CAMBIUM NETWORKS
026v003
283
Example scenarios of MIR and RADIUS configurations are described in
Table 122 Example scenarios of MIR and RADIUS configurations
Scenario
Description
No MIR control via
Radius
In a scenario where Radius is not in use for MIR profiles, the GUI will be
the only place to configure MIR profiles and apply them to the
corresponding SMs. Configure the MIR profiles in the Configure =->
Quality of Service menu option on the AP GUI and apply the
corresponding profile # in the SM under the same menu option on SM.
MIR control using
only Radius
In the case where only the Radius server is being used for MIR profiles,
all settings in the GUI will be overridden for any SM being managed by
the Radius Server. In this case, create the MIR profile with Subscriber
Module usernames and password on the Radius server. At the time of
registration, the AP uses the radius information and applies the
corresponding profile to the SM. In the wireless statistics page ( =>
Wireless Status), the MIR profile # from the Radius server along with UL
and DL rate information will show up. In this scenario the QOS profiles
in the AP GUI are irrelevant. Multiple SMs across multiple APs can then
be managed via Radius.
Hybrid control using
both Radius and MIR
profile on the AP GUI
The system also supports a hybrid mode where Radius and the GUI
QOS profiles can be used simultaneously as long as the same SM does
not have a profile # associated from the AP & Radius. In case where it is
redundant, Radius server setting will override the MIR profile settings
from the GUI.
CREATING CERTIFICATE FOR RADIUS SERVER AND SM DEVICE
Create your own certification center
Creating a CA private key
1.
Create a root (self-signed) certificate from our private certificate. Go to the directory where the
database is stored for our certificates and start generating.
2.
Create a private key CA (my own Certificate Authority). RSA key length of 2048 bits encryption
algorithm 3DES. File name with a key -
cambium-ca.key
openssl genrsa -des3 -out cambium-ca.key 2048
Generating RSA private key, 2048 bit long modulus
...................... + + +
........... + + +
e is 65537 (0x10001)
Enter pass phrase for cambium.key:
Verifying - Enter pass phrase for cambium-ca.key:
3.
While creating the private key, you must enter a passphrase, which will be closed by key (and
confirm it). Content key, can viewed from the following command:
openssl rsa
–
noout
–
text -in cambium-ca.key
In this case you must enter the private key again.
Summary of Contents for ePMP
Page 198: ...CAMBIUM NETWORKS 026v003 198 Figure 61 SM Radio page Standard WiFi mode ...
Page 230: ...CAMBIUM NETWORKS 026v003 230 Figure 66 SM Network page Router mode ...
Page 466: ...CAMBIUM NETWORKS 026v003 466 ...
Page 467: ...CAMBIUM NETWORKS 026v003 467 ...
Page 468: ...CAMBIUM NETWORKS 026v003 468 Figure 87 FCC and IC certifications on 2 4 GHz product labels ...