User's Guide Part 1
Table Of Contents
- Cambium PTP 700 Series User Guide
- Contents
- About This User Guide
- Contacting Cambium Networks
- Purpose
- Cross references
- Feedback
- Important regulatory information
- Radar avoidance
- USA and Canada specific information
- Renseignements specifiques aux USA et au Canada
- EU Declaration of Conformity
- Application firmware
- Specific expertise and training for professional installers
- Avoidance of weather radars
- External antennas
- Antennas externes
- Ethernet networking skills
- Lightning protection
- Training
- Problems and warranty
- Security advice
- Warnings, cautions, and notes
- Caring for the environment
- Chapter 1: Product description
- Overview of the PTP 700 Series
- Wireless operation
- Ethernet bridging
- TDM bridging
- System management
- FIPS 140-2 mode
- Chapter 2: System hardware
- Outdoor unit (ODU)
- Power supply units (PSU)
- Antennas and antenna cabling
- Ethernet cabling
- PTP-SYNC unit
- GPS receiver
- Network indoor unit (NIDU)
- Chapter 3: System planning
- Typical deployment
- Site planning
- Grounding and lightning protection
- Lightning protection zones
- Site grounding system
- ODU and external antenna location
- ODU ambient temperature limits
- ODU wind loading
- Hazardous locations
- PSU DC power supply
- PSU location
- PTP-SYNC location
- GPS receiver location
- NIDU location
- Drop cable grounding points
- LPU location
- Multiple LPUs
- Radio spectrum planning
- Link planning
- Planning for connectorized units
- Configuration options for TDD synchronization
- Data network planning
- TDM network planning
- Network management planning
- Security planning
- System threshold, output power and link loss
- Data throughput capacity tables
- Chapter 4: Legal and regulatory information
- Cambium Networks end user license agreement
- Definitions
- Acceptance of this agreement
- Grant of license
- Conditions of use
- Title and restrictions
- Confidentiality
- Right to use Cambium’s name
- Transfer
- Updates
- Maintenance
- Disclaimer
- Limitation of liability
- U.S. government
- Term of license
- Governing law
- Assignment
- Survival of provisions
- Entire agreement
- Third party software
- Compliance with safety standards
- Compliance with radio regulations
- Type approvals
- FCC/IC compliance
- FCC product labels
- Industry Canada product labels
- 4.9 GHz FCC and IC notification
- Utilisation de la bande 4.9 GHz FCC et IC
- 5.1 GHz FCC notification
- 5.2 GHz and 5.4 GHz FCC and IC notification
- Utilisation de la bande 5.4 GHz FCC et IC
- 5.8 GHz FCC notification
- 5.8 GHz IC notification
- 5.1 GHz band edge channel power reduction
- 5.2 GHz band edge channel power reduction
- 5.4 GHz band edge channel power reduction
- Réduction de puissance aux bords de la bande 5.4 GHz
- 5.8 GHz band edge channel power reduction
- Réduction de puissance aux bords de la bande 5.8 GHz
- Selection of antennas
- European Union compliance
- Cambium Networks end user license agreement
Chapter 3: System planning Security planning
• Login(1): Read Only
• Administrative(6): System Administrator
• NAS Prompt(7): Read Only
If the auth-role and service-type attributes are absent, PTP 700 selects the Read Only role.
The auth-role vendor-specific attribute is defined in Table 64.
Table 64
Definition of auth-role vendor-specific attribute
Field
Length
Value
Notes
Type 1 26 Vendor-specific attribute.
Length 1 12 Overall length of the attribute.
Vendor ID 4 17713 The same IANA code used for the SNMP enterprise
MIB.
Vendor Type 1 1 auth-role
Vendor Length 1 4 Length of the attribute specific part.
Attribute-
Specific
4 0..3 Integer type (32-bit unsigned). Supported values:
invalid-role(0), readonly-role(1), system-admin-role(2),
security-officer-role(3).
Planning for FIPS 140-2 operation
If the link is to operate in FIPS 140-2 secure mode, ensure that the following cryptographic
material is generated using a FIPS-approved cryptographic generator:
• Key of Keys
• TLS Private Key and Public Certificates
• Entropy Input
• Wireless Link Encryption Key for AES
Ensure that the web browsers used are enabled for HTTPS/TLS operation using FIPS-approved
cipher specifications.
Ensure that following attributes of user accounts for the web-based management interface
have been configured to match the operator’s network security policy:
• Auto Logout Period.
• Maximum Number of Login Attempts.
• Login Attempt Lockout.
• Minimum Password Change Period.
• Password Expiry Period.
• Webpage Session Control
Ensure that the following are configured:
• Password complexity rules reset to best practice values.
• User account passwords compliant with the network security policy.
Page 3-58