User's Guide Part 1
Contents
phn-0896_009v003
vi
UNDER DEVELOPMENT
Feb 2010
Adaptive modulation .........................................................................................................1-22
MIMO ................................................................................................................................ 1-23
Intelligent dynamic frequency selection ........................................................................... 1-24
Radar avoidance................................................................................................................1-24
Time division duplex synchronization............................................................................... 1-25
Network timing reference................................................................................................. 1-26
Configuring the TDD frame ..............................................................................................1-26
Performance considerations when enabling TDD synchronization ..................................1-27
UltraSync ..........................................................................................................................1-27
PTP-SYNC .........................................................................................................................1-27
Security............................................................................................................................. 1-32
Ethernet bridging....................................................................................................................1-33
Ethernet frames ................................................................................................................1-33
Management function ....................................................................................................... 1-34
Networking information.................................................................................................... 1-35
Telecoms circuits ....................................................................................................................1-36
Lowest telecoms modulation mode................................................................................... 1-36
Fixed frequency operation ................................................................................................ 1-36
Further reading................................................................................................................. 1-37
System management ..............................................................................................................1-38
Management agent ...........................................................................................................1-38
Web interface.................................................................................................................... 1-38
SNMP ................................................................................................................................1-40
SNMPv3 security ..............................................................................................................1-42
Email alerts .......................................................................................................................1-47
AES license ....................................................................................................................... 1-48
Critical security parameters ............................................................................................. 1-49
Capacity upgrades ............................................................................................................1-49
Software upgrade..............................................................................................................1-50
Recovery mode.................................................................................................................. 1-50
FIPS 140-2 ..............................................................................................................................1-52
Validated software image .................................................................................................1-52
Hardware security ............................................................................................................1-53
FIPS 140-2 mode indication.............................................................................................. 1-53