Proxim Tsunami MP11a 5054
Proxim Tsunami MP11a 5054
Proxim Tsunami MP11a 5054
Tsunami MP.11
Model 5054 (MP.11a)
Installation and Management
Version 2.5
COPYRIGHT
2006 Proxim Wireless Corporation, San Jose, CA. All rights reserved. Covered by one or more of the following
U.S. patents: 5,231,634; 5,875,179; 6,006,090; 5,809,060; 6,075,812; 5,077,753. This manual and the software
described herein are copyrighted with all rights reserved. No part of this publication may be reproduced,
transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means
without the written permission of Proxim Wireless Corporation.
TRADEMARKS
Tsunami, Proxim, and the Proxim logo are trademarks of Proxim Wireless Corporation. All other trademarks
mentioned herein are the property of their respective owners.
FCC COMPLIANCE
This document provides regulatory information for the following wireless indoor products:
5054 BSU, 5054 SU, 5054 RSU
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference
(2) This device must accept any interference received, including interference that may cause undesired
operation.
This device must be professionally installed.
Changes or modifications not expressly approved by Proxim Wireless Corporation could void the your authority to
operate the equipment.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part
15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a
residential installation.
This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does cause harmful
interference to radio or television reception (which can be determined by turning the equipment off and on), you
are encouraged to attempt to correct the interference by one or more of the following measures:
This device must be professionally installed. Antennas used for the MP.11a product must be fix-mounted on
permanent structures.
Notices
Contents
CHAPTER 1. OVERVIEW .........................................................................................................................................5
About This Book ...................................................................................................................................................5
Reference Manual .........................................................................................................................................6
Wireless Network Topologies...............................................................................................................................6
Point-to-Point Link .........................................................................................................................................7
Point-to-Multipoint Network ...........................................................................................................................7
Power-over-Ethernet ............................................................................................................................................8
Identifying Network Topology and Equipment .....................................................................................................8
Finding a Suitable Location..................................................................................................................................8
CHAPTER 2. INSTALLATION ..................................................................................................................................9
Installation Procedure ..........................................................................................................................................9
Attaching a Kensington Security Lock (Optional)...............................................................................................12
Mounting the Unit ...............................................................................................................................................12
Desktop Mounting........................................................................................................................................12
Wall Mounting ..............................................................................................................................................12
Ceiling Mounting ..........................................................................................................................................14
Powering On the Unit .........................................................................................................................................14
Installing Documentation and Software .............................................................................................................15
Aligning the Antenna ..........................................................................................................................................16
Antenna Alignment Commands...................................................................................................................16
CHAPTER 3. MANAGEMENT OVERVIEW............................................................................................................17
IP Address..........................................................................................................................................................18
Setting the IP Address .................................................................................................................................18
Starting the Web Interface .................................................................................................................................19
Changing Basic Configuration Information ........................................................................................................21
Country and Related Settings......................................................................................................................21
Dynamic Frequency Selection (DFS) ..........................................................................................................22
Transmit Power Control ...............................................................................................................................23
SU Registration ..................................................................................................................................................23
Virtual Local Area Networks (VLANs) ................................................................................................................24
Quality of Service (QoS) ....................................................................................................................................24
Concepts and Definitions.............................................................................................................................25
CHAPTER 4. BASIC MANAGEMENT....................................................................................................................29
Rebooting and Resetting....................................................................................................................................29
Rebooting ....................................................................................................................................................30
Resetting Hardware .....................................................................................................................................30
Soft Reset to Factory Default ......................................................................................................................30
General Configuration Settings ..........................................................................................................................31
Monitoring Settings ............................................................................................................................................32
Security Settings ................................................................................................................................................32
Encryption....................................................................................................................................................32
Passwords ...................................................................................................................................................32
Default Settings ..................................................................................................................................................33
Upgrading the Unit .............................................................................................................................................34
CHAPTER 5. USING THE WEB INTERFACE........................................................................................................35
System Status ....................................................................................................................................................35
View System Status.....................................................................................................................................35
View the Event Log Contents ......................................................................................................................36
Configure the Units Settings..............................................................................................................................37
1) Configure System Parameters ................................................................................................................37
2) Configure Network Parameters ...............................................................................................................42
3) Configure Interface Settings....................................................................................................................52
4) Configure SNMP Parameters..................................................................................................................62
5) Configure RIP Parameters ......................................................................................................................62
6) Configure Management Parameters .......................................................................................................65
7) Configure Security Parameters ...............................................................................................................68
Contents
Contents
Chapter 1. Overview
The Tsunami MP.11a (Tsunami MP.11 Model 5054) is a flexible wireless outdoor router that lets you design
solutions for point-to-point links and point-to-multipoint networks. The Tsunami MP.11 5054 is a product family
comprising several products (such as the 5054 Base Station and the 5054 Residential Subscriber Unit). For
simplification, all products that are part of the 5054 Product Family are referred to as 5054.
Some of the key features of the 5054 are:
Chapter 1. Overview
Reference Manual
As a companion to the Installation and Management manual, the Tsunami MP.11 Reference Manual provides the
following supplemental information:
Command Line Interface
Documents the text-based configuration utilitys keyboard commands and parameters.
Event Log Error Messages
Documents the error messages that you may see in your Event Log.
Alarm Traps
Documents the alarm traps that can be set.
Microsoft Windows IAS Radius Server Configuration
Provides information to assist you in setting up the IAS Radius Server.
Addition of Units to a Routed Network
Describes how to add more units to your routed network.
Glossary
Describes terms used in the Tsunami MP.11 documentation and in the wireless industry.
If you are already familiar with this type of product, you can use the Quick Install Guide to install the unit.
Point-to-Point Link
Point-to-Multipoint Network
Each unit is set up as either a Base Station Unit (BSU) or a Subscriber Unit (SU). A BSU can, depending upon its
configuration, connect to one or more SUs. An SU, however, can connect only to one BSU. A direct link between
two locations always consists of a BSU and a SU.
Chapter 1. Overview
Point-to-Point Link
With a BSU and an SU, it is easy to set up a wireless point-to-point link as depicted in the following figure.
A point-to-point link lets you set up a connection between two locations as an alternative to:
Point-to-Multipoint Network
If you want to connect more than two buildings, you can set up a single point-to-multipoint network with a single
BSU and multiple SUs, as depicted in the following figure.
Up to 250 SUs can be connected to a BSU. If a BSU already has 250 SU, a new SU cannot be connected to the
BSU. In this figure, the system is designed as follows:
The central building B is equipped with a BSU, connected to either an omni-directional, or a wide angle
antenna.
The two other buildings A and C are both equipped with an SU connected to a directional antenna.
Chapter 1. Overview
POWER-OVER-ETHERNET
The unit is equipped with an Active Ethernet module. Using Power-over-Ethernet (PoE), you can provide
electricity and wired connectivity to the unit over a single Category 5 cable. If you use Active Ethernet, there is no
difference in operation; the only difference is the power source.
The Active Ethernet integrated module provides 48 VDC over a standard Cat5 Ethernet cable.
Maximum power supplied to the 5054 is 11 Watts. The units typically draw less than 7.5 Watts.
You must have an Active Ethernet hub (also known as a power injector) connected to the network to use
Active Ethernet. The Active Ethernet hub is not a repeater and does not amplify the Ethernet data signal.
If connected to an Active Ethernet hub and an AC power supply simultaneously, the radio draws power
from Active Ethernet.
The cable length between the Active Ethernet hub and the radio should not exceed 100 meters
(approximately 325 feet).
Note:
Cable length affects range by inserting loss in the signal path between the radio and the antenna. The
amount of loss depends on the type and length of cable and type of connectors. Proxim offers
standard low loss cables in the following lengths with RTNC connectors, the connector type on the
Stratum MP: 5 feet (0.6 dB loss), 10 feet (0.9 dB loss), 20 feet (1.5 dB loss), and 50 feet (3.5 dB loss).
Custom cables can address longer cable runs.
If you want to connect the 5054 to an outdoor antenna system, consult the appropriate
manufacturers documentation for additional regulatory information, safety instructions,
and installation requirements.
The location must allow easy disconnection of the unit from the power outlet if necessary.
The unit must not be covered and the air must be able to flow freely around the unit.
The unit must be kept away from vibration, excessive heat, and humidity, and kept free from dust buildup.
The installation must conform to local regulations at all times.
Notes:
The Configure System window provides a selectable Country field that automatically provides the
allowed bandwidth and frequencies for the selected country as well as, where applicable, Dynamic
Frequency Selection (DFS) and Transmit Power Control (TPC).
Non-US installers should not add an antenna system until the Country is selected, the unit is rebooted,
and the proper power level is configured. The output power level of the final channel selected by DFS
scan can be found in the Event Log (see View the Event Log Contents on page 36).
Chapter 1. Overview
Chapter 2. Installation
This chapter describes the steps required to install and mount the 5054, including installing, mounting, and
aligning the radio. The installation procedure does not include the mounting and connection of antennas. See
the Tsunami MP.11 Antenna Installation Guide for this information.
If you are already familiar with this type of product, you can use the Quick Install Guide for streamlined installation
procedures.
IMPORTANT!
Before installing this product, see the important regulatory compliance and safety information on page 1.
The 5054 supports two power methodsan AC power outlet and Active Ethernet. The power supply accepts an
input AC voltage in the range of 100-240 VAC.
The following installation procedure provides instructions for attaching both the power and Ethernet connectors.
In situations without an external antenna (for example, during a desk tryout), the antenna cable is not required.
WARNING!
For your own safety, use only the power cord supplied with the unit. The metal case of the unit must be
grounded through the ground connection that is provided on the metal case. The antenna grounding, the
surge arrestor, and the 5054 unit housing must be bonded together and grounded in one location to avoid
ground current loops.
INSTALLATION PROCEDURE
To install the 5054:
1. Unpack the unit and accessories from the shipping box. The 5054 kit contains the following items:
Shown in picture:
1
2
3
4
5
Note:
All software CDs that come with your Tsunami products include a Release Notes file. This file
contains information about the software version and drivers. You are advised to print and read the
Release Notes file prior to installing your Tsunami products, as it may contain additional information
that was not available when this document was printed.
Chapter 2. Installation
The shipment also includes the Tsunami 5054 Quick Install Guide.
2. If you intend to install the unit free-standing, or if you intend to mount it to the ceiling, use a Phillips
screwdriver to attach the metal base to the underside of the unit. The metal base and screws are provided
(see Mounting the Unit on page 12 for more information).
3. Unlock the units cable cover. To release the cable cover, press down on the cable cover lock located in the
front center of the unit.
5. Remove the front cover from the unit (the side with the LED indicators, shown in the figure on left); then
remove the back cover (figure on right).
Chapter 2. Installation
10
6. Connect the grounding wire to the 5054 using the Faston plug on the metal case, next to the power plug.
7. Connect one end of an Ethernet cable (not supplied) to the Ethernet port. The other end of the cable should
not be connected to another device until after installation is complete.
Use a straight-through Ethernet cable if you intend to connect the 5054 to a hub, switch, patch panel,
or Active Ethernet power injector.
Use a cross-over Ethernet cable if you intend to connect the 5054 to a single computer.
8. If you are not using Active Ethernet, or you want to connect the 5054 to Active Ethernet and AC power
simultaneously, attach the AC power cable to the units power port.
To disconnect the power cable, slide back the black plastic fitting around the connector and gently pull the
connector from the 5054 unit.
9. Connect the free end of the Ethernet cable to a hub, switch, patch panel, Active Ethernet power injector, or an
Ethernet port on a computer.
10. If using AC power, connect the power cord to a power source (such as a wall outlet) to turn on the unit.
11. Place the unit in the final installation location (see Mounting the 5054 on page 12 for details).
12. Replace the back cover, front cover, and cable cover. Be careful to avoid trapping the antenna, power, and
Ethernet cables when replacing the cable cover.
Chapter 2. Installation
11
Desktop Mount
Wall Mount
Ceiling Mount
Desktop Mounting
This procedure consists of attaching the metal base to the 5054 unit. See Installation Procedure on page 9.
Wall Mounting
Follow these steps to mount the unit on a wall:
1. Identify the location at which you intend to mount the unit.
2. If the units power supply is plugged in, unplug it,
3. Use a Phillips screwdriver to remove the metal base from the underside of the 5054 unit (if you have not
already done so).
4. Press down on the cable cover lock to release the cable cover .
Chapter 2. Installation
12
7. Place the back cover on the mounting location and mark the center of the three mounting holes.
8. Remove the cover from the wall and drill a hole at each of the locations you marked. Each hole should be
wide enough to hold a mounting plug (6 mm x 35 mm).
9. Insert a plug into each hole.
(Four 6 mm x 35 mm plugs are provided; you need to use only three of these for wall mounting.)
10. Insert a screw into each of the mounting holes molded into the back cover.
(Four 3.5 mm x 40 mm pan-head screws are provided; you need to use only three of these for wall mounting.)
11. Insert the screws into the wall plugs; use a screwdriver to tighten the screws and attach the back cover to the
wall.
12. Attach Ethernet and power cables to the 5054 unit, as necessary.
13. Snap the unit into the back cover, replace the front cover, and replace the cable cover.
14. Turn on the 5054 (see Powering On the Unit on page 14).
Chapter 2. Installation
13
Ceiling Mounting
Follow these steps to mount the 5054 to a ceiling:
1. If the 5054s power supply is plugged in, unplug it.
2. Use a Phillips screwdriver to attach the metal base to the underside of the 5054, if you have not already done
so. See Installation Procedure on page 9 for an illustration.
3. Feed a mounting screw through each of the four rubber feet. The 5054 comes with four 3.5 mm x 40 mm
pan-head screws.
Power
Ethernet Link
Wireless Link
The following table shows the status of the LEDs when the 5054 is operational (the fourth LED is only
used during Dynamic Frequency Selection on a BSU; flashing green indicates scanning).
Chapter 2. Installation
14
Power
OFF
GREEN
AMBER
RED
Ethernet Link
OFF
GREEN
BLINKING GREEN
AMBER
BLINKING AMBER
RED
Wireless Link
OFF
GREEN
BLINKING GREEN
Data is being sent or the wireless interface is initializing after reboot (less
than two minutes).
RED
There is a fatal error on the wireless interface.
* See Forced Reload on page 117.
Release Notes
Quick Install Guide
Installation and Management
Tsunami MP.11 Reference Manual
Tsunami MP.11 Antenna Installation
Tsunami MP.11 Recommended 5 GHz and 2.4 GHz Antennas
You can find this documentation in the Docs folder of the product CD. This documentation also is installed at
c:\Program Files\Tsunami\MP.11.
ScanTool
ScanTool lets you find the IP address of a Tsunami MP.11 5054 by referencing the MAC address in a Scan
List, and lets you assign an IP address if one has not been assigned. The tool automatically detects the units
Chapter 2. Installation
15
installed on your network, regardless of IP address, and lets you configure each units IP settings. In addition,
you can use ScanTool to download new software to a unit that does not have a valid software image installed.
See Setting the IP Address on page 18 for details. You can find ScanTool in the Xtras directory of the
product CD. It is installed at c:\Program Files\Tsunami\MP.11.
TFTP Server
The TFTP (Trivial File Transfer Protocol) server lets you transfer files across the network. You can download
configuration files, as well as image files for embedded software upgrades, and you can upload files from the
5054 for backup. See TFTP Server Setup on page 114, Download on page 110, and Upload on page 111
for more information. You can find the TFTP Server in the Xtras directory of the product CD. It is installed at
c:\Program Files\Tsunami\MP.11. Here downloading means transferring files to the 5054 and uploading
means transferring files in the opposite direction.
Chapter 2. Installation
16
When you update the software in the unit, you must also update the MIBs to the same release.
Because the parameters in the MIB may have changed, you will not otherwise have full control over
the features in the new release.
The enterprise MIB (orinoco.mib) defines the read and read/write objects you can view or configure using
SNMP. These objects correspond to most of the settings and statistics that are available with the other
management interfaces. See the enterprise MIB for more information; the MIB can be opened with any text
editor, such as Microsoft Word, Notepad, and WordPad. See Configure SNMP Parameters on page 62 for
setup procedures.
Connecting to the 5054 requires a direct physical connection with an Ethernet cross-over cable, a serial RS232C cable, or a connection through the network.
For the serial connection, you can use only the CLI to configure and manage the 5054. The other
connections allow the use of the Web Interface, SNMP, and the CLI. These other connections require the IP
address of the 5054 before you can use the Web Interface, SNMP, or the CLI. See IP Address on page 18
for more information.
17
You can also manage the 5054 without an IP address by accessing the unit through the serial port with a
terminal program such as HyperTerminal (see HyperTerminal Connection Properties in the Tsunami MP.11
Reference Manual).
IP ADDRESS
Because each network is different, an IP address suitable for your network must be assigned to the unit. You
must know this IP address to configure and manage the unit through its Web Interface, SNMP, or the CLI. You
can manage other basic parameters as well. ScanTool is included on the documentation and software CD to
assist you in finding and changing the units IP address.
The unit can use either a static or dynamic IP address. The unit either obtains its IP address automatically
through DHCP (dynamic IP address) or it must be set manually (static IP address).
With ScanTool (a software utility that is included on the product installation CD), you can find out the current IP
address of the unit and, if necessary, change it so that is appropriate for your network. The units are shipped with
the static IP address 10.0.0.1 configured.
ScanTool lets you find the IP address of a Tsunami MP.11 5054 by referencing the MAC address in a Scan List,
or to assign an IP address if the correct one has not been assigned. The tool automatically detects the units
installed on your network segment, regardless of IP address, and lets you configure each units IP settings. In
addition, you can use ScanTool to download new software to a unit that does not have a valid software image
installed.
2. Select the unit for which you want to set the IP address and click Change. The Change dialog window is
displayed, as shown in the following window.
18
3. To set the IP address manually, ensure that Static is selected as the IP Address Type and fill in the IP
Address and Subnet Mask suitable for the LAN subnet to which the unit is connected.
To set the IP address dynamically, ensure that Dynamic is selected as the IP Address Type. The unit will
request its IP address from a DHCP server on your network.
4. Enter the Read/Write Password (the default value is public) and click OK to confirm your changes. The
respective unit reboots to make the changes effective.
Note:
The number of asterisks displayed after you enter the password does not necessarily equal the
number of characters in the actual password string. This is done for added security.
If the connection is slow or you are not able to connect, use the Internet Explorer Tools option to ensure
you are not using a proxy server for the connection with your Web browser.
To access the 5054 with a Web browser, start your Web browser and enter the IP address of the unit. The Web
address should appear as http://<ip address> (for example, http://10.0.0.1). A window such as the following is
displayed.
19
Do not fill in the User Name, enter only the password and click OK. The default password is public.
The System Status window is displayed. You now have access to the units Web Interface. To find out more
about the information presented in this window, see System Status on page 35.
20
System Name by default contains the actual model number. The following screenshot is for information
only.
Non-US installers should not add an antenna system until the Country is selected, the unit is rebooted,
and the propr power level is configured. The output power level of the final channel selected by DFS
scan can be found in the Event Log (see Event Log on page 36).
The Dynamic Frequency Selection (DFS) feature is enabled automatically when you choose a country with a
regulatory domain that requires it. The Transmit Power Control (TPC) feature is always available.
Click the Configure button and the System tab; then select the appropriate country for your regulatory domain
from the Country drop-down box.
Continue configuring settings as desired; then click the Commands button and the Reboot tab to save and
activate the settings. Alternatively, if you want to save the configuration settings to the flash memory but not
activate the settings, use the save config CLI command.
21
You cannot manually select the devices operating channel; you must let the unit select the channel.
However, you can specify a particular preferred channel that you want to scan first whenever the DFS
process starts. You may also make channels unavailable by manually blacklist them and prevent those
channels to be scanned, as well as display the Channel Blacklist Table.
You cannot configure the Auto Channel Select option. Within the HTTP or CLI interface, this option always
appears enabled.
With 5054 units, Dynamic Frequency Selection (DFS) is enabled automatically based upon the country you
select. You can tell DFS is in use because the frequency selection field displays only the DFS-selected
frequency. DFS scans all available frequencies, starting with the DFS preferred channel and skipping blacklisted
channels, to select the operating frequency automatically.
A country selection with DFS enabled causes the Base Station to come up in scan mode. It scans the available
frequencies and channels to avoid radar and selects a channel with the least interference.
Note:
Scanning is performed only on the frequencies allowed in the regulatory domain of the country selected
when it is required for radar detection and avoidance.
To comply with your countrys regulations, change the DFS selection to specify your country. You can do this by
logging into the unit, clicking the Configure button and selecting the System tab. There is a drop-down box
labeled Country with all available countries from which to select. Choose your country, configure the unit as
required, and reboot for the settings to take effect.
The SU also comes up in scan mode to scan all available frequencies to find a BSU with which it can register.
Scanning may take several minutes. After establishing a wireless link, the wireless LED stops flashing and
continues to shine green.
Note:
Because DFS may need to scan for radar on multiple channels, you must allow a sufficient amount of
time for the units to start up. This is considerably longer than when the unit is not using DFS. This is
expected behavior. Startup time is within four minutes if no radar is detected, but up to one minute is
added for every selected channel that results in radar detection.
22
Radar detection is performed only by the BSU and not by the SU. When an SU is set to a country in which
DFS is used, it scans all available channels upon startup looking for a BSU that best matches its connection
criteria (such as Base Station System Name, Network Name, and Shared Secret). The SU connects to the
BSU automatically on whatever frequency the BSU has selected. Because of this procedure, it is best to set
up the BSU and have it fully operational before installing the SU, although this is not required. If a BSU
rescans because of radar interference, the SU loses its wireless link. The SU waits 30 seconds (when the
Mobility feature is enabled, the SU starts scanning for a BSU instantly rather than waiting 30 seconds); if it
finds that it could not receive the BSU in this amount of time, it rescans the available frequencies for an active
BSU.
2. Guarantee the efficient use of available frequencies by all devices in a certain area. To meet this
requirement, the BSU scans each available frequency upon startup and selects a frequency based upon the
least amount of noise and interference detected. This lets multiple devices operate in the same area with
limited interference. This procedure is done only at startup; if another non-radar device comes up on the
same frequency, the BSU does not detect this or rescan because of it. It is expected that other devices using
these frequencies also are in compliance with country regulations, so this should not happen.
This feature only lets you decrease your output power; you cannot increase your output power beyond
the maximum the radio allows for your frequency and data rate.
See Configure System Parameters on page 37 to configure Country. See Configure the Wireless Interface on
page 52 to configure Transmit Power Control.
SU REGISTRATION
The list of parameters you must configure for registration of the SU on a BSU are:
Network Name
Base Station System Name (when used; otherwise, leave blank)
Network Secret
Encryption (when used)
Frequency Channel (or Roaming, or DFS)
See Configure System Parameters on page 37 to see the description of these fields and to configure them.
Notes:
The frequency channel must be the same for the BSU and the SU in order to register the SU when
roaming is not enabled and DFS is not required.
Channel Bandwidth and Turbo mode must be the same for the BSU and SU in order to register the SU.
23
Roaming will automatically select a channel on the SU corresponding to the BSU channel. Roaming is
the procedure in which an SU terminates the session with the current BSU and starts the registration
procedure with another BSU when it finds the quality of the other BSU to be better.
Define groups
Increase security
VLAN tagged data is collected and distributed through a units Ethernet interface . The units can communicate
across a VLAN-capable switch that analyzes VLAN-tagged packet headers and directs traffic to the appropriate
ports when the units are working in their Transparent mode.
VLAN features can be managed via:
The BSUs Web interface (see Chapter 5. Using the Web Interface on page 35)
The Command Line Interface (see Command Line Interface in the Reference Manual)
SNMP (see the MIBs provided on the product CD)
For more information about VLAN configuration, see Configure VLAN Parameters on page 83.
24
Rule Name
IP ToS (Layer 3 QoS identification)
IP Protocol List containing up to 4 IP protocols
802.1p tag (layer 2 QoS identification)
Up to 4 pairs of Source IP address + Mask
Up to 4 pairs of Destination IP address + Mask
Up to 4 source TCP/UDP port ranges
Up to 4 destination TCP/UDP port ranges
Up to 4 source MAC addresses
Up to 4 destination MAC addresses
VLAN ID
Ether type (Ethernet protocol identification)
A good example is provided by the 17 predefined PIRs. Note that these rules help to identify specific traffic types:
1. All No classification fields, all traffic matches
2. Cisco VoIP UL
a. Protocol Source Port Range (16,000-32,000)
b. IP Protocol List (17 = UDP)
3. Vonage VoIP UL
a. Protocol Source Port Range (8000-8001, 10000-20000)
b. IP Protocol List (17 = UDP)
4. Cisco VoIP DL
a. Protocol Destination Port Range (16,000-32,000)
b. IP Protocol List (17 = UDP)
5. Vonage VoIP DL
a. Protocol Destination Port Range (8000-8001, 10000-20000)
b. IP Protocol List (17 = UDP)
6. TCP
a. IP Protocol List (6)
7. UDP
a. IP Protocol List (17)
Chapter 3. Management Overview
25
8. PPPoE Control
a. Ethertype (type 1, 0x8863)
9. PPPoE Data
a. Ethertype (type 1, 0x8864)
10. IP
a. Ethertype (type 1, 0x800)
11. ARP
a. Ethertype (type 1, 0x806)
12. Expedited Forwarding
a. IP TOS/DSCP (low=0x2D, high=0x2D, mask = 0x3F)
13. Streaming Video (IP/TV)
a. IP TOS/DSCP (low=0x0D, high=0x0D, mask = 0x3F)
14. 802.1p BE
a. Ethernet Priority (low=0, high=0) (this is the equivalent of the User Priority value in the TCI (Tag
Control Information) field of a VLAN tag)
15. 802.1p Voice
a. Ethernet Priority (low=6, high=6) (this is the equivalent of the User Priority value in the TCI (Tag
Control Information) field of a VLAN tag)
16. 802.1p Video
a. Ethernet Priority (low=5, high=5) (this is the equivalent of the User Priority value in the TCI (Tag
Control Information) field of a VLAN tag)
17. L2 Broadcast/Multicast
a. Ethernet Destination (dest = 0x80000000, mask = 0x80000000)
Two different VoIP rule names have been defined for each direction of traffic, Uplink (UL) and Downlink (DL),
(index numbers 2 to 5). This has been done to distinguish the proprietary nature of the Cisco VoIP implementation
as opposed to the more standard Session Initiation Protocol (SIP) signaling found, for example, in the Vonagetype VoIP service.
26
Note that traffic priority refers to the prioritization of this specific Service Flow.
The software tries to deliver the packets within the specified latency and jitter requirements, relative to the
moment of receiving the packets in the unit. For delay-sensitive traffic the jitter must be equal to or less than the
latency. A packet is buffered until an interval of time equal to the difference between Latency and Jitter (Latency
Jitter) has elapsed. The software will attempt to deliver the packet within a time window starting at (Latency
Jitter) until the maximum Latency time is reached. If the SFCs scheduling type is real-time polling (rtPS), and the
packet is not delivered by that time, it will be discarded. This can lead to loss of packets without reaching the
maximum throughput of the wireless link. For example, when the packets arrive in bursts on the Ethernet interface
and the wireless interface is momentarily maxed out, then the packets at the end of the burst may be timed out
before they can be sent.
Users are able to set up their own traffic characteristics (MIR, CIR, latency, jitter, etc.) per service flow class to
meet their unique requirements. A good example is provided by the seven predefined SFCs:
1. UL-Unlimited BE
a. Scheduling Type = Best Effort
b. Service Flow Direction = Uplink
c. Initialization State = Active
d. Maximum Sustained Data Rate = 20 Mbps
e. Traffic Priority = 0
2. DL-Unlimited BE (same as UL-Unlimited BE, except Service Flow Direction = Downlink)
3. UL-G711 20 ms VoIP rtPS
a. Schedule type = Real time Polling
b. Service Flow Direction = Uplink
c. Initialization State = Active
d. Maximum Sustained Data Rate = 88 Kbps
e. Minimum Reserved Traffic Rate = 88 Kbps
f. Maximum Latency = 20 milliseconds
g. Traffic Priority = 1
4. DL-G711 20 ms VoIP rtPS (same as UL-G711 20ms VoIP rtPS, except Service Flow Direction =
Downlink)
5. UL-G729 20 ms VoIP rtPS (same as UL-G711 20ms VoIP rtPS, except Maximum Sustained Data Rate
and Maximum Reserved Traffic Rate = 64 Kbps)
6. DL-G729 20 ms VoIP rtPS (same as UL-G729 20ms VoIP rtPS, except Service Flow Direction =
Downlink)
7. DL-2Mbps Video
a. Schedule type = Real time Polling
b. Service Flow Direction = Downlink
c. Initialization State = Active
d. Maximum Sustained Data Rate = 2 Mbps
e. Minimum Reserved Traffic Rate = 2 Mbps
f. Maximum Latency = 20 milliseconds
g. Traffic Priority = 1
Two different VoIP Service Flow classes for each direction of traffic have been defined (index numbers 3 to 6)
which follow the ITU-T standard nomenclatures: G.711 refers to a type of audio companding and encoding that
produces a 64 Kbps bitstream, suitable for all types of audio signals. G.729 is appropriate for voice and VoIP
applications, but cannot transport music or fax tones reliably. This type of companding and encoding produces a
bitstream between 6.4 and 11.8 Kbps (typically 8 Kbps) according to the quality of voice transport that is desired.
27
QoS Class
A QoS class is defined by a set of parameters that includes the PIRs and SFCs that were previously configured.
The software allows creating up to eight different QoS classes, including four predefined QoS classes. Up to four
SF classes can be associated to each QoS class, and up to eight PIRs can be associated to each SF class. For
example, a QoS class called G711 VoIP may include the following SFCs: UL-G711 20 ms VoIP rtPS and DLG711 20 ms VoIP rtPS. In turn, the SFC named UL-G711 20 ms VoIP rtPS may include the following rules:
Cisco VoIP UL and Vonage VoIP UL.
The software provides the ability to create, edit, and delete QoS classes that contain the following parameters:
A good example of this hierarchy is provided by the four predefined QoS classes:
1. Unlimited Best Effort
a. SF class: UL-Unlimited BE
PIR: All; PIR Priority: 0
b. SF class: DL-Unlimited BE
PIR: All; PIR Priority: 0
2. G711 VoIP
a. SF class: UL-G711 20 ms VoIP rtPS
PIR: Vonage VoIP UL; PIR Priority: 1
PIR: Cisco VoIP UL; PIR Priority: 1
b. SF class: DL-G711 20 ms VoIP rtPS
PIR: Vonage VoIP DL; PIR Priority: 1
PIR: Cisco VoIP DL; PIR Priority: 1
3. G729 VoIP
a. SF class: UL-G729 20 ms VoIP rtPS
PIR: Vonage VoIP UL; PIR Priority: 1
PIR: Cisco VoIP UL; PIR Priority: 1
b. SF class: DL-G729 20 ms VoIP rtPS
PIR: Vonage VoIP DL; PIR Priority: 1
PIR: Cisco VoIP DL; PIR Priority: 1
4. 2Mbps Video
a. SF class: DL-2Mbps Video
PIR: Streaming Video (IP/TV); PIR Priority: 1
28
To use the Web Interface for configuration and management, you must access the unit. With ScanTool you can
determine the units current IP address. Then enter http://<ip address> in your Web browser (for example
http://10.0.0.1). See Setting the IP Address on page 18 for details.
Note:
If you have your Security Internet Options set to High, you may not be able to access the Web interface
successfully; a high security setting disables JavaScript, which is required for running Proxims Web
browser interface. Adding the radios IP address as a Trusted site should fix this problem.
The Web Interface consists of Web page buttons and tabs. A tab can also contain sub-tabs. The following figure
shows the convention used to guide you to the correct tab or sub-tab.
Click Configure Interfaces Wireless
The Web Interface also provides online help, which is stored on your computer (see Installing Documentation
and Software on page 15 for details).
29
Note:
Saving of the units configuration occurs only during a controlled reboot or by specifically issuing the CLI
Save command. If you make changes to settings without a controlled reboot (command) and you have
not issued the Save command, a power outage would wipe out all changes since the last reboot.
For example, entering static routes takes effect immediately; however, the routes are not saved until the
unit has gone through a controlled reboot. Proxim strongly recommends saving your settings immediately
when you finish making changes.
Rebooting
When you reboot, the changes you have made become effective and the 5054 is restarted. The changes are
saved automatically in non-volatile memory before the actual reboot takes place.
To reboot, click the Commands button, then the Reboot tab. Click the Reboot button. The 5054 restarts the
embedded software. During reboot, you are redirected to a page showing a countdown timer, and you are
redirected to the Status page after the timer counts down to 0 (zero). The CLI is disconnected during reboot.
This means that a new telnet session must be started.
Resetting Hardware
If the unit does not respond for some reason and you are not able to reboot, you can restart by means of a
hardware reset. This restarts the hardware and embedded software. The last saved configuration is used. Any
changes that you have made since then are lost.
To reset the hardware, press and release the RESET button on the 5054 unit with, for example, a pencil.
30
31
MONITORING SETTINGS
The unit offers various facilities to monitor its operation and interfaces. Only the most significant monitoring
categories are mentioned here.
Wireless
To monitor the wireless interfaces, click the Monitor button and the Wireless tab. This tab lets you monitor
the general performance of the radio and the performance of the WORP Base or WORP Satellite interfaces.
Interfaces
To monitor transmission details, click the Monitor button and the Interfaces tab. The Interfaces tab provides
detailed information about the MAC-layer performance of the wireless network and Ethernet interfaces.
Per Station
Click the Monitor button and the Per Station tab to view Station Statistics. On the SU, the Per Station
page shows statistics of the BSU to which the SU is registered. On the BSU, it shows statistics of all the SUs
connected to the BSU. The pages statistics refresh every 4 seconds.
SECURITY SETTINGS
To prevent misuse, the 5054 provides wireless data encryption and password-protected access. Be sure to set
the encryption parameters and change the default passwords.
In addition to Wired Equivalent Privacy (WEP), the units support Advanced Encryption Standard (AES) 128-bit
encryption. Two types of the AES encryption are available. Previous releases supported only the AEC-OCB; the
AES CCM protocol is now also supported.
Proxim highly recommends you change the Network Name, Encryption Key, and Shared Secret as soon as
possible. To do so, click the Configure button and the Interfaces tab; then click the Wireless sub-tab. The
encryption key is set using the Security tab. For systems that will use roaming features, the Network Name,
Encryption Key, and the Shared Secret should each be the same for all SUs that are allowed to roam as well as
for all BSUs to which these SUs are allowed to roam.
Encryption
You can protect the wireless data link by using encryption. Encryption keys can be 5 (64-bit), 13 (WEP 128-bit),
or 16 (AES 128-bit) characters in length. Both ends of the wireless data link must use the same parameter
values.
To set the encryption parameters, click the Configure button, the Security tab, and the Encryption sub-tab. See
Configure Encryption on page 69.
Passwords
Access to the units are protected with passwords. The default password is public. For better security it is
recommended to change the default passwords to a value (6-32 characters) known only to you.
To change the units HTTP, Telnet, or SNMP passwords, click the Configure button, the Management tab, and
the Password sub-tab. See Configure Passwords on page 65.
32
DEFAULT SETTINGS
FEATURE
5054 Setting
System Name
Mode of Operation
Bridge
Routing
Disabled
Static
IP Address
10.0.0.1
Subnet Mask
255.255.255.0
10.0.0.1
Default TTL
64
RIPv2
Wireless Router
Network Name
OR_WORP
Frequency Channel
0 dB
Data Rate
36 Mbps
Registration Timeout
Network Secret
Public
Turbo Mode
Disabled
Channel Bandwidth
36032
36032
Ethernet Configuration
Auto-Speed Auto-Duplex
9600
Enabled
Enabled
Enabled
HTTP Port
80
Telnet Port
23
30
900
Password
public
250
MAC Authentication
Disabled
Radius Authentication
Disabled
Encryption
Disabled
Disabled / No Entries
Disabled
100 ms
33
FEATURE
5054 Setting
Multi-Frame Bursting
Enabled
Storm Threshold
Broadcast/Multicast Unlimited
Disabled
Roaming
Disabled
NAT
Disabled
Intra-Cell Blocking
Disabled
Antenna Alignment
Disabled
Country Selection
US-only device US
World device GB
DHCP Server
Disabled
DHCP Relay
Disabled
Disabled
Antenna Gain
VLAN Mode
Access VLAN ID
Management VLAN ID
BSU: -1;
SU: -1
BSU: 0;
SU: 0
34
Help and Exit buttons also appear; click the Help button to access online help; click the Exit button to exit the
application.
For an introduction to the basics of management, see Chapter 4. Basic Management on page 29.
SYSTEM STATUS
When you click the Status button, System Status is displayed automatically. The other tab under Status is the
Event Log tab.
System Status
The basic system status is shown in this section, including the version number of the embedded software.
Systems Traps
The status of system traps is shown in this section. System traps occur when the 5054 encounters
irregularities. Deleting system traps has no effect on the operation of the 5054. System traps also are sent to
an SNMP manager station (if so configured). See Alarm Traps in the Tsunami MP.11 Reference Manual for
a list and description of the traps.
35
See Event Log Error Messages in the Tsunami MP.11 Reference Manual for an explanation of messages that
can appear in the Event Log.
36
In this window, you can view or change the basic system information. Mode of Operation sets the unit as bridge
(layer 2) or as router (layer 3). See Bridge and Routing Modes on page 39 for more information.
37
Field Descriptions
You can enter the following details:
System Name
This is the system name for easy identification of the BSU or SU. The System Name field is limited to a
length of 32 bytes. Use the system name of a BSU to configure the Base Station System Name parameter
on an SU if you want the SU to register only with this BSU. If the Base Station System Name is left blank
on the SU, it can register with any Base Station that has a matching Network Name and Network Secret.
Country
The Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC) features are enabled
automatically when you choose a country with a regulatory domain that requires them. The Country
selection pre-selects and displays only the allowed frequencies for the selected country.
Click the Configure button, the Interfaces tab, and the Wireless sub-tab to see the channel/frequency list for
the selected Country.
Note:
Units sold in the United States are pre-configured to scan and display only the outdoor frequencies
permitted by the FCC. No other Country selections, channels, or frequencies can be configured.
Units sold outside of the United States and Canada support the selection of a Country by the
professional installer. If you change the Country, a reboot of the unit is necessary for the upgrade to
take place.
Support for the 5.25 5.35 GHz and 5.725 5.825 GHz frequency bands is provided with a single country
selection, UNITED STATES (US), which does not provide DFS capability in these frequency bands.
For a non US-only device, the default country selected is United Kingdom (GB).
Notes: (1) The channel center frequencies are not regulated; only the band edge frequencies are
regulated.
(2) If, before upgrade, US was selected as a country for a non US-Only device (which is an
incorrect configuration), the country is changed automatically to United Kingdom upon upgrade.
See Appendix A. Country Code/Channels Tables on page 129 for a list of country codes.
Location
This field can be used to describe the location of the unit, for example Main Lobby.
Contact Name, Contact Email, and Contact Phone
In these fields, you can enter the details of the person to contact.
Mode of Operation
This field lets you choose one of two operating modes: Bridge mode or Routing mode.
The static fields on this window are described as follows:
ObjectID
This field shows the OID of the product name in the MIB.
Ethernet MAC Address
The MAC address of the Ethernet interface of the device.
Descriptor
Shows the product name and firmware build version.
Up Time
The length of time the device has been up and running since the last reboot.
38
Bridge Mode
A bridge is a product that connects a local area network (LAN) to another local area network that uses the same
protocol (for example, Ethernet). You can envision a bridge as being a device that decides whether a message
from you to someone else is going to the local area network in your building or to someone on the local area
network in the building across the street. A bridge examines each message on a LAN, passing those known to be
within the same LAN, and forwarding those known to be on the other interconnected LAN (or LANs).
In bridging networks, computer or node addresses have no specific relationship to location. For this reason,
messages are sent out to every address on the network and accepted only by the intended destination node.
Bridges learn which addresses are on which network and develop a learning table so that subsequent messages
can be forwarded to the correct network.
Bridging networks are generally always interconnected LANs since broadcasting every message to all possible
destination would flood a larger network with unnecessary traffic. For this reason, router networks such as the
Internet use a scheme that assigns addresses to nodes so that a message or packet can be forwarded only in
one general direction rather than forwarded in all directions.
A bridge works at the data-link (physical) layer of a network, copying a data packet from one network to the next
network along the communications path.
The default Bridging Mode is Transparent Bridging.
This mode works if you do not use source routing in your network. If your network is configured to use source
routing, then you should use either Multi-Ring SRTB or Single-Ring SRTB mode.
In Multi-Ring SRTB mode, each unit must be configured with the Bridge number, Radio Ring number, and Token
Ring number. The Radio Ring number is unique for each Token Ring Access Point and the Bridge number is
unique for each Token Ring Access Point on the same Token Ring segment.
Alternatively, you may use the Single-Ring SRTB mode. In this mode, only the Token Ring number is required for
configuration.
Routing Mode
Routing mode can be used by customers seeking to segment their outdoor wireless network using routers instead
of keeping a transparent or bridged network. By default the unit is configured as a bridge device, which means
traffic between different outdoor locations can be seen from any point on the network.
By switching to routing mode, your network now is segmented by a layer 3 (IP) device. By using Routing mode,
each network behind the BSU and SUs can be considered a separate network with access to each controlled
through routing tables.
The use of a router on your network also blocks the retransmission of broadcast and multicast packets on your
networks, which can help to improve the performance on your outdoor network in larger installations.
The use of Routing mode requires more attention to the configuration of the unit and thorough planning of the
network topology of your outdoor network. The unit can use Routing mode in any combination of BSU and SUs.
For example, you may have the BSU in Routing mode and the SU in Bridge mode, or vice versa.
When using Routing mode, pay close attention to the configuration of the default gateway both on your unit and
on your PCs and servers. The default gateway controls where packets with unknown destinations (Internet)
should be sent. Be sure that each device is configured with the correct default gateway for the next hop router.
Usually this is the next router on the way to your connection to the Internet. You can configure routes to other
networks on your Intranet through the addition of static routes in your routers routing table.
Chapter 5. Using the Web Interface
39
Enabling RIP makes the 5054 easier to manage for a Service Provider that uses RIP to dynamically manage
routes. RIP is no longer very common for Service Providers or Enterprise customers and an implementation
of a more popular routing protocol like OSPF would be desirable.
Routing mode saves bandwidth by not transporting non-IP protocols users might have enabled, like NetBEUI
or IPX/SPX, which eliminates the transmission of broadcasts and multicasts.
The MAC header is:
Destination MAC 6 bytes
Source MAC 6 bytes
Ethernet Type 2 bytes
If the average packet size is 1000 bytes, the overhead saved is 1.5%; With a frame size of 64 bytes, the
overhead saved is 20%; and for frame sizes of 128 bytes, the saving is 10%. Network researches claim that most
network traffic consists of frames smaller than 100 bytes.
In order to support routers behind the SUs with multiple subnets and prevent routing loops, you want individual
routes (and more then one) per SU.
Routing Mode Examples
In the first example, both the BSU and the SUs are configured for Routing mode. This example is appropriate for
businesses connecting remote offices that have different networks.
In example 2, the BSU is in Routing mode and the SUs are in Bridge mode. Notice the PCs behind the SUs must
configure their default gateways to point to the BSU, not the SU.
40
Notes:
One of the most important details to pay attention to in Routing mode are the units and the PCs default
gateways. It is a common mistake to set up the PCs gateway to point to the SU when the SU is in Bridge
mode and the BSU is in Routing mode. Always check to make sure the PCs on your network are configured
to send their IP traffic to the correct default gateway.
Be sure to reboot the unit to permanently save static routes. New routes take effect immediately without a
reboot, but are not permanently saved with your configuration until you do reboot the device. An unexpected
power outage could cause static routes you entered to disappear when the unit reboots if they have not
been saved. You also should save a copy of your units configuration file in case the unit must be reloaded.
This saves you from being required to re-enter numerous static routes in a large network.
41
If the device is configured in Bridge mode, you can set the IP Address Assignment Type parameter:
Select Dynamic to have the device run in DHCP client mode, which gets an IP address automatically from a
DHCP server over the network.
If you do not have a DHCP server or if you want to manually configure the IP settings, set this parameter to
Static.
When the 5054 is in Bridge mode, only one IP address is required. This IP address also can be changed with
ScanTool (see Setting the IP Address on page 18). In Routing mode, both Ethernet and Wireless interfaces
require an IP address.
You can set the following remaining parameters only when the IP Address Assignment Type is set to Static.
IP Address
The units static IP address (default IP address is 10.0.0.1).
Subnet Mask
The mask of the subnet to which the 5054 is connected (the default subnet mask is 255.255.255.0).
Default Router IP Address
The IP address of the default gateway.
Default TTL
The default time-to-live value.
42
Click Edit Table Entries to make changes; enter your changes and click OK.
43
Click the Add button to add entries; a window such as the following is displayed:
44
Enter the route information and click Add. The IP Address and Subnet Mask combination is validated for a
proper combination.
Note:
When adding a new entry, the IP address of the Route Destination must be in either the Ethernet subnet
or in the wireless subnet of the unit.
Click the Edit/Delete Table Entries button to make changes to or delete existing entries.
Edit the route information and click OK. The IP address and subnet mask combination is validated for a proper
combination.
45
The normal scanning procedure starts when the average local SNR for the current BSU is less than or equal
to the slow scanning threshold and the number of retransmitted frames is greater than the slow scanning
threshold given in percentage. During the normal scanning procedure the SU scans the whole list of active
channels while maintaining the current session uninterrupted.
Fast scanning is the scanning procedure performed when the average local SNR for the current BSU is very
low (below the fast scanning threshold) and the number of retransmitted frames is greater than the fast
scanning retransmission threshold given in %, so that the current session should terminate as soon as
possible. During this procedure, the SU scans other active channels as fast as possible.
Roaming can only occur if the normal scanning or fast scanning procedure is started under the following
conditions:
1. If the roaming is started from the normal scanning procedure (after the SU scans all the active channels), the
SU selects the BSU with the best SNR value on all available channels. The SU roams to the best BSU only if
the SNR value for the current BSU is still below the slow scanning SNR threshold, and best BSU offers a
better SNR value for at least roaming threshold than the current BSU. The SU starts a new registration
procedure with the best BSU without ending the current session.
2. If the roaming is started from the fast scanning procedure, the SU selects the first BSU that offers better SNR
than the current BSU, and starts a new registration procedure with the better BSU without ending the current
session.
You must know the data rate required for the applications running and you must ensure (during network
deployment) that the ranges and RF links can support the necessary data rate. You also must set the
default DDRS rate at the capacity necessary for the application so that it connects to the next base
station at the required capacity if roaming occurs. Set the Default DDRS Data Rate to a greater value
(24, 36, 48 or 54 Mbps, for example) for applications requiring session persistence when roaming occurs.
46
Click the Configure button, the Network tab and the Roaming sub-tab to configure Roaming. The screen differs
depending on whether the unit is configured as a BSU or as an SU.
BSU Screen
Enable or disable the Roaming feature by clicking on the Enable Roaming Status check box. The default value
is disabled (clear). If you enable roaming, you may set the Announcement Period (from 25 to 100 ms, default is
100 ms).
On this screen you may also enable or disable the Multi-Frame Bursting (default value is enabled).
An SU scans all available channels for a given bandwidth during roaming. In order to reduce the number of
channels an SU has to scan and thus decrease the roaming time, a channel priority list that tells the SU what
channels to scan is implemented. Each channel in the channel priority list is specified with its corresponding
bandwidth and the priority with which it should be scanned, either Active (standard priority), Active High (high
priority), or Inactive.
An SU will scan all channels indicated as Active during roaming. However, it will scan active channels indicated
as High Priority before scanning active channels indicated as standard priority. Channels that are not going to
be used in the wireless network should be configured as Inactive so that the SU can skip over those channels
during scanning saving this way time.
A BSU broadcasts the channel priority list to all valid authenticated SUs in its sector. It re-broadcasts the channel
priority list to all SUs every time the list is updated on the BSU.
47
Click Edit Table Entries to make changes; enter your changes and click OK.
Note that an SU may roam from one BSU with a bandwidth setting to another BSU with a different bandwidth
setting. Since in this case more channels need to be scanned than with only one channel bandwidth setting, it is
important that the channel priority list mentioned above is properly used to limit scanning time.
When Scanning Across Bandwidth on the SU is enabled (see Configure Interface Settings on page 52), the
SU supports bandwidth selection of the communications channel of either 20 MHz, 10 MHz, or 5 MHz. This allows
the BSUs in the network to be set to different bandwidths while an SU can still roam from one BSU to the next,
because it will not only scan other frequencies (when the signal level or quality are lower than the threshold) but it
will also switch to other bandwidths to find a BSU that may be on another bandwidth than its current one.
During roaming, the SU will start scanning first the channels on its current bandwidth from the Active channel list
provided by the BSU in order to find a BSU to register, since that is the most likely setting for other BSUs in the
network. If the SU cannot find an acceptable roaming candidate, it will switch bandwidth and start scanning
channels on that corresponding bandwidth from the Active channel list provided by the BSU. The process is
repeated until the SU finds an appropriate BSU to register.
In the example above, an SU whose current bandwidth is 20 MHz will start scanning all active channels within the
bandwidth of 20 MHz. If it cannot find a suitable BSU, it will switch to a 10 MHz bandwidth and start scanning all
active channels within that bandwidth, in this case channel 56 first since it is configured as high priority and
channel 60 next. No channels will be scanned on the 5 MHz bandwidth since all those channels are configured as
inactive.
48
SU Screen
Enable or disable the Roaming feature in the Roaming Status drop-down box. The default value is disabled.
Note: To enable roaming, you must enable Roaming Status on both the BSU and the SU.
When enabled, the DHCP server allows allocation of IP addresses to hosts on the Ethernet side of the SU or
BSU. Specifically, the DHCP Server feature lets the SU or BSU respond to DHCP requests from Ethernet hosts
with the following information:
Host IP address
Gateway IP address
Subnet Mask
DNS Primary Server IP address
DNS Secondary Server IP address
49
Field Descriptions
DHCP Server Status
Verify that DHCP Relay Agent is disabled. After you have made at least one entry in the DHCP server IP Pool
Table, enable DHCP Server by selecting Enable from the DHCP Server Status pull-down menu.
Note:
There must be at least one entry in the DHCP server IP Pool Table to enable DHCP server. Also,
DHCP server cannot be enabled if DHCP Relay Agent is enabled.
Subnet Mask
The unit supplies this subnet mask in its DHCP response to a DHCP request from an Ethernet host. Indicates
the IP subnet mask assigned to hosts on the Ethernet side using DHCP.
Gateway IP Address
The 5054 supplies this gateway IP address in the DHCP response. Indicates the IP address of a router
assigned as the default gateway for hosts on the Ethernet side.
Primary DNS IP Address
The 5054 supplies this primary DNS IP address in the DHCP response. Indicates the IP address of the
primary DNS server that hosts on the Ethernet side uses to resolve Internet host names to IP addresses
Secondary DNS IP Address
The 5054 supplies this secondary DNS IP address in the DHCP response.
Number of IP Pool Table Entries
The number of IP pool table entries is a read-only field that indicates the total number of entries in the DHCP
server IP Pool Table. See DHCP Server IP Pool Table below.
Field Descriptions
Start IP Address
Indicates the starting IP address that is used for assigning address to hosts on the Ethernet side in the
configured subnet.
50
End IP Address
Indicates the ending IP address that is used for assigning address to hosts on the Ethernet side in the
configured subnet.
Default Lease Time
Specifies the default lease time for IP addresses in the address pool. The value is 3600-86400 seconds.
Max Lease Time
The maximum lease time for IP addresses in the address pool. The value is 3600-86400 seconds.
Comment
The comment field is a descriptive field of up to 255 characters.
51
Enter the Server IP Address and any optional comments; click Add.
52
Field Descriptions:
Interface Type
The interface type can be WORP Satellite or WORP Base.
Network Name
A Network Name is a name given to a network so that multiple networks can reuse the same frequency
without problems. An SU can only register to its base if it has the same Network Name. The Network Name
is one of the parameters that allow a Subscriber Unit to register on a Base Station. The Base Station
System Name and Frequency Channel also are parameters to guide the SU to the proper BSU on the
network, but they provide no security. Basic security is provided through encryption, as it causes none of the
messages to be sent in the clear. Further security is provided by mutual authentication of the BSU and SU
using the Network Secret. The Network Name can be 2 to 32 characters in length.
Operational Mode (not configurable)
This field indicates the operational mode of the unit 11a, 11b, or 11g depending upon the specific
Tsunami MP.11. This operational mode cannot be changed as it is based upon a license file. For the 5054,
this field shows 11a.
Dynamic Data Rate Selection (DDRS) Status
The WORP Dynamic Data Rate Selection (DDRS) lets the BSU and SUs monitor the remote average
signal-to-noise ratio (SNR) and to adjust the data rate to an optimal value (to provide best possible
throughput) according to the current communication conditions during run-time.
Each frame received in the WORP protocol reports the signal and noise level in dBm at which the sender
received the previous frame from the receiver, and provides the values to calculate the signal to noise ratio
(SNR) in dB. SNR is calculated then averaged:
53
DDRS threshold values must be configured in the BSU and SUs separately through the CLI or the
SNMP interface.
Both the BSU and the SU monitor the remote SNR. The BSU monitors and calculates the average remote
SNR for each SU that is registered. An SU monitors and calculates the average remote SNR for the BSU.
The DDRS Status is configurable only for the WORP Base Mode. For WORP Base Mode, select the DDRS
Status Enable or Disable from the drop-down box provided.
For the WORP Satellite Mode, DDRS Status is read-only parameter and its value is based upon the WORP
Base to which this SU is associated.
Transmit Power Control
By default, the 5054 lets you transmit at the maximum output power for the country or regulatory domain and
frequency selected. However, with Transmit Power Control (TPC), you can adjust the output power of the
unit to a lower level in order to reduce interference to neighboring devices or to use a higher gain antenna
without violating the maximum radiated output power allowed for your country. Also, most countries in the
ETSI regulatory domain require the transmit power to be set to a 6 dB lower value than the maximum allowed
EIRP when link quality permits. You can see your units current output power for the selected frequency in the
event log.
The event log shows the selected power for all data rates, so you must look up the proper data rate to
determine the actual power level.
Note:
This feature only lets you decrease your output power; it does not let you increase your output power
beyond the maximum allowed defaults for your frequency and country.
Select one of the following options and click OK at the bottom of the window. Your original output power is
adjusted relative to the value selected. The new setting takes effect immediately without rebooting:
TPC Selection
dB
0
-3
-6
-9
-12
-15
-18 (minimum TPC level)
Maximum TX Power
dBm
16
13
10
7
4
1
0
54
Note:
The additional sensitivity is provided with the impact of using twice as much spectrum and thus
increasing the opportunity of interference and decreased ability for system collocation. Generally,
Turbo mode is not recommended except when the extra sensitivity is absolutely required
Frequency Channel
The frequency channel indicates the band center frequency the unit uses for communicating with peers. This
frequency channel can be set in several ranges, depending upon regulatory domain. Refer to Appendix A.
Country Codes/Channels on page 129 for channelization information.
For countries in which DFS is not enabled, the Frequency Channel list displays only the channels and
frequencies allowed for the selected country.
Multicast Rate
The rate at which data is to be transferred. This drop down box is unavailable when DDRS is enabled.
The default data rate for the 5054 is 36 Mbps. The SU must never be set to a lower data rate than the BSU
because timeouts will occur at the BSU and communication will fail.
Selections for multicast rate are shown in the following table:
Date Rate
6 Mbps
9 Mbps
12 Mbps
18 Mbps
24 Mbps
36 Mbps
48 Mbps (see Note)
54 Mbps (see Note)
Note:
If you select 48 or 54 Mbps (96 or 108 in Turbo mode) DDRS is automatically turned on.
55
If the Signal-to-Noise Ratio (SNR) is not sufficient, you may need to set a lower data rate or use antennas
with higher gain to increase the margin between wanted and unwanted signals. In a point-to-multipoint
configuration, the BSU should have a density setting suitable for all of its registered SUs, especially the ones
with the lowest signal levels (longest links).
Take care when configuring a remote interface; check the available signal level first, using Remote Link Test.
Warning!
When the remote interface accidentally is set at too small a value and communication is lost, it cannot be
reconfigured remotely and a local action is required to bring the communication back. Therefore, the best place
to experiment with the level is at the unit that can be managed without going through the link; if the link is
lost, the setting can be adjusted to the correct level to bring the link back.
To set the Satellite Density, click the Configure button, then the Interfaces tab and the Wireless sub-tab.
Make your density selection from the drop-down menu. This setting requires a reboot of the unit.
Sensitivity threshold settings related to the density settings for the MP.11a are:
Satellite Density
Large
Medium
Small
Mini
Micro
-95 dBm
-86 dBm
-78 dBm
-70 dBm
-62 dBm
Defer Threshold
-62 dBm
-62 dBm
-52 dBm
-42 dBm
-36 dBm
No Multi-Frame burst support To disable Multi-Frame burst support, click Disable on the drop-down
box of the Configure, Network, Roaming sub-tab (see BSU Screen on page 53). In this case, each
active SFC is limited to send a single data message. Total throughput available to remaining best effort
traffic is around 76% of the maximum available throughput.
Multi-Frame burst support The system will enable Multi-Frame burst for all SFCs, but the maximum
number of data messages sent in a burst will be defined by the parameter Number of data messages in
a burst for each of the SFCs (see Service Flow Class (SFC) on page 26). This scenario is set by
enabling Multi-Frame burst on the drop-down box of the Configure, Network, Roaming sub-tab (see
BSU Screen Error! Bookmark not defined.) and disabling Automatic Multi-Frame Bursting (this
parameter).
The maximum number of data messages in a burst directly influences the total throughput of the system.
Typical values are:
56
100 %
97.6 %
92.9 %
76.2%
Automatic Multi-Frame burst support The system will continuously be monitoring which of the active
SFCs has the highest priority and dynamically enable Multi-Frame burst for the highest priority SFC only,
keeping all the lower priority SFCs with Multi-Frame burst disabled. If there are multiple SFCs having the
same, highest priority, all of them will have Multi-Frame burst enabled. The maximum number of data
messages sent in a burst is defined by the parameter Number of data messages in a burst and it can be
different for each SFC (see Service Flow Class (SFC) on page 26). This scenario is set by enabling
Multi-Frame burst on the drop-down box of the Configure, Network, Roaming sub-tab (see BSU
Screen Error! Bookmark not defined.) and enabling Automatic Multi-Frame Bursting (this
parameter). In this case, even the lowest priority SFC will have Multi-Frame burst dynamically enabled as
long as it is the only SFC in the system that has traffic. By default, configuring even a single high priority
SFC with automatic multi-frame bursting enabled will decrease throughput of low priority best-effort traffic
to approximately 76% of maximum available throughput, because low priority traffic will have Multi-Frame
burst disabled to optimize bandwidth for the high priority traffic.
Registration Timeout
This is the registration process time-out of an SU on a BSU. Default is 5 seconds.
Network Secret
A network secret is a secret password given to all nodes of a network. An SU can only register to a BSU if it
has the same Network Secret. The Network Secret is sent encrypted and can be used as a security option.
Input / Output Bandwidth Limit
These parameters limit the data traffic received on the wireless interface and transmitted to the wireless
interface, respectively. Selections are in steps of 64 Kbps from 64 to 108,064 Kbps.
57
Field Descriptions
All the fields that are common to both the BSU and the SU are applicable here. The SU features two additional
fields:
Base Station System Name (SU only)
The name found on the system page of the BSU to which this SU is connecting. This parameter can be used
as an added security measure, and when there are multiple BSUs in the network and you want an SU to
register with only one when it may actually have adequate signal strength for either. The System Name field
is limited to a length of 32 bytes.
If the Base Station System Name is left blank on the SU, it can register with any BSU with a matching
Network Name and Network Secret.
58
Select a DFS
preferred channel
from the channels
defined as Disable
in the Channel
Blacklist Table.
Field Descriptions
The differences between the BSU Wireless interface screen for a non-US country and the equivalent screen for
the US are:
All the other fields that appear in the US screen for the BSU are applicable. There are also these additional fields:
DFS Preferred Channel
A single DFS preferred frequency channel on the BSU is provided so that when the DFS process starts the
BSU will first try the DFS preferred channel before scanning all the other active channels in the DFS channel
list. The DFS preferred channel must be selected from those channels indicated as Disable in the DFS
59
channel blacklist list. It is not possible to select the DFS preferred channel from those channels in the DFS
channel blacklist list indicated as Enable.
Channel Blacklist Table
The DFS channel blacklist table shows all the channels in the current bandwidth and specifies the blacklist
status of each channel as one of the following:
Enable Channels that are made unavailable either for a certain period of time upon detection of a radar
signal, or permanently because the operator has configured them as blacklisted. These channels are
skipped over during DFS channel selection.
Disable Channels that are to be scanned during DFS.
60
Field Descriptions
The differences between the SU Wireless interface screen for a non-US country and the equivalent screen for the
US are:
All the other fields that appear in the US screen for the SU are applicable.
Notes:
The list of parameters to configure for registration of the SU on a Base Station are:
Network Name
Base Station System Name (when used)
Channel Frequency
Encryption (when used)
Network Secret
61
You can set the desired speed and transmission mode by clicking on Configuration. Select from these settings
for the type of Ethernet transmission:
Auto-duplex selects the best transmission mode available when both sides are set to auto-select.
RIP does not work when Network Address Translation (NAT) is enabled.
62
There is no option to turn off receiving RIP advertisements. Once the unit is in Routing mode, it receives RIP
updates when there is another RIP-enabled device advertising on your network. Although it receives and
processes these updates, it does not further propagate these updates unless configured to advertise RIP.
The ability to enable or disable default route propagation is not user configurable. Once initialized, the 5054
uses its static default route and does not advertise this route in RIP updates. If another router on your
network is configured to advertise its default route, this route overwrites the static default route configured on
the 5054. The 5054 then also propagates the new dynamic default route throughout the network.
Be aware that, once a dynamic default route is learned, it behaves just as any other dynamic route learned
through RIP. This means if the device sending the default route stops sending RIP updates, the default route
times out and the unit has no default route to the network. Workarounds for this condition include rebooting or reentering a static default route. In general, the best approach is to disable the propagation of default routes on the
other routers in your network unless you understand the risks.
The following table describes the properties and features of each version of RIP supported.
Properties and Features of Supported RIP Versions
RIPv1
RIPv2
RIPv1 Compatible
Broadcast
Multicast
Broadcast
No Authentication
Authentication
Authentication
Class routing
Distance-vector protocol
Distance-vector protocol
Distance-vector protocol
Metric-Hops
Metric-Hops
Metric-Hops
Maximum Distance 15
Maximum Distance 15
Maximum Distance 15
IGP
IGP
IGP
63
RIP Example
In the following example, assume that both the BSU and the SUs all are configured in Routing mode with RIP
enabled to send and receive on both the Ethernet and Wireless interfaces. The network converges through
updates until each unit has the following routing table:
BSU
0.0.0.0
172.16.0.0
10.0.0.0
100.0.0.0
200.0.0.0
172.16.0.1
172.16.0.20
10.0.0.1
10.0.0.2
10.0.0.3
metric
metric
metric
metric
metric
1
1
1
2
2
10.0.0.1
10.0.0.2
100.0.0.1
10.0.0.1
10.0.0.2
metric
metric
metric
metric
metric
1
1
1
2
2
10.0.0.1
10.0.0.3
200.0.0.1
10.0.0.1
10.0.0.2
metric
metric
metric
metric
metric
1
1
1
2
2
SU1
0.0.0.0
10.0.0.0
100.0.0.0
172.16.0.0
200.0.0.0
SU2
0.0.0.0
10.0.0.0
200.0.0.0
172.16.0.0
100.0.0.0
64
RIP Notes
Ensure that routers on the same physical network are configured to use the same version of RIP.
Routing updates occur every 30 seconds. It may take up to 3 minutes for a route that has gone down to
timeout in a routing table.
Configure Passwords
The Password tab lets you configure the SNMP, Telnet, and HTTP (Web Interface) passwords.
Field Descriptions
For all password fields, the passwords must be between 6 and 32 characters.. Changes take effect immediately
after you click OK.
SNMP Read Community Password
The password for read access to the 5054 using SNMP. Enter a password in both the Password field and the
Confirm field. The default password is public.
SNMP Read/Write Community Password
The password for read and write access to the 5054 using SNMP. Enter a password in both the Password
field and the Confirm field. The default password is public.
Telnet (CLI) Password
The password for the CLI interface (via serial or Telnet). Enter a password in both the Password field and the
Confirm field. The default password is public.
65
66
To use HyperTerminal for CLI access, make sure to check Send line ends with line feeds in the ASCII
Setup window (click Properties from the HyperTerminal window; select Setup, then ASCII Setup. See
HyperTerminal Connection Properties in the Tsunami MP.11 Reference Manual for more information).
67
This feature is supported on the wireless interface and only wireless MAC addresses should be entered in the list.
For example, build a list of wireless MAC addresses on the BSU for the authorized SUs.
To add table entries, click the Add Table Entries button; a window such as the following is displayed:
Enter the MAC address and any comment, then click Add. The maximum number of MAC addresses that can be
entered is 250.
To edit or delete table entries, click the Edit/Delete Table Entries button; make your corrections in the window
displayed and click OK.
68
In large networks with multiple 5054 devices, you can maintain a list of MAC addresses on a centralized location
using a RADIUS authentication server that grants or denies access. If you use this kind of authentication, you
must specify at least the primary RADIUS server. The backup RADIUS server is optional.
69
The Filtering feature can selectively filter specific packets based upon their Ethernet protocol type. Protocol
filtering is done at the Bridge layer.
Protocol filters are useful for preventing bridging of selected protocol traffic from one segment of a network to
other segments (or subnets). You can use this feature both to increase the amount of bandwidth available on
your network and to increase network security.
70
71
If set to Passthru, only the enabled Ethernet Protocols listed in the Filter Table pass through the
bridge.
If set to Block, the bridge blocks enabled Ethernet Protocols listed in the Filter Table.
5. Configure the Ethernet Protocol Filter Table. This table is pre-populated with existing Ethernet Protocol
Filters, however, you may enter additional filters by specifying the appropriate parameters.
To add an entry, click Add, and then specify the Protocol Number and a Protocol Name.
Protocol Number: Enter the protocol number. See http://www.iana.org/assignments/ethernetnumbers for a list of protocol numbers.
To edit or delete an entry, click Edit and change the information, or select Enable, Disable, or Delete
from the Status drop-down menu.
An entrys status must be enabled in order for the protocol to be subject to the filter.
An entrys status must be enabled in order for the protocol to be subject to the filter.
72
To edit or delete table entries, click Edit/Delete Table Entries, make your changes or deletions, and click OK.
The device on the wireless interface can be any device connected through the link, it can be directly
connected to the Ethernet interface of the peer unit, or it can be attached through multiple hops. The only
thing important is the MAC address in the packets arriving at the wireless interface.
The filter is an advanced feature that lets you limit the data traffic between two specific devices (or between
groups of devices based upon MAC addresses) through the wireless interface of the 5054. For example, if you
have a server on your network with which you do not want wireless clients to communicate, you can set up a
static MAC filter to block traffic between these devices. The Static MAC Filter Table performs bi-directional
filtering. However, note that this is an advanced filter and it may be easier to control wireless traffic through other
filter options, such as Protocol Filtering.
73
Click the Configure button, the Filtering tab, and the Static MAC sub-tab to access the Static MAC Address
filter.
Each MAC address or mask is comprised of 12 hexadecimal digits (0-9 and A-F) that correspond to a 48-bit
identifier. (Each hexadecimal digit represents 4 bits (0 or 1).
Taken together, a MAC address/mask pair specifies an address or a range of MAC addresses that the unit looks
for when examining packets. The unit uses Boolean logic to perform an and operation between the MAC
address and the mask at the bit level. However, for most users, you do not need to think in terms of bits. It
should be sufficient to create a filter using only the hexadecimal digits 0 and F in the mask (where 0 is any value
and F is the value specified in the MAC address). A mask of 00:00:00:00:00:00 corresponds to all MAC
addresses, and a mask of FF:FF:FF:FF:FF:FF:FF:FF applies only to the specified MAC address.
For example, if the MAC address is 00:20:A6:12:54:C3 and the mask is FF;FF;FF;00:00:00, the unit examines the
source and destination addresses of each packet looking for any MAC address starting with 00:20:A6. If the
mask is FF;FF;FF;FF;FF;FF, the unit looks only for the specific MAC address (in this case, 00:20:A6:12:54:C3).
When creating a filter, you can configure the Wired parameters only, the Wireless parameters only, or both sets of
parameters. Which parameters to configure depends upon the traffic that you want to block.
To prevent all traffic from a specific wired MAC address from being forwarded to the wireless network,
configure only the Wired MAC address and Wired mask (leave the Wireless MAC and Wireless mask set to
all zeros).
To prevent all traffic from a specific wireless MAC address from being forwarded to the wired network,
configure only the Wireless MAC and Wireless mask (leave the Wired MAC address and Wired mask set to
all zeros).
To block traffic between a specific wired MAC address and a specific wireless MAC address, configure all four
parameters.
74
After entering the data, click the Add button. The entry is enabled automatically when saved.
To edit an entry, click Edit. To disable or remove an entry, click Edit and change the Status field from Enable to
Disable or Delete.
Field Descriptions
Wired MAC Address
Enter the MAC address of the device on the Ethernet network that you want to prevent from communicating
with a device on the wireless network.
Wired Mask
Enter the appropriate bit mask to specify the range of MAC addresses to which this filter is to apply. To
specify only the single MAC address you entered in the Wired MAC Address field, enter 00:00:00:00:00:00
(all zeroes).
Wireless MAC Address
Enter the MAC address of the wireless device that you want to prevent from communicating with a device on
the wired network.
Wireless Mask
Enter the appropriate bit mask to specify the range of MAC addresses to which this filter is to apply. To
specify only the single MAC address you entered in the Wireless MAC Address field, enter 00:00:00:00:00:00
(all zeroes).
Comment
Enter related information.
Status
The Status field can show Enable, Disable, or Delete.
75
Result: When a logical AND is performed on the Wireless MAC Address and Wireless Mask, the result
corresponds to any MAC address beginning with the 00:20:2D prefix. Since Wireless Client 1 and Wireless Client
2 share the same prefix (00:02:2D), traffic between the Wired Server and Wireless Clients 1 and 2 is blocked.
Wireless Client 3 can still communicate with the Wired Server since it has a different prefix (00:20:A6).
Prevent All Wireless Devices From Communicating With a Single Wired Device
Configure the following settings to prevent all three Wireless Clients from communicating with Wired Server 1:
Result: The unit blocks all traffic between Wired Server 1 and all wireless clients.
Prevent A Wireless Device From Communicating With the Wired Network
Configure the following settings to prevent Wireless Client 3 from communicating with any device on the Ethernet:
Result: The unit blocks all traffic between Wireless Client 3 and the Ethernet network.
76
Prevent Messages Destined for a Specific Multicast Group from Being Forwarded to the Wireless LAN
If there are devices on your Ethernet network that use multicast packets to communicate and these packets are
not required by your wireless clients, you can set up a Static MAC filter to preserve wireless bandwidth. For
example, if routers on your network use a specific multicast address (such as 01:00:5E:00:32:4B) to exchange
information, you can set up a filter to prevent these multicast packets from being forwarded to the wireless
network:
Result: The unit does not forward any packets that have a destination address of 01:00:5E:00:32:4B to the
wireless network.
Storm Threshold is an advanced Bridge setup option that you can use to protect the network against data
overload by specifying:
A maximum number of frames per second as received from a single network device (identified by its MAC
address).
An absolute maximum number of messages per port.
The Storm Threshold parameters let you specify a set of thresholds for each port of the 5054, identifying
separate values for the number of broadcast messages per second and multicast messages per second.
When the number of frames for a port or identified station exceeds the maximum value per second, the 5054
ignores all subsequent messages issued by the particular network device, or ignores all messages of that type.
77
Field Descriptions
Per Address Threshold
Enter the maximum allowed number of packets per second.
Ethernet Threshold
Enter the maximum allowed number of packets per second.
Wireless Threshold
Enter the maximum allowed number of packets per second.
Click the Edit Table Entries button to display an editable window such as the following. You can configure
whether this traffic must be blocked for Ethernet to wireless, wireless to Ethernet, or both.
78
To add an entry, click the Add Table Entries button, specify the IP address and mask of the wireless stations to
which you want to grant access, and click Add. To edit or delete table entries, click the Edit/Delete Table
Entries button, make your changes, and click OK.
For example, 172.17.23.0/255.255.255.0 allows access from all wireless stations with an IP address in the
172.17.23.xxx range.
Ensure that the IP address of the management PC you use is within the first entry in the table, as this filter takes
effect immediately. Otherwise, you have locked yourself out.
When you do lock yourself out, you may try to give the PC the correct IP address; otherwise you must reset the
unit.
79
To provide better security to the subscribers by isolating the traffic from one subscriber to another in a public
space.
To block unwanted traffic between subscribers to prevent this traffic from using bandwidth.
You can form groups of SUs at the Base Station, which define the filtering criteria. All data to or from SUs
belonging to the same group are bridged. All other data from SUs that do not belong to a particular group are
automatically forwarded through the Ethernet interface of the Base Station. If an SU does not belong to any
group, the Base Station discards the data.
You can also configure a Security Gateway to block traffic between SUs connected to different BSUs. All packets
destined for SUs not connected to the same Base Station are forwarded to the Security Gateway MAC address
(configured in the Security Gateway tab).
When you change the device from Bridge to Routing mode, Intra-Cell Blocking stops working with or without a
reboot. When you change the device from Routing to Bridge mode, Intra-Cell Blocking starts working with or
without a reboot.
Field Descriptions
Intra-Cell Blocking Status
Enables or disables the Intra-Cell Blocking feature.
Group Table
Entries in this table show the Intra-Cell Blocking filter groups that have been configured. When Intra-Cell
Blocking is enabled, the Base Station Unit discards all packets coming from one SU to another SU, if both
SUs do not belong to the same filter group.
80
Enter the group name, and click Add. The group is assigned an Index and appears in the Group Table. Up to 16
groups can be configured per Base Station.
You can enable, disable or delete an existing filter group by using the Edit/Delete Table Entries button.
81
Adding Entries
Click the Add Table Entries button.
Enter the MAC address of the SU. Select Enable from the drop-down menu for the Group Index
Click Add. The MAC address is assigned to the groups. Additions to the MAC Table take effect immediately after
clicking the Add button. You can enable, disable, delete, or reassign the groups for a MAC address by using
the Edit/Delete Table Entries button. A maximum of 250 MAC addresses can be added among all filter groups.
82
Group 2
Group 3
Group 4
SU 1
SU 2
SU 6
SU 8
SU 4
SU 3
SU 1
SU 9
SU 5
SU 8
SU 3
SU 2
In this example, SU 1 belongs to two groups, Group 1 and Group 3. Therefore, packets from SU 1 destined to SU
4, SU 5, SU 6, and SU 3 are not blocked. However, SU 9 belongs to group 4 only and packets from SU 9 are
blocked unless sent to SU 8 or SU 2.
Network resources behind the BSU and SU can be assigned to logical groups.
VLAN Modes
Transparent Mode
Transparent mode applies to both the SU and the BSU. This mode is equivalent to NO VLAN support and is the
default mode. It is used when the devices behind the SU and BSU are both VLAN aware or unaware. The
SU/BSU transfers both tagged and untagged frames received on Ethernet or WORP interface. Both tagged and
untagged management frames can access the device.
Trunk Mode
Trunk mode VLAN applies to both the SU and the BSU. It is used when all devices behind the SU and BSU are
VLAN aware. The SU and BSU transfer only tagged frames received on Ethernet or WORP interface.
83
Access Mode
Access mode applies only to the SU. It is used when the devices behind the SU are VLAN unaware. Frames to
and from the Ethernet interface behind the SU map into only one VLAN segment.
Frames received on the Ethernet interface are tagged with the configured Access VLAN ID before forwarding
them to the WORP interface. Only management frames so tagged can access the device from the WORP
interface; however, untagged management frames can access the device from Ethernet Interface.
VLAN Forwarding
The VLAN Trunk mode provides a means to configure a list of VLAN IDs in a Trunk VLAN Table. The SU and
BSU only forward frames (between Ethernet and WORP interface) tagged with the VLAN IDs configured in the
Trunk VLAN Table. Up to 256 VLAN IDs can be configured for the BSU and up to 16 VLAN IDs can be
configured for the SU.
VLAN Relaying
The VLAN Trunk mode for BSU operation provides an option to enable and disable a VLAN relaying flag; when
enabled, the BSU shall relay frames between SUs on the same BSU having the same VLAN ID.
Management VLAN
The BSU and SU allow the configuration of a separate VLAN ID and priority for SNMP, ICMP, Telnet, and TFTP
management frames for device access.
The management VLAN ID and management VLAN priority apply in both Trunk and Access mode. The
management stations tag the management frames they send to the BSU or SU with the management VLAN ID
configured in the device. The BSU and SU tag all the management frames from the device with the configured
management VLAN and priority.
BSUs and SUs in Trunk mode let only management frames tagged with the configured management VLAN
ID access the device from both WORP and Ethernet interfaces.
SUs in Access mode let management frames tagged with the configured management VLAN ID access the
device from WORP interface; untagged management frames can access the device from Ethernet Interface.
84
How the BSU and SUs function in Transparent mode is described in the following table.
BSU Function Transparent Mode
SU Function
Trunk Mode
Access Mode
Trunk Mode
85
The BSU Trunk VLAN Table applies when the BSU is in Trunk mode. The VLAN ID values for the Trunk VLAN
Table range from 1 to 4095; the default value is -1. The maximum number of VLAN IDs that can be configured in
the Trunk VLAN Table for the BSU is 256. An SU in Trunk mode is assigned VLAN IDs from this table.
The following VLAN parameters must be configured for the BSU:
VLAN Mode
The BSU VLAN mode can be either Transparent mode or Trunk mode. By default, the BSU is in
Transparent mode.
Management VLAN ID
The Management VLAN ID applies when the BSU is in Trunk mode. The management VLAN ID has a
86
default value of -1 in Transparent mode and must be configured with a value in the range of 1 to 4095 to
change the BSU VLAN mode to Trunk mode.
Management VLAN Priority
The Management VLAN priority values range from 0 to 7 and the default priority is 0 (zero).
Relaying Flag
When this flag is enabled, the BSU relays frames between SUs on the same BSU.
87
Once a VLAN Management ID is configured and is equivalent to one of the VLAN User IDs on the unit,
all members of that VLAN will have management access to the unit. Be careful to restrict VLAN
membership to those with legitimate access to the unit.
SU VLAN Configuration
The HTTP Interface to configure SU VLAN parameters is shown in the following figure.
The Trunk VLAN table applies when the SU is in Trunk mode. The VLAN ID values for the Trunk VLAN Table
range from 1 to 4095; the default value is -1. A maximum of 16 VLAN IDs can be configured in the Trunk VLAN
Table for each SU. The VLAN IDs must be in the Trunk VLAN Table that corresponds to the BSU.
The following VLAN parameters must be configured for each SU associated to the BSU.
VLAN Mode
The SU VLAN mode can be either Transparent mode, Trunk mode, or Access mode.
By default, the BSU is in Transparent mode.
88
When the BSU is changed to Trunk mode from Transparent mode, all the configured SUs are
changed to Trunk mode by default.
Access VLAN ID
The Access VLAN ID applies when the SU is in Access mode.
The Access VLAN ID values range from 1 to 4095; the default value is 1.
Access VLAN Priority
The Access VLAN Priority applies when the SU is in Access Mode. The Access VLAN priority values range
from 0 to 7; the default priority is 0. For voice frames, the priority field is set to the VoIP configured value (5
according to latest IETF draft, or 6 according to IEEE 802.1D) regardless of the priority value configured.
Management VLAN ID
The management VLAN ID applies when the SU is in Trunk mode or Access mode. The management
VLAN ID values range from 1 to 4095; the default value is 1.
Management VLAN Priority
The Management VLAN Priority applies when the SU is in Trunk mode or Access mode. The management
VLAN priority values range from 0 to 7; the default priority is 0.
89
90
To view/edit the parameters of each PIR click on its Details button. You may enable, disable or delete this PIR
entry by clicking on the Status drop-down box and then clicking OK.
91
To add entries to the PIR Table, click the Add Table Entries button. Enter the Rule Name and select Enable or
Disable from the Entry Status drop-down box, then click Add to add the entry. Once the new entry shows up on
the screen, click its Details button to view/edit its parameters.
92
To add entries to the SFC Table, click the Add Table Entries button.
Field Descriptions
SF Name
Enter the name of the SF class you want to add.
SF Schd Type
This field can be set to BE (Best Effort) or RtPS (Real-Time Polling Service).
SF Direction
This field can be set to Downlink (DL: traffic from BSU to SU) or Uplink (UL: traffic from SU to BSU).
93
Enter your changes and click OK. To delete an entry, click the Status drop-down box and select Delete, then
click OK.
94
To view/edit a QoS Class click on its Details button. You may enable, disable or delete this QoS Class entry by
clicking on the Status drop-down box and then clicking OK. You may also edit an existing SFC associated to this
QoS class, or add a new SFC.
95
To edit an existing SFC associated to this QoS Class click its Details button. You may enable, disable or delete
this SFC entry by clicking on the Status drop-down box and then clicking OK. You may also delete a PIR
associated to this SFC by clicking on the Status drop-down box and then clicking OK, or add a new PIR to this
SFC.
To add more PIRs to this SFC click the Add Table Entries button.
Field Descriptions
PIR Table Reference Index
Select one of the possible PIRs that have been previously configured from the drop-down box.
PIR Priority
This priority per rule defines the order of execution of PIRs during packet identification process. The PIR
priority is a number in the range 0-63, with priority 63 being executed first, and priority 0 being executed last.
96
The PIR priority is defined within a QoS class, and can be different for the same PIR in some other QoS
class. If all PIRs within one QoS class have the same priority, the order of execution of PIR rules will be
defined by the order of definition of SFCs, and by the order of definition of PIRs in each SFC, within that QoS
class.
Entry Status
This field is always set to Enable.
Click Add to add the entry. The new entry will show up on the screen taking up the next sequential index entry.
You may delete any PIR entry by clicking on the Status drop-down box.
Back to the QoS Class screen on page 95, to add a new SFC and associate it to this QoS Class click the Add
Table Entries button.
Field Descriptions
SF Table Reference Index
Select one of the possible SFCs that have been previously configured from the drop-down box to associate to
this QoS Class.
PIR Table Reference Index
Select one of the possible PIRs that have been previously configured from the drop-down box to associate to
this SFC.
PIR Priority
This priority per rule defines the order of execution of PIRs during packet identification process. The PIR
priority is a number in the range 0-63, with priority 63 being executed first, and priority 0 being executed last.
The PIR priority is defined within a QoS class, and can be different for the same PIR in some other QoS
class. If all PIRs within one QoS class have the same priority, the order of execution of PIR rules will be
defined by the order of definition of SFCs, and by the order of definition of PIRs in each SFC, within that QoS
class.
Entry Status
This field is always set to Enable.
97
Click Add to add the entry. The new entry will show up on the screen taking up the next sequential index entry.
From this screen you may also edit an existing SFC by clicking on its Details button. This will take you to the
same QoS Class SF Class Entry Details screen on page 96.
Finally, to add a new QoS Class click the Add Table Entries button on the screen on page 95.
Field Descriptions
Class Name
Enter the name of the QoS class you want to add.
SF Table Reference Index
Select one of the possible SFCs that have been previously configured from the drop-down box to associate to
this QoS Class.
PIR Table Reference Index
Select one of the possible PIRs that have been previously configured from the drop-down box to associate to
this SFC.
PIR Priority
This priority per rule defines the order of execution of PIRs during packet identification process. The PIR
priority is a number in the range 0-63, with priority 63 being executed first, and priority 0 being executed last.
The PIR priority is defined within a QoS class, and can be different for the same PIR in some other QoS
class. If all PIRs within one QoS class have the same priority, the order of execution of PIR rules will be
defined by the order of definition of SFCs, and by the order of definition of PIRs in each SFC, within that QoS
class.
Entry Status
This field is always set to Enable.
Click Add to add the entry. The new entry will show up on the screen taking up the next sequential index entry.
From this screen you may also edit an existing QoS Class by clicking on its Details button. This will take you to
the same QoS Class Entry View/Edit screen on page 95.
98
QoS SU Configuration
Click the Configure button, the QoS tab and the QoS SU sub-tab.
This screen defines which QoS Classes will be associated to which given SUs by using their MAC addresses.
To add entries to the QoS SU Table, click the Add Table Entries button.
Field Descriptions
SU MAC Address
The MAC Address of the SU you want to associate to a specific QoS Class.
SU QOSC Index
Select one of the possible QoS Classes that have been previously configured from the drop-down box to
associate to this SU.
SU QOSC State
This field can be set to Enable, Disable, or Delete.
Click Add to add the entry. The new entry will show up on the screen taking up the next sequential index entry.
99
To make changes to QoS SU Table, click the Edit/Delete Table Entries button.
Enter your changes and click OK. To delete an entry, click the Status drop-down box and select Delete, then
click OK.
In dynamic mapping, the SU maps the private IP addresses and its transport identifiers to transport
identifiers of a single Public IP address as they originate sessions to the public network. This is used only
for outbound access.
Static mapping is used to provide inbound access. The SU maps a private IP address and its local port to
a fixed public port of the global IP address. This is used to provide inbound access to a local server for
hosts in the public network. Static port mapping allows only one server of a particular type. Up to 1000
ports (500 UDP and 500 TCP) are supported.
100
Field Descriptions
NAT Status
Enables or disables the NAT feature. NAT can be enabled only for SUs in Routing mode.
The default is disabled.
Note: Changes to NAT parameters including the NAT Static Port Mapping Table require a reboot to take effect.
NAT Static Bind Status
Enables or disables the NAT Static Bind status (static mapping) to allow public hosts to access hosts in a
private network. The default is disabled.
Public IP Address
The NAT Public IP address is the wireless interface IP address.
101
Support
Applications
ICMP
ICMP ALG
Ping
FTP
FTP ALG
File transfer
H.323
H.323 ALG
Multimedia conferencing
HTTP
Web browser
TFTP
File transfer
Telnet
Remote login
CUSeeMe
Video conferencing
IMAP
PNM
POP3
SMTP
RTSP
ICQ
Limitations
102
Support
Applications
Limitations
IRC
MSN
Messenger
Net2Phone
Voice communication
IP Multicast
Pass Through
Multicasting
Stream works
Streaming video
Quake
Games
103
The Registration Last Reason field indicates either a successful registration (a value of 1) or it indicates the
reason why the last registration failed.
Possible values for the Registration Last Reason field are as follows:
1 = None (successful registration)
2 = Maximum number of SUs reached
3 = Authentication failure
4 = Roaming
5 = No response from SU within the Registration Timeout Period
6 = Low Signal Quality
104
105
Note:
A BSU shows how many WORP SUs it can support; the SU shows how many Ethernet hosts they
support on their Ethernet port as the Max Users on Satellite parameter.
All stations displayed after Explore come up Disabled. Select a station by changing Disabled to Start and
click the Link Test button. You can change multiple stations to Start, but only the last station in the list is
displayed as the remote partner when you click the Link Test button. See the following figure:
Link Test stops when you close the Link Test page.
106
107
108
109
ISSUE COMMANDS
This section describes the commands that you can perform with the Web Interface. The following tabs are in the
Commands section: Download, Upload, Downgrade, Reboot, Reset, and Help Link.
Server IP address
Enter the TFTP Server IP address. (Double-click the TFTP server icon on your desktop and locate the IP
address assigned to the TFTP server.)
File Name
Enter the name of the file to be downloaded.
File Type
Config, image, BspBl, or license.
File Operation
Download or Download and Reboot.
110
CAUTION: Rebooting the unit causes all users currently connected to lose their connection to the
network until the 5054 has completed the restart process and resumed operation.
You can also reset the 5054 from the RESET button located on the side of the unit. Because this resets the
5054s current IP address, a new IP address must be assigned.
CAUTION: Resetting the 5054 to its factory default configuration permanently overwrites all changes
made to the unit. The 5054 reboots automatically after this command has been issued.
Chapter 5. Using the Web Interface
111
112
113
Chapter 6. Procedures
This chapter contains a set of procedures, as described in the following table:
Procedure
Description
Prepares the TFTP server for transferring files to and from the 5054. This
procedure is used by the other procedures that transfer files.
Configuration Backup
Configuration Restore
Resets the 5054 to the factory default settings through the Web or Command
Line Interface.
In some cases, it may be necessary to revert to the factory default settings (for
example, if you cannot access the 5054 or you lost the password for the Web
Interface.
Force Reload
Completely resets the 5054 and erases the embedded software. Use this
procedure only as a last resort if the 5054 does not boot and the Hard Reset to
Factory Default procedure did not help. If you perform a Forced Reload, you
must download a new image file as described in Image File Download with the
Boot Loader.
If the 5054 does not contain embedded software, or the embedded software is
corrupt, you can use this procedure to download a new image file.
If a TFTP server is not available in the network, you can perform similar file transfer operations using the
HTTP interface.
To download or upload a file, you must connect to the computer with the TFTP server through the 5054s Ethernet
port. This can be any computer in the network or a computer connected to the 5054 with a cross-over Ethernet
cable. For information about installing the TFTP server, see Installing Documentation and Software on page
15.
Ensure that the upload or download directory is correctly set, the required file is present in the directory, and the
TFTP server is running. The TFTP server must be running only during file upload and download. You can
check the connectivity between the 5054 and the TFTP server by pinging the 5054 from the computer that hosts
the TFTP server. The ping program should show replies from the 5054.
Chapter 6. Procedures
114
CONFIGURATION BACKUP
You can back up the 5054 configuration by uploading the configuration file. You can use this file to restore the
configuration or to configure another 5054 (see Configuration Restore on page 116).
To upload a configuration file through the Web Interface:
1. Set up the TFTP server as described in TFTP Server Setup on page 114.
2. Access the 5054 as described in Web Interface Overview on page 19.
3. Click the Commands button and the Upload tab.
4. Fill in the following details:
Server IP Address <IP address TFTP server>
File Name <configuration file name>
File Type Config
File Operation Upload
Chapter 6. Procedures
115
CONFIGURATION RESTORE
You can restore the configuration of the 5054 by downloading a configuration file. The configuration file contains
the configuration information of an 5054.
To download a configuration file through the Web Interface:
1. Set up the TFTP server as described in TFTP Server Setup on page 114.
2. Access the 5054 as described in Web Interface Overview on page 19.
3. Click the Commands button and the Download tab.
4. Fill in the following details:
Server IP Address <IP address TFTP server>
File Name <configuration file name>
File Type Config
File Operation Download
5. Click OK to start the file transfer.
The 5054 downloads the configuration file. The TFTP server program should show download activity after a few
seconds. When the download is complete and the system rebooted, the configuration is restored.
Chapter 6. Procedures
116
FORCED RELOAD
With Forced Reload, you reset the 5054 to the factory default settings and erase the embedded software. Use this
procedure only as last resort if the 5054 does not boot and the Reset to Factory Defaults procedure did not help.
If you perform a Forced Reload, you must download a new image file with the Boot Loader (see Image File
Download with the Boot Loader below).
Caution! The following procedure erases the embedded software of the 5054. This software image
must be reloaded through an Ethernet connection with a TFTP server. The image filename to
be downloaded can be configured with either ScanTool through the Ethernet interface or with
the Boot Loader CLI through the serial port to make the 5054 functional again.
To do a forced reload:
1. Press the RESET button on the 5054 unit; the 5054 resets and the LEDs flash.
2. Immediately press and hold the RELOAD button on the 5054 unit for about 20 seconds. Now image and
configuration are deleted from the unit.
3. Follow the procedure Image File Download with the Boot Loader to download an image file.
Chapter 6. Procedures
117
Password
TFTP Server IP Address and, if necessary, the Gateway IP Address of the TFTP server.
Chapter 6. Procedures
118
(for example COM1 or COM2, to which the MP.11 serial port is connected)
9600
8
1
None
None
3. Press the RESET button on the 5054 unit; the terminal program displays Power On Self Test (POST)
messages.
4. When the Sending Traps to SNMP manager periodically message is displayed after about 30
seconds, press the ENTER key.
5. The command prompt is displayed; enter the following commands:
set ipaddr <IP address MP.11>
set ipsubmask <subnet mask>
set ipaddrtype static
set tftpipaddr <IP address TFTP server>
set tftpfilename <image file name>
set ipgw <gateway IP address>
reboot
For example:
set ipaddr 10.0.0.12
set ipsubmask 255.255.255.0
set ipaddrtype static
set tftpipaddr 10.0.0.20
set tftpfilename image.bin
set ipgw 10.0.0.30
reboot
The 5054 reboots and downloads the image file. The TFTP server program should show download activity after a
few seconds. When the download is complete, the 5054 is ready for configuration.
To access the 5054 see Chapter 3. Management Overview on page 17. Note that the IP configuration in
normal operation differs from the IP configuration of the Boot Loader.
Chapter 6. Procedures
119
Chapter 7. Troubleshooting
This chapter helps you to isolate and solve problems with your 5054. In the event this chapter does not provide a
solution, or the solution does not solve your problem, check our support website at http://support.proxim.com/
Before you start troubleshooting, it is important that you have checked the details in the product documentation.
For details about RADIUS, TFTP, terminal and telnet programs, and Web browsers, refer to their appropriate
documentation.
In some cases, rebooting the 5054 clears the problem. If nothing else helps, consider a Soft Reset to Factory
Defaults (on page 30) or a Forced Reload (on page 117). The Forced Reload option requires you to download
a new image file to the 5054.
Ensure that the power supply is properly working and correctly connected.
Ensure that all cables are correctly connected.
Check the power source.
If you are using an Active Ethernet splitter, ensure that the voltage is correct.
For example, COM1 or COM2, to which the MP.11 serial port is connected
9600
0
1
None
None
Carriage return with line feed
4. Ensure that the 5054 and the computer use the same serial port configuration parameters.
5. Press the RESET button on the 5054 unit. The terminal program displays Power On Self Tests (POST)
messages and displays the following after approximately 90 seconds:
Please enter password:
Chapter 7. Troubleshooting
120
5. Ensure that Send line ends with line feeds is selected and click OK twice. HyperTerminal is now correctly
configured.
Power is on, the radio is up, and the Ethernet link is also up..
Power is on, the radio is coming up and the Ethernet is down.
Open a command prompt window and enter ping <ip address MP.11> (for example ping 10.0.0.1).
If the 5054 does not respond, make sure that you have the correct IP address.
If the 5054 responds, the Ethernet connection is working properly, continue with this procedure.
2.
Ensure that you are using one of the following Web browsers:
Microsoft Internet Explorer version 5.0 or later (Version 6.0 or later recommended)
Chapter 7. Troubleshooting
121
3. Ensure that you are not using a proxy server for the connection with your Web browser.
4. Ensure that you have not exceeded the maximum number of Web Interface or CLI sessions.
5. Double-check the physical network connections. Use a well-known unit to ensure the network connection is
properly functioning.
6. Perform network infrastructure troubleshooting (check switches, routers, and so on).
COMMUNICATION ISSUES
Two Units Are Unable to Communicate Wirelessly
If a wireless link is possible after testing two units within close distance of each other, then there are two possible
reasons why wireless connectivity is not possible while the MP.11 units are at their desired locations:
There may be a problem in the RF path, for example, a bad connector attachment (this is the most common
problem in installations) or a bad cable (water ingress).
Note:
The cables can be swapped with known good ones as a temporary solution to verify cable quality.
Another reason may be related to an interference problem caused by a high signal level from another radio. This
can be checked by changing the frequency and then verifying whether another channel works better or by
changing the polarization as a way of avoiding the interfering signal. To know in advance how much interference
is present in a given environment, a Spectrum Analyzer can be attached to a (temporary) antenna for measuring
the signal levels on all available Channels.
Note: The antennas are usually not the problem, unless mounted upside down causing the drain hole to be
quickly filled with radome.
If a wireless link is not possible after testing two units within close distance of each other, then the problem is
either hardware or configuration related, such as a wrong Network name, Encryption key, Network Secret or Base
Station Name. To eliminate these issues from being a factor, resetting the both units to factory defaults is the
recommended solution.
If a wireless link is not possible after resetting the units and verifying that one unit is a BSU with WORP Base
interface configured and the other is a Satellite, then the problem is not configuration related and the only
remaining reason is a possible hw problem. Acquiring a third MP.11 and then testing it amongst the existing units
will help pinpoint the broken unit.
Chapter 7. Troubleshooting
122
Microsoft Internet Explorer version 5.0 or later (Version 6.0 or later recommended)
Netscape version 6.0 or later
4. Ensure that you are not using a proxy server for the connection with your Web browser.
5. Ensure that you have not exceeded the maximum number of Web Interface sessions.
If the 5054 does not respond, ensure that you have the correct IP address.
If the 5054 responds, the Ethernet connection is working properly; continue with this procedure.
3. Ensure that you have not exceeded the maximum number of CLI sessions.
Chapter 7. Troubleshooting
123
If the TFTP server does not upload or download files, it could mean:
2. Verify whether the path of the help files in the Web Interface refers to the correct directory. See Help Link
on page 112.
Chapter 7. Troubleshooting
124
Ultimately, traffic can be sniffed on the Ethernet interface using third-party packages. Most problems can be
avoided by ensuring that 802.1Q compliant VLAN tags containing the proper VLAN ID have been inserted in the
bridged frames. The VLAN ID in the header should correspond to the assigned VLAN.
All sessions are disconnected, traffic is lost, and a manual override is necessary.
Workaround: You can configure the switch to mimic the nonexistent host.
Hardware
Configuration
Path issues (such as distance, cable loss, obstacles)
Environment (anything that is outside the equipment and not part of the path itself)
You have tested the equipment in the office and have verified that the hardware and configurations are sound.
The path calculation has been reviewed, and the path has been double-checked for obstacles and canceling
reflections. Still, the user reports that the link does not work.
Most likely, the problem reported is caused by the environment or by improper tests to verify the connection. This
article assumes that the test method, cabling, antennas, and antenna alignment have been checked. Always do
this before checking the environment.
General Check
Two general checks are recommended before taking any action:
Check whether the software version at both sides is the most current
Chapter 7. Troubleshooting
125
Statistics Check
Interference and other negative environment factors always have an impact on the number of correctly received
frames. The Tsunami MP.11 models give detailed information about transmission errors in the Web interface,
under Monitor.
The windows that are important for validating the health of the link are
Monitor / Wireless / General (Lowest level of the wireless network)
Check FCS errors: Rising FCS errors indicate interference or low fade margin. So does Failed count. If
only one of those is high, this indicates that a source of interference is significant near one end of the link/
Monitor / Interfaces / Wireless (One level higher than Wireless / General)
The information is given after the wireless Ethernet frame is converted into a normal Ethernet frame. The
parameters shown are part of the so-called MIB-II.
Both operational and admin status should be up. An admin status of down indicates that the interface is
configured to be down.
In Discards and Out Discards indicate overload of the buffers, likely caused by network traffic, which is too
heavy.
In Errors and Out Errors should never happen; however, it might happen if a frames FCS was correct while
the content was still invalid.
Monitor / Wireless / WORP (Statistics on WORP)
WORP runs on top of normal Ethernet, which means that the WORP frame is in fact the data field of the
Ethernet frame. Send Failure or Send Retries must be low in comparison to Send Success. Low is about
1%. The same applies for Receive Success versus Receive Retries and Receive Failures. Note that the
Receive Failures and Retries can be inaccurate. A frame from the remote site might have been transmitted
without even being received; therefore, the count of that frame might not have been added to the statistics
and the receiver simply could not know that there was a frame.
Remote Partners indicates how many SUs are connected (in case of a BSU) or whether a Base is connected
(in case of a Subscriber).
Base Announces should increase continuously.
Registration Requests and Authentication Requests should be divisible by 3. WORP is designed in a way
that each registration sequence starts with 3 identical requests. It is not a problem if, once in a while, one of
those requests is missing. Missing requests frequently is to be avoided.
Monitor / Per Station (Information per connected remote partner)
Check that the received signal level (RSL) is the same on both sides; this should be the case if output power
is the same. Two different RSLs indicate a broken transmitter or receiver. A significant difference between
Local Noise and Remote Noise could indicate a source of interference near the site with the highest noise/.
Normally, noise is about 80 dBm at 36 Mbps. This number can vary from situation to situation, of course,
also in a healthy environment.
Chapter 7. Troubleshooting
126
Avoiding Interference
When a source of interference is identified and when the level and frequencies are known, the next step is to
avoid the interference. Some of the following actions can be tried:
Changing the channel to a frequency away from the interference is the first step in avoiding
interference. For countries that require DFS, it might be not possible to manually select a
different frequency.
Each antenna has a polarization; try to change to a polarization different from the interferer.
A small beam antenna looks only in one particular direction. Because of the higher gain of such
an antenna, lowering the output power or adding extra attenuation might be required to stay legal.
This solution cannot help when the source of interference is right behind the remote site.
Lowering the antennas can help avoid seeing interference from far away.
Move the antennas to a different location on the premises. This causes the devices to look from a different angle,
causing a different pattern in the reception of the signals. Use obstructions such as buildings, when possible, to
shield from the interference.
Conclusion
A spectrum analyzer can be a great help to identify whether interference might be causing link problems on
Tsunami MP.11 systems.
Before checking for interference, the link should be verified by testing in an isolated environment, to make sure
that hardware works and your configurations are correct. The path analysis, cabling and antennas should be
checked as well.
Statistics in the web interface under Monitor tell if there is a link, if the link is healthy, and a continuous test can be
done using the Link Test
Chapter 7. Troubleshooting
127
In this current state, your unit may not be operational, so a firmware reload will be required. Run the Forced
Reload procedure and then re-load the previous version of the Tsunami MP.11 5054 firmware.
Once operability to the Tsunami MP.11 has been restored, you can verify whether the License Key is really
missing.
Using Telnet or a serial cable, login and enter show files. If the file named LIC1.cfg is missing, the License Key
has somehow been deleted. To obtain a License Key, contact Technical Support and provide the following
information:
Product type: [MP.11a BSU] or [MP.11 RSU]
Serial number: ##CC######## (# = Number, C = Character)
Ethernet MAC: [0020a6-000001]
Wireless MAC: [00022d-000002]
Once you have received and uploaded the new License Key, re-run the upgrade.
The result of resetting a Tsunami MP.11 or MP.11a BSU to factory defaults and then recycling the power to
the BSU within 5 minutes of the factory reset. This may have happened prior to shipment or during your own
configuration. In this case, the device allows you to simply select BSU mode from the configuration page or
through Telnet/CLI. Simply manually re-configure the device to BSU.
The BSU is missing a license key. This would be exhibited by a red LED state upon first power-up, and after
loading a new image file, the BSU is permanently an SU and the user cannot select BSU mode.
In this case, contact Proxim support and have the unit serial number and wired MAC address available.
Support will be able to help you recover the device without sending the unit in for return.
These two conditions are being researched so that customers will not experience this symptom in the future.
We apologize for any inconvenience.
Note:
If a BSU, SU, or RSU is missing its license key, this device will behave as an SU, will support only eight
MAC devices from its Ethernet interface, and bandwidth throttling is forced to 64Kbits/sec.
Chapter 7. Troubleshooting
128
Frequency
Bands
DFS
Argentina (AR)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805)
56 (5280), 58 (5290),
60 (5300), 62 (5310),
64 (5320), 149 (5745),
151 (5755), 153 (5765),
155 (5775), 157 (5785),
159 (5795), 161 (5805)
Australia (AU)
No
Austria (AT)
Yes
Belgium (BE)
Yes
Belize (BZ)
No
Bolivia (BO)
No
129
Frequency
Bands
DFS
Brazil (BR)
Yes
Brazil1 (B1)
No
Brunei
Darussalam (BN)
No
Bulgaria (BG)
Yes
Canada (CA)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
China (CN)
No
130
Frequency
Bands
DFS
Colombia (CO)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
Cyprus (CY)
Yes
Denmark (DK)
Yes
Dominican
Republic (DO)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
Estonia (EE)
Yes
131
Frequency
Bands
DFS
Finland (FI)
Yes
France (FR)
Yes
Germany (DE)
Yes
Greece (GR)
Yes
Guatemala (GT)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
132
Frequency
Bands
DFS
No
Hungary (HU)
Yes
Iceland (IS)
Yes
India (IN)
No
36 (5180), 40 (5200),
44 (5220), 48 (5240),
52 (5260), 56 (5280),
60 (5300), 64 (5320),
149 (5745), 153 (5765),
157 (5785), 161 (5805)
36 (5180), 38 (5190),
40 (5200), 42 (5210),
44 (5220), 46 (5230),
48 (5240), 50 (5250),
52 (5260), 54 (5270),
56 (5280), 58 (5290),
60 (5300), 62 (5310),
64 (5320), 66 (5330),
147 (5735), 149 (5745),
151 (5755), 153 (5765),
155 (5775), 157 (5785),
159 (5795), 161 (5805),
163 (5815)
Iran (IR)
No
133
Frequency
Bands
DFS
Ireland (IE)
Yes
Yes
Italy (IT)
Yes
Japan (JP)
Yes
56 (5280), 60 (5300),
64 (5320)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330)
Japan1 (JP1)
No
36 (5180), 40 (5200),
44 (5220), 48 (5240)
36 (5180), 38 (5190),
40 (5200), 42 (5210),
44 (5220), 46 (5230),
48 (5240)
Japan2 (J2)
No
36 (5180), 40 (5200),
44 (5220), 48 (5240)
36 (5180), 38 (5190),
40 (5200), 42 (5210),
44 (5220), 46 (5230),
48 (5240)
Japan3 (JP3)
No
8 (5040), 12 (5060),
16 (5080), 34 (5170),
38 (5190), 42 (5210),
46 (5230), 184 (4920),
188 (4940), 192 (4960),
196 (4980)
134
Frequency
Bands
DFS
Japan4 (JP4)
Yes
56 (5280), 60 (5300),
64 (5320)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330)
Japan5 (JP5)
Yes
56 (5280), 60 (5300),
64 (5320)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330)
No
Korea
Republic2 (KR2)
No
Latvia (LV)
Yes
Liechtenstein (LI)
Yes
Lithuania (LT)
Yes
135
Frequency
Bands
DFS
Luxembourg (LU)
Yes
Macau (MO)
No
Malaysia (MY)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
Malta (MT)
Yes
Mexico (MX)
No
Netherlands (NL)
Yes
136
Frequency
Bands
DFS
No
No
Norway (NO)
Yes
Panama (PA)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
Philippines (PH)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
Poland (PL)
Yes
137
Frequency
Bands
DFS
Portugal (PT)
Yes
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
Russia (RU)
No
30 (5150), 34 (5170),
38 (5190), 42 (5210),
46 (5230), 50 (5250),
54 (5270), 58 (5290),
62 (5310), 66 (5330),
70 (5350), 74 (5370),
78 (5390), 82 (5410),
86 (5430), 90 (5450),
94 (5470), 98 (5490),
102 (5510), 106 (5530),
110 (5550), 114 (5570),
118 (5590), 122 (5610),
126 (5630), 130 (5650),
134 (5670), 138 (5690),
142 (5710), 146 (5730),
150 (5750), 154 (5770),
158 (5790), 162 (5810),
166 (5830), 170 (5850)
30 (5150), 32 (5160),
34 (5170), 36 (5180)
38 (5190), 40 (5200),
42 (5210), 44 (5220),
46 (5230), 48 (5240),
50 (5250), 52 (5260),
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 68 (5340),
70 (5350), 72 (5360),
74 (5370), 76 (5380),
78 (5390), 80 (5400),
82 (5410), 84 (5420),
86 (5430), 88 (5440),
90 (5450), 92 (5460),
94 (5470), 96 (5480),
98 (5490), 100 (5500),
102 (5510), 104 (5520),
106 (5530), 108 (5540),
110 (5550), 112 (5560),
114 (5570), 116 (5580),
118 (5590), 120 (5600),
122 (5610), 124 (5620),
126 (5630), 128 (5640),
130 (5650), 132 (5660),
134 (5670), 136 (5680),
138 (5690), 140 (5700),
142 (5710), 144 (5720),
146 (5730), 148 (5740),
150 (5750), 152 (5760),
154 (5770), 156 (5780),
158 (5790), 160 (5800),
162 (5810), 164 (5820),
166 (5830), 168 (5840),
170 (5850)
138
Frequency
Bands
DFS
No
36 (5180), 40 (5200),
44 (5220), 48 (5240),
52 (5260), 56 (5280),
60 (5300), 64 (5320),
149 (5745), 153 (5765),
157 (5785), 161 (5805)
36 (5180), 38 (5190),
40 (5200), 42 (5210),
44 (5220), 46 (5230),
48 (5240), 50 (5250),
52 (5260), 54 (5270),
56 (5280), 58 (5290),
60 (5300), 62 (5310),
64 (5320), 66 (5330),
147 (5735), 149 (5745),
151 (5755), 153 (5765),
155 (5775), 157 (5785),
159 (5795), 161 (5805),
163 (5815)
Singapore (SG)
No
36 (5180), 40 (5200),
44 (5220), 48 (5240),
149 (5745), 153 (5765),
157 (5785), 161 (5805),
165 (5825)
36 (5180), 38 (5190),
40 (5200), 42 (5210),
44 (5220), 46 (5230),
48 (5240), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
Yes
Slovenia (SI)
Yes
139
Frequency
Bands
DFS
Yes
Spain (ES)
Yes
Sweden (SE)
Yes
Switzerland (CH)
Yes
Taiwan (TW)
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815)
140
Frequency
Bands
DFS
No
Yes
Yes
No
56 (5280), 60 (5300),
64 (5320), 149 (5745),
153 (5765), 157 (5785),
161 (5805), 165 (5825)
54 (5270), 56 (5280),
58 (5290), 60 (5300),
62 (5310), 64 (5320),
66 (5330), 147 (5735),
149 (5745), 151 (5755),
153 (5765), 155 (5775),
157 (5785), 159 (5795),
161 (5805), 163 (5815),
165 (5825), 167 (5835)
Uruguay (UY)
No
Venezuela (VE)
No
Thailand (TH)
141
Technical Support
If you are having a problem using a Proxim WAN product and cannot resolve it with the information in the product
documentation, gather the following information and contact Proxim Technical Support at
http://support.proxim.com/:
Email Support
To receive E-mail technical support, be sure to include the serial number of the product(s) in question. The serial
number should be on the product and conform to the following format: ##UT########, or ##R7########. We are
unable to respond to your inquiry without this information.
Telephone Support
Telephone support is available M-F 8:00 AM to 6:00 PM, Pacific Time. Use the following telephone numbers:
USA and Canada: 1-866-674-6626 (Toll Free)
International:
+1-408-542-5390
http://support.proxim.com/
http://support.proxim.com/
Technical Support
142
Statement of Warranty
Warranty Coverage Proxim Wireless Corporation warrants that its Products are manufactured solely from new parts,
conform substantially to specifications, and will be free of defects in material and workmanship for a Warranty Period of 1 year
from the date of purchase.
Repair or Replacement In the event a Product fails to perform in accordance with its specification during the Warranty
Period, Proxim offers return-to-factory repair or replacement, with a thirty (30) business-day turnaround from the date of
receipt of the defective Product at a Proxim Wireless Corporation Repair Center. When Proxim has reasonably determined
that a returned Product is defective and is still under Warranty, Proxim shall, at its option, either: (a) repair the defective
Product; (b) replace the defective Product with a refurbished Product that is equivalent to the original; or (c) where repair or
replacement cannot be accomplished, refund the price paid for the defective Product. The Warranty Period for repaired or
replacement Products shall be ninety (90) days or the remainder of the original Warranty Period, whichever is longer. This
constitutes Buyers sole and exclusive remedy and Proxims sole and exclusive liability under this Warranty.
Limitations of Warranty The express warranties set forth in this Agreement will not apply to defects in a Product caused;
(i) through no fault of Proxim during shipment to or from Buyer, (ii) by the use of software other than that provided with or
installed in the Product, (iii) by the use or operation of the Product in an application or environment other than that intended or
recommended by Proxim, (iv) by modifications, alterations, or repairs made to the Product by any party other than Proxim or
Proxims authorized repair partners, (v) by the Product being subjected to unusual physical or electrical stress, or (vii) by
failure of Buyer to comply with any of the return procedures specified in this Statement of Warranty.
Support Procedures Buyer should return defective LAN Products1 within the first 30 days to the merchant from which the
Products were purchased. Buyer can contact a Proxim Customer Service Center either by telephone or via web. Calls for
support for Products that are near the end of their warranty period should be made not longer than seven (7) days after
expiration of warranty. Repair of Products that are out of warranty will be subject to a repair fee. Contact information is shown
below. Additional support information can be found at Proxims web site at http://support.proxim.com.
LAN Products 1:
Domestic calls:
1-866-674-6626
International calls: 1-408-542-5390
When contacting the Customer Service Center for support, Buyer should be prepared to provide the Product description and
serial number and a description of the problem. The serial number should be on the Product.
In the event the Customer Service Center determines that the problem can be corrected with a software update, Buyer might
be instructed to download the update from Proxims web site or, if thats not possible, the update will be sent to Buyer. In the
event the Customer Service Center instructs Buyer to return the Product to Proxim for repair or replacement, the Customer
Service Center will provide Buyer a Return Material Authorization (RMA) number and shipping instructions. Buyer must
return the defective Product to Proxim, properly packaged to prevent damage, shipping prepaid, with the RMA number
prominently displayed on the outside of the container.
Calls to the Customer Service Center for reasons other than Product failure will not be accepted unless Buyer has purchased
a Proxim Service Contract or the call is made within the first thirty (30) days of the Products invoice date. Calls that are
outside of the 30-day free support time will be charged a fee of $25.00 (US Dollars) per Support Call.
If Proxim reasonably determines that a returned Product is not defective or is not covered by the terms of this Warranty, Buyer
shall be charged a service charge and return shipping charges.
Other Information
Search Knowledgebase Proxim stores all resolved problems in a solution database: http://support.proxim.com.
Ask a Question or Open an Issue Submit a question or open an issue to Proxim technical support staff:
http://support.proxim.com/cgi-bin/proxim.cfg/php/enduser/ask.php.
Other Adapter Cards Proxim does not support internal mini-PCI devices that are built into laptop computers, even if
identified as "ORiNOCO" devices. Customers having such devices should contact the laptop vendor's technical support for
assistance. For support for a PCMCIA card carrying a brand name other than Proxim, ORiNOCO, Lucent, Wavelan, or
Skyline, Customer should contact the brand vendor's technical support for assistance.
Statement of Warranty
143