/PTP 450i products please refer the Link Capacity
Planner at:
https://support.cambiumnetworks.com/files/pmp450.
Table 101
Co-channel Interference per (CCI) MCS, PMP/PTP 450i
MCS of Victim
MCS of Interferer
Channel BW
CCI
1X (QPSK SISO) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 10 dB
2X (16-QAM SISO) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 17 dB
3X (64-QAM SISO) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 25 dB
1X (QPSK MIMO-A) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 7 dB
2X (16-QAM MIMO-A) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 14 dB
3X (64-QAM MIMO-A) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 22 dB
4X (256-QAM MIMO-A) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 30 dB
Chapter 7: Configuration Configuring radio parameters
Page 7-135
2X (QPSK MIMO-B) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 10 dB
4X (16-QAM MIMO-B) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 17 dB
6X (64-QAM MIMO-B) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 25 dB
8X (256-QAM MIMO-B) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz 33 dB
Table 102
Adjacent Channel Interference (ACI) per MCS, PMP/PTP 450i
MCS of Victim
MCS of Interferer
Channel BW
ACI
Guard Band
1X (QPSK SISO) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -16 dB None
2X (16-QAM SISO) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -16 dB None
3X (64-QAM SISO) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -16 dB None
1X (QPSK MIMO-A) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -13 dB None
2X (16-QAM MIMO-A) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -13 dB None
3X (64-QAM MIMO-A) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -13 dB None
4X (256-QAM MIMO-A) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -10 dB None
2X (QPSK MIMO-B) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -16 dB None
4X (16-QAM MIMO-B) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -16 dB None
6X (64-QAM MIMO-B) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -16 dB None
8X (256-QAM MIMO-B) 6X (64-QAM MIMO-B) 5, 10 or 20 MHz -10 dB None
Guard Band
No Guard Bands are needed for the 5.4 GHz and 5.8 GHz bands.
Improved PPS performance of PMP 450i SMs
The PMP 450i provides improved packets per second (PPS) performance with regards to the PMP
450. Through hardware and software enhancements, the PPS performance of the PMP 450i AP has
been improved to 40000 packets/second, measured through a standard RFC2544 test using 64
bytes packets. With this enhancement, operators are able to provide higher bandwidth including
better VoIP and video services to end customers using existing SM deployments.
Chapter 7: Configuration Setting up SNMP agent
Page 7-136
Setting up SNMP agent
Operators may use SNMP commands to set configuration parameters and retrieve data from the
AP and SM modules. Also, if enabled, when an event occurs, the SNMP agent on the
PMP/PTP 450i sends a trap to whatever SNMP trap receivers configured in the management
network.
SNMPv2c
SNMPv3
Page 7-137
Configuring SNMP
The SNMP page configuration is explained below.
Note
The SNMP page for AP, SM, BHM and BHS has the same parameter attributes.
SNMP page AP/SM/BHM/BHS
The SNMP page is explained in Table 102.
Table 103
SNMP page attributes
Chapter 7: Configuration Setting up SNMP agent
Page 7-138
Attribute
Meaning
SNMP Community
String 1
Specify a control string that can allow a Network Management Station
(NMS) to access SNMP information. No spaces are allowed in this string.
The default string is
Canopy
.
SNMP Community
String 1 Permissions
You can designate the
SNMP Community String 1
to be the password
for WM, for example, to have
Read / Write
access to the module via
SNMP or for all SNMP access to the module to be
Read Only
.
SNMP Community
String 2 (Read Only)
Specify an additional control string that can allow a Network
Management Station (NMS) to read SNMP information. No spaces are
allowed in this string. The default string is
Canopyro
. This password will
never authenticate a user or an NMS to read/write access.
The
Community String
value is clear text and is readable by a packet
monitor. Additional security derives from the configuration of the
Accessing Subnet
,
Trap Address
, and
Permission
parameters.
Engine ID The Engine ID may be between 5 and 32 hex characters. The hex
character input is driven by RFC 3411 recommendations on the Engine
ID. The default Engine ID is the MAC address of the device
SNMPv3 Security
Level
Specify security model where users are defined and authenticated
before granting access to any SNMP service. Each device can configure
the security level of SNMPv3 to No authentication/No privacy,
Authentication/No privacy, or Authentication/Privacy.
SNMPv3
Authentication
Protocol
Currently, the SNMPv3 authentication protocol
MD5
is supported.
SNMPv3 Privacy
Protocol
Currently, the SNMPv3 privacy protocol
CBC-DES
is supported.
SNMPv3 Read-Only
User
This filed allows for a read-only user per devices. The default values for
the Read-Only users is:
Username = Canopyro
Authentication Password = authCanopyro
Privacy Password = privacyCanopyro
SNMPv3 Read/Write
Read-write user by default is disabled. The default values for the
Chapter 7: Configuration Setting up SNMP agent
Page 7-139
User Read/Write users is :
Username = Canopy
Authentication Password = authCanopy
Privacy Password = privacyCanopy
SNMPv3 Trap
Configuration
When enabling transmission of SNMPv3 traps the read-only or read-
write user credentials must be used and selected properly in order for
the SNMP manager to correctly interpret the traps. By default
transmission of SNMPv3 traps is disabled and all traps sent from the
radios are in SNMPv2c format.
Accessing IP /
Subnet Mask 1 to 10
Specify the addresses that are allowed to send SNMP requests to this
AP. The NMS has an address that is among these addresses (this
subnet). You must enter both
The network IP address in the form xxx.xxx.xxx.xxx
The CIDR (Classless Interdomain Routing) prefix length in the form
/xx
For example:
the /16 in 198.32.0.0/16 specifies a subnet mask of 255.255.0.0 (the
first 16 bits in the address range are identical among all members of
the subnet).
192.168.102.0 specifies that any device whose IP address is in the
range 192.168.102.0 to 192.168.102.254 can send SNMP requests to
the AP, presuming that the device supplies the correct
Community
String
value.
The default treatment is to allow all networks access. For more
information on CIDR, execute an Internet search on “Classless
Interdomain Routing.” You are allowed to specify as many as 10
different accessing IP address, subnet mask combinations.
RECOMMENDATION:
The subscriber can access the SM/BHS by changing the subscriber
device to the accessing subnet. This hazard exists because the
Community String
and
Accessing Subnet
are both visible parameters.
To avoid this hazard, configure the SM/BHS to filter (block) SNMP
requests.
SNMP Trap Server
DNS Usage
The management DNS domain name may be toggled such that the
name of the trap server only needs to be specified and the DNS domain
name is automatically appended to that name. The default SNMP trap
server addresses for all 10 available servers is 0.0.0.0 with the appending
of the DNS domain name disabled.
Trap Address 1 to 10 Specify ten or fewer IP addresses (xxx.xxx.xxx.xxx) or DNS names to
which SNMP traps must be sent. Traps inform Wireless Manager or an
NMS that something has occurred. For example, trap information is sent
Chapter 7: Configuration Setting up SNMP agent
Page 7-140
after a reboot of the module.
when an NMS attempts to access agent information but either
supplied an inappropriate community string or SNMP version
number.
is associated with a subnet to which access is disallowed.
Trap Enable, Sync
Status
If the sync status traps (sync lost and sync regained) have to be sent to
Wireless Manager or an NMS, select
Enabled
. If these traps have to be
suppressed, select
Disabled
.
Trap Enable, Session
Status
If you want session status traps sent to Wireless Manager or an NMS,
select
Enabled
.
Site Information
Viewable to Guest
Users
Operators can enable or disable site information from appearing when a
user is in GUEST account mode.
Site Name Specify a string to associate with the physical module. This parameter is
written into the sysName SNMP MIB-II object and can be polled by
Wireless Manager or an NMS. The buffer size for this field is 128
characters.
Site Contact Enter contact information for the module administrator. This parameter
is written into the sysContact SNMP MIB-II object and can be polled by
Wireless Manager or an NMS. The buffer size for this field is 128
characters.
Site Location Enter information about the physical location of the module. This
parameter is written into the sysLocation SNMP MIB-II object and can be
polled by Wireless Manager or an NMS. The buffer size for this field is
128 characters.
Chapter 7: Configuration Configuring syslog
Page 7-141
Configuring syslog
PMP/PTP 450i includes enhancements to the existing Syslog functionality.
Syslog event logging
Configuring system logging
Page 7-142
Syslog event logging
Following events are logged in syslog as explained in Table 103.
Table 104
Syslog parameters
Attribute
Meaning
Timestamp All syslog messages captured from the radio have a timestamp.
Configuration
Changes
This includes any device setting that has changed and includes the old
or new parameter value, including the device reboots.
User Login and
Logout Syslog records each user login and logout, with username.
Add or Delete of user
accounts through
GUI and SNMP
Syslog captures any user accounts that are added or deleted.
Spectrum Analysis Syslog records a message every time Spectrum Analysis runs.
Note
Since the AP/BHM must be set to a SM/BHS for Spectrum
Analysis, syslog messages are not reported from the radio
until the scan is done and the radio mode is switched back
to AP/BHM.
Link Test Syslog records a message every time a Link Test is run.
Clear Statistics Syslog sends a message when Statistics are cleared. This is done
individually for each statistics page that is cleared.
SM Register or De-
register Syslog records a message when a SM registers or deregisters.
BHS Connect or
Disconnect Syslog records a message when a BHS connects or disconnects.
Configuring system logging
To configure system logging, select the menu option
Configuration >
Syslog
.
Syslog page of AP/BHM
The Syslog Configuration page for AP/BHM is shown in Table 104.
Chapter 7: Configuration Configuring syslog
Page 7-143
Table 105
Syslog Configuration attributes - AP
Attribute
Meaning
Syslog DNS Server Usage
To configure the AP/BHM to append or not append the DNS server
name to the syslog server name.
Syslog Server The dotted decimal or DNS name of the syslog server address.
Syslog Server Port The syslog server port (default 514) to which syslog messaging is
sent.
AP Syslog Transmit
Or BHM Syslog Transmit When enabled, syslog messages are sent from the AP/BHM.
SM Syslog Transmit
Or BHS Syslog Transmit
When enabled, syslog messages are sent from all the registered
SMs/BHS, unless they are individually set to override this.
Syslog Minimum Level
This provides a selection for the minimum syslog message severity
that is sent to the syslog server. Values range from fatal (highest
severity and least verbose) to info (lowest severity, maximum
verbosity).
For example: If the Syslog Minimum Level is set to notice, then only
messages with severity notice and above are sent.
Syslog page of SM
To configure system logging, select the menu option
Configuration > Syslog
. The Syslog
Configuration page is shown in Table 105.
Chapter 7: Configuration Configuring syslog
Page 7-144
Table 106
Syslog Configuration attributes -SM
Attribute
Meaning
Syslog Configuration
Source
This control determines whether the SM will attempt to use the syslog
server definition from the AP, or whether it will use a local server
definition.
When set to
AP preferred, use local when AP configuration unavailable
,
and if the SM can register with an AP, then it uses the syslog server
defined on that AP. If the SM cannot register then it will syslog to its
locally defined syslog server through its wired connection, if any.
When set to
Local only
the SM ignores the AP’s definition of the syslog
server and allows the syslog server to be configured individually for
each SM.
Syslog DNS Server
Usage
To configure the SM to append or not the DNS server name to the
syslog server name.
Syslog Server The dotted decimal or DNS name of the syslog server address.
Syslog Server Port The syslog server port (default 514) to which syslog messaging is sent.
Syslog Transmission Controls the SMs ability to transmit syslog messages. When set to
“Learn from AP” the AP will control whether this SM transmits syslog
messages. When set to “enable” or “disable” the SM will control
whether it sends syslog messages. This allows an operator to override
the AP settings for individual SMs in a sector.
Syslog Minimum
Level Source
This control determines whether the SM attempts to use the minimum
syslog level defined by the AP, or whether it uses a local defined value
using the “Syslog Minimum Level” parameter.
When set to “AP preferred, use local when AP configuration
unavailable”, and if the SM can register with an AP, then it uses the
Syslog Minimum Level defined on that AP. If the SM cannot register
then it uses its own Syslog Minimum Level setting.
When set to “Local only” the SM will always use its own Syslog
Minimum Level setting and ignores the AP’s setting.
Chapter 7: Configuration Configuring syslog
Page 7-145
Syslog Minimum
Level
This provides a selection for the minimum syslog message severity that
is sent to the syslog server. Values range from fatal (highest severity and
least verbose) to info (lowest severity, maximum verbosity).
For example: If the Syslog Minimum Level is set to notice, then only
messages with severity notice and above are sent.
Syslog page of BHS
The Syslog Configuration page is shown in Table 106.
Table 107
Syslog Configuration attributes -BHS
Attribute
Meaning
Syslog Configuration
Source
This control determines whether the BHS will attempt to use the syslog
server definition from the BHM, or whether it will use a local server
definition.
When set to
BHM preferred, use local when BHM configuration
unavailable
, and if the BHS can register with a BHM, then it uses the
syslog server defined on that BHM. If the BHS cannot register then it
will syslog to its locally defined syslog server through its wired
connection, if any.
When set to
Local only
the BHS ignores the BHM’s definition of the
syslog server and allows the syslog server to be configured
individually for each BHS.
Syslog DNS Server
Usage
To configure the BHS to append or not to append the DNS server name
to the syslog server name.
Syslog Server The dotted decimal or DNS name of the syslog server address.
Syslog Server Port The syslog server port (default 514) to which syslog messaging is sent.
Syslog Transmission Controls the BHSs ability to transmit syslog messages. When set to
Learn from BHM
the BHM will control whether this BHS transmits
syslog messages. When set to
enable
or
disable
the BHS will control
whether it sends syslog messages. This allows an operator to override
Chapter 7: Configuration Configuring syslog
Page 7-146
the BHM settings for individual BHSs in a sector.
Syslog Minimum
Level Source
This control determines whether the BHS attempts to use the minimum
syslog level defined by the BHM, or whether it uses a local defined value
using the
Syslog Minimum Level
parameter.
When set to
BHM preferred, use local when BHM configuration
unavailable
, and if the BHS can register with a BHM, then it uses the
Syslog Minimum Level defined on that BHM. If the BHS cannot
register then it uses its own Syslog Minimum Level setting.
When set to
Local only
the BHS will always use its own Syslog
Minimum Level setting and ignores the BHM’s setting.
Syslog Minimum
Level
This provides a selection for the minimum syslog message severity that
is sent to the syslog server. Values range from fatal (highest severity and
least verbose) to info (lowest severity, maximum verbosity).
For example: If the Syslog Minimum Level is set to notice, then only
messages with severity notice and above are sent.
Chapter 7: Configuration Configuring remote access
Page 7-147
Configuring remote access
Configuring SM/BHS’s IP over-the-air access
To access the SM/BHS management interface from a device situated above the AP, the SM/BHS’s
Network Accessibility
parameter (under the web GUI at
Configuration >
IP
) may be set to
Public
.
Table 108
LAN1 Network Interface Configuration tab of IP page attributes
Attribute
Meaning
IP Address Internet Protocol (IP) address. This address is used by family of Internet
protocols to uniquely identify this unit on a network.
Network
Accessibility
Specify whether the IP address of the SM/BHS must be visible to only a
device connected to the SM/BHS by Ethernet (
Local
) or be visible to the
AP/BHM as well (
Public
).
Subnet Mask
If
Static IP
is set as the
Connection Type
of the WAN interface, then this
parameter configures the subnet mask of the SM/BHS for RF
management traffic.
Gateway IP Address
If
Static IP
is set as the
Connection Type
of the WAN interface, then this
parameter configures the gateway IP address for the SM/BHS for RF
management traffic.
DHCP state
If
Enabled
is selected, the DHCP server automatically assigns the IP
configuration (IP address, subnet mask, and gateway IP address) and the
values of those individual parameters (above) are not used. The setting
of this DHCP state parameter is also viewable (read only), in the Network
Interface tab of the Home page.
DNS IP Address
Canopy devices allow for configuration of a preferred and alternate DNS
server IP address either automatically or manually. Devices must set
DNS server IP address manually when DHCP is disabled for the
management interface of the device. The default DNS IP addresses are
0.0.0.0 when configured manually.
Chapter 7: Configuration Configuring remote access
Page 7-148
Preferred DNS
Server The first address used for DNS resolution.
Alternate DNS
Server
If the Preferred DNS server cannot be reached, the Alternate DNS Server
is used.
Domain Name
The operator’s management domain name may be configured for DNS.
The domain name configuration can be used for configuration of the
servers in the operator’s network. The default domain name is
example.com, and is only used if configured as such.
Accessing SM/BHS over-the-air by Web Proxy
The SM/BHS may be accessed via the AP/BHM management GUI by navigating to
Home >
Session
Status
(or
Home
>
Remote Subscribers
for AP only) and clicking on the SM’s hyperlink.
For example, to access one of the SMs, click
LUID: 002 [0a-00-3e-37-b9-fd]
, as shown in Figure
72.
Figure 72
AP Session Status page
The
SessionStatus.xml
hyper link allows user to export all displayed SM data in Session Status
table into an xml file.
Chapter 7: Configuration Configuring remote access
Page 7-149
To access any one of the SMs, click PMP450i SM
hyperlink, as shown in Figure 73.
Figure 73
AP Remote Subscribers page
Chapter 7: Configuration Monitoring the Link
Page 7-150
Monitoring the Link
Link monitoring procedure
After configuring the link, either an operator in the network office or the SM/BHS INSTALLER user
in the field (if read access to the AP/BHM is available to the INSTALLER) must perform the
following procedure. Who is authorized and able to do this depends on local operator password
policy, management VLAN setup and operational practices.
To monitor the link for performance, follow these instructions:
Procedure 21
Monitoring the AP-SM link
1
Access the web interface of the AP/BHM
2
In the left-side menu of the AP/BHM interface, select
Home
.
3
Click the
Session Status
tab.
Figure 74
Session Status page
4
The
Device
tab of Session Status List display all displayed SMs MAC address,
PMP/PTP Hardware, Software Version, FPGA Version and State
5
Click
Session Count
tab of Session Status List to display values for
Session Count
,
Reg
Count
, and
Re-Reg Count
.
Chapter 7: Configuration Monitoring the Link
Page 7-151
Session Count
: This field displays how many sessions the SM/BHS has had with
the AP/BHM. Typically, this is the sum of Reg Count and Re-Reg Count. However,
the result of internal calculation may display here as a value that slightly differs
from the sum.
Reg Count
: When a SM/BHS makes a registration request, the AP/BHM checks its
local data to see whether it considers the SM/BHS to be already registered. If the
AP/BHM concludes that the SM/BHS is not, then the request increments the value
of this field.
Typically, a Re-Reg is the case where both
o SM/BHS attempts to reregister for having lost communication with the
AP/BHM.
o
AP/BHM has not yet observed the link to the SM/BHS as being down.
6
Click
Power
tab of Session Status list to display Downlink Rate, AP Tx Power (dBm),
Signal Strength Radio (dB) and Signal to Noise Radio (dB).
7
Click
Configuration
tab of Session Status list to get QoS configuration details:
Sustained Data Rate (kbps)
Burst Allocation (kbit)
Max Burst Rate (kbit)
Low Priority CIR (kbps)
8
Briefly monitor these values, occasionally refreshing this page by clicking another tab
and then the Session Status tab again.
9
If these values are low (for example, 1, 1, and 0, respectively, meaning that
the SM/BHS registered and started a stable session once) and are not changing:
Consider the installation successful.
Monitor these values from the network office over the next several hours and days.
If these values are greater than 1, 1, and 0, or they increase while you are monitoring
them, troubleshoot the link. (For example, Use
Receive Power Level
for aiming and
then use Link Tests to confirm alignment).
Refer Viewing Session Status on page 9-14 for more details.
Chapter 7: Configuration Monitoring the Link
Page 7-152
Exporting Session Status page of AP/BHM
The SessionStatus.xml hyper link allows user to export all displayed SMs or BHS data in Session
Status table into an xml file.
Figure 75
Exporting Session Status page of the AP
In case of PMP, if the session status page does not list any SM, the SessionStatus.xml will still be
visible but the file would be empty. The file will contain data from all of the 5 different tables.
Export from command line
The scripts users can also get this file from command line, you have to authenticate successfully in
order to download the file.
Wget
http://169.254.1.1/SessionStatus.xml?CanopyUsername=test&CanopyPassword=test
Chapter 7: Configuration Configuring quality of service
Page 7-153
Configuring quality of service
Maximum Information Rate (MIR) Parameters
Point-to-multipoint links use the following MIR parameters for bandwidth management:
Sustained Uplink Data Rate (kbps)
Uplink Burst Allocation (kb)
Sustained Downlink Data Rate (kbps)
Downlink Burst Allocation (kb)
Max Burst Downlink Data Rate (kbps)
Max Burst Uplink Data Rate (kbps)
Set each of these parameters per AP or per SM independently.
Token Bucket Algorithm
The software uses a token bucket algorithm that has the following features:
Stores credits (tokens) for the SM to spend on bandwidth for reception or transmission.
Drains tokens during reception or transmission.
Refills with tokens at the sustained rate set by the network operator.
For each token, the SM can send toward the network in the uplink (or the AP can send toward the
SM in the downlink) an equivalent number of kilobits. Two buckets determine the permitted
throughput: one in the SM for uplink and one in the AP for downlink.
The applicable set of
Uplink Burst Allocation
and
Downlink Burst Allocation
parameters determine
the number of tokens that can fill each bucket. When the SM transmits (or the AP transmits) a
packet, the equivalent number of tokens is removed from the uplink (or downlink) bucket.
Except when full, the bucket is continuously being refilled with tokens at rates that the applicable
set of
Sustained Uplink Data Rate
and
Sustained Downlink Data Rate
parameters specify. The
bucket often drains at a rate that is much faster than the sustained data rate but can refill at only
the sustained data rate. Thus, the effects of the allocation and rate parameters on packet delay are
as follows:
The burst allocation affects how many kilobits are processed before packet delay is imposed.
The sustained data rate affects the packet delay that is imposed.
Chapter 7: Configuration Configuring quality of service
Page 7-154
MIR Data Entry Checking
Uplink and downlink MIR is enforced as shown in Figure 76.
Note
In these figures, entry refers to the setting in the data rate parameter, not the burst
allocation parameter.
Figure 76
Uplink and downlink rate caps adjusted to apply aggregate cap
For example, in the SM, if you set the
Sustained Uplink Data Rate
parameter to 2,000 kbps and the
Sustained Downlink Data Rate
parameter to 10,000 kbps, then the uplink and downlink MIR that is
enforced for the SM can be calculated as shown in Figure 77.
Figure 77
Uplink and downlink rate cap adjustment example
`
In this example case, the derived 1,167-kbps uplink and 5,833-kbps downlink MIR sum to the fixed
7,000-kbps aggregate cap of the SM.
Committed Information Rate (CIR)
The Committed Information Rate (CIR) capability feature enables the service provider to guarantee
to any subscriber that bandwidth will never decrease to below a specified minimum unless CIR is
oversubscribed or RF conditions are degraded. CIR is oversubscribed when there is not enough
available bandwidth to support CIR configuration for all subscribers. In this condition, SMs which
are configured with a nonzero CIR will all operate at the maximum data rate supported by the link
(subject to Maximum Information Rate and Burst Rate/Allocations). SMs which are configured
with a CIR of 0 kbps will not transmit until CIR-configured SMs have completed transmission. CIR
may be configured independently for high priority traffic and for low priority traffic.
CIR parameters may be configured in the following ways:
Web-based management GUI
SNMP
Authentication Server (RADIUS) - when a SM successfully registers and authenticates, CIR
information is retrieved from the RADIUS server.
uplink cap enforced =
uplink entry x aggregate cap for the SM
uplink entry + downlink entry
downlink cap enforced =
downlink entry x aggregate cap for the SM
uplink entry + downlink entry
uplink cap enforced =
2,000 kbps x 7,000 kbps
2,000 kbps + 10,000 kbps
= 1,167 kbps
downlink cap enforced =
10,000 kbps x 7,000 kbps
2,000 kbps + 10,000 kbps
= 5,833 kbps
Chapter 7: Configuration Configuring quality of service
Page 7-155
Active CIR configuration can be verified via the AP’s
Home >
Session Status
page.
Bandwidth from the SM Perspective
In the SM, normal web browsing, e-mail, small file transfers and short streaming video are rarely
rate limited with practical bandwidth management (QoS) settings. When the SM processes large
downloads such as software upgrades and long streaming video or a series of medium-size
downloads, the bucket rapidly drains, the burst limit is reached, and some packets are delayed.
The subscriber experience is more affected in cases where the traffic is more latency sensitive.
Interaction of Burst Allocation and Sustained Data Rate
Settings
If the Burst Allocation is set to 1200 kb and the Sustained Data Rate is set to 128 kbps, a data burst
of 1000 kb is transmitted at full speed because the Burst Allocation is set high enough. After the
burst, the bucket experiences a significant refill at the Sustained Data Rate. This configuration uses
the advantage of the settable Burst Allocation.
If both the Burst Allocation and the Sustained Data Rate are set to 128 kb, a burst is limited to the
Burst Allocation value. This configuration does not take advantage of the settable Burst Allocation.
If the Burst Allocation is set to 128 kb and the Sustained Data Rate is set to 256 kbps, the actual
rate is the burst allocation (but in kbps). As above, this configuration does not take advantage of
the settable Burst Allocation.
High-priority Bandwidth
To support low-latency traffic such as VoIP (Voice over IP) or video, the system implements a high-
priority channel. This channel does not affect the inherent latencies in the system but allows high-
priority traffic to be immediately served. The high-priority pipe separates low-latency traffic from
traffic that is latency tolerant, such as standard web traffic and file downloads.
The number of channels available on the AP is reduced by the number of SMs configured for the high-
priority channel (each SM operating with high-priority enabled uses two channels (virtual circuits) instead
of one).
A module prioritizes traffic by
reading the Low Latency bit (Bit 3) in the IPv4 Type of Service (ToS) byte in a received packet.
Bit 3 is set by a device outside the system.
reading the 802.1p field of the 802.1Q header in a received packet, where VLAN is enabled on
the module.
comparing the 6-bit Differentiated Services Code Point (DSCP) field in the ToS byte of a
received packet to a corresponding value in the
Diffserv
tab of the Configuration page of the
module. A packet contains no flag that indicates whether the encoding is for the Low Latency
bit or the DSCP field. For this reason, you must ensure that all elements in your trusted
domain, including routers and endpoints, set and read the ToS byte with the same scheme.
Modules monitor ToS bytes with DSCP fields, but with the following differences:
The 6-bit length of the field allows it to specify one of 64 service differentiations.
Chapter 7: Configuration Configuring quality of service
Page 7-156
These correlate to 64 individual (
CodePoint
) parameters in the
Diffserv
tab of the Configuration
page.
Per RFC 2474, 3 of these 64 are preset and cannot be changed. (See
http://www.faqs.org/rfcs/rfc1902.html.)
For any or all of the remaining 61 CodePoint parameters, you can specify a value of
o 0 through 3 for low-priority handling.
o 4 through 7 for high-priority handling.
Note
Ensure that your Differentiated Services domain boundary nodes mark any entering
packet, as needed, so that it specifies the appropriate Code Point for that traffic and
domain. This prevents theft of service level.
An example of the
Diffserv
page in the Configuration menu and parameter descriptions are
provided under DiffServ attributes AP/BHM on page 7-61. This tab and its rules are identical from
module type to module type. However, any of the 61 configurable Code Points can be set to a
different value from module to module, thus defining unique per-hop behavior for some traffic.
This tab in the AP sets the priorities for the various packets in the downstream (sent from the
public network). This tab in the SM sets the priorities for the various packets in the upstream (sent
to the public network).
Typically, some SMs attach to older devices that use the ToS byte as originally formatted, and
others to newer devices that use the DSCP field. The default values in the
Diffserv
page allow your
modules to prioritize traffic from the older devices roughly the same as they traditionally have.
However, these default values may result in more high-priority traffic as DSCP fields from the
newer devices are read and handled. So, after making changes in the
Diffserv
page, carefully
monitor the high-priority channel for high packet rates
in SMs that you have identified as those to initially set and watch.
across your network when you have broadly implemented Code Point values, such as via
SNMP.
Chapter 7: Configuration Configuring quality of service
Page 7-157
Traffic Scheduling
The characteristics of traffic scheduling in a sector are summarized in Table 108.
Table 109
Characteristics of traffic scheduling
Category
Factor
Treatment
Throughput Aggregate throughput, less additional
overhead 132 Mbps
Latency Number of frames required for the
scheduling process 1
Round-trip latency 6 ms
AP broadcast the download schedule No
High-priority
Channel
Allocation for uplink high-priority traffic
on amount of high-priority traffic
Dynamic, based on amount of high-
priority traffic
Allocation for downlink high-priority traffic
on amount of high-priority traffic
Dynamic, based on amount of high-
priority traffic
Order of transmission
CIR high-priority
CIR low-priority
Other high-priority
Other low-priority
Caution
Power requirements affect the recommended maximums for power cord length
feeding the CMM4. See the dedicated user guide that supports the CMM that you are
deploying.
Packets that have a priority of 4 to 7 in either the DSCP or a VLAN 802.1p tag are automatically sent
on the high-priority channel, but only where the high-priority channel is enabled.
Chapter 7: Configuration Configuring quality of service
Page 7-158
Setting the Configuration Source
The AP includes a
Configuration Source
parameter, which sets where SMs that register to the AP
are controlled for MIR, CIR, VLAN, and the high-priority channel as follows. The
Configuration
Source
parameter affects the source of:
all MIR settings:
o Sustained Uplink Data Rate
o Uplink Burst Allocation
o Max Burst Uplink Data Rate
o Sustained Downlink Data Rate
o Downlink Burst Allocation
o Max Burst Downlink Data Rate
all CIR settings:
o Low Priority Uplink CIR
o Low Priority Downlink CIR
o Hi Priority Uplink CIR
o Hi Priority Downlink CIR
all SM VLAN settings
o Dynamic Learning
o Allow Only Tagged Frames
o VLAN Aging Timeout
o Untagged Ingress VID
o Management VID
o VLAN Membership
the Hi Priority Channel setting
Table 110
Recommended combined settings for typical operations
Most operators who
use…
must set this
parameter…
in this web page/tab…
in the AP to…
no authentication
server
Authentication Mode
Configuration/ Security
Disabled
Configuration Source
Configuration/ General
SM
Wireless Manager
(Authentication
Server)
Authentication Mode
Configuration/ Security
Authentication Server
Configuration Source
Configuration/ General
Authentication Server
RADIUS AAA server
Authentication Mode
Configuration/ Security
RADIUS AAA
Configuration Source
Configuration/ General
Authentication Server
Chapter 7: Configuration Configuring quality of service
Page 7-159
Table 111
Where feature values are obtained for a SM with authentication required
Configuration
Source Setting
in the AP
Values are obtained from
MIR Values
VLAN Values
High Priority Channel
State
Authentication
Server
Authentication
Server
Authentication
Server
Authentication
Server
SM SM SM SM
Authentication
Server+SM
Authentication
Server
Authentication
Server, then SM
Authentication
Server, then SM
Note
HPC represents the Hi Priority Channel (enable or disable).
Where Authentication Server, then SM is the indication, parameters for which
Authentication Server does not send values are obtained from the SM. This is the case
where the Authentication Server server is operating on a Authentication Server
release that did not support the feature. This is also the case where the feature
enable/disable flag in Authentication Server is set to disabled. The values are those
previously set or, if none ever were, then the default values.
Where Authentication Server is the indication, values in the SM are disregarded.
Where SM is the indication, values that Authentication Server sends for the SM are
disregarded.
For any SM whose
Authentication Mode
parameter is not set to ‘Authentication Required’, the
listed settings are derived as shown in Table 111.
Table 112
MIR, VLAN, HPC, and CIR Configuration Sources, Authentication Disabled
Configuration
Source Setting
in the AP
Values are obtained from
MIR Values
VLAN Values
High Priority
Channel State
CIR Values
Authentication
Server
AP AP AP AP
SM SM SM SM SM
Authentication
Server+SM
SM SM SM SM
Chapter 7: Configuration Configuring quality of service
Page 7-160
Configuring Quality of Service (QoS)
Quality of Service (QoS) page of AP
The QoS page of AP is explained in Table 112.
Table 113
QoS page attributes - AP
Attribute
Meaning
Max Burst Uplink
Data Rate
These parameters allow operators to specify the data rate at which a SM
is allowed to transmit (until burst allocation limit is reached) before
being recharged at the
Sustained Uplink Data Rate
with credits to transit
more. When set to 0 (default), the burst rate is unlimited.
Sustained Uplink
Data Rate
Specify the rate that each SM registered to this AP is replenished with
credits for transmission. This default imposes no restriction on the
uplink. See
Maximum Information Rate (MIR) Parameters on page 7-153
Interaction of Burst Allocation and Sustained Data Rate Settings on
page 7-155
Configuration Source on page 7-71
Uplink Burst
Allocation
Specify the maximum amount of data to allow each SM to transmit
before being recharged at the
Sustained Uplink Data Rate
with credits to
transmit more. See Maximum Information Rate (MIR) Parameters on
page 7-153
Interaction of Burst Allocation and Sustained Data Rate Settings on
page 7-155
Configuration Source on page 7-71
Max Burst Downlink
Data Rate
These parameters allow operators to specify the data rate at which a SM
is allowed to transmit (until burst allocation limit is reached) before
Chapter 7: Configuration Configuring quality of service
Page 7-161
being recharged at the
Sustained Downlink Data Rate
with credits to
transit more. When set to 0 (default), the burst rate is unlimited.
Sustained Downlink
Data Rate
Specify the rate at which the AP is replenished with credits (tokens) for
transmission to each of the SMs in its sector. This default imposes no
restriction on the uplink. See Maximum Information Rate (MIR)
Parameters on page 7-153
Interaction of Burst Allocation and Sustained Data Rate Settings on
page 7-155
Configuration Source on page 7-71
Downlink Burst
Allocation
Specify the maximum amount of data to allow the AP to transmit to any
registered SM before the AP is replenished with transmission credits at
the
Sustained Downlink Data Rate
. See
Maximum Information Rate (MIR) Parameters on page 7-153
Interaction of Burst Allocation and Sustained Data Rate Settings on
page 7-155
Configuration Source on page 7-71
Broadcast Downlink
CIR
Broadcast Downlink CIR
(Committed Information Rate, a minimum)
supports system designs where downlink broadcast is desired to have
higher priority than other traffic. For many other system designs,
especially typical internet access networks, leave the Broadcast
Downlink CIR at the default.
Broadcast Downlink CIR is closely related to the Broadcast Repeat Count
parameter, which is settable in the Radio tab of the Configuration page
in the AP: when the Broadcast Repeat Count is changed, the total of
available bandwidth is also changed, since packets are being sent one,
two, or three times, according to the setting in the Broadcast Repeat
Count parameter.
Priority Precedence Allows operator to decide if 802.1p or DiffServ priority bits must be used
first when making priority decisions.
PPPoE Control
Message Priority
Operators may configure the SM to utilize the high priority channel for
PPPoE control messages. Configuring the SM in this fashion can benefit
the continuity of PPPoE connections when there are issues with PPPoE
sessions being dropped in the network. This prioritization may be
configured in the DiffServ tab in the Configuration menu of the SM.
Prioritize TCP ACK To reduce the likelihood of TCP acknowledgement packets being
dropped, set this parameter to
Enabled
. This can improve throughput
that the end user perceives during transient periods of congestion on the
link that is carrying acknowledgements.
Quality of Service (QoS) page of SM
The QoS page of SM is explained in Table 113.
Chapter 7: Configuration Configuring quality of service
Page 7-162
Table 114
QoS page attributes - SM
Attribute
Meaning
Sustained Uplink
Data Rate
Specify the rate that this SM is replenished with credits for transmission.
This default imposes no restriction on the uplink. See Maximum
Information Rate (MIR) Parameters on page 7-153
Interaction of Burst Allocation and Sustained Data Rate Settings on
page 7-155
Configuration Source on page 7-71
Sustained Downlink
Data Rate
Specify the rate at which the AP is replenished with credits (tokens) for
transmission to this SM. This default imposes no restriction on the
uplink. See Maximum Information Rate (MIR) Parameters on Page 7-153
Interaction of Burst Allocation and Sustained Data Rate Settings on
page 7-155
Configuration Source on page 7-71
Uplink Burst
Allocation
Specify the maximum amount of data to allow this SM to transmit
before being recharged at the
Sustained Uplink Data Rate
with credits to
transmit more. See Maximum Information Rate (MIR) Parameters on
page 7-153
Interaction of Burst Allocation and Sustained Data Rate Settings on
page 7-155
Configuration Source on page 7-71
Downlink Burst
Allocation
Specify the maximum amount of data to allow the AP to transmit to this
SM before the AP is replenished at the
Sustained Downlink Data Rate
Chapter 7: Configuration Configuring quality of service
Page 7-163
with transmission credits. See Maximum Information Rate (MIR)
Parameters on page 7-153
Interaction of Burst Allocation and Sustained Data Rate Settings on
page 7-155
Configuration Source on page 7-71
Max Burst Uplink
Data Rate
These parameters allow operators to specify the data rate at which a SM
is allowed to transmit (until burst allocation limit is reached) before
being recharged at the
Sustained Uplink Data Rate
with credits to transit
more. When set to 0 (default), the burst rate is unlimited.
Max Burst Downlink
Data Rate
These parameters allow operators to specify the data rate at which a SM
is allowed to transmit (until burst allocation limit is reached) before
being recharged at the
Sustained Downlink Data Rate
with credits to
transit more. When set to 0 (default), the burst rate is unlimited.
Enable Broadcast /
Multicast Data Rate
This parameter allows the operator to specify if Broadcast and Multicast
data is rate-limited. This data rate can be entered in Kbps or PPS
(Packets Per Second).
Broadcast / Multicast
Data Rate
This parameter allows the operator to specify a data rate at which
Broadcast and Multicast traffic is sent via the radio link.
Low Priority Uplink
CIR
This field indicates the minimum rate at which low priority traffic is sent
over the uplink (unless CIR is oversubscribed or RF link quality is
degraded).
Committed Information Rate (CIR) on page 7-154
Setting the Configuration Source on page 7-158
Low Priority
Downlink CIR
This field indicates the minimum rate at which low priority traffic is sent
over the downlink (unless CIR is oversubscribed or RF link quality is
degraded).
Committed Information Rate (CIR) on page 7-154
Setting the Configuration Source on page 7-158
Hi Priority Channel
See
High-priority Bandwidth on page 7-155
Configuration Source on page 7-71
Hi Priority Uplink CIR This field indicates the minimum rate at which high priority traffic is sent
over the uplink (unless CIR is oversubscribed or RF link quality is
degraded).
Committed Information Rate (CIR) on page 7-154
Setting the Configuration Source on page 7-158
Hi Priority Downlink
CIR
This field indicates the minimum rate at which high priority traffic is sent
over the downlink (unless CIR is oversubscribed or RF link quality is
degraded).
Committed Information Rate (CIR) on page 7-154
Setting the Configuration Source on page 7-158
Chapter 7: Configuration Configuring quality of service
Page 7-164
Priority Precedence Allows operator to decide if 802.1p or DiffServ priority bits must be used
first when making priority decisions.
PPPoE Control
Message Priority
Operators may configure the SM to utilize the high priority channel for
PPPoE control messages. Configuring the SM in this fashion can benefit
the continuity of PPPoE connections when there are issues with PPPoE
sessions being dropped in the network. This prioritization may be
configured in the DiffServ tab in the Configuration menu of the SM.
Prioritize TCP ACK To reduce the likelihood of TCP acknowledgement packets being
dropped, set this parameter to Enabled. This can improve throughput
that the end user perceives during transient periods of congestion on the
link that is carrying acknowledgements. This parameter, when enabled,
can be particularly useful when running bi-direction FTP sessions over
the link. If a link is primarily used for video surveillance, it is
recommended to configure this parameter to
Disabled
.
Quality of Service (QoS) page of BHM
The QoS page of BHM is explained in Table 114.
Table 115
QoS page attributes - BHM
Attribute
Meaning
PPPoE Control
Message Priority
Operators may configure the BHM to utilize the high priority channel for
PPPoE control messages. Configuring the BHM in this fashion can
benefit the continuity of PPPoE connections when there are issues with
PPPoE sessions being dropped in the network. This prioritization may be
configured in the DiffServ tab in the Configuration menu of the BHS.
Prioritize TCP ACK To reduce the likelihood of TCP acknowledgement packets being
dropped, set this parameter to Enabled. This can improve throughput
that the end user perceives during transient periods of congestion on the
link that is carrying acknowledgements. This parameter, when enabled,
can be particularly useful when running bi-direction FTP sessions over
the link. If a link is primarily used for video surveillance, it is
recommended to configure this parameter to
Disabled
.
Quality of Service (QoS) page of BHS
The QoS page of BHS is explained in Table 115.
Chapter 7: Configuration Configuring quality of service
Page 7-165
Table 116
QoS page attributes - BHS
Attribute
Meaning
PPPoE Control
Message Priority
Operators may configure the BHS to utilize the high priority channel for
PPPoE control messages. Configuring the BHS in this fashion can benefit
the continuity of PPPoE connections when there are issues with PPPoE
sessions being dropped in the network. This prioritization may be
configured in the DiffServ tab in the Configuration menu of the BHS.
Prioritize TCP ACK To reduce the likelihood of TCP acknowledgement packets being
dropped, set this parameter to Enabled. This can improve throughput
that the end user perceives during transient periods of congestion on the
link that is carrying acknowledgements. This parameter, when enabled,
can be particularly useful when running bi-direction FTP sessions over
the link. If a link is primarily used for video surveillance, it is
recommended to configure this parameter to
Disabled
.
Chapter 7: Configuration Installation Color Code
Page 7-166
Installation Color Code
With this feature enabled on the AP and SM, operators may install and remotely configure SMs
without having to configure matching color codes between the modules. While the SM is
accessible for configuration from above the AP (for remote provisioning) and below the SM (for
local site provisioning), no user data is passed over the radio link. When using the Installation
Color Code feature, ensure that the SM is configured with the factory default Color Code
configuration (Color Code 1 is “0”, Color Code 2-10 set to “0” and “Disable”). The status of the
Installation Color Code can be viewed on the AP Eval web GUI page, and when the SM is
registered using the Installation Color Code the message “SM is registered via ICC Bridging
Disabled! is displayed in red on every SM GUI page. The Installation Color Code parameter is
configurable without a radio reboot for both the AP and SM. If an SM is registered via Installation
Color Code and the feature is then disabled, operators will need to reboot the SM or force it to
reregister (i.e. using the
Rescan APs
functionality on the AP Eval page).
Figure 78
Installation Color Code - AP
Chapter 7: Configuration Zero Touch Configuration Using DHCP Option 66
Page 7-167
Zero Touch Configuration Using DHCP Option 66
This feature allows an SM to get its configuration via DHCP option 66. This can be used for the
initial configuration of an SM as well as managing the configuration of SMs on an ongoing basis.
Here is how it works in brief :
When the SM boots up, if it is set to use DHCP client, it will send out a DHCP Discover packet
which includes a request for DHCP Option 66.
In case of a brand new SM out of the box, the DHCP Discover packet is sent out if the SM
connects to an AP using Installation Color Code (ICC), even though DHCP client is not enabled
in factory default config.
An appropriately configured DHCP server will respond with a DHCP Offer and include a URL in
response to the Option 66 request. The URL should point to the configuration file.
The device will download the configuration file and apply it. The device will reboot
automatically if needed. (Note: this requires “rebootIfRequired” flag to be added to the config
file. See Creating a Golden config file on page 7-168.
Configuration Steps
Procedure 22
Zero Touch Configuraiton steps
1
Create the golden config file(s)
2
Host it on an TFTP/FTP/HTTP/HTTPS server
3
Configure the DHCP server to return the URL of the golden config file in option 66
When the SM boots up, it will get the URL for the golden config from the DHCP server via option
66, download it and apply it.
If all the SMs are configured exactly the same, then you can create just new golden config file that
can be used with all SMs.
If the SMs are not configured the same, see if it is possible to group the SMs such that SMs with
the same configuration are served by the same DHCP pool. User can then create multiple golden
config files and configure the DHCP server to use the appropriate config file for each pool.
User can also create one config file per SM. This provides the most flexibility, but is practical only
if you have a software tool/script to generate the config files for each MAC address. The files
should be named <mac>.cfg where <mac> is the MAC address of the SM, and stored in the same
directory on the file server. The DHCP server should be configured to return the directory name
ending with a ‘/’ in option 66. The SM will automatically add “<mac>.cfg” to the path and get its
config file.
Chapter 7: Configuration Zero Touch Configuration Using DHCP Option 66
Page 7-168
If some configuration is unique per SM, but rest of the configuration is common, the SMs can be
staged with the unique part, and use option 66 to manage the common part. For example, if each
SM needs to have its coordinates set, don’t include the coordinates in the golden config file.
Instead, configure the coordinates for each SM manually. Manage the rest of the configuration
using DHCP option 66.
Creating a Golden config file
The easiest way to create the golden config file is to configure an SM, export its configuration and
edit it. To export the configuration file from the GUI of the SM, go to “Configuration > Unit
Settings” tab, go to the “Download Configuration File” section and click on the “<mac>.cfg” link.
This will give you a text file in JSON format. You can edit this file in a text editor but it’s easier to
use a JSON editor like https://www.jsoneditoronline.org/.
Strip down the config file to remove sections and entries that don’t care about, and keep only the
items that require changes. If there are many required changes, it can easily get confusing. To
identify the exact items changes, first reset the SM to factory default, export the config file, make
the necessary changes, export a second config file, then use a tool like WinMerge
(http://winmerge.org/) to identify the differences.
The config file contains the following informational entries at the top level.
"cfgUtcTimestamp": "cfgUtcTimestamp",
"swVersion": "CANOPY 13.3 (Build 15) SM-AES",
"cfgFileString": "Canopy configuration file",
"srcMacAddress": "0a-00-3e-a2-c2-74",
"deviceType": "5.4/5.7GHz MIMO OFDM - Subscriber Module",
"cfgFileVersion": "1.0"
The “cfgUtcTimestamp”, “swVersion”, “srcMacAddress” and “deviceType” lines can be deleted.
Do not delete the “cfgFileString” and “cfgFileVersion” entries.
Next, create an object named “configFileParameters” at the top level. Under that, add a parameter
called “rebootIfRequired” and set it to true. This tells the SM to reboot automatically if a reboot is
needed to apply the new configuration.
A sample configuration file that has been edited for use via DHCP option 66 is given below.
{
"userParameters": {
"smNetworkConfig": {
"networkAccess": 1
},
"location": {
"siteName": "Test site"
},
"smRadioConfig": {
Chapter 7: Configuration Zero Touch Configuration Using DHCP Option 66
Page 7-169
"frequencyScanList": [
5475000,
5480000
],
"colorCodeList": [
{
"colorCode": 42,
"priority": 1
}
]
},
"networkConfig": {
"lanDhcpState": 1
}
},
"cfgFileVersion": "1.0",
"cfgFileString": "Canopy configuration file",
"configFileParameters": {
"rebootIfRequired": true
}
}
When configuration is imported, only the items that exist in the configuration file are modified.
Parameters that are not in the imported file are not changed. If user wish to revert those settings
to their factory default values, please add a “setToDefaults” item under “configFileParameters”
section with a value of true.
"cfgFileVersion": "1.0",
"cfgFileString": "Canopy configuration file",
"configFileParameters": {
"rebootIfRequired": true,
"setToDefaults": true
}
In case, the SM needs to fetch the configuration file on each boot up even when not connecting to
AP via ICC, set “Network Accessibility” to “Public” and “DHCP State” to “Enabled” in the
“Configuration > IP” page before exporting the configuration.
Hosting the config file
Copy the golden configuration file to an FTP, TFTP, HTTP or HTTPS server. This location can be
password protected; you just have to include the user name and password in the URL.
DHCP server configuration
Configure DHCP server to return the full URL to the golden config file as the value of DHCP option
66.
Chapter 7: Configuration Zero Touch Configuration Using DHCP Option 66
Page 7-170
The following example explains how to make the change for Windows Server 2008. Adapt it to
your specific DHCP server.
Procedure 23
DHCP server configuration
1
Click “Start > Administrative Tools > DHCP”
2
If you have multiple “Scopes” defined, identify the correct “Scope” that will serve IP
addresses for the SMs
3
Right click on “Scope Option” under the correct “Scope” and select “Configure
Options”
Chapter 7: Configuration Zero Touch Configuration Using DHCP Option 66
Page 7-171
4
In the “Scope Options” dialog, scroll down to “066 Boot Server Host Name”, select the
checkbox and enter the full URL to the golden config file as the “String value”. Then
click “OK”.
5
In the DHCP snap-in window, right click and “Refresh” to see the DHCP option 66 in the
list of DHCP options
Supported URL Formats
FTP, TFTP, HTTP and HTTPS URLs are supported. Some examples are given below.
ftp://10.120.163.253/canopy.cfg
ftp://admin:admin123@10.120.163.253/canopy.cfg (login as admin with password admin123)
tftp://10.120.163.253/canopy.cfg
http://10.120.163.253/golden-config.cfg
https://10.120.163.253/smconfig/golden-config.cfg
User can also specify the URL pointing to a directory and not a specific file. Terminate the URL
with a ‘/’ to indicate that it is a directory and not a file. Use this format when each SM has its own
individual config file. The directory should contain files named “<mac>.cfg”, one for each SM.
For example:
ftp://10.120.163.253/smconfig/
Chapter 7: Configuration Zero Touch Configuration Using DHCP Option 66
Page 7-172
In this case, the SM will append “<mac>.cfg” to the path and try to get that file. For example, if the
SM’s MAC address is 0a-00-3e-a2-c2-74, it will request for
ftp://10.120.163.253/smconfig/0a003ea2c274.cfg. This mechanism can be used to serve individual
config file for each SM.
Troubleshooting
1
Ensure that te SM is running 13.3 or newer version of software.
2
If the SM has factory default config, confirm ICC is enabled on the AP, so the SM can
connect to it.
3
If the SM is connecting to the AP using a color code other than ICC, make sure the SM
has “Network Accessibility” set to “Public” and “DHCP State” set to “Enabled” in the
Configuration > IP” page.
4
Make sure the golden config file does not turn off “Network Accessibility” or “DHCP
State”. If it does, the SM will no longer request the config file when it is rebooted.
5
Check the event log of the SM to see the status of the configuration file import
including any errors that prevented it from importing the file.
6
Capture the DHCP Offer packet from the DHCP server to the SM and verify that Option
66 has the expected URL.
Chapter 7: Configuration Configuring Radio via config file
Page 7-173
Configuring Radio via config file
The PMP/PTP 450i supports export and import of a configuration file from the AP or SM as a text
file. The configuration file is in JSON format.
To export or import the configuration file, the logged in user needs to be an ADMINISTRATOR and
it must not be a “read-only” account.
The exported configuration file contains the complete configuration including all the default
values. To keep a backup of the current configuration, the file can be saved as-is and imported
later.
While importing a configuration file, it can be either imported the full configuration or a sparse
configuration containing only the items that need to be changed. If a sparse configuration file is
imported, only the items in the file will be imported. Other configuration will remain unchanged.
There could also be used a special flag in the configuration file to tell the device to apply the
configuration starting from factory default (Refer Special Headers for configuration file on page 7-
174).
Import and Export of config file
The config file import and export is supported in
Configuration > Unit Settings
page. The
procedure for importing and exporting config file is explained below.
Figure 79
Configuration File upload and download page
The DHCP server configuration procedure is as follows:
Procedure 24
DHCP server configuration
1
Login to the GUI and go to
Configuration
>
Unit Settings.
2
Under Download Configuration File tab, click on the “<mac>.cfg” link, where <mac> is
the MAC address of the device (for example, “01003ea2c274.cfg”).
3
Save the file to the local disk.
Chapter 7: Configuration Configuring Radio via config file
Page 7-174
The below procedure is to be followed for Importing a config file
Procedure 25
Import the configuration from the GUI
1
Login to the GUI and go to Configuration Unit Settings.
2
Click on “Browse” button under “Upload and Apply Configuration File” tab and select
the configuration file from disk.
3
Click “Upload” followed by “Apply Configuration File” button click.
4
The “Status of Configuration File” section will show the results of the upload.
5
Review it to make sure there are no errors. Then click on “Reboot” to reboot with the
imported configuration
The special headers for config file is explained below:
Procedure 26
Special Headers for configuration file
1
A "configFileParameters" section can be added to the header to control the behaviour
of the device when importing configuration.
2
The "
setToDefaults
" when set to "true" tell the device to reset to factory default
configuration and apply the configuration in the file on top of that. So any attribute not
in the configuration file will be set to its factory default value. By default, the
configuration in the file is merged with the existing configuration on the device.
The "r
ebootIfRequired
" flag when set to "true" tell the device to reboot automatically if
needed to apply the configuration change. By default, the device will not reboot
automatically.
{
"cfgFileString": "Canopy configuration file",
"cfgFileVersion": "1.0",
"configFileParameters": {
"setToDefaults":true,
"rebootIfRequired":true,
}
}
Chapter 7: Configuration Configuring a RADIUS server
Page 7-175
Configuring a RADIUS server
Configuring a RADIUS server in a PMP 450i network is optional, but can provide added security,
increase ease of network management and provide usage-based billing data.
Understanding RADIUS for
PMP 450i
PMP 450i modules include support for the RADIUS (Remote Authentication Dial In User
Service)
protocol supporting Authentication and Accounting.
RADIUS
Functions
RADIUS protocol support provides the
following
functions:
SM Authentication
allows only known SMs onto the network (blocking
“rogue”
SMs), and
can be configured to ensure SMs are connecting to a known
network
(preventing SMs from
connecting to “rogue” APs). RADIUS authentication is
used
for SMs,
but
is not used for APs.
SM Configuration:
Configures authenticated SMs with MIR (Maximum Information Rate), CIR
(Committed Information Rate), High Priority, and VLAN (Virtual LAN) parameters from the
RADIUS server when a SM registers to an AP.
SM Accounting provides
support for RADIUS accounting messages for usage-based billing.
This accounting includes indications for subscriber session establishment, subscriber session
disconnection, and bandwidth usage per session for each SM that connects to the AP.
Centralized AP and SM user name and password
management
allows AP
and
SM
usernames and access levels (Administrator, Installer, Technician) to
be
centrally
administered in the RADIUS server instead of on each radio and tracks
access
events
(logon/logoff) for each username on the RADIUS server. This accounting does not track and
report
specific configuration actions performed on radios or pull statistics such as
bit
counts
from the radios. Such functions require an Element Management
System
(EMS) such as
Cambium Networks Wireless Manager. This accounting is
not
the ability to perform
accounting functions on the subscriber/end
user/customer
account.
Framed IP
allows o
perators to use a RADIUS server to assign management IP addressing to
SM modules (framed IP address).
Tested RADIUS Servers
The Canopy RADIUS implementation has been tested and is supported
on
FreeRADIUS, Version
2.1.8
Aradial RADIUS, Version
5.1.12
Note
Aradial 5.3 has a bug that prevents “remote device login”, so doesn’t support the user
name and password management feature.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-176
Choosing Authentication Mode and Configuring for
Authentication Servers - AP
On the AP’s
Configuration > Security
tab, select the
RADIUS AAA Authentication Mode
. The
following describes the
other
Authentication Mode
options for reference, and then the
RADIUS
AAA
option.
Disabled
:
Requires no authentication. Any SM (except a SM that itself has been configured
to
require
RADIUS authentication by enabling Enforce Authentication as described below) is
allowed to
register
to the
AP.
Authentication Server:
Authentication Server in this instance refers to Wireless Manager in
BAM-only mode. Authentication is
required
for a SM to register to the AP. Only SMs listed
by MAC address in the Wireless Manager database is
allowed to register to the
AP.
AP Pre-Shared
Key
:
Canopy offers a pre-shared key authentication option. In this case, an
identical key
must
be entered in the Authentication Key field on the AP’s Configuration >
Security tab and in the Authentication Key field on each desired SM’s Configuration >
Security
tab.
RADIUS
AAA
:
To support RADIUS authentication of SMs, on the AP’s Configuration >
Security tab
select
RADIUS AAA. Only properly configured SMs with a valid certificate is
allowed to
register
to the
AP.
When RADIUS AAA is selected, up to 3 Authentication Server (RADIUS Server)
IP
addresses
and
Shared Secrets can be configured. The IP address(s) configured here
must
match the IP
address(s) of the RADIUS server(s). The shared secret(s) configured here
must
match the shared
secret(s) configured in the RADIUS server(s). Servers 2 and 3 are meant
for
backup and
reliability, not splitting the database. If Server 1 doesn’t respond, Server 2 is
tried,
and then
server
3. If Server 1 rejects authentication, the SM is denied entry to the network, and does
not
progress trying the other
servers.
The default IP address is 0.0.0.0.
The
default Shared Secret is “CanopySharedSecret”. The
Shared Secret can be up to 32
ASCII
characters (no diacritical marks or ligatures, for
example).
Chapter 7: Configuration Configuring a RADIUS server
Page 7-177
Table 117
Security tab attributes
Attribute
Meaning
Chapter 7: Configuration Configuring a RADIUS server
Page 7-178
Authentication Mode Operators may use this field to select the following authentication
modes:
Disabled
the AP requires no SMs to authenticate.
Authentication Server
the AP requires any SM that attempts
registration to be authenticated in Wireless Manager before registration.
AP PreShared Key
- The AP acts as the authentication server to its SMs
and will make use of a user-configurable pre-shared authentication key.
The operator enters this key on both the AP and all SMs desired to
register to that AP. There is also an option of leaving the AP and SMs at
their default setting of using the “Default Key”. Due to the nature of the
authentication operation, if you want to set a specific authentication key,
then you MUST configure the key on all of the SMs and reboot them
BEFORE enabling the key and option on the AP. Otherwise, if you
configure the AP first, none of the SMs is able to register.
RADIUS AAA
- When RADIUS AAA is selected, up to 3 Authentication
Server (RADIUS Server) IP addresses and Shared Secrets can be
configured. The IP address(s) configured here must match the IP
address(s) of the RADIUS server(s). The shared secret(s) configured here
must match the shared secret(s) configured in the RADIUS server(s).
Servers 2 and 3 are meant for backup and reliability, not for splitting the
database. If Server 1 doesn’t respond, Server 2 is tried, and then server
3. If Server 1 rejects authentication, the SM is denied entry to the
network and does not progress trying the other servers.
Authentication
Server DNS Usage
The management DNS domain name may be toggled such that the
name of the authentication server only needs to be specified and the
DNS domain name is automatically appended to that name.
Authentication
Server 1
Enter the IP address or server name of the authentication server
(RADIUS or WM) and the Shared Secret configured in the authentication
server. When
Authentication Mode RADIUS AAA
is selected, the default
value of
Shared Secret
is “CanopySharedSecret”. The
Shared Secret
may consist of up to 32 ASCII characters.
Authentication
Server 2
Authentication
Server 3
Authentication
Server 4 (BAM Only)
Authentication
Server 5 (BAM Only)
Radius Port This field allows the operator to configure a custom port for RADIUS
server communication. The default value is 1812.
Authentication Key The authentication key is a 32-character hexadecimal string used when
Authentication Mode
is set to
AP Pre-Shared Key
. By default, this key is
set to 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF.
Selection Key This option allows operators to choose which authentication key is used:
Chapter 7: Configuration Configuring a RADIUS server
Page 7-179
Use Key above
means that the key specified in
Authentication Key
is
used for authentication
Use Default Key
means that a default key (based off of the SM’s MAC
address) is used for authentication
Encryption Key Specify the type of airlink security to apply to this AP. The encryption
setting must match the encryption setting of the SMs.
None
provides no encryption on the air link.
DES
(Data Encryption Standard): An over-the-air link encryption option
that uses secret 56-bit keys and 8 parity bits. DES performs a series of bit
permutations, substitutions, and recombination operations on blocks of
data. DES encryption does not affect the performance or throughput of
the system.
AES
(Advanced Encryption Standard)
:
An over-the-air link encryption
option that uses the Rijndael algorithm and 128-bit keys to establish a
higher level of security than DES. AES products are certified as
compliant with the Federal Information Processing Standards (FIPS 197)
in the U.S.A.
SM Display of AP
Evaluation Data
You can use this field to suppress the display of data about this AP on
the AP Evaluation tab of the Tools page in all SMs that register.
Web, Telnet, FTP
Session Timeout
Enter the expiry in seconds for remote management sessions via HTTP,
telnet, or ftp access to the AP.
IP Access Control You can permit access to the AP from any IP address (
IP Access Filtering
Disabled
) or limit it to access from only one, two, or three IP addresses
that you specify (
IP Access Filtering Enabled
). If you select
IP Access
Filtering Enabled
, then you must populate at least one of the three
Allowed Source IP
parameters or have no access permitted from any IP
address
Allowed Source IP 1 If you selected
IP Access Filtering Enabled
for the
IP Access Control
parameter, then you must populate at least one of the three
Allowed
Source IP
parameters or have no access permitted to the AP from any IP
address. You may populate as many as all three.
Allowed Source IP 2 If you selected
IP Access Filtering Disabled
for the
IP Access Control
parameter, then no entries in this parameter are read, and access from
all IP addresses is permitted.
Allowed Source IP 3
Web Access The Radio supports secured and non-secured web access protocols.
Select suitable web access from drop down list:
HTTP Only
provides non-secured web access. The radio to be
accessed via http://<IP of Radio>.
HTTPs Only
provides a secured web access. The radio to be
accessed via https1://<IP of Radio>.
HTTP and HTTPs
If enabled, the radio can be accessed via both http
and https.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-180
SNMP This option allows to configure SNMP agent communication version. It
can be selected from drop down list :
SNMPv2c Only
Enables SNMP v2 community protocol.
SNMPv3 Only
Enables SNMP v3 protocol. It is secured
communication protocol.
SNMPv2c and SNMPv3
It enables both the protocols.
Telnet This option allows to
Enable
and
Disable
Telnet access to the Radio.
FTP This option allows to
Enable
and
Disable
FTP access to the Radio.
TFTP This option allows to
Enable
and
Disable
TFTP access to the Radio.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-181
SM Authentication Mode Require RADIUS or Follow
AP
If it is desired that a SM will only authenticate to an AP that is using RADIUS, on the
SM’s
Configuration Security tab set
Enforce Authentication
to
AAA
. With this
enabled, SM
does
not
register to an AP that has any
Authentication Mode
other than
RADIUS AAA
selected
.
If it is desired that a SM use the authentication method configured on the AP it is
registering
to,
set
Enforce Authentication
to
Disabled.
With
Enforce Authentication
disabled, a SM will
attempt to register
using
whichever
Authentication Mode
is configured on the AP it is attempting
to register
to.
Note
Having SMs to use RADIUS by enabling
Enforce Authentication
avoids the security
issue of SMs possibly registering to “rogue” APs, which have authentication
disabled.
Table 118
SM Security tab attributes
Chapter 7: Configuration Configuring a RADIUS server
Page 7-182
Attribute
Meaning
Authentication Key
The authentication key is a 32-character hexadecimal string used when
Authentication Mode
is set to
AP PreShared Key
. By default, this key is
set to 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF.
Select Key
This option allows operators to choose which authentication key is used:
Use Key above
means that the key specified in
Authentication Key
is
used for authentication
Use Default Key
means that a default key (based off of the SM’s MAC
address) is used for authentication
Enforce
Authentication
The SM may enforce authentication types of
AAA
and
AP Pre-
sharedKey
. The SM will not finish the registration process if the AP is
not using the configured authentication method (and the SM locks out
the AP for 15 minutes). Enforce Authentication default setting is
Disable.
Phase 1
The protocols supported for the
Phase 1
(Outside Identity) phase of
authentication are
EAPTTLS (Extensible Authentication Protocol
Tunneled Transport Layer
Security) or MSCHAPv2 (Microsoft
Challenge-Handshake Authentication Protocol version 2).
Phase 2
Select the desired
Phase 2
(Inside Identity) authentication protocol from
the
Phase 2
options of
PAP
(Password Authentication Protocol),
CHAP
(Challenge Handshake
Authentication
Protocol), and
MSCHAP
(
Microsoft’s version of CHAP, version 2 is used). The protocol
must
be
consistent with the authentication protocol configured on the RADIUS
server.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-183
Identity/Realm
If Realms are being used, select
Enable Realm
and configure an outer
identity in the
Identity
field and a Realm in the
Realm
field. These must
match the Phase 1/Outer Identity and
Realm
configured in the RADIUS
server. The default
Identity
is anonymous”. The
Identity
can be
up
to
128 non-special (no diacritical markings) alphanumeric characters. The
default
Realm
is
“canopy.net”. The
Realm
can also be up to 128 non-
special alphanumeric
characters.
Configure an outer Identity in the
Username
field. This must match the
Phase
1/Outer
Identity username configured in the RADIUS server. The
default Phase 1/Outer
Identity
Username
isanonymous”. The
Username
can be up to 128 non-special (no
diacritical
markings)
alphanumeric
characters.
Username
Enter a
Username
for the SM. This must match the username
configured for the SM on
the
RADIUS server. The default
Username
is
the SM’s MAC address. The
Username
can be up
to
128 non-special
(no diacritical markings) alphanumeric
characters.
Password Enter the desired password for the SM in the
Password
and
Confirm
Password
fields
.
The
Password
must match the password configured
for the SM on the RADIUS server.
The
default
Password
is password”.
The
Password
can be up to 128 non-special (no
diacritical
markings)
alphanumeric
characters.
Confirm Password
Upload Certificate
File
To upload a certificate manually to a SM, first load it in a known place
on your PC
or
network
drive, then click on a
Delete
button on one of
the Certificate description blocks to delete a certificate to provide space
for your certificate. Click on
Choose File,
browse to
the
location of the
certificate, and click the
Import Certificate
button, and then reboot the
radio to use the new certificate.
When a certificate is in use, after the SM successfully registers to an
AP, an indication of
In
Use
will appear in the description block of the
certificate being
used.
The public certificates installed on the SMs are used with the private
certificate on the
RADIUS
server to provide a public/private key
encryption
system.
Up to 2 certificates can be resident on a SM. An installed certificate can
be deleted
by
clicking the
Delete
button in the certificate’s description
block on the Configuration >
Security
tab. To restore fhe 2 default
certificates, click the
Use Default Certificates
button in
the
RADIUS
Certificate Settings
parameter block and reboot the
radio.
Encryption Setting
Specify the type of airlink security to apply to this AP. The encryption
setting must match the encryption setting of the SMs.
None
provides no encryption on the air link.
DES
(Data Encryption Standard): An over-the-air link encryption option
that uses secret 56-bit keys and 8 parity bits. DES performs a series of bit
permutations, substitutions, and recombination operations on blocks of
Chapter 7: Configuration Configuring a RADIUS server
Page 7-184
data. DES encryption does not affect the performance or throughput of
the system.
AES
(Advanced Encryption Standard)
:
An over-the-air link encryption
option that uses the Rijndael algorithm and 128-bit keys to establish a
higher level of security than DES. AES products are certified as
compliant with the Federal Information Processing Standards (FIPS 197)
in the U.S.A.
Web, Telnet, FTP
Session Timeout
Enter the expiry in seconds for remote management sessions via HTTP,
telnet or ftp access to the AP.
Ethernet Access
If you want to prevent any device that is connected to the Ethernet port
of the SM from accessing the management interface of the SM, select
Ethernet Access Disabled
. This selection disables access through this
port to via HTTP (the GUI), SNMP, telnet, FTP, and TFTP. With this
selection, management access is available through only the RF interface
via either an IP address (if
Network Accessibility
is set to
Public
on the
SM) or the Session Status or Remote Subscribers tab of the AP.. See
IP
Access Control
below.
If you want to allow management access through the Ethernet port,
select
Ethernet Access Enabled
. This is the factory default setting for this
parameter.
IP Access Control
You can permit access to the AP from any IP address (
IP Access Filtering
Disabled
) or limit it to access from only one, two, or three IP addresses
that you specify (
IP Access Filtering Enabled
). If you select
IP Access
Filtering Enabled
, then you must populate at least one of the three
Allowed Source IP
parameters or have no access permitted from any IP
address
Allowed Source IP 1 If you selected
IP Access Filtering Enabled
for the
IP Access Control
parameter, then you must populate at least one of the three
Allowed
Source IP
parameters or have no access permitted to the AP from any IP
address. You may populate as many as all three.
If you selected
IP Access Filtering Disabled
for the
IP Access Control
parameter, then no entries in this parameter are read, and access from
all IP addresses is permitted.
Allowed Source IP 2
Allowed Source IP 3
Web Access The Radio supports secured and non-secured web access protocols.
Select suitable web access from drop down list:
HTTP Only
provides non-secured web access. The radio to be
accessed via http://<IP of Radio>.
HTTPs Only
provides a secured web access. The radio to be
accessed via https://<IP of Radio>.
HTTP and HTTPs
If enabled, the radio can be accessed via both http
and https.
SNMP This option allows to configure SNMP agent communication version. It
can be selected from drop down list :
Chapter 7: Configuration Configuring a RADIUS server
Page 7-185
SNMPv2c Only
Enables SNMP v2 community protocol.
SNMPv3 Only
Enables SNMP v3 protocol. It is secured
communication protocol.
SNMPv2c and SNMPv3
It enables both the protocols.
Telnet This option allows to
Enable
and
Disable
Telnet access to the Radio.
FTP This option allows to
Enable
and
Disable
FTP access to the Radio.
TFTP This option allows to
Enable
and
Disable
TFTP access to the Radio.
SM - Phase 1 (Outside Identity) parameters and
settings
The protocols supported for the
Phase 1
(Outside Identity) phase of authentication
are
eapttls
(Extensible Authentication Protocol Tunneled Transport Layer
Security) and
eapMSChapV2
(Extensible Authentication Protocol Microsoft Challenge-Handshake
Authentication Protocol).
Configure an outer Identity in the
Username
field. This must match the Phase
1/Outer
Identity
username configured in the RADIUS server. The default Phase 1/Outer
Identity
Username
is
anonymous”. The
Username
can be up to 128 non-special (no
diacritical
markings)
alphanumeric
characters.
If Realms are being used in the RADIUS system (
eapttls
only), select
Enable Realm
and configure an outer identity in the
Identity
field and a Realm in the
Realm
field.
These must match the Phase 1/Outer Identity and
Realm
configured in the RADIUS server. The
default
Identity
is anonymous”. The
Identity
can be
up
to
128 non-special (no diacritical markings)
alphanumeric characters. The default
Realm
is
“canopy.net”. The
Realm
can also be up to 128 non-
special alphanumeric
characters.
SM - Phase 2 (Inside Identity) parameters and
settings
If using
eapttls
for Phase 1 authentication, select the desired
Phase 2
(Inside Identity)
authentication protocol from the
Phase 2
options of
PAP
(Password Authentication Protocol),
CHAP
(Challenge Handshake
Authentication
Protocol), and
MSCHAPv2 (
Microsoft’s version of
CHAP). The protocol
must
be
consistent with the authentication protocol configured on the
RADIUS
server.
Enter a
Username
for the SM. This must match the username configured for the
SM on
the
RADIUS server. The default
Username
is the SM’s MAC address. The
Username
can
be up
to
128 non-special (no diacritical markings) alphanumeric
characters.
Enter the desired password for the SM in the
Password
and
Confirm Password
fields
.
The
Password
must match the password configured for the SM on the RADIUS server.
The
default
Password
is password”. The
Password
can be up to 128 non-special (no
diacritical
markings)
alphanumeric
characters.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-186
Handling Certificates
Managing SM Certificates via the SM GUI
The default public Canopy certificates are loaded into SMs upon factory software installation.
The default certificates are not secure and are intended for
use
during lab and field trials as part
of gaining experience with the RADIUS functionalities or as
an
option during debug. For secure
operation, an operator will want to create or procure their
own
certificates. Resetting a SM to its
factory defaults will remove the current certificates and restore the default certificates.
Up to two certificates can be resident on a SM. An installed certificate can be deleted
by
clicking
the
Delete
button in the certificate’s description block on the Configuration >
Security
tab. To
restore fhe 2 default certificates, click the
Use Default Certificates
button in
the
RADIUS
Certificate Settings
parameter block and reboot the
radio.
To upload a certificate manually to a SM, first load it in a known place on your PC
or
network
drive, then click on a
Delete
button on one of the Certificate description blocks to delete a
certificate to provide space for your certificate. Click on
Choose File,
browse to
the
location of the
certificate, and click the
Import Certificate
button, and then reboot the radio to use the new
certificate.
When a certificate is in use, after the SM successfully registers to an AP, an indication of
In
Use
will appear in the description block of the certificate being
used.
The public certificates installed on the SMs are used with the private certificate on the
RADIUS
server to provide a public/private key encryption
system.
Note
Root certificates of more than one level (Example - a certificate from someone who
received their CA from Verisign) fails. Certificates must be either root or self-signed.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-187
Figure 80
SM Certificate Management
Configuring RADIUS servers for SM authentication
Your RADIUS server must be configured to use the
following:
EAPTTLS or MSCHAPv2 as the Phase 1/Outer Identity
protocol.
If
Enable Realm
is selected on the SM’s
Configuration
>
Security
tab, then the
same
Realm
appears there (or access to it).
The same Phase 2 (Inner Identity) protocol as configured on the SM’s
Configuration
>
Security
tab under Phase 2 options.
The username and password for each SM configured on each SM’s
Configuration
> Security
tab.
An IP address and NAS shared secret that is the same as the IP address and
Shared Secret
configured on the AP’s
Configuration > Security
tab for
that
RADIUS server.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-188
A server private certificate, server key, and CA certificate that complement
the
public
certificates distributed to the SMs, as well as the Canopy dictionary file
that
defines Vendor
Specific Attributes (VSAa). Default certificate files and
the
dictionary
file are available from
the software
site:
https://support.cambiumnetworks.com/files/pmp450 after entering your
name,
email address, and either Customer Contract Number or the MAC address of
a
module covered under the 12 month
warranty.
Optionally, operators may configure the RADIUS server response messages (Accept or Reject) so
that the user has information as to why they have been rejected. The AP displays the RADIUS
Authentication Reply message strings in the Session Status list as part of each SM’s information.
The SM will show this string (listed as Authentication Response on the SM GUI) on the main
Status page in the Subscriber Module Stats section.
Note
Aradial AAA servers only support operator-configurable Authentication Accept
responses, not Authentication Reject responses.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-189
Assigning SM management IP addressing via RADIUS
Operators may use a RADIUS AAA server to assign management IP addressing to SM modules
(framed IP address). SMs now interpret attributes Framed-IP-Address, Framed-IP-Netmask, and
Cambium-Canopy-Gateway from RADIUS. The RADIUS dictionary file has been updated to
include the Cambium-Canopy-Gateway attribute and is available on the Cambium Software
Support website.
In order for these attributes to be assigned and used by the SM, the following must be true:
The system is configured for AAA authentication
The SM is not configured for DHCP on its management interface. If DHCP is enabled and these
attributes are configured in the RADIUS server, the attributes is ignored by the SM.
The SM management interface must be configured to be publically accessible. If the SM is
configured to have local accessibility, the management interface will still be assigned the
framed addressing, and the SM iscome publicly accessible via the assigned framed IP
addressing.
When using these attributes, for the addressing to be implemented by the SM operators must
configure Framed-IP-Address in RADIUS. If Framed-IP-Address is not configured but Framed-
IP-Netmask and/or Cambium-Canopy-Gateway is configured, the attributes is ignored. In the
case where only the Framed-IP-Address is configured, Framed-IP-Netmask defaults to
255.255.0.0 (NAT disabled) / 255.255.255.0 (NAT enabled) and Cambium-Canopy-Gateway
defaults to 0.0.0.0.
Configuring RADIUS server for SM configuration
Canopy Vendor Specific Attributes (VSAs) along with VSA numbers and
other
details are listed
in Table 118. The associated SM GUI page, tab and parameter are listed to aid
cross-referencing
and understanding of the
VSAs.
A RADIUS dictionary file is available from the software
site:
https://support.cambiumnetworks.com/files/pmp450
The RADIUS dictionary file
defines
the VSAs and their values and is usually imported into the
RADIUS server as part of
server
and database
setup.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-190
Note
Beginning with System Release 12.0.2, two RADIUS dictionary files are available on
the Cambium website “RADIUS Dictionary file Cambium” and “RADIUS Dictionary
file Motorola”.
In addition to a renaming of attributes, the Cambium-branded dictionary file contains
two new VSAs for controlling uplink and downlink Maximum Burst Data Rate (these
VSAs are listed below in Table 118).
If you are transitioning from the Motorola-branded dictionary file to the Cambium-
branded dictionary file, ensure that all RADIUS profiles containing Motorola-Canopy
attribute references are updated to include Cambium-Canopy attribute references (for
all applicable VSAs listed in Table 118). Also, ensure that all RADIUS configuration
files reference the new dictionary file (as an alternative, operators may rename the
Cambium-branded dictionary file to the filename currently in use by the RADIUS
server). Once the profiles are updated and the new Cambium-branded dictionary file is
installed on the RADIUS server, restart the RADIUS server to ensure that the new
VSAs and attribute names are enabled.
Table 119
RADIUS Vendor Specific Attributes (VSAs)
Name
Number
Type
Required
Value
MS-MPPE-Send-Key
1
26.311.16
-
Y
-
-
- -
MS-MPPE-Recv-Key
2
26.311.17
-
Y
-
-
-
-
Cambium-Canopy-LPULCIR
26.161.1
integer N
0-65535
kbps
Configuration > Quality of Service > Low Priority Uplink
CIR
0
kbps
32 bits
Cambium-Canopy-LPDLCIR
26.161.2
integer N
0-65535
kbps
Configuration > Quality of Service > Low Priority Downlink
CIR
0
kbps
32 bits
Cambium-Canopy-HPULCIR
26.161.3
integer
N
0-65535
kbps
Configuration > Quality of Service > Hi Priority Uplink
CIR
0
kbps
32 bits
Cambium-Canopy-HPDLCIR
26.161.4
integer
N
0-65535
kbps
Configuration > Quality of Service > Hi Priority Uplink
CIR
0
kbps
32 bits
Cambium-Canopy-HPENABLE
26.161.5
integer
N
0-disable,
1-enable
1 Contains key for encrypting packets sent by the NAS to the remote host (for Microsoft Point-to-Point Encryption
Protocol)
2 Contains key for encrypting packets received by the NAS from the remote host (for Microsoft Point-to-Point
Encryption Protocol)
Chapter 7: Configuration Configuring a RADIUS server
Page 7-191
Configuration > Quality of Service > Hi Priority
Channel
Enable/Disable
0
32 bits
26.161.6
integer
N
0-100000
kbps
Configuration > Quality of Service > Sustained Uplink
Data
Rate
dependent
on
radio
feature
set
32 bits
Cambium-Canopy-ULBL
26.161.7
integer
N
0-2500000
kbps
Configuration > Quality of Service > Uplink Burst
Allocation
dependent
on
radio
feature
set
32 bits
Cambium-Canopy-DLBR
26.161.8
integer N
0-100000
kbps
Configuration > Quality of Service > Sustained Downlink
Data
Rate
dependent
on
radio
feature
set
32 bits
Cambium-Canopy-DLBL
26.161.9
integer
N
0-2500000
kbps
Configuration > Quality of Service > Downlink Burst
Allocation
dependent
on
radio
feature
set
32 bits
Cambium-Canopy-
VLLEARNEN
26.161.14
integer
N
0-disable,
1-enable
Configuration > VLAN > Dynamic
Learning 1
32 bits
Cambium-Canopy-
VLFRAMES
26.161.15 integer
N
0-all, 1-tagged,
2-
untagged
Configuration > VLAN > Allow Frame
Types 0
32 bits
Cambium-Canopy-VLIDSET
26.161.16 integer N
VLAN Membership
(1-4094)
Configuration > VLAN
Membership 0
32 bits
Cambium-Canopy-VLAGETO
26.161.20 integer
N
5 - 1440
minutes
Configuration > VLAN > VLAN Aging
Timeout
25
mins
32 bits
Cambium-Canopy-VLIGVID
26.161.21
integer
N
1
4094
Configuration > VLAN > Default Port
VID 1
32 bits
Cambium-Canopy-VLMGVID
26.161.22 integer
N
1
4094
Configuration > VLAN > Management
VID 1
32 bits
Cambium-Canopy-
VLSMMGPASS
26.161.23 integer
N
0-disable,
1-enable
Configuration > VLAN > SM Management VID
Pass-through 1
32 bits
Cambium-Canopy-BCASTMIR
26.161.24 integer
N
0-100000 kbps,
0=disabled
Configuration > Quality of Service > Broadcast/Multicast
Uplink
Data Rate
dependent
on
radio
feature
set
32 bits
Chapter 7: Configuration Configuring a RADIUS server
Page 7-192
Cambium-Canopy-Gateway
26.161.25 ipaddr N
-
Configuration > IP > Gateway IP Address
0.0.0.0 -
Cambium-Canopy-ULMB 26.161.26
integer
N
0-100000 kbps
Configuration > Quality of Service > Max Burst Uplink Data
Rate
0 32 bits
Cambium-Canopy-DLMB 26.161.27
integer
N
0-100000 kbps
Configuration > Quality of Service > Max Burst Downlink Data
Rate
0 32 bits
Cambium-Canopy-UserLevel 26.161.50
integer
N
1-Technician,
2-
Installer, 3-
Administrator
Account > Add User >
Level 0
32 bits
Note
VSA
numbering:
26 connotes Vendor Specific Attribute, per RFC
2865
26.311 is Microsoft Vendor Code, per
IANA
Chapter 7: Configuration Configuring a RADIUS server
Page 7-193
Using RADIUS for centralized AP and SM user name and
password management
AP Technician/Installer/Administrator
Authentication
To control technician, installer, and administrator access to the AP from a centralized
RADIUS
server:
Procedure 27
Centeralized user name and password management for AP
1
Set
Authentication Mode
on the AP’s Configuration > Security tab to
RADIUS AAA
2
Set
User Authentication Mode
on the AP’s Account > User Authentication
tab
(the tab
only appears after the AP is set to RADIUS authentication) to
Remote
or
Remote then
Local
.
Local
: The local SM is checked for accounts. No centralized
RADIUS
accounting
(access control)
is
performed.
Remote
: Authentication by the centralized RADIUS server
is
required to gain access
to the SM if the SM is registered to an
AP
that has
RADIUS AAA Authentication
Mode
selected. For up to
2
minutes a test pattern is displayed until the server
responds
or
times
out.
Remote then Local
: Authentication using the centralized
RADIUS
server is
attempted. If the server sends a reject message, then
the
setting of
Allow Local
Login after Reject from AAA
determines
if
the local user database is checked or
not. If the configured
servers
do
not respond within 2 minutes, then the local user
database
is
used. The successful login method is displayed in the
navigation
column of the SM.
Figure 81
User Authentication and Access Tracking tab of the AP
Table 120
AP User Authentication and Access Tracking attributes
Chapter 7: Configuration Configuring a RADIUS server
Page 7-194
Attribute
Meaning
User Authentication
Mode
Local
: The local SM is checked for accounts. No centralized
RADIUS
accounting (access control)
is
performed.
Remote
: Authentication by the centralized RADIUS server
is
required to gain access to the AP. For up to
2
minutes a test pattern
is displayed until the server responds
or
times
out.
Remote then Local
: Authentication using the centralized
RADIUS
server is attempted. If the server sends a reject message, then
the
setting of
Allow Local Login after Reject from AAA
determines
if
the local user database is checked or not. If the configured
servers
do
not respond within 2 minutes, then the local user database
is
used. The successful login method is displayed in the
navigation
column of the AP.
User Authentication
Method
The user authentication method employed by the radios is EAP-MD5.
Allow Local Login
after Reject from
AAA
If a user authentication is rejected from the AAA server, the user is
allowed to login locally to the radio’s management interface.
Radius Accounting
Port
The destination port on the AAA server used for Radius accounting
communication.
Accounting
Messages
disable no accounting messages are sent to the RADIUS server
deviceAccess accounting messages are sent to the RADIUS server
regarding device access (see Table 121).
dataUsage accounting messages are sent to the RADIUS server
regarding data usage (see Table 121).
Accounting Data
Usage Interval
The interval for which accounting data messages are sent from the radio
to the RADIUS server. If 0 is configured for this parameter, no data
usage messages are sent.
Chapter 7: Configuration Configuring a RADIUS server
Page 7-195
SM Re-
authentication
Interval
The interval for which the SM will re-authenticate to the RADIUS server.
SM Technician/Installer/Administrator
Authentication
The centeralized user name and paasword management for SM is same as AP. Follow AP
Technician/Installer/Administrator Authentication on page 7-193 procedure.
Note
Remote access control is enabled only after the SM registers to an AP that has
Authentication Mode
set to
RADIUS AAA
. Local access control will always be used
before registration and is used after registration if the AP is not configured for
RADIUS.
Figure 82
User Authentication and Access Tracking tab of the SM
Chapter 7: Configuration Configuring a RADIUS server
Page 7-196
Table 121
SM User Authentication and Access Tracking attributes
Attribute Meaning
User Authentication
Mode
Local
: The local SM is checked for accounts. No centralized RADIUS
accounting (access control) is performed.
Remote
: Authentication by the centralized RADIUS server is required
to gain access to the SM if the SM is registered to an AP that has
RADIUS AAA Authentication Mode
selected. For up to 2 minutes a
test pattern is displayed until the server responds or times out.
Remote then Local
: Authentication using the centralized RADIUS
server is attempted. If the server sends a reject message, then the
setting of
Allow Local Login after Reject from AAA
determines if the
local user database is checked or not. If the configured servers do
not respond within 2 minutes, then the local user database is used.
The successful login method is displayed in the navigation column
of the SM.
Allow Local Login
after Reject from
AAA
If a user authentication is rejected from the AAA server, the user is
allowed to login locally to the radio’s management interface. It is
applicable ONLY when the
User Authentication Mode
is set to “
Remote
then Loca
l”.
Note
When the radio User Authentication Mode is set to
“Local” or “Remote”, the Allow Local Login after Reject
from AAA does not any effect.
Accounting
Messages
disable no accounting messages are sent to the RADIUS server
deviceAccess accounting messages are sent to the RADIUS server
regarding device access (see Table 121).
Chapter 7: Configuration Configuring a RADIUS server
Page 7-197
Access
Tracking
To track logon and logoff times on individual radios by technicians, installers, and
administrators, on the AP or SM’s
Account
>
User Authentication and Access Tracking
tab
under
Accounting
(Access Tracking) set
Accounting Messages
to “deviceAccess”.
Device Access Tracking
is enabled separately from
User Authentication Mode
. A given AP
or
SM
can be configured for both, either, or
neither.
RADIUS Device Data Accounting
PMP 450 systems include support for RADIUS accounting messages for usage-based billing. This
accounting includes indications for subscriber session establishment, subscriber session
disconnection, and bandwidth usage per session for each SM that connects to the AP. The
attributes included in the RADIUS accounting messages are shown in the table below.
Table 122
Device data accounting RADIUS attributes
Sender Message Attribute Value Description
AP Accounting-
Request
Acct-Status-Type 1 - Start This message is
sent every time a
SM registers with
an AP, and after
the SM stats are
cleared.
Acct-Session-Id
Unique per AP session.
Initial value is SM MAC, and
increments after every start
message sent of an in
session SM.
Event-Timestamp UTC time the event
occurred on the AP
AP Accounting-
Request
Acct-Status-Type 2 - Stop This message is
sent every time a
SM becomes
unregistered with
an AP, and when
the SM stats are
cleared.
Acct-Session-Id
Unique per AP session.
Initial value is SM MAC, and
increments after every start
message sent of an in
session SM.
Acct-Input-Octets
Sum of the input octets
received at the SM over
regular data VC and the
high priority data VC (if
enabled). Will not include
broadcast.
Acct-Output-Octets
Sum of the output octets
sent from the SM over
regular data VC and the
high priority data VC (if
enabled).
Chapter 7: Configuration Configuring a RADIUS server
Page 7-198
Sender Message Attribute Value Description
Acct-Input-
Gigawords
Number of times the Acct-
Input-Octets counter has
wrapped around 2^32 over
the course of the session
Acct-Output-
Gigawords
Number of times the Acct-
Output-Octets counter has
wrapped around 2^32 over
the course of the session
Acct-Input-Packets
Sum of unicast and
multicast packets that are
sent to a particular SM over
the regular data VC and the
high priority data VC (if
enabled). It will not include
broadcast.
Acct-Output-
Packets
Sum of unicast and
multicast packets that are
sent from a particular SM
over the regular data VC
and the high priority data
VC (if enabled).
Acct-Session-Time Uptime of the SM session.
Acct-Terminate-
Cause
Reason code for session
termination
AP Accounting-
Request
Acct-Status-Type 3 - Interim-Update This message is
sent periodically
per the operator
configuration on
the AP in seconds.
Interim update
counts are
cumulative over
the course of the
session
Acct-Session-Id
Unique per AP session.
Initial value is SM MAC, and
increments after every start
message sent of an in
session SM.
Acct-Input-Octets
Sum of the input octets sent
to the SM over regular data
VC and the high priority
data VC (if enabled). Will
not include broadcast.
Acct-Output-Octets
Sum of the output octets
set from the SM over
regular data VC and the
high priority data VC (if
enabled).
Chapter 7: Configuration Configuring a RADIUS server
Page 7-199
Sender Message Attribute Value Description
Acct-Input-
Gigawords
Number of times the Acct-
Input-Octets counter has
wrapped around 2^32 over
the course of the session
Acct-Output-
Gigawords
Number of times the Acct-
Output-Octets counter has
wrapped around 2^32 over
the course of the session
Acct-Session-Time Uptime of the SM session.
Acct-Input-Packets
Sum of unicast and
multicast packets that are
sent to a particular SM over
the regular data VC and the
high priority data VC (if
enabled). It will not include
broadcast.
Acct-Output-
Packets
Sum of unicast and
multicast packets that are
sent from a particular SM
over the regular data VC
and the high priority data
VC (if enabled).
The data accounting configuration is located on the AP’s
Accounts
>
User Authentication and
Access Tracking
GUI menu, and the AP’s
Authentication Mode
must be set to
Radius AAA
for the
menu to appear. The accounting may be configured via the AP GUI as shown in the figures below.
By default accounting messages are not sent and the operator has the choice of configuring to
send only Device Access accounting messages (when a user logs in or out of the radio), only Data
Usage messages, or both. When Data Accounting is enabled, the operator must specify the
interval of when the data accounting messages are sent (0 disabled, or in the range of 30-10080
minutes). The default interval is 30 minutes.
Figure 83
RADIUS accounting messages configuration
Chapter 7: Configuration Configuring a RADIUS server
Page 7-200
The data accounting message data is based on the SM statistics that the AP maintains, and these
statistics may be cleared on the AP by an operator. If an operator clears these messages and data
accounting is enabled, an accounting stop message is sent followed by an accounting start
message to notify the AAA of the change.
If an operator clears the VC statistics on the device through the management GUI, a RADIUS stop
message and data start message is issued for each device affected. The start and stop messages
will only be sent once every 5 minutes, so if an operator clears these statistics multiple times
within 5 minutes, only one set of data stop/start messages is sent. This may result in inaccurate
data accumulation results.
RADIUS Device Re-authentication
PMP 450i systems include support for periodic SM re-authentication in a network without requiring
the SM to re-register (and drop the session). The re-authentication may be configured to occur in
the range of every 30 minutes to weekly.
Figure 84
Device re-authentication configuration
The re-authentication interval is only configurable on the AP. When this feature is enabled, each
SM that enters the network will re-authenticate each the interval time has expired without
dropping the session. The response that the SM receives from the AAA server upon re-
authentication is one of the following:
Success
: The SM continues normal operation
Reject
: The SM de-registers and will attempt network entry again after 1 minute and then if
rejected will attempt re-entry every 15 minutes
Timeout or other error
: The SM remains in session and attempt 5 times to re-authenticate with
the RADIUS-REQUEST message. If these attempts fail, then the SM will go out of session and
proceed to re-authenticate after 5 minutes, then every 15 minutes.
Although re-authentication is an independent feature, it was designed to work alongside with the
RADIUS data usage accounting messages. If a user is over their data usage limit the network
operator can reject the user from staying in the network. Operators may configure the RADIUS
‘Reply-Message’ attribute with an applicable message (i.e. “Data Usage Limit Reached”) that is
sent to the subscriber module and displayed on the general page.
Page 8-1
Chapter 8: Tools
The AP and SM GUIs provide several tools to analyze the operating environment, system
performance and networking, including:
Using Spectrum Analyzer tool on page 8-2
Using the Alignment Tool on page 8-13
Using the Link Capacity Test tool on page 8-19
Using AP Evaluation tool on page 8-22
Using BHM Evaluation tool on page 8-26
Using the OFDM Frame Calculator tool on page 8-30
Using the Subscriber Configuration tool on page 8-34
Using the Link Status tool on page 8-35
Using BER Results tool on page 8-38
Using the Sessions tool on page 8-39
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-2
Using Spectrum Analyzer tool
The integrated spectrum analyzer can be very useful as a tool for troubleshooting and RF planning,
but is not intended to replicate the accuracy and programmability of a high-end spectrum analyzer,
which sometime can be used for other purposes.
The AP/BHM and SM/BHS perform spectrum analysis together in the Sector Spectrum Analyzer
tool.
Caution
On start of the Spectrum Analyzer on a module, it enters a scan mode and drops any
RF connection it may have had. When choosing
Start Timed Spectrum Analysis
, the
scan is run for the amount of time specified in the
Duration
configuration parameter.
When choosing
Start Continuous Spectrum Analysis
, the scan is run continuously for
24 hours, or until stopped manually (using the
Stop Spectrum Analysis
button).
Any module can be used to see the frequency and power level of any detectable signal that is
within, just above, or just below the frequency band range of the module.
Note
Vary the days and times when you analyze the spectrum in an area. The RF
environment can change throughout the day or throughout the week.
Mapping RF Neighbor Frequencies
The neighbor frequencies can be analyzed using Spectrum Anlayzer tool. Following modules allow
user to:
Use a BHS or BHM for PTP and SM or AP for PMP as a Spectrum Analyzer.
View a graphical display that shows power level in RSSI and dBm at 5 MHz increments
throughout the frequency band range, regardless of limited selections in the
Custom Radio
Frequency Scan Selection List
parameter of the SM/BHS.
Select an AP/BHM channel that minimizes interference from other RF equipment.
Caution
The following procedure causes the SM/BHS to drop any active RF link. If a link is
dropped when the spectrum analysis begins, the link can be re-established when
either a 15 minute interval has elapsed or the spectrum analyzer feature is disabled..
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-3
Temporarily deploy a SM/BHS for each frequency band range that need to monitor and access the
Spectrum Analyzer tab in the Tools web page of the module.
Using Spectrum Analyzer tool
Using the Remote Spectrum Analyzer tool
Spectrum Analyzer tool
Analyzing the spectrum
To use the built-in spectrum analyzer functionality of the AP/SM/BH, proceed as follows:
Procedure 28
Analyzing the spectrum
1
Predetermine a power source and interface that works for the AP/SM/BH in the
area to be analyzed.
2
Take the AP/SM/BH, power source and interface device to the area.
3
Access the
Tools
web page of the AP/SM/BH.
4
Enter
Duration
in Timed Spectrum Analyzer Tab. Default value is 10 Seconds
5
Click
Start Timed Sector Spectrum Analysis
6
The results are displayed:
Figure 85
Spectrum anlayis - Results
Note
AP/SM/BH scans for extra 40 seconds in addition to configured
Duration
7
Travel to another location in the area to BHS.
8
Click
Start Timed Spectrum Analysis
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-4
9
Repeat Steps 4 and 6 until the area has been adequately scanned and logged.
As with any other data that pertains to your business, a decision today to put the data into a
retrievable database may grow in value to you over time.
Note
Wherever the operator find the measured noise level is greater than the sensitivity of
the radio that is plan to deploy, use the noise level (rather than the link budget) for
your link feasibility calculations.
The AP/SM/BH perform spectrum analysis together in the Sector Spectrum Analyzer
feature.
Graphical spectrum analyzer display
The AP/SM/BH display the graphical spectrum analyzer. An example of the
Spectrum Analyzer
page is shown in Figure 85.
The navigation feature includes:
Results may be panned left and right through the scanned spectrum by clicking and dragging
the graph left and right
Results may be zoomed in and out using mouse
When the mouse is positioned over a bar, the receive power level, frequency, maximum and mean
receive power levels are displayed above the graph
To keep the displayed data current, either set “Auto Refresh” on the module’s
Configuration >
General.
Spectrum Analyzer page of AP
The Spectrum Analyzer page of AP is explained in Table 122.
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-5
Table 123
Spectrum Analyzer page attributes - AP
Attribute
Meaning
Display Data Path
Both
means that the vertical and horizontal paths are displayed or an
individual path may be selected to display only a single-path reading.
Data For ease of parsing data and to facilitate automation, the spectrum
analyzer results may be saved as an XML file. To save the results in an
XML formatted file, right-click the “SpectrumAnalysis.xml” link and save
the file..
Display
Instantaneous
means that each reading (vertical bar) is displayed with
two horizontal lines above it representing the max power level received
(top horizontal line) and the average power level received (lower
horizontal line) at that frequency.
Averaging
means that each reading (vertical bar) is displayed with an
associated horizontal line above it representing the max power level
received at that frequency.
Registered SM Count This field displays the MAC address and Site Name of the registered SM.
Maximum Count of
Registered SMs
This field displays the maximum number of registered SMs.
Duration This field allows operators to configure a specified time for which the
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-6
spectrum is scanned. If the entire spectrum is scanned prior to the end
of the configured duration, the analyzer will restart at the beginning of
the spectrum.
Continuous
Spectrum Analyzer
Start Continuous Spectrum Analysis
button ensures that when the SM is
powered on, it automatically scans the spectrum for 10 seconds. These
results may then be accessed via the
Tools > Spectrum Analyzer
GUI
page.
Spectrum Analyzer page of SM
The Spectrum Analyzer page of SM is explained in Table 123.
Table 124
Spectrum Analyzer page attributes - SM
Attribute
Meaning
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-7
Display Data Path Refer Table 122 on page 8-5
Data Refer Table 122 on page 8-5
Display Refer Table 122 on page 8-5
Min and Max
Frequencies in KHz
To scan min to max range of frequencies, enter min and max
frequencies in KHz and press
Set Min and Max to Full Scan
button.
To scan +/- 40 MHz from center frequency, enter center frequency in KHz
and presss
Set Min And Max To Center Scan +/- 40KHz
button.
Registered SM Count Refer Table 122 on page 8-5
Maximum Count to
Registered SMs
Refer Table 122 on page 8-5
Duration Refer Table 122 on page 8-5
Spectrum Alayzer page of BHM
The Spectrum Analyzer page of BHM is explained in Table 124.
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-8
Table 125
Spectrum Analyzer page attributes - BHM
Attribute
Meaning
Data Refer Table 122 on page 8-5
Display Refer Table 122 on page 8-5
Duration Refer Table 122 on page 8-5
Continuous
Spectrum Analyzer
Refer Table 122 on page 8-5
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-9
Spectrum Alayzer page of BHS
The Spectrum Analyzer page of BHS is explained in Table 125.
Table 126
Spectrum Analyzer page attributes - BHS
Attribute
Meaning
Data Refer Table 122 on page 8-5
Display Refer Table 122 on page 8-5
Session Status This field displays current session status and rates. The session states
can be Scanning, Syncing, Registering or Registered.
Registered Backhaul This field displays MAC address of BHM and PTP model number
Duration Refer Table 122 on page 8-5
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-10
Perform Spectrum
Analysis on Boot Up
for one scan
This field allows to Enable or Disable to start Spectrum Analysis on boot
up of module for one scan.
Continuous
Spectrum Analyzer
Refer Table 122 on page 8-5
Remote Spectrum Analyzer tool
The Remote Spectrum Analyzer tool in the AP/BHM provides additional flexibility in the use of the
spectrum analyzer in the SM/BHS. Set the duration of 10 to 1000 seconds, then click the
Start
Remote Spectrum Analysis
button to launch the analysis from that SM/BHS.
In PMP configuration, a SM has to be selected from the drop-down list before launching
Start
Remote Spectrum Analysis
.
Analyzing the spectrum remortly
Procedure 29
Remote Spectrum Analyzer procedure
1
The AP/BHM de-registers the target SM/BHS.
2
The SM/BHS scans (for the duration set in the AP/BHM tool) to collect data for the
bar graph.
3
The SM/BHS re-registers to the AP/BHM.
4
The AP/BHM displays the bar graph.
The bar graph is an HTML file, but can be changed to an XML file, which is then easy to analyze
through the use of scripts that you may write for parsing the data. To transform the file to XML,
click the SpectrumAnalysis.xmllink below the spectrum results. Although the resulting display
appears mostly unchanged, the bar graph is now coded in XML. You can now right-click on the bar
graph for a
Save Target As
option to save the Spectrum Analysis.xml file.
Remote Spectrum Analyzer page of AP
The Remote Spectrum Analyzer page of AP is explained in Table 126.
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-11
Table 127
Remote Spectrum Analyzer attributes - AP
Attribute
Meaning
Registered SM Count This field displays the number of SMs that were registered to the AP
before the SA was started. This helps the user know all the SMs re-
registered after performing a SA.
Maximum Count of
Registered SMs
This field displays the largest number of SMs that have been
simultaneously registered in the AP since it was last rebooted. This
count can provide some insight into sector history and provide
comparison between current and maximum SM counts at a glance.
Current Subscriber
Module
The SM with which the Link Capacity Test is run.
Duration This field allows operators to configure a specified time for which the
spectrum is scanned. If the entire spectrum is scanned prior to the end
of the configured duration, the analyzer will restart at the beginning of
the spectrum.
Scanning Bandwidth This parameter defines the size of the channel scanned when running
the analyzer.
Chapter 8: Tools Using Spectrum Analyzer tool
Page 8-12
Remote Spectrum Analyzer page of BHM
The Remote Spectrum Analyzer page of BHM is explained in Table 127.
Table 128
Remote Spectrum Analyzer attributes - BHM
Attribute
Meaning
Duration Refer Table 122 on page 8-5
Chapter 8: Tools Using the Alignment Tool
Page 8-13
Using the Alignment Tool
The SM’s or BHS’s Alignment Tool may be used to maximize Receive Power Level, Signal Strength
Ratio and Signal to Noise Ratio to ensure a stable link. The Tool provides color coded readings to
facilitate in judging link quality.
Note
To get best performance of the link, the user has to ensure the maximum Receive
Power Level during alignment by pointing correctly. The proper alignment is
important to prevent interference in other cells. The achieving Receive Power Level
green ( >- 70 dBm) is not sufficient for the link.
Figure 86
Alignment Tool tab of SM Receive Power Level > -70 dBm
Figure 87
Alignment Tool tab of SM Receive Power Level between -70 to -80 dBm
Figure 88
Alignment Tool tab of SM Receive Power Level < -80 dBm
Chapter 8: Tools Using the Alignment Tool
Page 8-14
Alignment Tool and Diagnostic LEDSM/BHS
The SM’s/BHS’s Alignment Tool (located in GUI
Tools >
Alignment
) may be used to configure the
SM’s/BHS’s LED panel to indicate received signal strength and to display decoded beacon
information/power levels. The SM/BHS LEDs provide different status based on the mode of the
SM/BHS. A SM/BHS in “operating” mode will register and pass traffic normally. A SM/BHS in
“aiming” mode will not register or pass traffic, but will display (via LED panel) the strength of
received radio signals (based on radio channel selected via
Tools
>
Alignment
). To enter “aiming”
mode, configure parameter
Scan Radio Frequency Only Mode
to “Enabled”. See SM/BHS LEDs on
page 2-7.
Note
In order for accurate power level readings to be displayed, traffic must be present on
the radio link.
Refer Table 7 SM/BHS LED descriptions on page 2-8 for SM/BHS LED details.
Alignment page of SM
The Alignment page of SM is explained in Table 128.
Table 129
Alignment page attributes - SM
Attribute
Meaning
Scan Radio
Frequency Only
Enabled
: the radio is configured to “aiming” or “alignment” mode,
wherein the LED panel displays an indication of receive power level. See
Chapter 8: Tools Using the Alignment Tool
Page 8-15
Mode Table 7 SM/BHS LED descriptions on page 2-8.
Disabled:
the radio is configured to “operating” mode, wherein the SM
registers and passes traffic normally.
Radio Frequency This field indicates the center frequency for which results are displayed.
Current Status This field indicates the current mode of the radio, “alignment” or
“operating”.
Power Level This field indicates the current receive power level (vertical channel) for
the frequency configured in parameter
Radio Frequency
.
Number Registered
Users
When the radio is in “operating” mode, this field reports the number of
registered SMs for the AP operating at the frequency defined in
parameter
Radio Frequency
.
Peak Power This field indicates the highest power level see by the SMs receiver.
Users This field indicates the number of SMs currently registered to the AP
which is transmitting the beacon information.
Frequency This field indicates the frequency of the AP which is transmitting the
beacon information.
ESN This field indicates the MAC, or hardware address of the AP which is
transmitting the beacon information.
Color Code This field displays a value from 0 to 254 indicating the AP’s configured
color code. For registration to occur, the color code of the SM and the AP
must match. Color code is not a security feature. Instead, color code is a
management feature, typically for assigning each sector a different color
code.
Color code allows you to force a SM to register to only a specific AP,
even where the SM can communicate with multiple APs. The default
setting for the color code value is 0. This value matches only the color
code of 0 (not all 255 color codes).
Backhaul
0
indicates that the beacon transmitter is an AP.
Alignment page of BHS
The Alignment page of BHS is explained in Table 129.
Chapter 8: Tools Using the Alignment Tool
Page 8-16
Table 130
Alignment page attributes - BHS
Attribute
Meaning
Scan Radio
Frequency Only
Mode
Enabled
: the radio is configured to “aiming” or “alignment” mode,
wherein the SM’s LED panel displays an indication of receive power
level. See Table 139 on page 9-7.
Disabled:
the radio is configured to “operating” mode, wherein the SM
registers and passes traffic normally.
Radio Frequency This field indicates the center frequency for which results are displayed.
Current Status This field indicates the current mode of the radio, “alignment” or
“operating”.
Power Level This field indicates the current receive power level (vertical channel) for
the frequency configured in parameter
Radio Frequency
.
Number Registered
Users
When the radio is in “operating” mode, this field reports the number of
registered BHS for the BHM operating at the frequency defined in
parameter
Radio Frequency
.
Peak Power This field indicates the highest power level see by the SMs receiver.
Users This field indicates the number of BHS currently registered to the BHM
which is transmitting the beacon information.
Frequency This field indicates the frequency of the AP which is transmitting the
beacon information.
ESN This field indicates the MAC, or hardware address of the BHM which is
transmitting the beacon information.
Color Code This field displays a value from 0 to 254 indicating the BHM’s configured
color code. For registration to occur, the color code of the BHS and the
BHM must match. Color code is not a security feature. Instead, color
code is a management feature, typically for assigning each sector a
different color code.
Chapter 8: Tools Using the Alignment Tool
Page 8-17
Color code allows you to force a BHS to register to only a specific BHM,
even where the BHS can communicate with multiple APs. The default
setting for the color code value is 0. This value matches only the color
code of 0 (not all 255 color codes).
Backhaul
0
indicates that the beacon transmitter is a BHM.
Alignment Tone
For coarse alignment of the SM/BHS, use the Alignment Tool located at
Tools >
Alignment Tool
.
Optionally, connect a headset alignment tone kit to the AUX/SYNC port of the SM/BHS and listen
to the alignment tone, which indicates greater SM/BHS receive signal power by pitch. By adjusting
the SM’s/BHS’s position until the highest frequency pitch is obtained operators and installers can
be confident that the SM/BHS is properly positioned. For information on device GUI tools available
for alignment, see sections Alignment Tool and Diagnostic LED SM/BHS on page 8-14, Using the
Link Capacity Test tool on page 8-19 and Using AP Evaluation tool on page 8-22.
Figure 89
Link alignment tone
Headphones
Alignment tone
adapter
Chapter 8: Tools Using the Alignment Tool
Page 8-18
Alignment Tone Cable
A standard 32 ohms stereo headset can be connected to the AUX port to use the audio alignment
tool. The diagram of the adapter is provided in Figure 90. The recommended values for both
resistors are 220 ohm, 0.25W.
Figure 90
Alignment Tone Cable
8
200 Ω
200 Ω
Resistors
Pin 7
Pin 4
Left
Right
Common
1
Chapter 8: Tools Using the Link Capacity Test tool
Page 8-19
Using the Link Capacity Test tool
The
Link Capacity Test
tab allows you to measure the throughput and efficiency of the RF link
between two modules. Many factors, including packet length, affect throughput. The
Link Capacity
Test
tab contains the settable parameter
Packet Length
with a range of 64 to 1714 bytes. This
allows you to compare throughput levels that result from various packet sizes.
Performing link capacity test
To run a simple link capacity test that floods the link with 1714 byte packets for 10 seconds,
perform the following procedure:
Procedure 30
Performing a simple Link Capacity Test
1
Access the Link Capacity Test tab in the Tools web page of the module.
2
Select Link Test Mode
Link Test with Bridging
3
Select the subscriber module to test using the Current Subscriber Module parameter.
4
Type into the
Duration
field how long (in seconds) the RF link must be tested.
5
Type into the
Number of Packets
field a value of
0
to flood the link for the duration of
the test.
6
Type into the
Packet Length
field a value of
1714
to send 1714-byte packets during the
test.
7
Click the
Start Test
button.
8
In the Current Results Status block of this tab, view the results of the test. See Figure
91 on page 8-19.
Figure 91
Link Capacity Test tab with 1714-byte packet length
Chapter 8: Tools Using the Link Capacity Test tool
Page 8-20
Link Capacity Test page of AP/SM
The Link Capacity Test page of AP is explained in Table 130.
Table 131
Link Capacity Test page attributes - AP
Attribute
Meaning
Link Test Mode
RF Link Test: Fully tests radio-to-radio communication, but does not
bridge traffic.
Link Test with Bridging: Bridges traffic to “simulated” Ethernet
ports, providing a status of the bridged link.
Link Test with Bridging and MIR: Bridges the traffic during test and
also adheres to any MIR (Maximum Information Rate) settings for
the link.
Note
This mode setting must be equal on both the AP and the
SM when running the link test for proper bridging and MIR
handling..
Signal to Noise Ratio
Calculation during
Link Test
Enable this attribute to display Signal-to-Noise information for the
downlink and uplink when running the link test.
Link Test VC Priority This attribute may be used to enable/disable usage of the high priority
virtual channel during the link test.
Current Subscriber
Module
The SM with which the Link Capacity Test is run. This field is only
applicable for AP (not SM page).
Duration
This field allows operators to configure a specified time for which the
spectrum is scanned. If the entire spectrum is scanned prior to the end
of the configured duration, the analyzer will restart at the beginning of
Chapter 8: Tools Using the Link Capacity Test tool
Page 8-21
the spectrum.
Direction
Configure the direction of the link test. Specify
Downlink
or
Uplink
to run
the test only in the corresponding direction only. Specific
Bi-Directional
to run the test in both directions.
Number of Packets The total number of packets to send during the Link Capacity Test.
When Link Test Mode is set to
RF Link Test
this field is not configurable.
Packet Length The size of the packets in Bytes to send during the Link Capacity Test
Link Capacity Test page of BHM/BHS
The Link Capacity Test page of BHM/BHS is explained in Table 131.
Table 132
Link Capacity Test page attributes BHM/BHS
Attribute
Meaning
Link Test Mode See Table 130 on page 8-20
Signal to Noise Ratio Calculation
during Link Test See Table 130 on page 8-20
Link Test VC Priority See Table 130 on page 8-20
Duration See Table 130 on page 8-20
Direction See Table 130 on page 8-20
Number of Packets See Table 130 on page 8-20
Packet Length See Table 130 on page 8-20
Chapter 8: Tools Using AP Evaluation tool
Page 8-22
Using AP Evaluation tool
The
AP Evaluation
tab on
Tools
web page of the SM provides information about the AP that the
SM sees.
Note
The data for this page may be suppressed by the
SM Display of AP Evaluation Data
setting in the
Configuration > Security
tab of the AP.
AP Evaluation page of AP
The AP Evaluation page of AP is explained in Table 132.
Table 133
AP Evaluation tab attributes - AP
Attribute
Meaning
Index This field displays the index value that the system assigns (for only this
page) to the AP where this SM is registered.
Frequency This field displays the frequency that the AP transmits.
Channel Bandwidth The channel size used by the radio for RF transmission. The setting for
the channel bandwidth must match between the AP and the SM.
Chapter 8: Tools Using AP Evaluation tool
Page 8-23
Cyclic Prefix OFDM technology uses a cyclic prefix, where a portion of the end of a
symbol (slot) is repeated at the beginning of the symbol to allow multi-
pathing to settle before receiving the desired data. A 1/16 cyclic prefixes
mean that for every 16 bits of throughput data transmitted, an additional
bit is used. The Cyclic Prefix 1/16 only can be selected at this time.
ESN This field displays the MAC address (electronic serial number) of the AP.
For operator convenience during SM aiming, this tab retains each
detected ESN for up to 15 minutes. If the broadcast frequency of a
detected AP changes during a 15-minute interval in the aiming
operation, then a multiple instance of the same ESN is possible in the
list. Eventually, the earlier instance expires and disappears and the later
instance remains to the end of its interval, but you can ignore the early
instance(s) whenever two or more are present.
Region This field displays the AP’s configured Country Code setting.
Power Level
This field displays the SM’s combined received power level from the
AP’s transmission.
Beacon Count A count of the beacons seen in a given time period.
FECEn This field contains the SNMP value from the AP that indicates whether
the Forward Error Correction feature is enabled.
0: FEC is disabled
1: FEC is enabled
Type Multipoint indicates that the listing is for an AP.
Age This is a counter for the number of minutes that the AP has been
inactive. At 15 minutes of inactivity for the AP, this field is removed from
the AP Evaluation tab in the SM.
Lockout This field displays how many times the SM has been temporarily locked
out of making registration attempts.
RegFail This field displays how many registration attempts by this SM failed.
Range This field displays the distance in feet for this link. To derive the distance
in meters, multiply the value of this parameter by 0.3048.
MaxRange This field indicates the configured value for the AP’s Max Range
parameter.
TxBER A 1 in this field indicates the AP is sending Radio BER.
EBcast A 1 in this field indicates the AP or BHM is encrypting broadcast packets.
A 0 indicates it is not.
Session Count
This field displays how many sessions the SM (or BHS) has had with the
AP (or BHM). Typically, this is the sum of Reg Count and Re-Reg Count.
However, the result of internal calculation may display here as a value
Chapter 8: Tools Using AP Evaluation tool
Page 8-24
that slightly differs from the sum.
In the case of a multipoint link, if the number of sessions is significantly
greater than the number for other SMs, then this may indicate a link
problem or an interference problem.
NoLUIDs This field indicates how many times the AP has needed to reject a
registration request from a SM because its capacity to make LUID
assignments is full. This then locks the SM out of making any valid
attempt for the next 15 minutes. It is extremely unlikely that a non-zero
number would be displayed here.
OutOfRange This field indicates how many times the AP has rejected a registration
request from a SM because the SM is a further distance away than the
range that is currently configured in the AP. This then locks the SM out
of making any valid attempt for the next 15 minutes.
AuthFail This field displays how many times authentication attempts from this
SM have failed in the AP.
EncryptFail This field displays how many times an encryption mismatch has
occurred between the SM and the AP.
Rescan Req This field displays how many times a re-range request has occurred for
the BHM that is being evaluated in the AP Eval page of a BHS.
SMLimitReached This field displays 0 if additional SMs may be registered to the AP. If a 1
is displayed, the AP will not accept additional SM registrations.
NoVC’s This counter is incremented when the SM is registering to an AP which
determines that no VC resources are available for allocation. This could
be a primary data VC or a high priority data VC.
VCRsvFail This counter is incremented when the SM is registering to an AP which
has a VC resource available for allocation but cannot reserve the
resource for allocation.
VCActFail This counter is incremented when the SM is registering to an AP which
has a VC resource available for allocation and has reserved the VC, but
cannot activate the resource for allocation.
AP Gain This field displays the total external gain (antenna) used by the AP.
RcvT This field displays the AP’s configured receive target for receiving SM
transmissions (this field affects automatic SM power adjust).
Sector ID This field displays the value of the
Sector ID
field that is provisioned for
the AP.
Color Code This field displays a value from 0 to 254 indicating the AP’s configured
color code. For registration to occur, the color code of the SM and the AP
must match. Color code is not a security feature. Instead, color code is a
management feature, typically for assigning each sector a different color
Chapter 8: Tools Using AP Evaluation tool
Page 8-25
code.
Color code allows you to force a SM to register to only a specific AP,
even where the SM can communicate with multiple APs. The default
setting for the color code value is 0. This value matches only the color
code of 0 (not all 255 color codes).
BeaconVersion This field indicates that the beacon is OFDM (value of 1).
Sector User Count This field displays how many SMs are registered on the AP.
NumULHalfSlots This is the number of uplink slots in the frame for this AP.
NumDLHalfSlots This is the number of downlink slots in the frame for this.
NumULContSlots This field displays how many Contention Slots are being used in the
uplink portion of the frame.
WhiteSched Flag to display if schedule whitening is supported via FPGA
ICC This field lists the SMs that have registered to the AP with their
Installation Color Code (ICC),
Primary CC, Secondary CC or Tertiary CC.
SM PPPoE This filed provides information to the user whether the SM is supporting
PPPoE or not.
Frame Period This field displays the configured Frame Period of the radio.
Chapter 8: Tools Using BHM Evaluation tool
Page 8-26
Using BHM Evaluation tool
The
BHM Evaluation
tab on
Tools
web page of the BHS provides information about the BHM that
the BHS sees.
BHM Evaluation page of BHM
The BHM Evaluation page of BHM is explained in Table 133.
Table 134
BHM Evaluation tab attributes - BHM
Attribute
Meaning
Index This field displays the index value that the system assigns (for only this
page) to the BHM where this BHS is registered.
Frequency This field displays the frequency that the BHM transmits.
Channel Bandwidth The channel size used by the radio for RF transmission. The setting for
the channel bandwidth must match between the BHM and the BHS.
Cyclic Prefix OFDM technology uses a cyclic prefix, where a portion of the end of a
symbol (slot) is repeated at the beginning of the symbol to allow multi-
pathing to settle before receiving the desired data. A 1/16 cyclic prefixes
mean that for every 16 bits of throughput data transmitted, an additional
bit is used.
ESN This field displays the MAC address (electronic serial number) of the
BHM. For operator convenience during BHS aiming, this tab retains each
detected ESN for up to 15 minutes. If the broadcast frequency of a
detected BHM changes during a 15-minute interval in the aiming
operation, then a multiple instance of the same ESN is possible in the
list. Eventually, the earlier instance expires and disappears and the later
Chapter 8: Tools Using BHM Evaluation tool
Page 8-27
instance remains to the end of its interval, but you can ignore the early
instance(s) whenever two or more are present.
Region This field displays the BHM’s configured Country Code setting.
Power Level
This field displays the BHS’s combined received power level from the
BHM’s transmission.
Beacon Count A count of the beacons seen in a given time period.
FECEn This field contains the SNMP value from the BHM that indicates whether
the Forward Error Correction feature is enabled.
0: FEC is disabled
1: FEC is enabled
Type Multipoint indicates that the listing is for an BHM.
Age This is a counter for the number of minutes that the BHM has been
inactive. At 15 minutes of inactivity for the BHS, this field is removed
from the BHM Evaluation tab in the BHS.
Lockout This field displays how many times the BHS has been temporarily locked
out of making registration attempts.
RegFail This field displays how many registration attempts by this BHS failed.
Range This field displays the distance in feet for this link. To derive the distance
in meters, multiply the value of this parameter by 0.3048.
MaxRange This field indicates the configured value for the AP’s Max Range
parameter.
TxBER A 1 in this field indicates the BHM is sending Radio BER.
EBcast A 1 in this field indicates the BHM is encrypting broadcast packets. A 0
indicates it is not.
Session Count
This field displays how many sessions the BHS has had with the BHM.
Typically, this is the sum of Reg Count and Re-Reg Count. However, the
result of internal calculation may display here as a value that slightly
differs from the sum.
In the case of a multipoint link, if the number of sessions is significantly
greater than the number for other BHS’s, then this may indicate a link
problem or an interference problem.
NoLUIDs This field indicates how many times the BHM has needed to reject a
registration request from a BHS because its capacity to make LUID
assignments is full. This then locks the BHS out of making any valid
attempt for the next 15 minutes. It is extremely unlikely that a non-zero
number would be displayed here.
OutOfRange This field indicates how many times the BHM has rejected a registration
request from a BHS because the BHS is a further distance away than the
Chapter 8: Tools Using BHM Evaluation tool
Page 8-28
range that is currently configured in the BHM. This then locks the BHS
out of making any valid attempt for the next 15 minutes.
AuthFail This field displays how many times authentication attempts from this
SM have failed in the BHM.
EncryptFail This field displays how many times an encryption mismatch has
occurred between the BHS and the BHM.
Rescan Req This field displays how many times a re-range request has occurred for
the BHM that is being evaluated in the BHM Eval page of a BHM.
SMLimitReached This field displays 0 if additional BHSs may be registered to the BHM. If
a 1 is displayed, the BHM will not accept additional BHS registrations.
NoVC’s This counter is incremented when the BHS is registering to an BHM
which determines that no VC resources are available for allocation. This
could be a primary data VC or a high priority data VC.
VCRsvFail This counter is incremented when the BHS is registering to an BHM
which has a VC resource available for allocation but cannot reserve the
resource for allocation.
VCActFail This counter is incremented when the BHS is registering to an BHM
which has a VC resource available for allocation and has reserved the
VC, but cannot activate the resource for allocation.
AP Gain This field displays the total external gain (antenna) used by the BHM.
RcvT This field displays the AP’s configured receive target for receiving BHS
transmissions (this field affects automatic BHS power adjust).
Sector ID This field displays the value of the
Sector ID
field that is provisioned for
the BHM.
Color Code This field displays a value from 0 to 254 indicating the BHM’s configured
color code. For registration to occur, the color code of the BHS and the
BHM must match. Color code is not a security feature. Instead, color
code is a management feature, typically for assigning each sector a
different color code.
Color code allows you to force a BHS to register to only a specific BHM,
even where the BHS can communicate with multiple BHMs. The default
setting for the color code value is 0. This value matches only the color
code of 0 (not all 255 color codes).
BeaconVersion This field indicates that the beacon is OFDM (value of 1).
Sector User Count This field displays how many BHS’s are registered on the BHM.
NumULHalfSlots This is the number of uplink slots in the frame for this BHM.
NumDLHalfSlots This is the number of downlink slots in the frame for this.
NumULContSlots This field displays how many Contention Slots are being used in the
Chapter 8: Tools Using BHM Evaluation tool
Page 8-29
uplink portion of the frame.
WhiteSched Flag to display if schedule whitening is supported via FPGA
ICC This field lists the BHSs that have registered to the BHM with their
Installation Color Code (ICC),
Primary CC, Secondary CC or Tertiary CC.
SM PPPoE This filed provides information to the user whether the BHS is
supporting PPPoE or not.
Frame Period This field displays the configured Frame Period of the radio.
Chapter 8: Tools Using the OFDM Frame Calculator tool
Page 8-30
Using the OFDM Frame Calculator tool
The first step to avoid interference in wireless systems is to set all APs/BHMs to receive timing
from a synchronization source (Cluster Management Module, or Universal Global Positioning
System). This ensures that the modules are in sync and start transmitting at the same time each
frame.
The second step to avoid interference is to configure parameters on all APs/BHMs of the same
frequency band in proximity such that they have compatible transmit/receive ratios (all stop
transmitting each frame before any start receiving). This avoids the problem of one AP/BHM
attempting to receive the signal from a distant SM/BHS while a nearby AP transmits, which could
overpower that signal.
The following parameters on the AP determine the transmit/receive ratio:
Max Range
Downlink Data percentage
(reserved) Contention Slots
If OFDM (PMP 430, PMP 450, PTP 230) and FSK (PMP 1x0) APs/BHMs of the same frequency band
are in proximity, or if APs/BHMs set to different parameters (differing in their Max Range values,
for example), then operator must use the Frame Calculator to identify compatible settings.
The frame calculator is available on the Frame Calculator tab of the Tools web page. To use the
Frame Calculator, type various configurable parameter values into the calculator for each proximal
AP and then record the resulting AP/BHM Receive Start value. Next vary the Downlink Data
percentage in each calculation and iterate until the calculated AP/BHM Receive Start for all
collocated APs/BHMs are within 300 bit times; if possible, within 150 bit times. In Cambium Point-
to-Multipoint systems, 10 bit times = 1 μs.
The calculator does not use values in the module or populate its parameters. It is merely a
convenience application that runs on a module. For this reason, you can use any FSK module (AP,
SM, BHM, BHS) to perform FSK frame calculations for setting the parameters on an FSK AP and
any OFDM module (AP, SM, BHM, BHS) to perform OFDM frame calculations for setting the
parameters on an OFDM AP/BHM.
Caution
APs/BHMs that have slightly mismatched transmit-to-receive ratios and low levels of
data traffic may see little effect on throughput. A system that was not tuned for co-
location may work fine at low traffic levels, but encounter problems at higher traffic
levels. The conservative practice is to tune for co-location before traffic ultimately
increases. This prevents problems that occur as sectors are built.
Chapter 8: Tools Using the OFDM Frame Calculator tool
Page 8-31
The OFDM Frame Calculator page is explained in Table 134.
Table 135
OFDM Frame Calculator page attributes
Attribute
Meaning
Link Mode For AP to SM frame calculations, select
Multipoint Link
For BHM to BHS frame calculations, select
Point-To-Point Link
Platform Type
AP/BHM
Use the drop-down list to select the hardware series (board type) of the
AP/BHM.
Platform Type
SM/BHS
Use the drop-down list to select the hardware series (board type) of the
SM/BHS.
Channel Bandwidth Set this to the channel bandwidth used in the AP/BHM.
Cyclic Prefix Set this to the cyclic prefix used in the AP/BHM.
Max Range Set to the same value as the
Max Range
parameter is set in the AP(s) or
BHM(s).
Frame Period Set to the same value as the
Frame Period
parameter is set in the AP(s)
or BHM(s).
Downlink Data Initially set this parameter to the same value that the AP/BHM has for its
Downlink Data parameter (percentage). Then, use the Frame Calculator
Chapter 8: Tools Using the OFDM Frame Calculator tool
Page 8-32
tool procedure as described in Using the Frame Calculator on page 8-33,
you will vary the value in this parameter to find the proper value to write
into the
Downlink Data
parameter of all APs or BHMs in the cluster.
PMP 450i Series APs or BHMs offer a range of 15% to 85% and default to
75%. The value that you set in this parameter has the following
interaction with the value of the
Max Range
parameter (above):
The default
Max Range
value is 5 miles and, at that distance, the
maximum
Downlink Data
value (85% in PMP 450i) is functional.
Contention Slots This field indicates the number of (reserved) Contention Slots configured
by the operator. Set this parameter to the value of the
Contention Slot
parameter is set in the APs or BHMs.
SM/BHS One Way
Air Delay
This field displays the time in ns (nano seconds), that a SM/BHS is away
from the AP/BHM.
The Calculated Frame Results display several items of interest:
Table 136
OFDM Calculated Frame Results attributes
Attribute
Meaning
Modulation The type of radio modulation used in the calculation (OFDM for PMP/
PTP 450i)
Total Frame Bits The total number of bits used in the calculated frames
Data Slots
(Down/Up)
This field is based on the
Downlink Data
setting. For example, a result
within the typical range for a
Downlink Data
setting of 75% is 61/21,
meaning 61 data slots down and 21 data slots up.
Contention Slots This field indicates the number of (reserved) Contention Slots configured
by the operator.
Air Delay for Max
Range
This is the roundtrip air delay in bit times for the
Max Range
value set in
the calculator
Approximate
distance for Max
Range
The Max Range value used for frame calculation
AP Transmit End In bit times, this is the frame position at which the AP/BHM ceases
transmission.
AP Receive Start In bit times, this is the frame position at which the AP/BHM is ready to
receive transmission from the SM/BHS.
AP Receive End In bit times, this is the frame position at which the AP/BHM will cease
receiving transmission from the SM/BHS.
SM Receive End In bit times, this is the frame position at which the SM/BHS will cease
receiving transmission from the AP/BHM.
Chapter 8: Tools Using the OFDM Frame Calculator tool
Page 8-33
SM Transmit Start In bit times, this is the frame position at which the SM/BHS starts the
transmission.
SM One Way Air
Delay
This filed displays the time in ns, that SM/BHS is away from the AP/BHM.
SM Approximate
distance
This field displays an approximate distance in miles (feet) that the
SM/BHS is away from the AP/BHM.
To use the Frame Calculator to ensure that all APs or BHMs are configured to transmit and receive
at the same time, follow the procedure below:
Procedure 31
Using the Frame Calculator
1
Populate the OFDM Frame Calculator parameters with appropriate values as
described above.
2
Click the
Calculate
button.
3
Scroll down the tab to the Calculated Frame Results section
4
Record the value of the
AP Receive Start
field
5
Enter a parameter set from another AP in the system for example, an AP in the same
cluster that has a higher
Max Range
value configured.
6
Click the
Calculate
button.
7
Scroll down the tab to the Calculated Frame Results section
8
If the recorded values of the
AP Receive Start
fields are within 150 bit times of each
other, skip to step 10.
If the recorded values of the
AP Receive Start
fields are not within 150 bit times of
each other, modify the
Downlink Data
parameter until the calculated results for
AP
Receive Start
are within 300 bit time of each other, if possible, 150 bit time.
10
Access the Radio tab in the Configuration web page of each AP in the cluster and
change its
Downlink Data
parameter (percentage) to the last value that was used in
the Frame Calculator.
Chapter 8: Tools Using the Subscriber Configuration tool
Page 8-34
Using the Subscriber Configuration tool
The
Subscriber Configuration
page in the Tools page of the AP displays:
The current values whose control may be subject to the setting in the
Configuration Source
parameter.
An indicator of the source for each value.
This page may be referenced for information on how the link is behaving based on where the SM
is retrieving certain QoS and VLAN parameters.
Figure 92
SM Configuration page - AP
The AP displays one of the following for the configuration source:
(SM) QoS/VLAN parameters are derived from the SM’s settings
(APCAP) QoS/VLAN parameters are derived from the AP’s settings, including any keyed
capping (for radios capped at 4 Mbps, 10 Mbps, or 20 Mbps)
(D) QoS/VLAN parameters are retrieved from the device, due to failed retrieval from the AAA
or WM server.
(AAA) QoS/VLAN parameters are retrieved from the RADIUS server
(BAM) QoS/VLAN parameters are retrieved from a WM BAM server
Chapter 8: Tools Using the Link Status tool
Page 8-35
Using the Link Status tool
The Link Status Tool displays information about the most-recent Link Test initiated on the SM or
BHS. Link Tests initiated from the AP or BHM are not included in the Link Status table. This table is
useful for monitoring link test results for all SMs or BHS in the system.
The Link Status table is color coded to display health of link between AP/BHM and SM/BHS. The
current Modulation Level Uplink/Downlink is chosen to determine link health and color coded
accordingly.
Uplink/Downlink Rate Column will be color coded using current Rate as per the table below:
Table 137
Color code vers uplink/downlink rate column
Actual Rate
1x
2x
3x
4x
6x
8x
SISO
RED
ORANGE
GREEN
BLUE
NA
NA
MIMO-A
RED
ORANGE
GREEN
BLUE
NA
NA
MIMO B
NA
RED
NA
ORANGE
GREEN
BLUE
The current Uplink Rate (both low and high VC) for each SM or BHS in Session in now available on
AP or BHM Link Status Page.
The Link Status tool results include values for the following fields.
Table 138
Link Status page attributes - AP
Attribute
Meaning
Subscriber This field displays the LUID (logical unit ID), MAC address and Site Name
of the SM. As each SM registers to the AP, the system assigns an LUID
of 2 or a higher unique number to the SM. If a SM loses registration with
the AP and then regains registration, the SM will retain the same LUID.
Chapter 8: Tools Using the Link Status tool
Page 8-36
Note
The LUID associated is lost when a power cycle of the AP
occurs.
Both the LUID and the MAC are hot links to open the
interface to the SM. In some instances, depending on
network activity and network design, this route to the
interface yields a blank web page. If this occurs, refresh
your browser view.
Site Name indicates the name of the SM. You can assign or
change this name on the Configuration web page of the
SM. This information is also set into the sysName SNMP
MIB-II object and can be polled by an SNMP management
server.
Uplink Statistics -
Power Level: Signal
Strength Ratio
This field represents the combined received power level at the AP/BHM
as well as the ratio of horizontal path signal strength to vertical path
signal strength.
Uplink Statistics
Fragments
Modulation
This field represents the percentage of fragments received at each
modulation state, per path (polarization).
Uplink Statistics
Signal to Noise Ratio
This field represents the signal to noise ratio for the uplink (displayed
when parameter Signal to Noise Ratio Calculation during Link Test is
enabled) expressed for both the horizontal and vertical channels.
Uplink Statistics
Link Test Efficiency
This field displays the efficiency of the radio link, expressed as a
percentage, for the radio uplink.
Downlink Statistics
Power Level: Signal
Strength Ratio
This field represents the received power level at the SM/BHS as well as
the ratio of horizontal path signal strength to vertical path signal
strength at the SM/BHS.
Downlink Statistics
Signal to Noise Ratio
This field represents the signal to noise ratio for the downlink (displayed
when parameter Signal to Noise Ratio Calculation during Link Test is
enabled) expressed for both the horizontal and vertical channels.
Downlink Statistics
Link Test Efficiency
This field displays the efficiency of the radio link, expressed as a
percentage, for the radio downlink.
BER Results This field displays the over-the-air Bit Error Rates for each downlink.
(The ARQ [Automatic Resend reQuest] ensures that the transport BER
[the BER seen end-to-end through a network] is essentially zero.) The
level of acceptable over-the-air BER varies, based on operating
requirements, but a reasonable value for a good link is a BER of 1e-4 (1 x
10-4) or better, approximately a packet resend rate of 5%.
BER is generated using unused bits in the downlink. During periods of
peak load, BER data is not updated as often, because the system puts
priority on transport rather than on BER calculation.
Chapter 8: Tools Using the Link Status tool
Page 8-37
Reg Requests A Reg Requests count is the number of times the SM/BHS registered
after the AP/BHM determined that the link had been down.
If the number of sessions is significantly greater than the number for
other SMs/BHS, then this may indicate a link problem (check mounting,
alignment, receive power levels) or an interference problem (conduct a
spectrum scan).
ReReg Requests A ReReg Requests count is the number of times the AP/BHM received a
SM/BHS registration request while the AP/BHM considered the link to be
still up (and therefore did not expect registration requests).
If the number of sessions is significantly greater than the number for
other SMs/BHS, then this may indicate a link problem (check mounting,
alignment, receive power levels) or an interference problem (conduct a
spectrum scan).
Chapter 8: Tools Using BER Results tool
Page 8-38
Using BER Results tool
Radio BER data represents bit errors at the RF link level. Due to CRC checks on fragments and
packets and ARQ (Automatic Repeat reQuest), the BER of customer data is essentially zero. Radio
BER gives one indication of link quality. Other important indications to consider includes the
received power level, signal to noise ratio and link tests.
BER is only instrumented on the downlink and is displayed on the BER Results tab of the Tools
page in any SM. Each time the tab is clicked, the current results are read and counters are reset to
zero.
The BER Results tab can be helpful in troubleshooting poor link performance.
The link is acceptable if the value of this field is less than 104. If the BER is greater than 104, re-
evaluate the installation of both modules in the link.
The BER test signal is broadcast by the AP/BHM (and compared to the expected test signal by the
SM/BHS) only when capacity in the sector allows it. This signal is the lowest priority for AP/BHM
transmissions.
Figure 93
BER Results tab of the SM
Chapter 8: Tools Using the Sessions tool
Page 8-39
Using the Sessions tool
The PMP 450i AP has a tab
Sessions
under the Tools category which allows operators to drop one
or all selected SM sessions and force a SM re-registration. This operation is useful to force QoS
changes for SMs without losing AP logs or statistics. This operation may take 5 minutes to regain
all SM registrations.
Figure 94
Sessions tab of the AP
Page 9-1
Chapter 9: Operation
This chapter provides instructions for operators of the PMP/PTP 450i wireless Ethernet Bridge.
The following topics are described in this chapter:
System on page 9-2
o Viewing General Status on page 9-2
o Viewing Session Status on page 9-14
o Viewing Remote Subscribers on page 9-19
o Interpreting messages in the Event Log on page 9-19
o Viewing the Network Interface on page 9-22
o Viewing the Layer 2 Neighbors on page 9-23
System statistics on page 9-24
o Viewing the Scheduler statistics on page 9-24
o Viewing list of Registration Failures statistics on page 9-26
o Interpreting Bridging Table statistics on page 9-27
o Interpreting Translation Table statistics on page 9-28
o Interpreting Ethernet statistics on page 9-29
o Interpreting RF Control Block statistics on page 9-32
o Interpreting VLAN statistics on page 9-33
o Interpreting Data VC statistics on page 9-35
o Interpreting Throughput statistics on page 9-37
o Interpreting Overload statistics on page 9-40
o Interpreting DHCP Relay statistics on page 9-41
o Interpreting Filter statistics on page 9-42
o Viewing ARP statistics on page 9-43
o Viewing NAT statistics on page 9-44
o Viewing NAT DHCP Statistics on page 9-46
o Interpreting Sync Status statistics on page 9-47
o Interpreting PPPoE Statistics for Customer Activities on page 9-48
o Interpreting Bridge Control Block statistics on page 9-49
o Interpreting Pass Through Statistics on page 9-51
o Interpreting SNMPv3 Statistics on page 9-52
o Interpreting syslog statistics on page 9-54
o Interpreting Frame Utilization statistics on page 9-54
Radio Recovery on page 9-58
Chapter 9: Operation System information
Page 9-2
System information
This section describes how to use the summary and status pages to monitor the status of the
Ethernet ports and wireless link.
Viewing General Status on page 9-2
Viewing Session Status on page 9-14
Viewing Remote Subscribers on page 9-19
Interpreting messages in the Event Log on page 9-19
Viewing the Network Interface on page 9-22
Viewing the Layer 2 Neighbors on page 9-23
Viewing General Status
The
General Status
tab provides information on the operation of this AP/BHM and SM/BHS. This is
the page that opens by default when you access the GUI of the radio.
Chapter 9: Operation System information
Page 9-3
General Status page of AP
The AP’s
General Status
page is explained in Table 138.
Table 139
General Status page attributes - AP
Attribute
Meaning
Device Type This field indicates the type of the module. Values include the frequency
band of the SM, its module type and its MAC address.
Software Version This field indicates the system release, the time and date of the release
and whether communications involving the module are secured by DES
Chapter 9: Operation System information
Page 9-4
or AES encryption. If you request technical support, provide the
information from this field.
Board Type This field indicates the series of hardware.
Combo Radio Mode This field indicates the mode of operation, currently only ‘MIMO OFDM
Only’ is supported.
FPGA Version This field indicates the version of the field-programmable gate array
(FPGA) on the module. If you request technical support, provide the
value of this field.
FPGA Type Where the type of logic as a subset of the logic version in the module as
manufactured distinguishes its circuit board, this field is present to
indicate that type. If you request technical support, provide the value of
this field.
PLD Version This field indicates the version of the programmable logic device (PLD)
on the module. If you request technical support, provide the value of this
field.
Uptime This field indicates how long the module has operated since power was
applied.
System Time This field provides the current time. If the AP is connected to a CMM4,
then this field provides GMT (Greenwich Mean Time). Any SM that
registers to the AP inherits the system time.
Last NTP Time
Update
This field displays when the AP last used time sent from an NTP server.
If the AP has not been configured in the Time tab of the Configuration
page to request time from an NTP server, then this field is populated by
00:00:00 00/00/00.
Ethernet Interface This field indicates the speed and duplex state of the Ethernet interface
to the AP.
Regulatory
This field indicates whether the configured
Country Code
and radio
frequency are compliant with respect to their compatibility. PMP 450
equipment shipped to the United States is locked to a Country Code
setting of “United States”. Units shipped to regions other than the
United States must be configured with the corresponding Country Code
to comply with local regulatory requirements.
Channel Center
Frequency
This field indicates the current operating center frequency, in MHz.
Channel Bandwidth This field indicates the current size of the channel band used for radio
transmission.
Cyclic Prefix OFDM technology uses a cyclic prefix, where a portion of the end of a
symbol (slot) is repeated at the beginning of the symbol to allow multi-
pathing to settle before receiving the desired data. A 1/16 cyclic prefix
means that for every 16 bits of throughput data transmitted, an
Chapter 9: Operation System information
Page 9-5
additional bit is used.
Frame Period This field indicates the current Frame Period setting of the radio in ms.
Color Code This field displays a value from 0 to 254 indicating the AP’s configured
color code. For registration to occur, the color code of the SM and the AP
must match. Color code is not a security feature. Instead, color code is a
management feature, typically for assigning each sector a different color
code.
Color code allows you to force a SM to register to only a specific AP,
even where the SM can communicate with multiple APs. The default
setting for the color code value is 0. This value matches only the color
code of 0 (not all 255 color codes).
Max Range This field indicates the setting of the Max Range parameter, which
contributes to the way the radio transmits. Verify that the Max Range
parameter is set to a distance slightly greater than the distance between
the AP and the furthest SM that must register to this AP.
Transmitter Output
Power
This field indicates the combined power level at which the AP is set to
transmit, based on the Country Code and Antenna Gain settings.
Temperature This field indicates the current operating temperature of the device
board.
Registered SM Count This field indicates how many SMs are registered to the AP.
Sync Pulse Status
This field indicates the status of synchronization as follows:
Generating Sync
indicates that the module is set to generate the sync
pulse.
Receiving Sync
indicates that the module is set to receive a sync pulse
from an outside source and is receiving the pulse.
No Sync Since Boot up / ERROR: No Sync Pulse
indicates that the
module is set to receive a sync pulse from an outside source and is not
receiving the pulse.
Note
When this message is displayed, the AP transmitter is
turned off to avoid self-interference within the system.
Sync Pulse Source This field indicates the status of the synchronization source:
Searching
indicates that the unit is searching for a GPS fix
Timing Port/UGPS
indicates that the module is receiving sync via the
timing AUX/SYNC timing port
Power Port
indicates that the module is receiving sync via the power
port (Ethernet port).
On-board GPS
indicates that the module is receiving sync via the unit’s
internal GPS module
Chapter 9: Operation System information
Page 9-6
Maximum Count of
Registered SMs
This field displays the largest number of SMs that have been
simultaneously registered in the AP since it was last rebooted. This
count can provide some insight into sector history and provide
comparison between current and maximum SM counts at a glance.
Data Slots Down This field indicates the number of frame slots that are designated for use
by data traffic in the downlink (sent from the AP to the SM). The AP
calculates the number of data slots based on the
Max Range
,
Downlink
Data
and (reserved)
Contention Slots
configured by the operator.
Data Slots Up
This field indicates the number of frame slots that are designated for use
by data traffic in the uplink (sent from the SM to the AP). The AP
calculates the number of data slots based on the Max Range, Downlink
Data and (reserved) Contention Slots configured by the operator.
Contention Slots This field indicates the number of (reserved) Contention Slots configured
by the operator. See Contention slots on page 7-129.
Site Name This field indicates the name of the physical module. You can assign or
change this name in the SNMP tab of the AP Configuration page. This
information is also set into the sysName SNMP MIB-II object and can be
polled by an SNMP management server.
Site Contact This field indicates contact information for the physical module. You can
provide or change this information in the SNMP tab of the AP
Configuration page. This information is also set into the sysName SNMP
MIB-II object and can be polled by an SNMP management server.
Site Location This field indicates site information for the physical module. You can
provide or change this information in the SNMP tab of the AP
Configuration page.
Time Updated and
Location Code
This field displays information about the keying of the radio.
General Status page - SM
The SM’s
General Status
page is explained in Table 139.
Note
In order for accurate power level readings to be displayed, traffic must be present on
the radio link.
Chapter 9: Operation System information
Page 9-7
Table 140
General Status page attributes - SM
Attribute
Meaning
Device Type This field indicates the type of the module. Values include the frequency
band of the SM, its module type and its MAC address.
Board Type This field indicates the series of hardware.
Software Version This field indicates the system release, the time and date of the release.
If you request technical support, provide the information from this field.
FPGA Version This field indicates the version of the field-programmable gate array
(FPGA) on the module. When you request technical support, provide the
Chapter 9: Operation System information
Page 9-8
information from this field.
PLD Version This field indicates the version of the programmable logic device (PLD)
on the module. If you request technical support, provide the value of this
field.
Uptime This field indicates how long the module has operated since power was
applied.
System Time This field provides the current time. Any SM that registers to an AP
inherits the system time, which is displayed in this field as GMT
(Greenwich Mean Time).
Ethernet Interface This field indicates the speed and duplex state of Ethernet interface to
the SM.
Regional Code
A parameter that offers multiple fixed selections, each of which
automatically implements frequency band range restrictions for the
selected region. Units shipped to regions other than the United States
must be configured with the corresponding Country Code to comply
with local regulatory requirements.
DFS This field indicates that DFS operation is enabled based on the
configured region code, if applicable.
Antenna Type The current antenna type that has been selected.
Frame Period This field indicates the current Frame Period setting of the radio in ms.
Temperature The current operating temperature of the board.
Session Status
This field displays the following information about the current session:
Scanning
indicates that this SM currently cycles through the radio
frequencies that are selected in the Radio tab of the Configuration page.
Syncing
indicates that this SM currently attempts to receive sync.
Registering
indicates that this SM has sent a registration request
message to the AP and has not yet received a response.
Registered
indicates that this SM is both:
registered to an AP.
ready to transmit and receive data packets.
Session Uptime This field displays the duration of the current link. The syntax of the
displayed time is hh:mm:ss.
Registered AP Displays the MAC address and site name of the AP to which the SM is
registered to. This parameter provides click-through proxy access to the
AP’s management interface.
Color Code This field displays a value from 0 to 254 indicating the SM’s configured
color code. For registration to occur, the color code of the SM and the AP
must match. Color code is not a security feature. Instead, color code is a
Chapter 9: Operation System information
Page 9-9
management feature, typically for assigning each sector a different color
code.
Color code allows you to force a SM to register to only a specific AP,
even where the SM can communicate with multiple APs. The default
setting for the color code value is 0. This value matches only the color
code of 0 (not all 255 color codes).
Channel Frequency This field lists the current operating frequency of the radio.
Channel Bandwidth The size in MHz of the operating channel.
Cyclic Prefix OFDM technology uses a cyclic prefix, where a portion of the end of a
symbol (slot) is repeated at the beginning of the symbol to allow multi-
pathing to settle before receiving the desired data. A 1/16 cyclic prefix
means that for every 16 bits of throughput data transmitted, an
additional bit is used.
Air Delay This field displays the distance in feet between this SM and the AP. To
derive the distance in meters, multiply the value of this parameter by
0.3048. Distances reported as less than 200 feet (61 meters) are
unreliable.
Receive Power This field lists the current combined receive power level, in dBm.
Signal Strength
Ratio
This field displays the difference of the Vertical path received signal
power to the Horizontal path received signal power.
Signal to Noise Ratio This field lists the current signal-to-noise level, an indication of the
separation of the received power level vs. noise floor.
Beacons Displays a count of beacons received by the SM in percentage. This
value must be typically between 99-100%. If lower than 99%, it indicates
a problematic link. This statistic is updated every 16 seconds.
Transmit Power This field lists the current combined transmit power level, in dBm.
Data Slots Down This field lists the number of slots used for downlink data transmission.
Data Slots Up This field lists the number of slots used for uplink data transmission.
Contention Slots This field indicates the number of (reserved) Contention Slots configured
by the operator. See Contention slots on page 7-129.
Site Name This field indicates the name of the physical module. You can assign or
change this name in the SNMP tab of the SM Configuration page. This
information is also set into the sysName SNMP MIB-II object and can be
polled by an SNMP management server.
Site Contact This field indicates contact information for the physical module. You can
provide or change this information in the SNMP tab of the SM
Configuration page. This information is also set into the sysName SNMP
MIB-II object and can be polled by an SNMP management server.
Chapter 9: Operation System information
Page 9-10
Site Location This field indicates site information for the physical module. You can
provide or change this information in the SNMP tab of the SM
Configuration page.
Maximum
Throughput
This field indicates the limit of aggregate throughput for the SM and is
based on the default (factory) limit of the SM and any floating license
that is currently assigned to it.
Time Updated and
Location Code
This field displays information about the keying of the radio.
G7eneral Status page of BHM
The BHM’s
General Status
page is explained in Table 140.
Table 141
General Status page attributes - BHM
Attribute
Meaning
Device Type This field indicates the type of the module. Values include the frequency
Chapter 9: Operation System information
Page 9-11
band of the BHM, its module type and its MAC address.
Board Type This field indicates the series of hardware.
Software Version This field indicates the system release, the time and date of the release.
If you request technical support, provide the information from this field.
Board MSN This field indicates the Manufacture’s Serial number. A unique serial
number assigned to each radio at the factory for inventory and quality
control.
FPGA Version This field indicates the version of the field-programmable gate array
(FPGA) on the module. When you request technical support, provide the
information from this field.
Uptime This field indicates how long the module has operated since power was
applied.
System Time This field provides the current time. Any BHS that registers to a BHM
inherits the system time, which is displayed in this field as GMT
(Greenwich Mean Time).
Ethernet Interface This field indicates the speed and duplex state of Ethernet interface to
the BHM.
Antenna Type The current antenna type that has been selected.
Temperature The current operating temperature of the board.
Session Status
This field displays the following information about the current session:
Scanning
indicates that this BHS currently cycles through the radio
frequencies that are selected in the Radio tab of the Configuration page.
Syncing
indicates that this BHM currently attempts to receive sync.
Registering
indicates that this BHM has sent a registration request
message to the BHM and has not yet received a response.
Registered
indicates that this BHM is both:
Registered to a BHM.
Ready to transmit and receive data packets.
Session Uptime This field displays the duration of the current link. The syntax of the
displayed time is hh:mm:ss.
Registered Backhaul Displays the MAC address and site name of the BHM to which the BHS is
registered to. This parameter provides click-through proxy access to the
BHM’s management interface.
Channel Frequency This field lists the current operating frequency of the radio.
Receive Power This field lists the current combined receive power level, in dBm.
Signal Strength
Ratio
This field displays the difference of the Vertical path received signal
power to the Horizontal path received signal power.

Navigation menu