Cambium Networks 50650 Wireless Ethernet Bridge User Manual PTP 650 Series User Guide

Cambium Networks Limited Wireless Ethernet Bridge PTP 650 Series User Guide

User Manual Part 2

Download: Cambium Networks 50650 Wireless Ethernet Bridge User Manual PTP 650 Series User Guide
Mirror Download [FCC.gov]Cambium Networks 50650 Wireless Ethernet Bridge User Manual PTP 650 Series User Guide
Document ID2061302
Application IDvFM57qstz4xQgGpoJ3VIRw==
Document DescriptionUser Manual Part 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize365.56kB (4569448 bits)
Date Submitted2013-09-04 00:00:00
Date Available2014-01-27 00:00:00
Creation Date2013-08-30 14:25:58
Producing SoftwareAdobe PDF Library 11.0
Document Lastmod2013-09-02 09:30:02
Document TitlePTP 650 Series User Guide
Document CreatorAcrobat PDFMaker 11 for Word
Document Author: Cambium Networks

Chapter 5: Installation
This chapter describes how to install and test the hardware for a PTP 650 link. It contains the
following topics:
•
Safety on page 5-2 contains important safety guidelines that must be observed by personnel
installing or operating PTP 650 equipment.
•
Installing the ODU and top LPU on page 5-5 describes how to mount and ground an integrated
or connectorized ODU, how to mount and ground the top LPU, and how to mount and connect
an external antenna for the connectorized ODU.
•
Installing the copper Cat5e Ethernet interface on page 5-13 describes how to install the copper
Cat5e power over Ethernet interface from the ODU (PSU port) to the PSU.
•
Installing the PSU on page 5-21 describes how to install a power supply unit for the PTP 650,
either the AC Power Injector or the AC+DC Enhanced Power Injector.
•
Installing an SFP Ethernet interface on page 5-23 describes how to install an optical or copper
Cat5e Ethernet interface from the ODU (SFP port) to a connected device.
•
Installing an Aux Ethernet interface on page 5-32 describes how to install a copper Cat5e
Ethernet interface from the ODU (Aux port) to a connected device.
•
Supplemental installation information on page 5-33 contains detailed installation procedures
that are not included in the above topics, such as how to strip cables, create grounding points
and weatherproof connectors.
Note
These instructions assume that LPUs are being installed from the PTP 650 LPU and
grounding kit (Cambium part number C000065L007). If the installation does not
require LPUs, adapt these instructions as appropriate.
If LPUs are being installed, only use the five black-capped EMC cable glands supplied
in the LPU and grounding kit. The silver-capped cable glands supplied in the ODU kits
must only be used in PTP 650 installations which do not require LPUs.
Page 5-1
Chapter 5: Installation
Safety
Safety
Warning
To prevent loss of life or physical injury, observe the following safety guidelines. In no
event shall Cambium Networks be liable for any injury or damage caused during the
installation of the Cambium PTP 650. Ensure that only qualified personnel install a PTP
650 link.
Power lines
Exercise extreme care when working near power lines.
Working at heights
Exercise extreme care when working at heights.
PSU
Always use one of the Cambium PTP 650 Series power supply units (PSU) to power the ODU.
Failure to use a Cambium supplied PSU could result in equipment damage and will invalidate the
safety certification and may cause a safety hazard.
Grounding and protective earth
The Outdoor Unit (ODU) must be properly grounded to protect against lightning. It is the user’s
responsibility to install the equipment in accordance with national regulations. In the USA follow
the requirements of the National Electrical code NFPA 70-2005 and 780-2004 Installation of
Lightning Protection Systems. In Canada, follow Section 54 of the Canadian Electrical Code. These
codes describe correct installation procedures for grounding the outdoor unit, mast, lead-in wire
and discharge unit, size of grounding conductors and connection requirements for grounding
electrodes. Other regulations may apply in different countries and therefore it is recommended
that installation of the outdoor unit be contracted to a professional installer.
Page 5-2
Chapter 5: Installation
Safety
DC supply
To power the ODU from a DC supply, use the AC+DC Enhanced Power Injector (PSU) (Cambium
part number C000065L002). Ensure that the DC power supply meets the requirements specified in
PSU DC power supply on page 3-12.
Powering down before servicing
Before servicing PTP 650 equipment, always switch off the power supply and unplug it from the
PSU.
Do not disconnect the RJ45 drop cable connectors from the ODU while the PSU is connected to the
power supply. Always remove the AC or DC input power from the PSU.
Primary disconnect device
The main power supply is the primary disconnect device. The AC+DC Enhanced power injector is
fused on the DC input. Some installations will also require an additional circuit breaker or isolation
switch to be fitted in the DC supply.
External cables
Safety may be compromised if outdoor rated cables are not used for connections that will be
exposed to the outdoor environment. For outdoor copper Cat5e Ethernet interfaces, always use
Cat5e cable that is gel-filled and shielded with copper-plated steel. Alternative types of drop cable
are not supported by Cambium Networks.
Drop cable tester
The PSU output voltage may be hazardous in some conditions, for example in wet weather. Do
NOT connect the drop cable tester to the PSU, either directly or via LPUs.
RF exposure near the antenna
Strong radio frequency (RF) fields will be present close to the antenna when the transmitter is on.
Always turn off the power to the ODU before undertaking maintenance activities in front of the
antenna.
Page 5-3
Chapter 5: Installation
Safety
Minimum separation distances
Ensure that personnel are not exposed to unsafe levels of RF energy. The units start to radiate RF
energy as soon as they are powered up. Never work in front of the antenna when the ODU is
powered. Install the ODUs so as to provide and maintain the minimum separation distances from
all persons. For minimum separation distances, see Calculated distances and power compliance
margins on page 4-25.
Grounding and lightning protection requirements
Ensure that the installation meets the requirements defined in Grounding and lightning protection
on page 3-8.
Grounding cable installation methods
To provide effective protection against lightning induced surges, observe these requirements:
•
Grounding conductor runs are as short, straight and smooth as possible, with bends and
curves kept to a minimum.
•
Grounding cables must not be installed with drip loops.
•
All bends must have a minimum radius of 203 mm (8 in) and a minimum angle of 90°. A
diagonal run is preferable to a bend, even though it does not follow the contour or run parallel
to the supporting structure.
•
All bends, curves and connections must be routed towards the grounding electrode system,
ground rod, or ground bar.
•
Grounding conductors must be securely fastened.
•
Braided grounding conductors must not be used.
•
Approved bonding techniques must be used for the connection of dissimilar metals.
Siting ODUs and antennas
ODUs and external antennas are not designed to survive direct lightning strikes. For this reason
they must be installed in Zone B as defined in Lightning protection zones on page 3-8. Mounting in
Zone A may put equipment, structures and life at risk.
Page 5-4
Chapter 5: Installation
Installing the ODU and top LPU
Installing the ODU and top LPU
Decide how to mount the ODU and top LPU
Page 5-5
Chapter 5: Installation
Installing the ODU and top LPU
Note
For improved radio performance, mount the
integrated ODU at 45 degrees to the vertical.
The mounting pole may be vertical or
horizontal.
Prepare ODU for mounting
1 Use the correct mounting bracket for the pole diameter and ODU type:
•
If pole diameter is between 50 and 75 mm (2 and 3 inches):
(a) For an integrated ODU, use the integrated mounting bracket, Cambium part number
N000065L031.
(b) For a connectorized ODU, use the connectorized mounting bracket supplied with the
ODU (alternatively, use the integrated ODU bracket).
•
If pole diameter is either 90 mm (3.5 inches) or 115 mm (4.5 inches):
(c) For both integrated and connectorized ODUs, use the extended mounting bracket,
Cambium part number N000065L030.
(a) Integrated bracket:
(b) Connectorized bracket:
Page 5-6
(c) Extended bracket:
Chapter 5: Installation
Installing the ODU and top LPU
2 (a) Fasten one ground cable to each ODU grounding point using the M6 (small) lugs: one is for
the top LPU (M6 lug at other end) and the other is for the tower or building (M10 lug at other
end). It does not matter which cable goes on which ODU grounding point. (b) Tighten both
ODU grounding bolts to a torque of 5 Nm (3.9 lb ft).
(a) ODU ground cables:
(b) ODU ground cable tightened:
Integrated ODU
1 (a) Fix the mounting plate to the back of the ODU at an angle of 45 degrees to the vertical using
the bolts and washers provided. Tighten the four bolts to a torque setting of 5 Nm (4 lb ft).
(b) Fix the bracket body to the mounting plate using the M8 bolt.
(a) Fix the mounting plate:
(b) Fix the bracket body:
2 Hoist the ODU up to its position on the mounting pole.
Page 5-7
Chapter 5: Installation
Installing the ODU and top LPU
3 (a) For back-to-back LPU mounting, fix the ODU to the pole using the LPU.
(b) For separate LPU mounting, fix the ODU to the pole using the bracket strap.
(a) Back-to-back LPU:
(b) Separate LPU:
Caution
Do not reverse the ODU bracket strap,
as this arrangement may lead to failure
of the assembly:
4 Adjust the elevation (E) and azimuth (A) of the unit to achieve initial alignment. Tighten all three
M8 ODU bracket bolts to a torque setting of 14 Nm (11 lb ft). Do not over-tighten the bolts, as
this may lead to failure of the assembly:
Page 5-8
Chapter 5: Installation
Installing the ODU and top LPU
Connectorized ODU
1 (a) Line up the bolt heads with receptacles in the ODU. (b) Fix the mounting plate and bracket
bolts to the back of the ODU using the bolts and washers. Tighten to a torque setting of 5 Nm (4
lb ft).
(a) Receptacles for bracket bolts:
(b) Mounting plate fixed:
2 Hoist the ODU up to its position on the mounting pole.
3 (a) For back-to-back LPU mounting, fix the ODU to the pole using the LPU.
(b) For separate LPU mounting, fix the ODU to the pole using the bracket strap.
(c) Back-to-back LPU:
(d) Separate LPU:
4 Tighten the mounting bolts to a torque setting of 7 Nm (5.5 lb ft). Do not over-tighten the bolts,
as this may lead to failure of the assembly.
Page 5-9
Chapter 5: Installation
Installing the ODU and top LPU
Ground the ODU and top LPU
Caution
Do not attach grounding cables to the ODU mounting bracket bolts, as this
arrangement will not provide full protection.
1 For separate LPU mounting, use the U-bolt bracket from the LPU kit to mount the top LPU on the
pole below the ODU. Tighten to a torque setting of 7 Nm (5.5 lb ft):
2 Fasten the ODU grounding cable to the top LPU using the M6 (small) lug. Tighten both nuts to a
torque of 5 Nm (3.9 lb ft):
Locking nut
Washer
M6 lug
Washer
Nut
Toothed washer
M6 lug to ODU
3 Select a tower or building grounding point within 0.3 meters (1 ft) of the ODU bracket. Remove
paint from the surface and apply anti-oxidant compound. Fasten the ODU grounding cable to this
point using the M10 (large) lug.
4 If local regulations mandate the independent grounding of all devices, add a third ground cable to
connect the top LPU directly to the grounding system.
Page 5-10
Chapter 5: Installation
Installing the ODU and top LPU
Install external antennas for a connectorized ODU
1 Mount the antenna(s) according to manufacturer’s instructions. When using separate antennas
to achieve spatial diversity, mount one with Horizontal polarization and the other with Vertical
polarization.
2 Connect the ODU V and H interfaces to the antenna(s) with RF cable of type CNT-400
(Cambium part numbers 30010194001 and 30010195001) and N type connectors (Cambium
part number 09010091001). Tighten the N type connectors to a torque setting of 1.7 Nm (1.3 lb
ft).
3 If the ODU is mounted indoors, install lightning arrestors at the building entry point:
4 Form drip loops near the lower ends of the antenna cables. These ensure that water is not
channeled towards the connectors.
5 If the ODU is mounted outdoors, weatherproof the N type connectors (when antenna
alignment is complete) using PVC tape and self-amalgamating rubber tape.
6 Weatherproof the antenna connectors in the same way (unless the antenna manufacturer
specifies a different method).
Page 5-11
Chapter 5: Installation
Installing the ODU and top LPU
7 Ground the antenna cables to the supporting structure within 0.3 meters (1 foot) of the ODU
and antennas using the Cambium grounding kit (part number 01010419001):
8 Fix the antenna cables to the supporting structure using site approved methods. Ensure that no
undue strain is placed on the ODU or antenna connectors.
Caution
Ensure that the cables do not flap in the wind, as flapping cables are prone to damage
and induce unwanted vibrations in the supporting structure.
Page 5-12
Chapter 5: Installation
Installing the copper Cat5e Ethernet interface
Installing the copper Cat5e Ethernet interface
Caution
To avoid damage to the installation, do not connect or disconnect the drop cable when
power is applied to the PSU or network terminating equipment.
Caution
Do not connect the SFP or Aux drop cables to the PSU, as this may damage
equipment.
Caution
Always use Cat5e cable that is gel-filled and shielded with copper-plated steel.
Alternative types of Cat5e cable are not supported by Cambium Networks. Cambium
Networks supply this cable (Cambium part numbers WB3175 and WB3176), RJ45
connectors (Cambium part number WB3177) and a crimp tool (Cambium part number
WB3211). The LPU and grounding kit contains a 600 mm length of this cable.
Install the ODU to top LPU drop cable
Fit glands to the ODU to top LPU drop cable
Fit EMC strain relief cable glands (with black caps) to both ends of the 600 mm length of
pre-terminated cable. These parts are supplied in the LPU and grounding kit.
Disassemble the gland and thread each part onto the cable (the rubber bung is split).
Assemble the spring clip and the rubber bung:
Page 5-13
Chapter 5: Installation
Installing the copper Cat5e Ethernet interface
Fit the parts into the body and lightly screw on the gland nut (do not tighten it):
Connect the drop cable to the ODU (PSU port) and LPU
(a) Plug the RJ45 connector into the socket in the unit, ensuring that it snaps home.
(b) Fit the gland body to the RJ45 port and tighten it to a torque of 5.5 Nm (4.3 lb ft):
(a)
(b)
(a) Fit the gland nut and tighten until the rubber seal closes on the cable. (b) Do not overtighten the gland nut, as there is a risk of damage to its internal components:
(a)
(b)
Correct
Page 5-14
Incorrect
Chapter 5: Installation
Installing the copper Cat5e Ethernet interface
Disconnect the drop cable from the LPU or ODU
Use this procedure if it is necessary to remove an EMC strain relief cable gland and RJ45
connector from the ODU (as illustrated) or LPU.
(a) Remove the gland nut. Wiggle the drop cable to release the tension of the gland body.
When the tension in the gland body is released, a gap opens at the point show. Unscrew the
gland body.
(b) Use a small screwdriver to press the RJ45 locking tab, then remove the RJ45 connector.
(a)
(b)
Install the main drop cable
Warning
The metal screen of the drop cable is very sharp and may cause personal injury.
•
ALWAYS wear cut-resistant gloves (check the label to ensure they are cut
resistant).
•
ALWAYS wear protective eyewear.
•
ALWAYS use a rotary blade tool to strip the cable (DO NOT use a bladed knife).
Page 5-15
Chapter 5: Installation
Installing the copper Cat5e Ethernet interface
Warning
Failure to obey the following precautions may result in injury or death:
•
Use the proper hoisting grip for the cable being installed. If the wrong hoisting
grip is used, slippage or insufficient gripping strength will result.
•
Do not reuse hoisting grips. Used grips may have lost elasticity, stretched, or
become weakened. Reusing a grip can cause the cable to slip, break, or fall.
•
The minimum requirement is one hoisting grip for each 60 m (200 ft) of cable.
Cut to length and fit hoisting grips
Cut the main drop cable to length from the top LPU to the bottom LPU.
Slide one or more hoisting grips onto the top end of the drop cable.
Secure the hoisting grip to the cable using a special tool, as recommended by the
manufacturer.
Terminate with RJ45 connectors and glands
Caution
Check that the crimp tool matches the RJ45 connector, otherwise the cable or
connector may be damaged.
Thread the cable gland (with black cap) onto the main drop cable.
Strip the cable outer sheath and fit the RJ45 connector load bar.
Page 5-16
Chapter 5: Installation
Installing the copper Cat5e Ethernet interface
Fit the RJ45 connector housing as shown. To ensure there is effective strain relief, locate the
cable inner sheath under the connector housing tang. Do not tighten the gland nut:
Hoist and fix the main drop cable
Warning
Failure to obey the following precautions may result in injury or death:
•
Use the hoisting grip to hoist one cable only. Attempting to hoist more than one
cable may cause the hoisting grip to break or the cables to fall.
•
Do not use the hoisting grip for lowering cable unless the clamp is securely in
place.
•
Maintain tension on the hoisting grip during hoisting. Loss of tension can cause
dangerous movement of the cable and result in injury or death to personnel.
•
Do not release tension on the grip until after the grip handle has been fastened to
the supporting structure.
•
Do not apply any strain to the RJ45 connectors.
Caution
Do not lay the drop cable alongside a lightning air terminal.
Hoist the top end of the main drop cable up to the top LPU, following the hoist manufacturer’s
instructions. When the cable is in position, fasten the grip handle to the supporting structure
and remove the hoist line.
Connect the main drop cable to the top LPU by following the procedure Connect the drop
cable to the ODU (PSU port) and LPU on page 5-14.
Run the main drop cable to the site of the bottom LPU.
Page 5-17
Chapter 5: Installation
Installing the copper Cat5e Ethernet interface
Attach the main drop cable to the supporting structure using site approved methods.
Ground the main drop cable
At all required grounding points, connect the screen of the main drop cable to the metal of the
supporting structure using the cable grounding kit (Cambium part number 01010419001).
Install the bottom LPU to PSU drop cable
Install the bottom LPU
Install the bottom LPU, ground it, and connect it to the main drop cable.
1 Select a mounting point for the bottom LPU within 600 mm (24 in) of the building entry point.
Mount the LPU vertically with cable glands facing downwards.
Connect the main drop cable to the bottom LPU by following the procedure Connect the drop cable
to the ODU (PSU port) and LPU on page 5-14.
Page 5-18
Chapter 5: Installation
Installing the copper Cat5e Ethernet interface
Fasten one ground cable to the bottom LPU using the M6 (small) lug. Tighten both nuts to a
torque of 5 Nm (3.9 lb ft):
Locking nut
Washer
M6 lug
Washer
Nut
Toothed washer
M10 lug to ground
Select a building grounding point near the LPU bracket. Remove paint from the surface and
apply anti-oxidant compound. Fasten the LPU ground cable using the M10 (large) lug.
Install the LPU to PSU drop cable
Use this procedure to terminate the bottom LPU to PSU drop cable with RJ45 connectors at both
ends, and with a cable gland at the LPU end.
Warning
The metal screen of the drop cable is very sharp and may cause personal injury.
ALWAYS wear cut-resistant gloves (check the label to ensure they are cut resistant).
ALWAYS wear protective eyewear. ALWAYS use a rotary blade tool to strip the cable,
not a bladed knife.
Caution
Check that the crimp tool matches the RJ45 connector, otherwise the cable or
connector may be damaged.
Cut the drop cable to the length required from bottom LPU to PSU.
2 At the LPU end only:
•
Fit one cable gland and one RJ45 connector by following the procedure Terminate with
RJ45 connectors and glands on page 5-16.
•
Connect this cable and gland to the bottom LPU by following the procedure Connect the
drop cable to the ODU (PSU port) and LPU on page 5-14.
Page 5-19
Chapter 5: Installation
Installing the copper Cat5e Ethernet interface
At the PSU end only: Do not fit a cable gland. Strip the cable outer sheath and fit the RJ45
connector load bar. Fit the RJ45 connector housing. To ensure there is effective strain relief,
locate the cable inner sheath under the connector housing tang:
Test resistance in the drop cable
Connect the bottom end of the copper Cat5e drop cable to a PTP drop cable tester and test that the
resistances between pins are within the correct limits, as specified in the table below. If any of the
tests fail, examine the drop cable for wiring faults. Order the PTP drop cable tester from the
support website (http://www.cambiumnetworks.com/support).
Measure the
resistance
between…
Enter
measured
resistance
To pass test,
resistance must
be…
Circle
“Pass” or
“Fail”
Pins 1 and 2
Ohms
<20 Ohms
(60 Ohms) (*1)
Pass
Fail
Pins 3 and 6
Ohms
<20 Ohms
(60 Ohms) (*1)
Pass
Fail
Pins 4 and 5
Ohms
<20 Ohms
(60 Ohms) (*1)
Pass
Fail
Pins 7 and 8
Ohms
<20 Ohms
(60 Ohms) (*1)
Pass
Fail
Pin 1 and screen
(ODU ground)
K Ohms
>100K Ohms
Pass
Fail
Pin 8 and screen
(ODU ground)
K Ohms
>100K Ohms
Pass
Fail
Additional tests and
notes
Resistances must be
within 10% of each other
(*2). Circle “Pass” or
“Fail”:
Pass
Fail
These limits apply
regardless of cable
length.
(*1) A resistance of 20 Ohms is the maximum allowed when the cable is carrying Ethernet.
A resistance of 60 Ohms is the maximum allowed when the cable is carrying only power to the
ODU (when Ethernet is carried by one of the other ODU interfaces).
(*2) Ensure that these resistances are within 10% of each other by multiplying the lowest
resistance by 1.1 – if any of the other resistances are greater than this, the test has failed.
Page 5-20
Chapter 5: Installation
Installing the PSU
Installing the PSU
Install one of the following types of PSU (as specified in the installation plan):
•
PTP 650 AC Power Injector (Cambium part number N000065L001).
•
PTP 650 AC+DC Enhanced Power Injector (Cambium part number C000065L002).
Caution
As the PSU is not waterproof, locate it away from sources of moisture, either in the
equipment building or in a ventilated moisture-proof enclosure. Do not locate the
PSU in a position where it may exceed its temperature rating.
Caution
Do not plug any device other than a PTP 650 ODU into the ODU port of the PSU. Other
devices may be damaged due to the non-standard techniques employed to inject DC
power into the Ethernet connection between the PSU and the ODU.
Do not plug any device other than a Cambium PTP 650 PSU into the PSU port of the
ODU. Plugging any other device into the PSU port of the ODU may damage the ODU
and device.
Installing the AC Power Injector
Follow this procedure to install the AC Power Injector (Cambium part number N000065L001):
Form a drip loop on the PSU end of the LPU to PSU drop cable. The drip loop ensures that
any moisture that runs down the cable cannot enter the PSU.
(a) Place the AC Power Injector on a horizontal surface. Plug the LPU to PSU drop cable into
the PSU port labeled ODU. (b) When the system is ready for network connection, connect the
network Cat5e cable to the LAN port of the PSU:
(a)
(b)
Page 5-21
Chapter 5: Installation
Installing the PSU
Installing the AC+DC Enhanced Power Injector
Follow this procedure to install the AC+DC Enhanced Power Injector (Cambium part number
C000065L002):
Mount the AC+DC power injector by screwing it to a vertical or horizontal surface using the
four screw holes (circled):
Form a drip loop on the PSU end of the LPU to PSU drop cable. The drip loop ensures that
any moisture that runs down the cable into the cabinet or enclosure cannot enter the PSU.
(a) Undo the retaining screw, hinge back the cover and plug the drop cable into the port. (b)
Close the cover and secure with the screw. (c) When the system is ready for network
connection, connect the network Cat5e cable to the LAN port of the PSU:
(a)
(b) and (c)
Page 5-22
Chapter 5: Installation
Installing an SFP Ethernet interface
Installing an SFP Ethernet interface
In more advanced configurations, there may be an optical or copper Cat5e Ethernet interface
connected to the SFP port of the ODU. Refer to Typical deployment on page 3-2 for diagrams of
these configurations.
Adapt the installation procedures in this chapter as appropriate for SFP interfaces, noting the
following differences from a PSU interface:
•
Install an optical or copper SFP module in the ODU (SFP port) and connect the SFP optical or
copper cable into this module using the long cable gland from the SFP module kit. This is
described in the following procedures:
Fitting the long cable gland on page 5-25
Inserting the SFP module on page 5-26
Connecting the cable on page 5-29
Fitting the gland on page 5-30
Removing the cable and SFP module on page 5-31
•
Optical cables do not require LPUs or ground cables.
•
At the remote end of an SFP drop cable, use an appropriate termination for the connected
device.
•
If the connected device is outdoors, not in the equipment building or cabinet, adapt the
grounding instructions as appropriate.
•
PTP 650 LPUs are not suitable for installation on SFP copper Cat5e interfaces. For SFP drop
cables, obtain suitable surge protectors from a specialist supplier.
•
Ground the top LPUs and surge protector to the same point on the ODU (Figure 57).
Page 5-23
Chapter 5: Installation
Installing an SFP Ethernet interface
Figure 57 ODU with copper Cat5e connections to all three Ethernet ports
Page 5-24
Chapter 5: Installation
Installing an SFP Ethernet interface
Fitting the long cable gland
Optical SFP interface: Disassemble the long cable gland and thread its components over the LC
connector at the ODU end as shown below.
Copper Cat5e SFP interface: Disassemble the long cable gland and thread its components over the
RJ45 connector at the ODU end as shown below.
Disassemble the gland:
Thread each part onto the cable (the rubber bung is split):
Assemble the spring clip and the rubber bung (the clips go inside the ring):
Page 5-25
Chapter 5: Installation
Installing an SFP Ethernet interface
Fit the parts into the body and lightly screw on the gland nut (do not tighten it):
Optical
Copper
Inserting the SFP module
To insert the SFP module into the ODU, proceed as follows:
Remove the blanking plug from the SFP port of the ODU:
Page 5-26
Chapter 5: Installation
Insert the SFP module into the SFP receptacle with the label up:
Optical
Installing an SFP Ethernet interface
Copper
Push the module home until it clicks into place:
Optical
Copper
Page 5-27
Chapter 5: Installation
Installing an SFP Ethernet interface
Rotate the latch to the locked position:
Optical
Copper
Page 5-28
Chapter 5: Installation
Installing an SFP Ethernet interface
Connecting the cable
Caution
The fiber optic cable assembly is very delicate. To avoid damage, handle it with
extreme care. Ensure that the fiber optic cable does not twist during assembly,
especially when fitting and tightening the weatherproofing gland.
Do not insert the power over Ethernet drop cable from the PSU into the SFP module,
as this will damage the module.
Remove the LC connector dust caps from the ODU end (optical cable only):
Plug the connector into the SFP module, ensuring that it snaps home:
Optical
Copper
Page 5-29
Chapter 5: Installation
Installing an SFP Ethernet interface
Fitting the gland
Fit the gland body to the SFP port and tighten it to a torque of 5.5 Nm (4.3 lb ft)
Fit the gland nut and tighten until the rubber seal closes on the cable. Do not over-tighten
the gland nut, as there is a risk of damage to its internal components:
Correct
Incorrect
Page 5-30
Chapter 5: Installation
Installing an SFP Ethernet interface
Removing the cable and SFP module
Do not attempt to remove the module without disconnecting the cable, otherwise the locking
mechanism in the ODU will be damaged.
Remove the cable connector by pressing its release tab before pulling it out:
Optical
Copper
Rotate the latch to the unlocked position. Extract the module by using a screwdriver:
Optical
Copper
Page 5-31
Chapter 5: Installation
Installing an Aux Ethernet interface
Installing an Aux Ethernet interface
In more advanced configurations, there may be a copper Cat5e Ethernet interface connected to the
Aux port of the ODU. Refer to Typical deployment on page 3-2 for a diagram of this configuration.
Adapt the installation procedures in this chapter as appropriate for the Aux interface, noting the
following differences:
•
At the remote end of the Aux drop cable, use an appropriate termination for the connected
device (for example, a video camera or wireless access point).
•
If the connected device is outdoors, not in the equipment building or cabinet, adapt the
grounding instructions as appropriate.
•
Ground the top LPUs and surge protector to the same point on the ODU (Figure 57).
Page 5-32
Chapter 5: Installation
Supplemental installation information
Supplemental installation information
This section contains detailed installation procedures that are not included in the above topics,
such as how to strip cables, create grounding points and weatherproof connectors.
Stripping drop cable
When preparing drop cable for connection to the PTP 650 ODU or LPU, use the following
measurements:
When preparing drop cable for connection to the PTP 650 PSU (without a cable gland), use the
following measurements:
Page 5-33
Chapter 5: Installation
Supplemental installation information
Creating a drop cable grounding point
Use this procedure to connect the screen of the main drop cable to the metal of the supporting
structure using the cable grounding kit (Cambium part number 01010419001).
To identify suitable grounding points, refer to Drop cable grounding points on page 3-13.
Remove 60 mm (2.5 inches) of the drop cable outer sheath.
Cut 38mm (1.5 inches) of rubber tape (self-amalgamating) and fit to the ground cable lug.
Wrap the tape completely around the lug and cable.
Fold the ground wire strap around the drop cable screen and fit cable ties.
Page 5-34
Chapter 5: Installation
Supplemental installation information
Tighten the cable ties with pliers. Cut the surplus from the cable ties.
Cut a 38mm (1.5 inches) section of self-amalgamating tape and wrap it completely around the
joint between the drop and ground cables.
Use the remainder of the self-amalgamating tape to wrap the complete assembly. Press the
tape edges together so that there are no gaps.
Page 5-35
Chapter 5: Installation
Supplemental installation information
Wrap a layer of PVC tape from bottom to top, starting from 25 mm (1 inch) below and
finishing 25 mm (1 inch) above the edge of the self-amalgamating tape, over lapping at half
width.
Repeat with a further four layers of PVC tape, always overlapping at half width. Wrap the
layers in alternate directions (top to bottom, then bottom to top). The edges of each layer
should be 25mm (1 inch) above (A) and 25 mm (1 inch) below (B) the previous layer.
Prepare the metal grounding point of the supporting structure to provide a good electrical
contact with the grounding cable clamp. Remove paint, grease or dirt, if present. Apply antioxidant compound liberally between the two metals.
Page 5-36
Chapter 5: Installation
Supplemental installation information
10 Clamp the bottom lug of the grounding cable to the supporting structure using site approved
methods. Use a two-hole lug secured with fasteners in both holes. This provides better
protection than a single-hole lug.
Weatherproofing an N type connector
Use this procedure to weatherproof the N type connectors fitted to the connectorized ODU and
external antenna (if recommended by the antenna manufacturer).
Ensure the connection is tight. A torque wrench should be used if available:
Wrap the connection with a layer of 19 mm (0.75 inch) PVC tape, starting 25 mm (1 inch)
below the connector body. Overlap the tape to half-width and extend the wrapping to the
body of the LPU. Avoid making creases or wrinkles:
Smooth the tape edges:
Page 5-37
Chapter 5: Installation
Supplemental installation information
Cut a 125mm (5 inches) length of rubber tape (self-amalgamating):
Expand the width of the tape by stretching it so that it will wrap completely around the
connector and cable:
Press the tape edges together so that there are no gaps. The tape should extend 25 mm
(1 inch) beyond the PVC tape:
Wrap a layer of 50 mm (2 inch) PVC tape from bottom to top, starting from 25 mm (1 inch)
below the edge of the self-amalgamating tape, overlapping at half width.
Page 5-38
Chapter 5: Installation
Supplemental installation information
Repeat with a further four layers of 19 mm (0.75 inch) PVC tape, always overlapping at half
width. Wrap the layers in alternate directions:
•
Second layer: top to bottom.
•
Third layer: bottom to top.
•
Fourth layer: top to bottom.
•
Fifth layer: bottom to top.
The bottom edge of each layer should be 25 mm (1 inch) below the previous layer.
Check the completed weatherproof connection:
Page 5-39
Chapter 5: Installation
Supplemental installation information
Replacing PSU fuses
The AC+ DC Enhanced Power Injector contains two replaceable fuses. These fuses protect the
positive and negative grounded DC input voltages. If an incorrect power supply (that is, not in the
range 37V to 60V DC) is connected to the DC input terminals, one or both fuses may blow.
Both fuses are 3 Amp slow-blow, for example Littlefuse part number 0229003.
To replace these fuses, undo the retaining screw and hinge back the cover as indicated:
Note
No other fuses are replaceable in the AC+DC Enhanced Power Injector.
Note
The AC Power Injector does not contain replaceable fuses.
Page 5-40
Chapter 6: Configuration and alignment
This chapter describes how to use the web interface to configure the PTP 650 link. It also describes
how to align antennas. This chapter contains the following topics:
•
Preparing for configuration and alignment on page 6-2
•
Connecting to the unit on page 6-5
•
Using the web interface on page 6-7
•
Installation menu on page 6-10
•
System menu on page 6-21
•
Management menu on page 6-39
•
SNMP pages (for SNMPv3) on page 6-61
•
SNMP pages (for SNMPv1/2c) on page 6-71
•
Security menu on page 6-75
•
Aligning antennas on page 6-87
•
Other configuration tasks on page 6-95
Page 6-1
Chapter 6: Configuration and alignment
Preparing for configuration and alignment
Preparing for configuration and alignment
This section describes the checks to be performed before proceeding with unit configuration and
antenna alignment.
Safety precautions
All national and local safety standards must be followed while configuring the units and aligning
the antennas.
Warning
Ensure that personnel are not exposed to unsafe levels of RF energy. The units start to
radiate RF energy as soon as they are powered up. Respect the safety standards
defined in Compliance with safety standards on page 4-23, in particular the minimum
separation distances.
Observe the following guidelines:
•
Never work in front of the antenna when the ODU is powered.
•
Always power down the PSU before connecting or disconnecting the drop cable
from the PSU, ODU or LPU.
Regulatory compliance
All applicable radio regulations must be followed while configuring the units and aligning the
antennas. For more information, refer to Compliance with radio regulations on page 4-27.
Caution
If the system designer has provided a list of channels to be barred for TDWR radar
avoidance, the affected channels must be barred before the units are allowed to
radiate on site, otherwise the regulations will be infringed. To bar these channels,
follow the procedure Barring channels on page 7-31.
Selecting configuration options
Use the installation report to determine which configuration options are required. Refer to PTP
LINKPlanner on page 3-21.
Page 6-2
Chapter 6: Configuration and alignment
Preparing for configuration and alignment
Generating a License Key
ODUs are shipped with a default License Key factory installed. The default license key enables a
limited set of capabilities as follows:
•
•
Operation in selected regulatory bands (these are restricted by the ODU regional variant):
FCC/IC variants: 5.8 GHz USA (regulatory band 1).
RoW variants: 5.4 GHz unrestricted (regulatory band 8) and 5.8 GHz unrestricted
(regulatory band 35).
EU variants: 5.4 GHz ETSI (regulatory band 26)
“Lite” throughput capability (up to 125 Mbps).
A license key is required to upgrade the ODU to the following capabilities:
•
To allow the ODU to operate in other regulatory bands (these are restricted by the ODU
regional variant). This capability is free of charge.
•
To enable the SFP port. An Access Key for this capability is provided in the SFP module kits
(SFP module kits on page 2-27).
•
To allow “Med” (up to 250 Mbps) or “Full” (up to 450 Mbps) throughput capability. Purchase
an access key from Cambium Networks (Table 68). Cambium will email one Access Key for
each upgrade purchased.
•
To allow 128-bit or 256-bit AES encryption. Purchase an access key from Cambium Networks
(Table 68). Cambium will email one Access Key for each upgrade purchased.
Table 68 Capability upgrades
Cambium description (*1)
Cambium part number
PTP 650 128-bit AES Encryption – per ODU (*2)
C000065K018
PTP 650 256-bit AES Encryption – per ODU (*2)
C000065K019
PTP 650 Lite (Up to 125Mbps) to Mid (Up to 250Mbps) Link Capacity
upgrade license per ODU
C000065K021
PTP 650 Lite (Up to 125Mbps) to Full (Up to 450Mbps) Link Capacity
upgrade license per ODU
C000065K022
PTP 650 Mid (Up to 250Mbps) to Full (Up to 450Mbps) Link Capacity
upgrade license per ODU
C000065K023
(*1) If the Cambium description contains the words “per ODU”, then order two upgrades per link.
(*2) Cambium Networks will supply these upgrades only if there is official permission to export
AES encryption to the country of operation.
Page 6-3
Chapter 6: Configuration and alignment
Preparing for configuration and alignment
To obtain the License Key, proceed as follows:
•
Obtain the MAC Address of the unit (it is on the System Status page).
•
Go to the Cambium Support web page (see Contacting Cambium Networks on page 1) and
navigate to the Cambium Networks License Key Generator.
•
Complete the required fields, including MAC Address and Country. For SFP capability, AES
encryption and data throughput upgrades only, enter the Access Key.
•
Submit the web form. Cambium will send the License Key by email.
Page 6-4
Chapter 6: Configuration and alignment
Connecting to the unit
Connecting to the unit
This section describes how to connect the unit to a management PC and power it up.
Configuring the management PC
Use this procedure to configure the local management PC to communicate with the PTP 650.
Procedure:
Select Properties for the Ethernet port. In Windows 7 this is found in Control Panel >
Network and Internet > Network Connections > Local Area Connection.
Select Internet Protocol (TCP/IP):
Click Properties.
Page 6-5
Chapter 6: Configuration and alignment
Connecting to the unit
Enter an IP address that is valid for the 169.254.X.X network, avoiding 169.254.0.0 and
169.254.1.1. A good example is 169.254.1.3:
Enter a subnet mask of 255.255.0.0. Leave the default gateway blank.
Connecting to the PC and powering up
Use this procedure to connect a management PC and power up the PTP 650.
Procedure:
Check that the ODU and PSU are correctly connected.
Connect the PC Ethernet port to the LAN port of the PSU using a standard (not crossed)
Ethernet cable.
Apply mains or battery power to the PSU. The green Power LED should illuminate
continuously.
After about 45 seconds, check that the orange Ethernet LED starts with 10 slow flashes.
Check that the Ethernet LED then illuminates continuously. If the Power and Ethernet LEDs
do not illuminate correctly, refer to Testing link end hardware on page 8-2.
Page 6-6
Chapter 6: Configuration and alignment
Using the web interface
Using the web interface
This section describes how to log into the PTP 650 web interface and use its menus.
Logging into the web interface
Use this procedure to log into the web interface as a system administrator.
Procedure:
Start the web browser from the management PC.
Type the IP address of the unit into the address bar. The factory default IP address is
169.254.1.1. Press ENTER. The web interface menu and System Summary page are displayed:
On the menu, click System. The login page is displayed with Password only (the default) or
with Username and Password (if identity-based user accounts have been enabled):
Enter Username (if requested) and Password (the default is blank) and click Login.
Page 6-7
Chapter 6: Configuration and alignment
Using the web interface
Using the menu options
Use the menu navigation bar in the left panel to navigate to each web page. Some of the menu
options are only displayed for specific system configurations. Use Table 69 to locate information
about using each web page.
Table 69 Menu options and web pages
Main menu
Menu option
Web page information
Home
System Summary page on page 7-2
Status
System Status page on page 7-3
System
Configuration
System Configuration page on page 6-21
LAN Configuration
LAN Configuration page on page 6-24
QoS Configuration
QoS Configuration page on page 6-30
SFP Configuration
SFP Configuration page on page 6-33
Save and Restore
Save & Restore Configuration page on page 6-34
Spectrum Management
Spectrum Management page on page 7-20
Barring channels on page 7-31
Statistics
System Statistics page on page 7-32
Comparing actual to predicted performance on
page 6-94
Wireless Port Counters
Wireless Port Counters page on page 7-37
Test Ethernet packet errors reported by ODU on
page 8-7
Main Port Counters
Main Port Counters page on page 7-38
Aux Port Counters
Aux Port Counters page on page 7-40
SFP Port Counters
SFP Port Counters page on page 7-41
Diagnostics Plotter
CSV Download
Diagnostics Plotter page on page 7-42
Generate Downloadable Diagnostics page on page
7-43
Software Upgrade
Software Upgrade page on page 6-37
Reboot
Reboot Wireless Unit page on page 7-9
Page 6-8
Chapter 6: Configuration and alignment
Main menu
Menu option
Installation
Using the web interface
Web page information
Installation menu on page 6-10
Graphical Install
Graphical Install page on page 6-92
Web
Web-Based Management page on page 6-39
Management
Local User Accounts
Local User Accounts page on page 6-42
RADIUS Configuration
RADIUS Configuration page on page 6-47
Login Information
Login Information page on page 7-9
Web Properties
Webpage Properties page on page 6-49
SNMP
SNMP pages (for SNMPv3) on page 6-61
SNMP pages (for SNMPv1/2c) on page 6-71
Email
Email Configuration page on page 6-52
Diagnostic Alarms
Diagnostic Alarms page on page 6-54
Time
Time Configuration page on page 6-55
Syslog
Syslog page on page 7-16
Syslog Configuration
Security
Syslog Configuration page on page 6-59
Security menu on page 6-75
Zeroize CSPs
Zeroize CSPs page on page 6-86
Change
Password
Change Password page on page 7-10
Logout
Logging out on page 7-11
Page 6-9
Chapter 6: Configuration and alignment
Installation menu
Installation menu
This section describes how to use the Installation Wizard to complete the essential system
configuration tasks that must be performed on a new link.
Caution
If the system designer has provided a list of channels to be barred for TDWR radar
avoidance, the affected channels must be barred before the units are allowed to
radiate on site, otherwise the regulations will be infringed. To bar these channels,
follow the procedure Barring channels on page 7-31.
Starting the Installation Wizard
To start the Installation Wizard: on the menu, click Installation. The response depends upon the
state of the unit:
•
If the unit is newly installed, the Software License Key page is displayed. Continue at Software
License Key page on page 6-12.
•
If the unit is armed for alignment, the Disarm Installation page is displayed. Continue at Disarm
Installation page on page 6-11.
•
If the unit is not armed, the Current Installation Summary page is displayed. Continue at
Current Installation Summary page on page 6-11.
Page 6-10
Chapter 6: Configuration and alignment
Installation menu
Disarm Installation page
Menu option: Installation (Figure 58). This page is displayed only when unit is armed.
Figure 58 Disarm Installation page (top and bottom of page shown)
To disarm the unit, click Disarm Installation Agent.
Current Installation Summary page
Menu option: Installation (Figure 59). This page is displayed only when unit is not armed.
Figure 59 Current Installation Summary page (top and bottom of page shown)
Click Continue to Installation Wizard.
Page 6-11
Chapter 6: Configuration and alignment
Installation menu
Software License Key page
Menu option: Installation (Figure 60). Use this page to configure the unit with a new License Key
and to review the capabilities of an installed License Key. The Capability Summary section is not
displayed until a License Key is submitted and accepted. Ensure that Licenses Keys are available
(Generating a License Key on page 6-3).
Figure 60 Software License Key page (showing a Mid license)
Page 6-12
Chapter 6: Configuration and alignment
Installation menu
Note
Full capability is available only when both ODUs have the trial active or are already
licensed to operate with that capacity.
When the trial has started, the Software License Key page displays the Trial Period
Remaining attribute (Figure 61). This shows the number of days remaining before the
full capacity trial period expires.
Procedure:
•
To clear the existing License Key (if present), click Clear.
•
To format the new License Key: copy it from the Cambium notification email, paste it into the
License Key box and click Format. The page is redisplayed with the License Key formatted.
•
For Lite and Mid licenses only, select one of the following options:
If License Full Capability Trial Status is Available (Figure 60): to start the full capability trial
period, set Activate Full Capability Trial License to Yes.
If License Full Capability Trial Status is Active (Figure 61): to suspend the full capability trial
period, set Stop Full Capability Trial License to Yes.
If License Full Capability Trial Status is Inactive (Figure 62): to resume the full capability
trial period, set Start Full Capability Trial License to Yes.
•
To enter the new License Key, click Submit. The page is redisplayed with the Capability
Summary.
•
To continue with the Installation Wizard, click Next.
Figure 61 Software License Key page (extract) with full capability trial active
Figure 62 Software License Key page (extract) with full capability trial inactive
Page 6-13
Chapter 6: Configuration and alignment
Installation menu
Interface Configuration page
Menu option: Installation (Figure 63). Use this page to update the IP interface attributes.
Figure 63 Interface Configuration page (showing Dual IPv4 and IPv6)
Review and update the attributes: they are repeated in the LAN Configuration page (Table 72).
To continue with the Installation Wizard, click Next or Submit Interface Configuration.
Page 6-14
Chapter 6: Configuration and alignment
Installation menu
Wireless Configuration page
Menu option: Installation (Figure 64).
This page is part of the Installation Wizard. Use it to update the wireless attributes.
Figure 64 Wireless Configuration page
Procedure:
•
Update the attributes (Table 70).
•
To save any changes and continue with the Installation Wizard, click Next or click Submit
Wireless Configuration.
Page 6-15
Chapter 6: Configuration and alignment
Installation menu
Caution
The lower center frequency attribute must be configured to the same value for both
the Master and Slave, otherwise the wireless link will fail to establish. The only way to
recover from this situation is to modify the Lower Center Frequency attributes so that
they are identical on both the master and slave units.
Note
When configuring a linked pair of units, use the Master Slave Mode to ensure that
one unit is Master and the other is Slave.
Table 70 Wireless Configuration attributes
Attribute
Meaning
Master Slave Mode
Master: The unit controls the point-to-point link and its maintenance. On
startup, the Master transmits until a link with the Slave is made.
Slave: The unit listens for its peer and only transmits when the peer has
been identified.
Access Method
ODUs must be configured in pairs before a link can be established. Access
Method determines how paired ODUs will recognize each other.
Link Access: Each ODU must be configured with Target MAC Address
equal to the MAC Address of the other unit.
Link Name Access: Both ODUs must be configured with the same Link
Name.
Target MAC Address
Only displayed when Access Method is set to Link Access. This is the
MAC Address of the peer unit that will be at the other end of the wireless
link. This is used by the system to ensure the unit establishes a wireless
link to the correct peer. The MAC Address can be found embedded within
the serial number of the unit. The last six characters of the serial number
are the last three bytes of the unit’s MAC address.
Link Name
Only displayed when Access Method is set to Link Name Access.
Link Name may consist of letters (A-Z and a-z), numbers (0-9), spaces, and
the following special characters: (),-.,:<=>[]_{}
Link Name must be same at both ends and different to site name.
Dual Payload
Disabled: The link maximizes robustness against fading and interference.
Enabled: The link attempts to reach maximum throughput at the expense
of robustness against fading and interference.
Page 6-16
Chapter 6: Configuration and alignment
Installation menu
Attribute
Meaning
Max Receive
Modulation Mode
The maximum mode the unit will use as its adaptive modulation. By
default the Max Receive Modulation Mode is the highest mode available.
For minimum error rates, set the maximum modulation mode to the
minimum necessary to carry the required traffic.
Lowest Ethernet
Modulation Mode
The lowest modulation mode that must be achieved before the link is
allowed to bridge Ethernet frames.
Link Mode
Optimization
IP Traffic: The link is optimized for IP traffic to provide the maximum
possible link capacity.
TDM Traffic: The link is optimized for TDM traffic to provide the lowest
possible latency.
Regulatory Band
The regulatory band selected from the list in the license key.
Channel Bandwidth
Bandwidth of the transmit and receive radio channels.
Link Symmetry
Only displayed when Master Slave Mode is set to Master.
Adaptive: Allows link symmetry to vary dynamically in response to
offered traffic load. This is not supported in the following cases:
•
Where radar avoidance is mandated in the region.
•
Link Mode Optimization is set to TDM Traffic.
“2 to 1”, “1 to 1” or “1 to 2”: There is a fixed division between transmit
and receive time in the TDD frame of the master ODU. The first number in
the ratio represents the time allowed for the transmit direction and the
second number represents the time allowed for the receive direction. The
appropriate matching Link Symmetry is set at the slave ODU
automatically. For example, if Link Symmetry is set to “2 to 1” at the
master ODU, then the slave ODU will be set automatically as “1 to 2”. In
this example, the master-slave direction has double the capacity of the
slave-master direction.
Spectrum
Management
Control
In regions that do not mandate DFS (radar detection), the options are:
DSO
Fixed Frequency
In regions that mandate DFS (radar detection), the options are:
DFS
DFS with DSO
This attribute is disabled if the regulatory requirement is fixed frequency
only.
Page 6-17
Chapter 6: Configuration and alignment
Installation menu
Attribute
Meaning
Lower Center
Frequency
The center frequency (MHz) of the lowest channel that may be used by
this link. Not displayed when Spectrum Management Control is set to
Fixed Frequency.
Use this attribute to slide the available channels up and down the band.
Default Raster
This is only displayed when Spectrum Management Control is set to
Fixed Frequency. Limits frequency selection to the unit’s default raster
setting.
Fixed Tx Frequency,
Fixed Rx Frequency
This is only displayed when Spectrum Management Control is set to
Fixed Frequency. The settings must be compatible at each end of the link.
Once configured, the spectrum management software will not attempt to
move the wireless link to a channel with lower co-channel or adjacent
channel interference. Therefore this mode of operation is only
recommended for deployments where the installer has a good
understanding of the prevailing interference environment.
Tx Color Code, Rx
Color Code
Tx Color Code and Rx Color Code may be used to minimize interference
in a dense network of synchronized PTP 650 units where some of the
units are operating on the same frequency. When this type of network is
designed, the Color Code values are normally specified in the link
planning report. In all other cases, Cambium Networks recommend that
Tx Color Code and Rx Color Code are left at the default value of A.
The value of Tx Color Code MUST always match the value of Rx Color
Code at the other end of the link.
Antenna Gain
Only displayed when the ODU is connectorized.
Gain of the remote antenna.
Cable Loss
Only displayed when the ODU is connectorized.
Loss in the ODU-antenna RF cable. If there is a significant difference in
length of the RF cables for the two antenna ports, then the average value
should be entered.
Maximum Transmit
Power
The maximum power (dBm) at which the unit will transmit, configurable
in steps of 1 dB. Its maximum value is controlled by the selected
combination of Regulatory Band, Bandwidth and (for connectorized units)
Antenna Gain and Cable Loss.
To prepare for antenna alignment, set this attribute to the alignment value
specified in the installation report (PTP LINKPlanner).
To prepare for link operation, set this attribute to the operational value
specified in the installation report (PTP LINKPlanner). This may be higher
than the alignment value.
Page 6-18
Chapter 6: Configuration and alignment
Installation menu
Attribute
Meaning
Installation Mode
Arm With Tones: Audio tones will be emitted during antenna alignment
(the recommended option).
Arm Without Tones: Audio tones will not be emitted during antenna
alignment.
Change Config Without Arming: Configuration changes will be made
without arming the ODU for alignment.
Ranging Mode
This can only be modified if Installation Mode is Arm With Tones or Arm
Without Tones.
Auto..: During alignment, the wireless units use algorithms to calculate
link range. To implement automatic ranging, select a value that
corresponds to the estimated maximum range of the link:
Auto 0 to 40 km (0 to 25 miles).
Auto 0 to 100km (0 to 62 miles).
Auto 0 to 200km (0 to 125 miles).
Target Range: During alignment, the wireless units use the approximate
link distance (entered in Target Range) to calculate link range. The main
advantage of Target Range mode is that it reduces the time taken by the
units to range.
If preferred, range functions can be configured to operate in miles, as
described in Webpage Properties page on page 6-49.
Target Range
Only available when Ranging Mode is set to Target Range.
The approximate distance between the two wireless units to within
± 1 km. Enter the same value at both ends of the link.
Page 6-19
Chapter 6: Configuration and alignment
Installation menu
Confirm Installation Configuration page
Menu option: Installation (Figure 65). Use this page to review and confirm the updated wireless
configuration of the unit.
Figure 65 Confirm Installation Configuration page (top and bottom of page shown)
Procedure:
•
To undo or correct any updates, click Back.
•
To confirm the updates and arm the installation, click Confirm Configuration and Reboot and
click OK to reboot the unit.
•
If IP Address, Subnet Mask or Gateway IP Address have been changed: reconfigure the local
management PC to use an IP address that is valid for the network. Refer to Configuring the
management PC on page 6-5.
•
If IP Address has been changed, use the new IP address to log into the unit.
Page 6-20
Chapter 6: Configuration and alignment
System menu
System menu
This section describes how to configure the IP and Ethernet interfaces of the PTP 650 unit.
System Configuration page
Menu option: System > Configuration (Figure 66). Use this page to enable AES encryption and to
review and update key wireless attributes of the unit.
Figure 66 System Configuration page
Caution
Configuring link encryption over an operational link will necessitate a service outage.
Therefore, the configuration process should be scheduled during a period of low link
utilization.
Page 6-21
Chapter 6: Configuration and alignment
System menu
Procedure:
•
If AES encryption is required but the System Configuration page does not contain the
Encryption Algorithm or Encryption Key attributes, then order the necessary AES capability
upgrade, generate a license key and enter it on the Software License Key page (Software
License Key page on page 6-12).
•
Update the attributes (Table 71).
•
To save changes, click Submit Updated System Configuration.
•
If a reboot request is displayed, click Reboot Wireless Unit and OK to confirm.
Table 71 System Configuration attributes
Attribute
Meaning
Link Name
Link Name may consist of letters (A-Z and a-z), numbers (0-9), spaces, and
the following special characters: (),-.,:<=>[]_{}. Link Name must be same at
both ends and different to site name.
Site Name
User defined name for the site, with additional notes (if required).
IP Address Label
Read only. The IP Address version used to identify the unit in SMTP
messages, fault logs and other system outputs.
IPv4 or IPv6: The unit is identified using its IPv4 or IPv6 Address.
These options are only available when IP Version is set to Dual IPv4 and
IPv6 in the in the LAN Configuration page (Table 72).
Master Slave Mode
Master: The unit is a Master, that is, it controls the point-to-point link and
its maintenance. On startup, the Master transmits until a link with the
Slave is made.
Slave: The unit is a Slave, that is, it listens for its peer and only transmits
when the peer has been identified.
Read only.
Link Mode
Optimization
IP Traffic: The link is optimized for IP traffic to provide the maximum
possible link capacity.
TDM Traffic: The link is optimized for TDM traffic to provide the lowest
possible latency.
Read only.
Channel Bandwidth
Bandwidth of the transmit and receive radio channels.
Read only.
Max Receive
Modulation Mode
The maximum mode the unit will use as its adaptive modulation. By
default the Max Receive Modulation Mode is the highest mode available.
For minimum error rates, set the maximum modulation mode to the
minimum necessary to carry the required traffic.
Page 6-22
Chapter 6: Configuration and alignment
System menu
Attribute
Meaning
Lowest Ethernet
Modulation Mode
The lowest modulation mode that must be achieved before the link is
allowed to bridge Ethernet frames.
Ethernet Capped
Max Wireless Speed
Disabled: Wireless speed is not limited by the connected Ethernet link.
Enabled: Wireless speed is limited to a mode that the connected Ethernet
link can sustain.
If either ODU is connected to an Ethernet link operating at less than
1000 Mbps, set this attribute to Enabled.
Max Transmit
Power
The maximum power (dBm) at which the unit will transmit, configurable
in steps of 1 dB. Its maximum value is controlled by the combination of
the selected Regulatory Band, Bandwidth and (for connectorized units)
Antenna Gain and Cable Loss.
To prepare for antenna alignment, set this attribute to the alignment value
specified in the installation report (PTP LINKPlanner).
To prepare for link operation, set this attribute to the operational value
specified in the installation report (PTP LINKPlanner). This may be higher
than the alignment value.
Antenna Gain
Only displayed when the ODU is connectorized. Gain of the remote
antenna.
Cable Loss
Only displayed when the ODU is connectorized. Loss in the ODU-antenna
RF cable. If there is a significant difference in length of the RF cables for
the two antenna ports, then the average value should be entered.
EIRP
Only displayed when the ODU is connectorized. Effective Isotropic
Radiated Power (EIRP) describes the strength of the radio signal leaving
the wireless unit. Use it to verify that the link configuration (Max Transmit
Power, Antenna Gain and Cable Loss) does not exceed any applicable
regulatory limit. Read only.
Encryption
Algorithm
Only displayed when AES encryption is enabled by license key.
Encryption Key
Only displayed when AES encryption is enabled by license key.
Values are: None, AES 128-bit or AES 256-bit. Use the same setting at
both link ends.
The key consists of 32 or 64 case-insensitive hexadecimal characters. Use
the same key at both link ends.
Confirm Encryption
Key
Only displayed when AES encryption is enabled by license key.
Retype the Encryption Key.
Page 6-23
Chapter 6: Configuration and alignment
System menu
LAN Configuration page
Menu option: System > Configuration > LAN Configuration (Figure 67). Use this page to control
how users connect to the PTP 650 web interface, either from a locally connected computer or from
a management network.
Figure 67 LAN Configuration page (showing Dual IPv4 and IPv6)
Page 6-24
Chapter 6: Configuration and alignment
System menu
Caution
Before configuring a VLAN for management interfaces, ensure that the VLAN is
accessible, otherwise the unit will be inaccessible after the next reboot.
Caution
Before configuring in-band management, ensure that the Master and Slave units are
configured with different IP addresses, otherwise the management agent will not be
able to distinguish the two units.
Caution
Auto-negotiation and forced Ethernet configuration:
•
To operate an Ethernet link at a fixed speed, set Auto Negotiation to Enabled and
limit Auto Neg Advertisement to the desired speed. If constrained auto-negotiation
fails, set Auto Negotiation to Disabled (forced Ethernet configuration), but only as a
last resort.
•
Both ends of an Ethernet link must be configured identically, because forced and
auto-negotiation are not compatible: a mixed configuration will cause a duplex
mismatch, resulting in greatly reduced data capacity.
•
The Auto Neg Advertisement or Forced Configuration data rates must be within the
capability of the Ethernet link partner, otherwise loss of service will occur.
Procedure:
Review and update the attributes: IP Interface (Table 72); Main PSU or Aux Port (Table 73);
Bridging (Table 74).
To save changes, click Submit Updated System Configuration. Some updates will cause the
system to reboot.
If Main PSU Port Allocation has been changed to Disabled or Data Only, connect the
management PC to whichever port (Aux or SFP) has been set to Data and In-Band
Management or Out-of-Band Local Management.
If IP Address, Subnet Mask or Gateway IP Address have been changed, reconfigure the local
management PC to use an IP address that is valid for the network. Refer to Configuring the
management PC on page 6-5.
If IP Address has been changed, use the new IP address to log into the unit.
Page 6-25
Chapter 6: Configuration and alignment
System menu
Table 72 IP interface attributes
Attribute
Meaning
IP Version
The internet protocols to be supported by this ODU:
IPv4: IPv4 protocols only. IPv4 attributes are displayed.
IPv6: IPv6 protocols only. IPv6 attributes are displayed.
Dual IPv4 and IPv6: Both IPv4 and IPv6 protocols. IPv4 and IPv6
attributes are displayed.
IPv4 Address
The IPv4 internet protocol address. This address is used by the family
of Internet protocols to uniquely identify this unit on a network.
Subnet Mask
The address range of the connected IPv4 network.
Gateway IP Address
The IPv4 address of a computer on the current network that acts as an
IPv4 gateway. A gateway acts as an entrance and exit to frames from
and to other networks.
IPv6 Address
The IPv6 internet protocol address. This address is used by the family
of Internet protocols to uniquely identify this unit on a network.
IPv6 Prefix Length
Length of the IPv6 subnet prefix (default 64 bits).
IPv6 Gateway Address
The IPv6 address of a computer on the current network that acts as an
IPv6 gateway. A gateway acts as an entrance and exit to frames from
and to other networks. It is usual to use the link-local address of the
gateway.
IPv6 Auto Configured
Link Local Address
The link-local address of the IPv6 gateway (displayed only, not
updateable).
Use VLAN For
Management
Interfaces
VLAN tagging options for the management interfaces:
No VLAN Tagging
IEEE 802.1Q Tagged (C-Tag, Type 8100)
IEEE 802.1ad Tagged (S-Tag or B-Tag, Type 88a8)
Ensure that the configured VLAN is accessible, otherwise it will not be
possible to access the unit following the next reboot.
The PTP 650 management function is only compatible with single
VLAN tagged frames. Any management frame with two or more tags
will be ignored.
Page 6-26
Chapter 6: Configuration and alignment
System menu
Attribute
Meaning
VLAN Management
VID
Only displayed when Use VLAN for Management Interfaces is not set
to No VLAN Tagging.
The VLAN VID (range 0 to 4094) that will be included in Ethernet
frames generated by the management interfaces.
VLAN Management
Priority
Only displayed when Use VLAN for Management Interfaces is not set
to No VLAN Tagging.
The VLAN priority (range 0 to 7) that will be included in Ethernet
frames generated by the management interfaces.
DSCP Management
Priority
Differentiated Services Code Point (DSCP) value to be inserted in the
IP header of all IP datagrams transmitted by the management
interface.
Main PSU Port
Allocation
Disabled: The port is not used.
Aux Port Allocation
SFP Port Allocation
Data Only: The port handles customer data only.
Data and In-Band Management: The port handles both customer data
and network management data. It can be used to access the web
interface of the local unit, and if the wireless link is established, the
remote unit. Ensure that the local and remote units have different IP
addresses.
Out-of-band Local Management: The port handles local management
data only. It can be used to access the web interface of the local unit.
Only one port can be allocated to customer data. At least one port
must be allocated to management data.
Ethernet Loopback
Mode
Sets a temporary loopback between the selected ports. The
loopback is disabled on a reboot. This mode is provided to allow
access to a device connected to the local ODU Aux port via either
the main PSU or SFP port. Loopback does not work with jumbo
frames: the maximum frame size is 1536 bytes in loopback.
Data Port Wireless
Down Alert
Disabled: The data Ethernet link will not be dropped when the
wireless link drops.
Enabled: The data Ethernet link will be dropped briefly when the
wireless link drops. This signals to the connected network equipment
that this link is no longer available. Connected Ethernet switches can
be configured to forward Ethernet frames on an alternative path
identified using the Spanning Tree Protocol (STP).
Page 6-27
Chapter 6: Configuration and alignment
System menu
Table 73 Main PSU Port and Aux Port attributes
Attribute
Meaning
Auto Negotiation
Disabled: Configuration of the Ethernet interface is forced.
Enabled: Configuration of the Ethernet interface is automatically
negotiated (default). This is the preferred setting.
See the caution at the start of this section about auto-negotiation versus
forced Ethernet configuration.
Use the same setting for the Ethernet link partner.
Auto Neg
Advertisement
Only displayed when Auto Negotiation is set to Enabled.
The data rate that the auto-negotiation mechanism will advertise as
available on the Ethernet interface (1000 Mbps or 100 Mbps Full
Duplex). Select a data rate that is within the capability of the Ethernet
link partner. Use the same setting for the Ethernet link partner.
Forced
Configuration
Only displayed when Auto Negotiation is set to Disabled.
Auto Mdix
Disabled: The Auto Medium Dependent Interface (MDI)/Medium
Dependent Interface Crossover (MDIX) capability is disabled.
This forces the speed and duplex setting of the Ethernet interface. Overthe-air throughput will be capped to the rate of the Ethernet interface at
the receiving end of the link. Select a data rate that is within the
capability of the Ethernet link partner. Use the same setting for the
Ethernet link partner.
Enabled: The Auto Medium Dependent Interface (MDI)/Medium
Dependent Interface Crossover (MDIX) capability is enabled.
Power Over
Ethernet Output
Aux port only.
Disabled: The ODU does not supply power to the auxiliary device.
Enabled: The ODU supplies power to the auxiliary device.
Page 6-28
Chapter 6: Configuration and alignment
System menu
Table 74 Bridging attributes
Attribute
Meaning
Local Packet
Filtering
Enabled: The management agent learns the location of end stations
from the source addresses in received management frames. The agent
filters transmitted management frames to ensure that the frame is
transmitted at the Ethernet (data or management) port, or over the
wireless link as appropriate. If the end station address is unknown, then
management traffic is transmitted at the Ethernet port and over the
wireless link.
In out-of-band local management mode, management frames are not
transmitted over the wireless link, and so address learning is not active.
Data Port Pause
Frames
Controls whether the bridge tunnels or discards Layer 2 pause frames
arriving at the data port. Such frames are identified by the destination
MAC Address being equal to 01-80-C2-00-00-01.
Page 6-29
Chapter 6: Configuration and alignment
System menu
QoS Configuration page
Menu option: System > Configuration > QoS Configuration (Figure 68 or Figure 69).
Use this page to control the quality of service configuration. Classification may be based on fields
in the Ethernet header (Layer 2) or in the network header (Layer 3). The unit recognizes two
network layer protocols: IP and MPLS.
Figure 68 QoS Configuration page (Ethernet)
Page 6-30
Chapter 6: Configuration and alignment
System menu
Figure 69 QoS Configuration page (IP/MPLS)
Page 6-31
Chapter 6: Configuration and alignment
System menu
Procedures:
•
Review and update the attributes: Layer 2 and Priority Scheme (Table 75).
•
To use IEEE 802.1Q classification rules, click Reset Default Priority Mappings.
•
To save changes, click: Submit Updated Configuration.
Note
Priority mapping must be configured the same at both Master and Slave units on the
wireless link.
Table 75 QoS Configuration attributes
Attribute
Meaning
Bridge
The classification of each layer 2 control protocol (L2CP) to an egress
queue at the wireless port.
MRP
CFM
R-APS
EAPS
Priority Scheme
Ethernet: Classification is based on fields in the Ethernet header (Layer 2).
IP/MPLS: Classification is based on fields in the network header (Layer 3).
IP includes IPv4 and IPv6.
Unknown Protocol
Only displayed when Priority Scheme is IP/MPLS.
The classification of unknown network protocols (that is, not IP or MPLS)
to an egress queue at the wireless port.
Page 6-32
Chapter 6: Configuration and alignment
System menu
SFP Configuration page
Menu option: System > Configuration > SFP Configuration.
This page is only available when the ODU detects an optical (Figure 70) or copper (Figure 71) SFP
module in the SFP port. Use it to configure the way in which the unit connects to the network via
the SFP interface.
Figure 70 SFP Configuration page (optical SFP module)
Figure 71 SFP Configuration page (copper SFP module)
Page 6-33
Chapter 6: Configuration and alignment
System menu
Procedure (only applies when copper SFP module is installed):
•
Update the attributes (Table 76).
•
To save changes, click Submit Updated System Configuration.
Table 76 SFP Configuration (copper SFP module) attributes
Attribute
Meaning
SFP Port Auto
Negotiation
Disabled: Configuration of the Ethernet interface is forced. This is to be
used as a last resort only if auto-negotiation fails.
Enabled: Configuration of the Ethernet interface is automatically
negotiated (default). This is the preferred setting.
SFP Port Auto Neg
Advertisement
Forced
Configuration
Auto Mdix
Only displayed when SFP Port Auto Negotiation is set to Enabled.
The data rate that the auto-negotiation mechanism will advertise as
available on the Ethernet interface (1000 Mbps or 100 Mbps Full
Duplex). Select a data rate that is within the capability of the Ethernet
link partner. Use the same setting for the Ethernet link partner.
Only displayed when SFP Port Auto Negotiation is set to Disabled.
This forces the speed and duplex setting of the Ethernet interface. Overthe-air throughput will be capped to the rate of the Ethernet interface at
the receiving end of the link. Select a data rate that is within the
capability of the Ethernet link partner. Use the same setting for the
Ethernet link partner.
Disabled: The Auto Medium Dependent Interface (MDI)/Medium
Dependent Interface Crossover (MDIX) capability is disabled.
Enabled: The Auto Medium Dependent Interface (MDI)/Medium
Dependent Interface Crossover (MDIX) capability is enabled.
Save & Restore Configuration page
Menu option: System > Configuration > Save And Restore (Figure 72).
Use the Save & Restore Configuration page to take a snapshot of the latest system configuration
as a backup. The file can then be used to restore this unit to a known state, or to configure a
replacement unit to the same state. The configuration values are encrypted for security.
Page 6-34
Chapter 6: Configuration and alignment
System menu
Figure 72 Save & Restore Configuration page
Save the system configuration in the following situations:
•
After a new unit has been fully configured as described in this chapter.
•
After any change has been made to the configuration.
•
Before upgrading the unit to a new software version.
•
After upgrading the unit to a new software version.
Note
The restore is only guaranteed to work if the installed software version has not been
changed since the configuration file was saved. This is why the configuration should
always be saved immediately after upgrading the software version.
Note
The license key is restored automatically if the configuration file is saved and then
loaded on the same unit. However, the license key is not restored if the configuration
file is loaded on a different unit. Before restoring configuration to a different PTP 650
unit, ensure that a valid license key is installed (with optional capabilities enabled
where appropriate).
Page 6-35
Chapter 6: Configuration and alignment
System menu
Most of the configuration can be restored from the backup. However, certain attributes that were
part of the configuration are not saved or restored automatically. Use the web interface to
reconfigure the following attributes:
•
Usernames, passwords and roles for the web-based interface.
•
Key of Keys
•
HTTPS Entropy
•
HTTPS Private Key
•
HTTPS Public Key Certificate
•
HTTP Access Enabled
•
HTTPS Access Enabled
•
Telnet Access Enabled
•
HTTP Port Number
•
HTTPS Port Number
•
Telnet Port Number
•
Encryption Algorithm
•
Encryption Key
•
SNMP Control Of HTTP And Telnet
•
SNMP Control of Passwords
Procedures:
•
•
To save the configuration:
Click Save Configuration File.
Save the file using the format MAC-mm-mm-mm_IP-iii-iii-iii-iii.cfg, where
mm-mm-mm is MAC address of unit and iii-iii-iii-iii is Internet address of unit (IPv4 or IPv6,
depending on IP address label).
To restore the configuration:
Click Browse and navigate to the PC folder containing the saved configuration file (.cfg).
Click Restore Configuration File and Reboot.
Click OK to confirm the restore. The configuration file is uploaded and used to reconfigure
the new unit to the same state as the old unit. On completion, the unit reboots.
Page 6-36
Chapter 6: Configuration and alignment
System menu
Software Upgrade page
Menu option: System > Software Upgrade (Figure 73).
Use this page to upgrade the unit to a new version of PTP 650 operational software.
Figure 73 Software Upgrade page
Caution
Ensure that the correct units are upgraded, as units cannot easily be downgraded
afterwards.
Caution
Software version must be the same at both ends of the link. Limited operation may
sometimes be possible with dissimilar software versions, but such operation is not
supported by Cambium Networks.
Caution
If the link is operational, upgrade the remote end of the link first, then upgrade the
local end. Otherwise, the remote end may not be accessible.
Preparation:
•
Go to the Cambium Support web page (see Contacting Cambium Networks on page 1) and
navigate to Point-to-Point Software and Documentation, PTP 650 Series.
•
If the support web page contains a later Software Version than that installed on the PTP 650
unit, perform the procedure below.
Page 6-37
Chapter 6: Configuration and alignment
System menu
Procedure:
Save the system configuration; see Save & Restore Configuration page on page 6-34.
On the Cambium Support web page, select the latest PTP 650 software image (dld2 file) and
save it to the local management PC.
On the Software Upgrade page, click Browse. Navigate to the folder containing the
downloaded software image and click Open.
Click Upload Software Image. The Software Upgrade Confirmation page is displayed:
Click Program Software Image into Non-Volatile Memory. The Progress Tracker page is
displayed. On completion, the Software Upgrade Complete page is displayed:
Click Reboot Wireless Unit, then click OK to confirm. The unit reboots with the new software
installed.
Save the post-upgrade system configuration; see Save & Restore Configuration page on page
6-34.
Page 6-38
Chapter 6: Configuration and alignment
Management menu
Management menu
This section describes how to configure web-based management of the PTP 650 unit.
Web-Based Management page
Menu option: Management > Web (Figure 74).
Use this page to configure web-based management of the unit.
Figure 74 Web-Based Management page
Page 6-39
Chapter 6: Configuration and alignment
Management menu
Caution
If the HTTP, HTTPS, Telnet and SNMP interfaces are all disabled, then it will be
necessary to use the Recovery image to reset IP & Ethernet Configuration back to
defaults to re-enable the interfaces.
Note
The HTTP and Telnet interfaces should be disabled if the HTTPS interface is
configured. (Preparing for HTTPS/TLS page 6-75).
Procedure:
•
Review and update the attributes (Table 77).
•
To save changes, click Submit Updated Configuration.
Table 77 Web-Based Management attributes
Attribute
Meaning
HTTPS Access
Enabled
Only displayed when HTTPS is configured.
No: The unit will not respond to any requests on the HTTPS port.
Yes: The unit will respond to requests on the HTTPS port.
HTTPS Port Number
Only displayed when HTTPS is configured. The port number for HTTPS
access. A value of zero means the wireless unit uses the default port.
HTTP Access
Enabled
No: The unit will not respond to any requests on the HTTP port.
Yes: The unit will respond to requests on the HTTP port.
Remote management via HTTPS is not affected by this setting.
HTTP Port Number
The port number for HTTP access. A value of zero means the wireless
unit uses the default port.
Telnet Access
Enabled
No: The unit will not respond to any requests on the Telnet port.
Telnet Port Number
The port number for Telnet access. A value of zero means the wireless
unit uses the default port.
Access Control
Enables or disables access control to web-based management by
Internet Address.
Access Control
Internet Address
1/2/3
A list of up to three IPv4 or IPv6 Addresses permitted to perform webbased management.
Yes: The unit will respond to requests on the Telnet port.
Only displayed when Access Control is set to Enabled.
Page 6-40
Chapter 6: Configuration and alignment
Management menu
Attribute
Meaning
SNMP Control of
HTTP And Telnet
Disabled: Neither HTTP nor Telnet can be controlled remotely via SNMP.
SNMP Control of
Passwords
Enabled: Passwords for identity-based user accounts in the web-based
interface can be updated via SNMP. This option can be used together
with SNMPv3 to provide a secure means to update passwords from a
central network manager.
Enabled: Both HTTP and Telnet can be controlled remotely via SNMP.
Disabled: Passwords for identity-based user accounts can be updated
only via the web-based interface (default).
TFTP Client
Disabled: The unit will not respond to any TFTP software download
requests.
Enabled: Software can be downloaded via TFTP, as described in
Upgrading software using TFTP on page 6-96.
Debug Access
Enabled
Yes: Cambium Technical Support is allowed to access the system to
investigate faults.
Cross Site Request
Forgery Protection
Enabled: The system is protected against cross-site request forgery
attacks at the web-based interface.
Page 6-41
Chapter 6: Configuration and alignment
Management menu
Local User Accounts page
Menu option: Management > Web > Local User Accounts.
The contents of this page depend upon the setting of Identity Based User Accounts: Disabled
(Figure 75) or Enabled (Figure 76).
Use this page to ensure that user access to the web-based management interface is controlled in
accordance with the network operator’s security policy. The Identity Based User Accounts option
allows multiple users (from one to ten) to access the unit with one of three levels of access:
Security Officer, System Administrator and Read Only. If Identity Based User Accounts are
Enabled, this procedure may only be performed by a Security Officer.
Note
Local User Account Names, Roles and Passwords are critical security parameters that
can be rest from the Zeroize CSPs page (Zeroize CSPs page on page 6-86).
Figure 75 Local User Accounts page (Identity Based User Accounts disabled)
Page 6-42
Chapter 6: Configuration and alignment
Management menu
Figure 76 Local User Accounts page (Identity Based User Accounts enabled)
Page 6-43
Chapter 6: Configuration and alignment
Management menu
Procedure:
•
Choose whether to set Identity Based User Accounts to Disabled or Enabled.
•
Review and update the Local User Account Management attributes (Table 78).
•
If Identity Based User Accounts is set to Enabled:
•
Review and update the Password Complexity Configuration attributes (Table 79). To reset
all attributes to the best practice values, click Set Best Practice Complexity. To return to
default values, click Set Default Complexity.
Review and update up to 10 identity-based user accounts (Table 80).
If any attributes have been updated, click Submit User Account Updates.
Table 78 Local User Account Management attributes
Attribute
Meaning
Identity Based
User Accounts
Disabled: Access to the web interface is controlled by a single system
administration password.
Enabled: Up to 10 users may access the unit.
Auto Logout
Period
The time without user activity that elapses before a user is automatically
logged out (minutes). A value of zero disables this feature.
Minimum
Password
Change Period
The minimum time that elapses before a user is allowed to change a
password (minutes). A value of zero disables this feature.
Password Expiry
Period
The time that elapses before a password expires (days). A value of zero
disables this feature.
Maximum
Number of Login
Attempts
The maximum number of login attempts (with incorrect password) that are
allowed before a user is locked out.
Login Attempt
Lockout Action
Only displayed when Identity Based User Accounts is Enabled.
Also, the maximum number of password change attempts before a user is
locked out.
Timeout: When a user is locked out, the user is allowed to log in again after
a specified period.
Disabled: When a user is locked out, the user is disabled.
Login Attempt
Lockout Period
Only displayed when Identity Based User Accounts is Disabled.
Webpage
Session Control
When this is enabled, any attempt to open a new tab or browser instance
will force the user to re-enter password.
The time that elapses before a locked out user is allowed to log in again
(minutes). Only displayed when Login Attempt Lockout Action is set to
Timeout.
Page 6-44
Chapter 6: Configuration and alignment
Management menu
Attribute
Meaning
Password Expiry
Action
Only displayed when Identity Based User Accounts is Enabled.
The action to be taken by the PTP 650 when a password expires.
Table 79 Password Complexity Configuration attributes
Attribute
Meaning
Best
practice
Minimum Password
Length
The minimum number of characters required in
passwords.
10
Password Can
Contain User Name
No: Passwords must not contain the user name.
No
Minimum Mandatory
Characters
The minimum number of lowercase, uppercase, numeric
and special characters required in passwords.
Yes: Passwords may contain the user name.
For example, if all values are set to 2, then FredBloggs will
be rejected, but FredBloggs(25) will be accepted.
Maximum Repeated
Characters
The maximum number of consecutive repeated alphabetic,
numeric and special characters permitted in passwords.
For example, if all values are set to 2, then aaa, XXX, 999
and $$$ will be rejected, but aa, XX, 99 or $$ will be
accepted.
Maximum
Consecutive
Characters
The maximum number of consecutive lowercase,
uppercase and numeric characters permitted in passwords.
Maximum Sequential
Characters
The maximum number of alphabetic and numeric
characters permitted in passwords.
For example, if all values are set to 5, then ALFRED,
neuman and 834030 will be rejected.
For example, if set to 3, then abcd, WXYZ and 0123 will be
rejected, but abc, xyz and 123 will be accepted.
Maximum Repeated
Pattern Length
The maximum sequence of characters that can be repeated
consecutively in passwords.
For example, if set to 3, then BlahBlah and 31st31st will be
rejected, but TicTicTock and GeeGee will be accepted.
Blah-Blah will be accepted because the two sequences are
not consecutive.
Page 6-45
Chapter 6: Configuration and alignment
Management menu
Attribute
Meaning
Best
practice
Match Reversed
Patterns
No: Reversed patterns are not checked.
Yes
Yes: Reversed patterns are checked.
For example, if Maximum Repeated Pattern Length is set to
3 and Match Reversed Patterns is set to Yes, then
AB1221BA will be rejected.
Minimum Characters
That Must Change
The minimum number of password characters that must
change every time a password is updated.
Password Reuse
Permitted: A user may reuse a previous password.
Prohibited
Prohibited: A user must not reuse a previous password.
Special Characters
User defined set of special characters used in password
construction. The only characters permitted in a password
are: (a-z), (A-Z), (0-9) and any of the special characters
entered here.
!"%&'()*+,./:;<=>?
Table 80 Identity-based user accounts attributes
Attribute
Meaning
Name
Enter a user name.
Role
Select a role from the list: Security Officer, System Administrator or
Read Only.
Password
Enter a password for the user. Passwords must comply with the
complexity rules (Table 79).
Password Confirm
Retype the password to confirm.
Force Password
Change
Force this user to change their password when they next log on.
Disable
Tick the box to disable a user account.
Note
At least one user must be assigned the Security Officer role. If RADIUS is enabled,
then this rule is relaxed, in which case the RADIUS server(s) SHOULD be configured
with at least one user with Security Officer privileges.
Page 6-46
Chapter 6: Configuration and alignment
Management menu
RADIUS Configuration page
Menu option: Management > Web > Radius Configuration (Figure 77).
Use this page to configure RADIUS authentication. RADIUS authentication is only available when
PTP 650 is configured for Identity-based User Accounts and when RADIUS servers are connected
to the network.
Figure 77 RADIUS Configuration page
Note
Only users with Security Officer role are permitted to configure RADIUS authentication.
Note
When RADIUS is enabled, the Security Officer may disable all user accounts.
Page 6-47
Chapter 6: Configuration and alignment
Management menu
Note
At least one user with Security Officer privileges must exist and be enabled, in order to
disable the RADIUS client.
Procedure:
•
Update the attributes (Table 81).
•
Click Submit RADIUS Configuration.
Table 81 RADIUS Authentication attributes
Attribute
Meaning
RADIUS Client
Enabled
Enabled: PTP 650 users may be authenticated via the RADIUS servers.
Disabled: RADIUS authentication is not used. This may only be selected
if at least one user with Security Officer privileges exists.
RADIUS Primary
Server
Specifies the primary server, determining the order in which the servers
are tried.
RADIUS Primary
Server Dead Time
Time (in minutes) to hold off trying to communicate with a previously
unavailable RADIUS server. Setting the value to zero disables the timer.
RADIUS Server
Retries
Number of times the PTP 650 will retry after a RADIUS server fails to
respond to an initial request.
RADIUS Server
Timeout
Time (in seconds) the PTP 650 will wait for a response from a RADIUS
server.
Authentication
Method
Method used by RADIUS to authenticate users.
Authentication Server 1 and 2:
RADIUS Server
Status
The status of the RADIUS server. This contains the time of the last test
and an indication of success or failure.
If the Authentication Server attributes are incorrect, the displayed status
is “server config not valid”.
RADIUS Server
Internet Address
IPv4 or IPv6 address of the RADIUS server.
RADIUS Server
Authentication Port
Network port used by RADIUS server for authentication services.
RADIUS Server
Shared Secret
Shared secret used in RADIUS server communications. May contain
alphabetic, numeric, special characters or spaces, but not extended
unicode characters. The maximum length is 127 characters.
Page 6-48
Chapter 6: Configuration and alignment
Management menu
Attribute
Meaning
RADIUS Server
Shared Secret
Confirm
Shared secret confirmation.
Webpage Properties page
Menu option: Management > Web > Web Properties (Figure 78).
Use this page to control the display of the web interface.
Figure 78 Webpage Properties page
Procedure:
•
Update the attributes (Table 82).
•
Click Apply Properties.
Page 6-49
Chapter 6: Configuration and alignment
Management menu
Table 82 Webpage Properties attributes
Attribute
Meaning
Web Properties
View Summary and Status pages without login:
Distance Units
•
If ticked (the default setting), users can view the Summary and
Status web pages without entering a password.
•
If not ticked, users must enter a password before viewing the
Summary and Status pages. This is only effective if the System
Administration Password has been set, see Change Password page
on page 7-10.
Metric: Distances are displayed in kilometers or meters.
Imperial: Distances are displayed in miles or feet.
Use Long Integer
Comma Formatting
Disabled: Long integers are displayed thus: 1234567.
Popup Help
Disabled: Web page popup help is not displayed.
Enabled: Long integers are displayed thus: 1,234,567.
Enabled: Web page popup help is displayed.
Send HTTPS Close
Notify Alerts
Only displayed when HTTPS is configured.
Controls whether or not the HTTPS server sends TLS Close Notify
Alerts before it shuts down each socket.
Disabled: TLS Close Notify Alerts are not sent before closing each
socket. This is the default because these alerts can cause problems with
some browsers (e.g. Internet Explorer)
Enabled: TLS Close Notify Alerts are sent before closing each socket.
Auto Logout Period
Only displayed if role-based user accounts are in use.
Automatic logout period in minutes. If there is no user activity within
this time, the user is required to log in again. Think this is only
displayed when not using identity based user accounts.
Browser Title
By default, the PTP 650 web interface displays the following text in web
browser tab titles:
Cambium PTP 50650 -  (IP=)
To change the default text, enter simple text and optional variables
(prefixed with a $ character). The full list of variables is in Table 83.
Page 6-50
Chapter 6: Configuration and alignment
Management menu
Table 83 Browser Title attribute variables
Variable
Meaning
$siteName
Site Name, as set in the System Configuration page (Table 71).
$linkName
Link Name, as set in the System Configuration page (Table 71).
$masterSlaveMode
Master Slave Mode, as set in the Step 2: Wireless Configuration
page (Table 70).
$ipAddress
IP Address currently used to identify the ODU, either IPv4 or IPv6
Address, depending upon the setting of IP Address Label in the
System Configuration page (Table 71):
•
IPv4: $ipAddress = $ipv4Address
•
IPv6: $ipAddress = $ipv6Address (if not blank) or
$ipv6LinkLocalAddress
$ipv4Address
IPv4 Address of the ODU, as set in the LAN Configuration page
(Table 72).
$ipv6Address
IPv6 Address of the ODU, as set in the LAN Configuration page
(Table 72).
$ipv6LinkLocalAddress
IPv6 Auto Configured Link Local Address of the ODU. This cannot
be updated, but it can be viewed in the LAN Configuration page
(Table 72).
$sysName
Sys Name for this SNMP managed node, as set in the Step 2:
SNMP MIB-II System Objects page (Table 89).
$productName
The product variant, for example Cambium PTP50650. Not
updateable.
$pageName
Name of the page currently being browsed.
Page 6-51
Chapter 6: Configuration and alignment
Management menu
Email Configuration page
Menu option: Management > Email (Figure 79). Use this page to enable the PTP 650 to generate
Simple Mail Transfer Protocol (SMTP) email messages to notify the system administrator when
certain events occur.
Figure 79 Email Configuration page
Procedure:
•
Update the attributes (Table 84).
•
Click Submit Updated Configuration. The Configuration Change Reboot dialog is displayed.
•
Click Reboot Wireless Unit and click OK. The reboot progress message is displayed. On
completion, the unit restarts.
Page 6-52
Chapter 6: Configuration and alignment
Management menu
Table 84 Email Configuration attributes
Attribute
Meaning
SMTP Email Alert
Controls the activation of the SMTP client.
SMTP Enabled
Messages
The SMTP Enabled Messages attribute controls which email alerts the
unit will send.
SMTP Server
Internet Address
The IPv4 or IPv6 Address of the networked SMTP server.
SMTP Server Port
Number
The SMTP Port Number is the port number used by the networked
SMTP server. By convention the default value for the port number is 25.
SMTP Source Email
Address
The email address used by the PTP 650 Series to log into the SMTP
server. This must be a valid email address that will be accepted by your
SMTP Server.
SMTP Destination
Email Address
The email address to which the PTP 650 Series will send the alert
messages.
Send SMTP Test
Email
Generate and send an email in order to test the SMTP settings. The tick
box will self-clear when Submit is clicked.
Page 6-53
Chapter 6: Configuration and alignment
Management menu
Diagnostic Alarms page
Menu option: Management > Diagnostic Alarms (Figure 80).
Use this page to select which diagnostic alarms will be notified to the system administrator.
Figure 80 Diagnostic Alarms page
Page 6-54
Chapter 6: Configuration and alignment
Management menu
Procedure:
•
Tick the required alarms. These alarms are described in Alarms on page 7-12.
•
Click Submit Updated Configuration.
Time Configuration page
Menu option: Management > Time (Figure 81 and Figure 82)
Use this page to set the real-time clock of the PTP 650.
Figure 81 Time Configuration page (SNTP disabled)
Page 6-55
Chapter 6: Configuration and alignment
Management menu
Figure 82 Time Configuration page (SNTP enabled)
Page 6-56
Chapter 6: Configuration and alignment
Management menu
Setting the real-time clock manually
Use this procedure to keep time without connecting to a networked time server.
Note
If SNTP is disabled, it will be necessary to reset the time manually after each system
reboot.
Procedure:
•
Set SNTP State to Disabled.
•
Review and update the manual clock attributes (Table 85).
•
Click Submit Updated Configuration.
Table 85 Manual clock attributes
Attribute
Meaning
SNTP State
Disabled: the PTP 650 will keep time without connecting to a networked
time server.
Set Time
Set hours, minutes and seconds.
Set Date
Set year, month and day.
Time Zone
Set the time zone offset from Greenwich Mean Time (GMT).
To set the clock to UTC time, set Time Zone to GMT 00.00.
Daylight Saving
Disabled: There is no offset for daylight saving time.
Enabled: System clock is moved forward one hour to adjust for daylight
saving time.
To set the clock to UTC time, set Daylight Saving to Disabled.
Setting the real-time clock to synchronize using SNTP
Use this procedure to synchronize the unit with a networked time server:
Procedure:
•
Set the SNTP State attribute to Enabled.
•
Review and update the SNTP clock attributes (Table 86).
•
Click Submit Updated Configuration.
Page 6-57
Chapter 6: Configuration and alignment
Management menu
Table 86 SNTP clock attributes
Attribute
Meaning
SNTP State
Enabled: the ODU will obtain accurate date and time updates from a
networked time server.
SNTP Primary Server
Specifies the primary SNTP server, determining the order in which the
servers are tried.
SNTP Primary Server
Dead Time
Time (in seconds) to wait before retrying communications with an
unresponsive primary SNTP server. Setting the value to zero disables
the timer.
SNTP Server Retries
Number of times the PTP will retry after an SNTP server fails to
respond.
SNTP Server
Timeout
Time (in seconds) the PTP will wait for a response from an SNTP
server.
SNTP Poll Interval
The SNTP server polling interval.
SNTP Server 1 and 2:
SNTP Server Status
Status message reflecting the state of communications with the SNTP
server.
SNTP Server Internet
Address
The IPv4 or IPv6 Address of the networked SNTP server.
SNTP Server Port
Number
The port number of the networked SNTP server. By convention the
default value for the port number is 123.
SNTP Server
Authentication
Protocol
Authentication protocol to be used with this SNTP server (None or
MD5).
SNTP Server Key
Identifier
SNTP key identifier.
A key of zeros is reserved for testing.
Server Key
Key used to authenticate SNTP communications.
Server Key Confirm
Must match the Server Key.
Status:
SNTP Sync
This shows the current status of SNTP synchronization. If No Sync is
displayed, then review the SNTP Server Internet Address and Port
Number. A change of state may generate an SNMP trap or SMTP email
alert.
SNTP Last Sync
This shows the date and time of the last SNTP synchronization.
Page 6-58
Chapter 6: Configuration and alignment
Management menu
Attribute
Meaning
System Clock
This displays the local time, allowing for the Time Zone and Daylight
Saving settings.
Local Time Settings:
Time Zone
Set the time zone offset from Greenwich Mean Time (GMT).
To set the clock to UTC time, set Time Zone to GMT 00.00.
Daylight Saving
Disabled: Daylight saving adjustments will not be applied to the time.
Enabled: Daylight saving adjustments will be applied to the time,
according to local rules.
To set the clock to UTC time, set Daylight Saving to Disabled.
Syslog Configuration page
Menu option: Management > Syslog > Syslog configuration (Figure 83).
Use this page to configure system logging. Only users with Security Officer role are permitted to
configure the syslog client.
Figure 83 Syslog Configuration page
Page 6-59
Chapter 6: Configuration and alignment
Management menu
Note
To record Coordinated Universal Time (UTC time) in syslog messages, use the Time
Configuration page to set Time Zone to GMT 00.00 and Daylight Saving to Disabled
(Time Configuration page on page 6-55).
Procedure:
•
Update the attributes (Table 87).
•
Click Submit Updated Configuration.
Table 87 Syslog Configuration attributes
Attribute
Meaning
Syslog State
When system logging is enabled, log entries are added to the internal
log and (optionally) transmitted as UDP messages to one or two syslog
servers.
Syslog Client
Enabled: Event messages are logged.
Disabled: Event messages are not logged.
Syslog Client Port
The client port from which syslog messages are sent.
Syslog Server 1 and 2:
Syslog Server
Internet Address
The IPv4 or IPv6 Address of the syslog server.
Syslog Server Port
The server port at which syslog messages are received.
Delete the IP address to disable logging on the syslog server.
Page 6-60
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
SNMP pages (for SNMPv3)
This section describes how to configure Simple Network Management Protocol version 3
(SNMPv3) traps using the SNMP Wizard.
Current SNMP Summary (for SNMPv3)
Menu option: Management > SNMP (Figure 84).
Use this page to review the current SNMP configuration and start the SNMP Wizard.
Figure 84 Current SNMP Summary page (when SNMP is disabled)
Procedure:
•
Review the summary.
•
If any updates are required, click Continue to SNMP Wizard.
Page 6-61
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Step 1: SNMP Configuration (for SNMPv3)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 85).
Use this page to enable SNMP, select SNMPv3 and configure access to the SNMP server.
Figure 85 Step 1: SNMP Configuration page (for SNMPv3)
Procedure:
•
Set SNMP State to Enabled.
•
Set SNMP Version to v3. The page is redisplayed with SNMPv3 attributes.
•
Update the attributes (Table 88).
•
Click Next.
Page 6-62
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Table 88 Step 1: SNMP Configuration attributes (for SNMPv3)
Attribute
Meaning
SNMP Minimum
Privilege Level
Minimum security level which is permitted to administer SNMP security
settings.
Only displayed when Identity Based User Accounts are Enabled on the
User Accounts page (Table 78).
SNMP State
Enables or disables SNMP.
SNMP Access
Control
Enables or disables access control to SNMP management by IP
address.
SNMP Access
Control Internet
Address 1/2/3
A list of up to three IPv4 or IPv6 Addresses permitted to perform SNMP
management.
Only displayed when SNMP Access Control is set to Enabled.
SNMP Version
SNMP protocol version: v1/2c or v3.
SNMP Security
Mode
MIB-based: SNMPv3 security parameters are managed via SNMP MIBs.
SNMP Engine ID
Format
Specifies whether the Engine ID is generated from the MAC Address,
IP4 Address, Text String or IPv6 Address.
SNMP Engine ID
Text
Only enabled when SNMP Engine ID Format is set to Text String. Text
used to generate the SNMP Engine ID.
SNMP Port Number
The port that the SNMP agent is listening to for commands from a
management system.
Web-based: SNMPv3 security parameters are not available over SNMP,
but instead are configured using the SNMP Accounts page, as
described in Step 3: SNMP User Policy Configuration (for SNMPv3) on
page 6-65.
Page 6-63
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Step 2: SNMP MIB-II System Objects (for SNMPv3)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 86).
Use this page to enter details of the SNMP managed node.
Figure 86 Step 2: SNMP MIB-II System Objects page (for SNMPv3)
Procedure:
•
Update the attributes (Table 89).
•
Click Next.
•
The next step depends upon which SNMP Security Mode was selected in the Step 1: SNMP
Configuration page:
If Web-based, go to Step 3: SNMP User Policy Configuration (for SNMPv3) on page 6-65.
If MIB-based, go to Confirm SNMP Configuration (for SNMPv3) on page 6-70.
Table 89 Step 2: SNMP MIB-II System Objects attributes (for SNMPv3)
Attribute
Meaning
Sys Contact
The name of the contact person for this managed node, together with
information on how to contact this person.
Sys Name
An administratively-assigned name for this managed node. By
convention, this is the fully qualified domain name of the node.
Sys Location
The physical location of this node, for example Telephone closet, 3rd
floor.
Page 6-64
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Step 3: SNMP User Policy Configuration (for SNMPv3)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 87).
This page is only displayed when SNMP Security Mode is set to Web-based in the Step 1: SNMP
Configuration page. Use this page to configure which authentication and privacy protocols are
required for SNMP users with roles System administrator and Read only.
Procedure:
•
Update the attributes (Table 90).
•
Click Next.
Figure 87 Step 3: SNMP User Policy Configuration page (for SNMPv3)
Table 90 Step 3: SNMP User Policy Configuration attributes (for SNMPv3)
Attribute
Meaning
Security Level
Defines the security level and associated protocols that are required to
allow SNMP users to access the PTP 650.
No Auth No Priv: Users are not required to use authentication or
privacy protocols.
Auth No Priv: Users are required to use only authentication protocols.
Auth Priv: Users are required to use both authentication and privacy
protocols.
Page 6-65
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Attribute
Meaning
Authentication
Protocol
The authentication protocol to be used to access the PTP 650 via SNMP.
This is disabled when Security Level is set to
Auth No Priv.
MD5: Message Digest Algorithm is used.
SHA: NIST FIPS 180-1, Secure Hash Algorithm SHA-1 is used.
Privacy Protocol
The privacy protocol to be used to access the PTP 650 via SNMP. This is
disabled when Security Level is set to No Auth No Priv or Auth No Priv.
DES: Data Encryption Standard (DES) symmetric encryption protocol.
AES: Advanced Encryption Standard (AES) cipher algorithm.
Note
A user configured to use AES privacy protocol will not be able to transmit and receive
encrypted messages unless the license key enables the AES capability.
Page 6-66
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Step 4: SNMP User Accounts Configuration (for SNMPv3)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 88).
This page is only displayed when SNMP Security Mode is set to Web-based in the Step 1: SNMP
Configuration page. Use this page to update the SNMP user accounts.
Figure 88 Step 4: SNMP User Accounts Configuration page (for SNMPv3)
Procedure:
•
Update the individual user attributes (Table 91) for up to 10 SNMP users.
•
Click Next.
Table 91 Step 4: SNMP User Accounts Configuration attributes (for SNMPv3)
Attribute
Meaning
Name
Name to be used by the SNMP user to access the system.
Role
Selects which of the two web-based security profiles are applied to this
user: System administrator or Read only.
Select Disabled to disable the SNMP account.
Auth/Priv
Indicates whether the Passphrase applies to authentication or privacy
protocols.
Page 6-67
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Attribute
Meaning
Passphrase
The phrase to be entered by this SNMP user to access the system using
an authentication or privacy protocol. Length must be between 8 and 32
characters. May contain spaces.
The Auth Passphrase is hidden when Security Level for this user’s Role
is set to No Auth No Priv.
The Priv Passphrase is hidden when Security Level for this user’s Role is
set to No Auth No Priv or Auth No Priv.
Passphrase Confirm
Passphrase must be reentered to confirm it has been correctly typed.
Page 6-68
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Step 5: SNMP Trap Configuration (for SNMPv3)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 89).
This page is only displayed when SNMP Security Mode is set to Web-based in the Step 1: SNMP
Configuration page. Use this page to configure the events that will generate SNMP traps and to set
up trap receivers.
Figure 89 Step 5: SNMP Trap Configuration page (for SNMPv3)
Procedure:
•
Update the attributes (Table 92).
•
Click Next.
Page 6-69
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv3)
Table 92 Step 5: SNMP Trap Configuration attributes (for SNMPv3)
Attribute
Meaning
SNMP Enabled Traps
Select the events that will generate SNMP traps.
SNMP Trap Receiver 1 and SNMP Trap Receiver 2:
SNMP Trap Receiver
Enabled
Disabled: SNMP traps are not sent to the corresponding SNMP
Trap Receiver (1 or 2).
Enabled: SNMP traps are sent to the corresponding SNMP Trap
Receiver (1 or 2).
SNMP Trap Internet
Address
The IPv4 or IPv6 Address of the SNMP server (trap receiver). This is
normally the network management system, but it may be a
separate trap receiver.
SNMP Trap Port Number
The server port at which SNMP traps are received.
SNMP Trap User Account
The user name (and associated protocols) to use when sending
SNMP traps to the server.
Confirm SNMP Configuration (for SNMPv3)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 90).
Use this page to review and confirm the updated SNMPv3 configuration of the unit.
Figure 90 Confirm SNMP Configuration page (for SNMPv3) (top and bottom of page shown)
Procedure:
•
To ensure that the changes take effect, click Confirm SNMP Configuration and Reboot. The unit
reboots and the changes take effect.
Page 6-70
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv1/2c)
SNMP pages (for SNMPv1/2c)
This section describes how to configure Simple Network Management Protocol version 1 or 2c
(SNMPv1 or SNMPv2c) traps using the SNMP Wizard.
Current SNMP Summary (for SNMPv1/2c)
Menu option: Management > SNMP (Figure 84).
Use this page to review the current SNMP configuration and start the SNMP Wizard.
Procedure:
•
Review the summary.
•
If any updates are required, click Continue to SNMP Wizard.
Step 1: SNMP Configuration (for SNMPv1/2c)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 91).
Use this page to enable SNMP, select SNMPv1/2c and configure access to the SNMP server.
Figure 91 Step 1: SNMP Configuration page (for SNMPv1/2c)
Page 6-71
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv1/2c)
Procedure:
•
Set SNMP State to Enabled.
•
Set SNMP Version to v1/2c. The page is redisplayed with SNMPv1/2c attributes.
•
Update the attributes (Table 93).
•
Click Next.
Table 93 Step 1: SNMP Configuration attributes (for SNMPv1/2c)
Attribute
Meaning
SNMP Minimum
Privilege Level
Minimum security level which is permitted to administer SNMP security
settings.
Only displayed when Identity Based User Accounts are Enabled on the
User Accounts page (Table 78).
SNMP State
Enables or disables SNMP.
SNMP Access
Control
Enables or disables access control to SNMP management by IP address.
SNMP Access
Control Internet
Address 1/2/3
A list of up to three IPv4 or IPv6 Addresses permitted to perform SNMP
management.
Only displayed when SNMP Access Control is set to Enabled.
SNMP Version
SNMP protocol version: v1/2c or v3.
SNMP Community
String
The SNMP community string acts like a password between the network
management system and the distributed SNMP clients (PTP 650 ODUs).
Only if the community string is configured correctly on all SNMP entities
can the flow of management information take place. By convention the
default value is set to public.
SNMP Port Number
Enter the port that the SNMP agent is listening to for commands from a
management system.
Step 2: SNMP MIB-II System Objects (for SNMPv1/2c)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 86). Use this page to enter
details of the SNMP managed node. Update the attributes (Table 89) and click Next.
Page 6-72
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv1/2c)
Step 3: SNMP Trap Configuration (for SNMPv1/2c)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 92).
Figure 92 Step 3: SNMP Trap Configuration page (for SNMPv1/2c)
Procedure:
•
Update the attributes (Table 94).
•
Click Next.
Page 6-73
Chapter 6: Configuration and alignment
SNMP pages (for SNMPv1/2c)
Table 94 Step 3: SNMP Trap Configuration attributes (for SNMPv1/2c)
Attribute
Meaning
SNMP Trap Version
Select the SNMP protocol version to use for SNMP traps: v1 or v2c.
SNMP Enabled
Traps
Select the events that will generate SNMP traps.
SNMP Trap
Receiver Enabled
Disabled: SNMP traps are not sent to the corresponding SNMP Trap
Receiver (1 or 2).
Enabled: SNMP traps are sent to the corresponding SNMP Trap Receiver
(1 or 2).
SNMP Trap Internet
Address
The IPv4 or IPv6 Address of the SNMP server (trap receiver). This is
normally the network management system, but it may be a separate trap
receiver.
SNMP Trap Port
Number
The server port at which SNMP traps are received.
Confirm SNMP Configuration (for SNMPv1/2c)
Menu option: Management > SNMP. Part of the SNMP Wizard (Figure 93).
Use this page to review and confirm the updated SNMPv1/2c configuration of the unit.
Figure 93 Confirm SNMP Configuration page (for SNMPv1/2c) (top and bottom of page shown)
Procedure:
•
To ensure that the changes take effect, click Confirm SNMP Configuration and Reboot. The unit
reboots and the changes take effect.
Page 6-74
Chapter 6: Configuration and alignment
Security menu
Security menu
This section describes how to configure HTTPS/TLS security using the Security Wizard.
Caution
Ensure that the operator’s security requirements are configured before connecting the
PTP 650 to the network. Otherwise, security may be compromised.
Preparing for HTTPS/TLS
Before running the Security Configuration Wizard, obtain the necessary cryptographic material and
ensure that the unit has AES capability. For more information, refer to Planning for HTTPS/TLS
operation on page 3-33.
Procedure:
Ensure that the following cryptographic material has been generated:
•
Key Of Keys
•
TLS Private Key and Public Certificates (for the correct IP address)
•
User Defined Security Banner
•
Random Number Entropy Input
Order the necessary AES capability upgrade, generate a license key and enter it on the
Software License Key page (Software License Key page on page 6-12).
Identify the Port numbers for HTTPS, HTTP and Telnet.
Ensure that the web browsers used are enabled for HTTPS/TLS operation.
On the Local User Accounts page (Local User Accounts page on page 6-42), check that:
•
Either: Identity Based User Accounts are set to Disabled,
•
Or: Identity Based User Accounts are set to Enabled and the current user's role is
Security Officer.
Page 6-75
Chapter 6: Configuration and alignment
Security menu
Security Configuration Wizard page
Menu option: Security. Displayed only when AES encryption is enabled by license key (Figure 94).
Use this page to review the current security configuration of the unit.
Figure 94 Security Configuration Wizard page
Procedure:
•
To continue with the Security Wizard, click Continue to Security Wizard.
Page 6-76
Chapter 6: Configuration and alignment
Security menu
Step 1: Enter Key of Keys
Menu option: Security. Part of the Security Wizard (Figure 95).
Use this page to enter a Key of Keys to encrypt all critical security parameters (CSPs) before they
are stored in non-volatile memory.
Figure 95 Step 1: Enter Key of Keys page
Caution
Erasing or changing the key of keys erases all CSPs.
Procedure:
•
Enter and confirm the generated Key of Keys.
•
Click Next.
Page 6-77
Chapter 6: Configuration and alignment
Security menu
Step 2: Enter TLS Private Key and Public Certificate
Menu option: Security. Part of the Security Wizard (Figure 96).
Use this page to select and upload the TLS Private Key and Public Certificate files.
Figure 96 Step 2: Enter TLS Private Key and Public Certificate page
Caution
If the certificates expire, the unit will be unreachable. If this occurs, put the unit into
recovery mode and erase all configuration settings. For more information, refer to
Recovery mode on page 7-44.
Procedure:
•
If a valid TLS private key exists, then an SHA-1 thumbprint of the key is displayed. If this key is
correct, then take no action. Otherwise, click Browse and select the generated private key file
(.der).
•
If a valid TLS public certificate exists, then an SHA-1 thumbprint of the certificate is displayed.
If this certificate is correct, then take no action. Otherwise, click Browse and select the
generated certificate file (.der).
•
Click Next.
Page 6-78
Chapter 6: Configuration and alignment
Security menu
Step 3: Enter User Security Banner
Menu option: Security. Part of the Security Wizard (Figure 97).
Use this page to enter a banner that will be displayed every time a user attempts to login to the
wireless unit.
Figure 97 Step 3: Enter User Security Banner page
Procedure:
•
Update the User Defined Security Banner (optional).
•
Set the Acknowledgement to No or Yes.
•
Click Next.
Page 6-79
Chapter 6: Configuration and alignment
Security menu
Step 4: Enter Login Information Settings
Menu option: Security. Part of the Security Wizard (Figure 98).
Use this page to choose whether or not to display information about previous login attempts when
the user logs into the web interface.
Figure 98 Step 4: Enter Login Information Settings page
Procedure:
•
Set Display Login Information to No or Yes.
•
Click Next.
Page 6-80
Chapter 6: Configuration and alignment
Security menu
Step 5: Enter Random Number Entropy Input
Menu option: Security. Part of the Security Wizard (Figure 99).
Use this page to enter entropy input to seed the internal random number algorithm.
Figure 99 Step 5: Random Number Entropy Input page
Procedure:
•
If valid entropy input exists, then an SHA-1 thumbprint of the input is displayed. If this input is
correct, then take no action. Otherwise, enter the generated input in the Entropy Input and
Confirm Entropy Input fields.
•
Click Next.
Page 6-81
Chapter 6: Configuration and alignment
Security menu
Step 6: Enter Wireless Link Encryption Key
Menu option: Security. Part of the Security Wizard (Figure 100).
Use this page to enable AES encryption and enter the encryption key. The wireless link encryption
key is used to encrypt all traffic over the PTP 650 wireless link.
Figure 100 Step 6: Enter Wireless Link Encryption Key page
Procedure:
•
Select the applicable value in the Encryption Algorithm field. If a valid encryption key exists,
then an SHA-1 thumbprint of the key is displayed. If this key is correct, then take no action.
Otherwise, enter the generated key in the Wireless Link Encryption Key and Confirm Wireless
Link Encryption Key fields.
•
Click Next.
Page 6-82
Chapter 6: Configuration and alignment
Security menu
Step 7: Enter HTTP and Telnet Settings
Menu option: Security. Part of the Security Wizard (Figure 101).
Use this page to configure network management of the PTP 650 using one or more of the
following methods: HTTPS, HTTP, Telnet or SNMP.
Figure 101 Step 7: Enter HTTP and Telnet Settings page
Caution
If HTTPS, HTTP, Telnet and SNMP are all disabled, management access will be
impossible until the unit is placed in recovery mode.
Page 6-83
Chapter 6: Configuration and alignment
Security menu
Note
If HTTP, Telnet and SNMP are all disabled, the secure web server becomes the only
management tool for the ODU web interface. To reenter the web interface after Step 7
of the Security Wizard, use the URL https://aa.bb.cc.dd (where aa.bb.cc.dd is the IP
address of the unit). Enclose the IPv6 address in the URL in square brackets.
Procedure:
•
Review and update the HTTP and Telnet attributes (Table 95) and click Next.
Table 95 HTTP and Telnet attributes
Attribute
Meaning
HTTPS Port Number
The port number for HTTPS access. Zero means use the default port.
HTTP Access
Enabled
No: The unit will not respond to any requests on the HTTP port.
Yes: The unit will respond to requests on the HTTP port.
Remote management via HTTPS is not affected by this setting.
HTTP Port Number
The port number for HTTP access. Zero means use the default port.
Telnet Access
Enabled
No: The unit will not respond to any requests on the Telnet port.
Telnet Port Number
The port number for Telnet access. Zero means use the default port.
SNMP Control of
HTTP And Telnet
Disabled: Neither HTTP nor Telnet can be controlled remotely via
SNMP.
Yes: The unit will respond to requests on the Telnet port.
Enabled: Both HTTP and Telnet can be controlled remotely via SNMP.
SNMP Control of
Passwords
Enabled: Passwords for identity-based user accounts in the web-based
interface can be updated via SNMP. Use this with SNMPv3 to provide
secure password updating from a central network manager.
Disabled: Passwords for identity-based user accounts can be updated
only via the web-based interface (default).
TFTP Client
Enabled: The unit will respond to TFTP software download requests.
Debug Access
Enabled
Yes: Cambium Technical Support is allowed to access the system to
investigate faults.
Cross Site Request
Forgery Protection
Enabled: The system is protected against cross-site request forgery
attacks at the web-based interface.
Page 6-84
Chapter 6: Configuration and alignment
Security menu
Step 8: Commit Security Configuration
Menu option: Security. Part of the Security Wizard (Figure 102).
Use this page to review and confirm the updated security configuration of the unit.
Figure 102 Step 8: Commit Security Configuration page
Page 6-85
Chapter 6: Configuration and alignment
Security menu
Procedure:
•
Review all changes that have been made in the Security Wizard.
•
To ensure that the changes take effect, click Commit Security Configuration and Reboot. The
unit reboots and the changes take effect.
Note
If the Key of keys is entered or modified in the Security Wizard, user accounts are
reset when Commit Security Configuration and Reboot is clicked. It is then necessary
to reconfigure them.
Zeroize CSPs page
Menu option: Security > Zeroize CSPs (Figure 103).
Use this page if it is necessary to zeroize Critical security parameters (CSPs).
Figure 103 Zeroize CSPs page
Procedure:
•
Click Zeroize CSPs and Reboot Wireless Unit.
•
Confirm the reboot.
Page 6-86
Chapter 6: Configuration and alignment
Aligning antennas
Aligning antennas
This section describes how to align the antennas in a PTP 650 link, use the web interface to assist
with alignment, and check wireless performance after alignment.
Before performing this task, check that hardware installation is complete (apart from the network
connections) at both the Master and Slave sites.
Starting up the units
Use this procedure to connect one of the units to a management PC and start up both units.
Procedure:
Select the unit from which this process is to be controlled; either Master or Slave. This is the
“local” unit.
Check that the management PC is connected to the local unit, powered up and logged on as
described in Connecting to the unit on page 6-5.
Power up the remote unit.
Log into the local unit as described in Logging into the web interface on page 6-7.
Checking that the units are armed
Use this procedure to confirm that the units are in the armed state, ready for alignment.
In the armed state, the modulation mode is fixed at BPSK 0.63 Single, the TDD frame duration is
extended to allow the link to acquire at unknown range, and the transmit power is automatically
adjusted for optimum operation.
Procedure:
•
Select menu option Home. The System Summary page is displayed.
•
Check that the Install Arm State is set to Armed.
•
If the units are not armed, execute the installation wizard as described in Installation menu on
page 6-10.
Page 6-87
Chapter 6: Configuration and alignment
Aligning antennas
Aligning antennas
Use this procedure to align linked antennas (master and slave), whether integrated or
connectorized. The goal of antenna alignment is to find the center of the main beam. This is done
by adjusting the antennas while monitoring the receive signal level.
Preparation:
Ensure that the following parameters are available:
•
Location of both sites (latitude and longitude).
•
Bearing to the other end of the link for both sites.
•
Prediction of receive signal level for both ends of the link.
•
Prediction of link loss.
PTP LINKPlanner provides all of these parameters in the form of an installation report.
If a connectorized ODU is installed at either site with two separate antennas for spatial diversity,
refer to Aligning separate antennas for spatial diversity on page 6-89 before starting alignment.
Note
For improved radio performance, mount the integrated ODU at 45 degrees to the
vertical, as shown in Installing the ODU and top LPU on page 5-5.
To achieve best results, make small incremental changes to elevation and azimuth.
Caution
The action of tightening the mounting bolts can alter antenna alignment. This can be
helpful when fine-tuning alignment, but it can also lead to misalignment. To prevent
misalignment, continue to monitor receive signal level during final tightening of the
bolts.
Procedure:
At each end of the link, adjust the antenna to point at the other end of the link. This should be
done with the aid of a compass.
Without moving the master antenna, adjust the elevation and azimuth of the slave antenna to
achieve the highest receive signal level using one of the following methods:
•
ODU installation tones on page 6-90
•
Graphical Install page on page 6-92
Without moving the Slave antenna, adjust the elevation and azimuth of the Master antenna to
achieve the highest receive signal level (using one of the above methods).
Repeat steps 2 and 3 as necessary to fine-tune the alignment to find the center of the beam.
Page 6-88
Chapter 6: Configuration and alignment
Aligning antennas
When the antennas have been aligned on the center of the beam, verify that the receive level
is within the predicted range (from the installation report). If this is not the case, go back to
step 2.
The current value of receive level can be verified by using the graphical installation method
(see Graphical Install page on page 6-92) or by selecting menu option Status and monitoring
the Receive Power attribute on the System Status page.
If after repeated attempts to align, the receive level still does not lie within the predicted
range, this may be because the data provided to the prediction tool (such as PTP LINKPlanner)
is inaccurate. For example estimates of path obstructions, antenna heights or site locations
may be inaccurate. Check this data and update the prediction as necessary.
Once the antennas have been aligned correctly, tighten the integrated ODU (or connectorized
antenna) mountings. To ensure that the action of tightening does not alter antenna alignment,
continue to monitor received signal level.
Aligning separate antennas for spatial diversity
Use this procedure if a connectorized ODU is installed at either site with two separate antennas for
spatial diversity.
Procedure:
Connect the horizontal polarization antenna to the ODU, disconnect the vertical polarization
antenna, then perform Aligning antennas on page 6-88.
Connect the vertical polarization antenna to the ODU, disconnect the horizontal polarization
antenna, then perform Aligning antennas on page 6-88.
Re-connect the horizontal polarization antennas. The received signal level should increase.
Weatherproof the antenna connections at the “H” and “V” interfaces of the ODUs, as
described in Weatherproofing an N type connector on page 5-37.
Page 6-89
Chapter 6: Configuration and alignment
Aligning antennas
ODU installation tones
This is the first of two methods that may be used to monitor receive signal level during antenna
alignment.
The ODU emits audible tones during installation to assist with alignment. The pitch of the
alignment tone is proportional to the received power of the wireless signals. Adjust the alignment
of the unit in both azimuth and elevation until the highest pitch tone is achieved.
Note
When using ODU installation tones to align connectorized antennas, it may not be
possible to hear the tones. To overcome this problem, either use an assistant, or use a
stethoscope to give a longer reach.
The tones and their meanings are described in Table 96. In each of the states detailed in the table,
align the unit to give the highest pitch tone. The term “wanted signal” refers to that of the peer
unit being installed.
Table 96 ODU installation tones
State Name
Tone Description
State Description
Pitch Indication
Free Channel
Search
Regular beep
Executing band scan
N/A
Scanning
Slow broken tone
Not demodulating the wanted signal
Rx Power
Synchronized
Fast broken tone
Demodulating the wanted signal
Rx Power
Registered
Solid tone
Both Master and Slave units
exchanging Radio layer MAC
management messages
Rx Power
Caution
If, when in the Synchronized or Registered state, the tone varies wildly, there may be
interference or a fast fading link. Installing in this situation may not give a reliable link.
Investigate the cause of the problem.
Page 6-90
Chapter 6: Configuration and alignment
Aligning antennas
During alignment, the installation tones should exhibit the following behavior:
•
Band scan: When first started up and from time to time, the Master unit will carry out a band
scan to determine which channels are not in use. During this time, between 10 and 15 seconds,
the Master unit will not transmit and as a consequence of this neither will the Slave unit.
During this time the installation tone on the master unit will drop back to the band scan state,
and the Slave unit will drop back to the Scanning state with the pitch of the tone set to the
background noise level. Alignment of the unit should cease during this time.
•
Radar detection: If the unit is operating where mandatory radar avoidance algorithms are
implemented, the ranging behavior may be affected. The Master has to monitor the initially
chosen channel for 60 seconds to make sure it is clear of radar signals before transmitting. If a
radar signal is detected during any of the installation phases, a further compulsory 60 seconds
channel scan will take place as the master unit attempts to locate a new channel that is free of
radar interference.
•
Ranging: The PTP 650 Series does not require the user to enter the link range. The Master unit
typically takes less than 60 seconds to determine the length of the link being installed. The
Master unit will remain in the Scanning state until the range of the link has been established.
The Master unit will only move to the Synchronized state when the range of the link has been
established.
The Slave unit does not have a ranging process. The slave unit will change to the
Synchronized state as soon as the wanted signal is demodulated.
•
Retrying same channel: If, at the end of the ranging period, the Registered state is not achieved
due to interference or other reasons, the Master unit will retry twice more on the same channel
before moving to another available channel. Should this occur it may take a number of
minutes to establish a link in the Registered state.
Page 6-91
Chapter 6: Configuration and alignment
Aligning antennas
Graphical Install page
Menu option: Installation > Graphical Install (Figure 104).
This is the second of two methods that may be used to monitor receive signal level during antenna
alignment.
Figure 104 Graphical Install page
Procedure:
•
Check that Wireless Link Status (top left) is “Up”, “Registering”, “Searching” or “Acquiring”.
•
While slowly sweeping the antenna, monitor the trace of receive power over the last three
minutes.
•
Monitor the Receiver Power Bar (bottom right). Green signifies that the wireless link is up and
red signifies all other states.
•
Monitor the Wireless Install Metric (top right). This is the instantaneous receive power in
dBm + 110.
Note
To access the PDA version of the graphical installation tool, use this URL http:///pda.cgi. This link is only available to system administrators.
Page 6-92
Chapter 6: Configuration and alignment
Aligning antennas
Disarming the units
When antenna alignment is complete, use this procedure to disarm both units in the link in order
to:
•
Turn off the audible alignment aid.
•
Enable adaptive modulation.
•
Fully enable spectrum management features (such as DSO, if configured).
•
Clear unwanted installation information from the various systems statistics.
•
Store the link range for fast link acquisition on link drop.
•
Enable higher data rates.
Note
After 24 hours, the units will be disarmed automatically, provided that they are armed
and that the link is up.
Procedure:
•
Select menu option Installation. The Disarm Installation page is displayed (Figure 58).
•
Click Disarm Installation Agent. The confirmation page is displayed (Figure 105).
Figure 105 Optional post-disarm configuration
Page 6-93
Chapter 6: Configuration and alignment
Aligning antennas
Comparing actual to predicted performance
For at least one hour of operation after disarming, use this procedure to monitor the link to check
that it is achieving predicted levels of performance. PTP LINKPlanner provides the prediction in the
form of an installation report.
Procedure:
•
Select menu option System > Statistics. The System Statistic page is displayed (Figure 106).
•
Monitor the following attributes:
Link Loss
Transmit Data Rate
Receive Data Rate
Figure 106 Statistics to be monitored after alignment
For more information on the System Statistics page, refer to System Statistics page on page 7-32.
Page 6-94
Chapter 6: Configuration and alignment
Other configuration tasks
Other configuration tasks
This section describes other configuration tasks.
Connecting to the network
Use this procedure to complete and test network connections.
Procedure:
If a management PC is connected directly to the PTP 650, disconnect it.
Confirm that all ODU Ethernet interface cables (PSU, SFP and Aux) are connected to the
correct network terminating equipment or devices.
If Main PSU Port Allocation is set to Disabled in the LAN Configuration page), it is not
necessary to connect the PSU LAN port to network terminating equipment.
Test that the unit is reachable from the network management system by opening the web
interface to the management agent, or by requesting ICMP echo response packets using the
Ping application. For in-band management, test that both units are reachable from one PC.
If the network management system is remote from the sites, either ask co-workers at the
management center to perform this test, or use remote login to the management system.
Test the data network for correct operation across the wireless link. This may be by
requesting ICMP echo response packets between hosts in the connected network segments,
or by some more structured use of network testing tools.
Monitor the Ethernet ports and wireless link to confirm that they are running normally. For
instructions, see System Summary page on page 7-2 and System Status page on page 7-3.
Page 6-95
Chapter 6: Configuration and alignment
Other configuration tasks
Upgrading software using TFTP
Use this procedure to upgrade software remotely using Trivial FTP (TFTP) triggered by SNMP.
Procedure:
Check that the TFTP client is enabled. Refer to Web-Based Management page on page 6-39.
Set tFTP attributes as described in Table 97.
Monitor tFTP attributes as described in Table 98.
Reboot the ODU as described in Rebooting the unit on page 7-51.
Table 97 Setting tFTP attributes
Attribute
Meaning
tFTPServerInternetAddress
The IPv4 or IPv6 address of the TFTP server from which the TFTP
software upgrade file Name will be retrieved.
For example, to set the TFTP server IP address for the unit at
10.10.10.10 to the IPv4 address 10.10.10.1, enter this command:
snmpset_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.19.0 a 10.10.10.1
tFTPServerPortNumber
This setting is optional. The port number of the TFTP server from
which the TFTP software upgrade file name will be retrieved
(default=69).
tFTPSoftwareUpgrade
FileName
The filename of the software upgrade to be loaded from the TFTP
server.
For example, to set the TFTP software upgrade filename on
10.10.10.10 to "B1095.dld", enter this command:
snmpset_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.7.0 s B1095.dld
tFTPStartSoftware
Upgrade
Write “1” to this attribute to start the TFTP software upgrade
process. The attribute will be reset to 0 when the upgrade
process has finished.
For example, enter this command:
snmpset_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.8.0 i 1
Page 6-96
Chapter 6: Configuration and alignment
Other configuration tasks
Table 98 Monitoring tFTP attributes
Attribute
Meaning
tFTPSoftwareUpgradeStatus
This is the current status of the TFTP software upgrade
process. Values:
idle(0)
uploadinprogress(1)
uploadsuccessfulprogrammingFLASH(2)
upgradesuccessfulreboottorunthenewsoftwareimag
e(3)
upgradefailed(4).
For example, enter this command:
snmpget_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.9.0
tFTPSoftwareUpgradeStatus
Text
This describes the status of the TFTP software upgrade
process, including any error details.
For example, enter this command:
snmpget_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.10.0
tFTPSoftwareUpgradeStatus
AdditionalText
This is used if tFTPSoftwareUpgradeStatusText is full and
there are more than 255 characters to report. It contains
additional text describing the status of the TFTP software
upgrade process, including any error details.
For example, enter this command:
snmpget_d.exe -v 2c -c public 10.10.10.10
.iso.3.6.1.4.1.17713.7.9.11.0
Page 6-97
Chapter 7: Operation
This chapter provides instructions for operators of the PTP 650 wireless Ethernet bridge.
The following topics are described in this chapter:
•
System summary and status on page 7-2
•
Rebooting and logging out on page 7-9
•
Alarms, alerts and messages on page 7-12
•
Spectrum management on page 7-20
•
System statistics on page 7-32
•
Recovery mode on page 7-44.
Page 7-1
Chapter 7: Operation
System summary and status
System summary and status
This section describes how to use the summary and status pages to monitor the status of the
Ethernet ports and wireless link.
System Summary page
Menu option: Home (Figure 107).
This page contains a high level summary of the status of the wireless link and associated
equipment.
Figure 107 System Summary page
Procedure:
•
Review the attributes (Table 99).
•
Check that the Wireless Link Status is “Up” on both units. If it is not “Up”, review any
uncleared system alarms: these are displayed below the System Clock attribute. Whenever
system alarms are outstanding, a yellow warning triangle is displayed on the navigation bar.
For more information, refer to Alarms on page 7-12.
Table 99 System Summary attributes
Attribute
Meaning
Wireless Link Status
Current status of the wireless link.
A green background with status text “Up” means that the point-to-point
link is established.
A red background with suitable status text (for example “Searching”)
indicates that the link is not established.
Page 7-2
Chapter 7: Operation
System summary and status
Attribute
Meaning
Link Name
The name of the PTP link, as set in the System Configuration page.
Elapsed Time
Indicator
The time (hh:mm:ss) that has elapsed since the last system reboot.
System Clock
The system can reboot for several reasons, for example, commanded
reboot from the system reboot webpage, or a power cycle of the
equipment.
The system clock presented as local time, allowing for zone and daylight
saving (if set).
System Status page
Menu option: Status (Figure 108). This page provides a detailed view of the operation of the PTP
650 link from both the wireless and network perspectives.
Figure 108 System Status page
The two PTP 650 Series units are arranged in a master and slave relationship. The roles of the
units in this relationship are displayed in the page title. The master unit will always have the title
“- Master”, and the slave will always have “- Slave” appended to the “Systems Status”
page title.
Page 7-3
Chapter 7: Operation
System summary and status
Note
Link Symmetry is configured at the master ODU only. The appropriate matching Link
Symmetry is set at the slave ODU automatically. For example, if Link Symmetry is
configured as 2 to 1 at the master ODU, then the slave ODU will be set automatically
as 1 to 2. In this example, the master-slave direction has double the capacity of the
slave-master direction.
Procedures:
•
Review the attributes (Table 100).
•
Confirm that the Ethernet Link Status attributes are green and set to Copper Link Up or Fiber
Link Up.
Table 100 System Status attributes
Attribute
Meaning
Link Name
The link name is allocated by the system administrator and is used to
identify the equipment on the network. The link name attribute is limited
to a maximum size of 63 ASCII characters.
Site Name
The site name is allocated by the system administrator and can be used
as a generic scratch pad to describe the location of the equipment or any
other equipment related notes. The site name attribute is limited to a
maximum size of 63 ASCII characters.
Software Version
The version of PTP 650 software installed on the equipment.
Hardware Version
The PTP 650 hardware version. Formatted as “vvvv” where vvvv is the
version of the printed circuit card
Regulatory Band
This is used by the system to constrain the wireless to operate
within regulatory regime of a particular band and country. The
license key provides the capability to operate in one or more
regulatory bands. The Installation Wizard is used to choose one of
those bands.
Elapsed Time
Indicator
The elapsed time indicator attribute presents the total time in years,
days, hours, minutes and seconds since the last system restart. The
system can restart for several reasons, for example commanded reboot
from the system reboot web page, or a power cycle of the equipment.
Main PSU Port
Status
This indicates the current status of the Ethernet link to the PSU port. A
state of “Copper Link Up” with a green background indicates that an
Ethernet link is established. A state of “Down” with a red background
indicates that the Ethernet link is not established.
Main PSU Port
Speed and Duplex
The negotiated speed and duplex setting of the Ethernet link to the PSU
port. The speed setting is specified in Mbps.
Page 7-4
Chapter 7: Operation
System summary and status
Attribute
Meaning
Aux Port Status
This indicates the current status of the Ethernet link to the Aux port. A
state of “Copper Link Up” with a green background indicates that an
Ethernet link is established. A state of “Down” with a red background
indicates that the Ethernet link is not established.
Aux Port Speed and
Duplex
The negotiated speed and duplex setting of the Ethernet link to the Aux
port. The speed setting is specified in Mbps.
SFP Port Status
This indicates the current status of the Ethernet link to the SFP port. A
state of “Copper Link Up” or “Fiber Link Up” with a green
background indicates that an Ethernet link is established. A state of
“Down” with a red background indicates that the Ethernet link is not
established.
SFP Port Speed and
Duplex
The negotiated speed and duplex setting of the Ethernet link to the PSU
port. The speed setting is specified in Mbps.
MAC Address
The MAC Address of this unit.
Remote MAC
Address
The MAC Address of the peer unit. If the link is down, this is set to “Not
available”.
Remote Internet
Address
The Internet Address of the peer unit. To open the web interface of the
peer unit, click on the hyperlink. If the link is down, this is set to “Not
available”.
Depending on the settings of IP Version (Table 72) and IP Address Label
(Table 71), this may be either an IPv4 or an IPv6 address.
Wireless Link Status
As the attribute name suggests it displays the current status of the
wireless link. A state of “Up” on a green background indicates that a
point-to-point link is established. A state of “Down” on a red background
indicates that the wireless link is not established.
Maximum Transmit
Power
The maximum transmit power that the local wireless unit is permitted to
use to sustain a link.
Remote Maximum
Transmit Power
The maximum transmit power that the remote wireless unit is permitted
to use to sustain a link.
Transmit Power
The maximum, mean, minimum and latest measurements of Transmit
Power (dBm). See System histograms on page 7-32.
Receive Power
The maximum, mean, minimum and latest measurements of Receive
Power (dBm). See System histograms on page 7-32.
Page 7-5
Chapter 7: Operation
System summary and status
Attribute
Meaning
Vector Error
The maximum, mean, minimum and latest measurements of Vector
Error (dB). See System histograms on page 7-32.
Vector Error compares the received signals In phase / Quadrature (IQ)
modulation characteristics to an ideal signal to determine the composite
error vector magnitude.
The expected range for Vector Error is approximately -2 dB (NLOS link
operating at sensitivity limit on BPSK 0.67) to -33 dB (short LOS link
running 256 QAM 0.83).
Link Loss
The maximum, mean, minimum and latest measurements of Link Loss
(dB). See System histograms on page 7-32.
The link loss is the total attenuation of the wireless signal between the
two point-to-point units. The link loss calculation is presented below:
Pll = PTx − PRx + g Tx + g Rx
Where:
Pll = Link Loss (dB)
PTx
= Transmit power of the remote wireless unit (dBm)
PRx
= Received signal power at the local unit (dBm)
g Tx , g R x
= Antenna gain at the remote and local units
respectively (dBi). The antenna gain of the PTP 650 Series
(23.5 dBi) is used unless one or both of the units is a
Connectorized version.
For connectorized ODUs, the link loss calculation is modified to allow for
the increased antenna gains at each end of the link.
Transmit Data Rate
The maximum, mean, minimum and latest measurements of Transmit
Data Rate (Mbps). See System histograms on page 7-32.
Receive Data Rate
The maximum, mean, minimum and latest measurements of Receive
Data Rate (Mbps). See System histograms on page 7-32.
Link Capacity
Variant
Indicates whether the installed license key is Lite, Mid or Full.
When a link is established, this attribute shows the lower of the license
keys at each end. For example, if this end is Full and the other end is Lite,
it shows “Lite”. To see the installed key, go to the Installation Wizard.
Page 7-6
Chapter 7: Operation
System summary and status
Attribute
Meaning
Link Capacity
The maximum aggregate data rate capacity available for user traffic,
assuming the units have been connected using Gigabit Ethernet. The link
capacity is variable and depends on the prevailing wireless conditions as
well as the distance (range) between the two wireless units.
Transmit
Modulation Mode
The modulation mode currently being used on the transmit channel.
Receive Modulation
Mode
The modulation mode currently being used on the receive channel.
Link Symmetry
A ratio that expresses the division between transmit and receive time in
the TDD frame. The first number in the ratio represents the time allowed
for the transmit direction and the second number represents the time
allowed for the receive direction.
Receive Modulation
Mode Detail
The receive modulation mode in use. For a list of values and their
meanings, see Table 101.
Range
The range between the PTP 650 Series ODUs. This is displayed in
kilometers by default, but can be changed to miles by updating the
Distance Units attribute to imperial, as described in Webpage Properties
page on page 6-49.
Table 101 Receive Modulation Mode Detail values and meanings
Value
Meaning
Running At Maximum
Receive Mode
The link is operating at maximum modulation mode in this
channel and maximum throughput has been obtained.
Running At User-Configured
Max Modulation Mode
The maximum modulation mode has been capped by the user
and the link is operating at this cap.
Restricted Because
Installation Is Armed
The Installation Wizard has been run and the unit is armed,
forcing the link to operate in the lowest modulation mode. To
remove this restriction, re-run the Installation Wizard to disarm
the unit.
Restricted Because Of Byte
Errors On The Wireless Link
The receiver has detected data errors on the radio and reduced
the modulation mode accordingly. The radio may achieve a
higher modulation mode as shown by the vector error, but there
is some other error source, probably RF interference.
Restricted Because Channel
Change Is In Progress
This is a transient event where the modulation mode is
temporarily reduced during a channel change.
Page 7-7
Chapter 7: Operation
System summary and status
Value
Meaning
Limited By The Wireless
Conditions
The radio is running at the maximum achievable modulation
mode given the current wireless conditions shown by the vector
error. The radio is capable of reaching a higher modulation
mode if wireless conditions (vector error) improve.
Page 7-8
Chapter 7: Operation
Rebooting and logging out
Rebooting and logging out
This section describes how to reboot the unit and log out of the web interface.
Login Information page
Menu option: Management > Web > Login Information (Figure 109).
Use this page to show recent successful and unsuccessful login attempts on this account.
Figure 109 Login Information page
Reboot Wireless Unit page
Menu option: System > Reboot (Figure 110).
Use this page to reboot the ODU or view a list of previous reboot reasons.
Figure 110 Reboot Wireless Unit page
Page 7-9
Chapter 7: Operation
Rebooting and logging out
Procedure:
•
Use the drop-down list to view the Previous Reasons For Reset/Reboot.
•
If a reboot is required:
Click Reboot Wireless Unit. The Reboot Confirmation dialog is displayed (Figure 111).
Click OK. The reboot progress message is displayed. On completion, the unit restarts.
Figure 111 Reboot confirmation pop up
Change Password page
Menu option: Change Password (Figure 112). Use this page to change a personal password.
Figure 112 Change Password page (System Administration example)
Note
A security officer can change the passwords of other users using the User Accounts
page, as described in Local User Accounts page on page 6-42.
Procedure:
•
Enter and confirm the new password (the default is blank). The new password must comply
with the complexity rules (Table 79).
Page 7-10
Chapter 7: Operation
Rebooting and logging out
Logging out
To maintain security, always log out at the end of a session: on the menu, click Logout.
The unit will log out automatically if there is no user activity for a set time, but this depends upon
Auto Logout Period in the Webpage Properties page (Figure 78).
Page 7-11
Chapter 7: Operation
Alarms, alerts and messages
Alarms, alerts and messages
This section describes how to use alarms, alerts and syslog messages to monitor the status of a
PTP 650 link.
Alarms
Whenever system alarms are outstanding, a yellow warning triangle is displayed on the navigation
bar. The warning triangle is visible from all web pages.
Procedure:
•
Click the warning triangle (or menu option Home) to return to the System Summary page and
view the alarms. If the warning triangle disappears when it is clicked, it indicates that the
outstanding alarms have been cleared.
The example in Figure 113 shows the warning triangle in the navigation bar and an alarm
displayed in the System Summary page. The alarms are defined in Table 102.
A change of state in most alarms generates an SNMP trap or an SMTP email alert.
Figure 113 Alarm warning triangle
Page 7-12
Chapter 7: Operation
Alarms, alerts and messages
Table 102 System alarms
Alarm
Meaning
Regulatory Band
The installed license key contains an invalid Regulatory
Band. The wireless unit is prohibited from operating
outside the regulated limits.
Install Status
Signaling was received with the wrong MAC address. It is
very unusual to detect this, because units with wrongly
configured Target MAC Address will normally fail to
establish a wireless link. However, rare circumstances may
establish a partial wireless link and detect this situation.
Install Arm State
A wireless unit is in installation mode. After installation,
the wireless unit should be disarmed. This will increase the
data-carrying capacity and stop the installation tone
generator. The wireless link is disarmed from the
“Installation” process, see Disarming the units on page 693.
Unit Out Of Calibration
The unit is out of calibration and must be returned to the
factory using the RMA process for re-calibration.
Incompatible Regulatory Bands
The two linked units have different Regulatory Bands. To
clear this alarm, obtain and install license keys for the
correct country and select the same Regulatory Band at
each end of the link.
Incompatible Master and Slave
The master and slave ends of the wireless link are different
hardware products, or have different software versions. It
is very unusual to detect this because incompatible units
will normally fail to establish a wireless link. However,
some combinations may establish a partial wireless link
and detect this situation.
Main PSU Port Configuration
Mismatch
Ethernet fragments (runt packets) have been detected
when the PSU port is in full duplex. This indicates an autonegotiation or forced configuration mismatch.
No Wireless Channel Available
Spectrum Management was unable to locate a suitable
wireless channel to operate on.
SNTP Synchronization failed
SNTP has been enabled but the unit is unable to
synchronize with the specified SNTP server.
Page 7-13
Chapter 7: Operation
Alarms, alerts and messages
Alarm
Meaning
Wireless Link Disabled Warning
The wireless link has been administratively disabled via the
SNMP Interface. The wireless interface MIB-II
ifAdminStatus attribute has been set to DOWN. To enable
the Ethernet interface, set the ifAdminStatus attribute to
UP.
Main PSU Port Disabled Warning
The PSU port link has been administratively disabled via
the SNMP Interface.
Main PSU Port Status
The PSU port link is down. The most likely cause is that the
unit has no Ethernet cable plugged into its Aux port.
SFP Error
A non-OK value indicates that the SFP link is down. There
are two possible causes:
•
Either: the fiber link has been installed but
disabled (because the license key does not include
SFP support),
•
Or: the SFP link could not be established even
though an SFP carrier was detected (due perhaps
to a cabling fault or the link is disabled at the link
partner).
SFP Port Configuration Mismatch
Ethernet fragments (runt packets) have been detected
when the SFP port is in full duplex. This indicates an autonegotiation or forced configuration mismatch.
SFP Port Disabled Warning
The SFP port link has been administratively disabled via
the SNMP Interface.
SFP Port Status
The SFP port link is down. The most likely cause is that the
unit has no Ethernet cable plugged into its SFP port.
Aux Port PoE Output Status
The Aux port link is down. The most likely cause is that the
unit has no Ethernet cable plugged into its Aux port.
Aux Port Disabled Warning
The Aux port link has been administratively disabled via
the SNMP Interface.
Aux Port Status
The Aux port link is down. The most likely cause is that the
unit has no Ethernet cable plugged into its Aux port.
Link Mode Optimization
Mismatch
The Master and Slave ODUs are configured to use different
link mode optimization methods (one is set to IP and the
other TDM).
Syslog Enabled/ Disabled
Warning
The local log of event messages has been enabled or
disabled.
Syslog Local Nearly Full
The local log of event messages is nearly full.
Page 7-14
Chapter 7: Operation
Alarms, alerts and messages
Alarm
Meaning
Syslog Local Wrapped
The local log of event messages is full and is now being
overwritten by new messages.
Aux Port Configuration Mismatch
Ethernet fragments (runt packets) have been detected
when the Aux port is in full duplex. This indicates an autonegotiation or forced configuration mismatch.
Syslog Client Enabled/Disabled
Warning
The local syslog client has been enabled or disabled.
Ethernet Bridging Status
“Disabled” means that the link has stopped bridging
Ethernet frames because the Lowest Ethernet Modulation
Mode is not being achieved or because the wireless link is
down.
Remaining Full Capacity Time
Trial
Time remaining on the full capability trial period. Activated
when seven days or less of the trial period remain.
Capacity Variant Mismatch
The link ends are different capability variants, for example,
one is Full and the other is Med.
Email alerts
The management agent can be configured to generate alerts by electronic mail when certain
events occur. The alerts are defined in Table 103.
Table 103 Email alerts
Alert
Meaning
Wireless Link Up Down
There has been a change in the status of the wireless link.
Channel Change
DFS has forced a change of channel.
DFS Impulse Interference
DFS has detected impulse interference.
Enabled Diagnostic Alarms
Diagnostic alarms have been enabled.
Main PSU Port Up Down
There has been a change in the status of the PSU data port.
Aux Port Up Down
There has been a change in the status of the Aux port.
SFP Port Up Down
There has been a change in the status of the SFP port.
Page 7-15
Chapter 7: Operation
Alarms, alerts and messages
Syslog page
Menu option: Management > Syslog (Figure 114).
Use this page to view the local log of event messages.
Figure 114 Syslog local log
Note
For more information about system logging, refer to:
•
System logging (syslog) on page 1-32 describes the system logging feature.
•
Syslog Configuration page on page 6-59 describes how to enable system logging.
Page 7-16
Chapter 7: Operation
Alarms, alerts and messages
Format of syslog server messages
PTP 650 generates syslog messages in this format:
SP = “ ” = %x20
CO = “:” = %x3A
SC = “;” = %x3B
LT = “<” = %x3C
GT = “>” = %x3E
syslog = pri header SP message
pri = LT “1”-“182” GT
header = timestamp SP hostname
timestamp = month SP days SP hours “:” minutes “:” seconds
month = “Jan”|“Feb”|“Mar”|“Apr”|“May”|“Jun”|
“Jul”|“Aug”|“Sep”|“Oct”|“Nov”|“Dec”
days = “ 1”-“31”
hours = “00”-“23”
minutes = seconds = “00”-“59”
hostname = “0.0.0.0”-“255.255.255.255”
message = “PTP650” CO SP (configuration | status | event)
configuration = “configuration” SC SP attribute-name SC SP (“Web
user”|“SNMP user”|“SNTP”) SC SP “was=” previous-value SC SP “now=”
new-value SC
status = “status” SC SP attribute-name SC SP “was=” previous-value SC
SP “now=” new-value SC
event = “event” SC SP identifier SC SP event-message-content SC
Configuration and status messages
Configuration and status messages contain all of the relevant attributes.
This is an example of a configuration message:
PTP650: configuration; IP Address; Web user; was=10.10.10.10;
now=169.254.1.1;
This is an example of a status message:
PTP650: status; Data Port Status; was=Down; now=Up;
Page 7-17
Chapter 7: Operation
Alarms, alerts and messages
Event messages
Event messages are listed in Table 104. Definition of abbreviations:
SC = ";"
SP = " "
This is an example of an event message:
PTP650: event; auth_login; web user=MarkT; from=169.254.1.1; port=80;
connection=HTTP; authentication=local;
Table 104 Event messages
Facility
Severity
Identifier
Message content
security(4)
warning(4)
auth_idle
security(4)
info(6)
auth_login
security(4)
warning(4)
auth_login_failed
security(4)
warning(4)
auth_login_locked
"Web user=" user-name SC SP
"from=" IP-address SC SP
"port=" port-number SC SP
"connection=" ("HTTP" | "HTTPS") SC SP
"authentication=" ("local" | "RADIUS") SC
security(4)
info(6)
auth_logout
kernel(0)
warning(4)
cold_start
"PTP wireless bridge has reinitialized,
reason="
reset-reason SC
security(4)
warning(4)
License_update
"License Key updated" SC
syslog(5)
warning(4)
log_full
"Syslog local flash log is 90% full" SC
syslog(5)
warning(4)
log_wrap
"Syslog local flash log has wrapped" SC
security(4)
info(6)
radius_auth
"RADIUS user=" user-name SC SP
"server " ("1" | "2") " at " IP-address SP
"succeeded" SC
security(4)
warning(4)
radius_auth_fail
"RADIUS user=" user-name SC SP
"server " ("1" | "2") " at " IP-address SP
("failed" | "succeeded" | "failed (no
response)") SC
security(4)
alert(1)
resource_low
"Potential DoS attack on packet ingress "
("warning" | "cleared") SC
security(4)
warning(4)
sec_zeroize
"Critical Security Parameters (CSPs)
zeroized" SC
local6(22)
warning(4)
snmpv3_asn1
"ASN.1 parse error" SC
Page 7-18
Chapter 7: Operation
Alarms, alerts and messages
Facility
Severity
Identifier
Message content
security(4)
warning(4)
snmpv3_auth
"Authentication failure" SC
local6(22)
warning(4)
snmpv3_decryption
"Decryption failure" SC
local6(22)
warning(4)
snmpv3_engine_id
"Unknown engine ID" SC
local6(22)
warning(4)
snmpv3_sec_level
"Unknown security level" SC
kernel(0)
warning(4)
sys_reboot
"System Reboot, reason=" reset-reason SC
security(4)
warning(4)
sys_software
_upgrade
"Software upgraded from " softwareversion
" to " software-version SC
local6(22)
warning(4)
telnet_idle
local6(22)
info(6)
telnet_login
"Telnet user=" user-name SC SP
"from=" IP-address SC SP
"port=" port-number SC
local6(22)
warning(4)
telnet_login_failed
local6(22)
info(6)
telnet_logout
local6(22)
info(6)
tftp_complete
"TFTP software upgrade finished" SC
local6(22)
info(6)
tftp_failure
"TFTP software upgrade failed, reason="
reason SC
local6(22)
info(6)
tftp_start
"TFTP software upgrade started" SC
NTP(12)
info(6)
time_auth
"SNTP authentication succeeded at
IP-address=" IP-address SC SP
"port-number=" port SC
NTP(12)
warning(4)
time_auth_failed
"SNTP authentication failed at IP-address="
IP-address SC SP "port-number=" port SC
NTP(12)
warning(4)
time_conn_failed
"SNTP connection failed at IP-address="
IP-address SC SP "port-number=" port SC
SP
"reason=" reason SC
Page 7-19
Chapter 7: Operation
Spectrum management
Spectrum management
This section describes how to use the spectrum management pages to monitor the radio spectrum
usage of the PTP 650 link.
Spectrum Management page
Menu option: System > Spectrum Management (Figure 115 and Figure 116).
Use this page to view and configure spectrum usage. The width of the vertical green bar
represents the channel width (10 MHz illustrated).
Figure 115 Spectrum Management page (master unit)
Page 7-20
Chapter 7: Operation
Spectrum management
Figure 116 Spectrum Management page (slave unit)
All spectrum management configuration changes are applied at the master ODU only. These
changes are then sent from the master to the slave, so that both master and slave keep identical
copies of spectrum management configuration. It is therefore possible to swap master and slave
roles on an active PTP 650 link without modifying Spectrum Management configuration.
The default channelization can be modified by varying the lower center frequency attribute in the
installation wizard, as described in Wireless Configuration page on page 6-15.
Page 7-21
Chapter 7: Operation
Spectrum management
Note
Before attempting to improve the performance of the spectrum management
algorithm by changing the default configuration, consult the Cambium Point-to-Point
distributor or one of the system field support engineers.
Procedure:
•
Review the configuration attributes (Table 105)
•
Update the attributes as required. At the slave unit, only Page Refresh Period can be updated.
•
To save changes, click Submit configuration changes.
Table 105 Spectrum Management attributes
Attribute
Meaning
Page Refresh Period
The page refreshes automatically according to the setting entered here
(in seconds).
Hopping Margin
Spectrum Management uses this margin when making a channel hop
decision. If the interference level of the target channel is lower than that
of the active channel by at least the Hopping Margin, the link will hop to
the target channel. The default setting is 3 dB in non-radar regions, or 10
dB in radar regions.
Asymmetric DSO
Only displayed in non-radar regions when DSO is enabled. The default
configuration of symmetric operation constrains the link to operate
symmetrically, using the same transmit and receive channels. When in
symmetric mode the slave unit will always follow the master. If the
master moves to a new channel the slave will hop to the same channel.
When the Point-to-Point link is configured as an asymmetric link both
the master and slave are free to select the best channel from their own
set of local interference metrics.
Spectrum
Management
Control
Only displayed in radar regions. The options are DFS and DFS with DSO.
Hopping Period (not
configurable)
The Spectrum Management algorithm evaluates the metrics every
“Hopping Period” seconds (180 seconds by default) looking for a
channel with lower levels of interference. If a better channel is located,
Spectrum Management performs an automated channel hop. If SNMP or
SMTP alerts are enabled an SNMP TRAP or an email alert is sent
warning the system administrator of the channel change.
Hopping Counter
This is used to record the number of channel hops. The number in the
(+) brackets indicates the number of channel changes since the last
screen refresh.
Page 7-22
Chapter 7: Operation
Spectrum management
Attribute
Meaning
Interference
Threshold
Spectrum Management uses the interference threshold to perform
instantaneous channel hops. If the measured interference on a channel
exceeds the specified threshold, then DSO will instruct the wireless to
immediately move to a better channel. If a better channel cannot be
found the PTP 650 Series will continue to use the current active channel.
(Default –85 dBm).
Channel Bandwidth
(not configurable)
This shows the value of the variable channel bandwidth selected.
Interpreting the spectrum management plots
The Spectrum Management pages at the master and slave (Figure 115 and Figure 116) display two
graphical plots:
•
Local Receive Channel Spectrum
•
Peer Receive Channel Spectrum
A more detailed example of one of these plots is shown in Figure 117.
Figure 117 Example spectrum management plot
Note
For more information, select the Help hyperlink from the Spectrum Management
page.
Page 7-23
Chapter 7: Operation
Spectrum management
X axis and Y axis
The X-axis shows a stylized view of the selectable wireless channels. Adjacent channels on the
display have a 10 MHz overlap. Channels are displayed separately for clarity. The axis is labeled
using the channel center frequencies in MHz.
The Y-axis shows the interference power levels from –100 to –40 dBm.
Channel states
The active channel (channel 5 in Figure 117) is always marked using hatched green and white
lines. The width of the hatching is directly proportional the channel bandwidth spectral occupancy
of the channel.
The individual channel metrics are displayed using a colored bar and an “I” bar. The colored bar
represents the channel state (Table 106).
Table 106 Channel states represented in the spectrum management plot
Color
State
Meaning
Green
Active
The channel is currently in use, hosting the Point-to-Point
wireless link.
Orange
Interference
The channel has interference above the interference
threshold.
Blue
Available
The channel has an interference level below the
interference threshold and is considered by the Spectrum
Management algorithm suitable for hosting the
Point-to-Point link.
Grey
Barred
The system administrator has barred this channel from use.
For improved visibility, an additional red “lock” symbol is
used to indicate that a channel is barred.
Page 7-24
Chapter 7: Operation
Spectrum management
Key metrics
The “I” bar and top of the colored bar represent three key metrics (Table 107). The vertical part of
the “I” bar represents the statistical spread between the peak and the mean of the statistical
distribution.
Table 107 Key metrics represented in the spectrum management plot
Metric
Description
How represented
Peak of Means
The largest mean interference measurement
encountered during the quantization period. The
peak of means is useful for detecting slightly
longer duration spikes in the interference
environment.
Upper horizontal
bar.
Mean of Means
The arithmetic mean of the measured means
during a quantization period. The mean of means
is a coarse measure of signal interference and
gives an indication of the average interference
level measured during the quantization period.
The metric is not very good at predicting
intermittent interference and is included to show
the spread between the Mean of Means, the
99.9% Percentile and the Peak of Means.
Lower horizontal
bar.
99.9% Percentile
of the Means
The value of mean interference measurement
which 99.9% of all mean measurements fall
below, during the quantization period. The 99.9%
percentile metric is useful for detecting short
duration repetitive interference that by its very
nature has a minimal effect of the mean of means.
Top of the colored
bar.
Note
The arithmetic mean is the true power mean and not the mean of the values expressed
in dBm.
Spectrum Management uses the 99.9% Percentile as the prime interference
measurement. All subsequent references to interference level refer to this percentile
measurement.
Page 7-25
Chapter 7: Operation
Spectrum management
Spectrum management in fixed frequency mode
When the link is operating in fixed frequency mode, the Spectrum Management page uses two
visual cues (Figure 118). The main page title has the “Fixed Frequency Mode” suffix and the
selected channels are identified by a red capital “F”.
Figure 118 Spectrum Management Fixed Frequency Mode page
Channel barring is disabled in fixed frequency mode; it is not required as dynamic channel
hopping is prohibited in this mode.
The only controls available to the master are the Page Refresh Period and Interference Threshold
attributes. They will have no effect on the operation of the wireless link and will only effect the
generation of the channel spectrum graphics.
The active channel history menu is removed in this mode of operation, as channel hopping is
prohibited.
Page 7-26
Chapter 7: Operation
Spectrum management
Spectrum management in radar avoidance mode
When the link is operating in radar avoidance mode, the Spectrum Management page (Figure 119
and Figure 120) contains the following additional information:
•
The main page title has the “Radar Avoidance” suffix.
•
The only controls available to the master are the Interference Threshold attribute. This has no
effect on the operation of the wireless link and will only affect the generation of the channel
spectrum graphics.
•
Extra color coding of the interference histogram is provided (Table 108).
When operating with RTTT (Road transport and Traffic Telematics) Avoidance enabled or other
regulatory restrictions on channel usage, the page contains the following additional information:
•
All channels marked with a “no entry” symbol with their associated statistics colored black are
the prohibited channels. These channels are never used to host the wireless link, but CAC
measurements are still taken so that adjacent channel biases can be calculated correctly and so
the user can see if other equipment is in use.
Figure 119 Spectrum Management page with radar avoidance - master
Page 7-27
Chapter 7: Operation
Spectrum management
Figure 120 Spectrum Management page with radar avoidance - slave
Table 108 Channel states in the spectrum management plot (radar avoidance)
Color
State and
color
Meaning
Green
Active
This channel is currently in use hosting the Point-to-Point wireless
link.
Orange
Interference
This channel has interference above the interference threshold
Blue
Available
This channel has an interference level below the interference
threshold and is considered by the Spectrum Management
algorithm suitable for hosting the Point-to-Point link
Dark grey
Barred
The system administrator has barred this channel from use.
Because the low signal levels encountered when a unit is
powered up in a laboratory environment prior to installation
(which makes the grey of the channel bar difficult to see). An
additional red “lock” symbol is used to indicate that a channel is
barred.
Page 7-28
Chapter 7: Operation
Spectrum management
Color
State and
color
Meaning
Light grey
Unavailable
This channel needs to be monitored for one minute and found
free of radar signal before it can be used for transmitting.
Red
Radar
Detected
Impulsive Radar Interference has been detected on this channel
and the channel is unavailable for 30 minutes. At the end of the
30 minute period a Channel Availability Check is required to
demonstrate no radar signals remain on this channel before it can
be used for the radio link.
Black
Region Bar
This channel has been barred from use by the local region
regulator
Viewing the active channel history
Use this procedure to view the active channel history. This is a time series display of the channels
used by the PTP 650 Series over the last 25 hours.
Procedure:
•
Select the Active Channel History hyperlink from the Spectrum Management page.
An example of the active channel history display is shown in Figure 121. Where there are parallel
entries on the display this signifies that the wireless link occupied this channel during the
measurement period. The measurement periods are one minute (from zero to sixty minutes) and
twenty minutes from (60 minutes to twenty five hours).
Figure 121 Active channel history screen
Page 7-29
Chapter 7: Operation
Spectrum management
Viewing historic spectrum management metrics
Use this procedure to view the results of previous measurement quantization periods from both
the master and slave Spectrum Management pages.
Procedure:
•
Hold down the shift key and click the appropriate channel on the Local Receive Channel
Separation plot. The time series plot is displayed (Figure 122). This plot displays the results of
all previous measurement quantization periods, up to a maximum of 132 periods. The colored
lines represent interference measurements (Table 109).
Figure 122 Spectrum management time series plot
Table 109 Interference represented in the time series plot
Color
Meaning
GREEN
Peak of Means interference measurement
BLACK
99.9% percentile of means interference measurement
BLUE
Mean of Means interference measurement
Page 7-30
Chapter 7: Operation
Spectrum management
Barring channels
To comply with FCC rules, bar any channels that may interfere with TDWR radars. This must be
done before the units are allowed to radiate on site. The system designer will have provided a list
of any affected channels, based on the instructions in Avoidance of weather radars (USA only) on
page 3-20.
Procedure:
•
Log into the master unit.
•
Select menu option System > Spectrum Management. The Spectrum Management page is
displayed.
•
Click on the appropriate channel center frequencies on the Local or Peer channel spectrum
plots. The example in Figure 123 shows how to bar one channel (5822 MHz).
•
When the confirmation dialog is displayed, click OK.
Figure 123 Barring a channel
Page 7-31
Chapter 7: Operation
System statistics
System statistics
This section describes how to use the system statistics pages to manage the performance of the
PTP 650 link, use the following web pages:
System Statistics page
Menu option: System > Statistics. Use this page to check system statistics.
System histograms
The System Histograms section of the System Statistics page (Figure 124) contains eight
diagnostic attributes that are presented as arrays of four elements (Table 110).
Figure 124 System Histograms section of the System Statistics page
The element arrays represent the following:
•
Max: The maximum value measured over the last hour.
•
Mean: The mean of a set of values recorded at one second intervals over the last hour.
•
Min: The minimum value measured over the last hour.
•
Latest: The latest value measured.
The values are calculated over the time that has elapsed since the link was established or since the
measurement period was reset.
Page 7-32
Chapter 7: Operation
System statistics
Note
Use the Diagnostics Plotter page on page 7-42 to plot these attributes against time.
Use the Generate Downloadable Diagnostics page on page 7-43 to extract historical
data for these attributes to a CSV file.
Procedure:
•
To reset and restart measurement, click Reset System Histograms and Measurement Period.
Table 110 System Histogram attributes in the System Statistics page
Attribute
Meaning
Transmit Power
The transmit power histogram, calculated over a one hour period.
Receive Power
The receive power histogram, calculated over a one hour period.
Vector Error
The vector error measurement compares (over a one hour period) the
received signal IQ modulation characteristics to an ideal signal to determine
the composite vector error magnitude.
Link Loss
Link loss calculated (over a one hour period) as follows:
Peer_Tx_Power (dBm) – Local_Rx_Power (dBm) + 2 x Antenna_Pattern (dBi)
Signal Strength
Ratio
The Signal Strength Ratio (calculated over a one hour period) is:
Power received by the vertical antenna input (dB) ÷
Power received by the horizontal antenna input (dB)
This ratio is presented as: max, mean, min, and latest. The max, min and
latest are true instantaneous measurements; the mean is the mean of a set of
one second means.
Signal Strength Ratio is an aid to debugging a link. If it has a large positive or
negative value then investigate the following potential problems:
•
An antenna coaxial lead may be disconnected.
•
When spatial diversity is employed, the antenna with the lower value may
be pointing in the wrong direction.
•
When a dual polar antenna is deployed, the antenna may be directed
using a side lobe rather than the main lobe.
When there is a reflection from water on the link and spatial diversity is
employed, then one expects large, slow swings in Signal Strength Ratio.
This indicates the antenna system is doing exactly as intended.
Page 7-33
Chapter 7: Operation
System statistics
Attribute
Meaning
Transmit,
Receive and
Aggregate Data
Rates
The data rates in the transmit direction, the receive direction and in both
directions, expressed in Mbps (max, mean, min, and latest). The max, min
and latest are true instantaneous measurements. The mean is the mean of a
set of one second means.
Histogram
Measurement
Period
The time over which the system histograms were collected.
System counters
The System Counters section of the System Statistics page (Figure 125) contains Data Port
Counters (Table 111), Management Agent Counters (Table 112) and Wireless Port Counters and
Performance Information (Table 113).
Figure 125 System Counters section of the System Statistics page
Procedure:
•
To reset all system counters to zero, click Reset System Counters.
Page 7-34
Chapter 7: Operation
System statistics
The packet counter attributes each contain a number in parentheses; this shows the number of
packets received since the last page refresh.
Table 111 Data Port Counters
Attribute
Meaning
Tx Frames
The total number of good frames the bridge has sent for transmission by
the local Ethernet interface.
Rx Frames
The total number of good frames the bridge has received from
transmission by the remote Ethernet interface.
Table 112 Management Agent Counters
Attribute
Meaning
Packets To Internal
Stack
The total number of good packets the bridge has transmitted to the
internal stack (for example, ARP, PING and HTTP requests).
Packets From
Internal Stack
The total number of good packets the bridge has received from the
internal stack (ARP responses, PING replies, HTTP responses).
Table 113 Wireless Port Counters and Performance Information
Attribute
Meaning
Tx Frames
Total number of good frames the bridge has sent for transmission by the
wireless interface.
Rx Frames
Total number of good frames the bridge has received from the wireless
interface.
Link Symmetry
Ratio between transmit and receive time in the TDD frame. The first
number is the time allowed for the transmit direction and the second
number is the time allowed for the receive direction.
Link Capacity
The maximum aggregate data capacity available for user traffic under
the current radio link conditions, assuming the units have been
connected using Gigabit Ethernet. The sum of the displayed Transmit
and Receive data rates may be lower than this figure if the link is not
fully loaded by the current traffic profile.
Transmit
Modulation Mode
The modulation mode currently being used on the transmit channel. The
number in brackets after the modulation mode and coding rate string is
the effective data rate available to all MAC layer protocols.
Page 7-35
Chapter 7: Operation
System statistics
Attribute
Meaning
Receive Modulation
Mode
The modulation mode currently being used on the receive channel. The
number in brackets after the modulation mode and coding rate string is
the effective data rate available to all MAC layer protocols.
Receive Modulation
Mode Detail
The receive modulation mode in use. For a list of values and their
meanings, see Table 101.
Wireless Link
Availability
Wireless link availability calculated since the last system counters reset.
Ethernet Bridging
Availability
Link availability for bridging Ethernet traffic calculated since the last reset
of the system counters. This is the percentage of time in which the
Ethernet Bridging Status attribute has been set to “Enabled”.
Byte Error Ratio
The ratio of detected Byte errors to the total number of bytes since the
last system reboot. This measurement is made continually using null
frames when there is no user data to transport.
Counter
Measurement
Period
The time over which the system counters were collected.
Other attributes
The bottom section of the System Statistics page (Figure 126) contains two attributes (Table 114).
Figure 126 Other attributes section of the System Statistics page
Procedure:
•
After updating the Statistics Page Refresh Period field, click Submit Page Refresh Period.
Table 114 Other attributes in the System Statistics page
Attribute
Meaning
Elapsed Time Indicator
Elapsed time since the last system reboot.
Statistics Page Refresh Period
The statistics page refreshes automatically according to the
setting entered here (in seconds).
Page 7-36
Chapter 7: Operation
System statistics
Wireless Port Counters page
Menu option: System > Statistics > Wireless Port Counters (Figure 127).
Use this page to check the Ethernet performance of the wireless bridge.
Figure 127 Wireless Port Counters page
Procedure:
•
Review the attributes (Table 115).
•
To change the refresh period, update the Counter Page Refresh Period attribute and click
Submit Page Refresh Period.
•
To reset all counters to zero, click Reset System Counters.
Page 7-37
Chapter 7: Operation
System statistics
Table 115 Wireless Port Counters attributes
Attribute
Meaning
Tx/Rx Frames
Number of frames transmitted and received over the wireless
bridge.
Rx Frames With Crc Error
Number of received frames with CRC errors.
Tx/Rx Frames Q0…Q7
Number of transmitted and received frames for each Traffic Class.
Tx Drops Q0…Q7
Number of transmitted frames dropped for each Traffic Class.
Rx Drops Q0…Q7
Total number of frames dropped due to the lack of sufficient
capacity in the receive buffer, for each Traffic Class.
Main Port Counters page
Menu option: System > Statistics > Main Port Counters (Figure 128). Use this page to check the
Ethernet performance of the PSU port. The displayed counters vary depending on which port is
being used to bridge the traffic.
Figure 128 Main Port Counters page (when main port is bridging traffic)
Page 7-38
Chapter 7: Operation
System statistics
Procedure:
•
Review the attributes (Table 116).
•
To change the refresh period, update the Counter Page Refresh Period attribute and click
Submit Page Refresh Period.
•
To reset all counters to zero, click Reset System Counters.
Table 116 Main Port Counters attributes
Attribute
Meaning
Tx/Rx Octets
Total number of octets (bytes) transmitted and received over the
interface.
Tx/Rx Frames
Total number of frames transmitted and received over the interface. This
includes both good and bad frames.
Tx Drops
Total number of transmit frames dropped.
Rx Frames With Crc
Error
Total number of received frames with CRC errors.
Tx/Rx Broadcasts
Total number of good transmitted and received broadcast packets.
Rx Frames
Undersize
Total number of frames received that are less than 64 bytes.
Tx/Rx Frames 64
Bytes
Total number 64 byte frames transmitted and received.
Tx/Rx Frames xxxx
to yyyy Bytes
Total number of frames transmitted and received in the size range xxxx
to yyyy bytes.
Tx/Rx Frames 1601
to Max bytes
Total number of frames transmitted and received in the size range 1601
to maximum bytes.
Rx Frames Oversize
Total number of frames received that are greater than the maximum
number of bytes.
Rx Pause Frames
Total number of received pause frames.
Page 7-39
Chapter 7: Operation
System statistics
Aux Port Counters page
Menu option: System > Statistics > Aux Port Counters (Figure 129).
Use this page to check the Ethernet performance of the Aux port.
Figure 129 Aux Port Counters page (when Aux port is out-of-band local)
Procedure:
•
Review the attributes (Table 117).
•
To change the refresh period, update the Counter Page Refresh Period attribute and click
Submit Page Refresh Period.
•
To reset all counters to zero, click Reset System Counters.
Table 117 Aux Port Counters attributes
Attribute
Meaning
Tx/Rx Frames
Total number of frames transmitted and received over the interface. This
includes both good and bad frames.
Rx Frames With Crc
Error
Total number of received frames with CRC errors.
Page 7-40
Chapter 7: Operation
System statistics
SFP Port Counters page
Menu option: System > Statistics > SFP Port Counters (Figure 130).
Use this page to check the Ethernet performance of the SFP port.
Figure 130 SFP Port Counters page (when SFP port is out-of-band local)
Procedure:
•
Update the attributes (Table 118).
•
To change the refresh period, update the Counter Page Refresh Period attribute and click
Submit Page Refresh Period.
•
To reset all counters to zero, click Reset System Counters.
Table 118 SFP Port Counters attributes
Attribute
Meaning
Tx/Rx Frames
Total number of frames transmitted and received over the interface. This
includes both good and bad frames.
Rx Frames With Crc
Error
Total number of received frames with CRC errors.
Page 7-41
Chapter 7: Operation
System statistics
Diagnostics Plotter page
Menu option: System > Diagnostics Plotter (Figure 131).
Use this page to monitor the performance of an operational PTP 650 link over time.
Figure 131 Diagnostic Plotter page
Procedure:
•
Select a diagnostic from the Diagnostics Selector drop-down list. These are the same as the
System Histogram attributes in the System Statistics page (Table 110).
•
Tick the required Trace Selection boxes: Max, Mean and Min.
•
Update the Page Refresh Period as required. The default period is 3600 seconds (1 hour). To
monitor the performance of a link in real time, select a much shorter period, for example 60
seconds.
•
Click Plot Selected Diagnostic. The selected diagnostic trace is displayed in the graph.
Maximum values are displayed in red, mean values are displayed in purple and minimum
values are displayed in blue.
Page 7-42
Chapter 7: Operation
System statistics
Generate Downloadable Diagnostics page
Menu option: System > Diagnostics Plotter > CSV Download (Figure 132).
Use this page to download diagnostics data to a CSV file.
Figure 132 Generate Downloadable Diagnostics page
Procedure:
•
Select a diagnostic from the Diagnostics Selector drop-down list.
•
Click Generate Diagnostics. The Generate Downloadable Diagnostics page is redisplayed with
the name of the generated CSV file.
•
Click on the CSV file name and save the CSV file to the hard drive of the local computer.
•
Open the CSV file in MS Excel and use it to generate reports and diagrams. The CSV file
contains at most 5784 entries, recorded over a 32 day period:
3600 entries recorded in the last hour.
1440 entries recorded in the previous 24 hours.
744 entries recorded in the previous 31 days.
Page 7-43
Chapter 7: Operation
Recovery mode
Recovery mode
This section describes how to recover a PTP 650 unit from configuration errors or software image
corruption.
Entering recovery mode
Use this procedure to enter recovery mode manually.
Note
The unit may enter recovery mode automatically, in response to some failures.
Note
Once the unit has entered recovery, it will switch back to normal operation if no access
has been made to the recovery web page within 30 seconds.
Procedure:
Apply power to PSU for at least 10 seconds.
Remove power for 5 seconds.
Re-apply power to the PSU.
When the unit is in recovery mode, access the web interface by entering the default IP address
169.254.1.1. The Recovery Image Warning page is displayed:
Click on the warning page image. The Recovery Option Page is displayed (Figure 133).`
Review the Software Version and Recovery Reason (Table 119).
Select a recovery option (Table 120).
Page 7-44
Chapter 7: Operation
Recovery mode
Figure 133 Recovery Options page
Table 119 Recovery Options attributes
Attribute
Meaning
Software Version
The software version of the recovery operating system permanently
installed during manufacture.
Recovery Reason
The reason the unit is operating in Recovery mode, for example “Invalid
or corrupt image”.
“Unknown” usually means there has been a power outage.
MAC Address
The MAC address of the unit programmed during manufacture.
Page 7-45
Chapter 7: Operation
Recovery mode
Table 120 Recovery Options buttons
Button
Purpose
Upgrade Software
Image
Use this option to restore a working software version when software
corruption is suspected, or when an incorrect software image has been
loaded. Refer to Upgrading software image on page 7-46.
Reset IP & Ethernet
Configuration back to
factory defaults
Use this option to restore the IP and Ethernet attributes to their defaults.
Refer to Resetting IP & Ethernet configuration on page 7-47.
Erase Configuration
Use this option to erase the entire configuration of the unit. Refer to
Erasing configuration on page 7-48.
Zeroize Critical
Security Parameters
Use this option to reset encryption keys and the system administrator
password. Refer to Zeroize Critical Security Parameters page on page 750.
Reboot
Use this option to reboot the unit. Refer to Rebooting the unit on page
7-51.
Upgrading software image
Use this option to restore a working software image from the Recovery Options page (Figure 133).
Procedure:
Click Browse.
Navigate to the required software image. This may be the most recent image if software
corruption is suspected, or an older image if an incorrect image has just been loaded. Click on
the image and click Open.
Click Upgrade Software Image. The Confirmation page is displayed. Click Program Software
Image into Non-Volatile Memory. The Upgrade Progress Tracker page is displayed:
Page 7-46
Chapter 7: Operation
Recovery mode
When the Software Upgrade Complete page is displayed, check that the correct image has
been downloaded:
Click Reboot Wireless Unit. When the “Are you sure?” message is displayed, click OK.
The unit will now reboot and restart in normal operational mode, and the link should recover.
If the unit or link fails to recover, refer to Testing link end hardware on page 8-2.
Resetting IP & Ethernet configuration
Use this option to reset IPv4, IPv6 and Ethernet configuration back to defaults from the Recovery
Options page (Figure 133).
Note
This procedure resets the IP Version attribute to IPv4. It also resets the IPv6
configuration.
Procedure:
Click Reset IP & Ethernet Configuration back to factory defaults. The reset pop up box is
displayed:
Record the IP address, as it will be needed to log into the unit after recovery.
Page 7-47
Chapter 7: Operation
Recovery mode
Click OK. The reset confirmation page is displayed:
Click Reboot. When the “Are you sure you want to REBOOT this unit?” message
is displayed, click OK.
The unit will now reboot. The unit should now start up in normal mode but with the IP and
Ethernet configuration reset to factory defaults. If the unit fails to recover, refer to Testing link
end hardware on page 8-2.
Erasing configuration
Use this option to erase the entire configuration of the unit from the Recovery Options page
(Figure 133).
Page 7-48
Chapter 7: Operation
Recovery mode
Procedure:
Click Erase Configuration. The erase pop up box is displayed:
Click OK. The erase confirmation page is displayed:
Click Reboot. When the confirmation message is displayed, click OK.
The unit reboots and starts up in normal mode but with all configuration erased. If the unit
fails to start up, refer to Testing link end hardware on page 8-2.
Page 7-49
Chapter 7: Operation
Recovery mode
Zeroize Critical Security Parameters page
Use this option to zeroize the critical security parameters (CSPs) of the unit from the Recovery
Options page (Figure 133).
Procedure:
Click Zeroize Critical Security Parameters. The confirmation pop up box is displayed:
Click OK. The zeroize CSPs confirmation page is displayed:
Page 7-50
Chapter 7: Operation
Recovery mode
Click Reboot. When the “Are you sure you want to REBOOT this unit?”
message is displayed, click OK.
The unit will now reboot. The unit should now start up in normal mode but with the CSPs
zeroized. If the unit fails to recover, refer to Testing link end hardware on page 8-2.
Rebooting the unit
Use this option to reboot the unit from the Recovery Options page (Figure 133).
Procedure:
•
Click Reboot.
•
When the “Are you sure you want to REBOOT this unit?” message is displayed,
click OK. The unit will now reboot. The unit should now start up in normal operational mode. If
the unit fails to start up, refer to Testing link end hardware on page 8-2.
Page 7-51
Chapter 8: Troubleshooting
This chapter contains procedures for identifying and correcting faults in a PTP 650 link. These
procedures can be performed either on a newly installed link, or on an operational link if
communication is lost, or after a lightning strike.
The following topics are described in this chapter:
•
Testing link end hardware on page 8-2 describes how to test the link end hardware, either
when it fails on startup, or after a lightning strike.
•
Testing the radio link on page 8-9 describes how to test the link when there is no radio
communication, or when it is unreliable, or when the data throughput rate is too low.
Page 8-1
Chapter 8: Troubleshooting
Testing link end hardware
Testing link end hardware
This section describes how to test the link end hardware when it fails on startup or during
operation.
Before testing link end hardware, confirm that all outdoor drop cables, that is those that connect
the ODU to equipment inside the building, are of the supported type, as defined in Outdoor copper
Cat5e Ethernet cable on page 2-21.
AC Power Injector LED sequence
When the AC Power Injector is connected to the AC mains, the Power (green) LED should
illuminate within 5 seconds of connection. If this does not happen, the AC injector is either not
receiving power from the AC mains or there is a fault on the drop cable causing the power injector
to sense an over current condition on the ODU output connector.
Action: Remove the ODU cable from the PSU and observe the effect on the power LED:
•
If the power LED does not illuminate, confirm that the mains supply is working, for example
check the plug and fuse (if fitted). If the power supply is working, report a suspected PSU fault
to Cambium Networks.
•
If the Power LED does illuminate, perform Test resistance in the drop cable on page 5-20.
AC+DC Enhanced power injector LED sequence
For the AC+DC Enhanced power injector, the expected power-up LED sequence is:
•
The Power (green) LED illuminates steadily.
•
After about 45 seconds, the Ethernet (yellow) LED blinks slowly 10 times.
•
The Ethernet (yellow) LED illuminates steadily, then blinks randomly to show Ethernet activity.
If this sequence does not occur, take appropriate action depending on the LED states:
•
Power LED is off on page 8-3
•
Power LED is blinking on page 8-3
•
Ethernet LED did not blink 10 times on page 8-3
•
Ethernet LED blinks ten times then stays off on page 8-4
•
Ethernet LED blinks irregularly on page 8-5 (for example a short blink followed by a long blink)
•
Power LED is on, Ethernet LED blinks randomly on page 8-5
If a fault is suspected in the ODU-PSU drop cable, perform Test resistance in the drop cable on
page 5-20.
Page 8-2
Chapter 8: Troubleshooting
Testing link end hardware
Power LED is off
Meaning: Either the PSU is not receiving power from the AC/DC outlet, or there is a wiring fault in
the ODU cable.
Action: Remove the ODU cable from the PSU and observe the effect on the Power LED:
•
If the Power LED does not illuminate, confirm that the mains power supply is working, for
example, check the plug and fuse (if fitted). If the power supply is working, report a suspected
PSU fault to Cambium Networks.
•
If the Power LED does illuminate, perform Test resistance in the drop cable on page 5-20.
Power LED is blinking
Meaning: The PSU is sensing there is an overload on the ODU port; this could be caused by a
wiring error on the drop cable or a faulty ODU.
Action: Remove the ODU cable from the PSU. Check that pins 4&5 and 7&8 are not crossed with
pins 1&2 and 3&6. Check that the resistance between pins 1&8 is greater than 100K ohms. If either
check fails, replace or repair the ODU cable.
Ethernet LED did not blink 10 times
Meaning: The ODU flashes the LED on the AC+DC Enhanced Power Injector 10 times to show that
the ODU is powered and booted correctly.
Action:
Remove the ODU cable from the PSU. Examine it for signs of damage. Check that the ODU
cable resistances are correct, as specified in Test resistance in the drop cable on page 5-20. If
the ODU cable is suspect, replace it.
Use the LPU (if installed) to check that power is available on the cable to the ODU. Access the
connections by rotating the LPU lid as shown (slacken the lid nut but do not remove it):
Page 8-3
Chapter 8: Troubleshooting
Testing link end hardware
Check that test point P1 on the LPU PCB corresponds to pin 1 on the RJ45. Repeat for points
P2 to P8. This test is only valid if both the PSU and the ODU are disconnected.
Reconnect the ODU cable to the PSU.
Check that the PWR LED near the top right of the LPU PCB is illuminated to indicate power in
the Ethernet cable.
If any test fails, replace or repair the cable that connects the PSU to the LPU or ODU.
Ethernet LED blinks ten times then stays off
Meaning: There is no Ethernet traffic between the PSU and ODU.
Action: The fault may be in the LAN or ODU cable:
•
Confirm that Ethernet traffic is connected to the AC+DC injector LAN port, confirm the cable is
not faulty, replace if necessary.
•
If the LAN connection to the AC+DC power injector is working, check the drop cable is correctly
wired using a suitable cable tester. Repeat the drop cable tests on page Test resistance in the
drop cable on page 5-20.
Page 8-4
Chapter 8: Troubleshooting
Testing link end hardware
Ethernet LED blinks irregularly
Meaning: If the Ethernet LED blinks irregularly, for example two rapid blinks followed by a longer
gap, this indicates that the ODU has booted in recovery mode. The causes may be: installation
wiring, or a corrupt ODU software load, or sufficient time has not been allowed between a repeat
power up.
Action: Refer to Recovery mode on page 7-44.
Power LED is on, Ethernet LED blinks randomly
Meaning: Both LEDs are in their normal states, implying that the PSU is receiving power from the
AC/DC outlet and there is normal Ethernet traffic between the PSU and ODU.
Action: If, in spite of this, a fault is suspected in the link end hardware:
•
If the Ethernet connection to the network is only 100BASE-TX, when 1000BASE-T is expected:
remove the ODU cable from the PSU, examine it, and check that the wiring to pins 4&5 and
7&8 is correct and not crossed.
•
Perform Ethernet packet test on page 8-6.
Page 8-5
Chapter 8: Troubleshooting
Testing link end hardware
Ethernet packet test
Follow the Ethernet packet test flowchart (Figure 134) and procedures below.
Figure 134 Ethernet packet test flowchart
Page 8-6
Chapter 8: Troubleshooting
Testing link end hardware
Test Ethernet packet errors reported by ODU
Log into the unit and click Administration, Statistics, Detailed Counters. Click Reset System
Counters at the bottom of the page and wait until the Ethernet Rx Packets counter has reached 1
million (the count will only update when the page is refreshed. If the counter does not increment
or increments too slowly, because for example the PTP 650 is newly installed and there is no
offered Ethernet traffic, then abandon this procedure and consider using the procedure Test ping
packet loss on page 8-7.
Read the Ethernet Rx Crc And Align counter. The test has passed if this is less than 10.
Test Ethernet packet errors reported by managed switch or router
If the ODU is connected to a managed Ethernet switch or router, it may be possible to monitor the
error rate of Ethernet packets. Please refer to the user guide of the managed network equipment.
The test has passed if the rate of packet errors reported by the managed Ethernet switch or router
is less than 10 in 1 million packets.
Test ping packet loss
Using a computer, it is possible to generate and monitor packets lost between the PSU and the
ODU. This can be achieved by executing the Command Prompt application which is supplied as
standard with Windows and MAC operating systems.
Caution
This procedure disrupt network traffic carried by the PTP 650 under test:
Procedure:
Ensure that the IP address of the computer is configured appropriately for connection to
the PTP 650 under test, and does not clash with other devices connected to the network.
If the PSU is connected to an Ethernet switch or router then connect the computer to a spare
port, if available.
If it is not possible to connect the computer to a spare port of an Ethernet switch or router,
then the PSU will need to be disconnected from the network in order to execute this test:
•
Disconnect the PSU from the network.
•
Connect the computer directly to the LAN port of the PSU.
On the computer, open the Command Prompt application.
Page 8-7
Chapter 8: Troubleshooting
Testing link end hardware
Send 1000 ping packets of length 1500 bytes. The process will take 1000 seconds, which is
approximately 17 minutes.
If the computer is running a Windows operating system, this is achieved by typing (for an IPv6
address, use the ping6 command):
ping –n 1000 –l 1500 
where  is the IP address of the PTP 650 ODU under test.
If the computer is running a MAC operating system, this is achieved by typing:
ping –c 1000 –s 1492 
where  is the IP address of the PTP 650 ODU under test.
Record how many Ping packets have been lost. This is reported by Command Prompt on
completion of the test.
The test has passed if the number of lost packets is less than 2.
Page 8-8
Chapter 8: Troubleshooting
Testing the radio link
Testing the radio link
This section describes how to test the link when there is no radio communication, when it is
unreliable, when the data throughput rate is too low, or when a unit is causing radio or TV
interference. It may be necessary to test the units at both ends of the link.
No activity
If there is no wireless activity, proceed as follows:
Check for Alarm conditions on Home page.
Check that the software at each end of the link is the same version.
Check that the Target Mac address is correctly configured at each end of the link.
Check Range.
Check Tx Power.
Check License keys to ensure that both units are the same product variant.
Check Master/Slave status for each unit and ensure that one unit is Master and the other unit
is slave.
Check that the link is not obstructed or the ODU misaligned.
Check the DFS page at each end of the link and establish that there is a quiet wireless channel
to use.
10
If there are no faults found in the configuration and there is absolutely no wireless signal,
retry the installation procedure.
11
If this does not work then report a suspected ODU fault to Cambium Networks.
Some activity
If there is some activity but the link is unreliable or does not achieve the data rates required,
proceed as follows:
Check that the interference has not increased using the DSO measurements.
If a quieter channel is available check that it is not barred.
Check that the path loss is low enough for the communication rates required.
Check that the ODU has not become misaligned.
Page 8-9
Chapter 8: Troubleshooting
Testing the radio link
Radio and television interference
If a PTP 650 unit is interfering with radio or television reception (this can be determined by turning
the equipment off and on), attempt the following corrective actions:
•
Realign or relocate the antenna.
•
Increase the separation between the affected equipment and antenna.
•
Connect the ODU and PSU power supply into a power outlet on a circuit different from that to
which the receiver is connected.
•
Contact Cambium Point-to-Point for assistance.
Page 8-10
Glossary
Term
Definition
AES
Advanced Encryption Standard
ANSI
American National Standards Institution
ARP
Address Resolution Protocol
ATPC
Automatic Transmit Power Control
Aux
Auxiliary
BBDR
Broadband Disaster Relief
BPSK
Binary Phase Shift Keying
BW
Bandwidth
CFM
Connection Fault Management
CHAP
Challenge Handshake Authentication Protocol
CSP
Critical Security Parameter
DC
Direct Current
DER
Distinguished Encoding Rules
DES
Data Encryption Standard
DFS
Dynamic Frequency Selection
DHCP
Dynamic Host Configuration Protocol
DSCP
Differentiated Services Code Point
DSO
Dynamic Spectrum Optimization
EAPS
Ethernet Automatic Protection Switching
EIRP
Equivalent Isotropic Radiated Power
EMC
Electromagnetic Compatibility
EMD
Electro-Magnetic Discharge
EPL
Ethernet Private Line
ETSI
European Telecommunications Standards Institute
EU
European Union
FAQ
Frequently Asked Question
Page I
Glossary
Term
Definition
FCC
Federal Communications Commission
FIPS
Federal Information Processing Standards
GARP
Generic Attribute Registration Protocol
GE
Gigabit Ethernet
GUI
Graphical User Interface
HTTP
Hypertext Transfer Protocol
IB
In-Band
IC
Industry Canada
ICMP
Internet Control Message Protocol
ICNIRP
International Commission on Non-Ionizing Radiation Protection
IEEE
Institute of Electrical and Electronic Engineers
IP
Internet Protocol
IPSec
Internet Protocol Security
ISM
Industrial Scientific and Medical
ITPE
Initial Transmit Power Estimate
KDB
Knowledge Database
L2CP
Layer Two Control Protocols
LACP
Link Aggregation Control Protocol
LLDP
Link Layer Discovery Protocol
LAN
Local Area Network
LOS
Line-of-Sight (clear line-of-sight, and Fresnel zone is clear)
LPU
Lightning Protection Unit
MAC
Medium Access Control Layer
MDI (-X)
Medium Dependent Interface (-Crossover)
MEF
Metro Ethernet Forum
MIB
Management Information Base
MIMO
Multiple-Input Multiple-Output
MLD
Multicast Listener Discovery
MPLS
Multiprotocol Label Switching
MRP
Multiple Registration Protocol
Page II
Glossary
Term
Definition
MSTP
Multiple Spanning Tree Protocol
MTU
Maximum Transmission Unit
NA
Neighbor Advertisement
NLOS
Non-Line-of-Sight
NMEA
National Marine Electronics Association
NS
Neighbor Solicitation
NTP
Network Time Protocol
NUD
Neighbor Un-reachability Detection
ODU
Outdoor Unit
OFDM
Orthogonal Frequency Division Multiplex
OOB
Out-of-Band
PC
IBM Compatible Personal Computer
PEAP
Protected Extensible Authentication Protocol
PIDU
Powered Indoor Unit
POE
Power over Ethernet
PSU
Power Supply Unit
PTP
Point-to-Point
QAM
Quadrature Amplitude Modulation
QoS
Quality of Service
QPSK
Quadrature Phase Shift Keying
R-APS
Ring Automatic Protection Switching
RADIUS
Remote Authentication Dial-In Service
RAM
Random Access Memory
RF
Radio Frequency
RFC
Request for Comments
RoW
Rest of World
RMA
Return Material Authorization
RSSI
Received Signal Strength Indication
RSTP
Rapid Spanning Tree Protocol
SELV
Safety Extra Low Voltage
Page III
Glossary
Term
Definition
SFP
Small Form-factor Pluggable
SLAAC
Stateless Address Auto-configuration
SMTP
Simple Mail Transport Protocol
SNMP
Simple Network Management Protocol
SNTP
Simple Network Time Protocol
STP
Spanning Tree Protocol
Syslog
System Logging
TC
Traffic Class
TCP
Transmission Control Protocol
TDD
Time Division Duplexing
TDM
Time Division Multiplexing
TDWR
Terminal Doppler Weather Radar
TGB
Tower Ground Bus bar
TLS
Transport Layer Security
UNII
Unlicensed National Information Infrastructure
URL
Universal Resource Location
USM
User-based Security Model
UTC time
Coordinated Universal Time
UTP
Unshielded Twisted Pair
UV
Ultraviolet
VACM
View-based Access Control Model
VLAN
Virtual Local Area Network
WEEE
Waste Electrical and Electronic Equipment
Page IV

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.6
Linearized                      : Yes
Author                          : Cambium Networks
Create Date                     : 2013:08:30 14:25:58+01:00
Modify Date                     : 2013:09:02 09:30:02+01:00
Subject                         : phn-3341 002v001
Tagged PDF                      : Yes
XMP Toolkit                     : Adobe XMP Core 5.2-c001 63.139439, 2010/09/27-13:37:26
Metadata Date                   : 2013:09:02 09:30:02+01:00
Creator Tool                    : Acrobat PDFMaker 11 for Word
Document ID                     : uuid:15e33892-8fe7-494e-9622-23238e48b7cb
Instance ID                     : uuid:817520de-9a23-482d-ae05-bcb86512a242
Format                          : application/pdf
Title                           : PTP 650 Series User Guide
Description                     : phn-3341 002v001
Creator                         : Cambium Networks
Producer                        : Adobe PDF Library 11.0
Keywords                        : 
Source Modified                 : D:20130830132500
Company                         : Cambium Networks
A4 Date                         : Jan 2011
A4 Ordno                        : phn-1863_001v001
Headline                        : phn-3341 002v001
Page Layout                     : OneColumn
Page Mode                       : UseOutlines
Page Count                      : 202
EXIF Metadata provided by EXIF.tools
FCC ID Filing: QWP-50650

Navigation menu