Instruction Manual

Table Of Contents
CAUTION: It is crucial that a site software download is performed at the site to ensure
that all devices are on the same software version, VLAN, and active bank. Failure to
perform this step results in the replacement transceiver or expansion channel to have a
mismatch in software versions. If a mismatch in software versions occurs, the transceiver
may go into a configuration mode of operation with a reason of ‘Invalid Software Version’.
See one of the following procedures:
For GTR 8000 Base Radios with PSC 9600 Site Controller: Performing a Site Download With
PSC 9600 Site Controllers on page 277.
For GTR 8000 Base Radios with GCP 8000 Site Controller: Performing a Site Software
Download With GCP 8000 Site Controllers on page 279.
23 Disconnect the service computer/laptop from the transceivers DB-9 serial port.
24 Perform basic device configuration using the Ethernet port in CSS. See Connecting Through an
Ethernet Port Link on page 141.
a Set the current date and time. See Setting the Date and Time in CSS on page 144.
b Set up the local Password Configuration (optional). See Setting the Local Password
Configuration in CSS on page 150.
NOTICE: An IP address must be configured to set up the local password. If the serial
port access is not available to configure the IP address, the transceiver may have the
account locked out or the backplane slot has passwords enabled. Connect to the
front-panel local Ethernet service port using a fixed IP address to perform the
password reset. See Connecting Through an Ethernet Port Link
on page 141.
25 Complete the configuration of the Information Assurance features using CSS, as follows:
a Change the SNMPv3 configuration and user credentials. See Changing SNMPv3
Configuration and User Credentials in CSS on page 144.
b Create, update, or delete an SNMPv3 user. See Adding or Modifying an SNMPv3 User in
CSS on page 147.
c Verify the SNMPv3 credentials. See Performing an SNMPv3 Connection Verification in CSS
on page 147.
d Set the Software Download Manager (SWDL) transfer mode. See Setting the SWDL Transfer
Mode in CSS on page 148.
e Configure Domain Name Services (DNS). See Chapter 7, “Configuring DNS with CSS” in the
Authentication Services manual.
f Configure for Secure SHell (SSH). See Chapter 4, “Configuring SSH for Devices in an RF
Site” in the Securing Protocols with SSH manual or see “Device Security Configuration –
Remote Access/Login Banner (Ethernet)” in the CSS Online Help.
NOTICE: Restore the Clear Protocols parameters.
g Enable RADIUS Authentication. See Chapter 7, “Configuring RADIUS Sources and
Parameters with CSS” in the Authentication Services manual.
h Enable Centralized Authentication. See Chapter 7, “Enabling/Disabling Centralized
Authentication with CSS” in the Authentication Services manual.
i Set the Local Cache Size for Centralized Authentication. See Chapter 7, “Setting the Local
Cache Size for Central Authentication in CSS” in the Authentication Services manual.
j Enable Centralized Event Logging (if required by your organization). See Chapter 6,
“Enabling/Disabling Centralized Event Logging on Devices with CSS” and Chapter 1, “Event
Logging Client Configuration” for proper hostnames in the Centralized Event Logging
manual.
MN003286A01-H
Chapter
9: GTR 8000 Base Radio FRU Procedures
236