Академический Документы
Профессиональный Документы
Культура Документы
Nitro
High quality links
Contents
1.
2.
Overview.......................................................................................................................................4
A.
Product ....................................................................................................................................... 4
B.
Components ............................................................................................................................... 4
3.
Point to Point.............................................................................................................................. 5
B.
C.
4.
5.
6.
7.
Login .............................................................................................................................................8
8.
B.
WLAN .......................................................................................................................................... 9
C.
B.
B.
SNMP ........................................................................................................................................ 23
C.
uConfig.exe ............................................................................................................................... 27
D.
E.
C.
D.
E.
F.
2. Overview
A. Product
WITELCOM NITRO II is a family of high capacity point to point and point to multipoint system for access networks and
backhauling applications. The user interface on Nitro II is designed with focus on simplicity and speed, and does not
provide much selectable and advanced options, as the most favorable settings is applied automatically. This allows
operators to setup high capacity systems with less effort and expertise than comparable alternatives.
All wireless links in NITRO II operates fully adaptive, and will provide Link Rate depending on link quality and capacity
needed. This provides a more flexible application than traditional Micro Wave systems, when NITRO II is used for PtP
backhauls.
B. Components
Access point mounting hardware consists:
PoE Injector
Nitro 2 Unit
Witelcom will not provide an Ethernet cable for Nitro 2. You will need to obtain an outdoor-rated, Cat5 or better ethernet
cable and shielded RJ-45 connectors from a supplier. The maximum recommended length for a cable segment is 100
meters.
The radio receive power through the cable or an external power device:
3. Model specifications
A. Point to Point
Generic models:
Fast Ethernet
Gigabit Ethernet
3.4 3.6 Ghz
4.9 6.1 Ghz
Radio Cards
Channel Width
Output Power aggregated
Gain
Beam width
LOS Range
Size (cm) HxWxD
Weight (incl. Mounting kit)
External N-Conn.
BST-55-18
BST-55-18G
On request
yes
1
5, 10, 20, 40 Mhz
26dBm
2x18 dBi
22 x 22
Up to 10 km
26x26x9.5
2.2 Kg
No
BST-55-23
BST-55-23G
On request
yes
1
5, 10, 20, 40 Mhz
26dBm
2x23 dBi
11 x 11
Up to 25 Km
37x37x9
3.9 Kg
No
BST-55-25
BST-55-25G
On request
Yes
1
5, 10, 20, 40 Mhz
26dBm
2x25dBi
8 x 8
Up to 30 Km
37x37x9.5
4.3 Kg
No
BST-55-C
BST-55-CG
No
On request
Yes
1
5, 10, 20, 40 Mhz
26dBm
27x27x7
2.2 Kg
Yes
BST-55-18R
BST-55-18RG
No
On request
Yes
2
5, 10, 20, 40 Mhz
26 dBm/26dBm
2x18 dBi
22 x 22
26x26x9.5
2.3 Kg
Yes
BST-55-23R
BST-55-23RG
No
On request
Yes
2
5, 10, 20, 40 Mhz
26 dBm/26dBm
2x23 dBi
11 x 11
37x37x9
3.9 Kg
Yes
Customizable models:
Fast Ethernet
Gigabit Ethernet
2.3 2.5 Ghz
3.4 3.6 Ghz
4.9 6.1 Ghz
Radio Cards
Channel Width
Output Power aggregated
Gain
Beam width
Size (cm) HxWxD
Weight (incl. Mounting kit)
External N-Conn.
MCT-55-18R
MCT-55-18RG
Yes
On request
Yes
2
5, 10, 20, 40 Mhz
23/26dBm
2x18 dBi
22 x 22
26x26x9.5
2.3 Kg
Yes
B. Point to Multipoint
Generic models:
Fast Ethernet
Gigabit Ethernet
3.4 3.6 Ghz
4.9 6.1 Ghz
Radio Cards
Channel Width
Output Power aggregated
Gain
Beam width
LOS Range
Size (cm) HxWxD
Weight (incl. Mounting kit)
External N-Conn.
APT-55-90
APT-55-90G
On request
Yes
1
5, 10, 20, 40 Mhz
26dBm
2x16 dBi
90 x 9
Up to 8 Km
37x37x9
3.5 Kg
No
CPT/CPW-55-17
N/A
No
Yes
1
5, 10, 20, 40 Mhz
20dBm
2x17 dBi
30 x 20
Up to 5 Km
28x12x6
0.5 Kg
No
APT-55-90R
APT-55-90RG
On request
Yes
2
5, 10, 20, 40 Mhz
26 dBm/26 dBm
2x16 dBi
90 x 9
37x37x9
3.5 Kg
yes
CPT-55-C
N/A
No
Yes
1
5, 10, 20, 40 Mhz
20dBm
27x27x7
2.2 Kg
yes
CPT-55-18 (HP)
N/A
On request
Yes
1
5, 10, 20, 40 Mhz
20 dBm (26 dBm)
2x18 dBi
22 x 22
UP to 10 Km
26x26x9.5
2.2 Kg
No
Customizable models:
Fast Ethernet
Gigabit Ethernet
3.4 3.6 Ghz
4.9 6.1 Ghz
Radio Cards
Channel Width
Output Power aggregated
Gain
Beam width
Size (cm) HxWxD
Weight (incl. Mounting kit)
External N-Conn.
C. Indoor Units
Fast Ethernet
Gigabit Ethernet
2.3 2.5 Ghz
4.9 6.1 Ghz
Radio Cards
Channel Width
Output Power aggregated
Gain
Beam width
Size (cm) HxWxD
Weight (incl. Mounting kit)
External N-Conn.
APT-2455-IDU-2
N/A
Yes
Yes
1
5, 10, 20, 40 Mhz
28dBm
2x2 dBi
360
10x7.6x2.6
0.13 Kg
No
4. Menu Structure
The menu structure of Nitro consists of the following main menus:
Status
Clients
WLAN
Network
Vlan
Services
System
7. Login
To access the user interface NITRO II, open your browser and enter the IP address of the machine. By default, the IP
address, username and password are:
IP address: 192.168.168.1/24
Username: admin Password: default
Enter your username and password:
Signal History
The received signal level is displayed. The colors give a quick indication of the signal level.
WLAN
LAN Setting
Tools
Statistics
A. Signal History
The Status menu shows the received signal level and gives a color indication for the Signal Level, and the received signal
level in dBm.
The green color indicates good signal, yellow color indicates low signal and red color indicates bad signal. Blue color
indicates too high signal. Ideal signal level is considered -55 to -65 dBm for full speed.
Below the Signal Bar, the individual RX signals for Left and Right MIMO-chain are displayed.
B. WLAN
Below the Signal Bars, a field for the basic WLAN information is shown. The status/info fields are:
Wireless Mode
Remote AP SSID
Signal Strength
TX Rate (Mbps)
TX CCQ (%)
Frequency
ACK TimeOut
Local/Remote AP MAC
Noise Level
RX Rate (Mbps)
Channel Width (MHz)
Security
Indicates that the wireless mode in which the unit operates: AP, Station or Station WDS
The common Wireless network name the units are using.
Received Signal Level.
Speed (air speed) at the transmitter TX.
Quality of Customer Connection, percentage of RF frames successfully transmitted.
Frequency selected to operate.
ACK Timeout adapted to avoid unnecessary waiting periods, thus higher transmitting rate.
MAC address on BTS WLAN or the MAC address of the connected Client.
Received Noise Level.
Speed (air speed) at the receiver RX.
Operating Channel and mode; 5, 10, 20 or 20/40 MHz. HT indicates MIMO.
Wireless Security Mode: WPA, WPA2, IEEE802.1X or None.
C. LAN Setting
Network Mode
IP Address
LAN MAC
LAN Cable
Gateway IP Address
Pri. DNS IP
Sec. DNS IP
D. Tools, Statistics
Below the Signal History, some basic networking Tools are available, like Ping, ARP Table, Bridge Table and DHCP leases:
10
TX CCQ
Tx rate
Rx rate
Chan Width
The thresholds of the color-coding for the signal is configured in the ADVANCED WLAN menu.
10.
A. WLAN - AP Mode
This is the main menu to configure the system parameters for wireless.
Basic Wireless Settings
Local AP - Wireless Security
Virtual Access Point Settings
11
i.
The Basic Wireless menu, allows the user to set the basic configuration of the wireless interface.
Wireless Mode
ESSID
Wireless profile
Channel Spectrum
Width (Mhz)
Guard Interval
To select the wireless mode that the unit runs: AP, AP WDS, Repeater WDS, Station, Station WDS.
Note: WDS allows a wireless network to be expanded using multiple access points without the traditional requirement
for a wired backbone to link them.
Name of the network. Only stations with same ESSID will be connected to the AP.
Information only - the unit operates in 802.11n mode only 5GHz band.
To select the bandwidth of the channel used, 20/40MHz (Auto MIMO), 20MHz, 10MHz or 5MHz.
Short guard interval, only available for 20/40 MHz. It can provide higher throughput, but at the cost of stability.
Spectrum Selection
Channel Frequency
Frequency List
Interference Analyzer
To check and scan the spectrum of available frequencies. The frequency scanning is controlled by Frequency-list.
Transmit Power
Allows the user to adjust the TX power (dBm), or to set automatically the restrictions of the regulatory domain.
BBSA Scanning
Data Rate
If it is enabled, the CPE will scan for other Base Stations at regular intervals.
To select the modulation techniques - from 6 Mbps to 300 Mbps BPSK MCS15. Select Auto (recommended) for total link
adaptation.
Allows the user to reduce or increase the transmission rate.
Rate Aggressiveness
Manual Range
Note: In noisy environments, lower throughput will ensure better stability. Rate Aggressiveness allows device to reduce
the transmission rate, so range or power may be greater. In free environments Interference Rate Aggressiveness can
increase the transmission rate and achieve higher throughput.
To set manually the distance between the devices. Fine tuning can be done to achieve better performance and reliability of
the link.
12
ii.
Wireless Security
Below, the details of the sub-menu Local AP - WIRELESS SECURITY for units configured in AP mode:
WLAN Security Setup
The system supports modes WEP, WPA and WPA2, including WPA2 personal/enterprise and 802.1X.
Note: We do not recommend using WEP mode due to its known security issues. It is recommended to use AES
instead of TKIP, due to speed limitations of TKIP for LEGACY.
To set the encryption password.
Radius Server
To configure the RADIUS server settings (IP and port number) and a password shared.
MAC ACL
To deny/accept wireless connections with the device that has the MAC-address specified.
Note: MAC ACLs are ACLs that filter traffic using information in the Layer 2 header of each packet.
iii.
Up to three virtual access points can be defined. Enable the option and click Configure button:
Each virtual access points can have different SSIDs and security profiles:
i.
Site Survey
14
ii.
This feature allows the station to be connected only to an AP with a specific MAC address. In this way, the CPE will not
roam between several AP with the same ESSID.
Click Enable, and then, write the Mac address of the AP or select the desired AP using the Site Survey Tool.
iii.
BBSA Scanning
If this option is enabled, the CPE will look for another base station at regular intervals. If a Base Station with better signal
and corresponding SSID is available, the CPE will make a better basis for the roaming station.
If there are multiple CPE units operating in the same environment, Station WDS in point-multipoint, there is a risk that
the CPEs with WDS start talking to each other and It could create a loop in the network, so they will be on the same
frequency.
It can be solved by blocking the CPE unit to the remote AP MAC to avoid cross-WDS talk: Basic Wireless - Remote Lock to
AP MAC tab.
15
11.
The Advanced Wireless menu allows a more detailed configuration and advanced system.
Long Range parameters
Allows the user to specify if long range or indoor is used in the ACK-timeout calculation.
Beacon Interval
Note: Indoor is suited for less than 150 meter range. To set the link as indoor, remove the tick mark.
Define the time interval (in millisecond) the beacon to broadcast.
RTS Threshold
Fragmentation Threshold
Distance
Noise Immunity
Signal Strength Indicator (RSSI)
Radio Off with No Ethernet
Chainmask Selection
Station Isolation
Minimum Station dBm
Maximum Clients
The request to send (RTS) threshold specifies the packet size of an RTS transmission. This parameter can help
control traffic flow through the access point, especially when there are many clients connected.
This value is used to set the maximum size of packet a client will send. Smaller packets improve reliability, but they
also decrease performance.
Note: Unless youre facing problems with an unreliable network, we recommend not reducing the fragmentation
threshold.
Enter the distance, between devices, in meters. Then click Calculate and the close approximate values for Slot Time,
ACK Timeout, CTS Timeout will be calculated. Fine tuning can be further adjusted for the best environment
conditions to achieve best performance and better link reliability.
Implements a patented algorithm for noise suppression.
Color setting as signal strength.
To disable the wireless interface, if there is no Ethernet connection.
The user can select Left or Right Chain (mode SISO) or 2x2 to 2x2 MIMO Dual Chains.
When Station Isolation is enabled, the access point blocks communication between wireless clients.
To set the limit of the minimum signal strength that, the client or station should have, to link with the AP.
To set the limit of the number of clients that can connect per AP.
16
12.
Network Information
Local Area network
DHCP Server Reservations
Domain Name Server Addresses
Bandwidth Control
A. Bridge Mode
When an access point is configured as a wireless bridge, it will link a wireless network to a wired network allowing you to
bridge two networks with different infrastructure.
To configure the device as a wireless bridge, you need to perform three steps:
1.
2.
3.
B. Router Mode
In this mode, the unit operates as a real router, using static or dynamic routing (RIP), or NAT between the WAN interface
and LAN interface Ethernet.
The WAN interface can be used as a DHCP client or PPPoE to obtain a dynamic IP-address or can be configured with a
static address. Check the NAT when the radio is used as a gateway to the customer network behind CPE.
DNS configuration for the unit: DNS can be obtained dynamically via DHCP or PPPoE or configured manually. Check the
DNS Proxy if you want to use the radio to transmit the DNS look-up.
17
i.
NAT Setup
Static Routing Table
To specify NAT and related port handling in Router/NAT mode. Port forwarding can be specified by most
common services or custom entry can be specified.
Menu for setting up static route definitions.
18
13.
A single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated,
such a domain is referred to as a Virtual Local Area Network, or VLAN. Grouping hosts with a common set of requirements
regardless of their physical location by VLAN can greatly simplify network design.
No Vlan
Without VLANs, the device considers all interfaces to be in the same broadcast domain.
If you need both vlan management and tag/untag, you will have to use the vlan switch setting.
If you need vlan for management only, select vlan management only. The system will then be
transparent to all traffic.
QinQ encapsulates the private network VLAN tag of the user in the public (service provider) network
VLAN Tag to make the packet with double layers of VLAN Tags cross the backbone network (public
network) of the operator.
QinQ
19
14.
The Services menu allows the user to specify various parameters for management and monitoring of the system.
Spanning Tree Protocol Implements a way to avoid looping ACK storms in the network, by controlling structured levels from root unit.
(STP) Setup
Note: Bridge Mode only.
Ping Watchdog
Allows the user to specify an IP address to monitor, and where the unit will reboot on failure on which to reach, based on
the additional parameters.
Note: Be careful with not setting the Startup Delay too low on remote systems (Slave Unit) as it will take some time to
connect to master and pass traffic (set minimum 120 sec).
Auto-Reboot
To set automatic reboot.
SNMP Setup
SSH Server
To set the configuration for sending SNMP messages to a Trap Host. Specify the IP address to Trap Host, and the
Community Password.
Note: Specify Community Read and Write password. NITRO supports SNMPv2 and v3. SNMP Trap is also supported by
enabling and specifying trap host and community string.
See Annex for SNMP OIDs.
Allows user to set correct time on the unit manually or to use SNTP (Simple Network Time Protocol) to adjust
automatically and adjust for Time Zone.
To set the HTTP protocol to be used (HTTP or Secure HTTP/SSL). Specify the Login Timeout for automatic logout of inactive
user.
To allow/deny Telnet or/and SSH login, and to specify the TCP port number to be used.
System Log
NTP Setup
Web Server
20
15.
The System menu allows the user to specify system parameters and do maintenance functions on the NITRO unit.
Firmware Upgrade
Allows user to upgrade/downgrade the firmware remotely (use with caution and only when necessary)
Host Name
Note: Emergency Firmware Recovery, Nitro II allows user to recover the firmware in case of a failed
upgrade/downgrade. See Annex to learn more.
To set a user friendly name for the unit.
Administrative Account
To specify the Admin password. Current password must be specified to allow any change.
Read-Only Account
To specify a read-only user and password to have access only to the Status menu.
Software Tools
All NITRO II units hosts a Windows program that can be used to detect any Nitro Unit on Layer2.
Device Maintenance
21
16.
ANNEX
A. VLAN Configuration
The VLAN Menu allows the user to define vlan for management, vlan switching for tag/untag and bridge these settings to
required interface or virtual interface (VAP).
If you need vlan for management only, select vlan management only. The system will then be transparent to all traffic.
If you need both vlan management and tag/untag, you will have to use the vlan switch setting. The management vlan
should be only tagged on the in-interface, for instance Radio 1. For untagged vlan to the ethernet, set tag on the Radiointerface and untag for the same vlan on the ethernet port.
See example for details.
22
B. SNMP
Simple Network Management Protocol defines a standard to record, store, and share information about network devices.
In this way, SNMP facilitates network management, troubleshooting, and maintenance.
Select Services Menu and go the SNMP Setup table.
Enable SNMP
You can specify the SNMP administrative mode on your network. To enable SNMP, click Enabled.
Engine ID
Note: SNMP agents expose management data on the managed sytems as variables.
A string representing the name of the user.
Note: The default SNMP v3 username is ucm.
To set the type of authentication protocol used since the messages sent on behalf of this user can be
authenticated. This can take one of the two values, MD5: Message-Digest Algorithm 5 and SHA: Secure Hash
Algorithm.
Note: Default value SHA.
This is a string password for MD5 or SHA depending on the choice above.
Note: Default value W1t3|c0m.
To set the type of authentication protocol used since the messages sent on behalf of this receiver can be
authenticated.
To set the encryption type: AES, DES.
To set the string password for AES or DES depending on the choice above.
23
SNMP Version 1/2c Trap Destination To set the IP address of the trap destination.
IP
SNMP Version 1/2c Trap Community You must configure the community string for traps.
String
WEC IP
To set the IP address of the Witelcom Equipment Controller (WEC).
Enable Registration with WEC
To enable the SNMP communication and management with the Witelcom Equipment Controller (WEC)
OID
String
1.3.6.1.4.1.40960.8.1.9.1.0
1.3.6.1.4.1.40960.8.1.9.2.0
"none", "dhcpserver",
"dhcprelay"
-
1.3.6.1.4.1.40960.8.1.9.3.0
1.3.6.1.4.1.40960.8.1.9.4.0
1.3.6.1.4.1.40960.8.1.9.5.0
1.3.6.1.4.1.40960.8.1.9.8.0
0, 999999
1.3.6.1.4.1.40960.8.1.9.9.0
1.3.6.1.4.1.40960.8.1.9.10.0
1.3.6.1.4.1.40960.8.1.9.11.0
1.3.6.1.4.1.40960.8.1.7.1.1.0
1.3.6.1.4.1.40960.8.1.7.1.2.0
1.3.6.1.4.1.40960.8.1.7.1.3.0
1, 49151
1.3.6.1.4.1.40960.8.1.7.1.4.0
1, 49151
1.3.6.1.4.1.40960.8.1.7.1.5.0
1.3.6.1.4.1.40960.8.1.7.1.6.0
>0
1.3.6.1.4.1.40960.8.1.7.1.7.0
5/13
1.3.6.1.4.1.40960.8.1.8.4.0
1.3.6.1.4.1.40960.8.1.8.5.0
1.3.6.1.4.1.40960.8.1.8.7.0
1.3.6.1.4.1.40960.8.1.8.10.0
1.3.6.1.4.1.40960.8.1.8.11.0
1.3.6.1.4.1.40960.8.1.23.1.0
router/bridge
1.3.6.1.4.1.40960.8.1.25.1.0
0,1
1.3.6.1.4.1.40960.8.1.25.2.0
0,1
1.3.6.1.4.1.40960.8.1.6.1.1.0
0,1
1.3.6.1.4.1.40960.8.1.6.1.4.0
0,3
1.3.6.1.4.1.40960.8.1.6.1.9.0
0,1
1.3.6.1.4.1.40960.8.1.6.1.10.0
1.3.6.1.4.1.40960.8.1.6.1.20.0
0,1
1.3.6.1.4.1.40960.8.1.6.1.21.0
Delimiter = "|"
1.3.6.1.4.1.40960.8.1.6.1.22.0
1 = Allow, 2 = Deny
1.3.6.1.4.1.40960.8.1.6.1.23.0
0,1
1.3.6.1.4.1.40960.8.1.6.1.23.0
0,1
1.3.6.1.4.1.40960.8.1.6.1.24.0
0, 1
dhcp/static
-
24
1.3.6.1.4.1.40960.8.1.6.1.25.0
"hex", "ascii"
1.3.6.1.4.1.40960.8.1.24.1.0
0,1
1.3.6.1.4.1.40960.8.1.15.7.0
1.3.6.1.4.1.40960.8.1.15.8.0
MD5/SHA
1.3.6.1.4.1.40960.8.1.15.9.0
1.3.6.1.4.1.40960.8.1.15.10.0
1.3.6.1.4.1.40960.8.1.15.11.0
1.3.6.1.4.1.40960.8.1.15.12.0
1.3.6.1.4.1.40960.8.1.15.13.0
"MD5"/"SHA"
1.3.6.1.4.1.40960.8.1.15.14.0
1.3.6.1.4.1.40960.8.1.15.15.0
1.3.6.1.4.1.40960.8.1.15.16.0
1.3.6.1.4.1.40960.8.1.15.17.0
1.3.6.1.4.1.40960.8.1.15.18.0
1.3.6.1.4.1.40960.8.1.1.1.0
1.3.6.1.4.1.40960.8.1.1.2.0
"<tftp-server>;<filename>"
1.3.6.1.4.1.40960.8.1.1.3.0
1.3.6.1.4.1.40960.8.1.1.4.0
1.3.6.1.4.1.40960.8.1.1.5.0
1.3.6.1.4.1.40960.8.1.11.1.1.0
1.3.6.1.4.1.40960.8.1.11.1.2.0
1.3.6.1.4.1.40960.8.1.11.1.3.0
1.3.6.1.4.1.40960.8.1.11.1.4.0
1.3.6.1.4.1.40960.8.1.11.1.5.0
1.3.6.1.4.1.40960.8.1.11.1.6.0
1.3.6.1.4.1.40960.8.1.11.1.7.0
1.3.6.1.4.1.40960.8.1.11.1.8.0
1.3.6.1.4.1.40960.8.1.11.1.9.0
0,1
1.3.6.1.4.1.40960.8.1.11.1.10.0
"dynamic", "static"
1.3.6.1.4.1.40960.8.1.11.1.11.0
1.3.6.1.4.1.40960.8.1.11.1.12.0
1.3.6.1.4.1.40960.8.1.11.1.13.0
MTU
1.3.6.1.4.1.40960.8.1.11.1.14.0
ESSID
1.3.6.1.4.1.40960.8.1.2.1.3.0
RESSID
1.3.6.1.4.1.40960.8.1.2.1.3.0
1.3.6.1.4.1.40960.8.1.2.1.5.0
1.3.6.1.4.1.40960.8.1.2.1.6.0
>0
1.3.6.1.4.1.40960.8.1.2.1.8.0
21,409
1.3.6.1.4.1.40960.8.1.2.1.9.0
0,2346
1.3.6.1.4.1.40960.8.1.2.1.10.0
256, 2346
1.3.6.1.4.1.40960.8.1.2.1.14.0
1.3.6.1.4.1.40960.8.1.2.1.16.0
"DES"/"AES128"
"DES"/"AES128"
0,1
-
64,2000
0,1
25
1.3.6.1.4.1.40960.8.1.2.1.19.0
0,5
1.3.6.1.4.1.40960.8.1.2.1.19.0
0,5
1.3.6.1.4.1.40960.8.1.2.1.20.0
0/1/16/32
1.3.6.1.4.1.40960.8.1.2.1.21.0
0,1
1.3.6.1.4.1.40960.8.1.2.1.22.0
1.3.6.1.4.1.40960.8.1.2.1.23.0
0/0,1
1.3.6.1.4.1.40960.8.1.2.1.24.0
0,1
1.3.6.1.4.1.40960.8.1.2.1.25.0
0,1
1.3.6.1.4.1.40960.8.1.2.1.26.0
0,1
1.3.6.1.4.1.40960.8.1.2.1.27.0
0,1
1.3.6.1.4.1.40960.8.1.2.1.28.0
-3,3
Distance
1.3.6.1.4.1.40960.8.1.2.1.29.0
0, 999999
1.3.6.1.4.1.40960.8.1.2.1.30.0
0,1
1.3.6.1.4.1.40960.8.1.2.1.31.0
0,1
1.3.6.1.4.1.40960.8.1.2.1.32.0
9, 100
1.3.6.1.4.1.40960.8.1.2.1.35.0
0,1
1.3.6.1.4.1.40960.8.1.2.1.36.0
-95, 0
1.3.6.1.4.1.40960.8.1.2.1.37.0
0,1
SNMP Table: New OIDs and Description for 2.24 firmware version
Description
OID
String
WLAN1 nwid
1.3.6.1.4.1.40960.8.1.2.1.43.0
1.3.6.1.4.1.40960.8.1.2.1.44.0
WLAN1 AP list
1.3.6.1.4.1.40960.8.1.2.1.45.0
1.3.6.1.4.1.40960.8.1.2.1.46.0
VAP0 nwid
1.3.6.1.4.1.40960.8.1.26.1.28.0
1.3.6.1.4.1.40960.8.1.26.1.29.0
1.3.6.1.4.1.40960.8.1.26.1.30.0
VAP1 nwid
1.3.6.1.4.1.40960.8.1.26.2.28.0
1.3.6.1.4.1.40960.8.1.26.2.29.0
1.3.6.1.4.1.40960.8.1.26.2.30.0
VAP2 nwid
1.3.6.1.4.1.40960.8.1.26.3.28.0
1.3.6.1.4.1.40960.8.1.26.3.29.0
1.3.6.1.4.1.40960.8.1.26.3.30.0
26
C. uConfig.exe
All NITRO II units hosts a Windows program that can be used to detect any Nitro Unit on Layer2 (Mac Layer), and to do
management. uConfig is compatible with most MS Windows versions, including Vista and Windows 7.
D. Configuration Recovery
Click on System tab and then go to Configuration Management to make backup of the running configuration or restore
the configuration from a previous backed up file.
IMPORTANT!
Old configuration files could not work properly with new firmware since some features might be missing.
If you want to upgrade a device with an old firmware version, running the desired configuration, you must upgrade to
2.22, check that it is working as wanted and then store the config from 2.22 to use on future.
Contact with support@witelcom.com if your configuration file is experiencing problems, we will send to you the
configuration file, under request, for the new firmware version.
27
E. System Recovery
Emergency System Reset: Nitro II allows user to emergency-reset the configuration to factory default in case of a
forgotten password or misconfiguration.
While the system is powered:
Hold the button pressed for less than 3 seconds initiates a hard reboot
Hold the button pressed for more than 3 seconds (but less than 8) initiates a password reset to default
(admin/default)
Hold the button pressed for more than 8 seconds (but less than 12) initiates a reset to factory default settings
Hold the button pressed for more than 12 seconds initiates a cancel any reset action and only restarts the unit.
Emergency Firmware Recovery: Nitro II allows user to recover the firmware in case of a failed upgrade/downgrade or in
case of an irresponsive system state.
1. To emergency reload a firmware, start with the unit disconnected from power, and expose the Reset Button.
2. Connect a PC directly to the unit(via POE injector) and put the Ethernet interface on 192.168.168.10/24 and
start a continuous ping to 192.168.168.1:
Command: ping 192.168.168.1 t
3. Hold Reset Button pressed while powering up the unit, and hold it pressed until the unit replies on the
192.168.168.1 address.
4. Flash the firmware-image on to the unit by using TFTP, using the Command Prompt:
tftp -i 192.168.168.1 put NITROv1.1.img
5. After a successful upload, the unit will start burning the image to the flash.
DO NOT TURN OF THE POWER OFF DURING FLASHING.
Wait minimum 2 minutes after the ping stopped. If successful, the unit should start replying on the 192.168.168.1
address. If it fails, you will have to retry from step 3 again.
28
17.
FAQ
A. The radio shows LAN as active but dont respond to ping and cant find it
through UCONFIG, what to do?
Go to section called Emergency Firmware Recovery on page 28.
Use the Interference analyzer and Site Survey tool, to check the channel interferences. See pages 12-15.
29