User's Manual

Table Of Contents
1–5
PacketMax 100/300 User Manual, 10007306, Rev J
Chapter 1. Overview Of Subscriber Station
1.4.3 MIB
Each PacketMax 100/300 includes a SNMP agent supporting the following MIBs:
MIB II (RFC 1213)
Aperto private MIB
Wimax-IF-MIB (objects for 802.16 based SS and BS)
The complete MIBs are provided on the PacketMax CD-ROM.
SNMP can be used to read configuration, status, and performance data from Sub-
scriber Units. In addition, SNMP can be used to change some configuration parame-
ters (those which can be changed via the Configuration Manager in EMS), and to
upload the configuration changes to the TFTP server (if the TFTP server is configured
to accept uploads).
The SNMP agents support trap reporting. Trap-reporting parameters can be specified
via the Configuration Manager as well as via SNMP.
1.4.4 Event Reporting
PacketMax 100/300 Series Subscriber Units offer several means of reporting sub-
scriber equipment events:
E-mail messages — The Subscriber Unit can be configured (via the Element
Management System, or SNMP) to report events via e-mail to specified
addresses.
SNMP traps — The Indoor Unit’s SNMP agent supports trap reporting. Trap-
reporting parameters can be specified via the EMS ((WaveCenter Configuration
Manager), or SNMP.
Syslog — The Indoor Unit supports logging of event messages to a designated
server according to the Syslog protocol. If Syslog is employed, the Syslog
server must be identified in the Subscriber Unit configuration file created using
the WaveCenter Configuration Manager.
NOTE: Use of Syslog is strongly recommended as a means of providing a
record of system events for performance management and troubleshooting.
Event log — A historical event log can be displayed on request via the Faults
section in EMS.
1.4.5 3 DES Encryption
Security is a required feature in the current network, to ensure that the Base Station
and Subscriber Station communicate with each other.
An encryption scheme is used
to
secure the BS and SS communication channel by encrypting the data between the
two.
The Encryption procedure is as follows:
1. At first, the SS initiates the authorization process and sends message to the
BS indicating that it is capable of encryption.