User's Manual Part 1

Table Of Contents
Contents
Key features ................................................................................................................................. 1-2
Frequency bands ......................................................................................................................... 1-3
Typical bridge deployment ........................................................................................................ 1-4
Hardware overview ..................................................................................................................... 1-5
Wireless operation ............................................................................................................................. 1-6
Time division duplexing ............................................................................................................. 1-6
Link mode optimization .............................................................................................................. 1-8
Link symmetry ............................................................................................................................. 1-8
OFDM and channel bandwidth .................................................................................................. 1-9
Spectrum management .............................................................................................................. 1-9
Adaptive modulation ................................................................................................................ 1-10
MIMO .......................................................................................................................................... 1-11
Dynamic spectrum optimization .............................................................................................. 1-12
Radar avoidance ........................................................................................................................ 1-12
Encryption .................................................................................................................................. 1-13
License keys and regulatory bands ......................................................................................... 1-13
PTP networks ............................................................................................................................. 1-14
Ethernet bridging ............................................................................................................................. 1-15
Ethernet ports ............................................................................................................................ 1-15
Customer data network ............................................................................................................ 1-16
Network management .............................................................................................................. 1-18
Ethernet loopback mode........................................................................................................... 1-21
Protocol model .......................................................................................................................... 1-21
System management ....................................................................................................................... 1-23
Management agent ................................................................................................................... 1-23
IPv6 ............................................................................................................................................. 1-24
Web server ................................................................................................................................. 1-25
RADIUS authentication ............................................................................................................. 1-27
SNMP.......................................................................................................................................... 1-28
Simple Network Time Protocol (SNTP) ................................................................................... 1-28
SNMPv3 security ....................................................................................................................... 1-29
System logging (syslog) ........................................................................................................... 1-32
AES license ................................................................................................................................ 1-32
Critical security parameters ..................................................................................................... 1-33
Login information ...................................................................................................................... 1-33
Capability upgrades .................................................................................................................. 1-33
Page
ii