Cambium Networks 50650 Wireless Ethernet Bridge User Manual PTP 650 Series User Guide

Cambium Networks Limited Wireless Ethernet Bridge PTP 650 Series User Guide

User Manual Part 2

Chapter 5: Installation
This chapter describes how to install and test the hardware for a PTP 650 link. It contains the
following topics:
Safety on page 5-2 contains important safety guidelines that must be observed by personnel
installing or operating PTP 650 equipment.
Installing the ODU and top LPU on page 5-5 describes how to mount and ground an integrated
or connectorized ODU, how to mount and ground the top LPU, and how to mount and connect
an external antenna for the connectorized ODU.
Installing the copper Cat5e Ethernet interface on page 5-13 describes how to install the copper
Cat5e power over Ethernet interface from the ODU (PSU port) to the PSU.
Installing the PSU on page 5-21 describes how to install a power supply unit for the PTP 650,
either the AC Power Injector or the AC+DC Enhanced Power Injector.
Installing an SFP Ethernet interface on page 5-23 describes how to install an optical or copper
Cat5e Ethernet interface from the ODU (SFP port) to a connected device.
Installing an Aux Ethernet interface on page 5-32 describes how to install a copper Cat5e
Ethernet interface from the ODU (Aux port) to a connected device.
Supplemental installation information on page 5-33 contains detailed installation procedures
that are not included in the above topics, such as how to strip cables, create grounding points
and weatherproof connectors.
Note
These instructions assume that LPUs are being installed from the PTP 650 LPU and
grounding kit (Cambium part number C000065L007). If the installation does not
require LPUs, adapt these instructions as appropriate.
If LPUs are being installed, only use the five black-capped EMC cable glands supplied
in the LPU and grounding kit. The silver-capped cable glands supplied in the ODU kits
must only be used in PTP 650 installations which do not require LPUs.
Page 5-1
Chapter 5: Installation Safety
Safety
Warning
To prevent loss of life or physical injury, observe the following safety guidelines. In no
event shall Cambium Networks be liable for any injury or damage caused during the
installation of the Cambium PTP 650. Ensure that only qualified personnel install a PTP
650 link.
Power lines
Exercise extreme care when working near power lines.
Working at heights
Exercise extreme care when working at heights.
PSU
Always use one of the Cambium PTP 650 Series power supply units (PSU) to power the ODU.
Failure to use a Cambium supplied PSU could result in equipment damage and will invalidate the
safety certification and may cause a safety hazard.
Grounding and protective earth
The Outdoor Unit (ODU) must be properly grounded to protect against lightning. It is the user’s
responsibility to install the equipment in accordance with national regulations. In the USA follow
the requirements of the National Electrical code NFPA 70-2005 and 780-2004 Installation of
Lightning Protection Systems. In Canada, follow Section 54 of the Canadian Electrical Code. These
codes describe correct installation procedures for grounding the outdoor unit, mast, lead-in wire
and discharge unit, size of grounding conductors and connection requirements for grounding
electrodes. Other regulations may apply in different countries and therefore it is recommended
that installation of the outdoor unit be contracted to a professional installer.
Page 5-2
Chapter 5: Installation Safety
DC supply
To power the ODU from a DC supply, use the AC+DC Enhanced Power Injector (PSU) (Cambium
part number C000065L002). Ensure that the DC power supply meets the requirements specified in
PSU DC power supply on page 3-12.
Powering down before servicing
Before servicing PTP 650 equipment, always switch off the power supply and unplug it from the
PSU.
Do not disconnect the RJ45 drop cable connectors from the ODU while the PSU is connected to the
power supply. Always remove the AC or DC input power from the PSU.
Primary disconnect device
The main power supply is the primary disconnect device. The AC+DC Enhanced power injector is
fused on the DC input. Some installations will also require an additional circuit breaker or isolation
switch to be fitted in the DC supply.
External cables
Safety may be compromised if outdoor rated cables are not used for connections that will be
exposed to the outdoor environment. For outdoor copper Cat5e Ethernet interfaces, always use
Cat5e cable that is gel-filled and shielded with copper-plated steel. Alternative types of drop cable
are not supported by Cambium Networks.
Drop cable tester
The PSU output voltage may be hazardous in some conditions, for example in wet weather. Do
NOT connect the drop cable tester to the PSU, either directly or via LPUs.
RF exposure near the antenna
Strong radio frequency (RF) fields will be present close to the antenna when the transmitter is on.
Always turn off the power to the ODU before undertaking maintenance activities in front of the
antenna.
Page 5-3
Chapter 5: Installation Safety
Minimum separation distances
Ensure that personnel are not exposed to unsafe levels of RF energy. The units start to radiate RF
energy as soon as they are powered up. Never work in front of the antenna when the ODU is
powered. Install the ODUs so as to provide and maintain the minimum separation distances from
all persons. For minimum separation distances, see Calculated distances and power compliance
margins on page 4-25.
Grounding and lightning protection requirements
Ensure that the installation meets the requirements defined in Grounding and lightning protection
on page 3-8.
Grounding cable installation methods
To provide effective protection against lightning induced surges, observe these requirements:
Grounding conductor runs are as short, straight and smooth as possible, with bends and
curves kept to a minimum.
Grounding cables must not be installed with drip loops.
All bends must have a minimum radius of 203 mm (8 in) and a minimum angle of 90°. A
diagonal run is preferable to a bend, even though it does not follow the contour or run parallel
to the supporting structure.
All bends, curves and connections must be routed towards the grounding electrode system,
ground rod, or ground bar.
Grounding conductors must be securely fastened.
Braided grounding conductors must not be used.
Approved bonding techniques must be used for the connection of dissimilar metals.
Siting ODUs and antennas
ODUs and external antennas are not designed to survive direct lightning strikes. For this reason
they must be installed in Zone B as defined in Lightning protection zones on page 3-8. Mounting in
Zone A may put equipment, structures and life at risk.
Page 5-4
Chapter 5: Installation Installing the ODU and top LPU
Installing the ODU and top LPU
Decide how to mount the ODU and top LPU
Page 5-5
Chapter 5: Installation Installing the ODU and top LPU
Note
For improved radio performance, mount the
integrated ODU at 45 degrees to the vertical.
The mounting pole may be vertical or
horizontal.
Prepare ODU for mounting
1
ing bracket for the pole diameter and ODU type:
If pole diameter is between 50 and 75 mm (2 and 3 inches):
(a) For an integrated ODU, use the integrated mounting bracket, Cambium part number
N000065L031.
(b) For a connectorized ODU, use the connectorized mounting bracket supplied with the
ODU (alternatively, use the integrated ODU bracket).
If pole diameter is
90 mm (3.5 inches)
115 mm (4.5 inches):
(c) For both integrated and connectorized ODUs, use the extended mounting bracket,
Cambium part number N000065L030.
(a) Integrated bracket:
(b) Connectorized bracket:
(c) Extended bracket:
Page 5-6
Chapter 5: Installation Installing the ODU and top LPU
2
(a) Fasten one ground cable to each ODU grounding point using the M6 (small) lugs: one is for
the top LPU (M6 lug at other end) and the other is for the tower or building (M10 lug at other
end). It does not matte
r which cable goes on which ODU grounding point. (b) Tighten both
ODU grounding bolts to a torque of 5
Nm (3.9 lb ft).
(a) ODU ground cables:
(b) ODU ground cable tightened:
Integrated ODU
1
(a) Fix the mounting plate to the back of the ODU at an angle of 45
to a torque setting of 5 Nm (4 lb ft).
the bracket body to the mounting plate using the M8 bolt.
(a) Fix the mounting plate:
(b) Fix the bracket body:
2
oist the ODU up to its position on the mounting pole.
Page 5-7
Chapter 5: Installation Installing the ODU and top LPU
3
-to-back LPU mounting, fix the ODU to the pole using the LPU.
.
(a) Back
-to-back LPU:
(b) Separate LPU:
Caution
Do not reverse the ODU bracket strap,
as this arrangement may lead to failure
of the assembly:
4
(E) and azimuth (A) of the unit to achieve initial alignment. Tighten
to a torque setting of 14 Nm (11 lb ft). Do not over-tighten the bolts, as
Page 5-8
Chapter 5: Installation Installing the ODU and top LPU
Connectorized ODU
1
cles in the ODU. (b) Fix the mounting plate and bracket
to a torque setting of 5 Nm (4
.
(a) Receptacles for bracket bolts:
(b) Mounting plate fixed:
2
oist the ODU up to its position on the mounting pole.
3
-to-back LPU mounting, fix the ODU to the pole using the LPU.
(c) Back
-to-back LPU:
(d) Separate LPU:
4
to a torque setting of 7 Nm (5.5 lb ft). Do not over-tighten the bolts,
Page 5-9
Chapter 5: Installation Installing the ODU and top LPU
Ground the ODU and top LPU
Caution
Do not attach grounding cables to the ODU mounting bracket bolts, as this
arrangement will not provide full protection.
1
For separate LPU mounting, use the U
-bolt bracket from the LPU kit to mount the top LPU on the
pole below the ODU. Tighten
to a torque setting of 7 Nm (5.5 lb ft):
2
Fasten the ODU grounding cable to the top LPU using the M6 (small) lug.
Tighten both nuts to a
torque of 5
Nm (3.9 lb ft):
Locking nut
Washer
M6 lug
Washer
Nut
Toothed washer
M6 lug to ODU
3
Select a tower or building grounding point within 0.3 meters (1 ft) of the ODU bracket. Remove
paint from the surface and apply anti-oxidant compound. Fasten the ODU grounding cable to this
point using the M10 (large) lug.
4
If local regulations mandate the independent grounding of all devices,
add a third ground cable to
connect the top LPU directly to the grounding system.
Page 5-10
Chapter 5: Installation Installing the ODU and top LPU
Install external antennas for a connectorized ODU
1
M
ount the antenna(s) according to manufacturer’s instructions.
When using separate antennas
to achieve spatial diversity, mount
one with Horizontal polarization and the other with Vertical
polarization.
2
Connect the ODU V and H interfaces to the antenna(s) with RF cable of type CNT
-400
(Cambium part numbers 30010194001 and 30010195001) and
N type connectors (Cambium
part number 09010091001). Tighten the
N type connectors to a torque setting of 1.7 Nm (1.3 lb
ft)
.
3
If
the ODU is mounted indoors, install lightning arrestors at the building entry point:
4
Form
drip loops near the lower ends of the antenna cables. These ensure that water is not
channeled towards the connector
s.
5
If the ODU is mounted outdoors, weatherproof the N type connectors (when antenna
alignment is complete) using PVC tape and
self-amalgamating rubber tape.
6
Weath
erproof the antenna connectors in the same way (unless the antenna manufacturer
specifies a different method).
Page 5-11
Chapter 5: Installation Installing the ODU and top LPU
7
Ground the antenna cables to the supporting structure
within 0.3 meters (1 foot) of the ODU
and antennas
using the Cambium grounding kit (part number 01010419001):
8
Fix the antenna cables
to the supporting structure using site approved methods. E
nsure that no
undue strain is placed on the
ODU or antenna connectors.
Caution
Ensure that the cables do not flap in the wind, as flapping cables are prone to damage
and induce unwanted vibrations in the supporting structure.
Page 5-12
Chapter 5: Installation Installing the copper Cat5e Ethernet interface
Installing the copper Cat5e Ethernet interface
Caution
To avoid damage to the installation, do not connect or disconnect the drop cable when
power is applied to the PSU or network terminating equipment.
Caution
Do not connect the SFP or Aux drop cables to the PSU, as this may damage
equipment.
Caution
Always use Cat5e cable that is gel-filled and shielded with copper-plated steel.
Alternative types of Cat5e cable are not supported by Cambium Networks. Cambium
Networks supply this cable (Cambium part numbers WB3175 and WB3176), RJ45
connectors (Cambium part number WB3177) and a crimp tool (Cambium part number
WB3211). The LPU and grounding kit contains a 600 mm length of this cable.
Install the ODU to top LPU drop cable
Fit glands to the ODU to top LPU drop cable
Fit EMC strain relief cable glands (with black caps) to both ends of the 600 mm length of
pre-terminated cable. These parts are supplied in the LPU and grounding kit.
1
Disassemble the gland and thread each part onto the cable (the rubber bung is split).
Assemble the spring clip and the rubber bung:
Page 5-13
Chapter 5: Installation Installing the copper Cat5e Ethernet interface
2
Fit the pa
rts into the body and lightly screw on the gland nut (do not tighten it):
Connect the drop cable to the ODU (PSU port) and LPU
1
(a) Plug the RJ45 connector into the socket in the unit, ensuring that it snaps home.
(b) Fit the gland body to the RJ45 port and tighten it to a torque of 5.5 Nm (4.3 lb ft):
(a)
(b)
2
(a) Fit the gland nut and tighten until the rubber seal closes on the cable. (b) Do not over-
tighten the gland nut, as there is a risk of damage to its internal components:
(a)
(b)
Correct
Incorrect
Page 5-14
Chapter 5: Installation Installing the copper Cat5e Ethernet interface
Disconnect the drop cable from the LPU or ODU
Use this procedure if it is necessary to remove an EMC strain relief cable gland and RJ45
connector from the ODU (as illustrated) or LPU.
1
(a) Remove the gland nut. Wiggle the drop cable to release the tension of the gland body.
When the tension in the gland body is released,
a gap opens at the point show. Unscrew the
gland body.
(b) Use a small screwdriver to press the RJ45 locking tab, then remove the RJ45 connector.
(a)
(b)
Install the main drop cable
Warning
The metal screen of the drop cable is very sharp and may cause personal injury.
ALWAYS wear cut-resistant gloves (check the label to ensure they are cut
resistant).
ALWAYS wear protective eyewear.
ALWAYS use a rotary blade tool to strip the cable (DO NOT use a bladed knife).
Page 5-15
Chapter 5: Installation Installing the copper Cat5e Ethernet interface
Warning
Failure to obey the following precautions may result in injury or death:
Use the proper hoisting grip for the cable being installed. If the wrong hoisting
grip is used, slippage or insufficient gripping strength will result.
Do not reuse hoisting grips. Used grips may have lost elasticity, stretched, or
become weakened. Reusing a grip can cause the cable to slip, break, or fall.
The minimum requirement is one hoisting grip for each 60 m (200 ft) of cable.
Cut to length and fit hoisting grips
1
Cut the main drop cable to length from the top LPU to
the bottom LPU.
2
Slide one or more hoisting grips onto the top end of the drop cable.
3
Secure the hoisting grip to the cable using a special tool, as recommended by the
manufacturer.
Terminate with RJ45 connectors and glands
Caution
Check that the crimp tool matches the RJ45 connector, otherwise the cable or
connector may be damaged.
1
Thread the cable gland (with black cap) onto the main drop cable.
2
Strip the cable outer sheath and fit the R
J45 connector load bar.
Page 5-16
Chapter 5: Installation Installing the copper Cat5e Ethernet interface
3
Fit
the RJ45 connector housing as shown. To ensure there is effective strain relief, locate the
cable inner sheath under the connector housing tang
. Do not tighten the gland nut:
Hoist and fix the main drop cable
Warning
Failure to obey the following precautions may result in injury or death:
Use the hoisting grip to hoist one cable only. Attempting to hoist more than one
cable may cause the hoisting grip to break or the cables to fall.
Do not use the hoisting grip for lowering cable unless the clamp is securely in
place.
Maintain tension on the hoisting grip during hoisting. Loss of tension can cause
dangerous movement of the cable and result in injury or death to personnel.
Do not release tension on the grip until after the grip handle has been fastened to
the supporting structure.
Do not apply any strain to the RJ45 connectors.
Caution
Do not lay the drop cable alongside a lightning air terminal.
1
Hoist the top end of the main drop cable up to the top LPU, following the hoist manufacturer’s
instructions. When the cable is in position, fasten the grip handle
to the supporting structure
and remove the hoist line.
2
Connect th
e main drop cable to the top LPU by following the procedure Connect the drop
cable to the ODU (PSU port) and LPU
on page 5-14.
3
R
un the main drop cable to the site of the bottom LPU.
Page 5-17
Chapter 5: Installation Installing the copper Cat5e Ethernet interface
4
Attach the main drop cable to the supporting structure
using site approved methods.
Ground the main drop cable
At all required grounding points, connect the screen of the main drop cable to the metal of the
supporting structure using the cable grounding kit (Cambium part number 01010419001).
Install the bottom LPU to PSU drop cable
Install the bottom LPU
Install the bottom LPU, ground it, and connect it to the main drop cable.
1
Select a mounting point for the bottom LPU within 600 mm (24 in) of the building entry point.
Mount the LPU vertically with cable glands facing downwards.
2
Connect the main drop cable to the bottom LPU by following the procedure Connect the drop cable
to the ODU (PSU port) and LPU on page 5-14.
Page 5-18
Chapter 5: Installation Installing the copper Cat5e Ethernet interface
3
Fasten one ground cable to the bottom LPU using the M6 (small) lug. Tighten both nuts to a
torque of 5 Nm (3.9 lb ft):
Locking nut
Washer
M6 lug
Washer
Nut
Toothed washer
M10 lug to ground
4
Select a building grounding point near the LPU bracket. Remove paint from the surface and
apply anti-oxidant compound. Fasten the LPU ground cable using the M10 (large) lug.
Install the LPU to PSU drop cable
Use this procedure to terminate the bottom LPU to PSU drop cable with RJ45 connectors at both
ends, and with a cable gland at the LPU end.
Warning
The metal screen of the drop cable is very sharp and may cause personal injury.
ALWAYS wear cut-resistant gloves (check the label to ensure they are cut resistant).
ALWAYS wear protective eyewear. ALWAYS use a rotary blade tool to strip the cable,
not a bladed knife.
Caution
Check that the crimp tool matches the RJ45 connector, otherwise the cable or
connector may be damaged.
1
Cut the drop cable to the length required from bottom LPU to PSU.
2
At the LPU end only
:
Fit one cable gland and one RJ45 connector by following the procedure Terminate with
RJ45 connectors and glands on page 5-16.
Connect this cable and gland to the bottom LPU by following the procedure Connect the
drop cable to the ODU (PSU port) and LPU on page 5-14.
Page 5-19
Chapter 5: Installation Installing the copper Cat5e Ethernet interface
4
At the PSU end only
: Do not fit a cable gland. Strip the cable outer sheath and fit the RJ45
connector load bar. Fit the RJ45 connector housing. To ensure there is effective strain relief,
locate the cable inner sheath under the connector housing tang:
Test resistance in the drop cable
Connect the bottom end of the copper Cat5e drop cable to a PTP drop cable tester and test that the
resistances between pins are within the correct limits, as specified in the table below. If any of the
tests fail, examine the drop cable for wiring faults. Order the PTP drop cable tester from the
support website (http://www.cambiumnetworks.com/support).
Measure the
resistance
between…
Enter
measured
resistance
To pass test,
resistance must
be…
Circle
“Pass” or
“Fail”
Additional tests and
notes
Pins 1 and 2 Ohms <20 Ohms
(60 Ohms) (*1)
Pass
Fail Resistances must be
within 10% of each other
(*2). Circle “Pass” or
“Fail”:
Pass
Fail
Pins 3 and 6 Ohms <20 Ohms
(60 Ohms) (*1)
Pass
Fail
Pins 4 and 5 Ohms <20 Ohms
(60 Ohms) (*1)
Pass
Fail
Pins 7 and 8 Ohms <20 Ohms
(60 Ohms) (*1)
Pass
Fail
Pin 1 and screen
(ODU ground)
K Ohms >100K Ohms Pass
Fail These limits apply
regardless of cable
length.
Pin 8 and screen
(ODU ground)
K Ohms >100K Ohms Pass
Fail
(*1) A resistance of 20 Ohms is the maximum allowed when the cable is carrying Ethernet.
A resistance of 60 Ohms is the maximum allowed when the cable is carrying only power to the
ODU (when Ethernet is carried by one of the other ODU interfaces).
(*2) Ensure that these resistances are within 10% of each other by multiplying the lowest
resistance by 1.1 if any of the other resistances are greater than this, the test has failed.
Page 5-20
Chapter 5: Installation Installing the PSU
Installing the PSU
Install one of the following types of PSU (as specified in the installation plan):
PTP 650 AC Power Injector (Cambium part number N000065L001).
PTP 650 AC+DC Enhanced Power Injector (Cambium part number C000065L002).
Caution
As the PSU is not waterproof, locate it away from sources of moisture, either in the
equipment building or in a ventilated moisture-proof enclosure. Do not locate the
PSU in a position where it may exceed its temperature rating.
Caution
Do not plug any device other than a PTP 650 ODU into the ODU port of the PSU. Other
devices may be damaged due to the non-standard techniques employed to inject DC
power into the Ethernet connection between the PSU and the ODU.
Do not plug any device other than a Cambium PTP 650 PSU into the PSU port of the
ODU. Plugging any other device into the PSU port of the ODU may damage the ODU
and device.
Installing the AC Power Injector
Follow this procedure to install the AC Power Injector (Cambium part number N000065L001):
1
Form a drip loop on the PSU end of the LPU to PSU drop cable. The drip loop ensures that
any moisture that runs down the cable cannot enter the PSU.
2
(a) Place the AC Power Injector on a horizontal surface. Plug the LPU to PSU drop cable into
the PSU port labeled ODU. (b) When the system is ready for network connection, connect the
network Cat5e cable to the LAN port of the PSU:
(a)
(b)
Page 5-21
Chapter 5: Installation Installing the PSU
Installing the AC+DC Enhanced Power Injector
Follow this procedure to install the AC+DC Enhanced Power Injector (Cambium part number
C000065L002):
1
Mount the AC+DC power injector by screwing it to a vertical or horizontal surface using the
four screw holes (circled):
2
Form a drip loop on the PSU end of the LPU to PSU drop cable. The drip loop ensures that
any moisture that runs down the cable into the cabinet or enclosure cannot enter the PSU.
3
(a) Undo the retaining screw, hinge back the cover and plug the drop cable into the port. (b)
Close the cover and secure with the screw. (c) When the system is ready for network
connection, connect the network Cat5e cable to the LAN port of the PSU:
(a)
(b) and (c)
Page 5-22
Chapter 5: Installation Installing an SFP Ethernet interface
Installing an SFP Ethernet interface
In more advanced configurations, there may be an optical or copper Cat5e Ethernet interface
connected to the SFP port of the ODU. Refer to Typical deployment on page 3-2 for diagrams of
these configurations.
Adapt the installation procedures in this chapter as appropriate for SFP interfaces, noting the
following differences from a PSU interface:
Install an optical or copper SFP module in the ODU (SFP port) and connect the SFP optical or
copper cable into this module using the long cable gland from the SFP module kit. This is
described in the following procedures:
o Fitting the long cable gland on page 5-25
o Inserting the SFP module on page 5-26
o Connecting the cable on page 5-29
o Fitting the gland on page 5-30
o Removing the cable and SFP module on page 5-31
Optical cables do not require LPUs or ground cables.
At the remote end of an SFP drop cable, use an appropriate termination for the connected
device.
If the connected device is outdoors, not in the equipment building or cabinet, adapt the
grounding instructions as appropriate.
PTP 650 LPUs are not suitable for installation on SFP copper Cat5e interfaces. For SFP drop
cables, obtain suitable surge protectors from a specialist supplier.
Ground the top LPUs and surge protector to the same point on the ODU (Figure 57).
Page 5-23
Chapter 5: Installation Installing an SFP Ethernet interface
Figure 57
ODU with copper Cat5e connections to all three Ethernet ports
Page 5-24
Chapter 5: Installation Installing an SFP Ethernet interface
Fitting the long cable gland
Optical SFP interface
: Disassemble the long cable gland and thread its components over the LC
connector at the ODU end as shown below.
Copper Cat5e SFP interface
: Disassemble the long cable gland and thread its components over the
RJ45 connector at the ODU end as shown below.
1
Disassemble the gland:
2
Thread each part onto the cable (the rubber bung is split):
3
Assemble the spring clip and the rubber bung (the clips go inside the ring):
Page 5-25
Chapter 5: Installation Installing an SFP Ethernet interface
4
Fit the parts into the body and lightly screw on the gland nut (do not tighten it):
Optical
Copper
Inserting the SFP module
To insert the SFP module into the ODU, proceed as follows:
1
Remove the blanking plug from the SFP port of the ODU:
Page 5-26
Chapter 5: Installation Installing an SFP Ethernet interface
2
Insert the SFP module into the SFP receptacle
with the label up:
Optical
Copper
3
Push the module home until it clicks into place:
Optical
Copper
Page 5-27
Chapter 5: Installation Installing an SFP Ethernet interface
4
Rotate the latch to the locked position:
Optical
Copper
Page 5-28
Chapter 5: Installation Installing an SFP Ethernet interface
Connecting the cable
Caution
The fiber optic cable assembly is very delicate. To avoid damage, handle it with
extreme care. Ensure that the fiber optic cable does not twist during assembly,
especially when fitting and tightening the weatherproofing gland.
Do not insert the power over Ethernet drop cable from the PSU into the SFP module,
as this will damage the module.
1
Remove the LC connector dust caps from the ODU end (optical cable only):
2
Plug the connector into the SFP module, ensuring that it snaps home:
Optical
Copper
Page 5-29
Chapter 5: Installation Installing an SFP Ethernet interface
Fitting the gland
1
Fit the gland body to the SFP port and tighten it to a torque of 5.5 Nm (4.3 lb ft)
2
Fit the gland nut and tighten until the rubber seal closes on the cable. Do not over-tighten
the gland nut, as there is a risk of damage to its internal components:
Correct
Incorrect
Page 5-30
Chapter 5: Installation Installing an SFP Ethernet interface
Removing the cable and SFP module
Do not attempt to remove the module without disconnecting the cable, otherwise the locking
mechanism in the ODU will be damaged.
1
Remove the cable connector by pressing its release tab before pulling it out:
Optical
Copper
2
Rotate the latch to the unlocked position. Extract the module by using a screwdriver:
Optical
Copper
Page 5-31
Chapter 5: Installation Installing an Aux Ethernet interface
Installing an Aux Ethernet interface
In more advanced configurations, there may be a copper Cat5e Ethernet interface connected to the
Aux port of the ODU. Refer to Typical deployment on page 3-2 for a diagram of this configuration.
Adapt the installation procedures in this chapter as appropriate for the Aux interface, noting the
following differences:
At the remote end of the Aux drop cable, use an appropriate termination for the connected
device (for example, a video camera or wireless access point).
If the connected device is outdoors, not in the equipment building or cabinet, adapt the
grounding instructions as appropriate.
Ground the top LPUs and surge protector to the same point on the ODU (Figure 57).
Page 5-32
Chapter 5: Installation Supplemental installation information
Supplemental installation information
This section contains detailed installation procedures that are not included in the above topics,
such as how to strip cables, create grounding points and weatherproof connectors.
Stripping drop cable
When preparing drop cable for connection to the PTP 650 ODU or LPU, use the following
measurements:
When preparing drop cable for connection to the PTP 650 PSU (without a cable gland), use the
following measurements:
Page 5-33
Chapter 5: Installation Supplemental installation information
Creating a drop cable grounding point
Use this procedure to connect the screen of the main drop cable to the metal of the supporting
structure using the cable grounding kit (Cambium part number 01010419001).
To identify suitable grounding points, refer to Drop cable grounding points on page 3-13.
1
Remove 60
mm (2.5 inches) of the drop cable outer sheath.
2
Cut 38mm (1.5 inches) of rubber tape (
self-amalgamating) and fit to the ground cable lug.
Wrap the tape completely around the lug and cable.
3
Fold th
e ground wire strap around the drop cable screen and fit cable ties.
Page 5-34
Chapter 5: Installation Supplemental installation information
4
Tighten the cable ties with pliers.
Cut the surplus from the cable ties.
5
Cut a 38mm (1.5 inches) section of self
-amalgamating tape and wrap it completely around the
joint between the drop and ground cables.
6
Use the remainder of t
he self-amalgamating tape to wrap the complete assembly. Press the
tape edges together so that there are no gaps.
Page 5-35
Chapter 5: Installation Supplemental installation information
7
Wrap a layer of
PVC tape from bottom to top, starting from 25 mm (1 inch) below and
finishing 25
mm (1 inch) above the edge of the self-amalgamating tape, over lapping at half
width.
8
Repeat with a further
four layers of PVC tape, always overlapping at half width. Wrap the
layers in alternate directions (top to bottom, then bottom to top). The edges of each layer
should be 25mm (1 inch) above (A) and 25
mm (1 inch) below (B) the previous layer.
9
Prepare the metal grounding point of the supporting structure to provide a good electrical
contact with the grounding cable
clamp. Remove paint, grease or dirt, if present. Apply anti-
oxidant compound liberally between the two metals.
Page 5-36
Chapter 5: Installation Supplemental installation information
10
Clam
p the bottom lug of the grounding cable to the supporting structure using site approved
methods.
Use a two-hole lug secured with fasteners in both holes. This provides better
protection than a single
-hole lug.
Weatherproofing an N type connector
Use this procedure to weatherproof the N type connectors fitted to the connectorized ODU and
external antenna (if recommended by the antenna manufacturer).
1
Ensure the connection is tight. A torque wrench should be used if available:
2
Wrap the connection with a layer of 19 mm (0.75 inch) PVC tape, starting 25 mm (1 inch)
below the connector body. Overlap the tape to half-width and extend the wrapping to the
body of the LPU. Avoid making creases or wrinkles:
3
Smooth the tape edges:
Page 5-37
Chapter 5: Installation Supplemental installation information
4
Cut a 125mm (5 inches) length of rubber tape (self-amalgamating):
5
Expand the width of the tape by stretching it so that it will wrap completely around the
connector and cable:
6
Press the tape edges together so that there are no gaps. The tape should extend 25 mm
(1 inch) beyond the PVC tape:
7
Wrap a layer of 50 mm (2 inch) PVC tape from bottom to top, starting from 25 mm (1 inch)
below the edge of the self-amalgamating tape, overlapping at half width.
Page 5-38
Chapter 5: Installation Supplemental installation information
8
Repeat with a further four layers of 19 mm (0.75 inch) PVC tape, always overlapping at half
width. Wrap the layers in alternate directions:
Second layer: top to bottom.
Third layer: bottom to top.
Fourth layer: top to bottom.
Fifth layer: bottom to top.
The bottom edge of each layer should be 25 mm (1 inch) below the previous layer.
9
Check the completed weatherproof connection:
Page 5-39
Chapter 5: Installation Supplemental installation information
Replacing PSU fuses
The AC+ DC Enhanced Power Injector contains two replaceable fuses. These fuses protect the
positive and negative grounded DC input voltages. If an incorrect power supply (that is, not in the
range 37V to 60V DC) is connected to the DC input terminals, one or both fuses may blow.
Both fuses are 3 Amp slow-blow, for example Littlefuse part number 0229003.
To replace these fuses, undo the retaining screw and hinge back the cover as indicated:
Note
No other fuses are replaceable in the AC+DC Enhanced Power Injector.
Note
The AC Power Injector does not contain replaceable fuses.
Page 5-40
Chapter 6: Configuration and alignment
This chapter describes how to use the web interface to configure the PTP 650 link. It also describes
how to align antennas. This chapter contains the following topics:
Preparing for configuration and alignment on page 6-2
Connecting to the unit on page 6-5
Using the web interface on page 6-7
Installation menu on page 6-10
System menu on page 6-21
Management menu on page 6-39
SNMP pages (for SNMPv3) on page 6-61
SNMP pages (for SNMPv1/2c) on page 6-71
Security menu on page 6-75
Aligning antennas on page 6-87
Other configuration tasks on page 6-95
Page 6-1
Chapter 6: Configuration and alignment Preparing for configuration and alignment
Preparing for configuration and alignment
This section describes the checks to be performed before proceeding with unit configuration and
antenna alignment.
Safety precautions
All national and local safety standards must be followed while configuring the units and aligning
the antennas.
Warning
Ensure that personnel are not exposed to unsafe levels of RF energy. The units start to
radiate RF energy as soon as they are powered up. Respect the safety standards
defined in Compliance with safety standards on page 4-23, in particular the minimum
separation distances.
Observe the following guidelines:
Never work in front of the antenna when the ODU is powered.
Always power down the PSU before connecting or disconnecting the drop cable
from the PSU, ODU or LPU.
Regulatory compliance
All applicable radio regulations must be followed while configuring the units and aligning the
antennas. For more information, refer to Compliance with radio regulations on page 4-27.
Caution
If the system designer has provided a list of channels to be barred for TDWR radar
avoidance, the affected channels must be barred before the units are allowed to
radiate on site, otherwise the regulations will be infringed. To bar these channels,
follow the procedure Barring channels on page 7-31.
Selecting configuration options
Use the installation report to determine which configuration options are required. Refer to PTP
LINKPlanner on page 3-21.
Page 6-2
Chapter 6: Configuration and alignment Preparing for configuration and alignment
Generating a License Key
ODUs are shipped with a default License Key factory installed. The default license key enables a
limited set of capabilities as follows:
Operation in selected regulatory bands (these are restricted by the ODU regional variant):
o FCC/IC variants: 5.8 GHz USA (regulatory band 1).
o RoW variants: 5.4 GHz unrestricted (regulatory band 8) and 5.8 GHz unrestricted
(regulatory band 35).
o EU variants: 5.4 GHz ETSI (regulatory band 26)
“Lite” throughput capability (up to 125 Mbps).
A license key is required to upgrade the ODU to the following capabilities:
To allow the ODU to operate in other regulatory bands (these are restricted by the ODU
regional variant). This capability is free of charge.
To enable the SFP port. An Access Key for this capability is provided in the SFP module kits
(SFP module kits on page 2-27).
To allow “Med” (up to 250 Mbps) or “Full” (up to 450 Mbps) throughput capability. Purchase
an access key from Cambium Networks (Table 68). Cambium will email one Access Key for
each upgrade purchased.
To allow 128-bit or 256-bit AES encryption. Purchase an access key from Cambium Networks
(Table 68). Cambium will email one Access Key for each upgrade purchased.
Table 68
Capability upgrades
Cambium description (*1)
Cambium part number
PTP 650 128-bit AES Encryption per ODU (*2) C000065K018
PTP 650 256-bit AES Encryption per ODU (*2) C000065K019
PTP 650 Lite (Up to 125Mbps) to Mid (Up to 250Mbps) Link Capacity
upgrade license per ODU C000065K021
PTP 650 Lite (Up to 125Mbps) to Full (Up to 450Mbps) Link Capacity
upgrade license per ODU C000065K022
PTP 650 Mid (Up to 250Mbps) to Full (Up to 450Mbps) Link Capacity
upgrade license per ODU C000065K023
(*1) If the Cambium description contains the words “per ODU”, then order two upgrades per link.
(*2) Cambium Networks will supply these upgrades only if there is official permission to export
AES encryption to the country of operation.
Page 6-3
Chapter 6: Configuration and alignment Preparing for configuration and alignment
To obtain the License Key, proceed as follows:
Obtain the MAC Address of the unit (it is on the System Status page).
Go to the Cambium Support web page (see Contacting Cambium Networks on page 1) and
navigate to the
Cambium Networks License Key Generator
.
Complete the required fields, including MAC Address and Country. For SFP capability, AES
encryption and data throughput upgrades only, enter the Access Key.
Submit the web form. Cambium will send the License Key by email.
Page 6-4
Chapter 6: Configuration and alignment Connecting to the unit
Connecting to the unit
This section describes how to connect the unit to a management PC and power it up.
Configuring the management PC
Use this procedure to configure the local management PC to communicate with the PTP 650.
Procedure:
1
Select
Properties
for the Ethernet port. In Windows 7 this is found in
Control Panel >
Network and Internet > Network Connections > Local Area Connection
.
2
Select
Internet Protocol (TCP/IP)
:
3
Click
Properties
.
Page 6-5
Chapter 6: Configuration and alignment Connecting to the unit
4
Enter an IP address that is valid for the 169.254.X.X network, avoiding 169.254.0.0 and
169.254.1.1. A good example is 169.254.1.3:
5
Enter a subnet mask of 255.255.0.0. Leave the default gateway blank.
Connecting to the PC and powering up
Use this procedure to connect a management PC and power up the PTP 650.
Procedure:
1
Check that the ODU and PSU are correctly connected.
2
Connect the PC Ethernet port to the LAN port of the PSU using a standard (not crossed)
Ethernet cable.
3
Apply mains or battery power to the PSU. The green Power LED should illuminate
continuously.
4
After about 45 seconds, check that the orange Ethernet LED starts with 10 slow flashes.
5
Check that the Ethernet LED then illuminates continuously. If the Power and Ethernet LEDs
do not illuminate correctly, refer to Testing link end hardware on page 8-2.
Page 6-6
Chapter 6: Configuration and alignment Using the web interface
Using the web interface
This section describes how to log into the PTP 650 web interface and use its menus.
Logging into the web interface
Use this procedure to log into the web interface as a system administrator.
Procedure:
1
Start the web browser from the management PC.
2
Type the IP address of the unit into the address bar. The factory default IP addres
s is
169.254.1.1
. Press ENTER. The web interface menu and System Summary page are displayed:
3
On the menu, click
System
. The login page is displayed with Password only (the default) or
with Username and Password (if
identity-based user accounts have been enabled):
4
Enter Username (if requested) and Password (the default is blank)
and click
Login
.
Page 6-7
Chapter 6: Configuration and alignment Using the web interface
Using the menu options
Use the menu navigation bar in the left panel to navigate to each web page. Some of the menu
options are only displayed for specific system configurations. Use Table 69 to locate information
about using each web page.
Table 69
Menu options and web pages
Main menu
Menu option
Web page information
Home
System Summary page on page 7-2
Status
System Status page on page 7-3
System
Configuration System Configuration page on page 6-21
LAN Configuration LAN Configuration page on page 6-24
QoS Configuration QoS Configuration page on page 6-30
SFP Configuration SFP Configuration page on page 6-33
Save and Restore Save & Restore Configuration page on page 6-34
Spectrum Management Spectrum Management page on page 7-20
Barring channels on page 7-31
Statistics System Statistics page on page 7-32
Comparing actual to predicted performance on
page 6-94
Wireless Port Counters Wireless Port Counters page on page 7-37
Test Ethernet packet errors reported by ODU on
page 8-7
Main Port Counters Main Port Counters page on page 7-38
Aux Port Counters Aux Port Counters page on page 7-40
SFP Port Counters SFP Port Counters page on page 7-41
Diagnostics Plotter Diagnostics Plotter page on page 7-42
CSV Download Generate Downloadable Diagnostics page on page
7-43
Software Upgrade Software Upgrade page on page 6-37
Reboot Reboot Wireless Unit page on page 7-9
Page 6-8
Chapter 6: Configuration and alignment Using the web interface
Main menu
Menu option
Web page information
Installation
Installation menu on page 6-10
Graphical Install Graphical Install page on page 6-92
Management
Web Web-Based Management page on page 6-39
Local User Accounts Local User Accounts page on page 6-42
RADIUS Configuration RADIUS Configuration page on page 6-47
Login Information Login Information page on page 7-9
Web Properties Webpage Properties page on page 6-49
SNMP SNMP pages (for SNMPv3) on page 6-61
SNMP pages (for SNMPv1/2c) on page 6-71
Email Email Configuration page on page 6-52
Diagnostic Alarms Diagnostic Alarms page on page 6-54
Time Time Configuration page on page 6-55
Syslog Syslog page on page 7-16
Syslog Configuration Syslog Configuration page on page 6-59
Security
Security menu on page 6-75
Zeroize CSPs Zeroize CSPs page on page 6-86
Change
Password
Change Password page on page 7-10
Logout
Logging out on page 7-11
Page 6-9
Chapter 6: Configuration and alignment Installation menu
Installation menu
This section describes how to use the Installation Wizard to complete the essential system
configuration tasks that must be performed on a new link.
Caution
If the system designer has provided a list of channels to be barred for TDWR radar
avoidance, the affected channels must be barred before the units are allowed to
radiate on site, otherwise the regulations will be infringed. To bar these channels,
follow the procedure Barring channels on page 7-31.
Starting the Installation Wizard
To start the Installation Wizard: on the menu, click
Installation
. The response depends upon the
state of the unit:
If the unit is newly installed, the Software License Key page is displayed. Continue at Software
License Key page on page 6-12.
If the unit is armed for alignment, the Disarm Installation page is displayed. Continue at Disarm
Installation page on page 6-11.
If the unit is not armed, the Current Installation Summary page is displayed. Continue at
Current Installation Summary page on page 6-11.
Page 6-10
Chapter 6: Configuration and alignment Installation menu
Disarm Installation page
Menu option:
Installation
(Figure 58). This page is displayed only when unit is armed.
Figure 58
Disarm Installation page (top and bottom of page shown)
To disarm the unit, click
Disarm Installation Agent
.
Current Installation Summary page
Menu option:
Installation
(Figure 59). This page is displayed only when unit is not armed.
Figure 59
Current Installation Summary page (top and bottom of page shown)
Click
Continue to Installation Wizard
.
Page 6-11
Chapter 6: Configuration and alignment Installation menu
Software License Key page
Menu option:
Installation
(Figure 60). Use this page to configure the unit with a new License Key
and to review the capabilities of an installed License Key. The Capability Summary section is not
displayed until a License Key is submitted and accepted. Ensure that Licenses Keys are available
(Generating a License Key on page 6-3).
Figure 60
Software License Key page (showing a Mid license)
Page 6-12
Chapter 6: Configuration and alignment Installation menu
Note
Full capability is available only when both ODUs have the trial active or are already
licensed to operate with that capacity.
When the trial has started, the Software License Key page displays the Trial Period
Remaining attribute (Figure 61). This shows the number of days remaining before the
full capacity trial period expires.
Procedure:
To clear the existing License Key (if present), click
Clear
.
To format the new License Key: copy it from the Cambium notification email, paste it into the
License Key box and click
Format
. The page is redisplayed with the License Key formatted.
For Lite and Mid licenses only, select one of the following options:
o If License Full Capability Trial Status is
Available
(Figure 60): to start the full capability trial
period, set Activate Full Capability Trial License to
Yes
.
o If License Full Capability Trial Status is
Active
(Figure 61): to suspend the full capability trial
period, set Stop Full Capability Trial License to
Yes
.
o If License Full Capability Trial Status is
Inactive
(Figure 62): to resume the full capability
trial period, set Start Full Capability Trial License to
Yes
.
To enter the new License Key, click
Submit
. The page is redisplayed with the Capability
Summary.
To continue with the Installation Wizard, click
Next
.
Figure 61
Software License Key page (extract) with full capability trial active
Figure 62
Software License Key page (extract) with full capability trial inactive
Page 6-13
Chapter 6: Configuration and alignment Installation menu
Interface Configuration page
Menu option:
Installation
(Figure 63). Use this page to update the IP interface attributes.
Figure 63
Interface Configuration page (showing Dual IPv4 and IPv6)
Review and update the attributes: they are repeated in the LAN Configuration page (Table 72).
To continue with the Installation Wizard, click
Next
or
Submit Interface Configuration
.
Page 6-14
Chapter 6: Configuration and alignment Installation menu
Wireless Configuration page
Menu option:
Installation
(Figure 64).
This page is part of the Installation Wizard. Use it to update the wireless attributes.
Figure 64
Wireless Configuration page
Procedure:
Update the attributes (Table 70).
To save any changes and continue with the Installation Wizard, click
Next
or click
Submit
Wireless Configuration
.
Page 6-15
Chapter 6: Configuration and alignment Installation menu
Caution
The lower center frequency attribute must be configured to the same value for both
the Master and Slave, otherwise the wireless link will fail to establish. The only way to
recover from this situation is to modify the Lower Center Frequency attributes so that
they are identical on both the master and slave units.
Note
When configuring a linked pair of units, use the Master Slave Mode to ensure that
one unit is
Master
and the other is
Slave
.
Table 70
Wireless Configuration attributes
Attribute
Meaning
Master Slave Mode
Master:
The unit controls the point-to-point link and its maintenance. On
startup, the Master transmits until a link with the Slave is made.
Slave:
The unit listens for its peer and only transmits when the peer has
been identified.
Access Method ODUs must be configured in pairs before a link can be established. Access
Method determines how paired ODUs will recognize each other.
Link Access:
Each ODU must be configured with Target MAC Address
equal to the MAC Address of the other unit.
Link Name Access:
Both ODUs must be configured with the same Link
Name.
Target MAC Address Only displayed when Access Method is set to
Link Access
. This is the
MAC Address of the peer unit that will be at the other end of the wireless
link. This is used by the system to ensure the unit establishes a wireless
link to the correct peer. The MAC Address can be found embedded within
the serial number of the unit. The last six characters of the serial number
are the last three bytes of the unit’s MAC address.
Link Name Only displayed when Access Method is set to
Link Name Access
.
Link Name may consist of letters (A-Z and a-z), numbers (0-9), spaces, and
the following special characters: (),-.,:<=>[]_{}
Link Name must be same at both ends and different to site name.
Dual Payload
Disabled:
The link maximizes robustness against fading and interference.
Enabled:
The link attempts to reach maximum throughput at the expense
of robustness against fading and interference.
Page 6-16
Chapter 6: Configuration and alignment Installation menu
Attribute
Meaning
Max Receive
Modulation Mode
The maximum mode the unit will use as its adaptive modulation. By
default the Max Receive Modulation Mode is the highest mode available.
For minimum error rates, set the maximum modulation mode to the
minimum necessary to carry the required traffic.
Lowest Ethernet
Modulation Mode
The lowest modulation mode that must be achieved before the link is
allowed to bridge Ethernet frames.
Link Mode
Optimization
IP Traffic:
The link is optimized for IP traffic to provide the maximum
possible link capacity.
TDM Traffic:
The link is optimized for TDM traffic to provide the lowest
possible latency.
Regulatory Band The regulatory band selected from the list in the license key.
Channel Bandwidth Bandwidth of the transmit and receive radio channels.
Link Symmetry Only displayed when Master Slave Mode is set to
Master
.
Adaptive
: Allows link symmetry to vary dynamically in response to
offered traffic load. This is not supported in the following cases:
Where radar avoidance is mandated in the region.
Link Mode Optimization is set to
TDM Traffic
.
“2 to 1”
, “
1 to 1”
or “
1 to 2”
: There is a fixed division between transmit
and receive time in the TDD frame of the master ODU. The first number in
the ratio represents the time allowed for the transmit direction and the
second number represents the time allowed for the receive direction. The
appropriate matching Link Symmetry is set at the slave ODU
automatically. For example, if Link Symmetry is set to “
2 to 1”
at the
master ODU, then the slave ODU will be set automatically as “
1 to 2”
. In
this example, the master-slave direction has double the capacity of the
slave-master direction.
Spectrum
Management
Control
In regions that do not mandate DFS (radar detection), the options are:
DSO
Fixed Frequency
In regions that mandate DFS (radar detection), the options are:
DFS
DFS with DSO
This attribute is disabled if the regulatory requirement is fixed frequency
only.
Page 6-17
Chapter 6: Configuration and alignment Installation menu
Attribute
Meaning
Lower Center
Frequency
The center frequency (MHz) of the lowest channel that may be used by
this link. Not displayed when Spectrum Management Control is set to
Fixed Frequency
.
Use this attribute to slide the available channels up and down the band.
Default Raster This is only displayed when Spectrum Management Control is set to
Fixed Frequency
. Limits frequency selection to the unit’s default raster
setting.
Fixed Tx Frequency,
Fixed Rx Frequency
This is only displayed when Spectrum Management Control is set to
Fixed Frequency
. The settings must be compatible at each end of the link.
Once configured, the spectrum management software will not attempt to
move the wireless link to a channel with lower co-channel or adjacent
channel interference. Therefore this mode of operation is only
recommended for deployments where the installer has a good
understanding of the prevailing interference environment.
Tx Color Code, Rx
Color Code
Tx Color Code and Rx Color Code may be used to minimize interference
in a dense network of synchronized PTP 650 units where some of the
units are operating on the same frequency. When this type of network is
designed, the Color Code values are normally specified in the link
planning report. In all other cases, Cambium Networks recommend that
Tx Color Code and Rx Color Code are left at the default value of
A
.
The value of Tx Color Code MUST always match the value of Rx Color
Code at the other end of the link.
Antenna Gain Only displayed when the ODU is connectorized.
Gain of the remote antenna.
Cable Loss Only displayed when the ODU is connectorized.
Loss in the ODU-antenna RF cable. If there is a significant difference in
length of the RF cables for the two antenna ports, then the average value
should be entered.
Maximum Transmit
Power
The maximum power (dBm) at which the unit will transmit, configurable
in steps of 1 dB. Its maximum value is controlled by the selected
combination of Regulatory Band, Bandwidth and (for connectorized units)
Antenna Gain and Cable Loss.
To prepare for antenna alignment, set this attribute to the alignment value
specified in the installation report (PTP LINKPlanner).
To prepare for link operation, set this attribute to the operational value
specified in the installation report (PTP LINKPlanner). This may be higher
than the alignment value.
Page 6-18
Chapter 6: Configuration and alignment Installation menu
Attribute
Meaning
Installation Mode
Arm With Tones
: Audio tones will be emitted during antenna alignment
(the recommended option).
Arm Without Tones
: Audio tones will not be emitted during antenna
alignment.
Change Config Without Arming
: Configuration changes will be made
without arming the ODU for alignment.
Ranging Mode This can only be modified if Installation Mode is
Arm With Tones
or
Arm
Without Tones
.
Auto..
: During alignment, the wireless units use algorithms to calculate
link range. To implement automatic ranging, select a value that
corresponds to the estimated maximum range of the link:
Auto 0 to 40 km
(0 to 25 miles).
Auto 0 to 100km
(0 to 62 miles).
Auto 0 to 200km
(0 to 125 miles).
Target Range
: During alignment, the wireless units use the approximate
link distance (entered in Target Range) to calculate link range. The main
advantage of Target Range mode is that it reduces the time taken by the
units to range.
If preferred, range functions can be configured to operate in miles, as
described in Webpage Properties page on page 6-49.
Target Range Only available when Ranging Mode is set to
Target Range
.
The approximate distance between the two wireless units to within
± 1 km. Enter the same value at both ends of the link.
Page 6-19
Chapter 6: Configuration and alignment Installation menu
Confirm Installation Configuration page
Menu option:
Installation
(Figure 65). Use this page to review and confirm the updated wireless
configuration of the unit.
Figure 65
Confirm Installation Configuration page (top and bottom of page shown)
Procedure:
To undo or correct any updates, click
Back
.
To confirm the updates and arm the installation, click
Confirm Configuration and Reboot
and
click
OK
to reboot the unit.
If IP Address, Subnet Mask or Gateway IP Address have been changed: reconfigure the local
management PC to use an IP address that is valid for the network. Refer to Configuring the
management PC on page 6-5.
If IP Address has been changed, use the new IP address to log into the unit.
Page 6-20
Chapter 6: Configuration and alignment System menu
System menu
This section describes how to configure the IP and Ethernet interfaces of the PTP 650 unit.
System Configuration page
Menu option:
System > Configuration
(Figure 66). Use this page to enable AES encryption and to
review and update key wireless attributes of the unit.
Figure 66
System Configuration page
Caution
Configuring link encryption over an operational link will necessitate a service outage.
Therefore, the configuration process should be scheduled during a period of low link
utilization.
Page 6-21
Chapter 6: Configuration and alignment System menu
Procedure:
If AES encryption is required but the System Configuration page does not contain the
Encryption Algorithm or Encryption Key attributes, then order the necessary AES capability
upgrade, generate a license key and enter it on the Software License Key page (Software
License Key page on page 6-12).
Update the attributes (Table 71).
To save changes, click
Submit Updated System Configuration
.
If a reboot request is displayed, click
Reboot Wireless Unit
and
OK
to confirm.
Table 71
System Configuration attributes
Attribute
Meaning
Link Name Link Name may consist of letters (A-Z and a-z), numbers (0-9), spaces, and
the following special characters: (),-.,:<=>[]_{}. Link Name must be same at
both ends and different to site name.
Site Name User defined name for the site, with additional notes (if required).
IP Address Label Read only. The IP Address version used to identify the unit in SMTP
messages, fault logs and other system outputs.
IPv4
or
IPv6
: The unit is identified using its IPv4 or IPv6 Address.
These options are only available when IP Version is set to
Dual IPv4 and
IPv6
in the in the LAN Configuration page (Table 72).
Master Slave Mode
Master:
The unit is a Master, that is, it controls the point-to-point link and
its maintenance. On startup, the Master transmits until a link with the
Slave is made.
Slave:
The unit is a Slave, that is, it listens for its peer and only transmits
when the peer has been identified.
Read only.
Link Mode
Optimization
IP Traffic:
The link is optimized for IP traffic to provide the maximum
possible link capacity.
TDM Traffic:
The link is optimized for TDM traffic to provide the lowest
possible latency.
Read only.
Channel Bandwidth Bandwidth of the transmit and receive radio channels.
Read only.
Max Receive
Modulation Mode
The maximum mode the unit will use as its adaptive modulation. By
default the Max Receive Modulation Mode is the highest mode available.
For minimum error rates, set the maximum modulation mode to the
minimum necessary to carry the required traffic.
Page 6-22
Chapter 6: Configuration and alignment System menu
Attribute
Meaning
Lowest Ethernet
Modulation Mode
The lowest modulation mode that must be achieved before the link is
allowed to bridge Ethernet frames.
Ethernet Capped
Max Wireless Speed
Disabled
: Wireless speed is not limited by the connected Ethernet link.
Enabled:
Wireless speed is limited to a mode that the connected Ethernet
link can sustain.
If either ODU is connected to an Ethernet link operating at less than
1000 Mbps, set this attribute to
Enabled
.
Max Transmit
Power
The maximum power (dBm) at which the unit will transmit, configurable
in steps of 1 dB. Its maximum value is controlled by the combination of
the selected Regulatory Band, Bandwidth and (for connectorized units)
Antenna Gain and Cable Loss.
To prepare for antenna alignment, set this attribute to the alignment value
specified in the installation report (PTP LINKPlanner).
To prepare for link operation, set this attribute to the operational value
specified in the installation report (PTP LINKPlanner). This may be higher
than the alignment value.
Antenna Gain Only displayed when the ODU is connectorized. Gain of the remote
antenna.
Cable Loss Only displayed when the ODU is connectorized. Loss in the ODU-antenna
RF cable. If there is a significant difference in length of the RF cables for
the two antenna ports, then the average value should be entered.
EIRP Only displayed when the ODU is connectorized. Effective Isotropic
Radiated Power (EIRP) describes the strength of the radio signal leaving
the wireless unit. Use it to verify that the link configuration (Max Transmit
Power, Antenna Gain and Cable Loss) does not exceed any applicable
regulatory limit. Read only.
Encryption
Algorithm
Only displayed when AES encryption is enabled by license key.
Values are:
None
,
AES 128-bit
or
AES 256-bit
. Use the same setting at
both link ends.
Encryption Key Only displayed when AES encryption is enabled by license key.
The key consists of 32 or 64 case-insensitive hexadecimal characters. Use
the same key at both link ends.
Confirm Encryption
Key
Only displayed when AES encryption is enabled by license key.
Retype the Encryption Key.
Page 6-23
Chapter 6: Configuration and alignment System menu
LAN Configuration page
Menu option:
System > Configuration > LAN Configuration
(Figure 67). Use this page to control
how users connect to the PTP 650 web interface, either from a locally connected computer or from
a management network.
Figure 67
LAN Configuration page (showing Dual IPv4 and IPv6)
Page 6-24
Chapter 6: Configuration and alignment System menu
Caution
Before configuring a VLAN for management interfaces, ensure that the VLAN is
accessible, otherwise the unit will be inaccessible after the next reboot.
Caution
Before configuring in-band management, ensure that the Master and Slave units are
configured with different IP addresses, otherwise the management agent will not be
able to distinguish the two units.
Caution
Auto-negotiation and forced Ethernet configuration:
To operate an Ethernet link at a fixed speed, set Auto Negotiation to
Enabled
and
limit Auto Neg Advertisement to the desired speed. If constrained auto-negotiation
fails, set Auto Negotiation to
Disabled
(forced Ethernet configuration), but only as a
last resort.
Both ends of an Ethernet link must be configured identically, because forced and
auto-negotiation are not compatible: a mixed configuration will cause a duplex
mismatch, resulting in greatly reduced data capacity.
The Auto Neg Advertisement or Forced Configuration data rates must be within the
capability of the Ethernet link partner, otherwise loss of service will occur.
Procedure:
1
Review and update the a
ttributes: IP Interface (Table 72); Main PSU or Aux Port (Table 73);
Bridging
(Table 74).
2
To save changes
, click
Submit Updated System Configuration
. Some updates will cause the
system to reboot.
3
If Main PSU Port Allocation has been changed to Disabled
or
Data Only
, connect the
management PC to whichever port (
Aux or SFP) has been set to
Data and In-Band
Management
or
Out-of-Band Local Management
.
4
If
IP Address, Subnet Mask or Gateway IP Address have been changed, reconfigure the local
management P
C to use an IP address that is valid for the network. Refer to Configuring the
management PC
on page 6-5.
5
If
IP Address has been changed, use the new IP address to log into the unit.
Page 6-25
Chapter 6: Configuration and alignment System menu
Table 72
IP interface attributes
Attribute
Meaning
IP Version The internet protocols to be supported by this ODU:
IPv4:
IPv4 protocols only. IPv4 attributes are displayed.
IPv6:
IPv6 protocols only. IPv6 attributes are displayed.
Dual IPv4 and IPv6:
Both IPv4 and IPv6 protocols. IPv4 and IPv6
attributes are displayed.
IPv4 Address The IPv4 internet protocol address. This address is used by the family
of Internet protocols to uniquely identify this unit on a network.
Subnet Mask The address range of the connected IPv4 network.
Gateway IP Address The IPv4 address of a computer on the current network that acts as an
IPv4 gateway. A gateway acts as an entrance and exit to frames from
and to other networks.
IPv6 Address The IPv6 internet protocol address. This address is used by the family
of Internet protocols to uniquely identify this unit on a network.
IPv6 Prefix Length Length of the IPv6 subnet prefix (default 64 bits).
IPv6 Gateway Address The IPv6 address of a computer on the current network that acts as an
IPv6 gateway. A gateway acts as an entrance and exit to frames from
and to other networks. It is usual to use the link-local address of the
gateway.
IPv6 Auto Configured
Link Local Address
The link-local address of the IPv6 gateway (displayed only, not
updateable).
Use VLAN For
Management
Interfaces
VLAN tagging options for the management interfaces:
No VLAN Tagging
IEEE 802.1Q Tagged (C-Tag, Type 8100)
IEEE 802.1ad Tagged (S-Tag or B-Tag, Type 88a8)
Ensure that the configured VLAN is accessible, otherwise it will not be
possible to access the unit following the next reboot.
The PTP 650 management function is only compatible with single
VLAN tagged frames. Any management frame with two or more tags
will be ignored.
Page 6-26
Chapter 6: Configuration and alignment System menu
Attribute
Meaning
VLAN Management
VID
Only displayed when Use VLAN for Management Interfaces is not set
to
No VLAN Tagging
.
The VLAN VID (range 0 to 4094) that will be included in Ethernet
frames generated by the management interfaces.
VLAN Management
Priority
Only displayed when Use VLAN for Management Interfaces is not set
to
No VLAN Tagging
.
The VLAN priority (range 0 to 7) that will be included in Ethernet
frames generated by the management interfaces.
DSCP Management
Priority
Differentiated Services Code Point (DSCP) value to be inserted in the
IP header of all IP datagrams transmitted by the management
interface.
Main PSU Port
Allocation
Aux Port Allocation
SFP Port Allocation
Disabled
: The port is not used.
Data Only
: The port handles customer data only.
Data and In-Band Management
: The port handles both customer data
and network management data. It can be used to access the web
interface of the local unit, and if the wireless link is established, the
remote unit. Ensure that the local and remote units have different IP
addresses.
Out-of-band Local Management
: The port handles local management
data only. It can be used to access the web interface of the local unit.
Only one port can be allocated to customer data. At least one port
must be allocated to management data.
Ethernet Loopback
Mode
Sets a temporary loopback between the selected ports. The
loopback is disabled on a reboot. This mode is provided to allow
access to a device connected to the local ODU Aux port via either
the main PSU or SFP port. Loopback does not work with jumbo
frames: the maximum frame size is 1536 bytes in loopback.
Data Port Wireless
Down Alert
Disabled:
The data Ethernet link will not be dropped when the
wireless link drops.
Enabled:
The data Ethernet link will be dropped briefly when the
wireless link drops. This signals to the connected network equipment
that this link is no longer available. Connected Ethernet switches can
be configured to forward Ethernet frames on an alternative path
identified using the Spanning Tree Protocol (STP).
Page 6-27
Chapter 6: Configuration and alignment System menu
Table 73
Main PSU Port and Aux Port attributes
Attribute
Meaning
Auto Negotiation
Disabled:
Configuration of the Ethernet interface is forced.
Enabled:
Configuration of the Ethernet interface is automatically
negotiated (default). This is the preferred setting.
See the caution at the start of this section about auto-negotiation versus
forced Ethernet configuration.
Use the same setting for the Ethernet link partner.
Auto Neg
Advertisement
Only displayed when Auto Negotiation is set to
Enabled
.
The data rate that the auto-negotiation mechanism will advertise as
available on the Ethernet interface (1000 Mbps or 100 Mbps Full
Duplex). Select a data rate that is within the capability of the Ethernet
link partner. Use the same setting for the Ethernet link partner.
Forced
Configuration
Only displayed when Auto Negotiation is set to
Disabled
.
This forces the speed and duplex setting of the Ethernet interface. Over-
the-air throughput will be capped to the rate of the Ethernet interface at
the receiving end of the link. Select a data rate that is within the
capability of the Ethernet link partner. Use the same setting for the
Ethernet link partner.
Auto Mdix
Disabled:
The Auto Medium Dependent Interface (MDI)/Medium
Dependent Interface Crossover (MDIX) capability is disabled.
Enabled:
The Auto Medium Dependent Interface (MDI)/Medium
Dependent Interface Crossover (MDIX) capability is enabled.
Power Over
Ethernet Output
Aux port only.
Disabled:
The ODU does not supply power to the auxiliary device.
Enabled:
The ODU supplies power to the auxiliary device.
Page 6-28
Chapter 6: Configuration and alignment System menu
Table 74
Bridging attributes
Attribute
Meaning
Local Packet
Filtering
Enabled:
The management agent learns the location of end stations
from the source addresses in received management frames. The agent
filters transmitted management frames to ensure that the frame is
transmitted at the Ethernet (data or management) port, or over the
wireless link as appropriate. If the end station address is unknown, then
management traffic is transmitted at the Ethernet port and over the
wireless link.
In out-of-band local management mode, management frames are not
transmitted over the wireless link, and so address learning is not active.
Data Port Pause
Frames
Controls whether the bridge tunnels or discards Layer 2 pause frames
arriving at the data port. Such frames are identified by the destination
MAC Address being equal to 01-80-C2-00-00-01.
Page 6-29
Chapter 6: Configuration and alignment System menu
QoS Configuration page
Menu option:
System > Configuration > QoS Configuration
(Figure 68 or Figure 69).
Use this page to control the quality of service configuration. Classification may be based on fields
in the Ethernet header (Layer 2) or in the network header (Layer 3). The unit recognizes two
network layer protocols: IP and MPLS.
Figure 68
QoS Configuration page (Ethernet)
Page 6-30
Chapter 6: Configuration and alignment System menu
Figure 69
QoS Configuration page (IP/MPLS)
Page 6-31
Chapter 6: Configuration and alignment System menu
Procedures:
Review and update the attributes: Layer 2 and Priority Scheme (Table 75).
To use IEEE 802.1Q classification rules, click
Reset Default Priority Mappings
.
To save changes, click:
Submit Updated Configuration
.
Note
Priority mapping must be configured the same at both Master and Slave units on the
wireless link.
Table 75
QoS Configuration attributes
Attribute
Meaning
Bridge The classification of each layer 2 control protocol (L2CP) to an egress
queue at the wireless port.
MRP
CFM
R-APS
EAPS
Priority Scheme
Ethernet
: Classification is based on fields in the Ethernet header (Layer 2).
IP/MPLS
: Classification is based on fields in the network header (Layer 3).
IP includes IPv4 and IPv6.
Unknown Protocol Only displayed when Priority Scheme is
IP/MPLS
.
The classification of unknown network protocols (that is, not IP or MPLS)
to an egress queue at the wireless port.
Page 6-32
Chapter 6: Configuration and alignment System menu
SFP Configuration page
Menu option:
System > Configuration > SFP Configuration
.
This page is only available when the ODU detects an optical (Figure 70) or copper (Figure 71) SFP
module in the SFP port. Use it to configure the way in which the unit connects to the network via
the SFP interface.
Figure 70
SFP Configuration page (optical SFP module)
Figure 71
SFP Configuration page (copper SFP module)
Page 6-33
Chapter 6: Configuration and alignment System menu
Procedure
(only applies when copper SFP module is installed)
:
Update the attributes (Table 76).
To save changes, click
Submit Updated System Configuration
.
Table 76
SFP Configuration (copper SFP module) attributes
Attribute
Meaning
SFP Port Auto
Negotiation
Disabled:
Configuration of the Ethernet interface is forced. This is to be
used as a last resort only if auto-negotiation fails.
Enabled:
Configuration of the Ethernet interface is automatically
negotiated (default). This is the preferred setting.
SFP Port Auto Neg
Advertisement
Only displayed when SFP Port Auto Negotiation is set to
Enabled
.
The data rate that the auto-negotiation mechanism will advertise as
available on the Ethernet interface (1000 Mbps or 100 Mbps Full
Duplex). Select a data rate that is within the capability of the Ethernet
link partner. Use the same setting for the Ethernet link partner.
Forced
Configuration
Only displayed when SFP Port Auto Negotiation is set to
Disabled
.
This forces the speed and duplex setting of the Ethernet interface. Over-
the-air throughput will be capped to the rate of the Ethernet interface at
the receiving end of the link. Select a data rate that is within the
capability of the Ethernet link partner. Use the same setting for the
Ethernet link partner.
Auto Mdix
Disabled:
The Auto Medium Dependent Interface (MDI)/Medium
Dependent Interface Crossover (MDIX) capability is disabled.
Enabled:
The Auto Medium Dependent Interface (MDI)/Medium
Dependent Interface Crossover (MDIX) capability is enabled.
Save & Restore Configuration page
Menu option:
System > Configuration > Save And Restore
(Figure 72).
Use the Save & Restore Configuration page to take a snapshot of the latest system configuration
as a backup. The file can then be used to restore this unit to a known state, or to configure a
replacement unit to the same state. The configuration values are encrypted for security.
Page 6-34
Chapter 6: Configuration and alignment System menu
Figure 72
Save & Restore Configuration page
Save the system configuration in the following situations:
After a new unit has been fully configured as described in this chapter.
After any change has been made to the configuration.
Before upgrading the unit to a new software version.
After upgrading the unit to a new software version.
Note
The restore is only guaranteed to work if the installed software version has not been
changed since the configuration file was saved. This is why the configuration should
always be saved immediately after upgrading the software version.
Note
The license key is restored automatically if the configuration file is saved and then
loaded on the same unit. However, the license key is not restored if the configuration
file is loaded on a different unit. Before restoring configuration to a different PTP 650
unit, ensure that a valid license key is installed (with optional capabilities enabled
where appropriate).
Page 6-35
Chapter 6: Configuration and alignment System menu
Most of the configuration can be restored from the backup. However, certain attributes that were
part of the configuration are not saved or restored automatically. Use the web interface to
reconfigure the following attributes:
Usernames, passwords and roles for the web-based interface.
Key of Keys
HTTPS Entropy
HTTPS Private Key
HTTPS Public Key Certificate
HTTP Access Enabled
HTTPS Access Enabled
Telnet Access Enabled
HTTP Port Number
HTTPS Port Number
Telnet Port Number
Encryption Algorithm
Encryption Key
SNMP Control Of HTTP And Telnet
SNMP Control of Passwords
Procedures:
To save the configuration:
o Click Save Configuration File.
o Save the file using the format
MAC-mm-mm-mm_IP-iii-iii-iii-iii.cfg
, where
mm-mm-mm
is MAC address of unit and
iii-iii-iii-iii
is Internet address of unit (IPv4 or IPv6,
depending on IP address label).
To restore the configuration:
o Click
Browse
and navigate to the PC folder containing the saved configuration file (.cfg).
o Click
Restore Configuration File and Reboot
.
o Click
OK
to confirm the restore. The configuration file is uploaded and used to reconfigure
the new unit to the same state as the old unit. On completion, the unit reboots.
Page 6-36
Chapter 6: Configuration and alignment System menu
Software Upgrade page
Menu option:
System > Software Upgrade
(Figure 73).
Use this page to upgrade the unit to a new version of PTP 650 operational software.
Figure 73
Software Upgrade page
Caution
Ensure that the correct units are upgraded, as units cannot easily be downgraded
afterwards.
Caution
Software version must be the same at both ends of the link. Limited operation may
sometimes be possible with dissimilar software versions, but such operation is not
supported by Cambium Networks.
Caution
If the link is operational, upgrade the remote end of the link first, then upgrade the
local end. Otherwise, the remote end may not be accessible.
Preparation:
Go to the Cambium Support web page (see Contacting Cambium Networks on page 1) and
navigate to
Point-to-Point Software and Documentation
,
PTP 650 Series
.
If the support web page contains a later Software Version than that installed on the PTP 650
unit, perform the procedure below.
Page 6-37
Chapter 6: Configuration and alignment System menu
Procedure:
1
Save the system configuration
; see Save & Restore Configuration page on page 6-34.
2
On the Cambium Su
pport web page, select the latest PTP 650 software image (dld2 file) and
s
ave it to the local management PC.
3
On the Software Upgrade page, click
Browse
. Navigate to the folder containing the
downloaded software image and
click
Open
.
4
Click
Upload Software Image
. The Software Upgrade Confirmation page is displayed:
5
Click
Program Software Image into Non-Volatile Memor
y. The Progress Tracker page is
displayed. On completion, the
Software Upgrade Complete page is displayed:
6
Click
Reboot Wireless Unit
, then click
OK
to confirm. The unit reboots with the new software
installed.
7
Save the post
-upgrade system configuration; see Save & Restore Configuration page on page
6
-34.
Page 6-38
Chapter 6: Configuration and alignment Management menu
Management menu
This section describes how to configure web-based management of the PTP 650 unit.
Web-Based Management page
Menu option:
Management > Web
(Figure 74).
Use this page to configure web-based management of the unit.
Figure 74
Web-Based Management page
Page 6-39
Chapter 6: Configuration and alignment Management menu
Caution
If the HTTP, HTTPS, Telnet and SNMP interfaces are all disabled, then it will be
necessary to use the Recovery image to reset IP & Ethernet Configuration back to
defaults to re-enable the interfaces.
Note
The HTTP and Telnet interfaces should be disabled if the HTTPS interface is
configured. (Preparing for HTTPS/TLS page 6-75).
Procedure:
Review and update the attributes (Table 77).
To save changes, click
Submit Updated Configuration
.
Table 77
Web-Based Management attributes
Attribute
Meaning
HTTPS Access
Enabled
Only displayed when HTTPS is configured.
No:
The unit will not respond to any requests on the HTTPS port.
Yes:
The unit will respond to requests on the HTTPS port.
HTTPS Port Number Only displayed when HTTPS is configured. The port number for HTTPS
access. A value of zero means the wireless unit uses the default port.
HTTP Access
Enabled
No:
The unit will not respond to any requests on the HTTP port.
Yes:
The unit will respond to requests on the HTTP port.
Remote management via HTTPS is not affected by this setting.
HTTP Port Number The port number for HTTP access. A value of zero means the wireless
unit uses the default port.
Telnet Access
Enabled
No:
The unit will not respond to any requests on the Telnet port.
Yes:
The unit will respond to requests on the Telnet port.
Telnet Port Number The port number for Telnet access. A value of zero means the wireless
unit uses the default port.
Access Control Enables or disables access control to web-based management by
Internet Address.
Access Control
Internet Address
1/2/3
A list of up to three IPv4 or IPv6 Addresses permitted to perform web-
based management.
Only displayed when Access Control is set to
Enabled
.
Page 6-40
Chapter 6: Configuration and alignment Management menu
Attribute
Meaning
SNMP Control of
HTTP And Telnet
Disabled:
Neither HTTP nor Telnet can be controlled remotely via SNMP.
Enabled:
Both HTTP and Telnet can be controlled remotely via SNMP.
SNMP Control of
Passwords
Enabled:
Passwords for identity-based user accounts in the web-based
interface can be updated via SNMP. This option can be used together
with SNMPv3 to provide a secure means to update passwords from a
central network manager.
Disabled
: Passwords for identity-based user accounts can be updated
only via the web-based interface (default).
TFTP Client
Disabled:
The unit will not respond to any TFTP software download
requests.
Enabled:
Software can be downloaded via TFTP, as described in
Upgrading software using TFTP on page 6-96.
Debug Access
Enabled
Yes:
Cambium Technical Support is allowed to access the system to
investigate faults.
Cross Site Request
Forgery Protection
Enabled:
The system is protected against cross-site request forgery
attacks at the web-based interface.
Page 6-41
Chapter 6: Configuration and alignment Management menu
Local User Accounts page
Menu option:
Management > Web > Local User Accounts
.
The contents of this page depend upon the setting of Identity Based User Accounts:
Disabled
(Figure 75) or
Enabled
(Figure 76).
Use this page to ensure that user access to the web-based management interface is controlled in
accordance with the network operator’s security policy. The Identity Based User Accounts option
allows multiple users (from one to ten) to access the unit with one of three levels of access:
Security Officer, System Administrator and Read Only. If Identity Based User Accounts are
Enabled
, this procedure may only be performed by a Security Officer.
Note
Local User Account Names, Roles and Passwords are critical security parameters that
can be rest from the Zeroize CSPs page (Zeroize CSPs page on page 6-86
).
Figure 75
Local User Accounts page (Identity Based User Accounts disabled)
Page 6-42
Chapter 6: Configuration and alignment Management menu
Figure 76
Local User Accounts page (Identity Based User Accounts enabled)
Page 6-43
Chapter 6: Configuration and alignment Management menu
Procedure:
Choose whether to set Identity Based User Accounts to
Disabled
or
Enabled
.
Review and update the Local User Account Management attributes (Table 78).
If Identity Based User Accounts is set to
Enabled:
o Review and update the Password Complexity Configuration attributes (Table 79). To reset
all attributes to the best practice values, click
Set Best Practice Complexity
. To return to
default values, click
Set Default Complexity.
o Review and update up to 10 identity-based user accounts (Table 80).
If any attributes have been updated, click
Submit User Account Updates
.
Table 78
Local User Account Management attributes
Attribute
Meaning
Identity Based
User Accounts
Disabled
: Access to the web interface is controlled by a single system
administration password.
Enabled
: Up to 10 users may access the unit.
Auto Logout
Period
The time without user activity that elapses before a user is automatically
logged out (minutes). A value of zero disables this feature.
Minimum
Password
Change Period
The minimum time that elapses before a user is allowed to change a
password (minutes). A value of zero disables this feature.
Password Expiry
Period
The time that elapses before a password expires (days). A value of zero
disables this feature.
Maximum
Number of Login
Attempts
The maximum number of login attempts (with incorrect password) that are
allowed before a user is locked out.
Also, the maximum number of password change attempts before a user is
locked out.
Login Attempt
Lockout Action
Only displayed when Identity Based User Accounts is
Enabled
.
Timeout
: When a user is locked out, the user is allowed to log in again after
a specified period.
Disabled
: When a user is locked out, the user is disabled.
Login Attempt
Lockout Period
Only displayed when Identity Based User Accounts is
Disabled
.
The time that elapses before a locked out user is allowed to log in again
(minutes). Only displayed when Login Attempt Lockout Action is set to
Timeout
.
Webpage
Session Control
When this is enabled, any attempt to open a new tab or browser instance
will force the user to re-enter password.
Page 6-44
Chapter 6: Configuration and alignment Management menu
Attribute
Meaning
Password Expiry
Action
Only displayed when Identity Based User Accounts is
Enabled
.
The action to be taken by the PTP 650 when a password expires.
Table 79
Password Complexity Configuration attributes
Attribute
Meaning
Best
practice
Minimum Password
Length
The minimum number of characters required in
passwords.
10
Password Can
Contain User Name
No
: Passwords must not contain the user name.
Yes
: Passwords may contain the user name.
No
Minimum Mandatory
Characters
The minimum number of lowercase, uppercase, numeric
and special characters required in passwords.
For example, if all values are set to
2
, then
FredBloggs
will
be rejected, but
FredBloggs(25)
will be accepted.
2
Maximum Repeated
Characters
The maximum number of consecutive repeated alphabetic,
numeric and special characters permitted in passwords.
For example, if all values are set to
2
, then
aaa
,
XXX
,
999
and
$$$
will be rejected, but
aa
,
XX
,
99
or
$$
will be
accepted.
2
Maximum
Consecutive
Characters
The maximum number of consecutive lowercase,
uppercase and numeric characters permitted in passwords.
For example, if all values are set to
5
, then
ALFRED
,
neuman
and
834030
will be rejected.
5
Maximum Sequential
Characters
The maximum number of alphabetic and numeric
characters permitted in passwords.
For example, if set to
3
, then
abcd
,
WXYZ
and
0123
will be
rejected, but
abc
,
xyz
and
123
will be accepted.
3
Maximum Repeated
Pattern Length
The maximum sequence of characters that can be repeated
consecutively in passwords.
For example, if set to
3
, then
BlahBlah
and
31st31st
will be
rejected, but
TicTicTock
and
GeeGee
will be accepted.
Blah-Blah
will be accepted because the two sequences are
not consecutive.
3
Page 6-45
Chapter 6: Configuration and alignment Management menu
Attribute
Meaning
Best
practice
Match Reversed
Patterns
No
: Reversed patterns are not checked.
Yes
: Reversed patterns are checked.
For example, if Maximum Repeated Pattern Length is set to
3
and Match Reversed Patterns is set to
Yes
, then
AB1221BA
will be rejected.
Yes
Minimum Characters
That Must Change
The minimum number of password characters that must
change every time a password is updated.
4
Password Reuse
Permitted
: A user may reuse a previous password.
Prohibited
: A user must not reuse a previous password.
Prohibited
Special Characters User defined set of special characters used in password
construction. The only characters permitted in a password
are: (a-z), (A-Z), (0-9) and any of the special characters
entered here.
!"%&'()*+,-
./:;<=>?
Table 80
Identity-based user accounts attributes
Attribute
Meaning
Name Enter a user name.
Role Select a role from the list:
Security Officer, System Administrator
or
Read Only
.
Password Enter a password for the user. Passwords must comply with the
complexity rules (Table 79).
Password Confirm Retype the password to confirm.
Force Password
Change
Force this user to change their password when they next log on.
Disable Tick the box to disable a user account.
Note
At least one user must be assigned the Security Officer role. If RADIUS is enabled,
then this rule is relaxed, in which case the RADIUS server(s) SHOULD be configured
with at least one user with
Security Officer
privileges.
Page 6-46
Chapter 6: Configuration and alignment Management menu
RADIUS Configuration page
Menu option:
Management > Web > Radius Configuration
(Figure 77).
Use this page to configure RADIUS authentication. RADIUS authentication is only available when
PTP 650 is configured for Identity-based User Accounts and when RADIUS servers are connected
to the network.
Figure 77
RADIUS Configuration page
Note
Only users with
Security Officer
role are permitted to configure RADIUS authentication.
Note
When RADIUS is enabled, the Security Officer may disable all user accounts.
Page 6-47
Chapter 6: Configuration and alignment Management menu
Note
At least one user with Security Officer privileges must exist and be enabled, in order to
disable the RADIUS client.
Procedure:
Update the attributes (Table 81).
Click
Submit RADIUS Configuration
.
Table 81
RADIUS Authentication attributes
Attribute
Meaning
RADIUS Client
Enabled
Enabled:
PTP 650 users may be authenticated via the RADIUS servers.
Disabled
: RADIUS authentication is not used. This may only be selected
if at least one user with Security Officer privileges exists.
RADIUS Primary
Server
Specifies the primary server, determining the order in which the servers
are tried.
RADIUS Primary
Server Dead Time
Time (in minutes) to hold off trying to communicate with a previously
unavailable RADIUS server. Setting the value to zero disables the timer.
RADIUS Server
Retries
Number of times the PTP 650 will retry after a RADIUS server fails to
respond to an initial request.
RADIUS Server
Timeout
Time (in seconds) the PTP 650 will wait for a response from a RADIUS
server.
Authentication
Method
Method used by RADIUS to authenticate users.
Authentication Server 1 and 2:
RADIUS Server
Status
The status of the RADIUS server. This contains the time of the last test
and an indication of success or failure.
If the Authentication Server attributes are incorrect, the displayed status
is “
server config not valid
”.
RADIUS Server
Internet Address
IPv4 or IPv6 address of the RADIUS server.
RADIUS Server
Authentication Port
Network port used by RADIUS server for authentication services.
RADIUS Server
Shared Secret
Shared secret used in RADIUS server communications. May contain
alphabetic, numeric, special characters or spaces, but not extended
unicode characters. The maximum length is 127 characters.
Page 6-48
Chapter 6: Configuration and alignment Management menu
Attribute
Meaning
RADIUS Server
Shared Secret
Confirm
Shared secret confirmation.
Webpage Properties page
Menu option:
Management > Web > Web
Properties (Figure 78).
Use this page to control the display of the web interface.
Figure 78
Webpage Properties page
Procedure:
Update the attributes (Table 82).
Click Apply Properties.
Page 6-49
Chapter 6: Configuration and alignment Management menu
Table 82
Webpage Properties attributes
Attribute
Meaning
Web Properties
View Summary and Status pages without login
:
If ticked (the default setting), users can view the Summary and
Status web pages without entering a password.
If not ticked, users must enter a password before viewing the
Summary and Status pages. This is only effective if the System
Administration Password has been set, see Change Password page
on page 7-10.
Distance Units
Metric:
Distances are displayed in kilometers or meters.
Imperial:
Distances are displayed in miles or feet.
Use Long Integer
Comma Formatting
Disabled:
Long integers are displayed thus: 1234567.
Enabled:
Long integers are displayed thus: 1,234,567.
Popup Help
Disabled:
Web page popup help is not displayed.
Enabled:
Web page popup help is displayed.
Send HTTPS Close
Notify Alerts
Only displayed when HTTPS is configured.
Controls whether or not the HTTPS server sends TLS Close Notify
Alerts before it shuts down each socket.
Disabled
: TLS Close Notify Alerts are not sent before closing each
socket. This is the default because these alerts can cause problems with
some browsers (e.g. Internet Explorer)
Enabled
: TLS Close Notify Alerts are sent before closing each socket.
Auto Logout Period Only displayed if role-based user accounts are in use.
Automatic logout period in minutes. If there is no user activity within
this time, the user is required to log in again. Think this is only
displayed when not using identity based user accounts.
Browser Title By default, the PTP 650 web interface displays the following text in web
browser tab titles:
Cambium PTP 50650 - <current page> (IP=<ipAddress>)
To change the default text, enter simple text and optional variables
(prefixed with a $ character). The full list of variables is in Table 83.
Page 6-50
Chapter 6: Configuration and alignment Management menu
Table 83
Browser Title attribute variables
Variable
Meaning
$siteName Site Name, as set in the System Configuration page (Table 71).
$linkName Link Name, as set in the System Configuration page (Table 71).
$masterSlaveMode Master Slave Mode, as set in the Step 2: Wireless Configuration
page (Table 70).
$ipAddress IP Address currently used to identify the ODU, either IPv4 or IPv6
Address, depending upon the setting of IP Address Label in the
System Configuration page (Table 71):
IPv4
: $ipAddress = $ipv4Address
IPv6
: $ipAddress = $ipv6Address (if not blank) or
$ipv6LinkLocalAddress
$ipv4Address IPv4 Address of the ODU, as set in the LAN Configuration page
(Table 72).
$ipv6Address IPv6 Address of the ODU, as set in the LAN Configuration page
(Table 72).
$ipv6LinkLocalAddress IPv6 Auto Configured Link Local Address of the ODU. This cannot
be updated, but it can be viewed in the LAN Configuration page
(Table 72).
$sysName Sys Name for this SNMP managed node, as set in the Step 2:
SNMP MIB-II System Objects page (Table 89).
$productName The product variant, for example
Cambium PTP50650
. Not
updateable.
$pageName Name of the page currently being browsed.
Page 6-51
Chapter 6: Configuration and alignment Management menu
Email Configuration page
Menu option:
Management
>
Email
(Figure 79). Use this page to enable the PTP 650 to generate
Simple Mail Transfer Protocol (SMTP) email messages to notify the system administrator when
certain events occur.
Figure 79
Email Configuration page
Procedure:
Update the attributes (Table 84).
Click
Submit Updated Configuration
. The Configuration Change Reboot dialog is displayed.
Click
Reboot Wireless Unit
and click
OK
. The reboot progress message is displayed. On
completion, the unit restarts.
Page 6-52
Chapter 6: Configuration and alignment Management menu
Table 84
Email Configuration attributes
Attribute
Meaning
SMTP Email Alert Controls the activation of the SMTP client.
SMTP Enabled
Messages
The SMTP Enabled Messages attribute controls which email alerts the
unit will send.
SMTP Server
Internet Address
The IPv4 or IPv6 Address of the networked SMTP server.
SMTP Server Port
Number
The SMTP Port Number is the port number used by the networked
SMTP server. By convention the default value for the port number is 25.
SMTP Source Email
Address
The email address used by the PTP 650 Series to log into the SMTP
server. This must be a valid email address that will be accepted by your
SMTP Server.
SMTP Destination
Email Address
The email address to which the PTP 650 Series will send the alert
messages.
Send SMTP Test
Email
Generate and send an email in order to test the SMTP settings. The tick
box will self-clear when
Submit
is clicked.
Page 6-53
Chapter 6: Configuration and alignment Management menu
Diagnostic Alarms page
Menu option:
Management
>
Diagnostic Alarms
(Figure 80).
Use this page to select which diagnostic alarms will be notified to the system administrator.
Figure 80
Diagnostic Alarms page
Page 6-54
Chapter 6: Configuration and alignment Management menu
Procedure:
Tick the required alarms. These alarms are described in Alarms on page 7-12.
Click
Submit Updated Configuration
.
Time Configuration page
Menu option:
Management > Time
(Figure 81 and Figure 82)
Use this page to set the real-time clock of the PTP 650.
Figure 81
Time Configuration page (SNTP disabled)
Page 6-55
Chapter 6: Configuration and alignment Management menu
Figure 82
Time Configuration page (SNTP enabled)
Page 6-56
Chapter 6: Configuration and alignment Management menu
Setting the real-time clock manually
Use this procedure to keep time without connecting to a networked time server.
Note
If SNTP is disabled, it will be necessary to reset the time manually after each system
reboot.
Procedure:
Set SNTP State to
Disabled
.
Review and update the manual clock attributes (Table 85).
Click
Submit Updated Configuration
.
Table 85
Manual clock attributes
Attribute
Meaning
SNTP State
Disabled:
the PTP 650 will keep time without connecting to a networked
time server.
Set Time Set hours, minutes and seconds.
Set Date Set year, month and day.
Time Zone Set the time zone offset from Greenwich Mean Time (GMT).
To set the clock to UTC time, set Time Zone to
GMT 00.00
.
Daylight Saving
Disabled:
There is no offset for daylight saving time.
Enabled:
System clock is moved forward one hour to adjust for daylight
saving time.
To set the clock to UTC time, set Daylight Saving to
Disabled
.
Setting the real-time clock to synchronize using SNTP
Use this procedure to synchronize the unit with a networked time server:
Procedure:
Set the SNTP State attribute to
Enabled
.
Review and update the SNTP clock attributes (Table 86).
Click
Submit Updated Configuration
.
Page 6-57
Chapter 6: Configuration and alignment Management menu
Table 86
SNTP clock attributes
Attribute
Meaning
SNTP State
Enabled:
the ODU will obtain accurate date and time updates from a
networked time server.
SNTP Primary Server Specifies the primary SNTP server, determining the order in which the
servers are tried.
SNTP Primary Server
Dead Time
Time (in seconds) to wait before retrying communications with an
unresponsive primary SNTP server. Setting the value to zero disables
the timer.
SNTP Server Retries Number of times the PTP will retry after an SNTP server fails to
respond.
SNTP Server
Timeout
Time (in seconds) the PTP will wait for a response from an SNTP
server.
SNTP Poll Interval The SNTP server polling interval.
SNTP Server 1 and 2:
SNTP Server Status Status message reflecting the state of communications with the SNTP
server.
SNTP Server Internet
Address
The IPv4 or IPv6 Address of the networked SNTP server.
SNTP Server Port
Number
The port number of the networked SNTP server. By convention the
default value for the port number is 123.
SNTP Server
Authentication
Protocol
Authentication protocol to be used with this SNTP server (
None
or
MD5
).
SNTP Server Key
Identifier
SNTP key identifier.
A key of zeros is reserved for testing.
Server Key Key used to authenticate SNTP communications.
Server Key Confirm Must match the Server Key.
Status:
SNTP Sync This shows the current status of SNTP synchronization. If
No Sync
is
displayed, then review the SNTP Server Internet Address and Port
Number. A change of state may generate an SNMP trap or SMTP email
alert.
SNTP Last Sync This shows the date and time of the last SNTP synchronization.
Page 6-58
Chapter 6: Configuration and alignment Management menu
Attribute
Meaning
System Clock This displays the local time, allowing for the Time Zone and Daylight
Saving settings.
Local Time Settings:
Time Zone Set the time zone offset from Greenwich Mean Time (GMT).
To set the clock to UTC time, set Time Zone to
GMT 00.00
.
Daylight Saving
Disabled:
Daylight saving adjustments will not be applied to the time.
Enabled:
Daylight saving adjustments will be applied to the time,
according to local rules.
To set the clock to UTC time, set Daylight Saving to
Disabled
.
Syslog Configuration page
Menu option:
Management
>
Syslog
>
Syslog configuration
(Figure 83).
Use this page to configure system logging. Only users with
Security Officer
role are permitted to
configure the syslog client.
Figure 83
Syslog Configuration page
Page 6-59
Chapter 6: Configuration and alignment Management menu
Note
To record Coordinated Universal Time (UTC time) in syslog messages, use the Time
Configuration page to set Time Zone to
GMT 00.00
and Daylight Saving to
Disabled
(Time Configuration page on page 6-55).
Procedure:
Update the attributes (Table 87).
Click
Submit Updated Configuration
.
Table 87
Syslog Configuration attributes
Attribute
Meaning
Syslog State When system logging is enabled, log entries are added to the internal
log and (optionally) transmitted as UDP messages to one or two syslog
servers.
Syslog Client
Enabled:
Event messages are logged.
Disabled:
Event messages are not logged.
Syslog Client Port The client port from which syslog messages are sent.
Syslog Server 1 and 2:
Syslog Server
Internet Address
The IPv4 or IPv6 Address of the syslog server.
Delete the IP address to disable logging on the syslog server.
Syslog Server Port The server port at which syslog messages are received.
Page 6-60
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
SNMP pages (for SNMPv3)
This section describes how to configure Simple Network Management Protocol version 3
(SNMPv3) traps using the SNMP Wizard.
Current SNMP Summary (for SNMPv3)
Menu option:
Management > SNMP
(Figure 84).
Use this page to review the current SNMP configuration and start the SNMP Wizard.
Figure 84
Current SNMP Summary page (when SNMP is disabled)
Procedure:
Review the summary.
If any updates are required, click
Continue to SNMP Wizard
.
Page 6-61
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Step 1: SNMP Configuration (for SNMPv3)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 85).
Use this page to enable SNMP, select SNMPv3 and configure access to the SNMP server.
Figure 85
Step 1: SNMP Configuration page (for SNMPv3)
Procedure:
Set SNMP State to
Enabled
.
Set SNMP Version to
v3
. The page is redisplayed with SNMPv3 attributes.
Update the attributes (Table 88).
Click
Next
.
Page 6-62
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Table 88
Step 1: SNMP Configuration attributes (for SNMPv3)
Attribute
Meaning
SNMP Minimum
Privilege Level
Minimum security level which is permitted to administer SNMP security
settings.
Only displayed when Identity Based User Accounts are
Enabled
on the
User Accounts page (Table 78).
SNMP State Enables or disables SNMP.
SNMP Access
Control
Enables or disables access control to SNMP management by IP
address.
SNMP Access
Control Internet
Address 1/2/3
A list of up to three IPv4 or IPv6 Addresses permitted to perform SNMP
management.
Only displayed when SNMP Access Control is set to
Enabled
.
SNMP Version SNMP protocol version:
v1/2c
or
v3
.
SNMP Security
Mode
MIB-based
: SNMPv3 security parameters are managed via SNMP MIBs.
Web-based
: SNMPv3 security parameters are not available over SNMP,
but instead are configured using the SNMP Accounts page, as
described in Step 3: SNMP User Policy Configuration (for SNMPv3) on
page 6-65.
SNMP Engine ID
Format
Specifies whether the Engine ID is generated from the
MAC Address
,
IP4 Address
,
Text String
or
IPv6 Address
.
SNMP Engine ID
Text
Only enabled when SNMP Engine ID Format is set to
Text String
. Text
used to generate the SNMP Engine ID.
SNMP Port Number The port that the SNMP agent is listening to for commands from a
management system.
Page 6-63
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Step 2: SNMP MIB-II System Objects (for SNMPv3)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 86).
Use this page to enter details of the SNMP managed node.
Figure 86
Step 2: SNMP MIB-II System Objects
page (for SNMPv3)
Procedure:
Update the attributes (Table 89).
Click
Next
.
The next step depends upon which SNMP Security Mode was selected in the Step 1: SNMP
Configuration page:
o If
Web-based
, go to Step 3: SNMP User Policy Configuration (for SNMPv3) on page 6-65.
o If
MIB-based
, go to Confirm SNMP Configuration (for SNMPv3) on page 6-70.
Table 89
Step 2: SNMP MIB-II System Objects attributes (for SNMPv3)
Attribute
Meaning
Sys Contact The name of the contact person for this managed node, together with
information on how to contact this person.
Sys Name An administratively-assigned name for this managed node. By
convention, this is the fully qualified domain name of the node.
Sys Location The physical location of this node, for example
Telephone closet, 3rd
floor
.
Page 6-64
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Step 3: SNMP User Policy Configuration (for SNMPv3)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 87).
This page is only displayed when SNMP Security Mode is set to
Web-based
in the Step 1: SNMP
Configuration page. Use this page to configure which authentication and privacy protocols are
required for SNMP users with roles
System administrator
and
Read only
.
Procedure:
Update the attributes (Table 90).
Click
Next
.
Figure 87
Step 3: SNMP User Policy Configuration page (for SNMPv3)
Table 90
Step 3: SNMP User Policy Configuration attributes (for SNMPv3)
Attribute
Meaning
Security Level Defines the security level and associated protocols that are required to
allow SNMP users to access the PTP 650.
No Auth No Priv
: Users are not required to use authentication or
privacy protocols.
Auth No Priv
: Users are required to use only authentication protocols.
Auth Priv
: Users are required to use both authentication and privacy
protocols.
Page 6-65
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Attribute
Meaning
Authentication
Protocol
The authentication protocol to be used to access the PTP 650 via SNMP.
This is disabled when Security Level is set to
Auth No Priv
.
MD5
: Message Digest Algorithm is used.
SHA
: NIST FIPS 180-1, Secure Hash Algorithm SHA-1 is used.
Privacy Protocol The privacy protocol to be used to access the PTP 650 via SNMP. This is
disabled when Security Level is set to
No Auth No Priv
or
Auth No Priv
.
DES
: Data Encryption Standard (DES) symmetric encryption protocol.
AES
: Advanced Encryption Standard (AES) cipher algorithm.
Note
A user configured to use AES privacy protocol will not be able to transmit and receive
encrypted messages unless the license key enables the AES capability.
Page 6-66
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Step 4: SNMP User Accounts Configuration (for SNMPv3)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 88).
This page is only displayed when SNMP Security Mode is set to
Web-based
in the Step 1: SNMP
Configuration page. Use this page to update the SNMP user accounts.
Figure 88
Step 4: SNMP User Accounts Configuration page (for SNMPv3)
Procedure:
Update the individual user attributes (Table 91) for up to 10 SNMP users.
Click
Next
.
Table 91
Step 4: SNMP User Accounts Configuration attributes (for SNMPv3)
Attribute
Meaning
Name Name to be used by the SNMP user to access the system.
Role Selects which of the two web-based security profiles are applied to this
user:
System administrator
or
Read only
.
Select
Disabled
to disable the SNMP account.
Auth/Priv Indicates whether the Passphrase applies to authentication or privacy
protocols.
Page 6-67
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Attribute
Meaning
Passphrase The phrase to be entered by this SNMP user to access the system using
an authentication or privacy protocol. Length must be between 8 and 32
characters. May contain spaces.
The Auth Passphrase is hidden when Security Level for this user’s Role
is set to
No Auth No Priv
.
The Priv Passphrase is hidden when Security Level for this user’s Role is
set to
No Auth No Priv
or
Auth No Priv
.
Passphrase Confirm Passphrase must be reentered to confirm it has been correctly typed.
Page 6-68
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Step 5: SNMP Trap Configuration (for SNMPv3)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 89).
This page is only displayed when SNMP Security Mode is set to
Web-based
in the Step 1: SNMP
Configuration page. Use this page to configure the events that will generate SNMP traps and to set
up trap receivers.
Figure 89
Step 5: SNMP Trap Configuration page (for SNMPv3)
Procedure:
Update the attributes (Table 92).
Click
Next
.
Page 6-69
Chapter 6: Configuration and alignment SNMP pages (for SNMPv3)
Table 92
Step 5: SNMP Trap Configuration attributes (for SNMPv3)
Attribute
Meaning
SNMP Enabled Traps Select the events that will generate SNMP traps.
SNMP Trap Receiver 1 and SNMP Trap Receiver 2:
SNMP Trap Receiver
Enabled
Disabled
: SNMP traps are not sent to the corresponding SNMP
Trap Receiver (1 or 2).
Enabled
: SNMP traps are sent to the corresponding SNMP Trap
Receiver (1 or 2).
SNMP Trap Internet
Address
The IPv4 or IPv6 Address of the SNMP server (trap receiver). This is
normally the network management system, but it may be a
separate trap receiver.
SNMP Trap Port Number The server port at which SNMP traps are received.
SNMP Trap User Account The user name (and associated protocols) to use when sending
SNMP traps to the server.
Confirm SNMP Configuration (for SNMPv3)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 90).
Use this page to review and confirm the updated SNMPv3 configuration of the unit.
Figure 90
Confirm SNMP Configuration page (for SNMPv3) (top and bottom of page shown)
Procedure:
To ensure that the changes take effect, click
Confirm SNMP Configuration and Reboot
. The unit
reboots and the changes take effect.
Page 6-70
Chapter 6: Configuration and alignment SNMP pages (for SNMPv1/2c)
SNMP pages (for SNMPv1/2c)
This section describes how to configure Simple Network Management Protocol version 1 or 2c
(SNMPv1 or SNMPv2c) traps using the SNMP Wizard.
Current SNMP Summary (for SNMPv1/2c)
Menu option:
Management > SNMP
(Figure 84).
Use this page to review the current SNMP configuration and start the SNMP Wizard.
Procedure:
Review the summary.
If any updates are required, click
Continue to SNMP Wizard
.
Step 1: SNMP Configuration (for SNMPv1/2c)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 91).
Use this page to enable SNMP, select SNMPv1/2c and configure access to the SNMP server.
Figure 91
Step 1: SNMP Configuration page (for SNMPv1/2c)
Page 6-71
Chapter 6: Configuration and alignment SNMP pages (for SNMPv1/2c)
Procedure:
Set SNMP State to
Enabled
.
Set SNMP Version to
v1/2c
. The page is redisplayed with SNMPv1/2c attributes.
Update the attributes (Table 93).
Click
Next
.
Table 93
Step 1: SNMP Configuration attributes (for SNMPv1/2c)
Attribute
Meaning
SNMP Minimum
Privilege Level
Minimum security level which is permitted to administer SNMP security
settings.
Only displayed when Identity Based User Accounts are
Enabled
on the
User Accounts page (Table 78).
SNMP State Enables or disables SNMP.
SNMP Access
Control
Enables or disables access control to SNMP management by IP address.
SNMP Access
Control Internet
Address 1/2/3
A list of up to three IPv4 or IPv6 Addresses permitted to perform SNMP
management.
Only displayed when SNMP Access Control is set to
Enabled
.
SNMP Version SNMP protocol version:
v1/2c
or
v3
.
SNMP Community
String
The SNMP community string acts like a password between the network
management system and the distributed SNMP clients (PTP 650 ODUs).
Only if the community string is configured correctly on all SNMP entities
can the flow of management information take place. By convention the
default value is set to
public
.
SNMP Port Number Enter the port that the SNMP agent is listening to for commands from a
management system.
Step 2: SNMP MIB-II System Objects (for SNMPv1/2c)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 86). Use this page to enter
details of the SNMP managed node. Update the attributes (Table 89) and click
Next
.
Page 6-72
Chapter 6: Configuration and alignment SNMP pages (for SNMPv1/2c)
Step 3: SNMP Trap Configuration (for SNMPv1/2c)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 92).
Figure 92
Step 3: SNMP Trap Configuration page (for SNMPv1/2c)
Procedure:
Update the attributes (Table 94).
Click
Next
.
Page 6-73
Chapter 6: Configuration and alignment SNMP pages (for SNMPv1/2c)
Table 94
Step 3: SNMP Trap Configuration attributes (for SNMPv1/2c)
Attribute
Meaning
SNMP Trap Version Select the SNMP protocol version to use for SNMP traps:
v1
or
v2c
.
SNMP Enabled
Traps
Select the events that will generate SNMP traps.
SNMP Trap
Receiver Enabled
Disabled
: SNMP traps are not sent to the corresponding SNMP Trap
Receiver (1 or 2).
Enabled
: SNMP traps are sent to the corresponding SNMP Trap Receiver
(1 or 2).
SNMP Trap Internet
Address
The IPv4 or IPv6 Address of the SNMP server (trap receiver). This is
normally the network management system, but it may be a separate trap
receiver.
SNMP Trap Port
Number
The server port at which SNMP traps are received.
Confirm SNMP Configuration (for SNMPv1/2c)
Menu option:
Management > SNMP
. Part of the SNMP Wizard (Figure 93).
Use this page to review and confirm the updated SNMPv1/2c configuration of the unit.
Figure 93
Confirm SNMP Configuration page (for SNMPv1/2c) (top and bottom of page shown)
Procedure:
To ensure that the changes take effect, click
Confirm SNMP Configuration and Reboot
. The unit
reboots and the changes take effect.
Page 6-74
Chapter 6: Configuration and alignment Security menu
Security menu
This section describes how to configure HTTPS/TLS security using the Security Wizard.
Caution
Ensure that the operator’s security requirements are configured before connecting the
PTP 650 to the network. Otherwise, security may be compromised.
Preparing for HTTPS/TLS
Before running the Security Configuration Wizard, obtain the necessary cryptographic material and
ensure that the unit has AES capability. For more information, refer to Planning for HTTPS/TLS
operation on page 3-33.
Procedure:
1
Ensure that the following cryptographic material has been generated:
Key Of Keys
TLS Private Key and Public Certificates (for the correct IP address)
User Defined Security Banner
Random Number Entropy Input
2
Order the necessary AES capability upgrade, generate a license key and enter it on the
Software License Key page (Software License Key page on page 6-12).
3
Identify the Port numbers for HTTPS, HTTP and Telnet.
4
Ensure that the web browsers used are enabled for HTTPS/TLS operation.
5
On the Local User Accounts page (Local User Accounts page on page 6-42), check that:
Either: Identity Based User Accounts are set to
Disabled
,
Or: Identity Based User Accounts are set to
Enabled
and the current user's role is
Security Officer
.
Page 6-75
Chapter 6: Configuration and alignment Security menu
Security Configuration Wizard page
Menu option:
Security
. Displayed only when AES encryption is enabled by license key (Figure 94).
Use this page to review the current security configuration of the unit.
Figure 94
Security Configuration Wizard page
Procedure:
To continue with the Security Wizard, click
Continue to Security Wizard
.
Page 6-76
Chapter 6: Configuration and alignment Security menu
Step 1: Enter Key of Keys
Menu option:
Security
. Part of the Security Wizard (Figure 95).
Use this page to enter a Key of Keys to encrypt all critical security parameters (CSPs) before they
are stored in non-volatile memory.
Figure 95
Step 1: Enter Key of Keys page
Caution
Erasing or changing the key of keys erases all CSPs.
Procedure:
Enter and confirm the generated Key of Keys.
Click
Next
.
Page 6-77
Chapter 6: Configuration and alignment Security menu
Step 2: Enter TLS Private Key and Public Certificate
Menu option:
Security
. Part of the Security Wizard (Figure 96).
Use this page to select and upload the TLS Private Key and Public Certificate files.
Figure 96
Step 2: Enter TLS Private Key and Public Certificate page
Caution
If the certificates expire, the unit will be unreachable. If this occurs, put the unit into
recovery mode and erase all configuration settings. For more information, refer to
Recovery mode on page 7-44.
Procedure:
If a valid TLS private key exists, then an SHA-1 thumbprint of the key is displayed. If this key is
correct, then take no action. Otherwise, click
Browse
and select the generated private key file
(.der).
If a valid TLS public certificate exists, then an SHA-1 thumbprint of the certificate is displayed.
If this certificate is correct, then take no action. Otherwise, click
Browse
and select the
generated certificate file (.der).
Click
Next.
Page 6-78
Chapter 6: Configuration and alignment Security menu
Step 3: Enter User Security Banner
Menu option:
Security
. Part of the Security Wizard (Figure 97).
Use this page to enter a banner that will be displayed every time a user attempts to login to the
wireless unit.
Figure 97
Step 3: Enter User Security Banner page
Procedure:
Update the User Defined Security Banner (optional).
Set the Acknowledgement to
No
or
Yes
.
Click
Next
.
Page 6-79
Chapter 6: Configuration and alignment Security menu
Step 4: Enter Login Information Settings
Menu option:
Security
. Part of the Security Wizard (Figure 98).
Use this page to choose whether or not to display information about previous login attempts when
the user logs into the web interface.
Figure 98
Step 4: Enter Login Information Settings page
Procedure:
Set Display Login Information to
No
or
Yes
.
Click
Next
.
Page 6-80
Chapter 6: Configuration and alignment Security menu
Step 5: Enter Random Number Entropy Input
Menu option:
Security
. Part of the Security Wizard (Figure 99).
Use this page to enter entropy input to seed the internal random number algorithm.
Figure 99
Step 5: Random Number Entropy Input page
Procedure:
If valid entropy input exists, then an SHA-1 thumbprint of the input is displayed. If this input is
correct, then take no action. Otherwise, enter the generated input in the Entropy Input and
Confirm Entropy Input fields.
Click
Next
.
Page 6-81
Chapter 6: Configuration and alignment Security menu
Step 6: Enter Wireless Link Encryption Key
Menu option:
Security
. Part of the Security Wizard (Figure 100).
Use this page to enable AES encryption and enter the encryption key. The wireless link encryption
key is used to encrypt all traffic over the PTP 650 wireless link.
Figure 100
Step 6: Enter Wireless Link Encryption Key page
Procedure:
Select the applicable value in the Encryption Algorithm field. If a valid encryption key exists,
then an SHA-1 thumbprint of the key is displayed. If this key is correct, then take no action.
Otherwise, enter the generated key in the Wireless Link Encryption Key and Confirm Wireless
Link Encryption Key fields.
Click
Next
.
Page 6-82
Chapter 6: Configuration and alignment Security menu
Step 7: Enter HTTP and Telnet Settings
Menu option:
Security
. Part of the Security Wizard (Figure 101).
Use this page to configure network management of the PTP 650 using one or more of the
following methods: HTTPS, HTTP, Telnet or SNMP.
Figure 101
Step 7: Enter HTTP and Telnet Settings page
Caution
If HTTPS, HTTP, Telnet and SNMP are all disabled, management access will be
impossible until the unit is placed in recovery mode.
Page 6-83
Chapter 6: Configuration and alignment Security menu
Note
If HTTP, Telnet and SNMP are all disabled, the secure web server becomes the only
management tool for the ODU web interface. To reenter the web interface after Step 7
of the Security Wizard, use the URL
https://aa.bb.cc.dd
(where aa.bb.cc.dd is the IP
address of the unit). Enclose the IPv6 address in the URL in square brackets.
Procedure:
Review and update the HTTP and Telnet attributes (Table 95) and click
Next
.
Table 95
HTTP and Telnet attributes
Attribute
Meaning
HTTPS Port Number The port number for HTTPS access. Zero means use the default port.
HTTP Access
Enabled
No
: The unit will not respond to any requests on the HTTP port.
Yes
: The unit will respond to requests on the HTTP port.
Remote management via HTTPS is not affected by this setting.
HTTP Port Number The port number for HTTP access. Zero means use the default port.
Telnet Access
Enabled
No
: The unit will not respond to any requests on the Telnet port.
Yes
: The unit will respond to requests on the Telnet port.
Telnet Port Number The port number for Telnet access. Zero means use the default port.
SNMP Control of
HTTP And Telnet
Disabled
: Neither HTTP nor Telnet can be controlled remotely via
SNMP.
Enabled
: Both HTTP and Telnet can be controlled remotely via SNMP.
SNMP Control of
Passwords
Enabled:
Passwords for identity-based user accounts in the web-based
interface can be updated via SNMP. Use this with SNMPv3 to provide
secure password updating from a central network manager.
Disabled
: Passwords for identity-based user accounts can be updated
only via the web-based interface (default).
TFTP Client
Enabled
: The unit will respond to TFTP software download requests.
Debug Access
Enabled
Yes
: Cambium Technical Support is allowed to access the system to
investigate faults.
Cross Site Request
Forgery Protection
Enabled
: The system is protected against cross-site request forgery
attacks at the web-based interface.
Page 6-84
Chapter 6: Configuration and alignment Security menu
Step 8: Commit Security Configuration
Menu option:
Security
. Part of the Security Wizard (Figure 102).
Use this page to review and confirm the updated security configuration of the unit.
Figure 102
Step 8: Commit Security Configuration page
Page 6-85
Chapter 6: Configuration and alignment Security menu
Procedure:
Review all changes that have been made in the Security Wizard.
To ensure that the changes take effect, click
Commit Security Configuration and Reboot
. The
unit reboots and the changes take effect.
Note
If the Key of keys is entered or modified in the Security Wizard, user accounts are
reset when
Commit Security Configuration and Reboot
is clicked. It is then necessary
to reconfigure them.
Zeroize CSPs page
Menu option:
Security
>
Zeroize CSPs
(Figure 103).
Use this page if it is necessary to zeroize Critical security parameters (CSPs).
Figure 103
Zeroize CSPs page
Procedure:
Click
Zeroize CSPs and Reboot Wireless Unit
.
Confirm the reboot.
Page 6-86
Chapter 6: Configuration and alignment Aligning antennas
Aligning antennas
This section describes how to align the antennas in a PTP 650 link, use the web interface to assist
with alignment, and check wireless performance after alignment.
Before performing this task, check that hardware installation is complete (apart from the network
connections) at both the Master and Slave sites.
Starting up the units
Use this procedure to connect one of the units to a management PC and start up both units.
Procedure:
1
Select the unit from which this process is to be controlled; either Master or Slave. This is the
localunit.
2
Check that the management PC is connected to the local unit, powered up and logged on as
described in Connecting to the unit on page 6-5.
4
Power up the remote unit.
5
Log into the local unit as described in Logging into the web interface on page 6-7.
Checking that the units are armed
Use this procedure to confirm that the units are in the armed state, ready for alignment.
In the armed state, the modulation mode is fixed at BPSK 0.63 Single, the TDD frame duration is
extended to allow the link to acquire at unknown range, and the transmit power is automatically
adjusted for optimum operation.
Procedure:
Select menu option
Home
. The System Summary page is displayed.
Check that the Install Arm State is set to
Armed
.
If the units are not armed, execute the installation wizard as described in Installation menu on
page 6-10.
Page 6-87
Chapter 6: Configuration and alignment Aligning antennas
Aligning antennas
Use this procedure to align linked antennas (master and slave), whether integrated or
connectorized. The goal of antenna alignment is to find the center of the main beam. This is done
by adjusting the antennas while monitoring the receive signal level.
Preparation:
Ensure that the following parameters are available:
Location of both sites (latitude and longitude).
Bearing to the other end of the link for both sites.
Prediction of receive signal level for both ends of the link.
Prediction of link loss.
PTP LINKPlanner provides all of these parameters in the form of an installation report.
If a connectorized ODU is installed at either site with two separate antennas for spatial diversity,
refer to Aligning separate antennas for spatial diversity on page 6-89 before starting alignment.
Note
For improved radio performance, mount the integrated ODU at 45 degrees to the
vertical, as shown in Installing the ODU and top LPU on page 5-5.
To achieve best results, make small incremental changes to elevation and azimuth.
Caution
The action of tightening the mounting bolts can alter antenna alignment. This can be
helpful when fine-tuning alignment, but it can also lead to misalignment. To prevent
misalignment, continue to monitor receive signal level during final tightening of the
bolts.
Procedure:
1
At each end of the link, adjust the antenna to point at the other end of the link. This should be
done with the aid of a compass.
2
Without moving the mas
ter antenna, adjust the elevation and azimuth of the slave antenna to
achieve the
highest receive signal level using one of the following methods:
ODU installation tones on page 6-90
Graphical Install page on page 6-92
3
Without moving the Slave antenna, adjust the elevation and azimuth of the Master antenna to
achieve the
highest receive signal level (using one of the above methods).
4
Repeat steps 2 and 3 as necessary to fine
-tune the alignment to find the center of the beam.
Page 6-88
Chapter 6: Configuration and alignment Aligning antennas
5
When the antennas have been aligned on the center of the beam, verify that the receive level
is within the predicted range (from the ins
tallation report). If this is not the case, go back to
step 2.
The current value of receive level can be verified by using the graphical installation method
(see
Graphical Install page on page 6-92) or by selecting menu option
Status
and monitoring
the Receive Power attribute on the System Status page.
6
If after repeated attempts to align, the receive level still does not lie within the predicted
range, this may be because the data provided to the prediction tool (such as PTP LINKPlanner)
is inaccurate. For example estimates of path obstructions, antenna heights or site locations
may be inaccurate. Check this data and update the prediction as necessary.
7
Once the antennas have been a
ligned correctly, tighten the integrated ODU (or connectorized
antenna) mountings. To ensure that the action of tightening does not alter antenna alignment,
continue to monitor received signal level.
Aligning separate antennas for spatial diversity
Use this procedure if a connectorized ODU is installed at either site with two separate antennas for
spatial diversity.
Procedure:
1
Connect the horizontal polarization antenna to the ODU, disconnect the vertical polarization
antenna, then perform Aligning antennas on page 6-88.
2
Connect the vertical polarization antenna to the ODU, disconnect the horizontal polarization
antenna, then perform Aligning antennas on page 6-88.
3
Re-connect the horizontal polarization antennas. The received signal level should increase.
4
Weatherproof the antenna connections at the “H” and “V” interfaces of the ODUs, as
described in Weatherproofing an N type connector on page 5-37.
Page 6-89
Chapter 6: Configuration and alignment Aligning antennas
ODU installation tones
This is the first of two methods that may be used to monitor receive signal level during antenna
alignment.
The ODU emits audible tones during installation to assist with alignment. The pitch of the
alignment tone is proportional to the received power of the wireless signals. Adjust the alignment
of the unit in both azimuth and elevation until the highest pitch tone is achieved.
Note
When using ODU installation tones to align connectorized antennas, it may not be
possible to hear the tones. To overcome this problem, either use an assistant, or use a
stethoscope to give a longer reach.
The tones and their meanings are described in Table 96. In each of the states detailed in the table,
align the unit to give the highest pitch tone. The term wanted signalrefers to that of the peer
unit being installed.
Table 96
ODU installation tones
State Name
Tone Description
State Description
Pitch Indication
Free Channel
Search
Regular beep Executing band scan N/A
Scanning Slow broken tone Not demodulating the wanted signal Rx Power
Synchronized Fast broken tone Demodulating the wanted signal Rx Power
Registered Solid tone Both Master and Slave units
exchanging Radio layer MAC
management messages
Rx Power
Caution
If, when in the Synchronized or Registered state, the tone varies wildly, there may be
interference or a fast fading link. Installing in this situation may not give a reliable link.
Investigate the cause of the problem.
Page 6-90
Chapter 6: Configuration and alignment Aligning antennas
During alignment, the installation tones should exhibit the following behavior:
Band scan:
When first started up and from time to time, the Master unit will carry out a band
scan to determine which channels are not in use. During this time, between 10 and 15 seconds,
the Master unit will not transmit and as a consequence of this neither will the Slave unit.
During this time the installation tone on the master unit will drop back to the band scan state,
and the Slave unit will drop back to the Scanning state with the pitch of the tone set to the
background noise level. Alignment of the unit should cease during this time.
Radar detection:
If the unit is operating where mandatory radar avoidance algorithms are
implemented, the ranging behavior may be affected. The Master has to monitor the initially
chosen channel for 60 seconds to make sure it is clear of radar signals before transmitting. If a
radar signal is detected during any of the installation phases, a further compulsory 60 seconds
channel scan will take place as the master unit attempts to locate a new channel that is free of
radar interference.
Ranging:
The PTP 650 Series does not require the user to enter the link range. The Master unit
typically takes less than 60 seconds to determine the length of the link being installed. The
Master unit will remain in the Scanning state until the range of the link has been established.
The Master unit will only move to the Synchronized state when the range of the link has been
established.
The Slave unit does not have a ranging process. The slave unit will change to the
Synchronized state as soon as the wanted signal is demodulated.
Retrying same channel:
If, at the end of the ranging period, the Registered state is not achieved
due to interference or other reasons, the Master unit will retry twice more on the same channel
before moving to another available channel. Should this occur it may take a number of
minutes to establish a link in the Registered state.
Page 6-91
Chapter 6: Configuration and alignment Aligning antennas
Graphical Install page
Menu option:
Installation > Graphical Install
(Figure 104).
This is the second of two methods that may be used to monitor receive signal level during antenna
alignment.
Figure 104
Graphical Install page
Procedure:
Check that Wireless Link Status (top left) is “Up”, “Registering”, “Searching” or “Acquiring”.
While slowly sweeping the antenna, monitor the trace of receive power over the last three
minutes.
Monitor the Receiver Power Bar (bottom right). Green signifies that the wireless link is up and
red signifies all other states.
Monitor the Wireless Install Metric (top right). This is the instantaneous receive power in
dBm + 110.
Note
To access the PDA version of the graphical installation tool, use this URL -
http://<ip-address>/pda.cgi
. This link is only available to system administrators.
Page 6-92
Chapter 6: Configuration and alignment Aligning antennas
Disarming the units
When antenna alignment is complete, use this procedure to disarm both units in the link in order
to:
Turn off the audible alignment aid.
Enable adaptive modulation.
Fully enable spectrum management features (such as DSO, if configured).
Clear unwanted installation information from the various systems statistics.
Store the link range for fast link acquisition on link drop.
Enable higher data rates.
Note
After 24 hours, the units will be disarmed automatically, provided that they are armed
and that the link is up.
Procedure:
Select menu option
Installation
. The Disarm Installation page is displayed (Figure 58).
Click
Disarm Installation Agent
. The confirmation page is displayed (Figure 105).
Figure 105
Optional post-disarm configuration
Page 6-93
Chapter 6: Configuration and alignment Aligning antennas
Comparing actual to predicted performance
For at least one hour of operation after disarming, use this procedure to monitor the link to check
that it is achieving predicted levels of performance. PTP LINKPlanner provides the prediction in the
form of an installation report.
Procedure:
Select menu option
System > Statistics
. The System Statistic page is displayed (Figure 106).
Monitor the following attributes:
o Link Loss
o Transmit Data Rate
o Receive Data Rate
Figure 106
Statistics to be monitored after alignment
For more information on the System Statistics page, refer to System Statistics page on page 7-32.
Page 6-94
Chapter 6: Configuration and alignment Other configuration tasks
Other configuration tasks
This section describes other configuration tasks.
Connecting to the network
Use this procedure to complete and test network connections.
Procedure:
1
If a management PC is connected directly to the PTP 650, disconnect it.
2
Confirm that all ODU Ethernet interface cables (PSU, SFP and Aux) are connected to the
correct network terminating equipment or devices.
If Main PSU Port Allocation is set to
Disabled
in the LAN Configuration page), it is not
necessary to connect the PSU LAN port to network terminating equipment.
3
Test that the unit is reachable from the network management system by opening the web
interface to the management agent, or by requesting ICMP echo response packets using the
Ping application. For in-band management, test that both units are reachable from one PC.
If the network management system is remote from the sites, either ask co-workers at the
management center to perform this test, or use remote login to the management system.
4
Test the data network for correct operation across the wireless link. This may be by
requesting ICMP echo response packets between hosts in the connected network segments,
or by some more structured use of network testing tools.
5
Monitor the Ethernet ports and wireless link to confirm that they are running normally. For
instructions, see System Summary page on page 7-2 and System Status page on page 7-3.
Page 6-95
Chapter 6: Configuration and alignment Other configuration tasks
Upgrading software using TFTP
Use this procedure to upgrade software remotely using Trivial FTP (TFTP) triggered by SNMP.
Procedure:
1
Check that the TFTP client is enabled. Refer to Web-Based Management page on page 6-39.
2
Set tFTP attributes as described in Table 97.
3
Monitor tFTP attributes as described in Table 98.
4
Reboot the ODU as described in Rebooting the unit on page 7-51.
Table 97
Setting tFTP attributes
Attribute
Meaning
tFTPServerInternetAddress The IPv4 or IPv6 address of the TFTP server from which the TFTP
software upgrade file Name will be retrieved.
For example, to set the TFTP server IP address for the unit at
10.10.10.10 to the IPv4 address 10.10.10.1, enter this command:
snmpset_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.19.0 a 10.10.10.1
tFTPServerPortNumber This setting is optional. The port number of the TFTP server from
which the TFTP software upgrade file name will be retrieved
(default=69).
tFTPSoftwareUpgrade
FileName
The filename of the software upgrade to be loaded from the TFTP
server.
For example, to set the TFTP software upgrade filename on
10.10.10.10 to "B1095.dld", enter this command:
snmpset_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.7.0 s B1095.dld
tFTPStartSoftware
Upgrade
Write “1” to this attribute to start the TFTP software upgrade
process. The attribute will be reset to 0 when the upgrade
process has finished.
For example, enter this command:
snmpset_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.8.0 i 1
Page 6-96
Chapter 6: Configuration and alignment Other configuration tasks
Table 98
Monitoring tFTP attributes
Attribute
Meaning
tFTPSoftwareUpgradeStatus This is the current status of the TFTP software upgrade
process. Values:
idle(0)
uploadinprogress(1)
uploadsuccessfulprogrammingFLASH(2)
upgradesuccessfulreboottorunthenewsoftwareimag
e(3)
upgradefailed(4).
For example, enter this command:
snmpget_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.9.0
tFTPSoftwareUpgradeStatus
Text
This describes the status of the TFTP software upgrade
process, including any error details.
For example, enter this command:
snmpget_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.10.0
tFTPSoftwareUpgradeStatus
AdditionalText
This is used if tFTPSoftwareUpgradeStatusText is full and
there are more than 255 characters to report. It contains
additional text describing the status of the TFTP software
upgrade process, including any error details.
For example, enter this command:
snmpget_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.11.0
Page 6-97
Chapter 7: Operation
This chapter provides instructions for operators of the PTP 650 wireless Ethernet bridge.
The following topics are described in this chapter:
System summary and status on page 7-2
Rebooting and logging out on page 7-9
Alarms, alerts and messages on page 7-12
Spectrum management on page 7-20
System statistics on page 7-32
Recovery mode on page 7-44.
Page 7-1
Chapter 7: Operation System summary and status
System summary and status
This section describes how to use the summary and status pages to monitor the status of the
Ethernet ports and wireless link.
System Summary page
Menu option:
Home
(Figure 107).
This page contains a high level summary of the status of the wireless link and associated
equipment.
Figure 107
System Summary page
Procedure:
Review the attributes (Table 99).
Check that the Wireless Link Status is “Up” on both units. If it is not “Up”, review any
uncleared system alarms: these are displayed below the System Clock attribute. Whenever
system alarms are outstanding, a yellow warning triangle is displayed on the navigation bar.
For more information, refer to Alarms on page 7-12.
Table 99
System Summary attributes
Attribute
Meaning
Wireless Link Status Current status of the wireless link.
A green background with status text “Up” means that the point-to-point
link is established.
A red background with suitable status text (for example “Searching”)
indicates that the link is not established.
Page 7-2
Chapter 7: Operation System summary and status
Attribute
Meaning
Link Name The name of the PTP link, as set in the System Configuration page.
Elapsed Time
Indicator
The time (hh:mm:ss) that has elapsed since the last system reboot.
The system can reboot for several reasons, for example, commanded
reboot from the system reboot webpage, or a power cycle of the
equipment.
System Clock The system clock presented as local time, allowing for zone and daylight
saving (if set).
System Status page
Menu option:
Status
(Figure 108). This page provides a detailed view of the operation of the PTP
650 link from both the wireless and network perspectives.
Figure 108
System Status page
The two PTP 650 Series units are arranged in a master and slave relationship. The roles of the
units in this relationship are displayed in the page title. The master unit will always have the title
- Master, and the slave will always have - Slaveappended to the Systems Status
page title.
Page 7-3
Chapter 7: Operation System summary and status
Note
Link Symmetry is configured at the master ODU only. The appropriate matching Link
Symmetry is set at the slave ODU automatically. For example, if Link Symmetry is
configured as
2 to 1
at the master ODU, then the slave ODU will be set automatically
as
1 to 2
. In this example, the master-slave direction has double the capacity of the
slave-master direction.
Procedures:
Review the attributes (Table 100).
Confirm that the Ethernet Link Status attributes are green and set to
Copper Link Up
or
Fiber
Link Up
.
Table 100
System Status attributes
Attribute
Meaning
Link Name The link name is allocated by the system administrator and is used to
identify the equipment on the network. The link name attribute is limited
to a maximum size of 63 ASCII characters.
Site Name The site name is allocated by the system administrator and can be used
as a generic scratch pad to describe the location of the equipment or any
other equipment related notes. The site name attribute is limited to a
maximum size of 63 ASCII characters.
Software Version The version of PTP 650 software installed on the equipment.
Hardware Version The PTP 650 hardware version. Formatted as “vvvv” where vvvv is the
version of the printed circuit card
Regulatory Band
This is used by the system to constrain the wireless to operate
within regulatory regime of a particular band and country. The
license key provides the capability to operate in one or more
regulatory bands. The Installation Wizard is used to choose one of
those bands.
Elapsed Time
Indicator
The elapsed time indicator attribute presents the total time in years,
days, hours, minutes and seconds since the last system restart. The
system can restart for several reasons, for example commanded reboot
from the system reboot web page, or a power cycle of the equipment.
Main PSU Port
Status
This indicates the current status of the Ethernet link to the PSU port. A
state of Copper Link Upwith a green background indicates that an
Ethernet link is established. A state of Downwith a red background
indicates that the Ethernet link is not established.
Main PSU Port
Speed and Duplex
The negotiated speed and duplex setting of the Ethernet link to the PSU
port. The speed setting is specified in Mbps.
Page 7-4
Chapter 7: Operation System summary and status
Attribute
Meaning
Aux Port Status This indicates the current status of the Ethernet link to the Aux port. A
state of Copper Link Upwith a green background indicates that an
Ethernet link is established. A state of Downwith a red background
indicates that the Ethernet link is not established.
Aux Port Speed and
Duplex
The negotiated speed and duplex setting of the Ethernet link to the Aux
port. The speed setting is specified in Mbps.
SFP Port Status This indicates the current status of the Ethernet link to the SFP port. A
state of Copper Link Upor “Fiber Link Upwith a green
background indicates that an Ethernet link is established. A state of
Downwith a red background indicates that the Ethernet link is not
established.
SFP Port Speed and
Duplex
The negotiated speed and duplex setting of the Ethernet link to the PSU
port. The speed setting is specified in Mbps.
MAC Address The MAC Address of this unit.
Remote MAC
Address
The MAC Address of the peer unit. If the link is down, this is set to “Not
available
”.
Remote Internet
Address
The Internet Address of the peer unit. To open the web interface of the
peer unit, click on the hyperlink. If the link is down, this is set to “Not
available”.
Depending on the settings of IP Version (Table 72) and IP Address Label
(Table 71), this may be either an IPv4 or an IPv6 address.
Wireless Link Status As the attribute name suggests it displays the current status of the
wireless link. A state of Upon a green background indicates that a
point-to-point link is established. A state of Downon a red background
indicates that the wireless link is not established.
Maximum Transmit
Power
The maximum transmit power that the local wireless unit is permitted to
use to sustain a link.
Remote Maximum
Transmit Power
The maximum transmit power that the remote wireless unit is permitted
to use to sustain a link.
Transmit Power The maximum, mean, minimum and latest measurements of Transmit
Power (dBm). See System histograms on page 7-32.
Receive Power The maximum, mean, minimum and latest measurements of Receive
Power (dBm). See System histograms on page 7-32.
Page 7-5
Chapter 7: Operation System summary and status
Attribute
Meaning
Vector Error The maximum, mean, minimum and latest measurements of Vector
Error (dB). See System histograms on page 7-32.
Vector Error compares the received signals In phase / Quadrature (IQ)
modulation characteristics to an ideal signal to determine the composite
error vector magnitude.
The expected range for Vector Error is approximately -2 dB (NLOS link
operating at sensitivity limit on BPSK 0.67) to -33 dB (short LOS link
running 256 QAM 0.83).
Link Loss The maximum, mean, minimum and latest measurements of Link Loss
(dB). See System histograms on page 7-32.
The link loss is the total attenuation of the wireless signal between the
two point-to-point units. The link loss calculation is presented below:
xx
x
x
R
T
R
Tll
g
gP
P
P+
+
=
Where:
ll
P
= Link Loss (dB)
x
T
P
= Transmit power of the remote wireless unit (dBm)
x
R
P
= Received signal power at the local unit (dBm)
xx
RT
gg ,
= Antenna gain at the remote and local units
respectively (dBi). The antenna gain of the PTP 650 Series
(23.5 dBi) is used unless one or both of the units is a
Connectorized version.
For connectorized ODUs, the link loss calculation is modified to allow for
the increased antenna gains at each end of the link.
Transmit Data Rate The maximum, mean, minimum and latest measurements of Transmit
Data Rate (Mbps). See System histograms on page 7-32.
Receive Data Rate The maximum, mean, minimum and latest measurements of Receive
Data Rate (Mbps). See System histograms on page 7-32.
Link Capacity
Variant
Indicates whether the installed license key is Lite, Mid or Full.
When a link is established, this attribute shows the lower of the license
keys at each end. For example, if this end is Full and the other end is Lite,
it shows “Lite”. To see the installed key, go to the Installation Wizard.
Page 7-6
Chapter 7: Operation System summary and status
Attribute
Meaning
Link Capacity The maximum aggregate data rate capacity available for user traffic,
assuming the units have been connected using Gigabit Ethernet. The link
capacity is variable and depends on the prevailing wireless conditions as
well as the distance (range) between the two wireless units.
Transmit
Modulation Mode
The modulation mode currently being used on the transmit channel.
Receive Modulation
Mode
The modulation mode currently being used on the receive channel.
Link Symmetry A ratio that expresses the division between transmit and receive time in
the TDD frame. The first number in the ratio represents the time allowed
for the transmit direction and the second number represents the time
allowed for the receive direction.
Receive Modulation
Mode Detail
The receive modulation mode in use. For a list of values and their
meanings, see Table 101.
Range The range between the PTP 650 Series ODUs. This is displayed in
kilometers by default, but can be changed to miles by updating the
Distance Units attribute to imperial, as described in Webpage Properties
page on page 6-49.
Table 101
Receive Modulation Mode Detail values and meanings
Value
Meaning
Running At Maximum
Receive Mode
The link is operating at maximum modulation mode in this
channel and maximum throughput has been obtained.
Running At User-Configured
Max Modulation Mode
The maximum modulation mode has been capped by the user
and the link is operating at this cap.
Restricted Because
Installation Is Armed
The Installation Wizard has been run and the unit is armed,
forcing the link to operate in the lowest modulation mode. To
remove this restriction, re-run the Installation Wizard to disarm
the unit.
Restricted Because Of Byte
Errors On The Wireless Link
The receiver has detected data errors on the radio and reduced
the modulation mode accordingly. The radio may achieve a
higher modulation mode as shown by the vector error, but there
is some other error source, probably RF interference.
Restricted Because Channel
Change Is In Progress
This is a transient event where the modulation mode is
temporarily reduced during a channel change.
Page 7-7
Chapter 7: Operation System summary and status
Value
Meaning
Limited By The Wireless
Conditions
The radio is running at the maximum achievable modulation
mode given the current wireless conditions shown by the vector
error. The radio is capable of reaching a higher modulation
mode if wireless conditions (vector error) improve.
Page 7-8
Chapter 7: Operation Rebooting and logging out
Rebooting and logging out
This section describes how to reboot the unit and log out of the web interface.
Login Information page
Menu option:
Management > Web > Login Information
(Figure 109).
Use this page to show recent successful and unsuccessful login attempts on this account.
Figure 109
Login Information page
Reboot Wireless Unit page
Menu option:
System > Reboot
(Figure 110).
Use this page to reboot the ODU or view a list of previous reboot reasons.
Figure 110
Reboot Wireless Unit page
Page 7-9
Chapter 7: Operation Rebooting and logging out
Procedure:
Use the drop-down list to view the Previous Reasons For Reset/Reboot.
If a reboot is required:
o Click
Reboot Wireless Unit
. The Reboot Confirmation dialog is displayed (Figure 111).
o Click
OK
. The reboot progress message is displayed. On completion, the unit restarts.
Figure 111
Reboot confirmation pop up
Change Password page
Menu option:
Change Password
(Figure 112). Use this page to change a personal password.
Figure 112
Change Password page (System Administration example)
Note
A security officer can change the passwords of other users using the User Accounts
page, as described in Local User Accounts page on page 6-42.
Procedure:
Enter and confirm the new password (the default is blank). The new password must comply
with the complexity rules (Table 79).
Page 7-10
Chapter 7: Operation Rebooting and logging out
Logging out
To maintain security, always log out at the end of a session: on the menu, click
Logout
.
The unit will log out automatically if there is no user activity for a set time, but this depends upon
Auto Logout Period in the Webpage Properties page (Figure 78).
Page 7-11
Chapter 7: Operation Alarms, alerts and messages
Alarms, alerts and messages
This section describes how to use alarms, alerts and syslog messages to monitor the status of a
PTP 650 link.
Alarms
Whenever system alarms are outstanding, a yellow warning triangle is displayed on the navigation
bar. The warning triangle is visible from all web pages.
Procedure:
Click the warning triangle (or menu option
Home
) to return to the System Summary page and
view the alarms. If the warning triangle disappears when it is clicked, it indicates that the
outstanding alarms have been cleared.
The example in Figure 113 shows the warning triangle in the navigation bar and an alarm
displayed in the System Summary page. The alarms are defined in Table 102.
A change of state in most alarms generates an SNMP trap or an SMTP email alert.
Figure 113
Alarm warning triangle
Page 7-12
Chapter 7: Operation Alarms, alerts and messages
Table 102
System alarms
Alarm
Meaning
Regulatory Band The installed license key contains an invalid Regulatory
Band. The wireless unit is prohibited from operating
outside the regulated limits.
Install Status Signaling was received with the wrong MAC address. It is
very unusual to detect this, because units with wrongly
configured Target MAC Address will normally fail to
establish a wireless link. However, rare circumstances may
establish a partial wireless link and detect this situation.
Install Arm State A wireless unit is in installation mode. After installation,
the wireless unit should be disarmed. This will increase the
data-carrying capacity and stop the installation tone
generator. The wireless link is disarmed from the
Installation” process, see Disarming the units on page 6-
93.
Unit Out Of Calibration The unit is out of calibration and must be returned to the
factory using the RMA process for re-calibration.
Incompatible Regulatory Bands The two linked units have different Regulatory Bands. To
clear this alarm, obtain and install license keys for the
correct country and select the same Regulatory Band at
each end of the link.
Incompatible Master and Slave The master and slave ends of the wireless link are different
hardware products, or have different software versions. It
is very unusual to detect this because incompatible units
will normally fail to establish a wireless link. However,
some combinations may establish a partial wireless link
and detect this situation.
Main PSU Port Configuration
Mismatch
Ethernet fragments (runt packets) have been detected
when the PSU port is in full duplex. This indicates an auto-
negotiation or forced configuration mismatch.
No Wireless Channel Available Spectrum Management was unable to locate a suitable
wireless channel to operate on.
SNTP Synchronization failed SNTP has been enabled but the unit is unable to
synchronize with the specified SNTP server.
Page 7-13
Chapter 7: Operation Alarms, alerts and messages
Alarm
Meaning
Wireless Link Disabled Warning The wireless link has been administratively disabled via the
SNMP Interface. The wireless interface MIB-II
ifAdminStatus attribute has been set to
DOWN
. To enable
the Ethernet interface, set the ifAdminStatus attribute to
UP
.
Main PSU Port Disabled Warning The PSU port link has been administratively disabled via
the SNMP Interface.
Main PSU Port Status The PSU port link is down. The most likely cause is that the
unit has no Ethernet cable plugged into its Aux port.
SFP Error
A non-OK value indicates that the SFP link is down. There
are two possible causes:
Either: the fiber link has been installed but
disabled (because the license key does not include
SFP support),
Or: the SFP link could not be established even
though an SFP carrier was detected (due perhaps
to a cabling fault or the link is disabled at the link
partner).
SFP Port Configuration Mismatch Ethernet fragments (runt packets) have been detected
when the SFP port is in full duplex. This indicates an auto-
negotiation or forced configuration mismatch.
SFP Port Disabled Warning The SFP port link has been administratively disabled via
the SNMP Interface.
SFP Port Status The SFP port link is down. The most likely cause is that the
unit has no Ethernet cable plugged into its SFP port.
Aux Port PoE Output Status The Aux port link is down. The most likely cause is that the
unit has no Ethernet cable plugged into its Aux port.
Aux Port Disabled Warning The Aux port link has been administratively disabled via
the SNMP Interface.
Aux Port Status The Aux port link is down. The most likely cause is that the
unit has no Ethernet cable plugged into its Aux port.
Link Mode Optimization
Mismatch
The Master and Slave ODUs are configured to use different
link mode optimization methods (one is set to IP and the
other TDM).
Syslog Enabled/ Disabled
Warning
The local log of event messages has been enabled or
disabled.
Syslog Local Nearly Full The local log of event messages is nearly full.
Page 7-14
Chapter 7: Operation Alarms, alerts and messages
Alarm
Meaning
Syslog Local Wrapped The local log of event messages is full and is now being
overwritten by new messages.
Aux Port Configuration Mismatch Ethernet fragments (runt packets) have been detected
when the Aux port is in full duplex. This indicates an auto-
negotiation or forced configuration mismatch.
Syslog Client Enabled/Disabled
Warning
The local syslog client has been enabled or disabled.
Ethernet Bridging Status Disabled” means that the link has stopped bridging
Ethernet frames because the Lowest Ethernet Modulation
Mode is not being achieved or because the wireless link is
down.
Remaining Full Capacity Time
Trial
Time remaining on the full capability trial period. Activated
when seven days or less of the trial period remain.
Capacity Variant Mismatch The link ends are different capability variants, for example,
one is Full and the other is Med.
Email alerts
The management agent can be configured to generate alerts by electronic mail when certain
events occur. The alerts are defined in Table 103.
Table 103
Email alerts
Alert
Meaning
Wireless Link Up Down There has been a change in the status of the wireless link.
Channel Change DFS has forced a change of channel.
DFS Impulse Interference DFS has detected impulse interference.
Enabled Diagnostic Alarms Diagnostic alarms have been enabled.
Main PSU Port Up Down There has been a change in the status of the PSU data port.
Aux Port Up Down There has been a change in the status of the Aux port.
SFP Port Up Down There has been a change in the status of the SFP port.
Page 7-15
Chapter 7: Operation Alarms, alerts and messages
Syslog page
Menu option:
Management > Syslog
(Figure 114).
Use this page to view the local log of event messages.
Figure 114
Syslog local log
Note
For more information about system logging, refer to:
System logging (syslog) on page 1-32 describes the system logging feature.
Syslog Configuration page on page 6-59 describes how to enable system logging.
Page 7-16
Chapter 7: Operation Alarms, alerts and messages
Format of syslog server messages
PTP 650 generates syslog messages in this format:
SP = “ ” = %x20
CO = “:” = %x3A
SC = “;” = %x3B
LT = “<” = %x3C
GT = “>” = %x3E
syslog = pri header SP message
pri = LT “1”-“182” GT
header = timestamp SP hostname
timestamp = month SP days SP hours “:” minutes “:” seconds
month = “Jan”|“Feb”|“Mar”|“Apr”|“May”|“Jun”|
“Jul”|“Aug”|“Sep”|“Oct”|“Nov”|“Dec”
days = “ 1”-“31”
hours = “00”-“23”
minutes = seconds = “00”-“59”
hostname = “0.0.0.0”-“255.255.255.255”
message = “PTP650” CO SP (configuration | status | event)
configuration = “configuration” SC SP attribute-name SC SP (“Web
user”|“SNMP user”|“SNTP”) SC SP “was=” previous-value SC SP “now=”
new-value SC
status = “status” SC SP attribute-name SC SP “was=” previous-value SC
SP “now=” new-value SC
event = “event” SC SP identifier SC SP event-message-content SC
Configuration and status messages
Configuration and status messages contain all of the relevant attributes.
This is an example of a configuration message:
PTP650: configuration; IP Address; Web user; was=10.10.10.10;
now=169.254.1.1;
This is an example of a status message:
PTP650: status; Data Port Status; was=Down; now=Up;
Page 7-17
Chapter 7: Operation Alarms, alerts and messages
Event messages
Event messages are listed in Table 104. Definition of abbreviations:
SC = ";"
SP = " "
This is an example of an event message:
PTP650: event; auth_login; web user=MarkT; from=169.254.1.1; port=80;
connection=HTTP; authentication=local;
Table 104
Event messages
Facility
Severity
Identifier
Message content
security(4) warning(4) auth_idle "Web user=" user-name SC SP
"from=" IP-address SC SP
"port=" port-number SC SP
"connection=" ("HTTP" | "HTTPS") SC SP
"authentication=" ("local" | "RADIUS") SC
security(4) info(6) auth_login
security(4) warning(4) auth_login_failed
security(4) warning(4) auth_login_locked
security(4) info(6) auth_logout
kernel(0) warning(4) cold_start "PTP wireless bridge has reinitialized,
reason="
reset-reason SC
security(4) warning(4) License_update "License Key updated" SC
syslog(5) warning(4) log_full "Syslog local flash log is 90% full" SC
syslog(5) warning(4) log_wrap "Syslog local flash log has wrapped" SC
security(4) info(6) radius_auth "RADIUS user=" user-name SC SP
"server " ("1" | "2") " at " IP-address SP
"succeeded" SC
security(4) warning(4) radius_auth_fail "RADIUS user=" user-name SC SP
"server " ("1" | "2") " at " IP-address SP
("failed" | "succeeded" | "failed (no
response)") SC
security(4) alert(1) resource_low "Potential DoS attack on packet ingress "
("warning" | "cleared") SC
security(4) warning(4) sec_zeroize "Critical Security Parameters (CSPs)
zeroized" SC
local6(22) warning(4) snmpv3_asn1 "ASN.1 parse error" SC
Page 7-18
Chapter 7: Operation Alarms, alerts and messages
Facility
Severity
Identifier
Message content
security(4) warning(4) snmpv3_auth "Authentication failure" SC
local6(22) warning(4) snmpv3_decryption "Decryption failure" SC
local6(22) warning(4) snmpv3_engine_id "Unknown engine ID" SC
local6(22) warning(4) snmpv3_sec_level "Unknown security level" SC
kernel(0) warning(4) sys_reboot "System Reboot, reason=" reset-reason SC
security(4) warning(4) sys_software
_upgrade
"Software upgraded from " software-
version
" to " software-version SC
local6(22) warning(4) telnet_idle "Telnet user=" user-name SC SP
"from=" IP-address SC SP
"port=" port-number SC
local6(22) info(6) telnet_login
local6(22) warning(4) telnet_login_failed
local6(22) info(6) telnet_logout
local6(22) info(6) tftp_complete "TFTP software upgrade finished" SC
local6(22) info(6) tftp_failure "TFTP software upgrade failed, reason="
reason SC
local6(22) info(6) tftp_start "TFTP software upgrade started" SC
NTP(12) info(6) time_auth "SNTP authentication succeeded at
IP-address=" IP-address SC SP
"port-number=" port SC
NTP(12) warning(4) time_auth_failed "SNTP authentication failed at IP-address="
IP-address SC SP "port-number=" port SC
NTP(12) warning(4) time_conn_failed "SNTP connection failed at IP-address="
IP-address SC SP "port-number=" port SC
SP
"reason=" reason SC
Page 7-19
Chapter 7: Operation Spectrum management
Spectrum management
This section describes how to use the spectrum management pages to monitor the radio spectrum
usage of the PTP 650 link.
Spectrum Management page
Menu option:
System > Spectrum Management
(Figure 115 and Figure 116).
Use this page to view and configure spectrum usage. The width of the vertical green bar
represents the channel width (10 MHz illustrated).
Figure 115
Spectrum Management page (master unit)
Page 7-20
Chapter 7: Operation Spectrum management
Figure 116
Spectrum Management page (slave unit)
All spectrum management configuration changes are applied at the master ODU only. These
changes are then sent from the master to the slave, so that both master and slave keep identical
copies of spectrum management configuration. It is therefore possible to swap master and slave
roles on an active PTP 650 link without modifying Spectrum Management configuration.
The default channelization can be modified by varying the lower center frequency attribute in the
installation wizard, as described in Wireless Configuration page on page 6-15.
Page 7-21
Chapter 7: Operation Spectrum management
Note
Before attempting to improve the performance of the spectrum management
algorithm by changing the default configuration, consult the Cambium Point-to-Point
distributor or one of the system field support engineers.
Procedure:
Review the configuration attributes (Table 105)
Update the attributes as required. At the slave unit, only Page Refresh Period can be updated.
To save changes, click Submit configuration changes.
Table 105
Spectrum Management attributes
Attribute
Meaning
Page Refresh Period The page refreshes automatically according to the setting entered here
(in seconds).
Hopping Margin Spectrum Management uses this margin when making a channel hop
decision. If the interference level of the target channel is lower than that
of the active channel by at least the Hopping Margin, the link will hop to
the target channel. The default setting is 3 dB in non-radar regions, or 10
dB in radar regions.
Asymmetric DSO Only displayed in non-radar regions when DSO is enabled. The default
configuration of symmetric operation constrains the link to operate
symmetrically, using the same transmit and receive channels. When in
symmetric mode the slave unit will always follow the master. If the
master moves to a new channel the slave will hop to the same channel.
When the Point-to-Point link is configured as an asymmetric link both
the master and slave are free to select the best channel from their own
set of local interference metrics.
Spectrum
Management
Control
Only displayed in radar regions. The options are
DFS
and
DFS with DSO
.
Hopping Period (not
configurable)
The Spectrum Management algorithm evaluates the metrics every
Hopping Periodseconds (180 seconds by default) looking for a
channel with lower levels of interference. If a better channel is located,
Spectrum Management performs an automated channel hop. If SNMP or
SMTP alerts are enabled an SNMP TRAP or an email alert is sent
warning the system administrator of the channel change.
Hopping Counter This is used to record the number of channel hops. The number in the
(+) brackets indicates the number of channel changes since the last
screen refresh.
Page 7-22
Chapter 7: Operation Spectrum management
Attribute
Meaning
Interference
Threshold
Spectrum Management uses the interference threshold to perform
instantaneous channel hops. If the measured interference on a channel
exceeds the specified threshold, then DSO will instruct the wireless to
immediately move to a better channel. If a better channel cannot be
found the PTP 650 Series will continue to use the current active channel.
(Default 85 dBm).
Channel Bandwidth
(not configurable)
This shows the value of the variable channel bandwidth selected.
Interpreting the spectrum management plots
The Spectrum Management pages at the master and slave (Figure 115 and Figure 116) display two
graphical plots:
Local Receive Channel Spectrum
Peer Receive Channel Spectrum
A more detailed example of one of these plots is shown in Figure 117.
Figure 117
Example spectrum management plot
Note
For more information, select the
Help
hyperlink from the Spectrum Management
page.
Page 7-23
Chapter 7: Operation Spectrum management
X axis and Y axis
The X-axis shows a stylized view of the selectable wireless channels. Adjacent channels on the
display have a 10 MHz overlap. Channels are displayed separately for clarity. The axis is labeled
using the channel center frequencies in MHz.
The Y-axis shows the interference power levels from 100 to 40 dBm.
Channel states
The active channel (channel 5 in Figure 117) is always marked using hatched green and white
lines. The width of the hatching is directly proportional the channel bandwidth spectral occupancy
of the channel.
The individual channel metrics are displayed using a colored bar and an “I” bar. The colored bar
represents the channel state (Table 106).
Table 106
Channel states represented in the spectrum management plot
Color
State
Meaning
Green Active The channel is currently in use, hosting the Point-to-Point
wireless link.
Orange Interference The channel has interference above the interference
threshold.
Blue Available The channel has an interference level below the
interference threshold and is considered by the Spectrum
Management algorithm suitable for hosting the
Point-to-Point link.
Grey Barred The system administrator has barred this channel from use.
For improved visibility, an additional red locksymbol is
used to indicate that a channel is barred.
Page 7-24
Chapter 7: Operation Spectrum management
Key metrics
The “I” bar and top of the colored bar represent three key metrics (Table 107). The vertical part of
the “I” bar represents the statistical spread between the peak and the mean of the statistical
distribution.
Table 107
Key metrics represented in the spectrum management plot
Metric
Description
How represented
Peak of Means The largest mean interference measurement
encountered during the quantization period. The
peak of means is useful for detecting slightly
longer duration spikes in the interference
environment.
Upper horizontal
bar.
Mean of Means The arithmetic mean of the measured means
during a quantization period. The mean of means
is a coarse measure of signal interference and
gives an indication of the average interference
level measured during the quantization period.
The metric is not very good at predicting
intermittent interference and is included to show
the spread between the Mean of Means, the
99.9% Percentile and the Peak of Means.
Lower horizontal
bar.
99.9% Percentile
of the Means
The value of mean interference measurement
which 99.9% of all mean measurements fall
below, during the quantization period. The 99.9%
percentile metric is useful for detecting short
duration repetitive interference that by its very
nature has a minimal effect of the mean of means.
Top of the colored
bar.
Note
The arithmetic mean is the true power mean and not the mean of the values expressed
in dBm.
Spectrum Management uses the 99.9% Percentile as the prime interference
measurement. All subsequent references to interference level refer to this percentile
measurement.
Page 7-25
Chapter 7: Operation Spectrum management
Spectrum management in fixed frequency mode
When the link is operating in fixed frequency mode, the Spectrum Management page uses two
visual cues (Figure 118). The main page title has the Fixed Frequency Modesuffix and the
selected channels are identified by a red capital F”.
Figure 118
Spectrum Management Fixed Frequency Mode page
Channel barring is disabled in fixed frequency mode; it is not required as dynamic channel
hopping is prohibited in this mode.
The only controls available to the master are the Page Refresh Period and Interference Threshold
attributes. They will have no effect on the operation of the wireless link and will only effect the
generation of the channel spectrum graphics.
The active channel history menu is removed in this mode of operation, as channel hopping is
prohibited.
Page 7-26
Chapter 7: Operation Spectrum management
Spectrum management in radar avoidance mode
When the link is operating in radar avoidance mode, the Spectrum Management page (Figure 119
and Figure 120) contains the following additional information:
The main page title has the Radar Avoidancesuffix.
The only controls available to the master are the Interference Threshold attribute. This has no
effect on the operation of the wireless link and will only affect the generation of the channel
spectrum graphics.
Extra color coding of the interference histogram is provided (Table 108).
When operating with RTTT (Road transport and Traffic Telematics) Avoidance enabled or other
regulatory restrictions on channel usage, the page contains the following additional information:
All channels marked with a no entrysymbol with their associated statistics colored black are
the prohibited channels. These channels are never used to host the wireless link, but CAC
measurements are still taken so that adjacent channel biases can be calculated correctly and so
the user can see if other equipment is in use.
Figure 119
Spectrum Management page with radar avoidance - master
Page 7-27
Chapter 7: Operation Spectrum management
Figure 120 Spectrum Management page with radar avoidance - slave
Table 108
Channel states in the spectrum management plot (radar avoidance)
Color
State and
color
Meaning
Green Active This channel is currently in use hosting the Point-to-Point wireless
link.
Orange Interference This channel has interference above the interference threshold
Blue Available This channel has an interference level below the interference
threshold and is considered by the Spectrum Management
algorithm suitable for hosting the Point-to-Point link
Dark grey Barred The system administrator has barred this channel from use.
Because the low signal levels encountered when a unit is
powered up in a laboratory environment prior to installation
(which makes the grey of the channel bar difficult to see). An
additional red locksymbol is used to indicate that a channel is
barred.
Page 7-28
Chapter 7: Operation Spectrum management
Color
State and
color
Meaning
Light grey Unavailable This channel needs to be monitored for one minute and found
free of radar signal before it can be used for transmitting.
Red Radar
Detected
Impulsive Radar Interference has been detected on this channel
and the channel is unavailable for 30 minutes. At the end of the
30 minute period a Channel Availability Check is required to
demonstrate no radar signals remain on this channel before it can
be used for the radio link.
Black Region Bar This channel has been barred from use by the local region
regulator
Viewing the active channel history
Use this procedure to view the active channel history. This is a time series display of the channels
used by the PTP 650 Series over the last 25 hours.
Procedure:
Select the
Active Channel History
hyperlink from the Spectrum Management page.
An example of the active channel history display is shown in Figure 121. Where there are parallel
entries on the display this signifies that the wireless link occupied this channel during the
measurement period. The measurement periods are one minute (from zero to sixty minutes) and
twenty minutes from (60 minutes to twenty five hours).
Figure 121
Active channel history screen
Page 7-29
Chapter 7: Operation Spectrum management
Viewing historic spectrum management metrics
Use this procedure to view the results of previous measurement quantization periods from both
the master and slave Spectrum Management pages.
Procedure:
Hold down the shift key and click the appropriate channel on the Local Receive Channel
Separation plot. The time series plot is displayed (Figure 122). This plot displays the results of
all previous measurement quantization periods, up to a maximum of 132 periods. The colored
lines represent interference measurements (Table 109).
Figure 122
Spectrum management time series plot
Table 109
Interference represented in the time series plot
Color
Meaning
GREEN Peak of Means interference measurement
BLACK 99.9% percentile of means interference measurement
BLUE Mean of Means interference measurement
Page 7-30
Chapter 7: Operation Spectrum management
Barring channels
To comply with FCC rules, bar any channels that may interfere with TDWR radars. This must be
done before the units are allowed to radiate on site. The system designer will have provided a list
of any affected channels, based on the instructions in Avoidance of weather radars (USA only) on
page 3-20.
Procedure:
Log into the master unit.
Select menu option
System > Spectrum Management
. The Spectrum Management page is
displayed.
Click on the appropriate channel center frequencies on the Local or Peer channel spectrum
plots. The example in Figure 123 shows how to bar one channel (5822 MHz).
When the confirmation dialog is displayed, click
OK
.
Figure 123
Barring a channel
Page 7-31
Chapter 7: Operation System statistics
System statistics
This section describes how to use the system statistics pages to manage the performance of the
PTP 650 link, use the following web pages:
System Statistics page
Menu option:
System > Statistics
. Use this page to check system statistics.
System histograms
The System Histograms section of the System Statistics page (Figure 124) contains eight
diagnostic attributes that are presented as arrays of four elements (Table 110).
Figure 124
System Histograms section of the System Statistics page
The element arrays represent the following:
Max: The maximum value measured over the last hour.
Mean: The mean of a set of values recorded at one second intervals over the last hour.
Min: The minimum value measured over the last hour.
Latest: The latest value measured.
The values are calculated over the time that has elapsed since the link was established or since the
measurement period was reset.
Page 7-32
Chapter 7: Operation System statistics
Note
Use the Diagnostics Plotter page on page 7-42 to plot these attributes against time.
Use the Generate Downloadable Diagnostics page on page 7-43 to extract historical
data for these attributes to a CSV file.
Procedure:
To reset and restart measurement, click
Reset System Histograms and Measurement Period
.
Table 110
System Histogram attributes in the System Statistics page
Attribute
Meaning
Transmit Power The transmit power histogram, calculated over a one hour period.
Receive Power The receive power histogram, calculated over a one hour period.
Vector Error The vector error measurement compares (over a one hour period) the
received signal IQ modulation characteristics to an ideal signal to determine
the composite vector error magnitude.
Link Loss Link loss calculated (over a one hour period) as follows:
Peer_Tx_Power (dBm) Local_Rx_Power (dBm) + 2 x Antenna_Pattern (dBi)
Signal Strength
Ratio
The Signal Strength Ratio (calculated over a one hour period) is:
Power received by the vertical antenna input (dB) ÷
Power received by the horizontal antenna input (dB)
This ratio is presented as: max, mean, min, and latest. The max, min and
latest are true instantaneous measurements; the mean is the mean of a set of
one second means.
Signal Strength Ratio is an aid to debugging a link. If it has a large positive or
negative value then investigate the following potential problems:
An antenna coaxial lead may be disconnected.
When spatial diversity is employed, the antenna with the lower value may
be pointing in the wrong direction.
When a dual polar antenna is deployed, the antenna may be directed
using a side lobe rather than the main lobe.
When there is a reflection from water on the link and spatial diversity is
employed, then one expects large, slow swings in Signal Strength Ratio.
This indicates the antenna system is doing exactly as intended.
Page 7-33
Chapter 7: Operation System statistics
Attribute
Meaning
Transmit,
Receive and
Aggregate Data
Rates
The data rates in the transmit direction, the receive direction and in both
directions, expressed in Mbps (max, mean, min, and latest). The max, min
and latest are true instantaneous measurements. The mean is the mean of a
set of one second means.
Histogram
Measurement
Period
The time over which the system histograms were collected.
System counters
The System Counters section of the System Statistics page (Figure 125) contains Data Port
Counters (Table 111), Management Agent Counters (Table 112) and Wireless Port Counters and
Performance Information (Table 113).
Figure 125
System Counters section of the System Statistics page
Procedure:
To reset all system counters to zero, click
Reset System Counters
.
Page 7-34
Chapter 7: Operation System statistics
The packet counter attributes each contain a number in parentheses; this shows the number of
packets received since the last page refresh.
Table 111
Data Port Counters
Attribute
Meaning
Tx Frames The total number of good frames the bridge has sent for transmission by
the local Ethernet interface.
Rx Frames The total number of good frames the bridge has received from
transmission by the remote Ethernet interface.
Table 112
Management Agent Counters
Attribute
Meaning
Packets To Internal
Stack
The total number of good packets the bridge has transmitted to the
internal stack (for example, ARP, PING and HTTP requests).
Packets From
Internal Stack
The total number of good packets the bridge has received from the
internal stack (ARP responses, PING replies, HTTP responses).
Table 113
Wireless Port Counters and Performance Information
Attribute
Meaning
Tx Frames Total number of good frames the bridge has sent for transmission by the
wireless interface.
Rx Frames Total number of good frames the bridge has received from the wireless
interface.
Link Symmetry Ratio between transmit and receive time in the TDD frame. The first
number is the time allowed for the transmit direction and the second
number is the time allowed for the receive direction.
Link Capacity The maximum aggregate data capacity available for user traffic under
the current radio link conditions, assuming the units have been
connected using Gigabit Ethernet. The sum of the displayed Transmit
and Receive data rates may be lower than this figure if the link is not
fully loaded by the current traffic profile.
Transmit
Modulation Mode
The modulation mode currently being used on the transmit channel. The
number in brackets after the modulation mode and coding rate string is
the effective data rate available to all MAC layer protocols.
Page 7-35
Chapter 7: Operation System statistics
Attribute
Meaning
Receive Modulation
Mode
The modulation mode currently being used on the receive channel. The
number in brackets after the modulation mode and coding rate string is
the effective data rate available to all MAC layer protocols.
Receive Modulation
Mode Detail
The receive modulation mode in use. For a list of values and their
meanings, see Table 101.
Wireless Link
Availability
Wireless link availability calculated since the last system counters reset.
Ethernet Bridging
Availability
Link availability for bridging Ethernet traffic calculated since the last reset
of the system counters. This is the percentage of time in which the
Ethernet Bridging Status attribute has been set to
Enabled
”.
Byte Error Ratio The ratio of detected Byte errors to the total number of bytes since the
last system reboot. This measurement is made continually using null
frames when there is no user data to transport.
Counter
Measurement
Period
The time over which the system counters were collected.
Other attributes
The bottom section of the System Statistics page (Figure 126) contains two attributes (Table 114).
Figure 126
Other attributes section of the System Statistics page
Procedure:
After updating the Statistics Page Refresh Period field, click
Submit Page Refresh Period
.
Table 114
Other attributes in the System Statistics page
Attribute
Meaning
Elapsed Time Indicator Elapsed time since the last system reboot.
Statistics Page Refresh Period The statistics page refreshes automatically according to the
setting entered here (in seconds).
Page 7-36
Chapter 7: Operation System statistics
Wireless Port Counters page
Menu option:
System > Statistics > Wireless Port Counters
(Figure 127).
Use this page to check the Ethernet performance of the wireless bridge.
Figure 127
Wireless Port Counters page
Procedure:
Review the attributes (Table 115).
To change the refresh period, update the Counter Page Refresh Period attribute and click
Submit Page Refresh Period
.
To reset all counters to zero, click
Reset System Counters
.
Page 7-37
Chapter 7: Operation System statistics
Table 115
Wireless Port Counters attributes
Attribute
Meaning
Tx/Rx Frames Number of frames transmitted and received over the wireless
bridge.
Rx Frames With Crc Error Number of received frames with CRC errors.
Tx/Rx Frames Q0…Q7 Number of transmitted and received frames for each Traffic Class.
Tx Drops Q0…Q7 Number of transmitted frames dropped for each Traffic Class.
Rx Drops Q0…Q7 Total number of frames dropped due to the lack of sufficient
capacity in the receive buffer, for each Traffic Class.
Main Port Counters page
Menu option:
System > Statistics > Main Port Counters
(Figure 128). Use this page to check the
Ethernet performance of the PSU port. The displayed counters vary depending on which port is
being used to bridge the traffic.
Figure 128
Main Port Counters page (when main port is bridging traffic)
Page 7-38
Chapter 7: Operation System statistics
Procedure
:
Review the attributes (Table 116).
To change the refresh period, update the Counter Page Refresh Period attribute and click
Submit Page Refresh Period
.
To reset all counters to zero, click
Reset System Counters
.
Table 116
Main Port Counters attributes
Attribute
Meaning
Tx/Rx Octets Total number of octets (bytes) transmitted and received over the
interface.
Tx/Rx Frames Total number of frames transmitted and received over the interface. This
includes both good and bad frames.
Tx Drops Total number of transmit frames dropped.
Rx Frames With Crc
Error
Total number of received frames with CRC errors.
Tx/Rx Broadcasts Total number of good transmitted and received broadcast packets.
Rx Frames
Undersize
Total number of frames received that are less than 64 bytes.
Tx/Rx Frames 64
Bytes
Total number 64 byte frames transmitted and received.
Tx/Rx Frames xxxx
to yyyy Bytes
Total number of frames transmitted and received in the size range xxxx
to yyyy bytes.
Tx/Rx Frames 1601
to Max bytes
Total number of frames transmitted and received in the size range 1601
to maximum bytes.
Rx Frames Oversize Total number of frames received that are greater than the maximum
number of bytes.
Rx Pause Frames Total number of received pause frames.
Page 7-39
Chapter 7: Operation System statistics
Aux Port Counters page
Menu option: System > Statistics >
Aux Port Counters
(Figure 129).
Use this page to check the Ethernet performance of the Aux port.
Figure 129
Aux Port Counters page (when Aux port is out-of-band local)
Procedure
:
Review the attributes (Table 117).
To change the refresh period, update the Counter Page Refresh Period attribute and click
Submit Page Refresh Period
.
To reset all counters to zero, click
Reset System Counters
.
Table 117
Aux Port Counters attributes
Attribute
Meaning
Tx/Rx Frames Total number of frames transmitted and received over the interface. This
includes both good and bad frames.
Rx Frames With Crc
Error
Total number of received frames with CRC errors.
Page 7-40
Chapter 7: Operation System statistics
SFP Port Counters page
Menu option: System > Statistics >
SFP Port Counters
(Figure 130).
Use this page to check the Ethernet performance of the SFP port.
Figure 130
SFP Port Counters page (when SFP port is out-of-band local)
Procedure
:
Update the attributes (Table 118).
To change the refresh period, update the Counter Page Refresh Period attribute and click
Submit Page Refresh Period
.
To reset all counters to zero, click
Reset System Counters
.
Table 118
SFP Port Counters attributes
Attribute
Meaning
Tx/Rx Frames Total number of frames transmitted and received over the interface. This
includes both good and bad frames.
Rx Frames With Crc
Error
Total number of received frames with CRC errors.
Page 7-41
Chapter 7: Operation System statistics
Diagnostics Plotter page
Menu option:
System
>
Diagnostics Plotter
(Figure 131).
Use this page to monitor the performance of an operational PTP 650 link over time.
Figure 131
Diagnostic Plotter page
Procedure:
Select a diagnostic from the Diagnostics Selector drop-down list. These are the same as the
System Histogram attributes in the System Statistics page (Table 110).
Tick the required Trace Selection boxes: Max, Mean and Min.
Update the Page Refresh Period as required. The default period is 3600 seconds (1 hour). To
monitor the performance of a link in real time, select a much shorter period, for example 60
seconds.
Click
Plot Selected Diagnostic
. The selected diagnostic trace is displayed in the graph.
Maximum values are displayed in red, mean values are displayed in purple and minimum
values are displayed in blue.
Page 7-42
Chapter 7: Operation System statistics
Generate Downloadable Diagnostics page
Menu option:
System > Diagnostics Plotter >
CSV Download
(Figure 132).
Use this page to download diagnostics data to a CSV file.
Figure 132
Generate Downloadable Diagnostics page
Procedure:
Select a diagnostic from the Diagnostics Selector drop-down list.
Click
Generate Diagnostics
. The Generate Downloadable Diagnostics page is redisplayed with
the name of the generated CSV file.
Click on the CSV file name and save the CSV file to the hard drive of the local computer.
Open the CSV file in MS Excel and use it to generate reports and diagrams. The CSV file
contains at most 5784 entries, recorded over a 32 day period:
o 3600 entries recorded in the last hour.
o 1440 entries recorded in the previous 24 hours.
o 744 entries recorded in the previous 31 days.
Page 7-43
Chapter 7: Operation Recovery mode
Recovery mode
This section describes how to recover a PTP 650 unit from configuration errors or software image
corruption.
Entering recovery mode
Use this procedure to enter recovery mode manually.
Note
The unit may enter recovery mode automatically, in response to some failures.
Note
Once the unit has entered recovery, it will switch back to normal operation if no access
has been made to the recovery web page within 30 seconds.
Procedure:
1
Apply power to PSU for at least 10 seconds.
2
Remove power for 5 seconds.
3
Re
-apply power to the PSU.
4
When the unit is in recovery mode, access the web interface by entering the default IP address
169.254.1.1
. The Recovery Image Warning page is displayed:
5
Click on the warning page image
. The Recovery Option Page is displayed (Figure 133).`
6
Review the Software Version and Recovery Reason (
Table 119).
7
Select a
recovery option (Table 120).
Page 7-44
Chapter 7: Operation Recovery mode
Figure 133
Recovery Options page
Table 119
Recovery Options attributes
Attribute
Meaning
Software Version The software version of the recovery operating system permanently
installed during manufacture.
Recovery Reason The reason the unit is operating in Recovery mode, for exampleInvalid
or corrupt image”.
“Unknown” usually means there has been a power outage.
MAC Address The MAC address of the unit programmed during manufacture.
Page 7-45
Chapter 7: Operation Recovery mode
Table 120
Recovery Options buttons
Button
Purpose
Upgrade Software
Image
Use this option to restore a working software version when software
corruption is suspected, or when an incorrect software image has been
loaded. Refer to Upgrading software image on page 7-46.
Reset IP & Ethernet
Configuration back to
factory defaults
Use this option to restore the IP and Ethernet attributes to their defaults.
Refer to Resetting IP & Ethernet configuration on page 7-47.
Erase Configuration Use this option to erase the entire configuration of the unit. Refer to
Erasing configuration on page 7-48.
Zeroize Critical
Security Parameters
Use this option to reset encryption keys and the system administrator
password. Refer to Zeroize Critical Security Parameters page on page 7-
50.
Reboot Use this option to reboot the unit. Refer to Rebooting the unit on page
7-51.
Upgrading software image
Use this option to restore a working software image from the Recovery Options page (Figure 133).
Procedure:
1
Click
Browse
.
2
Navigate to the required software image. This may be the most recent image if software
corruption is suspected, or an older image if an incorrect image has just been loaded. Click on
the image and click
Open
.
3
Click
Upgrade Software Image
. The Confirmation page is displayed. Click
Program Software
Image into Non-Volatile Memory
. The Upgrade Progress Tracker page is displayed:
Page 7-46
Chapter 7: Operation Recovery mode
4
When the Software Upgrade Complete page is displayed, check that the correct image has
been downloaded:
5
Click
Reboot Wireless Unit
. When the
Are you sure?
” message is displayed, click
OK
.
6
The unit will now reboot and restart in normal operational mode, and the link should recover.
If the unit or link fails to recover, refer to Testing link end hardware on page 8-2.
Resetting IP & Ethernet configuration
Use this option to reset IPv4, IPv6 and Ethernet configuration back to defaults from the Recovery
Options page (Figure 133).
Note
This procedure resets the IP Version attribute to
IPv4
. It also resets the IPv6
configuration.
Procedure:
1
Click
Reset IP & Ethernet Configuration back to factory defaults
. The reset pop up box is
displayed:
2
Record the IP address, as it will be needed to log into the unit after recovery.
Page 7-47
Chapter 7: Operation Recovery mode
3
Click
OK
. The reset confirmation page is displayed:
4
Click
Reboot
. When theAre you sure you want to REBOOT this unit?” message
is displayed, click
OK
.
5
The unit will now reboot. The unit should now start up in normal mode but with the IP and
Ethernet configuration reset to factory defaults. If the unit fails to recover, refer to Testing link
end hardware on page 8-2.
Erasing configuration
Use this option to erase the entire configuration of the unit from the Recovery Options page
(Figure 133).
Page 7-48
Chapter 7: Operation Recovery mode
Procedure:
1
Click
Erase Configuration
. The erase pop up box is displayed:
2
Click
OK
. The erase confirmation page is displayed:
3
Click
Reboot
. When the confirmation message is displayed, click
OK
.
4
The unit reboots and starts up in normal mode but with all configuration erased. If the unit
fails to start up, refer to Testing link end hardware on page 8-2.
Page 7-49
Chapter 7: Operation Recovery mode
Zeroize Critical Security Parameters page
Use this option to zeroize the critical security parameters (CSPs) of the unit from the Recovery
Options page (Figure 133).
Procedure:
1
Click
Zeroize Critical Security Parameters
. The confirmation pop up box is displayed:
2
Click
OK
. The zeroize CSPs confirmation page is displayed:
Page 7-50
Chapter 7: Operation Recovery mode
3
Click
Reboot
. When theAre you sure you want to REBOOT this unit?
message is displayed, click
OK
.
4
The unit will now reboot. The unit should now start up in normal mode but with the CSPs
zeroized. If the unit fails to recover, refer to Testing link end hardware on page 8-2.
Rebooting the unit
Use this option to reboot the unit from the Recovery Options page (Figure 133).
Procedure:
Click
Reboot
.
When theAre you sure you want to REBOOT this unit?” message is displayed,
click
OK
. The unit will now reboot. The unit should now start up in normal operational mode. If
the unit fails to start up, refer to Testing link end hardware on page 8-2.
Page 7-51
Chapter 8: Troubleshooting
This chapter contains procedures for identifying and correcting faults in a PTP 650 link. These
procedures can be performed either on a newly installed link, or on an operational link if
communication is lost, or after a lightning strike.
The following topics are described in this chapter:
Testing link end hardware on page 8-2 describes how to test the link end hardware, either
when it fails on startup, or after a lightning strike.
Testing the radio link on page 8-9 describes how to test the link when there is no radio
communication, or when it is unreliable, or when the data throughput rate is too low.
Page 8-1
Chapter 8: Troubleshooting Testing link end hardware
Testing link end hardware
This section describes how to test the link end hardware when it fails on startup or during
operation.
Before testing link end hardware, confirm that all outdoor drop cables, that is those that connect
the ODU to equipment inside the building, are of the supported type, as defined in Outdoor copper
Cat5e Ethernet cable on page 2-21.
AC Power Injector LED sequence
When the AC Power Injector is connected to the AC mains, the Power (green) LED should
illuminate within 5 seconds of connection. If this does not happen, the AC injector is either not
receiving power from the AC mains or there is a fault on the drop cable causing the power injector
to sense an over current condition on the ODU output connector.
Action
: Remove the ODU cable from the PSU and observe the effect on the power LED:
If the power LED does not illuminate, confirm that the mains supply is working, for example
check the plug and fuse (if fitted). If the power supply is working, report a suspected PSU fault
to Cambium Networks.
If the Power LED does illuminate, perform Test resistance in the drop cable on page 5-20.
AC+DC Enhanced power injector LED sequence
For the AC+DC Enhanced power injector, the expected power-up LED sequence is:
The Power (green) LED illuminates steadily.
After about 45 seconds, the Ethernet (yellow) LED blinks slowly 10 times.
The Ethernet (yellow) LED illuminates steadily, then blinks randomly to show Ethernet activity.
If this sequence does not occur, take appropriate action depending on the LED states:
Power LED is off on page 8-3
Power LED is blinking on page 8-3
Ethernet LED did not blink 10 times on page 8-3
Ethernet LED blinks ten times then stays off on page 8-4
Ethernet LED blinks irregularly on page 8-5 (for example a short blink followed by a long blink)
Power LED is on, Ethernet LED blinks randomly on page 8-5
If a fault is suspected in the ODU-PSU drop cable, perform Test resistance in the drop cable on
page 5-20.
Page 8-2
Chapter 8: Troubleshooting Testing link end hardware
Power LED is off
Meaning
: Either the PSU is not receiving power from the AC/DC outlet, or there is a wiring fault in
the ODU cable.
Action
: Remove the ODU cable from the PSU and observe the effect on the Power LED:
If the Power LED does not illuminate, confirm that the mains power supply is working, for
example, check the plug and fuse (if fitted). If the power supply is working, report a suspected
PSU fault to Cambium Networks.
If the Power LED does illuminate, perform Test resistance in the drop cable on page 5-20.
Power LED is blinking
Meaning
: The PSU is sensing there is an overload on the ODU port; this could be caused by a
wiring error on the drop cable or a faulty ODU.
Action
: Remove the ODU cable from the PSU. Check that pins 4&5 and 7&8 are not crossed with
pins 1&2 and 3&6. Check that the resistance between pins 1&8 is greater than 100K ohms. If either
check fails, replace or repair the ODU cable.
Ethernet LED did not blink 10 times
Meaning
: The ODU flashes the LED on the AC+DC Enhanced Power Injector 10 times to show that
the ODU is powered and booted correctly.
Action
:
1
Remove the ODU cable from the PSU. Examine it for signs of damage. Check that the ODU
cable resistances are correct, as specified in Test resistance in the drop cable on page 5-20. If
the ODU cable is suspect, replace it.
2
Use the LPU (if installed) to check that power is available on the cable to the ODU. Access the
connections by rotating the LPU lid as shown (slacken the lid nut but do not remove it):
Page 8-3
Chapter 8: Troubleshooting Testing link end hardware
4
Check that test point P1 on the LPU PCB corresponds to pin 1 on the RJ45. Repeat for points
P2 to P8. This test is only valid if both the PSU and the ODU are disconnected.
5
Reconnect the ODU cable to the PSU.
6
Check that the PWR LED near the top right of the LPU PCB is illuminated to indicate power in
the Ethernet cable.
7
If any test fails, replace or repair the cable that connects the PSU to the LPU or ODU.
Ethernet LED blinks ten times then stays off
Meaning
: There is no Ethernet traffic between the PSU and ODU.
Action
: The fault may be in the LAN or ODU cable:
Confirm that Ethernet traffic is connected to the AC+DC injector LAN port, confirm the cable is
not faulty, replace if necessary.
If the LAN connection to the AC+DC power injector is working, check the drop cable is correctly
wired using a suitable cable tester. Repeat the drop cable tests on page Test resistance in the
drop cable on page 5-20.
Page 8-4
Chapter 8: Troubleshooting Testing link end hardware
Ethernet LED blinks irregularly
Meaning
: If the Ethernet LED blinks irregularly, for example two rapid blinks followed by a longer
gap, this indicates that the ODU has booted in recovery mode. The causes may be: installation
wiring, or a corrupt ODU software load, or sufficient time has not been allowed between a repeat
power up.
Action
: Refer to Recovery mode on page 7-44.
Power LED is on, Ethernet LED blinks randomly
Meaning
: Both LEDs are in their normal states, implying that the PSU is receiving power from the
AC/DC outlet and there is normal Ethernet traffic between the PSU and ODU.
Action
: If, in spite of this, a fault is suspected in the link end hardware:
If the Ethernet connection to the network is only 100BASE-TX, when 1000BASE-T is expected:
remove the ODU cable from the PSU, examine it, and check that the wiring to pins 4&5 and
7&8 is correct and not crossed.
Perform Ethernet packet test on page 8-6.
Page 8-5
Chapter 8: Troubleshooting Testing link end hardware
Ethernet packet test
Follow the Ethernet packet test flowchart (Figure 134) and procedures below.
Figure 134
Ethernet packet test flowchart
Page 8-6
Chapter 8: Troubleshooting Testing link end hardware
Test Ethernet packet errors reported by ODU
Log into the unit and click
Administration
,
Statistics
,
Detailed Counters
. Click
Reset System
Counters
at the bottom of the page and wait until the Ethernet Rx Packets counter has reached 1
million (the count will only update when the page is refreshed. If the counter does not increment
or increments too slowly, because for example the PTP 650 is newly installed and there is no
offered Ethernet traffic, then abandon this procedure and consider using the procedure Test ping
packet loss on page 8-7.
Read the Ethernet Rx Crc And Align counter. The test has passed if this is less than 10.
Test Ethernet packet errors reported by managed switch or router
If the ODU is connected to a managed Ethernet switch or router, it may be possible to monitor the
error rate of Ethernet packets. Please refer to the user guide of the managed network equipment.
The test has passed if the rate of packet errors reported by the managed Ethernet switch or router
is less than 10 in 1 million packets.
Test ping packet loss
Using a computer, it is possible to generate and monitor packets lost between the PSU and the
ODU. This can be achieved by executing the Command Prompt application which is supplied as
standard with Windows and MAC operating systems.
Caution
This procedure disrupt network traffic carried by the PTP 650 under test:
Procedure:
1
Ensure that the IP address of the computer is configured appropriately for connection to
the PTP 650 under test, and does not clash with other devices connected to the network.
2
If the PSU is connected to an Ethernet switch or router then connect the computer to a spare
port, if available.
3
If it is not possible to connect the computer to a spare port of an Ethernet switch or router,
then the PSU will need to be disconnected from the network in order to execute this test:
Disconnect the PSU from the network.
Connect the computer directly to the LAN port of the PSU.
4
On the computer, open the Command Prompt application.
Page 8-7
Chapter 8: Troubleshooting Testing link end hardware
5
Send 1000 ping packets of length 1500 bytes. The process will take 1000 seconds, which is
approximately 17 minutes.
If the computer is running a Windows operating system, this is achieved by typing (for an IPv6
address, use the ping6 command):
ping –n 1000 l 1500 <ipaddress>
where <ipaddress> is the IP address of the PTP 650 ODU under test.
If the computer is running a MAC operating system, this is achieved by typing:
ping –c 1000 –s 1492 <ipaddress>
where <ipaddress> is the IP address of the PTP 650 ODU under test.
6
Record how many Ping packets have been lost. This is reported by Command Prompt on
completion of the test.
The test has passed if the number of lost packets is less than 2.
Page 8-8
Chapter 8: Troubleshooting Testing the radio link
Testing the radio link
This section describes how to test the link when there is no radio communication, when it is
unreliable, when the data throughput rate is too low, or when a unit is causing radio or TV
interference. It may be necessary to test the units at both ends of the link.
No activity
If there is no wireless activity, proceed as follows:
1
Check for Alarm conditions on Home page.
2
Check that the software at each end of the link is the same version.
3
Check that the Target Mac address is correctly configured at each end of the link.
4
Check Range.
5
Check Tx Power.
6
Check License keys to ensure that both units are the same product variant.
7
Check Master/Slave status for each unit and ensure that one unit is Master and the other unit
is slave.
8
Check that the link is not obstructed or the ODU misaligned.
9
Check the DFS page at each end of the link and establish that there is a quiet wireless channel
to use.
10
If there are no faults found in the configuration and there is absolutely no wireless signal,
retry the installation procedure.
11
If this does not work then report a suspected ODU fault to Cambium Networks.
Some activity
If there is some activity but the link is unreliable or does not achieve the data rates required,
proceed as follows:
1
Check that the interference has not increased using the DSO measurements.
2
If a quieter channel is available check that it is not barred.
3
Check that the path loss is low enough for the communication rates required.
4
Check that the ODU has not become misaligned.
Page 8-9
Chapter 8: Troubleshooting Testing the radio link
Radio and television interference
If a PTP 650 unit is interfering with radio or television reception (this can be determined by turning
the equipment off and on), attempt the following corrective actions:
Realign or relocate the antenna.
Increase the separation between the affected equipment and antenna.
Connect the ODU and PSU power supply into a power outlet on a circuit different from that to
which the receiver is connected.
Contact Cambium Point-to-Point for assistance.
Page 8-10
Glossary
Term
Definition
AES Advanced Encryption Standard
ANSI American National Standards Institution
ARP Address Resolution Protocol
ATPC Automatic Transmit Power Control
Aux Auxiliary
BBDR Broadband Disaster Relief
BPSK Binary Phase Shift Keying
BW Bandwidth
CFM Connection Fault Management
CHAP Challenge Handshake Authentication Protocol
CSP Critical Security Parameter
DC Direct Current
DER Distinguished Encoding Rules
DES Data Encryption Standard
DFS Dynamic Frequency Selection
DHCP Dynamic Host Configuration Protocol
DSCP Differentiated Services Code Point
DSO Dynamic Spectrum Optimization
EAPS Ethernet Automatic Protection Switching
EIRP Equivalent Isotropic Radiated Power
EMC Electromagnetic Compatibility
EMD Electro-Magnetic Discharge
EPL Ethernet Private Line
ETSI European Telecommunications Standards Institute
EU European Union
FAQ Frequently Asked Question
Page I
Glossary
Term
Definition
FCC Federal Communications Commission
FIPS Federal Information Processing Standards
GARP Generic Attribute Registration Protocol
GE Gigabit Ethernet
GUI Graphical User Interface
HTTP Hypertext Transfer Protocol
IB In-Band
IC Industry Canada
ICMP Internet Control Message Protocol
ICNIRP International Commission on Non-Ionizing Radiation Protection
IEEE Institute of Electrical and Electronic Engineers
IP Internet Protocol
IPSec Internet Protocol Security
ISM Industrial Scientific and Medical
ITPE Initial Transmit Power Estimate
KDB Knowledge Database
L2CP Layer Two Control Protocols
LACP Link Aggregation Control Protocol
LLDP Link Layer Discovery Protocol
LAN Local Area Network
LOS Line-of-Sight (clear line-of-sight, and Fresnel zone is clear)
LPU Lightning Protection Unit
MAC Medium Access Control Layer
MDI (-X) Medium Dependent Interface (-Crossover)
MEF Metro Ethernet Forum
MIB Management Information Base
MIMO Multiple-Input Multiple-Output
MLD Multicast Listener Discovery
MPLS Multiprotocol Label Switching
MRP Multiple Registration Protocol
Page II
Glossary
Term
Definition
MSTP Multiple Spanning Tree Protocol
MTU Maximum Transmission Unit
NA Neighbor Advertisement
NLOS Non-Line-of-Sight
NMEA National Marine Electronics Association
NS Neighbor Solicitation
NTP Network Time Protocol
NUD Neighbor Un-reachability Detection
ODU Outdoor Unit
OFDM Orthogonal Frequency Division Multiplex
OOB Out-of-Band
PC IBM Compatible Personal Computer
PEAP Protected Extensible Authentication Protocol
PIDU Powered Indoor Unit
POE Power over Ethernet
PSU Power Supply Unit
PTP Point-to-Point
QAM Quadrature Amplitude Modulation
QoS Quality of Service
QPSK Quadrature Phase Shift Keying
R-APS Ring Automatic Protection Switching
RADIUS Remote Authentication Dial-In Service
RAM Random Access Memory
RF Radio Frequency
RFC Request for Comments
RoW Rest of World
RMA Return Material Authorization
RSSI Received Signal Strength Indication
RSTP Rapid Spanning Tree Protocol
SELV Safety Extra Low Voltage
Page III
Glossary
Term
Definition
SFP Small Form-factor Pluggable
SLAAC Stateless Address Auto-configuration
SMTP Simple Mail Transport Protocol
SNMP Simple Network Management Protocol
SNTP Simple Network Time Protocol
STP Spanning Tree Protocol
Syslog System Logging
TC Traffic Class
TCP Transmission Control Protocol
TDD Time Division Duplexing
TDM Time Division Multiplexing
TDWR Terminal Doppler Weather Radar
TGB Tower Ground Bus bar
TLS Transport Layer Security
UNII Unlicensed National Information Infrastructure
URL Universal Resource Location
USM User-based Security Model
UTC time Coordinated Universal Time
UTP Unshielded Twisted Pair
UV Ultraviolet
VACM View-based Access Control Model
VLAN Virtual Local Area Network
WEEE Waste Electrical and Electronic Equipment
Page IV

Navigation menu