PMP 450i and PTP 450i Configuration and User Guide: Release 14.0
PMP 450i and PTP 450i Configuration and User Guide: Release 14.0
PMP 450i and PTP 450i Configuration and User Guide: Release 14.0
1. On the radio GUI, navigate to
Configuration, Unit Settings and select
Set to Factory Defaults
OR
2. On the radio GUI, navigate to
Resetting to Factory Defaults (2
Configuration, Unit Settings and enable
options) and save option Set to Factory Defaults
Upon Default Plug Detection. When
the unit is powered on with a
default/override plug (see section
“Acquiring the Override Plug” in the
PMP 450i Configuration and User
Guide) the radio is returned to its
factory default settings.
In order to comply with these FCC requirements, Cambium supplies variants of the
PMP 450i for operation in the USA or Canada. These variants are only allowed to
operate with region codes that comply with FCC/IC rule.
The list of FCC and Canada approved antennas for operation with the
PMP 450i/PTP 450i is provided in Appendix B.
Contents
PMP 450i and PTP 450i module essential information...................................................... iii
Safety and regulatory information.......................................................................... v
Important safety information ........................................................................................ v
Important regulatory information ................................................................................ vi
Specific expertise and training for professional installers ......................................... vii
About This Configuration and User Guide ..............................................................xv
General information.......................................................................................................... xvi
Version information .................................................................................................... xvi
Contacting Cambium Networks ................................................................................. xvi
Problems and warranty .................................................................................................. xviii
Security advice .................................................................................................................. xx
Warnings, cautions and notes .......................................................................................... xxi
Chapter 1: Reference information ........................................................................ 1
Wireless specifications ........................................................................................................ 2
General wireless specifications ..................................................................................... 2
Compliance with safety standards ...................................................................................... 3
Electrical safety compliance.......................................................................................... 3
Electromagnetic compatibility (EMC) compliance ....................................................... 3
Human exposure to radio frequency energy ................................................................ 4
Compliance with radio regulations ..................................................................................... 7
Type approvals............................................................................................................... 7
DFS for 5 GHz Radios.................................................................................................... 8
FCC IDs and certification numbers ............................................................................. 10
Chapter 2: Configuration ................................................................................... 11
Preparing for configuration ............................................................................................... 12
Safety precautions during configuration .................................................................... 12
Task 1: Connecting to the unit .......................................................................................... 13
Configuring the management PC ................................................................................ 13
Connecting to the PC and powering up ...................................................................... 15
Logging into the web interface (AP or SM) ................................................................ 15
Task 2: Configuring IP and Ethernet interfaces ............................................................... 19
Configuring the AP IP interface .................................................................................. 19
NAT, DHCP Server, DHCP Client and DMZ in SM ..................................................... 22
Configuring the SM IP interface with NAT disabled .................................................. 26
Configuring the SM IP interface with NAT enabled ................................................... 29
NAT tab of the SM with NAT disabled ........................................................................ 30
NAT tab of the SM with NAT enabled......................................................................... 34
Reconnecting to the management PC ......................................................................... 40
VLAN Remarking and Priority bits configuration ........................................................ 41
VLAN tab of the AP ...................................................................................................... 43
List of Figures
Figure 1 AP DFS Status ............................................................................................................ 8
Figure 2 AP General Status page, GUEST user example....................................................... 16
Figure 3 SM General Status page, GUEST user example...................................................... 16
Figure 4 AP General Status page, ADMINISTRATOR user example ..................................... 17
Figure 5 SM General Status page, ADMINISTRATOR user example .................................... 18
Figure 6 NAT disabled implementation.................................................................................. 23
Figure 7 NAT with DHCP client and DHCP server implementation...................................... 23
Figure 8 NAT with DHCP client implementation ................................................................... 24
Figure 9 NAT with DHCP server implementation .................................................................. 24
Figure 10 NAT without DHCP implementation ...................................................................... 25
Figure 11 IP tab of the SM with NAT disabled ...................................................................... 26
Figure 12 IP tab of SM ............................................................................................................ 26
Figure 13 IP tab of SM with NAT enabled ............................................................................. 29
Figure 14 SM with NAT disabled ........................................................................................... 30
Figure 15 NAT tab of the SM with NAT enabled ................................................................... 34
Figure 16 VLAN tab of the AP ................................................................................................ 43
Figure 17 VLAN tab of the SM ............................................................................................... 46
Figure 18 VLAN Membership tab of the SM .......................................................................... 51
Figure 19 PPPoE tab of the SM .............................................................................................. 51
Figure 20 NAT Port Mapping tab of the SM .......................................................................... 55
Figure 21 General tab ............................................................................................................. 61
Figure 22 Unit Settings tab of the AP ................................................................................... 68
Figure 23 General tab of the SM ............................................................................................ 71
Figure 24 Unit Settings tab of the SM ................................................................................... 74
Figure 25 Time tab of the AP .................................................................................................. 76
Figure 26 AP / SM Add User tab of account page.................................................................. 81
Figure 27 Delete User tab of the AP / SM .............................................................................. 81
Figure 28 Change User Setting tab AP / SM.......................................................................... 82
Figure 29 AP Evaluation Configuration parameter of Security tab....................................... 82
Figure 30 RJ-11 pin out for the override plug ........................................................................ 83
Figure 31 Categorical protocol filtering................................................................................. 86
Figure 32 RF Telnet Access Restrictions (orange) and Flow through (green)...................... 90
Figure 33 RF Telnet Access Restriction (orange) and Potential Security Hole (green) ....... 90
Figure 34 Security tab of the AP ............................................................................................ 93
Figure 35 Protocol Filtering tab of the AP ............................................................................. 97
Figure 36 Port Configuration tab of the AP .......................................................................... 99
Figure 37 Security tab of the SM ........................................................................................ 100
Figure 38 Protocol Filtering tab of the SM .......................................................................... 106
Figure 39 Port Configuration tab of the SM ........................................................................ 108
Figure 40 Radio tab of the AP for 5 GHz .............................................................................. 109
PMP 450i and PTP 450i Configuration and User Guide List of Figures
Figure 41 Multicast VC statistics ......................................................................................... 117
Figure 42 Multicast scheduler statistics .............................................................................. 117
Figure 43 DiffServ tab on AP and SM .................................................................................. 120
Figure 44 Protocol filtering tab on AP and SM (Packet Filter Configuration section) ....... 122
Figure 45 Radio tab of the SM for 5 GHz ............................................................................. 123
Figure 46 Speedtest results example with 1 AP and 1 SM .................................................. 132
Figure 47 SNMP tab of the AP ............................................................................................ 135
Figure 48 SNMP tab of the SM ............................................................................................ 139
Figure 49 AP Syslog Configuration page ............................................................................. 145
Figure 50 SM Syslog Configuration page ............................................................................ 146
Figure 51 SM IP Configuration page.................................................................................... 148
Figure 52 AP Session Status page ........................................................................................ 150
Figure 53 AP Remote Subscribers page ............................................................................... 150
Figure 54 AP Session Status page ....................................................................................... 151
Figure 55 Exporting Session Status page of the AP ........................................................... 153
Figure 56 Uplink and downlink rate caps adjusted to apply aggregate cap ....................... 155
Figure 57 Uplink and downlink rate cap adjustment example ............................................ 155
Figure 58 Quality of Service (QoS) tab of the AP................................................................. 161
Figure 59 Diffserv tab of the AP ........................................................................................... 163
Figure 60 Quality of Service (QoS) tab of the SM................................................................ 165
Figure 61 DiffServ tab of the SM ......................................................................................... 168
Figure 62 Spectrum Analyzer tab of the AP/ SM ................................................................ 171
Figure 63 Remote Spectrum Analyzer tab of the AP .......................................................... 174
Figure 64 Configuration File upload and download page................................................... 183
Figure 65 Security tab of the AP .......................................................................................... 186
Figure 66 Security tab of the SM ......................................................................................... 191
Figure 67 SM Certificate Management ................................................................................ 198
Figure 68 User Authentication and Access Tracking tab of the AP .................................... 205
Figure 69 User Authentication and Access Tracking tab of the SM ................................... 207
Figure 70 RADIUS accounting messages configuration ..................................................... 211
Figure 71 Device re-authentication configuration ............................................................... 212
List of Tables
Table 1 PMP 450i wireless specifications ........................................................................ 2
Table 2 PMP 450i safety compliance specifications ........................................................ 3
Table 3 EMC emissions compliance ................................................................................. 3
Table 4 Minimum Safe Separation Distance .................................................................... 6
Table 5 Radio certifications .............................................................................................. 7
Table 6 OFDM DFS operation based on Country Code setting ....................................... 9
Table 7 US FCC IDs Numbers and Covered Configurations ......................................... 10
Table 8 IP interface attributes ......................................................................................... 21
Table 9 SM with NAT disabled - IP attributes ................................................................. 27
Table 10 SM with NAT enabled - IP attributes ............................................................... 29
Table 11 SM with NAT disabled - NAT attributes ........................................................... 31
Table 12 SM with NAT enabled - NAT attributes............................................................ 35
Table 13 SM DNS Options with NAT Enabled ................................................................ 40
Table 14 VLAN Remarking Example ............................................................................... 41
Table 15 AP VLAN tab attributes .................................................................................... 43
Table 16 Q-in-Q Ethernet frame ...................................................................................... 44
Table 17 SM VLAN attributes .......................................................................................... 47
Table 18 SM VLAN Membership attributes ................................................................... 51
Table 19 SM PPPoE attributes........................................................................................ 52
Table 20 SM NAT Port Mapping attributes ..................................................................... 55
Table 21 AP General tab attributes ................................................................................. 62
Table 22 AP Unit Settings attributes ............................................................................... 69
Table 23 SM General Configuration attributes ............................................................... 72
Table 24 SM Unit Settings attributes .............................................................................. 75
Table 25 AP Time attributes ............................................................................................ 77
Table 26 Ports filtered per protocol selection ................................................................. 87
Table 27 AP Security attributes ....................................................................................... 94
Table 28 AP Protocol Filtering attributes........................................................................ 98
Table 29 AP Port Configuration attributes ...................................................................... 99
Table 30 SM Security attributes ................................................................................... 101
Table 31 SM Protocol Filtering attributes..................................................................... 107
Table 32 SM Port Configuration attributes .................................................................. 108
Table 33 AP Radio attributes ......................................................................................... 110
Table 34 Example for mix of multicast and unicast traffic scenarios ........................... 116
Table 35 DiffServ attributes .......................................................................................... 120
Table 36 DiffServ SNMP objects ................................................................................... 121
Table 37 Packet Filter Configuration attributes (IPv6 only)......................................... 122
Table 38 SM Radio attributes ........................................................................................ 125
pmp-0957 (April 2015) xiii
List of Tables PMP 450i and PTP 450i Configuration and User
Guide
Table 39 PMP 450i Modulation levels ........................................................................... 130
Table 40 Co-channel Interference per (CCI) MCS, PMP/PTP 450i ............................... 130
Table 41 Adjacent Channel Interference (ACI) per MCS, PMP/PTP 450i .................... 131
Table 42 AP SNMP attributes ........................................................................................ 136
Table 43 SM SNMP attributes ....................................................................................... 141
Table 44 Syslog enhancements...................................................................................... 144
Table 45 AP Syslog Configuration attributes ................................................................ 145
Table 46 Syslog Configuration attributes...................................................................... 146
Table 47 SM IP Configuration attributes ...................................................................... 148
Table 48 Characteristics of traffic scheduling .............................................................. 158
Table 49 Recommended combined settings for typical operations .............................. 159
Table 50 Where feature values are obtained for a SM with authentication required . 160
Table 51 Where feature values are obtained for a SM with authentication disabled .. 160
Table 52 AP QoS attributes............................................................................................ 161
Table 53 AP Diffserv attributes ..................................................................................... 164
Table 54 SM Quality of Service attributes .................................................................... 165
Table 55 SM DiffServ attributes .................................................................................... 168
Table 56 Spectrum Analyzer attributes ........................................................................ 173
Table 57 Remote Spectrum Analyzer tab attributes ..................................................... 175
Table 58 Security tab attributes .................................................................................... 187
Table 59 SM Security tab attributes ............................................................................. 193
Table 60 RADIUS Vendor Specific Attributes (VSAs) ................................................... 201
Table 61 AP User Authentication and Access Tracking attributes ............................... 205
Table 62 SM User Authentication and Access Tracking attributes .............................. 207
Table 63 Device data accounting RADIUS attributes ................................................... 208
Table 64 Glossary ........................................................................................................... 213
Table 65 FCC and IC approved antennas list .............................................................. 227
PMP 450i and PTP 450i Configuration and User General information
General information
Version information
The following shows the issue status of this document from its first release:
Address:
Cambium Networks
3800 Golf Road, Suite 360
Rolling Meadows, IL 60008
Problems and warranty
Reporting problems
If any problems are encountered when installing or operating this equipment,
follow this procedure to investigate and report:
1 Search this document and the software release notes of supported releases.
2 Visit the support website. http://www.cambiumnetworks.com/support
3 Ask for assistance from the Cambium product supplier.
4 Gather information from affected units such as:
Security advice
Cambium Networks systems and equipment provide security parameters that
can be configured by the operator based on their particular operating
environment. Cambium recommends setting and using these parameters
following industry recognized security practices. Security aspects to be
considered are protecting the confidentiality, integrity, availability of
information and assets. Assets include the ability to communicate, information
about the nature of the communications and information about the parties
involved.
In certain instances Cambium makes specific recommendations regarding
security practices, however the implementation of these recommendations and
final responsibility for the security of the system lies with the operator of the
system.
Warnings, cautions and notes PMP 450i and PTP 450i Configuration and User
Guide
Chapter 1: Reference information
This chapter contains reference information and regulatory notices that apply to the PMP 450i
Series products.
The following topics are described in this chapter:
Wireless specifications
This section contains specifications of the PMP 450i wireless interface. These specifications
include RF bands, channel bandwidth, spectrum settings, maximum power and link loss.
General wireless specifications
The wireless specifications that apply to all PMP 450i variants are lusted in Table 1.
Table 1 PMP 450i wireless specifications
Item Specification
Range 5 GHz 25 mi / 40 km
Electrical safety compliance
The PMP 450i hardware has been tested for compliance to the electrical safety specifications
listed in Table 2.
Table 2 PMP 450i safety compliance specifications
Region Specification
USA UL 60950
Electromagnetic compatibility (EMC) compliance
The EMC specification type approvals that have been granted for PMP 450i are listed in Table 3.
Table 3 EMC emissions compliance
• ANSI IEEE C95.1-1991, IEEE Standard for Safety Levels with Respect to Human
Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz.
• Council recommendation of 12 July 1999 on the limitation of exposure of the general
public to electromagnetic fields (0 Hz to 300 GHz) (1999/519/EC) and respective
national regulations.
• Directive 2004/40/EC of the European Parliament and of the Council of 29 April 2004
on the minimum health and safety requirements regarding the exposure of workers to
the risks arising from physical agents (electromagnetic fields) (18th individual
Directive within the meaning of Article 16(1) of Directive 89/391/EEC).
• US FCC limits for the general population. See the FCC web site at http://www.fcc.gov,
and the policies, guidelines, and requirements in Part 1 of Title 47 of the Code of
Federal Regulations
• Health Canada limits for the general population. See the Health Canada web site at
http://www.hc-sc.gc.ca/ewh-semt/pubs/radiation/99ehd-dhm237/limits-limites_e.html
and Safety Code 6.
• EN 50383:2002 Basic standard for the calculation and measurement of electromagnetic
field strength and SAR related to human exposure from radio base stations and fixed
terminal stations for wireless telecommunication systems (110 MHz -
40 GHz).
• BS EN 50385:2002 Product standard to demonstrate the compliances of radio base
stations and fixed terminal stations for wireless telecommunication systems with the
basic restrictions or the reference levels related to human exposure to radio frequency
electromagnetic fields (110 MHz – 40 GHz) – general public.
• ICNIRP (International Commission on Non-Ionizing Radiation Protection) guidelines for
the general public. See the ICNIRP web site at http://www.icnirp.de/ and Guidelines for
Limiting Exposure to Time-Varying Electric, Magnetic, and Electromagnetic Fields.
Power density exposure limit
Install the radios for the PMP 450i family of PMP wireless solutions so as to provide and
maintain the minimum separation distances from all persons.
The applicable power density exposure limit from the standards (see Human exposure to
radio frequency energy on page 4) is:
• 10 W/m2 for RF energy in the 5.8-GHz frequency bands.
S power density in W/m2
P maximum average transmit power
capability of the radio, in W
G Total Tx antenna gain as a factor,
converted from dB
d distance from point source, in m
Rearranging terms to solve for distance yields:
P.G
d=
4π .S
Calculated distances and power compliance margins
Calculated minimum separation distances, recommended distances and resulting margins
for each frequency band and antenna combination is shown in Table 4. These are
conservative distances that include compliance margins. At these and greater separation
distances, the power density from the RF field is below generally accepted limits for the
general population.
PMP 450i equipment adheres to all applicable EIRP limits for transmit power when
operating in MIMO mode. Separation distances and compliance margins include
compensation for both transmitters.
Explanation of terms used in Table 4:
P burst – maximum average transmit power during transmit burst (Watt)
P – maximum average transmit power of the radio (Watt)
G – total transmit gain as a factor, converted from dB
S – power density (Watt/m2)
d – minimum safe separation distance from point source (meters)
Type approvals
This system has achieved Type Approval in various countries around the world. This means that
the system has been tested against various local technical regulations and found to comply. The
frequency bands in which the system operates may be ‘unlicensed’ and, in these bands, the
system can be used provided it does not cause interference. The system is not guaranteed
protection against interference from other products and installations.
The radio specification type approvals that have been granted for PMP 450i are listed in Table 3.
Table 5 Radio certifications
FCC compliance testing
With GPS synchronization installed, the system has been tested for compliance to US (FCC)
specifications. It has been shown to comply with the limits for emitted spurious radiation for a
Class B digital device, pursuant to Part 15 of the FCC Rules in the USA. These limits have been
designed to provide reasonable protection against harmful interference. However the equipment
can radiate radio frequency energy and, if not installed and used in accordance with the
instructions, may cause harmful interference to other radio communications. There is no
guarantee that interference will not occur in a particular installation.
A Class B Digital Device is a device that is marketed for use in a residential environment,
notwithstanding use in commercial, business and industrial environments.
Background and Operation
The modules use region-specific DFS based on the Country Code selected on the module’s
Configuration, General page. By directing installers and technicians to set the Country Code
correctly, the operator gains confidence the module is operating according to national or regional
regulations without having to deal with the details for each region.
The details of DFS operation for each Country Code, including whether DFS is active on the AP,
SM, and which DFS regulations apply is shown in Table 6 on page 9.
An SM does not begin transmission until it detects a beacon from an AP. If APs are not
transmitting, SMs will be silent.
Europe applies the ETSI specification to both APs and SMs, while Brazil applies it only to APs. In
the ETSI case, when an SM is powered on, it scans to find a Canopy beacon from a AP. If an AP is
found, the SM performs a channel availability check on that frequency for 1 minute, monitoring
for the radar signature, without transmitting. A DFS decision is made based on the following:
• If no radar pulse is detected during this 1 minute, the SM proceeds through normal steps to
register to an AP.
• If the SM does detect radar, it locks out that frequency for 30 minutes and continues
scanning other frequencies in its scan list.
After an SM with DFS has seen a radar signature on a frequency and locked out that frequency, it
may connect to a different AP if color codes, AP transmitting frequencies, and SM scanned
frequencies support that connection.
To simplify operation and ensure compliance, an SM takes on the DFS type of the AP to which it
registers. For example, when an SM in Europe registers to an AP with the Country Code set to
“United Kingdom”, that SM will use ETSI DFS, no matter what its Country Code is set to, even if
its Country Code is set to “None”. Note, the operator should still configure the Country Code in
the SM correctly, as future releases may use the Country Code for additional region-specific
options.
For all modules running DFS, the module displays its DFS state on its Home => General Status
page as one of the following:
• Checking Channel Availability Remaining time n seconds, where n counts down from
60 to 1.
• Normal Transmit
Sector 24.75
5 MHz: 4942.5 to 4987.5
4.9 GHz
Flat plate
10 MHz: 4945 to 4985 24.75
Part 90Y directional
20 MHz: 4950 to 4980
4ft parabolic 23.75
Omni 24.5
Sector 20.75
5 MHz: 5730 to 5845
5.8 GHz
Chapter 2: Configuration
This chapter describes all configuration tasks that are performed when a PMP 450i link is
deployed.
Observe the precautions in Preparing for configuration on page 12.
PMP 450i and PTP 450i Configuration and User Preparing for configuration
3 Click on Properties.
5 Enter a subnet mask of 255.255.255.0.
2 Connect the PC Ethernet port to the LAN port of the power supply using a
standard (not crossed) Ethernet cable.
3 Apply power to the radio power supply. The green Power LED must illuminate
continuously.
Logging into the web interface (AP or SM)
To log into the AP or SM web interface as a system administrator, follow these
instructions:
Procedure 3 Logging into the web interface (AP or SM)
1 Start the web browser from the management PC.
2 Type the IP address of the unit into the address bar and press ENTER (Default IP
address is 169.254.1.1).
The web interface General Status page is displayed:
The below General Status is displayed when "Site Information Viewable to
Guest Users" is "Enabled".
Figure 3 SM General Status page, GUEST user example
2 Update IP Address, Subnet Mask and Gateway IP Address to meet network
requirements (as specified by the network administrator).
5 Click Reboot.
Attribute Meaning
Alternate DNS If the Preferred DNS server cannot be reached, the Alternate
Server DNS Server is used.
Second SM 3 192.168.101.3
registered
• NAT with DHCP Client (DHCP selected as the Connection Type of the WAN interface)
and DHCP Server
• NAT with DHCP Client(DHCP selected as the Connection Type of the WAN interface)
NAT with DHCP Client and DHCP Server
The NAT with DHCP Client and DHCP server is illustrated in Figure 7.
Figure 7 NAT with DHCP client and DHCP server implementation
NAT with DHCP Server
Figure 9 NAT with DHCP server implementation
NAT and VPNs
VPN technology provides the benefits of a private network during communication
over a public network. One typical use of a VPN is to connect employees remotely
(who are at home or in a different city), with their corporate network through a
public Internet. Any of several VPN implementation schemes is possible. By design,
NAT translates or changes addresses, and thus interferes with a VPN that is not
specifically supported by a given NAT implementation.
With NAT enabled, SMs support L2TP over IPSec (Level 2 Tunneling Protocol over
IP Security) VPNs and PPTP (Point to Point Tunneling Protocol) VPNs. With NAT
disabled, SMs support all types of VPNs.
The IP tab of SM with NAT disabled is as shown in Figure 12. User may set the parameters
as explained in Table 9.
Figure 12 IP tab of SM
Attribute Meaning
Attribute Meaning
Preferred DNS Server The first DNS server used for DNS resolution.
Alternate DNS Server The second DNS server used for DNS resolution.
In the IP tab of SM with NAT enabled, you may set the following parameters.
Table 10 SM with NAT enabled - IP attributes
Attribute Meaning
Attribute Meaning
IP Address This field displays the IP address for the SM. DHCP
Server will not automatically assign this address when
NAT is disabled.
Subnet Mask This field displays the subnet mask for the SM. DHCP
Server will not automatically assign this address when
NAT is disabled.
Gateway IP Address This field displays the gateway IP address for the SM.
DHCP Server will not automatically assign this address
when NAT is disabled.
Attribute Meaning
Attribute Meaning
TCP Session Garbage Where a large network exists behind the SM, you can
Timeout set this parameter to lower than the default value of 120
minutes. This action makes additional resources
available for greater traffic than the default value
accommodates.
UDP Session Garbage You may adjust this parameter in the range of 1 to 1440
Timeout minutes, based on network performance. The default
value of this parameter is 4 minutes.
Translation Table Size Total number of minutes that have elapsed since the last
packet transfer between the connected device and the
SM.
WANInterface
Connection Type : I DHCP GJ
IP Address : o o.o ::=:::J
-Su-b-n-et-M-a-s-k-:---------------------------1·2!5=2!52!5. == ------------------------------------------
Gateway IP Address : [ij) ::=:::J
Reply to· Ping; on WAN Interface :
0
Enabled
@ Disabled
LAI'I Interface
IP Address : 1163.254.1.1
Subnet Mask : 255.255.255.
0Enabled
DMZ Enable :
@ Disabled
DMZ IP Address : 169.254.1.
LAI'I DHCP Server
@ Enabled
DHCP Server Enable/Disable :
0Disabled
DHCP Server Lease Timeout : Days (Range : 1 -30)
DHCP Start IP : 169.254.1. c=J
Number ofIP's to Lease :
0 Enabled
DNS Server Proxy :
@ Disabled
@ Obtain Automatically (From WAN DHCP or PPPoE)
DNS IP Address :
0 Set Manually
Preferred DNS IP Address : .0. 0.0 I
Aernate DNS IP Addr ess : [o o.o J
Remote Configurallon Interface
Remote ManagementInterface : I Er..abl:(Star.wlon<> Co fg) [;"]
0DHCP
Connection Type :
@ static iP
IPAddress : 115-3.254.1.2 I
Subnet Mask : 55.255.0.0
I
Gateway IP Address : 1163.254.0.0 I
@ Obtain Automatically
DHCP DNSIP Address :
Set Manually
Preferred DNS Server : .00.0 I
Aernate DNS Server : .0.0.0 I
Domain Name : le.com J
NAT ProtocolParameters
ARP Cache Timeout : M inutes (Range : 1 - 30)
TCP Session Garba ge Timeout : i utes (Range : 4 -1440)
Mn
UDP Session Garba ge Time out : f4 - t.1 inutes (Range : 1 -1440)
Attribute Meaning
WAN Interface The WAN interface is the RF-side address for transport
traffic.
Reply to Ping on By default, the radio interface does not respond to pings. If
WAN Interface you use a management system (such as WM) that will
occasionally ping the SM, set this parameter to Enabled.
LAN Interface The LAN interface is both the management access through
the Ethernet port and the Ethernet-side address for transport
traffic. When NAT is enabled, this interface is redundantly
shown as the NAT Network Interface Configuration on
the IP tab of the Configuration web page in the SM.
Attribute Meaning
DMZ IP Address If you enable DMZ in the parameter above, set the last byte
of the DMZ host IP address to use for this SM when DMZ is
enabled. Only one such address is allowed. The first three
bytes are identical to those of the NAT private IP address.
Ensure that the device that receives network traffic behind
this SM is assigned this address. The system provides a
warning if you enter an address within the range that DHCP
can assign.
DHCP Server This is the server (in the SM) that provides an IP address to
the device connected to the Ethernet port of the SM.
DHCP Server Lease Based on network performance, enter the number of days
Timeout between when the DHCP server assigns an IP address and
when that address expires. The range of values for this
parameter is 1 to 30 days. The default value is 30 days.
DHCP Start IP If you enable DHCP Server below, set the last byte of the
starting IP address that the DHCP server assigns. The first
three bytes are identical to those of the NAT private IP
address.
Number of IPs to Enter how many IP addresses the DHCP server is allowed to
Lease assign. The default value is 50 addresses.
Attribute Meaning
Preferred DNS IP Enter the preferred DNS IP address to use when the DNS IP
Address Address parameter is set to Set Manually.
Alternate DNS IP Enter the DNS IP address to use when the DNS IP Address
Address parameter is set to Set Manually and no response is
received from the preferred DNS IP address.
Attribute Meaning
Attribute Meaning
or
Preferred DNS Enter the preferred DNS IP address to use when the DNS IP
Server Address parameter is set to Set Manually.
Alternate DNS Enter the DNS IP address to use when the DNS IP Address
Server parameter is set to Set Manually and no response is
received from the preferred DNS IP address.
ARP Cache Timeout If a router upstream has an ARP cache of longer duration (as
some use 30 minutes), enter a value of longer duration than
the router ARP cache. The default value of this field is 20
(minutes).
TCP Session Where a large network exists behind the SM, you can set this
Garbage Timeout parameter to lower than the default value of 120 (minutes).
This action makes additional resources available for greater
traffic than the default value accommodates.
UDP Session You may adjust this parameter in the range of 1 to 1440
Garbage Timeout minutes, based on network performance. The default value of
this parameter is 4 (minutes).
purposes. The priority bits used in the Q-tag are configurable similar
In the VLAN tab of the AP, you may set the following parameters.
Table 15 AP VLAN tab attributes
Attribute Meaning
VLAN Specify whether VLAN functionality for the AP and all linked SMs
must (Enabled) or may not (Disabled) be allowed. The default value
is Disabled.
Always use Local Enable this option before you reboot this AP as a SM to use it to
VLAN Config perform spectrum analysis. Once the spectrum analysis completes,
disable this option before you reboot the module as an AP,
Allow Frame Select the type of arriving frames that the AP must tag, using the VID
Types that is stored in the Untagged Ingress VID parameter. The default
value is All Frames.
Dynamic Specify whether the AP must (Enabled) or not (Disabled) add the
Learning VLAN IDs (VIDs) of upstream frames to the VID table. (The AP passes
frames with VIDs that are stored in the table both upstream and
downstream.). The default value is Enabled.
Attribute Meaning
VLAN Aging Specify how long the AP must keep dynamically learned VIDs. The
Timeout range of values is 5 to 1440 (minutes). The default value is 25
(minutes).
VIDs that you enter for the Management VID and VLAN
Membership parameters do not time out.
Management Enter the VID that the operator wishes to use to communicate with
VID the module manager. The range of values is 1 to 4095. The default
value is 1.
QinQ EtherType Modules can be configured with 802.1ad Q-in-Q DVLAN (Double-
VLAN) tagging which is a way for an operator to put an 802.1Q VLAN
inside of an 802.1ad VLAN. A nested VLAN, which is the original
802.1Q tag and a new second 802.1ad tag, allows for bridging of
VLAN traffic across a network and segregates the broadcast domains
of 802.1Q VLANs. Q-in-Q can be used with PPPoE and/or NAT.
The 802.1ad standard defines the S-VLAN as the Service Provider
VLAN and the C-VLAN as the customer VLAN. The radio software
does 2 layer Q-in-Q whereby the C-VLAN is the 802.1Q tag and the S-
VLAN is the second layer Q tag as shown below:
Table 16 Q-in-Q Ethernet frame
S-VLAN C-VLAN
Ethernet Header EthType 0x88a8 EthType 0x8100
IP Data EthType 0x0800
The 802.1ad S-VLAN is the outer VLAN that is configurable on the
Configuration => VLAN web page of the AP. The Q-in-Q EtherType
parameter is configured with a default EtherType of 0x88a8 in
addition to four alternate EtherTypes that can be configured to aid in
interoperability with existing networks that use a different EtherType
than the default.
The C-VLAN is the inner VLAN tag, which is the same as 802.1Q. As a
top level concept, this operates on the outermost tag at any given
time, either “pushing” a tag on or “popping” a tag off. This means
packets will at most transition from an 802.1Q frame to an 801.ad
frame (with a tag “pushed” on) or an untagged 802.1 frame (with the
tag “popped” off. Similarly, for an 802.1ad frame, this can only
transition from an 802.1ad frame to an 802.1Q frame (with the tag
“popped” off) since the radio software only supports 2 levels of tags
Attribute Meaning
VLAN Not Active When VLAN is enabled in the AP, the Active Configuration block
provides the following details as read-only information in this tab. In
the Cambium fixed wireless broadband IP network, each device of
any type is automatically a permanent member of VID 1. This
facilitates deployment of devices that have VLAN enabled with those
that do not.
VLAN For each VLAN in which you want the AP to be a member, enter the
Membership VLAN ID and then click the Add Member button. Similarly, for any
Table VLAN in which you want the AP to no longer be a member, enter the
Configuration VLAN ID and then click the Remove Member button.
VLAN This field lists the VLANs that an AP is a member of. As the user adds
Membership a number between 1 and 4094, this number is populated here.
table
Enter the VID for which the operator wishes to remark the 802.1p
Source VLAN
priority for the downstream packets. The range of values is 1 to 4094.
(Range: 1-4094) The default value is 1.
Remark Priority This is the priority you can assign to the VLAN Tagged packet.
(Range 0-7) Priority of 0 is the highest.
As the user enters a VLAN and a Remarking priority, this information
VLAN
is added in this table.
Remarking table
Attribute Meaning
Accept QinQ This option is valid for the Q-in-Q port so that the user may
Frames force blocking of existing 802.1ad Q-in-Q frames. This way, only
untagged or single tagged packets will come in and out of the
Ethernet interface. If a Q-in-Q frame is about ingress or egress
the Ethernet interface and this is disabled, it is dropped and a
filter entry will show up on the VLAN Statistics page as DVLAN
Egress or DVLAN Ingress.
Allow Frame Select the type of arriving frames that the SM must tag, using
Types the VID that is stored in the Untagged Ingress VID parameter.
The default value is All Frames.
Tagged Frames Only: The SM only tags incoming VLAN-
tagged frames
Untagged Frames Only: The SM will only tag incoming
untagged frames
Dynamic Specify whether the SM must (Enable) or not (Disable) add the
Learning VIDs of upstream frames (that enter the SM through the wired
Ethernet interface) to the VID table. The default value is
Enable.
VLAN Aging Specify how long the SM must keep dynamically learned VIDs.
Timeout The range of values is 5 to 1440 (minutes). The default value is
25 (minutes).
VIDs that you enter for the Untagged Ingress VID and
Management VID parameters do not time out.
Management Enter the VID that the SM must share with the AP. The range of
VID values is 1 to 4095. The default value is 1.
Attribute Meaning
Default Port VID This is the VID that is used for untagged frames and will
correspond to the Q-Tag for 802.1Q frames (if VLAN Port Type is
Q), or the C-Tag for 802.1ad frames (if the VLAN Port Type is Q-
in- Q).
Port VID MAC These parameters allow operators to place specific devices
Address onto different VLANs (802.1Q tag or 802.1ad C-tag) based on
Mapping the source MAC address of the packet. If the MAC address
entry is 00-00-00-00-00-00 then that entry is not used. If a
packet arrives at the SM that is sourced from a device whose
MAC address is in the table, then the corresponding VID is
used for that frame’s Q-tag (Q port) or C-tag (Q-in-Q port). If
there is no match, then the Default Port VID is used. This
table is also used in the downstream direction for removal of
the tag based on the destination MAC address so that an
untagged (for Q port) or Q-Tagged (for Q-in-Q port) frame is
delivered to the end device. You may use wildcards for the
non-OUI (Organizationally Unique Identifier) portion of the
MAC address, which is the last 3 bytes. MAC addresses contain
6 bytes, the first 3 of which are the OUI of the vendor that
manufactured the device and the last 3 are unique to that
vendor OUI. If you want to cover all devices from a known
vendor’s OUI, you have to specify 0xFF for the remaining 3
bytes. So, for example, if you wanted all devices from a specific
vendor with an OUI of 00-95-5b (which is a Netgear OUI) to be
on the same VID of 800, you have to specify an entry with MAC
address 00-95-5b-ff-ff-ff. Then, any device underneath of the
SM with MAC addresses starting with 00-95-5b is put on VLAN
800.
Attribute Meaning
Provider VID The provider VID is used for the S-tag. It is only used if the
Port Type is Q-in-Q and will always be used for the S-tag. If
an existing 802.1Q frame arrives, the Provider VID is what is
used for adding and removing of the outer S-tag. If an
untagged frame arrives to a Q-in-Q port, then the Provider
VID is the S-tag and the Default Port VID (or Port VID MAC
Address Mapping, if valid) is used for the C-tag.
Active This is the value of the parameter of the same name, configured
Configuration, above.
Default Port VID
Active This is the listing of the MAC address VIDs configured in Port
Configuration, VID MAC Address Mapping.
MAC Address
VID Map
Active This is the value of the parameter of the same name, configured
Configuration, above.
Management
VID
Active This is the value of the parameter of the same name, configured
Configuration, above.
SM Management
VID Pass-
Through
Active This displays the selection that was made from the drop-down
Configuration, list at the Allow Frame Types parameter above.
Allow Frame
Type
Active This is set to Enabled if VLAN Port Type is set to QinQ, and
Configuration, is set to Disabled if VLAN Port Type is set to Q.
QinQ
Active This is the value of the QinQ EtherType configured in the AP.
Configuration,
QinQ EthType
Attribute Meaning
Active This column lists the ID numbers of the VLANs in which this
Configuration, module is a member, whether through assignment or through
Current VID dynamic learning.
Member Set,
VID Number
Active For each VID number in the first column, the entry in this
Configuration, column correlates the way in which the module became and
Current VID continues to be a member:
Member Set, Permanent—This indicates that the module was assigned the
Type VID number through direct configuration by the operator.
Dynamic—This indicates that the module adopted the VID
number through enabled dynamic learning, when a tagged
packet from a SM behind it in the network or from a customer
equipment that is behind the SM in this case, was read.
Active For each VID number in the first column of the table, the entry
Configuration, in this column reflects whether or when the VID number will
Current VID time out:
Member Set, Permanent type - Number never times out and this is
Age indicated by the digit 0.
Dynamic type - Age reflects what is configured in the VLAN
Aging Timeout parameter in the Configuration => VLAN tab
of the AP or reflects a fewer number of minutes that represents
the difference between what was configured and what has
elapsed since the VID was learned. Each minute, the Age
decreases by one until, at zero, the AP deletes the learned VID,
but can it again from packets sent by elements that are beneath
it in the network.
Values in this Active Configuration block can differ from
attempted values in configurations:
The AP can override the value that the SM has configured
for SM Management VID Pass-Through.
In the VLAN Membership tab, you may set the following parameter.
Table 18 SM VLAN Membership attributes
Attribute Meaning
VLAN Membership For each VLAN in which you want the AP to be a member, enter
Table Configuration the VLAN ID and then click the Add Member button. Similarly,
for any VLAN in which you want the AP to no longer be a
member, enter the VLAN ID and then click the Remove
Member button.
PPPoE tab of the SM
Figure 19 PPPoE tab of the SM
• Service monitoring
• Generation of statistics about activities of the customer
• Re-use of infrastructure and operational practices by operators who already use PPP for
other networks
PPPoE options are configurable for the SM only, and the AP indicates whether or not
PPPoE is enabled for a specific subscriber.
When PPPoE is enabled, once the RF session comes up between the SM and the AP, the SM
will immediately attempt to connect to the PPPoE Server. You can monitor the status of this
by viewing the PPPoE Session Log in the Logs section (Administrator only). Every time the
RF session comes up, the SM will check the status of the link and if it is down, the SM will
attempt to redial the link if necessary depending on the Timer Type. Also, on the
Configuration page, the user may ‘Connect’ or ‘Disconnect’ the session manually. This can
be used to override the session to force a manual disconnect and/or reconnect if there is a
problem with the session.
In order to enable PPPoE, NAT MUST be enabled on the SM and Translation Bridging
MUST be disabled on the AP. These items is strictly enforced for you when you are trying
to enable PPPoE. A message will indicate any prerequisites not being met. Also, the NAT
Public IP DHCP client cannot be enabled, because the NAT Public IP is received through
the IPCP process of the PPPoE discovery stages.
The pre-requisites are:
Attribute Meaning
Attribute Meaning
User Name This is the CHAP/PAP user name that is used if CHAP/PAP
authentication is selected. If None is selected for
authentication then this field is unused. This is limited to 32
characters.
Attribute Meaning
Timer Type Keep Alive is the default timer type. This timer will enable a
keepalive that will check the status of the link periodically.
The user can set a keepalive period. If no data is seen from
the PPPoE server for that period, the link is taken down and a
reconnection attempt is started. For marginal links, the keep
alive timer can be useful so that the session will stay alive
over periodic dropouts. The keepalive timer must be set such
that the session can outlast any session drop. Some PPPoE
servers will have a session check timer of their own so that
the timeouts of the server and the SM are in sync, to ensure
one side does not drop the session prematurely.
Idle Timeout enables an idle timer that checks the usage of
the link from the customer side. If there is no data seen from
the customer for the idle timeout period, the PPPoE session is
dropped. Once data starts flowing from the customer again,
the session is started up again. This timer is useful for users
who may not be using the connection frequently. If the
session is idle for long periods of time, this timer will allow the
resources used by the session to be returned to the server.
Once the connection is used again by the customer, the link is
reestablished automatically.
TCP MSS If this is enabled, then the SM will alter TCP SYN and SYN-
Clamping ACK packets by changing the Maximum Segment Size to be
compatible with the current MTU of the PPPoE link. This way,
the user does not have to worry about MTU on the client side
for TCP packets. The MSS is set to the current MTU – 40 (20
bytes for IP headers and 20 bytes for TCP headers). This will
cause the application on the client side to not send any TCP
packets larger than the MTU. If the network is exhibiting
large packet loss, try enabling this option. This may not be an
option on the PPPoE server itself. The SM will NOT
reassemble IP fragments, so if the MTUs are incorrect on the
end stations, then MSS clamping will solve the problem for
TCP connections.
In the NAT Port Mapping tab of the SM, you may set the following parameters.
Table 20 SM NAT Port Mapping attributes
Attribute Meaning
Port Map 1 to Separate parameters allow you to distinguish NAT ports from each
10 other by assigning a unique combination of port number, protocol for
traffic through the port, and IP address for access to the port
Task 3: Upgrading the software version and using
CNUT
This task consists of the following procedures:
• Checking the installed software version on page 56
• Upgrading to a new software version on page 56
If the link is operational, ensure that the remote end of the link is upgraded first
using the wireless connection, and then the local end can be upgraded. Otherwise,
the remote end may not be accessible.
Always refer to the software release notes before upgrading system software. The
release notes are available at:
https://support.cambiumnetworks.com/files/PMP450i
Checking the installed software version
To check the installed software version, follow these instructions:
Procedure 5 Checking the installed software version
1 Click on General tab under Home menu.
2 Note the installed Software Version (under Device Information):
3 Go to the support website (see Contacting Cambium Networks on page xvi) and
find Point-to-Multipoint software updates. Check that the latest PMP 450i
software version is the same as the installed Software Version.
4 To upgrade software to the latest version, see Upgrading to a new software
version on page 56.
Upgrading to a new software version
PMP 450i modules are upgraded using the Canopy Network Updater Tool. The
Canopy Network Updater Tool (CNUT) manages and automates the software and
firmware upgrade process for a Canopy radio, CMMmicro, or CMM4 (but not its 14-
port switch) across the network. This eliminates the need for an administrator to
visit each radio in the network (or each AP while using the Autoupdate feature) to
upgrade the modules.
Please ensure that you have the most up-to-date version of CNUT by browsing to the
Customer Support Web Page located:
http://www.cambiumnetworks.com/support/management-tools/cnut
This section includes an example of updating a single unit before deployment.
System-wide upgrading procedures may be found in the CNUT Online Help manual,
which can be found on the Cambium support website (see Contacting Cambium
Networks on page xvi).
CNUT functions
The Canopy Network Updater tool has the following functions:
• Automatically discovers all network elements
• Executes a UDP command that initiates and terminates the Auto-update mode within
APs. This command is both secure and convenient:
o For security, the AP accepts this command from only the IP address
that you specify in the Configuration page of the AP.
o For convenience, Network Updater automatically sets this
Configuration parameter in the APs to the IP address of the
Network Updater server when the server performs any of the
update commands.
• The capability to launch a test of connectivity and operational status of the local HTTP,
HTTPS and TFTP file servers
• An interface that supports efficient specification of the proper IP address for the local
file server(s) where Network Updater resides on a multi-homed computer
The General tab of the AP’s Configuration section contains many of the
configurable parameters that define how the AP and the SMs in the sector operate.
Table 21 AP General tab attributes
Attribute Meaning
Device Setting Allows the Spectrum Analyzer to be run directly from AP now.
Link Speeds From the drop-down list of options, select the type of link
speed for the Ethernet connection. The default for this
parameter is that all speeds are selected: Auto
100F/100H/10F/10H. In this setting, the two ends of the link
automatically negotiate with each other whether the speed
that they will use is 10 Mbps or 100 Mbps and whether the
Ethernet traffic is full duplex or half duplex. However,137
Ethernet links work best when either:
• both ends are set to the same forced selection
Sync Input AutoSync: The AP automatically receives sync from one of the
following sources:
• GPS Sync over Timing Port (UGPS, co-located AP GPS sync
output, or “Remote AP” feed from a registered SM’s GPS
sync output)
• GPS Sync over Power Port (CMM)
• On-board GPS (internal GPS)
Upon AP power on, the AP does not transmit until a valid
synchronization pulse is received from one of the sources
above. When there are synchronization sources on both the
Attribute Meaning
timing port and the power port, the power port GPS source is
chosen first.
If there is a loss of GPS synchronization pulse, within two
seconds the AP automatically attempts to source GPS signaling
from another source. On-board GPS (internal GPS) is the last
source checked for GPS signaling if there is no receipt of
signaling from the timing port or from the power port (the on-
board GPS module must not be used as the primary timing
source). If no valid GPS signal is received, the AP ceases
transmission and SM registration is lost until a valid GPS
signal is received again on the AP.
AutoSync + Free Run: This mode operates similarly to mode
“AutoSync”, but if a previously received synchronization signal
is lost and no GPS signaling alternative is achieved (from the
timing port, power port, or on-board GPS), the AP
automatically changes to synchronization mode “Generate
Sync”. While SM registration ins maintained, in this mode
there is no synchronization of APs that can “hear” each other;
the AP will only generate a sync signal for the local AP and its
associated SMs. Once a valid GPS signal is obtained again, the
AP automatically switches to receiving synchronization via the
GPS source and SM registration is maintained.
In mode AutoSync + Free Run, if a GPS signal is never
achieved initially, the system will not switch to “Free Run”
mode, and SMs will not register to the AP. A valid GPS
signal must be present initially for the AP to switch into
“Free Run” mode (and to begin self-generating a
synchronization pulse).
Also, When an AP is operating in “Free Run” mode, over a
short time it will no longer be synchronized with co-located
or nearby APs (within radio range). Due to this lack of
transmit and receive synchronization across APs or across
systems, performance while in “Free Run” mode may be
degraded until the APs operating in “Free Run” mode
regain a external GPS synchronization source. Careful
attention is required to ensure that all systems are
properly receiving an external GPS synchronization pulse,
and please consider “Free Run” mode as an emergency
option.
Generate Sync (factory default): This option may be used
when the AP is not receiving GPS synchronization pulses from
either a CMM or UGPS module, and there are no other APs
active within the link range. Using this option will not
Attribute Meaning
synchronize transmission of APs that can “hear” each other; it
will only generate a sync signal for the local AP and its
associated SMs.
Verify GPS This ensures that the messages coming from the GPS are valid
Message by parsing them with a MD4 checksum.
Checksum
Sync Output to RJ- This is used when the user wants to use the PMP450i AP to
11 Port provide Sync to another radio or device.
UGPS Port This allows the PMP450i AP to power up the UGPS via its Sync
port.
Region From the drop-down list, select the region in which the radio is
operating.
Country From the drop-down list, select the country in which the radio
is operating.
Unlike selections in other parameters, your Country selection
requires a Save Changes and a Reboot cycle before it will
force the context-sensitive GUI to display related options (for
example, Alternate Frequency Carrier 1 an d 2 in the
Configuration => Radio tab).
PMP 450i equipment shipped to the United States is locked to a
Region Code setting of “United States”. Units shipped to
regions other than the United States must be configured with
the corresponding Region Code to comply with local regulatory
requirements.
Country Code settings affect the radios in the following ways:
• Maximum transmit power limiting (based on radio
transmitter power plus configured antenna gain)
• DFS operation is enabled based on the configured region
code, if applicable
For more information on how transmit power limiting and DFS
is implemented for each country, see the PMP 450i Planning
Guide.
Webpage Auto Enter the frequency (in seconds) for the web browser to
Update automatically refresh the web-based interface. The default
Attribute Meaning
setting is 0. The 0 setting causes the web-based interface to
never be automatically refreshed.
Bridge Entry Specify the appropriate bridge timeout for correct network
Timeout operation with the existing network infrastructure. The Bridge
Entry Timeout must be a longer period than the ARP (Address
Resolution Protocol) cache timeout of the router that feeds the
network.
An inappropriately low Bridge Entry Timeout setting may
lead to temporary loss of communication with some end
users.
Attribute Meaning
ARP then the Send Untranslated ARP parameter can be:
Disabled - so that the AP will overwrite the MAC address in
Address Resolution Protocol (ARP) packets before forwarding
them.
Enabled - so that the AP will forward ARP packets regardless
of whether it has overwritten the MAC address.
If the Translation Bridging parameter is set to Disabled,
then the Send Untranslated ARP parameter has no effect.
Packet Flooding Enabled: All unknown Unicast packets (no entry in the AP’s
bridge table) received via the AP’s Ethernet LAN interface are
forwarded to registered SMs. If the target device is situated
beneath a particular SM, when the device responds the SM
and AP will learn and add the device to their bridge tables so
that subsequent packets to that device is bridged to the proper
SM.
Disabled: All unknown Unicast packets (no entry in the AP’s
bridge table) received via the AP’s Ethernet LAN interface are
discarded at the AP.
Update Enter the address of the server to access for software updates
Application on this AP and registered SMs.
Address
Attribute Meaning
Address wired on the Ethernet interface. Although some switches
(CMMmicro, for example) do not pass LLDP addresses upward
in the network, a radio can pass it as the value of the
Multicast Destination Address parameter value in the
connected device that has it populated.
DHCP Relay Agent The AP may act as a DHCP relay for SMs and CPEs underneath
it. The AP will make use of the DHCP Option 82 (DHCP Relay
Agent Information) from RFC 3046 when performing relay
functions. The AP offers two types of DHCP relay
functionality:
DHCP Server The DHCP relay server may be either a DNS name or a static IP
(Name or IP address in dotted decimal notation. Additionally the
Address) management DNS domain name may be toggled such that the
name of the DHCP relay server only needs to be specified and
the DNS domain name is automatically appended to that name.
The default DHCP relay server addresses is 255.255.255.255
with the appending of the DNS domain name disabled.
The Unit Settings tab of the AP contains following options:
• Default Plug
• Unit-Wide Changes
Attribute Meaning
Undo Unit-Wide When you click this button, any changes that you made in any
Saved Changes tab but did not commit by a reboot of the module are undone.
Set to Factory When you click this button, all configurable parameters on all
Defaults tabs are reset to the factory settings.
Configuration File This allows to download the configuration file of the radio.
This configuration file contains the complete configuration
including all the default values. The configuration file is
highlighted as downloadable link and the naming convention
is “<mac address of AP>.cfg”.
Attribute Meaning
C) Disabled
Frame Timing
@ Enable (If SM out of sync then do not propagate the
Frame Timing Pulse Gated : frame timing pulse)
0 Disable (Always propagate the frame timing pulse)
Multicast Destination Address :
@ LLDP Multicast
Coordinates
Latitude : j+o.oooooo IDecimal Degree
Longitude : § .oooooo IDecimal
Degree Height : IMeters
Attribute Meaning
Link Speeds From the drop-down list of options, select the type of link speed
for the Ethernet connection. The default for this parameter is
that all speeds are selected. The recommended setting is a single
speed selection for all APs and SMs in the operator network.
Region This parameter allows you to set the region in which the radio
will operate.
The SM radio automatically inherits the Region type of the
master. This behavior ignores the value of the Region parameter
in the SM, even when the value is None. Nevertheless, since
future system software releases may read the value in order to
configure some other region-sensitive feature(s), this parameter
must be always set to the value that corresponds to the local
region.
Country This parameter allows you to set the country in which the radio
will operate.
The SM radio automatically inherits the Country Code type of the
master. This behavior ignores the value of the Country
parameter in the SM, even when the value is None.
Nevertheless, since future system software releases may read the
value in order to configure some other region-sensitive
feature(s), this parameter must be always set to the value that
corresponds to the local region.
PMP 450i equipment shipped to the United States is locked to a
Region Code setting of “United States”. Units shipped to regions
other than the United States must be configured with the
corresponding Region Code to comply with local regulatory
requirements.
Attribute Meaning
Webpage Auto Enter the frequency (in seconds) for the web browser to
Update automatically refresh the web-based interface. The default
setting is 0. The 0 setting causes the web-based interface to
never be automatically refreshed.
Bridge Entry Specify the appropriate bridge timeout for correct network
Timeout operation with the existing network infrastructure. Timeout
occurs when the AP encounters no activity with the SM (whose
MAC address is the bridge entry) within the interval that this
parameter specifies. The Bridge Entry Timeout must be a longer
period than the ARP (Address Resolution Protocol) cache timeout
of the router that feeds the network.
This parameter governs the timeout interval, even if a router
in the system has a longer timeout interval. The default value
of this field is 25 (minutes).
An inappropriately low Bridge Entry Timeout setting may
lead to temporary loss of communication with some end
users.
Frame Timing If this SM extends the sync pulse to a BH master or an AP, select
Pulse Gated either
Enable—If this SM loses sync from the AP, then do not
propagate a sync pulse to the BH timing master or other AP. This
setting prevents interference in the event that the SM loses sync.
Disable—If this SM loses sync from the AP, then propagate the
sync pulse to the BH timing master or other AP.
Coordinates Physical radio location data may be configured via the Latitude,
Longitude and Height fields.
Attribute Meaning
LED Panel Mode Legacy Mode configures the radio to operate with standard LED
behavior (see section “SM Interfaces” in the PMP 450i Planning
Guide or in the PMP 450i Installation Guide)
Undo Unit-Wide When you click this button, any changes that you made in any tab but
Saved Changes did not commit by a reboot of the module are undone.
Set to Factory When you click this button, all configurable parameters on all tabs
Defaults are reset to the factory settings.
Configuration File This allows to download the configuration file of the radio. This
configuration file contains the complete configuration including all
the default values. The configuration file is highlighted as
downloadable link and the naming convention is “<mac address of
AP>.cfg”.
Attribute Meaning
NTP Server (Name or The management DNS domain name may be toggled such that
IP Address) the name of the NTP server only needs to be specified and the
DNS domain name is automatically appended to that name.
NTP Server 1 (Name To have each log in the AP correlated to a meaningful time and
or IP Address) date, either a reliable network element must pass time and date
NTP Server 2 (Name to the AP or you must set the time and date whenever a power
or IP Address) cycle of the AP has occurred. A network element passes time and
date in any of the following scenarios:
NTP Server 3 (Name
or IP Address) • A connected CMM2 or CMM4 passes time and date (GPS time
and date, if received).
• A connected CMMmicro passes the time and date (GPS time
and date, if received), but only if both the CMMmicro is
operating on CMMmicro Release 2.1 or later release. (These
releases include NTP server functionality.)
• A separate NTP server (including APs receiving NTP data) is
addressable from the AP.
If the AP needs to obtain time and date from a CMMmicro,
CMM4, or a separate NTP server, enter the IP address or DNS
name of the CMM or NTP server on this tab. To force the AP to
obtain time and date before the first (or next) 15-minute interval
query of the NTP server, click Get Time via NTP.
The polling of the NTP servers is done in a sequential fashion,
and the polling status of each server is displayed in the NTP
Update Log section of the Time Configuration page. An entry of
0.0.0.0 in any of the NTP Server fields indicates an unused server
configuration.
NTP Server(s) in Use Lists the IP addresses of servers used for NTP retrieval.
Time Zone The Time Zone option may be used to offset the received NTP
time to match the operator’s local time zone. When set on the AP,
the offset is set for the entire sector (SMs is notified of the
current Time Zone upon initial registration). If a Time Zone
change is applied, the SMs is notified of the change in a best
effort fashion, meaning some SMs may not pick up the change
until the next re-registration. Time Zone changes are noted in the
Event Log of the AP and SM.
Last NTP Time Update The last time that the system time was set via NTP.
Time This field may be used to manually set the system time of the
radio.
Attribute Meaning
Date This field may be used to manually set the system date of the
radio.
NTP Update Log This field shows NTP clock update log. It includes NTP clock
update Date and Time stamp along with server name.
• Managing module access by passwords on page 80: to set up the AP to require SMs to
authenticate via the AP, WM, or RADIUS server (see Task 15: Configuring a RADIUS
server on page 184)
• Filtering protocols and ports on page 85: to filter (block) specified protocols and ports
from leaving the system
• Requiring SM Authentication on page 84: to configure the network to only allow
registration to authenticated SMs
• Encrypting downlink broadcasts on page 87: to encrypt downlink broadcast
transmissions such as ARP and NetBIOS
• Isolating SMs on page 88: to prevent SMs in the same sector from directly
communicating with each other
• Filtering management through Ethernet on page 88: to prevent management access to
the SM via the radio’s Ethernet port
• Allowing management only from specified IP addresses on page 88: to only allow radio
management interface access from specified IP addresses
• Configuring management IP by DHCP on page 89: to allow the radio’s management IP
address to be assigned by a network DHCP server
• Restricting radio Telnet access over the RF interface on page 89: to restrict Telnet
access to the AP
Isolating APs from the internet
Ensure that the IP addresses of the APs in your network
• ADMINISTRATOR, who has full read and write permissions. This is the level of the
root and admin users, as well as any other administrator accounts that one of them
creates.
• INSTALLER, who has permissions identical to those of ADMINISTRATOR except
that the installer cannot add or delete users or change the password of any other
user.
• TECHNICIAN, who has permissions to modify basic radio parameters and view
informational web pages
• GUEST, who has no write permissions and only a limited view of General Status tab.
The ability to view information of General Status tab can be controlled by the "Site
Information Viewable to Guest Users" under the SNMP tab.
After a password has been set for any ADMINISTRATOR-level account, initial access
to the module GUI opens the view of GUEST level.
Deleting a User from Access to a Module
The Account => Delete User tab provides a drop down list of configured users
from which to select the user you want to delete.
Figure 27 Delete User tab of the AP / SM
The Account => Change User Setting tab allows to update password, mode
update and general status permission for a user.
Update Password
This tab provides a drop down list of configured users from which a user is selected
to change password.
Update Mode
This tab facilitates to convert a configured user to a Read-Only user.
General Status Permission
This tab enables and disables visibility of General Status Page for all Guest user.
To display of Radio data on SMs main Login page for Guest login, it can be enabled
or disabled in Security tab of Configuration page.
Figure 29 AP Evaluation Configuration parameter of Security tab
• You want local access to a module that has had the 802.3 link disabled in the
Configuration page.
You can configure the module such that, when it senses the override plug, it
responds by either
• resetting the LAN1 IP address to 169.254.1.1, allowing access through the default
configuration without changing the configuration, whereupon you is able to view and
reset any non-default values as you wish.
• resetting all configurable parameters to their factory default values.
Acquiring the Override Plug
You can either purchase or fabricate an override plug as follows. To purchase an
override plug for a nominal fee, order the plug at http://www.best-tronics.com. To
fabricate an override plug, perform the following steps.
Procedure 7 Constructing an override plug
1 Install an RJ-11 6-pin connector onto a 6-inch length of CAT 5 cable
2 Pin out all 6-pins.
3 Short (solder together) Pins 4 and 6 on the other end. Do not connect any other
wires to anything.
Figure 30 RJ-11 pin out for the override plug
Pin 1 → white / orange ← Pin 1
Pin 2 → white / green ← Pin 2
Pin 3 → white / blue ← Pin 3
Pin 4 → green ← Pin 6
Pin 5 → blue ← Pin 5
Pin 6 → orange ← Pin 4
Using the Override Plug
To regain access to the module, follow these instructions:
While the override plug is connected to a module, the module can neither register
nor allow registration of another module.
Procedure 8 Using the override plug
1 Insert the override plug into the RJ-11 GPS utility port of the module.
If "set to default upon Defalut plug insertion" is enabled, the radio will revert all of
it's settings back to factory defaults.
Requiring SM Authentication
Through the use of a shared AP key, or an external RADIUS (Remote Authentication
Dial In User Service) server, you can enhance network security by requiring SMs to
authenticate when they register.
For descriptions of each of the configurable security parameters on the AP, see
Security tab of the AP on page 93. For descriptions of each of the configurable
security parameters on the SM, see Security tab of the SM on page 100.
Operators may use the AP’s Authentication Mode field to select from among the
following authentication modes:
• Disabled—the AP requires no SMs to authenticate.
SNMP Multica
st
All
Other
IPv4
User
Defined SMB
Port 1
User User
Defined Defined
Port 2 Port 3
PPPoE ARP
All
Others
IPv4 Multicast Block IPv4 packet types except other filters defined.
IPv6 Multicast Block IPv6 packet types except other filters defined.
• ARP
• NetBIOS
• broadcast packets containing video data on UDP.
The encryption used is DES for a DES-configured module and AES for an AES-
configured module. Before the Encrypt Downlink Broadcast feature is enabled on
the AP, air link security must be enabled on the AP.
• IP Access Filtering Enabled, and specify at least one address in the Allowed
Source IP 1 t o 3 parameter, then management access is limited to the specified
address(s). If you intend to use Wireless Manager to manage the element, then you
must ensure that the IP address of the Wireless Manager server is listed here.
Configuring management IP by DHCP
The IP tab in the Configuration web page of every radio contains a LAN1 Network
Interface Configuration, DHCP State parameter that, if enabled, causes the IP
configuration (IP address, subnet mask, and gateway IP address) to be obtained
through DHCP instead of the values of those individual parameters. The setting of
this DHCP state parameter is also viewable, but is not settable, in the Network
Interface tab of the Home page.
In the SM, this parameter is settable
• in the NAT tab of the Configuration web page, but only if NAT is enabled.
• in the IP tab of the Configuration web page, but only if the Network Accessibility
parameter in the IP tab is set to Public.
Restricting radio Telnet access over the RF interface
RF Telnet Access restricts Telnet access to the AP from a device situated below a
network SM (downstream from the AP). This is a security enhancement to restrict
RF-interface sourced AP access specifically to the LAN1 IP address and LAN2 IP
address (Radio Private Address, typically 192.168.101.[LUID]). This restriction
disallows unauthorized users from running Telnet commands on the AP that can
change AP configuration or modifying network-critical components such as routing
and ARP tables.
The RF Telnet Access may be configured via the AP GUI or via SNMP commands,
and RF Telnet Access is set to “Enabled” by default. Once RF Telnet Access is set to
“Disabled”, if there is a Telnet session attempt to the AP originating from a device
situated below the SM (or any downstream device), the attempt is dropped. This
also includes Telnet session attempts originated from the SM’s management
interface (if a user has initiated a Telnet session to a SM and attempts to Telnet
from the SM to the AP). In addition, if there are any active Telnet connections to
the AP originating from a device situated below the SM (or any downstream device),
the connection is dropped. This behavior must be considered if system
administrators use Telnet downstream from an AP (from a registered SM) to modify
system parameters.
Setting RF Telnet Access to “Disabled” does not affect devices situated above the AP
from accessing the AP via Telnet, including servers running the CNUT (Canopy
Network Updater tool) application. Also, setting RF Telnet Access to “Disabled”
does not affect any Telnet access into upstream devices (situated above or adjacent
to the AP) through the AP (see Figure 32).
Key Security Considerations when using the RF Telnet Access
Feature
To ensure that the network is fully protected from unauthorized AP Telnet sessions,
the following topics must be considered:
Securing AP Clusters
When working with a cluster of AP units, to eliminate potential security holes
allowing Telnet access, ensure that the RF Telnet Access parameter is set to
“Disabled” for every AP in the cluster. In addition, since users situated below the
AP are able to pass Telnet sessions up through the SM and AP to the upstream
network (while AP RF Telnet Access is set to “Disabled”), ensure that all
CMM3/CMM4 or other networking equipment is secured with strong passwords.
Otherwise, users may Telnet to the CMM3/CMM4 or other networking equipment,
and subsequently access network APs (see Figure 33) via their Ethernet interfaces
(since RF Telnet Access only prevents Telnet sessions originating from the AP’s
wireless interface).
Figure 33 RF Telnet Access Restriction (orange) and Potential Security Hole
(green)
4 Click the Save Changes button
5 Go to Configuration => SNMP Page
6 Under GUI heading “SNMPv3 setting”, set Engine ID, SNMPv3 Security
Level, SNMPv3 Authentication Protocol, SNMPv3 Privacy Protocol,
SNMPv3 Read-Only User, SNMPv3 Read/Write User, SNMPv3 Trap
Configuration parameters:
Engine ID :
Each radio (AP or SM) has a distinct SNMP authoritative engine identified by a
unique Engine ID. While the Engine ID is configurable to the operator it is
expected that the operator follow the guidelines of the SNMPEngineID defined
in the SNMP-FRAMEWORK-MIB (RFC 3411). The default Engine ID is the MAC
address of the device.
SNMPv3 security level, Authentication and Privacy Protocol
The authentication allows authentication of SNMPv3 user and privacy allows for
encryption of SNMPv3 message. PMP 450i supports MD5 authentication and
CBC-DES privacy protocols.
4 Click the Save button
5 Once the Save button is clicked, all RF Telnet Access to the AP from devices
situated below the AP is blocked.
IP Access Filtern
i g
< • IP Access Filtering Enabled - Only allow access from IP
addresses specified below
IP Aooess Control :
•• IP Access Filtering Disabled - Allow aooess fro:m all IP
add'resses
Allowed Source IP 1 : 11
Network Mask (set to 32 to
disable) Allowed Soure IP 2 : 11
Network Mask (set to 32
to disable) Allowed Sourc-e IP 3 : 11
Network Mask (set to 32
to disable)
Sec urity Mode
WebAooess : IHTT P Only .,. I
SNMP : ISNMMcCnly .,. I
••• Enabled
< • Disabled
•• Enabled
FTP :
Disabled
••) Enabled
TFTP :
n Disabled
Attribute Meaning
Authentication Mode Operators may use this field to select from among the following
authentication modes:
Disabled—the AP requires no SMs to authenticate.
Authentication Server —the AP requires any SM that
attempts registration to be authenticated in Wireless Manager
before registration.
AP PreShared Key - The AP acts as the authentication server
to its SMs and will make use of a user-configurable pre-shared
authentication key. The operator enters this key on both the AP
and all SMs desired to register to that AP. There is also an
option of leaving the AP and SMs at their default setting of
using the “Default Key”. Due to the nature of the
authentication operation, if you want to set a specific
authentication key, then you MUST configure the key on all of
the SMs and reboot them BEFORE enabling the key and option
on the AP. Otherwise, if you configure the AP first, none of the
SMs is able to register.
RADIUS AAA - When RADIUS AAA is selected, up to 3
Authentication Server (RADIUS Server) IP addresses and
Shared Secrets can be configured. The IP address(s)
configured here must match the IP address(s) of the RADIUS
server(s). The shared secret(s) configured here must match the
shared secret(s) configured in the RADIUS server(s). Servers 2
and 3 are meant for backup and reliability, not for splitting the
database. If Server 1 doesn’t respond, Server 2 is tried, and
then server 3. If Server 1 rejects authentication, the SM is
denied entry to the network, and does not progress trying the
other servers.
Authentication Server The management DNS domain name may be toggled such that
DNS Usage the name of the authentication server only needs to be specified
and the DNS domain name is automatically appended to that
name.
Radius Port This field allows the operator to configure a custom port for
RADIUS server communication. The default value is 1812.
Attribute Meaning
Select Key This option allows operators to choose which authentication key
is used:
Use Key above means that the key specified in
Authentication Key is used for authentication
Use Default Key means that a default key (based off of the
SM’s MAC address) is used for authentication
Encryption Setting Specify the type of airlink security to apply to this AP. The
encryption setting must match the encryption setting of the
SMs.
None provides no encryption on the air link.
DES (Data Encryption Standard): An over-the-air link
encryption option that uses secret 56-bit keys and 8 parity bits.
DES performs a series of bit permutations, substitutions, and
recombination operations on blocks of data. DES encryption
does not affect the performance or throughput of the system.
AES (Advanced Encryption Standard): An over-the-air link
encryption option that uses the Rijndael algorithm and 128-bit
keys to establish a higher level of security than DES. AES
products are certified as compliant with the Federal
Information Processing Standards (FIPS 197) in the U.S.A.
SM Display of AP You can use this field to suppress the display of data about this
Evaluation Data AP on the AP Evaluation tab of the Tools page in all SMs that
register.
Web, Telnet, FTP Enter the expiry in seconds for remote management sessions
Session Timeout via HTTP, telnet, or ftp access to the AP.
IP Access Control You can permit access to the AP from any IP address (IP
Access Filtering Disabled) or limit it to access from only one,
two, or three IP addresses that you specify (IP Access
Filtering Enabled). If you select IP Access Filtering
Enabled, then you must populate at least one of the three
Allowed Source IP parameters or have no access permitted
from any IP address
Attribute Meaning
Allowed Source IP 1 If you selected IP Access Filtering Enabled for the IP Access
to 3 Control parameter, then you must populate at least one of the
three Allowed Source IP parameters or have no access
permitted to the AP from any IP address. You may populate as
many as all three.
If you selected IP Access Filtering Disabled for the IP
Access Control parameter, then no entries in this parameter
are read, and access from all IP addresses is permitted.
Web Access The Radio supports secured and non-secured web access
protocols. Select suitable web access from drop down list:
• HTTP Only – provides non-secured web access. The radio
to be accessed via http://<IP of Radio>.
• HTTPs Only – provides a secured web access. The radio to
be accessed via http://<IP of Radio>.
• HTTP and HTTPs – If enabled, the radio can be accessed
via both http and https.
Telnet This option allows to Enable and Disable Telnet access to the
Radio.
FTP This option allows to Enable and Disable FTP access to the
Radio.
TFTP This option allows to Enable and Disable TFTP access to the
Radio.
Attribute Meaning
Packet Filter Types For any box selected, the Protocol and Port Filtering feature
blocks the associated protocol type.
To filter packets in any of the user-defined ports, you must do
all of the following:
Check the box for User Defined Port n (See Below) in the
Packet Filter Types section of this tab.
In the User Defined Port Filtering Configuration section of
this tab:
• provide a port number at Port #n .
User Defined Port You can specify ports for which to block subscriber access,
Filtering Configuration regardless of whether NAT is enabled.
In the Port Configuration tab of the AP, you may set the following parameters.
Table 29 AP Port Configuration attributes
Attribute Meaning
FTP Port The listen port on the device used for FTP communication.
HTTP Port The listen port on the device used for HTTP communication.
HTTPs Port The listen port on the device used for HTTPS communication
Radius Port The destination port used by the device for RADIUS
communication.
Radius Accounting The destination port used by the device for RADIUS accounting
Port communication.
SNMP Port The listen port on the device used for SNMP communication.
SNMP Trap Port The destination port used by the device to which SNMP traps are
sent.
Syslog Server Port The destination port used by the device to which Syslog
messaging is sent.
In the Security tab of the SM, you may set the following parameters.
Table 30 SM Security attributes
Attribute Meaning
Select Key The Use Default Key selection specifies the predetermined key
for authentication in Wireless Manager
The Use Key above selection specifies the 32-digit hexadecimal
key that is permanently stored on both the SM and the WM
Attribute Meaning
Identity/Realm If Realms are being used, select Enable Realm and configure
an outer identity in the Identity field and a Realm in the
Realm field. These must match the Phase 1/Outer Identity and
Realm configured in the RADIUS server. The default Identity
is “anonymous”. The Identity can be up to 128 non-special (no
diacritical markings) alphanumeric characters. The default
Realm is “canopy.net”. The Realm can also be up to 128 non-
special alphanumeric characters.
Configure an outer Identity in the Username field. This must
match the Phase 1/Outer Identity username configured in the
RADIUS server. The default Phase 1/Outer Identity Username
is “anonymous”. The Username can be up to 128 non-special
(no diacritical markings) alphanumeric characters.
Username Enter a Username for the SM. This must match the username
configured for the SM on the RADIUS server. The default
Username is the SM’s MAC address. The Username can be
up to 128 non-special (no diacritical markings) alphanumeric
characters.
Password Enter the desired password for the SM in the Password and
Confirm Password fields.. The Password must match the
password configured for the SM on the RADIUS server. The
default Password is “password”. The Password can be up to
128 non-special (no diacritical markings) alphanumeric
characters
Attribute Meaning
Encryption Setting Specify the type of airlink security to apply to this SM. The
encryption setting must match the encryption setting of the AP.
None provides no encryption on the air link.
Web, Telnet, FTP Enter the expiry in seconds for remote management sessions via
Session Timeout HTTP, telnet, or FTP access to the SM.
Attribute Meaning
Ethernet Access If you want to prevent any device that is connected to the
Ethernet port of the SM from accessing the management
interface of the SM, select Ethernet Access Disabled. This
selection disables access through this port to via HTTP (the
GUI), SNMP, telnet, FTP, and TFTP. With this selection,
management access is available through only the RF interface
via either an IP address (if Network Accessibility is set to
Public on the SM) or the Session Status or Remote Subscribers
tab of the AP.
This setting does not prevent a device connected to the
Ethernet port from accessing the management interface of
other SMs in the network. To prevent this, use the IP
Access Filtering Enabled selection in the IP Access
Control parameter of the SMs in the network. See IP
Access Control below.
If you want to allow management access through the Ethernet
port, select Ethernet Access Enabled. This is the factory
default setting for this parameter.
IP Access Control You can permit access to the SM from any IP address (IP Access
Filtering Disabled) or limit it to access from only one, two, or
three IP addresses that you specify (IP Access Filtering
Enabled). If you select IP Access Filtering Enabled, then you
must populate at least one of the three Allowed Source IP
parameters or have no access permitted from any IP address
Allowed Source IP 1 If you selected IP Access Filtering Enabled for the IP Access
to 3 Control parameter, then you must populate at least one of the
three Allowed Source IP parameters or have no access
permitted to the SM from any IP address. You may populate as
many as all three.
If you selected IP Access Filtering Disabled for the IP Access
Control parameter, then no entries in this parameter are read,
and access from all IP addresses is permitted.
A subnet mask may be defined for each entry to allow for
filtering control based on a range of IP addresses.
Attribute Meaning
Web Access The Radio supports secured and non-secured web access
protocols. Select suitable web access from drop down list:
• HTTP Only – provides non-secured web access. The radio to
be accessed via http://<IP of Radio>.
• HTTPs Only – provides a secured web access. The radio to
be accessed via http://<IP of Radio>.
• HTTP and HTTPs – If enabled, the radio can be accessed
via both http and https.
Telnet This option allows to Enable and Disable Telnet access to the
Radio.
FTP This option allows to Enable and Disable FTP access to the
Radio.
TFTP This option allows to Enable and Disable TFTP access to the
Radio.
Attribute Meaning
Packet Filter Types For any box selected, the Protocol and Port Filtering feature
blocks the associated protocol type.
To filter packets in any of the user-defined ports, you must do all
of the following:
Check the box for User Defined Port n (See Below) in the
Packet Filter Types section of this tab.
In the User Defined Port Filtering Configuration section of
this tab:
• provide a port number at Port #n .
User Defined Port You can specify ports for which to block subscriber access,
Filtering regardless of whether NAT is enabled.
Configuration
In the Port Configuration tab of the SM, you may set the following parameters.
Table 32 SM Port Configuration attributes
Attribute Meaning
FTP Port The listen port on the device used for FTP communication.
HTTP Port The listen port on the device used for HTTP communication.
HTTPs Port The listen port on the device used for HTTPS communication
Radius Port This field allows the operator to configure a custom port for
RADIUS server communication. The default value is 1812.
Radius Accounting The destination port on the AAA server used for Radius accounting
Port communication.
SNMP Port The listen port on the device used for SNMP communication.
SNMP Trap Port The destination port used on the device to which SNMP traps are
sent.
Syslog Server Port The syslog server port (default 514) to which syslog messaging is
sent.
Only the frequencies available for your region and the selected Channel bandwidth
(5/10/20) are displayed.
The Radio tab of the AP contains some of the configurable parameters that define how an
AP operates.
Table 33 AP Radio attributes
Attribute Meaning
Frequency Specify the frequency for the module to transmit. The default for this
Carrier parameter is None. For a list of channels in the band, see the drop-
down list on the radio GUI.
Channel The channel size used by the radio for RF transmission. The setting
Bandwidth for the channel bandwidth must match between the AP and the SM.
The supported Channel Bandwidths are 5, 10 and 20 MHz.
Cyclic Prefix OFDM technology uses a cyclic prefix, where a portion of the end of a
symbol (slot) is repeated at the beginning of the symbol to allow
multi-pathing to settle before receiving the desired data. A 1/16
cyclic prefix means that for every 16 bits of throughput data
transmitted, an additional bit is used.
Frame Period Select the Frame Period in of the radio. The support Frame Periods
are :
• 2.5 ms
Color Code Specify a value from 0 to 254. For registration to occur, the color
code of the SM and the AP must match. Color code is not a security
feature. Instead, color code is a management feature, typically for
assigning each sector a different color code.
Color code allows you to force a SM to register to only a specific AP,
even where the SM can communicate with multiple APs. The default
setting for the color code value is 0. This value matches only the
color code of 0 (not all 255 color codes).
Attribute Meaning
Subscriber Color This timer may be utilized to initiate SM rescans in order to register
Code Rescan to an AP configured with the SM‘s primary color code.
(When not on a The time (in minutes) for a subscriber to rescan (if this AP is not
Primary Color configured with the SM‘s primary color code). This timer will only
Code) fire once – if the Subscriber Color Code Wait Period for Idle
timer is configured with a nonzero value and the Subscriber Color
Code Rescan expires, the Subscriber Color Code Wait Period for
Idle is started. If the Subscriber Color Code Wait Period for Idle
timer is configured with a zero value and the Subscriber Color
Code Rescan timer expires, the SM will immediately go into rescan
mode
Subscriber Color The time (in minutes) for a subscriber to rescan while idle (if this AP
Code Wait is not configured with the SM’s primary color code). This timer will
Period for Idle fire periodic events. The fired event determines if any RF unicast
traffic (either inbound or outbound) has occurred since the last
event. If the results of the event determine that no RF unicast traffic
has occurred (SM is idle), then the subscriber will rescan.
Installation With this feature enabled on the AP and SM, operators may install and
Color Code remotely configure SMs without having to configure matching color
codes between the modules. While the SM is accessible for
configuration from above the AP (for remote provisioning) and below
the SM (for local site provisioning), no user data is passed over the
radio link. When using the Installation Color Code feature, ensure
that the SM is configured with the factory default Color Code
configuration (Color Code 1 is “0”, Color Code 2-10 set to “0” and
“Disable”). The status of the Installation Color Code can be viewed on
the AP Eval web GUI page, and when the SM is registered using the
Installation Color Code the message “SM is registered via ICC –
Bridging Disabled!” is displayed in red on every SM GUI page. The
Installation Color Code parameter is configurable without a radio
reboot for both the AP and SM. If a SM is registered via Installation
Color Code and the feature is then disabled, operators will need to
reboot the SM or force it to reregister (i.e. using Rescan APs
functionality on the AP Eval page).
Attribute Meaning
Max Range Enter a number of miles (or kilometers divided by 1.61, then rounded
to an integer) for the furthest distance from which a SM is allowed to
register to this AP. Do not set the distance to any greater number of
miles. A greater distance
• does not increase the power of transmission from the AP.
• can reduce aggregate throughput.
Downlink Data Specify the percentage of the aggregate throughput for the downlink
(frames transmitted from the AP to the subscriber). For example, if
the aggregate (uplink and downlink total) throughput on the AP is 90
Mb, then 75% specified for this parameter allocates 67.5 Mb for the
downlink and 22.5 Mb for the uplink. The default for this parameter
is 75%. This parameter must be set in the range of 15% - 85%,
otherwise the invalid input will not be accepted and the previously-
entered valid setting is used.
In order to prevent self-interference, the frame configuration
needs to align. This includes Downlink Data, Max Range and
Contention slots.
Contention Slots This field indicates the number of (reserved) Contention slots
(f.k.a. Control configured by the operator. The SM uses reserved Contention slots
Slots) and unused data slots for bandwidth requests
Uplink Data Slots are used first for data. If they are not needed for
data in a given frame, the remaining data slots can be used by the
SMs for bandwidth requests. This allows SMs in sectors with a small
number of Contention slots configured to still successfully transmit
bandwidth requests using unused data slots.
A higher number of Contention slots give higher probability that a
SM’s bandwidth request is correctly received when the system is
heavily loaded, but with the tradeoff that sector capacity is reduced,
so there is less capacity to handle the request. The sector capacity
reduction is about 200 kbps for each Contention slot configured in a
20 MHz channel at QPSK MIMO-A modulation. The reduction in
sector capacity is proportionally higher at MIMO-B modulations (2
times at QPSK MIMO-B, 4 times at 16 QAM MIMO-B, 6 times at 64
QAM MIMO-B and 8 times at 256 QAM MIMO-B). If very few
reserved Contention slots are specified, then latency increases in
high traffic periods. If too many are specified, then the maximum
capacity is unnecessarily reduced.
The suggested Contention slot settings as a function of the number of
active VCs in the sector are shown in the table below.
Number of VCs Recommended Number of Contention slots
1 to 10 3
11 to 50 4
51 to 150 6
151 and above 8
Note that each SM uses one or two VCs. All SMs have a Low Priority
Channel that uses one VC; if the High Priority Channel is enabled for
the SM, then the SM uses a second VC. Therefore the number of
active VCs in a sector is greater than or equal to the number of SMs
registered to the AP in the sector. For example, a network including
20 SMs with High Priority Channel disabled and 20 SMs with High
Priority Channel enabled has 60 active VCs and may be configured
with 6 Contention slots.
In a typical cluster, each AP must be set to the same number of
Contention slots to assure proper timing in the send and receive
cycles. However, where high incidence of small packets exists, as in a
sector that serves several VoIP streams, additional Contention slots
may provide better results. For APs in a cluster of mismatched
Contention slots setting, or where PMP 450i is collocated with radios
using different technologies, like PMP 430 or FSK, in the same
frequency band, use the frame calculator. To download the PMP 450i
Contention Slots Paper, see
pmp-0957 (April 20 15h)ttp://www.cambiumnetworks.com/solution-papers/pmp-450- 113
contention-slots.
PMP 450i and PTP 450i Configuration and User Task 6: Configuring radio parameters
Attribute Meaning
Broadcast The default is 2 repeats (in addition to the original broadcast packet,
Repeat Count for a total of 3 packets sent for every one needed), and is settable to
1 or 0 repeats (2 or 1 packets for every broadcast).
Transmitter This value represents the combined power of the AP’s two
Output Power transmitters.
Nations and regions may regulate transmitter output power. For
example
• 5 GHz modules are available as connectorized radios, which
require the operator to adjust power to ensure regulatory
compliance.
The professional installer of the equipment has the responsibility to
External Gain This value needs to correspond to the published gain of the antenna
used to ensure the radio will meet regulatory requirements.
SM Receive Each SM’s Transmitter Output Power is automatically set by the AP.
Target Level The AP monitors the received power from each SM, and adjusts each
SM’s Transmitter Output Power so that the received power at the AP
from that SM is not greater what is set in this field. This value
represents the transmitted and received power (combined power)
perceived on the SM.
Task 6: Configuring radio parameters PMP 450i and PTP 450i Configuration and User
Guide
Attribute Meaning
Multicast VC This pull down menu of the Multicast Data Control screen helps in
Data Rate configuring multicast packets to be transmitted over a dedicated
channel at a configurable rate of 1X, 2X, 4X or 6X. The default value
is “Disable”. If set to the default value, all multicast packets are
transmitted over the Broadcast VC data path. This feature is
available only for the PMP 450i and is not backward compatible with
PMP 430 series of radios.
Multicast Repeat This value is the number of packets that are repeated for every
Count multicast VC packet received on the AP (located under Radio tab of
Configuration). Multicast (like Broadcast) packets go over a VC that
is shared by all SMs, so there is no guaranteed delivery. The repeat
count is an attempt to improve the odds of the packets getting over
the link. If the user has issues with packets getting dropped, they can
use this parameter to improve the performance at the cost of the
overall throughput possible on that channel. The default value is 0.
Multicast This value is the committed information rate for the multicast
Downlink CIR downlink VC (located under the Radio tab of Configuration). The
default value is 0 kbps. The range of this parameter is based on the
number of repeat counts. The higher the repeat count, the lower the
range for the multicast downlink CIR.
Receive Quality To aid in link performance monitoring, the AP and SM now report the
Debug number of fragments received per modulation (i.e. QPSK, 16-QAM,
64-QAM) and per channel (polarization).
Due to CPU load, this will slightly degrade packet per second
processing.
Dedicated Multicast Virtual Circuit (VC)
Previously, multicast packets were transmitted over the Broadcast VC. This channel ran on
the lowest modulation. By creating a new Multicast VC, we can now configure multicast
packets to be transmitted over a dedicated channel at a configurable rate of 1X, 2X, 4X or
6X. This feature is available only for the PMP 450i and is not backward compatible with
PMP 430 series of radios.
If the Multicast VC Data Rate is set to a modulation that the radio is not currently
capable of or operates in non-permitted channel conditions, multicast data is sent but not
received.
Ex: If Multicast VC Data Rate is set to 6x and the channel conditions only permit 4x mode
of operation, then multicast data is sent at 6x modulation but the SM will not receive the
data.
Table 35 DiffServ attributes
Attribute Meaning
PPPoE Operators may configure the AP to utilize the high priority channel for
Control PPPoE control messages. Configuring the AP in this fashion can
Message benefit the continuity of PPPoE connections when there are issues
Priority with PPPoE sessions being dropped in the network. This prioritization
may be configured in the DiffServ tab in the Configuration menu of the
AP.
Table 36 DiffServ SNMP objects
Table 37 Packet Filter Configuration attributes (IPv6 only)
Attribute Meaning
Packet Filter Types For any box selected, the Protocol Filtering feature blocks the
a ssociated protocol type. Port filtering on User Defined Ports is
not available for IPv6 at this time.
5 MHI
7 MHZ
Chatu'lel 3anCh'liCIUl Sean:
10 MHz
v 20 MHZ
CYtk Prell< Scon : One Skleeolh
Power Level
P.P Set.tion Method :
0 Optinb:e for Throus;!lpu1
Cc<o< Code 1: <0-2541/Prio<ityl.......,. • I
lnstdation Color Code : "EMbled
O Oisabled
------------------------C>EMbled
Urge VC ¢0UI 0: •Disabled
-f..ll. ;g.
Re<eNe Oually Oell<lg : O EMbled
•Disabled
Attribute Meaning
Custom Radio Check any frequency that you want the SM to scan for AP
Frequency Scan transmissions.
Selection List Prior to System Release 12.0.3, the PMP 450i SM boot sequence
included loading the current channel bandwidth (10 MHz or 20
MHz, but not both) and frequency band and scanning selected
frequencies in the respective frequency band. After a scan of all
the selected frequencies, the SM can attempt to register to the
best AP based on the SM’s current configuration.
With the introduction of the Full Spectrum Band Scan feature in
12.0.3, SMs first boot into the smallest selected channel
bandwidth (10 MHz, if selected) and scan all selected frequencies
across the 5.7 GHz frequency bands.
After this scan, if a wider channel bandwidth is selected (20 MHz),
the SM automatically changes to 20 MHz channel bandwidth and
then scans for APs. After the SM finishes this final scan it will
evaluate the best AP with which to register. If required for
registration, the SM changes its channel bandwidth back to 10
MHz to match the best AP.
The SM will attempt to connect to an AP based on power level
(which affects the modulation state), channel bandwidth (which
affects throughput) and number of SM registrations to the AP
(which affects system contention performance).
If it is desired to prioritize a certain AP over other available APs,
operators may use the Color Code Priority feature on the SM.
Utilization of the Color Code feature on the AP is recommended to
further constrain the SM’s AP selection.
If the SM does not find any suitable APs for registration after
scanning all channel bandwidths, the SM restarts the scanning
process beginning with the smallest configured channel
bandwidth.
By default, System Release 12.0.3 SMs are configured to scan all
available frequencies and all available channel bandwidths. This
allows operators to install SMs and allow them to register with no
pre-configuration or staging required. SMs upgraded from a
previous release to 12.0.3 retain frequency and channel
bandwidth configuration.
Selecting multiple frequencies and multiple channel bandwidths
impacts the SM scanning time. The biggest consumption of time is
in the changing of the SM channel bandwidth setting.
Attribute Meaning
Continue... The worst case scanning time is approximately two minutes after
boot up (SM with all frequencies and channel bandwidths selected
and registering to an AP at 10 MHz). If only one channel
bandwidth is selected the time to scan all the available
frequencies and register to an AP is approximately one minute
after boot up.
Other scanning features such as Color Code, Installation Color
Code, and RADIUS authentication are unaffected by the Full Band
Scan feature.
Channel Bandwidth The channel size used by the radio for RF transmission.
Scan
Selecting multiple channel bandwidths will increase
registration and re-registration times.
Cyclic Prefix Scan The cyclic prefix for which AP scanning is executed.
Attribute Meaning
Color Code 1 to 20 Color code allows you to force the SM to register to only a specific
AP, even where the SM can communicate with multiple APs. For
registration to occur, the color code of the SM and the AP must
match. Specify a value from 0 to 254.
Color code is not a security feature. Instead, color code is a
management feature, typically for assigning each sector a
different color code. The default setting for the color code value is
0. This value matches only the color code of 0 (not all 255 color
codes).
SMs may be configured with up to 20 color codes. These color
codes can be tagged as Primary, Secondary, or Tertiary, or
Disable. When the SM is scanning for APs, it will first attempt to
register to an AP that matches one of the SM’s primary color
codes. Failing that, the SM will continue scanning and attempt to
register to an AP that matches one of the SM’s secondary color
codes. Failing that, the SM will continue scanning and attempt to
register to an AP that matches one of the SM’s tertiary color
codes. This is all done in the scanning mode of the SM and will
repeat until a registration has occurred.
Color codes in the same priority group are treated equally. For
example, all APs matching one of the SM’s primary color codes
are analyzed equally. Likewise, this evaluation is done for the
secondary and tertiary groups in order. The analysis for selecting
an AP within a priority group is based on various inputs, including
signal strength and number of SMs already registered to each AP.
The first color code in the configuration is the pre-Release 9.5
color code. Thus, it is always a primary color code for legacy
reasons.
The color codes can be disabled, with the exception of the first
color code.
Installation Color With this feature enabled on the AP and SM, operators may install
Code and remotely configure SMs without having to configure matching
color codes between the modules. When using the Installation
Color Code feature, ensure that the SM is configured with the
factory default Color Code configuration (Color Code 1 is “0”,
Color Code 2-10 set to “0” and “Disable”). The status of the
Installation Color Code can be viewed on the AP Eval web GUI
page, and when the SM is registered using the Installation Color
Code the message “SM is registered via ICC – Bridging Disabled!”
is displayed in red on every SM GUI page. The Installation Color
Code parameter is configurable without a radio reboot for both
the AP and SM.
Attribute Meaning
External Gain This value represents the amount of gain added externally to the
radio in the form of a LENS or Dish. With a CSM, this value
represents the gain of the external antenna that the radio is being
connected to since there is no internal gain for that radio type.
Recommended
Module Type
Setting
Large VC data AP and BH have a configurable option used to prevent packet loss
Queue in the uplink due to bursting IP traffic. This is designed for IP
burst traffic particular to video surveillance applications.
Receive Quality To aid in link performance monitoring, the AP and SM now report
Debug the number of fragments received per modulation (i.e. QPSK, 16-
QAM, 64-QAM) and per channel (polarization).
Due to CPU load, this will slightly degrade packet per second
processing.
No Guard Bands are needed for the 5.8 GHz bands.
SNMP tab of the AP
Figure 47 SNMP tab of the AP
SNMPv2c Settings
SNMP Community String 1 : f6lnopy
SNMP commun·ty
1
St · 1 p
nng
· · o Read Only
erm1ss1ons :,. Read /Write
SNMP Community String 2 (Read Only) : f6lnopyro
SNMPv3 Settings
Engine ID : 00000a 1030a003ea00be II Default Engine ID I
SNMPv3 Sec urity Level : InoAuth,noPiiv I Y
Usernamoopym I
SNMPv3 Read-Only User : Authorization Key 1.......... .. I
Privacy Key ............... I
n Enable RNV User
Note:Aiso enable SNMPv2c Permission to be R/W
• Disable RNV lJser
SNMPv3 Read/Write User :
Username oopy
f......... I
Authorizatio flKey I
Privacy Key •.....•..... I
SNMPv3 Trap Configuration : I Disabled ., I
SNMP Accessing Addresses
Accessing IP I Subnet Mask 1 : jo.o.o.o I
Accessing IP I Subnet Mask 2 : .0.0.0 '101
Acc essing IP I Subnet Mask 3 : .0.0.0 '!ill
Accessing IP I Subnet Mask 4 : .0.0.0 '101
Accessing IP I Subnet Mask 5 : .0.0.0
'101
Accessing IP l Subnet Mask 6 : .0.0.0 l li]l
Accessing IP I Subnet Mask 7 : .0.0.0 '101
Accessing IP I Subnet fi.11ask 8 : .0.0.0 '101
Accessing IP I Subnet Mask 9 : .0.0.0
'101
Acc essing IP I Subnet Mask 10 : .0.0.0 '!ill
Trap Addresses
n Append DNS Domain Name
SNMP Trap Server DNS Usage :
• Disable DNS Domain Name
Trap Address 1 : .0.0.0
Trap Address 2 : .0.0.0
Trap Address 3 : .0.0.0
Trap Address 4 : .0.0.0
Trap Address 5 : .0.0.0
Trap Address 6 : .0.0.0
Trap Address 7 : .0.0.0
Trap Address 8 : .0.0.0
Trap Address 9 : .0.0.0
Trap Address 10 : .0.0.0
You may set the SNMP tab parameters as follows.
Table 42 AP SNMP attributes
Attribute Meaning
SNMP Community String Specify a control string that can allow a Network Management
1 Station (NMS) to access SNMP information. No spaces are
allowed in this string. The default string is Canopy.
SNMP Community String You can designate the SNMP Community String 1 to be the
1 Permissions password for WM, for example, to have Read / Write access to
the module via SNMP or for all SNMP access to the module to
be Read Only.
SNMP Community String Specify an additional control string that can allow a Network
2 (Read Only) Management Station (NMS) to read SNMP information. No
spaces are allowed in this string. The default string is
Canopyro. This password will never authenticate a user or an
NMS to read/write access.
The Community String value is clear text and is readable by a
packet monitor. Additional security derives from the
configuration of the Accessing Subnet, Trap Address, and
Permission parameters.
SNMPv3 Security Level Specify security model where users are defined and
authenticated before granting access to any SNMP service.
Each device can configure the security level of SNMPv3 to No
authentication/No privacy, Authentication/No privacy, or
Authentication/Privacy.
Attribute Meaning
SNMPv3 Read-Only User This filed allows for a read-only user per devices. The default
values for the Read-Only users is:
• Username = Canopyro
SNMPv3 Read/Write Read-write user by default is disabled. The default values for the
User Read/Write users is :
• Username = Canopy
• Authentication Password = authCanopy
• Privacy Password = privacyCanopy
Accessing IP / Subnet Specify the addresses that are allowed to send SNMP requests
Mask 1 to 10 to this AP. The NMS has an address that is among these
addresses (this subnet). You must enter both
• The network IP address in the form xxx.xxx.xxx.xxx
• The CIDR (Classless Interdomain Routing) prefix length in
the form /xx
For example:
• the /16 in 198.32.0.0/16 specifies a subnet mask of
255.255.0.0 (the first 16 bits in the address range are
identical among all members of the subnet).
• 192.168.102.0 specifies that any device whose IP address is
in the range 192.168.102.0 to 192.168.102.254 can send
SNMP requests to the AP, presuming that the device
supplies the correct Community String value.
The default treatment is to allow all networks access. For more
information on CIDR, execute an Internet search on “Classless
Interdomain Routing.” You are allowed to specify as many as 10
different accessing IP address, subnet mask combinations.
Attribute Meaning
SNMP Trap Server DNS The management DNS domain name may be toggled such that
Usage the name of the trap server only needs to be specified and the
DNS domain name is automatically appended to that name. The
default SNMP trap server addresses for all 10 available servers
is 0.0.0.0 with the appending of the DNS domain name disabled.
Trap Enable, Sync Status If you want sync status traps (sync lost and sync regained) sent
to Wireless Manager or an NMS, select Enabled. If you want
these traps suppressed, select Disabled.
Trap Enable, Session If you want session status traps sent to Wireless Manager or an
Status NMS, select Enabled.
Site Information Operators can enable or disable site information from appearing
Viewable to Guest Users when a user is in GUEST account mode.
Site Name Specify a string to associate with the physical module. This
parameter is written into the sysName SNMP MIB-II object and
can be polled by Wireless Manager or an NMS. The buffer size
for this field is 128 characters.
Site Contact Enter contact information for the module administrator. This
parameter is written into the sysContact SNMP MIB-II object
and can be polled by Wireless Manager or an NMS. The buffer
size for this field is 128 characters.
Site Location Enter information about the physical location of the module.
This parameter is written into the sysLocation SNMP MIB-II
object and can be polled by Wireless Manager or an NMS. The
buffer size for this field is 128 characters.
SNMPv3 Sett1ngs
Engine ID : 00000a 1030a003e47d 1bc II Use Default Engine 10 I
SNMPv3 St!t:UI i ly Lt!vf::!l . I noAutn,nol-'rrv • I
SNMPv3 Authentication Protocol: md5 •
SNMPv3 Privacy Protocol: I cbc"es • I
Usernamel§anopyro I
SNMPv3 Read-Only User : Authorization Key 1............ I
Privacy Key 1............... I
o Enable R/W User
Note:Aiso enable SNMPv2c Permission to be R/W
® Disable R/W User
SNMPv3 Read/Write User :
Usernameanopy
Authorization Key 1..........
I
I
Privacy Key ............. I
SNMPv3 Trap Configuration : I Disabled •I
SNMP Access ng Mdresses
Accessing IP I Subnet MasK 1: 10.0.0.0 I'
Accessina IP I Subnet MasK 2: lii.o.o.o 11101
Accessing IP I Subnet MasK 3: !ii.o.o.o 1'101
Accessing IP I Subnet MasK 4: !ii.o.o.o 1'101
Accessing IP I Subnet MasK 5: !ii.o.o.o 1'101
Accessing IP I Subnet MasK 6: !ii.o.o.o 1'101
Accessing IP I Subnet MasK 7: !ii.o.o.o 1'101
Accessing IP I Subnet MasK 8: !ii.o.o.o 1'101
Accessing IP I Subnet MasK 9: !ii.o.o.o 1'101
Accessing IP I Subnet MasK 10 : !ii.o.o.o 1'101
Trap Mdresses
SNMP Trap SeiVer DNS Usage :
o Append DNS Domain Name
® Disable DNS Domain Name
Trap Address 1 : !ii.o.o.o
Trap Address 2 : !ii.o.o.o
Trap Address 3 : !ii.o.o.o
Trap Address -1 : !ii.o.o.o
Trap Address 5: !ii.o.o.o
Trap Address 6: !ii.o.o.o
Trap Address 7: !ii.o.o.o
Trap Address 8: !ii.o.o.o
Trap Address 9: !ii.o.o.o
Trap Address 10 : !ii.o.o.o
SteInformat1on
Site Information Viewable ®
Enabled to Guest Users : O Disabled
Site Name : !No Site Name I
Site Contact: !No Site Contact I
I No Site location
Site Location :
hi
Attribute Meaning
SNMP Community Specify a control string that can allow an Network Management
String 1 Station (NMS) to access SNMP information. No spaces are
allowed in this string. The default string is Canopy.
SNMP Community You can designate the SNMP Community String 1 to be the
String 1 Permissions password for WM, for example, to have Read / Write access to
the module via SNMP or for all SNMP access to the module to be
Read Only.
SNMP Community Specify an additional control string that can allow an Network
String 2 (Read Only) Management Station (NMS) to read SNMP information. No spaces
are allowed in this string. The default string is Canopy2. This
password will never authenticate a user or an NMS to read/write
access.
The Community String value is clear text and is readable by a
packet monitor. Additional security derives from the configuration
of the Accessing Subnet, Trap Address and Permission
parameters.
Engine ID The Engine ID may be between 5 and 32 hex characters. The hex
character input is driven by RFC 3411 recommendations on the
Engine ID. The default Engine ID is the MAC address of the device
SNMPv3 Security Specify security model where users are defined and authenticated
Level before granting access to any SNMP service. Each device can
configure the security level of SNMPv3 to No authentication/No
privacy, Authentication/No privacy, or Authentication/Privacy.
SNMPv3 Read-Only This filed allows for a read-only user per devices. The default
User values for the Read-Only users is:
• Username = Canopyro
• Authentication Password = authCanopyro
Attribute Meaning
SNMPv3 Read/Write Read-write user by default is disabled. The default values for the
User Read/Write users is :
• Username = Canopy
Accessing IP / Subnet Specify the addresses that are allowed to send SNMP requests to
Mask 1 to 10 this SM. Wireless Manager or the NMS has an address that is
among these addresses (this subnet). You must enter both
The network IP address in the form xxx.xxx.xxx.xxx
The CIDR (Classless Interdomain Routing) prefix length in the
form /xx
For example
• the /16 in 198.32.0.0/16 specifies a subnet mask of 255.255.0.0
(the first 16 bits in the address range are identical among all
members of the subnet).
• 192.168.102.0 specifies any device whose IP address is in the
range 192.168.102.0 to 192.168.102.254 can send SNMP
requests to the SM, presuming that the device supplies the
correct Community String value.
The default treatment is to allow all networks access (set to 0).
For more information on CIDR, execute an Internet search on
“Classless Interdomain Routing.” You are allowed to specify as
many as 10 different accessing IP address, subnet mask
combinations.
RECOMMENDATION:
The subscriber can access the SM by changing
the subscriber device to the accessing subnet.
This hazard exists because the Community
String and Accessing Subnet are both visible
parameters. To avoid this hazard, configure the
SM to filter (block) SNMP requests.
Attribute Meaning
SNMP Trap Server The management DNS domain name may be toggled such that the
DNS Usage name of the trap server only needs to be specified and the DNS
domain name is automatically appended to that name. The default
SNMP trap server addresses for all 10 available servers is 0.0.0.0
with the appending of the DNS domain name disabled.
Site Information Operators can enable or disable site information from appearing
Viewable to Guest when a user is in GUEST account mode.
Users
Site Name Specify a string to associate with the physical module. This
parameter is written into the sysName SNMP MIB-II object and
can be polled by Wireless Manager or an NMS. The buffer size for
this field is 128 characters.
Site Contact Enter contact information for the module administrator. This
parameter is written into the sysContact SNMP MIB-II object and
can be polled by Wireless Manager or an NMS. The buffer size for
this field is 128 characters.
Site Location Enter information about the physical location of the module. This
parameter is written into the sysLocation SNMP MIB-II object and
can be polled by Wireless Manager or an NMS. The buffer size for
this field is 128 characters.
Table 45 AP Syslog Configuration attributes
Attribute Meaning
Syslog DNS Server To configure the AP to append or not append the DNS server
Usage name to the syslog server name.
Syslog Server The dotted decimal or DNS name of the syslog server address.
The syslog server port (default 514) to which syslog messaging
Syslog Server Port
is sent.
AP Syslog Transmit When enabled, syslog messages are sent from the AP.
When enabled, syslog messages are sent from all the registered
SM Syslog Transmit
SMs, unless they are individually set to override this.
Table 46 Syslog Configuration attributes
Attribute Meaning
Syslog This control determines whether the SM will attempt to use the syslog
Configuration server definition from the AP, or whether it will use a local server
Source definition.
• When set to “AP preferred, use local when AP configuration
unavailable”, and if the SM can register with an AP, then it uses the
syslog server defined on that AP. If the SM cannot register then it
will syslog to its locally defined syslog server through its wired
connection, if any.
• When set to “Local only” the SM ignores the AP’s definition of the
syslog server and allows the syslog server to be configured
individually for each SM.
Syslog DNS To configure the SM to append or not the DNS server name to the
Server Usage syslog server name.
Syslog Server The dotted decimal or DNS name of the syslog server address.
Syslog Server
The syslog server port (default 514) to which syslog messaging is sent.
Port
Attribute Meaning
Syslog Controls the SMs ability to transmit syslog messages. When set to
Transmission “Learn from AP” the AP will control whether this SM transmits syslog
messages. When set to “enable” or “disable” the SM will control
whether it sends syslog messages. This allows an operator to override
the AP settings for individual SMs in a sector.
This provides a selection for the minimum syslog message severity that
is sent to the syslog server. Values range from fatal (highest severity
Syslog Minimum
and least verbose) to info (lowest severity, maximum verbosity).
Level
For example: If the Syslog Minimum Level is set to notice, then only
messages with severity notice and above are sent.
Attribute Meaning
IP Address Internet Protocol (IP) address. This address is used by family of Internet
protocols to uniquely identify this unit on a network.
Specify whether the IP address of the SM must be visible to only a device
Network
connected to the SM by Ethernet (Local) or be visible to the AP as well
Accessibility
(Public).
If Static IP is set as the Connection Type of the WAN interface, then this
Subnet Mask
parameter configures the subnet mask of the SM for RF management traffic.
If Static IP is set as the Connection Type of the WAN interface, then this
Gateway IP
parameter configures the gateway IP address for the SM for RF management
Address
traffic.
If Enabled is selected, the DHCP server automatically assigns the IP
configuration (IP address, subnet mask, and gateway IP address) and the
DHCP state values of those individual parameters (above) are not used. The setting of this
DHCP state parameter is also viewable (read only), in the Network Interface
tab of the Home page.
Attribute Meaning
Canopy devices allow for configuration of a preferred and alternate DNS
server IP address either automatically or manually. Devices must set DNS
DNS IP Address server IP address manually when DHCP is disabled for the management
interface of the device. The default DNS IP addresses are 0.0.0.0 when
configured manually.
Preferred DNS
The first address used for DNS resolution.
Server
Alternate DNS If the Preferred DNS server cannot be reached, the Alternate DNS Server is
Server used.
The operator’s management domain name may be configured for DNS. The
domain name configuration can be used for configuration of the servers in the
Domain Name
operator’s network. The default domain name is example.com, and is only
used if configured as such.
Accessing SM over-the-air by LUID
The SM may be accessed via the AP management GUI by navigating to either Home =>
Session Status or Home => Remote Subscribers and clicking on the SM’s hyperlink.
For example, to access one of the SMs, click LUID: 002 – [0a-00-3e-37-b9-fd], as shown
in Figure 52.
Task 10: Monitoring the AP-SM Link
Monitoring the AP-SM Link
After the SM installer has configured the link, either an operator in the network office
or the SM installer in the field (if read access to the AP is available to the installer) must
perform the following procedure. Who is authorized and able to do this depends on local
operator password policy, management VLAN setup and operational practices.
To monitor the AP-SM link for performance, follow these instructions:
Procedure 11 Monitoring the AP-SM link
1 Access the web interface of the AP
2 In the left-side menu of the AP interface, select Home.
3 Click the Session Status tab.
Figure 54 AP Session Status page
4 The Device tab of Session Status List display all displayed SMs – MAC address, PMP
Hardware, Software Version, FPGA Version and State
5 Click Session Count tab of Session Status List to display values for Session Count, Reg
Count, and Re-Reg Count.
In case, the session status page does not list any SM, the SessionStatus.xml will still
be visible but the file would be empty. The file will contain data from all of the 5
different tables.
Export from command line
The scripts users can also get this file from command line, you have to authenticate
successfully in order to download the file.
Wget
http://169.254.1.1/SessionStatus.xml?CanopyUsername=test&CanopyPassword=test
Task 11: Configuring quality of service
Maximum Information Rate (MIR) Parameters
Point-to-multipoint links use the following MIR parameters for bandwidth
management:
• Sustained Uplink Data Rate (kbps)
• Uplink Burst Allocation (kb)
• Sustained Downlink Data Rate (kbps)
• Stores credits (tokens) for the SM to spend on bandwidth for reception or transmission.
• Drains tokens during reception or transmission.
• Refills with tokens at the sustained rate set by the network operator.
For each token, the SM can send toward the network in the uplink (or the AP can
send toward the SM in the downlink) an equivalent number of kilobits. Two buckets
determine the permitted throughput: one in the SM for uplink and one in the AP for
downlink.
The applicable set of Uplink Burst Allocation and Downlink Burst Allocation
parameters determine the number of tokens that can fill each bucket. When the SM
transmits (or the AP transmits) a packet, the equivalent number of tokens is
removed from the uplink (or downlink) bucket.
Except when full, the bucket is continuously being refilled with tokens at rates that
the applicable set of Sustained Uplink Data Rate and Sustained Downlink Data
Rate parameters specify. The bucket often drains at a rate that is much faster than
the sustained data rate but can refill at only the sustained data rate. Thus, the
effects of the allocation and rate parameters on packet delay are as follows:
• The burst allocation affects how many kilobits are processed before packet delay is
imposed.
• The sustained data rate affects the packet delay that is imposed.
Round-trip latency ≈ 6 ms
Authentication AP AP AP AP
Server
SM SM SM SM SM
Authentication SM SM SM SM
Server+SM
In the Quality of Service (QoS) tab, you can set AP bandwidth parameters as follows.
Table 52 AP QoS attributes
Attribute Meaning
Max Burst Uplink These parameters allow operators to specify the data rate at
Data Rate which a SM is allowed to transmit (until burst allocation limit is
reached) before being recharged at the Sustained Uplink
Data Rate with credits to transit more. When set to 0 (default),
the burst rate is unlimited.
Sustained Uplink Data Specify the rate that each SM registered to this AP is
Rate replenished with credits for transmission. This default imposes
no restriction on the uplink. See
• Maximum Information Rate (MIR) Parameters on page 154
• Interaction of Burst Allocation and Sustained Data Rate
Settings on page 156
• Configuration Source on page 62
Attribute Meaning
Max Burst Downlink These parameters allow operators to specify the data rate at
Data Rate which a SM is allowed to transmit (until burst allocation limit is
reached) before being recharged at the Sustained Downlink
Data Rate with credits to transit more. When set to 0 (default),
the burst rate is unlimited.
Sustained Downlink • Specify the rate at which the AP is replenished with credits
Data Rate (tokens) for transmission to each of the SMs in its sector.
This default imposes no restriction on the uplink. See
Maximum Information Rate (MIR) Parameters on page 154
• Interaction of Burst Allocation and Sustained Data Rate
Settings on page 156
• Configuration Source on page 62
Downlink Burst Specify the maximum amount of data to allow the AP to transmit
Allocation to any registered SM before the AP is replenished with
transmission credits at the Sustained Downlink Data Rate.
See
• Maximum Information Rate (MIR) Parameters on page 154
Priority Precedence Allows operator to decide if 802.1p or DiffServ priority bits must
be used first when making priority decisions.
Attribute Meaning
PPPoE Control Operators may configure the SM to utilize the high priority
Message Priority channel for PPPoE control messages. Configuring the SM in this
fashion can benefit the continuity of PPPoE connections when
there are issues with PPPoE sessions being dropped in the
network. This prioritization may be configured in the DiffServ
tab in the Configuration menu of the SM.
Prioritize TCP ACK To reduce the likelihood of TCP acknowledgement packets being
dropped, set this parameter to Enabled. This can improve
throughput that the end user perceives during transient periods
of congestion on the link that is carrying acknowledgements.
DiffServ tab of the AP
Figure 59 Diffserv tab of the AP
Attribute Meaning
Priority Select The priority setting input for the CodePoint selected in CodePoint
Select
PPPoE Control Operators may configure the AP to utilize the high priority channel for
Message PPPoE control messages. Configuring the AP in this fashion can
Priority benefit the continuity of PPPoE connections when there are issues
with PPPoE sessions being dropped in the network. This prioritization
may be configured in the DiffServ tab in the Configuration menu of
the AP.
In the Quality of Service (QoS) tab of the SM, you may set the following parameters.
Table 54 SM Quality of Service attributes
Attribute Meaning
Sustained Uplink • Specify the rate that this SM is replenished with credits for
Data Rate transmission. This default imposes no restriction on the uplink.
SeeMaximum Information Rate (MIR) Parameters on page 154
• Interaction of Burst Allocation and Sustained Data Rate
Settings on page 156
• Configuration Source on page 62
Sustained Downlink • Specify the rate at which the AP is replenished with credits
Data Rate (tokens) for transmission to this SM. This default imposes no
restriction on the uplink. See Maximum Information Rate
(MIR) Parameters on Page 154
• Interaction of Burst Allocation and Sustained Data Rate
Settings on page 156
Attribute Meaning
Max Burst Uplink These parameters allow operators to specify the data rate at
Data Rate which a SM is allowed to transmit (until burst allocation limit is
reached) before being recharged at the Sustained Uplink Data
Rate with credits to transit more. When set to 0 (default), the
burst rate is unlimited.
Max Burst These parameters allow operators to specify the data rate at
Downlink Data Rate which a SM is allowed to transmit (until burst allocation limit is
reached) before being recharged at the Sustained Downlink
Data Rate with credits to transit more. When set to 0 (default),
the burst rate is unlimited.
Enable Broadcast / This parameter allows the operator to specify if Broadcast and
Multicast Data Rate Multicast data is rate-limited. This data rate can be entered in
Kbps or PPS (Packets Per Second).
Broadcast / This parameter allows the operator to specify a data rate at which
Multicast Data Rate Broadcast and Multicast traffic is sent via the radio link.
Low Priority Uplink This field indicates the minimum rate at which low priority traffic
CIR is sent over the uplink (unless CIR is oversubscribed or RF link
quality is degraded).
• Committed Information Rate (CIR) on page 155
• Setting the Configuration Source on page 159
Low Priority This field indicates the minimum rate at which low priority traffic
Downlink CIR is sent over the downlink (unless CIR is oversubscribed or RF link
quality is degraded).
• Committed Information Rate (CIR) on page 155
Attribute Meaning
Hi Priority Uplink This field indicates the minimum rate at which high priority traffic
CIR is sent over the uplink (unless CIR is oversubscribed or RF link
quality is degraded).
• Committed Information Rate (CIR) on page 155
Hi Priority This field indicates the minimum rate at which high priority traffic
Downlink CIR is sent over the downlink (unless CIR is oversubscribed or RF link
quality is degraded).
• Committed Information Rate (CIR) on page 155
• Setting the Configuration Source on page 159
Priority Precedence Allows operator to decide if 802.1p or DiffServ priority bits must
be used first when making priority decisions.
PPPoE Control Operators may configure the SM to utilize the high priority
Message Priority channel for PPPoE control messages. Configuring the SM in this
fashion can benefit the continuity of PPPoE connections when
there are issues with PPPoE sessions being dropped in the
network. This prioritization may be configured in the DiffServ tab
in the Configuration menu of the SM.
Prioritize TCP ACK To reduce the likelihood of TCP acknowledgement packets being
dropped, set this parameter to Enabled. This can improve
throughput that the end user perceives during transient periods of
congestion on the link that is carrying acknowledgements. This
parameter, when enabled, can be particularly useful when
running bi-direction FTP sessions over the link. If a link is
primarily used for video surveillance, it is recommended to
configure this parameter to “Disabled”.
In the DiffServ tab of the SM, you may set the following parameters.
Table 55 SM DiffServ attributes
Attribute Meaning
Priorities of 0 through 3 map to the low-priority channel; 4 through 7
to the high-priority channel. The mappings are the same as 802.1p
VLAN priorities.
CodePoint 1
Consistent with RFC 2474
through
Priority Select The priority setting input for the CodePoint selected in CodePoint
Select
Attribute Meaning
Priority Precedence Allows operator to decide if 802.1p or DiffServ priority bits must be
used first when making priority decisions.
PPPoE Control Operators may configure the SM to utilize the high priority channel
Message Priority for PPPoE control messages. Configuring the SM in this fashion can
benefit the continuity of PPPoE connections when there are issues
with PPPoE sessions being dropped in the network. This prioritization
may be configured in the DiffServ tab in the Configuration menu of
the SM.
Enabling “Perform Spectrum Analysis on Boot for configured Duration” will
increase SM registration time by the amount of seconds specified for the SM to
scan the spectrum upon boot.
New navigation features include:
• Results may be panned left and right through the scanned spectrum by clicking and
dragging the graph left and right
• Results may be zoomed in and out with the mouse wheel
Attribute Meaning
Display Data Path Both means that the vertical and horizontal paths are
displayed or an individual path may be selected to display
only a single-path reading.
Registered SM This field displays the MAC address and Site Name of the
Count registered SM.
Maximum Count of This field displays the maximum number of registered SMs.
Registered SMs
Attribute Meaning
Registered SM This field displays the number of SMs that were registered to
Count the AP before the SA was started. This helps the user know
all the SMs re-registered after performing a SA.
Maximum Count of This field displays the largest number of SMs that have been
Registered SMs simultaneously registered in the AP since it was last
rebooted. This count can provide some insight into sector
history and provide comparison between current and
maximum SM counts at a glance.
Current Subscriber The SM with which the Link Capacity Test is run.
Module
Scanning This parameter defines the size of the channel scanned when
Bandwidth running the analyzer.
This feature proceeds in the following sequence:
Task 13: Zero Touch Configuration Using DHCP
Option 66
This feature allows an SM to get its configuration via DHCP option 66. This can be
used for the initial configuration of an SM as well as managing the configuration of
SMs on an ongoing basis. Here is how it works in brief :
1. When the SM boots up, if it is set to use DHCP client, it will send out a DHCP
Discover packet which includes a request for DHCP Option 66.
2. In case of a brand new SM out of the box, the DHCP Discover packet is sent out if
the SM connects to an AP using Installation Color Code (ICC), even though DHCP
client is not enabled in factory default config.
3. An appropriately configured DHCP server will respond with a DHCP Offer and
include a URL in response to the Option 66 request. The URL should point to the
configuration file.
4. The device will download the configuration file and apply it. The device will reboot
automatically if needed. (Note: this requires “rebootIfRequired” flag to be added to
the config file. See Creating a Golden config file on page 177.
Configuration Steps
The Zero Touch Configuraiton steps are the following:
1. Create the golden config file(s)
"smRadioConfig": {
"frequencyScanList": [
5475000,
5480000
],
"colorCodeList": [
{
"colorCode": 42,
"priority": 1
}
]
},
"networkConfig": {
"lanDhcpState": 1
}
},
"cfgFileVersion": "1.0",
"cfgFileString": "Canopy configuration file",
"configFileParameters": {
"rebootIfRequired": true
}
}
When configuration is imported, only the items that exist in the configuration file
are modified. Parameters that are not in the imported file are not changed. If user
wish to revert those settings to their factory default values, please add a
“setToDefaults” item under “configFileParameters” section with a value of true.
"cfgFileVersion": "1.0",
"cfgFileString": "Canopy configuration file",
"configFileParameters": {
"rebootIfRequired": true,
"setToDefaults": true
}
In case, the SM needs to fetch the configuration file on each boot up even when not
connecting to AP via ICC, set “Network Accessibility” to “Public” and “DHCP State”
to “Enabled” in the “Configuration > IP” page before exporting the configuration.
2. If you have multiple “Scopes” defined, identify the correct “Scope” that will serve IP
addresses for the SMs
3. Right click on “Scope Option” under the correct “Scope” and select “Configure
Options”
4. In the “Scope Options” dialog, scroll down to “066 Boot Server Host Name”, select
the checkbox and enter the full URL to the golden config file as the “String value”.
Then click “OK”.
5. In the DHCP snap-in window, right click and “Refresh” to see the DHCP option 66 in
the list of DHCP options
Supported URL Formats
FTP, TFTP, HTTP and HTTPS URLs are supported. Some examples are given below.
- ftp://10.120.163.253/canopy.cfg
- ftp://admin:admin123@10.120.163.253/canopy.cfg (login as admin with
password admin123)
- tftp://10.120.163.253/canopy.cfg
- http://10.120.163.253/golden-config.cfg
- https://10.120.163.253/smconfig/golden-config.cfg
User can also specify the URL pointing to a directory and not a specific file.
Terminate the URL with a ‘/’ to indicate that it is a directory and not a file. Use this
format when each SM has its own individual config file. The directory should contain
files named “<mac>.cfg”, one for each SM..
3. If the SM is connecting to the AP using a color code other than ICC, make sure the
SM has “Network Accessibility” set to “Public” and “DHCP State” set to “Enabled”
in the “Configuration > IP” page.
4. Make sure the golden config file does not turn off “Network Accessibility” or “DHCP
State”. If it does, the SM will no longer request the config file when it is rebooted.
5. Check the event log of the SM to see the status of the configuration file import
including any errors that prevented it from importing the file.
6. Capture the DHCP Offer packet from the DHCP server to the SM and verify that
Option 66 has the expected URL.
}
The "setToDefaults" when set to "true" tell the device to reset to factory default
configuration and apply the configuration in the file on top of that. So any
attribute not in the configuration file will be set to its factory default value. By
default, the configuration in the file is merged with the existing configuration on
the device.
The "rebootIfRequired" flag when set to "true" tell the device to reboot
automatically if needed to apply the configuration change. By default, the device
will not reboot automatically.
Figure 64 Configuration File upload and download page
110.120.226.6 I
Authentication SeiVer 2 :
IShared Secret
.0.0.0 I
Authentication SeiVer 3 :
IShared Secret
.0.0.0 I
Authentication SeiVer 4 (BAM ONLY) : .0.0.0 I
Authentication SeiVer 5 (BAM ONLY) : .0.0.0 I
Radius Port : 11812 1 Default pott number is 1812
Authentication Key : I 1 (Using All OxFF's Key)
Use Key above
Select Key :
use Default Key
IPkcess F1 tenng
o IP Access Filtering Enabled - Only allow access from IP
addresses specified
IP Access Control:
below
® IP Access Filtering Disabled - Allow access from aii iP
addresses
Allowed Source IP 1: .0.0.0 111321Network Mask (set to 32 to
disable) Allowed Source IP 2 : .0.0.0 111321Network Mask (set to 32
Secunty Mode
Web Access : IHTTP Only •I
SNMP : ISNMPv3 Only •I
® Enabled
Telnet:
O Disabled
® Enabled
FTP ·
O DISableO
® Enabled
TFTP :
O Disabled
Attribute Meaning
Operators may use this field to select the following authentication
modes:
Disabled—the AP requires no SMs to authenticate.
Authentication Server —the AP requires any SM that attempts
registration to be authenticated in Wireless Manager before
registration.
AP PreShared Key - The AP acts as the authentication server to its
SMs and will make use of a user-configurable pre-shared
authentication key. The operator enters this key on both the AP and
all SMs desired to register to that AP. There is also an option of
leaving the AP and SMs at their default setting of using the “Default
Key”. Due to the nature of the authentication operation, if you want
Authentication to set a specific authentication key, then you MUST configure the
Mode key on all of the SMs and reboot them BEFORE enabling the key
and option on the AP. Otherwise, if you configure the AP first, none
of the SMs is able to register.
RADIUS AAA - When RADIUS AAA is selected, up to 3
Authentication Server (RADIUS Server) IP addresses and Shared
Secrets can be configured. The IP address(s) configured here must
match the IP address(s) of the RADIUS server(s). The shared
secret(s) configured here must match the shared secret(s)
configured in the RADIUS server(s). Servers 2 and 3 are meant for
backup and reliability, not for splitting the database. If Server 1
doesn’t respond, Server 2 is tried, and then server 3. If Server 1
rejects authentication, the SM is denied entry to the network and
does not progress trying the other servers.
The management DNS domain name may be toggled such that the
Authentication
name of the authentication server only needs to be specified and the
Server DNS Usage
DNS domain name is automatically appended to that name.
Authentication
Server 1
Authentication Enter the IP address or server name of the authentication server
Server 2 (RADIUS or WM) and the Shared Secret configured in the
authentication server. When Authentication Mode RADIUS AAA
Authentication is selected, the default value of Shared Secret is
Server 3 “CanopySharedSecret”. The Shared Secret may consist of up to 32
Attribute Meaning
Authentication
Server 5 (BAM
Only)
Radius Port This field allows the operator to configure a custom port for RADIUS
server communication. The default value is 1812.
Selection Key This option allows operators to choose which authentication key is
used:
Use Key above means that the key specified in Authentication
Key is used for authentication
Use Default Key means that a default key (based off of the SM’s
MAC address) is used for authentication
Encryption Key Specify the type of airlink security to apply to this AP. The
encryption setting must match the encryption setting of the SMs.
None provides no encryption on the air link.
DES (Data Encryption Standard): An over-the-air link encryption
option that uses secret 56-bit keys and 8 parity bits. DES performs a
series of bit permutations, substitutions, and recombination
operations on blocks of data. DES encryption does not affect the
performance or throughput of the system.
AES (Advanced Encryption Standard): An over-the-air link
encryption option that uses the Rijndael algorithm and 128-bit keys
to establish a higher level of security than DES. AES products are
certified as compliant with the Federal Information Processing
Standards (FIPS 197) in the U.S.A.
SM Display of AP You can use this field to suppress the display of data about this AP
Evaluation Data on the AP Evaluation tab of the Tools page in all SMs that register.
Web, Telnet, FTP Enter the expiry in seconds for remote management sessions via
Session Timeout HTTP, telnet, or ftp access to the AP.
IP Access Control You can permit access to the AP from any IP address (IP Access
Filtering Disabled) or limit it to access from only one, two, or three
IP addresses that you specify (IP Access Filtering Enabled). If you
select IP Access Filtering Enabled, then you must populate at
least one of the three Allowed Source IP parameters or have no
access permitted from any IP address
Allowed Source IP If you selected IP Access Filtering Enabled for the IP Access
1 Control parameter, then you must populate at least one of the three
Attribute Meaning
Web Access The Radio supports secured and non-secured web access protocols.
Select suitable web access from drop down list:
• HTTP Only – provides non-secured web access. The radio to be
accessed via http://<IP of Radio>.
• HTTPs Only – provides a secured web access. The radio to be
accessed via http://<IP of Radio>.
• HTTP and HTTPs – If enabled, the radio can be accessed via
both http and https.
Telnet This option allows to Enable and Disable Telnet access to the
Radio.
FTP This option allows to Enable and Disable FTP access to the Radio.
TFTP This option allows to Enable and Disable TFTP access to the Radio.
Cert1ficate 1
C =US
S =Illinois
0 =Motorola Solutions,Inc.
OU =Canopy Wireless Broadband
CN =Canopy AAA SeiVer Demo CA
E =technical-support@canopywireless.com
Valid From: 01/01/2001 00:00:00
Valid To: 12/31/2049 23:59:59
I0e1e1e I
IPkcess F ltenng
o IP Access Filtering Enabled • Only allow access from IP
addresses specified below
IP Access Control:
® IP Access Filtering Disabled· Allow access from aii iP
addresses
Allowed Source IP t : .0.0.0 111321Network Mask (set to 32 to disable)
Allowed Source IP 2 : .0.0.0 111321Network Mask (set to 32 to disable)
Allowed Source IP 3 : .0.0.0 111321Network Mask (set to 32 to disable)
Secunty Mode
Web Access : IHTTP Only •I
SNMP : I SNMPv2c Onty •I
® Enabled
Telnet:
O Disabled
® Enabled
FTP :
O Disabled
® Enabled
TFTP :
O Disabled
Attribute Meaning
Attribute Meaning
Enter a Username for the SM. This must match the username
configured for the SM on the RADIUS server. The default
Username Username is the SM’s MAC address. The Username can be up
to 128 non-special (no diacritical markings) alphanumeric
characters.
Password Enter the desired password for the SM in the Password and
Confirm Password fields. The Password must match the
password configured for the SM on the RADIUS server. The
Confirm Password default Password is “password”. The Password can be up to 128
non-special (no diacritical markings) alphanumeric characters.
To upload a certificate manually to a SM, first load it in a known
place on your PC or network drive, then click on a Delete button
on one of the Certificate description blocks to delete a certificate
to provide space for your certificate. Click on Choose File,
browse to the location of the certificate, and click the Import
Certificate button, and then reboot the radio to use the new
certificate.
When a certificate is in use, after the SM successfully registers
to an AP, an indication of In Use will appear in the description
Upload Certificate
block of the certificate being used.
File
The public certificates installed on the SMs are used with the
private certificate on the RADIUS server to provide a
public/private key encryption system.
Up to 2 certificates can be resident on a SM. An installed
certificate can be deleted by clicking the Delete button in the
certificate’s description block on the Configuration > Security
tab. To restore fhe 2 default certificates, click the Use Default
Certificates button in the RADIUS Certificate Settings
parameter block and reboot the radio.
Specify the type of airlink security to apply to this AP. The
encryption setting must match the encryption setting of the SMs.
None provides no encryption on the air link.
DES (Data Encryption Standard): An over-the-air link encryption
option that uses secret 56-bit keys and 8 parity bits. DES performs
a series of bit permutations, substitutions, and recombination
Encryption Setting operations on blocks of data. DES encryption does not affect the
performance or throughput of the system.
AES (Advanced Encryption Standard): An over-the-air link
encryption option that uses the Rijndael algorithm and 128-bit
keys to establish a higher level of security than DES. AES products
are certified as compliant with the Federal Information Processing
Standards (FIPS 197) in the U.S.A.
Attribute Meaning
Web, Telnet, FTP Enter the expiry in seconds for remote management sessions via
Session Timeout HTTP, telnet or ftp access to the AP.
If you want to prevent any device that is connected to the Ethernet
port of the SM from accessing the management interface of the
SM, select Ethernet Access Disabled. This selection disables
access through this port to via HTTP (the GUI), SNMP, telnet,
FTP, and TFTP. With this selection, management access is
available through only the RF interface via either an IP address (if
Ethernet Access
Network Accessibility is set to Public on the SM) or the Session
Status or Remote Subscribers tab of the AP.. See IP Access
Control below.
If you want to allow management access through the Ethernet
port, select Ethernet Access Enabled. This is the factory default
setting for this parameter.
You can permit access to the AP from any IP address (IP Access
Filtering Disabled) or limit it to access from only one, two, or
three IP addresses that you specify (IP Access Filtering
IP Access Control
Enabled). If you select IP Access Filtering Enabled, then you
must populate at least one of the three Allowed Source IP
parameters or have no access permitted from any IP address
Allowed Source IP If you selected IP Access Filtering Enabled for the IP Access
1 Control parameter, then you must populate at least one of the
three Allowed Source IP parameters or have no access permitted
Allowed Source IP
to the AP from any IP address. You may populate as many as all
2
three.
Allowed Source IP If you selected IP Access Filtering Disabled for the IP Access
Control parameter, then no entries in this parameter are read,
3
and access from all IP addresses is permitted.
Web Access The Radio supports secured and non-secured web access
protocols. Select suitable web access from drop down list:
• HTTP Only – provides non-secured web access. The radio to
be accessed via http://<IP of Radio>.
• HTTPs Only – provides a secured web access. The radio to be
accessed via http://<IP of Radio>.
• HTTP and HTTPs – If enabled, the radio can be accessed via
both http and https.
Attribute Meaning
Telnet This option allows to Enable and Disable Telnet access to the
Radio.
FTP This option allows to Enable and Disable FTP access to the
Radio.
TFTP This option allows to Enable and Disable TFTP access to the
Radio.
• An IP address and NAS shared secret that is the same as the IP address and Shared
Secret configured on the AP’s Configuration => Security tab for that RADIUS
server.
• A server private certificate, server key, and CA certificate that complement the public
certificates distributed to the SMs, as well as the Canopy dictionary file that defines
Vendor Specific Attributes (VSAa). Default certificate files and the dictionary file are
available from the software site: https://support.cambiumnetworks.com/files/PMP450i
after entering your name, email address, and either Customer Contract Number or
the MAC address of a module covered under the 12 month warranty.
Optionally, operators may configure the RADIUS server response messages (Accept
or Reject) so that the user has information as to why they have been rejected. The
AP displays the RADIUS Authentication Reply message strings in the Session Status
list as part of each SM’s information. The SM will show this string (listed as
Authentication Response on the SM GUI) on the main Status page in the Subscriber
Module Stats section.
Aradial AAA servers only support operator-configurable Authentication Accept
responses, not Authentication Reject responses.
• The SM is not configured for DHCP on its management interface. If DHCP is enabled
and these attributes are configured in the RADIUS server, the attributes is ignored by
the SM.
• The SM management interface must be configured to be publically accessible. If the SM
is configured to have local accessibility, the management interface will still be assigned
the framed addressing, and the SM iscome publicly accessible via the assigned framed
IP addressing.
• When using these attributes, for the addressing to be implemented by the SM operators
must configure Framed-IP-Address in RADIUS. If Framed-IP-Address is not configured
but Framed-IP-Netmask and/or Cambium-Canopy-Gateway is configured, the attributes
is ignored. In the case where only the Framed-IP-Address is configured, Framed-IP-
Netmask defaults to 255.255.0.0 (NAT disabled) / 255.255.255.0 (NAT enabled) and
Cambium-Canopy-Gateway defaults to 0.0.0.0.
Configuring your RADIUS server for SM configuration
Canopy Vendor Specific Attributes (VSAs) along with VSA numbers and other
details are listed in Table 60. The associated SM GUI page, tab and parameter are
listed to aid cross-referencing and understanding of the VSAs.
A RADIUS dictionary file is available from the software site:
https://support.cambiumnetworks.com/files/PMP450i
The RADIUS dictionary file defines the VSAs and their values and is usually
imported into the RADIUS server as part of server and database setup.
MS-MPPE-Send-Key 1 26.311.16 - Y -
- - -
MS-MPPE-Recv-Key 2 26.311.17 - Y -
- - -
Table 61 AP User Authentication and Access Tracking attributes
Attribute Meaning
• Local: The local SM is checked for accounts. No
centralized RADIUS accounting (access control) is
performed.
• Remote: Authentication by the centralized RADIUS
server is required to gain access to the AP. For up to
2 minutes a test pattern is displayed until the server
responds or times out.
User Authentication • Remote then Local: Authentication using the
Mode centralized RADIUS server is attempted. If the server
sends a reject message, then the setting of Allow
Local Login after Reject from AAA determines if
the local user database is checked or not. If the
configured servers do not respond within 2 minutes,
then the local user database is used. The successful
login method is displayed in the navigation column of
the AP.
Radius Accounting The destination port on the AAA server used for Radius
Port accounting communication.
Attribute Meaning
• disable – no accounting messages are sent to the
RADIUS server
• deviceAccess – accounting messages are sent to the
Accounting Messages
RADIUS server regarding device access (see Table 63).
• dataUsage – accounting messages are sent to the
RADIUS server regarding data usage (see Table 63).
The interval for which accounting data messages are sent
Accounting Data
from the radio to the RADIUS server. If 0 is configured
Usage Interval
for this parameter, no data usage messages are sent.
2 Set User Authentication Mode on the AP’s Account > User Authentication and
Access Tracking tab (the tab only appears after the AP is set to AAA
authentication) to Remote or Remote then Local.
3 Set User Authentication Mode on the SM’s Account > User Authentication
and Access Tracking tab to Remote or Remote then Local.
• Local: The local SM is checked for accounts. No centralized RADIUS
accounting (access control) is performed.
Remote access control is enabled only after the SM registers to an AP that has
Authentication Mode set to RADIUS AAA. Local access control will always be used
before registration and is used after registration if the AP is not configured for
RADIUS.
Table 62 SM User Authentication and Access Tracking attributes
Attribute Meaning
• Local: The local SM is checked for accounts. No
centralized RADIUS accounting (access control) is
performed.
• Remote: Authentication by the centralized RADIUS server
is required to gain access to the SM if the SM is registered to
an AP that has RADIUS AAA Authentication Mode
selected. For up to 2 minutes a test pattern is displayed until
User Authentication
the server responds or times out.
Mode
• Remote then Local: Authentication using the centralized
RADIUS server is attempted. If the server sends a reject
message, then the setting of Allow Local Login after Reject
from AAA determines if the local user database is checked or
not. If the configured servers do not respond within 2
minutes, then the local user database is used. The successful
login method is displayed in the navigation column of the SM.
If a user authentication is rejected from the AAA server, the user
is allowed to login locally to the radio’s management interface.
It is applicable ONLY when the User Authentication Mode is
set to “Remote then Local”.
Allow Local Login
after Reject from AAA
Attribute Meaning
• disable – no accounting messages are sent to the RADIUS
server
Accounting Messages
The data accounting message data is based on the SM statistics that the AP maintains, and
these statistics may be cleared on the AP by an operator. If an operator clears these
messages and data accounting is enabled, an accounting stop message is sent followed by
an accounting start message to notify the AAA of the change.
If an operator clears the VC statistics on the device through the management GUI, a
RADIUS stop message and data start message is issued for each device affected. The start
and stop messages will only be sent once every 5 minutes, so if an operator clears these
statistics multiple times within 5 minutes, only one set of data stop/start messages is sent.
This may result in inaccurate data accumulation results.
The re-authentication interval is only configurable on the AP. When this feature is enabled,
each SM that enters the network will re-authenticate each the interval time has expired
without dropping the session. The response that the SM receives from the AAA server upon
re-authentication is one of the following:
• Success: The SM continues normal operation
• Reject: The SM de-registers and will attempt network entry again after 1 minute and
then if rejected will attempt re-entry every 15 minutes
• Timeout or other error: The SM remains in session and attempt 5 times to re-
authenticate with the RADIUS-REQUEST message. If these attempts fail, then the SM
will go out of session and proceed to re-authenticate after 5 minutes, then every 15
minutes.
Although re-authentication is an independent feature, it was designed to work alongside
with the RADIUS data usage accounting messages. If a user is over their data usage limit
the network operator can reject the user from staying in the network. Operators may
configure the RADIUS ‘Reply-Message’ attribute with an applicable message (i.e. “Data
Usage Limit Reached”) that is sent to the subscriber module and displayed on the general
page.
802.3 An IEEE standard that defines the contents of frames that are
transferred through Ethernet connections. Each of these frames
contains a preamble, the address to which the frame is sent, the
address that sends the frame, the length of the data to expect, the
data, and a checksum to validate that no contents were lost.
Access Point Two to six Access Point Modules that together distribute network
Cluster or Internet services to a community of subscribers. Each Access
Point Module covers a 60° or 90° sector. This cluster covers as
much as 360°. Also known as AP cluster.
Access Point Also known as AP. One module that distributes network or Internet
Module services in a 60° or 90° sector.
Aggregate The sum of the throughputs in the uplink and the downlink.
Throughput
APs MIB Management Information Base file that defines objects that are
specific to the Access Point Module. See also Management
Information Base.
ASN.1 Abstract Syntax Notation One language. The format of the text files
that compose the Management Information Base.
BER Bit Error Rate. The ratio of incorrect data received to correct data
received.
Bit Error Rate Ratio of incorrect data received to correct data received.
Bridge Network element that uses the physical address (not the logical
address) of another to pass data. The bridge passes the data to
either the destination address, if found in the simple routing table,
or to all network segments other than the one that transmitted the
data. Modules are Layer 2 bridges except that, where NAT is
enabled for an SM, the SM is a Layer 3 switch. Compare to Switch
and Router, and see also NAT.
Bridge Entry Value that the operator sets as the maximum interval for no activity
Timeout Field with another module, whose MAC address is the Bridge Entry. This
interval should be longer than the ARP (Address Resolution
Protocol) cache timeout of the router that feeds the network.
CarSenseLost This field displays how many carrier sense lost errors occurred on
Field the Ethernet controller.
Color Code Field Module parameter that identifies the other modules with which
communication is allowed. The range of valid values is 0 to 255.
Country Code A parameter that offers multiple fixed selections, each of which
automatically implements frequency band range restrictions for the
selected country. Units shipped to countries other than the United
States must be configured with the corresponding Region Code and
Country Code to comply with local regulatory requirements.
CRCError Field This field displays how many CRC errors occurred on the Ethernet
controller.
Data Encryption Over-the-air link option that uses secret 56-bit keys and 8 parity
Standard bits. Data Encryption Standard (DES) performs a series of bit
permutations, substitutions, and recombination operations on
blocks of data.
Desensed Received an undesired signal that was strong enough to make the
module insensitive to the desired signal.
Disable To turn off a feature in the module after both the feature activation
file has activated the module to use the feature and the operator
has enabled the feature in the module. See also Activate and
Enable.
Electronic Serial Hardware address that the factory assigns to the module for
Number identification in the Data Link layer interface of the Open Systems
Interconnection system. This address serves as an electronic serial
number. Same as MAC Address.
Enable To turn on a feature in the module after the feature activation file
has activated the module to use the feature. See also Activate.
ESN Electronic Serial Number. The hardware address that the factory
assigns to the module for identification in the Data Link layer
interface of the Open Systems Interconnection system. This
address serves as an electronic serial number. Same as MAC
Address.
EthBusErr Field This field displays how many Ethernet bus errors occurred on the
Ethernet controller.
Ethernet Any of several IEEE standards that define the contents of frames
Protocol that are transferred from one network element to another through
Ethernet connections.
Fade Margin The difference between strength of the received signal and the
strength that the receiver requires for maintaining a reliable link. A
higher fade margin is characteristic of a more reliable link.
Standard operating margin.
Field- Array of logic, relational data, and wiring data that is factory
programmable programmed and can be reprogrammed.
Gate Array
File Transfer Utility that transfers of files through TCP (Transport Control
Protocol Protocol) between computing devices that do not operate on the
same platform. Defined in RFC 959. See
http://www.faqs.org/rfcs/rfc959.html.
Frame Timing Toggle parameter that prevents or allows the module to continue to
Pulse Gated propagate GPS sync timing when the module no longer receives the
Field timing.
Fresnel Zone Space in which no object should exist that can attenuate, diffract,
or reflect a transmitted signal before the signal reaches the target
receiver.
FTP File Transfer Protocol, defined in RFC 959. Utility that transfers of
files through TCP (Transport Control Protocol) between computing
devices that do not operate on the same platform. See
http://www.faqs.org/rfcs/rfc959.html.
High-priority Channel that supports low-latency traffic (such as Voice over IP)
Channel over low-latency traffic (such as standard web traffic and file
downloads). To recognize the latency tolerance of traffic, this
channel reads the IPv4 Type of Service DiffServ Control Point
(DSCP) bits. Enabling the high-priority channel reduces the
maximum number of SMs that can be served in the sector.
indiscards count How many inbound packets were discarded without errors that
Field would have prevented their delivery to a higher-layer protocol.
(Some of these packets may have been discarded to increase buffer
space.)
inerrors count How many inbound packets contained errors that prevented their
Field delivery to a higher-layer protocol.
inoctets count How many octets were received on the interface, including those
Field that deliver framing information.
L2TP over IPSec Level 2 Tunneling Protocol over IP Security. One of several virtual
private network (VPN) implementation schemes. Regardless of
whether Subscriber Modules have the Network Address
Translation feature (NAT) enabled, they support VPNs that are
based on this protocol.
Late Collision This field displays how many late collisions occurred on the
Field Ethernet controller. A normal collision occurs during the first 512
bits of the frame transmission. A collision that occurs after the first
512 bits is considered a late collision. A late collision is a serious
network problem because the frame being transmitted is
discarded. A late collision is most commonly caused by a mismatch
between duplex configurations at the ends of a link segment.
Latency Acceptable tolerance for delay in the transfer of data to and from a
Tolerance module.
Line of Sight Wireless path (not simply visual path) direct from module to
module. The path that results provides both ideal aim and an ideal
Fresnel zone.
LNK/5 Furthest left LED in the module. In the operating mode, this LED is
continuously lit when the Ethernet link is present. In the aiming
mode for a Subscriber Module, this LED is part of a bar graph that
indicates the quality of the RF link.
LOS Line of sight. The wireless path (not simply visual path) direct from
module to module. The path that results provides both ideal aim
and an ideal Fresnel zone.
LUID Logical Unit ID. The final octet of the 4-octet IP address of the
module.
MAC Address Media Access Control address. The hardware address that the
factory assigns to the module for identification in the Data Link
layer interface of the Open Systems Interconnection system. This
address serves as an electronic serial number.
Media Access Hardware address that the factory assigns to the module for
Control Address identification in the Data Link layer interface of the Open Systems
Interconnection system. This address serves as an electronic serial
number.
NEC National Electrical Code. The set of national wiring standards that
are enforced in the U.S.A.
Network Address Scheme that defines the Access Point Module as a proxy server to
Translation isolate registered Subscriber Modules from the Internet. Defined in
RFC 1631. See http://www.faqs.org/rfcs/rfc1631.html.
outdiscards How many outbound packets were discarded without errors that
count Field would have prevented their transmission. (Some of these packets
may have been discarded to increase buffer space.)
outerrrors count How many outbound packets contained errors that prevented their
Field transmission.
outnucastpkts How many packets for which the higher-level protocols requested
count Field transmission to a non-unicast (subnetwork-broadcast or
subnetwork-multicast) address. The number includes those that
were discarded or not sent.
outoctets count How many octets were transmitted out of the interface, including
Field those that deliver framing information.
outucastpkts How many packets for which the higher-level protocols requested
count Field transmission to a subnetwork-unicast address. The number
includes those that were discarded or not sent.
Override Plug Device that enables the operator to regain control of a module that
has been locked by the No Remote Access feature, the 802.3 Link
Disable feature, or a password or IP address that cannot be
recalled. This device can be either fabricated on site or ordered.
Point-to- Defined in RFC 2178, which specifies that data that originates from
Multipoint a central network element can be received by all other network
Protocol elements, but data that originates from a non-central network
element can be received by only the central network element. See
http://www.faqs.org/rfcs/rfc2178.html. Also referenced as PMP.
Protective Earth Connection to earth (which has a charge of 0 volts). Also known as
ground.
Proxy Server Network computer that isolates another from the Internet. The
proxy server communicates for the other computer, and sends
replies to only the appropriate computer, which has an IP address
that is not unique or not registered.
Quick Start Interface page that requires minimal configuration for initial
module operation.
Region Code A parameter that offers multiple fixed selections, each of which
automatically implements frequency band range restrictions for
the selected region. Units shipped to regions other than the United
States must be configured with the corresponding Region Code to
comply with local regulatory requirements.
RetransLimitExp This field displays how many times the retransmit limit has expired.
Field
RJ-11 Standard cable that is typically used for telephone line or modem
connection.
RJ-45 Standard cable that is typically used for Ethernet connection. This
cable may be wired as straight-through or as crossover. Later
modules auto-sense whether the cable is straight-through or
crossover.
Router Network element that uses the logical (IP) address of another to
pass data to only the intended recipient. Compare to Switch and
Bridge.
RxBabErr Field This field displays how many receiver babble errors occurred.
RxOverrun Field This field displays how many receiver overrun errors occurred on
the Ethernet controller.
SM MIB Management Information Base file that defines objects that are
specific to the Subscriber Module. See also Management
Information Base.
SNMP Trap Capture of information that informs the network monitor through
Simple Network Management Protocol of a monitored occurrence
in the module.
Static IP Address Assignment of Internet Protocol address that can be changed only
Assignment manually. Thus static IP address assignment requires more
configuration time and consumes more of the available IP
addresses than DHCP address assignment does. RFC 2050 provides
guidelines for the static allocation of IP addresses. See
http://www.faqs.org/rfcs/rfc2050.html. See also DHCP.
Subnet Mask 32-bit binary number that filters an IP address to reveal what part
identifies the network and what part identifies the host. The
number of subnet mask bits that are set to 1 indicates how many
leading bits of the IP address identify the network. The number of
subnet mask bits that are set 0 indicate how many trailing bits of
the IP address identify the host.
Switch Network element that uses the port that is associated with the
physical address of another to pass data to only the intended
recipient. Compare to Bridge and Router.
Appendix B : FCC and IC approved antennas
Table 65 FCC and IC approved antennas list
Frequency band
Gain
Description 4.9 5.8
(dBi)
GHz GHz
Directional antennas
PMP450i/PTP450i Integrated
23
Directional (5092HH)
PMP450i/PTP450i Integrated Small
17
Form Factor Directional (5096HH)
MARS 2 ft flat plate
28.5
MA-WA56-DP-28N 28
ANATEL INFORMATION
Este produto está homologado pela ANATEL, de acordo com os procedimentos regulamentados pela Resolução 242/2000, e
atende os requisitos técnicos aplicados, incluindo os limites de exposição da taxa de absorção especifica referente a campos
elétricos, magnéticos e eletromagnéticos de radiofrequência, de acordo com a Resolução numero 303/2002.
Este equipamentos opera em caráter secundário, isto é , não tem direito à proteção contra interferência prejudicial, mesmo
de estações do mesmo tipo, e não pode causar interferência a sistemas operando em caráter primário.