50
POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium PMP / PTP 450 PMP 430 / PTP 230 PMP / PTP 100 Series Release Notes System Release 13.4

POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

POINT TO POINT WIRELESS SOLUTIONS GROUP

Cambium

PMP / PTP 450

PMP 430 / PTP 230

PMP / PTP 100 Series

Release Notes

System Release 13.4

Page 2: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 2 of 50

1 INTRODUCTION

This document provides information for the Cambium Networks PMP/PTP 450, PMP 430,

PTP 230 and PMP/PTP 100 Series System Release 13.4.

Software updates for PMP products are available from:

https://support.cambiumnetworks.com/files

The information in this document is subject to change without notice. The

recommendations, technical data, configurations and statements in this document are

believed to be reliable and accurate, but are presented without implied or express

warranty. Users must take full responsibility for their applications of any product specified

in this document. The information in this document is proprietary to Cambium Networks

Ltd.

2 PMP VARIANTS

System Release 13.4 is compatible with PMP/PTP 450, PMP 430, PTP 230 and PMP/PTP 100

Series modules. This document covers Release Notes for all equipment. For more

information on System Release 13.4, see:

https://support.cambiumnetworks.com/files

2.1 Embedded software

PMP / PTP 450

CANOPY134BUILDOFFICIAL_MIMO_DESAES_S.pkg3

PMP 430

DES Encryption: CANOPY134BUILDOFFICIAL_OFDM_DES.pkg3

AES Encryption: CANOPY134BUILDOFFICIAL_OFDM_AES.pkg3

PTP 230

DES Encryption: CANOPY134BUILDOFFICIAL_OFDM_DES.pkg3

AES Encryption: CANOPY134BUILDOFFICIAL_OFDM_AES.pkg3

PMP / PTP 100

DES Encryption: CANOPY134BUILDOFFICIAL_DES.pkg3

AES Encryption: CANOPY134BUILDOFFICIAL_AES.pkg3

Page 3: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 3 of 50

2.2 Canopy Network Updater (CNUT) software

The latest version of CNUT should be used with 13.4. It can be found here:

http://www.cambiumnetworks.com/support/management-tools/cnut/

2.3 System Documentation

Provided with System Release 13.4 are five reference documents:

PMP / PTP 450, PMP 430, PTP 230, PMP 100 and PTP 100 Series Release Notes (This

document)

PMP 450 Planning Guide

PMP 450 Configuration and User Guide

PTP 450 User Guide

PMP 430 / PTP 230 Configuration and User Guide

PMP / PTP 100 User Guide These documents are available at https://support.cambiumnetworks.com/files

Page 4: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 4 of 50

3 NEW FEATURES The System Release 13.4 introduces the following new features:

Table 1 System Release 13.4 new features

Frequency Products

Affected

Feature Description

5.4 GHz PTP 450 Listen-Before-Talk

(LBT) 5.4 GHz for

PTP 450

Allows configuration of Listen-Before-

Talk(LBT) ETSI for 5.4 GHz.

All All Security Banner Enables the display of a security banner

and prompts user to accept security

requirements.

All APs and

SMs only

RADIUS Change of

Authorization

Allows the user to change configuration

of SM via RADIUS while SM is in session.

All All RADIUS VSA for

Zero Touch

Adds support for using RADIUS VSA for

Zero Touch configuration.

All APs and

SMs only

Microsoft RADIUS

support

PEAP is now supported as outer

authentication so that PEAP-MSCHAPv2

can be used to authenticate SM with

Microsoft RADIUS server.

3.5 /3.65

GHz

PMP/PTP

450

Custom frequency

configuration at 1

KHz raster

Allows the users to configure custom

frequency at 1 KHz raster for 3.5 and

3.65 GHz.

All PMP/PTP

450, PMP

430, PTP

230

Extrapolated Link

Test

Estimate link throughput capacity

without service interruption by sending

few packets, and extrapolating results.

All PMP/PTP

450

Frame Utilization

Statistics

Provides statistics of RF channel

utilization.

All All Last run time for

Link Capacity Test

This is an enhancement which displays

time stamp of last performed Link

Capacity Test.

All PMP

450/430/1

00

Disable SM

authentication

Ability to disable SM authentication for a

SM connected via ICC (Installer Color

Code) to aid in Zero Touch Config.

Page 5: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 5 of 50

Frequency Products

Affected

Feature Description

All PMP 450

AP

Interop SM

Registration

Allows the user to control whether PMP

430 SMs are allowed to register to PMP

450 AP’s.

All All Update the

SNMPv2c

community string

without reboot

Allows user to modify SNMP community

string without requiring reboot.

All All Event log for user

initiated reboot

Adds an event log entry for "user

initiated reboot" to the system log.

All All SNMP support to

do an AP Evaluation

from a SM

Provides an SNMP OID to force a SM to

rescan and do an AP Evaluation. This

performs the same functionality as the

clicking the "Rescan APs" button on the

SM's GUI.

5 GHz PMP 450 Country code for

Malaysia

Allows operation within regulatory

allowances for Malaysia.

All All SNMPv3 Auth and

Privacy Password

length check

Requires that Auth and Privacy password

in SNMP setting is not less than 8 digits.

Note:

The user login name is case sensitive. It means that the login name can be

created as “ADMIN” and “admin” on the same radio.

Note:

The maximum uplink throughput for one VC is limited to 51 Mbps, when the

link is running with 5 ms frame period.

Note:

The User Authentication Method with RADIUS server will not work if AP is

running with 13.3 and SM is running with 13.4.

Please note that if AP and SM on same release i.e. 13.3 or 13.4, there will be

no issue with User Authentication Method.

Note:

PMP 400 radios are no longer supported and images are no longer included

in the OFDM CNUT package.

Page 6: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 6 of 50

Table 2 Features released previously but now are new to PMP/PTP 100

Frequency Products

Affected

Feature Description

All All Sector Spectrum

Analyzer

Allows the user to perform a sector wide

SA scan. The AP and the registered SMs

will go into a SA mode at the same time.

All All Read-only web user Allows to create ‘Read-Only’ user account

where the user can view the configuration

but the user cannot make any changes

including the ability to reboot a radio.

All All SM to support 20

color codes

Support for number of color code

increased from 10 to 20 for all platforms.

All All Export of Session

Status

Allows to export session status from

AP/BHM web interface in XML format.

All All ICC indication and

CC Priority field in

Session Status

Displays SMs connected via Installation

Color Code (ICC) method and configured

Color Code (CC) Priority of respective

SMs.

All All HTTPS Support for HTTPs enabled for all

platforms.

All All SNMPv3 Support for SNMPv3 enabled for all

platforms.

All All Enable/Disable

support for Telnet,

ftp and tftp

Allows to enable/disable telnet, FTP or

TFTP access for all platforms.

All All Import and export

of configuration file

Allows the user to configure a radio using

config file for all platforms.

All All DHCP Option 66 Allows automatic configuration of a radio

by downloading config file from a URL

provided via DHCP option 66.

All All Zero-touch Config Use case for the config file feature which

allows the user complete configuration of

radio through a config file.

Page 7: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 7 of 50

3.1 Listen-Before-Talk (LBT) 5.4 GHz for PTP 450

In System release 13.4, the LBT 5.4 GHz is implemented for PTP series. This feature was

previously implemented on PMP in release 13.3 and is now implemented on PTP. BHM

listens during the RTG (Receive/Transmit Transition Gap). If the interference is detected,

the following frame is left empty, no symbol is used (not even the overhead symbols).

The BHS listens during the TTG (Transmit/receive Transition Gap) time. If interference is

detected, the BHS skips the whole Uplink frame, nothing is sent.

Web Management Interface

The alternate channels can be configured on the BHM (under the tab Configuration >

Radio). Same channel cannot be configured twice for Frequency Carrier, Alternate Channel

1 or 2.

Figure 1 LBT BHM configuration for 5.4 GHz

In order to enable LBT, the Regional and Country will have to be configured for an “Other

Regulatory/Other ETSI” or “Europe” followed by County that supports the ETSI standard.

This setting is available under Regional Settings tab of Configuration > General page.

Figure 2 LBT ETSI 5.4 GHz BHM Region and Country code

3.2 Security Banner

In system release 13.4, the security banner has been introduced. If enabled, the user has to

accept and acknowledge the security requirement before login into web management

interface.

This feature is supported for all PMP / PTP product series.

Page 8: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 8 of 50

Web Management Interface

The Security Banner is disabled by default. The user can view General Status configuration

and login to radio.

The user can enable Security Banner Configuration > Security > Security Banner tab.

Table 3 Security Banner

Attribute Meaning

Enable Security Banner

during Login

Enable: The Security Banner Notice will be displayed

before login.

Disable: The Security Banner Notice will not be

displayed before login.

Security Banner Notice User can enter ASCII (0-9a-zA-Z newline, line-feed are

allowed) text up-to 1300 characters.

User must accept

security banner before

login

Enable: login area (username and password) will be

disabled unless user accepts the security banner.

Disable: User can login to radio without accepting

security banner.

Once the security banner is enabled, the home login screen will be shown as below:

Page 9: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 9 of 50

Figure 3 Login page - Security Banner

Note:

The user must accept “I have read, understood and accept the above

notice(s)” to proceed with login. The login button will not be enabled until

user accepts notice message.

Note:

The user is not allowed to save changes with empty Security Banner Notice if

the Security Banner is enabled. The user will be given a prompt stating

“Security Banner Cannot be empty”.

SNMP

Table 4 Security Banner SNMP objects

Name OID MIB Access Syntax / Description

enableSecurityBanner

.1.3.6.1.4.1.161.19.3.3.2.251.0

INTEGER Read-write 1:enable, 0:disable

textSecurityBanner

.1.3.6.1.4.1.161.19.3.3.2.253.0

DISPLAYSTRING

Read-Only 1200 characters of Security Banner

acceptSecurityBanner

.1.3.6.1.4.1.161.19.3.3.2.254.0

INTEGER Read-write 1: enable user must accept before login, 0: disable, not required.

Page 10: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 10 of 50

3.3 RADIUS Change of Authorization

Prior to 13.4 release, SM will get configuration parameters from a RADIUS server during

authentication process. This feature allows an administrator to control configuration

parameters in the SM while SM is in session. The configuration changes in SM are done

using RADIUS Change of Authorization method (RFC 3576) on the existing RADIUS

authentication framework for AP and SM. A typical use case could be changing the QOS

parameters after a certain amount of bandwidth usage by a SM.

The RADIUS CoA feature enables initiating a bi-directional communication from the

RADIUS server(s) to the AP and SM.

The AP listens on UDP port 3799 and accepts CoA requests from the configured RADIUS

servers. This CoA request should contain SM MAC address in ‘User-Name’ attribute as

identifier and all other attributes which control the SM config parameters. For security

reasons, a timestamp also needs to be added as ‘Event-Timestamp’ attribute. Hence the

time should also be synchronized between the RADIUS server(s) and the AP to fit within a

window of 300 seconds.

Once the configuration changes are applied on the SM, CoA-ACK message is sent back to

RADIUS server. If the validation fails, the AP sends a CoA-NACK response to the RADIUS

server with proper error code.

Note:

The RADIUS CoA feature will only enabled if Authentication mode is set to

RADIUS AAA.

Web Management Interface

The CoA Feature can be enabled or disabled under Configuration > Security >

Authentication Server Settings tab.

The feature is disabled by default.

Page 11: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 11 of 50

Table 5 RADIUS CoA configuration for AP

Attribute Meaning

Authentication Mode To enable CoA feature, the Authentication Mode should

be set to RADIUS AAA.

RADIUS Change of

Authorization

Enable RADIUS CoA: Allows to control configuration

parameters of SM using RADIUS CoA feature.

Disable RADIUS CoA: Disables RADIUS CoA feature.

SNMP

Table 6 RADIUS CoA SNMP object

Name OID MIB Access Syntax / Description

enableRadiusCoA

.1.3.6.1.4.1.161.19.3.1.1.224

WHISP-APS-MIB

read-write 0 - Disable RADIUS CoA.

1 - Enable RADIUS CoA.

Page 12: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 12 of 50

3.4 RADIUS VSA for Zero Touch

The RADIUS VSA (Vendor Specific Attributes) is updated for Zero Touch feature in system

release 13.4. This feature enables the ability for a SM to get its configuration via RADIUS

VSA. The RADIUS VSA is updated for an URL which points to the configuration file of SM.

The RADIUS will push the vendor specific attribute to SM after successful authentication.

The VSA contains URL of config file which will redirect SM to download configuration. If

there is any change in SM confirmation, the SM will reboot automatically after applying the

configuration.

The RADIUS VSA attributes concerning Zero Touch are as follows:

VSA Type String

Cambium-Canopy-ConfigFileImportUrl (29) string Maximum Length 127 characters.

Cambium-Canopy-ConfigFileExportUrl (30) string Maximum Length 127 characters.

The updated RADIUS dictionary can be downloaded from below link:

https://support.cambiumnetworks.com/files/pmp450/

Note:

The feature is not applicable to the AP.

3.5 Microsoft RADIUS support

This feature allows to configure Microsoft RADIUS (Network Policy and Access Services

a.k.a NPS) as Authentication server for SM and User authentication.

For SM Authentication, SM will user PEAP-MSCHAPv2 since NPS doesn't support TTLS

protocol.

For User Authentication, the Canopy software will use EAP-MD5 but the user has to do

certain configuration in order to enable EAP-MD5 on NPS.

Note:

All this configuration has been tested on Windows Server 2012

R2 version.

This feature is not supported on hardware board type P9 or lower

platforms.

Page 13: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 13 of 50

SM Authentication Configuration

Web Management Interface

There are no new configuration on AP. However SM has to be configured for PEAP

authentication protocol.

1. Go to Configuration > Security page

2. Select “eappeap” for Phase 1 attribute under tab AAA Authentication Settings.

Figure 4 EAPAPEAP settings

Note:

The Phase 2 will change automatically to MSCHAPv2 on select of Phase

1 attribute as EAP-PEAP. Other parameters of Phase 2 protocols like

PAP/CHAP will be disabled.

SNMP

Table 7 Microsoft RADIUS SNMP objects

Name OID MIB Access Syntax / Description

phase1 .1.3.6.1.4.1.161.19.3.2.7.4.0

WHISP-SM-MIB

read-write 2 - EAPAPEAP

phase2 .1.3.6.1.4.1.161.19.3.2.7.5.0

WHISP-SM-MIB

read-write 2 - EAPAPEAP

Note:

Please refer PMP 450 Configuration and User Guide for Windows Server

configuration and User Authentication configuration for Enabling EAP-MD5.

3.6 Custom frequency configuration at 1 KHz raster

This feature will allow users to configure custom frequency at 1 KHz raster. Prior to this

release, the custom frequency raster was 50 KHz.

In previous releases, the custom frequencies could be configured for 3356.10 MHz, 3302.35

MHz, 3680.40 MHz etc. whereas this feature allows to configure custom frequencies

3356.123 MHz, 3302.333 MHz, 3680.421 MHz etc. at granularity of 1 KHz.

This feature applies to 3.5 and 3.6 GHz radios only.

Page 14: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 14 of 50

Note:

If AP is running with 13.4 and transmitting at 1 KHz precision frequency,

the downgrade will be aborted.

If SM has ONLY 1 KHz precision frequencies selected in Custom Radio

Frequency Scan Selection List, the downgrade will be aborted. In

order to downgrade the radio successfully, at least one 50 KHz raster

frequency needs to be selected in Custom Radio Frequency Scan

Selection List.

AP and SMs will all need to be on at least release 13.4 to take advantage

of this feature.

SNMP

Table 8 Customer frequency list SNMP object

Name OID MIB Access Syntax / Description

addCustom FreqList

.1.3.6.1.4.1.161.19.3.3.2.53.0

WHISP-APS-MIB2-MIB

read-write Add Custom Frequencies. Frequencies list can be separated by commas. Max string length entered can’t exceed 128 characters.

RemoveCustomFreqList

.1.3.6.1.4.1.161.19.3.3.2.54.0

WHISP-APS-MIB2-MIB

read-write Remove Custom Frequencies.

3.7 Extrapolated Link Test

This feature allows users to estimate the link capacity by sending few packets and

measuring link quality. This feature extrapolates the link capacity in terms of throughput

based radio quality during test. This is an approximation test to have minimal service

impact.

Note:

This is not supported for PMP/PTP 100

Web Management Interface

The test can be run from GUI menu Tools > Link Capacity Test by selecting

“Extrapolated Link Test” for Link Test Mode attribute.

Page 15: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 15 of 50

Table 9 Extrapolated link test

Attribute Meaning

Link Test Mode Select “Extrapolated Link Test” to run extrapolated link

test.

Current Subscriber Module Select the SM or BHS from dropdown list on which the

“Extrapolated Link Test” to be performed.

Page 16: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 16 of 50

Figure 5 Extrapolated link test results

Page 17: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 17 of 50

SNMP

Table 10 Extrapolated Link Test SNMP object

Name OID MIB Access Syntax / Description

linkTestModeBox

WHISP-BOX-MIBV2-MIB

read-write INTEGER

3.8 Frame Utilization Statistics

The Frame Utilization Statistics is a feature introduced for PMP 450 and PTP 450 in system

release 13.4 which helps the user to understand how effectively the RF channel is being

utilized. This feature allows to check Time Division Duplex (TDD) frame utilization pattern

and diagnose for any excessive usage in uplink or downlink direction.

This forms the first step for identifying the TDD frame utilization information. If the user

finds excessive utilization based on these statistics, the second step would be to take

several actions like sectorization, tuning the uplink/downlink ratio etc. to improve RF

channel utilization. The efficient use of TDD frame will help to achieve optimum

performance of link.

Note:

The backhauls (BHM and BHS) will have only the downlink scheduler based

statistics.

Web Management Interface

The test can be run GUI menu Statistics > Frame Utilization.

Page 18: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 18 of 50

Table 11 Frame utilization statistics

Attribute Meaning

Frame Utilization Interval

Statistics Display interval Selects how often the frame utilization statistics are refreshed and displayed. The user can select display interval as 1 minute (low interval), 5 minutes (medium interval) or 15 minutes (high interval) based on requirement.

Frame Utilization

Downlink This indicates the percentage of downlink data slots used against the maximum number of slots possible in configured interval.

Page 19: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 19 of 50

Uplink This indicates the percentage of uplink data slots used against the maximum number of uplink slots possible in configured interval.

Downlink Counts

Total This indicates the sum of all downlink data slots used in the configured interval.

Low Priority The number of downlink data slots used for low priority downlink traffic.

High Priority The number of downlink data slots used for high priority downlink traffic.

Broadcast/Multicast The number of downlink data slots used for broadcast and multicast traffic.

Canopy MAC Acknowledgements

The number of downlink data slots used as ACKs.

Registration and Control message slots

The number of downlink data slots used for registration and other control messages.

Uplink Counts

Total This indicates the sum of all uplink data slots used in configured interval.

Low Priority The number of downlink data slots used for low priority uplink traffic.

High Priority The number of downlink data slots used for high priority downlink traffic.

Canopy MAC Acknowledgements

The number of downlink data slots used as ACKs.

Maximum possible counts

Downlink This indicates the maximum possible downlink data slots. This is based on the configuration of Channel Bandwidth, Frame period, uplink/downlink allocation, contention slots and configured Statistics Display interval.

Uplink This indicates the maximum possible uplink data slots. This is based on the configuration of Channel Bandwidth, Frame period, uplink/downlink allocation, contention slots and configured Statistics Display interval.

Packet Discard counts

Page 20: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 20 of 50

Ethernet indiscards This indicates the number of Ethernet packets discarded in the IN queue.

Ethernet outdiscards This indicates the number of Ethernet packets discarded in the OUT queue.

Radio indiscards This indicates the number of packets discarded over radio in the IN queue.

Radio outdiscards This indicates the number of packets discarded over radio in the OUT queue.

SNMP

Table 12 Frame Utilization Test SNMP Group objects

Name OID MIB Access Syntax / Description

whispApsFrUtlStats

.1.3.6.1.4.1.161.19.3.1.12

WHISP-APS-MIB

- -

whispApsFrUtlStatsIntervalLow

.1.3.6.1.4.1.161.19.3.1.12.1

WHISP-APS-MIB

- For low interval

whispApsFrUtlStatsIntervalMedium

.1.3.6.1.4.1.161.19.3.1.12.2

WHISP-APS-MIB

- For medium interval

whispApsFrUtlStatsIntervalHigh

.1.3.6.1.4.1.161.19.3.1.12.3

WHISP-APS-MIB

- For high interval

Table 13 Frame Utilization Test SNMP objects for low, medium and high intervals

Name

OID

Syntax / Description

Low Interval Medium Interval High Interval

frUtlHighTotalDow

nlinkUtilization

.1.3.6.1.4.1.161.19.

3.1.12.1.1

.1.3.6.1.4.1.161.19.

3.1.12.2.1

.1.3.6.1.4.1.161.19.

3.1.12.3.1

Percentage of total

downlink

frUtlLowTotalUplin

kUtilization

.1.3.6.1.4.1.161.19.

3.1.12.1.2

.1.3.6.1.4.1.161.19.

3.1.12.2.2

.1.3.6.1.4.1.161.19.

3.1.12.3.2

Percentage of total

uplink

frUtlLowTotalDown

linkSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.3

.1.3.6.1.4.1.161.19.

3.1.12.2.3

.1.3.6.1.4.1.161.19.

3.1.12.3.3

Total downlink data

slots

frUtlLowDownlinkL

owPrioSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.4

.1.3.6.1.4.1.161.19.

3.1.12.2.4

.1.3.6.1.4.1.161.19.

3.1.12.3.4

Number of data slots

used for downlink low

priority traffic

Page 21: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 21 of 50

Name

OID

Syntax / Description

Low Interval Medium Interval High Interval

frUtlLowDownlinkH

iPrioSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.5

.1.3.6.1.4.1.161.19.

3.1.12.2.5

.1.3.6.1.4.1.161.19.

3.1.12.3.5

Number of data slots

used for downlink

high priority traffic

frUtlLowDownlinkB

castSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.6

.1.3.6.1.4.1.161.19.

3.1.12.2.6

.1.3.6.1.4.1.161.19.

3.1.12.3.6

Number of data slots

used for downlink

Broadcast/Multicast

traffic

frUtlLowDownlinkA

ckSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.7

.1.3.6.1.4.1.161.19.

3.1.12.2.7

.1.3.6.1.4.1.161.19.

3.1.12.3.7

Number of data slots

used for downlink

Canopy MAC Acks

frUtlLowDownlinkC

ntlMsgSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.8

.1.3.6.1.4.1.161.19.

3.1.12.2.8

.1.3.6.1.4.1.161.19.

3.1.12.3.8

Number of data slots

used for downlink

registration control

message

frUtlLowTotalUplin

kSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.9

.1.3.6.1.4.1.161.19.

3.1.12.2.9

.1.3.6.1.4.1.161.19.

3.1.12.3.9

Total uplink data slots

frUtlLowUplinkLow

PrioSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.10

.1.3.6.1.4.1.161.19.

3.1.12.2.10

.1.3.6.1.4.1.161.19.

3.1.12.3.10

Number of data slots

used for uplink low

priority traffic

frUtlLowUplinkHiPr

ioSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.11

.1.3.6.1.4.1.161.19.

3.1.12.2.11

.1.3.6.1.4.1.161.19.

3.1.12.3.11

Number of data slots

used for uplink high

priority traffic

frUtlLowUplinkAck

Slots

.1.3.6.1.4.1.161.19.

3.1.12.1.12

.1.3.6.1.4.1.161.19.

3.1.12.2.12

.1.3.6.1.4.1.161.19.

3.1.12.3.12

Number of data slots

used for uplink

Canopy MAC Acks

frUtlLowMaxDownli

nkSlots

.1.3.6.1.4.1.161.19.

3.1.12.1.13

.1.3.6.1.4.1.161.19.

3.1.12.2.13

.1.3.6.1.4.1.161.19.

3.1.12.3.13

Maximum possible

downlink data slots

frUtlLowMaxUplink

Slots

.1.3.6.1.4.1.161.19.

3.1.12.1.14

.1.3.6.1.4.1.161.19.

3.1.12.2.14

.1.3.6.1.4.1.161.19.

3.1.12.3.14

Maximum possible

uplink data slots

frUtlLowEthInDisca

rds

.1.3.6.1.4.1.161.19.

3.1.12.1.15

.1.3.6.1.4.1.161.19.

3.1.12.2.15

.1.3.6.1.4.1.161.19.

3.1.12.3.15

Number of incoming

Ethernet packets

discarded

frUtlLowEthOutDis

cards

.1.3.6.1.4.1.161.19.

3.1.12.1.16

.1.3.6.1.4.1.161.19.

3.1.12.2.16

.1.3.6.1.4.1.161.19.

3.1.12.3.16

Number of outgoing

Ethernet packets

discarded

Page 22: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 22 of 50

Name

OID

Syntax / Description

Low Interval Medium Interval High Interval

frUtlLowRFInDiscar

ds

.1.3.6.1.4.1.161.19.

3.1.12.1.17

.1.3.6.1.4.1.161.19.

3.1.12.2.17

.1.3.6.1.4.1.161.19.

3.1.12.3.17

Number of incoming

radio packets

discarded

frUtlLowRFOutDisc

ards

.1.3.6.1.4.1.161.19.

3.1.12.1.18

.1.3.6.1.4.1.161.19.

3.1.12.2.18

.1.3.6.1.4.1.161.19.

3.1.12.3.18

Number of outgoing

radio packets

discarded

3.9 Last run time for Link Capacity Test

This is an enhancement which allows the users to see date and time of last performed Link

Capacity Test. If there is any change in time zone, the date and time will be adjusted

accordingly.

Figure 6 Link Test

SNMP

Table 14 Link Test last run time SNMP object

Name OID MIB Access Syntax / Description

linkTestLastRunTime

.1.3.6.1.4.1.161.19.3.3.18.2.55.0

WHISP-BOX-MIBV2-MIB

read-only DISPLAYSTRING

Page 23: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 23 of 50

3.10 Disable SM authentication

This feature allows the user to disable authentication for SM connected via ICC. This option

is useful to achieve zero touch configuration if authentication is enabled on AP.

Note:

If a SM is connected to an AP via the ICC method, the SM will disable

bridging of customer traffic to enforce security.

Web Management Interface

The feature can be enabled or disabled configuration > security > Authentication Server

settings tab.

Table 15 Disable authentication for SM

Attribute Meaning

Disable Authentication

for SM connected via ICC

Enabled: SM authentication is disabled when SM

connects via ICC (Installation Color Code).

Disabled: SM authentication is enabled.

SNMP

Table 16 PMP 430 SM registration SNMP object

Name OID MIB Access Syntax / Description

disableAuthForICCSM

.1.3.6.1.4.1.161.19

.3.1.1.226 WHISP-APS-MIB

read-write INTEGER {disabled(0),

enabled(1)}

3.11 Interop SM Registration

This feature allows the user to control whether PMP 430 SMs are allowed to register to

PMP 450 APs. It adds a configuration option on the AP to reject registration from PMP 430

SM. By default, PMP 430 SM registrations are accepted. When this configuration option is

set to disabled, PMP 430 SM’s registrations fail with reject reason 8. This will cause SMs to

lock out the AP for 15 minutes.

Page 24: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 24 of 50

Web Management Interface

The PMP 430 SM registration can be configured in GUI menu Configuration > Radio >

Advance tab.

Figure 7 PMP 430 SM registration

Figure 8 PMP 430 SM registration failures

Note:

This option is not displayed if the Frame Period is set to 5 ms.

This option applies only to PMP 450 5 GHz APs.

SNMP

Table 17 PMP 430 SM registration SNMP object

Name OID MIB Access Syntax / Description

pmp430SMRegistration

.1.3.6.1.4.1.161.19

.3.1.1.225 WHISP-APS-MIB

read-write INTEGER {disabled(0), enabled(1)}

3.12 Update the SNMPv2c community string without reboot

This feature allows the user to modify the SNMP community string without needing to

reboot the radio for the changes to take effect.

3.13 Event log for user initiated reboot

This creates an event log entry for "User Initiated Reset" in the system log. Prior to system

release 13.4, all reboots on P10 platform and later were logged as “watchdog reset”. With

Page 25: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 25 of 50

this enhancement, the system log will indicate “User Initiated Reset” for user initiated

reboots and “watchdog reset” for system forced reboots.

Figure 9 User initiated reboot system log

3.14 SNMP support to do an AP Evaluation from a SM

This is an enhancement which provides SNMP OID to force a SM to rescan and perform an

AP Evaluation.

Table 18 PMP 430 SM registration SNMP object

Name OID MIB Access Syntax / Description

whispSmControls.rescan

.1.3.6.1.4.1.161.19

.3.2.8.2 WHISP-SM-MIB

read-write INTEGER

a nonzero value will start the rescan

3.15 Country code for Malaysia

The new Country code for Malaysia is added under Configuration > General > Regional

Settings tab. This country Code will restrict operation of PMP 450 GHz 5 GHz radio in

frequency range 5725 to 5875 MHz. There is no change in EIRP limit.

Figure 10 Country code Malaysia

Page 26: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 26 of 50

3.16 SNMPv3 Auth and Privacy Password length check

This is an enhancement which ensures that SNMPv3 Auth and Privacy password length is

not less than 8 digits.

SNMP

The following SNMP objects are modified:

Table 19 PMP 430 SM registration SNMP object

Name OID MIB Access Syntax / Description

roAuthPassword

.1.3.6.1.4.1.161.19

.3.3.14.7 WHISP-BOX-MIBV2-MIB

read-write

SNMPv3 Read-Only Message authentication password. Minimum 8 and maximum 32 characters long

-

roPrivPassword

.1.3.6.1.4.1.161.19

.3.3.14.8

rwAuthPassword

.1.3.6.1.4.1.161.19

.3.3.14.11

rwPrivPassword

.1.3.6.1.4.1.161.19

.3.3.14.12

3.17 Features supported in PMP/PTP 100

In system release 13.4, the features are propagated to PMP/PTP 100 from previous release.

The following features are now supported for PMP/PTP 100:

3.17.1 SECTOR SPECTRUM ANALYZER

In Sector Spectrum Analyzer mode, the AP and SM perform spectrum analysis at the same

time.

The Sector SA can be initiated from AP specifying the scan duration. AP and all SMs in the

sector will stop transmitting and start scanning the spectrum. AP will scan longer time to

make sure that all the SMs do not receive the AP’s transmission. After the scan, radios

resume normal operation with the AP starting beacon transmission and the SMs connecting

to the AP.

Web Management Interface

1) Go to Tools > Spectrum Analyzer > Spectrum Analyzer Options tab.

Page 27: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 27 of 50

Table 20 Spectrum Analyzer Options configuration

Attribute Meaning

SM/BHS Scanning

Bandwidth

Selecting channel bandwidth for scanning. It is only

applicable for SM or BHS to scan spectrum for selected

channel bandwidth, whereas BHM will scan for currently

configured bandwidth.

2) Go to Tools > Spectrum Analyzer > Min and Max Frequencies tab.

Table 21 Spectrum Analyzer – Min and Max Frequencies configuration

Attribute Meaning

Min and Max

Frequencies in KHz

Enter minimum and maximum range of frequencies for

Spectrum analysis in KHz

Set Min And Max To Full

Scan

On button click, full support range of radio populated as

minimum and maximum frequencies

Set Min And Max To

Center Scan +/- 40 MHz

On button click, minimum and maximum frequencies are

populated from center frequency +/- 40 MHz

3) Go to Tools > Spectrum Analyzer > Timed Spectrum Analyzer tab.

Table 22 Spectrum Analyzer – Timed Spectrum Analyzer configuration

Attribute Meaning

Duration Enter scanning duration in second (10 to 1000) to

perform spectrum analysis.

Page 28: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 28 of 50

Note: AP scans purposely go longer than the configured

duration. This is to ensure the SM will not receive RF

energy from AP and the same would be reported in

spectrum analysis reports.

Start Timed Sector

Spectrum Analysis

Press the button to start spectrum analysis on entire

sector.

4) The Spectrum Analysis result for AP is displayed on Tools > Spectrum Analyzer >

Results tab whereas SM spectrum analysis result is available on Tools > Remote

Spectrum Analyzer > Remote results tab.

3.17.2 READ-ONLY WEB USER

This feature allow to configure a Read-Only user account who can only view the

configuration and statistics of radio. The Read-Only user can be created by “Admin”,

“Installer” and “Technician” privilege level login.

Web Management Interface

1) For creating Read-Only account, login as Admin and go to Accounts > Add User >

Add User tab.

Table 23 Read-Only web user – Add User

Attribute Meaning

Add user This allows to assign name to new user account.

Level This allows to set access level of user account:

ADMINISTRATOR, who has full read and write

permissions.

INSTALLER, who has permissions identical to those of

ADMINISTRATOR except that the installer cannot add or

delete users or change the password of any other user.

TECHNICIAN, who has permissions to modify basic

radio parameters and view informational web pages.

GUEST, who has no write permissions and only a limited

Page 29: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 29 of 50

view of General Status tab. The Guest Level is the GUI

screen you see when you first access the radio URL

before login.

New Password This field allows to set the password for new user

account.

Confirm Password Reconfirm the entered password.

User Mode This attribute facilitates to convert a configured user to a

Read-Only user.

2) The user mode for Read-Only can be updated in Accounts > Add User > Update

Mode tab.

Table 24 Read-Only web user – Update Mode

Attribute Meaning

User This allows to select user from list to modify user mode.

User Mode This attribute facilitates to convert a configured user to a

Read-Only user.

3) To View User Accounts, go to Accounts > User.

Table 25 Read-Only web user – view the user mode

SNMP

The Read-only accounts can also be created via SNMP with the new userMode (type of

integer - 1=Read-Only 0=Read-Write) OID. Please be sure that this is not the last OID

being set if the userName, userPassword, userMode and userLevel OIDs are being used.

Page 30: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 30 of 50

Table 26 Read-Only web user SNMP objects

Name OID MIB Access Syntax / Description

userName .1.3.6.1.4.1.161.19.3.3.2.45.0

WHISP-BOX-MIBV2-MIB

Read-Write DISPLAYSTRING

userMode .1.3.6.1.4.1.161.19.3.3.2.171.0

WHISP-BOX-MIBV2-MIB

Read-Write INTEGER

1=Read-Only 0=Read-Write

userPassword .1.3.6.1.4.1.161.19.3.3.2.46.0

WHISP-BOX-MIBV2-MIB

Read-Write DISPLAYSTRING

userAccessLevel

.1.3.6.1.4.1.161.19.3.3.2.47.0

WHISP-BOX-MIBV2-MIB

Read-Write INTEGER

RADIUS

Remote authentication using RADIUS can also be used to support Read-Only users. The

necessary changes to be done in order to AP or SM to support Remote authentication.

Remote Read-Only accounts can be created by using the new “Cambium-Canopy-

UserMode” (51) VSA in conjunction with the existing “Cambium-Canopy-UserLevel” (50)

VSA which both can be found in the new 13.4 Dictionary file.

Cambium-Canopy-UserMode

Type: Integer

Usage: Optional, (1=Read-Only user, 0=Read-Write), to maintain backward compatibility,

when this attribute is not used, account access will be of type Read-Write.

Add this attribute in user’s database of RADIUS servers e.g. users.conf in freeradius like

this way

ATTRIBUTE

Cambium-Canopy-UserMode 51 integer

#UserMode permission for the User logging in remotely(1=Read-Only 0=Read-

Write)

Note:

Please use the latest Dictionary file for the ability to login with a “Read

Only” account with Remote User Authentication.

For example, to create a remote Read Only “Installer” account the properties for the remote

user on RADIUS Server can be set to the following:

Cambium-Canopy-UserLevel = 2 # Values 1 à Admin, 2 à Installer, 3 à Tech

Cambium-Canopy-UserMode = 1 # Values 1 à Read-Only, 0 à Read-Write

Page 31: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 31 of 50

3.17.3 SM TO SUPPORT 20 COLOR CODES

This is an enhancement to increase the number of supported color codes from 10 to 20. This

will allow user to configure upto 20 SM color codes for all platforms.

Web Management Interface

1) Go to Configuration > Radio > Radio configuration tab:

Table 27 Color Code – Color code 1 configuration

Attribute Meaning

Color Code 1 It is first primary color code which allows to force SM to

register to only a specific AP.

2) The rest of 19 color codes can be configured in Configure > Radio >Additional color

code tab.

Table 28 Color Code – additional Color code configuration

Attribute Meaning

Color Code It is allows to configure remaining 19 color codes and its

priority.

Add/Modify Color Code This button allows to either add a new Color Code or

modify priority of an existing Color Code

Remove Color Code This button allows to delete the Color Code

SNMP

The new SNMP OIDs are given in below table:

Table 29 SM color code SNMP objects

Name OID MIB Access Syntax / Description

additionalColorCode

.1.3.6.1.4.1.161.19.3.2.1.152.0

WHISP-SM-MIB

read-write INTEGER (0..254)

Page 32: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 32 of 50

Name OID MIB Access Syntax / Description

additionalColorCodePriority

.1.3.6.1.4.1.161.19.3.2.1.153.0

WHISP-SM-MIB

read-write INTEGER {primary(1), secondary(2), tertiary(3)}

deleteAdditionalColorCod

.1.3.6.1.4.1.161.19.3.2.1.154.0

WHISP-SM-MIB

read-write INTEGER (0..254)

whispSmColorCodeTable

.1.3.6.1.4.1.161.19.3.2.9

WHISP-SM-MIB

not-accessible

current

The Older release OIDs colorcodes 2 to 10 are deprecated. It can be used to set 2 -10 color

codes. Please note that either we can use older OIDs or newer ones. Using both sets

interchangeably is not supported.

3.17.4 EXPORT OF SESSION STATUS

The feature enables user to export session status page from web management interface of

AP of PMP/PTP 100. The session status page will be exported in xml file.

Web Management Interface

The user can login to AP Web Management interface and go to Session Status page. There

is hyperlink displayed on top as SessionStatus.xml for download

Figure 11 Export of session status page

In case, the session status page does not list any SM, the SessionStatus.xml will still be

visible but the file would be empty. The file will contain data from all of the 5 different

tables.

Export from command line

The users can also get this file from command line. The user has to authenticate

successfully in order to download the file.

wget http://169.254.1.1/SessionStatus.xml?CanopyUsername=test&CanopyPassword=test

Page 33: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 33 of 50

3.17.5 ICC INDICATION AND CC PRIORITY FIELD IN SESSION STATUS

The Device tab of Session Status page will indicate if a SM is connected via Installation

Color Code (ICC) method. The State field will display “IN SESSION (ICC)” for all ICC

connected SMs as shown below.

Table 30 Device tab ICC indication

In Session tab, the CC (Color Code) Priority field is added to display SM’s Color Code

Priority. The field will display color code priority (ICC, Primary, Secondary or Tertiary) of all

connected SM.

Table 31 Session tab with CC Priority

3.17.6 HTTPS

The HTTPs provides a secured web management interface. To access web management

over https, the ‘https’ has to be used in browser before URL. User will be prompted a

warning message about Un-trusted certificate. The user can accept and proceed with

secured communication. The SM can also be accessed over https proxy.

Web Management Interface

1) The HTTPS for each radio (AP/SM) can be enabled in under Configuration > Security > Security Mode tab :

Page 34: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 34 of 50

Table 32 HTTPS – web access security mode

Attribute Meaning

Web Access HTTP only: This allows to access web interface over HTTP only.

HTTPs only: This allows to configure web interface access over

HTTPs only.

HTTP and HTTPs: It allows both HTTP and HTTPs.

Note:

User may experience slow GUI response with https.

SNMP

Table 33 HTTPs SNMP objects

Name OID MIB Access Syntax / Description

webAccess .1.3.6.1.4.1.161.19.3.3.2.155.0

WHISP-BOX-MIBV2-MIB

Read-write INTEGER { httponly(0), httpsonly(1), httpandhttps(2)}

This variable determines if only HTTP or HTTPs connection are allowed.

0: HTTP only(default)

1: HTTPs Only

2: HTTP and HTTPs

httpsPort .1.3.6.1.4.1.161.19.3.2.152

WHISP-BOX-MIBV2-MIB

Read-write

INTEGER

Port used to for HTTPs. Default is 443.

Page 35: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 35 of 50

Name OID MIB Access Syntax / Description

webAccess .1.3.6.1.4.1.161.19.3.3.2.155.0

WHISP-BOX-MIBV2-MIB

Read-write INTEGER { httponly(0), httpsonly(1), httpandhttps(2)}

This variable determines if only HTTP or HTTPs connection are allowed.

0: HTTP only(default)

1: HTTPs Only

2: HTTP and HTTPs

3.17.7 SNMPV3

The SNMPv3 provides a secure method to perform SNMP operations. SNMPv3 IETF

STD062 has been added as part of release 13.3 and onwards. This standard provides

services for authentication, data integrity and message encryption over SNMP.

Note:

The SNMPv3 statistics page may not be displayed properly with Google Chrome browser.

Some tables are missing in the SNMPv3 Statistics Page. The SNMPv3 Data is present on the page, but it is not listed in tabular form.

Web Management Interface

The SNMPv3 for a radio (AP/SM) can be enabled in Security Mode tab under configuration

> Security page.

1) Enable SNMPv3 for AP/SM in Configuration > Security > Security Mode tab.

Table 34 Enabling SNMPv3

Attribute Meaning

SNMP SNMPv2c only: This allows SNMPv2c agent only.

SNMPv3 only: This allows SNMPv3 agent only.

SNMPv2c and SNMPv3: This allows SNMPv2c and

SNMPv3 agents.

Page 36: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 36 of 50

Note

- With ‘SNMPv3 Only’ enabled, all SNMPv2c requests will be ignored.

- Any user with the correct SNMPv2c community string can set these

parameters. It is recommended that SNMPv3 needs to be used for added

security.

2) Enable SNMPv3 for AP/SM in Configuration > Security > SNMPv3 settings tab.

Table 35 SNMPv3 settings

Attribute Meaning

Engine ID The Engine ID is unique authoritative engine for each radio.

This attribute allows to configure Engine ID between 5 to 32

hex characters. The default ID is the MAC address of the

radio.

SNMPv3 Security Level This field allows to configure security model where users are

defined and authenticated before granting access to any

SNMP service. Each device can configure the security level

of SNMPv3 to No authentication/No privacy,

Authentication/No privacy, or Authentication/Privacy.

SNMPv3 Authentication

Protocol

Currently, the SNMPv3 authentication protocol MD5 is

supported.

SNMPv3 Privacy Protocol Currently, the SNMPv3 privacy protocol CBC-DES is

supported.

SNMPv3 Read-Only User This field allows for a read-only user per devices. The default

values for the Read-Only users is:

Username = Canopyro

Authentication Password = authCanopyro

Page 37: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 37 of 50

Privacy Password = privacyCanopyro

SNMPv3 Read/Write

User

Read-write user by default is disabled. The default values for

the Read/Write users is :

Username = Canopy

Authentication Password = authCanopy

Privacy Password = privacyCanopy

SNMPv3 Trap

Configuration

By default transmission of SNMPv3 traps is disabled and all

traps sent from the radios are in SNMPv2c format.

SNMP

Table 36 SNMPv3 objects

Name OID MIB Access Syntax / Description

snmpStatus .1.3.6.1.4.1.161.19.3.3.2.167.0

WHISP-BOX-MIBV2-MIB

Read-write INTEGER {snmpv2only(1), snmpv3only(2), snmpv2andsnmpv3(3)}

This variable determines SNMP operation mode.

1: SNMPv2c(default)

2: SNMPv3 only

3: SNMPv2c and SNMPv3

snmpv2cEnable .1.3.6.1.4.1.161.19.3.3.14.1

WHISP-BOX-MIBV2-MIB

Read-write INTEGER{enable(1),disable(0)}

Enable(1) or Disable(0) SNMPv2c access

snmpv3EngineId .1.3.6.1.4.1.161.19.3.3.14.2

WHISP-BOX-MIBV2-MIB

Read-write Octet String(Size (5..32))

The SNMPv3 engine administratively-unique identifier

snmpv3SecLvl .1.3.6.1.4.1.161.19.3.3.14.3

WHISP-BOX-MIBV2-MIB

Read-write INTEGER {noAuth-noPriv(0),

auth-noPriv(1),

auth-priv(2)}

snmpv3AuthProt .1.3.6.1.4.1.161.19.3.3.14.4

WHISP-BOX-MIBV2-MIB

Read-write INTEGER {md5(0)} The security level of the SNMPv3 Engine. noAuth-noPriv(0), auth-noPriv(1), auth-priv(2)

Page 38: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 38 of 50

Name OID MIB Access Syntax / Description

snmpv3PrivProt .1.3.6.1.4.1.161.19.3.3.14.5

WHISP-BOX-MIBV2-MIB

Read-write INTEGER {cbc-des(0)}

The SNMPv3 message privacy/encryption protocol to use. Currently only CBC-DES(0) is supported.

roUserName .1.3.6.1.4.1.161.19.3.3.14.6

WHISP-BOX-MIBV2-MIB

Read-write OCTET STRING (SIZE (1..32))

SNMPv3 Read-Only username.

roAuthPassword .1.3.6.1.4.1.161.19.3.3.14.7

WHISP-BOX-MIBV2-MIB

Read-write OCTET STRING (SIZE (1..32))

SNMPv3 Read-Only message authentication password.

roPrivPassword .1.3.6.1.4.1.161.19.3.3.14.8

WHISP-BOX-MIBV2-MIB

Read-write OCTET STRING (SIZE (1..32))

SNMPv3 Read-Only message privacy/encryption password

rwUserEnable .1.3.6.1.4.1.161.19.3.3.14.9

WHISP-BOX-MIBV2-MIB

Read-write INTEGER {enable(1),

disable(0)}

rwUserName .1.3.6.1.4.1.161.19.3.3.14.10

WHISP-BOX-MIBV2-MIB

Read-write OCTET STRING (SIZE (1..32))

SNMPv3 Read-Write user enable(1) or disable(0).

rwAuthPassword .1.3.6.1.4.1.161.19.3.3.14.11

WHISP-BOX-MIBV2-MIB

Read-write OCTET STRING (SIZE (1..32))

SNMPv3 Read-Write message authentication password.

rwPrivPassword .1.3.6.1.4.1.161.19.3.3.14.12

WHISP-BOX-MIBV2-MIB

Read-write OCTET STRING (SIZE (1..32))

SNMPv3 Read-Write message privacy/encryption password

Page 39: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 39 of 50

Name OID MIB Access Syntax / Description

snmpv3TrapEnabl

e .1.3.6.1.4.1.161.19.3.3.14.13

WHISP-BOX-MIBV2-MIB

Read-write INTEGER {disabled(0),

roUserTrapEnable(1),

rwUserTrapEnable(2)}

SNMPv3 trap enable option. Disable(0), Read-Only user traps send(1), Read-Write user traps sent(2). When disabled SNMPv2c traps are sent.

3.17.8 ENABLE/DISABLE SUPPORT FOR TELNET, FTP AND TFTP

The telnet/ftp/tftp enabled/disabled control is added for PMP/PTP 100 in system release

13.4.

Web Management Interface

The telnet/ftp/tftp enabled/disabled can be configured in configuration > Security >

Security Mode tab. The admin login privilege is required in order to enable/disable these

features.

Figure 12 Security mode configuration

SNMP

Table 37 Telnet, ftp and tftp SNMP objects

Name OID MIB Access Syntax / Description

ftpStatus .1.3.6.1.4.1.161.19.3.3.2.169.0

WHISP-BOX-MIBV2-MIB

Read-write INTEGER {disableftp(0),

enableftp(1)}

This variable determines if FTP to enabled or not.

0: Disable FTP

1: Enable FTP(default)

Page 40: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 40 of 50

Name OID MIB Access Syntax / Description

tftpStatus .1.3.6.1.4.1.161.19.3.3.2.170.0

WHISP-BOX-MIBV2-MIB

Read-write INTEGER {disabletftp(0),

enabletftp(1)}

This variable determines if TFTP is enabled or not.

0: Disable TFTP

1: Enable TFTP(default)

3.17.9 IMPORT AND EXPORT OF CONFIGURATION FILE

The release 13.4 supports import and export of configuration from the AP or SM or BH as a

text file for PMP/PTP 100. The configuration file is in JSON format. To be able to export or

import the configuration file, the logged in user needs to be an Administrator.

The exported configuration file contains the complete configuration including all the default

values. To keep a backup of the current configuration, the file can be saved as-is and

imported later.

While importing a configuration file, either a full configuration or a sparse configuration

containing only the items that need to be changed can be loaded. If a sparse configuration

file is imported, only the items listed in the file will be imported. Other configuration

settings will remain unchanged. There can also be used a special flag in the configuration

file to tell the device to apply the configuration starting from factory default settings. See

the "Special headers for configuration file" section below.

Web Management Interface

1) Go to Configuration > Unit Settings page to export and import of config file.

Table 38 Export and import of config file

Page 41: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 41 of 50

Attribute Meaning

Configuration File This allows to download configuration file of the radio

(AP/SM). The configuration file is hyperlink which has

name as <mac address>.cfg

Choose File This allows to select .cfg file for upload or export of the

configuration.

Upload This allows to upload or export of selected file through

“Choose File”.

Apply Configuration File This is to apply uploaded/imported file to radio (AP/SM)

SNMP

1) Export the configuration file via SNMP:

The configuration file can be exported to an FTP server using the WHISP-BOX-MIBV2-

MIB::exportConfigFile (.1.3.6.1.4.1.161.19.3.3.3.8) OID. Pass the FTP URL as a parameter.

The username/password can be included in the URL using the standard convention (see

example below). Also make sure the FTP server location has write access enabled so the

configuration file can be saved here.

Example:

$ snmpset -v 2c -c Canopy 192.168.0.1 .1.3.6.1.4.1.161.19.3.3.3.8.0 s

ftp://user:[email protected]/config.json

2) Import the configuration file via SNMP:

The configuration file can be imported from an FTP server using the WHISP-BOX-MIBV2-

MIB::importConfigFile (.1.3.6.1.4.1.161.19.3.3.3.7) OID. Copy the configuration file to an

FTP server that is reachable from the AP or SM. Then invoke the above OID with the FTP

URL as the parameter. This will result in the configuration file getting downloaded and

imported into the device. Reboot the device to boot up with the new configuration.

Example:

$ snmpset -v 2c -c Canopy 192.168.0.1 .1.3.6.1.4.1.161.19.3.3.3.7.0 s

ftp://user:[email protected]/config.json

Any error messages for the import and export operation can be found in the system logs.

Page 42: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 42 of 50

3.17.10 DHCP OPTION 66

The DHCP option 66 enables radio to auto-configure connected equipment’s via a server.

The below link has more detail on how to configure and use this feature.

http://community.cambiumnetworks.com/t5/PMP-Beta/PMP-13-3-beta-Zero-Touch-

Configuration-Using-DHCP-Option-66/m-p/37823/thread-id/158

3.17.11 ZERO-TOUCH CONFIG

The “Zero touch config” is an additional use case for the config file feature as described in

Import and export of configuration file. This feature extends the Installer Color Code feature

by enabling DHCP while connected to an AP with ICC. The forum post for the DHCP Option

66 listed above has more information on the Zero-touch configuration as well.

Page 43: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 43 of 50

4 PROBLEMS AND LIMITATIONS CORRECTED

Table 39 System Release 13.4 problems and limitations corrected

Products

Affected

Tracking Description Resolution

CNUT CPY-257 PMP430 SM is updated with

PMP 450 package only if

this is the first package in

the list of packages in

CNUT.

The problem has been resolved

in CNUT 4.8.1.

All CPY-8723 AP/SM reboot when receives

malformed telnet packet

The problem has been resolved

in System Release 13.4 for

malformed telnet packet. This

was seen when it was

connected to an Internet

accessible IP address.

PMP 450

SM

CPY-8727 No traffic flow after radar

detections despite SM is “in

Session” state

The problem has been resolved

in System Release 13.4.

All CPY-9498 Bridge table does not report

more than 255 MAC

addresses from SNMP

The problem has been resolved

in System Release 13.4.

PMP/PTP

450

CPY-10188 SNMP whispLinkTable

objects which have string

values of dBm, are required

in integer.

The problem has been resolved

in System Release 13.4.

PMP 450

AP

CPY-10202 Customers using Sync

Injectors may see timing

issues when the AP tries to

use the iGPS as a sync

source. Please contact

Cambium Customer Support

if you are having problems

in the area.

The problem has been resolved

in System Release 13.4.

All CPY-10318 In some cases, Enabling and

Disabling of telnet may

require a reboot to take

effect.

The problem has been resolved

in System Release 13.4.

Page 44: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 44 of 50

Products

Affected

Tracking Description Resolution

PMP 450 CPY-10418 When the static IP

configured SM registers to

AP with ICC, the DHCP gets

enabled in SM and IP

address changes public IP.

The problem has been resolved

in System Release 13.4.

All CPY-10423 Engine ID does not Follow

Requirements for 13.3. The

Engine ID cannot be entered

in odd size.

The problem has been resolved

in System Release 13.4.

PTP 450 CPY-10437 PTP 450 5GHz radio will not

link if 5.4GHz band is

selected on Master and both

5.4/5.7 bands are selected

for scan on Slave side

The problem has been resolved

in System Release 13.4.

All CPY-10483 IPv6 Filter settings reset all

existing IPv4 filter

configurations

The problem has been resolved

in System Release 13.4.

PMP 450 CPY-10484 SM shows reboot required

after uploading a config file

when there were no changes

in config file.

The problem has been resolved

in System Release 13.4.

All CPY-10627 SNMPv2 Community string

modification should not

require a reboot to take

effect

The problem has been resolved

in System Release 13.4.

PMP 450 CPY-10654 The control messages and

MIMO rate adapt algorithm

does not restore the

previous values after

clicking “Undo Saved

Changes”.

The problem has been resolved

in System Release 13.4.

All CPY-10672 SNMP object userMode

returns other than 0 or 1

value if the user tries to

read or set multiple times.

The problem has been resolved

in System Release 13.4.

All CPY-10683 Variable length subnet mask

does not work for .255 and 0

address.

The problem has been resolved

in System Release 13.4.

Page 45: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 45 of 50

Products

Affected

Tracking Description Resolution

PTP 230 CPY-10730 BHS restarts due to error

“FeatureKeyDecrypt() Error

CRC mismatch”.

The problem has been resolved

in System Release 13.4.

PMP 100 CPY-10759 On occasion with a 900 AP,

the user may see a "this

function is not supported on

this platform!" message.

The problem has been resolved

in System Release 13.4.

PMP 450

AP

CPY-10780 Alternate frequency settings

are not displayed in AP

under DFS tab.

The problem has been resolved

in System Release 13.4.

PMP 430

SM

CPY-10813 Uplink 3X (64-QAM)

throughput degradation

observed with PMP 430 SM

on release 13.2 and

13.2.1.x.

The problem has been resolved

in System Release 13.4.

All

CPY-10859 Config file can be

downloaded without logging

into radio using direct link

This problem has been

resolved in System Release

13.4.

All CPY-10881 Duplicate entries are

displayed for Bridge table

on AP, SM and BH

This problem has been

resolved in System Release

13.4.

All CPY-10888 Config file upload changes

encryption setting from DES

to AES for AP if the config

file is downloaded from

same AP and it is configured

for DES.

This problem has been

resolved in System Release

13.4.

PMP 450 CPY-10903

CPY-10600

SM’s alignment tone

continues buzzing even after

restart of SM or

disconnection from AP

This problem has been

resolved in System Release

13.4.

All CPY-10911 SM reboots when SM is in

NAT mode and NAT table is

filled with 2048 entries

This problem has been

resolved in System Release

13.4.

PTP 450 CPY-10986 BHM does not switch to

alternate frequency in case

of DFS event

This problem has been

resolved in System Release

13.4.

Page 46: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 46 of 50

Products

Affected

Tracking Description Resolution

5.x MHz

ETSI

PMP 450

CPY- 11036 For ETSI 5.4/5.7 bands in 10

MHz channels, if the SM

Receive Target Level (RTL)

on the AP is set to -61 or

higher, the AP detects false

radar causing a DFS event.

This problem has been

resolved in System Release

13.4.

PMP 100 CPY-11042 A P8 SM will crash if the

exported config file is the

same as the config file being

imported.

P8 Radios do not formally

support the config file feature,

but this issue has been

corrected in System Release

13.4.

PMP/PTP

450 3.6

GHz

CPY 11155 No countries listed in

dropdown menu under

Europe region however

SNMP allows to set country

code

This problem has been

resolved in System Release

13.4.

All CPY-11175 User accounts are deleted

from the radio if the radio is

set to factory defaults

followed by ‘Undo Unit-Wide

Saved Changes’ without

reboot.

This problem has been

resolved in System Release

13.4

Page 47: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 47 of 50

5 KNOWN PROBLEMS OR LIMITATIONS

Table 40 System Release 13.4 known problems and limitations

Products

Affected

Tracking Description

PMP 450

AP 3.65

GHz FCC

CPY-344 When 3.65GHz APs are deployed in an ABAB configuration,

then if an AP is rebooted, it may trigger an LBT event once

due to interference from the back sector. But once the AP has

initialized and is synced with the back AP (and adjacent

sectors), it will operate normally.

PMP/PTP CPY-10182 Unable to upload config file in https mode with Google

Chrome browser

PMP/PTP CPY-10310 PMP or PTP 450 may have "XO trim at min diff" in event log.

Contact Cambium Customer support if this is occurring

repeatedly.

PMP 450 CPY-11340 In rare occasions, a 5 Ghz AP under high CPU utilization can

crash due to a CTIC error. Please contact Cambium support

if your AP exhibits this behavior.

PMP 450 CPY-10356 PMP 450 AP reports DES encryption on homepage when the

encryption is set to None on security page. This discrepancy

may lead users to think that DES is enabled on the AP, when

it is not.

PMP 450

AP 3.65/

3.5 GHz

CPY-10399 AP sync status page shows date as 00/00/0000 when getting

sync from on board GPS. Please use NTP on your APs for

Date and Time information.

PTP 450

5 GHz

CPY-10437 5.4 GHz BHS running 5 MHz Channel Bandwidth will not

register to BHM if they have both the 5.4 and the 5.7 band

selected. Select only the 5.4 band on the BHS to ensure a

timely registration.

PMP/PTP

450

CPY-10621 TheSNMP object encryptionConfig expects 0 for AES, 1 for

DES, and 2 for None, despite what the description for the

OID says.

All CPY-10644 The DFS Status tab is only visible to SMs/BHS that are set to

a DFS Region.

PMP/PTP

450

CPY-10663 The LBT Status tab is only visible to SMs/BHS that are set to

a LBT Region.

Page 48: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 48 of 50

Products

Affected

Tracking Description

All CPY-10687 False radar detection on 5.x GHz ETSI & FCC AP for 10, 7

and 5 MHz Channel band width. If false radar detections

occur, set the SM receive target level to a lower value to

reduce the impact.

PMP/PTP

450 5.4

GHz

CPY-10763 ETSI LBT is not supported on radios using a 5ms frame.

PMP 450

AP

CPY-10846 Some of the SM OIDs listed in the WHISPSM MIB will also

work on APs.

PMP 430

AP

CPY-11040 PMP 430 APs might have a "Cannot update rcvd quality with

invalid LUID 1" error. Please contact Cambium Support if

your PMP 430 AP displays this error.

PMP 450 CPY-11057 QinQ configuration does not work with VLAN ID “1”.

PTP 450 CPY-11299 In ETSI regions, users might see their BHS transmit at a

lower power after an LBT event.

All CPY-11466 SNMP object regFailSeqNum returns value type integer

instead of counter32

Page 49: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 49 of 50

6 TECHNICAL SUPPORT

For Technical Support, see:

http://www.cambiumnetworks.com/support

For PMP Technical Support helpdesk phone numbers, see:

http://www.cambiumnetworks.com/support/contact-support

Page 50: POINT TO POINT WIRELESS SOLUTIONS GROUP Cambium …

Release Notes System Release 13.4

pmp-0979 - July 2015 Page 50 of 50

Cambium Networks

Cambium Networks provides professional grade fixed wireless broadband and microwave

solutions for customers around the world. Our solutions are deployed in thousands of

networks in over 153 countries, with our innovative technologies providing reliable, secure,

cost-effective connectivity that’s easy to deploy and proven to deliver outstanding metrics.

Our flexible Point-to-Multipoint (PMP) solutions operate in the licensed, unlicensed and

federal frequency bands, providing reliable, secure, cost effective access networks. With

more than three million modules deployed in networks around the world, our PMP access

network solutions prove themselves day-in and day-out in residential access, leased line

replacement, video surveillance and smart grid infrastructure applications.

Our award-winning Point to Point (PTP) radio solutions operate in licensed, unlicensed and

defined use frequency bands including specific FIPS 140-2 solutions for the U.S. Federal

market. Ruggedized for 99.999% availability, our PTP solutions have an impeccable track

record for delivering reliable high-speed backhaul connectivity even in the most challenging

non-line-of-sight RF environments.

Cambium Networks solutions are proven, respected leaders in the wireless broadband

industry. We design, deploy and deliver innovative data, voice and video connectivity

solutions that enable and ensure the communications of life, empowering personal,

commercial and community growth virtually everywhere in the world.