Advanced Configuration Given below is the table which explains Protocol Filter parameters and the method to configure the configurable parameter(s): Parameter Filtering Control Description This parameter is used to apply filters on the device’s interface. The filtering can be applied on any of the following interfaces: Ethernet: Packets are examined at the Ethernet interface. Wireless: Packets are examined at the Wireless interface.
Advanced Configuration Entry Status Set the entry status as either Enable, Disable or Delete. Enable: Enables filter status on a protocol. Disable: Disables filter status on a protocol. Delete: Deletes a protocol entry from the Protocol Filter Table. : System-defined default protocols cannot be deleted. 5.10.1.2 Add User-defined Protocols to the Filter Table To add user-defined protocols to the Protocol Filter Table, click Add in the Protocol Filter screen. The Protocol Filter Add Row screen appears.
Advanced Configuration To prevent all traffic from a specific wireless MAC address from being forwarded to the wired network, configure only the Wireless MAC address and Wireless Mask (leave the Wired MAC Address and Wired Mask set to all zeros). To prevent traffic between a specific wired MAC address and a specific wireless MAC address, configure all four parameters. Configure the wired and wireless MAC address and set the wired and wireless mask to all Fs.
Advanced Configuration Result: The device blocks all traffic between the wired PC and all wireless PCs. 5.10.2.0.4 Prevent a wireless PC from communicating with the wired network Configure the following settings to prevent wireless PC3 from communicating with any device on the Ethernet: Wired MAC Address: 00:00:00:00:00:00 Wired Mask: 00:00:00:00:00:00 Wireless MAC Address: 00:20:A6:12:4E:38 Wireless Mask: FF:FF:FF:FF:FF:FF Result: The device blocks all traffic between wireless PC3 and the Ethernet network.
Advanced Configuration Given below is the table which explains Static MAC Address Filter parameters and the method to configure the configurable parameter(s): Parameter Description Wired MAC Address Specifies the MAC address of the device on the wired network that is restricted from communicating with a device on the wireless network. Wired MAC Mask Specifies the range of MAC address to which this filter is to be applied.
Advanced Configuration The Advanced Filtering table contains a list of 5 pre-defined protocols on which Advanced Filtering is applied. The following table explains the Filtering table parameters: Parameter Protocol Name Description Represents the protocol name. By default, Advanced Filtering is supported on the following 5 default protocols: Deny IPX RIP Deny IPX SAP Deny IPX LSP Deny IP Broadcasts Deny IP Multicasts Direction Represents the direction of an IP Protocol traffic that needs to be filtered.
Advanced Configuration Figure 5-99 Advance Filtering- Edit Entries Modify the IP protocol traffic direction that needs to be filtered, and the filtering status for the desired IP Protocol. Next click OK and then COMMIT. 5.10.4 TCP/UDP Port Filter TCP/UDP Port Filtering allows you to enable or disable Transmission Control Protocol (TCP) ports and User Datagram Port (UDP) ports on network devices.
Advanced Configuration Figure 5-100 TCP/UDP Port Filter The Filter Control parameters determines if filter has to be applied or not on a TCP/UDP Port. By default, it is disabled. To apply filters, select Enable and click OK. 5.10.4.1 TCP/UDP Port Filter Table The TCP/UDP Port Filter table displays a list of default TCP/UDP ports and user-defined ports which can be enabled or disabled as desired. By default, the device support 7 default TCP/UDP port filter entries.
Advanced Configuration Parameter Entry Status Description Set the entry status as either Enable, Disable or Delete. Enable: Filter is applied and filters the packet based on the Port number and port type. Disable: No filter is applied. Delete: Allows to delete only user-defined TCP/UDP port filter entry. When you attempt to delete default entries, the device throws an error. If you have configured any user-defined protocols then click OK and then COMMIT.
Advanced Configuration To configure Storm Threshold Filter, navigate to ADVANCED CONFIGURATION > Filtering > Storm Threshold Filter. The Storm Threshold Filter screen appears. This screen contains information about the threshold values per second of the multicast and broadcast packets that can be processed for the interface(s) present in the device.
Advanced Configuration The user can form groups of SUs at the BSU which define the filtering criteria. All data to/from SUs belonging to the same group are bridged. If an SU does not belong to any group, the BSU discards the data. The user can also configure a Security Gateway to block traffic between SUs connected to different BSUs. All packets destined for SUs not connected to the same BSU are forwarded to the Security Gateway MAC address (configured under Security Gateway).
Advanced Configuration This screen is classified into two categories: Intra Cell Blocking and Security Gateway. Given below are the configuration details. Parameter Description Intra Cell Blocking Status By default, Intra Cell Blocking is disabled on a BSU. Select Enable to enable the feature and then Click OK and then COMMIT. Security Gateway Status By default, Security Gateway is disabled on a BSU. Select Enable to enable the feature. MAC Address Represents the MAC address of the security gateway.
Advanced Configuration Figure 5-104 WORP Intra Cell Blocking Group Table This table displays the list of groups. If the Entry Status for a group is set to Enable then BSU discards all the packets coming from SUs which are not members of that group. If set to Disable, then allows all the packets coming from SUs which are not the members of that group. If you have changed the Entry Status of a group, then click OK and then COMMIT. 5.10.6.
Advanced Configuration Figure 5-105 WORP Intra Cell Blocking MAC Table 5.10.6.2.1 To add MAC addresses, click Add. The following screen appears. Figure 5-106 WORP Intra Cell Blocking MAC Table Add Entry Given below is the table which explains the WORP Intra Cell Blocking MAC Table entries and the method to configure the configurable parameter(s): Parameter Description MAC Address Represents the MAC address of the SU.
Advanced Configuration To edit the existing MAC addresses, click Edit icon in the WORP Intra Cell Blocking MAC Table screen. Modify the parameters as desired in the WORP Intra Cell Blocking MAC Table Add Row screen and click OK and then COMMIT. In the WORP Intra Cell Blocking MAC Table, you can change the Entry Status as either Enable/Disable/Delete. Once the status is changed, click OK and then COMMIT. 5.
Advanced Configuration Figure 5-108 DHCP Pool Table Add Entry Enter the pool details and click Add. The entry will be updated in the DHCP pool table. To apply the configured changes, click COMMIT. 5.11.2 DHCP Server If DHCP Server is enabled, it picks automatically the IP addresses from the specific interface address pool and assigns them to the respective DHCP clients. DHCP Server feature is applicable to both Bridge and Routing Mode.
Advanced Configuration Figure 5-110 DHCP Server (Routing Mode) Given below is the table which explains DHCP Server parameters and the method to configure the configurable parameter(s): Parameter DHCP Server Status Description By default, DHCP Server is disabled on a device. To enable DHCP Server, select Enable. A DHCP Server can be enabled only when the following two conditions are satisfied: 1. Before enabling, atleast one interface should be enabled on which the DHCP Server has to run. 2.
Advanced Configuration Parameter Description Default Lease Time DHCP Server uses this option to specify the lease time it is willing to offer to the DHCP client over that interface. Once the lease time expires, the DHCP Server allocates a new IP address to the device. The Default Lease Time should be less than or equal to the configured Max Lease Time. Comment Specifies a note for the device administrator. Entry Status Used to Enable or Disable the DHCP Server functionality over the interface.
Advanced Configuration Figure 5-112 DHCP Relay Server Add Entry Enter the DHCP Server IP Address and then click Add. After configuring the required parameters, click OK and then COMMIT. : DHCP server is disabled automatically if DHCP Relay agent is enabled and vice-verse.
Advanced Configuration 5.12 IGMP Snooping : IGMP Snooping is applicable only in Bridge Mode. Proxim’s Tsunami® devices support Internet Group Management Protocol (IGMP) Snooping feature. With IGMP Snooping enabled on the device, multicast traffic is only forwarded to ports that are members of the specific multicast group. By forwarding the traffic only to the destined ports, reduces unnecessary load on devices to process packets.
Advanced Configuration Similarly, with IGMP Snooping not enabled on the SU/End Point B, the multicast data is transmitted irrespective of whether the multicast group address is a member of the multicast group table maintained in each SU/End Point B. With IGMP Snooping enabled, the SU/End Point B transmits the data to the host only when the multicast group address is a member of the multicast group table, else drops the packet.
Management This chapter provides information on how to manage the device by using Web interface. It contains information on the following: : Recommended characters for the name field are A-Z a-z 0-9 - _ = : . @ $ & and space. 6.1 System 6.1.
Management Given below is the table which explains System parameters and the method to configure the configurable parameter(s): Parameter Description System Up-Time This is a read-only parameter. It represents the operational time of the device since its last reboot. System Description This is a read-only parameter. It provides system description such as system name, firmware version and the latest firmware build supported. For example: MP-8100-BSU-WD-v2.X.Y(Build No.
Management Figure 6-2 An Example - Inventory Management By default, the components information is auto-generated by the device and is used only for reference purpose. Click Refresh, to view the updated system inventory management information. 6.1.3 Licensed Features Licensing is considered to be the most important component of an enterprise-class device which typically has a feature-based pricing model.
Management Given below is the table which explains each of the parameters: Parameter Description Product Description Description about the device. Number of Radios The number of radios the device supports. Number of Ethernet Interfaces The number of Ethernet interfaces supported by the device. Radio 1 Allowed Frequency Band The operational frequency band supported by the device radio. Maximum Output Bandwidth The maximum output bandwidth limit of the device. It is represented in mbps.
Management 6.2.1 TFTP Server A Trivial File Transfer Protocol (TFTP) server lets you transfer files across a network. By using TFTP, you can retrieve files from the device for backup or copying, and you can upgrade the firmware or the configuration files onto the device. You can . You can also download the latest TFTP download the SolarWinds TFTP server application from software from SolarWinds Web site at .
Management Figure 6-4 TBC File in xml Format 6.2.2.2 Editing the TBC File The TBC file can easily be opened and edited in any standard Text-Editors like Wordpad, MS-Word, Notepad++, Standard XML Editors. Proxim recommends XML Notepad 7 editor for editing the TBC file. You can modify any value between the double quotes(““) in the TBC file. It is recommended not to change the text outside the double quotes (“”) or XML tags in the TBC file.
Management 6.2.2.3 Loading the TBC file The TBC file can be loaded onto the device by using either SNMP, Web Interface or CLI. You can either use TFTP or HTTP to load the TBC file. By using Web Interface, you can load the TBC file by navigating to MANAGEMENT > File Management > Upgrade Configuration. To load the TBC file, it should be generated or downloaded onto the device. While loading the TBC file onto the device, any file name is accepted. Once loaded, the TBC file name is renamed to PXM-TBC.xml.
Management Figure 6-5 Upgrade Firmware - HTTP 2. In the HTTP screen, click Browse to select the latest firmware file from the desired location. Ensure that the file name does not contain any space or special characters. 3. Click Upgrade. 6.2.3.2 Upgrade Firmware via TFTP To upgrade the firmware via TFTP Server, do the following: 1. Navigate to MANAGEMENT > File Management > Upgrade Firmware > TFTP. Figure 6-6 Upgrade Firmware - TFTP 2.
Management : After upgrading the device with the new firmware, reboot the device; Otherwise the device will continue to run with the old firmware. It is recommended not to navigate away from the upgrade screen, while the upgrade is in progress. 6.2.4 Upgrade Configuration You can upgrade the device with the latest configuration files either through HTTP or TFTP. : Make sure the configuration file being loaded into the device is compatible.
Management 6.2.4.2 Upgrade Configuration via TFTP To upgrade the configuration files by using TFTP Server, do the following: 1. Navigate to MANAGEMENT > File Management > Update Configuration > TFTP. Figure 6-8 Upgrade Binary Configuration via TFTP 2. You can update the device with three types of configuration files: Binary, Text Based and Config Profile. To update the device with Binary Configuration file, select Binary Config.
Management 4. To update the device with Configuration Profile files, select Config Profile. Based on the IP mode, configure either IPv4 or IPv6 address as TFTP Server address. Enter the name of the Config Profile file (including the file extension) that has to be downloaded onto the device in the File Name box. Figure 6-10 Upgrade Configuration Profile via TFTP 5. If you are upgrading the device with Binary Configuration file then click Upgrade and then reboot the device, or click Upgrade & Reboot. 6.
Management Figure 6-11 Upgrade License via HTTP 2. In the HTTP screen, click Browse to locate the license upgrade(.bin) file to be loaded on the device. 3. Click Upgrade button to upgrade the license on the device and then reboot the device. 6.2.5.2 Upgrade License via TFTP To upgrade the license file using TFTP Server, do the following: 1. Navigate to MANAGEMENT > File Management > Update License > TFTP. Figure 6-12 Upgrade License via TFTP 2.
Management 6.2.6 Retrieve From Device The Retrieve From Device tab allows you to retrieve logs, config files, and license info from the device either through HTTP or TFTP. 6.2.6.1 Retrieve from Device via HTTP To retrieve files from the device by using HTTP, do the following: 1. Navigate to MANAGEMENT > File Management > Retrieve from Device > HTTP. Figure 6-13 Retrieve Files via HTTP 2. Select the type of file that you want to retrieve from the device from the File Type drop down box.
Management Figure 6-14 Retrieve Config Profile File via HTTP After excluding the unique parameters, click Create Profile for creating the profile and then click Retrieve. When the retrieved configuration profile file is loaded on target devices, the target devices will come up with configuration of the master device except the excluded parameters. The excluded parameters are retained as configured on the target device. : Config Profile is applicable only to the compatible devices. 3. Click Retrieve.
Management 6.2.6.2 TFTP Retrieve To retrieve files from the device by using TFTP, do the following: 1. Navigate to MANAGEMENT > File Management > Retrieve from Device > TFTP. Figure 6-16 Retrieve Files via TFTP 2. Based on the IP mode, configure either IPv4 or IPv6 address as TFTP Server address. 3. Enter the name of the file (including the file extension) that has to be retrieved from the device, in the File Name box. 4.
Management Figure 6-17 Retrieve Config Profile File via TFTP After excluding the unique parameters, click Create Profile for creating the profile and then click Retrieve. When the retrieved configuration profile file is loaded on the target devices, the target devices will come up with configuration of the master device except the excluded parameters. The excluded parameters are retained as configured on the target device. 5. Click Retrieve. The retrieved file can be found in the TFTP Server folder.
Management Figure 6-18 HTTP/HTTPS Given below is the table which explains HTTP/HTTPS parameters and the method to configure the configurable parameter(s). Parameter Admin Password Description By default, the Administrator password to access HTTP/HTTPS interface is public. For security reasons, it is recommended to change the default password. The password should be alphanumeric with minimum of 6 and maximum of 32 characters. : The following special characters are not allowed in the password: - = \ “ ‘ ? /
Management Parameter HTTPS Description By default, a user can manage the device through Web Interface over secure socket Layer (HTTPS). To prevent access to the device through HTTPS, select Disable. : The password configuration for HTTPS is same as configured for HTTP. After configuring the required parameters, click OK, COMMIT and then REBOOT. 6.3.2 Telnet/SSH To configure Telnet/SSH interface parameters, navigate to MANAGEMENT > Services > Telnet / SSH.
Management Given below is the table which explains Telnet/SSH parameters and the method to configure the configurable parameter(s): Parameter Admin Password Description By default, the Administrator password to access Telnet/SSH interface is public. For security reasons, it is recommended to change the default password. The password should be alphanumeric with minimum of 6 and maximum of 32 characters. : The following special characters are not allowed in the password: - = \ “ ‘ ? / space Monitor Password
Management 6.3.3 SNMP To configure SNMP interface parameters, navigate to MANAGEMENT > Services > SNMP.
Management Figure 6-21 SNMPv3 Given below is the table which explains SNMP parameters and the method to configure the configurable parameter(s): Parameter SNMP Description By default, the user has the access to manage the device through SNMP Interface. To prevent access to the device through SNMP, select Disable. : Any change in the SNMP status will affect the Network Management System access. Version Allows you to configure the SNMP version. The supported SNMP versions are v1-v2c and v3.
Management Parameter Description : The following special characters are not allowed in the password: - = \ “ ‘ ? / space Read/Write Password Represents the read-write community string used in SNMP Protocol. It is sent along with each SNMP GET / WALK / GETNEXT / SET request to allow or deny access to the device. This password should be same as read-write password set in the NMS or MIB browser. The default password is “public”. The password should be of minimum 6 and maximum 32 characters.
Management 6.3.3.1 SNMP Trap Host Table The SNMP Trap Host table allows you to add a maximum of 5 Trap server’s IP address to which the SNMP traps will be delivered. By default, the SNMP traps are delivered to 169.254.128.133. : The default SNMP Trap Host Table entry cannot be deleted. To add entries to the Trap Host Table, click Add in the Services screen.
Management 6.3.4 Logs The device supports two types of log mechanisms: 1. Event Log: Based on the configured event log priority, all the log messages are logged and used for any analysis. This log messages remain until they are cleared by the user. 2. Syslog: They are similar to Event logs except that they are cleared on device reboot. To configure Event log and Syslog priority, navigate to MANAGEMENT > Services > Logs.
Management 6.3.4.1 Configure a Remote Syslog host Configure a syslog host (server) in order to forward syslog messages to it. : You can configure only one syslog host. Follow the following steps to configure a remote syslog host: 1. Click Add in the Syslog Host Table screen. The Syslog Host Table Add Row screen appears: Figure 6-24 Syslog Host Table Add Row 2. IP Address: Based on the IP mode, enter IPv4 or IPv6 address of the Syslog host.
Management Figure 6-25 Syslog Host Configured For some reason, if the configured syslog host parameters are changed then you can edit it directly in the Syslog Host Table entry. You can change the following parameters: IP Address Port Host Comments Entry Status: – Enable: By default, the configured Syslog host is enabled on the device. – Disable: To disable an entry in the Syslog Host Table, click Disable. – Delete: To delete the configured Syslog host, click Delete.
Management Figure 6-26 Time Synchronization Given below is the table which explains SNTP parameters and the method to configure the configurable parameter(s): Parameter Enable SNTP Status Description Select this parameter to enable SNTP Client on the device. If enabled, the SNTP Client tries to synchronize the device’s time with the configured time servers. By default, the SNTP status is disabled.
Management Parameter Description Time Zone Configure the time zone from the available list. This configured time zone is considered before setting the time, received from the time servers, on the device. Day Light Saving Time Configure the Day Light Saving time from the available list. This configured Day Light Saving time is considered before setting the time, received from the time servers, on the device. ReSync Interval Set ReSync time interval ranging from 0 to 1440 minutes.
Management Figure 6-27 Management Access Control By default, the Management Access Control feature is disabled on the device. To enable, select Enable from the Access Table Status box and click OK. Reboot the device, for the changes to take effect. : Only when the Access Table Status is enabled, you can add host(s) to the Management Access Control Table. 6.5.0.1 Add Host(s) to Management Access Control Table To add a host to the Management Access Control Table, do the following: 1.
Management 6.6 Reset to Factory The Reset to Factory tab allows you to reset the device to its factory default state. When this operation is performed, the device will reboot automatically and comes up with default configurations. To reset the device to its factory defaults, navigate to MANAGEMENT > Reset To Factory. The Factory Reset screen appears: Figure 6-29 Reset to Factory Defaults Click OK, if you wish to proceed with factory reset, else click Cancel. 6.
Management To convert a QB to SU using Web Interface, do the following: 1. Navigate to MANAGEMENT > Convert QB to MP. The Convert QB to MP screen appears: Figure 6-30 Convert QB to MP 2. Click OK. 3. Reboot the device for the changes to take effect. : A QB after converting to SU will function in SU mode only. It will accept only MP firmware for upgrade. The version of the firmware being upgraded to should be 2.4.0 or later.
Monitor This chapter contains information on how to monitor the device by using Web interface. It contains information on the following: B D E C F ( ) B ) G ( I ) ' B H ' % 7.
Monitor For a SU, if the SU is registered with the BSU, then the LEDs will glow based on the RSSI value else all the 5 LEDs will blink. For a CPE, if the CPE is registered with the BSU, then the LEDs will glow based on the RSSI value else all the 5 LEDs will blink. For QB, if EndPointA is registered with EndPointB, then the LEDs will glow based on the RSSI value of each EndPoint. else all the 5 LEDs will blink. 7.
Monitor Parameter Description In Unicast Packets Specifies the number of subnetwork- unicast packets delivered to the higher level protocol. In Non-unicast Packets Specifies the number of non-unicast subnetwork packets delivered to the higher level protocol. In Errors Specifies the number of inbound packets that contained errors and are restricted from being delivered. Out Octets Specifies the total number of octets transmitted out from the Ethernet interface.
Monitor 7.2.2 Wireless Statistics To view the Wireless interface statistics, click MONITOR > Interface Statistics > Wireless1. Figure 7-3 Wireless Interface Statistics Given below is the table which explains the parameters displayed in the Wireless statistics screen: Parameter Description MTU Specifies the largest size of the data packet received or sent on the wireless interface. The MTU size can range from 350 to 3808 bytes for High throughput modes and 350 to 2304 bytes for legacy mode.
Monitor Parameter Description In Errors Specifies the number of inbound packets that contained errors and are restricted from being delivered. Out Octets Specifies the total number of octets transmitted out from the wireless interface. Out Packets Specifies the total number of packets requested by the higher level protocol and then, transmitted. Out Discards Specifies the number of error-free outbound packets chosen to be discarded to prevent them from being transmitted.
Monitor Figure 7-4 PPPoE Interface Statistics The PPPoE interface parameters are same as the Ethernet interface parameters. Please note that if a link is not established between a PPPoE client and server, then the device displays the following message. Figure 7-5 PPPoE Server - No Link Established To view the updated PPPoE interface statistics, click Refresh. Please note that for every 4 seconds, the interface statistics gets refreshed.
Monitor To view updated connection statistics, click Refresh. To restart the session between the PPPoE client and server, click Restart PPPoE Session. On successfully re-establishing a session, the IP address of the wireless interface will be assigned again by the PPPoE server, if Address Type is set to PPPoE-ipcp. To clear the existing connection statistics, click Clear. 7.2.4 IP Tunnels : Applicable only in Routing Mode.
Monitor Parameter Details Description Provides a more detailed statistics about the tunnel interface. To view the detailed statistics, click . Figure 7-8 Detailed IP Tunnels Interface Statistics The detailed tunnel interface parameters are similar to the Ethernet Interface Statistics. . Please refer to G 7.3 WORP Statistics 7.3.1 General Statistics WORP General Statistics provides general statistics about the WORP.
Monitor Figure 7-9 WORP General Statistics (SU/End Point A/End Point B) Figure 7-10 WORP General Statistics (BSU) Tsunami ® 800 & 8000 Series - Software Management Guide 231
Monitor 7.3.1.1 Basic Statistics Given below is an explanation to the basic parameters: Parameter Description Interface Type Specifies the type of radio interface. WORP Protocol Version Specifies the version of the WORP Protocol used. This information is useful to the customer support team for debugging purpose only. WORP Data Messages Specifies the sent or received data frames through wireless interface. Poll Data Refers to the number of polls with data messages sent or received.
Monitor Parameter Description Authentication Confirms Refers to the number of authentication confirm messages sent or received on WORP interface. Registration Attempts Refers to the number of times a registration attempt has been initiated. Registration Incompletes Refers to the number of registration attempts that are not yet completed. Registration Timeouts Refers to the number of times the registration procedure timed out.
Monitor Parameter Description TPC Displays the TPC value currently applied by the device to adjust the transmit power radiated by the radio. EIRP Displays the current EIRP that a radio antenna radiates (after applying the TPC). Power Displays the current transmit power radiated by the radio (after applying the TPC). Tx Antenna Ports Indicates the status of the antenna ports at the BSU end. Click Refresh to view updated WORP advanced statistics. 7.3.2 Link Statistics 7.3.2.
Monitor Figure 7-13 An Example - SU Link Statistics (For All Devices) Given below is an explanation to each of these parameters: Parameter Description SU Name/ End Point B Name Represents the name of the SU/End Point B connected to a BSU/End Point A respectively. MAC Address Represents the MAC address of the SU/End Point B connected to a BSU/End Point A respectively. Local Tx Rate (Mbps) Represents the data transmission rate at the local (current device) end.
Monitor Parameter Description Local Signal (dBm) Represents the signal level with which the device at the local end receives frames from the device at the remote end, through wireless medium. Local Noise (dBm) Represents the noise measured at the local end antenna ports. Local SNR (dB) Represents the SNR measured by the receiver at the local end and is based on the Local Signal and Local Noise. Remote Rx Antenna Port Info Indicates the status of the remote end antenna ports.
Monitor Figure 7-14 An Example - SU Detailed Statistics The detailed page displays Remote SNR information, that is, the Minimum Required SNR and the Maximum Optimal SNR value for a given data rate or modulation, to achieve optimal throughput. To disconnect an SU/End Point B from BSU/End Point A respectively, click Disconnect. To view updated detailed statistics, click Refresh. To view local SNR table, click Click here for Local SNR-Table on the upper-right of SU/End Point B Link Statistics screen (Refer ).
Monitor Figure 7-15 An Example - Local SNR Information These configured values are used by ATPC and DDRS to derive TPC and data rate for optimal throughput. 7.3.2.2 BSU/End Point A Link Statistics : BSU Link Statistics is applicable only to an SU, and End Point A Link Statistics is applicable only to an End Point B device. BSU Link statistics provides information about the BSU to which SUs are connected.
Monitor Figure 7-16 An Example - BSU Link Statistics (For 82x Devices) Figure 7-17 An Example - BSU Link Statistics (For All Devices) To access the Radio Link Test Tool, navigate to MONITOR > WORP Statistics > Interface 1 > SU/BSU Link Statistics > Details. Click . The SU/BSU WORP Detailed Statistics screen appears. In this screen, click the Radio Link Test button. . For detailed description of this tool, refer ( ) 7.3.
Monitor Figure 7-18 QoS Summary This screen shows the total, minimum and maximum bandwidth allocated per BSU/End Point A, and the minimum and maximum bandwidth allocated for each SU/End Point B registered with the BSU/End Point A respectively. 7.4 Active VLAN : Active VLAN is applicable only to a device in SU (Bridge) mode. The Active VLAN page enables you to identify the VLAN Configuration mode applied on a device in SU mode.
Monitor This page also displays the VLAN parameters and their values that are configured either locally or remotely. To view active VLAN Ethernet Configuration, navigate to MONITOR > Active VLAN > Ethernet. The Active VLAN Ethernet Configuration page appears: Figure 7-20 Active VLAN Ethernet Configuration This page displays the VLAN Ethernet parameters and their values that are configured either locally or remotely. : Please note that the number of Ethernets vary depending on the device. 7.5 Bridge 7.5.
Monitor Figure 7-21 Bridge Statistics The following table lists the parameters and their description M Parameter Description Description This parameter provides a description about the bridge. MTU Represents the largest size of the data packet sent on the bridge. MAC Address Represents the MAC address at the bridge protocol layer. Operational Status Represents the current operational status of the bridge: UP (ready to pass packets) or DOWN (not ready to pass packets).
Monitor Parameter Out Errors Description Represents the number of outbound packets that could not be transmitted because of errors. To view updated Bridge statistics, click Refresh. To clear the Bridge statistics, click Clear. 7.5.2 Learn Table Learn Table allows you to view all the MAC addresses that the device has learnt on all of its interfaces. To view Learn Table statistics, navigate to MONITOR > Bridge > Learn Table. The Learn Table screen appears.
Monitor Figure 7-23 Routing Table 7.6.2 IP ARP Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical address on the network. The IP ARP table is used to maintain a correlation between each IP address and its corresponding MAC address. ARP provides the protocol rules for making this correlation and providing address conversion in both directions.
Monitor 7.6.3 ICMP Statistics The ICMP Statistics attributes enable you to monitor the message traffic that is received and transmitted by the device. To view ICMP statistics, navigate to MONITOR > Network Layer > ICMP Statistics. The ICMP Statistics screen appears. Figure 7-25 ICMP Statistics The following table lists the ICMP Statistics parameters and their description M Parameter Description In Msgs or Out Msgs Represents the number of ICMP messages that are received/transmitted by the device.
Monitor Parameter Description In Timestamps or Out Timestamps Represents the rate at which the ICMP timestamp (request) messages are received/transmitted by the device. In Timestamps Reps or Out Timestamps Reps Represents the rate at which the ICMP timestamp reply messages are received/transmitted by the device. In Addr Masks or Out Addr Masks Represents the number of ICMP address mask request messages that are received/transmitted by the device.
Monitor 7.6.6 Neighbour Table : This parameter is applicable only in IPv4 and IPv6 mode, not in IPv4 only mode. The Neighbour Table contains a list of neighbouring routers and information about them. To view Neighbour Table, navigate to MONITOR > Network Layer > Neighbour Table. The Neighbour table screen appears. Figure 7-28 Neighbour Table 7.6.7 RIP Database : Applicable only in routing mode. The RIP Database screen contains routes (Routing Information Protocol updates) learnt from other routers.
Monitor 7.7 RADIUS (BSU or End Point A only) : RADIUS is applicable only to a BSU or an End Point A device. 7.7.1 Authentication Statistics Authentication Statistics provides information on RADIUS Authentication for both the primary and backup servers for each RADIUS server profile. To view Authentication statistics, navigate to MONITOR > RADIUS > Authentication Statistics.
Monitor Parameter Description UnKnown Types This parameter specifies the number of messages with unknown RADIUS message code since client startup. Packets Dropped Represents the number of RADIUS packets dropped by the device. To view updated RADIUS Client Authentication statistics, click Refresh. 7.8 IGMP : Applicable in Bridge mode only. To view IGMP statistics, navigate to MONITOR > IGMP > IGMP Snooping Stats.
Monitor Figure 7-32 Router Port List The following table lists the parameters and their description. Parameter Description Port Number Represents the port number on which multicast router is attached (on which IGMP Query has been received). Time Elapsed Represents the time elapsed since the port is marked as the router port. To view updated Router Port list, click Refresh. 7.9 DHCP DHCP Leases file stores the DHCP client database that the DHCP Server has served.
Monitor 7.10 Logs 7.10.1 Event Log Event Log file keeps track of events that occur during the operation of the device. It displays the event occurring time, event type, and the name of the error or the error message. Based on the priority (the log priority is set under MANAGEMENT > Services > Logs), the event details are logged and can be used for any future reference or troubleshooting. 7.10.1.1 View Event Log To view the event log messages, navigate to MONITOR > Logs > Event Log.
Monitor 7.10.1.3 Clear Event Log To clear the event log messages, click Clear Event Log. The messages are cleared and moved to the backup file leaving the event log file empty. An event is generated on clearing the event log messages. : The current and the backed up event logs are stored in the flash memory and can be retrieved even after device reboot. 7.10.2 Debug Log Debug Log helps you to debug issues related to important features of the device. Currently, this feature supports only DDRS and DFS.
Monitor reaches or exceeds the configured threshold range. The device issues a warning trap when the temperature is 5º Celsius less than the configured threshold range. To access this feature, navigate to MONITOR > Logs > Temperature Log. The following Temperature screen appears: Figure 7-36 Temperature Log ` ` Current Unit Temperature: Displays the current internal temperature of the device in Celsius.
Monitor 7.10.3.1 View Temperature Log To view the temperature Log, click Show Temp Log. Figure 7-37 View Temperature Log To retrieve the temperature log file from the device, see N O P Q R O S O T Q U V W O S R X O . The maximum size of the temperature log file is 65 KB. If the file size exceeds 65 KB, then all the log messages are moved to a backup file and only the recent 100 lines are displayed in the log file.
Monitor 7.10.3.2 Hide Temperature Log To hide the temperature log messages, click Hide Temp Log. 7.10.3.3 Clear Temperature Log To clear the temperature log messages, click Clear Temp Log. The messages are cleared and moved to the backup file leaving the temperature log file empty. An event is generated on clearing the temperature log messages. : The current and the backed up temperature logs are stored in the flash memory and can be retrieved even after device reboot. 7.11 Tools 7.11.
Monitor 7.11.2 Scan Tool With Scan Tool, you can scan all the Proxim devices available on the network. To scan the devices, navigate to MONITOR > Tools > Scan Tool. The Scan Tool screen appears. In the Scan Tool screen, select Scan Mode as IPv4. Click Scan to scan and refresh the devices on the network. The scanned devices are displayed as shown below: Figure 7-39 An Example - Scanned Devices (IPv4) In the Scan Tool screen, select Scan Mode as IPv6 to scan the 82x devices with IPv6 mode.
Monitor Figure 7-41 sFlow Architecture - An Example with a BSU and SUs The sFlow Agent, which is running on devices, captures traffic information received on all the Ethernet interfaces, and sends sampled packets to the sFlow Receiver for analysis. The sampling mechanism used to sample data are as follows: ` ` Packet Flow Sampling: In this sampling, the data packets received on the Ethernet interface of the device are sampled based on a counter. With each packet received, the counter is decremented.
Monitor Figure 7-42 sFLOW This screen displays the following information about the sFlow Agent: ` Version: The version displayed is 1.3;Proxim Wireless Corp.; v6.4. The version comprises the following information: 1. sFlow MIB Version: Indicates the agent’s MIB version. The MIB specifies how the agent extracts and bundles sampled data, and the sFlow receiver must support the agent’s MIB. The sFlow MIB version is 1.3. so the sFlow Receiver’s version must also be at least 1.3. 2.
Monitor Parameter Time Out Description Enter a value ranging from 30 to 31536000 seconds (365 days) in the Time Out box. The sFlow Agent sends sampled packets to the specified sFlow Receiver till it reaches zero. At zero, all the Receiver parameters are set to default values. Max Datagram Size Enter the maximum size of a sFlow datagram (in bytes), which the Receiver can receive, in the Max Datagram Size box. By default, the maximum datagram size is set to 1400 bytes. It can range from 200 to 1400 bytes.
Monitor Figure 7-43 sFlow Sampling Configuration 2. From the Receiver Index drop-down box, select the receiver index number associated with the sFlow Receiver to which the sFlow Agent should send the sFlow Datagrams. : If device has two Ethernet interfaces, then configure different Receiver indexes for each of the interface. 3. Type a value in the Packet Sampling Rate box.
Monitor Figure 7-44 Counter Polling Configuration 2. From the Receiver Index drop-down box, choose the receiver index number associated with the sFlow Receiver to which the sFlow Agent sends the counters. : If Packet Flow Sampling is already configured and running, then you should configure the Receiver index same as configured in the Packet Flow Sampling for each Ethernet interface. 3. Set the polling interval by typing a value in the Interval box. Lets say, the polling interval is set to 30 seconds.
Monitor 7.11.5 Spectrum Analyzer : Spectrum Analyzer is not applicable to MP-8150-CPE and QB-8150-LNK-12/50 devices. Spectrum Analyzer helps to analyze a spectrum for interference, and select a relatively low interference channel. This tool is not a replacement for the commercial Spectrum Analyzers as this is only intended to help with channel selection and diagnose performance issues. : Only an administrator user can use Spectrum Analyzer to scan the spectrum.
Monitor When working in a high interference network, ensure to run the spectrum analyzer with multiple iterations (increase the Scan Time) to get accurate results. ` : • When the Spectrum Analyzer starts, the wireless link, if established, is terminated and re-established after the scan is completed. • As the wireless link is down during spectrum analysis, the remote device cannot be accessed.
Monitor Graph Results Interpretation Consider a network with a device operating on channel 122 with 20 MHz channel bandwidth. In the same vicinity, when we . From the results, we see run the Spectrum Analyzer on a Tsunami radio it will display the results as shown in interfering signals on channels 115 to 129.
Monitor Figure 7-48 An Example - Selective Graph Statistics At a time, the graph represents the statistics of a maximum of 32 channels. To view the graph(s) of the remaining channels, click Next (available on the upper right corner of the graph). Click Previous to view the statistics of the previous channels. To view the tabular format of the graph statistics, click Detailed Statistics on the bottom left of the graph.
Monitor : Spectrum Analyzer configuration parameters and results are not persistent across reboots. 7.11.6 Radio Link Test Tool In general, whenever the network has some performance issue, it is required to identify whether the issue is due to the wireless link or due to other network parameters. The Radio Link Test (RLT) tool helps to measure and diagnose any performance issues in the wireless link.
Monitor To access this tool through web interface, navigate to MONITOR > WORP Statistics > Interface 1 > BSU/SU Link . Statistics > Details. Click as shown in q e r _ i V Z b O n j s t R e u j P i P R a P R X a Figure 7-50 An Example - SU Link Statistics The following BSU/SU WORP Detailed Statistics screen appears. Click the Radio Link Test Button. The following Radio Link Test screen appears.
Monitor Figure 7-52 An Example - Radio Link Test (Bidirectional Traffic with Verbose mode) The test runs for 60 seconds and displays the Radio Link Test Report as shown below.
Monitor 7.11.6.2 Statistics Options The test report can be analyzed by using the statistics options tabulated below: Parameter Description Traffic Statistics Tx Packets Total packets transmitted from the moment user initiated the test. Rx Packets Total packets received from the moment user initiated the test. Lost Packets Packets lost due to any reason. Duplicated Packets Number of packets received in duplicate for the already received packets. Tx Rate The rate at which the packets are sent.
Monitor Parameter Description Signal Statistics Signal Signal measured at the radio port Noise Noise detected at the radio port SNR Signal to Noise Ratio (dB) Using the rlt command options tabulated below, you run the radio link test tool through Web Console.
Monitor To access this tool through Web Console, navigate to MONITOR > Tools > Console Commands. In the Web Console screen do the following: Figure 7-54 An Example - Radio Link Test Through Web Console ` ` Command: Type the required rlt command. Click the Execute button. The command execution is displayed in the Web Console screen. To run the Radio Link Test tool through Command Line Interface (CLI), refer the Tsunami® 800 and 8000 Series Reference Guide. 7.
Monitor Figure 7-55 SNMP v3 Statistics The following table lists the SNMP v3 parameters and their description Parameter Description Unsupported Sec Levels This parameter specifies the total number of packets dropped by the SNMP engine because they requested a security level that was unknown to the SNMP engine or otherwise unavailable.
8 Troubleshooting This chapter helps you to address the problems that might arise while using our device. If the procedures discussed in this chapter does not provide a solution, or the solution does not solve your problem, check our support site at which stores all resolved problems in its solution database. Alternatively, you can post a question on the support site, to a technical person who will reply to your email. Y P P Z [ \ \ V ] ^ Z Q U _ R V ^ X U V Before you start troublesho
Troubleshooting 8.
Troubleshooting 8.2 Connectivity Issues Connectivity issues include any problem that prevents from powering or connecting to the device. Problem Does Not Boot - No LED Activity Ethernet Link Does Not Work Solution ` ` Make sure the power source is ON. Make sure all the cables to the device are connected properly. Check the Ethernet LED ` ` Serial Link Does Not Work ` ` Solid Green: The Ethernet link is up. Blinking Green: The Ethernet link is down. Double-check the physical network connections.
Troubleshooting 8.3 Surge or Lightning Issues (For Connectorized devices) Problem Surge or Lighting Problem Solution In case of any lightning or surge occurrence, check for the conditions specified below: ` ` Check the RF signals by referring to RSSI statistics and if the signal strength has been lowered considerably, replace the Surge Arrestor. Unscrew the N-Type connector at the top and visually inspect the Surge Arrestor for electrical burns. If any, replace it. 8.
Troubleshooting Problem HTTP Interface or Telnet Does Not Work Solution ` Make sure you are using a compatible browser: – Microsoft Internet Explorer 7.0 or later – Mozilla Firefox 3.
Troubleshooting 8.5 Application Specific Troubleshooting Problem Solution RADIUS Authentication Server Services unavailable If RADIUS Authentication is enabled on the device, then make sure that your network’s RADIUS servers are operational. Otherwise, clients will not be able to log on to the device. There are several reasons for the authentication server‘s services to be unavailable.
Troubleshooting 8.6 Wireless Link Issues Given below are the possible reasons for a wireless link not getting established and the relevant observations.
Troubleshooting Reason(s) With multiple link profiles, the wireless network performance is getting affected. Observation The overall performance of the wireless network gets affected when using multiple link profiles and atleast one of the subscriber is operating with a lower data rate. For example, consider a wireless network with a BSU and 5 SU profiles. Each SU is transmitting data at a data rate as tabulated below. As SU1 is operating at a lower data rate (6.
Troubleshooting Reason(s) Interference issues due to wider beam width of the antenna Observation ` MP-825-CPE-50, MP-825-SUR-50+, QB-825-EPR/LNK-50, and QB-825-EPR/LNK-50+ uses a wider beam width antenna (up to 38 o) with a gain of 15dBi. Due to its wider beam width, it may pick up more interfering signals and may report large number of errors compared to other Tsunami products.
Troubleshooting 8.8 Wireless Interface Validation Problem Wireless Interface Validation Solution Run iperf commands (You can run Embedded iperf commands only through Telnet.
Troubleshooting Problem Wireless Interface Validation Solution ` Data Rate Issues – Ensure same data rates are selected if you are using fixed data rate between BSU/SU and End Point A/End Point B to have predictable throughput and link – Alternatively, use DDRS with Auto mode enabled ` Performance and Stability Issues – Check the distance between two co-locating devices.
Troubleshooting 8.9.1 Operational Mode S.No Scenario 1 Restore the device to its factory default configuration while accessing it through web interface Recovery Procedure In the web interface, navigate to MANAGEMENT > Reset to Factory. The Factory Reset screen appears: In the screen, click OK. The device now reboots and comes with: ` ` ` 2 The device is not accessible for reasons such as user has forgotten the web interface login password, Management VLAN Id is changed, wrong VLAN configuration.
Troubleshooting 8.9.2 Bootloader Mode S.No Scenario 1 Recovery Procedure a) The device operating image is corrupted for reasons such as power interruption while upgrading (For 82x devices). After powering-up the device, press and hold the Reload button on the PoE injector (use a pin or the end of a paper clip) for first 15 seconds and then release the button between 15-30 seconds. By doing so, the operating image will get deleted. ` : No reload via Ethernet cross cable.
Troubleshooting : A new image cannot be downloaded using Bootloader CLI onto MP-825-CPE-50, MP-8160-CPE-A100 and QB-825-EPR-50 as it does not provide a serial interface. 8.9.3.1 Using the ScanTool To download the firmware image to the device, you will need an Ethernet connection to the computer on which the TFTP server resides and to a computer that is running ScanTool (this is either two separate computers connected to the same network or a single computer running both programs).
Troubleshooting Download Procedure 1. Download the latest software from Y P P Z [ \ \ V ] ^ Z Q U _ R V ^ X U , and copy it to the default directory of the TFTP server. V 2. Connect the device serial port to your computer’s serial port. 3. Open your terminal emulator program and set the following connection properties: ` ` ` ` ` ` Com Port: COM1, COM2 and so on, depending on your computer Baud Rate: 115200 Data Bits: 8 Stop Bits: 1 Flow Control: None Parity: None 4.
Troubleshooting 8.9.4.2 Attach the Serial Port Cable 1. Connect one end of the serial cable to the device and the other end to a serial port on your computer. 2. Power on the computer and the device. 8.9.4.3 Initializing the IP Address using CLI After connecting the cable to the serial port, you can use the CLI to communicate with the device. CLI supports the most-generic terminal emulation programs. In addition, many web sites offer shareware or commercial terminal programs that you can download.
Troubleshooting Ö Û º ¿ Â Ë Ø É Ë Â Ö Û º ¿ Â Ë Ø É Ë Â Ó Â Ä É Í Â Ã ¼ Ä Ö Û º ¿ Â Ë Ø É Ë Â ¾ Ö Û º ¿ Â Ë Ø É Ë Â Ö Û º ¿ Â Ë Ø É Ë Ö Û º ¿ Â Ë Ø É Ë Ö Û º ¿ Â Ë Ø É Ö Û º ¿ Â Ë Ø Ö Û º ¿ Â Ë Ø Ö Û º ¿ Â Ë Ö Û º ¿ Â Ë Ö Û º ¿ Â Ö Û º ¿ Â Ö Û º ¿ Â ß Å Á Æ Ã ¼ Ä Å Á Æ Î ¾ Ã ¼ Ä Å Á Æ Â ¾ Ã ¼ Ä Å Á Æ Â ¾ Ã ¼ Ä Å Á Æ Ë Â ¾ Ã ¼ Ä Å Á Æ É Ë Â ¾ Ã
Troubleshooting ` Monitor / Per Station (Information per connected remote partner): Check that the received signal level (RSL) is the same on both sides. This should be the case if output power is the same. Two different RSLs indicate a broken transmitter or receiver. A significant difference between Local Noise and Remote Noise could indicate a source of interference near the site with the highest noise. Normally, noise is about –80 dBm at 36 Mbps.
Feature Applicability Given below are the feature(s) applicable to the respective point-to-point devices: Tsunami ® 800 & 8000 Series - Software Management Guide 291
Feature Applicability Given below are the feature(s) applicable to the respective point-to-multipoint devices: Tsunami ® 800 & 8000 Series - Software Management Guide 292
Parameters Requiring Reboot Given below are the parameters that require the device to reboot.
Parameters Requiring Reboot Parameter(s) Web Page(s) Applicable Device Mode* Wireless Properties Channel Bandwidth BASIC CONFIGURATION ADVANCED CONFIGURATION -> Wireless -> Interface1 -> Properties All Channel Offset ADVANCED CONFIGURATION -> Wireless -> Properties Applicable only to, ú ú ú ú ú ú ú ú ú ú ú ú MP-820-BSU-100 MP-820-SUA-50+ MP-825-SUR-50+ MP-825-CPE-50 MP-8150-CPE MP-8160-BSU MP-8160-BS9 MP-8160-SUA MP-8160-CPE-A100 QB-825-EPR/LNK-50 QB-825-EPR/LNK-50+ QB-8150-LNK-12/50 A
Parameters Requiring Reboot Parameter(s) Web Page(s) Upgrade Configuration MANAGEMENT -> File Management -> Upgrade Configuration Applicable Device Mode* All HTTP / HTTPS Admin Password All Monitor Password All HTTP MANAGEMENT -> Services -> HTTP / HTTPS All HTTP Port All HTTPS All Parameter(s) Web Page(s) Applicable Device Mode* SNMP (If SNMP v1-v2c is enabled) SNMP All Version All Read Password All Read / Write Password MANAGEMENT -> Services -> SNMP SNMP Trap Host Table All A
Parameters Requiring Reboot Parameter(s) Web Page(s) Applicable Device Mode* Admin Password All Monitor Password All Telnet All Telnet Port Telnet Sessions All MANAGEMENT -> Services -> Telnet / SSH All SSH All SSH Port All SSH Sessions All Management Access Control Access Table Status All Management Access Control Table MANAGEMENT -> Access Control All Reset to Factory MANAGEMENT -> Reset to Factory All Convert QB to MP MANAGEMENT -> Convert QB to MP Applicable only to ú ú ú
Frequency Domains and Channels Introduction The Tsunami® point-to-point and point-to-multipoint products are available in two SKUs: United States (US) and rest of the World (WD) markets. Depending on the SKU, the device is hard programmed at factory per the regulatory domain. Regulatory domain controls the list of frequency domains that are available in that SKU. Further each frequency domain will define the country specific regulatory rules and frequency bands.
Frequency Domains and Channels World Frequency Domains Point to Multipoint Devices Product(s) World 5 GHz 4 World 4.9 GHz 5 World 2.4 GHz 6 World 2.3 GHz 7 World 2.5 GHz 8 Canada 5 GHz 9 WD Europe 5.8 GHz 10 WD Europe 5.4 GHz 11 WD-Europe 2.4 GHz 12 Russia 5 GHz 13 Taiwan 5 GHz 14 WD United States 5 GHz 15 Canada 5.8 GHz 16 World 6.4 GHz WD UK 5.8 GHz World 5.
Frequency Domains and Channels Point to Point Devices Product(s) World 5 GHz 4 World 4.9 GHz 5 World 2.4 GHz 6 World 2.3 GHz 7 World 2.5 GHz 8 Canada 5 GHz 9 WD-Europe 5.8 GHz 10 WD-Europe 5.4 GHz 11 WD-Europe 2.4 GHz 12 Russia 5 GHz 13 Taiwan 5 GHz 14 WD United States 5 GHz 15 Canada 5.8 GHz 16 World 6.4 GHz World UK 5.8 GHz World 5.9 GHz India 5.
Frequency Domains and Channels Europe and Japan Frequency Domains MP-8100-BSU MP-8100-SUA EU EU EU JP EU EU Licensed Bands (in GHz) 2.4, 4.9, 5.0 4.9, 5.0 4.9, 5.0 4.9, 5.0 4.9, 5.0 5.0 Japan 2.4 GHz 18 Japan 4.9 GHz 19 UK 5.8 GHz Europe 5.8 GHz Europe 5.4 GHz Europe 2.
Frequency Domains and Channels : All DFS countries support only 20 and 40 MHz channel bandwidths. 2.4 GHz Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz US SKU United States 2.4 GHz 2412 ~ 2462 1 (2412), 2 (2417)... 10 (2457), 11 (2462). 1 (2412), 2 (2417)... 10 (2457), 11 (2462). 1 (2412), 2 (2417)... 10 (2457), 11 (2462). 1 (2412), 2 (2417)... 6 (2437), 7 (2442).
Frequency Domains and Channels 4.9 and 5 GHz Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz US SKU United States 5 GHz 5260 ~ 5320 (DFS) 5500 ~ 5580 (DFS) 5660 ~ 5700 (DFS) 5745 ~ 5825 (non-DFS) - - 52(5260), 53(5265)... 63(5315), 64(5320). 100(5500), 101(5505)... 115(5575), 116(5580). 132(5660), 133(5665)... 139(5695), 140(5700). 149(5745), 150(5750)...
Frequency Domains and Channels Frequency Domain Japan 5.
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz World 5.9 GHz 5880 ~ 5920 (Non-DFS) 176(5880), 177(5885)... 183(5915), 184(5920). 176(5880), 177(5885)... 183(5915), 184(5920). 177(5885), 178(5890)... 182(5910), 183(5915).
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz India 5.8 GHz 5830 ~ 5870 (Non-DFS) 166(5830), 167(5835)... 173(5865), 174(5870). 166(5830), 167(5835)... 173(5865), 174(5870). 167(5835), 168(5840)... 172(5860), 173(5865). 167(5835) 168(5840) 169(5845) 171(5855) 172(5860) 173(5865) Canada 5.8 GHz 5735 ~ 5855 (Non-DFS) 147(5735), 148(5740)...
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Legacy 5GHz 5150 ~ 6080 (Non-DFS) Please note that 8200 & 82x SKUs support upto 5920 MHz frequency. WD Japan 4.9 4912 ~ 4980 (Non-DFS) Please note that 8100 SKUs does not support this frequency. Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz 30(5150), 31(5155)... 215(6075), 216(6080). 30(5150), 32(5160)... 214(6070), 216(6080). 30(5150), 34(5170)...
Frequency Domains and Channels Frequency Domain Frequency Band (Start Frequency ~ End Frequency in MHz) Allowed Channels (Center Frequency in GHz) 5 MHz 10 MHz 20 MHz 40 PLUS MHz 40 MINUS MHz EU SKU U.K 5.8 GHz 5730 ~ 5790 (DFS) 5820 ~ 5845 (DFS) - - 147(5735), 148(5740)... 156(5780), 157(5785). 167(5835) 147(5735), 148(5740)... 152(5760), 153(5765). 151(5755), 152(5760)... 156(5780), 157(5785). Europe 5.8 GHz 5735 ~ 5870 (DFS) - - 149(5745), 150(5750)... 172(5860), 173(5865).
Frequency Domains and Channels 6.4 GHz Channels Frequency Domain World 6.4 GHz Frequency Band (Start Frequency ~ End Frequency in MHz) 5905 ~ 6420 Allowed Channels (Center Frequency) 5 MHz 181 (5905), 182 (5910)... 283 (6415), 284 (6420). 10 MHz 181 (5905), 182 (5910)... 283 (6415), 284 (6420). 20 MHz 40 PLUS MHz 40 MINUS MHz 182 (5910), 183 (5915)... 282 (6410), 283 (6415). 182 (5910), 183 (5915)... 278 (6390), 279 (6395). 186 (5930) 187 (5935)... 282 (6410), 283 (6415).
Frequency Domains and Channels ú 6.4GHz -> – Channel 181 = 5910 MHz – Bandwidth starts from 5901 MHz and ends at 5940 MHz For 40 MINUS ú 2.4GHz -> – Channel 5 = 2432 MHz – Bandwidth starts from 2403 MHz and ends at 2442 MHz ú 5GHz -> – Channel 56 = 5280 MHz – Bandwidth starts from 5251 MHz and ends at 5290 MHz ú 6.
Frequency Domains and Channels Tsunami ® 800 & 8000 Series - Software Management Guide 310
LACP - Device Management Tsunami Quickbridge® devices that are part of the LACP link cannot be managed through the switches, so it is recommended to use the second Ethernet port for management. : ú When using second Ethernet port for management, ensure to disable Auto Shutdown for Ethernet2. See ). L I ú H I J K M J N K O P STP/LACP Frames should be set to passthru.
LACP - Device Management In this example, we have considered a network with two QuickBridge links each supporting LACP mode. In this setup, VLAN is not configured on both LACP switches and devices. The Ethernet1 of all the devices is connected to the LACP port and is used for data transfer. To manage the devices, use a dedicated management Personal Computer per QuickBridge link. Use Ethernet2 port of the device to connect the Personal Computer.
QinQ The Subscribers and End Point devices support QinQ VLAN feature that enables service providers to use a single VLAN ID to support multiple customer VLANs by encapsulating the 802.1Q VLAN tag within another 802.1Q frame.
QinQ Device Management ú – From the BSU Ethernet side, the BSU/SU can be managed with a single VLAN tagged packet that matches the Management VLAN ID. – From the SU Ethernet side, only SU can be managed with a single VLAN tagged packet that matches the Management VLAN ID; BSU cannot be managed from the SU Ethernet side. : ú ú In a QuickBridge link, Q-in-Q should be enabled either on an End Point A or an End Point B. The user configurable TPID is only used in the Service Provider VLAN tag.
BSU Redundancy The BSU Redundancy feature can help in reducing the network outage in case of the Primary BSU failure. This feature enables the SU to keep track of the Primary and the Secondary BSU availability through a proprietary protocol. This allows the SU to switch between the Primary and the Secondary BSU depending on the link status. If both the Primary and the Secondary BSU are not available, the SU attempts to find any other BSU within its network.
BSU Redundancy Log Samples for BSU Redundancy SU - During Boot Up Channel 160 is set as the current channel. SU is trying to register with BSU: BSU1 (MAC: 00:0b:6b:b7:4c:26). SU received QoS Class: Unlimited Best Effort (indx: 1). SU registered with BSU: BSU1 (MAC: 00:0b:6b:b7:4c:26) on channel 160(0x14004A0) (SNR: A1:46 A2:0 A3:40[dB]) at WORP port[ 0 ]. Link Profile Index: 1.
BSU Redundancy 00:23:35 kernel:Worp: SU registered with BSU: BSU1 (MAC: 00:0b:6b:b7:4c:26) on channel 160(0x14004A0) (SNR: A1:43 A2:0 A3:36[dB]) at WORP port[ 0 ]. 00:23:35 kernel:Worp: Link Profile Index: 1.
Bootloader CLI and ScanTool Bootloader CLI The Bootloader CLI is a minimal subset of the normal CLI that is used to perform initial configuration of the device. The Bootloader CLI is available when the device embedded software is not running.
Bootloader CLI and ScanTool To Load the Firmware from the Network Use the value. ¤ ¥ © command to view the parameters and their values, and use the ¤ £ command to set the parameter To Load the Firmware by using Dynamic IP Parameters 1. Set the ipaddrtype to dynamic 2. Run the BOOTP and TFTP Servers followed by device reboot When the device reboots, the device gets the IP Address and Boot filename from the BOOTP server. You need not change any of the default Bootloader parameters.
SNR Information Given below are the SNR values for the following devices: MP-8100-BSU MP-8100-SUA MP-8150-SUR MP-8150-SUR-100 QB-8100-EPA/LNK QB-8150-EPR/LNK QB-8150-LNK-100 QB-8151-EPR/LNK 2.4 GHz MCS Index Modulation No of Streams 5 MHz Data Rate Min SNR 10 MHz Max SNR Data Rate Min SNR 20 MHz Max SNR Data Rate Min SNR 40 MHz Max SNR Data Rate Full Short Min SNR Max SNR MCS0 BPSK 1/2 Single 1.6 10 86 3.3 10 86 6.5 12 86 13.
SNR Information 5 GHz MCS Index No of Streams Modulation 5 MHz Data Rate Min SNR 10 MHz Max SNR Data Rate Min SNR 20 MHz Max SNR Data Rate Min SNR 40 MHz Max SNR Data Rate Full Short Min SNR Max SNR MCS0 BPSK 1/2 Single 1.6 6 86 3.3 7 86 6.5 6 86 13.5 15 9 80 MCS1 QPSK 1/2 Single 3.3 8 86 6.5 8 86 13 9 86 27 30 11 80 MCS2 QPSK 3/4 Single 4.9 10 84 9.7 13 84 19.5 11 84 40.5 45 15 79 MCS3 16 QAM 1/2 Single 6.
SNR Information 2.4 GHz 5 MHz Modulation 5 GHz 10 MHz 20 MHz 5 MHz 10 MHz 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Min SNR Max SNR Min SNR Max SNR Min SNR Max SNR 64QAM 2/3 12 27 81 24 29 76 48 28 73 24 80 24 80 24 78 64QAM 3/4 13.
SNR Information Given below are the SNR values for the following device(s) in legacy mode: MP-8150-CPE QB-8150-LNK-12/50 5 GHz 5 MHz Modulation 10 MHz 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR BPSK 1/2 1.5 7 81 3 7 81 6 7 81 BPSK 3/4 2.25 8 81 4.5 8 81 9 8 81 QPSK 1/2 3 9 80 6 9 80 12 9 79 QPSK 3/4 4.
SNR Information 6.4 GHz MCS Index Modulation No of Streams 5 MHz Data Rate Min SNR 10 MHz Max SNR Data Rate Min SNR 20 MHz Max SNR Data Rate Min SNR 40 MHz Max SNR Data Rate Full Short Min SNR Max SNR MCS10 QPSK 3/4 Dual 9.7 15 84 19.5 13 84 39 13 82 81 90 15 75 MCS11 16 QAM 1/2 Dual 13 16 80 26 17 80 52 17 78 108 120 18 74 MCS12 16 QAM 3/4 Dual 19.
SNR Information 4.900 - 5.925 GHz MCS Index MCS15 Modulation 64 QAM 5/6 No of Streams 5 MHz Data Rate Dual Min SNR 32.5 10 MHz Max SNR 30 Data Rate 50 Min SNR 65 30 20 MHz Max SNR Data Rate 50 130 Min SNR 30 40 MHz Max SNR 50 Data Rate Full Short 270 300 Min SNR Max SNR 33 50 Given below are the SNR values for the following device(s) in legacy mode: MP-8200-BSU / SUA MP-8250-BS9 / BS1 MP-8250-SUR 4.900 - 5.
SNR Information Given below are the SNR values for the following device: MP-820-BSU-100 MP-820-SUA-50+ MP-825-SUR-50+ MP-825-CPE-50 QB-825-EPR/LNK-50 QB-825-EPR/LNK-50 ± 5 GHz MCS Index Modulation No of Streams 5 MHz Data Rate Min SNR 10 MHz Max SNR Data Rate Min SNR 20 MHz Max SNR Data Rate Min SNR 40 MHz Max SNR Data Rate Full Short Min SNR Max SNR MCS0 BPSK 1/2 Single 1.6 9 50 3.3 9 50 6.5 9 50 13.5 - 9 50 MCS1 QPSK 1/2 Single 3.3 10 50 6.
SNR Information Given below are the SNR values for the following device in legacy mode: MP-820-BSU-100 MP-820-SUA-50+ MP-825-CPE-50 MP-825-SUR-50+ 5 GHz 10 MHz Modulation 20 MHz Data Rate Min SNR Max SNR Data Rate Min SNR Max SNR BPSK 1/2 3 8 50 6 8 50 BPSK 3/4 4.
Configuration File Cross-loading across the Products Proxim portfolio comprises different product lines and SKUs which differ in features and capabilities depending on the hardware platform and the country setting or licensing used in them. This document describes the process to successfully apply the configuration file on a device(s) and the software checks run while applying the configuration file on a device(s).
Configuration File Cross-loading across the Products Sometimes, a device from a particular product series may have different a license information compared to other devices of the same series. Therefore, the start-up process validates the configuration file against the license file of the device before applying the configuration file. The configuration file is valid, if the following conditions are met: 1.
Abbreviations A ACL Access Control List ACS Automatic Channel Selection AES Advanced Encryption Standard ALG Application Level Gateway ARP Address Resolution Protocol ATPC Adaptive Transmit Power Control B BSU Base Station Unit C CCP Compression Control Protocol CHAP Challenge Handshake Authentication Protocol CLI Command Line Interface CIR Committed Information Rate CPE Customer Premises Equipment CRC Cyclic Redundancy Check D DDRS Dynamic Data Rate Selection DES Data Encryptio
Abbreviations FCS Frame Check Sequence G Gbps Gigabit Per Second GPL General Public License GRE Generic Routing Encapsulation H HTTP HyperText Transfer Protocol HTTPS HyperText Transfer Protocol Secure I IANA Internet Assigned Numbers Authority (IANA) IC Industry Canada ICMP Internet Control Message Protocol IGMP Internet Group Management Protocol ISP Internet Service Provider ITS Intelligent Transportation System L LACP Link Aggregation Control Protocol LAN Local Area Network L
Abbreviations N NAPT Network Address Port Translation NAT Network Address Translation NCP Network Control Protocol NBD Next Business Day NMS Network Management System NOP Non Occupancy Period P PAP Password Authentication Protocol PC Personal Computer PoE Power Over Ethernet PPPoE Point-to-point Protocol over Ethernet PTMP Point-to-multipoint PTP Point-to-point PVES ProximVision ES Q QB QuickBridge QoS Quality of Service R RADIUS Remote Authentication Dial In User Service RA
Abbreviations SSL Secure Socket Layer STP Spanning Tree Protocol SU Subscriber Unit T TBC Text Based Configuration TCP Transmission Control Protocol TFTP Trivial File Transfer Protocol TKIP Temporal Key Integrity Protocol TPC Transmit Power Control TPID Tag Protocol Identifier TTL Time to Live U UDP User Datagram Protocol UTP Unshielded Twisted Pair V VLAN Virtual Local Area Network W WEP Wired Equivalent Privacy WORP Wireless Outdoor Router Protocol Tsunami ® 800 & 8000 Serie
Lightning Protection Lightning protection is used to maximize the reliability of the communications equipment by safely re-directing current from a lightning strike or a power surge traveling along the Cat 5/Cat5e/Cat 6 Ethernet cabling to the ground using the shortest path possible. Designing a proper grounding system prior to installing any communications equipment is critical to minimize the possibility of equipment damage, void warranties, and cause serious injury.
Statement of Warranty Warranty Coverage Proxim Wireless Corporation warrants that its products are manufactured solely from new parts, conform substantially to specifications, and will be free of defects in material and workmanship for a Warranty Period of 1 year from the date of purchase.
Statement of Warranty Calls to the Customer Service Center for reasons other than product failure will not be accepted unless Buyer has purchased a Proxim Wireless Service Contract or the call is made within the warranty period. After the warranty period, Technical Support ).
Technical Services and Support Obtaining Technical Service and Support If you are having trouble using the Proxim product, please read this guide and the additional documentation provided with your product.
Technical Services and Support Telephone Support Contact technical support via telephone as follows: USA and Canada Customers — Phone: +1-408-383-7700; +1-866-674-6626 — Business Hours: 24x7 live response. Tier 3 support: 8 a.m. to 5 p.m. M-F PDT (UTC/GMT -7 hrs) International Customers — Phone: +1-408-383-7700; 0800-916475 (France); 8-800-100-9485 (Russia) — Business Hours: 24x7 live response. Tier 3 support: 8 a.m. to 5 p.m.
Technical Services and Support Additional Information on ServPak Options Advanced Replacement of Hardware In the event of a hardware failure, our guaranteed turnaround time for return to factory repair is 30 days or less. Customers who purchase this service are guaranteed replacement of refurbished or new hardware to be shipped out within one or two business days, as applicable. Options are available for shipment services depending on the customer’s support needs.
Technical Services and Support Assistance with QoS, RADIUS, and VLAN settings on Proxim equipment To purchase ServPak support services, please contact your authorized Proxim distributor. To receive more information or for questions on any of the available ServPak support options, please visit our website at , call Proxim Support (For telephone numbers, see ) or send an .