8.3.7.4 Network management terminal configuration 8.4 Multi-site and multi network management terminal 8.4.1 PRESENTATION Our networks can have N independent sites interconnected using IP (Attention, here we are not talking about ISI protocol interconnection). Each site has its own SWITCH and the sites are linked together using IP. Each site has its own primary network management terminal connected using RS232 to the site SWITCH.
Fig 1 SWITCHES have a priority n° and the two SWITCHES are always active on the network. This priority level is broadcast over the identification channel (see §9.3.4.1). The highest priority SWITCH always manages the network. The others are secondary and backup. The interest is that if the link between the two sites is cut, both sites will operate independently. This architecture also allows for a remote refresh of the technical and administrative databases on each site using a basic download.
8.4.2.1 Sites configuration Below SWITCH A is parametered In conf/param right click,Name tc ts NeTIS MAINTENANCE GUIDE – Version 1.
Below SWITCH B is parametered In Conf/param right click,Nom tc ts NeTIS MAINTENANCE GUIDE – Version 1.
8.4.2.2 Starting up the different network management terminal Each network management terminal is started up depending on the connection site N° (see previous chapter). The target of the Tetracs short cut properties must be modified for each site (See below). NeTIS MAINTENANCE GUIDE – Version 1.
NeTIS MAINTENANCE GUIDE – Version 1.
9. CPUBDT SOFTWARE AUTHENTICATION (Level 2) 9.1 The authentication network management terminal The authentication network management terminal is software the purpose of which is to authenticate equipment manufactured by Etelm using different means of communication. Without this authentication the equipment cannot operate correctly. It consists in the retrieval of an encrypted key by the network management terminal software and its transmission to the equipment on order to unblock it.
9.2 Use The Etelm equipment authentication is needed in several situations: New equipment Expired validity date Major upgrade The authentication procedure only concerns the equipment below. NeTIS MAINTENANCE GUIDE – Version 1.
.3 Integration 9.3.1 EQUIPMENT The software is installed on any PC, preferably a laptop, so that it can be used close to the equipment to be authenticated (especially if a direct connection is to be made). The PC must have either a serial port or a network port (which is true for the majority of PCs, even older ones, see images) or, of course, both. Physical locations of the network and serial ports 9.3.
9.4 Presentation 9.4.1 WHY AUTHENTICATED? The authentication of Etelm equipment is used to protect them from any unauthorised product copy. The referencing makes it possible to better control the distributed software especially with regards to quantities, versions, validity periods, sites... which brings special help for maintenance. To do this each appliance and software must be recognised and identified before operation becomes possible. 9.4.
9.5 How to authenticate? 9.5.1 AUTHENTICATION BY PHONE TCP/IP or RS232 Software authentication console Technical Phoning Equipment Architecture of phone authentication As can be seen here, the authentication will be carried out by a technician in the authentication centre or at the customer site who, in exchange for a first software number supplied by the equipment to be authenticated, will receive a new number depending on the unblocking authorisation managed by Etelm.
As above, authentication is carried out by a technician from the authentication centre or the customer who will use another menu on the authentication network management terminal. It must be connected to Internet and the equipment at the same time. If this is not possible the new software key can be retrieved directly from the Internet and the equipment authenticated using the technique described in the previous paragraph. 9.6 Handling 9.6.1 GENERAL 9.6.1.
Menu to select the communications protocol between the network management terminal and equipment. The media used to communicate with the new equipment must be selected. The choice is made by clicking on the image and validating using OK. Cancel returns to the previous menu. Next, depending on the automatic or manual authentication choice, a different window appears.
To finish click on the "connect" button and the network management terminal attempts to retrieve the key. A small window shows the status of events (connection, disconnection and error). The diagram shows a network management terminal and a BS connected by a cable. The cable is green when connected and red otherwise. In the following case the connection succeeded (in the window and the cable is green) and the old key is shown in the "previous key" field.
In the following case the connection attempt has failed because the equipment has not responded at address 192.168.1.253: Connection failed Once the old software key has been obtained either: Communicate it (with the corresponding customer identifiers) by phone to the authentication centre (Etelm) which will supply a new key corresponding to the customer's remaining credit. Or send it via the automatic authentication menu without connecting to the equipment (with the supplied customer identifiers).
Enter the new key NeTIS MAINTENANCE GUIDE – Version 1.
Confirm success Once the new key is entered (red circle figure 8), validate, and the network management terminal automatically disconnects. To check its success just test the equipment functions, look at the programme return in the window (red circle figure 9) or check the 'ACT' LED on the equipment. The LED should flash slowly (frequency of 2 or 4 seconds). NeTIS MAINTENANCE GUIDE – Version 1.
9.7.2 SERIAL EQUIPMENT CONNECTION The use of a serial cable instead of a network cable does not change the procedure, it is strictly identical. Parameter configuration changes only. Manual authentication using a serial cable As a parameter there is the communication speed and port number to be defined. It is preferable to leave the default configuration. If the connection fails it is possible to try again using another communications port. NeTIS MAINTENANCE GUIDE – Version 1.
9.8 Automatic authentication (via Internet) 9.8.1 NETWORK CONNECTION TO THE EQUIPMENT The software will make it possible to authenticate equipment automatically via internet. First the parameters must be configured. To do this enter the IP address on the authentication centre and the communications port (choose any one that your firewall authorises). If a router is used it must be configured to accept the TCP protocol on the appropriate port. Next the connection to the equipment should be configured.
To begin with, create a text file (for example right click on the desktop, new menu, text file) containing all the IP addresses of the equipment to be authenticated as follows: IP address entry The IP addresses must be entered correctly and separated by carriage returns. The file is saved and closed. NeTIS MAINTENANCE GUIDE – Version 1.
Multiple authentications by IP network To authenticate several appliances connected to the same network, first check the "authenticate several appliances on the same network" box (surrounded in red, N°1), next click on the button showing a file in the window that has appeared (surrounded in red N° 2), select the text file containing the IP addresses (in red N°3) and finally click on the open button (in red N° 4). The addresses appear in the "IP addresses of equipment to authenticate" window as shown below.
IP address validation Validate click on the OK button. Finally, to launch the procedure, carry on as if authenticating a single appliance. The procedure is exactly the same. 9.8.3 SERIAL EQUIPMENT CONNECTION The use of a serial cable instead of a network cable does not change the procedure, it is strictly identical. The parameter configuration changes only. NeTIS MAINTENANCE GUIDE – Version 1.
Automatic authentication using a serial cable As for manual authentication, here the communications speed is set and the same steps as above are carried out. Multiple authentications are not possible because it would need a serial cable connection to all the BSs at the same time. NeTIS MAINTENANCE GUIDE – Version 1.
9.8.4 NO CONNECTION TO THE EQUIPMENT It is possible to authenticate equipment via Internet without being directly connected to them. In this case start by retrieving the old key using the method in the previous paragraph (see §4.2), send it via internet as explained below, then retrieve the new key and send it to the equipment using the previous method again. Automatic authentication without connecting to the equipment First enter the old key, enter the identifiers that were supplied and click on OK.
In the monitoring you will see a red cross appear on the green background of the icon as shown below if the NeTIS-B has not been authenticated: NeTIS MAINTENANCE GUIDE – Version 1.
10. PABX GATEWAY 10.1 Introduction The TETRA IP Gateway for PBX (phone switchboard) is used to open up a classic phone installation to the TETRA IP radio world. NeTIS MAINTENANCE GUIDE – Version 1.
B B B B IP IP SWITCH A SWITCH B IP GATEWAY IP TETRA Link T2, T0, S0, This gateway is used to interconnect a phone link to any location of an ETELM IP TETRA network having the TETRA UDP phone and signalling from the different TETRA SWITCHES.
10.2 Equipment This TETRA_IP for PABX Gateway is composed of: A BS chassis to access the UPlane and CPlane bus managing phoning and TETRA signalling from the CPU board A 220V or 48V power supply board A CPU board (need to have an 8k equipment signal) A BDT board (Time base) A COM2 or COM3 board configured with the T2 software (Version 2.05/) or a COMS board for an S0 or T0 access 10.
10.4 Configuration 10.4.1 CONFIGURATION TO THE IP PABX GATEWAY Parameter the Gateway IP address (by modifying the file /etc/interfaces) 10.4.2 CONFIGURATION OF THE SERVICE NETWORK MANAGEMENT TERMINAL Creation of phone appliance with the IP address of the appliance and its number as the link. In the dialling plan, indicate the PABX type for the number range corresponding to the gateway followed by the corresponding equipment number. NeTIS MAINTENANCE GUIDE – Version 1.
11. MODULE DESCRIPTION 11.1 Power supply board: NeTIS MAINTENANCE GUIDE – Version 1.
11.2 CPU-BDT board NeTIS MAINTENANCE GUIDE – Version 1.
11.3 CCT2 board NeTIS MAINTENANCE GUIDE – Version 1.
11.4 COM board NeTIS MAINTENANCE GUIDE – Version 1.
11.5 COM3 board NeTIS MAINTENANCE GUIDE – Version 1.
11.6 DCTR board NeTIS MAINTENANCE GUIDE – Version 1.
11.7 SUPIP board NeTIS MAINTENANCE GUIDE – Version 1.
11.8 UCM board NeTIS MAINTENANCE GUIDE – Version 1.
11.9 UCM2 board NeTIS MAINTENANCE GUIDE – Version 1.
11.10 Power amplifier (PA) This module amplifiers the RF signals sent by the CPU module in order to deliver 10 Watts RF. It is powered by +28 volts and can be checked on the front face of the UCM2. The PA alarms are present on the front face of the UCM2. The PA provides a set point for the regulation of its output power. The amplifier has an internal blocking mechanism if it does not receive the transmission command from the UCM. No measurements can be made if the BS is not in TETRA transmission.
NeTIS MAINTENANCE GUIDE – Version 1.