Installation Guide
Table Of Contents
- PMP 450i and PTP 450i Configuration and User Guide
- Safety and regulatory information
- Contents
- List of Figures
- List of Tables
- About This Configuration and User Guide
- Chapter 1: Reference information
- Chapter 2: Configuration
- Preparing for configuration
- Task 1: Connecting to the unit
- Task 2: Configuring IP and Ethernet interfaces
- Configuring the AP IP interface
- NAT, DHCP Server, DHCP Client and DMZ in SM
- Configuring the SM IP interface with NAT disabled
- Configuring the SM IP interface with NAT enabled
- NAT tab of the SM with NAT disabled
- NAT tab of the SM with NAT enabled
- Reconnecting to the management PC
- VLAN Remarking and Priority bits configuration
- VLAN tab of the AP
- VLAN tab of the SM
- VLAN Membership tab of the SM
- PPPoE tab of the SM
- NAT Port Mapping tab of the SM
- Task 3: Upgrading the software version and using CNUT
- Task 4: Configuring General and Unit settings
- Task 5: Configuring security
- Isolating APs from the internet
- Encrypting radio transmissions
- Managing module access by passwords
- Requiring SM Authentication
- Filtering protocols and ports
- Encrypting downlink broadcasts
- Isolating SMs
- Filtering management through Ethernet
- Allowing management only from specified IP addresses
- Configuring management IP by DHCP
- Restricting radio Telnet access over the RF interface
- Security tab of the AP
- Filtering protocols and ports
- Protocol Filtering tab of the AP
- Port configuration tab of the AP
- Security tab of the SM
- Protocol Filtering tab of the SM
- Port Configuration tab of the SM
- Task 6: Configuring radio parameters
- Task 7: Setting up SNMP agent
- Task 8: Configuring syslog
- Task 9: Configuring remote access
- Task 10: Monitoring the AP-SM Link
- Task 11: Configuring quality of service
- Maximum Information Rate (MIR) Parameters
- Token Bucket Algorithm
- MIR Data Entry Checking
- Committed Information Rate (CIR)
- Bandwidth from the SM Perspective
- Interaction of Burst Allocation and Sustained Data Rate Settings
- High-priority Bandwidth
- Traffic Scheduling
- Setting the Configuration Source
- Quality of Service (QoS) tab of the AP
- DiffServ tab of the AP
- Quality of Service (QoS) tab of the SM
- DiffServ tab of the SM
- Task 12: Performing an Sector Wide SA
- Task 13: Zero Touch Configuration Using DHCP Option 66
- Task 14: Configuring Radio via config file
- Task 15: Configuring a RADIUS server
- Understanding RADIUS for PMP 450i
- Choosing Authentication Mode and Configuring for Authentication Servers - AP
- SM Authentication Mode – Require RADIUS or Follow AP
- Handling Certificates
- Configuring your RADIUS servers for SM authentication
- Assigning SM management IP addressing via RADIUS
- Configuring your RADIUS server for SM configuration
- Using RADIUS for centralized AP and SM user name and password management
- RADIUS Device Data Accounting
- RADIUS Device Re-authentication
PMP 450i and PTP 450i Configuration and User
Task 7: Setting up SNMP agent
Continue…
You may set the SNMP tab parameters as follows.
Table 42 AP SNMP attributes
Attribute Meaning
SNMP Community String
1
Specify a control string that can allow a Network Management
Station (NMS) to access SNMP information. No spaces are
allowed in this string. The default string is Canopy.
SNMP Community String
1 Permissions
You can designate the SNMP Community String 1 to be the
password for WM, for example, to have Read / Write access to
the module via SNMP or for all SNMP access to the module to
be Read Only.
SNMP Community String
2 (Read Only)
Specify an additional control string that can allow a Network
Management Station (NMS) to read SNMP information. No
spaces are allowed in this string. The default string is
Canopyro. This password will never authenticate a user or an
NMS to read/write access.
The Community String value is clear text and is readable by a
packet monitor. Additional security derives from the
configuration of the Accessing Subnet, Trap Address, and
Permission parameters.
Engine ID The Engine ID may be between 5 and 32 hex characters. The
hex character input is driven by RFC 3411 recommendations on
the Engine ID. The default Engine ID is the MAC address of the
device
SNMPv3 Security Level Specify security model where users are defined and
authenticated before granting access to any SNMP service.
Each device can configure the security level of SNMPv3 to No
authentication/No privacy, Authentication/No privacy, or
Authentication/Privacy.
136
pmp-0957 (April 2015)