Zebra Technologies WMC6300704 PCMCIA Card User Manual VMM User s Guide

Zebra Technologies Corporation PCMCIA Card VMM User s Guide

VMM Users Manual

Vehicle Mounted
Modem
User’s Guide
Version 3.0
Copyright 2003-2004, MeshNetworks, Inc. All Rights Reserved
MEA VMM User’s Guide
Foreword
This document describes in detail the confidential and proprietary technology of MeshNetworks’
MEA™ Architecture. MeshNetworks’ products and technology are protected by US and
international patent and patent pending technology. This document represents the current MEA
design; the contents are subject to change at any time at the discretion of MeshNetworks, Inc.
MEA, MeshTray, and MeshNetworks’ logo are trademarks or registered trademarks of
MeshNetworks, Inc. All other product names and services identified throughout this publication
are trademarks or registered trademarks of their respective companies. No such uses or the
use of any trade name is intended to convey endorsement or other affiliation with this
publication.
Copyright © 2003-2004, MeshNetworks, Inc. All Rights Reserved.
iii
MEA VMM User’s Guide
Table of Contents
1 VEHICLE MOUNTED MODEM .............................................................................................1
1.1 Introduction.................................................................................................................1
1.2 What’s in the Box .......................................................................................................1
2 INSTALLATION REQUIREMENTS.......................................................................................2
2.1 Equipment...................................................................................................................2
2.2 Record MAC Address of the VMM6300 ....................................................................3
2.3 VMM6300 Assembly ...................................................................................................3
2.3.1 Deployment ....................................................................................................... 4
2.3.2 Deployment Tips................................................................................................ 4
2.3.3 Testing............................................................................................................... 4
3 INSTALLING THE MEA VEHICLE MOUNTED MODEM......................................................6
3.1 Device Administration: Configuring the VMM Devices...........................................6
3.1.1 Accessing the MEA Device Administration Web Pages .................................... 6
3.1.2 Configuring the Device .................................................................................... 10
3.1.2.1 Device Addressing....................................................................................... 11
3.1.2.2 Network DHCP Scheme .............................................................................. 11
3.1.2.3 Statically Provisioned Scheme .................................................................... 12
3.1.2.4 User Supplied Scheme................................................................................ 12
3.1.2.5 Setting the User Supplied IP Address ......................................................... 13
3.1.3 Resetting the VMM .......................................................................................... 15
3.1.4 Restoring Factory Settings – User Supplied Mode Limitations ....................... 17
3.1.4.1 VMM Reset-to-Default Recovery In User-Supplied Mode ........................... 17
3.1.4.2 Reset the Device Addressing Mode Using DeviceManager........................ 17
3.1.4.3 Reset the Device Addressing Mode via the Configuration Web Page......... 17
3.1.4.4 Reset the User-Supplied Parameters via the Configuration Web Page ...... 17
3.1.5 Restoring Factory Settings – Normal Operations ............................................ 18
v
MeshNetworks
3.1.6 Changing the Web Password .......................................................................... 20
3.1.7 Upgrading the Device Firmware ...................................................................... 22
3.2 External Device Provisioning..................................................................................24
3.2.1 Connecting to the Ethernet Port ...................................................................... 25
3.3 Infrastructure Requirements ...................................................................................25
3.3.1 VMM MAC Addresses ..................................................................................... 26
4 LICENSE AND WARRANTY INFORMATION ....................................................................27
4.1 Important Information ..............................................................................................27
5 FCC REGULATORY INFORMATION.................................................................................29
5.1 FCC Information .......................................................................................................29
vi
MEA VMM User’s Guide
List of Figures
Figure 2-1 VMM6300 Identification Label ............................................................................3
Figure 2-2. VMM External Connection Point .......................................................................3
Figure 3-1 Enter Network Password Initial Web Page Authentication Dialog .................7
Figure 3-2. MEA Device Administration Redirecting Web Page.........................................8
Figure 3-3. MEA Device Administration Home Page (Super User Login)..........................9
Figure 3-4. VMM Device Administration Configuration Page (Super User Login)..........10
Figure 3-5. Configuration Change Dialog...........................................................................13
Figure 3-6. System Update Save Completed Web Page ...................................................14
Figure 3-7. Device Reset Prompt Web Page ......................................................................15
Figure 3-8. Device Reset in Progress Page........................................................................16
Figure 3-9. Restore Factory Settings Web Page................................................................18
Figure 3-10. Confirm Changes Window for Restore Factory Settings ..........................19
Figure 3-11. Factory Settings Restored Web Page..........................................................19
Figure 3-12. Enter New Password Web Page...................................................................20
Figure 3-13. Confirm Changes Window for Enter New Password .................................21
Figure 3-14. Password Changed Confirmation Web Page..............................................21
Figure 3-15. Update Device Firmware Web Page.............................................................22
Figure 3-16. Confirm Upload Window for Firmware Update...........................................23
Figure 3-17. Firmware Upload Progress Web Page.........................................................23
Figure 3-18. External Device Provisioning Table.............................................................24
vii
MEA VMM User’s Guide
1 Vehicle Mounted Modem
1.1 Introduction
Thank you for purchasing the MEA Vehicle Mounted Modem (VMM). MEA is a wireless
communication system capable of supporting high data rate mobile communication at variable
rates of vehicular speeds.
The VMM (VMM6300) is a wireless modem that has been designed for permanent in-vehicle
mounting. It provides access to the MEA network via an Ethernet connection to mobile data
terminals, laptop computers, or any other device that has an Ethernet port. The VMM operates
on 12vDC and is rugged enough for installation in commercial and public safety vehicles. The
VMM provides the same functionality as the WMC6300 to the connected device, including geo-
location. (Mobile antenna and cabling not included.)
The VMM efficiently combines the functionality of a Meshnetworks subscriber device and client
modem in to a single cost-effective wireless network component. This makes it easy for any
Ethernet ready device to access a MeshNetworks Enabled Architecture (MEA™) mobile
broadband network. Computers, IP video cameras, sensors, signs, signals, etc. can all be
Mesh-Enabled to send and receive data at burst rates of up to 6 Mbps. All standard subscriber
device functionality including Multi-Hopping™, non-line of-sight communications and geo-
location services are fully supported.
The MEA Vehicle Mounted Modem allows connection of multiple IP addressable devices using
standard Ethernet connectivity. This allows devices that cannot accept the PCMCIA based
WMC3600 product to function on a MEA network without drivers in a transparent manner.
This document provides detailed installation and configuration instructions for use when
installing the MEA VMM.
1.2 What’s in the Box
Each MEA VMM is a full-featured wireless networking device. The following is a list of the items
provided with each VMM:
MEA Vehicle Mounted Modem
15 feet 18 AWG wire, rated for 12 VDC with 2 amp in line fuse
VMM cable connector (end 1): Switchcraft EN3C2F
VMM cable connector (end 2): Molex 19121-009 spade lugs
1
MeshNetworks
2 Installation Requirements
NOTE: All Intelligent Access Points (IAPs) on the MEA network require a software upgrade to
support VMM Devices.
The MEA Vehicle Mounted Modem External will require the following in a typical installation:
12 VDC Power from vehicle or other direct current power supply
A Hub or Switch (if more then 1 Ethernet device will be used)
Antenna and RF cabling appropriate for use in the 2.4 Ghz band.
2.1 Equipment
A VMM6300 is used similarly to a subscriber device within a MEA network. A VMM6300 will be
used with MeshNetwork’s infrastructure devices: IAP6300 and MWR6300. MeshManager
software is used to manage a VMM in the MEA network.
The following list defines the standard MEA hardware components to install a VMM:
VMM Box with N-type Antenna Connector
15 feet 18 AWG wire, 12 VDC with 2 amp in line fuse
Trunk Mounting Bracket
The Network Operator must supply the following:
Mounting Location
Power Source (12V DC)
Hand tools for bracket installation
Optional Equipment:
An Antenna Cable and connector must be ordered separately.
Antenna is N-Type connector
MeshNetworks SKU: MEA-MM0-VMM
Antenna Options are the following:
Manufacturer Part Number Gain Usage
Maxrad BMMG2400ML195MSMA 0 dBi Mobile
Antenex TRA24003 3 dBi Mobile
2
MEA VMM User’s Guide
2.2 Record MAC Address of the VMM6300
The transceiver and SBC (Ethernet) MAC addresses are recorded on the label located on front
side of the VMM unit.
Record these numbers in the MAC Address Table in Section 3.3.1, because they will be
required later to configure and provision the device.
Figure 2-1 VMM6300 Identification Label
2.3 VMM6300 Assembly
The VMM6300 Assembly shows the external connection points on a VMM6300 box.
N-Type
Antenna Power
Reset
Power
Connect Ethernet
(Crossover MDI-X)
Figure 2-2. VMM External Connection Point
3
MeshNetworks
Install the VMM using the following procedure:
1.
2.
3.
4.
5.
Mount the VMM box in a suitable location in a vehicle. The device is not water proof. The device
should be reasonable protected from moisture and other exposed outdoor environments. Refer
to the mounting procedure in the assembly section of this document.
Connect the antenna to the N-type connector .
Insert the Power Plug into Power Connector.
Verify the MAC address and ETH address has been recorded in Section 3.3.1, as it will be
required to configure and test the device.
The Test Port is unused during deployment.
Figure 2-3 VMM6300 Trunk Mounting
2.3.1 Deployment
When deploying the VMM6300, the antenna should be a minimum of 30 inches from any nearby
metal poles to avoid distortion of the RF pattern. The antenna must have a separation distance
of at least 2 meters from the body of all persons and must not be co-located or operating in
conjunction with any other antenna or transmitter. Users and installers must be provided with
antenna installation and transmitter operating conditions to satisfy RF exposure compliance.
Typically, Vehicle Mounted Modems are distributed within a network and are used as subscriber
devices. A rule of thumb is to deploy 2-3 hop networks to optimize range, latency, and
throughput to subscriber devices.
The VMM6300 installation location must provide applicable DC power for the device.
2.3.2 Deployment Tips
Locate the antenna to minimize multipath:
Minimize interference from nearby transmitters
Maximize chance of a direct line of sight connection to other devices.
The antenna supplied is designed to be mounted vertically
2.3.3 Testing
Verify the operation of the VMM6300 using the following procedure:
1. Apply power to the VMM6300 – power reset button will be illuminated to red.
4
MEA VMM User’s Guide
2. Obtain the transceiver MAC address and the ETH address that was recorded in Section 3.3.1.
The address will be in the format 00-05-12-0A-xx-yy for the transceiver and 00-05-12-30-xx-yy for
ETH.
3. From MeshManager, display devices using the MAC address.
4. Select the appropriate VMM in the device tree, and then ping the device (right click and select
ping).
A successful response to the ping command verifies that the VMM is communicating to the
infrastructure devices.
5
MeshNetworks
3 Installing the MEA Vehicle Mounted Modem
3.1 Device Administration: Configuring the VMM Devices
The VMM provides network access to one or more IP devices connected to the Ethernet port of
the VMM. In order for the VMM to provide service to the IP devices, some configuration must be
done prior to connecting the IP devices.
The VMM serves as a default gateway for the attached IP devices. Because some devices
expect the default gateway to reside on the local subnet, the address that the VMM uses for
gateway service (on the wired interface) must be configurable. Some consideration should be
used in selecting a gateway address for the VMM.
The local default gateway address is used only on the wired interface, and is only visible to the
attached IP devices. It is not advertised to the wireless network, and the network cannot access
the VMM using this gateway address. The VMM has another IP address for the wireless
interface that can be used to access the VMM from the network. Because is gateway address is
limited to the local wired interface, the same address could be used for the gateway service in
several VMM devices. The local gateway should be a part of the overall subnet chosen for your
mēa network.
When selecting IP addresses, care must be taken to ensure that the selected IP address does
not conflict with any other devices or the chosen Local Gateway service address on the MEA
network.
3.1.1 Accessing the MEA Device Administration Web Pages
To modify the IP configuration for the VMM using the web interface, you must know the IP
address assigned to the wireless interface of the VMM. The IP address can be determined
from MeshManager, or from the DHCP server (once the device is configured for DHCP). The
default IP address for the VMM wireless interface is derived from the transceiver MAC address
(10.xx.yy.1, where the MAC address is 00:05:12:0A:XX:YY), similar to the default IP addresses
described in Section 3.2.
Once the IP address is known, you can access the web page of the device. Point your web
browser to the IP address of the VMM. In the examples following, the VMM address is
172.16.1.53, and the web page would be found at http://172.16.1.53/.
6
MEA VMM User’s Guide
Figure 3-1 Enter Network Password Initial Web Page Authentication Dialog
The username is admin, and the default (initial) password is admin.
The password for the admin account should be changed during installation.
The device has two accounts for the web pages - an administrative account (username:admin,
default password:admin), and an access account (username: monitor, default password:
monitor). The administrative account must be used for provisioning the device, and the access
account may be used for monitoring the status of the device.
The installation procedure described here requires administrator access. Alternatively, all of the
parameters that are provisioned via the web page may be provisioned via MeshManager
instead.
The administrator has the ability to change the password for the access account.
NOTE: If you are running a VMM as a standalone device, the configuration web page can be
reached by connecting a PC to the wired interface.
7
MeshNetworks
After the login authentication has been completed, the web browser will display a redirecting
page, and your browser will automatically transition to the home web page for MEA Device
Administration.
Figure 3-2. MEA Device Administration Redirecting Web Page
8
MEA VMM User’s Guide
Figure 3-3. MEA Device Administration Home Page (Super User Login)
The MEA Device Administration home page provides you with some basic information about
the device, including the IP addresses assigned to the device, the MAC addresses of the
device, the firmware revision number, and the reported link quality for the link to the IAP. In
addition, links are provided to web pages for device configuration, password management,
firmware upgrades, device reset, and restoring the factory default configuration.
9
MeshNetworks
3.1.2 Configuring the Device
Once you have accessed the MEA Device Administration home page, click on the
Configuration tab to display the IP address configuration.
Figure 3-4. VMM Device Administration Configuration Page (Super User Login)
The VMM Device Administration (Super User Login) Configuration page will allow you to change
the configuration of the VMM. The fields displayed on this page are described below.
Field Name Field Description Field Default Value
System Name This is the name of the device as shown by
MeshManager
Assigned by
Network
Administrator
10
MEA VMM User’s Guide
Field Name Field Description Field Default Value
RDATE Server IP
Address
The IP address of the RDATE server. This is
usually the MiSC when operating in
infrastructure mode. The RDATE server
provides the current date to the VMM. The
VMM can operate without an RDATE server.
172.31.0.20
Wired Interface
Address
The VMM will tell the attached Ethernet devices
to use this address for the default gateway, and
the VMM will use the address when accessing
the local Ethernet segment.
MAC-derived
Wired Interface
Subnet Mask
This is the subnet mask for the local Ethernet
segment.
255.255.0.0
DHCP Lease Time This is the duration (in seconds) of the DHCP
leases that the VMM offers to the attached
Ethernet devices.
300
Device Priority The Device Priority provisioning area allows the
operator to set the priority assigned to wireless
messages transmitted by this device.
Levels 0-7 are
available. The
number of priority
levels for your
configuration is set
by the Network
Administrator
Geo Settings The Geo Settings area allows the operator to
enable and disable the Geo Reporting feature
(if provisioned), as well as control the
frequency of reports and provision the
destination server to which those Geo reports
will be sent.
NA
The External Device Provisioning frame of this web page is described in Section 3.2.
A similar screen will be displayed for the access account (the web page will indicate Normal
User Login). Normal users can change only those settings for which they have system
privileges.
3.1.2.1 Device Addressing
With mea Release 3.0, the concept of modes has been replaced by a Unified Modes of
operation addressing scheme. The concept of unified modes of operation centers on the current
state of network communication: Associated State and Unassociated State. There are three
addressing schemes which allow the IT manager increased flexibility in deployment.
3.1.2.2 Network DHCP Scheme
Operation under the Network DHCP scheme is similar to that of Release 2 in Infrastructure
Mode. The primary difference is users are now allowed to temporarily wander outside of the
network infrastructure without losing connectivity.
Network DCHP requires that the VMM device be configured to request an address from a
11
MeshNetworks
DHCP server and the inclusion of a DHCP server in the core network configuration to answer
these requests. With Network DHCP selected, the VMM will send DHCP requests for its own
address to the core network once it becomes associated and establishes communications with
the infrastructure.
The server may be configured by the operator to hand out temporary or static leases. The VMM
must associate and acquire an address from the network before establishing communications.
Once a lease has been granted, the address may be dragged out of network coverage for the
remainder of the lease or, if a static lease was granted, until the next power cycle. If the lease
expires or the user cycles power while outside of network coverage, the user will again lose the
ability to communicate with the wireless network.
This scheme is best for a larger, closely managed network of subscribers who don't need to
communicate or communicate only briefly outside of network coverage.
3.1.2.3 Statically Provisioned Scheme
Operation under the Statically Provisioned scheme is similar to that of Release 2 in Peer-to-
Peer Mode. The primary difference is that addresses are configured by the network operator
rather than hashed from the MAC address. This serves to eliminate the 10.x.x.x limitation on the
network range.
When operating under the Statically Provisioned scheme, the VMM device will use provisioned
DHCP-like information to establish an IP address for use in the wireless network.
This scheme does not require a DHCP server on the core network.
It should be noted that a DHCP server can still exist on the network to hand out addresses to
other nodes using the Network DHCP Scheme as long as the server's address range does not
conflict with addresses assigned to devices using the Statically Provisioned or User Supplied
Schemes.
The IP addresses and options used are configurable per-device using MeshManager. The
provisioned address may be freely used to communicate while associated or unassociated.
The operator must ensure that the provisioned addresses are routable and do not conflict with
any other addresses in use. The operator is free to provision any option ordinarily provisioned
by a DHCP server (subnet mask, DNS, etc.) through programming of the appropriate fields in
each device using MeshManager.
This scheme is ideal for a managed network of users who regularly need to communicate inside
and outside of network coverage or for a network lacking a DHCP server.
3.1.2.4 User Supplied Scheme
Operating under the User Supplied scheme, the VMM device is configured to use a fixed IP
address and subnet mask. The user is responsible for configuring options that would otherwise
be configured by a DHCP server.
It is also up to the user to ensure that the assigned address is routable on the core network (if
core network access is needed) and that it does not conflict with other addresses in use. This is
analogous to and carries the same caveats as plugging an Ethernet card into a LAN and
manually assigning an address to the card.
The user is free to communicate while associated or unassociated. This scheme is ideal for
small, unmanaged networks lacking a DHCP server.
12
MEA VMM User’s Guide
All of these schemes may be assigned per device, either by the user or by the network
manager. The network manager can also limit the user-selectable schemes or force a specific
scheme. Devices in each of these schemes can interoperate and communicate with each other,
so long as the assigned addresses do not conflict and are mutually routable.
3.1.2.5 Setting the User Supplied IP Address
In order to set the user-supplied IP address for the VMM, the User-Supplied radio button must
be selected. At that point, the user may enter an IP address, subnet mask consistent with the
existing network. The user should also enter the IP address of the default gateway and DNS
server, as well as enter the domain name.
Note that this configures the user-supplied address for the VMM device. To configure addresses
for ethernet clients, please refer to the description of the External Device Provisioning frame of
this web page in .
A similar screen will be displayed for the access account (the web page will indicate Normal
User Login). Normal users can change only those settings for which they have system
privileges.
When the desired configuration has been completed, click on the Apply button on the Device
Addressing panel on the Device Administration Configuration Page. You will be prompted to
verify that the changes to the configuration are correct before the changes are actually applied.
Figure 3-5. Configuration Change Dialog
When you click on the OK button, the configuration will be saved in Flash. The System
Settings Have Been Saved message on the System Update Save Completed page will then
confirm the changes have been saved.
13
MeshNetworks
Figure 3-6. System Update Save Completed Web Page
After the settings have been saved, click the Finished button. Your web browser should return
to the MEA Device Administration home page. A reboot of the device is not required for the
changes to take effect.
14
MEA VMM User’s Guide
3.1.3 Resetting the VMM
Although you should not have to reset the VMM device, the device can be commanded to reset
via the web pages. In order to reset the device, return to the MEA Device Administration home
page, and click on the Reset the Device link in the Device Management panel.
The web page displayed will allow you to reset the device.
Figure 3-7. Device Reset Prompt Web Page
Once you have commanded the device to reset, the following screen will be displayed. Your
browser will delay for a short time, then transition to the home page once more.
15
MeshNetworks
Figure 3-8. Device Reset in Progress Page
NOTE: After the completion of the reset, you may experience a significant delay when bringing
up another web page. Please be patient.
16
MEA VMM User’s Guide
3.1.4 Restoring Factory Settings User Supplied Mode Limitations
NOTE: In Release 3.0, there is a known issue that arises if the selected device addressing
mode is User-Supplied when the user restores the factory default settings for the
VMM. The following options are offered as a way to recover from this limitation.
3.1.4.1 VMM Reset-to-Default Recovery In User-Supplied Mode
The factory default settings for the User-Supplied parameters cannot be routed (i.e. 0.0.0.0).
When the non-routable values are applied, the network connection between the attached
ethernet devices and the core network becomes disabled.
There are three options available to recover from this situation and restore the connection to
the core network.
3.1.4.2 Reset the Device Addressing Mode Using DeviceManager
DeviceManager will be able to manage some but not all of the device parameters at this time.
The network operator may change the selected device addressing mode via DeviceManager to
either Remote-DHCP or Statically-Provisioned.
3.1.4.3 Reset the Device Addressing Mode via the Configuration Web Page
Because the factory default settings were restored, the VMM will offer one IP address via
DHCP. This address will be in the form 10.xx.yy.10, where xx and yy are based on the
transceiver MAC address as described in the VMM User’s Manual. The VMM will be accessible
via the 10.xx.yy.9 address, also described in the VMM User’s Manual. Once an ethernet device
has been attached to the VMM, the configuration web page may be accessed at the 10.xx.yy.9
address and the device addressing mode may be changed to either Remote-DHCP or
Statically-Provisioned.
Please be aware that the access password for the web page will have also been reset.
3.1.4.4 Reset the User-Supplied Parameters via the Configuration Web Page
If the allowed device addressing modes were restricted to User-Supplied, the user may still
connect to the VMM (as described above) and access the configuration web page. The User-
Supplied parameters may then be set to usable values.
17
MeshNetworks
3.1.5 Restoring Factory Settings – Normal Operations
When the Restore Factory Defaults function is selected from the VMM Device Administration
Home Page, the device will present the following web page.
Figure 3-9. Restore Factory Settings Web Page
The Restore Factory Defaults function allows the operator to return the device to factory
defaults. This change will include the web password for the administrator and access accounts.
This will also return the local IP addresses to the default MAC-derived values.
The confirmation window will be displayed. Click on the OK button to confirm the action.
18
MEA VMM User’s Guide
Figure 3-10. Confirm Changes Window for Restore Factory Settings
The Factory Settings Restored page will be displayed.
Figure 3-11. Factory Settings Restored Web Page
Click on the Finished button to complete the reset procedure.
19
MeshNetworks
3.1.6 Changing the Web Password
When the Change Admin Password function is selected from the VMM Device Administration
Home Page by the administrator, or the Change User Password function is selected, the device
will present the following web page:
Figure 3-12. Enter New Password Web Page
The operator is expected to enter a new password for the web account and click on the “submit”
button. Once the password entry is complete, the device will prompt the operator for
confirmation of the change.
20
MEA VMM User’s Guide
Figure 3-13. Confirm Changes Window for Enter New Password
When the operator confirms the change, the new password will be stored in flash, and the
device will present a status screen indicating that the change was successful.
Figure 3-14. Password Changed Confirmation Web Page
21
MeshNetworks
3.1.7 Upgrading the Device Firmware
The web interface for the device also provides the ability to upgrade the firmware on-site. To
use this feature, you must have an upgrade file from a released upgrade package.
When the Upgrade Device Firmware function is selected from the MEA Device Administration
Home Page, the device will present the following web page:
Figure 3-15. Update Device Firmware Web Page
This page allows entry of the name (and path) of the upgrade file. Once the correct filename has
been entered, the device will prompt for confirmation:
22
MEA VMM User’s Guide
Figure 3-16. Confirm Upload Window for Firmware Update
Once the filename has been confirmed, the web browser will transmit the file to the device, and
the device will present an upgrade progress screen. This page will indicate the current stage in
the upgrade process.
Figure 3-17. Firmware Upload Progress Web Page
Once the upgrade is completed, the device must be reset. The Finished button will transition the
web browser to the reset screen.
23
MeshNetworks
3.2 External Device Provisioning
Figure 3-18. External Device Provisioning Table
The External Device Provisioning table is used to configure addresses for the attached nodes
on the local ethernet segment. Up to three addresses are provisioned.
The Enable checkbox indicates this row contains a valid address. Any address can be
disabled by clearing the checkbox. The pull-down menu options indicate whether this address
will be offered via the local DHCP service (“Local-DHCP”) or not (“Statically-Provisioned”).
The Statically-Provisioned setting is used to support devices that do not use DHCP to acquire
an address.
The MAC address field is used for Local-DHCP addresses, so that the IP address can be
reserved for a specific device. The reserved checkbox must be marked for this kind of IP
address reservation. The Status field indicates whether the provisioned IP address was
detected (via a ping) when the web page was brought up.
24
MEA VMM User’s Guide
The IP addresses default to values based on the transceiver MAC address of the device. The
derivation is described below. By default, only the first IP address is enabled (for local-DHCP),
and no addresses are reserved for specific MAC addresses.
Please make sure to check the checkbox for the client IP addresses you have entered. Client
2 and Client 3 are not enabled by default. In this example, the EWR wired interface is assigned
the IP address 172.16.2.1. This address is hidden from the core network and the IAP will not
route for this address. The core network must use the 172.16.1.37 address to access the EWR
(which is the address obtained via MeshManager).
The EWR has two interfaces and must use two IP addresses. The wireless network must use
the IP address on the wireless interface because that is the address for which the IAP will
proxy and advertise. The same address will be accessed by the DeviceManager when using
MeshManager.
The wired interface address will be used by the EWR as the gateway address for the local
ethernet segment. The wired subnet mask is configurable so that the user may select a more
restrictive subnet on the local ethernet segment than what is normally provided to the wireless
subscribers.
The MAC-derived default values are a means to ensure that these devices are likely to work
out-of-the-box. The IP addresses are derived as follows:
Transceiver MAC address: 00:05:12:0A:XX:YY
Derived MAC addresses:
Local gateway: 10.xx.yy.9
Client1: 10.xx.yy.10
Client2: 10.xx.yy.11
Client3: 10.xx.yy.12
Where XX and YY are hex values (from the transceiver MAC address), and the lowercase xx
and yy are the same values in decimal. For example, an EWR with transceiver MAC address of
00:05:12:0A:80:20 would have a default local gateway address of 10.128.32.9.
The user is encouraged to change these addresses upon installation.
3.2.1 Connecting to the Ethernet Port
If only one device is to be connected to the VMM, you can connect directly to the device using
an Ethernet cable.
If you are going to connect more than one device to the VMM, you will need to connect a hub to
the VMM, and connect the other devices to the hub.
3.3 Infrastructure Requirements
When in infrastructure mode, the MEA Vehicle Mounted Modem requires appropriate software
revisions in all IAPs to support the additional addresses the VMM provides.
25
MeshNetworks
3.3.1 VMM MAC Addresses
This table has been included for recording the Ethernet MAC address and transceiver MAC
address for a set of EWR devices as a quick reference. These addresses will be required for
configuration and management of these devices.
VMM MAC Address
00-05-12-0A-xx-yy
VMM ETH MAC Address
00-05-12-30-xx-yy
26
MEA VMM User’s Guide
4 License and Warranty Information
4.1 Important Information
PLEASE READ CAREFULLY THE FOLLOWING BEFORE INSTALLING OR USING THIS HARDWARE,
CONSISTING OF A CD ROM AND PCMCIA CARD, AND THE SOFTWARE (COLLECTIVELY, THE “PRODUCT”).
IF YOU AGREE WITH ALL OF THE TERMS OF THIS LICENSE AGREEMENT & LIMITED WARRANTY, PROCEED
WITH THE INSTALLATION AND USE OF THE PRODUCT FOLLOWING THE ONSCREEN INSTRUCTIONS. IF
YOU DO NOT AGREE, DO NOT INSTALL OR USE THE PRODUCT. BY INSTALLING OR USING THE PRODUCT,
YOU ARE AGREEING TO BE BOUND BY ALL OF THE TERMS OF THIS LICENSE AGREEMENT & LIMITED
WARRANTY. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE AGREEMENT & LIMITED
WARRANTY, PROMPTLY RETURN THE UNUSED PRODUCT AND DOCUMENTATION TO THE SOURCE (AS
DEFINED BELOW) FOR A FULL REFUND OF THE PURCHASE PRICE.
License Agreement & Limited Warranty
LICENSE GRANT
MeshNetworks, Inc. ("MeshNetworks"), by and through its resellers and suppliers (collectively, the “Source”) hereby
licenses to the end-user (“You”) the software accompanying this Product ("Software"). You have right of possession
to the CD ROM on which the Software is recorded (in accordance with your arrangement with the Source), but
MeshNetworks retains title to the Software and related documentation. The license is non-exclusive, non-
transferable, non-sublicensable and confers a right to use only the machine-readable, object code form of the
Software for its normal and intended purpose by a single-user. You may make one backup copy of the Software in
machine-readable form, provided the backup copy is not installed or used on any electronic device. You must
reproduce on the backup copy the MeshNetworks’ copyright notice and any other proprietary legends that were on
the original copy of the Software.
RESTRICTIONS
You acknowledge that the Product contains copyrighted material, trade secrets and other proprietary material owned
by MeshNetworks, and that unauthorized use of such material may cause serious loss or damage to MeshNetworks.
You agree that You will not:
decompile, reverse engineer, disassemble, translate or reduce the Product to a human-perceivable form.
modify, adapt, pledge, lease, rent, share, lend, distribute, disclose or create derivative works based upon the
Product in whole or in part.
electronically transmit the Software from one computer to another or over a network.
transfer any of your rights in the Software, the backup copy of the Software, the media, the documentation,
or this License Agreement & Limited Warranty to another party.
use the Product for any unlawful or harmful purpose.
TERM, TERMINATION
This license is effective until terminated. You may terminate this license at any time by destroying the Software,
related documentation and all copies thereof. This license will terminate immediately without notice from
MeshNetworks if You fail to comply with any provision of this License Agreement & Limited Warranty. Upon
termination You must destroy the Software, related documentation and all copies thereof.
HARDWARE WARRANTY
MeshNetworks warrants to You that the hardware elements of the Product will be substantially free from material
defects in workmanship and materials, under normal use and service, for a period of one (1) year from the date of
acquisition from the Source.
Our sole obligation under this express warranty will be, at our option and expense, (1) to repair the defective
hardware element or, (2) deliver to You an equivalent hardware element to replace the defective item. Any hardware
element that is replaced will become our property. Replacement hardware elements may be new or reconditioned.
We warrant any replaced or repaired hardware elements for the greater of ninety (90) days from shipment, or the
remainder of the initial warranty period.
SOFTWARE WARRANTY
MeshNetworks warrants to You that the Software, except as noted below, will perform in substantial conformance to
its published program specifications, for a period of ninety (90) days from the date of acquisition from the Source. No
updates are provided under this warranty. Our sole obligation under this express warranty will be, at our option and
expense, to replace any defective software product, with software which substantially conforms to applicable
MeshNetworks’ published program specifications.
27
MeshNetworks
You assume responsibility for the selection of the appropriate applications program and associated reference
materials. MeshNetworks makes no warranty or representation that the Software will meet your requirements or work
in combination with any hardware or applications software products provided by third parties, that the operation of the
Software will be uninterrupted or error free, or that all defects in the Software will be corrected.
WARRANTY SERVICE
You must contact the Source of the Product within the applicable warranty period to obtain warranty service
authorization. Dated proof of purchase may be required. A Return Material Authorization (RMA) number will be
issued. This number must be marked on the outside of the package. The Product must be packaged appropriately
for safe shipment and sent prepaid. It is recommended that returned Products be insured or sent by a method that
provides for tracking of the package. Responsibility for loss or damage does not transfer to the intended recipient
until the returned item is received by such party. We will make commercially reasonable efforts to ship the repaired
or replaced item to You, at our expense, not later than ten (10) business days after receipt of the defective Product.
We will retain risk of loss or damage until the Product is delivered to You.
We will not be responsible for any software, firmware, information, or Memory data belonging to You contained in,
stored on, or integrated with any Products returned to the Source for repair, whether under warranty or not.
WARRANTIES EXCLUSIVE, WARRANTY DISCLAIMER
TO THE FULL EXTENT ALLOWED BY LAW, THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE
AND ARE IN LIEU OF ALL OTHER WARRANTIES, TERMS, OR CONDITIONS, EXPRESS OR IMPLIED, EITHER
IN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION,
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, SATISFACTORY QUALITY,
CORRESPONDENCE WITH DESCRIPTION, INFORMATIONAL CONTENT, ACCURACY, SYSTEM
INTEGRATION, NON-INFRINGEMENT AND QUIET ENJOYMENT, ALL OF WHICH ARE EXPRESSLY
DISCLAIMED. WE DO NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE PRODUCT WILL MEET
YOUR REQUIREMENTS, THAT THE PRODUCT WILL BE COMPATIBLE WITH ANY OTHER SOFTWARE,
HARDWARE OR OPERATING SYSTEM, THAT THE OPERATION OF THE PRODUCT WILL BE
UNINTERRUPTED OR ERROR-FREE. WE NEITHER ASSUME NOR AUTHORIZE ANY OTHER PERSON TO
ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE
OR USE OF THIS PRODUCT.
WE WILL NOT BE LIABLE UNDER THIS WARRANTY IF TESTING AND EXAMINATION DISCLOSE THAT THE
ALLEGED DEFECT OR MALFUNCTION IN THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY MISUSE,
NEGLECT, IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO OPEN, REPAIR OR
MODIFY THE PRODUCT, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE, OR BY
ACCIDENT, FIRE, LIGHTNING, OTHER HAZARDS.
LIMITATION OF LIABILITY
TO THE FULL EXTENT ALLOWED BY LAW, MESHNETWORKS EXCLUDES FOR ITSELF, ITS RESELLERS AND
SUPPLIERS AND THEIR RESPECTIVE DIRECTORS, OFFICERS, EMPLOYEES, OR AGENTS, ANY LIABILITY,
WHETHER BASED IN CONTRACT OR TORT (INCLUDING NEGLIGENCE), FOR INCIDENTAL,
CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE
OR PROFITS, LOSS OF BUSINESS, LOSS OF INFORMATION OR DATA, OR OTHER FINANCIAL LOSS ARISING
OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE, USE, PERFORMANCE,
FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF WE HAVE BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR OR REPLACEMENT. AT OUR OPTION THIS
DISCLAIMER OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN
WILL FAIL OF ITS ESSENTIAL PURPOSE.
Some jurisdictions do not allow the exclusion or limitation of implied warranties or the limitation of incidental or
consequential damages for certain products supplied to consumers, or the limitation of liability for death or personal
injury, so the above limitations and exclusions may be limited in their application to You. When the implied warranties
are not allowed to be excluded in their entirety, they will be limited to the duration of the applicable written warranty.
This warranty gives You specific legal rights which may vary depending on local law.
EXPORT COMPLIANCE
You agree and certify that the Product will be utilized only in the United States of America or in compliance with
22CFR125.4(b)(9).
GOVERNING LAW
This License Agreement & Limited Warranty will be governed by the laws of the state of Florida, U.S.A., and by the
laws of the United States, excluding their conflicts of laws principles. Both the Uniform Computer Information
Transactions Act and the United Nations Convention on Contracts for the International Sale of Goods are hereby
excluded in their entirety from application to this License Agreement & Limited Warranty.
28
MEA VMM User’s Guide
29
5 FCC Regulatory Information
5.1 FCC Information
This VMM is an experimental Unit. This device has not been authorized as required by the rules
of the FCC. This device is not, and may not be, offered for sale or lease, or sold or leased, until
authorization is obtained.

Navigation menu