point to point wireless solutions group … to point wireless solutions group pmp / ptp 450 ... 2.2...
TRANSCRIPT
POINT TO POINT WIRELESS SOLUTIONS GROUP
Cambium
PMP / PTP 450
PMP 430 / PTP 230
PMP / PTP 100 Series
Release Notes
System Release 13.4
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 2 of 50
1 INTRODUCTION
This document provides information for the Cambium Networks PMP/PTP 450, PMP 430,
PTP 230 and PMP/PTP 100 Series System Release 13.4.
Software updates for PMP products are available from:
https://support.cambiumnetworks.com/files
The information in this document is subject to change without notice. The
recommendations, technical data, configurations and statements in this document are
believed to be reliable and accurate, but are presented without implied or express
warranty. Users must take full responsibility for their applications of any product specified
in this document. The information in this document is proprietary to Cambium Networks
Ltd.
2 PMP VARIANTS
System Release 13.4 is compatible with PMP/PTP 450, PMP 430, PTP 230 and PMP/PTP 100
Series modules. This document covers Release Notes for all equipment. For more
information on System Release 13.4, see:
https://support.cambiumnetworks.com/files
2.1 Embedded software
PMP / PTP 450
CANOPY134BUILDOFFICIAL_MIMO_DESAES_S.pkg3
PMP 430
DES Encryption: CANOPY134BUILDOFFICIAL_OFDM_DES.pkg3
AES Encryption: CANOPY134BUILDOFFICIAL_OFDM_AES.pkg3
PTP 230
DES Encryption: CANOPY134BUILDOFFICIAL_OFDM_DES.pkg3
AES Encryption: CANOPY134BUILDOFFICIAL_OFDM_AES.pkg3
PMP / PTP 100
DES Encryption: CANOPY134BUILDOFFICIAL_DES.pkg3
AES Encryption: CANOPY134BUILDOFFICIAL_AES.pkg3
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 3 of 50
2.2 Canopy Network Updater (CNUT) software
The latest version of CNUT should be used with 13.4. It can be found here:
http://www.cambiumnetworks.com/support/management-tools/cnut/
2.3 System Documentation
Provided with System Release 13.4 are five reference documents:
PMP / PTP 450, PMP 430, PTP 230, PMP 100 and PTP 100 Series Release Notes (This
document)
PMP 450 Planning Guide
PMP 450 Configuration and User Guide
PTP 450 User Guide
PMP 430 / PTP 230 Configuration and User Guide
PMP / PTP 100 User Guide These documents are available at https://support.cambiumnetworks.com/files
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 4 of 50
3 NEW FEATURES The System Release 13.4 introduces the following new features:
Table 1 System Release 13.4 new features
Frequency Products
Affected
Feature Description
5.4 GHz PTP 450 Listen-Before-Talk
(LBT) 5.4 GHz for
PTP 450
Allows configuration of Listen-Before-
Talk(LBT) ETSI for 5.4 GHz.
All All Security Banner Enables the display of a security banner
and prompts user to accept security
requirements.
All APs and
SMs only
RADIUS Change of
Authorization
Allows the user to change configuration
of SM via RADIUS while SM is in session.
All All RADIUS VSA for
Zero Touch
Adds support for using RADIUS VSA for
Zero Touch configuration.
All APs and
SMs only
Microsoft RADIUS
support
PEAP is now supported as outer
authentication so that PEAP-MSCHAPv2
can be used to authenticate SM with
Microsoft RADIUS server.
3.5 /3.65
GHz
PMP/PTP
450
Custom frequency
configuration at 1
KHz raster
Allows the users to configure custom
frequency at 1 KHz raster for 3.5 and
3.65 GHz.
All PMP/PTP
450, PMP
430, PTP
230
Extrapolated Link
Test
Estimate link throughput capacity
without service interruption by sending
few packets, and extrapolating results.
All PMP/PTP
450
Frame Utilization
Statistics
Provides statistics of RF channel
utilization.
All All Last run time for
Link Capacity Test
This is an enhancement which displays
time stamp of last performed Link
Capacity Test.
All PMP
450/430/1
00
Disable SM
authentication
Ability to disable SM authentication for a
SM connected via ICC (Installer Color
Code) to aid in Zero Touch Config.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 5 of 50
Frequency Products
Affected
Feature Description
All PMP 450
AP
Interop SM
Registration
Allows the user to control whether PMP
430 SMs are allowed to register to PMP
450 AP’s.
All All Update the
SNMPv2c
community string
without reboot
Allows user to modify SNMP community
string without requiring reboot.
All All Event log for user
initiated reboot
Adds an event log entry for "user
initiated reboot" to the system log.
All All SNMP support to
do an AP Evaluation
from a SM
Provides an SNMP OID to force a SM to
rescan and do an AP Evaluation. This
performs the same functionality as the
clicking the "Rescan APs" button on the
SM's GUI.
5 GHz PMP 450 Country code for
Malaysia
Allows operation within regulatory
allowances for Malaysia.
All All SNMPv3 Auth and
Privacy Password
length check
Requires that Auth and Privacy password
in SNMP setting is not less than 8 digits.
Note:
The user login name is case sensitive. It means that the login name can be
created as “ADMIN” and “admin” on the same radio.
Note:
The maximum uplink throughput for one VC is limited to 51 Mbps, when the
link is running with 5 ms frame period.
Note:
The User Authentication Method with RADIUS server will not work if AP is
running with 13.3 and SM is running with 13.4.
Please note that if AP and SM on same release i.e. 13.3 or 13.4, there will be
no issue with User Authentication Method.
Note:
PMP 400 radios are no longer supported and images are no longer included
in the OFDM CNUT package.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 6 of 50
Table 2 Features released previously but now are new to PMP/PTP 100
Frequency Products
Affected
Feature Description
All All Sector Spectrum
Analyzer
Allows the user to perform a sector wide
SA scan. The AP and the registered SMs
will go into a SA mode at the same time.
All All Read-only web user Allows to create ‘Read-Only’ user account
where the user can view the configuration
but the user cannot make any changes
including the ability to reboot a radio.
All All SM to support 20
color codes
Support for number of color code
increased from 10 to 20 for all platforms.
All All Export of Session
Status
Allows to export session status from
AP/BHM web interface in XML format.
All All ICC indication and
CC Priority field in
Session Status
Displays SMs connected via Installation
Color Code (ICC) method and configured
Color Code (CC) Priority of respective
SMs.
All All HTTPS Support for HTTPs enabled for all
platforms.
All All SNMPv3 Support for SNMPv3 enabled for all
platforms.
All All Enable/Disable
support for Telnet,
ftp and tftp
Allows to enable/disable telnet, FTP or
TFTP access for all platforms.
All All Import and export
of configuration file
Allows the user to configure a radio using
config file for all platforms.
All All DHCP Option 66 Allows automatic configuration of a radio
by downloading config file from a URL
provided via DHCP option 66.
All All Zero-touch Config Use case for the config file feature which
allows the user complete configuration of
radio through a config file.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 7 of 50
3.1 Listen-Before-Talk (LBT) 5.4 GHz for PTP 450
In System release 13.4, the LBT 5.4 GHz is implemented for PTP series. This feature was
previously implemented on PMP in release 13.3 and is now implemented on PTP. BHM
listens during the RTG (Receive/Transmit Transition Gap). If the interference is detected,
the following frame is left empty, no symbol is used (not even the overhead symbols).
The BHS listens during the TTG (Transmit/receive Transition Gap) time. If interference is
detected, the BHS skips the whole Uplink frame, nothing is sent.
Web Management Interface
The alternate channels can be configured on the BHM (under the tab Configuration >
Radio). Same channel cannot be configured twice for Frequency Carrier, Alternate Channel
1 or 2.
Figure 1 LBT BHM configuration for 5.4 GHz
In order to enable LBT, the Regional and Country will have to be configured for an “Other
Regulatory/Other ETSI” or “Europe” followed by County that supports the ETSI standard.
This setting is available under Regional Settings tab of Configuration > General page.
Figure 2 LBT ETSI 5.4 GHz BHM Region and Country code
3.2 Security Banner
In system release 13.4, the security banner has been introduced. If enabled, the user has to
accept and acknowledge the security requirement before login into web management
interface.
This feature is supported for all PMP / PTP product series.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 8 of 50
Web Management Interface
The Security Banner is disabled by default. The user can view General Status configuration
and login to radio.
The user can enable Security Banner Configuration > Security > Security Banner tab.
Table 3 Security Banner
Attribute Meaning
Enable Security Banner
during Login
Enable: The Security Banner Notice will be displayed
before login.
Disable: The Security Banner Notice will not be
displayed before login.
Security Banner Notice User can enter ASCII (0-9a-zA-Z newline, line-feed are
allowed) text up-to 1300 characters.
User must accept
security banner before
login
Enable: login area (username and password) will be
disabled unless user accepts the security banner.
Disable: User can login to radio without accepting
security banner.
Once the security banner is enabled, the home login screen will be shown as below:
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 9 of 50
Figure 3 Login page - Security Banner
Note:
The user must accept “I have read, understood and accept the above
notice(s)” to proceed with login. The login button will not be enabled until
user accepts notice message.
Note:
The user is not allowed to save changes with empty Security Banner Notice if
the Security Banner is enabled. The user will be given a prompt stating
“Security Banner Cannot be empty”.
SNMP
Table 4 Security Banner SNMP objects
Name OID MIB Access Syntax / Description
enableSecurityBanner
.1.3.6.1.4.1.161.19.3.3.2.251.0
INTEGER Read-write 1:enable, 0:disable
textSecurityBanner
.1.3.6.1.4.1.161.19.3.3.2.253.0
DISPLAYSTRING
Read-Only 1200 characters of Security Banner
acceptSecurityBanner
.1.3.6.1.4.1.161.19.3.3.2.254.0
INTEGER Read-write 1: enable user must accept before login, 0: disable, not required.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 10 of 50
3.3 RADIUS Change of Authorization
Prior to 13.4 release, SM will get configuration parameters from a RADIUS server during
authentication process. This feature allows an administrator to control configuration
parameters in the SM while SM is in session. The configuration changes in SM are done
using RADIUS Change of Authorization method (RFC 3576) on the existing RADIUS
authentication framework for AP and SM. A typical use case could be changing the QOS
parameters after a certain amount of bandwidth usage by a SM.
The RADIUS CoA feature enables initiating a bi-directional communication from the
RADIUS server(s) to the AP and SM.
The AP listens on UDP port 3799 and accepts CoA requests from the configured RADIUS
servers. This CoA request should contain SM MAC address in ‘User-Name’ attribute as
identifier and all other attributes which control the SM config parameters. For security
reasons, a timestamp also needs to be added as ‘Event-Timestamp’ attribute. Hence the
time should also be synchronized between the RADIUS server(s) and the AP to fit within a
window of 300 seconds.
Once the configuration changes are applied on the SM, CoA-ACK message is sent back to
RADIUS server. If the validation fails, the AP sends a CoA-NACK response to the RADIUS
server with proper error code.
Note:
The RADIUS CoA feature will only enabled if Authentication mode is set to
RADIUS AAA.
Web Management Interface
The CoA Feature can be enabled or disabled under Configuration > Security >
Authentication Server Settings tab.
The feature is disabled by default.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 11 of 50
Table 5 RADIUS CoA configuration for AP
Attribute Meaning
Authentication Mode To enable CoA feature, the Authentication Mode should
be set to RADIUS AAA.
RADIUS Change of
Authorization
Enable RADIUS CoA: Allows to control configuration
parameters of SM using RADIUS CoA feature.
Disable RADIUS CoA: Disables RADIUS CoA feature.
SNMP
Table 6 RADIUS CoA SNMP object
Name OID MIB Access Syntax / Description
enableRadiusCoA
.1.3.6.1.4.1.161.19.3.1.1.224
WHISP-APS-MIB
read-write 0 - Disable RADIUS CoA.
1 - Enable RADIUS CoA.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 12 of 50
3.4 RADIUS VSA for Zero Touch
The RADIUS VSA (Vendor Specific Attributes) is updated for Zero Touch feature in system
release 13.4. This feature enables the ability for a SM to get its configuration via RADIUS
VSA. The RADIUS VSA is updated for an URL which points to the configuration file of SM.
The RADIUS will push the vendor specific attribute to SM after successful authentication.
The VSA contains URL of config file which will redirect SM to download configuration. If
there is any change in SM confirmation, the SM will reboot automatically after applying the
configuration.
The RADIUS VSA attributes concerning Zero Touch are as follows:
VSA Type String
Cambium-Canopy-ConfigFileImportUrl (29) string Maximum Length 127 characters.
Cambium-Canopy-ConfigFileExportUrl (30) string Maximum Length 127 characters.
The updated RADIUS dictionary can be downloaded from below link:
https://support.cambiumnetworks.com/files/pmp450/
Note:
The feature is not applicable to the AP.
3.5 Microsoft RADIUS support
This feature allows to configure Microsoft RADIUS (Network Policy and Access Services
a.k.a NPS) as Authentication server for SM and User authentication.
For SM Authentication, SM will user PEAP-MSCHAPv2 since NPS doesn't support TTLS
protocol.
For User Authentication, the Canopy software will use EAP-MD5 but the user has to do
certain configuration in order to enable EAP-MD5 on NPS.
Note:
All this configuration has been tested on Windows Server 2012
R2 version.
This feature is not supported on hardware board type P9 or lower
platforms.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 13 of 50
SM Authentication Configuration
Web Management Interface
There are no new configuration on AP. However SM has to be configured for PEAP
authentication protocol.
1. Go to Configuration > Security page
2. Select “eappeap” for Phase 1 attribute under tab AAA Authentication Settings.
Figure 4 EAPAPEAP settings
Note:
The Phase 2 will change automatically to MSCHAPv2 on select of Phase
1 attribute as EAP-PEAP. Other parameters of Phase 2 protocols like
PAP/CHAP will be disabled.
SNMP
Table 7 Microsoft RADIUS SNMP objects
Name OID MIB Access Syntax / Description
phase1 .1.3.6.1.4.1.161.19.3.2.7.4.0
WHISP-SM-MIB
read-write 2 - EAPAPEAP
phase2 .1.3.6.1.4.1.161.19.3.2.7.5.0
WHISP-SM-MIB
read-write 2 - EAPAPEAP
Note:
Please refer PMP 450 Configuration and User Guide for Windows Server
configuration and User Authentication configuration for Enabling EAP-MD5.
3.6 Custom frequency configuration at 1 KHz raster
This feature will allow users to configure custom frequency at 1 KHz raster. Prior to this
release, the custom frequency raster was 50 KHz.
In previous releases, the custom frequencies could be configured for 3356.10 MHz, 3302.35
MHz, 3680.40 MHz etc. whereas this feature allows to configure custom frequencies
3356.123 MHz, 3302.333 MHz, 3680.421 MHz etc. at granularity of 1 KHz.
This feature applies to 3.5 and 3.6 GHz radios only.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 14 of 50
Note:
If AP is running with 13.4 and transmitting at 1 KHz precision frequency,
the downgrade will be aborted.
If SM has ONLY 1 KHz precision frequencies selected in Custom Radio
Frequency Scan Selection List, the downgrade will be aborted. In
order to downgrade the radio successfully, at least one 50 KHz raster
frequency needs to be selected in Custom Radio Frequency Scan
Selection List.
AP and SMs will all need to be on at least release 13.4 to take advantage
of this feature.
SNMP
Table 8 Customer frequency list SNMP object
Name OID MIB Access Syntax / Description
addCustom FreqList
.1.3.6.1.4.1.161.19.3.3.2.53.0
WHISP-APS-MIB2-MIB
read-write Add Custom Frequencies. Frequencies list can be separated by commas. Max string length entered can’t exceed 128 characters.
RemoveCustomFreqList
.1.3.6.1.4.1.161.19.3.3.2.54.0
WHISP-APS-MIB2-MIB
read-write Remove Custom Frequencies.
3.7 Extrapolated Link Test
This feature allows users to estimate the link capacity by sending few packets and
measuring link quality. This feature extrapolates the link capacity in terms of throughput
based radio quality during test. This is an approximation test to have minimal service
impact.
Note:
This is not supported for PMP/PTP 100
Web Management Interface
The test can be run from GUI menu Tools > Link Capacity Test by selecting
“Extrapolated Link Test” for Link Test Mode attribute.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 15 of 50
Table 9 Extrapolated link test
Attribute Meaning
Link Test Mode Select “Extrapolated Link Test” to run extrapolated link
test.
Current Subscriber Module Select the SM or BHS from dropdown list on which the
“Extrapolated Link Test” to be performed.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 16 of 50
Figure 5 Extrapolated link test results
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 17 of 50
SNMP
Table 10 Extrapolated Link Test SNMP object
Name OID MIB Access Syntax / Description
linkTestModeBox
WHISP-BOX-MIBV2-MIB
read-write INTEGER
3.8 Frame Utilization Statistics
The Frame Utilization Statistics is a feature introduced for PMP 450 and PTP 450 in system
release 13.4 which helps the user to understand how effectively the RF channel is being
utilized. This feature allows to check Time Division Duplex (TDD) frame utilization pattern
and diagnose for any excessive usage in uplink or downlink direction.
This forms the first step for identifying the TDD frame utilization information. If the user
finds excessive utilization based on these statistics, the second step would be to take
several actions like sectorization, tuning the uplink/downlink ratio etc. to improve RF
channel utilization. The efficient use of TDD frame will help to achieve optimum
performance of link.
Note:
The backhauls (BHM and BHS) will have only the downlink scheduler based
statistics.
Web Management Interface
The test can be run GUI menu Statistics > Frame Utilization.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 18 of 50
Table 11 Frame utilization statistics
Attribute Meaning
Frame Utilization Interval
Statistics Display interval Selects how often the frame utilization statistics are refreshed and displayed. The user can select display interval as 1 minute (low interval), 5 minutes (medium interval) or 15 minutes (high interval) based on requirement.
Frame Utilization
Downlink This indicates the percentage of downlink data slots used against the maximum number of slots possible in configured interval.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 19 of 50
Uplink This indicates the percentage of uplink data slots used against the maximum number of uplink slots possible in configured interval.
Downlink Counts
Total This indicates the sum of all downlink data slots used in the configured interval.
Low Priority The number of downlink data slots used for low priority downlink traffic.
High Priority The number of downlink data slots used for high priority downlink traffic.
Broadcast/Multicast The number of downlink data slots used for broadcast and multicast traffic.
Canopy MAC Acknowledgements
The number of downlink data slots used as ACKs.
Registration and Control message slots
The number of downlink data slots used for registration and other control messages.
Uplink Counts
Total This indicates the sum of all uplink data slots used in configured interval.
Low Priority The number of downlink data slots used for low priority uplink traffic.
High Priority The number of downlink data slots used for high priority downlink traffic.
Canopy MAC Acknowledgements
The number of downlink data slots used as ACKs.
Maximum possible counts
Downlink This indicates the maximum possible downlink data slots. This is based on the configuration of Channel Bandwidth, Frame period, uplink/downlink allocation, contention slots and configured Statistics Display interval.
Uplink This indicates the maximum possible uplink data slots. This is based on the configuration of Channel Bandwidth, Frame period, uplink/downlink allocation, contention slots and configured Statistics Display interval.
Packet Discard counts
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 20 of 50
Ethernet indiscards This indicates the number of Ethernet packets discarded in the IN queue.
Ethernet outdiscards This indicates the number of Ethernet packets discarded in the OUT queue.
Radio indiscards This indicates the number of packets discarded over radio in the IN queue.
Radio outdiscards This indicates the number of packets discarded over radio in the OUT queue.
SNMP
Table 12 Frame Utilization Test SNMP Group objects
Name OID MIB Access Syntax / Description
whispApsFrUtlStats
.1.3.6.1.4.1.161.19.3.1.12
WHISP-APS-MIB
- -
whispApsFrUtlStatsIntervalLow
.1.3.6.1.4.1.161.19.3.1.12.1
WHISP-APS-MIB
- For low interval
whispApsFrUtlStatsIntervalMedium
.1.3.6.1.4.1.161.19.3.1.12.2
WHISP-APS-MIB
- For medium interval
whispApsFrUtlStatsIntervalHigh
.1.3.6.1.4.1.161.19.3.1.12.3
WHISP-APS-MIB
- For high interval
Table 13 Frame Utilization Test SNMP objects for low, medium and high intervals
Name
OID
Syntax / Description
Low Interval Medium Interval High Interval
frUtlHighTotalDow
nlinkUtilization
.1.3.6.1.4.1.161.19.
3.1.12.1.1
.1.3.6.1.4.1.161.19.
3.1.12.2.1
.1.3.6.1.4.1.161.19.
3.1.12.3.1
Percentage of total
downlink
frUtlLowTotalUplin
kUtilization
.1.3.6.1.4.1.161.19.
3.1.12.1.2
.1.3.6.1.4.1.161.19.
3.1.12.2.2
.1.3.6.1.4.1.161.19.
3.1.12.3.2
Percentage of total
uplink
frUtlLowTotalDown
linkSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.3
.1.3.6.1.4.1.161.19.
3.1.12.2.3
.1.3.6.1.4.1.161.19.
3.1.12.3.3
Total downlink data
slots
frUtlLowDownlinkL
owPrioSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.4
.1.3.6.1.4.1.161.19.
3.1.12.2.4
.1.3.6.1.4.1.161.19.
3.1.12.3.4
Number of data slots
used for downlink low
priority traffic
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 21 of 50
Name
OID
Syntax / Description
Low Interval Medium Interval High Interval
frUtlLowDownlinkH
iPrioSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.5
.1.3.6.1.4.1.161.19.
3.1.12.2.5
.1.3.6.1.4.1.161.19.
3.1.12.3.5
Number of data slots
used for downlink
high priority traffic
frUtlLowDownlinkB
castSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.6
.1.3.6.1.4.1.161.19.
3.1.12.2.6
.1.3.6.1.4.1.161.19.
3.1.12.3.6
Number of data slots
used for downlink
Broadcast/Multicast
traffic
frUtlLowDownlinkA
ckSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.7
.1.3.6.1.4.1.161.19.
3.1.12.2.7
.1.3.6.1.4.1.161.19.
3.1.12.3.7
Number of data slots
used for downlink
Canopy MAC Acks
frUtlLowDownlinkC
ntlMsgSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.8
.1.3.6.1.4.1.161.19.
3.1.12.2.8
.1.3.6.1.4.1.161.19.
3.1.12.3.8
Number of data slots
used for downlink
registration control
message
frUtlLowTotalUplin
kSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.9
.1.3.6.1.4.1.161.19.
3.1.12.2.9
.1.3.6.1.4.1.161.19.
3.1.12.3.9
Total uplink data slots
frUtlLowUplinkLow
PrioSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.10
.1.3.6.1.4.1.161.19.
3.1.12.2.10
.1.3.6.1.4.1.161.19.
3.1.12.3.10
Number of data slots
used for uplink low
priority traffic
frUtlLowUplinkHiPr
ioSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.11
.1.3.6.1.4.1.161.19.
3.1.12.2.11
.1.3.6.1.4.1.161.19.
3.1.12.3.11
Number of data slots
used for uplink high
priority traffic
frUtlLowUplinkAck
Slots
.1.3.6.1.4.1.161.19.
3.1.12.1.12
.1.3.6.1.4.1.161.19.
3.1.12.2.12
.1.3.6.1.4.1.161.19.
3.1.12.3.12
Number of data slots
used for uplink
Canopy MAC Acks
frUtlLowMaxDownli
nkSlots
.1.3.6.1.4.1.161.19.
3.1.12.1.13
.1.3.6.1.4.1.161.19.
3.1.12.2.13
.1.3.6.1.4.1.161.19.
3.1.12.3.13
Maximum possible
downlink data slots
frUtlLowMaxUplink
Slots
.1.3.6.1.4.1.161.19.
3.1.12.1.14
.1.3.6.1.4.1.161.19.
3.1.12.2.14
.1.3.6.1.4.1.161.19.
3.1.12.3.14
Maximum possible
uplink data slots
frUtlLowEthInDisca
rds
.1.3.6.1.4.1.161.19.
3.1.12.1.15
.1.3.6.1.4.1.161.19.
3.1.12.2.15
.1.3.6.1.4.1.161.19.
3.1.12.3.15
Number of incoming
Ethernet packets
discarded
frUtlLowEthOutDis
cards
.1.3.6.1.4.1.161.19.
3.1.12.1.16
.1.3.6.1.4.1.161.19.
3.1.12.2.16
.1.3.6.1.4.1.161.19.
3.1.12.3.16
Number of outgoing
Ethernet packets
discarded
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 22 of 50
Name
OID
Syntax / Description
Low Interval Medium Interval High Interval
frUtlLowRFInDiscar
ds
.1.3.6.1.4.1.161.19.
3.1.12.1.17
.1.3.6.1.4.1.161.19.
3.1.12.2.17
.1.3.6.1.4.1.161.19.
3.1.12.3.17
Number of incoming
radio packets
discarded
frUtlLowRFOutDisc
ards
.1.3.6.1.4.1.161.19.
3.1.12.1.18
.1.3.6.1.4.1.161.19.
3.1.12.2.18
.1.3.6.1.4.1.161.19.
3.1.12.3.18
Number of outgoing
radio packets
discarded
3.9 Last run time for Link Capacity Test
This is an enhancement which allows the users to see date and time of last performed Link
Capacity Test. If there is any change in time zone, the date and time will be adjusted
accordingly.
Figure 6 Link Test
SNMP
Table 14 Link Test last run time SNMP object
Name OID MIB Access Syntax / Description
linkTestLastRunTime
.1.3.6.1.4.1.161.19.3.3.18.2.55.0
WHISP-BOX-MIBV2-MIB
read-only DISPLAYSTRING
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 23 of 50
3.10 Disable SM authentication
This feature allows the user to disable authentication for SM connected via ICC. This option
is useful to achieve zero touch configuration if authentication is enabled on AP.
Note:
If a SM is connected to an AP via the ICC method, the SM will disable
bridging of customer traffic to enforce security.
Web Management Interface
The feature can be enabled or disabled configuration > security > Authentication Server
settings tab.
Table 15 Disable authentication for SM
Attribute Meaning
Disable Authentication
for SM connected via ICC
Enabled: SM authentication is disabled when SM
connects via ICC (Installation Color Code).
Disabled: SM authentication is enabled.
SNMP
Table 16 PMP 430 SM registration SNMP object
Name OID MIB Access Syntax / Description
disableAuthForICCSM
.1.3.6.1.4.1.161.19
.3.1.1.226 WHISP-APS-MIB
read-write INTEGER {disabled(0),
enabled(1)}
3.11 Interop SM Registration
This feature allows the user to control whether PMP 430 SMs are allowed to register to
PMP 450 APs. It adds a configuration option on the AP to reject registration from PMP 430
SM. By default, PMP 430 SM registrations are accepted. When this configuration option is
set to disabled, PMP 430 SM’s registrations fail with reject reason 8. This will cause SMs to
lock out the AP for 15 minutes.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 24 of 50
Web Management Interface
The PMP 430 SM registration can be configured in GUI menu Configuration > Radio >
Advance tab.
Figure 7 PMP 430 SM registration
Figure 8 PMP 430 SM registration failures
Note:
This option is not displayed if the Frame Period is set to 5 ms.
This option applies only to PMP 450 5 GHz APs.
SNMP
Table 17 PMP 430 SM registration SNMP object
Name OID MIB Access Syntax / Description
pmp430SMRegistration
.1.3.6.1.4.1.161.19
.3.1.1.225 WHISP-APS-MIB
read-write INTEGER {disabled(0), enabled(1)}
3.12 Update the SNMPv2c community string without reboot
This feature allows the user to modify the SNMP community string without needing to
reboot the radio for the changes to take effect.
3.13 Event log for user initiated reboot
This creates an event log entry for "User Initiated Reset" in the system log. Prior to system
release 13.4, all reboots on P10 platform and later were logged as “watchdog reset”. With
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 25 of 50
this enhancement, the system log will indicate “User Initiated Reset” for user initiated
reboots and “watchdog reset” for system forced reboots.
Figure 9 User initiated reboot system log
3.14 SNMP support to do an AP Evaluation from a SM
This is an enhancement which provides SNMP OID to force a SM to rescan and perform an
AP Evaluation.
Table 18 PMP 430 SM registration SNMP object
Name OID MIB Access Syntax / Description
whispSmControls.rescan
.1.3.6.1.4.1.161.19
.3.2.8.2 WHISP-SM-MIB
read-write INTEGER
a nonzero value will start the rescan
3.15 Country code for Malaysia
The new Country code for Malaysia is added under Configuration > General > Regional
Settings tab. This country Code will restrict operation of PMP 450 GHz 5 GHz radio in
frequency range 5725 to 5875 MHz. There is no change in EIRP limit.
Figure 10 Country code Malaysia
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 26 of 50
3.16 SNMPv3 Auth and Privacy Password length check
This is an enhancement which ensures that SNMPv3 Auth and Privacy password length is
not less than 8 digits.
SNMP
The following SNMP objects are modified:
Table 19 PMP 430 SM registration SNMP object
Name OID MIB Access Syntax / Description
roAuthPassword
.1.3.6.1.4.1.161.19
.3.3.14.7 WHISP-BOX-MIBV2-MIB
read-write
SNMPv3 Read-Only Message authentication password. Minimum 8 and maximum 32 characters long
-
roPrivPassword
.1.3.6.1.4.1.161.19
.3.3.14.8
rwAuthPassword
.1.3.6.1.4.1.161.19
.3.3.14.11
rwPrivPassword
.1.3.6.1.4.1.161.19
.3.3.14.12
3.17 Features supported in PMP/PTP 100
In system release 13.4, the features are propagated to PMP/PTP 100 from previous release.
The following features are now supported for PMP/PTP 100:
3.17.1 SECTOR SPECTRUM ANALYZER
In Sector Spectrum Analyzer mode, the AP and SM perform spectrum analysis at the same
time.
The Sector SA can be initiated from AP specifying the scan duration. AP and all SMs in the
sector will stop transmitting and start scanning the spectrum. AP will scan longer time to
make sure that all the SMs do not receive the AP’s transmission. After the scan, radios
resume normal operation with the AP starting beacon transmission and the SMs connecting
to the AP.
Web Management Interface
1) Go to Tools > Spectrum Analyzer > Spectrum Analyzer Options tab.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 27 of 50
Table 20 Spectrum Analyzer Options configuration
Attribute Meaning
SM/BHS Scanning
Bandwidth
Selecting channel bandwidth for scanning. It is only
applicable for SM or BHS to scan spectrum for selected
channel bandwidth, whereas BHM will scan for currently
configured bandwidth.
2) Go to Tools > Spectrum Analyzer > Min and Max Frequencies tab.
Table 21 Spectrum Analyzer – Min and Max Frequencies configuration
Attribute Meaning
Min and Max
Frequencies in KHz
Enter minimum and maximum range of frequencies for
Spectrum analysis in KHz
Set Min And Max To Full
Scan
On button click, full support range of radio populated as
minimum and maximum frequencies
Set Min And Max To
Center Scan +/- 40 MHz
On button click, minimum and maximum frequencies are
populated from center frequency +/- 40 MHz
3) Go to Tools > Spectrum Analyzer > Timed Spectrum Analyzer tab.
Table 22 Spectrum Analyzer – Timed Spectrum Analyzer configuration
Attribute Meaning
Duration Enter scanning duration in second (10 to 1000) to
perform spectrum analysis.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 28 of 50
Note: AP scans purposely go longer than the configured
duration. This is to ensure the SM will not receive RF
energy from AP and the same would be reported in
spectrum analysis reports.
Start Timed Sector
Spectrum Analysis
Press the button to start spectrum analysis on entire
sector.
4) The Spectrum Analysis result for AP is displayed on Tools > Spectrum Analyzer >
Results tab whereas SM spectrum analysis result is available on Tools > Remote
Spectrum Analyzer > Remote results tab.
3.17.2 READ-ONLY WEB USER
This feature allow to configure a Read-Only user account who can only view the
configuration and statistics of radio. The Read-Only user can be created by “Admin”,
“Installer” and “Technician” privilege level login.
Web Management Interface
1) For creating Read-Only account, login as Admin and go to Accounts > Add User >
Add User tab.
Table 23 Read-Only web user – Add User
Attribute Meaning
Add user This allows to assign name to new user account.
Level This allows to set access level of user account:
ADMINISTRATOR, who has full read and write
permissions.
INSTALLER, who has permissions identical to those of
ADMINISTRATOR except that the installer cannot add or
delete users or change the password of any other user.
TECHNICIAN, who has permissions to modify basic
radio parameters and view informational web pages.
GUEST, who has no write permissions and only a limited
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 29 of 50
view of General Status tab. The Guest Level is the GUI
screen you see when you first access the radio URL
before login.
New Password This field allows to set the password for new user
account.
Confirm Password Reconfirm the entered password.
User Mode This attribute facilitates to convert a configured user to a
Read-Only user.
2) The user mode for Read-Only can be updated in Accounts > Add User > Update
Mode tab.
Table 24 Read-Only web user – Update Mode
Attribute Meaning
User This allows to select user from list to modify user mode.
User Mode This attribute facilitates to convert a configured user to a
Read-Only user.
3) To View User Accounts, go to Accounts > User.
Table 25 Read-Only web user – view the user mode
SNMP
The Read-only accounts can also be created via SNMP with the new userMode (type of
integer - 1=Read-Only 0=Read-Write) OID. Please be sure that this is not the last OID
being set if the userName, userPassword, userMode and userLevel OIDs are being used.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 30 of 50
Table 26 Read-Only web user SNMP objects
Name OID MIB Access Syntax / Description
userName .1.3.6.1.4.1.161.19.3.3.2.45.0
WHISP-BOX-MIBV2-MIB
Read-Write DISPLAYSTRING
userMode .1.3.6.1.4.1.161.19.3.3.2.171.0
WHISP-BOX-MIBV2-MIB
Read-Write INTEGER
1=Read-Only 0=Read-Write
userPassword .1.3.6.1.4.1.161.19.3.3.2.46.0
WHISP-BOX-MIBV2-MIB
Read-Write DISPLAYSTRING
userAccessLevel
.1.3.6.1.4.1.161.19.3.3.2.47.0
WHISP-BOX-MIBV2-MIB
Read-Write INTEGER
RADIUS
Remote authentication using RADIUS can also be used to support Read-Only users. The
necessary changes to be done in order to AP or SM to support Remote authentication.
Remote Read-Only accounts can be created by using the new “Cambium-Canopy-
UserMode” (51) VSA in conjunction with the existing “Cambium-Canopy-UserLevel” (50)
VSA which both can be found in the new 13.4 Dictionary file.
Cambium-Canopy-UserMode
Type: Integer
Usage: Optional, (1=Read-Only user, 0=Read-Write), to maintain backward compatibility,
when this attribute is not used, account access will be of type Read-Write.
Add this attribute in user’s database of RADIUS servers e.g. users.conf in freeradius like
this way
ATTRIBUTE
Cambium-Canopy-UserMode 51 integer
#UserMode permission for the User logging in remotely(1=Read-Only 0=Read-
Write)
Note:
Please use the latest Dictionary file for the ability to login with a “Read
Only” account with Remote User Authentication.
For example, to create a remote Read Only “Installer” account the properties for the remote
user on RADIUS Server can be set to the following:
Cambium-Canopy-UserLevel = 2 # Values 1 à Admin, 2 à Installer, 3 à Tech
Cambium-Canopy-UserMode = 1 # Values 1 à Read-Only, 0 à Read-Write
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 31 of 50
3.17.3 SM TO SUPPORT 20 COLOR CODES
This is an enhancement to increase the number of supported color codes from 10 to 20. This
will allow user to configure upto 20 SM color codes for all platforms.
Web Management Interface
1) Go to Configuration > Radio > Radio configuration tab:
Table 27 Color Code – Color code 1 configuration
Attribute Meaning
Color Code 1 It is first primary color code which allows to force SM to
register to only a specific AP.
2) The rest of 19 color codes can be configured in Configure > Radio >Additional color
code tab.
Table 28 Color Code – additional Color code configuration
Attribute Meaning
Color Code It is allows to configure remaining 19 color codes and its
priority.
Add/Modify Color Code This button allows to either add a new Color Code or
modify priority of an existing Color Code
Remove Color Code This button allows to delete the Color Code
SNMP
The new SNMP OIDs are given in below table:
Table 29 SM color code SNMP objects
Name OID MIB Access Syntax / Description
additionalColorCode
.1.3.6.1.4.1.161.19.3.2.1.152.0
WHISP-SM-MIB
read-write INTEGER (0..254)
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 32 of 50
Name OID MIB Access Syntax / Description
additionalColorCodePriority
.1.3.6.1.4.1.161.19.3.2.1.153.0
WHISP-SM-MIB
read-write INTEGER {primary(1), secondary(2), tertiary(3)}
deleteAdditionalColorCod
.1.3.6.1.4.1.161.19.3.2.1.154.0
WHISP-SM-MIB
read-write INTEGER (0..254)
whispSmColorCodeTable
.1.3.6.1.4.1.161.19.3.2.9
WHISP-SM-MIB
not-accessible
current
The Older release OIDs colorcodes 2 to 10 are deprecated. It can be used to set 2 -10 color
codes. Please note that either we can use older OIDs or newer ones. Using both sets
interchangeably is not supported.
3.17.4 EXPORT OF SESSION STATUS
The feature enables user to export session status page from web management interface of
AP of PMP/PTP 100. The session status page will be exported in xml file.
Web Management Interface
The user can login to AP Web Management interface and go to Session Status page. There
is hyperlink displayed on top as SessionStatus.xml for download
Figure 11 Export of session status page
In case, the session status page does not list any SM, the SessionStatus.xml will still be
visible but the file would be empty. The file will contain data from all of the 5 different
tables.
Export from command line
The users can also get this file from command line. The user has to authenticate
successfully in order to download the file.
wget http://169.254.1.1/SessionStatus.xml?CanopyUsername=test&CanopyPassword=test
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 33 of 50
3.17.5 ICC INDICATION AND CC PRIORITY FIELD IN SESSION STATUS
The Device tab of Session Status page will indicate if a SM is connected via Installation
Color Code (ICC) method. The State field will display “IN SESSION (ICC)” for all ICC
connected SMs as shown below.
Table 30 Device tab ICC indication
In Session tab, the CC (Color Code) Priority field is added to display SM’s Color Code
Priority. The field will display color code priority (ICC, Primary, Secondary or Tertiary) of all
connected SM.
Table 31 Session tab with CC Priority
3.17.6 HTTPS
The HTTPs provides a secured web management interface. To access web management
over https, the ‘https’ has to be used in browser before URL. User will be prompted a
warning message about Un-trusted certificate. The user can accept and proceed with
secured communication. The SM can also be accessed over https proxy.
Web Management Interface
1) The HTTPS for each radio (AP/SM) can be enabled in under Configuration > Security > Security Mode tab :
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 34 of 50
Table 32 HTTPS – web access security mode
Attribute Meaning
Web Access HTTP only: This allows to access web interface over HTTP only.
HTTPs only: This allows to configure web interface access over
HTTPs only.
HTTP and HTTPs: It allows both HTTP and HTTPs.
Note:
User may experience slow GUI response with https.
SNMP
Table 33 HTTPs SNMP objects
Name OID MIB Access Syntax / Description
webAccess .1.3.6.1.4.1.161.19.3.3.2.155.0
WHISP-BOX-MIBV2-MIB
Read-write INTEGER { httponly(0), httpsonly(1), httpandhttps(2)}
This variable determines if only HTTP or HTTPs connection are allowed.
0: HTTP only(default)
1: HTTPs Only
2: HTTP and HTTPs
httpsPort .1.3.6.1.4.1.161.19.3.2.152
WHISP-BOX-MIBV2-MIB
Read-write
INTEGER
Port used to for HTTPs. Default is 443.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 35 of 50
Name OID MIB Access Syntax / Description
webAccess .1.3.6.1.4.1.161.19.3.3.2.155.0
WHISP-BOX-MIBV2-MIB
Read-write INTEGER { httponly(0), httpsonly(1), httpandhttps(2)}
This variable determines if only HTTP or HTTPs connection are allowed.
0: HTTP only(default)
1: HTTPs Only
2: HTTP and HTTPs
3.17.7 SNMPV3
The SNMPv3 provides a secure method to perform SNMP operations. SNMPv3 IETF
STD062 has been added as part of release 13.3 and onwards. This standard provides
services for authentication, data integrity and message encryption over SNMP.
Note:
The SNMPv3 statistics page may not be displayed properly with Google Chrome browser.
Some tables are missing in the SNMPv3 Statistics Page. The SNMPv3 Data is present on the page, but it is not listed in tabular form.
Web Management Interface
The SNMPv3 for a radio (AP/SM) can be enabled in Security Mode tab under configuration
> Security page.
1) Enable SNMPv3 for AP/SM in Configuration > Security > Security Mode tab.
Table 34 Enabling SNMPv3
Attribute Meaning
SNMP SNMPv2c only: This allows SNMPv2c agent only.
SNMPv3 only: This allows SNMPv3 agent only.
SNMPv2c and SNMPv3: This allows SNMPv2c and
SNMPv3 agents.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 36 of 50
Note
- With ‘SNMPv3 Only’ enabled, all SNMPv2c requests will be ignored.
- Any user with the correct SNMPv2c community string can set these
parameters. It is recommended that SNMPv3 needs to be used for added
security.
2) Enable SNMPv3 for AP/SM in Configuration > Security > SNMPv3 settings tab.
Table 35 SNMPv3 settings
Attribute Meaning
Engine ID The Engine ID is unique authoritative engine for each radio.
This attribute allows to configure Engine ID between 5 to 32
hex characters. The default ID is the MAC address of the
radio.
SNMPv3 Security Level This field allows to configure security model where users are
defined and authenticated before granting access to any
SNMP service. Each device can configure the security level
of SNMPv3 to No authentication/No privacy,
Authentication/No privacy, or Authentication/Privacy.
SNMPv3 Authentication
Protocol
Currently, the SNMPv3 authentication protocol MD5 is
supported.
SNMPv3 Privacy Protocol Currently, the SNMPv3 privacy protocol CBC-DES is
supported.
SNMPv3 Read-Only User This field allows for a read-only user per devices. The default
values for the Read-Only users is:
Username = Canopyro
Authentication Password = authCanopyro
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 37 of 50
Privacy Password = privacyCanopyro
SNMPv3 Read/Write
User
Read-write user by default is disabled. The default values for
the Read/Write users is :
Username = Canopy
Authentication Password = authCanopy
Privacy Password = privacyCanopy
SNMPv3 Trap
Configuration
By default transmission of SNMPv3 traps is disabled and all
traps sent from the radios are in SNMPv2c format.
SNMP
Table 36 SNMPv3 objects
Name OID MIB Access Syntax / Description
snmpStatus .1.3.6.1.4.1.161.19.3.3.2.167.0
WHISP-BOX-MIBV2-MIB
Read-write INTEGER {snmpv2only(1), snmpv3only(2), snmpv2andsnmpv3(3)}
This variable determines SNMP operation mode.
1: SNMPv2c(default)
2: SNMPv3 only
3: SNMPv2c and SNMPv3
snmpv2cEnable .1.3.6.1.4.1.161.19.3.3.14.1
WHISP-BOX-MIBV2-MIB
Read-write INTEGER{enable(1),disable(0)}
Enable(1) or Disable(0) SNMPv2c access
snmpv3EngineId .1.3.6.1.4.1.161.19.3.3.14.2
WHISP-BOX-MIBV2-MIB
Read-write Octet String(Size (5..32))
The SNMPv3 engine administratively-unique identifier
snmpv3SecLvl .1.3.6.1.4.1.161.19.3.3.14.3
WHISP-BOX-MIBV2-MIB
Read-write INTEGER {noAuth-noPriv(0),
auth-noPriv(1),
auth-priv(2)}
snmpv3AuthProt .1.3.6.1.4.1.161.19.3.3.14.4
WHISP-BOX-MIBV2-MIB
Read-write INTEGER {md5(0)} The security level of the SNMPv3 Engine. noAuth-noPriv(0), auth-noPriv(1), auth-priv(2)
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 38 of 50
Name OID MIB Access Syntax / Description
snmpv3PrivProt .1.3.6.1.4.1.161.19.3.3.14.5
WHISP-BOX-MIBV2-MIB
Read-write INTEGER {cbc-des(0)}
The SNMPv3 message privacy/encryption protocol to use. Currently only CBC-DES(0) is supported.
roUserName .1.3.6.1.4.1.161.19.3.3.14.6
WHISP-BOX-MIBV2-MIB
Read-write OCTET STRING (SIZE (1..32))
SNMPv3 Read-Only username.
roAuthPassword .1.3.6.1.4.1.161.19.3.3.14.7
WHISP-BOX-MIBV2-MIB
Read-write OCTET STRING (SIZE (1..32))
SNMPv3 Read-Only message authentication password.
roPrivPassword .1.3.6.1.4.1.161.19.3.3.14.8
WHISP-BOX-MIBV2-MIB
Read-write OCTET STRING (SIZE (1..32))
SNMPv3 Read-Only message privacy/encryption password
rwUserEnable .1.3.6.1.4.1.161.19.3.3.14.9
WHISP-BOX-MIBV2-MIB
Read-write INTEGER {enable(1),
disable(0)}
rwUserName .1.3.6.1.4.1.161.19.3.3.14.10
WHISP-BOX-MIBV2-MIB
Read-write OCTET STRING (SIZE (1..32))
SNMPv3 Read-Write user enable(1) or disable(0).
rwAuthPassword .1.3.6.1.4.1.161.19.3.3.14.11
WHISP-BOX-MIBV2-MIB
Read-write OCTET STRING (SIZE (1..32))
SNMPv3 Read-Write message authentication password.
rwPrivPassword .1.3.6.1.4.1.161.19.3.3.14.12
WHISP-BOX-MIBV2-MIB
Read-write OCTET STRING (SIZE (1..32))
SNMPv3 Read-Write message privacy/encryption password
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 39 of 50
Name OID MIB Access Syntax / Description
snmpv3TrapEnabl
e .1.3.6.1.4.1.161.19.3.3.14.13
WHISP-BOX-MIBV2-MIB
Read-write INTEGER {disabled(0),
roUserTrapEnable(1),
rwUserTrapEnable(2)}
SNMPv3 trap enable option. Disable(0), Read-Only user traps send(1), Read-Write user traps sent(2). When disabled SNMPv2c traps are sent.
3.17.8 ENABLE/DISABLE SUPPORT FOR TELNET, FTP AND TFTP
The telnet/ftp/tftp enabled/disabled control is added for PMP/PTP 100 in system release
13.4.
Web Management Interface
The telnet/ftp/tftp enabled/disabled can be configured in configuration > Security >
Security Mode tab. The admin login privilege is required in order to enable/disable these
features.
Figure 12 Security mode configuration
SNMP
Table 37 Telnet, ftp and tftp SNMP objects
Name OID MIB Access Syntax / Description
ftpStatus .1.3.6.1.4.1.161.19.3.3.2.169.0
WHISP-BOX-MIBV2-MIB
Read-write INTEGER {disableftp(0),
enableftp(1)}
This variable determines if FTP to enabled or not.
0: Disable FTP
1: Enable FTP(default)
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 40 of 50
Name OID MIB Access Syntax / Description
tftpStatus .1.3.6.1.4.1.161.19.3.3.2.170.0
WHISP-BOX-MIBV2-MIB
Read-write INTEGER {disabletftp(0),
enabletftp(1)}
This variable determines if TFTP is enabled or not.
0: Disable TFTP
1: Enable TFTP(default)
3.17.9 IMPORT AND EXPORT OF CONFIGURATION FILE
The release 13.4 supports import and export of configuration from the AP or SM or BH as a
text file for PMP/PTP 100. The configuration file is in JSON format. To be able to export or
import the configuration file, the logged in user needs to be an Administrator.
The exported configuration file contains the complete configuration including all the default
values. To keep a backup of the current configuration, the file can be saved as-is and
imported later.
While importing a configuration file, either a full configuration or a sparse configuration
containing only the items that need to be changed can be loaded. If a sparse configuration
file is imported, only the items listed in the file will be imported. Other configuration
settings will remain unchanged. There can also be used a special flag in the configuration
file to tell the device to apply the configuration starting from factory default settings. See
the "Special headers for configuration file" section below.
Web Management Interface
1) Go to Configuration > Unit Settings page to export and import of config file.
Table 38 Export and import of config file
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 41 of 50
Attribute Meaning
Configuration File This allows to download configuration file of the radio
(AP/SM). The configuration file is hyperlink which has
name as <mac address>.cfg
Choose File This allows to select .cfg file for upload or export of the
configuration.
Upload This allows to upload or export of selected file through
“Choose File”.
Apply Configuration File This is to apply uploaded/imported file to radio (AP/SM)
SNMP
1) Export the configuration file via SNMP:
The configuration file can be exported to an FTP server using the WHISP-BOX-MIBV2-
MIB::exportConfigFile (.1.3.6.1.4.1.161.19.3.3.3.8) OID. Pass the FTP URL as a parameter.
The username/password can be included in the URL using the standard convention (see
example below). Also make sure the FTP server location has write access enabled so the
configuration file can be saved here.
Example:
$ snmpset -v 2c -c Canopy 192.168.0.1 .1.3.6.1.4.1.161.19.3.3.3.8.0 s
ftp://user:[email protected]/config.json
2) Import the configuration file via SNMP:
The configuration file can be imported from an FTP server using the WHISP-BOX-MIBV2-
MIB::importConfigFile (.1.3.6.1.4.1.161.19.3.3.3.7) OID. Copy the configuration file to an
FTP server that is reachable from the AP or SM. Then invoke the above OID with the FTP
URL as the parameter. This will result in the configuration file getting downloaded and
imported into the device. Reboot the device to boot up with the new configuration.
Example:
$ snmpset -v 2c -c Canopy 192.168.0.1 .1.3.6.1.4.1.161.19.3.3.3.7.0 s
ftp://user:[email protected]/config.json
Any error messages for the import and export operation can be found in the system logs.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 42 of 50
3.17.10 DHCP OPTION 66
The DHCP option 66 enables radio to auto-configure connected equipment’s via a server.
The below link has more detail on how to configure and use this feature.
http://community.cambiumnetworks.com/t5/PMP-Beta/PMP-13-3-beta-Zero-Touch-
Configuration-Using-DHCP-Option-66/m-p/37823/thread-id/158
3.17.11 ZERO-TOUCH CONFIG
The “Zero touch config” is an additional use case for the config file feature as described in
Import and export of configuration file. This feature extends the Installer Color Code feature
by enabling DHCP while connected to an AP with ICC. The forum post for the DHCP Option
66 listed above has more information on the Zero-touch configuration as well.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 43 of 50
4 PROBLEMS AND LIMITATIONS CORRECTED
Table 39 System Release 13.4 problems and limitations corrected
Products
Affected
Tracking Description Resolution
CNUT CPY-257 PMP430 SM is updated with
PMP 450 package only if
this is the first package in
the list of packages in
CNUT.
The problem has been resolved
in CNUT 4.8.1.
All CPY-8723 AP/SM reboot when receives
malformed telnet packet
The problem has been resolved
in System Release 13.4 for
malformed telnet packet. This
was seen when it was
connected to an Internet
accessible IP address.
PMP 450
SM
CPY-8727 No traffic flow after radar
detections despite SM is “in
Session” state
The problem has been resolved
in System Release 13.4.
All CPY-9498 Bridge table does not report
more than 255 MAC
addresses from SNMP
The problem has been resolved
in System Release 13.4.
PMP/PTP
450
CPY-10188 SNMP whispLinkTable
objects which have string
values of dBm, are required
in integer.
The problem has been resolved
in System Release 13.4.
PMP 450
AP
CPY-10202 Customers using Sync
Injectors may see timing
issues when the AP tries to
use the iGPS as a sync
source. Please contact
Cambium Customer Support
if you are having problems
in the area.
The problem has been resolved
in System Release 13.4.
All CPY-10318 In some cases, Enabling and
Disabling of telnet may
require a reboot to take
effect.
The problem has been resolved
in System Release 13.4.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 44 of 50
Products
Affected
Tracking Description Resolution
PMP 450 CPY-10418 When the static IP
configured SM registers to
AP with ICC, the DHCP gets
enabled in SM and IP
address changes public IP.
The problem has been resolved
in System Release 13.4.
All CPY-10423 Engine ID does not Follow
Requirements for 13.3. The
Engine ID cannot be entered
in odd size.
The problem has been resolved
in System Release 13.4.
PTP 450 CPY-10437 PTP 450 5GHz radio will not
link if 5.4GHz band is
selected on Master and both
5.4/5.7 bands are selected
for scan on Slave side
The problem has been resolved
in System Release 13.4.
All CPY-10483 IPv6 Filter settings reset all
existing IPv4 filter
configurations
The problem has been resolved
in System Release 13.4.
PMP 450 CPY-10484 SM shows reboot required
after uploading a config file
when there were no changes
in config file.
The problem has been resolved
in System Release 13.4.
All CPY-10627 SNMPv2 Community string
modification should not
require a reboot to take
effect
The problem has been resolved
in System Release 13.4.
PMP 450 CPY-10654 The control messages and
MIMO rate adapt algorithm
does not restore the
previous values after
clicking “Undo Saved
Changes”.
The problem has been resolved
in System Release 13.4.
All CPY-10672 SNMP object userMode
returns other than 0 or 1
value if the user tries to
read or set multiple times.
The problem has been resolved
in System Release 13.4.
All CPY-10683 Variable length subnet mask
does not work for .255 and 0
address.
The problem has been resolved
in System Release 13.4.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 45 of 50
Products
Affected
Tracking Description Resolution
PTP 230 CPY-10730 BHS restarts due to error
“FeatureKeyDecrypt() Error
CRC mismatch”.
The problem has been resolved
in System Release 13.4.
PMP 100 CPY-10759 On occasion with a 900 AP,
the user may see a "this
function is not supported on
this platform!" message.
The problem has been resolved
in System Release 13.4.
PMP 450
AP
CPY-10780 Alternate frequency settings
are not displayed in AP
under DFS tab.
The problem has been resolved
in System Release 13.4.
PMP 430
SM
CPY-10813 Uplink 3X (64-QAM)
throughput degradation
observed with PMP 430 SM
on release 13.2 and
13.2.1.x.
The problem has been resolved
in System Release 13.4.
All
CPY-10859 Config file can be
downloaded without logging
into radio using direct link
This problem has been
resolved in System Release
13.4.
All CPY-10881 Duplicate entries are
displayed for Bridge table
on AP, SM and BH
This problem has been
resolved in System Release
13.4.
All CPY-10888 Config file upload changes
encryption setting from DES
to AES for AP if the config
file is downloaded from
same AP and it is configured
for DES.
This problem has been
resolved in System Release
13.4.
PMP 450 CPY-10903
CPY-10600
SM’s alignment tone
continues buzzing even after
restart of SM or
disconnection from AP
This problem has been
resolved in System Release
13.4.
All CPY-10911 SM reboots when SM is in
NAT mode and NAT table is
filled with 2048 entries
This problem has been
resolved in System Release
13.4.
PTP 450 CPY-10986 BHM does not switch to
alternate frequency in case
of DFS event
This problem has been
resolved in System Release
13.4.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 46 of 50
Products
Affected
Tracking Description Resolution
5.x MHz
ETSI
PMP 450
CPY- 11036 For ETSI 5.4/5.7 bands in 10
MHz channels, if the SM
Receive Target Level (RTL)
on the AP is set to -61 or
higher, the AP detects false
radar causing a DFS event.
This problem has been
resolved in System Release
13.4.
PMP 100 CPY-11042 A P8 SM will crash if the
exported config file is the
same as the config file being
imported.
P8 Radios do not formally
support the config file feature,
but this issue has been
corrected in System Release
13.4.
PMP/PTP
450 3.6
GHz
CPY 11155 No countries listed in
dropdown menu under
Europe region however
SNMP allows to set country
code
This problem has been
resolved in System Release
13.4.
All CPY-11175 User accounts are deleted
from the radio if the radio is
set to factory defaults
followed by ‘Undo Unit-Wide
Saved Changes’ without
reboot.
This problem has been
resolved in System Release
13.4
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 47 of 50
5 KNOWN PROBLEMS OR LIMITATIONS
Table 40 System Release 13.4 known problems and limitations
Products
Affected
Tracking Description
PMP 450
AP 3.65
GHz FCC
CPY-344 When 3.65GHz APs are deployed in an ABAB configuration,
then if an AP is rebooted, it may trigger an LBT event once
due to interference from the back sector. But once the AP has
initialized and is synced with the back AP (and adjacent
sectors), it will operate normally.
PMP/PTP CPY-10182 Unable to upload config file in https mode with Google
Chrome browser
PMP/PTP CPY-10310 PMP or PTP 450 may have "XO trim at min diff" in event log.
Contact Cambium Customer support if this is occurring
repeatedly.
PMP 450 CPY-11340 In rare occasions, a 5 Ghz AP under high CPU utilization can
crash due to a CTIC error. Please contact Cambium support
if your AP exhibits this behavior.
PMP 450 CPY-10356 PMP 450 AP reports DES encryption on homepage when the
encryption is set to None on security page. This discrepancy
may lead users to think that DES is enabled on the AP, when
it is not.
PMP 450
AP 3.65/
3.5 GHz
CPY-10399 AP sync status page shows date as 00/00/0000 when getting
sync from on board GPS. Please use NTP on your APs for
Date and Time information.
PTP 450
5 GHz
CPY-10437 5.4 GHz BHS running 5 MHz Channel Bandwidth will not
register to BHM if they have both the 5.4 and the 5.7 band
selected. Select only the 5.4 band on the BHS to ensure a
timely registration.
PMP/PTP
450
CPY-10621 TheSNMP object encryptionConfig expects 0 for AES, 1 for
DES, and 2 for None, despite what the description for the
OID says.
All CPY-10644 The DFS Status tab is only visible to SMs/BHS that are set to
a DFS Region.
PMP/PTP
450
CPY-10663 The LBT Status tab is only visible to SMs/BHS that are set to
a LBT Region.
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 48 of 50
Products
Affected
Tracking Description
All CPY-10687 False radar detection on 5.x GHz ETSI & FCC AP for 10, 7
and 5 MHz Channel band width. If false radar detections
occur, set the SM receive target level to a lower value to
reduce the impact.
PMP/PTP
450 5.4
GHz
CPY-10763 ETSI LBT is not supported on radios using a 5ms frame.
PMP 450
AP
CPY-10846 Some of the SM OIDs listed in the WHISPSM MIB will also
work on APs.
PMP 430
AP
CPY-11040 PMP 430 APs might have a "Cannot update rcvd quality with
invalid LUID 1" error. Please contact Cambium Support if
your PMP 430 AP displays this error.
PMP 450 CPY-11057 QinQ configuration does not work with VLAN ID “1”.
PTP 450 CPY-11299 In ETSI regions, users might see their BHS transmit at a
lower power after an LBT event.
All CPY-11466 SNMP object regFailSeqNum returns value type integer
instead of counter32
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 49 of 50
6 TECHNICAL SUPPORT
For Technical Support, see:
http://www.cambiumnetworks.com/support
For PMP Technical Support helpdesk phone numbers, see:
http://www.cambiumnetworks.com/support/contact-support
Release Notes System Release 13.4
pmp-0979 - July 2015 Page 50 of 50
Cambium Networks
Cambium Networks provides professional grade fixed wireless broadband and microwave
solutions for customers around the world. Our solutions are deployed in thousands of
networks in over 153 countries, with our innovative technologies providing reliable, secure,
cost-effective connectivity that’s easy to deploy and proven to deliver outstanding metrics.
Our flexible Point-to-Multipoint (PMP) solutions operate in the licensed, unlicensed and
federal frequency bands, providing reliable, secure, cost effective access networks. With
more than three million modules deployed in networks around the world, our PMP access
network solutions prove themselves day-in and day-out in residential access, leased line
replacement, video surveillance and smart grid infrastructure applications.
Our award-winning Point to Point (PTP) radio solutions operate in licensed, unlicensed and
defined use frequency bands including specific FIPS 140-2 solutions for the U.S. Federal
market. Ruggedized for 99.999% availability, our PTP solutions have an impeccable track
record for delivering reliable high-speed backhaul connectivity even in the most challenging
non-line-of-sight RF environments.
Cambium Networks solutions are proven, respected leaders in the wireless broadband
industry. We design, deploy and deliver innovative data, voice and video connectivity
solutions that enable and ensure the communications of life, empowering personal,
commercial and community growth virtually everywhere in the world.