Tsunami® 8000 Series (Point-to-point and Point-to-multipoint Products) Software Management Guide Products Covered --> Tsunami™ Multipoint - MP-8100-BSU - MP-8200-BSU; MP-8250-BS9; MP-8250-BS1 - MP-8100-SUA - MP-8150-SUR - MP-8150-SUR-100 - MP-8150-CPE - MP-8200-SUA - MP-8250-SUR - MP-8160-BSU and MP-8160-BS9 - MP-8160-SUA - MP-8160-CPE --> Tsunami QuickBridge® - QB-8100-EPA / LNK - QB-8150-EPR / LNK - QB-8150-LNK-100 - QB-8150-LNK-12/50 - QB-8200-EPA / LNK - QB-8250-EPR / LNK
Copyright © 2013 Proxim Wireless Corporation, Milpitas, CA. All rights reserved. Covered by one or more of the following U.S. patents: 5,231,634; 5,875,179; 6,006,090; 5,809,060; 6,075,812; 5,077,753. The content described herein are copyrighted with all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means without the written permission of Proxim Wireless Corporation.
Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 About Tsunami® 8000 Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Wireless Network Topology . . . . . . . . . . . . . . .
Basic Ethernet Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Advanced Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Wireless . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Link Profiles . . .
TFTP Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Text Based Configuration (TBC) File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Upgrade Firmware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Upgrade Configuration . . . . . . .
Router Port List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236 DHCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237 Event Log . . .
F Bootloader CLI and ScanTool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292 G SNR Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 H Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 I Lightning Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preface Preface This chapter contains information on the following: • • • • • • About this Guide Products Covered Audience Prerequisites Related Documents Documentation Conventions About this Guide This guide gives a jump-start working knowledge of the Tsunami® 8000 products. It explains the step-by-step procedure to configure, manage and monitor the device by using Web Interface.
Preface Product(s) Supported Countries Supported Software Version QB-8200-EPA / LNK US, WD, EU, JP 2.6.0 QB-8250-EPR / LNK US, WD, EU, JP 2.6.0 Audience The intended audience for this guide is the network administrators who install and/or manage the device. Prerequisites The reader of this document should have working knowledge of Wireless Networks, Local Area Networking (LAN) concepts, Network Access Infrastructures and Client-Server Applications.
Preface Device Naming Conventions Naming Convention Description BSU Refers to a Base Station Unit Subscriber / SU Mode / SU Refers to both SU and CPE End Point A mode Refers to a device in End Point A mode End Point B mode Refers to a device in End Point B mode MP 8000 BSU/SU in Legacy Mode Refers to MP 8000 BSU and SU devices that can interoperate with the legacy products of the Tsunami™ MP.11 family.
1 Overview This chapter contains information on the following: • • • • About Tsunami® 8000 Products Wireless Network Topology – Point-to-Multipoint (PTMP) – Point-to-Point Link Multiple-Input-Multiple-Output (MIMO) Wireless Outdoor Router Protocol (WORP) 1.1 About Tsunami® 8000 Products Proxim’s Tsunami® 8000 product series, consists of point-to-point and point-to-multipoint devices that are designed to provide wireless networking solutions to enterprises and business markets.
Overview MP-8250-BS9 The MP-8250 Base Station unit comes with a high power 2x2 MIMO radio and 16 dBi integrated 90° sector antenna that operates in 4.900 – 5.925 GHz frequency band. MP-8250-BS1 The MP-8250 Base Station unit comes with a high power 2x2 MIMO radio and 23 dBi integrated 10° panel antenna that operates in 4.900 – 5.925 GHz frequency band. MP-8200-SUA The MP-8200 Subscriber unit, is a flexible wireless outdoor product that operates in 4.900 to 5.925 GHz frequency band.
Overview QB-8150-LNK A pair of QB-8150-EPR devices form a link. QB-8150-LNK-100 A pair of QB-8150-EPR-100 devices form a link. The QB-8150-EPR-100 device comes with a 2x2 MIMO radio, 21 dBi integrated dual-polarized panel antenna that operates in 4.900 – 5.875 GHz frequency band. It provides a throughput of up to 50 Mbps (Uplink) and 50 Mbps (Downlink). QB-8150-LNK-12 A pair of QB-8150-EPR-12 devices form a link.
Overview 1.2 Wireless Network Topology 1.2.1 Point-to-Multipoint (PTMP) Point-to-multipoint is a wireless network that has a central communication device such as a Base Station Unit (BSU), providing connectivity to multiple devices such as Subscribers (SUs) or clients. Any transmission of data that originates from the BSU is received by all SUs; whereas, the data originating from any of the SU is received only by the BSU.
Overview • Security and Surveillance: High definition IP-surveillance cameras for monitoring city streets, airports, bridges, seaports, transportation hubs, offices and warehouses. • Metropolitan Area Network: Secure and reliable connectivity between city buildings.
Overview • Enterprise Campus Connectivity: Extend the main network to remote offices, warehouses or other buildings without leased lines. • Wireless Intelligent Transport System (ITS): Increases the traffic efficiency and reduces the commuting time in cities and metropolitan areas.
Overview • Roaming: A mobile device (SU) provides seamless network services. • Offshore Communications: Establishes connectivity between seashore and the ships that are nearing the port locations, or connectivity between off-shore oil rigs and sea shore and so on.
Overview 1.2.2 Point-to-Point Link A point-to-point link is a dedicated wireless link that connects only two stations. With a point-to-point link, you can set up a connection between two locations as an alternative to: • • Leased lines in building-to-building connections Wired Ethernet backbones between wireless access points in difficult-to-wire environments. It is easy to set up a wireless point-to-point link as shown in the following figure.
Overview • Backhaul to a Central POP: Avoids expensive installation and recurring charge of a second wireline backhaul to a remote virtual POP. • Repeater: Extends distance or overcomes path blockage by adding point-to-point hops.
Overview • High-bandwidth Last Mile Access: Delivers Transparent LAN Services (TLS) to corporate parks. • High Availability and Link Aggregation: Achieves high availability and link aggregation in wireless medium by using two parallel links and additional Link Aggregation Control Protocol (LACP) capable switches. This is applicable only to QB-8100-EPA/LNK, QB-8150-EPR/LNK, QB-8150-LNK-100 and QB-8200-LNK devices.
Overview 1.4 Wireless Outdoor Router Protocol (WORP) WORP is a protocol, designed by Proxim to optimize the performance of outdoor wireless Point-to-Point (PtP) and Point-to-Multipoint (PtMP) links using packet radio technology, including the use of cutting edge Multiple-Input-Multiple-Output (MIMO) technology. WORP overcomes the performance degradation, which standards-based wireless technologies are susceptible to when used for outdoor long-range connectivity.
Management and Monitoring Capabilities 2 A Network administrator can use the following interfaces to configure, manage and monitor the device. • • • Web Interface Command Line Interface Simple Network Management Protocol (SNMP) 2.1 Web (HTTP/HTTPS) Interface The Web interface (HTTP) provides easy access to configuration settings and network statistics from any computer on the network.
Management and Monitoring Capabilities If using RS-232 cable, verify the following information in the HyperTerminal serial port setup: Port COM1 (default) Baud Rate 115200 Data 8-bit Parity None Stop 1-bit Flow Content None : When using Windows 7, use a Terminal Emulator program like Teraterm Pro for serial connection. 2.2.2 Telnet The device can be accessed through CLI by using Telnet.
Management and Monitoring Capabilities of the settings and statistics that are available with other management interfaces. The MIB can be opened with any text editor, such as Microsoft Word, Notepad, or WordPad. 2.4 ProximVision NMS ProximVision NMS is the state-of-the-art network management system to administer Proxim’s devices on the network.
Device Initialization 3 This chapter contains information on the following: • • • Initialization — ScanTool — Initialize Device by using ScanTool — Modifying the IP Address of the Device by using ScanTool Logging onto the Web Interface — Home Page — COMMIT — REBOOT Factory Default Configuration 3.1 Initialization Once the device installation completes, access the device either through Web Interface, Command Line Interface, or an SNMP Interface.
Device Initialization : • ScanTool works only for Proxim devices. • ScanTool scans devices based on IP v4 address only. • Disable Windows Firewall (or add an exception) for ScanTool to function or to detect the radio. 3.1.2 Initialize Device by using ScanTool To scan and locate the devices on a network by using ScanTool, do the following: 1. Power on, or reset the device. 2. To download Proxim’s ScanTool, log on to Proxim’s support site at http://support.proxim.
Device Initialization : If the device does not appear in the Scan List, click Rescan in the Scan List screen. If the device still does not appear in the list, see Troubleshooting. Note that after rebooting the device, it may take up to five minutes for the device to appear in the Scan List. 3.1.3 Modifying the IP Address of the Device by using ScanTool To modify the IP address of a device by using ScanTool, select the device from the scan list and click Change.
Device Initialization Figure 3-3 Login Screen Based on the access credentials, two types of users can access the device. They are, 1. Administrator User: The Administrator user administers the entire device. This user type has the write access to all the features of the device and also has the privilege to change his or her own password and that of the Monitor user (the other user type). To change the password, refer to Services. 2.
Device Initialization • In the Internet Explorer, to get best results, click on Tools > Internet Options > General. Click Settings in the Browsing History and select “Every visit to the webpage”. 3.2.1 Home Page Upon successful logon, the device home page appears. Figure 3-4 Home Page The home page contains the following information: • • • • • • • • • Device Description: The device description is displayed on the top-right corner of the home page.
Device Initialization 3.2.2 COMMIT COMMIT operation is used to apply the configuration changes onto the device. When changes are made to the configuration parameters of the device, the changes will not take effect, until COMMIT is clicked. Some parameters may require system reboot for the changes to take effect. On clicking COMMIT, the system evaluates all the configuration dependencies and displays the configuration status.
Device Initialization 3.2.3 REBOOT Reboot operation is required for any change in the key parameters to take effect. For example, settings such as configuring the Radio Mode, IP Address, Network Mode and so on, require device reboot for the changes to take effect. It is recommended that the device must be rebooted immediately after modifying a rebootable parameter. On clicking Reboot, system displays a confirmation window, as shown below.
Device Initialization Parameter BSU Mode/ End Point A SU Mode/ End Point B Maximum Number of SUs (per BSU) MP-8100-BSU (rev 1 to rev 6) --> 100 MP-8100-BSU (rev 7 and above) --> 250 MP-8160-BSU --> 250 MP-8160-BS9 --> 250 MP-8200-BSU --> 250 MP-8250-BS9 --> 250 MP-8250-BS1 --> 250 Not Applicable Registration Timeout 10 Seconds 10 Seconds Link Profiles Default Link Profile Default Link Profile DDRS Enabled Enabled Input Bandwidth Limit As per license As per license Output Band Limit As pe
Device Initialization Parameter BSU Mode/ End Point A SU Mode/ End Point B RIP Disabled Disabled NAT Disabled Disabled PPPoE Client Not Applicable Disabled in SU Mode Not Applicable in End Point B HTTP Management Interface Enabled Enabled Telnet Management Interface Enabled Enabled SNMP Management Interface Enabled with SNMPv1-v2c Enabled with SNMPv1-v2c Simple Network Time Protocol (SNTP) Disabled Disabled Management Access Control Disabled Disabled Event Log Priority Notice N
Basic Configuration 4 The BASIC CONFIGURATION tab provides a one-place access to a minimum set of configuration parameters to quickly set up a Point-to-point or Point-to-multipoint network. To configure basic parameters of the device, click BASIC CONFIGURATION tab.
Basic Configuration Figure 4-2 Basic Configuration (SU) Tsunami ® 8000 Series - Software Management Guide 35
Basic Configuration Figure 4-3 Basic Configuration (End Point A) Tsunami ® 8000 Series - Software Management Guide 36
Basic Configuration Figure 4-4 Basic Configuration (End Point B) Below is the table which explains basic parameters and the method to configure the configurable parameter(s): : Recommended characters for the name field are A-Z a-z 0-9 - _ =: . @ $ & and space. Parameter System Name Description By default, the device name is System-Name. Change the default device name to the desired one, with name ranging from 0 to 64 characters.
Basic Configuration Parameter Frequency Domain Description This parameter specifies the country of operation, permitted frequency bands and regulatory rules for a particular country or domain. When the frequency domain is selected, the Dynamic Frequency Selection (DFS) and Automatic Transmit Power Control (ATPC) features are enabled automatically if the selected country and band has a regulatory domain that requires it.
Basic Configuration Parameter Auto Channel Selection (ACS) Description Enables a device to select the best channel for data transmission on the wireless medium, with less interference. By default, ACS is disabled on a BSU/End Point A and enabled on an SU/End Point B device. When ACS is enabled on a BSU/End Point A, it scans all the channels and selects the best channel during the start up.
Basic Configuration Parameter Legacy Mode Description By default, this parameter is disabled. When enabled, the MP 8000 BSU and SU devices can interoperate with the legacy products of the Tsunami® MP.11 family.
Advanced Configuration 5 The ADVANCED CONFIGURATION tab provides a means to configure the following advanced features of the device: • • • • • • • • • • • • System Network Ethernet Wireless Security Quality of Service (QoS) RADIUS Based SU QoS Configuration VLAN (Bridge Mode Only) RADIUS Based SU VLAN Configuration Filtering (Bridge Only) DHCP IGMP Snooping : Recommended characters for the name field are A-Z a-z 0-9 - _ = : . @ $ & and space. 5.
Advanced Configuration Given below is the table which explains System parameters and the method to configure the configurable parameter(s): Parameter Radio Mode Description Represents the radio mode of the device. Based on the SKU, the radio mode is set to either BSU, SU, End Point A or End Point B. In a BSU device, the radio mode can be changed from BSU to SU and vice versa. Also, in an End Point A device, the radio mode can be changed from End Point A to End Point B and vice versa.
Advanced Configuration Parameter Maximum MTU (Maximum Transmission Unit) Description Given below are the devices and their corresponding MTU configurable range: Devices MTU Configurable Range MP-8150-CPE; MP-8160-CPE QB-8150-LNK-12/50 1500 to 2048 bytes MP-8100-BSU; MP-8100-SUA MP-8150-SUR; MP-8150-SUR-100 MP-8160-BSU; MP-8160-SUA; MP-8160-BS9 QB-8100-EPA/LNK; QB-8150-EPR/LNK QB-8150-LNK-100; MP-8200-BSU/SUA MP-8250-BS9/BS1; MP-8250-SUR QB-8200-EPA/LNK; QB-8250-EPR/LNK 1500 to 1514 bytes Maximum Fra
Advanced Configuration 5.2 Network The Network tab allows to view and configure the network specific information of the device. To view the current operating network mode of the device, navigate to ADVANCED CONFIGURATION > Network. If the network mode of the device is configured in Bridge mode, then following screen appears: Figure 5-2 Bridge Mode If the network mode of the device is configured in Routing mode, then the following screen appears: Figure 5-3 Routing Mode 5.2.
Advanced Configuration Figure 5-4 IPv4 Configuration (Bridge Mode) Given below is the table which explains the method to configure IP parameters in Bridge mode: Parameter IP Mode Description Represents the IP Mode of the device. The IP Mode can be set to either IPv4 Only or Dual (IPv4 and IPv6). By default, IP Mode is set to IPv4 Only. : A change in IP mode requires device reboot. Ethernet (Please note that the number of Ethernet interfaces depend on your device.
Advanced Configuration Parameter Subnet Mask Description Represents the subnet mask of the Ethernet interface. When the address type is set to Static (default address type), the subnet mask can be manually configured. By default, the subnet mask is set to 255.255.255.0. When the address type is set to Dynamic, this parameter is read-only and displays the device current subnet mask obtained from the DHCP server. The subnet mask will fall back to 255.255.255.
Advanced Configuration Given below is the table which explains the method to configure IP parameters in Bridge mode: Parameter IP Mode Description Represents the IP Mode of the device. The IP Mode can be set to either IPv4 Only or Dual (IPv4 and IPv6). By default, the IP Mode is set to IPv4 Only. : A change in IP mode requires device reboot. Ethernet (Please note that the number of Ethernet interfaces depend on your device.
Advanced Configuration Parameter Description Default Gateway IP Address IP Address Represents the gateway IP address of the device. When the address type is set to Auto (default address type), this parameter is read-only and displays the device IP address obtained from the router advertisement. When the address type is set to Static, the gateway IP address should be manually configured (prefix is not required).
Advanced Configuration Parameter Primary and Secondary IP Address Description Represents the IP address of the Primary and Secondary DNS Server. Primary and Secondary IP Address can be configured manually irrespective of the IP mode. The DNS address obtained from the DHCP server (Dynamic mode) or from the router advertisement (Auto Mode) is given preference over the manually configured IP Addresses.
Advanced Configuration Figure 5-7 IP Configuration (Routing Mode) Given below is the table which explains the method to configure IP parameters in Routing mode: Parameter Description Ethernet (Please note that the number of Ethernet interfaces depend on your device.) IP Address Represents the IP address of the Ethernet interface. By default, the static IP address for Ethernet1 is set to 169.254.128.132 and for Ethernet2 it is set to 169.254.129.132. You can manually change the IP address.
Advanced Configuration Parameter Subnet Mask Description Represents the subnet mask of the wireless interface. By default, the static subnet mask is set to 255.255.255.0. You can manually change the subnet mask. Default Gateway IP Address IP Address Represents the gateway IP address of the device. By default, the Gateway IP address is set to 169.254.128.132. You can manually change the gateway IP address. DNS Proxy DNS Proxy It is a read-only parameter, which is enabled by default.
Advanced Configuration Parameter Description Primary IP Address Represents the IP Address of the Primary DNS Server. Secondary IP Address Represents the IP Address of the Secondary DNS Server. : In routing mode, the Primary and Secondary IP Address cannot be configured as IPv6 addresses. After configuring the required parameters, click OK, COMMIT and then REBOOT.
Advanced Configuration Figure 5-9 IP Configuration (Routing Mode with PPPoE Client Enabled) Given below is the table which explains the method to configure IP parameters in Routing mode with PPPoE client enabled: Parameter Description Ethernet (Please note that the number of Ethernet interfaces depend on your device.) IP Address Represents the IP address of the Ethernet interface. By default, the static IP address for Ethernet1 is set to 169.254.128.132 and 169.254.129.132 for Ethernet2.
Advanced Configuration Parameter Description Wireless (PPPoE) Address Type This parameter specifies whether the wireless interface parameters are to be configured through PPPoE server or to be assigned statically. By default, the address type is set to PPPoE-ipcp meaning which the PPPoE client obtains the IP parameters from a network PPPoE server automatically during the bootup. To manually configure the PPPoE Client’s IP settings, select Static.
Advanced Configuration Parameter Description Default Gateway IP Address IP Address Represents the gateway IP address of the device. When the address type is set to PPPoE-ipcp, this parameter is read-only and displays the PPPoE client’s gateway IP address (which is nothing but the IP address of the PPPoE server). If it cannot obtain the IP address from a PPPoE server, then there will be no gateway for the device. When the address type is set to Static, the gateway IP address by default is set to 169.254.
Advanced Configuration Parameter Primary and Secondary IP Address Description Represents the IP address of the Primary and Secondary DNS Server. Primary and Secondary IP address can be configured manually. The DNS address obtained from the PPPoE-ipcp is given preference over manually configured IP addresses. After configuring the required parameters, click OK, COMMIT and then REBOOT. 5.2.2 Static Route Table : Applicable only in routing mode.
Advanced Configuration 5.2.2.1 Adding Static Route Entries Click Add in the Static Route Table screen.The following Static Route Table Add Row screen appears: Figure 5-12 Static Route Table Add Row Add the route entries and click Add and then COMMIT. : • • You can add a maximum of 256 routes to the static route table. The IP address of the Next Hop must be on the subnet of one of the device’s network interfaces. 5.2.
Advanced Configuration • When NAT functionality is enabled, the DHCP Relay and RIP features are not supported. The DHCP Relay Agent and RIP must be disabled before enabling NAT. To configure NAT parameters, navigate to ADVANCED CONFIGURATION > Network > NAT.
Advanced Configuration To add entries in the NAT Port Bind Table, navigate to ADVANCED CONFIGURATION > Network > NAT > Static Port Bind. The NAT Port Bind Table screen appears. Click Add in the NAT Port Bind Table screen.
Advanced Configuration S.No.
Advanced Configuration By default, RIP is not enabled on the device. To enabled, select Enable and click OK. The RIP screen is updated with the following tabulated parameters:. Parameter Description Name Displays the interface type as either Ethernet 1, Ethernet 2, or Wireless. Status Enables you to either enable or disable RIP for a particular network interface. Authorization Type Enables you to select the appropriate Authorization Type.
Advanced Configuration Figure 5-16 PPPoE Architecture Given below are the stages for a PPPoE client to establish link with the PPPoE server and then transfer PPP frames over Ethernet: • • Discovery and Session Stage: In this stage, to initiate a PPPoE session, the PPPoE client discovers a PPPoE server (called Access Concentrator). Once discovered, a session ID is assigned and a session is established. Point-to-point Protocol (PPP) Stages: The PPP stage comprises the following sub-stages: 1.
Advanced Configuration Figure 5-17 PPPoE Client Status 2. By default, the PPPoE feature is disabled on the client. To enable, select Enable from Status drop-down box. 3. Next, click OK. Please note that a change in the PPPoE client status requires you to reboot the device. 4.
Advanced Configuration 5. Given below is the table which explains PPPoE client parameters and the method to configure the configurable parameter(s): Parameter Description Authentication Protocol PPPoE supports the following types of user authentication protocols that provide varying levels of security: • None: Represents that no authentication is required for transferring PPP frames over Ethernet between PPPoE client and server.
Advanced Configuration Parameter LCP Echo Failure Description This parameter indicates the maximum number of consecutive failures to receive the LCP echo-reply to consider the connection to be down. To configure LCP Echo Failure value, enter a a value ranging from 1 to 25. By default, the echo failure is set to 5. On a noisy wireless link, it is recommended to set this value to higher.
Advanced Configuration Parameter Description MPPE Status : MPPE Status parameter is applicable only when the Authentication Protocol is configured as “MSCHAP v2”. Microsoft Point-to-Point Encryption (MPPE) is a protocol for transferring encrypted data over point-to-point links. The PPPoE client negotiates on the encryption parameters based on the MPPE Status configured.
Advanced Configuration Parameter Description MPPE Key Length : This parameter is applicable only when Authentication Protocol is configured as “MSCHAP v2” and MPPE Status is configured as “Mandatory”. MPPE supports 40-bit, 56-bit and 128-bit encryption key length. To configure the desired key length, select a key length from the MPPE Key Length drop-down box. Link Status Indicates the status of the PPPoE link between the PPPoE client and server.
Advanced Configuration The following figure shows an IP tunnel configuration using two end points. Figure 5-19 An Example: Tunnel Configuration Lets say that the Computer with an IP address: 10.0.0.1 wants to communicate with the Computer with an IPA address: 192.168.9.101. Since there is no native routing path between these two computers, the communication can happen via the tunnel. The SU1device with wireless IP address: 20.0.0.132 and SU2 device with wireless IP address: 30.0.0.
Advanced Configuration — Local IP Address = 20.0.0.132 — Remote IP Address = 30.0.0.132 SU2 Configuration — Virtual IP address = 50.0.0.2 — Local IP Address = 30.0.0.132 — Remote IP Address = 20.0.0.132 2. Add a Static Route for Remote IP Address of the tunnel (Refer to Static Route Table) • On SU1, add a static route for 30.0.0.xxx as next hop 20.0.0.1 • On SU2, add a static route for 20.0.0.xxx as next hop 30.0.0.1 3.
Advanced Configuration Figure 5-22 Adding a new Tunnel Interface 6. Given below is the table which explains the parameters for creating a new tunnel: Parameter Description Name Represents the name of the tunnel interface. Type a name for the tunnel interface. Encapsulation Method The device supports two types of network tunnels: • ipip: A tunneling protocol that allow only IP traffic over the tunnel.
Advanced Configuration : • • • • You can create a maximum of 16 tunnels. The Maximum Transmission Unit (MTU) of the tunnel interface depends on the underlying interface. It is advised that both PPPoE and the IP Tunneling feature do not function simultaneously on the device. IP configuration of Ethernet and Wireless interface should NOT be in the same subnet of virtual IP addresses of tunnels. 5.2.6.2 View Existing Tunnels The IP Tunneling screen displays all the tunnels created on the device.
Advanced Configuration Given below is the table which explains Basic Ethernet parameters and the method to configure the configurable parameter(s): Parameter Description MAC Address Displays the MAC address of the Ethernet interface. Operational Speed Displays the current operational speed of the Ethernet interface.
Advanced Configuration Parameter Admin Status Description This parameter is applicable only when the device support more than one Ethernet interface. By default, both the Ethernet interfaces of the device are enabled. The first Ethernet interface is always enabled; whereas the second Ethernet interface can be either enabled or disabled as desired. After configuring the required parameters, click OK and then COMMIT. Reboot the device, if you have changed the Admin Status configuration. 5.3.
Advanced Configuration Given below is the table which explains Advanced Ethernet parameters and the method to configure the configurable parameter(s): Parameter Auto Shutdown Description This parameter facilitates LACP capable Ethernet switches to use two or more QuickBridge links to achieve higher throughput and redundancy. By default, it is Disabled. If Auto Shutdown is enabled on the Ethernet Interface, then the Ethernet port will be automatically disabled, when the wireless link is DOWN.
Advanced Configuration In point-to-multipoint (BSU and SU) devices, you can create a maximum of eight link profiles including the default pre-configured profile. Profiles that are created on the BSU are mapped to the SUs, and vice versa. If BSU/SU is not mapped to any configured profile, it will be mapped to the default profile. The point-to-point (Quick Bridges) devices support only one link profile.
Advanced Configuration Figure 5-27 Add a Link Profile Type a name for the link profile in the Profile Name field. Next, click ADD and then COMMIT. : • By default, the link profiles are created with default values. • After adding a link profile it must be associated with a peer (refer BSU / SU Profiles for it to be effective. 5.4.1.2 Edit a Link Profile The link profiles are created with pre-configured wireless parameters.
Advanced Configuration 5.4.1.2.1 Basic Under Basic screen, you can configure and view the following parameters. Parameter Description Profile Name Represents the link profile name whose wireless parameters are edited. Enter a new name, if you wish to edit the existing profile name. DDRS Status Dynamic Data Rate Selection (DDRS) feature adjusts the transmission data rate to an optimal value to provide the best possible throughput according to the current communication conditions and link quality.
Advanced Configuration Parameter ATPC Status Description If Adaptive Transmit Power Control (ATPC) is enabled, then the device automatically adjusts the transmit power to avoid saturation of remote receiver, which could cause data errors leading to lower throughput and link outage. If disabled, user can manually adjust the transmit power. By default, ATPC is enabled on the device.
Advanced Configuration Parameter Tx Antenna Status Description Applicable only when Auto Tx Antenna Status is disabled. Allows the user to select the antenna port(s) for data transmission. Select the checkbox against each antenna(s) for data transmission and click OK. : • • On a BSU, selection of antenna ports is on a per link basis. The Tx Antenna port being used for each link can be seen on the Link Statistics page. Atleast two Tx antenna ports should be enabled when Data Stream is dual or auto.
Advanced Configuration Parameter Description DDRS Min Data Rate and DDRS Max Data Rate Represents the minimum and maximum data rate for DDRS to dynamically select the transmission data rate. These will vary depending on the configured data stream. DDRS Lower SNR Correction Represents the margin value to be added to the minimum required SNR, for the purpose of removing the data rate from the valid data rate table. Doing so, avoids Hysteresis in the dynamic data rate.
Advanced Configuration Parameter DDRS Rate Blacklist Interval Description Applicable when data stream mode is set to Auto. DDRS algorithm dynamically determines the performance of the single and dual stream data rates independently and blacklists unviable data rates to avoid unnecessary fluctuations, for a period of DDRS Rate Blacklist Interval. By default, it is set to 600 seconds. : DDRS Rate Back Off Interval must be less than the DDRS Rate Blacklist Interval.
Advanced Configuration Figure 5-30 An Example - SNR Information After configuring the required parameters, click OK and then COMMIT.
Advanced Configuration 5.4.2 Wireless Outdoor Router Protocol (WORP) To configure the WORP properties, navigate to ADVANCED CONFIGURATION > Wireless > Interface1 > WORP.
Advanced Configuration Figure 5-32 WORP Configuration (SU) Given below is the table which explains WORP parameters and the method to configure the configurable parameter(s): Parameter Description Mode Represents the device type (BSU, SU, End Point A or End Point B). Primary BSU Name Applicable only to an SU. Represents the Primary BSU name. If the primary BSU name is configured then SU establishes link with it.
Advanced Configuration Parameter Secondary BSU Name Description Applicable only to an SU. This parameter serves as a secondary / redundant BSU, in cases where Primary BSU fails and leads to network outage. If the secondary BSU name is configured then SU switches to the secondary BSU when WORP® link with primary BSU is down. SU checks for the primary BSU for every 15 minutes, and will switch to primary BSU depending on switch time interval configurable through CLI or SNMP.
Advanced Configuration Parameter Max SUs Description Represents the maximum number of SUs that can register with a BSU. Given below are the base stations and the maximum number of subscribers supported by each of them: Base Station Maximum Number of Subscribers MP-8100-BSU (rev 1 to rev 6) 100 MP-8100-BSU (rev 7 and above) 250 MP-8160-BSU MP-8160-BS9 250 MP-8200-BSU 250 MP-8250-BS9 250 MP-8250-BS1 250 : Applicable only to the BSU.
Advanced Configuration Parameter Multi Frame Bursting Description To achieve higher throughput, WORP protocol allows the transmitter or receiver to send multiple data frames in sequence without waiting for acknowledgment for every data frame and treats it as a single burst. During the burst transmission, the receiver is not allowed to interrupt the transmitter. After compilation of the burst, the receiver response by sending the acknowledgment.
Advanced Configuration Parameter Description Security Profile Name The Security Profile Name represents the encryption method used to encrypt the data over the wireless medium. The default configured Security Profile Name is WORP Security. See Security. Radius Profile Name The Radius Profile Name, containing the IP address of the RADIUS server, is used to authenticate an SU or an End Point B. See RADIUS. : Not applicable in SU mode and End Point B mode.
Advanced Configuration : • Modifying any of the WORP parameters result in temporary loss of connectivity between the transmitter and receiver. • MAC ACL Status and RADIUS MAC ACL Status parameters cannot be enabled simultaneously. 5.4.3 Wireless Interface Properties To configure the wireless interface properties, navigate to ADVANCED CONFIGURATION > Wireless > Interface 1 > Properties.
Advanced Configuration Figure 5-34 Wireless Interface Properties (SU) The Wireless Interface Properties screen is classified under two categories: Properties and MIMO. 5.4.3.0.1 Properties Under Properties screen, you can configure and view the following parameters. Parameter Channel Bandwidth Descriptions By default, the channel bandwidth is set to 20 MHz. 40 MHz can be selected for higher throughputs depending on the distance and signal quality.
Advanced Configuration Parameter Channel Offset Descriptions : Applicable only to MP-8160-BSU; MP-8160-BS9; MP-8160-SUA; MP-8150-CPE; MP-8160-CPE; QB-8150-LNK-12/50 devices. The Channel Offset parameter helps to change the operating channel center frequency. If the predefined center frequencies are not desirable, user can shift the center frequency to suit the requirement by configuring the Channel Offset. By default, the Channel Offset is set to 0.
Advanced Configuration Parameter Satellite Density Descriptions Satellite Density setting helps to achieve maximum bandwidth in a wireless network. It influences the receive sensitivity of the radio interface and improves operation in environments with high noise level. Reducing the sensitivity of the device enables unwanted “noise” to be filtered out (it disappears under the threshold). You can configure the Satellite Density to be Disable, Large, Medium, Small, Mini, or Micro.
Advanced Configuration Parameter Max EIRP Descriptions The maximum effective power that a radio antenna is allowed to radiate as per the regulatory standard. By default, the maximum EIRP is set as per the regulatory requirements for each frequency domain.
Advanced Configuration Parameter Descriptions Regulatory Domain Frequency (MHz) Max EIRP (dBm) PTP Mode PTMP Mode India 5825 – 5875 36 36 Brazil 5470 – 5725 30 30 5725 – 5850 Unlimited (100) 32 + 2/3(antenna gain) 5470 – 5600 30 (20 and 40 MHz) 27 (10 MHz) 24 (5 MHz) 30 (20 and 40 MHz) 27 (10 MHz) 24 (5 MHz) 5650 – 5725 30 (20 and 40 MHz) 27 (10 MHz) 24 (5 MHz) 30 (20 and 40 MHz) 27 (10 MHz) 24 (5 MHz) 5725 – 5850 36 36 Australia : • • • • If the maximum EIRP is not defined in t
Advanced Configuration Parameter Antenna Gain Descriptions When using external antenna, the professional installer should ensure to configure proper antenna gain so that the radio does not exceed the EIRP allowed per regulatory domain. Calculate the antenna gain as follows: Antenna Gain to be configured = Antenna Gain of the antenna used - Cable Loss Example: Consider an example where the device is operating in United States 5.3 GHz with the EIRP 30 dBm.
Advanced Configuration Parameter Descriptions Given below are the default Antenna Gain, for devices with integrated antenna: Product (s) Antenna Gain MP-8150-SUR 23 dBi MP-8150-SUR-100 21 dBi MP-8150-CPE 16 dBi MP-8160-CPE 15 dBi MP-8250-SUR 23 dBi MP-8250-BS9 16 dBi MP-8250-BS1 23 dBi QB-8150-EPR 23 dBi QB-8150-LNK-100 21 dBi QB-8150-LNK-12/50 16 dBi QB-8250-EPR 23 dBi Wireless Inactivity Timer Resets the wireless interface if there is no change in the Tx and Rx Packet Count in t
Advanced Configuration 5.4.3.0.2 MIMO The MIMO Properties tab allows you to configure the Multiple-Input-Multiple-Output (MIMO) parameters that enable to achieve high throughput and longer range. Under MIMO screen, you can configure and view the following parameters. Figure 5-35 MIMO Parameter Frequency Extension Description Frequency Extension is applicable only when the Channel Bandwidth is set to 40 MHz.
Advanced Configuration After configuring the required parameters, click OK and then COMMIT. Reboot the device, if you have changed any of the MIMO parameters with an asterisk (*) symbol. 5.4.4 Dynamic Frequency Selection (DFS) / Dynamic Channel Selection (DCS) 5.4.4.1 Dynamic Frequency Selection (DFS): The Tsunami® products support Dynamic Frequency Selection (DFS) for FCC, IC, and ETSI regulatory domains per FCC Part 15 Rules for U-NII devices, IC RSS-210, and ETSI EN 301-893 regulations, respectively.
Advanced Configuration • Even if the preferred channel is configured with a DFS channel manually, the SU will scan for the BSU/End PointA's channel and associates automatically. 5.4.4.1.2 DFS in SU or End Point B Mode Explained below is the DFS functionality and the way it operates on an SU or a End Point B. 1. When SU/End Point B has no WORP link, it scans continuously all the channels in the configured Frequency Domain for the presence of BSU/End Point A.
Advanced Configuration • • • • When DCS is enabled, the device computes the percentage of retransmissions (due to interference) for each link: — If the link quality is bad, the channel is blacklisted for 30 minutes. ACS will scan all the non-blacklisted channels and selects the channel with good link quality (least interference). — If the link quality is above the threshold, the device continues to operate in the same channel.
Advanced Configuration Figure 5-36 DFS Configuration (BSU Mode) Tsunami ® 8000 Series - Software Management Guide 101
Advanced Configuration Figure 5-37 DFS Configuration (SU/End Point B Mode) Given below is the table which explains DFS parameters and the method to configure the configurable parameter(s): Parameter Description Dynamic Frequency Selection Channel Wait Time Once the device selects the best channel, it scans that channel for the presence of RADAR for a period of set Channel Wait Time. The wait time can be configured in the range 60 to 3600 seconds. By default, the wait time is set to 60 seconds.
Advanced Configuration Parameter Retransmission Threshold Description This parameter enables to configure the retransmission threshold percentage on the device. The device computes percentage of retransmission for each link and compares with the configured threshold. If the retransmission percentage is greater than the user configured retransmission threshold, the link is considered as bad link. By default, the retransmission percentage is set to 50. Bad Link Threshold Applicable only to BSU.
Advanced Configuration 5.4.4.4 Manual Blacklist This tab enables you to manually blacklist a channel. However, there are few conditions to be followed while blacklisting channels: • • • When ACS is disabled, the preferred channel and its sub-channels that are part of the current channel bandwidth cannot be manually blacklisted. When WORP link is UP, the active channel and its sub-channels that are part of the current channel bandwidth cannot be manually blacklisted.
Advanced Configuration : Roaming feature is applicable only to the point-to-multipoint devices but not applicable in legacy mode. 5.4.5.1 Definition(s) • Roaming Preferred Channels: A list of channels maintained by a BSU where its neighbour BSUs are operating. • Roaming Channel List (RCL): A list of channels that are learnt from the associated BSU (known as Roaming Preferred Channels), and are not blacklisted locally on the SU. An SU uses this channel list to scan BSUs while roaming.
Advanced Configuration 5.4.5.3 Configurable Parameters on a BSU To configure the roaming parameters on a BSU, navigate to ADVANCED CONFIGURATION > Wireless > Interface 1 > Roaming. The Roaming Configuration screen appears: Figure 5-39 BSU Roaming Configuration Below is the table which explains roaming parameters for a BSU, and the method to configure the configurable parameter(s): Parameter Roaming Status Description The Roaming feature can either be enabled or disabled on a BSU.
Advanced Configuration Parameter Roaming Link Profile Description This parameter enables you to configure a roaming link profile for the roaming enabled SUs. When roaming is enabled on the BSU, select a profile from the configured link profiles, which serves as the roaming profile. The Default profile serves as the roaming profile when no profile is selected. The configured roaming profile is mapped to all the roaming enabled SUs.
Advanced Configuration Parameter Roaming Preferred Channels Description Each BSU on the network, maintains a list of channels where its neighbour BSUs are operating. When roaming is enabled, SU learns this list from the current BSU and uses it as Roaming Channel List (RCL), to reduce scanning time while searching for a BSU with better Rx SNR. To add channels, click Add under Roaming Preferred Channels.
Advanced Configuration 5.4.5.4 Configurable Parameters on an SU To configure the roaming parameters on an SU, navigate to ADVANCED CONFIGURATION > Wireless > Interface 1 > Roaming. The Roaming Configuration screen appears: Figure 5-42 SU Roaming Configuration Below is the table which explains roaming parameters for an SU, and the method to configure the configurable parameter(s): Parameter Roaming Status Description By default, roaming status is disabled. Only when enabled, an SU can roam to a better BSU.
Advanced Configuration Parameter Roaming Link Profile Description This parameter enables you to configure a roaming link profile for the roaming enabled BSU. When roaming is enabled on the SU, select a profile from the configured link profiles, which serves as the roaming profile. The Default profile serves as the roaming profile when no profile is selected. The configured roaming profile is mapped to the roaming enabled BSU.
Advanced Configuration • The roaming time for an SU increases when the RADIUS based authentication is enabled on the BSU. • When an SU registers with a new BSU, it will transfer all the data, buffered during transition, to the new BSU. 5.4.6 BSU / SU Profiles In the BSU / SU Profiles tab, you can explicitly map a link profile to the peer device (See Link Profiles). When a link is established, using the peer MAC address, it is associated with a link profile based on the mapping created here.
Advanced Configuration Figure 5-45 SU Profiles Entry Added Consider a case where a device is currently connected to its peer and no link profile is explicitly mapped. Then in such a scenario, the default link profile is assigned and displayed in the SU Profiles screen along with a Save option, as shown below: Figure 5-46 Save an SU Profile For such entries, user has the option to click Save button and configure this mapping in the profiles table.
Advanced Configuration Figure 5-48 SU Profile Added The newly configured link profile will not be the Active Link Profile until you commit the changes. That is the reason, in the above screen, you are still able to see Default as the Active Link Profile for index 2, even though Profile1 is configured. When you commit the changes, the Active Link Profile will change to Profile1, as shown in the following figure.
Advanced Configuration Figure 5-50 Edit a Mapped Profile Make the necessary edits, and click OK followed by COMMIT. : When the radio mode is changed (say BSU to SU, or SU to BSU), the link profiles and the peer profile mapping list is retained. 5.5 Security 5.5.1 Wireless Security The Wireless Security feature helps to configure security mechanisms to secure the communication link between a BSU and an SU, and a link between End Point A and End Point B. By default, the default security is WORP Security.
Advanced Configuration Parameter Edit Description Enables you to edit the existing security profiles. Click Edit to modify any of the security profile parameters. After configuring the required parameters, click OK and then COMMIT. 5.5.1.1 Creating a New Security Profile To create a new security profile, click Add in the Wireless Security Configuration screen.
Advanced Configuration Parameter Description Encryption Type Select encryption type as either None, WEP, TKIP or AES-CCM. 1. None - If the encryption type is selected as None, then there exist no security to the data frames transmitted over the wireless medium. 2. WEP (Wired Equivalent Privacy) - Represents the WEP Encryption type, which uses RC4 stream cipher for confidentiality and CRC-32 for integrity. The supported key lengths for WEP are 5/13/16 ASCII characters or 10/26/32 Hexadecimal digits.
Advanced Configuration 5.5.1.1.1 Sample Security Profile Configuration End Point A End Point B Profile Name WORP Security WORP Security Encryption Type AES-CCM AES-CCM Key 1234567890abcdef1234567890abcdef (32 Hexadecimal digits) or publicpublic1234 (16 ASCII Characters) 1234567890abcdef1234567890abcdef (32 Hexadecimal digits) or publicpublic1234 (16 ASCII Characters) Entry Status Enable Enable Network Secret public public 5.5.1.
Advanced Configuration WORP Configuration page (See Wireless Outdoor Router Protocol (WORP)). To configure the RADIUS Server profile, navigate to ADVANCED CONFIGURATION > Security > RADIUS. The following RADIUS Server Profile screen appears: Figure 5-54 Configuring RADIUS Server Profile Given below is the table which explains RADIUS Server parameters and the method to configure the configurable parameter(s): Parameter Description Profile Name A name that represents the Radius Server profile.
Advanced Configuration Parameter IP Address Description Represents the IPv4 / IPv6 address of the primary and secondary RADIUS servers. : IPv6 address should be the global IP address and not the link local IP address. Server Port Specifies the port number that is used by the BSU/End Point A and the RADIUS server to communicate. By default, RADIUS Authentication Server communicates on port 1812. Shared Secret Specifies the password shared by the BSU/End Point A and the RADIUS server to communicate.
Advanced Configuration Select the Operation Type as either Allow or Deny. • • Allow: Allows only the SUs/End Point Bs configured in the MAC Access Control Table to access the wireless network. Deny: Does not allow the SUs/End Point B devices configured in the MAC Access Control Table to access the wireless network. Click OK, if you have changed the Operation Type parameters. 5.5.3.
Advanced Configuration 5.6 Quality of Service (QoS) The Quality of Service (QoS) feature is based on the 802.16 standard and defines the classes, service flows, and packet identification rules for specific types of traffic. QoS guarantees a reliable and adequate transmission quality for all types of traffic under conditions of high congestion and bandwidth over-subscription.
Advanced Configuration 1. All – No classification fields, all traffic matches 2. L2 Multicast a. Ethernet Destination (dest = 0x010000000000, mask = 0x010000000000) 3. L2 Broadcast a. Ethernet Destination (dest = 0xffffffffffff, mask = 0xffffffffffff) 4. Cisco VoIP UL a. TCP/UDP Source Port Range (16,000-33,000) b. IP Protocol List (17 = UDP) 5. Vonage VoIP UL a. TCP/UDP Source Port Range (5060-5061, 10000-20000) b. IP Protocol List (17 = UDP) 6. Cisco VoIP DL a.
Advanced Configuration : Two different VoIP rule names have been defined for each direction of traffic, Uplink (UL) and Downlink (DL), (index numbers 4 to 7). This has been done to distinguish the proprietary nature of the Cisco VoIP implementation as opposed to the more standard Session Initiation Protocol (SIP) signaling found, for example, in the Vonage-type VoIP service. 5.6.1.
Advanced Configuration Committed Information Rate (CIR) Scheduling Type Traffic Priority Absolute Priority 0 BE 4 4 0 BE 5 5 0 BE 6 6 0 BE 7 7 0 RtPS 0 8 0 RtPS 1 9 0 RtPS 2 10 0 RtPS 3 11 0 RtPS 4 12 0 RtPS 5 13 0 RtPS 6 14 0 RtPS 7 15 > 0 (<= MIR) BE 0 16 > 0 (<= MIR) BE 1 17 > 0 (<= MIR) BE 2 18 > 0 (<= MIR) BE 3 19 > 0 (<= MIR) BE 4 20 > 0 (<= MIR) BE 5 21 > 0 (<= MIR) BE 6 22 > 0 (<= MIR) BE 7 23 > 0 (<= MIR) RtPS 0
Advanced Configuration below or equal to the CIR, and the lower priority is used for the rest of the traffic, taking MIR configuration as the second priority. This switching of the priorities is done automatically by the scheduler, which makes sure that lower priority traffic gets transported only after all the higher priorities are transported successfully.
Advanced Configuration g. Traffic Priority = 1 Note that two different VoIP Service Flow classes for each direction of traffic have been defined (index numbers 4 to 7) which follow the ITU-T standard nomenclatures: G.711 refers to a type of audio companding and encoding that produces a 64 Kbps bitstream, suitable for all types of audio signals. G.729 is appropriate for voice and VoIP applications, but cannot transport music or fax tones reliably.
Advanced Configuration – PIR: Cisco VoIP DL; PIR Priority: 1 5. 2Mbps Video a. SF class: DL-2Mbps Video – PIR: Streaming Video (IP/TV); PIR Priority: 1 5.6.2 QoS Configuration There are several pre-defined QoS classes, SFCs, and PIRs available that cover the most common types of traffic. To add new QoS classes, SFC and PIR, build the hierarchy of a QoS class as follows: 1. 2. 3. 4. 5.
Advanced Configuration Figure 5-58 QoS PIR MAC Address Add Entry c. Provide the MAC Address, Mask, Comment, Entry Status details and click Add. Comment field can be used to identify when this particular entry is referred in PIR Rule/QoS Class. The bit that is enabled in the “MAC Mask” configuration, the corresponding bit’s value in the “MAC Address” configuration should match with the same bit of the incoming traffic’s MAC Address (other bits of the incoming traffic are ignored).
Advanced Configuration Figure 5-59 QoS PIR IP Address Entries To Add a New PIR IP Address Entry, a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List > IP Address Entries. The QoS PIR IP Address Entries screen appears b. Click Add on the QoS PIR IP Address Entries screen to add a new entry. The following screen appears for configuring the IP Address Entry Details. Figure 5-60 QoS PIR IP Address Add Entry c. Provide the IP Address, Subnet Mask, Comment, Entry Status details and click Add.
Advanced Configuration Figure 5-61 QoS PIR TCP/UDP Port Entries To Add a New PIR TCP/UDP Port Entry, a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List > TCP/UDP Port Entries. The QoS PIR TCP/UDP Port Entries screen appears. b. Click Add on the QoS PIR TCP/UDP Port Entries screen to add a new entry. The following screen appears for configuring the IP Address entry details. Figure 5-62 QoS PIR TCP/UDP Port Add Entry c. Provide the Start Port, End Port, Entry Status details and click Add.
Advanced Configuration Figure 5-63 QoS PIR Entries To Add a New PIR Rule, a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List. The QoS PIR Entries screen appears. b. Click Add on the QoS PIR Entries screen to add a new entry. The following screen appears for configuring the New PIR Entry.
Advanced Configuration Figure 5-64 QoS PIR Add Entry c. Provide the PIR Name, Entry Status details and click Add. 5.6.2.1.1 PIR Rule Clarification Details 1. Navigate to ADVANCED CONFIGURATION > QoS > PIR List and click Details for editing a particular PIR Rule.
Advanced Configuration Figure 5-65 QoS PIR Edit Entry Tsunami ® 8000 Series - Software Management Guide 133
Advanced Configuration Parameter Description Rule Name This parameter specifies the Name of the Packet Identification Rule (PIR) and can have a length of 1-32 characters. ToS Rule This parameter is used to enable or disable a TOS rule. When ToS rule is enabled, configure the values for the following to specify the ToS-related configuration: • ToS Low • ToS High • ToS Mask In ToS Configuration, enter the decimal value of entire ToS 1 byte in “ToS Low” and “ToS High” parameters of the PIR rule.
Advanced Configuration Parameter Description 3. To prioritize DSCP packets based on IP-Precedence/DSCP value/ToS value, configure “ToS Mask”. a. IP Precedence: To prioritize based on only IP precedence, set all the 3 IP Precedence bits in the ToS Mask parameter to “1” and set rest of the bits in the ToS Mask parameter to ‘0” (i.e decimal value = 224). b.
Advanced Configuration Figure 5-67 QoS PIR Protocol ID c. Enter the details and click Add. For deleting an entry, click Delete for the corresponding entry in PIR Details screen. 5.6.2.1.3 Adding TCP/UDP Source Port Numbers a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List. Click Details. The QoS PIR Edit Entry screen appears. b. Navigate to TCP/UDP Source Port Entries tab and then click Add to add a new entry. The following screen appears. Figure 5-68 QoS PIR TCP/UDP Source Port Add Entry c.
Advanced Configuration Figure 5-69 QoS PIR TCP/UDP Destination Port Add Entry c. All the entries present in the PIR TCP/UDP Port Entries are displayed in the TCP/UDP Port Entry Table. Select the appropriate radio button and click Add. When an entry is added for a specific PIR, it gets displayed in the existing TCP/UDP Port Entries table. For deleting an entry, click Delete for the corresponding entry in the PIR Details page. 5.6.2.1.5 Adding IP Addresses 5.6.2.1.5.1 Adding Source IP Address a.
Advanced Configuration 5.6.2.1.5.2 Adding Destination IP Address a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List. Click Details. The QoS PIR Edit Entry screen appears. b. Navigate to Destination IP Address Entries tab and then click Add to add a new entry. The following screen appears. Figure 5-71 QoS PIR Destination IP Address Add Entry c. All the entries present in the PIR IP Address Entries are displayed in the IP Address Entry Table. Select the appropriate radio button and click Add.
Advanced Configuration In this example, all bits in the IP Mask are enabled, so incoming traffic’s multicast IP address should exactly match with specified configured multicast IP Address (i.e, 224.0.0.9). Other traffic is considered as non-matching traffic. 6. Creating Matching Profile for range of Multicast IP Address (224.0.0.0 to 224.0.0.255) IP Address: 224.0.0.9 IP Mask: 255.255.255.255 5.6.2.1.6 Adding Source MAC Address a. Click Add to add a new entry. The following screen appears.
Advanced Configuration b. All the entries present in the PIR MAC Address Entries are displayed in the MAC Address Entry Table. Select the appropriate radio button and click Add. After adding the entry for this specific PIR, it is displayed in the Existing MAC Address Entries table. For deleting an entry, click Delete for the corresponding entry in the PIR Details page. 5.6.2.2 QoS Service Flow Configuration (SFC) 1. Click ADVANCED CONFIGURATION > QoS > SFC List.
Advanced Configuration Figure 5-75 QoS Service Flow Add Entry 2. Specify details for the Service Flow Name, Scheduler Type, Traffic Direction, MIR, CIR, Max Latency, Tolerable Jitter, Traffic Priority, Max Messages in Burst and Entry Status. 3. Click Add. Parameter Description Service Flow Name Specifies the Name of the Service Flow. It can be of length 1-32 characters. Scheduler Type Specifies the Scheduler methods to be used.
Advanced Configuration Parameter Max Messages in Burst Description Specifies the maximum number of messages that can be sent in a burst. This value ranges from 1 to 16. : Reducing the number of messages impacts the throughput. Entry Status Specifies the Service Flow status. 5.6.2.3 QoS Class Configuration 1. Click ADVANCED CONFIGURATION > QoS > Class List. Five predefined QoS Classes are displayed in this page. You can configure maximum 8 entries. QoS Class Name should be unique.
Advanced Configuration Figure 5-77 QoS Class Add Entry b. Specify the QoS Class Name, Service Flow Name PIR Rule Name Priority and Entry Status and click Add. Parameter Description Class Name Specifies the Name of the QoS Class. This name length can range from 1 to 32 characters. Service Flow Name Specifies the Service Flow to be associated with the QoS Class. Select one of the possible SFCs that have been previously configured in the SFC List.
Advanced Configuration Figure 5-78 QoS Class Service Flow Details 3. Click Add. The following screen appears for association of the new SFC in this QoS Class. Figure 5-79 QoS Class Service Flow Add Entry 4. Specify the Service Flow Name, PIR Rule Name, Priority and Entry Status and click Add to add a new entry. 5.6.2.3.2 Adding PIR in QoS Class 1. Click on the corresponding Details provided in the Service Flow of a particular QoS Class. Maximum 8 PIR rules can be associated per SFC of an QoS Class.
Advanced Configuration Figure 5-80 QoS Class PIR Details 3. Click Add. The following screen appears for association of the new PIR rule in an SFC already associated in an QoS Class. Figure 5-81 QoS Class PIR Add Entry 4. Specify the PIR Rule Name, Priority and Entry Status and click Add to add a new entry. : When you change the entry status of an existing QoS Class, the status changes immediately.
Advanced Configuration Figure 5-82 QoS SU or End Point B List 2. If an SU or End Point B is not in the list and is associated, the default QoS class configuration is applied. 5.6.2.4.1 Adding a New SU or End Point B 1. Navigate to ADVANCED CONFIGURATION > QoS > SU or End Point B List. The QoS SU or End Point B Entries screen appears. 2. Click Add to add a new entry. The following QoS SU or End Point B Table Add Row screen appears. Figure 5-83 QoS SU or End Point B Table Add Entry 3.
Advanced Configuration The following configuration instructions explain how to configure the system so that configuration parameters can always be changed, and ping requests and responses get higher priority in order to show the actual connectivity of the pinged node. The configuration suggested here assumes that the whole network is managed from a single work station, called the management station.
Advanced Configuration c. Click Add that corresponds to Source IP Address Entries. This displays a screen for referring the Management Station’s IP Address. New Entry Table displays all the IP Address Entries of the PIR List. Select the option button corresponding to the Management Station and then click Add. This adds the IP Address of the Management Station to the Existing Entries. Click Back and the new entry appears in the Source IP Address Entries Table. 5. Add PIR Rule for Destination IP Address. a.
Advanced Configuration • Max Messages in Burst: 16 • Entry Status: Enable d. Click Add. The UL-Management SF is added to the QoS SFC List. : The input and output bandwidth limits set on the End Point A or BSU or on the End Point B or SU are used for limiting aggregate bandwidth used by the SU or End Point B. These limits override any limit imposed by MIR in the SFC. Therefore, these limits should be set to at least 1000 Kbps (MIR values in UL-Management and DL-Management SFCs). 5.6.3.0.
Advanced Configuration 5.7 RADIUS Based SU QoS Configuration RADIUS based QoS configuration enables you to configure QoS parameters on an SU through RADIUS Server. This way of configuring QoS parameters, reduces the task of manually configuring QoS parameters on each SU available on the network. Explained below is the process followed to configure QoS parameters on an SU from a RADIUS Server.
Advanced Configuration 5.8 VLAN (Bridge Mode Only) The Virtual Local Area Network (VLAN) feature helps in logical grouping of network host on different physical LAN segments, which can communicate with each other as if they are all on the same physical LAN segment.
Advanced Configuration Figure 5-86 System-Level VLAN Configuration (SU/End Point A/End Point B) 1. VLAN Status: This parameter is used to either enable or disable VLAN feature on the device. By default, this parameter is disabled. To enable VLAN, select the VLAN Status box. If VLAN status is enabled, it indicates that locally configured VLAN parameters will be applied on the device. If VLAN status is disabled, it indicates that the device is open for remote VLAN configuration. 2.
Advanced Configuration : When Double VLAN is enabled on the device, the Service VLAN ID should not be set to -1. 7. Service VLAN Priority: This parameter is used to set IEEE 802.1p priority in outer/service VLAN tag for the data frames. By default, the priority is set to 0. To set the VLAN priority, enter a value ranging from 0 to 7. 5.8.2 Ethernet VLAN Configuration You can configure VLAN on the Ethernet interface(s) by using any one of the following VLAN Modes: 1. Transparent Mode 2. Access Mode 3.
Advanced Configuration : Wireless Interface of the device will always be in transparent mode. There is no support provided to edit the VLAN parameters of the wireless interface. 5.8.2.2 Access Mode Access Mode can be configured in an SU, End Point A and End Point B. This mode is used to connect VLAN aware networks with VLAN unaware networks.
Advanced Configuration Parameter Description Access VLAN Priority This parameter is used to set IEEE 802.1p priority for the data frames. By default, the priority is set to 0. To set the Access VLAN priority, enter a value ranging from 0 to 7. Allow Untagged Mgmt Access When enabled, the Management Access is allowed using untagged packets. By default, it is disabled. Click OK and then COMMIT. 5.8.2.3 Trunk Mode Trunk Mode can be configured in a BSU, SU, End Point A and End Point B.
Advanced Configuration Figure 5-90 Trunk Mode (SU/End Point A/End Point B) Given below is the table which explains the method to configure the device in Trunk Mode: Parameter Description Interface Displays the name of the Ethernet interface. VLAN Mode Select the VLAN Mode as Trunk. Allow Untagged Frames Select Enable or Disable. By default, it is disabled.
Advanced Configuration Parameter Port VLAN ID Description Enter the Port VLAN ID in the Port VLAN ID box. The untagged data frames received at the Ethernet interface are tagged with this port VLAN Id and then forwarded to the destination interface. By default, the Port VLAN Id is set to -1 which indicates no tag is added to the data frame. To set Port VLAN tag to the data frame, enter a value ranging from 1 to 4094. : • • • Port VLAN Priority Applicable only on an SU, End Point A and End Point B.
Advanced Configuration : You can configure a maximum of 256 trunk VLAN Ids in a BSU and End Point A device, and 16 trunk VLAN Ids in an SU and End Point B device. 5.9 RADIUS Based SU VLAN Configuration RADIUS based VLAN configuration enables you to configure VLAN parameters on an SU through RADIUS Server.
Advanced Configuration Name of the attribute Vendor Assigned Attribute Number Attribute Format Management Attribute VLAN ID 8 Decimal 1 – 4095 Management VLAN Priority 9 Decimal 0–7 10 … 25 Decimal 1 – 4095 SU VLAN Table Status (Applicable only to MP/QB.
Advanced Configuration • An MP.11 SU should locally configure VLAN parameters when connected to a MP 8000 BSU in legacy mode as the BSU will not assign any VLAN parameters based on RADIUS authentication. • An MP 8000 SU should locally configure VLAN in legacy mode when connected to a MP.11 BSU, should locally configure VLAN parameters as the BSU shall not assign VLAN parameters based on RADIUS authentication. 5.
Advanced Configuration Parameter STP/LACP Frames Description This parameter allows you to either Block or Passthru STP/LACP frames on the network. • Passthru: By allowing the STP/LACP frames, any loops that occurs within a network can be avoided. If configured to Passthru, the STP/LACP frames in the system are bridged. • Block: When blocked, the STP/LACP frames encountered on a network are terminated at bridge. By default, STP/LACP frames are allowed on the network.
Advanced Configuration Figure 5-94 Protocol Filter Tsunami ® 8000 Series - Software Management Guide 162
Advanced Configuration Given below is the table which explains Protocol Filter parameters and the method to configure the configurable parameter(s): Parameter Filtering Control Description This parameter is used to apply filters on the device’s interface. The filtering can be applied on any of the following interfaces: • Ethernet: Packets are examined at the Ethernet interface. • Wireless: Packets are examined at the Wireless interface.
Advanced Configuration Entry Status Set the entry status as either Enable, Disable or Delete. • Enable: Enables filter status on a protocol. • Disable: Disables filter status on a protocol. • Delete: Deletes a protocol entry from the Protocol Filter Table. : System-defined default protocols cannot be deleted. 5.10.1.2 Add User-defined Protocols to the Filter Table To add user-defined protocols to the Protocol Filter Table, click Add in the Protocol Filter screen.
Advanced Configuration • • • • • To prevent all traffic from a specific wireless MAC address from being forwarded to the wired network, configure only the Wireless MAC address and Wireless Mask (leave the Wired MAC Address and Wired Mask set to all zeros). To prevent traffic between a specific wired MAC address and a specific wireless MAC address, configure all four parameters. Configure the wired and wireless MAC address and set the wired and wireless mask to all Fs.
Advanced Configuration Result: The device blocks all traffic between the wired PC and all wireless PCs. 5.10.2.0.
Advanced Configuration Given below is the table which explains Static MAC Address Filter parameters and the method to configure the configurable parameter(s): Parameter Description Wired MAC Address Specifies the MAC address of the device on the wired network that is restricted from communicating with a device on the wireless network. Wired MAC Mask Specifies the range of MAC address to which this filter is to be applied.
Advanced Configuration The Advanced Filtering table contains a list of 5 pre-defined protocols on which Advanced Filtering is applied. The following table explains the Filtering table parameters: Parameter Description Protocol Name Represents the protocol name.
Advanced Configuration Figure 5-99 Advance Filtering- Edit Entries Modify the IP protocol traffic direction that needs to be filtered, and the filtering status for the desired IP Protocol. Next click OK and then COMMIT. 5.10.4 TCP/UDP Port Filter TCP/UDP Port Filtering allows you to enable or disable Transmission Control Protocol (TCP) ports and User Datagram Port (UDP) ports on network devices.
Advanced Configuration Figure 5-100 TCP/UDP Port Filter The Filter Control parameters determines if filter has to be applied or not on a TCP/UDP Port. By default, it is disabled. To apply filters, select Enable and click OK. 5.10.4.1 TCP/UDP Port Filter Table The TCP/UDP Port Filter table displays a list of default TCP/UDP ports and user-defined ports which can be enabled or disabled as desired. By default, the device support 7 default TCP/UDP port filter entries.
Advanced Configuration Parameter Entry Status Description Set the entry status as either Enable, Disable or Delete. • Enable: Filter is applied and filters the packet based on the Port number and port type. • Disable: No filter is applied. • Delete: Allows to delete only user-defined TCP/UDP port filter entry. When you attempt to delete default entries, the device throws an error. If you have configured any user-defined protocols then click OK and then COMMIT.
Advanced Configuration To configure Storm Threshold Filter, navigate to ADVANCED CONFIGURATION > Filtering > Storm Threshold Filter. The Storm Threshold Filter screen appears. This screen contains information about the threshold values per second of the multicast and broadcast packets that can be processed for the interface(s) present in the device.
Advanced Configuration The user can form groups of SUs at the BSU which define the filtering criteria. All data to/from SUs belonging to the same group are bridged. If an SU does not belong to any group, the BSU discards the data. The user can also configure a Security Gateway to block traffic between SUs connected to different BSUs. All packets destined for SUs not connected to the same BSU are forwarded to the Security Gateway MAC address (configured under Security Gateway).
Advanced Configuration This screen is classified into two categories: Intra Cell Blocking and Security Gateway. Given below are the configuration details. Parameter Description Intra Cell Blocking Status By default, Intra Cell Blocking is disabled on a BSU. Select Enable to enable the feature and then Click OK and then COMMIT. Security Gateway Status By default, Security Gateway is disabled on a BSU. Select Enable to enable the feature. MAC Address Represents the MAC address of the security gateway.
Advanced Configuration Figure 5-104 WORP Intra Cell Blocking Group Table This table displays the list of groups. If the Entry Status for a group is set to Enable then BSU discards all the packets coming from SUs which are not members of that group. If set to Disable, then allows all the packets coming from SUs which are not the members of that group. If you have changed the Entry Status of a group, then click OK and then COMMIT. 5.10.6.
Advanced Configuration Figure 5-105 WORP Intra Cell Blocking MAC Table 5.10.6.2.1 To add MAC addresses, click Add. The following screen appears. Figure 5-106 WORP Intra Cell Blocking MAC Table Add Entry Given below is the table which explains the WORP Intra Cell Blocking MAC Table entries and the method to configure the configurable parameter(s): Parameter Description MAC Address Represents the MAC address of the SU.
Advanced Configuration To edit the existing MAC addresses, click Edit icon in the WORP Intra Cell Blocking MAC Table screen. Modify the parameters as desired in the WORP Intra Cell Blocking MAC Table Add Row screen and click OK and then COMMIT. In the WORP Intra Cell Blocking MAC Table, you can change the Entry Status as either Enable/Disable/Delete. Once the status is changed, click OK and then COMMIT. 5.
Advanced Configuration Figure 5-108 DHCP Pool Table Add Entry Enter the pool details and click Add. The entry will be updated in the DHCP pool table. To apply the configured changes, click COMMIT. 5.11.2 DHCP Server If DHCP Server is enabled, it picks automatically the IP addresses from the specific interface address pool and assigns them to the respective DHCP clients. DHCP Server feature is applicable to both Bridge and Routing Mode.
Advanced Configuration Figure 5-110 DHCP Server (Routing Mode) Given below is the table which explains DHCP Server parameters and the method to configure the configurable parameter(s): Parameter DHCP Server Status Description By default, DHCP Server is disabled on a device. To enable DHCP Server, select Enable. A DHCP Server can be enabled only when the following two conditions are satisfied: 1. Before enabling, atleast one interface should be enabled on which the DHCP Server has to run. 2.
Advanced Configuration Parameter Description Default Lease Time DHCP Server uses this option to specify the lease time it is willing to offer to the DHCP client over that interface. Once the lease time expires, the DHCP Server allocates a new IP address to the device. The Default Lease Time should be less than or equal to the configured Max Lease Time. Comment Specifies a note for the device administrator. Entry Status Used to Enable or Disable the DHCP Server functionality over the interface.
Advanced Configuration Figure 5-112 DHCP Relay Server Add Entry Enter the DHCP Server IP Address and then click Add. After configuring the required parameters, click OK and then COMMIT. : DHCP server is disabled automatically if DHCP Relay agent is enabled and vice-verse.
Advanced Configuration 5.12 IGMP Snooping : IGMP Snooping is applicable only in Bridge Mode. Proxim’s Tsunami® devices support Internet Group Management Protocol (IGMP) Snooping feature. With IGMP Snooping enabled on the device, multicast traffic is only forwarded to ports that are members of the specific multicast group. By forwarding the traffic only to the destined ports, reduces unnecessary load on devices to process packets.
Advanced Configuration Snooping enabled, the SU/End Point B transmits the data to the host only when the multicast group address is a member of the multicast group table, else drops the packet. IGMP Snooping is of 2 kinds: • • Active: Active IGMP Snooping listens to IGMP traffic and filters IGMP packets to reduce load on the multicast router. Passive: Passive IGMP Snooping simply listens to IGMP traffic and does not filter or interfere with IGMP. : • Tsunami® devices supports only passive IGMP Snooping.
6 Management This chapter provides information on how to manage the device by using Web interface. It contains information on the following: • • • • • • • System File Management Services Simple Network Time Protocol (SNTP) Access Control Reset to Factory Convert QB to MP : Recommended characters for the name field are A-Z a-z 0-9 - _ = : . @ $ & and space. 6.1 System 6.1.
Management Given below is the table which explains System parameters and the method to configure the configurable parameter(s): Parameter Description System Up-Time This is a read-only parameter. It represents the operational time of the device since its last reboot. System Description This is a read-only parameter. It provides system description such as system name, firmware version and the latest firmware build supported. For example: MP-8100-BSU-WD-v2.X.Y(Build No.
Management Figure 6-2 Inventory Management By default, the components information is auto-generated by the device and is used only for reference purpose. Click Refresh, to view the updated system inventory management information. 6.1.3 Licensed Features Licensing is considered to be the most important component of an enterprise-class device which typically has a feature-based pricing model.
Management Given below is the table which explains each of the parameters: Parameter Description Product Description Description about the device. Number of Radios The number of radios the device supports. Number of Ethernet Interfaces The number of Ethernet interfaces supported by the device. Radio 1 Allowed Frequency Band The operational frequency band supported by the device radio. Maximum Output Bandwidth The maximum output bandwidth limit of the device. It is represented in mbps.
Management • • The TFTP server is running during file upload and download. You can check the connectivity between the device and the TFTP server by pinging the device from the Personal Computer that hosts the TFTP server. The ping program should show replies from the device. The TFTP server should be configured to transmit and receive files (on the Security tab under File > Configure), with no automatic shutdown or time-out (on the Auto-Close tab).
Management Figure 6-4 TBC File in xml Format 6.2.2.2 Editing the TBC File The TBC file can easily be opened and edited in any standard Text-Editors like Wordpad, MS-Word, Notepad++, Standard XML Editors. Proxim recommends XML Notepad 7 editor for editing the TBC file. • • You can modify any value between the double quotes(““) in the TBC file. It is recommended not to change the text outside the double quotes (“”) or XML tags in the TBC file.
Management 6.2.2.3 Loading the TBC file The TBC file can be loaded onto the device by using either SNMP, Web Interface or CLI. You can either use TFTP or HTTP to load the TBC file. By using Web Interface, you can load the TBC file by navigating to MANAGEMENT > File Management > Upgrade Configuration. To load the TBC file, it should be generated or downloaded onto the device. While loading the TBC file onto the device, any file name is accepted. Once loaded, the TBC file name is renamed to PXM-TBC.xml.
Management Figure 6-5 Upgrade Firmware - HTTP 2. In the HTTP screen, click Browse to select the latest firmware file from the desired location. Ensure that the file name does not contain any space or special characters. 3. Click Upgrade. 6.2.3.2 Upgrade Firmware via TFTP To upgrade the firmware via TFTP Server, do the following: 1. Navigate to MANAGEMENT > File Management > Upgrade Firmware > TFTP. Figure 6-6 Upgrade Firmware - TFTP 2.
Management : • • After upgrading the device with the new firmware, reboot the device; Otherwise the device will continue to run with the old firmware. It is recommended not to navigate away from the upgrade screen, while the upgrade is in progress. 6.2.4 Upgrade Configuration You can upgrade the device with the latest configuration files either through HTTP or TFTP. : Make sure the configuration file being loaded into the device is compatible.
Management 6.2.4.2 Upgrade Configuration via TFTP To upgrade the configuration files by using TFTP Server, do the following: 1. Navigate to MANAGEMENT > File Management > Update Configuration > TFTP. Figure 6-8 Upgrade Binary Configuration via TFTP 2. You can update the device with three types of configuration files: Binary, Text Based and Config Profile. To update the device with Binary Configuration file, select Binary Config.
Management 4. To update the device with Configuration Profile files, select Config Profile. • Based on the IP mode, configure either IPv4 or IPv6 address as TFTP Server address. • Enter the name of the Config Profile file (including the file extension) that has to be downloaded onto the device in the File Name box. Figure 6-10 Upgrade Configuration Profile via TFTP 5. If you are upgrading the device with Binary Configuration file then click Upgrade and then reboot the device, or click Upgrade & Reboot. 6.
Management Figure 6-11 Retrieve Files via HTTP 2. Select the type of file that you want to retrieve from the device from the File Type drop down box. The files may vary depending on your device. The File Types are: a. Config b. Event Log c. Temperature Log d. Text Based Template Log e. Debug Log f.
Management After excluding the unique parameters, click Create Profile for creating the profile and then click Retrieve. When the retrieved configuration profile file is loaded on target devices, the target devices will come up with configuration of the master device except the excluded parameters. The excluded parameters are retained as configured on the target device. : Config Profile is applicable only to the compatible devices. 3. Click Retrieve.
Management 2. Based on the IP mode configure either IPv4 or IPv6 address as TFTP Server address. 3. Enter the name of the file (including the file extension) that has to be retrieved from the device, in the File Name box. 4. Select the file type that you want to retrieve from the device, from the File Type drop down box. The file types are: a. Config b. Event Log c. Temperature Log d. Text Based Template Log e. Debug Log f.
Management • Similarly, the Text Based Template Configuration file does not exist if it is not generated from the CLI. • You can retrieve Event Logs only when they are generated by the device. 6.3 Services The Services tab lets you configure the HTTP/HTTPS, Telnet/SSH and SNMP interface parameters. 6.3.1 HTTP/HTTPS To configure HTTP/HTTPS interface parameters, navigate to MANAGEMENT > Services > HTTP / HTTPS.
Management Parameter Description HTTP Port Represents the HTTP port to manage the device through Web Interface. By default, the HTTP port is 80. HTTPS By default, a user can manage the device through Web Interface over secure socket Layer (HTTPS). To prevent access to the device through HTTPS, select Disable. : The password configuration for HTTPS is same as configured for HTTP. After configuring the required parameters, click OK, COMMIT and then REBOOT. 6.3.
Management Given below is the table which explains Telnet/SSH parameters and the method to configure the configurable parameter(s): Parameter Admin Password Description By default, the Administrator password to access Telnet/SSH interface is public. For security reasons, it is recommended to change the default password. The password should be alphanumeric with minimum of 6 and maximum of 32 characters.
Management 6.3.3 SNMP To configure SNMP interface parameters, navigate to MANAGEMENT > Services > SNMP.
Management Figure 6-19 SNMPv3 Given below is the table which explains SNMP parameters and the method to configure the configurable parameter(s): Parameter SNMP Description By default, the user has the access to manage the device through SNMP Interface. To prevent access to the device through SNMP, select Disable. : Any change in the SNMP status will affect the Network Management System access. Version Allows you to configure the SNMP version. The supported SNMP versions are v1-v2c and v3.
Management Parameter Description : The following special characters are not allowed in the password: - = \ “ ‘ ? / space Read/Write Password Represents the read-write community string used in SNMP Protocol. It is sent along with each SNMP GET / WALK / GETNEXT / SET request to allow or deny access to the device. This password should be same as read-write password set in the NMS or MIB browser. The default password is “public”. The password should be of minimum 6 and maximum 32 characters.
Management : The default SNMP Trap Host Table entry cannot be deleted. To add entries to the Trap Host Table, click Add in the Services screen. The SNMP Trap Host Table Add Row screen appears: Figure 6-20 Add Entries to SNMP Host Table Configure the following parameters: • IP Address: Based on the IP mode, enter the IPv4 or IPv6 address of the Trap server to which SNMP traps will be delivered. : IPv6 address should be the global IP address and not the link local IP address.
Management 2. Syslog: They are similar to Event logs except that they are cleared on device reboot. To configure Event log and Syslog priority, navigate to MANAGEMENT > Services > Logs. The following screen appears: Figure 6-21 Logs • • • • Event Log Priority: By default, the priority is set to Notice.
Management 1. Click Add in the Syslog Host Table screen. The Syslog Host Table Add Row screen appears: Figure 6-22 Syslog Host Table Add Row 2. IP Address: Based on the IP mode, enter IPv4 or IPv6 address of the Syslog host. : IPv6 address should be the global IP address and not the link local IP address. 3. Host Port: Represents the port on which the Syslog host listens to the log messages sent by the device. The default port is 514.
Management • • • • IP Address Port Host Comments Entry Status: – Enable: By default, the configured Syslog host is enabled on the device. – Disable: To disable an entry in the Syslog Host Table, click Disable. – Delete: To delete the configured Syslog host, click Delete. After doing the necessary changes, click OK followed by COMMIT. 6.
Management Parameter Primary Server IP Address/Domain Name Description Enter the host name, or the IP address based on IP modes (IPv4 only or IPv4 and IPv6) of the primary SNTP time server. The SNTP Client tries to synchronize device’s time with the configured primary server time. : • If host name is configured, instead of IP address then make sure that DNS server IP is configured on the device. • IPv6 address should be the global IP address and not the link local IP address.
Management Parameter Manual Time Configuration Description If SNTP Client is disabled on the device or the time servers are not available on the network, then the user can manually set the time. Enter the time manually in the format: MM-DD-YYYY HH:MM:SS. : • Manual time configuration is not retained across reboots. After every reboot the user has to set the time again. • Over a period of time, with manual time configuration, the device may lag behind the actual time.
Management Figure 6-26 Management Access Table Add Row 2. IP Address: Based on the IP mode, configure either IPv4 or IPv6 address of the host that controls the device management access. 3. Entry Status: By default, the entry status is enabled meaning which the specified host can control the device management access. Edit the status to Disable, if you do not want the host to control the device management access. 4. Click Add.
Management • • QB-8200-EPA which converts to a MP-8200-SUA QB-8250-EPR which converts to a MP-8250-SUR You can convert a QB to SU mode by using two methods: • • Method 1: Web Interface Method 2: Load an SU config file (retrieved from another SU) onto the QB device and then reboot. : Even after conversion from QB to MP, the device description still shows as QB. To convert a QB to SU using Web Interface, do the following: 1. Navigate to MANAGEMENT > Convert QB to MP.
7 Monitor This chapter contains information on how to monitor the device by using Web interface. It contains information on the following: • • • • • • • • • • • Interface Statistics WORP Statistics Active VLAN Bridge Network Layer RADIUS (BSU or End Point A only) IGMP DHCP Logs Tools SNMP v3 Statistics 7.1 Interface Statistics Interface Statistics allows you to monitor the status and performance of the Ethernet and Wireless interfaces of the device. 7.1.
Monitor To view Ethernet statistics, click Ethernet 1 or Ethernet 2 depending on the Ethernet interfaces supported by your device. Given below is the table which explains the parameters displayed in the Ethernet Statistics screen: Parameter Description MTU Specifies the largest size of the data packet received or sent on the Ethernet interface. The MTU size varies from 1500 to 1514 depending on the MTU configuration (See System). MAC Address Specifies the MAC address at the Ethernet protocol layer.
Monitor 7.1.2 Wireless Statistics To view the Wireless interface statistics, click MONITOR > Interface Statistics > Wireless1. Figure 7-2 Wireless Interface Statistics Given below is the table which explains the parameters displayed in the Wireless statistics screen: Parameter Description MTU Specifies the largest size of the data packet received or sent on the wireless interface. The MTU size can range from 350 to 3808 bytes for High throughput modes and 350 to 2304 bytes for legacy mode.
Monitor Parameter Description In Errors Specifies the number of inbound packets that contained errors and are restricted from being delivered. Out Octets Specifies the total number of octets transmitted out from the wireless interface. Out Packets Specifies the total number of packets requested by the higher level protocol and then, transmitted. Out Discards Specifies the number of error-free outbound packets chosen to be discarded to prevent them from being transmitted.
Monitor Figure 7-3 PPPoE Interface Statistics The PPPoE interface parameters are same as the Ethernet interface parameters. Please note that if a link is not established between a PPPoE client and server, then the device displays the following message. Figure 7-4 PPPoE Server - No Link Established To view the updated PPPoE interface statistics, click Refresh. Please note that for every 4 seconds, the interface statistics gets refreshed.
Monitor To view updated connection statistics, click Refresh. To restart the session between the PPPoE client and server, click Restart PPPoE Session. On successfully re-establishing a session, the IP address of the wireless interface will be assigned again by the PPPoE server, if Address Type is set to PPPoE-ipcp. To clear the existing connection statistics, click Clear. 7.1.4 IP Tunnels : Applicable only in Routing Mode.
Monitor Parameter Details Description Provides a more detailed statistics about the tunnel interface. To view the detailed statistics, click . Figure 7-7 Detailed IP Tunnels Interface Statistics The detailed tunnel interface parameters are similar to the Ethernet Interface Statistics. Please refer to Ethernet Statistics. 7.2 WORP Statistics 7.2.1 General Statistics WORP General Statistics provides general statistics about the WORP.
Monitor Figure 7-8 WORP General Statistics (SU/End Point A/End Point B) Figure 7-9 WORP General Statistics (BSU) Tsunami ® 8000 Series - Software Management Guide 219
Monitor 7.2.1.1 Basic Statistics Given below is an explanation to the basic parameters: Parameter Description Interface Type Specifies the type of radio interface. WORP Protocol Version Specifies the version of the WORP Protocol used. This information is useful to the customer support team for debugging purpose only. WORP Data Messages Specifies the sent or received data frames through wireless interface. Poll Data Refers to the number of polls with data messages sent or received.
Monitor Parameter Description Authentication Confirms Refers to the number of authentication confirm messages sent or received on WORP interface. Registration Attempts Refers to the number of times a registration attempt has been initiated. Registration Incompletes Refers to the number of registration attempts that are not yet completed. Registration Timeouts Refers to the number of times the registration procedure timed out.
Monitor Parameter Description TPC Displays the TPC value currently applied by the device to adjust the transmit power radiated by the radio. EIRP Displays the current EIRP that a radio antenna radiates (after applying the TPC). Power Displays the current transmit power radiated by the radio (after applying the TPC). Tx Antenna Ports Indicates the status of the antenna ports at the BSU end. Click Refresh to view updated WORP advanced statistics. 7.2.2 Link Statistics 7.2.2.
Monitor Parameter Local Antenna Port Info Description Indicates the status of the antenna ports at the local end. The following symbols indicate the status of the antenna ports. Indicates the antenna port is disabled. Indicates the antenna port is enabled and signal is present. Local Signal (dBm) Represents the signal level with which the device at the local end receives frames from the device at the remote end, through wireless medium.
Monitor Figure 7-12 SU Detailed Statistics The detailed page displays Remote SNR information, that is, the Minimum Required SNR and the Maximum Optimal SNR value for a given data rate or modulation, to achieve optimal throughput. To disconnect an SU/End Point B from BSU/End Point A respectively, click Disconnect. To view updated detailed statistics, click Refresh.
Monitor Figure 7-13 Local SNR Information These configured values are used by ATPC and DDRS to derive TPC and data rate for optimal throughput. 7.2.2.2 BSU/End Point A Link Statistics : BSU Link Statistics is applicable only to an SU, and End Point A Link Statistics is applicable only to an End Point B device. BSU Link statistics provides information about the BSU to which SUs are connected.
Monitor Figure 7-14 An Example - BSU Link Statistics 7.2.3 QoS Statistics (BSU or End Point A Only) : This parameter is applicable only to BSU or End Point A radio modes. To view QoS Statistics, navigate to MONITOR > WORP Statistics > Interface 1 > QoS Statistics. The following QoS Summary screen appears.
Monitor 7.3 Active VLAN : Active VLAN is applicable only to a device in SU (Bridge) mode. The Active VLAN page enables you to identify the VLAN Configuration mode applied on a device in SU mode. To view active VLAN applied on the device in SU mode, navigate to MONITOR > Active VLAN. The Active VLAN page appears: Figure 7-16 Active VLAN The Active VLAN Config parameter helps you to identify the current VLAN configuration applied on the device in SU mode.
Monitor This page displays the VLAN Ethernet parameters and their values that are configured either locally or remotely. : Please note that the number of Ethernets vary depending on the device. 7.4 Bridge 7.4.1 Bridge Statistics The Bridge Statistics allows you to monitor the statistics of the Bridge. To view the Bridge Statistics, navigate to MONITOR > Bridge > Bridge Statistics.
Monitor Parameter Description In Non-unicast Packets Represents the number of non-unicast subnetwork packets delivered to the higher level protocol. In Errors Represents the number of inbound packets with errors and that are restricted from being delivered. Out Octets Represents the total number of octets transmitted out of the bridge, including the framing characters.
Monitor 7.5 Network Layer 7.5.1 Routing Table Routing table displays all the active routes of the network. These can be either static or dynamic (obtained through RIP). For every route created in the network, the details of that particular link or route will get updated in this table. To view the Routing Table, navigate to MONITOR > Network Layer > Routing Table. The Routing Table screen appears: Figure 7-20 Routing Table 7.5.
Monitor • • • MAC Address: Represents the MAC address of a node on the network. Net Address: This parameter represents the corresponding IP address of a node on the network. Type: This parameter represents the type of mapping, that is, Dynamic or Static. To view updated IP ARP entries, click Refresh. To clear the IP ARP entries, click Clear. 7.5.3 ICMP Statistics The ICMP Statistics attributes enable you to monitor the message traffic that is received and transmitted by the device.
Monitor Parameter Description In Srec Quenchs or Out Srec Quenchs Represents the number of ICMP source quench messages that are received/transmitted by the device. In Redirects or Out Redirects Represents the rate at which the ICMP redirect messages are received/transmitted by the device. In Echos Represents the rate at which the ICMP echo messages are received. In EchoReps or Out EchoReps Represents the rate at which the ICMP echo reply messages are received/transmitted by the device.
Monitor Figure 7-24 DNS Addresses 7.5.6 Neighbour Table : This parameter is applicable only in IPv4 and IPv6 mode, not in IPv4 only mode. The Neighbour Table contains a list of neighbouring routers and information about them. To view Neighbour Table, navigate to MONITOR > Network Layer > Neighbour Table. The Neighbour table screen appears. Figure 7-25 Neighbour Table 7.5.7 RIP Database : Applicable only in routing mode.
Monitor Figure 7-26 RIP Database 7.6 RADIUS (BSU or End Point A only) : RADIUS is applicable only to a BSU or an End Point A device. 7.6.1 Authentication Statistics Authentication Statistics provides information on RADIUS Authentication for both the primary and backup servers for each RADIUS server profile. To view Authentication statistics, navigate to MONITOR > RADIUS > Authentication Statistics.
Monitor The following table lists the Authentication Statistics parameters and their description: Parameter Description Round Trip Time Represents the round trip time for messages exchanged between RADIUS client and authentication server since the client startup. Reqs Represents the number of RADIUS access request messages transmitted from the RADIUS client to the authentication server since client startup.
Monitor Figure 7-28 Ethernet1 Multicast List 7.7.1 Ethernet or Wireless Multicast List The Multicast List table contains the IGMP Multicast IP and Multicast MAC address details for the Ethernet or Wireless interfaces. The following table lists the parameters and their description. Parameter Description Group IP Represents the IP address of the multicast group for Ethernet or Wireless interface learned by IGMP snooping.
Monitor Parameter Time Elapsed Description Represents the time elapsed since the port is marked as the router port. To view updated Router Port list, click Refresh. 7.8 DHCP DHCP Leases file stores the DHCP client database that the DHCP Server has served. The information stored includes the duration of the lease, for which the IP address has been assigned, the start and end dates for the lease, and the MAC address of the network interface card of the DHCP client.
Monitor Figure 7-31 Event Log Messages To retrieve the event log file from the device, see Retrieve From Device. The maximum size of the event log file is 65 KB. If the file size exceeds 65 KB, then all the log messages are moved to a backup file and only the recent 100 lines are displayed in the log file. When the size of the log file exceeds again then it overwrites the backup file. Backup files can be retrieved by using ‘retrieve’ CLI command.
Monitor faster solution. This feature should be used only in consultation with the Proxim Customer Support team. Once logging is enabled, the Debug Log file can be retrieved via HTTP or TFTP. To enable Debug Log, navigate to MONITOR > Logs > Debug Log. The Debug Log screen appears: Figure 7-32 Debug Log Features: Select the appropriate features to be logged. The available features are Select All, DDRS Level 1, DDRS Level 2, DDRS Level 3 and DFS.
Monitor Figure 7-33 Temperature Log • • • Current Unit Temperature: Displays the current internal temperature of the device in Celsius. High and Low Temperature Threshold: – Configure the high temperature threshold ranging from -40ºC to 60ºC. By default, it is set to 60ºC. – Configure the low temperature threshold ranging from -40ºC to 60ºC. By default, it is set to -40ºC.
Monitor 7.9.3.1 View Temperature Log To view the temperature Log, click Show Temp Log. Figure 7-34 View Temperature Log To retrieve the temperature log file from the device, see Retrieve From Device. The maximum size of the temperature log file is 65 KB. If the file size exceeds 65 KB, then all the log messages are moved to a backup file and only the recent 100 lines are displayed in the log file. When the size of the log file exceeds again then it overwrites the backup file.
Monitor 7.9.3.2 Hide Temperature Log To hide the temperature log messages, click Hide Temp Log. 7.9.3.3 Clear Temperature Log To clear the temperature log messages, click Clear Temp Log. The messages are cleared and moved to the backup file leaving the temperature log file empty. An event is generated on clearing the temperature log messages. : The current and the backed up temperature logs are stored in the flash memory and can be retrieved even after device reboot. 7.10 Tools 7.10.
Monitor 7.10.2 Scan Tool With Scan Tool, you can scan all the devices available on your network. To scan the devices, navigate to MONITOR > Tools > Scan Tool. The Scan Tool screen appears. Figure 7-36 Scanned Devices Click Scan to scan and refresh the devices on the network. : Scan Tool scans devices based on IP v4 address only. 7.10.3 sFlow® Proxim’s point-to-multipoint and point-to-point devices support sFlow® technology, developed by InMon Corporation.
Monitor • • Packet Flow Sampling: In this sampling, the data packets received on the Ethernet interface of the device are sampled based on a counter. With each packet received, the counter is decremented. When the counter reaches zero, the packet is packaged and sent to the sFlow Receiver for analysis. These packets are referred to as Packet Flow Samples. Counter Polling Sampling: In this sampling, the sFlow Agent sends counters periodically to the sFlow Receiver based on the set polling interval.
Monitor 7.10.3.1 sFlow Receiver Configuration The Receiver Configuration page allows you to configure sFlow Receiver(s), which receives samples from all agents on the network, combines and analyzes the samples to produce a report of network activity. To configure sFlow Receiver, navigate to MONITOR > Tools > sFlow and select Receiver Configuration tab. Given below is the table which explains sFlow parameters and the method to configure the configurable parameter(s): Parameter Description S.No.
Monitor Figure 7-39 sFlow Sampling Configuration 2. From the Receiver Index drop-down box, select the receiver index number associated with the sFlow Receiver to which the sFlow Agent should send the sFlow Datagrams. : If device has two Ethernet interfaces, then configure different Receiver indexes for each of the interface. 3. Type a value in the Packet Sampling Rate box.
Monitor Figure 7-40 Counter Polling Configuration 2. From the Receiver Index drop-down box, choose the receiver index number associated with the sFlow Receiver to which the sFlow Agent sends the counters. : If Packet Flow Sampling is already configured and running, then you should configure the Receiver index same as configured in the Packet Flow Sampling for each Ethernet interface. 3. Set the polling interval by typing a value in the Interval box. Lets say, the polling interval is set to 30 seconds.
Monitor 7.10.5 Spectrum Analyzer : Spectrum Analyzer is not applicable to MP-8150-CPE and QB-8150-LNK-12/50 devices. Spectrum Analyzer helps to analyze a spectrum for interference, and select a relatively low interference channel. This tool is not a replacement for the commercial Spectrum Analyzers as this is only intended to help with channel selection and diagnose performance issues. : Only an administrator user can use Spectrum Analyzer to scan the spectrum.
Monitor • When working in a high interference network, ensure to run the spectrum analyzer with multiple iterations (increase the Scan Time) to get accurate results. : • When the Spectrum Analyzer starts, the wireless link, if established, is terminated and re-established after the scan is completed. • As the wireless link is down during spectrum analysis, the remote device cannot be accessed.
Monitor Graph Results Interpretation Consider a network with a device operating on channel 122 with 20 MHz channel bandwidth. In the same vicinity, when we run the Spectrum Analyzer on a Tsunami radio it will display the results as shown in Figure 7-42. From the results, we see interfering signals on channels 115 to 129.
Monitor Figure 7-44 Selective Graph Statistics At a time, the graph represents the statistics of a maximum of 32 channels. To view the graph(s) of the remaining channels, click Next (available on the upper right corner of the graph). Click Previous to view the statistics of the previous channels. To view the tabular format of the graph statistics, click Detailed Statistics on the bottom left of the graph.
Monitor : Spectrum Analyzer configuration parameters and results are not persistent across reboots. 7.11 SNMP v3 Statistics SNMP v3 statistics can be viewed only when SNMPv3 feature is enabled on the device. See SNMP. To view the SNMPv3 Statistics, navigate to MONITOR > SNMPV3 Statistics.
Troubleshooting 8 This chapter helps you to address the problems that might arise while using our device. If the procedures discussed in this chapter does not provide a solution, or the solution does not solve your problem, check our support site at http://support.proxim.com which stores all resolved problems in its solution database. Alternatively, you can post a question on the support site, to a technical person who will reply to your email.
Troubleshooting 8.
Troubleshooting 8.2 Connectivity Issues Connectivity issues include any problem that prevents from powering or connecting to the device. Problem Does Not Boot - No LED Activity Ethernet Link Does Not Work Serial Link Does Not Work Solution • • Make sure the power source is ON. Make sure all the cables to the device are connected properly. Check the Ethernet LED • Solid Green: The Ethernet link is up. • Blinking Green: The Ethernet link is down. • • • Double-check the physical network connections.
Troubleshooting 8.3 Surge or Lightning Issues (For Connectorized devices) Problem Surge or Lighting Problem Solution In case of any lightning or surge occurrence, check for the conditions specified below: • Check the RF signals by referring to RSSI statistics and if the signal strength has been lowered considerably, replace the Surge Arrestor. • Unscrew the N-Type connector at the top and visually inspect the Surge Arrestor for electrical burns. If any, replace it. 8.
Troubleshooting Problem HTTP Interface or Telnet Does Not Work Solution • Make sure you are using a compatible browser: – Microsoft Internet Explorer 7.0 or later – Mozilla Firefox 3.0 or later : • • • Telnet CLI Does Not Work • • When working with Internet Explorer 9 in Windows 2008 Server, navigate to Internet Options -> Security -> Internet -> Custom Level -> Scripting -> Active Scripting to enable active scripting.
Troubleshooting 8.5 Application Specific Troubleshooting Problem Solution RADIUS Authentication Server Services unavailable If RADIUS Authentication is enabled on the device, then make sure that your network’s RADIUS servers are operational. Otherwise, clients will not be able to log on to the device. There are several reasons for the authentication server‘s services to be unavailable.
Troubleshooting 8.6 Wireless Link Issues Given below are the possible reasons for a wireless link not getting established and the relevant observations.
Troubleshooting Reason(s) With multiple link profiles, the wireless network performance is getting affected. Observation The overall performance of the wireless network gets affected when using multiple link profiles and atleast one of the subscriber is operating with a lower data rate. For example, consider a wireless network with a BSU and 5 SU profiles. Each SU is transmitting data at a data rate as tabulated below. As SU1 is operating at a lower data rate (6.
Troubleshooting 8.7 Wired (Ethernet) Interface Validation Problem Wired (Ethernet) Interface Validation Solution Run iperf commands • Use iperf commands with –w option as 202k.
Troubleshooting 8.8 Wireless Interface Validation Problem Wireless Interface Validation Solution Run iperf commands (You can run Embedded iperf commands only through Telnet.
Troubleshooting Problem Wireless Interface Validation Solution • • Data Rate Issues – Ensure same data rates are selected if you are using fixed data rate between BSU/SU and End Point A/End Point B to have predictable throughput and link – Alternatively, use DDRS with Auto mode enabled Performance and Stability Issues – Check the distance between two co-locating devices.
Troubleshooting S.No 2 Scenario The device is not accessible for reasons such as user has forgotten the web interface login password, Management VLAN Id is changed, wrong VLAN configuration.
Troubleshooting 8.9.2 Bootloader Mode S.No 1 Scenario Recovery Procedure The device operating image is corrupted for reasons such as power interruption while upgrading. Do one of the following: • While powering the device, press and hold the Reload button on the PoE injector (use a pin or the end of a paper clip) for 15 seconds. By doing so, the operating image will get deleted. • Use a 4-pair (Gigabit) cross over Ethernet cable between the PoE and the device.
Troubleshooting Preparing to Download the Device Image Before starting the download process, you need to know the device IP Address, Subnet Mask, the TFTP Server IP Address, and the Image file name. Make sure the TFTP server is running and properly configured to point to the folder containing the image to be downloaded. Download Procedure Follow these steps to download a software image to the device by using ScanTool: 1. 2. 3. 4. Download the latest software from http://support.proxim.
Troubleshooting The terminal display shows Power On Self Tests (POST) activity. After approximately 30 seconds, a message indicates: Starting ScanTool interface, press any key to enter CLI 5”. After this message appears, press any key. Now the bootloader prompt appears as below: Bootloader=> 5.
Troubleshooting • • • • Data Bits: 8 Stop Bits: 1 Flow Control: None Parity: None The terminal display shows Power On Self Tests (POST) activity, and then displays the software version. It prompts you to enter the CLI username and password. The commands to enter the username and password are as follows: #################################################| # +-++-++-++-++-++-+ # |p||r||o||x||i||m| # +-++-++-++-++-++-+ # Version: 1.0.
Troubleshooting When a proper IP address is set, use HTTP interface or Telnet to configure the rest of the operating parameters of the device. 8.10 Spectrum Analyzer The ultimate way to discover whether there is a source of interference is to use a Spectrum Analyzer. Usually, the antenna is connected to the analyzer when measuring. By turning the antenna 360°, one can check the direction of the interference. The analyzer will also display the frequencies and the level of signal is detected.
Feature Applicability A Given below are the feature(s) applicable to the respective point-to-point devices: Tsunami ® 8000 Series - Software Management Guide 270
Feature Applicability Given below are the feature(s) applicable to the respective point-to-multipoint devices: Tsunami ® 8000 Series - Software Management Guide 271
B Parameters Requiring Reboot Given below are the parameters that require the device to reboot.
Parameters Requiring Reboot Parameter(s) Web Page(s) Applicable Device Mode* Wireless Properties Channel Bandwidth BASIC CONFIGURATION ADVANCED CONFIGURATION -> Wireless -> Interface1 -> Properties All Channel Offset ADVANCED CONFIGURATION -> Wireless -> Properties Applicable only to, • MP-8160-BSU • MP-8160-BS9 • MP-8160-SUA • MP-8160-CPE • MP-8150-CPE • QB-8150-LNK-12/50 Auto Channel Selection BASIC CONFIGURATION ADVANCED CONFIGURATION -> Wireless -> Interface1 -> Properties Applicable only to
Parameters Requiring Reboot Parameter(s) Web Page(s) Applicable Device Mode* SNMP (If SNMP v1-v2c is enabled) SNMP All Version All Read Password All Read / Write Password MANAGEMENT -> Services -> SNMP SNMP Trap Host Table All All SNMP (If SNMP v3 is enabled) SNMP All Version All Security Level All Priv Protocol Priv Password All MANAGEMENT -> Services -> SNMP All Auth Protocol All Auth Password All SNMP Trap Host Table All Telnet / SSH Admin Password All Monitor Password All
Parameters Requiring Reboot Parameter(s) Convert QB to MP Web Page(s) MANAGEMENT -> Convert QB to MP Applicable Device Mode* Applicable only to • QB-8100-EPA/LNK • QB-8150-EPR/LNK • QB-8150-LNK-100 • QB-8200-LNK * BSU: Refers to a Base Station SU Mode: Refers to both SU and CPE End Point A Mode: Refers to a device in End Point A mode End Point B Mode: Refers to a device in End Point B mode Tsunami ® 8000 Series - Software Management Guide 275
Frequency Domains and Channels C Introduction The Tsunami® point-to-point and point-to-multipoint products are available in two SKUs: United States (US) and rest of the World (WD) markets. Depending on the SKU, the device is hard programmed at factory per the regulatory domain. Regulatory domain controls the list of frequency domains that are available in that SKU. Further each frequency domain will define the country specific regulatory rules and frequency bands.
Frequency Domains and Channels Point to Multipoint Devices Product(s) MP-8100-BSU MP-8100-SUA United States 5 GHz - US* 1 United States 5.8 GHz - US* 2 United States 2.4 GHz - US* 3 World 5 GHz 4 World 4.9 GHz 5 World 2.4 GHz 6 World 2.3 GHz 7 World 2.5 GHz 8 Canada 5 GHz 9 WD Europe 5.8 GHz 10 WD Europe 5.4 GHz 11 WD-Europe 2.4 GHz 12 Russia 5 GHz 13 Taiwan 5 GHz 14 WD United States 5 GHz 15 Canada 5.8 GHz 16 World 6.4 GHz 17 Japan 4.9 GHz 19 WD UK 5.
Frequency Domains and Channels Point to Point Devices Product(s) QB-8100-EPA/LNK United States 5 GHz - US* 1 United States 5.8GHz - US* 2 United States 2.4 GHz - US* 3 World 5 GHz 4 World 4.9 GHz 5 World 2.4 GHz 6 World 2.3 GHz 7 World 2.5 GHz 8 Canada 5 GHz 9 WD-Europe 5.8 GHz 10 WD-Europe 5.4 GHz 11 WD-Europe 2.4 GHz 12 Russia 5 GHz 13 Taiwan 5 GHz 14 WD United States 5 GHz 15 Canada 5.8 GHz 16 World 6.4 GHz 17 Japan 4.9 GHz 19 UK 5.8 GHz 20 World 5.9 GHz US2 (5.
Frequency Domains and Channels * Applicable to US SKU only # US SKU is not applicable to QB-8150-LNK-12 When the device is configured by using CLI or SNMP, care has to be taken to set the domains by using a predefined ENUM value. Example: The CLI commands to set WORLD 5 GHz as frequency domain are as follows: T8000-C1:65:7E(config)# system-configure T8000-C1:65:7E(config-sysconfig)# network-mode bridge Changes in Network mode requires Reboot.
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) WD-Europe 2.4 GHz 2412 ~ 2472 Allowed Channels (Center Frequency in GHz) 5 MHz 1 (2412), 2 (2417)... 12 (2467), 13 (2472). 10 MHz 1 (2412), 2 (2417)... 12 (2467), 13 (2472). 20 MHz 40 PLUS MHz (Upper Extension) 40 MINUS MHz (Lower Extension) 1 (2412), 2 (2417)... 12 (2467), 13 (2472). 1 (2412), 2 (2417)... 8 (2447), 9 (2452). 5 (2432), 6 (2437)... 12 (2467), 13 (2472). 1 (2412), 2 (2417)...
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) United States2 (5.3, 5.8 GHz) 5260 ~ 5320 (DFS) 5745 ~ 5825 (Non-DFS) - - United States 4.9 GHz 4942 ~ 4987 (Non-DFS) 5(4942.5), 15(4947.5)... 85(4982.5), 95(4987.5). 10(4945), 20(4950)... 80(4980), 90(4985). 5 MHz 10 MHz 20 MHz 40 PLUS MHz (Upper Extension) 40 MINUS MHz (Lower Extension) 52(5260), 53(5265)... 63(5315), 64(5320).
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz (Upper Extension) 40 MINUS MHz (Lower Extension) World 5.9 GHz 5880 ~ 5920 (Non-DFS) 176(5880), 177(5885)... 183(5915), 184(5920). 176(5880), 177(5885)... 183(5915), 184(5920). 177(5885), 178(5890)... 182(5910), 183(5915).
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz (Upper Extension) 40 MINUS MHz (Lower Extension) India 5.8 GHz 5830 ~ 5870 (Non-DFS) 166(5830), 167(5835)... 173(5865), 174(5870). 166(5830), 167(5835)... 173(5865), 174(5870). 167(5835), 168(5840)... 172(5860), 173(5865). 167(5835) 168(5840) 169(5845) 171(5855) 172(5860) 173(5865) Canada 5.
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Legacy 5GHz 5150 ~ 6080 (Non-DFS) Please note that 8200 SKUs support upto 5920 MHz frequency. Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz (Upper Extension) 40 MINUS MHz (Lower Extension) 30(5150), 31(5155)... 215(6075), 216(6080). 30(5150), 32(5160)... 214(6070), 216(6080). 30(5150), 34(5170)... 210(6050), 216(6070). - - WD-Japan 4.
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz (Upper Extension) 40 MINUS MHz (Lower Extension) EU SKU U.K 5.8 GHz 5735 ~ 5785 (DFS) 5835 (DFS) - - 147(5735), 148(5740)... 156(5780), 157(5785). 167(5835) 147(5735), 148(5740)... 152(5760), 153(5765). 151(5755), 152(5760)... 156(5780), 157(5785). Europe 5.8 GHz 5745 ~ 5865 (DFS) - - 149(5745), 150(5750)...
Frequency Domains and Channels 6.4 GHz Channels Frequency Domain World 6.4 GHz Frequency Band (Start Frequency ~ End Frequency in MHz) 5905 ~ 6420 Allowed Channels (Center Frequency) 5 MHz 181 (5905), 182 (5910)... 283 (6415), 284 (6420). 10 MHz 181 (5905), 182 (5910)... 283 (6415), 284 (6420). 20 MHz 40 PLUS MHz (Upper Extension) 40 MINUS MHz (Lower Extension) 182 (5910), 183 (5915)... 282 (6410), 283 (6415). 182 (5910), 183 (5915)... 278 (6390), 279 (6395). 186 (5930) 187 (5935)...
Frequency Domains and Channels For 40 MINUS • 2.
LACP - Device Management D Tsunami® QuickBridge devices that are part of the LACP link cannot be managed through the switches, so it is recommended to use the second Ethernet port for management. : • When using second Ethernet port for management, ensure to disable Auto Shutdown for Ethernet2. See Auto Shutdown). • STP/LACP Frames should be set to passthru.
LACP - Device Management In this example, we have considered a network with two QuickBridge links each supporting LACP mode. In this setup, VLAN is not configured on both LACP switches and devices. The Ethernet1 of all the devices is connected to the LACP port and is used for data transfer. To manage the devices, use a dedicated management Personal Computer per QuickBridge link. Use Ethernet2 port of the device to connect the Personal Computer.
E QinQ The Subscribers and End Point devices support QinQ VLAN feature that enables service providers to use a single VLAN ID to support multiple customer VLANs by encapsulating the 802.1Q VLAN tag within another 802.1Q frame.
QinQ • Device Management – From the BSU Ethernet side, the BSU/SU can be managed with a single VLAN tagged packet that matches the Management VLAN ID. – From the SU Ethernet side, only SU can be managed with a single VLAN tagged packet that matches the Management VLAN ID; BSU cannot be managed from the SU Ethernet side. : • • In a QuickBridge link, Q-in-Q should be enabled either on an End Point A or an End Point B. The user configurable TPID is only used in the Service Provider VLAN tag.
F Bootloader CLI and ScanTool Bootloader CLI The Bootloader CLI is a minimal subset of the normal CLI that is used to perform initial configuration of the device. The Bootloader CLI is available when the device embedded software is not running.
Bootloader CLI and ScanTool To Load the Firmware from the Network • Use the show command to view the parameters and their values, and use the set command to set the parameter value. To Load the Firmware by using Dynamic IP Parameters 1. Set the ipaddrtype to dynamic 2. Run the BOOTP and TFTP Servers followed by device reboot When the device reboots, the device gets the IP Address and Boot filename from the BOOTP server. You need not change any of the default Bootloader parameters.
G SNR Information Given below are the SNR values for the following devices: • • • • • • • MP-8100-BSU MP-8100-SUA MP-8150-SUR MP-8150-SUR-100 QB-8100-EPA/LNK QB-8150-EPR/LNK QB-8150-LNK-100 2.4 GHz MCS Index Modulation No of Streams 5 MHz Data Rate Min SNR 10 MHz Max SNR Data Rate Min SNR 20 MHz Max SNR Data Rate Min SNR 40 MHz Max SNR Data Rate Full Short Min SNR Max SNR MCS0 BPSK 1/2 Single 1.6 10 86 3.3 10 86 6.5 12 86 13.5 15 26 80 MCS1 QPSK 1/2 Single 3.
SNR Information 5 GHz MCS Index Modulation No of Streams 5 MHz Data Rate Min SNR 10 MHz Max SNR Data Rate Min SNR 20 MHz Max SNR Data Rate Min SNR 40 MHz Max SNR Data Rate Full Short Min SNR Max SNR MCS0 BPSK 1/2 Single 1.6 6 86 3.3 7 86 6.5 6 86 13.5 15 9 80 MCS1 QPSK 1/2 Single 3.3 8 86 6.5 8 86 13 9 86 27 30 11 80 MCS2 QPSK 3/4 Single 4.9 10 84 9.7 13 84 19.5 11 84 40.5 45 15 79 MCS3 16 QAM 1/2 Single 6.
SNR Information 2.4 GHz 5 MHz Modulation 5 GHz 10 MHz 20 MHz 5 MHz 10 MHz 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Min SNR Max SNR Min SNR Max SNR Min SNR Max SNR 64QAM 2/3 12 27 81 24 29 76 48 28 73 24 80 24 80 24 78 64QAM 3/4 13.
SNR Information Given below are the SNR values for the following device(s) in legacy mode: • MP-8150-CPE 5 GHz 5 MHz Modulation 10 MHz 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR BPSK 1/2 1.5 7 81 3 7 81 6 7 81 BPSK 3/4 2.25 8 81 4.5 8 81 9 8 81 QPSK 1/2 3 9 80 6 9 80 12 9 79 QPSK 3/4 4.
SNR Information 6.4 GHz MCS Index Modulation No of Streams 5 MHz Data Rate Min SNR 10 MHz Max SNR Data Rate Min SNR 20 MHz Max SNR Data Rate Min SNR 40 MHz Max SNR Data Rate Full Short Min SNR Max SNR MCS11 16 QAM 1/2 Dual 13 16 80 26 17 80 52 17 78 108 120 18 74 MCS12 16 QAM 3/4 Dual 19.5 20 74 39 23 74 78 20 71 162 180 22 56 MCS13 64 QAM 2/3 Dual 26 25 70 52 24 66 104 24 65 216 240 25 55 MCS14 64 QAM 3/4 Dual 29.3 27 66 58.
SNR Information Given below are the SNR values for the following device(s) in legacy mode: • • • MP-8200-BSU / SUA MP-8250-BS9 / BS1 MP-8250-SUR 4.900 - 5.925 GHz 10 MHz 5 MHz Modulation 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR BPSK 1/2 1.5 7 80 3 7 80 6 8 79 BPSK 3/4 2.25 8 80 4.5 9 79 9 9 77 QPSK 1/2 3 10 79 6 10 77 12 10 76 QPSK 3/4 4.
H Abbreviations A ACL Access Control List ACS Automatic Channel Selection AES Advanced Encryption Standard ALG Application Level Gateway ARP Address Resolution Protocol ATPC Adaptive Transmit Power Control B BSU Base Station Unit C CCP Compression Control Protocol CHAP Challenge Handshake Authentication Protocol CLI Command Line Interface CIR Committed Information Rate CPE Customer Premises Equipment CRC Cyclic Redundancy Check D DDRS Dynamic Data Rate Selection DES Data Encryp
Abbreviations FCS Frame Check Sequence G Gbps Gigabit Per Second GPL General Public License GRE Generic Routing Encapsulation H HTTP HyperText Transfer Protocol HTTPS HyperText Transfer Protocol Secure I IANA Internet Assigned Numbers Authority (IANA) IC Industry Canada ICMP Internet Control Message Protocol IGMP Internet Group Management Protocol ISP Internet Service Provider ITS Intelligent Transportation System L LACP Link Aggregation Control Protocol LAN Local Area Network L
Abbreviations N NAPT Network Address Port Translation NAT Network Address Translation NCP Network Control Protocol NBD Next Business Day NMS Network Management System NOP Non Occupancy Period P PAP Password Authentication Protocol PC Personal Computer PoE Power Over Ethernet PPPoE Point-to-point Protocol over Ethernet PTMP Point-to-multipoint PTP Point-to-point PVES ProximVision ES Q QB QuickBridge QoS Quality of Service R RADIUS Remote Authentication Dial In User Service RA
Abbreviations STP Spanning Tree Protocol SU Subscriber Unit T TBC Text Based Configuration TCP Transmission Control Protocol TFTP Trivial File Transfer Protocol TKIP Temporal Key Integrity Protocol TPC Transmit Power Control TPID Tag Protocol Identifier TTL Time to Live U UDP User Datagram Protocol UTP Unshielded Twisted Pair V VLAN Virtual Local Area Network W WEP Wired Equivalent Privacy WORP Wireless Outdoor Router Protocol Tsunami ® 8000 Series - Software Management Guide 3
Lightning Protection I Lightning protection is used to maximize the reliability of the communications equipment by safely re-directing current from a lightning strike or a power surge traveling along the Cat 5/Cat5e/Cat 6 Ethernet cabling to the ground using the shortest path possible. Designing a proper grounding system prior to installing any communications equipment is critical to minimize the possibility of equipment damage, void warranties, and cause serious injury.
Statement of Warranty J Warranty Coverage Proxim Wireless Corporation warrants that its products are manufactured solely from new parts, conform substantially to specifications, and will be free of defects in material and workmanship for a Warranty Period of 1 year from the date of purchase.
Statement of Warranty Calls to the Customer Service Center for reasons other than product failure will not be accepted unless Buyer has purchased a Proxim Wireless Service Contract or the call is made within the warranty period. After the warranty period, Technical Support is fee based (detailed in Technical Services and Support).
Technical Services and Support K Obtaining Technical Service and Support If you are having trouble using the Proxim product, please read this guide and the additional documentation provided with your product.
Technical Services and Support Telephone Support Contact technical support via telephone as follows: • • USA and Canada Customers — Phone: +1-408-383-7700; +1-866-674-6626 — Business Hours: 24x7 live response. Tier 3 support: 8 a.m. to 5 p.m. M-F PDT (UTC/GMT -7 hrs) International Customers — Phone: +1-408-383-7700; 0800-916475 (France); 8-800-100-9485 (Russia) — Business Hours: 24x7 live response. Tier 3 support: 8 a.m. to 5 p.m.
Technical Services and Support * if units are out of standard warranty • 8 x 5 Enhanced ServPak – 8 x 5 Technical Support – Software Maintenance – Advanced Hardware Replacement – Extends Warranty* – Knowledge Base Access – Priority Queuing * if units are out of standard warranty ServPak Standalone Services • • Extended Warranty ServPak Advance Hardware Replacement ServPak Proxim Warranty vs.
Technical Services and Support Technical Support for Current Products after Warranty Period After the warranty period, technical support on products then being sold by Proxim will be based upon one of the following three options Customers can choose: • • • Customers can choose to purchase one of Proxim’s ServPak extended warranty and enhanced support packages for the product Customers can choose to purchase one-time per-incident technical support for the product for a fee Customers can choose to call the