User's Guide Part 1
Table Of Contents
- Cambium PTP 700 Series User Guide
- Contents
- About This User Guide
- Contacting Cambium Networks
- Purpose
- Cross references
- Feedback
- Important regulatory information
- Radar avoidance
- USA and Canada specific information
- Renseignements specifiques aux USA et au Canada
- EU Declaration of Conformity
- Application firmware
- Specific expertise and training for professional installers
- Avoidance of weather radars
- External antennas
- Antennas externes
- Ethernet networking skills
- Lightning protection
- Training
- Problems and warranty
- Security advice
- Warnings, cautions, and notes
- Caring for the environment
- Chapter 1: Product description
- Overview of the PTP 700 Series
- Wireless operation
- Ethernet bridging
- TDM bridging
- System management
- FIPS 140-2 mode
- Chapter 2: System hardware
- Outdoor unit (ODU)
- Power supply units (PSU)
- Antennas and antenna cabling
- Ethernet cabling
- PTP-SYNC unit
- GPS receiver
- Network indoor unit (NIDU)
- Chapter 3: System planning
- Typical deployment
- Site planning
- Grounding and lightning protection
- Lightning protection zones
- Site grounding system
- ODU and external antenna location
- ODU ambient temperature limits
- ODU wind loading
- Hazardous locations
- PSU DC power supply
- PSU location
- PTP-SYNC location
- GPS receiver location
- NIDU location
- Drop cable grounding points
- LPU location
- Multiple LPUs
- Radio spectrum planning
- Link planning
- Planning for connectorized units
- Configuration options for TDD synchronization
- Data network planning
- TDM network planning
- Network management planning
- Security planning
- System threshold, output power and link loss
- Data throughput capacity tables
- Chapter 4: Legal and regulatory information
- Cambium Networks end user license agreement
- Definitions
- Acceptance of this agreement
- Grant of license
- Conditions of use
- Title and restrictions
- Confidentiality
- Right to use Cambium’s name
- Transfer
- Updates
- Maintenance
- Disclaimer
- Limitation of liability
- U.S. government
- Term of license
- Governing law
- Assignment
- Survival of provisions
- Entire agreement
- Third party software
- Compliance with safety standards
- Compliance with radio regulations
- Type approvals
- FCC/IC compliance
- FCC product labels
- Industry Canada product labels
- 4.9 GHz FCC and IC notification
- Utilisation de la bande 4.9 GHz FCC et IC
- 5.1 GHz FCC notification
- 5.2 GHz and 5.4 GHz FCC and IC notification
- Utilisation de la bande 5.4 GHz FCC et IC
- 5.8 GHz FCC notification
- 5.8 GHz IC notification
- 5.1 GHz band edge channel power reduction
- 5.2 GHz band edge channel power reduction
- 5.4 GHz band edge channel power reduction
- Réduction de puissance aux bords de la bande 5.4 GHz
- 5.8 GHz band edge channel power reduction
- Réduction de puissance aux bords de la bande 5.8 GHz
- Selection of antennas
- European Union compliance
- Cambium Networks end user license agreement
Chapter 3: System planning Security planning
Item
Description
Quantity required
TLS Private Key
and Public
Certificates
An RSA private key of size 2048 bits, generated
in either PKCS#1 or PKCS#5 format,
unencrypted, and encoded in the ASN.1 DER
format.
An X.509 certificate containing an RSA public
key, generated in either PKCS#1 or PKCS#5
format, unencrypted, and encoded in the ASN.1
DER format.
The public key certificate must have Common
Name equal to the IPv4 or IPv6 address of the
ODU.
The public key certificate must form a valid pair
with the private key.
Two pairs per link.
These items are unique
to IP address.
User Defined
Security
Banner
The banner provides warnings and notices to be
read by the user before logging in to the ODU.
Use text that is appropriate to the network
security policy.
Normally one per link.
This depends upon
network policy.
Entropy Input This must be of size 512 bits (128 hexadecimal
characters), output from a random number
generator.
Two per link. For greater
security, each link end
should be allocated a
unique Entropy Input.
Wireless Link
Encryption Key
for AES
An encryption key generated using a
cryptographic key generator. The key length is
dictated by the selected AES encryption
algorithm (128 or 256 bits).
One per link. The same
encryption key is
required at each link
end.
Port numbers
for HTTP,
HTTPS and
Telnet
Port numbers allocated by the network. As allocated by network.
Planning for SNMPv3 operation
SNMP security mode
Decide how SNMPv3 security will be configured.
MIB-based security management uses standard SNMPv3 MIBs to configure the user-based
security model and the view-based access control model. This approach provides considerable
flexibility, allowing a network operator to tailor views and security levels appropriate for
different types of user. MIB-based security management may allow a network operator to take
advantage of built-in security management capabilities of existing network managers.
Page 3-52