Tsunami® 8100 Series (Point-to-point and Point-to-multipoint Products) Software Management Guide Products Covered Tsunami® MP-8100-BSU / MP-8100-WD-HP - Tsunami® MP-8100-SUA / MP-8100-WD-HP - Tsunami® MP-8150-SUR / MP-815-WD-HP - Tsunami® MP-8150-CPE Tsunami® MP-8160-BSU - Tsunami® MP-8160-SUA - Tsunami® MP-8160-CPE Tsunami® QB-8100-EPA Tsunami® QB-8100-LNK Tsunami® QB-8150-EPR Tsunami® QB-8150-LNK Tsunami® QB-8150-LNK-12/50
Copyright © 2011 Proxim Wireless Corporation, Milpitas, CA. All rights reserved. Covered by one or more of the following U.S. patents: 5,231,634; 5,875,179; 6,006,090; 5,809,060; 6,075,812; 5,077,753. The content described herein are copyrighted with all rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means without the written permission of Proxim Wireless Corporation.
Contents Preface. . . 1 2 3 8 Overview . . . ........................................................................................................................................ 10 About Tsunami® 8100 Products . 10 Wireless Network Topology . 11 Point-to-Multipoint (PTMP). . . 11 Point-to-Point Link . . . 14 Multiple-Input-Multiple-Output (MIMO) . . . . 17 Wireless Outdoor Router Protocol (WORP) . . . . 17 Management and Monitoring Capabilities . . . .....................................
Wireless Outdoor Router Protocol (WORP). . . Wireless Interface Properties . . . MIMO Properties . . . 44 49 57 Dynamic Frequency Selection (DFS) . . . DDRS. . . 59 64 Security . . . Wireless Security . . . RADIUS . . . MAC ACL . . . Quality of Service (QoS) . . . QoS Concepts and Definitions . . . QoS Configuration . . . QoS Configuration for a Management Station . . . 68 71 73 . 74 74 79 96 RADIUS Based SU QoS Configuration . 100 VLAN (Bridge Mode Only) . . . .
File Management . . . 150 Text Based Configuration (TBC) File Management . . . Upgrade Firmware. . . Upgrade Configuration . . . Retrieve From Device . . . 151 153 154 156 Services . . . 7 . 150 TFTP Server . . . . 159 HTTP/HTTPS. . . 159 Telnet/SSH . . . 160 SNMP . . . Logs . . . 162 165 Simple Network Time Protocol (SNTP) . 167 Access Control . 169 Reset to Factory . . . . 170 Convert QB to MP . . . . 171 Monitor . . . 173 Interface Statistics . 173 Ethernet Statistics . . .
DHCP . . . . 194 Logs . 195 Event Log . . . 195 Syslog . . . Debug Log . . . Temperature Log . . . 196 196 197 Tools 8 . 198 Wireless Site Survey. . . 198 Scan Tool. . . sFlow® . . . Console Commands . . . 199 199 204 SNMP v3 Statistics . . . . 204 Troubleshooting . . . 205 PoE Injector . . . . 206 Connectivity Issues . 206 Surge or Lightning Issues (For Connectorized devices) . 207 Setup and Configuration Issues . . . . 208 Application Specific Troubleshooting .
F Lightning Protection . . . .......................................................................................... 237 G Abbreviations . . . 238 H Statement of Warranty . . . ..................................................................................... 242 I Technical Services and Support. . . .......................................................................
Preface Preface This chapter contains information on the following: • • About this Guide Products Covered • • • • Audience Prerequisites Related Documents Documentation Conventions About this Guide This manual gives a jump-start working knowledge on the Tsunami® 8100 products. It explains the step-by-step procedure to configure, manage and monitor these products by using Web Interface.
Preface Related Documents In addition to this guide, you can refer to the following documents that are available on the Proxim’s support site http://support.proxim.com. • • • • • Quick Installation Guide (QIG) - A quick reference guide that provides essential information to install and configure the device. Hardware Installation Guide - A guide that provides an overview about the Tsunami® products, their installation methods and hardware specifications.
1 Overview This chapter contains information on the following: • • • • About Tsunami® 8100 Products Wireless Network Topology - Point-to-Multipoint (PTMP) - Point-to-Point Link Multiple-Input-Multiple-Output (MIMO) Wireless Outdoor Router Protocol (WORP) 1.1 About Tsunami® 8100 Products Proxim’s Tsunami® 8100 product series, consists of point-to-point and point-to-multipoint devices that are designed to provide wireless networking solutions to enterprises and business markets.
Overview Tsunami® MP-8160-CPE The Tsunami® MP-8160 Customer Premises Equipment comes with a single high power 2x2 MIMO radio and 15 dBi integrated dual-polarized panel antenna operating in 5.9 - 6.4 GHz frequency band. Tsunami® QB-8100-EPA The Tsunami® QB-8100-EPA QuickBridge operates in 2.3 - 2.5 and 4.9 - 6.0 GHz frequency bands. This connectorized device comes with a 3x3 MIMO radio and three N-Type connectors to connect external antennas.
Overview Listed below are the applications, where Proxim’s Point-to-multipoint devices can be used: • Last Mile Access: Competitive broadband service access alternative to Digital Subscriber Line (DSL) or cable for residences and T1 or Ethernet for businesses. • Security and Surveillance: High definition IP-surveillance cameras for monitoring city streets, airports, bridges, seaports, transportation hubs, offices and warehouses.
Overview • Metropolitan Area Network: Secure and reliable connectivity between city buildings. • Enterprise Campus Connectivity: Extend the main network to remote offices, warehouses or other buildings without leased lines.
Overview • Offshore Communications: Establishes connectivity between seashore and the ships that are nearing the port locations, or connectivity between off-shore oil rigs and sea shore and so on. • Wireless Intelligent Transportation System (ITS): Increases the traffic efficiency and reduces the commuting time in cities and metropolitan areas. 1.2.2 Point-to-Point Link A point-to-point link is a dedicated wireless link that connects only two stations.
Overview Figure 1-1 Point-to-Point-Link Listed below are the applications, where Proxim’s Point-to-Point devices can be used: • Backhaul to a Central POP: Avoids expensive installation and recurring charge of a second wireline backhaul to a remote virtual POP.
Overview • Repeater: Extends distance or overcomes path blockage by adding point-to-point hops • High-bandwidth Last Mile Access: Delivers Transparent LAN Services (TLS) to corporate parks. • High Availability and Link Aggregation: Achieves high availability and link aggregation in wireless medium by using two parallel links and additional Link Aggregation Control Protocol (LACP) capable switches. This is applicable only for QB-8100-EPA/LNK and QB-8150-EPR/LNK devices.
Overview • • Leased Line Redundancy: Eliminates recurring DS-3 leased line charges with one time installation charge of a QuickBridge link. Inter-POP Redundancy: Avoids downtimes caused by a wireline backhaul failure by adding a QuickBridge link as an inter-POP redundancy. 1.
Overview • • • Quality of Service: WORP ensures that the most important data arrives with priority by differentiating between priorities of traffic as defined in the profiles for QoS (Quality of Service), similar to the 802.16 WiMAX QoS standard definition. Bandwidth Control: WORP allows service providers to control network bandwidth, protecting the network from excessive bandwidth use by any one station. Additionally, it allows service providers to differentiate their service offerings.
Management and Monitoring Capabilities 2 A Network administrator can use the following interfaces to configure, manage and monitor the devices. • • • Web Interface Command Line Interface Simple Network Management Protocol (SNMP) • ProximVision ES (PVES) 2.1 Web (HTTP/HTTPS) Interface The Web interface (HTTP) provides easy access to configuration settings and network statistics from any computer on the network.
Management and Monitoring Capabilities 2.2.2 Telnet You can access the device through CLI by using Telnet. With Telnet, you can communicate with the device through LAN (switch, hub and so on), the Internet, or with an Ethernet cable connected directly to your computer’s Ethernet port. 2.2.3 Secure Shell (SSH) You can securely access the device through CLI by using Secure Shell (SSH). The device supports SSH version 2, for secure remote CLI (Telnet) sessions.
Device Initialization 3 This chapter contains information on the following: • • • Initialization — ScanTool — Initialize Device using ScanTool — Modifying the IP Address of the Device using ScanTool Logging onto the Web Interface — Home Page — COMMIT — REBOOT Factory Default Configuration 3.1 Initialization Once the device installation completes, you can access the device either through Command Line Interface, Web Interface or an SNMP Interface.
Device Initialization : ScanTool works only for Proxim devices. Also note that you may need to disable Windows Firewall (or add an exception) for ScanTool to function or to detect the radio. 3.1.2 Initialize Device using ScanTool To scan and locate the devices on a network by using ScanTool, do the following: 1. Power on, or reset the device. 2. To download Proxim’s ScanTool, log on to Proxim’s support site at http://support.proxim.com and search for ScanTool with (Answer ID 1735).
Device Initialization 3.1.3 Modifying the IP Address of the Device using ScanTool To modify the IP address of a device using ScanTool, select the device from the scan list and click Change. A Change screen appears as shown in the following figure. The system automatically populates the MAC Address, System Name, TFTP Server IP Address and Image File Name of the device, which are read-only. Figure 3-2 Modifying Device’s IP Address 1. Select the IP Address Type as either static or dynamic.
Device Initialization Figure 3-3 Login Screen Based on the access credentials, two types of users can access the device. They are, 1. Administrator User: The Administrator user administers the entire device. This user type has the write access to all the features of the device and also has the privilege to change his or her own password and that of the Monitor user (the other user type). To change the password, refer to Services. 2.
Device Initialization 3.2.1 Home Page Upon successful logon, the device home page appears. Figure 3-4 Home Page The home page contains the following information: • Device Description: The device description is displayed on the top-right corner of the home page. It displays the logged in user type and the device name along with the latest firmware version.
Device Initialization 3.2.2 COMMIT COMMIT operation is used to apply the configuration changes onto the device. When changes are made to the configuration parameters of the device, the changes will not take effect, until COMMIT is clicked. Some parameters may require system reboot for the changes to take effect. On clicking COMMIT, the system evaluates all the configuration dependencies and displays the configuration status.
Device Initialization 3.2.3 REBOOT Reboot operation is required for any change in the key parameters to take effect. For example, settings such as configuring the Radio Mode, IP Address, and Network Mode need reboot to take effect. It is recommended that the device must be rebooted immediately after modifying a rebootable parameter. On clicking Reboot, system displays a confirmation window, as shown below.
Device Initialization Parameter BSU Mode/ End Point A SU Mode/ End Point B RADIUS Profile Enabled with profile name “Default Radius” Not Applicable MAC Authentication Disabled Not Applicable RADIUS MAC Authentication Disabled Not Applicable Channel Bandwidth 20 MHz 20 MHz Active Channel Selection Disabled Enabled ATPC Enabled Enabled Network Secret Public Public QoS Unlimited BE Not Applicable Management VLAN Disabled Disabled VLAN Status Disabled Disabled VLAN Mode (Ethern
4 Basic Configuration The BASIC CONFIGURATION tab provides a one-place access to a minimum set of configuration parameters to quickly set up a Point-to-point or Point-to-multipoint network. To configure basic parameters of the device, click BASIC CONFIGURATION tab.
Basic Configuration Figure 4-2 Basic Configuration (SU) Tsunami® 8100 Series - Software Management Guide 30
Basic Configuration Figure 4-3 Basic Configuration (End Point B) Tabulated below is the table which explains Basic parameters and the method to configure the configurable parameter(s): Parameter System Name Description Represents the system name of the device. By default, the system name is System-Name. You can change the system name to the desired one. Please note that the length of the name is limited to 64 characters.
Basic Configuration Parameter Frequency Domain Description This parameter specifies the country of operation, permitted frequency bands and regulatory rules for that particular country or domain. When you choose a frequency domain, the Dynamic Frequency Selection (DFS) and Automatic Transmit Power Control (ATPC) features are enabled automatically if the selected country and band has a regulatory domain that requires it.
Basic Configuration Parameter Description DDRS Status Applicable only when Dynamic Data Rate Selection (DDRS) is enabled on the device. It indicates that DDRS is enabled on the device. See DDRS. Tx Rate Applicable only when Dynamic Data Rate Selection (DDRS) is disabled on the device. This parameter represents the data transmission rate of the device. You can configure the appropriate data rate based on the signal level. : A change in Channel Bandwidth will reset the Tx Rate to default value.
5 Advanced Configuration The ADVANCED CONFIGURATION tab provides a means to configure the following advanced features of the device: • • • • • • • System Network Ethernet Wireless Security Quality of Service (QoS) RADIUS Based SU QoS Configuration • • • • • • VLAN (Bridge Mode Only) RADIUS Based SU VLAN Configuration Filtering (Bridge Only) DHCP IGMP Snooping Routing Mode Features 5.1 System The System tab enables you to configure system specific information.
Advanced Configuration Parameter Description Frequency Domain A valid frequency domain must be set before the device can be configured with any other parameters. Selecting a frequency domain makes the device compliant with the allowed frequency bands and channels for that regulatory domain. See Frequency Domain. Network Mode The device can be configured in two network modes: Bridge and Routing. By default, the network mode is Bridge mode.
Advanced Configuration Figure 5-2 Bridge Mode If the network mode of the device is configured in Routing mode, then the following screen appears: Figure 5-3 Routing Mode 5.2.1 IP Configuration (Bridge Mode) To configure the IP parameters of the device when operating in Bridge mode, navigate to ADVANCED CONFIGURATION > Network > IP Configuration.
Advanced Configuration Parameter Address Type Description Specifies whether the Ethernet interface parameters are to be configured through Dynamic Host Configuration Protocol (DHCP) or to be assigned statically. By default, the address type is set to Static meaning which the user can manually configure the network parameters. Select Dynamic to configure the device as a DHCP client. If Dynamic is selected, the device obtains the IP parameters from a network DHCP server automatically during the bootup.
Advanced Configuration Parameter Secondary IP Address Description Represents the IP address of the Secondary DNS Server. When the address type is set to Dynamic, this parameter is read-only and displays the DNS Secondary IP Address obtained from the DHCP server. If the address type is set to Static then you will have to manually enter the secondary IP Address. After configuring the required parameters, click OK, COMMIT and then REBOOT. 5.2.
Advanced Configuration Parameter IP Address Description Represents the IP address of the Ethernet interface. By default, the static IP address for Ethernet1 is set to 169.254.128.132 and for Ethernet2 it is set to 169.254.129.132. You can manually change the IP address. Subnet Mask Represents the subnet mask of the Ethernet interface. By default, the static subnet mask is set to 255.255.255.0. You can manually change the subnet mask.
Advanced Configuration 5.2.3 IP Configuration (Routing Mode with PPPoE Client Enabled) : IP Configuration in Routing mode with PPPoE client enabled is applicable only in SU mode. See PPPoE End Point (SU Only) To configure the IP parameters of the device when configured in Routing mode with PPPoE client enabled, navigate to ADVANCED CONFIGURATION > Network.
Advanced Configuration Parameter Description Wireless (PPPoE) Address Type This parameter specifies whether the wireless interface parameters are to be configured through PPPoE server or to be assigned statically. By default, the address type is set to PPPoE-ipcp meaning which the PPPoE client obtains the IP parameters from a network PPPoE server automatically during the bootup. To manually configure the PPPoE Client’s IP settings, select Static.
Advanced Configuration 5.3 Ethernet The Ethernet tab allows you to view and configure the Ethernet interface properties of the device. 5.3.1 Basic Ethernet Configuration To view and perform basic Ethernet configuration, navigate to ADVANCED CONFIGURATION > Ethernet.
Advanced Configuration Parameter Description Operational Tx Mode Displays the current operational transmission mode of the Ethernet interface. It supports two types of transmission modes: • Half Duplex: Allows one-way data transmission at a time. • Full Duplex: Allows two-way transmission simultaneously. Speed And TxMode Enables the user to select the speed and transmission mode of the Ethernet interface. By default, it is set to Auto.
Advanced Configuration Tabulated below is the table which explains Advanced Ethernet parameters and the method to configure the configurable parameter(s): Parameter Auto Shutdown Description This parameter facilitates LACP capable Ethernet switches to use two Quick Bridge links to achieve higher throughput and redundancy. By default, it is Disabled. If Auto Shutdown is enabled on the Ethernet Interface, then the Ethernet port will be automatically disabled, when the wireless link goes down.
Advanced Configuration Figure 5-9 WORP Configuration Tabulated below is the table which explains WORP parameters and the method to configure the configurable parameter(s): Parameter Description Mode Represents the device type (BSU, SU, End Point A or End Point B) BSU Name Applicable only to SU. It specifies the name of the BSU to which a SU can establish wireless connection. If this parameter is left blank, SU can establish a link with any BSU. End Point A Name Applicable only in End Point B mode.
Advanced Configuration Parameter Max SUs Description Represents the maximum number of SUs that can register with a BSU. The maximum SUs are limited to the licensed number of SUs. : Applicable only in BSU mode. WORP MTU WORP MTU (Maximum Transmission Unit) is the largest size of the data payload in wireless frame that can be transmitted. The MTU size can range from 350 to 3808 bytes for High throughput modes and 350 to 2304 bytes for legacy mode.
Advanced Configuration Parameter Auto Multi Frame Bursting Description Auto Multi Frame Bursting feature takes effect only when Multi Frame Bursting feature is Enabled. When this feature is enabled, the device monitors all active QoS Service Flow Classes and determines the highest priority QoS Service Flow Class for every wireless connection.
Advanced Configuration Parameter Description Bandwidth Limit Type Specifies the action performed when the traffic utilization exceeds the configured input or output limits. By default it is set to Shaping. • Policing: When the traffic utilization reaches the configured limit, the excess traffic will be discarded. • Shaping: When the traffic utilization reaches the configured limit, the excess traffic will be buffered and sent at the rate specified in the Output Bandwidth Limit.
Advanced Configuration • MAC ACL Status and Radius MAC ACL Status parameters cannot be enabled simultaneously. • When you modify WORP parameters and click COMMIT, it may result in brief interruption. 5.4.2 Wireless Interface Properties To configure the wireless interface properties, navigate to ADVANCED CONFIGURATION > Wireless > Interface 1 > Properties.
Advanced Configuration Basic Configuration Under Basic Configuration screen, you can configure and view the following parameters. Parameter Channel Bandwidth Descriptions By default, the channel bandwidth is set to 20 MHz. 40 MHz can be selected for higher throughputs depending on the distance and signal quality. 5 and 10 MHz can be selected for greater flexibility in spectrum selection. : A change in Channel Bandwidth will reset the Tx Rate and Maximum EIRP to default.
Advanced Configuration Parameter Active Channel Descriptions A read-only parameter that displays the current operating channel on which the wireless interface is operating. : Active Channel can be different from Preferred Channel if radar interface is detected. Satellite Density Satellite Density setting helps achieve maximum bandwidth in a wireless network. It influences the receive sensitivity of the radio interface and improves operation in environments with high noise level.
Advanced Configuration Parameter ATPC Status Descriptions If Adaptive Transmit Power Control (ATPC) is enabled, then the device automatically adjusts the transmit power to avoid saturation of remote receiver, which could cause data errors leading to lower throughput and link outage. If disabled, user can manually adjust the transmit power. By default, ATPC is enabled on the device.
Advanced Configuration Parameter Max EIRP Descriptions The maximum effective power that a radio antenna is allowed to radiate as per the regulatory standard. By default, the maximum EIRP is set as per the regulatory requirements for each frequency domain.
Advanced Configuration Parameter Descriptions Regulatory Domain Frequency (MHz) Max EIRP (dBm) PTP Mode PTMP Mode India 5825 - 5875 36 36 Brazil 5470 - 5725 30 30 5725 - 5850 Unlimited (100) 32 + 2/3(antenna gain) 5470 - 5600 30 (20 and 40 MHz) 27 (10 MHz) 24 (5 MHz) 30 (20 and 40 MHz) 27 (10 MHz) 24 (5 MHz) 5650 - 5725 30 (20 and 40 MHz) 27 (10 MHz) 24 (5 MHz) 30 (20 and 40 MHz) 27 (10 MHz) 24 (5 MHz) 5725 - 5850 36 36 Australia : • • Active TPC The maximum EIRP is not defined
Advanced Configuration Parameter TPC Descriptions This parameter enables you to manually set the Transmit Power Control (TPC) value when ATPC is disabled. You can manually set TPC ranging from 0 to 25 dBm. With TPC, you can adjust the output power of the device to a lower level. This is performed to reduce interference with the neighboring devices. It can be helpful when higher gain antenna is used without violating the maximum radiated output power for a country or regulatory domain.
Advanced Configuration Parameter Legacy Mode Descriptions When Legacy Mode is enabled, the BSU can interoperate with the legacy products of the Tsunami MP.11 family: MP.11 5054 series, 5012 series, 2454 series and so on. By default, it is disabled. : Applicable only to Tsunami® MP-8100-BSU. After configuring the required parameters, click OK and then COMMIT. Reboot the device, if you have changed any of the Wireless Interface parameters with asterisk (*) symbol marked against them.
Advanced Configuration 5.4.3 MIMO Properties The MIMO Properties tab allows you to configure the Multiple-Input-Multiple-Output (MIMO) parameters that enable to achieve high throughput and longer range. To configure MIMO properties, navigate to ADVANCED CONFIGURATION > Wireless > Interface1 > MIMO Properties.
Advanced Configuration Parameter Frequency Extension Description Frequency Extension is applicable only when the Channel Bandwidth is set to 40 MHz. While choosing 40MHz bandwidth, you can select either 40 PLUS (Upper Extension Channel) or 40 MINUS (Lower Extension Channel). 40 PLUS means the center frequency calculation is done for 20MHz and add another 20MHz to the top edge of 20MHz. 40 MINUS means the center frequency calculation is done for 20MHz and add another 20MHz to the bottom edge of 20MHz.
Advanced Configuration After configuring the required parameters, click OK and then COMMIT. Reboot the device, if you have changed any of the MIMO parameters with asterisk (*) symbol marked against them. 5.4.4 Dynamic Frequency Selection (DFS) The Tsunami® products support Dynamic Frequency Selection (DFS) for FCC, IC, and ETSI regulatory domains per FCC Part 15 Rules for U-NII devices, IC RSS-210, and ETSI EN 301-893 regulations, respectively.
Advanced Configuration 5.4.4.2 DFS in SU or End Point B Mode Explained below is the DFS functionality and the way it operates on SU or End Point B. 1. When SU/End Point B has no WORP link, it scans continuously all the channels in the configured Frequency Domain for the presence of BSU/End Point A. If suitable BSU/End Point A is found in any scanned channel, the SU or End Point B tries to establish WORP link. 2.
Advanced Configuration To configure DFS parameters, navigate to ADVANCED CONFIGURATION > Wireless > Interface 1 > DFS. The Dynamic Frequency Selection (DFS) screen appears.
Advanced Configuration Figure 5-15 DFS Configuration (SU/End Point B Mode) Tabulated below is the table which explains DFS parameters and the method to configure the configurable parameter(s): Parameter Description Channel Wait Time One the device selects the best channel, it scans that channel for the presence of RADAR for a period of set Channel Wait Time. The wait time can be configured in the range 0 to 3600 sec. By default, the wait time is set to 60 seconds.
Advanced Configuration 5.4.4.3 Blacklist Information The blacklisted table displays all the channels that are blacklisted. Parameter Description Channel Number Indicates the channel that is blacklisted. Reason Specifies the reason for blacklisting a channel. Following are the reasons for blacklisting a channel: 1. Remote Radar: A SU/End Point B detects a RADAR and informs BSU/End Point A accordingly. 2. Local Radar: The device detects the RADAR on its own. 3.
Advanced Configuration Figure 5-16 Manual Blacklist Select the channels that you want to blacklist by entering the start and end channels in the Start Channel and End Channel boxes respectively. Next, click Add. All the selected channels are added to the Blacklisted Channels table. To remove any blacklisted channel, enter the Start and End Channel of the blacklisted channels and then click Remove button. To refresh channel entries, click Refresh. 5.4.
Advanced Configuration Figure 5-17 Basic DDRS Configuration The DDRS Configuration is classified under two categories, namely, Basic and Advanced. Basic Configuration Under Basic Configuration screen, you can configure the following parameters. Parameter Description DDRS Status Enables the user the either enable or disabled DDRS feature on the device. By default, it is enabled on the device. Stream Mode Select the stream mode as either Auto, Single or Dual. By default, the Auto mode is selected.
Advanced Configuration Figure 5-18 Advanced DDRS Configuration The following table lists the Advanced Configuration parameters and their description. Note that these parameters are read-only and can be configured only through CLI or SNMP. Parameter Description Minimum Rate and Maximum Rate Represents the minimum and maximum data rate between which the DDRS dynamically selects the transmission data rate. These varies depending on the configured Data Streams, Channel Bandwidth and Guard Interval.
Advanced Configuration Rate Decrement RTX Threshold Represents a threshold for percentage of retransmissions, above which the rate can be decreased. By default, it is set to 30%. Please note that if the percentage of retransmissions is between “Rate Increment RTX Threshold” and “Rate Decrement RTX Threshold” then the current operation rate is maintained.
Advanced Configuration Figure 5-19 An Example - SNR Information These SNR values vary depending on your device. For device specific SNR information, see SNR Information. 5.5 Security 5.5.1 Wireless Security The Wireless Security feature helps to configure security mechanisms to secure the communication link between a BSU and a SU, and a link between End Point A and End Point B. By default, a security profile (WORP Security) is preconfigured with the default configuration for WORP security.
Advanced Configuration : Configure the same security profile on the either ends to establish a connection. To configure the Wireless security profile, navigate to ADVANCED CONFIGURATION > Security > Wireless Security. The Wireless Security Configuration screen appears: Figure 5-20 Wireless Security Configuration Tabulated below is the table which explains Wireless Security parameters: Parameter Description Profile Name Specifies the security profile name. By default, it is WORP Security.
Advanced Configuration Tabulated below is the table which explains the method to create a new Security Profile: Parameter Description Profile Name A name to uniquely identify a security profile name. Encryption Type Select encryption type as either None, WEP, TKIP or AES-CCM. 1. None - If the encryption type is selected as None, then there exist no security to the data frames transmitted over the wireless medium. 2.
Advanced Configuration Sample Security Profile Configuration End Point A End Point B Profile Name WORP Security WORP Security Encryption Type AES-CCM AES-CCM Key 1234567890abcdef1234567890abcdef (32 Hexadecimal digits) or publicpublic1234 (16 ASCII Characters) 1234567890abcdef1234567890abcdef (32 Hexadecimal digits) or publicpublic1234 (16 ASCII Characters) Entry Status Enable Enable Network Secret public public 5.5.1.
Advanced Configuration To configure the RADIUS Server profile, navigate to ADVANCED CONFIGURATION > Security > RADIUS. The following RADIUS Server Profile screen appears: Figure 5-23 Configuring RADIUS Server Profile Tabulated below is the table which explains RADIUS Server parameters and the method to configure the configurable parameter(s): Parameter Description Profile Name A name that represents the Radius Server profile. By default, it is Default Radius.
Advanced Configuration Parameter Description Server Port Specifies the port number that is used by the BSU/End Point A and the RADIUS server to communicate. By default, RADIUS Authentication Server communicates on port 1812. Shared Secret Specifies the password shared by the BSU/End Point A and the RADIUS server to communicate. The default password is public.
Advanced Configuration • Deny: Does not allow the SUs/End Point B devices configured in the MAC Access Control Table to access the wireless network. Click OK, if you have changed the Operation Type parameters. 5.5.3.1 Add SUs/End Point B to MAC Access Control Table To add entries to MAC Access Control table, click Add in the MAC Access Control screen. The MAC ACL Add Row screen appears: Figure 5-25 MAC ACL Add Row 1. Type the MAC Address of the SU/End Point B. 2. Add comments, if any. 3.
Advanced Configuration • • • Packet Identification Rule (PIR) - up to 64 rules, including 18 predefined rules Service Flow class (SFC) - up to 32 SFCs, including 8 predefined SFCs; up to 8 PIRs may be associated per SFC Class List - Priority for each rule within each SF class - 0 to 255, with 0 being lowest priority • QoS class - up to 8 QoS classes, including 5 predefined classes; up to 8 SFCs may be associated per QoS class 5.6.1.
Advanced Configuration b. IP Protocol List (17 = UDP) 8. TCP a. IP Protocol List (6) 9. UDP a. IP Protocol List (17) 10. PPPoE Control a. Ether Type Rule (Ether Type = DIX-Snap, Ether Value = 0x8863) 11. PPPoE Data a. Ether Type Rule (Ether Type = DIX-Snap, Ether Value = 0x8864) 12. IP a. Ether Type Rule (Ether Type = DIX-Snap, Ether Value = 0x0800) 13. ARP a. Ether Type Rule (Ether Type = DIX-Snap, Ether Value = 0x0806) 14. Expedited Forwarding a.
Advanced Configuration • • • • Tolerable Jitter - specified in increments of 1 ms steps from a minimum of 0 ms up to the Maximum Latency (in ms) Traffic priority - zero (0) to seven (7), 0 being the lowest, 7 being the highest Maximum number of data messages in a burst - one (1) to sixteen (16), which affects the percentage of the maximum throughput of the system Entry Status - Enable, Disable, and Delete : Note that traffic priority refers to the prioritization of this specific Service Flow.
Advanced Configuration Note that two different VoIP Service Flow classes for each direction of traffic have been defined (index numbers 4 to 7) which follow the ITU-T standard nomenclatures: G.711 refers to a type of audio companding and encoding that produces a 64 Kbps bitstream, suitable for all types of audio signals. G.729 is appropriate for voice and VoIP applications, but cannot transport music or fax tones reliably. This type of companding and encoding produces a bitstream between 6.4 and 11.
Advanced Configuration a. SF class: DL-2Mbps Video - PIR: Streaming Video (IP/TV); PIR Priority: 1 5.6.2 QoS Configuration There are several pre-defined QoS classes, SFCs, and PIRs available that cover the most common types of traffic. If you want to configure something else, build the hierarchy of a QoS class as follows: 1. Define PIR MAC Address, IP Address and TCP/UDP Port Entries. 2. 3. 4. 5.
Advanced Configuration Figure 5-27 QoS PIR MAC Address Add Entry c. Provide the MAC Address, Mask, Comment, Entry Status details and click Add. Comment field can be used to identify when this particular entry is referred in PIR Rule/QoS Class. The bit that is enabled in the “MAC Mask” configuration, the corresponding bit’s value in the “MAC Address” configuration should match with the same bit of the incoming traffic’s MAC Address (other bits of the incoming traffic are ignored).
Advanced Configuration Figure 5-28 QoS PIR IP Address Entries To Add a New PIR IP Address Entry, a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List > IP Address Entries. The QoS PIR IP Address Entries screen appears b. Click Add on the QoS PIR IP Address Entries screen to add a new entry. The following screen appears for configuring the IP Address Entry Details. Figure 5-29 QoS PIR IP Address Add Entry c. Provide the IP Address, Subnet Mask, Comment, Entry Status details and click Add.
Advanced Configuration Figure 5-30 QoS PIR TCP/UDP Port Entries To Add a New PIR TCP/UDP Port Entry, a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List > TCP/UDP Port Entries. The QoS PIR TCP/UDP Port Entries screen appears. b. Click Add on the QoS PIR TCP/UDP Port Entries screen to add a new entry. The following screen appears for configuring the IP Address entry details. Figure 5-31 QoS PIR TCP/UDP Port Add Entry c. Provide the Start Port, End Port, Entry Status details and click Add.
Advanced Configuration Figure 5-32 QoS PIR Entries To Add a New PIR Rule, a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List. The QoS PIR Entries screen appears. b. Click Add on the QoS PIR Entries screen to add a new entry. The following screen appears for configuring the New PIR Entry.
Advanced Configuration c. Provide the PIR Name, Entry Status details and click Add. PIR Rule Clarification Details 1. Navigate to ADVANCED CONFIGURATION > QoS > PIR List and click Details for editing a particular PIR Rule.
Advanced Configuration Figure 5-34 QoS PIR Edit Entry Tsunami® 8100 Series - Software Management Guide 85
Advanced Configuration Parameter Description Rule Name This parameter specifies the Name of the Packet Identification Rule (PIR) and can have a length of 1-32 characters. ToS Rule This parameter is used to enable or disable a TOS rule. Enter the values for the following to specify the ToS-related configuration: • ToS Low • ToS High • ToS Mask Ether Priority Rule This parameters is used to enable or disable 802.1p priority rule. Enter the values for the following to specify 802.
Advanced Configuration Figure 5-35 QoS PIR Protocol ID c. Enter the details and click Add. For deleting an entry, click Delete for the corresponding entry in PIR Details screen. Adding TCP/UDP Source Port Numbers a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List. Click Details. The Qos PIR Edit Entry screen appears. b. Navigate to TCP/UDP Source Port Entries tab and then click Add to add a new entry. The following screen appears. Figure 5-36 QoS PIR TCP/UDP Source Port Add Entry c.
Advanced Configuration Figure 5-37 QoS PIR TCP/UDP Destination Port Add Entry c. All the entries present in the PIR TCP/UDP Port Entries are displayed in the TCP/UDP Port Entry Table. Select the appropriate radio button and click Add. When an entry is added for a specific PIR, it gets displayed in the existing TCP/UDP Port Entries table. For deleting an entry, click Delete for the corresponding entry in the PIR Details page. Adding Source IP Address a. Navigate to ADVANCED CONFIGURATION > QoS > PIR List.
Advanced Configuration b. Navigate to Destination IP Address Entries tab and then click Add to add a new entry. The following screen appears. Figure 5-39 QoS PIR Destination IP Address Add Entry c. All the entries present in the PIR IP Address Entries are displayed in the IP Address Entry Table. Select the appropriate radio button and click Add. After adding the entry for this specific PIR, it is displayed in the Existing IP Address Entries table.
Advanced Configuration Figure 5-41 QoS PIR Destination MAC address Add Entry b. All the entries present in the PIR MAC Address Entries are displayed in the MAC Address Entry Table. Select the appropriate radio button and click Add. After adding the entry for this specific PIR, it is displayed in the Existing MAC Address Entries table. For deleting an entry, click Delete for the corresponding entry in the PIR Details page. 5.6.2.2 QoS Service Flow Configuration (SFC) 1.
Advanced Configuration Adding a New Service Flow (SFC): a. Click Add to add new entry. The following screen appears for configuring the New PIR Entry. Figure 5-43 QoS Service Flow Add Entry 2. Specify details for the Service Flow Name, Scheduler Type, Traffic Direction, MIR, CIR, Max Latency, Tolerable Jitter, Traffic Priority, Max Messages in Burst and Entry Status. 3. Click Add. Parameter Service Flow Name Description Specifies the Name of the Service Flow. It can be of length 1-32 characters.
Advanced Configuration Parameter Max Messages in Burst Description Specifies the maximum number of messages that can be sent in a burst. This value ranges from 1 to 16. : Reducing the number of messages impacts the throughput. Entry Status Specifies the Service Flow status. 5.6.2.3 QoS Class Configuration 1. Click ADVANCED CONFIGURATION > QoS > Class List. Five predefined QoS Classes are displayed in this page. You can configure maximum 8 entries. QoS Class Name should be unique.
Advanced Configuration Figure 5-45 QoS Class Add Entry b. Specify the QoS Class Name, Service Flow Name PIR Rule Name Priority and Entry Status and click Add. Parameter Class Name Description Specifies the Name of the QoS Class. This name length can range from 1 to 32 characters. : Special characters - = \ \"\ ' ? \\ / space are not allowed. Service Flow Name Specifies the Service Flow to be associated with the QoS Class.
Advanced Configuration Figure 5-46 QoS Class Service Flow Details 3. Click Add. The following screen appears for association of the new SFC in this QoS Class. Figure 5-47 QoS Class Service Flow Add Entry 4. Specify the Service Flow Name, PIR Rule Name, Priority and Entry Status and click Add to add a new entry. Adding PIR in QoS Class 1. Click on the corresponding Details provided in the Service Flow of a particular QoS Class. Maximum 8 PIR rules can be associated per SFC of an QoS Class.
Advanced Configuration Figure 5-48 QoS Class PIR Details 3. Click Add. The following screen appears for association of the new PIR rule in an SFC already associated in an QoS Class. Figure 5-49 QoS Class PIR Add Entry 4. Specify the PIR Rule Name, Priority and Entry Status and click Add to add a new entry. 5.6.2.4 QoS SU or End Point B List Configuration 1. Navigate to ADVANCED CONFIGURATION > QoS > SU or End Point B List. By default, the table does not have any entry.
Advanced Configuration Figure 5-50 QoS SU or End Point B List Entries 2. If an SU or End Point B is not in the list and is associated, the default QoS class configuration is applied. Adding a New SU or End Point B 1. Navigate to ADVANCED CONFIGURATION > QoS > SU or End Point B List. The QoS SU or End Point B Entries screen appears. 2. Click Add to add a new entry. The following QoS SU or End Point B Table Add Row screen appears. Figure 5-51 QoS SU or End Point B Table Add Row 3.
Advanced Configuration The following configuration instructions explain how to configure the system so that configuration parameters can always be changed, and ping requests and responses get higher priority in order to show the actual connectivity of the pinged node. The configuration suggested here assumes that the whole network is managed from a single work station, called the management station.
Advanced Configuration c. Click Add that corresponds to Source IP Address Entries. This displays a screen for referring the Management Station’s IP Address. New Entry Table displays all the IP Address Entries of the PIR List. Select the option button corresponding to the Management Station and then click Add. This adds the IP Address of the Management Station to the Existing Entries. Click Back and the new entry appears in the Source IP Address Entries Table. 5. Add PIR Rule for Destination IP Address. a.
Advanced Configuration • Max Messages in Burst: 16 • Entry Status: Enable d. Click Add. The UL-Management SF is added to the QoS SFC List. NOTE: The input and output bandwidth limits set on the End Point A or BSU or on the End Point B or SU are used for limiting aggregate bandwidth used by the SU or End Point B. These limits override any limit imposed by MIR in the SFC. Therefore, these limits should be set to at least 1000 kbps (MIR values in UL-Management and DL-Management SFCs).
Advanced Configuration 5.7 RADIUS Based SU QoS Configuration RADIUS based QoS configuration enables you to configure QoS parameters on a SU through RADIUS Server. This way of configuring QoS parameters, reduces the task of manually configuring QoS parameters on each SU available on the network. Explained below is the process followed to configure QoS parameters on a SU from a RADIUS Server.
Advanced Configuration 5.8 VLAN (Bridge Mode Only) The Virtual Local Area Network (VLAN) feature helps in logical grouping of network host on different physical LAN segments, which can communicate with each other as if they are all on the same physical LAN segment.
Advanced Configuration : Before setting the Management VLAN Id, make sure that the station that manages the device is a member of the same VLAN; else, your access to the device will be lost. 3. Management VLAN Priority: This parameter is used to set IEEE 802.1p priority for the management frames. By default, the priority is set to 0. To set the VLAN priority, enter a value ranging from 0 to 7. 4.
Advanced Configuration Figure 5-54 Transparent Mode Tabulated below is the table which explains the method to configure the device in Transparent mode: Parameters Description Interface Displays the name of the Ethernet interface. VLAN Mode Select the VLAN mode as Transparent. : When the device is configured in Double VLAN mode, do not configure the Ethernet interface of the device in Transparent Mode. Click OK and then COMMIT. : Wireless Interface of the device will always be in transparent mode.
Advanced Configuration Figure 5-55 Access Mode Tabulated below is the table which explains the method to configure the device in Access Mode: Parameter Description Interface Displays the name of the Ethernet interface. VLAN Mode Select the VLAN mode as Access and click OK. Access VLAN Id Enter the Access VLAN Id in the Access VLAN Id box. The untagged data frames received at the Ethernet interface are tagged with this configured VLAN Id and then forwarded to the WORP interface.
Advanced Configuration : Mixed VLAN Mode = Trunk Mode + Allow Untagged Frames + Port VLAN ID To configure the Ethernet interface of the device in Trunk mode, navigate to ADVANCED CONFIGURATION > VLAN > Ethernet.
Advanced Configuration Parameter Allow Untagged Frames Port VLAN ID Description Select Enable or Disable. By default, it is disabled. • Disable: If this option is selected, the Ethernet interface forwards only tagged frames whose VLAN Id matches with a VLAN ID present in trunk table. • Enable: - In case of a BSU, when Allow Untagged Frames is enabled, the Ethernet interface of the device forwards the data packets as-is.
Advanced Configuration Tabulated below is the table which explains the method to add VLAN IDs to Trunk Table: Parameter Description Trunk Id Enter VLAN ID in the Trunk Id box. Entry Status This parameter indicates the status of each VLAN Trunk Id entry. By default, the Trunk Id is enabled. To disable, select Disable from the Entry Status box. 2. Click Add. 3. To save and apply the configured parameters on the device, click COMMIT.
Advanced Configuration Tabulated below are the vendor specific attributes: Name of the attribute Vendor Assigned Attribute Number Attribute Format Attribute Value SU_VLAN_MAC 3 MacAddr SU Mac Address VLAN_ETH1 Vlan Mode 4 Decimal 1 -Transparent Mode 2 - Trunk Mode / 3 - Access Mode SU_VLAN_Name 5 String SU VLAN Name VLAN_ETH1 Access VLAN ID 6 Decimal 1 - 4095 VLAN_ETH1 Access Vlan Priority 7 Decimal 0-7 Management VLAN ID attribute 8 Decimal 1 - 4095 Management VLAN Priority 9
Advanced Configuration : • RADIUS Configuration is applicable only when the VLAN Status is disabled on the SU. • Local VLAN configuration takes priority over RADIUS Based VLAN configuration. • When the link is down, the configuration received from the RADIUS is lost. 5.10 Filtering (Bridge Only) Filtering is useful in controlling the amount of traffic exchanged between the wired and wireless networks. By using filtering methods, we can restrict any unauthorized packets from accessing the network.
Advanced Configuration Parameter STP/LACP Frames Description This parameter allows you to either Block or Passthru STP/LACP frames on the network. • Passthru: By allowing the STP/LACP frames, any loops that occurs within a network can be avoided. If configured to Passthru, the STP/LACP frames in the system are bridged. • Block: When blocked, the STP/LACP frames encountered on a network are terminated at bridge. By default, STP/LACP frames are allowed on the network.
Advanced Configuration Figure 5-61 Protocol Filter Tsunami® 8100 Series - Software Management Guide 111
Advanced Configuration Tabulated below is the table which explains Protocol Filter parameters and the method to configure the configurable parameter(s): Parameter Filtering Control Description This parameter is used to configure the interface on which filtering has to be applied. The filtering can be applied on any of the following interfaces: • Ethernet: Packets are examined at the Ethernet interface. • Wireless: Packets are examined at the Wireless interface.
Advanced Configuration Entry Status Set the entry status as either Enable, Disable or Delete. • Enable: Enables filter status on a protocol. • Disable: Disables filter status on a protocol. • Delete: Deletes a protocol entry from the Protocol Filter Table. : System-defined default protocols cannot be deleted. 5.10.1.2 Add User-defined Protocols to the Filter Table To add user-defined protocols to the Protocol Filter Table, click Add in the Protocol Filter screen.
Advanced Configuration • • To prevent all traffic from a specific wireless MAC address from being forwarded to the wired network, configure only the Wireless MAC address and Wireless Mask (leave the Wired MAC Address and Wired Mask set to all zeros). To prevent traffic between a specific wired MAC address and a specific wireless MAC address, configure all four parameters. Configure the wired and wireless MAC address and set the wired and wireless mask to all Fs.
Advanced Configuration Result: The device blocks all traffic between the wired PC and all wireless PCs.
Advanced Configuration Tabulated below is the table which explains Static MAC Address Filter parameters and the method to configure the configurable parameter(s): Parameter Description Wired MAC Address Specifies the MAC address of the device on the wired network that is restricted from communicating with a device in the wireless network. Wired MAC Mask Specifies the range of MAC address to which this filter is to be applied.
Advanced Configuration The Advanced Filtering table contains a list of 5 pre-defined protocols on which Advanced Filtering is applied. The following table explains the Filtering table parameters: Parameter Protocol Name Description Represent the protocol name.
Advanced Configuration Figure 5-66 Advance Filtering- Edit Entries Modify the IP protocol traffic direction that needs to be filtered, and the filtering status for the desired IP Protocol. Next click OK and then COMMIT. 5.10.4 TCP/UDP Port Filter TCP/UDP Port Filtering allows you to enable or disable Transmission Control Protocol (TCP) ports and User Datagram Port (UDP) ports on network devices.
Advanced Configuration Figure 5-67 TCP/UDP Port Filter The Filter Control parameters determines if filter has to be applied or not on a TCP/UDP Port. By default, it is disabled. To apply filters, select Enable and click OK. 5.10.4.1 TCP/UDP Port Filter Table The TCP/UDP Port Filter table displays a list of default TCP/UDP ports and user-defined ports which can be enabled or disabled as desired. By default, the device support 7 default TCP/UDP port filter entries.
Advanced Configuration If you have configured any user-defined protocols then click OK and then COMMIT. For example, a device with the following configuration would discard frames received on its Ethernet interface with a UDP destination port number of 137, effectively blocking NETBIOS Name Service packets. Please note that even the Filtering Control should be enabled to apply the filter.
Advanced Configuration Figure 5-69 Storm Threshold Filter Tabulated below is the table which explains Storm Threshold Filter parameters and the method to configure the configurable parameter(s): Parameter Description Interface Allows to configure the type of interface on which filtering has to be applied. The Storm Threshold filter can be used to filter the traffic on two types of interfaces: Ethernet or Wireless.
Advanced Configuration The following rules apply to Intra Cell Blocking Groups: • • A SU can be assigned to more than one group. A SU that has not been assigned to any group cannot communicate to any other SU connected to the same or different BSU. Example of Intra-Cell Blocking Groups Assume that four Intra Cell Blocking Groups have been configured on a BSU. SUs 1 through 10 are registered to the BSU.
Advanced Configuration Parameter MAC Address Description Represents the MAC address of the security gateway. This gateway routes the packets transmitted by the SU to the different BSUs to which it belongs. After configuring the required parameters, click OK and then COMMIT. : Intra Cell Blocking is configurable only in Bridge mode. When you change the device from Bridge to Routing mode or vice-versa, Intra-Cell Blocking stops or starts working only after a Reboot. 5.10.6.
Advanced Configuration This table displays the list of groups. If the Entry Status for a group is set to Enable then BSU discards all the packets coming from SUs which are not members of that group. If set to Disable, then allows all the packets coming from SUs which are not the members of that group. If you have changed the Entry Status of a group, then click OK and then COMMIT. 5.10.6.
Advanced Configuration Tabulated below is the table which explains the WORP Intra Cell Blocking MAC Table entries and the method to configure the configurable parameter(s): Parameter Description MAC Address Represents the SU’s MAC address. Group ID’s 1 to 16 By default, a Group ID is disabled meaning which the SU is not a part of that group. To make it a part of that group, select Enable.
Advanced Configuration : A maximum of five pool entries can be added to the table. A pool entry can be deleted but cannot be edited. 5.11.1.1 Adding a New Pool Entry To add a new entry to the DHCP Pool, click Add on the DHCP Pool screen. The following DHCP Pool Table Add Row screen appears: Figure 5-75 DHCP Pool Table Add Row Enter the pool details and click Add. The entry will be updated in the DHCP pool table. To apply the configured changes, click COMMIT. 5.11.
Advanced Configuration Tabulated below is the table which explains DHCP Server parameters and the method to configure the configurable parameter(s): Parameter DHCP Server Status Description By default, DHCP Server is disabled on a device. To enable DHCP Server, select Enable. A DHCP Server can be enabled only when the following two conditions are satisfied: 1. Before enabling, atleast one interface should be enabled on which the DHCP Server has to run. 2.
Advanced Configuration Figure 5-77 DHCP Relay By default, DHCP Relay is disabled on the device. To enable it, atleast one DHCP Server IP address should be configured. To add a DHCP Server to the Relay Server Table, click Add in the DHCP Relay screen. The DHCP Relay Server Add Row screen appears: Figure 5-78 DHCP Relay Server Add Row Enter the DHCP Server IP Address and then click Add. After configuring the required parameters, click OK and then COMMIT.
Advanced Configuration Figure 5-79 IGMP Snooping Process The router forwards the IP multicast data to the BSU/End Point A. Lets say, with IGMP Snooping not enabled on the BSU/End Point A, the multicast data is transmitted over the wireless medium irrespective of whether the multicast group address is a member of the multicast group table maintained in each BSU/End Point A.
Advanced Configuration : • Tsunami® devices supports only passive IGMP Snooping. • IGMP versions v1,v2 and v3 are supported. • The device can add a maximum of 64 Multicast groups in the Snooping table. To configure IGMP Snooping parameters, navigate to ADVANCED CONFIGURATION > IGMP Snooping.
Advanced Configuration To configure the static routing table, navigate to ADVANCED CONFIGURATION > Network > Static Route Table. The Static Route Table screen appears. Figure 5-81 Static Route Table Tabulated below is the table which explains Static Route Table entries and the method to configure the configurable parameter(s): Parameter Description Static Route Status If Static Route Status is enabled, the packets are sent as per route configured in the static routing table.
Advanced Configuration 5.13.1.1 Adding Static Route Entries Click Add in the Static Route Table screen.The following Static Route Table Add Row screen appears: Figure 5-82 Static Route Table Add Row Add the route entries and click Add and then COMMIT. : • • A maximum of 256 routes can be added to the static route table. The IP address of the Next Hop must be on the subnet of one of the device’s network interfaces. 5.13.
Advanced Configuration • When NAT functionality is enabled, the DHCP Relay and RIP features are not supported. The DHCP Relay Agent and RIP must be disabled before enabling NAT. To configure NAT parameters, navigate to ADVANCED CONFIGURATION > Network > NAT.
Advanced Configuration To add entries in the NAT Port Bind Table, navigate to ADVANCED CONFIGURATION > Network > NAT > Static Port Bind. The NAT Port Bind Table screen appears. Click Add in the NAT Port Bind Table screen.
Advanced Configuration S.No. Protocol Support Applications 5 IRC Port Mapping for inbound connection Chat and file transfer 6 AMANDA Port Mapping for inbound connection Backup and archiving 7 FTP FTP ALG File Transfer 8 PPTP PPTP ALG VPN related 9 SNMP SNMP ALG Network Management 10 DNS Port Mapping for inbound connection Domain Name Service 5.13.
Advanced Configuration Parameter Description Authorization Type Enables you to select the appropriate Authorization Type. This parameter is not applicable if RIP v1 is selected as the Version number. Authorization Key Enter the authorization key. This parameter is not applicable if RIP v1 is selected as the Version number. It is not applicable when the Authorization Type is set to None. Version Number Select RIP Version number from the Version Number list. Available options are V1, V2 and both.
Advanced Configuration • Discovery and Session Stage: In this stage, to initiate a PPPoE session, the PPPoE client discovers a PPPoE server (called Access Concentrator). Once discovered, a session ID is assigned and a session is established. • Point-to-point Protocol (PPP) Stages: The PPP stage comprises the following sub-stages: 1. Physical Link: For sending and receiving PPP frames, the PPP driver calls the services of PPP Channels (used in connection with serial links).
Advanced Configuration Figure 5-88 PPPoE Client Configuration Tsunami® 8100 Series - Software Management Guide 138
Advanced Configuration 5. Tabulated below is the table which explains PPPoE client parameters and the method to configure the configurable parameter(s): Parameter Authentication Protocol Description PPPoE supports the following types of user authentication protocols that provide varying levels of security: • None: Represents that no authentication is required for transferring PPP frames over Ethernet between PPPoE client and server.
Advanced Configuration Parameter LCP Echo Failure Description This parameter indicates the maximum number of consecutive failures to receive the LCP echo-reply to consider the connection to be down. To configure LCP Echo Failure value, enter a a value ranging from 1 to 25. By default, the echo failure is set to 5. On a noisy wireless link, it is recommended to set this value to higher.
Advanced Configuration Parameter Description MPPE Status : MPPE Status parameter is applicable only when the Authentication Protocol is configured as “MSCHAP v2”. Microsoft Point-to-Point Encryption (MPPE) is a protocol for transferring encrypted data over point-to-point links. The PPPoE client negotiates on the encryption parameters based on the MPPE Status configured.
Advanced Configuration Parameter Description MPPE Key Length : This parameter is applicable only when Authentication Protocol is configured as “MSCHAP v2” and MPPE Status is configured as “Mandatory”. MPPE supports 40-bit, 56-bit and 128-bit encryption key length. To configure the desired key length, select a key length from the MPPE Key Length drop-down box. Link Status Indicates the status of the PPPoE link between the PPPoE client and server.
Advanced Configuration Figure 5-89 An Example: Tunnel Configuration Lets say that the Computer with an IP address: 10.0.0.1 wants to communicate with the Computer with an IP address: 192.168.9.101. Since there is no native routing path between these two computers, the communication can happen via the tunnel. The SU1device with wireless IP address: 20.0.0.132 and SU2 device with wireless IP address: 30.0.0.132 are the end points of the tunnel, respectively.
Advanced Configuration — Remote IP Address = 30.0.0.132 SU2 Configuration — Virtual IP address = 50.0.0.2 — Local IP Address = 30.0.0.132 — Remote IP Address = 20.0.0.132 2. Add a Static Route for Remote IP Address of the tunnel (Refer to Static Route Table) • • On SU1, add a static route for 30.0.0.xxx as next hop 20.0.0.1 On SU2, add a static route for 20.0.0.xxx as next hop 30.0.0.1 3.
Advanced Configuration Figure 5-92 Adding a new Tunnel Interface 6. Tabulated below is the table which explains the parameters for creating a new tunnel: Parameter Description Name Represents the name of the tunnel interface. Type a name for the tunnel interface. Encapsulation Method The device supports two types of network tunnels: • ipip: A tunnelling protocol that allow only IP traffic over the tunnel.
Advanced Configuration • The Maximum Transmission Unit (MTU) of the tunnel interface depends on the underlying interface. • It is advised that both PPPoE and the IP Tunneling feature do not function simultaneously on the device. • IP configuration of Ethernet and Wireless interface should NOT be in the same subnet of virtual IP addresses of tunnels. 5.13.5.2 View Existing Tunnels The IP Tunneling screen displays all the tunnels created on the device. The entries against each tunnel cannot be edited.
6 Management This chapter provides information on how to manage the device by using Web interface. It contains information on the following: • • • System File Management Services • • • • Simple Network Time Protocol (SNTP) Access Control Reset to Factory Convert QB to MP 6.1 System The System tab enables you to configure system specific information such as System Name, contact information of the person managing the device, and view system inventory and license information. 6.1.
Management Parameter Description System Up-Time This is a read-only parameter. It represents the operational time of the device since its last reboot. System Description This is a read-only parameter. It provides system description such as system name, firmware version and the latest firmware build supported. For example: Tsunami MP-8100-BSU-WD-v2.4.0 System Name Represents the name assigned to the device. You can enter a system name of maximum 64 characters.
Management Figure 6-2 Inventory Management By default, the components information is auto-generated by the device and is used only for reference purpose. Click Refresh, to view the updated system inventory management information. 6.1.3 Licensed Features Licensing is considered to be the most important component of an enterprise-class device which typically has a feature-based pricing model.
Management Parameter Description Number of Radios The number of radios that the device is licensed to operate. Number of Ethernet Interfaces The number of Ethernet interfaces supported by the device. Radio 1 Allowed Frequency Band The operational frequency band supported by the device radio. Maximum Output Bandwidth The maximum output bandwidth limit of the device. It is represented in mbps. Maximum Input Bandwidth The maximum input bandwidth limit of the device. It is represented in mbps.
Management • The TFTP server should be configured to transmit and receive files (on the Security tab under File > Configure), with no automatic shutdown or time-out (on the Auto-Close tab). : The instructions listed above are based on the assumption that you are using the SolarWinds TFTP server; otherwise the configuration may vary. 6.2.2 Text Based Configuration (TBC) File Management Text Based Configuration (TBC) file is a simple text file that holds device template configurations.
Management Figure 6-4 TBC File in xml Format 6.2.2.2 Editing the TBC File The TBC file can easily be opened and edited in any standard Text-Editors like Wordpad, MS-Word, Notepad++, Standard XML Editors. Proxim recommends XML Notepad 7 editor for editing the TBC file. • • You can modify any value between the double quotes(““) in the TBC file. It is recommended not to change the text outside the double quotes (“”) or XML tags in the TBC file.
Management By using Web Interface, you can load the TBC file by navigating to MANAGEMENT > File Management > Upgrade Configuration. To load the TBC file, it should be generated or downloaded onto the device. While loading the TBC file onto the device, any file name is accepted. Once loaded, the TBC file name is renamed to PXM-TBC.xml. If the TBC file does not contain correct XML syntax, the file will be discarded with DOM error and no configurations will be loaded.
Management 3. Click Update. 4. Once the update successfully completes, reboot the device. 6.2.3.2 Upgrade Firmware via TFTP To upgrade the firmware via TFTP Server, do the following: 1. Navigate to MANAGEMENT > File Management > Upgrade Firmware > TFTP. Figure 6-6 Upgrade Firmware - TFTP 2. Enter the TFTP Server IP Address in the Server IP Address box. 3. Enter the name of the latest firmware file (including the file extension) that has to be loaded onto the device in the File Name box. 4.
Management Figure 6-7 Upgrade Configuration - HTTP 2. In the HTTP screen, click Browse to locate the configuration file. Select Flashcfg.cfg for Binary Configuration file and PXM-TBC.xml for Text Based Configuration file. Make sure that the file name does not contain any space or special characters. 3. If you are updating the device with Binary Configuration file then click Update and then reboot the device. 4. If you are updating the device with Text Based Configuration file then, a.
Management • Enter the name of the Binary file (including the file extension) that has to be downloaded onto the device in the File Name box. 3. To update the device with Text Based Configuration files, select Text Based Config. • Enter the TFTP server IP Address in the Server IP Address box. • Enter the name of the Text Based file (including the file extension) that has to be downloaded onto the device in the File Name box. Figure 6-9 Upgrade Text Based Configuration via TFTP 4.
Management Figure 6-10 Retrieve Files via HTTP 2. Select the type of file that you want to retrieve from the device from the File Type drop down box. The files may vary depending on your device. 3. Click Retrieve. Based on the selected file, the following Download screen appears. Figure 6-11 Download Screen 4. Right-click the Download link and select Save Target As or Save Link As to save the file to the desired location. 6.2.5.
Management Figure 6-12 Retrieve Files via TFTP 2. Enter the TFTP server IP Address in the Server IP Address box. 3. Enter the name of the file (including the file extension) that has to be retrieved from the device, in the File Name box. 4. Select the file type that you want to retrieve from the device, from the File Type drop down box. 5. Click Retrieve. The retrieved file can be found in the TFTP Server folder.
Management 6.3 Services The Services tab lets you configure the HTTP/HTTPS, Telnet/SSH and SNMP interface parameters. 6.3.1 HTTP/HTTPS To configure HTTP/HTTPS interface parameters, navigate to MANAGEMENT > Services > HTTP / HTTPS. Figure 6-13 HTTP/HTTPS Tabulated below is the table which explains HTTP/HTTPS parameters and the method to configure the configurable parameter(s). Parameter Admin Password Description By default, the Administrator password to access HTTP/HTTPS interface is public.
Management Parameter HTTPS Description By default, a user can manage the device through Web Interface over secure socket Layer (HTTPS). To prevent access to the device through HTTPS, select Disable. : The password configuration for HTTPS is same as configured for HTTP. After configuring the required parameters, click OK, COMMIT and then REBOOT. 6.3.2 Telnet/SSH To configure Telnet/SSH interface parameters, navigate to MANAGEMENT > Services > Telnet / SSH.
Management Monitor Password The Administrator user has the privilege to change the Monitor user password. By default, the Monitor user password to access Telnet/SSH interface is public. For security reasons it is recommended to change the default password. The password should be alphanumeric with minimum of 6 and maximum of 32 characters. : The following special characters are not allowed in the password: - = \ “ ‘ ? / space Telnet By default, a user can manage the device through Telnet.
Management 6.3.3 SNMP To configure SNMP interface parameters, navigate to MANAGEMENT > Services > SNMP.
Management Figure 6-16 SNMPv3 Tabulated below is the table which explains SNMP parameters and the method to configure the configurable parameter(s): Parameter SNMP Description By default, the user has the access to manage the device through SNMP Interface. To prevent access to the device through SNMP, select Disable. : Any change in the SNMP status will affect the Network Management System access. Version Allows you to configure the SNMP version. The supported SNMP versions are v1-v2c and v3.
Management Read/Write Password Represents the read-write community string used in SNMP Protocol. It is sent along with each SNMP GET / WALK / GETNEXT / SET request to allow or deny access to the device. This password should be same as read-write password set at the NMS or MIB browser. The default password is “public”. The password should be of minimum 6 and maximum 32 characters. : The following special characters are not allowed in the password: - = \ “ ‘ ? / space SNMP v3 Specific Parameters Security l
Management Figure 6-17 Add Entries to SNMP Host Table Configure the following parameters: • • IP Address: Type the IP address of the Trap server to which SNMP traps will be delivered. Password: Type the password to authenticate the Trap Server. The following special characters are not allowed in the password: - = \ “ ‘ ? / space : Applicable only to SNMP v1-v2c. • • • Comment: Type comments, if any. Entry Status: Select the entry status as either Enable or Disable.
Management Figure 6-18 Logs • Event Log Priority: By default, the priority is set to Notice. You can configure the event log priority as one of the following: - Emergency - Alert - Critical - Error - Warning - Notice - Info - Debug Please note that the priorities are listed in the order of their severity, where Emergency takes the highest severity and Debug the lowest. When the log priority is configured as high, all the logs with low priority are also logged.
Management Figure 6-19 Syslog Host Table Add Row 2. IP Address: Enter the IP address of the Syslog host. 3. Host Port: Represents the port on which the Syslog host listens to the log messages sent by the device. The default port is 514. : The user must configure the correct port number on which the Syslog host is running. Choice of port number must be in line with the standards for port number assignments defined by Internet Assigned Numbers Authority (IANA). 4. Comments: Types comments, if any. 5.
Management Figure 6-20 Time Synchronization Tabulated below is the table which explains SNTP parameters and the method to configure the configurable parameter(s): Parameter Enable SNTP Status Description Select this parameter to enable SNTP Client on the device. If enabled, the SNTP Client tries to synchronize the device’s time with the configured time servers. By default, the SNTP status is disabled.
Management Parameter Description ReSync Interval Set ReSync time interval ranging from 0 to 1440 minutes. Once the time is synchronized, the SNTP Client tries to resynchronize with the time servers after every set time interval. Sync Status Specifies the SNTP Client sync status when it tries to ReSync again with the time servers. The status is as follows: • Disabled: The SNTP client will not synchronize the time with the time servers and displays the status as Disabled.
Management Figure 6-21 Management Access Control By default, the Management Access Control feature is disabled on the device. To enable, select Enable from the Access Table Status box and click OK. Reboot the device, for the changes to take effect. : Only when the Access Table Status is enabled, you can add host(s) to the Management Access Control Table. 6.5.0.1 Add Host(s) to Management Access Control Table To add a host to the Management Access Control Table, do the following: 1.
Management Figure 6-23 Reset to Factory Defaults Click OK, if you wish to proceed with factory reset, else click Cancel. 6.7 Convert QB to MP The Convert QB to MP tab lets you convert a QB to SU so that the converted device can connect to a BSU and operate as a regular SU.
Management • In case of Method 1 conversion, QB mode configuration will be deleted. • Reset to factory defaults, always results in the device initializing in QB mode.
7 Monitor This chapter contains information on how to monitor the device by using Web interface. It contains information on the following: • • • Interface Statistics WORP Statistics Active VLAN • • • • • • • • Bridge Network Layer RADIUS (BSU or End Point A only) IGMP DHCP Logs Tools SNMP v3 Statistics 7.1 Interface Statistics Interface Statistics allows you to monitor the status and performance of the Ethernet and Wireless interfaces of the device. 7.1.
Monitor To view Ethernet statistics, click Ethernet 1 or Ethernet 2 depending on the Ethernet interfaces supported by your device. Tabulated below is the table which explains the parameters displayed in the Ethernet Statistics screen: Parameter Description MTU Specifies the largest size of the data packet received or sent on the Ethernet interface. MAC Address Specifies the MAC address at the Ethernet protocol layer.
Monitor 7.1.2 Wireless Statistics To view the Wireless interface statistics, click MONITOR > Interface Statistics > Wireless1. Figure 7-2 Wireless Interface Statistics In addition to the parameters displayed for the Ethernet interface(s), the following parameters are displayed for the wireless interface. Parameter Retunes Description Specifies the number of times the radio is retuned for better performance of the device.
Monitor Parameter Extension Description This parameter is applicable only to the 40 MHz modes, that is, 40 PLUS and 40 Minus. It specifies the SNR value of the packet received on the extension channel (20MHz). Rx Error Details Decrypt Errors This parameter is applicable only if security is enabled. It indicates the number of received packets that failed to decrypt. CRC Errors Specifies the number of received packets with invalid CRC. PHY Errors Specifies the total Rx PHY Errors.
Monitor Figure 7-4 PPPoE Server - No Link Established To view the updated PPPoE interface statistics, click Refresh. Please note that for every 4 seconds, the interface statistics gets refreshed. To view the PPPoE connection status such as the number of attempts made to start a session between PPPoE client and server, and the number of attempts failed to establish a connection, click PPPoE Connection Stats. Figure 7-5 PPPoE Connection Statistics To view updated connection statistics, click Refresh.
Monitor Tabulated below is an explanation to each of these parameters: Parameter Description Name Specifies the tunnel interface name. Alias Specifies a supplementary tunnel interface name. Maximum Transmission Unit (MTU) Specifies the largest size packet or frame that can be sent over the tunnel interface. Operational Status The Operational Status indicates only the tunnel interface status. The status can be either UP or DOWN.
Monitor 7.2 WORP Statistics 7.2.1 General Statistics WORP General Statistics provides general statistics about the WORP. To view General Statistics, navigate to MONITOR > WORP Statistics > Interface 1 > General Statistics. The following WORP General Statistics screen appears: Figure 7-8 WORP General Statistics Tabulated below is an explanation to each of these parameters: Parameter Description Interface Type Specifies the type of radio interface.
Monitor Parameter Description Data Transmission Statistics Specifies the number of transmissions occurred through the interface. Send Success Refers to the number of data messages sent and acknowledged by the peer successfully. Send Retries Refers to the number of data messages that are re-transmitted and acknowledged by the peer successfully. Send Failures Refers to the number of data messages that are not acknowledged by the peer even after the specified number of retransmissions.
Monitor 7.2.2 SU / End Point B Link Statistics : SU Link Statistics is applicable only to a BSU, and End Point B Link Statistics is applicable only to a End Point A device. SU Link statistics provides information about the SUs connected to a BSU. Similarly, End Point B Link Statistics provides information about an End Point B currently connected to an End Point A device. To view link statistics, navigate to MONITOR > WORP Statistics > Interface 1 > SU / End Point B Link Statistics.
Monitor Parameter Description Remote Antenna Port Info Indicates the status of the remote end antenna ports. The antenna ports status is same as explained in Local Antenna Port Info. Remote Signal (dBm) Represents the signal level with which the device at the remote end receives frames, through wireless medium. Remote Noise (dBm) Represents the noise measured at the remote end antenna ports.
Monitor Figure 7-10 SU Detailed Statistics The detailed page displays Remote SNR information, that is, the Minimum Required SNR and the Maximum Optimal SNR value for a given data rate or modulation, to achieve optimal throughput. To disconnect a SU/End Point B from BSU/End Point A respectively, click Disconnect. To view updated detailed statistics, click Refresh.
Monitor To view local SNR table, click Click here for Local SNR-Table on the upper-right of SU/End Point B Link Statistics screen (Refer An Example - SU Link Statistics). The following screen appears depending on your device: Figure 7-11 Local SNR Information These configured values are used by ATPC and DDRS to derive TPC and data rate for optimal throughput. 7.2.
Monitor Figure 7-12 An Example - BSU Link Statistics The link statistics are similar to SU / End Point B Link Statistics. 7.2.4 QoS Statistics (BSU or End Point A Only) : This parameter is applicable only to BSU or End Point A radio modes. To view QoS Statistics, navigate to MONITOR > WORP Statistics > Interface 1 > QoS Statistics. The following QoS Summary screen appears.
Monitor 7.3 Active VLAN : This parameter is applicable only to a device in SU mode. The Active VLAN page enables you to identify the VLAN Configuration mode applied on a device in SU mode. To view active VLAN applied on the device in SU mode, navigate to MONITOR > Active VLAN. The Active VLAN page appears: Figure 7-14 Active VLAN The Active VLAN Config parameter helps you to identify the current VLAN configuration applied on the device in SU mode.
Monitor : Please note that the number of Ethernets vary depending on the device. 7.4 Bridge 7.4.1 Bridge Statistics The Bridge Statistics allows you to monitor the statistics of the Bridge. To view the Bridge Statistics, navigate to MONITOR > Bridge > Bridge Statistics. The following Bridge Statistics screen appears: Figure 7-16 Bridge Statistics The following table lists the parameters and their description: Parameter Description Description This parameter provides a description about the bridge.
Monitor Parameter Description In Errors Represents the number of inbound packets with errors and that are restricted from being delivered. Out Octets Represents the total number of octets transmitted out of the bridge, including the framing characters. Out Unicast Packets Represents the total number of packets requested by higher-level protocols to be transmitted out of the bridge interface to a subnetwork-unicast address, including those that were discarded or not sent.
Monitor 7.5 Network Layer 7.5.1 Routing Table Routing table displays all the active routes of the network. These can be either static or dynamic (obtained through RIP). For every route created in the network, the details of that particular link or route will get updated in this table. To view the Routing Table, navigate to MONITOR > Network Layer > Routing Table. The Routing Table screen appears: Figure 7-18 Routing Table 7.5.
Monitor 7.5.3 ICMP Statistics The ICMP Statistics attributes enable you to monitor the message traffic that is received and transmitted by the device. To view ICMP statistics, navigate to MONITOR > Network Layer > ICMP Statistics. The ICMP Statistics screen appears. Figure 7-20 ICMP Statistics The following table lists the ICMP Statistics parameters and their description: Parameter Description In Msgs or Out Msgs Represents the number of ICMP messages that are received/transmitted by the device.
Monitor Parameter Description In Timestamps or Out Timestamps Represents the rate at which the ICMP timestamp (request) messages are received/transmitted by the device. In Timestamps Reps or Out Timestamps Reps Represents the rate at which the ICMP timestamp reply messages are received/transmitted by the device. In Addr Masks or Out Addr Masks Represents the number of ICMP address mask request messages that are received/transmitted by the device.
Monitor 7.6 RADIUS (BSU or End Point A only) : RADIUS is applicable only to a BSU or an End Point A device. 7.6.1 Authentication Statistics Authentication Statistics provides information on RADIUS Authentication for both the primary and backup servers for each RADIUS server profile. To view Authentication statistics, navigate to MONITOR > RADIUS > Authentication Statistics.
Monitor Parameter Description Mal Resp Represents the number of malformed RADIUS access response messages received by the device since client startup. Bad Auths Represents the number of malformed RADIUS access response messages containing invalid authenticators received by the device since client startup. Time Outs Represents the total number of timeouts for RADIUS access request messages since client startup.
Monitor Parameter Time Elapsed Description Represents the time elapsed since the multicast entry has been created for the Ethernet or Wireless interface. To view updated IGMP statistics, click Refresh. 7.7.2 Router Port List The Router Port List displays the list of ports on which multicast routers are attached. To view Router Port List, navigate to MONITOR > IGMP > Router Port List.
Monitor Figure 7-25 DHCP Leases 7.9 Logs 7.9.1 Event Log The Event Log keeps track of events that occur during the operation of the device. It displays the event occurring time, event type, and the name of the error or the error message. Based on the priority (the log priority is set under MANAGEMENT > Services > Logs), the event details are logged and can be used for any future reference or troubleshooting. To view the Event Log, navigate to MONITOR > Logs > Event Log.
Monitor To hide the event logs, click Hide Event Log. To clear the event logs, click Clear Event Log. To view updated event logs, click Refresh. : The recent event logs are stored in the flash memory. 7.9.2 Syslog System log messages are generated by the system by sending requests at various instances to the system log server. To view System Logs, navigate to MONITOR > Logs > Syslog. The Syslog screen appears. Figure 7-27 System Log To clear Syslog information, click Clear Syslog.
Monitor Figure 7-28 Debug Log Features: Select the appropriate features to be logged. The available features are Select All, DDRS Level 1, DDRS Level 2, DDRS Level 3 and DFS. File Status: This parameter displays the current size of the Debug Log file. After selecting the DDRS level, click OK. To delete the Debug Log, click Clear Log. To get the updated status of the Debug Log File, Click Refresh. 7.9.
Monitor Figure 7-29 Temperature Log After configuring the parameters, click OK. To view the Temperature Log, click Show Temp Log. To delete all the Temperature Logs, click Clear Temp Log. Click Refresh, to get the updated Temperature Log. 7.10 Tools 7.10.1 Wireless Site Survey : Applicable only to a device in SU or End Point B mode. Wireless Site Survey is done by the SU or End Point B only.
Monitor 7.10.2 Scan Tool With Scan Tool, you can scan all the devices available in your network. To scan the devices, navigate to MONITOR > Tools > Scan Tool. The Scan Tool screen appears. Figure 7-31 Scanned Devices Click Scan to scan and refresh the devices on the network. 7.10.3 sFlow® Proxim’s point-to-multipoint and point-to-point devices support sFlow® technology, developed by InMon Corporation.
Monitor • • Packet Flow Sampling: In this sampling, the data packets received on the ethernet interface of the device are sampled based on a counter. With each packet received, the counter is decremented. When the counter reaches zero, the packet is packaged and sent to the sFlow Receiver for analysis. These packets are referred to as Packet Flow Samples. Counter Polling Sampling: In this sampling, the sFlow Agent sends counters periodically to the sFlow Receiver based on the set polling interval.
Monitor 7.10.3.1 sFlow Receiver Configuration The Receiver Configuration page allows you to configure sFlow Receiver(s), which receives samples from all agents on the network, combines and analyzes the samples to produce a report of network activity. To configure sFlow Receiver, navigate to MONITOR > Tools > sFlow and select Receiver Configuration tab. Tabulated below is the table which explains sFlow parameters and the method to configure the configurable parameter(s): Parameter Description S.No.
Monitor Figure 7-34 sFlow Sampling Configuration 2. From the Receiver Index drop-down box, select the receiver index number associated with the sFlow Receiver to which the sFlow Agent should send the sFlow Datagrams. : If device has two ethernet interfaces, then configure different Receiver indexes for each of the interface. 3. Type a value in the Packet Sampling Rate box.
Monitor 7.10.3.3 Counter Polling Configuration To configure and start Counter Polling sampling, do the following: 1. Navigate to MONITOR > Tools > sFlow and select Counter Polling Configuration tab. Figure 7-35 Counter Polling Configuration 2. From the Receiver Index drop-down box, choose the receiver index number associated with the sFlow Receiver to which the sFlow Agent sends the counters.
Monitor 7.10.4 Console Commands The Console Commands feature helps Proxim’s Technical Support team to debug field issues. 7.11 SNMP v3 Statistics SNMP v3 statistics can be viewed only when SNMPv3 feature is enabled on the device. See SNMP. To view the SNMPv3 Statistics, navigate to MONITOR > SNMPV3 Statistics.
Troubleshooting 8 This chapter helps you to address the problems that might arise while using our device. If the procedures discussed in this chapter does not provide a solution, or the solution does not solve your problem, check our support site at http://support.proxim.com which stores all resolved problems in its solution database. Alternatively, you can post a question on the support site, to a technical person who will reply to your email.
Troubleshooting 8.1 PoE Injector Problem The Device Does Not Work Solution • • • • • • There is No Data Link • • Verify that the indicator on the device port is “ON.” Verify that the Ethernet cable from PoE Injector hub to the Ethernet port of the device is properly connected.
Troubleshooting Problem Ethernet Link Does Not Work Solution Check the Ethernet LED • Solid Green: The Ethernet link is up. • Serial Link Does Not Work Blinking Green: The Ethernet link is down. • Double-check the physical network connections.
Troubleshooting 8.4 Setup and Configuration Issues Problem Solution Device Reboots Continuously One of the reason for the device to reboot continuously is that the radio card is not properly placed in the mini-PCI slot. When you power on the device and you do not see the “WIRELESS NETWORK1 PASSED” in the POST message in the Serial Console, please contact Proxim’s support site at http://support.proxim.com. Lost Telnet or SNMP Password Perform Soft Reset to Factory Defaults procedure.
Troubleshooting Problem TFTP Server Does Not Work Solution • The TFTP server is not properly configured and running • The IP address of the TFTP server is invalid • The upload or download directory is not correctly set • The file name is not correct Changes in Web Interface Do Not Take Effect 1. Restart your Web browser. 2. Log on to the device again and make changes. 3. Reboot the device. 4. Click Commit for the changes to take effect. 5. Wait until the device reboots before accessing the device again.
Troubleshooting 8.6 Wireless Link Issues Tabulated below are the possible reasons for a wireless link not getting established and the relevant observations. Reason(s) Mismatch in network name Observation • • • Incorrect or invalid configured BSU/End Point A name Mismatch in network secret • • The Wireless Interface Statistics (In Octets, In Non-Unicast Packets) are incremented in SU/End Point B. The WORP counters are not affected. • The remote device is not listed in the Site Survey.
Troubleshooting 8.7 Wired (Ethernet) Interface Validation Problem Wired (Ethernet) Interface Validation Solution Run iperf commands • Use iperf commands with -w option as 202k.
Troubleshooting 8.8 Wireless Interface Validation Problem Wireless Interface Validation Solution Run iperf commands (You can run Embedded iperf commands only through Telnet.
Troubleshooting Problem Wireless Interface Validation Solution • Performance and Stability Issues - Check the distance between two co-locating devices. The distance between two co-locating devices should be minimum 3 meters, in order to achieve good throughput and maintain link stability. The operating channels should maintain 5MHz spacing if managed by a single administrator.
Troubleshooting 8.9.3 Forced Reload With Forced Reload, you bring the device into bootloader mode which erases the embedded software. Use this procedure only as a last option if the device does not boot, and the Soft and Hard to Factory Defaults procedure does not help. : With Forced Reload, the embedded software in the device will be erased. You will need to reload the software before the device is operational. The device will try to load the image using the default factory configuration parameters.
Troubleshooting 8. Enter the network’s Gateway IP Address, if necessary. You may need to contact your Network Administrator to get this address. You need to enter the default gateway address (169.254.128.133) only if the device and the TFTP server are separated by a router. 9. By default, the IP address of the TFTP server is provided. 10. By default, the image file name is provided. 11. Click OK. The device will reboot and the download starts automatically. 12.
Troubleshooting Bootloader=> reboot Example: Bootloader=> Bootloader=> Bootloader=> Bootloader=> Bootloader=> Bootloader=> Bootloader=> Bootloader=> Bootloader=> show set ipaddr 169.254.128.132 set serverip 169.254.128.133 set filename image_proxim.sei set gatewayip 169.254.128.133 set netmask 255.255.255.0 set ipaddrtype static show reboot The device will reboot and then download the image file. When the download process is complete, configure the device. 8.9.
Troubleshooting # Architecture: MIPS 7660 # Creation: 10-Aug-2009 (IST) 08:16:14 PM #################################################| Username: admin Password: This process may take up to 90 seconds. 2. Enter the CLI Username and password. By default username is admin and password is public. The terminal displays a welcome message and then the CLI Prompt.
Troubleshooting 8.10.1 Avoiding Interference When a source of interference is identified and when the level and frequencies are known, the next step is to avoid the interference. Some of the following actions can be tried: • Change the channel to a frequency that has no or least interference. • • Try changing the antenna polarization. A small beam antenna looks only in one particular direction.
Feature Applicability A Tabulated below are the feature(s) applicable to the respective devices: Tsunami® 8100 Series - Software Management Guide 219
Parameters Requiring Reboot Tabulated below are the device parameters that require reboot for the changes to take effect: Parameter(s) Web Page(s) B Applicable Device Mode* System Configuration Radio Mode BASIC CONFIGURATION ADVANCED CONFIGURATION -> System All Frequency Domain BASIC CONFIGURATION ADVANCED CONFIGURATION -> System All Network Mode ADVANCED CONFIGURATION -> System All Frequency Filter Lower Edge ADVANCED CONFIGURATION -> System All Frequency Filter Upper Edge ADVANCED CONFIGU
Parameters Requiring Reboot Parameter(s) Web Page(s) Applicable Device Mode* Ethernet Interface Properties Admin Status ADVANCED CONFIGURATION -> Network -> Ethernet Wireless Properties Channel Bandwidth BASIC CONFIGURATION ADVANCED CONFIGURATION -> Wireless -> Properties Channel Offset ADVANCED CONFIGURATION -> Wireless -> Properties Frequency Extension ADVANCED CONFIGURATION -> Wireless -> MIMO Properties Applicable only to, • Tsunami® MP-8160-BSU • Tsunami® MP-8160-SUA • Tsunami® MP-8160-C
Parameters Requiring Reboot Parameter(s) Web Page(s) Applicable Device Mode* SNMP All Version All Read Password All MANAGEMENT -> Services -> SNMP Read / Write Password All SNMP Trap Host Table All SNMP (If SNMP v3 is enabled) SNMP All Version All Security Level All Priv Protocol MANAGEMENT -> Services -> SNMP All Priv Password All Auth Protocol All Auth Password All SNMP Trap Host Table All Management Access Control Access Table Status Management Access Control Table All MAN
C Frequency Domains and Channels Introduction The Tsunami® Point-to-point and Point-to-multipoint products are available in two SKUs: United States (US) and rest of the World (WD) markets. Depending on the SKU, the device is hard programmed at factory to that Regulatory domain. Regulatory domain controls the list of frequency domains that are available in that SKU. Further each frequency domain will define the country specific regulatory rules and frequency bands. This is a configurable option.
Frequency Domains and Channels World 2.3 GHz 7 World 2.5 GHz 8 Canada 5 GHz 9 Europe 5.8 GHz 10 Europe 5.4 GHz 11 Europe 2.4 GHz 12 Russia 5 GHz 13 Taiwan 5 GHz 14 United States 5 GHz 15 Canada 5.8 GHz 16 World 6.4 GHz 17 UK 5.8 GHz 20 World 5.9 GHz 21 India 5.8 GHz 23 Brazil 5.4 GHz 24 Brazil 5.8 GHz 25 Australia 5.4 GHz 26 Australia 5.
Frequency Domains and Channels 2.4 GHz Channels 2.4 GHz frequency band is supported by the following devices: • Tsunami® MP-8100-BSU • • Tsunami® MP-8100-SUA Tsunami® QB-8100-EPA Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz US SKU United States 2.4 GHz 2412 ~ 2462 1 (2412), 2 (2417), 3 (2422)... 11 (2462). 1 (2412), 2 (2417), 3 (2422)... 11 (2462). 1 (2412), 2 (2417), 3 (2422)..
Frequency Domains and Channels 5 GHz Channels 5 GHz frequency band is supported by the following devices: • Tsunami® MP-8100-BSU • • • • • Tsunami® MP-8100-SUA Tsunami® MP-8150-SUR Tsunami® QB-8100-EPA Tsunami® QB-8150-EPR Tsunami® MP-8150-CPE • Tsunami® QB-8150-EPR-12/50 Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz US SKU United States 5.
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz World 5 GHz 5155 ~ 6075 (Non-DFS) 31(5155), 32(5160)... 214(6070), 215(6075). 31(5155), 32(5160)... 214(6070), 215(6075). 32(5160), 33(5165)... 213(6065), 214(6070). 32(5160), 33(5165)... 209(6045), 210(6050). 36(5180), 37(5185)... 213(6065), 214(6070). WORLD 4.
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz RUSSIA 5 GHz 5155 ~ 6075 (Non-DFS) 31(5155), 32(5160)... 214(6070), 215(6075). 31(5155), 32(5160)... 214(6070), 215(6075). 32(5160), 33(5165)... 213(6065), 214(6070). 32(5160), 33(5165)... 219(6045), 210(6050). 36(5180), 37(5185)... 213(6065), 214(6070).
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz Brazil 5.4 GHz 5475 ~ 5720 (DFS) 95(5475), 96(5480), 97(5485)… 144(5720). 95(5475), 96(5480), 97(5485)… 144(5720). 96(5480), 97(5485)… 142(5710), 143(5715). 96(5480), 97(5485)… 138(5690)... 139(5695). 100(5500), 101(5505)… 142(5710), 143(5715). Brazil 5.
Frequency Domains and Channels 6.4 GHz Channels 6.4 GHz frequency band is supported by the following devices: • Tsunami® MP-8160-BSU • • Tsunami® MP-8160-SUA Tsunami® MP-8160-CPE Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) World 6.4 GHz 5905 ~ 6420 Allowed Channels (Center Frequency) 5 MHz 181 (5905), 182 (5910), 183 (5915)... 284 (6420). 10 MHz 181 (5905), 182 (5910), 183 (5915)... 284 (6420). 20 MHz 182 (5910), 183 (5915), 184 (5920)... 283 (6415).
D SNR Information Tabulated below are the SNR values for the following devices: • • • Tsunami® MP-8100-BSU Tsunami® MP-8100-SUA Tsunami® MP-8150-SUR • • Tsunami® QB-8100-EPA Tsunami® QB-8150-EPR 2.4 GHz MCS Index Modulation No of Streams 5 MHz 10 MHz 40 MHz 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR MCS0 BPSK 1/2 Single 1.6 10 86 3.3 10 86 6.5 12 86 13.5 26 80 MCS1 QPSK 1/2 Single 3.3 15 86 6.
SNR Information 5 GHz MCS Index Modulation No of Streams 5 MHz 10 MHz 40 MHz 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR MCS1 QPSK 1/2 Single 3.3 8 86 6.5 8 86 13 9 86 27 11 80 MCS2 QPSK 3/4 Single 4.9 10 84 9.7 13 84 19.5 11 84 40.5 15 79 MCS3 16 QAM 1/2 Single 6.5 14 82 13 16 82 26 14 82 54 16 77 MCS4 16 QAM 3/4 Single 9.7 17 80 19.
SNR Information Tabulated below are the SNR values for the following devices: • Tsunami® MP-8150-CPE • Tsunami® QB-8150-EPR-12/50 5 GHz MCS Index Modulation No of Streams 5 MHz 10 MHz 40 MHz 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR MCS0 BPSK 1/2 Single 1.6 8 82 3.3 8 82 6.5 8 82 13.5 8 82 MCS1 QPSK 1/2 Single 3.3 8 82 6.5 9 82 13 9 82 27 9 82 MCS2 QPSK 3/4 Single 4.9 10 82 9.
SNR Information 6.4 GHz MCS Index Modulation No of Streams 5 MHz 10 MHz 40 MHz 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR MCS2 QPSK 3/4 Single 4.9 10 86 9.7 10 84 19.5 10 86 40.5 12 82 MCS3 16 QAM 1/2 Single 6.5 13 84 13 14 84 26 13 82 54 13 74 MCS4 16 QAM 3/4 Single 9.7 16 80 19.
E Bootloader CLI and ScanTool Bootloader CLI The Bootloader CLI is a minimal subset of the normal CLI used to perform initial configuration of the device. The Bootloader CLI is available when the device embedded software is not running.
Bootloader CLI and ScanTool To Load the Firmware from the Network • Use the show command to view the parameters and their values, and use the set command to set the parameter value. To Get the IP Parameters Dynamically for Loading the Firmware 1. Set the ipaddrtype to dynamic 2. Run the BOOTP and TFTP Servers followed by reboot of the device When the device reboots, the device gets the IP Address and Boot filename from the BOOTP server. You need not change any of the default Bootloader parameters.
Lightning Protection F Lightning protection is used to maximize the reliability of the communications equipment by safely re-directing current from a lightning strike or a power surge traveling along the Cat 5/Cat5e/Cat 6 Ethernet cabling to the ground using the shortest path possible. Designing a proper grounding system prior to installing any communications equipment is critical to minimize the possibility of equipment damage, void warranties, and cause serious injury.
G Abbreviations A ACL Access Control List ACS Automatic Channel Selection AES Advanced Encryption Standard ALG Application Level Gateway ARP Address Resolution Protocol ATPC Adaptive Transmit Power Control B BSU Base Station Unit C CCP Compression Control Protocol CHAP Challenge Handshake Authentication Protocol CLI Command Line Interface CIR Committed Information Rate CPE Customer Premises Equipment CRC Cyclic Redundancy Check D DDRS Dynamic Data Rate Selection DES Data Encry
Abbreviations FCC Federal Communications Commission FCS Frame Check Sequence G Gbps Gigabit Per Second GPL General Public License GRE Generic Routing Encapsulation H HTTP HyperText Transfer Protocol HTTPS HyperText Transfer Protocol Secure I IANA Internet Assigned Numbers Authority (IANA) IC Industry Canada ICMP Internet Control Message Protocol IGMP Internet Group Management Protocol ISP Internet Service Provider ITS Intelligent Transportation System L LACP Link Aggregation Cont
Abbreviations MSCHAP v2 Microsoft Challenge-Handshake Authentication Protocol MTU Maximum Transmission Unit N NAPT Network Address Port Translation NAT Network Address Translation NCP Network Control Protocol NMS Network Management System NOP Non Occupancy Period P PAP Password Authentication Protocol PC Personal Computer PoE Power Over Ethernet PPPoE Point-to-point Protocol over Ethernet PTMP Point-to-multipoint PTP Point-to-point PVES ProximVision ES Q QB Quick Bridge QoS Q
Abbreviations SNTP Simple Network Time Protocol SSH Secure Shell SSL Secure Socket Layer STP Spanning Tree Protocol SU Subscriber Unit T TBC Text Based Configuration TCP Transmission Control Protocol TFTP Trivial File Transfer Protocol TKIP Temporal Key Integrity Protocol TPC Transmit Power Control TPID Tag Protocol Identifier TTL Time to Live U UDP User Datagram Protocol UTP Unshielded Twisted Pair V VLAN Virtual Local Area Network W WEP Wired Equivalent Privacy WORP Wirel
Statement of Warranty H Warranty Coverage Proxim Wireless Corporation warrants that its products are manufactured solely from new parts, conform substantially to specifications, and will be free of defects in material and workmanship for a Warranty Period of 1 year from the date of purchase.
Statement of Warranty Hours of Operation When contacting the Customer Service for support, Buyer should be prepared to provide the product description and serial number and a description of the problem. The serial number should be on the product. In the event the Customer Service Center determines that the problem can be corrected with a software update, Buyer might be instructed to download the update from Proxim Wireless’s web site or, if that’s not possible, the update will be sent to Buyer.
Technical Services and Support I Obtaining Technical Service and Support If you are having trouble using the Proxim product, please read this manual and the additional documentation provided with your product.
Technical Services and Support Telephone Support Contact technical support via telephone as follows: USA & Canada Customers Call Technical Support: Phone: 408-383-7700 Toll Free: 866-674-6626 Hours: 6:00 AM to 6:00 P.M. Monday - Friday, Pacific Time APAC Customers Call Technical Support: Phone: +91 40 23115490 Hours: 9:00 AM to 6:00 P.M. Monday - Friday, IST (UTC/GMT +5:30 hrs) International Customers Call Technical Support: Phone: 408-383-7700 Hours: 6:00 AM to 6:00 P.M.
Technical Services and Support ServPak Service 24x7Enhanced 8x5 Standard (Bundled Serv.) (Bundled Serv.
FCC Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.