User's Manual
Table Of Contents
- System Manual Book 1: System Description
- Introduction
- System Components
- Specifications
- System Specifications
- Radio and Modem
- Data Communication
- Voice/Fax (Subscriber Units with voice support)
- Telephony (Subscriber Units with voice support)
- IF Indoor – Outdoor Communication (SU-A/E, AU-E-NI, AU-E-BS)
- Configuration and Management
- GU-RA GPS Radio
- GU-RA to BS-GU Communication
- Environmental
- Standards Compliance, General
- Physical Specifications
- System Specifications
- System Manual Book 2: Installation
- IF-Based Equipment
- Packing Lists
- Guidelines for Selection of Equipment Locations
- Installing the Outdoor Unit
- Installing the SU-NI and AU-NI Indoor Unit
- Installing Modular Base Station Equipment
- Installing the GU-A-BS GPS and Alarms System
- IF-Based Equipment
- System Manual Book 3: Commissioning
- System Manual Book 4: Operations and Administration
- Accessing the Monitor Program
- Menus and Parameters
- Main Menu
- Info Screens Menu
- Unit Control Menu
- Basic Configuration Menu
- Site Survey Menu
- Advanced Configuration Menu
- IP Parameters (AU, SU and GU)
- Air Interface Parameters (AU and SU)
- Network Management Parameters (AU, SU and GU)
- Bridge Parameters (AU, SU and GU)
- Performance Parameters (AU and SU)
- Service Parameters (AU and SU)
- Security Parameters (AU and SU)
- Voice Parameters (Subscriber Units with Voice Support Only)
- Dialing Parameters (Subscriber Units with Voice Support Only)
- Telephony Signals (Subscriber Units with Voice Support Only)
- Hopping Parameters (GU)
- Alarm Parameters (GU)
- Configuration Download/Upload
- System Manual: Appendices
2-62
BreezeACCESS 4.0 Operations and Administration
Manual Revision: 1.01
the Run-Time MIR/CIR Option, which is the actual status of
the option (may be different from the MIR/CIR Option
selected in the SU because it is controlled by the AU).
! Show Service Parameters – Displays the current values of the
Service Parameters.
Security Parameters (AU and SU)
Unauthorized wireless connection is prevented by using the Wired
Equivalent Privacy (WEP) algorithm defined in the IEEE 802.11 Wireless
LAN standard. The WEP is based on RSA’s RC4 encryption algorithm.
The following parameters are available in the Security Parameters menu:
! Authentication Algorithm – Determines the operation mode of the
unit. The available options are:
" Open System: An SU configured to Open System can be
authenticated only by an AU that is also configured to Open
System. The WEP algorithm is not used.
" Shared Key: Authentication enabled. The authentication
messages are encrypted. An SU configured to use Shared
Key can be authenticated only by an AU configured to use
Shared Key, provided they both use the same WEP Key.
If the required algorithem is Shared Key, do the following:
• Define at least one of the four WEP Keys by selecting one
of them from the Security Parameters menu and entering
the required key.
• Select Default Key ID from the Security Parameters
menu and enter the number of a defined WEP key.
• Select Authentication Algorithm from the Security
Parameters menu.
The Authentication Algorithm menu opens.
• Select Shared Key.
The default is Open System.
! Default Key ID – Defines the ID of the key to be used for encryption
of transmitted authentication messages and decryption of received
authentication messages.
Valid values are from 1 to 4.
The default is WEP KEY # 1.
! WEP KEY # 1 through WEP KEY # 4 – Enters the encryption key to
be used for initialization of the pseudo-random number generator
used in the RC4 encryption process. At least one WEP Key must be
NOTE:
The Shared Key option cannot be selected until at least one WEP Key
and the appropriate Default Key ID are configured.