Tsunami QB-8100 Series (100 Mbps / 5 Mbps Models) Installation and Management Guide
Tsunami QB-8100 Series(100 Mbps/5 Mbps Models) Installation and Management Guide Copyright © 2010 Proxim Wireless Corporation, Milpitas, CA. All rights reserved. Covered by one or more of the following U.S. patents: 5,231,634; 5,875,179; 6,006,090; 5,809,060; 6,075,812; 5,077,753. This manual and the software described herein are copyrighted with all rights reserved.
Tsunami QB-8100 Series(100 Mbps/5 Mbps Models) Installation and Management Guide Preface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tsunami QB-8100 Series(100 Mbps/5 Mbps Models) Installation and Management Guide Wireless Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Configuring WORP Properties in End Point A Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 Configuring WORP Properties in End Point B Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tsunami QB-8100 Series(100 Mbps/5 Mbps Models) Installation and Management Guide File Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Upgrade Firmware via HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131 Upgrade Configuration via HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Tsunami QB-8100 Series(100 Mbps/5 Mbps Models) Installation and Management Guide Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Link Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 Wireless Site Survey (End Point B Only) . . . . . . . . . . . . . . . . . . . . . . . . . .
Tsunami QB-8100 Series(100 Mbps/5 Mbps Models) Installation and Management Guide Two Units Are Unable to Communicate Wirelessly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Surge and Lightning preventive maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190 Setup and Configuration Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Preface Preface About this Manual Congratulations on your purchase of Tsunami QuickBridge 8100. This manual gives you a jump-start working knowledge on the QuickBridge 8100 link that can help you build a wireless network backhaul application easily! It describes the QB-8100 device installation and its functions, the technology used, and the recommended methods for configuring and monitoring the device.
Preface The appendixes contain supplementary information, including frequency domain tables, channel frequency, and Technical Support information. If you are already familiar with this type of product, you can use the Quick Install Guide to install the unit.
Overview 1 This chapter provides a description of the Tsunami QB-8100 Series (100 Mbps/5 Mbps Models), its functionalities, and features.
Overview 1.1 Introduction The Tsunami QuickBridge 8100 is a wireless point-to-point device designed to provide wireless networking solutions for enterprises and small business markets. Two pre-configured bridges enable users to easily, quickly, and economically install a wireless extension between two locations, eliminating the need for costly leased line or cable alternatives. The product’s primary components are a wireless device and a Power-over-Ethernet injector.
Overview 1.2 Wireless Network Topology (Point-to-Point Link) It is easy to set up a wireless point-to-point link as depicted in the following figure. Each device is set up as either an End Point A or an End Point B.
Overview Figure 1-2 2x2 MIMO Tsunami QB-8100 Series (100 Mbps/5 Mbps Models) Installation and Management Guide 13
Overview 1.4 Management and Monitoring Capabilities The network administrators can use the following management and monitoring interfaces to configure and manage the Tsunami QB-8100 unit: • Web Interface • Command Line Interface • SNMP Management 1.4.1 Web Interface The Web interface (HTTP) provides easy access to configuration settings and network statistics from any computer on the network.
Overview IMPORTANT! Using a serial connection, you can access the CLI of the device through a terminal emulation program, such as HyperTerminal. (See “HyperTerminal Connection Properties” in the Tsunami QuickBridge 8100 Reference Manual.) For all other modes of connection, you will need the IP address of the device to use the Web Interface, SNMP, or the CLI via telnet.
Installation and Initialization 2 This chapter describes the steps required to install and mount the QuickBridge 8100 Series units. If you are already familiar with this type of product, refer to the Tsunami QB-8100 Quick Installation Guide for streamlined installation procedures.
Installation and Initialization 2.1 Hardware Overview The Tsunami QB-8100 Series (100 Mbps/5 Mbps Models) is a full-featured outdoor QuickBridge Endpoint that contains a high power radio unit in plastic enclosure with dual polarized, high gain performance, integrated antenna. The unit is designed to be mounted to a pole of 1.25” - 3” diameter (not included) using the supplied pole mount bracket accessories (P/N 909-00001).
Installation and Initialization 2.1.2 Serial Connection The serial connection is made with an RJ11 to DB9 connector (also referred to as a “dongle”). Connect the RJ11 end to the unit and connect the serial (DB9) end to your PC to align the antenna and to enter CLI commands. See the following figure: Figure 2-2 Serial Components The connections are as follows: D-Shell 1 2 3 4 5 6 7 8 9 RJ11 NC 2 4 NC 1+3+5 6 NC NC NC 2.
Installation and Initialization What’s in the Kit Image Power Injector & Power Cord Connector Weather Proofing Kit Grounding Kit Pole Mounting Kit and Hardware The mounting kit includes the following: Quantity Component Name Image 2 ea. M6-16 Screw 2 ea. M6 Spring Washer 2 ea. M6 Plain Washer 2 ea. Hose Clamp 1 ea.
Installation and Initialization 2.3 Installation Procedure This section describes the procedures to install and mount the QB-8100 unit. If you are already familiar with this type of product, you can use the Quick Install Guide for streamlined installation procedures. IMPORTANT This device must be installed by a trained professional, value added reseller, or systems integrator who is familiar with RF planning issues and the regulatory limits. CAUTION! Heed all the WARNINGS. Follow all the instructions.
Installation and Initialization Plan for: • Device’s continuous power consumption needs • Lightning protection and system grounding • Hardware mounting • Cable installation including egress • Pre-testing equipment (back-to-back test procedure) Step 2: Choose a Location To make optimal use of the device, you must find a suitable location to install the hardware. The range of the radio device largely depends upon the position of the antenna.
Installation and Initialization 1. Slide the lock nut (3) and sealing cap (2) over the bare end of a Cat5 ethernet cable (1) as shown in figure below: Cat 5 cable with bare end Lock nut and sealing cap Lock nut and sealing cap with the Cat 5 cable 2. Terminate the Cat5 ethernet cable and crimp it with a standard RJ-45 connector (4). Tighten the sealing cap and lock the nut. 3. Insert the assembled ethernet cable into the POWER + DATA port of the QB-8100 unit.
Installation and Initialization NOTE: Slide the M6-16 screw through the M6 Spring washer first and then through M6 plain washer. Misplacement of the washers may cause damage to the enclosure. 3. Slide the hose clamps (2) through the mounting bracket and place the hose clamps around the pole as shown below: 4.
Installation and Initialization Step 7: Plug in the Cables 1. Plug one end of Cat5 Ethernet cable (5.5 mm/.217 in OD maximum; not supplied) into the Ethernet (RJ45) jack of the Ethernet interface inside the unit enclosure. Ensure that the cable connector is latched securely. You can hear a click sound when the cable connector latches into the jack, then tighten the sealing nut by hand. 2. Connect the other end of the Cat5 cable to the “LAN+DC” port on the power injector.
Installation and Initialization . Figure 2-5 Grounding the Unit Step 9: Power on the Unit Plug in the power cord into a power outlet after having connected the Power Injector and the Radio device using Cat5 cable. There is no ON/OFF switch on the unit. To disconnect power, unplug the RJ45 connector from the “LAN+DC” port on the power injector. Step 10: View LEDs When the device is powered on, it performs startup diagnostics. When startup is complete, the LEDs show the unit’s operational state.
Installation and Initialization 2.4 Initialization Connecting to the device requires either: • A direct connection with a serial RS-232 cable. • A direct connection with an Ethernet cable or a network connection. Connecting with the Ethernet cable allows you to use of the Web Interface and SNMP in addition to the CLI. Connecting with a serial connection allows you to configure and manage the device with the CLI.
Installation and Initialization Figure 2-7 Scan List NOTE: If your computer has more than one network adapter installed, it prompts you to select the adapter for the ScanTool before the Scan List appears. If prompted, select the ethernet adapter and click OK. You can change your adapter setting whenever necessary by clicking Select Adapter on the Scan List screen. 4. If your device details do not appear in the Scan List, click Rescan to update the display.
Installation and Initialization 2.4.3.1 Assigning the IP Address Manually 1. Select the IP Address Type as Static and then enter the appropriate IP Address, Subnet Mask, and the Gateway IP Address parameters. 2. Enter the SNMP Read/Write password in the Read/Write Password field. By default, it is public. 3. Click OK to save the details. The device automatically reboots after clicking OK. By clicking Rescan, verify whether the changes are applied or not.
Installation and Initialization • If you are unable to log into the configuration pages by using default user name and password, please check with the administrator or follow Forced Reload procedures. • For security purposes, it is recommended to change Password from the default “public” immediately to restrict unauthorized access to the device. • If you enter wrong password consecutively for three times, the HTTP session will get disconnected. 2.5.
Installation and Initialization In some cases, upon successful COMMIT operation, a message “Please Reboot to take effect” appears as follows: 2.5.3 REBOOT Button Reboot operation is required for any change in the key parameters to take effect. For example, settings such as configuring the Radio Mode, IP Address, and Network Mode need reboot to take effect. It is recommended that the device must be rebooted immediately after modifying a rebootable parameter.
Installation and Initialization NOTES: • It is always mandatory to commit the changes before REBOOT, otherwise the changes will not take effect. • The System Summary can be viewed by clicking HOME. • The Event Log can be cleared by clicking Clear Event Log and can be refreshed by clicking Refresh. An error message appears when a parameter is configured with inappropriate value. This error message prompts you to verify your data or warns you to correct the pathway.
Installation and Initialization 2.6 Factory Default Configuration Parameter Default Network Mode Bridge Routing Disabled WORP Network Name MY_NETWORK Password public IP Address Assignment Type Static IP Address 169.254.128.132 Subnet Mask 255.255.255.
Basic Configuration 3 This chapter provides an overview of the basic configuration settings of Tsunami QB-8100 (100 Mbps/5 Mbps Models).
Basic Configuration 3.1 Country and Related Settings The unit’s Advanced Configuration window provides a frequency domain field that automatically provides the allowed bandwidth and frequencies for the selected country. Units sold in the United States are pre-configured to scan and display only the outdoor frequencies permitted by the FCC. No other country can be configured. Units sold outside of the United States support the selection of a country by the professional installer using frequency domain.
Basic Configuration If ACS is disabled, during initialization, the device selects the Preferred Channel to be the operational channel. If ACS is enabled, during initialization, the device scans all the channels in the configured frequency domain and selects the channel with the best RSSI to be the operational channel. Once the operating channel is selected, the device scans the channel for radar presence for a duration of Channel Wait Time.
Basic Configuration First configure one End Point as End Point A and the other End Point as End Point B. The list of parameters that must be configured for linking of End Point A and End Point B are: • Network Name • Network Secret • Encryption (when used) • Frequency Channel (when available) • Channel Bandwidth • Data Rate See the description of these parameters and how to configure them in Basic Configuration Information. 3.
Basic Configuration 3.7 Basic Configuration Information The BASIC CONFIGURATION Page in the Web-based Configuration Interface provides a one-place access to a minimum set of configuration parameters to quickly set up a QuickBridge Point-to-Point link. Figure 3-1: Basic Configuration See the following table for Basic Configuration parameters and their descriptions: Parameter Description System Name This is the system name for easy identification of the End Point A or End Point B.
Basic Configuration Parameter Description Frequency Domain It specifies the country of operation, permitted frequency bands and regulatory rules for that country/domain. Upon choosing a frequency domain, the Dynamic Frequency Selection (DFS) and Automatic Transmit Power Control (ATPC) features are enabled automatically if the selected country and band has a regulatory domain that requires it.
Basic Configuration Parameter Description Active Channel This will display the current active channel on which wireless interface is operating. If you have enabled the auto channel selection option or if the device moves to a different channel because of radar detection, then this field displays the current operating channel. DDRS Status This parameter is displayed only when DDRS feature is enabled in ADVANCED CONFIGURATION > Wireless > Interface 1 > DDRS. For more details refer to DDRS.
Advanced Configuration 4 This chapter provides details about the Tsunami QB-8100 unit parameters and describes the procedures to configure them using Web-based management interface. These parameters can also be configured using the other management interfaces like SNMP and CLI.
Advanced Configuration 4.1 System Configuration The System screen allows you to configure the QB-8100 device as an End Point A or an End Point B, the frequency domain, and the network mode as Bridge or Routing. To configure the System 1. Click ADVANCED CONFIGURATION > System. The System screen is displayed as shown below: Figure 4-1 System screen 2. From the Radio Mode drop-down menu, select either End Point A or End Point B. 3. From the Frequency Domain drop-down menu, select a frequency domain. 4.
Advanced Configuration Parameter Description Maximum MTU This feature provides support for Ethernet frames with more than 1,500 bytes of payload (MTU). It can be configured with any value between 68 to 2048 bytes. By default, its value is 1500. NOTES: • The “Max MTU” configured does not include Ethernet Header (14 bytes) and VLAN tag (4 bytes). • For optimal performance, same value of MTU should be configured on both End Point A and End Point B.
Advanced Configuration Figure 4-3 IP configuration in Router mode To configure the Network IP properties, click ADVANCED CONFIGURATION > Network > IP Configuration. The following screen appears: Figure 4-4 IP Configuration 1. Enter the appropriate parameters in the IP Configuration screen. See the following table that lists and describes the parameters. 2. Click OK. The IP configuration takes effect only after Reboot.
Advanced Configuration Parameter Description Ethernet Address Type This field is applicable only if the Network mode on the System screen is configured in Bridge mode. This parameter specifies whether the device network parameters are to be configured through DHCP or to be assigned statically. Select Dynamic to configure the device as a Dynamic Host Configuration Protocol (DHCP) client. If Dynamic is selected, the device obtains the IP settings from a network DHCP server automatically during the bootup.
Advanced Configuration 4.3 Ethernet Properties Configuration In the Ethernet Interface Properties screen, you can configure the Ethernet transmission properties. The recommended settings are Auto for TxMode And Speed. The device supports a single ethernet interface Ethernet 1. To configure the Ethernet Interface 1. Click ADVANCED CONFIGURATION > Ethernet. The Ethernet Interface Properties screen is displayed as shown below. Figure 4-5 Wireless Ethernet Properties 2.
Advanced Configuration Parameter TxMode And Speed Description This parameter allows the user to select the speed and mode based on the requirement for the corresponding interface. NOTE: • Auto: Selects the best transmission mode available when both sides are set to Auto. • The recommended setting is Auto. • In order to allow communication, the transmitter and receiver should be configured in same transmission modes. • The maximum speed is measured as 100 megabits per second. 4.
Advanced Configuration Figure 4-6 Wireless Interface WORP 2. Enter the appropriate parameters in the WORP Configuration screen. See the following table for the descriptions of the parameters. 3. Click OK.
Advanced Configuration Parameter Description Mode Specifies the radio mode in which the device is configured. Network Name It is the name given to a network so that an End Point A and an End Point B can mutually authenticate. End Point B can register to End Point A only if it has the same Network Name. The Network Name can be 1 to 32 characters in length. WORP MTU WORP MTU (Maximum Transfer Unit) is the largest size of the data payload in wireless frame that may be transmitted.
Advanced Configuration Parameter Auto Multi Frame Bursting Description Select Enable or Disable from Auto Multi Frame Bursting drop-down box. By default, Auto Multi Frame Bursting is enabled. NOTE: Auto Multi Frame Bursting is enabled only if Multi Frame Bursting is Enabled. When Auto Multi Frame Bursting is disabled, the number of packets per burst will be defined as in the QoS Service Flow class used for communication.
Advanced Configuration Parameter Bandwidth Limit Type Description This parameter specifies the action performed when the traffic utilization exceeds the configured input/output limits. Policing: When the traffic utilization reaches the configured limit, the excess traffic will be discarded. Shaping: When the traffic utilization reaches the configured limit, the excess traffic will be buffered and sent at the rate specified in the Output Bandwidth Limit.
Advanced Configuration 4.4.2 Configuring WORP Properties in End Point B Mode When the device is in End Point B mode, only End Point B-related configuration settings are displayed. Refer to Configuring WORP Properties in End Point A Mode. Parameter Mode Description System Name given to the End Point A (Refer to Basic Configuration Information). If the End Point A Name is specified, it forces the End Point B to register to the End Point A with the given Network Name and System Name.
Advanced Configuration Figure 4-7 Wireless interface properties 2. Enter the appropriate parameters. See the following table that lists the parameters and their descriptions. 3. Click OK. NOTES: • If World/Russia frequency domain is selected, establishing WORP link might take longer time because the End Point B has to scan relatively more number of channels. • When you modify wireless parameters and click COMMIT, it may result in brief interruption of service.
Advanced Configuration Parameter Auto Channel Selection (ACS) Descriptions Enable or disable the Auto Channel Selection for wireless interface. If ACS is enabled on the End Point A, it scans all the channels and selects the best channel at the startup. If ACS is enabled on the End Point B, End Point B continuously scans all the channels till it connects to an End Point A. By default, ACS is disabled on End Point A and enabled on End Point B.
Advanced Configuration Parameter Satellite Density Descriptions Satellite Density setting helps achieve maximum bandwidth in a wireless network. It influences the receive sensitivity of the radio interface and improves operation in environments with high noise level. Reducing the sensitivity of the device enables unwanted “noise” to be filtered out (it disappears under the threshold). You can configure the Satellite Density to be Disable, Large, Medium, Small, Mini, or Micro.
Advanced Configuration Parameter TPC Descriptions With Transmit Power Control (TPC), you can adjust the output power of the device to a lower level. This is performed to reduce interference with the neighboring devices. It can be helpful when higher gain antenna is used without violating the maximum radiated output power for a country or regulatory domain. This value can be configured in 1 dB increments.
Advanced Configuration 4.4.4 Blacklist Information This section displays information regarding various blacklisted channels. It consists of the following parameters. NOTE: Click COMMIT for the changes to take effect. Parameter Description Channel Number The channel number indicates the channel that is blacklisted. Reason The reason for which that particular channel is blacklisted. The most common reason for blacklisting a channel is the presence of a radar in that channel.
Advanced Configuration Figure 4-8 MIMO Properties 2. Enter the appropriate parameters on the MIMO Properties screen. See the following table that lists the parameters and their descriptions. 3. Click OK. NOTE: When you modify MIMO parameters and click COMMIT, it may result in brief interruption of service. Parameter Frequency Extension Description Configuration of this parameter is valid only if the channel bandwidth is 40 MHz.
Advanced Configuration Parameter Description Guard Interval Possible values for Guard interval are 800 nSec and 400 nSec. 400 nSec is valid only for 40 MHz channel bandwidth. Data Streams MIMO radio uses multiple antennas for transmitting and receiving the data. These data streams specify the number of data streams over the air transmitted or received in parallel. • Data streams “1-Longer Range” uses a single flow of the signals on the antennas.
Advanced Configuration If ACS is disabled, during initialization, the device selects the Preferred Channel to be the operational channel. If ACS is enabled, during initialization, the device scans all the channels in the configured frequency domain and selects the channel with the best RSSI to be the operational channel. Once the operating channel is selected, the device scans the channel for radar presence for a duration of Channel Wait Time.
Advanced Configuration 3. During its operation, the End Point B scans for radar continuously and after detecting the radar, it sends a message to the End Point A indicating radar detection on that current channel and blacklists that channel for Non Occupancy Period (NOP). The default NOP is 30 minutes. 4. End Point B restarts scanning for the End Point A as mentioned above in Step 1. 5. End Point B never scans any blacklisted channels. 6.
Advanced Configuration See the following DFS parameter configurations table that lists the parameters and their descriptions Parameter Description Channel Wait Time End Point B after selecting the best channel from its End Point A-scan list, scans for the RADAR for a period of 60 seconds in that particular channel. This Channel Wait Time ranges from 0 to 3600 sec. By default, Channel Wait Time is set to 60 sec.
Advanced Configuration 4.4.8.1 DDRS Configuration To configure DDRS, 1. Click ADVANCED CONFIGURATION > Wireless > Interface 1 > DDRS. The DDRS Configuration screen appears as shown below: Figure 4-11 DDRS Configuration The DDRS Configuration table holds the DDRS parameter configurations. 2. Select the appropriate parameters. See the following table that lists the parameters and their descriptions. 3. Click OK.
Advanced Configuration Parameter DDRS Max Data Rate Description This parameter specifies the maximum data rate that is selected during DDRS Algorithm. By default, 130Mbps is selected. NOTE: Algorithm will select the transmission rate between DDRS Default Data Rate and DDRS Max Data Rate configuration. Rate Incr. Avg. SNR Threshold This parameter specifies a threshold value, which is added to the average remote SNR and this summation is compared with the current remote SNR.
Advanced Configuration Table 4-1 Data Rates to Rate Index Mapping Table Rate Index 1 2 3 4 5 6 7 8 Data Rates (Mbps) 5 MHz Channel 10 MHz Channel 20 MHz Channel 40 MHz Channel Bandwidth Bandwidth (for Bandwidth (for Bandwidth (for Full GI-800ns) Full GI-800ns) Full GI-800ns) Longer Higher Longer Higher Longer Higher Short GI-400ns Full GI-800ns Range Through Range Through Range Through Longer Higher Longer Higher put put put Range Through Range Though put put 1.6 3.3 3.3 6.5 6.5 13 15 30 13.5 27 3.3 6.
Advanced Configuration 4.5 Security Configuration 4.5.1 Setting Up Wireless Security In Wireless Security page, you can configure security mechanisms used to secure the communication link between End Point A and End Point B. By default, a security profile (WORP Security) is preconfigured with the default configuration for WORP security. However, more profiles can be created as required. Even though multiple security profiles can be created, only one security profile can be active at a time.
Advanced Configuration 4.5.1.1 Creating a New Security Profile To create a new security profile 1. Click ADVANCED CONFIGURATION > Security > Wireless Security. 2. Click Add in the Wireless Security Configuration screen to create a new entry. The Wireless Security Add Row screen is displayed as shown below. Figure 4-13 Creating a New Security Profile 3. Enter the appropriate parameters in the Wireless Security Add Row screen. See the following table for information on the parameters and their descriptions.
Advanced Configuration Sample Security Profile Configuration End Point A End Point B Profile Name NEW NEW Encryption Type AES-CCM AES-CCM Key 1 1234567890abcdef1234567890abcdef (32 Hexadecimal digits) or publicpublic1234 (16 ASCII Characters) 1234567890abcdef1234567890abcdef (32 Hexadecimal digits) or publicpublic1234 (16 ASCII Characters) Network Secret public public Entry status Enable Enable NOTE: • By using the preceding security configuration, Wireless link data follows these constrai
Advanced Configuration 4.5.1.2 Modifying a Security Profile To edit the parameters of the existing security profiles 1. Click ADVANCED CONFIGURATION > Security > Wireless Security. 2. Click Edit. The Wireless Security Edit Row page appears. 3. Edit the parameters and click OK. 4. To apply the configured properties to the device, click COMMIT. 4.5.
Advanced Configuration Parameter Description Profile Name Specifies the profile name. Max Retransmissions Specifies the maximum retransmissions allowed. Message Response Time Specifies the message response time. Re Authentication Period Specifies the Re Authentication Period. Entry status Displays the Radius profile as Enable. Server Type This is a read only parameter and displays the server type. Two Server Types are supported: Primary Auth Server and Secondary Auth Server.
Advanced Configuration Figure 4-15 MAC Access Control 2. Select the Operation Type as either Allow or Deny. NOTE: Based on the Operation Type, the user can allow or deny the association of the MAC ACL profile to an End Point B. 3. Click OK. To add entries to MAC Access Control table 1. Click Add in the MAC Access Control screen. The MAC ACL Add Row page appears. 2. Enter the MAC Address and Comment, and then select Enable/Disable to enable or disable Entry Status of the MAC Address. 3. Click Add.
Advanced Configuration 4.6 Quality of Service (QoS) Configuration The Quality of Service (QoS) feature is based on the 802.16 standard and defines the classes, service flows, and packet identification rules for specific types of traffic. 4.6.1 QoS Concepts and Definitions The software supports QoS provisioning from the End Point A only.
Advanced Configuration a. TCP/UDP Source Port Range (5060-5061, 10000-20000) b. IP Protocol List (17 = UDP) 6. Cisco VoIP DL a. TCP/UDP Destination Port Range (16,000-33,000) b. IP Protocol List (17 = UDP) 7. Vonage VoIP DL a. TCP/UDP Destination Port Range (5060-5061, 10000-20000) b. IP Protocol List (17 = UDP) 8. TCP a. IP Protocol List (6) 9. UDP a. IP Protocol List (17) 10. PPPoE Control a. Ether Type Rule (Ether Type = DIX-Snap, Ether Value = 0x8863) 11. PPPoE Data a.
Advanced Configuration • Service Flow Direction – Downlink (DL: traffic from End Point A to End Point B); Uplink (UL: traffic from End Point B to End Point A) • Maximum sustained data rate (or Maximum Information Rate, MIR) – specified in units of 1 Kbps from 8 Kbps up to the maximum rate specified in the license. • Minimum reserved traffic rate (or Committed Information Rate, CIR) – specified in units of 1 Kbps from 0 Kbps up to the maximum rate specified in the license.
Advanced Configuration c. Initialization State = Active d. Maximum Sustained Data Rate = 2 Mbps e. Minimum Reserved Traffic Rate = 2 Mbps f. Maximum Latency = 20 milliseconds g. Traffic Priority = 1 Note that two different VoIP Service Flow classes for each direction of traffic have been defined (index numbers 4 to 7) which follow the ITU-T standard nomenclatures: G.711 refers to a type of audio companding and encoding that produces a 64 Kbps bitstream, suitable for all types of audio signals. G.
Advanced Configuration – PIR: Vonage VoIP UL; PIR Priority: 1 – PIR: Cisco VoIP UL; PIR Priority: 1 b. SF class: DL-G729 20 ms VoIP rtPS – PIR: Vonage VoIP DL; PIR Priority: 1 – PIR: Cisco VoIP DL; PIR Priority: 1 5. 2Mbps Video a. SF class: DL-2Mbps Video – PIR: Streaming Video (IP/TV); PIR Priority: 1 4.6.2 QoS Configuration There are several pre-defined QoS classes, SFCs, and PIRs available that cover the most common types of traffic.
Advanced Configuration 3. Add a New PIR MAC Address Entry a. Click Add to add a new entry. The following screen appears for configuring the MAC Entry Details. Figure 4-17 QoS PIR MAC Address Add Entry b. Provide the MAC Address, Mask, Comment, Entry Status details and click Add. Comment field can be used to identify when this particular entry is referred in PIR Rule/QoS Class. QoS PIR IP Address Configuration 1. Click ADVANCED CONFIGURATION > QoS > PIR List > IP Address Entries.
Advanced Configuration Figure 4-19 QoS PIR IP Address Add Entry b. Provide the IP Address, Subnet Mask, Comment, Entry Status details and click Add. Comment field can be used by the user to identify when this particular entry is referred in PIR Rule/QoS Class. QoS PIR TCP/UDP Port Configuration 1. Click ADVANCED CONFIGURATION > QoS > PIR List > TCP/UDP Port Entries. Three predefined TCP/UDP Port Entries are displayed. You can configure maximum 256 entries. Start Port, End Port combination should be unique.
Advanced Configuration Figure 4-21 QoS PIR TCP/UDP Port Add Entry b. Provide the Start Port, End Port, Entry Status details and click Add. Comment field can be used to identify when this particular entry is referred in PIR Rule/QoS Class. 4.6.2.1 QoS PIR Configuration 1. Click ADVANCED CONFIGURATION > QoS > PIR List. 18 predefined PIR Rules are displayed in this page. You can configure maximum 64 entries. PIR Rule Name should be unique. This PIR Rule can be referred in the QoS Class’s Service Flow Details.
Advanced Configuration Figure 4-22 QoS PIR Entries 2. Add a New PIR Rule. a. Click Add to add a new entry. The following screen appears for configuring the New PIR Entry. Figure 4-23 QoS PIR Add Entry b. Provide the PIR Name, Entry Status details and click Add.
Advanced Configuration PIR Rule Clarification Details 1. Click ADVANCED CONFIGURATION > QoS > PIR List and click Details for editing a particular PIR Rule.
Advanced Configuration Parameter Description Rule Name This parameter specifies the Name of the Packet Identification Rule (PIR) and can have a length of 1-32 characters. ToS Rule This parameter is used to enable/disable TOS rule. Enter the values for the following to specify the ToS-related configuration: ToS Low ToS High ToS Mask Ether Priority Rule This parameters is used to enable or disable 802.1p priority rule. Enter the values for the following to specify 802.
Advanced Configuration Adding Protocol ID a. Click Add to add a new Protocol entry. The following screen appears. Figure 4-25 QoS PIR Protocol ID b. Enter the details and click Add. For deleting an entry, click Delete for the corresponding entry in PIR Details page. Adding TCP/UDP Source Port Numbers a. Click Add to add a new entry. The following screen appears. Figure 4-26 QoS PIR TCP/UDP Source Port Add Entry b.
Advanced Configuration Figure 4-27 QoS PIR TCP/UDP Destination Port Add Entry b. All the entries present in the PIR TCP/UDP Port Entries are displayed in the TCP/UDP Port Entry Table. Select the appropriate radio button and click Add. After adding the entry for this specific PIR, it is displayed in the Existing TCP/UDP Port Entries table. For deleting an entry, click Delete for the corresponding entry in the PIR Details page. Adding Source IP Address a. Click Add to add a new entry.
Advanced Configuration b. All the entries present in the PIR IP Address Entries are displayed in the IP Address Entry Table. Select the appropriate radio button and click Add. After adding the entry for this specific PIR, it is displayed in the Existing IP Address Entries table. For deleting an entry, click Delete for the corresponding entry in the PIR Details page. Adding Destination IP Address a. Click Add to add a new entry. The following screen appears.
Advanced Configuration Figure 4-30 QoS PIR Source MAC address Add Entry b. All the entries present in the PIR MAC Address Entries are displayed in the MAC Address Entry Table. Select the appropriate radio button and click Add. After adding the entry for this specific PIR, it is displayed in the Existing MAC Address Entries table. For deleting an entry, click Delete for the corresponding entry in the PIR Details page. Adding Destination MAC Address a. Click Add to add a new entry.
Advanced Configuration 4.6.2.2 QoS Service Flow Configuration (SFC) 1. Click ADVANCED CONFIGURATION > QoS > SFC List. Eight predefined SFCs are displayed in this page. This table allows the user to configure maximum of 32 entries. Service Flow Name should be unique. This SFC can be referred in the QoS Class’ Details. SFC referred by any QoS Class cannot be deleted. Figure 4-32 QoS Service Flow Entries Adding a New Service Flow (SFC): a. Click Add to add new entry.
Advanced Configuration Figure 4-33 QoS Service Flow Add Entry 2. Specify details for the Service Flow Name, Scheduler Type, Traffic Direction, MIR, CIR, Max Latency, Tolerable Jitter, Traffic Priority, Max Messages in Burst and Entry Status. 3. Click Add. Parameter Description Service Flow Name Specifies the Name of the Service Flow. It can be of length 1-32 characters. Scheduler Type Specifies the Scheduler methods to be used.
Advanced Configuration Parameter Max Messages in Burst Description Specifies the maximum number of messages that can be sent in a burst. This value ranges from 1 to 16. NOTE: Reducing the number of messages impacts the throughput. Entry Status Specifies the Service Flow status. 4.6.2.3 QoS Class Configuration 1. Click ADVANCED CONFIGURATION > QoS > Class List. Five predefined QoS Classes are displayed in this page. You can configure maximum 8 entries. QoS Class Name should be unique.
Advanced Configuration Parameter L2 Broadcast QoS Class Description This parameter specifies WORP to use this particular class for worp broadcast facility. L2 Broadcast QoS Class is valid only for Downlink Direction. QoS Class assigned to this profile should have at least one Downlink SFC. 4. Add a New QoS Class: a. Click Add to add new entry. The following screen appears for configuring the New Class Entry. Figure 4-35 QoS Class Add Entry b.
Advanced Configuration Parameter Description Priority Specifies priority or order of execution of PIRs during packet identification process. The PIR priority is a number that can range from 0-63, with priority 63 being executed first, and priority 0 being executed last. The PIR priority is defined within a QoS class, and can be different for the same PIR in some other QoS class.
Advanced Configuration Figure 4-37 QoS Class Service Flow Add Entry 3. Specify the Service Flow Name, PIR Rule Name, Priority and Entry Status and click Add to add a new entry. Adding PIR in QoS Class 1. Click on the corresponding Details provided in the Service Flow of a particular QoS Class. Maximum 8 PIR rules can be associated per SFC of an QoS Class. At least there should be one PIR per SFC of an QoS Class.
Advanced Configuration Figure 4-38 QoS Class PIR Details 2. Click Add. The following screen appears for association of the new PIR rule in an SFC already associated in an QoS Class. Figure 4-39 QoS Class PIR Add Entry 3. Specify the PIR Rule Name, Priority and Entry Status and click Add to add a new entry.
Advanced Configuration 4.6.2.4 QoS End Point Configuration 1. Click ADVANCED CONFIGURATION > QoS > End Point. By default, the table does not have any entry. User can configure the Wireless MAC Address of the End Point B here and associate the QoS Class need to be used for that particular End Point. Figure 4-40 QoS End Point B Entries If no End Point is configured but any End point is associated then this End Point gets the Default QoS Class configuration.Adding a New End Point 1.
Advanced Configuration If QoS is not configured properly, the system can become difficult to access in heavily loaded networks. One of the side effects of this misconfiguration is ping time-out, which is usually interpreted as a disconnection of the pinged node. However, with the correct QoS configuration, every node in the network can be reached at any moment.
Advanced Configuration c. Click Add that corresponds to Source IP Address Entries. This displays a screen for referring the Management Station’s IP Address. New Entry Table displays all the IP Address Entries of the PIR List. Select the option button corresponding to the Management Station and then click Add. This adds the IP Address of the Management Station to the Existing Entries. Click Back and the new entry appears in the Source IP Address Entries Table. 5. Add PIR Rule for Destination IP Address. a.
Advanced Configuration • Max Messages in Burst: 16 • Entry Status: Enable d. Click Add. The UL-Management SF is added to the QoS SFC List. NOTE: The input and output bandwidth limits set on the End Point A or on the End Point B are used for limiting aggregate bandwidth used by End Point B. These limits override any limit imposed by MIR in the SFC. Therefore, these limits should be set to at least 1000 kbps (MIR values in UL-Management and DL-Management SFCs).
Advanced Configuration 4.7 VLAN Configuration (Bridge Mode only) Virtual Local Area Networks (VLANs) are logical groupings of network hosts. Defined by software settings, other VLAN members or resources appear (to connected hosts) to be on the same physical segment, no matter where they are attached on the logical LAN or WAN segment. They simplify traffic flow between clients and their frequently-used or restricted resources.
Advanced Configuration 1. System-related parameters: These parameters are applicable to the whole device. The following parameters are the System-related VLAN parameters. a. VLAN Status: Selecting the VLAN Status checkbox enables the VLAN Status on the device. To update all VLAN related parameters, VLAN status should be enabled. NOTE: By default, the VLAN status is disabled. b. Management VLAN ID: This parameter is used to configure the Management VLAN ID.
Advanced Configuration 2. Enter the parameters listed in the following table. 3. Click OK. Parameters Description Interface Displays the name of the interface. VLAN Mode Select the VLAN mode as Transparent. Click COMMIT for the changes to take effect. Once the transparent mode is set, both tagged and untagged frames are received on the interface. NOTE: Wireless Interface of the device will always be in transparent mode. There is no support provided to edit the wireless interface VLAN parameters. 4.7.
Advanced Configuration Parameter Description Allow Untagged Frames Select Enable or Disable for this option. Enable If this option is selected, an interface in trunk mode forwards both tagged frames whose VLAN ID matches with one of the VLAN IDs of the trunk table and untagged frames. Disable If this option is selected, an interface in trunk mode forwards only tagged frames and drops untagged frames. Adding New Trunk Table Entries To add new table entries 1.
Advanced Configuration To configure the Access Mode in the VLAN network 1. Click ADVANCED CONFIGURATION > VLAN > Ethernet. The VLAN Ethernet Configuration screen appears. Figure 4-46 VLAN operation in Access Mode 2. Enter the parameters as described in the following table. Parameter Description Interface Displays the name of the interface. VLAN Mode Select the VLAN mode as Access. Access VLAN Id The Access VLAN Id values range from 1 to 4094. The default value is -1.
Advanced Configuration • Advanced Filter • TCP/UDP Port Filter • Storm Threshold Filter To configure the filtering mechanism 1. Click ADVANCED CONFIGURATION > Filtering. The Filtering screen appears. Figure 4-47 Filtering 2. Enter the appropriate parameters in the Filtering screen. See the following table that lists all the parameters and their descriptions. Parameter Description Global Filter Flag This parameter is used to enable or disable complete filtering operations.
Advanced Configuration 1. Click ADVANCED CONFIGURATION > Filtering > Ethernet Protocol Filtering. The Protocol Filter screen is displayed as shown below.
Advanced Configuration 2. Enter the appropriate parameters in the Protocol Filter screen. See the following table that lists the parameters and their descriptions. Parameter Filtering Control Filtering Type Description This parameter is used to configure the interface on which filtering has to be applied. By default, it is disabled. It can be configured as: • Ethernet: Packets are examined on the receive path of the Ethernet interface. • Wireless: Packets are examined at the Wireless interface.
Advanced Configuration b. Enter the details as described in the preceding table and click Add. Figure 4-49 Protocol Filter Add Row NOTE: • By default, the system generates 19 entries. You can Enable or Disable the default entries, but the Delete option is not applicable for all the default 19 entries. • The added entry in the table can be enabled, disabled, or deleted based on user requirement. • Max Entries supported in Ethernet Protocol Filter Table are 64. 4.8.2 Static MAC Address Filter 4.8.2.
Advanced Configuration • To block traffic between a specific wired MAC address and a specific wireless MAC address, configure all four parameters. 4.8.2.2 Static MAC Filter Examples Consider a network that contains a wired server and three wireless clients.
Advanced Configuration • Wireless Mask: FF:FF:FF:FF:FF:FF Result: The unit blocks all traffic between Wireless Client 3 and the Ethernet network. 4.8.2.5 Static MAC Address Filter Configuration To configuring Static MAC Filter 1. Click ADVANCED CONFIGURATION > Filtering > Static Mac Address Filter. The Static MAC Address Filter screen is displayed as shown below. Figure 4-50 Static MAC Address Filter 2. Click Add. The Static MAC Address Filter Add Row screen appears.
Advanced Configuration Parameter Description Wired MAC Mask Specifies the range of MAC address to which this filter is to be applied. Wireless MAC address Specifies the MAC address of the device on the wireless network that is restricted from communicating with a device in the wired network. Wireless MAC Mask Specifies the range of MAC address to which this filter is to be applied. Comment Specifies the comment associated with Static MAC Filter table entry.
Advanced Configuration Figure 4-52 Advanced Filtering 2. The following table describes the parameters present in the Advanced Filtering table. Parameter Name Description This parameter specifies the protocol name. The following filters are supported in Advanced Filtering: • Deny IPX RIP • Deny IPX SAP • Deny IPX LSP • Deny IP Broadcasts • Deny IP Multicasts Direction This parameter specifies the direction of an individual entry in the Advanced Filter table.
Advanced Configuration Figure 4-53 Advance Filtering- Edit Entries 1. After making the desired modifications, click OK to update the table. 2. Click Back to navigate to the previous page. Click Cancel to retain the previous entries. NOTE: Click COMMIT for the changes to take effect in the device. 4.8.4 TCP/UDP Port Filter Port-based filtering controls the user access to network services by selectively blocking TCP/UDP protocols through the device.
Advanced Configuration Figure 4-54 TCP/UDP Port Filter 2. Enter the appropriate parameters. See the following table that lists the parameters and their descriptions. Parameter Description Filter Control This parameter is used to enable the TCP/UDP filter. By default, Disable is selected. Protocol Name This parameter specifies the TCP/UDP protocol filter name. Port Number This parameter specifies the TCP/UDP port number. It accepts the values within the range 0-65535.
Advanced Configuration 4.8.4.1 Adding TCP/UDP Port Table Entries To add TCP/UDP Port Table entries 1. Click Add to create a new TCP/UDP port filter. The TCP/UDP Port Filter Add Row page is displayed as shown below. Figure 4-55 TCP/UDP Port Filter Add Row 2. Enter the details and click Add to update the entry in the TCP/UDP table. NOTE: • The TCP/UDP filtering operation is allowed only when the Global flag and Filter Control options are selected as Enable • Maximum 64 entries can be added to the table.
Advanced Configuration Figure 4-56 Storm Threshold Filter This table contains information about the threshold values per second of the multicast and broadcast packets that can be processed for the interface(s) present in the device. 2. Select the appropriate parameters. See the following table that lists the parameters and their descriptions. 3. Click OK. Parameter Description Interface This parameter is used to configure the type of interface in which filtering has to be applied.
Advanced Configuration 4.9 DHCP Configuration Dynamic Host Configuration Protocol (DHCP) is a network protocol that enables a server to assign an IP address to a device from a defined range of IP addresses configured for a given network. It allows you to distribute IP addresses from a central point to various hosts and simplifies the process of configuring the IP addresses to individual hosts. Figure 4-57 DHCP 4.9.
Advanced Configuration Figure 4-58 DHCP 2. Enter the appropriate parameters in the DHCP Interface Table. See the following table that lists the parameters and their descriptions. NOTE: To enable the DHCP Server Interface, the DHCP server pool table should have at least one range configured for that interface. Parameter Description Interface Type Specifies the interface for which the DHCP Server functionality shall be configured.
Advanced Configuration 3. To enable DHCP Server, select Enable for DHCP Server Status. Before enabling, in interface table there should be at least one interface enabled on which the DHCP Server has to run and the DHCP server pool table should have at least one entry configured for that interface. 4. In the Max Lease Time field, enter the maximum lease time. Parameter Description DHCP Status This parameter is used to enable DHCP Server or disable the DHCP functionality on the device.
Advanced Configuration 1. Click Add in the DHCP Pool screen. The DHCP Pool Table Add Row screen is displayed as shown below. Figure 4-60 DHCP Pool Table Add Row 2. After entering the details, click Add. The entry will be updated in the DHCP pool table. 3. To apply the changes, click COMMIT. 4.9.2 DHCP Relay (Routing Mode only) The DHCP relay agent forwards DHCP requests to the given DHCP server. There must be at least one entry in the corresponding Server IP Address table to enable the DHCP Relay Agent.
Advanced Configuration 1. Click Add in the DHCP Relay Server screen. The DHCP Relay Server Add Row screen is displayed as shown below. Figure 4-62 DHCP Relay Server Add Row 2. Enter the Server IP Address and then click Add. 3. To enable DHCP Relay, click Enable for DHCP Relay Status. Before enabling, there must be at least one IP address configured in the DHCP Relay Server Table. 4. Click OK. To apply the changes, click COMMIT. NOTE: To enable the DHCP Relay, the NAT functionality must be disabled.
Advanced Configuration 4.10 IGMP Snooping (Bridge Mode only) The Internet Group Management Protocol (IGMP) is a communication protocol used to manage the membership of Internet Protocol multicast groups. IGMP is used by IP hosts and adjacent multicast routers to establish multicast group memberships. Internet Group Management Protocol (IGMP) Snooping is the process of listening to IGMP network traffic.
Advanced Configuration NOTES: • IGMP Snooping functionality is available both in End Point A and End Point B. • QB 8100 supports only passive IGMP Snooping. • IGMP versions V1,V2 and V3 are supported. • End Point A/End Point B add maximum 64 Multicast groups in the Snooping table. 4.10.1 IGMP Snooping Configuration To configure IGMP Snooping: 1.Click ADVANCED Configuration > IGMP Snooping. The IGMP snooping screen appears as shown below. Figure 4-64 IGMP Snooping 2.
Advanced Configuration 4.11 Routing Features Configuration 4.11.1 Static Route Table (Routing Mode Only) The static routing table mechanism is available for End Point A and End Point B in routing mode only. It stores the route to various destinations on the network. When packets are to be routed, the routing table is referred to for the destination address. Figure 4-65 Netlp Static Route Table To set the static routing table 1. Click ADVANCED CONFIGURATION > Network > Static Route Table. 2.
Advanced Configuration Parameter Entry Status Description This parameter is used to configure the status of the static route. Only enabled routes are considered for routing the packets. 4.11.1.1 Adding Static Route Entries To add Static Route entries 1. Click Add in the Static Route Table screen. The Static Route Table Add Row screen is displayed as shown below. Figure 4-66 Static Route Table Add Row 2. After adding the entry into the Static Route table, click Add. 3.
Advanced Configuration 2. Dynamic NAT: In dynamic mapping, the End Point B maps the private IP addresses and its transport identifiers to transport identifiers of a single Public IP address as they originate sessions to the public network. This is used only for outbound access. NOTE: • When NAT is enabled, the network on the wireless side of the device is considered Public and the network on the Ethernet side are considered Private.
Advanced Configuration Figure 4-68 NAT Port Bind Table Add Row To add entries in the NAT static port bind table 1. Enter the Local IP Address of the host on the Ethernet (private) side of the End Point B. 2. Select the Port Type as: TCP, UDP, or Both. 3. Enter the Start Port, End Port and enable the Entry Status. 4. Click Add. 5. After adding the entry into the Static Port Bind Table, click COMMIT and then click REBOOT for the changes to take effect. 4.11.2.
Advanced Configuration S.No. Protocol Support Applications 1 H.323 H.
Advanced Configuration Figure 4-69 Configuring RIP 2. Enter the appropriate parameters. See the following table that lists the parameters and their descriptions. 3. Click OK. 4. Click COMMIT for the changes to take effect. Parameter Description Name Displays the name of the interface as Ethernet 1 or Wireless. Status This parameter is used to enable or disable RIP for that particular network interface. Authorization Type Select the appropriate authorization type.
System Management 5 This chapter provides details about the Management screen of the Web interface and describes the procedures to effectively manage the Tsunami QB-8100 device.
System Management 5.1 System 5.1.1 System Information This section displays the basic system information. This information further helps in viewing the device details during troubleshooting. For configuring the system information, click MANAGEMENT > System > Information. Figure 5-1 System Information Parameter Description System Up-Time Specifies the duration of the device running time, since its last reboot. System Description Specifies the description of the system.
System Management Parameter Description Phone Number Specifies the Phone number of the concerned person responsible for the device. Location Specifies the location of the device. GPS Longitude, GPS Latitude and GPS Altitude Specifies the GPS longitude, latitude and altitude at which the device is installed. After setting the system information, click COMMIT for the changes to take effect in the device. 5.1.
System Management Figure 5-3 Licensed features Parameter Description Product Description Specifies the product description. Number of Radios Specifies the number of radios that the device is licensed to operate. Number of Ethernet Interfaces Specifies the number of Ethernet interfaces that the device is licensed to operate. Radio 1 Allowed Frequency Band Specifies the wireless operational frequency band supported by the device.
System Management 5.2 File Management Using this section, you can upgrade the firmware or configuration of the device and also retrieve the log/configuration files from the device. File Management can be done using TFTP (by using an external TFTP Server) using Web, CLI or SNMP. It can also be done using the HTTP using Web Interface. 5.2.1 Upgrade Firmware via HTTP For upgrading the firmware via HTTP web interface, click MANAGEMENT > File Management > Upgrade Firmware > HTTP.
System Management Figure 5-5 HTTP Update-Configuration To upgrade the configuration via HTTP 1. Click Browse and locate the configuration file. Select “Flashcfg.cfg” for binary configuration file and “PXM-TBC.xml” to upgrade the Text Based Configuration file. For more information on how to upgrade the Text Based configuration file refer to Updating the device with TBC File. 2. Click Update to initiate the HTTP Update operation. 3. Click Load to apply the updated changes. 4.
System Management To upgrade the firmware via TFTP server: 1. Enter the TFTP Server IP Address. 2. Enter the name of the firmware file to update to the device. 3. Click Update to initiate the new firmware updation or click Update and Reboot to update and reboot with new firmware immediately. 5.2.4 Upgrade Configuration via TFTP For upgrading the configuration via TFTP Server, click MANAGEMENT > File Management > Upgrade Configuration > TFTP. To upgrade the binary configuration file via TFTP server 1.
System Management Figure 5-8 Upgrade Text Based Configuration via TFTP 5.2.5 Retrieve From Device 5.2.5.1 HTTP Retrieve For retrieving a configuration file or Event log or Text based template configuration file via HTTP web interface, click MANAGEMENT > File Management > Retrieve From Device > HTTP. To retrieve files from the device via HTTP 1. From the File Type list, select the type of file to retrieve. a. Config: To retrieve the configuration file from the device. b.
System Management 5.2.5.2 TFTP Retrieve This option is used to retrieve files from the device to the TFTP server. The TFTP server must be running and configured in the desired directory path to copy the retrieved file. Assign a proper name to the file which may include version or location information.
System Management 5.3 Services: Configuring the Passwords SNMP version, SNMP passwords, and SNMP Trap Host Table parameters can be configured to prevent unauthorized access. Each management interface can be configured with its own password. Each of the three management interfaces (HTTP/HTTPS, Telnet/SSH, and SNMP) is arranged in tabs under the Services link of MANAGEMENT tab in the Main Left Panel.
System Management Parameter HTTPS Description Similar settings as mentioned for HTTP. The password configuration for HTTPS is same as configured for HTTP. 5.3.
System Management The parameters for Telnet/SSH are described in the following table. Telnet/SSH Parameter settings Password Set a new password for the interface or interfaces to manage the device through the CLI. The same password is used for serial CLI also. Telnet Select Enable to allow the Telnet access to the device from any host. You can also select Disable to prevent a user from accessing the device from the CLI. Similar settings are applicable for Secure Shell or SSH.
System Management 5.3.3 SNMP Figure 5-13 SNMP The parameters for SNMP are described in the following table. SNMP Parameter settings SNMP This parameter provides the access control for the SNMP interface. Select Enable/Disable to enable or disable the SNMP access to the device from any host. Disabling the SNMP will affect the NMS/PVES access to the device. Version This parameter configures the SNMP version. The available versions are v1-v2 and v3. By default, the SNMP starts in version v2c.
System Management Read Password This parameter represents the read only community name used in SNMP Protocol. It is sent along with each SNMP GET / WALK / GETNEXT / GETBULK request to allow or deny access to the device. This password should be same as read password set at the NMS or MIB browser. The default password is “public” and range of this parameter must be between 6-32 characters. Read/Write Password This parameter represents the read-write community name used in SNMP Protocol.
System Management On selecting SNMP V3, the following parameters need to be configured: SNMP V3 Parameter settings Security level The supported security levels for QB-8100 is AuthNoPriv and AuthPriv. Select AuthNoPriv for Extensible Authentication or AuthPriv for both Authentication and Privacy (Encryption). Priv Protocol This field configures the type of privacy (or encryption) protocol. This parameter is available only when the security level is AuthPriv.
System Management 3. Select the entry status as Enable or Disable and click Add. All traps will be delivered to the host port number 162. The community string/ password field is not valid if the device is configured in SNMPv3 mode. NOTE: Changes to SNMP parameters require a Reboot to take effect. 5.3.4 System Log Host Table System log messages are generated by the system by sending requests at various instances to the system log server.
System Management Figure 5-17 SYSLOG Host Table Add Row Parameter Description IP Address Represents the IP address of the SYSLOG server. Port Represents the host port number. Default port is 514. NOTE: The user must configure the correct port number on which the syslog server is running for the Host Port parameter. Choice of port number must be in line with the standards for port number assignments defined by Internet Assigned Numbers Authority (IANA).
System Management 5.4 SNTP SNTP allows a network entity to communicate with time servers in the network/Internet to retrieve and synchronize the time of day information. When this feature is enabled, the system attempts to retrieve the time of day information from the configured time servers (primary or secondary); and when successful, it updates the relevant time objects in the system. Figure 5-18 SNTP To configure and view parameters within the SNTP screen 1. Click MANAGEMENT > SNTP. 2.
System Management NOTE: • Provide the Primary and Secondary Server details only if the SNTP status is enabled. • For any reason, if the servers configured are not responding, the SNTP client retries every minute. 5.5 Access Control The Management Access Control feature provides the option of controlling the management interfaces only from the specified hosts. The user needs to update the table with an IP address, which provides access to management interfaces, such as SNMP, HTTP, HTTPS, TELNET, and SSH.
System Management Figure 5-20 Management Access Table Add Row 3. Enter the IP Address of the device. 4. Select Enable or Disable for the Entry status of the device. 5. Click Add. Ensure that the IP address of the management PC that is used to manage the device is present in the table. Otherwise, you will not be able to manage the device. If this case occurs, try to give the PC correct IP address for management; or else, the device can be configured via the CLI over the serial port. 5.
Monitoring the System 6 This chapter describes the procedures to monitor the Tsunami QB-8100 using the MONITOR screen of the Web interface.
Monitoring the System 6.1 Interface Statistics Interface Statistics provides detailed information about the data exchanged in both directions through the device interface. The statistical information include the type of interface, operational status, MAC address of the protocol, number of packets transmitted, signal information, number of collisions and errors occurred while transmitting the data.
Monitoring the System Field Description MTU This parameter displays to the largest size of the data packet received/sent on the interface. Physical Address This parameter displays the MAC address at the Ethernet protocol layer. Operational Status This parameter displays the current operational state of the interface. In Octets This parameter displays the total number of the octets received on the interface.
Monitoring the System Parameter Description Antenna Specifies all the antenna ports available for the product. This is based on the product option. For QB-8100, it shows A1and A2. Status Specifies the configuration status of the antenna ports. ON indicates that antenna port is enable for that chain. OFF means antenna port is disabled for that chain. Control Specifies the RSSI value of the packet received on the selected channel.
Monitoring the System Figure 6-2 Wireless Statistics Tsunami QB-8100 Series (100 Mbps/5 Mbps Models) Installation and Management Guide 151
Monitoring the System 6.2 WORP Statistics 6.2.1 General Statistics WORP General Statistics screen displays the signal information, WORP data messages, Data transmission statistics, and Registration details of all the data transmitted through the interface. To view the General Statistics, click MONITOR > WORP Statistics > Interface 1 > General Statistics. Figure 6-3 WORP General Statistics The parameters displayed in this page are described in the following table.
Monitoring the System Field Description Avg Remote Noise Refers to the noise level with which the End Point B receives wireless frames from the End Point A. WORP Data Messages Specifies the sent or received data frames through wireless interface. Poll Data Refers to the number of polls with data messages sent (End Point A) or received (End Point B). Poll No Data Refers to the number of polls with no data messages sent (End Point A) or received (End Point B).
Monitoring the System Field Description Request For Service Refers to the number of requests for service messages sent (End Point B) or received (End Point A). Registration Requests Refers to the number of registration request messages sent (End Point B) or received (End Point A) on WORP interface. Registration Rejects Refers to the number of registration reject messages sent (End Point A) or received (End Point B) on WORP interface.
Monitoring the System Figure 6-4 End Point B Link Statistics Click Refresh, to get the updated or latest End Point B Link Statistics. The following table lists the parameters and their descriptions: Field Description End Point B Name System name of the End Point B connected. Mac Address MAC address of the End Point B connected. Local Tx Rate (Mbps) End Point A Tx Rate. Remote Tx Rate (Mbps) End Point B Tx Rate.
Monitoring the System Field Description Remote Antenna Port Info Refers to the status of the remote antenna port of the End Point B. The status of the remote antenna port is shown by three different legends. For more information on the legends, refer to Local Antenna Port Info. Remote Signal (dBm) Signal level with which the End Point B receives wireless frames from the End Point A. Remote Noise (dBm) Refers to the noise level with which the End Point B receives wireless frames from the End Point A.
Monitoring the System Figure 6-6 QoS Summary Tsunami QB-8100 Series (100 Mbps/5 Mbps Models) Installation and Management Guide 157
Monitoring the System 6.3 Bridge 6.3.1 Bridge Statistics To view the Bridge Statistics, click MONITOR > Bridge > Bridge Statistics. Figure 6-7 Bridge Statistics The following table lists the parameters and their descriptions: Parameter Description Description Displays the textual string containing information about the interface. Type Displays the type of interface. MTU Displays the MTU value. Physical Address Displays the bridge MAC Address.
Monitoring the System Parameter Description In Unicast Packets Displays the number of subnetwork unicast packets received at the bridge interface. In Non-unicast Packets Displays the number of non-unicast (i.e., subnetwork-broadcast or subnetwork-multicast) packets received at the bridge interface. In Errors Displays the number of inbound packets that contained errors and are restricted for delivering them to a higher-layer protocol at the bridge interface.
Monitoring the System Figure 6-8 Learn Table 2. Click Clear to delete all entries of the Learn Table. 3. Click Refresh to get the updated or latest Learn Table.
Monitoring the System 6.4 Network Layer 6.4.1 Routing Table Routing table displays all the active routes of the network. These can be either static or dynamic (obtained through RIP). For every route created in the network, the details of that particular link or route will get updated in this table. To view the Routing Table, click MONITOR > Network Layer > Routing Table. Figure 6-9 Routing Table 6.4.2 IP ARP This section displays the mapping of the IP and MAC addresses of all nodes in the network.
Monitoring the System Figure 6-10 IP ARP Table 2. Click Clear to delete all entries of the ARP Table. 3. Click Refresh to get the updated or latest ARP Table. 6.4.3 ICMP Statistics This page provides the statistical information for both received and transmitted messages by the device. The ICMP Statistics attributes can be used to monitor message traffic. To view the ICMP Statistics, click MONITOR > Network Layer > ICMP Statistics.
Monitoring the System The following table lists the parameters and their descriptions: Field Description In Msgs/Out Msgs The number of ICMP messages that are received/transmitted by the device. In Errors/Out Errors The number of ICMP messages that the entity received/transmitted but determined as having errors. In Dest Unreachs/ Out Dest Unreachs The number of ICMP Destination Unreachable messages received/transmitted.
Monitoring the System Figure 6-12 RIP Database Tsunami QB-8100 Series (100 Mbps/5 Mbps Models) Installation and Management Guide 164
Monitoring the System 6.5 Radius (End Point A only) This section displays the information about the radius authentication statistics. NOTE: Radius Client Authentication Statistics are visible only on End Point A. 6.5.1 Radius Authentication Statistics This page provides information about Radius Authentication for both the primary and backup servers for each radius server profile. To view the Radius Client Authentication Statistics table, click MONITOR > Radius > Radius client Authentication Statistics.
Monitoring the System Field Description Accepts Specifies the number of Radius Access Accept messages received since client startup. Rejects Specifies the number of Radius Access Reject messages received since client startup. Resp Specifies the number of Radius response packets received by the system since client startup. Mal Resp Specifies the number of malformed Radius Access Response messages received since client startup.
Monitoring the System 6.6 IGMP (Bridge Mode only) Click MONITOR > IGMP > IGMP Snooping Stats. The Ethernet/Wireless Multicast List screen appears as shown below: Figure 6-14 Ethernet1 Multicast List 6.6.1 Ethernet/Wireless Multicast List: 1. The Multicast List table holds the IGMP Multicast IP and Multicast MAC address details for the Ethernet/Wireless interfaces. 2. See the following table that lists the parameters and their descriptions.
Monitoring the System Click MONITOR > IGMP > Router Port List. The Router Port List screen appears as shown below: Figure 6-15 Router Port List See the following table that lists the parameters and their descriptions. Parameter Description Port No This parameter represents the port number on which multicast router is attached (on which IGMP Query has been received). Time Elapsed This parameter represents the time elapsed since the port is marked as the router port. 6.
Monitoring the System 6.8 Logs 6.8.1 Event Log The Event Log keeps track of events that occur during the operation of the device. It displays the event occurring time, event type, and the name of the error or the error message. Based on the priority, the event details are logged and can be used for any reference or troubleshooting. To view the Event Log 1. Click MONITOR > Logs > Event Log. The Event Log screen appears as shown below. Figure 6-17 Event Log 2.
Monitoring the System • To delete the Event Log, click Clear Event Log. NOTE: The recent eventlogs are stored in the flash memory. 6.8.2 Syslog System log messages are generated by the system by sending requests at various instances to the system log server. Figure 6-18 System Log • Click Clear SysLog, to clear the SYSLOG information. • Click Refresh, to get the updated or latest SYSLOG information.
Monitoring the System 6.9 Tools 6.9.1 Link Test WORP Link Test shows, in graphical form, Signal and Noise levels at which packets are received at local and remote unit. WORP link test feature is used to monitor the local/remote signal/noise/SNR details of the connected WORP link. During antenna alignment, this feature can be enabled to monitor the min/cur/max signal details. NOTE: Internet Explorer 6.0 and its above versions support the link tests.
Monitoring the System Figure 6-20 WORP Link Status Graph To stop the link test, click Explore Stop. NOTE: Link tests are performed for maximum 3 times. By default, the Link Test Status is disabled. 6.9.2 Wireless Site Survey (End Point B Only) Wireless Site Survey is done by the End Point B and scans all the available channels and channel bandwidths, and collects information about all the End Point As on only those channels/bandwidths with the given Network Name.
Monitoring the System Figure 6-21 Wireless Site Survey Table To initialize the survey process, click Start button. This process lists all the available End Point A details. If you want to stop the site survey process, click the Stop button. Click Refresh, to get the updated or latest Wireless Site Survey Table. NOTE: This survey process is available only for End Point B mode operation.
Procedures 7 This chapter provides details about the various procedures involved in the operation of the QB-8100 units through the Web, CLI, and SNMP interface.
Procedures 7.1 TFTP Server Setup A Trivial File Transfer Protocol (TFTP) server lets you transfer files across a network. You can retrieve files from the device for backup or copying, and you can upgrade the firmware or the configuration file. You can download the SolarWinds TFTP server software from the product installation CD or from http://support.proxim.com. You can also download the latest TFTP software from SolarWind’s Web site at http://www.solarwinds.net.
Procedures 7.3 Configuration Backup You can back up the unit’s configuration by retrieving the configuration file. You can use this file to restore the configuration or to configure another similar unit (see Configuration Restore). You can update a configuration file through TFTP or HTTP. 7.3.1 Through TFTP 1. Set up the TFTP server as described in TFTP Server Setup. 2. Access the unit as described in Logging in to the Web Interface. 3. Click Management > File Management > Retrieve From Device > TFTP tab.
Procedures 3. Fill in the following details: • File Name 4. Click Update to start the file transfer. A reboot is required for the new configuration to be restored into the device. 7.5 Text Based Configuration (TBC) File Management 7.5.1 Text Based Configuration File Text Based Configuration (TBC) file is a simple text file that holds the template configurations of the device.
Procedures Figure 7-1 HTTP Retrieve of TBC File 1. From the File Type list, select Text Based Template Config file. 2. Click Retrieve to initiate the operation and retrieve the file to the local system. 3. On clicking Retrieve, a Download window appears as shown below. To download and save the file to your local system, right click on the link HERE, then save the file to your system. Figure 7-2 Download the TBC File 7.5.3.
Procedures Figure 7-3 TFTP Retrieve of TBC File 1. Enter the TFTP Server IP address. 2. Enter the name of the file to be uploaded from the device. 3. Select the file type as Text Based Template Config. 4. To retrieve the file from the TFTP Server, Click Retrieve. The following window appears as shown below: Figure 7-4 Successful retrieve of TBC NOTE: The Text Based Template Configuration file does not exist if it is not generated from the CLI.
Procedures The generated Text Based Template Configuration file appears as shown below: Figure 7-5 TBC File in xml Format 7.5.4 Editing the TBC File The Text Based Config (TBC) file can easily be opened and edited in any standard Text-Editors like Wordpad, MS-Word, Notepadd++, Standard XML Editors. Proxim recommends XML Notepad 7 editor for editing the TBC file. • You can modify any value between the double quotes(““) in the TBC file.
Procedures Figure 7-6 Update the device with TBC File via HTTP 1. Click Browse and select the TBC file. 2. Click Update to initiate the HTTP Update operation. 3. Click Load to load the TBC file. Or 4. Click Update & Load to update and load with new configurations immediately. NOTES: • Click COMMIT for the changes to take effect. • After upgrading new configuration, the device must be rebooted. • To reject the changes done through Update or Update & Load options, reboot the device without clicking COMMIT.
Procedures Figure 7-7 Update the device with TBC File via TFTP 1. Select the Text Based Config option button. 2. Enter the TFTP Server IP Address. 3. Enter the name of the configuration file to be updated to the device. • Click Update to initiate the TFTP update operation. Then click Load to apply the updated changes. Finally click COMMIT for the changes to take effect. Or • Click Update & Load to update and load with new configurations, the following window appears.
Procedures NOTE: Both Commit and Reboot are required to accept the modifications done in the TBC File. Only reboot is required to reject the modifications. Loading the TBC file is allowed only once in an active device session (i.e., if TBC file is loaded, reboot is required to apply all configurations or to load another TBC file). All configurations in the TBC file are loaded to the device irrespective of their default or modified or added configurations.
Procedures 7.9 Upgrade a New Firmware Using ScanTool in Bootloader Mode To download the unit’s firmware, you will need an Ethernet connection to the computer on which the TFTP server resides and to a computer that is running ScanTool (this is either two separate computers connected to the same network or a single computer running both programs). ScanTool detects if a device does not have a valid software firmware installed.
Procedures 7.10 Download a New Firmware Using CLI from Bootloader To download the unit’s Image File, you will need an Ethernet connection to the computer on which the TFTP server resides. This can be any computer on the LAN or connected to the device with a cross-over Ethernet cable. You must also connect the device to a computer with a standard serial cable and use a terminal client, such as HyperTerminal. From the terminal, enter CLI Commands to set the IP address and download unit’s Image. 7.10.
Procedures Bootloader=> set gatewayip 169.254.128.132 Bootloader=> set netmask 255.255.255.0 Bootloader=> set ipaddrtype static Bootloader=> show Bootloader=> reboot The device will reboot and then download the firmware. You should see the downloading activity within the TFTP server’s status screen. When the download process is complete, configure the device as desired.
Troubleshooting 8 This chapter helps you to isolate and solve problems with your QB-8100 unit. If the procedures discussed in this document does not provide a solution, or the solution does not solve your problem, check our support website at http://support.proxim.com. Before you start troubleshooting, check the details in the product documentation. For details about RADIUS, TFTP, terminal and telnet programs, and Web browsers, refer to their appropriate documentation.
Troubleshooting 8.1 PoE Injector 8.1.1 The Unit Does Not Work 1. Verify that you are using a standard UTP Category 5 cable. 2. Try a different port on the same PoE injector hub (remember to move the input port accordingly) – if it works, there is probably a faulty port or bad RJ-45 port connection. 3. If possible, try to connect the unit to a different PoE injector hub. 4.
Troubleshooting 8.2.3 Serial Link Does Not Work 1. Make sure you are using a standard, straight-through, 9-pin serial cable. 2. Double-check the physical network connections. 3. Make sure your PC terminal program (such as HyperTerminal) is active and configured to the following values: – Com Port: (COM1, COM2, etc.
Troubleshooting 8.3 Communication Issues 8.3.1 Two Units Are Unable to Communicate Wirelessly If a wireless link cannot be established after testing the two units within close distance of each other, then there can be two reasons why wireless connectivity is not possible while the QB-8100 endpoints are at their desired locations: There may be a problem in the RF path, for example, a bad connector attachment (this is the most common problem in installations) or a bad cable (water ingress).
Troubleshooting 8.4 Setup and Configuration Issues The following issues relate to setup and configuration problems. 8.4.1 Lost Password If you have lost your password, you must reset the QB-8100 device to the default settings. See Hard Reset to Factory Default The default password is public. If you record your password, keep it in a safe place. 8.4.2 The QB-8100 Responds Slowly If the QB-8100 takes a long time to become available, it could mean that: • No DHCP server is available.
Troubleshooting 8.4.5 Telnet CLI Does Not Work 1. Make sure you have the proper IP Address. Enter your device IP address in the Telnet connection dialog, from a DOS prompt, type: C:\> telnet 2. Use the CLI over the serial port to check the IP Access Table, which may be restricting access to Telnet and HTTP. 8.4.6 TFTP Server Does Not Work With TFTP, you can transfer files to and from the QB-8100 device. Also see TFTP Server Setup.
Troubleshooting • Parity: None 2. Press the REBOOT button on the PoE injector of the unit. The terminal display shows Power On Self Tests (POST) activity, displays the software version, and prompts to enter the CLI username and password similar to the example below. This process may take up to 90 seconds. #################################################| # Version: 2.5.
Troubleshooting 8.4.8 RADIUS Authentication Server If you enabled RADIUS Authentication on the unit, make sure that your network’s RADIUS servers are operational. Otherwise, clients cannot log in. There are several reasons the authentication server services might be unavailable, here are two typical things to check: • Make sure you have the proper RADIUS authentication server information setup configured in the device.
Troubleshooting To reset to factory default settings, press and hold the RELOAD button on the side of the unit’s PoE injector power supply for 5 seconds. The current configuration is deleted from the unit and the unit reboots, with factory defaults. CAUTION: It you hold the RELOAD button for longer than 10 seconds, you may go into Forced Reload mode, which erases the unit’s embedded software. 8.4.13 Forced Reload With Forced Reload, you bring the unit into bootloader mode by erasing the embedded software.
Troubleshooting 8.4.15 Changes Do Not Take Effect Changes made in the Web Interface do not take effect: 1. Restart your Web browser. 2. Log into the radio unit again and make changes. 3. Reboot the radio unit when prompted to do so. 4. Click Commit for the changes to take effect. Wait until the reboot is completed before accessing the unit again. 8.4.16 Link Problems While wireless networking emerges more and more, the number of wireless connections to networks grows every day.
Troubleshooting – In Errors and Out Errors should never happen; however, it might happen if a frame’s CRC was correct while the content was still invalid. • Monitor / Wireless / WORP (Statistics on WORP): WORP runs on top of normal Ethernet, which means that the WORP frame is in fact the data field of the Ethernet frame. Send Failure or Send Retries must be low in comparison to Send Success. Low is about 1%. The same applies for Receive Success versus Receive Retries and Receive Failures.
Troubleshooting • Monitor / Link Test (Information used by Administrators for on-the-spot checking): Check the received signal level (RSL) and noise level. Compare the RSL with the values from path analysis. If the figures differ significantly from the values recorded at the Per Station window, check for environment conditions that change over time.
Frequency Domains and Channels A Introduction The Tsunami QB-8100 is available in two SKUs one for US (US) and the other for World (WD) Markets. Depending on the SKU, the device is hard programmed at factory to that Regulatory domain. Regulatory domain controls the list of frequency domains that are available in that SKU. Further each frequency domain will define the country specific retaliatory rules and frequency bands. This is a configurable option.
Frequency Domains and Channels The following screen displays the list of frequency domains supported by the device. T8000-C1:65:7E# show supported-frequency-domains RADIO-INDEX 1 SUPPORTED FREQUENCY DOMAINS : 4,9,10,11,13,14,15,16,20,23 ******************************************************** Frequency Domains Reference List ******************************************************** 1 ---> United States 5GHz 2 ---> United States 5.8GHz 3 ---> United States 2.4GHz 4 ---> World 5GHz 5 ---> World 4.
Frequency Domains and Channels 5 GHz Channels/Frequencies by Country Frequency Domain Frequency Band (Start Center Frequency ~ End Center Frequency in MHz) DFS Allowed Channels (Center Frequency) United States 5 GHz 5260 ~ 5320 5500 ~ 5700 5745 ~ 5825 DFS, DFS, Non-DFS Not Supported Not Supported United States 5.8 GHz 5745 ~ 5825 Non-DFS Not Supported United States2 (5.3, 5.8 GHz) 5260 ~ 5320 5745 ~ 5825 DFS Non-DFS World 5 GHz 5155 ~ 6075 WORLD 4.9 GHz WORLD 5.
Frequency Domains and Channels Frequency Domain Frequency Band (Start Center Frequency ~ End Center Frequency in MHz) DFS Allowed Channels (Center Frequency) CANADA 5 GHz 5255 ~ 5325 5495 ~ 5585 5655 ~ 5705 DFS 51(5255), 52(5260).... 64(5320), 65(5325). 99(5495), 100(5500)... 116(5580) 117(5585). 131(5655), 132(5660).... 140(5700), 141(5705). 52(5260), 53(5265)..... 63(5315), 64(5320). 100(5500), 101(5505)..... 115(5575), 116(5580). 132(5660), 133(5665).... 139(5695), 140(5700). EUROPE 5.
Frequency Domains and Channels Frequency Domain Frequency Band (Start Center Frequency ~ End Center Frequency in MHz) DFS Allowed Channels (Center Frequency) India 5.8 GHz 5830 ~ 5870 Non-DFS 166(5830), 167(5835)... 173(5865), 174(5870). 166(5830), 167(5835).... 173(5865), 174(5870). 167(5835), 168(5840)... 172(5860), 173(5865). 167(5835), 168(5840), 169(5845). 171(5855), 172(5860), 173(5865). CANADA 5.8 GHz 5735 ~ 5855 Non-DFS 147(5735), 148(5740).... 170(5850), 171(5855).
B Boot Loader CLI and ScanTool Boot Loader CLI The Boot Loader CLI is a minimal subset of the normal CLI used to perform initial configuration of the unit. The Boot Loader CLI is available when the unit’s embedded software is not running. This interface is only accessible through the serial interface, if: • The device does not contain a software image • An existing image is corrupted • An automatic (default) download of image over TFTP has failed.
Boot Loader CLI and ScanTool To Load the Firmware from the Network • Use the show command to view the parameters and their values and use the set command to set the values to the parameters as per the requirement. To Get the IP Parameters Dynamically for Loading the Firmware 1. Set the ipaddrtype to dynamic. 2. Run the BOOTP and TFTP Servers along with a reboot of the unit. When the device reboots, the device gets the IP Address and Boot filename from the BOOTP server.
Technical Specifications C This chapter provides information on the following topics: • Part Numbers • Regulatory Approval and Frequency Domains • Integrated Dual Polarized Panel Antenna Specifications • Radio and Transmission Specifications • OFDM Modulation Rates • Wireless Protocol • Interfaces • Transmit Power Settings • Receive Sensitivity • Latency • Management • Power Supply • LEDs • Software Features • Hardware Specifications • Physical and Environmental Specificatio
Technical Specifications Part Numbers QB-8100 Series Units Model # CPN # Description QB-8150-LNK-5-US 902-00011 Tsunami QB 8150 Link, 5 Mbps, MIMO 2x2, 16 dBi Integrated antenna – US SKU QB-8150-LNK-5-WD 902-00013 Tsunami QB 8150 Link, 5 Mbps, MIMO 2x2, 16 dBi Integrated antenna – World SKU QB-8150-LNK-100-US 902-00019 Tsunami QB 8150 Link, 100 Mbps, MIMO 2x2, 16 dBi Integrated antenna – US SKU QB-8150-LNK-100-WD 902-00021 Tsunami QB 8150 Link, 100 Mbps, MIMO 2x2, 16 dBi Integrated antenna –
Technical Specifications Regulatory Approval and Frequency Domains • Safety Standards: UL 60950, CAN/CSA-C22.2 No. 60950, IEC 60950, EN 60950 • Regulatory Certifications: FCC, IC and ETSI 5 GHz Channels/Frequencies Region/ Country North America EU Countries APAC World Frequency Domain Frequency Band (Start Center Frequency ~ End Center Frequency in MHz) United States 5 GHz No.
Technical Specifications Integrated Dual Polarized Panel Antenna Specifications Feature Specification Vertical Antenna Horizontal Antenna Frequency band 5.300 – 6.100 GHz Gain 15 - 16 dBi 15 - 16 dBi Horizontal Half Power Beam width 17.6 – 20.3 16.5 – 18.3 Vertical Half Power Beam width 16.1 - 20.5 17.0 - 24.0 Sidelobes level -10 dB (Max) -8 dB (Max) Front-to-back-ratio 23 dB (Max) Polarization Linear, Vertical Port to port isolation 27 dB (Min.) Power Handling 6 W (cw) VSWR 2.
Technical Specifications OFDM Modulation Rates Modulation Data Rate (Mbps) 5 MHz Channel Bandwidth (for Full GI-800ns) 10 MHz Channel Bandwidth (for Full GI-800ns) 20 MHz Channel Bandwidth (for Full GI-800ns) 40 MHz Channel Bandwidth Short GI-400ns Full GI-800ns Single Stream Dual Stream Single Stream Dual Stream Single Stream Dual Stream Single Stream Dual Stream Single Stream Dual Stream 64QAM 5/6 16.2 32.5 32.5 65 65 130 150 300 135 270 64QAM 3/4 14.6 29.3 29.3 58.5 58.
Technical Specifications Transmit Power Settings • Output Power Attenuation: 0 – 23 dB, in 1 dB steps • Output Power Values will have a tolerance of +/-1 dB • Total EIRP must be calculated based on antenna gain Modulation SINGLE (or) DUAL STREAM Tx power for 5/10/20/40 MHz, 5 GHz 64 QAM 5/6 19 dBm 64 QAM 3/4 20 dBm 64 QAM 2/3 21 dBm 16 QAM 3/4 22 dBm 16 QAM 1/2 23 dBm QPSK 3/4 23 dBm QPSK 1/2 23 dBm BPSK 1/2 23 dBm Tsunami QB-8100 Series (100 Mbps/5 Mbps Models) Installation and Ma
Technical Specifications Receive Sensitivity NOTE: Rx Sensitivity values should be considered with a tolerance +/- 2 dB.
Technical Specifications Management Category Specification Local RS232 serial CLI (up to 115200 bps) Remote • Telnet and SSH, Web GUI (http) and SSL (https), TFTP • SNMP v1, v2c and v3 • SNMP trap and Syslog Power Supply Category Input Voltage Specification • Via RJ-45 Ethernet interface supplying 48v and 0.40A on Ethernet Port • 12 V-DC through serial port (for diagnostic purpose) • Consumption 13.
Technical Specifications Software Features Category Key Features Bridging and Routing Filtering Services VLAN Specification • WORP protocol • Transmit Power Control • Integrity Check for Software Upload • IEEE 802.16e based QoS Support; up to 8 classes of service, up to 8 service flows per class (End Point A only) • Satellite Density • Enhanced Frequency Selection • Large Frame Support • IGMP Snooping • Bridge (802.
Technical Specifications Category Security Features Tools Management Interface Specification • Critical feature support via WORP for secure long-range wireless deployments in unlicensed frequency spectrum • MD5 (embedded in WORP) authentication between End Point A and End Point B • MAC Authentication (Configured on End Point A) • Secure “over the air encryption” and AES-CCM • RADIUS MAC Access Control (Configured on End Point A) • Site Survey (to be performed on End Point B) • Link Test to
Technical Specifications MTBF and Warranty Category Specification MTBF 75,000 hours Warranty 1 year parts and labor; ServPak extended support available Tsunami QB-8100 Series (100 Mbps/5 Mbps Models) Installation and Management Guide 216
Lightning Protection D Lightning protection is used to maximize the reliability of the communications equipment by safely re-directing current from a lightning strike or a power surge traveling along the Cat 5 Ethernet cabling to the ground using the shortest path possible. Designing a proper grounding system prior to installing any communications equipment is critical to minimize the possibility of equipment damage, void warranties, and cause serious injury.
Statement of Warranty E Warranty Coverage Proxim Wireless Corporation warrants that its Products are manufactured solely from new parts, conform substantially to specifications, and will be free of defects in material and workmanship for a Warranty Period of 1 year from the date of purchase.
Statement of Warranty Hours of Operation When contacting the Customer Service for support, Buyer should be prepared to provide the Product description and serial number and a description of the problem. The serial number should be on the product. In the event the Customer Service Center determines that the problem can be corrected with a software update, Buyer might be instructed to download the update from Proxim Wireless’s web site or, if that’s not possible, the update will be sent to Buyer.
Technical Services and Support F Obtaining Technical Service and Support If you are having trouble using the Proxim product, please read this manual and the additional documentation provided with your product.
Technical Services and Support Telephone Support Contact technical support via telephone as follows: USA & Canada Customers Call Technical Support: Phone: 408-383-7700 Toll Free: 866-674-6626 Hours: 6:00 AM to 6:00 P.M. Monday - Friday, Pacific Time APAC Customers Call Technical Support: Phone: +91 40 23115490 Hours: 9:00 AM to 6:00 P.M. Monday - Friday, IST (UTC/GMT +5:30 hrs) International Customers Call Technical Support: Phone: 408-383-7700 Hours: 6:00 AM to 6:00 P.M.
Technical Services and Support ServPak Service 24x7Enhanced 8x5 Standard (Bundled Serv.) (Bundled Serv.
FCC Statement Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
IMPORTANT NOTE: FCC Radiation Exposure Statement: This equipment complies with FCC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body. IMPORTANT NOTE: This module is intended for OEM integrator only and limited to host with brand: Tsunami/ORiNOCO and model list.
IC Statement This Class B digital apparatus complies with Canadian ICES-003. Operation is subject to the following two conditions: (1) this device may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device. Cet appareil numérique de la classe B est conforme á la norme NMB-003 du Canada. For product available in the USA/Canada market, only channel 1~11 can be operated. Selection of other channels is not possible.
The maximum antenna gain permitted (for devices in the band 5725-5825 MHz) to comply with the e.i.r.p. limits specified for point-to-point and non point-to-point operation as appropriate, as stated in section A9.2(3). IMPORTANT NOTE: IC Radiation Exposure Statement: This equipment complies with IC RSS-102 radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
Model List Product Series Models Description MP-8ABC-ZZZ-YYY-XX A - Represents number of radios (1, 2) MM-8ABC-ZZZ-YYY-XX B - Represents the operating frequency band of the first radio C - Represents the frequency band of the second radio Example: 0 - Dual band and connectorized 2 - 2Ghz band with integrated antenna 5 - 5Ghz band with integrated antenna ZZZ - Represents the type of the network unit Example: CPE - Customer Premise Equipment BSU - Base Station Unit SUA - Subscriber Unit with external antenna