User manual

AP User Manual
January 2004
Software Release 4.1
TABLE OF CONTENTS
1
WELCOME ................................................................................................................................11
1.1 Feedback.........................................................................................................................11
1.2 Technical Support ...........................................................................................................11
2 ABOUT THIS DOCUMENT.......................................................................................................12
2.1 Intended Use...................................................................................................................12
2.2 New in This Issue............................................................................................................12
2.3 Additional Feature Information........................................................................................13
3 SYSTEM OVERVIEW ...............................................................................................................14
3.1 Module-to-Module Communications ...............................................................................14
3.2 Types of AP Applications ................................................................................................14
3.3 Synchronization...............................................................................................................16
3.3.1 Unsynchronized Modules ..................................................................................16
3.3.2 Passing Sync .....................................................................................................16
3.4 Wiring ..............................................................................................................................18
4 ADVANCED FEATURES..........................................................................................................19
4.1 Security Features ............................................................................................................19
4.1.1 BRAID................................................................................................................19
4.1.2 DES Encryption .................................................................................................19
4.1.3 AES Encryption..................................................................................................19
4.1.4 AES-DES Operability Comparisons ..................................................................19
4.2 Bandwidth Management .................................................................................................20
4.2.1 Bandwidth and Authentication Manager (BAM) ................................................20
4.2.2 Recharging Buckets ..........................................................................................21
4.2.3 Subscriber Module Perspective.........................................................................21
4.2.4 Interaction of Burst Data and Sustained Data Settings.....................................21
4.3 High-Priority Bandwidth...................................................................................................22
4.3.1 High Priority Uplink Percentage.........................................................................23
4.3.2 UAcks Reserved High .......................................................................................23
4.3.3 DAcks Reserved High .......................................................................................23
4.3.4 NumCtlSlots Reserved High..............................................................................23
4.3.5 Allocations to Downlink and Uplink....................................................................23
4.4 Branding ..........................................................................................................................24
4.5 Denying All Remote Access............................................................................................26
4.6 Reinstating Remote Access Capability ...........................................................................26
4.7 SNMP..............................................................................................................................26
4.7.1 Agent .................................................................................................................27
4.7.2 Managed Device................................................................................................27
4.7.3 NMS...................................................................................................................27
4.7.4 Dual Roles .........................................................................................................27
4.7.5 SNMP Commands .............................................................................................27
4.7.6 Traps..................................................................................................................27
4.7.7 MIBS ..................................................................................................................28
4.7.8 MIB-II .................................................................................................................29
4.7.9 Canopy Enterprise MIB .....................................................................................29
Issue 5 Page 6 of 102